RDF System Management Manual

Table Of Contents
Preparing the RDF Environment
HP NonStop RDF System Management Manual524388-003
2-9
Specifying System Generation Parameters for an
RDF Environment
Views on the Backup System
If an application uses any NonStop SQL/MP or NonStop SQL/MX shorthand or
protection views on a volume protected by RDF, audit data for transactions on the
views refers only to the underlying tables and not to the views. Views and their
underlying base tables must be present on the backup system after a takeover
operation so that applications can continue without interruption.
All base tables underlying the views must also reside on volumes protected by RDF on
the primary system.
Partitioned Tables and Files
If any partition of a partitioned NonStop SQL/MP or NonStop SQL/MX table or Enscribe
file exists on a volume protected by RDF, then all partitions for that file should be on
volumes protected by RDF. The partitions of a file protected by RDF can reside on
separate systems, and all of the systems should be protected by an RDF network.
Note that these are not absolute requirements, but if you lose your primary system and
must takeover on your backup system, you might not have access to the data that is
not protected by RDF.
Specifying System Generation Parameters for an RDF
Environment
When performing system generation, you should do as follows:
Use the PATHPACKETBYTES modifier to enable the Expand Variable Packetsize
feature so that Expand will send large packets.
Use the CONGCTRL modifier to enable Expand congestion control.
You might also want to enable the multipacket frame feature, depending upon the type
of traffic that will be passed over the Expand path.
For best results, consider using the RDF Professional Service to assist you in defining
the Expand requirements for your RDF environment. Contact your service provider for
further details.
Designing Transactions for RDF Protection
When designing applications containing transactions that update databases protected
by RDF, you must consider the following restrictions that apply to the subsystem:
The effects of network (distributed) transactions after an RDF takeover operation
Database operations not replicated by RDF
The subsections that follow explain these restrictions.