Upload
austin-blankenship
View
222
Download
3
Tags:
Embed Size (px)
Citation preview
Boot XP Embedded in Under 10 Seconds
Boot XP Embedded in Under 10 SecondsAlexander WechslereMVPMicrosoft Regional Director, GermanyWechsler Consulting GmbH & CO. [email protected]: http://spaces.msn.com/weconlog
Alexander WechslereMVPMicrosoft Regional Director, GermanyWechsler Consulting GmbH & CO. [email protected]: http://spaces.msn.com/weconlog
What is Going on Here?What is Going on Here?
System boots from the hibernation file into a predefined system stateDrivers, services and programs are immediately up and runningSystem boots into this state any time, regardless of the shutdown method you choose.(For example, restart, hibernate, shut down or, even more drastically, cutting power.)File system will not get corrupted -> it is protected
System boots from the hibernation file into a predefined system stateDrivers, services and programs are immediately up and runningSystem boots into this state any time, regardless of the shutdown method you choose.(For example, restart, hibernate, shut down or, even more drastically, cutting power.)File system will not get corrupted -> it is protected
HiberfileRAM
(re-hydrated)
EWFOverlay
System Memory
EWF Protected OS partition
Processor
Windows XP embedded HORM device
Hibernate Once Resume ManyHibernate Once Resume Many
Why Can’t Microsoft Windows XP Do This?Why Can’t Microsoft Windows XP Do This?
HORM requires the heavy use of Windows XP Embedded EEFs (Embedded Enabling Features), not available for Windows XP Some limitations to system functionality to achieve data consistency:
Windows XP invalidates the hibernation file after every reboot
Windows XP requires new creation of the file when entering hibernation mode
HORM requires the heavy use of Windows XP Embedded EEFs (Embedded Enabling Features), not available for Windows XP Some limitations to system functionality to achieve data consistency:
Windows XP invalidates the hibernation file after every reboot
Windows XP requires new creation of the file when entering hibernation mode
Hiberfile System Memory
Unprotected OS partition
Processor
HiberfileRAM
(re-hydrated)
Windows XP embedded HORM device
Windows XP Professional HibernationWindows XP Professional Hibernation
File Headers From Valid and Invalid Windows XP Hibernation Files Shown in Hex-Editor
File Headers From Valid and Invalid Windows XP Hibernation Files Shown in Hex-Editor
HORM Usage Scenarios HORM Usage Scenarios HORM Usage Scenarios HORM Usage Scenarios
Ideal for fixed function devices such as:Ideal for fixed function devices such as:Information kiosksInformation kiosks
Ticket machinesTicket machines
Cash registersCash registers
Automation controllersAutomation controllers
Especially when:Especially when:No data is stored locallyNo data is stored locally
Systems act as service brokers or functional Systems act as service brokers or functional nodesnodes
Ideal for fixed function devices such as:Ideal for fixed function devices such as:Information kiosksInformation kiosks
Ticket machinesTicket machines
Cash registersCash registers
Automation controllersAutomation controllers
Especially when:Especially when:No data is stored locallyNo data is stored locally
Systems act as service brokers or functional Systems act as service brokers or functional nodesnodes
HORM OverviewHORM OverviewHORM OverviewHORM Overview
Hibernate Once Resume Many, benefits:Hibernate Once Resume Many, benefits:
Uses an on-time, create-hibernation file Uses an on-time, create-hibernation file to always boot from it fast and reliablyto always boot from it fast and reliably
Shortens boot time significantlyShortens boot time significantly
User can modify and recreate this file any User can modify and recreate this file any timetime
Protected system partition makes the Protected system partition makes the system robust against e.g. power outage system robust against e.g. power outage and virusesand viruses
Manage the system in well-defined Manage the system in well-defined intervals having complete controlintervals having complete control
Hibernate Once Resume Many, benefits:Hibernate Once Resume Many, benefits:
Uses an on-time, create-hibernation file Uses an on-time, create-hibernation file to always boot from it fast and reliablyto always boot from it fast and reliably
Shortens boot time significantlyShortens boot time significantly
User can modify and recreate this file any User can modify and recreate this file any timetime
Protected system partition makes the Protected system partition makes the system robust against e.g. power outage system robust against e.g. power outage and virusesand viruses
Manage the system in well-defined Manage the system in well-defined intervals having complete controlintervals having complete control
HORM OverviewHORM OverviewHORM OverviewHORM Overview
Hibernate Once Resume Many, drawbacks:Hibernate Once Resume Many, drawbacks:
Persisting information is getting harderPersisting information is getting harder
Deployment and maintenance are more Deployment and maintenance are more difficultdifficult
Not all HW and SW supports HORMNot all HW and SW supports HORM
Mixed configurations having protected Mixed configurations having protected and unprotected volumes are challenging. and unprotected volumes are challenging. Data consistency is an always-present Data consistency is an always-present topic.topic.
Network shares must also be treated Network shares must also be treated specially after waking the system upspecially after waking the system up
Hibernate Once Resume Many, drawbacks:Hibernate Once Resume Many, drawbacks:
Persisting information is getting harderPersisting information is getting harder
Deployment and maintenance are more Deployment and maintenance are more difficultdifficult
Not all HW and SW supports HORMNot all HW and SW supports HORM
Mixed configurations having protected Mixed configurations having protected and unprotected volumes are challenging. and unprotected volumes are challenging. Data consistency is an always-present Data consistency is an always-present topic.topic.
Network shares must also be treated Network shares must also be treated specially after waking the system upspecially after waking the system up
What Do I Need to Do HORM?What Do I Need to Do HORM?What Do I Need to Do HORM?What Do I Need to Do HORM?
Ingredients:Ingredients:Windows XP Embedded runtime image Windows XP Embedded runtime image for your target devicefor your target device
Hibernation support (power management)Hibernation support (power management)
Enhanced Write Filter in RAM or RAM/Reg modeEnhanced Write Filter in RAM or RAM/Reg mode
An extra file, resmany.datAn extra file, resmany.dat
Optional things like:Optional things like:Enhanced Write Filter (EWF) Manager and APIEnhanced Write Filter (EWF) Manager and API
Windows XP Embedded power management tools and APIWindows XP Embedded power management tools and API
Task SchedulerTask Scheduler
HORM Manager (Demo application)HORM Manager (Demo application)
Ingredients:Ingredients:Windows XP Embedded runtime image Windows XP Embedded runtime image for your target devicefor your target device
Hibernation support (power management)Hibernation support (power management)
Enhanced Write Filter in RAM or RAM/Reg modeEnhanced Write Filter in RAM or RAM/Reg mode
An extra file, resmany.datAn extra file, resmany.dat
Optional things like:Optional things like:Enhanced Write Filter (EWF) Manager and APIEnhanced Write Filter (EWF) Manager and API
Windows XP Embedded power management tools and APIWindows XP Embedded power management tools and API
Task SchedulerTask Scheduler
HORM Manager (Demo application)HORM Manager (Demo application)
EWF EWF Architecture:Architecture:
Filter driverFilter driver EWF NTLDREWF NTLDR EWF EWF
ManagerManager
EWF EWF Architecture:Architecture:
Filter driverFilter driver EWF NTLDREWF NTLDR EWF EWF
ManagerManager
Enhanced Write Filter 1/2Enhanced Write Filter 1/2
DiskDisk RAMRAMProtected Protected partitionpartition Overlay partitionOverlay partition
EWF partitionEWF partitioninfoinfo
EWF Info in RegistryEWF Info in Registry
Enhanced Write Filter 2/2Enhanced Write Filter 2/2
EWF modesDisk overlay
RAM overlay
RAM/Reg overlay
EWF modesDisk overlay
RAM overlay
RAM/Reg overlay
Creating a HORM Image 1/3Creating a HORM Image 1/3
Standard imageConfigure a standard Windows XP Embedded target image as usualUsing Target Analyzer to detect hardware componentsAdd required functionality and custom applications/driversAdd system cloning component (turn off auto-reseal)
Standard imageConfigure a standard Windows XP Embedded target image as usualUsing Target Analyzer to detect hardware componentsAdd required functionality and custom applications/driversAdd system cloning component (turn off auto-reseal)
Creating a HORM Image 2/3Creating a HORM Image 2/3
Enhanced Write Filter RAM/Reg
Add enhanced Write Filter components, configure RAM or RAM/Reg mode
Add EWF NT Loader
Add RAM/Reg registry keys
Disable FBAReg.dll Resource in the EWF component
HORM
Add resmany.dat
Enable hibernation
Add Windows XP Embedded power management
Enhanced Write Filter RAM/Reg
Add enhanced Write Filter components, configure RAM or RAM/Reg mode
Add EWF NT Loader
Add RAM/Reg registry keys
Disable FBAReg.dll Resource in the EWF component
HORM
Add resmany.dat
Enable hibernation
Add Windows XP Embedded power management
Creating a HORM Image 3/3Creating a HORM Image 3/3Creating a HORM Image 3/3Creating a HORM Image 3/3
Build and deployBuild and deploy
Run FBARun FBA
Customize imageCustomize image
Reseal the systemReseal the system
HORM field configurationHORM field configuration
Turn off EWFTurn off EWF
Add Resmany.datAdd Resmany.dat
Turn on EWFTurn on EWF
Create hibernation fileCreate hibernation file
Ready to goReady to go
Build and deployBuild and deploy
Run FBARun FBA
Customize imageCustomize image
Reseal the systemReseal the system
HORM field configurationHORM field configuration
Turn off EWFTurn off EWF
Add Resmany.datAdd Resmany.dat
Turn on EWFTurn on EWF
Create hibernation fileCreate hibernation file
Ready to goReady to go
HORM ConfigurationThe necessary steps in Target Designer to enable HORM
HORM ConfigurationThe necessary steps in Target Designer to enable HORM
Application Design Application Design for HORMfor HORMApplication Design Application Design for HORMfor HORM
Making Things HarderMaking Things Harder
Having only protected volumes is the ideal world Reality check!
Mixed protected and unprotected volume configurations are quite common
Complexity to regain data consistency rises
Effects OS as well as running applications
But -> most situations can be handled!
Having only protected volumes is the ideal world Reality check!
Mixed protected and unprotected volume configurations are quite common
Complexity to regain data consistency rises
Effects OS as well as running applications
But -> most situations can be handled!
Where is My Data? 1/3Where is My Data? 1/3
Five ways for applications to persist dataRAM overlay – volatile
Data lost after reboot
Hibernation file – persistentRequires recreation of hibernation file and reboot
Data is reloaded after reboot
Data loss is possible (not fail-safe)
Protected disk - persistentRequires commit of RAM overlay and reboot
After commit new data is part of the protected volume
Data loss is possible (not fail-safe)
Five ways for applications to persist dataRAM overlay – volatile
Data lost after reboot
Hibernation file – persistentRequires recreation of hibernation file and reboot
Data is reloaded after reboot
Data loss is possible (not fail-safe)
Protected disk - persistentRequires commit of RAM overlay and reboot
After commit new data is part of the protected volume
Data loss is possible (not fail-safe)
Where is My Data? 2/3Where is My Data? 2/3Where is My Data? 2/3Where is My Data? 2/3
Unprotected disk - persistentUnprotected disk - persistentNo reboot to persist dataNo reboot to persist data
Risk of data loss is minimizedRisk of data loss is minimized
Network share - persistentNetwork share - persistentNo reboot to persist dataNo reboot to persist data
Risk of data loss is minimizedRisk of data loss is minimized
Unprotected disk - persistentUnprotected disk - persistentNo reboot to persist dataNo reboot to persist data
Risk of data loss is minimizedRisk of data loss is minimized
Network share - persistentNetwork share - persistentNo reboot to persist dataNo reboot to persist data
Risk of data loss is minimizedRisk of data loss is minimized
DiskDisk RAMRAMProtected Protected PartitionPartition
Overlay partitionOverlay partition
NetworkNetworkShareShare
Unprotected Unprotected PartitionPartition
ApplicationApplication
HiberfileHiberfile
direct writedirect write
RAMRAM
directdirectwritewrite
volatile write
volatile write
Persisted at checkpointPersisted at checkpointby application or OSby application or OS
Intermediate write
Intermediate write
Where is My Data? 3/3Where is My Data? 3/3Where is My Data? 3/3Where is My Data? 3/3
Application Design for HORM 1/2Application Design for HORM 1/2Mixed configurations of protected and
unprotected partitionsRequires data management strategies to achieve data consistency
Mount and unmount drives to keep unprotected data out of the hibernation file (see MSDN article: Dismounting Volumes in a Hibernate Once/Resume Many Configuration)
Start and Stop applications and services before hibernating
Restart applications and services after waking up
Applications (especially custom shells) ideally should be HORM enabled using the Windows XP Embedded PM and EWF APIs
Control HORM and manage Volumes
Control EWF from the application
Mixed configurations of protected and unprotected partitionsRequires data management strategies to achieve data consistency
Mount and unmount drives to keep unprotected data out of the hibernation file (see MSDN article: Dismounting Volumes in a Hibernate Once/Resume Many Configuration)
Start and Stop applications and services before hibernating
Restart applications and services after waking up
Applications (especially custom shells) ideally should be HORM enabled using the Windows XP Embedded PM and EWF APIs
Control HORM and manage Volumes
Control EWF from the application
Application Design for HORM Application Design for HORM 2/22/2Use of Network sharesUse of Network shares
Applications should use UNC names not Applications should use UNC names not drive letters to connectdrive letters to connect
Avoids security and reconnection problemsAvoids security and reconnection problemsEspecially when running headless and as services Especially when running headless and as services (no common desktop or drive letters)(no common desktop or drive letters)
Defensive programming rules should be Defensive programming rules should be applied applied
Retries if first connection attempts failRetries if first connection attempts fail
Offline capabilities often desirable (smart Offline capabilities often desirable (smart clients!)clients!)
Use of Network sharesUse of Network shares
Applications should use UNC names not Applications should use UNC names not drive letters to connectdrive letters to connect
Avoids security and reconnection problemsAvoids security and reconnection problemsEspecially when running headless and as services Especially when running headless and as services (no common desktop or drive letters)(no common desktop or drive letters)
Defensive programming rules should be Defensive programming rules should be applied applied
Retries if first connection attempts failRetries if first connection attempts fail
Offline capabilities often desirable (smart Offline capabilities often desirable (smart clients!)clients!)
EWF APIEWF APIEWF APIEWF API
Disabling/enabling EWF for a protected Disabling/enabling EWF for a protected volume volume
Restoring or discarding an overlay level Restoring or discarding an overlay level
Creating a checkpoint by adding Creating a checkpoint by adding an overlay level an overlay level
Committing the current overlay Committing the current overlay
Persisting data through a reboot Persisting data through a reboot
API files can be found at: API files can be found at:
[Program Files]\ Embedded\Installer\disk3\ewfapi [Program Files]\ Embedded\Installer\disk3\ewfapi
on your development systemon your development system
Disabling/enabling EWF for a protected Disabling/enabling EWF for a protected volume volume
Restoring or discarding an overlay level Restoring or discarding an overlay level
Creating a checkpoint by adding Creating a checkpoint by adding an overlay level an overlay level
Committing the current overlay Committing the current overlay
Persisting data through a reboot Persisting data through a reboot
API files can be found at: API files can be found at:
[Program Files]\ Embedded\Installer\disk3\ewfapi [Program Files]\ Embedded\Installer\disk3\ewfapi
on your development systemon your development system
FunctionFunction DescritionDescrition
XPE_RestartXPE_Restart Restarts the systemRestarts the system
XPE_ShutdownXPE_Shutdown Shuts system downShuts system down
XPE_StandbyXPE_Standby Enters standby mode Enters standby mode
XPE_HibernateXPE_Hibernate Hibernates the systemHibernates the system
APIAPI is located in the VALUEADD\MSFT\XPEPM folder of disk 1 is located in the VALUEADD\MSFT\XPEPM folder of disk 1 of Windows Embedded Studioof Windows Embedded Studio
The files xpepm.dll, xpepm.lib and xpepm.h are required.The files xpepm.dll, xpepm.lib and xpepm.h are required.
Console power management application gives access via Console power management application gives access via command linecommand line
APIAPI is located in the VALUEADD\MSFT\XPEPM folder of disk 1 is located in the VALUEADD\MSFT\XPEPM folder of disk 1 of Windows Embedded Studioof Windows Embedded Studio
The files xpepm.dll, xpepm.lib and xpepm.h are required.The files xpepm.dll, xpepm.lib and xpepm.h are required.
Console power management application gives access via Console power management application gives access via command linecommand line
Tip:Tip: XPE_Hibernate does not lock the desktop after waking upXPE_Hibernate does not lock the desktop after waking up Normal hibernation via Shut Down -> Hibernate does!Normal hibernation via Shut Down -> Hibernate does!
Tip:Tip: XPE_Hibernate does not lock the desktop after waking upXPE_Hibernate does not lock the desktop after waking up Normal hibernation via Shut Down -> Hibernate does!Normal hibernation via Shut Down -> Hibernate does!
Windows XP Embedded Windows XP Embedded Power ManagementPower ManagementWindows XP Embedded Windows XP Embedded Power ManagementPower Management
Data Inconsistencies in Mixed ConfigurationsUsage of EWF API and Windows XP Embedded Power Management API to Achieve Data Consistency
Data Inconsistencies in Mixed ConfigurationsUsage of EWF API and Windows XP Embedded Power Management API to Achieve Data Consistency
Maintenance Maintenance and Deploymentand DeploymentMaintenance Maintenance and Deploymentand Deployment
HORM Change Management 1/3HORM Change Management 1/3HORM Change Management 1/3HORM Change Management 1/3
ChallengesChallenges
Fighting EWF protection for maintenance Fighting EWF protection for maintenance and installationsand installations
OS as well as application updates are need OS as well as application updates are need to be consideredto be considered
Again our different ways to persist data Again our different ways to persist data in the systemin the system
On disk (persistent)On disk (persistent)
In hibernation file (persistent)In hibernation file (persistent)
In RAM overlay (volatile)In RAM overlay (volatile)
-> Need to develop a fitting strategy-> Need to develop a fitting strategy
ChallengesChallenges
Fighting EWF protection for maintenance Fighting EWF protection for maintenance and installationsand installations
OS as well as application updates are need OS as well as application updates are need to be consideredto be considered
Again our different ways to persist data Again our different ways to persist data in the systemin the system
On disk (persistent)On disk (persistent)
In hibernation file (persistent)In hibernation file (persistent)
In RAM overlay (volatile)In RAM overlay (volatile)
-> Need to develop a fitting strategy-> Need to develop a fitting strategy
HORM Change Management 2/3HORM Change Management 2/3HORM Change Management 2/3HORM Change Management 2/3
Best practicesBest practicesUse a maintenance window to apply updatesUse a maintenance window to apply updates
Integration into enterprise change management Integration into enterprise change management systems is desirablesystems is desirable
SMS ServerSMS Server
WSUS (OS patches only!)WSUS (OS patches only!)
Third-party solutions, such as Tivoli (client componentization Third-party solutions, such as Tivoli (client componentization issues)issues)
Virus and malware scanners (client componentization issues)Virus and malware scanners (client componentization issues)
Embedded and customized solutionsEmbedded and customized solutionsAutomated field deployment using scripts and RUN registry Automated field deployment using scripts and RUN registry keys. (Do not forget to seal your devices!)keys. (Do not forget to seal your devices!)
Device Update AgentDevice Update Agent
Roll your own update solutionRoll your own update solution
Plan for high availability and robustnessPlan for high availability and robustness
Best practicesBest practicesUse a maintenance window to apply updatesUse a maintenance window to apply updates
Integration into enterprise change management Integration into enterprise change management systems is desirablesystems is desirable
SMS ServerSMS Server
WSUS (OS patches only!)WSUS (OS patches only!)
Third-party solutions, such as Tivoli (client componentization Third-party solutions, such as Tivoli (client componentization issues)issues)
Virus and malware scanners (client componentization issues)Virus and malware scanners (client componentization issues)
Embedded and customized solutionsEmbedded and customized solutionsAutomated field deployment using scripts and RUN registry Automated field deployment using scripts and RUN registry keys. (Do not forget to seal your devices!)keys. (Do not forget to seal your devices!)
Device Update AgentDevice Update Agent
Roll your own update solutionRoll your own update solution
Plan for high availability and robustnessPlan for high availability and robustness
HORM Change Management 3/3HORM Change Management 3/3HORM Change Management 3/3HORM Change Management 3/3
All approaches adhere to two basic All approaches adhere to two basic scenariosscenariosTurn off HORM/EWF and update (fail-safe)Turn off HORM/EWF and update (fail-safe)
Updates are applied and persisted directly to diskUpdates are applied and persisted directly to disk
Update live and commit (dangerous)Update live and commit (dangerous)Updates are applied in memory overlay and then persisted to Updates are applied in memory overlay and then persisted to diskdisk
Danger of overflowing the RAM overlay!Danger of overflowing the RAM overlay!
Things to keep in mindThings to keep in mind
Recreate the hibernation file after successful update Recreate the hibernation file after successful update to re-enable HORMto re-enable HORM
Applying XP Pro patches will grow Your image (CF card - Applying XP Pro patches will grow Your image (CF card - size!)size!)
-> Having an OS deployment strategy at hand is very useful-> Having an OS deployment strategy at hand is very useful
All approaches adhere to two basic All approaches adhere to two basic scenariosscenariosTurn off HORM/EWF and update (fail-safe)Turn off HORM/EWF and update (fail-safe)
Updates are applied and persisted directly to diskUpdates are applied and persisted directly to disk
Update live and commit (dangerous)Update live and commit (dangerous)Updates are applied in memory overlay and then persisted to Updates are applied in memory overlay and then persisted to diskdisk
Danger of overflowing the RAM overlay!Danger of overflowing the RAM overlay!
Things to keep in mindThings to keep in mind
Recreate the hibernation file after successful update Recreate the hibernation file after successful update to re-enable HORMto re-enable HORM
Applying XP Pro patches will grow Your image (CF card - Applying XP Pro patches will grow Your image (CF card - size!)size!)
-> Having an OS deployment strategy at hand is very useful-> Having an OS deployment strategy at hand is very useful
OS DeploymentOS DeploymentOS DeploymentOS Deployment
Basically all Windows XP Embedded Basically all Windows XP Embedded deployment options are possible deployment options are possible
Cloning / Windows PE Deployment (CD/DVD)Cloning / Windows PE Deployment (CD/DVD)-> Think about sealing issues! -> Think about sealing issues! Seal with EWF turned off!Seal with EWF turned off!
PXE / RISPXE / RIS
Challenges:Challenges:Manual or automated field configuration Manual or automated field configuration of EWF / HORM requiredof EWF / HORM required
Console applications for EWF and Windows XP Console applications for EWF and Windows XP Embedded PM can be used in batch filesEmbedded PM can be used in batch files
Use “Run”-registry keys to start scriptsUse “Run”-registry keys to start scripts
Basically all Windows XP Embedded Basically all Windows XP Embedded deployment options are possible deployment options are possible
Cloning / Windows PE Deployment (CD/DVD)Cloning / Windows PE Deployment (CD/DVD)-> Think about sealing issues! -> Think about sealing issues! Seal with EWF turned off!Seal with EWF turned off!
PXE / RISPXE / RIS
Challenges:Challenges:Manual or automated field configuration Manual or automated field configuration of EWF / HORM requiredof EWF / HORM required
Console applications for EWF and Windows XP Console applications for EWF and Windows XP Embedded PM can be used in batch filesEmbedded PM can be used in batch files
Use “Run”-registry keys to start scriptsUse “Run”-registry keys to start scripts
ChecklistChecklist
Enable hibernation support in the Windows XP Embedded imageEWF must be activeHiberfile must be created once with EWF turned off!Resmany.dat needs to be existingBe aware that committing EWF turns off HORM! (Hiberfile must be recreated)
Enable hibernation support in the Windows XP Embedded imageEWF must be activeHiberfile must be created once with EWF turned off!Resmany.dat needs to be existingBe aware that committing EWF turns off HORM! (Hiberfile must be recreated)
Avoiding Common PitfallsAvoiding Common Pitfalls
HORM is notnot working on diskless systemsEl Torito CD boot
Network RAM Boot
Reason: The hiberfile is a dedicated system resource that cannot be shared between different systems
Changing HW configurationTake care with plugging in/out peripherals, especially when using custom shells
Starting applicationsRun entries work most reliably if persisted into the protected volume
HORM is notnot working on diskless systemsEl Torito CD boot
Network RAM Boot
Reason: The hiberfile is a dedicated system resource that cannot be shared between different systems
Changing HW configurationTake care with plugging in/out peripherals, especially when using custom shells
Starting applicationsRun entries work most reliably if persisted into the protected volume
Tuning Boot TimeTuning Boot Time
Use fast boot devices such as HD or flash disk. Normal CF cards are slow.Limit the hiberfile by using just the system memory required. Reading a 2GB hiberfile will never be fast!Use the BootVis utility to profile and optimize your Windows XP Embedded system for fast boot in factory (before sealing the image)Be aware that network timeouts of not connected NICs can slow boot time significantly. (Disable them if not used.)
Use fast boot devices such as HD or flash disk. Normal CF cards are slow.Limit the hiberfile by using just the system memory required. Reading a 2GB hiberfile will never be fast!Use the BootVis utility to profile and optimize your Windows XP Embedded system for fast boot in factory (before sealing the image)Be aware that network timeouts of not connected NICs can slow boot time significantly. (Disable them if not used.)
Known IssuesKnown Issues
Overflow of RAM overlay message:Windows: Delayed Write Failed. Windows was unable to save all data for the file. The data has been lost. This error may be caused by a failure of your computer hardware or network connection.
Counter measures:In the Enhanced Write Filter component in your configuration, on the EWF Configuration Setting tab, click the Use Less Overlay Space and less Writes check box
Rule out any unnecessary disk I/O (especially write requests). NTFS is a good candidate!
Make sure that the disk defragmenting tool is not running in
the background
Overflow of RAM overlay message:Windows: Delayed Write Failed. Windows was unable to save all data for the file. The data has been lost. This error may be caused by a failure of your computer hardware or network connection.
Counter measures:In the Enhanced Write Filter component in your configuration, on the EWF Configuration Setting tab, click the Use Less Overlay Space and less Writes check box
Rule out any unnecessary disk I/O (especially write requests). NTFS is a good candidate!
Make sure that the disk defragmenting tool is not running in
the background
SummarySummarySummarySummary
HORM is able to add significant value to a HORM is able to add significant value to a Windows XP Embedded systemWindows XP Embedded system
Fast boot timesFast boot times
RobustnessRobustness
High availabilityHigh availability
It does not come for freeIt does not come for freeHigher complexity keeping data consistentHigher complexity keeping data consistent
Higher deployment and change management effortsHigher deployment and change management efforts
Application design considerations using mixed Application design considerations using mixed configurationsconfigurations
But, you can make it if you try! But, you can make it if you try!
HORM is able to add significant value to a HORM is able to add significant value to a Windows XP Embedded systemWindows XP Embedded system
Fast boot timesFast boot times
RobustnessRobustness
High availabilityHigh availability
It does not come for freeIt does not come for freeHigher complexity keeping data consistentHigher complexity keeping data consistent
Higher deployment and change management effortsHigher deployment and change management efforts
Application design considerations using mixed Application design considerations using mixed configurationsconfigurations
But, you can make it if you try! But, you can make it if you try!
Stop by the MED Content Publishing Team Station in the Microsoft Pavilion or visit the MED Content Publishing Team Wiki site:http://msdn.microsoft.com/mobility/wiki
ResourcesResources
Need developer resources on this subject? Need developer resources on this subject?
Alexander Wechsler
© 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it
should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.