You are on page 1of 241

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Section 4 - Business Continuity

2007 EMC Corporation. All rights reserved.

Welcome to Section 4 of Storage Technology Foundations Business Continuity.

Copyright 2007 EMC Corporation. All rights reserved.


These materials may not be copied without EMC's written consent.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS IS. EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC2, EMC, Navisphere, CLARiiON, and Symmetrix are registered trademarks and EMC Enterprise Storage, The
Enterprise Storage Company, The EMC Effect, Connectrix, EDM, SDMS, SRDF, Timefinder, PowerPath, InfoMover,
FarPoint, EMC Enterprise Storage Network, EMC Enterprise Storage Specialist, EMC Storage Logix, Universal Data Tone,
E-Infostructure, Access Logix, Celerra, SnapView, and MirrorView are trademarks of EMC Corporation.
All other trademarks used herein are the property of their respective owners.

Business Continuity Introduction

-1

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Section Objectives
Upon completion of this section, you will be able to:
y Describe business continuity
y Describe the solutions and the supporting technologies
that enable business continuity and uninterrupted data
availability
Backup and Recovery
Local Replication
Remote Replication

y Describe basic disaster recovery techniques

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 2

The objectives for this section are shown here. Please take a moment to read them.

Business Continuity Introduction

-2

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

In this Section
This section contains the following modules:
1. Business Continuity Overview
2. Backup and Recovery
3. Local Replication
4. Remote Replication

Additional Information:

Apply Your Knowledge

Case Study (Student Resource Guide ONLY)

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 3

This section is comprised of the 4 modules shown here.


This section also contains Apply Your Knowledge information and Case Studies.
The Apply Your Knowledge information is presented on-line at the end of selected modules.
The Case Studies are only available in this guide. Please make sure review the Case Studies prior to
taking the on-line assessment.

Business Continuity Introduction

-3

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Business Continuity Introduction

-4

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Business Continuity Overview


After completing this module, you will be able to:
y Define and differentiate between Business Continuity and
Disaster Recovery
y Differentiate between Disaster Recovery and Disaster
Restart
y Define terminology such as Recovery Point Objective and
Recovery Time Objective
y Describe (at high level) Business Continuity Planning
y Identify Single Points of Failure and describe solutions to
eliminate them
2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 1

Information has become a critical asset for businesses. The survival of a business depends on
uninterrupted availability of the data. Steps should be taken to ensure continuous availability of data
in the event of a disaster.
The objectives for this module are shown here. Please take a moment to review them.

Business Continuity Introduction

-1

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

What is Business Continuity?


y Business Continuity is the preparation for, response to,
and recovery from an application outage that adversely
affects business operations
y Business Continuity Solutions address systems
unavailability, degraded application performance, or
unacceptable recovery strategies

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 2

Before we can talk about business continuity and solutions for business continuity, we must first define
the terms.
Business Continuity is the preparation for, response to, and recovery from an application outage that
adversely affects business operations
Business Continuity Solutions address systems unavailability, degraded application performance, or
unacceptable recovery strategies

Business Continuity Introduction

-2

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Why Business Continuity


Lost Productivity
Number of employees
impacted (x hours out *
hourly rate)

Damaged Reputation
Customers
Suppliers
Financial markets
Banks
Business partners

Know the downtime costs (per


hour, day, two days...)

Lost Revenue

Direct loss
Compensatory payments
Lost future revenue
Billing losses
Investment losses

Financial Performance
Revenue recognition
Cash flow
Lost discounts (A/P)
Payment guarantees
Credit rating
Stock price

Other Expenses
Temporary employees, equipment rental, overtime
costs, extra shipping costs, travel expenses...
2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 3

There are many factors that need to be considered when calculating the cost of downtime. A formula to
calculate the costs of the outage should capture both the cost of lost productivity of employees and the
cost of lost income from missed sales.
y The Estimated average cost of 1 hour of downtime = (Employee costs per hour) *( Number of
employees affected by outage) + (Average Income per hour).
y Employee costs per hour is simply the total salaries and benefits of all employees per week,
divided by the average number of working hours per week.
y Average income per hour is just the total income of an institution per week, divided by average
number of hours per week that an institution is open for business.

Business Continuity Introduction

-3

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Information Availability
% Uptime

% Downtime

Downtime per Year

Downtime per Week

98%

2%

7.3 days

3hrs 22 min

99%

1%

3.65 days

1 hr 41 min

99.8%

0.2%

17 hrs 31 min

20 min 10 sec

99.9%

0.1%

8 hrs 45 min

10 min 5 sec

99.99%

0.01%

52.5 min

1 min

99.999%

0.001%

5.25 min

6 sec

99.9999%

0.0001%

31.5 sec

0.6 sec

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 4

Information Availability ensures that applications and business units have access to information
whenever it is needed. The primary components of information availability are:
y Protection from data loss
y Ensuring data access
y Appropriate data security
Since information is a major business asset, high information availability increases productivity and
efficiency. Therefore, it is necessary to make this information reliable, available any time it is required,
and sharable by different platforms, anywhere, at anytime. Ensuring access to this information and
appropriate data security are also very important and all must be done in a cost effective manner.
Most availability limits will be defined in terms of Nines. This chart translates the percentage down
time into amounts of downtime per year and per week. Downtime translates to lost revenue. In
healthcare, Gartner group considers 99.5% of system availability as outstanding. This is the equivalent
43 hours of unplanned downtime and 50 hours of planned downtime per year.
The online window for some critical applications has moved to 99.999% of time.

Business Continuity Introduction

-4

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Importance of Business Continuity and Planning


Millions of US Dollars per Hour in Lost Revenue
Retail
Insurance
Information technology
Financial institutions

1.1
1.2
1.3
1.5

Manufacturing

1.6

Call location

1.6

Telecommunications
Credit card sales authorization
Energy
Point of sale
Retail brokerage

2.0
2.6
2.8
3.6
6.5

Source Meta Group, 2005

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 5

This chart shows how much money each industry loses for each hour of downtime. As you can see,
downtime is expensive!

Business Continuity Introduction

-5

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Recovery Point Objective (RPO)

Wks

Days

Hrs

Mins Secs

2007 EMC Corporation. All rights reserved.

Hrs Days Wks

Recovery Time
Synchronous
Replication

Asynchronous
Replication

Periodic
Replication

Tape
Backup

Recovery Point

Secs Mins

Business Continuity Introduction - 6

Recovery Point Objective (RPO) is the point in time to which systems and data must be recovered after
an outage. This defines the amount of data loss a business can endure. Different business units within
an organization may have varying RPOs.

Business Continuity Introduction

-6

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Recovery Time Objective (RTO)

Mins Secs

Recovery Point

Recovery Time includes:


y

Fault detection

Recovering data

Bringing apps back online

2007 EMC Corporation. All rights reserved.

Secs Mins

Hrs Days Wks

Recovery Time
Tape Restore

Hrs

Manual
Migration

Days

Global
Cluster

Wks

Business Continuity Introduction - 7

Recovery Time Objective (RTO) is the period of time within which systems, applications, or functions
must be recovered after an outage. This defines the amount of downtime that a business can endure,
and survive. Recovery time includes: fault detection, data recovery, and bringing applications back online.

Business Continuity Introduction

-7

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Disaster Recovery versus Disaster Restart


y Most business critical applications have some level of data
interdependencies
y Disaster recovery
Restoring previous copy of data and applying logs to that copy to bring it to
a known point of consistency
Generally implies the use of backup technology
Data copied to tape and then shipped off-site
Requires manual intervention during the restore and recovery processes

y Disaster restart
Process of restarting mirrored consistent copies of data and applications
Allows restart of all participating DBMS to a common point of consistency
utilizing automated application of recovery logs during DBMS initialization
The restart time is comparable to the length of time required for the
application to restart after a power failure
2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 8

Disaster recovery is the process of restoring a previous copy of the data and applying logs or other
necessary processes to that copy to bring it to a known point of consistency.
Disaster restart is the restarting of dependent write consistent copies of data and applications, utilizing
the automated application of DBMS recovery logs during DBMS initialization to bring the data and
application to a transactional point of consistency.
There is a fundamental difference between Disaster Recovery and Disaster Restart. Disaster recovery
is the process of restoring a previous copy of the data and applying logs to that copy to bring it to a
known point of consistency. Disaster restart is the restarting of mirrored consistent copies of data and
applications.
Disaster recovery generally implies the use of backup technology in which data is copied to tape and
then it is shipped off-site. When a disaster is declared, the remote site copies are restored and logs are
applied to bring the data to a point of consistency. Once all recoveries are completed, the data is
validated to ensure it is correct.
While it might seem like semantics, there is an important difference between recovery and restart. The
key difference between the two is the RTO. In a recovery situation one might have to restore data from
tape or disk, roll forward committed transactions, roll back uncommitted transactions, and restore to a
point of application (or database) consistency. These processes will elongate the RTO. In a restart
situation, the application or the database self-heals so to speak. As mentioned in the slide, this is
very much like starting back up after a power failure.

Business Continuity Introduction

-8

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Disruptors of Data Availability


Disaster (<1% of Occurrences)
Natural or man made
Flood, fire, earthquake
Contaminated building

Unplanned Occurrences (13% of


Occurrences)
Failure
Database corruption
Component failure
Human error

Planned Occurrences (87% of Occurrences)


Competing workloads
Backup, reporting
Data warehouse extracts
Application and data restore

Source: Gartner, Inc.


2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 9

Elevated demand for increased application availability confirms the need to ensure business continuity
practices are consistent with business needs.
Interruptions are classified as either planned or unplanned. Failure to address these specific outage
categories seriously compromises a companys ability to meet business goals.
Planned downtime is expected and scheduled, but it is still downtime causing data to be unavailable.
Causes of planned downtime include:
y New hardware installation/integration/maintenance
y Software upgrades/patches
y Backups
y Application and data restore
y Data center disruptions from facility operations (renovations, construction, other)
y Refreshing a testing or development environment with production data
y Porting testing/development environment over to production environment

Business Continuity Introduction

-9

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Causes of Downtime

Human Error
System Failure

Infrastructure Failure
Disaster
2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 10

Today, the most critical component of an organization is information. Any disaster occurrence will
affect information availability critical to run normal business operations.
In our definition of disaster, the organizations primary systems, data, applications are damaged or
destroyed. Not all unplanned disruptions constitute a disaster.

Business Continuity Introduction

- 10

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Business Continuity vs. Disaster Recovery


y Business Continuity has a broad focus on prevention:
Predictive techniques to identify risks
Procedures to maintain business functions

y Disaster Recovery focuses on the activities that occur


after an adverse event to return the entity to normal
functioning

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 11

Business continuity and disaster recovery are not the same. Business Continuity is a holistic approach
to planning, preparing, and recovering from an adverse event. The focus is on prevention, identifying
risks, and developing procedures to ensure the continuity of business function. Disaster recovery
planning should be included as part of business continuity.
Objectives of Business Continuity:
y Facilitate uninterrupted business support despite the occurrence of problems.
y Create plans that identify risks and mitigate them wherever possible.
y Provide a road map to recover from any event.
Disaster Recovery is more about specific cures, to restore service and damaged assets after an adverse
event. In our context, Disaster Recovery is the coordinated process of restoring systems, data, and
infrastructure required to support key ongoing business operations.

Business Continuity Introduction

- 11

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Business Continuity Planning (BCP)


Includes the following activities:
y Identifying the mission or critical business functions
y Collecting data on current business processes
y Assessing, prioritizing, mitigating, and managing risk
Risk Analysis
Business Impact Analysis (BIA)

y Designing and developing contingency plans and disaster


recovery plan (DR Plan)
y Training, testing, and maintenance

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 12

Business Continuity Planning (BCP) is a risk management discipline. It involves the entire business-not just IT. BCP proactively identifies vulnerabilities and risks, planning in advance how to prepare for
and respond to a business disruption. A business with strong BC practices in place is better able to
continue running the business through the disruption and to return to business as usual.
BCP actually reduces the risk and costs of an adverse event because the process often uncovers and
mitigates potential problems.

Business Continuity Introduction

- 12

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Business Continuity Planning Lifecycle

Implement,
Objectives

Maintain, and
Assess

Train, Test, and

Analysis

Document

Design
Develop

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 13

The Business Continuity Planning process includes the following stages:


Objectives
y Determine business continuity requirements and objectives including scope and budget
y Team selection (include all areas of the business and subject matter expertise (internal/external)
y Create the project plan
Perform analysis
y Collect information on data, business processes, infrastructure supports, dependencies, frequency of use
y Identify critical needs and assign recovery priorities.
y Create a risk analysis (areas of exposure) and mitigation strategies wherever possible.
y Create a Business Impact Analysis (BIA)
y Create a Cost/benefit analysis identify the cost (per hour/day, etc.) to the business when data is unavailable.
y Evaluate Options
3. Design and Develop the BCP/Strategies
y Evaluate options
y Define roles/responsibilities
y Develop contingency scenarios
y Develop emergency response procedures
y Detail recovery, resumption, and restore procedures
y Design data protection strategies and develop infrastructure
y Implement risk management/mitigation procedures
y Train, test, and document, implement, maintain, and assess

Business Continuity Introduction

- 13

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Business Impact Analysis (BIA)


# Business Area Impact Probability Single Loss # Event
Affected
(1 -5)
(1-5)
Expectancy
p/y

Loss p/y

Est cost of
mitigation

High Risk SPOF Item

Entire
Company

$279,056

.25

$69517

$5,800

Entire
Company

$279,066

0.2

$55768

$66,456

Cisco net backbone switch


not redundant

Entire
Company

$279,098

0.2

$55619

$10,000

Relocate net equip to a


separate physical rack

IT-All

$16,000

1.0

18000

$80,000

Primary dev platforms dont


have failover

Entire
Company

$16,000

0.5

$8000

$122,000

ITIntranet/B2B

$400

1.0

$1800

$5,000

2007 EMC Corporation. All rights reserved.

No redundant UPS for


Networking/phone equip

Computer room does not


have sufficient UPS
capacity to run on single
unit
No failover for development
webserver

Business Continuity Introduction - 14

The Business Impact Analysis quantifies the impact that an outage will have to the business and
potential costs associated with the interruption. It helps businesses channel their resources based on
probability of failure and associated costs. In the example shown, the dollar values are arbitrary and
are used just for illustration.

Business Continuity Introduction

- 14

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Identifying Single Points of Failure

Primary
Node
User & Application
Clients

IP

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 15

Earlier, we discussed the importance of mitigating potential problems. Now, lets walk through a data
storage infrastructure example to identify the single points of failure and solutions to eliminate them.

Business Continuity Introduction

- 15

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

HBA Failures
y Configure multiple HBAs, and
use multi-pathing software
Protects against HBA
failure
Can provide improved
performance (vendor
dependent)

2007 EMC Corporation. All rights reserved.

HBA

Port

HBA
Switch
Host
Storage

Business Continuity Introduction - 16

One component that could fail is the HBA on the server. Configuring multiple HBAs and using multipathing software provides path redundancy. Upon detection of a failed HBA, the software can re-drive
the I/O through another available path. This eliminates the HBA from being a single point of failure

Business Continuity Introduction

- 16

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Switch/Storage Array Port Failures


y Configure multiple
switches
y Make the devices
available via multiple
storage array ports

HBA

Port

HBA
Port
Host

Switch
Storage

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 17

A switch or a storage array port could also fail. As shown in this example, configuring multiple
switches, and making the devices available via multiple storage array ports, provides protection against
switch or storage array port failures.

Business Continuity Introduction

- 17

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Disk Failures
y Use some level of RAID
HBA

Port

HBA
Port
Host

Switch
Storage

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 18

As seen earlier, using some level of RAID, such as RAID-1 or RAID-5, ensures continuous operation
in the event of disk failures.

Business Continuity Introduction

- 18

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Host Failures
y Clustering protects against production host failures

HBA

Port

HBA
Port
Host

Switch
Storage

Storage

HBA
HBA
Host
2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 19

Planning and configuring clusters is a complex task. At a high level:


y A cluster is two or more hosts with access to the same set of storage (array) devices
y Simplest configuration is a two node (host) cluster
y One of the nodes would be the production server while the other would be configured as a
standby. This configuration is described as Active/Passive.
y Participating nodes exchange heart-beats or keep-alives to inform each other about their
health.
y In the event of the primary node failure, cluster management software will shift the production
workload to the standby server.
y Implementation of the cluster failover process is vendor specific.
y A more complex configuration would be to have both the nodes run production workload on the
same set of devices. Either cluster software or application/database should then provide a locking
mechanism so that the nodes do not try to update the same areas on disk simultaneously. This
would be an Active/Active configuration.

Business Continuity Introduction

- 19

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Site/Storage Array Failures


y Remote replication helps protect against
either entire site or storage array failures

HBA

Port

HBA
Port
Host

Switch
Storage

Storage

HBA
HBA
Host
2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 20

It is also possible for the site or the storage array to fail. Remote replication of data to a secondary
array at a secondary site will protect against these failures.

Business Continuity Introduction

- 20

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Resolving Single Points of Failure

Clustering
Software

User &
Application
Clients
IP

Redundant Paths

Redundant Disks
(RAID 1/RAID 5)

Primary
Node

Keep Alive

Redundant
Network

Switches

IP
Failover
Node

Redundant
Site
Storage Array

2007 EMC Corporation. All rights reserved.

Storage Array

Business Continuity Introduction - 21

This slide summarizes what we have seen in the previous few. It uses clustering, redundant paths,
RAID protected disks, remote replication of data to a secondary site, and a redundant Local Area
Network.

Business Continuity Introduction

- 21

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Business Continuity Technology Solutions


y Local Replication
y Remote Replication
y Backup/Restore

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 22

Business Continuity technology solutions include local replication, remote replication, and
backup/restore. This module provides a very high level overview of some of these solutions. They are
covered in more detail in later modules.

Business Continuity Introduction

- 22

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Local Replication
y Data from the production devices is copied over to a set
of target (replica) devices within the same array
y After some time, the replica devices will contain identical
data as those on the production devices
y Subsequently copying of data can be halted. At this pointin-time, the replica devices can be used independently of
the production devices
y The replicas can then be used for restore operations in
the event of data corruption or other events
y Alternatively the data from the replica devices can be
copied to tape. This off-loads the burden of backup from
the production devices
2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 23

Local replication technologies offer fast and convenient methods for ensuring data availability. The
different technologies and the uses of replicas for BC/DR operations will be discussed in a later
module in this section. Typically, local replication uses replica disk devices. This greatly speeds up the
restore process, thus minimizing the RTO. Frequent point-in-time replicas also help in minimizing
RPO.

Business Continuity Introduction

- 23

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Remote Replication
y Data from the production devices is copied over to a set
of target (replica) devices on a different array at some
distance away
y Target devices can be kept continuously synchronized
with the production devices
y In the event of a failure of the production devices,
applications can continue to run from the target devices

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 24

Remote replication typically involves a pair of arrays separated by some distance. To achieve nearzero RPO and a very small RTO, production and target devices are kept synchronized at all times.
Periodic local replicas of the target devices may also be taken, to protect against data corruption on the
production devices. The various alternatives for remote replication are discussed later in this section.

Business Continuity Introduction

- 24

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Backup/Restore
y Backup to tape has been the predominant method for
ensuring data availability and business continuity
y Low cost, high capacity disk drives are now being used
for backup to disk. This considerably speeds up the
backup and the restore process
y Frequency of backup will be dictated by defined
RPO/RTO requirements as well as the rate of change of
data

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 25

Far from being antiquated, periodic backup is still a widely used method for preserving copies of data.
In the event of data loss due to corruption or other events, data can be restored up to the last backup.
Evolving technologies now permit faster backups to disks. Magnetic tape drive speeds and capacities
are also continually being enhanced. The various backup paradigms and the role of backup in BC/DR
planning are discussed in detail later in this section.

Business Continuity Introduction

- 25

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Module Summary
Key points covered in this module:
y Importance of Business Continuity
y Types of outages and their impact to businesses
y Business Continuity Planning and Disaster Recovery
y Definitions of RPO and RTO
y Difference between Disaster Recovery and Disaster
Restart
y Identifying and eliminating Single Points of Failure

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 26

These are the key points covered in this module. Please take a moment to review them.

Business Continuity Introduction

- 26

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

9Check Your Knowledge


y Which concerns do business continuity solutions
address?
y What is the difference between RPO and RTO?
y What is the difference between Disaster Recovery and
Disaster Restart?
y What are some of the Single Points of Failure in a typical
data center environment?
y How can the loss of a storage array port be mitigated?

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 27

Check your knowledge of this module by taking some time to answer the questions shown on the slide.

Business Continuity Introduction

- 27

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Apply Your Knowledge

How EMC PowerPath Improves Business Continuity


in Storage Environments

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 28

At this point, lets apply what weve learned to some real world examples. In this case, we look at
how EMC PowerPath improves Business Continuity in storage environments.

Business Continuity Introduction

- 28

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

What is EMC PowerPath


Open Systems Host
Applications

y Host Based Software


y Resides between
application and SCSI
device driver

y Automatic detection
and recovery from
host-to-array path
failures
2007 EMC Corporation. All rights reserved.

PowerPath
SERVER

y Transparent to the
application

File System

Management
Utils

Logical Volume Manager

STORAGE

y Provides Intelligent I/O


path management

DBMS

SCSI
Driver

SCSI
Driver

SCSI
Driver

SCSI
Driver

SCSI
Driver

SCSI
Driver

SCSI
SCSI
SCSI
SCSI
SCSI
SCSI
Controller Controller Controller Controller Controller Controller

Interconnect
Topology

Business Continuity Introduction - 29

PowerPath is host-based software that resides between the application and the disk device layers.
Every I/O from the host to the array must pass through the PowerPath driver software. This allows
PowerPath to work in conjunction with the array and connectivity environment to provide intelligent
I/O path management. This includes path failover and dynamic load balancing, while remaining
transparent to any application I/O requests as it automatically detects and recovers from host-to-array
path failures.
PowerPath is supported on various hosts and Operating Systems such as Sun- Solaris, IBM-AIX, HPUX, Microsoft Windows, Linux, and Novell. Storage arrays from EMC, Hitachi, HP, and IBM are
supported. The level of OS and array models supported varies between PowerPath software versions.

Business Continuity Introduction

- 29

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

PowerPath Features
y Multiple paths, for higher
availability and performance

PowerPath Delivers:

y Dynamic multipath load balancing


y Proactive path testing and
automatic path recovery
y Automatic path failover
y Online path configuration and
management
y High-availability cluster support

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 30

PowerPath maximizes application availability, optimizes performance, and automates online storage
management while reducing complexity and cost, all from one powerful data path management
solution. PowerPath supports the following features:
y Multiple path support - PowerPath supports multiple paths between a logical device and a host.
Multiple paths enables the host to access a logical device, even if a specific path is unavailable.
Also, multiple paths enable sharing of the I/O workload to a given logical device.
y Dynamic load balancing - PowerPath is designed to use all paths at all times. PowerPath distributes
I/O requests to a logical device across all available paths, rather than requiring a single path to bear
the entire I/O burden.
y Proactive path testing and automatic path recovery - PowerPath uses a path test to ascertain the
viability of a path. After a path fails, PowerPath continues testing it periodically to determine if it
is fixed. If the path passes the test, PowerPath restores it to service and resumes sending I/O to it.
y Automatic path failover - If a path fails, PowerPath redistributes I/O traffic from that path to
functioning paths.
y Online configuration and management - PowerPath management interfaces include a command
line interface and a GUI interface on Windows.
y High availability cluster support - PowerPath is particularly beneficial in cluster environments, as it
can prevent operational interruptions and costly downtime.

Business Continuity Introduction

- 30

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

PowerPath Configuration
Host Application(s)

SERVER

y All volumes are


accessible through all
paths
y Maximum 32 paths to
a logical volume
y Interconnect support
for
SCSI
iSCSI

STORAGE

SAN

PowerPath
SD

SD

SD

HBA

HBA

HBA

SCSI
Driver
HBA Host Bus
Adapter
SD

Interconnect
Topology

Storage

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 31

Without PowerPath, if a host needed access to 40 devices, and there were four Host Bus Adapters, you
would most likely configure the host to present 10 unique devices to each HB-. With PowerPath, the
host is given access to all 40 devices via all four HBAs.
PowerPath supports up to 32 paths to a logical volume. The host can be connected to the array using a
number of interconnect topologies such as SAN, SCSI, or iSCSI.

Business Continuity Introduction

- 31

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

The PowerPath Filter Driver

y PowerPath directs
I/O to optimal path
based on current
workload and path
availability
y When a path fails
PowerPath chooses
another path in the
set
2007 EMC Corporation. All rights reserved.

SERVER

Host Application(s)

STORAGE

y Platform
independent base
driver
y Applications direct
I/O to PowerPath

PowerPath Filter Driver


SD

SD

SD

HBA

HBA

HBA

SCSI
Driver
HBA Host Bus
Adapter
SD

Interconnect
Topology

Storage

Business Continuity Introduction - 32

The PowerPath filter driver is a platform independent driver that resides between the application and
HBA driver.
The driver identifies all paths that read and write to the same device and builds a routing table for the
device, called a volume path set. A volume path set is created for each shared device in the array.
PowerPath can use any path in the set to service an I/O request. If a path fails, PowerPath can redirect
an I/O request from that path to any other available path in the set. This redirection is transparent to the
application, which does not receive an error.

Business Continuity Introduction

- 32

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Path Fault without PowerPath

y Each volume has a


single path
y Host adapter and
cable connections are
single points of failure
y Work load not
balanced among all
paths
2007 EMC Corporation. All rights reserved.

SERVER

Host Application(s)

STORAGE

y In most environments,
a host will have
multiple paths to the
Storage System
y Volumes are spread
across all available
paths

SD

SD

SD

SD

HBA

HBA

HBA

SCSI
Driver

HBA Host Bus


Adapter

Interconnect
Topology

Storage

Business Continuity Introduction - 33

Without PowerPath, the loss of a channel (as indicated in the diagram by a red dotted line) means one
or more applications may stop functioning. This can be caused by the loss of a Host Bus Adapter,
Storage Array Front-end connectivity, Switch port, or a failed cable. In a standard non-PowerPath
environment, these are all single points of failure. In this case, all I/O that was heading down the path
highlighted in red is now lost, resulting in an application failure and the potential for data loss or
corruption.

Business Continuity Introduction

- 33

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Path Fault with PowerPath


Host Application(s)

SERVER

y If a host adapter, cable, or


channel director/Storage
Processor fails, the device
driver returns a timeout to
PowerPath

y Subsequent I/Os use


surviving path(s)
y Application is unaware of
failure

2007 EMC Corporation. All rights reserved.

STORAGE

y PowerPath responds by
taking the path offline and
re-driving I/O through an
alternate path

PowerPath
SD

SD

SD

HBA

HBA

HBA

SCSI
Driver
HBA Host Bus
Adapter
SD

Interconnect
Topology

Storage

Business Continuity Introduction - 34

This example depicts how PowerPath failover works. When a failure occurs, PowerPath transparently
redirects the I/O down the most suitable alternate path. The PowerPath filter driver looks at the volume
path set for the device, considers current workload, load balancing, and device priority settings, and
chooses the best path to send the I/O down. In the example, PowerPath has three remaining paths to
redirect the failed I/O, and to load balance.

Business Continuity Introduction

- 34

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Summary
Key points covered in this module:
y PowerPath is server based software that provides
multiple paths between the host bus adapter and the
Storage Subsystem
Redundant paths eliminate host adapter, cable connection, and
channel adapters as single points of failures and increase availability
Improves performance by dynamically balancing the workload across
all available paths
Application transparent

y Enhances data availability and accessibility

2007 EMC Corporation. All rights reserved.

Business Continuity Introduction - 35

These are the key points covered in this module. Please take a moment to review them.

Business Continuity Introduction

- 35

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Business Continuity Introduction

- 36

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Backup and Recovery


Upon completion of this module, you will be able to:
y Describe best practices for planning Backup and
Recovery
y Describe the common media and types of data that are
part of a Backup and Recovery strategy
y Describe the common Backup and Recovery topologies
y Describe the Backup and Recovery Process
y Describe Management considerations for Backup and
Recovery

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 1

This module looks at backup and recovery. Backup and recovery are a major part of the planning
process for Business Continuity.
The objectives for the module are shown here. Please take a moment to read them.

Backup and Recovery - 1

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

In this Module.
This module contains the following lessons:
y Planning for Backup and Recovery
y Backup and Recovery Methods
y Backup Architecture Topologies
y Managing the Backup Process

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 2

This module contains the four lessons shown here. These lessons provide an overview of backup and
recovery, including the business and technical aspects.

Backup and Recovery - 2

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Lesson: Planning for Backup and Recovery


Upon completion of this lesson, you be able to:
y Define Backup and Recovery
y Describe common reasons for a Backup and Recovery
plan
y Describe the business considerations for Backup and
Recovery
y Define RPO and RTO
y Describe the data considerations for Backup and
Recovery
y Describe the planning for Backup and Recovery
2007 EMC Corporation. All rights reserved.

Backup and Recovery - 3

This lesson provides an overview of the business drivers for backup and recovery and introduces some
of the common terms used when developing a backup and recovery plan.
The objectives for this lesson are shown here. Please take a moment to read them.

Backup and Recovery - 3

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

What is a Backup
y Backup is an additional copy of data that can be used for
restore and recovery purposes
y The Backup copy is used when the primary copy is lost or
corrupted
y This Backup copy can be created as a:
Simple copy (there can be one or more copies)
Mirrored copy (the copy is always updated with whatever is written to
the primary copy)

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 4

A Backup is a copy of the online data that resides on primary storage. The backup copy is created and
retained for the sole purpose of recovering deleted, broken, or corrupted data on the primary disk.
The backup copy is usually retained over a period of time, depending on the type of the data, and on
the type of backup. There are three derivatives for backup: disaster recovery, archival, and operational
backup.
The data that is backed up may be on such media as disk or tape, depending on the backup derivative
the customer is targeting. For example, backing up to disk may be more efficient than tape in
operational backup environments.

Backup and Recovery - 4

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Backup and Recovery Strategies


Several choices are available to get the data to the backup
media such as:
y Copy the data
y Mirror (or snapshot) then copy
y Remote backup
y Copy then duplicate or remote copy

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 5

Several choices are available to get the data written to the backup media.
y You can simply copy the data from the primary storage to the secondary storage (disk or tape),
onsite. This is a simple strategy, easily implemented, but impacts the production server where the
data is located, since it uses the servers resources. This may be tolerated on some applications, but
not high demand ones.
y To avoid an impact on the production application, and to perform serverless backups, you can
mirror (or snap) a production volume. For example, you can mount it on a separate server and
then copy it to the backup media (disk or tape). This option completely frees up the production
server, with the added infrastructure cost associated with additional resources.
y Remote Backup can be used to comply with offsite requirements. A copy from the primary
storage is done directly to the backup media that is sitting on another site. The backup media can
be a real library, a virtual library or even a remote filesystem.
y You can do a copy to a first set of backup media, which will be kept onsite for operational restore
requirements, and then duplicate it to another set of media for offsite purposes. To simplify the
procedure, replicate it to an offsite location to remove any manual procedures associated with
moving the backup media to another site.

Backup and Recovery - 5

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Its All About Recovery


y Businesses back up their data to enable its recovery in
case of potential loss
y Businesses also back up their data to comply with
regulatory requirements
y Types of backup derivatives:
Disaster Recovery
Archival
Operational

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 6

Disaster Recovery addresses the requirement to be able to restore all, or a large part of, an IT
infrastructure in the event of a major disaster.
Archival is a common requirement used to preserve transaction records, email, and other business
work products for regulatory compliance. The regulations could be internal, governmental, or perhaps
derived from specific industry requirements.
Operational is typically the collection of data for the eventual purpose of restoring, at some point in the
future, data that has become lost or corrupted.

Backup and Recovery - 6

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Reasons for a Backup Plan


y Hardware Failures
y Human Factors
y Application Failures
y Security Breaches
y Disasters
y Regulatory and Business Requirements

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 7

Reasons for a backup plan include:


y Physical damage to a storage element (such as a disk) that can result in data loss.
y People make mistakes and unhappy employees or external hackers may breach security and
maliciously destroy data.
y Software failures can destroy or lose data and viruses can destroy data, impact data integrity, and
halt key operations.
y Physical security breaches can destroy equipment that contains data and applications.
y Natural disasters and other events such as earthquakes, lightning strikes, floods, tornados,
hurricanes, accidents, chemical spills, and power grid failures can cause not only the loss of data
but also the loss of an entire computer facility. Offsite data storage is often justified to protect a
business from these types of events.
y Government regulations may require certain data to be kept for extended timeframes. Corporations
may establish their own extended retention policies for intellectual property to protect them against
litigation. The regulations and business requirements that drive data as an archive generally require
data to be retained at an offsite location.

Backup and Recovery - 7

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

How does Backup Work


y Client/Server Relationship
y Server
Directs Operation
Maintains the Backup Catalog

y Client
Gathers Data for Backup (a backup client sends backup data to a
backup server or storage node).

y Storage Node

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 8

Backup products vary, but they do have some common characteristics. The basic architecture of a
backup system is client-server, with a backup server and some number of backup clients or agents. The
backup server directs the operations and owns the backup catalog (the information about the backup).
The catalog contains the table-of-contents for the data set. It also contains information about the
backup session itself.
The backup server depends on the backup client to gather the data to be backed up. The backup client
can be local or it can reside on another system, presumably to backup the data visible to that system. A
backup server receives backup metadata from backup clients to perform its activities.
There is another component called a storage node. The storage node is the entity responsible for
writing the data set to the backup device. Typically, there is a storage node packaged with the backup
server and the backup device is attached directly to the backup servers host platform. Storage nodes
play an important role in backup planning as it can be used to consolidate backup servers.

Backup and Recovery - 8

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

How does Backup Work (continued)


Clients

Servers
Backup Clients

Backup Server
& Storage Node

Metadata
Catalog
Disk
Storage
2007 EMC Corporation. All rights reserved.

Data Set
Tape
Backup
Backup and Recovery - 9

The following represents a typical Backup process:


y The Backup Server is policy driven, and initiates the backup process
y The Backup Server sends a request to a Backup Client to "send me your meta-data"
y The Backup Client sends the meta-data to the Backup Server
y The Backup Server writes the meta-data to the meta-data catalog on disk
y The Backup Client sends the data to the Storage Node
y The Storage Node writes the data to the tape storage device
When all of the data has been written by the Storage Node to the tape device, the Storage Node closes
the connection to the tape device, and the Backup Server writes status completion to the meta-data
catalog on disk
Note: The Backup Server and the Storage Node might be hosted on the same physical machine. Some
backup architectures refer to the Storage Node as the Media Server.

Backup and Recovery - 9

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Business Considerations
y Customer business needs determine:
What are the restore requirements RPO & RTO?
Where and when will the restores occur?
What are the most frequent restore requests?
Which data needs to be backed up?
How frequently should data be backed up?
hourly, daily, weekly, monthly

How long will it take to backup?


How many copies to create?
How long to retain backup copies?

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 10

Some important decisions that need consideration before implementing a Backup/Restore solution are
shown here. Some examples include:
y The Recovery Point Objective (RPO)
y The Recovery Time Objective (RTO)
y The media type to be used (disk or tape)
y Where and when the restore operations occur, especially if an alternative host is used to receive the
restore data
y When to perform backup
y The granularity of backups, Full, Incremental or cumulative
y How long to keep the backup; For example, some backups need to be retained for 4 years, others
just for 1 month
y Is it necessary or not to take copies of the backup?

Backup and Recovery - 10

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Data Considerations: File Characteristics


y Location
y Size
y Number

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 11

y Location: Many organizations have dozens of heterogeneous platforms that support a complex
application. Consider a data warehouse where data from many sources is fed into the warehouse.
When this scenario is viewed as The Data Warehouse Application, it easily fits this model. Some
of the issues are:
How the backups for subsets of the data are synchronized
How these applications are restored
y Size: Backing up a large amount of data that consists of a few big files may have less system
overhead than backing up a large number of small files. If a file system contains millions of small
files, the very nature of searching the file system structures for changed files can take hours, since
the entire file structure is searched.
y Number: a file system containing one million files with a ten-percent daily change rate will
potentially have to create 100,000 entries in the backup catalog. This brings up other issues such
as:
How a massive file system search impacts the system
Search time/Media impact
Is there an impact on tape start/stop processing?

Backup and Recovery - 11

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Data Considerations: Data Compression


Compressibility depends on the data type, for example:
y Application binaries do not compress well
y Text compresses well
y JPEG/ZIP files are already compressed and expand if
compressed again

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 12

Many backup devices, such as tape drives, have built-in hardware compression technologies. To
effectively use these technologies, it is important to understand the characteristics of the data. Some
data, such as application binaries, do not compress well. Text data can compress very well, while other
data, such as JPEG and ZIP files, are already compressed.

Backup and Recovery - 12

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Data Considerations: Retention Periods


y Operational
Data sets on primary media (disk) up to the point where most restore
requests are satisfied, then moved to secondary storage (tape)

y Disaster Recovery
Driven by the organizations disaster recovery policy
Portable media (tapes) sent to an offsite location / vault
Replicated over to an offsite location (disk)
Backed up directly to the offsite location (disk, tape or emulated tape)

y Archiving
Driven by the organizations policy
Dictated by regulatory requirements

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 13

Retention periods are the length of time that a particular version of a dataset is available to be restored.
Retention periods are driven by the type of recovery the business is trying to achieve:
y For operational restore, data sets could be maintained on a disk primary backup storage target for a
period of time, where most restore requests are likely to be achieved, and then moved to a
secondary backup storage target, such as tape, for long term offsite storage.
y For disaster recovery, backups must be done and moved to an offsite location.
y For archiving, requirements usually will be driven by the organizations policy and regulatory
conformance requirements. Tapes can be used for some applications, but for others a more robust
and reliable solution, such as disks, may be more appropriate.

Backup and Recovery - 13

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Lesson: Summary
Topics in this lesson included:
y Backup and Recovery definitions and examples
y Common reasons for Backup and Recovery
y The business considerations for Backup and Recovery
y Recovery Point Objectives and Recovery Time Objectives
y The data considerations for Backup and Recovery
y The planning for Backup and Recovery

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 14

In this lesson we reviewed the business and data considerations when planning for backup and
recovery, including:
What is a Backup and Recovery?
What is the Backup and Recovery process?
Business recovery needs
y RPO Recovery point objectives
y RTO Recovery time objectives
Data characteristics
y Files, compression, retention

Backup and Recovery - 14

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Lesson: Backup and Recovery Methods


Upon completion of this lesson, you be able to:
y Describe Hot and cold backups
y Describe the levels of backup granularity

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 15

Weve discussed the importance and considerations for a backup plan. This lesson provides an
overview of the different methods for creating a backup set.
The objectives for this lesson are shown here. Please take a moment to read them.

Backup and Recovery - 15

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Database Backup Methods


y Hot Backup: production is not interrupted
y Cold Backup: production is interrupted
y Backup Agents manage the backup of different data
types such as:
Structured (such as databases)
Semi-structured (such as email)
Unstructured (file systems)

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 16

Backing up databases can occur using two different methods:


y A hot backup, which means that the application is still up and running, with users accessing it,
while backup is taking place.
y A cold backup, which means that the application will be shut down for the backup to take place.
Most backup applications offer various backup agents to do these kinds of operations. There are
different agents for different types of data and applications.

Backup and Recovery - 16

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Backup Granularity and Levels


Full Backup

Cumulative (Differential)

Incremental

Full
2007 EMC Corporation. All rights reserved.

Cumulative

Incremental
Backup and Recovery - 17

The three different types of backups include: Full Backup; Incremental Backup; and Cumulative
Backup.
y A full backup is a backup of all data on the target volumes, regardless of any changes made to the
data itself.
y An incremental backup contains the changes since the last backup, of any type, whichever was
most recent.
y A cumulative backup, also known as a differential backup, is a type of incremental that contains
changes made to a file since the last full backup.
The granularity and levels for backups depend on business needs, and, to some extent, technological
limitations. Some backup strategies define as many as ten levels of backup. IT organizations use a
combination of these to fulfill their requirements. Most use some combination of full, cumulative, and
incremental backups.

<Continued>

Backup and Recovery - 17

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Advantages and Disadvantages


Full Backup: Because the full backup stores all files and folders, frequent full backups result in faster
and simpler restore operations. However, the amount of time it takes to run full backups often prevents
you from using this backup type. Full backups are often restricted to a weekly or monthly schedule,
although the increasing speed and capacity of backup media is making overnight full backups a more
realistic proposition.
Advantages:
y Restore is the fastest
Disadvantages:
y Backing up is the slowest
y The storage space requirements are the highest (compared to incremental backups or cumulative
backups)
Incremental Backup: The advantage of an incremental backup is that it takes the least amount of time
to complete. However, during a restore operation, each incremental backup is processed, which could
result in a lengthy restore job. The advantage of lower backup times comes with a price: increased
restore time. When restoring from incremental backup, you need the most recent full backup, as well
as every incremental backup you've made since the last full backup.
Advantages:
y Back up is the fastest
y The storage space requirements are the lowest
Disadvantages:
y Restore is the slowest
Cumulative Backup: The advantage of a cumulative backup is that it shortens restore time compared
to an incremental backup. However, if you perform the cumulative backup too many times, the size of
the cumulative backup might grow as large as the full backup. Restoring a cumulative backup is a
faster process than restoring an incremental backup because only two sets of tapes would be required
the last full backup and the last cumulative backup.
Advantages:
y Restore is faster than restoring from incremental backup
y Backing up is faster than a full backup
y The storage space requirements are lower than for full backup
Disadvantages:
y Restore is slower than restoring from full backup
y Backing up is slower than incremental backup
y The storage space requirements are higher than for incremental backup

Backup and Recovery - 18

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Restoring an Incremental Backup


Monday

Tuesday

Wednesday

Thursday

File 4

File 3

File 5

Incremental

Incremental

Incremental

Files 1, 2, 3

Full Backup

Files 1, 2, 3, 4, 5

Production

y Key Features
Files that have changed since the last full or incremental backup are
backed up
Fewest amount of files to be backed up, therefore faster backup and less
storage space
Longer restore because last full and all subsequent incremental backups
must be applied
2007 EMC Corporation. All rights reserved.

Backup and Recovery - 19

Following is an example of an incremental backup and restore.


A full backup of the business data is taken on Monday evening. Each day after that, an incremental
backup is taken. These incremental backups only backup files that are new or that have changed since
the last full or incremental backup.
On Tuesday, a new file is added, File 4. No other files have changed. Since File 4 is a new file added
after the previous backup on Monday evening, it will be backed up Tuesday evening.
On Wednesday, there are no new files added since Tuesday, but File 3 has changed. Since File 3 was
changed after the previous evening backup (Tuesday), it will be backed up Wednesday evening.
On Thursday, no files have changed but a new file has been added, File 5. Since File 5 was added after
the previous evening backup, it will be backed up Thursday evening.
On Friday morning, there is a data corruption, so the data must be restored from tape.
y The first step is to restore the full backup from Monday evening. Then, every incremental backup
that was done since the last full backup must be applied, which, in this example, means the:
y Tuesday,
y Wednesday, and
y Thursday incremental backups.

Backup and Recovery - 19

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Restoring a Cumulative Backup


Monday

Tuesday

Wednesday

Thursday

File 4

Files 4, 5

Files 4, 5, 6

Cumulative

Cumulative

Cumulative

Files 1, 2, 3

Full Backup

Files 1, 2, 3, 4, 5, 6

Production

y Key Features
More files to be backed up, therefore it takes more time to backup
and uses more storage space
Much faster restore because only the last full and the last cumulative
backup must be applied

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 20

The following is an example of cumulative backup and restore.


A full backup of the data is taken on Monday evening. Each day after that, a cumulative backup is
taken. These cumulative backups backup ALL FILES that have changed since the LAST FULL
BACKUP.
On Tuesday, File 4 is added. Since File 4 is a new file that has been added since the last full backup, it
will be backed up Tuesday evening.
On Wednesday, File 5 is added. Now, since both File 4 and File 5 are files that have been added or
changed since the last full backup, both files will be backed up Wednesday evening.
On Thursday, File 6 is added. Again, File 4, File 5, and File 6 are files that have been added or
changed since the last full backup; all three files will be backed up Thursday evening.
On Friday morning, there is a corruption of the data, so the data must be restored from tape.
y The first step is to restore the full backup from Monday evening.
y Then, only the backup from Thursday evening is restored because it contains all the new/changed
files from Tuesday, Wednesday, and Thursday.

Backup and Recovery - 20

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Lesson: Summary
Topics in this lesson included:
y Hot and Cold backups
y The levels of backup granularity

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 21

This lesson provided an introduction to backup methods and levels of backup granularity.

Backup and Recovery - 21

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Lesson: Backup Architecture Topologies


Upon completion of this lesson, you be able to:
y Describe DAS, LAN, SAN, mixed topologies
y Describe backup media considerations

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 22

So far, we have discussed the importance of the backup plan and the different methods used when
creating a backup set. This lesson provides an overview of the different topologies and media types
that are used to support creating a backup set.
The objectives for this lesson are shown here. Please take a moment to read them.

Backup and Recovery - 22

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Backup Architecture Topologies


y There are 3 basic backup topologies:
Direct Attached Based Backup
LAN Based Backup
SAN Based Backup

y These topologies can be integrated, forming a mixed


topology

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 23

There are three basic topologies that are used in a backup environment: Direct Attached Based
Backup, LAN Based Backup, and SAN Based Backup.
There is also a fourth topology, called Mixed, which is formed when mixing two or more of these
topologies in a given situation.

Backup and Recovery - 23

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Direct Attached Based Backups

LAN
Metadata

Catalog
Backup Server

2007 EMC Corporation. All rights reserved.

Data

Storage Node
Backup Client

Media
Backup

Backup and Recovery - 24

Here, the backup data flows directly from the host to be backed up to the tape, without utilizing the
LAN. In this model, there is no centralized management and it is difficult to grow the environment.

Backup and Recovery - 24

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

LAN Based Backups


Database Server
Backup Client

Mail Server
Backup Client

Metadata
Data

LAN
Metadata

Data

Backup Server
Storage Node
Storage Node
2007 EMC Corporation. All rights reserved.

Backup and Recovery - 25

In this model, the backup data flows from the host to be backed up to the tape through the LAN. There
is centralized management, but there may be an issue with the LAN utilization since all data goes
through it.

Backup and Recovery - 25

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

SAN Based Backups (LAN Free)


Mail Server
Storage Node
Backup Client

LAN

Data
SAN

Backup
Device

Metadata
Data

Backup Server
2007 EMC Corporation. All rights reserved.

Backup and Recovery - 26

A SAN based backup, also known as LAN free backup, is achieved when there is no backup data
movement over the LAN. In this case, all backup data travels through a SAN to the destination backup
device.
This type of backup still requires network connectivity from the Storage Node to the Backup Server,
since metadata always has to travel through the LAN.

Backup and Recovery - 26

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

SAN/LAN Mixed Based Backups


Storage Node
Database Server
Backup Client

Mail Server
Backup Client

Data

LAN
Data

SAN

Metadata

Data

Backup
Device

Backup Server
2007 EMC Corporation. All rights reserved.

Backup and Recovery - 27

A SAN/LAN mixed based backup environment is achieved by using two or more of the topologies
described in the previous slides. In this example, some servers are SAN based while others are LAN
based.

Backup and Recovery - 27

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Backup Media
y Tape
Traditional destination for backups
Sequential access
No protection

y Disk
Random access
Protected by the storage array (RAID, hot spare, etc)

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 28

There are two common types of Backup media: Tape and Disk.

Backup and Recovery - 28

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Multiple Streams on Tape Media


Data from
Stream 1

Data from
Stream 2

Data from
Stream 3

Tape

y Multiple streams interleaved to achieve higher


throughput on tape
Keeps the tape streaming, for maximum write performance
Helps prevent tape mechanical failure
Greatly increases time to restore
2007 EMC Corporation. All rights reserved.

Backup and Recovery - 29

Tape drive streaming is recommended from all vendors in order to keep the drive busy. If you do not
keep the drive busy during the backup process (writing), performance suffers. Multiple streaming helps
to improve performance drastically, but it generates one issue as well: the backup data becomes
interleaved; thus, the recovery times are increased.

Backup and Recovery - 29

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Backup to Disk
y Backup to disk minimizes tape in backup environments
by using disk as the primary destination device
Cost benefits
No processes changes needed
Better service levels

y Backup to disk aligns backup strategy to RTO and


RPO

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 30

Backup to disk replaces tape and its associated devices, as the primary target for backup, with disk.
Backup to disk systems offer major advantages over equivalent scale tape systems, in terms of capital
costs, operating costs, support costs, and quality of service. It can be implemented fully on day 1 or
over a phased approach.

Backup and Recovery - 30

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Tape versus Disk Restore Comparison


24
Minutes

Disk
Backup / Restore

108
Minutes

Tape
Backup / Restore
0

10

20

30

40

50

60

70

80

90

100 110 120

Recovery Time in Minutes*


*Total time from point of failure to return of service to e-mail users

Typical Scenario:
y 800 users, 75 MB mailbox
y 60 GB database

Source: EMC Engineering and EMC IT


2007 EMC Corporation. All rights reserved.

Backup and Recovery - 31

31

This example shows a typical recovery scenario using tape and disk. As you can see, recovery with
disk provides much faster recovery than does recovery with tape.
This example shows a typical recovery scenario using tape and disk. As you can see, recovery with
disk provides much faster recovery than recovery with tape.It is important to keep in mind that this
example involves data recovery only. The time it takes to bring the application online is a separate
matter. Even so, you can see in this example that the benefit was a restore roughly five times faster
than it would have been with tape.

Backup and Recovery - 31

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Three Backup / Restore Solutions based on RTO


2 Min.
Local Replica /
Clone

Restore time

17 Min. 19 Minutes

Log playback

Backup on ATA

24 Min. 17 Min. 41 Minutes

Backup on tape

108 Min. 17 Min. 125 Minutes


0

10

20

30

40

50

60

70

80

90 100 110 120 130

Recovery Time in Minutes*


*Total time from point of failure to return of service to e-mail users

Typical Scenario:
y 800 users, 75 MB mailbox
y 60 GB DB restore time
y 500 MB logs log playback

2007 EMC Corporation. All rights reserved.

z Time of last image dictates

the log playback time


z Larger data sets extend the

recovery time (ATA and tape)

Backup and Recovery - 32

The diagram shows typical recovery scenarios using different technical solutions. As seen in the slide,
recovery with a Local Replica or clones provides the quickest recovery method.
It is important to note that using clones on disk enables you to be able to make more copies of your
data more often. This will improve RPO (the point from which they can recover). It also improves
RTO because the log files are smaller, reducing the log playback time.

Backup and Recovery - 32

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Traditional Backup, Recovery, and Archive Approach


y Production environment grows
Requires constant tuning and data placement to
maintain performance
Production

Need to add more tier-1 storage

y Backup environment grows


Backup windows get longer and jobs do not complete
Backup
Process

Restores take longer


Requires more tape drives and silos to keep up with
service levels

y Archive environment grows


Archive
Process

2007 EMC Corporation. All rights reserved.

Impact flexibility to retrieve content when requested


Requires more media, adding management cost
No investment protection for long term retention
requirements
Backup and Recovery - 33

In a traditional approach for backup and archive, businesses take a backup of production. Typically,
backup jobs use weekly full backups and nightly incremental backups. Based on business
requirements, they then copy the backup jobs and eject the tapes to have them sent offsite, where they
are stored for a specified amount of time.
The problem with this approach is simple; as the production environment grows, so does the backup
environment.

Backup and Recovery - 33

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Differences Between Backup / Recovery & Archive


Backup / Recovery

Archive

A secondary copy of information

Primary copy of information

Used for recovery operations

Available for information retrieval

Improves availability by enabling


application to be restored to a
specific point in time

Adds operational efficiencies by


moving fixed / unstructured content
out of operational environment

Typically short-term (weeks or


months)

Typically long-term (months, years,


or decades)

Data typically overwritten on


periodic basis (e.g., monthly)

Data typically maintained for


analysis, value generation, or
compliance

Not for regulatory compliance


though some are forced to use

Useful for compliance and should


take into account informationretention policy

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 34

Backup/recovery and archiving support different business and goals. This slide compares and
contrasts some of the differences that are significant.

Backup and Recovery - 34

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

New Architecture for Backup, Recovery & Archive


1
Backup
Process

3
4

2
Production

Archive
Process

n Understand the environment


o Actively archive valuable information to tiered
storage
p Back up active production information to disk
q Retrieve from archive or recover from backup
2007 EMC Corporation. All rights reserved.

Backup and Recovery - 35

The recovery process is much more important than the backup process. It is based on the appropriate
recovery-point objectives (RPOs) and recovery-time objectives (RTOs). The process usually drives a
decision to have a combination of technologies in place, from online local replicas, to backup to disk,
to backup to tape for long-term, passive RPOs.
Archive processes are determined not only by the required retention times, but also by retrieval-time
service levels and the availability requirements of the information in the archive.
For both processes, a combination of hardware and software is needed to deliver the appropriate
service level. The best way to discover the appropriate service level is to classify the data and align the
business applications with it.

Backup and Recovery - 35

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Lesson: Summary
Topics in this lesson included:
y The DAS, LAN, SAN, and Mixed topologies
y Backup media considerations

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 36

This lesson provided an overview of the different topologies and media types that support creating a
backup set.

Backup and Recovery - 36

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Lesson: Managing the Backup Process


Upon completion of this lesson, you be able to:
y Describe features and functions of common
Backup/Recovery applications
y Describe the Backup/Recovery process management
considerations
y Describe the importance of the information found in
Backup Reports and in the Backup Catalog

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 37

We have discussed the planning and operations of creating a backup. This lesson provides an overview
of management activities and applications that help manage the backup and recovery process.
The objectives for this lesson are shown here. Please take a moment to read them.

Backup and Recovery - 37

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

How a Typical Backup Application Works


y Backup clients are grouped and associated with a
Backup schedule that determines when and which
backup type will occur
y Groups are associated with Pools, which determine which
backup media will be used
y Each backup media has a unique label
y Information about the backup is written to the Backup
Catalog during and after it completes. The Catalog
shows:
when the Backup was performed, and
which media was used (label)

y Errors and other informationre is also written to a log


2007 EMC Corporation. All rights reserved.

Backup and Recovery - 38

This slide describes how a backup application works.


Backup clients are grouped and associated with a Backup schedule that determines when and which
backup type will occur.
Groups are associated with Pools, which determine which backup media will be used.
Each backup media has a unique label.
Information about the backup is written to the Backup Catalog during and after it completes. The
Catalog shows when the backup was performed, and which media, or label, was used.
Errors and other information are also written to a log.

Backup and Recovery - 38

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Backup Application User Interfaces


There are typically two types of user interfaces:
y Command Line Interface CLI
y Graphical User Interface GUI

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 39

There are two types of user interfaces, Command Line Interface (CLI) and Graphical User Interface
(GUI).
Command Line Interface CLI
y Backup administrators usually write scripts to automate common tasks, such as sending reports via
email
Graphical User Interfaces GUI
y Control the backup and restore process
y Multiple backup servers
y Multiple storage nodes
y Multiple platforms/operating systems
y Single and easy to use interface that provides the most common (if not all) administrative tasks

Backup and Recovery - 39

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Managing the Backup and Restore Process


y Running the B/R Application: Backup
The backup administrator configures it to be started, most (if not all)
of the times, automatically
Most backup products offer the ability for the backup client to initiate
their own backup (usually disabled)

y Running the B/R Application: Restore


There is usually a separate GUI to manage the restore process
Information is pulled from the backup catalog when the user is
selecting the files to be restored
Once the selection is finished, the backup server starts reading from
the required backup media, and the files are sent to the backup
client

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 40

Shown here are the common tasks associated with managing a Backup or Restore activity using the
B/R application.
Backup:
y Configuring a backup to be started automatically, most (if not all) of the time
y Enabling the backup client to initiate it own
Restore:
y There is usually a separate GUI to manage the restore process
y Information is pulled from the backup catalog when the user is selecting the files to be restored
y Once the selection is finished, the backup server starts reading from the required backup media,
and the files are sent to the backup client

Backup and Recovery - 40

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Backup Reports
y Backup products also offer reporting features
y These features rely on the backup catalog and log files
y Reports are meant to be easy to read and provide
important information such as:
Amount of data backed up
Number of completed backups
Number of incomplete backups (failed)
Types of errors that may have occurred

y Additional reports may be available, depending on the


backup software product used

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 41

Backup products also offer reporting features.


These features rely on the backup catalog and log files.
Reports are meant to be easy to read and provide important information such as:
y Amount of data backed up
y Number of completed backups
y Number of incomplete backups (failed)
y Types of errors that may have occurred

Backup and Recovery - 41

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Importance of the Backup Catalog


y As you can see, backup operations strongly rely on the
backup catalog
y If the catalog is lost, the backup software alone has no
means to determine where to find a specific file backed
up two months ago, for example
y It can be reconstructed, but this usually means that all of
the backup media (i.e. tapes) has to be read
y Its a good practice to protect the catalog
By replicating the file system where it resides to a remote location
By backing it up

y Some backup products have built-in mechanisms to


protect their catalog (such as automatic backup)
2007 EMC Corporation. All rights reserved.

Backup and Recovery - 42

The importance of the backup catalog is described here.


As you can see, backup operations strongly rely on the backup catalog.
If the catalog is lost, the backup software alone has no means to determine where to find a specific file
backed up two months ago, for example.
It can be reconstructed, but this usually means that all of the backup media has to be read.
Its a good practice to protect the catalog. This can be done by replicating the file system where it
resides to a remote location or by backing it up.
Some backup products have built-in mechanisms to protect their catalog, such as automatic backup.

Backup and Recovery - 42

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Lesson: Summary
Topics in this lesson included:
y The features and functions of common Backup/Recovery
applications
y The Backup/Recovery process management
considerations
y The importance of the information found in Backup
Reports and in the Backup Catalog

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 43

This lesson provided an overview of Backup and Recovery management activities and tools including:
The Backup Application process and user interface; Reports; and the Backup Catalog.

Backup and Recovery - 43

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Module Summary
Key points covered in this module:
y The best practices for planning Backup and Recovery
y The common media and types of data that are part of a
Backup and Recovery strategy
y The common Backup and Recovery topologies
y The Backup and Recovery Process
y Management considerations for Backup and Recovery

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 44

These are the key points covered in this module. Please take a moment to review them.

Backup and Recovery - 44

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

9 Check Your Knowledge


y What are three reasons for doing a Backup plan?
y What are the three topologies that support creating a
Backup set?
y What are the advantages and disadvantages of using
tape as the Backup media?
y What are the three levels of granularity found in
Backups?

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 45

Check your knowledge of this module by taking some time to answer the questions shown on the slide.

Backup and Recovery - 45

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Apply Your Knowledge

EMCs Product Implementation of a


Backup and Recovery Solution

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 46

At this point, lets apply what weve learned to some real world examples. In this case, we will
describe EMCs product implementation of a Backup and Recovery solution.

Backup and Recovery - 46

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

EMC NetWorker
Tiered Protection and Recovery Management

Remove risk
Faster and more consistent data
backup

Improve reliability
Keep recovery copies fresh and
reduce process errors

Lower total cost of


ownership

Basic
Tape backup
and recovery

Low

Backup
to disk

Advanced
backup

Disk-backup
option

Snapshot
management

SERVICE-LEVEL REQUIREMENTS

High

Centralization and ease of use

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 47

NetWorkers installed base of more than 20,000 customers worldwide is a testament to the products
market leadership.
Data-growth rates are accelerating, and the spectrum of data and systems that live in environments
runs the gamut from key applications that are central to the business to other types of information that
may be less important.
What is interesting is that the industry has been somewhat stuck for several years at a one-size-fits-all
strategy to backup and recovery. Were referring to a basic backup scenario, or traditional tape
backup.
Tape backup serves a noble purpose and is working very well for some companies; its been EMCs
core business for some time, so EMC knows it well. But shifting market dynamics, as well as more
demanding business environments, have lead to other important choices for backup.
Today, traditional tape faces the challenge of meeting service-level requirements for protection and
availability of an ever-increasing quantity of enterprise data. This is why EMC has built into
NetWorker key options to meet the needs of a wide range of environments. This includes the ability to
use disk for backup, as well as to take advantage of advanced-backup capabilities that connect backup
with array-based snapshot and replication management. These provide you with essentially the
highest-possible performance levels for backup and recovery. As the value of information changes
over time, you may choose any one of these, or a combination thereof, to meet your needs.

Backup and Recovery - 47

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

NetWorker Backup and Recovery


Solution Features
y Enterprise protection
Basic Architecture
Heterogeneous
clients

Critical applications
Heterogeneous platforms and
storage
Scalable architecture
256-bit AES encryption and secure
authentication

Key
applications

LAN
Backup
server
NAS
(NDMP)

SAN

Storage
Node

y Centralized management
Graphical user interface
Customizable reporting
Wizard-driven configuration

y Performance
Tape
library

Data multiplexing
Advanced indexing
Efficient media management

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 48

The first key focus is on providing complete coverage. Enterprise protection means the ability to provide coverage for all
the components in the environment. NetWorker provides data protection for the widest heterogeneous support of operating
systems, and is integrated with leading databases and applications for complete data protection.
A single NetWorker server can be used to protect all clients and servers in the environment, or secondary servers can be
employed, which EMC calls Storage Nodes, as a conduit for additional processing power or to protect large critical servers
directly across a SAN without having to take data back over the network. Such LAN-free backup is standard with
NetWorker.
NetWorker can easily back up environments in LAN, SAN, or WAN environments, with coverage for key storage such as
NAS. As a matter of fact, NetWorkers NAS-protection capabilities, leveraging the Network Data Management Protocol
(NDMP), are unequaled.
The key here is that NetWorker can easily grow and scale as needed in the environment and provide advanced
functionality, including clustering technologies, open-file protection and compatibility with tape hardware and the new
class of virtual-tape and virtual-disk libraries.
While NetWorker encompasses all these pieces in the environment, EMC has made sure there is a common set of
management tools.
With NetWorker, EMC has focused on what it takes within environments both large and small to get the best performance
possible, in terms of both speed and reliability. This means the inclusion of capabilities such as multiplexing to protect data
as quickly as possible while making use of the backup storages maximum bandwidth. It also means ensuring that the way
in which EMC indexes and manages the saving of data is designed to provide not only the best performance, but also
stability and reliability.

Backup and Recovery - 48

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Critical Application and Database Protection


Backup without Application
Modules

Backup with NetWorker


Application Modules

Offline (Cold)

Restart
application

24x7 OPERATIONS

SAVE

NetWorker MODULE

Back up
application

Application
Application

DOWNTIME

Shut down
application

Application

Integration with application APIs


for backup and recovery

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 49

Applications can be backed up either offline or online. NetWorker by itself can back up closed
applications as flat files. During an offline, or cold, backup, the application is shut down, backed up
and restarted after the backup is finished.
This is fine, but during the shutdown and backup period, the application is unavailable. This is not
acceptable in todays business environments. This is why EMC has worked to integrate NetWorker
with applications to provide online backup, specifically, with the use of NetWorker in conjunction
with NetWorker Modules.
During an online, or hot, backup, the application is open and is backed up while open. The NetWorker
Module extracts data for backup with an API; the application need not be shut down, and remains open
while the backup finishes.
NetWorker supports a wide range of applications for online backup with granular-level recovery,
including:
y
y
y
y
y
y
y
y

Oracle
Microsoft Exchange
Microsoft SQL Server
Lotus Notes
Sybase
Informix
IBM DB2
EMC Documentum
Backup and Recovery - 49

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Media-Management Advantages
y Open Tape Format
Datastream multiplexing
Self-contained indexing
Cross-platform format
UNIX Windows Linux

Minimize impact of tape corruption

y Dynamic drive sharing


Cross-platform tape-drive sharing
On-demand device usage
Reduce hardware total cost of
ownership

NetWorker
UNIX/Linux

2007 EMC Corporation. All rights reserved.

NetWorker
Windows

Backup and Recovery - 50

One key advantage of NetWorker is its media-management features.


The first feature is Open Tape Format. It is NetWorkers way of recording data to tape, specifically designed to
provide several advantages:
y Data can be multiplexed, or interleaved, for performance. This essentially means data can be accepted and
written to the backup media as it comes in, regardless of what order it comes in, so the tape drives can keep
spinning. This enables you to back up faster, but also reduces wear and tear on the tape hardware, which is
more susceptible to error if it is continually stopping and starting.
y Tapes created by NetWorker are self-describing, so if everything else is gone except for the tape, youll be
able to load it and understand what data is there to be restored.
y As the image on the right indicates, Open Tape Format allows you to move tape media between systems and
servers on unlike operating systems, with Open Tape Format, a tape that began life on a UNIX-based system
can easily be read on a Windows-based system. This is key not just for disaster recovery, but for the entire
environment, as you go through a regular system lifecycle and adopt new platforms.
y Also, with Open Tape Format, NetWorker can skip bad spots on tape and continue data access. When other
solutions on the market encounter any error on tape, they are unable to do anything further with the tape.
Imagine if there is a bad spot 100 MB into a backup tape.
y Finally, NetWorker can broker tape devices on a SAN to get the best use and performance out of the
hardware investment. So, instead of hard-assigning tape drives to a backup server or Storage Node, you can
dynamically allocate any drive on demand.

Backup and Recovery - 50

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

NetWorker DiskBackup Option


Backup-to-Disk Architecture
Heterogeneous
clients

Key
applications

Backup
server
SAN

Simultaneous-access operations
No penalty on restore versus tape

y Policy-based migration of data


from disk to tape
LAN

NAS

y High performance

Storage
Node

Automated staging and cloning


Up to 50% faster
Clone backups jobs as they
complete
Reduce wear and tear on tape
drives and cartridges

y Superior capability
Tape
library

2007 EMC Corporation. All rights reserved.

Diskbackup
target

Operational backup and recovery


for all clients, including NAS with
NDMP
Direct file access for fast recovery
Backup and Recovery - 51

The focus here is the resolution of the top pain points around traditional tape-based backup.
Performance NetWorker backup to disk allows for simultaneous-access operations to a volume, both
reads (restore, staging, cloning) and writes (backups). With NetWorker, as opposed to with traditional
tape-only backup, you dont "pay a penalty on restore."
Also, cloning from disk to tape is up to 50% faster. Why? As soon as the Save Set (backup job) is
complete, the cloning process can begin without the Administrator having to wait for all the backup
jobs to complete. NetWorker can back up to disk and clone to tape at the same time. You dont have to
spend 1216 hours a day running clone operations (tape-to-tape copies); in fact, you might actually be
able to eliminate the clone jobs. Some NetWorker customers have seen cloning times reduced from
1216 hours daily to three to four hours daily.
Cloning from disk to tape also augments the disaster-recovery strategy for tape. As data grows, more
copies must be sent offsite. Because NetWorker backup to disk improves cloning performance, you
can continue to meet the daily service-level agreements to get tapes offsite to a vaulting provider.
Taking the idea of leveraging disk even further, leads us into a discussion of NetWorkers advanced
backup capability, which also leverages disk-based technologies.

Backup and Recovery - 51

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Advanced Backup - Snapshots and CDP


y Integration of backup with snapshots, full-volume mirrors,
Production
and Continuous Data Protection (CDP)
server

y Instant restore
y Off-host backups
Production

information
y Achieve stringent recovery-time objectives
(RTOs),
recovery-point objectives (RPOs)
Recover

It is expected that snapshot


technology for data protection will
surpass backup to tape as the trend
in data protection as organizations
continue to focus on recovery times
2007 EMC Corporation. All rights reserved.

Backup

Snapshot
5:00 p.m.
Snapshot
11:00 a.m.

Backup snap
10:00 p.m.

Backup
server
Backup and Recovery - 52

Disk-solution providers, like EMC, provide array-based abilities to perform snapshots and replication.
These point-in-time copies of data allow for instant recovery of disk and data volumes. Many are
likely familiar with array-based replication or snapshot capabilities.
NetWorker is engineered to take advantage of these capabilities by providing direct tie-ins with EMC
offerings such as CLARiiON with SnapView, or Symmetrix with TimeFinder/Snap. This enables you
to begin to meet the most stringent recovery requirements.
In a study done in the spring of 2004, the Taneja Group identified that the market intends to rely on
snapshots for ensuring application-data availability and rapid recoveries. The figures represent a scale
of one to five, with one as the low point, five as the high point:
y Rapid application recovery (4.34)
y Ability to automate backup to tape (4.13)
y Instant backup (3.98)
y Roll back to point in time (3.88)
y Integration with backup strategy (3.87)
y Flexibility to leverage hardware (3.61)
y Multiple fulls throughout day (3.49)

Backup and Recovery - 52

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

NetWorker PowerSnap Module


y Policy-based management

Advanced Backup
Heterogeneous
clients

Administer snapshots in
NetWorker
Schedule, create, retain, and
delete snapshots by policy

Key
applications

y Third-party integration
LAN
Backup
server
NAS
SAN

Tape
library

Leverage third-party replication


technology
Array-based (Symmetrix DMX,
CLARiiON CX, etc.)

Storage
Node

Software-based (RecoverPoint)

y Application recovery
CLARiiON
with
SnapView

Integration with Application


Modules to ensure consistent
state
Exchange / SQL / Oracle / SAP

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 53

In addition to traditional backup-and-recovery application modules for disk and tape, the snapshot
management capability called NetWorker PowerSnap enables you to meet the demanding service-level
agreement requirements in both tape and disk environments by seamlessly integrating snapshot
technology and applications. NetWorker PowerSnap software works with NetWorker Modules to
enable snapshot backups of applicationswith consistency.
PowerSnap performs snapshot management by policy, just like standard backup policies to tape or
disk. It uses these policies to determine how many snapshots to create, how long to retain the
snapshots, when to do backups to tape from specified snapshotsall based on business needs that you
define.
For example, snapshots might be taken every few hours, and the three most recent are retained. You
can easily leverage any of those snapshots to back up to tape in an off-host fashion, i.e., with no impact
to the application servers.
PowerSnap manages the full life cycle of snapshots, including creation, scheduling, backups, and
expiration. This, along with its orchestration with applications, provides a comprehensive solution for
complete application-data protection to help you meet the most stringent of RTOs and RPOs.

Backup and Recovery - 53

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

NetWorker SnapImage Module


Advanced Backup

y Block-level backups
Host-based snapshot
Targeted at high-density file
systems
Single-file restore
Sparse backups

y High performance
Significant backup-and-restore
performance impactup to 10
times faster
Drive tape at rated speeds

10,000,000+ files
1,000,000+ directories

2007 EMC Corporation. All rights reserved.

Optional network-accelerated
serverless backup with Cisco
intelligent switch

Backup and Recovery - 54

If there are servers with lots of files and lots of directories, what we refer to as high-density file
systems, backup and recovery are particularly challenging. With so many files, traditional backup
struggles to keep up with backup windows.
NetWorker SnapImage enables block-level backup of these file systems while maintaining the ability
to restore a single file. SnapImage is intelligent enough to also support sparse backups.
y Sparse files contain data with portions of empty blocks, or zeroes.
y NetWorker backs up only the non-zero blocks, thereby reducing:
Time for backup
Amount of backup-media space consumed
y Sparse-file examples:
Large database files with deleted data or unused database fields
Files from image applications
y With the NetWorker SnapImage Module, backup and recovery of servers with high-density file
systems is significantly increased:
The time required to back up 18.8 million 1 KB files in a 100 GB file system with a block size
of 4 KB can be reduced from 31 to seven hours.
The time required to perform a Save Set restore of one million 4 KB files in a 5.36 GB internal
disk can be reduced from 72 to seven minutes.

Backup and Recovery - 54

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Solution Example: Major Telecom Company


Enterprise-Information Protection
Solution:

Business Challenge:

y NetWorker PowerSnap with


Symmetrix and TimeFinder/Snap

y Complex application
environment

Server-free backup

y No backup window
y Recovery-time objective:
Restore 24 TB in two
hours

y NetWorker DiskBackup Option with


CLARiiON with ATA disks
Rapid primary-site protection

y NetWorker and SRDF/S

Disaster-Recovery Site

Disaster recovery
Offsite protection

Production Site
NetWorker

Disasterrecovery host
Tape
library

Storage Node
Application
host

Storage Node
PowerSnap

SAN
SAN

Tape
library

SRDF/S
Symmetrix
DMX

Symmetrix
DMX

2007 EMC Corporation. All rights reserved.

CLARiiON
CX

Value Proposition
Zero backup window for
applications
Eliminated data-loss risk
Reduced management
overhead

Backup and Recovery - 55

55

An example of EMC NetWorker solution is shown in the slide.


EMC has worked with a large telecommunications company to meet their most demanding IT challenges:
y Complex application environmentOracle, and lots of data
y No backup window
y Recovery-time objective: Restore 24 TB in two hours.
They chose to implement NetWorker, along with other key EMC offerings, to achieve a superior level of protection and
recovery managementand confidence in the ability to recover.
Solution:
y NetWorker PowerSnap with Symmetrix and TimeFinder/Snap
Server-free backup and rapid recovery
y NetWorker DiskBackup with CLARiiON with ATA disks
Rapid primary-site protection and recovery
y NetWorker and SRDF/S
Disaster recovery, offsite protection
Here is what they have been able to achieve with the above:
y Zero backup time for their applications
y Zero data loss
y Significantly reduced management overhead
Not all environments are this complex or demanding, but NetWorker can meet any backup and recovery requirements, and
can easily be upgraded to meet more stringent requirements as needed.

Backup and Recovery - 55

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Summary
Key points covered in this topic:
y EMCs product implementation of a Backup and
Recovery solution

2007 EMC Corporation. All rights reserved.

Backup and Recovery - 56

In this topic, we described EMCs product implementation of a Backup and Recovery solution.
This concludes the module.

Backup and Recovery - 56

Backup and Recovery Case Study


Business Profile:
A manufacturing corporation uses tape as their primary backup storage media throughout
the entire organization.
Current Situation/Issue:
Full backups are run every Sunday. Incremental backups are run from Monday through
Saturday. There are many backup servers in the environment, backing up different groups
of servers.
Their e-mail and database applications have to be shut down during the backup process.
The main concerns facing the corporation are:
1) Due to the de-centralized backup environment, recoverability of the backup servers is
compromised.
2) Key applications have to be shut down during the backup process.
3) Too many tapes need to be mounted in order to perform a full recover, in case of a
complete failure.
The company would like to:
1) Deploy an easy-to-manage backup environment.
2) Reduce the amount of time the email and database applications need to be shutdown.
3) Reduce the number of tapes required to fully recover a server in case of failure.
Proposal:
Propose a backup and recovery solution to address the companys concern. Justify how
your solution will ensure that the companys needs are met.

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Local Replication
Upon completion of this module, you will be able to:
y Discuss replicas and the possible uses of replicas
y Explain consistency considerations when replicating file
systems and databases
y Discuss host and array based replication technologies
Functionality
Differences
Considerations
Selecting the appropriate technology

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 1

In this module, we will look at what replication is, technologies used for creating local replicas, and
things that need to be considered when creating replicas.
The objectives for the module are shown here. Please take a moment to read them.

Business Continuity Local Replication

-1

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

What is Replication
y Replica - An exact copy (in all details)
y Replication - The process of reproducing data

REPLICATION

Original

2007 EMC Corporation. All rights reserved.

Replica

Business Continuity Local Replication - 2

Local replication is a technique for ensuring Business Continuity by making exact copies of data. With
replication, data on the replica is identical to the data on the original at the point-in-time that the
replica was created.
Examples:
y Copy a specific file
y Copy all the data used by a database application
y Copy all the data in a UNIX Volume Group (including underlying logical volumes, file systems,
etc.)
y Copy data on a storage array to a remote storage array

Business Continuity Local Replication

-2

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Possible Uses of Replicas


y Alternate source for backup
y Source for fast recovery
y Decision support
y Testing platform
y Migration

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 3

Replicas can be used to address a number of Business Continuity functions:


y Provide an alternate source for backup to alleviate the impact on production
y Provide a source for fast recovery to facilitate faster RPO and RTO
y Decision Support activities such as reporting
For example, a company may have a requirement to generate periodic reports. Running the
reports off of the replicas greatly reduces the burden placed on the production volumes.
Typically reports would need to be generated once a day or once a week, etc.
y Developing and testing proposed changes to an application or an operating environment
For example, the application can be run on an alternate server using the replica volumes and
any proposed design changes can be tested
y Data migration
Migration can be as simple as moving applications from one server to the next, or as
complicated as migrating entire data centers from one location to another.

Business Continuity Local Replication

-3

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Considerations
y What makes a replica good
Recoverability
Considerations for resuming operations with primary

Consistency/re-startability
How is this achieved by various technologies

y Kinds of Replicas
Point-in-Time (PIT) = finite RPO
Continuous = zero RPO

y How does the choice of replication technology tie back


into RPO/RTO

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 4

Key factors to consider with replicas:


y What makes a replica good:
Recoverability from a failure on the production volumes. The replication technology must
allow for the restoration of data from the replicas to the production and then allow production
to resume with a minimal RPO an RTO
Consistency/re-startability is very important if data on the replicas will be accessed directly or
if the replicas will be used for restore operations
y Replicas can either be Point-in-Time (PIT) or continuous:
Point-in-Time (PIT) - the data on the replica is an identical image of the production at some
specific timestamp
For example, a replica of a file system is created at 4:00 PM on Monday. This replica
would then be referred to as the Monday 4:00 PM Point-in-Time copy
Note: The RPO will be a finite value with any PIT. The RPO will map to the time when the
PIT was created to the time when any kind of failure on the production occurred. If there is
a failure on the production at 8:00 PM and there is a 4:00 PM PIT available, the RPO would
be 4 hours (8 4 = 4). To minimize RPO with PITs, take periodic PITs
Continuous replica - the data on the replica is synchronized with the production data at all
times
The objective with any continuous replication is to reduce the RPO to zero

Business Continuity Local Replication

-4

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Replication of File Systems


Host
Apps
Operating System
Mgmt Utilities

DBMS
File System

Buffer

Volume Management
Multi-pathing Software
Device Drivers
HBA

HBA

HBA

Physical Volume
2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 5

Most OS file systems buffer data in the host before the data is written to the disk on which the file
system resides.
y For data consistency on the replica, the host buffers must be flushed prior to the creation of the
PIT. If the host buffers are not flushed, the data on the replica will not contain the information that
was buffered on the host.
y Some level of recovery will be necessary
Note: If the file system is unmounted prior to the creation of the PIT, no recovery would be needed
when accessing data on the replica.

Business Continuity Local Replication

-5

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Replication of Database Applications


y A database application may be spread out over
numerous files, file systems, and devices,all of which
must be replicated
y Database replication can be offline or online

Data

2007 EMC Corporation. All rights reserved.

Logs

Business Continuity Local Replication - 6

Database replication can be offline or online:


y Offline replication takes place when the database and the application are shutdown
y Online replication takes place when the database and the application are running

Business Continuity Local Replication

-6

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Database: Understanding Consistency


y Databases/Applications maintain integrity by following the
Dependent Write I/O Principle
Dependent Write: A write I/O that will not be issued by an application
until a prior related write I/O has completed
A logical dependency, not a time dependency

Inherent in all Database Management Systems (DBMS)


e.g. Page (data) write is dependent write I/O based on a successful log
write

Applications can also use this technology


Necessary for protection against local outages
Power failures create a dependent write consistent image
A Restart transforms the dependent write consistent to transactionally
consistent
i.e. Committed transactions will be recovered, in-flight transactions will be
discarded
2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 7

All logging database management systems use the concept of dependent write I/Os to maintain
integrity. This is the definition of dependent write consistency. Dependent write consistency is
required for the protection against local power outages, loss of local channel connectivity, or storage
devices. The logical dependency between I/Os is built into database management systems, certain
applications, and operating systems.

Business Continuity Local Replication

-7

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Database Replication: Transactions


Buffer

Database
Application

Data

Log

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 8

Database applications require that for a transaction to be deemed complete, a series of writes have to
occur in a particular order (Dependent Write I/O). These writes would be recorded on the various
devices/file systems.
y In this example, steps 1-4 must complete for the transaction to be deemed complete
Step 4 is dependent on Step 3 and will occur only if Step 3 is complete
Step 3 is dependent on Step 2 will occur only if Step 2 is complete
Step 2 is dependent on Step 1 will occur only if Step 1 is complete
y Steps 1-4 are written to the databases buffer and then to the physical disks

Business Continuity Local Replication

-8

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Database Replication: Consistency


Source

Data

Replica

Log

Data

Log

Consistent
Note: In this example, the database is online.
2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 9

At the point in time when the replica is created, all the writes to the source devices must be captured
on the replica devices to ensure data consistency on the replica.
y In this example, steps 1-4 on the source devices must be captured on the replica devices for the
data on the replicas to be consistent.

Business Continuity Local Replication

-9

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Database Replication: Consistency


Source

Replica

Data

Log

Inconsistent
Note: In this example, the database is online.
2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 10

Creating a PIT for multiple devices happens quickly, but not instantaneously.
y Steps 1-4 which are dependent write I/Os have occurred and have been recorded successfully on
the source devices
y It is possible that steps 3 and 4 were copied to the replica devices, while steps 1 and 2 were not
copied
y In this case, the data on the replica is inconsistent with the data on the source. If a restart were to be
performed on the replica devices, Step 4 which is available on the replica might indicate that a
particular transaction is complete, but all the data associated with the transaction will be
unavailable on the replica making the replica inconsistent.

Business Continuity Local Replication

- 10

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Database Replication: Ensuring Consistency


y Off-line Replication
If the database is offline or
shutdown and then a replica is
created, the replica will be
consistent

Source

Replica

In many cases, creating an offline


replica may not be a viable due to
the 24x7 nature of business

Data

Database
Application
(Offline)

Log

Consistent

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 11

Database replication can be performed with the application offline (i.e., application is shutdown, no
I/O activity) or online (i.e., while the application is up and running). If the application is offline, the
replica will be consistent because there is no activity. However, consistency is an issue if the database
application is replicated while it is up and running.

Business Continuity Local Replication

- 11

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Database Replication: Ensuring Consistency


y Online Replication
Some database applications allow
replication while the application is up
and running
The production database would have to
be put in a state which would allow it to
be replicated while it is active
Some level of recovery must be
performed on the replica to make the
replica consistent

Source

Replica

Data

Log

Inconsistent

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 12

In the situation shown, Steps 1-4 are dependent write I/Os. The replica is inconsistent because Steps 1
and 2 never made it to the replica. To make the database consistent, some level of recovery would have
to be performed. In this example, it could be done by simply discarding the transaction that was
represented by Steps 1-4. Many databases are capable of performing such recovery tasks.

Business Continuity Local Replication

- 12

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Database Replication: Ensuring Consistency


Source

Replica

Consistent

Business Continuity Local Replication - 13

2007 EMC Corporation. All rights reserved.

An alternative way to ensure that an online replica is consistent is to:


Hold I/O to all the devices at the same instant
Create the replica
Release the I/O
Holding I/O is similar to a power failure and most databases have the ability to restart from a power
failure.
Note: While holding I/O simultaneously, one ensures that the data on the replica is identical to that on
the source devices. The database application times out if I/O is held for too long.

Business Continuity Local Replication

- 13

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Tracking Changes After PIT Creation

At PIT

Later

Resynch

Source = Target

Source Target

Source = Target

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 14

Changes occur on the production volume after the creation of a PIT. Changes could also occur on the
target. Typically the target device re-synchronizes with the source device at some future time in order
to obtain a more recent PIT.
Note: The replication technology employed should have a mechanism to keep track of changes. This
makes the re-synchronization process much faster. If the replication technology does not track changes
between the source and target, every resynchronization operation has to be a full operation.

Business Continuity Local Replication

- 14

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Local Replication Technologies


y Host based
Logical Volume Manager (LVM) based mirroring
File System Snapshots

y Storage Array based


Full volume mirroring
Full volume: Copy on First Access
Pointer based: Copy on First Write

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 15

Replication technologies can classified by:


y Distance over which replication is performed - local or remote
y Where the replication is performed - host or array based
Host based - all the replication is performed by using the CPU resources of the host using
software that is running on the host.
Array based - all replication is performed on the storage array using CPU resources on the array
via the arrays operating environment.
Note: In the context of this discussion, local replication refers to replication that is performed within a
data center if it is host based, and within a storage array if it is array based.

Business Continuity Local Replication

- 15

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Logical Volume Manager: Review


y Host resident software responsible for
creating and controlling host level logical
storage

Logical Storage

Physical view of storage is converted to a


logical view by mapping. Logical data
blocks are mapped to physical data blocks
Logical layer resides between the physical
layer (physical devices and device drivers)
and the application layer (OS and
applications see logical view of storage)

LVM

y Usually offered as part of the operating


system or as third party host software
y LVM Components:
Physical Volumes
Volume Groups
Logical Volumes

2007 EMC Corporation. All rights reserved.

Physical Storage

Business Continuity Local Replication - 16

Logical Volume Managers (LVMs) introduce a logical layer between the operating system and the
physical storage. LVMs have the ability to define logical storage structures that can span multiple
physical devices. The logical storage structures appear contiguous to the operating system and
applications.
The fact that logical storage structures can span multiple physical devices provides flexibility and
additional functionality:
y Dynamic extension of file systems
y Host based mirroring
y Host based striping
The Logical Volume Manager provides a set of operating system commands, library subroutines, and
other tools that enable the creation and control of logical storage.

Business Continuity Local Replication

- 16

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Volume Groups
y One or more Physical Volumes
form a Volume Group
y LVM manages Volume Groups
as a single entity
y Physical Volumes can be added
and removed from a Volume
Group as necessary
y Physical Volumes are typically
divided into contiguous equalsized disk blocks

Physical
Volume 1

Physical
Volume 2

Physical
Volume 3

Volume Group
Physical
Disk
Block

y A host will always have at least


one disk group for the Operating
System
Application and Operating
System data maintained in
separate volume groups
2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 17

A Volume Group is created by grouping together one or more Physical Volumes. Physical Volumes:
y Can be added or removed from a Volume Group dynamically
y Cannot be shared between Volume Groups, the entire Physical Volume becomes part of a Volume
Group
Each Physical Volume is partitioned into equal-sized data blocks. The size of a Logical Volume is
based on a multiple of the equal-sized data block.
The Volume Group is handled as a single unit by the LVM.
y A Volume Group as a whole can be activated or deactivated
y A Volume Group would typically contain related information. For example, each host would have
a Volume Group which holds all the OS data, while applications would be on separate Volume
Groups.
Logical Volumes are created within a given Volume Group. A Logical Volume can be thought of as a
virtual disk partition, while the Volume Group itself can be though of as a disk. A Volume Group can
have a number of Logical Volumes.

Business Continuity Local Replication

- 17

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Logical Volumes
Logical Volume
Logical Volume

Physical Volume 1

Physical Volume 2

Volume Group
2007 EMC Corporation. All rights reserved.

Logical Disk
Block

Physical Volume 3
Physical Disk
Block
Business Continuity Local Replication - 18

Logical Volumes (LV) form the basis of logical storage. They contain logically contiguous data blocks
(or logical partitions) within the volume group. Each logical partition is mapped to at least one
physical partition on a physical volume within the Volume Group. The OS treats an LV like a physical
device and accesses it via device special files (character or block). A Logical Volume:
y Can only belong to one Volume Group. However, a Volume Group can have multiple LVs
y Can span multiple physical volumes
y Can be made up of physical disk blocks that are not physically contiguous
y Appears as a series of contiguous data blocks to the OS
y Can contain a file system or be used directly. Note: There is a one-to-one relationship between LV
and a File System
Note: Under normal circumstances, there is a one-to-one mapping between a logical and physical
Partition. A one-to-many mapping between a logical and physical partition leads to mirroring of
Logical Volumes.

Business Continuity Local Replication

- 18

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Host Based Replication: Mirrored Logical Volumes

PVID1

Host

Logical Volume

VGDA

Physical
Volume 1

VGDA

Physical
Volume 2

Logical Volume

PVID2

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 19

Logical Volumes may be mirrored to improve data availability. In mirrored logical volumes, every
logical partition maps to 2 or more physical partitions on different physical volumes.
y Logical volume mirrors may be added and removed dynamically
y A mirror can be split and data contained used independently
The advantages of mirroring a Logical Volume are high availability and load balancing during reads if
the parallel policy is used. The cost of mirroring is additional CPU cycles necessary to perform two
writes for every write and the longer cycle time needed to complete the writes.

Business Continuity Local Replication

- 19

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Host Based Replication: File System Snapshots


y Many LVM vendors will allow the creation of File System
Snapshots while a File System is mounted
y File System snapshots are typically easier to manage
than creating mirrored logical volumes and then splitting
them

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 20

Many Logical Volume Manager vendors will allow the creation of File System snapshots while a File
System is mounted. File System snapshots are typically easier to manage than creating mirrored logical
volumes and then splitting them.

Business Continuity Local Replication

- 20

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Host (LVM) Based Replicas: Disadvantages


y LVM based replicas add overhead on host CPUs
y If host devices are already Storage Array devices then
the added redundancy provided by LVM mirroring is
unnecessary
The devices will have some RAID protection already

y Host based replicas can be usually presented back to the


same server
y Keeping track of changes after the replica has been
created

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 21

Host based replicas can be usually presented back to the same server:
y Using the replica from the same host for any BC operation adds an additional CPU burden on the
server
y Replica is useful for fast recovery if there is any logical corruption on the source at the File System
level
y Replica itself may become unavailable if there is a problem at the Volume Group level
y If the Server fails, then the replica and the source would be unavailable until the server is brought
online or another server is given access to the Volume group
y Presenting a LVM based local replica to a second host is usually not possible because the replica
will still be part of the volume group which is usually accessed by one host at any given time
Keeping track of changes after the replica has been created:
y If changes are not tracked, all future resynchronization will be a full operation
y Some LVMs may offer incremental resynchronization

Business Continuity Local Replication

- 21

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Storage Array Based Local Replication


y Replication performed by the Array Operating
Environment
y Replicas are on the same array

Array

Source

Production
Server

2007 EMC Corporation. All rights reserved.

Replica

Business
Continuity Server

Business Continuity Local Replication - 22

With storage array based local replication:


y Replication performed by the Array Operating Environment
Array CPU resources are used for the replication operations
Host CPU resources can be devoted to production operations instead of replication operations
y Replicas are on the same array
Can be accessed by an alternate host for any BC operations
y Typically array based replication is performed at a array device level.
Need to map storage components used by an application back to the specific array devices used
then replicate those devices on the array.
A database could be laid out on over multiple physical volumes which belong. One would have
to replicate all the devices for a PIT copy of the database.

Business Continuity Local Replication

- 22

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Storage Array Based Local Replication Example


y Typically Array based replication is done at a array device
level
Need to map storage components used by an application/file system
back to the specific array devices used then replicate those
devices on the array
Array 1

Logical Volume 1

c12t1d1

c12t1d2

File System 1

Source
Vol 1

Replica
Vol 1

Source
Vol 2

Replica
Vol 2

Volume Group 1

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 23

In this example, File System 1 has to be replicated.


y File System 1 is actually built on Logical Volume 1, which in turn is a part of Volume Group 1,
which is made up of two Physical Volumes c12t1d1 and c12t1d2
y These physical volumes are actually residing in Array 1 and are Source Vol1 and Source Vol2
y In order to replicate File System 1, one has to actually replicate the two Array Devices
y Since 2 Array Volumes have to replicated we need two Array Volumes to act as the replica
volumes. In this example Replica Vol1 and Replica Vol2 are used for the replication

Business Continuity Local Replication

- 23

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Based Local Replication: Full Volume Mirror

Attached
Read/Write

Not Ready

Target

Source
Array

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 24

Full volume mirroring is achieved by attaching the target device to the source device and then copying
all the data from the source to the target. The target is unavailable to its host while it is attached to the
source, and the synchronization occurs.
y Target (Replica) device is attached to the Source device and the entire data from the source device
is copied over to the target device
y During this attachment and synchronization period, the Target device is unavailable

Business Continuity Local Replication

- 24

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Based Local Replication: Full Volume Mirror

Detached - PIT
Read/Write

Read/Write

Target

Source
Array

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 25

After the synchronization is complete, the target can be detached from the source and be made
available for Business Continuity operations. The point-in-time (PIT) is determined by the time of
detachment or separation of the Source and Target. For example, if the detachment time is 4:00 PM,
the PIT of the replica is 4:00 PM.

Business Continuity Local Replication

- 25

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Based Local Replication: Full Volume Mirror


y For future re-synchronization to be incremental, most
vendors have the ability to track changes at some level of
granularity (e.g., 512 byte block, 32 KB, etc.)
Tracking is typically done with some kind of bitmap

y Target device must be at least as large as the Source


device
For full volume copies the minimum amount of storage required is
the same as the size of the source

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 26

For future re-synchronization to be incremental, most vendors have the ability to track changes at some
level of granularity, such as 512 byte block, 32 KB, etc. Tracking is typically done with some kind of
bitmap.
The target device must be at least as large as the source device. For full volume copies, the minimum
amount of storage required is the same as the size of the source.

Business Continuity Local Replication

- 26

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Copy on First Access (COFA)


y Target device is made accessible for BC tasks as soon
as the replication session is started
y Point-in-Time is determined by time of activation
y Can be used in Copy First Access mode (deferred) or in
Full Copy mode
y Target device is at least as large as the Source device

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 27

Copy on First Access (COFA) provides an alternate method to create full volume copies. Unlike Full
Volume mirrors, the replica is immediately available when the session is started (no waiting for full
synchronization).
y The PIT is determined by the time of activation of the session. Just like the full volume mirror
technology, this method requires the Target devices to be at least as large as the source devices.
y A protection map is created for all the data on the Source device at some level of granularity (e.g.,
512 byte block, 32 KB, etc.). Then the data is copied from the source to the target in the
background based on the mode with which the replication session was invoked.

Business Continuity Local Replication

- 27

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Copy on First Access Mode: Deferred Mode


Write to Source
Read/Write

Read/Write

Target

Source

Write to Target
Read/Write

Read/Write

Source

Target

Read from Target


Read/Write

Read/Write

Source
2007 EMC Corporation. All rights reserved.

Target
Business Continuity Local Replication - 28

In the Copy on First Access mode (or the deferred mode), data is copied from the source to the target
only when:
y A write is issued for the first time after the PIT to a specific address on the source
y A read or write is issued for the first time after the PIT to a specific address on the target.
Since data is only copied when required, if the replication session is terminated, the target device only
has data that was copied (not the entire contents of the source at the PIT). In this scenario, the data on
the target cannot be used as it is incomplete.

Business Continuity Local Replication

- 28

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Copy on First Access: Full Copy Mode


y On session start, the entire contents of the Source device
is copied to the Target device in the background
y Most vendor implementations provide the ability to track
changes:
Made to the Source or Target
Enables incremental re-synchronization

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 29

In Full Copy Mode, the target is made available immediately and all the data from the source is copied
over to the target in the background.
y During this process, if a data block that has not yet been copied to the target is accessed, the
replication process jumps ahead and moves the required data block first.
y When a full copy mode session is terminated (after full synchronization), the data on the target is
still usable as it is a full copy of the original data.

Business Continuity Local Replication

- 29

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array: Pointer Based Copy on First Write


y Targets do not hold actual data, but hold pointers to
where the data is located
Actual storage requirement for the replicas is usually a small fraction
of the size of the source volumes

y A replication session is setup between the Source and


Target devices and started
When the session is setup based on the specific vendors
implementation a protection map is created for all the data on the
Source device at some level of granularity (e.g 512 byte block, 32
KB etc.)
Target devices are accessible immediately when the session is
started
At the start of the session the Target device holds pointers to the
data on the Source device
2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 30

Unlike full volume replicas, the target devices for pointer based replicas only hold pointers to the
location of the data but not the data itself. When the copy session is started, the target device holds
pointers to the data on the source device. The primary advantage of pointer based copies is the
reduction in storage requirement for the replicas.

Business Continuity Local Replication

- 30

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Pointer Based Copy on First Write Example


Target
Virtual Device

Source

2007 EMC Corporation. All rights reserved.

Save Location

Business Continuity Local Replication - 31

The original data block from the Source is copied to the save location, when a data block is first
written to after the PIT.
y Prior to a new write to the source or target device:
Data is copied from the source to a save location
The pointer for that specific address on the Target then points to the save location
Writes to the Target result in writes to the save location and the updating of the pointer to the
save location
y If a write is issued to the source for the first time after the PIT, the original data block is copied to
the save location and the pointer is updated from the Source to the save location.
y If a write is issued to the Target for the first time after the PIT, the original data is copied from the
Source to the Save location, the pointer is updated and then the new data is written to the save
location.
y Reads from the Target are serviced by the Source device or from the save location based on the
where the pointer directs the read.
Source When data has not changed since PIT
Save Location When data has changed since PIT
Data on the replica is a combined view of unchanged data on the Source and the save location. Hence,
if the Source device becomes unavailable, the replica no longer has valid data.

Business Continuity Local Replication

- 31

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Replicas: Tracking Changes


y Changes will/can occur to the Source/Target devices
after PIT has been created
y How and at what level of granularity should this be
tracked
Too expensive to track changes at a bit by bit level
Would require an equivalent amount of storage to keep track of which bit
changed for each the source and the target

Based on the vendor some level of granularity is chosen and a bit


map is created (one for Source and one for Target)
One could choose 32 KB as the granularity
For a 1 GB device changes would be tracked for 32768, 32KB chunks
If any change is made to any bit on one 32KB chunk the whole chunk is
flagged as changed in the bit map
1 GB device map would only take up 32768/8/1024 = 4KB space
2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 32

It is too expensive to track changes at a bit by bit level because it would require an equivalent amount
of storage to keep track of which bit changed for both the Source and the Target.
Some level of granularity is chosen and a bit map is created -- one for the Source and one for the
Target. The level of granularity is vendor specific.

Business Continuity Local Replication

- 32

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Replicas: How Changes Are Determined


Source

Target

Source

Target

Target

At PIT

After PIT

Re-synch
(Source to
Target)

0 = unchanged
2007 EMC Corporation. All rights reserved.

1 = changed
Business Continuity Local Replication - 33

Differential/incremental re-synchronization (Source to Target) or restore (Target to Source):


y The bitmaps for the source and target are all set to 0 at the PIT
y Any changes to the source or target after PIT are flagged by setting appropriate bit to 1 in the bitmap
y When re-synchronization or a restore is required, a logical OR operation between the source bitmap and the
target bitmap is performed. The bitmap resulting from this operation references all blocks that have been
modified in either the source or the target. This enables an optimized re-synchronization or a restore
operation, as it eliminates the need to copy all the blocks between the source and the target.
y If re-synchronization is required, then changes to the target are overwritten with the corresponding blocks
from the source. In the example shown, these would be blocks 3, 4, and 8 on the target (starting from left).
Changes to the source are propagated to the target. In the example shown, these would be blocks 1, 4, and 6
on the source.
y If restore is required, then changes to the source are overwritten with the corresponding blocks from the
target. Changes to the target are propagated to the source.
y In either case, both the changes to the source and to the target cannot be simultaneously preserved.
The result of the logical OR operation is shown on slide. The direction of data movement will be depend on
whether a re-synchronization or a restore operation is performed.
Question: In a hypothetical scenario, wherein starting with block 1, every alternate block on the source has
changed, and starting with block 2, every alternate block on the target has changed, what would be the result and
impact on re-synchronization or a restore?

Business Continuity Local Replication

- 33

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Replication: Multiple PITs


Target Devices
06:00 A.M.

Source

12:00 P.M.

Point-In-Time
06:00 P.M.

12:00 A.M.

: 12 : 01 : 02 : 03 : 04 : 05 : 06 : 07 : 08 : 09 : 10 : 11 : 12 : 01 : 02 : 03 : 04 : 05 : 06 : 07 : 08 : 09 : 10 : 11 :
A.M.
2007 EMC Corporation. All rights reserved.

P.M.
Business Continuity Local Replication - 34

Most array based replication technologies allow the Source devices to maintain replication
relationships with multiple Targets.
y This can also reduce RTO because the restore can be a differential restore
y Each PIT could be used for a different BC activity and also as restore points
In this example, a PIT is created every six hours from the same source. If any logical or physical
corruption occurs on the Source, the data can be recovered from the latest PIT and at worst, the RPO
will be 6 hours.

Business Continuity Local Replication

- 34

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Replicas: Ensuring Consistency


Source

&

Replica

Source

Replica

Consistent

2007 EMC Corporation. All rights reserved.

'

Inconsistent

Business Continuity Local Replication - 35

Most array based replication technologies allow the creation of consistent replicas by holding I/O to all
devices simultaneously when the PIT is created.
y Typically, applications are spread out over multiple devices
Could be on the same array or multiple arrays
y Replication technology must ensure that the PIT is consistent for the whole application
Need mechanism to ensure that updates do not occur while PIT is created
y Hold I/O to all devices simultaneously for an instant, create PIT and release I/O
Cannot hold I/O for too long, application will timeout

Business Continuity Local Replication

- 35

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Mechanisms to Hold I/O


y Host based
y Array based
y What if the application straddles multiple hosts and
multiple arrays

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 36

Mechanisms to hold I/O:


y Host based
Some host based application could be used to hold I/O to all the array devices that are to be
replicated when the PIT is created
Typically achieved at the device driver level or above before the I/O reaches the HBAs
Some vendors implement this at the multi-pathing software layer
y Array based
I/Os can be held for all the array devices that are to be replicated by the Array Operating
Environment in the array itself when the PIT is created
What if the application straddles multiple hosts and multiple arrays?
y Federated Databases
y Some array vendors are able to ensure consistency in this situation

Business Continuity Local Replication

- 36

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Replicas: Restore/Restart Considerations


y Production has a failure
Logical Corruption
Physical failure of production devices
Failure of Production server

y Solution
Restore data from replica to production
The restore would typically be done in an incremental manner and the
Applications would be restarted even before the synchronization is
complete leading to very small RTO

-----OR----- Start production on replica


Resolve issues with production while continuing operations on replicas
After issue resolution restore latest data on replica to production
2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 37

Failures can occur in many different ways:


y There could be a logical corruption of the data on the production devices, the devices are available
but the data on them is corrupt. In this case, opt to restore the data to the production from the latest
replica.
y Production devices may become unavailable due to physical failures (Production server down,
physical drive failure etc.). In this case, start the production on the latest replica and then while the
production is being done from the replicas fix the physical problems on the Production side. Once
the situation has been resolved, the latest information from the replica devices can be restored back
to the production volumes.
In either of these scenarios, it is a good idea to stop access to the production and replica devices, and
then identify the replica that will be used for the restore or the restart operations.

Business Continuity Local Replication

- 37

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Replicas: Restore/Restart Considerations


y Before a Restore
Stop all access to the Production devices and the Replica devices
Identify Replica to be used for restore
Based on RPO and Data Consistency

Perform Restore

y Before starting production on Replica


Stop all access to the Production devices and the Replica devices
Identify Replica to be used for restart
Based on RPO and Data Consistency

Create a Gold copy of Replica


As a precaution against further failures

Start production on Replica

y RTO drives choice of replication technology


2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 38

Based on the type of failure, choose to either perform a restore to the production devices or shift
production operations to the replica devices. In either case, the recommendation would be to stop
access to the production and replica devices, then identify the replica to be used for the restore or
restart operations.
The choice of replica depends on the consistency of the data on the replica and the desired RPO (e.g., a
business may create PIT replicas every 2 hours; if a failure occurs, then at most only 2 hours of data
would have been lost). If a replica has been written (application testing for example) to after the
creation of the PIT, then this replica may not be a viable candidate for the restore or restart.
Note: RTO is a key driver in the choice of replication technology. The ability to restore or restart
almost instantaneously after any failure is very important.

Business Continuity Local Replication

- 38

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Replicas: Restore Considerations


y Full Volume Replicas
Restores can be performed to either the original source device or to
any other device of like size
Restores to the original source could be incremental in nature
Restore to a new device would involve a full synchronization

y Pointer Based Replicas


Restores can be performed to the original source or to any other
device of like size as long as the original source device is healthy
Target only has pointers
Pointers to source for data that has not been written to after PIT
Pointers to the save location for data was written after PIT

Thus to perform a restore to an alternate volume the source must be


healthy to access data that has not yet been copied over to the target

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 39

With Full Volume replicas, all the data that was on the source device when the PIT was created is
available on the Replica (either with Full Volume Mirroring or Full Volume Copies). With Pointer
Based Replicas and Full Volume Copies in deferred mode (COFA), access to all the data on the
Replica is dependent on the health (accessibility) of the original source volumes. If the original source
volume is inaccessible for any reason, pointer based or Full Volume Copy on First Access replicas are
of no use in either a restore or a restart scenario.

Business Continuity Local Replication

- 39

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Replicas: Which Technology


y Full Volume Replica
Replica is a full physical copy of the source device
Storage requirement is identical to the source device
Restore does not require a healthy source device
Activity on replica will have no performance impact on the source
device
Good for full backup, decision support, development, testing and
restore to last PIT
RPO depends on when the last PIT was created
RTO is extremely small

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 40

Full Volume replicas have a number of advantages over Pointer based (COFW) and Copy On First
Access technologies.
y The replica has the entire contents of the original source device from the PIT and any activity to
the replica has no performance impact on the source device (there is no COFA or COFW penalty)
y Full Volume replicas can be used for any BC activity
y The only disadvantage is that the storage requirements for the replica are at least equal to that of
the source devices

Business Continuity Local Replication

- 40

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Replicas: Which Technology (continued)


y Pointer based - COFW
Replica contains pointers to data
Storage requirement is a fraction of the source device (lower cost)

Restore requires a healthy source device


Activity on replica will have some performance impact on source
Any first write to the source or target will require data to be copied to the
save location and move pointer to save location
Any read I/O to data not in the save location will have to be serviced by
the source device

Typically recommended if the changes to the source are less than


30%
RPO depends on when the last PIT was created
RTO is extremely small

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 41

The main benefit of Pointer based copies is the lower storage requirement for the replicas. This
technology is also very useful when the changes to the Source are expected to be less that 30% after
the PIT has been created. Heavy activity on the Target devices may cause performance impact on the
Source because any first writes to the Target require data to be copied from the source to the Save
location. Also, any reads which are not in the save area have to be read from the Source device. The
Source device needs to be accessible for any restart or restore operations from the Target.

Business Continuity Local Replication

- 41

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Replicas: Which Technology


y Full Volume COFA Replicas
Replica only has data that was accessed
Restore requires a healthy source device
Activity on replica will have some performance impact
Any first access on target will require data to be copied to target before
the I/O to/from target can be satisfied

Typically replicas created with COFA only are not as useful as


replicas created with the full copy mode Recommendation would
be to use the full copy mode if the technology allows such an option

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 42

Listed here, are some considerations for using Full Volume Copy on First Access (COFA).
The COFA technology requires at least the same amount of storage as the Source. The disadvantages
of the COFA penalty, and the fact that the replica would be of no use if the source volume were
inaccessible, make this technology less desirable. If a Full Copy mode is available, then always use the
Full Copy mode. The advantages are identical to that discussed for Full Volume replicas.

Business Continuity Local Replication

- 42

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Replicas: Full Volume vs. Pointer Based


Full Volume

Pointer Based

Required Storage

100% of Source

Fraction of Source

Performance Impact

None

Some

RTO

Very small

Very small

Restore

Source need not be


healthy

Requires a healthy
source device

Data change

No limits

< 30%

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 43

This table summarizes the differences between Full Volume and Pointer Base replication technologies.

Business Continuity Local Replication

- 43

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Module Summary
Key points covered in this module:
y Replicas and the possible use of Replicas
y Consistency considerations when replicating File
Systems and Databases
y Host and Array based Replication Technologies
Advantages/Disadvantages
Differences
Considerations
Selecting the appropriate technology

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 44

These are the key points covered in this module. Please take a moment to review them.

Business Continuity Local Replication

- 44

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

9 Check Your Knowledge


y What is a replica?
y What are the possible uses of a replica?
y What is consistency in the context of a database?
y How can consistency be ensured when replicating a
database?
y Discuss one host based replication technology
y What is the difference between full volume mirrors and
pointer based replicas?
y What are the considerations when performing restore
operations for each replication technology?
2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 45

Check your knowledge of this module by taking some time to answer the questions shown on the slide.

Business Continuity Local Replication

- 45

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Apply Your Knowledge

EMCs Local Replication Solutions for the Symmetrix


and CLARiiON Arrays

EMCs TimeFinder/Mirror Replication Solution

EMCs SnapView - Snapshot Replication Solution

Business Continuity Local Replication - 46

2007 EMC Corporation. All rights reserved.

At this point, lets apply what weve learned to some real world examples. Upon completion of this
topic you will be able to:
List EMCs Local Replication Solutions for the Symmetrix and CLARiiON arrays;
Describe EMCs TimeFinder/Mirror Replication Solution; and
Describe EMCs SnapView - Snapshot Replication Solution

Business Continuity Local Replication

- 46

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

EMC Local Replication Solutions


y EMC Symmetrix Arrays
EMC TimeFinder/Mirror
Full volume mirroring

EMC TimeFinder/Clone
Full volume replication

EMC TimeFinder/SNAP
Pointer based replication

y EMC CLARiiON Arrays


EMC SnapView Clone
Full volume replication

EMC SnapView Snapshot


Pointer based replication

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 47

All the Local Replication solutions that were discussed in this module are available on EMC
Symmetrix and CLARiiON arrays.
y EMC TimeFinder/Mirror and EMC TimeFinder/Clone are full volume replication solutions on the
Symmetrix arrays, while EMC TimeFinder/Snap is a pointer based replication solution on the
Symmetrix. EMC SnapView on the CLARiiON arrays allows full volume replication via
SnapView Clone and pointer based replication via SnapView Snapshot.
y EMC TimeFinder/Mirror: Highly available, ultra-performance mirror images of Symmetrix
volumes that can be non-disruptively split off and used as point-in-time copies for backups,
restores, decision support, or contingency uses.
y EMC TimeFinder/Clone: Highly functional, high-performance, full volume copies of Symmetrix
volumes that can be used as point-in-time copies for data warehouse refreshes, backups, online
restores, and volume migrations.
y EMC SnapView Clone: Highly functional, high-performance, full volume copies of CLARiiON
volumes that can be used as point-in-time copies for data warehouse refreshes, backups, online
restores, and volume migrations.
y EMC TimeFinder/Snap: High function, space-saving, pointer-based copies (logical images) of
Symmetrix volumes that can be used for fast and efficient disk-based restores.
y EMC SnapView Snapshot: High function, space-saving, pointer-based copies (logical images) of
CLARiiON volumes that can be used for fast and efficient disk-based restores.
EMC TimeFinder/Mirror and EMC SnapView Snapshot are discussed in more detail on the next few
slides.

Business Continuity Local Replication

- 47

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

EMC TimeFinder/Mirror - Introduction


y Array based local replication technology for Full Volume Mirroring
on EMC Symmetrix Storage Arrays
Create Full Volume Mirrors of an EMC Symmetrix device within an Array

y TimeFinder/Mirror uses special Symmetrix devices called Business


Continuance Volumes (BCV). BCVs:
Are devices dedicated for Local Replication
Can be dynamically, non-disruptively established with a Standard device.
They can be subsequently split instantly to create a PIT copy of data.

y The PIT copy of data can be used in a number of ways:

Instant restore Use BCVs as standby data for recovery


Decision Support operations
Backup Reduce application downtime to a minimum (offline backup)
Testing

y TimeFinder/Mirror is available in both Open Systems and Mainframe


environments
2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 48

EMC TimeFinder/Mirror is an array based local replication technology for Full Volume Mirroring on
EMC Symmetrix Storage Arrays.
y TimeFinder/Mirror Business Continuance Volumes (BCV) are devices dedicated to local
replication.
y The BCVs are typically established with a standard Symmetrix device to create a Full Volume
Mirror.
y After the data has been synchronized, the BCV can be split from its source device and used for
any BC task. TimeFinder controls available on Open Systems and Mainframe environments.

Business Continuity Local Replication

- 48

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

EMC TimeFinder/Mirror Operations


y Establish
Synchronize the Standard volume to the BCV volume
BCV is set to a Not Ready state when
established
BCV cannot be independently addressed

Re-synchronization is incremental

STD

BCVs cannot be established to other BCVs


Establish operation is non-disruptive to the
Standard device

BCV

Establish
Incremental Establish

Operations to the Standard can proceed as


normal during the establish

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 49

The TimeFinder Establish operation is the first step in creating a TimeFinder/Mirror replica. The
purpose of the establish operation is to synchronize the contents from the Standard device to the BCV.
The first time a BCV is established with a standard device, a full synchronization has to be performed.
Any future re-synchronization can be incremental in nature. The Symmetrix microcode can keep track
of changes made to either the Standard or the BCV.
y The Establish is a non-disruptive operation to the Standard device. I/O to Standard devices can
proceed during establish. Applications need not be quiesced during the establish operation.
y The Establish operation sets a Not Ready status on the BCV device. Hence, all I/O to the BCV
device must be stopped before the Establish operation is performed. Since BCVs are dedicated
replication devices, a BCV cannot be established with another BCV.

Business Continuity Local Replication

- 49

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

EMC TimeFinder/Mirror Operations


y Split
Time of Split is the Point-in-Time
BCV is made accessible for BC Operations
Consistency
Consistent Split

Changes tracked

STD

BCV

Split

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 50

The Point-in-Time of the replica is tied to the time when the Split operation is executed.
The Split operation separates the BCV from the Standard Symmetrix device and makes the BCV
device available for host access through its own device address. After the split operation, changes
made to the Standard or BCV devices are tracked by the Symmetrix Microcode. EMC
TimeFinder/Mirror ensures consistency of data on the BCV devices via the Consistent Split option.

Business Continuity Local Replication

- 50

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

EMC TimeFinder/Mirror Consistent Split


EMC PowerPath

Enginuity Consistency Assist


Host

STD

BCV

STD

BCV

y PowerPath is an EMC host based y Symmetrix Microcode holds I/O


multi-pathing software
during TimeFinder/Mirror Split
y PowerPath holds I/O during
TimeFinder/Mirror Split

- Write I/O (subsequent reads


after first write)

Read and write I/O


2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 51

The TimeFinder/Mirror Consistent Split option ensures that the data on the BCVs is consistent with the
data on the Standard devices. Consistent Split holds I/O across a group of devices using a single
Consistent Split command, thus all the BCVs in the group are consistent point-in-time copies. It is used
to create a consistent point-in-time copy of an entire system, database, or any associated set of
volumes.
The holding of I/Os can be either done by the EMC PowerPath multi-pathing software or the
Symmetrix Microcode (Enginuity Consistency Assist). With PowerPath-based consistent split
executed by the host doing the I/O, I/O is held at the host before the split.
Enginuity Consistency Assist (ECA) based consistent split can be executed by the host doing the I/O or
by a control host in an environment where there are distributed and/or related databases. I/O is held at
the Symmetrix until the split operation is completed. Since I/O is held at the Symmetrix, ECA can be
used to perform consistent splits on BCV pairs across multiple, heterogeneous hosts.

Business Continuity Local Replication

- 51

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

EMC TimeFinder/Mirror Operations


y Restore
Synchronize contents of BCV volume to the
Standard volume
STD

Restore can be full or incremental

BCV

BCV is set to a Not Ready state


I/Os to the Standard and BCVs should be
stopped before the restore is initiated

Incremental Restore

y Query
Provide current status of BCV/Standard volume
pairs

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 52

The purpose of the restore operation is to synchronize the data on the BCVs from a prior Point in Time
to the Standard devices. Restore is a recovery operation, so all I/Os to the Standard device should be
stopped and the device must be taken offline prior to a restore operation. The restore sets the BCV
device to a Not-Ready state, thus all I/Os to the BCV devices must be stopped and the devices must be
offline before issuing the restore command.
Operations on the Standard volumes can resume as soon as the restore operation is initiated, while the
synchronization of the Standards from the BCV is still in progress.
The query operation is used to provide current status of Standard/BCV volume pairs.

Business Continuity Local Replication

- 52

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

EMC TimeFinder/Mirror Multi-BCVs


y Standard device keeps track of changes to multiple BCVs
one after the other
y Incremental establish or restore
Incremental establish
BCV

2:00 a.m.

Establish

Standard
volume

Split

Standard
volume

BCV

4:00 a.m.

or
BCV

4:00 a.m.

Establish

Incremental restore

Split

BCV
2007 EMC Corporation. All rights reserved.

6:00 a.m.
Business Continuity Local Replication - 53

TimeFinder/Mirror allows a given Standard device to maintain incremental relationships with multiple
BCVs.
This means that different BCVs can be established and then split incrementally from a standard
volume at different times of the day. For example, a BCV that was split at 4:00 a.m. can be reestablished incrementally, even though another BCV was established and split at 5:00 a.m. In this way,
a user can split and incrementally re-establish volumes throughout the day or night and still keep reestablish times to a minimum.
Incremental information can be retained between a STD device and multiple BCV devices, provided
the BCV devices have not been paired with different STD devices.
The incremental relationship is maintained between each STD/BCV pairing by the Symmetrix
Microcode.

Business Continuity Local Replication

- 53

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

TimeFinder/Mirror Concurrent BCVs


y Two BCVs can be established
concurrently with the same
Standard device
y Establish BCVs simultaneously or
one after the other
y BCVs can be split individually or
simultaneously.
y Simultaneous. Concurrent
Restores, are not allowed

2007 EMC Corporation. All rights reserved.

BCV1

Standard

BCV2

Business Continuity Local Replication - 54

Concurrent BCVs is a TimeFinder/Mirror feature that allows two BCVs to be simultaneously attached
to a standard volume. The BCV pair can be split, providing customers with two copies of the
customers data. Each BCV can be mounted online and made available for processing.

Business Continuity Local Replication

- 54

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

EMC CLARiiON SnapView - Snapshots


y SnapView allows full copies and pointer-based copies
Full copies Clones (sometimes called BCVs)
Pointer-based copies Snapshots

y Because they are pointer-based, Snapshots


Use less space than a full copy
Require a save area to be provisioned
May impact the performance of the LUN they are associated with

y The save area is called the Reserved LUN Pool


y The Reserved LUN Pool
Consists of private LUNs (LUNs not visible to a host)
Must be provisioned before Snapshots can be made
2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 55

SnapView is software that runs on the CLARiiON Storage Processors and is part of the CLARiiON Replication
Software suite of products, which includes SnapView, MirrorView and SAN Copy.
SnapView can be used to make point in time (PIT) copies in 2 different ways Clones, also called BCVs or
Business Continuity Volumes, are full copies, whereas Snapshots use a pointer-based mechanism. Full copies are
covered later, when we look at Symmetrix TimeFinder. SnapView Snapshots is covered here.
The generic pointer-based mechanism has been discussed in a previous section, so well concentrate on
SnapView.
Snapshots require a save area, called the Reserved LUN Pool. The Reserved part of the name implies that the
LUNs are reserved for use by CLARiiON software, and therefore cannot be assigned to a host. LUNs which
cannot be assigned to a host are known as private LUNs in the CLARiiON environment.
To keep the number of pointers, and therefore the pointer map, at a reasonable size, SnapView divides the LUN
to be snapped, called a Source LUN, into areas of 64 kB in size. Each of these areas is known as a chunk. Any
change to data inside a chunk causes that chunk to be written to the Reserved LUN Pool, if it is being modified
for the first time. The 64 kB copied from the Source LUN must fit into a 64 kB area in the Reserved LUN, so
Reserved LUNs are also divided into chunks for tracking purposes.
The next 2 slides show more detail on the Reserved LUN Pool, and allocation of Reserved LUNs to a Source
LUN.

Business Continuity Local Replication

- 55

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

The Reserved LUN Pool


Reserved LUN
Pool

FLARE LUN 5

Private LUN 5

FLARE LUN 6

Private LUN 6

FLARE LUN 7

Private LUN 7

FLARE LUN 8

Private LUN 8

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 56

The CLARiiON storage system must be configured with a Reserved LUN Pool in order to use
SnapView Snapshot features. The Reserved LUN Pool consists of 2 parts: LUNs for use by SPA and
LUNs for use by SPB. Each of those parts is made up of one or more Reserved LUNs. The LUNs used
are bound in the normal manner. However, they are not placed in storage groups and allocated to hosts;
they are used internally by the storage system software. These are known as private LUNs because
they cannot be used, or seen, by attached hosts.
Like any LUN, a Reserved LUN is owned by only one SP at any time and may be trespassed if the
need arises (i.e., if an SP fails).
Just as each storage system model has a maximum number of LUNs it supports, each also has a
maximum number of LUNs which may be added to the Reserved LUN Pool.
The first step in SnapView configuration usually is the assignment of LUNs to the Reserved LUN
Pool. Only then are SnapView Sessions allowed to start. Remember that as snapable LUNs are added
to the storage system, the LUN Pool size has to be reviewed. Changes may be made online.
LUNs used in the Reserved LUN Pool are not host-visible, though they do count towards the
maximum number of LUNs allowed on a storage system.
Note: FLARE is the operating environment of the EMC CLARiiON Arrays.

Business Continuity Local Replication

- 56

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Reserved LUN Allocation

Reserved LUN
Pool

Source LUNs
Snapshot 1a

Session 1a

Snapshot 1b

Session 1b

Private LUN 5
LUN 1

Private LUN 6

Private LUN 7

Private LUN 8
LUN 2

Snapshot 2a

2007 EMC Corporation. All rights reserved.

Session 2a

Business Continuity Local Replication - 57

In this example, LUN 1 and LUN 2 have been changed to Source LUNs by the creation of one or more
Snapshots on each. Three Sessions are started on those Source LUNs. Once a Session starts, the
SnapView mechanism tracks changes to the LUN and Reserved LUN Pool space is required. In this
example, the following occurs:
y Session 1a is started on Snapshot 1a
y Private LUN 5 in the Reserved LUN Pool is immediately allocated to Source LUN 1, and changes
made to that Source LUN are placed in Private LUN 5
y A second Session, Session 1b, is started on Snapshot 1b, and changes to the Source LUN are still
saved in Private LUN 5
y When PL 5 fills up, SnapView allocates the next available LUN, Private LUN 6, to Source LUN 1,
and the process continues
y Sessions 1a and 1b are now storing information in PL 6
y A Session is then started on Source LUN 2, and Private LUN 7 a new LUN, since Source LUNs
cannot share a Private LUN - is allocated to it
y Once that LUN fills, Private LUN 8 will be allocated
y If all private LUNs have been allocated, and Session 1b causes Private LUN 6 to become full, then
Session 1b is terminated by SnapView without warning. SnapView does notify the user in the SP
Event Log, and, if Event Monitor is active in other ways, the Reserved LUN Pool is filling up. This
notification allows ample time to correct the condition. Notification takes place when the Reserved
LUN Pool is 50% full, then again at 75%, and every 5% thereafter.

Business Continuity Local Replication

- 57

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

SnapView Terms
y Snapshot
The virtual LUN seen by a secondary host
Made up of data on the Source LUN and data in the RLP
Visible to the host (online) if associated with a Session

y Session
The mechanism that tracks the changes
Maintains the pointers and the map
Represents the point in time

y Activate and deactivate a Snapshot


Associate and disassociate a Session with a Snapshot

y Roll back
Copy data from a (typically earlier) Session to the Source LUN
2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 58

Lets use an analogy to make the distinction easier to understand. Well compare this technology to
CD technology.
You can own a CD player, but have no CDs. Similarly, You can own CDs, but not have a player. CDs
are only useful if you can listen to them; also, you can only listen to one at a time on a player, no
matter how many CDs owned.
In the same way, a Session (the CD) is a Point-in-Time copy of data on a LUN. The exact time is
determined by the time at which the session starts.
The Snapshot (the CD player in our analogy) allows us to view the Session data (listen to the CD). The
sequence of slides that follows demonstrates the COFW process and the rollback process.

Business Continuity Local Replication

- 58

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

COFW and Reads from Snapshot


Chunk
0

Chunk
1

Chunk
2

Chunk
3

Chunk
4
Source LUN

Primary Host

Secondary
Host

Snapshot

Map

SnapView
Map
Reserved LUN
2007 EMC Corporation. All rights reserved.

y
y

SP memory
Business Continuity Local Replication - 59

At the start of the animation the SnapView Map, Reserved LUN, and the Map in SP Memory
should all be empty. Solid arrows point from Snapshot chunks to the Source LUN chunks. Dotted
arrows to Source LUN and to Snapshot go from the Map area in SP Memory. Source LUN
chunks are labeled Chunk 0, Chunk 1, Chunk 2, Chunk 3, and Chunk 4.
Primary Host issues a write to Chunk 3 on the Source LUN. This is indicated by a dotted arrow to
Chunk 3 on the Source LUN from the Primary Host. A block travels out of the Primary Host. The
block waits between the Primary Host and the Source LUN. Chunk 3 is copied to the first Chunk
on the Reserved LUN, and this is now labeled Chunk 3. SnapView Map and SP Memory Map are
updated. The solid arrow from Snapshot to the Source LUN Chunk 3 disappears and new Solid
arrow from Snapshot to the Reserved LUN Chunk 3 appears. The dotted arrow to Chunk 3 on
Source LUN disappears. A dotted arrow to Reserved LUN chunk 3 appears.
Next the block travels to Chunk 3 on the Source LUN. 3 changes to 3.
Another block travels from the Primary Host to Chunk 3 on the Source LUN. This is placed there
and 3 changes to 3.

Business Continuity Local Replication

- 59

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

COFW and Reads from Snapshot


Chunk
0

Chunk
1

Chunk
2

Chunk
3

Source LUN

Primary Host

Secondary
Host

SnapView
Map

Chunk
4

Snapshot

Map

Chunk
3
Reserved LUN

2007 EMC Corporation. All rights reserved.

SP memory
Business Continuity Local Replication - 60

y Next Primary Host issues a write to Chunk 0 on the Source LUN. This is indicated by a dotted
arrow to Chunk 0 on the Source LUN from the Primary Host. A block travels out of the Primary
Host. The block waits between the Primary Host and the Source LUN. Chunk 0 is copied to the
second Chunk on the Reserved LUN, and this is now labeled Chunk 0. SnapView Map and SP
Memory Map are updated. The solid arrow from Snapshot to the Source LUN Chunk 0 disappears
and new Solid arrow from Snapshot to the Reserved LUN Chunk 0 appears. The dotted arrow to
Chunk 0 on Source LUN disappears. A dotted arrow to Reserved LUN chunk 0 appears.
y Next the block travels to Chunk 0 on the Source LUN. 0 changes to 0.
y Next the Secondary Host issues a read to Chunk 4 on the Snapshot. This is indicated by a dotted
arrow from Chunk 4 on the Snapshot to the Secondary Host.
y A block travels from Chunk 4 of the Source LUN to Chunk 4 of the Snapshot. Then the block
travels on to the Secondary Host.
y Next the Secondary Host issues a read to Chunk 0 on the Snapshot. This is indicated by a dotted
arrow from Chunk 0 on the Snapshot to the Secondary Host.
y A block travels from Chunk 0 of the Reserved LUN to Chunk 0 of the Snapshot. Then the block
travels on to the Secondary Host.

Business Continuity Local Replication

- 60

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

COFW and Reads from Snapshot


Chunk
0

Chunk
1

Chunk
2

Chunk
3

Source LUN

Primary Host

Secondary
Host

SnapView
Map

Chunk
4

Snapshot

Map

Chunk
3
Reserved LUN

2007 EMC Corporation. All rights reserved.

SP memory
Business Continuity Local Replication - 61

Business Continuity Local Replication

- 61

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

COFW and Reads from Snapshot


Chunk
0

Chunk
1

Chunk
2

Chunk
3

Source LUN

Primary Host

Secondary
Host

SnapView
Map

Chunk
4

Snapshot

Chunk
3

Chunk
0
Reserved LUN

2007 EMC Corporation. All rights reserved.

Map

SP memory
Business Continuity Local Replication - 62

Business Continuity Local Replication

- 62

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Writes to Snapshot
Chunk
0

Chunk
1

Chunk
2

Chunk
3

Source LUN

Primary Host

Secondary
Host

SnapView
Map

Snapshot

Chunk
3

2007 EMC Corporation. All rights reserved.

y
y
y
y
y
y

y
y

Map

Chunk
0
Reserved LUN

Chunk
4

SP memory
Business Continuity Local Replication - 63

Secondary host issues a write to Chunk 0 of the Snapshot. This is indicated by a dotted arrow
from Secondary host to Chunk 0 of the Snapshot.
A block starts from Secondary host and waits between the Secondary host and the Snapshot.
Chunk 0 on the Reserved LUN is copied over to the next Chunk in the Reserved LUN.
Block travels to Chunk 0 of Snapshot and then to the original Chunk 0 on the Reserved LUN. 0
changes to 0* in the Reserved LUN.
Next the Secondary host issues a write to Chunk 2 of the Snapshot. This is indicated by a dotted
arrow from Secondary host to Chunk 2 of the Snapshot.
A block travels from Secondary host and waits between the Secondary host and the Snapshot.
Chunk 2 is copied from Source LUN to the next available Chunk in the Reserved LUN. The solid
arrow from Chunk 2 of Snapshot to Chunk 2 of Source LUN disappears. Solid arrow from Chunk
2 of Snapshot to Chunk 2 in the Reserved LUN appears. Dotted arrow to Chunk 2 on the Source
LUN disappears and a dotted arrow to Chunk 2 on the Reserved LUN appears. SnapView Map
and the Map in SP memory are updated
Chunk 2 on the Reserved LUN is copied to the next Chunk on the Reserved LUN. A dotted
arrow appears.
The block travels to Chunk 2 on the Snapshot and then on to the original location of Chunk 2 on
the Reserved LUN. 2 on the Reserved LUN is changed to 2*.

Business Continuity Local Replication

- 63

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Writes to Snapshot
Chunk
0

Chunk
1

Chunk
2

Chunk
3

Source LUN

Primary Host

Snapshot

Secondary
Host

SnapView
Map

Chunk
4

Chunk
3

Chunk
0*

Chunk
0

Reserved LUN
2007 EMC Corporation. All rights reserved.

Map

SP memory
Business Continuity Local Replication - 64

Business Continuity Local Replication

- 64

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Writes to Snapshot
Chunk
0

Chunk
1

Chunk
2

Chunk
3

Source LUN

Primary Host

Snapshot

Secondary
Host

SnapView
Map

Chunk
4

Chunk
3

Chunk
0*

Chunk
0

Chunk
2*

Reserved LUN
2007 EMC Corporation. All rights reserved.

Map

Chunk
2
SP memory
Business Continuity Local Replication - 65

Business Continuity Local Replication

- 65

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Rollback - Snapshot Active (preserve changes)


Chunk
0

Chunk
1

Chunk
2

Chunk
3

Source LUN

Primary Host

Snapshot

Secondary
Host

SnapView
Map

Chunk
4

Chunk
3

Chunk
0*

Chunk
0

Chunk
2*

Reserved LUN
2007 EMC Corporation. All rights reserved.

Map

Chunk
2
SP memory
Business Continuity Local Replication - 66

SnapView rollback allows a Source LUN to be returned to its state at a previously defined point in
time. When performing the rollback, you can choose to preserve or discard any changes made by the
secondary host. In this first example, changes are preserved. Meaning that the state of the Source LUN
at the end of the rollback process is identical to the Snapshot, as it appears now.
All chunks that are in the Reserved LUN Pool are copied over the corresponding chunks on the Source
LUN. Before this process starts, it is necessary to take the Source LUN offline (we are changing the
data structure without the knowledge of the host operating system, and it needs to refresh its view of
that structure). If this step is not performed, data corruption could occur on the Source LUN.
Note: No changes are made to the Snapshot or to the Reserved LUN Pool when this process takes
place.

Business Continuity Local Replication

- 66

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Rollback - Snapshot Active (preserve changes)


Chunk
0*

Chunk
1

Chunk
2*

Chunk
3

Source LUN

Primary Host

Snapshot

Secondary
Host

SnapView
Map

Chunk
4

Chunk
3

Chunk
0*

Chunk
0

Chunk
2*

Reserved LUN
2007 EMC Corporation. All rights reserved.

Map

Chunk
2
SP memory
Business Continuity Local Replication - 67

Business Continuity Local Replication

- 67

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Rollback - Snapshot Deactivated (discard changes)


Chunk
0*

Chunk
1

Chunk
2*

Chunk
3

Source LUN

Primary Host

Snapshot

Secondary
Host

SnapView
Map

Chunk
4

Chunk
3

Chunk
0*

Chunk
0

Chunk
2*

Reserved LUN
2007 EMC Corporation. All rights reserved.

Map

Chunk
2
SP memory
Business Continuity Local Replication - 68

In this example, all changes that have been made to the Snapshot by the secondary host are discarded,
and return the Source LUN to the state it was in when the session was started (the original PIT view).
To do this, the Snapshot needs to be deactivated. Deactivating the Snapshot discards all changes made
by the secondary host, and frees up areas of the Reserved LUN Pool which were holding those
changes. It also makes the Snapshot unavailable to the secondary host.
Once the deactivation has completed, the rollback process can be started. At this point, the Source
LUN needs to be taken offline. The Source LUN is then returned to its original state at the time the
session was started.

Business Continuity Local Replication

- 68

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Rollback - Snapshot Deactivated (discard changes)


Chunk
0

Chunk
1

Chunk
2

Chunk
3

Chunk
4
Source LUN

Primary Host

Snapshot

Secondary
Host

SnapView
Map

Chunk
3

Chunk
0
Reserved LUN

2007 EMC Corporation. All rights reserved.

Map

Chunk
2
SP memory
Business Continuity Local Replication - 69

Business Continuity Local Replication

- 69

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Rollback - Snapshot Deactivated (discard changes)


Chunk
0

Chunk
1

Chunk
2

Chunk
3

Chunk
4
Source LUN

Primary Host

Snapshot

Secondary
Host

SnapView
Map

Chunk
3

Chunk
0
Reserved LUN

2007 EMC Corporation. All rights reserved.

Map

Chunk
2
SP memory
Business Continuity Local Replication - 70

Business Continuity Local Replication

- 70

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Summary
Key points covered in this topic:
y EMCs Local Replication Solutions for the Symmetrix and
CLARiiON Arrays
y EMCs TimeFinder/Mirror Replication Solution
y EMCs SnapView - Snapshot Replication Solution

2007 EMC Corporation. All rights reserved.

Business Continuity Local Replication - 71

In this topic, we listed EMCs Local Replication Solutions for the Symmetrix and CLARiiON arrays;
Described EMCs TimeFinder/Mirror Replication Solution; andDescribed EMCs SnapView Snapshot Replication Solution
This concludes the module.

Business Continuity Local Replication

- 71

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Business Continuity Local Replication

- 72

Local Replication
Case Study 1
Business Profile:
A Manufacturing Corporation maintains the storage of their mission critical applications
on high end Storage Arrays on RAID 1 volumes.
Current Situation/Issue:
A Full backup of their Key Application is run once a week. The Database application
takes up 1 TB of storage and has to be shutdown during the course of the full backup.
The Shutdown of the database is a requirement that cannot be changed.
The main concerns facing the corporation are:
1) The Backup window is too long and is negatively impacting the business (2 hours)
2) A disaster recovery test with the full backup tapes took an extremely long time (many
hours).
The company would like to:
1) Reduce the backup window during which the database application is shutdown to as
small a time window as possible (less than hour)
2) Ensure that the RTO from the full backup is reduced to under an hour
The companys IT group is very interested in leveraging some of the Local Replication
technologies that are available on their high end array.
Proposal:
Propose a local replication solution to address the companys concern. Justify how your
solution will ensure that the Companys needs are met.

Local Replication
Case Study 2
Business Profile:
A Manufacturing Corporation maintains the storage of their mission critical applications
on high end Storage Arrays on RAID 1 volumes.
Current Situation/Issue:
The Companys key database application takes up 1 TB of storage and has to be up 24x7.
The main concerns facing the corporation are:
1) Logical Corruption of the database (e.g. accidental deletion of table or table space)
2) Guaranteed restore operations with a minimum RPO of 1 hour and with an RTO of
less than hour
3) On occasion may have to restore to a point in time that is up to 8 hours old
Additional information:
Company would like to minimize the amount of storage used by the solution that will
address their concerns. On average 240 GB of data changes in a 24 hour period.
Customer is not concerned about physical failure of the database devices other
solutions in place already address this issue.
The companys IT group is very interested in leveraging some of the Local Replication
technologies that are available on their high end array.
Proposal:
Propose a local replication solution to address the companys concern. Justify how your
solution will ensure that the Companys needs are met. How much physical storage will
this replication actually need?

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Remote Replication
After completing this module, you will be able to:
y Explain Remote Replication Concepts
Synchronous/Asynchronous
Connectivity Options

y Discuss Host and Array based Remote Replication


Technologies
Functionality
Differences
Considerations
Selecting the appropriate technology

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 1

This module introduces the challenges and solutions for remote replication and describes possible
implementations.
The objectives for the module are shown here. Please take a moment to read them.

Business Continuity Remote Replication

-1

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Remote Replication Concepts


y Replica is available at a remote facility
Could be a few miles away or half way around the world
Backup and Vaulting are not considered remote replication

y Synchronous Replication
Replica is identical to source at all times Zero RPO

y Asynchronous Replication
Replica is behind the source by a finite margin Small RPO

y Connectivity
Network infrastructure over which data is transported from source
site to remote site

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 2

The Replication concepts/considerations that were discussed for Local Replication apply to Remote
Replication as well. We explore the concepts that are unique to Remote replication.
Synchronous and Asynchronous replication concepts and considerations are explained in more detail in
the next few slides.
Data has to be transferred from the source site to a remote site over some network. This can be done
over IP networks, over the SAN, using DWDM (Dense Wave Division Multiplexing) or SONET
(Synchronous Optical Network), etc. We will discuss the various options later in the module.
The Fundamental difference between local and remote replication is that remote replicas can be at a
geographically different location. For example, applications at a data center in Boston could be
replicated to a data center in London. Though remote replicas can be used for various Business
Continuity operations, just like local replicas, the primary driver of remote replication is disaster
recovery. Because data has to be replicated over a distance, a network infrastructure is a necessity for
remote replication.

Business Continuity Remote Replication

-2

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Synchronous Replication
y A write has to be secured on the
remote replica and the source before
it is acknowledged to the host

Disk

y Ensures that the source and remote


replica have identical data at all times
Write ordering is maintained at all times
Replica receives writes in exactly the
same order as the source

4
Server
Data Write

Data Acknowledgement

y Synchronous replication provides the


lowest RPO and RTO
Goal is zero RPO

Disk

RTO is as small as the time it takes to


start application on the remote site

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 3

Synchronous Data is committed at both the source site and the remote site before the write is
acknowledged to the host. Any write to the source must be transmitted to and acknowledged by the
remote before signaling a write complete to the host. Additional writes cannot occur until each
preceding write has been completed and acknowledged. It ensures that data at both sites are identical at
all times.

Business Continuity Remote Replication

-3

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Synchronous Replication
y Response Time Extension
Application response time will be
extended due to synchronous
replication

Max

Data must be transmitted to remote


site before write can be acknowledged
Time to transmit will depend on
distance and bandwidth

y Bandwidth

Writes
MB/s

Average

To minimize impact on response


time, sufficient bandwidth must be
provided for at all times

Time

y Rarely deployed beyond 200 km


2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 4

Applications response times are extended with any kind of Synchronous replication. This is due to the
fact that any write to source must be transmitted to and acknowledged by remote before signaling write
complete to the host. The response time depends on the distance between sites, available bandwidth,
and the network connectivity infrastructure.
The longer the distance, the more the response time. Speed of light is finite, every 200 Km (125 miles)
adds 1ms to the response time.
Insufficient bandwidth also causes response time elongation. With Synchronous replication, there is
sufficient bandwidth all the time. The picture on the slide shows the amount of data that has to be
replicated as a function of time. To minimize the response time elongation, ensure that the Max
bandwidth is provided by the network at all times. If we assume that only the average bandwidth is
provided for, then there are times during the day (the shaded section) when response times may be
unduly elongated, causing applications to time out.
The distances over which Synchronous replication can be deployed really depends on an applications
ability to tolerate the extension in response time. It is rarely deployed for distances greater than 200
Km (125 miles).

Business Continuity Remote Replication

-4

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Asynchronous Replication
y Write is acknowledged to host
as soon as it is received by the
source
Disk

y Data is buffered and sent to


remote
Some vendors maintain write ordering
Other vendors do not maintain write
ordering, but ensure that the replica will
always be a consistent re-startable
image

y Finite RPO
Replica will be behind the Source by
a finite amount
Typically configurable
2007 EMC Corporation. All rights reserved.

1
2
Server
Data Write

Data Acknowledgement

Disk

Business Continuity Remote Replication - 5

Asynchronous - Data is committed at the source site and the acknowledgement is sent to the host. The
data is buffered and then forwarded to the remote site as the network capabilities permit. The data at
the remote site is behind the source by a finite RPO; typically the RPO would be a configurable value.
The primary benefit of Asynchronous replication is that there is no response time elongation.
Asynchronous replications are typically deployed over extended distances. The response time benefit
is offset by the finite RPO.

Business Continuity Remote Replication

-5

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Asynchronous Replication
y Response Time unaffected
y Bandwidth
Need sufficient bandwidth on average

y Buffers
Need sufficient buffers

Max

Writes
MB/s

y Can be deployed over long distances


Average

Time

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 6

Extended distances can be achieved with Asynchronous replication because there is no impact on the
application response time. Data is buffered and then sent to the remote site. The available bandwidth
should be at least equal to the average write workload. Data is buffered during times when the
bandwidth is not enough, thus sufficient buffers should be designed into the solution.
Understanding the workload of the application and the bandwidth required for the replication is as
important for Asynchronous replication as Synchronous. While it is true that Asynchronous replication
requires less bandwidth than Synchronous, one still has to provide bandwidth which is equal to the
average write workload. Data will be buffered when the bandwidth is not enough. This buffering of
data causes the RPO to become larger. Insufficient bandwidth will lead to large RPOs which may not
be acceptable.

Business Continuity Remote Replication

-6

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Remote Replication Technologies


y Host based
Logical Volume Manager (LVM)
Synchronous/Asynchronous

Log Shipping

y Storage Array based


Synchronous
Asynchronous
Disk Buffered - Consistent PITs
Combination of Local and Remote Replication

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 7

In the context of our discussion, Remote Replication refers to replication that is done between data
centers if it is host based, and between Storage arrays if it is array based. In the latter case, the two
arrays may be adjacent to each other in the same data center, or might be geographically separated.
Host based implies that all the replication is done by using the CPU resources of the host, using
software that is running on the host. Array based implies that all replication is done between Storage
Arrays and is handled by the Array Operating Environment.

Business Continuity Remote Replication

-7

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

LVM Based Remote Replication


y Duplicate Volume Groups at local and remote sites
y All writes to the source Volume Group are replicated to the remote
Volume Group by the LVM
Synchronous or Asynchronous

Log

Log
Physical
Volume 1

Physical
Volume 2

Physical
Volume 3

Volume Group
Local Site

2007 EMC Corporation. All rights reserved.

Physical
Volume 1

Network

Physical
Volume 2

Physical
Volume 3

Volume Group
Remote Site

Business Continuity Remote Replication - 8

Some LVM vendors provide remote replication at the Volume Group level.
Duplicate Volume Groups need to exist at both the local and remote sites before replication starts. This
can be achieved in a number of ways
y Over IP
y Tape backup/restore etc.
All writes to the source Volume Group are replicated to the remote Volume Group by the LVM.
Typically the writes are queued in a log file and sent to the remote site in the order received over a
standard IP network. It can be done synchronously or asynchronously.
y Synchronous Write must be received by remote before the write is acknowledged locally to the
host
y Asynchronous Write is acknowledged immediately to the local host and queued and sent in order

Business Continuity Remote Replication

-8

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

LVM Based Remote Replication


y In the event of a network failure
Writes are queued in the log file
When the issue is resolved the queued writes are sent over to the
remote
The maximum size of the log file determines the length of outage
that can be withstood

y In the event of a failure at the source site, production


operations can be transferred to the remote site

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 9

Production work can continue at the source site if there is a network failure. The writes that need to be
replicated are queued in the log file and sent over to the remote site when the network issue is
resolved. If the log files fill up before the network outage is resolved, a complete resynchronization of
the remote site would have to be performed. Thus, the size of the log file determines the length of
network outage that can be tolerated.
In the event of a failure at the source site (e.g. server crash, site wide disaster), production operations
can be resumed at the remote site with the remote replica. The exact steps that need to be performed to
achieve this depends on the LVM that is in use.

Business Continuity Remote Replication

-9

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

LVM Based Remote Replication


y Advantages
Different storage arrays and RAID protection can be used at the
source and remote sites
Standard IP network can be used for replication
Response time issue can be eliminated with asynchronous mode,
with extended RPO

y Disadvantages
Extended network outages require large log files
CPU overhead on host
For maintaining and shipping log files

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 10

A significant advantage of using LVM based remote replication is the fact that storage arrays from
different vendors can be used at the two sites. For example, at the production site, a high-end array
could be used while at the remote site, a second tier array could be used. In a similar manner, the
RAID protection at the two sites could be different as well.
Most of the LVM based remote replication technologies allow the use of standard IP networks that are
already in place, eliminating the need for a dedicated network. Asynchronous mode supported by
many LVMs eliminates the response time issue of synchronous mode while extending the RPO.
Log files need to be configured appropriately to support extended network outages. Host based
replication technologies use host CPU cycles.

Business Continuity Remote Replication

- 10

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Host Based Log Shipping


Logs

IP Network

Original

y Offered by most DB Vendors


y Advantages
Minimal CPU overhead
Low bandwidth

Logs

Standby Database consistent


to last applied log
Stand By
2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 11

Log Shipping is a host based replication technology for databases offered by most DB Vendors
y Initial State - All the relevant storage components that make up the database are replicated to a
standby server (done over IP or other means) while the database is shutdown
y Database is started on the production server, as and when log switches occur the log file that was
closed is sent over IP to the standby server
y Database is started in standby mode on the standby server; when log files arrive, they are applied to
the standby database
y Standby database is consistent up to the last log file that was applied
Advantages
y Minimal CPU overhead on production server
y Low bandwidth (IP) requirement
y Standby Database consistent to last applied log
RPO can be reduced by controlling log switching
Disadvantages
y Need host based mechanism on production server to periodically ship logs
y Need host based mechanism on standby server to periodically apply logs and check for consistency
y IP network outage could lead to standby database falling further behind

Business Continuity Remote Replication

- 11

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Based Remote Replication


y Replication performed by the array operating environment
Host CPU resources can be devoted to production operations
instead of replication operations
Arrays communicate with each other via dedicated channels
ESCON, Fibre Channel or Gigabit Ethernet

y Replicas are on different arrays


Primarily used for DR purposes
Can also be used for other BC operations
Production Array

Remote Array

Network
Production
Server

Source

Distance

2007 EMC Corporation. All rights reserved.

Replica

DR Server

Business Continuity Remote Replication - 12

Replication Process
y A Write is initiated by an application/server
y Received by the source array
y Source array transmits the write to the remote array via dedicated channels (ESCON, Fibre
Channel or Gigabit Ethernet) over a dedicated or shared network infrastructure
y Write received by the remote array
Only Writes are forwarded to the remote array
y Reads are from the source devices

Business Continuity Remote Replication

- 12

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Based Synchronous Replication

Network links

Source

Target

Write is received by the source array from host/server


Write is transmitted by source array to the remote array
Remote array sends acknowledgement to the source
array
Source array signals write complete to host/server

Business Continuity Remote Replication - 13

2007 EMC Corporation. All rights reserved.

Synchronous Replication ensures that the replica and source have identical data at all times. The
source array issues the write complete to the host/server only when the write has been received both at
the remote array and the source array. When the write complete is sent, the replica and source are
identical.
The sequence of operations is:
y Write is received by the source array from host/server
y Write is transmitted by source array to the remote array
y Remote array sends acknowledgement to the source array
y Source array signals write complete to host/server

Business Continuity Remote Replication

- 13

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Based Asynchronous Replication

Network links

Source

Target

Write is received by the source array from host/server


Source array signals write complete to host/server
Write is transmitted by source array to the remote array
Remote array sends acknowledgement to the source
array

y No impact on response time


y Extended distances between arrays
y Lower bandwidth as compared to Synchronous
Business Continuity Remote Replication - 14

2007 EMC Corporation. All rights reserved.

Applications do not suffer any response time elongation with Asynchronous replication because any
write is acknowledged to the host as soon as the write is received by the source array. Asynchronous
replication can be used for extended distances. Bandwidth requirements for Asynchronous will be
lower than Synchronous for the same workload. Vendors ensure data consistency in different ways.
The sequence of operations is shown here:
A Write is received by the source array from the host;
The Source array signals write complete to the host;
The Write is transmitted by source array to the remote array; and then
The Remote array sends acknowledgement to the source array.

Business Continuity Remote Replication

- 14

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Based Asynchronous Replication


y Ensuring Consistency
Maintain write ordering
Some vendors attach a time stamp and sequence number with each of
the writes, then ship the writes to the remote array and apply the writes
to the remote devices in the exact order based on the time stamp and
sequence numbers
Remote array applies the writes in the exact order they were received,
just like synchronous

Dependent write consistency


Some vendors buffer the writes in the cache of the source array for a
period of time (between 5 and 30 seconds)
At the end of this time the current buffer is closed in a consistent manner
and the buffer is switched, new writes are received in the new buffer
The closed buffer is then transmitted to the remote array
Remote replica will contain a consistent, re-startable image on the
application
2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 15

The data on the remote replicas will be behind the source by a finite amount in Asynchronous
replication, thus steps must be taken to ensure consistency. Some vendors achieve consistency by
maintaining write ordering, wherein the remote array applies writes to the replica devices in the exact
order that they were received at the source. Other vendors leverage the dependent write I/O logic that
is built into most databases and applications.
Cache buffered Asynchronous replication technologies buffer writes in cache for a period of time, and
then close the buffer in a consistent manner and receive new writes in a new buffer. When the buffer is
open, if a particular location is written to more that once (locality of reference), only the final write is
sent to the remote array. Thus, if a particular location is written to 10 times, only the last I/O is sent to
the remote array when the buffer is closed. This method is different from the asynchronous technique
which maintains write ordering. With write ordering 10 I/Os will be sent to the remote array as
compared to the 1 I/O in the cache buffered method. Data consistency is maintained with both
techniques, but the cache buffered technique would require less bandwidth if the workload has a high
locality of reference (same data location written to multiple times).

Business Continuity Remote Replication

- 15

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Based Disk Buffered Consistent PITs


y Local and Remote replication technologies can be
combined to create consistent PIT copies of data on
remote arrays
y RPO usually in the order of hours
y Lower Bandwidth requirements
y Extended distance solution

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 16

Disk buffered consistent PITs is a combination of Local and Remote replications technologies. The
idea is to make a Local PIT replica and then create a Remote replica of the Local PIT. The advantage
of disk buffered PITs is lower bandwidth requirements and the ability to replicate over extended
distances. Disk buffered replication is typically used when the RPO requirements are of the order of
hours or so, thus a lower bandwidth network can be used to transfer data from the Local PIT copy to
the remote site. The data transfer may take a while, but the solution would be designed to meet the
RPO.
Lets take a look at a two disk buffered PIT solutions.

Business Continuity Remote Replication

- 16

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Extended Distance Consistent PIT


SOURCE

Source

Local
Replica

REMOTE

Network Links

Local
Replica

Remote
Replica

y Create a Consistent PIT Local Replica on Source Array


y Create a Remote Replica of this Local Replica
y Optionally create another replica of the Remote replica on the
remote array if needed
y Repeatas automation, link bandwidth, change rate permit

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 17

Disk buffered replication allows for the incremental resynchronization between a Local Replica which
acts as a source for a Remote Replica.
Benefits include:
y Reduction in communication link cost and improved resynchronization time for long-distance
replication implementations
y The ability to use the various replicas to provide disaster recovery testing, point-in-time backups,
decision support operations, third-party software testing, and application upgrade testing or the
testing of new applications.

Business Continuity Remote Replication

- 17

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Synchronous + Extended Distance Consistent PIT


SOURCE

BUNKER
Sync

Source

Network
Links

Remote
Replica
Local
Replica

REMOTE

Network
Links

Local
Replica
Remote
Replica

y Synchronous replication between the Source and Bunker


Site
y Create consistent PIT Local Replica at bunker
y Create Remote Replica of bunker Local Replica
y Optionally create additional Local Replica at Target site
from the Remote Replica if needed
y Repeatas automation, link bandwidth, change rate
permit
2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 18

Synchronous + Extended Distance Buffered Replication benefits include:


y Bunker site provides a zero RPO DR Replica
y The ability to resynchronize only changed data between the intermediate Bunker site and the final
target site, reducing required network bandwidth
y Reduction in communication link cost and improved resynchronization time for long-distance
replication implementations
y The ability to use the replicas to provide disaster recovery testing, point-in-time backups, decision
support operations, third-party software testing, and application upgrade testing or the testing of
new applications.
The Bunker to Remote replication is identical to the solution discussed in the previous slide. The key
benefit of this solution is the zero RPO DR replica at the Bunker site provided by the Synchronous
replication between the Source and Bunker arrays.

Business Continuity Remote Replication

- 18

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Remote Replicas Tracking Changes


y Remote replicas can be used for BC Operations
Typically remote replication operations will be suspended when the
remote replicas are used for BC Operations

y During BC Operations changes will/could happen to both


the source and remote replicas
Most remote replication technologies have the ability to track
changes made to the source and remote replicas to allow for
incremental re-synchronization
Resuming remote replication operations will require resynchronization between the source and replica

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 19

Tracking changes to facilitate incremental re-synchronization between the source devices and remote
replicas is done via the use of bitmaps in a manner very similar to that discussed in the Local
Replication lecture. Two bitmaps, one for the source and one for the replica, would be created. Some
vendors may keep the information of both bitmaps at both the source and remote sites, while others
may simply keep the source bitmap at the source site and the remote bitmap at the remote site. When a
re-synchronization (source to replica or replica to source) is required, the source and replica bitmaps
are compared and only data that was changed is synchronized.

Business Continuity Remote Replication

- 19

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Primary Site Failure Operations at Remote Site


y Remote replicas are typically not available for use while
the replication session is in progress
y In the event of a primary site failure the replicas have to
be made accessible for use
y Create a local replica of the remote devices at the remote
site
y Start operations at the Remote site
No remote protection while primary site issues are resolved

y After issue resolution at Primary Site


Stop activities at remote site
Restore latest data from remote devices to source
Resume operations at Primary (Source) Site
2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 20

While remote replication is in progress the remote devices will typically not be available for use. This
is to ensure that the no changes are made to the remote replicas. The purpose of the remote replica is to
provide a good starting point for any recovery operation.
Prior to any recovery efforts with the remote replicas, it is always a good idea to create a local replica
of the remote devices. The local replica can be used as a fall back if the recovery process somehow
corrupts the remote replicas.
Restarting operations at the remote site and subsequently restoring operation back to the primary site
requires a tremendous amount of upfront planning. The simple statement, Start operations at the
Remote site, would have to be planned well ahead of time to account for various failure scenarios.

Business Continuity Remote Replication

- 20

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Array Based Which Technology


y Synchronous
Is a must if zero RPO is required
Need sufficient bandwidth at all times
Application response time elongation will prevent extended distance
solutions (rarely above 125 miles)

y Asynchronous

Extended distance solutions with minimal RPO (order of minutes)


No Response time elongation
Generally requires lower Bandwidth than synchronous
Must design with adequate cache/buffer or sidefile/logfile capacity

y Disk Buffered Consistent PITs


Extended distance solution with RPO in the order of hours
Generally lower bandwidth than synchronous or asynchronous
2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 21

The choice of the appropriate array based remote replication depends on specific needs.
What are the RPO requirements? What is the distance between sites? What is the primary reason for
remote replication? etc.

Business Continuity Remote Replication

- 21

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Storage Array Based Remote Replication


y Network Options
Most vendors support ESCON or Fibre Channel adapters for remote
replication
Can connect to any optical or IP networks with appropriate protocol
converters for extended distances
DWDM
SONET
IP Networks

Some Vendors have native Gigabit Ethernet adapters which allows


the array to be connected directly to IP Networks without the need
for protocol converters

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 22

A dedicated or a shared network must be in place for remote replication. Storage arrays have dedicated
ESCON, Fibre Channel or Gigabit Ehternet adapters, which are used for remote replication. The
network between the two arrays could be ESCON or Fibre Channel for the entire distance. Such
networks would be typically used for shorter distance. For extended distances, an optical or IP network
must be used. Examples of optical networks are DWDM and SONET (discussed later). Protocol
converters may have to be used to connect the ESCON or Fibre Channel adapters from the arrays to
these networks. Gigabit Ethernet adapters can be connected directly to the IP network.
A network is required for remote replication. Because this topic is complex, the next three slides are
meant to give you an overview of the network options that are available.

Business Continuity Remote Replication

- 22

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Dense Wavelength Division Multiplexing (DWDM)


y DWDM is a technology that puts data from different
sources together on an optical fiber with each signal
carried on its own separate light wavelength (commonly
referred to as a lambda or ).
y Up to 32 protected and 64 unprotected separate
wavelengths of data can be multiplexed into a light
stream transmitted on a single optical fiber.
Optical Channels
ESCON
Fibre Channel

Optical

Electrical

Optical
Lambda

Gigabit Ethernet

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 23

Dense Wavelength Division Multiplexing (DWDM) multiplexes wavelengths (often referred to as


lambdas or represented by the symbol ) onto a single pair (transmit and receive paths) of optical
fibers.
A key benefit of DWDM is protocol transparency. Since DWDM is an optical transmission technique,
the same interface type can be used to transport any bit rate or protocol. It also allows different bit
rates and protocol data streams to be mixed on the same optical fiber. DWDM alleviates the need for
protocol conversion, associated complexity, and the resulting transmission latencies.

Business Continuity Remote Replication

- 23

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Synchronous Optical Network (SONET)


y SONET is Time Division Multiplexing
(TDM) technology where traffic from
multiple subscribers is multiplexed
together and sent out onto the SONET
ring as an optical signal

OC48

y Synchronous Digital Hierarchy (SDH)


similar to SONET but is the European
standard
y SONET/SDH, offers the ability to
service multiple locations, its
reliability/availability, automatic
protection switching, and restoration

OC48

OC3

SONET

STM-16

STM-1

STM-16

SDH
2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 24

Synchronous Optical Networks (SONET) is a standard for optical telecommunications transport


formulated by the Exchange Carriers Standards Association (ECSA) for the American National
Standards Institute (ANSI). The equivalent international standard is referred to as Synchronous Digital
Hierarchy and is defined by the European Telecommunications Standards Institute (ETSI). Within
Metropolitan Area Networks (MANs) today, SONET/SDH rings are used to carry both voice and data
traffic over fiber.

Business Continuity Remote Replication

- 24

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Rated Bandwidth
Link

Bandwidth Mb/s

Escon

200

Fibre Channel

1024 or 2048

Gigabit Ethernet

1024

T1

1.5

T3

45

E1

E3

34

OC1

51.8

OC3/STM1

155.5

OC12/STM4

622.08

OC48/STM16

2488.0

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 25

The slide lists the rated bandwidth in Mb/s for standard WAN (T1, T3, E1, E3), SONET (OC1, OC3,
OC12, OC48) and SDH (STM1, STM4, STM16) Links. The rated bandwidth of ESCON, Fibre
Channel, and Gigabit Ethernet is also listed.

Business Continuity Remote Replication

- 25

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Module Summary
Key points covered in this module:
y Remote Replication Concepts
Synchronous/Asynchronous
Connectivity Options

y Host and Array based Remote Replication Technologies


Functionality
Differences
Considerations
Selecting the appropriate technology

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 26

These are the key points covered in this module. Please take a moment to review them.

Business Continuity Remote Replication

- 26

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

9 Check Your Knowledge


y What is a Remote Replica?
y What are the possible uses of Remote Replicas?
y What is the difference between Synchronous and
Asynchronous Replication?
y Discuss one host based remote replication technology?
y Discuss one array based remote replication technology?
y What are differences in the bandwidth requirements
between the array remote replication technologies
discussed in this module?

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 27

Check your knowledge of this module by taking some time to answer the questions shown on the slide.

Business Continuity Remote Replication

- 27

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Apply Your Knowledge

EMCs Remote Replication Solutions for the


Symmetrix and CLARiiON Arrays

EMCs SRDF/Synchronous Replication Solution

EMCs MirrorView/A Replication Solution

Business Continuity Remote Replication - 28

2007 EMC Corporation. All rights reserved.

At this point, lets apply what weve learned to some real world examples. Upon completion of this
topic you will be able to:
Enumerate EMCs Remote Replication Solutions for the Symmetrix and CLARiiON arrays;
Describe EMCs SRDF/Synchronous Replication Solution; and
Describe EMCs MirrorView/A Replication Solution

Business Continuity Remote Replication

- 28

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

EMC Remote Replication Solutions


y EMC Symmetrix Arrays
EMC SRDF/Synchronous
EMC SRDF/Asynchronous
EMC SRDF/Automated Replication

y EMC CLARiiON Arrays


EMC MirrorView/Synchronous
EMC MirrorView/Asynchronous

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 29

All remote replication solutions that were discussed in this module are available on EMC Symmetrix
and CLARiiON Arrays.
The SRDF (Symmetrix Remote Data Facility) family of products provides Synchronous,
Asynchronous and Disk Buffered remote replication solutions on the EMC Symmetrix Arrays.
The MirrorView family of products provides Synchronous and Asynchronous remote replication
solutions on the EMC CLARiiON Arrays.
SRDF/Synchronous (SRDF/S): High-performance, host-independent, real-time synchronous remote
replication from one Symmetrix to one or more Symmetrix systems.
MirrorView/Synchronous (MirrorView/S): Host-independent, real-time synchronous remote
replication from one CLARiiON to one or more CLARiiON systems.
SRDF/Asynchronous (SRDF/A): High-performance extended distance asynchronous replication for
Symmetrix arrays using a Delta Set architecture for reduced bandwidth requirements and no host
performance impact. Ideal for Recovery Point Objectives of the order of minutes.
MirrorView/Asynchronous (MirrorView/A): Asynchronous remote replication on CLARiiON arrays.
Designed with low-bandwidth requirements, delivers a cost-effective remote replication solution ideal
for Recovery Point Objectives (RPOs) of 30 minutes or greater.
SRDF/Automated Replication: Rapid business restart over any distance with no data exposure through
advanced single-hop and multi-hop configurations using combinations of TimeFinder/Mirror and
SRDF on Symmetrix Arrays.

Business Continuity Remote Replication

- 29

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

EMC SRDF/Synchronous - Introduction


y Array based Synchronous Remote Replication
technology for EMC Symmetrix Storage Arrays
Facility for maintaining real-time physically separate mirrors of
selected volumes

y SRDF/Synchronous uses special Symmetrix devices


Source arrays have SRDF R1 devices
Target arrays have SRDF R2 devices
Data written to R1 devices are replicated to R2 devices

y SRDF uses dedicated channels to send data from source


to target array
ESCON, Fibre Channel or Gigabit Ethernet are supported

y SRDF is available in both Open Systems and Mainframe


environments
2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 30

EMC SRDF/Synchronous is an Array based Synchronous Remote Replication technology for EMC
Symmetrix Storage Arrays. SRDF R1 and R2 volumes are devices dedicated for Remote replication.
R2 volumes are on the Target arrays, while R1 volumes are on the Source arrays. Data written to R1
volumes is replicated to R2 volumes.

Business Continuity Remote Replication

- 30

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

SRDF Source and Target Volumes


y SRDF R1 and R2 Volumes can have any local RAID
Protection
e.g. Volumes could have RAID-1 or RAID-5 protection

y SRDF R2 volumes are in a Read Only state when remote


replication is in effect
Changes cannot be made to the R2 volumes

y SRDF R2 volumes are accessed under certain


circumstances
Failover Invoked when the primary volumes become unavailable
Split Invoked when the R2 volumes need to be concurrently
accessed for BC operations

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 31

SRDF R1 and R2 volumes can have any local RAID protection. SRDF R2 volumes are in a Read Only
state when remote replication is in effect. SRDF R2 volumes are accessed under certain circumstances.

Business Continuity Remote Replication

- 31

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

SRDF/Synchronous
1. Write received by Symmetrix containing Source volume
2. Source Symmetrix sends write data to Target

Source Host

3. Target Symmetrix sends acknowledgement to Source


4. Write complete sent to host

Channel
Director (CD)

Channel
Director (CD)

2
Remote Link
Director (RLD)

Global Cache Director


Disk
Director (DD)

Target Host

Disk
Director (DD)

Remote Link
Director (RLD)

Symmetrix Containing Source (R1) Volumes

Remote Link
Director (RLD)

Channel
Director (CD)

Channel
Director (CD)

Global Cache Director


Remote Link
Director (RLD)

Disk
Director (DD)

Disk
Director (DD)

Symmetrix Containing Target (R2) Volumes

y Application does not receive I/O acknowledgement until data is received


and acknowledged by remote Symmetrix
y Write completion time is extended - No impact on Reads
y Most often used in campus solutions
2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 32

SRDF/Synchronous is used primarily in SRDF campus environments. In this mode of operation,


Symmetrix maintains a real-time mirror image of the data between the SRDF pairs.
Data on the Source (R1) volumes and the Target (R2) volumes is always identical .
The sequence of operations is:
1. An I/O write is received from the host/server into the cache of the Source
2. The I/O is transmitted to the cache of the Target
3. A receipt acknowledgment is provided by the Target back to the cache of the Source
4. An ending status is presented to the host/server
The transmission of data to the target and the receipt of acknowledgement from the target is done via
specialized hardware on the array (depicted as Remote Link Director RLD in the picture).
De-stage of data to disk in Source and Target Symmetrix is done on a off-priority basis.
If a link failure occurs before acknowledgement is received from the Target Symmetrix, then the
operation is re-tried down the remaining links in the RA-group. If all links fail, then I/O is
acknowledged to the host and the track is flagged as invalid to the remote mirror.

Business Continuity Remote Replication

- 32

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

SRDF Operations - Failover


y Purpose Make Target Volumes Read Write
y Source Volume status is changed to Read Only
y SRDF Link is suspended

Before
RW

Source
Volume

RO
RO

Target
Volume

After

2007 EMC Corporation. All rights reserved.

Source
Volume

RW

Target
Volume

Business Continuity Remote Replication - 33

Failover operations are performed if the SRDF R1 Volumes become unavailable and the decision is
made to start operations on the R2 Devices. Failover could also be performed when DR processes are
being tested or for any maintenance tasks that have to be performed at the source site.
If failing over for a Maintenance operation:
y For a clean, consistent, coherent point in time copy which can be used with minimal recovery on
the target side, some or all of the following steps may have to be taken on the source side:
Stop All Applications (DB or whatever else is running)
Unmount file system.
Deactivate the Volume Group
A failover leads to a RO state on the source side. If a device suddenly becomes RO from a RW
state, the reaction of the host can be unpredictable if the device is in use; therefore, the
suggestion to stop applications, un-mount and deactivate Volume Groups.

Business Continuity Remote Replication

- 33

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

SRDF Operations - Failback


y Makes target volume Read Only, resumes link,
synchronize R2 to R1, and write enables source volume

Before
RO

Source
Volume

RW

Target
Volume

RW

After

2007 EMC Corporation. All rights reserved.

RO
sync

Source
Volume

Target
Volume

Business Continuity Remote Replication - 34

The main purpose of the Failback operation is to allow the resumption of operations at the primary site
on the source devices. Failback is typically invoked after a failover has been performed and production
tasks are being performed on the Target site on the R2 devices. Once operations can be resumed at the
Primary site, the Failback operation can be invoked. Ensure that applications are properly quiesced
and volume groups deactivated before failback is invoked.
When failback is invoked, the Target Volumes become Read Only, the source volumes become Read
Write, and any changes that were made at the Target site while in the failed over state are propagated
back to the source site.

Business Continuity Remote Replication

- 34

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

SRDF Operations - Split


y Enables read and write operations on both source and
target volumes
y Suspends replication

Before
RW

Source
Volume

RO

Target
Volume

RW

After

2007 EMC Corporation. All rights reserved.

Source
Volume

RW

Target
Volume

Business Continuity Remote Replication - 35

The SRDF Split operation is used to allow concurrent access to both the Source and Target volumes.
Target volumes are made Read Write and the SRDF replication between the Source and Target is
suspended.

Business Continuity Remote Replication

- 35

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

SRDF Operations Establish/Restore


y Establish - Resume SRDF operation retaining data from
source and overwriting any changed data on target
y Restore - SRDF operation retaining data on target and
overwriting any changed data on source

RW

RO

Target
Volume

Source
Volume

Establish
2007 EMC Corporation. All rights reserved.

RW

RO

Target
Volume

Source
Volume

Restore
Business Continuity Remote Replication - 36

During current operations while in a SRDF Split state, changes could occur on both the Source and
Target volumes. Normal SRDF replication can be resumed by performing an establish or a restore
operations.
With either establish or restore, the status of the Target volume goes to Read Only. Prior to establish or
restore, all access to the target volumes must be stopped.
The Establish operation is used when changes to the Target volume should be discarded while
preserving changes that were made to the Source volumes.
The Restore operation is used when changes to the Source volume should be discarded while
preserving changes that were made to the Target volumes. Prior to a restore operation, all access to the
source and target volumes must be stopped. The Target volumes go to Read Only state, while the data
on the Source volumes are overwritten with the data on the Target volumes.

Business Continuity Remote Replication

- 36

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

EMC CLARiiON MirrorView/A Overview


y Optional storage system software for remote replication
on EMC CLARiiON arrays
No host cycles used for data replication

y Provides a remote image for disaster recovery


Remote image updated periodically - asynchronously
Remote image cannot be accessed by hosts while replication is
active
Snapshot of mirrored data can be host-accessible at remote site

y Mirror topology (connecting primary array to secondary


arrays)
Direct connect and switched FC topology supported
WAN connectivity supported using specialized hardware
2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 37

MirrorView/A is optional software supported on CX-series EMC CLARiiON arrays.


The design goal of MirrorView/A is to allow speedy recovery from a disaster, but at lower cost than
synchronous solutions. It allows long distance connectivity in environments where some data loss is
acceptable. It accomplishes this goal by using an asynchronous interval-based update mechanism. This
means that changed data is accumulated at the local side of the link, then sent to the remote side at
regular, user-defined intervals. The data on the remote image is always older than the data on the local
image, by up to 2 interval times. Though this leads to data loss in the event of a disaster, it is an
acceptable trade-off for many customers.
Supported connection topologies include direct connect, SAN connect, and WAN connect when
appropriate Fibre Channel to IP conversion devices are used.

Business Continuity Remote Replication

- 37

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Terms
y Primary storage system
Holds the local image for a given mirror

y Secondary storage system


Holds the local image for a given mirror

y Bidirectional mirroring
A storage system can hold local and remote images

y Mirror Synchronization
Process that copies data from local image to remote image

y MirrorView Fractured state


Condition when a Secondary storage system is unreachable by the
Primary storage system
2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 38

The terms primary storage system and secondary storage system are terms relative to each mirror.
Because MirrorView/A supports bidirectional mirroring, a storage system which hosts local images for
one or more mirrors may also host remote images for one or more other mirrors.
The process of updating a remote image with data from the local image is called synchronization.
When mirrors are operating normally, they are either in the synchronized state or synchronizing. If a
failure occurs, and the remote image cannot be updated, perhaps because the link between the
CLARiiONs has failed, then the mirror is in a fractured state. Once the error condition is corrected,
synchronization restarts automatically.

Business Continuity Remote Replication

- 38

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Configuration
y MirrorView/A Setup
MirrorView/A software must be loaded on both Primary and
Secondary storage system
Remote LUN must be exactly the same size as local LUN
Secondary LUN does not need to be the same RAID type as Primary
Reserved LUN Pool space must be configured

y Management via Navisphere Manager and CLI

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 39

MirrorView/A software must be loaded on both CLARiiONs, regardless of whether or not the
customer wants to implement bi-directional mirroring.
The remote LUN must be the same size as the local LUN, though not necessarily the same RAID type.
This allows flexibility in DR environments, where the backup site need not match the performance of
the primary site.
Because MirrorView/A uses SnapView Snapshots as part of its internal operation, space must be
configured in the Reserved LUN Pool for data chunks copied as part of a COFW operation. SnapView
Snapshots, the Reserved LUN Pool, and COFW activity were discussed in an earlier module.
MirrorView/A, like other CLARiiON software, is managed by using either Navisphere Manager if a
graphical interface is desired, or Navisphere CLI for command-line management.
Hosts can not attach to a remote LUN while it is configured as a secondary (remote) mirror image. If
you promote the remote image to be the primary mirror image (in other words, exchange roles of the
local and remote images), as is done in a disaster recovery scenario, or if you remove the secondary
LUN from the mirror, and thereby turn it into an ordinary CLARiiON LUN, then it may be accessed
by a host.

Business Continuity Remote Replication

- 39

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Initial Synchronization


Primary
Image

Secondary
Image

A B C D E F
Host
Tracking
DeltaMap

0 0 0 0 0 0

Transfer
DeltaMap

1 1 1 1 1 1

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 40

MirrorView/A makes use of bitmaps, called DeltaMaps because they track changes, to log where data
has changed, and needs to be copied to the remote image. As with SnapView Snapshots, the
MirrorView image is seen as consisting of 64 kB areas of data, called chunks or extents.
This animated sequence shows the initial synchronization of a MirrorView/A mirror. The Transfer
DeltaMap has all its bits set, to indicate that all extents need to be copied across to the secondary. At
the time the synchronization starts, a SnapView Session is started on the primary, and it will track all
changes in a similar manner to that used by Incremental SAN Copy. At the end of the initial
synchronization, the secondary image is a copy of what the primary looked like when the
synchronization started. Any changes made to the primary since then are flagged by the Tracking
DeltaMap.

Business Continuity Remote Replication

- 40

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Initial Synchronization


Primary
Image

Secondary
Image

A B C D E F

Host
Tracking
DeltaMap

0 0 0 0 0 0

Transfer
DeltaMap

0 1 1 1 1 1

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 41

Business Continuity Remote Replication

- 41

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Initial Synchronization


Primary
Image

Secondary
Image

A B C D E F

A B

Host
Tracking
DeltaMap

0 0 0 0 0 0

Transfer
DeltaMap

0 0 1 1 1 1

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 42

Business Continuity Remote Replication

- 42

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Initial Synchronization


Primary
Image

Secondary
Image

A B C D E F

A B

Host
Tracking
DeltaMap

0 1 0 0 0 0

Transfer
DeltaMap

0 0 1 1 1 1

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 43

Business Continuity Remote Replication

- 43

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Initial Synchronization


Primary
Image

Secondary
Image

A B C D E F

A B C

Host
Tracking
DeltaMap

0 1 0 0 0 0

Transfer
DeltaMap

0 0 0 1 1 1

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 44

Business Continuity Remote Replication

- 44

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Initial Synchronization


Primary
Image

Secondary
Image

A B C D E F

A B C

Host
Tracking
DeltaMap

0 1 0 0 1 0

Transfer
DeltaMap

0 0 0 1 1 1

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 45

Business Continuity Remote Replication

- 45

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Initial Synchronization


Primary
Image

Secondary
Image

A B C D E F

A B C D

Host
Tracking
DeltaMap

0 1 0 0 1 0

Transfer
DeltaMap

0 0 0 0 1 1

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 46

Business Continuity Remote Replication

- 46

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Initial Synchronization


Primary
Image

Secondary
Image

A B C D E F

A B C D

Host
Tracking
DeltaMap

0 1 0 0 1 0

Transfer
DeltaMap

0 0 0 0 1 1

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 47

Business Continuity Remote Replication

- 47

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Initial Synchronization


Primary
Image

Secondary
Image

A B C D E F

A B C D E

Host
Tracking
DeltaMap

0 1 0 0 1 0

Transfer
DeltaMap

0 0 0 0 0 1

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 48

Business Continuity Remote Replication

- 48

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Initial Synchronization


Primary
Image

Secondary
Image

A B C D E F

A B C D E F

Host
Tracking
DeltaMap

0 1 0 0 1 0

Transfer
DeltaMap

0 0 0 0 0 0

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 49

Business Continuity Remote Replication

- 49

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Update
Primary
Image

Secondary
Image

A B C D E F

A B C D E F

Host
Tracking
DeltaMap

0 1 0 0 1 0

Transfer
DeltaMap

0 0 0 0 0 0

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 50

An update cycle starts, either automatically at the prescribed time, or initiated by the user. Prior to the
start of data movement to the secondary, MirrorView/A starts a SnapView Session on the secondary, to
protect the original data if anything goes wrong during the update cycle.
After the update cycle completes successfully, the SnapView Session and Snapshot on the secondary
side are no longer needed, and are destroyed.

Business Continuity Remote Replication

- 50

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Update
Primary
Image

Secondary
Image

A B C D E F

A B C D E F

Host
Transfer
DeltaMap

0 1 0 0 1 0

Tracking
DeltaMap

0 0 0 0 0 0

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 51

Business Continuity Remote Replication

- 51

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Update
Primary
Image

Secondary
Image

A B C D E F

A B C D E F

Host
Transfer
DeltaMap

0 1 0 0 1 0

Tracking
DeltaMap

1 0 0 0 0 0

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 52

Business Continuity Remote Replication

- 52

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Update
Primary
Image

Secondary
Image

A B C D E F

A B C D E F

Host
Transfer
DeltaMap

0 0 0 0 1 0

Tracking
DeltaMap

1 0 0 0 1 0

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 53

Business Continuity Remote Replication

- 53

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Update
Primary
Image

Secondary
Image

A B C D E F

A B C D E F

Host
Transfer
DeltaMap

0 0 0 0 1 0

Tracking
DeltaMap

1 0 0 0 1 0

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 54

Business Continuity Remote Replication

- 54

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Update
Primary
Image

Secondary
Image

A B C D E F

A B C D E F

Host
Transfer
DeltaMap

0 0 0 0 0 0

Tracking
DeltaMap

1 0 0 0 1 0

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

B E

Business Continuity Remote Replication - 55

Business Continuity Remote Replication

- 55

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Update
Primary
Image

Secondary
Image

A B C D E F

A B C D E F

Host
Transfer
DeltaMap

0 0 0 0 0 0

Tracking
DeltaMap

1 0 0 0 1 0

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 56

Business Continuity Remote Replication

- 56

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Promotion (Update Failure)


Primary
Image

Secondary
Image

A B C D E F

A B C D E F

Host
Transfer
DeltaMap

0 0 0 0 1 0

Tracking
DeltaMap

1 0 0 0 0 1

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 57

Should the update cycle fail for any reason (here a primary storage system failure) and it becomes
necessary to promote the secondary, then the safety Session is rolled back and the secondary image is
returned to the state it was in prior to the start of the update cycle.

Business Continuity Remote Replication

- 57

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Promotion (Update Failure)


Primary
Image

Secondary
Image

A B C D E F

A B C D E F

Host
Transfer
DeltaMap

0 0 0 0 1 0

Tracking
DeltaMap

1 0 0 0 1 1

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 58

Business Continuity Remote Replication

- 58

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Promotion (Update Failure)


Primary
Image

Secondary
Image

A B C D E F

A B C D E F

Host
Transfer
DeltaMap

0 0 0 0 1 0

Tracking
DeltaMap

1 0 0 0 1 1

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 59

Business Continuity Remote Replication

- 59

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Promotion (Update Failure)


Secondary
Image

A B C D E F
Promote
Secondary

Host
Transfer
DeltaMap

0 0 0 0 1 0

Tracking
DeltaMap

1 0 0 0 1 1

RLP

A B C D E F

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 60

Business Continuity Remote Replication

- 60

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Promotion (Update Failure)


Secondary
Image

A B C D E F

A B C D E F

Host
Transfer
DeltaMap

0 0 0 0 1 0

Tracking
DeltaMap

1 0 0 0 1 1

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 61

Business Continuity Remote Replication

- 61

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

MirrorView/A Promotion (Update Failure)


Primary
Image

A B C D E F

A B C D E F

Host
Transfer
DeltaMap

0 0 0 0 1 0

Tracking
DeltaMap

1 0 0 0 1 1

RLP

MAP

2007 EMC Corporation. All rights reserved.

Snapshot

MAP

Business Continuity Remote Replication - 62

Business Continuity Remote Replication

- 62

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Consistency Groups
y Group of secondary images treated as a unit
y Local LUNs must all be on the same CLARiiON
y Remote LUNs must all be on the same CLARiiON
y Operations happen on all LUNs at the same time
Ensures a restartable image group

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 63

Consistency Groups allow all LUNs belonging to a given application, usually a database, to be treated
as a single entity and managed as a whole. This helps to ensure that the remote images are consistent,
i.e. all made at the same point in time. As a result, the remote images are always restartable copies of
the local images, though they may contain data which is not as new as that on the primary images.
It is a requirement that all the local images of a Consistency Group be on the same CLARiiON, and
that all the remote images for a Consistency Group be on the same remote CLARiiON. All information
related to the Consistency Group is sent to the remote CLARiiON from the local CLARiiON.
The operations which can be performed on a Consistency Group match those which may be performed
on a single mirror, and affect all mirrors in the Consistency Group. If for some reason an operation
cannot be performed on one or more mirrors in the Consistency Group, then that operation fails and the
images remain unchanged.

Business Continuity Remote Replication

- 63

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Apply Your Knowledge Summary


Key points covered in this topic:
y EMCs Remote Replication Solutions for the Symmetrix
and CLARiiON Arrays
y EMCs SRDF/Synchronous Replication Solution
y EMCs MirrorView/A Replication Solution

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 64

In this topic, we enumerated EMCs Remote Replication solutions for the Symmetrix and CLARiiON
arrays; described EMCs SRDF/Synchronous Replication and MirrorView/A Replication solutions.
This concludes the module.

Business Continuity Remote Replication

- 64

Copyright 2007 EMC Corporation. Do not Copy - All Rights Reserved.

Section Summary
Key Points covered in this section:
y Overview of Business Continuity
y The solutions and the supporting technologies that
enable business continuity and uninterrupted data
availability
Backup and Recovery
Local Replication
Remote Replication

y Basic Disaster Recovery techniques

2007 EMC Corporation. All rights reserved.

Business Continuity Remote Replication - 65

These are the key points covered in this section. Please take a moment to review them.
If you have not already done so, please review the Case Studies prior to taking the assessment.
This concludes the training. Please proceed to the Course Completion slide to take the Assessment.

Business Continuity Remote Replication

- 65

Remote Replication
Case Study
Business Profile:
A Manufacturing Corporation maintains the storage of their mission critical applications
on high-end Storage Arrays on RAID 1 volumes. The corporation has two data centers
which are 50 miles apart.
Current Situation/Issue:
The corporations mission critical Database application takes up 1 TB of storage on a
high end Storage Array. In the past year, top management has become extremely
concerned because they do not have DR plans which will allow for zero RPO recovery if
there is a site failure. The primary DR Site is the 2nd Data Center 50 miles away.
The company would like explore remote replication scenarios which will allow for near
zero RPO and a minimal RTO. The company is aware of the large costs associated with
network bandwidth and would like explore other remote replication technologies in
addition to the zero RPO solution.
Proposal:
Propose a remote replication solution to address the companys concern. Justify how your
solution will ensure that the Companys needs are met.

You might also like