?
Solved

blocksize for Deduplication

Posted on 2012-03-22
3
Medium Priority
?
1,044 Views
Last Modified: 2012-06-27
Hi Experts,

I am using Symantec Backup  Exec 2010R3 and I want to use Deduplication.
But when I setup my storage MD1200 I will be asked what kind of block size or STRIPE ELEMENT SIZE I want to use.

I can choose from 64KB up to 1MB.
What is the best setup when I want to use this array for backup to disk with dedup ?
0
Comment
Question by:Eprs_Admin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 9

Expert Comment

by:Shani Basha
ID: 37751331
You can choose 64 KB
0
 

Author Comment

by:Eprs_Admin
ID: 37751347
please can you explain in detail, why you use 64KB ?
0
 
LVL 9

Accepted Solution

by:
Shani Basha earned 2000 total points
ID: 37765941
A stripe is the smallest chunk of data within a storage array that can be addressed. This is  also called as granularity or block size. Typical options are 16, 32, 64 and 128 kB, but many professional RAID controllers also offer smaller stripe sizes, and some even support sizes as large as 256 KB

Since this is used for data back up, you need to optimize this for capacity.

The stripe size also defines the amount of storage capacity that will at least be occupied on a RAID partition when you write a file. For example, if you selected a 64 kB stripe size and you store a 2 kB text file, this file will occupy 64 kB. Obviously, the stripe size defines the minimum amount of data that a storage will distribute files across its hard drives, in this example, 64 kB.


Hope this clarifies!
0

Featured Post

Does Your Cloud Backup Use Blockchain Technology?

Blockchain technology has already revolutionized finance thanks to Bitcoin. Now it's disrupting other areas, including the realm of data protection. Learn how blockchain is now being used to authenticate backup files and keep them safe from hackers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There’s a movement in Information Technology (IT), and while it’s hard to define, it is gaining momentum. Some call it “stream-lined IT;” others call it “thin-model IT.”
Multi-threading long-running processes can have a significant increase in overall performance and drastically decrease over time it takes for a process to complete. Unfortunately, not all applications support native multi-threading, some by design a…
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question