Improve performance of a file server with SMB Direct (2024)

  • Article

Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Azure Stack HCI version 21H2

Windows Server includes a feature called SMB Direct, which supports the use of network adapters that have Remote Direct Memory Access (RDMA) capability. Network adapters that have RDMA can function at full speed with lower latency without compromising CPU utilization. For workloads such as Hyper-V or Microsoft SQL Server, this enables a remote file server to resemble local storage. SMB Direct is automatically configured and enabled by default in Windows Server 2012 and future iterations.

Using SMB Direct provides:

  • Increased throughput: Leverages the full throughput of high speed networks where the network adapters coordinate the transfer of large amounts of data at line speed.
  • Low latency: Provides fast responses to network requests, which makes remote file storage feel as if it's directly attached block storage.
  • Low CPU utilization: Uses fewer CPU cycles when transferring data over the network, which leaves more power available to server applications.

You can use SMB Direct in a failover cluster; however, you need to make sure that the cluster networks used for client access are adequate for SMB Direct. Failover clustering supports using multiple networks for client access, along with network adapters that are RSS (Receive Side Scaling)-capable and RDMA-capable.

Note

You can use SMB Direct on the Hyper-V management operating system to support using Hyper-V over SMB, and to provide storage to a virtual machine that uses the Hyper-V storage stack. However, RDMA-capable network adapters aren't directly exposed to a Hyper-V client. If you connect an RDMA-capable network adapter to a virtual switch, the virtual network adapters from the switch won't be RDMA-capable.

Requirements

SMB Direct requires the following:

  • One or more network adapters with RDMA capability.
  • At least two computers running one or more of the following operating systems:
    • Windows Server 2012 and later.
    • Windows 10 Enterprise and later.
    • Windows 10 Education and later.
    • Windows 10 Pro for Workstations and later
    • Windows 10 Pro 22H2 (cleanly installed, not upgraded from older versions) and later.

Note

Windows 10 and Windows 11 family are restricted to client-only and can't act as an SMB Direct server.

SMB Multichannel

SMB Multichannel is the feature responsible for detecting the RDMA capabilities of network adapters to enable SMB Direct. Without SMB Multichannel, SMB uses regular TCP/IP with the RDMA-capable network adapters (all network adapters provide a TCP/IP stack along with the new RDMA stack).

With SMB Multichannel, SMB detects whether a network adapter has RDMA capability, and creates multiple RDMA connections for that single session (two per interface). This allows SMB to use the high throughput, low latency, and low CPU utilization offered by RDMA-capable network adapters. It also offers fault tolerance if you're using multiple RDMA interfaces.

You can team RDMA-capable network adapters using Switch Embedded Teaming (SET) starting with Windows Server 2016. After at least one RDMA network connection is created, the TCP/IP connection used for the original protocol negotiation is no longer used. However, the TCP/IP connection is retained in case the RDMA network connections fail.

Disabling SMB Multichannel also disables SMB Direct. Since SMB Multichannel detects network adapter capabilities and determines whether a network adapter is RDMA-capable, SMB Direct can't be used by the client if SMB Multichannel is disabled.

SMB Encryption

Beginning in Windows Server 2022 and Windows 11, SMB Direct now supports encryption. Previously, enabling SMB encryption disabled direct data placement, making RDMA performance as slow as TCP. Now data is encrypted before placement, leading to relatively minor performance degradation while adding AES-128 and AES-256 protected packet privacy. For more information on configuring SMB encryption, see SMB security enhancements.

Furthermore, Windows Server failover clusters now support granular control of encrypting intra-node storage communications for Cluster Shared Volumes (CSV) and the storage bus layer (SBL). This means that when using Storage Spaces Direct and SMB Direct, you can decide to encrypt east-west communications within the cluster itself for higher security.

Disabling and enabling SMB Direct features

The SMB client automatically detects and uses multiple network connections if an appropriate configuration is identified. As SMB Direct is enabled by default, once disabled, it needs to be manually re-enabled whenever needed.

  • Disable
  • Enable

Typically, you won't need to disable SMB Direct, however, you can disable it along with its features, by running the following Windows PowerShell commands.

To disable SMB Direct, type:

Disable-WindowsOptionalFeature -Online -FeatureName SMBDirect

To disable SMB Multichannel on the server-side, type:

Set-SmbServerConfiguration -EnableMultiChannel $false

To disable SMB Multichannel on the client-side, type:

Set-SmbClientConfiguration -EnableMultiChannel $false

To disable RDMA for a specific interface, type:

Disable-NetAdapterRdma <name>

To disable RDMA for all interfaces, type:

Set-NetOffloadGlobalSetting -NetworkDirect Disabled

When you disable RDMA on either the client or the server, the systems can't use it. Network Direct is the internal name for Windows Server basic networking support for RDMA interfaces.

To verify which state of operability SMB Direct is currently configured to, run the following cmdlet:

Get-WindowsOptionalFeature -Online -FeatureName SMBDirect

Testing SMB Direct

You can test the performance of SMB Direct by measuring the throughput when running a large file copy. Prior to testing, verify that the network adapter supports RDMA using PowerShell.

On the server-side, type:

Get-SmbServerNetworkInterface

On the client-side, type:

Get-SmbClientNetworkInterface

Once the network adapter is verified RDMA-capable, perform the following test:

  1. Disable RDMA on the network adapter, see Disabling and Enabling SMB Direct features.
  2. Measure the amount of time taken to run a large file copy without using SMB Direct.
  3. Re-enable RDMA on the network adapter, perform the same file copy, and then compare the two results.
  4. To avoid the impact of caching, perform the following:
    1. Copy a large amount of data (more data than memory is capable of handling).
    2. Copy the data twice, with the first copy as practice and then timing the second copy.
    3. Restart both the server and the client before each test to ensure they operate under similar conditions.

Additionally, you can observe the performance counters during testing using the same scenario utilizing the Performance Monitor tool by performing the following:

  1. Select Start, type perfmon, hit Enter.
  2. In the left pane, under Monitoring Tools > select Performance Monitor.
  3. In the right pane, select the green "+" icon to add a new counter.
  4. In the Add Counters dialog box, expand SMB Direct Connection.
  5. Select both Bytes RDMA Read/sec and Bytes RDMA Written/sec, select Add, then select OK.

SMB Direct failover capability

Here's how to confirm the failover capability of SMB Direct:

  1. Ensure that SMB Direct is functioning in a multiple network adapter configuration.
  2. Run a large file copy. During the copy process, simulate a failure of one of the network paths by disconnecting one of the cables or by disabling one of the network adapters.
  3. Confirm that the file copying continues using one of the remaining network adapters, and that there are no file copy errors.

Tip

To avoid failures of a workload that does not use SMB Direct, make sure there are no other workloads using the disconnected network path.

Additional references

  • Server Message Block overview
  • Increasing Server, Storage, and Network Availability: Scenario Overview
  • Deploy Hyper-V over SMB
Improve performance of a file server with SMB Direct (2024)
Top Articles
What Should I Carry for Self Defense?
Binance To Ban Singapore Users From Crypto Trading And Buying On Its Global Platform
Methstreams Boxing Stream
Www.politicser.com Pepperboy News
Phone Number For Walmart Automotive Department
THE 10 BEST Women's Retreats in Germany for September 2024
Beds From Rent-A-Center
Crime Scene Photos West Memphis Three
Carter Joseph Hopf
Dark Souls 2 Soft Cap
Revitalising marine ecosystems: D-Shape’s innovative 3D-printed reef restoration solution - StartmeupHK
Craigslist Cars Nwi
6th gen chevy camaro forumCamaro ZL1 Z28 SS LT Camaro forums, news, blog, reviews, wallpapers, pricing – Camaro5.com
Restaurants Near Paramount Theater Cedar Rapids
Five Day National Weather Forecast
Swedestats
8664751911
Craigslist Mt Pleasant Sc
Ratchet & Clank Future: Tools of Destruction
Caledonia - a simple love song to Scotland
Winco Employee Handbook 2022
Providence Medical Group-West Hills Primary Care
Ac-15 Gungeon
Www.dunkinbaskinrunsonyou.con
Does Hunter Schafer Have A Dick
Chime Ssi Payment 2023
Turbo Tenant Renter Login
Cb2 South Coast Plaza
At 25 Years, Understanding The Longevity Of Craigslist
Panolian Batesville Ms Obituaries 2022
No Limit Telegram Channel
208000 Yen To Usd
Table To Formula Calculator
Weather Underground Durham
The Posturepedic Difference | Sealy New Zealand
County Cricket Championship, day one - scores, radio commentary & live text
Craigslist Central Il
Amici Pizza Los Alamitos
Metro 72 Hour Extension 2022
Reborn Rich Ep 12 Eng Sub
Oriellys Tooele
Red Dead Redemption 2 Legendary Fish Locations Guide (“A Fisher of Fish”)
Silive Obituary
התחבר/י או הירשם/הירשמי כדי לראות.
Rocket Lab hiring Integration &amp; Test Engineer I/II in Long Beach, CA | LinkedIn
Aznchikz
Used Auto Parts in Houston 77013 | LKQ Pick Your Part
Rocket Bot Royale Unblocked Games 66
Coleman Funeral Home Olive Branch Ms Obituaries
Buildapc Deals
Where To Find Mega Ring In Pokemon Radical Red
Lorcin 380 10 Round Clip
Latest Posts
Article information

Author: Reed Wilderman

Last Updated:

Views: 6097

Rating: 4.1 / 5 (72 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Reed Wilderman

Birthday: 1992-06-14

Address: 998 Estell Village, Lake Oscarberg, SD 48713-6877

Phone: +21813267449721

Job: Technology Engineer

Hobby: Swimming, Do it yourself, Beekeeping, Lapidary, Cosplaying, Hiking, Graffiti

Introduction: My name is Reed Wilderman, I am a faithful, bright, lucky, adventurous, lively, rich, vast person who loves writing and wants to share my knowledge and understanding with you.