In the rapid development of the digital age, one of the biggest challenges faced by companies and organizations is how to effectively protect the ever-increasing data. Snapshot technology has emerged as an innovative solution to address this issue, overcoming the fundamental limitations of traditional data backup methods and establishing itself as a core infrastructure technology in modern enterprise IT systems.
The Necessity of Data Protection: Why Snapshots Are Gaining Attention
Today, with advancements in information technology, large-scale data processing has become commonplace in various fields such as banking, telecommunications, e-commerce, and cloud platforms. According to the law of experience proposed by Turing Award winner Jim Gray, the amount of data generated every 18 months in network environments is equal to the total data accumulated in human history. Amidst this explosive growth of data, data loss in companies leads not only to information loss but also to significant economic losses and a decline in trust.
Threats such as hacking, viruses, hardware failures, and natural disasters can threaten core company data anytime and anywhere. Especially after large-scale disasters like the 9.11 terrorist attacks, companies have become even more aware of the importance of data protection and disaster recovery. However, existing traditional backup technologies face serious issues such as:
Limitations of Traditional Backup Methods and the Need for Snapshots
Conventional data backup technologies are insufficient to meet the demands of the large-volume data era. Backup operations place significant load on systems and are usually executed during low-traffic periods like nighttime. This results in the problem of a ‘backup window,’ during which business services must be temporarily interrupted.
As data volume continues to grow from gigabytes (GB) to terabytes (TB) and petabytes (PB), the length of backup windows is also increasing. Especially for financial institutions like banks and telecom companies that require 24/7 nonstop operation, even a few seconds of service interruption due to backup is unacceptable. Achieving realistic Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) has become increasingly difficult.
To solve these problems, snapshot technology has emerged. Snapshots are a groundbreaking technology that overcomes the limitations of traditional backups and provides near real-time data protection.
Definition and Core Concepts of Snapshots
Snapshot is a complete and usable copy of a data set at a specific point in time, also called an Instant Copy or Point-in-Time Copy. According to the definition by the Storage Networking Industry Association (SNIA), a snapshot is “a complete and usable copy of a specified data set at the point when copying begins.”
The key difference between snapshots and traditional backups lies in speed and flexibility. Traditional backups require considerable time to physically copy data, whereas snapshots only process metadata to instantly create a data image. Additionally, snapshots can be created at any time as needed, enabling more granular data protection through multiple snapshots per day.
The main uses of snapshots include:
Serving as a data backup source
Providing sources for data mining and analysis
Acting as application checkpoints
Providing testing and development environments
Implementation Methods of Snapshot Technology: Three Main Techniques
According to SNIA classification, snapshot technology is mainly divided into three types:
1. Split Mirror Method
This method pre-creates a complete physical mirror volume of the original data before backup. When the copy point arrives, the mirroring process is halted, and the mirror volume is immediately switched to a snapshot volume.
Advantages:
Very short snapshot creation time (usually milliseconds)
Backup window is almost negligible
Provides a complete physical copy
Disadvantages:
Lack of flexibility (snapshots cannot be created at any time)
Additional storage space equal to the size of the original data is required
System performance degradation during mirroring
2. Copy-On-Write (COW) Method
This method does not physically copy data at the snapshot creation moment. Instead, it copies only the metadata of the original data, and when the original data changes, the pre-change data is stored in a separate space.
Working Principle:
Snapshot is initiated immediately upon creation
When original data is modified, the original data is copied to the snapshot space
Pointer tables are maintained for each data block to track data locations
Advantages:
Extremely fast creation speed (instantaneous)
Minimal initial storage consumption
Performs additional work only when data changes
Snapshots can be created at any time for all data volumes
High flexibility
Disadvantages:
Not a complete physical copy
If changed data exceeds reserved space, snapshot invalidation risk increases
Sufficient reserved space must be available in the snapshot volume
3. Redirect-On-Write (ROW) Method
This method is similar to COW but works by updating pointers when new data is written.
Working Principle:
When data is modified, new data is written to a separate space
Data pointers are updated to the new location (re-mapping)
Snapshot volume pointers remain unchanged
Advantages:
Improved I/O performance (only one write operation needed)
More efficient than COW’s read-write-write operations
Disadvantages:
Increased complexity in managing multiple snapshots
Risk of fragmentation of the original data set over time
Implementation Levels of Snapshot Technology
Snapshots can be implemented at various layers of the storage stack:
Hardware Layer (Controller-based):
Implemented directly in storage device controllers
Independent of OS and filesystem
Provides high performance and fault tolerance
Operates at the LUN (block) level
Software Layer (Host-based):
Implemented within file systems or volume managers
More flexible management
Works with logical data views
Independent of physical storage
Currently, the industry mainly implements snapshots at the physical storage layer and volume management layer.
Advanced Snapshot Technologies
1. Clone Snapshots (Background Copying)
Combines the advantages of COW and split mirror techniques:
Quickly creates snapshots using COW at initial stage
Performs actual physical copying in the background
Ultimately achieves a full copy equivalent to split mirror technology
2. Continuous Data Protection (CDP)
Automatically records all data changes to enable near real-time recovery:
Continuously captures all data modifications
Can restore to any desired point in time
Minimizes RPO, approaching zero data loss
Advantages:
Loosely coupled with applications
High performance and efficiency
Uninterrupted system operation
Disadvantages:
High storage space requirements
3. Log-based Snapshots
Utilizes transaction logs of file systems:
Records all write operations
Supported by modern file systems like ZFS, JFS, EXT3, NTFS
Allows rollback to specific points in time when needed
Comparative Summary of Snapshot Technologies
Technology
Creation Speed
Storage Space
Flexibility
Performance Impact
Completeness
Split Mirror
Very fast
Large
Low
High
Complete
COW
Extremely fast
Small
High
Low
Partial
Pointer Re-mapping
Fast
Large
Medium
Medium
Complete
CDP
Continuous
Very large
Extremely high
Medium
Complete
Log-based
Fast
Small
High
Low
Complete
Evolution and Future Outlook of Snapshot Technology
Over the past 20 years, snapshot technology has undergone remarkable evolution:
Creation time: Reduced from seconds to instant
Creation frequency: Multiple snapshots as needed
Performance impact: Minimized to micro-level
Management: Increasing automation
Scalability: Support for multi-snapshot and large-scale data
Major storage vendors such as EMC TimeFinder, HDS ShadowImage, NetApp Snapshot, and Veritas Snapshot continue to improve and release new versions of snapshot technology.
However, there is still room for improvement. More advanced solutions are needed in terms of overall performance, flexibility, and management efficiency. With the proliferation of cloud environments, hybrid infrastructures, and the advent of big data, snapshot technology is expected to evolve further.
Conclusion: An Essential Technology for Modern Data Protection
Snapshot technology is an innovative solution that overcomes the fundamental limitations of traditional backup methods, becoming an indispensable element of today’s enterprise IT infrastructure. It addresses backup window issues, drastically shortens recovery times and points, and has established itself as an industry standard.
As corporate demands continue to grow, faster, more flexible, and easier-to-manage snapshot solutions are expected to be developed. In a data-driven business environment, the role of snapshot technology will become increasingly important.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Evolution of Snapshot Technology: Transforming the Way Data is Protected
In the rapid development of the digital age, one of the biggest challenges faced by companies and organizations is how to effectively protect the ever-increasing data. Snapshot technology has emerged as an innovative solution to address this issue, overcoming the fundamental limitations of traditional data backup methods and establishing itself as a core infrastructure technology in modern enterprise IT systems.
The Necessity of Data Protection: Why Snapshots Are Gaining Attention
Today, with advancements in information technology, large-scale data processing has become commonplace in various fields such as banking, telecommunications, e-commerce, and cloud platforms. According to the law of experience proposed by Turing Award winner Jim Gray, the amount of data generated every 18 months in network environments is equal to the total data accumulated in human history. Amidst this explosive growth of data, data loss in companies leads not only to information loss but also to significant economic losses and a decline in trust.
Threats such as hacking, viruses, hardware failures, and natural disasters can threaten core company data anytime and anywhere. Especially after large-scale disasters like the 9.11 terrorist attacks, companies have become even more aware of the importance of data protection and disaster recovery. However, existing traditional backup technologies face serious issues such as:
Limitations of Traditional Backup Methods and the Need for Snapshots
Conventional data backup technologies are insufficient to meet the demands of the large-volume data era. Backup operations place significant load on systems and are usually executed during low-traffic periods like nighttime. This results in the problem of a ‘backup window,’ during which business services must be temporarily interrupted.
As data volume continues to grow from gigabytes (GB) to terabytes (TB) and petabytes (PB), the length of backup windows is also increasing. Especially for financial institutions like banks and telecom companies that require 24/7 nonstop operation, even a few seconds of service interruption due to backup is unacceptable. Achieving realistic Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) has become increasingly difficult.
To solve these problems, snapshot technology has emerged. Snapshots are a groundbreaking technology that overcomes the limitations of traditional backups and provides near real-time data protection.
Definition and Core Concepts of Snapshots
Snapshot is a complete and usable copy of a data set at a specific point in time, also called an Instant Copy or Point-in-Time Copy. According to the definition by the Storage Networking Industry Association (SNIA), a snapshot is “a complete and usable copy of a specified data set at the point when copying begins.”
The key difference between snapshots and traditional backups lies in speed and flexibility. Traditional backups require considerable time to physically copy data, whereas snapshots only process metadata to instantly create a data image. Additionally, snapshots can be created at any time as needed, enabling more granular data protection through multiple snapshots per day.
The main uses of snapshots include:
Implementation Methods of Snapshot Technology: Three Main Techniques
According to SNIA classification, snapshot technology is mainly divided into three types:
1. Split Mirror Method
This method pre-creates a complete physical mirror volume of the original data before backup. When the copy point arrives, the mirroring process is halted, and the mirror volume is immediately switched to a snapshot volume.
Advantages:
Disadvantages:
2. Copy-On-Write (COW) Method
This method does not physically copy data at the snapshot creation moment. Instead, it copies only the metadata of the original data, and when the original data changes, the pre-change data is stored in a separate space.
Working Principle:
Advantages:
Disadvantages:
3. Redirect-On-Write (ROW) Method
This method is similar to COW but works by updating pointers when new data is written.
Working Principle:
Advantages:
Disadvantages:
Implementation Levels of Snapshot Technology
Snapshots can be implemented at various layers of the storage stack:
Hardware Layer (Controller-based):
Software Layer (Host-based):
Currently, the industry mainly implements snapshots at the physical storage layer and volume management layer.
Advanced Snapshot Technologies
1. Clone Snapshots (Background Copying)
Combines the advantages of COW and split mirror techniques:
2. Continuous Data Protection (CDP)
Automatically records all data changes to enable near real-time recovery:
Advantages:
Disadvantages:
3. Log-based Snapshots
Utilizes transaction logs of file systems:
Comparative Summary of Snapshot Technologies
Evolution and Future Outlook of Snapshot Technology
Over the past 20 years, snapshot technology has undergone remarkable evolution:
Major storage vendors such as EMC TimeFinder, HDS ShadowImage, NetApp Snapshot, and Veritas Snapshot continue to improve and release new versions of snapshot technology.
However, there is still room for improvement. More advanced solutions are needed in terms of overall performance, flexibility, and management efficiency. With the proliferation of cloud environments, hybrid infrastructures, and the advent of big data, snapshot technology is expected to evolve further.
Conclusion: An Essential Technology for Modern Data Protection
Snapshot technology is an innovative solution that overcomes the fundamental limitations of traditional backup methods, becoming an indispensable element of today’s enterprise IT infrastructure. It addresses backup window issues, drastically shortens recovery times and points, and has established itself as an industry standard.
As corporate demands continue to grow, faster, more flexible, and easier-to-manage snapshot solutions are expected to be developed. In a data-driven business environment, the role of snapshot technology will become increasingly important.