SlideShare a Scribd company logo
1 of 55
© 2006 EMC Corporation. All rights reserved.
Backup and Recovery
Module 4.2
© 2006 EMC Corporation. All rights reserved.
Backup and Recovery
Upon completion of this module, you will be able to:
 Describe best practices for planning Backup and
Recovery.
 Describe the common media and types of data that are
part of a Backup and Recovery strategy.
 Describe the common Backup and Recovery topologies.
 Describe the Backup and Recovery Process.
 Describe Management considerations for Backup and
Recovery.
© 2006 EMC Corporation. All rights reserved.
In this module …
This module contains the following lessons:
 Planning for Backup and Recovery
 Backup and Recovery Methods
 Backup Architecture Topologies
 Managing the Backup Process
© 2006 EMC Corporation. All rights reserved.
Lesson: Planning for Backup and Recovery
Upon completion of this lesson, you be able to:
 Define Backup and Recovery.
 Describe common reasons for a Backup and Recovery
plan.
 Describe the business considerations for Backup and
Recovery.
 Define RPO and RTO.
 Describe the data considerations for Backup and
Recovery
 Describe the planning for Backup and Recovery.
© 2006 EMC Corporation. All rights reserved.
What is a Backup?
 Backup is an additional copy of data that can be used for
restore and recovery purposes.
 The Backup copy is used when the primary copy is lost
or corrupted.
 This Backup copy can be created as a:
– Simple copy (there can be one or more copies)
– Mirrored copy (the copy is always updated with whatever is written
to the primary copy.)
© 2006 EMC Corporation. All rights reserved.
Backup and Recovery Strategies
Several choices are available to get the data to the backup
media such as:
 Copy the data.
 Mirror (or snapshot) then copy.
 Remote backup.
 Copy then duplicate or remote copy.
© 2006 EMC Corporation. All rights reserved.
It’s All About Recovery!
 Businesses back up their data to enable its recovery in
case of potential loss.
 Businesses also back up their data to comply with
regulatory requirements.
 Types of backup derivatives:
– Disaster Recovery
– Archival
– Operational
© 2006 EMC Corporation. All rights reserved.
Reasons for a Backup Plan
 Hardware Failures
 Human Factors
 Application Failures
 Security Breaches
 Disasters
 Regulatory and Business Requirements
© 2006 EMC Corporation. All rights reserved.
How does Backup Work?
 Client/Server Relationship
 Server
– Directs Operation
– Maintains the Backup Catalog
 Client
– Gathers Data for Backup (a backup client sends backup data to a
backup server or storage node).
 Storage Node
© 2006 EMC Corporation. All rights reserved.
How does Backup Work, continued
Disk
Storage
Tape
Backup
Data Set
Metadata
Catalog
Backup Server
& Storage Node
Servers
Backup Clients
Clients
© 2006 EMC Corporation. All rights reserved.
Business Considerations
 Customer business needs determine:
– What are the restore requirements – RPO & RTO?
– Where and when will the restores occur?
– What are the most frequent restore requests?
– Which data needs to be backed up?
– How frequently should data be backed up?
 hourly, daily, weekly, monthly
– How long will it take to backup?
– How many copies to create?
– How long to retain backup copies?
© 2006 EMC Corporation. All rights reserved.
Data Considerations: File Characteristics
 Location
 Size
 Number
© 2006 EMC Corporation. All rights reserved.
Data Considerations: Data Compression
Compressibility depends on the data type, for example:
 Application binaries – do not compress well.
 Text – compresses well.
 JPEG/ZIP files – are already compressed and expand if
compressed again.
© 2006 EMC Corporation. All rights reserved.
Data Considerations: Retention Periods
 Operational
– Data sets on primary media (disk) up to the point where most restore
requests are satisfied, then moved to secondary storage (tape).
 Disaster Recovery
– Driven by the organization’s disaster recovery policy
 Portable media (tapes) sent to an offsite location / vault.
 Replicated over to an offsite location (disk).
 Backed up directly to the offsite location (disk, tape or emulated tape).
 Archiving
– Driven by the organization’s policy.
– Dictated by regulatory requirements.
© 2006 EMC Corporation. All rights reserved.
Lesson: Summary
Topics in this lesson included:
 Backup and Recovery definitions and examples.
 Common reasons for Backup and Recovery.
 The business considerations for Backup and Recovery.
 Recovery Point Objectives and Recovery Time
Objectives.
 The data considerations for Backup and Recovery
 The planning for Backup and Recovery.
© 2006 EMC Corporation. All rights reserved.
Lesson: Backup and Recovery Methods
Upon completion of this lesson, you be able to:
 Describe Hot and Cold Backups.
 Describe the levels of Backup Granularity.
© 2006 EMC Corporation. All rights reserved.
Database Backup Methods
 Hot Backup: production is not interrupted.
 Cold Backup: production is interrupted.
 Backup Agents manage the backup of different data
types such as:
– Structured (such as databases)
– Semi-structured (such as email)
– Unstructured (file systems)
© 2006 EMC Corporation. All rights reserved.
Backup Granularity and Levels
Full
Backup
Cumulative (Differential)
Incremental
Full Cumulative Incremental
© 2006 EMC Corporation. All rights reserved.
Files 1, 2, 3, 4, 5
Production
Restoring an Incremental Backup
 Key Features
– Files that have changed since the last full or incremental backup are
backed up.
– Fewest amount of files to be backed up, therefore faster backup and less
storage space.
– Longer restore because last full and all subsequent incremental backups
must be applied.
Incremental
Tuesday
File 4
Incremental
Wednesday
File 3
Incremental
Thursday
File 5Files 1, 2, 3
Monday
Full Backup
© 2006 EMC Corporation. All rights reserved.
Restoring a Cumulative Backup
 Key Features
– More files to be backed up, therefore it takes more time to backup
and uses more storage space.
– Much faster restore because only the last full and the last cumulative
backup must be applied.
Files 1, 2, 3, 4, 5, 6
Production
Cumulative
Tuesday
File 4Files 1, 2, 3
Monday
Full Backup Cumulative
Wednesday
Files 4, 5
Cumulative
Thursday
Files 4, 5, 6
© 2006 EMC Corporation. All rights reserved.
Lesson: Summary
Topics in this lesson included:
 Hot and Cold Backups.
 The levels of Backup Granularity.
© 2006 EMC Corporation. All rights reserved.
Lesson: Backup Architecture Topologies
Upon completion of this lesson, you be able to:
 Describe DAS, LAN, SAN, Mixed topologies.
 Describe backup media considerations.
© 2006 EMC Corporation. All rights reserved.
Backup Architecture Topologies
 There are 3 basic backup topologies:
– Direct Attached Based Backup
– LAN Based Backup
– SAN Based Backup
 These topologies can be integrated, forming a “mixed”
topology
© 2006 EMC Corporation. All rights reserved.
Direct Attached Based Backups
Catalog
Backup Server
LAN
Metadata
Media
BackupStorage Node
Backup Client
Data
© 2006 EMC Corporation. All rights reserved.
LAN Based Backups
Backup Server
Storage Node
LAN
Metadata
Storage Node
Data
Mail Server
Backup Client
Database Server
Backup Client
Metadata
Data
© 2006 EMC Corporation. All rights reserved.
SAN Based Backups (LAN Free)
LAN
Metadata
Storage Node
Backup Client
Data
Mail Server
SAN
Backup Server
Data
Backup
Device
© 2006 EMC Corporation. All rights reserved.
SAN/LAN Mixed Based Backups
LAN
Metadata
Storage Node
Data
Mail Server
Backup Client
Database Server
Backup Client
Data
SAN
Backup Server
Data
Backup
Device
© 2006 EMC Corporation. All rights reserved.
Backup Media
 Tape
– Traditional destination for backups
– Sequential access
– No protection
 Disk
– Random access
– Protected by the storage array (RAID, hot spare, etc)
© 2006 EMC Corporation. All rights reserved.
Multiple Streams on Tape Media
 Multiple streams interleaved to achieve higher
throughput on tape
– Keeps the tape streaming, for maximum write performance
– Helps prevent tape mechanical failure
– Greatly increases time to restore
Tape
Data from
Stream 1 Data from
Stream 2 Data from
Stream 3
© 2006 EMC Corporation. All rights reserved.
Backup to Disk
 Backup to disk minimizes tape in backup environments
by using disk as the primary destination device
– Cost benefits
– No processes changes needed
– Better service levels
 Backup to disk aligns backup strategy to RTO and
RPO
© 2006 EMC Corporation. All rights reserved.
Tape versus Disk – Restore Comparison
Typical Scenario:
 800 users, 75 MB mailbox
 60 GB database
Source: EMC Engineering and EMC IT
*Total time from point of failure to return of service to e-mail users
31
0 10 20 30 40 50 60 70 80 90 100 120110
Recovery Time in Minutes*
Tape
Backup / Restore
Disk
Backup / Restore
108
Minutes
24
Minutes
© 2006 EMC Corporation. All rights reserved.
Three Backup / Restore Solutions based on RTO
 Time of last image dictates
the log playback time
 Larger data sets extend the
recovery time (ATA and tape)
*Total time from point of failure to return of service to e-mail users
0 10 20 30 40 50 60 70 80 90 100 120110
Recovery Time in Minutes*
Backup on tape
Backup on ATA
108 Min.
24 Min.
Typical Scenario:
 800 users, 75 MB mailbox
 60 GB DB – restore time
 500 MB logs – log playback
130
Local Replica /
Clone
2 Min.
41 Minutes
19 Minutes
125 Minutes
17 Min.
17 Min.
17 Min.
Restore time
Log playback
© 2006 EMC Corporation. All rights reserved.
Traditional Backup, Recovery and Archive Approach
 Production environment grows
– Requires constant tuning and data placement to
maintain performance
– Need to add more tier-1 storage
 Backup environment grows
– Backup windows get longer and jobs do not complete
– Restores take longer
– Requires more tape drives and silos to keep up with
service levels
 Archive environment grows
– Impact flexibility to retrieve content when requested
– Requires more media, adding management cost
– No investment protection for long term retention
requirements
Backup
Process
Archive
Process
Production
© 2006 EMC Corporation. All rights reserved.
Differences Between Backup / Recovery & Archive
Backup / Recovery Archive
A secondary copy of information Primary copy of information
Used for recovery operations Available for information retrieval
Improves availability by enabling
application to be restored to a
specific point in time
Adds operational efficiencies by
moving fixed / unstructured content
out of operational environment
Typically short-term (weeks or
months)
Typically long-term (months, years,
or decades)
Data typically overwritten on
periodic basis (e.g., monthly)
Data typically maintained for
analysis, value generation, or
compliance
Not for regulatory compliance—
though some are forced to use
Useful for compliance and should
take into account information-
retention policy
© 2006 EMC Corporation. All rights reserved.
New Architecture for Backup, Recovery & Archive
Understand the environment
Actively archive valuable information to tiered
storage
Back up active production information to disk
Retrieve from archive or recover from backup
Backup
Process
Archive
ProcessProduction
1
3
4
2
4
© 2006 EMC Corporation. All rights reserved.
Lesson: Summary
Topics in this lesson included:
 The DAS, LAN, SAN, and Mixed topologies.
 Backup media considerations.
© 2006 EMC Corporation. All rights reserved.
Lesson: Managing the Backup Process
Upon completion of this lesson, you be able to:
 Describe features and functions of common
Backup/Recovery applications.
 Describe the Backup/Recovery process management
considerations.
 Describe the importance of the information found in
Backup Reports and in the Backup Catalog.
© 2006 EMC Corporation. All rights reserved.
How a Typical Backup Application Works
 Backup clients are grouped and associated with a Backup
schedule that determines when and which backup type will
occur.
 Groups are associated with Pools, which determine which
backup media will be used.
 Each backup media has a unique label.
 Information about the backup is written to the Backup Catalog
during and after it completes. The Catalog shows:
– when the Backup was performed, and
– which media was used (label).
 Errors and other information is also written to a log.
© 2006 EMC Corporation. All rights reserved.
Backup Application User Interfaces
There are typically two types of user interfaces:
 Command Line Interface – CLI
 Graphical User Interfaces – GUI
© 2006 EMC Corporation. All rights reserved.
Managing the Backup and Restore Process
 Running the B/R Application: Backup
– The backup administrator configures it to be started, most (if not all)
of the times, automatically
– Most backup products offer the ability for the backup client to initiate
their own backup (usually disabled)
 Running the B/R Application: Restore
– There is usually a separate GUI to manage the restore process
– Information is pulled from the backup catalog when the user is
selecting the files to be restored
– Once the selection is finished, the backup server starts reading from
the required backup media, and the files are sent to the backup
client
© 2006 EMC Corporation. All rights reserved.
Backup Reports
 Backup products also offer reporting features.
 These features rely on the backup catalog and log files.
 Reports are meant to be easy to read and provide
important information such as:
– Amount of data backed up
– Number of completed backups
– Number of incomplete backups (failed)
– Types of errors that may have occurred
 Additional reports may be available, depending on the
backup software product used.
© 2006 EMC Corporation. All rights reserved.
Importance of the Backup Catalog
 As you can see, backup operations strongly rely on the
backup catalog
 If the catalog is lost, the backup software alone has no
means to determine where to find a specific file backed
up two months ago, for example
 It can be reconstructed, but this usually means that all of
the backup media (i.e. tapes) have to be read
 It’s a good practice to protect the catalog
– By replicating the file system where it resides to a remote location
– By backing it up
 Some backup products have built-in mechanisms to
protect their catalog (such as automatic backup)
© 2006 EMC Corporation. All rights reserved.
Lesson: Summary
Topics in this lesson included:
 The features and functions of common Backup/Recovery
applications.
 The Backup/Recovery process management
considerations.
 The importance of the information found in Backup
Reports and in the Backup Catalog.
© 2006 EMC Corporation. All rights reserved.
Module Summary
Key points covered in this module:
 The best practices for planning Backup and Recovery.
 The common media and types of data that are part of a
Backup and Recovery strategy.
 The common Backup and Recovery topologies.
 The Backup and Recovery Process.
 Management considerations for Backup and Recovery.
© 2006 EMC Corporation. All rights reserved.
Check Your Knowledge
 What are three reasons for doing a Backup plan?
 What are the three topologies that support creating a
Backup set?
 What are the advantages and disadvantages of using
tape as the Backup media?
 What are the three levels of granularity found in
Backups?

© 2006 EMC Corporation. All rights reserved.
Apply Your Knowledge…
Upon completion of this topic, you will be able to:
 Describe EMC’s product implementation of a Backup
and Recovery solution.
© 2006 EMC Corporation. All rights reserved.
Backup
to disk
Disk-backup
option
Basic
Tape backup
and recovery
Advanced
backup
Snapshot
management
Remove risk
Faster and more consistent data backup
Improve reliability
Keep recovery copies fresh and reduce
process errors
Lower total cost of
ownership
Centralization and ease of use Low SERVICE-LEVEL REQUIREMENTS High
Tiered Protection and Recovery Management
EMC NetWorker
© 2006 EMC Corporation. All rights reserved.
 Enterprise protection
– Critical applications
– Heterogeneous platforms and
storage
– Scalable architecture
– 256-bit AES encryption and secure
authentication
 Centralized management
– Graphical user interface
– Customizable reporting
– Wizard-driven configuration
 Performance
– Data multiplexing
– Advanced indexing
– Efficient media management
Solution Features
Tape
library
Basic Architecture
Heterogeneous
clients
Backup
server
Key
applications
LAN
SAN
NAS
(NDMP)
Storage
Node
NetWorker Backup and Recovery
© 2006 EMC Corporation. All rights reserved.
Critical Application and Database Protection
Offline (Cold)
Integration with application APIs
for backup and recovery
Backup without Application
Modules
Backup with NetWorker
Application Modules
Shut down
application
Restart
application
Back up
application
Application
SAVE
Application
DOWNTIME
Application
NetWorkerMODULE
24x7OPERATIONS
© 2006 EMC Corporation. All rights reserved.
NetWorker
UNIX/Linux
NetWorker
Windows
 Open Tape Format
– Datastream multiplexing
– Self-contained indexing
– Cross-platform format
 UNIX  Windows  Linux
– Minimize impact of tape corruption
 Dynamic drive sharing
– Cross-platform tape-drive sharing
– On-demand device usage
– Reduce hardware total cost of
ownership
Media-Management Advantages
© 2006 EMC Corporation. All rights reserved.
Disk-
backup
target
NetWorker DiskBackup Option
 High performance
– Simultaneous-access operations
– No penalty on restore versus tape
 Policy-based migration of data
from disk to tape
– Automated staging and cloning
– Up to 50% faster
– Clone backups jobs as they
complete
– Reduce wear and tear on tape
drives and cartridges
 Superior capability
– Operational backup and recovery
for all clients, including NAS with
NDMP
– Direct file access for fast recovery
Tape
library
Backup-to-Disk Architecture
Heterogeneous
clients
Backup
server
Key
applications
LAN
NAS Storage
Node
SAN
© 2006 EMC Corporation. All rights reserved.
Advanced Backup - Snapshots and CDP
 Integration of backup with snapshots, full-volume mirrors,
and Continuous Data Protection (CDP)
 Instant restore
 Off-host backups
 Achieve stringent recovery-time objectives (RTOs),
recovery-point objectives (RPOs)
It is expected that snapshot
technology for data protection will
surpass backup to tape as the trend
in data protection as organizations
continue to focus on recovery times
Production
information
Recover
Backup
Production
server
Backup
server
Snapshot
11:00 a.m.
Snapshot
5:00 p.m.
Backup snap
10:00 p.m.
© 2006 EMC Corporation. All rights reserved.
 Policy-based management
– Administer snapshots in
NetWorker
– Schedule, create, retain, and
delete snapshots by policy
 Third-party integration
– Leverage third-party replication
technology
 Array-based (Symmetrix DMX,
CLARiiON CX, etc.)
 Software-based (RecoverPoint)
 Application recovery
– Integration with Application
Modules to ensure consistent
state
 Exchange / SQL / Oracle / SAP
NetWorker PowerSnap Module
CLARiiON
with
SnapView
Tape
library
Advanced Backup
Heterogeneous
clients
Backup
server
Key
applications
LAN
SAN
NAS Storage
Node
© 2006 EMC Corporation. All rights reserved.
 Block-level backups
– Host-based snapshot
– Targeted at high-density file
systems
– Single-file restore
– Sparse backups
 High performance
– Significant backup-and-restore
performance impact—up to 10
times faster
– Drive tape at rated speeds
– Optional network-accelerated
serverless backup with Cisco
intelligent switch
NetWorker SnapImage Module
1,000,000+ directories
10,000,000+ files
Advanced Backup
© 2006 EMC Corporation. All rights reserved.
Solution Example: Major Telecom Company
Value Proposition
Zero backup window for
applications
Eliminated data-loss risk
Reduced management
overhead
Business Challenge:
 Complex application
environment
 No backup window
 Recovery-time objective:
Restore 24 TB in two
hours
Enterprise-Information Protection
Solution:
 NetWorker PowerSnap with
Symmetrix and TimeFinder/Snap
– Server-free backup
 NetWorker DiskBackup Option with
CLARiiON with ATA disks
– Rapid primary-site protection
 NetWorker and SRDF/S
– Disaster recovery
– Offsite protection
55
Disaster-Recovery Site Production Site
Symmetrix
DMX
Application
host
NetWorker
Storage Node
PowerSnap
Disaster-
recovery host
CLARiiON
CX
Symmetrix
DMX
Storage Node
Tape
library SAN
SAN Tape
library
SRDF/S

More Related Content

What's hot

Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recoverycatacutanjcsantos
 
Backing Up and Recovery
Backing Up and RecoveryBacking Up and Recovery
Backing Up and RecoveryMaham Huda
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdfAshraf Hossain
 
Backup policy template julie bozzi oregon
Backup policy template   julie bozzi oregonBackup policy template   julie bozzi oregon
Backup policy template julie bozzi oregonJulie Bozzi, PfPM, PMP
 
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesDeep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesVeritas Technologies LLC
 
Backup & recovery with rman
Backup & recovery with rmanBackup & recovery with rman
Backup & recovery with rmanitsabidhussain
 
Database backup and recovery basics
Database backup and recovery basicsDatabase backup and recovery basics
Database backup and recovery basicsShahed Mohamed
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsMayank Chaudhari
 
06. security concept
06. security concept06. security concept
06. security conceptMuhammad Ahad
 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016Hameda Hurmat
 
Windows Server 2019.pptx
Windows Server 2019.pptxWindows Server 2019.pptx
Windows Server 2019.pptxmasbulosoke
 
Backup and recovery in oracle
Backup and recovery in oracleBackup and recovery in oracle
Backup and recovery in oraclesadegh salehi
 
VMware Site Recovery Manager
VMware Site Recovery ManagerVMware Site Recovery Manager
VMware Site Recovery ManagerJürgen Ambrosi
 

What's hot (20)

Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recovery
 
Backing Up and Recovery
Backing Up and RecoveryBacking Up and Recovery
Backing Up and Recovery
 
Backup strategy
Backup strategyBackup strategy
Backup strategy
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdf
 
Backup policy template julie bozzi oregon
Backup policy template   julie bozzi oregonBackup policy template   julie bozzi oregon
Backup policy template julie bozzi oregon
 
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesDeep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
 
Backup & recovery with rman
Backup & recovery with rmanBackup & recovery with rman
Backup & recovery with rman
 
Database backup and recovery basics
Database backup and recovery basicsDatabase backup and recovery basics
Database backup and recovery basics
 
Backup Exec 21
Backup Exec 21Backup Exec 21
Backup Exec 21
 
Storage basics
Storage basicsStorage basics
Storage basics
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensics
 
06. security concept
06. security concept06. security concept
06. security concept
 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016
 
Storage system architecture
Storage system architectureStorage system architecture
Storage system architecture
 
Windows Server 2019.pptx
Windows Server 2019.pptxWindows Server 2019.pptx
Windows Server 2019.pptx
 
Storage Basics
Storage BasicsStorage Basics
Storage Basics
 
Backup and recovery in oracle
Backup and recovery in oracleBackup and recovery in oracle
Backup and recovery in oracle
 
Active directory backup
Active directory backupActive directory backup
Active directory backup
 
VMware Site Recovery Manager
VMware Site Recovery ManagerVMware Site Recovery Manager
VMware Site Recovery Manager
 
07. datacenters
07. datacenters07. datacenters
07. datacenters
 

Similar to 03 backup-and-recovery

Oaklands college: Protecting your data.
Oaklands college: Protecting your data.Oaklands college: Protecting your data.
Oaklands college: Protecting your data.JISC RSC Eastern
 
MySQL Enterprise Backup & Oracle Secure Backup
MySQL Enterprise Backup &  Oracle Secure BackupMySQL Enterprise Backup &  Oracle Secure Backup
MySQL Enterprise Backup & Oracle Secure BackupSanjay Manwani
 
IT Backup & Restoration: Never Worry about a Late Backup Again
IT Backup & Restoration: Never Worry about a Late Backup AgainIT Backup & Restoration: Never Worry about a Late Backup Again
IT Backup & Restoration: Never Worry about a Late Backup AgainHelpSystems
 
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...CTI Group
 
Backup_exadata_update
Backup_exadata_updateBackup_exadata_update
Backup_exadata_updateFran Navarro
 
Fundamentals of storage Unit III Backup and Recovery.ppt
Fundamentals of storage Unit III Backup and Recovery.pptFundamentals of storage Unit III Backup and Recovery.ppt
Fundamentals of storage Unit III Backup and Recovery.pptRahul Borate
 
MySQL Enterprise Backup - BnR Scenarios
MySQL Enterprise Backup - BnR ScenariosMySQL Enterprise Backup - BnR Scenarios
MySQL Enterprise Backup - BnR ScenariosKeith Hollman
 
Backing Up the MySQL Database
Backing Up the MySQL DatabaseBacking Up the MySQL Database
Backing Up the MySQL DatabaseSanjay Manwani
 
M. Rafaat_EMC_Presentation
M. Rafaat_EMC_PresentationM. Rafaat_EMC_Presentation
M. Rafaat_EMC_PresentationMohamed Raafat
 
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMPEMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMPEMC
 
Ibm spectrum scale_backup_n_archive_v03_ash
Ibm spectrum scale_backup_n_archive_v03_ashIbm spectrum scale_backup_n_archive_v03_ash
Ibm spectrum scale_backup_n_archive_v03_ashAshutosh Mate
 
The Sun ZFS Backup Appliance
The Sun ZFS Backup ApplianceThe Sun ZFS Backup Appliance
The Sun ZFS Backup Applianceomnidba
 
Fulcrum Group Storage And Storage Virtualization Presentation
Fulcrum Group Storage And Storage Virtualization PresentationFulcrum Group Storage And Storage Virtualization Presentation
Fulcrum Group Storage And Storage Virtualization PresentationSteve Meek
 
Emc data domain technical deep dive workshop
Emc data domain  technical deep dive workshopEmc data domain  technical deep dive workshop
Emc data domain technical deep dive workshopsolarisyougood
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
Data protection for oracle databases
Data protection for oracle databasesData protection for oracle databases
Data protection for oracle databasessolarisyougood
 
EMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed ReviewEMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed ReviewEMC
 
Presentation recovery manager (rman) configuration and performance tuning ...
Presentation    recovery manager (rman) configuration and performance tuning ...Presentation    recovery manager (rman) configuration and performance tuning ...
Presentation recovery manager (rman) configuration and performance tuning ...xKinAnx
 

Similar to 03 backup-and-recovery (20)

Oaklands college: Protecting your data.
Oaklands college: Protecting your data.Oaklands college: Protecting your data.
Oaklands college: Protecting your data.
 
MySQL Enterprise Backup & Oracle Secure Backup
MySQL Enterprise Backup &  Oracle Secure BackupMySQL Enterprise Backup &  Oracle Secure Backup
MySQL Enterprise Backup & Oracle Secure Backup
 
IT Backup & Restoration: Never Worry about a Late Backup Again
IT Backup & Restoration: Never Worry about a Late Backup AgainIT Backup & Restoration: Never Worry about a Late Backup Again
IT Backup & Restoration: Never Worry about a Late Backup Again
 
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
 
Backup_exadata_update
Backup_exadata_updateBackup_exadata_update
Backup_exadata_update
 
Les 02 config
Les 02 configLes 02 config
Les 02 config
 
Fundamentals of storage Unit III Backup and Recovery.ppt
Fundamentals of storage Unit III Backup and Recovery.pptFundamentals of storage Unit III Backup and Recovery.ppt
Fundamentals of storage Unit III Backup and Recovery.ppt
 
MySQL Enterprise Backup - BnR Scenarios
MySQL Enterprise Backup - BnR ScenariosMySQL Enterprise Backup - BnR Scenarios
MySQL Enterprise Backup - BnR Scenarios
 
Backing Up the MySQL Database
Backing Up the MySQL DatabaseBacking Up the MySQL Database
Backing Up the MySQL Database
 
M. Rafaat_EMC_Presentation
M. Rafaat_EMC_PresentationM. Rafaat_EMC_Presentation
M. Rafaat_EMC_Presentation
 
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMPEMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
 
Emc data domain
Emc data domainEmc data domain
Emc data domain
 
Ibm spectrum scale_backup_n_archive_v03_ash
Ibm spectrum scale_backup_n_archive_v03_ashIbm spectrum scale_backup_n_archive_v03_ash
Ibm spectrum scale_backup_n_archive_v03_ash
 
The Sun ZFS Backup Appliance
The Sun ZFS Backup ApplianceThe Sun ZFS Backup Appliance
The Sun ZFS Backup Appliance
 
Fulcrum Group Storage And Storage Virtualization Presentation
Fulcrum Group Storage And Storage Virtualization PresentationFulcrum Group Storage And Storage Virtualization Presentation
Fulcrum Group Storage And Storage Virtualization Presentation
 
Emc data domain technical deep dive workshop
Emc data domain  technical deep dive workshopEmc data domain  technical deep dive workshop
Emc data domain technical deep dive workshop
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Data protection for oracle databases
Data protection for oracle databasesData protection for oracle databases
Data protection for oracle databases
 
EMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed ReviewEMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed Review
 
Presentation recovery manager (rman) configuration and performance tuning ...
Presentation    recovery manager (rman) configuration and performance tuning ...Presentation    recovery manager (rman) configuration and performance tuning ...
Presentation recovery manager (rman) configuration and performance tuning ...
 

Recently uploaded

Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 

Recently uploaded (20)

Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 

03 backup-and-recovery

  • 1. © 2006 EMC Corporation. All rights reserved. Backup and Recovery Module 4.2
  • 2. © 2006 EMC Corporation. All rights reserved. Backup and Recovery Upon completion of this module, you will be able to:  Describe best practices for planning Backup and Recovery.  Describe the common media and types of data that are part of a Backup and Recovery strategy.  Describe the common Backup and Recovery topologies.  Describe the Backup and Recovery Process.  Describe Management considerations for Backup and Recovery.
  • 3. © 2006 EMC Corporation. All rights reserved. In this module … This module contains the following lessons:  Planning for Backup and Recovery  Backup and Recovery Methods  Backup Architecture Topologies  Managing the Backup Process
  • 4. © 2006 EMC Corporation. All rights reserved. Lesson: Planning for Backup and Recovery Upon completion of this lesson, you be able to:  Define Backup and Recovery.  Describe common reasons for a Backup and Recovery plan.  Describe the business considerations for Backup and Recovery.  Define RPO and RTO.  Describe the data considerations for Backup and Recovery  Describe the planning for Backup and Recovery.
  • 5. © 2006 EMC Corporation. All rights reserved. What is a Backup?  Backup is an additional copy of data that can be used for restore and recovery purposes.  The Backup copy is used when the primary copy is lost or corrupted.  This Backup copy can be created as a: – Simple copy (there can be one or more copies) – Mirrored copy (the copy is always updated with whatever is written to the primary copy.)
  • 6. © 2006 EMC Corporation. All rights reserved. Backup and Recovery Strategies Several choices are available to get the data to the backup media such as:  Copy the data.  Mirror (or snapshot) then copy.  Remote backup.  Copy then duplicate or remote copy.
  • 7. © 2006 EMC Corporation. All rights reserved. It’s All About Recovery!  Businesses back up their data to enable its recovery in case of potential loss.  Businesses also back up their data to comply with regulatory requirements.  Types of backup derivatives: – Disaster Recovery – Archival – Operational
  • 8. © 2006 EMC Corporation. All rights reserved. Reasons for a Backup Plan  Hardware Failures  Human Factors  Application Failures  Security Breaches  Disasters  Regulatory and Business Requirements
  • 9. © 2006 EMC Corporation. All rights reserved. How does Backup Work?  Client/Server Relationship  Server – Directs Operation – Maintains the Backup Catalog  Client – Gathers Data for Backup (a backup client sends backup data to a backup server or storage node).  Storage Node
  • 10. © 2006 EMC Corporation. All rights reserved. How does Backup Work, continued Disk Storage Tape Backup Data Set Metadata Catalog Backup Server & Storage Node Servers Backup Clients Clients
  • 11. © 2006 EMC Corporation. All rights reserved. Business Considerations  Customer business needs determine: – What are the restore requirements – RPO & RTO? – Where and when will the restores occur? – What are the most frequent restore requests? – Which data needs to be backed up? – How frequently should data be backed up?  hourly, daily, weekly, monthly – How long will it take to backup? – How many copies to create? – How long to retain backup copies?
  • 12. © 2006 EMC Corporation. All rights reserved. Data Considerations: File Characteristics  Location  Size  Number
  • 13. © 2006 EMC Corporation. All rights reserved. Data Considerations: Data Compression Compressibility depends on the data type, for example:  Application binaries – do not compress well.  Text – compresses well.  JPEG/ZIP files – are already compressed and expand if compressed again.
  • 14. © 2006 EMC Corporation. All rights reserved. Data Considerations: Retention Periods  Operational – Data sets on primary media (disk) up to the point where most restore requests are satisfied, then moved to secondary storage (tape).  Disaster Recovery – Driven by the organization’s disaster recovery policy  Portable media (tapes) sent to an offsite location / vault.  Replicated over to an offsite location (disk).  Backed up directly to the offsite location (disk, tape or emulated tape).  Archiving – Driven by the organization’s policy. – Dictated by regulatory requirements.
  • 15. © 2006 EMC Corporation. All rights reserved. Lesson: Summary Topics in this lesson included:  Backup and Recovery definitions and examples.  Common reasons for Backup and Recovery.  The business considerations for Backup and Recovery.  Recovery Point Objectives and Recovery Time Objectives.  The data considerations for Backup and Recovery  The planning for Backup and Recovery.
  • 16. © 2006 EMC Corporation. All rights reserved. Lesson: Backup and Recovery Methods Upon completion of this lesson, you be able to:  Describe Hot and Cold Backups.  Describe the levels of Backup Granularity.
  • 17. © 2006 EMC Corporation. All rights reserved. Database Backup Methods  Hot Backup: production is not interrupted.  Cold Backup: production is interrupted.  Backup Agents manage the backup of different data types such as: – Structured (such as databases) – Semi-structured (such as email) – Unstructured (file systems)
  • 18. © 2006 EMC Corporation. All rights reserved. Backup Granularity and Levels Full Backup Cumulative (Differential) Incremental Full Cumulative Incremental
  • 19. © 2006 EMC Corporation. All rights reserved. Files 1, 2, 3, 4, 5 Production Restoring an Incremental Backup  Key Features – Files that have changed since the last full or incremental backup are backed up. – Fewest amount of files to be backed up, therefore faster backup and less storage space. – Longer restore because last full and all subsequent incremental backups must be applied. Incremental Tuesday File 4 Incremental Wednesday File 3 Incremental Thursday File 5Files 1, 2, 3 Monday Full Backup
  • 20. © 2006 EMC Corporation. All rights reserved. Restoring a Cumulative Backup  Key Features – More files to be backed up, therefore it takes more time to backup and uses more storage space. – Much faster restore because only the last full and the last cumulative backup must be applied. Files 1, 2, 3, 4, 5, 6 Production Cumulative Tuesday File 4Files 1, 2, 3 Monday Full Backup Cumulative Wednesday Files 4, 5 Cumulative Thursday Files 4, 5, 6
  • 21. © 2006 EMC Corporation. All rights reserved. Lesson: Summary Topics in this lesson included:  Hot and Cold Backups.  The levels of Backup Granularity.
  • 22. © 2006 EMC Corporation. All rights reserved. Lesson: Backup Architecture Topologies Upon completion of this lesson, you be able to:  Describe DAS, LAN, SAN, Mixed topologies.  Describe backup media considerations.
  • 23. © 2006 EMC Corporation. All rights reserved. Backup Architecture Topologies  There are 3 basic backup topologies: – Direct Attached Based Backup – LAN Based Backup – SAN Based Backup  These topologies can be integrated, forming a “mixed” topology
  • 24. © 2006 EMC Corporation. All rights reserved. Direct Attached Based Backups Catalog Backup Server LAN Metadata Media BackupStorage Node Backup Client Data
  • 25. © 2006 EMC Corporation. All rights reserved. LAN Based Backups Backup Server Storage Node LAN Metadata Storage Node Data Mail Server Backup Client Database Server Backup Client Metadata Data
  • 26. © 2006 EMC Corporation. All rights reserved. SAN Based Backups (LAN Free) LAN Metadata Storage Node Backup Client Data Mail Server SAN Backup Server Data Backup Device
  • 27. © 2006 EMC Corporation. All rights reserved. SAN/LAN Mixed Based Backups LAN Metadata Storage Node Data Mail Server Backup Client Database Server Backup Client Data SAN Backup Server Data Backup Device
  • 28. © 2006 EMC Corporation. All rights reserved. Backup Media  Tape – Traditional destination for backups – Sequential access – No protection  Disk – Random access – Protected by the storage array (RAID, hot spare, etc)
  • 29. © 2006 EMC Corporation. All rights reserved. Multiple Streams on Tape Media  Multiple streams interleaved to achieve higher throughput on tape – Keeps the tape streaming, for maximum write performance – Helps prevent tape mechanical failure – Greatly increases time to restore Tape Data from Stream 1 Data from Stream 2 Data from Stream 3
  • 30. © 2006 EMC Corporation. All rights reserved. Backup to Disk  Backup to disk minimizes tape in backup environments by using disk as the primary destination device – Cost benefits – No processes changes needed – Better service levels  Backup to disk aligns backup strategy to RTO and RPO
  • 31. © 2006 EMC Corporation. All rights reserved. Tape versus Disk – Restore Comparison Typical Scenario:  800 users, 75 MB mailbox  60 GB database Source: EMC Engineering and EMC IT *Total time from point of failure to return of service to e-mail users 31 0 10 20 30 40 50 60 70 80 90 100 120110 Recovery Time in Minutes* Tape Backup / Restore Disk Backup / Restore 108 Minutes 24 Minutes
  • 32. © 2006 EMC Corporation. All rights reserved. Three Backup / Restore Solutions based on RTO  Time of last image dictates the log playback time  Larger data sets extend the recovery time (ATA and tape) *Total time from point of failure to return of service to e-mail users 0 10 20 30 40 50 60 70 80 90 100 120110 Recovery Time in Minutes* Backup on tape Backup on ATA 108 Min. 24 Min. Typical Scenario:  800 users, 75 MB mailbox  60 GB DB – restore time  500 MB logs – log playback 130 Local Replica / Clone 2 Min. 41 Minutes 19 Minutes 125 Minutes 17 Min. 17 Min. 17 Min. Restore time Log playback
  • 33. © 2006 EMC Corporation. All rights reserved. Traditional Backup, Recovery and Archive Approach  Production environment grows – Requires constant tuning and data placement to maintain performance – Need to add more tier-1 storage  Backup environment grows – Backup windows get longer and jobs do not complete – Restores take longer – Requires more tape drives and silos to keep up with service levels  Archive environment grows – Impact flexibility to retrieve content when requested – Requires more media, adding management cost – No investment protection for long term retention requirements Backup Process Archive Process Production
  • 34. © 2006 EMC Corporation. All rights reserved. Differences Between Backup / Recovery & Archive Backup / Recovery Archive A secondary copy of information Primary copy of information Used for recovery operations Available for information retrieval Improves availability by enabling application to be restored to a specific point in time Adds operational efficiencies by moving fixed / unstructured content out of operational environment Typically short-term (weeks or months) Typically long-term (months, years, or decades) Data typically overwritten on periodic basis (e.g., monthly) Data typically maintained for analysis, value generation, or compliance Not for regulatory compliance— though some are forced to use Useful for compliance and should take into account information- retention policy
  • 35. © 2006 EMC Corporation. All rights reserved. New Architecture for Backup, Recovery & Archive Understand the environment Actively archive valuable information to tiered storage Back up active production information to disk Retrieve from archive or recover from backup Backup Process Archive ProcessProduction 1 3 4 2 4
  • 36. © 2006 EMC Corporation. All rights reserved. Lesson: Summary Topics in this lesson included:  The DAS, LAN, SAN, and Mixed topologies.  Backup media considerations.
  • 37. © 2006 EMC Corporation. All rights reserved. Lesson: Managing the Backup Process Upon completion of this lesson, you be able to:  Describe features and functions of common Backup/Recovery applications.  Describe the Backup/Recovery process management considerations.  Describe the importance of the information found in Backup Reports and in the Backup Catalog.
  • 38. © 2006 EMC Corporation. All rights reserved. How a Typical Backup Application Works  Backup clients are grouped and associated with a Backup schedule that determines when and which backup type will occur.  Groups are associated with Pools, which determine which backup media will be used.  Each backup media has a unique label.  Information about the backup is written to the Backup Catalog during and after it completes. The Catalog shows: – when the Backup was performed, and – which media was used (label).  Errors and other information is also written to a log.
  • 39. © 2006 EMC Corporation. All rights reserved. Backup Application User Interfaces There are typically two types of user interfaces:  Command Line Interface – CLI  Graphical User Interfaces – GUI
  • 40. © 2006 EMC Corporation. All rights reserved. Managing the Backup and Restore Process  Running the B/R Application: Backup – The backup administrator configures it to be started, most (if not all) of the times, automatically – Most backup products offer the ability for the backup client to initiate their own backup (usually disabled)  Running the B/R Application: Restore – There is usually a separate GUI to manage the restore process – Information is pulled from the backup catalog when the user is selecting the files to be restored – Once the selection is finished, the backup server starts reading from the required backup media, and the files are sent to the backup client
  • 41. © 2006 EMC Corporation. All rights reserved. Backup Reports  Backup products also offer reporting features.  These features rely on the backup catalog and log files.  Reports are meant to be easy to read and provide important information such as: – Amount of data backed up – Number of completed backups – Number of incomplete backups (failed) – Types of errors that may have occurred  Additional reports may be available, depending on the backup software product used.
  • 42. © 2006 EMC Corporation. All rights reserved. Importance of the Backup Catalog  As you can see, backup operations strongly rely on the backup catalog  If the catalog is lost, the backup software alone has no means to determine where to find a specific file backed up two months ago, for example  It can be reconstructed, but this usually means that all of the backup media (i.e. tapes) have to be read  It’s a good practice to protect the catalog – By replicating the file system where it resides to a remote location – By backing it up  Some backup products have built-in mechanisms to protect their catalog (such as automatic backup)
  • 43. © 2006 EMC Corporation. All rights reserved. Lesson: Summary Topics in this lesson included:  The features and functions of common Backup/Recovery applications.  The Backup/Recovery process management considerations.  The importance of the information found in Backup Reports and in the Backup Catalog.
  • 44. © 2006 EMC Corporation. All rights reserved. Module Summary Key points covered in this module:  The best practices for planning Backup and Recovery.  The common media and types of data that are part of a Backup and Recovery strategy.  The common Backup and Recovery topologies.  The Backup and Recovery Process.  Management considerations for Backup and Recovery.
  • 45. © 2006 EMC Corporation. All rights reserved. Check Your Knowledge  What are three reasons for doing a Backup plan?  What are the three topologies that support creating a Backup set?  What are the advantages and disadvantages of using tape as the Backup media?  What are the three levels of granularity found in Backups? 
  • 46. © 2006 EMC Corporation. All rights reserved. Apply Your Knowledge… Upon completion of this topic, you will be able to:  Describe EMC’s product implementation of a Backup and Recovery solution.
  • 47. © 2006 EMC Corporation. All rights reserved. Backup to disk Disk-backup option Basic Tape backup and recovery Advanced backup Snapshot management Remove risk Faster and more consistent data backup Improve reliability Keep recovery copies fresh and reduce process errors Lower total cost of ownership Centralization and ease of use Low SERVICE-LEVEL REQUIREMENTS High Tiered Protection and Recovery Management EMC NetWorker
  • 48. © 2006 EMC Corporation. All rights reserved.  Enterprise protection – Critical applications – Heterogeneous platforms and storage – Scalable architecture – 256-bit AES encryption and secure authentication  Centralized management – Graphical user interface – Customizable reporting – Wizard-driven configuration  Performance – Data multiplexing – Advanced indexing – Efficient media management Solution Features Tape library Basic Architecture Heterogeneous clients Backup server Key applications LAN SAN NAS (NDMP) Storage Node NetWorker Backup and Recovery
  • 49. © 2006 EMC Corporation. All rights reserved. Critical Application and Database Protection Offline (Cold) Integration with application APIs for backup and recovery Backup without Application Modules Backup with NetWorker Application Modules Shut down application Restart application Back up application Application SAVE Application DOWNTIME Application NetWorkerMODULE 24x7OPERATIONS
  • 50. © 2006 EMC Corporation. All rights reserved. NetWorker UNIX/Linux NetWorker Windows  Open Tape Format – Datastream multiplexing – Self-contained indexing – Cross-platform format  UNIX  Windows  Linux – Minimize impact of tape corruption  Dynamic drive sharing – Cross-platform tape-drive sharing – On-demand device usage – Reduce hardware total cost of ownership Media-Management Advantages
  • 51. © 2006 EMC Corporation. All rights reserved. Disk- backup target NetWorker DiskBackup Option  High performance – Simultaneous-access operations – No penalty on restore versus tape  Policy-based migration of data from disk to tape – Automated staging and cloning – Up to 50% faster – Clone backups jobs as they complete – Reduce wear and tear on tape drives and cartridges  Superior capability – Operational backup and recovery for all clients, including NAS with NDMP – Direct file access for fast recovery Tape library Backup-to-Disk Architecture Heterogeneous clients Backup server Key applications LAN NAS Storage Node SAN
  • 52. © 2006 EMC Corporation. All rights reserved. Advanced Backup - Snapshots and CDP  Integration of backup with snapshots, full-volume mirrors, and Continuous Data Protection (CDP)  Instant restore  Off-host backups  Achieve stringent recovery-time objectives (RTOs), recovery-point objectives (RPOs) It is expected that snapshot technology for data protection will surpass backup to tape as the trend in data protection as organizations continue to focus on recovery times Production information Recover Backup Production server Backup server Snapshot 11:00 a.m. Snapshot 5:00 p.m. Backup snap 10:00 p.m.
  • 53. © 2006 EMC Corporation. All rights reserved.  Policy-based management – Administer snapshots in NetWorker – Schedule, create, retain, and delete snapshots by policy  Third-party integration – Leverage third-party replication technology  Array-based (Symmetrix DMX, CLARiiON CX, etc.)  Software-based (RecoverPoint)  Application recovery – Integration with Application Modules to ensure consistent state  Exchange / SQL / Oracle / SAP NetWorker PowerSnap Module CLARiiON with SnapView Tape library Advanced Backup Heterogeneous clients Backup server Key applications LAN SAN NAS Storage Node
  • 54. © 2006 EMC Corporation. All rights reserved.  Block-level backups – Host-based snapshot – Targeted at high-density file systems – Single-file restore – Sparse backups  High performance – Significant backup-and-restore performance impact—up to 10 times faster – Drive tape at rated speeds – Optional network-accelerated serverless backup with Cisco intelligent switch NetWorker SnapImage Module 1,000,000+ directories 10,000,000+ files Advanced Backup
  • 55. © 2006 EMC Corporation. All rights reserved. Solution Example: Major Telecom Company Value Proposition Zero backup window for applications Eliminated data-loss risk Reduced management overhead Business Challenge:  Complex application environment  No backup window  Recovery-time objective: Restore 24 TB in two hours Enterprise-Information Protection Solution:  NetWorker PowerSnap with Symmetrix and TimeFinder/Snap – Server-free backup  NetWorker DiskBackup Option with CLARiiON with ATA disks – Rapid primary-site protection  NetWorker and SRDF/S – Disaster recovery – Offsite protection 55 Disaster-Recovery Site Production Site Symmetrix DMX Application host NetWorker Storage Node PowerSnap Disaster- recovery host CLARiiON CX Symmetrix DMX Storage Node Tape library SAN SAN Tape library SRDF/S

Editor's Notes

  1. This lesson looks at Backup and Recovery. Backup and Recovery are a major part of the planning for Business Continuity.
  2. The lessons in this course will provide an overview of Backup and Recovery including the business and technical aspects.
  3. This lesson provides an overview of the business drivers for backup and recovery and introduces some of the common terms used when developing a backup and recovery plan.
  4. A Backup is a copy of the online data that resides on primary storage. The backup copy is created and retained for the sole purpose of recovering deleted, broken, or corrupted data on the primary disk. The backup copy is usually retained over a period of time, depending on the type of the data, and on the type of backup. There are three derivatives for backup: disaster recovery, Archival, and operational backup. We will review them in more detail, on the next slide. The data that is backed up may be on such media as disk or tape, depending on the backup derivative the customer is targeting. For example, backing up to disk may be more efficient than tape in operational backup environments.
  5. Several choices are available to get the data written to the backup media. You can simply copy the data from the primary storage to the secondary storage (disk or tape), onsite. This is a simple strategy, easily implemented, but impacts the production server where the data is located, since it will use the server’s resources. This may be tolerated on some applications, but not high demand ones. To avoid an impact on the production application, and to perform serverless backups, you can mirror (or snap) a production volume. For example, you can mount it on a separate server and then copy it to the backup media (disk or tape). This option will completely free up the production server, with the added infrastructure cost associated with additional resources. Remote Backup, can be used to comply with offsite requirements. A copy from the primary storage is done directly to the backup media that is sitting on another site. The backup media can be a real library, a virtual library or even a remote filesystem. You can do a copy to a first set of backup media, which will be kept onsite for operational restore requirements, and then duplicate it to another set of media for offsite purposes. To simplify thr procedure, you can replicate it to an offsite location to remove any manual procedures associated with moving the backup media to another site.
  6. Disaster Recovery addresses the requirement to be able to restore all, or a large part of, an IT infrastructure in the event of a major disaster. Archival is a common requirement used to preserve transaction records, email, and other business work products for regulatory compliance. The regulations could be internal, governmental, or perhaps derived from specific industry requirements. Operational is typically the collection of data for the eventual purpose of restoring, at some point in the future, data that has become lost or corrupted.
  7. Reasons for a backup plan include: Physical damage to a storage element (such as a disk) that can result in data loss. People make mistakes and unhappy employees or external hackers may breach security and maliciously destroy data. Software failures can destroy or lose data and viruses can destroy data, impact data integrity, and halt key operations. Physical security breaches can destroy equipment that contains data and applications. Natural disasters and other events such as earthquakes, lightning strikes, floods, tornados, hurricanes, accidents, chemical spills, and power grid failures can cause not only the loss of data but also the loss of an entire computer facility. Offsite data storage is often justified to protect a business from these types of events. Government regulations may require certain data to be kept for extended timeframes. Corporations may establish their own extended retention policies for intellectual property to protect them against litigation. The regulations and business requirements that drive data as an archive generally require data to be retained at an offsite location.
  8. Backup products vary, but they do have some common characteristics. The basic architecture of a backup system is client-server, with a backup server and some number of backup clients or agents. The backup server directs the operations and owns the backup catalog (the information about the backup). The catalog contains the table-of-contents for the data set. It also contains information about the backup session itself. The backup server depends on the backup client to gather the data to be backed up. The backup client can be local or it can reside on another system, presumably to backup the data visible to that system. A backup server receives backup metadata from backup clients to perform its activities. There is another component called a storage node. The storage node is the entity responsible for writing the data set to the backup device. Typically there is a storage node packaged with the backup server and the backup device is attached directly to the backup server’s host platform. Storage nodes play an important role in backup planning as it can be used to consolidate backup servers.
  9. The following represents a typical Backup process: The Backup Server initiates the backup process (starts the backup application). The Backup Server sends a request to a server to “send me your data”. The server sends the data to the Backup Server and/or Storage Node. The Storage Node sends the data to the tape storage device and the Backup Server begins building the catalog (metadata) of the backup session. When all of the data has been transferred from the server to the Backup Server, the Backup Server writes the catalog to a disk file and closes the connection to the tape device.
  10. Some important decisions that need consideration before implementing a Backup/Restore solution are shown above. Some examples include: The Recovery Point Objective (RPO) The Recovery Time Objective (RTO) The media type to be used (disk or tape) Where and when the restore operations will occur – especially if an alternative host will be used to receive the restore data. When to perform backups. The granularity of backups – Full, Incremental or cumulative. How long to keep the backup – for example, some backups need to be retained for 4 years, others just for 1 month Is it necessary to take copies of the backup or not
  11. Location: Many organizations have dozens of heterogeneous platforms that support a complex application. Consider a data warehouse where data from many sources is fed into the warehouse. When this scenario is viewed as “The Data Warehouse Application”, it easily fits this model. Some of the issues are: How the backups for subsets of the data are synchronized How these applications are restored Size: Backing up a large amount of data that consists of a few big files may have less system overhead than backing up a large number of small files. If a file system contains millions of small files, the very nature of searching the file system structures for changed files can take hours, since the entire file structure is searched. Number: a file system containing one million files with a ten-percent daily change rate will potentially have to create 100,000 entries in the backup catalog. This brings up other issues such as: How a massive file system search impacts the system Search time/Media impact Is there an impact on tape start/stop processing?
  12. Many backup devices such as tape drives, have built-in hardware compression technologies. To effectively use these technologies, it is important to understand the characteristics of the data. Some data, such as application binaries, do not compress well. Text data can compress very well, while other data, such as JPEG and ZIP files, are already compressed.
  13. As mentioned before, there are three types of backup models (Operational, Disaster Recovery, and Archive). Each can be defined by its retention period. Retention Periods are the length of time that a particular version of a dataset is available to be restored. Retention periods are driven by the type of recovery the business is trying to achieve: For operational restore, data sets could be maintained on a disk primary backup storage target for a period of time, where most restore requests are likely to be achieved, and then moved to a secondary backup storage target, such as tape, for long term offsite storage. For disaster recovery, backups must be done and moved to an offsite location. For archiving, requirements usually will be driven by the organization’s policy and regulatory conformance requirements. Tapes can be used for some applications, but for others a more robust and reliable solution, such as disks, may be more appropriate.
  14. In this lesson we reviewed the business and data considerations when planning for Backup and Recovery including: What is a Backup and Recovery? What is the Backup and Recovery process? Business recovery needs RPO Recovery point objectives RTO Recovery time objectives Data characteristics Files, compression, retention
  15. We’ve discussed the importance and considerations for a Backup Plan, now this lesson provides an overview of the different methods for creating a backup set.
  16. Backing up databases can occur useing two different methods: A Hot backup, which means that the application is still up and running, with users accessing it, while backup is taking place. A Cold backup, which means that the application will be shut down for the backup to take place. Most backup applications offer various Backup Agents to do these kinds of operations. There will be different agents for different types of data and applications.
  17. The granularity and levels for backups depend on business needs, and, to some extent, technological limitations. Some backup strategies define as many as ten levels of backup. IT organizations use a combination of these to fulfill their requirements. Most use some combination of Full, Cumulative, and Incremental backups. A Full backup is a backup of all data on the target volumes, regardless of any changes made to the data itself. An Incremental backup contains the changes since the last backup, of any type, whichever was most recent. A Cumulative backup, also known as a Differential backup, is a type of incremental that contains changes made to a file since the last full backup.
  18. Following is an example of an incremental backup and restore: A full backup of the business data is taken on Monday evening. Each day after that, an incremental backup is taken. These incremental backups only backup files that are new or that have changed since the last full or incremental backup. On Tuesday, a new file is added, File 4. No other files have changed. Since File 4 is a new file added after the previous backup on Monday evening, it will be backed up Tuesday evening. On Wednesday, there are no new files added since Tuesday, but File 3 has changed. Since File 3 was changed after the previous evening backup (Tuesday), it will be backed up Wednesday evening. On Thursday, no files have changed but a new file has been added, File 5. Since File 5 was added after the previous evening backup, it will be backed up Thursday evening. On Friday morning, there is a data corruption, so the data must be restored from tape. The first step is to restore the full backup from Monday evening. Then, every incremental backup that was done since the last full backup must be applied, which, in this example, means the: Tuesday, Wednesday, and Thursday incremental backups.
  19. The following is an example of cumulative backup and restore: A full backup of the data is taken on Monday evening. Each day after that, a cumulative backup is taken. These cumulative backups backup ALL FILES that have changed since the LAST FULL BACKUP. On Tuesday, File 4 is added. Since File 4 is a new file that has been added since the last full backup, it will be backed up Tuesday evening. On Wednesday, File 5 is added. Now, since both File 4 and File 5 are files that have been added or changed since the last full backup, both files will be backed up Wednesday evening. On Thursday, File 6 is added. Again, File 4, File 5, and File 6 are files that have been added or changed since the last full backup; all three files will be backed up Thursday evening. On Friday morning, there is a corruption of the data, so the data must be restored from tape. The first step is to restore the full backup from Monday evening. Then, only the backup from Thursday evening is restored because it contains all the new/changed files from Tuesday, Wednesday, and Thursday.
  20. This lesson provided an introduction to Backup methods and granularity levels.
  21. So far, we have discussed the importance of the Backup plan and the different methods used when creating a backup set. This lesson provides an overview of the different topologies and media types that are used to support creating a backup set.
  22. There are three basic topologies that are used in a backup environment: Direct Attached Based Backup, LAN Based Backup, and SAN Based Backup. There is also a fourth topology, called “Mixed”, which is formed when mixing two or more of these topologies in a given situation.
  23. Here, the backup data flows directly from the host to be backed up to the tape, without utilizing the LAN. In this model, there is no centralized management and it is difficult to grow the environment.
  24. In this model, the backup data flows from the host to be backed up to the tape through the LAN. There is centralized management, but there may be an issue with the LAN utilization since all data goes through it.
  25. A SAN based backup, also known as LAN Free backup, is achieved when there is no backup data movement over the LAN. In this case, all backup data travels through a SAN to the destination backup device. This type of backup still requires network connectivity from the Storage Node to the Backup Server, since metadata always has to travel through the LAN.
  26. A SAN/LAN Mixed Based Backup environment is achieved by using two or more of the topologies described in the previous slides. In this example, some servers are SAN based while others are LAN based.
  27. Tape drive streaming is recommended from all vendors, in order to keep the drive busy. If you do not keep the drive busy during the backup process (writing), performance will suffer. Multiple streaming helps to improve performance drastically, but it generates one issue as well: the backup data becomes interleaved, and thus the recovery times are increased.
  28. Backup to disk replaces tape and its associated devices, as the primary target for backup, with disk. Backup to disk systems offer major advantages over equivalent scale tape systems, in terms of capital costs, operating costs, support costs, and quality of service. It can be implemented fully on day 1 or over a phased approach.
  29. This example shows a typical recovery scenario using tape and disk. As you can see, recovery with disk provides much faster recovery than does recovery with tape.
  30. The diagram shows typical recovery scenarios using different technical solutions. As you can see recovery with a Local Replica or clones provides the quickest recovery method. It is important to note that using clones on Disk, enables you to be able to make more copies of your data more often. This will improve RPO (the point from which they can recover). It will also improve RTO because the log files will be smaller and that will reduce the log playback time.
  31. In a traditional approach for backup and archive, businesses take a backup of production. Typically backup jobs use weekly full backups and nightly incremental backups. Based on business requirements, they will then copy the backup jobs and eject the tapes to have them sent offsite, where they will be stored for a specified amount of time. The problem with this approach is simple - as the production environment grows, so does the backup environment.
  32. Backup/Recovery and Archiving support different business and goals. This slide compares and contrasts some of the differences that are significant.
  33. The recovery process is much more important than the backup process. It is based on the appropriate recovery-point objectives (RPOs) and recovery-time objectives (RTOs). The process usually drives a decision to have a combination of technologies in place, from online local replicas, to backup to disk, to backup to tape for long-term, passive RPOs. Archive processes are determined not only by the required retention times, but also by retrieval-time service levels and the availability requirements of the information in the archive. For both processes, a combination of hardware and software is needed to deliver the appropriate service level. The best way to discover the appropriate service level is to classify the data and align the business applications with it.
  34. This lesson provided an overview of the different topologies and media types that support creating a backup set.
  35. We have discussed the planning and operations of creating a Backup. Now, this lesson provides an overview of Management activities and applications that help manage the Backup and Recovery process.
  36. This lesson provided an overview of Backup and Recovery management activities and tools.
  37. This lesson looked at Backup and Recovery. Backup and Recovery are a major part of the planning for Business Continuity.
  38. NetWorker’s installed base of more than 20,000 customers worldwide is a testament to the product’s market leadership. Data-growth rates are accelerating, and the spectrum of data and systems that live in environments runs the gamut from key applications that are central to the business to other types of information that may be less important. What is interesting is that the industry has been somewhat stuck for several years at a one-size-fits-all strategy to backup and recovery. We’re referring to a “basic” backup scenario, or traditional tape backup. Tape backup serves a noble purpose and is working very well for some companies—it’s been EMC’s core business for some time, so EMC knows it well. But shifting market dynamics, as well as more demanding business environments, have lead to other important choices for backup. Today, traditional tape faces the challenge of meeting service-level requirements for protection and availability of an ever-increasing quantity of enterprise data. This is why EMC has built into NetWorker key options to meet the needs of a wide range of environments. This includes the ability to use disk for backup, as well as to take advantage of advanced-backup capabilities that connect backup with array-based snapshot and replication management. These provide you with essentially the highest-possible performance levels for backup and recovery. As the value of information changes over time, you may choose any one of these, or a combination thereof, to meet your needs.
  39. The first key focus is on providing complete coverage. Enterprise protection means the ability to provide coverage for all the components in the environment. NetWorker provides data protection for the widest heterogeneous support of operating systems, and is integrated with leading databases and applications for complete data protection. A single NetWorker server can be used to protect all clients and servers in the environment—or secondary servers can be employed, which EMC calls Storage Nodes, as a conduit for additional processing power or to protect large critical servers directly across a SAN without having to take data back over the network. Such LAN-free backup is standard with NetWorker. NetWorker can easily back up environments in LAN, SAN, or WAN environments, with coverage for key storage such as NAS. As a matter of fact, NetWorker’s NAS-protection capabilities, leveraging the Network Data Management Protocol (NDMP), are unequaled. The key here is that NetWorker can easily grow and scale as needed in the environment and provide advanced functionality, including clustering technologies, open-file protection and compatibility with tape hardware and the new class of virtual-tape and virtual-disk libraries. While NetWorker encompasses all these pieces in the environment, EMC has made sure there is a common set of management tools. With NetWorker, EMC has focused on what it takes within environments both large and small to get the best performance possible, in terms of both speed and reliability. This means the inclusion of capabilities such as multiplexing to protect data as quickly as possible while making use of the backup storage’s maximum bandwidth. It also means ensuring that the way in which EMC indexes and manages the saving of data is designed to provide not only the best performance, but also stability and reliability.
  40. Applications can be backed up either offline or online. NetWorker by itself can back up closed applications as flat files. During an offline, or cold, backup, the application is shut down, backed up and restarted after the backup is finished. This is fine, but during the shutdown and backup period, the application will be unavailable. This is not acceptable in today’s business environments. This is why EMC has worked to integrate NetWorker with applications to provide online backup—specifically, with the use of NetWorker in conjunction with NetWorker Modules. During an online, or hot, backup, the application is open and is backed up while open. The NetWorker Module extracts data for backup with an API; the application need not be shut down, and remains open while the backup finishes. NetWorker supports a wide range of applications for online backup with granular-level recovery, including: Oracle Microsoft Exchange Microsoft SQL Server Lotus Notes Sybase Informix IBM DB2 EMC Documentum
  41. One key advantage of NetWorker is its media-management features. The first feature is Open Tape Format. It is NetWorker’s way of recording data to tape, specifically designed to provide several advantages: Data can be multiplexed, or interleaved, for performance. This essentially means data can be accepted and written to the backup media as it comes in, regardless of what order it comes in, so the tape drives can keep spinning. This enables you to back up faster, but also reduces wear and tear on the tape hardware, which is more susceptible to error if it is continually stopping and starting. Tapes created by NetWorker are self-describing, so if everything else is gone except for the tape, you’ll be able to load it and understand what data is there to be restored. As the image on the right indicates, Open Tape Format allows you to move tape media between systems and servers on unlike operating systems—with Open Tape Format, a tape that began life on a UNIX-based system can easily be read on a Windows-based system. This is key not just for disaster recovery, but for the entire environment, as you go through a regular system lifecycle and adopt new platforms. Also, with Open Tape Format, NetWorker can skip bad spots on tape and continue data access. When other solutions on the market encounter any error on tape, they are unable to do anything further with the tape. Imagine if there is a bad spot 100 MB into a backup tape… Finally, NetWorker can broker tape devices on a SAN to get the best use and performance out of the hardware investment. So, instead of hard-assigning tape drives to a backup server or Storage Node, you can dynamically allocate any drive on demand.
  42. The focus here is the resolution of the top pain points around traditional tape-based backup. Performance—NetWorker backup to disk allows for simultaneous-access operations to a volume, both reads (restore, staging, cloning) and writes (backups). With NetWorker, as opposed to with traditional tape-only backup, you don’t "pay a penalty on restore." Also, cloning from disk to tape is up to 50% faster. Why? As soon as the Save Set (backup job) is complete, the cloning process can begin without the Administrator having to wait for all the backup jobs to complete. NetWorker can back up to disk and clone to tape at the same time. You don’t have to spend 12–16 hours a day running clone operations (tape-to-tape copies)—in fact, you might actually be able to eliminate the clone jobs. Some NetWorker customers have seen cloning times reduced from 12–16 hours daily to three to four hours daily. Cloning from disk to tape also augments the disaster-recovery strategy for tape. As data grows, more copies must be sent offsite. Because NetWorker backup to disk improves cloning performance, you can now continue to meet the daily service-level agreements to get tapes offsite to a vaulting provider. Taking the idea of leveraging disk even idea further leads us into a discussion of to NetWorker’s advanced backup capability, which also leverages disk-based technologies.
  43. Disk-solution providers, like EMC, provide array-based abilities to perform snapshots and replication. These “point-in-time” copies of data allow for instant recovery of disk and data volumes. Many are likely familiar with array-based replication or snapshot capabilities. NetWorker is engineered to take advantage of these capabilities by providing direct tie-ins with EMC offerings such as CLARiiON with SnapView, or Symmetrix with TimeFinder/Snap. This will enable you to begin to meet the most stringent recovery requirements. In a study done in the spring of 2004, the Taneja Group identified that the market intends to rely on snapshots for ensuring application-data availability and rapid recoveries. The figures represent a scale of one to five, with one as the low point, five as the high point: Rapid application recovery (4.34) Ability to automate backup to tape (4.13) Instant backup (3.98) Roll back to point in time (3.88) Integration with backup strategy (3.87) Flexibility to leverage hardware (3.61) Multiple fulls throughout day (3.49)
  44. In addition to traditional backup-and-recovery application modules for disk and tape, the snapshot management capability called NetWorker PowerSnap enables you to meet the demanding service-level agreement requirements in both tape and disk environments by seamlessly integrating snapshot technology and applications. NetWorker PowerSnap software works with NetWorker Modules to enable snapshot backups of applications—with consistency. PowerSnap performs snapshot management by policy—just like standard backup policies to tape or disk. It uses these policies to determine how many snapshots to create, how long to retain the snapshots, when to do backups to tape from specified snapshots…all based on business needs that you define. Note to Presenter: Click now in Slide Show mode for animation. For example, snapshots might be taken every few hours, and the three most recent are retained. You can easily leverage any of those snapshots to back up to tape in an off-host fashion—i.e., with no impact to the application servers. PowerSnap manages the full life cycle of snapshots, including creation, scheduling, backups, and expiration. This, along with its orchestration with applications, provides a comprehensive solution for complete application-data protection to help you meet the most stringent of RTOs and RPOs.
  45. If there are servers with lots of files and lots of directories—what we refer to as high-density file systems—backup and recovery are particularly challenging. With so many files, traditional backup struggles to keep up with backup windows. NetWorker SnapImage enables block-level backup of these file systems while maintaining the ability to restore a single file. SnapImage is intelligent enough to also support sparse backups. Sparse files contain data with portions of empty blocks, or “zeroes.” NetWorker backs up only the non-zero blocks, thereby reducing: Time for backup Amount of backup-media space consumed Sparse-file examples: Large database files with deleted data or unused database fields Files from image applications With the NetWorker SnapImage Module, backup and recovery of servers with high-density file systems is significantly increased: The time required to back up 18.8 million 1 KB files in a 100 GB file system with a block size of 4 KB can be reduced from 31 to seven hours. The time required to perform a Save Set restore of one million 4 KB files in a 5.36 GB internal disk can be reduced from 72 to seven minutes.
  46. EMC has worked with a large Telecommunications company to meet their most demanding IT challenges: Complex application environment—Oracle, and lots of data No backup window Recovery-time objective: Restore 24 TB in two hours. They chose to implement NetWorker, along with other key EMC offerings, to achieve a superior level of protection and recovery management—and confidence in the ability to recover. Solution: NetWorker PowerSnap with Symmetrix and TimeFinder/Snap Server-free backup and rapid recovery NetWorker DiskBackup with CLARiiON with ATA disks Rapid primary-site protection and recovery NetWorker and SRDF/S Disaster recovery, offsite protection Here is what they have been able to achieve with the above: Zero backup time for their applications Zero data loss Significantly reduced management overhead Not all environments will be this complex or demanding, but NetWorker can meet any backup and recovery requirements, and can easily be upgraded to meet more stringent requirements as needed.