10 The next chapter of this Web Based Training module describe the two different Remote Equivalent Transfer Modes; synchronous and asynchronous.

Size: px
Start display at page:

Download "10 The next chapter of this Web Based Training module describe the two different Remote Equivalent Transfer Modes; synchronous and asynchronous."

Transcription

1 Slide 0 Welcome to this Web Based Training session providing an introduction to the fundamentals of Remote Equivalent Copy. This is one of the ETERNUS DX Advanced Copy Functions available in Fujitsu ETERNUS DX systems from DX90 upwards. Advanced Copy functionality is embedded in the firmware of the DX system and is managed with the ETERNUS SF management applications: either with AdvancedCopy Manager or SF Express. For the use of ACM there are different purchasable licenses for the different Advanced Copy Functions. SF Express with basic functionality is available free of charge for the DX Entry models, but a Remote Copy license is required for the use of Remote Equivalent Copy. 1 After this Web Based Training module you will be familiar with the Advanced Copy Feature Remote Equivalent Copy, often abbreviated as REC. In some contexts during this training module it is also pronounced as REC. We will start with an overall description of some general terms associated with REC. The chapter REC Modes explains in brief the two different interconnect types. The chapter Synchronous Split and Recovery Sub-modes explains the configuration parameters and their use in case of a connection failure. Next chapter explains the different REC transmission modes and their configuration parameters for the asynchronous mode. The next section explains in more detail the functionality of a REC session in asynchronous mode. A comparison and a summary of the previously learned REC topics follow in the chapter Differences Between REC Modes. The last two chapters of this Web Based Training show how to shorten the initial synchronization time in an ETERNUS DX Disaster Recovery configuration and how to combine the different local and remote ETERNUS DX Advanced Copy features. 2 Let's start with the REC overview. First we will have a look at the two different main usages of REC. Next we will see what is important in a Disaster Configuration from the business continuity point of view. In chapters Concept Diagram and Suspend and Resume we will look in detail at the different REC administration steps. Chapter REC Process summarizes the different phases of REC replication, after which a brief overview of the REC Concurrent Suspend mode rounds out this first chapter. 3 Remote Equivalent Copy is always about having two ETERNUS DX systems interconnected for data mirroring purposes. Single DX system can be connected with more than one other system but each REC connection is always a pair. The distance between the two systems can be anything between meters and thousands of kilometers - physically close systems provide typically High Availability whereas interconnected systems in two continents typically speak for Disaster Recovery functionality.

2 Typically for data High Availability REC is used within the same data center or between two data centers that are located in nearby buildings. One REC session connects two ETERNUS DX systems and with short distances the interconnection lines can be set up using Fiber Channel or iscsi protocol. With short distances data High Availability is rather easy to achieve by simply mirroring the data between two ETERNUS DX systems. Consequently the server or servers have to have access to both ETERNUS systems. Should the other system fail the servers continue to have access to the data available either at site A or at site B. The other option is to have a configuration with active business related applications at both locations. In this case the production and backup data are split between the two locations. For example applications running on a server located at site B have its backup data in site A - and vice versa. The interconnection lines need to be dedicated for REC and to be independent from the host data lines. This means that a minimum of one - for redundancy two - host ports of a Controller Module are used only for REC. 4 The term Remote Equivalent Copy implies data mirroring between two ETERNUS DX systems. REC is often used for Disaster Recovery functionality. As data availability has become increasingly critical for the business continuity of a company, the importance of ensuring - or quickly recovering - access to data has increased. The physical distance between the two ETERNUS systems can be anything from next room or building to different continent - the configuration is defined by the security concept of the customer. However, with distances exceeding 10 kilometers special converter hardware needs to be used to convert from Fiber Channel to Wide Area Network or iscsi protocol. Like on the previous slide, also over greater distances it is still possible to use the backup site as a second productive environment with full access to the replicated data. In such a constellation the main site holds its backup data at the backup site and the backup site respectively has its backup data at the main site. A more common configuration is to use the backup site only for the replicated backup. If the main site goes down the data can be accessed in the backup site. Remote Equivalent Copy uses ETERNUS DX built-in copy functionality and therefore functions completely serverless. For data replication the two systems must be connected with dedicated interconnection lines that are separate from normal host data interfaces and thus used for REC only. 5 With this slide we will have a look at some parameters associated with data recovery. Two parameters are commonly used as planning basis when a company is considering implementing a Disaster Recovery scheme; RPO and RTO. These are key parameters when defining company's business continuity processes. The abbreviation RPO is short for Recovery Point Objective and RTO for Recovery Time Objective. This slide explains in brief the meanings of these two terms. Let's use the blue time line as a basis. At one point in time a disaster - anything from a data base corruption, hardware failure or a data center fire - occurs and impacts the company's business. The result is an unexpected application downtime.

3 The first question is how much data has been lost? The answer associates with the first key parameter - RPO - in a Disaster Recovery constellation. In our time line that means: was the last known good data backed up 24 hours ago or was it backed up - let's say - only a few hours ago? During this time window of RPO all modifications are lost. Now the other aspect of Disaster Recovery comes into play, RTO that answers the question: How soon after the crash is the application available again? During this time window the following three objectives have to be achieved: The Analyze phase determines how much data is lost? When did the last data backup take place? What are the next steps to restore the data? Next, in the Restore phase, all the necessary tasks have to be executed to bring back the data online. These tasks were specified in the previous "Analyze" phase. After the data restore phase the Recovery phase follows. That brings back the data to the state prior to the crash. These tasks can include activities like computing and executing different type of log files; intent logs, redo logs and the like. Obviously, the shorter both parameters are, the better the company's business is protected against disasters; REC can help bring these values down to minutes and even seconds. 6 This diagram demonstrates a generic REC concept overview. The upper line shows the Source Volume in site A and the lower line in site B the Destination - or Target - Volume. Both reside in different ETERNUS DX systems. Using ACM or SF Express the Remote Equivalent Copy session is started by a GUI or CLI. The whole copy process runs serverless in the background and sequentially transfers the data from the Source to the Target Volume. What happens now with a write request to the source LUN? As REC is a kind of a mirror process, the writing of the data block is executed on both Volumes - Source and Target. After the complete Source Volume data is copied over, the initial copy phase is finished and the REC status is Paired. In Paired status the data is mirrored meaning all new data is always written to both Volumes which guarantees the data equivalence. During this time the Destination Volume is visible but not accessible to the server Operating System or its applications even it is mapped; it can be read but a write attempt results in an error. The system administrator can stop the REC session using ACM or SF Express. In an emergency situation this can also be done with the ETERNUS Web GUI. After the split of the remote mirror, the two Volumes are autonomous and can be accessed independently. 7 This next slide shows the difference and the pros and cons of tasks "Cancel" and "Suspend and Resume" of an REC session. In both cases a replication pair - comprising a Source and Destination Volume - must have reached the Equivalent state before the mirroring can be interrupted. Let's have first look at the "Cancel" interruption. Consequently the two Volumes are no longer linked together. Next we look what happens when we write a black and green block to the Source Volume and a red data block to the Destination Volume.

4 After cancelation, a REC session has to be started again to bring it back into Equivalent state. The initial synchronization copy process is started. All data of the Source Volume will be copied to the Destination Volume so that the former "red" data block at the Destination Volume is now overwritten by the original, unmodified Source data block. The REC session finishes the initial synchronization after all Source Volume data blocks are copied over to the Destination Volume and the state is Equivalent. Next we will have a look at the Suspend and Resume interruption and start with the same initial point: a replication pair - consisting a Source and Destination Volume - has reached state Equivalent. After the Suspend command, the two replication Volumes are no longer actively mirrored. Again we change the Source Volume with a black and green data block. But now the modification at the Source is tracked by a bitmap and can be stored in a dedicated REC buffer cache, depending on the REC usage mode. This is explained in detail later in this Web Based Training module. And also the modifications of the Destination Volume are tracked by a bitmap and can be stored in a REC Buffer Cache that resides in the Controller Module of the ETERNUS system. A REC session that is in Suspend state can be re-started with a Resume command only. In our example the bitmap shows that we have to copy only three data blocks from the Source to the Destination Volume to reach equivalent state with the remote replication. According to the bitmap, first the black and green data blocks are copied over to the Destination Volume and then the red block of the Destination Volume is overwritten by the corresponding original data block from the Source. The copy process of these three data blocks brings the replication pair to Equivalent state. 8 Let's summarize now the steps of a Remote Equivalent Copy session. When a REC session starts, a block level copy from the local copy Source to the remote Destination is executed as a background task by the ETERNUS DX. The ETERNUS internal copy priority can be set up with the parameter settings with the ETERNUS Web GUI or via CLI. For a detailed explanation of the use of these parameters please join an ACM or SF Express classroom training. After the REC replication is started with ACM or SF Express or CLI the Source Volume is normally accessible by the server operating system and application. Note, when REC is started the Destination Volume is locked by the ETERNUS DX and no longer write accessible by the host server. The initial copy process has an impact on the overall I/O performance of the storage system. After the Equivalent state is achieved the performance impact is no longer recognizable by the server or its applications. The next process step begins after 100% synchronization is achieved. After that all write tasks are executed in both volumes - the Source and Destination - by the ETERNUS system. This guarantees that the replication pair remains in Equivalent state. To discontinue the Paired status of an REC the administrator issues either a Cancel or Suspend command.

5 It is also strongly recommended to guarantee data consistency before the REC session is interrupted with the Suspend command; data writes that take place when ETERNUS is changing from Equivalent state to suspended are written on the Source disk and consequently tracked by the bitmap or REC buffer, but would not be written to the Target disk. That would result in inconsistency between the Source and Target data. Consistency can be guaranteed by stopping or freezing all host access to the Source LUN. ACM comes with sample pre- and post-scripts that can be used to guarantee data consistency by stopping or freezing all host access to the Source LUN. It is strongly recommended to use these scripts that are automatically executed by ACM prior and after the Suspend command. Now both Volumes are read and write accessible as independent LUNs. If Suspend was issued then the following modifications will be recorded in a bitmap. 9 Concurrent suspend is a function that ensures consistency between several parallel replication pairs; for example between different database components. Applications like databases use multi-volume access and if these Volumes belong to a REC configuration, it is a challenge to guarantee data consistency between REC sessions when they are suspended. This is practically impossible with the standard sequential command execution. To guarantee consistency, the associated REC replication pairs have to be grouped within ACM or SF Express. To invoke the Concurrent Suspend task for all REC members of the same group they all must have Equivalent state as an indication that the initial copy process is completed. All REC members of the same group can be stopped with the Concurrent Suspend at the same point in time. A Resume command can be issued in sequential order for each individual replication pair without jeopardizing data consistency. 10 The next chapter of this Web Based Training module describe the two different Remote Equivalent Transfer Modes; synchronous and asynchronous. 11 Prior to starting an REC session it is necessary to select the right transfer mode. This slide explains in brief the operating principle of the REC synchronous mode. We have again a Source Volume and a Target Volume in sites A and B. The REC session has reached Equivalent state at this point in time. Now an application writes a data block to the Source Volume and waits for an acknowledgement from ETERNUS DX. In synchronous REC mode the ETERNUS with the Source Volume transfers the data block to the Target Volume residing in the remote ETERNUS system. After the local ETERNUS system receives a write acknowledgement from the remote ETERNUS system, the local ETERNUS system forwards the acknowledgement for this data block to the host server and its application. That means that synchronous transfer mode guarantees that the copy process is fully completed in both systems before the write is acknowledged. But this guarantee has its price; data transmission latencies between the two systems may become a performance issue for the application.

6 Therefore ETERNUS DX offers also an asynchronous REC mode, more about that on the following slide. 12 If the write acknowledgement response times become an issue with synchronous mirroring mode, asynchronous mode is the better option, albeit without acknowledgement that the data has been actually written on the Target Volume. The Source Volume and Target Volume reside again in sites A and B, the replication pair has reached Equivalent state. To demonstrate the characteristics of asynchronous replication there is a second replication pair with Source and Target Volumes. Now the application writes a data block to the first Source Volume and waits for the acknowledgement before proceeding. One major difference between synchronous and asynchronous mode is the REC Queue. This tracks the modifications or the new written data in a bitmap or in a dedicated REC Buffer cache. After a write to the Source, the local ETERNUS DX system sends an acknowledgement back to the server within a normally expected response time. The animation continues with the second application sending new data to the second Source Volume. Also this data block is queued in the local ETERNUS system and the application gets an acknowledgement almost immediately. It is obvious that this mechanism has a big advantage from the application's point of view; the application can immediately proceed with the next write without having to wait a long time for a successful write acknowledgement. The local ETERNUS system uses its own internal algorithm for transmitting the data blocks to the target system. The sending order of the data blocks is determined by the internal algorithm, too. This example demonstrates the disadvantage of the REC asynchronous mode; the data is queued prior to being transferred to the remote system. Should site A experience a hardware failure that prevents it from sending the data out from the queue, the queued data may get permanently lost and consequently the remote site data is inconsistent. 13 REC synchronous transfer mode provides sub-modes that need to be assigned during the REC start invocation. The following chapter explains the Automatic and Manual Split as well as the Automatic and Manual Recovery options used for synchronous transfer mode only. 14 Transfer mode Automatic Split is aimed to manage potential data path failures between the REC systems. This animation illustrates data writes on the Source Volume and the consequent copy functions to the Target Volume. The next three steps show the write requests to the Source and its respective copy step to the Target. If now the data path between the two ETERNUS DX systems fails completely, an automatic disconnect of all REC sessions is performed. With the Automatic Split flag enabled the application is still able to write to the Source Volume while the REC session is interrupted with the status Hardware Suspend.

7 As long as the data path remains interrupted the server continues to write to the Source Volume only, but all modifications are tracked by the bitmap mechanism. After the data path is restored, a re-synchronization with a Resume function has to be performed to bring the Volumes back to Equivalent state. 15 This slide explains how Manual Split differs from an Automatic Split during a synchronous REC session. The animation shows write and copy activities for the Source and Target Volume. The next three steps show again the write requests to the Source and the respective copies on the Target. Now again a complete transmission path error comes about between the two ETERNUS DX systems and all REC sessions are immediately stopped. With the "Manual Split" flag enabled the application is no longer able to write to the Source Volume because ETERNUS has locked the Volume pairs of all REC sessions. As long as this path failure exists the server is not able to write to the Source, the Volumes remain in Equivalent state and consequently no bitmap is needed to track changes. In the case of an actual disaster this sub-mode setting ensures that the Source and Target remain fully synchronized. Issuing a Suspend command releases the Source Volume for write access and initializes the tracking bitmap to record Source Volume changes so that the Target Volume can be again synchronized as soon as the data path is restored. 16 The two recovery options Automatic Recovery and Manual Recovery become important after the data paths have been restored. Automatic Recovery means that the temporarily suspended REC sessions are resumed automatically without any intervention from the administrator. Manual Recovery option means that the administrator must resume the temporarily suspended REC sessions manually. While the replication session is on hold it is possible to create a backup - with OPC or EC - from both Volumes to ensure consistent data backup before new application data and replication data is applied on the Volumes. After the backup copies are made the Resume command for the REC session can be manually invoked. It is strongly recommended that these two manual mode options - Manual Split and Manual Recovery - are enabled and used only by experienced users because they require manual or scripted intervention. 17 Also for the REC asynchronous transfer mode there are a number of options that can be assigned during the REC start invocation. This chapter explains the functionality and usage of the Stack Mode and Consistency Mode. The necessary parameters that are required for the Consistency REC Buffer configuration are explained as well. This is followed by some important REC Buffer transfer parameters. The last topic explains the usage of the Consistency Mode in relation to the different buffer cache configurations.

8 18 The asynchronous REC mode can work either in Stack Mode or in Consistency Mode. Let's start by having a look at the Stack Mode. It uses a bitmap located in the cache memory of the ETERNUS DX Controller Module. This example starts with a situation where one data block has already been updated in the Source Volume. When the next data block in the local Source Volume is updated the corresponding bit in the bitmap is changed to flag the modification. The actual physical data is not cached at this time. After that ETERNUS sends an acknowledgement to the server to acknowledge successful data reception. ETERNUS internal transfer engine scans the bitmap from time to time, thus the write order at the remote destination cannot be guaranteed. Asynchronous REC Stack Mode is useful when the bandwidth of the REC interconnection is limited and consequently large amounts of data can accumulate at the transfer engine. 19 The transfer of the last modification of the same source data block to the remote destination site is a disadvantage of the REC Asynchronous Stack Mode. Let's have look at an example to see why: A write request sends a black data block to the local Source Volume and the corresponding bit in the bitmap is changed. A second write request to the same block address sends the blue content but the corresponding bit in the bitmap is already set to Modified. The ETERNUS DX internal transfer engine scans now the bitmap and finds the set bits for the updated data blocks. The transfer engine cannot recognize from the bitmap that the respective data block was modified twice so it transfers the blue content to the remote destination. REC Asynchronous Stack Mode can lead to data inconsistencies if a malfunction occurs at the ETERNUS source system because only a reference to the data is recorded, not the data itself. REC Asynchronous mode is typically used as a preparation for a disk based remote data backup. The remote data can also be used as a source for a quick data restore or used as the data source should the local source data get lost or corrupted. 20 This slide gives two examples for the use of REC Asynchronous Stack Mode. The first example shows the use of a REC multi copy configuration. Two independent REC sessions use the same Source Volume. Each session is toggled between suspend and resume. This example provides a consistent data set at a particular point in time. The second example shows cascading two ETERNUS DX Advanced Copy functions. Two local Copy functions like OPC or EC are set up for the remote system. In this example both local copy sessions use alternating the same Source Volume. This Source Volume is also the destination or target volume of the REC Asynchronous Stack session. Here again the toggle operation of the two local copy sessions provides a consistent data set at a particular point in time.

9 In case of an access problem with the source data you can fall back on these data sets and restore data from one of the last local disk backups at the destination system. Asynchronous Stack Mode will never reach 100% synchronization for which reason it cannot be normally suspended. Suspend mode is however required for a reverse copy or for data restoration. Suspend functionality can be simulated by interrupting the Stack Mode session and then changing the REC transfer mode to Through Mode. Consequently the un-copied data blocks are copied over according to the bitmap. Now the data is consistent and in the last step a Resume can be invoked and immediately thereafter a Suspend command. Consequently the destination data can be used for a restore. The Through Mode is suitable for some very specific situations and we will come back to it in more detail later in this Web Based Training module. 21 The next three slides show more details for the REC Asynchronous Consistency Mode. This first slide provides a general introduction. The Asynchronous Consistency Mode uses a buffer pair located in both ETERNUS DX systems; one for sending and one for receiving data. One of the advantages of the Consistency Mode is to guarantee the write order across multiple REC sessions. So the data will be sent to the destination site in the same order as they arrived in the send buffer. Data modifications to multiple LUNs are accumulated in the REC Buffer Cache of the source ETERNUS before they are transferred in groups to the destination ETERNUS system. This provides a better efficiency and utilization of the REC interconnection link. 22 This slide gives a more detailed description of the internal usage of the two REC Buffers. As mentioned on the previous slide, Asynchronous Consistency Mode does not use bitmap pointers instead it uses a REC buffer pair that is set up with the ETERNUS DX Manager GUI or CLI. The following animation shows the source site at the top and the destination site in the bottom. At the source site REC Consistency Mode uses a REC Send Buffer and this buffer is automatically divided into two equally sized parts. The same is valid for the REC Receiver Buffer at the destination site. When the application writes data to the Source Volume these data contents are also written in the REC Send Buffer. The administrator can define checkpoints to define at what interval the write process to the active part of the buffer cache is stopped. This takes approximately 100 micro seconds and generates an overhead of 0.1% - that has typically no measurable impact for the application. A checkpoint interval timer is set with the ETERNUS Manager GUI or CLI; typical values being for example one, two or four seconds. The value of this parameter has an impact on the Disaster Recovery key parameter "RPO" because it relates indirectly to how much data can get lost. Indirectly for the reason that the maximum amount of data that can be lost is actually defined by the size of the buffer; during heavy update load the buffer may get full in less than the interval time. At the given intervals - or when the buffer gets full - the data blocks are copied into the second part of the REC Send Buffer.

10 The data blocks in the first part of the Send Buffer are passed over in parallel to the target ETERNUS system and will be stored equally in the first part of the Receive Buffer Cache. Both copy processes are running in parallel; the local copy process to the Send Buffer and the remote copy process to the Receive Buffer. The two ETERNUS systems confirm the completeness of the buffer transfer and only then the remote site copies the data from the Receive Buffer to the Destination Volume of the REC replication. 23 This last of the three slides explains in brief the three REC Buffer parameters that have to be setup in advance and that have a direct impact on the accumulated data and its transfer to the target site. The parameter Forwarding Interval can be defined from 1 second up to 120 seconds - one second being the default value. In the previous slide we referred to this parameter as the check point value; the parameter specifies the time interval for copying the data to the destination, independent from the buffer space usage. The second REC Buffer parameter is called Watch - or Monitor - Timer and is selectable in a range between zero and fifteen minutes. Here the default value is fifteen minutes. If the write load to the send buffer is too high it might become a bottleneck and if the REC Send Buffer remains in this high-load state for the time specified by the Watch Timer the REC session status is changed from Paired to Halt. If set to zero the buffer overload monitoring is disabled. The last REC Buffer parameter is the Halt Wait Timer that can be set between zero and 15 seconds; zero giving the host I/O always highest priority, 15 seconds being the recommended value. This specifies the maximum no-response time in seconds that the ETERNUS system waits before responding to a write request from the host server. During the Send Buffer high-load phase ETERNUS delays the host I/O write acknowledgements to give the ETERNUS internal mechanism enough time to transfer data from the Send Buffer to the remote target ETERNUS. This host "wait I/O phase" is monitored by the ETERNUS and when the host waiting time exceeds the pre-defined threshold of the Halt Wait Timer the ETERNUS session changes its status from Paired to Halt automatically. 24 This slide summarizes some of the REC Buffer Cache configuration parameters. The send and receive buffer parameters are assigned with the ETERNUS DX Manager GUI or CLI. Before using REC the administrator has to define at the ETERNUS source site a Send Buffer and at the ETERNUS destination site a Receive Buffer. Please note that the same ETERNUS system can operate both as a Source and as a Target. The maximum number of REC Buffer definitions is limited to eight. What does this mean in practice? Let's assume there are eight ETERNUS REC Buffer pairs configured. Each buffer pair consists of a send and receive buffer at each site. This configuration allows forward copy sessions from the Source to the Destination site.

11 As such, restore would not be possible but for that purpose ETERNUS SF AdvancedCopy Manager provides a command that changes the role of the REC Buffer Cache. Please note that the REC Buffer Cache is located within the Controller Module cache memory. As the maximal cache size is model dependent, please refer to the respective reference documentation for further recommendations. An alternative functionality is provided by a number of ETERNUS DX models. With these systems it is possible to prevent the REC session from running into a REC Buffer shortage by setting up a REC Disk Buffer instead. 25 This slide explains in more detail the use of multiple REC Buffers. Up to eight REC Buffers in an ETERNUS DX system provides the possibility to establish multiple REC connections between multiple ETERNUS DX systems. That means for example that one ETERNUS system can be at the same time both source and target and that one ETERNUS can be a source for several target systems. A REC Send Buffer located in site A is paired with a REC Receive Buffer in site B. Each copy pair is always unidirectional - from Send Buffer to Receive Buffer - for bidirectional copying two pairs must be established. Bidirectional data transfer is needed for example to be able to restore backed up data from the target back to the source or when both sites have active business applications that require local data access but backups are made in the other site. However it is also allowed to configure a REC bidirectional data transfer between the two cabinets. Please note that it is not possible to set up two parallel send-receive pairs that run in the same direction between the same two systems. 26 The last two slides of this chapter shows couple of practical samples for the use of Asynchronous Consistency Mode. A REC configuration consists of two ETERNUS systems connected by one or two unidirectional data paths. The applications of the server A are using for instance the REC consistence pair number one. The copy direction is from main site A to backup site B. Another potential configuration is to have business applications running in server C in site B using a second REC consistency pair. Its copy direction is from site B to site A. Remote Equivalent Copy and its Buffer mechanism support consistency pairs that are shared by multiple applications. In this example the applications at server B share the REC consistency pair number one with the applications running at server A. Each REC consistency pair can be individually controlled. For example, a disk backup and a data restore session can run parallel between two systems. The application one of server C uses the blue REC session and parallel to that the application two of the same server is recovering its data using the red REC session. Both processes use different REC Buffer pairs to transfer its data. 27 As already mentioned in the beginning of this introduction, Asynchronous Consistency Mode preserves the write order with the help of the REC Buffer mechanism.

12 During an active REC copy session the different data modifications are stored in different REC Buffer sets and stored in the cache memory of the ETERNUS DX Controller Module. The Buffer sets are transmitted to the target in one transaction. The receiving ETERNUS system confirms the reception after the last data block is written to its REC Receive Buffer cache. The sending ETERNUS system holds the data in its Send Buffer cache until a confirmation is received from the receiving system. That guarantees data consistency in case of a transmission failure. 28 The next chapter deals with the details of the Suspend and Resume invocation during an REC session and explains how a line failure in an Asynchronous Mode is internally executed as well as the functionality and usage of the Asynchronous Through Mode. 29 The REC Asynchronous Mode uses a bitmap to track changes when the replication pair is suspended. After the REC session is resumed the bitmap entries are deleted in the target ETERNUS site. The upper part of the picture shows the Source Volume in site A and the lower part shows the target Volume in site B. The session has Paired status and the application writes data to the Source Volume. This new data block is copied to the remote Destination Volume. Next the session is suspended using ACM or SF Express GUI or CLI. When the status Suspend is established, both ETERNUS systems create local bitmaps to record data block modifications. If new data is written to the Source Volume ETERNUS flags the corresponding bit in the bitmap. When new data arrives to the Destination Volume also this ETERNUS system flags the modification by setting the corresponding bit in its bitmap. As the REC session resumes with the command execution from ACM or SF Express GUI or CLI, the two bitmaps are merged. Consequently the Destination Volume is no longer accessible for the server. Next the REC resynchronization process starts to copy the data blocks from Source to the Destination Volume according to the bitmap. Any data block that was updated in the Destination Volume during suspend is overwritten by the respective data block of the Source Volume. After the resynchronization process is completed the session resumes the normal copy process between the two ETERNUS systems and mirrors all Source data changes in the Target Volume. 30 This animation shows the bitmap merge after a Resume is invoked in an REC Asynchronous transfer mode. In suspend mode both Volumes are independently accessible and the first modification is written to the Source Volume. Consequently the corresponding bit is flagged in the bitmap. The next modification takes place in the Destination Volume and also here the corresponding bit is marked in the bitmap.

13 Two consecutive modifications take place in the Source Volume and are tracked by the bitmap. The last data update takes place in the Destination Volume and gets tracked by the local bitmap. Let's see what happens when the REC session resumes. The Destination Volume is locked and the two bitmaps are merged. The first bit indicates that the first data block of the Source Volume was modified. The third bit signals a modification in the Destination Volume. This information is needed so that the original data block from the Source Volume gets copied to the Destination. The fifth and sixth bit indicate respectively the modified data blocks in the Source Volume. After the bitmap merge is completed the synchronization copy process starts by copying the first data block to the Destination Volume, followed by the fifth data block and continued with the third and the sixth data block. Now both disk contents are equivalent and the REC session changes its status to Paired. 31 This slide illustrates what happens in a REC Asynchronous session when an interconnection failure occurs. During the line error the ETERNUS DX system in the source site records all modifications in a bitmap. The upper part shows the Source Volume in site A and the lower part the Destination Volume in site B. The session is active and has a Paired status so all Source data writes are copied to the Destination. As a line error occurs both ETERNUS systems change their status to Halt. The Source Volume remains accessible. The first write after REC path failure returns sense information to the server and consequently the bitmap is flagged. After the interconnect path is restored the Halt status ends. During the Halt status all Source Volume changes were tracked by the bitmap. Next begins the re-synchronization process. According to the bitmap contents - but now only the source bitmap is available - the resynchronization copies all flagged data blocks to the Destination Volume, without maintaining the write order of the changes. After the re-synchronization the session returns to Paired status. 32 REC Asynchronous Mode can run in three different modes; "Stack", "Consistency" and "Through Mode", also known as "Sequential Transfer Mode". With the following two slides we will have a closer look at this third mode. This mode is used to synchronize not yet copied data blocks of the Source Volume if a "Stack" or "Consistency" mode session is stopped or suspended and cannot be resumed or restarted. This mode should be used when an REC Asynchronous session is stopped or suspended and after that an interconnect path failure occurs. That can result in a situation where modified data should be copied from Source to Destination. After the path is restored the current Asynchronous mode must be changed from "Stack" or "Consistency" to "Through Mode" so that the pending copy process can start.

14 Remember the earlier example with "Stack Mode" where a "Stack Mode" session was forcibly stopped and the mode was changed to "Through Mode" to guarantee data consistency at both sides. 33 This slide describes the functionality of the REC Asynchronous Through Mode or Sequential Transfer Mode. The animation illustrates the data transfer process between the server, ETERNUS DX Copy Source and the ETERNUS DX Copy Destination. The server wants to write data in the ETERNUS Copy Source and gets an acknowledgement for this first data. In the next step the Copy Source system copies the data to the Copy Destination system. Now the server sends the next write request to ETERNUS. At this moment the Copy Source system is still waiting for an acknowledgement from the Copy Destination system for the first write and only after having received the first acknowledgement it acknowledges the second write. That means the Copy Source ETERNUS has to wait for each previous remote acknowledgment before it can response to the next pending write process. As a result the data transfer performance equals that of the "Synchronous Mode". That is why you should use this special Asynchronous "Though Mode" only under the circumstances described in the previous slide. 34 The following three slides explain REC network bandwidth requirements, explain the differences between the REC modes and provide an overview of the different REC modes. 35 This slide helps to estimate the needed transfer capacity for the one-way interconnect path between two systems. For the Synchronous or Asynchronous Consistency mode the amount of data updates in the peak time should match with the maximum line bandwidth. When considering the bandwidth requirements please bear also in mind the performance of the SAN and WAN network components - and any potential converters along the network path. For the Asynchronous Stack mode the volume of data updates should match with the average load that is expected in the data update. Especially over longer distances - to keep the transfer line costs optimal - the required bandwidth is allowed occasionally to exceed the available line bandwidth. 36 This table provides a comparison between the different REC Modes. The leftmost column shows the features that are compared between the Synchronous Mode and Asynchronous Stack and Consistency Modes. Let's start with the topic "Main Usage". "Synchronous Mode" is used for local configurations, for instance within the same building or data center. The data mirroring between two ETERNUS systems provides High Availability of the storage - with or without cluster configuration - or can be used for pure data backup only.

15 The Asynchronous Stack Mode is used for remote installations, where the amount of updated data is reasonable. That could be for example a remote data backup as a Disaster Recovery solution. The Asynchronous Consistency Mode is the right option for remote installations where the amount of updated data is relatively high. How does the mode selection affect the host server responses? In case of the Synchronous Mode after each write the server has to wait for the acknowledgement from the source ETERNUS system. The impact can be very big if the data transfer latency is high - caused for example by low performance of the interconnect path between the systems. With Stack Mode the impact of the write acknowledgment is normally lower because the source ETERNUS response times depend on the local network performance only. The same impact exists also for the Consistency Mode, albeit the REC buffer cache mechanism provides a mechanism that reduces the performance impact. Correct data sequence during the transfer phase can be guaranteed in the Synchronous Mode because the next data block is sent to the remote system only after the previous write has been acknowledged. The Asynchronous Stack Mode does not guarantee the order of writes because the transfer sequence is driven by a control bitmap that ignores the write order. With the help of the REC Buffer cache the correct order of the data transfer is guaranteed in the Asynchronous Consistency Mode. Next we have a look at the difference between the commands "stop" and "suspend" in the different transfer modes. In the Synchronous Mode it is possible to invoke these commands at any time when the REC session has Equivalent state. After Asynchronous REC session is suspended or stopped it cannot be simply resumed; before resume the transfer mode must be changed to Asynchronous Through Mode to guarantee that all changed data gets transferred to the remote system. After the Volumes achieve Equivalent state the Through Mode can be stopped or suspended. What is the maximum number of ETERNUS system can be connected with REC? Synchronous Mode configuration supports one source ETERNUS system and up to sixteen remote ETERNUS systems. The same is valid for Asynchronous Stack Mode. Because of the REC Buffer cache pairs, up to eight remote ETERNUS systems are supported with the Asynchronous Consistency Mode. Multiple copy destinations can be specified to obtain more than one copy of the original data, allowing copies of the same Source data for different purposes, such as backup and testing. This multi copy function is supported by all three transfer modes. Which controller topology can be used for REC connectivity? For the Synchronous Mode only the Fibre Channel is released. The two Asynchronous Modes can be run with either Fibre Channel or the REC iscsi controller. Any unused FC port can be used by changing the port usage flag to Remote Adapter. Earlier DX models required a separate Remote Adapter for replication over iscsi, with S2 models the same physical port can be configured either for host or replication usage. Remember that a port configured for REC is no longer usable to map open volumes to the host server.

16 The last table entry concerns the Asynchronous Consistency Mode only and reminds about the necessity to set up the parameters for the buffer caches using the ETERNUS Web GUI or CLI. 37 This slide provides a summary of the main characteristics of the three main REC modes. Synchronous REC Mode guarantees the write order of the data but the application has to wait for the confirmation that the data is written in both ETERNUS DX systems. This has a high impact on the server write performance but guarantees that no data can get lost. The Split Mode defines how the system behaves in a case of an interconnect path failure; the REC session needs to be interrupted to allow application access to the Source Volume, this can happen either automatically or manually by the administrator. The Asynchronous Stack Mode does not guarantee the data transfer order. Application receives write acknowledgements with low latency meaning this mode provides good server write performance. As a downside data writes in the remote system cannot be guaranteed and therefore this REC mode is vulnerable for data losses. Equal to Synchronous REC Mode also the Asynchronous Consistency Mode guarantees data transfer order. Data transfers to the remote system can be managed with check point parameters but data writes to the remote system cannot be guaranteed. 38 This next chapter provides a brief introduction and practical advice for the use of REC Start+Suspend and Resume+Remain functions that can be used for the replication pair to skip the initial copy process. 39 In a Disaster Recovery configuration where the two ETERNUS DX systems are physically far apart from each other - for example in Munich and Tokyo - the first initial copy phase can take a very long time. To avoid this there is a special command available that skips the initial copy sequence. On the left hand side of the animation there is a Source Volume in site A and Target - or Destination - Volume in site B. The REC session is not yet started so at the moment both Volumes are independent from each other and open for data write. Normally when the REC session is started the Destination Volume is locked and the initial copy phase starts. That can be avoided by using the start option Start+Suspend. That means the REC session is started but immediately suspended and therewith also the initial copy process is suppressed. After Start+Suspend a block level backup of the Copy Source is made using common backup software. After that normal operation at the business site can be started while the REC replication remains suspended. From now onwards the application can write to the Source Volume and the modifications are recorded by the bitmap. Next step is to restore the backup of the Source data to the Destination Volume.

17 Because the replication pair has the "suspend" status the Destination Volume is not locked and therefore normally accessible. After the complete Source data is manually restored, the REC session can be resumed, but now with the other special command option "Resume+ Remain". Consequently the REC session proceeds with a normal resume operation and uses the bitmap to copy over the modified Source data to the Destination site. After the resynchronization process is completed the REC session runs in normal mode and mirrors all Source Volume changes to the Destination Volume by using the interconnect path. 40 Here is some additional advice for using the "skip initial copy" feature. If possible, the Copy Source data should be frozen or idled from application point of view after the Start+Suspend option is executed. This ensures that the re-synchronization phase is as short as possible. Before issuing the "Resume+Remain" command it has to be guaranteed that the Destination Volume is 100% identical with the Source Volume as it was at the time of the "Start+Suspend" invocation. Also note that the ETERNUS DX systems will not check the data consistency after the "Resume+Remain" invocation. That means that the REC session shows Equivalent state even though the data may in reality be inconsistent. 41 The last chapter of this Web Base Training module deals with Cascade Copy and Multi Copy configurations. 42 This slide demonstrates two examples for cascading several ETERNUS DX Advanced Copy sessions in conjunction with the REC. In such constellations a Volume can have two roles; first it can be a Destination of a copy session and at the same time it can be the Source Volume of a second, separate copy session. ETERNUS system number one holds two Volumes. These Volumes can be for example members of a local Advanced Copy Function like OPC, QuickOPC or EC. In this configuration the Volume on the right hand side is the Destination Volume of the copy session number one. The second system - ETERNUS DX number two - has also two volumes. Now a REC session - for example in Stack Mode - can be set up with the right most Volume of the DX number one as the Source and the left most Volume of DX two as the Destination. Furthermore, a third ETERNUS DX system also with two Volumes could be used to cascade a further copy session. For example a REC session - in Synchronous, Consistency or Stack Mode - could mirror the Source Volume of the DX system two with a Destination Volume in DX system three. This last REC session could be cascaded with a further local copy session within the third ETERNUS DX. The left most Volume plays two roles: in one hand it is the Destination Volume of a REC session and secondly it is also the Source Volume for a local Advanced Copy session. This local copy session could be any one of the available types: OPC, QuickOPC, SnapOPC or EC.

REC (Remote Equivalent Copy) ETERNUS DX Advanced Copy Functions

REC (Remote Equivalent Copy) ETERNUS DX Advanced Copy Functions ETERNUS DX Advanced Copy Functions (Remote Equivalent Copy) 0 Content Overview Modes Synchronous Split and Recovery Sub-modes Asynchronous Transmission Sub-modes in Detail Differences Between Modes Skip

More information

ETERNUS DX Advanced Copy Functions

ETERNUS DX Advanced Copy Functions ETERNUS DX Advanced Copy Functions 0 Content Equivalent Copy (EC) Session in General Equivalent Copy (EC) Concept EC Concept Diagram EC Cancel, Suspend and Resume Equivalent Copy - Process Mirroring Mechanisms

More information

ETERNUS SF AdvancedCopy Manager Overview

ETERNUS SF AdvancedCopy Manager Overview ETERNUS SF AdvancedCopy Manager 14.2 Overview J2X1-7443-04ENZ0(00) June 2011 Preface Purpose This manual provides an overview of the ETERNUS SF AdvancedCopy Manager. This manual describes the ETERNUS SF

More information

HUAWEI OceanStor Enterprise Unified Storage System. HyperReplication Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

HUAWEI OceanStor Enterprise Unified Storage System. HyperReplication Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD. HUAWEI OceanStor Enterprise Unified Storage System HyperReplication Technical White Paper Issue 01 Date 2014-03-20 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may

More information

10 Having Hot Spare disks available in the system is strongly recommended. There are two types of Hot Spare disks:

10 Having Hot Spare disks available in the system is strongly recommended. There are two types of Hot Spare disks: 0 This Web Based Training module provides support and maintenance related information for the ETERNUS DX S2 family. This module provides an introduction to a number of ETERNUS Web GUI functions, for a

More information

ETERNUS SF AdvancedCopy Manager Glossary

ETERNUS SF AdvancedCopy Manager Glossary ETERNUS SF AdvancedCopy Manager 14.1 Glossary J2X1-7455-02ENZ0(00) January 2010 Preface Purpose This manual describes the terminology used in the ETERNUS SF AdvancedCopy Manager manuals. Intended Readers

More information

Slide 0 Welcome to this Web Based Training session introducing the ETERNUS DX80 S2, DX90 S2, DX410 S2 and DX440 S2 storage systems from Fujitsu.

Slide 0 Welcome to this Web Based Training session introducing the ETERNUS DX80 S2, DX90 S2, DX410 S2 and DX440 S2 storage systems from Fujitsu. Slide 0 Welcome to this Web Based Training session introducing the ETERNUS DX80 S2, DX90 S2, DX410 S2 and DX440 S2 storage systems from Fujitsu. 1 This training module is divided in six main chapters.

More information

Slide 0 Welcome to the Support and Maintenance chapter of the ETERNUS DX90 S2 web based training.

Slide 0 Welcome to the Support and Maintenance chapter of the ETERNUS DX90 S2 web based training. Slide 0 Welcome to the Support and Maintenance chapter of the ETERNUS DX90 S2 web based training. 1 This module introduces support and maintenance related operations and procedures for the ETERNUS DX60

More information

SANtricity OS Synchronous and Asynchronous Mirroring

SANtricity OS Synchronous and Asynchronous Mirroring Technical Report SANtricity OS 11.40 Synchronous and Asynchronous Mirroring Feature Descriptions and Deployment Guide Todd Edwards, NetApp January 2018 TR-4656 Abstract NetApp E-Series and EF-Series products

More information

ETERNUS SF AdvancedCopy Manager SRA Version 2.4. User's Guide. Windows(64)

ETERNUS SF AdvancedCopy Manager SRA Version 2.4. User's Guide. Windows(64) ETERNUS SF AdvancedCopy Manager SRA Version 2.4 User's Guide Windows(64) B1WS-0994-04ENZ0(03) June 2017 Preface Purpose This manual explains how to install and customize ETERNUS SF AdvancedCopy Manager

More information

Exam : S Title : Snia Storage Network Management/Administration. Version : Demo

Exam : S Title : Snia Storage Network Management/Administration. Version : Demo Exam : S10-200 Title : Snia Storage Network Management/Administration Version : Demo 1. A SAN architect is asked to implement an infrastructure for a production and a test environment using Fibre Channel

More information

FUJITSU Storage ETERNUS AF series and ETERNUS DX S4/S3 series Non-Stop Storage Reference Architecture Configuration Guide

FUJITSU Storage ETERNUS AF series and ETERNUS DX S4/S3 series Non-Stop Storage Reference Architecture Configuration Guide FUJITSU Storage ETERNUS AF series and ETERNUS DX S4/S3 series Non-Stop Storage Reference Architecture Configuration Guide Non-stop storage is a high-availability solution that combines ETERNUS SF products

More information

The Right Choice for DR: Data Guard, Stretch Clusters, or Remote Mirroring. Ashish Ray Group Product Manager Oracle Corporation

The Right Choice for DR: Data Guard, Stretch Clusters, or Remote Mirroring. Ashish Ray Group Product Manager Oracle Corporation The Right Choice for DR: Data Guard, Stretch Clusters, or Remote Mirroring Ashish Ray Group Product Manager Oracle Corporation Causes of Downtime Unplanned Downtime Planned Downtime System Failures Data

More information

Replication is the process of creating an

Replication is the process of creating an Chapter 13 Local tion tion is the process of creating an exact copy of data. Creating one or more replicas of the production data is one of the ways to provide Business Continuity (BC). These replicas

More information

SAN for Business Continuity

SAN for Business Continuity SAN for Business Continuity How Cisco IT Achieves Subminute Recovery Point Objective A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Improve recovery point objective (RPO) and recovery

More information

Drive Space Efficiency Using the Deduplication/Compression Function of the FUJITSU Storage ETERNUS AF series and ETERNUS DX S4/S3 series

Drive Space Efficiency Using the Deduplication/Compression Function of the FUJITSU Storage ETERNUS AF series and ETERNUS DX S4/S3 series White Paper Drive Space Efficiency Using the Function of the FUJITSU Storage ETERNUS F series and ETERNUS DX S4/S3 series The function is provided by the FUJITSU Storage ETERNUS F series and ETERNUS DX

More information

FUJITSU Storage ETERNUS SF AdvancedCopy Manager V16.0. Overview

FUJITSU Storage ETERNUS SF AdvancedCopy Manager V16.0. Overview FUJITSU Storage ETERNUS SF AdvancedCopy Manager V16.0 Overview B1FW-6009-01ENZ0(01) May 2014 Preface Purpose This manual provides an overview for understanding the FUJITSU Storage ETERNUS SF AdvancedCopy

More information

Dell PowerVault MD3600f/MD3620f Remote Replication Functional Guide

Dell PowerVault MD3600f/MD3620f Remote Replication Functional Guide Dell PowerVault MD3600f/MD3620f Remote Replication Functional Guide Page i THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT

More information

Chapter 11. SnapProtect Technology

Chapter 11. SnapProtect Technology Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting

More information

White Paper Features and Benefits of Fujitsu All-Flash Arrays for Virtualization and Consolidation ETERNUS AF S2 series

White Paper Features and Benefits of Fujitsu All-Flash Arrays for Virtualization and Consolidation ETERNUS AF S2 series White Paper Features and Benefits of Fujitsu All-Flash Arrays for Virtualization and Consolidation Fujitsu All-Flash Arrays are extremely effective tools when virtualization is used for server consolidation.

More information

Business Continuity and Disaster Recovery. Ed Crowley Ch 12

Business Continuity and Disaster Recovery. Ed Crowley Ch 12 Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster

More information

FUJITSU Storage ETERNUS SF AdvancedCopy Manager V16.1. Overview

FUJITSU Storage ETERNUS SF AdvancedCopy Manager V16.1. Overview FUJITSU Storage ETERNUS SF AdvancedCopy Manager V16.1 Overview B1FW-6009-02ENZ0(00) June 2014 Preface Purpose This manual provides an overview for understanding the FUJITSU Storage ETERNUS SF AdvancedCopy

More information

Asynchronous Remote Replication Technical Report - Dell PowerVault MD3 Storage Arrays. A white paper

Asynchronous Remote Replication Technical Report - Dell PowerVault MD3 Storage Arrays. A white paper Asynchronous Remote Replication Technical Report - Dell PowerVault MD3 Storage Arrays A white paper TABLE OF CONTENTS 1 Overview... 3 2 Introduction... 4 2.1 Customer Needs Addressed by Asynchronous Remote

More information

Always On White Paper for Fujitsu ETERNUS Storage System

Always On White Paper for Fujitsu ETERNUS Storage System Always On White Paper for Fujitsu ETERNUS Storage System October 5, 2006 Fujitsu Limited Contents 1. Introduction...1 1-1. Scope...1 1-2. Products mentioned in this white paper...1 2. Fujitsu s ETERNUS

More information

Huawei OceanStor ReplicationDirector Software Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Huawei OceanStor ReplicationDirector Software Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date Huawei OceanStor Software Issue 01 Date 2015-01-17 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without

More information

FUJITSU Storage ETERNUS SF AdvancedCopy Manager V16.5. Overview

FUJITSU Storage ETERNUS SF AdvancedCopy Manager V16.5. Overview FUJITSU Storage ETERNUS SF AdvancedCopy Manager V16.5 Overview B1FW-6009-06ENZ0(00) May 2017 Preface Purpose This manual provides an overview for understanding FUJITSU Storage ETERNUS SF AdvancedCopy Manager

More information

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATION SEMESTER: III

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATION SEMESTER: III GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATION SEMESTER: III Subject Name: Operating System (OS) Subject Code: 630004 Unit-1: Computer System Overview, Operating System Overview, Processes

More information

Disaster Recovery-to-the- Cloud Best Practices

Disaster Recovery-to-the- Cloud Best Practices Disaster Recovery-to-the- Cloud Best Practices HOW TO EFFECTIVELY CONFIGURE YOUR OWN SELF-MANAGED RECOVERY PLANS AND THE REPLICATION OF CRITICAL VMWARE VIRTUAL MACHINES FROM ON-PREMISES TO A CLOUD SERVICE

More information

White paper ETERNUS CS800 Data Deduplication Background

White paper ETERNUS CS800 Data Deduplication Background White paper ETERNUS CS800 - Data Deduplication Background This paper describes the process of Data Deduplication inside of ETERNUS CS800 in detail. The target group consists of presales, administrators,

More information

S SNIA Storage Networking Management & Administration

S SNIA Storage Networking Management & Administration S10 201 SNIA Storage Networking Management & Administration Version 23.3 Topic 1, Volume A QUESTION NO: 1 Which two (2) are advantages of ISL over subscription? (Choose two.) A. efficient ISL bandwidth

More information

Top-Level View of Computer Organization

Top-Level View of Computer Organization Top-Level View of Computer Organization Bởi: Hoang Lan Nguyen Computer Component Contemporary computer designs are based on concepts developed by John von Neumann at the Institute for Advanced Studies

More information

TECHNICAL ADDENDUM 01

TECHNICAL ADDENDUM 01 TECHNICAL ADDENDUM 01 What Does An HA Environment Look Like? An HA environment will have a Source system that the database changes will be captured on and generate local journal entries. The journal entries

More information

Veeam and HP: Meet your backup data protection goals

Veeam and HP: Meet your backup data protection goals Sponsored by Veeam and HP: Meet your backup data protection goals Eric Machabert Сonsultant and virtualization expert Introduction With virtualization systems becoming mainstream in recent years, backups

More information

HP OpenView Storage Data Protector A.05.10

HP OpenView Storage Data Protector A.05.10 HP OpenView Storage Data Protector A.05.10 ZDB for HP StorageWorks Enterprise Virtual Array (EVA) in the CA Configuration White Paper Edition: August 2004 Manufacturing Part Number: n/a August 2004 Copyright

More information

17 In big Data Centers it may be practical to collect event and error messages to a central syslog server.

17 In big Data Centers it may be practical to collect event and error messages to a central syslog server. Slide 0 Welcome to this Web-Based-Training session providing you an introduction to the Initial Setup of the ETERNUS DX80 S2, DX90 S2, DX410 S2 and DX440 S2. 1 In this first chapter we will look at the

More information

SnapMirror Configuration and Best Practices Guide for Clustered Data ONTAP

SnapMirror Configuration and Best Practices Guide for Clustered Data ONTAP Technical Report SnapMirror Configuration and Best Practices Guide for Clustered Data ONTAP Amit Prakash Sawant, NetApp December 2013 TR-4015 SnapMirror Configuration and Best Practices This document describes

More information

RealTime. RealTime. Real risks. Data recovery now possible in minutes, not hours or days. A Vyant Technologies Product. Situation Analysis

RealTime. RealTime. Real risks. Data recovery now possible in minutes, not hours or days. A Vyant Technologies Product. Situation Analysis RealTime A Vyant Technologies Product Real risks Data recovery now possible in minutes, not hours or days RealTime Vyant Technologies: data recovery in minutes Situation Analysis It is no longer acceptable

More information

System Malfunctions. Implementing Atomicity and Durability. Failures: Crash. Failures: Abort. Log. Failures: Media

System Malfunctions. Implementing Atomicity and Durability. Failures: Crash. Failures: Abort. Log. Failures: Media System Malfunctions Implementing Atomicity and Durability Chapter 22 Transaction processing systems have to maintain correctness in spite of malfunctions Crash Abort Media Failure 1 2 Failures: Crash Processor

More information

VCS-276.exam. Number: VCS-276 Passing Score: 800 Time Limit: 120 min File Version: VCS-276

VCS-276.exam. Number: VCS-276 Passing Score: 800 Time Limit: 120 min File Version: VCS-276 VCS-276.exam Number: VCS-276 Passing Score: 800 Time Limit: 120 min File Version: 1.0 VCS-276 Administration of Veritas NetBackup 8.0 Version 1.0 Exam A QUESTION 1 A NetBackup policy is configured to back

More information

Q.1 Explain Computer s Basic Elements

Q.1 Explain Computer s Basic Elements Q.1 Explain Computer s Basic Elements Ans. At a top level, a computer consists of processor, memory, and I/O components, with one or more modules of each type. These components are interconnected in some

More information

B.H.GARDI COLLEGE OF MASTER OF COMPUTER APPLICATION

B.H.GARDI COLLEGE OF MASTER OF COMPUTER APPLICATION Introduction :- An exploits the hardware resources of one or more processors to provide a set of services to system users. The OS also manages secondary memory and I/O devices on behalf of its users. So

More information

Guide for Secure File Transfers Using the Storage Function

Guide for Secure File Transfers Using the Storage Function FUJITSU Storage ETERNUS DX series and ETERNUS AF series ETERNUS SF AdvancedCopy Manager Guide for Secure File Transfers Using the Storage Function Using the ETERNUS DX series or the ETERNUS AF series in

More information

Server Edition USER MANUAL. For Microsoft Windows

Server Edition USER MANUAL. For Microsoft Windows Server Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft Windows

More information

Chapter 17: Recovery System

Chapter 17: Recovery System Chapter 17: Recovery System Database System Concepts See www.db-book.com for conditions on re-use Chapter 17: Recovery System Failure Classification Storage Structure Recovery and Atomicity Log-Based Recovery

More information

Multiprocessor and Real-Time Scheduling. Chapter 10

Multiprocessor and Real-Time Scheduling. Chapter 10 Multiprocessor and Real-Time Scheduling Chapter 10 1 Roadmap Multiprocessor Scheduling Real-Time Scheduling Linux Scheduling Unix SVR4 Scheduling Windows Scheduling Classifications of Multiprocessor Systems

More information

CTWP005: Write Abort Handling for Cactus Technologies Industrial-Grade Flash-Storage Products

CTWP005: Write Abort Handling for Cactus Technologies Industrial-Grade Flash-Storage Products CTWP005: Write Abort Handling for Cactus Technologies Industrial-Grade Flash-Storage Products Covered Products: -203,-303,-503 CF cards, -900S SATA products, -806,-808 SD cards, -300 USB products 1 Introduction

More information

Vendor: EMC. Exam Code: E Exam Name: Cloud Infrastructure and Services Exam. Version: Demo

Vendor: EMC. Exam Code: E Exam Name: Cloud Infrastructure and Services Exam. Version: Demo Vendor: EMC Exam Code: E20-002 Exam Name: Cloud Infrastructure and Services Exam Version: Demo QUESTION NO: 1 In which Cloud deployment model would an organization see operational expenditures grow in

More information

IBM GDPS V3.3: Improving disaster recovery capabilities to help ensure a highly available, resilient business environment

IBM GDPS V3.3: Improving disaster recovery capabilities to help ensure a highly available, resilient business environment Marketing Announcement February 14, 2006 IBM GDPS V3.3: Improving disaster recovery capabilities to help ensure a highly available, resilient business environment Overview GDPS is IBM s premier continuous

More information

HP P6000 Continuous Access Implementation Guide

HP P6000 Continuous Access Implementation Guide HP P6000 Continuous Access Implementation Guide Abstract This guide explains the major factors in designing a successful disaster recovery solution using HP P6000 Continuous Access. In addition to explaining

More information

ETERNUS SF AdvancedCopy Manager Operator's Guide for Tape Server Option

ETERNUS SF AdvancedCopy Manager Operator's Guide for Tape Server Option ETERNUS SF AdvancedCopy Manager 14.0 Operator's Guide for Tape Server Option J2X1-7453-01ENZ0(00) July 2009 Preface Purpose This manual describes the functionality of ETERNUS SF AdvancedCopy Manager for

More information

Enterprise Backup and Restore technology and solutions

Enterprise Backup and Restore technology and solutions Enterprise Backup and Restore technology and solutions LESSON VII Veselin Petrunov Backup and Restore team / Deep Technical Support HP Bulgaria Global Delivery Hub Global Operations Center November, 2013

More information

BEST PRACTICES GUIDE FOR DATA PROTECTION WITH FILERS RUNNING FCP

BEST PRACTICES GUIDE FOR DATA PROTECTION WITH FILERS RUNNING FCP BEST PRACTICES GUIDE FOR DATA PROTECTION WITH FILERS RUNNING FCP Nick Wilhelm-Olsen, Brett Cooper October 1, 2002 TR3202 TECHNICAL REPORT Network Appliance, a pioneer and industry leader in data storage

More information

ETERNUS SF Express V15.0. Operation Guide. Windows/Linux

ETERNUS SF Express V15.0. Operation Guide. Windows/Linux ETERNUS SF Express V15.0 Operation Guide Windows/Linux B1FW-5962-01ENZ0(02) March 2012 Preface Purpose This manual gives an overview of ETERNUS SF Express. ETERNUS SF Express is part of the following Storage

More information

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper By Anton Els

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper By Anton Els Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper By Anton Els Copyright 2017 Dbvisit Software Limited. All Rights Reserved V3, Oct 2017 Contents Executive Summary...

More information

BrightStor ARCserve Backup for Windows

BrightStor ARCserve Backup for Windows BrightStor ARCserve Backup for Windows Volume Shadow Copy Service Guide r11.5 D01191-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for

More information

Server Edition. V8 Peregrine User Manual. for Microsoft Windows

Server Edition. V8 Peregrine User Manual. for Microsoft Windows Server Edition V8 Peregrine User Manual for Microsoft Windows Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft

More information

SONAS Best Practices and options for CIFS Scalability

SONAS Best Practices and options for CIFS Scalability COMMON INTERNET FILE SYSTEM (CIFS) FILE SERVING...2 MAXIMUM NUMBER OF ACTIVE CONCURRENT CIFS CONNECTIONS...2 SONAS SYSTEM CONFIGURATION...4 SONAS Best Practices and options for CIFS Scalability A guide

More information

The Google File System

The Google File System October 13, 2010 Based on: S. Ghemawat, H. Gobioff, and S.-T. Leung: The Google file system, in Proceedings ACM SOSP 2003, Lake George, NY, USA, October 2003. 1 Assumptions Interface Architecture Single

More information

NetApp Element Software Remote Replication

NetApp Element Software Remote Replication Technical Report NetApp Element Software Remote Replication Feature Description and Deployment Guide Pavani Krishna Goutham Baru, NetApp January 2019 TR-4741 Abstract This document describes different

More information

Chapter 10: Mass-Storage Systems. Operating System Concepts 9 th Edition

Chapter 10: Mass-Storage Systems. Operating System Concepts 9 th Edition Chapter 10: Mass-Storage Systems Silberschatz, Galvin and Gagne 2013 Chapter 10: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space

More information

ETERNUS SF AdvancedCopy Manager V13.2 Operator's Guide (HP-UX)

ETERNUS SF AdvancedCopy Manager V13.2 Operator's Guide (HP-UX) J2SZ-0180-03ENZ0(A) ETERNUS SF AdvancedCopy Manager V13.2 Operator's Guide (HP-UX) ii Preface ++ Purpose This manual explains how to operate the Web-GUI with ETERNUS SF AdvancedCopy Manager. ++ Reader

More information

That is achieved by having a CM Expander in each CM and by providing an internal cross connection between the CMs and their CM Expanders. Should one C

That is achieved by having a CM Expander in each CM and by providing an internal cross connection between the CMs and their CM Expanders. Should one C 0 The ETERNUS DX is a seamless product family, providing data center class features from Entry to Enterprise models. This ETERNUS DX Web Based Training module provides a technical introduction to the features

More information

Synology High Availability (SHA)

Synology High Availability (SHA) Synology High Availability (SHA) Based on DSM 5.1 Synology Inc. Synology_SHAWP_ 20141106 Table of Contents Chapter 1: Introduction... 3 Chapter 2: High-Availability Clustering... 4 2.1 Synology High-Availability

More information

ETERNUS SF AdvancedCopy Manager GUI User's Guide

ETERNUS SF AdvancedCopy Manager GUI User's Guide ETERNUS SF AdvancedCopy Manager 14.0 GUI User's Guide J2X1-7450-01ENZ0(00) July 2009 Preface Purpose of the User's Guide The AdvancedCopy Manager GUI User's Guide provides detailed information relating

More information

DELL EMC UNITY: REPLICATION TECHNOLOGIES

DELL EMC UNITY: REPLICATION TECHNOLOGIES DELL EMC UNITY: REPLICATION TECHNOLOGIES A Detailed Review ABSTRACT This white paper explains the replication solutions for Dell EMC Unity systems. This paper outlines the native and non-native options

More information

The Google File System

The Google File System The Google File System Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung December 2003 ACM symposium on Operating systems principles Publisher: ACM Nov. 26, 2008 OUTLINE INTRODUCTION DESIGN OVERVIEW

More information

Introduction. Storage Failure Recovery Logging Undo Logging Redo Logging ARIES

Introduction. Storage Failure Recovery Logging Undo Logging Redo Logging ARIES Introduction Storage Failure Recovery Logging Undo Logging Redo Logging ARIES Volatile storage Main memory Cache memory Nonvolatile storage Stable storage Online (e.g. hard disk, solid state disk) Transaction

More information

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. Table of Contents Section I: The Need for Warm Standby...2 The Business Problem...2 Section II:

More information

CHAPTER 3 RECOVERY & CONCURRENCY ADVANCED DATABASE SYSTEMS. Assist. Prof. Dr. Volkan TUNALI

CHAPTER 3 RECOVERY & CONCURRENCY ADVANCED DATABASE SYSTEMS. Assist. Prof. Dr. Volkan TUNALI CHAPTER 3 RECOVERY & CONCURRENCY ADVANCED DATABASE SYSTEMS Assist. Prof. Dr. Volkan TUNALI PART 1 2 RECOVERY Topics 3 Introduction Transactions Transaction Log System Recovery Media Recovery Introduction

More information

ETERNUS SF AdvancedCopy Manager V13.2 Operator's Guide (Linux)

ETERNUS SF AdvancedCopy Manager V13.2 Operator's Guide (Linux) J2UZ-8170-03ENZ0(A) ETERNUS SF AdvancedCopy Manager V13.2 Operator's Guide (Linux) ii Preface ++ Purpose This manual describes the operations available on ETERNUS SF AdvancedCopy Manager. ++ Intended Readers

More information

Chapter 14: Recovery System

Chapter 14: Recovery System Chapter 14: Recovery System Chapter 14: Recovery System Failure Classification Storage Structure Recovery and Atomicity Log-Based Recovery Remote Backup Systems Failure Classification Transaction failure

More information

Availability Implementing High Availability with the solution-based approach Operator's guide

Availability Implementing High Availability with the solution-based approach Operator's guide System i Availability Implementing High Availability with the solution-based approach Operator's guide Version 6 Release 1 System i Availability Implementing High Availability with the solution-based

More information

Operating Systems 2010/2011

Operating Systems 2010/2011 Operating Systems 2010/2011 Input/Output Systems part 2 (ch13, ch12) Shudong Chen 1 Recap Discuss the principles of I/O hardware and its complexity Explore the structure of an operating system s I/O subsystem

More information

Cluster Configuration Design Guide (Linux/PRIMECLUSTER)

Cluster Configuration Design Guide (Linux/PRIMECLUSTER) C122-A007-04EN PRIMEQUEST 1000 Series Cluster Configuration Design Guide (Linux/PRIMECLUSTER) FUJITSU LIMITED Preface This manual describes the network and shared I/O unit information and configuration

More information

Chapter 10: Mass-Storage Systems

Chapter 10: Mass-Storage Systems Chapter 10: Mass-Storage Systems Silberschatz, Galvin and Gagne 2013 Chapter 10: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space

More information

VERITAS Volume Replicator. Successful Replication and Disaster Recovery

VERITAS Volume Replicator. Successful Replication and Disaster Recovery VERITAS Volume Replicator Successful Replication and Disaster Recovery V E R I T A S W H I T E P A P E R Table of Contents Introduction.................................................................................1

More information

ETERNUS SF AdvancedCopy Manager GUI User's Guide

ETERNUS SF AdvancedCopy Manager GUI User's Guide ETERNUS SF AdvancedCopy Manager 14.1 GUI User's Guide J2X1-7450-02ENZ0(00) January 2010 Preface Purpose of the User's Guide The AdvancedCopy Manager GUI User's Guide provides detailed information relating

More information

Datacenter replication solution with quasardb

Datacenter replication solution with quasardb Datacenter replication solution with quasardb Technical positioning paper April 2017 Release v1.3 www.quasardb.net Contact: sales@quasardb.net Quasardb A datacenter survival guide quasardb INTRODUCTION

More information

ETERNUS DX60 and DX80

ETERNUS DX60 and DX80 Highlights Low environmental impact Highly scalable & versatile connectivity User friendly management systems Outstanding reliability 1 Overview (1) are designed to meet the needs of all environments from

More information

Threads SPL/2010 SPL/20 1

Threads SPL/2010 SPL/20 1 Threads 1 Today Processes and Scheduling Threads Abstract Object Models Computation Models Java Support for Threads 2 Process vs. Program processes as the basic unit of execution managed by OS OS as any

More information

Linksys Stackable Switches

Linksys Stackable Switches TECHNICAL BULLETIN Linksys Stackable Switches How to Build Stacks and Understand Their Operation This document describes how to stack Linksys switches and covers advanced stacking information, as well

More information

A Crash Course In Wide Area Data Replication. Jacob Farmer, CTO, Cambridge Computer

A Crash Course In Wide Area Data Replication. Jacob Farmer, CTO, Cambridge Computer A Crash Course In Wide Area Data Replication Jacob Farmer, CTO, Cambridge Computer SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

EMC Celerra Replicator V2 with Silver Peak WAN Optimization

EMC Celerra Replicator V2 with Silver Peak WAN Optimization EMC Celerra Replicator V2 with Silver Peak WAN Optimization Applied Technology Abstract This white paper discusses the interoperability and performance of EMC Celerra Replicator V2 with Silver Peak s WAN

More information

FUJITSU. Service BS2000 Portfolio. ETERNUS Storage Cluster für BS2000. Barbara Stadler T.

FUJITSU. Service BS2000 Portfolio. ETERNUS Storage Cluster für BS2000. Barbara Stadler T. FUJITSU Service BS2000 Portfolio ETERNUS Storage Cluster für BS2000 Barbara Stadler Barbara.Stadler@ts.fujitsu.com T. +49 89 62060 1978 0 Copyright 2018 FUJITSU FUJITSU Service BS2000 Portfolio ETERNUS

More information

Chapter-6. SUBJECT:- Operating System TOPICS:- I/O Management. Created by : - Sanjay Patel

Chapter-6. SUBJECT:- Operating System TOPICS:- I/O Management. Created by : - Sanjay Patel Chapter-6 SUBJECT:- Operating System TOPICS:- I/O Management Created by : - Sanjay Patel Disk Scheduling Algorithm 1) First-In-First-Out (FIFO) 2) Shortest Service Time First (SSTF) 3) SCAN 4) Circular-SCAN

More information

Exam Questions HH0-300

Exam Questions HH0-300 Exam Questions HH0-300 HITACHI DATA SYSTEMS CERTIFIED EXPERT REPLICATION SOLUTIONS ARCHITECT https://www.2passeasy.com/dumps/hh0-300/ 1.You want to identify if channel extension products are currently

More information

Technologies of ETERNUS6000 and ETERNUS3000 Mission-Critical Disk Arrays

Technologies of ETERNUS6000 and ETERNUS3000 Mission-Critical Disk Arrays Technologies of ETERNUS6000 and ETERNUS3000 Mission-Critical Disk Arrays V Yoshinori Terao (Manuscript received December 12, 2005) Fujitsu has developed the ETERNUS6000 and ETERNUS3000 disk arrays for

More information

MarkLogic Server. Database Replication Guide. MarkLogic 9 May, Copyright 2017 MarkLogic Corporation. All rights reserved.

MarkLogic Server. Database Replication Guide. MarkLogic 9 May, Copyright 2017 MarkLogic Corporation. All rights reserved. Database Replication Guide 1 MarkLogic 9 May, 2017 Last Revised: 9.0-3, September, 2017 Copyright 2017 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Database Replication

More information

PERFORMANCE TUNING TECHNIQUES FOR VERITAS VOLUME REPLICATOR

PERFORMANCE TUNING TECHNIQUES FOR VERITAS VOLUME REPLICATOR PERFORMANCE TUNING TECHNIQUES FOR VERITAS VOLUME REPLICATOR Tim Coulter and Sheri Atwood November 13, 2003 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS Introduction... 3 Overview of VERITAS Volume Replicator...

More information

Chapter 3 - Top Level View of Computer Function

Chapter 3 - Top Level View of Computer Function Chapter 3 - Top Level View of Computer Function Luis Tarrataca luis.tarrataca@gmail.com CEFET-RJ L. Tarrataca Chapter 3 - Top Level View 1 / 127 Table of Contents I 1 Introduction 2 Computer Components

More information

I/O CANNOT BE IGNORED

I/O CANNOT BE IGNORED LECTURE 13 I/O I/O CANNOT BE IGNORED Assume a program requires 100 seconds, 90 seconds for main memory, 10 seconds for I/O. Assume main memory access improves by ~10% per year and I/O remains the same.

More information

IBM GDPS V3.3: Improving disaster recovery capabilities to help ensure a highly available, resilient business environment

IBM GDPS V3.3: Improving disaster recovery capabilities to help ensure a highly available, resilient business environment Marketing Announcement February 14, 2006 IBM GDPS V3.3: Improving disaster recovery capabilities to help ensure a highly available, resilient business environment Overview GDPS is IBM s premier continuous

More information

Coordinated IMS and DB2 Disaster Recovery Session Number #10806

Coordinated IMS and DB2 Disaster Recovery Session Number #10806 Coordinated IMS and DB2 Disaster Recovery Session Number #10806 GLENN GALLER Certified S/W IT Specialist IBM Advanced Technical Skills Ann Arbor, Michigan gallerg@us.ibm.com IBM Disaster Recovery Solutions

More information

Protecting Mission-Critical Workloads with VMware Fault Tolerance W H I T E P A P E R

Protecting Mission-Critical Workloads with VMware Fault Tolerance W H I T E P A P E R Protecting Mission-Critical Workloads with VMware Fault Tolerance W H I T E P A P E R Table of Contents Fault Tolerance and Virtualization... 3 Fault Tolerance in the Physical World... 3 VMware Fault Tolerance...

More information

Database Technology. Topic 11: Database Recovery

Database Technology. Topic 11: Database Recovery Topic 11: Database Recovery Olaf Hartig olaf.hartig@liu.se Types of Failures Database may become unavailable for use due to: Transaction failures e.g., incorrect input, deadlock, incorrect synchronization

More information

Enterprise Server Edition

Enterprise Server Edition Enterprise Server Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Redstor Limited, 2017. All rights reserved. Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft

More information

Storage Area Network (SAN)

Storage Area Network (SAN) Storage Area Network (SAN) 1 Outline Shared Storage Architecture Direct Access Storage (DAS) SCSI RAID Network Attached Storage (NAS) Storage Area Network (SAN) Fiber Channel and Fiber Channel Switch 2

More information

Process- Concept &Process Scheduling OPERATING SYSTEMS

Process- Concept &Process Scheduling OPERATING SYSTEMS OPERATING SYSTEMS Prescribed Text Book Operating System Principles, Seventh Edition By Abraham Silberschatz, Peter Baer Galvin and Greg Gagne PROCESS MANAGEMENT Current day computer systems allow multiple

More information

In the basic configuration, MaxDB writes all data changes to the log area. The log area consists of 1 to 32 log volumes.

In the basic configuration, MaxDB writes all data changes to the log area. The log area consists of 1 to 32 log volumes. 1 2 In the basic configuration, MaxDB writes all data changes to the log area. The log area consists of 1 to 32 log volumes. The log area is overwritten in cycles. Before it can be overwritten, an area

More information

Drive Sparing in EMC Symmetrix DMX-3 and DMX-4 Systems

Drive Sparing in EMC Symmetrix DMX-3 and DMX-4 Systems Applied Technology Abstract Drive sparing significantly increases data protection and availability. EMC Symmetrix systems support dynamic and permanent sparing. This white paper explains the benefits of

More information