Anda di halaman 1dari 12

Best practices for disk I/O performance BlackBerry Enterprise Server running on Microsoft Exchange 2010

Version: 5.0

Technical Note

Published: 2010-09-01 SWD-1299892-0901024646-001

Contents
1 Best practices for disk I/O performance when running the BlackBerry Enterprise Server on Microsoft Exchange Server 2010................................................................................................................................................................................... Overview: Best practices for disk I/O performance................................................................................................................... Disk I/O of the Microsoft Exchange messaging server.............................................................................................................. Writing information to the Microsoft Exchange database................................................................................................. Reading information from the Microsoft Exchange database.......................................................................................... Best practices for configuring Microsoft Exchange Server 2010.............................................................................................. Using multiple mail databases............................................................................................................................................. Distributing user accounts across mail databases and grouping user accounts with different profiles together..... Optimizing the checkpoint depth value for mail databases............................................................................................. Verifying that the Microsoft Exchange Server has enough physical memory available................................................ Legal notice...................................................................................................................................................................................... 2 2 2 3 3 4 4 5 5 7 7

Technical Note

Best practices for disk I/O performance when running the BlackBerry Enterprise Server on Microsoft Exchange Server 2010

Best practices for disk I/O performance when running the BlackBerry Enterprise Server on Microsoft Exchange Server 2010
Overview: Best practices for disk I/O performance

The BlackBerry Enterprise Server manages the exchange of email messages and data between the Microsoft Exchange Server and BlackBerry devices. The BlackBerry Enterprise Server functions as a mail client; it accesses mailboxes on the Microsoft Exchange Server to save and retrieve email messages, and to update the properties of email messages (for example, it updates the status of an email message from unread to read). The BlackBerry Enterprise Server uses the database engine of the Microsoft Exchange Server when it accesses user mailboxes. The transactions that the BlackBerry Enterprise Server performs generate disk I/O on the Mailbox Server Role of the Microsoft Exchange Server. You must account for backup and restore requirements, storage capacity, and acceptable latencies when you consider the disk requirements of the Mailbox Server Role. You can customize how you configure the Microsoft Exchange Server to manage hardware resources and disk I/O performance more effectively. Research In Motion performed a series of performance benchmarking tests to develop best practices for how to configure the Microsoft Exchange Server to reduce the disk I/O requirements of the BlackBerry Enterprise Server. You can collaborate with your organization's Microsoft Exchange administrators to implement the following best practices: Use multiple mail databases Distribute user accounts across mail databases and group user accounts that have different profiles together Optimize the value of the checkpoint depth for mail databases Verify that the Mailbox Server Role of the Microsoft Exchange Server has enough physical memory available

You can apply these best practices to use your organization's available hardware resources efficiently. For more information about the performance and scalability of Microsoft Exchange Server 2010, visit http:// technet.microsoft.com/en-us/library/dd351197.aspx. For more information about mailbox server storage design, visit http:// technet.microsoft.com/en-us/library/dd346703.aspx.

Disk I/O of the Microsoft Exchange messaging server


The disk I/O of the Mailbox Server Role can be divided into two types, the database I/O and the transaction log I/O. The flow of email messages to and from the messaging server generates the database I/O. When the Mailbox Server Role writes information about email message transactions to log files, it generates transaction log I/O. The transaction log I/O consists of sequential writes and is very efficient when it is executed on high-performance storage systems. Storage-design activities typically

Technical Note

Disk I/O of the Microsoft Exchange messaging server

focus on the random read/write operations operations of the messaging server database. If an administrator configures the messaging server correctly and runs the messaging server on a well-designed storage system, the administrator can maintain a reasonable amount of database I/O.

Writing information to the Microsoft Exchange database


The database storage engine of the Microsoft Exchange Server uses transaction logs and a lazy write algorithm to optimize the amount of disk I/O that is produced when the Mailbox Server Role commits changes to the messaging server database. When the BlackBerry Enterprise Server writes changes to the messaging server database, the messaging server writes transactions to the transaction logs at the same time as the changes are written to the database pages in memory. When the transaction logs reach a specific size which is known as the checkpoint depth, all of the database pages in memory that were marked as modified are flushed to the mail database disk and marked as committed. Each database page is committed to disk one time only, even if there are multiple updates to the database page in memory. The consolidated writes reduce the total number of writes to the database disk. The rate of transactions and the growth rate of the logs is a function of the number of BlackBerry device users and the activity that each user generates using their mail clients. For performance purposes, the email application on each user's computer and the email application on the BlackBerry device are considered to be separate mail clients. If one user uses multiple mail clients to connect to the Microsoft Exchange Server, there is an increase in the amount of data that is written to mailbox pages and logs. Microsoft Exchange Server writes separate transaction logs for each mail database. The checkpoint depth is a threshold value that is applied to each mail database. The value of the checkpoint depth is configured in Microsoft Active Directory as one of the properties of the mail database (specified as a number of bytes). The default value of the checkpoint depth is 20 MB; when the collective size of the transaction logs reaches 20 MB, any uncommitted data is flushed to disk.

Reading information from the Microsoft Exchange database


Email messages and indexes for sorting and retrieving email messages are stored in the messaging server cache. The larger the cache is, the more likely it is that the information retrieved by users is already in memory, which reduces the number of reads from the disk. As a 64-bit application, Microsoft Exchange Server 2010 features a much larger cache than what was available in previous versions. Increasing the amount of physical memory available to the Microsoft Exchange Server and to the server cache decreases the disk read I/O for each user.

Technical Note

Best practices for configuring Microsoft Exchange Server 2010

Best practices for configuring Microsoft Exchange Server 2010


Using multiple mail databases
You can distribute users across multiple mail databases to reduce disk I/O. If you decrease the number of users in each mail database, the checkpoint depth of each storage group is reached less frequently, which increases the disk I/O benefits of consolidating writes within the cache.

Changing the number of mail databases


Research In Motion ran a series of performance tests to demonstrate the relative impact of increasing the number of mail databases while keeping the number of user accounts on each server constant. The tests used one Microsoft Exchange Server with 1000 user accounts. In separate tests, the user accounts were distributed evenly across one mail database, two mail databases, and five mail databases. A checkpoint depth of 20 MB was used. The following chart displays the resulting differences in disk I/O compared to the baseline value of using one mail database:

The overall disk I/O differences were consistent with the changes in database writes because the number of database writes were significantly higher than the number of database reads. The disk I/O for database transfers, database writes, and database reads decreased as users were distributed across more mail databases.

Technical Note

Best practices for configuring Microsoft Exchange Server 2010

Distributing user accounts across mail databases and grouping user accounts with different profiles together
Microsoft Exchange administrators can group user accounts together based on the average number of email messages that users send and receive each day. These email message ranges are known as profiles. To simplify resource planning, administrators might decide to group user accounts with the same profile in a single mail database. This method is not advantageous because grouping users with the same profile could result in uneven disk I/O transactions across different mail databases, and mail databases with higher disk I/O transactions could reach a disk bottleneck. Some users might use more than one email application to access their Microsoft Exchange mailbox. For example, a user might keep Microsoft Outlook open throughout the workday to access their mailbox, and the user might also use their BlackBerry device throughout the workday to access their mailbox when they are not at their desk. A higher number of database transactions are generated when users use multiple clients to access their mailbox. It is a best practice to distribute user accounts with high-activity profiles and multi-client access points across mail databases that also contain low-activity profiles and users with single-client access points. This strategy permits you to maximize the benefits of the checkpoint depth and cache of a mail database.

Optimizing the checkpoint depth value for mail databases


You can increase the value of the checkpoint depth to increase the probability of writing transactions to a database page in memory that is uncommitted, instead of committing the data to the database disk. Increasing the checkpoint depth can reduce the number of writes to disk significantly. It is a best practice to configure the checkpoint depth to a value that is optimal for your organization's environment and system resources. You should consider creating additional mail databases to distribute users across, as this allows you to balance out disk transfers generated by users who use multiple mail clients to access their mailbox. Using additional mail databases increases the total checkpoint depth. You should also consider changing the checkpoint depth value if deployment constraints prevent you from distributing user accounts across multiple mail databases. For more information about changing the checkpoint depth value, visit http://support.microsoft.com/kb/886298.

Changing the checkpoint depth


Research In Motion ran a series of performance tests to demonstrate the relative impact of changing the checkpoint depth of a mail database. The tests used one Microsoft Exchange Server with 1000 user accounts on a single mail database. In separate tests, the checkpoint depth of the mail database was changed from 20 MB to 40 MB, 60 MB, and 100 MB, respectively. The following chart displays the resulting differences in disk I/O compared to the baseline checkpoint depth of 20 MB:

Technical Note

Best practices for configuring Microsoft Exchange Server 2010

The overall disk I/O differences were consistent with the changes in database writes because the number of database writes was significantly higher than the number of database reads. The disk I/O for database transfers, database writes, and database reads decreased as the checkpoint depth was increased.

Changing the checkpoint depth in an environment with a database availability group


Research In Motion ran a series of performance tests to demonstrate the relative impact of changing the checkpoint depth of a mail database in a Microsoft Exchange environment that uses a database availability group. The tests used one Microsoft Exchange Server with 1000 user accounts on a single mail database. The checkpoint depth was changed from 100 MB to 200 MB. The following chart displays the resulting differences in disk I/O compared to the baseline checkpoint depth of 100 MB:

Technical Note

Legal notice

The overall decrease in disk I/O was consistent with the decrease in database reads and database writes as the value of the checkpoint depth was increased.

Verifying that the Microsoft Exchange Server has enough physical memory available
Microsoft Exchange Server 2010 uses a 64-bit architecture, so it is no longer constrained by the memory limitations of a 32bit architecture. For more information about planning memory configurations, visit http://technet.microsoft.com/en-us/library/ dd351197.aspx. Depending on the specific roles of the server and the user profile, the suggested practice from Microsoft is to install 4 to 16 GB of memory with an additional 3 to 30 MB of memory for each user account. If you do not follow this best practice, your organization's environment might consume a significant and unexpected amount of disk I/O and an increased number of disk throughput bottlenecks.

Legal notice
2010 Research In Motion Limited. All rights reserved. BlackBerry, RIM, Research In Motion, SureType, SurePress and related trademarks, names, and logos are the property of Research In Motion Limited and are registered and/or used in the U.S. and countries around the world. Microsoft and Outlook are trademarks of Microsoft Corporation. All other trademarks are the property of their respective owners.

Technical Note

Legal notice

This documentation including all documentation incorporated by reference herein such as documentation provided or made available at www.blackberry.com/go/docs is provided or made accessible "AS IS" and "AS AVAILABLE" and without condition, endorsement, guarantee, representation, or warranty of any kind by Research In Motion Limited and its affiliated companies ("RIM") and RIM assumes no responsibility for any typographical, technical, or other inaccuracies, errors, or omissions in this documentation. In order to protect RIM proprietary and confidential information and/or trade secrets, this documentation may describe some aspects of RIM technology in generalized terms. RIM reserves the right to periodically change information that is contained in this documentation; however, RIM makes no commitment to provide any such changes, updates, enhancements, or other additions to this documentation to you in a timely manner or at all. This documentation might contain references to third-party sources of information, hardware or software, products or services including components and content such as content protected by copyright and/or third-party web sites (collectively the "Third Party Products and Services"). RIM does not control, and is not responsible for, any Third Party Products and Services including, without limitation the content, accuracy, copyright compliance, compatibility, performance, trustworthiness, legality, decency, links, or any other aspect of Third Party Products and Services. The inclusion of a reference to Third Party Products and Services in this documentation does not imply endorsement by RIM of the Third Party Products and Services or the third party in any way. EXCEPT TO THE EXTENT SPECIFICALLY PROHIBITED BY APPLICABLE LAW IN YOUR JURISDICTION, ALL CONDITIONS, ENDORSEMENTS, GUARANTEES, REPRESENTATIONS, OR WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION, ANY CONDITIONS, ENDORSEMENTS, GUARANTEES, REPRESENTATIONS OR WARRANTIES OF DURABILITY, FITNESS FOR A PARTICULAR PURPOSE OR USE, MERCHANTABILITY, MERCHANTABLE QUALITY, NONINFRINGEMENT, SATISFACTORY QUALITY, OR TITLE, OR ARISING FROM A STATUTE OR CUSTOM OR A COURSE OF DEALING OR USAGE OF TRADE, OR RELATED TO THE DOCUMENTATION OR ITS USE, OR PERFORMANCE OR NON-PERFORMANCE OF ANY SOFTWARE, HARDWARE, SERVICE, OR ANY THIRD PARTY PRODUCTS AND SERVICES REFERENCED HEREIN, ARE HEREBY EXCLUDED. YOU MAY ALSO HAVE OTHER RIGHTS THAT VARY BY STATE OR PROVINCE. SOME JURISDICTIONS MAY NOT ALLOW THE EXCLUSION OR LIMITATION OF IMPLIED WARRANTIES AND CONDITIONS. TO THE EXTENT PERMITTED BY LAW, ANY IMPLIED WARRANTIES OR CONDITIONS RELATING TO THE DOCUMENTATION TO THE EXTENT THEY CANNOT BE EXCLUDED AS SET OUT ABOVE, BUT CAN BE LIMITED, ARE HEREBY LIMITED TO NINETY (90) DAYS FROM THE DATE YOU FIRST ACQUIRED THE DOCUMENTATION OR THE ITEM THAT IS THE SUBJECT OF THE CLAIM. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW IN YOUR JURISDICTION, IN NO EVENT SHALL RIM BE LIABLE FOR ANY TYPE OF DAMAGES RELATED TO THIS DOCUMENTATION OR ITS USE, OR PERFORMANCE OR NONPERFORMANCE OF ANY SOFTWARE, HARDWARE, SERVICE, OR ANY THIRD PARTY PRODUCTS AND SERVICES REFERENCED HEREIN INCLUDING WITHOUT LIMITATION ANY OF THE FOLLOWING DAMAGES: DIRECT, CONSEQUENTIAL, EXEMPLARY, INCIDENTAL, INDIRECT, SPECIAL, PUNITIVE, OR AGGRAVATED DAMAGES, DAMAGES FOR LOSS OF PROFITS OR REVENUES, FAILURE TO REALIZE ANY EXPECTED SAVINGS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, LOSS OF BUSINESS OPPORTUNITY, OR CORRUPTION OR LOSS OF DATA, FAILURES TO TRANSMIT OR RECEIVE ANY DATA, PROBLEMS ASSOCIATED WITH ANY APPLICATIONS USED IN CONJUNCTION WITH RIM PRODUCTS OR SERVICES, DOWNTIME COSTS, LOSS OF THE USE OF RIM PRODUCTS OR SERVICES OR ANY PORTION THEREOF OR OF ANY AIRTIME SERVICES, COST OF SUBSTITUTE GOODS, COSTS OF COVER, FACILITIES OR SERVICES, COST OF CAPITAL, OR OTHER SIMILAR PECUNIARY LOSSES, WHETHER OR NOT SUCH DAMAGES WERE FORESEEN OR UNFORESEEN, AND EVEN IF RIM HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW IN YOUR JURISDICTION, RIM SHALL HAVE NO OTHER OBLIGATION, DUTY, OR LIABILITY WHATSOEVER IN CONTRACT, TORT, OR OTHERWISE TO YOU INCLUDING ANY LIABILITY FOR NEGLIGENCE OR STRICT LIABILITY.

Technical Note

Legal notice

THE LIMITATIONS, EXCLUSIONS, AND DISCLAIMERS HEREIN SHALL APPLY: (A) IRRESPECTIVE OF THE NATURE OF THE CAUSE OF ACTION, DEMAND, OR ACTION BY YOU INCLUDING BUT NOT LIMITED TO BREACH OF CONTRACT, NEGLIGENCE, TORT, STRICT LIABILITY OR ANY OTHER LEGAL THEORY AND SHALL SURVIVE A FUNDAMENTAL BREACH OR BREACHES OR THE FAILURE OF THE ESSENTIAL PURPOSE OF THIS AGREEMENT OR OF ANY REMEDY CONTAINED HEREIN; AND (B) TO RIM AND ITS AFFILIATED COMPANIES, THEIR SUCCESSORS, ASSIGNS, AGENTS, SUPPLIERS (INCLUDING AIRTIME SERVICE PROVIDERS), AUTHORIZED RIM DISTRIBUTORS (ALSO INCLUDING AIRTIME SERVICE PROVIDERS) AND THEIR RESPECTIVE DIRECTORS, EMPLOYEES, AND INDEPENDENT CONTRACTORS. IN ADDITION TO THE LIMITATIONS AND EXCLUSIONS SET OUT ABOVE, IN NO EVENT SHALL ANY DIRECTOR, EMPLOYEE, AGENT, DISTRIBUTOR, SUPPLIER, INDEPENDENT CONTRACTOR OF RIM OR ANY AFFILIATES OF RIM HAVE ANY LIABILITY ARISING FROM OR RELATED TO THE DOCUMENTATION. Prior to subscribing for, installing, or using any Third Party Products and Services, it is your responsibility to ensure that your airtime service provider has agreed to support all of their features. Some airtime service providers might not offer Internet browsing functionality with a subscription to the BlackBerry Internet Service. Check with your service provider for availability, roaming arrangements, service plans and features. Installation or use of Third Party Products and Services with RIM's products and services may require one or more patent, trademark, copyright, or other licenses in order to avoid infringement or violation of third party rights. You are solely responsible for determining whether to use Third Party Products and Services and if any third party licenses are required to do so. If required you are responsible for acquiring them. You should not install or use Third Party Products and Services until all necessary licenses have been acquired. Any Third Party Products and Services that are provided with RIM's products and services are provided as a convenience to you and are provided "AS IS" with no express or implied conditions, endorsements, guarantees, representations, or warranties of any kind by RIM and RIM assumes no liability whatsoever, in relation thereto. Your use of Third Party Products and Services shall be governed by and subject to you agreeing to the terms of separate licenses and other agreements applicable thereto with third parties, except to the extent expressly covered by a license or other agreement with RIM. Certain features outlined in this documentation require a minimum version of BlackBerry Enterprise Server, BlackBerry Desktop Software, and/or BlackBerry Device Software. The terms of use of any RIM product or service are set out in a separate license or other agreement with RIM applicable thereto. NOTHING IN THIS DOCUMENTATION IS INTENDED TO SUPERSEDE ANY EXPRESS WRITTEN AGREEMENTS OR WARRANTIES PROVIDED BY RIM FOR PORTIONS OF ANY RIM PRODUCT OR SERVICE OTHER THAN THIS DOCUMENTATION. Certain features outlined in this documentation might require additional development or Third Party Products and Services for access to corporate applications. This product contains a modified version of HTML Tidy. Copyright 1998-2003 World Wide Web Consortium (Massachusetts Institute of Technology, European Research Consortium for Informatics and Mathematics, Keio University). All Rights Reserved. This product includes software developed by the Apache Software Foundation (www.apache.org/) and/or is licensed pursuant to one of the licenses listed at (www.apache.org/licenses/). For more information, see the NOTICE.txt file included with the software. Research In Motion Limited 295 Phillip Street Waterloo, ON N2L 3W8 Canada

Technical Note

Legal notice

Research In Motion UK Limited Centrum House 36 Station Road Egham, Surrey TW20 9LF United Kingdom Published in Canada

10

Anda mungkin juga menyukai