LAN-free Backups
.....................................................................................................................
37
Retention Planning
....................................................................................................................
37
Future Data Growth
...................................................................................................................
38
Considerations for Copies
..........................................................................................................
38
Copy to Physical Tape through the Backup Application
............................................................
39
Media Server Considerations
........................................................................................
40
Benefits of Copying to Physical Tape through the Backup Application
.................................
40
Considerations for Copying to Physical Tape through the Backup Application
......................
41
Copy to Tape using VLS Automigration
..................................................................................
41
Benefits of Echo Copy
..................................................................................................
42
Considerations of Echo Copy
........................................................................................
42
Copy to Tape using D2D Tape Offload
.................................................................................
43
Copy to Remote Disk Backup Device using Replication
............................................................
43
Benefits of Replication
..................................................................................................
44
Considerations of Replication
........................................................................................
44
Creating Archive Tapes from the Replication Target
.................................................................
44
Considerations for Restores
........................................................................................................
44
Restoring from Disk Backup Device
.......................................................................................
45
Restoring from Backup Application-created Tape Copy
............................................................
45
Restoring from the Replication Target
.....................................................................................
45
Performance Bottleneck Identification
...........................................................................................
45
Backup SAN Design Guidelines
..................................................................................................
46
General SAN Design Considerations
....................................................................................
46
SAN Zoning
......................................................................................................................
46
Operating System Tape Configuration
...................................................................................
47
LUN Masking and Mapping
................................................................................................
49
Backup Application Basic Guidelines
..........................................................................................
50
HP Data Protector Application Overview
...............................................................................
51
Symantec NetBackup Application Overview
..........................................................................
51
IBM TSM Application Overview
...........................................................................................
52
EMC NetWorker Application Overview
.................................................................................
53
4 D2D Systems
...................................................................................
55
D2D Devices
............................................................................................................................
55
D2D Defined
.....................................................................................................................
55
D2D Technical Specifications
.........................................................................................
56
D2D Design Considerations
.................................................................................................
56
D2D Port Optimization
.................................................................................................
56
Multiple Backup Streams
...............................................................................................
57
Disable Backup Application Verify Pass
..........................................................................
58
Tape Copy or Offload Performance
................................................................................
58
Tape Library Emulation
.................................................................................................
59
Optimizing Rotation Scheme to Reduce Housekeeping
......................................................
59
D2D Blueprints
...................................................................................................................
60
Single Site Cost Effective Backup Device Consolidation
.....................................................
60
Large SME Site Consolidation Requiring Fibre Channel Shared Devices
..............................
61
Multi-site Small Business Disaster Recovery Solution
..........................................................
63
Introduction to VMWare Terminology
.............................................................................
65
Using D2D in Simple VMWare Environments with ESXi
.....................................................
66
Using D2D in VMWare Environments with ESX4 and VMWare Consolidated Backup
...........
66
Using D2D in larger VMWare environments with HP Data Protector Zero Downtime Backup
with Instant Recovery (ZDB + IR)
....................................................................................
67
D2D Dynamic Deduplication
......................................................................................................
69
How it Works
....................................................................................................................
69
4