slide1 l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Industry Waves Backup and recovery evolution PowerPoint Presentation
Download Presentation
Industry Waves Backup and recovery evolution

Loading in 2 Seconds...

play fullscreen
1 / 49

Industry Waves Backup and recovery evolution - PowerPoint PPT Presentation


  • 86 Views
  • Uploaded on

Future. Disk based backup becoming cost effective Archive and Backup diverge Recovery in minutes or seconds Continuous backup End user recovery Self healing backups . Today. Majority of companies use tape Tape one size fits all Backup once per day

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Industry Waves Backup and recovery evolution' - toyah


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
industry waves backup and recovery evolution

Future

  • Disk based backup becoming cost effective
  • Archive and Backup diverge
  • Recovery in minutes or seconds
  • Continuous backup
  • End user recovery
  • Self healing backups

Today

  • Majority of companies use tape
  • Tape one size fits all
  • Backup once per day
  • Tape recoveries slow & unreliable
  • Administrators do all recoveries
Industry WavesBackup and recovery evolution

Version 1.0

customer data protection pain points
Customer Data Protection Pain Points

Customer Needs: Faster Recovery

  • Recovery is unreliable and painful
    • Too slow and expensive to recover files
      • typical recovery takes hours or days (slow, expensive)
    • Recoveries and unreliable
      • 42% of companies had failed recovery in past year
    • 50% of customers wish for online backup verification
    • Data protection is labor intensive
    • All recoveries go through the server admin

Rapid and Reliable Recovery

  • Solution with DPM
    • Designed for fast recovery
    • Enables a whole new recovery scenario–end users: files, Admins: servers
    • Snapshots enable multiple recovery points
    • Recoveries are assured through verification
customer data protection pain points4

Continuous and efficient protection

Customer Data Protection Pain Points

Customer Needs: Eliminating Backup Window

  • Backup is too complex, slow, and inefficient
    • Shrinking backup window
      • Growth in data makes it too difficult and time consuming to back up
    • Backups too slow/lots of manual scheduling
    • Mandated disaster recovery plans
    • 24 hours of data loss assumed with tape
    • Tape as one size fits all (file and server recovery, offsite protection and long term archive)
    • Tape inconvenience and unreliability of is # 1 challenge
  • Solution with DPM
    • Faster and More Efficient Backup
      • Never do a full backup from a production server again
      • Avoid the shrinking backup window
customer data protection pain points5

Operational Simplicity

Customer Data Protection Pain Points

Customer Needs: Simpler Solution, Lower costs

  • Current backup products are too complex, costly
    • Companies spend too much time and money on backup
    • Labor is the majority of backup cost
    • Branch office data protection is cumbersome
    • Massive data growth increases costs
    • Too many tapes
    • Most disk-based backup solution are cost prohibitive
  • Solution with DPM
    • Designed to reduce TCO via continuous, disk-based backup
    • Automatic protection schedules = reduce operational costs, increase efficiency
    • Allows end users to easily recover their own files
    • Usability and easier management
    • Integration into existing environment
    • Industry standard hardware and software
what does dpm do
What does DPM do?
  • Near continuous (hourly) protection of files
    • DPM agent on file servers
    • Byte-level changes transmitted to DPM server
  • Multiple scheduled snapshots per day
  • Easy IT or End-User restore – fast from disk
slide7

DPM “Under The Hood”

DPM Server

Agent components:

  • File System Filter: runs in kernel mode
  • File Agent service runs in user mode
  • Requires reboot of file server
  • Each protected volume has synchronization log
  • Synchronization log 10% of volume size
  • Agent overhead 3-5%

Synchronization

  • “Pull” model, synchronizations instigated by DPM
  • Asynchronous replication
  • Two communication channels
    • Control commands - DCOM
    • Data movement - DPM proprietary protocol
  • Replication unit of operation is protected volume
  • Check points: 2 min/10 MBs
  • Byte level replication

Consistency Check

  • Unexpected events create need to resync replica
  • Consistency Check does two things
    • Checks file by file for more recent modified times
    • If changed, all blocks associated with file are check summed and appropriate blocks are replicated to DPM server
  • All open files are check summed irregardless

DPM Engine

  • .NET application (managed code)
  • Application state and configuration data stored in SQL
  • Protected data stores:
    • Replica Area is a mounted volume that is made up of replica of protected volume and the diff area
    • Transfer Area is an unmounted volume that contains the spill log
  • Non-blocking, distributed architecture
dpm technology overview dpm engine
DPM – Technology OverviewDPM Engine

Clients

Active Directory

  • .NET application (managed code)
  • All application state and configuration data stored in full SQL Server database
  • Protected data stored in the following places
    • Replica Area is a mounted volume that is made up of replica of protected volume and the diff area
    • Transfer Area is an unmounted volume that contains the spill log. Spill log holds data transferred from protected server but yet to be applied to replica.
  • Non-blocking, distributed architecture. All operations are autonomous of each other thus allowing system to scale to limits of hardware

File Servers

DPM Server

dpm technology overview agent
DPM – Technology OverviewAgent

Clients

Active Directory

  • Agent components:
    • File System Filter: runs in kernal mode, implemented as mini-filter per W2K3 SP1
    • File Agent service runs in user mode
  • Requires reboot of file server before operating due to legacy (non-mini filters) to assure correct ordering
  • Each volume with protected object has synchronization log in hidden Volume System Information directory
  • Synchronization log is by default 10% of volume size but can be adjusted
  • Agent puts overhead of 3-5% on processor protected server

File Servers

DPM Server

dpm technology overview synchronization
DPM – Technology OverviewSynchronization

Clients

Active Directory

  • “Pull” model, all synchronizations instigated by DPM server
  • Asynchronous replication
  • Two separate channels for communication
    • Control commands sent over DCOM
    • Data movement sent over TCP/IP using DPM proprietary protocol
  • Replication unit of operation is the protected volume
  • Check points the lesser of 2 min or 10 MBs for resumption of incomplete operations
  • All file operations are replicated (rename, delete, copy) along with all changed blocks, this is most similar to “byte level replication”

File Servers

DPM Server

dpm technology overview synchronization with consistency check
DPM– Technology OverviewSynchronization with Consistency Check

Clients

Active Directory

  • Various unexpected events create need to resync replica with source data (hard reboot of protected server, synchronization log overflow)
  • Sync with Consistency Check does two things
    • Checks file by file for more recent modified times then on replica
    • If changed, all blocks associated with file are check summed and appropriate blocks are replicated to DPM server
  • All open files are check summed irregardless
  • Rolling process that traverses the entire directory tree, not a snapshot that freezes volume at point in time

File Servers

DPM Server

monitor
Monitor
  • Monitor the health and status of your DPM server easily
  • Set up automatic alerts via email
report
Report
  • Comprehensive reports show all data protection activity on the network
dpm mom integration
DPM/MOM Integration
  • Control and monitor multiple DPM Servers
  • All alerts and events uploaded to MOM
top 10 reasons to deploy dpm
Top 10 Reasons To Deploy DPM
  • Recover files in minutes instead of hours
  • Eliminate the backup window of your production servers
  • Shrink potential data loss down to 1 hour
  • No more failed recoveries
  • Get easy instant backup verification
  • Enable end users to perform their own recoveries
  • Setup and protect your file servers in minutes
  • Advanced functionality at low cost
  • Remove tapes from branch offices and centralize backups at datacenter
  • Rich out-of-box reporting and monitoring functionality
dpm demo

DPM Demo

Task : Configure Protection

dpm walkthru

DPM Walkthru

Task : End-User Restore

from Windows Explorer

slide40

PVC

Previous Versions Client

is an applet that extends Windows Explorer and Office applications with

this simple new tab.

Available since Windows Server 2003 and VSS.

Usually installed silently via

Group Policy

slide44

Keep the new one

AND

Restore the old one

industry partners
Industry Partners

Hardware

Software

slide49

© 2003-2004 Microsoft Corporation. All rights reserved.

This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.