Professional Documents
Culture Documents
KwaiSeng
Consulting Systems Engineer
Presentation_ID
Cisco Confidential
Agenda
Data CenterThe Evolution Data Center Disaster Recovery
Objectives Failure Scenarios Design Options
Business Agility
Compute Evolution
Client/ Server Mainframes
Internet Computing
Terminal
1960
1980
2006 Cisco Systems, Inc. All rights reserved.
2000
WAN/ Internet
DR Data Center Scalable Infrastructure
FC Switch
NAS
Content Switch
VSANs
FC Switch DB Servers Mainframe IP Comm. Operations
FC Switch RAID
Metro Network DWDM/SONET/Ethernet
2006 Cisco Systems, Inc. All rights reserved.
Tape
FC SAN
App A
App B
App A
App C
Data Replication
FC FC
FC
FC
App A
App B
App A
App C
FC
FC
App A
App B
App A
App C
FC
FC
11
Agenda
Introduction to Data CenterThe Evolution Data Center Disaster Recovery
Objectives Failure Scenarios Design Options
12
Disaster Recovery
Recovery of data and resumption of serviceEnsuring business can recover and continue after failure or disaster Ability of a business to adapt, change and continue when confronted with various outside impacts Mitigating the impact of a disaster
13
Business Continuance
Restoration of Business After a Failure
Disaster Recovery
Protecting Data Through Offsite Data Replication and Backup
Risk analysis
Identifies important functions and assets that are critical to companys operations
15
16
Time t2
Hours Days Weeks
Tape backup
Manual Migration
Tape Restore
Smaller RPO/RTO
Higher $$$, replication, hot standby
2006 Cisco Systems, Inc. All rights reserved.
Larger RPO/RTO
Lower $$$, tape backup/restore, cold standby
17
Agenda
Introduction to Data CenterThe Evolution Data Center Disaster Recovery
Objectives Failure Scenarios Design Options
18
Failure Scenarios
Disaster Could Mean Many Types of Failure
Network failure Device failure Storage failure Site failure
19
Network Failures
ISP failure
Dual ISP connections Multiple ISP
Service Provider A
Internet
Service Provider B
20
Device Failures
Routers, switches, FWs
HSRP VRRP
Service Provider A
Internet
Service Provider B
Hosts
HA cluster LB server farm NIC teaming
21
Storage Failures
Disk arrays
RAID
Service Provider A
Internet
Service Provider B
22
Site Failures
Partial site failure
Application maintenance Application migration Application scheduled DR exercise
Service Provider A
Internet
Service Provider B
23
Agenda
Introduction to Data CenterThe Evolution Data Center Disaster Recovery
Objectives Failure Scenarios Design Options
24
Warm Standby
A data center that is equipped with hardware and communications interfaces capable of providing backup operating support Latest backups from the production data center must be delivered Network access needs to be activated Application needs to be manually started
25
Disaster RecoveryActive/Standby
App A
App B
App A
App C
IP/Optical Network
FC
FC
26
Hot Standby
A data center that is environmentally ready and has sufficient hardware, software to provide data processing service with little down time Hot backup offers disaster recovery, with little or no human intervention Application data is replicated from the primary site A hot backup site provides better RTO/RPO than warm standby but cost more to implement Business continuance
27
Disaster RecoveryActive/Standby
App A
App B
App A
App C
IP/Optical Network
FC FC
Internet
Service Provider B
29
Internet
Service Provider B
Internal Network
Active/Active Web Hosting Active/Active Application Processing Active/Standby Database Processing or Active/Active for Different Application
2006 Cisco Systems, Inc. All rights reserved.
30
31
Agenda
Introduction to Data CenterThe Evolution Data Center Disaster Recovery
Objectives Failure Scenarios Design Options
32
Health of servers and/or applications needs to be taken into account Optionally, other metrics (like load) can be measured and utilized for a better selection
33
http://www.cisco.com/ http://www1.cisco.com/
1 /1. .com P TT isco ed om H v / c o M co.c ET w w . G 2 1. t: w 30 2.cis 1 . s P/1 www Ho T n: HT 2. atio c Lo 3. GET/H TTP/1.1 Host: ww w2.cisco .co
HTTP/1.1 200 OK
http://www2.cisco.com/
2006 Cisco Systems, Inc. All rights reserved.
34
Client
http://www.cisco.com/ UDP:53 TCP:80
es aliv p e Ke
Data Center 1
2006 Cisco Systems, Inc. All rights reserved.
Data Center 2
35
Router 10
Router 12
Low Cost
36
RHI
Active/Standby
Within Secs
Yes
No
37
Agenda
Introduction to Data CenterThe Evolution Data Center Disaster Recovery
Objectives Failure Scenarios Design Options
38
Cluster Overview
Load Balancing Cluster : multiple copies of the same application against the same data set, usually read only High Availability Cluster : multiple copies of application that requires access to a common data depository, usually read and write Clustering provides benefits for availability, reliability, scalability, and manageability
Web Servers
Application Servers
Database Servers
39
Private Network : Interconnection between nodes Storage Disk : Shared storage array, NAS or SAN
2006 Cisco Systems, Inc. All rights reserved.
40
Active/active
Database requests load balanced all nodes Lock mechanism ensures data integrity
Shared everything
Each node mounts all storage resources Provides a single layout reference system for all nodes
Node1
Node2
Shared nothing
Each node mounts only its semi-private storage Data stored on the peer systems storage is accessed via the peer-peer communication
41
Geo-Clusters Considerations
Geo-Cluster: Cluster That Span Multiple Data Centers
WAN
Local
Datacenter
Remote Datacenter
Node1
Node2
Challenges:
Disk Replication Synchronous or Asynchronous 2 x RTT
42
Resolution : Use a Quorum, a tie breaker for gaining access to the disk
Data Corruption
43
Layer 2 Heartbeats
Extended L2 Network : L2 adjacency required for nodes heartbeat. Extending VLAN across site is hazardous
Node1
Local Datacenter
WAN
Remote Datacenter
Resolution : L3 Capability for Cluster Heartbeat. EoMPLS to carry L2 hearbits across DR sites.
44
Extended SAN
sym1320 RW RW
sym1291 WD WD
45
Agenda
Introduction to Data CenterThe Evolution Data Center Disaster Recovery
Objectives Failure Scenarios Design Options
46
Storage tier
Large, permanent data files or raw data Large batch updates, most likely real time Log and data on separate volumes
47
Asynchronous
Write acknowledged and I/O is complete after write to local array; changes (writes) are replicated to remote array asynchronously
48
Asynchronous
No Application Performance Impact Unlimited Distance (Second Site Outside Threat Radius) Exposure to Possible Data Loss
Maximum tolerable distance ascertained by assessing each application Cost of data loss
49
Control files identify other files making up the database and records content and state of the db Datafile is only updated periodically Redo logs record db changes resulting from transactions
Used to play back changes that may not have been written to datafile when failure occurred Typically archived as they fill to local and DR site destinations
Identify
Datafiles
Record Changes To
50
...
...
...
t0
t1
51
Secondary Site
Earlier DB Backups
Database
Archive Logs
Replicated/Copied
Archive Logs
52
SONET/SDH
DWDM/ CWDM
Back-End Application Servers High Density Multilayer SAN Director Enterprise-Class Storage Arrays
IP/Metro E
53
Limited by Optics (Power Budget) Limited by Optics (Power Budget) Limited by BB_Credits
SONET/SDH Sync (1Gbps+ Subrate) Async IP MDS9000 FCIP Sync (Metro Eth) Async (1Gbps+)
54
2005 Cisco Systems, Inc. All rights reserved. 2006 Cisco Systems, Inc. All rights reserved.
55 55
AUTOMATION
Dynamic provisioning and autonomic Information Lifecyle Management (ILM) to enable business agility Business Policies On-Demand Service Oriented
SAN
VIRTUALIZATION
Management of resources independent of underlying physical infrastructure to increase utilization, efficiency and flexibility
Compute Network
CONSOLIDATION
Centralization and standardization to lower costs, improve efficiency and uptime
Storage
Compute Network Storage
56
Summary
57
58
59
Virtual Fabrics (VSANs) Storage Virtualization Data Replication Svcs Fabric Routing Svcs
Virtual I/O
TOPSPIN FAMILY
ENTERPRISE GRID
Blade Servers Virtual Private Server Fabric #1 Virtual Private Virtual Private Blade Server Server Fabric #3 Fabric #2
UNIX/Windows Servers
60
Whats Next?
A Security Strategy to Protect the Data Center
Understands the vulnerabilities, and apply the relevant mitigations
61
Q and A
62
63