0% found this document useful (0 votes)
4 views8 pages

Unit - 4 Storage Technologies

The document outlines various backup targets and methods, including full, incremental, and differential backups, as well as the 3-2-1 backup strategy. It discusses cloud-based backup for mobile devices, data archiving, replication for increased availability and performance, data migration, and Disaster Recovery as a Service. Each section highlights the importance of data protection, accessibility, and cost-effectiveness in modern storage solutions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views8 pages

Unit - 4 Storage Technologies

The document outlines various backup targets and methods, including full, incremental, and differential backups, as well as the 3-2-1 backup strategy. It discusses cloud-based backup for mobile devices, data archiving, replication for increased availability and performance, data migration, and Disaster Recovery as a Service. Each section highlights the importance of data protection, accessibility, and cost-effectiveness in modern storage solutions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Backup Targets and Methods

• Backup targets refer to where backups are stored, while


backup methods describe how data is copied. Common
backup methods include full, incremental, and
differential backups. Backup targets can be local (on-
premises), cloud-based, or a combination of both.
Backup Methods

• Full Backup: Copies all data to a new location,


providing a complete snapshot.
• Incremental Backup: Copies only the changes made
since the last backup
• Differential Backup: Copies only the changes made
since the last full backup.
• 3-2-1 Backup Strategy: A common approach
involving three copies of data, two on different storage
types, and one offsite.
Cloud Based and Mobile device Backup

• Cloud-based backup for mobile devices involves using


the internet to store copies of your device's data on
remote servers, offering a reliable and accessible way to
protect your information. This method provides benefits
like disaster recovery, data security, cost-effectiveness,
and space savings compared to traditional backup
methods.
Data Archive
• Data archiving in storage technologies involves moving
infrequently accessed data from primary storage to
dedicated, long-term storage for retention and
retrieval. Archives can be stored on low-cost devices
like hard disk drives, tape, or optical storage, which are
generally slower than primary storage.
Uses of Replication
• Increased Availability: Multiple copies of data in
different locations ensure data remains accessible even
if one location experiences a failure.
• Improved Performance: Accessing data from closer
locations reduces
network latency and speeds up query execution.
• Fault Tolerance: Redundant copies of data at different
locations
ensure data remains available even in the event of
hardware or
network failures.
• Improved Analytics: Replicating data from production
databases to
data warehouses allows for better business intelligence
and
analytics.
Characteristics of Replication
• Redundancy:
Replication involves creating multiple copies of data or
information.

• Consistency:
Replication ensures that all copies of the replicated data
are
consistent, reflecting the latest changes.
Data Migration

• Data migration in storage technology


involves transferring data from one storage system or
location to another, potentially involving different
formats or applications. This process can be triggered
by various reasons, such as upgrading storage
equipment, consolidating data centers, or migrating to a
cloud environment.
Disaster Recovery as a Service

• Disaster Recovery as a Service is a cloud-based solution


that allows businesses to replicate their data and IT
infrastructure to a third-party provider's infrastructure,
enabling rapid recovery in the event of a disaster. This
approach eliminates the need for companies to manage
their own secondary disaster recovery sites, offering a
cost-effective and efficient way to ensure business
continuity

You might also like