Backup Analysis
...................................................................................................
150
66
Physical versus Logical Data
...................................................................................
150
67
Backup Sessions with Duplicate and Unique Data
....................................................
152
68
VLS9000 and VLS12000 node oversubscription
.......................................................
158
69
How Replication Fits into the Deduplication Architecture
.............................................
162
70
The Replication Sequence
......................................................................................
163
71
Replication Scaling
...............................................................................................
164
72
Preparing the Network Connection for Replication in a VLS
........................................
166
73
VLS Replication by Numbers
...................................................................................
167
74
VLS Initialization using Physical Tape
.......................................................................
173
75
VLS Initialization using the WAN
............................................................................
175
76
VLS Initialization by Co-location
..............................................................................
176
77
Dividing the Backup Jobs by Priority Level
.................................................................
181
78
VLS Sizing Example 1
...........................................................................................
183
79
VLS Sizing Example 2
...........................................................................................
184
80
VLS Sizing Example 3
...........................................................................................
185
81
VLS Sizing Example 4
...........................................................................................
186
82
VLS Recovery Options for a Data Center Rebuild
.......................................................
188
83
Data Recovery from the Target VLS
..........................................................................
189
84
Creating Archive Tapes from the VLS
.......................................................................
191
85
Site-to-site Replication
............................................................................................
193
86
10