SlideShare a Scribd company logo
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup7.6Deduplication Technology
NetBackup 7.6 Deduplication Technology
NetBackup 7.6 Overview
The Symantec NetBackup Platformisa completebackupandrecoverysolutionthatisoptimized for
virtually any workload, includingphysical,virtual, arrays, or big data infrastructures. NetBackup
delivers flexibletargetstorageoptions, such as tape, 3rd
-party disk, cloud, or appliance storage
devices,includingtheNetBackup Deduplication Appliances and Integrated Backup Appliances.
NetBackup 7.6 delivers the performance, automation, and manageability necessary to protect
virtualized deploymentsatscale–wherethousandsof Virtual Machinesand petabytes of data are
the normtoday,andwheresoftware-defined data centers and IT-as-a-service become the norm
tomorrow. Enterprises trust Symantec.
Key Benefits
 Comprehensive –As a singlesolution to protectall of your data assets,NetBackup provides
supportforvirtually every popularserver,storage,hypervisor,database, and application
platform used in the enterprise today.
 Scalable–High performance,elasticautomation,andcentralized management based on a flexible, multitier architecture
enables NetBackup to adapt to the growing needs of a fast-paced, modern enterprise data center.
 Integrated –Frombackupappliancesto bigdataplatforms,NetBackup integrates at every point in the technology stack to
improvereliability and performance. OpenStorage Technology (OST) provides even tighter integration with third-party
storage and snapshot solutions.
 Innovative–With hundredsof patentsawarded in areas including backup, recovery, virtualization, deduplication, and
snapshot management, NetBackup continues a long tradition of bringing advanced technologies to market first.
 Proven –For over a decade,NetBackuphasled the industry as the most popular enterprise data protection software by
marketshareandisused by many of thelargestenterprises on the planet. When you need your data back, you can trust
NetBackup.
Key Features
 One platform, one console unifies virtual and physical global data protection
 Unified global management of snapshots, replicated snapshots, backup, and recovery
 Scalable, global deduplication across virtual and physical infrastructures
 V-Ray one pass backup, instant image and single file restore for virtual and physical
 Automated virtual data protection and load balanced backup performance
Deduplication Overview
Deduplication isdefined astheelimination of redundantdatafromdisk storage. NetBackup deduplication uses a hash algorithm to
providea uniqueidentifier,or fingerprint, to datasegmentswithin a clientbackup stream. These fingerprints enable NetBackup to
identify clientdatasegmentsthatareidentical to oneanother,whichcanthen beused to prevent the same data from being stored
multiple times while still allowing the data to be restored when necessary.
Backup and archiveinfrastructures areideal candidatesfor deduplication due to the redundant nature of backed up and archived
data.For example,in many backupinfrastructures mostof thedatabacked upduringa full backupisidentical to that of the previous
full backup. Deduplication prevents storing multiple copies of the identical data.
KeyBenefits
 Powerful, enterprise-class data
deduplication technology
 Dramatic optimization of disk-
based backup storage
 Flexible implementation
choices, including server and
client deduplication
 Purpose-built appliance
solutions for streamlined
implementation and
management
 Support for OST-compliant
deduplication storage devices
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup7.6Deduplication Technology
Figure 1: Deduplication overview
In addition to thesignificantstoragesavingsthatareprovided by deduplicationtechnology,timeand otherresources arealso saved.
Although manyvendorsprovidetheabilityto performdeduplicationatthe storagetarget,usually atthe backup storage location or
appliance,beingableto deduplicatedataatthesource,or theclient,providestheability to significantly reduce network bandwidth
utilization, and can speed up the entire backup process. NetBackup supports deduplication at the target – also referred to as
NetBackup Media Server Deduplication (MSDP) – as well as client deduplication.
NetBackup Deduplication Options
NetBackup offersseveral optionsfor implementingdeduplication. Symantec’sfirstdeduplication product was PureDisk, which is a
stand-alone application.
Soon after Symantec released the PureDisk product, it was integrated into NetBackup through an option called the PureDisk
Deduplication Option,or PDDO,in which NetBackupused thePureDisk environmentasa deduplicationstorageunit.PureDisk is now
deprecated as a software form.
Another deduplicationoptionthatisavailableisNetBackupMediaServer Deduplication, or MSDP. An MSDP server is a NetBackup
media serverthatprovidesa built-inmethod for NetBackupto supportdeduplication withouttheneed for complex hardware.Prior to
NetBackup 7.5,theMSDP storagelimitwas32TB.In NetBackup 7.5 the limit was increased to 64TB. NetBackup can also perform
deduplication at the source, using a technology called client deduplication.
As another alternative,Symantec offerstheNetBackup5200-seriesappliances thatsupportdeduplication,andfromNetBackup7.6.1,
the 5300 seriesappliances.The5200and 5300 series appliances are effectively NetBackup media servers than have NetBackup
installed and preconfigured to performdeduplication.The5230 cansupportup to 144TBof deduplicated storage,whilstthe5330 can
support up to 229TB, as shown in figure 2.
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup7.6Deduplication Technology
Figure 2: NetBackup deduplication-enabled appliances
Finally,certain third-party vendors provide appliances that support NetBackup’s OpenStorage Technology (OST). Some of these
appliancessupportdeduplication.ChecktheSymantec NetBackup hardwarecompatibility list to determine the vendor appliances
that support this capability. http://www.symantec.com/business/support/index?page=content&id=TECH76495
How NetBackup Deduplication Works
Whilea backup job isrunning,NetBackup determines whatclientdataneedsto bebackedup. For each filethatisbacked up, the file
metadata –includingfilepermissions,directorylocation, and file name – is separated from the actual content of the file. The file
metadata is saved in the deduplication database.
The filecontentisbrokendown into smaller 128 KBsegments.In figure3,thisisrepresented by segments A, B, C, and D for File 1. A
hash fingerprintiscalculated for each segment. Thedata segmentfingerprintsarecompared againstthefingerprints of datasegments
thathavealready been stored in deduplicationstorage,in order to identify uniquedata segments.Only theuniquedatasegmentsare
sent to deduplication storage, along with the file metadata.
Itis importantto notethatfilesegmentsarechecked for uniquenessacrossall clients’backupdata,notjust for an indivi dual client.
This meansthatif an identical datasegmentexistson multipleclients,only a singlecopy of that data segment is written to storage.
The metadata storagetracksall themetadatafor each filethatisbacked up.Thecontentstoragetrackseachfileand all thesegments
thatareassociated with that file to enable NetBackup to put the file back together. In figure 2, data segments A, B, C, and D are
required to restore File 1.
Next, when File2 is backed up, the file is separated into metadata and content. The file contents are broken down into 128 KB
segments and a fingerprintiscalculated for eachsegment.SinceFile2 isslightly differentthanFile1,segmentsEand F are determined
to haveuniquefingerprints,whilesegmentsAand C havethesamefingerprintsassegmentsthatarealready stored in the database.
SincesegmentsEand F areunique,they aresentto storageand anotation ismadethatFile 2 iscomprised of segmentsA,E, C, and F.
This process continues for each file in the backup job, until all files are processed.
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup7.6Deduplication Technology
Figure 3: NetBackup deduplication example
Media Server and Client Deduplication Comparison
NetBackup providesthecapabilityto performbothmediaserverdeduplication and client-side deduplication, as shown in figure 4.
Depending on the circumstances, one deduplication method might be more beneficial than the other.
When usingNetBackupmediaserverdeduplication,theclientsends the entire backup data stream over the network to the media
server.Thededuplicationmedia server performsthefingerprinting.Itdetermineswhich data segments are unique and which data
segments have an exact fingerprint match that has been stored previously.
The media server sendsonlytheuniquedatasegments,thededuplicated data stream, to deduplication storage. The advantage of
performingdeduplication on themediaserver isthattheCPUof theclientisnotimpacted by fingerprintingactivity thatoccursduring
the backup.Potentialdisadvantagesarethatall backup datamustbesentover thenetwork,and thatheavydeduplication loads can
affect the overall performance of the media server.
When using client-side deduplication, the segmenting of client files and the fingerprinting of the resulting data segments, is
performed by theDeduplicationplug-inon theclientsystem.After comparingwith alocal fingerprintcache, or communicating with
the deduplication mediaserverto determinewhichdata segmentsareunique,only theuniquedatasegments,thededuplicated data
stream,issentover thenetwork to thededuplication mediaserver,which then writes thededuplicated datato deduplicationstorage.
Client-sidededuplicationhastheadvantagesof distributingthefingerprintingworkloadto theclients,aseach client deduplicates its
own backup data,andsendsonly uniqueclientdatasegmentsover thenetwork.Thiscan greatly reducethenetwork utilization. The
potential disadvantageof client-sidededuplicationistheadditionalloadthatisplaced on theclient’s CPU to perform dedupli cation
during the backup.
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup7.6Deduplication Technology
Figure 4: Media server and client deduplication
The good news isthatNetBackupcustomershavecapability to use client-side deduplication for those clients where that method
provides the greatest benefit, while simultaneously performing deduplication on the media server for other clients.
Summary
The Symantec Backup and Recovery productfamily offersmarket-leadingbackup and disasterrecoverysolutionsfor criticalcustomer
ITresources. Thisincludespowerful and proven storageoptimization technologies,such asdatadeduplication, that help customers
manage data growth and backup storage costs to lower overall total cost of ownership.
Feedback
Pleasetakea minuteto providefeedback on thisdocumentby clickingon this FEEDBACKLINK.This will redirect you to Adobe Forms
where you can fill out a very short form. This will take less than a minute and help us improve our documentation.
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup7.6Deduplication Technology
For More Information
Link Description
http://www.netbackup.com/ NetBackup Home Page
http://www.symantec.com/docs/TECH59978 NetBackup Compatibility Information
http://www.symantec.com/docs/DOC6488 NetBackup Documentation
http://www.symantec.com/support Symantec Support Portal

More Related Content

What's hot

A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
Symantec
 
EMC Data domain advanced features and functions
EMC Data domain advanced features and functionsEMC Data domain advanced features and functions
EMC Data domain advanced features and functions
solarisyougood
 
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMPEMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC
 
EMC Deduplication Fundamentals
EMC Deduplication FundamentalsEMC Deduplication Fundamentals
EMC Deduplication Fundamentals
emcbaltics
 
Novinky v NetBackup 7.7
Novinky v NetBackup 7.7Novinky v NetBackup 7.7
Novinky v NetBackup 7.7
MarketingArrowECS_CZ
 
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Symantec
 
Data Domain Architecture
Data Domain ArchitectureData Domain Architecture
Data Domain Architecture
koesteruk22
 
Presentation deduplication backup software and system
Presentation   deduplication backup software and systemPresentation   deduplication backup software and system
Presentation deduplication backup software and system
xKinAnx
 
Avamar 7 2010
Avamar 7 2010Avamar 7 2010
Avamar 7 2010
Phani Kumar
 
Emc data domain
Emc data domainEmc data domain
Emc data domain
solarisyougood
 
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...ljaquet
 
EV9 & NBU5000
EV9 & NBU5000EV9 & NBU5000
EV9 & NBU5000
Symantec
 
EMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed ReviewEMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed Review
EMC
 
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
IBM India Smarter Computing
 
Accel - EMC - Data Domain Series
Accel - EMC - Data Domain SeriesAccel - EMC - Data Domain Series
Accel - EMC - Data Domain Seriesaccelfb
 
Presentation data domain advanced features and functions
Presentation   data domain advanced features and functionsPresentation   data domain advanced features and functions
Presentation data domain advanced features and functions
xKinAnx
 
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
Symantec
 
Emc data domain® boost integration guide
Emc data domain® boost integration guideEmc data domain® boost integration guide
Emc data domain® boost integration guide
Arvind Varade
 
Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7
Symantec
 
Training netbackup6x2
Training netbackup6x2Training netbackup6x2
Training netbackup6x2
M Shariff
 

What's hot (20)

A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
 
EMC Data domain advanced features and functions
EMC Data domain advanced features and functionsEMC Data domain advanced features and functions
EMC Data domain advanced features and functions
 
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMPEMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
 
EMC Deduplication Fundamentals
EMC Deduplication FundamentalsEMC Deduplication Fundamentals
EMC Deduplication Fundamentals
 
Novinky v NetBackup 7.7
Novinky v NetBackup 7.7Novinky v NetBackup 7.7
Novinky v NetBackup 7.7
 
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
 
Data Domain Architecture
Data Domain ArchitectureData Domain Architecture
Data Domain Architecture
 
Presentation deduplication backup software and system
Presentation   deduplication backup software and systemPresentation   deduplication backup software and system
Presentation deduplication backup software and system
 
Avamar 7 2010
Avamar 7 2010Avamar 7 2010
Avamar 7 2010
 
Emc data domain
Emc data domainEmc data domain
Emc data domain
 
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
 
EV9 & NBU5000
EV9 & NBU5000EV9 & NBU5000
EV9 & NBU5000
 
EMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed ReviewEMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed Review
 
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
 
Accel - EMC - Data Domain Series
Accel - EMC - Data Domain SeriesAccel - EMC - Data Domain Series
Accel - EMC - Data Domain Series
 
Presentation data domain advanced features and functions
Presentation   data domain advanced features and functionsPresentation   data domain advanced features and functions
Presentation data domain advanced features and functions
 
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
 
Emc data domain® boost integration guide
Emc data domain® boost integration guideEmc data domain® boost integration guide
Emc data domain® boost integration guide
 
Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7
 
Training netbackup6x2
Training netbackup6x2Training netbackup6x2
Training netbackup6x2
 

Viewers also liked

Basics of Coding in Pediatrics Medical Billing
Basics of Coding in Pediatrics Medical BillingBasics of Coding in Pediatrics Medical Billing
Basics of Coding in Pediatrics Medical Billing
Outsource Strategies International
 
Mobile App Tracking - How it Works
Mobile App Tracking - How it WorksMobile App Tracking - How it Works
Mobile App Tracking - How it WorksMobileAppTracking
 
Understanding Document Managment Systems and Nuxeo
Understanding Document Managment Systems and NuxeoUnderstanding Document Managment Systems and Nuxeo
Understanding Document Managment Systems and Nuxeo
anicewick
 
Sample Product Overview Presentation
Sample Product Overview PresentationSample Product Overview Presentation
Sample Product Overview Presentation
Julie Grosse
 
Objectives and strategies of M&A
Objectives and strategies of M&AObjectives and strategies of M&A
Objectives and strategies of M&A
Kumar Thumalla
 
Servicenow ppt
Servicenow pptServicenow ppt
The Nature of Production
The Nature of ProductionThe Nature of Production
The Nature of ProductionKim Delisser
 
NFL CASE STUDY ANALYSIS
NFL CASE STUDY ANALYSISNFL CASE STUDY ANALYSIS
NFL CASE STUDY ANALYSIS
HITESH JAIN
 
Surgical induced astigmatism
Surgical induced astigmatismSurgical induced astigmatism
Surgical induced astigmatism
Namrata Gupta
 
Getting started with SAP PI/PO an overview presentation
Getting started with SAP PI/PO an overview presentationGetting started with SAP PI/PO an overview presentation
Getting started with SAP PI/PO an overview presentation
Figaf.com
 
Types of Art Media
Types of Art MediaTypes of Art Media
Types of Art Media
Westerville Library
 
Brand Management Lezione 1
Brand Management Lezione 1 Brand Management Lezione 1
Brand Management Lezione 1
Spinosi Marketing Strategies
 
Components of nuclear reactor
Components of nuclear reactorComponents of nuclear reactor
Components of nuclear reactor
B.k. Das
 
How to test payment gateway functionality
How to test payment gateway functionalityHow to test payment gateway functionality
How to test payment gateway functionality
Trupti Jethva
 
Objectives of supply chain management
Objectives of supply chain managementObjectives of supply chain management
Objectives of supply chain management
DENNY OTTARACKAL
 
8 D – Problem Solving Process
8 D – Problem Solving Process8 D – Problem Solving Process
8 D – Problem Solving Process
Anand Subramaniam
 
Top 36 project coordinator interview questions and answers pdf
Top 36 project coordinator interview questions and answers pdfTop 36 project coordinator interview questions and answers pdf
Top 36 project coordinator interview questions and answers pdfHelenMirren123
 
Opportunities In Marketing
Opportunities In MarketingOpportunities In Marketing
Opportunities In Marketing
Prabhvir Sahmey
 
ServiceNow Overview
ServiceNow OverviewServiceNow Overview
ServiceNow Overview
Jeremy Smith
 

Viewers also liked (20)

Basics of Coding in Pediatrics Medical Billing
Basics of Coding in Pediatrics Medical BillingBasics of Coding in Pediatrics Medical Billing
Basics of Coding in Pediatrics Medical Billing
 
Mobile App Tracking - How it Works
Mobile App Tracking - How it WorksMobile App Tracking - How it Works
Mobile App Tracking - How it Works
 
Understanding Document Managment Systems and Nuxeo
Understanding Document Managment Systems and NuxeoUnderstanding Document Managment Systems and Nuxeo
Understanding Document Managment Systems and Nuxeo
 
Sample Product Overview Presentation
Sample Product Overview PresentationSample Product Overview Presentation
Sample Product Overview Presentation
 
Objectives and strategies of M&A
Objectives and strategies of M&AObjectives and strategies of M&A
Objectives and strategies of M&A
 
Servicenow ppt
Servicenow pptServicenow ppt
Servicenow ppt
 
The Nature of Production
The Nature of ProductionThe Nature of Production
The Nature of Production
 
NFL CASE STUDY ANALYSIS
NFL CASE STUDY ANALYSISNFL CASE STUDY ANALYSIS
NFL CASE STUDY ANALYSIS
 
Surgical induced astigmatism
Surgical induced astigmatismSurgical induced astigmatism
Surgical induced astigmatism
 
Getting started with SAP PI/PO an overview presentation
Getting started with SAP PI/PO an overview presentationGetting started with SAP PI/PO an overview presentation
Getting started with SAP PI/PO an overview presentation
 
Best Practices for Testing in salesforce.com
Best Practices for Testing in salesforce.comBest Practices for Testing in salesforce.com
Best Practices for Testing in salesforce.com
 
Types of Art Media
Types of Art MediaTypes of Art Media
Types of Art Media
 
Brand Management Lezione 1
Brand Management Lezione 1 Brand Management Lezione 1
Brand Management Lezione 1
 
Components of nuclear reactor
Components of nuclear reactorComponents of nuclear reactor
Components of nuclear reactor
 
How to test payment gateway functionality
How to test payment gateway functionalityHow to test payment gateway functionality
How to test payment gateway functionality
 
Objectives of supply chain management
Objectives of supply chain managementObjectives of supply chain management
Objectives of supply chain management
 
8 D – Problem Solving Process
8 D – Problem Solving Process8 D – Problem Solving Process
8 D – Problem Solving Process
 
Top 36 project coordinator interview questions and answers pdf
Top 36 project coordinator interview questions and answers pdfTop 36 project coordinator interview questions and answers pdf
Top 36 project coordinator interview questions and answers pdf
 
Opportunities In Marketing
Opportunities In MarketingOpportunities In Marketing
Opportunities In Marketing
 
ServiceNow Overview
ServiceNow OverviewServiceNow Overview
ServiceNow Overview
 

Similar to TECHNICAL BRIEF▶ NetBackup 7.6 Deduplication Technology

Net App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution SheetNet App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution Sheet
Michael Hudak
 
TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014
TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014
TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014
Symantec
 
Reduce time to complete backups and restores with Transparent Snapshots with ...
Reduce time to complete backups and restores with Transparent Snapshots with ...Reduce time to complete backups and restores with Transparent Snapshots with ...
Reduce time to complete backups and restores with Transparent Snapshots with ...
Principled Technologies
 
Combining IBM Real-time Compression and IBM ProtecTIER Deduplication
Combining IBM Real-time Compression and IBM ProtecTIER DeduplicationCombining IBM Real-time Compression and IBM ProtecTIER Deduplication
Combining IBM Real-time Compression and IBM ProtecTIER Deduplication
IBM India Smarter Computing
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paper
Symantec
 
Data De-Duplication Engine for Efficient Storage Management
Data De-Duplication Engine for Efficient Storage ManagementData De-Duplication Engine for Efficient Storage Management
Data De-Duplication Engine for Efficient Storage Management
IRJET Journal
 
Netbackup advantages features and benefits Netbackup classes may help hands o...
Netbackup advantages features and benefits Netbackup classes may help hands o...Netbackup advantages features and benefits Netbackup classes may help hands o...
Netbackup advantages features and benefits Netbackup classes may help hands o...
Vidhyalive
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
Hpe data protector deduplication
Hpe data protector deduplicationHpe data protector deduplication
Hpe data protector deduplication
Andrey Karpov
 
Back up and restore data faster with a Dell PowerProtect Data Manager Appliance
Back up and restore data faster with a Dell PowerProtect Data Manager ApplianceBack up and restore data faster with a Dell PowerProtect Data Manager Appliance
Back up and restore data faster with a Dell PowerProtect Data Manager Appliance
Principled Technologies
 
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM India Smarter Computing
 
TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014
TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014
TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014
Symantec
 
Datasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media serverDatasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media server
Fernando Alves
 
Sample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NASSample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NASMike Alvarado
 
Backing Up Mountains of Data to Disk
Backing Up Mountains of Data to DiskBacking Up Mountains of Data to Disk
Backing Up Mountains of Data to Disk
IT Brand Pulse
 
Case Study British Red Cross 161257
Case Study British Red Cross 161257Case Study British Red Cross 161257
Case Study British Red Cross 161257AsigraCloudBackup
 
ProServer - Direct network attached CD / DVD Server and Loader
ProServer - Direct network attached CD / DVD Server and LoaderProServer - Direct network attached CD / DVD Server and Loader
ProServer - Direct network attached CD / DVD Server and Loader
Prime Array
 
Fluid Data Storage:Driving Flexibility in the Data Center
Fluid Data Storage:Driving Flexibility in the Data Center Fluid Data Storage:Driving Flexibility in the Data Center
Fluid Data Storage:Driving Flexibility in the Data Center
Kingfin Enterprises Limited
 
Oaklands college: Protecting your data.
Oaklands college: Protecting your data.Oaklands college: Protecting your data.
Oaklands college: Protecting your data.
JISC RSC Eastern
 
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackup
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackupDATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackup
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackup
Symantec
 

Similar to TECHNICAL BRIEF▶ NetBackup 7.6 Deduplication Technology (20)

Net App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution SheetNet App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution Sheet
 
TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014
TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014
TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014
 
Reduce time to complete backups and restores with Transparent Snapshots with ...
Reduce time to complete backups and restores with Transparent Snapshots with ...Reduce time to complete backups and restores with Transparent Snapshots with ...
Reduce time to complete backups and restores with Transparent Snapshots with ...
 
Combining IBM Real-time Compression and IBM ProtecTIER Deduplication
Combining IBM Real-time Compression and IBM ProtecTIER DeduplicationCombining IBM Real-time Compression and IBM ProtecTIER Deduplication
Combining IBM Real-time Compression and IBM ProtecTIER Deduplication
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paper
 
Data De-Duplication Engine for Efficient Storage Management
Data De-Duplication Engine for Efficient Storage ManagementData De-Duplication Engine for Efficient Storage Management
Data De-Duplication Engine for Efficient Storage Management
 
Netbackup advantages features and benefits Netbackup classes may help hands o...
Netbackup advantages features and benefits Netbackup classes may help hands o...Netbackup advantages features and benefits Netbackup classes may help hands o...
Netbackup advantages features and benefits Netbackup classes may help hands o...
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Hpe data protector deduplication
Hpe data protector deduplicationHpe data protector deduplication
Hpe data protector deduplication
 
Back up and restore data faster with a Dell PowerProtect Data Manager Appliance
Back up and restore data faster with a Dell PowerProtect Data Manager ApplianceBack up and restore data faster with a Dell PowerProtect Data Manager Appliance
Back up and restore data faster with a Dell PowerProtect Data Manager Appliance
 
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
 
TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014
TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014
TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014
 
Datasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media serverDatasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media server
 
Sample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NASSample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NAS
 
Backing Up Mountains of Data to Disk
Backing Up Mountains of Data to DiskBacking Up Mountains of Data to Disk
Backing Up Mountains of Data to Disk
 
Case Study British Red Cross 161257
Case Study British Red Cross 161257Case Study British Red Cross 161257
Case Study British Red Cross 161257
 
ProServer - Direct network attached CD / DVD Server and Loader
ProServer - Direct network attached CD / DVD Server and LoaderProServer - Direct network attached CD / DVD Server and Loader
ProServer - Direct network attached CD / DVD Server and Loader
 
Fluid Data Storage:Driving Flexibility in the Data Center
Fluid Data Storage:Driving Flexibility in the Data Center Fluid Data Storage:Driving Flexibility in the Data Center
Fluid Data Storage:Driving Flexibility in the Data Center
 
Oaklands college: Protecting your data.
Oaklands college: Protecting your data.Oaklands college: Protecting your data.
Oaklands college: Protecting your data.
 
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackup
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackupDATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackup
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackup
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
Symantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
Symantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
Symantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
Symantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
Symantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Top 7 Unique WhatsApp API Benefits | Saudi Arabia
Top 7 Unique WhatsApp API Benefits | Saudi ArabiaTop 7 Unique WhatsApp API Benefits | Saudi Arabia
Top 7 Unique WhatsApp API Benefits | Saudi Arabia
Yara Milbes
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 

Recently uploaded (20)

Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Top 7 Unique WhatsApp API Benefits | Saudi Arabia
Top 7 Unique WhatsApp API Benefits | Saudi ArabiaTop 7 Unique WhatsApp API Benefits | Saudi Arabia
Top 7 Unique WhatsApp API Benefits | Saudi Arabia
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 

TECHNICAL BRIEF▶ NetBackup 7.6 Deduplication Technology

  • 1. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup7.6Deduplication Technology NetBackup 7.6 Deduplication Technology NetBackup 7.6 Overview The Symantec NetBackup Platformisa completebackupandrecoverysolutionthatisoptimized for virtually any workload, includingphysical,virtual, arrays, or big data infrastructures. NetBackup delivers flexibletargetstorageoptions, such as tape, 3rd -party disk, cloud, or appliance storage devices,includingtheNetBackup Deduplication Appliances and Integrated Backup Appliances. NetBackup 7.6 delivers the performance, automation, and manageability necessary to protect virtualized deploymentsatscale–wherethousandsof Virtual Machinesand petabytes of data are the normtoday,andwheresoftware-defined data centers and IT-as-a-service become the norm tomorrow. Enterprises trust Symantec. Key Benefits  Comprehensive –As a singlesolution to protectall of your data assets,NetBackup provides supportforvirtually every popularserver,storage,hypervisor,database, and application platform used in the enterprise today.  Scalable–High performance,elasticautomation,andcentralized management based on a flexible, multitier architecture enables NetBackup to adapt to the growing needs of a fast-paced, modern enterprise data center.  Integrated –Frombackupappliancesto bigdataplatforms,NetBackup integrates at every point in the technology stack to improvereliability and performance. OpenStorage Technology (OST) provides even tighter integration with third-party storage and snapshot solutions.  Innovative–With hundredsof patentsawarded in areas including backup, recovery, virtualization, deduplication, and snapshot management, NetBackup continues a long tradition of bringing advanced technologies to market first.  Proven –For over a decade,NetBackuphasled the industry as the most popular enterprise data protection software by marketshareandisused by many of thelargestenterprises on the planet. When you need your data back, you can trust NetBackup. Key Features  One platform, one console unifies virtual and physical global data protection  Unified global management of snapshots, replicated snapshots, backup, and recovery  Scalable, global deduplication across virtual and physical infrastructures  V-Ray one pass backup, instant image and single file restore for virtual and physical  Automated virtual data protection and load balanced backup performance Deduplication Overview Deduplication isdefined astheelimination of redundantdatafromdisk storage. NetBackup deduplication uses a hash algorithm to providea uniqueidentifier,or fingerprint, to datasegmentswithin a clientbackup stream. These fingerprints enable NetBackup to identify clientdatasegmentsthatareidentical to oneanother,whichcanthen beused to prevent the same data from being stored multiple times while still allowing the data to be restored when necessary. Backup and archiveinfrastructures areideal candidatesfor deduplication due to the redundant nature of backed up and archived data.For example,in many backupinfrastructures mostof thedatabacked upduringa full backupisidentical to that of the previous full backup. Deduplication prevents storing multiple copies of the identical data. KeyBenefits  Powerful, enterprise-class data deduplication technology  Dramatic optimization of disk- based backup storage  Flexible implementation choices, including server and client deduplication  Purpose-built appliance solutions for streamlined implementation and management  Support for OST-compliant deduplication storage devices
  • 2. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup7.6Deduplication Technology Figure 1: Deduplication overview In addition to thesignificantstoragesavingsthatareprovided by deduplicationtechnology,timeand otherresources arealso saved. Although manyvendorsprovidetheabilityto performdeduplicationatthe storagetarget,usually atthe backup storage location or appliance,beingableto deduplicatedataatthesource,or theclient,providestheability to significantly reduce network bandwidth utilization, and can speed up the entire backup process. NetBackup supports deduplication at the target – also referred to as NetBackup Media Server Deduplication (MSDP) – as well as client deduplication. NetBackup Deduplication Options NetBackup offersseveral optionsfor implementingdeduplication. Symantec’sfirstdeduplication product was PureDisk, which is a stand-alone application. Soon after Symantec released the PureDisk product, it was integrated into NetBackup through an option called the PureDisk Deduplication Option,or PDDO,in which NetBackupused thePureDisk environmentasa deduplicationstorageunit.PureDisk is now deprecated as a software form. Another deduplicationoptionthatisavailableisNetBackupMediaServer Deduplication, or MSDP. An MSDP server is a NetBackup media serverthatprovidesa built-inmethod for NetBackupto supportdeduplication withouttheneed for complex hardware.Prior to NetBackup 7.5,theMSDP storagelimitwas32TB.In NetBackup 7.5 the limit was increased to 64TB. NetBackup can also perform deduplication at the source, using a technology called client deduplication. As another alternative,Symantec offerstheNetBackup5200-seriesappliances thatsupportdeduplication,andfromNetBackup7.6.1, the 5300 seriesappliances.The5200and 5300 series appliances are effectively NetBackup media servers than have NetBackup installed and preconfigured to performdeduplication.The5230 cansupportup to 144TBof deduplicated storage,whilstthe5330 can support up to 229TB, as shown in figure 2.
  • 3. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup7.6Deduplication Technology Figure 2: NetBackup deduplication-enabled appliances Finally,certain third-party vendors provide appliances that support NetBackup’s OpenStorage Technology (OST). Some of these appliancessupportdeduplication.ChecktheSymantec NetBackup hardwarecompatibility list to determine the vendor appliances that support this capability. http://www.symantec.com/business/support/index?page=content&id=TECH76495 How NetBackup Deduplication Works Whilea backup job isrunning,NetBackup determines whatclientdataneedsto bebackedup. For each filethatisbacked up, the file metadata –includingfilepermissions,directorylocation, and file name – is separated from the actual content of the file. The file metadata is saved in the deduplication database. The filecontentisbrokendown into smaller 128 KBsegments.In figure3,thisisrepresented by segments A, B, C, and D for File 1. A hash fingerprintiscalculated for each segment. Thedata segmentfingerprintsarecompared againstthefingerprints of datasegments thathavealready been stored in deduplicationstorage,in order to identify uniquedata segments.Only theuniquedatasegmentsare sent to deduplication storage, along with the file metadata. Itis importantto notethatfilesegmentsarechecked for uniquenessacrossall clients’backupdata,notjust for an indivi dual client. This meansthatif an identical datasegmentexistson multipleclients,only a singlecopy of that data segment is written to storage. The metadata storagetracksall themetadatafor each filethatisbacked up.Thecontentstoragetrackseachfileand all thesegments thatareassociated with that file to enable NetBackup to put the file back together. In figure 2, data segments A, B, C, and D are required to restore File 1. Next, when File2 is backed up, the file is separated into metadata and content. The file contents are broken down into 128 KB segments and a fingerprintiscalculated for eachsegment.SinceFile2 isslightly differentthanFile1,segmentsEand F are determined to haveuniquefingerprints,whilesegmentsAand C havethesamefingerprintsassegmentsthatarealready stored in the database. SincesegmentsEand F areunique,they aresentto storageand anotation ismadethatFile 2 iscomprised of segmentsA,E, C, and F. This process continues for each file in the backup job, until all files are processed.
  • 4. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup7.6Deduplication Technology Figure 3: NetBackup deduplication example Media Server and Client Deduplication Comparison NetBackup providesthecapabilityto performbothmediaserverdeduplication and client-side deduplication, as shown in figure 4. Depending on the circumstances, one deduplication method might be more beneficial than the other. When usingNetBackupmediaserverdeduplication,theclientsends the entire backup data stream over the network to the media server.Thededuplicationmedia server performsthefingerprinting.Itdetermineswhich data segments are unique and which data segments have an exact fingerprint match that has been stored previously. The media server sendsonlytheuniquedatasegments,thededuplicated data stream, to deduplication storage. The advantage of performingdeduplication on themediaserver isthattheCPUof theclientisnotimpacted by fingerprintingactivity thatoccursduring the backup.Potentialdisadvantagesarethatall backup datamustbesentover thenetwork,and thatheavydeduplication loads can affect the overall performance of the media server. When using client-side deduplication, the segmenting of client files and the fingerprinting of the resulting data segments, is performed by theDeduplicationplug-inon theclientsystem.After comparingwith alocal fingerprintcache, or communicating with the deduplication mediaserverto determinewhichdata segmentsareunique,only theuniquedatasegments,thededuplicated data stream,issentover thenetwork to thededuplication mediaserver,which then writes thededuplicated datato deduplicationstorage. Client-sidededuplicationhastheadvantagesof distributingthefingerprintingworkloadto theclients,aseach client deduplicates its own backup data,andsendsonly uniqueclientdatasegmentsover thenetwork.Thiscan greatly reducethenetwork utilization. The potential disadvantageof client-sidededuplicationistheadditionalloadthatisplaced on theclient’s CPU to perform dedupli cation during the backup.
  • 5. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup7.6Deduplication Technology Figure 4: Media server and client deduplication The good news isthatNetBackupcustomershavecapability to use client-side deduplication for those clients where that method provides the greatest benefit, while simultaneously performing deduplication on the media server for other clients. Summary The Symantec Backup and Recovery productfamily offersmarket-leadingbackup and disasterrecoverysolutionsfor criticalcustomer ITresources. Thisincludespowerful and proven storageoptimization technologies,such asdatadeduplication, that help customers manage data growth and backup storage costs to lower overall total cost of ownership. Feedback Pleasetakea minuteto providefeedback on thisdocumentby clickingon this FEEDBACKLINK.This will redirect you to Adobe Forms where you can fill out a very short form. This will take less than a minute and help us improve our documentation.
  • 6. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup7.6Deduplication Technology For More Information Link Description http://www.netbackup.com/ NetBackup Home Page http://www.symantec.com/docs/TECH59978 NetBackup Compatibility Information http://www.symantec.com/docs/DOC6488 NetBackup Documentation http://www.symantec.com/support Symantec Support Portal