Online Backup

by JuanSlack764225 posted Mar 08, 2018


Prev이전 문서

Next다음 문서


크게 작게 위로 아래로 댓글로 가기 인쇄
Backup is in the computer field in order to prevent computer data and applications due to computer failure caused by the loss and damage, so as to separate in the original separate stored procedures or copies of the document. (From the [computer science]).

daily auto backup softwareBackup can be divided into system backup and data backup.

1, the system backup: refers to the user operating system due to disk damage or damage, computer viruses or human error deleted and other reasons caused by the loss of system files, resulting in the computer operating system can not be normal boot, so the use of system backup, the operating system stored in advance Up for backup support after failure.

2, data backup: refers to the user data, including files, databases, applications, etc. stored for data recovery use.

In the backup process, the archiving process is through the Internet connection on the remote server; the success of the file backup, through the Internet access, restore files and other operations.

Continuous Data Protection (CDP) technology is a major breakthrough in traditional data protection technology. It can capture all the file level or data block level data write changes, you can back up the object to do more granular recovery, you can restore to any point in time. System administrators do not have to worry about the data backup process, but only when the disaster occurs, simply select the need to restore the data backup point in time to achieve rapid data recovery.

Traditional data protection solutions focus on periodic backups of data, and are therefore accompanied by backup windows, data consistency, and impact on production systems. Now, CDP provides users with new data protection tools, system administrators do not have to pay attention to the data backup process (because the CDP system will continue to monitor the key data changes, which continue to automatically achieve data protection), but only when the disaster , Simply select the data backup point to be restored to the point of time to achieve rapid data recovery.

2.1.1 Technical characteristics of continuous data protection

A. First, you can greatly improve the data recovery time point target.

B. In addition, data recovery for continuous data protection is more flexible due to the recovery time and the granularity of recovery objects. The current part of the product and the solution allows the end user (not just the system administrator) to recover the data directly, which is largely facilitated by the user. According to this feature, industry insiders pointed out that CDP technology may even replace some (such as software development or graphics applications) system version control function, so that developers focus on the development and design.

2.1.2 Implementation mode of continuous data protection

There are multiple modes of continuous data protection technology or solution implementation. Different manufacturers to establish a different continuous data protection model, with reference to SNIA's storage sharing model, you can achieve continuous data protection products or solutions are divided into the following categories: Implementation-based continuous data protection

For critical applications that need protection, you can embed and run CDP functions directly. This approach to CDP can be integrated with the application in depth to ensure consistent application of data in continuous protection. CDP function can be embedded by software vendors directly in the software products, software vendors can also provide API interface, developed by third-party software developers to complete.

The biggest benefit of application-based CDP is that it is tightly integrated with the application, and the management is more flexible and easy to deploy and implement.

Most of the current application-based CDP solutions are developed for mature applications. There are already some products that can support Microsoft's Office, Exchange, IBM's DB2, and Oracle databases. Continuous file-based data protection

File-based CDP whose functions act on the file system. It can capture the file system data or metadata changes (such as create, modify, delete, etc.), and timely changes in the file to record, in order to achieve any time point in the future file recovery.

IBM's VitalFile, Storactive's LiveBackup for Desktop / Laptops, TimeSpring's TimeData and other products, can provide file-based CDP functionality. VSS is a CDP function implementation module based on the Windows operating system of Microsoft. VSS provides API for implementing CDP (although its backup time is relatively large). Third party software can be developed on the basis of VSS. Microsoft's DPM, Carbonite, Symantec's Backup Exec 10D and so on. Continuous data protection based on data blocks

Block-based CDP functions run directly on physical storage devices or logical volume managers, and can even run on the data transport layer. When a data block is written to a storage device that produces data, the CDP system can capture a copy of the data and store it in another storage device.

Data block-based data protection is based on the host layer, based on the transport layer and storage-based three-tier implementation.

In general, block-based continuous data protection, in addition to the implementation of the host layer, the relevant products and technologies are more complex, the implementation of the cost is relatively high, so suitable for continuous data protection needs of large and medium-sized enterprises.

Because of the features and advantages of CDP technology in data protection and disaster recovery, more and more users will focus on this disaster recovery new technology. I believe that with the passage of time, technology continues to develop and mature, there will be more and more continuous data protection solutions and products appear in the realization of continuous data protection needs, the user will have more and more choices.

2.1.3 Continuous data protection technologies include two

A. Near CDP, that is, we say quasi CDP, its biggest feature is only part of the designated point of time data (FPIT, fixed point In Time), somewhat similar to the storage system logical snapshot, it can not be restored any time point. The current CD backup, Symantec, CommVault CDP belong to this type.

B. TrueCDP, we call it a real CDP, it can restore any time period specified in any time point (APIT, Any Point In Time), the current BakBone TrueCDP belongs to the TrueCDP type.

Incremental backups are for all files that have changed since the last successful backup. This kind of policy backup data only takes less time, greatly saves the storage space, at the same time reduces the user data transmission bandwidth, effectively provides the backup efficiency.

At any time, as long as the file changes, and the computer connected with the Internet, will continue to backup files, and multiple versions of the form stored in the data backup center. Therefore, if you lose a file or a computer hard disk is lost or damaged, you can restore different versions as needed.

Divided into partial reduction and total reduction. Part of the restore will be through the search or choose to restore part of the file, and will generate a restore report; all restore only need to select the need to restore the computer, the latter operation will be automatic, without human intervention.

Online backup can restore all of the backup files to their original location.

The data scattered in a number of independent devices to solve the cluster file storage risk and improve stability, to solve the data query high concurrency bottlenecks and improve system performance, to solve the dynamic data expansion and improve system scalability, to solve the data and more Storage and improve system reliability. Take data multiple encryption, transport channel encryption and data encryption itself stored on the server. First, the account has a password for protection, and then in the backup file to leave the computer before using AES encryption method to encrypt it, and then through the encrypted socket protocol layer (SSL) for transmission. This transmission is the same as the data security technology used by online banking and e-commerce transactions. So the data will be multiple protection.

Real-time monitoring system changes in the data, including new, delete, rename, modify and other changes.

DBFen is an application that provides online backup of databases and website files. Support multi-platform and also support mobile phone backup function, and can be used as a backup server to use, in its performance and security have been well guaranteed.

Is based on cloud computing automatic real time backup server-time online backup service products, through the use of cloud computing technology, enterprise-class encryption transmission, online banking file encryption technology, unique Kay backup file system and professional security data center for the majority of users A simple, secure, cost-effective and reliable online backup and restore solution.

The installation will automatically select my documents, favorites and other content, you can also choose to backup their own files or directories, and can always backup and restore important files on the computer.

Dropbox is a web storage online application that provides synchronization of local files. Support multiple computers in a variety of operations automatically synchronized. And can be used as a large-capacity network hard drive. To some extent accurate Dropbox does not belong to the scope of online backup.

SugarSync network hard drive is from San Francisco, California, a network storage company's products, providing 5G free storage space, with automatic data backup function, you can easily set your directory to your SugarSync network, when You edit the file or change the file will be automatically backed up to your network disk. Can support any computer, you can online, through the SugarSync software and your phone to access the file. SugarSync also has file sharing capabilities, but only files are shared between SugarSync members. SugarSync uses SSL encryption to upload files. For files saved in SugarSync with 128-bit AES encryption, your data will be stored and backed up in two data center rooms.

Norton Online Backup can automatically protect your files, music, photos and other important files to prevent loss.

You can back up up to five files on your home computer, even if they run different platforms. You can also search for specific files in the backup set by keyword. You can send links to backup files in the form of e-mails, so that you can work with family, friends As well as colleagues to share easily.

QQ, MSN chat records automatic backup, IE, Firefox, Opera browser favorites automatic backup, Windows Mail mail backup, do not have their own set up, easy to use; other aspects and other data and automatic backup network disk is basically the same; The shortcomings of the preparation is: Although the permanent preservation, but the free use of the user only half a year. The current site is no longer accessible.

The Microsoft Online Backup Service is an installable service dedicated to Windows Server 2012 that allows file and folder backups to cloud services.

Microsoft's online backup service copies files and folders and stores them in Windows Azure. This is similar to the Amazon Glacier service, which can be a cloud-based backup service as a disaster recovery protection, and the data copied to multiple places to achieve fault tolerance purposes.


Microsoft's online backup service uses block-level backups.

Built-in data compression, bandwidth throttling and data encryption.

Has a cheaper initial investment than other backup solutions.


You can only use Microsoft's online backup service in Windows Server 2012.

The backup agent can not support Bit Locker, and it needs to be shut down when it is backed up.

The scope of the backup source is limited to NTFS, FAT, and ReFS-formatted partitions.

You can not back up those read-only source files because the backup service requires write access to the backup source.