Copias De Seguridad : Estudio Y Metodología

Total Page:16

File Type:pdf, Size:1020Kb

Copias De Seguridad : Estudio Y Metodología Trabajo Final de Carrera Copias de seguridad: Estudio y metodologı́a. Memoria Autor: Rafael Santamaría Carmona Consultor: Juan José Cuadrado Gallego 1 CONTENIDO 1 INTRODUCCIÓN 9 1.1 OBJETIVOS 11 1.2 METODOLOGÍA 12 2 LAS COPIAS DE SEGURIDAD A LO LARGO DE LA HISTORIA 13 2.1 TARJETAS PERFORADAS 14 2.2 CINTAS MAGNÉTICAS 20 2.3 DISCOS DUROS 22 2.3.1 LOS DISCOS DUROS EN EL SENO DE HOGARES Y PEQUEÑAS O MEDIANAS EMPRESAS 23 2.4 DISCOS FLEXIBLES 25 2.5 DISPOSITIVOS ÓPTICOS 26 2.6 MEMORIAS FLASH USB (USB FLASH DRIVES ) 28 2.7 INTERNET Y “LA NUBE ” 30 3 DISPOSITIVOS DE ALMACENAMIENTO 33 3.1 CINTAS MAGNÉTICAS 33 3.1.1 INTRODUCCIÓN 33 3.1.2 ESTRUCTURA FÍSICA 33 3.1.3 ESTRUCTURA LÓGICA 34 3.1.4 MÉTODOS DE GRABACIÓN DIGITAL 35 3.1.4.1 Grabación lineal 35 3.1.4.2 Grabación transversal 36 3.1.5 FORMATOS DE CINTAS MAGNÉTICAS 38 3.2 DISCOS DUROS 41 3.2.1 INTRODUCCIÓN 41 3.2.2 ESTRUCTURA FÍSICA 41 3.2.3 ESTRUCTURA LÓGICA 44 3.2.4 FUNCIONAMIENTO BÁSICO 45 3.2.5 TIPOS DE DISCOS DUROS 46 3.2.5.1 Discos duros externos portátiles 46 3.2.5.2 Discos duros externos de sobremesa 46 3.2.5.3 Mini discos duros externos 47 3.3 DISCOS ÓPTICOS 48 3.3.1 INTRODUCCIÓN 48 3.3.2 ESTRUCTURA 48 3.3.3 PROCESO DE LECTURA 49 3.3.4 PROCESO DE GRABACIÓN 49 3.4 DISPOSITIVOS DE MEMORIA FLASH 50 COPIAS DE SEGURIDAD : ESTUDIO Y METODOLOGÍA 3.4.1 INTRODUCCIÓN 50 3.4.2 ESTRUCTURA 50 3.4.3 MÉTODO DE GRABACIÓN 51 4 LAS COPIAS DE SEGURIDAD Y EL ESTÁNDAR ISO 53 4.1 INTRODUCCIÓN 53 4.2 EL ESTÁNDAR ISO/IEC 27002 55 5 MODELOS DE COPIAS DE SEGURIDAD 59 5.1 INTRODUCCIÓN 59 5.2 COPIA TOTAL O COMPLETA 60 5.3 COPIA DIFERENCIAL 61 5.4 COPIA INCREMENTAL 63 5.5 COPIA ESPEJO (MIRROR BACKUP ) 64 5.6 OTROS MODELOS 65 5.6.1 COPIA A NIVEL DE BLOQUES (D ELTA ) 65 5.6.2 PARCHES BINARIOS (BINARY PATCH - FASTBIT ) 66 5.6.3 COPIAS COMPLETAS SINTÉTICAS (S YNTHETIC FULL BACKUPS) 67 6 GESTIÓN DE COPIAS DE SEGURIDAD 69 6.1 INTRODUCCIÓN 69 6.2 COPIAS DE SEGURIDAD ONLINE (C LOUD BACKUPS ) 70 6.3 COPIAS DE SEGURIDAD OFFLINE 73 6.4 COPIAS DE SEGURIDAD NEARLINE 74 6.5 UNA NUEVA INTERPRETACIÓN DE LOS TÉRMINOS OFFLINE Y NEARLINE 75 6.6 BACKUP SITE O DCR (D ISASTER RECOVERY CENTER ) 77 6.6.1 SITIOS FRÍOS (COLD SITES ) 77 6.6.2 SITIOS CALIENTES (H OT SITES ) 77 6.6.3 SITIOS TEMPLADOS (W ARM SITES ) 78 7 METODOLOGÍA DE COPIAS DE SEGURIDAD 79 7.1 INTRODUCCIÓN 79 7.2 QUÉ DATOS COPIAR 80 7.2.1 INTRODUCCIÓN 80 7.2.2 RECOPILACIÓN DE INFORMACIÓN 80 7.2.3 REALIZACIÓN DEL INVENTARIO 81 7.2.3.1 Listado de discos del sistema y sus particiones 82 7.2.3.2 Hardware 87 7.2.3.3 Configuración de las bases de datos y contenedores de datos 88 7.2.3.4 Configuración de DHCP, Active Directory, NFS y CIFS 91 4 7.2.4 QUÉ DATOS COPIAR 94 7.2.4.1 Servidores 95 7.2.4.2 Puestos de trabajo 96 7.3 FRECUENCIA 98 7.3.1 INTRODUCCIÓN 98 7.3.2 EJEMPLOS TIPO DE PROGRAMACIONES 98 7.3.2.1 Tipo 1. Programación semanal de copias totales 99 7.3.2.2 Tipo 2. Copia total semanal con copias diferenciales de nivel 1 100 7.3.2.3 Tipo 3. Copia total semanal con copias incrementales 101 7.3.2.4 Tipo 4. Copia total, diferencial e incrementales 101 7.3.2.5 Tipo 5. Copias multinivel. Torre de Hanói 102 7.4 PROTECCIÓN DE LAS COPIAS DE SEGURIDAD 106 7.4.1 INTRODUCCIÓN 106 7.4.2 DUPLICACIÓN DE COPIAS DE SEGURIDAD 106 7.4.2.1 Duplicación post-copia 107 7.4.2.2 Duplicación en línea 107 7.4.3 ALMACENAMIENTO DE VOLÚMENES 108 7.4.3.1 Almacenamiento on-site 108 7.4.3.2 Almacenamiento off-site 110 7.4.4 ENCRIPTACIÓN O CIFRADO 114 7.4.4.1 Introducción 114 7.4.4.2 Tipos de sistemas de cifrado 114 7.4.4.3 Tipos de algoritmos de cifrado 115 7.4.4.4 Cifrado y copias de seguridad 117 7.5 PRUEBAS DE OPERATIVIDAD (T ESTING ) 119 7.5.1 INTRODUCCIÓN 119 7.5.2 PAUTAS 120 7.6 RESUMEN 124 8 PLAN DE RECUPERACIÓN DE DESASTRES. FUNDAMENTOS 125 8.1 PORQUÉ SE DEBE REALIZAR EL PLAN DE RECUPERACIÓN DE DESASTRES 126 8.1.1 COSTE DE LA PÉRDIDA DE DATOS 126 8.1.2 RIESGO DE FRACASO EMPRESARIAL 126 8.1.3 RIESGO DE PENALIZACIONES POR VULNERAR LA LEGALIDAD VIGENTE 127 8.1.4 AUMENTO DE LA PRODUCTIVIDAD DE LOS EMPLEADOS 127 8.1.5 TRANQUILIDAD DE ESPÍRITU 128 8.2 ELABORACIÓN DEL PLAN DE RECUPERACIÓN DE DESASTRE 129 8.2.1 REALIZACIÓN DE INVENTARIO 129 8.2.2 ANÁLISIS DE RIESGOS 129 8.2.3 DESARROLLO DEL DRP 131 8.2.4 PRUEBAS DEL DRP 132 9 CASO PRÁCTICO 135 5 COPIAS DE SEGURIDAD : ESTUDIO Y METODOLOGÍA 9.1 INTRODUCCIÓN 135 9.2 PRESENTACIÓN DEL CASO 136 9.3 QUÉ DATOS COPIAR 137 9.3.1 INFORMACIÓN RECABADA 137 9.3.1.1 Recepción 137 9.3.1.2 El oficial 138 9.3.1.3 Copias 138 9.3.1.4 Gestión y contabilidad 139 9.3.1.5 Notario 139 9.3.1.6 Agenda 140 9.3.1.7 Correo electrónico y libreta de direcciones 140 9.3.1.8 Aplicaciones y licencias de software 140 9.3.1.9 Configuración de red 140 9.3.1.10 Hardware (Equipos e Impresoras) 142 9.3.2 PRIMERAS CONCLUSIONES 143 9.3.3 REALIZACIÓN DE INVENTARIO 145 9.3.3.1 Listado de discos y particiones y hardware 146 9.3.3.2 Configuraciones de bases de datos y contenedores de datos 150 9.3.3.3 Configuración de DHCP, Active Directory, NFS y CIFS 151 9.3.4 QUÉ DATOS COPIAR 151 9.3.4.1 Usuario: Recepción 152 9.3.4.2 Usuario: Oficial 152 9.3.4.3 Usuario: Copias 153 9.3.4.4 Usuario: Gestor 153 9.3.4.5 Usuario: Notario 154 9.3.4.6 Servidor 154 9.4 FRECUENCIA (P ROGRAMACIÓN DE LAS COPIAS DE RESPALDO ) 155 9.4.1 INTRODUCCIÓN 155 9.4.2 PROGRAMACIÓN EN PUESTOS DE TRABAJO 157 9.4.3 PROGRAMACIÓN EN EL SERVIDOR 159 9.4.3.1 Programación del respaldo de gestión 159 9.4.3.2 Programación del respaldo de protocolo 160 9.4.3.3 Programación del respaldo de agenda 161 9.4.3.4 Programación del respaldo de configuraciones 162 9.4.3.5 Secuencia 162 9.4.3.6 Elección del software a utilizar 163 9.5 PROTECCIÓN DE LOS VOLÚMENES DE RESPALDO 183 9.6 PRUEBAS DE OPERATIVIDAD 185 10 ANEXOS 187 10.1 ANEXO I. REAL DECRETO 997/1999 187 10.2 ANEXO II. COPIAS DE SEGURIDAD CON POSTGRE SQL 191 10.2.1 SQL DUMP 191 10.2.1.1 Restaurar la copia 192 6 10.2.2 COPIA DE SEGURIDAD A NIVEL DE ARCHIVO 192 10.2.3 COPIA EN LÍNEA 193 10.2.3.1 Configurar el archivado de WAL 194 10.2.4 REALIZACIÓN DE UNA COPIA DE SEGURIDAD BASE 194 10.3 ANEXO III. COPIAS DE SEGURIDAD CON MYSQL 195 10.3.1 REALIZAR COPIAS DE SEGURIDAD COPIANDO LOS ARCHIVOS DE LAS TABLAS 195 10.3.2 COPIAS DE SEGURIDAD DE ARCHIVOS DE TEXTO DELIMITADO 196 10.3.3 COPIAS DE SEGURIDAD CON MYSQLDUMO O MYSQLHOTCOPY 196 10.3.4 COPIAS DE SEGURIDAD INCREMENTALES ACTIVANDO EL LOG BINARIO 197 10.4 ANEXO IV. SOFTWARE LIBRE DE COPIAS DE SEGURIDAD 199 10.4.1 AMANDA 199 10.4.2 BACKUP PC 200 10.4.2.1 Características principales: 201 10.4.2.2 Otras características: 202 10.4.3 BACULA 202 10.4.3.1 Principales características 203 10.4.4 COBIAN BACKUP 205 10.4.4.1 Principales características 205 10.4.4.2 Herramientas adicionales 206 11 TABLA DE ILUSTRACIONES 207 12 BIBLIOGRAFÍA 209 7 1. INTRODUCCIÓN 1 INTRODUCCIÓN En el año 2011, sólo en la red se generaron alrededor de 1.8 Zettabytes 1 de datos, y según las previsiones la cifra se duplicará en el transcurso del año 2013. A medida que la cantidad de datos generada por la sociedad actual aumenta, lo hace en igual medida el riesgo de perder parte de ellos (o todos) de una manera irreversible si no se aplican políticas de copia de seguridad adecuada. El verdadero problema surge cuando esa posible pérdida se produce en el seno del mundo empresarial, ya que puede llegar a afectar muy negativamente a la estabilidad de las empresas debido, no únicamente a pérdidas económicas, sino también a daños de imagen corporativa, pérdida de confianza o confidencialidad. Según un estudio realizado por Price Whaterhouse coopers (MKM Publicaciones, 2012), un solo incidente de pérdida de datos cuesta a las empresas una media de 7.000 Euros. Otro estudio realizado en este caso por Gartnes revela que el 25% de los usuarios de ordenadores personales pierden datos cada año y que el 80% de las empresas que sufren una importante pérdida de datos o un fallo de seguridad durante más de 24 horas cierran al cabo de un año.
Recommended publications
  • Pdp11-40.Pdf
    processor handbook digital equipment corporation Copyright© 1972, by Digital Equipment Corporation DEC, PDP, UNIBUS are registered trademarks of Digital Equipment Corporation. ii TABLE OF CONTENTS CHAPTER 1 INTRODUCTION 1·1 1.1 GENERAL ............................................. 1·1 1.2 GENERAL CHARACTERISTICS . 1·2 1.2.1 The UNIBUS ..... 1·2 1.2.2 Central Processor 1·3 1.2.3 Memories ........... 1·5 1.2.4 Floating Point ... 1·5 1.2.5 Memory Management .............................. .. 1·5 1.3 PERIPHERALS/OPTIONS ......................................... 1·5 1.3.1 1/0 Devices .......... .................................. 1·6 1.3.2 Storage Devices ...................................... .. 1·6 1.3.3 Bus Options .............................................. 1·6 1.4 SOFTWARE ..... .... ........................................... ............. 1·6 1.4.1 Paper Tape Software .......................................... 1·7 1.4.2 Disk Operating System Software ........................ 1·7 1.4.3 Higher Level Languages ................................... .. 1·7 1.5 NUMBER SYSTEMS ..................................... 1-7 CHAPTER 2 SYSTEM ARCHITECTURE. 2-1 2.1 SYSTEM DEFINITION .............. 2·1 2.2 UNIBUS ......................................... 2-1 2.2.1 Bidirectional Lines ...... 2-1 2.2.2 Master-Slave Relation .. 2-2 2.2.3 Interlocked Communication 2-2 2.3 CENTRAL PROCESSOR .......... 2-2 2.3.1 General Registers ... 2-3 2.3.2 Processor Status Word ....... 2-4 2.3.3 Stack Limit Register 2-5 2.4 EXTENDED INSTRUCTION SET & FLOATING POINT .. 2-5 2.5 CORE MEMORY . .... 2-6 2.6 AUTOMATIC PRIORITY INTERRUPTS .... 2-7 2.6.1 Using the Interrupts . 2-9 2.6.2 Interrupt Procedure 2-9 2.6.3 Interrupt Servicing ............ .. 2-10 2.7 PROCESSOR TRAPS ............ 2-10 2.7.1 Power Failure ..............
    [Show full text]
  • PDP-8 Simulator Manual
    PDP-8 Simulator Usage 30-Apr-2020 COPYRIGHT NOTICE The following copyright notice applies to the SIMH source, binary, and documentation: Original code published in 1993-2016, written by Robert M Supnik Copyright (c) 1993-2016, Robert M Supnik Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL ROBERT M SUPNIK BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Except as contained in this notice, the name of Robert M Supnik shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization from Robert M Supnik. 1 Simulator Files.............................................................................................................................3
    [Show full text]
  • Tape Drive Technology Comparison Sony AIT · Exabyte Mammoth · Quantum DLT by Roger Pozak Boulder, CO (303) 786-7970 Roger [email protected] Updated April 1999
    Tape Drive Technology Comparison Sony AIT · Exabyte Mammoth · Quantum DLT By Roger Pozak Boulder, CO (303) 786-7970 [email protected] Updated April 1999 1 Introduction Tape drives have become the preferred device for backing up hard disk data files, storing data and protecting against data loss. This white paper examines three leading mid-range tape drives technologies available today: Sony AIT, Exabyte Mammoth and Quantum DLT. These three technologies employ distinctly different recording formats and exhibit different performance characteristics. Therefore, choosing among and investing in one of these technologies calls for a complete understanding of their respective strengths and weaknesses. Evolution of Three Midrange Tape Drive Technologies Exabyte introduced the 8mm helical scan tape drive in 1985. The 8mm drive mechanical sub-assembly was designed and manufactured by Sony while Exabyte supplied the electronics, firmware, cosmetics and marketing expertise. Today, Exabyte’s Mammoth drive is designed and manufactured entirely by Exabyte. Sony, long a leading innovator in tape technology, produces the AIT (Advance Intelligent Tape) drives. The AIT drive is designed and manufactured entirely by Sony. Although the 8mm helical scan recording method is used, the AIT recording format is new and incompatible with 8mm drives from Exabyte. Quantum Corporation is the manufacturer of DLT (Digital Linear Tape) drives. Quantum purchased the DLT technology from Digital Equipment Corporation in 1994 and has successfully developed and marketed several generations of DLT drive technology including the current DLT- 7000 product. Helical Scan vs Linear Serpentine Recording Sony AIT and Exabyte Mammoth employ a helical scan recording style in which data tracks are written at an angle with respect to the edge of the tape.
    [Show full text]
  • Secure Data Storage – White Paper Storage Technologies 2008
    1 Secure Data Storage – White Paper Storage Technologies 2008 Secure Data Storage - An overview of storage technology - Long time archiving from extensive data supplies requires more then only big storage capacity to be economical. Different requirements need different solutions! A technology comparison repays. Author: Dr. Klaus Engelhardt Dr. K. Engelhardt 2 Secure Data Storage – White Paper Storage Technologies 2008 Secure Data Storage - An overview of storage technology - Author: Dr. Klaus Engelhardt Audit-compliant storage of large amounts of data is a key task in the modern business world. It is a mistake to see this task merely as a matter of storage technology. Instead, companies must take account of essential strategic and economic parameters as well as legal regulations. Often one single technology alone is not sufficient to cover all needs. Thus storage management is seldom a question of one solution verses another, but a combination of solutions to achieve the best possible result. This can frequently be seen in the overly narrow emphasis in many projects on hard disk-based solutions, an approach that is heavily promoted in advertising, and one that imprudently neglects the considerable application benefits of optical storage media (as well as those of tape-based solutions). This overly simplistic perspective has caused many professional users, particularly in the field of long-term archiving, to encounter unnecessary technical difficulties and economic consequences. Even a simple energy efficiency analysis would provide many users with helpful insights. Within the ongoing energy debate there is a simple truth: it is one thing to talk about ‘green IT’, but finding and implementing a solution is a completely different matter.
    [Show full text]
  • The Tape Renaissance
    The Tape Renaissance By: Fred Moore President, Horison Information Strategies www.horison.com The magnetic tape data storage industry has withstood numerous challenges from its own past performance, from the HDD industry, and mainly from those who are simply uninformed about the major transformation the tape industry has delivered. Early experience with numerous non-mainframe tape technologies were troublesome and turned many data centers away from using tape in favor of HDDs. Mainframe tape technology was more robust. Many data centers still perceive tape as mired in the world of legacy tape as a result. However, this view is completely out of date. The Legacy Tape Era The tape problems of the past were numerous and resulted in time-consuming reliability and management issues. Edge, stretch, tear, cartridge load problems and crimping were common. The servo tracks were written on the edge of the tape media and dropping a cartridge often meant damage to the servo leaving a non-readable tape. Metal particle (non-oxidized) media life was typically 4-10 years before concerns about re-readability arose. As the issues persisted, the HDD industry took advantage of these concerns and actively pronounced “tape is dead”. The Tape Renaissance Changes the Game The advent of LTO (Linear Tape Open) from the LTO consortium marked the beginning of the tape renaissance. LTO was originally developed in the late 1990s as an open standard alternative to the numerous proprietary magnetic tape formats that were available at the time. Today, Hewlett Packard Enterprise, IBM, and Quantum comprise the LTO Consortium, which directs development and manages licensing and certification of media and mechanism manufacturers.
    [Show full text]
  • The Past, Present and Future of Top Data Center Components Stephen J
    DATA CENTER The past, present and future of top data center components Stephen J. Bigelow A photostory 1 2 3 4 5 6 7 8 9 The time traveler’s guide to data center planning REMEMBER YOUR FIRST the business need, and of server? First virtual course doing more with cluster? With Moore’s Law less overhead and power pushing faster, cheaper demand. and more powerful hard- ware in each product cycle, Look at how far data cen- it’s worth taking a look at ter components have come how far we’ve come and since the first mainframes what’s ahead before tack- coexisted with poodle ling data center planning. skirts and the advent of rock ‘n’ roll, and what to It’s not all about more, expect from the future in more, more -- tomorrow’s servers, mainframes, net- data center will focus on working, storage and more. synchronizing hardware with its application work- Courtesy of Express and load, scaling precisely with Star/Thinkstock 1 2 3 4 5 6 7 8 9 IN JUST A few decades, Every workload imposes servers have gone from unique computing de- Forget the ‘90s -- workloads large, UNIX-based systems mands. to smaller, generic, stan- demand new types of servers dards-based commodity The complex instruction computing platforms. sets of x86 processors will yield to reduced instruc- The types of servers that tion set computing (RISC) rule the data center today processors for workloads wouldn’t recognize early such as Web servers. computing systems. The Reducing the instruction IBM AS/400 Advanced set speeds processor 36 Model 436 exemplified performance while using 1990s server technolo- considerably less energy gies, with one single-chip than commodity servers processor and nearly 18 for the same workload.
    [Show full text]
  • The Future of Data Storage Technologies
    International Technology Research Institute World Technology (WTEC) Division WTEC Panel Report on The Future of Data Storage Technologies Sadik C. Esener (Panel Co-Chair) Mark H. Kryder (Panel Co-Chair) William D. Doyle Marvin Keshner Masud Mansuripur David A. Thompson June 1999 International Technology Research Institute R.D. Shelton, Director Geoffrey M. Holdridge, WTEC Division Director and ITRI Series Editor 4501 North Charles Street Baltimore, Maryland 21210-2699 WTEC Panel on the Future of Data Storage Technologies Sponsored by the National Science Foundation, Defense Advanced Research Projects Agency and National Institute of Standards and Technology of the United States government. Dr. Sadik C. Esener (Co-Chair) Dr. Marvin Keshner Dr. David A. Thompson Prof. of Electrical and Computer Director, Information Storage IBM Fellow Engineering & Material Sciences Laboratory Research Division Dept. of Electrical & Computer Hewlett-Packard Laboratories International Business Machines Engineering 1501 Page Mill Road Corporation University of California, San Diego Palo Alto, CA 94304-1126 Almaden Research Center 9500 Gilman Drive Mail Stop K01/802 La Jolla, CA 92093-0407 Dr. Masud Mansuripur 650 Harry Road Optical Science Center San Jose, CA 95120-6099 Dr. Mark H. Kryder (Co-Chair) University of Arizona Director, Data Storage Systems Center Tucson, AZ 85721 Carnegie Mellon University Roberts Engineering Hall, Rm. 348 Pittsburgh, PA 15213-3890 Dr. William D. Doyle Director, MINT Center University of Alabama Box 870209 Tuscaloosa, AL 35487-0209 INTERNATIONAL TECHNOLOGY RESEARCH INSTITUTE World Technology (WTEC) Division WTEC at Loyola College (previously known as the Japanese Technology Evaluation Center, JTEC) provides assessments of foreign research and development in selected technologies under a cooperative agreement with the National Science Foundation (NSF).
    [Show full text]
  • Implementing IBM Tape in UNIX Systems
    Front cover Implementing IBM Tape in UNIX Systems How to set up tape drives and libraries in multiple UNIX environments New: Ultrium3 and WORM features Integration with popular backup products Charlotte Brooks Alv Jon Hovda Reena Master Abbe Woodcock ibm.com/redbooks International Technical Support Organization Implementing IBM Tape in UNIX Systems October 2005 SG24-6502-03 Note: Before using this information and the product it supports, read the information in “Notices” on page xiii. Fourth Edition (October 2005) This edition applies to IBM TotalStorage 3580 Tape Drive, IBM TotalStorage 3581 Tape Autoloader, IBM TotalStorage 3581 2U Tape Autoloader, IBM TotalStorage 3582 Tape Library, IBM TotalStorage 3583 Tape Library, IBM TotalStorage 3584 Tape Library, and IBM TotalStorage 3592 Tape Drive. © Copyright International Business Machines Corporation 2002, 2003, 2004, 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . ix Notices . xiii Trademarks . xiv Preface . .xv The team that wrote this redbook. .xv Become a published author . xvi Comments welcome. xvii Summary of changes. xix October 2005, Fourth Edition . xix July 2004, Third Edition . xix Part 1. Setting up IBM tape in UNIX. 1 Chapter 1. Introduction to LTO Ultrium with UNIX . 3 1.1 LTO overview . 4 1.1.1 IBM TotalStorage LTO Ultrium models . 5 1.1.2 IBM TotalStorage 3580 Tape Drive. 7 1.1.3 IBM TotalStorage 3581 Tape Autoloader . 9 1.1.4 IBM TotalStorage 3581 2U Tape Autoloader . 10 1.1.5 IBM TotalStorage 3582 Tape Library . 11 1.1.6 IBM TotalStorage 3583 Tape Library .
    [Show full text]
  • Pubtex Output 1999.06.17:0330
    Solstice Backup 5.1 Installation and Release Notes Sun Microsystems, Inc. 901 N. San Anotnio Ro fad Palo Alto, CA 94303–4900 U.S.A. Part No: 805-3794 May 22 1998 Copyright 1998 Sun Microsystems, Inc. 901 San Antonio Road, Palo Alto, California 94303-4900 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, SunSoft, SunDocs, SunExpress, and Solaris are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and SunTM Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who implement OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements.
    [Show full text]
  • Environmental Stability Study and Life Expectancies of Magnetic Media for Use with Ibm 3590 and Quantum Digital Linear Tape Systems
    ARKIVAL TECHNOLOGY CORPORATION ENVIRONMENTAL STABILITY STUDY AND LIFE EXPECTANCIES OF MAGNETIC MEDIA FOR USE WITH IBM 3590 AND QUANTUM DIGITAL LINEAR TAPE SYSTEMS Ronald D. Weiss Arkival Technology Corporation 427 Amherst St. Nashua, NH 03063 Phone: (603) 881-3322 www.ARKIVAL.com 1 ARKIVAL TECHNOLOGY CORPORATION ENVIRONMENTAL STABILITY STUDY AND LIFE EXPECTANCIES OF MAGNETIC MEDIA FOR USE WITH IBM 3590 AND QUANTUM DIGITAL LINEAR TAPE SYSTEMS National Archives and Records Administration #NAMA-01-F-0061 FINAL REPORT PERIOD of WORK: October 2001- June 2002 Federal Supply Service Contract Number: GS 35F 0611L Arkival Technology Corporation 427 Amherst St. Nashua, NH 03063 Phone: (603) 881-3322 www.ARKIVAL.com 2 TABLE of CONTENTS Executive Summary………………………………………………………… 5 1.0 STUDY OVERVIEW…………………………………………………… 7 1.1 Technical Areas of Study 1.2 Study Duration 1.3 Tape Drive Recording Features 1.4 Test Environments 1.5 Data Collection and Analysis 2.0 TECHNICAL STUDIES 2.1 Magnetic & Microstructure Analyses of the Recording Media….. 9 2.1.1 Transmission Electron Microscopy (TEM) Analysis 2.1.2 Vibrating Sample Magnetometer (VSM) Analysis 2.2 VSM/Aging Study…………………………………………………. 14 2.3 Binder Hydrolysis ………………………………………………... 17 2.4 Physical Properties ……………………………………………….. 24 2.4.1 Resistivity 2.4.2 Friction 2.5 RF Amplitude response …………………………………………….28 2.6 Error Study ……………………………………………………….. 31 2.6.1 Catastrophic Tape and Drive Failures 2.7 Life Expectancies (LE) …………………………………………… 38 2.7.1 Magnetic Saturation LE 2.7.2 Error Rate (B*ER) LE Conclusions
    [Show full text]
  • Tape Drive Mounting Hole Dimensions
    3URGXFW6SHFLILFDWLRQ 3URGXFW6SHFLILFDWLRQ 3URGXFW6SHFLILFDWLRQ 7DSH'ULYH7DSH'ULYH '/79 $ DLT-V4 Product Specification, 81-81349-02 A01, November 2005, Made in USA. Quantum Corporation provides this publication “as is” without warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability or fitness for a particular purpose. Quantum Corporation may revise this publication from time to time without notice. COPYRIGHT STATEMENT Copyright 2005 by Quantum Corporation. All rights reserved. Your right to copy this document is limited by copyright law. Making copies or adaptations without prior written authorization of Quantum Corporation is prohibited by law and constitutes a punishable violation of the law. TRADEMARK STATEMENT Quantum, the Quantum logo, DLT, DLTtape, the DLTtape logo, and Super DLTtape logo are all registered trademarks of Quantum Corporation. DLTIce, DLTSage, and Super DLTtape are all trademarks of Quantum Corporation. Other company and product names used in this document are trademarks, registered trademarks, or service marks of their respective owners. Contents Preface ix Chapter 1 Physical Specifications 1 Physical Description ........................................................................................................ 2 Physical Dimensions and Weights ......................................................................... 2 Internal Tape Drive Mounting Hole Dimensions........................................................ 4 Chapter 2 Functional Specifications
    [Show full text]
  • Dec Pdp-11, 1970
    resource sharing: timesharing use of high-speed input/outp RSTSll terminal users may have Examples of the value of the Resource another terminal exclusive use of any peripheral 09 a Sharing concept are: one user may use the punched-card file whi8 timesharing system (except the disk, line printer, card reader, tape and BASIC program he ha% which is a shared device). They may use disk files for performing a "batch" off-line card punch. - it as long as needed, and then return it adrmnistrative data processing task; for assignment to another user. The another terminal user may use a ability to enter, store, and retrieve DECtape unit for retrieving or creating a programs and data files using high-speed tape file intended for off-line storage; peripheral devices makes RSTS-11 a true and when thecard reader is free, yet general-purpose problem-solving system. RSTS for business and administrative problem solving One of the most difficult problems facing Potential On-Line Administrative business today is increasing the Applications include: productivity of costly, hard-to-find clerks and secretaries. RSTS-11's power and Order Entry/Accounts Receivable/ flexibility offer the benefits of reduced Sales Analysis costs, increased customer satisfaction, Inventory Control/Accounts Payable and increased job satisfaction for clerical Data Entry with automatic error workers. checking, editing, and verification Inquiry-Response for "instant" access How RSTSll Benefits Administrative to records. Applications Journals, general ledger, and other account records are stored on-line for RSTSll can be dedicated in quick access from high-speed disk administrative application systems. The storage, thus reducing paper handling.
    [Show full text]