Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.
© 2006 EMC Corporation. All rights reserved.
Backup and Recovery
Module 4.2
© 2006 EMC Corporation. All rights reserved.
Backup and Recovery
Upon completion of this module, you will be able to:
 De...
© 2006 EMC Corporation. All rights reserved.
In this module …
This module contains the following lessons:
 Planning for B...
© 2006 EMC Corporation. All rights reserved.
Lesson: Planning for Backup and Recovery
Upon completion of this lesson, you ...
© 2006 EMC Corporation. All rights reserved.
What is a Backup?
 Backup is an additional copy of data that can be used for...
© 2006 EMC Corporation. All rights reserved.
Backup and Recovery Strategies
Several choices are available to get the data ...
© 2006 EMC Corporation. All rights reserved.
It’s All About Recovery!
 Businesses back up their data to enable its recove...
© 2006 EMC Corporation. All rights reserved.
Reasons for a Backup Plan
 Hardware Failures
 Human Factors
 Application F...
© 2006 EMC Corporation. All rights reserved.
How does Backup Work?
 Client/Server Relationship
 Server
– Directs Operati...
© 2006 EMC Corporation. All rights reserved.
How does Backup Work, continued
Disk
Storage
Tape
Backup
Data Set
Metadata
Ca...
© 2006 EMC Corporation. All rights reserved.
Business Considerations
 Customer business needs determine:
– What are the r...
© 2006 EMC Corporation. All rights reserved.
Data Considerations: File Characteristics
 Location
 Size
 Number
© 2006 EMC Corporation. All rights reserved.
Data Considerations: Data Compression
Compressibility depends on the data typ...
© 2006 EMC Corporation. All rights reserved.
Data Considerations: Retention Periods
 Operational
– Data sets on primary m...
© 2006 EMC Corporation. All rights reserved.
Lesson: Summary
Topics in this lesson included:
 Backup and Recovery definit...
© 2006 EMC Corporation. All rights reserved.
Lesson: Backup and Recovery Methods
Upon completion of this lesson, you be ab...
© 2006 EMC Corporation. All rights reserved.
Database Backup Methods
 Hot Backup: production is not interrupted.
 Cold B...
© 2006 EMC Corporation. All rights reserved.
Backup Granularity and Levels
Full
Backup
Cumulative (Differential)
Increment...
© 2006 EMC Corporation. All rights reserved.
Files 1, 2, 3, 4, 5
Production
Restoring an Incremental Backup
 Key Features...
© 2006 EMC Corporation. All rights reserved.
Restoring a Cumulative Backup
 Key Features
– More files to be backed up, th...
© 2006 EMC Corporation. All rights reserved.
Lesson: Summary
Topics in this lesson included:
 Hot and Cold Backups.
 The...
© 2006 EMC Corporation. All rights reserved.
Lesson: Backup Architecture Topologies
Upon completion of this lesson, you be...
© 2006 EMC Corporation. All rights reserved.
Backup Architecture Topologies
 There are 3 basic backup topologies:
– Direc...
© 2006 EMC Corporation. All rights reserved.
Direct Attached Based Backups
Catalog
Backup Server
LAN
Metadata
Media
Backup...
© 2006 EMC Corporation. All rights reserved.
LAN Based Backups
Backup Server
Storage Node
LAN
Metadata
Storage Node
Data
M...
© 2006 EMC Corporation. All rights reserved.
SAN Based Backups (LAN Free)
LAN
Metadata
Storage Node
Backup Client
Data
Mai...
© 2006 EMC Corporation. All rights reserved.
SAN/LAN Mixed Based Backups
LAN
Metadata
Storage Node
Data
Mail Server
Backup...
© 2006 EMC Corporation. All rights reserved.
Backup Media
 Tape
– Traditional destination for backups
– Sequential access...
© 2006 EMC Corporation. All rights reserved.
Multiple Streams on Tape Media
 Multiple streams interleaved to achieve high...
© 2006 EMC Corporation. All rights reserved.
Backup to Disk
 Backup to disk minimizes tape in backup environments
by usin...
© 2006 EMC Corporation. All rights reserved.
Tape versus Disk – Restore Comparison
Typical Scenario:
 800 users, 75 MB ma...
© 2006 EMC Corporation. All rights reserved.
Three Backup / Restore Solutions based on RTO
 Time of last image dictates
t...
© 2006 EMC Corporation. All rights reserved.
Traditional Backup, Recovery and Archive Approach
 Production environment gr...
© 2006 EMC Corporation. All rights reserved.
Differences Between Backup / Recovery & Archive
Backup / Recovery Archive
A s...
© 2006 EMC Corporation. All rights reserved.
New Architecture for Backup, Recovery & Archive
Understand the environment
...
© 2006 EMC Corporation. All rights reserved.
Lesson: Summary
Topics in this lesson included:
 The DAS, LAN, SAN, and Mixe...
© 2006 EMC Corporation. All rights reserved.
Lesson: Managing the Backup Process
Upon completion of this lesson, you be ab...
© 2006 EMC Corporation. All rights reserved.
How a Typical Backup Application Works
 Backup clients are grouped and assoc...
© 2006 EMC Corporation. All rights reserved.
Backup Application User Interfaces
There are typically two types of user inte...
© 2006 EMC Corporation. All rights reserved.
Managing the Backup and Restore Process
 Running the B/R Application: Backup...
© 2006 EMC Corporation. All rights reserved.
Backup Reports
 Backup products also offer reporting features.
 These featu...
© 2006 EMC Corporation. All rights reserved.
Importance of the Backup Catalog
 As you can see, backup operations strongly...
© 2006 EMC Corporation. All rights reserved.
Lesson: Summary
Topics in this lesson included:
 The features and functions ...
© 2006 EMC Corporation. All rights reserved.
Module Summary
Key points covered in this module:
 The best practices for pl...
© 2006 EMC Corporation. All rights reserved.
Check Your Knowledge
 What are three reasons for doing a Backup plan?
 What...
© 2006 EMC Corporation. All rights reserved.
Apply Your Knowledge…
Upon completion of this topic, you will be able to:
 D...
© 2006 EMC Corporation. All rights reserved.
Backup
to disk
Disk-backup
option
Basic
Tape backup
and recovery
Advanced
bac...
© 2006 EMC Corporation. All rights reserved.
 Enterprise protection
– Critical applications
– Heterogeneous platforms and...
© 2006 EMC Corporation. All rights reserved.
Critical Application and Database Protection
Offline (Cold)
Integration with ...
© 2006 EMC Corporation. All rights reserved.
NetWorker
UNIX/Linux
NetWorker
Windows
 Open Tape Format
– Datastream multip...
© 2006 EMC Corporation. All rights reserved.
Disk-
backup
target
NetWorker DiskBackup Option
 High performance
– Simultan...
© 2006 EMC Corporation. All rights reserved.
Advanced Backup - Snapshots and CDP
 Integration of backup with snapshots, f...
© 2006 EMC Corporation. All rights reserved.
 Policy-based management
– Administer snapshots in
NetWorker
– Schedule, cre...
© 2006 EMC Corporation. All rights reserved.
 Block-level backups
– Host-based snapshot
– Targeted at high-density file
s...
© 2006 EMC Corporation. All rights reserved.
Solution Example: Major Telecom Company
Value Proposition
Zero backup window ...
Próxima SlideShare
Cargando en…5
×

03 backup-and-recovery

6.836 visualizaciones

Publicado el

bestest ppt

Publicado en: Internet
  • Sé el primero en comentar

03 backup-and-recovery

  1. 1. © 2006 EMC Corporation. All rights reserved. Backup and Recovery Module 4.2
  2. 2. © 2006 EMC Corporation. All rights reserved. Backup and Recovery Upon completion of this module, you will be able to:  Describe best practices for planning Backup and Recovery.  Describe the common media and types of data that are part of a Backup and Recovery strategy.  Describe the common Backup and Recovery topologies.  Describe the Backup and Recovery Process.  Describe Management considerations for Backup and Recovery.
  3. 3. © 2006 EMC Corporation. All rights reserved. In this module … This module contains the following lessons:  Planning for Backup and Recovery  Backup and Recovery Methods  Backup Architecture Topologies  Managing the Backup Process
  4. 4. © 2006 EMC Corporation. All rights reserved. Lesson: Planning for Backup and Recovery Upon completion of this lesson, you be able to:  Define Backup and Recovery.  Describe common reasons for a Backup and Recovery plan.  Describe the business considerations for Backup and Recovery.  Define RPO and RTO.  Describe the data considerations for Backup and Recovery  Describe the planning for Backup and Recovery.
  5. 5. © 2006 EMC Corporation. All rights reserved. What is a Backup?  Backup is an additional copy of data that can be used for restore and recovery purposes.  The Backup copy is used when the primary copy is lost or corrupted.  This Backup copy can be created as a: – Simple copy (there can be one or more copies) – Mirrored copy (the copy is always updated with whatever is written to the primary copy.)
  6. 6. © 2006 EMC Corporation. All rights reserved. Backup and Recovery Strategies Several choices are available to get the data to the backup media such as:  Copy the data.  Mirror (or snapshot) then copy.  Remote backup.  Copy then duplicate or remote copy.
  7. 7. © 2006 EMC Corporation. All rights reserved. It’s All About Recovery!  Businesses back up their data to enable its recovery in case of potential loss.  Businesses also back up their data to comply with regulatory requirements.  Types of backup derivatives: – Disaster Recovery – Archival – Operational
  8. 8. © 2006 EMC Corporation. All rights reserved. Reasons for a Backup Plan  Hardware Failures  Human Factors  Application Failures  Security Breaches  Disasters  Regulatory and Business Requirements
  9. 9. © 2006 EMC Corporation. All rights reserved. How does Backup Work?  Client/Server Relationship  Server – Directs Operation – Maintains the Backup Catalog  Client – Gathers Data for Backup (a backup client sends backup data to a backup server or storage node).  Storage Node
  10. 10. © 2006 EMC Corporation. All rights reserved. How does Backup Work, continued Disk Storage Tape Backup Data Set Metadata Catalog Backup Server & Storage Node Servers Backup Clients Clients
  11. 11. © 2006 EMC Corporation. All rights reserved. Business Considerations  Customer business needs determine: – What are the restore requirements – RPO & RTO? – Where and when will the restores occur? – What are the most frequent restore requests? – Which data needs to be backed up? – How frequently should data be backed up?  hourly, daily, weekly, monthly – How long will it take to backup? – How many copies to create? – How long to retain backup copies?
  12. 12. © 2006 EMC Corporation. All rights reserved. Data Considerations: File Characteristics  Location  Size  Number
  13. 13. © 2006 EMC Corporation. All rights reserved. Data Considerations: Data Compression Compressibility depends on the data type, for example:  Application binaries – do not compress well.  Text – compresses well.  JPEG/ZIP files – are already compressed and expand if compressed again.
  14. 14. © 2006 EMC Corporation. All rights reserved. Data Considerations: Retention Periods  Operational – Data sets on primary media (disk) up to the point where most restore requests are satisfied, then moved to secondary storage (tape).  Disaster Recovery – Driven by the organization’s disaster recovery policy  Portable media (tapes) sent to an offsite location / vault.  Replicated over to an offsite location (disk).  Backed up directly to the offsite location (disk, tape or emulated tape).  Archiving – Driven by the organization’s policy. – Dictated by regulatory requirements.
  15. 15. © 2006 EMC Corporation. All rights reserved. Lesson: Summary Topics in this lesson included:  Backup and Recovery definitions and examples.  Common reasons for Backup and Recovery.  The business considerations for Backup and Recovery.  Recovery Point Objectives and Recovery Time Objectives.  The data considerations for Backup and Recovery  The planning for Backup and Recovery.
  16. 16. © 2006 EMC Corporation. All rights reserved. Lesson: Backup and Recovery Methods Upon completion of this lesson, you be able to:  Describe Hot and Cold Backups.  Describe the levels of Backup Granularity.
  17. 17. © 2006 EMC Corporation. All rights reserved. Database Backup Methods  Hot Backup: production is not interrupted.  Cold Backup: production is interrupted.  Backup Agents manage the backup of different data types such as: – Structured (such as databases) – Semi-structured (such as email) – Unstructured (file systems)
  18. 18. © 2006 EMC Corporation. All rights reserved. Backup Granularity and Levels Full Backup Cumulative (Differential) Incremental Full Cumulative Incremental
  19. 19. © 2006 EMC Corporation. All rights reserved. Files 1, 2, 3, 4, 5 Production Restoring an Incremental Backup  Key Features – Files that have changed since the last full or incremental backup are backed up. – Fewest amount of files to be backed up, therefore faster backup and less storage space. – Longer restore because last full and all subsequent incremental backups must be applied. Incremental Tuesday File 4 Incremental Wednesday File 3 Incremental Thursday File 5Files 1, 2, 3 Monday Full Backup
  20. 20. © 2006 EMC Corporation. All rights reserved. Restoring a Cumulative Backup  Key Features – More files to be backed up, therefore it takes more time to backup and uses more storage space. – Much faster restore because only the last full and the last cumulative backup must be applied. Files 1, 2, 3, 4, 5, 6 Production Cumulative Tuesday File 4Files 1, 2, 3 Monday Full Backup Cumulative Wednesday Files 4, 5 Cumulative Thursday Files 4, 5, 6
  21. 21. © 2006 EMC Corporation. All rights reserved. Lesson: Summary Topics in this lesson included:  Hot and Cold Backups.  The levels of Backup Granularity.
  22. 22. © 2006 EMC Corporation. All rights reserved. Lesson: Backup Architecture Topologies Upon completion of this lesson, you be able to:  Describe DAS, LAN, SAN, Mixed topologies.  Describe backup media considerations.
  23. 23. © 2006 EMC Corporation. All rights reserved. Backup Architecture Topologies  There are 3 basic backup topologies: – Direct Attached Based Backup – LAN Based Backup – SAN Based Backup  These topologies can be integrated, forming a “mixed” topology
  24. 24. © 2006 EMC Corporation. All rights reserved. Direct Attached Based Backups Catalog Backup Server LAN Metadata Media BackupStorage Node Backup Client Data
  25. 25. © 2006 EMC Corporation. All rights reserved. LAN Based Backups Backup Server Storage Node LAN Metadata Storage Node Data Mail Server Backup Client Database Server Backup Client Metadata Data
  26. 26. © 2006 EMC Corporation. All rights reserved. SAN Based Backups (LAN Free) LAN Metadata Storage Node Backup Client Data Mail Server SAN Backup Server Data Backup Device
  27. 27. © 2006 EMC Corporation. All rights reserved. SAN/LAN Mixed Based Backups LAN Metadata Storage Node Data Mail Server Backup Client Database Server Backup Client Data SAN Backup Server Data Backup Device
  28. 28. © 2006 EMC Corporation. All rights reserved. Backup Media  Tape – Traditional destination for backups – Sequential access – No protection  Disk – Random access – Protected by the storage array (RAID, hot spare, etc)
  29. 29. © 2006 EMC Corporation. All rights reserved. Multiple Streams on Tape Media  Multiple streams interleaved to achieve higher throughput on tape – Keeps the tape streaming, for maximum write performance – Helps prevent tape mechanical failure – Greatly increases time to restore Tape Data from Stream 1 Data from Stream 2 Data from Stream 3
  30. 30. © 2006 EMC Corporation. All rights reserved. Backup to Disk  Backup to disk minimizes tape in backup environments by using disk as the primary destination device – Cost benefits – No processes changes needed – Better service levels  Backup to disk aligns backup strategy to RTO and RPO
  31. 31. © 2006 EMC Corporation. All rights reserved. Tape versus Disk – Restore Comparison Typical Scenario:  800 users, 75 MB mailbox  60 GB database Source: EMC Engineering and EMC IT *Total time from point of failure to return of service to e-mail users 31 0 10 20 30 40 50 60 70 80 90 100 120110 Recovery Time in Minutes* Tape Backup / Restore Disk Backup / Restore 108 Minutes 24 Minutes
  32. 32. © 2006 EMC Corporation. All rights reserved. Three Backup / Restore Solutions based on RTO  Time of last image dictates the log playback time  Larger data sets extend the recovery time (ATA and tape) *Total time from point of failure to return of service to e-mail users 0 10 20 30 40 50 60 70 80 90 100 120110 Recovery Time in Minutes* Backup on tape Backup on ATA 108 Min. 24 Min. Typical Scenario:  800 users, 75 MB mailbox  60 GB DB – restore time  500 MB logs – log playback 130 Local Replica / Clone 2 Min. 41 Minutes 19 Minutes 125 Minutes 17 Min. 17 Min. 17 Min. Restore time Log playback
  33. 33. © 2006 EMC Corporation. All rights reserved. Traditional Backup, Recovery and Archive Approach  Production environment grows – Requires constant tuning and data placement to maintain performance – Need to add more tier-1 storage  Backup environment grows – Backup windows get longer and jobs do not complete – Restores take longer – Requires more tape drives and silos to keep up with service levels  Archive environment grows – Impact flexibility to retrieve content when requested – Requires more media, adding management cost – No investment protection for long term retention requirements Backup Process Archive Process Production
  34. 34. © 2006 EMC Corporation. All rights reserved. Differences Between Backup / Recovery & Archive Backup / Recovery Archive A secondary copy of information Primary copy of information Used for recovery operations Available for information retrieval Improves availability by enabling application to be restored to a specific point in time Adds operational efficiencies by moving fixed / unstructured content out of operational environment Typically short-term (weeks or months) Typically long-term (months, years, or decades) Data typically overwritten on periodic basis (e.g., monthly) Data typically maintained for analysis, value generation, or compliance Not for regulatory compliance— though some are forced to use Useful for compliance and should take into account information- retention policy
  35. 35. © 2006 EMC Corporation. All rights reserved. New Architecture for Backup, Recovery & Archive Understand the environment Actively archive valuable information to tiered storage Back up active production information to disk Retrieve from archive or recover from backup Backup Process Archive ProcessProduction 1 3 4 2 4
  36. 36. © 2006 EMC Corporation. All rights reserved. Lesson: Summary Topics in this lesson included:  The DAS, LAN, SAN, and Mixed topologies.  Backup media considerations.
  37. 37. © 2006 EMC Corporation. All rights reserved. Lesson: Managing the Backup Process Upon completion of this lesson, you be able to:  Describe features and functions of common Backup/Recovery applications.  Describe the Backup/Recovery process management considerations.  Describe the importance of the information found in Backup Reports and in the Backup Catalog.
  38. 38. © 2006 EMC Corporation. All rights reserved. How a Typical Backup Application Works  Backup clients are grouped and associated with a Backup schedule that determines when and which backup type will occur.  Groups are associated with Pools, which determine which backup media will be used.  Each backup media has a unique label.  Information about the backup is written to the Backup Catalog during and after it completes. The Catalog shows: – when the Backup was performed, and – which media was used (label).  Errors and other information is also written to a log.
  39. 39. © 2006 EMC Corporation. All rights reserved. Backup Application User Interfaces There are typically two types of user interfaces:  Command Line Interface – CLI  Graphical User Interfaces – GUI
  40. 40. © 2006 EMC Corporation. All rights reserved. Managing the Backup and Restore Process  Running the B/R Application: Backup – The backup administrator configures it to be started, most (if not all) of the times, automatically – Most backup products offer the ability for the backup client to initiate their own backup (usually disabled)  Running the B/R Application: Restore – There is usually a separate GUI to manage the restore process – Information is pulled from the backup catalog when the user is selecting the files to be restored – Once the selection is finished, the backup server starts reading from the required backup media, and the files are sent to the backup client
  41. 41. © 2006 EMC Corporation. All rights reserved. Backup Reports  Backup products also offer reporting features.  These features rely on the backup catalog and log files.  Reports are meant to be easy to read and provide important information such as: – Amount of data backed up – Number of completed backups – Number of incomplete backups (failed) – Types of errors that may have occurred  Additional reports may be available, depending on the backup software product used.
  42. 42. © 2006 EMC Corporation. All rights reserved. Importance of the Backup Catalog  As you can see, backup operations strongly rely on the backup catalog  If the catalog is lost, the backup software alone has no means to determine where to find a specific file backed up two months ago, for example  It can be reconstructed, but this usually means that all of the backup media (i.e. tapes) have to be read  It’s a good practice to protect the catalog – By replicating the file system where it resides to a remote location – By backing it up  Some backup products have built-in mechanisms to protect their catalog (such as automatic backup)
  43. 43. © 2006 EMC Corporation. All rights reserved. Lesson: Summary Topics in this lesson included:  The features and functions of common Backup/Recovery applications.  The Backup/Recovery process management considerations.  The importance of the information found in Backup Reports and in the Backup Catalog.
  44. 44. © 2006 EMC Corporation. All rights reserved. Module Summary Key points covered in this module:  The best practices for planning Backup and Recovery.  The common media and types of data that are part of a Backup and Recovery strategy.  The common Backup and Recovery topologies.  The Backup and Recovery Process.  Management considerations for Backup and Recovery.
  45. 45. © 2006 EMC Corporation. All rights reserved. Check Your Knowledge  What are three reasons for doing a Backup plan?  What are the three topologies that support creating a Backup set?  What are the advantages and disadvantages of using tape as the Backup media?  What are the three levels of granularity found in Backups? 
  46. 46. © 2006 EMC Corporation. All rights reserved. Apply Your Knowledge… Upon completion of this topic, you will be able to:  Describe EMC’s product implementation of a Backup and Recovery solution.
  47. 47. © 2006 EMC Corporation. All rights reserved. Backup to disk Disk-backup option Basic Tape backup and recovery Advanced backup Snapshot management Remove risk Faster and more consistent data backup Improve reliability Keep recovery copies fresh and reduce process errors Lower total cost of ownership Centralization and ease of use Low SERVICE-LEVEL REQUIREMENTS High Tiered Protection and Recovery Management EMC NetWorker
  48. 48. © 2006 EMC Corporation. All rights reserved.  Enterprise protection – Critical applications – Heterogeneous platforms and storage – Scalable architecture – 256-bit AES encryption and secure authentication  Centralized management – Graphical user interface – Customizable reporting – Wizard-driven configuration  Performance – Data multiplexing – Advanced indexing – Efficient media management Solution Features Tape library Basic Architecture Heterogeneous clients Backup server Key applications LAN SAN NAS (NDMP) Storage Node NetWorker Backup and Recovery
  49. 49. © 2006 EMC Corporation. All rights reserved. Critical Application and Database Protection Offline (Cold) Integration with application APIs for backup and recovery Backup without Application Modules Backup with NetWorker Application Modules Shut down application Restart application Back up application Application SAVE Application DOWNTIME Application NetWorkerMODULE 24x7OPERATIONS
  50. 50. © 2006 EMC Corporation. All rights reserved. NetWorker UNIX/Linux NetWorker Windows  Open Tape Format – Datastream multiplexing – Self-contained indexing – Cross-platform format  UNIX  Windows  Linux – Minimize impact of tape corruption  Dynamic drive sharing – Cross-platform tape-drive sharing – On-demand device usage – Reduce hardware total cost of ownership Media-Management Advantages
  51. 51. © 2006 EMC Corporation. All rights reserved. Disk- backup target NetWorker DiskBackup Option  High performance – Simultaneous-access operations – No penalty on restore versus tape  Policy-based migration of data from disk to tape – Automated staging and cloning – Up to 50% faster – Clone backups jobs as they complete – Reduce wear and tear on tape drives and cartridges  Superior capability – Operational backup and recovery for all clients, including NAS with NDMP – Direct file access for fast recovery Tape library Backup-to-Disk Architecture Heterogeneous clients Backup server Key applications LAN NAS Storage Node SAN
  52. 52. © 2006 EMC Corporation. All rights reserved. Advanced Backup - Snapshots and CDP  Integration of backup with snapshots, full-volume mirrors, and Continuous Data Protection (CDP)  Instant restore  Off-host backups  Achieve stringent recovery-time objectives (RTOs), recovery-point objectives (RPOs) It is expected that snapshot technology for data protection will surpass backup to tape as the trend in data protection as organizations continue to focus on recovery times Production information Recover Backup Production server Backup server Snapshot 11:00 a.m. Snapshot 5:00 p.m. Backup snap 10:00 p.m.
  53. 53. © 2006 EMC Corporation. All rights reserved.  Policy-based management – Administer snapshots in NetWorker – Schedule, create, retain, and delete snapshots by policy  Third-party integration – Leverage third-party replication technology  Array-based (Symmetrix DMX, CLARiiON CX, etc.)  Software-based (RecoverPoint)  Application recovery – Integration with Application Modules to ensure consistent state  Exchange / SQL / Oracle / SAP NetWorker PowerSnap Module CLARiiON with SnapView Tape library Advanced Backup Heterogeneous clients Backup server Key applications LAN SAN NAS Storage Node
  54. 54. © 2006 EMC Corporation. All rights reserved.  Block-level backups – Host-based snapshot – Targeted at high-density file systems – Single-file restore – Sparse backups  High performance – Significant backup-and-restore performance impact—up to 10 times faster – Drive tape at rated speeds – Optional network-accelerated serverless backup with Cisco intelligent switch NetWorker SnapImage Module 1,000,000+ directories 10,000,000+ files Advanced Backup
  55. 55. © 2006 EMC Corporation. All rights reserved. Solution Example: Major Telecom Company Value Proposition Zero backup window for applications Eliminated data-loss risk Reduced management overhead Business Challenge:  Complex application environment  No backup window  Recovery-time objective: Restore 24 TB in two hours Enterprise-Information Protection Solution:  NetWorker PowerSnap with Symmetrix and TimeFinder/Snap – Server-free backup  NetWorker DiskBackup Option with CLARiiON with ATA disks – Rapid primary-site protection  NetWorker and SRDF/S – Disaster recovery – Offsite protection 55 Disaster-Recovery Site Production Site Symmetrix DMX Application host NetWorker Storage Node PowerSnap Disaster- recovery host CLARiiON CX Symmetrix DMX Storage Node Tape library SAN SAN Tape library SRDF/S

×