1 / 49

Industry Waves Backup and recovery evolution

Future. Disk based backup becoming cost effective Archive and Backup diverge Recovery in minutes or seconds Continuous backup End user recovery Self healing backups . Today. Majority of companies use tape Tape one size fits all Backup once per day

toyah
Download Presentation

Industry Waves Backup and recovery evolution

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Future • Disk based backup becoming cost effective • Archive and Backup diverge • Recovery in minutes or seconds • Continuous backup • End user recovery • Self healing backups Today • Majority of companies use tape • Tape one size fits all • Backup once per day • Tape recoveries slow & unreliable • Administrators do all recoveries Industry WavesBackup and recovery evolution Version 1.0

  2. Customer Data Protection Pain Points Customer Needs: Faster Recovery • Recovery is unreliable and painful • Too slow and expensive to recover files • typical recovery takes hours or days (slow, expensive) • Recoveries and unreliable • 42% of companies had failed recovery in past year • 50% of customers wish for online backup verification • Data protection is labor intensive • All recoveries go through the server admin Rapid and Reliable Recovery • Solution with DPM • Designed for fast recovery • Enables a whole new recovery scenario–end users: files, Admins: servers • Snapshots enable multiple recovery points • Recoveries are assured through verification

  3. Continuous and efficient protection Customer Data Protection Pain Points Customer Needs: Eliminating Backup Window • Backup is too complex, slow, and inefficient • Shrinking backup window • Growth in data makes it too difficult and time consuming to back up • Backups too slow/lots of manual scheduling • Mandated disaster recovery plans • 24 hours of data loss assumed with tape • Tape as one size fits all (file and server recovery, offsite protection and long term archive) • Tape inconvenience and unreliability of is # 1 challenge • Solution with DPM • Faster and More Efficient Backup • Never do a full backup from a production server again • Avoid the shrinking backup window

  4. Operational Simplicity Customer Data Protection Pain Points Customer Needs: Simpler Solution, Lower costs • Current backup products are too complex, costly • Companies spend too much time and money on backup • Labor is the majority of backup cost • Branch office data protection is cumbersome • Massive data growth increases costs • Too many tapes • Most disk-based backup solution are cost prohibitive • Solution with DPM • Designed to reduce TCO via continuous, disk-based backup • Automatic protection schedules = reduce operational costs, increase efficiency • Allows end users to easily recover their own files • Usability and easier management • Integration into existing environment • Industry standard hardware and software

  5. What does DPM do? • Near continuous (hourly) protection of files • DPM agent on file servers • Byte-level changes transmitted to DPM server • Multiple scheduled snapshots per day • Easy IT or End-User restore – fast from disk

  6. DPM “Under The Hood” DPM Server Agent components: • File System Filter: runs in kernel mode • File Agent service runs in user mode • Requires reboot of file server • Each protected volume has synchronization log • Synchronization log 10% of volume size • Agent overhead 3-5% Synchronization • “Pull” model, synchronizations instigated by DPM • Asynchronous replication • Two communication channels • Control commands - DCOM • Data movement - DPM proprietary protocol • Replication unit of operation is protected volume • Check points: 2 min/10 MBs • Byte level replication Consistency Check • Unexpected events create need to resync replica • Consistency Check does two things • Checks file by file for more recent modified times • If changed, all blocks associated with file are check summed and appropriate blocks are replicated to DPM server • All open files are check summed irregardless DPM Engine • .NET application (managed code) • Application state and configuration data stored in SQL • Protected data stores: • Replica Area is a mounted volume that is made up of replica of protected volume and the diff area • Transfer Area is an unmounted volume that contains the spill log • Non-blocking, distributed architecture

  7. DPM – Technology OverviewDPM Engine Clients Active Directory • .NET application (managed code) • All application state and configuration data stored in full SQL Server database • Protected data stored in the following places • Replica Area is a mounted volume that is made up of replica of protected volume and the diff area • Transfer Area is an unmounted volume that contains the spill log. Spill log holds data transferred from protected server but yet to be applied to replica. • Non-blocking, distributed architecture. All operations are autonomous of each other thus allowing system to scale to limits of hardware File Servers DPM Server

  8. DPM – Technology OverviewAgent Clients Active Directory • Agent components: • File System Filter: runs in kernal mode, implemented as mini-filter per W2K3 SP1 • File Agent service runs in user mode • Requires reboot of file server before operating due to legacy (non-mini filters) to assure correct ordering • Each volume with protected object has synchronization log in hidden Volume System Information directory • Synchronization log is by default 10% of volume size but can be adjusted • Agent puts overhead of 3-5% on processor protected server File Servers DPM Server

  9. DPM – Technology OverviewSynchronization Clients Active Directory • “Pull” model, all synchronizations instigated by DPM server • Asynchronous replication • Two separate channels for communication • Control commands sent over DCOM • Data movement sent over TCP/IP using DPM proprietary protocol • Replication unit of operation is the protected volume • Check points the lesser of 2 min or 10 MBs for resumption of incomplete operations • All file operations are replicated (rename, delete, copy) along with all changed blocks, this is most similar to “byte level replication” File Servers DPM Server

  10. DPM– Technology OverviewSynchronization with Consistency Check Clients Active Directory • Various unexpected events create need to resync replica with source data (hard reboot of protected server, synchronization log overflow) • Sync with Consistency Check does two things • Checks file by file for more recent modified times then on replica • If changed, all blocks associated with file are check summed and appropriate blocks are replicated to DPM server • All open files are check summed irregardless • Rolling process that traverses the entire directory tree, not a snapshot that freezes volume at point in time File Servers DPM Server

  11. Monitor • Monitor the health and status of your DPM server easily • Set up automatic alerts via email

  12. Report • Comprehensive reports show all data protection activity on the network

  13. DPM/MOM Integration • Control and monitor multiple DPM Servers • All alerts and events uploaded to MOM

  14. Top 10 Reasons To Deploy DPM • Recover files in minutes instead of hours • Eliminate the backup window of your production servers • Shrink potential data loss down to 1 hour • No more failed recoveries • Get easy instant backup verification • Enable end users to perform their own recoveries • Setup and protect your file servers in minutes • Advanced functionality at low cost • Remove tapes from branch offices and centralize backups at datacenter • Rich out-of-box reporting and monitoring functionality

  15. DPM Demo Task : Configure Protection

  16. DPM Walkthru Task : End-User Restore from Windows Explorer

  17. Original Files

  18. Overwritten

  19. Right-click on any file or directory

  20. PVC Previous Versions Client is an applet that extends Windows Explorer and Office applications with this simple new tab. Available since Windows Server 2003 and VSS. Usually installed silently via Group Policy

  21. Open document

  22. Keep the new one AND Restore the old one

  23. Restore the old one

  24. Industry Partners Hardware Software

  25. © 2003-2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

More Related