
Incr3
<----
Incr1
<----
Full
8
Incr3
<----
Incr2
<----
Incr1
<----
Full
9
Incr3
<----
Incr2
<----
<----
<----
Full
10
Incr3
<----
<----
<----
<----
<----
Full
11
How to read Table 7
on page 95
•
The rows in
Table 7
on page 95 are independent of each other and show different
situations.
•
The age of the backups increases from right to left, so that the far left is the oldest
and the far right is the most recent backup.
•
The full and IncrX represent still protected objects of the same owner. Any existing
IncrX that is not protected can be used for restore, but is not considered for
referencing on subsequent backup runs.
Examples
•
In the second row, there is a full, still protected backup and an Incr2 is running.
There is no Incr1, so the backup is executed as an Incr1.
•
In the fifth row, there is a full backup, an Incr1 and another incremental is running.
Data Protector references the currently running backup to the previous incremental,
that is Incr1.
•
In the eighth row, the Incr3 is executed as Incr2, and in the eleventh row, the
Incr3 is executed as Incr1.
Considering restore
To restore the latest data, you need media from your last full backup and subsequent
incremental backups. Therefore, the more incremental backups you have, the more
media you need to handle. This is inconvenient if you use standalone devices, and
the restore can last long.
Using simple and leveled incremental backups, as indicated in
Figure 25
on page 98,
will require access to all five previously completed
media sets
, up to and including
the full backup. The space needed on the media is lowest here, but the restore is
rather complex. The series of required media sets is also called a
restore chain
.
Planning your backup strategy
96
Summary of Contents for B6960-96035
Page 17: ...Overview of backup and automated media copy sessions 340 105 Concepts guide 17 ...
Page 20: ...20 ...
Page 22: ...Publication history 22 ...
Page 132: ...Planning your backup strategy 132 ...
Page 182: ...Media management and devices 182 ...
Page 186: ...Users and user groups 186 ...
Page 204: ...The Data Protector internal database 204 ...
Page 218: ...Figure 62 Direct SIP integration example Service management 218 ...
Page 242: ...Integration with database applications 242 ...
Page 264: ...Synthetic backup 264 ...
Page 274: ...Split mirror concepts 274 ...
Page 288: ...Snapshot concepts 288 ...
Page 344: ...Further information 344 ...
Page 402: ...Glossary 402 ...