Solved

ODBC Based SQL query appears to be "throttled"

Posted on 2004-08-28
2
250 Views
Last Modified: 2010-03-18
I'm pulling my hair out on this one...

I keep a Delphi 7 development at a client's site.  I have a SQL query tool  that  built in Delphi, using ODBC connection to Sybase and MS SQL.  It has worked flawlessly for years.

Just recently it is acting very weird - a query run with this program on the  D7 PC takes 40+ seconds (run against Sybase AND mssql, both slow).  Run using the same tool on any other PC and the query takes about 1/3 of a second...

If I copy the tool from the "bad" PC to a network drive, and run the tool from the shared drive on any other PC it works great (so it isn't the code).  I did a ghost of the  D7 PC, and applied it to a second PC (100% same hardware) - it still goes slow - so evidently not NIC or hardware related.

One thing - I installed "skype" (internet phone software) about two weeks ago.  I know skype throttles tcp/ip bandwidth usage for its own connections - maybe something bad went wrong there?  I uninstalled skype (and dug into registry to find pieces it didn't uninstall). I also ran Norton WinDoctor and cleaned up some old registry anomalies.

It still runs slow...

I need some suggestions of what to look for next - I'm stumped.  


Cheers,
EdB
0
Comment
Question by:edbored
2 Comments
 
LVL 1

Author Comment

by:edbored
Comment Utility
Solved it.

I posted here because I suspected it was a network problem. Turns out a new SQL monitoring tool I installed turned on ODBC SQL Tracing behind the scenes. For some reason, it didn't restore the setting to stop logging when the SQL tool was closed (bad sql tool, bad!).

At any rate, every fetch from the sql engine was being logged - and THAT was taking 15 times as long as the normal SQL query...

Cheers,
EdB
0
 

Accepted Solution

by:
PashaMod earned 0 total points
Comment Utility
Closed, 500 points refunded.
PashaMod
Community Support Moderator
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

This article is in response to a question (http://www.experts-exchange.com/Networking/Network_Management/Network_Analysis/Q_28230497.html) here at Experts Exchange. The Original Poster (OP) requires a utility that will accept a list of IP addresses …
Resolve DNS query failed errors for Exchange
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now