12.07.2015 Views

Strategies for Data Protection - Brocade

Strategies for Data Protection - Brocade

Strategies for Data Protection - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IntroductionTable 1. Block-based data protection mechanismsType of <strong>Data</strong><strong>Protection</strong><strong>Protection</strong>AgainstRecovery TimeObjectiveRecovery PointObjectiveRAIDMirroringTrue CDPNear CDP/SnapshotSynchronousReplicationAsynchronousReplicationDisk to DiskTape EmulationLocal TapeBackupDisk drivefailureLink, disk orarray failure<strong>Data</strong>corruption<strong>Data</strong>corruptionSystem/sitefailureSystem/sitefailureInstantaneousInstantaneousSeconds –minutesSeconds –minutesSeconds –minutesSeconds –minutesNo data lossNo data lossNo data lossSome data lossNo data lossSome data lossArray failure Minutes Some data loss *Array failure Minutes – hours Some data loss**.Since last backupIn addition, different layers of data protection may satisfy very differentRTOs and RPOs. The recovery time objective (RTO) defines how quicklyaccess to data can be restored in the event of a device, system or sitefailure. The recovery point objective (RPO) defines the point in time inwhich the last valid data transaction was captured there<strong>for</strong>e measuringthe level of data protection from loss. The chronic complaintagainst tape backup, <strong>for</strong> example, is that data transactions that occurafter the backup was per<strong>for</strong>med are not secured, and restoration fromtape may take hours or days. Despite its poor RTO and RPO, the enduringstrength of tape is that it provides long-term storage of data oneconomical, non-spinning media and is not subject to head crashes ordrive failures.The scope of data protection also differentiates between recovery fromdata loss and recovery from data corruption. Although RAID protectsagainst data loss due to disk failure, it offers no defense against datacorruption of inbound streams. A virus attack, <strong>for</strong> example, may corruptdata as it is written to disk, in which case RAID will simply secure<strong>Strategies</strong> <strong>for</strong> <strong>Data</strong> <strong>Protection</strong>iii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!