Solution Architecture
Control Machine
The host providing the web interface console service; it provides a unified data management platform service, enabling users to manage and utilize node resources and rule tasks.
working machine
The source host for data replication; the Worker program reads data from the user's production system and sends it to the target backup server over an IP network. Simultaneously, it captures IO changes in the source file system and sends them to the target system in serialized transmission over an IP network.
Disaster Recovery Machine
The target host for data replication; the Disaster Recovery program receives production data over the IP network and saves it to the local file system in the same file IO write order as the source end.
Solution Description
Solution Advantages
Byte-level Replication and Efficient Transmission
With bytes as the smallest unit for data capture, the amount of data that needs to be replicated is greatly reduced. The serialized transmission method is much more efficient than traditional backup transmission in scenarios with narrow bandwidth and remote transmission. Network speed limits can be set to ensure that bandwidth priority satisfies production systems and business applications.
Data Consistency for Applications and Databases
Apart from supporting real-time protection for unstructured data, it also supports real-time protection for structured data such as Oracle, SQL Server, DB2, and ensures data consistency through byte-level replication technology and serialized transmission mechanisms.
Flexible Deployment without Network Architecture Modification
Supports one-to-one, multiple-to-one, one-to-multiple, cascading, and other data replication methods, with simple network structure requirements and no need to modify the existing network mode of the production environment.
Centralized Management via a Graphical Interface
Intelligent installation wizards and flexible backup strategies; rich statistical information for easy viewing of backup results; supports custom alert settings with notifications via email for abnormalities; supports automatic verification to check the recoverability and integrity of backup data; supports user permission management functions. Only one console is needed for centralized management of different databases.
Application Scenarios
Mass Unstructured Data Disaster Recovery
Supports massive unstructured data synchronization across heterogeneous platforms and storage scenarios, supports multi-threaded concurrent traversal/transmission, improves transmission efficiency; based on byte replication technology, it achieves real-time replication of incremental data; simultaneously supports multiple data verification methods to ensure data consistency between the source and backup ends.
Shared Storage Cluster Disaster Recovery Support
Supports real-time protection of shared storage data in cluster environments such as MSCS and VCS.

Taking MSCS cluster protection as an example, simply install the Node node software on each cluster node, then create a Node resource in the MSCS cluster management for scheduling replication rules, and you can perform real-time protection on files on the shared disk of the Cluster, replicating data from the shared disk to the specified disaster recovery machine in real-time.

When an MSCS cluster fails over, the shared storage transfers to another available cluster node. At the same time, the Node resource detects the failover and switches the related real-time replication rules to run on the failover cluster node.
Real-time Replication of Database Files
Supports real-time replication of data files for various standalone applications & databases (such as Oracle, MySQL, SQL Server, etc.) and ensures the consistency of synchronized data through data verification functions.
Local and Remote Data Disaster Recovery
Based on low data replication latency and low bandwidth requirements, it can support replication to both local and remote data centers, enabling a two-location, three-center deployment scheme.
Customer Case Study
Case Name: CITIC Securities
Case Description
Real-time multiple-to-one replication of securities production and transaction logs to a local log aggregation server, distinguishing data sources by appending the source machine IP suffix to the replicated data, and real-time replication of data from the local log aggregation server to the remote disaster recovery center;

The aggregation server can retain expired transaction logs deleted from the original end through the replication data filtering and deletion function.snamejin
Case Value
Implements the replication and aggregation of massive transaction logs in a multiple-to-one data replication scenario;

Supports filtering out log deletion operations and remote disaster recovery, fulfilling log audit and security compliance requirements.
60-Day Free Trial Disaster recovery is a task. Data management is our mission

Free Trial

* Please complete the captcha code first

Captcha:

Privacy
When you register with partners on this website, this website will collect your relevant information and keep records. The personal information collected by this website includes but is not limited to: name, address, company, location, telephone number and e-mail address. The more and more accurate information you offer, the better we can provide you with relevant services.

LinkedIn

Email

Share