How has SMB changed with Windows Server 2012 and R2? Can you explain SMB 3.0 encryption features?
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
With each SMB version, Microsoft has added features and capabilities to make the protocol more versatile and improve performance and security. SMB 3.0, which is tailored for small, random read/write operations, also supports large packets (termed "maximum transmission units" or MTUs) that boost performance in large, sequential data transfers.
SMB 3.0 also supports failover, which allows other nodes in a clustered server configuration to handle data transfers without disrupting server-side workloads. SMB 3.0 uses multiple network paths and network adapters with advanced hardware features to boost data transfer performance.
SMB 3.0 encryption is available for individual file shares or the entire server, and doesn't require specialized hardware or software tools (such as IPsec protocols or WAN accelerator hardware). Encryption is particularly useful when exchanging data with remote systems across a wide-area network such as the Internet. Encryption complements SMB directory leasing, which improves application response times by boosting the caching performance of branch office locations. This reduces the need to resend file data that might already be present on branch office systems.
SMB 3.0 also includes new performance counters and event messaging to measure, optimize and troubleshoot network activity. Improved insights into network performance let IT pros gauge cause-and-effect relationships between workload locations, resource usage, user activity and other characteristics important to data center performance.
Dig Deeper on Windows File Management
Related Q&A from Stephen J. Bigelow
One size does not fit all when administrators develop a protection policy for specific applications. Learn about the configuration options in System ...continue reading
Set up and operate a VM network using proven strategies to ensure security and performance. With a little planning, virtualization admins can avoid ...continue reading
Virtual switch security is achieved through a number of features. Virtualization admins can create and enforce policies, lock down MAC addresses and ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.