the amount of data transmitted from core to core, multiple parallel streams may berequired to perform at wire speeds up to the speed of a 1 GB Ethernet connection.NOTE: Bandwidth specified by the ISP is the total available bandwidth. Theoutgoing bandwidth is shared by all devices on the network. Make sure thatthere is enough free bandwidth for replication to accommodate the changerate.Number ofprotectedmachinesIt is important to consider the number of protected machines per source core andhow many you plan to replicate to the target. AppAssure lets you performreplication on a per protected server basis, so you can choose to replicate certainservers. If all protected servers must be replicated, this drastically affects thechange rate, particularly if the bandwidth between the source and target cores isinsufficient for the amount and size of the recovery points being replicated.Depending on your network configuration, replication can be a time-consuming process.The following table shows examples of the necessary bandwidth per Gigabyte for a reasonable changerateNOTE: For optimum results, adhere to the recommendations listed in the following table.Maximum change rate for wan connection typesTable 2. Maximum change rate for wan connection typesBroadband Bandwidth Max Change RateDSL 768 Kbps and up 330 MB per hourCable 1 Mbps and up 429 MB per hourT1 1.5 Mbps and up 644 MB per hourFiber 20 Mbps and up 838 GB per hourIf a link fails during data transfer, replication resumes from the previous failure point of the transfer afterlink functionality is restored.Roadmap for performing replicationTo replicate data using AppAssure, you must configure the source and target cores for replication. Afteryou configure replication, you can then replicate data of the protected machine, monitor and managereplication, and perform recovery.Performing replication in AppAssure involves performing the following operations:• Configure self-managed replication. For more information on replicating to a self-managed targetcore, see Replicating To A Self-Managed Core.• Configure third-party replication. Fore more information on replicating to a third-party target core,see Replicating To A Core Managed By A Third Party• Replicate a new protected machine attached to the source core. For more information on replicatinga protected machine, see Replicating A New Protected Machine.• Replicate an existing protected machine. For more information on configuring an agent forreplication, see Replicating Agent Data On A Machine.46