Software Replication
|
|
|
- Jeffery Douglas
- 10 years ago
- Views:
Transcription
1 Software Replication
2 Motivation Assure the availability of an object (service) despite failures Assuming p the failure probability of an object O. O s availability is 1-p. Replicating an object O on n nodes and assuming p the failure probability of each replica, O s availability is 1- p n (considering independent failures probability) 2
3 Linearizability In a Shared Memory System 1. LINEARIZZABILE p 1 x write(a) p 1 ok() x read() p 1 ok(b) p 2 x write(b) p 2 ok() 2. NON LINEARIZZABILE p 1 x write(a) p 1 ok() x read() p 1 ok(a) p 2 x write(b) p 2 ok() 3
4 Linearizability Liveness: every invocation has a matching response Safety: there exists a permutation P of all operations on O such that P is legal wrt O (respects the semantic of the object) If the response of O occurs before O in the run, then O precedes O in P (respects the real-time ordering of operations) 4
5 Replication Techniques Due main techniques implementing linearizability: Primary Backup Active Replication 5
6 Sistem Model Processes are either clients or replicas Clients and replicas exchanges messages through Perfect point-point links Processes can crash 6
7 Passive replication: Primary-Backup
8 Primary Backup Primary: Receives invocations from clients and sends back the answers. Given an object x, prim(x) returns the primary of x. Backup: Interacts with prim(x) is used to guarantee fault tolerance by replacing a primary when crashes 8
9 Primary Backup Scenario 9
10 Primary Backup: the case of no crash When update messages are received by backups, they update their state and send back the ack to prim(x). prim(x) waits for an ack message from each correct backup and then sends back the answer, res, to the client. Guarantee Linearizability: the order in which prim(x) receive clients invocations define the order of the operation on the object. 10
11 Primary Backup: Presence of Crash Three scenarios : 1. Scenario 1: Primary fails after the client receives the answer. 2. Scenario 2: Primary fails before sending update messages 3. Scenario 3: Primary fails after sending update messages and before receiving all the ack messages. In all cases there is the need of electing a new leader. 11
12 Scenario 1 Primary fails after the client receives the answer: Client could not receive the response due to perfect point-topoint link If the response is lost, client retransmits the request after a timeout The new primary will recognize the request re-issued by the client as already processed and sends back the result without updating the replicas 12
13 Scenario 2 Primary fails before sending update messages Client does not get an answer and resends the requests after a timeout The new primary will handle the request as new 13
14 Scenario 3 Primary fails after sending update messages and before receiving all the ack messages: Guarantee atomicity: update it is received either by all or by no one. When a primary fails there is the need to elect another primary among the correct replicas 14
15 Example of Primary Backup on Synchronous Systems USE Perfect Point-to-point link; rb broadcast, leader election; perfect failure detector; upon event <Init> do recovery:= false; primary:=p; state:=initial; storage:= Ø; lastreq:=(-,-,-,-,initial); ack_recovery:=ø; correct:=π; upon event < pp2pdeliver client, [request(arg,sn]> and not recovery do If (sn,c,arg) in storage then result:=retrieve(sn,c,arg)from storage trigger <pp2psend c, [response(result)]> else (result,new state):= execute request(arg) trigger <rbbcast [up(sn,c,arg,result,newstate)]>; state:=newstate; create(ack_set c,sn ); ack_set c,sn := Ø; Upon <rbdeliver [up(sn,c,arg,result,newstate)]> do lastreq := (sn,c,arg,result,newstate); state:=newstate; store (sn,c,arg,result,newstate) into storage; trigger <pp2psend primary, [ack(sn,c)]>; upon event <crash p > do correct:=correct-p; if p=primary then trigger <leaderelection> ; upon event <leader p> do if p=myself then recovery:= true; trigger <rbbcast [recovery(lastreq)]>; register the primary to a name server; Upon event <pp2pdeliver replica, ack(c,sn)> ack_set c,sn := ack_set c,sn U replica; Upon event ackset c,sn correct do store (sn,c,arg,result,newstate) into storage; trigger <pp2psend c, [response(result)]>; Upon event ack_recovery correct do recovery:=false; Upon <rbdeliver [recovery(lastreq)]> do if state lastreq.state then remove lastreq from storage; state:=lastreq.state; trigger <pp2psend primary, [ack_rec]>; Upon event <pp2pdeliver replica, ack_recovery> ack_recovery:= ack_recovery U replica;
16 Active Replication
17 Active Replication There is no coordinator all replicas have the same role Each replica is deterministic. If any replica starts from the same state and receives the same input, they will produce the same output As a matter of fact clients will receive the same response one from each replica 17
18 Active Replication 18
19 Active Replication: Garantire Linearizability To ensure linearlizability we need to preserve: Atomicity: if a replica executes an invocation, all correct replicas execute the same invocation. Ordering: (at least) no two correct replicas have to execute two invocations in different order. We need: TOTAL ORDER Broadcast INCLUDING THE CLIENTS! 19
20 Active Replication:Crash Active Replication does not need recovery action upon the failure of a replica 20
Avoid a single point of failure by replicating the server Increase scalability by sharing the load among replicas
3. Replication Replication Goal: Avoid a single point of failure by replicating the server Increase scalability by sharing the load among replicas Problems: Partial failures of replicas and messages No
Distributed Systems (5DV147) What is Replication? Replication. Replication requirements. Problems that you may find. Replication.
Distributed Systems (DV47) Replication Fall 20 Replication What is Replication? Make multiple copies of a data object and ensure that all copies are identical Two Types of access; reads, and writes (updates)
State-Machine Replication
State-Machine Replication The Problem Clients Server The Problem Clients Server The Problem Clients Server The Problem Clients Server The Problem Clients Server The Problem Clients Server Solution: replicate
DATA RECOVERY SOLUTIONS EXPERT DATA RECOVERY SOLUTIONS FOR ALL DATA LOSS SCENARIOS.
Replication on Virtual Machines
Replication on Virtual Machines Siggi Cherem CS 717 November 23rd, 2004 Outline 1 Introduction The Java Virtual Machine 2 Napper, Alvisi, Vin - DSN 2003 Introduction JVM as state machine Addressing non-determinism
Pronto: High Availability for Standard Off-the-shelf Databases
Pronto: High Availability for Standard Off-the-shelf Databases Fernando Pedone Svend Frølund University of Lugano (USI) Switzerland Gatehouse A/S Denmark Abstract Enterprise applications typically store
Proactive, Resource-Aware, Tunable Real-time Fault-tolerant Middleware
Proactive, Resource-Aware, Tunable Real-time Fault-tolerant Middleware Priya Narasimhan T. Dumitraş, A. Paulos, S. Pertet, C. Reverte, J. Slember, D. Srivastava Carnegie Mellon University Problem Description
A Framework for Highly Available Services Based on Group Communication
A Framework for Highly Available Services Based on Group Communication Alan Fekete [email protected] http://www.cs.usyd.edu.au/ fekete Department of Computer Science F09 University of Sydney 2006,
Distributed Data Management
Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that
High Availability Design Patterns
High Availability Design Patterns Kanwardeep Singh Ahluwalia 81-A, Punjabi Bagh, Patiala 147001 India [email protected] +91 98110 16337 Atul Jain 135, Rishabh Vihar Delhi 110092 India [email protected]
Database Replication Techniques: a Three Parameter Classification
Database Replication Techniques: a Three Parameter Classification Matthias Wiesmann Fernando Pedone André Schiper Bettina Kemme Gustavo Alonso Département de Systèmes de Communication Swiss Federal Institute
Dr Markus Hagenbuchner [email protected] CSCI319. Distributed Systems
Dr Markus Hagenbuchner [email protected] CSCI319 Distributed Systems CSCI319 Chapter 8 Page: 1 of 61 Fault Tolerance Study objectives: Understand the role of fault tolerance in Distributed Systems. Know
DFSgc. Distributed File System for Multipurpose Grid Applications and Cloud Computing
DFSgc Distributed File System for Multipurpose Grid Applications and Cloud Computing Introduction to DFSgc. Motivation: Grid Computing currently needs support for managing huge quantities of storage. Lacks
Remus: : High Availability via Asynchronous Virtual Machine Replication
Remus: : High Availability via Asynchronous Virtual Machine Replication Brendan Cully, Geoffrey Lefebvre, Dutch Meyer, Mike Feeley,, Norm Hutchinson, and Andrew Warfield Department of Computer Science
Virtual Infrastructure Security
Virtual Infrastructure Security 2 The virtual server is a perfect alternative to using multiple physical servers: several virtual servers are hosted on one physical server and each of them functions both
TIBCO StreamBase High Availability Deploy Mission-Critical TIBCO StreamBase Applications in a Fault Tolerant Configuration
TIBCO StreamBase High Availability Deploy Mission-Critical TIBCO StreamBase s in a Fault Tolerant Configuration TIBCO STREAMBASE HIGH AVAILABILITY The TIBCO StreamBase event processing platform provides
High Availability and Clustering
High Availability and Clustering AdvOSS-HA is a software application that enables High Availability and Clustering; a critical requirement for any carrier grade solution. It implements multiple redundancy
Chapter 10: Distributed DBMS Reliability
Chapter 10: Distributed DBMS Reliability Definitions and Basic Concepts Local Recovery Management In-place update, out-of-place update Distributed Reliability Protocols Two phase commit protocol Three
High Availability And Disaster Recovery
High Availability And Disaster Recovery Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID,
Data Management in the Cloud
Data Management in the Cloud Ryan Stern [email protected] : Advanced Topics in Distributed Systems Department of Computer Science Colorado State University Outline Today Microsoft Cloud SQL Server
Getting to Know the SQL Server Management Studio
HOUR 3 Getting to Know the SQL Server Management Studio The Microsoft SQL Server Management Studio Express is the new interface that Microsoft has provided for management of your SQL Server database. It
Architectures Haute-Dispo Joffrey MICHAÏE Consultant MySQL
Architectures Haute-Dispo Joffrey MICHAÏE Consultant MySQL 04.20111 High Availability with MySQL Higher Availability Shared nothing distributed cluster with MySQL Cluster Storage snapshots for disaster
Redis Cluster. a pragmatic approach to distribution
Redis Cluster a pragmatic approach to distribution All nodes are directly connected with a service channel. TCP baseport+4000, example 6379 -> 10379. Node to Node protocol is binary, optimized for bandwidth
Architecture Evaluation Methods: Introduction to ATAM
Architecture Evaluation Methods: Introduction to ATAM Contents What is ATAM? What are the outputs of ATAM? Phases and Steps of ATAM ATAM Running Example Introduction to ATAM 2 What is ATAM? ATAM (Architecture
Transactions and Recovery. Database Systems Lecture 15 Natasha Alechina
Database Systems Lecture 15 Natasha Alechina In This Lecture Transactions Recovery System and Media Failures Concurrency Concurrency problems For more information Connolly and Begg chapter 20 Ullmanand
How To Understand The Power Of Zab In Zookeeper
Zab: High-performance broadcast for primary-backup systems Flavio P. Junqueira, Benjamin C. Reed, and Marco Serafini Yahoo! Research {fpj,breed,serafini}@yahoo-inc.com Abstract Zab is a crash-recovery
Distributed Databases
C H A P T E R19 Distributed Databases Practice Exercises 19.1 How might a distributed database designed for a local-area network differ from one designed for a wide-area network? Data transfer on a local-area
DHCP Failover. Necessary for a secure and stable network. DHCP Failover White Paper Page 1
DHCP Failover Necessary for a secure and stable network DHCP Failover White Paper Page 1 Table of Contents 1. Introduction... 3 2. Basic DHCP Redundancy... 3 3. VitalQIP Failover Solution... 5 4. VitalQIP
Exchange DAG backup and design best practices
Exchange DAG backup and design best practices Brien M. Posey Modern Data Protection Built for Virtualization Database Availability Groups (DAGs) are the primary fault-tolerant mechanism used for protecting
Chancery SMS 7.5.0 Database Split
TECHNICAL BULLETIN Microsoft SQL Server replication... 1 Transactional replication... 2 Preparing to set up replication... 3 Setting up replication... 4 Quick Reference...11, 2009 Pearson Education, Inc.
Huang-Ming Huang and Christopher Gill. Bala Natarajan and Aniruddha Gokhale
Replication Strategies for Fault-Tolerant Real-Time CORBA Services Huang-Ming Huang and Christopher Gill Washington University, St. Louis, MO {hh1,cdgill}@cse.wustl.edu Bala Natarajan and Aniruddha Gokhale
Microkernels & Database OSs. Recovery Management in QuickSilver. DB folks: Stonebraker81. Very different philosophies
Microkernels & Database OSs Recovery Management in QuickSilver. Haskin88: Roger Haskin, Yoni Malachi, Wayne Sawdon, Gregory Chan, ACM Trans. On Computer Systems, vol 6, no 1, Feb 1988. Stonebraker81 OS/FS
Pervasive PSQL Meets Critical Business Requirements
Pervasive PSQL Meets Critical Business Requirements Pervasive PSQL White Paper May 2012 Table of Contents Introduction... 3 Data Backup... 3 Pervasive Backup Agent... 3 Pervasive PSQL VSS Writer... 5 Pervasive
Distributed Architectures. Distributed Databases. Distributed Databases. Distributed Databases
Distributed Architectures Distributed Databases Simplest: client-server Distributed databases: two or more database servers connected to a network that can perform transactions independently and together
BME CLEARING s Business Continuity Policy
BME CLEARING s Business Continuity Policy Contents 1. Introduction 1 2. General goals of the Continuity Policy 1 3. Scope of BME CLEARING s Business Continuity Policy 1 4. Recovery strategies 2 5. Distribution
Cluster Computing. ! Fault tolerance. ! Stateless. ! Throughput. ! Stateful. ! Response time. Architectures. Stateless vs. Stateful.
Architectures Cluster Computing Job Parallelism Request Parallelism 2 2010 VMware Inc. All rights reserved Replication Stateless vs. Stateful! Fault tolerance High availability despite failures If one
TIBCO StreamBase High Availability Deploy Mission-Critical TIBCO StreamBase Applications in a Fault Tolerant Configuration
TIBCO StreamBase High Availability Deploy Mission-Critical TIBCO StreamBase Applications in a Fault Tolerant Configuration Richard Tibbetts, CTO, TIBCO StreamBase Table of Contents 3 TIBCO StreamBase High
TECHILA INTERCONNECT END-USER GUIDE
TECHILA INTERCONNECT END-USER GUIDE 16 NOVEMBER 2015 TECHILA INTERCONNECT 2/17 16 NOVEMBER 2015 Disclaimer Techila Technologies Ltd. disclaims any and all warranties, express, implied or statutory regarding
Distributed Software Systems
Consistency and Replication Distributed Software Systems Outline Consistency Models Approaches for implementing Sequential Consistency primary-backup approaches active replication using multicast communication
Chapter 3 - Data Replication and Materialized Integration
Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 [email protected] Chapter 3 - Data Replication and Materialized Integration Motivation Replication:
Real-time Protection for Hyper-V
1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate
Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances
Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances Jialin Zhang Tsinghua University [email protected] Wei Chen Microsoft Research Asia [email protected] Abstract
Facebook: Cassandra. Smruti R. Sarangi. Department of Computer Science Indian Institute of Technology New Delhi, India. Overview Design Evaluation
Facebook: Cassandra Smruti R. Sarangi Department of Computer Science Indian Institute of Technology New Delhi, India Smruti R. Sarangi Leader Election 1/24 Outline 1 2 3 Smruti R. Sarangi Leader Election
Review: The ACID properties
Recovery Review: The ACID properties A tomicity: All actions in the Xaction happen, or none happen. C onsistency: If each Xaction is consistent, and the DB starts consistent, it ends up consistent. I solation:
Survey on Comparative Analysis of Database Replication Techniques
72 Survey on Comparative Analysis of Database Replication Techniques Suchit Sapate, Student, Computer Science and Engineering, St. Vincent Pallotti College, Nagpur, India Minakshi Ramteke, Student, Computer
Performance tuning policies for application level fault tolerance in distributed object systems
Journal of Computational Methods in Sciences and Engineering 6 (2006) S265 S274 IOS Press S265 Performance tuning policies for application level fault tolerance in distributed object systems Theodoros
All about Eve: Execute-Verify Replication for Multi-Core Servers
All about Eve: Execute-Verify Replication for Multi-Core Servers Manos Kapritsos, Yang Wang, Vivien Quema, Allen Clement, Lorenzo Alvisi, Mike Dahlin The University of Texas at Austin Grenoble INP MPI-SWS
Topics. Distributed Databases. Desirable Properties. Introduction. Distributed DBMS Architectures. Types of Distributed Databases
Topics Distributed Databases Chapter 21, Part B Distributed DBMS architectures Data storage in a distributed DBMS Distributed catalog management Distributed query processing Updates in a distributed DBMS
Fault Tolerance and Resilience in Cloud Computing Environments
Pre-print version R. Jhawar, V. Piuri, "Fault Tolerance and Resilience in Cloud Computing Environments", in Computer and Information Security Handbook, 2nd Edition, J. Vacca (ed.), Morgan Kaufmann, 2013.
Distributed Commit Protocols
Distributed Commit Protocols We know: There is no distributed Atomic Commit Protocol (ACP) in an asynchronous system with properties: Uniform agreement, uniform validity, stability (A1-3) Non-triviality,
VERITAS Volume Replicator in an Oracle Environment
VERITAS Volume Replicator in an Oracle Environment Introduction Remote replication of online disks and volumes is emerging as the technique of choice for protecting enterprise data against disasters. VERITAS
A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES
A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES By: Edward Whalen Performance Tuning Corporation INTRODUCTION There are a number of clustering products available on the market today, and clustering has become
Westek Technology Snapshot and HA iscsi Replication Suite
Westek Technology Snapshot and HA iscsi Replication Suite Westek s Power iscsi models have feature options to provide both time stamped snapshots of your data; and real time block level data replication
Introduction CORBA Distributed COM. Sections 9.1 & 9.2. Corba & DCOM. John P. Daigle. Department of Computer Science Georgia State University
Sections 9.1 & 9.2 Corba & DCOM John P. Daigle Department of Computer Science Georgia State University 05.16.06 Outline 1 Introduction 2 CORBA Overview Communication Processes Naming Other Design Concerns
CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server
CA RECOVERY MANAGEMENT R12.5 BEST PRACTICE CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering
Achieving High Availability
Achieving High Availability What You Need to Know before You Start James Bottomley SteelEye Technology 21 January 2004 1 What Is Availability? Availability measures the ability of a given service to operate.
GPI Global Address Space Programming Interface
GPI Global Address Space Programming Interface SEPARS Meeting Stuttgart, December 2nd 2010 Dr. Mirko Rahn Fraunhofer ITWM Competence Center for HPC and Visualization 1 GPI Global address space programming
Paxos for System Builders
Paxos for System Builders Jonathan Kirsch and Yair Amir Technical Report CNDS-28-2 - March 28 http://www.dsn.jhu.edu Abstract This paper presents a complete specification of the Paxos replication protocol
ELIXIR LOAD BALANCER 2
ELIXIR LOAD BALANCER 2 Overview Elixir Load Balancer for Elixir Repertoire Server 7.2.2 or greater provides software solution for load balancing of Elixir Repertoire Servers. As a pure Java based software
Highly Available AMPS Client Programming
Highly Available AMPS Client Programming 60East Technologies Copyright 2013 All rights reserved. 60East, AMPS, and Advanced Message Processing System are trademarks of 60East Technologies, Inc. All other
Protecting SQL Server Databases. 1997-2008 Software Pursuits, Inc.
Protecting SQL Server Databases 1997-2008 Table of Contents Introduction... 2 Overview of the Backup Process... 2 Configuring SQL Server to Perform Scheduled Backups... 3 Configuring SureSync Relation
Microsoft s Advantages and Goals for Hyper-V for Server 2016
Virtualization is a bedrock of modern cloud environments. Hypervisors manage the virtual machines in a cloud environments, providing six fundamental features, as shown in the table below. 1 Hypervisors
CA ARCserve Replication and High Availability for Windows
CA ARCserve Replication and High Availability for Windows Microsoft SQL Server Operation Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation")
A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM
A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM Sneha D.Borkar 1, Prof.Chaitali S.Surtakar 2 Student of B.E., Information Technology, J.D.I.E.T, [email protected] Assistant Professor, Information
Real-Time Component Software. slide credits: H. Kopetz, P. Puschner
Real-Time Component Software slide credits: H. Kopetz, P. Puschner Overview OS services Task Structure Task Interaction Input/Output Error Detection 2 Operating System and Middleware Applica3on So5ware
Providing Load Balancing and Fault Tolerance in the OSGi Service Platform
Providing Load Balancing and Fault Tolerance in the OSGi Service Platform ARNE KOSCHEL, THOLE SCHNEIDER, JOHANNES WESTHUIS, JÜRGEN WESTERKAMP Faculty IV, Department of Computer Science University of Applied
Unification of Transactions and Replication in Three-Tier Architectures Based on CORBA
Unification of Transactions and Replication in Three-Tier Architectures Based on CORBA Wenbing Zhao, L. E. Moser and P. M. Melliar-Smith Index Terms: Fault tolerance, transaction processing, replication,
Geo-Replication in Large-Scale Cloud Computing Applications
Geo-Replication in Large-Scale Cloud Computing Applications Sérgio Garrau Almeida [email protected] Instituto Superior Técnico (Advisor: Professor Luís Rodrigues) Abstract. Cloud computing applications
Fault tolerant stateful firewalling with GNU/Linux. Pablo Neira Ayuso <[email protected]> Proyecto Netfilter <[email protected]> University of Sevilla
Fault tolerant stateful firewalling with GNU/Linux Pablo Neira Ayuso Proyecto Netfilter University of Sevilla Outline Introduction: Stateless and stateful firewalls
Outline. Failure Types
Outline Database Management and Tuning Johann Gamper Free University of Bozen-Bolzano Faculty of Computer Science IDSE Unit 11 1 2 Conclusion Acknowledgements: The slides are provided by Nikolaus Augsten
Highly Available Monitoring System Architecture (HAMSA)
Highly Available Monitoring System Architecture (HAMSA) A thesis is submitted in fulfillment of the requirements for the degree of Master of Science by Gleb Shaviner supervised by Prof. Danny Dolev Institute
How To Write A Transaction System
Chapter 20: Advanced Transaction Processing Remote Backup Systems Transaction-Processing Monitors High-Performance Transaction Systems Long-Duration Transactions Real-Time Transaction Systems Weak Levels
Chapter 2: Remote Procedure Call (RPC)
Chapter 2: Remote Procedure Call (RPC) Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) [email protected] http://www.iks.inf.ethz.ch/ Contents - Chapter 2 - RPC
The Aspect Unified IP Five 9s Environment
Technical Overview The Aspect Unified IP Five 9s Environment Technical Overview Aspect Unified IP 7 is a next-generation customer contact solution that enables companies to interact with consumers through
Connectivity. Alliance Access 7.0. Database Recovery. Information Paper
Connectivity Alliance Access 7.0 Database Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Database Loss Business Impact... 6 2.2 Database Recovery
How to Set Up Disaster Recovery for HP OO
HP OO 10 OnBoarding Kit Community Assistance Team How to Set Up Disaster Recovery for HP OO Various global and sector-specific regulations, as well as standards such as COBIT DS4, ISO 2031 and others,
CA ARCserve Replication and High Availability for Windows
CA ARCserve Replication and High Availability for Windows Microsoft Exchange Server Operation Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the
