Business Continuity – Local Replication

71
© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication Module 4.3

description

Business Continuity – Local Replication. Module 4.3. Local Replication. Upon completion of this module, you will be able to: Discuss replicas and the possible uses of replicas Explain consistency considerations when replicating file systems and databases - PowerPoint PPT Presentation

Transcript of Business Continuity – Local Replication

Page 1: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved.

Business Continuity – Local ReplicationBusiness Continuity – Local Replication

Module 4.3

Page 2: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 2

Local Replication

Upon completion of this module, you will be able to:

Discuss replicas and the possible uses of replicas

Explain consistency considerations when replicating file systems and databases

Discuss host and array based replication technologies– Functionality

– Differences

– Considerations

– Selecting the appropriate technology

Page 3: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 3

What is Replication

Replica - An exact copy (in all details)

Replication - The process of reproducing data

Original Replica

REPLICATIONREPLICATION

Page 4: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 4

Possible Uses of Replicas

Alternate source for backup

Source for fast recovery

Decision support

Testing platform

Migration

Page 5: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 5

Considerations

What makes a replica good– Recoverability

Considerations for resuming operations with primary

– Consistency/re-startability How is this achieved by various technologies

Kinds of Replicas– Point-in-Time (PIT) = finite RPO

– Continuous = zero RPO

How does the choice of replication technology tie back into RPO/RTO

Page 6: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 6

Replication of File SystemsHost

Apps

Volume Management

DBMS Mgmt Utilities

File System

Multi-pathing Software

Device Drivers

HBA HBA HBA

Operating System

Physical Volume

Buffer

Page 7: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 7

A database application may be spread out over numerous files, file systems, and devices,all of which must be replicated

Database replication can be offline or online

Replication of Database Applications

LogsData

Page 8: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 8

Database: Understanding Consistency

Databases/Applications maintain integrity by following the “Dependent Write I/O Principle”– Dependent Write: A write I/O that will not be issued by an application

until a prior related write I/O has completed A logical dependency, not a time dependency

– Inherent in all Database Management Systems (DBMS) e.g. Page (data) write is dependent write I/O based on a successful log

write

– Applications can also use this technology

– Necessary for protection against local outages Power failures create a dependent write consistent image A Restart transforms the dependent write consistent to transactionally

consistent i.e. Committed transactions will be recovered, in-flight transactions will be

discarded

Page 9: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 9

Database Replication: Transactions

Data

Log

Database Application

4 4

3 3

2 2

1 1

Buffer

Page 10: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 10

Database Replication: Consistency

Data

Log

Source Replica

Consistent

4 4

3 3

2 2

1 1

Log

Data

Note: In this example, the database is online.

Page 11: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 11

Database Replication: Consistency

Data

Log

Source Replica

Inconsistent

Note: In this example, the database is online.

4 4

3 3

2

1

Page 12: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 12

Database Application

(Offline)

Database Replication: Ensuring Consistency

Data

Log

Source Replica

Consistent

Off-line Replication– If the database is offline or

shutdown and then a replica is created, the replica will be consistent

– In many cases, creating an offline replica may not be a viable due to the 24x7 nature of business

Page 13: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 13

Online Replication– Some database applications allow

replication while the application is up and running

– The production database would have to be put in a state which would allow it to be replicated while it is active

– Some level of recovery must be performed on the replica to make the replica consistent

Database Replication: Ensuring Consistency

Data

Log

Source Replica

Inconsistent

4 4

3 3

2

1

Page 14: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 14

Database Replication: Ensuring Consistency

5

Source Replica

Consistent

4 4

3 3

2 2

1 1

5

Page 15: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 15

Tracking Changes After PIT Creation

At PIT

Source = Target

Later

Source ≠ Target

Resynch

Source = Target

Page 16: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 16

Local Replication Technologies

Host based– Logical Volume Manager (LVM) based mirroring

– File System Snapshots

Storage Array based– Full volume mirroring

– Full volume: Copy on First Access

– Pointer based: Copy on First Write

Page 17: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 17

Logical Volume Manager: Review

Physical Storage

Logical Storage

LVM

Host resident software responsible for creating and controlling host level logical storage– Physical view of storage is converted to a

logical view by mapping. Logical data blocks are mapped to physical data blocks

– Logical layer resides between the physical layer (physical devices and device drivers) and the application layer (OS and applications see logical view of storage)

Usually offered as part of the operating system or as third party host software

LVM Components:– Physical Volumes– Volume Groups– Logical Volumes

Page 18: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 18

Volume Groups

Physical Disk

Block

Volume Group

Physical Volume 1

Physical Volume 2

Physical Volume 3

One or more Physical Volumes form a Volume Group

LVM manages Volume Groups as a single entity

Physical Volumes can be added and removed from a Volume Group as necessary

Physical Volumes are typically divided into contiguous equal-sized disk blocks

A host will always have at least one disk group for the Operating System– Application and Operating

System data maintained in separate volume groups

Page 19: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 19

Logical Volumes

Logical Disk Block

Volume GroupPhysical Disk

Block

Physical Volume 1 Physical Volume 2 Physical Volume 3

Logical Volume

Logical Volume

Page 20: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 20

Host Based Replication: Mirrored Logical Volumes

Host Logical Volume

Logical Volume

PhysicalVolume 1

PVID1VGDA

PhysicalVolume 2

PVID2VGDA

Page 21: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 21

Host Based Replication: File System Snapshots

Many LVM vendors will allow the creation of File System Snapshots while a File System is mounted

File System snapshots are typically easier to manage than creating mirrored logical volumes and then splitting them

Page 22: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 22

Host (LVM) Based Replicas: Disadvantages

LVM based replicas add overhead on host CPUs

If host devices are already Storage Array devices then the added redundancy provided by LVM mirroring is unnecessary– The devices will have some RAID protection already

Host based replicas can be usually presented back to the same server

Keeping track of changes after the replica has been created

Page 23: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 23

Replication performed by the Array Operating Environment

Replicas are on the same array

Storage Array Based Local Replication

Production Server

Business Continuity Server

Array

ReplicaSource

Page 24: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 24

Typically Array based replication is done at a array device level– Need to map storage components used by an application/file system

back to the specific array devices used – then replicate those devices on the array

Array 1

Storage Array Based – Local Replication Example

File System 1

Volume Group 1

Logical Volume 1 Source Vol 1

Replica Vol 1

Source Vol 2

Replica Vol 2

c12t1d1 c12t1d2

Page 25: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 25

Array Based Local Replication: Full Volume Mirror

Source Target

Attached

Array

Read/Write Not Ready

Page 26: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 26

Array Based Local Replication: Full Volume Mirror

Source Target

Detached - PIT

Read/Write Read/Write

Array

Page 27: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 27

Array Based Local Replication: Full Volume Mirror

For future re-synchronization to be incremental, most vendors have the ability to track changes at some level of granularity (e.g., 512 byte block, 32 KB, etc.)– Tracking is typically done with some kind of bitmap

Target device must be at least as large as the Source device– For full volume copies the minimum amount of storage required is

the same as the size of the source

Page 28: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 28

Copy on First Access (COFA)

Target device is made accessible for BC tasks as soon as the replication session is started

Point-in-Time is determined by time of activation

Can be used in Copy First Access mode (deferred) or in Full Copy mode

Target device is at least as large as the Source device

Page 29: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 29

Write to Source

Copy on First Access Mode: Deferred Mode

Source Target

Read/Write Read/Write

Write to Target

Read from Target

Source Target

Source Target

Read/Write Read/Write

Read/Write Read/Write

Page 30: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 30

Copy on First Access: Full Copy Mode

On session start, the entire contents of the Source device is copied to the Target device in the background

Most vendor implementations provide the ability to track changes: – Made to the Source or Target

– Enables incremental re-synchronization

Page 31: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 31

Array: Pointer Based Copy on First Write

Targets do not hold actual data, but hold pointers to where the data is located– Actual storage requirement for the replicas is usually a small fraction

of the size of the source volumes

A replication session is setup between the Source and Target devices and started– When the session is setup based on the specific vendors

implementation a protection map is created for all the data on the Source device at some level of granularity (e.g 512 byte block, 32 KB etc.)

– Target devices are accessible immediately when the session is started

– At the start of the session the Target device holds pointers to the data on the Source device

Page 32: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 32

Pointer Based Copy on First Write Example

Source Save Location

TargetVirtual Device

Page 33: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 33

Array Replicas: Tracking Changes

Changes will/can occur to the Source/Target devices after PIT has been created

How and at what level of granularity should this be tracked– Too expensive to track changes at a bit by bit level

Would require an equivalent amount of storage to keep track of which bit changed for each the source and the target

– Based on the vendor some level of granularity is chosen and a bit map is created (one for Source and one for Target) One could choose 32 KB as the granularity For a 1 GB device changes would be tracked for 32768, 32KB chunks If any change is made to any bit on one 32KB chunk the whole chunk is

flagged as changed in the bit map 1 GB device map would only take up 32768/8/1024 = 4KB space

Page 34: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 34

Source

Target

Array Replicas: How Changes Are Determined

0= unchanged = changed

Re-synch(Source to

Target)

At PIT

Target

SourceAfter PIT…

Target

0 0 0 0 0 0 0 0

0 0 0 0 0 0 0 0

1 0 0 1 0 1 0 0

0 0 1 1 0 0 0 1

1 0 1 1 0 1 0 1

1

Page 35: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 35

Array Replication: Multiple PITs

06:00 A.M.

: 12 : 01 : 02 : 03 : 04 : 05 : 06 : 07 : 08 : 09 : 10 : 11 : 12 : 01 : 02 : 03 : 04 : 05 : 06 : 07 : 08 : 09 : 10 : 11 :

P.M.A.M.

12:00 P.M.

06:00 P.M.

12:00 A.M.

Source

Target Devices

Point-In-Time

Page 36: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 36

Array Replicas: Ensuring Consistency

Inconsistent Consistent

Source Replica

4 4

3 3

2 2

1 1

Source Replica

4 4

3 3

2

1

Page 37: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 37

Mechanisms to Hold I/O

Host based

Array based

What if the application straddles multiple hosts and multiple arrays

Page 38: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 38

Array Replicas: Restore/Restart Considerations

Production has a failure– Logical Corruption

– Physical failure of production devices

– Failure of Production server

Solution– Restore data from replica to production

The restore would typically be done in an incremental manner and the Applications would be restarted even before the synchronization is complete leading to very small RTO

-----OR------

– Start production on replica Resolve issues with production while continuing operations on replicas After issue resolution restore latest data on replica to production

Page 39: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 39

Array Replicas: Restore/Restart Considerations

Before a Restore– Stop all access to the Production devices and the Replica devices– Identify Replica to be used for restore

Based on RPO and Data Consistency

– Perform Restore

Before starting production on Replica– Stop all access to the Production devices and the Replica devices– Identify Replica to be used for restart

Based on RPO and Data Consistency

– Create a “Gold” copy of Replica As a precaution against further failures

– Start production on Replica

RTO drives choice of replication technology

Page 40: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 40

Array Replicas: Restore Considerations

Full Volume Replicas– Restores can be performed to either the original source device or to

any other device of like size Restores to the original source could be incremental in nature Restore to a new device would involve a full synchronization

Pointer Based Replicas– Restores can be performed to the original source or to any other

device of like size as long as the original source device is healthy Target only has pointers

Pointers to source for data that has not been written to after PIT Pointers to the “save” location for data was written after PIT

Thus to perform a restore to an alternate volume the source must be healthy to access data that has not yet been copied over to the target

Page 41: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 41

Array Replicas: Which Technology

Full Volume Replica– Replica is a full physical copy of the source device

– Storage requirement is identical to the source device

– Restore does not require a healthy source device

– Activity on replica will have no performance impact on the source device

– Good for full backup, decision support, development, testing and restore to last PIT

– RPO depends on when the last PIT was created

– RTO is extremely small

Page 42: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 42

Array Replicas: Which Technology (continued)

Pointer based - COFW– Replica contains pointers to data

Storage requirement is a fraction of the source device (lower cost)

– Restore requires a healthy source device

– Activity on replica will have some performance impact on source Any first write to the source or target will require data to be copied to the

save location and move pointer to save location Any read I/O to data not in the save location will have to be serviced by

the source device

– Typically recommended if the changes to the source are less than 30%

– RPO depends on when the last PIT was created

– RTO is extremely small

Page 43: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 43

Array Replicas: Which Technology

Full Volume – COFA Replicas– Replica only has data that was accessed

– Restore requires a healthy source device

– Activity on replica will have some performance impact Any first access on target will require data to be copied to target before

the I/O to/from target can be satisfied

– Typically replicas created with COFA only are not as useful as replicas created with the full copy mode – Recommendation would be to use the full copy mode if the technology allows such an option

Page 44: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 44

Array Replicas: Full Volume vs. Pointer Based

Full Volume Pointer Based

Required Storage 100% of Source Fraction of Source

Performance Impact None Some

RTO Very small Very small

Restore Source need not be healthy

Requires a healthy source device

Data change No limits < 30%

Page 45: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 45

Module Summary

Key points covered in this module:

Replicas and the possible use of Replicas

Consistency considerations when replicating File Systems and Databases

Host and Array based Replication Technologies– Advantages/Disadvantages

– Differences

– Considerations

– Selecting the appropriate technology

Page 46: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 46

Check Your Knowledge

What is a replica?

What are the possible uses of a replica?

What is consistency in the context of a database?

How can consistency be ensured when replicating a database?

Discuss one host based replication technology

What is the difference between full volume mirrors and pointer based replicas?

What are the considerations when performing restore operations for each replication technology?

Page 47: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 47

Apply Your Knowledge

Upon completion of this topic, you will be able to:

List EMC’s Local Replication Solutions for the Symmetrix and CLARiiON arrays

Describe EMC’s TimeFinder/Mirror Replication Solution

Describe EMC’s SnapView - Snapshot Replication Solution

Page 48: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 48

EMC – Local Replication Solutions

EMC Symmetrix Arrays– EMC TimeFinder/Mirror

Full volume mirroring

– EMC TimeFinder/Clone Full volume replication

– EMC TimeFinder/SNAP Pointer based replication

EMC CLARiiON Arrays– EMC SnapView Clone

Full volume replication

– EMC SnapView Snapshot Pointer based replication

Page 49: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 49

EMC TimeFinder/Mirror - Introduction Array based local replication technology for Full Volume Mirroring on

EMC Symmetrix Storage Arrays– Create Full Volume Mirrors of an EMC Symmetrix device within an Array

TimeFinder/Mirror uses special Symmetrix devices called Business Continuance Volumes (BCV). BCVs:– Are devices dedicated for Local Replication– Can be dynamically, non-disruptively established with a Standard device.

They can be subsequently split instantly to create a PIT copy of data.

The PIT copy of data can be used in a number of ways:– Instant restore – Use BCVs as standby data for recovery– Decision Support operations– Backup – Reduce application downtime to a minimum (offline backup)– Testing

TimeFinder/Mirror is available in both Open Systems and Mainframe environments

Page 50: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 50

EMC TimeFinder/Mirror – Operations

Establish– Synchronize the Standard volume to the BCV volume

– BCV is set to a Not Ready state when established BCV cannot be independently addressed

– Re-synchronization is incremental

– BCVs cannot be established to other BCVs

– Establish operation is non-disruptive to the Standard device

– Operations to the Standard can proceed as normal during the establish

Establish

STD BCV

Incremental Establish

BCV

Page 51: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 51

EMC TimeFinder/Mirror – Operations

Split– Time of Split is the Point-in-Time

– BCV is made accessible for BC Operations

– Consistency Consistent Split

– Changes tracked STD BCV

Split

Page 52: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 52

EMC TimeFinder/Mirror Consistent Split

EMC PowerPath

PowerPath is an EMC host based multi-pathing software

PowerPath holds I/O during TimeFinder/Mirror Split– Read and write I/O

Enginuity Consistency Assist

Symmetrix Microcode holds I/O during TimeFinder/Mirror Split– - Write I/O (subsequent reads

after first write)

Host

STDSTD BCVBCVBCVBCVSTDSTD

Page 53: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 53

EMC TimeFinder/Mirror – Operations

Restore– Synchronize contents of BCV volume to the

Standard volume

– Restore can be full or incremental

– BCV is set to a Not Ready state

– I/Os to the Standard and BCVs should be stopped before the restore is initiated

Query– Provide current status of BCV/Standard volume

pairs

Incremental Restore

STD BCVSTD

Page 54: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 54

Incremental establish

or

Incremental restore

StandardStandardvolumevolume

BCVBCV 4:00 a.m.

2:00 a.m.

4:00 a.m.

6:00 a.m.

StandardStandardvolumevolume

Establish

Split

Establish

Split

BCVBCV

BCVBCV

BCVBCV

EMC TimeFinder/Mirror Multi-BCVs

Standard device keeps track of changes to multiple BCVs one after the other

Incremental establish or restore

Page 55: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 55

TimeFinder/Mirror Concurrent BCVs

Two BCVs can be established concurrently with the same Standard device

Establish BCVs simultaneously or one after the other

BCVs can be split individually or simultaneously.

Simultaneous. “Concurrent Restores”, are not allowed

StandardStandard

BCV1BCV1

BCV2BCV2

Page 56: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 56

EMC CLARiiON SnapView - Snapshots

SnapView allows full copies and pointer-based copies– Full copies – Clones (sometimes called BCVs)

– Pointer-based copies – Snapshots

Because they are pointer-based, Snapshots– Use less space than a full copy

– Require a ‘save area’ to be provisioned

– May impact the performance of the LUN they are associated with

The ‘save area’ is called the ‘Reserved LUN Pool’

The Reserved LUN Pool– Consists of private LUNs (LUNs not visible to a host)

– Must be provisioned before Snapshots can be made

Page 57: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 57

The Reserved LUN Pool

Private LUN 5

Private LUN 6

Private LUN 7

Private LUN 8

Reserved LUN Pool

FLARE LUN 5

FLARE LUN 6

FLARE LUN 7

FLARE LUN 8

Page 58: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 58

Source LUNs

Reserved LUN Allocation

Snapshot 1a

Snapshot 1b

Snapshot 2a

Session 1a

Session 1b

Session 2a

Reserved LUN Pool

LUN 1

LUN 2

Private LUN 5

Private LUN 6

Private LUN 7

Private LUN 8

Page 59: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 59

SnapView Terms

Snapshot– The ‘virtual LUN’ seen by a secondary host– Made up of data on the Source LUN and data in the RLP– Visible to the host (online) if associated with a Session

Session– The mechanism that tracks the changes– Maintains the pointers and the map– Represents the point in time

Activate and deactivate a Snapshot– Associate and disassociate a Session with a Snapshot

Roll back– Copy data from a (typically earlier) Session to the Source LUN

Page 60: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 60

COFW and Reads from Snapshot

SP memory

SnapView Map

Map

Source LUN

Snapshot

Reserved LUN

Chunk 0

Chunk 1

Chunk 2

Chunk 3

Chunk 4

Secondary Host

Primary Host

Page 61: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 61

COFW and Reads from Snapshot

SP memory

SnapView Map

Map

Source LUN

Snapshot

Reserved LUN

Chunk 0

Chunk 1

Chunk 2

Chunk 4

Chunk 3

Secondary Host

Primary Host

Chunk 3’

Page 62: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 62

COFW and Reads from Snapshot

SP memory

SnapView Map

Map

Source LUN

Snapshot

Reserved LUN

Chunk 0

Chunk 1

Chunk 2

Chunk 4

Chunk 3

Secondary Host

Primary Host

Chunk 3’’

Page 63: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 63

COFW and Reads from Snapshot

SP memory

SnapView Map

Map

Source LUN

Snapshot

Reserved LUN

Chunk 1

Chunk 2

Chunk 4

Chunk 3

Secondary Host

Primary Host

Chunk 0

Chunk 3’’

Chunk 0’

Page 64: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 64

Writes to Snapshot

SP memory

SnapView Map

Map

Source LUN

Snapshot

Reserved LUN

Chunk 1

Chunk 2

Chunk 4

Chunk 3

Secondary Host

Primary Host

Chunk 0

Chunk 3’’

Chunk 0’

Page 65: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 65

Writes to Snapshot

SP memory

SnapView Map

Map

Source LUN

Snapshot

Reserved LUN

Chunk 1

Chunk 2

Chunk 4

Chunk 3’’

Chunk 0’

Chunk 3

Chunk 0

Secondary Host

Primary Host

Chunk 0*

Page 66: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 66

Writes to Snapshot

SP memory

SnapView Map

Map

Source LUN

Snapshot

Reserved LUN

Chunk 1

Chunk 2

Chunk 4

Chunk 3

Chunk 0

Chunk 2

Secondary Host

Primary Host

Chunk 0*

Chunk 2*

Chunk 3’’

Chunk 0’

Page 67: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 67

Rollback - Snapshot Active (preserve changes)

SP memory

SnapView Map

Map

Source LUN

Snapshot

Reserved LUN

Chunk 1

Chunk 2

Chunk 4

Chunk 3

Chunk 0

Chunk 2

Secondary Host

Primary Host

Chunk 0*

Chunk 2*

Chunk 3’’

Chunk 0’

Page 68: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 68

Rollback - Snapshot Active (preserve changes)

SP memory

SnapView Map

Map

Source LUN

Snapshot

Reserved LUN

Chunk 1

Chunk 2*

Chunk 4

Chunk 3

Chunk 0

Chunk 2

Secondary Host

Primary Host

Chunk 0*

Chunk 2*

Chunk 3

Chunk 0*

Page 69: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 69

Rollback - Snapshot Deactivated (discard changes)

SP memory

SnapView Map

Map

Source LUN

Snapshot

Reserved LUN

Chunk 1

Chunk 2*

Chunk 4

Chunk 3

Chunk 0

Chunk 2

Secondary Host

Primary Host

Chunk 0*

Chunk 2*

Chunk 3

Chunk 0*

Page 70: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 70

Rollback - Snapshot Deactivated (discard changes)

SP memory

Source LUN

Snapshot

Reserved LUN

Chunk 1

Chunk 2

Chunk 4

Chunk 3

Chunk 0

Chunk 2

Secondary Host

Primary Host

Chunk 3’’

Chunk 0’

SnapView Map

Map

Page 71: Business Continuity – Local Replication

© 2007 EMC Corporation. All rights reserved. Business Continuity – Local Replication - 71

Rollback - Snapshot Deactivated (discard changes)

SP memory

SnapView Map

Map

Source LUN

Snapshot

Reserved LUN

Chunk 1

Chunk 2

Chunk 4

Chunk 3

Chunk 0

Chunk 2

Secondary Host

Primary Host

Chunk 3

Chunk 0