50

Sharing an ADIC/GRAU or StorageTek ACS library ...........................

170

51

Storage Area Network ...................................................................

172

52

Loop initialization protocol ..............................................................

174

53

Example multipath configuration ......................................................

176

54

Indirect Library Access ...................................................................

179

55

Direct Library Access ......................................................................

180

56

IDB parts ......................................................................................

190

57

The influence of logging level and catalog protection on IDB growth ....

199

58

Service management information flow ..............................................

207

59

Example of an IT service provider environment with service management

 

 

access through the client portal .......................................................

215

60

Data Protector Reporter example .....................................................

216

61

Operational error status report ........................................................

217

62

Direct SIP integration example .........................................................

218

63

Backup session information flow (1) ..................................................

222

64

Backup session information flow - multiple sessions .............................

223

65

Restore session information flow ......................................................

227

66

Parallel restore session flow .............................................................

229

67

Object copy session information flow ..............................................

232

68

Relational database .......................................................................

238

69

Data Protector integration with databases .........................................

240

70

Direct backup architecture ..............................................................

246

71

Basic three host configuration ..........................................................

251

72

Synthetic backup ...........................................................................

259

73

Virtual full backup ..........................................................................

260

74

Full and incremental backups ..........................................................

261

75

Synthetic backup ...........................................................................

261

76

Regular synthetic backup ................................................................

262

77

Synthetic backup and object copy ....................................................

262

Concepts guide

15