RDF/IMP and IMPX System Management Manual (RDF 1.4+)
Network Transactions
HP NonStop RDF/IMP and IMPX System Management Manual—524388-001
13-5
RDF Network Control Files
RDF Network Control Files
The following control files exist in the Master Image Trail (MIT) subvolume of all RDF 
subsystems that are configured for replication of network transactions: ZRDFLCMT, 
ZRDFLCM2, and ZNETUNDO. Additionally, the network master has three more files: 
ZRDFNMTX, ZRDFNMT2, ZRDFNMT3. These files contain internal information that 
RDF needs to correctly execute takeover operations involving an RDF network. The 
files are empty until you actually initiate a takeover operation on a backup system 
within an RDF network.
Normal RDF Processing Within a Network 
Environment
Each RDF subsystem within an RDF network conducts its processing individually, as 
though it were not involved in an RDF network. That is, for a given RDF subsystem, 
the extractors read the MAT and auxiliary audit trails and send data to the receivers. 
The updaters read their data from their image trails and apply it to their 
UpdateVolumes. During normal processing, no RDF subsystem (except the RDFNET 
process within the network master primary system) interacts with any other RDF 
subsystem in the RDF network. Therefore, the performance of an individual RDF 
subsystem is unaffected by its inclusion within an RDF network.
RDF Takeovers Within a Network Environment 
If you have configured an RDF network and must initiate a takeover on a backup 
system in the network, then you must execute a takeover on all the backup systems in 
the network. You do that by issuing an RDFCOM TAKEOVER command on each 
individual backup system. When a takeover occurs within an RDF network, each 
subsystem’s takeover operation consists of three phases of operation:
1. A local undo phase
2. A file undo phase
3. A network undo phase
Takeover Phase 1 – Local Undo
This phase is identical to a normal RDF takeover (one that is totally unrelated to an 
RDF network). It consists of determining what transaction data has already been 
applied to the backup database but whose outcomes are unknown. Once the 
transactions have been identified, all updates associated with them are undone. The 
purger process determines what transactions must be undone and it writes the list into 
the ZTXUNDO file in the MIT.
For example, suppose you began a transaction on your primary system, you executed 
ten updates, and you committed the transaction, but the extractor process was only 










