BCM App brief
-
Upload
koichiro-nakajima -
Category
Documents
-
view
38 -
download
1
Transcript of BCM App brief
Hitachi Remote Copy Technologies and Hitachi Business Continuity Manager Software for Disaster Recovery
Application Brief
June 2007
Executive Summary
In today’s business environment, unexpected downtime in the enterprise information system caused by disaster or system failure can have an enormous impact on business and productivity. To avoid these costly events, enterprises now implement disaster recovery plans that enable recovery of data within the enterprise information system should disaster or system failure occur.
Hitachi Data Systems offers storage-based remote copy products and the management software for such remote copy products—for example, Hitachi Business Continuity Manager software—to achieve disaster recovery. This Application Brief introduces various remote copy technologies and Business Continuity Manager software as the management tool for those remote copy technologies that Hitachi Data Systems offers for the mainframe environment. It discusses how construction and operation of a reliable disaster recovery system can be achieved with Business Continuity Manager software and the remote copy technologies and provides a real-world example of disaster recovery system construction.
Contents
Overview ............................................................................................................................................. 1
Hitachi Disaster Recovery Technologies ................................................................................................ 3
Storage-based Remote Copy Technologies .................................................................................................................... 3
Traditional Remote Copy Management—IBM® Peer to Peer Remote Copy (PPRC)........................................................ 8
Hitachi Business Continui ty Manager Software ...................................................................................... 8
Overview ........................................................................................................................................................................... 8
Functional Highlights......................................................................................................................................................... 9
Constituents of Business Continuity Manager Software ................................................................................................14
Using Business Continuity Manager Software................................................................................................................15
Case Study ....................................................................................................................................... 18
Summary .......................................................................................................................................... 20
1
Hitachi Remote Copy Technologies and Hitachi Business Continuity Manager Software for Disaster Recovery
Application Brief
Overview
The importance of the enterprise information system is ever increasing, with business demands requiring that it be operational and available 24 hours a day, every day. Information technology has been constantly advancing to meet this requirement and has achieved more than 99.99 percent availability of the information systems today. Nevertheless, there is always a chance of unplanned downtime of the information system or data loss because human error, disaster, or terrorism.
Once the downtime of the information system or data loss has occurred, the enterprise undergoes enormous loss of its profits. Table 1 illustrates an estimation of various costs of downtime per hour1, and shows that there is a chance of loss that is greater than US$6,000,0002 triggered by unplanned downtime.
Table 1. Estimation of Costs of Downtime per Hour
Industry Sectors Costs of Downtime (US$)
Brokerage Operations 6,450,000
Credit Card Authorization 2,600,000 Online Auction 225,000 E-shopping 180,000
Package Shipping Services 150,000 Home Shopping Channel 113,000
Catalog Sales Center 90,000 Airline Reservation Center 89,000 Cellular Service activation 41,000
Online Network Fees 25,000 ATM Service Fee 14,000
To minimize loss of profits from downtime and data loss, today’s enterprises consider disaster recovery as a primary concern. Disaster recovery is a plan and/or technology to recover the information system and its associated business-critical data from damage or failure in the event of either a natural or human-driven disaster. This is generally achieved through creating a backup copy of business data in a distant place (referred to as “secondary site”). In doing so, it is possible to resume a business operation at the secondary site even when the primary business site (referred to as “primary site”) has suffered from disaster.
1 David Patterson, April 25, 2002, “A Simple Way to Estimate the Cost of Downtime,” InternetWeek 4/3/2000, “Fibre Channel: A Comprehensive Introduction,” R. Kembel
2 All monetary figures in this document are US dollars unless otherwise indicated.
2
Two important measures should be taken into account when considering disaster recovery: recovery point objective (RPO) and recovery time objective (RTO).
• RPO. This measure of time indicates how much time a system should roll back to acquire the backup data that has guaranteed integrity upon occurrence of disaster.
• RTO. This is the target length of time to recover and resume the business operation from the point in time where the operation unexpectedly stopped, without suffering an enormous impact of downtime.
RPO and RTO are the measures of recovery objectives before and after the occurrence of disaster, respectively. Smaller values are more desirable for both RPO and RTO. Table 2 illustrates the relationships between RPO/RTO and various disaster recovery technologies.
Table 2. Relationship between RPO/RTO and Disaster Recovery Technologies
Disaster Recovery Technologies Description RPO RTO
Applicability to Long-distance Remote Copy
Applicability against Regional Disaster
Tape-based backup
This backup method regularly creates a copy of the business data on tape media.
24–168 hrs. 48–168 hrs. Applicable Conditionally applicable
Disk-based Backup (D2D Backup)
This backup method creates a copy of the business data on a disk media. It offers faster backup time than tape-based backup.
4–36 hrs. 4–24 hrs. Applicable Conditionally applicable
Storage-based Synchronous Remote Copy
In this backup method, the storage system at the primary site copies the updated/written data from the host machine to the storage system at the secondary site. The primary storage system does not provide notification of completion of I/O to the host machine until copy processes are fully accomplished at both the primary and the secondary sites. This method is ideal to guarantee no data loss, but it has limitations in the distance.
0–2 mins. 5–60 mins. Inapplicable Inapplicable
3
Table 2. Relationship between RPO/RTO and Disaster Recovery Technologies (continued)
Disaster Recovery Technologies Description RPO RTO
Applicability to Long-distance Remote Copy
Applicability against Regional Disaster
Storage-based Asynchronous Remote Copy
In this backup method, the storage system at the primary site copies the updated/written data from the host machine to the storage system at the secondary site. Unlike the synchronous remote copy, the primary storage system provides notification of completion of I/O to the host machine without sending the update/written data to the secondary storage system; update/written data is sent asynchronously to the secondary storage system. This method is applicable to long-distance remote copy, but has a chance of data loss depending on the network environment.
0–5 mins. 1-8 hrs. Applicable Applicable
Three Data Center Remote Copy
In this backup method, the primary storage system copies the update data from the host machine to two sites—one being more distant from the primary site than another. This method utilizes a combination of synchronous and asynchronous storage-based remote copy technologies to achieve no data loss within a wide region.
0–2 mins. 5-60 hrs. Applicable Applicable
As can be seen in Table 2, the storage-based remote copy technologies can drastically reduce RPO and RTO. Also, coverage of a wide region and RPO are in trade-off relationship. The decision as to which disaster recovery technology should be employed must be made based on contents of the business operation and the value of the business data.
Hitachi Disaster Recovery Technologies
Storage-based Remote Copy Technologies
Hitachi Data Systems provides various storage-based remote copy technologies that can achieve highly sophisticated disaster recovery.
Hitachi TrueCopy® Synchronous Software
Hitachi TrueCopy® Synchronous software is a storage-based synchronous remote copy technology that is available on Hitachi Universal Storage Platform™ V, Hitachi Universal Storage Platform™, and Hitachi Lightning 9900™ V Series enterprise storage systems. Input data from the host machine is copied to volumes in storage systems at both the primary and the secondary sites to guarantee the sameness in the data in both sites at any point in time. This will achieve zero data loss at the secondary site upon recovery from disaster.
4
Figure 1 illustrates operation of TrueCopy Synchronous software:
(1) The host machine issues the write I/O to the source volume at the primary site (primary volume, called Vol. A-P).
(2) The storage system at the primary site writes the input data to the Vol. A-P and transfers the input data to the storage system at the secondary site at the same time.
(3) The storage system at the secondary site receives the input data and writes it to the target volume (secondary volume, called Vol. A-S), and notifies completion of the process to the storage system at the primary site. When it receives the notification from the secondary site, the storage system at the primary site notifies completion of the entire process to the host machine.
Figure 1. TrueCopy Synchronous Software Configuration
Primary Site Application
Response
Update Data1
3
Volume ASecondary
Primary Site Secondary Site
Secondary Site Application
Update Data
Network
2
Volume APrimary
TrueCopy Synchronous software copies input data from the host machine to volumes in storage systems at both the primary and the
secondary sites to guarantee the sameness in the data in both sites at any point in time.
Hitachi TrueCopy Asynchronous Software
TrueCopy Asynchronous software is a storage-based asynchronous remote copy technology that is capable of long-distance remote copy and is available on the Universal Storage Platform V, Universal Storage Platform, and Lightning 9900 V Series enterprise storage systems. Unlike asynchronous remote copy technologies from competitors, TrueCopy Asynchronous software transfers data from the primary site to the secondary site in units of input data from the host machine. This achieves smaller RPO compared to the asynchronous technologies from competitors.
5
Figure 2 illustrates operation of TrueCopy Asynchronous software:
(1) The host machine issues the write I/O to the source volume (Vol. A-P). This primary storage system copies the incoming input data to its cache memory and writes it to Vol. A-P.
(2) The primary storage system notifies completion of the write process to the host machine.
(3) The primary storage system transfers the input data in its cache memory to the secondary storage system. This process happens asynchronously to the write process to Vol. A-P. The secondary storage system stores the transferred input data to its own cache memory.
(4) The secondary storage system writes the input data from its cache memory to Vol. A-S in order of their arrival (that is, older data is written to the volume first).
Figure 2. TrueCopy Asynchronous Software Configuration
Primary Site Application
Response
Update Data1
2
Primary Site Secondary Site
Secondary Site ApplicationU
pd
ate
Up
date
Network
3U
pd
ate
Up
date
Cache
Volume APrimary
Up
date
Cache
Volume ASecondary
TrueCopy Asynchronous software transfers data from the primary site to the secondary site in units of input data from the host machine,
achieving a smaller RPO than its competitors.
Hitachi Universal Replicator Software
Universal Replicator software is another storage-based asynchronous remote copy technology that is capable of long-distance remote copy and is available on the latest enterprise storage systems, such as the Universal Storage Platform V. Universal Replicator software not only inherits the characteristics of TrueCopy Asynchronous software that achieve smaller RPO, but also uses a large capacity volume, called a journal volume, that can be used in place of a cache memory in TrueCopy Asynchronous software. Use of a large capacity journal volume gives Universal Replicator software more robustness and tolerance against fluctuation of available bandwidth between two storage systems.
Figure 3 illustrates operation of Universal Replicator software:
(1) The host machine issues the write I/O to the source volume (Vol. A-P). The primary storage system copies the incoming input data to its journal volume (JNL) and writes it to Vol. A-P.
(2) The primary storage system notifies completion of the write process to the host machine.
6
(3) The secondary storage system reads in the input data in JNL of the primary storage system and stores it to its own JNL.
(4) The secondary storage system writes the input data from its JNL to Vol. A-S in order of their arrival.
Figure 3. Universal Replicator Configuration
Primary Site Application
Response
Update Data1
2
Primary Site Secondary Site
Secondary Site Application
Volume APrimary JNL
Volume ASecondary
Update
Update
JNL
Update
Update
Read
Network
Up
date
Up
date
3
Universal Replicator software is capable of long-distance storage-based, asynchronous remote copy and uses a large-capacity journal
volume for more robustness and tolerance against fluctuation of available bandwidth between two storage systems.
Remote Copy over Three Data Center Configuration (Three Data Center Remote Copy)
Three Data Center Remote Copy is a storage-based remote copy technology that is capable of data replication over long distance without data loss after occurrence of disaster. Three Data Center Remote Copy is available on the latest enterprise storage system, such as the Universal Storage Platform V.
A Three Data Center Remote Copy configuration is achieved with a combination of TrueCopy Synchronous and Universal Replicator software. The configuration has the merits from both remote copy technologies: no-data-loss capability of TrueCopy Synchronous software and long-distance coverage of Universal Replicator software. In a Three Data Center Remote Copy configuration, TrueCopy Synchronous and Universal Replicator software share the same primary volumes, and the site where the primary volumes reside is collectively referred to as the primary site. The secondary site of TrueCopy Synchronous software is referred to as the local site while the secondary site of Universal Replicator software is referred to as the remote site. The Three Data Center Remote Copy configuration is capable of resuming remote copy between the secondary sites of TrueCopy Synchronous and Universal Replicator software even after occurrence of disaster at the primary site. The Hitachi technology enables shorter intervals to resume remote copy process by comparing journal data and transfers only difference data between the local site and the remote site.
Figure 4 illustrates operation of a Three Data Center Remote Copy configuration:
(1) The host machine issues the write I/O to the source volume (Vol. A-P). The primary storage system sends the incoming input data to the journal volume (JNL) of the storage system at the local site. The primary storage system also writes the input data to its volume (Vol. A-P) and JNL.
(2) The local storage system writes the received input data in JNL to its target volume (Vol. A-L) and notifies completion of the write process to the primary storage system.
7
(3) The primary storage system notifies completion of the write process to the host machine.
(4) The storage system at the remote site reads in the input data in JNL of the primary storage system and stores it to its own JNL.
(5) The remote storage system writes the input data from its JNL to its target volume (Vol. A-R) in order of their arrival.
If the primary site becomes unavailable in the event of disaster, the Three Data Center Remote Copy configuration allows Universal Replicator software remote copy from the local storage system to the remote storage system. In this process, Universal Replicator software compares the data in the JNL of each site and copies only the difference data to promptly establish a copy relationship.
Figure 4. Three Data Center Remote Copy Configuration
Local Site Application
Primary Site Application
Response
Update Data1
3
Primary Site Remote Site
Remote Site Application
Hitachi Universal Replicator Software
Volume APrimary JNL
Volume ARemote
Update
Update
JNL
Update
Update
Local SiteVolume A
LocalJNL
Update
Update
Update
Hitachi TrueCopy®
Synchronous Software
2
Read
4 Up
date
Up
date
Achieved with combination of TrueCopy Synchronous and Universal Replicator software, the storage-based Three Data Center Remote
Copy configuration is capable of data replication over long distance without data loss after occurrence of disaster.
8
Traditional Remote Copy Management—IBM® Peer to Peer Remote Copy
(PPRC)
Hitachi storage products offer the interface to manage remote copy that is compatible with PPRC, (currently known as Metro Mirror) for the mainframe environment. PPRC is the storage-based remote copy technology by IBM and has the following characteristics:
(1) Command Line Interface (CLI) commands [Time-Sharing Option (TSO) commands] are provided as the user interface.
(2) Operation of replication is performed in units of a copy pair that consists of the primary and the secondary volumes.
(3) It can manage the storage-based synchronous and Hitachi asynchronous remote copy3.
Challenges
Managing remote copy with the PPRC-compatible interface poses the following challenges:
(1) Burden of management operation becomes incredibly large on a large-scale environment because it allows operation of remote copy only in units of a copy pair.
(2) Due to the nature of CLI interface, many parameters and operands are involved for management.
(3) Due to the nature of CLI interface, operation mistakes cannot be detected until execution of a command is completed.
(4) Because of compatibility with IBM’s PPRC, it is difficult to manage Hitachi remote copy functions.
Hitachi Business Continuity Manager Software
Overview
Business Continuity Manager software runs on the mainframe environment and offers various functions to manage the storage-based replication (both remote copy and Hitachi ShadowImage™ Heterogeneous Replication software). Business Continuity Manager software, in conjunction with the high-end Hitachi replication function, has the following characteristics:
(1) Grouping of copy pairs. It offers the interface to group the related copy pairs together and operate on such a group of copy pairs.
(2) Simplification of a replication configuration. Replication configuration can be defined and operated through the full-screen user interface.
(3) High affinity with Hitachi replication functions. It supports various Hitachi replication functions.
(4) High customizability. It offers CLI commands for REXX-based scripting to achieve highly customizable environment.
3 Only the storage-based synchronous remote copy can be operated via PPRC interface for an IBM storage system.
9
Functional Highlights
Business Continuity Manager software can greatly simplify introduction and management of Hitachi replication functions in the mainframe (IBM OS/390® and IBM z/OS®) environment. The following sections describe each of the highlights that Business Continuity Manager software offers.
Grouping of Copy Pairs
Business Continuity Manager software allows quick and easy definition of a collection of copy pairs that share the same properties, called a copy group, so that all copy pairs that belong to the same copy group can be logically treated as a single unit. This achieves tremendously simple management of large-scale replication that consists of hundreds or even thousands of copy pairs with fewer steps of operation and can reduce the cost of management.
Figure 5 shows a comparison of remote copy management between the traditional PPRC interface and the grouping interface of Business Continuity Manager software. While the PPRC interface requires a user to issue a command to each copy pair in replication, Business Continuity Manager software allows a user to operate on multiple copy pairs by simply issuing a command to a copy group. This grouping feature of Business Continuity Manager software allows management of large-scale replication environment, whether it is remote copy or in-system replication, with a simple operation. It may also reduce the chance of operation mistakes.
10
Figure 5. Comparing PPRC and Business Continuity Manager Software
PPRC
Storage on Primary Site Storage on Secondary Site
Administrator
Replication Operation with PPRC
Business ContinuityManager Software
Storage on Primary Site Storage on Secondary Site
Administrator
Replication Operation with Busines Continuity Manager Software
Issue commandagainst groupor copy pairs.
Issue commandagainst groupor copy pairs.
Unit of Operation
Legend
Move Copy Command
Move Copy Command
Instruction
Instruction
Instruction
Instruction
Instruction
Instruction
Instruction
Instruction
While the PPRC interface requires a user to issue a command to each copy pair in replication, Business Continuity Manager software
allows a user to operate on multiple copy pairs by simply issuing a command to a copy group.
11
Simplification of a Replication Configuration
Business Continuity Manager software offers ease of definition and configuration of replication management with the full-screen user interface [Interactive System Productivity Facility (ISPF) panels] that can reduce the burden of users from managing large-scale replication environments with the traditional approach. With Business Continuity Manager software, the following operations can be performed:
(1) Retrieval of hardware information, such as the type of a storage system, usable replication products, and available volumes for replication at the primary and the secondary site
(2) Definition of copy pairs, and addition and removal of pairs from such definition
(3) Retrieval and display of the replication environment and information of copy pair status and performance
Use of ISPF panels provides the following advantages:
(1) A user can manage and retrieve information regarding the replication environment with reduced risk of operation mistakes because of fewer keystrokes.
(2) A user can view necessary information about the replication environment on the screen.
(3) ISPF provides informative “HELP” panels for various items that are available on the screen.
Figure 6 illustrates one of Business Continuity Manager software’s ISPF panels.
Figure 6. Example of ISPF Panels
Use of ISPF panels provides the user with easy access to information regarding the replication environment.
12
High Affinity with Hitachi Replication Functions: Management of Replication Process in the Storage System at the Secondary Site
Business Continuity Manager software allows a user to manage replication process of the volumes in a storage system that does not have direct connection to the host machine, as shown in Figure 7. This function can reduce the cost of operation of the remote site because a user can operate the storage system at the secondary site in a manner similar to operating the storage system at the primary site that has direct connection to the host machine:
• Manipulation of volumes in the storage system at the secondary site (discovery of volumes, establishment and monitoring of copy pairs, and so on)
• Automated management of replication configuration, including copy pairs at the secondary site
Figure 7. Management of Storage System without Host Connection
Business ContinuityManager Software
Storage on Primary Site Storage on Secondary Site
Administrator
CDEV CDEV
Remote Copy Operation Copy Operation
Instructio
n
Manage the configurationreplication in secondary site
as if it were residing in local storage.
Business Continuity Manager software allows a user to manage replication process of the volumes in a storage system that does not have
direct connection to the host machine.
Management of a Consistency Group (C/T Group)
By defining a copy group with a C/T group ID that is registered in a storage system, Business Continuity Manager software can sustain consistency between copy pairs in the same copy group (see Figure 8).
With 4x4 configuration (configuration in which multiple storage systems at both the primary and the secondary sites are paired for replication) with Universal Replicator software, it is possible to sustain consistency even across multiple storage systems.
Instructions need be issued to the storage system to operate a C/T group just once for each operation. This can greatly reduce the time for replication operation.
13
Figure 8. Management of Copy Groups with or without C/T Group ID
Business ContinuityManager Software
Storage on Primary Site Storage on Secondary Site
Administrator
Copy Group Management without Consistency Group
Business ContinuityManager Software
Storage on Primary Site Storage on Secondary Site
Administrator
Copy Group Management with Consistency Group
Issue commandto a Consistency Group.
Issue commandto respective pairs.
Unit of Operation
Legend
Remote Copy Command
Move Copy Command
Instruction
Instruction
Instruction
Instruction
Instruction
Sequence of update is guaranteed.
By defining a copy group with a C/T group ID that is registered in a storage system, Business Continuity Manager software can sustain
consistency between copy pairs in the same copy group.
14
High Customizability
Business Continuity Manager software achieves easy and fine-grained customization of a replication configuration through REXX scripting. Business Continuity Manager software offers variety of CLI commands that can be called from a REXX script to help customization. The following list shows some of the CLI commands that Business Continuity Manager software provides for customization and manipulation of the replication environment:
• The YKMAKE command that triggers replication in units of copy group
• The YKEWAIT command that waits for a copy group to become a specified replication status
• The YKCONMSG command that captures the console message IEA494I, which indicates transition of the replication status of a copy group of TrueCopy software (both Synchronous and Asynchronous)
• The YKSUSPND command that suspends the replication process of a specified copy group at the specified point in time
• The YKSTATS command that acquires the performance information of TrueCopy Asynchronous and Universal Replicator software
By using those CLI commands, it is possible to create a REXX script that, for example, acquires the performance information of ongoing remote copy and sends a notification message to a storage administrator if the performance degrades under the certain threshold.
Others: Hitachi Storage Management Suite Software Linkage
With the Storage Management Suite Mainframe Agent (formerly called HiCommand Mainframe Agent), it is possible to provide information regarding replication configuration in the mainframe environment, such as the copy group definition, copy pair status, volume information, and so on, from Business Continuity Manager software to Storage Management Suite modules. This enables viewing and monitoring the information of mainframe storage through Storage Management Suite modules.
Difference between “Definition” and “Management”
In Business Continuity Manager software, the definition of replication configuration is independent of its management part (ISPF and REXX scripting). This means that whether Business Continuity Manager software runs on the primary site or the secondary site, it can use the same definition of replication configuration. When replication configuration has changed, a user has to reflect such change only to the definition; the management part of Business Continuity Manager software can remain unchanged. This separation between definition of replication environment and the management components of Business Continuity Manager software can minimize the effect of introducing a new replication configuration or expansion of the system.
Constituents of Business Continuity Manager Software
As shown in Figure 9, Business Continuity Manager software consists of four major components as well as user scripting for customizability:
• Business Continuity Manager software (IO Engine). The foundation of Business Continuity Manager software accepts instruction from a user, creates and refers to definition files of replication configuration, and issues instruction to a storage system for replication management.
• CLI. This collection of commands can be called from a REXX script for management and monitoring of replication configuration.
• Interactive System Productivity Facility (ISPF). An interactive user interface, ISPF allows users to define, manage, and monitor replication configuration.
• Mobile Floating (MF)-Agent. This agent provides information regarding Business Continuity Manager software–managed replication configuration to Storage Management Suite modules.
15
• User script(s). This is a REXX script that is written by a user with CLI.
Figure 9. Structure of Business Continuity Manager Software
Hitachi Storage Management Suite Software
ReplicationInstruction Information of
Replication/Performance
Hitachi TrueCopy®, Universal Replicator, and ShadowImage™ Software
ISPF MF Agent UserScript
Command Line Interface
Busines Continuity Manager Software (I/O Engine)
IBM® z/OS®
UserScript
ConfigurationFilesConfiguration
FilesConfigurationFiles
Administrator
Business Continuity Manager software consists of four major components as well as user scripting for customizability.
Using Business Continuity Manager Software
Business Continuity Manager software can be used to define and manage replication configuration. The following subsections describe each usage in detail.
Definition of Replication Configuration
A user can acquire hardware information regarding a storage system and define replication configuration through Business Continuity Manager software’s ISPF. A user can specify the range of the device number or VOLSER (tape volume serial number) to acquire the hardware information as shown in Figure 10.
16
Figure 10. Acquisition of Hardware Information through ISPF
A user can acquire hardware information regarding a storage system and define replication configuration through Business Continuity
Manager software’s ISPF.
The next step is to define a copy group using the acquired storage system information. To define a copy group, the copy type (TrueCopy Synchronous, TrueCopy Asynchronous, Universal Replicator, or ShadowImage software) and the attributes specific to the given copy type and copy pairs must be specified. Figure 11 shows ISPF panel to specify copy pairs. As in the figure, a user may specify the range of volumes that form copy pairs in a copy group by either the device numbers or VOLSER. Information in the definition file can also be viewed from ISPF as shown in Figure 12.
Figure 11. Definition of Copy Pairs through ISPF
A user can specify copy pairs through Business Continuity Manager software’s ISPF.
17
Figure 12. Viewing Copy Group Definition Information through ISPF
When a copy group has been defined, copy group definition information may be viewed through the ISPF.
Management of Replication Configuration
Business Continuity Manager software provides two ways to manage replication configuration: ISPF and a user-written REXX script.
On ISPF, the user can specify various “actions” to the defined copy groups. Figure 13 shows a typical image of managing a copy group with ISPF.
18
Figure 13. Management of Copy Groups through ISPF
On ISPF, the user can specify various “actions” to the defined copy groups.
A user-written REXX script utilizes CLI commands that Business Continuity Manager software offers to manage replication configuration in more fine-grained manner. REXX scripting is particularly useful when managing a complex configuration such as a Three Data Center Remote Copy configuration.
Case Study
This section introduces a usage example in which Business Continuity Manager software was applied to a banking system.
The bank in this example is running its system on an IBM mainframe host, and it had been using a tape-based data backup system. As the need arose to establish more sophisticated contingency framework, the bank was determined to introduce a storage-based disaster recovery system with the following objectives:
(1) Avoid degradation in performance of the business server.
(2) Meet an RTO of four hours.
(3) Set a minimum distance of 60km between the primary site and the secondary site, according to the guideline provided by The Center for Financial Industry and Information Systems of Japan [Federal Information Security Conference (FISC)].
(4) To reduce the cost of operation, make the secondary site operational only when the primary site becomes inactive by disaster.
The disaster recovery system for the banking system shown in Figure 14 was designed to achieve those objectives. Hitachi Lightning 9980V™ multi-cabinet enterprise storage systems were selected, and ATM lines were made duplex. The data transfers between the storage systems were achieved with TrueCopy Asynchronous
19
software. To ensure recovery of business operation, the data that was replicated to the secondary site was further replicated by ShadowImage software at certain points in time where the business operation could be resumed with integrity. To operate ShadowImage software at the secondary site without running the mainframe host at the same site, Business Continuity Manager software was employed to manage the replication process at the secondary site from the primary site.
With the storage-based solution founded on abundant Hitachi experience in construction of disaster recovery systems, the new system began operation in production on September 15, 2004, just one year after the start of the project. The new disaster recovery system fulfilled all objectives that were set at the beginning of the project and still runs in production. Taking full advantage of Business Continuity Manager software’s strength, especially separation between definition and management of replication configuration, the central design of the management system became simple enough that it contributed to the shorter development time of the system, expansion in the scale of the system, and change in the plan for disaster recovery operations.
Figure 14. Disaster Recovery System for the Banking Systems
IBM MainframeComputer
Fibre ChannelSwitch
ATM Switch
Hitachi Universal Storage Platform™ V
Hitachi Universal Storage Platform™ V
(2TB)
zSeries
zSeries
CHExtender
Fibre ChannelSwitch
ATM Switch
Hitachi TrueCopy® Asynchronous Software
ATM150Mbit/sec
ATM150Mbit/sec
CHExtender
IBM MainframeComputer
Fibre ChannelSwitch
ATM Switch
Secondary SitePrimary Site
(4TB)
zSeries
zSeries
CHExtender
Fibre ChannelSwitch
ATM Switch
CHExtender SI
The new disaster recovery system takes full advantage of Business Continuity Manager software’s strength, especially separation between
definition and management of replication configuration.
20
Summary
Enterprise information systems and the data they handle continue to grow in scale and importance, and disaster recovery systems to ensure business continuity of enterprise information systems upon disaster or failure have been vital in today’s business world. Hitachi Data Systems offers variety of storage-based remote copy technologies and their management software, Business Continuity Manager software, to fulfill the requirements for today’s disaster recovery systems.
Following is the list of storage-based remote copy technologies offered by Hitachi Data Systems:
(1) TrueCopy Synchronous software, which suffers no data loss at the secondary site upon disaster
(2) TrueCopy Asynchronous software, which is suitable for long-distance remote copy
(3) Universal Replicator software, which is suitable for long-distance remote copy and is tolerant of available bandwidth fluctuation between two storage systems
(4) Three Data Center Remote Copy, which is a technology/configuration that achieves long-distance remote copy without data loss even upon disaster
Business Continuity Manager software manages storage-based replication technologies that run on the mainframe environment with the following characteristics:
(1) Ease of replication management
– Copy pairs can be organized into a group and can be operated in units of such groups.
– A full-screen user interface through ISPF offers ease and intuitiveness in definition and management of replication configuration.
(2) High customizability and flexibility in replication management
– Separation between definition and management of replication configuration minimizes the effect of changes in replication configuration to management.
– It provides of ease of use for Hitachi replication technologies.
– It provides ease of automation through REXX scripting.
Business Continuity Manager software has been used to construct disaster recovery systems. In one case, Business Continuity Manager software supported a new disaster recovery system for a banking system in which data is replicated well over 500km, with the mainframe system at the secondary site remaining inactive during the normal production operation.
With Business Continuity Manager software managing Hitachi storage-based remote copy products, organizations can achieve reliable easy-to-administer disaster recovery for their mainframe environments.
Hitachi Data Systems Corporation
Corporate Headquarters 750 Central Expressway, Santa Clara, California 95050-2627 USA Contact Information: + 1 408 970 1000 www.hds.com / [email protected]
Asia Pacific and Americas 750 Central Expressway, Santa Clara, California 95050-2627 USA
Contact Information: + 1 408 970 1000 www.hds.com / [email protected]
Europe Headquarters Sefton Park, Stoke Poges, Buckinghamshire SL2 4HD United Kingdom
Contact Information: + 44 (0) 1753 618000 www.hds.com / [email protected]
Hitachi is a registered trademark of Hitachi, Ltd., and/or its affiliates in the United States and other countries. Hitachi Data Systems is a registered trademark and
service mark of Hitachi, Ltd., in the United States and other countries.
TrueCopy is a registered trademark and Lightning 9900, Lightning 9980V, and ShadowImage are trademarks of Hitachi Data Systems Corporation.
IBM, OS/3990, and z/OS are registered trademarks of International Business Machines Corporation.
All other trademarks, service marks, and company names are properties of their respective owners.
Notice: This document is for informational purposes only, and does not set forth any warranty, express or implied, concerning any equipment or service offered
or to be offered by Hitachi Data Systems. This document describes some capabilities that are conditioned on a maintenance contract with Hitachi Data Systems
being in effect, and that may be configuration-dependent, and features that may not be currently available. Contact your local Hitachi Data Systems sales office
for information on feature and product availability.
Hitachi Data Systems sells and licenses its products subject to certain terms and conditions, including limited warranties. To see a copy of these terms and
conditions prior to purchase or license, please go to http://www.hds.com/products_services/support/warranty.html or call your local sales representative to
obtain a printed copy. If you purchase or license the product, you are deemed to have accepted these terms and conditions.
© Hitachi Data Systems Corporation 2007. All Rights Reserved.
WHP-247-00 LKW June 2007