Home » Posts filed under Tivoli Storage Manager
Showing posts with label Tivoli Storage Manager. Show all posts
Showing posts with label Tivoli Storage Manager. Show all posts
5 April 2014
IBM TSM V6.3 Implementation Certification (IBM 000-590) Questions and Answers- Part 2
QUESTION NO: 26
An IBM Tivoli Storage Manager (TSM) administrator has set up and enabled Disaster Recovery
Manager. The administrator wants to return tapes that are empty from the vault to the library as
scratch. The administrator issues the command:
move drmedia * wherestate=vaultretrieve
None of the tapes that were in value retrieve state have been returned to scratch even though they
have been placed back in the library. What caused this to happen?
B. The tapes are in VAULTRETRIEVE state and must be moved to COURERRETREVE state.
C. The tapes are in COURERRETREVE state and must be moved to NOTMOUNTABLE state.
D. The tapes are in COURERRETREVE state and must be moved to ONSITERETREVE state.
Answer: D
What is the name of the default client options file on Windows?
A. clopt.txt
B. dsm.sys
C. dsm.opt
Answer: A
QUESTION NO: 28
On the IBM Tivoli Storage Manager V6.3 Server, what is required for a clustered server to be
backed up in all cases?
B. Nodename is set to active failover.
C. Nodename for the cluster server must be registered.
D. Nodename for each server in the cluster must be registered
Answer: C
How are daily maintenance tasks configured in IBM Tivoli Storage Manager V6.3?
A. configure client schedules
B. configure automatic TIP scripts
C. configure administrative schedules
D. configure automatic activity log scripts
Answer: C
QUESTION NO: 30
What is the default name of the IBM Tivoli Storage Manager Server at installation?
A. tsm
B. server1
C. tsmserver
D. tsm server1
Answer: C
QUESTION NO: 31
What configuration changes should be considered when running data deduplication on an IBM
Tivoli Storage Manager V6.3 Server?
A. create an active log mirror
B. create an archive log mirror
C. increase the size of the active log
D. change the backup pool to RAID 10
Answer: C
QUESTION NO: 32
Which option is added to the IBM Tivoli Storage Manager client options file to enhance security
between the client and server?
A. tcpsecurity
B. encryptiontype
C. enablesecurity
D. enableencryption
Answer: B
QUESTION NO: 33
Where can IBM Tivoli Storage Manager V6.3 (TSM) Server and client updates, fixpacks, and
maintenance levels be found?
A. TSM Support Website
B. Tivoli Data Warehouse
C. IBM Tivoli Enterprise Portal
D. TSM Administration Center
Answer: A
QUESTION NO: 34
How are volumes created for an IBM Tivoli Storage Manager V6.3 database backup?
A. define dbvol
B. format volume type=dbb
C. they are created when the backup runs
D. they are created during database initialization
Answer: D
QUESTION NO: 35
During daily processing, which process moves data to the next storage pool in the chain?
A. Migration
B. Reclamation
C. database backup
D. storage pool backup
Answer: A
QUESTION NO: 36
Which backup method improves performance of incremental and selective backups by tracking the
changed files rather than file scanning?
A. no query backup
B. disk cached backup
C. journal-based backup
D. change backtracking backup
Answer: C
QUESTION NO: 37
Which statement is true about the dsmicfgx program?
A. It must run as a user ID that will own the server instance.
B. It can only run if the data base volume is already formatted.
C. It will create the active log directory for the IBM DB2 database.
D. It can only be run as root on AIX or administrative user on Windows.
Answer: D
QUESTION NO: 38
Which TSM Server configuration parameters affect network connectivity?
A. TCPWINDOW, TCPBUFFR
B. TCPTIMEOUT, TCPFRAMEOUT
C. COMMTIMEOUT, IDLETIMEOUT
D. CONNECTTIME, DISCONNECTTIME
Answer: C
QUESTION NO: 39
The first time a backup of client data is run, what type of backup is performed?
A. Full
B. Snapshot
C. differential
D. incremental
Answer: D
QUESTION NO: 40
Which command specifies the parameters to define the simultaneous write function?
A. define node
B. define stgpool
C. define devclass
D. define copygroup
Answer: B
QUESTION NO: 41
What can be done to monitor an IBM Tivoli Storage Manager V6.3 (TSM) Server environment?
A. install IBM DB2 reporting tools
B. install IBM Tivoli Integrated Portal
C. install a Backup-Archive client agent
D. install the Cognos engine on the TSM Server
Answer: B
QUESTION NO: 42
Which communication method can be used only when the IBM Tivoli Storage Manager V6.3
(TSM) Server and TSM client V6.3 are on the same system?
A. NDMP
B. V6TCPIP
C. NAMEDPIPE
D. SHAREDMEM
Answer: D
QUESTION NO: 43
A company writes a Service level Agreement (SLA) for their backup customers. They agree to
backup files every day regardless of whether the files have been modified, and to retain up to 10
backup versions of a file while the file exists on the client file system. Each customer will have their
own domain, policy set, management class, and storage pool based on their department name.
Which command creates a backup copy group for the Accounting department and meets the SLA
requirements?
A. define copygroup accounting type=backup destination=accounting_pool verexists=10
mode=absolute
B. define copygroup accounting accounting accounting standard type=backup destination=
accounting_pool retexists=10
C. define copygroup accounting accounting accounting type=backup destination= accounting_pool
verexists=10 mode=serialization
D. define copygroup accounting accounting accounting standard type=backup
destination=accounting_pool verexists=10 mode=absolute
Answer: D
QUESTION NO: 44
Where is the value for the number of backup versions specified?
A. active copy group
B. backup copy group
C. backup management class
D. standard management class
Answer: B
QUESTION NO: 45
How is the name and size of the IBM Tivoli Storage Manager V6.3 active log displayed?
A. DSMSERV DISPLAY LOG
B. DSMSERV Display Logsize
C. DSMSERV DISPLAY ACTIVELOG
D. DSMSERV Display ACTIVELOGSIZE
Answer: A
QUESTION NO: 46
Which statement defines a client schedule to be executed ever/ week from Monday to Friday?
A. DEFINE SCHEDULE WIN Sched_Weekday act=INCREMENTAL pri=5 dur=1 duru=HOURS
day=anyweekday schedstyle=e
B. DEFINE SCHEDULE WIN Sched_Weekdayact=INCREMENTALpri=5dur=1 duru=HOURS
day=any-weekend schedstyle=e
C. DEFINE SCHEDULE WIN Sched_Weekdayact=INCREMENTAL pri=5 dur=1 duru=HOURS
day=rno.tu .we.th.fr schedstyle=e
D. DEFINE SCHEDULE WIN Sched_Weekdayact=INCREMENTALpri=5dur=1 duru=HOURS
day=mo+tu+we+th+fr schedslyle=e
Answer: C
QUESTION NO: 47
Which command identifies the IBM DB2 log file location?
A. db2 set logs
B. db2 list logs
C. db2adutl query
D. db2 get dbm cfg
Answer: D
QUESTION NO: 48
A customer is currently running IBM Tivoli Storage Manager (TSM) Server V5.5 on a Solaris 10
system with 4 GB memory and 50GB internal disk space. They wish to upgrade to TSM V6.3.
Where should the customer check to see if their environment meets the system requirements for
TSM V6.3?
A. ADSM.org website
B. IBM TSM V6.3 Administrator's Guide
C. IBM TSM V6.3 Administrator's Reference
D. IBM TSM Supported Platforms website on IBM.com
Answer: D
QUESTION NO: 49
Which two functions provide an offsite data storage solution? (Choose two.)
A. collocation
B. reclamation
C. node replication
D. collocation by group
E. server-to-server communication
Answer: C,E
QUESTION NO: 50
What type of database backup clears the archive log?
A. Full
B. Snapshot
C. Differential
D. Incremental
Answer: B
4 April 2014
Tivoli Storage Manager (TSM) V6.3 Implementation Certification (IBM 000-590) Questions and Answers- Part 1
QUESTION NO: 1
Which application can be used to gather and analyze performance data about backup and restore
operations for an IBM Tivoli Storage Manager client?
B. Administration Center
C. Tivoli Data Warehouse
D. IBM Tivoli Enterprise Console
Answer: B
QUESTION NO: 2
What must be set to enable client-side deduplication with IBM Tivoli Storage Manager V6.3?
A. The DEDUPLICATION option on the client must be set to CLIENT.
B. The DEDUPLICATION option on the client must be set to CLIENTORSERVER.
C. The primary storage pool must be a random-access DISK storage pool that is enabled for data deduplication.
D. The primary storage pool must be a sequential-access FILE storage pool that is enabled for data deduplication.
Answer: D
QUESTION NO: 3
Which command checks the deduplication statistics for client CRSERVER after a backup or archive?
A. q actlog search=dedup
B. q node info=dedupstat
C. q actlog search=CR SERVER D. q dedupstat node=CR SERVER
Answer: C
QUESTION NO: 4
A. One disk for the operating system and all TSM-related logs and disk pools.
B. One disk for the operating system, one diskfor dbdir, activelog, archivelog, and diskpool.
C. One partition for dbdir, one partition for activelog and archivelog, one partition for diskpool and one partition for the operating system.
D. Separate disks for the operating system, dbdir. activelog, and archivelog dirs. and a number of disks for diskpool on separate controllers.
Answer: D
QUESTION NO: 5
A. SnapDiff works only with volumes of security style NTFS.
B. The security style of the volume is independent from the kind of backup.
C. Volumes with security style mixed can be backed up with Windows or AIX.
D. Volumes with security style UNIX must be backed up with an AIX or Linux client.
Answer: D
QUESTION NO: 6
A. db2 drop TSMDB1
B. db2 list db directory
A customer is planning to install IBM Tivoli Storage Manager V6.3 (TSM) in their environment.
Which configuration is optimal for this implementation?
B. One disk for the operating system, one diskfor dbdir, activelog, archivelog, and diskpool.
C. One partition for dbdir, one partition for activelog and archivelog, one partition for diskpool and one partition for the operating system.
D. Separate disks for the operating system, dbdir. activelog, and archivelog dirs. and a number of disks for diskpool on separate controllers.
Answer: D
QUESTION NO: 5
A NetApp filer has multiple volumes defined; some are exported with NFS and some are exported
with CIFS. What should be considered when the backup will be done with the SnapDiff function of
the incremental backup?
A. SnapDiff works only with volumes of security style NTFS.
B. The security style of the volume is independent from the kind of backup.
C. Volumes with security style mixed can be backed up with Windows or AIX.
D. Volumes with security style UNIX must be backed up with an AIX or Linux client.
Answer: D
QUESTION NO: 6
The dsmicf gx utility was used to install and configure a new IBM Tivoli Storage Manager V6.3
(TSM) Server instance. During the installation process a problem occurred. The configuration
process must be restarted. Which command removes the created TSM database?
A. db2 drop TSMDB1
B. db2 list db directory
C. dsmserv removedb TSMDB1
D. dsmserv db remove TSMDB1
Answer: C
QUESTION NO: 7
A. Client-side deduplication
B. Server-side deduplication
C. TSM API with VMware compression
D. TSM API with VMware deduplication
Answer: A
QUESTION NO: 8
Where is the schedlogname option changed?
A. In the client options file
B. In the server options file
C. In the Administration Center
D. At the operating system command prompt
Answer: A
QUESTION NO: 9
What is the default install directory for the IBM Tivoli Storage Manager V6.3 Windows client?
A. Program Files\TSM|install
B. Program Files (X86)|Tivoli|TSM
C. Program Files\Tivoli\TSM\config
D. dsmserv db remove TSMDB1
Answer: C
QUESTION NO: 7
Which IBM Tivoli Storage Manager V6.3 (TSM) function can reduce the amount of data transferred
for a VMware backup?
B. Server-side deduplication
C. TSM API with VMware compression
D. TSM API with VMware deduplication
Answer: A
QUESTION NO: 8
Where is the schedlogname option changed?
A. In the client options file
B. In the server options file
C. In the Administration Center
D. At the operating system command prompt
Answer: A
QUESTION NO: 9
What is the default install directory for the IBM Tivoli Storage Manager V6.3 Windows client?
A. Program Files\TSM|install
B. Program Files (X86)|Tivoli|TSM
C. Program Files\Tivoli\TSM\config
D. Program Files\Tivoli\TSM\baclient
Answer: D
QUESTION NO: 10
The customer's Service Level Agreement states that the network attached storage (NAS) filer should be protected so that a single file restore is possible. What prerequisite must be met so that a network data management protocol backup with a Table of Content (TOC) is possible?
A. A TOC storage pool must be available.
B. The server option toc=always must be set.
C. The client option single file restore=yes must be defined
D. A management class with copygroup value tocdestination must be available and assigned.
Answer: D
QUESTION NO: 11
An administrator wants to protect the Active Directory on a Windows Server 2008 R2and so enables snapshot support via volume shadow service. Which domain statement in dsm.opt will enable a successful backup of the Active Directory?
A. Domain ALL-LOCAL
B. Domain ALL-LOCAL +ADS
C. Domain ALL-LOCAL -SystemState
D. Domain ALL-LOCAL -SystemObject
Answer: A
QUESTION NO: 12
Answer: D
QUESTION NO: 10
The customer's Service Level Agreement states that the network attached storage (NAS) filer should be protected so that a single file restore is possible. What prerequisite must be met so that a network data management protocol backup with a Table of Content (TOC) is possible?
A. A TOC storage pool must be available.
B. The server option toc=always must be set.
C. The client option single file restore=yes must be defined
D. A management class with copygroup value tocdestination must be available and assigned.
Answer: D
QUESTION NO: 11
An administrator wants to protect the Active Directory on a Windows Server 2008 R2and so enables snapshot support via volume shadow service. Which domain statement in dsm.opt will enable a successful backup of the Active Directory?
A. Domain ALL-LOCAL
B. Domain ALL-LOCAL +ADS
C. Domain ALL-LOCAL -SystemState
D. Domain ALL-LOCAL -SystemObject
Answer: A
QUESTION NO: 12
A tape cartridge was inserted into the library TSMLIB1 to be used as a scratch tape. Which
command will make volume VOLUMEJ a scratch volume?
A. CHECKIn LIBVolume TSMLIBl SEARCH=Bulk CHECKLabel=Barcode STATus=Scratch
B. CHECKIn LIBVolume TSMLIBl VOLUME_l SEARCH=No CHECKLabel=Barcode
STATus=SCRatch
C. CHECKIn LIBVolume TSMLIBl SEARCH=Bulk VOLRange=VOLUME_l CHECKLabel=Yes STATus=SCRatch
D. CHECKIn LIBVolume TSMLIBl SEARCH=No VOLRange=VOLUME_l CHECKLabel=Barcode STATus=SCRatch
Answer: B
QUESTION NO: 13
Where is the default location for the IBM Tivoli Integrated Portal installation logs for an AIX installation?
A. /varyTIP/tsm
B. /optmp/tsm
C. /var/tivoli/tsm
D. /opt/tivoli/tsm
Answer: C
QUESTION NO: 14
A. LIST BACKUPSETCONTENTS LONDON backup_set_name
B. query BACKUPCONTENTS LONDON > LONDON_Filelist.txt
C. query BACKUPSETCONTENTS LONDON backup_set_name > LONDON_Filelist.txt
D. select BACKUPSETCONTENTS LONDON backup set name send to > LONDON Filelist.txt
Answer: C
C. CHECKIn LIBVolume TSMLIBl SEARCH=Bulk VOLRange=VOLUME_l CHECKLabel=Yes STATus=SCRatch
D. CHECKIn LIBVolume TSMLIBl SEARCH=No VOLRange=VOLUME_l CHECKLabel=Barcode STATus=SCRatch
Answer: B
QUESTION NO: 13
Where is the default location for the IBM Tivoli Integrated Portal installation logs for an AIX installation?
A. /varyTIP/tsm
B. /optmp/tsm
C. /var/tivoli/tsm
D. /opt/tivoli/tsm
Answer: C
QUESTION NO: 14
An administrator has been requested to:
- list all the files in a backup set on the IBM Tivoli Storage Manager client node LONDON
- create a file called LONDON_Filelist.txt. Which command completes these actions?
A. LIST BACKUPSETCONTENTS LONDON backup_set_name
B. query BACKUPCONTENTS LONDON > LONDON_Filelist.txt
C. query BACKUPSETCONTENTS LONDON backup_set_name > LONDON_Filelist.txt
D. select BACKUPSETCONTENTS LONDON backup set name send to > LONDON Filelist.txt
Answer: C
QUESTION NO: 15
An IBM Tivoli Storage Manager (TSM) administrator used the Convert to Custom maintenance
script in the Admin Center selective task to edit the predefined maintenance script created after
the TSM Server installation using the wizard. What is the effect of this action?
B. The maintenance script cannot be changed using the wizard any longer.
C. The maintenance script can be scheduled only with the schedtype enhanced.
D. The maintenance script can be reconverted by the selective task Reconvert To in the Admin Center.
Answer: B
QUESTION NO: 16
In a busy IBM Tivoli Storage Manager V6.3 Server environment some failed backups have gone
unnoticed for a few days. The administrator knows that they occurred around 5 days ago at 8:30 in
the morning. Which command could the administrator issue to find information about the failed
backups?
B. q act begint=-5 begind=08:30
C. q act begind=-5 begint=08:30
D. q log begind=-5 begint=08:30
Answer: C
QUESTION NO: 17
Which command configures the Disaster Recovery Manager to expire old database backup volumes?
A. DBBACKUPPRUNEDAYS
B. EXPIREDBBACKUP DAYS
C. SET DRMDBEXPIRATION DAYS
D. SET DRMDBBACKUPEXPIREDAYS
QUESTION NO: 18
A. set logretention 5
B. set actlogretention 5
C. set actlogretention 0
D. set actlogretention 5 mgmtstyle=size
Answer: B
QUESTION NO: 19
A. the client options file
B. the server options file
C. the volume hi story file
D. the device configuration file
Answer: C
QUESTION NO: 20
After a holiday weekend, an administrator returns to the office to find there have been problems
with IBM Tivoli Storage Manager. The activity log is checked and because there are only two days
worth of logs, the part of the log containing information about when the error occurred is no longer
available. Which command should be run to ensure that this does not happen again?
B. set actlogretention 5
C. set actlogretention 0
D. set actlogretention 5 mgmtstyle=size
Answer: B
QUESTION NO: 19
An administrator is upgrading an IBM Tivoli Storage Manager Server from V6.2to V6.3. Which file
cannot be recreated if the V6.2 database is damaged?
B. the server options file
C. the volume hi story file
D. the device configuration file
Answer: C
QUESTION NO: 20
During the backup of a network attached storage filer this error occurred:
The table of contents cannot be created (ANR1110E).
The backup node command was included in a server script and has the option toc=yes. What is
the reason for the error?
A. The TOC storage pool was not available
B. The correct option is TOC=if available.
C. The backup was type snapm where toc=yes is not allowed.
D. The assigned management class did not have a TOC destination.
Answer: D
A. RETMIN=7
B. RETVER=2555
C. TYPE=ARCHIVE
D. MODE=ARCHIVE
E. RETINIT=CREATION
Answer: B,C
QUESTION NO: 24
A. passfolder
B. passworddir
C. passwotdfile
D. dirtopassword
Answer: B
QUESTION NO: 25
A. Migration
B. Reclamation
C. client data backups
D. storage pool backups
Answer: D
B. The correct option is TOC=if available.
C. The backup was type snapm where toc=yes is not allowed.
D. The assigned management class did not have a TOC destination.
Answer: D
QUESTION NO: 21
A. on the target server, issue import node W12A201 filedata=all
B. on the target server, issue import client W12A201 filedata=all
C. on the source server, issue export client W12A201 filedata=all
D. on the source server, issue export server node=Wl2A201 filedata=all
Answer: A
QUESTION NO: 22
A. SAN zoning
B. ONLINE tape log
C. NIC power supply
D. OFFLINE tape log
E. firmware mismatch
Answer: A,E
An existing networked IBM Tivoli Storage Manager (TSM) environment exists and client node
W12A201 needs all of its data to be migrated to a new TSM Server. How can this be
accomplished?
B. on the target server, issue import client W12A201 filedata=all
C. on the source server, issue export client W12A201 filedata=all
D. on the source server, issue export server node=Wl2A201 filedata=all
Answer: A
QUESTION NO: 22
Given an IBM Tivoli Storage Manager (TSM) installation where tape drives often show as offline or
tape volumes are set as read-only, other than operating system logs and tape cleaning, which two
areas might a TSM administrator investigate to analyze the cause of these problems'? (Choose
two.)
B. ONLINE tape log
C. NIC power supply
D. OFFLINE tape log
E. firmware mismatch
Answer: A,E
QUESTION NO: 23
A company is mandated to retain all archived data for seven years. Which two parameters must
be added to the define copy group command to support this policy? (Choose two.)
B. RETVER=2555
C. TYPE=ARCHIVE
D. MODE=ARCHIVE
E. RETINIT=CREATION
Answer: B,C
QUESTION NO: 24
Which parameter in the IBM Tivoli Storage Manager client option file is used to specify the
directory where the password file is stored?
B. passworddir
C. passwotdfile
D. dirtopassword
Answer: B
QUESTION NO: 25
Which process should be complete before the IBM Tivoli Storage Manager database is backed
up?
B. Reclamation
C. client data backups
D. storage pool backups
Answer: D
3 April 2014
Differences or Comparison between IBM TSM, Netbackup, Commvault and Networker architecture and features
Comparison of different Backup-Restore Tools
Below are the some of the major differences between popular backup/restore tools available today in the market such as IBM Tivoli Storage Manager (TSM), Symantec Netbackup, Commvault and EMC Networker. These differences in the features of these backup tools may have changed after the newer versions released. New features have been added to all these backup tools such as increases performance, scalability, deduplication, replication etc. Please check their website for more information.
|
IBM
TSM 5.5
|
Symantec
NetBackup 6.5 |
CommVault
Simpana , Galaxy 7.0 |
EMC
Networker 7.4 SP1
|
BASIC ARCHITECHURE
|
||||
Progressive increment-al backup model
|
YES
TSM’s “Progressive Incremental” model backs up only new or
changed data and never needs to take another full backup after the first incremental backup. Restores access the backed up data directly
and require the server to process and send the data over the network
once. Also, if the backup is
stored on tape it is only stored once and retrieved once per restore.
|
NO
Symantec uses the
“Full+incremental” model that requires all new and changed files since the
original backup, to be backed up every time. Restores must retrieve each backup
taken since the original and restored generation by generation until the
latest file is restored. With Synthetic Backup a full backup is still needed
periodically although it allows the backup server, using substantial
resource, to consolidate the current and previous backup to avoid
multi-generation restores.
|
NO
CommVault uses the
Full+incremental” model that requires all new and changed files since the
original backup, to be backed up every time. Restores must retrieve each backup
taken since the original and restored generation by generation until the
latest file is restored. With Synthetic Backup a full backup is still needed
periodically although it allows the backup server, using substantial
resource, to consolidate the current and previous backup to avoid multi-generation
restores.
|
NO
Networker uses the
Full+incremental” model that requires all new and changed files since the
original backup, to be backed up every time. Threre are two restore options, the
first is the traditional incremental based restore, restores must retrieve
each backup taken since the original and restored generation by generation
until the latest file is restored. The second restore option is with Save Set
Consolidation (aka Synthetic backup) a full backup is still needed
periodically although it allows the backup server, using substantial
resource, to consolidate the current and previous backup to avoid
multi-generation restores. There are a number of limitations
which make this problematic. Renamed and deleted directories cannot be
consolidated. If incremental data contains renamed or deleted directories,
the save set consolidation process will detect it and abort. Files larger
than 2 GB can break the save set process. Save set consolidation lowers
performance since it uses tape-to-tape transfer, which is typically slower
than the disk-to-tape data transfer that is used by backups.
|
Relational database architect-ure
|
YES
TSM fully exploits relational database architecture to deliver “Progressive
Incremental”, file level tracking, utilization of storage pools, collocation
and other features that enables faster backup and restores, reduced network
traffic, the need for fewer tapes and reduced server resources.
|
DISTRIBUTED
Symantec does not
fully exploit a relational database architecture and
must implement a “full+differential/incremental” for data protection. The
database is “distributed” across the media servers and master server. These Sybase databases must be backed
up together to ensure consistency.
|
NO
CommVault does not
fully exploit a relational database architecture and
must implement a “full+differential/incremental” for data protection.
|
NO
Networker does not
fully exploit a relational database architecture and
must implement a “full+differential/incremental” for data protection.
|
BACKUP
|
||||
Advanced disk-to-disk backup for active data
|
YES
TSM has advanced disk-to-disk backup that automatically keeps active data
on the fastest most secure disk to minimize restore time while moving non
active data to lower cost tape, optical, or disk to minimize TCO.
|
NO
|
NO
|
NO
Save Set Staging
cannot be explicitly set to keep the active copy of the data on disk and
therefore restores are slower as non active data must be processed during
restores.
|
Tolerates interrup-tions to the backup process
|
YES
TSM can gracefully recovery from interruptions
to the backup process and can resume the backup process from where it was
intreuppted, needing only to resend the current file or from the transacton
boundry (used to bundle small files).
|
YES
Must use checkpoint/restart feature
|
YES
|
NO
If a backup is
interrupted before it is complete the files cannot be recovered because the
media database is not updated when the services stop and the server does not
know on which volumes the requested
files reside
|
Ability to track backed-up objects to the file-level
|
YES
Versioning allows multiple generations of the same file to be backed up
under the same file name and provides the flexibility to recovery to an
earlier copy of the file.
|
NO
|
NO
|
LIMITED
To
recover data from a scheduled backup other than the most recent one a seach
process can be used that places the burden on the user to look in multiple
time frames.
|
Ability to move data between storage devices (ie disk to lower
cost disk to tape to optical)
|
YES
Automatically moves data at the file level when thresholds are
exceeded across the storage hierarchy between different device types.
|
LIMITED
Has policy control
in 6.5 to move data. Data must be moved as a set of files created by the
backup job rather than at the file level.
|
LIMITED
Manual process to move data. Data
must be moved as a set of files created by the backup job rather than at the
file level.
|
LIMITED
Networker’s
capability to do disk to disk to tape backup is serverely limited in the
environment where it is supported. It depends on the use of the AFTD device
type and requires Veritas Volume manager to for automatic volume extention
and is only supported on a Networker server running on IBM AIX.
|
Flexible scheduling that can use other scheduling applica-tions
|
YES
Integrating backup with other operations helps insure backups are
taken when the files have been refreshed and substantially reduces the
recovery point.
|
YES
|
YES
|
NO
Networker is
limited to using it’s scheduling facility and does not use other scheduling
applications
|
Collocation
|
YES
Reduces the number of tapes a servers data is stored on
minimizing management of multiple tapes, reducing tape acquisition expense,
handling, shipping and storage costs while improving recovery time.
|
NO
|
NO
|
NO
|
Tape reclama-tion
|
YES
Automatically consolidates data and reduces wasted space on disk
and tape as data ages.
|
NO
|
NO
|
NO
As data ages on
disk or tape the save set must be kept as long as any of the data has not been
expired. This almost always means that every incremental backup must keep all
the tapes it generates until the next full backup.
|
Bandwidth conserva-tion for remote and mobile users
|
YES
Incremental and Sub-file backup and compression limit the amount
of data that needs to be sent over the network for faster backups and
preserves bandwidth for use by business applications.
|
YES
Requires an
additional cost product pre-6.5, NBU PureDisk. Option in 6.5.
|
YES
Requires separately
licensed feature of Single Instance Store
|
NO
Networker client
can use the traditional Networker client or the Avamar client with data
deduplicaiton. Use of the Avamar
client requires the EMC Avamar server is a completely separate backup
infrastructure than the Networker server. Networker recently end of lifed
its laptop option (sub-file backup) and has not introduced a replacement.
|
RECOVERY
|
||||
Restores involve only a single version of each file, directory,
or volume
|
YES
Improved administrator productivity, lower server utilization and
uses less tape.
|
NO
Restores involve a full backup version and multiple incremental
versions unless synthetic
fulls are produced which requires extra time, server resources and additional
tapes.
|
NO
Restores involve a full backup version and multiple incremental
versions unless synthetic
fulls are produced which requires extra time, server resources and additional
tapes.
|
LIMITED
File level recovery can recover a single version of a file but is only
recommended for the recovery of a limited amount of files for performance
reasons. Browsing, required by file level recovery, a save set with one
million or more files, may consume all of the host’s memory.
|
Accurate restores of only the data current at a given point in
time
|
YES
Improved speed and reliability of recovery.
|
LIMITED
Not unless the True Image option is used,
which adversely impacts backup time windows.
|
YES
|
LIMITED
Earlier copies than
the latest backup can be restored but require the complex process of setting
the browse time to the required time period and selecting the correct version
file by file. There is no notion
of an automatic restore at a given point in time.
|
Ability to resume interrupted restores
|
YES
Faster restores result in faster business resumption, particularly
useful in worst case disaster recovery scenarios
where the DR site is used and the dynamic configuration of the resources results
in less stability than the original production environment.
|
YES
Must use checkpoint/restart feature
|
LIMITED
Suspended restores can be resumed,
interrupted restores must be re-started from the beginning of the restore.
|
NO
Interrupted restores must be re-started from
the beginning of the restore.
|
ARCHIVE
|
||||
Flexible archive control
|
YES
Data can be expired at file level to accommodate archive needs
with different regulatory requirements.
|
LIMITED
|
YES
Seperate product that carries an extra charge
|
LIMITED
Networker archive option must be purchased and licensed
separately. EMC customers interested in archive would typically look at much
higher priced products Documentum and DiskXtender.
|
Policy driven file-level customiza-tion of expiration policies
|
YES
Optimizes use of disk and tape resources and provides enhanced
ability to meet compliance guidelines by deleting data at different times.
|
NO
Expiration policies apply only to entire volumes or images
|
NO
Expiration policies apply only to entire volumes.
|
NO
Archive save sets have no expiration date, retention policies do not
apply to archive data. Archived files can be manually deleted by the groom process.
|
DATABASE AND APPLICATION SUPPORT
|
||||
Backup and recovery of Microsoft SharePoint Portal 2007 and Microsoft Office SharePoint Server 2007
|
YES
TSM 5.4 (Available May 2007) for Microsoft SharePoint provides item level/site-level
and subsite-level backup and restore with backups that preserve metadata,
version histories, and securities.
|
LIMITED
NetBackup 6.5.1 planned in 4Q07, will support Sharepoint 2007:
• Portal and team site
(database) backup & recovery
|
YES
|
LIMITED
Networker only
supports SharePoint 2001. EMC also offers EMC Backup Manager for
SharePoint as a separate product
that does not integrate with Networker.
|
Flashcopy support
|
LIMITED
Flashcopy support for Exchange, DB2 and MySAP on IBM San Volume Controller
(SVC), IBM DS6000 and DS8000
|
YES
|
YES
|
YES
EMC’s Symmetrix
SRDF,Timefinder and SNAP and EMC Clarion
Snapview and STK DataMirror and SUN StorEdge snapshot and FastT 500/700, for DB2, Informix, Lotus Notes/Domino,
MEDITECH, EXCHANGE, SQL, Oracle, SAP on Oracle, and Sybase
|
DATA SECURITY
|
||||
Encryption
|
YES
Protects user data from unauthorized access and possible misuse. Client
encryption included in the base of TSM. Supports tape hw
based encryption
|
YES
Client, included at no cost with Standard
Client,
and Media Server encryption option at additional cost.
|
YES
Network and server encryption is an extra
cost option.
|
YES
Directed recovery (for
administrators only) of encrypted data is not supported.
|
Encryption key manage-ment
|
YES
Reduces effort to maintain encryption and provides reliable
access to encrypted data.
|
YES
Key management by
media server is an extra cost option.
|
YES
Extra cost option.
|
NO
NetWorker software
does not back up encryption keys
|
HIGH AVAILABILITY
|
||||
Meta data integrity assurance through two-phase commit
|
YES
Data integrity assurance for all meta data, whether associated
with client backup data or server admin additions or changes, on TSM
server Database through two phase transaction commit process. Improves consistency of metadata and system
reliability which improves the currency of backups
and availability for restores.
|
NO
|
NO
|
NO
Networker does not
store its metadata in a database that uses uses a two phase
transaction commit process.
NetWorker uses indexes and does a consistency check on the client file
indexes. “ In some circumstances, this consistency check will not detect
corruption in the client file indexes.” Additional consistency checks can be
run to identify corruption but require the administrator to determine if they
are needed.
|
Meta Data protection and recovery
|
YES
Mirroring the database and the database log, checkpoint restarts
for backups and restores and single server with metadata in one place reduces
the risk of failure. Copy Storage Pools provides an extra margin of safety by
enabling swift TSM server recovery. Backup Sets eliminate need for TSM
server for recovery.
|
LIMITED
Three
tier architecture introduces risk. No ability to restore
data without using the server.
|
LIMITED
Three
tier architecture introduces risk. No ability to restore
data without using the server.
|
LIMITED
Three
tier architecture introduces risk. No ability to restore
data without using the server.
|
Ability to back up database /catalog while activity occurs on
backup server
|
YES
High availability server operation reduces risk of client data
loss by completing backups sooner, reduces the exposure to a disaster to the
data protection infrastructure by allowing for more frequent database/catalog
backups. Provides administrator flexibility to control their work schedule by
removing the need to do server database backups at inconvenient times.
|
YES
|
LIMITED
CommVault
recommends limiting the number of backups during meta data backup to reduce
risk out outage.
|
NO
|
DISASTER RECOVERY
|
||||
Ability to restore data without using the server
|
YES
Eliminates the need to have a server for recovery providing
additional flexibility for disaster recovery planning and execution.
|
NO
|
NO
|
NO
|
Automatic tracking of multiple sets of media for disaster
recovery
|
YES
Improves administrator productivity, increases reliability of
recovery and is auditable. Included in base TSM.
|
YES
Separate product that carries an extra charge.
|
YES
Separate product that carries an extra charge.
|
NO
|
Ability to use high level of automation to make use of offsite
volumes for disaster recovery
|
YES
Reduces the administrative requirement to manage tapes.
|
NO
Requires staff
intervention.
|
NO
Requires staff
intervention.
|
NO
Requires
staff intervention.
|
Ability to automatically schedule copies of data for off-site
storage or create them on demand
|
YES
Reduces the administrative requirement to manage tapes.
|
LIMITED
Must manually identify what needs to be
copied.
|
YES
|
LIMITED
Must manually identify what needs to be
copied
|
Ability to automatically schedule copies of the database/ catalog
|
YES
Scheduling reduces administrator workload and enhances
reliability of the data protection infrastructure which
improves service levels.
|
LIMITED
|
YES
|
LIMITED
|
Ability of database/ catalog duplication to span media
|
YES
Helps provide server scalability which
reduces the number of servers.
|
YES
|
YES
|
TBD
|
Unlimited number of catalog and backup offsite copies
|
YES
Enables complex recovery plans with multiple sites.
|
YES
|
YES
|
YES
|
SCALABILITY AND
PERFORMANCE
|
||||
Data
portability
|
YES
Workload flexibility allows work to move between TSM servers,
even between those of different operating systems. This accommodates growth and
consolidation (including mergers and acquisitions) while minimizing
administrator time to change data protection infrastructure to fit the
changing needs of the business.
|
YES
NBU 6.5 has introduced a new capability of load balancing across media
servers which accommodates growth but does not address the
need to port to a different OS (ie merger and acquisition). Needs field experience to prove
viability.
|
NO
|
NO
|
Quick start of
windows backups
|
YES
TSM’s Journal
Based Backups tracks changes to
the file system, eliminating the
need to do a full file system scan for Windows clients, to do faster backups
by starting the process of sending data to the server sooner.
|
NO
|
NO
|
NO
|
Leverage high perform-ance environ-ments for
faster backups
|
YES
TSM can backup
data faster using multiple sessions from a single client in higher
performance environments that use SAN,
disk striping, available memory and CPU cycles.
|
LIMITED
NetBackup
uses multi-plexing to tape as the scheme to achieve hgh-speed backup
performance. This approach of writing several streams to tape
concurrently on backup has a substantial performance impact on
restores.
|
NO
|
NO
Multiple clients
can be used per system but require increased administrative work to keep each
client unique in some way (save set is unique, in different backup
groups, different schedules, different browse and/or retention
policies)
|
ENTERPRISE ADMINISTRATION
|
||||
|
|
|
|
|
Web-based enterprise console
|
YES
Enables remote access for use from
anywhere using only a web browser.
|
YES
|
NO
Commvault management is limited to an agent based system that is limited to a single commcell,
limiting the scope of server management.
Separate product option must be purchased for multi commcell
management.
|
YES
|
Ability to automatic-ally generate a detailed disaster recovery
plan
|
YES
Improves administrator productivity, increases reliability of
recovery and is auditable.
|
NO
|
NO
|
NO
|
Policy based flexibility to group data according to business
needs, at any level of granularity
|
YES
Grouping data across multiple servers provides flexible recovery
options and server workload distribution.
|
LIMITED
Restricts policies to the client level. In NBU 6.5, introduced Data Classification to Policies to allow tiers of storage for data.
|
LIMITED
Data can be grouped in a single server only.
|
LIMITED
|
Policy changes apply retroactive-ly
|
YES
Eliminates the need to re-backup data to minimize resource use
and puts new policies in place quicker.
|
NO
|
NO
|
NO
|
Easy technology replace-ment
|
YES
Copies data from one media type to another to support hardware
technology upgrades or media refreshes.
|
LIMITED
Limited to media
refreshes.
|
LIMITED
Limited to media
refreshes.
|
LIMITED
Save sets can be staged from one disk to
another as many times as required to support upgrades or media
refreshes. Once the save set is
staged to a tape device, it cannot be staged
again but
could be manually cloned.
|
INTEROPERABILITY
|
||||
Multiplat-form
Server Support
|
YES
TSM server
includes Windows, Linux, several Unix and mainframes. Uplift of mainframe (zOS) infrastructure in 5.5
|
LIMITED
No Mainframe support.
|
NO
Windows only.
|
LIMITED
Disk to disk limited
to NetWorker server on
AIX with Veritas Volume Manager.
|
Policies apply across operating systems
|
YES
Policy based management across operating systems allows the same
policies to be shared across clients with different operating systems. This
allows the definition of business based service level agreements by limiting
the amount of administrator effort to set up SLA’s.
|
LIMITED
Policy based management across operating systems within type, such
as no version number for backup data.
|
NO
|
NO
|
WORLDWIDE SUPPORT
|
||||
Wide Language Support
|
YES
English, Brazilian Portuguese German, Spanish, French, Italian,
Japanese, Korean, Simplified Chinese, Traditional Chinese. Language packs for
Russian, Hungarian, Polish and Czech for clients
|
NO
English, French,
German, Italian, Simplified Chinese and Japanese
|
NO
English, Chinese, French, Italian and Spanish.
|
YES
English, Brazilian Portuguese, Czech, French, German, Hungarian,
Italian, Latin American Spanish, Polish, Russian, Korean, Japanese and
Chinese.
|
Proven
support history over a decade
|
YES
IBM has a
substantial share of the backup
market delivering quality worldwide support for well over ten years.
|
YES
|
NO
|
LIMITED
Offshoring has
negatively impacted support.
|
TERMS AND
CONDITIONS
|
||||
Licensing at no charge for virtual servers
|
YES
TSM licensing is per physical CPU,
virtual servers are included in the base at no extra charge.
|
NO
|
NO
Virtual Server Licensing – additional virtual servers
requires additional CV licensing.
|
TBD
|
Licensing portability
|
YES
TSM licenses are transferable across operation systems.
|
YES
Additional licensing flexibility introduced in 6.5 for distribution of
Standard and Enterprise Client Licenses
|
NO
|
NO
|