Under the Hood: Storage and Advanced Application Development Brian Dewey DAT406 Group Program Manager Microsoft Corporation.

Slides:



Advertisements
Similar presentations
The Zebra Striped Network Filesystem. Approach Increase throughput, reliability by striping file data across multiple servers Data from each client is.
Advertisements

Active Directory Disaster Recovery Paul Simmons Support Engineer Directory Services Microsoft Corporation.
G Robert Grimm New York University Disconnected Operation in the Coda File System.
Multi-PC, Networked, Broadband Households US: 19.2 M, Globally: 40+ M and growing Source: Microsoft Primary Research CountryHouseholds (millions) Broadband.
Windows XP File System Management Group D. 3 Layers of Drivers Filter Drivers Filter Drivers –Virus protection, compression, encryption File System Drivers.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Grow strong branches with TradeWeb and the Microsoft ® Branch Office Solution.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
1 of 6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
CS Nicholis Bufmack Secure Storage Servers Secure Storage Servers An Intrusion Recovery System.
Chapter 12 File Management Systems
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
1 of 7 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
Recovery Techniques in Distributed Databases Naveen Jones December 5, 2011.
Advanced Deployment Topics – MSI Enhancements Om Sharma Program Manager, Windows Installer Microsoft Corporation.
Team CMD Distributed Systems Team Report 2 1/17/07 C:\>members Corey Andalora Mike Adams Darren Stanley.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
SQL Server 2008 Implementation and Maintenance Chapter 7: Performing Backups and Restores.
Configuring File Services Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Configuring a File ServerConfigure a file server4.1 Using.
Windows Server 2003 R2 Vladimír Wojnar Microsoft Solutions Prague.
Course 6425A Module 9: Implementing an Active Directory Domain Services Maintenance Plan Presentation: 55 minutes Lab: 75 minutes This module helps students.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
Module 13: Configuring Availability of Network Resources and Content.
CSC 456 Operating Systems Seminar Presentation (11/13/2012) Leon Weingard, Liang Xin The Google File System.
Week 9 Objectives Securing Files and Folders Protecting Shared Files and Folders by Using Shadow Copies Configuring Network Printing.
Implementing File and Print Services
Chapter Fourteen Windows XP Professional Fault Tolerance.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Building Branch Office DFS and FRS Replication using Windows Server 2003 R2 Michael Kleef IT Pro Evangelist Microsoft Corporation SVR309.
Store, sync, and share your files
Distributed File Systems Overview  A file system is an abstract data type – an abstraction of a storage device.  A distributed file system is available.
Chapter 12: SYSVOL: Old & New BAI617. Chapter Topics What is SysVol? Understanding File Replication System (FRS) Understanding 2008 R2 Distributed.
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
Presenters: Rezan Amiri Sahar Delroshan
Configuring Data Protection Chapter 12 powered by dj.
Oracle's Distributed Database Bora Yasa. Definition A Distributed Database is a set of databases stored on multiple computers at different locations and.
Configuring File Services. Using the Distributed File System Larger enterprises typically use more file servers Used to improve network performce Reduce.
Module 4.0: File Systems File is a contiguous logical address space.
By Shruti poundarik.  Data Objects and Files are replicated to increase system performance and availability.  Increased system performance achieved.
Caching Consistency and Concurrency Control Contact: Dingshan He
1 MSRBot Web Crawler Dennis Fetterly Microsoft Research Silicon Valley Lab © Microsoft Corporation.
Distributed File Systems Architecture – 11.1 Processes – 11.2 Communication – 11.3 Naming – 11.4.
Connect with life Vinod Kumar Technology Evangelist - Microsoft
Service Pack 2 System Center Configuration Manager 2007.
The Microsoft Technical Roadshow 2006 Making Your Life Easier With Windows Server 2003 R2 Melville Thomson IT Pro Evangelist
Making Your Life Easier with Windows Server 2003 R2 Troy Kirkland Senior Consultant Microsoft Services Microsoft NZ.
Introduction to AFS IMSA Intersession 2003 An Overview of AFS Brian Sebby, IMSA ’96 Copyright 2003 by Brian Sebby, Copies of these slides.
1 Chapter Overview Understanding Shared Folders Planning, Sharing, and Connecting to Shared Folders Combining Shared Folder Permissions and NTFS Permissions.
The 2007 Microsoft Office System Servers Enterprise Content Management, Workflow and Forms Martin Parry Developer and Platform Group, Microsoft Ltd
Praveen Srivatsa Director| AstrhaSoft Consulting blogs.asthrasoft.com/praveens |
Chapter Five Distributed file systems. 2 Contents Distributed file system design Distributed file system implementation Trends in distributed file systems.
BACKUP AND RESTORE. The main area to be consider when designing a backup strategy Which information should be backed up Which technology should be backed.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
File-System Management
Introduction to SQL Server Management for the Non-DBA
湖南大学-信息科学与工程学院-计算机与科学系
TechEd /15/2019 5:30 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Upgrading Your Private Cloud with Windows Server 2012 R2
2016 REPORT.
Andrew Fryer Microsoft UK
AWS S3 Cloud Backup Licensing per system Starting at $79 per year.
2016 REPORT.
Presentation transcript:

Under the Hood: Storage and Advanced Application Development Brian Dewey DAT406 Group Program Manager Microsoft Corporation

2 Advanced Storage Applications PlatformSolution System Protection Points Transactions Windows Backup System Restore “Previous versions” Trustworthy Symbolic links NFSCross-Platform Remote Differential Compression DFS PC-PC Sync Offline files Distributed

3 What Is RDC? An algorithm to copy just the differences between two files over a network A library and SDK for Windows that let you add differential copy to your application An awesome way to reduce bandwidth used by distributed applications

4 RDC In Action

5 Overview Of The Core Algorithm The files are divided into variable length chunks based on their contents Fingerprint function computed based on a trailing window of the file’s contents (H3 or Rabin) Modifications affect only small number of chunks Hashes (MD4) are computed for each chunk, on both server and client Strong signature for entire file deals with collisions The server transmits the list of strong hashes to the client For large files, the algorithm is applied recursively at this point The client assembles file by using existing chunks from old file and requesting missing chunks Original file Updated file MD4 21 … MD4 25 Fetch new chunks 3, 4 Updated file The quick fox jumped over the lazy brown dog. the fox jumping over him. “The brown dog was” “so lazy that he …” copy ClientServer MD4 21 MD4 22 MD4 23 MD4 24 MD4 25 MD4 11 MD4 12 MD4 13 MD4 14 Request file The quick fox jumped over the lazy brown dog. The dog was so lazy that he didn’t notice the fox jumping over him. The quick fox jumped over the lazy brown dog. The brown dog was the fox jumping over him. so lazy that he didn’t notice The quick fox jumped over the lazy brown dog. The brown dog was the fox jumping over him. so lazy that he didn’t notice [use recursion]

6 RDC Sample ServerServerClientClient RdcSdkTestClient.exe RdcSdkTestServer.dll Msrdc.dll Msrdc.dllDCOM Source Seed Target Simplest application of RDC – no advanced tricks Will be in Beta 2 SDK – not today’s Contact to get started early

7 Overview Of The Core Algorithm The files are divided into variable length chunks based on their contents Fingerprint function computed based on a trailing window of the file’s contents (H3 or Rabin) Modifications affect only small number of chunks Hashes (MD4) are computed for each chunk, on both server and client The server transmits the list of strong hashes to the client The client assembles file by using existing chunks from old file and requesting missing chunks Original file Updated file MD4 21 … MD4 25 Fetch new chunks 3, 4 Updated file The quick fox jumped over the lazy brown dog. the fox jumping over him. “The brown dog was” “so lazy that he …” copy ClientServer MD4 21 MD4 22 MD4 23 MD4 24 MD4 25 MD4 11 MD4 12 MD4 13 MD4 14 Request file The quick fox jumped over the lazy brown dog. The dog was so lazy that he didn’t notice the fox jumping over him. The quick fox jumped over the lazy brown dog. The brown dog was the fox jumping over him. so lazy that he didn’t notice The quick fox jumped over the lazy brown dog. The brown dog was the fox jumping over him. so lazy that he didn’t notice [use recursion]

8 Tips For Using RDC Target file verification using a strong hash Do regular dictionary compression on traffic Cache signatures Multiple seed files Use recursion Batch needs Transfer multiple files in parallel Tune, tune, tune

9 Symbolic Links Symbolic links let one file/directory transparently redirect to another file/directory by name Example: C:\public\link can refer to: C:\Users\BillG\Documents – “absolute” link..\..\Users\BillG\Documents – “relative” link \\machine\Users\BillG\Documents\\machine\Users\BillG\Documents -- “remote” link \\machine\Users\BillG\Documents

10 Symbolic Links In Action

11 C:\Users\BillG\Documents\link\file.txt C:\Users\SteveB\Documents\Shared\file.txt Under the Hood: Symbolic Links link -> C:\Users\SteveB\Documents\Shared (Stored as NTFS reparse point) C:\Users\BillG\Documents\link

12 C:\Users\BillG\Documents\..\..\public\documents\file.txt C:\Users\public\documents\file.txt Under the Hood: Symbolic Links C:\Users\BillG\Documents\link\file.txt link ->..\..\public\documents link

13 Symbolic Link Tips Know what functions work on the link and what work on the target General rule: “Data” operations work on the target, “metadata” on the link Data: Open, copy, modify Metadata: Delete, rename Currently documented on MSDN Use relative symbolic links when you copy subtrees Remember: Links evaluated on the client Be very careful with name parsing \\machine\public\directory\file.txt\\machine\public\directory\file.txt might not be a file on \\machine... \\machine \\machine\public\directory\file.txt \\machine

14 System Protection Points Extension of “shadow copy” technology from Windows Server 2003 Shadow copies are copies of all data on disk frozen at a point in time Copy-on-write ensures minimal physical disk space consumption Single disk shadow copy with multiple uses System Restore “Safe documents” “Safe system” Single document recovery

15 System Protection Points In Action

16 System Protection Point Tips Shadow copies may be reclaimed at any time If you find an old version of data that is important, you must copy it to the “live” volume if you want to keep it! Shadow copies are read-only

17 Transactions In Longhorn Simple way to add data reliability to your application Can transact updates to file system and registry Transactions can be coordinated with databases and with other machines File system transactions work remotely

18 Transactions In Action

19 Transactions Under The Hood

20 Transactional NTFS Tips Transactions lock the entire file Keep transaction lifespan short Transactions are all-or-nothing Consider intermediate checkpoints for operations like bulk file copies You can’t rollback once you commit

21 Where To Learn More Transactions: FUN320 (Thursday, 5:15) Sync Center: DAT317 (Thursday, 10:00) RDC:

22 Call to Action Platform Feature Availability Distributed Remote Differential Compression Beta 2 Cross-Platform Symbolic links Today Trustworthy System Protection Points TransactionsTodayToday Fill out your evaluation!

© 2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.