Figures
1
2
3
4
Unique Backup Data ............................................................................................... 20
5
6
7
8
9
10
11
Shown) .................................................................................................................. 34
12
Shown) .................................................................................................................. 35
13
14
15
16
TSM LAN-based backups ......................................................................................... 52
17
TSM LAN-free backups ............................................................................................ 53
18
19
20
21
22
23
Backup .................................................................................................................. 66
24
25
Hash-based Chunking ............................................................................................. 70
26
D2D Configuration .................................................................................................. 71
27
28
29
30
Slot Mappings ........................................................................................................ 77
8