What is redundancy in computer science? (2024)

When operating relevant IT systems and handling critical data sets, intentional redundancy should be an integral part of danger prevention and data protection. Systems are redundant when the same technical components and data sets are available several times in parallel, protecting against loss and failure. Redundancy does not only have advantages in terms of storage capacity and IT equipment, however.

MyDefender

Easy cyber security

  • Ransomware attack protection
  • Regular virus and malware scans
  • Automatic backups and simple file recovery

What is redundancy in computer science? (1)

The meaning of redundant

The noun “redundancy” or the adjective “redundant” and its meaning go back to the Latin “redundare”. It is composed of “re” for “back” and “unda” for “wave”, and it denotes something that exists in abundance, i.e., also something that exists multiple times and in excess. While “redundant” is barely found in everyday language, so-called redundancy plays a far greater role in computer science.

What does redundancy mean in computer science?

When we talk about redundancy in IT, we are talking about data center security and system availability. It refers to data and system components that are numerous, parallel, duplicated or mirrored and are thus available in abundance. Depending on the context, this can have both positive and negative connotations in IT. Redundancy in the positive sense stands for system-critical data sets that exist multiple times or are distributed across multiple servers. Redundancy, when negatively connoted, is found in the form of unintentional data duplicates that occupy storage space.

First, then, a distinction must be made between unintended and intended redundancy:

Unintended redundancy

Accidental or unintentional redundancy in an organization’s systems or data centers is found in the form of multiple data sets stored in one site or distributed across multiple sites. Data duplication makes maintaining records more complicated and leads to data anomalies. Inconsistencies are the result as it is not clear which data should be accessed or which records are current. In addition, unintentional redundancies occupy important storage space and consume energy unnecessarily. This is prevented by normalization of databases.

Intended redundancy

Intended redundancy means the planned, repeated design of technical components to secure a server, strengthen supply paths and protect system/company-critical data. A distinction can be made between the following concepts in redundancy:

  • Functional redundancy: Multiple and/or parallel technical system components mostly within one plant.
  • Georedundancy: Locally separated, multiple data centers or data sets.
  • Data redundancy: Multiple backed up, mirrored or parallel data sets

If hardware damage, system failures or cyberattacks occur, companies can protect themselves against data loss and the failure of business-critical processes through redundancy. Data is stored multiple times, and consistently in different locations, while important components such as supply routes for energy and air conditioning are at least duplicated.

Depending on the components installed, a distinction is made between:

  • hom*ogeneous redundancy: Repeated design of components that are identical in terms of manufacturer technology. The disadvantage of this is that the similarity of the components means that the risk of an overall failure due to manufacturer errors or attacks directed at the manufacturer remains high.
  • Diverse redundancy: Repeated design of components that differ by manufacturer, function, and type, making general system failures, uniform wear, and manufacturer-related failures less likely.

Note

The opposite of intended redundancy is called Single Point of Failure (SPoF) and means simply existing components, e.g., simple supply paths, simple RAID functionality or only one server. Thus, in the event of a failure, there are no backup systems and redundant components cannot maintain system operations.

Redundant components in computer science

Redundancy as a criterion for system properties and system security exists in the following forms:

  • Redundant technical components: System components of computers and networks, such as air conditioning, supply lines and servers, which take over the tasks of failed systems and components through multiple design or serve as a backup; this applies both to technical components within a system and to entire data centers that are available multiple times at different locations through geo-redundancy.
  • Redundant information: Superfluous, unnecessary, obsolete, or duplicate records that are not relevant to the system and usually occupy storage space unintentionally.
  • Redundant data: Repeated, mirrored, or distributed data sets across multiple sites and servers that prevent complete data loss in the event of failure or damage through RAID capabilities, backups, virtualization, or mirroring; serve as backup or disaster recovery; or provide faster access at a distance.
  • Redundant bits: Added as extra bits during data transfers to prevent data loss during the transfer.

Functionality of redundant servers

If it is important for companies to be able to access their servers without interruption, they will implement a computer network. This consists of redundant servers made of cluster systems with several nodes. In a network, each associated computer has equal access to existing databases and can take over access functions to critical data and applications for failed servers in the event of an emergency. To this end, a fail-safe is almost entirely guaranteed. Operational upkeep, launching without physical hard disks using network storage, and the replacement of faulty servers can all be achieved without interrupting business processes thanks to distributed computer capacities.

Depending on the concept, redundant servers can be divided into two modes:

  • Active/active cluster (symmetric): In the context of active/active clusters, servers operate in live mode as cluster nodes in which multiple computers work in parallel with distributed power or independently of each other. In the event of a failure, the computing capacity is distributed to other servers in the network.
  • Active/passive cluster (asymmetric): Active/passive clusters are called failover clusters and stand for the presence of redundant servers or network services that are in standby mode as a backup system and, by way of a switch-over, assume the functions of the main system in the event of a one-sided failure. This is automated by cluster manager/load balancer software. This also enables operational maintenance without any loss in performance.

How is redundancy implemented in IT?

To implement redundancy in network systems and computing facilities, there are various forms and concepts:

RAID

RAID stands for “Redundant Array of Independent Disks” and refers to various physical storage devices (RAID arrays) that are joined together to form a partition. In this way, the consistency and integrity of data sets is maintained even where an error occurs, and components can be exchanged without loss. This is done, among other things, by mirroring hard disks or by using parities with distributed data in the array. However, RAID systems should always be used in conjunction with an independent backup of all critical data.

Cluster

As already shown with the example of active/active or active/passive clusters, a computer network as a high-availability or load-balancing cluster offers greater availability, load distribution and fail-safety through eliminated single points of failure and continuous processes.

Georedundancy

Georedundancy is often found as a redundancy concept in the clustering of computing systems. It is used when particularly critical systems need to be protected against failure. In this case, identical computing systems are constructed locally and separately from each other, and data, geographically, is stored independently. If one data center fails, the redundant data center can assume each task or completely recover the data sets. Optimal geo-redundancy exists when additional data backups are available in further facilities.

Snapshots

Snapshots are virtual images or snapshots of hard disks and enable data and system conditions to be backed up redundantly in other storage centers. In the event of data loss at one location, data recovery can be implemented, therefore. Storage requirements for snapshots are significantly lower than for data copies because they are reference markers for data storage locations and not actual copies.

Backup

A backup requires more storage volume compared to snapshots as the data is copied and stored as a backup copy and in redundant form. Thanks to this data redundancy, the complete data set can be restored. Even with a redundant computer network, an additional backup is always recommended.

CDP (Continuous Data Protection)

With CDP, data is stored as part of a continuous backup, which monitors changes and automatically updates them in the backup. It is therefore a data redundancy that backs up critical data in real time and protects against failures.

Conclusion that intentional redundancy protects against data loss and strengthens availability

The advantages of intentional redundancy are obvious: Systems and networks that have multiple technical components and storage devices offer greater resilience, faster data access and more sustainable operations. Data recovery and continuity are ensured even in the event of severe failures. The disadvantage of redundant systems is the relatively high cost of several components, required storage space, and for the continuous updating of data copies.

Nevertheless, redundancy in the data center is becoming increasingly important in view of new cyber threats, outdated system technology and strict data protection requirements. Both end users and data center operators should take care not only to integrate failover and system security efficiently through redundant concepts, but also to mark them as a competitive advantage and USP through data center tiers.

Was this article helpful?

What is redundancy in computer science? (2024)
Top Articles
How To Sell On Lazada: A Step-by-Step Guide - Flippa
How Ground Transportation Has the Power to Streamline Your Business | CMAC Group
Whas Golf Card
Mchoul Funeral Home Of Fishkill Inc. Services
Pnct Terminal Camera
Canary im Test: Ein All-in-One Überwachungssystem? - HouseControllers
Ingles Weekly Ad Lilburn Ga
Big Spring Skip The Games
Top 10: Die besten italienischen Restaurants in Wien - Falstaff
New Day Usa Blonde Spokeswoman 2022
Whiskeytown Camera
Violent Night Showtimes Near Amc Fashion Valley 18
‘Accused: Guilty Or Innocent?’: A&E Delivering Up-Close Look At Lives Of Those Accused Of Brutal Crimes
Dumb Money
The Murdoch succession drama kicks off this week. Here's everything you need to know
Jc Post News
Are They Not Beautiful Wowhead
Xomissmandi
Uky Linkblue Login
Halo Worth Animal Jam
Aldi Bruce B Downs
Titanic Soap2Day
Hampton University Ministers Conference Registration
Greyson Alexander Thorn
How To Find Free Stuff On Craigslist San Diego | Tips, Popular Items, Safety Precautions | RoamBliss
Gs Dental Associates
Tire Plus Hunters Creek
Impact-Messung für bessere Ergebnisse « impact investing magazin
Keyn Car Shows
Wbap Iheart
Turns As A Jetliner Crossword Clue
His Only Son Showtimes Near Marquee Cinemas - Wakefield 12
Gncc Live Timing And Scoring
Die wichtigsten E-Nummern
Math Minor Umn
Eero Optimize For Conferencing And Gaming
Microsoftlicentiespecialist.nl - Microcenter - ICT voor het MKB
Green Bay Crime Reports Police Fire And Rescue
The Ride | Rotten Tomatoes
Craigslist Albany Ny Garage Sales
Bridger Park Community Garden
Metro 72 Hour Extension 2022
Planet Fitness Lebanon Nh
Kelly Ripa Necklace 2022
Nancy Pazelt Obituary
WorldAccount | Data Protection
Mugshots Journal Star
Promo Code Blackout Bingo 2023
Memberweb Bw
Powerboat P1 Unveils 2024 P1 Offshore And Class 1 Race Calendar
Craigslist Com Brooklyn
Costco Gas Price Fort Lauderdale
Latest Posts
Article information

Author: Tuan Roob DDS

Last Updated:

Views: 6307

Rating: 4.1 / 5 (62 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Tuan Roob DDS

Birthday: 1999-11-20

Address: Suite 592 642 Pfannerstill Island, South Keila, LA 74970-3076

Phone: +9617721773649

Job: Marketing Producer

Hobby: Skydiving, Flag Football, Knitting, Running, Lego building, Hunting, Juggling

Introduction: My name is Tuan Roob DDS, I am a friendly, good, energetic, faithful, fantastic, gentle, enchanting person who loves writing and wants to share my knowledge and understanding with you.