Large libraries
What are library devices?
Library devices are automated devices, also called autoloaders, exchangers or
jukeboxes. In Data Protector, most libraries are configured as SCSI libraries. They
contain a number of media cartridges in a device’s repository and can have multiple
drives writing to multiple media at a time.
A typical library device has a SCSI ID for each drive in the device and one for the
library robotic mechanism that moves media from slots to drives and back. For
example, a library with four drives has five SCSI IDs, four for the drives and one for
the robotic mechanism.
Data Protector also supports silo libraries, such as HP StorageWorks Libraries,
StorageTek/ACSLS and ADIC/GRAU AML. For a list of supported devices, see the
HP Data Protector product announcements, software notes, and references.
Handling of media
The Data Protector user interface provides a special library view, which simplifies
managing library devices.
Media in a large library device can all belong to one Data Protector media pool, or
they can be split into several pools.
Configuring a library
When configuring a device, you configure the slot range you want to assign to Data
Protector. This allows sharing of the library with the other application. The assigned
slots may contain blank (new) media, Data Protector or non-Data Protector media.
Data Protector checks the media in the slots and displays the information about the
media in the library view. This allows you to view all kinds of media, not just the
media used by Data Protector.
Size of a library
The following may help you estimate the size of the library you need:
•
Determine if you need to distribute the media to several locations or keep them
in a central location.
Media management and devices
162
Summary of Contents for B6960-96035
Page 17: ...Overview of backup and automated media copy sessions 340 105 Concepts guide 17 ...
Page 20: ...20 ...
Page 22: ...Publication history 22 ...
Page 132: ...Planning your backup strategy 132 ...
Page 182: ...Media management and devices 182 ...
Page 186: ...Users and user groups 186 ...
Page 204: ...The Data Protector internal database 204 ...
Page 218: ...Figure 62 Direct SIP integration example Service management 218 ...
Page 242: ...Integration with database applications 242 ...
Page 264: ...Synthetic backup 264 ...
Page 274: ...Split mirror concepts 274 ...
Page 288: ...Snapshot concepts 288 ...
Page 344: ...Further information 344 ...
Page 402: ...Glossary 402 ...