Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Named Pipes, TCPIP, Shared Memory, etc for SQL Server

Posted on 2011-02-15
2
Medium Priority
?
769 Views
Last Modified: 2012-05-11
Can someone please explain the differences regarding the various connection methods available for SQL Server (2005 and 2008 specifically)

I've seen the Wikipedia stuff, so please no links to content of that nature

I'm more interested in things like why I should choose one method over another, for exampe - or are there any drawbacks to enabling ALL of them, etc etc. What are the advantages/disadvantages of doing these things?



0
Comment
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 15

Accepted Solution

by:
mattisflones earned 2000 total points
ID: 34896098
There are no advantages/disadvantages other than the obvious ones.. TCP/IP can be accessible to the public with all the security concerns that brings, can be impacted by LAN performance and so on.. Shared memory is for internal use, and so on.. Just different protocolls and surfaces.

And as with everything else, enable only what you will use.


I find this short article to be "all you need...", atleast for the basics of choosing.

http://msdn.microsoft.com/en-us/library/ms187892.aspx
0
 
LVL 85
ID: 34915513
Thanks. That article did explain the basics of the various technologies, and I'll look further to find details as needed.
0

Featured Post

Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What if you have to shut down the entire Citrix infrastructure for hardware maintenance, software upgrades or "the unknown"? I developed this plan for "the unknown" and hope that it helps you as well. This article explains how to properly shut down …
What we learned in Webroot's webinar on multi-vector protection.
Viewers will learn how to use the SELECT statement in SQL to return specific rows and columns, with various degrees of sorting and limits in place.
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…

596 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question