SlideShare a Scribd company logo
Information Storage and
Management
Storing, Managing, and Protecting Digital Information
Ali Broumandnia, Broumandnia@gmail.com 1
Section III
Business Continuity
In This Section:
• Chapter 11: Introduction to Business Continuity
• Chapter 12: Backup and Recovery
• Chapter 13: Local Replication
• Chapter 14: Remote Replication
Ali Broumandnia, Broumandnia@gmail.com 2
Chapter 14
Remote Replication
• 14.1 Modes of Remote Replication
• 14.2 Remote Replication Technologies
• 14.3 Network Infrastructure
• 14.4 Concepts in Practice: EMC SRDF, EMC SAN Copy, and EMC
Mirror View
• Summary
Ali Broumandnia, Broumandnia@gmail.com 3
Key Concepts:
• Synchronous and Asynchronous Replication
• LVM-Based Replication
• Host-Based Log Shipping
• Disk-Buffered Replication
• Three-Site Replication
• Data Consistency
Ali Broumandnia, Broumandnia@gmail.com 4
Remote replication is the process of creating replicas of information
assets at remote sites (locations). Remote replicas help organizations
mitigate the risks associated with regionally driven outages resulting
from natural or human-made disasters. Similar to local replicas, they
can also be used for other business operations.
This chapter discusses various remote replication technologies, along
with the key steps to plan and design appropriate remote replication
solutions. In addition, this chapter describes network requirements and
management considerations in the remote replication process.
Ali Broumandnia, Broumandnia@gmail.com 5
14.1 Modes of Remote Replication
The two basic modes of remote replication are synchronous and
asynchronous. In synchronous remote replication, writes must be
committed to the source and the target, prior to acknowledging “write
complete” to the host (see Figure 14-1). Additional writes on the source
cannot occur until each preceding write has been completed and
acknowledged. This ensures that data is identical on the source and the
replica at all times. Further writes are transmitted to the remote site
exactly in the order in which they are received at the source. Hence, write
ordering is maintained. In the event of a failure of the source site,
synchronous remote replication provides zero or near-zero RPO, as well
as the lowest RTO.Ali Broumandnia, Broumandnia@gmail.com 6
Ali Broumandnia, Broumandnia@gmail.com 7
14.2 Remote Replication Technologies
Remote replication of data can be handled by the hosts or by the
storage arrays. Other options include specialized appliances to
replicate data over the LAN or the SAN, as well as replication
between storage arrays over the SAN.
Ali Broumandnia, Broumandnia@gmail.com 8
Ali Broumandnia, Broumandnia@gmail.com 9
14.2.1. Host-Based Remote Replication
Host-based remote replication uses one or more components of
the host to perform and manage the replication operation. There
are two basic approaches to host-based remote replication:
LVM-based replication and database replication via log shipping.
• LVM-Based Remote Replication
• Host-Based Log Shipping
Ali Broumandnia, Broumandnia@gmail.com 10
LVM-Based Remote Replication
LVM-based replication is performed and managed at the volume group level.
Writes to the source volumes are transmitted to the remote host by the LVM.
The LVM on the remote host receives the writes and commits them to the
remote volume group. Prior to the start of replication, identical volume
groups, logical volumes, and file systems are created at the source and target
sites. Initial synchronization of data between the source and the replica can be
performed in a number of ways. One method is to backup the source data to
tape and restore the data to the remote replica. Alternatively, it can be
performed by replicating over the Until completion of initial synchronization,
production work on the source volumes is typically halted. After initial
synchronization, production work can be started on the source volumes and
replication of data can be performed over an existing standard IP network (see
Figure 14-3).Ali Broumandnia, Broumandnia@gmail.com 11
Ali Broumandnia, Broumandnia@gmail.com 12
In asynchronous mode, writes are queued in a log file at the source
and sent to the remote host in the order in which they were
received. The size of the log file determines the RPO at the remote
site. In the event of a network failure, writes continue to
accumulate in the log file. If the log file fills up before the failure is
resolved, then a full resynchronization is required upon network
availability. In the event of a failure at the source site, applications
can be restarted on the remote host, using the data on the remote
replicas. LVM-based remote replication eliminates the need for a
dedicated SAN infrastructure.
Ali Broumandnia, Broumandnia@gmail.com 13
Host-Based Log Shipping
Database replication via log shipping is a host-based replication
technology supported by most databases. Transactions to the source
database are captured in logs, which are periodically transmitted by
the source host to the remote host (see Figure 14-4). The remote
host receives the logs and applies them to the remote database.
Ali Broumandnia, Broumandnia@gmail.com 14
Ali Broumandnia, Broumandnia@gmail.com 15
Because the source host does not transmit every update and
buffer them, this alleviates the burden on the source host CPU.
Similar to LVM-based remote replication, the existing
standard IP network can be used for replicating log files. Host-
based log shipping does not scale well, particularly in the case
of applications using federated databases.
Ali Broumandnia, Broumandnia@gmail.com 16
14.2.2 Storage Array-Based Remote
Replication
In storage array-based remote replication, the array operating
environment and resources perform and manage data replication.
This relieves the burden on the host CPUs, which can be better
utilized for running an application. A source and its replica device
reside on different storage arrays. In other implementations, the
storage controller is used for both the host and replication
workload. Data can be transmitted from the source storage array to
the target storage array over a shared or a dedicated network.
Ali Broumandnia, Broumandnia@gmail.com 17
Synchronous Replication Mode
Ali Broumandnia, Broumandnia@gmail.com 18
For synchronous remote replication, network bandwidth equal to
or greater than the maximum write workload between the two sites
should be provided at all times. Figure 14-6 illustrates the write
workload (expressed in MB/s) over time. The “Max” line indicated
in Figure 14-6 represents the required bandwidth that must be
provisioned for synchronous replication. Bandwidths lower than
the maximum write workload results in an unacceptable increase
in application response time.
Ali Broumandnia, Broumandnia@gmail.com 19
Ali Broumandnia, Broumandnia@gmail.com 20
Asynchronous Replication Mode
Ali Broumandnia, Broumandnia@gmail.com 21
Some implementations of asynchronous remote replication maintain write
ordering. A time stamp and sequence number are attached to each write
when it is received by the source. Writes are then transmitted to the remote
array, where they are committed to the remote replica in the exact order in
which they were buffered at the source. This implicitly guarantees
consistency of data on the remote replicas. Other implementations ensure
consistency by leveraging the dependent write principle inherent to most
DBMSs. The writes are buffered for a predefined period of time. At the
end of this duration, the buffer is closed, and a new buffer is opened for
subsequent writes. All writes in the closed buffer are transmitted together
and committed to the remote replica.
Ali Broumandnia, Broumandnia@gmail.com 22
Ali Broumandnia, Broumandnia@gmail.com 23
Disk-Buffered Replication Mode
Ali Broumandnia, Broumandnia@gmail.com 24
Three-Site Replication
• In synchronous and asynchronous replication, under normal conditions
the workload is running at the source site.
• In synchronous replication, source and target sites are usually within
200 KM (125 miles) of each other.
• A regional disaster will not affect the target site in asynchronous
replication, as the sites are typically several hundred or several
thousand kilometers apart.
• Three-site replication is used to mitigate the risks identified in two-site
replication. In a three-site replication, data from the source site is
replicated to two remote data centers.
Ali Broumandnia, Broumandnia@gmail.com 25
Three-Site Replication—Cascade/Multi-hop
In the cascade/multi-hop form of replication, data flows from
the source to the intermediate storage array, known as a bunker, in
the first hop and then from a bunker to a storage array at a remote
site in the second hop. Replication between the source and the
bunker occurs synchronously, but replication between the bunker
and the remote site can be achieved in two ways: disk-buffered
mode or asynchronous mode.
Ali Broumandnia, Broumandnia@gmail.com 26
Synchronous + Asynchronous
This method employs a combination of synchronous and
asynchronous remote replication technologies. Synchronous replication
occurs between the source and the bunker.
Synchronous replication occurs between the source and the bunker.
Asynchronous replication occurs between the bunker and the remote
site.
The remote replica in the bunker acts as the source for the asynchronous
replication to create a remote replica at the remote site. Figure 14-10(a)
illustrates the synchronous + Asynchronous method.
Ali Broumandnia, Broumandnia@gmail.com 27
Synchronous + Disk Buffered
This method employs a combination of local and remote
replication technologies. Synchronous replication occurs between
the source and the bunker: A consistent PIT local replica is created
at the bunker. Data is transmitted from the local replica at the
bunker to the remote replica at the remote site. Optionally, a local
replica can be created at the remote site after data is received from
the bunker. Figure 14-10(b) illustrates the synchronous
+ disk buffered method.
Ali Broumandnia, Broumandnia@gmail.com 28
Ali Broumandnia, Broumandnia@gmail.com 29
Three-Site Replication—Triangle/Multi-target
In the three-site triangle/multi-target replication, data at the source
storage array is concurrently replicated to two different arrays. The
source-to bunker site (target 1) replication is synchronous, with a near-
zero RPO. The source-to remote site (target 2) replication is
asynchronous, with an RPO of minutes. The distance between the source
and the remote site could be thousands of miles. This configuration does
not depend on the bunker site for updating data on the remote site,
because data is asynchronously copied to the remote site directly from the
source.
Ali Broumandnia, Broumandnia@gmail.com 30
14.2.3 SAN-Based Remote Replication
• SAN-based remote replication enables the replication of data between
heterogeneous storage arrays. Data is moved from one array to the
other over the SAN/ WAN.
• SAN-based remote replication is a point-in-time replication
technology. Uses of SAN-based remote replication include data
mobility, remote vaulting, and data migration.
• SAN-based replication uses two types of operations: push and pull.
These terms are defined from the perspective of the control array.
• In SAN-based replication, the control array can keep track of changes
made to the control devices after the replication session is activated.
This is allowed in the incremental push operation only.Ali Broumandnia, Broumandnia@gmail.com 31
Ali Broumandnia, Broumandnia@gmail.com 32
14.3 Network Infrastructure
For remote replication over extended distances, optical network
technologies such as dense wavelength division multiplexing
(DWDM), coarse wavelength division multiplexing (CWDM), and
synchronous optical network (SONET) are deployed.
Ali Broumandnia, Broumandnia@gmail.com 33
14.3.1 DWDM
DWDM is an optical technology by which data from different
channels are carried at different wavelengths over a fiber-optic
link. It is a fiber-optic transmission technique that uses light
waves to transmit data parallel by bit or serial by character. It
integrates multiple light waves with different wavelengths in a
group and directs them through a single optical fiber. Using
DWDM, different data formats at different data rates can be
transmitted together. Specifically, IP ESCON, FC, SONET and
ATM data can all travel at the same time within the optical fiber
(see Figure 14-12).
Ali Broumandnia, Broumandnia@gmail.com 34
Ali Broumandnia, Broumandnia@gmail.com 35
CWDM, like DWDM, uses multiplexing and demultiplexing on
different channels by assigning varied wavelengths to each channel.
Compared to DWDM, CWDM is used to consolidate environments
containing a low number of channels at a reduced cost.
Ali Broumandnia, Broumandnia@gmail.com 36
14.3.2 SONET
SONET (synchronous optical network) is a network technology
that involves transferring a large payload through an optical fiber
over long distances. SONET multiplexes data streams of different
speeds into a frame and sends them across the network. The
European variation of SONET is called synchronous digital
hierarchy (SDH). Figure 14-13 shows the multiplexing of data
streams of different speeds in SONET and SDH technologies.
SONET/SDH uses generic framing procedure (GFP) and supports
the transport of both packet-oriented (Ethernet, IP) and character-
oriented (FC) data.
Ali Broumandnia, Broumandnia@gmail.com 37
Ali Broumandnia, Broumandnia@gmail.com 38
14.4 Concepts in Practice: EMC SRDF, EMC
SAN Copy, and EMC Mirror View
This section discusses three EMC products that use remote
replication technology. EMC Symmetric Remote Data Facility
(SRDF) and EMC Mirror View are storage array–based remote
application software's supported by EMC Symmetric and Clarion
respectively. EMC SAN Copy is SAN-based remote replication
software deployed in an EMC Clarion storage array.
Ali Broumandnia, Broumandnia@gmail.com 39
14.4.1 SRDF Family
SRDF offers a family of technology solutions to implement
storage array-based remote replication technologies. The three
Symmetric solutions are:
• SRDF/Synchronous (SRDF/S)
• SRDF/Asynchronous (SRDF/A)
• SRDF/Automated Replication (SRDF/AR)
Ali Broumandnia, Broumandnia@gmail.com 40
14.4.2 Disaster Recovery with SRDF
The source arrays have SRDF R1 devices (source devices), and the
target arrays have SRDF R2 devices (replica devices). Data written
to R1 devices is replicated to R2 devices, either synchronously or
asynchronously. SRDF R1 and R2 devices can have any local
RAID protection, such as RAID 1 or RAID 5. SRDF R2 devices
are in a read-only (R/O) state when remote replication is in effect.
Hence, under normal operating conditions, changes cannot be
made directly to the R2 devices. The R2 devices can only receive
data from their corresponding R1 devices on the source storage
array.
Ali Broumandnia, Broumandnia@gmail.com 41
Failover
Ali Broumandnia, Broumandnia@gmail.com 42
Failback
Ali Broumandnia, Broumandnia@gmail.com 43
14.4.3 SRDF Operations for Concurrent
Access
SRDF provides split operations to enable concurrent access to both
source and target devices. The establish and restore operations are
used to return the source-target pairs to the normal SRDF state. In
split operation, when R2 is split from R1, BC operations can be
performed on R2. The split operation enables concurrent access to
both the source and the target devices. In this operation, target
devices are made R/W, and the SRDF replication between the
source and the target is suspended, as shown in Figure 14-16.
Ali Broumandnia, Broumandnia@gmail.com 44
Ali Broumandnia, Broumandnia@gmail.com 45
During concurrent operations while in a SRDF split state,
changes could occur on both the source and the target devices.
Normal SRDF replication can be resumed by performing an
establish or a restore operation. With either establish or restore,
the status of the target device becomes R/O (see Figure 14-17).
Ali Broumandnia, Broumandnia@gmail.com 46
Ali Broumandnia, Broumandnia@gmail.com 47
14.4.4 EMC SAN Copy
SAN Copy is CLARiiON software that performs SAN-based
remote replication between CLARiiON and Symmetric or other
vendor storage arrays. It enables simultaneous creation of one or
more copies of source devices to target devices through a SAN.
Source and target devices could either be on a single array or on
multiple arrays. SAN Copy software on the CLARiiON
(designated as the control storage array) controls the entire
replication process.
• Automatic check pointing in the event of a link failure
• Transfer rate throttle
Ali Broumandnia, Broumandnia@gmail.com 48
14.4.5 EMC Mirror View
• EMC MirrorView is a CLARiiON-based software that enables storage
array– based remote replication over FC SAN, IP extended SAN, and
TCP/IP networks. MirrorView family consists of Mirror
View/Synchronous (MirrorView/S), and MirrorView/Asynchronous
(MirrorView/A). MirrorView software must be installed at both source
and target CLARiiON in order to perform remote replication.
• MirrorView supports both synchronous and asynchronous replication of
data on the same CLARiiON. It also supports consistency groups for
maintaining data consistency across write-order dependent LUNs.
Ali Broumandnia, Broumandnia@gmail.com 49
Mirror View Operations
• Initial Synchronization is a replication process that is used for new
mirrors (target) to create an initial copy of the primary/primary image
(LUN on source CLARiiON containing production data). During the
initial synchronization process, the primary images remain online
whereas the secondary/secondary image (LUN that contains a mirror of
the primary image) is inaccessible.
• A fracture operation stops MirrorView replication. An administrator can
initiate fracture to suspend the replication. MirrorView software can
automatically fracture when it senses a connectivity failure between the
primary and secondary LUNs.
Ali Broumandnia, Broumandnia@gmail.com 50
• MirrorView/S invokes a fracture log when the secondary image is
fractured. The fracture log is a bitmap held in the memory of the
storage processor that owns the primary LUN.
• MirrorView/A does not use fracture and write intent logs, but it tracks
locations (using Snap View technology) at the primary LUNs where
updates occur. MirrorView/A utilizes the delta set mechanism to
periodically transfer data to the secondary LUNs. MirrorView uses two
bitmaps on the primary LUNs.
• A secondary image is promoted to the role of primary, when it is
necessary to run production applications at the disaster recovery site.
Ali Broumandnia, Broumandnia@gmail.com 51
Summary
This chapter detailed remote replication. As a primary utility, remote
replication provides disaster recovery and disaster restart solutions. It
enables business operations to be rapidly restarted at a remote site
following an outage, with acceptable data loss. Remote replication
enables BC operations from a target site. The replica of source data at the
target can be used for backup and testing. This replica can also be used
for data repurposing, such as report generation, data warehousing, and
decision support. The segregation of business operations between the
source and target protects the source from becoming a performance
bottleneck, ensuring improved production performance at the source.
Ali Broumandnia, Broumandnia@gmail.com 52
Remote replication may also be used for data center migrations, providing
the least disturbance to production operations because the applications
accessing the source data are not affected. This chapter also described
different types of remote replication solutions. The distance between the
primary site and the remote site is a prime consideration when deciding
which remote replication technology solution to deploy. Asynchronous
replication may adequately meet the RPO and RTO needs, while
permitting greater distances between the sites. Storage management
solutions provide the capability to not only automate business continuity
solutions, but also enable centralized management of the overall storage
infrastructure. Organizations must ensure security of the information
assets. The next chapter details storage security and management.Ali Broumandnia, Broumandnia@gmail.com 53

More Related Content

PDF
Data Storage and Information Management
PPTX
iSCSI (Internet Small Computer System Interface)
DOCX
Storage Area Networks Unit 2 Notes
PPTX
DAS RAID NAS SAN
PPTX
RAID - (Redundant Array of Inexpensive Disks or Drives, or Redundant Array of...
PDF
Storage overview
PPTX
Advanced computer network
PPTX
CLIENT SERVER IN OS.ppt
Data Storage and Information Management
iSCSI (Internet Small Computer System Interface)
Storage Area Networks Unit 2 Notes
DAS RAID NAS SAN
RAID - (Redundant Array of Inexpensive Disks or Drives, or Redundant Array of...
Storage overview
Advanced computer network
CLIENT SERVER IN OS.ppt

What's hot (20)

PDF
Hard Disk Encryptions
PPTX
Three main Architectures For Parallel Database.pptx
PPTX
Introdution and designing a learning system
PPTX
Storage area network
PDF
Distributed Operating System_1
PPTX
Database security
PPTX
Cloud computing security issues and challenges
PPTX
distributed Computing system model
PPTX
Network Attached Storage (NAS)
PDF
CS8791 Cloud Computing - Question Bank
DOC
Distributed Mutual exclusion algorithms
PPTX
Understanding das-nas-san
PPTX
RAID LEVELS
PPT
Cloud Security
PPT
Resource provisioning optimization in cloud computing
PPT
distributed shared memory
PPTX
Scheduling in Cloud Computing
PDF
Google App Engine
PPT
Disk management
Hard Disk Encryptions
Three main Architectures For Parallel Database.pptx
Introdution and designing a learning system
Storage area network
Distributed Operating System_1
Database security
Cloud computing security issues and challenges
distributed Computing system model
Network Attached Storage (NAS)
CS8791 Cloud Computing - Question Bank
Distributed Mutual exclusion algorithms
Understanding das-nas-san
RAID LEVELS
Cloud Security
Resource provisioning optimization in cloud computing
distributed shared memory
Scheduling in Cloud Computing
Google App Engine
Disk management
Ad

Similar to Chapter 14 (20)

PPTX
module-3-chapter-4-replication-san2.pptx
PPTX
module-3-chapter-3-replication-san1.pptx
PDF
Ibm storage infrastructure for business continuityredp4605
DOCX
Data replication
PPTX
Data Replication from Storage Technology
PPTX
Database replication
PPTX
Replication in Distributed Systems
PPTX
Technical presentation
PDF
Resource replication in cloud computing.
PDF
Remote backup system
PPT
18 philbe replication stanford99
PDF
System Design Basics by Pratyush Majumdar
PPTX
Basic principles of backup policies by Andrea Mauro, Backup Academy
PPTX
Chapter 12
PDF
Design Patterns For Distributed NO-reational databases
PPT
Fundamentals of storage Unit III Backup and Recovery.ppt
PDF
Scale from zero to millions of users.pdf
PDF
PPT
Chapter 14 replication
PDF
Mirroring vs Replication vs Clustering: A Data Protection Comparison
module-3-chapter-4-replication-san2.pptx
module-3-chapter-3-replication-san1.pptx
Ibm storage infrastructure for business continuityredp4605
Data replication
Data Replication from Storage Technology
Database replication
Replication in Distributed Systems
Technical presentation
Resource replication in cloud computing.
Remote backup system
18 philbe replication stanford99
System Design Basics by Pratyush Majumdar
Basic principles of backup policies by Andrea Mauro, Backup Academy
Chapter 12
Design Patterns For Distributed NO-reational databases
Fundamentals of storage Unit III Backup and Recovery.ppt
Scale from zero to millions of users.pdf
Chapter 14 replication
Mirroring vs Replication vs Clustering: A Data Protection Comparison
Ad

More from Ali Broumandnia (14)

PPTX
Chapter 06 eng
PPTX
Chapter 16
PPTX
Chapter 15
PPTX
Chapter 11
PPTX
Chapter 10
PPTX
Chapter 9
PPTX
Chapter 8
PPTX
Chapter 7
PPTX
Chapter 6
PPTX
Chapter 5
PPTX
Chapter 4
PPTX
Chapter 3
PPTX
Chapter 1
PPTX
Chapter 2
Chapter 06 eng
Chapter 16
Chapter 15
Chapter 11
Chapter 10
Chapter 9
Chapter 8
Chapter 7
Chapter 6
Chapter 5
Chapter 4
Chapter 3
Chapter 1
Chapter 2

Recently uploaded (20)

PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
additive manufacturing of ss316l using mig welding
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Digital Logic Computer Design lecture notes
PPT
Project quality management in manufacturing
PPTX
UNIT 4 Total Quality Management .pptx
PDF
PPT on Performance Review to get promotions
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
web development for engineering and engineering
PPTX
Lecture Notes Electrical Wiring System Components
DOCX
573137875-Attendance-Management-System-original
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
additive manufacturing of ss316l using mig welding
CH1 Production IntroductoryConcepts.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Digital Logic Computer Design lecture notes
Project quality management in manufacturing
UNIT 4 Total Quality Management .pptx
PPT on Performance Review to get promotions
Embodied AI: Ushering in the Next Era of Intelligent Systems
web development for engineering and engineering
Lecture Notes Electrical Wiring System Components
573137875-Attendance-Management-System-original
Structs to JSON How Go Powers REST APIs.pdf
Operating System & Kernel Study Guide-1 - converted.pdf
Model Code of Practice - Construction Work - 21102022 .pdf

Chapter 14

  • 1. Information Storage and Management Storing, Managing, and Protecting Digital Information Ali Broumandnia, Broumandnia@gmail.com 1
  • 2. Section III Business Continuity In This Section: • Chapter 11: Introduction to Business Continuity • Chapter 12: Backup and Recovery • Chapter 13: Local Replication • Chapter 14: Remote Replication Ali Broumandnia, Broumandnia@gmail.com 2
  • 3. Chapter 14 Remote Replication • 14.1 Modes of Remote Replication • 14.2 Remote Replication Technologies • 14.3 Network Infrastructure • 14.4 Concepts in Practice: EMC SRDF, EMC SAN Copy, and EMC Mirror View • Summary Ali Broumandnia, Broumandnia@gmail.com 3
  • 4. Key Concepts: • Synchronous and Asynchronous Replication • LVM-Based Replication • Host-Based Log Shipping • Disk-Buffered Replication • Three-Site Replication • Data Consistency Ali Broumandnia, Broumandnia@gmail.com 4
  • 5. Remote replication is the process of creating replicas of information assets at remote sites (locations). Remote replicas help organizations mitigate the risks associated with regionally driven outages resulting from natural or human-made disasters. Similar to local replicas, they can also be used for other business operations. This chapter discusses various remote replication technologies, along with the key steps to plan and design appropriate remote replication solutions. In addition, this chapter describes network requirements and management considerations in the remote replication process. Ali Broumandnia, Broumandnia@gmail.com 5
  • 6. 14.1 Modes of Remote Replication The two basic modes of remote replication are synchronous and asynchronous. In synchronous remote replication, writes must be committed to the source and the target, prior to acknowledging “write complete” to the host (see Figure 14-1). Additional writes on the source cannot occur until each preceding write has been completed and acknowledged. This ensures that data is identical on the source and the replica at all times. Further writes are transmitted to the remote site exactly in the order in which they are received at the source. Hence, write ordering is maintained. In the event of a failure of the source site, synchronous remote replication provides zero or near-zero RPO, as well as the lowest RTO.Ali Broumandnia, Broumandnia@gmail.com 6
  • 8. 14.2 Remote Replication Technologies Remote replication of data can be handled by the hosts or by the storage arrays. Other options include specialized appliances to replicate data over the LAN or the SAN, as well as replication between storage arrays over the SAN. Ali Broumandnia, Broumandnia@gmail.com 8
  • 10. 14.2.1. Host-Based Remote Replication Host-based remote replication uses one or more components of the host to perform and manage the replication operation. There are two basic approaches to host-based remote replication: LVM-based replication and database replication via log shipping. • LVM-Based Remote Replication • Host-Based Log Shipping Ali Broumandnia, Broumandnia@gmail.com 10
  • 11. LVM-Based Remote Replication LVM-based replication is performed and managed at the volume group level. Writes to the source volumes are transmitted to the remote host by the LVM. The LVM on the remote host receives the writes and commits them to the remote volume group. Prior to the start of replication, identical volume groups, logical volumes, and file systems are created at the source and target sites. Initial synchronization of data between the source and the replica can be performed in a number of ways. One method is to backup the source data to tape and restore the data to the remote replica. Alternatively, it can be performed by replicating over the Until completion of initial synchronization, production work on the source volumes is typically halted. After initial synchronization, production work can be started on the source volumes and replication of data can be performed over an existing standard IP network (see Figure 14-3).Ali Broumandnia, Broumandnia@gmail.com 11
  • 13. In asynchronous mode, writes are queued in a log file at the source and sent to the remote host in the order in which they were received. The size of the log file determines the RPO at the remote site. In the event of a network failure, writes continue to accumulate in the log file. If the log file fills up before the failure is resolved, then a full resynchronization is required upon network availability. In the event of a failure at the source site, applications can be restarted on the remote host, using the data on the remote replicas. LVM-based remote replication eliminates the need for a dedicated SAN infrastructure. Ali Broumandnia, Broumandnia@gmail.com 13
  • 14. Host-Based Log Shipping Database replication via log shipping is a host-based replication technology supported by most databases. Transactions to the source database are captured in logs, which are periodically transmitted by the source host to the remote host (see Figure 14-4). The remote host receives the logs and applies them to the remote database. Ali Broumandnia, Broumandnia@gmail.com 14
  • 16. Because the source host does not transmit every update and buffer them, this alleviates the burden on the source host CPU. Similar to LVM-based remote replication, the existing standard IP network can be used for replicating log files. Host- based log shipping does not scale well, particularly in the case of applications using federated databases. Ali Broumandnia, Broumandnia@gmail.com 16
  • 17. 14.2.2 Storage Array-Based Remote Replication In storage array-based remote replication, the array operating environment and resources perform and manage data replication. This relieves the burden on the host CPUs, which can be better utilized for running an application. A source and its replica device reside on different storage arrays. In other implementations, the storage controller is used for both the host and replication workload. Data can be transmitted from the source storage array to the target storage array over a shared or a dedicated network. Ali Broumandnia, Broumandnia@gmail.com 17
  • 18. Synchronous Replication Mode Ali Broumandnia, Broumandnia@gmail.com 18
  • 19. For synchronous remote replication, network bandwidth equal to or greater than the maximum write workload between the two sites should be provided at all times. Figure 14-6 illustrates the write workload (expressed in MB/s) over time. The “Max” line indicated in Figure 14-6 represents the required bandwidth that must be provisioned for synchronous replication. Bandwidths lower than the maximum write workload results in an unacceptable increase in application response time. Ali Broumandnia, Broumandnia@gmail.com 19
  • 21. Asynchronous Replication Mode Ali Broumandnia, Broumandnia@gmail.com 21
  • 22. Some implementations of asynchronous remote replication maintain write ordering. A time stamp and sequence number are attached to each write when it is received by the source. Writes are then transmitted to the remote array, where they are committed to the remote replica in the exact order in which they were buffered at the source. This implicitly guarantees consistency of data on the remote replicas. Other implementations ensure consistency by leveraging the dependent write principle inherent to most DBMSs. The writes are buffered for a predefined period of time. At the end of this duration, the buffer is closed, and a new buffer is opened for subsequent writes. All writes in the closed buffer are transmitted together and committed to the remote replica. Ali Broumandnia, Broumandnia@gmail.com 22
  • 24. Disk-Buffered Replication Mode Ali Broumandnia, Broumandnia@gmail.com 24
  • 25. Three-Site Replication • In synchronous and asynchronous replication, under normal conditions the workload is running at the source site. • In synchronous replication, source and target sites are usually within 200 KM (125 miles) of each other. • A regional disaster will not affect the target site in asynchronous replication, as the sites are typically several hundred or several thousand kilometers apart. • Three-site replication is used to mitigate the risks identified in two-site replication. In a three-site replication, data from the source site is replicated to two remote data centers. Ali Broumandnia, Broumandnia@gmail.com 25
  • 26. Three-Site Replication—Cascade/Multi-hop In the cascade/multi-hop form of replication, data flows from the source to the intermediate storage array, known as a bunker, in the first hop and then from a bunker to a storage array at a remote site in the second hop. Replication between the source and the bunker occurs synchronously, but replication between the bunker and the remote site can be achieved in two ways: disk-buffered mode or asynchronous mode. Ali Broumandnia, Broumandnia@gmail.com 26
  • 27. Synchronous + Asynchronous This method employs a combination of synchronous and asynchronous remote replication technologies. Synchronous replication occurs between the source and the bunker. Synchronous replication occurs between the source and the bunker. Asynchronous replication occurs between the bunker and the remote site. The remote replica in the bunker acts as the source for the asynchronous replication to create a remote replica at the remote site. Figure 14-10(a) illustrates the synchronous + Asynchronous method. Ali Broumandnia, Broumandnia@gmail.com 27
  • 28. Synchronous + Disk Buffered This method employs a combination of local and remote replication technologies. Synchronous replication occurs between the source and the bunker: A consistent PIT local replica is created at the bunker. Data is transmitted from the local replica at the bunker to the remote replica at the remote site. Optionally, a local replica can be created at the remote site after data is received from the bunker. Figure 14-10(b) illustrates the synchronous + disk buffered method. Ali Broumandnia, Broumandnia@gmail.com 28
  • 30. Three-Site Replication—Triangle/Multi-target In the three-site triangle/multi-target replication, data at the source storage array is concurrently replicated to two different arrays. The source-to bunker site (target 1) replication is synchronous, with a near- zero RPO. The source-to remote site (target 2) replication is asynchronous, with an RPO of minutes. The distance between the source and the remote site could be thousands of miles. This configuration does not depend on the bunker site for updating data on the remote site, because data is asynchronously copied to the remote site directly from the source. Ali Broumandnia, Broumandnia@gmail.com 30
  • 31. 14.2.3 SAN-Based Remote Replication • SAN-based remote replication enables the replication of data between heterogeneous storage arrays. Data is moved from one array to the other over the SAN/ WAN. • SAN-based remote replication is a point-in-time replication technology. Uses of SAN-based remote replication include data mobility, remote vaulting, and data migration. • SAN-based replication uses two types of operations: push and pull. These terms are defined from the perspective of the control array. • In SAN-based replication, the control array can keep track of changes made to the control devices after the replication session is activated. This is allowed in the incremental push operation only.Ali Broumandnia, Broumandnia@gmail.com 31
  • 33. 14.3 Network Infrastructure For remote replication over extended distances, optical network technologies such as dense wavelength division multiplexing (DWDM), coarse wavelength division multiplexing (CWDM), and synchronous optical network (SONET) are deployed. Ali Broumandnia, Broumandnia@gmail.com 33
  • 34. 14.3.1 DWDM DWDM is an optical technology by which data from different channels are carried at different wavelengths over a fiber-optic link. It is a fiber-optic transmission technique that uses light waves to transmit data parallel by bit or serial by character. It integrates multiple light waves with different wavelengths in a group and directs them through a single optical fiber. Using DWDM, different data formats at different data rates can be transmitted together. Specifically, IP ESCON, FC, SONET and ATM data can all travel at the same time within the optical fiber (see Figure 14-12). Ali Broumandnia, Broumandnia@gmail.com 34
  • 36. CWDM, like DWDM, uses multiplexing and demultiplexing on different channels by assigning varied wavelengths to each channel. Compared to DWDM, CWDM is used to consolidate environments containing a low number of channels at a reduced cost. Ali Broumandnia, Broumandnia@gmail.com 36
  • 37. 14.3.2 SONET SONET (synchronous optical network) is a network technology that involves transferring a large payload through an optical fiber over long distances. SONET multiplexes data streams of different speeds into a frame and sends them across the network. The European variation of SONET is called synchronous digital hierarchy (SDH). Figure 14-13 shows the multiplexing of data streams of different speeds in SONET and SDH technologies. SONET/SDH uses generic framing procedure (GFP) and supports the transport of both packet-oriented (Ethernet, IP) and character- oriented (FC) data. Ali Broumandnia, Broumandnia@gmail.com 37
  • 39. 14.4 Concepts in Practice: EMC SRDF, EMC SAN Copy, and EMC Mirror View This section discusses three EMC products that use remote replication technology. EMC Symmetric Remote Data Facility (SRDF) and EMC Mirror View are storage array–based remote application software's supported by EMC Symmetric and Clarion respectively. EMC SAN Copy is SAN-based remote replication software deployed in an EMC Clarion storage array. Ali Broumandnia, Broumandnia@gmail.com 39
  • 40. 14.4.1 SRDF Family SRDF offers a family of technology solutions to implement storage array-based remote replication technologies. The three Symmetric solutions are: • SRDF/Synchronous (SRDF/S) • SRDF/Asynchronous (SRDF/A) • SRDF/Automated Replication (SRDF/AR) Ali Broumandnia, Broumandnia@gmail.com 40
  • 41. 14.4.2 Disaster Recovery with SRDF The source arrays have SRDF R1 devices (source devices), and the target arrays have SRDF R2 devices (replica devices). Data written to R1 devices is replicated to R2 devices, either synchronously or asynchronously. SRDF R1 and R2 devices can have any local RAID protection, such as RAID 1 or RAID 5. SRDF R2 devices are in a read-only (R/O) state when remote replication is in effect. Hence, under normal operating conditions, changes cannot be made directly to the R2 devices. The R2 devices can only receive data from their corresponding R1 devices on the source storage array. Ali Broumandnia, Broumandnia@gmail.com 41
  • 44. 14.4.3 SRDF Operations for Concurrent Access SRDF provides split operations to enable concurrent access to both source and target devices. The establish and restore operations are used to return the source-target pairs to the normal SRDF state. In split operation, when R2 is split from R1, BC operations can be performed on R2. The split operation enables concurrent access to both the source and the target devices. In this operation, target devices are made R/W, and the SRDF replication between the source and the target is suspended, as shown in Figure 14-16. Ali Broumandnia, Broumandnia@gmail.com 44
  • 46. During concurrent operations while in a SRDF split state, changes could occur on both the source and the target devices. Normal SRDF replication can be resumed by performing an establish or a restore operation. With either establish or restore, the status of the target device becomes R/O (see Figure 14-17). Ali Broumandnia, Broumandnia@gmail.com 46
  • 48. 14.4.4 EMC SAN Copy SAN Copy is CLARiiON software that performs SAN-based remote replication between CLARiiON and Symmetric or other vendor storage arrays. It enables simultaneous creation of one or more copies of source devices to target devices through a SAN. Source and target devices could either be on a single array or on multiple arrays. SAN Copy software on the CLARiiON (designated as the control storage array) controls the entire replication process. • Automatic check pointing in the event of a link failure • Transfer rate throttle Ali Broumandnia, Broumandnia@gmail.com 48
  • 49. 14.4.5 EMC Mirror View • EMC MirrorView is a CLARiiON-based software that enables storage array– based remote replication over FC SAN, IP extended SAN, and TCP/IP networks. MirrorView family consists of Mirror View/Synchronous (MirrorView/S), and MirrorView/Asynchronous (MirrorView/A). MirrorView software must be installed at both source and target CLARiiON in order to perform remote replication. • MirrorView supports both synchronous and asynchronous replication of data on the same CLARiiON. It also supports consistency groups for maintaining data consistency across write-order dependent LUNs. Ali Broumandnia, Broumandnia@gmail.com 49
  • 50. Mirror View Operations • Initial Synchronization is a replication process that is used for new mirrors (target) to create an initial copy of the primary/primary image (LUN on source CLARiiON containing production data). During the initial synchronization process, the primary images remain online whereas the secondary/secondary image (LUN that contains a mirror of the primary image) is inaccessible. • A fracture operation stops MirrorView replication. An administrator can initiate fracture to suspend the replication. MirrorView software can automatically fracture when it senses a connectivity failure between the primary and secondary LUNs. Ali Broumandnia, Broumandnia@gmail.com 50
  • 51. • MirrorView/S invokes a fracture log when the secondary image is fractured. The fracture log is a bitmap held in the memory of the storage processor that owns the primary LUN. • MirrorView/A does not use fracture and write intent logs, but it tracks locations (using Snap View technology) at the primary LUNs where updates occur. MirrorView/A utilizes the delta set mechanism to periodically transfer data to the secondary LUNs. MirrorView uses two bitmaps on the primary LUNs. • A secondary image is promoted to the role of primary, when it is necessary to run production applications at the disaster recovery site. Ali Broumandnia, Broumandnia@gmail.com 51
  • 52. Summary This chapter detailed remote replication. As a primary utility, remote replication provides disaster recovery and disaster restart solutions. It enables business operations to be rapidly restarted at a remote site following an outage, with acceptable data loss. Remote replication enables BC operations from a target site. The replica of source data at the target can be used for backup and testing. This replica can also be used for data repurposing, such as report generation, data warehousing, and decision support. The segregation of business operations between the source and target protects the source from becoming a performance bottleneck, ensuring improved production performance at the source. Ali Broumandnia, Broumandnia@gmail.com 52
  • 53. Remote replication may also be used for data center migrations, providing the least disturbance to production operations because the applications accessing the source data are not affected. This chapter also described different types of remote replication solutions. The distance between the primary site and the remote site is a prime consideration when deciding which remote replication technology solution to deploy. Asynchronous replication may adequately meet the RPO and RTO needs, while permitting greater distances between the sites. Storage management solutions provide the capability to not only automate business continuity solutions, but also enable centralized management of the overall storage infrastructure. Organizations must ensure security of the information assets. The next chapter details storage security and management.Ali Broumandnia, Broumandnia@gmail.com 53