Detector performance

The Detector is intended to be run against production CICS regions. However, over the period when the Detector is running, the CICS region suffers a performance degradation (dependent on the workload and number of affinities) equivalent to the performance impact of vendor monitor products that use the same user exits. The Detector is intended to be used over limited periods. To further limit the impact of running the Detector during periods of particularly heavy workloads, you can pause or stop the collection of data, or select speci®c commands or transactions to search for.

If your naming convention for TS queues uses a unique counter as part of the name, the Detector performance is likely to be worse than described above. This is because if every TS queue created has a unique name, the Detector creates a very large number of affinity records, which adversely affects performance.

The most likely reason for poor performance is the detection of TS commands. You may prefer to run the Detector twice, once for TS commands and once for all other affinity commands.

The Reporter component

The Reporter is a batch utility that you can use to convert the affinity data collected by the Detector into two output formats:

vA report presenting the affinity data in a readable form

This is intended for use by system programmers and application designers, and indicates the transactions and programs issuing the EXEC CICS commands that cause inter-transaction and transaction-system affinities. This information should help you understand the transactions making up the workload, and should highlight the changes you need to make to remove unwanted affinities.

vA ®le containing a set of basic affinity transaction group de®nitions in a syntax approximating to the batch API of CICSPlex SM

This is intended as input to the Builder, which can merge these basic groups into the combined groups suitable for input to CICSPlex SM.

The input to the Reporter is the three ®les of affinity data from a single CICS region. The output from the Reporter therefore describes the affinities detected in a single CICS region.

Note: The output produced may not contain all the transaction affinities in the CICS region concerned, because some affinities may not have been found by the Detector. You may have to supplement the basic affinity transaction groups with information from the Scanner report, or from your own knowledge of your transactions, before using the ®le as input to the Builder.

The Builder component

The Builder is a batch utility that you can run against a set of ®les containing the basic affinity transaction group de®nitions as created by the Reporter. The Builder produces a ®le containing combined affinity transaction group de®nitions suitable for input to CICSPlex SM.

18 CICS Transaction Affinities Utility Guide

Page 34
Image 34
IBM OS Detector performance, Reporter component, Builder component, Report presenting the affinity data in a readable form

OS specifications

IBM OS, or IBM Operating System, refers to a family of operating systems developed by IBM to support its hardware architectures. IBM has produced a range of OS versions tailored for different computing needs, such as mainframes, servers, and personal computers. Among the most notable operating systems in IBM's portfolio are OS/2, z/OS, and AIX, representing a blend of innovation and reliability that has defined IBM's reputation in the computing world.

One of the defining features of IBM OS is its robust multitasking capabilities. Both z/OS, predominantly used in IBM's mainframe environments, and AIX, the Unix-based system for IBM Power Systems, support multiple users and processes simultaneously. This ability allows organizations to run numerous applications in parallel efficiently, maximizing resource utilization and improving productivity.

In terms of security, IBM OS incorporates advanced features aimed at protecting data and maintaining integrity. z/OS offers multifactor authentication, data encryption, and a security model that adheres to the latest regulatory requirements. AIX provides Secure Virtualization, which enhances isolation and security in cloud environments, essential for enterprises handling sensitive information.

Another key characteristic is the adaptability of IBM OS to modern technologies. For instance, z/OS is designed to integrate with cloud computing, open source, and DevOps practices. This adaptability supports organizations in modernizing their infrastructure while retaining the stability associated with IBM solutions. AIX similarly supports containerization and virtualization, which are critical for optimizing resource usage in dynamic computing environments.

IBM's commitment to scalability is evident across its OS offerings. Organizations leveraging z/OS can handle enormous workloads and transactional volumes, making it a preferred choice for industries like finance and telecommunications. AIX also supports scalability, allowing businesses to expand their computing resources as demands grow without significant downtime.

The availability of development tools and environments is another noteworthy aspect of IBM OS. With robust IDEs and programming languages support, developers can create and deploy applications smoothly. This assists businesses in streamlining their development processes and improving time-to-market for innovative solutions.

In summary, IBM OS encompasses a suite of operating systems characterized by multitasking, security, adaptability to modern technologies, scalability, and comprehensive development support. These features have cemented IBM's position as a leader in enterprise solutions, allowing organizations across various industries to thrive in an increasingly digital world.