Current location - Trademark Inquiry Complete Network - Futures platform - Ask for details of hot backup technology! ! !
Ask for details of hot backup technology! ! !
1. Background of enterprise database hot backup solution

With the rapid development of electronic process and the wide application of information technology, data has increasingly become an indispensable part of the daily operation of enterprises and institutions, and has become the basis for leaders to make decisions. However, the use of computers sometimes brings people trouble, that is, computer data is very easy to be lost and destroyed. According to the research data of a professional organization, the loss of 300MB data means that the marketing department loses 1.3 million yuan, the finance department loses 1.6 million yuan, and the engineering department loses 800,000 yuan. If the lost key data is not recovered within 15 days, the enterprise may be eliminated. With the computer system becoming an indispensable data carrier for enterprises, how to use data backup to ensure data security has become an urgent subject for us to study.

Data corruption may be caused by human factors or various unpredictable factors, mainly including the following aspects:

(1) Computer hardware failure. A computer is a machine, and its hardware is the foundation of the whole system. Due to improper use or poor quality of computer products, aging accessories and other reasons, computer hardware may be damaged and can not be used. For example, the track of the hard disk is damaged.

(2) Instability of computer software system. Due to improper use by users or unstable system reliability, the computer software system may be paralyzed and unusable.

(3) Misoperation. This is a man-made accident and cannot be completely avoided. For example, when you use the DELETE statement, you accidentally delete useful data.

(4) destructive viruses. Virus is a very important reason why the system may be destroyed. With the development of information technology, various viruses are also rampant. At present, viruses can destroy not only software systems, but also computer hardware systems. For example, the current popular CIH virus, which attacks on 26th every month, is a typical virus that destroys computer hardware system.

(5) Natural disasters, such as fire, flood and earthquake. This is one reason why manpower is almost irresistible.

Perhaps some people can't imagine that a small computer room fire may lead to the collapse of all information systems of a multinational enterprise. Purchasing data of dozens of production centers around the world, orders of tens of thousands of suppliers and distributors, inventory information of billions of yuan, and annual work plans of hundreds of thousands of employees may all disappear in one minute. Therefore, in the past, data security systems used only by financial data-intensive enterprises such as banks and telecom operators have increasingly become preventive measures that all kinds of enterprises have to take in advance.

At present, more and more attention is paid to computer security technology in the world, and people's security awareness is getting stronger and stronger, which is reflected in the development of computer security technology from individual special industries to all walks of life; It is an irreversible trend from attaching importance to computer equipment to attaching importance to the security of core data. The computer application of enterprises has been very extensive, and it has penetrated into all aspects of enterprise management. The data of general manager inquiry system, financial management, personnel management, invoicing logistics management and other subsystems are all stored in the server database, which requires very high real-time performance. Therefore, it is particularly necessary and urgent to back up the server and database in real time. There are many hardware backup schemes for servers, which are quite mature. There are several database hot backup softwares abroad, but they have just started in China. In this context, the "Yongsi Hot Backup" database hot backup software has been successfully put into the market after more than one year of development and testing. This software fills the gap of domestic products and has incomparable advantages compared with similar products abroad. On this basis, combined with the business characteristics of the enterprise and the data processing characteristics of the enterprise management system, Yongsi Technology launched a hot backup solution for the enterprise database, which quickly entered the application and stood the test of practice.

2. The general business process of the enterprise

It can be seen that the business process of an enterprise is very complicated and there are many links, so the database of the enterprise management system changes frequently.

3. Data processing of enterprise management system

At present, the financial management system basically adopts the front-end and back-end processing mode. Background database generally adopts MS-SQL, ORACLE, SYBASE, etc. Personnel management, financial management, logistics management and other data are put in the background database, and the background database is added or modified for each business process. They are all very frequent, and because of the particularity of enterprise data, once the core database has problems, it will bring immeasurable losses to the enterprise. Therefore, how to ensure the security of the core database is an important problem that every enterprise urgently needs to solve.

4. Defects of current enterprise database backup mode.

At present, the backup of enterprise database mainly has the following three levels:

(1) scheduled replication

The database server stores all the data, periodically copies the database to the hard disk of a machine, and if there is any problem with the server database, copies the backup database back to overwrite the server database. This is the lowest level of backup. The problem it can't solve is:

▲ The server crashes or there is something wrong with the operating system.

▲ The real-time data in the replication interval cannot be recovered.

▲ If the database or table is damaged, the backed-up database or table will inevitably be damaged.

▲ When making a backup, all workstations can't use the database, and the work is interrupted.

(2) Server dual-machine backup

The two servers adopt the same configuration, install the same operating system and database system, and regularly back up the database on the master server to the slave server, so that the slave server can take the place of work when the master server fails to work normally. The problems that this backup method can't solve are:

▲ The real-time data in the replication interval cannot be recovered.

▲ The database or table is damaged, and the backed-up database may be damaged.

▲ The cost is high. Purchase the same additional server as the main server.

▲ When making a backup, all workstations can't use the database, and the work is interrupted.

(3) Server hot backup.

The two servers use the same configuration, install the same operating system and database system, and use some backup software to back up the data of the master server to the slave server in real time. Its advantage is that when the master server can't run normally, the slave server can take over the work. But it also has defects:

▲ The cost is high. Purchase the same additional server as the main server.

▲ If the database or table is damaged, the backed-up database is bound to be damaged.

5. The necessity and importance of hot backup

From the comparison of various backup methods, it can be seen that if the existing problems of hot backup are solved, this improved hot backup will be the safest, most effective and most reliable backup method.

If there is a problem in the core database of an enterprise, it will affect all aspects of work, and the loss of the enterprise is very huge, and the impact is immeasurable. In this way, how much pressure do business leaders have to bear? What pressure should computer technicians face? Because of the importance, particularity and real-time performance of enterprise database, it is the most wise choice to choose the safest and reliable database backup scheme.

6. Composition and working principle of "Yongsi Hot Backup" enterprise database hot backup scheme;

In the hot backup scheme of Yongsi technology database, the hot backup software of Yongsi technology DataReal database is the core. In addition, you need to buy a PC as a slave station for database hot backup. The main station of hot backup software for DataReal database of Yongsi Technology runs on the main database server, and the slave station software runs on the backup PC.

(1) topology:

(2) Working principle:

● When the software starts, first make a complete backup of the main database. If there is any change in the master database, the software will be immediately backed up to the slave station to ensure real-time data synchronization.

Using message mechanism, the software only backs up the database and its tables when they are added, modified or deleted, and does not back up the query operation, thus ensuring the efficiency of backup.

● With file backup, the changes of the master database are stored in the files of the slave station, not directly in the database.

● When the master server or master database can't work normally, the slave station can recover the data and take over the work; If the master database or its table is damaged, the slave station will automatically detect the database and prompt the number of steps that need to be rolled back to ensure the integrity of the database. After the operator confirms, the system restores the data, and the database has 1 G, so it only takes 2-3 minutes to publish. After the replacement of the main server is completed, the work of finance, personnel, logistics, business and other departments will be carried out immediately, and the affected time is very short.

7. The characteristics and advancement of Yongsi Hot Spare Enterprise Edition

1) Backup based on database level and file level.

2) The target database is available during backup.

3) There is a database rollback mechanism, which can be rolled back step by step or by time.

4) High speed and strong real-time performance.

5) The backup is safe and reliable. If the main database file is damaged by virus or disk, the backup database can be restored to the data before the damage.

6) It has nothing to do with the structure of the table in the database, and there is no restriction.

7) Don't make any modification to the application in the database.

8) Low requirements for standby lines.

9) There is no pressure on the main server, and the system adopts the message mechanism, which only starts when the database changes, and only transmits the changed part of the database, which is different from file preparation and data table polling.

10) Complete database backup: such as tables (tables), graphs (graphs), views (views), stored procedures (stored procedures), users (users), roles (roles), rules (rules), default values (defaults) and user-defined.

1 1) adopts a unique encryption method to effectively ensure the security of enterprise data.

12) The slave station can take over the IP and machine name of the master station and the work of the master server.

9. Summary

With its strong technical advantages, the database hot backup software "Yongsi Hot Backup" successfully entered the Hong Kong market after defeating similar foreign software in the devil test for more than a month. "Yongsi Hot Backup" database hot backup software is a set of professional software, which is at the leading level among similar products in the world. Based on this software, the hot backup solution of Yongsi technology enterprise database can effectively prevent risks, ensure the security of enterprise database, and the cost is low. After adopting this scheme, enterprise leaders, financial personnel and business personnel can work with greater confidence, serve the society and achieve better economic and social benefits.