Solved

High-safety vs High-performance regarding instant reflection

Posted on 2011-09-09
3
365 Views
Last Modified: 2012-05-12
I was reading for the SQL 2008 administrator certification and there is a question wither synhronous(high-safety) or asynchnronous(high-performance) mirroring reflects changes to the mirror server instantly. I would think that asynchronous transfer would be the fastest, but the stated correct answer to the question says otherwise.
0
Comment
Question by:itnifl
3 Comments
 
LVL 17

Accepted Solution

by:
Kent Dyer earned 250 total points
ID: 36515396
It really winds up being a preference for the office you are working in.

Probably a good rule of thumb is that would grow, this can change.

Couple of great sites of performance issues:

http://sqlfoool.com
http://brentozar.com

HTH,

Kent
0
 
LVL 2

Author Comment

by:itnifl
ID: 36516048
Does asynchronous or synchronous mode synchronize faster to the mirror server?
0
 
LVL 23

Assisted Solution

by:Racim BOUDJAKDJI
Racim BOUDJAKDJI earned 250 total points
ID: 36516709
Asynchronous vs synchronous mirroring has nothing to do with mirroring effectiveness or speed.  Asynchronous mirroring simply decorellates the mirroring operation from the source operation updating the records on the principal.  Speed of mirroring, any mirroring depends primarily on network throughput and mirror transactional throughput.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Why is this different from all of the other step by step guides?  Because I make a living as a DBA and not as a writer and I lived through this experience. Defining the name: When I talk to people they say different names on this subject stuff l…
A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
Via a live example, show how to extract information from SQL Server on Database, Connection and Server properties
Via a live example, show how to backup a database, simulate a failure backup the tail of the database transaction log and perform the restore.

713 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question