SlideShare a Scribd company logo
1 of 18
Small Office Home Office Continuous Data Protection (SOHO CDP)
Sponsored By: SYMANTEC
Domain :Systems Applications ( Data Protection )
2Symantec Confidential & Proprietary
Agenda
What is Continuous Data Protection (CDP)?
Overview Of Continuous Data Protection (Concept)Overview Of Continuous Data Protection (Concept)
Problem definition
Technological SpecificationsTechnological Specifications
Modules in CDPModules in CDP
CDP Software FeaturesCDP Software Features
ConstraintsConstraints
Future DevelopmentsFuture Developments
3Symantec Confidential & Proprietary
What is Continuous Data Protection (CDP)?
A methodology that continuously captures or tracks data
modifications
All data changes are stored independent of the primary data
Enables recovery points from any point in the past corresponding to
modifications
CDP Systems provide fine granularities of restorable objects to many
variable recovery points
4Symantec Confidential & Proprietary
Overview Of Continuous Data Protection (Concept)Overview Of Continuous Data Protection (Concept)
5Symantec Confidential & Proprietary
Problem DefinitionProblem Definition
To design a Small Office/Home Office oriented Continuous DataTo design a Small Office/Home Office oriented Continuous Data
Protection SoftwareProtection Software
The software must be able to store changes and backup continuouslyThe software must be able to store changes and backup continuously
data folders specified by the userdata folders specified by the user
The software must support remote browser based access, retrieval andThe software must support remote browser based access, retrieval and
efficient storage, search and retention management.efficient storage, search and retention management.
6Symantec Confidential & Proprietary
CDP Software FeaturesCDP Software Features
VersioningVersioning
Search by version and filename/contentSearch by version and filename/content
Access control for Administrator and clientAccess control for Administrator and client
7Symantec Confidential & Proprietary
Technological SpecificationsTechnological Specifications
Client-server architecture with windows XP on both client and serverClient-server architecture with windows XP on both client and server
Mini Filter Driver on client side using WDKMini Filter Driver on client side using WDK
Backup – Using service in VC++Backup – Using service in VC++
Retrieval – Using GUI in ASP .NETRetrieval – Using GUI in ASP .NET
8Symantec Confidential & Proprietary
Modules in CDPModules in CDP
1. Filtering1. Filtering
User modifies the active file.User modifies the active file.
Minifilter filters the specific IRPs.Minifilter filters the specific IRPs.
Gets information of the file that is modified.Gets information of the file that is modified.
A copy of the file is made, renamed and stored at a temporaryA copy of the file is made, renamed and stored at a temporary
location.location.
9Symantec Confidential & Proprietary
...Other Legacy Filters AND Filter Manager Instances...
I/O Path with The Filter ManagerI/O Path with The Filter Manager
NtReadFile() / NtWriteFile(), ...
I/O Manager
CacheManager
FAT NTFS RDR
Filter Manager Instance
IRP + Fast-I/O Interfaces
Legacy 3rd
Party Filter Driver(s) (e.g. Replication)
Filter Manager Instance
Mini-Filter
Mini-Filter
Mini-Filter
Mini-Filter
Mini-Filter
Consistent Invocation
(packet/call-back mechanism)
Other legacy & filter manager instances...
10Symantec Confidential & Proprietary
Client Active files Client saves the changes
to an active file
Various IRPs are
released
Specific IRPs are
captured by mini
filter
A renamed copy of file is
stored in a temporary location
for transfer
Filtering
11Symantec Confidential & Proprietary
Modules in CDPModules in CDP
2. Backup2. Backup
The renamed file is sent to the server from the temporary location.The renamed file is sent to the server from the temporary location.
The temporary copy on client side is deleted.The temporary copy on client side is deleted.
The server stores the versions of files corresponding to the clients.The server stores the versions of files corresponding to the clients.
12Symantec Confidential & Proprietary
Files from temporary
location
File name, location and time
stamp are sent to the server
A file with same name is
created at a similar
location on the server
File content is sent to
the server
The file on the server is
updated and saved as a
new version
The temporary copy on
client is deleted
Continuous Backup Process
13Symantec Confidential & Proprietary
14Symantec Confidential & Proprietary
Modules in CDPModules in CDP
3. Retrieval3. Retrieval
Through a GUI, the client can view, search and select file versionsThrough a GUI, the client can view, search and select file versions
for retrieval.for retrieval.
Client can search file versions by name and/or timestamp.Client can search file versions by name and/or timestamp.
Files can be viewed or retrieved as per choice.Files can be viewed or retrieved as per choice.
15Symantec Confidential & Proprietary
16Symantec Confidential & Proprietary
ConstraintsConstraints
 The size of storage volume.The size of storage volume.
 No protection against server crashNo protection against server crash
17Symantec Confidential & Proprietary
Future DevelopmentsFuture Developments
Disaster Recovery (Client and Server)Disaster Recovery (Client and Server)
Incremental BackupIncremental Backup
18Symantec Confidential & Proprietary
Thank YouThank You

More Related Content

Similar to INCPresentation

Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationPrem Rao
 
Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Andrew Adam
 
Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Rajesh Kumar
 
Basics of IBM Tivoli Storage Manager
Basics of IBM Tivoli Storage ManagerBasics of IBM Tivoli Storage Manager
Basics of IBM Tivoli Storage Managerimagineers7
 
Truly non-intrusive OpenStack Cinder backup for mission critical systems
Truly non-intrusive OpenStack Cinder backup for mission critical systemsTruly non-intrusive OpenStack Cinder backup for mission critical systems
Truly non-intrusive OpenStack Cinder backup for mission critical systemsDipak Kumar Singh
 
Backup & restore in windows
Backup & restore in windowsBackup & restore in windows
Backup & restore in windowsJab Vtl
 
Storage Server & Brach Cache
Storage Server & Brach CacheStorage Server & Brach Cache
Storage Server & Brach CacheAmit Gatenyo
 
OpenStack Tokyo Talk Application Data Protection Service
OpenStack Tokyo Talk Application Data Protection ServiceOpenStack Tokyo Talk Application Data Protection Service
OpenStack Tokyo Talk Application Data Protection ServiceEran Gampel
 
Projects, Roles & Responsibilities
Projects, Roles & ResponsibilitiesProjects, Roles & Responsibilities
Projects, Roles & ResponsibilitiesSaud Nazeer
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSahithi Naraparaju
 
cynapspro endpoint data protection - installation guide
cynapspro endpoint data protection - installation guidecynapspro endpoint data protection - installation guide
cynapspro endpoint data protection - installation guidecynapspro GmbH
 
Securing Your Enterprise Web Apps with MongoDB Enterprise
Securing Your Enterprise Web Apps with MongoDB Enterprise Securing Your Enterprise Web Apps with MongoDB Enterprise
Securing Your Enterprise Web Apps with MongoDB Enterprise MongoDB
 
Continuous data protection
Continuous data protectionContinuous data protection
Continuous data protectionssuser1eca7d
 
Windows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate LearningWindows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate LearningAcend Corporate Learning
 
TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014
TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014
TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014Symantec
 

Similar to INCPresentation (20)

Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
 
SOFTCAMP SHIELDEX AD
SOFTCAMP SHIELDEX AD SOFTCAMP SHIELDEX AD
SOFTCAMP SHIELDEX AD
 
Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01
 
Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01
 
Basics of IBM Tivoli Storage Manager
Basics of IBM Tivoli Storage ManagerBasics of IBM Tivoli Storage Manager
Basics of IBM Tivoli Storage Manager
 
edeploy
edeployedeploy
edeploy
 
Truly non-intrusive OpenStack Cinder backup for mission critical systems
Truly non-intrusive OpenStack Cinder backup for mission critical systemsTruly non-intrusive OpenStack Cinder backup for mission critical systems
Truly non-intrusive OpenStack Cinder backup for mission critical systems
 
Backup & restore in windows
Backup & restore in windowsBackup & restore in windows
Backup & restore in windows
 
Storage Server & Brach Cache
Storage Server & Brach CacheStorage Server & Brach Cache
Storage Server & Brach Cache
 
OpenStack Tokyo Talk Application Data Protection Service
OpenStack Tokyo Talk Application Data Protection ServiceOpenStack Tokyo Talk Application Data Protection Service
OpenStack Tokyo Talk Application Data Protection Service
 
Projects, Roles & Responsibilities
Projects, Roles & ResponsibilitiesProjects, Roles & Responsibilities
Projects, Roles & Responsibilities
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
 
cynapspro endpoint data protection - installation guide
cynapspro endpoint data protection - installation guidecynapspro endpoint data protection - installation guide
cynapspro endpoint data protection - installation guide
 
Securing Your Enterprise Web Apps with MongoDB Enterprise
Securing Your Enterprise Web Apps with MongoDB Enterprise Securing Your Enterprise Web Apps with MongoDB Enterprise
Securing Your Enterprise Web Apps with MongoDB Enterprise
 
Continuous data protection
Continuous data protectionContinuous data protection
Continuous data protection
 
optimizing_ceph_flash
optimizing_ceph_flashoptimizing_ceph_flash
optimizing_ceph_flash
 
Pentesting iOS Apps
Pentesting iOS AppsPentesting iOS Apps
Pentesting iOS Apps
 
Windows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate LearningWindows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate Learning
 
What's New in Windows 7
What's New in Windows 7What's New in Windows 7
What's New in Windows 7
 
TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014
TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014
TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014
 

INCPresentation

  • 1. Small Office Home Office Continuous Data Protection (SOHO CDP) Sponsored By: SYMANTEC Domain :Systems Applications ( Data Protection )
  • 2. 2Symantec Confidential & Proprietary Agenda What is Continuous Data Protection (CDP)? Overview Of Continuous Data Protection (Concept)Overview Of Continuous Data Protection (Concept) Problem definition Technological SpecificationsTechnological Specifications Modules in CDPModules in CDP CDP Software FeaturesCDP Software Features ConstraintsConstraints Future DevelopmentsFuture Developments
  • 3. 3Symantec Confidential & Proprietary What is Continuous Data Protection (CDP)? A methodology that continuously captures or tracks data modifications All data changes are stored independent of the primary data Enables recovery points from any point in the past corresponding to modifications CDP Systems provide fine granularities of restorable objects to many variable recovery points
  • 4. 4Symantec Confidential & Proprietary Overview Of Continuous Data Protection (Concept)Overview Of Continuous Data Protection (Concept)
  • 5. 5Symantec Confidential & Proprietary Problem DefinitionProblem Definition To design a Small Office/Home Office oriented Continuous DataTo design a Small Office/Home Office oriented Continuous Data Protection SoftwareProtection Software The software must be able to store changes and backup continuouslyThe software must be able to store changes and backup continuously data folders specified by the userdata folders specified by the user The software must support remote browser based access, retrieval andThe software must support remote browser based access, retrieval and efficient storage, search and retention management.efficient storage, search and retention management.
  • 6. 6Symantec Confidential & Proprietary CDP Software FeaturesCDP Software Features VersioningVersioning Search by version and filename/contentSearch by version and filename/content Access control for Administrator and clientAccess control for Administrator and client
  • 7. 7Symantec Confidential & Proprietary Technological SpecificationsTechnological Specifications Client-server architecture with windows XP on both client and serverClient-server architecture with windows XP on both client and server Mini Filter Driver on client side using WDKMini Filter Driver on client side using WDK Backup – Using service in VC++Backup – Using service in VC++ Retrieval – Using GUI in ASP .NETRetrieval – Using GUI in ASP .NET
  • 8. 8Symantec Confidential & Proprietary Modules in CDPModules in CDP 1. Filtering1. Filtering User modifies the active file.User modifies the active file. Minifilter filters the specific IRPs.Minifilter filters the specific IRPs. Gets information of the file that is modified.Gets information of the file that is modified. A copy of the file is made, renamed and stored at a temporaryA copy of the file is made, renamed and stored at a temporary location.location.
  • 9. 9Symantec Confidential & Proprietary ...Other Legacy Filters AND Filter Manager Instances... I/O Path with The Filter ManagerI/O Path with The Filter Manager NtReadFile() / NtWriteFile(), ... I/O Manager CacheManager FAT NTFS RDR Filter Manager Instance IRP + Fast-I/O Interfaces Legacy 3rd Party Filter Driver(s) (e.g. Replication) Filter Manager Instance Mini-Filter Mini-Filter Mini-Filter Mini-Filter Mini-Filter Consistent Invocation (packet/call-back mechanism) Other legacy & filter manager instances...
  • 10. 10Symantec Confidential & Proprietary Client Active files Client saves the changes to an active file Various IRPs are released Specific IRPs are captured by mini filter A renamed copy of file is stored in a temporary location for transfer Filtering
  • 11. 11Symantec Confidential & Proprietary Modules in CDPModules in CDP 2. Backup2. Backup The renamed file is sent to the server from the temporary location.The renamed file is sent to the server from the temporary location. The temporary copy on client side is deleted.The temporary copy on client side is deleted. The server stores the versions of files corresponding to the clients.The server stores the versions of files corresponding to the clients.
  • 12. 12Symantec Confidential & Proprietary Files from temporary location File name, location and time stamp are sent to the server A file with same name is created at a similar location on the server File content is sent to the server The file on the server is updated and saved as a new version The temporary copy on client is deleted Continuous Backup Process
  • 14. 14Symantec Confidential & Proprietary Modules in CDPModules in CDP 3. Retrieval3. Retrieval Through a GUI, the client can view, search and select file versionsThrough a GUI, the client can view, search and select file versions for retrieval.for retrieval. Client can search file versions by name and/or timestamp.Client can search file versions by name and/or timestamp. Files can be viewed or retrieved as per choice.Files can be viewed or retrieved as per choice.
  • 16. 16Symantec Confidential & Proprietary ConstraintsConstraints  The size of storage volume.The size of storage volume.  No protection against server crashNo protection against server crash
  • 17. 17Symantec Confidential & Proprietary Future DevelopmentsFuture Developments Disaster Recovery (Client and Server)Disaster Recovery (Client and Server) Incremental BackupIncremental Backup
  • 18. 18Symantec Confidential & Proprietary Thank YouThank You

Editor's Notes

  1. <number>