ibm remote data protection and ibm remote data express part 1 ips – information protection...

34
IBM Remote Data Protection and IBM Remote Data Express PART 1 IPS – Information Protection Services October 2008 © Copyright International Business Machines Corporation 2008. All rights reserved. IIBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml Microsoft and SQL Server are trademarks of Microsoft Corporation in the United

Upload: gabriel-waters

Post on 29-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

IBM Remote Data Protection andIBM Remote Data Express

PART 1

IPS – Information Protection Services

October 2008

© Copyright International Business Machines Corporation 2008. All rights reserved.

IIBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtmlMicrosoft and SQL Server are trademarks of Microsoft Corporation in the United States, other countries, or both.

Other company, product and service names may be trademarks or service marks of others.

2© Copyright IBM Corporation 2008IBM Remote Data Protection

Topic

*Introduction Remote Data Protection Architecture Overview Key Points Initialization versus Steady State

*Indicates current topic.

3© Copyright IBM Corporation 2008IBM Remote Data Protection

Objectives

The result of this presentation for you: An understanding of the technology, features,

and functions for Remote Data Protection.

With this knowledge, you will be able to successfully construct a solution and articulate the value of Remote Data Protection for your customers.

4© Copyright IBM Corporation 2008IBM Remote Data Protection

Topic

*Indicates current topic.

Introduction *Remote Data Protection Architecture Overview Key Points Initialization versus Steady State

5© Copyright IBM Corporation 2008IBM Remote Data Protection

Remote Data Protection

1. Remote Data Protection

2. Remote Data Protection Technology

3. How It Works

4. Target Customer

6© Copyright IBM Corporation 2008IBM Remote Data Protection

Remote Data Protection (continued)

Remote Data Protection is: An Enterprise class data protection solution targeted at distributed data

environments using disk storage as its medium for backup

It is constructed of best of breed technologies: EMC Avamar IBM servers

Enterprise Performance and Reliability

Bringing distributed data into the data center

7© Copyright IBM Corporation 2008IBM Remote Data Protection

Remote Data Protection (continued)

Comparison - Remote Data Protection Express to Remote Data Protection

Remote Data Protection Express

Remote Data Protection

Number of locations Up to 3 locations No Limit

Systems to be backed up

Up to 5 production servers No limit

Data to be backed up Up to 150 GB/site No Limit

Minimum Charge 50 GB Based on solution

Retention Points Standard Retention only

(7-0-0, 30-0-0, 8-5-4)

Standard plus option to customize

Supported OS MS Windows Ref. Support Matrix

Supported Database agents

MS Exchange MS Exchange + others

8© Copyright IBM Corporation 2008IBM Remote Data Protection

Remote Data Protection (continued)

The Remote Data Protection service provides: Automatic data protection for remote/branch offices and mobile

workforce Solutions for servers and PCs Security-enhanced, bandwidth-efficient, network-based daily backups

to a Remote Data Protection platform Comprehensive platform and database support Powerful de-duplication and compression

9© Copyright IBM Corporation 2008IBM Remote Data Protection

Remote Data Protection Technology

EMC/Avamar Backup and recovery software that utilizes data de-duplication

2-Stage Data De-Duplication It is technology that identifies redundant data at the source. Avamar’s term for their data de-duplication factoring is

“commonality.” Data is analyzed and de-duplicated at the bit level.

Enables Remote Data Protection Data is de-duplicated prior to leaving the protected host. This results in very low bandwidth utilization, with much better

efficiencies than competitors. It leads to the ability to protect more data over the existing

bandwidth. Efficiencies occur with various data types.

10© Copyright IBM Corporation 2008IBM Remote Data Protection

How It Works

11© Copyright IBM Corporation 2008IBM Remote Data Protection

Target Customer

What works well

High Value Proposition Environments where data has been

distributed across many geographically dispersed locations

What does not work well

Diminished Value Proposition Environments where data has been

consolidated into a few data centers or customer premise environments

Large highly transactional environments—large transactional databases, large, very busy e-mail servers

12© Copyright IBM Corporation 2008IBM Remote Data Protection

Topic

Introduction Remote Data Protection *Architecture Overview Key Points Initialization versus Steady State

*Indicates current topic.

13© Copyright IBM Corporation 2008IBM Remote Data Protection

Architecture Overview

1. Remote Data Protection Platforms

2. Remote Data Protection Architecture

3. Multi-Node versus Single-Node –

When to Use

14© Copyright IBM Corporation 2008IBM Remote Data Protection

Remote Data Protection Platforms

Two platforms are available with the Remote Data Protection service. The Multi-Node Platform has a number of capacity options: Remote Data Protection Single-Node Platform

– Capacity = 1.5 TB

Remote Data Protection Multi-Node Platform

– Capacity = 3, 4.5, 6, 7.5 and 9TB

15© Copyright IBM Corporation 2008IBM Remote Data Protection

Remote Data Protection Architecture

Remote Data Protection Single-Node Components

IBM Express™ x3650 Management Switch Firewall

1.5 TB Platform

16© Copyright IBM Corporation 2008IBM Remote Data Protection

Remote Data Protection Architecture (continued)

Remote Data Protection Multi-Node Components

IBM Express x3650 Management Switch Data Switch Firewall

9 TB Platform

17© Copyright IBM Corporation 2008IBM Remote Data Protection

Multi-Node versus Single-Node: When to Use

Single-Node Platform - The most cost effective and easily scalable RDP solution

The Single-Node platform is less complicated, with fewer components, and smaller scale points, which means it is more flexible and more cost-effective.

It should be used as the default unless a Multi-Node configuration is required.

Multi-Node Platform - Not as cost effective, but it can be deployed in larger single instances

This is to be used when the requirement is identified to support a single host that consumes more than one single-node system.

Traditionally, this has been for database or e-mail environments that exceed ~250 GB on one server.

18© Copyright IBM Corporation 2008IBM Remote Data Protection

Topic

Introduction Remote Data Protection Architecture Overview *Key Points Initialization versus Steady State

*Indicates current topic.

19© Copyright IBM Corporation 2008IBM Remote Data Protection

Key Points

1. Remote Data Protection Key Terms

2. Standard Service Assumptions

3. Data Types

4. Retention Schedules

5. Backup Windows

6. Remote Data Protection Billing Model

7. Backup Quotas

8. Custom Deals

20© Copyright IBM Corporation 2008IBM Remote Data Protection

Remote Data Protection Key Terms

Restore Time The amount of time identified by the client for restoration of data from the

backup platform to the client’s server

Bandwidth The amount of throughput available for transfer of data from source to

destination, either existing or new bandwidth

Data Footprint The amount of data residing on a prospect’s server that is required to be

backed up Data footprint can be the amount of data stored on a filesystem or the

amount of data held in a database or other application Data footprint is NOT the size of the hard drive or available capacity of a

storage device (SAN, NAS, and so on)

21© Copyright IBM Corporation 2008IBM Remote Data Protection

Remote Data Protection Key Terms (continued)

Retention Schedule The amount of time data will be available on disk

Backup Window The window of time during the day a backup can run

Initialization Term used for client activation and its first backup

Steady State When client initialization completes and backups run according to a

regular schedule

22© Copyright IBM Corporation 2008IBM Remote Data Protection

Standard Service Assumptions

For sizing and pricing purposes, standard pricing is based on the following:

Standard Data Mix: 85% Filesystem/15% Database This is the baseline assumption of a typical customer’s data

mix. If a customer’s total data mix is close to these values, we can quickly determine how well a customer will fit within our standard service and sizing parameters.

– Example – Customer’s aggregate footprint = 1 TB: ~ 850 GB filesystem data, ~ 150 GB database data - standard pricing can be used

– Example - Customer’s aggregate footprint = 1 TB: ~ 500 GB filesystem data, ~ 500 GB database data - standard pricing may not apply - Contact the Deal Hub.

Standard Retention Schedule There are four standard retention schedules available.

23© Copyright IBM Corporation 2008IBM Remote Data Protection

Data Types

Database DataThis term is used to classify data types that produce high rates of change:

Data should be classified as database data whether or not an agent is being used to back up the data.

Examples of applications that can produce “database” like data: Microsoft® Exchange, Oracle, SQL Server®, Sybase, DB2®, Witness (voice recording data), any scientific,

medical, or topographical images (x-rays, satellite images, and so on)

Filesystem Data This term is used to classify data types that produce relatively low change rates:

Operating system (C: drive), user file shares, static file content, and so on

Compressed Data100% rate of change every time data is created:

This will increase bandwidth requirements, backup windows, and storage needs.

24© Copyright IBM Corporation 2008IBM Remote Data Protection

Retention Schedules

7-0-0 The last 7 successful backups retained, each for 7 days

30-0-0 (Only retention option for PCs) The last 30 successful backups retained, each for 30

days

8-5-4 (mixed retention to cover broad calendar range) 8 daily backups, 5 weekly backups, and 4 monthly

backups Roughly 16 retention points spread across a 120-day

period

30-5-12 30 daily backups, 5 weekly backups, and 12 monthly

backups

25© Copyright IBM Corporation 2008IBM Remote Data Protection

Retention Schedules (continued)

When designing a solution, it is important to understand that the retention schedule and data mix will impact the solution cost.

26© Copyright IBM Corporation 2008IBM Remote Data Protection

Backup Windows

Backup Windows Standard service parameters are 20/7 backup

window (or availability) and 24/7 restore availability

During the 4-hour period when backups are not available, the platform will perform necessary maintenance activities:

– Cleaning up data from expired retention points

– Taking a backup of itself

– Performing data consistency checks on its backup

27© Copyright IBM Corporation 2008IBM Remote Data Protection

Remote Data Protection Billing Model

Data Protected Model

A customer is billed monthly based on the high-water mark of the data that is protected on a client. If a client’s high-water mark for the month of April is 10GB, that is what the customer will get billed for.

Bill = Price * xxGB “protected”

28© Copyright IBM Corporation 2008IBM Remote Data Protection

Backup Quotas

No Hard Backup Quotas

The Remote Data Protection service does not limit customers to any backup quotas.

Backups will never be disabled or prevented from running because of an applied quota.

A customer’s monthly bill will always be based upon the amount of data that is protected within a specific month, which is Usage Based Billing.

29© Copyright IBM Corporation 2008IBM Remote Data Protection

Custom Deals

Custom deals are needed when a customer’s requirements or qualifications do not fit within the standard service offering. Additional considerations for custom deals are:

– Longer cycle to design and provide a solution

– More expensive

Try to focus on the standard service offering.

30© Copyright IBM Corporation 2008IBM Remote Data Protection

Topic

Introduction Remote Data Protection Architecture Overview Key Points *Initialization versus Steady State

*Indicates current topic.

31© Copyright IBM Corporation 2008IBM Remote Data Protection

Initialization versus Steady State Backups

Initialization versus Steady State Backups

32© Copyright IBM Corporation 2008IBM Remote Data Protection

Initialization versus Steady State Backups (continued)

This is the term used for client activation and its first backup. A client’s first backup could take many hours to complete, depending

on how much data there is to back up and how much bandwidth is available.

Roughly 40% of the client’s data footprint will need to be sent during initialization.

Initialization

33© Copyright IBM Corporation 2008IBM Remote Data Protection

Initialization versus Steady State Backups (continued)

Steady State Backups

Once a client successfully completes its first backup, it will then continue on with steady state backups.

At this point, a client’s backup will run much more efficiently because of Avamar’s “commonality” factoring.

Redundant data is not sent over the WAN to be backed up again. A client’s backup will now complete in a fraction of the time it took for its

initialization. Roughly 1% of the client’s data footprint needs to be sent for filesystem data

during steady state, roughly 5% for database data.

Important For sizing purposes, backup times should be based on steady state backups. Initialization times should be documented and understood by the customer. The Quickstart/Quickrestore options can be used to address concerns and

requirements regarding initializations or restores.

34© Copyright IBM Corporation 2008IBM Remote Data Protection

Objectives Review

You should have a basic understanding of the technology, features, and functions used for Remote Data Protection.

Note: This is part one of a two part presentation