SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
Windows 8
Disk Deduplication Deep Dive
         Ronald Beekelaar
         Virsoft Solutions
      ronald@beekelaar.com

                             Schiphol, 19 jan 2012
Introductions
• Presenter
   – MVP Security
   – MVP Virtual Machine Technology
   – E-mail: ronald@beekelaar.com

• Work
   –   Security consultancy
   –   Virtualization consultancy
   –   Create many VM-based labs and demos
   –   Software to optimize, manage and run VM
   –   Maintain four datacenters world-wide
        • Running Hyper-V labs for customers (MOC, training and demo purposes)
Objectives
• Discuss one interesting new aspect of
  Windows 8: Disk Deduplication
What is Disk Deduplication ?
• Goal:
  – Use less storage space


• Method:
  – Ensure that identical content in multiple (large) files is
    only stored once


• Is block-based, post-process, transparant solution
Standard deduplication modes
• "Source"
   – Prevent transferring data, if duplicate
       • Used by Remote Differential Compression
• "Inline"
   – Perform deduplication when data is written
       • Used by NTFS file compression
       • Write process is slowed down
• "Post-Process" (or "Background")
   – Perform deduplication later, in background, when idle
       • Used by Windows 8 Data Deduplication
Other methods to save disk space
• SIS (single-instance-store) in Win2000
   – Is file-based, not block-based

• NTFS file compression
   – Is inline, not post-process
   – Much more CPU intensive

• NTFS hard links
   – Is not transparent
   – Is file-based, not block-based
NTFS Hard Links
• Multiple file entries pointing to same data
• Manage
  – Create: mklink /h link.ext target.ext
  – List: fsutil hardlink list file.ext
• Is not transparent
  – Edit one hardlink file, also changes other files
• Windows uses thousands of hard links (!)
  – Good reason not to touch C:Windowswinsxs
Windows 8 dedup architecture
• Is file-system filter driver
   – Coordinates between file entry, regular storage
     and 'chunk' storage
• Dedup service (ddpsvc)
  runs jobs to deduplicate
  files
How does Windows 8 dedup work?
• Dedup service recognizes common 'chunks' in
  files, and places those in Chunk Store
   – In System Volume Information folder
• Dedup filter driver ensures that applications read
  correct file content

• File "size" (= content length) does not change in
  Explorer
   – Explorer reports "size-on-disk" as 4 KB
How does Windows 8 dedup work?
Windows 8 dedup details
• Dedup works per volume
  – Also works on portable disks
  – Dedup does NOT work on C: (Windows) volume
• Chunk size is 32-128 KB (average 80 KB)
• By default
  – Chunks are compressed in chunk store
     • Avoids re-compressing compressed files (zip, etc)
  – Dedup service ignores files < 64 KB
  – Dedup service ignores files changed in last 30 days
  – Dedup service ignores NTFS encrypted files
Savings?
• Depends on file content of course
• Microsoft reported averages:
  – General: 50-60% savings
     • Documents: 30-50% saving
     • Application library: 70-80% savings
     • VHD library: 80-95% savings
Performance?
• Write has no direct performance hit
  – Dedup operations are done post-process

• Read has a ~3% performance hit (if not in cache)
  – Due to more disk head operations
  – Compare with disk fragmentation

• Windows caching is dedup-aware (!)
  – Dedup improves caching efficience
Reliable?
• My opinion: Yes - 100%

• Data is check-summed
    – Means: invalid data is detected
• Operations are crash consistent
    – Means: can interrupt/crash operation at any time without losing
      data
• Data is self-describing
    – Means: it can be read without external data
• Popular 'chunks' (>100x) are stored multiple times
    – Means: avoids creating IO hotspots on disk



January 20, 2012       NIC 2012
How to enable Windows 8 dedup?
• Install Data Deduplication role service
• Start Data Duplication Service (ddpsvc)
• Powershell
    – import-module Deduplication
    – help dedup

    – enable-dedupvolume D:
    – set-dedupvolume D: -minimumfileagedays 0
        • Default is 30 days
    – start-dedupjob D: -type Optimization
        • Use Unoptimization to undo

    – get-dedupjob
    – get-dedupstatus
    – get-dedupmetadata
Questions ?
• Thanks for your attention

Weitere ähnliche Inhalte

Was ist angesagt?

Raid data recovery Tips
Raid data recovery TipsRaid data recovery Tips
Raid data recovery TipsHone Software
 
Modeling, estimating, and predicting Ceph (Linux Foundation - Vault 2015)
Modeling, estimating, and predicting Ceph (Linux Foundation - Vault 2015)Modeling, estimating, and predicting Ceph (Linux Foundation - Vault 2015)
Modeling, estimating, and predicting Ceph (Linux Foundation - Vault 2015)Lars Marowsky-Brée
 
Virtualization workshop - part 1
Virtualization workshop - part 1Virtualization workshop - part 1
Virtualization workshop - part 1Davide Pelosi
 
Northern Colorado BigData Meetup 15Jan2015
Northern Colorado BigData Meetup 15Jan2015Northern Colorado BigData Meetup 15Jan2015
Northern Colorado BigData Meetup 15Jan2015Bryan Gartner
 
Raid- Redundant Array of Inexpensive Disks
Raid- Redundant Array of Inexpensive DisksRaid- Redundant Array of Inexpensive Disks
Raid- Redundant Array of Inexpensive DisksMudit Mishra
 
MongoDB World 2015 - A Technical Introduction to WiredTiger
MongoDB World 2015 - A Technical Introduction to WiredTigerMongoDB World 2015 - A Technical Introduction to WiredTiger
MongoDB World 2015 - A Technical Introduction to WiredTigerWiredTiger
 
Storing data in windows server 2012 ss
Storing data in windows server 2012 ssStoring data in windows server 2012 ss
Storing data in windows server 2012 ssKamil Bączyk
 

Was ist angesagt? (20)

Raid level
Raid levelRaid level
Raid level
 
RAID and LVM
RAID and LVMRAID and LVM
RAID and LVM
 
Raid data recovery Tips
Raid data recovery TipsRaid data recovery Tips
Raid data recovery Tips
 
Modeling, estimating, and predicting Ceph (Linux Foundation - Vault 2015)
Modeling, estimating, and predicting Ceph (Linux Foundation - Vault 2015)Modeling, estimating, and predicting Ceph (Linux Foundation - Vault 2015)
Modeling, estimating, and predicting Ceph (Linux Foundation - Vault 2015)
 
Raid Technology
Raid TechnologyRaid Technology
Raid Technology
 
Virtualization workshop - part 1
Virtualization workshop - part 1Virtualization workshop - part 1
Virtualization workshop - part 1
 
Raid 5
Raid 5Raid 5
Raid 5
 
RAID LEVELS
RAID LEVELSRAID LEVELS
RAID LEVELS
 
Raid
RaidRaid
Raid
 
Raid level 4
Raid level 4Raid level 4
Raid level 4
 
Northern Colorado BigData Meetup 15Jan2015
Northern Colorado BigData Meetup 15Jan2015Northern Colorado BigData Meetup 15Jan2015
Northern Colorado BigData Meetup 15Jan2015
 
Raid
RaidRaid
Raid
 
Raid
RaidRaid
Raid
 
Raid
RaidRaid
Raid
 
RAID
RAIDRAID
RAID
 
Raid
RaidRaid
Raid
 
Raid- Redundant Array of Inexpensive Disks
Raid- Redundant Array of Inexpensive DisksRaid- Redundant Array of Inexpensive Disks
Raid- Redundant Array of Inexpensive Disks
 
MongoDB World 2015 - A Technical Introduction to WiredTiger
MongoDB World 2015 - A Technical Introduction to WiredTigerMongoDB World 2015 - A Technical Introduction to WiredTiger
MongoDB World 2015 - A Technical Introduction to WiredTiger
 
RAID
RAIDRAID
RAID
 
Storing data in windows server 2012 ss
Storing data in windows server 2012 ssStoring data in windows server 2012 ss
Storing data in windows server 2012 ss
 

Andere mochten auch

Scvmm 2012 (maarten wijsman)
Scvmm 2012 (maarten wijsman)Scvmm 2012 (maarten wijsman)
Scvmm 2012 (maarten wijsman)hypervnu
 
Cluster aware updating v1.0
Cluster aware updating v1.0Cluster aware updating v1.0
Cluster aware updating v1.0hypervnu
 
Vm mobility
Vm mobilityVm mobility
Vm mobilityhypervnu
 
The way you can deploy hyper v
The way you can deploy hyper vThe way you can deploy hyper v
The way you can deploy hyper vhypervnu
 
Keynote 2011 (wesselius noorderijk)
Keynote 2011 (wesselius noorderijk)Keynote 2011 (wesselius noorderijk)
Keynote 2011 (wesselius noorderijk)hypervnu
 
Windows server 8 hyper v networking (aidan finn)
Windows server 8 hyper v networking (aidan finn)Windows server 8 hyper v networking (aidan finn)
Windows server 8 hyper v networking (aidan finn)hypervnu
 

Andere mochten auch (6)

Scvmm 2012 (maarten wijsman)
Scvmm 2012 (maarten wijsman)Scvmm 2012 (maarten wijsman)
Scvmm 2012 (maarten wijsman)
 
Cluster aware updating v1.0
Cluster aware updating v1.0Cluster aware updating v1.0
Cluster aware updating v1.0
 
Vm mobility
Vm mobilityVm mobility
Vm mobility
 
The way you can deploy hyper v
The way you can deploy hyper vThe way you can deploy hyper v
The way you can deploy hyper v
 
Keynote 2011 (wesselius noorderijk)
Keynote 2011 (wesselius noorderijk)Keynote 2011 (wesselius noorderijk)
Keynote 2011 (wesselius noorderijk)
 
Windows server 8 hyper v networking (aidan finn)
Windows server 8 hyper v networking (aidan finn)Windows server 8 hyper v networking (aidan finn)
Windows server 8 hyper v networking (aidan finn)
 

Ähnlich wie Windows 8 dddd (beekelaar)

Data Reduction for Gluster with VDO
Data Reduction for Gluster with VDOData Reduction for Gluster with VDO
Data Reduction for Gluster with VDOGluster.org
 
On non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andOn non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andAlisa Esage Шевченко
 
Esage on non-existent 0-days, stable binary exploits and user interaction
Esage   on non-existent 0-days, stable binary exploits and user interactionEsage   on non-existent 0-days, stable binary exploits and user interaction
Esage on non-existent 0-days, stable binary exploits and user interactionDefconRussia
 
engage 2019 - 15 Domino v10 Admin features we LOVE
engage 2019 - 15 Domino v10 Admin features we LOVEengage 2019 - 15 Domino v10 Admin features we LOVE
engage 2019 - 15 Domino v10 Admin features we LOVEChristoph Adler
 
The Ultimate IBM and Lotus on Linux Workshop for Windows Admins
The Ultimate IBM and Lotus on Linux Workshop for Windows AdminsThe Ultimate IBM and Lotus on Linux Workshop for Windows Admins
The Ultimate IBM and Lotus on Linux Workshop for Windows AdminsBill Malchisky Jr.
 
Cloud computing UNIT 2.1 presentation in
Cloud computing UNIT 2.1 presentation inCloud computing UNIT 2.1 presentation in
Cloud computing UNIT 2.1 presentation inRahulBhole12
 
Gregory engels nsd crash course - ilug10
Gregory engels   nsd crash course - ilug10Gregory engels   nsd crash course - ilug10
Gregory engels nsd crash course - ilug10Grégory Engels
 
Deployment Strategies (Mongo Austin)
Deployment Strategies (Mongo Austin)Deployment Strategies (Mongo Austin)
Deployment Strategies (Mongo Austin)MongoDB
 
IOD 2013 - Crunch Big Data in the Cloud with IBM BigInsights and Hadoop
IOD 2013 - Crunch Big Data in the Cloud with IBM BigInsights and HadoopIOD 2013 - Crunch Big Data in the Cloud with IBM BigInsights and Hadoop
IOD 2013 - Crunch Big Data in the Cloud with IBM BigInsights and HadoopLeons Petražickis
 
Are the Native SQL Server Backup Utilities Holding You Back?
Are the Native SQL Server Backup Utilities Holding You Back?Are the Native SQL Server Backup Utilities Holding You Back?
Are the Native SQL Server Backup Utilities Holding You Back?SQLDBApros
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsMike Spaulding
 
Robust Applications in Mesos using External Storage
Robust Applications in Mesos using External StorageRobust Applications in Mesos using External Storage
Robust Applications in Mesos using External StorageDavid vonThenen
 
Deployment Strategy
Deployment StrategyDeployment Strategy
Deployment StrategyMongoDB
 
#DNUG45 - IBM Notes and Domino Performance Boost - Reloaded
 #DNUG45 - IBM Notes and Domino Performance Boost - Reloaded #DNUG45 - IBM Notes and Domino Performance Boost - Reloaded
#DNUG45 - IBM Notes and Domino Performance Boost - ReloadedChristoph Adler
 
Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8APSU
 
Hadoop Distributed File System
Hadoop Distributed File SystemHadoop Distributed File System
Hadoop Distributed File SystemRutvik Bapat
 
MongoDB: Advantages of an Open Source NoSQL Database
MongoDB: Advantages of an Open Source NoSQL DatabaseMongoDB: Advantages of an Open Source NoSQL Database
MongoDB: Advantages of an Open Source NoSQL DatabaseFITC
 
Storage talk
Storage talkStorage talk
Storage talkchristkv
 

Ähnlich wie Windows 8 dddd (beekelaar) (20)

Data Reduction for Gluster with VDO
Data Reduction for Gluster with VDOData Reduction for Gluster with VDO
Data Reduction for Gluster with VDO
 
On non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andOn non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits and
 
Esage on non-existent 0-days, stable binary exploits and user interaction
Esage   on non-existent 0-days, stable binary exploits and user interactionEsage   on non-existent 0-days, stable binary exploits and user interaction
Esage on non-existent 0-days, stable binary exploits and user interaction
 
engage 2019 - 15 Domino v10 Admin features we LOVE
engage 2019 - 15 Domino v10 Admin features we LOVEengage 2019 - 15 Domino v10 Admin features we LOVE
engage 2019 - 15 Domino v10 Admin features we LOVE
 
The Ultimate IBM and Lotus on Linux Workshop for Windows Admins
The Ultimate IBM and Lotus on Linux Workshop for Windows AdminsThe Ultimate IBM and Lotus on Linux Workshop for Windows Admins
The Ultimate IBM and Lotus on Linux Workshop for Windows Admins
 
Cloud computing UNIT 2.1 presentation in
Cloud computing UNIT 2.1 presentation inCloud computing UNIT 2.1 presentation in
Cloud computing UNIT 2.1 presentation in
 
Gregory engels nsd crash course - ilug10
Gregory engels   nsd crash course - ilug10Gregory engels   nsd crash course - ilug10
Gregory engels nsd crash course - ilug10
 
Deployment Strategies (Mongo Austin)
Deployment Strategies (Mongo Austin)Deployment Strategies (Mongo Austin)
Deployment Strategies (Mongo Austin)
 
IOD 2013 - Crunch Big Data in the Cloud with IBM BigInsights and Hadoop
IOD 2013 - Crunch Big Data in the Cloud with IBM BigInsights and HadoopIOD 2013 - Crunch Big Data in the Cloud with IBM BigInsights and Hadoop
IOD 2013 - Crunch Big Data in the Cloud with IBM BigInsights and Hadoop
 
Are the Native SQL Server Backup Utilities Holding You Back?
Are the Native SQL Server Backup Utilities Holding You Back?Are the Native SQL Server Backup Utilities Holding You Back?
Are the Native SQL Server Backup Utilities Holding You Back?
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
 
Robust Applications in Mesos using External Storage
Robust Applications in Mesos using External StorageRobust Applications in Mesos using External Storage
Robust Applications in Mesos using External Storage
 
Deployment Strategy
Deployment StrategyDeployment Strategy
Deployment Strategy
 
#DNUG45 - IBM Notes and Domino Performance Boost - Reloaded
 #DNUG45 - IBM Notes and Domino Performance Boost - Reloaded #DNUG45 - IBM Notes and Domino Performance Boost - Reloaded
#DNUG45 - IBM Notes and Domino Performance Boost - Reloaded
 
Hadoop-2.6.0 Slides
Hadoop-2.6.0 SlidesHadoop-2.6.0 Slides
Hadoop-2.6.0 Slides
 
Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8
 
Hadoop Distributed File System
Hadoop Distributed File SystemHadoop Distributed File System
Hadoop Distributed File System
 
MongoDB: Advantages of an Open Source NoSQL Database
MongoDB: Advantages of an Open Source NoSQL DatabaseMongoDB: Advantages of an Open Source NoSQL Database
MongoDB: Advantages of an Open Source NoSQL Database
 
Storage talk
Storage talkStorage talk
Storage talk
 
Chapter2.pdf
Chapter2.pdfChapter2.pdf
Chapter2.pdf
 

Mehr von hypervnu

Delivering people centric it with Configuration Manager 2012 R2
Delivering people centric it with Configuration Manager 2012 R2Delivering people centric it with Configuration Manager 2012 R2
Delivering people centric it with Configuration Manager 2012 R2hypervnu
 
How to bi your operations with System Center 2012 R2 using Operations Manager...
How to bi your operations with System Center 2012 R2 using Operations Manager...How to bi your operations with System Center 2012 R2 using Operations Manager...
How to bi your operations with System Center 2012 R2 using Operations Manager...hypervnu
 
TOP-10 countdown Windows Server 2012 R2 Hyper-V
TOP-10 countdown Windows Server 2012 R2 Hyper-VTOP-10 countdown Windows Server 2012 R2 Hyper-V
TOP-10 countdown Windows Server 2012 R2 Hyper-Vhypervnu
 
Catch up with VMM 2012 r2
Catch up with VMM 2012 r2Catch up with VMM 2012 r2
Catch up with VMM 2012 r2hypervnu
 
Nic teaming and converged fabric
Nic teaming and converged fabricNic teaming and converged fabric
Nic teaming and converged fabrichypervnu
 
Hyper v.nu-windows serverhyperv-networkingevolved
Hyper v.nu-windows serverhyperv-networkingevolvedHyper v.nu-windows serverhyperv-networkingevolved
Hyper v.nu-windows serverhyperv-networkingevolvedhypervnu
 
Windows server 8 hyper v & storage (hans vredevoort)
Windows server 8 hyper v & storage (hans vredevoort)Windows server 8 hyper v & storage (hans vredevoort)
Windows server 8 hyper v & storage (hans vredevoort)hypervnu
 

Mehr von hypervnu (7)

Delivering people centric it with Configuration Manager 2012 R2
Delivering people centric it with Configuration Manager 2012 R2Delivering people centric it with Configuration Manager 2012 R2
Delivering people centric it with Configuration Manager 2012 R2
 
How to bi your operations with System Center 2012 R2 using Operations Manager...
How to bi your operations with System Center 2012 R2 using Operations Manager...How to bi your operations with System Center 2012 R2 using Operations Manager...
How to bi your operations with System Center 2012 R2 using Operations Manager...
 
TOP-10 countdown Windows Server 2012 R2 Hyper-V
TOP-10 countdown Windows Server 2012 R2 Hyper-VTOP-10 countdown Windows Server 2012 R2 Hyper-V
TOP-10 countdown Windows Server 2012 R2 Hyper-V
 
Catch up with VMM 2012 r2
Catch up with VMM 2012 r2Catch up with VMM 2012 r2
Catch up with VMM 2012 r2
 
Nic teaming and converged fabric
Nic teaming and converged fabricNic teaming and converged fabric
Nic teaming and converged fabric
 
Hyper v.nu-windows serverhyperv-networkingevolved
Hyper v.nu-windows serverhyperv-networkingevolvedHyper v.nu-windows serverhyperv-networkingevolved
Hyper v.nu-windows serverhyperv-networkingevolved
 
Windows server 8 hyper v & storage (hans vredevoort)
Windows server 8 hyper v & storage (hans vredevoort)Windows server 8 hyper v & storage (hans vredevoort)
Windows server 8 hyper v & storage (hans vredevoort)
 

Kürzlich hochgeladen

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Kürzlich hochgeladen (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Windows 8 dddd (beekelaar)

  • 1. Windows 8 Disk Deduplication Deep Dive Ronald Beekelaar Virsoft Solutions ronald@beekelaar.com Schiphol, 19 jan 2012
  • 2. Introductions • Presenter – MVP Security – MVP Virtual Machine Technology – E-mail: ronald@beekelaar.com • Work – Security consultancy – Virtualization consultancy – Create many VM-based labs and demos – Software to optimize, manage and run VM – Maintain four datacenters world-wide • Running Hyper-V labs for customers (MOC, training and demo purposes)
  • 3. Objectives • Discuss one interesting new aspect of Windows 8: Disk Deduplication
  • 4. What is Disk Deduplication ? • Goal: – Use less storage space • Method: – Ensure that identical content in multiple (large) files is only stored once • Is block-based, post-process, transparant solution
  • 5. Standard deduplication modes • "Source" – Prevent transferring data, if duplicate • Used by Remote Differential Compression • "Inline" – Perform deduplication when data is written • Used by NTFS file compression • Write process is slowed down • "Post-Process" (or "Background") – Perform deduplication later, in background, when idle • Used by Windows 8 Data Deduplication
  • 6. Other methods to save disk space • SIS (single-instance-store) in Win2000 – Is file-based, not block-based • NTFS file compression – Is inline, not post-process – Much more CPU intensive • NTFS hard links – Is not transparent – Is file-based, not block-based
  • 7. NTFS Hard Links • Multiple file entries pointing to same data • Manage – Create: mklink /h link.ext target.ext – List: fsutil hardlink list file.ext • Is not transparent – Edit one hardlink file, also changes other files • Windows uses thousands of hard links (!) – Good reason not to touch C:Windowswinsxs
  • 8. Windows 8 dedup architecture • Is file-system filter driver – Coordinates between file entry, regular storage and 'chunk' storage • Dedup service (ddpsvc) runs jobs to deduplicate files
  • 9. How does Windows 8 dedup work? • Dedup service recognizes common 'chunks' in files, and places those in Chunk Store – In System Volume Information folder • Dedup filter driver ensures that applications read correct file content • File "size" (= content length) does not change in Explorer – Explorer reports "size-on-disk" as 4 KB
  • 10. How does Windows 8 dedup work?
  • 11. Windows 8 dedup details • Dedup works per volume – Also works on portable disks – Dedup does NOT work on C: (Windows) volume • Chunk size is 32-128 KB (average 80 KB) • By default – Chunks are compressed in chunk store • Avoids re-compressing compressed files (zip, etc) – Dedup service ignores files < 64 KB – Dedup service ignores files changed in last 30 days – Dedup service ignores NTFS encrypted files
  • 12. Savings? • Depends on file content of course • Microsoft reported averages: – General: 50-60% savings • Documents: 30-50% saving • Application library: 70-80% savings • VHD library: 80-95% savings
  • 13. Performance? • Write has no direct performance hit – Dedup operations are done post-process • Read has a ~3% performance hit (if not in cache) – Due to more disk head operations – Compare with disk fragmentation • Windows caching is dedup-aware (!) – Dedup improves caching efficience
  • 14. Reliable? • My opinion: Yes - 100% • Data is check-summed – Means: invalid data is detected • Operations are crash consistent – Means: can interrupt/crash operation at any time without losing data • Data is self-describing – Means: it can be read without external data • Popular 'chunks' (>100x) are stored multiple times – Means: avoids creating IO hotspots on disk January 20, 2012 NIC 2012
  • 15. How to enable Windows 8 dedup? • Install Data Deduplication role service • Start Data Duplication Service (ddpsvc) • Powershell – import-module Deduplication – help dedup – enable-dedupvolume D: – set-dedupvolume D: -minimumfileagedays 0 • Default is 30 days – start-dedupjob D: -type Optimization • Use Unoptimization to undo – get-dedupjob – get-dedupstatus – get-dedupmetadata
  • 16. Questions ? • Thanks for your attention