 |
» |
|
|
 |
 |
|
 |
 |
 |
High data availability for business-critical computing
Volume Shadowing for OpenVMS transparently provides high data availability for your users and applications
including businesscritical applications.
HP Volume Shadowing for OpenVMS product description [MS Word] |
[PDF]
Inaccessible or lost data in your critical production systems can mean
lost revenueand often lost customers. You need dependable, secure computing that ensures that your data
is continuously available. Volume Shadowing for OpenVMS transparently provides
high data availability for your users and applicationsincluding businesscritical
applications running in a client/server environment.
In most computing environments, the potential for major data availability problems is
always present. Media storage devices can deteriorate over time, and system components,
such as controllers and interconnects, sometimes fail. If a failure occurs, data may be lost
or inaccessible for hours or days, or response time may be so slow that your systems
become, in effect, nonoperational.
For many years, hostbased Volume Shadowing for OpenVMS has ensured data
availability for users who rely on OpenVMS systems. Volume Shadowing for OpenVMS is a premier, proven implementation of
RAID technology, which ensures that data remains accessible in the event of media
deterioration or of controller, device, or interconnect failure. With Volume Shadowing,
you can confidently run your business-critical applications and know that your data will
always be available when and where it is needed.
|
 |
 |
 |
 |
|
 |
 |
- Volume Shadowing is supported on clustered and standalone systems, on low-end and high-end systems, and on OpenVMS Integrity server, AlphaServer, and VAX systems. Maximum choice and flexibility
are yours.
- The set of devices on which the data is duplicated is known as a shadow set. A shadow set consists of up to three devices. Each device within the shadow set is known as a shadow set member. Data
availability requires at least two devices in the shadow set.
- Shadowing the OpenVMS system disk increases not only data availability but also system availability.
- Shadowing plays a vital role in disaster-tolerant cluster configurations.
- Shadowing OpenVMS volumes increases application data availability.
- A shadowed cluster environment can be configured with no single point of failure, providing the highest levels of data availability possible in the industry.
- Backup can occur with minimal or no interruption to operations, allowing 24 x 365 datacenter uptime.
- System manager determines access to files and data in the event of failure of controllers, devices, or interconnects, or of a site disaster.
- Data can be duplicated over great distances, providing disaster-tolerant capabilities. For example, Fibre Channel currently supports distances of up to 100 km, achieved through use of interswitch
links (ISLs) that use single-mode fiber. This capability ensures that data lost through disruption or disaster at one site can be accessed at another site.
- Support for up to 500 multimember shadow sets ensures the availability of large amounts of data. The maximum number of single-member shadow sets is 10,000.
- Use of Volume Shadowing requires no change to applications.
- Licensing allows both per-disk and capacity-based licenses (except on Integrity servers, where only a capacity license is available).
|
 |
 |
|
 |
 |
Volume Shadowing for OpenVMS transparently provides high data availability by
preventing data loss from media deterioration, from controller, device, or interconnect
failure, or from site disaster.
Data is synchronously recorded on multiple devices and remains
accessible when one device is unavailable. Read and write operations to the volume continue
transparently with the remaining shadow set members. A copy of the data is always
available. Such data availability prevents storage subsystem components from becoming
a single point of failure, which could interrupt system or application operations.
Access to a shadow set is achieved by means of a virtual disk mechanism. After a shadow
set is created, applications and users access the virtual disk unit as if it were a standard,
physical device.
|
 |
 |
|
 |
 |
Volume Shadowing is an implementation of RAID technology. RAID (redundant arrays
of independent disks) is a collective name for several techniques used to configure and
manage multiple devices to achieve improvements in online storage availability and I/O
performance at a reasonable cost.
Arrays of devices are managed by software and are made to look to operating systems
and users like a single device. RAID arrays provide increased data availability and
application performance without requiring code modifications.
Volume Shadowing for OpenVMS is an implementation of RAID 1 technology. HP
also offers a host-based RAID 0 and RAID 5 product.
|
 |
 |
|
 |
 |
Because a shadow set can be made up of multiple devices containing the same data, the
data can be read from any member of the shadow set, including a DECram device (a
pseudo device in host system memory).
Volume Shadowing determines which device to read from for each read operation, using
an algorithm that maximizes performance. As a result, at the same time that it provides
increased data availability, Volume Shadowing typically provides improved read
response performance.
Volume Shadowing ensures that device write operations are duplicated on all shadow set
members. For maximum performance, write operations are issued in parallel to full shadow set
members. If a copy operation is in process between a full shadow member and a
copy member (the device being added to the shadow set), the write operations
are issued in parallel to the full shadow members first, then they are issued
to the copy member.
|
 |
 |
|
 |
 |
Volume Shadowing software requires a minimum of one OpenVMS system and requires devices with the same amount of storage capacity. Although a shadow set can consist of only one device, two devices are
required to provide duplication of data. The use of two separately controlled devices provides a further guarantee of data availability in the case of controller failure. Use of an OpenVMS Cluster
system and multiple storage subsystems provides the greatest data redundancy and availability.
Starting with V7.3-2, Volume Shadowing allows shadow sets to contain devices of differing size and geometry (Dissimilar Device Shadowing). Combined with the feature allowing Dynamic Volume Expansion,
a shadow set can now be grown "on the fly" without bringing down the entire shadow set.
|
 |
 |
|
 |
 |
Volume Shadowing for OpenVMS is a System Integrated Product (SIP) and is included
in the OpenVMS Base Operating System kit. The license and documentation are
available under a separate order number.
For more information about Volume Shadowing, the OpenVMS operating system, and
other OpenVMS software, contact your HP business partner or local HP
representative.
©2004-2010 HewlettPackard Development Company, L.P.
Confidential computer software. Valid license from HP required for possession, use or copying.
Consistent with FAR 12.211 and 12.212,Commercial Computer Software, Computer Software Documentation,
and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's
standard commercial license.
The information contained herein is subject to change without
notice. The only warranties for HP products and services are set forth in the express
warranty statements accompanying such products and services. Nothing herein should be
construed as constituting an additional warranty. HP shall not be liable for technical
or editorial errors or omissions contained herein.
|
 |
|