© 2004 IBM Corporation IBM ^ Objectives  Describe how CP commands are used and structured  Explain the importance of the VM Dump Tool and VM Virtual.

Slides:



Advertisements
Similar presentations
Operating Systems Components of OS
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Routing Concepts Routing Protocols.
Chapter Six Networking Hardware.
WHAT IS AN OPERATING SYSTEM? An interface between users and hardware - an environment "architecture ” Allows convenient usage; hides the tedious stuff.
Chap 2 System Structures.
Operating-System Structures
Chapter One The Essence of UNIX.
Lecture Objectives: 1)Explain the limitations of flash memory. 2)Define wear leveling. 3)Define the term IO Transaction 4)Define the terms synchronous.
11/13/01CS-550 Presentation - Overview of Microsoft disk operating system. 1 An Overview of Microsoft Disk Operating System.
© 2004 IBM Corporation IBM ^ z/VM Module 3: Control Program (CP)
1: Operating Systems Overview
© 2004 IBM Corporation IBM ^ z/VM Module 9: Performance.
OPERATING SYSTEM OVERVIEW
Cs238 Lecture 3 Operating System Structures Dr. Alan R. Davis.
Common System Components
Virtualization and the Cloud
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #29-1 Chapter 33: Virtual Machines Virtual Machine Structure Virtual Machine.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
The Origin of the VM/370 Time-sharing system Presented by Niranjan Soundararajan.
TECHWARZ. (Multiplexed Information and Computing Service)  Multics was an extremely influential early time-sharing operating system.  Goal: Develop.
1 Semester 2 Module 2 Introduction to Routers Yuda college of business James Chen
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Routing Concepts Routing Protocols.
Routers A router is a computer Computers have four basic components:
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
3/11/2002CSE Input/Output Input/Output Control Datapath Memory Processor Input Output Memory Input Output Network Control Datapath Processor.
Hands-On Virtual Computing
LOGO OPERATING SYSTEM Dalia AL-Dabbagh
Operating System Review September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1.
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System.
MAC OS – Unit A Page: 10-11, Investigating Data Processing Understanding Memory.
Module 9: Configuring Storage
1 Chapter Overview Routing Principles Building Routing Tables.
Chapter 2: Operating-System Structures. 2.2 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 2: Operating-System Structures Operating.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
Cisco Router Hardware Software overview. In this lecture we will investigate an overview of Cisco router hardware and software. We will first turn our.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 3: Operating-System Structures System Components Operating System Services.
© 2004 IBM Corporation IBM ^ z/VM Module 2: Conversational Monitor System (CMS)
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
© 2004 IBM Corporation IBM ^ z/VM Design considerations > Security > Performance (SIE)
2003 Dominic Swayne1 Microsoft Disk Operating System and PC DOS CS-550-1: Operating Systems Fall 2003 Dominic Swayne.
Components of a Sysplex. A sysplex is not a single product that you install in your data center. Rather, a sysplex is a collection of products, both hardware.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
1: Operating Systems Overview 1 Jerry Breecher Fall, 2004 CLARK UNIVERSITY CS215 OPERATING SYSTEMS OVERVIEW.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
Hands-On Virtual Computing
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Lesson 2 Component Overview Core Hardware Fundamentals.
Click to add text © 2004 IBM Corporation IBM ^ z/VM Basic Structures and Commands Control Program.
Silberschatz, Galvin, and Gagne  Applied Operating System Concepts Module 3: Operating-System Structures System Components Operating System Services.
Embedded Real-Time Systems Processing interrupts Lecturer Department University.
CHAPTER 3 Router CLI Command Line Interface. Router User Interface User and privileged modes User mode --Typical tasks include those that check the router.
1 The user’s view  A user is a person employing the computer to do useful work  Examples of useful work include spreadsheets word processing developing.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 2 Introduction to Routers.
© 2002, Cisco Systems, Inc. All rights reserved.
Chapter 2: Configure a Network Operating System
CCNA Routing and Switching Routing and Switching Essentials v6.0
Chapter 2: System Structures
Operating System Structure
Chapter 4: Routing Concepts
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
Chapter 2: Configure a Network Operating System
Chapter 10: Device Discovery, Management, and Maintenance
Chapter 33: Virtual Machines
Chapter 2: Operating-System Structures
Chapter 2: Operating-System Structures
Chapter 33: Virtual Machines
Presentation transcript:

© 2004 IBM Corporation IBM ^ Objectives  Describe how CP commands are used and structured  Explain the importance of the VM Dump Tool and VM Virtual LANs  List and describe the important and most useful CP commands

© 2004 IBM Corporation IBM ^ Control Program (CP)  It provides each user with an individual working virtual machine environment  Every virtual machine is a functional equivalent of a real system, sharing:  Processor functions  Storage  Console  I/O device resources  It provides connectivity support to exchange information and access resources

© 2004 IBM Corporation IBM ^ Real-Machine Resource Manager  CP is a real-machine resource manager  Handles real machine hardware interrupts and all intercepts  Schedules certain real I/O operations  Manages: –Real storage –Expanded storage –Auxiliary storage  CP is the only way to communicate with the real resources on your virtual machine

© 2004 IBM Corporation IBM ^ Read/Punch/Print

© 2004 IBM Corporation IBM ^ Cross-System Extension (CSE)  Allows multiple systems to be coupled together in a complex that provides CSE  Cross-system link extends the existing CP minidisk access protocols  Allows Single System Image

© 2004 IBM Corporation IBM ^ CSE Capabilities

© 2004 IBM Corporation IBM ^ Overview of Setting up a CSE Complex 1. Provide the hardware connections between the processors 1. Install the IBM VM/Pass-Through Facility (licensed program) 1. Configure z/VM and the supporting programs with the information they need to run the CSE complex

© 2004 IBM Corporation IBM ^ Using CSE as a Hot Backup … HeartBeat

© 2004 IBM Corporation IBM ^ Inter-System Facility for Communications  Inter-System Facility for Communications (ISFC) is a function of CP  It enables communications between programs written to:  APPC/VM  Communication Services (CS), which is a group of interconnected VM systems that uses ISFC to communicate with each other  Specific programming interfaces: IUCV

© 2004 IBM Corporation IBM ^ The Three Types of Virtual Machines  The three types of VMs are defined by their storage configurations  V=R –CP provides best performance benefits for the VM and it must begin at location 0  V=F –Also provides performance benefits but does not have to start at location 0  V=V –It does not map the host storage; it pages guest real storage into and out of the host real storage

© 2004 IBM Corporation IBM ^ Real Storage in z/VM

© 2004 IBM Corporation IBM ^ Real Storage in z/VM cont.

© 2004 IBM Corporation IBM ^ Preferred Virtual Machines  V=R & V=F Similarities  Store information in the real location  Are mapped into contiguous real storage  Can have dedicated real processors  Have similar I/O interpretations and simulation for shared devices V=R & V=F Differences V=F can have more than one virtual machine running, while V=R can only run one virtual machine V=F does not start at absolute zero V=R must start at absolute 0 V=R has better performance because it does less table translation than V=F

© 2004 IBM Corporation IBM ^ Using CP Commands  z/VM uses the CP command language to configure, tune and manipulate resources  To control the resources of the real machine –Processors –I/O devices –Networking devices  To control your virtual machine’s configuration and environment

© 2004 IBM Corporation IBM ^ CP Command Structure  z/VM’s CP command lines contain a command name and a positional operand  Command names are: –Alphanumeric and less than 12 characters long –Verbs that describe the function  Operands are: –Keywords and symbols 8 characters or less in length –Not required on some commands

© 2004 IBM Corporation IBM ^ CP Command Truncations and Abbreviations  Truncations:  Shorter form created by dropping one or more letters from the end of the command or operand  The uppercase letters in the syntax diagram must remain, but lowercase letters can be omitted  For the QUERY command we could use: Query  Full name que  Truncation q  Shortest truncation Abbreviations: Shorter form of command names They appear below the full name of the command in the syntax diagram Operand abbreviations are displayed in the operand description For the MESSAGE command we could use: Message  Full Name Msg  Abbreviation

© 2004 IBM Corporation IBM ^ CP Control Tools: VM Guest LAN  Virtual Adapters  Simulated by a NIC, such as HiperSockets and OSA-Express devices  Can be operated by a guest using the same software that would be used to control the equivalent hardware Connectivity for Virtual Adapters Enables VM users to connect virtual network adapters to an emulated LAN When connected to this virtual LAN, users can communicate over a physical LAN segment

© 2004 IBM Corporation IBM ^ CP Control Tools: VM Dump Tool

Click to add text © 2004 IBM Corporation IBM ^ CP Commands

© 2004 IBM Corporation IBM ^ Privilege Class Revisited

© 2004 IBM Corporation IBM ^ ATTACH

© 2004 IBM Corporation IBM ^ ATTACH

© 2004 IBM Corporation IBM ^ DEFINE  The DEFINE command can change your system configuration and allows you to add new commands and setups to your system  Usage Notes:  You can suppress messages from this command by entering  SET IMSG OFF  Using the DEFINE command to alter the configuration of your virtual machine is temporary. Your configuration returns to its original state at the end of the session  Using the DEFINE command for I/O configuration is also temporary, unless you update you I/O configuration program file to make the changes permanent

© 2004 IBM Corporation IBM ^ DEDICATE

© 2004 IBM Corporation IBM ^ DEDICATE – Usage Notes  Defaults for DEDICATE are: –CPU ALL –User ID of the V=R machine  If there are more virtual processors then real processors, the lowest virtual addresses are dedicated first.  Order is not important for CPU and USER.  It is possible to have your dedicated processor become undedicated when some commands are issued after DEDICATE. This can be avoided if you enable automatic dedication.

© 2004 IBM Corporation IBM ^ INDICATE  For privilege Class G, it displays:  Recent contention for system resources  Environment characteristics of your virtual machine  Measurements of resources used by your virtual machine  For privilege Class E (sometimes B or C) it displays:  Detailed information on the use of system resources  The status of currently active virtual machines  Environment characteristics and measurements of resources used by any virtual machine

© 2004 IBM Corporation IBM ^ MESSAGE  The MESSAGE command:  Transmits messages to the virtual console of other active users  Has the format  Message userid messtosend  Usage Notes:  Messaging length in the CP environment is limited by the input area of the terminal  The SET MSG OFF command suppresses messages  Messages are displayed only when the display device is ready to receive output  If MSG ALL AT ALL is entered in a CSE, every user in every system receives the message

© 2004 IBM Corporation IBM ^ VARY (Real Device)

© 2004 IBM Corporation IBM ^ VARY – Usage Notes  Usage Notes:  If you specify a list of devices, the summary at the end will list the devices that were varied online or offline  If your devices were varied online, but a success status does not appear and no errors occurred, use the FORCE operand to bring them online  The test operand provides the ability to use VARY for a device that would not normally be allowed by CP

© 2004 IBM Corporation IBM ^ Conclusion  CP manages the resources of a single computer so that multiple computing systems appear to exist  CSE and ISFC help CP work with other virtual machines to create an interconnected environment  Virtual Machines can be set up to run in many different environments, such as V=V, V=R, and V=F  CP-supported facilities show how z/VM can be modified and extended by the CP commands

© 2004 IBM Corporation IBM ^ Glossary Cross System Extensions (CSE)- allows users in up to four interconnected VM systems to participate in a multi-system environment. Inter-System Facility for Communications (ISFC)- provides communications facilities between transaction programs on interconnected z/VM systems. Programmed Operator Facility (PROP)- allows remote control of a virtual machine, enabling limited automation of routine operator activities

© 2004 IBM Corporation IBM ^ Glossary Dynamic Paging Area (DPA)- part of the real storage that CP uses for virtual machine pages...the real page pool Operands- keywords and symbols that affect command functions. Command names- verbs that describe command functions. In z/VM, they are alphanumeric and less than 12 characters long. Truncations- shorter forms constructed by dropping one or more letters from the end of a command or operand name Abbreviations- short versions of command names

© 2004 IBM Corporation IBM ^ Glossary Asynchronous Data Mover Facility (ADMF)- can offload page move activity onto the I/O processor, freeing the instruction processor Complementary Metal Oxide Semiconductor (CMOS)- a chip technology used almost universally for processors today Cryptography- an effective means of protecting data in computers and communication systems from unauthorized disclosure ESCON- a set of products and services that use optical fiber technology and dynamically modifiable switches called ESCON Directors

© 2004 IBM Corporation IBM ^ Glossary Fiber optic cables- reduce cable bulk, allowing for an increase in the amount of distance between processors and attached devices, and improved data transfer rates FICON- a fiber optic I/O architecture that coexists with and exploits existing ESCON equipment and infrastructure, but offers improved link performance and enhanced distance connectivity Fast Synchronous Data Mover (FSDM)- replaces ADMF on the G5/G6 and all later processors