RDF System Management Manual for H-Series and J-Series RVUs (RDF 1.9)
NETWORKMASTER Attribute.....................................................................................................296
Network Configuration Record.....................................................................................................296
PRIMARYSYSTEM Network Attribute....................................................................................296
BACKUPSYSTEM Network Attribute.....................................................................................296
REMOTECONTROLSUBVOL (RCSV) Network Attribute.....................................................297
PNETTXVOLUME Network Attribute....................................................................................297
Adding the Network Record....................................................................................................297
RDF Network Synchronizer (RDFNET) Process...........................................................................297
RDF Network Control Files................................................................................................................297
Normal RDF Processing Within a Network Environment.................................................................297
RDF Takeovers Within a Network Environment................................................................................298
Takeover Phase 1 – Local Undo.....................................................................................................298
Takeover Phase 2 – File Undo........................................................................................................298
Takeover Phase 3 – Network Undo...............................................................................................298
Takeover Phase 3 Performance......................................................................................................299
Communication Failures During Phase 3 Takeover Processing....................................................299
Takeover Delays and Purger Restarts............................................................................................299
Takeover Restartability..................................................................................................................299
Takeover and File Recovery...........................................................................................................300
The Effects of Undoing Network Transactions..............................................................................300
Takeover and the RETAINCOUNT Value.....................................................................................302
Network Configurations and Shared Access NonStop SQL/MP DDL Operations............................303
Network Validation and Considerations............................................................................................303
RDF Reinitialization in a Network Environment...............................................................................303
Network Master Subsystem Initialization.....................................................................................303
Non-Network Master Subsystem Initialization............................................................................303
RDF Networks and ABORT or STOP RDF Operations......................................................................304
RDF Networks and Stop-Update-to-Time Operations.......................................................................304
Sample Configurations.......................................................................................................................305
Sample Network Master Configuration........................................................................................305
Sample Non-Network Master Configuration................................................................................306
RDFCOM STATUS Display.................................................................................................................307
15 Process-Lockstep Operation....................................................................................309
Starting a Lockstep Operation............................................................................................................309
The DoLockstep Procedure.................................................................................................................310
Including the DoLockstep in COBOL85 Applications..................................................................310
Invoking DoLockStep by Way of TAL...........................................................................................310
DoLockStep Execution...................................................................................................................310
The Lockstep Transaction....................................................................................................................311
RDF Lockstep File...............................................................................................................................311
Multiple Concurrent Lockstep Operations.........................................................................................312
Lockstep and Auxiliary Audit Trails..................................................................................................312
The Lockstep Gateway Process...........................................................................................................312
NAME............................................................................................................................................312
PROGRAM....................................................................................................................................312
STARTUPMSG...............................................................................................................................313
AUTORESTART.............................................................................................................................313
Disabling Lockstep..............................................................................................................................313
Reenabling Lockstep...........................................................................................................................313
Lockstep Performance Ramifications..................................................................................................313
Lockstep and Auxiliary Audit Trails..................................................................................................314
Lockstep and Network Transactions...................................................................................................314
Lockstep Gateway Event Messages....................................................................................................314
16 Table of Contents










