Book description
The complete "how-to guide" for maximizing the availability of enterprise systems.
Training, support, backup, and maintenance account for nearly 80 percent of the total cost of today's enterprise applications-and much of that money is spent trying to squeeze increased availability out of applications in spite of weak design and management processes. In High Availability, two leading IT experts bring together best practices for every people and process-related issue associated with maximizing application availability. The goal: to help enterprises dramatically improve the value of their strategic applications, without investing a dime more than necessary.
Enhancing all four key elements of availability: reliability, recoverability, serviceability, and manageability
Understanding how your users define availability
Planning achievable service level agreements-and delivering on them
Strategies for multiple platforms, from the mainframe to the desktop
Lowering administrative costs through standardization and other techniques
Redundancy, backup, fault tolerance, partitioning, automation, and other high availability solutions
Leveraging availability features built into your existing hardware and operating systems
Discover how to create systems that will be easier to maintain, anticipate and prevent problems, and define ongoing availability strategies that account for business change. Whatever your IT role, whatever your IT architecture, this book can help you deliver the breakthrough availability levels your organization needs right now.
Table of contents
- Copyright
- Introduction
- Acknowledgments
- About the Authors
- 1. Today's Computing Environment
- 2. Achieving Higher Availability
- 3. Planning for System Availability
- 4. Preparing for Systems Management
-
5. Implementing Service-Level Management
- Service-Level Management
-
Problem Management
-
Process Requirements
- Step 1: Define problem management process and practices
- Step 2: Detect or recognize the problem
- Step 3: Bypass the problem
- Step 4: Analyze the problem
- Step 5: Manage the problem to resolution
- Step 6: Report on the status and trends of problems
- Step 7: Redefine the problem management process if necessary
- Data Requirements
- Organization Requirements
- Tools Requirements
- Benefits of Problem Management
-
Process Requirements
-
Change Management
-
Process Requirements
- Step 1: Define change management process and practices
- Step 2: Receive change requests
- Step 3: Plan for implementation of changes
- Step 4: Implement and monitor the changes, back out changes if necessary
- Step 5: Evaluate and report on changes implemented
- Step 6: Modify change management plan if necessary
- Data Requirements
- Organization Requirements
- Tools Requirements
- Benefits
-
Process Requirements
- Security Management
-
Asset and Configuration Management
-
Process Requirements
- Step 1: Define asset and configuration data requirements
- Step 2: Identify asset and configuration information gathering and update procedures
- Step 3: Gather asset and configuration information and update procedures
- Step 4: Provide information to other systems management disciplines
- Step 5: Analyze asset and configuration information quality
- Step 6: Reevaluate asset and configuration data and their update requirements
- Data Requirements
- Organization Requirements
- Tools Requirements
-
Process Requirements
- Availability Management
- 6. From Centralized to Distributed Computing Environments
- 7. Techniques That Address Multiple Availability Requirements
-
8. Special Techniques for System Reliability
-
The Use of Reliable Components
- Techniques for Maximizing Hardware Component Reliability
-
Techniques for Maximizing Software Component Reliability
- Avoid using "Version 1" and "Beta" software
- Don't use shareware or freeware
- Buy industry-standard software from reliable vendors
- Prior to installation, test for viruses
- Provide menus and other ways to control user inputs
- Reuse bug-free components or modules
- Test programs thoroughly
- Run "beta tests" with a controlled set of users
- Install the latest application software fixes judiciously
- Install the latest device drivers when available
- Upgrade to newer operating systems with caution
- Minimize the use of system utilities
- Personnel-Related Techniques for Maximizing Reliability
- Environment-Related Techniques for Maximizing Reliability
- Some Reliability Indicators for Suppliers
- Programming to Minimize Failures
- Implement Environmental Independence Measures
- Utilize Fault Avoidance Measures
- Summary
-
The Use of Reliable Components
- 9. Special Techniques for System Recoverability
- 10. Special Techniques for System Serviceability
- 11. Special Techniques for System Manageability
- 12. All Together Now
-
A. Availability Features of Selected Products
-
Availability Features of Selected Operating Systems
-
Availability Features of Novell NetWare
- SFT II (System Fault Tolerance level 2) or mirroring/duplexing
- SFT III (System Fault Tolerance level 3)
- Dynamic load/unload
- Client auto-reconnect
- Kernel fault recovery or ABEND recovery
- Novell Replication Services (NRS)
- Novell Application Launcher (NAL)
- Hot plug PCI
- Multiprocessor Kernel (MPK)
- Intelligent I/O (I2O)
- Memory protection
- Flexible Mirroring, Phase I
- Novell Storage Services (NSS)
- Hierarchical Storage Management (HSM)
- NetWare Cluster Services (NWCS)
-
Availability Features of Sun Solaris 8
- Sun Cluster
- Solaris Resource Manager/Solaris Bandwidth Manager
- Dynamic Reconfiguration/Automated Dynamic Reconfiguration
- Network multipathing
- Live upgrades
- Hot patching for diagnostics
- Improved crash dump analysis
- Improved program analysis
- Better examination of core files
- Bus performance monitoring
- Better management of core files
- Improved device configuration
- Macro-level debugging
- Remote console messaging
- TCP/IP network diagnostics
- IP packet routing observability
- System crash dump utility
- Enhanced process tracing
- Availability Features of AIX
-
Availability Features of Microsoft Windows 2000 Server and Professional
- Windows File Protection
- Driver certification
- Kernel-mode write protection
- IIS application protection
- Cluster services and Network Load Balancing (Advanced Server and Datacenter Server)
- Job object API and process control
- Application certification & DLL protection
- Distributed File System (Dfs)
- Disk quotas
- Hierarchical Storage Management (HSM)
- Rolling upgrade support (Advanced Server and Datacenter Server)
- Dynamic Volume Management
- Error handling and protected subsystems
- Automatic restart
- Kill process tree
- System preparation tool
- Windows Installer
- Plug and Play (PnP)
- Service pack slipstreaming
- Integrated directory services (Active Directory)
- Windows Management Instrumentation (WMI)
- Delegated administration
- Microsoft Management Console (MMC)
- Windows Script Host (WSH)
- Group policies and centralized desktop management
- Recoverable file system
- Disk mirroring (RAID Level 1)
- Disk duplexing
- Disk striping with parity (RAID Level 5)
- Availability Features of IBM OS/400
-
Availability Features of Novell NetWare
- Availability Features of Selected Hardware Components
- Availability Features of Selected Software Components
-
Availability Features of Selected Operating Systems
Product information
- Title: High Availability: Design, Techniques, and Processes
- Author(s):
- Release date: December 2000
- Publisher(s): Pearson
- ISBN: 9780130962881
You might also like
article
Twenty Years of Open Innovation
Organizations that practice open innovation draw on external resources to develop new ideas for products and …
book
Java™ Performance
“The definitive master class in performance tuning Java applications…if you love all the gory details, this …
book
API-Design, 2nd Edition
Mit Schnittstellen zum Zwecke der Arbeitsteilung, Wiederverwendung oder beispielsweise zur Bildung einer modularen Architektur haben Entwickler …
book
Fluctuation Mechanism and Control on System Instantaneous Availability
Fluctuation Mechanism and Control on System Instantaneous Availability facilitates the development of modeling and identification skills …