0% found this document useful (0 votes)
18 views39 pages

4-1 Backup Solution Introduction

Uploaded by

salma ben hssin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views39 pages

4-1 Backup Solution Introduction

Uploaded by

salma ben hssin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

Backup Solution Introduction

Foreword

This course introduces storage backup solutions for data centers, including:
Overview

Architecture

Network

Common technologies

Typical applications

2 Huawei Confidential
Objectives

After completing this course, you will be able to understand and master:
Technologies of storage backup solutions for data centers

Technical differences between backup and disaster recovery solutions

Deployment of a backup solution

3 Huawei Confidential
Contents

1. Overview

2. Architecture

3. Network

4. Common Technologies

5. Applications

4 Huawei Confidential
Why Is Backup Important?
Legal requirements on data protection Risks of data loss

Software Viruses
Human and and Natural
errors hardware hacker disasters
failures attacks

Higher efficiency Lower costs Better data


utilization

Gartner: More than 30% of users use backup copies for development and testing,
and more than 20% of users adopt cloud-based disaster recovery.

5 Huawei Confidential
What Is Backup?
In information technology and data management, a backup refers to a copy of data in
a file system or database for swiftly and promptly recovering the valid data and normal
operation of the system when a disaster or misoperation occurs.
Application server

Nature: Stores a copy of data elsewhere.

Purpose: Recovers data when an accident occurs. LAN

Management Media server


server

Backup storage device

6 Huawei Confidential
Why Is Backup Irreplaceable?

Two servers ≠ Backup System script X ≠ Backup


≠ Backup
Availability Security × Heterogeneous networks A cluster ≠ Backup

× Fault tolerance A RAID array ≠ Backup


High system Accidental
× Openness A dual-controller disk array ≠
availability deletion
× Complex backup policies Backup
Physical fault Logical
tolerance damage × Large databases System script ≠ Backup

× × Special devices, such as


tape libraries

: Supported
×: Not supported

7 Huawei Confidential
Backup and DR

Backup vs. DR

Backup: DR:
Recovers missing data. Recovers data from a recent
Recovers damaged data. point in time.
: Supported
Recovers historical data. Directly takes over services.
X Recovers missing data.
×: Not supported
X Directly takes over services.
X Recovers damaged data.

Backup focuses on data recoverability, while DR is focused on application continuity.


Backup is the basis of DR.

8 Huawei Confidential
Backup and Archive

Backup vs. Archive

Backup: Archive:
Recovers data and system. Retains data for a long term.
Meets the SLA (RPO and RTO). Meets legal requirements and
Retains source data at the efficiency requirements. : Supported
original location. Only retains data copies and ×: Not supported
Provides data retention control. deletes source data.
Provides object retention control.

Backup is for data recovery and archiving is for legal compliance.

9 Huawei Confidential
Considerations
Effective data recovery must be guaranteed. Requirements
Objective: data recovery Backup success rate

1. Reliable recovery Multiple data copies

Off-site protection
2. Availability of recovered data

Compatibility for applications

3. Fast recovery
Backup mode

4. Minimal system impact Backup data identification

Backup granularity
5. Recovery from a specified point in time
Data retention period

10 Huawei Confidential
Challenges to Data Backup

A complex application
Challenges

Numerous data copies

Security threats

11 Huawei Confidential
Contents

1. Overview

2. Architecture

3. Network

4. Common Technologies

5. Applications

12 Huawei Confidential
Components

Production center Backup center


LAN

...
Application server Backup management system

Consists of backup management software


Application
server Database server File server Media Backup and backup management servers.
server management Automatically initiates and performs a
SAN server
backup task, and reads and writes data
from the backup client to the backup media.

Backup media
Production
storage

Backup client Backup network Backup media

A client agent of backup software Backup data flows from the backup client to Devices that store backup data.
must be installed on service hosts the backup server over the backup network. Tape library, VTL, disk array, CD-ROM
that need to be backed up. TCP or IP network or Fibre Channel network tower, and cloud storage

13 Huawei Confidential
Three Key Elements
Backup Window (BW)
Backup period for the backup system within a working period

Recovery Point Objective (RPO) Recovery Time Objective (RTO)


Tolerable amount of lost data Tolerable downtime

A backup task A backup Data can be A fault or A recovery task starts. A recovery task ends. Recover
starts. task ends. recovered from disaster occurs. applications.
any point in time
during this period.

BW 00:00 RPO 06:00 RTO 12:00

14 Huawei Confidential
Backup Solutions
All-in-one backup
Hybrid cloud backup
Enterprise branch and SMB local backup
HUAWEI CLOUD

All-in-one backup node


Centralized backup

Centralized backup for data centers Remote backup center

Backup node

Replication with
deduplication
Backup node

Backup storage Huawei OceanStor


resource pool backup storage Physical and
resource pool virtual tape library

15 Huawei Confidential
All-In-One Backup Solution
Item Description

Application Local backup for small data centers

Production Integrated backup server and backup storage,


server ...
A greatly reducing device acquisition and maintenance
A
costs
Data Protection
Fibre Broad compatibility for various operating systems,
Appliance
Channel or IP
databases, and virtualization environments
Benefits Comprehensive protection for virtual, physical, and
Production
storage cloud environments. P2P, P2V, V2V, and V2P

A Backup agent migration scenarios


Deduplication and compression
Web UI for easy management, operation, and
maintenance

16 Huawei Confidential
Centralized Backup Solution
Center

Backup
management
node (Backup software)
...
A A A A
IP network
Production server Backup service
Fibre Channel node
or IP

Production (Backup software) (Backup software)


Backup
storage
storage
Branch Branch
A

Backup Production ...


A Backup agent Production A ... A A A
service server
server
node
Fibre Channel Fibre Channel All-in-one
or IP backup
or IP
node

Production Backup storage Production storage


storage

17 Huawei Confidential
Cloud Backup Solution

Backup service management Management flow


platform
ManageOne SC
Data flow
Data protection service
platform
DJ-DPS HUAWEI CLOUD

Cloud platform BC&DR management


FusionSphere OpenStack software Cloud DC 2
Highlights
Huawei's unique two-level cloud backup solution can store backup
data in the local data center, in the backup resource pool of the
cloud data center, or in the S3 space of the public cloud.
Huawei VBS can back up data to the backup resource pool of the
Production storage Backup storage remote cloud data center and or in the S3 space of the public cloud,
which can be used to build the two-level e-Government cloud.
DC 1

18 Huawei Confidential
Contents

1. Overview

2. Architecture

3. Network

4. Common Technologies

5. Applications

19 Huawei Confidential
LAN-Base

LAN

Data flow Data flow

Agent Agent

File service Application service

Backup storage device


Data flow
Command flow

20 Huawei Confidential
LAN-Free
LAN

Application server Application server Backup server


Media server

SAN

Backup storage device

Storage device Storage device Data flow


Command flow

21 Huawei Confidential
Server-Free
LAN

Application server Backup server


Application server
Media server

SAN
Backup storage device

Data flow
Storage device Storage device
Command flow

22 Huawei Confidential
Server-Less (NDMP)
LAN

Application server Backup server


Application server
Media server

Tapes
Storage device
Data flow
Command flow

23 Huawei Confidential
Architecture Comparison
Architecture Strength Weakness
Additional backup servers increase hardware costs.
Backup agents adversely affect the performance of application servers.
The backup system and the application
Backup data is transmitted over the LAN, which adversely affects network
system are separated, conserving
LAN-Base hardware resources of application
performance.
Backup services must be separately maintained, complicating management and
servers during backup.
maintenance operations.
Users must be quite competent in processing services.

Backup data is transmitted using no


Backup agents adversely affect the performance of application servers.
LAN resources, significantly improving
LAN-Free backup performance while maintaining
The costs are high.
Devices must meet certain requirements.
high network performance.
Backup data is transmitted using no
LAN resources, and network
The costs are high.
Server-Free performance remains unaffected.
Devices must meet strict requirements.
Host services remain nearly unaffected.
Backup performance is excellent.

Backup and recovery duration is


shortened. The throughput depends on
Workloads on the server are greatly relieved, but the backup software and its host
the speed of storage devices rather than
NDMP the processing capability of the server.
server are still required for backup process control. Metadata must be recorded in the
database of the backup software, which still consumes CPU resources.
Therefore, the system performance is
greatly improved.

24 Huawei Confidential
Contents

1. Overview

2. Architecture

3. Network

4. Common Technologies

5. Applications

25 Huawei Confidential
Common Backup Types
Full backup Cumulative incremental backup Differential incremental backup
Sun. Sun. Sun.

Mon. Mon. Mon.

Tue. Tue. Tue.

Wed. Wed. Wed.

Thu. Thu. Thu.

Fri. Fri. Fri.

Sat. Sat. Sat.

Sun. Sun. Sun.

All data is fully backed up. Full backup is performed once Full backup is performed once
Easy management a week. a week.
In the rest of the week, the In the rest of the week, the
difference with the last full difference with the last backup
backup is backed up every day. is backed up every day.

* The definitions of incremental backup may vary with the backup software.

26 Huawei Confidential
Backup Policies
Files, operating systems, databases,
Data to be backed up software, logs...

Backup media Disk, tape, cloud storage...

Full backup, incremental backup, and


Backup type differential backup

Source-side deduplication and target-side


Deduplication policy deduplication

Data retention period One month or one year

Backup frequency Daily or weekly

Backup window One week or one month

27 Huawei Confidential
Deduplication
3. Maps data blocks to the fingerprint library.
1. Reads fingerprint data.

Storage unit Processing unit

Fingerprint pool
Memory-level File-level Global Task-level
Production server

Centralized backup solution


2. Transfers data with deduplication (data blocks with deduplication).
Memory-level deduplication: Fingerprint query and calculation are
Global deduplication: A fingerprint library is shared globally.
performed in the memory.
Highlights: high deduplication ratio for optimal resource utilization
Highlights: conserved disk I/O resources for higher query efficiency

Task-level deduplication: Backup tasks for different types of File-level deduplication: One fingerprint is created for each file,
applications use independent fingerprint databases. eliminating the need for data slicing.
Highlights: high fingerprint query efficiency and low memory usage Highlights: higher deduplication ratio

Fingerprint: It is a unique value calculated based on a data block by hashing.

28 Huawei Confidential
Source-Side Deduplication
Huawei Data Protection Appliance supports deduplication. That is, data is deduplicated
before being transferred to the storage media, greatly improving backup performance.

1. Calculates the
fingerprints of data blocks.
2. Queries fingerprints in
the fingerprint library.

3. Returns the query result.

Deduplication
fingerprint library
3. Transfers data blocks
without deduplication.
Data
Protection
Appliance
Backup storage pool

29 Huawei Confidential
Parallel Deduplication

Parallel deduplication:

Deduplication fingerprint libraries are


created on multiple nodes and
fingerprints are distributed on these
nodes, effectively addressing poor
performance of a single node and
saving storage space.

30 Huawei Confidential
Snapshot Backup
Production LUN/volume

Recovers copies.

Snapshot is performed every


two hours.

Storage array

Mount/Index
Retains copies.

Agent (media agent)


Disk Tape

31 Huawei Confidential
Standard Backup
File systems
Windows, Linux, and UNIX Permanent
NeoKylin, Kylin, and Huawei Euler incremental Huawei Data Disk
backup
Protection Appliance
Volumes Parallel
deduplication Tape
Windows and Linux
Source-side
Databases deduplication
Operating systems Oracle: RMAN (Recovery Compression Cloud
Windows, Red Hat, and SUSE Manager)
Encryption
SQL Server: Virtual Device
Interface (VDI) Multi-channel
backup
Virtualization platforms DB2: Vendor
Blu-ray optical disc
MySQL: MySQL Plugin Agent-free
VMware, H3C CAS, XenServer, backup
GBase: GBase API
Hyper-V,
Informix, Dameng, Concurrent
FusionCompute, and Huawei Object storage
Kingbase, and Shentong: backup
HCS
export and import

Production data capture Copy management D2D2R or D2C

32 Huawei Confidential
Continuous Backup

Continuous backup:

Data on production hosts is


continuously backed up to the
backup media.

With block-level continuous data


protection, data can be stored in
native format and host-level backup
and volume-level backup are
supported.

33 Huawei Confidential
Advanced Backup
Oracle Snapshot
Fast recovery
copy 1 Copy 1

Development and
Oracle RAC Snapshot
copy 1 Copy 2 testing
Data mount
Snapshot and recovery Application data
SQL Server copy 1 Copy 3 extraction
in minutes
Snapshot
Snapshot ...
VMware Permanent Base volume copy 1
incremental Copy n Recovery to the
Snapshot
backup
Windows NTFS file system copy 1 same host
Clone volume
Recovery
Recovery to
another host
The system periodically creates a snapshot
Users can access and use
copy of any point in time for the base
Users can obtain application- virtual copies on demand or
volume and deletes a snapshot when a copy
consistent production data copies instantly and benefit from
expires.
in native format. diverse data services.

Production data capture Copy management Copy access and use

35 Huawei Confidential
Contents

1. Overview

2. Architecture

3. Network

4. Common Technologies

5. Applications

36 Huawei Confidential
Database

Databases, such as GaussDB, Oracle, SQL Server, MySQL, DB2, and GBase, are supported.
* The preceding figure uses the Oracle database as an example.

37 Huawei Confidential
Virtualization Platform

Virtualization platforms, such as VMware, FusionCompute, HCS, CAS, OpenStack, XenServer and Hyper-V, are
supported.

38 Huawei Confidential
File System

39 Huawei Confidential
Operating System
Windows

Linux

One of the defining features of Linux operating systems is that


everything is a file. Therefore, for backup of a Linux operating
system, we just need to back up the files in the operating system
and then modify configuration file and boot upon recovery.

40 Huawei Confidential

You might also like