Improve company productivity with a Business Account.Sign Up

x
?
Solved

PIT - point in time copy

Posted on 2012-03-12
5
Medium Priority
?
522 Views
Last Modified: 2012-08-14
Hi,

How does PIT works? For an example if I have source volume and target voume, how does PIT work? First it copies the data from source to target, and then monitor the changes and once there is a change, it copies the data?
0
Comment
Question by:mokkan
  • 3
  • 2
5 Comments
 
LVL 68

Assisted Solution

by:woolmilkporc
woolmilkporc earned 2000 total points
ID: 37713592
There are many implementations of PIT copy, such as "split mirror", "snapshot", "flash copy"  etc.

This is a Whitepaper from the 2002 Storage Conference outlining the common approaches and giving some insight into their functional principles:

http://www.storageconference.org/2002/papers/d05bp-aaz.pdf

"2002" seems a long time ago, but the basic concepts mentioned in the paper are still valid (and in use) nonetheless.

wmp
0
 

Author Comment

by:mokkan
ID: 37720344
Thank you, I read it but not getting the full concept. It is basically keep track of the changes  perdiatically?
0
 
LVL 68

Assisted Solution

by:woolmilkporc
woolmilkporc earned 2000 total points
ID: 37720380
It always keeps track of all changes, because every I/O must be intercepted.

Depending on the implementation changes are recorded in a flash area while the original keeps unchanged, or the changes are applied to the original while a "before image" of the original is copied to the flash area.
0
 

Author Comment

by:mokkan
ID: 37720435
For an example if the data  corrupted and if I want to decide the restore data, can I get pick a time?
0
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 2000 total points
ID: 37720475
Not with the mentioned flash/snapshot technologies.
You must decide whether to use the unchanged original originating from the time where the snapshot was initiated, or to use the updated copy.
Of course you can initiate several snapshots periodically, so you can decide which one is still good and which one is corrupted.

It seems what you're talking about is rather some kind of asynchronous (delayed) replication, where you can stop the replication in a certain time window once you noticed that corruption has occurred. You can then continue using the replica, which is still good given you actually hit the time window to stop the replication.
0

Featured Post

Get 10% Off Your First Squarespace Website

Ready to showcase your work, publish content or promote your business online? With Squarespace’s award-winning templates and 24/7 customer service, getting started is simple. Head to Squarespace.com and use offer code ‘EXPERTS’ to get 10% off your first purchase.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

The Exchange database may sometimes fail to mount owing to various technical reasons. A dismounted EDB file can be the source of many Exchange errors including mailbox inaccessibility for users. Resolving the root cause of mounting problems becomes …
Let us take a look at the scenario, you have a database that is corrupt and you run the ESEUTIL command only to find you are unable to repair it. How do you now get the data back?
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

605 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question