1/257
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Internet Small Computer Systems Interface (iSCSI) is
A TCP/IP based storage networking standard for connecting data storage services. It allows for block-level access to storage by transporting iSCSI commands over a network
iSCSI is an inexpensive and simple way to configure a connection to a
remote disk
iSCSI relies on harrdware such as
Host Bus Adapter(HBA) or network switches
iSCSI can be used to transmit data over
LANs
WANs
an Intranet
the Internet
iSCSI typically uses which port
TCP 3260
iSCSI creates what type of network
Storage Area Network (SAN)
Best practice is to run iSCSI on its own
Physical and Logical Network
What is the most popular storage networking architecture used by enterprises
Storage Area Networks (SANs)
What should be the minimum speed of your network for iSCSI
1 Gbps
What does an iSCSI target do
presents or advertises itself over the network
iSCSI can be in the form of
software or hardware
Another name for an iSCSI Initiator is
Client
iSCSI Qualified Name (IQN) are
unique Identifiers that iSCSI uses to address initiator and targets on an iSCSI network
All windows operating systems include
the iSCSI initiator 4
What are the two main components of iSCSI
iSCSI Target Initiator and iSCSI Target Server
The iSCSI Target Server role service provides a
software-based and hardware independent iSCSI disk subsystem
iSCSI Target server can be used to create both
iSCSI targets and iSCSI virtual disk
What is Network or Diskless Boot
A way to rapidly deploy diskless servers. This can save up to 90 percent of the storage space that you use for OS by using differencing virtual hard disks. This method is ideal for identical OS images such as ones running on VMs or high-performance computing (HPC) clusters
Server application storage
Can be used for application that require block storage
Heterogeneous storage
The ability to share storage with devices not running Windows Operating Systems
Lab environments
Allows you to use network-accessible block storage to experiment and simulate uses before deploying them onto a SAN
CHAP stands for
Challenge Handshake Authentication Protocol
What does Chap do
Can be used to allow the initiator to authenticate with the iSCSI target
Query initiator computer for ID
This enables you to select an available Initiator ID from the list of cached IDs on the Target server
Virtual hard-disk support
The ability to create iSCSI virtual disks
What does iSNS do
facilitates the integration of IP networks and and manages iSCSI devices
The database provides iSCSI initiators with
iSCSI target discovery functionality
How does the database update
Registration Period and Entity Status Inquiry features of iSNS.
Registration Period allows iSNS to
delete stale entries from the database
Entity Status Inquiry is similar to
ping and allows iSNS to determine weather register nodes are still present and allows it to delete entries that are no longer active
You can devide iSCSI nodes into one or more groups called
discovery domains
Discovery Domains allow you to
make iSCSI initiators only refer to iSCSI targets in the same one
What is Data Center Bridging
a collection of standards-based networking technologies defined by The Institute of Electrical and Electronics Engineers Inc. (IEEE). It allows multiple types of traffic to run on the same physical Ethernet network cables in the data center. Data Center Bridging uses hardware-based bandwidth allocation and priority-based flow control instead of the operating system having to manage the traffic itself.
Multiple Connected Sessions (MCS) is a feature that allows for
Enables multiple TCP/IP connections from the initiator to the target for the same iSCSI session.
Supports automatic failover. If a failure occurs, all outstanding iSCSI commands are reassigned to another connection automatically.
Requires explicit support by iSCSI storage area network (SAN) devices.
Multipath I/O (MPIO) provides redundancy by
If you have multiple network interface cards in your iSCSI initiator and iSCSI target server, you can use MPIO to provide failover redundancy during network outages.
MPIO requires a device-specific chapter (DSM) for when you want to connect to a third-party SAN device that's connected to the iSCSI initiator. The Windows operating system includes a default MPIO DSM that's installed as the MPIO feature within Server Manager.
MPIO is widely supported. Many SANs can use the default DSM without any more software, while others require a specialized DSM from the manufacturer.
MPIO is more complex to configure, and it isn't as fully automated during failover as MCS.
What does Data Deduplication do
Scan files, divides those file into chunks, and retains only one copy of each chunk
After deduplication files are not stored as independent data instead they are replaced with what that points to the data on the common chunk
stub
where are files kept after deduplication
in common chunks
data deduplication may do what to overall disk performance
improve it
data deduplication run as a
scheduled task that can have minimum age requirements set
The components of data deduplication role
Filter Driver
Deduplication service
Garbage Collection
Filter Driver
Monitors local or remote input/output (I/O) and manages the chunks of data on the file system by interacting with the various jobs. There is one for every volume.
Deduplication service
Consist of multiple jobs that perform both deduplication and compression of files according to the data deduplication policy for the volume. After initial optimization of a file, if the file is then modified and meets the data deduplication policy threshold for optimization, the file will be optimized again.
Garbage collection
Consist of jobs that process deleted or modified data on the volume so that any data chunks no longer being referenced are cleaned up. This job processes previously deleted or logically overwritten optimized content to create usable volume-free space. When an optimized file is deleted or overwritten by new data, the old data in the chunk store isn't deleted immediately. This can also be scheduled to run or ran manually.
Data Deduplication has built in data integrity features such as
checksum validation and metadata consistency checking
Data Deduplication will try to rebuild corrupted data by using
Backup copies
Mirror Image
New Chunk
Backup copies
Deduplication keeps backup copies of popular chunks (chunks referenced over 100 times) in an area called the hotspot. If the working copy suffers a soft damage such as bit flips or torn writes, deduplication uses its redundant copy.
Mirror image
If using mirrored Storage Spaces, deduplication can use the mirror image of the redundant chunk to serve the I/O and fix the corruption.
New chunk
If a file is processed with a chunk that is corrupted, the corrupted chunk is eliminated, and the new incoming chunk is used to fix the corruption.
Because of the additional validations in deduplication, it may be one of the first system,s to report any early signs of
data corruption in the hardware or file system
Unoptimization does what
undoes deduplication on all the optimized files on the volume.
some jobs for unoptimization
decommissioning a server with volumes enabled for Data Deduplication, troubleshooting issues with deduplicated data, or migration of data to another system that doesn't support Data Deduplication.
what should you do before running unoptimization
Disable-DedupVolume in Windows PowerShell
three main types of data deduplication
source, target (or post-process) deduplication, and in-line (or transit) deduplication
what are optimized files
files that are stored as reparse points, and that contain pointers to a map of the respective chunks in the chunk store that are needed to restore the file when it's requested.
Chunk store
location for the optimized file data
Data deduplication is designed to be applied on
primary data volumes
Data deduplication can be scheduled based on
the type of data that is involved, and the frequency and volume of changes that occur to the volume or particular file types.
Data Deduplication should be considered for the following data types
General file shares, software deployment shares, VHD Libraries, VDI deployments, and Virtualized Backup
General file share are
These include group content publication and sharing, user home folders, and Folder Redirection/Offline Files.
Software deployment share are
These are software binaries, images, and updates.
VHD Libraries are
These are Virtual Hard Disk (VHD) file storage for provisioning to hypervisors.
VDI deployments are
These are Virtual Desktop Infrastructure (VDI) deployments using Microsoft Hyper-V.
Virtualized backup is
These include backup applications running as Hyper-V guests and saving backup data to mounted VHDs.
When applied to the correct data, deduplication can save up to
50 to 90 percent of a systems storage
What is an example of a bad file to have data deduplication run on
Files that are often changed and accessed by users or applications
How can you see what saving DeDuplication will give you
by using the Deduplication Evaluation Tool
what savings can you expect to see on User Documents
30 to 50 percent
what savings can you expect to see on Software deployment shares
70 to 80 percent
what savings can you expect to see on Virtualization libraries
80 to 95 percent
what savings can you expect to see on General file shares
50 to 60 percent
ideal candidates for deduplication
Folder redirection servers
Virtualization depot or provisioning library
Software deployment shares
Microsoft SQL Server and Microsoft Exchange Server backup volumes
Scale-out File Servers (SOFS) Cluster Shared Volumes (CSVs)
Virtualized backup VHDs (for example, Microsoft System Center Data Protection Manager)
Virtualized Desktop Infrastructure VDI VHDs (only personal VDIs)
non ideal candidates for deduplication
Microsoft Hyper-V hosts
Windows Server Update Service (WSUS)
SQL Server and Exchange Server database volumes
Data Deduplication interoperability
Windows BranchCache
You can optimize access to data over the network by enabling this on Windows Server and Windows client operating systems. When this is enabled the system communicates over a wide area network (WAN) with a remote file server that's enabled for Data Deduplication, all the deduplicated files are already indexed and hashed, so requests for data from a branch office are quickly computed. This is similar to preindexing or prehashing.
you shouldn't create a hard quota on a volume root folder enabled for Data Deduplication, instead you should use
A soft quota
Data Deduplication is compatible with
Distributed File System (DFS) Replication
Distributed File System (DFS) replication works by
remote differential compression
you can backup and restore individual files and dull volumes using
Data Deduplication
You can create optimized file-level backups/restores using
Volume Shadow Copy Service (VSS) writer
Sever Message Block (SMB) is
a network file sharing protocol that allows computers to read and write and request services from server programs on a network
SMB Protocol is located at which layer of the TCP/IP model
Top layer Application
SMB 3.1.1 supports
Advanced Encryption Standard (AES), 128 Galois/Counter Mode (GCM) encryption and many more
Hyper-V supports storing victual machine data such as config files, checkpoints, and .vhd files on
an SMB 3.0 and later file share
Bandwidth should be at least ““ to file share
1 Gbps
SMB 3.0 allows for storing VM file instead of using
Internet Small Computer System Interface (iSCSI) or Fibre Channel storage area network (SAN) devices.
Scale out File Server is
a high availability approach to storing files on a highly available SMB 3.1.1 file share
Why is Scale out File Server particularly useful for VMs
it allows them to store their files including their config files somewhere on the network
SMB Transparent Failover
This feature enables you to perform the hardware or software maintenance of nodes in a clustered file server without interrupting server applications that are storing data on file shares.
SMB Scale Out
By using Cluster Shared Volumes (CSV) version 2, you can create file shares that provide simultaneous access to data files, with direct input/output (I/O), through all the nodes in a file server cluster.
SMB Multichannel
This feature enables you to aggregate network bandwidth and network fault tolerance if multiple paths are available between the SMB 3.0 client and server.
SMB Direct
This feature supports network adapters that have the Remote Direct Memory Access (RDMA) capability and can perform at full speed with very low data latency and by using very little central processing unit (CPU) processing time.
SMB Encryption
This feature provides the end-to-end encryption of SMB data on untrusted networks, and it helps to protect data from eavesdropping.
Volume Shadow Copy Service (VSS) for SMB file shares
To take advantage of VSS for SMB file shares, both the SMB client and the SMB server must support SMB 3.0 at a minimum.
SMB Directory Leasing
This feature improves branch office application response times. It also reduces the number of round trips from the client to the server as metadata is retrieved from a longer-living directory cache.
Pre-authentication integrity provides
improved protection from a man-in-the-middle attack that might tamper with the establishment and authentication of SMB connection messages.
Cluster Dialect Fencing provides
support for cluster rolling upgrades for the Scale-Out file Servers feature.
SMB will use the highest version that
the client and server support
ways to create and share files
File Explorer, Admin Center, PowerShell, Server Manager
The permissions a user must use to gain access to a folder are a combination of
share permissions and file permissions