1 / 22

Planning for Remote Replication

Planning for Remote Replication. Larry Anderson EMC Technical Consultant for Business Continuity. Agenda. Barriers to DR Planning Process Bandwidth sizing data– DR Planning Replication Modes WAN Optimization Application Consistency. The Core Problem.

Download Presentation

Planning for Remote Replication

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Planning for Remote Replication Larry Anderson EMC Technical Consultant for Business Continuity

  2. Agenda • Barriers to DR • Planning Process • Bandwidth sizing data– DR Planning • Replication Modes • WAN Optimization • Application Consistency

  3. The Core Problem As long as the motor isn’t started, everything is fine

  4. What Are The Barriers to Disaster Recovery? • Cost of the network • Dedicated, high quality bandwidth • Cost of equipment • Need extra disk capacity &/or cache • Application complexity • Which applications need to be replicated? • Which applications are grouped together? • Coordination of total solution • Servers, people, data, applications • Disaster recovery processes

  5. Business Continuity Planning Definition Strategy Project Initiation Gap Analysis Risk Assessment SolutionAlternatives Business ImpactAnalysis Facilitated Workshop Plan RecoveryStrategies Document Recommendations Design Manage Solution Meta Data Capture Testing Review BusinessDrivers NetworkArchitecture Pre-ActivationMeasurement Review ITProcedures DataArchitecture Activation Gap Analysis Describe Client/ServerArchitecture Post-ActivationMeasurement DR/BC Trial Participation DocumentImprovements Develop Policies& Procedures

  6. Decision Drivers and Tradeoffs Business Considerations Technical Considerations Cost Recovery Amortization Capacity RTO Availability RPO Performance Primary Decision Drivers

  7. Network Availability Strategies:Disaster Recovery (DR)High Availability (HA)Continuous Availability (CA) Secondary -or- Tertiary Out-Region Asynch Asynch Primary A Asynch In-Region Commercial Hotsites -Acxiom -Sungard Dual Primary or-Secondary Synch

  8. Synch (Metro) B/W Needs RPO: Zero Asynch (Out of Region) B/W Needs RPO: Minutes RPO: Hours Asynch Tier 2 (Out of Region) B/W Needs Typical Bandwidth Comparisons • Bandwidth requirements • Synch (Metropolitan) requires highest bandwidth, • Asynch mitigates network bandwidth by increasing RPO to minutes • Asynch Tier 2 mitigates network bandwidth by increasing RPO to hours • Supporting analyses • Asynch Tier 0 & 1 analyzes peak writes/second over time period • Asynch Tier 2 analyzes maximum track changes over time period • WAN optimization products can have a big impact on the required bandwidth requirements. B/W Costs Time

  9. Data Collections for Bandwidth Modeling • For EMC Environments • Symmetrix: Control Center Performance Monitor Data • Symmetrix: Service Processor based data collections (STP) • CX3: Navisphere CLI archivedump NAR data • Non EMC Environments • Host Data Collections • Windows Perfmon • HP/UX sar • AIX iostat • Linux iostat • Solaris iostat • iSeries WRKDSKSTS • Mainframe SMF and CMF • Workload Generator (Simulated Data)

  10. Writes Per Second Look for and understand workload peaks Sample Write Activity Workload

  11. Write Profile

  12. Sample Multiple Storage Subsystem Model

  13. Sample Uncompressed Mbytes per Second Throughput Requirements

  14. IO Profile Charts Looking for repetitive cycles

  15. Sample Model Exceeding OC12 Bandwidth

  16. Data center challenges • Cannot meet RPO/RTO • Diverse application mix • Bandwidth (cost/availability) • Branch fan-in Business Benefits • Improve RTO/RPO • Avoid bandwidth costs • Real-time WAN performance • Centralize servers and storage How Network Memory works: • Transparently intercept traffic in real-time • Fingerprint at byte level; store on local disk • Deliver duplicate data from local instance • Data always encrypted WAN Acceleration with Silver Peak • Silver Peak Functionality • A technology for improving network usage for all IP replication • Network Memory works across all applications • Offloads CPU intensive processes from end stations • Byte level fingerprinting is more granular than block techniques • Bi-directional: Handles recovery as well as backup/replication • SECURITY, SECURITY, SECURITY • Entire process handled with full encryption • Incorporates other WAN optimization techniques: • Loss Mitigation, QoS/Traffic Management, Latency Mitigation Additional Info: EMC Select URL for Silver Peak:http://powerlink.emc.com/km/appmanager/km/secureDesktop?_nfpb=true&_pageLabel=query1&internalId=0b014066802f83b7&_irrt=true

  17. SYN SYN WANJet WANJet LAN A LAN B ACK ACK Technical Benefits • Decreased usage of bandwidth • Accelerated Replication processes • Prioritization of traffic • Big improvement over Symm compression • Decreased susceptibility to packet loss • Encryption of SRDF payloads with SSL WAN Acceleration with F5 • Data center challenges • Cannot meet RPO/RTO • Diverse application mix • Bandwidth (cost/availability) • F5 Functionality • A technology for improving network usage for all IP replication • Simple to use • Transparent – Non-invasive • SRDF Replication is unaware that TDR is being applied • Protocol agnostic • Applicable to any TCP protocol (e.g. SRDF,FTP, CIFS,etc) • File type agnostic • Works for any file type (e.g. Powerpoint, PDF, CAD) including proprietary file types • Data reduction even for compressed data • ZIP Archive, images etc. • Dramatically higher bandwidth savings than traditional compression techniques • No files are stored or cached on disk Business Benefits • Reduced WAN costs / utilization • Improvement in RPO/RTO of SRDF • Reduced business risk of unmet RPO/RTO’s Additional Info: EMC Select URL for F5:http://powerlink.emc.com/km/appmanager/km/secureDesktop?_nfpb=true&_pageLabel=query1&internalId=0b014066802b47a2&_irrt=true

  18. What happens if someone turns off all the servers……… now?

  19. Application Consistency: The Problem CRM Systems share related information… How do you get a consistent view of it all? Without consistent database copies, transactions must be recreated manually Orders Shipments Order/Ship Orders Shipments How do you discover the interrelationships?

  20. Application Consistency: The Enterprise Solution EMC Business Continuity products create point-in-time, restartable copies for all affected databases, ensuring enterprise-wide consistency across multiple databases, applications, & platforms Mainframe Windows UNIX

  21. Users NSPOF Local High Availability, Remote Disaster Recovery Local & Remote Sites: Disaster Recovery High Availability Notes Site B Site A New zoneset for DNS, AD domain. Load Balancers Cisco, F5 Big-IP, Foundry Standby and used for testing. May be replicated, but must consider state vis a vis database. Middleware (TP Monitor) Tuxedo, MQ Series, Citrix Application Server Farm 10g Services, Transparent Application Failover (TAF) Standby and used for testing. Database Oracle 10g, RAC Assumes Production Test & Dev, Backup, Reporting Active Active SAN SAN Storage Sync replication RecoverPoint, SRDF/A Database R2 Database M2 Database M1 BCV

More Related