Skip to content

High Availability Design, Techniques and Processes

Best in textbook rentals since 2012!

ISBN-10: 0130962880

ISBN-13: 9780130962881

Edition: 2001

Authors: Michael Hawkins, Floyd Piedad

List price: $44.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Training, systems support, backup and maintenance account for nearly 80% of the total cost of today's enterprise applications -- and much of that money is spent trying to squeeze increased availability out of applications in spite of weak design and management processes. In High Availability: Design, Techniques and Processes, two leading IT experts bring together "best practices" for every people and process-related issue associated with maximizing application availability. The goal: to help enterprises dramatically improve the value of their strategic applications, without spending more money. Using extensive real-world examples and scenarios, the authors cover the entire application…    
Customers also bought

Book details

List price: $44.99
Copyright year: 2001
Publisher: Prentice Hall PTR
Publication date: 12/18/2000
Binding: Paperback
Pages: 288
Size: 7.25" wide x 9.25" long x 1.00" tall
Weight: 1.628
Language: English

Michael Hawkins is assistant professor of history at Creighton University.

Introduction
Acknowledgments
Today's Computing Environment
Complexity, Complexity, Complexity
Multiple Technologies and Protocols
Multiple Vendors
Varied Users
Multiple Locations
Rapid Change
Greater Business Demands
A Daunting Environment To Work In
The Total Cost of Ownership Issue
Total Cost of Ownership Defined
Industry TCO Estimates
What TCO Studies Reveal
The Underlying Reason for High TCO
A Typical Scenario: Choosing Office Systems
Availability as the Most Significant Contributor to TCO
Summary
Achieving Higher Availability
Determining User Availability Requirements
The Service Level Agreement
Helping Users Identify Their Availability Requirements
Availability Levels and Measurements
High Availability Level
Continuous Operations Level
Continuous Availability
Quantifying Availability Targets
Availability: A User Metric
Measuring End-To-End Availability
Summary
Planning for System Availability
Identifying System Components
Addressing Critical Components
The Four Elements of Availability
Summary
Preparing for Systems Management
Processes, Data, Tools, and Organization
Systems Management in the PC World (or the Lack of It)
IT Organizations: Away from Centralization, Then Back Again
Understanding the Systems To Manage
The Basics of Management: Five Phases
Setting Objectives
Planning
Execution
Measurement
Control
Identifying the Systems Management Disciplines
Implementing Service-Level Management
Service-Level Management
Process Requirements
Data and Measurement Requirements
Organization Requirements
Tools Requirements
Benefits of Service-Level Management
Problem Management
Process Requirements
Data Requirements
Organization Requirements
Tools Requirements
Benefits of Problem Management
Change Management
Process Requirements
Data Requirements
Organization Requirements
Tools Requirements
Benefits
Security Management
Process Requirements
Data Requirements
Organization Requirements
Tools Requirements
Benefits
Asset and Configuration Management
Process Requirements
Data Requirements
Organization Requirements
Tools Requirements
Availability Management
Process Requirements
Data Requirements
Organization Requirements
Tools Requirements
Benefits
From Centralized to Distributed Computing Environments
Systems Management Disciplines
The Centralized Computing Environment
The Distributed Computing Environment
Systems Management in Today's Computing Environment
Defining Appropriate Functions and Control
Choosing a Deployment Strategy
Developing a Deployment Strategy
Management by Exception
Policy-Based Management
Standardization of Performance Data
Accountability of the Distributed Systems Manager
Central Definition of Systems Management Architectures
Process Ownership
Summary
Techniques That Address Multiple Availability Requirements
Redundancy
Hardware Redundancy Examples
Software Redundancy Examples
Environmental Redundancy Example
Critical Success Factors
Backup of Critical Resources
Methods of Backup
Hardware Backup Examples
Software Backup Examples
IT Operations Backup Examples
Critical Success Factors
Clustering
Comparing Clustering and Redundancy
Hardware and Software Clustering Examples
IT Operations Clustering Examples
Environmental Clustering Examples
Critical Success Factors
Fault Tolerance
Hardware Fault Tolerance Examples
Software Fault Tolerance Examples
Environmental Fault Tolerance Examples
Critical Success Factors
Isolation or Partitioning
Hardware Isolation Examples
Software Isolation Examples
Other Benefits of Isolation
Critical Success Factors
Automated Operations
Console and Network Operations Examples
Workload Management Examples
System Resource Monitoring Examples
Problem Management Applications
Distribution of Resources Example
Backup and Restore Examples
Critical Success Factors
Access Security Mechanisms
Steps to Secure Access
Types of Security
Password Management
Critical Success Factors
Standardization
Hardware Standardization Examples
Software Standardization Examples
Network Standardization Examples
Processes and Procedures Standardization Examples
Naming Standardization Examples
Critical Success Factors
Transitioning to Standardization
Summary
Special Techniques for System Reliability
The Use of Reliable Components
Techniques for Maximizing Hardware Component Reliability
Techniques for Maximizing Software Component Reliability
Personnel-Related Techniques for Maximizing Reliability
Environment-Related Techniques for Maximizing Reliability
Some Reliability Indicators for Suppliers
Programming to Minimize Failures
Correctness
Robustness
Extensibility
Reusability
Implement Environmental Independence Measures
Use Power Generators
Use Independent Air-Conditioning Units
Use Fire Protection Systems
Use Raised Flooring
Install Equipment Wheel Locks
Locate Computer Room on the Second Floor
Utilize Fault Avoidance Measures
Analyzing Problem Trends and Statistics
Use of Advanced Hardware Technologies
Use of Software Maintenance Tools
Summary
Special Techniques for System Recoverability
Automatic Fault Recognition
Parity Checking Memory
ECC Memory
Data Validation Routines
Fast Recovery Techniques
Minimizing Use of Volatile Storage Media
Regular Database Updates to Central Storage
Automatic File-Save Features
Summary
Special Techniques for System Serviceability
Online System Redefinition
Add or Remove I/O Devices
Selectively Power Down Subsystems
Commit or Reject Changes
Informative Error Messages
Use Standard Corporate Terminology
Adopt Terms Already Used by Common Applications
Tell What, Why, Impact, and How
Implement Context-Sensitive Help
Give Options for Viewing More Detailed Error Information
Make Error Information Available After the Error Has Been Cleared
Complete Documentation
Have a Manual of Operations on Hand
Write Basic Problem Isolation and Recovery Guides
Provide System Configuration Diagrams
Label Resources
Provide a Complete Technical Library
Installation of Latest Fixes and Patches
Summary
Special Techniques for System Manageability
Use Manageable Components
Simple Network Management Protocol (SNMP)
Common Management Information Protocol (CMIP)
Desktop Management Interface (DMI)
Common Information Management Format (CIM)
Wired for Management (WfM)
Management Applications
Systems Management Issues
Automated Systems Management Capabilities
System Management Applications and Frameworks
Educate IS Personnel on Systems Management Disciplines
Business Value of the Information System
Value of Systems Management Disciplines
Principles of Management
Basic Numerical Analysis Skills
Summary
All Together Now
The Value of Systems Management Disciplines
Which One First?
Analyze Outages
Identify Single Points of Failure
Exploit What You Have
An Implementation Strategy
Summary
Availability Features of Selected Products
Availability Features of Selected Operating Systems
Availability Features of Novell NetWare
Availability Features of Sun Solaris 8
Availability Features of AIX
Availability Features of Microsoft Windows 2000 Server and Professional
Availability Features of IBM OS/400
Availability Features of Selected Hardware Components
Availability Features of IBM S/390 Integrated Server
Availability Features of the IBM AS/400 Midrange System
Availability Features of the IBM RS/6000
Availability Features of Compaq Proliant Servers
Availability Features of Selected Software Components
Availability Features of the Oracle 8i Database
Index