Sign In
Upload
Manuals
Brands
HP Manuals
Software
B6960-96035
HP B6960-96035 Manuals
Manuals and User Guides for HP B6960-96035. We have
1
HP B6960-96035 manual available for free PDF download: Concepts Manual
HP B6960-96035 Concepts Manual (422 pages)
HP Projector User Manual
Brand:
HP
| Category:
Software
| Size: 7.13 MB
Table of Contents
Table of Contents
3
Publication History
21
Edition History
21
About this Guide
23
Intended Audience
23
Documentation Set
23
Guides
23
Online Help
26
Documentation Map
27
Abbreviations
27
Map
28
Integrations
29
Document Conventions and Symbols
31
Document Conventions
31
Data Protector Graphical User Interface
32
General Information
33
HP Technical Support
33
Data Protector Graphical User Interface
33
Subscription Service
34
HP Websites
34
Documentation Feedback
34
About Backup and Data Protector
35
In this Chapter
35
About Data Protector
35
Introducing Backups and Restores
38
What Is a Backup
38
What Is a Restore
39
Backing up a Network Environment
39
Backup Process
39
Restore Process
39
Direct Backup
40
Data Protector Architecture
40
Network Backup
40
The Data Protector Cell (Physical View and Logical View)
41
Operations in the Cell
42
Backup Sessions
43
Backup or Restore Operation
43
Restore Sessions
44
Backup Session
44
Restore Session
44
Enterprise Environments
45
Splitting an Environment into Multiple Cells
45
Large Data Protector Enterprise Environment
45
Single-Point Management of Multiple Cells
46
Manager-Of-Managers Environment
47
Media Management
48
Backup Devices
49
How Backup Specifications, Devices, and Media Pools Are Related
49
User Interfaces
50
Data Protector GUI
50
Using the Data Protector User Interface
50
Data Protector Java GUI
52
Original Data Protector GUI
52
Data Protector Java GUI Architecture
53
Overview of Tasks to Set up Data Protector
55
Planning Your Backup Strategy
57
In this Chapter
57
Backup Strategy Planning
58
Defining the Requirements of a Backup Strategy
58
Factors Influencing Your Backup Strategy
60
Preparing a Backup Strategy Plan
60
Planning Cells
62
One Cell or Multiple Cells
62
Installing and Maintaining Client Systems
64
Creating Cells in the UNIX Environment
64
Creating Cells in the Windows Environment
65
Windows Domains
65
Windows Workgroups
66
Creating Cells in a Mixed Environment
66
Geographically Remote Cells
66
Understanding and Planning Performance
67
The Infrastructure
67
Network Versus Local Backups
67
Devices
68
Network or Server Versus Direct Backups
68
Advanced High Performance Configuration
69
High Performance Hardware Other than Devices
69
Using Hardware in Parallel
69
Configuring Backups and Restores
70
Hardware Compression
70
Software Compression
70
Disk Image Versus Filesystem Backups
71
Full and Incremental Backups
71
Object Distribution to Media
71
Disk Performance
72
SAN Performance
73
Online Database Application Performance
73
Planning Security
73
Cells
74
Data Protector Users Accounts
74
Data Protector User Groups
75
Data Protector User Rights
75
Visibility of Backed up Data
76
Data Encryption
76
How Data Protector AES 256-Bit Encryption Works
76
Backup Session with AES 256-Bit Encryption
77
How Data Protector Drive-Based Encryption Works
77
Restore from Encrypted Backups
78
What Is Backup Ownership
78
Backup Session with Drive-Based Encryption
78
Clustering
79
Cluster Concepts
79
Typical Cluster
80
Cluster Support
82
Cell Manager Installed Outside a Cluster
83
Example Cluster Environments
83
Cell Manager Installed Outside a Cluster
84
Backup Behavior
85
Cell Manager Installed Outside a Cluster, Devices Connected to the Cluster Nodes
85
Cell Manager Installed Outside a Cluster, Devices Connected to the Cluster
86
Backup Behavior
87
Cell Manager Installed in a Cluster, Devices Connected to the Cluster Nodes
87
Cell Manager Installed in the Cluster, Devices Connected to Cluster
89
Backup Behavior
90
Full and Incremental Backups
91
Comparison of Full and Incremental Backup
91
Full Backups
92
Incremental Backups
92
Synthetic Backup
92
Conventional Incremental Backup
93
Enhanced Incremental Backup
93
Types of Incremental Backups
93
Incremental Backups
95
Leveled Incremental Backups
95
Relative Referencing of Backup Runs
95
Considering Restore
96
Media Needed to Restore from Simple and Leveled Incremental
98
Backups
98
Media Needed to Restore from Leveled Incremental Backups
98
Keeping Backed up Data and Information about the Data
99
Data Protection
99
Browsing Files for Restore
100
Catalog Protection
100
Logging Level
100
Enabling the Browsing of Files and Quick Restore
101
Enabling the Restore of Files, but Not Browsing
101
Overwriting Backed up Files with New Data
101
Exporting Media from a Cell
102
Backing up Data
102
Backup Session
102
Creating a Backup Specification
103
Selecting Backup Objects
103
Backup Sessions
105
Backup Types and Scheduled Backups
105
Media Sets
105
Object Mirrors
105
Scheduling Tips and Tricks
106
Scheduling, Backup Configurations, and Sessions
106
Optimizing for Restore
107
Staggering Full Backups
107
The Staggered Approach
107
When to Schedule Backups
107
Full Backup with Daily Simple Incremental Backups
108
Full Backup with Daily Level 1 Incremental Backups
109
Automated or Unattended Operation
110
Considerations for Unattended Backups
110
Full Backup with Mixed Incremental Backups
110
Duplicating Backed up Data
112
Data Protector Data Duplication Methods
112
Copying Objects
113
Object Copy Concept
114
Why Use Object Copy
116
Freeing Media
117
Demultiplexing a Medium
118
Object Mirroring
119
Disk Staging Concept
119
Object Mirroring
121
Copying Media
122
Automated Media Copying
124
Smart Media Copying Using VLS
124
Restoring Data
125
Restore Duration
125
Selection of Devices
126
Selection of the Media Set
126
Operators Are Allowed to Restore
127
End Users Are Allowed to Restore
128
Disaster Recovery
128
Disaster Recovery Methods
130
Alternative Disaster Recovery Methods
131
Media Management and Devices
133
In this Chapter
133
Media Management
133
Media Life Cycle
134
Media Pools
135
Free Pools
137
Free Pools
138
Media Pool Usage Examples
140
A Simple One Device/One Media Pool Relation
140
Configuration of Media Pools for Large Libraries
141
Multiple Devices, Single Media Pool
142
Implementing a Media Rotation Policy
143
Multiple Devices, Multiple Media Pools
143
Media Rotation and Data Protector
144
Media Needed for Rotation
144
Media Management before Backups Begin
145
Initializing or Formatting Media
145
Labeling Data Protector Media
145
Location Field
146
Media Management During Backup Sessions
147
Selecting Media for Backups
147
Adding Data to Media During Backup Sessions
148
Multiple Media Per Session, Multiple Media Per Object
149
Multiple Objects and Sessions Per Medium, Concurrent Writes
149
Multiple Objects and Sessions Per Medium, Sequential Writes
149
Calculating Media Condition
150
Each Object Written on a Separate Medium
150
Writing Data to Several Media Sets During Backup
150
Media Management after Backup Sessions
151
Vaulting
151
Restoring from Media in a Vault
153
Devices
153
Device Lists and Load Balancing
155
Device Streaming and Concurrency
156
How Load Balancing Works
156
Segment Size
157
Block Size
158
Data Format
158
Number of Disk Agent Buffers
159
Device Locking and Lock Names
159
Standalone Devices
160
Device Locking and Device Names
160
Small Magazine Devices
161
Large Libraries
162
Handling of Media
162
Size of a Library
162
Barcode Support
163
Enter / Eject Mail Slots
163
Sharing a Library with Other Applications
163
Cleaning Tape Support
164
Sharing a Library with Multiple Systems
164
Connecting Drives to Multiple Systems
165
Required Data Protector Media Agent for Drive Control
166
Required Data Protector Media Agent for Robotic Control
167
Sharing a SCSI Library
168
System)
168
Sharing a SCSI Library (Robotics Attached to an NDMP Server)
169
Data Protector and Storage Area Networks
170
Sharing an ADIC/GRAU or Storagetek ACS Library
170
Storage Area Networks
171
Fibre Channel
172
Storage Area Network
172
Loop Topology
173
Point-To-Point Topology
173
Loop Initialization Protocol
174
Switched Topology
174
Configuring Multiple Paths to Physical Devices
175
Device Sharing in SAN
175
Example Multipath Configuration
176
Device Locking
177
Indirect and Direct Library Access
178
Indirect Library Access
178
Direct Library Access
179
Indirect Library Access
179
Device Sharing in Clusters
180
Direct Library Access
180
Static Drives
180
Floating Drives
181
Users and User Groups
183
In this Chapter
183
Increased Security for Data Protector Users
183
Access to Backed up Data
183
Users and User Groups
184
Using Predefined User Groups
185
Data Protector User Rights
185
Data Protector Predefined User Groups
185
The Data Protector Internal Database
187
In this Chapter
187
About the IDB
187
The IDB on the Windows Cell Manager
188
The IDB on the UNIX Cell Manager
189
The IDB in the Manager-Of-Managers Environment
189
IDB Architecture
189
Media Management Database (MMDB)
190
IDB Parts
190
Catalog Database (CDB)
191
Detail Catalog Binary Files (DCBF)
192
Session Messages Binary Files (SMBF)
193
Serverless Integrations Binary Files (SIBF)
194
IDB Operation
194
During Backup
194
During Object Copying or Object Consolidation
195
During Restore
195
Exporting Media
195
File Versions Purge
196
Filenames Purge
196
Removing the Detail Catalog
196
Overview of IDB Management
196
IDB Growth and Performance
197
Key IDB Growth and Performance Factors
197
IDB Growth and Performance: Key Tunable Parameters
198
Logging Level as an IDB Key Tunable Parameter
199
The Influence of Logging Level and Catalog Protection on IDB Growth
199
Catalog Protection as an IDB Key Tunable Parameter
201
Recommended Usage of Logging Level and Catalog Protection
201
IDB Size Estimation
203
Service Management
205
In this Chapter
205
Overview
205
Data Protector and Service Management
206
Native Data Protector Functionality
207
Service Management Information Flow
207
Application Response Measurement Version 2.0 (ARM 2.0 API)
208
ARM Functionality
209
Integration with HP Operations Manager Software
210
SNMP Traps
210
The Monitor
210
Reporting and Notification
211
Event Logging and Notification
212
Data Protector Log Files
213
Windows Application Log
213
Java-Based Online Reporting
213
Data Protector Checking and Maintenance Mechanism
214
Central Management, Distributed Environment
214
Using the Data Provided by Data Protector
214
Service Management Integrations
215
Data Protector OM-R Integration
215
Example of an IT Service Provider Environment with Service Management
215
Data Protector Reporter Example
216
Data Protector OM SIP
217
Operational Error Status Report
217
Direct SIP Integration Example
218
How Data Protector Operates
219
In this Chapter
219
Data Protector Processes or Services
219
Backup Sessions
220
Scheduled and Interactive Backup Sessions
221
Backup Session Data Flow and Processes
221
Backup Session Information Flow (1)
222
Pre-Exec and Post-Exec Commands
223
Backup Session Information Flow - Multiple Sessions
223
Queuing of Backup Sessions
224
Mount Requests in Backup Sessions
224
Backing up with Disk Discovery
225
Restore Sessions
225
Restore Session Data Flow and Processes
226
Queuing of Restore Sessions
227
Restore Session Information Flow
227
Mount Requests in a Restore Session
228
Parallel Restores
228
Fast Multiple Single File Restore
229
Object Copy Sessions
229
Parallel Restore Session Flow
229
Automated and Interactive Object Copy Sessions
230
Object Copy Session Data Flow and Processes
230
Queuing of Object Copy Sessions
232
Mount Requests in an Object Copy Session
232
Object Copy Session Information Flow
232
Object Consolidation Sessions
233
Automated and Interactive Object Consolidation Sessions
233
Object Consolidation Session Data Flow and Processes
233
Queuing of Object Consolidation Sessions
234
Mount Requests in an Object Consolidation Session
235
Media Management Sessions
235
Media Management Session Data Flow
235
Integration with Database Applications
237
In this Chapter
237
Overview of Database Operation
237
Relational Database
238
Filesystem Backup of Databases and Applications
239
Online Backup of Databases and Applications
239
Data Protector Integration with Databases
240
Direct Backup
243
In this Chapter
243
Overview
243
Direct Backup
244
Direct Backup Benefits
245
How Direct Backup Works
245
Environment
246
Direct Backup Architecture
246
About Resolve
247
About Xcopy
247
Xcopy + Resolve
248
Direct Backup Process Flow
248
Backup Stages for Data Files
248
Restore
249
Requirements and Support
249
Supported Configurations
250
Three Hosts: CM, Application, Resolve
250
Two Hosts: Cell Manager/Resolve Agent and Application
251
Basic Configuration: Single Host
251
Basic Three Host Configuration
251
10 Disk Backup
253
In this Chapter
253
Overview
253
Disk Backup Benefits
254
Data Protector Disk-Based Devices
255
1 Synthetic Backup
257
In this Chapter
257
Overview
257
Synthetic Backup Benefits
258
How Data Protector Synthetic Backup Works
258
Synthetic Backup
259
Synthetic Backup and Media Space Consumption
260
Restore and Synthetic Backup
260
Virtual Full Backup
260
Full and Incremental Backups
261
Synthetic Backup
261
How Data Protection Periods Affect Restore from Synthetic Backup
262
Regular Synthetic Backup
262
Synthetic Backup and Object Copy
262
12 Split Mirror Concepts
265
In this Chapter
265
Overview
265
Split Mirror Backup Concept
266
Supported Configurations
269
Local Mirror - Dual Host
269
Local Mirror - Dual Host (Full Performance, Zero Downtime Backup)
269
Local Mirror - Single Host
270
Remote Mirror
270
Split Mirror - Remote Mirror (LAN-Free Remote Backup - Data HA)
271
Local/Remote Mirror Combination
272
Other Configurations
273
13 Snapshot Concepts
275
In this Chapter
275
Overview
275
Storage Virtualization
275
Snapshot Concepts
276
Snapshot Backup
277
Snapshot Backup Types
278
Instant Recovery
279
Replica Set and Replica Set Rotation
279
Types of Snapshots
279
Supported Configurations
281
Basic Configuration: Single Disk Array - Dual Host
281
Single Disk Array - Dual Host
281
Other Supported Configurations
282
Multiple Disk Arrays - Dual Host
282
Multiple Application Hosts - Single Backup Host
283
Disk Array(S) - Single Host
284
LVM Mirroring - HP Storageworks Virtual Array Only
285
Other Configurations
286
Campus Cluster with LVM Mirroring - HP Storageworks Virtual Array
286
Microsoft Volume Shadow Copy Service
289
In this Chapter
289
Overview
289
Data Protector and VSS
291
Actors of the Traditional Backup Model
292
Actors of the VSS Backup Model
292
Data Protector Volume Shadow Copy Integration
293
Benefits of Using VSS
293
VSS Filesystem Backup and Restore
295
A Backup Scenarios
297
In this Appendix
297
Considerations
297
Company XYZ
299
Environment
299
Hardware and Software Environment of XYZ
299
Current XYZ Backup Topology
300
Backup Strategy Requirements
302
Proposed Solution
303
Proposed Environment
303
Proposed XYZ Backup Topology
305
Input Parameters
306
Results
306
The Staggering Approach
308
Remote Full Backups to the HP DLT 41 15 Library
309
Company ABC
313
Environment
313
Size of Backup Environment
313
Current ABC Cape Town Backup Topology
314
Backup Strategy Requirements
315
Maximum Acceptable Downtime for Recovery
315
Amount of Data to be Backed up
316
How Long Data Should be Kept
316
Amount of Data to be Backed up in Five Years
317
Proposed Solution
317
ABC Enterprise Environment
318
ABC Cell Configuration
319
ABC Cape Town Enterprise Backup Environment
321
Results
322
Input Parameters
322
B Further Information
331
In this Appendix
331
Backup Generations
331
Examples of Automated Media Copying
332
Backup Generations
332
Example 1: Automated Media Copying of Filesystem Backups
333
Incr1 Backup
333
Full Backup
335
Incr1 Backup and Automated Media Copying
335
Full Backup and Automated Media Copying
337
Example 2: Automated Media Copying of Oracle Database Backups
338
Overview of Backup and Automated Media Copy Sessions
338
Full Backup
339
Full Database Backup and Automated Media Copying
339
Internationalization
340
Localization
340
Background
341
File Name Handling
341
Browsing File Names
342
File Name Handling During Backup
342
File Name Handling During Restore
342
Glossary
345
Index
403
Advertisement
Advertisement
Related Products
HP B6191-90015a
HP -UX B6941-90001
HP BAAD0010HBK-NHSN
Hp BACKCOPY
Hp B2355-92068
HP Brio BA200
HP UX Bastille B.3.3
HP B-series Network Advisor Professional 11.1.5
HP ProLiant BL620c G7
HP Baseline Security Analyzer 2.2
HP Categories
Desktop
Laptop
Server
Monitor
Switch
More HP Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL