BCM App brief

24
Hitachi Remote Copy Technologies and Hitachi Business Continuity Manager Software for Disaster Recovery Application Brief June 2007

Transcript of BCM App brief

Page 1: BCM App brief

Hitachi Remote Copy Technologies and Hitachi Business Continuity Manager Software for Disaster Recovery

Application Brief

June 2007

Page 2: BCM App brief

Executive Summary

In today’s business environment, unexpected downtime in the enterprise information system caused by disaster or system failure can have an enormous impact on business and productivity. To avoid these costly events, enterprises now implement disaster recovery plans that enable recovery of data within the enterprise information system should disaster or system failure occur.

Hitachi Data Systems offers storage-based remote copy products and the management software for such remote copy products—for example, Hitachi Business Continuity Manager software—to achieve disaster recovery. This Application Brief introduces various remote copy technologies and Business Continuity Manager software as the management tool for those remote copy technologies that Hitachi Data Systems offers for the mainframe environment. It discusses how construction and operation of a reliable disaster recovery system can be achieved with Business Continuity Manager software and the remote copy technologies and provides a real-world example of disaster recovery system construction.

Page 3: BCM App brief

Contents

Overview ............................................................................................................................................. 1

Hitachi Disaster Recovery Technologies ................................................................................................ 3

Storage-based Remote Copy Technologies .................................................................................................................... 3

Traditional Remote Copy Management—IBM® Peer to Peer Remote Copy (PPRC)........................................................ 8

Hitachi Business Continui ty Manager Software ...................................................................................... 8

Overview ........................................................................................................................................................................... 8

Functional Highlights......................................................................................................................................................... 9

Constituents of Business Continuity Manager Software ................................................................................................14

Using Business Continuity Manager Software................................................................................................................15

Case Study ....................................................................................................................................... 18

Summary .......................................................................................................................................... 20

Page 4: BCM App brief

1

Hitachi Remote Copy Technologies and Hitachi Business Continuity Manager Software for Disaster Recovery

Application Brief

Overview

The importance of the enterprise information system is ever increasing, with business demands requiring that it be operational and available 24 hours a day, every day. Information technology has been constantly advancing to meet this requirement and has achieved more than 99.99 percent availability of the information systems today. Nevertheless, there is always a chance of unplanned downtime of the information system or data loss because human error, disaster, or terrorism.

Once the downtime of the information system or data loss has occurred, the enterprise undergoes enormous loss of its profits. Table 1 illustrates an estimation of various costs of downtime per hour1, and shows that there is a chance of loss that is greater than US$6,000,0002 triggered by unplanned downtime.

Table 1. Estimation of Costs of Downtime per Hour

Industry Sectors Costs of Downtime (US$)

Brokerage Operations 6,450,000

Credit Card Authorization 2,600,000 Online Auction 225,000 E-shopping 180,000

Package Shipping Services 150,000 Home Shopping Channel 113,000

Catalog Sales Center 90,000 Airline Reservation Center 89,000 Cellular Service activation 41,000

Online Network Fees 25,000 ATM Service Fee 14,000

To minimize loss of profits from downtime and data loss, today’s enterprises consider disaster recovery as a primary concern. Disaster recovery is a plan and/or technology to recover the information system and its associated business-critical data from damage or failure in the event of either a natural or human-driven disaster. This is generally achieved through creating a backup copy of business data in a distant place (referred to as “secondary site”). In doing so, it is possible to resume a business operation at the secondary site even when the primary business site (referred to as “primary site”) has suffered from disaster.

1 David Patterson, April 25, 2002, “A Simple Way to Estimate the Cost of Downtime,” InternetWeek 4/3/2000, “Fibre Channel: A Comprehensive Introduction,” R. Kembel

2 All monetary figures in this document are US dollars unless otherwise indicated.

Page 5: BCM App brief

2

Two important measures should be taken into account when considering disaster recovery: recovery point objective (RPO) and recovery time objective (RTO).

• RPO. This measure of time indicates how much time a system should roll back to acquire the backup data that has guaranteed integrity upon occurrence of disaster.

• RTO. This is the target length of time to recover and resume the business operation from the point in time where the operation unexpectedly stopped, without suffering an enormous impact of downtime.

RPO and RTO are the measures of recovery objectives before and after the occurrence of disaster, respectively. Smaller values are more desirable for both RPO and RTO. Table 2 illustrates the relationships between RPO/RTO and various disaster recovery technologies.

Table 2. Relationship between RPO/RTO and Disaster Recovery Technologies

Disaster Recovery Technologies Description RPO RTO

Applicability to Long-distance Remote Copy

Applicability against Regional Disaster

Tape-based backup

This backup method regularly creates a copy of the business data on tape media.

24–168 hrs. 48–168 hrs. Applicable Conditionally applicable

Disk-based Backup (D2D Backup)

This backup method creates a copy of the business data on a disk media. It offers faster backup time than tape-based backup.

4–36 hrs. 4–24 hrs. Applicable Conditionally applicable

Storage-based Synchronous Remote Copy

In this backup method, the storage system at the primary site copies the updated/written data from the host machine to the storage system at the secondary site. The primary storage system does not provide notification of completion of I/O to the host machine until copy processes are fully accomplished at both the primary and the secondary sites. This method is ideal to guarantee no data loss, but it has limitations in the distance.

0–2 mins. 5–60 mins. Inapplicable Inapplicable

Page 6: BCM App brief

3

Table 2. Relationship between RPO/RTO and Disaster Recovery Technologies (continued)

Disaster Recovery Technologies Description RPO RTO

Applicability to Long-distance Remote Copy

Applicability against Regional Disaster

Storage-based Asynchronous Remote Copy

In this backup method, the storage system at the primary site copies the updated/written data from the host machine to the storage system at the secondary site. Unlike the synchronous remote copy, the primary storage system provides notification of completion of I/O to the host machine without sending the update/written data to the secondary storage system; update/written data is sent asynchronously to the secondary storage system. This method is applicable to long-distance remote copy, but has a chance of data loss depending on the network environment.

0–5 mins. 1-8 hrs. Applicable Applicable

Three Data Center Remote Copy

In this backup method, the primary storage system copies the update data from the host machine to two sites—one being more distant from the primary site than another. This method utilizes a combination of synchronous and asynchronous storage-based remote copy technologies to achieve no data loss within a wide region.

0–2 mins. 5-60 hrs. Applicable Applicable

As can be seen in Table 2, the storage-based remote copy technologies can drastically reduce RPO and RTO. Also, coverage of a wide region and RPO are in trade-off relationship. The decision as to which disaster recovery technology should be employed must be made based on contents of the business operation and the value of the business data.

Hitachi Disaster Recovery Technologies

Storage-based Remote Copy Technologies

Hitachi Data Systems provides various storage-based remote copy technologies that can achieve highly sophisticated disaster recovery.

Hitachi TrueCopy® Synchronous Software

Hitachi TrueCopy® Synchronous software is a storage-based synchronous remote copy technology that is available on Hitachi Universal Storage Platform™ V, Hitachi Universal Storage Platform™, and Hitachi Lightning 9900™ V Series enterprise storage systems. Input data from the host machine is copied to volumes in storage systems at both the primary and the secondary sites to guarantee the sameness in the data in both sites at any point in time. This will achieve zero data loss at the secondary site upon recovery from disaster.

Page 7: BCM App brief

4

Figure 1 illustrates operation of TrueCopy Synchronous software:

(1) The host machine issues the write I/O to the source volume at the primary site (primary volume, called Vol. A-P).

(2) The storage system at the primary site writes the input data to the Vol. A-P and transfers the input data to the storage system at the secondary site at the same time.

(3) The storage system at the secondary site receives the input data and writes it to the target volume (secondary volume, called Vol. A-S), and notifies completion of the process to the storage system at the primary site. When it receives the notification from the secondary site, the storage system at the primary site notifies completion of the entire process to the host machine.

Figure 1. TrueCopy Synchronous Software Configuration

Primary Site Application

Response

Update Data1

3

Volume ASecondary

Primary Site Secondary Site

Secondary Site Application

Update Data

Network

2

Volume APrimary

TrueCopy Synchronous software copies input data from the host machine to volumes in storage systems at both the primary and the

secondary sites to guarantee the sameness in the data in both sites at any point in time.

Hitachi TrueCopy Asynchronous Software

TrueCopy Asynchronous software is a storage-based asynchronous remote copy technology that is capable of long-distance remote copy and is available on the Universal Storage Platform V, Universal Storage Platform, and Lightning 9900 V Series enterprise storage systems. Unlike asynchronous remote copy technologies from competitors, TrueCopy Asynchronous software transfers data from the primary site to the secondary site in units of input data from the host machine. This achieves smaller RPO compared to the asynchronous technologies from competitors.

Page 8: BCM App brief

5

Figure 2 illustrates operation of TrueCopy Asynchronous software:

(1) The host machine issues the write I/O to the source volume (Vol. A-P). This primary storage system copies the incoming input data to its cache memory and writes it to Vol. A-P.

(2) The primary storage system notifies completion of the write process to the host machine.

(3) The primary storage system transfers the input data in its cache memory to the secondary storage system. This process happens asynchronously to the write process to Vol. A-P. The secondary storage system stores the transferred input data to its own cache memory.

(4) The secondary storage system writes the input data from its cache memory to Vol. A-S in order of their arrival (that is, older data is written to the volume first).

Figure 2. TrueCopy Asynchronous Software Configuration

Primary Site Application

Response

Update Data1

2

Primary Site Secondary Site

Secondary Site ApplicationU

pd

ate

Up

date

Network

3U

pd

ate

Up

date

Cache

Volume APrimary

Up

date

Cache

Volume ASecondary

TrueCopy Asynchronous software transfers data from the primary site to the secondary site in units of input data from the host machine,

achieving a smaller RPO than its competitors.

Hitachi Universal Replicator Software

Universal Replicator software is another storage-based asynchronous remote copy technology that is capable of long-distance remote copy and is available on the latest enterprise storage systems, such as the Universal Storage Platform V. Universal Replicator software not only inherits the characteristics of TrueCopy Asynchronous software that achieve smaller RPO, but also uses a large capacity volume, called a journal volume, that can be used in place of a cache memory in TrueCopy Asynchronous software. Use of a large capacity journal volume gives Universal Replicator software more robustness and tolerance against fluctuation of available bandwidth between two storage systems.

Figure 3 illustrates operation of Universal Replicator software:

(1) The host machine issues the write I/O to the source volume (Vol. A-P). The primary storage system copies the incoming input data to its journal volume (JNL) and writes it to Vol. A-P.

(2) The primary storage system notifies completion of the write process to the host machine.

Page 9: BCM App brief

6

(3) The secondary storage system reads in the input data in JNL of the primary storage system and stores it to its own JNL.

(4) The secondary storage system writes the input data from its JNL to Vol. A-S in order of their arrival.

Figure 3. Universal Replicator Configuration

Primary Site Application

Response

Update Data1

2

Primary Site Secondary Site

Secondary Site Application

Volume APrimary JNL

Volume ASecondary

Update

Update

JNL

Update

Update

Read

Network

Up

date

Up

date

3

Universal Replicator software is capable of long-distance storage-based, asynchronous remote copy and uses a large-capacity journal

volume for more robustness and tolerance against fluctuation of available bandwidth between two storage systems.

Remote Copy over Three Data Center Configuration (Three Data Center Remote Copy)

Three Data Center Remote Copy is a storage-based remote copy technology that is capable of data replication over long distance without data loss after occurrence of disaster. Three Data Center Remote Copy is available on the latest enterprise storage system, such as the Universal Storage Platform V.

A Three Data Center Remote Copy configuration is achieved with a combination of TrueCopy Synchronous and Universal Replicator software. The configuration has the merits from both remote copy technologies: no-data-loss capability of TrueCopy Synchronous software and long-distance coverage of Universal Replicator software. In a Three Data Center Remote Copy configuration, TrueCopy Synchronous and Universal Replicator software share the same primary volumes, and the site where the primary volumes reside is collectively referred to as the primary site. The secondary site of TrueCopy Synchronous software is referred to as the local site while the secondary site of Universal Replicator software is referred to as the remote site. The Three Data Center Remote Copy configuration is capable of resuming remote copy between the secondary sites of TrueCopy Synchronous and Universal Replicator software even after occurrence of disaster at the primary site. The Hitachi technology enables shorter intervals to resume remote copy process by comparing journal data and transfers only difference data between the local site and the remote site.

Figure 4 illustrates operation of a Three Data Center Remote Copy configuration:

(1) The host machine issues the write I/O to the source volume (Vol. A-P). The primary storage system sends the incoming input data to the journal volume (JNL) of the storage system at the local site. The primary storage system also writes the input data to its volume (Vol. A-P) and JNL.

(2) The local storage system writes the received input data in JNL to its target volume (Vol. A-L) and notifies completion of the write process to the primary storage system.

Page 10: BCM App brief

7

(3) The primary storage system notifies completion of the write process to the host machine.

(4) The storage system at the remote site reads in the input data in JNL of the primary storage system and stores it to its own JNL.

(5) The remote storage system writes the input data from its JNL to its target volume (Vol. A-R) in order of their arrival.

If the primary site becomes unavailable in the event of disaster, the Three Data Center Remote Copy configuration allows Universal Replicator software remote copy from the local storage system to the remote storage system. In this process, Universal Replicator software compares the data in the JNL of each site and copies only the difference data to promptly establish a copy relationship.

Figure 4. Three Data Center Remote Copy Configuration

Local Site Application

Primary Site Application

Response

Update Data1

3

Primary Site Remote Site

Remote Site Application

Hitachi Universal Replicator Software

Volume APrimary JNL

Volume ARemote

Update

Update

JNL

Update

Update

Local SiteVolume A

LocalJNL

Update

Update

Update

Hitachi TrueCopy®

Synchronous Software

2

Read

4 Up

date

Up

date

Achieved with combination of TrueCopy Synchronous and Universal Replicator software, the storage-based Three Data Center Remote

Copy configuration is capable of data replication over long distance without data loss after occurrence of disaster.

Page 11: BCM App brief

8

Traditional Remote Copy Management—IBM® Peer to Peer Remote Copy

(PPRC)

Hitachi storage products offer the interface to manage remote copy that is compatible with PPRC, (currently known as Metro Mirror) for the mainframe environment. PPRC is the storage-based remote copy technology by IBM and has the following characteristics:

(1) Command Line Interface (CLI) commands [Time-Sharing Option (TSO) commands] are provided as the user interface.

(2) Operation of replication is performed in units of a copy pair that consists of the primary and the secondary volumes.

(3) It can manage the storage-based synchronous and Hitachi asynchronous remote copy3.

Challenges

Managing remote copy with the PPRC-compatible interface poses the following challenges:

(1) Burden of management operation becomes incredibly large on a large-scale environment because it allows operation of remote copy only in units of a copy pair.

(2) Due to the nature of CLI interface, many parameters and operands are involved for management.

(3) Due to the nature of CLI interface, operation mistakes cannot be detected until execution of a command is completed.

(4) Because of compatibility with IBM’s PPRC, it is difficult to manage Hitachi remote copy functions.

Hitachi Business Continuity Manager Software

Overview

Business Continuity Manager software runs on the mainframe environment and offers various functions to manage the storage-based replication (both remote copy and Hitachi ShadowImage™ Heterogeneous Replication software). Business Continuity Manager software, in conjunction with the high-end Hitachi replication function, has the following characteristics:

(1) Grouping of copy pairs. It offers the interface to group the related copy pairs together and operate on such a group of copy pairs.

(2) Simplification of a replication configuration. Replication configuration can be defined and operated through the full-screen user interface.

(3) High affinity with Hitachi replication functions. It supports various Hitachi replication functions.

(4) High customizability. It offers CLI commands for REXX-based scripting to achieve highly customizable environment.

3 Only the storage-based synchronous remote copy can be operated via PPRC interface for an IBM storage system.

Page 12: BCM App brief

9

Functional Highlights

Business Continuity Manager software can greatly simplify introduction and management of Hitachi replication functions in the mainframe (IBM OS/390® and IBM z/OS®) environment. The following sections describe each of the highlights that Business Continuity Manager software offers.

Grouping of Copy Pairs

Business Continuity Manager software allows quick and easy definition of a collection of copy pairs that share the same properties, called a copy group, so that all copy pairs that belong to the same copy group can be logically treated as a single unit. This achieves tremendously simple management of large-scale replication that consists of hundreds or even thousands of copy pairs with fewer steps of operation and can reduce the cost of management.

Figure 5 shows a comparison of remote copy management between the traditional PPRC interface and the grouping interface of Business Continuity Manager software. While the PPRC interface requires a user to issue a command to each copy pair in replication, Business Continuity Manager software allows a user to operate on multiple copy pairs by simply issuing a command to a copy group. This grouping feature of Business Continuity Manager software allows management of large-scale replication environment, whether it is remote copy or in-system replication, with a simple operation. It may also reduce the chance of operation mistakes.

Page 13: BCM App brief

10

Figure 5. Comparing PPRC and Business Continuity Manager Software

PPRC

Storage on Primary Site Storage on Secondary Site

Administrator

Replication Operation with PPRC

Business ContinuityManager Software

Storage on Primary Site Storage on Secondary Site

Administrator

Replication Operation with Busines Continuity Manager Software

Issue commandagainst groupor copy pairs.

Issue commandagainst groupor copy pairs.

Unit of Operation

Legend

Move Copy Command

Move Copy Command

Instruction

Instruction

Instruction

Instruction

Instruction

Instruction

Instruction

Instruction

While the PPRC interface requires a user to issue a command to each copy pair in replication, Business Continuity Manager software

allows a user to operate on multiple copy pairs by simply issuing a command to a copy group.

Page 14: BCM App brief

11

Simplification of a Replication Configuration

Business Continuity Manager software offers ease of definition and configuration of replication management with the full-screen user interface [Interactive System Productivity Facility (ISPF) panels] that can reduce the burden of users from managing large-scale replication environments with the traditional approach. With Business Continuity Manager software, the following operations can be performed:

(1) Retrieval of hardware information, such as the type of a storage system, usable replication products, and available volumes for replication at the primary and the secondary site

(2) Definition of copy pairs, and addition and removal of pairs from such definition

(3) Retrieval and display of the replication environment and information of copy pair status and performance

Use of ISPF panels provides the following advantages:

(1) A user can manage and retrieve information regarding the replication environment with reduced risk of operation mistakes because of fewer keystrokes.

(2) A user can view necessary information about the replication environment on the screen.

(3) ISPF provides informative “HELP” panels for various items that are available on the screen.

Figure 6 illustrates one of Business Continuity Manager software’s ISPF panels.

Figure 6. Example of ISPF Panels

Use of ISPF panels provides the user with easy access to information regarding the replication environment.

Page 15: BCM App brief

12

High Affinity with Hitachi Replication Functions: Management of Replication Process in the Storage System at the Secondary Site

Business Continuity Manager software allows a user to manage replication process of the volumes in a storage system that does not have direct connection to the host machine, as shown in Figure 7. This function can reduce the cost of operation of the remote site because a user can operate the storage system at the secondary site in a manner similar to operating the storage system at the primary site that has direct connection to the host machine:

• Manipulation of volumes in the storage system at the secondary site (discovery of volumes, establishment and monitoring of copy pairs, and so on)

• Automated management of replication configuration, including copy pairs at the secondary site

Figure 7. Management of Storage System without Host Connection

Business ContinuityManager Software

Storage on Primary Site Storage on Secondary Site

Administrator

CDEV CDEV

Remote Copy Operation Copy Operation

Instructio

n

Manage the configurationreplication in secondary site

as if it were residing in local storage.

Business Continuity Manager software allows a user to manage replication process of the volumes in a storage system that does not have

direct connection to the host machine.

Management of a Consistency Group (C/T Group)

By defining a copy group with a C/T group ID that is registered in a storage system, Business Continuity Manager software can sustain consistency between copy pairs in the same copy group (see Figure 8).

With 4x4 configuration (configuration in which multiple storage systems at both the primary and the secondary sites are paired for replication) with Universal Replicator software, it is possible to sustain consistency even across multiple storage systems.

Instructions need be issued to the storage system to operate a C/T group just once for each operation. This can greatly reduce the time for replication operation.

Page 16: BCM App brief

13

Figure 8. Management of Copy Groups with or without C/T Group ID

Business ContinuityManager Software

Storage on Primary Site Storage on Secondary Site

Administrator

Copy Group Management without Consistency Group

Business ContinuityManager Software

Storage on Primary Site Storage on Secondary Site

Administrator

Copy Group Management with Consistency Group

Issue commandto a Consistency Group.

Issue commandto respective pairs.

Unit of Operation

Legend

Remote Copy Command

Move Copy Command

Instruction

Instruction

Instruction

Instruction

Instruction

Sequence of update is guaranteed.

By defining a copy group with a C/T group ID that is registered in a storage system, Business Continuity Manager software can sustain

consistency between copy pairs in the same copy group.

Page 17: BCM App brief

14

High Customizability

Business Continuity Manager software achieves easy and fine-grained customization of a replication configuration through REXX scripting. Business Continuity Manager software offers variety of CLI commands that can be called from a REXX script to help customization. The following list shows some of the CLI commands that Business Continuity Manager software provides for customization and manipulation of the replication environment:

• The YKMAKE command that triggers replication in units of copy group

• The YKEWAIT command that waits for a copy group to become a specified replication status

• The YKCONMSG command that captures the console message IEA494I, which indicates transition of the replication status of a copy group of TrueCopy software (both Synchronous and Asynchronous)

• The YKSUSPND command that suspends the replication process of a specified copy group at the specified point in time

• The YKSTATS command that acquires the performance information of TrueCopy Asynchronous and Universal Replicator software

By using those CLI commands, it is possible to create a REXX script that, for example, acquires the performance information of ongoing remote copy and sends a notification message to a storage administrator if the performance degrades under the certain threshold.

Others: Hitachi Storage Management Suite Software Linkage

With the Storage Management Suite Mainframe Agent (formerly called HiCommand Mainframe Agent), it is possible to provide information regarding replication configuration in the mainframe environment, such as the copy group definition, copy pair status, volume information, and so on, from Business Continuity Manager software to Storage Management Suite modules. This enables viewing and monitoring the information of mainframe storage through Storage Management Suite modules.

Difference between “Definition” and “Management”

In Business Continuity Manager software, the definition of replication configuration is independent of its management part (ISPF and REXX scripting). This means that whether Business Continuity Manager software runs on the primary site or the secondary site, it can use the same definition of replication configuration. When replication configuration has changed, a user has to reflect such change only to the definition; the management part of Business Continuity Manager software can remain unchanged. This separation between definition of replication environment and the management components of Business Continuity Manager software can minimize the effect of introducing a new replication configuration or expansion of the system.

Constituents of Business Continuity Manager Software

As shown in Figure 9, Business Continuity Manager software consists of four major components as well as user scripting for customizability:

• Business Continuity Manager software (IO Engine). The foundation of Business Continuity Manager software accepts instruction from a user, creates and refers to definition files of replication configuration, and issues instruction to a storage system for replication management.

• CLI. This collection of commands can be called from a REXX script for management and monitoring of replication configuration.

• Interactive System Productivity Facility (ISPF). An interactive user interface, ISPF allows users to define, manage, and monitor replication configuration.

• Mobile Floating (MF)-Agent. This agent provides information regarding Business Continuity Manager software–managed replication configuration to Storage Management Suite modules.

Page 18: BCM App brief

15

• User script(s). This is a REXX script that is written by a user with CLI.

Figure 9. Structure of Business Continuity Manager Software

Hitachi Storage Management Suite Software

ReplicationInstruction Information of

Replication/Performance

Hitachi TrueCopy®, Universal Replicator, and ShadowImage™ Software

ISPF MF Agent UserScript

Command Line Interface

Busines Continuity Manager Software (I/O Engine)

IBM® z/OS®

UserScript

ConfigurationFilesConfiguration

FilesConfigurationFiles

Administrator

Business Continuity Manager software consists of four major components as well as user scripting for customizability.

Using Business Continuity Manager Software

Business Continuity Manager software can be used to define and manage replication configuration. The following subsections describe each usage in detail.

Definition of Replication Configuration

A user can acquire hardware information regarding a storage system and define replication configuration through Business Continuity Manager software’s ISPF. A user can specify the range of the device number or VOLSER (tape volume serial number) to acquire the hardware information as shown in Figure 10.

Page 19: BCM App brief

16

Figure 10. Acquisition of Hardware Information through ISPF

A user can acquire hardware information regarding a storage system and define replication configuration through Business Continuity

Manager software’s ISPF.

The next step is to define a copy group using the acquired storage system information. To define a copy group, the copy type (TrueCopy Synchronous, TrueCopy Asynchronous, Universal Replicator, or ShadowImage software) and the attributes specific to the given copy type and copy pairs must be specified. Figure 11 shows ISPF panel to specify copy pairs. As in the figure, a user may specify the range of volumes that form copy pairs in a copy group by either the device numbers or VOLSER. Information in the definition file can also be viewed from ISPF as shown in Figure 12.

Figure 11. Definition of Copy Pairs through ISPF

A user can specify copy pairs through Business Continuity Manager software’s ISPF.

Page 20: BCM App brief

17

Figure 12. Viewing Copy Group Definition Information through ISPF

When a copy group has been defined, copy group definition information may be viewed through the ISPF.

Management of Replication Configuration

Business Continuity Manager software provides two ways to manage replication configuration: ISPF and a user-written REXX script.

On ISPF, the user can specify various “actions” to the defined copy groups. Figure 13 shows a typical image of managing a copy group with ISPF.

Page 21: BCM App brief

18

Figure 13. Management of Copy Groups through ISPF

On ISPF, the user can specify various “actions” to the defined copy groups.

A user-written REXX script utilizes CLI commands that Business Continuity Manager software offers to manage replication configuration in more fine-grained manner. REXX scripting is particularly useful when managing a complex configuration such as a Three Data Center Remote Copy configuration.

Case Study

This section introduces a usage example in which Business Continuity Manager software was applied to a banking system.

The bank in this example is running its system on an IBM mainframe host, and it had been using a tape-based data backup system. As the need arose to establish more sophisticated contingency framework, the bank was determined to introduce a storage-based disaster recovery system with the following objectives:

(1) Avoid degradation in performance of the business server.

(2) Meet an RTO of four hours.

(3) Set a minimum distance of 60km between the primary site and the secondary site, according to the guideline provided by The Center for Financial Industry and Information Systems of Japan [Federal Information Security Conference (FISC)].

(4) To reduce the cost of operation, make the secondary site operational only when the primary site becomes inactive by disaster.

The disaster recovery system for the banking system shown in Figure 14 was designed to achieve those objectives. Hitachi Lightning 9980V™ multi-cabinet enterprise storage systems were selected, and ATM lines were made duplex. The data transfers between the storage systems were achieved with TrueCopy Asynchronous

Page 22: BCM App brief

19

software. To ensure recovery of business operation, the data that was replicated to the secondary site was further replicated by ShadowImage software at certain points in time where the business operation could be resumed with integrity. To operate ShadowImage software at the secondary site without running the mainframe host at the same site, Business Continuity Manager software was employed to manage the replication process at the secondary site from the primary site.

With the storage-based solution founded on abundant Hitachi experience in construction of disaster recovery systems, the new system began operation in production on September 15, 2004, just one year after the start of the project. The new disaster recovery system fulfilled all objectives that were set at the beginning of the project and still runs in production. Taking full advantage of Business Continuity Manager software’s strength, especially separation between definition and management of replication configuration, the central design of the management system became simple enough that it contributed to the shorter development time of the system, expansion in the scale of the system, and change in the plan for disaster recovery operations.

Figure 14. Disaster Recovery System for the Banking Systems

IBM MainframeComputer

Fibre ChannelSwitch

ATM Switch

Hitachi Universal Storage Platform™ V

Hitachi Universal Storage Platform™ V

(2TB)

zSeries

zSeries

CHExtender

Fibre ChannelSwitch

ATM Switch

Hitachi TrueCopy® Asynchronous Software

ATM150Mbit/sec

ATM150Mbit/sec

CHExtender

IBM MainframeComputer

Fibre ChannelSwitch

ATM Switch

Secondary SitePrimary Site

(4TB)

zSeries

zSeries

CHExtender

Fibre ChannelSwitch

ATM Switch

CHExtender SI

The new disaster recovery system takes full advantage of Business Continuity Manager software’s strength, especially separation between

definition and management of replication configuration.

Page 23: BCM App brief

20

Summary

Enterprise information systems and the data they handle continue to grow in scale and importance, and disaster recovery systems to ensure business continuity of enterprise information systems upon disaster or failure have been vital in today’s business world. Hitachi Data Systems offers variety of storage-based remote copy technologies and their management software, Business Continuity Manager software, to fulfill the requirements for today’s disaster recovery systems.

Following is the list of storage-based remote copy technologies offered by Hitachi Data Systems:

(1) TrueCopy Synchronous software, which suffers no data loss at the secondary site upon disaster

(2) TrueCopy Asynchronous software, which is suitable for long-distance remote copy

(3) Universal Replicator software, which is suitable for long-distance remote copy and is tolerant of available bandwidth fluctuation between two storage systems

(4) Three Data Center Remote Copy, which is a technology/configuration that achieves long-distance remote copy without data loss even upon disaster

Business Continuity Manager software manages storage-based replication technologies that run on the mainframe environment with the following characteristics:

(1) Ease of replication management

– Copy pairs can be organized into a group and can be operated in units of such groups.

– A full-screen user interface through ISPF offers ease and intuitiveness in definition and management of replication configuration.

(2) High customizability and flexibility in replication management

– Separation between definition and management of replication configuration minimizes the effect of changes in replication configuration to management.

– It provides of ease of use for Hitachi replication technologies.

– It provides ease of automation through REXX scripting.

Business Continuity Manager software has been used to construct disaster recovery systems. In one case, Business Continuity Manager software supported a new disaster recovery system for a banking system in which data is replicated well over 500km, with the mainframe system at the secondary site remaining inactive during the normal production operation.

With Business Continuity Manager software managing Hitachi storage-based remote copy products, organizations can achieve reliable easy-to-administer disaster recovery for their mainframe environments.

Page 24: BCM App brief

Hitachi Data Systems Corporation

Corporate Headquarters 750 Central Expressway, Santa Clara, California 95050-2627 USA Contact Information: + 1 408 970 1000 www.hds.com / [email protected]

Asia Pacific and Americas 750 Central Expressway, Santa Clara, California 95050-2627 USA

Contact Information: + 1 408 970 1000 www.hds.com / [email protected]

Europe Headquarters Sefton Park, Stoke Poges, Buckinghamshire SL2 4HD United Kingdom

Contact Information: + 44 (0) 1753 618000 www.hds.com / [email protected]

Hitachi is a registered trademark of Hitachi, Ltd., and/or its affiliates in the United States and other countries. Hitachi Data Systems is a registered trademark and

service mark of Hitachi, Ltd., in the United States and other countries.

TrueCopy is a registered trademark and Lightning 9900, Lightning 9980V, and ShadowImage are trademarks of Hitachi Data Systems Corporation.

IBM, OS/3990, and z/OS are registered trademarks of International Business Machines Corporation.

All other trademarks, service marks, and company names are properties of their respective owners.

Notice: This document is for informational purposes only, and does not set forth any warranty, express or implied, concerning any equipment or service offered

or to be offered by Hitachi Data Systems. This document describes some capabilities that are conditioned on a maintenance contract with Hitachi Data Systems

being in effect, and that may be configuration-dependent, and features that may not be currently available. Contact your local Hitachi Data Systems sales office

for information on feature and product availability.

Hitachi Data Systems sells and licenses its products subject to certain terms and conditions, including limited warranties. To see a copy of these terms and

conditions prior to purchase or license, please go to http://www.hds.com/products_services/support/warranty.html or call your local sales representative to

obtain a printed copy. If you purchase or license the product, you are deemed to have accepted these terms and conditions.

© Hitachi Data Systems Corporation 2007. All Rights Reserved.

WHP-247-00 LKW June 2007