  | 
					»  | 
					 | 
				 
			 
			
		 | 
        
          | 
        
  
        
        
            | 
           | 
            | 
         
        
            | 
         
        
            | 
          
 
High data availability for business-critical computing
 
Volume Shadowing for OpenVMS transparently provides high data availability for your users and applications
including businesscritical applications. 
HP Volume Shadowing for OpenVMS product description [MS Word] | 
[PDF] 
   
Inaccessible or lost data in your critical production systems can mean
lost revenueand often lost customers. You need dependable, secure computing that ensures that your data 
is continuously available. Volume Shadowing for OpenVMS transparently provides 
high data availability for your users and applicationsincluding businesscritical 
applications running in a client/server environment. 
 
In most computing environments, the potential for major data availability problems is 
always present. Media storage devices can deteriorate over time, and system components, 
such as controllers and interconnects, sometimes fail.  If a failure occurs, data may be lost 
or inaccessible for hours or days, or response time may be so slow that your systems 
become, in effect, nonoperational. 
 
For many years, hostbased Volume Shadowing for OpenVMS has ensured data 
availability for users who rely on OpenVMS systems. Volume Shadowing for OpenVMS is a premier, proven implementation of 
RAID technology, which ensures that data remains accessible in the event of media 
deterioration or of controller, device, or interconnect failure. With Volume Shadowing, 
you can confidently run your business-critical applications and know that your data will 
always be available when and where it is needed.       
            | 
            | 
         
        
            | 
         
        
            | 
         
         
                          
              
                  | 
                 | 
               
              
                  | 
               
              
                  | 
                
- Volume Shadowing is supported on clustered and standalone systems, on low-end and high-end systems, and on OpenVMS Integrity server, AlphaServer, and VAX systems. Maximum choice and flexibility
are yours.
 - The set of devices on which the data is duplicated is known as a shadow set. A shadow set consists of up to three devices. Each device within the shadow set is known as a shadow set member. Data
availability requires at least two devices in the shadow set.
 - Shadowing the OpenVMS system disk increases not only data availability but also system availability.
 - Shadowing plays a vital role in disaster-tolerant cluster configurations.
 - Shadowing OpenVMS volumes increases application data availability.
 - A shadowed cluster environment can be configured with no single point of failure, providing the highest levels of data availability possible in the industry.
 - Backup can occur with minimal or no interruption to operations, allowing 24 x 365 datacenter uptime.
 - System manager determines access to files and data in the event of failure of controllers, devices, or interconnects, or of a site disaster.
 - Data can be duplicated over great distances, providing disaster-tolerant capabilities. For example, Fibre Channel currently supports distances of up to 100 km, achieved through use of interswitch
links (ISLs) that use single-mode fiber. This capability ensures that data lost through disruption or disaster at one site can be accessed at another site.
 - Support for up to 500 multimember shadow sets ensures the availability of large amounts of data. The maximum number of single-member shadow sets is 10,000.
 - Use of Volume Shadowing requires no change to applications.
 - Licensing allows both per-disk and capacity-based licenses (except on Integrity servers, where only a capacity license is available).
                           
  
                 | 
               
              
                  | 
               
             
            
             
 
            
            
              
                  | 
                 | 
               
              
                  | 
               
              
                  | 
                
 
Volume Shadowing for OpenVMS transparently provides high data availability by 
preventing data loss from media deterioration, from controller, device, or interconnect 
failure, or from site disaster.  
 
Data is synchronously recorded on multiple devices and remains
accessible when one device is unavailable. Read and write operations to the volume continue 
transparently with the remaining shadow set members. A copy of the data is always 
available.  Such data availability prevents storage subsystem components from becoming 
a single point of failure, which could interrupt system or application operations.  
 
Access to a shadow set is achieved by means of a virtual disk mechanism. After a shadow 
set is created, applications and users access the virtual disk unit as if it were a standard, 
physical device. 
                  | 
               
              
                  | 
               
             
 
            
            
            
            
 
            
              
                  | 
                 | 
               
              
                  | 
               
              
                  | 
                
 
Volume Shadowing is an implementation of RAID technology. RAID (redundant arrays 
of independent disks) is a collective name for several techniques used to configure and 
manage multiple devices to achieve improvements in online storage availability and I/O 
performance at a reasonable cost. 
 
Arrays of devices are managed by software and are made to look to operating systems 
and users like a single device. RAID arrays provide increased data availability and 
application performance without requiring code modifications.
 
Volume Shadowing for OpenVMS is an implementation of RAID 1 technology. HP
also offers a host-based RAID 0 and RAID 5 product.
                  | 
               
              
                  | 
               
             
 
            
            
              
                  | 
                 | 
               
              
                  | 
               
              
                  | 
                
 
Because a shadow set can be made up of multiple devices containing the same data, the 
data can be read from any member of the shadow set, including a DECram device (a 
pseudo device in host system memory). 
 
Volume Shadowing determines which device to read from for each read operation, using 
an algorithm that maximizes performance. As a result, at the same time that it provides 
increased data availability, Volume Shadowing typically provides improved read 
response performance. 
 
Volume Shadowing ensures that device write operations are duplicated on all shadow set 
members. For maximum performance, write operations are issued in parallel to full shadow set
members. If a copy operation is in process between a full shadow member and a
copy member (the device being added to the shadow set), the write operations
are issued in parallel to the full shadow members first, then they are issued
to the copy member.  
                  | 
               
              
                  | 
               
                                 
            
            
            
              
                  | 
                 | 
               
              
                  | 
               
              
                  | 
                
 
Volume Shadowing software requires a minimum of one OpenVMS system and requires devices with the same amount of storage capacity. Although a shadow set can consist of only one device, two devices are
required to provide duplication of data. The use of two separately controlled devices provides a further guarantee of data availability in the case of controller failure. Use of an OpenVMS Cluster
system and multiple storage subsystems provides the greatest data redundancy and availability. 
 
Starting with V7.3-2, Volume Shadowing allows shadow sets to contain devices of differing size and geometry (Dissimilar Device Shadowing). Combined with the feature allowing Dynamic Volume Expansion,
a shadow set can now be grown "on the fly" without bringing down the entire shadow set. 
                 | 
               
              
                  | 
               
             
 
            
            
              
                  | 
                 | 
               
              
                  | 
               
              
                  | 
                
 
Volume Shadowing for OpenVMS is a System Integrated Product (SIP) and is included 
in the OpenVMS Base Operating System kit. The license and documentation are 
available under a separate order number. 
 
For more information about Volume Shadowing, the OpenVMS operating system, and 
other OpenVMS software, contact your HP business partner or local HP 
representative.  
 
©2004-2010 HewlettPackard Development Company, L.P.
 
Confidential computer software. Valid license from HP required for possession, use or copying. 
Consistent with FAR 12.211 and 12.212,Commercial Computer Software, Computer Software Documentation, 
and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's
standard commercial license.
 
The information contained herein is subject to change without
notice. The only warranties for HP products and services are set forth in the express
warranty statements accompanying such products and services. Nothing herein should be 
construed as constituting an additional warranty. HP shall not be liable for technical 
or editorial errors or omissions contained herein.
                  | 
               
              
                  | 
               
             
  
  
  
		 |