When operating relevant IT systems and handling critical data sets, in­ten­tion­al re­dun­dan­cy should be an integral part of danger pre­ven­tion and data pro­tec­tion. Systems are redundant when the same technical com­po­nents and data sets are available several times in parallel, pro­tect­ing against loss and failure. Re­dun­dan­cy does not only have ad­van­tages in terms of storage capacity and IT equipment, however.

My­De­fend­er
Easy cyber security
  • Regular virus and malware scans
  • Automatic backups and simple file recovery

The meaning of redundant

The noun “re­dun­dan­cy” or the adjective “redundant” and its meaning go back to the Latin “redundare”. It is composed of “re” for “back” and “unda” for “wave”, and it denotes something that exists in abundance, i.e., also something that exists multiple times and in excess. While “redundant” is barely found in everyday language, so-called re­dun­dan­cy plays a far greater role in computer science.

What does re­dun­dan­cy mean in computer science?

When we talk about re­dun­dan­cy in IT, we are talking about data center security and system avail­abil­i­ty. It refers to data and system com­po­nents that are numerous, parallel, du­pli­cat­ed or mirrored and are thus available in abundance. Depending on the context, this can have both positive and negative con­no­ta­tions in IT. Re­dun­dan­cy in the positive sense stands for system-critical data sets that exist multiple times or are dis­trib­uted across multiple servers. Re­dun­dan­cy, when neg­a­tive­ly connoted, is found in the form of un­in­ten­tion­al data du­pli­cates that occupy storage space.

First, then, a dis­tinc­tion must be made between un­in­tend­ed and intended re­dun­dan­cy:

Un­in­tend­ed re­dun­dan­cy

Ac­ci­den­tal or un­in­ten­tion­al re­dun­dan­cy in an or­ga­ni­za­tion’s systems or data centers is found in the form of multiple data sets stored in one site or dis­trib­uted across multiple sites. Data du­pli­ca­tion makes main­tain­ing records more com­pli­cat­ed and leads to data anomalies. In­con­sis­ten­cies are the result as it is not clear which data should be accessed or which records are current. In addition, un­in­ten­tion­al re­dun­dan­cies occupy important storage space and consume energy un­nec­es­sar­i­ly. This is prevented by nor­mal­iza­tion of databases.

Intended re­dun­dan­cy

Intended re­dun­dan­cy means the planned, repeated design of technical com­po­nents to secure a server, strength­en supply paths and protect system/company-critical data. A dis­tinc­tion can be made between the following concepts in re­dun­dan­cy:

  • Func­tion­al re­dun­dan­cy: Multiple and/or parallel technical system com­po­nents mostly within one plant.
  • Geo­re­dun­dan­cy: Locally separated, multiple data centers or data sets.
  • Data re­dun­dan­cy: Multiple backed up, mirrored or parallel data sets

If hardware damage, system failures or cy­ber­at­tacks occur, companies can protect them­selves against data loss and the failure of business-critical processes through re­dun­dan­cy. Data is stored multiple times, and con­sis­tent­ly in different locations, while important com­po­nents such as supply routes for energy and air con­di­tion­ing are at least du­pli­cat­ed.

Depending on the com­po­nents installed, a dis­tinc­tion is made between:

  • Ho­mo­ge­neous re­dun­dan­cy: Repeated design of com­po­nents that are identical in terms of man­u­fac­tur­er tech­nol­o­gy. The dis­ad­van­tage of this is that the sim­i­lar­i­ty of the com­po­nents means that the risk of an overall failure due to man­u­fac­tur­er errors or attacks directed at the man­u­fac­tur­er remains high.
  • Diverse re­dun­dan­cy: Repeated design of com­po­nents that differ by man­u­fac­tur­er, function, and type, making general system failures, uniform wear, and man­u­fac­tur­er-related failures less likely.
Note

The opposite of intended re­dun­dan­cy is called Single Point of Failure (SPoF) and means simply existing com­po­nents, e.g., simple supply paths, simple RAID func­tion­al­i­ty or only one server. Thus, in the event of a failure, there are no backup systems and redundant com­po­nents cannot maintain system op­er­a­tions.

Redundant com­po­nents in computer science

Re­dun­dan­cy as a criterion for system prop­er­ties and system security exists in the following forms:

  • Redundant technical com­po­nents: System com­po­nents of computers and networks, such as air con­di­tion­ing, supply lines and servers, which take over the tasks of failed systems and com­po­nents through multiple design or serve as a backup; this applies both to technical com­po­nents within a system and to entire data centers that are available multiple times at different locations through geo-re­dun­dan­cy.
  • Redundant in­for­ma­tion: Su­per­flu­ous, un­nec­es­sary, obsolete, or duplicate records that are not relevant to the system and usually occupy storage space un­in­ten­tion­al­ly.
  • Redundant data: Repeated, mirrored, or dis­trib­uted data sets across multiple sites and servers that prevent complete data loss in the event of failure or damage through RAID ca­pa­bil­i­ties, backups, vir­tu­al­iza­tion, or mirroring; serve as backup or disaster recovery; or provide faster access at a distance.
  • Redundant bits: Added as extra bits during data transfers to prevent data loss during the transfer.

Func­tion­al­i­ty of redundant servers

If it is important for companies to be able to access their servers without in­ter­rup­tion, they will implement a computer network. This consists of redundant servers made of cluster systems with several nodes. In a network, each as­so­ci­at­ed computer has equal access to existing databases and can take over access functions to critical data and ap­pli­ca­tions for failed servers in the event of an emergency. To this end, a fail-safe is almost entirely guar­an­teed. Op­er­a­tional upkeep, launching without physical hard disks using network storage, and the re­place­ment of faulty servers can all be achieved without in­ter­rupt­ing business processes thanks to dis­trib­uted computer ca­pac­i­ties.

Depending on the concept, redundant servers can be divided into two modes:

  • Active/active cluster (symmetric): In the context of active/active clusters, servers operate in live mode as cluster nodes in which multiple computers work in parallel with dis­trib­uted power or in­de­pen­dent­ly of each other. In the event of a failure, the computing capacity is dis­trib­uted to other servers in the network.
  • Active/passive cluster (asym­met­ric): Active/passive clusters are called failover clusters and stand for the presence of redundant servers or network services that are in standby mode as a backup system and, by way of a switch-over, assume the functions of the main system in the event of a one-sided failure. This is automated by cluster manager/load balancer software. This also enables op­er­a­tional main­te­nance without any loss in per­for­mance.

How is re­dun­dan­cy im­ple­ment­ed in IT?

To implement re­dun­dan­cy in network systems and computing fa­cil­i­ties, there are various forms and concepts:

RAID

RAID stands for “Redundant Array of In­de­pen­dent Disks” and refers to various physical storage devices (RAID arrays) that are joined together to form a partition. In this way, the con­sis­ten­cy and integrity of data sets is main­tained even where an error occurs, and com­po­nents can be exchanged without loss. This is done, among other things, by mirroring hard disks or by using parities with dis­trib­uted data in the array. However, RAID systems should always be used in con­junc­tion with an in­de­pen­dent backup of all critical data.

Cluster

As already shown with the example of active/active or active/passive clusters, a computer network as a high-avail­abil­i­ty or load-balancing cluster offers greater avail­abil­i­ty, load dis­tri­b­u­tion and fail-safety through elim­i­nat­ed single points of failure and con­tin­u­ous processes.

Geo­re­dun­dan­cy

Geo­re­dun­dan­cy is often found as a re­dun­dan­cy concept in the clus­ter­ing of computing systems. It is used when par­tic­u­lar­ly critical systems need to be protected against failure. In this case, identical computing systems are con­struct­ed locally and sep­a­rate­ly from each other, and data, ge­o­graph­i­cal­ly, is stored in­de­pen­dent­ly. If one data center fails, the redundant data center can assume each task or com­plete­ly recover the data sets. Optimal geo-re­dun­dan­cy exists when ad­di­tion­al data backups are available in further fa­cil­i­ties.

Snapshots

Snapshots are virtual images or snapshots of hard disks and enable data and system con­di­tions to be backed up re­dun­dant­ly in other storage centers. In the event of data loss at one location, data recovery can be im­ple­ment­ed, therefore. Storage re­quire­ments for snapshots are sig­nif­i­cant­ly lower than for data copies because they are reference markers for data storage locations and not actual copies.

Backup

A backup requires more storage volume compared to snapshots as the data is copied and stored as a backup copy and in redundant form. Thanks to this data re­dun­dan­cy, the complete data set can be restored. Even with a redundant computer network, an ad­di­tion­al backup is always rec­om­mend­ed.

CDP (Con­tin­u­ous Data Pro­tec­tion)

With CDP, data is stored as part of a con­tin­u­ous backup, which monitors changes and au­to­mat­i­cal­ly updates them in the backup. It is therefore a data re­dun­dan­cy that backs up critical data in real time and protects against failures.

Con­clu­sion that in­ten­tion­al re­dun­dan­cy protects against data loss and strength­ens avail­abil­i­ty

The ad­van­tages of in­ten­tion­al re­dun­dan­cy are obvious: Systems and networks that have multiple technical com­po­nents and storage devices offer greater re­silience, faster data access and more sus­tain­able op­er­a­tions. Data recovery and con­ti­nu­ity are ensured even in the event of severe failures. The dis­ad­van­tage of redundant systems is the rel­a­tive­ly high cost of several com­po­nents, required storage space, and for the con­tin­u­ous updating of data copies.

Nev­er­the­less, re­dun­dan­cy in the data center is becoming in­creas­ing­ly important in view of new cyber threats, outdated system tech­nol­o­gy and strict data pro­tec­tion re­quire­ments. Both end users and data center operators should take care not only to integrate failover and system security ef­fi­cient­ly through redundant concepts, but also to mark them as a com­pet­i­tive advantage and USP through data center tiers.

Go to Main Menu