Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are the AD database types and its flow?

Answer Posted / siddhartha rath

The Active Directory creates and stores four types of log
files on the maintenance and management of transactions.
These files are stored in %system/NTDS and include

•Transaction log files. The current transaction file is
Edb.log, which by default contains information about recent
transactions and is limited to 10MB. When this limit is
reached, transaction files are automatically created with
the name edbxxxxx.log (where x is a sequential number).
They are retained until the transactions are committed to
the Active Directory. Once every 12 hours, old previous
transaction files are purged during a process known as
garbage collection. If you do not want previous transaction
files created, it is possible to set circular logging, in
which the current file is overridden when it is filled.
This action is not recommended because it could limit your
ability to recover recent transactions.

•Checkpoint files. The checkpoint is Edb.chk, and it is
used to list transactions that have been committed to the
Active Directory and those that remain uncommitted. Each
time a transaction is committed, it advances to the next
entry. If all transactions are not committed at the time of
shutdown, the checkpoint file is read when the system is
rebooted, and all remaining transactions are then committed
to the Active Directory.

•Reserved log files. The reserved log file can be a number
sequence of logs, with a maximum size of 10MB, named
res1.log, res2.log, and so on. These logs are used in place
of the transaction log when the creation of a new log file
is attempted, but insufficient disk space is available.
When this occurs, the system will automatically shut down.

•Patch files. Patch files (with a .pat suffix) are used
during the backup-and-restore process of the Active
Directory. Database entries are sometimes divided during
backup into what is known as split transactions. The patch
files are used to record these splits, and "patch" the
transaction back together during restoration.

Is This Answer Correct ?    9 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How do I get rid of presentationfontcache exe?

865


What is the full meaning of gui?

863


How do I make a bootable usb drive for windows?

838


How do I run regsvr32 on windows 7?

789


Will chkdsk r erase data?

831


What is the order of windows operating systems?

821


How do I add tabs to internet explorer in chrome?

865


What are the disadvantages of windows?

911


How to remove tsrs and startup programs?

1108


How do I register a dll in windows 7?

759


How do I replace a system32 file?

822


How to de fragment your hard drive in windows xp?

946


What is window and its features?

834


Is svchost exe safe?

836


Does windows 7 have powershell?

859