Chris Poelker
You are previewing premium content. Become an Insider to read the full article.

Data deduplication in the cloud explained, part three: Implementation methods

October 31, 2013 6:00 AM EDT



In the first two installations of this blog, I discussed the business benefits of deduplication and how the technology works. I examined the different types of deduplication available, such as file-based and block-based versioning and hashing, and the pros and cons of each.



Chris Poelker on Data Deduplication


1. Basic concepts


2. Deep Dive


3. Implementation methods (free registration required)



At this point, you may be scratching your head about how to apply deduplication to your enterprise or service organization. This is perfectly reasonable, as several terms have been bandied about by vendors in the industry regarding which type of deduplication is the best. Here's the breakdown and deep-dive into each of the main



Common deduplication implementation methods: The definitions:



  • Inline deduplication -- Data is deduplicated in real time as it is stored.


  • Post-process deduplication -- Data is stored first, and deduplicated later.


  • Client-side deduplication -- Data is deduplicated at the source.


  • Target-based deduplication -- Data is deduplicated after sending it to a target.


  • Network attached storage (NAS)-based deduplication -- Data is sent to the deduplicated target over an IP network.


  • Storage area network (SAN)-based deduplication -- Data is sent to the deduplication target over Fibre Channel (FC).


  • Global deduplication -- Data is deduplicated across an infrastructure over all transport protocols.


  • Deduplication implementation methods: The details:



    To continue reading, register here to become an Insider

    It's FREE to join

    Learn More

    Already an Insider? Sign in