What is server-free backup, and how does it work?

Server-free backup is an umbrella term for two different kinds of backup. The general distinction is that it is backup that is going to be done outside of the server that is being backed up -- hence the name. Some of the methods for doing server-free backup actually use another server, so some people don't consider them server free. But, they are still free of the server that is being backed up.

There are a number of different ways that this is accomplished, and they generally have an alternate copy of the data, such as a business continuous volume (BCV) or a split-mirror, or perhaps a snapshot, and then present that data to some other system or device that can copy the data to tape. The typical way that this is done is via a dedicated backup server. So, you have a server that's being backed up. It's using data that's on the SAN, which is being controlled and split off and snapped by a backup server. Then, that extra copy of the data is presented to another server that transfers the data to tape.

There is another way, which is truly server free, which uses something called third-party copy, which is a SCSI command. Third-party copy can tell a device, such as a disk array that supports the command, to actually copy its data straight to a tape drive without having to go through a server.

Check out the entire

    Requires Free Membership to View

Server-free Backup FAQ.

This was first published in May 2008

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: