CA-IDMS 16.0 Performance and Non-Stop Enhancements AUI meeting in France 27. November 2006 Manfred Höfer, CA Prinicipal Support Engineer.

Slides:



Advertisements
Similar presentations
Oracle Architecture. Instances and Databases (1/2)
Advertisements

Introduction to the new mainframe © Copyright IBM Corp., All rights reserved. Chapter 2: z/OS Overview.
Chapter 101 Virtual Memory Chapter 10 Sections and plus (Skip:10.3.2, 10.7, rest of 10.8)
OS2-1 Chapter 2 Computer System Structures. OS2-2 Outlines Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection.
Chapter 3 Data Storage and Access Methods Title: Operating Systems Support for Database Management Author: Michael Stonebraker Pages: 217 – 223 Group 01:
1 - Oracle Server Architecture Overview
Backup and Recovery Part 1.
Oracle Architecture. Database instance When a database is started the current state of the database is given by the data files, a set of background (BG)
Oracle9i Database Administrator: Implementation and Administration
Redo Waits Kyle Hailey #.2 Copyright 2006 Kyle Hailey Log File Waits  Redo is written to disk when  User commits  Log Buffer.
Redo Waits Kyle Hailey #.2 Copyright 2006 Kyle Hailey Redo REDO Lib Cache Buffer Cache Locks Network I/O.
1 Copyright © 2005, Oracle. All rights reserved. Introduction.
Backup & Recovery 1.
Administration etc.. What is this ? This section is devoted to those bits that I could not find another home for… Again these may be useless, but humour.
Advances in Language Design
Objectives To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization.
Database Administration TableSpace & Data File Management
Chapter Oracle Server An Oracle Server consists of an Oracle database (stored data, control and log files.) The Server will support SQL to define.
1 Lecture 4: Threads Operating System Fall Contents Overview: Processes & Threads Benefits of Threads Thread State and Operations User Thread.
Topics covered: Memory subsystem CSE243: Introduction to Computer Architecture and Hardware/Software Interface.
By Lecturer / Aisha Dawood 1.  You can control the number of dispatcher processes in the instance. Unlike the number of shared servers, the number of.
Maintaining File Services. Shadow Copies of Shared Folders Automatically retains copies of files on a server from specific points in time Prevents administrators.
Architecture Rajesh. Components of Database Engine.
Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 4: Integrity.
Recall: Three I/O Methods Synchronous: Wait for I/O operation to complete. Asynchronous: Post I/O request and switch to other work. DMA (Direct Memory.
Processes and OS basics. RHS – SOC 2 OS Basics An Operating System (OS) is essentially an abstraction of a computer As a user or programmer, I do not.
7202ICT – Database Administration
Copyright © Oracle Corporation, All rights reserved. 1 Oracle Architectural Components.
An Oracle server:  Is a database management system that provides an open, comprehensive, integrated approach to information management.  Consists.
July 30, 2001Systems Architecture II1 Systems Architecture II (CS ) Lecture 8: Exploiting Memory Hierarchy: Virtual Memory * Jeremy R. Johnson Monday.
1 CS 430 Database Theory Winter 2005 Lecture 16: Inside a DBMS.
Chapter 16 Recovery Yonsei University 1 st Semester, 2015 Sanghyun Park.
Week 3 Lecture 1 The Redo Log Files and Diagnostic Files.
7 Copyright © 2005, Oracle. All rights reserved. Managing Undo Data.
File System Implementation
Data Sharing. Data Sharing in a Sysplex Connecting a large number of systems together brings with it special considerations, such as how the large number.
Computer Systems Week 14: Memory Management Amanda Oddie.
Process Architecture Process Architecture - A portion of a program that can run independently of and concurrently with other portions of the program. Some.
Chapter 1Oracle9i DBA II: Backup/Recovery and Network Administration 1 Chapter 1 Backup and Recovery Overview MSCD642 Backup and Recovery.
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective.
11.1 Silberschatz, Galvin and Gagne ©2005 Operating System Principles 11.5 Free-Space Management Bit vector (n blocks) … 012n-1 bit[i] =  1  block[i]
Windows XP Memory Management Aaron Lanoy and Jason Farnsworth.
Unicenter NSM Debugging Tips & Tricks -Release r11.
6 Copyright © 2007, Oracle. All rights reserved. Performing User-Managed Backup and Recovery.
ICOM 6005 – Database Management Systems Design Dr. Manuel Rodríguez-Martínez Electrical and Computer Engineering Department Lecture 7 – Buffer Management.
Best Practices for Implementing Unicenter NSM r11 in an HA MSCS Environment Part I -Last Revision April 24, 2006.
Transactional Recovery and Checkpoints. Difference How is this different from schedule recovery? It is the details to implementing schedule recovery –It.
14 Copyright © 2005, Oracle. All rights reserved. Backup and Recovery Concepts.
LECTURE 12 Virtual Memory. VIRTUAL MEMORY Just as a cache can provide fast, easy access to recently-used code and data, main memory acts as a “cache”
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
14 Copyright © 2007, Oracle. All rights reserved. Backup and Recovery Concepts.
This document is provided for informational purposes only and Microsoft makes no warranties, either express or implied, in this document. Information.
Oracle Database Architectural Components

Translation Lookaside Buffer
Database Recovery Techniques
Transactional Recovery and Checkpoints
Lecture 12 Virtual Memory.
Kyle Hailey Redo Waits Kyle Hailey
CSI 400/500 Operating Systems Spring 2009
O.S Lecture 13 Virtual Memory.
Oracle9i Database Administrator: Implementation and Administration
Lecture 32 Syed Mansoor Sarwar
Turbo-Charged Transaction Logs
Process Description and Control
Workforce Now Version 6.0 New - Asynchronous Payroll New Release
Process Description and Control
Performing Database Recovery
Chapter 5 The Redo Log Files.
COMP755 Advanced Operating Systems
Presentation transcript:

CA-IDMS 16.0 Performance and Non-Stop Enhancements AUI meeting in France 27. November 2006 Manfred Höfer, CA Prinicipal Support Engineer

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 2 Release File Cache in Memory - Parallel Access Volume Exploitation - Dynamic System Trace Control - Varying Program Attributes - Short-on-Storage Notification - Journal and Recovery High Performance Storage Protect

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies bit Exploitation - Terminology - The line: 16 MB limit - The bar: 2 GB limit - Z-storage: Virtual storage above the bar 2 GB – 16 EB (Exabyte) - XA-storage. Virtual storage below the bar and above the line 16 MB – 2 GB

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies bit Exploitation - File caching in 64-bit storage IDMS - CV or Local 64-bit 31-bit Buffer Cache On a read: - look in cache - if found, move to buffer - if not found, read from file, copy to cache On a write: - copy to cache - write to file

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 5 Dataspace/Memory Cache The MEMORY CACHE clause replaces the use of the DATASPACE clause. - DATASPACE clause is still accepted for upward compatibility, but is no longer generated on displays. - The choice of whether to cache a file in memory or in a dataspace is determined at runtime based on the operating system: - In a z/OS 1.2 or later environment, files are cached in Z-storage. - In earlier releases of the operating system files are cached in dataspaces.

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 6 Memory Cache - Insufficient storage for memory cache: If MEMORY CACHE YES is specified and not enough Z-storage is available to cache a file in memory, processing continues depending on the DMCL-wide MEMORY CACHE clause  LOCATION ANYWHERE dataspace storage is acquired  LOCATION 64 BIT ONLY memory caching fails - Dynamically changing memory cache specification: The MEMORY CACHE specification for a file can be changed dynamically with the DCMT VARY FILE command.

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 7 PAV Exploitation Job 1 Job 2 Advantage CA-IDMS PAV Exploitation Concurrent I/Os per file Single I/O per track File 1 File 2

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 8 Dynamic System Trace Control - New DCMT commands DCMT Display SYSTRace DCMT Vary SYSTRace ON ENTries=nnnnn DCMT Vary SYSTRace OFF DCMT Display DBTRace DCMT Vary DBTRace ON ENTries=nnnnn DCMT Vary DBTRace OFF

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 9 Varying Program Attributes Enhanced VARY PROGRAM support - DCMT Vary PROgram xxxx DEFine LANguage ADSo|COBol… TYPe MAP|DIAlog|PROgram… MPMode ANY|SYStem... -RESIDENT cannot be changed -Disable program to change language or type

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 10 Short-On-Storage Notification - New message written to console if SOS DC Pool &01: SOS condition &02 Condition 0 : remaining storage is less than cushion (SOS) 1 : not enough contiguous storage available, request failed - Duplicate messages suppressed (No more than 1 per minute)

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 11 Journaling and Recovery - Faster recovery for long-running transactions - New SYSGEN and DCMT options force an ENDJ instead of a COMT when a COMMIT is issued - Less data has to be examined to locate the start of recovery unit - Reduced journal writes - JOURNAL TRANSACTION LEVEL extended to journal writes caused because updated pages are forced from the buffer

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 12 Journal Buffer Size (cont.) DCMT DISPLAY BUFFER - Journal Buffer - Size # In-Use Waits DB Ckpt JNL_BUFFER # of Recoveries I/O's in Buffer # of buffer waits If > 0, increase buffer size # recovery I/Os If large, increase buffer size

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 13 Journal Transaction Level - Enables deferring journal write until block is full - Fewer journal blocks written - Fewer journal I/Os - Better journal file utilization - While # of update transactions exceeds journal transaction level - CV defers write of journal block until it fills

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 14 Journal Transaction Level (cont.) - Journal transaction level should be - 0 (no deferral occurs) - Greater than 3 - If too large...no benefit - Monitor ARCHIVE JOURNAL report

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 15 Journal Full Cushion - Prevents system from hanging due to full journals - If available space less than cushion - Only checkpoint records can be written to journal - Other writers display message and wait - Allows administrator to cancel offending task - Then issue DCMT VARY JOURNAL - Implemented as a 15.0 APAR

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 16 Release File Cache in Memory - Parallel Access Volume Exploitation - Dynamic System Trace Control - Varying Program Attributes - Short-on-Storage Notification - Journal and Recovery High Performance Storage Protect

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 17 High Performance Storage Protect - With the introduction of the z-architecture machines, the cost of IDMS storage protection increased dramatically. - r16 SP2, introduces an alternate way to do storage protection that has very little (if any) performance impact. - The High Performance Storage Protect feature makes no attempt to protect the non-reentrant user programs or users’ storage from each other.

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 18 High Performance Storage Protect (cont.) - This feature makes use of the unique behavior of storage protect key 9 – any program can write in key 9 storage. Programs running in key 9 can only write in key 9 storage. - At startup, IDMS swaps the non-reentrant program pool and any storage pool supporting user storage to key 9. - When control is given to a user program, the PSW key is swapped to key 9 and swapped back upon returning.

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 19 High Performance Storage Protect (cont.) - It is expected that this feature will be used on production IDMS systems. - The traditional IDMS storage protect feature is still available and will typically still be used on test systems. - You can not use both the traditional and the high performance storage protect features at the same time, the new high performance storage protect feature takes precedence.

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 20 High Performance Storage Protect (cont.) - To enable, the DBA must employ key 9 and segregate all user-oriented storage from IDMS system storage. - To use the traditional storage protect feature, the system must be generated to use a key other than key 9.

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 21 High Performance Storage Protect (cont.) - Storage Pool Definitions - Range 128 to Range 1 to Storage types: User, User Kept, Shared, and Shared Kept can be together but must be defined to secondary storage pools segregated from Database or Terminal type storage. - SYSGEN storage protect key is 9 - Msg DC at startup if HPSPO is not possible

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 22 High Performance Storage Protect (cont.) With apar QO83615 you can see with DCPROFIL and with DCMT D ALL STO if HPSPO is enabled: - DCPROFIL SYSTEM STORAGE PROTECTED: YES HPSPO ENABLED: YES - DCMT D ALL STORAGE POOLS POOL ADDRESS SIZE CUSHION INUSE HWM TIMES PFIX CONTAINS SOS TYPES K 8K 60K 60K 0 NO SY,TR,DB K 52K 44K 52K 0 NO SH,SK,US,UK E K 100K 148K 164K 0 NO TR,DB D K 100K 1324K 1336K 0 NO SH,SK,US,UK FA K 0K 296K 312K 0 NO SY High Performance Storage Protection Option Enabled

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 23 Comparing „old“ and „new“ storage protection: Protection is set for system and program: STANDARD SP: When switching from User to System Mode or from System to User Mode, IDMS must run the task's resource chains and issue SVCs to switch stg key for all of that task's pages in memory as well as switching the stg key in the PSW. HPSPO (alternate key is 9): Since the entire non-reentrant stg pool and all stg pools that contain the user stg types will already be set to the alt key 9, IDMS only has to switch the PSW stg key.

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 24 Release 16.0 File Cache in Memory Parallel Access Volume Exploitation Dynamic System Trace Control Varying Program Attributes Short-on-Storage Notification Journal and Recovery 16.2 High Performance Storage Protect

Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. 25 QUESTIONS ?