RDF System Management Manual for H-Series RVUs (RDF 1.8)

Figure 1-1 Basic RDF Configuration
In Figure 1-1, there are 20 audited volumes on the primary system ($D1 through $D20). Only
volumes $D1 through $D15, however, are configured for RDF protection.
Audit information for volumes $D1 through $D10 and $D16 through $D20 is sent to the master
audit trail (MAT). The RDF master extractor process reads the MAT and sends audit information
associated with volumes $D1 through $D10 to the RDF master receiver process on the backup
system.
Audit information for volumes $D11 through $D15 is sent to the auxiliary audit trail. The RDF
auxiliary extractor process reads the auxiliary audit trail and sends audit information associated
with volumes $D11 through $D15 to the RDF auxiliary receiver process on the backup system.
The master receiver writes transaction status information to the master image trail. In this example,
each receiver process writes all audit information to a single secondary image trail. As will be
discussed later, however, either could write to multiple sorted image trails.
Updater processes $UP1 through $UP10 read audit information from the secondary image trail
and apply it to volumes $D1 through $D10, respectively, on the backup system. For example,
updater process $UP1 only looks for audit information for tables and files associated with volume
$D1 on the primary system (ignoring any for volumes $D2 through $D10), and applies that
information to the corresponding tables and files on $D1 on the backup system.
Updater processes $UP11 through $UP15 read audit information from the AUX01 secondary
image trail and apply it to volumes $D11 through $D15, respectively, on the backup system.
As mentioned earlier, the RDFCOM process on the primary system provides the user interface
for issuing RDF commands. The RDF monitor process executes most user commands, and
monitors all other RDF processes.
RDF Subsystem Overview 37