1. Detect change from the change log table on the source.
  2. Fetch the entry or table rows from affected tables on the source.
  3. The entry does not exist.
  4. Change request is dropped because the source entry no longer exists.