Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

20411B-ENU-TrainerHandbook

.pdf
Скачиваний:
237
Добавлен:
01.05.2015
Размер:
16.48 Mб
Скачать

Administering Windows Server® 2012 10-23

Exercise 1: Configuring FSRM Quotas

MCT

Scenario

 

To control the size of home folders, you are implementing FSRM quotas. Each home folder is limited to 100 MB. To ensure that administrators are made aware of home folders that are running out of space, an event is written to the event log when a user exceeds 85 percent of their storage quota so that it can be

tracked by administrators.

USE

The main tasks for this exercise are as follows:

.ONLY

1.

Create a quota template.

2.

Configure a quota based on the quota template.

3.

Test that the quota is functional.

Task 1: Create a quota template

1.

On LON-SVR1, from Server Manager, install the File Server Resource Manager.

 

 

2.

In the File Server Resource Manager console, use the Quota Templates node to configure a template

 

that sets a hard limit of 100 MB on the maximum folder size.

 

3.

Configure the template to record an event in the Event Log when the folder reaches 85 percent and

 

100 percent capacity.

STUDENT

 

 

Task 2: Configure a quota based on the quota template

1.Use the File Server Resource Manager console and the Quotas node to create a quota on the E:\Labfiles\Mod10\Users folder by using the quota template that you created in Task 1.

2.Configure the quota to auto apply on existing and new subfolders.

3.Create an additional folder named Max in the E:\Labfiles\Mod10\Users folder, and ensure that the new folder is listed in the quotas list in File Server Resource Manager.

Task 3: Test that the quota is functional

1.Open a Windows PowerShell window, and use the following commands to create a file in the E:\Labfiles\Mod10\Users\Max folder. Press Enter after each line:

E:

cd \Labfiles\Mod10\Users\Max

fsutil file createnew file1.txt 89400000

2.Check the Event Viewer for an Event ID of 12325.

3.Test that the quota works by attempting to create a file that is 16,400,000 bytes, and then press Enter:

fsutil file createnew file2.txt 16400000

4.Notice that the file cannot be created. The message returned from Windows references disk space, but the file creation fails because it would surpass the quota limit. Close the Windows PowerShell window.

5.Close all open windows on LON-SVR1.

Results: After completing this exercise, you should have configured an FSRM quota.

PROHIBITED USE

10-24 Optimizing File Services

Exercise 2: Configuring File Screening and Storage Reports

Scenario

Managers are concerned that large media files are being stored in home folders, which violates corporate policy. Managers want to prevent media files such as video, audio, and graphics files from being saved. You need to implement file screening to prevent media files from being stored in home folders. However, you have also been made aware that several users store Microsoft Project files with the extension.mpp in their home directories. You must ensure that the file screen you create does not restrict the storage of these files.

You have also been asked to provide a report to your manager documenting any attempts to save restricted media files on LON-SVR1.

The main tasks for this exercise are as follows:

1. Create a file screen.

2. Create a file group.

3. Test the file screen.

4. Generate an on-demand storage report.

5. To prepare for the next lab.

Task 1: Create a file screen

1. On LON-SVR1, open File Server Resource Manager.

2. Create a File Screen based on the Block Audio and Video Files file screen template for the

E:\Labfiles\Mod10\Users directory.

Task 2: Create a file group

1.On LON-SVR1, open the File Server Resource Manager Configuration Options dialog box, and on the File Screen Audit tab enable the Record file screening activity in auditing database option.

Note: This step allows recording of file screening events. These recordings will supply data for a File Screen Audit report, which will be run later in this exercise.

2.Create a new File Group with the following properties: o File group name: MPx Media Files

o Files to include: *.mp* o Files to exclude *.mpp

3.Modify the Block Audio and Video Files template to only use the MPx Media Files file group.

Task 3: Test the file screen

1.On the taskbar, click the Windows Explorer shortcut.

2.Create a new text document in E:\Labfiles\Mod10, and then rename it as musicfile.mp3.

3.Copy musicfile.mp3 into E:\Labfiles\Mod10\Users. You will be notified that the system was unable to copy the file.

PROHIBITED USE STUDENT .ONLY USE MCT

 

 

Administering Windows Server® 2012

 

MCT

 

 

10-25

 

 

 

Task 4: Generate an on-demand storage report

 

 

 

 

1.

Open the File Services Resource Manager console.

 

USE

2.

Right-click Storage Reports Management, select Generate Reports Now, and then provide the

 

 

following parameters:

 

 

 

o Generate only the File Screening Audit report

 

 

 

o Report on E:\Labfiles\Mod10\Users

 

3.

Review the generated reports in Windows Internet Explorer.

 

 

 

 

4.

Close all open windows on LON-SVR1.

 

.ONLY

 

To prepare for the next lab

 

 

 

 

 

 

 

When you finish the lab, do not shut down the virtual machines. You will need them for the next lab.

 

 

 

 

 

 

 

Results: After completing this exercise, you will have configured file screening and storage reports in

 

 

 

 

 

FSRM.

 

PROHIBITEDUSESTUDENT

 

 

 

 

 

 

 

 

 

 

 

 

10-26 Optimizing File Services

MCT

 

 

 

 

 

 

Lesson 4

 

 

Overview of DFS

USE

You can use DFS to meet the challenges of managing data for branch offices by providing fault-tolerant

 

 

access and wide area network (WAN)–friendly replication of files that are located throughout an

 

 

enterprise.

 

 

Lesson Objectives

.ONLY

After completing this lesson, you will be able to:

Describe DFS.

 

 

Describe DFS namespaces.

 

 

Describe DFS Replication.

 

 

• Describe how DFS namespaces and DFS replication work.

 

 

Describe data deduplication.

STUDENT

Describe scenarios where DFS can be used.

 

 

• Explain how to install the DFS role.

 

 

What Is DFS?

 

 

To access a file share, users typically require the

 

 

 

 

 

 

Universal Naming Convention (UNC) name to

 

 

 

access the shared folder content. Many large

 

 

 

organizations have hundreds of file servers that

 

 

 

are dispersed geographically throughout an

 

 

 

organization. This introduces a number of

 

USE

challenges for users who are trying to find and

 

access files efficiently.

 

Through the use of a namespace, DFS can simplify

 

the UNC folder structure. In addition, DFS can

 

replicate the virtual namespace and the shared

 

folders to multiple servers within the organization.

 

 

 

 

 

 

DFS Namespace (DFS-N). Allows administrators to group shared folders that are located on different PROHIBITED servers into one or more logically structured namespaces. Each namespace appears to users as a

single shared folder with a series of subfolders. The subfolders typically point to shared folders that are located on various servers in multiple geographical sites throughout the organization.

DFS-R. A multimaster replication engine that synchronizes files between servers for local and WAN network connections. DFS Replication supports replication scheduling, bandwidth throttling, and uses remote differential compression (RDC) to update only the portions of files that have changed since the last replication. You can use DFS Replication in conjunction with DFS namespaces or as a standalone file replication mechanism.

To use Windows Server 2008 mode, the following requirements must be met:

 

Administering Windows Server® 2012

MCT

 

10-27

 

What Is a DFS Namespace?

 

 

 

DFS namespaces enable a virtual representation

 

 

 

 

 

USE

of shared folder structures. You can create either

a domain-based or standalone namespace. Each

 

 

 

type has different characteristics.

 

 

 

Domain-Based Namespace

 

 

 

A domain-based namespace can be used when:

 

 

 

Namespace high availability is required, which ONLY is accomplished by replicating the namespace

to multiple namespace servers.

You need to hide the name of the namespace servers from users. This also makes it easier to

replace a namespace server or migrate the namespace to a different server. Users will then access the \\domainname\namespace format as opposed to the \\servername\share format. .

If you choose to deploy a domain-based namespace, you will also need to choose whether to use the

STUDENT

 

Microsoft Windows 2000 Server mode or the Windows Server 2008 mode. Windows Server 2008 mode

 

provides additional benefits such as support for access-based enumeration, and it increases the number of folder targets from 5,000 to 50,000. With access-based enumeration, you can also hide folders that users do not have permission to view.

The Active Directory® forest must be at Windows Server 2003 or higher forest functional level.

The Active Directory domain must be at the Windows Server 2008 domain functional level.

All namespace servers must be Windows Server 2008.

Standalone Namespace

An organization has not implemented Active Directory Domain Services (AD DS). USE

An organization does not meet the requirements for a Windows Server 2008 mode, a domain-based namespace, and there are requirements for more than 5,000 DFS folders. Standalone DFS namespaces support up to 50,000 folders with targets.

An organization is hosting a DFS namespace in a failover cluster. PROHIBITEDA standalone namespace is used when:

10-28 Optimizing File Services

MCT

 

 

 

 

 

 

 

What Is DFS Replication?

 

 

 

DFS-R provides a way to keep folders

 

 

 

 

 

 

DFS-R uses Remote Differential Compression USE

(RDC). RDC is a client-server protocol that

can be used to efficiently update files over a ONLY limited bandwidth network. RDC detects data

insertions, removals, and rearrangements in files, enabling DFS-R to replicate only the changed file blocks when files are updated.

RDC is only used for files that are 64 kilobytes (KB) or larger by default. DFS-R also supports cross-file

RDC, which allows DFS-R to use RDC, even when a file with the same name does not exist at the .

client. Cross-file RDC can determine files that are similar to the file that needs to be replicated, and it

uses blocks of similar files that are identical to the replicating file to minimize the amount of data thatSTUDENT needs to be replicated.

DFS-R uses a hidden staging folder to stage a file before sending or receiving it. Staging folders act as caches for new and changed files to be replicated from sending members to receiving members. The sending member begins staging a file when it receives a request from the receiving member. The process involves reading the file from the replicated folder and building a compressed representation of the file in the staging folder. After it has been constructed, the staged file is sent to the receiving member; if RDC is used, only a fraction of the staging file might be replicated. The receiving member downloads the data and builds the file in its staging folder. After the file download completes on

the receiving member, DFS-R decompresses the file and installs it into the replicated folder. Each replicated folder has its own staging folder, which by default is located under the local path of the replicated folder in the DfsrPrivate\Staging folder.

DFS-R detects changes on the volume by monitoring the file system update sequence number (USN) USE journal and replicates changes only after the file is closed.

DFS-R uses a version vector exchange protocol to determine which files need to be synchronized. The protocol sends less than 1 KB per file across the network to synchronize the metadata associated with changed files on the sending and receiving members.

DFS-R uses a conflict resolution heuristic of “last writer wins” for files that are in conflict (that is, a file PROHIBITED that is updated at multiple servers simultaneously) and “earliest creator wins” for name conflicts. Files

and folders that lose the conflict resolution are moved to a folder known as the Conflict and Deleted folder. You can also configure the service to move deleted files to the Conflict and Deleted folder for retrieval, should the file or folder be deleted. Each replicated folder has its own hidden Conflict and Deleted folder, which is located under the local path of the replicated folder in the DfsrPrivate \ConflictandDeleted folder.

DFS-R is self-healing and can automatically recover from USN journal wraps, USN journal loss, or DFS-R database loss.

DFS-R uses a Windows Management Instrumentation (WMI) provider that provides interfaces to obtain configuration and monitoring information from the DFS-R service.synchronized between servers across well-

 

Administering Windows Server® 2012

MCT

 

10-29

 

How DFS-N and DFS-R Work

 

 

 

Even though DFS-N and DFS-R are separate

 

 

 

 

 

 

 

 

1.User accesses a folder in the virtual USE

namespace. When a user attempts to access

a folder in a namespace, the client computer ONLY contacts the server that is hosting the

namespace root. The host server can be a standalone server that is hosting a standalone namespace, or a domain-based configuration

that is stored in AD DS and then replicated to various locations to provide high availability. The

namespace server sends back to the client computer a referral containing a list of servers that host .

the shared folders (called folder targets) that are associated with the folder being accessed. DFS is a site-aware technology, so client computers can be configured to access namespaces that are withinSTUDENT their site first to ensure the most reliable access.

2.Client computer accesses the first server in the referral. The client computer caches the referral information and then contacts the first server in the referral. This referral typically is a server in the

client’s own site, unless there is no server located within the client’s site. In this case, the administrator can configure the target priority.folderOnonetheserverrole services, you can use them together to

namespace.

What Is Data Deduplication?

In Windows Server 2012, you can enable data deduplication for nonsystem volumes. Data deduplication optimizes volume storage by finding redundant data on a volume, and ensuring that the data is stored only once on the volume. This is achieved by storing the data in a single location, and providing reference to the single location for other redundant copies of the data. Data is segmented into 32 KB to 218 KB chunks, so data deduplication can optimize not only redundant files, but also portions of files that are redundant on the volume.

Data deduplication can be implemented in conjunction with DFS-R to provide an even more efficient storage and replication infrastructure.

PROHIBITED USE

10-30 Optimizing File Services

How Data Deduplication Works

 

Once a volume has data deduplication enabled, Windows 2012 optimizes the volumes by maintaining the

following components:

MCT

USE

Unoptimized files. These include any files that do not meet the file-age criteria for data deduplication.

 

In order to be optimized by data deduplication, files must remain static for a certain amount of time.

 

Unoptimized files could include system state files, encrypted files, files smaller than 32 KB, files with

 

extended attibutes, or files that are in use by other applications.

 

 

Optimized files. Optimized files are stored as reparse points. A reparse point contains a pointer to the

.ONLY

 

locations of the chunk data within the chunk store, so the respective chunks can be retrieved when

 

required.

Chunk store. Optimized file data is located in the chunk store.

Benefits of Data Deduplication

Data deduplication can help you cope with storage growth in the following areas:

Capacity optimization. Data deduplication enables a server to store more data in less physical disk

STUDENT

 

space.

Scale and performance. Data deplucation is highly scalable in Windows Server 2012. It can run on

 

multiple volumes without affecting other services and applications running on the server. Data

 

deduplication can be throttled to accommodate other heavy workloads on the server, so that no

 

performance degradation occurs for important server tasks.

Reliability data integrity. Windows Server 2012 uses checksum. Consistency and validation to ensure

 

that the integrity of data affected by data deduplication remains intact. Data deduplication also

 

maintains redundant copies of the most frequently used data on a volume to protect against data

 

corruption.

Bandwidth efficiency. In combination with DFS-R, or other file replication technology such as

 

BranchCache, data deduplication can greatly reduce the bandwidth consumed replicating file data,

 

provided that replication partners are also running Windows Server 2012.

 

USE

Simple optimization management. Windows Server 2012 and Windows PowerShell 3.0 contain

 

integrated support for data deduplication. Implementation and management within Windows

 

Server 2012 is done with familiar tools.

Implementing Data Deduplication

Use the following process to implement data deduplication on a server:

 

1.

Install the Data Deduplication role service for the File Services role.

 

 

This can be performed by using the Add Roles and Features Wizard in Server Manager, or by using

 

 

the following Windows PowerShell cmdlets:

 

 

 

 

 

Import-Module ServerManager

 

 

Add-WindowsFeature -name FS-Data-Deduplication

 

 

Import-Module Deduplication

 

 

 

 

2.

Enable data deduplication on one or more volumes.

PROHIBITED

 

Within Server Manager, you can right-click a volume and select Configure Data Deduplication,

 

which opens the Data Deduplication Settings page.

 

 

DFS Scenarios
http://go.microsoft.com/fwlink/?linkID=270996

Administering Windows Server® 2012

MCT

10-31

 

Alternatively, you can use the following Windows PowerShell cmdlet to enable data deduplication (for the volume E:, in this case):

3.Optionally, configure data deduplication jobs for a volume. USE

By default, built-in jobs are created and scheduled when you enable data deduplication for a volume.

If required, you can manually configure these jobs, or create additional jobs to further manage how data deduplication functions.Enable-DedupVolume E:

Additional Reading: Data Deduplication Overview ONLY

.

Several key scenarios can benefit from DFS-N and

DFS-R. These scenarios include:

• Sharing files across branch offices.

• Data collection.

• Data distribution.

the files to be used for a number of specific purposes. Critical data can be replicated to a hub site by using DFS-R and then backed up at the hub site by using standard backup procedures. This increases the branch office data recoverability if a server fails, because files will be available in two separate locations and backed up. Additionally, companies can reduce branch office costs by eliminating backup hardware and onsite IT personnel expertise. Replicated data can also be used to make branch office file shares fault tolerant. If the branch office server fails, clients in the branch office can access the replicated data at the hub site.

Sharing Files Across Branch Offices

 

 

Large organizations that have many branch offices

 

 

often have to share files or collaborate between

 

 

these locations. DFS-R can help replicate files

 

 

between branch offices or from a branch office to

 

 

 

 

STUDENT

 

 

 

a hub site. Having files in multiple branch offices also benefits users who travel from one branch office to

another. The changes that users make to their files in one branch office are replicated back to their branch

office.

USE

 

Note: This scenario is recommended only if users can tolerate some file inconsistencies as

 

changes are replicated throughout the branch servers. Also, note that DFS-R only replicates a file

PROHIBITED

after it is closed. Therefore, DFS-R is not recommended for replicating database files or any files

that are held open for long periods of time.

Data Collection

DFS technologies can collect files from a branch office and replicate them to a hub site, thus allowing

 

 

 

10-32 Optimizing File Services

Data Distribution

You can use DFS-N and DFS-R to publish and replicate documents, software, and other line-of-business (LOB) data throughout your organization. DFS-N and folder targets can increase data availability and distribute client load across various file servers.

Demonstration: How to Install the DFS Role

This demonstration shows how to install the DFS Role.

Demonstration Steps

Install the DFS role

Under the File and Storage Management role, install the DFS Namespaces and DFS Replication role services.

PROHIBITED USE STUDENT .ONLY USE MCT

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]