HP StorageWorks 6000 HP StorageWorks VLS and D2D Solutions Guide (AG306-96028, - Page 162

How Replication Fits into the Deduplication Architecture

Page 162 highlights

Figure 70 How Replication Fits into the Deduplication Architecture . 1. As the backup takes place, a metadata database is created. 2. Using the metadata compiled in step 1, the deduplication software running on the VLS nodes identifies which backups to compare against which similar backups in order to remove duplicate data. 3. Once the backup job is finished and the tape (which does not need to be full) is unloaded, the system compares the current backup with previous backups identified in step 2. Identifying the differences typically takes about the same length of time as the backup. 4. Once the differences are identified, the backup on the source begins to replicate. The deltas (changes) are sent across the TCP/IP replication link. The space reclamation of the previous backup tape on the source device (not the tape currently replicating) runs in parallel with the replication. 5. Once the backup has successfully replicated, the backup is reassembled using the transferred deltas and the older existing duplicate components on the target device. 6. Space reclamation of the previous backups (not the tape just replicated) on the target device begins. The target runs its own space reclamation to eliminate the duplicate data on the older backups on the target. 162 Virtual Library Systems

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

Figure 70 How Replication Fits into the Deduplication Architecture
.
1.
As the backup takes place, a metadata database is created.
2.
Using the metadata compiled in step 1, the deduplication software running on the VLS nodes
identifies which backups to compare against which similar backups in order to remove duplicate
data.
3.
Once the backup job is finished and the tape (which does not need to be full) is unloaded, the
system compares the current backup with previous backups identified in step 2. Identifying the
differences typically takes about the same length of time as the backup.
4.
Once the differences are identified, the backup on the source begins to replicate. The deltas
(changes) are sent across the TCP/IP replication link. The space reclamation of the previous
backup tape on the source device (not the tape currently replicating) runs in parallel with the
replication.
5.
Once the backup has successfully replicated, the backup is reassembled using the transferred
deltas and the older existing duplicate components on the target device.
6.
Space reclamation of the previous backups (not the tape just replicated) on the target device
begins. The target runs its own space reclamation to eliminate the duplicate data on the older
backups on the target.
Virtual Library Systems
162