Netgear RD521210 – ReadyDATA 5200 12TB SATA Bundle includes RD5200 with 2 x RD5D6LT01 Disk Packs Softwarehandbuch
Backup, Replication, and Recovery
195
ReadyDATA OS 1.4
•
•
The ReadyDATA supports backup and recovery operations through its advanced snapshot
functionality. For information about snapshots, see
functionality. For information about snapshots, see
177. Replication is specifically between two ReadyDATA storage systems on which
shares and LUN can be mirrored.
About Replication
Replication capabilities are integrated into the ReadyDATA, and you do not need to install a
replication add-on. You can enable replication with the simple click of a button. You have the
choice of managing replication locally or accessing the NETGEAR ReadyDATA Replicate™
software application so that you can use its centralized management console to configure the
replication settings (see
replication add-on. You can enable replication with the simple click of a button. You have the
choice of managing replication locally or accessing the NETGEAR ReadyDATA Replicate™
software application so that you can use its centralized management console to configure the
replication settings (see
197).
ReadyDATA replication supports two types of replication:
•
Periodic replication
This type of replication is driven by the clock. Data is replicated periodically, from once
per hour to once per month, based on how you schedule replication. This configuration
collects changes that occur over the selected time period and replicates them in line with
the replication schedule.
This type of replication is driven by the clock. Data is replicated periodically, from once
per hour to once per month, based on how you schedule replication. This configuration
collects changes that occur over the selected time period and replicates them in line with
the replication schedule.
•
Continuous replication
This type of replication is driven by activity at the source system. Data is replicated to the
destination device constantly. Whenever new blocks are written on the source system,
they are immediately sent to the destination system. If a disaster occurs, the most current
data possible is in a secondary location. For optimum protection, use continuous
replication rather than periodic replication.
This type of replication is driven by activity at the source system. Data is replicated to the
destination device constantly. Whenever new blocks are written on the source system,
they are immediately sent to the destination system. If a disaster occurs, the most current
data possible is in a secondary location. For optimum protection, use continuous
replication rather than periodic replication.
You can configure replication only per individual share or LUN, that is, you cannot configure
replication at the system level. You select a share or LUN as the source of the replication,
and a volume on the remote system as the destination for the replication.
replication at the system level. You select a share or LUN as the source of the replication,
and a volume on the remote system as the destination for the replication.
The replication process leverages the information that is contained in special hidden
snapshots to minimize the time it takes to determine what block-based data needs to be
moved between the systems. These hidden snapshots are not the same as the regular
snapshots that you create manually or set up to be created automatically.
snapshots to minimize the time it takes to determine what block-based data needs to be
moved between the systems. These hidden snapshots are not the same as the regular
snapshots that you create manually or set up to be created automatically.
Replication of an incomplete hidden snapshot resumes from the point where it failed, that is,
if a 200 MB snapshot fails to replicate at 90 percent completion, replication resumes at
90
if a 200 MB snapshot fails to replicate at 90 percent completion, replication resumes at
90
percent completion to replicate the remaining 20 MB.
If you use the ReadyDATA Replicate™ software application, you do not use an explicit
destination IP address. Data that is replicated over the Internet is automatically encrypted for
increased safety.
destination IP address. Data that is replicated over the Internet is automatically encrypted for
increased safety.
If you manage replication locally, you must establish the destination by using an IP address
or domain name, and you must exchange access keys between both systems.
or domain name, and you must exchange access keys between both systems.