Solved

LCR CONFIGURATION

Posted on 2011-02-22
5
470 Views
Last Modified: 2012-05-11
What is LCR configuration. What is mounting why is it done? What is difference between normal volume and mount volume.
0
Comment
Question by:kunalclk
  • 3
5 Comments
 
LVL 7

Accepted Solution

by:
viveksahu earned 167 total points
ID: 34957832
0
 
LVL 31

Assisted Solution

by:MegaNuk3
MegaNuk3 earned 333 total points
ID: 34958714
When you say "mounting" in what context are you referring to this? Mounting can mean to bring a database up and online so it is accessible.

A mount point is basically a shortcut to another volume without assigning a drive letter, these are useful if you are running out of drive letters or want to use minimal drive letters. More info http://en.wikipedia.org/wiki/Volume_Mount_Point
0
 
LVL 31

Assisted Solution

by:MegaNuk3
MegaNuk3 earned 333 total points
ID: 34958731
LCR is basically a local copy of a Storage Group and any databases therein. This copy is kept continuously up to date by replication of log files from the source.
0
 
LVL 2

Author Closing Comment

by:kunalclk
ID: 34962943
tnx i
0
 
LVL 31

Expert Comment

by:MegaNuk3
ID: 34963230
No problem
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Read this checklist to learn more about the 15 things you should never include in an email signature.
This article runs through the process of deploying a single EXE application selectively to a group of user.
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question