Computer Technos

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 5 August 2010

Understanding how WSRM works and what you gain from it

Posted on 10:12 by Unknown
WSRM provides automatic resource management based on predefined or custom policies. You use WSRM to manage both CPU and memory resources. Of course, you can already manage storage resources using the quota system that has appeared in all versions of Windows Server. In many respects, WSRM follows the policy setup used by Windows security. The policy modifies how the system interacts with entities using the resource.

The policies used by WSRM don’t take effect until the server reaches 70 percent capacity in the affected area. For example, when the server is at only 20 percent CPU usage, the policy isn’t used. Microsoft never tells why it chose the 70 percent level, but anecdotal evidence suggests that contention becomes troublesome at that level on Windows servers. You use WSRM to manage resources in the following ways:

• Manage system resources on a constant or scheduled basis using predefined or custom policies.

• Use calendar rules to specify different policies at different times.

• Select the appropriate policy based on server properties, events, changes to the amount of memory installed, or changes to the number of available processors.

• Obtain resource usage data and store it locally or within a centrally located SQL Server database.

The biggest benefit of resource management is to help make the server available even under significant load. Although a server that has a single role probably won’t need WSRM, adding additional roles complicates the server setup and makes management valuable. In addition, using WSRM can help extend the useful life of older servers by reducing contention for valuable resources. Users tend to see slower, but consistent, response times with the appropriate policies in place. Processes don’t end up starved for resources, which makes the server more reliable.

The Resource Allocation Policies folder contains all the policies used to manage resources on the server. WSRM comes with four predefined policies. The following list describes these four policies:

• Equal_Per_Process: Each running process receives an equal portion of CPU and memory resources. This default policy limits each process to a maximum of 10 percent of the available resources while the resource usage remains above 70 percent (the contention level). This is the default managing policy. You normally use this policy for service-related servers, such as those that provide file and print services.

• Equal_Per_User: Each user receives an equal share of CPU and memory resources. For example, if the server is servicing ten users, each user receives 10 percent of the available resources while the resource usage remains above 70 percent. You normally use this policy for application servers.

• Equal_Per_IISAppPool: Each Internet Information Server (IIS) application pool receives an equal share of CPU and memory resources. Applications that aren’t part of an IIS application pool receive any resources that are left over from IIS activities. In some cases, this means that services and server-based applications won’t receive any resources while IIS is under heavy load. You normally use this policy for Web servers or for servers that provide Web services.

• Equal_Per_Session: Each session receives an equal share of the CPU and memory resources. For example, if the server is servicing ten sessions, each session receives 10 percent of the available resources while the resource usage remains above 70 percent. Because a user can have multiple sessions, this policy isn’t the same as the Equal_Per_User policy. Users with multiple sessions receive preferential treatment when using this policy. You normally use this policy for servers that support Terminal Services.

These default policies serve as a basis for common resource management scenarios, but may not meet your needs. For example, you may want to give a particular application preferential treatment to ensure that users can always access it — address this requirement using a custom policy.

Policies also have a scope. You can assign a policy at the system level so that it affects every application, session, or user on the system. As an alternative, you can create a conditional scope specifying that WSRM uses a policy to meet a specific need. Setting conditional policies can become quite complex and usually reflects a special setup on your server.

In some cases, the server doesn’t have the same load placed on it every day. A server may need to perform specific tasks based on calendar requirements. For example, an accounting computer may have to give priority to performing end-of-month calculations at the end of the month. To set a onetime or recurring policy event, choose the Calendar folder. This feature works precisely the same way as the Calendar feature in Outlook. Simply right-click the calendar area, choose the kind of event you want to create, and set the date and time parameters.

Source of Information : For Dummies Windows Server 2008 For Dummies
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Networking, Windows Server 2008 | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 7 Shortcut Keys
    Longtime users of Windows have probably grown accustomed to navigating around the Windows user interface using the keyboard. This especially...
  • Windows on Mac: Virtualization Solutions
    If you’d prefer to join the ever-increasing ranks of Mac switchers—you traitor, you—you can still run Windows and, more important, Windows a...
  • Customizing Library Folders in Windows 7
    In your library folders, you can customize view options based on the contents. In the toolbar of the Pictures and Music library folders, Win...
  • Windows 7 BitLocker Drive Encryption
    In Windows Vista, you had the BitLocker Drive Encryption feature that allowed you to encrypt the content of entire volumes. In Windows 7, Mi...
  • Using Windows 7’s Performance Options
    While all the performance tools are available individually throughout the system, Windows 7 introduces a nice list of available tools, if yo...
  • Windows 7 - Installing and Configuring a Printer
    If your printer is already installed and operational at this point, you can skip this section and skim ahead for others that may be of inter...
  • Considering Centralized versus Group Sharing
    One of the most important preparation steps for your server is determining how to store the data you create. The two common methods are cent...
  • Berkeley Motes
    The Berkeley motes are a family of embedded sensor nodes sharing roughly the same architecture. Let us take the MICA mote as an example. The...
  • Using Windows 7 Ease of Access Tools
    If you have difficulty using a mouse or typing, have slightly impaired vision, or are deaf or hard of hearing, you can adjust the appearance...
  • Troubleshooting Boot and Startup Problems - Driver Loading in Safe Mode
    How does Windows know which device drivers and services are part of standard and networking-enabled safe mode? The answer lies in the HKLM\S...

Categories

  • Access 2010
  • BlackBerr
  • BlackBerry
  • Computer Science
  • Cyber Security
  • Exchange Server 2010
  • File Utilities
  • Foursquare
  • Google
  • Hardware
  • Internet
  • iPad
  • Linux
  • Lync Server
  • Microsoft Virtualization
  • Mobile Web
  • Networking
  • News
  • Security
  • Server Architectures
  • Smartphone
  • Ubuntu Linux
  • Windows
  • Windows 7
  • Windows Home Server
  • Windows Security
  • Windows Server 2008
  • Windows Server 2008 Hyper-V
  • Windows XP
  • Wireless

Blog Archive

  • ►  2012 (66)
    • ►  August (5)
    • ►  July (9)
    • ►  June (9)
    • ►  May (8)
    • ►  April (9)
    • ►  March (9)
    • ►  February (8)
    • ►  January (9)
  • ►  2011 (85)
    • ►  December (5)
    • ►  November (6)
    • ►  October (7)
    • ►  September (8)
    • ►  August (9)
    • ►  July (9)
    • ►  June (7)
    • ►  May (7)
    • ►  April (4)
    • ►  March (6)
    • ►  February (8)
    • ►  January (9)
  • ▼  2010 (230)
    • ►  December (13)
    • ►  November (3)
    • ►  October (2)
    • ►  September (10)
    • ▼  August (31)
      • Configuring Small Memory Dump Files
      • Memory Dump Files
      • Types of Stop Errors
      • Stop Messages
      • Stop Message - Identifying the Stop Error
      • Stop Message - Identifying the Stop Error
      • Single, Centralized System Cache and The Memory Ma...
      • Cache Manager
      • Shutdown
      • Windows Resource Protection
      • Solving Common Boot Problems “Part II”
      • Solving Common Boot Problems “Part I”
      • Boot Status File
      • Troubleshooting Boot and Startup Problems – Window...
      • Troubleshooting Boot and Startup Problems – Boot L...
      • Troubleshooting Boot and Startup Problems - Safe-M...
      • Troubleshooting Boot and Startup Problems - Driver...
      • Troubleshooting Boot and Startup Problems - Safe Mode
      • Troubleshooting Boot and Startup Problems - Last K...
      • Images That Start Automatically
      • ReadyBoot
      • Smss, Csrss, and Wininit
      • Initializing the Kernel and Executive Subsystems
      • The EFI Boot Process
      • The BIOS Boot Sector and Bootmgr
      • BIOS Preboot
      • Understanding how WSRM works and what you gain fro...
      • Working with the Windows System Resource Manager (...
      • Understanding Domains
      • Working with Peer Name Resolution Protocol
      • Considering Centralized versus Group Sharing
    • ►  July (32)
    • ►  June (23)
    • ►  May (2)
    • ►  April (21)
    • ►  March (32)
    • ►  February (28)
    • ►  January (33)
  • ►  2009 (119)
    • ►  December (33)
    • ►  November (31)
    • ►  October (35)
    • ►  September (20)
Powered by Blogger.

About Me

Unknown
View my complete profile