Professional Documents
Culture Documents
Clustering and Storage With Windows Server 2003
Clustering and Storage With Windows Server 2003
an
Storage eBook
contents
[
]
Clustering and Storage with Windows Server 2003
10
15
13
19
2
10
13
15
19
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook.
2008, Jupitermedia Corp.
Server Clustering
Disk Storage (SCSI)
SAN-Based Storage
iSCSI Storage
Conclusion
Server Clustering
Two basic approaches to reaching high availability have been
built into the Windows Server
2003 operating system. The
first, known as Server Clustering, requires Windows
Server 2003 Enterprise and Datacenter Editions. The
second one, known as Network Load Balancing (NLB),
was incorporated into all Windows Server 2003 versions (including Standard and Web).
Each represents a unique approach to eliminating "a
With Server Clustering, there is only a single active instance for each highly available
resource, regardless of the total number of servers that are members of the entire cluster. The server that currently hosts this resource becomes its owner and is responsible
for processing all requests for its services.
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook. 2008, Jupitermedia Corp.
Quorum Designations
To prevent this, every cluster contains one designated
resource, called Quorum, implemented as a dedicated
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook. 2008, Jupitermedia Corp.
10 Coolest Features in
Windows Server 2008
by Paul Rubens
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook. 2008, Jupitermedia Corp.
10 Coolest continued
At launch, Microsoft is unlikely to have a similar
product to VMware's highly popular VMotion (which
enables administrators to move virtual machines
from one physical server to another while they are
running), but such a product is bound to available
soon after.
2. Server Core
Many server administrators, especially those used
to working in a Linux environment, instinctively dislike having to install a large, feature-packed operating system to run a particular specialized server.
Server 2008 offers a Server Core installation, which
provides the minimum installation required to carry
out a specific server role, such as for a DHCP, DNS,
or print server. From a security standpoint, this is
attractive. Fewer applications and services on the
server make for a smaller attack surface. In theory,
there should also be less maintenance and management with fewer patches to install, and the whole
server could take up as little as 3Gb of disk space
according to Microsoft. This comes at a price there's no upgrade path back to a "normal" version
of Server 2008 short of a reinstall. In fact there is no
GUI at all - everything is done from the command
line.
3. IIS
IIS 7, the Web server bundled with Server 2008, is a
big upgrade from the previous version. "There are
significant changes in terms of security and the
overall implementation, which make this version
very attractive," said Barb Goldworm, president and
chief analyst at Boulder, Colo.-based Focus
Consulting. One new feature getting a lot of attention is the ability to delegate administration of
servers (and sites) to site admins while restricting
their privileges.
4. Role-Based Installation
Role-based installation is a less extreme version of
Server Core. Although it was included in 2003, it is
far more comprehensive in this version. The concept is that rather than configuring a full server
install for a particular role by uninstalling unnecessary components (and installing needed extras), you
simply specify the role the server is to play, and
Windows will install what's necessary - nothing
more. This makes it easy for anyone to provision a
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook. 2008, Jupitermedia Corp.
10 Coolest continued
particular server without increasing the attack surface by including unwanted components that will
not do anything except present a security risk.
5. Read Only Domain Controllers (RODC)
It's hardly news that branch offices often lack
skilled IT staff to administer their servers, but they
also face another, less talked about problem. While
corporate data centers are often physically secured,
servers at branch offices rarely have the same physical security protecting them. This makes them a
convenient launch pad for attacks back to the main
corporate servers. RODC provides a way to make an
Active Directory database read-only. Thus, any mischief carried out at the branch office cannot propagate its way back to poison the Active Directory system as a whole. It also reduces traffic on WAN links.
6. Enhanced Terminal Services
Terminal services has been beefed up in Server
2008 in a number of ways. TS RemoteApp enables
remote users to access a centralized application
(rather than an entire desktop) that appears to be
running on the local computer's hard drive. These
apps can be accessed via a Web portal or directly by
double-clicking on a correctly configured icon on
the local machine. TS Gateway secures sessions,
which are then tunnelled over https, so users don't
need to use a VPN to use RemoteApps securely over
the Internet. Local printing has also been made significantly easier.
7. Network Access Protection
Microsoft's system for ensuring that clients connecting to Server 2008 are patched, running a firewall
and in compliance with corporate security policies and that those that are not can be remediated - is
useful. However, similar functionality has been and
remains available from third parties.
8. Bitlocker
System drive encryption can be a sensible security
measure for servers located in remote branch
offices or anywhere where the physical security of
the server is sub-optimal. Bitlocker encryption protects data if the server is physically removed or
booted from removable media into a different operating system that might otherwise give an intruder
access to data that is protected in a Windows
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook. 2008, Jupitermedia Corp.
technology implemented. Note that support for a clustering installation is contingent on strict compliance
with the Hardware Compatibility List (which is part of
the Windows Server Catalog, containing all clustering
solutions certified by Microsoft). Therefore it is critical
that you verify which system you intend to purchase
and deploy. Quorum, in this case, is implemented as
the Physical Disk resource, which requires having a separate volume accessible to all cluster nodes (clustering
setup determines automatically whether the volume
you selected satisfies necessary criteria).
Unfortunately, the majority of hardware required to set
up clustered servers is relatively expensive (although
prices of such systems are considerably lower than they
were a few years ago), especially if the intention is to
ensure redundancy for every infrastructure component,
including Fibre Channel and network devices, such as
7
10 Coolest continued
environment. Again, similar functionality is available from third-party vendors.
9. Windows PowerShell
Microsoft's new(ish) command line shell and scripting language has proved popular with some server
administrators, especially those used to working in
Linux environments. Included in Server 2008,
PowerShell can make some jobs quicker and easier
to perform than going through the GUI. Although it
might seem like a step backward in terms of user
friendly operation, it's one of those features that
once you've gotten used to it, you'll never want to
give up.
10. Better Security
We've already mentioned various security features
built into Server 2008, such as the ability to reduce
attack surfaces by running minimal installations,
and specific features like BitLocker and NAP.
Numerous little touches make Server 2008 more
secure than its predecessors. An example is Address
Space Load Randomization - a feature also present
in Vista - which makes it more difficult for attackers
to carry out buffer overflow attacks on a system by
changing the location of various system services
each time a system is run. Since many attacks rely
on the ability to call particular services by jumping
to particular locations, address space randomization
can make these attacks much less likely to succeed.
It's clear that with Server 2008 Microsoft is treading
the familiar path of adding features to the operating
system that third parties have previously been providing as separate products. As far as the core server product is concerned, much is new. Just because
some technologies have been available elsewhere
doesn't mean they've actually been implemented.
Having them as part of the operating system can be
very convenient indeed.
If you're running Server 2003 then, now is the time
to start making plans to test Server 2008 - you're
almost bound to find something you like. Whether
you decide to implement it, and when, is up to you.
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook. 2008, Jupitermedia Corp.
adapters and switches, or disk arrays and their controllers. The cost might be prohibitive, especially for
programmers whose sole goal is developing clusteraware software or exploring the possibility of migrating
existing applications into clustered environment.
To remediate this issue, Microsoft made such functionality available without specialized hardware setup, by
allowing the installation of a cluster on a single server
with local storage only (also known as a single node
cluster). Obviously, such configuration lacks any degree
of high availability, but it has all features necessary for
application development and testing. Since local disks
are not represented as Physical Disk resources, this
clustering model requires using a distinct resource type
called Local Quorum when running New Server Cluster
Wizard during initial setup, which we will review in
details later.
Despite the benefits mentioned earlier (such as a significant level of high availability and compatibility with a
variety of hardware platforms, applications, and services), Single Shared Quorum has limitations. The first one
is inherent to the technologies used to implement it.
For example, configurations relying on SCSI-based
shared storage are restricted by the maximum length of
the SCSI bus connecting all cluster nodes to the same
disk array (which typically forces you to place them in
the same or adjacent data center cabinets). This distance can be increased considerably by switching to a
Fibre Channel infrastructure, but not without significant
impact on hardware cost. Introducing iSCSI and NAS
into the arsenal of available shared storage choices
provides the same capability at lower prices, but there
are still some caveats that restrict their widespread use
(e.g., NAS devices are not supported as the Quorum
resource). The second limitation is that despite redundancy on the disk level (which can be accomplished
through RAID sets or duplexing, with fault-tolerant
disks and controllers), Single Shared Quorum still constitutes a single point of failure.
There are third-party solutions designed to address
both of these limitations, and with release of Windows
2003 Server-based clustering, Microsoft introduced its
own remedy in the form of Majority Node Set (MNS)
Quorum. Like Local Quorum, MNS is defined as a separate resource that must be selected during cluster
setup with New Server Cluster Wizard. Also like Local
Quorum model, dependency on the shared storage
8
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook. 2008, Jupitermedia Corp.
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook. 2008, Jupitermedia Corp.
A SCSI controller is typically installed in a host system as the host adapter, but it can
also reside in an external storage subsystem.
10
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook. 2008, Jupitermedia Corp.
SCSI
SCSI (Small Computer System Interface) is the best
known and most popular storage technology for multidisk configurations. The term SCSI also refers to the
communication protocol, providing reliable block-level
data transport between a host (known as the initiator)
11
and storage (known as the target), which is independent of the way data is stored. Its architecture consists of
a parallel I/O bus shared between multiple (frequently
daisy-chained) devices (including controllers), and
enclosed on both ends with terminators, which prevent
electrical signals from bouncing back (terminators are
frequently built directly into SCSI devices).
A SCSI controller is typically installed in a host system
as the host adapter, but it can also reside in an external
storage subsystem. Each device on the bus is assigned
a unique identifier referred to as SCSI ID that is numbered from 0 to 7 or from 0 to 15, for narrow and wide
SCSI bus types, respectively. In addition to providing
addressing capabilities, the SCSI ID determines priority
level (with an ID 7 being the highest and assigned typically to the controller, ensuring proper bus arbitration).
A limited range of SCSI IDs (which restrict the number
of devices on the bus to 15) is extended through the
assignment of Logical Unit Numbers (LUNs), associated
with each individual storage entity, which is able to
process individual SCSI commands. Typically, they represent individual disks within a storage subsystem, connected to the main SCSI bus via an external SCSI controller. In addition to LUN and SCSI ID, the full address
of such Logical Unit also contains a bus identifier, which
commonly corresponds to a specific SCSI interface
card. A server can have several such cards installed.
The total number of available LUNs ranges from 8 to
254, depending on the hardware support for Large
LUNs. For more information on this subject, refer to
Microsoft Knowledge Base article 310072.
Implementing SCSI technology for the purpose of
shared clustered storage adds an extra layer of complexity to its configuration. Since the bus must be
accessible by clustered nodes, install a SCSI controller
card in each (and disable their BIOS). Furthermore,
since these controllers will be connected to the same
bus, they cannot have identical SCSI IDs. Typically, this
dilemma is resolved by setting one to 7 and the other
to 6, which grants the latter the next-highest priority
level. To ensure the failure of a single component (such
as a device, controller, or host) does not affect the
entire cluster, use external (rather than device's built-in)
terminators. Keep in mind that number of nodes in a
SCSI storage-based clustered implementation cannot
exceed two.
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook. 2008, Jupitermedia Corp.
12
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook. 2008, Jupitermedia Corp.
SAN-Based Storage
ibre Channel storage area network (FC SANs) represent a considerable shift from the directly
attached storage paradigm. They offer significant
functionality and performance improvements. The basic
idea is to use a network infrastructure for connecting
servers to their disks, allowing physical separation of
the two by far greater distances than was previously
possible. But there are also other,
equally important, advantages of this
separation. Managing storage in
larger environments no longer
requires dealing with each individual
system, as was the case with directly
attached models. Disks are grouped
together, simplifying their administration (e.g., monitoring, backups,
restores, provisioning and expansion)
and making it more efficient, through
such inventions as LAN-free or server-free backups and restores, or
booting from a SAN.
In addition, since large number of
servers and storage devices can participate in the same SAN, it is possible to attach new ones as needed,
making allocation of additional space a fairly easy task.
This is further simplified by the DISKPART.EXE
Windows 2003 Server utility, which is capable of
dynamically extending basic and dynamic volumes, as
explained in Microsoft Knowledge Base Article
FC SANs represent a considerable shift from the directly attached storage paradigm.
They offer significant functionality and performance improvements.
13
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook. 2008, Jupitermedia Corp.
14
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook. 2008, Jupitermedia Corp.
15
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook. 2008, Jupitermedia Corp.
iSCSI Storage
On the network level, both initiator and target get assigned unique
IP addresses, which allow for node identification. With
node identification, the target is actually accessed by a
combination of IP address and port number, which is
referred to as portal. In the iSCSI protocol, addressing
Unfortunately, the cost associated with FC SAN deployments is prohibitive for most
smaller or less-critical environments, whose requirements cannot be satisfied with parallel SCSI because of its performance and scalability limitations.
16
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook. 2008, Jupitermedia Corp.
17
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook. 2008, Jupitermedia Corp.
18
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook. 2008, Jupitermedia Corp.
Conclusion
We've reviewed the general principles of server clustering and presented hardware and software criteria that must
be taken into consideration in its design. While the cost of implementing this technology has decreased significantly in recent years, making it affordable outside of high-end environments, there are still scenarios where its use
might not be economically viable (such as in development, testing, or training).
Fortunately, it is possible to overcome constraints imposed by its storage or network requirements without any significant hardware investments by leveraging widely popular server virtualization methodology.
This content was adapted from Internet.com's ServerWatch Web site and was written by Marcin Policht.
Internet.com eBooks bring together the best in technical information, ideas and coverage of important IT
trends that help technology professionals build their knowledge and shape the future of their IT organizations.
For more information and resources on storage, visit any of our category-leading sites:
www.Enteprisestorageforum.com
www.internetnews.com/storage
www.linuxtoday.com/storage
www.databasejournal.com
http://news.earthweb.com/storage
http://www.internet.com/storage
For the latest live and on-demand Webcasts on storage, visit: www.internet.com/storage
19
Clustering and Storage with Windows Server 2003, an Internet.com Storage eBook. 2008, Jupitermedia Corp.