Citrix.com



-584540-65134800left-52369800-925830-8642355236210-208915DBackup White Paper1625999826474Scuetch Corporation Co., Ltd.0Scuetch Corporation Co., Ltd.Copyright NoticeCopyright? 2009-2018 Scutech Corporation All rights reserved.Scutech has completed a detailed proofreading of this article. However, it is not guaranteed that the content does not contain technical errors or typographical errors or omissions, if any of which appears, Scutech does not undertake any liability.The Company reserve the exclusive right to update or revise the information on this brochure without prior notice.Content1. Overview12. System Architecture32.1 Technical Architecture32.2 System Components32.2.1 Backup Server42.2.2 Storage Server52.2.3 Agent53. Data Protection73.1 Backup Protection73.1.1 File Protection73.1.2 Databases Protection83.1.3 Applications Protection93.1.4 OS Protection103.1.5 Virtual Machine Protection113.1.6 Enhanced Security113.1.7 Disaster Recovery Drill123.2 Data Disaster Recovery133.2.1 High Availability133.2.2 CDP143.2.3 Data Replication153.2.4 Zero Data Loss163.2.5 Off-site Disaster Recovery173.3 Data Management173.3.1 Data Deduplication173.3.2 Data Encryption183.3.3 Data Compression193.3.4 D2T193.3.5 D2C193.4 Operation and Maintenance Support203.4.1 Backup as a Service203.4.2 Backup Speed Control213.4.3 Backup Protection Approaches213.4.4 Backup Recovery Strategies223.4.5 Access Management223.4.6 Poor Network Transmission223.4.7 LAN-Free Environment223.4.8 Unified Monitoring233.4.9 Multi-dimensional Statistics234. Distinctive Technologies244.1 Storage Pool Management244.2 Synthetic Backup of Files254.3 Synthetic Backup of Database264.4 Continuous Log Real-time Protection (CLRP)274.5 OS Virtual Migration274.6 Hot Backup of MySQL284.7 Hot backup of Informix285. Supported Environment295.1 Supported Backup and Storage Server Platforms295.1.1 Windows OS295.1.2 Linux OS295.2 Supported Client Platforms295.2.1 Windows OS295.2.2 Linux OS295.2.3 UNIX OS305.2.4 Domestic OS305.3 Supported Virtualization Platforms305.3.1 Popular International Virtual Platforms305.3.2 Popular Domestic Virtual Platforms315.4 Supported Databases315.4.1 Popular International Database Software315.4.2 Popular Domestic Database Software315.5 Application Software315.6 Supported Storage Object326. About Scutech33OverviewDBackup is enterprise-level security software that integrates data backup & disaster recovery and high availability all in one. It has built a backup cloud and features multi-tenancy and coordinates local and on-cloud data to deliver better protection. Data such as OSs, databases, applications, files and virtual machines of enterprises can be well protected and restored completely, accurately and instantly in case of a disaster, minimizing economic loss. Figure STYLEREF 1 \s 1- SEQ 图 \* ARABIC \s 1 1 Product OverviewData BackupSupports full backup, differential backup, incremental backup, log backup, synthetic backup, etc. Users can customize backup strategies for different types of data based on the usage of information resources in the enterprise production environment. Data RecoverySupports full recovery such as OS and database, as well as recovery for a specific file,mail or table. Enterprises can perform recovery for question files and achieve the rapid recovery of business operation.Data Disaster RecoverySupports off-site disaster recovery, CDP (Continuous Data Protection), zero data loss and data synchronization. It can build a comprehensive data disaster recovery program for enterprises.Data High AvailabilityIntegrates shared storage HA with mirroring HA to ensure HA data protection in different operating environments; Integrates CDP solution to achieve the overall protection of business system and data.454533095885349377028575DBackup has received ISCCC by China Information Security Certification Center, complies with relevant Chinese legal requirements, is currently one of the few nationally certified data backup products. System ArchitectureTechnical ArchitectureThe architecture design of DBackup based on B/S system, gives full consideration of development status and future development needs of informatization, and is an open, scalable, and strongly adaptable infrastructure. On the construction of business module, multi-layer architecture is fully taken into consideration, and based on the concept of “high cohesion&low coupling”, modular design is realized including: backup/recovery, CDP, high availability, job management, resource management, monitoring management, data management and storage management module. Data backup and recovery on any internal and external platform is achieved to meet the needs of enterprises. Relevant technologies at home and abroad are in a leading position.DBackup supports distributed deployment of backup system in multiple regions, and achieves centralized monitoring and management of the whole enterprise backup system through unified management and monitoring at multiple levels.Figure STYLEREF 1 \s 2- SEQ 图 \* ARABIC \s 1 1 DBackup ArchitectureSystem ComponentsDBackup consists of one backup server, one or multiple storage servers, and one or multiple agents.Figure STYLEREF 1 \s 2- SEQ 图 \* ARABIC \s 1 2 System Components and ManagementThe backup server will manage all data from agents and storage servers.Users can configure job information on the backup server through WEB management interface, and then the server will deliver the job order to the agent.The agent executes backup/restore operation, and stores data directly to the storage server.The agent executes data synchronization operation, and then data synchronization of databases will be realized between clients.The storage server follows the backup server’s pool copy instruction, and backup data replication between storage pools on the same storage server or on different servers is implemented.Supports backup data, catalog and other data’s backup to the remote storage server to achieve remote disaster recovery. Backup ServerProvides DBackup management platform to manage the backup agent and storage server access, monitors and manages the client resource backup, recovery, data high availability and other business information, and saves the backup set catalog information.Figure STYLEREF 1 \s 2- SEQ 图 \* ARABIC \s 1 3 Backup ConsoleDBackup management platform adopts stylish design concept, and integrates resource management, business management as well as user management, which includes the following main features:Adopts the cutting-edge design concept of the planar interface, combines APP design style of the mobile terminal and improves the interface interactive ability, service response speed and fashion aesthetic experience of the product.Integrates backup and disaster recovery functions such as data backup, CDP, High Availability, data synchronization to implement full-scale management of backup and disaster recovery.Adopts wizards to configure various types of backup jobs to greatly simplify business configuration and makes it user friendly.Storage ServerThe storage server is responsible for receiving and storing the backup data(backup set, CDP data, etc.) pushed by the client. Main storage media supported by Storage Server: SSD,SAS, NLSAS, and STAT.Supports popular tape libraries, virtual tape libraries and optical disk storage systems like IBM, Quantum, Tandberg and Amethystum.Supports AWS, Alibaba Cloud, Baidu Cloud, Microsoft Azure, Huawei Cloud, Tencent Cloud, Sina Cloud and other mainstream cloud platform storage.AgentDeployed on the client server for the integration of backup resources in order to realize unified operation and management once the agent is connected to the backup server.The agent, which is directly connected to the storage server, supports deployment in different environment such as physical machines and virtual machines, receives job schedules of backup servers, executes backup and recovery tasks, reduces bandwidth utilization percentage of data transmission and improves the backup efficiency by collecting, de-duplicating, compressing and limiting speed of backup data. Data ProtectionBackup ProtectionFile ProtectionSupports backup, synchronization and recovery on various OS platforms including Windows, Linux, AIX, Solaris, HP-UX, and NeoKylin OS system under Loongson, FT,and Shenwei architectures, etc.File protection is based on file block backup on system level, and in case of massive small files, it applies multi-level indexing and multi-thread paralleling processing for data acquisition to accelerate the backup speed by 10 to 20 times.Figure STYLEREF 1 \s 3- SEQ 图 \* ARABIC \s 1 1 Efficient Protection of Massive FilesSupports the following backup types: full backup, incremental backup and synthetic backup.Supports data filtering by means of including, excluding, etc., to realize the refined extraction of file data.Supports custom processing operation of file data before and after backup through configuring pre and post scripts.Adopts breakpoint resume technology to ensure the complete and efficient transmission of file data in a weak network environment.Supports recovery of single or multiple files in original or custom path.Stores file backup data directly from the client to tape libraries with D2T technology, and extract backup set data from tape libraries for client recovery. Stores file backup data directly from the client to public cloud platforms with D2C technology, and extract backup set data from cloud platforms for client recovery.DBackup applies variable-length partitioning technology partitions based on attributes of file data to optimize Deduplication ratio.According to the client's resource, users can transfer file information after the slicing, and customize transmission channel of data backup to improve its transmission efficiency.Figure STYLEREF 1 \s 3- SEQ 图 \* ARABIC \s 1 2 Data Transmission Using Multiple ChannelsDatabases ProtectionSupports backup and recovery of different databases on different OS platforms including major databases like Oracle, SQL Server, MySQL, Sybase, DB2, Informix, MongoDB and PostgreSQL on Windows, Linux, AIX, Solaris and HP-UX as well as domestic databases like DM, Kingbase, GBase, ShenTong.Figure STYLEREF 1 \s 3- SEQ 图 \* ARABIC \s 1 3 Comprehensive Databases ProtectionDBackup Comprehensive data protection aimed at major databases at home and abroad. Data Synchronization: For databases such as Oracle, SQL Server, MySQL in a homogeneous environment, it provides data real-time synchronization protection in the master/standby database environment and supports master/standby database switching.Zero Data Loss: Adopts log synchronization mechanism to achieve zero data loss of Oracle database.Database Disaster Recovery Drill: supports the verification of the availability of backup data by setting up a routine disaster recovery drill. Database used in a drill can be leveraged for data analysis, testing and development in a non-production environment.Hot Backup of Database: DBackup provides hot backup in which no interference will happen to the usage of database during data backup period to guarantee the continuity of business.Data Encryption: Supports backup data encryption to ensure security of data storage.Data High Availability: Supports high availability protection of shared/ mirrored database cluster.Applications ProtectionSupports backup and recovery of popular office applications in different OSs including: Microsoft Exchange Server, Lotus Domino, Microsoft SharePoint, Microsoft Active Directory.Figure STYLEREF 1 \s 3- SEQ 图 \* ARABIC \s 1 4 Application SupportHot Backup: Supports hot backup for application data, business will not be disturbed during the backup process.Backup Types: For application database, it provides full backup, incremental backup, log backup, etc.Email Backup: Supports email data backup.DAOS Backup: For Lotus Domino, it supports file data backup which includes DAOS file backup.Data Recovery: Supports recovery of the original machine or the alter machine. Supports designated recovery of a single mail.OS ProtectionQuick backup for popular operating systems including Linux and Windows by simple graphical interface operations. In case of corrupt OS due to software or hardware failures, users can recover the system with the latest backup through various protocols like P2P, P2V and V2V.Figure STYLEREF 1 \s 3- SEQ 图 \* ARABIC \s 1 5 OS Protection ModuleInstant Recovery: Supports the backup data of Windows OS to be directly converted into data supported by virtual platforms such as VMWare, KVM, H3C, etc. and real-time recovery through the mount mode.Boot Recovery: Supports OS Bare-Matel Recovery to reduce the time to configure application environment after redeployment.Driver Replacement: A driver replacement interface is provided during OS recovery, allowing customers to adjust according to different drivers.Smooth Migration of Servers: Supports recovery models such as P2P, P2V, V2V for OS recovery. A complete solution for system upgrades, migration and large-scale deployment.Recovery for Specific Files: Supports data backup based on file level.Virtual Machine ProtectionSupports backup of virtual machines on virtual platforms like VMware, Hyper-V, Xen, Xen Server, KVM, FusionSphere, H3C CAS, OpenStack Newton, CNware etc., including virtual machines in multi-homed host cluster environment. Users can instantly recover it to a certain backup checkpoint in case of VM failures, data loss, corrupted applications and host damages.Figure STYLEREF 1 \s 3- SEQ 图 \* ARABIC \s 1 6 Efficient Protection of VMDBackup provides a complete VM protection program for the major virtualization platform at home and abroad.Agentless Backup: Supports agentless VM backup to reduce the consumption of host computing resources.Parallel Backup: Supports backup of multiple VMs on the same host computer at the same time to improve backup efficiency.Effective Data Backup: Only backs up valid data on VMs to reduce data storage space and the bandwidth occupied by data transmission.Cluster Backup: Supports VMs backup in cluster environment. When a VM is drifted, DBackup automatically tracks the location of the VM and accesses the information of the new host computer to ensure the correct execution of VM backup.Enhanced SecurityApply multiple authentications like USB-Key and account-password verification to ensure legitimate access and identify access source servers with machine fingerprint. It has built a strict role management system controlling the approval process of backup and recovery. In the meantime, it extracts characteristic information from the backup data to prevent unauthorized tampering and provides users with a high level of data security.1. Roles Collaboration: Establish mutual supervision and management among the following roles: system administrators, security administrators, auditors, operators, and etc.2. Identity Authentication: Multi-layer identity authentication mechanism is adopted to review the legitimacy of logged in users, and finger prints are required to verify identities in case of accessing servers.3. Approval Process: Implement strict security-administrator-approval system for system personnel and business process management.4. Digital Signature: The auditor confirms the approval information and uses digital signatures to protect the data from tampering. Figure STYLEREF 1 \s 3- SEQ 图 \* ARABIC \s 1 7 High Level Data Security ProtectionDisaster Recovery DrillDBackup can realize periodic disaster recovery drills of backup data for major databases. Users can restore backup data to the designated standby machine with a scheduled recovery to verify the availability of database backup set, and conduct disaster recovery drills for rapid data recovery in the event of data disaster.Figure STYLEREF 1 \s 3- SEQ 图 \* ARABIC \s 1 8 High Level Data Security ProtectionSupports regular automatic disaster recovery drills.Supports disaster recovery drills with the newest backup cluster.Recovery drills adopts various recovery means such as drills based on full data recovery, incremental data recovery and so on.Through data recovery drill, staff management skills can be improved, correctness of backup data can be verified, and data security management system can be optimized to ensure a smooth recovery operation and to minimize the loss of enterprises in case of a real data disaster. Data Disaster RecoveryHigh AvailabilityDBackup HAC (High Availability Cluster) is a solution adopting shared storage and mirroring HAC for customers' computer application system and core business data. It provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and to avoid irreversible data and financial losses brought by a single point of failure in the business.High Availability Based on Shared StorageBased on shared storage HAC solution, Active server and Standby Server can be combined in various HA forms such as one to one and one to many. Once the main node fails, the standby node can be started quickly to strengthen the core business system and realize its high availability.Mirroring High AvailabilityDBackup builds high availability cluster for enterprise core application through mirroring if shared storage cannot be built. DBackup can detect any change of data through real-time monitoring of active server and activate the standby server in case active server fails.Figure STYLEREF 1 \s 3- SEQ 图 \* ARABIC \s 1 9 High Availability ClusterCompatible with major OSs such as Windows and Linux.Supports various cluster nodes construction models such as one master one standby, one master multiple standbys and so on.Protects major applications such as Oracle, SQL Server, MySQL and Dameng, and protects more application softwares in a customized way.In order to support HA protection for more applications, DBackup provides customized settings that users can configure appropriate data synchronization command processing according to different applications, and provide mirroring HA protection and shared HA protection for business applications.Supports comprehensive real-time automatic fault monitoring including system failure, hardware failure, service failure and so on.The quorum disk detection mechanism is provided to effectively prevent brain-splitting problems brought by incorrect switching caused by network malfunction. Various detection modes such as special quorum disk, multi-link network monitoring, and multi-judgment are provided. Meanwhile, service can be automatically switched after malfunction is detected.CDPCDP (Continuous Data Protection) supports continuous protection of volume-level data. Through continuous monitoring of volume data changes, acquiring data log changes at the system level and storing them in the backup server in real time, when data disaster happens, it can rollback to any point based on data logs to meet enterprises' higher requirements on RTO and RPO.Figure STYLEREF 1 \s 3- SEQ 图 \* ARABIC \s 1 10 Continuous Data Protection (CDP)Real-time Monitoring: Build system-level monitoring system, and use volume-level data I/O message triggering as the driver to achieve real-time monitoring of the changing data.Instant Backup: With real-time monitoring, the capturing of volume-level changing data can reach the second-level, and backup window will be down to the minimum value that volume-level synchronization can realize.Instant Recovery: Create recovery virtual volume, rapidly build metadata bitmap in the virtual volume using data logs backed up in real time, and instantly restore them to the designated recovery server by volume mount technology to ensure business continuity.Data ReplicationDBackup builds master/slave database environment, and provides regular as well as quasi real-time data synchronous replication protection for Oracle, SQL Server, MySQL, and Dameng. When the maintenance personnel confirm malfunction of the master database, it can trigger the master/slave database switching service. DBackup will automatically switch the master database with the slave database to ensure the business continuity.Figure STYLEREF 1 \s 3- SEQ 图 \* ARABIC \s 1 11Database ReplicationZero Data LossZero data loss protection for Oracle databases. DBackup can be used for data backup protection as well as data synchronization for business takeover to meet enterprise data protection requirements at any level.Figure STYLEREF 1 \s 3- SEQ 图 \* ARABIC \s 1 12 Zero Data LossBased on real-time online log replication technology, the master database synchronizes new data to DBackup.Continuous rolling forward of logs on the emergency active server to ensure data synchronization between the standby server and the active server.Rolling forward based on redo logs to achieve zero data loss and real zero RPO.Off-site Disaster RecoveryBased on the “Two Places & Three Centers” model and synchronous replication among storage pools, DBackup stores backup sets in various servers and nodes, and both on site and off site. When disaster happens in the on-site production environment, off-site backup sets could be used for recovery in multiple sites & multiple servers environment to realize off-site disaster recovery as well as automatic business takeover.Figure STYLEREF 1 \s 3- SEQ 图 \* ARABIC \s 1 13 Off-site Protection in Backup EnvironmentData ManagementData DeduplicationThe accurate Deduplication of DBackup is based on Deduplication on the source system and integration of variable-length & fixed-length partitioning technologies, reduces redundancy among backup sets to the maximum amount through accurate data fingerprint comparison and efficiently utilize enterprise storage space.In the implementation of data Deduplication, hash algorithm is adopted after the data chunking process. “Fingerprint” is established for each chunk, and the system will check these data fingerprints and identify the “metadata” duplication.If the duplication is identified, only “metadata” pointer will be kept.If the “fingerprint” shows a chunk(or a file) is brand-new, the chunk will be kept and its relevant information will be stored as “metadata” for the future use.Figure STYLEREF 1 \s 3- SEQ 图 \* ARABIC \s 1 14 Accurate DeduplicationDBackup integrates variable-length & fixed-length partitioning technologies for different types of backup targets. Meanwhile, variable-length partitioning technology can improve pairing probability and efficiency of data chunks by dynamic partitioning of data objects in different scopes.Supports variable-length partitioning technology selected by users.Supports chunk size such as 4KiB, 128KiB, 256KiB, 512KiB by customized fixed-length partitioning technology.Provides users with effective partitioning technologies based on industry experience.Supports storage encryption for backup data after Deduplication.Provides life cycle management for backup data after Deduplication.Supports both source-side Deduplication and target-side de-duplcation.Data EncryptionDBackup provides a wide array of data encryption algorithms to ensure data security during network transfer and storage. Users can encrypt data during transfer and in the storage pool with an encryption algorithm of their own choice. Supports AES encryption algorithm. Users can choose different key lengths based on their security classification requirements.Supports Blowfish encryption algorithm.Data CompressionDBackup uses high-density data compression for backup data to reduce bandwidth occupation, improve backup efficiency and decrease the use of storage space.D2TBackup data transmission via LAN-based or LAN-Free network to physical or virtual tape libraries. When data recovery is required, backup data stored in tape libraries could be used for instant data recovery to target server.Figure STYLEREF 1 \s 3- SEQ 图 \* ARABIC \s 1 15 Disk to Tape StorageSupports direct backup data archiving of source-side to physical or virtual tap library.Supports media recycling in tape library.Supports direct recovery of backup sets from the tape library to the source terminal.D2CThe Cloud Gateway combines our disaster recovery software with cloud computing platform technology and stores local backup data directly to public clouds by means of D2C, D2D2C, D2T2C, and D2C2C. It currently supports AWS, Alibaba Cloud, Baidu Cloud, Microsoft Azure, Huawei Cloud, Tencent Cloud, Sina Cloud and other mainstream cloud platform storage.Figure STYLEREF 1 \s 3- SEQ 图 \* ARABIC \s 1 16 Local-to-Cloud CoordinationSupports various data transmission models such as D2C, D2D2C and D2T2C.Users can complete the cloud storage space link by configuring cloud storage access information provided by cloud service providers in DBackup, which reduces investment on local storage infrastructure and makes the most of cloud space.Supports regular data backup from clients or storage servers to cloud through job configuration to realize on-site and off-site data protection.Supports breakpoint-resume. When interruption happens during data transmission, it can continue processing again from the break point.Operation and Maintenance SupportBackup as a ServiceThe Multi-tenant is a backup cloud system based on DBackup which establishes an account mechanism for business units. Each account is for one tenant. A private backup space is created for multiple tenants in a shared backup environment to provide tenants with personalized business. It realizes the unified management of the backup system, reduces the investment in the construction of data security protection, and greatly simplifies the management of backup operation and maintenance in enterprises with complicated organization hierarchy.All tenants share the same physical backup environment. Tenants are provided with personalized business based on their backup and recovery needs. Independent data storage capacity is allocated to tenants and separate management can be achieved.Data isolation among tenants guarantees there is no interference among them.Figure STYLEREF 1 \s 3- SEQ 图 \* ARABIC \s 1 17 Backup Cloud ServiceBackup Speed ControlTo avoid massive transmission bandwidth taken up by data backup to affect users’ core business, DBackup provides customized speed limit setting that users can customize the maximum data transmission speed in different time periods.Supports customized data transmission speed between clients and storage servers.Supports customized speed of backup data replication among storage servers.Supports speed limit setting for multiple time periods.The minimum unit of transmission speed limit is MiB/s. Backup Protection ApproachesSupports various backup approaches including full backup, incremental backup, differential backup, log backup and synthetic backup; supports various recovery approaches including mount recovery, media recovery, checkpoint recovery and automatic disaster recovery.Backup Recovery StrategiesThe flexible backup strategy management platform allows users to have their backup scheduled to be done immediately or every minute, hour, week or month. Backup strategy could be customized according to enterprise information security requirements and backup/recovery will be carried out at a pre-set time or periodically. Supports immediate execution.Supports pre-set job running and executes the job only once.Supports periodical job running per hour/minute.Supports periodical job running daily or every N days.Supports periodical job running weekly or every N weeks.Supports periodical job running every month at a specified time.Access ManagementIt allows creating multiple users with specific authorizations assigned by the administrator to ensure users have the appropriate access or authorization. Based on close relationship of roles and clear authorization, users are divided into system users and audit users. System Users: System administrators, administrators,Operators, monitors, multi-tenant account administrators, multi-tenant operators, multi-tenant monitors.Audit Users: Audit administrator and auditor.Poor Network TransmissionWith DBackup’s unique poor network support technology, enterprises can enjoy reliable data protection service under restricted network condition. Under unstable network condition, efficient off-site backup and recovery could be achieved by breakpoint resume through local caching, which avoids heavy reliability on the costly, proprietary, high-speed, and fiber-optic network.LAN-Free EnvironmentIt supports not only LAN-Basebut also LAN-Free backup of files, operating systems, databases, application softwares and virtual machines to significantly improve backup speed and reduce IP network occupation.Unified Monitoring DBackup can construct a distributed multi-layer backup system and allows independent backup management for each section. It also provides a unified monitoring platform to manage data resources in every backup system and monitor job executing information, alerting information, resource occupation information and host connection information, which greatly reduces the difficulty of OAM of multi-sites backup.Figure STYLEREF 1 \s 3- SEQ 图 \* ARABIC \s 1 18 Distributed Multi-layer Management and Unified MonitoringMulti-dimensional StatisticsSupports multi-dimensional statistics displayed with figures. The administrator can either run statistics on system data or on some tenant’s data though an account. Storage size, hosts, resources, job speed, job time and other dimensions can be chosen, and export of statistical results will be supported to help users comprehensively understand the health condition of backup environment.Distinctive TechnologiesStorage Pool ManagementCreates a unified storage pool management system based on hyper convergence technology by incorporating all available enterprise storage spaces into the system. The convergence technology processes and virtualizes all available spaces, then redistribute them into different pools. The storage pool can provide a wide array of data services such as data archive, data deduplication and data replication.Users can create different pools of various sizes and types (local pool/Deduplication pool/tape pool/synthetic pool/object pool) upon different demands to utilize available storage spaces in a better way and improve utilization ratio in enterprises.Figure STYLEREF 1 \s 4- SEQ 图 \* ARABIC \s 1 1 Integrate Efficient Storage Resources of EnterprisesSupports SSD, SAS, NLSAS, and STAT;Supports popular tape libraries, virtual tape libraries and optical disk storage systems like IBM, Quantum, Tandberg and Amethystum.Supports storage space expansion of multiple storage servers in the same storage pool.Establishes various types of storage pools including standard storage pool, Deduplication storage pool, tape library pool, local storage pool, synthetic pool (file synthetic pool, database synthetic pool), real-time backup pool, and object storage pool.Supports storage data configuration of life cycle management based on the capacity usage setting.Supports storage data configuration of life cycle management through effective retention time.Supports customized numbers of permanent full backup data in the storage pool.Synthetic Backup of FilesIndex point relocation technology is adopted during DBackup file synthetic process. File index pointer is relocated to the new file data and the space occupied by the old file data will be reclaimed. A brand new virtual full backup data is established by the indication of file index pointer and associating new data.Synthetic backup of files supports any platform and environment, especially file backup through NFS and CIFS mount disks.Figure STYLEREF 1 \s 4- SEQ 图 \* ARABIC \s 1 2 File Backup ProcessIndex point relocation synthetic technology solves traditional synthetic problems and improves synthetic backup efficiency.By modifying the file index pointer, disk movement with a large amount of blocks can be avoided during the synthetic process and server’s I/O load can be reduced at the same time.Through virtual full backup to reduce backup recovery time and improve recovery efficiency.No need for a large amount of temporary storage space for file data synthesis.Synthetic Backup of Database Synthetic backup of database is based on its backup features and integrates file snapshot, mounting and other technologies. After the data file is copied to the backup server, the first step is to consolidate the backup data, and then generate a snapshot of the data, which can be instantly restored by mounting after the production data has failed.Figure STYLEREF 1 \s 4- SEQ 图 \* ARABIC \s 1 3 Database Synthetic Backup ProcessSupports SQL Server, Oracle 10g and higher version databases including single instances and RAC environment.The synthetic backup is based on backup features of Oracle and SQL Server to ensure backup stability.The block device and snapshot technologies are adopted to save full backup data at multiple backup time points.Instant recovery of backup data at every time point is realized through mounting.Continuous Log Real-time Protection (CLRP)CLRP is our independently developed technology targeting Oracle/Oracle RAC and MySQL database protection and meanwhile improving real-time data protection. It is a kind of block-based data backup technology. By monitoring messages in the file system and capturing change of redo and archive logs, it performs real-time continuous backup of log files.Figure STYLEREF 1 \s 4- SEQ 图 \* ARABIC \s 1 4 Continuous Log Real-time Protection (CLRP)DBackup CLRP realizes backup protection of changing data within the second, which pushes database protection technology to a new height.Main Advantages of CLRP:Reduce RPO to the second level, and the average RPO is 0.2 second.Real-time replicated changing data blocks are quite small and resource occupancy is superior to CDP.No soft or hard drivers are required and business system won't be affected. Recovery to any time point or SCN, and no standby emergency machine is required.OS Virtual MigrationUsers can transform Windows OS backup sets into virtual disk formats that are supported by VMware, KVM, H3C and CAS, and use such data for recovery if needed, which realizes the P2V and V2V fast migration of Windows OS platform.Hot Backup of MySQLHot backup of the MySQL database without interfering with its functionalities can perform instant data recovery to any point-in-time. Based on backup log, MySQL hot backup is much better than logical backup in application:The Hot backup is carried out while the database is operating to ensure business continuitySupports incremental backup and only backs up changed data. Backup efficiency has been greatly improved and disk space has been saved by smaller size of backup data.Almost all database entities can be recovered.Can perform recovery to any point-in-time and back to any state of the database to retrieve accidentally deleted or damaged data and ensure data completeness.Hot backup of InformixHot backup of the Informix database without interfering with its functionalities using ON-Bar can perform data recovery to any point-in-time.Supports data recovery to any point-in-time.Supports automatic setting using ON-Bar and no manual setting is needed.Can be easily integrated into the existing storage manager solutions.Supported EnvironmentSupported Backup and Storage Server PlatformsWindows OSWindows 2003/2008/2012 seriesLinux OSUbuntu Server 12.04/14.04Red Flag Asianux 2/3 seriesCentOS 4/5/6/7 seriesRed Hat Enterprise Linux 4/5/6/7 seriesNeoKylin 6.0 (Loongson)YHKylin 4.0 (FT 1500A)Kylin 4.02 (FT 1500A)NeoKylin 4.0 (FT 1000)iSoft Server OS 4.0iSoft Server OS 3.0/5.0 (Loongson)Supported Client PlatformsWindows OSWindows 2000/2003/2008/2012 seriesWindows XP SP3/7/8/10 seriesLinux OSRed Flag Asianux 2/3 seriesRed Flag DC 4.1/5.0 seriesRed Hat Enterprise Linux 3/4/5/6/7 seriesOracle Enterprise Linux 4/5/6/7 seriesCentOS 3/4/5/6/7 seriesopenSUSE 10.3/11.4 seriesSUSE Linux Enterprise Server 9/10/11 seriesNeokylin Linux Server 5/6 seriesUbuntu Server 12.04/14.04Debian 6.0/7.0/8.0 seriesIBM Power LinuxScientific Linux 4/5/6 seriesUNIX OSAIX 5.1/5.3/6.1/7.1 seriesSolaris 9/10/11 seriesHP-UX 11.11/11.23/11.31seriesDomestic OSNeoKylin 4 (FT 1000)YHKylin 4 (FT 1500A)Kylin 4.02 (FT 1500A)NeoKylin 6/7 (Loongson)NeoKylin 4/6 (Shenwei)Linux Rocky Secure Operating SystemLinux Secure Operating SystemiSoft Server OS 3.0、5.0 (Loongson)iSoft Server OS 4.0Inspur K1 UNXSupported Virtualization PlatformsPopular International Virtual PlatformsVMware vSphere 4.1/5.0/5.1/5.5/6.0/6.5KVM (qemu 1.0.0 ~ 2.8.0,libvirt 0.98 ~ 3.00)Xen 4.0 or above,libvirt 1.2.8 or aboveCitrix XenServer 6.2/6.5/7.0/7.1Hyper-V (Windows 8.1/Windows Server 2008 SP2/2008 R2 SP1/2012/2012 R2)~ Hosted ArchitectureHyper-V Server 2012/2012 R2 ~ Bare Metal ArchitectureOpenStack Newton/LibertyPopular Domestic Virtual PlatformsFusionSphere V100R005/V100R006 (5.0/5.1/6.0)CNware 6.0H3C CAS E0222/E0225/E0301/E0303/E0306Supported DatabasesPopular International Database SoftwareOracle 8i/9i/10g/11g/12cSQL Server 2000/2005/2008/2012/2014/2016MySQL 4/5/6Sybase 12.5/15.5/15.7/16.0PostgreSQL 8.1/8.4/9.2/9.3/9.4/9.5DB2 8.1/9.1/9.5/9.7/10.1/10.5/11.1Informix 11.5/11.7/ 12.1MongoDB 2.4/2.6/3.0/3.2/3.4Popular Domestic Database SoftwareShenTong 7.0DM 7.1Kingbase 7.1/8.0GBase 8a/8s/8tApplication SoftwareExchange 2000/2003/2007/2010/2013Lotus Domino 8.0/8.5/9.0MS SharePoint 2007/2010Supported Storage ObjectAmazon (AWS S3)Alibaba Cloud (OSS)Baidu Cloud (BOS)Huawei Cloud (OBS)Tencent Cloud (COS)Sina Cloud (SCS)KSYUN (KS3)Qiniu ( HYPERLINK "" \h Qiniu S3)e Cloud (CT-OOS)MTYUN (MSS)UCloud ( HYPERLINK "" \h UFile)QingCloud ( HYPERLINK "" \h QingStor)OStorage ( HYPERLINK "" \h OStorage)Microsoft Azure (Blob Storage)BC-oNestAbout ScutechScutech Corporation (Scutech), is a nationally certified high-tech enterprise with internationally advanced data backup technology. Scutech is devoted to the R&D and marketing of operation-and-maintenance-level storage and backup hardware-software products with independent intellectual property rights. Upholding the notion of “Develop Chinese Software, Innovate Top Technology” and the enterprise spirit of “Focus, Innovation, Cooperation, and Perseverance”, Scutech has been gradually introducing made-in-China backup & DR hardware-software solutions to the world, stepping towards its goal as an international storage backup brand.A National Brand Devoted to National Data SecurityChina Electronics Corporation (CEC) is a state-owned conglomerate formed on the basis of a research facility directly under the administration of the former MII (Ministry of Information Industry) and high-tech enterprises. As a strategic investment enterprise of CEC, Scutech has shouldered the responsibility of guarding national data security.To get rid of technological suppression from foreign products, Scutech and other related CEC subsidiaries worked together and successfully developed the first completely home-bred, autonomous and controllable backup and disaster recovery hardware-software integration platform based on domestic chips and operating systems, fundamentally solving the future problems of national information prehensive Development and Continuous InnovationScuetch Corporation with complete industrial chain involving autonomous and controllable storage, data management, backup, disaster recovery and information system can provide customers with comprehensive solution which consists of advanced disaster recovery backup, HA information system as well as cloud backup DR center design, implementation and services. Scutech data protection products with cost-effective feature and user-friendly interface achieve effective data protection. DBackup is a completely autonomous and controllable backup and DR platform which includes file backup, database backup, OS backup, virtual backup and etc. with unique functions such as zero data loss, business takeover, and disaster recovery drill. At the same time, it realizes hierarchical management, alarms, reports and other enterprise management functions.As the only information security and backup & DR management base of production, education and research, authorized by the Ministry of Industry and Information Technology, Scuetch Corporation undertakes a number of significant national information security projects. With strong technology, rigorous attitude, professional services, Scuetch Corporation will offer you trustworthy data protection. Address:Floor. 9 Building A5,Guangzhou Science City Headquarters Economic Zone, No. 243 Kexue Avenue, Guangzhou City, ?Guangdong Province, ChinaCode:510670460502089535Tel:+86 020 32053160Customer Service:400-995-1106Website: ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download