[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

FRS how it works

Posted on 2011-03-08
2
Medium Priority
?
636 Views
Last Modified: 2012-05-11
Hi all

I need information about how FRS works, there is a technect article talking about that, but I need more kind of friendly explanation of how it works, I couldnt find any good article (human readable) on internet about that.

For example, since the user opens the file, what is all the cycle till the file is replicated, the file is opened, the USN journal is written, the file goes to the staging folder, then to the prestage, etc etc.. this kind of explanation.. I need to know all the cycle and how it works from start to finish.

Any help is much appreciated
Thanks very much.
0
Comment
Question by:M7K
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 21

Accepted Solution

by:
snusgubben earned 2000 total points
ID: 35068550
Have you seen this article. It explains the most of it?

http://technet.microsoft.com/en-us/library/cc758169(WS.10).aspx

0
 

Author Comment

by:M7K
ID: 35068596
I just realized that everything is there.. thanks mate!
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
A hard and fast method for reducing Active Directory Administrators members.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…
Suggested Courses

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question