Flylib.com
List of Tables
Previous page
Table of content
Chapter 1: Preparing for High Availability
Table 1-1: Nines Calculations (Per Year), in Descending Order
Chapter 3: Making a High Availability Technology Choice
Table 3-1: Cluster Nodes Supported Per Operating System
Table 3-2: SQL Server Node Support per Version
Table 3-3: SQL Server Availability Technology Comparison Table
Chapter 4: Disk Configuration for High Availability
Table 4-1: CustomerInfo Table
Table 4-2: Performance Counters
Table 4-3: Databases Used by Sample Application
Table 4-4: Breakdown of File Sizes
Table 4-5: Available Raw Drive Space
Table 4-6: Sample 1
Table 4-7: Sample 2
Table 4-8: Sample 3
Table 4-9: Sample 4
Table 4-10: Sample 5
Chapter 5: Designing Highly Available Microsoft Windows Servers
Table 5-1: Memory and Processors Supported per Operating System
Table 5-2: Numbers of Nodes and Failure Tolerance in a Majority Node Set Cluster
Table 5-3: Supported Deviations from Windows Catalog
Chapter 6: Microsoft SQL Server 2000 Failover Clustering
Table 6-1: Virtual Server Names on a Single Server Cluster
Table 6-2: Number of Nodes Available
Table 6-3: SQL Server Service Account Privileges Needed
Chapter 7: Log Shipping
Table 7-1: Table Usage for Log Shipping
Table 7-2: Log Shipping Parameters and Recommended Values
Chapter 8: Replication
Table 8-1: Agents Per Model of Replication
Table 8-2: File Types Associated with Replication
Table 8-3: Disk Requirements for Replication
Table 8-4: Replication Disaster Recovery Scenarios
Chapter 9: Database Environment Basics for Recovery
Table 9-1: SQL Server 2000 Recovery Models
Table 9-2: SELECT INTO Operation
Table 9-3: UPDATE Operation
Table 9-4: Changing Recovery Models and Impact on Backups
Table 9-5: Backup Naming Conventions
Chapter 10: Implementing Backup and Restore
Table 10-1: Example Output
Table 10-2: Output Returned for All of the Backups
Chapter 11: Real-World High Availability Solutions
Table 11-1: Planning the Disk Subsystem
Table 11-2: New Server Configuration
Chapter 12: Disaster Recovery Techniques for Microsoft SQL Server
Table 12-1: Databases
Table 12-2: Database Dependencies and Impact on Solution Availability
Chapter 14: Administrative Tasks for High Availability
Table 14-1: Routine Maintenance Commands
Table 14-2: Medium Impact Commands
Table 14-3: Intrusive Maintenance Commands
Table 14-4: Memory Supported for 32-Bit Versions of Windows with PAE
Table 14-5: Memory Supported for 64-bit Versions of Windows (No Boot.ini Modifications Necessary)
Table 14-6: Memory Recommendations for a 32-Bit SQL Server 2000 Instance
Chapter 15: Monitoring for High Availability
Table 15-1: What Do You Want to Know Now?
Table 15-2: What Do You Want to Know Later?
Table 15-3: Monitoring Tools for System Layers
Table 15-4: Sample Reports
Table 15-5: Availability by Function
Table 15-6: Sysperfinfo Table Contents
Previous page
Table of content
Microsoft SQL Server 2000 High Availability
ISBN: 0735619204
EAN: 2147483647
Year: 2006
Pages: 137
Authors:
Allan Hirt
,
Cathan Cook
,
Kimberly Tripp
,
Frank McBath
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Message Digests, MACs, and HMACs
Asymmetric Key Cryptography
Object Description in Cryptography Using ASN.1
Appendix A Solutions to Exercises
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Developing a Kanban Design
Appendix C Two-Bin Kanban Systems
Appendix D Organizational Changes Required for Kanban
Appendix E EOQ vs. Kanban
Appendix H Case Study 1: Motor Plant Casting Kanban
Snort Cookbook
Invisibly Tapping a Hub
Logging to a CSV File
Logging to a Specific File
Generating Statistical Output from Snort Databases
Writing Output Plug-ins
C++ GUI Programming with Qt 3
Loading and Saving
Basic Layouts
Reimplementing Event Handlers
Graphics with OpenGL
Networking
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Microsoft Client Library for AJAX
The Pulsing Heart of ASP.NET AJAX
Partial Page Rendering
Building AJAX Applications with ASP.NET
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Virtual Private Networks
Understanding Address Translation
Summary
Computer Telephony Interface Quick Buffer Encoding Inspection
Initial Setup
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies