The document provides an overview of new clustering features in Windows Server 2003, including support for larger 8-node clusters, 64-bit support, tighter integration with Active Directory, simplified installation that is installed by default, and enhanced storage, network and operations functionality. Key benefits include greater flexibility, support for large memory applications, easier administration through default configurations and remote management, and third party integration.
Ibm power570 web_sphere_7_ net_benchmark_winsrv2008thssla21
This document compares performance benchmarks of the .NET StockTrader sample application running on Windows Server 2008 R2 and the .NET Framework 4.0 versus IBM WebSphere 7 running on an IBM Power 570 server and HP BladeSystem. The benchmarks tested a trade web application, trade web services, and a WSTest web service. The .NET implementation outperformed WebSphere across all benchmarks, processing up to 3.5 times as many requests per second for the trade web application and up to 1.5 times for the web services benchmarks. The document also provides pricing details showing the .NET solution to be less costly to implement.
The document discusses the system requirements for installing and configuring Analysis Cubes for Microsoft Dynamics GP. It describes configurations where the Microsoft Dynamics GP and Analysis Cubes components are installed on the same server or on separate servers. It also covers requirements for client workstations and scenarios with multiple Analysis Cubes servers.
Windows XP Service Pack 3 (SP3) combines all previously released updates, fixes, and improvements for Windows XP. It also includes a small number of new features like improved black hole router detection and Network Access Protection support. SP3 helps provide a new baseline for Windows XP and ensures all systems have the latest updates. While it does not add significant new functionality, SP3 allows Windows XP devices to take advantage of some capabilities in Windows Server 2008. Administrators can deploy SP3 through standard tools like Windows Update or Systems Management Server as they would previous service packs.
Server Core Remote Management by Sander Berkouwer & Joachim NässlanderdiTii
This document provides guidance on remotely managing Server Core installations of Windows Server 2008 using various methods such as the Microsoft Management Console, Remote Server Administration Tools, Remote Desktop Protocol, Windows Remote Management, and Secure Shell. It discusses the advantages and best uses of each method and includes configuration steps for setting up remote management on the Server Core server and client sides.
This document provides an overview of TCP/IP fundamentals and its implementation in Microsoft Windows operating systems. It discusses the history and standards process behind TCP/IP, the protocol architecture including layers and key protocols like IP, TCP and UDP. It also covers topics like IPv4 and IPv6, address resolution, neighbor discovery, and the tools and configuration options available in Windows for working with TCP/IP.
Windows XP Service Pack 3 (SP3) combines all previously released updates for Windows XP, including security updates and hotfixes. It provides a small number of new features like Network Access Protection to help Windows XP users take advantage of capabilities in Windows Server 2008. SP3 aims to provide a new baseline for Windows XP deployments and ensure all Windows XP systems have the latest updates, without significantly changing the Windows XP experience.
This document provides an overview and instructions for installing and using Oracle9i on Windows 2000 and Windows NT. It describes new features in Oracle9i Release 2 (9.2) and Release 1 (9.0.1), differences between using Oracle on Windows and UNIX, the Oracle9i architecture and services on Windows, and configuration parameters stored in the Windows registry. The document also covers topics such as multiple Oracle homes, the Optimal Flexible Architecture, accounts and passwords, and tools for developing and administering Oracle databases on Windows.
This document provides step-by-step instructions for setting up a test lab to demonstrate Network Access Protection (NAP) enforcement using virtual private network (VPN) connections. The test lab uses four computers - one domain controller, one VPN server, one NAP policy server, and one client computer. The instructions cover installing and configuring each system to validate client health policies, enforce network access based on compliance, and automatically remediate noncompliant clients.
Ibm power570 web_sphere_7_ net_benchmark_winsrv2008thssla21
This document compares performance benchmarks of the .NET StockTrader sample application running on Windows Server 2008 R2 and the .NET Framework 4.0 versus IBM WebSphere 7 running on an IBM Power 570 server and HP BladeSystem. The benchmarks tested a trade web application, trade web services, and a WSTest web service. The .NET implementation outperformed WebSphere across all benchmarks, processing up to 3.5 times as many requests per second for the trade web application and up to 1.5 times for the web services benchmarks. The document also provides pricing details showing the .NET solution to be less costly to implement.
The document discusses the system requirements for installing and configuring Analysis Cubes for Microsoft Dynamics GP. It describes configurations where the Microsoft Dynamics GP and Analysis Cubes components are installed on the same server or on separate servers. It also covers requirements for client workstations and scenarios with multiple Analysis Cubes servers.
Windows XP Service Pack 3 (SP3) combines all previously released updates, fixes, and improvements for Windows XP. It also includes a small number of new features like improved black hole router detection and Network Access Protection support. SP3 helps provide a new baseline for Windows XP and ensures all systems have the latest updates. While it does not add significant new functionality, SP3 allows Windows XP devices to take advantage of some capabilities in Windows Server 2008. Administrators can deploy SP3 through standard tools like Windows Update or Systems Management Server as they would previous service packs.
Server Core Remote Management by Sander Berkouwer & Joachim NässlanderdiTii
This document provides guidance on remotely managing Server Core installations of Windows Server 2008 using various methods such as the Microsoft Management Console, Remote Server Administration Tools, Remote Desktop Protocol, Windows Remote Management, and Secure Shell. It discusses the advantages and best uses of each method and includes configuration steps for setting up remote management on the Server Core server and client sides.
This document provides an overview of TCP/IP fundamentals and its implementation in Microsoft Windows operating systems. It discusses the history and standards process behind TCP/IP, the protocol architecture including layers and key protocols like IP, TCP and UDP. It also covers topics like IPv4 and IPv6, address resolution, neighbor discovery, and the tools and configuration options available in Windows for working with TCP/IP.
Windows XP Service Pack 3 (SP3) combines all previously released updates for Windows XP, including security updates and hotfixes. It provides a small number of new features like Network Access Protection to help Windows XP users take advantage of capabilities in Windows Server 2008. SP3 aims to provide a new baseline for Windows XP deployments and ensure all Windows XP systems have the latest updates, without significantly changing the Windows XP experience.
This document provides an overview and instructions for installing and using Oracle9i on Windows 2000 and Windows NT. It describes new features in Oracle9i Release 2 (9.2) and Release 1 (9.0.1), differences between using Oracle on Windows and UNIX, the Oracle9i architecture and services on Windows, and configuration parameters stored in the Windows registry. The document also covers topics such as multiple Oracle homes, the Optimal Flexible Architecture, accounts and passwords, and tools for developing and administering Oracle databases on Windows.
This document provides step-by-step instructions for setting up a test lab to demonstrate Network Access Protection (NAP) enforcement using virtual private network (VPN) connections. The test lab uses four computers - one domain controller, one VPN server, one NAP policy server, and one client computer. The instructions cover installing and configuring each system to validate client health policies, enforce network access based on compliance, and automatically remediate noncompliant clients.
The document provides an overview of clustering methods and algorithms. It defines clustering as the process of grouping objects that are similar to each other and dissimilar to objects in other groups. It discusses existing clustering methods like K-means, hierarchical clustering, and density-based clustering. For each method, it outlines the basic steps and provides an example application of K-means clustering to demonstrate how the algorithm works. The document also discusses evaluating clustering results and different measures used to assess cluster validity.
Hp Best Practices For Microsoft Exchange Server 2000 And 2003 Cluster Deploym...Armando Leon
Microsoft Exchange Server cluster deployments require careful planning and configuration to ensure high availability. This document provides best practices for Microsoft Exchange Server 2003 cluster implementation and management. It covers topics such as cluster concepts, new features in Exchange 2003, hardware and storage planning, Windows 2003 changes, configuration best practices, systems management practices, and disaster recovery. The aim is to present guidance for successfully deploying and operating Microsoft Exchange Server clusters.
Ms Tech Ed Best Practices For Exchange Server Cluster Deployments June 2003Armando Leon
This document provides an overview and best practices for deploying Exchange Server in a cluster. It discusses why organizations implement clusters for high availability, what components can be clustered in Exchange, and new features in Exchange 2003. The document also covers planning considerations for hardware, storage, networking, and operations when deploying an Exchange cluster.
This document outlines the agenda for a machine learning meetup. It will include sessions on supervised learning algorithms like regression, SVM, trees and Bayesian methods. Unsupervised learning sessions will cover clustering algorithms like K-means, DBSCAN, mean shift and hierarchical clustering. Dimension reduction techniques for visualization will also be discussed. Deep learning sessions will focus on neural networks, convolutional neural networks and training deep models. Cluster validation techniques will be introduced, including internal measures like within-cluster and between-cluster sum of squares and correlation between affinity and incidence matrices. Visualizing similarity matrices is also proposed to validate clustering results.
This document describes a new clustering tool for data mining called RAPID MINER. It discusses the need for clustering in applications like customer segmentation. The project aims to develop a new clustering algorithm using preprocessing techniques like removing null values and redundant data. It will implement clustering to distribute data into groups so that association is strong within clusters and weak between clusters. The document compares the new tool to Weka, discusses how it uses KD trees to improve efficiency over K-means clustering, and concludes that the new algorithm chooses better starting clusters and filters data faster using KD trees.
K-Means, its Variants and its ApplicationsVarad Meru
This presentation was given by our project group at the Lead College competition at Shivaji University. Our project got the 1st Prize. We focused mainly on Rough K-Means and build a Social-Network-Recommender System based on Rough K-Means.
The Members of the Project group were -
Mansi Kulkarni,
Nikhil Ingole,
Prasad Mohite,
Varad Meru
Vishal Bhavsar.
Wonderful Experience !!!
Application of Clustering in Data Science using Real-life Examples Edureka!
This document outlines an Edureka webinar on applications of clustering in real life. The webinar instructor is Kumaran Ponnambalam. The objectives are to understand data science applications and prospects, machine learning categories, clustering and k-means clustering. Examples of clustering applications include wine recommendation, pizza delivery optimization, and news summarization. K-means clustering is demonstrated on pizza delivery location data. The webinar also discusses data science job trends and covers 10 modules on data science topics including machine learning techniques in R.
Cluster analysis is a technique used to group objects based on characteristics they possess. It involves measuring the distance or similarity between objects and grouping those that are most similar together. There are two main types: hierarchical cluster analysis, which groups objects sequentially into clusters; and nonhierarchical cluster analysis, which directly assigns objects to pre-specified clusters. The choice of method depends on factors like sample size and research objectives.
Windows xp wireless deployment technology and component overviewRossMob1
This document provides an overview of wireless LAN technology and components, including IEEE 802.11 standards, authentication methods, encryption, and how they are supported in Windows XP. It describes wireless network adapters, access points, authentication using 802.1X and EAP over RADIUS with protocols like EAP-TLS, and the configuration of wireless security settings in Windows XP.
This document provides installation instructions for Microsoft Dynamics GP Release 10.0. It discusses preparing for the installation, including checking system requirements, configuring the network and SQL Server, and planning the account framework. It also covers installing Microsoft Dynamics GP on the server and using the Utilities module.
This document provides guidance on planning security for sites and content in Microsoft Windows SharePoint Services 3.0. It discusses the available default permission levels and security groups, and helps determine if any custom groups or permission levels need to be created. Worksheets are also included to aid in deciding which security groups and administrators to use for various permission levels and administration roles.
- The document describes various scenarios for using BitLocker Drive Encryption on Windows Vista systems, including using only TPM protection, two-factor authentication with TPM and PIN, and using a startup key for added protection.
- It provides details on the user experience for setting up BitLocker through the setup wizard and control panel, as well as creating and using recovery keys or passwords to access an encrypted drive in recovery scenarios.
- Scripting methods are also described for programmatically enabling, disabling, and managing BitLocker encryption and keys.
Here are the key points about preparing for a Microsoft Dynamics AX installation:
- Review system requirements and plan your topology before starting installation. Important decisions include database platform and whether to use separate servers.
- Create domain accounts for services like AOS, SQL Server, and SharePoint before installation.
- Configure Kerberos authentication on the domain controller if using it.
- Verify the installation account has proper permissions.
- Copy installation files to a shared directory accessible to all servers.
- Install base components - database, AOS, application files, clients.
- Complete the initialization checklist in the AX client after installing base components.
- Install additional components like reporting, analysis, Enterprise Portal
This document provides guidance on using Microsoft Project Server 2013 and related tools to implement a demand management workflow. It discusses the key concepts and steps for defining a demand management process, configuring the necessary workflow objects in Project Server 2013, and orchestrating the workflow. The example case study is for a fictitious company called Contoso and demonstrates defining phases, stages, and activities to model their demand management lifecycle. It also provides instructions for configuring the necessary lookup tables, custom fields, project detail pages and other objects required to support the workflow in Project Server 2013.
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...Microsoft Private Cloud
The idea that purchasing services from a cloud service provider may allow businesses to save money while they focus on their core business is an enticing proposition. Many analysts view the emerging possibilities for pricing and delivering services online as disruptive to market conditions. Market studies and the ensuing dialogue among prospective customers and service providers reveal some consistent themes and potential barriers to the rapid adoption of cloud services. Business decision makers want to know, for example, how to address key issues of security, privacy and reliability in the Microsoft Cloud Computing environment, and they are concerned as well about the implications of cloud services for their risk and operations decisions.
Better unit testing with microsoft fakes (rtm)Steve Xu
This document provides an introduction to Microsoft Fakes, a framework for unit testing code that is difficult to isolate and test due to dependencies. It discusses challenges with unit testing code due to dependencies, and how Microsoft Fakes addresses this using stubs and shims. Stubs replace dependencies with test doubles, while shims use runtime interception to detour around dependencies and replace them with test-controlled versions. The document covers migrating to Microsoft Fakes from other isolation frameworks, best practices for using it, and advanced techniques like dealing with non-deterministic code.
Understanding Internet of Things - White Paper on Device ChoicesDavid J Rosenthal
This document provides an introduction to devices for Internet of Things (IoT) solutions. It discusses different types of devices, considerations for device capabilities like cost and security, and connectivity pathways between devices, gateways and services. It also covers emerging IoT frameworks, principles of device security, and moving from prototyping to production quality hardware. The document is intended to give decision makers an understanding of aspects of device design for IoT projects.
The document provides guidance for upgrading Active Directory domains to Windows Server 2008 or Windows Server 2008 R2. It outlines key planning tasks such as assigning credentials, introducing a test server, determining supported upgrades, assessing hardware requirements, and developing a test plan. Detailed instructions are given for performing tasks like installing AD DS on a test server, upgrading domain controllers, and completing post-upgrade configuration. Background information and references are also included to aid in the planning and execution of the domain upgrade process.
This document provides a step-by-step guide for using File Server Resource Manager (FSRM) in Windows Server 2008 R2 to manage storage resources. It covers how to create quotas, file screens, and file classification properties to understand and control storage usage. It also discusses generating storage reports and backing up FSRM configurations. The guide offers procedures for tasks like quota creation, file screening, file expiration, and classification rule setup.
This document provides a roadmap to content for Microsoft Windows SharePoint Services 3.0 organized by audience and stage of the IT lifecycle. It outlines content portals for information workers, IT professionals, and developers on Microsoft sites. It also lists community and blog sites with additional shared content for all users of SharePoint Products and Technologies.
This document discusses the Dynamic Host Configuration Protocol (DHCP) features in Windows Server 2003. Key features include integration with DNS for name resolution, enhanced monitoring and reporting, support for vendor-specific options, multicast address allocation, protection against unauthorized DHCP servers, high availability through clustering, automatic and alternate client configuration, and command-line management. It provides an overview of DHCP including servers, clients, and relay agents, and best practices for deployment and configuration.
The document provides instructions for configuring the Windows Server 2012 R2 Base Configuration test lab. It describes installing Windows Server 2012 R2 on DC1 and configuring it as an Active Directory domain controller, DNS server, and DHCP server for the Corpnet subnet. It also describes installing Windows Server 2012 R2 on additional computers APP1 and CLIENT1, configuring their TCP/IP settings, and joining them to the Corp domain. This establishes the basic Corpnet infrastructure to build out additional test labs.
The document provides an overview of clustering methods and algorithms. It defines clustering as the process of grouping objects that are similar to each other and dissimilar to objects in other groups. It discusses existing clustering methods like K-means, hierarchical clustering, and density-based clustering. For each method, it outlines the basic steps and provides an example application of K-means clustering to demonstrate how the algorithm works. The document also discusses evaluating clustering results and different measures used to assess cluster validity.
Hp Best Practices For Microsoft Exchange Server 2000 And 2003 Cluster Deploym...Armando Leon
Microsoft Exchange Server cluster deployments require careful planning and configuration to ensure high availability. This document provides best practices for Microsoft Exchange Server 2003 cluster implementation and management. It covers topics such as cluster concepts, new features in Exchange 2003, hardware and storage planning, Windows 2003 changes, configuration best practices, systems management practices, and disaster recovery. The aim is to present guidance for successfully deploying and operating Microsoft Exchange Server clusters.
Ms Tech Ed Best Practices For Exchange Server Cluster Deployments June 2003Armando Leon
This document provides an overview and best practices for deploying Exchange Server in a cluster. It discusses why organizations implement clusters for high availability, what components can be clustered in Exchange, and new features in Exchange 2003. The document also covers planning considerations for hardware, storage, networking, and operations when deploying an Exchange cluster.
This document outlines the agenda for a machine learning meetup. It will include sessions on supervised learning algorithms like regression, SVM, trees and Bayesian methods. Unsupervised learning sessions will cover clustering algorithms like K-means, DBSCAN, mean shift and hierarchical clustering. Dimension reduction techniques for visualization will also be discussed. Deep learning sessions will focus on neural networks, convolutional neural networks and training deep models. Cluster validation techniques will be introduced, including internal measures like within-cluster and between-cluster sum of squares and correlation between affinity and incidence matrices. Visualizing similarity matrices is also proposed to validate clustering results.
This document describes a new clustering tool for data mining called RAPID MINER. It discusses the need for clustering in applications like customer segmentation. The project aims to develop a new clustering algorithm using preprocessing techniques like removing null values and redundant data. It will implement clustering to distribute data into groups so that association is strong within clusters and weak between clusters. The document compares the new tool to Weka, discusses how it uses KD trees to improve efficiency over K-means clustering, and concludes that the new algorithm chooses better starting clusters and filters data faster using KD trees.
K-Means, its Variants and its ApplicationsVarad Meru
This presentation was given by our project group at the Lead College competition at Shivaji University. Our project got the 1st Prize. We focused mainly on Rough K-Means and build a Social-Network-Recommender System based on Rough K-Means.
The Members of the Project group were -
Mansi Kulkarni,
Nikhil Ingole,
Prasad Mohite,
Varad Meru
Vishal Bhavsar.
Wonderful Experience !!!
Application of Clustering in Data Science using Real-life Examples Edureka!
This document outlines an Edureka webinar on applications of clustering in real life. The webinar instructor is Kumaran Ponnambalam. The objectives are to understand data science applications and prospects, machine learning categories, clustering and k-means clustering. Examples of clustering applications include wine recommendation, pizza delivery optimization, and news summarization. K-means clustering is demonstrated on pizza delivery location data. The webinar also discusses data science job trends and covers 10 modules on data science topics including machine learning techniques in R.
Cluster analysis is a technique used to group objects based on characteristics they possess. It involves measuring the distance or similarity between objects and grouping those that are most similar together. There are two main types: hierarchical cluster analysis, which groups objects sequentially into clusters; and nonhierarchical cluster analysis, which directly assigns objects to pre-specified clusters. The choice of method depends on factors like sample size and research objectives.
Windows xp wireless deployment technology and component overviewRossMob1
This document provides an overview of wireless LAN technology and components, including IEEE 802.11 standards, authentication methods, encryption, and how they are supported in Windows XP. It describes wireless network adapters, access points, authentication using 802.1X and EAP over RADIUS with protocols like EAP-TLS, and the configuration of wireless security settings in Windows XP.
This document provides installation instructions for Microsoft Dynamics GP Release 10.0. It discusses preparing for the installation, including checking system requirements, configuring the network and SQL Server, and planning the account framework. It also covers installing Microsoft Dynamics GP on the server and using the Utilities module.
This document provides guidance on planning security for sites and content in Microsoft Windows SharePoint Services 3.0. It discusses the available default permission levels and security groups, and helps determine if any custom groups or permission levels need to be created. Worksheets are also included to aid in deciding which security groups and administrators to use for various permission levels and administration roles.
- The document describes various scenarios for using BitLocker Drive Encryption on Windows Vista systems, including using only TPM protection, two-factor authentication with TPM and PIN, and using a startup key for added protection.
- It provides details on the user experience for setting up BitLocker through the setup wizard and control panel, as well as creating and using recovery keys or passwords to access an encrypted drive in recovery scenarios.
- Scripting methods are also described for programmatically enabling, disabling, and managing BitLocker encryption and keys.
Here are the key points about preparing for a Microsoft Dynamics AX installation:
- Review system requirements and plan your topology before starting installation. Important decisions include database platform and whether to use separate servers.
- Create domain accounts for services like AOS, SQL Server, and SharePoint before installation.
- Configure Kerberos authentication on the domain controller if using it.
- Verify the installation account has proper permissions.
- Copy installation files to a shared directory accessible to all servers.
- Install base components - database, AOS, application files, clients.
- Complete the initialization checklist in the AX client after installing base components.
- Install additional components like reporting, analysis, Enterprise Portal
This document provides guidance on using Microsoft Project Server 2013 and related tools to implement a demand management workflow. It discusses the key concepts and steps for defining a demand management process, configuring the necessary workflow objects in Project Server 2013, and orchestrating the workflow. The example case study is for a fictitious company called Contoso and demonstrates defining phases, stages, and activities to model their demand management lifecycle. It also provides instructions for configuring the necessary lookup tables, custom fields, project detail pages and other objects required to support the workflow in Project Server 2013.
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...Microsoft Private Cloud
The idea that purchasing services from a cloud service provider may allow businesses to save money while they focus on their core business is an enticing proposition. Many analysts view the emerging possibilities for pricing and delivering services online as disruptive to market conditions. Market studies and the ensuing dialogue among prospective customers and service providers reveal some consistent themes and potential barriers to the rapid adoption of cloud services. Business decision makers want to know, for example, how to address key issues of security, privacy and reliability in the Microsoft Cloud Computing environment, and they are concerned as well about the implications of cloud services for their risk and operations decisions.
Better unit testing with microsoft fakes (rtm)Steve Xu
This document provides an introduction to Microsoft Fakes, a framework for unit testing code that is difficult to isolate and test due to dependencies. It discusses challenges with unit testing code due to dependencies, and how Microsoft Fakes addresses this using stubs and shims. Stubs replace dependencies with test doubles, while shims use runtime interception to detour around dependencies and replace them with test-controlled versions. The document covers migrating to Microsoft Fakes from other isolation frameworks, best practices for using it, and advanced techniques like dealing with non-deterministic code.
Understanding Internet of Things - White Paper on Device ChoicesDavid J Rosenthal
This document provides an introduction to devices for Internet of Things (IoT) solutions. It discusses different types of devices, considerations for device capabilities like cost and security, and connectivity pathways between devices, gateways and services. It also covers emerging IoT frameworks, principles of device security, and moving from prototyping to production quality hardware. The document is intended to give decision makers an understanding of aspects of device design for IoT projects.
The document provides guidance for upgrading Active Directory domains to Windows Server 2008 or Windows Server 2008 R2. It outlines key planning tasks such as assigning credentials, introducing a test server, determining supported upgrades, assessing hardware requirements, and developing a test plan. Detailed instructions are given for performing tasks like installing AD DS on a test server, upgrading domain controllers, and completing post-upgrade configuration. Background information and references are also included to aid in the planning and execution of the domain upgrade process.
This document provides a step-by-step guide for using File Server Resource Manager (FSRM) in Windows Server 2008 R2 to manage storage resources. It covers how to create quotas, file screens, and file classification properties to understand and control storage usage. It also discusses generating storage reports and backing up FSRM configurations. The guide offers procedures for tasks like quota creation, file screening, file expiration, and classification rule setup.
This document provides a roadmap to content for Microsoft Windows SharePoint Services 3.0 organized by audience and stage of the IT lifecycle. It outlines content portals for information workers, IT professionals, and developers on Microsoft sites. It also lists community and blog sites with additional shared content for all users of SharePoint Products and Technologies.
This document discusses the Dynamic Host Configuration Protocol (DHCP) features in Windows Server 2003. Key features include integration with DNS for name resolution, enhanced monitoring and reporting, support for vendor-specific options, multicast address allocation, protection against unauthorized DHCP servers, high availability through clustering, automatic and alternate client configuration, and command-line management. It provides an overview of DHCP including servers, clients, and relay agents, and best practices for deployment and configuration.
The document provides instructions for configuring the Windows Server 2012 R2 Base Configuration test lab. It describes installing Windows Server 2012 R2 on DC1 and configuring it as an Active Directory domain controller, DNS server, and DHCP server for the Corpnet subnet. It also describes installing Windows Server 2012 R2 on additional computers APP1 and CLIENT1, configuring their TCP/IP settings, and joining them to the Corp domain. This establishes the basic Corpnet infrastructure to build out additional test labs.
This document provides instructions for installing and setting up Key Performance Indicators (KPIs) in the Microsoft Dynamics GP Business Portal. It discusses how to create KPIs using queries, existing KPIs, or by copying existing KPIs. It also covers displaying KPIs, calculating values over multiple time periods, setting alert ranges, and configuring security roles and groups. The document contains steps for installation, creating and customizing KPIs, and displaying them in the Business Portal for users.
Windows Mobile 6.5 includes enhancements to Internet Explorer Mobile, Bluetooth, Outlook Mobile, phone features, and services. Key updates include a new visual style for Windows Mobile Professional focused on touch, improved browser functionality with Flash support, enhanced Exchange integration in Outlook Mobile, and new services like Marketplace and MyPhone. The release aims to improve the mobile experience for both business and consumer users.
This document provides instructions for creating a two-node server cluster using Windows Server 2003. Key steps include installing Windows Server 2003 on each node, setting up two network adapters per node on separate subnets for public and private communication, configuring shared storage accessible by both nodes, and installing the Cluster Service software while ensuring only one node has access to shared storage at a time. The document outlines hardware and software requirements and provides a checklist to prepare for cluster installation and configuration.
This document provides an overview of TCP/IP fundamentals and concepts for Microsoft Windows operating systems. It discusses TCP/IP components, configuration, addressing, routing, DNS, and DHCP. The document is intended as an introduction to lay a conceptual foundation for understanding the TCP/IP protocol suite.
Microsoft Producer for Microsoft Office PowerPoint 2003 Evaluation Guide@rte Digital
This document evaluates Microsoft Producer for Microsoft Office PowerPoint 2003, which allows users to easily create rich-media presentations using digital media and web files. It highlights key features such as importing files, capturing audio and video, adding effects, and publishing presentations. Guidelines are provided for using Producer to create cost-effective training, engaging business presentations, sales and marketing communications, and executive broadcasts.
The document provides an overview of Windows Server Update Services (WSUS) 3.0, which allows administrators to deploy and manage Microsoft product updates. Key features include improved ease of use through a new administration console, enhanced deployment options such as more flexible update approvals and server hierarchies, and improved performance. The document discusses WSUS server and client requirements, server-side features like update targeting and notifications, and deployment scenarios for single or multiple WSUS servers.
This document discusses designing migrations of applications and infrastructure from on-premises to Azure. It outlines three key steps: assess, migrate, and optimize.
The assess step involves discovering applications and mapping dependencies, prioritizing what to migrate, and using tools like Azure Migrate to assess suitability and provide cost estimates.
The migrate step is about moving applications, data, and infrastructure to Azure using tools that minimize downtime. Automation is recommended where possible.
The optimize step focuses on streamlining resources in Azure, enhancing security, improving performance, and managing costs after migration is complete.
This document provides instructions for installing EMC PowerPath version 4.5 on Windows 2003 servers. It details copying the installation files to the server's temp directory from a network share. The installation is then run with the default options selected until reaching the license key entry screen. The provided license key is then entered to complete the installation. Upon reboot, EMC PowerPath will be installed and configured on the server.
Creating a Windows Dual-Node Cluster involves configuring two nodes with network and storage resources to provide high availability. Key steps include:
1. Partitioning and formatting disks for data, logs, tempdb and quorum resources on both nodes.
2. Configuring network adapters for the public network and private heartbeat network.
3. Creating the cluster on the first node and adding the second node. Disk and network resources are configured and brought online to complete the dual-node cluster configuration.
The document discusses two types of quorums available in Windows Server 2003 clusters: standard clusters and majority node set (MNS) clusters. Standard clusters use a quorum log file stored on shared storage accessible by all cluster nodes, while MNS clusters store the quorum data by default on each node's local system disk. MNS clusters allow for more sophisticated solutions like geographically dispersed clusters that do not require shared storage, but have strict requirements to ensure consistency. The document provides examples of appropriate uses of each quorum type and answers frequently asked questions about MNS clusters.
This document provides an overview of Microsoft's Windows clustering technologies, including Network Load Balancing (NLB), Component Load Balancing (CLB), and Server Cluster. It discusses how these technologies can be used together to provide high availability, reliability, and scalability for applications and services. NLB is used for load balancing web servers, CLB balances application components, and Server Cluster provides failover for databases and backend services. Clusters can be organized as farms of identical servers or packs that share partitioned data. Technologies can scale out by adding servers or scale up individual servers. Server Cluster nodes can operate actively or passively.
Cluster service is a Windows technology that enables connecting multiple servers into clusters for high availability and manageability. It provides failover support for applications and services requiring high availability. This white paper focuses on the architecture and features of Cluster service, describing its key components, terminology, concepts, and design goals. It also outlines future directions for Cluster service.
This document discusses cluster configuration best practices for Windows Server 2003. It describes different cluster topologies and their advantages/disadvantages based on application deployment needs. Key factors discussed include server load distribution, application design as single or multiple instances, failover policies, and how these impact performance and high availability. The document provides examples to illustrate different configuration options and tradeoffs.
Clustering technologies in Windows Server 2003 help achieve high availability and scalability for critical applications. Server clusters provide high availability by redistributing workloads from failed servers, while Network Load Balancing provides scalability and availability for web services by load balancing requests across multiple servers. The choice depends on whether applications have long-running in-memory state, with server clusters intended for stateful applications like databases and NLB for stateless applications like web servers.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Clustering overview
1. Technical Overview of Clustering in Windows Server 2003
Microsoft Corporation
Published: January 2003
Abstract
This white paper summarizes the new clustering features available in Microsoft®
Windows®
Server 2003.
3. Microsoft® Windows® Server 2003 Technical Article
Contents
Contents.......................................................................................................................................iii
Server Clusters.............................................................................................................................7
Server Clusters.............................................................................................................................7
General........................................................................................................................................7
General........................................................................................................................................7
Larger Cluster Sizes...............................................................................................................7
64-Bit Support.........................................................................................................................7
Terminal Server Application Mode..........................................................................................7
Majority Node Set (MNS) Clusters..........................................................................................8
Installation...................................................................................................................................8
Installation...................................................................................................................................8
Installed by Default.................................................................................................................8
Pre-configuration Analysis......................................................................................................9
Default Values........................................................................................................................9
Multi Node Addition.................................................................................................................9
Extensible Architecture...........................................................................................................9
Remote Administration..........................................................................................................10
Command Line Tools............................................................................................................10
Simpler Uninstallation...........................................................................................................10
Quorum Log Size..................................................................................................................10
Local Quorum.......................................................................................................................10
Quorum Selection.................................................................................................................11
Integration.................................................................................................................................11
Integration.................................................................................................................................11
What’s New in Clustering for Windows Server 2003 iii
4. Microsoft® Windows® Server 2003 Technical Article
Active Directory.....................................................................................................................11
Extend Cluster Shared Disk Partitions .................................................................................12
Resources.................................................................................................................................12
Resources.................................................................................................................................12
Printer Configuration ............................................................................................................12
MSDTC Configuration...........................................................................................................13
Scripting................................................................................................................................13
MSMQ Triggers....................................................................................................................13
Network Enhancements............................................................................................................13
Network Enhancements............................................................................................................13
Enhanced Network Failover .................................................................................................13
Media Sense Detection.........................................................................................................14
Multicast Heartbeat...............................................................................................................14
Storage......................................................................................................................................14
Storage......................................................................................................................................14
Volume Mount Points............................................................................................................14
Client Side Caching (CSC)...................................................................................................15
Distributed File System.........................................................................................................15
Encrypted File System..........................................................................................................15
Storage Area Networks (SAN)..............................................................................................16
Operations.................................................................................................................................16
Operations.................................................................................................................................16
Backup and Restore.............................................................................................................16
Enhanced Node Failover......................................................................................................16
What’s New in Clustering for Windows Server 2003 iv
5. Microsoft® Windows® Server 2003 Technical Article
Group Affinity Support ..........................................................................................................17
Node Eviction........................................................................................................................17
Rolling Upgrades..................................................................................................................17
Queued Changes..................................................................................................................17
Disk Changes.......................................................................................................................18
Password Change.................................................................................................................18
Resource Deletion................................................................................................................18
WMI Support ........................................................................................................................18
Supporting and Troubleshooting...............................................................................................19
Supporting and Troubleshooting...............................................................................................19
Offline/Failure Reason Codes ..............................................................................................19
Software Tracing...................................................................................................................19
Cluster Logs..........................................................................................................................19
Event Log..............................................................................................................................20
Clusdiag................................................................................................................................20
Chkdsk Log...........................................................................................................................20
Disk Corruption.....................................................................................................................20
Network Load Balancing............................................................................................................21
Network Load Balancing............................................................................................................21
Network Load Balancing Manager............................................................................................21
Network Load Balancing Manager............................................................................................21
Virtual Clusters..........................................................................................................................21
Virtual Clusters..........................................................................................................................21
Multi-NIC support......................................................................................................................22
Multi-NIC support......................................................................................................................22
Bi-directional Affinity..................................................................................................................22
What’s New in Clustering for Windows Server 2003 v
6. Microsoft® Windows® Server 2003 Technical Article
Bi-directional Affinity..................................................................................................................22
Limiting switch flooding using IGMP support.............................................................................23
Limiting switch flooding using IGMP support.............................................................................23
What’s New in Clustering for Windows Server 2003 vi
7. Microsoft® Windows® Server 2003 Technical Article
Server Clusters
NOTE: Server clusters is a general term used to describe clusters based on the Microsoft®
Cluster
Service (MSCS), as opposed to clusters based on Network Load Balancing.
General
Larger Cluster Sizes
Microsoft Windows®
Server 2003 Enterprise Edition now supports 8-node clusters (was two), and
Windows Server 2003 Datacenter Edition now supports 8-node clusters (was four).
Benefits
• Greater Flexibility – this provides much more flexibility in how applications can be
deployed on a Server cluster. Applications that support multiple instances can run more
instances across more nodes; multiple applications can be deployed on a single Server
cluster with much more flexibility and control over the semantics if/when a node fails or is
taken down for maintenance.
64-Bit Support
The 64-bit versions of Windows Server 2003 Enterprise Edition and Datacenter Edition support
Cluster Service.
Benefits
• Large Memory Needs – Microsoft SQL Server™ 2000 Enterprise Edition (64-bit) is one
example of an application that can make use of the increased memory space of 64-bit
Windows Server 2003 (up to 4TB – Windows 2000 Datacenter only supports up to
64GB), while at the same time taking advantage of clustering. This provides an incredibly
powerful platform for the most computer intensive applications, while ensuring high
availability of those applications.
NOTE: GUID Partition Table (GPT) disks, a new disk architecture in Windows Server 2003 that
supports up to 18 exabyte disks, is not supported with Server clusters.
Terminal Server Application Mode
Terminal Server can run in application mode on nodes in a Server cluster. NOTE: There is no failover
of Terminal Server sessions.
Benefits
• High Availability - Terminal Server directory service can be made highly available through
failover.
What’s New in Clustering for Windows Server 2003 7
8. Microsoft® Windows® Server 2003 Technical Article
Majority Node Set (MNS) Clusters
Windows Server 2003 has an optional quorum resource that does not require a disk on a shared bus
for the quorum device. This feature is designed to be built in to larger end-to-end solutions by OEMs,
IHVs and other software vendors rather than be deployed by end-users specifically, although this is
possible for experienced users. The scenarios targeted by this new feature include:
• Geographically dispersed clusters. This mechanism provides a single, Microsoft-supplied
quorum resource that is independent of any storage solution for a geographically
dispersed or multi-site cluster. NOTE: There is a separate cluster Hardware Compatibility
List (HCL) for geographic clusters.
• Low-cost or appliance-like highly available solutions that have no shared disks but use
other techniques such as log shipping or software disk or file system replication and
mirroring to make data available on multiple nodes in the cluster.
NOTE: Windows Server 2003 provides no mechanism to mirror or replicate user data across the
nodes of an MNS cluster, so while it is possible to build clusters with no shared disks at all, it is an
application specific issue to make the application data highly available and redundant across
machines.
Benefits
• Storage Abstraction – frees up the storage subsystem to manage data replication
between multiple sites in the most appropriate way, without having to worry about a
shared quorum disk, and at the same time still supporting the idea of a single virtual
cluster.
• No Shared Disks – there are some scenarios that require tightly consistent cluster
features, yet do not require shared disks. For example, a) clusters where the application
keeps data consistent between nodes (e.g. database log shipping and file replication for
relatively static data), and b) clusters that host applications that have no persistent data,
but need to cooperate in a tightly coupled way to provide consistent volatile state.
• Enhanced Redundancy – if the shared quorum disk is corrupted in any way, the entire
cluster goes offline. With Majority Node Sets, the corruption of quorum on one node does
not bring the entire cluster offline.
Installation
Installed by Default
Clustering is installed by default. You only need to configure a Cluster by launching Cluster
Administrator or script the configuration with Cluster.exe. In addition, third-party quorum resources
can be pre-installed and then selected during Server cluster configuration, rather than having
additional resource specific procedures. All Server cluster configurations can be deployed the same
way.
Benefits
What’s New in Clustering for Windows Server 2003 8
9. Microsoft® Windows® Server 2003 Technical Article
• Easier Administration – you no longer need to provide a media CD to install Server
clusters.
• No reboot – you no longer need to reboot after you install or uninstall Cluster Service.
Pre-configuration Analysis
Analyzes and verifies hardware and software configuration and identifies potential problems. Provides
a comprehensive and easy-to-read report on any potential configuration issues before the Server
cluster is created.
Benefits
• Compatability – Ensures that any known incompatibilities are detected prior to
configuration. For example, Service for Macintosh (SFM), Network Load Balancing
(NLB), dynamic disks, and DHCP issued addresses are not supported with Cluster
Service.
Default Values
Creates a Server cluster that conforms to best practices using default values and heuristics. Many
times for newly created Server clusters, the default values are the most appropriate configuration.
Benefits
• Easier Administration – Server cluster creation asks fewer setup questions, data is
collected and the code makes decisions about the configuration. The goal is to get a
“default” Server cluster up and running that can then be customized using the Server
cluster administration tools if required.
Multi Node Addition
Allows multiple nodes to be added to a Server cluster in a single operation.
Benefits
• Easier Administration – makes it quicker and easier to create multi-node Server clusters.
Extensible Architecture
Extensible architecture allows applications and system components to take part in Server cluster
configuration. For example, applications can be installed prior to a server being server clustered and
the application can participate in (or even block) this node joining the Server cluster.
Benefits
• Third-Party Support – allows applications to setup Server cluster resources and/or
change their configuration as part of Server cluster installations rather than as a separate
post-Server cluster installation task.
What’s New in Clustering for Windows Server 2003 9
10. Microsoft® Windows® Server 2003 Technical Article
Remote Administration
Allows full remote creation and configuration of the Server cluster. New Server clusters can be
created and nodes can be added to an existing Server cluster from a remote management station. In
addition, drive letter changes and physical disk resource fail-over are updated to Terminal Server
client's sessions.
Benefits
• Easier Administration – allows for better remote administration via Terminal Services.
Command Line Tools
Server cluster creation and configuration can be scripted through the cluster.exe command line tool.
Benefits
• Easier Administration – much easier to automate the process of creating a cluster.
Simpler Uninstallation
Uninstalling Cluster Service from a node is now a one step process of evicting the node. Previous
versions required eviction followed by uninstallation.
Benefits
• Easier Administration – Uninstalling the Cluster Service is much more efficient as you
only need to evict the node through Cluster Administrator or Cluster.exe and the node is
unconfigured for Cluster support. There is also a new switch for Cluster.exe which will
force the uninstall if there is a problem with getting into Cluster Administrator:
cluster node %NODENAME% /force
Quorum Log Size
The default size of the quorum log has been increased to 4096 KB (was 64 KB).
Benefits
• Large number of shares – a quorum log of 4,096 KB allows for large numbers of file or
printer shares (e.g. 200 printer shares). In previous versions, the quorum log would run
out of space with this many shares, causing inconsistent failover of resources.
Local Quorum
If a node is not attached to a shared disk, it will automatically configure a "Local Quorum" resource. It
is also possible to create a local quorum resource once Cluster Service is running.
Benefits
What’s New in Clustering for Windows Server 2003 10
11. Microsoft® Windows® Server 2003 Technical Article
• Test Cluster – This makes it very easy for users to create a test cluster on their local PC
for testing out cluster applications, or for getting familiar with the Cluster Service. Users
do not need special cluster hardware that has been certified on the Microsoft Cluster HCL
to run a test cluster.
Note: Local quorum is only supported for one node clusters (i.e. lonewolf). In addition, the
use of hardware that has not been certified on the HCL is not supported for production
environments.
• Recovery – in the event you lose all of your shared disks, one option for getting a
temporary cluster working (e.g. while you wait for new hardware) is to use the cluster.exe
/fixquorum switch to start the cluster, then create a local quorum resource and set this as
your quorum. In the case of a print cluster, you can point the spool folder to the local disk.
In the case of a file share, you can point the file share resource to the local disk, where
backup data has been restored. Obviously, this does not provide any failover, and would
only be seen as a temporary measure.
Quorum Selection
You no longer need to select which disk is going to be used as the Quorum Resource. It is
automatically configured on the smallest disk that is larger then 50 MB and formatted NTFS.
Benefits
• Easier Administration – the end user no longer has to worry about which disk to use for
the quorum. NOTE: The option to move the Quorum Resource to another disk is
available during setup or after the Cluster has been configured.
Integration
Active Directory
Cluster Service now has much tighter integration with Active Directory™ (AD), including a “virtual”
computer object, Kerberos authentication, and a default location for services to publish service control
points (e.g. MSMQ).
Benefits
• Virtual Server – by publishing a cluster virtual server as a computer object in the Active
Directory, users can access the virtual server just like any other Windows 2000 server. In
particular, it removes the need for NetBIOS to browse and administrator the cluster
nodes, allowing clients to locate cluster objects via DNS, the default name resolution
service for Windows Server 2003. NOTE: Although the network name Server cluster
resource publishes a computer object in Active Directory, that computer object should
NOT be used for administrative tasks such as applying group policy. The ONLY roles for
the virtual server computer object in Windows Server 2003 are:
What’s New in Clustering for Windows Server 2003 11
12. Microsoft® Windows® Server 2003 Technical Article
o To allow Kerberos authentication to services hosted in a virtual server, and
o For cluster-aware and Active Directory-aware services (such as MSMQ) to
publish service provider information specific to the virtual server they are hosted
in.
• Kerberos Authentication – this form of authentication allows users to be authenticated
against a server without ever having to send their password. Instead, they present a
ticket that grants them access to the server. This contrasts to NTLM authentication, used
by Windows 2000 Cluster Service, which sends the user’s password as a hash over the
network. In addition, Kerberos supports mutual authentication of client and server, and
allows delegation of authentication across multiple machines. NOTE: In order to have
Kerberos authentication for the virtual server in a mixed mode cluster (i.e. Windows 2000
& Windows Server 2003), you must be running Windows 2000 Advanced Server SP3 or
higher. Otherwise NTLM will be used for all authentications.
• Publish Services – now that Cluster Service is Active Directory-aware, it can integrate
with other services that publish information about their service in AD. For example,
Microsoft Message Queuing (MSMQ) 2.0 can publish information about public queues in
AD, so that users can easily find their nearest queue,. Windows Server 2003 now
extends this to allow clustered public queue information to be published in AD.
NOTE: Cluster integration does not make any changes to the AD schema.
Extend Cluster Shared Disk Partitions
If the underlying storage hardware supports dynamic expansions of a disk unit, or LUN, then the disk
volume can be extended online using the DISKPART.EXE utility.
Benefits
Easier Administration – Existing volumes can be expanded online without taking down applications
or services.
Resources
Printer Configuration
Cluster Service now provides a much simpler configuration process for setting up clustered printers.
Benefits
• Easier Administration – To set up a clustered print server, you need to configure only the
Spooler resource in Cluster Administrator and then connect to the virtual server to
configure the ports and print queues. This is an improvement over previous versions of
Cluster Service in which you had to repeat the configuration steps on each node in the
cluster, including installing printer drivers.
What’s New in Clustering for Windows Server 2003 12
13. Microsoft® Windows® Server 2003 Technical Article
MSDTC Configuration
The Microsoft Distributed Transaction Coordinator (MSDTC) can now be configured once, and then
be replicated to all nodes.
Benefits
• Easier Administration – in previous versions, the COMCLUST.EXE utility had to be run
on each node in order to cluster the MSDTC. It is now possible to configure MSDTC as a
resource type, assign it to a resource group, and have it automatically configured on all
cluster nodes.
Scripting
Existing applications can be made Server cluster-aware using scripting (VBScript and Jscript) rather
than writing resource dlls in C or C++.
Benefits
• Easier Development – makes it much simpler to write specific resource plug-ins for
applications so they can be monitored and controlled in a Server cluster. Supports
resource specific properties, allowing a resource script to store Server cluster-wide
configurations that can be used and managed in the same way as any other resource.
MSMQ Triggers
Cluster Service has enhanced the MSMQ resource type to allow multiple instances on the same
cluster.
Benefits
• Enhanced Functionality – allows you to have multiple clustered message queues running
at the same time, providing increased performance (in the case of Active/Active MSMQ
clusters) and flexibility.
NOTE: You can only have one MSMQ resource per Cluster Group
Network Enhancements
Enhanced Network Failover
Cluster Service now supports enhanced logic for failover when there has been a complete loss of
internal (heartbeat) communication. The network state for public communication of all nodes is now
taken into account.
Benefits
• Better Failover – in Windows 2000, if Node A owned the quorum disk and lost all network
interfaces (i.e. public and heartbeat), it would retain control of the cluster, despite the fact
that no one could communicate with it, and that another node may have had a working
What’s New in Clustering for Windows Server 2003 13
14. Microsoft® Windows® Server 2003 Technical Article
public interface. Windows Server 2003 cluster nodes now take the state of their public
interfaces into account prior to arbitrating for control of the cluster.
Media Sense Detection
When using Cluster Service, if network connectivity is lost, the TCP/IP stack does not get unloaded
by default, as it did in Windows 2000. There is no longer the need to set the
DisableDHCPMediaSense registry key.
Benefits
• Better Failover – in Windows 2000, if network connectivity is lost, the TCP/IP stack was
unloaded, which meant that all resources that depended on IP addresses were taken
offline. Also, when the networks came back online, their network role reverted to the
default setting (i.e. client and private). By disabling Media Sense by default, it means the
network role is preserved, as well as keeping all IP address dependant resources online.
Multicast Heartbeat
Allows multi-cast heartbeats between nodes in a Server cluster. Multi-cast heartbeat is automatically
selected if the cluster is large enough and the network infrastructure can support multi-cast between
the cluster nodes. Although the multi-cast parameters can be controlled manually, a typical
configuration requires no administration tasks or tuning to enable this feature. If multicast
communication fails for any reason, the internal communications will revert to unicast. All internal
communications are signed and secure.
Benefits
• Reduced Network Traffic – by using multicast, it reduces the amount of traffic in a cluster
subnet, which can be particularly beneficial in clusters of more than two nodes, or
geographically dispersed clusters.
Storage
Volume Mount Points
Volume mount points are now supported on shared disks (excluding the quorum), and will work
properly on failover if configured correctly.
Benefits
• Flexible Filesystem Namespace - volume mount points (Windows 2000 or later) are
directories that point to specified disk volumes in a persistent manner (e.g. you can
configure C:Data to point to a disk volume). They bypass the need to associate each
disk volume with a drive letter, thereby surpassing the 26 drive letter limitation (e.g.
without volume mount points, you would have to create a G: drive to map the “Data”
What’s New in Clustering for Windows Server 2003 14
15. Microsoft® Windows® Server 2003 Technical Article
volume to). Now that Cluster Service supports volume mount points, you have much
greater flexibility in how you map your shared disk namespace.
NOTE: The directory that hosts the volume mount point must be NTFS since the underlying
mechanism uses NTFS reparse points. However the file system that is being mounted can be FAT,
FAT32, NTFS, CDFS, or UDFS.
Client Side Caching (CSC)
Client Side Caching (CSC) is now supported for clustered file shares.
Benefits
• Offline File Access –Client Side Caching for clustered file shares allows a client to cache
data stored on a clustered share. The client works on a local copy of the data that is
uploaded back to the Server cluster when the file is closed. This allows the failure of a
server in the Server cluster and the subsequent failover of the file share service to be
hidden from the client.
Distributed File System
Distributed File System (DFS) has had a number of improvements, including multiple stand-alone
roots, independent root failover, and support for Active/Active configurations.
Benefits
Distributed File System (DFS) allows multiple file shares on different machines to be aggregated into
a common namespace (e.g. dfsrootshare1 and dfsrootshare2 are actually aggregated from
server1share1 and server2share2). New clustering benefits include:
• Multiple Stand-Alone Roots – previous versions only supported one clustered stand-
alone root. You can now have multiple ones, giving you much greater flexibility in
planning your distributed file system namespace (e.g. multiple DFS roots on the same
virtual server, or multiple DFS roots on different virtual servers).
• Independent Failover – granular failover control is available for each DFS root, allowing
you to configure failover settings on an individual basis and resulting in faster failover
times.
• Active/Active Configurations – you can now have multiple stand-alone roots running
actively on multiple nodes.
Encrypted File System
With Windows Server 2003, the encrypting file system (EFS) is supported on clustered file shares.
This allows data to be stored in encrypted format on clustered disks.
What’s New in Clustering for Windows Server 2003 15
16. Microsoft® Windows® Server 2003 Technical Article
Storage Area Networks (SAN)
Clustering has been optimized for SANs, including targeted device resets and the shared storage
buses.
Benefits
• Targeted Bus Resets - the Server cluster software now issues a special control code
when releasing disk drives during arbitration. This can be used in conjunction with HBA
drivers that support the extended Windows Server 2003 feature set to selectively reset
devices on the SAN rather than full bus reset. This ensures that the Server cluster has
much lower impact on the SAN fabric.
• Shared Storage Bus – shared disks can be located on the same storage bus as the Boot,
Pagefile and dump file disks. This allows a clustered server to have a single storage bus
(or a single redundant storage bus). NOTE: This feature is disabled by default due to the
configuration restrictions. This feature can/should only be enabled by OEMs and IHVs for
specific and qualified solutions. This is NOT a general purpose feature exposed to end
users.
Operations
Backup and Restore
You can actively restore the local cluster nodes cluster configuration or you can restore the cluster
information to all nodes in the Cluster. A node restoration is also built into Automatic System
Recovery (ASR).
Benefits
• Backup and Restore – Backup (NTBackup.exe) in Windows Server 2003 has been
enhanced to enable seamless backups and restores of the local Cluster database, and to
be able to restore the configuration locally and to all nodes in a Cluster.
• Automated System Recovery – ASR can completely restore a cluster in a variety of
scenarios, including: a) damaged or missing system files, b) complete OS reinstallation
due to hardware failure, c) a damaged Cluster database, and d) changed disk signatures
(including shared).
Enhanced Node Failover
Cluster Service now includes enhanced logic for node failover when you have a cluster with three or
more nodes. This includes doing a manual “Move Group” operation in Cluster Administrator.
Benefits
• Better Failover – during failover in a cluster with three or more nodes, the Cluster Service
will take into account the “Preferred Owner List” for each resource, as well as the
What’s New in Clustering for Windows Server 2003 16
17. Microsoft® Windows® Server 2003 Technical Article
installation order for each node, in order to work out which node the group should be
moved to.
Group Affinity Support
Allows an application to describe itself as an N+I application. In other words, the application is running
actively on N nodes of the Server cluster and there are I “spare” nodes available if an active node
fails. In the event of failure, the failover manager will try to ensure that the application is failed over to
a spare node rather than a node that is currently running the application.
Benefits
• Better performance – applications are failed over to spare nodes before active nodes.
Node Eviction
Evicting a node from a Server cluster no longer requires a reboot to clean up the Server cluster state.
A node can be moved from one Server cluster to another without having to reboot. In the even of a
catastrophic failure, the Server cluster configuration can be force cleaned regardless of the Server
cluster state.
Benefits
• Increased Availability – not having to reboot increases the uptime of the system.
• Disaster Recovery – in the event of a node failure, the cluster can be cleaned up easily.
Rolling Upgrades
Rolling upgrades are supported from Windows 2000 to Windows Server 2003.
Benefits
• Minimum downtime – rolling upgrades allow one node in a cluster to be taken offline for
upgrading, while other nodes in the cluster continue to function on an older version.
NOTE: There is no support for rolling upgrades from a Microsoft Windows NT 4.0 cluster
to a Windows Server 2003 cluster. An upgrade from Windows NT 4.0 is supported but
the cluster will have to be taken offline during the upgrade.
Queued Changes
The cluster service will now queue up changes that need to be completed if a node is offline.
Benefits
• Easier Administration – ensures that you do not need to apply a change twice if a node is
offline. For example, if a node is offline and is evicted from the Cluster by a remaining
node, the cluster service will be uninstalled the next time the first node attempts to join
the Cluster. This also holds true for applications.
What’s New in Clustering for Windows Server 2003 17
18. Microsoft® Windows® Server 2003 Technical Article
Disk Changes
The Cluster Service more efficiently adjusts to shared disk changes in regards to size changes and
drive letter assignments.
Benefits
• Dynamic Disk Size – If you increase the size of a shared disk, the Cluster Service will
now dynamically adjust to it. This is particularly helpful for SANs, where volume sizes can
change easily. It does this by working directly with Volume Mount Manager, and no
longer directly uses the DISKINFO or DISK keys. NOTE: These keys are maintained for
backwards compatibility with previous versions of the Cluster Service.
Password Change
Cluster Service account password changes no longer require any downtime of the cluster nodes. In
addition, passwords can be reset on multiple clusters at the same time.
Benefits
• Reduced Downtime – In Windows Server 2003, you can change the Cluster Service
account password on the domain as well as on each local node, without having to take
the cluster offline. If multiple clusters use the same Cluster service account, you can
change them simultaneously. In Microsoft Windows NT 4.0 and Microsoft Windows 2000,
to change the Cluster service account password, you have to stop the Cluster service on
all nodes before you can make the password change.
Resource Deletion
Resources can be deleted in Cluster Administrator or with Cluster.exe without taking them offline first.
Benefits
• Easier Administration – in previous versions, you first had to take a resource offline
before you could delete it. Now, Cluster Service will take them offline automatically, and
then delete them.
WMI Support
Server clusters provides WMI support for:
• Cluster control and management functions including starting and stopping resources,
creating new resource and dependencies etc.
• Application and cluster state information. WMI can be used to query whether applications
are online, whether cluster nodes are up and running as well as a host of other status
information.
What’s New in Clustering for Windows Server 2003 18
19. Microsoft® Windows® Server 2003 Technical Article
• Cluster state change events are propagated via WMI to allow applications to subscribe to
WMI events that show when an application has failed, when an application is restarted,
when a node fails etc.
Benefits
• Better Management – allows Server clusters to be managed as part of an overall WMI
environment.
Supporting and Troubleshooting
Offline/Failure Reason Codes
These provide additional information to the resource as to why the application was taken offline, or
failed.
Benefits
• Better Troubleshooting – allows the application to have different semantics if the
application has failed or some dependency of the application has failed, versus the
administrator specifically moved the group to another node in the Server cluster.
Software Tracing
Cluster Service now has a feature called software tracing that will produce more information to help
with troubleshooting Cluster issues.
Benefits
• Better Troubleshooting – this is a new method for debugging that will allow Microsoft to
debug the Cluster Service without loading checked build versions of the dll's (symbols).
Cluster Logs
A number of improvements have been made to the Cluster Service log files, including a setup log,
error levels (info, warn, err), local server time entry, and GUID to resource name mapping.
Benefits
• Setup Log – during configuration of Cluster Service, a separate setup log (%SystemRoot
%system32LogfilesClusterClCfgSrv.log) is created to assist in troubleshooting.
• Error Levels – this makes it easy to be able to highlight just the entries that require action
(e.g. err).
• Local Server Time Stamp – this will assist in comparing event log entries to Cluster logs.
What’s New in Clustering for Windows Server 2003 19
20. Microsoft® Windows® Server 2003 Technical Article
• GUID to Resource Name Mapping – this assists in understanding the cluster log
references to GUIDs. A Cluster object file (%windir%ClusterCluster.obj) is automatically
created and maintained that contains a mapping of GUID's to Resource Name mappings.
Event Log
Additional events are written to the event log indicating not only error cases, but showing when
resources are successfully failed over from one node to another. Benefits
• Better Monitoring – this allows event log parsing and management tools to be used to
track successful failovers rather than just catastrophic failures.
Clusdiag
A new tool called clusdiag is available in the Windows Server 2003 Resource Kit.
Benefits
• Better Troubleshooting – makes reading and correlating cluster logs across multiple
cluster nodes and debugging of cluster issues more straight forward.
• Validation and Testing – Clusdiag allows users to run stress tests on the server, storage
and clustering infrastructure. As such, it can be used as a validation and test tool before a
cluster can be put into production
Chkdsk Log
The cluster service creates a chkdsk log whenever chkdsk is run on a shared disk.
Benefits
• Better Monitoring – this allows a system administrator to find out and react to any issues
that were discovered during the chkdsk process.
Disk Corruption
When Disk Corruption is suspect, the Cluster Service reports the results of CHKDSK in event logs
and creates a log in %sytemroot%cluster.
Benefits
• Better Troubleshooting – results are logged in the Application and Cluster.log. In addition,
the Cluster.log references a log file (e.g. %windir
%CLUSTERCHKDSK_DISK2_SIGE9443789.LOG) in which detailed CHKDSK output is
recorded.
What’s New in Clustering for Windows Server 2003 20
21. Network Load Balancing
Network Load Balancing Manager
In Windows 2000, to create an NLB Cluster, users had to separately configure each machine in the
cluster. Not only was this unnecessary additional work, but it also opened up the possibility for
unintended user error because identical Cluster Parameters and Port Rules had to be configured on
each machine. A new utility in Windows Server 2003 called the NLB Manager helps solve some of
these problems by providing single point of configuration and management of NLB clusters. Some
key features of the NLB Manager:
• Creating new NLB clusters and automatically propagating Cluster Parameters and Port
Rules to all hosts in the cluster and propagating Host Parameters to specific hosts in the
cluster.
• Adding and removing hosts to and from NLB clusters.
• Automatically adding Cluster IP Addresses to TCP/IP.
• Managing existing clusters simply by connecting to them or by loading their host
information from a file and then saving this information to a file for later use.
• Configuring NLB to load balance multiple web sites or applications on the same NLB
Cluster, including adding all Cluster IP Addresses to TCP/IP and controlling traffic sent to
specific applications on specific hosts in the cluster. [See the Virtual Clusters feature
below]
• Diagnosing mis-configured clusters.
Virtual Clusters
In Windows 2000, users could load balance multiple web sites or applications on the same NLB
Cluster simply by adding the IP Addresses corresponding to these web sites or applications to
TCP/IP on each host in the cluster. This is because NLB, on each host, load balanced all IP
Addresses in TCP/IP, except the Dedicated IP Address. The shortcomings of this feature in Windows
2000 were:
• Port Rules specified for the cluster were automatically applied to all web sites or
applications load balanced by the cluster.
• All the hosts in the cluster had to handle traffic for all the web sites/ applications hosted
on them.
22. Microsoft® Windows® Server 2003 Technical Article
• To block out traffic for a specific application on a specific host, traffic for all applications
on that host had to be blocked.
A new feature in Windows Server 2003 called Virtual Clusters overcomes the above deficiencies by
providing per-IP Port Rules capability. This allows the user to:
• Configure different Port Rules for different Cluster IP Addresses, where each Cluster IP
Address corresponds to a web site or application being hosted on the NLB Cluster. This
is in contrast to NLB in Windows 2000, where Port Rules were applicable to an entire
host and not to specific IP Addresses on that host.
• Filter out traffic sent to a specific website/application on a specific host in the cluster. This
allows individual applications on hosts to be taken offline for upgrades, restarts, etc.
without affecting other applications being load balanced on the rest of the NLB cluster.
• Pick and choose which host in the cluster should service traffic sent to which website or
application being hosted on the cluster. This way, not all hosts in the cluster need to
handle traffic for all applications being hosted on that cluster.
Multi-NIC support
Windows 2000 allowed the user to bind NLB to only one network card in the system. Windows Server
2003 allows the user to bind NLB to multiple network cards, thus removing the limitation.
This now enables users to:
• Host multiple NLB clusters on the same hosts while leaving them on entirely independent
networks. This can be achieved by binding NLB to different network cards in the same
system.
• Use NLB for Firewall and Proxy load balancing in scenarios where load balancing is
required on multiple fronts of a proxy or firewall.
Bi-directional Affinity
The addition of the Multi-NIC support feature enabled several other scenarios where there was a
need for load balancing on multiple fronts of an NLB Cluster. The most common usage of this feature
will be to cluster ISA servers for Proxy and Firewall load balancing. The two most common scenarios
where NLB will be used together with ISA are:
• Web Publishing
• Server Publishing
In the Web Publishing scenario, the ISA cluster typically resides between the outside internet and the
front-end web servers. In this scenario, the ISA servers will have NLB bound only to the external
interface, therefore, there will be no need to use the Bi-directional Affinity feature.
What’s New in Clustering for Windows Server 2003 22
23. Microsoft® Windows® Server 2003 Technical Article
However, in the Server Publishing scenario, the ISA cluster will reside between the Web Servers in
the front, and the Published Servers in the back. Here, NLB will have to be bound to both the external
interface [facing the Web servers] and the internal interface [facing the Published Servers] of each
ISA server in the cluster. This increases the level of complexity because now when connections from
the Web Servers are being load balanced on the external interface of the ISA Cluster and then
forwarded by one of the ISA servers to a Published Server, NLB has to ensure that the response from
the Published Server is always routed to the same ISA server that handled the corresponding request
from the Web Server because this is the only ISA server in the cluster that has the security context for
that particular session. So, NLB has to make sure that the response from Published Server does not
get load balanced on the internal interface of the ISA Cluster since this interface is also clustered
using NLB.
This task is accomplished by the new feature in Windows Server 2003 called Bi-directional Affinity.
Bi-directional affinity makes multiple instances of NLB on the same host work in tandem to ensure
that responses from Published Servers are routed through the appropriate ISA servers in the cluster.
Limiting switch flooding using IGMP support
The NLB algorithm requires every host in the NLB Cluster to see every incoming packet destined for
the cluster. NLB accomplishes this by never allowing the switch to associate the cluster’s MAC
address with a specific port on the switch. However, the unintended side effect of this requirement is
that the switch ends up flooding all of its ports with all incoming packets meant for the NLB cluster.
This can certainly be a nuisance and a waste of network resources. In order to arrest this problem, a
new feature called IGMP support has been introduced in Windows Server 2003. This feature helps
limit the flooding to only those ports on the switch that have NLB machines connected to them. This
way, non-NLB machines do not see traffic that was intended only for the NLB Cluster, while at the
same time, all of the NLB machines see traffic that was meant for the cluster, thus satisfying the
requirements of the algorithm. It should, however, be noted that IGMP support can only be enabled
when NLB is configured in multicast mode. Multicast mode has its own drawbacks which are
discussed extensively in KB articles available on www.microsoft.com. The user should be aware of
these shortcomings of multicast mode before deploying IGMP support. Switch flooding can also
limited when using unicast mode by creating VLANs in the switch and putting the NLB cluster on its
own VLAN. Unicast mode does not have the same drawbacks as Multicast mode, and so limiting
switch flooding using this approach may be preferable.
What’s New in Clustering for Windows Server 2003 23