Designing and Deploying File Servers
|
|
|
- Gregory Armstrong
- 10 years ago
- Views:
Transcription
1 C H A P T E R 2 Designing and Deploying File Servers File servers rnning the Microsoft Windows Server 2003 operating system are ideal for providing access to files for sers in medim and large organizations. Windows Server 2003 offers a nmber of file server soltions, sch as Distribted File System (DFS), File Replication service (FRS), Windows server clsters, NTFS permissions, disk qotas, and shadow copies, for enhancing the manageability, scalability, availability, and secrity of file servers. In This Chapter Overview of Designing and Deploying File Servers Identifying File Services Goals Designing DFS Namespaces Planning File Server Availability Designing a Standard File Server Configration Planning File Server Secrity Deploying File Servers Additional Resorces Related Information For information abot installing and managing software applications by sing Grop Policy, see Deploying a Managed Software Environment in Designing a Managed Environment of this kit. For information abot managing ser desktops, settings, and data by storing data and settings on network servers, see Implementing User State Management in Designing a Managed Environment. For information abot server clsters, see Designing and Deploying Server Clsters in this book.
2 52 Chapter 2 Designing and Deploying File Servers Overview of Designing and Deploying File Servers File servers provide sers a way to access shared data within their department or organization. The simplest way to create a file server is to share a folder on a server. However, this soltion does not provide file server manageability, scalability, availability, or secrity. To achieve these goals, yo can deploy the following Windows Server 2003 soltions: Shadow copies If sers freqently reqire administrators to restore deleted or overwritten files from tape, shadow copies provide point-in-time copies of files in shared folders, allowing sers to recover files that were accidentally deleted or overwritten. DFS If sers need to access files on mltiple file servers withot having to keep track of all the server names, yo can se DFS to logically grop physical shared folders located on different servers by transparently connecting them to one or more hierarchical namespaces. DFS also provides falt-tolerance and load-sharing capabilities. FRS and Windows server clsters Windows Server 2003 provides two independent soltions, FRS and server clsters, to ensre that important bsiness data is always available, even if a server fails or is taken offline for maintenance. Disk qotas By sing the disk qotas featre in Windows Server 2003, yo can track files on a per-volme, per-ser basis to monitor disk space se and to prevent file servers from filling to capacity withot warning. NTFS permissions To prevent nathorized sers from accessing folders, yo can se NTFS file system permissions to specify the grops and sers whose access yo want to restrict or allow and then select the type of access. Yo can se the following information to design yor organization s file services. Or, if yor organization already has file servers rnning Microsoft Windows NT 4.0 or Microsoft Windows 2000 operating systems, yo can se the following information to improve the design of yor existing file services to take advantage of the new and enhanced featres in the Microsoft Windows Server 2003, Standard Edition; Windows Server 2003, Enterprise Edition; and Windows Server 2003, Datacenter Edition operating systems. File Server Design and Deployment Process Figre 2.1 otlines the general process of file server deployment. This process consists of a design phase and a deployment phase. A file services designer or design team performs the design process. The file services deployment team implements the design by deploying file servers rnning Windows Server 2003 and configring the file services soltions described in this chapter. Becase some featres of DFS and FRS reqire the Active Directory directory service, this process assmes that yor organization already has an existing Active Directory infrastrctre.
3 Overview of Designing and Deploying File Servers 53 Figre 2.1 Designing and Deploying a File Server File Services Design Team File Services Deployment Team Identify file services goals Design DFS namespaces Plan file server availability Design a standard file server configration Plan file server secrity Deploy file servers New and Enhanced File Server Featres in Windows Server 2003 The following sections smmarize the new and enhanced featres in Windows Server 2003 that are described in this chapter. Shadow copies The shadow copy featre provides point-in-time copies of files on a volme, allowing sers to view the contents of shared folders as they existed at points of time in the past. After yo enable this featre, sers can recover files that they accidentally delete or overwrite.
4 54 Chapter 2 Designing and Deploying File Servers DFS enhancements Windows Server 2003 incldes the following DFS enhancements: Yo can create mltiple DFS roots on servers rnning Windows Server 2003, Enterprise Edition and Windows Server 2003, Datacenter Edition. Yo can configre DFS to choose an alternate target based on the lowest connection cost if no same-site targets are available. Yo can se the Distribted File System snap-in to choose replication topologies that complement yor network infrastrctre. Yo can move a root target or a link target from one Active Directory site to another, and DFS will pdate the root or link information for the new site within 25 hors. To redce network traffic to the server acting as primary domain controller (PDC) emlator master, yo can configre DFS to get namespace pdates from the closest domain controller, instead of from the server acting as the PDC emlator master. This mode is known as root scalability mode. By sing the Offline Files featre, yo can make shared folders that correspond to DFS link targets available offline to clients rnning Microsoft Windows XP Professional and Windows Server (Yo cannot make DFS link targets available offline to clients rnning Windows 2000.) FRS enhancements Windows Server 2003 incldes the following FRS enhancements: FRS detects and sppresses excessive replication. FRS manages the staging directory to prevent it from becoming fll. FRS spports connection priorities, which allow yo to control the seqencing of the initial synchronization that occrs when yo add a new member to the replica set or when yo perform a nonathoritative restore, which is sed to bring a failed replica member back into synchronization with its partners. Secrity enhancements When yo share a folder, the defalt permission is the Read permission for the Everyone grop. This defalt is different from the defalt share permission in Windows 2000, which was the Fll Control permission for the Everyone grop. Server clster enhancements Windows Server 2003, Enterprise Edition and Windows Server 2003, Datacenter Edition inclde the following server clster enhancements: Yo can store encrypted files by sing Encrypting File System (EFS) on clster storage. Yo can create mltiple stand-alone DFS roots on a clstered file server, and the roots can reside on any of the nodes in the clster. Yo can enable client-side caching to cache files from a clster file share onto client compters. Clients can then access these files even when the client compter is disconnected from the network.
5 Identifying File Services Goals 55 Identifying File Services Goals Some of the major steps for designing and deploying file servers might not apply to yor organization. Therefore, the first step in the design process is to identify the goals that yo want to achieve by deploying file servers rnning Windows Server 2003, as shown in Figre 2.2. These goals determine the design and deployment steps that are necessary for yor organization. Figre 2.2 Identifying File Services Goals Identify file services goals Design DFS namespaces Plan file server availability Design a standard file server configration Plan file server secrity Deploy file servers The following sections describe common goals for file services. Use the information in these sections to identify the goals for yor organization and to find the relevant sections in this chapter or other sorces of information to help yo achieve those goals.
6 56 Chapter 2 Designing and Deploying File Servers Improving the way sers access files on file servers If yo want to improve how sers access files on file servers, yo might have the following goals: Providing an intitive way for sers to access mltiple file servers throghot the organization. Making data on mltiple file servers appear as thogh it were available on a single file server. Making data available in mltiple sites so that sers in each site se fast, inexpensive bandwidth to access the data. Redcing delays that occr when sers access heavily sed shared folders. Providing falt-tolerant access to shared folders. Consolidating file servers or migrating data withot affecting how sers locate data. For more information abot improving how sers access files on file servers, see Designing DFS Namespaces later in this chapter. Managing applications and ser data and settings If yo are managing applications, ser data, and settings, yo might have the following goals: Enabling sers to access files even when they are not connected to the network. Storing application files on file servers so that sers can install the applications from the network to their local workstations. Using Grop Policy based software management to deploy, pgrade, patch, and remove sers applications withot going to individal workstations. Allowing sers to rn applications from the file server. For more information abot managing applications and ser data and settings, see Implementing User State Management and Deploying a Managed Software Environment in Designing a Managed Environment of this kit. For more information abot hosting applications in a central location, see Hosting Applications with Terminal Server in this book. Adding storage to file servers If yo plan to add storage to file servers, yo might have the following goals: Transparently adding more storage to a file server. Making data on mltiple volmes or disks in a file server appear within a single volme or drive letter. Creating more than 26 volmes on a server withot being limited by the 26-drive letter limit. For more information abot adding storage to file servers, see Using NTFS monted drives in Help and Spport Center for Windows Server 2003.
7 Designing DFS Namespaces 57 Planning for file server availability and reliability If yo are planning for file server availability and reliability, yo might have the following goals: Choosing file server hardware for reliability and availability. Ensring data availability if a file server fails or is taken offline for maintenance. Making data available in mltiple sites to provide inexpensive access to sers within each site. For more information abot planning for file server availability and reliability, see Planning File Server Availability later in this chapter. Choosing file server hardware and settings If yo are choosing file server hardware and settings, yo might have the following goals: Choosing compatible file server hardware that meets yor performance and storage reqirements. Increasing file server performance. Consolidating file servers to redce management costs and increase storage allocation efficiency. Enabling sers to access previos versions of files on the file server. Monitoring and controlling disk space se. For more information abot choosing file server hardware and settings, see Designing a Standard File Server Configration later in this chapter. Planning for file server secrity If yo are planning for file server secrity, yo might have the following goals: Protecting file servers from virses. Preventing nathorized sers from accessing data on file servers. Allowing sers to store encrypted files on a file server. For more information abot planning for file server secrity, see Planning File Server Secrity later in this chapter. Designing DFS Namespaces Users might have difficlty finding information in shared folders that are located on nmeros file servers. Becase shared folders are sally associated with physical servers, the ser mst first determine which physical server is hosting the shared folder. For example, a ser might need to access prodct information on a server named \\Bilding 4\Marketing2\Prod_Info and on a server named \\Corporate\Floor 4\Sales\Prod_Info.
8 58 Chapter 2 Designing and Deploying File Servers Yo can se DFS to address this challenge by consolidating a large set of physical shared folders into one or more virtal namespaces. Yo do not need to modify the shared folders to add them to the namespace, and sers can navigate the namespace withot having to know the physical server names or shared folders hosting the data. Figre 2.3 otlines the general process of designing one or more DFS namespaces. For an Excel spreadsheet to assist yo in docmenting yor DFS namespace design decisions, see DFS Configration Worksheet (Sdcfsv_1.xls) on the Microsoft Windows Server 2003 Deployment Kit companion CD (or see DFS Configration Worksheet on the Web at Figre 2.3 Designing DFS Namespaces Identify file services goals Design DFS namespaces Plan file server availability Yes No Implement DFS? Choose the DFS namespace type Review DFS size recommendations End Design a standard file server configration Plan file server secrity Plan the nmber of DFS namespaces Develop root and link naming standards Deploy file servers Design a DFS namespace Increase the availability of DFS namespaces For more information abot DFS secrity, see Planning DFS and FRS Secrity later in this chapter. For in-depth technical and trobleshooting information abot DFS, see the Distribted Services Gide of the Microsoft Windows Server 2003 Resorce Kit (or see the Distribted Services Gide on the Web at
9 Designing DFS Namespaces 59 Deciding Whether to Implement DFS Organizations of any size, with any nmber of file servers, can benefit from implementing DFS. DFS is especially beneficial for organizations in which any of the following conditions exist: The organization plans to deploy additional file servers or consolidate existing file servers. The organization has data that is stored in mltiple file servers. The organization wants to replace physical servers or shared folders withot affecting how sers access the data. The organization has data located on servers in mltiple sites and wants clients to connect to the closest servers. Most sers reqire access to mltiple file servers. Users experience delays when accessing file servers dring peak sage periods. Users reqire ninterrpted access to file servers. Even if yo are bsy planning yor organization s migration to Windows Server 2003, yo can make plans to implement DFS withot immediately designing yor entire namespace. Yo do not need to deploy DFS all at one time; yo can choose to add as mch or as little of yor organization s physical storage as yo need to the DFS namespace, at a pace that works with yor overall migration schedle. When deciding whether to implement DFS, do the following: 1. Review DFS terminology. 2. Review the benefits of sing DFS. 3. Evalate clients and servers for compatibility. The following sections describe each of these steps. Reviewing DFS Terminology If yo are not familiar with DFS, review the following terms and definitions to nderstand the important elements of a DFS configration. For visal examples of these concepts, see Figre 2.4 throgh Figre 2.7 later in this section. DFS namespace A virtal view of shared folders on different servers as provided by DFS. A DFS namespace consists of a root and many links and targets. The namespace starts with a root that maps to one or more root targets. Below the root are links that map to their own targets. DFS root The starting point of the DFS namespace. The root is often sed to refer to the namespace as a whole. A root maps to one or more root targets, each of which corresponds to a shared folder on a separate server. The DFS root mst reside on an NTFS volme. A DFS root has one of the following formats: \\servername\rootname or \\domainname\rootname. Root target A physical server that hosts a DFS namespace. A domain-based DFS root can have mltiple root targets, whereas a stand-alone DFS root can only have one root target.
10 60 Chapter 2 Designing and Deploying File Servers Stand-alone DFS namespace A DFS namespace whose configration information is stored locally in the registry of the host server. The path to access the root or a link starts with the host server name. A stand-alone DFS root has only one root target. Stand-alone roots are not falt tolerant; when the root target is navailable, the entire DFS namespace is inaccessible. Yo can make stand-alone DFS roots falt tolerant by creating them on clstered file servers. Domain-based DFS namespace A DFS namespace that has configration information stored in Active Directory. The path to access the root or a link starts with the host domain name. A domain-based DFS root can have mltiple root targets, which offers falt tolerance and load sharing at the root level. DFS path Any Universal Naming Convention (UNC) path that starts with a DFS root. Link A component in a DFS path that lies below the root and maps to one or more link targets. Link target The mapping destination of a link. A link target can be any UNC path. For example, a link target cold be a shared folder or another DFS path. Figre 2.4 illstrates the elements of a stand-alone DFS namespace in the Distribted File System snap-in. These elements inclde a stand-alone DFS root, a single root target, and mltiple links. Figre 2.4 Elements of a Stand-Alone DFS Namespace Links Stand-alone DFS root Root target Figre 2.5 illstrates the elements of a domain-based DFS namespace in the Distribted File System snap-in. Notice that the \\Reskit.com\Pblic root has two root targets on different servers. Figre 2.5 Elements of a Domain-based DFS Namespace Links Domain-based DFS root Root targets
11 Designing DFS Namespaces 61 Figre 2.6 illstrates mltiple link targets for the Software link. Notice that the link targets exist on three different servers and that the administrator has disabled referrals to the link target on \\dfs-03. DFS will not refer clients to the link target on \\dfs-03 ntil the administrator enables referrals. Figre 2.6 Mltiple Link Targets Link targets The roots and links displayed in the Distribted File System snap-in also appear on each root server s local storage as follows: When yo create a DFS root, yo specify a shared folder to se as the root folder. If yo add mltiple root targets to a domain-based DFS root, yo specify a shared folder on each of those root targets. (The shared folder names shold always match the root name.) When yo add links to the root, DFS creates special folders nder each root folder. These folders, called link folders, are actally reparse points, and they display the following error message if yo try to access them on the local server: E:\Pblic\GropData is not accessible. The network location cannot be reached. Users who access the link folders from across the network are redirected to the appropriate link target. Figre 2.7 illstrates volme E:\ on the local storage of one of the root targets. The volme contains root and link folders for the \\Reskit.com\Pblic namespace. Figre 2.7 Root and Link Folders Link folders Root folder
12 62 Chapter 2 Designing and Deploying File Servers Reviewing the Benefits of Using DFS When yo evalate DFS for yor organization, it is helpfl to nderstand the benefits that yor organization can gain after designing and implementing a DFS namespace. The following list describes the benefits of sing DFS: Unified namespace A DFS namespace links together shared folders on different servers to create a hierarchical strctre that behaves like a single high-capacity hard disk. Users can navigate the logical namespace withot having to know the physical server names or shared folders hosting the data. Location transparency DFS simplifies migrating data from one file server to another. Becase sers do not need to know the name of each physical server or shared folder that contains the data, yo can physically move data to another server withot having to reconfigre applications and shortcts, and withot having to re-edcate sers abot where they can find their data. Storage scalability Yo can deploy additional or higher-performance file servers and present the storage on the new servers as new folders within an existing namespace. Namespace scalability Servers rnning Windows Server 2003, Enterprise Edition or Windows Server 2003, Datacenter Edition can host mltiple domain-based DFS roots and stand-alone DFS roots. This featre improves the scalability of DFS, enabling yo to bild many large namespaces withot having to add file servers to host the roots. Increased availability of file server data When mltiple servers rnning Windows Server 2003 host a domain-based DFS root, clients are redirected to the next available root server if any of these servers fail, providing falt-tolerant data access. To ensre the availability of stand-alone DFS namespaces, yo can create the root on a clstered file server. Alternate site selection based on cost By defalt, if a target in the same site as the sers fails, or if no same-site target exists, DFS refers clients to a random target. If yo configre the optional site costing featre, DFS can se the site information in Active Directory to locate an alternate target that has the lowest-cost network connection as defined by the administrator in the Active Directory Sites and Services snap-in. After site costing is enabled, clients can access data on DFS targets over the optimm network connection. Load sharing DFS provides a degree of load sharing by mapping a given logical name to shared folders on mltiple file servers. For example, sppose that \\Company\StockInfo is a heavily sed shared folder. By sing DFS, yo can associate this location with mltiple shared folders on different servers, even if the servers are located in different sites.
13 Designing DFS Namespaces 63 Intelligent client caching When a ser reqests access to a target that is a part of a DFS namespace, a referral containing the target s information is cached on the client. The next time the client reqires access to that portion of the namespace, the client ses the cached referral instead of obtaining a new referral, and connects directly to one of the target compters. For more information abot client caching in DFS, see the Distribted Services Gide of the Windows Server 2003 Resorce Kit (or see the Distribted Services Gide on the Web at Spport for offline folders If yor clients are rnning Microsoft Windows XP or Windows Server 2003, yo can make DFS link targets available offline by sing the Offline Files featre. Yo can also se this featre to atomatically cache programs so that sers can rn the programs locally instead of from the server. Using this featre for link targets that host applications can redce network traffic and improve server scalability. Simplified maintenance If a link has mltiple link targets, administrators can perform preventive maintenance, repairs, or pgrades on servers by disabling referrals to specific link targets. While the referral to the link target is disabled, DFS atomatically rotes new reqests to the remaining link targets that are online. Dynamic site discovery DFS now spports dynamic site discovery. In Windows 2000, DFS maintained static site information. After the site information for a particlar network resorce was known, DFS sed that information indefinitely, regardless of any changes in the site information of the resorce. In Windows Server 2003, when yo move a resorce from one site to another, the information sed by DFS converges to the new site information within 25 hors. Secrity integration Yo do not need to configre additional secrity for DFS namespaces, becase file and folder access is enforced by existing NTFS and share permissions on each link target. For example, a ser navigating a DFS namespace is permitted to access only the files or folders for which he or she has appropriate NTFS or share permissions. If yo se FRS to replicate content among mltiple targets, FRS also replicates access control lists (ACLs) for each file and folder. For more information abot DFS and FRS secrity, see Planning DFS and FRS Secrity later in this chapter. Evalating Client and Server Compatibility Before yo implement a DFS namespace, review the types of clients and servers in yor organization to make certain that the servers can host targets and that the clients can access targets in the DFS namespace. For example, if yo have UNIX clients, they cannot access the DFS namespace and mst instead access the files by sing the UNC path to the varios file servers. Table 2.1 smmarizes DFS interoperability.
14 64 Chapter 2 Designing and Deploying File Servers Table 2.1 DFS Interoperability Platform Act as DFS Clients? Host DFS Roots? Act as a Link Target? Microsoft Windows Server 2003, Web Edition Windows Server 2003, Standard Edition Windows Server 2003, Enterprise Edition and Windows Server 2003, Datacenter Edition Yes Yes Yes Yes. Can host one stand-alone DFS root or one domain-based DFS root per server. Yes. Can host one stand-alone DFS root or one domain-based DFS root per server. Yes. Can host mltiple stand-alone DFS roots and mltiple domainbased DFS roots per server. Windows XP Yes No Yes Windows Preinstallation Environment (WinPE) Microsoft Windows 2000 Server family * Microsoft Windows 2000 Professional Microsoft Windows NT Server 4.0 with Service Pack 6a Windows NT Workstation 4.0 with Service Pack 6a Yes No No Yes Yes, one stand-alone DFS root or domainbased DFS root per server. Yes Yes Yes Yes Yes No Yes Yes Yes, a single standalone DFS root per server. Yes Yes No Yes (contined)
15 Designing DFS Namespaces 65 Table 2.1 DFS Interoperability (contined) Platform Act as DFS Clients? Host DFS Roots? Act as a Link Target? Microsoft Windows Millenni m Edition (Me) Yes, client for stand-alone DFS inclded. Becase Windows Me is designed specifically for home se, no domain-based DFS client is provided. No Yes Microsoft Windows 98 Yes, client for stand-alone DFS inclded; install the Active Directory client extension for Microsoft Windows 95 or Microsoft Windows 98 to access domain-based DFS namespaces. No Yes * Applies to general-prpose servers and Windows Powered Network Attached Storage soltions rnning Windows Server Note The Active Directory client extension for Windows 95 or Windows 98 is available on the Windows 2000 operating system CD, or see the Active Directory Client Extensions link on the Web Resorces page at When evalating client compatibility, review the following important considerations: Clients mst be members of a domain before they can access a domain-based DFS namespace. Link targets can se other protocols, sch as NetWare Core Protocol (NCP) for NetWare and Network Filesystem (NFS) for UNIX, bt clients mst have the appropriate redirector installed to access those link targets. In organizations that have a large nmber of domains, clients might have difficlty accessing link targets in other domains or forests. In addition, clients rnning Windows 98 might not be able to access any domain-based DFS namespace and might also have difficlty accessing links that point to other DFS namespaces. For more information abot clients rnning Windows 98, see Designing a DFS Namespace later in this chapter. Choosing the DFS Namespace Type When creating a DFS namespace, yo create either a stand-alone DFS root or a domain-based DFS root. Table 2.2 describes the differences between domain-based DFS namespaces and standalone DFS namespaces.
16 66 Chapter 2 Designing and Deploying File Servers Table 2.2 How DFS Namespace Types Differ Characteristic Domain-based Stand-Alone Path to DFS namespace Grop memberships reqired to create and administer namespaces Where DFS root information is stored DFS namespace size restrictions Spported methods to ensre DFS root availability Spported methods to ensre link target availability \\domainname\rootname \\Netbiosdomainname\rootname \\DNSdomainname\rootname For DFS administrators who are not members of the Domain Admins grop, it is recommended that yo delegate permissions so that administrators can create new domain-based DFS namespaces. Administrators mst also be members of the local Administrators grop on each of the root targets to be able to add and delete links and add and remove the root targets. In Active Directory. DFS root information is replicated to all servers that host domain-based DFS roots. Large domain-based DFS namespaces might case significantly increased network traffic de to the size of the DFS Active Directory object. As a reslt, Microsoft recommends sing fewer than 5,000 links in domain-based DFS namespaces. Create mltiple DFS root targets in the same domain. Create mltiple link targets and replicate files by sing one of the following methods: Enabling FRS Copying files manally or by sing scripts Using a third-party replication tool \\servername\rootname DFS administrators mst be members of the local Administrators grop on the local server to create new stand-alone DFS roots and add or delete links. In the registry of the root server. The largest recommended namespace size for a stand-alone root is 50,000 links. Create a stand-alone DFS root on a clstered file server. Create mltiple link targets and replicate files by sing one of the following methods: Copying files manally or by sing scripts Using a third-party replication tool Note For information abot DFS namespace size restrictions, see Reviewing DFS Size Recommendations later in this chapter.
17 Designing DFS Namespaces 67 Use the following gidelines to choose a DFS namespace type. Choose stand-alone DFS namespaces if: Yor organization does not se Active Directory. Yo need to create a DFS namespace and are not part of the Domain Admins grop, or company policy prevents yo from delegating athority to manage a domain-based DFS namespace. Yo need to create a single namespace with more than 5,000 links. (If yo can divide yor links among two or more namespaces, domain-based DFS is an option.) Yo want to ensre the availability of the namespace by sing a clstered file server. Choose domain-based DFS namespaces if: Yo plan to se FRS to replicate data and yo want to se the Distribted File System snapin to configre and administer replication. Yo want to ensre the availability of the namespace by sing mltiple root targets. As described in Table 2.2, yo can increase the availability of roots and links in both types of DFS namespaces. For more information and specific gidelines abot increasing the availability of roots and links, see Increasing the Availability of DFS Namespaces later in this chapter. Reviewing DFS Size Recommendations As yo design yor DFS namespace, se the gidelines in Table 2.3 to avoid potential performance problems that can arise when size recommendations are exceeded. Table 2.3 DFS Size Recommendations Description Recommendation * Explanation Path limit Less than 260 characters Win32 application programming interfaces (APIs) have a maximm path limit of 260 characters, so applications will fail when trying to access a namespace that goes beyond that limit. If the path length of the DFS namespace exceeds the Win32 API limit of 260 characters, sers mst map part of the namespace to a drive letter and access the longer namespace throgh the mapped drive letter. Nmber of DFS roots per server rnning Windows Server 2003, Standard Edition One Windows Server 2003, Standard Edition is limited to one root per server. (contined)
18 68 Chapter 2 Designing and Deploying File Servers Table 2.3 DFS Size Recommendations (contined) Description Recommendation * Explanation Nmber of DFS roots per server rnning Windows Server 2003, Enterprise Edition or Windows Server 2003, Datacenter Edition Nmber of root targets per domain-based DFS root Nmber of links per DFS namespace Varies No fixed limit 5,000 for domainbased DFS 50,000 links for stand-alone DFS There is no limit to the nmber of DFS roots yo can create on a server rnning Windows Server 2003, Enterprise Edition or Windows Server 2003, Datacenter Edition. However, as yo increase the nmber of roots per server, the Distribted File System service takes longer to initialize and ses more memory. If yo do not enable root scalability mode, Microsoft recommends sing 16 or fewer root targets to limit traffic to the server acting as the primary domain controller (PDC) emlator master. When the nmber of links exceeds the recommended limit, yo might experience performance degradation when making changes to the DFS configration. For stand-alone DFS, namespace initialization after server startp might also be delayed. Size of each DFS Active Directory object (applies to domainbased DFS namespaces only) 5 megabytes (MB) The size of the DFS Active Directory object is determined by the nmber and path length of roots, links, comments, and targets in the namespace. Microsoft recommends sing no more than 5,000 links in a domain-based namespace to prevent the DFS Active Directory object from exceeding 5 MB. Limiting the size of the Active Directory object is important becase large domain-based DFS configrations can case significantly increased network traffic originating from pdates made to those roots, links, and targets. * The figres in this table are based on information gathered in a test environment. The nmbers in an operational DFS configration might exceed the nmbers described here and still provide acceptable performance. Note Yo can check the size of an existing DFS namespace by sing the following syntax in Dfstil.exe: dfstil /root:\\domainname\rootname /view (for domain-based DFS) dfstil /root:\\servername\rootname /view (for stand-alone DFS) The command otpt displays the nmber of links and, for domain-based DFS namespaces, the size of the DFS Active Directory object (described as blob size). If yor organization plans to create large namespaces, there are a nmber of strategies yo can implement to work within the size recommendations shown in Table 2.3.
19 Designing DFS Namespaces 69 Keep comments to a minimm When yo add a root target or link target in the Distribted File Systems snap-in, yo can enter comments that describe the target. If yo plan to create a large namespace, se minimal comments, if any, becase they can increase the overall size of the namespace. Note Comments are visible only within the DFS administration tools, and they are not visible to sers when they navigate the namespace. Create mltiple namespaces If yo need to create more than 5,000 links in a domain-based DFS namespace, yo can create mltiple DFS namespaces that meet the recommended sizes and then link them together. For more information abot creating mltiple namespaces, see Designing a DFS Namespace later in this chapter. Enable root scalability mode Yo enable root scalability mode by sing the /RootScalability parameter in Dfstil.exe, which yo can install from the \Spport\Tools folder on the Windows Server 2003 operating system CD. When root scalability mode is enabled, DFS root servers get pdates from the closest domain controller instead of the server acting as the PDC emlator master. As a reslt, root scalability mode redces network traffic to the PDC emlator master at the expense of faster pdates to all root servers. (When yo make changes to the namespace, the changes are still made on the PDC emlator master, bt the root servers no longer poll the PDC emlator master horly for those changes; instead, they poll the closest domain controller.) With this mode enabled, yo can have as many root targets as yo need, as long as the size of the DFS Active Directory object (for each root) is less than 5 MB. For more information abot the 5-MB limit, see the entry describing the size of the DFS Active Directory object in Table 2.3 earlier in this chapter. Do not se root scalability mode if any of the following conditions exist in yor organization: Yor namespace changes freqently, and sers cannot tolerate having inconsistent views of the namespace. Domain controller replication is slow. This increases the amont of time it takes for the PDC emlator master to replicate DFS changes to other domain controllers, which, in trn, replicate changes to the root servers. Until this replication completes, the namespace will be inconsistent on all root servers. Note After yo enable root scalability mode in a mixed domain, root servers rnning Windows Server 2003 can obtain pdates from the closest domain controller; however, root servers rnning Windows 2000 Server still obtain pdates from the PDC emlator master. For information abot installing Windows Spport Tools, see Install Windows Spport Tools in Help and Spport Center for Windows Server 2003.
20 70 Chapter 2 Designing and Deploying File Servers Migrate root servers rnning Windows 2000 Server to Windows Server 2003 Root servers rnning Windows Server 2003 do not add site information to the DFS Active Directory object. As a reslt, if all root servers rn Windows Server 2003, DFS can store more root and link information to the DFS Active Directory object before reaching the recommended 5-MB limit. For more information abot sing a mix of root servers rnning Windows 2000 Server and Windows Server 2003, see Designing a DFS Namespace later in this chapter. Planning the Nmber of DFS Namespaces Yor next step is to plan the nmber of namespaces yo want in yor domain. For an Excel spreadsheet to assist yo in docmenting yor namespace decisions, see DFS Configration Worksheet (Sdcfsv_1.xls) on the Windows Server 2003 Deployment Kit companion CD (or see DFS Configration Worksheet on the Web at Medim organizations might reqire only a single namespace, while large organizations might need mltiple DFS namespaces. Yo can determine the nmber of namespaces yo reqire by reviewing the following factors. Scope of yor domain If yor domain has a broad scope geographically, organizationally, or fnctionally yo shold plan for mltiple DFS namespaces so that administrators in the geographical, organizational, or fnctional departments can define their own namespaces. On the other hand, if the domain has a narrow scope geographically, organizationally, or fnctionally, yo might want to define a single DFS namespace. Size of yor DFS namespace If yor DFS namespace exceeds the recommended nmber of links per namespace, as discssed earlier in Reviewing DFS Size Recommendations create mltiple DFS namespaces, each of which does not exceed the recommended size. In this way, yo can provide a single namespace to sers by creating a single DFS namespace with links that point to other DFS namespaces. For more information abot linking from one namespace to another, see Designing a DFS Namespace later in this chapter.
21 Designing DFS Namespaces 71 Administrative bondaries How DFS namespaces are administered can also affect the nmber of DFS namespaces yor organization reqires. For example, yor organization might have the following administrative bondaries: Geographic. Geographically diverse sites can each have an administrator who creates and manages the DFS namespace located in that site. Departmental or grop ownership. Individal departments or grops can create and manage a DFS namespace that is sed by members of that department or grop. Political. Individal departments or grops can create and manage a DFS namespace that is sed by members of that department or grop. If grops in yor organization will create and manage their own DFS namespaces, yo can bild an extensive DFS namespace ot of smaller, more focsed DFS namespaces. One benefit of this method is that yo can present specific DFS roots to some sers as the tre top of the hierarchy and also present a set of those DFS roots to other sers as the only DFS links in a larger hierarchy. By sing a hierarchy of DFS roots, yo can scale the namespace as yor organization grows and tailor the namespace for distribted management. For more information abot linking from one namespace to another, see Designing a DFS Namespace later in this chapter. DFS namespace depth Limit the depth of DFS namespaces to 260 characters. The 260-character limit incldes the flly qalified domain name (FQDN) of the domain hosting the DFS root as well as the DFS root name. If yo exceed this limit, applications will fail when trying to access the namespace. To work arond this isse, sers mst map part of the namespace to a drive letter and then access the longer namespace throgh the mapped drive letter. Developing Root and Link Naming Standards When yo roll ot DFS, yo have the opportnity to implement consistent namespace designs. Developing naming standards first and ensring that yo adhere to the naming standards dring implementation makes it easier to se and manage any DFS namespace, both from a ser perspective and an administrative perspective. Even if yo do not expect to implement DFS ntil a later phase of yor Windows Server 2003 deployment, it is important to begin thinking abot namespace design early in the planning process. For an Excel spreadsheet to assist yo in docmenting yor DFS namespace design decisions, see DFS Configration Worksheet (Sdcfsv_1.xls) on the Windows Server 2003 Deployment Kit companion CD (or see DFS Configration Worksheet on the Web at
22 72 Chapter 2 Designing and Deploying File Servers Creating DFS Root Names A DFS root name, significant primarily to sers, is the point beyond the server name or domain name that is at the top of the hierarchy of the logical namespace. Standardized and meaningfl names at this level are very important, especially if yo have more than one DFS namespace in a domain, becase the DFS root name is where sers enter the namespace. The contents of a DFS namespace mst be as clear as possible to the sers so that they do not follow the wrong path, possibly across expensive WAN connections, and have to backtrack. When creating the DFS root names for servers that will contain mltiple roots, review the following restrictions: Each root reqires its own shared folder. When yo create a domain-based DFS root, the share name in the UNC path \\servername\sharename mst be the same name as the DFS root name in \\domainname\rootname. For example, if yo want to create a domain-based DFS root \\Reskit.com\Pblic on Server1, the UNC path to the shared folder mst be \\Server1\Pblic. A root cannot be nested within another root. For example, if C:\Root is a shared folder that ses the share name Pblic, and yo se this shared folder as a stand-alone DFS root (\\servername\pblic) or domain-based DFS root (\\domainname\pblic), yo cannot create another root in the folder C:\Root\Software. Similarly, if yo create a root by sing the root folder C:\, yo cannot create another root at C:\Root. On server clsters, do not create clstered DFS roots that have the same name as nonclstered DFS roots or shared folders. Shared folders on domain controllers mst not have the same name as any domain-based DFS roots in the domain. If they do, clients who try to access the shared folder on the domain controller are redirected to the domain-based DFS root. For example, if Reskit.com has a domain controller named DC1 that contains a shared folder named Tools (\\DC1\Tools), do not create a domain-based DFS namespace sing a root named Tools (\\Reskit.com\Tools). Otherwise, when sers attempt to access \\DC1\Tools, they are redirected to \\Reskit.com\Tools.
23 Designing DFS Namespaces 73 Creating DFS Link Names A DFS link is a component in a DFS namespace that lies below the root and maps to one or more link targets. Becase DFS link names are exposed to sers, it is important to develop standardized, meaningfl names for DFS links. Another important design goal is to develop a DFS namespace that provides intitive navigation within the hierarchy that the namespace represents. Keep in mind that comments entered in the Distribted File System snap-in are not visible to sers. For this reason, the namespace mst be as clear as possible at all levels. Designing a clear naming scheme is even more important for a DFS namespace than for a physical namespace, becase a ser might jmp to a shared folder on a different file server when he or she selects a link in the DFS namespace. As a reslt, a session has to be set p with that physical server (if one does not already exist), which might delay access. Therefore, yo want to minimize the nmber of times that sers traverse a wrong path. Clear and meaningfl naming standards can help. Try to keep links at the same level in the DFS namespace consistent in context. For example, yo probably wold not want to have links named New York, Seattle, and Milan mixed with other links named Sales, Marketing, and Conslting. To help yo create a consistent namespace, DFS spports adding one or more folder names to the link name so that yo can create a meaningfl hierarchy of link names. In the previos example, yo cold create links sch as the following: Branches\New York, Branches\Seattle, and Branches\Milan Departments\Sales, Departments\Marketing, and Departments\Conslting When sers browse this namespace, they will see a folder called Branches and another called Departments, which they can se to navigate to folders for branch offices (New York, Seattle, and Milan) and departments (Sales, Marketing, and Conslting). Note If yo want to encorage sers to access the DFS namespace instead of going to individal servers, yo can se a dollar sign ($) at the end of the shared folder name to hide it from casal browsers. The shared folder will still appear in the DFS namespace with the link name yo specify. Doing so prevents sers from accessing the shared folders by specifying individal server names. Instead, sers mst access the shared folders by sing the namespace, which enables DFS to load share reqests across mltiple link targets and allows clients to be directed to another link target if the previosly sed target is navailable. Designing a DFS Namespace As yo design one or more DFS namespaces for yor organization, yo need to make a nmber of decisions abot the strctre and capacity of the namespaces. For an Excel spreadsheet to assist yo in docmenting yor DFS namespace decisions, see DFS Configration Worksheet (Sdcfsv_1.xls) on the Windows Server 2003 Deployment Kit companion CD (or see DFS Configration Worksheet on the Web at
24 74 Chapter 2 Designing and Deploying File Servers Determining Who Can Manage the Namespace Yo can delegate administrative athority to individal sers so that they can manage a DFS namespace. Table 2.4 describes the permissions and grop memberships that yo mst delegate before sers can manage a namespace on a member server. Administering DFS namespaces on a domain controller or configring FRS replication reqires membership in the Domain Admins grop. Table 2.4 Permissions or Grop Memberships Reqired to Administer DFS Namespaces Task Creating or removing a domainbased DFS root on a member server. Adding or removing a root target from an existing domain-based DFS root on a member server. Creating or deleting a stand-alone DFS root on a member server. Adding a link to a domain-based DFS namespace or adding a target to an existing link on a member server. Removing a link from a domainbased DFS namespace or removing a target from an existing link on a member server. Changing root-related or linkrelated information, sch as comments, referral stats, and cache limits on a member server. Performing any of the tasks in this table on a domain controller. Enabling replication on links in a domain-based DFS namespace. Permissions or Grop Membership Reqired One of the following: Membership in the Domain Admins grop. Fll Control permission on the DFS-Configration container in Active Directory and membership in the local Administrators grop on the root server. One of the following: Membership in the Domain Admins grop. Fll Control permission on the DFS-Configration container in Active Directory and membership in the local Administrators grop on the root server. Membership in the local Administrators grop on the root server. Membership in the local Administrators grop on each of the root target servers. Membership in the local Administrators grop on each of the root target servers. Membership in the local Administrators grop on each of the root target servers. Membership in the Domain Admins grop. Membership in the Domain Admins grop.
25 Designing DFS Namespaces 75 Yo can also limit delegated athority to jst one domain-based DFS namespace on a member server by granting a ser or grop Fll Control permission on the DFS root object contained in the DFS-Configration container. Doing so allows the administrator to add or remove root targets from a specific namespace. For more information abot how to delegate permission to manage a DFS namespace, see Deploying DFS later in this chapter. Selecting Servers to Host Roots Table 2.5 describes the gidelines for servers hosting stand-alone DFS roots and domain-based DFS roots. Table 2.5 Gidelines for Servers That Host DFS Roots Server Hosting Stand-Alone DFS Roots Server Hosting Domain-based DFS Roots Mst contain an NTFS volme to host the root. Can be a member server or domain controller. Can be a general-prpose server or Windows Powered Network Attached Storage. Mst contain an NTFS volme to host the root. Mst be a member server or domain controller in the domain in which the DFS namespace is configred. (This reqirement applies to every root target for a given domain-based DFS namespace.) Can be a general-prpose server or Windows Powered Network Attached Storage. Can be a clstered file server. Cannot be a clstered file server nless yo host the domain-based DFS root on the local storage of a node in the server clster. The following sections provide other factors to consider when selecting root servers. Restrictions for servers rnning Windows Server 2003, Standard Edition If yo are sing servers rnning Windows Server 2003, Standard Edition, yo can create only one DFS root per server, which means that yo need one server for each root yo plan to host. Root servers that have the RestrictAnonymos registry vale Before yo create a DFS root on a server, verify that the RestrictAnonymos registry vale is not set on the server. This registry vale restricts anonymos access and cases DFS referral failres. For more information abot this registry vale, see Planning DFS and FRS Secrity later in this chapter.
26 76 Chapter 2 Designing and Deploying File Servers Root server performance When evalating the hardware specifications of the servers that host roots, note that clients access the root server to get referrals, and then the clients cache the referrals locally. Therefore, root servers do not typically experience high CPU sage. However, as the size of the namespace grows, the DFS service ses more memory, so consider sing more than the minimm recommended RAM for servers that host large DFS namespaces and for servers that host mltiple DFS namespaces. For more information abot choosing RAM and CPU speed for file servers, see Determining RAM and CPU Specifications later in this chapter. Hosting roots on domain controllers When deciding whether to host a DFS root on a domain controller, consider the following factors: Important Servers rnning Windows Server 2003, Enterprise Edition or Windows Server 2003, Datacenter Edition can host mltiple roots of any type (standalone or domain-based). However, as yo increase the nmber of roots (namespaces) on a server, yo also increase the nmber of namespaces that will be navailable if the server fails. Therefore, devise a plan that allows yo to increase the availability of the namespaces. For more information, see Increasing the Availability of DFS Namespaces later in this chapter. Only members of the Domain Admins grop can manage a DFS namespace hosted on a domain controller. If yo plan to se a domain controller to host a DFS root, the server hardware mst be sized to handle the additional load. As described earlier, root servers that host large or mltiple namespaces reqire additional memory. For information abot capacity planning for domain controllers, see Planning Domain Controller Capacity in Designing and Deploying Directory and Secrity Services of this kit. Using root servers rnning Windows 2000 Server and Windows Server 2003 If yo plan to host a domain-based DFS root on servers rnning a mix of Windows 2000 and Windows Server 2003, yo need to nderstand how DFS handles site information in each of these operating systems. These differences are important becase Windows Server 2003 does not store site information in the DFS Active Directory object; instead, root servers rnning Windows Server 2003 obtain site information directly from Active Directory. If yo have root servers rnning Windows 2000 Server, those servers try to obtain site information from the DFS Active Directory object, and nless yo se Dfstil.exe to manally pdate the site info in the DFS Active Directory object, the root servers rnning Windows 2000 Server might provide referrals that lead to a target otside of the client s site.
27 Designing DFS Namespaces 77 Table 2.6 describes how DFS root servers handle site information. Table 2.6 How Root Servers Handle Site Information Site Difference Windows 2000 Server Windows Server 2003 Where DFS stores and retrieves site information for root and link targets Characteristic of site information Method for pdating site information after moving a link target to a different site How root servers se site information for referrals DFS stores a copy of site information for root and link targets in the DFS object in Active Directory. Static Remove the link target from the namespace, and then add it back. Root servers rnning Windows 2000 Server se the link target s site information only if the link target was created by sing Windows 2000 Server. If the link target was created by sing Windows Server 2003, no site information is stored, which means that the referral cold lead to a target otside of the client s site. DFS ses IP addresses of root and link targets to obtain site information directly from Active Directory. By defalt, DFS does not store site information in the Active Directory object. Dynamic By defalt, site information atomatically pdates every 25 hors. Root servers rnning Windows Server 2003 ignore any site information in the Active Directory object; instead, they se site information directly from Active Directory. Rnning Windows Server 2003 on every root server is recommended for a nmber of reasons: Site information is always p to date becase DFS obtains site information directly from Active Directory instead of storing a copy of site information in the DFS Active Directory object. The DFS Active Directory object can hold additional root and link targets becase it does not contain site information. If yo want referrals from root servers rnning Windows 2000 Server to be ordered according to site information, yo can se the /UpdateWin2kStaticSiteTable parameter in Dfstil.exe to pdate the static site information for all root and link targets in the DFS Active Directory object. If yo plan to se this parameter, review the following isses: Using this parameter increases the size of the DFS Active Directory object, possibly making it exceed the 5-MB recommended size limit. Yo need to rn this parameter each time yo want to pdate site information. Root servers rnning Windows Server 2003 contine to get site information directly from Active Directory, and they ignore all site information in the DFS Active Directory object.
28 78 Chapter 2 Designing and Deploying File Servers When all root servers are rnning Windows Server 2003, yo can se the /PrgeWin2kStaticSiteTable parameter in Dfstil.exe to remove site information from the DFS Active Directory object, providing yo additional space for creating root and link targets. Determine the Root and Link Referral Time to Live Vales Yo can se the Distribted File System snap-in to specify the length of time that clients cache referrals to DFS root targets and link targets by adjsting the Time to Live vale for each DFS root or link. When a client receives a referral to a target, the client will contine to access that target (either a particlar root target or link target) ntil one of the following occrs: the client compter is restarted, the ser clears the cache, or the Time to Live vale for the root or link expires. The client will then obtain a new referral the next time it attempts to access the target. However, if the client contines to access the root or link within the Time To Live vale, the Time to Live vale is renewed each time and the client never reqests a new referral. Clients that resme from hibernation do not reqest new referrals either. Windows Server 2003 ses a defalt Time to Live vale of 300 seconds (5 mintes) for DFS roots and 1800 seconds (30 mintes) for DFS links. The defalt Time to Live vales work well in organizations where the namespace changes freqently and it is important that clients have p-todate referrals. When sing these vales, make sre that yor network has adeqate bandwidth and yor root servers have adeqate resorces to handle the traffic generated when clients contact the root servers for referrals. Consider increasing the Time to Live vale in the following sitations: Important If yo are sing a mix of root servers rnning Windows 2000 Server and Windows Server 2003, se the version of the Distribted File System snap-in available in either Windows Server 2003 or the Windows Server 2003 Administration Tools Pack to manage the namespace. Do not se the version of the Distribted File System snap-in available in Windows 2000 Server. An established root or link has a single link target. In this case, yo do not need to load balance reqests among mltiple servers, so it is appropriate to have a longer Time to Live vale for that root or link. Yor organization has clients in mltiple Active Directory sites, bt yo do not have root servers in all sites. In this sitation, yo can increase the Time to Live vale for the root to ensre that the client does not have to go ot of its site for a root referral if more than 5 mintes have passed since the client last accessed the namespace. If yor root information is static, yo can set this vale to be several hors. For more information abot Time to Live vales, see The Distribted Services Gide of the Windows Server 2003 Resorce Kit (or see the Distribted Services Gide on the Web at
29 Designing DFS Namespaces 79 Determining the Contents of the Root Folder The root folder of a DFS namespace is a lanch point into the namespace that is, a placeholder for the namespace. Keep the root folder as nclttered as possible. For example, yo might place a single file in the root folder (a readme file) that describes the contents and prpose of the namespace. When sers access the namespace, they will see the readme file and the links that point to one or more link targets. For more information abot the root folder, see Reviewing DFS Terminology earlier in this chapter. Choosing Shared Folders to Add to the Namespace Add shared folders to yor namespace only if they are well established and nlikely to be retired in the near ftre. If yo have targets whose nderlying physical name is dynamic, inclde them in the DFS namespace only if yo can tolerate the added administrative overhead or develop atomated scripts to pdate the DFS links. To secre files and folders, se NTFS as the nderlying file system for shared folders that yo add to a DFS namespace. Yo can add shared folders residing on file allocation table (FAT) volmes in Windows-based servers and shared folders residing on servers rnning other operating systems, sch as UNIX or Novell NetWare servers; however, yo cannot se NTFS secrity featres to secre these folders. In addition, if yo plan to se FRS to replicate the contents of shared folders, yo mst se NTFS as the file system. To help sers find data in DFS namespaces more easily, yo can pblish the UNC path for DFS links as shared folders in Active Directory. For example, if an administrator of the Reskit.com domain wants to pblish the DFS link where sers can install applications, the administrator can specify \\Reskit.com\Pblic\Apps as the path to the pblished folder. The administrator can also specify key words for that shared folder, sch as applications or Office. Domain sers in a forest can locate the applications by sing the Active Directory search tool in My Network Places to qery for the application folder by name or key words. For information abot pblishing shared folders in Active Directory, see Pblish a Shared Folder in Help and Spport Center for Windows Server Reviewing Rles for Creating Links When designing the namespace, review the following rles regarding link creation. Creating new links nder existing links Yo cannot create a new link nder an existing link. To create a hierarchy of links, specify additional folder names within the link name. For example, instead of creating a link called Grops, create links called Grops\Development, Grops\Management, Grops\Administrative, and so forth.
30 80 Chapter 2 Designing and Deploying File Servers Creating links to shared folders in other domains or forests If a client can access a link target in another trsted domain or trsted forest by sing the target s UNC path, the client can also access the link target by sing its DFS path, bt only if the list of domains fits into the client s cache, which is 4 KB by defalt (roghly 2000 characters). If the list of domains is too large to fit into the 4-KB cache, the following actions occr: Clients rnning Windows 98 cannot access any domain-based DFS namespaces. To notify yo of this isse, DFS writes an entry with the ID in the system log in Event Viewer on the domain controller that enmerates the domains. Compters rnning Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 atomatically increase their cache size to accept the list of domains, p to a maximm of 56 KB. If the list of domains exceeds 56 KB, DFS pts as many domains in the cache as it can ntil the cache reaches 56 KB. DFS then writes an entry with the ID in the system event log in Event Viewer to notify yo of this isse. When poplating the cache, DFS gives preference to local and explicitly trsted domains by filling the cache with their names first. Conseqently, by creating explicit trst relationships with domains that host important DFS namespaces yo can minimize the possibility that those domain names might be dropped from the list that is retrned to the client. Important To make sre that clients can access link targets in other trsted domains or trsted forests, yo mst se DNS names for all link targets and configre DFS to se flly qalified domain names in referrals. For more information, see article Q244380, How to Configre Dfs to Use Flly Qalified Domain Names in Referrals. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at Creating links to monted drives A monted drive is a local volme attached to an empty folder on an NTFS volme. If C:\Root is a DFS root folder on Server1 (\\Server1\Root), and yo create a folder C:\Root\Link1, where Link1 is a monted drive (for example, Link1 points to drive D), yo cannot create a link named Link1 in that DFS namespace.
31 Designing DFS Namespaces 81 Creating links to different namespaces Windows Server 2003 spports creating links that point to other DFS namespaces. Linking to other namespaces is common in organizations that want to combine the availability benefits of domain-based DFS namespaces with the scalability of stand-alone DFS namespaces. For example, if an organization needs to create 10,000 links bt does not want to divide these between two domain-based DFS namespaces, the organization can take the following steps: 1. Create a stand-alone DFS namespace with 10,000 links. 2. Create a domain-based DFS root. 3. Under the domain-based DFS root, create a link that points to the stand-alone DFS namespace. When linking to other namespaces, yo mst follow these gidelines to make certain that clients can be redirected properly if a target is navailable: If yo plan to specify a domain-based DFS namespace as a link target (either the root or a link within that namespace), yo cannot specify alternate link targets. (Windows Server 2003 enforces this restriction.) If yo plan to specify a stand-alone DFS namespace as a link target (either the root or a link within that namespace), yo can specify alternate link targets that are either stand-alone DFS roots or links within the stand-alone DFS namespace. Do not specify domain-based DFS roots or shared folders as alternate targets. Important The DFS tools do not prohibit yo from specifying domain-based DFS roots or shared folders as alternate targets. Therefore, follow these gidelines careflly. When linking to other namespaces, review the following restrictions: A DFS path can consist of no more than eight hops throgh other DFS namespaces. Clients rnning Windows 98 might not correctly access links pointing to other DFS namespaces. Windows 98 based clients can only access the following types of links to other namespaces: A link in a stand-alone DFS namespace that points to a stand-alone DFS root or link. A link in a domain-based DFS namespace that points to a stand-alone DFS root. (This works only if the client has the latest Active Directory client installed, as described in article Q323466, Directory Services Client Update for Windows 95 and Windows 98. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at For additional rles for specifying mltiple link targets, see Choosing an Availability Method for Data in Link Targets later in this chapter.
32 82 Chapter 2 Designing and Deploying File Servers Increasing the Availability of DFS Namespaces After yo create yor initial namespace design, yo need to review that design to determine whether part or all of the namespace needs to be available at all times. Yo can ensre DFS namespace availability at both the root and link target level. This helps prevent the sitation in which the target servers are p and rnning bt sers cannot access them by sing the namespace. To increase the availability of DFS namespaces, take the following steps: 1. Choose an availability method for DFS roots. 2. Choose an availability method for data in link targets. 3. Determine where to place mltiple targets. 4. Choose a replication method. The following sections describe each of these steps. Choosing an Availability Method for DFS Roots If yo plan to create DFS namespaces that mst be highly available, sch as those that provide access to bsiness-critical data, the availability method yo choose depends on the root type. Stand-alone DFS roots Yo ensre the availability of a stand-alone DFS root by creating it on the clster storage of a clstered file server by sing the Clster Administrator snap-in. For more information abot making stand-alone DFS roots highly available, see Increasing Data Availability by Using Clstering later in this chapter. Domain-based DFS roots Yo ensre the availability of domain-based DFS roots by creating mltiple root targets on nonclstered file servers or on the local storage of the nodes of server clsters. (Domain-based DFS roots cannot be created on clster storage.) All root targets mst belong to the same domain. To create root targets, se the Distribted File System snap-in or the Dfstil.exe command-line tool. (For information abot choosing servers to host root targets, see Designing a DFS Namespace earlier in this chapter.)
33 Designing DFS Namespaces 83 To ensre the availability of domain-based DFS roots, yo mst have at least two domain controllers and two root targets within the domain that is hosting the root. If yo have only one domain controller, and it becomes navailable, the namespace is inaccessible. Similarly, if yo have only a single root target, and the server hosting the root target is navailable, the namespace is also navailable. Note If yo plan to se more than 16 root targets, or if yo have root servers in remote sites that connect to the PDC emlator master across slow links, consider enabling root scalability mode. For more information abot root scalability mode, see Reviewing DFS Size Recommendations earlier in this chapter. After yo determine which roots need to be highly available, docment yor decisions. For an Excel spreadsheet to assist yo in docmenting the high-availability reqirements of DFS roots, see DFS Configration Worksheet (Sdcfsv_1.xls) on the Windows Server 2003 Deployment Kit companion CD (or see DFS Configration Worksheet on the Web at Choosing an Availability Method for Data in Link Targets As yo design yor namespace, yo need to identify link targets whose data mst be highly available. There are two ways to increase the availability of data in link targets: Create a single link that points to a link target on a clstered file server. Create mltiple link targets and replicate content among them. Yo can create link targets that point to clstered file servers in both types of namespaces. However, if yo want to replicate content among mltiple link targets, the type of namespace determines yor replication options. Using replication in stand-alone DFS namespaces In a stand-alone DFS namespace, yo mst replicate the files by copying them manally, sing scripts, sing Robocopy.exe, which is available in the Windows Server 2003 Deployment Kit, or by sing other replication tools. The Distribted File System snap-in does not provide a ser interface for configring FRS replication in stand-alone DFS namespaces. To configre replication manally, conslt the docmentation spplied with yor replication tools.
34 84 Chapter 2 Designing and Deploying File Servers Using replication in domain-based DFS namespaces The Distribted File System snap-in in Windows Server 2003 provides a ser interface for creating the FRS topology and schedle on servers rnning Windows Server If yo do not want to se FRS in a domain-based DFS namespace, yo can replicate files by copying them manally or by sing third-party replication tools. For more information abot replication, see Choosing a Replication Method later in this chapter. Note The Distribted File System snap-in is also part of the Windows Server 2003 Administration Tools Pack; yo can install this pack on compters rnning Windows XP with Service Pack 1 (SP1) or later and create FRS schedles and topologies on remote servers rnning Windows For more information, see article Q304718, Administering Windows 2000-Based and Windows Server 2003-Based Compters Using Windows XP Professional- Based Clients. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at If yo plan to se mltiple link targets to ensre data availability, yo need to configre link targets correctly. Each link can have targets that correspond to only one of the following options: One or more shared folders. One or more stand-alone DFS paths anywhere in the stand-alone DFS namespace, inclding the root. A single domain-based DFS path anywhere in the domain-based DFS namespace, inclding the root. Important The DFS tools do not prohibit yo from creating links that conflict with these gidelines. Therefore, follow these gidelines careflly. After yo determine which link targets need to be highly available, docment yor decisions. For an Excel spreadsheet to assist yo in docmenting which links reqire mltiple link targets, see DFS Configration Worksheet (Sdcfsv_1.xls) on the Windows Server 2003 Deployment Kit companion CD (or see DFS Configration Worksheet on the Web at
35 Designing DFS Namespaces 85 Placing Mltiple Targets When yo evalate where to place mltiple targets, yo shold plan to place at least one target in the same Active Directory site where sers access the data. Doing so enables clients to se fast, inexpensive bandwidth to access the target. Use mltiple same-site targets to ensre namespace availability in each site and to avoid the need to se expensive bandwidth if one of the same-site targets fails or is taken offline. Using mltiple same-site targets also provides load sharing among the targets in the site. After yo determine where to place mltiple targets, yo also need to consider where clients will be redirected if the primary target is navailable. DFS spports three methods of target selection, which are described in the following sections. These methods apply to both stand-alone and domain-based DFS namespaces. After yo determine the method of target selection for each link or root, docment yor decisions. For an Excel spreadsheet to assist yo in docmenting the target selection methods, see DFS Configration Worksheet (Sdcfsv_1.xls) on the Windows Server 2003 Deployment Kit companion CD (or see DFS Configration Worksheet on the Web at Important If yo have a mix of root servers rnning Windows 2000 Server and Windows Server 2003, target selection is random if a root server rnning Windows 2000 Server provides a referral for a link target created in Windows Server 2003, regardless of which target method yo configre. For more information abot target selection, see Designing a DFS Namespace earlier in this chapter. Defalt target selection If the last (or only) target in an Active Directory site fails or is taken offline, DFS directs clients to another target in the same site, if a target is available. Clients are directed to a random target if no same-site targets are available. DFS does not consider bandwidth cost, connection speed, or the target server s processing load when choosing the random target.
36 86 Chapter 2 Designing and Deploying File Servers Restricted same-site target selection By sing Dfstil.exe /InSite parameter, yo can limit client access to only those targets that are in the same site as the client. Yo enable this featre on a DFS root or on individal links in the namespace. If yo enable this featre on the root, referrals for any link in the namespace retrn only targets that are in the same site as the client. If this fnctionality is disabled on the root, the individal settings on each link are sed. When sing this featre, plan to have at least one target (or two targets, for falt tolerance) in every site, and plan to monitor servers to make sre they are online and accessible. If no same-site targets exist, clients in that site are denied access to the data in the namespace. Note The /InSite parameter takes effect after yo stop and restart the Distribted File System service on each root server or when the service reads the DFS metadata, which happens every hor by defalt. Least expensive target selection If yo create a stand-alone or domain-based DFS root on a server rnning Windows Server 2003, and the domain controller acting as the Intersite Topology Generator (ISTG) is also rnning Windows Server 2003, yo can se the /SiteCosting parameter in Dfstil.exe to enable DFS to choose an alternate target based on connection cost if no same-site targets are available. Windows Server 2003 ses the site and costing information in Active Directory to determine whether sites are linked by inexpensive, high-speed links or by expensive WAN links. Site costing is not available in the following sitations: When a stand-alone DFS namespace is hosted on a server that is not part of any domain. When the closest domain controller acting as the ISTG is rnning Windows 2000 Server. (This sitation occrs when there are only domain controllers rnning Windows 2000 Server in the site of the DFS root server, or when there are no domain controllers in the site of the DFS root server and the closest site with at least one domain controller has only Windows 2000 Server domain controllers in that site. The closest site is defined in Active Directory.) If yo plan to enable site costing, review the following: Yo can enable site costing on a per-namespace basis. When the domain controller acting as the ISTG is rnning Windows 2000 Server, DFS ses the defalt target selection, described earlier in this section. If domain controllers rnning Windows 2000 Server and Windows Server 2003 exist in a site, the ISTG role is atomatically given to the domain controller rnning Windows Server For more information abot defining sites in Active Directory, see Designing the Site Topology in Designing and Deploying Directory and Secrity Services of this kit.
37 Designing DFS Namespaces 87 Choosing a Replication Method If yo plan to se mltiple targets and yo want to synchronize data in those targets, yo need to choose a replication method. Yo have several methods for replicating data: A manal replication method (sch as sing the command-line tool Robocopy.exe, which is available in the Windows Server 2003 Deployment Kit) FRS A third-party replication tool It is not mandatory to se FRS to keep targets synchronized. In fact, by defalt, FRS is not enabled for DFS targets in domain-based DFS namespaces. However, in general yo do want to make sre that the nderlying shared folders that correspond to DFS links and targets are synchronized to present the same data to sers, regardless of the folder that they want to access. The following sections describe when to se manal replication or FRS. For an Excel spreadsheet to assist yo in docmenting the replication method for each target, see DFS Configration Worksheet (Sdcfsv_1.xls) on the Windows Server 2003 Deployment Kit companion CD (or see DFS Configration Worksheet on the Web at For information abot sing third-party replication tools, conslt the docmentation provided by yor software vendor. When to Use Manal Replication If the data in the shared folder is static, yo can replicate the data by doing a one-time copy of the data to a target in the replica set. Even if the data in the shared folder is dynamic bt changes infreqently, yo might want to keep the targets synchronized by downloading the initial copies over the network and then manally pdating them with changes. Yo mst se manal replication if yo plan to se a stand-alone DFS namespace or if one or more link targets for a particlar link do not rn Windows 2000 Server or Windows Server When to Use FRS FRS works by detecting changes to file and folders in a replica set and replicating those changes to other file servers in the replica set. When a change occrs, FRS replicates the entire file, not jst the changed bytes. Yo can se FRS only if yo are sing a domain-based DFS namespace, and only servers rnning a Windows 2000 Server or Windows Server 2003 operating system can be part of a replica set. In addition, all replica sets mst be created on NTFS volmes. FRS offers a nmber of advantages over manally copying files, inclding: Continos replication FRS can provide continos replication, sbject to server and network loads. When a file or folder change occrs, and the file or folder is closed, FRS can begin replicating the changed file or folder to otbond partners (that is, the replica members that will receive the changed file or folder) within five seconds.
38 88 Chapter 2 Designing and Deploying File Servers Replication schedling Yo can schedle replication to occr at specified times and drations as needed by yor organization. Schedling replication to occr dring evening hors, for example, can redce the cost of transmitting data over expensive WAN links. Replicating data dring offhors also frees p network bandwidth for other ses. Compression To save disk space, FRS compresses files in the staging directory by sing NTFS compression. Files sent between replica members remain compressed when transmitted over the network. Athenticated RPC with encryption To provide secre commnications, FRS ses Kerberos athentication protocol for athenticated remote procedre call (RPC) to encrypt the data sent between members of a replica set. Falt-tolerant replication path FRS does not rely on broadcast technology, and it can provide falt-tolerant distribtion via mltiple connection paths between members. If a given replica member is navailable, the data will flow via a different rote. FRS ses logic that prevents a file from being sent more than once to any given member. Conflict resoltion FRS can resolve file and folder conflicts to make data consistent among the replica members. If two identically named files on different servers are added to the replica set, FRS ses a last writer wins algorithm, which means that the most recent pdate to a file in a replica set becomes the version of the file or folder that replicates to the other members of the replica set. If two identically named folders on different servers are added to the replica tree, FRS identifies the conflict dring replication and renames the folder that was most recently created. Both folders are replicated to all servers in the replica set, and administrators can later merge the contents of two folders or take some other measre to reestablish the single folder. Replication integrity FRS relies on the pdate seqence nmber (USN) jornal to log records of files that have changed on a replica member. Files are replicated only after they have been modified and closed. As a reslt, FRS does not lose track of a changed file even if a replica member shts down abrptly. After the replica member comes back online, FRS replicates changes that originated from other replica members, as well as replicating local changes that occrred before the shtdown. This replication takes place according to the replication schedle. When yo se FRS, the link targets might not always be completely synchronized. As a reslt, one client s view of a link in a DFS namespace can be different from another client s view of the same link. This inconsistency can happen when clients have been referred to different link targets in the namespace. Link targets do become consistent with time, bt yo might experience temporary inconsistencies de to replication latency when pdates are occrring. For more information abot sing FRS, see Choosing an Availability Strategy for Bsiness-Critical Data later in this chapter.
39 Designing DFS Namespaces 89 FRS is typically sed to keep link targets synchronized. It is also possible to pt files and folders directly in a domain-based DFS root target and then enable replication on the root so that the files and folders are replicated to all root targets. However, avoid enabling replication on domainbased DFS roots for the following reasons: Morphed folders can occr nder the DFS root folder. Morphed folders occr when two or more identically named folders on different servers are added to the replica tree. FRS identifies the conflict dring replication, and the receiving member protects the original copy of the folder and renames (morphs) the later inbond copy of the folder. The morphed folder names have a sffix of _NTFRS_xxxxxxxx, where xxxxxxxx represents eight random hexadecimal digits. Morphed folders occr in replicated roots for the following reason: When yo create a link in the namespace, DFS creates a link folder nder each root folder on every root server. For example, if yo add 1,000 links to a namespace, DFS creates a link folder nder the DFS root folder for each of those 1,000 links on every root server. When yo enable FRS replication on the root, FRS attempts to replicate its local copy of the folder strctre to every root server. Becase each root server has a local copy of the same folder strctre as the incoming changes, FRS identifies the dplicate folder names and renames the folders that were most recently created. FRS then replicates all morphed folders to all root targets in the replica set. Note If morphed folders do occr, yo mst se the /RemoveReparse:<DirectoryName> parameter in Dfstil.exe to delete each morphed folder. For more information abot morphed folders, see Choosing an Availability Strategy for Bsiness-Critical Data later in this chapter. When adding a new root target to an FRS replicated root, yo cannot replicate the contents of individal folders in the root based on bsiness priority. Instead, the entire contents of the root are replicated to the new root target. On the other hand, if yo enable replication only on individal links, yo are creating mltiple replica sets, which allows yo to enable replication on the most important links first and then enable replication on the links in the namespace as desired. Yo cannot take individal root targets offline. For example, if yo are adding a new root target, sers who are referred to the new member might see incomplete data ntil replication is complete. On the other hand, if yo enable replication on individal links, yo can take a new link target offline while the initial replication takes place or whenever yo want to restrict access to a particlar link target.
40 90 Chapter 2 Designing and Deploying File Servers Example: An Organization Designs a DFS Namespace An organization with 35,000 sers in one site designs a stand-alone DFS namespace to provide nified access to 1.4 terabytes (TB) of both bsiness-critical and nonessential software. The team responsible for designing and deploying the namespace chooses a stand-alone DFS namespace for the following reasons: The team is not a member of the Domain Admins grop, and corporate secrity policy prevents them from becoming members of this grop. Corporate secrity policy also prohibits the team from creating a domain to host a domainbased DFS namespace. When designing the namespace, the team needs to provide access to the following types of software: Bsiness-critical software and operating systems Previos (archived) versions of software and operating systems Mltimedia software that rns from the network Training corseware To ensre the availability of the namespace, the team creates the stand-alone DFS root, \\software\pblic, on a two-node clstered file server. Each node has two Pentim III gigahertz (GHz) CPUs and 256 MB of RAM. The root server does not provide any other services. When evalating sers availability reqirements for the different types of software, the team determines that the bsiness-critical software and operating systems mst be available at all times. In addition, becase this is the most freqently accessed software, the team wants good response times. To provide the desired availability and performance, the team ses for servers as link targets. These servers each have two Pentim III 733-MHz CPUs and 256 MB of RAM. Althogh the mltimedia software is not bsiness critical, the team ses two servers as link targets for this software to improve server response times, becase the client portion of the mltimedia software accesses files from the server. The team does not se redndant servers for the remaining software, becase it is not bsiness critical, and sers can tolerate temporary downtime of those servers. Figre 2.8 describes the DFS namespace for this example.
41 Designing DFS Namespaces 91 Figre 2.8 A Stand-Alone DFS Namespace Used for Software Installation Servers Namespace Two-node clster \\software\pblic \\software\pblic \\software1\apps$ \\software2\apps$ \\software\pblic\apps \\software3\apps$ \\software4\apps$ \\archsvr\apps$ \\software\pblic\archive \\mmsoft1\apps$ \\software\pblic\mmedia \\mmsoft2\apps$ \\trainsvr\corses$ \\software\pblic\training
42 92 Chapter 2 Designing and Deploying File Servers When pdating software on the \\archsvr, \\mmsoft, and \\trainsvr servers, the team adds new files directly to the servers. To pdate software on the bsiness-critical \\software servers, the team copies the new files to a staging server, \\stagesvr. The team ses Robocopy scripts on \\stagesvr to copy the data to the \\software servers. By making changes only at the staging server, the team makes sre that no accidental changes are made on the \\software servers. The team also ses the staging server as the backp sorce, becase it contains sorce files for a nmber of servers in addition to the \\software servers. The backp team backs p the other servers individally. To prevent the staging server from becoming overloaded, the team does not make the staging server part of the namespace, so sers do not directly access the server. The team also increases the hardware specifications of this server to meet the increased disk and CPU tilization reqired for copying files to the \\software servers and to spport backps. The hardware configration has for Pentim III Xeon 700-MHz processors and 1 gigabyte (GB) of RAM. While deploying the namespace in the prodction environment, the team learned a nmber of valable lessons that can help other organizations as they test and deploy their namespaces: When setting permissions on the clstered root server, follow the gidelines in Planning Clster Secrity later in this chapter. Test the clstered root server to verify that permissions work correctly after a failover occrs. Be sre to change the Clster service password as specified by yor organization s password policy. Windows Server 2003 does not send notification that the password is abot to expire. If the password expires, problems can occr at failover. For more information abot Clster service passwords, see Change the Clster service accont password in Help and Spport Center for Windows Server Stagger new software annoncements so that sers do not overload the servers while trying to install new software. For example, send notification to a percentage of sers each day.
43 Planning File Server Availability 93 Planning File Server Availability When yo plan for file server availability, begin by ensring the ptime of the physical file server. Next, determine whether the file server contains bsiness-critical data. If it does, yo need to decide whether to se an availability strategy, sch as replication or clstering, to ensre the availability of the data. If data on the file server is temporary or not bsiness critical, contine to Planning File Server Secrity later in this chapter. Figre 2.9 describes the planning process for file server availability. Figre 2.9 Planning File Server Availability Identify file services goals Plan for file server ptime Design DFS namespaces Plan file server availability Yes Bsiness-critical file servers? No End Design a standard file server configration Choose an availability strategy for bsiness-critical data Plan file server secrity Deploy file servers Increase data availability by sing clstering Increase data availability by sing FRS
44 94 Chapter 2 Designing and Deploying File Servers Planning for File Server Uptime The following gidelines provide basic steps to increase the ptime of file servers. For comprehensive coverage of these topics, see Planning for High Availability and Scalability in this book. Choosing Hardware for Reliability and Availability Implement a well-planned hardware strategy to increase file server availability while redcing spport costs and failre recovery times. Yo can choose hardware for reliability and availability by following these gidelines: Choose hardware from the Windows Server Catalog for prodcts in the Windows Server 2003 family. Establish hardware standards. Keep spares or stand-by systems for redndancy. Use falt-tolerant network components, server cooling, and power spplies. Use error checking and correcting (ECC) memory. ECC memory ses a checking scheme to garantee that the failre of any one bit ot of a byte of information is corrected. Use falt-tolerant storage components, sch as redndant disk controllers, hot-swappable disks and hot spares, and disks configred as redndant arrays of independent disks (RAID). For more information abot RAID, see Planning the Layot and RAID Level of Volmes later in this chapter. Use disk resorce management tools, sch as disk qotas, to ensre that sers always have available disk space. Keep a log or database of changes made to the file server. The log shold contain dated entries for hardware failres and replacements, service pack and software installations, and other significant changes. Deploy FRS-compliant antivirs software on link target compters prior to adding files to FRS replicated links or adding new members to the replica set.
45 Planning File Server Availability 95 Maintaining the Physical Environment Maintain high standards for the environment in which the file servers mst rn. Neglecting the environment can negate all other efforts to maintain the availability of file servers. Take the following measres to maintain the physical environment: Maintain proper temperatre and hmidity. Protect servers from dst or contaminates. For power otages, provide a steady spply of power for the servers by sing ninterrptible power spply (UPS) nits or standby generators. Maintain server cables. Secre the server room. Planning for Backp and Preparing for Recovery Backps are essential for high-availability file servers, becase the ltimate recovery method is to restore from backp. To plan for backp and recovery: Create a plan for backp. Monitor backps. Decide between local and network backps. Check the condition of backp media. Perform trial restorations on a reglar basis. A trial restoration confirms that yor files are properly backed p and can ncover hardware problems that do not show p with software verifications. Be sre to note the time it takes to either restore or re-replicate the data so that yo will know how long it takes to bring a server back online after a failre. Perform reglar backps of clstered file servers and test clster failres and failover policies. For more information abot backing p server clsters and testing policies, see Backing p and restoring server clsters and Test clster failres and failover policies in Help and Spport Center for Windows Server If yo are sing DFS and FRS, pt a procedre in place for recovering failed members of an FRS replica set. For more information abot trobleshooting FRS, see the Distribted Services Gide of the Windows Server 2003 Resorce Kit (or see the Distribted Services Gide on the Web at
46 96 Chapter 2 Designing and Deploying File Servers Choosing Software for Reliability Installing incompatible or nreliable software redces the overall availability of file servers. To choose software for reliability, follow these gidelines: Select software that is compatible with Windows Server Select signed drivers. Microsoft promotes driver signing for designated device classes as a mechanism to advance the qality of drivers, to provide a better ser experience, and to redce spport costs for vendors and total cost of ownership for cstomers. For more information abot driver signing, see the Driver Signing and File Protection link on the Web Resorces page at Select software that spports the high-availability featres yo reqire, sch as server clsters and online backp. Identifying Bsiness-Critical File Servers After yo plan for file server ptime, identify file servers that mst be highly available. These file servers typically contain bsiness-critical data that is reqired for an organization s central prpose, sch as software distribtion points, or bsiness databases, and internal or external Web sites. File servers need to be highly available for the following reasons as well: The file server contains one or more stand-alone DFS roots. If yo create a stand-alone DFS root on a file server, and the server fails or is taken offline for maintenance, the entire DFS namespace is navailable. Users can access the shared folders only if they know the name of the file servers where the shared folders are located. To make stand-alone DFS namespaces falt tolerant, yo can create the roots on clstered file servers. Yor organization is consolidating file servers. Consolidation leads to a greater dependency on fewer file servers, so yo mst ensre the availability of the remaining file servers. Yor organization has existing SLAs. Service Level Agreements (SLAs) and Organization Level Agreements (OLAs) specify the reqired ptime for file servers, sally defined as the percentage of time that the file server is available for se. For example, yor organization might reqire that file servers have 99.7-percent ptime regardless of the type of data they contain. To meet these agreements, some organizations deploy clstered file servers and assign experienced administrators to manage those file servers. In addition to deploying hardware, these administrators se defined and tested processes to flfill these agreements. Yo do not need to implement additional availability strategies on file servers that store temporary or non-bsiness-critical files. For example, if the file server fails in some way, bt sers can tolerate the loss of the file server for the time it takes to repair the file server or restore the data from backp, yo do not need to se an availability strategy sch as replication or clstering. Instead, yo can work to decrease the amont of time it takes to restore the file server.
47 Planning File Server Availability 97 Choosing an Availability Strategy for Bsiness-Critical Data If a file server contains bsiness-critical data, yo need to make certain that the data is highly available. Windows Server 2003 provides two primary strategies for increasing data availability: FRS and clstering. FRS This strategy involves creating one or more domain-based DFS namespaces, sing link targets that point to mltiple file servers and sing File Replication service (FRS) to synchronize the data in the link targets. This chapter describes the design and deployment process for FRS, althogh yo can also synchronize data manally by sing tools sch as Robocopy or by sing third-party replication tools. Clstering A server clster is a grop of individal compter systems working together cooperatively to provide increased compting power and to provide continos availability of bsiness-critical applications or resorces. This grop of compters appears to network clients as if it were a single system, by virte of a common clster name. A clster can be configred so that the workload is distribted among the grop, and if one of the clster members fails, another clster member atomatically assmes its dties. Both of these strategies involve sing mltiple file servers to ensre data availability. If for some reason yo cannot se mltiple file servers, follow the gidelines in Planning for File Server Uptime earlier in this chapter to increase the availability of the physical server. When evalating these two strategies, yo mst keep in mind yor organization s tolerance for inconsistent data. FRS can case temporary data inconsistency as data is replicated across mltiple servers. Clstered file servers maintain only one copy of the data; therefore, data inconsistency does not occr. Note If yor organization plans to implement geographically dispersed clsters for disaster tolerance, yo need to nderstand yor data consistency needs in different failre and recovery scenarios and work with the soltion vendors to match yor reqirements. Different geographically dispersed clster soltions provide different replication and redndancy strategies, ranging from synchronos mirroring across sites to asynchronos replication. For more information abot geographically dispersed clsters, see Designing and Deploying Server Clsters in this book.
48 98 Chapter 2 Designing and Deploying File Servers Using FRS as an Availability Strategy Yo can se FRS to replicate data in domain-based DFS namespaces on file servers rnning a Windows 2000 Server or Windows Server 2003 operating system. When evalating FRS, yo mst determine whether yor organization can tolerate periods of inconsistent data that can occr within a replica set. Data inconsistency can occr at the file and folder level as follows: FRS ses a last writer wins algorithm for files. This algorithm is applied in two sitations: when the same file is changed on two or more servers, and when two or more different files with the same name are added to the replica tree on different servers. The most recent pdate to a file in a replica set becomes the version of the file that replicates to the other members of the replica set, which might reslt in data loss if mltiple masters have pdated the file. In addition, FRS cannot enforce file-sharing restrictions or file locking between two sers who are working on the same file on two different replica set members. FRS ses a last writer wins algorithm when a folder on two or more servers is changed, sch as by changing folder attribtes. However, FRS ses a first writer wins algorithm when two or more identically named folders on different servers are added to the replica tree. When this occrs, FRS identifies the conflict dring replication, and the receiving member protects the original copy of the folder and renames (morphs) the later inbond copy of the folder. The morphed folder names have a sffix of _NTFRS_xxxxxxxx, where xxxxxxxx represents eight random hexadecimal digits. The folders are replicated to all servers in the replica set, and administrators can later merge the contents of the folders or take some other measre to reestablish the single folder. Temporary data inconsistency de to replication latency is more likely to occr in geographically diverse sites with infreqent replication across slow WAN links. If yo want to se replication among servers in the same site, consistency is probably not an isse, becase the replication can occr qickly after the file changes assming that only one ser makes changes to the data. If two sers make changes to the data, replication conflicts occr and one ser loses those changes. Replication works well in the following scenarios. When the data is read-only or changes infreqently Becase changes occr infreqently, the data is sally consistent. In addition, FRS has less data to replicate, so network bandwidth is not heavily affected. When the sites are geographically dispersed and consistency is not an isse Geographically dispersed sites might have slower bandwidth connections, bt if yor organization does not reqire the data in those sites to always be consistent with each other, yo can configre replication in those sites on a schedle that make sense for yor organization. For example, if yor organization has sites in Los Angeles and Zimbabwe, yo can place one or more replicas of the data in servers in those sites and schedle replication to occr at night or dring periods of low bandwidth se. Becase in this scenario replication cold take hors or days to pdate every member, the delay mst be acceptable to yor organization.
49 Planning File Server Availability 99 When each file is changed by only one person from one location Replication conflicts rarely occr if only a single ser changes a given file from a single location. Some common scenarios for single athorship are redirected My Docments folders and other home directories. Conversely, if sers roam between sites, replication latency cold case the file to be temporarily inconsistent between sites. When replication takes place among a small nmber of servers in the same site Replication latency is redced by freqently replicating data sing high-speed connections. As a reslt, data tends to be more consistent. Replication shold not be sed in the following scenarios. In organizations with no operations grop or dedicated administrators Organizations that do not have the staff or the time to monitor FRS event logs on each replica member shold not implement FRS. Organizations mst also have well-defined procedres in place to prevent the accidental or nintentional deletion of data in the replica set, becase deleting a file or folder from one replica member cases the file or folder (and its contents) to be deleted from all replica members. In addition, if a folder is moved ot of the replica tree, FRS deletes the folder and its contents on the remaining replica members. To avoid having to restore the files or folders from backp, yo can enable shadow copies on some of the replica members so that yo can easily restore a file or folder that was accidentally deleted. For more information abot shadow copies, see Designing a Shadow Copy Strategy later in this chapter. For more information abot FRS logs, see the Distribted Services Gide of the Windows Server 2003 Resorce Kit (or see the Distribted Services Gide on the Web at In organizations that do not pdate virs signatres or closely manage folder permissions A virs in FRS-replicated content can spread rapidly to replica members and to clients that access the replicated data. Virses are especially damaging in environments where the Everyone grop has share permissions or NTFS permissions to modify content. To prevent the spread of virses, it is essential that replica members have FRS-compatible, p-to-date virs scanners installed on the servers and on clients that access replicated data. For more information abot preventing the spread of virses, see Planning Virs Protection for File Servers and Planning DFS and FRS Secrity later in this chapter. When the rate of change exceeds what FRS can replicate If yo plan to schedle replication to occr dring a specified replication window, verify that FRS can replicate all the changed files within the window. Replication throghpt is determined by a nmber of factors: The nmber and size of changed files The speed of the disk sbsystem The speed of the network Whether yo have optimized the servers by placing the replica tree, the staging directory, and the FRS data on separate disks.
50 100 Chapter 2 Designing and Deploying File Servers Each organization will have different FRS throghpt rates, depending on these factors. In addition, if yor data compresses extremely well, yor file throghpt will be higher. To determine the replication rate, perform testing in a lab environment that resembles yor prodction environment. If the amont of data changes exceeds what FRS can replicate in a given period of time, yo need to change one of these factors, sch as increasing the speed of the disk sbsystem (nmber of disks, mechanical speed, or disk cache) or network. If no change is possible, FRS is not recommended for yor organization. In organizations that always se clstered file servers Some organizations se clstered file servers regardless of whether the server contains bsinesscritical data. Althogh storing FRS-replicated content on the clster storage of a clstered file server might imply increased availability of the data, combining clstering and FRS is not recommended. Data might become inconsistent among the members of the replica set, ths defeating the prpose of clstering, which is to have highly available data that remains consistent becase only one copy of the data exists. In addition, Windows Server 2003 does not spport configring FRS to replicate data on clster storage. In organizations that se Remote Storage Remote Storage is a featre in Windows Server 2003 that atomatically copies infreqently sed files on local volmes to a library of magnetic tapes or magneto-optical disks. Organizations that se Remote Storage mst not se FRS on the same volme. Specifically, do not perform any of the following tasks: Do not create a replica set on a volme that is managed by Remote Storage. Do not add a volme that contains folders that are part of an FRS replica set to Remote Storage. If yo se Remote Storage for volmes that contain FRS replica sets, backp tapes might be damaged or destroyed if FRS recalls a large nmber of files from Remote Storage. The damage occrs becase FRS does not recall files in media order. As a reslt, files are extracted randomly, and the process can take days to complete and might damage or destroy the tape in the process. Random extraction from magneto-optical disks can also be extremely time consming. Cation Windows Server 2003 does not prevent yo from sing Remote Storage and FRS replica sets on the same volmes, so take extra precations to avoid sing these two featres on the same volme. When locks by sers or processes prevent pdates to files and folders FRS does not replicate locked files or folders to other replica members, nor does FRS pdate a file on a replica member if the local file is open. If sers or processes freqently leave files open for extended periods, consider sing clstering instead of FRS. When the data to be replicated is on monted drives If a monted drive exists in a replica tree, FRS does not replicate the data in the monted drive.
51 Planning File Server Availability 101 When the data to be replicated is encrypted by sing EFS FRS does not replicate files encrypted by sing EFS, nor does FRS warn yo that EFS-encrypted files are present in the replica set. When the FRS jet database, FRS logs, and staging directory are stored on volmes where NTFS disk qotas are enabled If yo plan to store a replica set on a volme where disk qotas are enabled, yo mst move the staging directory, FRS jet database, and FRS logs to a volme where disk qotas are disabled. For more information, see Planning the Staging Directory later in this chapter. Using Clstering as an Availability Strategy If the data changes freqently and yor organization reqires consistent data that is highly available, se clstered file servers. Clstered file servers allow client access to file services dring nplanned and planned otages. When one of the servers in the clster is navailable, clster resorces and applications move to other available clster nodes. Server clsters do not garantee nonstop operation, bt they do provide sfficient availability for most bsiness-critical applications, inclding file services. A clster service can monitor applications and resorces and atomatically recognize and recover from many failre conditions. This ability provides flexibility in managing the workload within a clster and improves overall system availability. Server clster benefits inclde the following: High availability Ownership of resorces, sch as disks and IP addresses, is atomatically transferred from a failed server to a srviving server. When a system or application in the clster fails, the clster software restarts the failed application on a srviving server, or it disperses the work from the failed node to the remaining nodes. As a reslt, sers experience only a momentary pase in service. Manageability Yo can se the Clster Administrator snap-in to manage a clster as a single system and to manage applications as if they were rnning on a single server. Yo can move applications to different servers within the clster, and yo can manally balance server workloads and free servers for planned maintenance. Yo can also monitor the stats of the clster, all nodes, and resorces from anywhere on the network. Scalability Server clsters can grow to meet increased demand. When the overall client load for a clstered file server exceeds the clster s capabilities, yo can add additional nodes. Clstered file servers work well in the following scenarios. When mltiple sers access and change the files Becase only one copy of the file exists, Windows Server 2003 can enforce file locking so that only one ser can make changes at a time. As a reslt, data is always consistent. When large nmbers of sers access data in the same site Clstered file servers are sefl for providing access to sers in a single physical site. In this case, yo do not need a replication method to provide data consistency among sites. When files change freqently and data consistency is a mst Even with a large nmber of changes, data is always consistent and there is no need to replicate the changes to mltiple servers.
52 102 Chapter 2 Designing and Deploying File Servers When yo want to redce the administrative overhead associated with creating many shared folders On clstered file servers, yo can se the Share Sbdirectories featre to atomatically share any folders that are created within a folder that is configred as a File Share resorce. This featre is sefl if yo need to create a large nmber of shared folders. When yo want to ensre the availability of a stand-alone DFS root Creating stand-alone DFS roots on clstered file servers allows the namespaces to remain available, even if one of the nodes of the clster fails. When yo want to make encrypted files highly available Windows Server 2003 spports sing the EFS clstered file servers. Using EFS in FRS replica sets is not spported. For more information abot sing EFS on clstered file servers, see Planning Encrypted File Storage later in this chapter. Some isses to consider when sing clstered file servers inclde the following. Dynamic disks are not available If yo want to se dynamic disks, yo mst se them on nonclstered file servers or on the local storage devices of the clster. If the node hosting the local storage devices fails, the data becomes navailable ntil the node is repaired and broght back online. If yo need to extend the size of basic volmes sed for shared clster storage, yo can do so by sing DiskPart. For more information abot extending basic volmes, see Extend a basic volme in Help and Spport Center for Windows Server Clstered file servers mst se complete clster systems For yor server clsters to be spported by Microsoft, yo mst choose complete clster systems from the Windows Server Catalog for the Windows Server 2003 family. For more information abot spport for server clsters, see article Q309395, The Microsoft Spport Policy for Server Clsters and the Hardware. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at Increasing Data Availability by Using FRS To design an FRS replication strategy, yo need to take the following steps: 1. Identify data to replicate. 2. Choose the replication topology. 3. Design the replication schedle. 4. Plan the staging directory. 5. Determine connection priorities.
53 Planning File Server Availability 103 The following sections describe each of these steps. Important If yo configre FRS to replicate files on file servers rnning Windows 2000, it is highly recommended that yo install the Windows 2000 Service Pack 3 (SP3) and the post-sp3 release of Ntfrs.exe, or install later service packs that inclde this release. For more information abot pdating FRS, see article , Isses That Are Fixed in the Post-Service Pack 3 Release of Ntfrs.exe. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at For more information abot FRS secrity, see Planning DFS and FRS Secrity later in this chapter. Identifying Data to Replicate If yo identify which DFS roots and links reqire mltiple replicated targets, as described in Increasing the Availability of DFS Namespaces earlier in this chapter, yo also need to consider the following isses. Size of the USN jornal The defalt USN jornal size in Windows Server 2003 is 512 MB. If yor volme contains 400,000 files or fewer, no additional configration is reqired. For every 100,000 additional files on a volme containing FRS-replicated content, increase the pdate seqence nmber (USN) jornal by 128 MB. If files on the volme are changed or renamed freqently (regardless of whether they are part of the replica set), consider sizing the USN jornal larger than these recommendations to prevent USN jornal wraps, which can occr when large nmbers of files change so qickly that the USN jornal mst discard the oldest changes (before FRS has a chance to detect the changes) to stay within the specified size limit. To recover from a jornal wrap, yo mst perform a nonathoritative restore on the server to synchronize its files with the files on the other replica members. For more information abot USN jornal wraps, see article Q292438, Trobleshooting Jornal_Wrap Errors on Sysvol and DFS Replica Sets. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at
54 104 Chapter 2 Designing and Deploying File Servers Where to store the replica tree To provide the best consistency and minimize administrative intervention, careflly plan where to store the replica tree. Yor choice will depend on the amont of storage on the server, the volme layot, the nmber of files on the volme that do not participate in a replica set, and the nmber of replica sets on the server. If yo have a single replica tree, store it on its own volme if possible, or store it on a volme that also stores other ser data. Adjst the USN jornal size based on the total nmber of files on the volme. If yo have more replica trees than volmes, store mltiple replica trees on each volme and adjst the USN jornal size based on the total nmber of files on the volme. If yo can create a volme for each replica tree, store each replica tree on its own volme and adjst the USN jornal accordingly. The staging directory also reqires carefl placement. For more information, see Planning the Staging Directory later in this chapter. Replicated link targets to omit from the DFS namespace When yo omit a replicated link target from the namespace, yo disable referrals so that DFS does not direct clients to the link target. However, the link target still replicates with other members. Disabling DFS referrals for replica members is sefl for a nmber of scenarios. For example, yo can se sch a member for any of the following prposes: As a backp server. For example, assme yo have five servers in a replica set. Yo might make for of the servers part of the DFS namespace and se the fifth server as a backp sorce. In this scenario, DFS never refers clients to the fifth server. As a reference server. For example, yo omit (from the namespace) the server where all changes originate, ths ensring that yo can always introdce new content withot being blocked becase of open files. The reference server becomes the known good server; all other servers shold contain identical content. As a way to pdate application data. For example, yo have two replica members, ServerA and ServerB, which contain application data that is freqently pdated. Yo can disable referrals for ServerA, pdate the application data, and enable referrals to ServerA. Yo can then repeat the procedre on ServerB. In this scenario, one of the replica members is always available while the other is being pdated. To omit a replicated link target from the namespace, configre the link target within the DFS namespace and configre replication as desired by sing the Distribted File System snap-in. Then se the Enable or Disable Referral command in the Distribted File System snap-in to disable referrals to the link targets that yo want to omit from the namespace.
55 Planning File Server Availability 105 Files or folders to exclde from replication Yo can se the Distribted File System snap-in to set filters that exclde sbfolders (and their contents) or files from replication. Yo exclde sbfolders by specifying their name, and yo exclde files by sing wild cards to specify file names and extensions. By defalt, no sbfolders are exclded. The defalt file filters exclde the following files from replication: File names starting with a tilde (~) character Files with.bak or.tmp extensions Filters act as exclsion filters only for new files and folders added to a replica set. They have no effect on existing files in the replica set. For example, if yo change the existing file filter from *.tmp, *.bak to *.old, *.bak, FRS does not go throgh the replica set and exclde all files that match *.old, nor does it go throgh the replica set and begin to replicate all files that match *.tmp. After the filter change, new files matching *.old that are added to the replica set are not replicated. New files matching *.tmp that are added to the replica set are replicated. Any file in the replica set that was exclded from replication nder the old file filter (sch as Test.tmp, created when the old filter was in force) is atomatically replicated nder the new file filter only after the file is modified. Likewise, changes to any file that was not exclded from replication nder the old filter (sch as Test.old, created when the old filter was in force) contine to replicate nder the new filter, ntil yo explicitly delete the file. These rles apply in the same manner to the directory exclsion filter. If a directory is exclded, all sbdirectories and files nder that directory are also exclded. Regardless of the filters yo set, FRS always excldes the following from replication: NTFS monted drives Files encrypted by sing EFS Any reparse points except those associated with DFS namespaces. If a file has a reparse point sed for Hierarchical Storage Management (HSM) or Single Instance Store (SIS), FRS replicates the nderlying file bt not the reparse point. Files on which the temporary attribte has been set For more information abot configring filters, see the Distribted Services Gide of the Windows Server 2003 Resorce Kit (or see the Distribted Services Gide on the Web at
56 106 Chapter 2 Designing and Deploying File Servers Nmber of servers in the replica set Will yo replicate data among three servers or three hndred servers? As the nmber of servers increases, configring the topology and schedle becomes more complex, and it takes longer to replicate data to all members of the replica set. If many members exist in the replica set, and if any member can originate new data, the amont of aggregate bandwidth consmed can be very high. Also note that any server with otbond connections is a server that can potentially originate content and ths reqires carefl monitoring. Nmber of replica sets per server Althogh there is no limit to the nmber of replica sets that can be hosted on a single server, it is recommended that yo host no more than 150 replica sets on a single server to provide optimal replication performance. The optimal nmber of replica sets for servers in yor organization depends on the CPU, memory, disk inpt/otpt (I/O) throghpt, and the amont of data changed. Network bandwidth between sites Replicating data between sites that are connected with slow WAN links reqires carefl planning of the topology and schedle, becase FRS does not provide bandwidth throttling. If the sites have a high-bandwidth connection, bt bsiness-critical databases and other applications se that connection as well, schedle replication so that it does not consme bandwidth that is needed for other ses. Amont of data in the replica tree If the replica tree incldes a large amont of data, and a new member is served by a lowbandwidth link, prestage the replica tree on the new member. Prestaging a replica tree preserves secrity descriptors and object IDs and involves restoring the data to the new member withot sing the low-bandwidth link. For example, yo can restore a backp of the replica tree on the new member, or yo can place the new member in the same site as an existing member and prestage the replica tree by sing a high-bandwidth local area network (LAN) connection. For more information abot adding new replica members, see Adding a New Member to an Existing Replica Set later in this chapter. How freqently the data changes If the data that is to be replicated changes freqently, estimate the total amont of data that will be generated by each replica member over a period of time. Data that changes freqently is more difficlt to keep synchronized across mltiple servers, especially if those servers are located across WAN links. If replication latency is a concern, consider clstering instead of replication.
57 Planning File Server Availability 107 Whether yo want to se single master replication FRS is a mltimaster replication engine, which means that new content and changes to existing content can originate from any member. If yo want to limit the servers that can originate data, yo can set p single master replication in one of the following ways: Set NTFS permissions on targets to control who can pdate data in the replica tree. Configre the replication topology so that a target does not have any otbond connections. Important If yo se this method, do not directly make changes on replica members that have no otbond connections. Changes made directly on a server that has no otbond connections will not replicate, and the server replica tree will be inconsistent and potentially npredictable. Speed of recovery from hardware failres If a server contains a large amont of replicated, bsiness-critical data, be sre to se redndant server components, sch as hardware RAID, redndant disk controllers, and redndant network cards to redce the likelihood that a hardware failre cold case the server to become navailable. To frther increase availability, se mltiple servers in each site so that if a server in the site is navailable de to hardware problems, clients in that site can access the remaining servers as yo repair and restore the data on the failed server. Using mltiple servers is also sefl for remote sites where repair time is lengthy and in cases where the amont of replicated data is so large that it cannot be restored from a central site within the reqired restoration window. Expected growth of replicated data Yo need to know whether yo plan to replicate larger and larger amonts of data over time so that yo can make sre that yor topology, schedle, and bandwidth can handle the additional data. Expected increase in the nmber of replica members If yo plan to deploy a small nmber of servers at first and then deploy additional servers over time, yo need to make sre that yor topology and bandwidth can handle the new servers. For example, if yo plan to add 100 more servers, and each of those servers can originate data, yo mst make sre that yor network has the bandwidth to replicate this data. On the other hand, if yo are deploying 100 new servers, bt only one of those servers can originate data, bandwidth might not be a limiting factor, althogh yo do need to make sre that yor bandwidth can handle the initial synchronization of data among servers.
58 108 Chapter 2 Designing and Deploying File Servers Choosing a Replication Topology The replication topology describes the logical connections that FRS ses to replicate files among servers. To minimize the network bandwidth reqired for replication, identify where yor bandwidth is highest and lowest on yor network, and model yor FRS replication topology after the physical topology of yor network. Yo se the Distribted File System snap-in to select a replication topology. After yo add a second link target to a link, yo are prompted to configre replication by sing the Configre Replication Wizard, which allows yo to perform the following tasks: Choose the initial master whose contents are replicated to the other targets. The initial master is only relevant dring the creation of the replica set. After that, the server that acted as the initial master is treated no differently from any other server. Choose the location of the staging directory. By defalt, the staging directory is placed on a different volme than the content to be replicated. Choose the replication topology: ring, hb and spoke, fll mesh, or cstom. If yo choose cstom, yo can add or delete connections to or from the replica set. For the other three standard topologies, yo can only enable or disable connections between target servers. The following describes the for topology types available in the Distribted File System snap-in. For an Excel spreadsheet to assist yo in docmenting yor decision after yo choose the topology, see FRS Configration Worksheet (Sdcfsv_2.xls) on the Windows Server 2003 Deployment Kit companion CD (or see FRS Configration Worksheet on the Web at Ring topology Figre 2.10 illstrates a ring topology. In a ring topology, files replicate from one server to another in a circlar configration, with each server connected to the servers on either side of it in the ring. Choose a ring topology if yor physical network topology resembles a ring topology. For example, if each server is located in a different site and has existing connectivity with neighboring servers, yo can choose the ring topology so that each server connects only to neighboring servers. Becase the ring topology is bidirectional, each connection is falt tolerant. If a single connection or server fails, data can still replicate to all members in the opposite direction.
59 Planning File Server Availability 109 Figre 2.10 Ring Topology Server Server Server Server Server If yo plan to create a ring topology with more than seven members, consider adding shortct connections between some of the members to redce the nmber of hops reqired for data to replicate to all members. Hb and spoke topology Figre 2.11 illstrates hb and spoke topology. In a hb and spoke topology, yo designate one server as the hb. Other servers, called spokes, connect to the hb. This topology is typically sed for WANs that consist of faster network connections between major compting hbs and slower links connecting branch offices. In this topology, files replicate from the hb server to the spoke servers and vice versa, bt files do not replicate directly between two spoke servers. When yo choose this topology, yo mst choose which server will act as the hb. If yo want to set p mltiple hbs, se a cstom topology. Using mltiple hbs is recommended, becase sing only one hb means that the hb is a single point of failre. Figre 2.11 Hb and Spoke Topology Hb Server Server Server Server Server
60 110 Chapter 2 Designing and Deploying File Servers Fll mesh topology Figre 2.12 illstrates a fll mesh topology. In a fll mesh topology, every server connects to every other server. A file created on one server replicates directly to all other servers. Becase each member connects to every other member, the propagation of change orders for replicating files can impose a heavy brden on the network. To redce nnecessary traffic, se a different topology or delete connections yo do not actally need. A fll mesh topology is not recommended for replica sets with five or more members. Figre 2.12 Fll Mesh Topology Server Server Server Server Cstom topology With a cstom topology, yo create the connections between the servers yorself. One example of a cstom topology is a redndant hb and spoke topology. In this configration, a hb site might contain two file servers that are connected by a high-speed link. Each of these two hb servers might connect with for branch file servers in a hb and spoke arrangement. An example of this topology is shown in Example: An Organization Designs a Replication Strategy later in this chapter. Figre 2.13 illstrates another type of hb and spoke topology known as a mltitier redndant hb and spoke with an optional staging server sed for introdcing changes into the replica set.
61 Planning File Server Availability 111 Figre 2.13 Mltitier Redndant Hb and Spoke Topology Server Server Server Server Servers Servers Servers Designing a Replication Schedle When yo se the Distribted File System snap-in to configre replication, FRS schedles replication to take place 24 hors a day, seven days a week. Whenever yo copy a file to a target that participates in replication, or when an existing file in the replica set is changed, FRS replicates the entire file to the other targets sing the connections specified in the replication topology. Continos replication is advised only for environments that meet the following criteria: The replica members are all connected by high-bandwidth connections, sch as hb servers in a redndant hb and spoke topology. The amont of data to be replicated is not so large that it interferes with the bandwidth reqired for other prposes dring peak or off-peak hors. The application whose data is being replicated needs rapid distribtion of file changes, sch as antivirs signatre files or login scripts.
62 112 Chapter 2 Designing and Deploying File Servers If yor environment does not meet these criteria, plan to create a replication schedle so that data is replicated at night or dring other times as appropriate. A replication schedle involves enabling and disabling replication so that it occrs at specified times on specified days. For example, yo might schedle replication to occr beginning at 12:00 midnight and ending at 2:00 A.M. every day. When determining the replication schedle, consider the following isses: Amont of data to be replicated and the length of the replication window Estimate the amont of data to be replicated so that yo can choose a dration that is long enogh to replicate all the data. In DFS namespaces, replication stops when the schedle window closes, and any remaining files are delayed ntil the next replication window opens. If yo occasionally pt a large amont of data into the replica set, FRS might take several replication periods to replicate all the data. Amont of latency yor organization can tolerate If yo plan to replicate data that changes freqently, consider the amont of latency that yo can tolerate in keeping yor targets synchronized and the amont of bandwidth that is consmed dring replication. Whether yo want to stagger schedles If yo are sing a redndant hb and spoke topology with several hbs, yo can split the replication load among the hbs by staggering the schedle. An example of this schedle is described in Example: An Organization Designs a Replication Strategy later in this chapter. For an Excel spreadsheet to assist yo in docmenting the replication schedle, see FRS Configration Worksheet (Sdcfsv_2.xls) on the Windows Server 2003 Deployment Kit companion CD (or see FRS Configration Worksheet on the Web at Planning the Staging Directory The staging directory acts as a bffer by retaining copies of pdated files ntil replication partners sccessflly receive them and move them into the target directory. The following sections describe the benefits and design considerations for staging directories. For an Excel spreadsheet to assist yo in docmenting the staging directory settings and location, see FRS Configration Worksheet (Sdcfsv_2.xls) on the Windows Server 2003 Deployment Kit companion CD (or see FRS Configration Worksheet on the Web at
63 Planning File Server Availability 113 Why FRS Uses a Staging Directory The staging directory acts as a qee for changes to be replicated to downstream partners. After the changes are made to a file and the file is closed, the file content is compressed, written to the staging directory, and replicated according to schedle. Any frther se of that file does not prevent FRS from replicating the staging file to other members. In addition, if the file is replicated to mltiple downstream partners or to members with slow data links, sing a staging file ensres that the nderlying file in the replica tree can still be accessed. Note Staging Directory Size A new or pdated file remains in the staging directory of a replica member with downstream partners even after the file has replicated to all members. The file is retained for seven days in order to optimize ftre synchronizations with new downstream partners. After seven days, FRS deletes the file. Do not attempt to delete any files in the staging directory yorself. The size of the staging directory governs the maximm amont of disk space that FRS can se to hold those staging files and the maximm file size that FRS can replicate. The defalt size of the staging directory is approximately 660 MB, the minimm size is 10 MB, and the maximm size is 2 TB. The largest file that FRS can replicate is determined by the staging directory size on both the pstream partner (the replica member that sends ot the changed file) and downstream partners (the replica member that receives the changed file) and whether the replicated file, to the extent that it can be compressed, can be accommodated by the crrent staging directory size. Therefore, the largest file that FRS can replicate is 2 TB, assming that the staging directory size is set to the maximm on pstream and downstream partners.
64 114 Chapter 2 Designing and Deploying File Servers Managing Staging Directory Capacity When FRS tries to allocate space for a staging file and is not sccessfl, either becase there is not enogh physical disk space or becase the size of the files in the staging directory has reached 90 percent of the staging directory size, FRS starts to remove files from the staging directory. Staged files are removed (in the order of the longest time since the last access) ntil the size of the staging directory has dropped below 60 percent of the staging directory limit. Additionally, staging files for downstream partners that have been inaccessible for more than seven days are deleted. As a reslt, FRS does not stop replicating if the staging directory rns ot of free space. This means that if a downstream partner goes offline for an extended period of time, the offline member does not case the pstream partner s staging directory to fill with accmlated staging files. Note In Windows Server 2003, FRS detects and sppresses excessive replication that cold be cased when yo se Grop Policy to overwrite file permissions or when yo se antivirs software that overwrites secrity descriptors. In these examples, writes to files case no net content changes. When FRS detects a significant increase in the nmber of changes made to a file, FRS logs an event with ID in the File Replication Service event log. Despite the FRS response to excessive replication cased by applications, services, or secrity policies, yo shold investigate the sorce of the excessive replication and eliminate it. The fact that FRS removes files from the staging directory does not mean that the nderlying file is deleted or will not be replicated. The change order in the otbond log still exists, and the file will eventally be sent to downstream partners when they process the change order. However, before replication can take place, the pstream partner mst recreate the file in the staging directory, which can affect performance. Recreating the staging file can also case a replication delay if the file on the pstream partner is in se, preventing FRS from creating the staging file. A staging directory can reach 90 percent of its capacity in the following sitations: More data is being replicated than the staging directory can hold. If yo plan to replicate more than 660 MB of data, or if yo expect that the largest file to replicate will be 660 MB or larger, yo mst increase the size of the staging directory. Use Table 2.7 for sizing gidelines. A slow otbond partner. Constrct replica connections that have comparable bandwidth for all otbond partners. It is also a good idea to balance that bandwidth for inbond and otbond connections. If yo cannot balance the bandwidth, increase the size of the staging directory. Replication is disabled. If a file is changed or added to the replica set while replication is disabled, the staging directory mst be large enogh to hold data awaiting replication dring the off-time or else older staged files are removed. Replication still occrs, bt less optimally.
65 Planning File Server Availability 115 Table 2.7 describes a range of sizing gidelines for staging directories. Use the nmbers in Table 1.7 as a baseline for testing and then adjst the nmbers as necessary for yor environment. Also, note that the nmbers in Table 1.7 apply to each replica set on a server. If a server contains mltiple replica sets, yo mst follow these gidelines for each staging directory. Table 2.7 Staging Directory Size Gidelines per Replica Set Scenario Minimm Acceptable Best Performance Adding a new replica member Whichever is larger: 660 MB Take the size of the 128 largest files in the replica tree, mltiplied by the nmber of downstream partners, and then mltiply that nmber by 1.2. Whichever is larger: 660 MB Take the size of the 128 largest files in the replica tree, mltiplied by the nmber of downstream partners, and then mltiply that nmber by 1.2. Whichever is larger: 660 MB Take the size of the 128 largest files in the replica tree, mltiplied by the nmber of downstream partners, and then mltiply that nmber by 1.2. Increasing the staging directory space to accont for backlog cased by replication schedles No additional reqirement Add space eqal to the maximm qantity of expected file changes in a seven-day period mltiplied by 1.2. Add space eqal to the expected size of the replica tree, mltiplied by 1.2. Additional recommendations No additional recommendations Use dedicated disks for the staging directory. Use dedicated, highperformance disks for the staging directory. Sitability for large replica sets Not recommended Recommended Recommended for organizations that reqire highest performance. Note The recommendations in Table 2.7 offer sfficient staging directory space for a worst-case scenario. In fact, the staging directory needs to be only as large as the largest 128 files, mltiplied by the nmber of downstream partners that are concrrently performing a fll synchronization against the replica member. For more information abot configring the staging directory, see article Q329491, Configring Correct Staging Area Space for Replica Sets. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at For information abot changing the size of the staging directory, see Deploying FRS later in this chapter.
66 116 Chapter 2 Designing and Deploying File Servers Staging Directory Compression Considerations FRS replica members rnning Windows 2000 Server with Service Pack 3 (SP3) or Windows Server 2003 compress the files replicated among them. Compression redces the size of files in the staging directory on the pstream partners, over the network between compression-enabled partners, and in the staging directory of downstream partners prior to files being moved into their final location. To maintain backward compatibility, servers rnning Windows 2000 Server with SP3 or Windows Server 2003 generate ncompressed staging files when they send changed files to downstream partners rnning Windows 2000 Server with Service Pack 2 (SP2) or earlier (or to servers rnning Windows 2000 Server with SP3 or Windows Server 2003 that have compression explicitly disabled in the registry). To accommodate environments that contain a combination of compression-enabled and compression-disabled partners, the server originating or forwarding changes mst generate two sets of staging files for each modified file or folder: one compressed version for servers rnning Windows 2000 Server with SP3 or Windows Server 2003, and one ncompressed version for partners that have compression explicitly disabled or that are rnning Windows 2000 Server with SP2 or earlier. To mitigate the generation of two sets of staging files, yo can take one of the following steps: Confirm that yo have sfficient disk space and an appropriately sized staging directory on all replica members. Explicitly disable compression in the registry ntil all members of the replica set are rnning Windows 2000 Server with SP3 or Windows Server For information abot disabling replication, see article Q288160, Error Message: Error Compressing Data, in the Microsoft Knowledge Base. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at Rapidly deploy Windows 2000 Server with SP3 or Windows Server 2003 on all members of the replica set, especially if yo are replicating a large amont of content. Choosing the Staging Directory Location Yo can choose the location of the staging directory when yo se the Distribted File System snap-in to configre a replica set. By defalt, all replica sets on the server se the same staging directory, and the staging directory space limit applies to all staging directories on the local server. When the staging directory is shared among mltiple replica sets, any one replica set can case the staging directory to reach 90% capacity, at which point FRS begins to delete the oldest staging files for any of the replica sets.
67 Planning File Server Availability 117 To simplify staging directory management and any ftre recovery procedres, it is recommended that yo configre replica sets in one of the following ways: Give each replica set its own staging directory, and place the staging directories on the same volme. This soltion provides good recoverability while minimizing cost. Give each replica set its own staging directory, and pt each staging directory on its own volme. This soltion provides better recoverability, bt at a higher cost. Do not store the staging directory on a volme where NTFS disk qotas are enabled. Improving FRS Performance To distribte disk traffic, store the staging directory, FRS logs, the FRS jet database (Ntfrs.jdb), and replica trees on separate disks. Using separate disks for the log files is especially important when yo configre FRS logging by sing a high severity level. For the best replication performance, distribte disk I/O by placing the FRS logs and the staging directory on separate disks from that of the operating system and the disks containing the replica tree. In a hb and spoke topology, sing separate disks is especially recommended for the hb servers. Important If yo store the FRS jet database on a disk that has its write cache enabled, FRS might not recover if power to the drive is interrpted and critical pdates are lost. Windows Server 2003 warns yo abot this by adding an entry with Event in the File Replication Service event log. To leave write caching enabled for improved performance and to ensre the integrity of the FRS jet database, se an ninterrpted power spply (UPS) or a disk controller and cache with a battery backp. Otherwise, disable write caching ntil yo can install a backp power spply. When moving the FRS logs and FRS jet database, be sre that NTFS disk qotas are disabled on the target volme. For more information abot moving the FRS logs and FRS jet database, see article Q221093, HOW TO: Relocate the NTFRS Jet Database and Log Files, in the Microsoft Knowledge Base. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at Determine Connection Priorities Connection priorities control the seqencing of the initial synchronization that occrs when yo add a new member to a replica set or when yo perform a nonathoritative restore. By changing connection priorities, yo can control which inbond partners go first based on resorce considerations. (A server s inbond partners, also known as pstream partners, are those servers from which the new or recovered member can receive replicated content.) For example, yo can specify that a new member first synchronize with a partner: Across a high-bandwidth network connection. That has low server activity. That has the most p-to-date files.
68 118 Chapter 2 Designing and Deploying File Servers Yo configre connection priorities by sing the three priority levels in the Distribted File System snap-in: High. All connections marked High mst sccessflly synchronize before FRS attempts to synchronize medim-priority connections. Medim. At least one medim-priority connection mst sccessflly complete an initial synchronization before FRS attempts to synchronize any low-priority connections. FRS attempts to synchronize all connections in the medim-priority level, bt only one mst be sccessfl before FRS attempts to synchronize low-priority connections. Low. The defalt connection priority is low. For these connections, FRS attempts to synchronize one time, bt any failre does not delay other synchronization attempts. If no medim- or high-priority connections exist, at least one low-priority connection mst scceed before FRS considers the initial synchronization operation complete. If medim- or high-priority connections exist, none of the connections in the low-priority class needs to scceed for FRS to consider the initial synchronization operation complete. When evalating yor topology to determine connection priority, identify the following details for each replica member: All inbond connections The speed of those connections Based on this data, determine which connection priority to assign to each inbond connection. The following gidelines will assist yo in choosing the appropriate connection priority: Use medim priority or high priority only for high-bandwidth connections. Important Connection priorities are sed for initial synchronizations only on cstom topologies. If yo se a ring, hb and spoke, or fll mesh topology, connection priorities are sed only on reinitialization dring a nonathoritative restore operation. If yo plan to create a high-priority connection, note that if this connection fails, no other synchronization takes place for lower-priority partners ntil all high-priority connections have scceeded. Use low priority for low-bandwidth or nreliable connections. Note Keep in mind that after the initial synchronization, connection priorities are ignored ntil yo need to perform a nonathoritative restore to recover a failed replica member.
69 Planning File Server Availability 119 For an Excel spreadsheet to assist yo in docmenting connection priorities, see FRS Configration Worksheet (Sdcfsv_2.xls) on the Windows Server 2003 Deployment Kit companion CD (or see FRS Configration Worksheet on the Web at Figre 2.14 illstrates an organization s planned topology. The letters A throgh C represent inbond connections. The hb servers are connected by a high-bandwidth network connection, and two of the hb servers connect with branch servers by sing low-bandwidth network connections. Figre 2.14 Sample FRS Topology Hb 1 Hb servers with high-speed connections Hb 2 Hb 3 Branch servers with low-speed connections to the hb Branch 1 Branch 2 Branch 3 Branch 4
70 120 Chapter 2 Designing and Deploying File Servers In this topology, the administrator assigns connection priorities as follows: A connections se medim priority becase the hbs are connected by high-bandwidth connections and the hb servers are expected to be p to date. B and C connections se low priority becase the branch servers connect to the hbs across a low-bandwidth network. When the hb servers in this example are deployed, Hb1 will be the initial master. Becase the A connections are marked as medim priority, the two other hb servers will not attempt replication with the branch servers ntil initial replication completes with at least one other hb server. The administrator specifies connections B and C as low priority becase the branch servers have low-bandwidth network connections. In the event of a nonathoritative restore for any of the hbs, sing low priority cases the repaired hb server to replicate first from other hbs before replicating with the branch servers. Note To increase the availability of data, the administrator can place mltiple servers in each branch. If the servers in the branch se high-bandwidth connections to each other, the administrator can set medim priority for those inbond connections. That way, if one of the branch servers fails and is later restored, it will first attempt to replicate with a local branch server before replicating from the hb server across a slow network connection. Example: An Organization Designs a Replication Strategy An organization ses Grop Policy to distribte 10 GB of software to sers in for sites. The software changes nightly, and it is important that clients have access to these pdates the following day. To make the software files and pdates highly available, the organization creates a domain-based DFS namespace for each branch and then ses the Distribted File System snap-in to configre replication. To make the pdated software available even if a hb server is offline, the organization ses redndant hb servers that are connected by high-speed LAN links. The organization also ses staggered replication schedles to distribte the load between the hb servers. Figre 2.15 describes the FRS topology.
71 Planning File Server Availability 121 Figre 2.15 Redndant Hb and Spoke Topology for Software Distribtion to Branch Offices High-speed connection. Replication is enabled at all times. Hb 1 Hb 2 Branch 1 Branch 2 Branch 3 Branch 4 Key Replica set on Branch 1, Hb 1, and Hb 2 Replica set on Branch 2, Hb 1, and Hb 2 Replica set on Branch 3, Hb 1, and Hb 2 Replica set on Branch 4, Hb 1, and Hb 2 Each of these connections represents a slow WAN connection to the hb servers.
72 122 Chapter 2 Designing and Deploying File Servers The organization ses a separate namespace for each branch so that if the local branch server is not available, the clients transparently access one of the hbs instead of another branch server. The organization enables the least-expensive target selection featre of DFS so that the clients always choose the local branch server when it is available. In this scenario, the organization configres replication as follows: Each branch has its own replica set, and each replica set contains three members: the branch and the two hbs. Replication between the hbs is enabled at all times, so changes at one hb are immediately replicated to the other hb. Inbond connections between the hb servers are medim priority; all other inbond connections are low priority. Odd-nmbered branches replicate with Hb1 from 6:00 P.M. ntil 7:30 P.M. and with Hb2 from 8:00 P.M. ntil 9:30 P.M. Even-nmbered branches replicate with Hb2 from 6:00 P.M. ntil 7:30 P.M. and with Hb1 from 8:00 P.M. ntil 9:30 P.M. As shown in Figre 2.15, all software pdates originate at the hb servers and are replicated to the branch servers on a staggered schedle. If replication completes when the branch is connected to its primary hb, no replication takes place when the branch connects to its alternate hb, becase the data will have already replicated between the hbs. Similarly, if one of the hb servers fails or is taken offline for maintenance, the branch servers replicate with the remaining hb, and when the offline hb is broght back online, the two hbs replicate immediately to synchronize their data. Becase of the large amont (10 GB) of software files, the organization prestages new branch servers by restoring the software files to the new branch servers while they are located at the staging site. The organization then transports the new branch servers to the branch sites for deployment. By prestaging the software files, the organization does not need to replicate the initial 10 GB of files across the network. For more information abot prestaging replica sets, see Adding a New Member to an Existing Replica Set later in this chapter. Increasing Data Availability by Using Clstering The information presented in this section assmes an nderstanding of basic clster terminology. If yo are not familiar with clstering, yo can refer to a nmber of sorces for frther information: For general information on server clsters, inclding terminology, procedres, checklists, and best practices, see Help and Spport Center for Windows Server For information on designing server clsters, see Designing and Deploying Server Clsters in this book.
73 Planning File Server Availability 123 Yo can se clstered file servers to make sre that sers can access bsiness-critical data, sch as home directories and software distribtion shares. Yo can also se clstered servers to consolidate mltiple nonclstered file servers onto a clstered file server. Each server is then recreated on the clster as a virtal server. Important Becase mltiple network names might belong to the same server, File Share resorces might appear nder these names and might also be accessible throgh them. To avoid client connectivity interrptions, make sre that clients se the network name that is associated with the grop in which the File Share resorce belongs. For more information abot sing the proper network name, see article Q170762, Clster Shares Appear in Browse List Under Other Names in the Microsoft Knowledge Base. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at Choosing Virtal Server Names If yo are migrating nonclstered file servers to clstered file servers, and yo do not crrently se (or plan to se) DFS, yo shold se the IP address and network name of each migrated server to create an identical virtal server on the clstered file server. Doing so allows sers to contine to access data by sing the server names that they are familiar with. Yo also ensre that links and shortcts contine to work as they did before the migration. Choosing the File Share Resorce Type A clstered file server ses the File Share resorce type to make data available to sers. Yo have three options when configring this resorce type: Normal share Normal shares fnction similarly to shared folders created on nonclstered file servers, except that yo se the Clster Administrator snap-in to create them. When yo create a normal share, yo pblish a single folder to the network nder a single name. Normal shares do not have reqired dependencies; however, if the normal share is located on clster storage, the normal shares shold, at a minimm, have dependencies on the clster storage device (the Physical Disk or other storage-class resorce), with the preferential addition of dependencies on the network name and IP address. Yo can create a maximm of 1,674 resorces, inclding File Share resorces, on a clster. To provide good failover performance, do not approach this limit in prodction environments. In addition, if yo need to create a large nmber of normal shares, it is better to se the Share Sbdirectories option.
74 124 Chapter 2 Designing and Deploying File Servers Share sbdirectories (or hide sbdirectories) A share sbdirectories share pblishes several network names: one each for a folder and all of its immediate sbfolders. For example, if yo create a share sbdirectories share called Users, any folder yo add to the Users folder is atomatically shared. Important When sharing sbdirectories, do not se the same name for sbfolders nder different folders (for example, \folder1\name1 and \folder2\name1). The first shared sbdirectory to come online will remain online, bt the second shared sbdirectory will not be initialized and will not come online. Share sbdirectories offer a nmber of advantages: They do not reqire yo to create a File Share resorce for every folder. As a reslt, yo redce the potential time and CPU load needed to detect failres. They are an efficient way to create large nmbers of related file shares on a single file server. For example, yo can se this method to create a home directory for each ser who has files on the server, and yo can hide the sbdirectory shares to prevent sers from seeing the sbdirectory shares when they browse the network. They allow administrators who are not experienced with server clsters or sing the Clster Administrator snap-in to easily create folders that are atomatically shared. When sing the share sbdirectories featre, determine the nmber of file shares yo plan to host on the clster, becase the nmber of file shares affects server clster capacity planning and failover policies. Specifically, yo need to determine the following: The nmber of nodes yo plan to have in the server clster The nmber of node failres yo want the server clster to withstand while still providing acceptable performance Whether the remaining nodes can handle the load of the failed nodes
75 Planning File Server Availability 125 The nmber of nodes is important becase a single node can spport a limited nmber of file shares, which varies according to the amont of RAM in the server and which is described in Reviewing File Server Limits later in this chapter. If yo want the clster to be able to srvive the loss of all bt one node, make sre that the clster hosts no more than the maximm nmber of file shares that can be hosted by a single node. This is especially important for two-node clsters, where the failre of one node leaves the single remaining node to pick p all the file shares. In a for-node or eight-node clster, yo have other options that might be more appropriate, depending on the failre scenarios that yo want to protect against. For example, if yo want a for-node clster to srvive one node failing at any point, yo can configre the file shares so that if one node fails, its file shares are spread across the remaining three nodes. In this scenario, each node can be loaded to 66 percent of the maximm nmber of file shares and still be within the maximm limit of a single node in the event of a single failre. In this case, the clster can host three times the nmber of file shares that a single server can host. If yo want to srvive two nodes failing, a for-node clster can hold twice as many files shares (becase if two nodes fail, the remaining two nodes pick p the load from the two failed servers) and so on. For more information abot server clster capacity planning and failover policies, see Designing and Deploying Server Clsters in this book. Note For more information abot sing the Share Sbdirectories option to create home directories, see article Q256926, Implementing Home Folders on a Server Clster, in the Microsoft Knowledge Base. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at
76 126 Chapter 2 Designing and Deploying File Servers DFS root Yo can se the File Share resorce type to create a resorce that manages a stand-alone DFS root on a clster. The DFS root File Share resorce has reqired dependencies on a network name, which can be either the clster name or any other network name for a virtal server. However, it is recommended that yo do not se the clster name (in the Clster grop) for any resorces. The Clster service manages a resorce grop as a single nit of failover. Therefore, if yo want for DFS roots to fail over independently, create them in different grops. Each grop has a network name or the virtal server name with which the root is associated. When creating a DFS root in clstered file servers, review the following isses: The name that yo specify for one DFS root cannot overlap with the names for the other DFS roots in the same clster. For example, if yo name one DFS share C:\Dfsroots\Root1, yo cannot create other roots sing names that are derived from the first DFS root, sch as C:\Dfsroots or C:\Dfsroots\Root1\Root2, and so forth. On server clsters, do not create clstered DFS roots that have the same name as nonclstered DFS roots or shared folders. Clstered file servers rnning Windows Server 2003, Enterprise Edition and Windows Server 2003, Datacenter Edition spport mltiple stand-alone DFS roots. These DFS roots can exist in mltiple resorce grops, and each grop can be hosted on a different node. Clstered file servers rnning Microsoft Windows 2000 Advanced Server or Windows 2000 Datacenter Server spport one DFS root per server. Mixed-version clsters rnning Windows Server 2003, Enterprise Edition or Windows Server 2003, Datacenter Edition on some nodes and Windows 2000 on others only spport one DFS root per clster as well. For more information abot mixed-version clsters and rolling pgrades, see Deploying Clstered File Servers later in this chapter. Cation Do not make DFS configration changes (for example, creating new roots, adding new links, new link targets, and so on) while operating a mixedversion clster, becase all DFS changes are lost pon failover. For more information abot creating DFS roots on a clstered file server, see article Q301588, HOW TO: Use DFS on a Server Clster to Maintain a Single Namespace, in the Microsoft Knowledge Base. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at
77 Planning File Server Availability 127 Using Shadow Copies on Server Clsters Windows Server 2003 spports creating shadow copies on clster storage. Shadow copies are point-in-time copies of files that are stored on file servers rnning Windows Server By enabling shadow copies, yo can redce the administrative brden of restoring previosly backed-p files for sers who accidentally delete or overwrite important files. If yo plan to enable shadow copies on a server clster, review the following isses: Clster-managed shadow copies can be created only on clster storage with a Physical Disk resorce. In a clster withot clster storage, shadow copies can be created and managed only locally. The recrring schedled task that generates volme shadow copies mst rn on the same node that crrently owns the storage volme (where the shadow copies are stored). The clster resorce that manages the schedled task mst be able to fail over with the Physical Disk resorce that manages the storage volme. If yo place the sorce volme (where the ser files are stored) and the storage volme (where the shadow copies are stored) on separate disks, those disks mst be in the same resorce grop. When yo configre shadow copies sing the procedre described in Enable Shadow Copies of Shared Folders in a clster in Help and Spport Center for Windows Server 2003, the resorces and dependencies are set p atomatically. Do not attempt to modify or delete these resorces and dependencies directly. To ensre availability, plan to enable shadow copies before yo deploy the server clster. Do not enable shadow copies in a deployed clster. When yo enable shadow copies, the shadow copy volmes (as well as all resorces that directly or indirectly depend on the disk) go offline for a brief period while the resorce dependencies are created. The shadow copy volmes are not accessible to applications and sers while they are offline. Note If yo enable shadow copies before clstering yor servers, yo mst disable, and then re-enable, shadow copies. If yo clster a disk containing a previosly created shadow copy, the shadow copy might stop fnctioning after that disk s Physical Disk resorce fails over. For additional gidelines and information abot shadow copies, see Designing a Shadow Copy Strategy later in this chapter. For in-depth information abot sing shadow copies on server clsters, see Using Shadow Copies of Shared Folders in a server clster in Help and Spport Center for Windows Server 2003.
78 128 Chapter 2 Designing and Deploying File Servers Example: An Organization Designs a Clstered File Server A large organization ses centralized file servers to store home directories for 3,000 sers. The organization has an existing SLA that specifies its file servers mst be percent available, which means that the file servers can be offline no more than 53 mintes a year. To meet this level of availability, the organization implements clstered file servers in its data center, sing a storage area network (SAN) for storage. After evalating storage and performance reqirements, the organization determines that it needs one file server per 1,000 sers, for a total of three file servers. The organization cold implement a three-node clster, bt it decides to implement a for-node clster instead. It will se three nodes to provide access to ser directories and the forth node to perform the following fnctions: Host a stand-alone DFS namespace to provide a nified view of the ser directories on the remaining three nodes. Perform backps of the other three nodes in the evenings. Take over the resorces of another node if the node fails or is taken offline for maintenance. Figre 2.16 illstrates how the organization designs its for-node clster. Figre 2.16 For-Node Clster Shared clster storage on storage area network Fiber channel switches Node 1 Virtal server name: \\Users1 File Share resorce: \\Users1\sers Nmber of share sbdirectories: 333 Node 3 Virtal server name: \\Users3 File Share resorce: \\Users3\sers Nmber of share sbdirectories: 334 Node 2 Virtal server name: \\Users2 File Share resorce: \\Users2\sers Nmber of share sbdirectories: 333 Node 4 Virtal server name: \\Home Roles: Used to perform backps and host stand-alone namespace \\Home\Folders
79 Planning File Server Availability 129 To create the ser directories, the administrator creates a File Share resorce on three nodes and specifies the Share Sbdirectories option. The administrator places each File Share resorce in a virtal server (a resorce grop containing IP address and Network Name resorces) and sets p dependencies between the File Share resorce and the Network Name resorce. The administrator then ses a script to qickly create the ser directories, which are atomatically shared after creation, and to set appropriate permissions for each ser directory. The administrator creates another File Share resorce on the forth node and specifies the DFS root option and then ses the Distribted File System snap-in to create a link to each ser directory. Users can access their shares by sing the DFS path \\Home\Folders\Username. Logon scripts also map ser shares to each ser s U: drive. Note If the organization needs to provide access to ser data when the complete site fails, de either to a total loss of power as a reslt of a natral disaster or another event, the organization can implement a geographically dispersed clster. For more information abot designing server clsters, inclding capacity planning, failover policies, and geographically dispersed clsters, see Designing and Deploying Server Clsters in this book.
80 130 Chapter 2 Designing and Deploying File Servers Designing a Standard File Server Configration To maximize the reliability, availability, and performance of file servers, design one or more standard hardware and software configrations for file servers in yor organization. Using a standard configration for file servers provides a nmber of benefits: Yo experience less complexity managing and maintaining the hardware. Instead of learning to perform hardware tasks on mltiple types of file servers, yo need only to learn the task once. Yo redce the amont of testing that mst be done when pdating drivers or applications on the file server. Instead of testing the fixes on mltiple hardware configrations, yo can test the pdates on one file server and then deploy the pdates to the other file servers. Yo can keep fewer spares on-site. For example, if yo se the same type of hard disks in all file servers, yo need fewer spare disks, redcing the cost and complexity of providing spares. Yo redce the nmber of disk images or answer files yo need to maintain, which is sefl if yo are sing atomated installation technologies, sch as nattended installation or Remote Installation Services (RIS), to deploy yor file servers. Important If yo have read Planning File Server Availability earlier in this chapter and yo have decided to implement clstered file servers, review the chapter Designing and Deploying Server Clsters in this book for important gidelines on choosing and configring clster hardware and storage.
81 Designing a Standard File Server Configration 131 Figre 2.17 otlines the process for designing a standard file server configration. Figre 2.17 Designing a Standard File Server Configration Identify file services goals Evalate existing hardware Design DFS namespaces Choose the file server type Plan file server availability Design a standard file server configration Plan file server secrity Deploy file servers Review file server limits Determine RAM and CPU specifications Determine storage specifications Determine the nmber of file servers Determine the file server hardware lifecycle Design a shadow copy strategy Design a disk qota strategy
82 132 Chapter 2 Designing and Deploying File Servers Evalating Existing Hardware When yo evalate yor existing hardware, yo mst determine if the hardware meets the recommended hardware reqirements for Windows Server 2003 and verify that the hardware is listed in the Windows Server Catalog for Windows Server If yor hardware does not meet these reqirements, yo might need to acqire new hardware or pgrade yor existing hardware. Yor organization might also have existing standards in place that specify the standard configration for file servers. If so, make sre that yor file servers meet those reqirements as well. Reviewing the Recommended Hardware Reqirements and the Windows Server Catalog Microsoft recommends that file servers rnning Windows Server 2003 shold meet the hardware reqirements listed in Table 2.8. Table 2.8 Recommended Hardware Reqirements for Windows Server 2003 Operating System CPU RAM Windows Server 2003, Standard Edition Windows Server 2003, Enterprise Edition Windows Server 2003, Datacenter Edition 550 MHz 256 MB 550 MHz 256 MB 550 MHz* 512 MB minimm *For servers on which yo are pgrading from Windows 2000 Datacenter Server, the minimm processor speed is 400 MHz. The section Determining RAM and CPU Specifications later in this chapter provides specific gidelines for how increasing CPU and RAM can improve file server performance. If the server provides additional services or acts as a domain controller, the server mst meet higher reqirements than those listed here. For more information abot hardware reqirements for domain controllers, see Planning Domain Controller Capacity in Designing and Deploying Directory and Secrity Services of this kit. In addition to verifying that yor hardware meets the recommended reqirements for file servers, verify that all hardware devices on the file server are listed in the Windows Server Catalog. Only Designed for Windows Server 2003 hardware is inclded in the Windows Server Catalog, which means that the hardware is designed to take advantage of new featres in Windows Server For more information abot hardware reqirements for server clsters, see Designing and Deploying Server Clsters in this book.
83 Designing a Standard File Server Configration 133 Before yo install Windows Server 2003, yo can rn a hardware and software compatibility check by rnning the Windows Upgrade Advisor from the Windows Server 2003 operating system CD. The compatibility check does not reqire yo to actally begin an installation. To rn the check, insert the Windows Server 2003 operating system CD in the CD-ROM drive and, when a display appears, follow the prompts for checking system compatibility. Yo will be offered the option to download the latest Setp files (by sing Dynamic Update) when yo rn the check. If yo have Internet connectivity, it is recommended that yo allow the download. Another way to rn the Windows Upgrade Advisor is to insert the Windows Server 2003 operating system CD in the CD-ROM drive, open a command prompt, and type: d:\i386\winnt32 /checkpgradeonly In this example, d represents the CD-ROM drive. For more information abot hardware and software compatibility, see the following resorces: To download the Windows Upgrade Advisor, see the Windows Upgrade Advisor link on the Web Resorces page at For more information abot hardware compatibility, see the Windows Server Catalog link on the Web Resorces page at For more information abot application compatibility, see Planning and Testing for Application Deployment in Planning, Testing, and Piloting Deployment Projects of this kit. Verifying That Mass Storage Controllers Are Spported If yor file servers se a mass storage controller (sch as a SCSI, RAID, or Fibre Channel adapter) for disks, confirm that it is compatible with prodcts in the Windows Server 2003 family. If yor controller is compatible with prodcts in the Windows Server 2003, bt yo are aware that the manfactrer has spplied a separate driver file for se with yor operating system, obtain the file (on a floppy disk) before yo begin Setp. Dring the early part of Setp, a line at the bottom of the screen prompts yo to press F6. Frther prompts gide yo in spplying the driver file to Setp so that it can gain access to the mass storage controller. If yo are not sre whether yo mst obtain a separate driver file from the manfactrer of yor mass storage controller, yo can try rnning Setp. If the controller is not spported by the driver files on the Windows Server 2003 operating system CD, and it therefore reqires a driver file spplied by the hardware manfactrer, Setp stops and displays a message saying that no disk devices can be fond, or it displays an incomplete list of controllers. After yo obtain the necessary driver file, restart Setp, and press F6 when prompted. Verifying That Yor Hardware Meets Yor Reqirements If yor organization has a standard configration for file servers, verify that yor existing file servers meet these reqirements. If they do, proceed to Planning File Server Secrity later in this chapter. If yor organization plans to pdate its standard file server configration, contine to Choosing the File Server Type.
84 134 Chapter 2 Designing and Deploying File Servers Identifying Servers to Use as Windows Server 2003 File Servers Identify the file servers on which yo plan to rn Windows Server 2003, as well as the servers that yo plan to decommission as a reslt of consolidation or failre to meet hardware reqirements. Choosing the File Server Type Two types of servers rn Windows Server 2003: general-prpose servers and Windows Powered Network Attached Storage. General-prpose servers A general-prpose server can fnction in a nmber of roles, inclding domain controller, print server, WINS server, DHCP server, application server, or an or database server. General-prpose servers provide administrators with the flexibility to configre server software and hardware as they choose. Administrators perform the necessary configration and optimization that the server reqires to perform its role. Windows Powered Network Attached Storage Windows Powered Network Attached Storage soltions are dedicated file servers rnning Windows 2000 Server or Windows Server With bilt-in spport for UNIX and Apple file protocols, Windows Powered Network Attached Storage soltions offer seamless integration in a heterogeneos environment. Table 2.9 describes the featres and capabilities of each file server type. Table 2.9 Featres and Capabilities of File Server Types Description Comes preinstalled with Windows 2000 or Windows Server Offers the file system, secrity, reliability, and scalability featres of Windows 2000 or Windows Server Can provide services for prposes other than file sharing, sch as domain controller or print, WINS, or DHCP server. Can rn applications, sch as Microsoft SQL Server 2000 or Exchange 2000 Server. Comes preconfigred with NFS, File Transfer Protocol (FTP), AppleTalk, HTTP, WebDAV, and NetWare protocol spport. Can be deployed in as little as 15 mintes. General-Prpose Server * Windows Powered Network Attached Storage * Some general-prpose servers come preinstalled with the appropriate operating system; however, other generalprpose servers reqire yo to configre the volmes and install the operating system.
85 Designing a Standard File Server Configration 135 Some hardware vendors offer Windows Powered Network Attached Storage soltions in a clster configration. If yor organization reqires highly available servers, conslt yor hardware vendor for more information. Reviewing File Server Limits As yo plan yor file server configration, keep in mind file system, storage, and other limits related to file servers. Table 2.10 describes these limits. Table 2.10 File System, Storage, and File Server Limits for Windows Server 2003 Description Limit Maximm size of a basic volme Maximm size of a dynamic volme Maximm nmber of dynamic volmes per disk grop Maximm size of an NTFS volme Maximm file size on an NTFS volme Maximm nmber of files on an NTFS volme Maximm nmber of clsters on an NTFS volme 2 TB 2 TB for simple and mirrored (RAID-1) volmes. Up to 64 TB for spanned and striped (RAID-0) volmes. (2 TB per disk with a maximm of 32 disks per volme.) Up to 62 TB for RAID-5 volmes. (2 TB per disk with a maximm of 32 disks per volme and 2 TB sed for parity.) 1,000 A disk grop is collection of dynamic disks. Windows Server 2003 spports one disk grop per server clsters mins 1 clster Using a 64-kilobyte (KB) clster (the maximm NTFS clster size), the maximm size of an NTFS volme is 256 TB mins 64 KB. Using a 4-KB clster (the defalt NTFS clster size), the maximm size of an NTFS volme is 16 TB mins 4 KB. 16 TB (2 44 bytes) mins 64 KB 4,294,967,295 (2 32 mins 1 file) There is no limit to the nmber of files that can be stored in a folder. For recommendations on limiting the nmber of files stored on a volme, see Determining Maximm Volme Size later in this chapter. 4,294,967,296 (2 32 ) (contined)
86 136 Chapter 2 Designing and Deploying File Servers Table 2.10 File System, Storage, and File Server Limits for Windows Server 2003 (contined) Description Maximm volmes per server Maximm nmber of shared folders on a server Limit Approximately 2,000 volmes. Up to 1,000 of these volmes can be dynamic volmes; the rest are basic volmes. Boot times increase as yo increase the nmber of volmes. In addition, yo mst se monted drives to access volmes when all drive letters on a server have been sed. For more information abot monted drives, see Using NTFS monted drives in Help and Spport Center for Windows Server Varies. The nmber of shares on a server affects server boot time. On a server with typical hardware and thosands of shares, boot time can be delayed by mintes. Exact delays depend on server hardware. Shared folder information is stored in the system hive of the registry. For systems with less than 800 MB of RAM, the System hive can be as large as one-qarter of the physical memory. For systems with more than 800 MB of RAM, the maximm size of the System hive is 200 MB. If the system hive exceeds this limit, the server cannot mont the registry at startp and Windows Server 2003 cannot start. For information abot optimizing NTFS performance, see the Server Management Gide of the Windows Server 2003 Resorce Kit (or see the Server Management Gide on the Web at Determining RAM and CPU Specifications As hardware contines to improve, hardware vendors freqently change the RAM and CPU configrations in the servers they offer. Use the information abot performance improvements and scaling factors in the sections that follow to choose the hardware that best meets yor organization s needs.
87 Designing a Standard File Server Configration 137 When designing RAM and CPU specifications for server clsters, also consider the failover policy that yo plan to se and the maximm nmber of File Share resorces and share sbdirectories that will be hosted on any one node after a failre. Each node mst have the RAM and CPU resorces reqired to host the resorces of one or more failed nodes, depending on yor failover policy. For more information abot failover policies and server clster capacity planning, see Designing and Deploying Server Clsters in this book. Note Many of the figres presented in this section are derived from NetBench statistics for file server throghpt. NetBench is a portable Ziff Davis Media benchmark program that measres how well a file server handles file I/O reqests from 32-bit Windows clients. NetBench provides an overall I/O throghpt score and average response time for servers, along with individal scores for clients. Yo can se these scores to measre, analyze, and predict how well yor server can handle file reqests from clients. Reviewing Windows Server 2003 CPU Specifications Table 2.11 describes the recommended CPU speed and nmber of processors spported by Windows Server Table 2.11 CPU Reqirements for Windows Server 2003 Specification Windows Server 2003, Standard Edition Windows Server 2003, Enterprise Edition Windows Server 2003, Datacenter Edition Minimm recommended CPU speed Nmber of CPUs spported 550 MHz 550 MHz 550 MHz
88 138 Chapter 2 Designing and Deploying File Servers Reviewing Operating System Performance Improvements Even if yo plan to se existing hardware to rn Windows Server 2003, yo can benefit from performance enhancements available in Windows Server 2003, as well as client and server protocol improvements available when sing clients rnning Windows XP Professional. Table 2.12 describes performance improvements that can be gained by migrating to new operating systems on identical hardware. Table 2.12 Operating System Performance Improvements on the Same Hardware Crrent Server and Client Operating Systems Windows NT Server 4.0 with Microsoft Windows NT Workstation 4.0 clients Windows 2000 Server with Windows 2000 Professional clients Windows NT Server 4.0 with Windows NT Workstation 4.0 clients New Server and Client Operating Systems Windows 2000 Server with Windows 2000 Professional clients Windows Server 2003 with Windows XP Professional clients Windows Server 2003 with Windows XP Professional clients Improvement Factor Up to 1.25X Up to 2.2X Up to 2.75X These figres are based on the following assmptions: The server is niprocessor (UP), 2P, 4P, or 8P. For each comparison, the server hardware is the same. No memory, disk, or network bottlenecks prevent the processor from performing at fll capacity. Reviewing Performance Improvements Gained by Upgrading Processors Table 2.13 describes performance improvements that can be gained by pgrading server processors. Upgrading processors improves processing power, memory bandwidth, I/O bandwidth, and the system bs. These figres are based on actal processor improvements, not operating system improvements. If yo plan to se processors that are faster than those listed here, performance will be greater than the following figres show. Table 2.13 Performance Improvements Gained by Upgrading Processors Old Processor New Processor (Server Class) Improvement Factor 200 MHz Intel Pentim Pro 400 MHz Intel Pentim II Xeon 2X 400 MHz Intel Pentim II Xeon 900 MHz Intel Pentim III Xeon 2X 200 MHz Intel Pentim Pro 900 MHz Intel Pentim III Xeon 4X
89 Designing a Standard File Server Configration 139 Reviewing Performance Improvements Gained by Adding Processors To increase performance, consider sing more than one processor in yor file servers. One advantage of sing mltiple processors is the ability to handle more concrrent clients, reslting in higher scaling factors at high client loads. Table 2.14 describes the NetBench throghpt improvements gained by adding processors on file servers rnning Windows Server Table 2.14 Performance Improvements Gained by Adding Processors Original Nmber of Processors After Upgrade Scaling Factor * X to 1.6X X to 1.4X X to 2.3X X to 1.4X X to 3.2X * The scaling factors are based on a range of client loads. Determining the Client Load Based on Processor Utilization NetBench stresses the system by applying a heavy load on the file server. Microsoft sed the most intensive CPU operations file opens and file creates (sbseqently described as opens/creates) to translate a NetBench client load to a more realistic client load. To determine the client load, Microsoft observed approximately 820 opens/creates per second at peak NetBench throghpt (100-percent CPU tilization) on a Xeon 900-MHz server with a single processor (UP). Table 2.15 describes active client loads for light, medim, and heavy ser loads at 70-percent CPU tilization. The client loads are defined as follows: Light: one open/create every 10 seconds Medim: two opens/creates every 10 seconds Heavy: three opens/creates every 10 seconds Assming that a light ser load cases one open/create every 10 seconds, a UP Xeon 900-MHz server can handle 5,700 sers at 70-percent CPU tilization and 8,200 sers at 100-percent CPU tilization. (These figres are derived by dividing the opens/creates per second at peak NetBench throghpt by the opens/creates per second for light sers.)
90 140 Chapter 2 Designing and Deploying File Servers The figres in Table 2.15 for the UP Xeon 900-MHz server are based on the following assmptions: No memory, disk, or network bottlenecks prevent the processor from performing at 100-percent capacity. The clients are rnning Windows XP. The figres for 2P, 4P, and 8P Xeon 900-MHz servers were calclated by sing the scaling factors described in Table For example, on a 4P Xeon 900-MHz server, nder a heavy client load of three opens/creates every 10 seconds, the server can handle 3,400 to 4,400 active sers. This figre is derived by taking the 1,900 heavy-load sers spported on a UP Xeon 900-MHz server and mltiplying that figre by the UP-to-4P scaling factors of 1.8X to 2.3X provided in Table Table 2.15 Nmber of Active Users Spported Based on a NetBench-Type Workload Processor Heavy Load Medim Load Light Load UP Xeon, 900 MHz 1,900 2,800 5,700 2P Xeon, 900 MHz 2,600 to 3,000 3,900 to 4,500 8,000 to 9,100 4P Xeon, 900 MHz 3,400 to 4,400 5,000 to 6,400 10,300 to 13,100 8P Xeon, 900 MHz 4,600 to 6,100 6,700 to 9,000 13,700 to 18,200 Determining RAM Specifications Using adeqate RAM in file servers ensres that Windows Server 2003 can temporarily cache (store) files in memory, redcing the need to retrieve files from disk. Table 2.16 describes the minimm recommended RAM and maximm RAM for Windows Server Table 2.16 Minimm and Maximm RAM for Windows Server 2003 RAM Specification Minimm recommended RAM Windows Server 2003, Standard Edition Windows Server 2003, Enterprise Edition Windows Server 2003, Datacenter Edition 256 MB 256 MB 512 MB minimm Maximm RAM 4 GB 32 GB 64 GB
91 Designing a Standard File Server Configration 141 To determine the amont of RAM reqired to spport the file server workload, review the nmber of remote file handles that can be efficiently spported by a file server rnning Windows Server Next, review how additional RAM affects the total size of files, or file set size, that can be held in memory at any time. Remote concrrent file handles A file server rnning Windows Server 2003 with 1 GB of RAM can efficiently spport approximately 100,000 remote concrrent file handles, regardless of the size of the files. If yor sers are likely to have more than 100,000 files open at a time, plan to split this load across two or more servers. File set size On a file server with 1 GB of RAM, Windows Server 2003 can hold approximately 500 MB of file content and NTFS metadata in memory. (The amont of memory sed for NTFS metadata depends on the depth of the directory hierarchy and qery distribtion, among other factors.) Windows Server 2003 ses the rest of the RAM for providing nonpaged pool and other operating system fnctions. For each additional gigabyte of RAM that yo add, Windows Server 2003 can se the entire RAM capacity for storing file content in memory. For example, a file server with 3 GB of RAM can spport approximately 2.5 GB of file content in memory. When the file set size exceeds the amont of memory, files are paged to disk. This paging can reslt in disk bottlenecks, thogh sing a fast disk sbsystem can alleviate this problem. When determining how mch RAM yo plan to install in file servers, consider the following gidelines: When sers typically access the same files, the file set is known as hot, becase the files are freqently stored in memory. For hot file sets, invest in more RAM to accommodate the entire hot file set. Typically, hot file sets are less than 1 percent of the file set, althogh this figre can vary. When sers access random files, the file set is known as cold. For cold file sets, invest in faster disks, becase sers typically open files that are not already in memory, and the response time is limited by disk latency. For example, if yo can ct disk latency in half by sing a faster disk sbsystem (inclding nmber of disks, mechanical speed, and disk cache), compare the cost of doing so to the amont of RAM it wold take to achieve similar performance. Using a faster disk sbsystem might be less expensive.
92 142 Chapter 2 Designing and Deploying File Servers Determining Storage Specifications It is important to make sre that file servers have adeqate, falt-tolerant storage. When determining storage specifications, perform the following tasks: 1. Estimate the amont of data to be stored. 2. Plan the amont of storage for each server configration. 3. Determine the maximm volme size. 4. Plan the layot and RAID level of volmes. The following sections describe each of these steps. For more information abot storage reqirements for server clsters, see Designing and Deploying Server Clsters in this book. Estimating the Amont of Data to Be Stored When yo estimate the amont of data to be stored on a new file server, inclde the following information: The amont of data crrently stored on any file servers that will be consolidated onto the new file server. If the file server will be a replica member, the amont of replicated data that will be stored on the new file server. The amont of data that yo will need to store on the file server in the ftre. A general gideline is to plan for faster growth than yo experienced in the past. Investigate whether yor organization plans to hire a large nmber of people and whether any grops in yor organization are planning large projects that reqire extra storage. Yo mst also take into accont the amont of space sed by operating system files, applications, RAID redndancy, log files, and other factors. Table 2.17 describes some factors that affect file server capacity.
93 Designing a Standard File Server Configration 143 Table 2.17 Factors That Affect File Server Capacity Factor Operating system files Paging file Memory dmp Applications Log files RAID soltion Shadow copies Snapshots available on Windows Powered Network Attached Storage soltions Storage Capacity Reqired At least 1.5 GB. To allow space for optional components, ftre service packs, and other items, allow an additional 3 GB to 5 GB for the operating system volme. 1.5 times the amont of RAM by defalt. Depending on the memory dmp file option that yo choose, the amont of disk space reqired can be as large as the amont of physical memory pls 1 MB. Varies according to the application, which can inclde antivirs, backp, and disk qota software; database applications; and optional components, sch as Recovery Console, Windows Services for UNIX, and Windows Services for NetWare. Varies according to the application that creates the log file. Some applications allow yo to configre a maximm log file size. Yo mst make sre that yo have adeqate free space to store the log files. Varies. For more information abot the RAID soltions, see Planning the Layot and RAID Level of Volmes later in this chapter. Ten percent of the volme by defalt, althogh increasing this size is recommended. For more information abot shadow copies, see Designing a Shadow Copy Strategy later in this chapter. Some Windows Powered Network Attached Storage soltions spport snapshots that are similar to the shadow copies featre available in Windows Server The amont of space that these snapshots consme varies according to the freqency of the snapshots and the amont of changed data. The defalt setting is 20 percent of the volme.
94 144 Chapter 2 Designing and Deploying File Servers Planning Storage for Each Server Configration The amont of disk space that is spported by a file server can be in the terabytes if the server is connected to high-capacity, direct-attached storage arrays or SAN-connected external storage arrays. However, yor goal shold not be to attach as mch storage as possible to a file server. Instead, plan the amont of storage on a file server by examining yor crrent backp soltion and answering the following qestions: How mch data can yor backp soltion contain? Yor backp soltion shold have the capacity to back p the entire file server. How mch time do yo have to complete yor backp? Yo mst be able to perform a fll backp within a period of time that is acceptable to yor organization and sers. For organizations that se hardware-based snapshots and backp software that can back p open files, the backp window might not be an isse. How qickly do yo need to restore data? In other words, do yo need to be able to restore data and get the file server p and rnning within eight hors? Twenty-for hors? Verify that yo can restore data within the reqired time. If yor organization provides file services to grops who have different storage reqirements, yo can design file server configrations with different amonts of storage. For example, a lowend file server might have 100 GB of storage, bt a high-end file server might have 400 GB of storage. Becase the high-end server will typically spport more sers, make sre that the RAM and CPU configration is more robst than for the low-end server. Important If yo choose file server hardware that spports ftre storage expansion, answer the previos qestions taking the additional storage into accont. In other words, if yo add more storage to an existing file server bt cannot back p or restore the file server in the reqired time, yo mst deploy additional file servers or acqire a backp soltion that can handle the extra storage. Backp soltions are becoming faster and more sophisticated. If yor crrent backp soltion is not meeting yor organization s needs, investigate new soltions, sch as those that provide the following types of benefits: Many backp programs, inclding the Backp program that is available in Windows Server 2003, can back p files that are open, allowing administrators to back p a server withot having to disconnect sers or sht down processes that might have files open. Some backp programs offer software-based snapshots that take point-in-time images of a volme, creating virtal replicas withot physically copying the data. Servers rnning Windows Server 2003 provide a similar featre, known as shadow copies. For more information abot shadow copies, see Designing a Shadow Copy Strategy later in this chapter.
95 Designing a Standard File Server Configration 145 Hardware vendors offer hardware-based snapshots (also called split mirrors, snapshot mirrors, or clones) that yo can se to create mirror images of volmes to be sed for online backp, application development, and testing prposes. Backp soltions designed for SAN-connected external storage arrays can perform backps withot sending the data across the network. (These are known as LAN-free backps.) SAN backp soltions also offer serverless backps that move data directly from disk to tape. Determining Maximm Volme Size Volme sizes often vary, bt it is important to set a maximm volme size. NTFS spports volmes p to 256 TB mins 64 KB (2 32 clsters mins 1 clster), bt it is recommended that yo take the following factors into accont when yo determine the size of volmes in yor file servers. Backp and restoration times Sizing yor volmes to be the same size or smaller than yor backp soltion s capacity is a good gideline bt not an absolte rle. For example, some organizations might back p files on a per-folder basis rather than on a per-volme basis. In this case, the organization wold make sre that the size of each folder is smaller than the backp soltion. This method, however, reqires more backps one for every folder. In the event that yo mst restore the data, this method also reqires more restorations to restore all the folders on the volme, increasing the overall complexity and length of the process. Becase emergency restorations are often done in a hrry and nder pressre, let restoration time and simplicity be yor gide for sizing volmes. Chkdsk times Althogh file system errors are rare on NTFS volmes, yo need to consider the time reqired to rn Chkdsk to repair any errors that occr. Chkdsk times are determined by the nmber of files on the volme and by the nmber of files in the largest folder. Chkdsk performance has improved significantly since Windows NT 4.0 and Windows As a reslt, downtime de to Chkdsk shold be minimal. However, it is important to avoid having volmes that contain so many files that Chkdsk reqires longer to complete than the amont of downtime yor sers can tolerate. To determine how long Chkdsk takes to complete, rn Chkdsk on a test server with a similar nmber of files as those stored on a typical file server volme. Based on these reslts, yo can limit the nmber of files to be stored on a volme so that Chkdsk can complete within the acceptable time limit. Important Windows Server 2003 provides some Chkdsk parameters that shorten the time reqired to rn Chkdsk. However, if the volme contains file system errors, yo mst consider the volme at risk ntil yo are able to rn a fll Chkdsk. For more information abot rnning Chkdsk, see Chkdsk in Help and Spport Center for Windows Server 2003.
96 146 Chapter 2 Designing and Deploying File Servers If yo need to store a large nmber of files on a file server and are concerned abot Chkdsk times, yo can distribte the files on separate volmes on the file server. If, however, yo need those files to appear as thogh they are on a single volme, yo can se monted drives. When yo create a monted drive, yo mont one local volme at any empty folder on another local NTFS volme. For example, yo can create a folder called Data on volme E and then mont volme F to that folder. When yo open the Data folder, the contents of volme F are displayed. Monted drives are also sefl when yo want to add more storage to an existing volme withot having to extend the volme. For more information abot monted drives, inclding information on creating monted drives on clstered file servers, see Using NTFS monted drives in Help and Spport Center for Windows Server Planning the Layot and RAID Level of Volmes When yo design a standard hardware configration, determine what type of data yo plan to store on the file server, the RAID type and level that is appropriate for each data type, and how yo plan to divide the disk space into volmes. Evalating Data Types Table 2.18 describes the types of data that are typically stored on file servers and the disk I/O characteristics of the data. Knowing the I/O characteristics can help yo choose the RAID level that offers the best performance for that particlar type of I/O. If yo have other types of data stored on the file server, be sre to estimate their I/O characteristics as well. Table 2.18 Data Types and Their Characteristics Data Type Description Disk I/O Characteristics Operating system Paging space User and shared data Application files Log files The operating system, drivers, and any applications installed on the server, sch as antivirs, backp, or disk qota software. Space sed by the paging file. Docments, spreadsheets, graphics, and other data created by sers and stored on the file server. Software that sers install or rn from the network. Files sed by database, commnications, or transaction applications to store a history of operations (for example, the FRS log file). Server startp consists mostly of large reads, becase the data reqired for startp is optimized on the disk. After startp completes, the disk I/O is mostly small reads. If the server memory is sized correctly, the disk I/O consists of small reads and writes. If the server experiences heavy reads and writes, the server needs more memory. For ser and shared data, disk I/O mst be measred on a workload-by-workload basis. For application files, disk I/O mst be measred on a workload-by-workload basis. Small or large writes, depending on the application.
97 Designing a Standard File Server Configration 147 Choosing Between Hardware and Software RAID Many compter manfactrers provide server-class compters that spport hardware-based RAID. With hardware RAID, yo se the configration tility that is provided by the hardware manfactrer to grop one or more physical disks into what appears to the operating system as a single disk, sometimes called a virtal disk or logical nit (LUN). When yo create the virtal disk, yo also select a RAID level. Hardware RAID typically provides a choice of RAID-0 (striped), RAID-1 (mirrored), RAID-5 (striped with parity), and in some servers, RAID-0+1 (mirrored stripe). After creating these virtal disks, yo se the Disk Management snap-in or the command-line tool DiskPart.exe in Windows Server 2003 to create one or more volmes on each virtal disk. If yor server hardware does not have bilt-in hardware RAID spport, yo can se the software RAID provided in Windows Server 2003 to create RAID-0 volmes, RAID-1 volmes, and RAID-5 volmes on dynamic disks. Althogh software RAID has lower performance than hardware RAID, software RAID is inexpensive and easy to configre becase it has no special hardware reqirements other than mltiple disks. If cost is more important than performance, software RAID is appropriate. If yo plan to se software RAID for write-heavy workloads, se RAID-1, not RAID-5. Note Before yo can se the software RAID in Windows Server 2003, yo mst convert basic disks to dynamic disks. In addition, dynamic disks are not spported on clster storage. For more information abot basic disks, dynamic disks, software RAID, and disk management, see the Server Management Gide of the Windows Server 2003 Resorce Kit (or see the Server Management Gide on the Web at Choosing the RAID Level Choosing the RAID level is a trade-off among the following factors: Cost Performance Availability Reliability
98 148 Chapter 2 Designing and Deploying File Servers Yo can determine the best RAID level for yor file servers by evalating the read and write loads of the varios data types and then deciding how mch yo are willing to spend to get the performance, reliability, and availability that yor organization reqires. Table 2.19 describes for common RAID levels; their relative costs, performance, and availability; and their recommended ses. The performance descriptions in Table 2.19 compare RAID performance to the performance of jst a bnch of disks (JBOD) a term sed to describe an array of disks that is not configred sing RAID. Table 2.19 Comparing RAID Levels Factors RAID-0 RAID-1 RAID-5 RAID-0+1 Minimm nmber of disks Usable storage capacity 100 percent 50 percent (N-1)/N disks, where N is the nmber of disks 50 percent Falt tolerance None. Losing a single disk cases all data on the volme to be lost. Can lose mltiple disks as long as a mirrored pair is not lost. Can tolerate the loss of one disk. Can lose mltiple disks as long as a mirrored pair is not lost. Read performance Generally improved by increasing concrrency. Up to twice as good as JBOD (assming twice the nmber of disks). Generally improved by increasing concrrency. Improved by increasing concrrency and by having mltiple sorces for each reqest. Write performance Generally improved by increasing concrrency. Between 20 percent and 40 percent worse than JBOD for most workloads. Worse nless sing fll-stripe writes (large reqests). Can be as low as 25 percent of JBOD. Can be worse or better depending on reqest size. Best se Temporary data only Operating system Operating system Operating system Log files User and shared data 1 User and shared data Application files 2 Application files Log files 1 Place ser and shared data on RAID-5 volmes only if cost is the overriding factor. 2 Place application files on RAID-5 volmes only if cost is the overriding factor.
99 Designing a Standard File Server Configration 149 When determining the nmber of disks to compose a virtal disk, keep in mind the following factors: Performance increases as yo add disks. Mean time between failre (MTBF) decreases as yo add disks to RAID-5 or RAID-0 arrays. RAID-0+1 almost always offers better performance than RAID-1 when yo se more than two disks. Usable storage capacity increases as yo add disks, bt so does cost. Using Dynamic Disks with Hardware RAID Using dynamic disks with hardware RAID can be sefl in the following sitations: Yo want to extend a volme, bt the nderlying hardware cannot dynamically increase the size of LUNs. Yo want to extend a volme, bt the hardware has reached its maximm LUN size. Before converting hardware RAID disks to dynamic disks, review the following restrictions: Yo cannot se dynamic disks on clster storage. However, yo can se the command-line tool DiskPart.exe to extend basic volmes on clster storage. For more information abot extending basic volmes, see Extend a basic volme in Help and Spport Center for Windows Server If yo plan to se hardware snapshots of dynamic disks, yo cannot import the snapshot again on the same server, althogh yo can move the snapshot to other servers. If yo create a software RAID-0 volme across mltiple hardware arrays, yo cannot extend the RAID-0 later to increase its size. If yo anticipate needing to extend the volme, create a spanned volme instead. For more information abot dynamic disks, see the Server Management Gide of the Windows Server 2003 Resorce Kit (or see the Server Management Gide on the Web at For best practices on sing dynamic disks, see article Q329707, Best Practices for Using Dynamic Disks on Windows 2000-Based Compters, in the Microsoft Knowledge Base. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at
100 150 Chapter 2 Designing and Deploying File Servers Choosing the Clster Size A clster (or allocation nit) is the smallest amont of disk space that can be allocated to hold a file. NTFS ses 4-KB clsters for volmes over 2 GB. Using a 4-KB clster size allows yo to se NTFS compression on the volme. However, in some cases yo might want to se a larger clster size to optimize NTFS performance. To determine the clster size, evalate the types of files to be stored on the volme so that yo can determine whether to se the defalt 4-KB clster size. Some important qestions to answer inclde the following: Are the files typically the same size? Are the files smaller than the defalt clster size? Do the files remain the same size or grow larger? If the files are typically smaller than the defalt clster size (for example, 4 KB) and do not increase, se the defalt clster size to redce wasted disk space. However, smaller clsters can increase fragmentation, especially when files grow to fill more than one clster. Therefore, plan to adjst the clster size accordingly when yo format the volme. If the files yo store tend to be large or increase in size, and yo do not want to se NTFS compression, se 16-KB or 32-KB clsters to optimize performance. Important If yo plan to defragment volmes on which shadow copies are enabled, it is recommended that yo se a clster size of 16 KB or larger. If yo do not, the nmber of changes cased by defragmentation can case shadow copies to be deleted faster than expected. Note, however, that NTFS compression is spported only if the clster size is 4 KB or smaller. For more information abot shadow copies, see Designing a Shadow Copy Strategy later in this chapter. Determining the Volme Layot When yo determine the volme layot, yo evalate the type of data to be stored and the nmber of volmes that yo want to create. For better manageability, se separate volmes for each data type where possible, thogh the operating system and paging file are often placed on a single volme. For example, se one volme for the operating system and paging file and one or more volmes for shared ser data, applications, and log files. If performance is important, place different data types in separate volmes on different virtal disks. Using separate virtal disks is especially important for any data types that create heavy write loads, sch as log files. For example, dedicate a single set of disks (composing a virtal disk) to handling the disk I/O created by the pdates to the log file. Placing the paging file on a separate virtal disk can provide some minor improvements in performance, bt not typically enogh to make it worth the extra cost.
101 Designing a Standard File Server Configration 151 To gain some performance benefits while minimizing cost, it is often sefl to combine different data types in one or more volmes on the same virtal disks. A common method is to store the operating system and paging file on one virtal disk and the ser data, applications, and log files in one or more volmes on the remaining virtal disk. Note On servers rnning Windows Server 2003, yo can increase the size of basic volmes and dynamic volmes. If yo plan to se basic volmes (primary partitions or logical drives), yo can extend them on the same disk only, and the basic volme mst be followed by contigos nallocated space. If yor hardware spports adding more physical disks to a virtal disk, make sre that the basic volme is the last volme on the disk. For more information abot extending volmes and disk management, see the Server Management Gide of the Windows Server 2003 Resorce Kit (or see the Server Management Gide on the Web at Determining the Nmber of File Servers The following section describes reasons why yo might want to deploy additional file servers and how yo can determine the nmber of file servers that yo reqire. Consolidating Older File Servers Many organizations today are consolidating older file servers throghot the organization into fewer larger, more powerfl file servers. Consolidation redces the cost of managing mltiple file servers and increases the efficiency of storage allocation and backp tasks. If yo plan to consolidate file servers rnning Windows NT 4.0 or Windows 2000 onto new file servers rnning Windows Server 2003, determine the nmber of file servers rnning Windows Server 2003 that is necessary to match or exceed the performance of yor existing file servers. Yo can derive these figres by sing the scaling factors provided in Determining RAM and CPU Specifications earlier in this chapter. The following scenarios describe two consolidation sitations based on the scaling factors presented in Determining RAM and CPU Specifications earlier in this chapter. Scenario 1: Consolidating file servers rnning Windows NT Server 4.0 An organization plans to migrate its file services to file servers rnning Windows Server It crrently has 100 Windows NT 4.0 file servers with the following hardware: UP Pentim Pro, 200 MHz 256 MB RAM Fast Ethernet network adapters
102 152 Chapter 2 Designing and Deploying File Servers The organization plans to se the following hardware to consolidate file servers: 4P 900-MHz Intel Pentim III Xeon 3 GB RAM Gigabit network adapters To determine the nmber of file servers the organization needs when migrating to Windows Server 2003, se the scaling factors described in Table Table 2.20 Consolidating File Servers Rnning Windows NT Server 4.0 Area of Improvement Details Scaling Factor Operating system As shown in Table 2.12, migrating from Windows NT 4.0 to Windows Server 2003 provides a 2.75X performance improvement. 2.75X Hardware pgrade Processor scaling As shown in Table 2.13, migrating from a Pentim Pro, 200 MHz, to a Xeon, 900 MHz, provides a 4X performance improvement. As shown in Table 2.14, migrating from UP (one processor) servers to 4P servers provides a 1.8X performance improvement. 4X 1.8X Total improvements Mltiply the scaling factors (2.75 x 4 x 1.8) 19.8X Based on these figres, the organization can migrate 100 file servers rnning Windows NT 4.0 to five 4P Xeon 900-MHz servers rnning Windows Server (To derive this nmber, divide 100 by 19.8.) The organization mst also be sre that the five Xeon servers have adeqate storage space to store the consolidated data, as well as ftre data, and that 3 GB of memory can handle the total workload of the 100 servers. Scenario 2: Consolidating file servers rnning Windows 2000 Server An organization plans to migrate its file services to file servers rnning Windows Server It crrently has five Windows 2000 file servers with the following hardware: 4P 400-MHz Intel Pentim II Xeon 1 GB RAM Gigabit network adapters The organization plans to se the following hardware to consolidate file servers: 8P 900-MHz Intel Pentim III Xeon 4 GB RAM Gigabit network adapters To determine the nmber of file servers the organization needs when migrating to Windows Server 2003, se the scaling factors described in Table 2.21.
103 Designing a Standard File Server Configration 153 Table 2.21 Consolidating File Servers Rnning Windows 2000 Server Area of Improvement Details Scaling Factor Operating system As shown in Table 2.12, migrating from Windows 2000 Server to Windows Server 2003 provides a 2.2X performance improvement. Hardware pgrade Processor scaling As shown in Table 2.13, migrating from a Xeon, 400 MHz, to a Xeon, 900 MHz, provides a 2X performance improvement. As shown in Table 2.14, migrating from 4P servers to 8P servers provides a 1.3X performance improvement. 2.2X 2X 1.3X Total improvements Mltiply the scaling factors (2.2 x 2 x 1.3) 5.7X Based on these figres, the organization can se a single 8P Xeon 900-MHz file server, assming it has enogh memory, disk, and network I/O available. To ensre the availability of the server, the organization shold consider sing a server clster instead of a single stand-alone file server. For more information abot increasing the availability of file servers, see Planning File Server Availability earlier in this chapter. Providing Additional Storage If yor organization ses direct-attached storage for file servers, deploy as many file servers as it takes to meet yor storage needs. If each of yor file servers provides 500 GB of storage, and yo need at least 2 TB of storage, yo need a minimm of five file servers. Yo also need to provide the new file servers with enogh processing power and memory to serve yor clients. Use the factors described in Determining RAM and CPU Specifications earlier in this chapter. Providing More Processing Power If sers experience delays when accessing file servers, there are a nmber of ways yo can improve file server performance: Enable the Offline Files featre so that clients cache files locally instead of going to the file server whenever they need a file. Yo can also se this featre to enable atomatic caching for programs. When yo enable program caching on a shared folder, and a ser rns a program from the shared folder, Windows Server 2003 copies the application.exe and.dll files as they are sed and rns the files from the client s local cache, which redces server load and network traffic. For simple programs that se a single.exe file, this featre enables the program to rn correctly when the server is down or the client is not connected to the network. For programs that consist of mltiple files (.exe and.dll), all files mst be cached on the local compter so that the program can rn while offline. The ser can ensre that all files are cached by choosing the Make Available Offline option from the File men in Windows Explorer. For more information abot the Offline Files featre, see Offline settings for shared resorces and Make a file or folder available offline in Help and Spport Center for Windows Server 2003.
104 154 Chapter 2 Designing and Deploying File Servers Place copies of heavily sed shared folders with primarily read-only files on mltiple file servers, and se DFS to provide load sharing. If yo also plan to se the Offline Files featre, note that yo can se this featre in conjnction with DFS only for clients rnning Windows XP Professional. For more information abot Offline Files, see Offline Files overview in Help and Spport Center for Windows Server Upgrade the processor, RAM, or disk sbsystem in yor existing file servers. Use the factors described in Determining RAM and CPU Specifications earlier in this chapter to determine the performance improvements yo can gain by pgrading existing hardware. Providing Same-Site Data Access for Users If yo have remote sites with expensive WAN links, yo can deploy one or more file servers in those sites to provide sers with fast, inexpensive LAN access to the file servers. For each site, take into accont the storage and processing power needed by sers in the site. Yo also need a backp and recovery procedre in place at each site in case one of the file servers fails. Determining the File Server Hardware Life Cycle The hardware life cycle is the amont of time that hardware is sed before it is replaced with new hardware. Typical hardware life cycles are 12, 24, or 36 months. If yor organization freqently adds new file servers to increase capacity or add new fnctionality, consider sing a relatively short replacement cycle for file servers. This recommendation is based on the high rate of change in compters, disk sbsystems, and other components. Maintaining a shorter cycle prevents the problem of servers that were prchased at the beginning of the cycle becoming obsolete before the end of the cycle. However, a shorter life cycle affects the manageability of file servers, becase yo mst replace hardware, install the operating system and applications, and migrate data more freqently. To transparently migrate files from decommissioned servers to new servers withot affecting sers, implement one or more DFS namespaces. For more information abot DFS, see Designing DFS Namespaces earlier in this chapter. For more information abot deploying new servers and migrating data, see Deploying File Servers later in this chapter. Designing a Shadow Copy Strategy Yo can give sers access to previos versions of files by enabling shadow copies, which provide point-in-time copies of files stored on file servers rnning Windows Server By enabling shadow copies, yo can redce the administrative brden of restoring previosly backed p files for sers who accidentally delete or overwrite important files. Shadow copies work for both open and closed files; therefore, shadow copies can be taken even when files are in se.
105 Designing a Standard File Server Configration 155 Shadow copies work by making a block-level copy of any changes that have occrred to files since the last shadow copy. Only the changes are copied, not the entire file. As a reslt, previos versions of files do not sally take p as mch disk space as the crrent file, althogh the amont of disk space sed for changes can vary depending on the application that changed the file. For example, some applications rewrite the entire file when a change is made, whereas other applications append changes to the existing file. If the entire file is rewritten to disk, the shadow copy contains the entire file. Therefore, consider the type of applications in yor organization, as well as the freqency and nmber of pdates, when yo determine how mch disk space to allocate for shadow copies. Important Shadow copies do not eliminate the need to perform reglar backps, nor do shadow copies protect yo from media failre. In addition, shadow copies are not permanent. As new shadow copies are taken, old shadow copies are prged when the size of all shadow copies reaches a configrable maximm or when the nmber of shadow copies reaches 64, whichever is sooner. As a reslt, shadow copies might not be present for as long as sers expect them to be. Be sre to consider ser needs and expectations when yo configre shadow copies. Shadow copies are designed for volmes that store ser data, sch as home directories and My Docments folders that are redirected by sing Grop Policy, or other shared folders where sers store data. Shadow copies work with compressed or encrypted files, and they retain whatever permissions were set on the files when the shadow copies were taken. For example, if a ser is denied permission to read a file, that ser wold not be able to restore a previos version of the file, nor wold the ser be able to read the file after it has been restored. Althogh shadow copies are taken for an entire volme, sers mst se shared folders to access shadow copies. Administrators on the local server mst also specify the \\servername\sharename path to access shadow copies. If yo or yor sers want to access a previos version of a file that does not reside in a shared folder, yo mst first share the folder. Collecting Information to Design a Shadow Copy Strategy When yo design a shadow copy strategy, review the following topics. For an Excel spreadsheet to assist yo in docmenting yor shadow copy design decisions, see Shadow Copy and Disk Qota Configration Worksheet (Sdcfsv_7.xls) on the Windows Server 2003 Deployment Kit companion CD (or see DFS Configration Worksheet on the Web at
106 156 Chapter 2 Designing and Deploying File Servers Shadow copy spport in client operating systems Shadow copies can be accessed by compters rnning Windows Server 2003 and by compters rnning Windows XP Professional on which yo have installed the Previos Versions Client pack (Twcli32.msi). This file is located in the Windows Server 2003 operating system in windir\system32\clients\twclient. Yo can install this file manally on clients or deploy the file by sing the software distribtion component of Grop Policy. For more information abot software distribtion, see Deploying a Managed Software Environment in Designing a Managed Environment of this kit. To access shadow copies from previos versions of Windows, inclding Windows 2000 and Windows XP Professional, yo can download and install the Shadow Copy Client. For more information and to download the Shadow Copy Client, see the Shadow Copy Client Download link on the Web Resorces page at Note The Previos Versions Client and the Shadow Copy Client provide the same fnctionality, bt the Shadow Copy Client can be installed on mltiple operating systems, sch as Windows 2000 and Windows XP Professional, whereas the Previos Versions Client can only be installed on Windows XP Professional. If yo have not yet deployed these operating systems or client packs on yor clients, yo can deploy a single compter (or as many as necessary) from which sers can restore previos versions of files. Yo can also distribte the client pack on a case-by-case basis to sers who reqest that files be restored. Shadow copy spport in server operating systems Shadow copies are available only on file servers rnning Windows Server Shadow copy spport on server clsters There are a nmber of important considerations for managing shadow copies on clster storage. For more information abot managing shadow copies on server clsters, see Using Shadow Copies of Shared Folders in a server clster in Help and Spport Center for Windows Server File system reqirements Shadow copies are available only on NTFS volmes. Recommended scenarios for sing shadow copies Shadow copies work best when the server stores ser files sch as docments, spreadsheets, and graphics files. Do not se shadow copies to provide access to previos versions of application or databases.
107 Designing a Standard File Server Configration 157 Amont of volme space to allocate to shadow copies When yo enable shadow copies on a volme, yo can specify the maximm amont of volme space to be sed for the shadow copies. The defalt limit is 10 percent of the sorce volme (the volme being copied). Increase the limit for volmes where sers freqently change files. Also, setting the limit too small cases the oldest shadow copies to be deleted freqently, which defeats the prpose of shadow copies and which will likely frstrate sers. In fact, if the amont of changes is greater than the amont of space allocated to storing shadow copies, no shadow copy is created. Therefore, careflly consider the amont of disk space that yo want to set aside for shadow copies, while keeping in mind ser expectations for how many versions they want to be available. Yor sers might expect only a single shadow copy to be available, or they might expect three days or three weeks worth of shadow copies. The more shadow copies the sers expect, the more storage yo need to allocate for storing them. Setting the limit too small can adversely affect other programs, sch as the Backp program in Windows Server 2003 and other backp programs that spport the Volme Shadow Copy service. Dring the backp process, these programs create temporary shadow copies for consistent backps. The temporary shadow copies cont towards the volme space limit yo specify for shadow copies. If the available volme space remaining in the limit is too small, the Volme Shadow Copy service can delete existing shadow copies to free p space for the temporary shadow copy. If there are no existing shadow copies, and the volme space limit cannot accommodate the temporary shadow copy, the backp might fail. For more information abot the Volme Shadow Copy service, see the Storage Services link on the Web Resorces page at Important Regardless of the volme space that yo allocate for shadow copies, yo can have a maximm of 64 shadow copies for any volme. When the 65th shadow copy is taken, the oldest shadow copy is prged. Freqency at which Windows Server 2003 creates shadow copies By defalt, Windows Server 2003 creates shadow copies at 7:00 A.M. and at 12:00 noon Monday throgh Friday. However, yo can change the schedle to better accommodate sers. Keep in mind that the more shadow copies yo create, the more disk space the shadow copies can consme, especially if files change freqently. When yo determine the schedle, avoid schedling shadow copies to occr more than once per hor.
108 158 Chapter 2 Designing and Deploying File Servers Storing shadow copies on separate disks Yo can dedicate a volme on separate disks for storing the shadow copies of another volme on the same file server. For example, if ser files are stored on H:\, yo might se another volme, sch as S:\, to store the shadow copies. Using a separate volme on separate disks provides better performance, and it is recommended for heavily sed file servers. If yo plan to se a separate volme for the storage area (where the shadow copies are stored), be sre to change the maximm size to No Limit to reflect the space available on the storage area volme instead of the sorce volme (where the ser files are stored). Important If yo plan to store the shadow copies on the same volme as the ser files, note that a brst of disk I/O can case all shadow copies to be deleted. If yo cannot tolerate the sdden deletion of shadow copies, se a volme that will not be shadow copied, preferably on separate disks, for storing shadow copies. File servers containing monted drives A monted drive is a local volme attached to an empty folder (called a mont point) on an NTFS volme. If yo enable shadow copies on a volme that contains monted drives, the monted drives are not inclded when shadow copies are taken. In addition, if yo share a monted drive and enable shadow copies on it, sers cannot access the shadow copies if they traverse from the host volme (where the mont point is stored) to the monted drive. For example, assme yo have the folder E:\Data\Users, and the Users folder is a mont point for F:\. Yo enable shadow copies on both E:\ and F:\, yo share E:\Data as \\Server1\Data, and yo share E:\Data\Users as \\Server1\Users. In this example, sers can access previos versions of \\Server1\Data and \\Server1\Users bt not \\Server1\Data\Users. Defragmenting the volme where shadow copied files are stored If yo plan to defragment volmes on which shadow copies are enabled, it is recommended that yo se a clster (or allocation nit) size of 16 KB or larger. If yo do not, the nmber of changes cased by the defragmentation process can case shadow copies to be deleted faster than expected. Note, however, that NTFS compression is spported only if the clster size is 4 KB or smaller. Note To check the clster size of a volme, se the fstil fsinfo ntfsinfo command. If the volme contains data and yo want to change the clster size, yo mst back p the data on the volme, reformat it sing the new clster size, and then restore the data.
109 Designing a Standard File Server Configration 159 Converting basic disks to dynamic disks If the volmes that contain the original files and the shadow copy storage area are on separate basic disks and yo want to convert both of the disks to dynamic disks, yo mst follow these directions: If the shadow copy storage area is not on the boot volme. First dismont and take offline the volme that contains the original files. To do this, se Montvol.exe with the /p parameter. Next, convert the disk that contains the storage area volme to a dynamic disk. After the conversion, yo have 20 mintes to mont the volme that contains the original files and bring it online by sing Montvol.exe or the Disk Management snap-in; if yo do not, yo will lose the existing shadow copies. After yo bring the volme that contains the original files back online, yo can convert that disk to a dynamic disk. If the shadow copy storage area is on the boot volme. Yo can convert the disk that contains the storage area volme to a dynamic disk withot having to dismont the volme that contains the original files. To complete the conversion, yo mst restart the compter twice. Next, convert the disk that contains the original files to a dynamic disk. Important If the disk that contains the original files is converted to a dynamic disk first, the shadow copies are deleted when yo convert the disk that contains the storage area volme to a dynamic disk. Using DFS to provide access to volmes that contain shadow copies Yo can create DFS link targets on volmes that contain shadow copies, and sers can retrieve previos versions of files from the DFS link target, jst as they can from a reglar shared folder. However, if yo se mltiple link targets for a DFS link, each of those link targets can reside on a different volme with its own shadow copies. As a reslt, the previos versions of files can vary, depending on which link target the ser last accesses to change the file. Backing p shadow copies Windows Server 2003 does not spport backing p shadow copies. When yo back p a volme, shadow copies are not backed p. Using scripting to create shadow copies To create shadow copies by sing scripts, se Vssadmin.exe to create the shadow copies and, optionally, se Schtasks.exe to schedle the creation of shadow copies. For more information abot sing these command-line tools, see Vssadmin and Schtasks in Help and Spport Center for Windows Server For more information abot shadow copies, see Shadow Copies of Shared Folders in Help and Spport Center for Windows Server 2003.
110 160 Chapter 2 Designing and Deploying File Servers Example: An Organization Designs a Shadow Copy Strategy A large organization allows sers to redirect their My Docments folders to a central file server. When a ser accidentally deletes or overwrites a file and reqests that the file be restored, the process reqires between 1 day and 3 days and p to three escalations before the backp/restore grop can restore a file. The organization determines that it costs approximately $300 for spport and escalation costs pls lost prodctivity while the restoration takes place. To decrease the cost associated with restoring files and to increase ser satisfaction, the organization enables shadow copies on its file servers. Dring the pilot program, the organization determines that the defalt settings for the schedle and storage volme allow two weeks of previos versions. When a ser contacts the spport grop to have a file restored, the spport grop provides a copy of the Previos Versions Client pack to the ser. It takes the ser approximately five mintes to install the software and another five mintes to restore the file. As a reslt, a ser can restore a file in 10 mintes instead of 1 day to 3 days, and ser satisfaction is greatly increased. Designing a Disk Qota Strategy To prevent file servers from filling to capacity withot warning, se disk qotas to track and control disk space sage on file servers. Windows Server 2003 provides disk qota fnctionality that tracks qotas on a per-ser, per-volme basis. After yo enable the warning level and limit, they apply to all sers who own files stored on the volme. Any ser who creates a new file is atomatically assigned the crrent warning level and limit. Windows Server 2003 qotas are well sited for volmes that store ser data, sch as redirected My Docments folders or other per-ser folders. For example, an organization ses Grop Policy to redirect its employees My Docments and My Pictres folders to a file server volme that stores only ser data, not grop data. After evalating the storage needs of sers in the organization, the administrator chooses to set storage limits by enforcing a 300-MB disk qota for each ser. The administrator also sets a 270-MB warning level. If a ser needs additional storage, the ser mst get approval from his or her manager before the administrator can increase the qota for the individal ser. Windows Server 2003 disk qotas are not designed for project-oriented scenarios in which a shared folder is given a qota that is shared among a specified set of sers. A wide range of Windows Server 2003 compatible, third-party prodcts provide grop qotas, per-folder qotas, and threshold event featres that this scenario reqires. To design a qota strategy for volmes that store ser data, review the following topics. For an Excel spreadsheet to assist yo in docmenting yor disk qota design decisions, see Shadow Copy and Disk Qota Configration Worksheet (Sdcfsv_7.xls) on the Windows Server 2003 Deployment Kit companion CD (or see DFS Configration Worksheet on the Web at File system reqirements Disk qotas are available only on NTFS volmes.
111 Designing a Standard File Server Configration 161 Tracking qotas vs. enforcing qotas Tracking qotas is sefl if yo want to track se of disk space withot denying sers access to a volme. Enforcing qotas denies disk space to sers who exceed their limit. Users can determine how mch disk space they have available on the volme by viewing the properties of a mapped shared folder in Windows Explorer. Determining how mch disk space to provide to each ser Yo can change qotas on a per-ser basis if some sers reqire additional disk space. For example, the crrent limit might be 200 MB, bt yo can specify which sers have a 500-MB limit. Yo cannot assign qotas on a per-grop basis. When setting qotas, make sre that yo have enogh disk space to accommodate existing sers and that yo have enogh extra free space to accommodate ftre growth. Each file that is stored on the volme can se p to 64 KB of NTFS metadata that is not charged to a ser s qota. To avoid rnning ot of disk space, yo mst leave sfficient disk space to accommodate this metadata. Using disk qotas on server clsters Use only domain-level acconts, becase local acconts cannot be resolved when the disk fails over. For more information abot configring disk qotas on shared clster disks, see article Q278365, HOW TO: Configre Disk Qotas for a Shared Disk in a Clster in the Microsoft Knowledge Base. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at Logging qota events Windows Server 2003 provides qota reporting by logging events in the event log when sers exceed their warning level or qota limit. Yo can se Windows Management Instrmentation (WMI) for cstomized reporting by sing the WMI classes Win32_DiskQota, Win32_QotaSetting, and Win32_VolmeQotaSetting. For more information abot WMI, see the Microsoft Windows Management Instrmentation (WMI) SDK link on the Web Resorces page at Using disk qotas on DFS link targets DFS provides a simple way to create cstom qotas on different volmes that appear to sers as different folders on the same volme. If yo are sing DFS to provide mltiple link targets, note that each of these link targets can reside on a volme with different qota settings. To keep the ser experience consistent, se the same qota settings for each volme. Using disk qotas on shadow-copied volmes Yo can enable shadow copies and disk qotas on the same volme, and shadow copies do not cont against a ser s disk qota. Note For more information abot file systems and Windows Server 2003 disk qotas, see the Server Management Gide of the Windows Server 2003 Resorce Kit (or see the Server Management Gide on the Web at
112 162 Chapter 2 Designing and Deploying File Servers Planning File Server Secrity Planning for file server secrity is vital for protecting yor organization s sensitive or bsinesscritical files. When planning for file server secrity, yo need to protect not only the data bt the physical server as well. In addition, if yo plan to implement availability strategies, sch as DFS or clstering, yo need to take additional steps to secre the resorces associated with these featres. Figre 2.18 describes the process for planning file server secrity. Figre 2.18 Planning File Server Secrity Identify file services goals Design DFS namespaces Plan file server availability Design a standard file server configration Ensre the physical secrity of each file server Plan baseline secrity Plan virs protection for file servers Plan access to shared folders Plan file server secrity Plan encrypted file storage Deploy file servers Plan DFS and FRS secrity Plan clster secrity
113 Planning File Server Secrity 163 Ensring the Physical Secrity of Each File Server For file servers that mst maintain high availability, restrict physical access to only designated individals. In addition, consider to what extent yo need to restrict physical access to network hardware. The details of how yo implement physical secrity depend on yor physical facilities and yor organization s strctre and policies. Yo shold also implement methods to restrict access to backp media and any instrction sheets that yo create, sch as the instrctions that go in the recovery manal for a file server. Allowing nathorized people to stdy docmentation or configration manals means that they can qickly case harm to the system if they are able to obtain access. Even if the physical server is in a secre room, the file server might still be accessible throgh remote administration tools. Therefore, implement methods for restricting access to remote administration of file servers, and ensre that remote administration tools do not weaken yor organization s secrity model. For example, remote administration tools do not always se strong athentication protocols, sch as Kerberos V5, to athenticate sers across the network. Yo might be able to implement weaker protocols, sch as NTLM, depending on the remote management tool yo se and the operating system that is rnning on the host yo are administering. In addition, certain remote administration tools might transmit nencrypted data (plaintext) across the network. This makes yor data vlnerable to network sniffers. For more information abot secrity and remote administration, see the Server Management Gide of the Windows Server 2003 Resorce Kit (or see the Server Management Gide on the Web at Planning Baseline Secrity The Windows 2000 Server Baseline Secrity Checklist provides instrctions for configring a baseline level of secrity on servers rnning Windows Server The checklist contains tasks sch as sing NTFS, sing strong passwords, disabling nnecessary services, disabling nnecessary acconts, and more. For more information abot the baseline secrity checklist, see the Windows 2000 Server Baseline Secrity Checklist link on the Web Resorces page at Rn the Microsoft Baseline Secrity Analyzer (Mbsa.exe for the graphical ser interface version; Mbsacli.exe for the command-line version). For more information abot the Microsoft Baseline Secrity Analyzer, see the MBSA link on the Web Resorces page at To frther enhance secrity, review the Microsoft Windows Update Web site reglarly for patches that fix vlnerabilities and provide secrity enhancements. For more information abot Windows Update, see the Windows Update link on the Web Resorces page at
114 164 Chapter 2 Designing and Deploying File Servers Planning Virs Protection for File Servers To protect file servers from virses, plan to take the following precations: Use Windows Server 2003 compatible antivirs software, and reglarly pdate virs signatre files. Back p files reglarly so that damage is minimized if a virs attack does occr. With clstered file servers, yo mst se an antivirs program that is clster aware. If it is not, failover might not occr correctly. If yor organization does not have clster-aware antivirs software, yo can install antivirs software on a nonclstered server and se that server to periodically scan the drives that are mapped to the clstered file server. For more information abot rnning antivirs software on server clsters, see article Q250355, Antivirs Software May Case Problems with Clster Services, in the Microsoft Knowledge Base. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at For FRS-replicated content, yo mst se antivirs programs that are FRS compatible and that do not change the secrity descriptor of files. For more information abot FRS compatible antivirs programs, see article Q815263, Antivirs, Backp and Disk Optimization Programs That Are Compatible with the File Replication Service. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at Planning Access to Shared Folders When yo plan access to shared folders, determine the type of permissions to se, who needs access to the folders, and the level of access that sers reqire. Yo can also disable administrative shares and hide shared folders. Determining the Type of Permissions to Use Permissions define the type of access granted to a ser or grop for a file or folder. Windows Server 2003 offers two types of permissions: NTFS permissions restrict local and remote access to files and folders on NTFS volmes. When yo create a new folder, it inherits permissions from its parent folder. When yo create a file in a folder, the file inherits permissions from the parent folder. Share permissions restrict remote access to shared folders, bt share permissions do not restrict access to sers who log on to the server locally. Share permissions are available on both FAT and NTFS volmes.
115 Planning File Server Secrity 165 To simplify administering and trobleshooting permissions, se NTFS permissions to control ser and grop access to file system resorces. Althogh NTFS is recommended as the primary method for secring folders, yo mst keep in mind that defalt share permissions are assigned when yo share a folder, and the defalt share permissions have changed for Windows Server Windows 2000 and Windows XP grant the Everyone grop the Fll Control share permission, bt Windows Server 2003 grants the Everyone grop the Read share permission. This change increases the secrity of shared folders and helps prevent the spread of virses. Becase the more restrictive permissions always apply when yo se a combination of share and NTFS permissions, yo might need to change the defalt share permissions if yo want sers to be able to add or change files in the folder. If yo do not change the defalt share permissions, sers will have the Read share permission even if yo grant sers NTFS permissions sch as Write or Modify. If yo se a clstered file server, yo mst create share permissions by sing the Clster Administrator snap-in, not Windows Explorer. In addition, if yo plan to se the Share Sbdirectories option, yo mst se NTFS permissions to secre the sbdirectories. For more information abot these options, see Planning Clster Secrity later in this chapter. Determining Who Needs Access to the Folders To increase secrity and prevent sers from browsing throgh shared folders that are not relevant to their jobs, assign permissions only to grops that reqire access to the shared folders. To redce administrative overhead when assigning permissions, do the following: Assign permissions to grops rather than to sers. Place sers in global grops or niversal grops, nest these grops within domain local grops, and then assign the domain local grops permissions to the folder. Yo do not need to deny permissions for specific grops. When permission to perform an operation is not explicitly granted, it is implicitly denied. For example, if yo allow the Marketing grop, and only the Marketing grop, permission to access a shared folder, sers who are not members of the Marketing grop are implicitly denied access. The operating system does not allow sers who are not members of the Marketing grop to access the folder.
116 166 Chapter 2 Designing and Deploying File Servers Deny access to folders only in the following scenarios: Yo want to exclde a sbset of a grop (for example, an individal ser) that has permissions. Yo want to exclde one or more special permissions when yo have already granted Fll Control to a ser or grop. Note If yo plan to redirect yor sers My Docments folders, note that each ser is granted exclsive access to his or her My Docments folder on the file server. If yo need to access a ser s My Docments folder, yo have two choices: take ownership of the folder or follow the instrctions provided in article Q288991, Enabling the Administrator to Have Access to Redirected Folders in the Microsoft Knowledge Base. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at Determining the Level of Access That Users Reqire Assign the most restrictive permissions that still allow sers to perform reqired tasks. The following descriptions explain the permissions that are associated with folders on NTFS volmes. Write Users can copy or paste new files and sbfolders in the folder and change folder attribtes. However, sers cannot open or browse the folder nless yo grant the Read permission. Assigning Write permission is sefl for folders where sers can file confidential reports, sch as timesheets, that only the manager or shared folder administrator can read. Read Users can see the names of files and sbfolders in a folder and view folder attribtes, ownership, and permissions. Users can open and view files, bt they cannot change files or add new files. Assign the Read permission if sers need only to read information in a folder and they do not need to delete, create, or change files. List Folder Contents Users can see the names of files and sbfolders in the folder. However, sers cannot open files to view their contents. Read & Execte Users have the same rights as those assigned throgh the Read permission, as well as the ability to traverse folders. Traverse folders rights allow a ser to reach files and folders located in sbdirectories, even if the ser does not have permission to access portions of the directory path.
117 Planning File Server Secrity 167 Modify Users can delete the folder and perform the actions permitted by the Write and Read & Execte permissions. Becase Modify gives sers the ability to delete the folder, se Modify permission only for administrators or for the grop or department owner of the folder. Fll Control Users can change permissions, take ownership, delete sbfolders and files, and perform the actions granted by all other permissions. Becase Fll Control gives sers the ability to delete the folder, se Fll Control permission only for administrators or for the grop or department owner of the folder. For more information abot permissions and file servers, see Permissions on a file server in Help and Spport Center for Windows Server Determining Whether to Disable Administrative Shares Windows Server 2003 creates shared folders, known as administrative shares, by defalt when yo start a server or when yo stop and then start the Server service. These folders are shared for administrative prposes, and they allow sers and applications with the appropriate administrative rights to gain access to the system remotely. For example, some backp software applications se these shares to remotely connect to systems to back p data. Administrative shares have defalt share permissions that restrict access to members of only a few secrity grops. Each share name is appended with a dollar sign ($), which hides the share from sers who browse the server. One type of administrative share is the root folder of every volme (C$, D$, and so on). Yo can disable these administrative shares temporarily or permanently. For more information abot disabling administrative shares and an overview of remote administration, see the Server Management Gide of the Windows Server 2003 Resorce Kit (or see the Server Management Gide on the Web at Determining Whether to Hide Shared Folders Yo can hide a shared folder by appending a dollar sign ($) to the shared folder name. Hiding shared folders is sefl when yo want to make a shared folder available over the network while keeping it hidden from people browsing on the network. Hiding shared folders does not necessarily make them more secre, becase anyone who knows the name of the server and the shared folder can connect to it. Therefore, yo mst set the necessary NTFS permissions on the shared folder so that access is granted only to the appropriate grops.
118 168 Chapter 2 Designing and Deploying File Servers Planning Encrypted File Storage Windows 2000, Windows XP, and Windows Server 2003 spport storing files that are encrypted sing EFS. However, remote decryption is a potential secrity risk, becase files are decrypted before transmission on the local server, and they are transmitted nencrypted over the network in plaintext. Therefore, before yo allow encrypted files to be stored on file servers, decide whether the risk associated with transmitting nencrypted files over the network is acceptable. Yo can greatly redce or eliminate this risk by enabling Internet Protocol secrity (IPSec) policies, which encrypts data that is transmitted between servers, or by sing Web Distribted Athoring and Versioning (WebDAV) folders. WebDAV folders have many advantages compared to shared folders, so yo shold se them whenever possible for remote storage of encrypted files. WebDAV folders reqire less administrative effort and provide greater secrity than shared folders. WebDAV folders can also secrely store and deliver files that are encrypted with EFS over the Internet by means of Hypertext Transfer Protocol (HTTP). Before sers can encrypt files that reside on a remote file server, yo mst designate the file server as trsted for delegation. Doing so allows all sers with files on that server to encrypt their files. For more information abot enabling encryption on a file server, see Enable a remote server for file encryption in Help and Spport Center for Windows Server Note that when encrypting files on a WebDAV server, the server does not need to be trsted for delegation. Important To enable EFS on a clstered file server, yo mst perform a nmber of steps to configre the environment correctly. For more information abot enabling EFS on server clsters, see Create a clster-managed encrypted file share in Help and Spport Center for Windows Server If yo allow sers to store encrypted files on file servers, review the following isses: Users can encrypt files on remote NTFS volmes only when both the ser s compter and the file server are members of the same Windows Server 2003 forest. (This restriction does not apply to WebDAV folders.) Users mst have Write or Modify permissions to encrypt or decrypt a file. Users cannot encrypt files that are compressed. If sers encrypt a compressed file or folder, the file or folder is ncompressed. For more information abot EFS and sing WebDAV folders to store encrypted files, see Encrypting and decrypting data and Internet Information Services (IIS) 6.0 overview in Help and Spport Center for Windows Server For more information abot configring IPSec, see the Networking Gide of the Windows Server 2003 Resorce Kit (or see the Networking Gide on the Web at
119 Planning File Server Secrity 169 Planning DFS and FRS Secrity When planning to secre DFS namespaces and content replicated by FRS, follow these gidelines: Use NTFS permissions to secre DFS targets. If yo are sing FRS to replicate DFS link target information, any permission changes yo make on one member of the replica set replicate to other members. If yo are not sing FRS for atomatic replication, yo mst set the permissions on targets and manally propagate any changes that occr. When setting NTFS permissions, always se the path of the physical folder (\\servername\sharename) instead of navigating throgh the DFS namespace to set permissions. This is especially important when yo have mltiple link targets for a given link. Setting permissions on a folder by sing its DFS path can case the folder to inherit permissions from its parent folder in the namespace. In addition, if there are mltiple link targets, only one of them gets its permissions pdated when yo se the DFS path. If yo plan to se share permissions, note that FRS does not replicate share permissions; therefore, yo mst plan to implement identical share permissions for each shared folder in a replica set. If yo do not, sers might have inconsistent access to shared folders across the network. To prevent the spread of virses in read-only FRS-replicated content, give the appropriate grops the NTFS Read & Execte permission, create a grop for administrators who pdate content, and assign that grop the NTFS Modify permission. Do not grant permissions to the Everyone grop. For additional recommendations, see Permissions on a file server in Help and Spport Center for Windows Server For FRS-replicated content, yo mst se antivirs programs that are FRS compatible and that do not change the secrity descriptor of files. For more information abot FRS compatible antivirs programs, see article Q815263, Antivirs, Backp and Disk Optimization Programs That Are Compatible with the File Replication Service. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at Yo mst have permissions on the DFS configration object in Active Directory to add and delete roots to a domain-based DFS namespace. Yo can create DFS link targets that point to shared folders containing data that is encrypted by sing EFS. However, yo cannot se FRS to replicate those files among mltiple link targets.
120 170 Chapter 2 Designing and Deploying File Servers Do not enable the RestrictAnonymos registry vale on DFS root servers. Doing so restricts anonymos access and cases DFS referral failres. This registry vale is also part of the HiSecWeb secrity template, which is designed to help secre Internet Information Services (IIS) at the operating system level. For more information abot the RestrictAnonymos registry vale, see article Q246261, How to Use the RestrictAnonymos Registry Vale in Windows For more information abot the HiSecWeb template, see article Q316347, IIS 5: HiSecWeb Potential Risks and the IIS Lockdown Tool, in the Microsoft Knowledge Base. To find these articles, see the Microsoft Knowledge Base link on the Web Resorces page at Planning Clster Secrity When planning to secre clstered file servers, follow these gidelines: After yo create a folder by sing Windows Explorer, verify that the Clster service accont has the Read permission on the folder so that yo can share the folder properly by sing Clster Administrator. (Do not share the folder by sing Windows Explorer.) Use Clster Administrator to set share permissions. If yo change file share permissions sing Windows Explorer or My Compter, instead of sing Permissions on the Parameters tab in Clster Administrator, the permissions are lost when the resorce is taken offline. Note When yo set file share permissions by sing Clster Administrator, the defalt permissions give the Everyone grop the Read permission. When yo set file share permissions by sing Clster.exe, the Everyone grop has the Fll Control permission. To secre File Share resorces on the local server, se Windows Explorer to assign NTFS permissions on the physical folder, becase share permissions apply only when sers connect to the clstered file server across the network. Do not assign NTFS permissions to local grops on clstered file servers. These permissions will have no meaning when the clstered disk resorce is moved to another server. Therefore, always assign permissions to a domain local grop. By defalt, access to clster file shares is disabled to anonymos sers. To allow anonymos access to specific file shares, yo can either enable Kerberos V5 athentication on the Network Name resorce that is associated with the file share or yo can change the local secrity policy setting. For more information abot configring these Kerberos properties, see Enable Kerberos athentication for virtal servers in Help and Spport Center for Windows Server When yo create File Share resorces by sing the Share Sbdirectories option, the sbdirectories inherit the permissions of the parent. If yo are sing the sbdirectories as ser folders, and yo want to allow only the ser and administrator to access the folder, set NTFS permissions on each sbfolder.
121 Deploying File Servers 171 To enable EFS on a clstered file server, yo mst perform some steps to configre the environment correctly. These steps are described in To create a clster-managed encrypted file share in Help and Spport Center for Windows Server For more information abot server clster secrity, see Best practices for secring server clsters in Help and Spport Center for Windows Server Deploying File Servers Deploying file servers involves installing Windows Server 2003 on the physical servers, adding the servers to the network, and then implementing the design decisions yo made throghot this chapter. Organizations that plan to deploy clstered file servers mst take the additional step of configring the clsters; all other organizations can begin by choosing the installation method. Figre 2.19 describes the file server deployment process. Figre 2.19 File Server Deployment Process Identify file services goals Design DFS namespaces Plan file server availability Design a standard file server configration Plan file server secrity Install Windows Server 2003 Deploy clstered file servers Migrate file server data Deploy DFS Deploy FRS Deploy file servers Configre file server settings
122 172 Chapter 2 Designing and Deploying File Servers Installing Windows Server 2003 Before yo install Windows Server 2003, yo need to decide whether to perform clean installations or pgrades. Yo also need to decide if yo want to perform an atomated installation. Choosing Between Clean Installations and Upgrades If yor servers are new and do not contain operating systems, yo mst perform clean installations. If yo have existing servers, yo can perform clean installations or pgrades. Consider the following points when choosing between a clean installation and an pgrade. Choosing a new installation: If yo reformat yor hard disk and then perform a new installation, the efficiency of yor disk might improve (compared to not reformatting it). Reformatting also gives yo the opportnity to modify the size or nmber of disk partitions to make them match yor reqirements more closely. If yo want to practice carefl configration management (for example, for a server where high availability is important), yo might want to perform a new installation on that server instead of an pgrade. This is especially tre on servers on which yo have pgraded the operating system several times in the past. Choosing an pgrade: With an pgrade, configration is simpler, and yo retain yor existing sers, settings, grops, rights, and permissions. With an pgrade, yo do not need to reinstall files and applications. As with any major changes to the hard disk, however, it is recommended that yo back p the disk before beginning an pgrade. Preparing for a Clean Installation on Existing File Servers Review the following isses before performing a clean installation on existing file servers: If yo are performing a clean installation on a file server that contains a domain-based DFS root, remove the server as a DFS root before yo begin the installation. If yo are performing a clean installation on a member of an FRS replica set, se the Distribted File System snap-in (available in Windows Server 2003 or in the Windows Server 2003 Administration Tools Pack) to remove all inbond and otbond FRS connections to the server before beginning the clean installation.
123 Deploying File Servers 173 Upgrading Existing File Servers If yo plan to pgrade file servers to Windows Server 2003, review the following isses: Service pack reqirements for servers rnning Windows NT 4.0. Before yo can pgrade a server that is rnning Windows NT 4.0 to Windows Server 2003, yo mst first install Windows NT 4.0 Service Pack 5 or a later version. Upgrading servers that contain mltidisk volmes. If a server contains mltidisk volmes, review the following isses: If yo are pgrading from Windows NT Server 4.0 to Windows Server 2003, verify that yor backp software and hardware are compatible with both Windows NT Server 4.0 and Windows Server Next, back p and then delete all mltidisk volmes (volme sets, mirror sets, stripe sets, and stripe sets with parity) before yo pgrade, becase Windows Server 2003 cannot access these volmes. Be sre to verify that yor backp was sccessfl before deleting the volmes. After yo finish pgrading to Windows Server 2003, create new dynamic volmes, and then restore the data. If yo are pgrading from Windows NT Server 4.0 to Windows Server 2003, and the paging file resides on a mltidisk volme, yo mst se System in Control Panel to move the paging file to a primary partition or logical drive before beginning Setp. If yo are pgrading from Windows 2000 Server to Windows Server 2003, yo mst se Disk Management to convert all basic disks that contain mltidisk volmes to dynamic disks before beginning Setp. If yo do not do this, Setp does not contine. Upgrading servers that contain mltiple DFS roots. If yo are rnning a prerelease version of Windows Server 2003, Standard Edition, and the server hosts mltiple DFS roots, only one of those roots will be available after the pgrade. For more information abot this and other DFS isses dring pgrades, see Deploying DFS later in this chapter. Upgrading servers that are part of FRS replica sets. To keep the data in a replica set available dring the pgrade, stagger the pgrades of replica members.
124 174 Chapter 2 Designing and Deploying File Servers Choosing Atomated Installations Many large organizations se atomated installations to install Windows Server Blk installations are faster, easier, less expensive, more consistent, and more efficient than having sers or IT professionals sit at servers and enter data manally. Windows Server 2003 provides the following tools and methods that yo can se to design and deploy very simple or very sophisticated atomated installations: Remote Installation Services (RIS) System Preparation Tool (Sysprep) Unattended Installation These atomated installation methods address a variety of specific isses, and each method has inherent advantages and disadvantages, depending on the environment in which yo se these methods. To determine the best methods to se in the context of yor specific environment, see Choosing an Atomated Installation Method in Atomating and Cstomizing Installations of this kit. Deploying Clstered File Servers The clster installation method yo choose depends on whether yo have existing clstered file servers. If yo do have existing clstered file servers, yo have several options when pgrading server clsters: Perform a new installation of Windows Server 2003, Enterprise Edition or Windows Server 2003, Datacenter Edition, and configre the clster at the same time. Upgrade a clster that is rnning Windows NT Server 4.0, Enterprise Edition. Upgrade a clster that is rnning Windows 2000, possibly throgh a rolling pgrade. There are two major advantages to a rolling pgrade. First, there is minimal interrption of service to clients. (However, server response time might decrease dring the phases in which fewer nodes handle the work of the entire clster.) Second, yo do not have to recreate yor clster configration. The configration remains intact dring the pgrade process. Cation Do not make DFS configration changes (for example, adding new links, new link targets, and so on) while operating a mixed-version clster, becase all DFS changes are lost pon failover.
125 Deploying File Servers 175 Yo cannot perform a rolling pgrade directly from Windows NT Server 4.0, Enterprise Edition to Windows Server 2003, Enterprise Edition or Windows Server 2003, Datacenter Edition. Instead yo have two options: Yo can maintain clster availability by performing an pgrade to Windows 2000 first (as specified in the Windows 2000 docmentation), and then pgrade to Windows Server 2003, Enterprise Edition or Windows Server 2003, Datacenter Edition. Yo can perform a nonrolling pgrade directly from Windows NT 4.0 to Windows Server 2003, Enterprise Edition or Windows Server 2003, Datacenter Edition. Note that a nonrolling pgrade does not allow yo to maintain clster availability. For comprehensive information on choosing the clster installation method and performing the actal installation, see Designing Server Clsters in this book and see Installing and pgrading on clster nodes in Help and Spport Center for Windows Server 2003, Enterprise Edition or Windows Server 2003, Datacenter Edition. Regardless of the installation type, evalate yor clster hardware for compatibility with Windows Server For more information abot choosing clster hardware, see Designing and Deploying Server Clsters in this book. After yo have installed Windows Server 2003, Enterprise Edition or Windows Server 2003, Datacenter Edition and configred the server clster, se the following sections for information abot creating monted drives and File Share resorces on server clsters. Creating Monted Drives on Server Clsters If yo assign drive letters to the clster storage devices, Windows Server 2003, Enterprise Edition, and Windows Server 2003, Datacenter Edition, limit the total nmber of sch devices to 23. Monted drives are not sbject to this limit; yo can se monted drives to access more than 23 clster storage devices in yor server clster. When sing NTFS monted drives with server clsters, follow these recommendations: Make sre that yo create niqe monted drives so that they do not conflict with existing local drives on any node in the clster. Do not create monted drives between disks on the clster storage device (clster disks) and local disks. Do not create monted drives from the clster disk that contains the qorm resorce (the qorm disk). Yo can, however, create a monted drive from the qorm disk to a clstered disk. Monted drives from one clster disk to another mst be in the same clster resorce grop, and they mst be dependent on the root disk. Use Event Viewer to check the system log for any Clster service errors or warnings indicating mont point failres. These errors are listed as ClsSvc in the Sorce colmn and as Physical Disk Resorce in the Category colmn. For more information abot creating monted drives, see Create a monted drive in Help and Spport Center for Windows Server 2003.
126 176 Chapter 2 Designing and Deploying File Servers Creating File Share Resorces After yo choose the clster installation method and create the server clster, migrate existing data on existing file servers, if necessary, and then create one or more File Share resorces by sing the Clster Administrator snap-in or by creating scripts. For more information abot creating a clster-managed file share, see Create a clster-managed file share in Help and Spport Center for Windows Server If yo prefer to se scripts to create File Share resorces, see article Q284838, How to Create a Server Clster File Share with Clster.exe in the Microsoft Knowledge Base. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at For more information, see Managing a server clster from the command line in Help and Spport Center for Windows Server After yo create the File Share resorces, yo can enable shadow copies on clster storage. For more information abot enabling shadow copies on server clsters, see Enable Shadow Copies of Shared Folders in a clster in Help and Spport Center for Windows Server Migrating File Server Data If yo plan to consolidate file servers or replace otdated servers with new servers, migrate existing applications and data to the new servers. To ensre the sccess of the migration, create a detailed and well-tested migration plan that does the following: Minimizes the amont of time that data is navailable to sers Minimizes the impact on network bandwidth Minimizes the cost of the migration Ensres that no data loss occrs dring the migration The following sections describe the tasks for creating a migration plan Identifying Data to Migrate Large organizations rarely have time to take all prodction data offline before migrating it. Instead, they typically move data gradally, migrating different classes of data in stages. A migration plan shold identify which data to move, where to move it, and the order in which it shold be moved. File server data can sally be classified in the following classes: Bsiness-critical data Application data Personal data (sch as home directories)
127 Deploying File Servers 177 Profiles or other configration data Departmental or grop data Other data types, sch as special projects or temporary data When creating yor migration plan, determine whether yo want to consolidate different classes of data at different rates, onto different hardware, onto servers with different SLAs, or to different locations. Also, consider the importance of the data when planning yor migration. For example, to minimize the impact of any problems dring the migration, yo might choose to move nonessential data first, followed by bsiness-critical data. In addition to identifying which data to move, yo can also identify data that yo do not need to move, sch as dplicate, obsolete, or non-bsiness-related files. Eliminating these files from yor migration plan decreases the nmber of files that yo need to migrate and increases the amont of available storage on the target server after the migration. Identifying Migration Risks The next step is to assess the risks associated with data migration. The best way to identify these risks is to set p a test lab with clients and servers, similar to those in yor prodction environment, and condct trial migrations. In addition to testing yor actal migration method, test any applications that are installed on client compters to determine if the applications are affected by the migration. For example, applications that depend on components stored on a particlar file server might not work correctly if the file server or share is renamed after the migration is complete. If yo identify problems, pdate yor migration plan so that yo prevent or mitigate those problems. There are a nmber of soltions yo can implement either before or dring the migration to prevent problems from occrring. For example, yo can ensre that shortcts and links on client compters work correctly after the migration by doing one of the following: Important Be sre to review any legal or copyright isses that might arise when yo migrate data. For example, if sers are storing MP3 files on the file server, yo might violate copyrights by copying those files. If yo are copying applications, make sre that doing so does not violate any licensing agreements. Implementing DFS. If yo have implemented DFS before the migration, the migration is transparent to sers; yo jst need to pdate the link target location. Migrating to clstered file servers. In this case, the migration is transparent if yo create virtal servers that se the same name as the previosly sed file servers. Yo can also transparently migrate any stand-alone DFS namespaces to clstered file servers. Using the previos server names, create yor virtal servers, and then migrate the namespaces by sing Dfstil.exe. Using a third-party migration tool. Use a tool that can identify and fix broken links, sch as OLE links or application-related links in the registry.
128 178 Chapter 2 Designing and Deploying File Servers No migration plan is complete ntil yo develop and test back-ot procedres to follow if the migration fails at any stage in the process. Verify that yo can restore data to its previos state and location in the event that yo need to roll back the migration. The following sections describe additional risks to consider dring the migration. NTFS permissions When evalating migration methods, determine whether the methods spport migrating NTFS permissions. If yo se domain local grops to assign permissions to files and folders, members of those grops will have the same access to the files and folders after they are moved to the new server. However, if yo assign permissions to compter local grops, members of those grops cannot access the files after the migration. Either reconfigre permissions to se domain local grops before the migration, or plan to create new compter local grops on the target server and give those grops the appropriate permissions to the files after the migration is complete. NTFS compression If yo se compression on the sorce servers, determine if yo still reqire compression on the target server. Hardware on the target server is typically more powerfl, with greater storage capacity. Therefore, compression might not be necessary, althogh yo do need to accont for the additional space reqired by the ncompressed data. Also, when yo copy compressed files from one server to another, the compression attribte is lost nless yo enable compression on the target volme. Files encrypted by sing EFS Migrating encrypted files has a nmber of risks. Only administrators who are EFS recovery agents can copy or move files that are encrypted by other sers. When these administrators copy or move encrypted files to a remote shared folder, the files are decrypted locally, transmitted in plaintext, and then re-encrypted on the target server only if the remote compter is trsted for delegation and the target volme ses NTFS. When the files are encrypted again on the target server, they have new file encryption keys that are encrypted by sing the administrator s pblic key, if it is available, or by sing a new pblic key, which EFS generates if the profile is navailable. As a reslt, the sers who originally encrypt the files are no longer able to access them. Therefore, do not copy or move encrypted files from one server to another; se a backp and restore method instead. Important When EFS recovery agents copy encrypted files to a target server that is not trsted for delegation, or to a target volme that ses FAT, the files become plaintext on the target server. For more information abot EFS recovery agents, see Designing a Pblic Key Infrastrctre in Designing and Deploying Directory and Secrity Services of this kit.
129 Deploying File Servers 179 Choosing a Migration Method Becase many migration methods reqire downtime to move data, migrating data can be challenging in the following sitations: The data has high ptime reqirements as specified by SLAs in yor organization, and the migration method might reqire more downtime than the SLA allows. Users expect to be able to access that data throghot their workday or at all times. When planning yor migration, consider the advantages and disadvantages of each migration method that is available to yo, sch as those described in the following sections. Yor organization might se other methods not described here. Backp and restore data This method involves making a backp of the sorce server and restoring the data on a target server. Depending on yor backp method and hardware, this method might involve moving tapes from one backp device to another (for direct-attached backp hardware) or restoring data from a tape library. Advantages: Large organizations rotinely back p and restore data, so yo can se existing backps to begin the migration. Backing p and restoring data does not impact network bandwidth when it is performed on the local servers. Yo can se this method to migrate encrypted files. Disadvantages: Both the sorce server and the target server mst spport the backp device and its related software. If sers are accessing files dring the backp, yo mst make arrangements to migrate files that change while the backp occrs. Backp programs do not migrate shared folder information to the destination server. As a reslt, folders that are shared on the sorce server are not shared when yo restore them on the destination server. Yo mst share the destination folders manally or by sing scripts, and then se Permcopy.exe, which is available on the Windows Server 2003 Deployment Kit companion CD, to migrate any share permissions. For more information abot Permcopy.exe, click Tools in Help and Spport Center for Windows Server 2003, and then click Windows Resorce Kit Tools.
130 180 Chapter 2 Designing and Deploying File Servers Use third-party migration tools, hardware, or services provided by hardware vendors A nmber of third-party migration tools can atomate the entire migration process. These migration tools typically offer featres sch as bandwidth throttling, schedling, incremental file migration, and monitoring. Many hardware vendors also provide hardware soltions and services that can assist yo in migrating data. Copy the data This method involves sing Robocopy.exe to copy data from one server to another and then sing Permcopy.exe to migrate share permissions. Use the /SEC parameter in Robocopy.exe to copy NTFS permissions from the sorce folder to the destination folder. After yo finish moving the data, share the folders on the target server (either manally or by sing scripts), and then se Permcopy.exe to copy share permissions from the sorce server to the target server. Permcopy.exe and Robocopy.exe are available on the Windows Server 2003 Deployment Kit companion CD. For more information abot Permcopy.exe and Robocopy.exe, click Tools in Help and Spport Center for Windows Server 2003, and then click Windows Resorce Kit Tools. Advantages: These tools are available as part of the Windows Server 2003 Deployment Kit. This method is simple if yo are migrating a small amont of data. Robocopy.exe gives yo a nmber of options for migrating data, inclding the following: Using file names, wildcard characters, paths, or file attribtes to inclde or exclde sorce files as candidates for migrating. Controlling the nmber of times that Robocopy.exe retries an operation after encontering a recoverable network error. Schedling copy jobs to rn atomatically. Disadvantages: Files are copied across the network, which can impact network bandwidth. This method shold not be sed to migrate encrypted files. If sers are accessing files as the files are copied, yo mst make arrangements to migrate files that change while the copy occrs. This method might take a long time to complete if yo are migrating large amonts of data. This method does not migrate shared folder information to the destination server. As a reslt, folders that are shared on the sorce server are not shared when yo copy or restore them on the destination server. Yo mst share the destination folders manally or by sing scripts, and then se Permcopy.exe to migrate any share permissions.
131 Deploying File Servers 181 Completing the Migration After yo migrate data, verify that sers can access the data on the new servers by completing the following tasks: Verify that NTFS and share permissions are migrated correctly. If a logon script maps drives to the old file servers, pdate the scripts so that they point to the new file servers. If the migrated folders are DFS link targets, pdate the link information so that it points to the new file server. If the migrated folders are redirected My Docments folders, se Grop Policy to specify the new file server. If yo migrate data to a clstered file server, create the necessary File Share resorces. Deploying DFS Before yo pgrade a server containing a DFS root, ensre that the namespace will be available after the pgrade. After Windows Server 2003 is installed, either throgh a clean installation or pgrade, yo can create new DFS namespaces or migrate existing DFS namespaces to servers rnning Windows Server If yo create a new namespace, yo can se the information provided by the design team in the DFS Configration Worksheet (Sdcfsv_1.xls). Upgrading Servers That Contain DFS Namespaces If a file server contains existing DFS roots, they are converted as follows: When yo pgrade a server rnning Windows NT 4.0 to Windows Server 2003, any DFS roots are converted to Windows Server 2003 stand-alone DFS roots. When yo pgrade a server rnning Windows 2000 to Windows Server 2003, stand-alone DFS roots and domain-based DFS roots are converted to Windows Server 2003 stand-alone DFS roots and domain-based DFS roots, respectively.
132 182 Chapter 2 Designing and Deploying File Servers In the following scenarios, DFS roots are not available after pgrade: If yo pgrade a server that hosts a root on a FAT volme, the namespace is navailable ntil yo convert the volme to NTFS. If yo are rnning a prerelease version of Windows Server 2003, Standard Edition, and that server hosts mltiple DFS roots, only one of those roots will be available after the pgrade. The other roots are navailable becase servers rnning Windows Server 2003, Standard Edition spport only one root per server. To work arond this isse, yo can do either of the following: Before pgrading to Windows Server 2003, Standard Edition, se Dfstil.exe to export all bt one of the namespaces to text files, and then remove the roots for the namespaces yo exported. After yo complete the pgrades, se Dfstil.exe to import each namespace to a separate server rnning Windows Server 2003, Standard Edition. Upgrade to Windows Server 2003, Enterprise Edition or Windows Server 2003, Datacenter Edition, which both spport mltiple roots per server. If yo do not remove the additional roots before pgrading to Windows Server 2003, Standard Server, take the following steps to remove the extra roots from the server by sing Dfstil.exe: To remove domain-based DFS roots If the domain-based DFS root has mltiple root targets, yo mst repeat this procedre for every root target. The DFS service will be briefly navailable when the service is stopped and restarted, so perform this procedre dring a period of low namespace sage. 1. Use the /UnmapFtRoot parameter in Dfstil.exe to remove the extra roots from the server. 2. Use the /Clean parameter in Dfstil.exe to remove the root-related registry entries from the server. 3. At the command prompt, type net stop dfs & net start dfs To remove stand-alone DFS roots Use the /Clean parameter in Dfstil.exe to remove the root-related registry entries from the server. Delegating the Administration of DFS Namespaces Use the procedres below to allow members of the local Administrators grop on each root server to create and manage domain-based DFS namespaces. For more information abot delegating permission to manage a DFS namespace, see Designing a DFS Namespace earlier in this chapter.
133 Deploying File Servers 183 The following procedre grants the selected ser the ability to create new DFS namespaces as well as administer existing ones. To delegate a ser to administer DFS 1. In the Active Directory Users and Compters snap-in, on the View men, click Advanced Featres. 2. In the console tree, doble-click the System folder to expand it. 3. Click the DFS-Configration folder. Any existing root objects appear in the details pane. 4. Right-click DFS-Configration, and then click Properties. 5. On the Secrity tab, click Add. 6. Type the name of the ser to whom yo want to delegate administrative rights, and then click OK. 7. Select the ser Fll Control permission, and then click OK. Use the following procedre to allow a ser to have DFS administrative permissions only within a single DFS namespace. To grant a ser permission to administer only a single DFS namespace 1. In the Active Directory Users and Compters snap-in, on the View men, click Advanced Featres. 2. In the console tree, doble-click the System folder to expand it. 3. Click the DFS-Configration folder. Any existing root objects appear in the details pane. 4. Right-click the root object that yo want to allow the ser to administer, and then click Properties. 5. On the Secrity tab, click Add. 6. Type the name of the ser, and then click OK. 7. Verify that the ser is granted the Fll Control permission, and then click OK. Creating New DFS Namespaces on Stand-Alone Servers Use the Distribted File System snap-in or the command-line tools Dfscmd.exe and Dfstil.exe to create the root and link targets on stand-alone (nonclstered) file servers. The following topics in Help and Spport Center for Windows Server 2003 provide information on sing these tools: Checklist: Creating a distribted file system Dfscmd
134 184 Chapter 2 Designing and Deploying File Servers For more information abot installing Dfstil.exe, click Tools in Help and Spport Center for Windows Server 2003, and then click Windows Spport Tools. If yo plan to enable FRS on link targets in the DFS namespace, see Deploying FRS later in this chapter. Creating New DFS Namespaces on Clstered Servers Use the Clster Administrator snap-in to create a stand-alone DFS namespace on a clstered file server. For more information abot creating a DFS root on server clsters, see Create a clstermanaged file share in Help and Spport for Windows Server Migrating or Consolidating Existing Namespaces on New Servers If yo have namespaces on existing file servers that yo want to consolidate onto a file server that is rnning Windows Server 2003, Enterprise Edition or Windows Server 2003, Datacenter Edition, or if yo want to move a namespace from one server to another, yo can se the Dfstil.exe spport tool to export the namespace from the sorce server to the destination server. In the following example, an administrator wants to migrate the following namespaces on different servers to a single server rnning Windows Server 2003, Enterprise Edition. \\NT4SVR\Marketing (a stand-alone DFS root on a server rnning Windows NT Server 4.0) \\W2KSVR\Pblic (a stand-alone DFS root on a server rnning Windows 2000 Server) First, the administrator creates the following stand-alone DFS roots on the server rnning Windows Server 2003, Enterprise Edition: \\NETSVR\Marketing \\NETSVR\Pblic Next, the administrator installs Windows Spport Tools from the Windows Server 2003 operating system CD and then ses the Dfstil.exe tool to rn the following commands: Dfstil /Root:\\NT4SVR\Marketing /export:nt4.txt Dfstil /Root:\\W2KSVR\Pblic /export:w2k.txt Finally, the administrator rns the following commands to import the namespaces onto the server rnning Windows Server 2003, Enterprise Edition: Dfstil /Root:\\NETSVR\Marketing /import:nt4.txt /set Dfstil /Root:\\NETSVR\Pblic /import:w2k.txt /set Using Dfstil.exe to Cstomize the Namespace Use the Dfstil.exe parameters listed in Table 2.22 to cstomize the namespace. For more information abot sing Dfstil.exe, in Help and Spport Center for Windows Server 2003, click Tools, and then click Windows Spport Tools.
135 Deploying File Servers 185 Table 2.22 Dfstil.exe Parameters Used to Cstomize the Namespace Cstomization Enable root scalability mode Add site information to root servers rnning Windows 2000 Server Remove site information from root servers rnning Windows 2000 Server Enable restricted same-site target selection Enable closest or least expensive target selection Dfstil.exe Parameter /RootScalability /UpdateWin2kStaticSiteTable /PrgeWin2kStaticSiteTable /InSite /SiteCosting Deploying FRS After yo have deployed a domain-based DFS namespace, yo are ready to deploy FRS. This section describes the following FRS deployment scenarios: Deploying a new replica set Adding a new replica member to an existing replica set This section also provides an overview of the tasks reqired to deploy each scenario. For detailed procedres for each scenario, see the worksheets specified in the relevant sections. The worksheets also provide information abot sing Sonar.exe to monitor the stats of yor FRS deployment. Sonar.exe is available on Windows Server 2003 Deployment Kit companion CD. For more information abot Sonar.exe, click Tools in Help and Spport Center for Windows Server 2003, and then click Windows Resorce Kit Tools. Deploying a New Replica Set If yo are deploying a new replica set, se the FRS Configration Worksheet (Sdcfsv_2.xls) that was completed by the file services design team to begin the deployment. If the design team did not se this job aid, yo will need the following information: The names of the link targets to be replicated. These link targets form the replica set. The FRS topology (ring, fll mesh, hb and spoke, or cstom) to se for each replica set. If the topology is cstom, yo also need the inbond and otbond connections for each replica member. The FRS replication schedle for each connection. The location and size of the staging directory. The connection priorities for each inbond connection.
136 186 Chapter 2 Designing and Deploying File Servers Use the following information to choose the appropriate FRS deployment scenario: See Deploying an Empty Replica Set later in this section if yo have two or more existing link targets on which yo want to enable replication and the link targets do not contain data. See Deploying a Replica Set with Existing Content later in this section if yo have two or more existing link targets that contain data and the link targets are crrently in se in yor organization. See Adding a New Member to an Existing Replica Set later in this chapter if yo have an existing replica set and yo want to add a new member. Deploying an Empty Replica Set This scenario reqires that yo have deployed yor domain-based DFS namespace bt yo do not have any files and folders in the link targets that yo plan to replicate. This scenario is the most efficient way to deploy FRS, becase replica members perform their join operation on an empty tree. When yo add files to the tree, FRS bilds a single staging file for each file in the tree and ses those files to sorce all direct otbond partners. Important When yo deploy a new replica set sing these scenarios, it is recommended that yo deploy two replica members connected by high-bandwidth links and then prestage additional members, especially if they are located in remote sites with slow-bandwidth connections. For more information abot adding members to a replica set, see Adding a New Member to an Existing Replica Set later in this chapter. Before yo begin, choose a procedre for either a standard topology (ring, hb and spoke, or fll mesh) or a cstom topology. Deploying a standard FRS topology To deploy a ring, hb and spoke, or fll mesh topology, perform the following tasks: 1. Disable referrals to the link targets to be replicated. 2. Configre the USN jornal. 3. Configre replication for a standard topology, and choose the staging directory location. 4. Adjst the size of the staging directory. 5. Verify that replication is working. 6. Set the initial replication schedle. 7. Configre filters to exclde files or folders from replication (optional). 8. Copy the data into the replica tree, and verify that the data is consistent. 9. Optimize the replication schedle (optional). 10. Enable referrals to the replicated link targets. 11. Configre connection priorities (optional).
137 Deploying File Servers 187 For a Word docment that provides detailed instrctions on completing each of these tasks, Deploying a Standard FRS Topology for an Empty Replica Set (Sdcfsv_3.doc) on the Windows Server 2003 Deployment Kit companion CD (or see Deploying a Standard FRS Topology for an Empty Replica Set on the Web at After yo complete these tasks, yo can notify sers that the DFS namespace is available. Deploying a cstom FRS topology To deploy a cstom FRS topology, perform the following tasks: 1. Disable referrals to the link targets to be replicated. 2. Configre the USN jornal. 3. Configre replication for a cstom topology, choose the staging directory location, and configre connection priorities. 4. Adjst the size of the staging directory. 5. Verify that replication is working. 6. Set the initial replication schedle (optional). 7. Configre filters to exclde files or folders from replication (optional). 8. Copy the data into the replica tree, and verify that the data is consistent. 9. Enable referrals to the replicated link targets. 10. Optimize the replication schedle (optional). For a Word docment that provides detailed instrctions on completing each of these tasks, see Deploying a Cstom FRS Topology for an Empty Replica Set (Sdcfsv_4.doc) on the Windows Server 2003 Deployment Kit companion CD (or see Deploying a Cstom FRS Topology for an Empty Replica Set on the Web at After yo complete these tasks, yo can notify sers that the DFS namespace is available. Deploying a Replica Set with Existing Content In this scenario, yo have deployed a DFS namespace with existing content in one or more link targets, bt yo are not sing FRS to keep those link targets synchronized. Users know abot and se the namespace, and they might be accessing files from the link targets. This scenario is more complex than deploying FRS in an empty directory tree for a nmber of reasons: Users or applications might have locks on files or folders, which can prevent FRS from originating otgoing changes and receiving incoming changes. If files exist on the initial master, FRS bilds a niqe staging file for each file in the tree for each direct otbond partner. In other words, each partner gets its own set of files, which is more disk I/O and disk space intensive. The files in the replica tree of the initial master become athoritative, which means that after replication completes, the replica tree on each member is identical to the replica tree on the initial master. For servers that are not the initial master, FRS moves any files that existed in the replica tree to a folder named NtFrs_PreExisting See EventLog.
138 188 Chapter 2 Designing and Deploying File Servers For these reasons, it is recommended that yo create a new link and link targets (essentially setting p an empty replica set), configre replication as desired, and copy the existing data into the new replica tree. After replication is complete, change the name of the link that is associated with the replica set so that sers can access the new replica set by sing the existing link name. In the following procedres, existing link refers to the link that already contains data in its link targets, and new link is the link that yo create with replicated link targets. To create a new link and link targets 1. If sers can modify files in the link targets, disable referrals to the link targets for the existing link, and then close all open files. 2. Create a new link, and then follow the procedre in one of the following docments to set p an empty replica set: Important This procedre reqires enogh disk space on each replica member to store two copies of the files one copy is the existing data, and the second copy is the data in the newly created replica tree. Deploying a Standard FRS Topology for an Empty Replica Set (Sdcfsv_3.doc) on the Windows Server 2003 Deployment Kit companion CD (or see Deploying a Standard FRS Topology for an Empty Replica Set on the Web at Deploying a Cstom FRS Topology for an Empty Replica Set (Sdcfsv_4.doc) on the Windows Server 2003 Deployment Kit companion CD (or see Deploying a Cstom FRS Topology for an Empty Replica Set on the Web at Be sre to disable referrals to the new link targets so that sers do not access them. 3. Copy the data to be replicated into the replica tree. This step is complete when the files are replicated sccessflly to all replica members. 4. In the Distribted File System snap-in, nder the existing link, add the same link targets that yo added nder the new link. Be sre to clear the Add this target to the replication set check box. 5. If yo have not done so already, disable referrals, and then close all open files so that sers are no longer accessing any files in the existing link targets. 6. Under the existing link, remove the link targets that are not replicated. After yo complete this step, the existing link and the new link have identical link targets. Figre 2.20 shows how two example links, Existing Link and New Link, appear in the Distribted File System snap-in at the end of this procedre.
139 Deploying File Servers 189 Figre 2.20 Two Links in the Distribted File System Snap-in Next, se the following procedre to change the link name that is associated with the new replica set to match the existing link name. To match the new link name with the existing link name 1. In the Active Directory Users and Compters snap-in, click the View men, and then click Advanced Featres. 2. In the console tree, nder the domain where the DFS root is located, navigate to System, File Replication Service, DFS Volmes. When yo expand DFS Volmes, yo shold see existing DFS replica sets, inclding the one that yo created in the previos procedre. The replica set is identified as rootname newlinkname. Identify the correct replica set before yo contine. 3. To change the name of the link that is associated with the replica set, right-click the replica set, and then click Rename. 4. After rootname, type the name of the existing link over the name of the new link. Figre 2.21 shows how the rootname newlink name appears at Step 2 and after Step 4. Figre 2.21 Changing the Link Name After Step 2 After Step 4 To complete the deployment, delete the new link. To delete the new link 1. In the Distribted File System snap-in, locate the new link. The new link shold no longer have replication enabled. It might be necessary to close and reopen the snap-in for the pdates to appear. 2. Right-click the new link, and then click Delete Link. 3. Enable referrals to the link targets for the existing link.
140 190 Chapter 2 Designing and Deploying File Servers Adding a New Member to an Existing Replica Set Before yo add a new member to an existing replica set, determine how to sorce the new member. Yo have two choices: Replicate the files to the new member across the network. When yo replicate files across the network to the new member, yo add the server as a link target within an existing replica set. When yo add the new member to the topology, yo can create a single inbond connection so that yo sorce from a specific server, sch as a server with fast connectivity, or yo can add a compter with redndant inbond connections where it sorces according to connection priority and schedle. Prestage the files on the new member. When yo prestage files, yo se a backp program to back p the replica tree and restore it on the new member. Using a backp program is reqired to preserve the file object IDs and secrity descriptors. (Command-line tools sch as Copy.exe, Xcopy.exe, and Robocopy.exe do not preserve these items, and they cannot be sed to prestage files.) After yo restore the files, FRS replicates to the new member any files that changed since the backp was created, ths minimizing the nmber of files that are replicated across the network. The method yo choose typically depends on the size of the replica set and the available network bandwidth. Yo shold replicate files over the network only if one of the following conditions exists: Yo have a high-bandwidth network, and yo can afford to se part of that bandwidth for the initial replication. Yo have a low-bandwidth network, and yo can afford to se that bandwidth for initial replication, and yo also have the time to wait for the initial replication to complete. If neither of these conditions exists, yo shold prestage the new member. The following sections describe three possible scenarios for adding a new replica member: Prestaging a new replica member to avoid replicating files across the network. Adding a new replica member that contains no content. In this scenario, files are replicated across the network. Adding a new replica member that contains a copy of the content. In this scenario, the new member has an existing copy of the files, bt these files are not prestaged. The files from the initial master are replicated across the network.
141 Deploying File Servers 191 Prestaging a New Replica Member In this scenario, yo have an existing replica set, and yo want to add a new replica member by prestaging it. After yo prestage the new member and enable replication, FRS moves the prestaged files in the replica tree on the new member to the NtFrs_PreExisting See_EventLog folder, bt FRS then moves back to the replica tree any files that have the same object ID and content as the files in the master replica set. FRS replicates across the network only the files that were added or changed since yo prestaged the files. Before yo can prestage a new replica member, one of the following events mst occr: At least seven days have passed since yo enabled replication between the first two members. Yo clear the otbond change log by modifying the registry on all direct pstream partners. To prestage a new replica member, perform the following tasks: 1. Configre the USN jornal. 2. Prestage the new replica member. 3. Create a new link target, add it to the replica set, and then specify the staging directory location. 4. Disable referrals to the new link target. 5. Configre connection objects, the initial schedle, and connection priorities (cstom topologies only). 6. Adjst the size of the staging directory. 7. Verify that replication is working on the new member. 8. Enable referrals to the link target. 9. Optimize the replication schedle. 10. Configre connection priorities (standard topologies only). For a Word docment to assist yo in completing each of these tasks, see Prestaging a New Replica Member (Sdcfsv_5.doc) on the Windows Server 2003 Deployment Kit companion CD (or see Pre-staging a New Replica Member on the Web at After yo complete these tasks, yo can notify sers that the DFS namespace is available.
142 192 Chapter 2 Designing and Deploying File Servers Adding a New Replica Member That Contains No Content In this scenario, the new replica member does not contain a copy of the replica tree. Data will replicate across the network according to the replication schedle. To add a new replica member that contains no content, perform the following tasks: 1. Configre the USN jornal. 2. Create a new link target, add it to the replica set, and then specify the staging directory location. 3. Disable referrals to the new link target. 4. Configre connection objects, the initial schedle, and connection priorities (cstom topologies only). 5. Adjst the size of the staging directory. 6. Verify that replication is working on the new member. 7. Enable referrals to the link target. 8. Optimize the replication schedle (optional). 9. Configre connection priorities (standard topologies only). For a Word docment to assist yo in completing each of these tasks, see Adding a New Replica Member that Contains No Content (Sdcfsv_6.doc) on the Windows Server 2003 Deployment Kit companion CD (or see Adding a New Replica Member that Contains No Content on the Web at After yo complete these tasks, yo can notify sers that the DFS namespace is available. Adding a New Replica Member That Contains a Copy of the Content In this scenario, the new replica member already contains a copy of the replica tree. Yo might have copied the data to the server manally (sing Robocopy, for example), bt yo have not prestaged the new member. (Remember that prestaging preserves the file object IDs and secrity descriptors.) Becase the data is not prestaged, the initial master replicates the entire replica tree to the new member, even if the new member already contains identical files. On the new replica member, FRS moves any files that existed in the replica tree to a folder named NtFrs_PreExisting See_EventLog. After replication completes, yo can either delete this folder or move any niqe files back into the replica tree.
143 Deploying File Servers 193 To add a new replica member that contains a copy of the content, perform the following tasks: 1. Follow the procedres in Adding a New Replica Member that Contains No Content (Sdcfsv_6.doc) on the Windows Server 2003 Deployment Kit companion CD (or see Adding a New Replica Member that Contains No Content on the Web at 2. After replication completes, locate the folder NtFrs_PreExisting See_EventLog on the new replica member. 3. Do one of the following: If the folder contains niqe files that are not part of the replica set, copy those files back into the replica tree. If yo do not want to save any of the files, delete the folder. Configring File Server Settings Many procedres for configring file server settings are provided in Help and Spport Center for Windows Server Table 2.23 lists sbjects and file server topics that can be sefl for configring file server settings. For best reslts in identifying Help topics by title, in Help and Spport Center, nder the Search box, click Set search options. Under Help Topics, select the Search in title only checkbox. Table 2.23 Help and Spport Center Topics Related to File Server Settings Sbject Sharing folders Enabling disk qotas Enabling shadow copies Setting NTFS permissions Enabling encryption on file servers Remotely managing file servers Managing disks and volmes Enabling encryption on clstered file servers Enabling client-side caching on clstered file servers Enabling shadow copies on clster storage Topic Title Share a drive or folder on the network Checklist: Setting p disk qotas Checklist: Deploying shadow copies of shared folders Set, view, change, or remove permissions on files and folders Enable a remote server for file encryption Using Web Interface for Remote Administration Disk Management overview and DiskPart Create a clster-managed encrypted file share Set client-side caching for a File Share resorce Enable Shadow Copies of Shared Folders in a clster
144 194 Chapter 2 Designing and Deploying File Servers Additional Resorces Related Information Hosting Applications with Terminal Server in this book. Planning for High Availability and Scalability in this book. Designing and Deploying Server Clsters in this book. Deploying a Managed Software Environment in Designing a Managed Environment of this kit. Implementing User State Management in Designing a Managed Environment of this kit. The Distribted Services Gide of the Windows Server 2003 Resorce Kit (or see the Distribted Services Gide on the Web at for more information abot the Distribted File System and the File Replication service. The Server Management Gide of the Windows Server 2003 Resorce Kit (or see the Server Management Gide on the Web at for more information abot disk management and file systems. The Internetworking Gide in the Windows Server 2003 Resorce Kit (or see the Internetworking Gide on the Web at for information abot interoperability with NetWare and interoperability with UNIX. Deployment, Monitoring and Trobleshooting of the Windows 2000 File Replication Service Using the SONAR, TOPCHK, CONSTAT and IOLOGSUM Tools (Trobleshooting_frs.doc), inclded with the version of Sonar.exe that is available from the Free Tool Downloads link on the Web Resorces page at The File Services Commnity Center link on the Web Resorces page at for information abot how Windows server technologies deliver reliable file services that are essential to enterprise compting infrastrctres. The Windows Powered Network Attached Storage link on the Web Resorces page at The Storage Services link on the Web Resorces page at The File Services link on the Web Resorces page at The Microsoft SharePoint Prodcts and Technologies link on the Web Resorces pageat for information abot sharing information within organizations and over the Internet.
145 Additional Resorces 195 Related Job Aids DFS Configration Worksheet (Sdcfsv_1.xls) on the Windows Server 2003 Deployment Kit companion CD (or see DFS Configration Worksheet on the Web at FRS Configration Worksheet (Sdcfsv_2.xls) on the Windows Server 2003 Deployment Kit companion CD (or see FRS Configration Worksheet on the Web at Deploying a Standard FRS Topology for an Empty Replica Set (Sdcfsv_3.doc) on the Windows Server 2003 Deployment Kit companion CD (or see Deploying a Standard FRS Topology for an Empty Replica Set on the Web at Deploying a Cstom FRS Topology for an Empty Replica Set (Sdcfsv_4.doc) on the Windows Server 2003 Deployment Kit companion CD (or see Deploying a Cstom FRS Topology for an Empty Replica Set on the Web at Prestaging a New Replica Member (Sdcfsv_5.doc) on the Windows Server 2003 Deployment Kit companion CD (or see Prestaging a New Replica Member on the Web at Adding a New Replica Member That Contains No Content (Sdcfsv_6.doc) on the Windows Server 2003 Deployment Kit companion CD (or see Adding a New Replica Member That Contains No Content on the Web at Shadow Copy and Disk Qota Configration Worksheet (Sdcfsv_7.xls) on the Windows Server 2003 Deployment Kit companion CD (or see DFS Configration Worksheet on the Web at Related Help Topics For best reslts in identifying Help topics by title, in Help and Spport Center, nder the Search box, click Set search options. Under Help Topics, select the Search in title only checkbox. Disk Management overview and DiskPart in Help and Spport Center for Windows Server 2003 for information abot managing disks and volmes. Extend a basic volme in Help and Spport Center for Windows Server Using NTFS monted drives and Create a monted drive in Help and Spport Center for Windows Server Shadow Copies of Shared Folders in Help and Spport Center for Windows Server Vssadmin and Schtasks in Help and Spport Center for Windows Server 2003 for information abot schedling shadow copies from the command line. Checklist: Setting p disk qotas in Help and Spport Center for Windows Server Share a drive or folder on the network in Help and Spport Center for Windows Server Pblish a Shared Folder in Help and Spport Center for Windows Server 2003 for information abot pblishing shared folders in Active Directory.
146 196 Chapter 2 Designing and Deploying File Servers Offline Files overview, Offline settings for shared resorces, and Make a file or folder available offline in Help and Spport Center for Windows Server Permissions on a file server in Help and Spport Center for Windows Server Set, view, change, or remove permissions on files and folders in Help and Spport Center for Windows Server Enable a remote server for file encryption in Help and Spport Center for Windows Server Encrypting and decrypting data and Internet Information Services (IIS) 6.0 overview in Help and Spport Center for Windows Server 2003 for information abot EFS and sing WebDAV folders to store encrypted files. Install Windows Spport Tools in Help and Spport Center for Windows Server 2003 for information abot installing Windows Spport Tools, inclding Dfstil.exe. Using Web Interface for Remote Administration in Help and Spport Center for Windows Server Chkdsk in Help and Spport Center for Windows Server 2003 for information abot rnning Chkdsk.exe. Checklist: Creating a distribted file system and Dfscmd in Help and Spport Center for Windows Server 2003 for information abot creating a DFS namespace. Installing and pgrading on clster nodes in Help and Spport Center for Windows Server 2003, Enterprise Edition or Windows Server 2003, Datacenter Edition for comprehensive information abot choosing the clster installation method and performing the actal installation. Managing a server clster from the command line in Help and Spport Center for Windows Server Create a clster-managed file share in Help and Spport for Windows Server Create a clster-managed encrypted file share in Help and Spport Center for Windows Server 2003 for information abot enabling EFS on server clsters. Set client-side caching for a File Share resorce in Help and Spport Center for Windows Server 2003 for information abot configring client-side caching on a server clster. Using Shadow Copies of Shared Folders in a server clster and Enable Shadow Copies of Shared Folders in a clster in Help and Spport Center for Windows Server 2003 for indepth information abot sing shadow copies on server clsters. Change the Clster service accont password in Help and Spport Center for Windows Server 2003.
147 Additional Resorces 197 Enable Kerberos athentication for virtal servers in Help and Spport Center for Windows Server 2003 for information abot allowing anonymos access to specific file shares on a server clster. Backing p and restoring server clsters and Test clster failres and failover policies in Help and Spport Center for Windows Server Best practices for secring server clsters in Help and Spport Center for Windows Server Related Tools Dfscmd.exe Use Dfscmd.exe to create links and add link targets. For more information abot Dfscmd.exe, in Help and Spport Center for Windows Server 2003 click Tools, and then click Command-line reference A-Z. Dfstil.exe Use Dfstil.exe to configre and trobleshoot DFS namespaces. For more information abot Dfstil.exe, in Help and Spport Center for Windows Server 2003 click Tools, and then click Windows Spport Tools. DiskPart.exe Use DiskPart.exe to manage disks and volmes from the command line. For more information abot DiskPart.exe, in Help and Spport Center for Windows Server 2003 click Tools, and then click Command-line reference A-Z. Permcopy.exe Use Permcopy.exe to copy shared folder permissions from one shared folder to another. For more information abot Permcopy.exe, click Tools in Help and Spport Center for Windows Server 2003, and then click Windows Resorce Kit Tools. Robocopy.exe Use Robocopy.exe to maintain identical copies of a folder tree in mltiple locations. For more information abot Robocopy.exe, click Tools in Help and Spport Center for Windows Server 2003, and then click Windows Resorce Kit Tools. Sonar.exe Use Sonar.exe to monitor key statistics abot FRS members in a replica set. For more information abot Sonar.exe, click Tools in Help and Spport Center for Windows Server 2003, and then click Windows Resorce Kit Tools. Windows Server 2003 Administration Tools Pack Use the Windows Server 2003 Administration Tools Pack to remotely manage servers rnning Windows Server 2003 from compters rnning Windows XP. For more information abot installing this tools pack, see article Q304718, Administer Windows 2000 Based Compters Using Windows XP Professional Clients, in the Microsoft Knowledge Base. To find this article, see the Microsoft Knowledge Base link on the Web Resorces page at
148
Enabling Advanced Windows Server 2003 Active Directory Features
C H A P T E R 5 Enabling Advanced Windows Server 2003 Active Directory Featres The Microsoft Windows Server 2003 Active Directory directory service enables yo to introdce advanced featres into yor environment
aééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë
C H A P T E R 7 aééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë Deploying Microsoft Windows Server 2003 s involves creating new geographically based child domains nder the forest root domain. Deploying
Deploying Network Load Balancing
C H A P T E R 9 Deploying Network Load Balancing After completing the design for the applications and services in yor Network Load Balancing clster, yo are ready to deploy the clster rnning the Microsoft
Planning a Managed Environment
C H A P T E R 1 Planning a Managed Environment Many organizations are moving towards a highly managed compting environment based on a configration management infrastrctre that is designed to redce the
Planning an Active Directory Deployment Project
C H A P T E R 1 Planning an Active Directory Deployment Project When yo deploy the Microsoft Windows Server 2003 Active Directory directory service in yor environment, yo can take advantage of the centralized,
High Availability for Internet Information Server Using Double-Take 4.x
High Availability for Internet Information Server Using Doble-Take 4.x High Availability for Internet Information Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks
High Availability for Microsoft SQL Server Using Double-Take 4.x
High Availability for Microsoft SQL Server Using Doble-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks of Network
Designing an Authentication Strategy
C H A P T E R 1 4 Designing an Athentication Strategy Most organizations need to spport seamless access to the network for mltiple types of sers, sch as workers in offices, employees who are traveling,
EMC ViPR Analytics Pack for VMware vcenter Operations Management Suite
EMC ViPR Analytics Pack for VMware vcenter Operations Management Site Version 1.1.0 Installation and Configration Gide 302-000-487 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished
EMC VNX Series Setting Up a Unisphere Management Station
EMC VNX Series Setting Up a Unisphere Management Station P/N 300-015-123 REV. 02 April, 2014 This docment describes the different types of Unisphere management stations and tells how to install and configre
Isilon OneFS. Version 7.1. Backup and recovery guide
Isilon OneFS Version 7.1 Backp and recovery gide Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished March, 2014 EMC believes the information in this pblication is accrate
Planning a Smart Card Deployment
C H A P T E R 1 7 Planning a Smart Card Deployment Smart card spport in Microsoft Windows Server 2003 enables yo to enhance the secrity of many critical fnctions, inclding client athentication, interactive
Designing a TCP/IP Network
C H A P T E R 1 Designing a TCP/IP Network The TCP/IP protocol site defines indstry standard networking protocols for data networks, inclding the Internet. Determining the best design and implementation
Technical Notes. PostgreSQL backups with NetWorker. Release number 1.0 302-001-174 REV 01. June 30, 2014. u Audience... 2. u Requirements...
PostgreSQL backps with NetWorker Release nmber 1.0 302-001-174 REV 01 Jne 30, 2014 Adience... 2 Reqirements... 2 Terminology... 2 PostgreSQL backp methodologies...2 PostgreSQL dmp backp... 3 Configring
Chapter 1. LAN Design
Chapter 1 LAN Design CCNA3-1 Chapter 1 Note for Instrctors These presentations are the reslt of a collaboration among the instrctors at St. Clair College in Windsor, Ontario. Thanks mst go ot to Rick Graziani
EMC Smarts SAM, IP, ESM, MPLS, VoIP, and NPM Managers
EMC Smarts SAM, IP, ESM, MPLS, VoIP, and NPM Managers Version 9.2.2 Spport Matrix 302-000-357 REV 02 Copyright 2013 EMC Corporation. All rights reserved. Pblished in USA. Pblished December, 2013 EMC believes
Introduction to HBase Schema Design
Introdction to HBase Schema Design Amandeep Khrana Amandeep Khrana is a Soltions Architect at Clodera and works on bilding soltions sing the Hadoop stack. He is also a co-athor of HBase in Action. Prior
EMC VNX Series. EMC Secure Remote Support for VNX. Version VNX1, VNX2 300-014-340 REV 03
EMC VNX Series Version VNX1, VNX2 EMC Secre Remote Spport for VNX 300-014-340 REV 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Jly, 2014 EMC believes the information
EMC Storage Analytics
EMC Storage Analytics Version 2.1 Installation and User Gide 300-014-858 09 Copyright 2013 EMC Corporation. All rights reserved. Pblished in USA. Pblished December, 2013 EMC believes the information in
GUIDELINE. Guideline for the Selection of Engineering Services
GUIDELINE Gideline for the Selection of Engineering Services 1998 Mission Statement: To govern the engineering profession while enhancing engineering practice and enhancing engineering cltre Pblished by
MVM-BVRM Video Recording Manager v2.22
Video MVM-BVRM Video Recording Manager v2.22 MVM-BVRM Video Recording Manager v2.22 www.boschsecrity.com Distribted storage and configrable load balancing iscsi disk array failover for extra reliability
EMC ViPR. Concepts Guide. Version 1.1.0 302-000-482 02
EMC ViPR Version 1.1.0 Concepts Gide 302-000-482 02 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is
Planning and Implementing An Optimized Private Cloud
W H I T E PA P E R Intelligent HPC Management Planning and Implementing An Optimized Private Clod Creating a Clod Environment That Maximizes Yor ROI Planning and Implementing An Optimized Private Clod
VRM Video Recording Manager v3.0
Video VRM Video Recording Manager v3.0 VRM Video Recording Manager v3.0 www.boschsecrity.com Distribted storage and configrable load balancing iscsi disk array failover for extra reliability Used with
EMC PowerPath/VE Installation and Administration Guide
EMC PowerPath/VE Installation and Administration Gide Version 5.9 and Minor Releases for VMware vsphere P/N 302-000-236 REV 03 Copyright 2009-2014. All rights reserved. Pblished in USA. EMC believes the
EMC PowerPath Virtual Appliance
EMC PowerPath Virtal Appliance Version 1.2 Administration Gide P/N 302-000-475 REV 01 Copyright 2013 EMC Corporation. All rights reserved. Pblished in USA. Pblished October, 2013 EMC believes the information
EMC NetWorker. Performance Optimization Planning Guide. Version 8.2 302-000-697 REV 01
EMC NetWorker Version 8.2 Performance Optimization Planning Gide 302-000-697 REV 01 Copyright 2000-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Janary, 2015 EMC believes the information
Firewall Feature Overview
PALO ALTO NETWORKS: Firewall Featre Overview Firewall Featre Overview Palo Alto Networks family of next generation firewalls delivers nprecedented visibility and control of applications, sers and content
5 Using Your Verbatim Autodialer
5 Using Yor Verbatim Atodialer 5.1 Placing Inqiry Calls to the Verbatim Atodialer ( Yo may call the Verbatim atodialer at any time from any phone. The nit will wait the programmed nmber of rings before
7 Help Desk Tools. Key Findings. The Automated Help Desk
7 Help Desk Tools Or Age of Anxiety is, in great part, the reslt of trying to do today s jobs with yesterday s tools. Marshall McLhan Key Findings Help desk atomation featres are common and are sally part
EMC Data Domain Operating System
EMC Data Domain Operating System Version 5.4 Administration Gide 302-000-072 REV. 06 Copyright 2009-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished September, 2014 EMC believes the
CRM Customer Relationship Management. Customer Relationship Management
CRM Cstomer Relationship Management Farley Beaton Virginia Department of Taxation Discssion Areas TAX/AMS Partnership Project Backgrond Cstomer Relationship Management Secre Messaging Lessons Learned 2
Galvin s All Things Enterprise
Galvin s All Things Enterprise The State of the Clod, Part 2 PETER BAER GALVIN Peter Baer Galvin is the CTO for Corporate Technologies, a premier systems integrator and VAR (www.cptech. com). Before that,
VRM Video Recording Manager
Video VRM Video Recording Manager VRM Video Recording Manager www.boschsecrity.com Distribted storage and configrable load balancing iscsi disk array failover for extra reliability Used with all Bosch
EMC Storage Resource Management Suite
EMC Storage Resorce Management Site Version 3.0.2.0 Installation and Configration Gide PN 302-000-859 REV 02 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished April, 2014
Corporate performance: What do investors want to know? Innovate your way to clearer financial reporting
www.pwc.com Corporate performance: What do investors want to know? Innovate yor way to clearer financial reporting October 2014 PwC I Innovate yor way to clearer financial reporting t 1 Contents Introdction
HSBC Internet Banking. Combined Product Disclosure Statement and Supplementary Product Disclosure Statement
HSBC Internet Banking Combined Prodct Disclosre Statement and Spplementary Prodct Disclosre Statement AN IMPORTANT MESSAGE FOR HSBC CUSTOMERS NOTICE OF CHANGE For HSBC Internet Banking Combined Prodct
Position paper smart city. economics. a multi-sided approach to financing the smart city. Your business technologists.
Position paper smart city economics a mlti-sided approach to financing the smart city Yor bsiness technologists. Powering progress From idea to reality The hman race is becoming increasingly rbanised so
Isilon OneFS. Version 7.1. Web Administration Guide
Isilon OneFS Version 7.1 Web Administration Gide Copyright 2001-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished March, 2014 EMC believes the information in this pblication is accrate
NAPA TRAINING PROGRAMS FOR:
NAPA TRAINING PROGRAMS FOR: Employees Otside Sales Store Managers Store Owners See NEW ecatalog Inside O V E R V I E W 2010_StoreTrainingBrochre_SinglePg.indd 1 5/25/10 12:39:32 PM Welcome 2010 Store Training
Opening the Door to Your New Home
Opening the Door to Yor New Home A Gide to Bying and Financing. Contents Navigating Yor Way to Home Ownership...1 Getting Started...3 Finding Yor Home...9 Finalizing Yor Financing...12 Final Closing...13
Contents Welcome to FOXTEL iq2...5 For your safety...6 Getting Started...7 Playlist... 51 Active...53 Setup...54 FOXTEL Guide...18 ON DEMAND...
Contents Welcome to FOXTEL iq2...5 The FOXTEL iq2...5 Updates to FOXTEL iq2...5 Getting in toch with FOXTEL...5 For yor safety...6 Getting Started...7 Switching the FOXTEL iq2 on and off...7 Changing channel...7
Purposefully Engineered High-Performing Income Protection
The Intelligent Choice for Disability Income Insrance Prposeflly Engineered High-Performing Income Protection Keeping Income strong We engineer or disability income prodcts with featres that deliver benefits
Facilities. Car Parking and Permit Allocation Policy
Facilities Car Parking and Permit Allocation Policy Facilities Car Parking and Permit Allocation Policy Contents Page 1 Introdction....................................................2 2.0 Application
Kentucky Deferred Compensation (KDC) Program Summary
Kentcky Deferred Compensation (KDC) Program Smmary Smmary and Highlights of the Kentcky Deferred Compensation (KDC) Program Simple. Smart. For yo. For life. 457 Plan 401(k) Plan Roth 401(k) Deemed Roth
BIS - Overview and basic package V4.0
Engineered Soltions BIS - Overview and basic package V4.0 BIS - Overview and basic package V4.0 www.boschsecrity.com Complete enterprise management for efficient, integrated bilding and secrity management
A guide to safety recalls in the used vehicle industry GUIDE
A gide to safety recalls in the sed vehicle indstry GUIDE Definitions Aftermarket parts means any prodct manfactred to be fitted to a vehicle after it has left the vehicle manfactrer s prodction line.
BIS - Overview and basic package V2.5
Engineered Soltions BIS - Overview and basic package V2.5 BIS - Overview and basic package V2.5 www.boschsecrity.com Complete enterprise management for efficient, integrated bilding and secrity management
9 Setting a Course: Goals for the Help Desk
IT Help Desk in Higher Edcation ECAR Research Stdy 8, 2007 9 Setting a Corse: Goals for the Help Desk First say to yorself what yo wold be; and then do what yo have to do. Epictets Key Findings Majorities
ASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks
ASAND: Asynchronos Slot Assignment and Neighbor Discovery Protocol for Wireless Networks Fikret Sivrikaya, Costas Bsch, Malik Magdon-Ismail, Bülent Yener Compter Science Department, Rensselaer Polytechnic
Standard. 8029HEPTA DataCenter. Because every fraction of a second counts. network synchronization requiring minimum space. hopf Elektronik GmbH
8029HEPTA DataCenter Standard Becase every fraction of a second conts network synchronization reqiring minimm space hopf Elektronik GmbH Nottebohmstraße 41 58511 Lüdenscheid Germany Phone: +49 (0)2351
Introducing Revenue Cycle Optimization! STI Provides More Options Than Any Other Software Vendor. ChartMaker Clinical 3.7
Introdcing Revene Cycle Optimization! STI Provides More Options Than Any Other Software Vendor ChartMaker Clinical 3.7 2011 Amblatory EHR + Cardiovasclar Medicine + Child Health STI Provides More Choices
Apache Hadoop. The Scalability Update. Source of Innovation
FILE SYSTEMS Apache Hadoop The Scalability Update KONSTANTIN V. SHVACHKO Konstantin V. Shvachko is a veteran Hadoop developer. He is a principal Hadoop architect at ebay. Konstantin specializes in efficient
Analog Telephones. User Guide. BusinessPhone Communication Platform
Analog Telephones BsinessPhone Commnication Platform User Gide Cover Page Graphic Place the graphic directly on the page, do not care abot ptting it in the text flow. Select Graphics > Properties and make
FINANCIAL FITNESS SELECTING A CREDIT CARD. Fact Sheet
FINANCIAL FITNESS Fact Sheet Janary 1998 FL/FF-02 SELECTING A CREDIT CARD Liz Gorham, Ph.D., AFC Assistant Professor and Family Resorce Management Specialist, Utah State University Marsha A. Goetting,
Preparing your heavy vehicle for brake test
GUIDE Preparing yor heavy vehicle for brake test A best practice gide Saving lives, safer roads, ctting crime, protecting the environment Breaking the braking myth Some people believe that a locked wheel
Anatomy of SIP Attacks
Anatomy of SIP Attacks João M. Ceron, Klas Steding-Jessen, and Cristine Hoepers João Marcelo Ceron is a Secrity Analyst at CERT.br/NIC.br. He holds a master s degree from Federal University of Rio Grande
CRM Customer Relationship Management. Customer Relationship Management
CRM Cstomer Relationship Management Kenneth W. Thorson Tax Commissioner Virginia Department of Taxation Discssion Areas TAX/AMS Partnership Project Backgrond Cstomer Relationship Management Secre Messaging
Dialog 4106 Basic/Dialog 4147 Medium
Dialog 4106 Basic/Dialog 4147 Medim Analog Telephones for MD110 Commnication System User Gide Cover Page Graphic Place the graphic directly on the page, do not care abot ptting it in the text flow. Select
Practical Tips for Teaching Large Classes
Embracing Diversity: Toolkit for Creating Inclsive, Learning-Friendly Environments Specialized Booklet 2 Practical Tips for Teaching Large Classes A Teacher s Gide Practical Tips for Teaching Large Classes:
Closer Look at ACOs. Making the Most of Accountable Care Organizations (ACOs): What Advocates Need to Know
Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Updated
Form M-1 Report for Multiple Employer Welfare Arrangements (MEWAs) and Certain Entities Claiming Exception (ECEs)
U.S. Department of Labor Employee Benefits Secrity Administration Room N5511 200 Constittion Avene, NW Washington, DC 20210 P-450 Form M-1 Report for Mltiple Employer Welfare Arrangements (MEWAs) and Certain
iet ITSM: Comprehensive Solution for Continual Service Improvement
D ATA S H E E T iet ITSM: I T I L V 3 I n n o v at i v e U s e o f B e s t P ra c t i c e s ITIL v3 is the crrent version of the IT Infrastrctre Library. The focs of ITIL v3 is on the alignment of IT Services
personal income insurance product disclosure statement and policy Preparation date: 26/03/2004
personal income insrance prodct disclosre statement and policy Preparation date: 26/03/2004 personal income Insrer CGU Insrance Limited ABN 27 004 478 371 AFS Licence No. 238291 This is an important docment.
B5512 Control Panel. Intrusion Alarm Systems B5512 Control Panel. www.boschsecurity.com
Intrsion Alarm Systems B5512 Control Panel B5512 Control Panel www.boschsecrity.com Spports p to 48 points sing a combination of hardwired or wireless points for installation flexibility and p to 4 areas
Using GPU to Compute Options and Derivatives
Introdction Algorithmic Trading has created an increasing demand for high performance compting soltions within financial organizations. The actors of portfolio management and ris assessment have the obligation
Bosch Security Training Academy Training Course Catalogue 2015. uk.boschsecurity.com
Bosch Secrity Training Academy Training Corse Cataloge 2015 k.boschsecrity.com 2 Bosch Secrity Training Academy Training Corses 2015 Bosch Secrity Training Academy Training Corses 2015 3 Contents Enqiries
Effective governance to support medical revalidation
Effective governance to spport medical revalidation A handbook for boards and governing bodies This docment sets ot a view of the core elements of effective local governance of the systems that spport
Health Benefits Coverage Under Federal Law...
covers Labor Compliance 2014mx.pdf 1 11/19/2014 2:05:01 PM Compliance Assistance Gide Health Benefits Coverage Under Federal Law... The Affordable Care Act Health Insrance Portability and Accontability
! Virtual Machine Monitors (VMMs) are everywhere. ! An old idea, actually: developed by IBM in 60s and 70s. ! Today. ! Resource utilization
Lectre 17: Virtal Machines HW 4 De NOW CSE 120: Principles of Operating Systems Alex C. Snoeren Virtal Machine Monitors! Virtal Machine Monitors (VMMs) are everywhere Indstry commitment» Software: VMware,
f.airnet DECT over IP System
The modlar IP commnication system for voice and messaging with the greatest mobility: flexible, easy to maintain, expandable. Fnkwerk Secrity Commnications For s, efficient commnication is vital. New:
A Message from the CEO
October 2007 A Message from the CEO For the past 53 years, we have been recognized by or logo, name, competitive rates, and qality member service. All these have been vital to the strength of or organization.
The Role of the Community Occupational Therapist
Ceredigion Conty Concil Social Services Department The Role of the Commnity Occpational Therapist...taking care to make a difference Large Print or other format/medim are available on reqest please telephone
