ACRONIS Backup & Recovery 10 Advanced Server User's Guide Page 70

  • Download
  • Add to my manuals
  • Print
  • Page
    / 381
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 69
70 Copyright © Acronis, Inc., 2000-2010
Performed in the vault after a backup is completed. The storage node analyses the vault's
archives and deduplicates data in the vault.
When creating a backup plan, you have the option to turn off deduplication at source for that plan.
This may lead to faster backups but a greater load on the network and storage node.
Deduplicating vault
A managed centralized vault where deduplication is enabled is called a deduplicating vault. When
you create a managed centralized vault, you can specify whether to enable deduplication in it. A
deduplicating vault cannot be created on a tape device.
Deduplication database
Acronis Backup & Recovery 10 Storage Node managing a deduplicating vault, maintains the
deduplication database, which contains the hash values of all items stored in the vaultexcept for
those that cannot be deduplicated, such as encrypted files.
The deduplication database is stored in the folder which is specified by the Database path in the
Create centralized vault view when creating the vault. Deduplication database can be created in a
local folder only.
The size of the deduplication database is about one percent of the total size of archives in the vault.
In other words, each terabyte of new (non-duplicate) data adds about 10 GB to the database.
In case the database is corrupted or the storage node is lost, while the vault retains archives and the
service folder containing metadata, the new storage node rescans the vault and re-creates the
database.
How deduplication works
Deduplication at source
When performing a backup to a deduplicating vault, Acronis Backup & Recovery 10 Agent reads
items being backed updisk blocks for disk backup or files for file backupand calculates a
fingerprint of each block. Such a fingerprint, often called a hash value, uniquely represents the item's
content within the vault.
Before sending the item to the vault, the agent queries the deduplication database to determine
whether the item's hash value is the same as that of an already stored item.
If so, the agent sends only the item's hash value; otherwise, it sends the item itself.
Some items, such as encrypted files or disk blocks of a non-standard size, cannot be deduplicated,
and the agent always transfers such items to the vault without calculating their hash values. For
more information about restrictions of file-level and disk-level deduplication, see Deduplication
restrictions (p. 72).
Deduplication at target
The storage node performs deduplication at target in a managed vault by running two tasks: the
indexing task and the compacting task.
Indexing task
After backup to a deduplicating vault is completed, the storage node runs the indexing task to
deduplicate data in the vault as follows:
Page view 69
1 2 ... 65 66 67 68 69 70 71 72 73 74 75 ... 380 381

Comments to this Manuals

No comments