Solved

SSAS 2005/2008 and WAN impact best practices

Posted on 2013-01-08
2
238 Views
Last Modified: 2016-02-18
I have a situation where our SSAS database/cubes are in one data center in MN and the proposed web app front end (OBIEE) will be in another data center in Boston.  Will this architecture perform successfully with data going over the WAN for queries or do we need to have the SSAS database/cubes in the same data center as the web app front end, so both the SSAS database/cubes and the web app front end (OBIEE) are in Boston?  Along with answering this question, please point me to some documentation to support the solution.
0
Comment
Question by:351c
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 28

Accepted Solution

by:
Ryan McCauley earned 500 total points
ID: 38768908
SSAS queries and result sets are generally pretty lightweight, but as with all things, the answer is "it depends". What kind of data are you going to be querying? How large will the result sets be? How often will you be executing queries (several times per second or several per minute)?

I wouldn't be concerned with a that configuration in principle, but I'd want to ensure that it's low-latency and that the pipe is large enough to handle your query needs. As a rough estimate, why not execute the query in SSMS and write the results to an RPT file, then check the size on disk? That's not exact for a number of reasons, but it's at least an estimate of the kind of volume you're looking at. Also, can you use SSMS to test performance of the remote server in general? If you're on Boston (or can run some kind of query tool on the Boston server's desktop), that's going to give you some pretty precise idea of the kind of lag you're looking at.
0
 

Author Closing Comment

by:351c
ID: 39021601
thank you
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I've encountered valid database schemas that do not have a primary key.  For example, I use LogParser from Microsoft to push IIS logs into a SQL database table for processing and analysis.  However, occasionally due to user error or a scheduled task…
In SQL Server, when rows are selected from a table, does it retrieve data in the order in which it is inserted?  Many believe this is the case. Let us try to examine for ourselves with an example. To get started, use the following script, wh…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…

631 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question