Group 3 Tsui Ho Man, Man 10020225 Zhangyuyao, Claire11051493 Chiu Chun Kit, Toby11002565.

41
Disaster Recovery of web hosting Group 3 Tsui Ho Man, Man 10020225 Zhangyuyao, Claire 11051493 Chiu Chun Kit, Toby 11002565

Transcript of Group 3 Tsui Ho Man, Man 10020225 Zhangyuyao, Claire11051493 Chiu Chun Kit, Toby11002565.

Disaster Recovery of web hostingGroup 3

Tsui Ho Man, Man 10020225Zhangyuyao, Claire 11051493Chiu Chun Kit, Toby 11002565

I want to start my own business after this president term !

So I need server service…. Where to find it????

XXXX ! There are so many advertisements , so sad.

What is data center ?

is a facility used to house computer systems and associated components, such as telecommunications and storage systems.

Free hosting

Shared(virtual) hosting

Collocated Hosting

Dedicated Hosting

Type of Hosting service

Free Hosting

Shared (Virtual) Hosting

Dedicated Hosting

Collocated Hosting

Unlimited Physical limitation

Free hosting

Shared(virtual) hosting

Collocated Hosting

Dedicated Hosting

Virtual private server (Vps) Hosting

to host a private server, one of many virtual machines running on a single computer

Benefit• As the provider:-High turnover rate rate -High return-Low investment cost

• As the clients-Lower cost-Adapt to different system and software-Own domain name and i.p. -sufficient support service

Disadvantage • As the provider:-Difficult to manage-Low security

• As the clients:-restricted traffic volume-affect by other users-not have the full right-limited topic

Dedicated hosting service

a type of Internet hosting in which the client leases an entire server not shared with anyone else.

Benefit• As the provider:-no need to provide the management, upgrade , security service

• As the clients-no need to share server with other users-have full control -more domain name and i.p.

Disadvantage• As the provider:-Low security-Low return rate

• As the clients:-high management cost-Software upgrade problem-Limited topic

Risk

DOS

Data

Loss

Hacki

ng Disaster

Political

restrict

Price

Low speed

Security Privacy

Denial-of-service attack DOS• Consumption of computational resources• Disruption of configuration information• Disruption of physical network components

make a machine or network resource unavailable to its intended users

Type of accidents and disaster• Disaster recovery (DR) is the process, policies

and procedures that are related to preparing for recovery or continuation of technology infrastructure which are vital to an organization after a 

• Natural or • Human-induced disaster

Natural Disaster• A natural disaster is a major adverse event

resulting from natural processes of the Earth; examples include floods, volcanic eruptions, earthquakes, tsunamis, and other geologic processes.

Human-induced disaster

• an element of human intent, negligence, or error; or involving a failure of a human-made system.

• It results in huge loss of life and property. It further affects a person's mental, physical and social well-being.

e.g. Crime, Hacking, Arson, Civil disorder, Terrorism, War, unfix of plug…

Why we need Disaster Recovery?

• If company host their web by themselves, any disaster occur, such as flooding, fire and etc.

• Servers kept in the office maybe damaged or out of control.• The web will down • The business will stop until the server has fixed• The data store inside may lost• The reputation will lost from clients

Disaster Recovery Solution• Disaster recovery is a subset of business

continuity

• While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events,

• disaster recovery focuses on the IT or technology systems that support business functions.

High Availability• Users want their systems to be ready to serve them

at all times. 

• Availability refers to the ability of the user community • to access the system• to submit new work, update or alter existing work, • collect the results of previous work.

• If a user cannot access the system, it is said to be unavailable. Generally, the term downtime is used to refer to periods when a system is unavailable.

High Availability• Maintain the availability of IT assets and data as

well as the ongoing business operation with real time replication of data to active and

• stand-by servers in the data center. When a system goes down

Recovery time: within an hour

1 Hour

High Availability• Backup servers will be prepared for web content

and database application

• High Availability solution captures changes to data and applications in real time and replicate to standby servers, which enables controlled, non-intrusive switching and fast, reliable failover to meet any contingency.

High Availability + Disaster Recovery Solution • By synchronizing the database to alternative

servers in different data center, your critical business information will be safeguarded.

What functions may provide by the service providers• Secure protection of your critical business systems and

data with secure transportation of data to offsite location

• Rapid recovery solution by leveraging WAN for high performance data replication

• Optimized WAN traffic by replicating only modified content

• Outages are identified and diagnose root problems for quicker recovery

• Servers are protected by NCSA Labs certified firewalls and monitored 24×7

Why Hong Kong became the prime location of data centre

Hong Kong is an international

FinancialTradinglogistics

hub and home to many regional offices and headquarters ofglobal corporations.

Why Hong Kong became the prime location of data centre

Robust Telecommunications Infrastructure;

Reliable Power Supply with Comparatively Low Tariff;

Pro-business Environment;Proximity to the Mainland of China;Free Flow of Information;Effective Protection of Data Privacy

and Information Security;Tech-savvy Professionals.

Robust Telecommunications Infrastructure

Hong Kong's telecommunications infrastructure is one of the world's most sophisticated and advancedwide range of innovative services available at low

cost; fully liberalised regime brings a vibrant market of

Internet transit, exchange, hosting and content providers;

high speed fibre connectivity is available to data centres throughout the territory with ample choices of providers.

(As at November 2012, there were 186 Internet service providers licensed to provide broadband services. Our household broadband penetration rate of 87% and mobile penetration rate of over 223% are among the highest in the world.)

Reliable Power Supply with Comparatively Low TariffHighly stable, with reliability .

two power companies use various fuels for power generation with extra capacity and robustness of supply, as well as emergency support to each other during generator failure.

Continues to enjoy a relatively low electricity tariff in comparison with other cities in the Asia Pacific Region.

Power supply meets the Uptime Institute Data Centre Site Infrastructure Tier Standard and TIA Telecommunications Infrastructure Standard for Data Centres (TIA-942).

Reliable Power Supply with Comparatively Low Tariff

Pro-business EnvironmentHong Kong is one of the world’s freest economies, characterised by free trade, a free market system, free flow of capital, simple and predictable tax regime and low tax rate.

Proximity to the Mainland of China

Twelfth Five-Year Plan (12-5 Plan)

The Mainland is a significant market as well as a provider of

information and communications technology (ICT) products and

services.

With our proximity to the Mainland of China, Hong Kong

is an ideal location for businesses to seize the

growing demand for secure data centre services both in

Hong Kong and China.

Free Flow of InformationHong Kong enjoys free flow of information. There is no law or administrative arrangement allowing the Government to interfere with data centre operations or exercise content censorship.

Effective Protection of Data Privacy

Effective data protection provides a conducive and trustworthy environment for

regional data centres. In Hong Kong the Personal Data (Privacy)

Ordinance, which has been in force since 1996, provides the legislative framework for the protection of personal data in terms of collection, use and transfer.

Changed in recent days.

Tech-savvy Professionals large pool of mobile, agile, skilled and multi-

lingual professionals. local immigration policies.