Shop News Jobs WorldWide Contact Us Search C-Byte Home Page Big Open Systems That Work
CompanyCustomersSolutionsAlliancesProductsServices
 
 
     
 
   Solutions/
 
      Application/  
      Decision/  
      Contact/  
      e-business/  
      Data Center Ready/  
      Whitepapers/
     
     
     
   
 

High Availability Whitepapers  
 

High Availability
(continued)

The Components of High Availability Systems
High availability, viewed solely as a technology issue, leads to expensively unavailable systems.

Availability depends, fundamentally, on trained people following specific processes using products designed to be highly available.

People must know how to administer, manage, and use highly available systems. They must follow policies and procedures designed to minimize failure recovery analysis and downtime.

They must avoid introducing points of failure during planned system maintenance. And they must use inherently reliable products which have the ability to recover rapidly if a failure occurs.


Product
This model, independent of the number of computers involved, illustrates the various layers that govern system availability. At one extreme, all layers reside on a single computer. At the other end is a distributed environment where users operate desktop PCs, applications run on work group computers and the database runs on one or more large central servers.

As shown, availability is measured at the top layer—the user level—but depends on all the lower layers. Determining base platform availability calls for understanding the needs of users as well as the requirements for unavoidable database and application downtime.

Previous | Table of Contents | Next

 

 
 
 
   
   
C-Byte Company, Inc.
 
  Good Morning it is 5:35 am in Las Vegas, Nevada, United States.    E-mail This Page  |  Digg This  |  Facebook  |  Twitter  |  Delicious

Ask Us a Question - Call Inside US 1-800-393-5804, Outside US 1-403-770-7818, or Contact Us
Copyright © 1989 - 2017 C-Byte Company, Inc.  ::  C-Byte Privacy Statement   ::   P.R.O. Program ::  RSS 1.0 Feed
This site is protected by copyright and trade mark laws under U.S. and International law. All rights reserved.
SecurityGroup Audits Systems at C-Byte Tackling...