Solved

sql server 2012 -Named Pipes Protocol

Posted on 2013-11-12
3
446 Views
Last Modified: 2013-11-27
Hi experts,

i am reading about Named Pipes Protocol but it is not clear
it is?
it for?
when to use it?
0
Comment
Question by:enrique_aeo
3 Comments
 
LVL 82

Accepted Solution

by:
Dave Baldwin earned 200 total points
ID: 39643535
Here's the Microsoft page on the subject: http://msdn.microsoft.com/en-us/library/windows/desktop/aa365590%28v=vs.85%29.aspx  In simple terms, it's just another method of communicating.  It would be used, for example, between an SQL client and an SQL server.  I have never used it and I don't know where it would be commonly used.
0
 
LVL 10

Expert Comment

by:PadawanDBA
ID: 39643699
The available methods for establishing connectivity with a SQL Server instance via the SNI (SQL Server Network Interface) are: Shared memory (this is the default method for connections originating on the same host as the SQL Server instance), TCP/IP (this is the most commonly used access method for SQL Server, access via IP address/port), Named pipes, and VIA (will be removed from future release of SQL Server).

Named pipes is a protocol that is comparable to TCP/IP.  Named Pipes was developed for LANs, but can be inefficient over WANs.  If you desire to use it, you will need to enable it in the SQL Server Configuration Manager and then create a SQL Server Alias that connects to the server using Named Pipes as the protocol.  Named Pipes utilize TCP Port 445.

Regardless of what protocol used to establish your connection, the SNI will create a secure connection to a TDS (tabular data stream) endpoint, to which you will send requests and from which you will receive data.  The protocol merely determines how you establish your connection with the TDS endpoint (there is one per protocol + 1 for the DAC)
0
 
LVL 3

Expert Comment

by:Sagir87
ID: 39644468
Hi,

Please refer these link for information:

http://technet.microsoft.com/en-us/library/aa178138(v=sql.80).aspx

Also refer for more information about named pipe protocol:

1. Configure a Server to Listen on an Alternate Pipe (SQL Server Configuration Manager):

http://technet.microsoft.com/en-us/library/ms189321.aspx

2. Creating a Valid Connection String Using Named Pipes

http://technet.microsoft.com/en-us/library/ms189307(v=sql.105).aspx
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

I have written a PowerShell script to "walk" the security structure of each SQL instance to find:         Each Login (Windows or SQL)             * Its Server Roles             * Every database to which the login is mapped             * The associated "Database User" for this …
Naughty Me. While I was changing the database name from DB1 to DB_PROD1 (yep it's not real database name ^v^), I changed the database name and notified my application fellows that I did it. They turn on the application, and everything is working. A …
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now