?
Solved

LCR CONFIGURATION

Posted on 2011-02-22
5
Medium Priority
?
475 Views
Last Modified: 2012-05-11
What is LCR configuration. What is mounting why is it done? What is difference between normal volume and mount volume.
0
Comment
Question by:kunalclk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
5 Comments
 
LVL 7

Accepted Solution

by:
viveksahu earned 668 total points
ID: 34957832
0
 
LVL 31

Assisted Solution

by:MegaNuk3
MegaNuk3 earned 1332 total points
ID: 34958714
When you say "mounting" in what context are you referring to this? Mounting can mean to bring a database up and online so it is accessible.

A mount point is basically a shortcut to another volume without assigning a drive letter, these are useful if you are running out of drive letters or want to use minimal drive letters. More info http://en.wikipedia.org/wiki/Volume_Mount_Point
0
 
LVL 31

Assisted Solution

by:MegaNuk3
MegaNuk3 earned 1332 total points
ID: 34958731
LCR is basically a local copy of a Storage Group and any databases therein. This copy is kept continuously up to date by replication of log files from the source.
0
 
LVL 2

Author Closing Comment

by:kunalclk
ID: 34962943
tnx i
0
 
LVL 31

Expert Comment

by:MegaNuk3
ID: 34963230
No problem
0

Featured Post

Is Your AD Toolbox Looking More Like a Toybox?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…
how to add IIS SMTP to handle application/Scanner relays into office 365.
Suggested Courses
Course of the Month14 days, 20 hours left to enroll

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question