Download presentation
Presentation is loading. Please wait.
1
Windows Server Branch Office Solutions
6/4/ :48 AM Windows Server Branch Office Solutions Adam Ungar, Sr. Product Manager David Kruse, Lead Software Developer Microsoft Corporation © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
2
6/4/ :48 AM Key Takeaways Learn about integrated branch office technologies in Windows Server codenamed “Longhorn” Understand the features of the new file sharing protocol (SMB2) in Windows Vista and Windows Server Longhorn Explore opportunities for delivering Windows-based branch solutions today with one of our partners © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
3
Agenda The branch opportunity
6/4/ :48 AM Agenda The branch opportunity Windows Server Longhorn as a branch solution platform Protocol improvements Partner opportunities © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
4
Branch Opportunity Is branch just a network problem?
What will break if the WAN is down? Will functionality/security be compromised? Will everyone be as productive? Who will deliver the next generation branch infrastructure? Microsoft is the platform of choice for branch offices and is making significant additional branch investments Extensive partner opportunity
5
Windows Server Longhorn Branch Platform
Server Core BitLocker Drive Encryption Next Generation TCP/IP Stack Active Directory Enhancements
6
Server Core Reduced footprint server Supported server roles
Available as an option at initial install Boot and operate stand-alone in headless/embedded scenarios Less to install, manage, patch, attack No GUI – all management through command line and remote MMC Supported server roles AD Domain Services, AD Lightweight Directory Services, DHCP, DNS, File, Print, Streaming Media Services Optional Windows features Failover Clustering, Network Load Balancing, Subsystem for UNIX-based applications, Backup, Multipath IO, Removable Storage, Bitlocker Drive Encryption, SNMP, WINS, Telnet client
7
BitLocker Drive Encryption
Operating System Volume Contains Encrypted OS Encrypted Page File Encrypted Temp Files Encrypted Data Encrypted Hibernation File Where’s the Encryption Key? SRK (Storage Root Key) contained in TPM SRK encrypts the VMK (Volume Master Key). VMK encrypts FVEK (Full Volume Encryption Key) – used for the actual data encryption. FVEK and VMK are stored encrypted on the Operating System Volume VMK FVEK 2 SRK 3 Operating System Volume 1 4 System Volume Contains MBR Boot Manager Boot Utilities System
8
Next Generation TCP Stack
Automatically adjusts for maximum efficiency Faster network transfers, especially across WAN links Optimized use of available network bandwidth Reduced packet loss resulting in fewer retransmits Optimized performance without loss Intelligent, automated tuning of TCP receive window size Better packet loss resiliency (e.g. wireless connectivity) Advanced congestion control for better throughput
9
Read-Only Domain Controller (RODC)
6/4/ :48 AM Read-Only Domain Controller (RODC) Full Active Directory (AD) database excluding credentials Caches allowed credentials (default is none) Supports read operations only Inbound replication only for both AD database and SYSVOL Read-Only Partial Attribute Set can restrict inbound replication Dedicated cryptographic key per RODC Most AD branch office best practices enabled by default Supports read-only DNS Deploy in existing AD environment with no changes MICROSOFT CONFIDENTIAL © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
10
Read-Only Domain Controller (RODC) Threat Mitigation – Compromised DC
6/4/ :48 AM Read-Only Domain Controller (RODC) Threat Mitigation – Compromised DC Attacker perspective Admin perspective MICROSOFT CONFIDENTIAL © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
11
Active Directory (AD) Additional Branch Improvements
Role Separation Provides a new “local administrator” level of access per RODC Prevents accidental AD modifications by machine administrators Does not prevent “local administrator” from maliciously modifying the local DB Stop/Start the Directory Services (DS) without reboot Reduce DS downtime for offline operations Keep other services running while DS offline Acts like a member server while DS offline SYSVOL replication using DFS-R Greater scalability and reliability Bandwidth utilization reduction (RDC)
12
File Access In The Branch
David Kruse Lead Software Developer
13
Improving File Access In The Branch Metrics for measuring improvement
End User Wait Time First time access Second time access Efficient use of bandwidth Bytes sent Time of day
14
Types Of Data Single User Data Shared Data Published Data
Files accessed by a single user Server copy used mostly for backup purposes Single User Data Files accessed by multiple users from multiple machines Server allows sharing and collaboration across users Shared Data Files accessed by many users from many machines Data updates are rare Large file set Published Data
15
Single User Data Client Caching for Offline Access
Sync Client operates off local cache when in branch network conditions (high latency and/or low bandwidth) Changes synchronized transparently Offline access when network is unavailable Seamless transitions between online and offline states
16
Single User Data Benefits of Cached/Offline Access
Move user data from local drive to central server, while preserving access speed (since it is offline) Provides central backup of user data Easy data migration to new machines Data synchronization can be scheduled when bandwidth is cheap
17
Download speed (kB/sec), 100 ms RTT
Shared Data – Streaming Improvement Parallel requests greatly increase read/write speed Write Request Download speed (kB/sec), 100 ms RTT Write Response Pre-Vista Vista
18
Shared Data – Chattiness Improvement Compounding reduces roundtrips
Open Dir Open Dir Response Query Dir Query Dir Query Volume Response Response Query Volume Close Dir Response Close Dir Query Dir Response Satisfied from cache Query Volume
19
Published Data Client caching of data set is impractical
Improvements in data access (streaming, compounding) improve published data access as well High cost of data transfer since every access is a first access
20
Published Data DFS Replication can be configured to pre-stage data in the branch office, making file access local to the branch Windows-based branch appliances offer caching of data in the branch office
21
Windows Vista And Longhorn Platform Branch Improvements
Windows Vista Client / Windows Server 2003 R2 Improved offline experience offers user fast response times while keeping the data synchronized between client and server Windows Server codenamed “Longhorn” Faster data streaming improves file transfer times to improve response time Operation compounding reduces network traffic to improve response time
22
Future Directions Continued platform improvements across all three data scenarios Using Windows Server Longhorn as a base for branch solutions allows you to build on the investments we are making
23
Delivering Branch Solutions Today
6/4/ :48 AM partner Delivering Branch Solutions Today Bryan Hoke Manager, Corporate Development Brocade © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
24
Brocade File Area Networks
Collaboration Replication WAN File Serving WAN File Serving Wide Area Network Audit / Permission Reporting Data Center: Tier I Storage Data Migration D / R Location Replication ILM Global Namespace Data Recovery Data Center: Tier II Storage Automated Failover / Bus Continuity
25
Remote Site Consolidation Providing customers with a choice
DHCP Server SMS Server Print Server Web Server Brocade WAFS Administrator LA Branch Office \\Namespace_Root Marketing Sales Classify File Server DHCP Server SMS Server Print Server Web Server Backup Replication Brocade StorageX Full-time IT NY Regional Office DHCP Server SMS Server Print Server Web Server Brocade WAFS Brocade WAFS Tokyo Branch Office Remote Sites Data Center
26
Why Is This Important Now?
OS upgrades prompt people to Re-evaluate their file management strategy Analyze and classify data stored on file servers Migrate data to their new servers Windows Server Longhorn is coming! Brocade delivers solutions (WAFS/StorageX) that allow customers to get ready and non-disruptively migrate files
27
Call To Action Download and evaluate branch technologies in Longhorn Beta 3 Contact Brocade to discuss partnering opportunities Bryan Hoke: Deliver embedded solutions that leverage Microsoft’s investment in branch office Branch OEM:
28
Additional Resources Web Resources Related Sessions
Longhorn Beta 3: Technical library: Branch office: Related Sessions Windows Server Longhorn BitLocker Drive Encryption in the Enterprise NAP Technologies
29
© 2007 Microsoft Corporation. All rights reserved
© 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.