Alternate Site Disaster Recovery

Alternate Site Disaster Recovery
Alternate Site Disaster Recovery
Contributed by Andrew Whitehead

Alternate Site Disaster Recovery Techniques

In considering alternate site disaster recovery, the two main issues are the reconfiguring or rebuilding infrastructure, and moving data between the primary site and the alternate site.

Continuous Availability Disaster Recovery

Continuous availability means real time data replication, and is arguably not really a disaster recovery technique as no recovery is actually made - the data is never lost. This approach relies on continuous data transfer, which can be achieved in several ways.

Alternate Site Disaster Recovery

One way is to use a transaction router, usually a software-based solution that simultaneously routes transactions to both primary and alternate locations. The transaction routing server itself must be secure, and multiple servers are often used. While offering a very high degree of disaster recovery, it is not appropriate in all cases, is proprietary in nature, and does not work well on a large scale.

A storage controller offers disaster recovery by replicating data on a volume-by-volume basis, moving it from a storage array on the primary site to an identical array on the alternate site. Since this is simply data storage, it is suitable for large scale operations and is independent of applications and operating systems. It is a very popular disaster recovery technique, especially used in conjunction with hot servers.

Hot Server Disaster Recovery

Hot standby servers technique focuses on being able recover and reconfigure servers at a

remote site as quickly as possible if any server on the primary site fails. This is called a 'failover' and is usually done automatically. It must be supported by a good data replication technique, so that on restart the necessary data is present. This can be achieved by remote tape vaulting, where duplicates of tapes in the primary location tape library are housed in an automated tape library at a remote site. This has the advantage that no time is lost in locating or transporting tapes.

Warm Server Disaster Recovery

In this system, the servers at the alternate location have operating systems and applications loaded and running and established network connections to the production network, ready to take over from a failed server at the primary site. These servers can be used for non-critical tasks such as backups, application

development, or quality assurance, requiring only minor reconfiguring to switch to production support.

Cold Server Disaster Recovery

Cold server recovery is the most basic method, and involves staff, tapes, etc. moving to a recovery facility to begin the rebuilding process. This is slow, labor intensive and often unsuccessful. Firstly the servers have to be restored from tape, and once that is done data also has to be restored from tape, taking up a tremendous amount of time.

Because of this, cold server recovery can be used with off-site tape warehousing, in which duplicate backup tapes are physically moved to a remote warehouse. Should the tapes be needed, they are taken out of storage and transported to the recovery site. This is obviously a slow process, but as it can be done simultaneously with the staff moving and the servers being restarted it is acceptable.

Andrew Whitehead is a contributor at -- the home of the popular Amazon S3 based online backup service -- Back2zip. This article available at

very      not
Did you find this article helpful? 14 other readers gave it an average usefulness of 68.6%.
Tell us what you think!!

Some Other Contributions by Andrew Whitehead

A Trip into the World of Computer Forensics  »

Computer forensics is the investigation and analysis of a suspects computer, to uncover evidence of a crime. For instance, theft of trade secrets, theft or destruction of intellectual property, or fraud.

Advantages and Problems with Online Backup Systems  »

Having an online backup system will save your day should your premises ever burn down, or the fireproof box containing your backup disks get stolen. The easiest means of backing up online is to set up a leased line to a remote server, and transfer da...

Alternate Site Disaster Recovery  »

In considering alternate site disaster recovery, the two main issues are the reconfiguring or rebuilding infrastructure, and moving data between the primary site and the alternate site.

Backup Software for Larger Systems  »

For a systems administrator, one of his most important roles is backing up, and being able to restore, the organizations data. When he chooses his backup software, to ensure that they meet his requirements he must evaluate the product's backup featur...

Backup Software Functions  »

It's probably true to say that most backup software applications available will do a reasonable job of making a backup. That does not mean that all backup software is created equal, and choosing the one that suits your requirements is worth spending ...

Backup to CD  »

If you have ever wondered about the importance of keeping a backup, imagine how you would feel if a virus destroyed the contents of your hard drive? Or a problem could only be solved by using a system recovery CD, wiping out all your data in the proc...

Basic Data Recovery  »

Have you ever wondered how much data is stored in your PC, and how much time and energy would go into its recovery? Your computer almost certainly contains a lot of personal data - financial data, names, addresses, and telephone numbers, bank account...

Brief Overview of Online Backup  »

Online backup is possibly the most convenient form of backing up files, leaving you with few excuses not to do it. Losing your files is something that is going to happen to you one day, not something that might happen, and if you do not backup your d...

Choosing Backup Media  »

Matching the capacity of the backup medium to the amount of data you intend to backup is very important, especially as hard disks capacities grow. The more disk or tape swaps required to perform a backup, the less likely it is that you will do it rou...

Computer Forensic: Siezing the Evidence  »

The computer forensic experts have to conform with many rules and regulations if the evidence they uncover is to be acceptable to the courts. The first step in obtaining computer forensic evidence is obtaining a search warrant to seize the suspect sy...