expand for answer

Fault Tolerance

Builtin capability of a system to provide continued correct execution in the presence of a limited number of hardware or software faults. The ability of a system to suffer a fault but continue to operate. Fault tolerance is achieved by adding redundant components such as additional disks within a redundant array of independent disks (RAID) or additional servers within a failover clustered configuration.


Similar items:
Instead of using one large disk to store data, one can use many smaller disks (because they are cheaper). See disk mirroring and duplexing. An approach to using many lowcost drives as a group to improve performance, yet also provides a degree of redundancy that makes the chance of data loss remote.
[view]
Mirror image backups (also referred to as bitstream backups) involve the backup of all areas of a computer hard disk drive or another type of storage media (e. g. , Zip disks, floppy disks, Jazz disks, etc. ). Such mirror image backups exactly replicate all sectors on a given storage device. Thus, all files and ambient data storage areas are copied. Such backups are sometimes referred to as “evidencegrade” backups and they differ substantially from standard file backups and network server backups. The making of a mirror image backup is simple in theory, but the accuracy of the backup must meet evidence standards. Accuracy is essential and to guarantee accuracy, mirror image backup programs typically rely on mathematical CRC computations in the validation process. These mathematical validation processes compare the original source data with the restored data. When computer evidence is involved, accuracy is extremely important, and the making of a mirror image backup is typically described as the preservation of the “electronic crime scene. ”
[view]
A fault-tolerant deployment option that provides for various server options in the event of a disaster, such as mirroring, electronic vaulting, remote journaling, database shadowing, and clustering.
[view]
The combination of hardware, software, and controls that form a trusted base that enforces your security policy. The totality of protection mechanisms within a computer system, including hardware, software, and communications equipment, the combination of which is responsible for enforcing a security policy. A TCB consists of one or more components that together enforce a unified security policy over a product or system. The ability of a trusted computing base to correctly enforce a security policy depends solely on the mechanisms within the TCB and on the correct input by system administrative personnel of parameters (such as a user’s clearance) related to the security policy. Totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination responsible for enforcing a security policy.
[view]
Redirecting workload or traffic to a backup system when the primary system fails.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in