Solved

LCR CONFIGURATION

Posted on 2011-02-22
5
474 Views
Last Modified: 2012-05-11
What is LCR configuration. What is mounting why is it done? What is difference between normal volume and mount volume.
0
Comment
Question by:kunalclk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
5 Comments
 
LVL 7

Accepted Solution

by:
viveksahu earned 167 total points
ID: 34957832
0
 
LVL 31

Assisted Solution

by:MegaNuk3
MegaNuk3 earned 333 total points
ID: 34958714
When you say "mounting" in what context are you referring to this? Mounting can mean to bring a database up and online so it is accessible.

A mount point is basically a shortcut to another volume without assigning a drive letter, these are useful if you are running out of drive letters or want to use minimal drive letters. More info http://en.wikipedia.org/wiki/Volume_Mount_Point
0
 
LVL 31

Assisted Solution

by:MegaNuk3
MegaNuk3 earned 333 total points
ID: 34958731
LCR is basically a local copy of a Storage Group and any databases therein. This copy is kept continuously up to date by replication of log files from the source.
0
 
LVL 2

Author Closing Comment

by:kunalclk
ID: 34962943
tnx i
0
 
LVL 31

Expert Comment

by:MegaNuk3
ID: 34963230
No problem
0

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will help to fix the below error for MS Exchange server 2010 I. Out Of office not working II. Certificate error "name on the security certificate is invalid or does not match the name of the site" III. Make Internal URLs and External…
If you troubleshoot Outlook for clients, you may want to know a bit more about the OST file before doing your next job. IMAP can cause a lot of drama if removed in the accounts without backing up.
The basic steps you have just learned will be implemented in this video. The basic steps are shown to configure an Exchange DAG in a live working Exchange Server Environment and manage the same (Exchange Server 2010 Software is used in a Windows Ser…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

687 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question