%3CLINGO-SUB%20id%3D%22lingo-sub-1070642%22%20slang%3D%22en-US%22%3ETeaming%20in%20Azure%20Stack%20HCI%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1070642%22%20slang%3D%22en-US%22%3E%3CP%3E%3CEM%3EWritten%20by%20Dan%20Cuomo%2C%20Senior%20PM%20at%20Microsoft.%20Follow%20him%20on%20Twitter%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3E%3CA%20href%3D%22http%3A%2F%2Ftwitter.com%2FDan2_2023%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%40dan2_2023%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWindows%20Server%20currently%20has%20two%20inbox%20teaming%20mechanisms%20with%20two%20very%20different%20purposes.%20In%20this%20article%2C%20we%E2%80%99ll%20describe%20several%20reasons%20why%20you%20should%20use%20Switch%20Embedded%20Teaming%20(SET)%20for%20Azure%20Stack%20HCI%20scenarios%20and%20we%E2%80%99ll%20discuss%20several%20long-held%20teaming%20myths%20%E2%80%93%20We%E2%80%99d%20love%20to%20hear%20your%20feedback%20in%20the%20comments%20below.%20Let's%20get%20started!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20Windows%20Server%202012%20we%20released%20LBFO%20as%20an%20inbox%20teaming%20mechanism%2C%20with%20many%20customers%20leveraging%20this%20technology%20to%20provide%20load-balancing%20and%20fail-over%20between%20network%20adapters.%20Since%20then%2C%20the%20rise%20of%20software-defined%20storage%20and%20software%20defined%20networking%20has%20brought%20performance%20and%20compatibility%20challenges%20to%20the%20forefront%20(outlined%20in%20this%20article)%20with%20the%20LBFO%20architecture%20that%20required%20a%20change%20in%20direction.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20new%20direction%20is%20called%20Switch%20Embedded%20Teaming%20(SET)%20and%20was%20introduced%20in%20Windows%20Server%202016.%20SET%20is%20available%20when%20Hyper-V%20is%20installed%20on%20any%20Server%20OS%20(Windows%20Server%202016%20and%20higher)%20and%20Windows%2010%20version%201809%20(and%20higher).%20You%E2%80%99re%20not%20required%20to%20run%20virtual%20machines%20to%20use%20SET%2C%20but%20the%20Hyper-V%20role%20must%20be%20installed.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20summary%2C%20LBFO%20is%20our%20older%20teaming%20technology%20that%20will%20not%20see%20future%20investment%2C%20is%20not%20compatible%20with%20numerous%20advanced%20capabilities%2C%20and%20has%20been%20exceeded%20in%20both%20performance%20and%20stability%20by%20our%20new%20technology%20(SET).%20We'd%20like%20to%20discuss%20why%20you%20should%20move%20off%20LBFO%20for%20virtualized%20and%20cloud%20scenarios.%20Let's%20dig%20into%20this%20paragraph%20a%20bit.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId-358350550%22%20id%3D%22toc-hId-358350550%22%20id%3D%22toc-hId-358350550%22%20id%3D%22toc-hId-358350550%22%20id%3D%22toc-hId-358350550%22%20id%3D%22toc-hId-358350550%22%20id%3D%22toc-hId-358350550%22%20id%3D%22toc-hId-358350550%22%20id%3D%22toc-hId-358350550%22%20id%3D%22toc-hId-358350550%22%20id%3D%22toc-hId-358350550%22%20id%3D%22toc-hId-358350550%22%20id%3D%22toc-hId-358350550%22%20id%3D%22toc-hId-358350550%22%3ELBFO%20is%20our%20older%20teaming%20technology%20that%20will%20not%20see%20future%20investment%3C%2FH1%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F162241iE761DB1911ECCAF2%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22clipboard_image_0.png%22%20title%3D%22clipboard_image_0.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EWith%20the%20intent%20to%20bring%20software-defined%20technologies%20like%20SDNv2%20and%20containers%20to%20Windows%20Server%2C%20it%20became%20clear%20that%20we%20needed%20an%20alternative%20teaming%20solution%20and%20so%20we%20set%20off%20creating%20SET%2C%20circa%202014.%20Simultaneously%20reaching%20feature%20parity%20and%20stability%20with%20LBFO%20took%20time%3B%20several%20early%20adopters%20of%20SET%20will%20remember%20some%20of%20these%20pains.%20However%2C%20SET%E2%80%99s%20stability%2C%20performance%2C%20and%20features%20have%20now%20far%20surpassed%20LBFO.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAll%20new%20features%20released%20since%20Windows%20Server%202016%20(see%20below)%20%3CSTRONG%3Ewere%20developed%20and%20tested%20with%20SET%20in%20mind%3C%2FSTRONG%3E%20%E2%80%93%20This%20includes%20all%20Azure%20Stack%20HCI%20solutions%20you%20may%20have%20purchased%3B%20Azure%20Stack%20HCI%20%3CSTRONG%3Eis%20not%20tested%20or%20certified%20with%20LBFO%3C%2FSTRONG%3E.%20This%20is%20largely%20due%20to%20development%20simplicity%20and%20testing%3B%20without%20driving%20too%20far%20into%20unimportant%20details%2C%20LBFO%20teams%20adapters%20inside%20NDIS%20which%20is%20a%20large%20and%20complex%20component%20%E2%80%93%20its%20roots%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows-hardware%2Fdrivers%2Fnetwork%2Foverview-of-ndis-versions%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Edate%20back%20to%20Windows%2095%3C%2FA%3E%20(of%20course%20updated%20considerably%20since%20then).%20If%20your%20system%20has%20a%20NIC%2C%20you%E2%80%99re%20using%20NDIS.%20In%20the%20picture%20shown%20above%2C%20each%20component%20below%20the%20vSwitch%20was%20part%20of%20NDIS.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20size%20and%20complexity%20of%20scenarios%20included%20in%20NDIS%20made%20for%20very%20complex%20testing%20requirements%20that%20were%20only%20compounded%20by%20virtualized%20and%20software-defined%20technologies%20that%20considerably%20hampered%20feature%20innovation.%20You%20might%20think%20that%20this%20is%20just%20a%20Microsoft%20problem%2C%20but%20really%20this%20affects%20NIC%20vendor%20driver%20development%20time%20and%20stability%20as%20well.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAll-in-all%2C%20we%E2%80%99re%20not%20focusing%20on%20LBFO%20much%20these%20days%2C%20particularly%20as%20software-defined%20Windows%20Server%20networking%20scenarios%20become%20more%20exotic%20with%20the%20rise%20of%20containers%2C%20software-defined%20networking%2C%20and%20much%20more.%20There%E2%80%99s%20a%20faster%2C%20more%20stable%2C%20and%20performant%20teaming%20solution%2C%20called%20Switch%20Embedded%20Teaming.%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId--1449103913%22%20id%3D%22toc-hId--1449103913%22%20id%3D%22toc-hId--1449103913%22%20id%3D%22toc-hId--1449103913%22%20id%3D%22toc-hId--1449103913%22%20id%3D%22toc-hId--1449103913%22%20id%3D%22toc-hId--1449103913%22%20id%3D%22toc-hId--1449103913%22%20id%3D%22toc-hId--1449103913%22%20id%3D%22toc-hId--1449103913%22%20id%3D%22toc-hId--1449103913%22%20id%3D%22toc-hId--1449103913%22%20id%3D%22toc-hId--1449103913%22%20id%3D%22toc-hId--1449103913%22%3ELBFO%20is%20not%20compatible%20with%20several%20advanced%20capabilities%3C%2FH1%3E%0A%3CP%3EHere%E2%80%99s%20a%20smattering%20of%20scenarios%20and%20features%20that%20are%20supported%20with%20SET%20but%20%3CSTRONG%3ENOT%3C%2FSTRONG%3E%20LBFO%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EWindows%20Admin%20Center%3C%2FSTRONG%3E%26nbsp%3B-%20WAC%20is%20the%20de%20facto%20management%20tool%20for%20Windows%20Server%20and%20Azure%20Stack%20HCI%2C%20with%20millions%20of%20nodes%20under%20management.%20You%20can%20create%20and%20manage%20a%20SET%20team%20for%20a%20single%20host%2C%20or%20deploy%20a%20SET%20team%20to%20multiple%20hosts%20with%20the%20new%20Cluster%20Creation%20UI%20we%20released%20to%20help%20you%20deploy%20Azure%20Stack%20HCI%20solutions%20at%20Microsoft%20Ignite%20this%20year%20(%3CA%20href%3D%22https%3A%2F%2Fmyignite.techcommunity.microsoft.com%2Fsessions%2F82906%3Fsource%3Dsessions%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ewatch%20the%20session%3C%2FA%3E%2C%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fhci-deployment%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Etry%20it%20out%3C%2FA%3E%2C%20and%20give%20us%20feedback).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELBFO%20is%20not%20available%20for%20configuration%20in%20Windows%20Admin%20Center.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERDMA%20Teaming%3C%2FSTRONG%3E%20-%26nbsp%3BOnly%20SET%20can%20team%20RDMA%20adapters.%20RDMA%20is%20used%20for%20example%20with%20Storage%20Spaces%20Direct%20(S2D)%20which%20requires%20a%20reliable%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows-server%2Fstorage%2Fstorage-spaces%2Fstorage-spaces-direct-hardware-requirements%23networking%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehigh%20bandwidth%2C%20low%20latency%3C%2FA%3E%20network%20connection%20between%20each%20node.%20High-bandwidth%3F%20Low%20Latency%3F%20That%E2%80%99s%20RDMA%E2%80%99s%20bag%20so%20it%20is%20the%20recommended%20pattern%20with%20S2D.%20Reliability%3F%20That%E2%80%99s%20SET's%20claim-to-fame%20so%20these%20two%20are%20a%20logical%20pairing.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGuest%20RDMA%3A%20%3C%2FSTRONG%3ESET%20supports%20RDMA%20into%20a%20virtual%20machine.%20This%20doesn%E2%80%99t%20work%20with%20LBFO%20for%20two%20reasons%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3ERDMA%20adapters%20cannot%20be%20teamed%20with%20LBFO%20both%20host%20adapters%20and%20virtual%20adapters.%3C%2FLI%3E%0A%3CLI%3ERDMA%20uses%20SMB%20multichannel%20which%20requires%20multiple%20adapters%20to%20balance%20traffic%20across.%20Since%20you%20can%E2%80%99t%20assign%20a%20vNIC%20to%20pNIC%20affinity%20with%20LBFO%2C%20neither%20the%20SMB%20nor%20non-SMB%20traffic%20can%20be%20made%20highly%20available.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3EGuest%20Teaming%20%3C%2FSTRONG%3Eis%20a%20strange%20one%3B%20you%20could%20add%20multiple%20virtual%20NICs%20to%20a%20Hyper-V%20VM%3B%20inside%20the%20VM%2C%20you%20could%20use%20LBFO%20to%20team%20the%20virtual%20NICs.%20However%2C%20you%20cannot%20affinitize%20a%20virtual%20NIC%20(vNIC)%20to%20a%20physical%20NIC%20(pNIC)%2C%20so%20it%E2%80%99s%20possible%20that%20both%20vNICs%20added%20in%20the%20VM%20are%20sending%20and%20receiving%20traffic%20out%20of%20the%20same%20pNIC.%20If%20that%20pNIC%20fails%2C%20you%20lose%20both%20of%20your%20virtual%20NICs.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESET%20allows%20you%20to%20map%20each%20vNIC%20to%20a%20pNIC%20to%20ensure%20that%20they%20don%E2%80%99t%20overlap%2C%20ensuring%20that%20a%20Guest%20Team%20is%20able%20to%20survive%20an%20adapter%20outage.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMicrosoft%20Software%20Defined%20Networking%20%3C%2FSTRONG%3E-%20(SDN)%20was%20first%20released%20in%20its%20modern%20form%20in%20Windows%20Server%202016%20and%20requires%20a%20virtual%20switch%20extension%20called%20the%20Virtual%20Filtering%20Platform%20(VFP).%20VFP%20is%20the%20brains%20behind%20SDN%2C%20the%20same%20extension%20that%20runs%20our%20public%20cloud%2C%20Azure.%20VFP%20can%20only%20be%20added%20to%20a%20SET%20team.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20means%20that%20any%20of%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows-server%2Fnetworking%2Fsdn%2Fmanage%2Fconfigure-qos-for-tenant-vm-network-adapter%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESDN%20features%26nbsp%3B%3C%2FA%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3E(which%20are%20included%20with%20a%20Datacenter%20Edition%20license)%20like%20the%20Software%20Load%20Balancer%2C%20Gateways%2C%20Distributed%20Firewall%20(ACLs)%2C%20and%20our%20modern%20network%20QoS%20capability%20are%20also%20unavailable%20if%20you%E2%80%99re%20using%20LBFO.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EContainer%20Networking%20%3C%2FSTRONG%3E-%20Containers%26nbsp%3Brelies%20on%20a%20service%20called%20the%20Host%20Network%20Service%20(HNS).%20HNS%20also%20leverages%20VFP%20and%20as%20mentioned%20in%20the%20SDN%20section%2C%20VFP%20can%20only%20be%20added%20to%20a%20Switch%20Embedded%20Team%20(SET).%20For%20more%20information%20on%20Container%20Networking%2C%20please%20see%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fvirtualization%2Fwindowscontainers%2Fcontainer-networking%2Farchitecture%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ethis%20link%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EVirtual%20Machine%20Multi-Queues%20-%3C%2FSTRONG%3E%20VMMQ%20is%20a%20critical%20performance%20feature%20for%20Azure%20Stack%20HCI.%20VMMQ%20allows%20you%20to%20assign%20multiple%20VMQs%20to%20the%20same%20virtual%20NIC%20without%20which%2C%20you%20rely%20on%20expensive%20software%20spreading%20operations%20(the%20OS%20spreads%20packets%20across%20multiple%20CPUs%20without%20hardware%20(NIC)%20assistance)%20that%20greatly%20increases%20CPU%20utilization%20on%20the%20host%2C%20reducing%20the%20number%20of%20virtual%20machines%20you%20can%20run.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMoreover%2C%20if%20your%20vNIC%20doesn%E2%80%99t%20get%20a%20VMQ%2C%20all%20traffic%20is%20processed%20by%20the%20default%20queue.%20With%20SET%20you%20can%20assign%20multiple%20VMQs%20to%20the%20default%20queue%20which%20can%20be%20shared%20as%20needed%20by%20any%20vNIC%20allowing%20more%20VMs%20to%20get%20the%20bandwidth%20they%20need.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20this%20video%2C%20you%20can%20see%20the%20performance%20(throughput)%20benefits%20of%20Switch%20Embedded%20Teaming%20over%20that%20of%20LBFO.%26nbsp%3B%20The%20video%20demonstrates%20a%202x%20throughput%20improvement%20with%20SET%20over%20LBFO%2C%20while%20consuming%20~10%25%20additional%20CPU%20(a%20result%20of%20double%20the%20throughput).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.youtube.com%2Fembed%2FjxDPobc_TTo%22%20width%3D%22560%22%20height%3D%22315%22%20frameborder%3D%220%22%20allowfullscreen%3D%22allowfullscreen%22%20allow%3D%22accelerometer%3B%20autoplay%3B%20encrypted-media%3B%20gyroscope%3B%20picture-in-picture%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDynamic%20VMMQ%20%3C%2FSTRONG%3E-%26nbsp%3B%20d.VMMQ%26nbsp%3Bwon%E2%80%99t%20work%20either.%20Dynamic%20VMMQ%20is%20an%20intelligent%20queue%20scheduling%20algorithm%20for%20VMMQ%20that%20recognizes%20when%20CPU%20cores%20are%20overworked%20by%20network%20traffic%20and%20reassigns%20that%20network%20traffic%20processing%20to%20other%20cores%20automatically%20so%20your%20workloads%20(e.g.%20VMs%2C%20applications%2C%20etc.)%20can%20run%20without%20competing%20for%20processor%20time.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHere's%20an%20example%20of%20some%20of%20the%20benefits%20of%20Dynamic%20VMMQ.%20In%20the%20video%2C%20you%20can%20see%20the%20host%2C%20spending%20CPU%20resources%20processing%20packets%20for%20a%20specific%20virtual%20NIC.%20When%20a%20competing%20workload%20begins%20on%20the%20system%20(which%20would%20prevent%20the%20virtual%20NIC%20from%20reaching%20maximum%20performance)%2C%20we%20automatically%20tune%20the%20system%20by%20moving%20one%20of%20the%20workloads%20to%20an%20available%20processor.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.youtube.com%2Fembed%2FWsrVS3LCCNM%22%20width%3D%22560%22%20height%3D%22315%22%20frameborder%3D%220%22%20allowfullscreen%3D%22allowfullscreen%22%20allow%3D%22accelerometer%3B%20autoplay%3B%20encrypted-media%3B%20gyroscope%3B%20picture-in-picture%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERSC%20in%20the%20vSwitch%20%3C%2FSTRONG%3Eis%20an%20acceleration%20that%20coalesces%20segments%20destined%20for%20the%20same%20virtual%20NIC%20into%20a%20larger%20segment.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOutbound%20network%20traffic%20is%20slimmed%20to%20fit%20into%20the%20mtu%20size%20of%20the%20physical%20network%20(default%20of%20~1500%20bytes).%20However%2C%20inbound%20traffic%20can%20be%20coalesced%20into%20one%20big%20segment.%20That%20one%20big%20segment%20takes%20far%20less%20processing%20than%20multiple%20small%20segments%2C%20so%20once%20traffic%20is%20received%20by%20the%20host%2C%20we%20can%20combine%20them%20and%20deliver%20several%20segments%20to%20the%20vNIC%20all%20at%20once.%20SET%20was%20made%20aware%20of%20RSC%20coalescing%20and%20supports%20this%20acceleration%20as%20of%20Windows%20Server%202019.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%E2%80%99re%20continuing%20to%20improve%20this%20feature%20for%20even%20better%20performance%20in%20the%20next%20version%20of%20Windows%20Server%20and%20Azure%20Stack%20HCI%20by%20enabling%20RSC%20in%20the%20vSwitch%20to%20extend%20over%20the%20VMBus.%20In%20the%20video%20below%2C%20we%20show%20one%20VM%20sending%20traffic%20to%20another%20VM%20with%20the%20improved%20acceleration%20disabled%20-%20This%20is%20using%20only%20the%20original%20Windows%20Server%202019%2C%20RSC%20in%20the%20vSwitch%20capabilities.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENext%20we%20enable%20the%20Windows%20Server%20vNext%20improvements%3B%20throughput%20is%20improved%20by%20~17%20Gbps%20while%20CPU%20resourcing%20%3CSTRONG%3Eis%20reduced%3C%2FSTRONG%3E%20by%20approximately%2012%25%20(20%20cores%20on%20the%20system).%20This%20type%20of%20traffic%20pattern%20is%20specifically%20valuable%20for%20container%20scenarios%20that%20reside%20on%20the%20same%20host.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.youtube.com%2Fembed%2FQKvlpsq5j3I%22%20width%3D%22560%22%20height%3D%22315%22%20frameborder%3D%220%22%20allowfullscreen%3D%22allowfullscreen%22%20allow%3D%22accelerometer%3B%20autoplay%3B%20encrypted-media%3B%20gyroscope%3B%20picture-in-picture%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId-1038408920%22%20id%3D%22toc-hId-1038408920%22%20id%3D%22toc-hId-1038408920%22%20id%3D%22toc-hId-1038408920%22%20id%3D%22toc-hId-1038408920%22%20id%3D%22toc-hId-1038408920%22%20id%3D%22toc-hId-1038408920%22%20id%3D%22toc-hId-1038408920%22%20id%3D%22toc-hId-1038408920%22%20id%3D%22toc-hId-1038408920%22%20id%3D%22toc-hId-1038408920%22%20id%3D%22toc-hId-1038408920%22%20id%3D%22toc-hId-1038408920%22%20id%3D%22toc-hId-1038408920%22%3ELBFO%20has%20been%20exceeded%20in%20both%20performance%20and%20stability%20by%20SET%3C%2FH1%3E%0A%3CP%3E%3CEM%3ENote%3A%20Guest%20RDMA%2C%20RSC%20in%20the%20vSwitch%2C%20VMMQ%2C%20and%20Dynamic%20VMMQ%20belong%20in%20this%20category%20as%20well.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECertified%20Azure%20Stack%20and%20Azure%20Stack%20HCI%20solutions%20test%20only%20SET%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EIf%20all%20that%20wasn%E2%80%99t%20enough%2C%20both%20Microsoft%20and%20our%20partners%20validate%20and%20certify%20their%20solutions%20on%20SET%2C%20not%20LBFO.%20If%20you%20bought%20a%20certified%20Azure%20Stack%20HCI%20solution%20from%20one%20of%20our%20partners%20%3CSTRONG%3EOR%3C%2FSTRONG%3E%20a%20standard%20or%20premium%20logo%E2%80%99d%20NIC%2C%20it%20was%20tested%20and%20validated%20with%20Switch%20Embedded%20Teaming.%20That%20means%20all%20certification%20tests%20where%20run%20with%20SET.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ELink%20Aggregation%20Control%20Protocol%20(LACP)%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F168469i809A10F89B3E218D%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22clipboard_image_0.png%22%20title%3D%22clipboard_image_0.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EOk%2C%20so%20this%20one%20is%20a%20little%20counter-intuitive.%20LACP%2C%20allows%20for%20port-channels%20or%20switch-dependent%20teams%20to%20send%20traffic%20to%20the%20host%20over%20more%20than%20one%20physical%20port%20simultaneously.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%3CEM%3E%20%3CSTRONG%3Enative%20hosts%3C%2FSTRONG%3E%3C%2FEM%3E%20this%20means%20that%20every%20port%20in%20the%20port-channel%20can%20send%20traffic%20simultaneously%20%E2%80%93%20for%20the%20system%20on%20the%20right%20with%202%20x%2050%20Gbps%20NICs%2C%20it%20looks%20like%20one%20big%20pipe%20with%20a%20%3CEM%3Enative%20host%3C%2FEM%3E%20potentially%20receiving%20100%20Gbps.%20Naturally%2C%20you'd%20expect%20that%20this%20capability%20could%20extend%20to%20virtual%20NICs%20as%20well.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBut%20things%20change%20with%20virtualization.%20When%20the%20traffic%20gets%20to%20the%20host%2C%20the%20NICs%20need%20to%20interrupt%20multiple%2C%20independent%20processors%20to%20exceed%20what%20a%20single%20CPU%20core%20can%20process%20%E2%80%93%20This%20is%20what%20VMMQ%20does%2C%20and%20as%20mentioned%2C%20VMMQ%20does%20not%20work%20with%20LBFO.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELBFO%20limits%20you%20to%20a%20single%20VMQ%20and%20despite%20having%20(in%20the%20picture)%20100%20Gbps%20of%20inbound%20bandwidth%2C%20you%20would%20only%20receive%20about%205%20Gbps%20per%20virtual%20NIC%20(or%20up%20to%20~20%20Gbps%20per%20vNIC%20at%20the%20painful%20expense%20of%20OS-based%20software%20spreading%20that%20could%20be%20used%20for%20running%20virtual%20machine%20workloads).%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F168470i46F2364CE22C92ED%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22clipboard_image_1.png%22%20title%3D%22clipboard_image_1.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20SET%2C%20switch-independent%20teaming%2C%20and%20the%20hardware%20assistance%20of%20VMMQ%20and%20enough%20CPUs%20in%20the%20system%2C%20you%20could%20receive%20all%20100%20Gbps%20of%20data%20into%20the%20host.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20summary%2C%20LACP%20provides%20no%20throughput%20benefits%20for%20Azure%20Stack%20HCI%20scenarios%2C%20incurs%20higher%20CPU%20consumption%2C%20and%20cannot%20auto-tune%20the%20system%20to%20avoid%20competition%20between%20workloads%20for%20virtualized%20scenarios%20(Dynamic%20VMMQ).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EAsymmetric%20Adapters%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EWhile%20we're%20myth-busting%2C%20let%E2%80%99s%20talk%20about%20adapter%20symmetry%20which%20describes%20the%20length%20to%20which%20adapters%20have%20the%20same%20make%2C%20model%2C%20speed%2C%20and%20configuration%20%E2%80%93%20SET%20requires%20adapter%20symmetry%20for%20Microsoft%20support.%20Usually%20the%20easiest%20way%20to%20identify%20this%20symmetry%20is%20by%20the%20device%20Interface%20Description%20(with%20PowerShell%2C%20use%20Get-NetAdapter).%20If%20the%20interface%20description%20matches%20(with%20exception%20of%20the%20unique%20number%20given%20to%20each%20adapter%20e.g.%20Intel%20NIC%20%231%2C%20Intel%20NIC%20%232%2C%20etc.)%20then%20the%20adapters%20are%20symmetric.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EPrior%20to%20Windows%20Server%202016%2C%20conventional%20wisdom%20stated%20that%20you%20should%20use%20different%20NICs%20with%20different%20drivers%20in%20a%20team.%20The%20thinking%20was%20that%20if%20one%20driver%20had%20an%20issue%2C%20another%20team%20member%20would%20survive%2C%20and%20the%20team%20would%20remain%20up.%20This%20is%20a%20common%20benefit%20customers%20cite%20in%20favor%20of%20LBFO%3A%20it%20supports%20asymmetric%20adapters.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHowever%2C%20two%20drivers%20mean%20twice%20as%20many%20things%20can%20go%20wrong%20in%20fact%20increasing%20the%20likelihood%20of%20a%20problem.%20Instead%2C%20a%20properly%20designed%20infrastructure%20with%20symmetric%20adapters%20are%20far%20more%20stable%20in%20our%20review%20of%20customer%20support%20cases.%20As%20a%20result%2C%20support%20for%20asymmetric%20teams%20are%20no%20longer%20a%20differentiator%20for%20LBFO%20nor%20do%20we%20recommend%20it%20for%20Azure%20Stack%20HCI%20scenarios%20where%20reliability%20is%20the%20%231%20requirement.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ELBFO%20for%20management%20adapters%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESome%20customers%20I%E2%80%99ve%20worked%20with%20have%20asked%20if%20they%20should%20use%20LBFO%20for%20management%20adapters%20when%20the%20vSwitch%20is%20not%20attached%20%E2%80%93%20Our%20recommendation%20is%20to%20always%20use%20SET%20whenever%20available.%20A%20management%20adapter%E2%80%99s%20goal%20in%20life%20is%20to%20be%20stable%20and%20we%20see%20less%20support%20cases%20with%20SET.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20be%20clear%2C%20if%20the%20adapter%20is%20not%20attached%20to%20a%20virtual%20switch%2C%20LBFO%20is%20acceptable%20however%2C%20you%20should%20endeavor%20to%20use%20SET%20whenever%20possible%20due%20to%20the%20support%20reasons%20outlined%20in%20this%20article.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%226%22%3E%3CSTRONG%3EvSwitch%20on%20LBFO%20Deprecation%20Status%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%223%22%3ERecently%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows-server%2Fget-started-19%2Fremoved-features-1903%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ewe%20publicly%20announced%3C%2FA%3E%20our%20plans%20to%20deprecate%20the%20use%20of%20LBFO%20with%20the%20Hyper-V%20virtual%20switch.%20Moving%20forward%2C%20and%20due%20to%20the%20various%20reasons%20outlined%20in%20this%20article%2C%20we%20have%20decided%20to%20block%20the%20binding%20of%20the%20vSwitch%20on%20LBFO.%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%223%22%3EPrior%20to%20upgrading%20from%20Windows%20Server%202019%20to%20vNext%20or%20if%20you%20have%20a%20fresh%20install%20of%20vNext%2C%20you%20will%20need%20to%20convert%20any%20LBFO%20teams%20to%20a%20SET%20team%20if%20it's%20attached%20to%20a%20Hyper-V%20virtual%20switch.%20To%20make%20this%20simpler%2C%20we're%20releasing%20a%20tool%20(available%20on%20the%20PowerShell%20gallery)%20called%26nbsp%3B%3CA%20href%3D%22http%3A%2F%2Faka.ms%2FConvert-LBFO2SET%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EConvert-LBFO2SET%3C%2FA%3E.%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%223%22%3EYou%20can%20install%20this%20tool%20using%20the%20command%3A%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-csharp%22%3E%3CCODE%3EInstall-Module%20Convert-LBFO2SET%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOr%20for%20disconnected%20systems%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-csharp%22%3E%3CCODE%3ESave-Module%20Convert-LBFO2SET%20-Path%20C%3A%5CSomeFolderPath%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%223%22%3EPlease%20see%20the%20wiki%20for%20instructions%20on%20how%20to%20use%20the%20tool%20however%20here's%20an%20example%20where%20we%20convert%20a%20system%20with%2010%20host%20vNICs%2C%2010%20generation%201%20VMs%2C%20and%2010%20generation%202%20VMs.%26nbsp%3B%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%223%22%3E%26nbsp%3B%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.youtube.com%2Fembed%2FAedjp2_y4bU%22%20width%3D%22560%22%20height%3D%22315%22%20frameborder%3D%220%22%20allowfullscreen%3D%22allowfullscreen%22%20allow%3D%22accelerometer%3B%20autoplay%3B%20encrypted-media%3B%20gyroscope%3B%20picture-in-picture%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESummary%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ELBFO%20remains%20our%20teaming%20solution%20if%20you%20are%20running%20your%20workloads%20on%20bare%20metal%20servers.%20If%20however%2C%20you%20are%20running%20virtualized%20or%20cloud%20scenarios%20like%20Azure%20Stack%20HCI%2C%20you%20should%20give%20Switch%20Embedded%20Teaming%20serious%20consideration.%20As%20we%E2%80%99ve%20described%20in%20this%20article%2C%20SET%20has%20been%20the%20Microsoft%20recommended%20teaming%20solution%20and%20focus%20since%20Windows%20Server%202016%20as%20it%20brings%20better%20performance%2C%20stability%2C%20and%20feature%20support%20compared%20to%20LBFO.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAre%20there%20other%20questions%20you%20have%20about%20SET%20and%20LBFO%3F%20Please%20submit%20your%20questions%20in%20the%20comments%20below!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks%20for%20reading%2C%3C%2FP%3E%0A%3CP%3EDan%20%E2%80%9CAll%20SET%20for%20Azure%20Stack%20HCI%E2%80%9D%20Cuomo%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1070642%22%20slang%3D%22en-US%22%3E%3CP%3EWindows%20Server%20currently%20has%20two%20inbox%20teaming%20mechanisms%20with%20two%20very%20different%20purposes.%20In%20this%20article%2C%20we%E2%80%99ll%20describe%20several%20reasons%20why%20you%20should%20use%20Switch%20Embedded%20Teaming%20(SET)%20for%20Azure%20Stack%20HCI%20scenarios%20and%20we%E2%80%99ll%20challenge%20several%20long-held%20teaming%20myths%20%E2%80%93%20We%E2%80%99d%20love%20to%20hear%20your%20feedback%20in%20the%20comments%20below!%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1149479%22%20slang%3D%22en-US%22%3ERe%3A%20Teaming%20in%20Azure%20Stack%20HCI%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1149479%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20for%20the%20Awesome%20blogpost%26nbsp%3B%3CIMG%20class%3D%22lia-deferred-image%20lia-image-emoji%22%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Fhtml%2Fimages%2Femoticons%2Fcool_40x40.gif%22%20alt%3D%22%3Acool%3A%22%20title%3D%22%3Acool%3A%22%20%2F%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1176467%22%20slang%3D%22en-US%22%3ERe%3A%20Teaming%20in%20Azure%20Stack%20HCI%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1176467%22%20slang%3D%22en-US%22%3E%3CP%3ESweet%20post!%20I%20love%20these%20sorts%20of%20insights%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1188581%22%20slang%3D%22en-US%22%3ERe%3A%20Teaming%20in%20Azure%20Stack%20HCI%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1188581%22%20slang%3D%22en-US%22%3E%3CP%3EMultipath%20TCP%20(%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FMultipath_TCP%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fen.wikipedia.org%2Fwiki%2FMultipath_TCP%3C%2FA%3E%26nbsp%3B)%20would%20provide%20a%20far%20simplest%20and%20better%20way%20to%20support%20these%20scenarios.%3C%2FP%3E%3CP%3EWSL%20team%20could%20embrace%20this%20as%20Mutipath%20TCP%20is%20landing%20into%20the%20mainstream%20Linux%20kernel%20in%20the%20coming%20weeks.%20In%20the%20while%2C%20the%20Windows%20networking%20team%20could%20start%20thinking%20to%20develop%20a%20native%20Multipath%20TCP%20implementation%20into%20Windows%20Network%20stack.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1204974%22%20slang%3D%22en-US%22%3ERe%3A%20Teaming%20in%20Azure%20Stack%20HCI%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1204974%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F181741%22%20target%3D%22_blank%22%3E%40James%20Gandy%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1191561%22%20slang%3D%22en-US%22%3ERe%3A%20Teaming%20in%20Azure%20Stack%20HCI%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1191561%22%20slang%3D%22en-US%22%3E%3CP%3EExcellent%20post%20Dan.%20This%20really%20helps%20us%20understand%20why%20SET%20is%20so%20much%20better%20than%20LBFO.%20Keep%20up%20the%20great%20work!%20%3A)%3C%2Fimg%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Written by Dan Cuomo, Senior PM at Microsoft. Follow him on Twitter @dan2_2023

 

Spoiler
As we're deprecating the vSwitch attached to an LBFO team, this article introduces a new tool for converting your LBFO team to a SET team. To download this tool, run the following command or see the end of this article.
Install-Module Convert-LBFO2SET​

Windows Server currently has two inbox teaming mechanisms with two very different purposes. In this article, we’ll describe several reasons why you should use Switch Embedded Teaming (SET) for Azure Stack HCI scenarios and we’ll discuss several long-held teaming myths – We’d love to hear your feedback in the comments below. Let's get started!

 

In Windows Server 2012 we released LBFO as an inbox teaming mechanism, with many customers leveraging this technology to provide load-balancing and fail-over between network adapters. Since then, the rise of software-defined storage and software defined networking has brought performance and compatibility challenges to the forefront (outlined in this article) with the LBFO architecture that required a change in direction.

 

This new direction is called Switch Embedded Teaming (SET) and was introduced in Windows Server 2016. SET is available when Hyper-V is installed on any Server OS (Windows Server 2016 and higher) and Windows 10 version 1809 (and higher). You’re not required to run virtual machines to use SET, but the Hyper-V role must be installed.

 

In summary, LBFO is our older teaming technology that will not see future investment, is not compatible with numerous advanced capabilities, and has been exceeded in both performance and stability by our new technology (SET). We'd like to discuss why you should move off LBFO for virtualized and cloud scenarios. Let's dig into this paragraph a bit.

 

 

LBFO is our older teaming technology that will not see future investment

clipboard_image_0.png

With the intent to bring software-defined technologies like SDNv2 and containers to Windows Server, it became clear that we needed an alternative teaming solution and so we set off creating SET, circa 2014. Simultaneously reaching feature parity and stability with LBFO took time; several early adopters of SET will remember some of these pains. However, SET’s stability, performance, and features have now far surpassed LBFO.

 

All new features released since Windows Server 2016 (see below) were developed and tested with SET in mind – This includes all Azure Stack HCI solutions you may have purchased; Azure Stack HCI is not tested or certified with LBFO. This is largely due to development simplicity and testing; without driving too far into unimportant details, LBFO teams adapters inside NDIS which is a large and complex component – its roots date back to Windows 95 (of course updated considerably since then). If your system has a NIC, you’re using NDIS. In the picture shown above, each component below the vSwitch was part of NDIS.

 

The size and complexity of scenarios included in NDIS made for very complex testing requirements that were only compounded by virtualized and software-defined technologies that considerably hampered feature innovation. You might think that this is just a Microsoft problem, but really this affects NIC vendor driver development time and stability as well.

 

All-in-all, we’re not focusing on LBFO much these days, particularly as software-defined Windows Server networking scenarios become more exotic with the rise of containers, software-defined networking, and much more. There’s a faster, more stable, and performant teaming solution, called Switch Embedded Teaming.

LBFO is not compatible with several advanced capabilities

Here’s a smattering of scenarios and features that are supported with SET but NOT LBFO:

 

Windows Admin Center - WAC is the de facto management tool for Windows Server and Azure Stack HCI, with millions of nodes under management. You can create and manage a SET team for a single host, or deploy a SET team to multiple hosts with the new Cluster Creation UI we released to help you deploy Azure Stack HCI solutions at Microsoft Ignite this year (watch the session, try it out, and give us feedback).

 

LBFO is not available for configuration in Windows Admin Center.

 

RDMA Teaming - Only SET can team RDMA adapters. RDMA is used for example with Storage Spaces Direct (S2D) which requires a reliable high bandwidth, low latency network connection between each node. High-bandwidth? Low Latency? That’s RDMA’s bag so it is the recommended pattern with S2D. Reliability? That’s SET's claim-to-fame so these two are a logical pairing.

 

Guest RDMA: SET supports RDMA into a virtual machine. This doesn’t work with LBFO for two reasons:

  • RDMA adapters cannot be teamed with LBFO both host adapters and virtual adapters.
  • RDMA uses SMB multichannel which requires multiple adapters to balance traffic across. Since you can’t assign a vNIC to pNIC affinity with LBFO, neither the SMB nor non-SMB traffic can be made highly available.

Guest Teaming is a strange one; you could add multiple virtual NICs to a Hyper-V VM; inside the VM, you could use LBFO to team the virtual NICs. However, you cannot affinitize a virtual NIC (vNIC) to a physical NIC (pNIC), so it’s possible that both vNICs added in the VM are sending and receiving traffic out of the same pNIC. If that pNIC fails, you lose both of your virtual NICs. 

 

SET allows you to map each vNIC to a pNIC to ensure that they don’t overlap, ensuring that a Guest Team is able to survive an adapter outage.

 

Microsoft Software Defined Networking - (SDN) was first released in its modern form in Windows Server 2016 and requires a virtual switch extension called the Virtual Filtering Platform (VFP). VFP is the brains behind SDN, the same extension that runs our public cloud, Azure. VFP can only be added to a SET team.

 

This means that any of the SDN features (which are included with a Datacenter Edition license) like the Software Load Balancer, Gateways, Distributed Firewall (ACLs), and our modern network QoS capability are also unavailable if you’re using LBFO.

 

Container Networking - Containers relies on a service called the Host Network Service (HNS). HNS also leverages VFP and as mentioned in the SDN section, VFP can only be added to a Switch Embedded Team (SET). For more information on Container Networking, please see this link.

 

Virtual Machine Multi-Queues - VMMQ is a critical performance feature for Azure Stack HCI. VMMQ allows you to assign multiple VMQs to the same virtual NIC without which, you rely on expensive software spreading operations (the OS spreads packets across multiple CPUs without hardware (NIC) assistance) that greatly increases CPU utilization on the host, reducing the number of virtual machines you can run.

 

Moreover, if your vNIC doesn’t get a VMQ, all traffic is processed by the default queue. With SET you can assign multiple VMQs to the default queue which can be shared as needed by any vNIC allowing more VMs to get the bandwidth they need.

 

In this video, you can see the performance (throughput) benefits of Switch Embedded Teaming over that of LBFO.  The video demonstrates a 2x throughput improvement with SET over LBFO, while consuming ~10% additional CPU (a result of double the throughput).

 

 

Dynamic VMMQ -  d.VMMQ won’t work either. Dynamic VMMQ is an intelligent queue scheduling algorithm for VMMQ that recognizes when CPU cores are overworked by network traffic and reassigns that network traffic processing to other cores automatically so your workloads (e.g. VMs, applications, etc.) can run without competing for processor time.

 

Here's an example of some of the benefits of Dynamic VMMQ. In the video, you can see the host, spending CPU resources processing packets for a specific virtual NIC. When a competing workload begins on the system (which would prevent the virtual NIC from reaching maximum performance), we automatically tune the system by moving one of the workloads to an available processor.

 

 

RSC in the vSwitch is an acceleration that coalesces segments destined for the same virtual NIC into a larger segment.

 

Outbound network traffic is slimmed to fit into the mtu size of the physical network (default of ~1500 bytes). However, inbound traffic can be coalesced into one big segment. That one big segment takes far less processing than multiple small segments, so once traffic is received by the host, we can combine them and deliver several segments to the vNIC all at once. SET was made aware of RSC coalescing and supports this acceleration as of Windows Server 2019.

 

We’re continuing to improve this feature for even better performance in the next version of Windows Server and Azure Stack HCI by enabling RSC in the vSwitch to extend over the VMBus. In the video below, we show one VM sending traffic to another VM with the improved acceleration disabled - This is using only the original Windows Server 2019, RSC in the vSwitch capabilities. 

 

Next we enable the Windows Server vNext improvements; throughput is improved by ~17 Gbps while CPU resourcing is reduced by approximately 12% (20 cores on the system). This type of traffic pattern is specifically valuable for container scenarios that reside on the same host.

 

 

LBFO has been exceeded in both performance and stability by SET

Note: Guest RDMA, RSC in the vSwitch, VMMQ, and Dynamic VMMQ belong in this category as well.

 

Certified Azure Stack and Azure Stack HCI solutions test only SET

If all that wasn’t enough, both Microsoft and our partners validate and certify their solutions on SET, not LBFO. If you bought a certified Azure Stack HCI solution from one of our partners OR a standard or premium logo’d NIC, it was tested and validated with Switch Embedded Teaming. That means all certification tests where run with SET.

 

Link Aggregation Control Protocol (LACP)

clipboard_image_0.png

Ok, so this one is a little counter-intuitive. LACP, allows for port-channels or switch-dependent teams to send traffic to the host over more than one physical port simultaneously.

 

For native hosts this means that every port in the port-channel can send traffic simultaneously – for the system on the right with 2 x 50 Gbps NICs, it looks like one big pipe with a native host potentially receiving 100 Gbps. Naturally, you'd expect that this capability could extend to virtual NICs as well.

 

But things change with virtualization. When the traffic gets to the host, the NICs need to interrupt multiple, independent processors to exceed what a single CPU core can process – This is what VMMQ does, and as mentioned, VMMQ does not work with LBFO.

 

LBFO limits you to a single VMQ and despite having (in the picture) 100 Gbps of inbound bandwidth, you would only receive about 5 Gbps per virtual NIC (or up to ~20 Gbps per vNIC at the painful expense of OS-based software spreading that could be used for running virtual machine workloads).

clipboard_image_1.png

 

With SET, switch-independent teaming, and the hardware assistance of VMMQ and enough CPUs in the system, you could receive all 100 Gbps of data into the host.

 

In summary, LACP provides no throughput benefits for Azure Stack HCI scenarios, incurs higher CPU consumption, and cannot auto-tune the system to avoid competition between workloads for virtualized scenarios (Dynamic VMMQ).

 

Asymmetric Adapters

While we're myth-busting, let’s talk about adapter symmetry which describes the length to which adapters have the same make, model, speed, and configuration – SET requires adapter symmetry for Microsoft support. Usually the easiest way to identify this symmetry is by the device Interface Description (with PowerShell, use Get-NetAdapter). If the interface description matches (with exception of the unique number given to each adapter e.g. Intel NIC #1, Intel NIC #2, etc.) then the adapters are symmetric.

 

Prior to Windows Server 2016, conventional wisdom stated that you should use different NICs with different drivers in a team. The thinking was that if one driver had an issue, another team member would survive, and the team would remain up. This is a common benefit customers cite in favor of LBFO: it supports asymmetric adapters.

 

However, two drivers mean twice as many things can go wrong in fact increasing the likelihood of a problem. Instead, a properly designed infrastructure with symmetric adapters are far more stable in our review of customer support cases. As a result, support for asymmetric teams are no longer a differentiator for LBFO nor do we recommend it for Azure Stack HCI scenarios where reliability is the #1 requirement.

 

LBFO for management adapters

Some customers I’ve worked with have asked if they should use LBFO for management adapters when the vSwitch is not attached – Our recommendation is to always use SET whenever available. A management adapter’s goal in life is to be stable and we see less support cases with SET.

 

To be clear, if the adapter is not attached to a virtual switch, LBFO is acceptable however, you should endeavor to use SET whenever possible due to the support reasons outlined in this article.

 

vSwitch on LBFO Deprecation Status

Recently, we publicly announced our plans to deprecate the use of LBFO with the Hyper-V virtual switch. Moving forward, and due to the various reasons outlined in this article, we have decided to block the binding of the vSwitch on LBFO.

 

Prior to upgrading from Windows Server 2019 to vNext or if you have a fresh install of vNext, you will need to convert any LBFO teams to a SET team if it's attached to a Hyper-V virtual switch. To make this simpler, we're releasing a tool (available on the PowerShell gallery) called Convert-LBFO2SET.

 

You can install this tool using the command:

 

 

 

 

Install-Module Convert-LBFO2SET

 

 

 

 

 

Or for disconnected systems:

 

 

 

 

Save-Module Convert-LBFO2SET -Path C:\SomeFolderPath

 

 

 

 

 

Please see the wiki for instructions on how to use the tool however here's an example where we convert a system with 10 host vNICs, 10 generation 1 VMs, and 10 generation 2 VMs. 

 

 

Summary

LBFO remains our teaming solution if you are running your workloads on bare metal servers. If however, you are running virtualized or cloud scenarios like Azure Stack HCI, you should give Switch Embedded Teaming serious consideration. As we’ve described in this article, SET has been the Microsoft recommended teaming solution and focus since Windows Server 2016 as it brings better performance, stability, and feature support compared to LBFO.

 

Are there other questions you have about SET and LBFO? Please submit your questions in the comments below!

 

Thanks for reading,

Dan “All SET for Azure Stack HCI” Cuomo

 

6 Comments

Thanks for the Awesome blogpost :cool:

Senior Member

Sweet post! I love these sorts of insights

Senior Member

Multipath TCP ( https://en.wikipedia.org/wiki/Multipath_TCP ) would provide a far simplest and better way to support these scenarios.

WSL team could embrace this as Mutipath TCP is landing into the mainstream Linux kernel in the coming weeks. In the while, the Windows networking team could start thinking to develop a native Multipath TCP implementation into Windows Network stack. 

 

Senior Member

Excellent post Dan. This really helps us understand why SET is so much better than LBFO. Keep up the great work! :)

Microsoft

Thanks @James Gandy and @Ben Thomas 

Microsoft

@Olivier Hault - Our current direction for this is QUIC which solves for the same challenges. SET and LBFO are more for traditional teaming mechanisms that allow for only one connection rather than a multipath solution. Thanks for your suggestion!