Solved

PIT - point in time copy

Posted on 2012-03-12
5
485 Views
Last Modified: 2012-08-14
Hi,

How does PIT works? For an example if I have source volume and target voume, how does PIT work? First it copies the data from source to target, and then monitor the changes and once there is a change, it copies the data?
0
Comment
Question by:mokkan
  • 3
  • 2
5 Comments
 
LVL 68

Assisted Solution

by:woolmilkporc
woolmilkporc earned 500 total points
ID: 37713592
There are many implementations of PIT copy, such as "split mirror", "snapshot", "flash copy"  etc.

This is a Whitepaper from the 2002 Storage Conference outlining the common approaches and giving some insight into their functional principles:

http://www.storageconference.org/2002/papers/d05bp-aaz.pdf

"2002" seems a long time ago, but the basic concepts mentioned in the paper are still valid (and in use) nonetheless.

wmp
0
 

Author Comment

by:mokkan
ID: 37720344
Thank you, I read it but not getting the full concept. It is basically keep track of the changes  perdiatically?
0
 
LVL 68

Assisted Solution

by:woolmilkporc
woolmilkporc earned 500 total points
ID: 37720380
It always keeps track of all changes, because every I/O must be intercepted.

Depending on the implementation changes are recorded in a flash area while the original keeps unchanged, or the changes are applied to the original while a "before image" of the original is copied to the flash area.
0
 

Author Comment

by:mokkan
ID: 37720435
For an example if the data  corrupted and if I want to decide the restore data, can I get pick a time?
0
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 500 total points
ID: 37720475
Not with the mentioned flash/snapshot technologies.
You must decide whether to use the unchanged original originating from the time where the snapshot was initiated, or to use the updated copy.
Of course you can initiate several snapshots periodically, so you can decide which one is still good and which one is corrupted.

It seems what you're talking about is rather some kind of asynchronous (delayed) replication, where you can stop the replication in a certain time window once you noticed that corruption has occurred. You can then continue using the replica, which is still good given you actually hit the time window to stop the replication.
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
Facing problems with you memory card? Cannot access your memory card? All stored data, images, videos are lost? If these are your questions...than this small article might help you out in retrieving your lost or inaccessible data.
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

929 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now