Replica creation, See also – Dell PowerVault DP600 User Manual
Page 94
94
• Change tracking. This is a continuous process on each protected computer.
• Synchronization. This occurs on a regular schedule.
• Consistency check. This occurs when a replica becomes inconsistent.
• Express full backups. This occurs on a regular schedule.
• Back up to tape. This occurs on a regular schedule.
Understanding these operations and DPM processes will help you establish reasonable
expectations for DPM performance.
In This Section
See Also
Replica Creation
In DPM, a replica is a complete copy of the protected data on a single volume, database, or
storage group. The DPM protection agent on the protected computer sends the data selected for
protection to the DPM server. A replica of each member in the protection group is created.
Replica creation is one of the more resource-intensive DPM operations, with its greatest impact
being on network resources.
Typically, the performance of the replica creation will be limited by the speed of the network
connection between the DPM server and the protected computers. That is, the amount of time
that it takes to transfer a 1-gigabyte (GB) volume from a protected computer to the DPM server
will be determined by the amount of data per second that the network can transmit.
The following table shows the amount of time it would take, at different network speeds, to
transmit various amounts of data under optimal conditions. Times are given in hours, except
where specified as minutes.