RESTART—Protection Tier: 2
RECOVERY—Protection Tier: 3
LONG TERM SECURITY—Protection Tier: 4
The Protection Architecture
To build an appropriate protection architecture, the business value of the applications protected must align with technology that results in a cost justified level of protection. Not every application deserves the highest level of protection money can buy. That seems reasonable and most would agree. To that end, the classification figure on page 3 is an example of how a classification schema can be organized. There are four major parts to a protection architecture. Each area has value differentiation. Protection Tiers
1 and 2 are focused on being able to failover or restart after a hardware failure, data corruption, or data loss and are accomplished using mirrored or point-in-time copies of volumes. This solution brief is focused on Protection Tier-3, which concerns itself with considerations for backup and recovery.
The overall objective of backup and recovery is to offer the ability to recovery from any failure or data loss within a specified period of time. The process of backing up, especially to disk, is generally highly automated after initial setup across applications, platforms and virtual environments. Historically, backing data up was largely the exclusive domain of tape rather than disk. Breakthroughs in disk technologies and pricing have led to very dense arrays that are power, cost and performance efficient. This has caused a shift in the primary target of a backup or recovery from a tape library to a disk library. In fact, according to a 2010 survey by the Enterprise Strategy Group, 62 percent of organizations currently back up to disk-based storage and then to tape; 18 percent back up to disk only; 20 percent continue to back up directly to tape1.
1Source: The modernization of backup: More disk, less tape by searchstorage.com
Top Five Backup and Recovery Considerations to Disk
Mission Critical Data (RAID 5 RAID 10)
• Critical to an enterprise, continuous access
• Highest performance, near zero downtime
Business Critical Data (RAID5)
• Very important to the enterprise, frequently accessed
• High performance, high availability, less than four-hour recovery
|99.99%||1 hr||15 min|
Accessible Online Data (RAID 5 or RAID 6)
• Necessary to the enterprise, infrequently accessed, cost sensitive
• Online performance, high availability, less than eight hours of recovery
|99%||3 hrs||1 hr|
Nearline Data (RAID 6)
• Non-Changing Data, Backup/Recovery – Unmanaged archive, cost sensitive
• Disk performance, automated retrieval
|96%||24 hrs||8 hrs|
Compliance Data (RAID 6)
• Managed Archive
• Enforced record retention and verifiable data integrity Discovery
• CAS Classification, index and search capabilities
|5 Year Replacement||Y||Y|
|Removable and Portable||Y|
|Management Complexity Advantage||Y|
(Write Once Read Multiple)
Recovery Time Objective
Mapping Protection Class to Technology
There continues to be industry noise that has positioned tape as an enduring, if not advantageous, technology for backup and recovery. The facts simply do not support such claims as all benefit categories favor Disk, except data portability. (See analysis in sidebar). For a detailed breakdown of the tape versus disk debate, read Nexsan’s white paper, “Making Cents of Tape vs Disk.”
The first major consideration for architecting an appropriate backup and recovery approach is in setting objectives. The two objectives that matter are the Recovery Time Objectives and the Recovery Point Objectives. The Recovery Time Objective (RTO) is the duration of time within which a business process must be restored after a disaster (or disruption) to avoid unacceptable consequences associated with a break in business continuity. The second important measurement is the Recover Point Objective. In a disaster, there will generally be lost data. The Recovery Point Objective (RPO) is the time (relative to the disaster) to which you plan to recover your data. Once defined, it specifies the minimum frequency in which backup copies must be made.
Once the RPO and RTO objectives are set, a storage administrator can employ the appropriate technology to meet the objective.
A well-founded protection architecture starts as a classification process to determine the value of an application when it is running and the impact of an application when it stops, which is used to set the RTO and RPO objectives. Protection tier-1 would typically represent the smallest amount of overall data and justifies a solution using a hardware RAID mirror or a software mirrored copy for failover.
A tier-2 protection scheme is used to protect from corruption or data loss and is part of a rapid recovery, thought of as a restart.
A tier-3 protection scheme uses backup data located on a disk library with advantages for reliable, high performance recoveries or offsite copies on tape result in days or weeks of time for a recovery.
What is important about this architecture and strategy is the idea that the value of data must be assigned to determine a recover point and time objective. That can be mapped into a solution capability which can then be used to choose the right technology to rovide an effective protection architecture and an effective business rationalization plan.
Disk Best Practices
Nexsan’s approach to the protection architecture is grounded in proven principles of matching the right technology to deliver the right data at the right time for the right cost. Because Nexsan designs and builds ultra reliable – Easy, Efficient, Enterprise-class storage, organizations can depend on their data meeting Service Levels for Protection and Recovery objectives at a price point that will please the business. Nexsan has solutions for Tier 1, 2 and 3. Using Nexsan storage in tier-3 allows for ultra reliable, high performance backup and recovery.
Easy, Efficient, and Enterprise Class
Nexsan arrays have been purpose-built to make it easy to select, configure, purchase, deploy, manage, and support storage arrays easily and efficiently. All Nexsan arrays have management features built-in to make them easy to deploy and manage so IT professionals can concentrate on the big picture.
Nexsan storage arrays are power efficient, space efficient and cost efficient.
With as much as 15 drives per rack unit into a chassis, and the most energy efficient storage available on the market, Nexsan drives down costs significantly. AutoMAID, which is built into every Nexsan array, saves up to 87% on power and cooling compared to other arrays.
Nexsan has achieved an unparalleled level of reliability with their industry leading reliability rate, hot-swappable devices, multi-path IO and no single point-of-failure architecture. The risk to business continuity is an important consideration when choosing a data protection solution.
It is important to use efficient applications as a part of the backup process. Most of the major backup and recovery applications are now designed to write directly to disk and offer added value through deduplication. Deduplication reduces the overall amount of storage required frequently by 20:1, which is about ten times better than compression on tape. Many backup and recovery applications also offer the ability to encrypt the data that is going into the backup repository for security of data at rest.
Nexsan storage arrays make backup and recovery fast, reliable and cost efficient by eliminating performance and management bottlenecks and reducing the overall amount of space, power and cooling otherwise required. Nexsan storage arrays offer the perfect balance of easy, efficient, enterprise-class storage purpose-built for the mid-market and are ideal as in integral part of the protection architecture.