Home Add to Favorite Contact Submit  
             21 January, 2020
 

    
Category:  Articles » Computers » Data Recovery

 

Planning a backup and restoration of files for disaster recovery.

Popularity:
         Views: 1638
2006-11-11 22:14:02     
Article by Team uCertify

Planning a backup and restoration of files is the most important step to protect data from accidental loss in the event of data deletion or a hard disk failure. The backup copy can be used to restore lost or damaged data. For taking backups and restoring files, Microsoft has provided a utility called Backup. The Backup utility creates a copy of data on a hard disk of a computer and archives data on another storage media. Any storage media such as removable disks, tapes, and logical drives can be used as a backup storage.

While taking a backup of files, the Backup utility creates a volume shadow copy of the data to create an accurate copy of the contents. It includes any open files or files that are being used by the system. Users can continue to access the system while the Backup utility is running without the risk of losing data.

Volume Shadow Copy

Backup provides a feature of taking a backup of files that are opened by a user or system. This feature is known as volume shadow copy. Volume shadow copy makes a duplicate copy of all files at the start of the backup process. In this way, files that have changed during the backup process are copied correctly. Due to this feature, applications can continue writing data to the volume during a backup operation, and backups can be scheduled at any time without locking out users.

Types of Backups

The Windows Backup utility provides various types of backups. While planning for a backup strategy, it is important to choose an appropriate type or combination of different types of backups. The backup type determines which files are transferred to the destination media.

Each backup type relates to an attribute maintained by every file known as archive (A). The archive attribute is set when a file is created or changed. When an archive attribute is set, it means that the backup of this file has not been taken or it is due.

Note: When it is said that "The file is marked as backup", it means that the archive attribute of the file has been cleared.

Normal Backups

When an administrator chooses to use a normal backup, all selected files and folders are backed up and the archive attribute of all files are cleared. A normal backup does not use the archive attribute to determine which files to back up. A normal backup is used as the first step of any backup plan. It is used with the combination of other backup types for planning a backup strategy of an organization. Normal backups are the most time-consuming and are resource hungry. Restoration from a normal backup is more efficient than other types of backups.

Incremental Backups

An incremental backup backs up files that are created or changed since the last normal or incremental backup. It takes the backup of files of which the archive attribute is set. After taking a backup, it clears the archive attribute of files. An incremental backup is the fastest backup process. Restoring data from an incremental backup requires the last normal backup and all subsequent incremental backups. Incremental backups must be restored in the same order as they were created.

Note: If any media in the incremental backup set is damaged or data becomes corrupt, the data backed up after corruption cannot be restored.

Differential Backups

Differential backup backs up files that are created or changed since the last normal backup. It does not clear the archive attribute of files after taking a backup. The restoration of files from a differential backup is more efficient than an incremental backup.

Copy Backups

A copy backup copies all selected files and folders. It neither uses nor clears the archive attribute of the files. It is generally not a part of a planned scheduled backup.

Daily Backups

A daily backup backs up all selected files and folders that have changed during the day. It backs up data by using the modified date of the files. It neither uses nor clears the archive attribute of the files.

Combining backup types

The easiest backup plan is to take a normal backup every night. A normal backup every night ensures that the data is restored from a single job the next day. Although the restoration of data from a normal backup is easy, taking a backup is time consuming. Hence, an administrator is required to make an optimal backup plan. An administrator must consider the following points before creating a backup plan:

· The time involved in taking the backup.
· The size of the backup job.
· The time required to restore a system in the
event of a system failure.

The most common solutions for the needs of different organizations include the combination of normal, differential, and incremental backups.

Combination of Normal and Differential Backups

An administrator can use a combination of a normal backup and a differential backup to save time in taking a backup as well as for a restoration of data. In this plan, a normal backup can be taken on Sunday, and differential backups can be taken on Monday through Friday every night. If data becomes corrupt at any time, only a normal and last differential backup are required to be restored. Although this combination is easier and takes lesser time for restoration, it takes more time to take backup if data changes frequently.

Combination of Normal and Incremental Backups

A combination of normal and incremental backups can be used to save more time for taking backups. In this plan, a normal backup is taken on Sunday and incremental backups on Monday through Friday every night. If data becomes corrupt at any time, a normal and all incremental backups till date are required to be restored.

Backing up a System State Data

System State Data

System State data contains critical elements of the Windows 2000 and Windows Server 2003 operating systems. Following are the files included in the System State data:

· Boot files, including the system files and all
files protected by Windows File Protection (WFP)
· Active Directory (on domain controller only)
· SYSVOL (on domain controller only)
· Certificate Services (on certification authority only)
· Cluster database (on cluster node only)
· Registry
· IIS metabase
· Performance counter configuration information
· Component Services Class registration database

For backing up the System State of a computer, the System State node is included as a part of the backup selection in the Backup utility.


Note: On domain controllers, System State can be restored only by restarting the domain controller in Directory Services Restore Mode. NTDSUTIL is used to recover deleted objects in Active Directory.

System Recovery

In the event of a system failure, the recovery of the system is difficult and tedious for administrators. Recovery involves reinstallation of the operating system, mounting and cataloging the backup tape, and then performing the full restore. To make this process easier, Windows provides a feature called Automated System Recovery (ASR). ASR is used to perform a restore of the System State data and services in the event of a major system failure. An ASR restore includes the configuration information for devices. ASR backs up the system data and local system partition.

How to create an ASR set?

Take the following steps to create an Automated System Recovery (ASR) set by using the Backup or Restore Wizard:

1. Run Backup from Start Menu > Programs >
Accessories > System Tools > Backup.
2. In the welcome screen of the Backup or Restore
Wizard, click the Advanced Mode link.
3. On the welcome page of the Advanced Mode of
the Backup utility, choose the ASR Wizard
option from the Tools menu.
4. In the welcome screen of the ASR Wizard, click
the Next button.
5. On the Backup Destination page, specify the
location of the backup, and click the Next
button.
6. Click the Finish button.

Note: An ASR backup does not include folders and files.

Best practices for Backup

According to Microsoft, administrators should take the following steps to ensure the recovery in case of a system failure:

· Develop backup and restore strategies and test
them.
· Train appropriate personnel.
· In a high-security network, ensure that only
administrators are able to restore files.
· Back up all data on the system and boot volumes
and the System State.
· Back up the data on all volumes and the System
State data at the same time.
· Create an Automated System Recovery backup set.
· Create a backup log.
· Keep at least three copies of the media. Keep
at least one copy off-site in a properly
controlled environment.
· Perform trial restorations.
· Secure devices and media.
· Do not disable the default volume shadow copy
backup method and revert to the pre-Windows
Server 2003 backup method.
· Back up your server cluster effectively.
· Back up the cluster disks from each node.

About the Author:

uCertify was formed in 1996 with an aim to offer high quality educational training software and services in the field of information technology to its customers. uCertify provides exam preparation solutions for the certification exams of Microsoft, CIW, CompTIA, Oracle, Sun and other leading IT vendors. To know more about uCertify, please visit http://www.ucertify.com/

Specialized in: Data Recovery - Restoration - Disaster Recovery
URL: http://www.ucertify.com
Print article      Bookmark this page
Related Articles 
Repair the Damaged MS Word Document (Popularity: ): Home users, professionals, editors, and writers for their day-to-day tasks use Microsoft Word. The documents created in Word are saved in .doc format or in .docx format depending on the version of Word you use. If you use Word 97, 98, 2000, 2002, or 2003 then the document name will be followed by .doc extension. But, in case Word 2007 is used then the document gets saved in .docx (XML) ...
Need of migrating from Notes to Outlook (Popularity: ): IBM Lotus Notes is developed with a wide array of services that includes arrangement of business emails, contacts, listing and calendars etc. Owing to its varied services and advantages, it is termed as the integrated desktop client. Usually, all organizations employ an appropriate email system to avoid flaws in communication due to slow-executing email systems. There are a large number of organizations preferring Lotus Notes as its email clients since ...
Email - The Holster of the Smoking Gun (Popularity: ): When it comes to understanding the policies by which a business truly operates, it is not necessarily from those documented in formally prepared Word documents or PDFs posted on the company Intranet. In fact, it is the informal messages between staff in emails that override these formal guidelines that dictate and document behaviour and policy. Emails provide an "audit" trail of the thinking, morals and practices that employees follow on ...
How To Take Care Of Your Computer Hard Drive To Prevent A Crash (Popularity: ): The computer has become one of the most important tools in our daily lives. In fact, there are so many people all over the globe who simply can't live without this technology. These people usually work and communicate through their compute that when their personal computer would malfunction, it would seem like the world have caved in on them.Technically, all computer hard drives would eventually fail us. These are just ...
Huge Landslide Destroys Ski Resort (Popularity: ): On July 30, 1997 a huge landslide rolled over the Thredbo Ski village in Australia causing massive damage and virtually burying the resort; cars, buildings, people and all! The loose earth, rock, and foliage swept down the slope and crashed into the Bimbadeen Lodge, a multi-level building, used to house guests. Eighteen people died as a direct result of the landslide, most were buried alive.The landslide brought one thousand tones ...


Related Business 
MS Backup Recovery Software (Popularity: ): BKF recovery software is reckoned to repair BKF file flawlessly as it supports MS Backup recovery from backup files created using Backup Exec by VERITAS software under Windows, Novell and Macintosh. This bkf file repair software has the ability to quickly search and locate BKF Files. This MS backup recovery software lets you scan corrupt MS Backup files meticulously so that you can recover as much as you can.
Backup Systems (Popularity: ): Backup Systems develop and manage disaster recovery solutions for the SME and Enterprise markets. Founded in 2005 and headquartered in London, Backup Systems focus exclusively on backup and data archiving. We have petabytes of data under management, both in the cloud and with our unique cross-site disaster recovery solution. When you work with us, you are not dealing with a reseller, or vendor re-badging a third party product, we are ...
Windows Backup Recovery Tool (Popularity: ): SysTools advance backup recovery solution to recover and restore valuable data from corrupted Backup files. Software supports to recover and repair backup file created with Backup Exec by VERITAS software, under Windows 95/98/ME/NT/2K/XP/2003/Vista/7 backup utilities, Novell, Macintosh operating systems. Our software is User friendly with unique features which provides the complete recovery from heavily corrupted backup files.
Backup Disaster Recovery (Popularity: ): Information for wilderness and urban preppers during uncertain times. Everything related to being prepared as an individual or as a community. We also carry survival kits, emergency preparedness items, long term food storage. After an apocalypse or major disaster, it is unlikely that emergency response services will be able to immediately respond to everyone’s needs, so it’s important to have a backup disaster recovery plan to take care of yourself ...
Extract BKF (Popularity: ): Extract BKF files with reliable MS BKF repair tool. MS bkf recovery is excellent BKF extractor software to extract bkf files created using NTbackup .exe or Windows Backup Utility. Easily repair ms backup files with MS BKF Recovery tool.Do you know that you can recover your data from your backup files which you have lost due to disk failure, Trojan attacks, or some kind of sudden system shutdown problem? Yes ...
The Disaster Recovery Planning Guide (Popularity: ): This disaster recovery planning portal is intended to be a launch pad for those seeking help with the business continuity planning process.
XOsoft Backup and Recovery Solution (Popularity: ): Provider of high availability and disaster recovery solutions, has developed the WANSync product suite to provide real-time replication and synchronization of files, applications and databases over WAN.
Kustom Disaster Recovery Restoration and Construction (Popularity: ): Kustom is a general contractor specializing in disaster recovery construction and restoration for fire, floods, mold remediation, defective Chinese Drywall remediation and replacement.
System Backup and Disaster Recovery for Linux and AIX (Popularity: ): Backup management and system recovery software for Linux and AIX systems. Provides complete backup management and the most simple and flexible system installation and recovery product available.
K&S Systems (Popularity: ): K&S Systems specializes in enterprise systems administration, network integration, backup and recovery solutions, storage management, and disaster recovery planning.