i2CDP (Instant Real-time Data Protection) offers enterprise-level continuous data backup and on-demand recovery services for application data, both structured and unstructured, in core application system environments. It allows you to easily backup production data in real-time to backup nodes in the disaster recovery center and quickly recover the required data on demand to ensure business continuity of the production system.
On any virtual machine or physical machine, i2CDP monitors and captures all changes to protected files or directories and replicates the changed byte volume over a standard IP network to any recovery site you choose, minimizing data loss. When processing and replicating files and directories in use, there is no need to close the file, and related applications remain online and active, without any negative impact on your work. i2CDP continuously protects your data at all times.
With bytes as the smallest unit of data capture, rather than traditional files or blocks, the amount of data that needs to be replicated is greatly reduced, saving network bandwidth resources and improving the efficiency of the entire disaster recovery system. By intercepting data changes from the production system in a bypass manner, i.e., after the data changes are intercepted by i2CDP, the changed data is buffered, compressed, encrypted, sent, and confirmed at the application layer. Moreover, the upper limit of system resources that i2CDP can use can be pre-limited, ensuring that it does not affect the normal operation of the existing production system in any case and ensuring the security of data throughout the process.
The optimized data backup transmission method of the i2CDP product, due to byte-level backup, performs excellently in various complex environments such as narrow bands, long distances, and large data volumes, with efficiency much higher than traditional data transmission methods. And the transmission bandwidth and usage periods can be freely set, thereby reasonably allocating and utilizing various resources of the entire system while prioritizing bandwidth for business applications of the production system.
Its main features include:
·Supports local CDP or remote CDP
·Real-time transmission with byte-level data variable replication and storage technology
·Supports recovery of individual files, directories, etc., for volumes, directories, or single files
·Storage-agnostic and supports heterogeneous storage
·No distance limitations and minimal impact on the host
·Application-agnostic with comprehensive support
·Ensures database consistency
·Data compression and encrypted transmission
·Graphical monitoring and management
Asynchronous Replication with Recovery Point Objective (RPO) ≈ 0
The disaster recovery management software enables real-time asynchronous replication of data between two servers, and the disaster recovery end can be a local or remote disaster recovery site without adjusting the existing network and operating environment. The entire process does not require stopping applications and can be deployed online with data replicated online.
Byte-level data capture greatly reduces the amount of data transmitted, enabling data replication tasks to be performed well in limited bandwidth and harsh network environments.
Based on this, it can transmit changed data from the production end to the disaster recovery end within milliseconds, achieving asynchronous replication with an RPO ≈ 0, with minimal impact on the performance of the production end and achieving a replication effect close to synchronous replication.
Data Recovery Process
Based on the real-time byte-level data backup of the business system, it continuously captures and tracks changes in data, records them in the form of time logs stored independently of business data. Each log records a new data change, and each log serves as a recovery point for a piece of data. It can record data changes to one millionth of a second and perform data rollback and recovery operations based on the records, providing sufficiently fine recovery granularity for recovering data objects to ensure that data can be recovered to any point in the past, which is not possible with system snapshot functionality. See the following diagram:
When a system operation error or data anomaly at a specific point in time is detected, data rollback and recovery operations can be performed based on the CDP record time node. See the following diagram: