Planning for replication

Before configuring replication, plan for network, user ID, and key requirementskey and referential integrity requirements, as well as for storage and initial load of targets.