EMC DD620 EMCDD620BNDL Manual Do Utilizador
Códigos do produto
EMCDD620BNDL
CPU-Centric Storage
Data Domain Stream Informed
Segment Layout (SISL) scaling
architecture takes the pressure off of
disk I/O as a bottleneck, so the
remaining system design is CPU-
Centric. Other deduplication methods
require more disks to increase their
throughput speeds.
Data Domain Stream Informed
Segment Layout (SISL) scaling
architecture takes the pressure off of
disk I/O as a bottleneck, so the
remaining system design is CPU-
Centric. Other deduplication methods
require more disks to increase their
throughput speeds.
The key to enabling industry leading performance while minimizing disk requirements is
the EMC Data Domain Stream-Informed Segment Layout (SISL
the EMC Data Domain Stream-Informed Segment Layout (SISL
TM
) scaling architecture.
Specifically, SISL leverages the continued advancement of CPU performance to
continuously increase Data Domain system performance by minimizing disk accesses
required to deduplicate data. SISL deduplicates data inline by identifying duplicate data
segments in memory, which minimizes disk usage. This enables Data Domain system
throughput to be CPU-centric, not “spindle bound.”
continuously increase Data Domain system performance by minimizing disk accesses
required to deduplicate data. SISL deduplicates data inline by identifying duplicate data
segments in memory, which minimizes disk usage. This enables Data Domain system
throughput to be CPU-centric, not “spindle bound.”
SCALABLE DEDUPLICATION STORAGE
By reducing backup storage requirements by 10 to 30x and archive storage
requirements by up to 5x, Data Domain systems can help significantly reduce the
storage footprint for a typical enterprise data set. For environments that need to retain
backups for long periods of time, the EMC Data Domain Extended Retention software
option protects up to 100 PB of long-term retention backup data. With deduplication,
months of retention on disk is possible using the same number of “floor tiles” that
traditionally provided only a couple of days of disk staging.
requirements by up to 5x, Data Domain systems can help significantly reduce the
storage footprint for a typical enterprise data set. For environments that need to retain
backups for long periods of time, the EMC Data Domain Extended Retention software
option protects up to 100 PB of long-term retention backup data. With deduplication,
months of retention on disk is possible using the same number of “floor tiles” that
traditionally provided only a couple of days of disk staging.
DATA INVULNERABILITY ARCHITECTURE
Data Domain systems are designed as the storage of last resort – built to ensure you
can reliably recover your data with confidence. The EMC Data Domain Data
Invulnerability Architecture is built into every Data Domain system to provide the
industry’s best defense against data integrity issues. Inline write and read verification
protects against and automatically recovers from data integrity issues during data ingest
and retrieval. Capturing and correcting I/O errors inline during the backup process
eliminates the need to repeat backup jobs, ensuring backups complete on time and
satisfy service-level agreements. In addition, unlike other enterprise arrays or file
systems, continuous fault detection and self-healing ensures data remains recoverable
throughout its lifecycle on a Data Domain system.
can reliably recover your data with confidence. The EMC Data Domain Data
Invulnerability Architecture is built into every Data Domain system to provide the
industry’s best defense against data integrity issues. Inline write and read verification
protects against and automatically recovers from data integrity issues during data ingest
and retrieval. Capturing and correcting I/O errors inline during the backup process
eliminates the need to repeat backup jobs, ensuring backups complete on time and
satisfy service-level agreements. In addition, unlike other enterprise arrays or file
systems, continuous fault detection and self-healing ensures data remains recoverable
throughout its lifecycle on a Data Domain system.
End-to-end data verification reads data after it is written and compares it to what was sent to disk,
proving that it is reachable through the file system to disk and that the data is not corrupted.
Specifically, when the Data Domain Operating System receives a write request from backup
software, it computes a checksum over the data. After analyzing the data for redundancy, it sotres
the new data segments and all of the checksums. After all the data is written to disk, the Data
Domain Operating System verifies that it can read the entire file from the disk platter and through
the Data Domain file system, and that the checksums of the data read back match the checksums of
the written data. This confirms the data is correct and recoverable from every level of the system.