Professional Documents
Culture Documents
Security Level:
Objectives
• Describe the technologies related to the storage backup solution of the data center.
1 Huawei Confidential
Contents
2 Huawei Confidential
Contents
3 Huawei Confidential
Why Do We Need Business Continuity?
Loss per hour due to system downtime
Source: Network Computing, the Meta Group and Contingency Planning Research
Source: Ontrack 2010
Data protection requirements of
Data security risks are everywhere.
regulatory compliance
System software and
Misoperation Virus/Hacker attacks Natural disasters
hardware faults
4 Huawei Confidential
Why Do We Need Business Continuity?
Disasters that undermine the service continuity of IT systems
Device failure
High
Data damage
Statistics show that:
Application interruption
Disk failure 97% of partial faults
Yearly frequency
How to effectively address the disasters and faults that challenge service continuity — building
a disaster recovery (DR) system
5 Huawei Confidential
Why Do We Need Business Continuity?
Business Continuity Requirements
• Reliability: Information should be reliable and correct in all aspects. It is "the same" as what was stored, and there is
no alteration or corruption to the information.
• Timeliness: Defines the exact moment or the time window (a particular time of the day, week, month, and year as
specified) during which information must be accessible. For example, if online access to an application is required
between 8:00 a.m. and 10:00 p.m. each day, any disruptions to data availability outside of this time slot are not
considered to affect timeliness.
7 Huawei Confidential
Key Concept – MTBF/ MTTR
Relations Among Metrics of Extended Reliability
Failure rate λ = 1/MTBF, 1 FITs = 10-9 (1/h)
Reliability
Return repair rate F(t) = λ x t
Mean time between Annual return repair rate = λ x 8760
failures (MTBF)
Repair rate μ = 1/MTTR
Maintainability
RPO RTO
Switch
time
UPTIME (%) DOWNTIME (%) DOWNTIME PER YEAR DOWNTIME PER WEEK
IA = MTBF/(MTBF + MTTR)
98 2 7.3 days 3 hours, 22 minutes
99 1 3.65 days 1 hour, 41 minutes
99.8 0.2 17 hour, 31 minutes 20 minutes, 10 seconds
99.9 0.1 8 hour, 45 minutes 10 minutes, 5 seconds
99.99 0.01 52.5 minutes 1 minute
99.999 0.001 5.25 minutes 6 seconds
99.9999 0.0001 31.5 seconds 0.6 seconds
10 Huawei Confidential
Contents
11 Huawei Confidential
Data Protection Faces Great Challenges
12 Huawei Confidential
Basic knowledge of Backup
Definition
• A backup is an additional copy of production data, created and
retained for the sole purpose of recovering lost or corrupted data. With
growing business and regulatory demands for data storage, retention,
and availability, organizations are faced with the task of backing up an
ever-increasing amount of data.
Database
Hard disks
Operation system
Disks
Application Backup
Tapes
Document
… …
13 Huawei Confidential
Basic knowledge of Backup – Comparison
Backup vs Disaster Recovery vs Archive
Backup Disaster Recovery
Data loss can be resolved Data loss cannot be resolved Backup focuses on
Data corruption can be resolved Data corruption cannot be data recoverability,
resolved while disaster recovery
Retrieving historical data
Can be restored to the nearest focuses on business
Cannot be directly taken over.
running time continuity.
Can be directly taken over.
Backup Archive
Used to restore data due to Used to store information for a
Backup is used for
damage or loss long time.
data restoration, and
SLA compliance (RTO/RPO) Meet regulatory compliance and archiving is used for
enterprise efficiency requirements. regulatory compliance.
The original data is retained in the
original location Retain only data copies and
delete original data.
14 Huawei Confidential
Basic knowledge of Backup – Comparison
Comparison of Data Protection Methods
RAID Replication Snapshot Backup
Physical error Natural disaster Yes Yes
(47%) Hardware failure Yes Yes Yes Yes
Human error Yes Yes
Logical error
Software failure Yes Yes
(53%)
Virus Yes Yes
Recovery point seconds, minutes,
Acceptable amount of lost data No data loss hours days
objective (RPO) or hours
Recovery time
Data recovery period Real-time minutes or hours minutes hours or days
objective (RTO)
How far back can the data be Cannot be Cannot be Several hours Several weeks,
Data retention period recovered to recovered recovered or days months, or years
The objectives of data protection are to prevent physical and logical errors, meet the
RPO and RTO requirements, and meet the data retention time needs.
No single data protection algorithm can serve all these purposes. Therefore, a complete
data protection system consists of multiple algorithms.
15 Huawei Confidential
Basic knowledge of Backup – Backup Operations
When a backup operation is initiated, significant network communication takes place between the different
components of a backup infrastructure. The backup operation is typically initiated by a server, but it can
also be initiated by a client.
Application Server/ 1 Backup server initiates scheduled backup process.
Backup Clients
2 Backup server retrieves backup-related information
from backup catalog.
File
server
Database Mail
server server
3 Backup server instructs storage node to load backup
media in backup device.
Application Server/
Backup Clients
1 The backup client requests the backup server for data
restore.
File
server
Database Mail
server server
2 The backup server scans the backup catalog to identify
data to be restored and the client that will receive data.
18 Huawei Confidential
Backup Strategy – Granularity
Backup window
The period during which a source is available to perform a data backup is called a backup window. Performing a
backup from the source sometimes requires the production operation to be suspended because the data being backed
up is exclusively locked for the use of the backup process.
Full backup is a backup of the Cumulative backup copies the Incremental backup copies the
complete data on the data that has changed since the data that has changed since the
production volumes. It provides last full backup. This method last full or incremental backup. The
a faster recovery but requires takes longer than an incremental volume of data backed up is
more storage space and also backup but is faster to restore. restricted to the changed data only.
takes more time to back up.
19 Huawei Confidential
Backup Strategy – Topology: LAN-Base
20 Huawei Confidential
Backup Strategy – Topology: LAN-Free
21 Huawei Confidential
Backup Strategy – Topology: Server-Free
Disadvantages
CS AnyBackup server
MA AnyBackup media server
High investment in the network Server-Free Network
High requirements for devices IP
Fibre Channel
22 Huawei Confidential
Backup Topology Comparison
23 Huawei Confidential
Backup Strategy – Data Deduplication
Traditional backup processes back up a lot of duplicate data. Backing up duplicate data significantly
increases the backup window size requirements and results in unnecessary consumption of resources,
such as storage space and network bandwidth.
Data deduplication is the process of identifying and eliminating redundant data. When duplicate data
is detected during backup, the data is discarded and only the pointer is created to refer the copy of the
data that is already backed up.
File-level deduplication detects and removes redundant copies of identical files.
----File-level deduplication is simple and fast but does not address the problem of duplicate content
inside the files.
Sub-file deduplication breaks the file into smaller chunks and then uses a specialized
algorithm to detect redundant data within and across the file.
• Fixed-length block deduplication
----Using hash algorithm, for block boundary, it might miss many opportunities to discover
redundant data.
• Variable-length segment deduplication
----Complex but effective
24 Huawei Confidential
Source-Based Data Deduplication
Source-based data deduplication eliminates redundant data at the source before it transmits to
the backup device. Source-based data deduplication can dramatically reduce the amount of backup
data sent over the network during backup processes. It provides the benefits of a shorter backup
window and requires less network bandwidth. There is also a substantial reduction in the capacity
required to store the backup images.
Source-based deduplication increases the overhead on the backup client, which impacts the
performance of the backup and application running on the client. Source-based deduplication might
also require a change of backup software if it is not supported by backup software.
25 Huawei Confidential
Target-Based Data Deduplication
Target-based data deduplication occurs at the backup device, which offloads the backup client
from the deduplication process. The backup client sends the data to the backup device and the data is
deduplicated at the backup device, either immediately (inline) or at a scheduled time (post-process).
• Inline deduplication performs deduplication on the backup data before it is stored on the backup
device.
• This method reduces the storage capacity needed for the backup but needs a large backup window.
• Post-process deduplication enables the backup data to be stored or written on the backup device
first and then deduplicated later.
----This method is suitable for situations with tighter backup windows and large storage capacity.
26 Huawei Confidential
Backup Solutions – AnyBackup
All-in-one backup Hybrid cloud backup
HUAWEI
(S3) Only version x86 in China
Local backup CLOUD Supported in version x86 in China:
supports cloud-based backup.
HUAWEI CLOUD S3 storage is
used as level-2 backup media,
(S3) Only version x86 in China storing data for a long time.
All-in-one backup node
Deduplication supports cloud-based backup.
(Supported in the ARM
and replication
and x86 versions)
Centralized backup
Available for Sales Centralized backup in a
x86 version: The matching software is AnyBackup 6.0. The typical data center Remote backup center
hardware configuration can be sold in China. Outside China, only
software resale is provided, and hardware is purchased by Backup node
customers.
All-in-one
ARM version: The matching software is AnyBackup 7.0. Typical
backup Deduplication
configurations are provided for hardware. Software can be sold from
June 30, 2019. and
No software is preinstalled. Onsite backup software installation replication
service is provided by EISOO and quoted on a man-day basis.
x86 version. The matching software is AnyBackup 6.0. Only software
Centralized resale is provided. The hardware is purchased by customers. Backup node
backup Onsite backup software installation service is provided by EISOO and OceanStor 2600 V3/ OceanStor 2600 V3/
quoted on a man-day basis. 5500 V5/9000 5500 V5/9000
Backup storage Backup storage Physical/Virtual
Sold in China. Only version x86 supports this backup solution. Works
Hybrid cloud resource pool resource pool tape library
with centralized backup and all-in-one backup. Data is stored in
backup
HUAWEI CLOUD.
27 Huawei Confidential
Contents
28 Huawei Confidential
What Is Disaster Recovery?
• Disaster recovery: This is the coordinated process of restoring systems, data, and the
infrastructure required to support ongoing business operations after a disaster occurs. It is the
process of restoring a previous copy of the data and applying logs or other necessary processes
to that copy to bring it to a known point of consistency. After all recovery efforts are completed,
the data is validated to ensure that it is correct.
29 Huawei Confidential
Service Interruption May Cause Great Losses to Customers
Hacker
Misoperation attacks Building
Network fire Terrorist
Software problems attacks
Power
faults failures Natural
Device faults
Data disasters
corruption Air conditioner
problems
! Service
interruption
Disaster recovery (DR) focuses on application continuity. Backup focuses on data recoverability.
30 Huawei Confidential A good BC&DR system must properly provide both functions.
Two Indicators About DR Construction
RPO: Recovery Point Objective (amount of lost data caused by downtime) RTO: Recovery Time Objective (downtime)
Tier 6 - Zero data loss and Tier 7 - Zero data loss and
0 < 15 minutes Active-active/DPA
automated service recovery automated service recovery
Tier 5 - Zero data loss Tier 6 - Zero data loss 0 < 2 hours Active-passive/DPA
24 hours to 24 hours to
Tier 2 - Backup site support Tier 2 - PTAM + hot site
days days Backup solution
31 Huawei Confidential
Architecture and Technology
Overview of Huawei DR solutions
Remote DR solutions
Intra-city DR solutions
Local HA solutions Disaster Recovery Data Center
Disaster Recovery Data Center Solution (Geo-Redundant Mode)
Solution (Active-Active Mode) Disaster Recovery Data Center
Local HA Solution Disaster Recovery Data Center Solution (Active-Passive Mode)
Solution (Active-Passive Mode) Cloud Disaster Recovery Solution
> 100 km
≤ 100 km
Local HA Solution
Highlights
Application-level local HA is
FusionSphere VM VM VM VM VM VM FusionSphere achieved.
VMware VMware
In a DC, storage is hardened
to eliminate the risks of a
single storage device.
No data is lost, and services
are not interrupted (RPO = 0,
Oracle/SQL Server Oracle/SQL Server RTO = 0).
This solution can be smoothly
expanded to Disaster
SAN
Recovery Data Center
Solution (Active-Passive
Third-party
storage system
Synchronous OceanStor 18000 V5 Mode).
mirroring
33 Huawei Confidential
Local HA Active-active Active-passive Geo-redundant Cloud DR
FusionSphere,
Two DCs provide services concurrently, service
VMware, loads are balanced, and resources are accessed
WebLogic, or based on the proximity access principle.
WAS cluster
Virtualization deployment is implemented, and
Oracle, DB2, middleware clusters are automatically expanded
or SQL Server and scaled down.
cluster Storage, databases, virtualization, networks, and
transmission are jointly optimized, ensuring the
same service experience between the local site
SAN SAN
and a site at a distance of 100 km.
The physical active-active topology and logical
service topology are visually presented, and the
HyperMetro
operating status of the active-active DCs is
monitored.
34 Huawei Confidential
Local HA Active-active Active-passive Geo-redundant Cloud DR
35 Huawei Confidential
Active-active Active-passive Geo-redundant Cloud DR Local HA
FusionSphere FusionSphere
System volumes and data volumes of VMs can be
recovered.
One-click DR switchover, rehearsal, and planned
migration simplify management and maintenance.
SAN SAN
36 Huawei Confidential
Active-active Active-passive Geo-redundant Cloud DR Local HA
37 Huawei Confidential
Local HA Active-active Active-passive Geo-redundant Cloud DR
38 Huawei Confidential
Local HA Active-active Active-passive Geo-redundant Cloud DR
39 Huawei Confidential
Disaster Recovery Solution
Disaster Recovery Data Center Solution (Active-Active Mode) assisting with CPP cloud platform construction
Customer requirements
As services develop quickly and IT system investment increases remarkably, the
customer wants to reduce the investment in servers, implement fast deployment and
on-demand allocation, and construct a service-layer virtual platform.
The customer requires that no data is lost upon a disaster of core service data.
The customer needs automatic fault detection and switchover of database services
and VM services without increasing manpower for easy O&M.
The customer wants to obtain continuous and fast service response, achieve local
and remote backup of service data, and correct logical data errors.
Huawei solution
Use Huawei virtualization gateways and enterprise storage systems to construct a
cross-DC active-active storage platform and enable active-active applications.
Services can be switched to the other DC upon a disaster. RPO = 0, RTO = 0
Remote arbitration mechanism: The remote arbitration mechanism cooperates with
active-active DCs to achieve the reliable active-active solution.
Active-active and traditional backup integration: Integrate active-active backup and
traditional backup and correct logical data errors.
Combine virtualization services, Oracle RAC database services, and active-active
storage platform to construct an IT active-active platform.
Customer benefits
The active-active platform enables zero data loss and protects information assets.
The failover of the active-active platform enables hour-level RTO to become
minute-level RTO. The efficiency is improved by 60 times.
After 1-year consideration and detailed tests, the customer finally chooses On-demand allocation, deployment, and online migration are available. DC
Huawei solution to construction the active-active DC with the cloud platform. maintenance and upgrade do not interrupt production services.
Automatic fault detection and switchover reduce manual interventions and save
O&M costs.
40 Huawei Confidential
Thank you. Bring digital to every person, home, and
organization for a fully connected,
intelligent world.