Font Size: a A A

Research And Realization Of Disaster Backup And Recovery Techniques For Information Systems

Posted on:2007-07-21Degree:DoctorType:Dissertation
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:1118360185994682Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the widespread use of the computer technology, more and more companies deal with business with information systems. The data saved in the information systems have become important resources of the companies. The lost of the data and the failure of the information system will cause uncountable losses to the companies. People could not forecast and prevent the failure or disaster of the information systems because of various reasons. The demand of the continous application of the information systems has become study focus, and disaster backup and recovery have become the research hotspots and emphasis in the field of Information Security. Disaster recovery technology can protect valuable information in the computer systems and efficiently ensure the normal work of computer systems when the disaster occurs.The dissertation has analyzed the disaster recovery degrees model of SHARE78, and divided the disaster recovery systems into data, system and application tiers. According to the three tiers division, the new disaster recovery degrees are given, i.e, the nine disaster recovery degrees are defined. The dissertation has described the detailed stipulates of every degree. The dissertation presents the technological frameworks of disaster backup and recovery systems, and describes the disaster recovery models with three matrixs, which contains the guideline, technologies and measures.The dissertation has analyzed the techniques related to frameworks of disaster backup and recovery systems, and a comprehensive comparison of various techniques is given, the research of disaster recovry based on the logic volume...
Keywords/Search Tags:Disaster backup, disaster recovery, degree of disaster recovery, data backup, Business Continuity Planning, Disaster Recovery Planning, remote backup, distributed transaction processing, optimized o2-safe approach, concurrency control
PDF Full Text Request
Related items