IBM OS manual Changing the Detector options, CAFF02

Page 52

Note: If there are a large number of data records to be saved, the CAFF screen may be frozen for some appreciable time, until the records have been saved.

You may want to stop the Detector when it has detected all affinities. This is indicated by the ªDate/time of last changeº ®eld changing very infrequently and, if the optional periodic saves are performed, the ªRecords written last saveº ®eld being consistently near zero.

If CICS shuts down normally, but the Detector is not stopped, the Detector eventually detects that CICS is not running and terminates cleanly with a save.

Changing the Detector options

You can control how the Detector operates by changing the options that it uses. Option values are preserved in the Transaction Affinities Utility control ®le, CAUCNTL, so that they can be used across separate runs of the Detector. For more information about the control ®le, see ªThe control record VSAM ®leº on page 17.

Notes:

1.Generally, any option can be changed while the Detector is stopped. However, some options can also be changed while the Detector is paused or running. (These options are identi®ed in the descriptions on page 37.)

2.You can change an option even if the Detector is stopped and the Reporter is running (that is, reading the CAUCNTL ®le).

To review and change the options that the Detector uses, press the F4 function key of the Detector control screen, CAFF01. In response, the Detector displays its options screen, CAFF02 (shown in Figure 7) is displayed.

To update the options screen, press Enter.

To return to the Detector control screen, press the F12 function key.

CAFF02

CAFF Operation Options

 

Applid CICSPDN1

Modify the options and press Enter to update, or press Cancel (F12)

 

Control options

„1…

 

 

 

 

 

Perform periodic saves

. . . . . .

Y

(Y=Yes or N=No)

 

Restore data on start.

. . . . . .

N

(Y=Yes or N=No)

 

Multiple signon with same userid . N

(Y=Yes or N=No)

 

Size of dataspace. . .

. . . . . .

16

(10

to 2000 MB)

 

Transid prefix (optional)

___

(1 to 3 characters)

 

Detect affinity types (Y=Yes or N=No)

„2…

 

 

 

Inter-transaction

Transaction-system

 

Transaction-system

Y „3…

ENQ, DEQ . . .

. Y

INQUIRE, SET

. .

. Y

WAIT

TS Queue . . .

. Y

ENABLE, DISABLE.

. Y

DISCARD

Y

ADDRESS CWA. .

. Y

EXTRACT. . .

. .

. Y

CREATE

Y

RETRIEVE WAIT.

. Y

COLLECT STATS. .

. Y

 

 

LOAD

. Y

PERFORM. . .

. .

. Y

 

 

GETMAIN SHARED . Y

RESYNC . . .

. .

. Y

 

 

CANCEL . . . .

. Y

 

 

 

„4…

 

Last updated by <userid>

on 11/24/95 09:04:35

 

F1=Help „5…

 

 

 

 

 

 

F12=Cancel

Figure 7. Detector options screen

36 CICS Transaction Affinities Utility Guide

Image 52
Contents IBM Page IBM Third edition March Contents Appendix A. Details of what is detected Reporter output Scanner output Examples Vi Cics Transaction Affinities Utility Guide Vii Trademarks Preface Argument zero Cics Transaction Server for OS/390 BibliographyCics books for Cics Transaction Server for OS/390 CICSPlex SM books for Cics Transaction Server for OS/390 Other Cics booksSummary of changes Xiv Cics Transaction Affinities Utility Guide Introducing transaction affinities Affinities, see the Cics Application Programming GuideRouting region Requesting regionTarget region What does dynamic routing cost? Benets of dynamic routingTransaction affinities Inter-transaction affinity Transaction-system affinityAffinity relations GlobalAffinity lifetimes Cics programming techniques for transaction affinitySafe programming techniques Unsafe programming techniquesSuspect programming techniques Avoiding the effects of transaction affinityProtecting applications from one another What next? Introducing the Transaction Affinities Utility Important noteAffinity utility program components Commands detected by the Transaction Affinities Utility Scanner component Detector componentWhat is detected Detector componentsWhat is not detected Worsening of transaction affinities relationsControlling the Detector How the affinity data is collectedSaving affinity data Affinity data Vsam les Control record Vsam leDetector performance Reporter componentBuilder component Report presenting the affinity data in a readable formIntroducing the Transaction Affinities Utility Cics Transaction Affinities Utility Guide Creating the Vsam les Preparing to use the affinity utility programEstimating the size of the MVS data space and Vsam les Dening the Vsam les to Cics #termidsPreparing to use the affinity utility program Cics Transaction Affinities Utility Guide Running the Scanner Creating a summary reportAffmod DD statement Creating a detailed report Cics Transaction Affinities UtilityContents of a detailed report Is an example of a detailed report produced by the Scanner Cics Transaction Affinities Utility Guide Changing the state Running the DetectorChanging the options Displaying the Detector control screen CAFF01When you can start collecting affinity data Starting the collection of affinity dataPausing the collection of affinity data When you can pause affinity data collectionWhen you can resume collecting affinity data Resuming the collection of affinity dataWhen you can stop collecting affinity data Stopping the collection of affinity dataChanging the Detector options CAFF02Restore data on start „1… The control options Perform periodic saves„4… Last update by userid Size of dataspaceTransid prex „2… Detect affinity typesDetector errors Cics Transaction Affinities Utility Guide Running the Reporter Requesting a report from the ReporterCAUAFF1, CAUAFF2, and CAUAFF3 DD statements Caucntl DD statementsCmdgrps DD statement Output from the ReporterTrangrps DD statement Affinity report System„1… Incorrect affinity types „2… Affinity types reported„3… Affinities reports TrangroupRecoverable CommandAffinity LifetimeProducing affinity transaction group denitions TerminalBTS Task Total TransactionsUsing the affinity report Afflifesystem Descaddress CWAUnderstanding the affinities Modifying affinity transaction groupsRemove false affinities Remove affinity relation worseningCompressing affinity data Using the IBM Cross System Product SPI commandsENQUEUEs/DEQUEUEs Shared storageDetailed affinity analysis ENQUEUE/DEQUEUEGetmain Shared SPI commands Cics Transaction Affinities Utility Guide DSPSIZE=16number Running the BuilderCONTEXT=plexname Repgrps DD statement Syntax for input to the BuilderAffgrps DD statement Builder input syntax Output from the Builder Header statementsCombined affinity transaction group denitions Combining basic affinity transaction groups Relation a Relation B Resultant relation C Empty transaction groups report Data sets processed reportGroup merge report Error report Sample group merge reportSample error report Cics Transaction Affinities Utility Guide Appendix A. Details of what is detected ENQ/DEQTS commands Load HOLD/RELEASEAddress CWA CANCEL/DELAY/POST/START SPI commands Wait commandsCics Transaction Affinities Utility Guide Scanner output Reporter outputExamples Example 2±VS Cobol Which occurs for the rst Move Move Cobol affinities Logon or System when Pconv expectedUnrecognized Transids Cics Transaction Affinities Utility Guide Detector table manager diagnostics Appendix D. DiagnosticsFunction code values Table identier values Reason code values Detector Cafb request queue manager diagnostics Date formatter diagnosticsReason code values This sectionIndex Bappl Vsam Cics Transaction Affinities Utility Guide Sending your comments to IBM Ibmr IBM

OS specifications

IBM OS, or IBM Operating System, refers to a family of operating systems developed by IBM to support its hardware architectures. IBM has produced a range of OS versions tailored for different computing needs, such as mainframes, servers, and personal computers. Among the most notable operating systems in IBM's portfolio are OS/2, z/OS, and AIX, representing a blend of innovation and reliability that has defined IBM's reputation in the computing world.

One of the defining features of IBM OS is its robust multitasking capabilities. Both z/OS, predominantly used in IBM's mainframe environments, and AIX, the Unix-based system for IBM Power Systems, support multiple users and processes simultaneously. This ability allows organizations to run numerous applications in parallel efficiently, maximizing resource utilization and improving productivity.

In terms of security, IBM OS incorporates advanced features aimed at protecting data and maintaining integrity. z/OS offers multifactor authentication, data encryption, and a security model that adheres to the latest regulatory requirements. AIX provides Secure Virtualization, which enhances isolation and security in cloud environments, essential for enterprises handling sensitive information.

Another key characteristic is the adaptability of IBM OS to modern technologies. For instance, z/OS is designed to integrate with cloud computing, open source, and DevOps practices. This adaptability supports organizations in modernizing their infrastructure while retaining the stability associated with IBM solutions. AIX similarly supports containerization and virtualization, which are critical for optimizing resource usage in dynamic computing environments.

IBM's commitment to scalability is evident across its OS offerings. Organizations leveraging z/OS can handle enormous workloads and transactional volumes, making it a preferred choice for industries like finance and telecommunications. AIX also supports scalability, allowing businesses to expand their computing resources as demands grow without significant downtime.

The availability of development tools and environments is another noteworthy aspect of IBM OS. With robust IDEs and programming languages support, developers can create and deploy applications smoothly. This assists businesses in streamlining their development processes and improving time-to-market for innovative solutions.

In summary, IBM OS encompasses a suite of operating systems characterized by multitasking, security, adaptability to modern technologies, scalability, and comprehensive development support. These features have cemented IBM's position as a leader in enterprise solutions, allowing organizations across various industries to thrive in an increasingly digital world.