HP StoreOnce B6000 Use Manual page 15

Robo and regional data centre data protection solution scenarios using hp data protector software, hp vtl systems and bandwidth replication
Hide thumbs Also See for StoreOnce B6000:
Table of Contents

Advertisement

In-Line ( HP Dynamic deduplication)
This is where the deduplication process takes place REAL TIME as the backup is actually taking place.
This is the technology used on HP D2D devices.
Post Process ( HP Accelerated Deduplication)
This is where the deduplication process takes place AFTER the backup has landed on the device to
ensure deduplication does not affect backup performance. This is the technology used on HP VLS
devices
Source Library
When used as part of a replication pair the source library is the library supplying the data to be
replicated.
Target Library
When used as part of a replication pair the target library is the library receiving the data from the
source library.
Concurrency
This is the Number of replication jobs that can be active at any one time— this varies depending on if
it is a source or target library. Concurrency ensures maximum use of the available link bandwidth.
Fan-In
This is the number of source appliances or libraries that can channeled into a target appliance
or library.
Link Speed
This is speed in Mbits/sec that the Telco provides point to point or Any to Any to allow replication to
take place. The speeds can vary from 2 Mb/sec to 1 Gb/sec. Increasing Speed means increasing
cost.
Bandwidth Utilization (Throttling)
This is the amount of available bandwidth a device can be configured to use. For example the D2D
& VLS devices have network throttling so they can be configured to use for example only 20% of the
available bandwidth. This prevents any single device from "hogging" the total bandwidth available,
and allows replication to take place over longer periods of time without affecting application
responses using the same link.
Synthetic full
Synthetic backup puts a stop to the buildup of incremental backups, and eliminates the need to run
lengthy full backups. This technology works by merging all incremental backups into a full 'synthetic'
backup—a process that can be repeated indefinitely, with no need to run a full backup again. If all
the backups, full and incremental, are written to the same HP Data Protector file library which uses a
distributed file media format (DFMF) e.g on an MSA2000 disk array, an even more efficient type of
synthetic backup is possible. This is called Virtual Full Backup. The solution uses pointers to
consolidate data rather than copying the data. Asa result, the consolidation takes less time and
avoids unnecessary duplication of data. This capability also helps enable continuous data protection
for Windows systems. For systems running Windows 2000 and above, HP Data Protector utilizes the
built-in Microsoft Windows Change Journal to quickly generate a list of files that have been altered
since the last backup was performed. This option avoids the need for timely "tree walks" to identify
files that have changed, which can be especially time-consuming on systems with many small files.
This allows incremental backups to run much faster and more frequently, providing near-continuous
data protection at no additional cost.

Advertisement

Table of Contents
loading

Table of Contents