This figure illustrates three nodes. Each node has its own archived redo log to which it can write and from which it can read. The nodes cannot access any of the other node's archived redo log files.