You are on page 1of 4

20-2-2018 Mapa Conceptual

Mirroring
Integrantes:
Malfavón Alvarez Leonardo Berti
Rubio Solís Jonathan Jesús
Reporte
Docente: M.E. Suzel Rivera González

Grupo: 6°A ISC

Uruapan Michoacán
Introduction.
Many times, the security most important for the users, customers might lost it. We are
talking about of the information of Data Base, in where the information is important
and cannot lost it for the people who use this system. However, sometimes it is
impossible to guard the information.

For that, exists one tool for be careful the information in case of the information is lost.
This tool is called “Mirroring”

This project show through a conceptual map the characteristics and principal terms to
understand the “Mirroring” and for to know use it.
Conceptual Map.

Database mirroring is the The purpose is to ensure


creation and maintenance continuous data availability and
of redundant copies of a minimize or avoid downtime
database

Database mirroring is used by Database mirroring requires that


Microsoft SQL Server, a relational the mirror server instance always
database management system stay current; in other words
(RDBMS) designed for the enterprise
environment

MIRRORING
Two copies of a single The system must immediately
database reside on different copy every change in the
computers called server principal's content to the mirror
instances, usually in physical and vice-versa.
locations separated by some
distance.

The mirror (or


The principal (or primary) While database mirroring can also secondary) server
work when the content is not fully instance acts as a
server instance provides the
synchronized, some data loss may standby that can take
database to clients.
occur if one of the server instances over in case of a
fails or becomes inaccessible. In this problem with the
mode, called asynchronous principal server
operation, the mirror is called a instance.
warm standby.
Conclusion.
Well, it is concluded that one of the tools for security offered by the Database, is the
"Mirroring". That this tool allows the information of the entity or user to be safeguarded
in a satisfactory manner, since it provides a very advanced security for the loss of
information, as long as we have it well managed and executed. Thanks to this security
through the Database, there will be no worries about the information.

You might also like