
4 5
NEC Storage HS8 offers a high level of
redundancy surpassing that of conventional
storage. By dividing the backup data into
multiple blocks, adding special parities to
those blocks, and then distributing them to
disks on multiple nodes, NEC Storage HS8
enables data restoration even if faults occur
in multiple storage locations. It can
accommodate up to 6 simultaneous faults
not only with disk drives but also with nodes*,
preventing data loss if a fault should occur.
*Depends on the node configuration and the setting of the
number of parities.
Fault Tolerance that Surpasses RAID
Distributed Resilient Data
Three core technologies to support backup/archiving.
Automatic Optimal Conguration
If you want to add more capacity and improve the level of
performance, you can easily add Hybrid Nodes and Storage
Nodes without stopping the system. When connected to an
internal network, added nodes are autonomously incorporated
into the storage pool, so that load balancing and data relocation
can be performed automatically and thus make the nodes
usable instantaneously, without requiring the storage
administrator to consider the data storage position or perform
any kind of configuration. This makes it possible to increase the
capacity and performance without having to worry about the
occurrence of bottlenecks, thereby contributing to improved
operational efficiency and simplified system administration.
Easy, Non-Disruptive Expansion of Capacity and Performance
Hybrid Nodes
Storage Nodes
1
1
2
3
4
5
6
7
8
9
10
11
12
4710
5862
12 3911
Data
Addition of Special Parities
Additional parities are added to the data, then distributed to multiple storage locations.
Storage Nodes
The data compression technology
(DataRedux) checks the data blocks to be
newly written against data that is already in
storage, and then eliminates any duplicate
data, thereby improving the data storage
efficiency and writing performance.
To maximize the detection of duplication
relative to the existing data, DataRedux
applies intelligent variable-length division to
the data. This achieves a further improvement
in the storage efficiency and performance for,
specifically, multi-generation backup.
Vastly Improved Capacity Efciency for Reduced Cost
Data Compression
Backup Data Example
1 7 1 4
4 6 2 1
Day 1: Full Backup
1 2 3 4
5 6 7 8
1 6 1 4
1 6 7 8
Day 7: Full Backup
1 6
6 3
Day 2: Differential
5 1
4 7
Day 3: Differential
DataRedux
Efcient Storage of Backup/Archive Data
DataRedux Technology:
1.Detects duplicate data at the block level
2.Compresses and stores only non-duplicated data
Efcient use of storage capacity
Cost Advantages of DataRedux:
- Storage Installation Costs
- Storage Operation Costs
- Storage Maintenance Costs
To store day-to-day backup/archive data efciently and safely,
NEC Storage HS8 incorporates three core technologies.
NEC Storage HS8
Offering functions for achieving safe, secure, and efcient backup.
As the amount of data increases, backup takes
more time. NEC Storage HS8 eliminates the need
for conventional regular full backup, and instead
requires only incremental backups. Once you have
performed one full backup, you subsequently only
have to make daily incremental backups, and a full
backup is automatically synthesized internally at
high speed.
This greatly reduces the time required for backup.
Synthetic Backup for Increased Efciency
Full Backup
Full Backup Full Backup
Full Backup
Backup
Backup Server NetBackup Server
Backup
Incremental
Backups
Regular full backups are required.
The current backup is synthesized internally by NEC Storage HS8.
It is only necessary to make daily incremental backups.
Increments
Full Backup
Conventional
Storage
NEC Storage HS8
Synthesis
Full Backup
Stored
Latest
NEC Storage HS8 provides a Write Once Read Many
(WORM)feature, which protects data from illegal
falsification and erroneous operation. You can specify
a protection period for each file, and once that
protection has been set, even the administrator cannot
update the file until the set period has ended. A
protected file can be deleted after the protection
period has ended. Even when replication is applied,
the WORM protection will be inherited, so the data at
the backup site is also protected. Also provided is a
function for completely erasing unnecessary data from
an area in such a way that it cannot be restored.
NEC Storage HS8 encrypts the replication
packets, providing higher security than
conventional systems and protecting user
data from being tapped into by third parties.
NEC Storage HS8 lets you specify whether
to enable or disable encryption for each
remote system, so you can select whether to
apply encryption according to your
environment. The encryption method used is
AES* (256 bits), which is highly regarded for
its safety and is commonly used in the
storage industry.
*Advanced Encryption Standard
Encrypted Replication Packets
Encryption Zone
WAN
Management PC
No Encryption
LAN
Encryption
Data Data
Decryption
DataData
Specifying whether to enable or disable
encryption is possible through the GUI/CLI.
Because you can specify whether to enable
or disable encryption for each remote system,
you can forgo encryption in environments in
which it is not necessary.
Data to be replicated is encrypted to prevent information
leakage even if the communication is intercepted.
Replication data is decoded
before being stored.
Falsication Prevention for Data Protection
Backup Server
Business Server
By setting the backup data
as read-only, it cannot be
updated or deleted.
NEC Storage HS8
Backup
Data
NEC Storage HS8
Replica
Replication that inherits
the WORM protection is
supported.
Business
Storage
Functions