Replication - Dell DL4000 User Manual

Tape library
Hide thumbs Also See for DL4000:
Table of Contents

Advertisement

In replication scenarios, your appliance uses SSL 3.0 to secure the connections between the two cores in
a replication topology to prevent eavesdropping and tampering.

Replication

Replication is the process of copying recovery points from an AppAssure core and transmitting them to
another AppAssure core in a separate location for the purpose of disaster recovery. The process requires
a paired source-target relationship between two or more cores.
The source core copies the recovery points of selected protected machines, and then asynchronously
and continually transmits the incremental snapshot data to the target core at a remote disaster recovery
site. You can configure outbound replication to a company-owned data center or remote disaster
recovery site (that is, a self-managed target core). Or, you can configure outbound replication to a third-
party managed service provider (MSP) or the cloud that hosts off-site backup and disaster recovery
services. When replicating to a third-party target core, you can use built-in work flows that let you
request connections and receive automatic feedback notifications.
Replication is managed on a per-protected-machine basis. Any machine (or all machines) protected or
replicated on a source core can be configured to replicate to a target core.
Figure 5. Basic replication architecture
Replication is self-optimizing with a unique Read-Match-Write (RMW) algorithm that is tightly coupled
with deduplication. With RMW replication, the source and target replication service matches keys before
transferring data and then replicates only the compressed, encrypted, deduplicated data across the WAN,
resulting in a 10x reduction in bandwidth requirements.
Replication begins with seeding. Seeding is the initial transfer of deduplicated base images and
incremental snapshots of the protected machines. The data can add up to hundreds or thousands of
gigabytes. Initial replication can be seeded to the target core using external media. This is useful for large
sets of data or sites with slow links. The data in the seeding archive is compressed, encrypted and
deduplicated. If the total size of the archive is larger than the space available on the external media, the
archive can span across multiple devices. During the seeding process, the incremental recovery points
18

Advertisement

Table of Contents
loading

Table of Contents