Your SlideShare is downloading. ×

IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Technology for SMEs

367
views

Published on

On July, 20th, 2010 IBM announced the IBM TS7610 ProtecTIER® Deduplication Appliance Express, a complete deduplicated storage subsystem for Small Medium Enterprises (SMEs) and remote offices. The new …

On July, 20th, 2010 IBM announced the IBM TS7610 ProtecTIER® Deduplication Appliance Express, a complete deduplicated storage subsystem for Small Medium Enterprises (SMEs) and remote offices. The new subsystem is the newest and smallest member of the ProtecTIER series–a leading enterprise-suitable deduplication technology, which IBM acquired from Diligent Technologies in 2008 and continues to develop and enhance at a remarkable pace. The TS7610 uses the same ProtecTIER software found in their larger TS7650 solutions, has the same ProtecTIER functionality, is pre-configured (ready to use) and offers very competitive CapEx and OpEx pricing. Learn More: http://ibm.co/ONeH7m


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
367
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. GmbH Enterprise Servers, Storage and Business Continuity IBM TS7610 ProtecTIER® Deduplication Appliance Express – Enterprise Level Technology for SMEs Josh Krischer is an expert IT advisor with 40 years of experience in high-end computing, storage, disaster recovery, and data center consolidation. Currently working as an independent analyst at Josh Krischer & Associates GmbH, he was formerly a Research Vice President at Gartner, covering mainframes, enterprise servers, storage and disaster recovery techniques from 1998 until 2007. He spoke on these topics and others at a multitude of worldwide IT events, including Gartner conferences and symposia, industry and educational conferences, as well as major vendor events.Table of ContentsContentsJuly 2010 Introduction .................................................................................................................... 1Introduction ..................................................................................................................................... 2Virtual Tape and Data Deduplication ............................................................................................. 2 Virtual Tape Libraries ............................................................................................................. 2 Data Deduplication ................................................................................................................. 3Users’ Requirements for Deduplication.......................................................................................... 4TS7610 ProtecTIER® Deduplication Appliance Express - Overview ............................................ 4Market and Economical Considerations ......................................................................................... 5Bottom Line .................................................................................................................................... 6 Josh KrischerJuly 2010 © Josh Krischer & Associates GmbH. All rights reserved. P a g e |1 IBM TS7610 ProtecTIER® Deduplication Appliance Express Enterprise level technology for SMEs
  • 2. GmbH Enterprise Servers, Storage and Business ContinuityIntroduction On July, 20th, 2010 IBM announced the IBM TS7610 ProtecTIER® Deduplication Appliance Express, a complete deduplicated storage subsystem for Small Medium Enterprises (SMEs) and remote offices. The new subsystem is the newest and smallest member of the ProtecTIER series–a leading enterprise-suitable deduplication technology, which IBM acquired from Diligent Technologies in 2008 and continues to develop and enhance at a remarkable pace. The TS7610 uses the same ProtecTIER software found in their larger TS7650 solutions, has the same ProtecTIER functionality, is pre-configured (ready to use) and offers very competitive CapEx and OpEx pricing.Virtual Tape and Data Deduplication IBM’s ProtecTIER is a proven enterprise-class virtual tape library with inline embedded data deduplication. For many years tape was the only media used to store backups. However, in the last decade, disk technologies have been gaining wider acceptance with many organizations. While tapes force to access their data sequentially, disk drives allow direct random access, enabling multiple concurrent backup sessions and better performance. The resulting productivity gains and lowered operating expense can lead to significant time and cost savings. Virtual Tape Libraries A Virtual Tape Library (VTL) is a virtualization feature that gives disk storage the look and feel of a tape library. Standard backup applications cannot distinguish between a VTL and a physical tape library, which simplifies operation and makes the backup process fully transparent. There are two types of VTLs: stand-alone, which includes only the emulation on disk subsystems, and integrated VTLs containing physical tape libraries connected to the VTL. Regular daily backups can be directed to the VTL to exploit disk technology advantages, but when the data on a virtual tape needs to be archived, the backup application or the VTL control program copies the data from the virtual tape to a physical tape (cloning operation). For restore operations, the major backup applications are able to access backups on the virtual tape or a physical tape mounted in the library. Backup applications track tapes by barcode labels and therefore are confused if two “tapes” have the same barcode label. © Josh Krischer & Associates GmbH. All rights reserved. P a g e |2 IBM TS7610 ProtecTIER® Deduplication Appliance Express Enterprise level technology for SMEs
  • 3. GmbHEnterprise Servers, Storage and Business ContinuityHence, the physical tape usually carries a different barcode than the virtual one despite thatboth contain the same data. If the original virtual tape is deleted, the physical tape can beimported and the backup application’s catalog should be updated.Two major disadvantages of VTL technology are the relative high cost of disks in comparisonto tapes and its limited scalability. Two technologies address these problems: high-capacity,low-price SATA type disks and data deduplication.There is no doubt that disk subsystems are faster and inherently more reliable than tapesolutions; therefore, using virtual tapes for backup reduces failure rates, allows for smallerbackup windows, and significantly speeds up recovery. Still, tape retains a vital role inbackup and recovery operations, especially when it comes to portability and long term dataretention requirements.Data DeduplicationDeduplication aims to eliminate redundant data. Currently it is mainly used in backup andarchiving. While it can be employed for any data, this is not recommended due toperformance considerations. The deduplication process divides the data into blocks (orchunks) and builds a catalog based on the contents of these blocks, which is stored asmetadata. This metadata indexes individual blocks of unique information. Upon new writes(subsequent backup, for example), the deduplication mechanism identifies which dataelements are unique, stores them on disk, and updates the metadata. For the non-uniquedata elements, only references are created without actually storing the data.There are two basic implementations: inline and post processing. With the inline technique,as data is received by the target device, it is deduplicated in real-time. Post processing, onthe other hand, first allows the entire data stream to be stored on disk temporarily, which isthen read back off-line and then processed by a deduplication engine. All of IBM’sProtecTIER solutions use inline processing.Data deduplication vendors deploy different methods to detect unique information. Mostvendors create a data-dependent fingerprint by applying a hashing algorithm on data blocksand comparing the result with previously calculated hashes. The hash results are usuallystored on a disk as well. ProtecTIER uses a unique pattern matching and differencingalgorithm (HyperFactor®) that identifies duplicate data. HyperFactor, IBM’s patented© Josh Krischer & Associates GmbH. All rights reserved. P a g e |3 IBM TS7610 ProtecTIER® Deduplication Appliance Express Enterprise level technology for SMEs
  • 4. GmbH Enterprise Servers, Storage and Business Continuity deduplication technology, first identifies “similar data” using a small key that fits into a deduplication appliance server’s memory-resident index and is not stored on disk. If an element looks similar, HyperFactor then performs a bit-level comparison between the new data and the similar data, storing only the bit-level differences. This unique method is more efficient because it dramatically reduces disk accesses for indexing, thus maintaining consistently high performance and scalability; at the same time it ensures full data integrity. Users’ Requirements for Deduplication Users require several important properties from a deduplication subsystem: data integrity, performance (sustained throughput in MB/s per node, number of nodes), scalability, application transparency, product maturity (customer references), price, and ease-of-use. As mentioned above, most deduplication subsystems useBit comparison techniques such hashing algorithms to develop the unique chunk signature. Theas the one used by ProtecTIER risk of hash collision (the same signature for two different datawere designed to provide 100%data integrity by avoiding the chunks) is very low statistically, but such risk may be realized inrisk of hash collisions. very large environments; when it does, there is no way of knowing about it until the data needs to be retrieved/restored. Deduplication performance is the result of two processes: identification of duplicate data, which requires a database or index look-up, and a store operation in the repository. ProtecTIER’s HyperFactor algorithm creates a relatively small index, which allows the deduplication appliance to keep the index in its memory, thus increasing performance and scalability as well as enabling overall system throughput to run at speeds greater than 80 MB/s for the new TS7610 and 1000+ MB/s for their enterprise-class systems. In addition, as we have tested and validated previously, ProtecTIER’s native IP-based replication works transparently with any of the major backup applications and is flexible and easy to use. TS7610 ProtecTIER® Deduplication Appliance Express - Overview IBM’s TS7610 ProtecTIER® Deduplication Appliance Express is available as a 3U standard 19” rack-mounted enclosure. It features one quad-core 2.33 GHz Intel XEON processor and twelve 1 TB SATA Drives, which are RAID 6 protected. Two configurations are supported, with 4.0 TB or 5.4 TB useable physical capacity, respectively (see Figure 1). Both © Josh Krischer & Associates GmbH. All rights reserved. P a g e |4 IBM TS7610 ProtecTIER® Deduplication Appliance Express Enterprise level technology for SMEs
  • 5. GmbH Enterprise Servers, Storage and Business Continuity configurations support sustained write performance of more than 80 MB/s, which usually exceeds the backup data bandwidth of SMEs. Figure 1: IBM TS7610 ProtecTIER® Deduplication Appliance Express (source IBM) The software used on the TS7610 is identical to the rest of the ProtecTIER series, supporting the same functionality. It supports full, incremental, and differential backups while integrating seamlessly with real physical tape library resource management. When it is a target of the backup application, a ProtecTIER subsystem presents itself as a single tape library (or several libraries) to the system. The backup application manages the “cartridges” within a ProtecTIER system as if they were real cartridges. It can perform read and write operations as with physical tape. In addition, it can import and export cartridges, track the cartridges with barcodes, and perform many other tape library operations.Market and Economical Considerations IBM is targeting the TS7610 at SMEs that currently use tapes or non-deduplicated VTLs. The suggested pricing levels will be below the major competitive devices available on the market. By using the deduplication capabilities of ProtecTIER, users can lower their CapEx and © Josh Krischer & Associates GmbH. All rights reserved. P a g e |5 IBM TS7610 ProtecTIER® Deduplication Appliance Express Enterprise level technology for SMEs
  • 6. GmbH Enterprise Servers, Storage and Business Continuity OpEx investments significantly. The major savings come from procurement and smaller disk space, which means lower investment, service, energy, and storage management costs. In addition to financial savings, carbon-dioxide emissions are also lowered, yielding a better environmental footprint. The TS7610 comes preconfigured, which ensures easy installation and integration. It sports an intuitive, easy to use GUI, which requires less storage management attention and man-power. By porting the ProtecTIER appliance standard software onto Large companies wishing to consolidate backups to the the TS7610, IBM delivers enterprise class deduplication for SMEs. main office is another target for this solution. For such deployments, the “one-to-many” native replication feature can be used. It can conduct data transfers from up to 12 branch offices (spokes) to the main target (hub), supporting a mix and match of ProtecTIER Gateways, large appliances (single or two-node clusters), and TS7610 appliances if required. ProtecTIER replicates just the deduplicated data, which can be up to 25 times smaller than the raw data, meaning that the required transmission bandwidth can be significantly lower and cheaper. The replicated data is compressed, which again reduces data traffic. The replication feature license scheme is based on tiered deduplicated capacity, which in most cases is much lower than a disk replication license based on raw capacity. The transmission costs in data replication are sometimes the biggest part of disaster recovery OpEx.Bottom Line As seen from above the major benefits of IBM TS7610 ProtecTIER are:  Easy to deploy, plug-and-play  Affordable pricing scheme  Simple to use, user friendly GUI  Fully compatible with the rest of IBM ProtecTIER deduplication solutions, supporting the same enterprise type features  Its full transparency supports all backup applications without changes which allow fast deployment and usage  By porting the ProtecTIER appliance standard software onto the TS7610, IBM delivers enterprise-class deduplication appliance tailored for SMEs requirements © Josh Krischer & Associates GmbH. All rights reserved. P a g e |6 IBM TS7610 ProtecTIER® Deduplication Appliance Express Enterprise level technology for SMEs
  • 7. GmbHEnterprise Servers, Storage and Business ContinuityAll the benefits mentioned above match the requirements of typical SME users.Users new to VTLs may significantly improve their backup and archiving reliability, as well asrecovery times at acceptable costs by exploiting deduplication benefits. The highdeduplication factor allows keeping a vast amount of data online, and for most SMEs, it maycompletely replace magnetic tape libraries.IBM continues to invest heavily in Data Protection – Backup & Recovery. IBM’s ProtecTIERis the only deduplication technology on the market today that is enterprise-class proven inthe largest data centers worldwide. IBM is now leading the market by bringing that powerfuland proven deduplication technology, in an easy-to-install and simple-to-manage set ofofferings and has priced it to be in line with the needs and budget possibilities of any large ormedium-sized organization.© Josh Krischer & Associates GmbH. All rights reserved. P a g e |7 IBM TS7610 ProtecTIER® Deduplication Appliance Express Enterprise level technology for SMEs TSW03058-USEN-00