Beruflich Dokumente
Kultur Dokumente
LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
ENTERPRISE SYSTEM CONCEPTS
(Supplementary Material for MAPLES VOL-I Handbook)
How is Mainframe different from PC’s
The differences between a PC and Mainframe are
I/O capabilities
Mainframes have a much larger I/O bandwidth than PC's have.
In addition Mainframe's have a lot of redundancy and serviceability features built in
Reliability
The Reliability of PC is unreliable in nature.
The Reliability of mainframe with its 99.99% uptime.
Size
A PC is about 18" square and maybe 8" wide.
But Mainframes are very large in size
Number of hard drives
A typical PC will have one or two hard drives
Mainframes on the other hand, can come with hundreds of hard drives.
Secondary Memory
PC will have 200 to 500 Gigabytes of hard drive space.
Mainframe will have Terabytes to Petabytes of hard disk space.
Primary Memory
PC will have 1 GB to 4 GB of RAM.
Mainframe will have Several GBs to Terabytes of RAM.
Why Mainframe?
Businesses today rely on the mainframe to:
Perform large-scale transaction processing (thousands of transactions per second)
Support thousands of users and application programs concurrently accessing numerous
resources
Manage terabytes of information in databases
Handle large-bandwidth communication
Mainframe strengths:
Reliability, availability, and serviceability
1
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
The reliability, availability, and serviceability (or "RAS") of a computer system have always been
important factors in data processing. Ideally, RAS is a central design feature of all aspects of a
computer system, including the applications.
Security
This critical data needs to be securely managed and controlled, and, simultaneously, made
available to those users authorized to see it. The mainframe computer has extensive
capabilities to simultaneously share, but still protect, the firm's data among multiple users.
Scalability
The degree to which the IT organization can add capacity without disruption to normal business
processes or without incurring excessive overhead (nonproductive processing) is largely
determined by the scalability of the particular computing platform.
Continuing compatibility
The ability of an application to work in the system or its ability to work with other devices or
programs is called Compatibility.
Hardware Organization
Sysplex Uniprocessor and Multiprocessor
A Sysplex (IBM's systems complex), introduced in 1990,as a platform for the MVS/ESA operating
system for IBM mainframe servers. The Sysplex consists of the multiple computers (the systems) that
make up the complex.
2
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
A Sysplex is designed to be a solution for business needs involving any or all of the following: parallel
processing; online transaction processing (OLTP); very high transaction volumes; very numerous small
work units - online transactions, for example (or large work units that can be broken up into multiple
small work units); or applications running simultaneously on separate systems that must be able to
update to a single database without compromising data integrity.
A single system uniprocessor consists of a single central processor complex (CPC) - which consists of
a single central processor (CP) and all associated system hardware and software, controlled by a
single copy of the operating system.
Tightly coupled multiprocessors consist of a number of CPs added to a CPC that share central storage
and a single copy of the operating system. Work is assigned to an available CP by the operating
system and can be rerouted to another if the first CP fails. A loosely coupled configuration has multiple
CPCs (which may be tightly coupled multiprocessors) with separate storage areas, managed by more
than one copy of the operating system and connected by channel-to-channel communications.
A Sysplex is similar to a loosely coupled configuration, but differs in that it has a standard
communication mechanism (the cross-system coupling facility, or XCF) for MVS system applications
that enables communication between application programs on one or multiple computers. The Sysplex
is made up of a number of CPCs that collaborate, through specialized hardware and software, to
process a work load. This is what a large computer system does in general; a Sysplex, through XCF,
increases the number of processing units and operating systems that can be connected.
Base Sysplex
To help solve the difficulties of managing many MVS systems, IBM introduced the MVS systems
complex or Sysplex in September of 1990. The base Sysplex lays the groundwork for simplified
multisystem management through the cross-system coupling facility (XCF) component of MVS/ESA.
XCF services allow authorized applications on one system to communicate with applications on the
same system or on other systems. In a base Sysplex, CPCs connect by channel-to-channel
communications and a shared dataset to support the communication. When more than one CPC is
involved, a Sysplex Timer synchronizes the time on all systems.
3
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
A Base Sysplex
The base Sysplex is similar to a loosely coupled configuration in that more than one CPC (possibly a
tightly coupled multiprocessor) shares DASD and is managed by more than one MVS image. A Sysplex
is different from a loosely coupled configuration because through XCF, there is a standard
communication mechanism for MVS system applications.
Parallel Sysplex
The Parallel Sysplex is a clustering architecture that has improved communication capabilities and
supports more connected CPCs and more copies of the operating system. There are several areas of
improvement over the base Sysplex. The Parallel Sysplex Coupling Facility stores crucial system
information, usually configured on a separate device. Use of the coupling facility increases the capacity
for data sharing among systems and subsystems.
The benefits of Parallel Sysplex are:
No single points of failure
Capacity and scaling
Dynamic workload balancing
Ease of use
Single system image
Compatible change and non-disruptive growth
Application compatibility
Disaster recovery
4
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
Parallel Sysplex
Initializing the MVS system
Initial program loading (IPL) provides a manual means for causing a program to be read from a
designated device and for initiating execution of that program. When the system hardware is ready, you
can use the system console to load the system software.
During initialization of a z/OS system, the operator uses the system console, which is connected to the
processor controller or support element. From the system console, the operator initializes the system
control program during the nucleus initialization program (NIP) stage.
An Initial Program Load (IPL) is the act of loading a copy of the operating system from disk into the
CPU's central storage and executing it. Not all disks attached to a CPU will have loadable code on
them. A disk that does is generally referred to as an ―IPLable‖ disk, and more specifically as the
SYSRES volume.
Central Storage: Central storage, also referred to as main storage, provides the system with directly
addressable, fast-access electronic storage of data. Both data and programs must be loaded into
central storage (from input devices) before they can be processed by the CPU.
The maximum central storage size is restricted by hardware and system architecture as follows:
5
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
In the System/370™ architecture, the maximum main storage size is 16 megabytes.
From S/370™-XA architecture until ESA/390 architecture, the maximum memory size is 2 GB.
In z/Architecture the maximum central storage size is 16 exabytes.
Expanded Storage: This is a form of electronic storage addressable in 4 KB blocks through the use of
a 32-bit block number by special privileged instructions. The expanded storage was originally intended
to bridge the gap in cost and density between main storage and magnetic media; later it provided a
means to relieve the performance constraint imposed by the 31-bit real-address size by serving as a
high-speed backing store for paging and for large data buffers.
Auxiliary Storage: The auxiliary storage is in Direct Access Storage Devices (DASD) and is used to
support basic system requirements as follows:
– System data sets.
– Paging data sets, which contain the paged-out portions of all virtual storage address
spaces. In addition, output to virtual I/O devices may be stored in the paging data sets.
Addressing mode
Addressing mode (AMODE) is a program attribute to indicate which hardware addressing mode should
be active to solve an address, that is, how many bits should be used for solving addresses.
6
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
RMODE indicates where a program should be placed in the virtual storage, when the system loads it
from DASD:
RMODE=24: Indicates that the module must reside below the 16-MB virtual storage line.
RMODE= ANY: Indicates that the module might reside anywhere in virtual storage either above
or below the 16-MB virtual storage line.
AMODE and RMODE are load module attributes and are placed in the load module’s directory entry in
the partitioned data set.
In latest versions of Mainframes 64 bit Virtual addressing is used. The initial support for 64-bit virtual
addressing was introduced in z/OS Version 1 Release 2. The size of the 64-bit address space is 16
exabytes, which makes the new address space 8 billion times the size of the former S/390 address
space. Programs continue to be loaded and to run below the 2 gigabyte address; these programs can
use data that resides above 2 gigabytes.
z/OS V1R2 provides for up to 256 GB of central storage to be configured to a z/OS image.. The
address space is still created with a size of 2 GB. The address space only become bigger when a
program allocates virtual storage above 2GB. To allocate and release virtual storage above 2G, a
program must use the services provided in the IARV64 macro. The GETMAIN, FREEMAN, STORAGE,
and CPOOL macros do not allocate storage above the 2 gigabyte address, nor do callable cell pool
services.
7
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
A program references data in a data space directly, in much the same way it references data in an
address space. It addresses the data by the byte, manipulating, comparing, and performing arithmetic
operations. The program uses the same instructions (such as load, compare, add, nd move character)
that it would use to access data in its own address space. Before accessing data in a data space, a
program must change its access mode, meaning, use special assembler instructions to change its
access mode.
High performance data access—hiperspace—is a kind of data space created with the same RSM
services used to create a data space. Hiperspace™ provides the applications an opportunity to use
expanded storage as a substitute to I/O operations. Hiperspaces differ from data spaces in the
following ways:
Main storage is never used to back the virtual pages in hiperspace.
Data can be retrieved and stored between a hiperspace and a data space only using MVS
services. This avoids the complex programming required when accessing data in a data space.
Data is addressed and referred to as a 4K block.
8
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
Isolate data from other tasks in the address space. Data in an address space is accessible to all
programs executing in that address space. You might want to move some data to a databases
or hiperspace for security or integrity reasons. You can restrict access to data in those spaces
to one or several units of work.
Share data among programs that are executing in the same address space or different address
spaces. Instead of keeping the shared data in common areas, create a databases or hiperspace
for the data you want your programs to share.
Provide an area in which to map a data-in-virtual object.
Mainframe channels
A channel provides an independent data and control path between I/O devices and memory. Early
systems had up to 16 channels; the today's largest mainframe machines can have over 1000 channels.
Channels connect to control units. A control unit contains logic to work with a particular type of I/O
device. For example, a control unit for a printer would have much different internal circuitry and logic
than a control unit for a tape drive. Some control units can have multiple channel connections providing
multiple paths to the control unit and its devices.
9
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
Control units connect to devices, such as disk drives, tape drives, communication interfaces, and so
forth. The division of circuitry and logic between a control unit and its devices is not defined, but it is
usually more economical to place most of the circuitry in the control unit.
The channels in Figure 1 are parallel channels (also known as bus and tag channels, named for the
two heavy copper cables they use). A parallel channel can be connected to a maximum of eight control
units. Most control units can be connected to multiple devices; the maximum depends on the particular
control unit, but 16 is a typical number.
Each channel, control unit, and device has an address, expressed as a hexadecimal number. The disk
drive marked with an X in Figure 1 has address 132:
The first digit is the channel number
The second digit is the control unit number
The last digit is the device number
The device address seen by software is more correctly known as a device number (although the term
address is still widely used) and is indirectly related to the control unit and device addresses.
I/O connectivity
System control and partitioning
Mainframe hardware: Logical partitions (LPARs)
Consolidation of mainframes
10
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
z/OS Communications Server
The z/OS operating system includes a software component called z/OS Communications
Server. z/OS Communications Server implements the SNA and TCP/IP protocols.
Subsystems
Logical partition
Logical partitions (LPARs) are, in practice, equivalent to separate mainframes. Each LPAR runs its own
operating system. This can be any mainframe operating system; there is no need to run z/OS®, for
example, in each LPAR. The installation planners may elect to share I/O devices across several
LPARs, but this is a local decision.
The system administrator can assign one or more system processors for the exclusive use of an LPAR.
Alternately, the administrator can allow all processors to be used on some or all LPARs. Here, the
system control functions (often known as microcode or firmware) provide a dispatcher to share the
processors among the selected LPARs. The administrator can specify a maximum number of
concurrent processors executing in each LPAR. The administrator can also provide weightings for
different LPARs; for example, specifying that LPAR1 should receive twice as much processor time as
LPAR2.
The operating system in each LPAR is IPLed separately, has its own copy of its operating system, has
its own operator console (if needed), and so forth. If the system in one LPAR crashes, there is no effect
on the other LPARs.
MVS uses a JES to receive jobs into the operating system, schedule them for processing by MVS, and
control their output processing. JES2 is descended from HASP (Houston automatic spooling priority).
HASP is defined as a computer program that provides supplementary job management, data
management, and task management functions such as scheduling, control of job flow, and spooling.
11
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
HASP remains within JES2 as the prefix of most module names and the prefix of all messages sent by
JES2 to the operator.
JES2 is a functional extension of the HASP II program that receives jobs into the system and processes
all output data produced by the job. So, what does all that mean? Simply stated, JES2 is that
component of MVS that provides the necessary functions to get jobs into, and output out of, the MVS
system. It is designed to provide efficient spooling, scheduling, and management facilities for the MVS
operating system.
In a JES3 environment, however, one MVS image hosts a JES3 that performs centralized control over
its and the other MVS images’ functions. This JES3 is called JES3 global processor; the JES3
instances in the other MVS images are called JES3 local processors. It is from the global processor
that JES3 manages jobs and resources for the entire complex, matching jobs with available resources.
JES3 ensures that they are available before selecting the job for processing.
TSO/ISPF
TSO/E is a base element of z/OS, as it was of OS/390 and of the former MVS systems. TSO/E has
undergone continuous enhancements during its life, and it has become the primary user interface to the
OS/390 system and, now, to the z/OS system. TSO/E provides programming services that you can use
in system or application programs. These services consist of programs, macros, and CLISTs. TSO/E
services support a wide range of functions that are useful in writing system programs as well as
application programs that exploit the full-screen capabilities of TSO/E.
CLISTs, REXX execs, servers, and command processors are specific types of programs that you can
write to run in the TSO/E environment.
12
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
ISPF can be used in many ways. Some examples are the following:
Users can edit, browse and print data.
Data processing administrators and system programmers can use ISPF to:
Monitor and control program libraries
Communicate with MVS through TSO commands, CLISTs, or REXX EXECs
Programmers can use ISPF to develop a batch, interactive, or any other type of program
and its documentation.
Terminal users can invoke a wide range of utilities like search, compare, compilers, and
so forth.
Programmers can use ISPF services to develop dialogs
CICS
CICS is abbreviation of Customer Information Control System
On-line transaction processor
It’s a separate sub system
Completely transaction driven and map based
It’s more like a mini operating system itself
o
o Program control facilities
o DB access calls supported
IMS
IMS is abbreviation of Information Management System
Hierarchical database management system
Very old database management system
Has it’s own communication component – IMS/DC
Limited facilities
Currently SOA is been incorporated into IMS
DB2
DB2 is abbreviation of Database 2
13
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
Tablespaces
Tables
Rows and columns
It supports referential integrity
The SQL calls can be embedded in any high level language
VTAM
VTAM is abbreviation of Virtual Telecommunication Access Method
VTAM provides a method by which application programs can communicate with
telecommunication devices and their users.
VTAM was the first IBM program to allow programmers to deal with devices as ―logical units‖
without having to understand the details of line protocols and device operation.
Prior to VTAM, programmers used IBM’s Basic Telecommunications Access Method (BTAM) to
communicate with devices that used the binary synchronous (BSC) and start-stop line protocols.
RACF
RACF is abbreviation of Resource Access Control Facility
The z/OS Security Server is the IBM security product.
The RACF product is a component of the z/OS Security Server and works together with the
existing system features of z/OS to provide improved data security for an installation.
If this product is to be installed in your environment, then RACF customization must be done.
14
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
An internal reader is a special SYSOUT data set that other programs can use to submit jobs, control
statements, and commands to JES2.
The INTRDR statement specifies the characteristics of all JES2 internal readers that are used to
submit batch jobs.
Jobs that allocate internal reader and time-sharing users use the internal readers to submit jobs
Initiator
The initiator is an integral part of z/OS that reads, interprets, and executes the JCL.
It is normally running in several address spaces (as multiple initiators).
An Initiator manages the running of batch jobs, one at a time, in the same address space.
Classes
The CLASS parameter is used to assign your job to a job processing class.
The class you should request depends on the characteristics of the job and your installation's rules
for assigning classes.
Consult your installation's operations staff or MVS System Programmer for a list of valid job classes
and their processing characteristics.
Emulator
Dumb terminals
Device which consists of a keyboard and a monitor, and a connection to a full-fledged (intelligent)
computer usually a server PC, minicomputer, or a mainframe computer. Dumb terminals have no
'intelligence' (data processing or number crunching power) and depend entirely on the computer (to
which they are connected) for computations, data storage, and retrieval. Dumb terminals are used by
airlines, banks, and other such firms for inputting data to, and recalling it from, the connected computer.
Need of Emulators
An emulator duplicates the functions of one system using a different system, so that the second
system behaves like (and appears to be) the first system. This focus on exact reproduction of external
behavior is in contrast to some other forms of computer simulation, which can concern an abstract
model of the system being simulated.
Emulators maintain the original look, feel, and behavior of the digital object, which is just
as important as the digital data itself.[6]
15
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
Despite the original cost of developing an emulator, it may prove to be the more cost efficient
solution over time.[7]
Reduces labor hours, because rather than continuing an ongoing task of continual data
migration for every digital object, once the library of past and present operating
systems and application software is established in an emulator, these same technologies are
used for every document using those platforms.
Many emulators have already been developed and released under GNU General Public
License through the open source environment, allowing for wide scale collaboration.[8]
Emulators allow video games exclusive to one system to be played on another.
Types of Emulators
CPU simulator
I/O
Logical simulators
Functional simulators
Video game console emulators
Terminal emulators
16
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
New in V6: Support for the latest Windows versions, including Windows V7 and Windows
Server 2008
New in V6: FTP client security
Highlights
Provides market-leading host connectivity and emulation
Includes tools to easily combine host and desktop applications
Helps you capitalize on existing investments and extend applications to Web-based
technologies
Enables users to have access to mission-critical business systems
Designed for Microsoft Windows
Batch processing
Batch processing is execution of a series of programs ("jobs") on a computer without manual
intervention.
Batch jobs are set up so they can be run to completion without manual intervention, so all input data is
preselected through scripts or command-line parameters. This is in contrast to "online" or interactive
programs which prompt the user for such input. A program takes a set of data files as input, processes
the data, and produces a set of output data files. This operating environment is termed as "batch
processing" because the input data are collected into batches on files and are processed in batches by
the program.
Online processing
Online transaction processing, or OLTP, refers to a class of systems that facilitate and manage
transaction-oriented applications, typically for data entry and retrieval transaction processing. The term
17
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
is somewhat ambiguous; some understand a "transaction" in the context of computer or database
transactions, while others (such as the Transaction Processing Performance Council) define it in terms
of business or commercial.[1] OLTP has also been used to refer to processing in which the system
responds immediately to user requests. An automatic teller machine (ATM) for a bank is an example of
a commercial transaction processing application.
The technology is used in a number of industries, including banking, airlines, mail order, supermarkets,
and manufacturing. Applications include electronic banking, order processing, employee time
clock systems, e-commerce, and eTrading. The most widely used OLTP system is
probably IBM's CICS.[2]
Online Transaction Processing has two key benefits: simplicity and efficiency.
What is dump?
Dumps are record of the contents of some parts of storage at some point in time. The intent of a dump
is to provide useful information for analyzing problems and failures after they have occurred.
The types of Dumps are:
18
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
SYMPTOM DUMP.
SNAP DUMP
SYSUDUMP
SYSABEND
SYSMDUMP
SVCDUMP
STAND-ALONE
Extended organizations
The organization includes its customers and vendors as part of an extended organization. The ―End
User‖ of the IT applications in this extended organization can be an employee, a vendor, an agent or a
customer himself. This end-user needs a secure and easy access from a browser to the company’s
business critical applications so that it can be accesses from anywhere.
19
MAPLES ESM TECHNOLOGIES PVT. LTD
CTS TRAINING PROGRAMME –NOV/DEC 2010
Continuous availability
The Mainframe availability used to be measured in 5 9’s. That is Normal Mainframe availability given by
IBM is 99.999%. The continuous availability can be achieved thru the following facilities and protocols.
TCP/IP
VTAM
Unix System Services
Support for J2EE platform etc.,
20