4-1 Backup Solution Introduction
4-1 Backup Solution Introduction
Foreword
This course introduces storage backup solutions for data centers, including:
Overview
Architecture
Network
Common technologies
Typical applications
2 Huawei Confidential
Objectives
After completing this course, you will be able to understand and master:
Technologies of storage backup solutions for data centers
3 Huawei Confidential
Contents
1. Overview
2. Architecture
3. Network
4. Common Technologies
5. Applications
4 Huawei Confidential
Why Is Backup Important?
Legal requirements on data protection Risks of data loss
Software Viruses
Human and and Natural
errors hardware hacker disasters
failures attacks
Gartner: More than 30% of users use backup copies for development and testing,
and more than 20% of users adopt cloud-based disaster recovery.
5 Huawei Confidential
What Is Backup?
In information technology and data management, a backup refers to a copy of data in
a file system or database for swiftly and promptly recovering the valid data and normal
operation of the system when a disaster or misoperation occurs.
Application server
6 Huawei Confidential
Why Is Backup Irreplaceable?
: Supported
×: Not supported
7 Huawei Confidential
Backup and DR
Backup vs. DR
Backup: DR:
Recovers missing data. Recovers data from a recent
Recovers damaged data. point in time.
: Supported
Recovers historical data. Directly takes over services.
X Recovers missing data.
×: Not supported
X Directly takes over services.
X Recovers damaged data.
8 Huawei Confidential
Backup and Archive
Backup: Archive:
Recovers data and system. Retains data for a long term.
Meets the SLA (RPO and RTO). Meets legal requirements and
Retains source data at the efficiency requirements. : Supported
original location. Only retains data copies and ×: Not supported
Provides data retention control. deletes source data.
Provides object retention control.
9 Huawei Confidential
Considerations
Effective data recovery must be guaranteed. Requirements
Objective: data recovery Backup success rate
Off-site protection
2. Availability of recovered data
3. Fast recovery
Backup mode
Backup granularity
5. Recovery from a specified point in time
Data retention period
10 Huawei Confidential
Challenges to Data Backup
A complex application
Challenges
Security threats
11 Huawei Confidential
Contents
1. Overview
2. Architecture
3. Network
4. Common Technologies
5. Applications
12 Huawei Confidential
Components
...
Application server Backup management system
Backup media
Production
storage
A client agent of backup software Backup data flows from the backup client to Devices that store backup data.
must be installed on service hosts the backup server over the backup network. Tape library, VTL, disk array, CD-ROM
that need to be backed up. TCP or IP network or Fibre Channel network tower, and cloud storage
13 Huawei Confidential
Three Key Elements
Backup Window (BW)
Backup period for the backup system within a working period
A backup task A backup Data can be A fault or A recovery task starts. A recovery task ends. Recover
starts. task ends. recovered from disaster occurs. applications.
any point in time
during this period.
14 Huawei Confidential
Backup Solutions
All-in-one backup
Hybrid cloud backup
Enterprise branch and SMB local backup
HUAWEI CLOUD
Backup node
Replication with
deduplication
Backup node
15 Huawei Confidential
All-In-One Backup Solution
Item Description
16 Huawei Confidential
Centralized Backup Solution
Center
Backup
management
node (Backup software)
...
A A A A
IP network
Production server Backup service
Fibre Channel node
or IP
17 Huawei Confidential
Cloud Backup Solution
18 Huawei Confidential
Contents
1. Overview
2. Architecture
3. Network
4. Common Technologies
5. Applications
19 Huawei Confidential
LAN-Base
LAN
Agent Agent
20 Huawei Confidential
LAN-Free
LAN
SAN
21 Huawei Confidential
Server-Free
LAN
SAN
Backup storage device
Data flow
Storage device Storage device
Command flow
22 Huawei Confidential
Server-Less (NDMP)
LAN
Tapes
Storage device
Data flow
Command flow
23 Huawei Confidential
Architecture Comparison
Architecture Strength Weakness
Additional backup servers increase hardware costs.
Backup agents adversely affect the performance of application servers.
The backup system and the application
Backup data is transmitted over the LAN, which adversely affects network
system are separated, conserving
LAN-Base hardware resources of application
performance.
Backup services must be separately maintained, complicating management and
servers during backup.
maintenance operations.
Users must be quite competent in processing services.
24 Huawei Confidential
Contents
1. Overview
2. Architecture
3. Network
4. Common Technologies
5. Applications
25 Huawei Confidential
Common Backup Types
Full backup Cumulative incremental backup Differential incremental backup
Sun. Sun. Sun.
All data is fully backed up. Full backup is performed once Full backup is performed once
Easy management a week. a week.
In the rest of the week, the In the rest of the week, the
difference with the last full difference with the last backup
backup is backed up every day. is backed up every day.
* The definitions of incremental backup may vary with the backup software.
26 Huawei Confidential
Backup Policies
Files, operating systems, databases,
Data to be backed up software, logs...
27 Huawei Confidential
Deduplication
3. Maps data blocks to the fingerprint library.
1. Reads fingerprint data.
Fingerprint pool
Memory-level File-level Global Task-level
Production server
Task-level deduplication: Backup tasks for different types of File-level deduplication: One fingerprint is created for each file,
applications use independent fingerprint databases. eliminating the need for data slicing.
Highlights: high fingerprint query efficiency and low memory usage Highlights: higher deduplication ratio
28 Huawei Confidential
Source-Side Deduplication
Huawei Data Protection Appliance supports deduplication. That is, data is deduplicated
before being transferred to the storage media, greatly improving backup performance.
1. Calculates the
fingerprints of data blocks.
2. Queries fingerprints in
the fingerprint library.
Deduplication
fingerprint library
3. Transfers data blocks
without deduplication.
Data
Protection
Appliance
Backup storage pool
29 Huawei Confidential
Parallel Deduplication
Parallel deduplication:
30 Huawei Confidential
Snapshot Backup
Production LUN/volume
Recovers copies.
Storage array
Mount/Index
Retains copies.
31 Huawei Confidential
Standard Backup
File systems
Windows, Linux, and UNIX Permanent
NeoKylin, Kylin, and Huawei Euler incremental Huawei Data Disk
backup
Protection Appliance
Volumes Parallel
deduplication Tape
Windows and Linux
Source-side
Databases deduplication
Operating systems Oracle: RMAN (Recovery Compression Cloud
Windows, Red Hat, and SUSE Manager)
Encryption
SQL Server: Virtual Device
Interface (VDI) Multi-channel
backup
Virtualization platforms DB2: Vendor
Blu-ray optical disc
MySQL: MySQL Plugin Agent-free
VMware, H3C CAS, XenServer, backup
GBase: GBase API
Hyper-V,
Informix, Dameng, Concurrent
FusionCompute, and Huawei Object storage
Kingbase, and Shentong: backup
HCS
export and import
32 Huawei Confidential
Continuous Backup
Continuous backup:
33 Huawei Confidential
Advanced Backup
Oracle Snapshot
Fast recovery
copy 1 Copy 1
Development and
Oracle RAC Snapshot
copy 1 Copy 2 testing
Data mount
Snapshot and recovery Application data
SQL Server copy 1 Copy 3 extraction
in minutes
Snapshot
Snapshot ...
VMware Permanent Base volume copy 1
incremental Copy n Recovery to the
Snapshot
backup
Windows NTFS file system copy 1 same host
Clone volume
Recovery
Recovery to
another host
The system periodically creates a snapshot
Users can access and use
copy of any point in time for the base
Users can obtain application- virtual copies on demand or
volume and deletes a snapshot when a copy
consistent production data copies instantly and benefit from
expires.
in native format. diverse data services.
35 Huawei Confidential
Contents
1. Overview
2. Architecture
3. Network
4. Common Technologies
5. Applications
36 Huawei Confidential
Database
Databases, such as GaussDB, Oracle, SQL Server, MySQL, DB2, and GBase, are supported.
* The preceding figure uses the Oracle database as an example.
37 Huawei Confidential
Virtualization Platform
Virtualization platforms, such as VMware, FusionCompute, HCS, CAS, OpenStack, XenServer and Hyper-V, are
supported.
38 Huawei Confidential
File System
39 Huawei Confidential
Operating System
Windows
Linux
40 Huawei Confidential