8/3/2019 Building Practical Data Protection Strategies
1/17
Building PracticalData Protection Strategies
Fred Moore, Horison Inormation Strategies
August 2006
w w w . d a t a d o m a i n . c o m - 2 0 0 6
WHITE PAPER
8/3/2019 Building Practical Data Protection Strategies
2/17
2D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5
D A T A D O M A I N I C o n t e n t s
The Origin O backup and recOvery 3
TradiTiOnal daTa prOTecTiOn OpTiOns 4
nexT generaTiOn daTa prOTecTiOn 8
BACKUP/RECOVERY STRATEGY COMPARISON 10
daTa reducTiOn becOMing The key 11
deduplicaTiOn redeines The Wan MarkeT 12
DEDUPLICATION CHECKLIST 11
daTa dOMain: enTerprise sTOrage prOTecTiOn 14
cOnclusiOn 15
abOuT The auThOr 16
abOuT daTa dOMain 16
Building Practical Data Protection Strategies - August 2006
8/3/2019 Building Practical Data Protection Strategies
3/17
D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5
tto T to/tto o o
to t t o mot ot to t ot o o
t o o T o o o t o-
tto to ott omto tt ot
o t toot t m
dt o t otto t
t, o t otto ot mo
to mmt sotw o, m o, t
t, t m o ow ,
m, tt to
wom, -w t totto to om t mmt o
imo t otto t
o o
t om
ott
mo
t MTb o
w
to
mmt
t o o
mot
tt to
t
mo
o
owtm
The Origin o Backup and
Recovery
i 1952, t wo t t w
, t ibM 726 wt 12,500 t o -
t i 1956 t wo t w
, t rm 350 wt 5 mt o -
t To o o w t t t tm, two
t t to t jt o; 1)
t t to w t wt o
of t to 2) t t tommt to w o, m
o b o w to om
t m to mmt to o
t t 50 ott t m
mott W t tto t
otto to t m o t-
t t ow qmt o
tto o o t 21t t?
T w to t qto wt t t -
to o oto tt ow
t momtm
dt otto
q -
om t mot
t
o iT tt
to T
o -
mt t
t o
t t:
1) t to
2) t
3) t
4) t to/
D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e
Will these traditional data protection
applications survive the demands for
ultra-high availability and the growing
requirements for nearly instantaneous
recovery in the 21st century?
TERMS USED TO CLASSIFY THE IMPACT OF DIFFERENT LEVELS OF DATA PROTECTION
RPO (Recovery Point Objective) This is the desired amount of time between dataprotection events.
RTO (Recovery Time Objective) This is the time required to recover from a data lossevent and return to service. In other words, this requires classifying data or an
application by its criticality or value to the business and determining how long thebusiness can survive without having this data available. There is immense pressureto greatly reduce the amount of time it takes to recover a le or an application.
DPW (Data Protection or Backup Window) This is the maximum amount of timeavailable for an application to be interrupted or out of service while data is copiedto another physical location for backup purposes. This time out component isseeing many new developments to reduce the amount of time needed for thetraditional backup window.
Building Practical Data Protection Strategies - August 2006
8/3/2019 Building Practical Data Protection Strategies
4/17
4D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5
Traditional Data Protection
OptionsT mt t otto oto tt
tto o t tm o rpO rTO tm
m T to t oow
to: b, d Mo, sot o,
cdp, vTl
Backups om o t
wow a t tmt
o o t t 20 to tt
to, t t,
tt o t wow o tt
o o t t m Wtot t
t ot otw o tmt
t t o t o o o o, m
omom t o t
tt t o tto t
w tt t t to
O t , o o o to
t tm tt to of T
ot to o tto, ow
Building Practical Data Protection Strategies - August 2006
D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e
Sotware (bugs and corruption)*
Hardware*
Disk
Tape
Server
Network*
Natural disasters, power, ood, fre
Thet
Intrusion/security
Other
The Causes o Downtime and Data Loss
18%
38%
23%
7%
2%
8%
4%
Snapshots, transaction logs
RAID 1-6, backups
Backups
Clusters, ailover architecture
Redundancy
O-site acilities
Encryption
Firewalls, authentication, anti-virus,
iltering
Type o Disruption % o Failures Solutions
* Includes operational failures** Unplanned downtime (unpredictable)
Source: Estimates by Horison Information Strategies
8/3/2019 Building Practical Data Protection Strategies
5/17
5D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5
D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e
tt o t to otoo
tom omt t wt w o b t mtt
o, mmz omt o t
oto, o o to
o w o om
o t m o w tom o
ot w t otto too
Full backup/restore to t t t
mot ommo t otto mto T
o o 100% o t t, omt
o om, om m to t t o
o The backed-up copy is not
executable and must be
restored to become accessible
by an application. i mot ,
tto to
om o t
to to mt o
to o t to o t o T t ojt o to, t o
t to t tom mt wt o m-
o t o t to,
mot o tm t wt o o o-
oto to omt om ot
o om to t
mot tm om o t t otto
tq m t to y
o ow tt m o t t
t m t tt w
o b mot
o t t t mot o
t o t t ow
to ot to
t o o o t
otto tt
b o t tm-om t o t
o o, tto /o mo to t tq
Tradeoffs existw oo om t oto to
t tt t o
w
o incremental backups, o t t tt
t t o mot t
mt s o
t, o o o
t mmtto, , t mto
mmz t mot o t
t mot o tm
o t
wow how
to t o
mt w
om to to
q to t
to t t ow tt T om om tm-om o
Ot w om w
w mt om
imt mmz t mot o
tm t m o mo t
o differential backup, t m t
tt w o t o t
w o
o t t t Tt w
t t ow z
tw T m tt
om to
t o, t t to o m
ot om to o mt
a to o q t t
t t t o to
Backing up large amounts of unchanged
data creates a signicant amount of
unnecessarily duplicated or redundant
data.
Building Practical Data Protection Strategies - August 2006
8/3/2019 Building Practical Data Protection Strategies
6/17
6D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5
D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e
Building Practical Data Protection Strategies - August 2006
omt dt t o t
mt t t o tm t
imt mmz t tm
t mmz t to
tm t to m o o
o t ot T to ot o
tm om o to mtto
Mot wt to t
mot o and t o
tm, ot jt o o t ot bot mt
t to
otw Mt to
m q mmtto
omt
Disk mirroring to t t
mmt o-o-o o ,
o t, o om t
o o mot o
o O t mot mt t
o t o t
mt, qt
wt oto to
two (o mo)
t t o
t o i t t
o o o o t
o, mo o tt
to t o o ow t to to
ot wtot owtm Mo ot t
o t mot o to q
t qto oo oto
sto mtto o mt oo
to mmt t oo o oo
mo tradeoffs existfor each case
soo mo qt
mm ot t omt t t t o t to i
oo mo, ot t o t
tt mt ow t wt
omt o t t wt o T
to om t t
mo mt oz t (t) mo
m o ot
o oo mo, t o tt
o ot to oz t wt
t ow t o qt wt
to o t To, oo
mo t t oo mo
t t o o t ot-o-
wt t m o aoo mo
omtm t w- mt to
t t to oto o m w
T om ot
t mot o t m -
wt
i t, t o
t mt
mo t o mt
o ot-o-
wt t m o T
om t
o o t mo t o wt-t
to
Mo o m mo t
to t t tt w to t
om tm w o t
o oto o w o o
tomt wt to mo o Note
that mirroring does not help ott t t
For best practices, mirroring should always
be accompanied by other data protection
schemes that can permit a recovery or
restore to occur from clean data that existed
before the corruption occurred. Disk
mirroring is dened and commonly referred
to as RAID 1.
8/3/2019 Building Practical Data Protection Strategies
7/17
D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5
D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e
Building Practical Data Protection Strategies - August 2006
oto om , wom, ,
to, m o otw o t ttwo o mo o o ot t o t
t, mo o w om
ot t otto m tt mt
o o to to
o om t tt
t o t oto
o d mo
ommo
to raid 1
g t m to
mtto t tto t otto
mto, ot tq
momtm to om o t tto
to
Snapshot copy t ott ot--tm
w o t sot too
om t o t to o t o mmtto, t ot ot
t q W ot o
wt oto o, t (wt)
t o tto o o
to o ot tt
h t o o t t o o
t w o() ot o
to mt zz t m tt o
o-t sto mtto mt
m t m o ot
sot o t otto om to
t oto t ot om tt
ot t o o o t a, tradeoffs
exist T o ot o tt t ot
to t t ot o jt o t
oto t omt t
m o ot ow Mt to
otw t mmtto omt t
o ot
CDP (Continuous Data Protection) t
o w wt t oto
oto wtt
to tt m
o m ot t m
t m i
sot co o
t m, t cdp
mo u mo
ow, t o
o qt to o wt t wt
tmtm a wt oto q to t
o o t jo Jo
t t oto to o 2-4
o t o o mmm oo o t
o to to o Jo oo
o ott om to t oto
to to o tm to ot
o t oto o s jo
to jo wt o o t mo t
t Tradeoffs exist.cdp t m
ot o o ot tto
o o otto t t o t
t o cdp t to om q
o o t oto o om
tt m mot o t Mt
to otw t mmtto
omt t o cdp m to oot ot cdp
VTL (Virtual Tape Library) oto ot
o 25 om t o t
o t t mmtto o t /
o mt vt t ot o mm
omt w o oz 1997
Given the many tradeoffs and limitations in
these traditional data protection methods,
several other techniques are gaining
momentum to reduce some of the traditional
tradeoffs.
8/3/2019 Building Practical Data Protection Strategies
8/17
D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5
D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e
Building Practical Data Protection Strategies - August 2006
ibM stoT t t tzto o
t t w to ow T qt
t o t t
mmtto w
omt vTl
ow om o
o-mm omt
tm m
t
a virtual tape libraryot o tt
t tt to t t ot t t
Two o vTl :
tt to a integrated virtual
tape libraryom ot- to
tomt t w to o
ot t oto t t T
to o o mo t
t o t -t ow-ot t
T m t to t ot
tm mt t t t
, to tz t
m t oo omt ot t t
vt t tm to mt t t
om o t t,
ommo t tzto
to 80 t o mo T om
mott t t t p-t o
z, t tz, q-o-
tt tm w t t mo t
to om t t tomt
i t , t hsM (h sto
Mmt)- o tot
oto o t ot o to , t
oto -to t momt tw
t to t t t
t tw ot t 2
t 3 to
T mjo t o
t t
om ( t
qt om t ),
t t-t tzto,
m o mmt mo
t t t i/O tt, t om t
to t m o t
m a, tradeoffs exist T mo
mmtto oo t otm vTl o
o tm om
Next Generation Data ProtectionSolutions Arrive as
Deduplication Takes Ob oto mt ot to
o t M momt
m ot w otw
to mo om how, t oto
t wt t ow
mot o t tt to
ott
a w tq deduplication q
tt t ow -to-
mt o t momt
o tto t otto mto
dto t t oom
o to, mt ot
o tm m W a
oto t dto o m
VTLs are now becoming available for non-
mainframe computer systems primarily being
used as a fast disk cache.
8/3/2019 Building Practical Data Protection Strategies
9/17
D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5
D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e
t m o omo,
ommot to, t otmzto,
t to t tt dto
o - t t o
t t omt
nt to t otto oto -
t om t o t
to t
i- to t mot o
to t q t o to q
o o t com to wtt omo m t t
mo om rt t om
o t omt t t
to o t i m ,
mt to t 1% o t o
z o t To t t t
o t t t to
to t t mot o tm
t t o o Tradeoffs exist. dt
to omtto t
om om to
o t z o t to oo To o t ,
om om mmt to
tt - Mt
m q t z o t to
oo not, t
o to mooo m to
t t o t to
t mo rTO o
t otw t to mot
o omo o tto t to
t otto oto, t b/ro
stt como t o t t
Deduplication can signicantly change theeconomics of storage, dramatically reducing
both backup recovery times and making Wide
Area backup a operational reality.
Building Practical Data Protection Strategies - August 2006
8/3/2019 Building Practical Data Protection Strategies
10/17
0D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5
D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e
Full backup
Incrementalbackup
Dierentialbackup
Mirror
Snapshot
Continuous(CDP)
VTL (Virtual TapeLibrary)
Deduplication
Backup/Recovery Strategy Comparison
Straightorward process,maximum storageconsumption, can be usedon all applications
Reduces backup window,all incremental copiesused in recovery makingrecovery longer thandierential
Reduces recovery time,only last dierential copy
used in recovery makingbackup time longer thanincremental
Doubles disk costs,protects rom disk ailures,does not protect againstintrusion or corruption
Very ast, does not protectagainst disk ailures,does not protect againstintrusion or corruption,can take time to determine
the recovery point
Is oten applicationspecifc, can take time todetermine the recoverypoint, ast recovery,protects against intrusionand corruptionMature or mainrames,gaining momentum inopen systems
Very ast backup andrecovery, greatly reducesdisk storage requirementsand expense over allother methods, computeintensive requiringappliance
All datasupported
Applicationspecifc, notsupported byall applications
Applicationspecifc, not
supported byall applications
All data typessupported
Applicationspecifc, notsupported byall applications
Applicationspecifc, notsupported byall applications
All data typessupported
Applicationand backupsotwareneutral, avoidonly non-repeating datatypes
Yes
Yes
Yes
No, one-or-onecopy
No
No
Limited to tapecompressioncapabilities,signifcantly
reducesperormance
Yes, providesurther datareduction viaeliminating
redundant data
Tape
Disk, tape
Disk, tape
Disk only
Disk only
Disk only
Low-cost diskwith optional
automated tapelibrary
Disk only
Restore
Restore
Restore
Failover
Restore
Restore
Restore
Rapid Restore
Backup Scheme TradeosData Types
Supported
Data Compressed
on Backup
Standard
Storage Device
Failover or Restore
Architecture
Building Practical Data Protection Strategies - August 2006
8/3/2019 Building Practical Data Protection Strategies
11/17
D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5
D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e
Data Reduction is Becoming the Key
r t o o t t
to qmt T ow to
ot w
,
ow, oo
foo , ot
/o
tm
Wan- t
o
t
t to t
dto wo
t w t
o
t t to
Mot t o ot t
to t om
to
i- to
mt t om
t tm, q
t t t
mt, t
om tm to
mt o
to i om
t mt
t o wt
to,
t mt ot
to t
ot t o
t i t mt m to q, t t
t om wt oto otm
o 2:1 z to, to to
t o to to
T o to to om to
o t t o rt
t om
o t
omt ow t
oow tm o
t to t
O tm o
o o
mt w
, 20 to o
mo o
to
ot -
too t to
mt t (t) o to
tm b o t o t
o , t
o m, 20
t o om
wt
t t
tm
w, t
mot o
t t to
T ot tm
o to w
ot tto ot ot o tm
o o i
t o t
t t o
to tm?
dto otm to t
o dto otm
z t t t ot o o t
Traditional Storage Capacity Optimized
Data
Stored
1 5 10 15 20
0
Weeks In Use
Data Volume
Reduction
Source: Data Domain, Aug 2006
Data Reduction Rates
3-4xFirst full backup
6-7xFile-level incrementals
50-60xSubsequent full backups
20x
Aggregate weekly fulls,daily incrementals
Compression Effect
Building Practical Data Protection Strategies - August 2006
B JA B C D A E F G A B H A E I C D E F G H
A B C D E F G H I J
1ST FULL BACKUP
Deduplication: Under the Hood
Redundancies pooled, compressed
2ND FULL BACKUPINCR 1 INCR 2
Source: Data Domain, Aug 2006
DATASTREAM
Unique variable segments (4KB-12KB) Redundant Data Segments Compressed Un ique Segments
8/3/2019 Building Practical Data Protection Strategies
12/17
8/3/2019 Building Practical Data Protection Strategies
13/17
D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5
Compatibility with your existingbackup applications
Appliance or sotware based solution
Sizing perormance requirements
Scalability or perormance andcapacity
Pointer security management
Supports remote replication or disasterrecovery
Pricing ft to budget
Vendor readiness and positioning
Environmental savings
Deduplication Checklist
What changes, i any, are required to your existing backupprocesses? Assess diiculty o the implementation. Areyou prepared? Certiy the backup vendor works with thededuplication solution.
Sotware-only solutions allow enterprises to re-use existingor older disk systems, appliances normally include diskstorage and simpliy installation.
Signiicant reductions in storage may require severaliterations. Determine time needed to achieve the maximumdeduplication eect. What is the net expected storagesavings compared to ull, incremental or dierentialbackups?
Assess instrumentation is provided to measure perormanceand capacity thresholds. Insure additional capacity andprocessing power be added to keep up with data growthor to improve backup and restore speeds. Veriy upgradesnon-disruptive.
Insure the pointers to the unique data segments areprotected rom hardware, sotware and intrusion threats.Losing these pointers means that the backups can no longerbe retrieved.
Data reduction not only reduces the amount o storagerequired locally but also reduces the amount o networktraic during replication, which can result in signiicantbandwidth savings or remote backup and recovery.
Do you pay or storage capacity, by number o installedsolutions, or another scheme? What are the warrantyperiod and maintenance pricing considerations? Remembernot to conuse the initial acquisition costs (Capex) and the
ongoing operational expenses (Opex) when evaluating adeduplication solution.
Check out vendor reerence installations. Veriy thevendors roadmap will address your uture data protectionrequirements.
Determine power, ootprint and acilities savings or use incost-justiication process
D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e
p o to m t mmtto o T t ow
t om oto to m t t
Building Practical Data Protection Strategies - August 2006
8/3/2019 Building Practical Data Protection Strategies
14/17
4D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5
D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e
Building Practical Data Protection Strategies - August 2006
Data Domain:
Enterprise Storage Protectiondt dom o q o-t
o to to roz t
ow mt o ot t o W
a o om, dt dom
om t tt ow o o t
to t otto oto dt dom
mmt to -
t t to
o - T to m -
to oom o
o
T qmt to t to t
o oto om
mo t t m t q o
t t dto t
t too tt to
oom t t o Wan om t mot t t o
T t o om o o o o
t o o to tq :
T t t to t mott
t mt o dt dom to
tt
sm tto to t t
tt t o w t
otto oto ozto tt
to mt wt t t otto tt
a dt dom et potto sto
tm mt t qmt wo wtot
to t otw oto
o b wo wt t
otw dt dom o
to oot mt ot to o
/o tt
o mm o dt dom ot t
tom t, t, Data Domain Highlights
o 15
Full Backup
Incremental/dierential
Mirroring
Snapshot, CDP
Deduplication
Typical Data Reduction Rates
100%, all data backed up each time
5% or fles, 100% or databases
5%, changes absorbed into each mirror
5%, only changes stored
< 1%, eliminates redundant data and
compresses original occurrence
8/3/2019 Building Practical Data Protection Strategies
15/17
5D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5
Reduces storage and bandwidthcosts with Data Domain 20x GlobalCompression technique
Full support or all backup sotwarepackages
Ease o operations
Continuous data verifcation
Reduces the amount o diskneeded or backup data, providesconcurrency
Eliminates redundant data neededor backup and recovery
Data Domain Highlights
Makes WAN network vaulting aordable. GlobalCompression reduces data sent to remote locationwhile protecting data over any bandwidth anddistance.
Data Domain requires no changes to existingbackup sotware providing ease o installation andongoing operations. Using a transparent approachconsolidates existing backup sotware processes.
Administrators can spend time on other importanttasks.
Ensures data can always be recovered. I anerror occurs during transer, Replication sotwarerecovers automatically and restarts data transer.
Storage expenses are reduced. Both the originatorand replicated data remain ully accessible whiletransers are in progress without impact toavailability.
Improves recovery times or local and remoteoperations.
Product Features Customer Benefts
D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e
Building Practical Data Protection Strategies - August 2006
Conclusion
W to t t to o
o oto T tm
om o o o t
t om oot t mot o tm
t t tto wow t
dt otto om t mot
t iT to
o t mt o to om t t
how t mt o, t
to t, o o oom o o
t o t t t w om to
t t to oto
To iT omt m mo
om tt o t otto, t
-t t o
o mo o t o dt o
oto mt wt to
qmt o to t t t
nw t otto oto dt dom
to tt q
mt momtm mo t to
t w t ot o
to mot t o ot T
t mot o
o wtot t iT to e
tt t iT tt t to m
, to, t t, m
mt, t t t m w m
mmt t t o t otto
oto w wot t
8/3/2019 Building Practical Data Protection Strategies
16/17
6D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5
D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e
Building Practical Data Protection Strategies - August 2006
About the Author
i 1998, Moo o hoo iomto stt, omto tt ot m bo,
cooo, tt z mt tt, t omt o t iT t
21- t stoT t t tm o oot t o
stt p Mt sto eto o Wt Wo poto wtt m
o oo, t ot o t to t h 1989 t o t dt am aw
2004 t o t at s so-i-r aw t t ut o Mo w
o mtmt mt omt to o
a ot-t iT , motto wt wow, omt t b et pom 1997
h t o w t o t to two t
Moo 100 ao a, st 14
pt bo, cooo 80302
hoo iomto stt 3034179455 o
3039399159
moo@ooom
wwwooom
About Data Domain
dt dom t o o et potto sto tm o two- t o O 450 om wow dt dom w-w oto to ot
m t t o dt dom go como, t t to too-
o to omo t tt w t t otto O dt
dom t om, t t to t t otto o t o
z a dt dom otto to tm tt m to tom t tt
omt wt t otw
cot 2006 dt dom, i a rt r
dt dom, i omto t to t o t to t T to o t
o to o T omto jt to wtot ot c o to t omto
; t w oot w to o t to dt dom, i m m momt /o
t ot() /o t om() t to t tm roto o t to wtot o wtt mo
o
T omto t to o dt dom, i m o tto o wt o , wt t to t
omto t to, m m wt o mtt o t o t o
dt dom go como tm o dt dom, i a ot , ot, m, tm, o t
m to t t ot o o t t ow
8/3/2019 Building Practical Data Protection Strategies
17/17
Building Practical Data Protection Strategies
2300 ct ew
st c, ca 95050866-We-ddupe
@tomom
Top Related