Framework Architecture on High Data Availability Server Virtualization for Disaster Recovery
Keywords:Disaster Recovery, High Data Availability, Network Framework Architecture, Security, Virtual Machine (Wms), Virtualization,
AbstractThis paper presents a design and tested framework architecture on High Data Availability Server Virtualization for Disaster Recovery at one campus network centre. Today’s data information and knowledge are becoming most valuable commodity in business exchange and transactions where data need to be secured from cyber attackers and information security is a crucial needed. A propose architecture using server virtualization to provide high availability of data, through fast and high data through fast and high data recovery on virtual infrastructure for disaster recovery is done. The architecture uses multi side network RAID to achieve return of time objectives (RTO) and return of point objectives (RPO) of the application in the organization. Method presents servers consolidation and multiple physical server applications are deployed onto the virtual machines (VM), which then run on a single (many real server apps usually are started on top of this exclusive products (VM), which then function using one) or fewer real high-end servers to achieve better performances compared to utilizing several or even hundreds of traditional servers. Security perimeters are used in the proposed architecture to maximize the data protection in the organization. The setup experiments of virtualization technologies using VMWare, Ranger Pro for backup and Trend Micro Deep Security tools. Three architecture framework are tested which presents automated data replication simulations from production site to disaster recovery site that creates an active-active environment. Results presented that Recovery Point Objective (RPO), Recovery Time Objective (RTO), data loss and data availability at 99.91 % of data are recovered during recovery process using multi side network RAID. Thus this technique protects a larger share of disaster recovery workloads in terms of high availability and data protection.
How to Cite
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.