S/390 Server Consolidation A Guide For It Managers: Michael Macisaac, Mike Duffy, Martin Söllig, Ampie Vos
S/390 Server Consolidation A Guide For It Managers: Michael Macisaac, Mike Duffy, Martin Söllig, Ampie Vos
S/390 Server Consolidation A Guide For It Managers: Michael Macisaac, Mike Duffy, Martin Söllig, Ampie Vos
http://www.redbooks.ibm.com
SG24-5600-00
SG24-5600-00
October 1999
Take Note!
Before using this information and the product it supports, be sure to read the general information in
Appendix B, “Special Notices” on page 133.
This edition applies to all S/390 hardware up to G6, and releases up to Version 2, Release 8 of OS/390.
When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the
information in any way it believes appropriate without incurring any obligation to you.
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
The team that wrote this redbook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Comments welcome . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
v
A.2 Successful OS/390 UNIX in-house port . . . . . . . . . . . . . . . . . . . . . . . . . 128
A.2.1 Business need . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
A.2.2 Description of solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
A.2.3 Value to customer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
A.2.4 Lessons learned . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
A.3 Successful OS/390 UNIX vendor port. . . . . . . . . . . . . . . . . . . . . . . . . . . 130
A.3.1 Business need . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
A.3.2 Description of solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
A.3.3 Value to vendor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
A.3.4 Lessons learned . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
A.4 Successful LAN data consolidation onto OS/390 . . . . . . . . . . . . . . . . . . 130
A.4.1 Business need . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
A.4.2 Description of solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
A.4.3 Value to customer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
A.4.4 Lessons learned . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
A.5 Java port to OS/390 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
A.5.1 Business need . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
A.5.2 Description of solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
A.5.3 Value to customer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
A.5.4 Lessons learned . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
This redbook was written for Information Technology (IT) managers who want
to improve their understanding of how IBM S/390 servers can integrate with
other systems, and how S/390 servers can run new applications such as
Lotus Domino, SAP R/3 and Internet solutions. S/390’s scalability and ability
to run multiple workloads enables you to consolidate or reduce the number of
servers you may have.
Michael MacIsaac is a team leader for S/390 redbooks and workshops at the
ITSO Poughkeepsie Center. He writes about, and teaches IBM classes on,
S/390 Server Consolidation. Michael has worked at IBM for 12 years, mainly
as a UNIX programmer. He has written redbooks on NT porting to OS/390,
S/390 file serving capabilities, and was the main author of the redbook
Networked Applications on OS/390 UNIX.
Mike Duffy is a Senior Instructor with IBM Learning Services in the UK where
he teaches and develops courses in the S/390 curriculum area. In his 25
years with IBM he has worked in a wide range of areas, including specialist
support on most of the items covered in this redbook. He has produced many
presentations, white papers and technical booklets dealing with LAN and
S/390 integration, ADSM, OSA-2, TCP/IP, and e-Business.
Mike was not part of the residency that created the redbook; however, it was
based on a white paper he wrote in 1997.
Martin Ferrier
IBM UK
Alfred Trompeta
MOSAIC Software AG
Budi Darmawan
IBM Austin
Comments welcome
Your comments are important to us!
Now IT agendas are changing again. Priorities are moving from business
units, divisions and departments to large-scale organizational systems.
Infrastructures are being put in place to support new goals of business
integration, transparency of information and electronic business (e-business)
across the entire enterprise.
There have been many studies of the total cost of distributed client/server
computing, but all analysts agree on one thing: in a “pure” client/server
implementation across a large enterprise, the hidden costs are staggering.
The components are already familiar: high maintenance and support
demands; reduced end-user productivity; increased training costs;
multiple-site software licensing costs; poor security; increased downtime and
lost data.
Figure 1 shows the four categories grouped into two consolidation phases,
physical (centralization and physical consolidation) and logical.
System Integration
Logical
Application
Integration
Data
Integration
Physical
Physical
Consolidation
Centralization
1.1.1 Centralization
Server consolidation means different things to different people. As shown in
Figure 2 on page 3, in its simplest form, servers are physically moved to a
common location. Because this simplifies access for the IT staff, it helps
reduce operations support costs, improve security, and ensure uniform
systems management. This is an important predecessor to future
consolidation activities.
Figure 2. Centralization
a a
The ability to physically consolidate is fed by Moore’s law - the fact that the
number of transistors which can be put on a chip doubles approximately every
18 to 24 months. The “law”, which shows no sign of coming to an end soon,
means that more powerful servers are always available.
a
a a
a
Enterprise servers are a logical safe haven for data that is now scattered in
Local Area Networks (LANs) throughout the enterprise. When all corporate
data resides on the same robust system, the efficiencies can deliver
immediate payback to end users. Data sharing throughout the enterprise is
vastly simplified. Consolidation allows high levels of security and data
integrity that are nearly impossible to achieve in a distributed environment.
a b a b
d e d e
When a single server is able to run multiple workloads, multiple servers which
are dedicated to run individual workloads can be consolidated. When the
distributed servers and the consolidation server run the same applications
and operating system, the migration is relatively straightforward.
Based on the consolidation platform, this migration can take different forms:
• The migration may just be the relocation of the application on the server.
• The migration may imply that application programs have to be recompiled
in order to run on the new platform.
• It may also imply that application programs have to be redesigned and
rewritten in order to run on the consolidation platform.
The S/390 Enterprise Server has been the main platform for enterprise data
processing operations for many years. The unique strengths of the IBM S/390
platform – its ability to run multiple workload types with exceptionally high
reliability, throughput, security and manageability – have been imitated but
never matched by other server platforms.
As the trend to server consolidation grows, the role of S/390 servers is again
being redefined. This chapter highlights the design principles of S/390 and
their implementation, which make S/390 a powerful, reliable and manageable
platform for running commercial applications. Special focus is put on the
ability of S/390 to perform as a server in a client/server environment.
Size/Capacity Mid-range
PC
File...Print...Communication...Database...Application Processing
Historically, all these servers had their own field of applications, strictly
separated from the others. While the smaller PC and UNIX servers were
originally designed and optimized for processor-intensive work, the AS/400
and the large-scale servers come from a commercial background, where the
key requirements are to process and store vast amounts of data.
In recent years, the differences between the three classes of servers have
been decreasing, while applications have become portable or even
interoperable among the different platforms. While OS/390 servers embraced
open systems, midrange UNIX servers and even PC servers have been
equipped with powerful processors and huge storage subsystems. IBM's
Small computers play a vital and growing role in today's computing world. But
time has shown that costs are higher and availability is lower when the job of
a large server is done with a group of small computers. An analogy is that
“you can move a pile of sand with one bulldozer or a thousand shovels”.
S/390 is acknowledged by consultants, such as IDC, Gartner Group, Xephon,
ITG, and others as having one of the lowest overall costs of ownership when
calculated over many years.
Relative G5 Server
Performance
9021-711 G4 Server
R1/2/3 G3 G4 G5/G6
IBM S/390 servers have been designed for such continuous availability. All
the components of the S/390 architecture focus on reliability and
serviceability. This book will briefly summarize these features.
Memory error checking and correction code is able to detect and correct up to
four bit errors in a single memory chip, reducing the possibility of an outage
due to a memory chip failure. In the event of cache and directory errors, the
affected areas will be removed from the configuration, while processing will
continue. The processor storage cards are equipped with spare memory
chips, and dynamic storage reconfiguration of both central and expanded
storage is available. Storage background scrubbing provides continuous
monitoring of storage for the correction of detected faults before the storage
is used. In the event of a memory card failure, Partial Memory Restart
enables the system to be restarted with half of the original memory.
The power system offers dual primary (AC) power feeds, each electrically
isolated and enabling redundant power paths to each server. The power
subsystems are designed with N+1 redundancy, which ensures that a failure
of a power thermal component does not cause a system outage, while
concurrent replacement of the failed component results in avoidance of a
planned outage. The Internal Battery Feature (IBF) further enhances the
robustness of IBM CMOS power design, increasing power line disturbance
immunity.
Fault-tolerant features of the ESCD are available, such as a spare Token Ring
card, power supply, control processor, matrix controller and switch.
For example, the internal disks of the Multiprise 2000, the Dual Copy
functionality of the 3990 and 9394, and the two forms of Remote Copy;
Peer-to-Peer Remote Copy (PPRC) and eXtended Remote Copy (XRC) in the
3390-6 and the RAMAC Virtual Array (RVA) are RAID-1 implementations.
This means the disks are mirrored to duplicate the data. The 9392 and 9395
RAMAC drawers and the RAMAC Scalable Array (RSA) contain RAID-5
implementations, where data is stored on multiple disk drives, with a portion
of each drive used to maintain parity information for the other drives. The RVA
is a RAID-6 implementation. The Enterprise Storage Server (see 2.8.3, “The
Seascape architecture” on page 55) is usually a RAID-5 implementation, but
additionally it allows individual groups of disks to be configured as non-RAID
(RAID-0) devices.
The sections that follow discuss the ability of S/390 to share resources
among applications within:
• A system image (see 2.4.2, “Multiple workloads” on page 26)
• A S/390 server Central Electronic Complex (CEC) (see 2.4.3, “Logical
partitioning with PR/SM” on page 27)
• A Parallel Sysplex cluster (see 2.4.4, “Parallel Sysplex” on page 29)
Servers
Data
Coupling
Technology
The distributed data implementation, shown on the left side of the figure,
does not lend itself to high performance OnLine Transaction Processing
(OLTP) due to slow intersystem network communications. It was, therefore,
not considered as a solution for IBM's Parallel Sysplex.
With the shared approach, shown on the right side of the figure, all servers in
the cluster have equal access to all data. This allows the workload to be
distributed based on processor load rather than by data location. With the
shared data approach, workload and processor changes do not require a
reorganization of the data. IBM has used shared data in coupling S/390
processors and continues to use both shared data and partitioned data. The
new development emphasis for S/390 parallelism is on shared data.
Partitioned Shared
Coupling
Technology
Coupling
Technology
In the shared data environment, the workload can run on any server because
each has identical access to the data. Therefore, intelligent scheduling can
Comparing a tuned benchmark to a real workload, one can see that the
utilization of the CEC/server and the processors within the CECs are
different. The shared system is better able to manage variations in workload
due to the shared data structure and workload balancing.
Coupling Technology
Domain 3 -
Business Intelligence /Data Mining
Percent CPU Utilization
100
Domain 1 - OLTP
50
0
00:00
01:00
02:00
03:00
04:00
05:00
06:00
07:00
08:00
09:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
18:00
19:00
20:00
21:00
22:00
23:00
24:00
00:00
01:00
02:00
03:00
04:00
05:00
06:00
07:00
08:00
09:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
18:00
19:00
20:00
21:00
22:00
23:00
24:00
A S/390 server can easily support large online transaction systems with
consistent subsecond response times, concurrently with large batch jobs,
print jobs and other workloads. This can be done based on business priorities
for each workload using the OS/390 Workload Manager - a performance
specialist working at processor speed.
LPAR can work in this way if desired, but it is normally configured to work
with shared processors. To explain this concept, consider the example
illustrated in Figure 16.
3 LPs
DEV
4 real
processors 2 LPs
TEST
Here we have a S/390 which has four processors (engines). There are three
logical partitions: PROD for production, DEV for development and TEST for
system programmer use. PROD is set up with four logical processors (LPs),
DEV with three, and TEST with two.
The LPAR microcode maps the work dispatched on each logical processor to
any one of the real processors using the priorities defined in the LPAR
configuration. For example, the relative priorities might be 70 percent for
PROD, 25 percent for DEV and 5 percent for TEST.
With this configuration, if all partitions have sufficient work to drive the S/390
to full capacity, then the processor resource would be shared in the above
ratios. However, should the PROD partition only need 50 percent, then other
partitions can use the spare capacity and extend beyond their nominal share.
When the higher priority partition needs more resource, LPAR once again
reallocates processing power as appropriate. This allocation is performed on
Because LPAR does not waste, or fence off processing power when running
partitioned workloads, S/390 can process more real work than other systems
of equivalent power when running partitioned.
Each LPAR is a totally protected environment such that work running in one
LPAR cannot affect work in another LPAR. Two years ago IBM completed an
evaluation in the UK under the European certifications scheme (ITSEC) at the
E4 level, which was the highest level of assurance achieved for an IT product
in the UK. Consequently, LPAR is an ideal way to introduce new work onto
the S/390 platform, knowing that it will not compromise existing production
and other business-critical applications.
For example, most S/390 installations run at least one test partition in order to
install and test new systems software. Companies wishing to try out
Web/Internet services, or installing Lotus Domino for S/390, might install
these in separate LPARs until such time as they were better understood or a
strategy for them had been decided upon. Current S/390 CMOS processors
support up to fifteen LPARs on a single machine.
Scalability and flexibility are the center of that strategy. The scalability of
Parallel Sysplex is virtually without limit, providing an infrastructure that is
responsive to growth demands. The flexibility of Parallel Sysplex allocates
processing power dynamically, in real time, to the points in the system where
demand is greatest. Workload balancing allows IT managers to optimize the
use of existing capacity, and allows upgrades to be purchased on a “just in
time” rather than a “just in case” basis.
Sysplex Timer
ESCON/FICON
Shared data
For continuous availability, the coupling facility, the Sysplex Timer and all the
connections to the servers are usually duplicated. In the case of a failure,
alternative resources are ready to take over the tasks of the failing ones. If
any disruptive maintenance is necessary, the tasks can be shifted.
G5 G6 XZ7
ZZ7
ZY7
XY7
YX6 ZX7
XX7
Y96 Z97
X97
Y86 Z87
X87
Y76 Z77
RX6 X77
R96 Y66 X67 Z67
R86 Y56 X57 Z57
R76 Y46 X47 Z47
R66 Y36 X37 Z37
RD6 R56
RC6 R46 Y26 Z27
X27
R26 R36 Y16 Z17
X17
R16
G6 "Turbo" Models
T26 Glass Ceramic Glass Ceramic
RB6 G5 "Turbo" Models
T16 Substrate Substrate
RA6 Glass Ceramic MCU (Modular MCU (Modular
Substrate Cooling Unit) Cooling Unit)
Glass Ceramic MCU (Modular Cooling 14 PUs 14 PUs
Substrate Unit) Up to 12 CPs Up to 12 CPs
Alumina Ceramic 8/12 PUs 12 PUs 2 SAPs Standard 2 SAPs Standard
Substrate Up to 10 CPs Up to 10 CPs 5 - 32 GB Memory 5 - 32 GB Memory
6 PUs 8 - 24 GB Memory 1.8 ns Cycle time 1.57 ns Cycle time
2 - 24 GB Memory
Up to 4 CPs 2.0 ns Cycle time X17, X27 CBU only
2.4 ns Cycle time Z17- Z67 CBU only
1 - 12 GB Memory Y16, Y26 CBU only
2.6 ns Cycle time T16, T26 CBU only
There are 16 S/390 Multiprise 2000 models in the family. The 16 models
consist of eight uniprocessor models, three 2-way models, two 3-way models,
two 4-way models and a 5-way model. The models offer up to a 45-fold
growth from the Model 202 (about 4 MIPS) through the Model 257 (160
MIPS).
All S/390 Multiprise 2000 Models offer a wide range of features that allow the
system to operate in many different processing environments (see Figure 19
on page 34).
The IBM S/390 Integrated Server contains a processor card with 256 MB of
integrated S/390 memory, internal SSA RAID-5 DASD, and the S/390
Licensed Internal Code that runs the full S/390 instruction set. Up to 13 PCI
I/O ports and 3 ISA slots can be used, and if more than the initially installed
36 GB of usable DASD is needed, the amount of SSA storage may be
increased up to 255 GB within the system unit. In addition to the SSA DASD,
VTAM TCP/IP
Transaction Manager
Batch
CICS TSO IMS TM
S/390 Processor
OS/390 handles more work than any other commercial operating system. In
its current iteration, it delivers a level of flexibility never before available to
large computing systems.
R5
Version 1 Systems Mgmt with
R4 Novell NDS* Tivoli
DFS Enhanced Support eNetwork CS
R3 DCE Enhancements Enhancements
WebSphere Application
R2 eNetwork Server
R1 DFSMS 1.5
BookServer Communications Server for OS/390
UNIX RAS &
DCE Application Firewall Technologies OS/390 NFS with Sun Ease-of-Use
Integration Support NFS V3
WLM DNS for Domino DFS RAS &
Security Server Domino Go Go Webserver for eNetwork Performance
Webserver for OS/390 OS/390 Communications Server
ServerPac Changes TCP/IP & UNIX
eNetwork Parallel Sysplex Enh Performance
ITAA Certified as Year Communications TCP/IP & UNIX
Security Server LDAP Security
2000 Ready starting Server Performance
with R2 Encina Toolkit UNIX Function and Cryptography
Security & Cryptography
Executive Performance enhancements
UNIX 95 enabled Component Broker*
ICSF OS/390 Print Server Parallel Sysplex
Parallel Sysplex Enh Parallel Sysplex Enhancements
JES2 & JES3 OSA/SF Enhancements
Enhancements
Object Technology Service Update Facility RMF, HCM Enhanced
Parallel Sysplex Enh OSA2 Enhancements
OS/390 Application Security Server OS/390 DFS
Enabling RMF, WLM, HCD
Simplified Planning, Enhancements
Enhanced
Secure Network Install, Test and Native ATM TCP/IP
Computing Maintenance Support
Native SNA ATM UNIX Function and
Performance
support
WLM Batch Mgmt.
Communications
Server
The foundation for good systems management is designed into OS/390 and
its optional elements. OS/390 contains several key components that provide
facilities for the additional systems management products to connect to and
interact with. Chapter 4., “Systems management” on page 71 provides a
detailed discussion of the system management components on S/390.
Backup copies of the data are usually produced at night when all applications
using this data are stopped. This usually results in an application outage. If
the data is corrupted, this corruption can be passed to the backup copies.
With increasing volumes of data and demands to provide 24-hour a day,
365-day a year service, new approaches to backup and recovery are
required.
The S/390 platform is renowned for its continuous availability features. In this
section the capabilities of S/390 regarding backup and recovery are
discussed.
Site A Site B
Local copy and remote copy Local copy and remote copy
2.6.3.2 DFSMS
The simplest way to get a logical backup copy of data is to run a job that just
copies the data to tape. However, in a complex enterprise computing
environment, it is impossible to implement backup procedures based on this
methodology. The packaging of OS/390 contains a product that enables the
automation and centralization of storage management. The Data Facility
Storage Management Subsystem (DFSMS) is the key to system managed
storage in an OS/390 environment.
Many database applications depend on their data being open for update over
a long period of time. Normally a backup of the data cannot be made while it
is open, so the application has to be closed during the backup process.
The copy utility of DB2 can be used to produce a copy of the data, while the
applications continue to read and write the data. Also DB2 provides a
common log to record data changes for all activities running in the DB2
subsystem. Recovery is done with an image copy, complemented by log
records.
Leaving the protection of critical data to individual users does not necessarily
guarantee that data will be consistently backed up or that backup versions will
be stored in a safe place. The truth of the matter is that end users often view
backing up their data as a nonproductive task that frequently gets put off for
another day. What is more, if users do back up their own data, recovering it
can be more labor intensive and time-consuming than they would prefer.
When data is lost, the impact can be severe and sometimes devastating.
Under these circumstances, users should not have to spend unnecessary
time searching through diskettes and tapes trying to locate the correct
version of data they need to recover. With some backup solutions, users may
find the recovery process more difficult and labor intensive than the actual
backup process itself. Tivoli ADSM addresses these issues.
2.6.4 Security
Security is a classic strength of IBM S/390. It includes an integrated suite of
security functions that provide centralized management, enhanced
performance and greater safeguards for network, system and transaction
security.
A logical question that arises with the combination of S/390 and a UNIX
environment is: How can I use my superior S/390 databases with new
Web-based applications, developed in object-oriented languages and UNIX
tools? The answer has already been provided by OS/390, which contains a
convenient set of interfaces, connectors and gateways for Web-based
applications. These connectors and gateways are shown in Figure 24 on
page 46.
CICS Connectors
for S/390
IMS Connectors
for S/390
Internet MQSeries
Internet Gateway
AIF
Internet Gateway
JAVA
Internet Gateway
Domino
Connectors
Furthermore, the traditional UNIX database systems like Oracle have been,
or are able to be, ported to OS/390 UNIX, but these applications do not have
as powerful continuous availability features as the mature S/390 database
and transaction management systems.
Full UNIX
branding
MVS Datasets
hierarchical databases
files
Std
rlogin UNIX*
telnet S/390
nfs
TCP/IP
ftp and
tn3270 SNA
HFS file systems are implemented in OS/390 like any other data structure
using the DFP component of DFSMS/MVS. The HFS is made up from
multiple MVS data sets, of type=HFS, and are allocated in the standard
manner. During OS/390 UNIX initialization, these datasets are linked together
in a logical hierarchy. Each HFS is a mountable file system. The root file
system is the first file system mounted. Subsequent file systems can be
mounted on any directory within the root file system or on a directory within
any mounted file system.
These topics and more are discussed in more detail Chapter 3, “Networking
and connectivity” on page 59.
The key of all this developments in the coming years is the way in which all
the applications, all the data and all the technologies in the enterprise work
together. The hardware has to be connected and managed, while the
applications should be able to exploit all the resources.
In the following sections, the IBM strategy for Storage Area Networks (SAN)
and the related technologies and already available products is discussed.
Inherent in the promise of SANs are two compelling advantages. The first is
the creation of a true information utility. By eliminating the one-to-one
relationship between individual servers and critical business data to create a
corporate information “bank”, a SAN can make that information readily
available across the enterprise. The second advantage is that a SAN can
provide a faster, more effective way to deal with rapidly increasing volumes of
information. With a separate information management network, additional
capacity can be “plugged in” as needed with minimal impact on the
performance of application or transaction servers, LANs or WANs.
SANs promise more responsive and robust systems, as well. For example, by
reducing the amount of traffic that must travel along corporate networks,
installing a SAN has the effect of increasing available bandwidth. The result
SANs have been available in the S/390 world for years. In fact, IBM has been
in the SAN game since 1991 when it introduced the first generation storage
network, ESCON, a serial, fiber optical, point-to-point switched network
connecting disk, tape, and printing devices to MVS hosts. Although its initial
entry into the market was as a high-end solution, ESCON has responded to
customer demands for open connectivity and has matured to become truly
heterogeneous, supporting either native ESCON attachment or ESCON
attachment via converters or gateways to multiple systems, including UNIX
servers from IBM, HP, Sun, DEC and Sequent as well as Windows NT
platforms. Today, IBM is aggressively working with the industry to use its
years of experience and expertise in first generation SAN technology and
SAN management in the S/390 world to deliver the second generation SAN,
enabling all the benefits of a switched network topology in today’s open
environment.
IBM believes that SAN technology will evolve over three major phases (see
Figure 27 on page 52):
• Phase 1: SAN-attached storage. The focus will be on connectivity.
• Phase 2: SAN optimized storage. This phase will begin to exploit the SAN
characteristics and deliver early SAN solutions.
• Phase 3: SAN optimized systems. The maturity of the technology will be
used and system-wide solutions will be delivered.
Advanced Functions
movement for remote copy, Interoperability
FC attachment via gateways and instant copy, data migration,
native adapters Heterogenous operating
LAN-less backup systems, RDMS standards
Box-level SAN management and
Extended fabric management Application software to exploit
reporting
Benefits include: potential
Simple SAN solutions
Improved data movement Security issues
Hubs and switches
performance
All building blocks functional
Storage servers exploit Fibre
Benefits include: Channel connectivity
Fewer adapters and cables Reduced server processing
Extended adressing and workload for storage
distance Standardization of storage
Greatest benefits in area of processing
SCSI replacement
time
The role of the S/390 servers in this SAN architecture is quite obvious: it
should be the heart of the SAN. S/390 offers the most secure, reliable,
manageable and scalable platform in a SAN, so it is logical choice to run
mission-critical business applications. The classical strength of S/390 can be
used to manage the data flow in the SAN in the most effective way. The
enhanced connectivity and interoperability offered by a SAN enhances the
importance of S/390 acting as an open server.
The S/390 G5 and G6 systems now have a new high bandwidth channel type
based on FC technology, called FICON (FIber CONnection), as described in
3.3, “FIbre CONnectivity (FICON) channel” on page 61. FICON uses a new
mapping protocol that is intended to take full advantage of the unique
characteristics of the Fibre Channel standard, and to insure a seamless level
of compatibility with the existing Fibre Channel component infrastructure.
The new FICON channels allow ore efficient and faster data transfer, while at
the same time allowing customers to use their currently installed single mode
and multimode fiber cables. The FICON attachment will be implemented in
three phases, as illustrated in Figure 28 on page 55. In the first phase, the
9032 Model 005 Director supports FICON through the use of a FICON bridge
card and is intended to provide investment protection for currently installed
ESCON control units, which are enabled to exploit the FICON channel
without any changes.
FICON
CU
S/390
G5/G6 FICON Full Dynamic Switching of FICON
Switch
Servers Control Units
FICON
CU
The next Statement Of Direction (SOD) is for FICON switch connectivity. IBM
will provide a new FICON Switch that will enable full dynamic switching of a
FICON control unit between multiple channels, as well as between multiple
FICON control units connected to a single channel.
SSA Device
Adapter
If the loop breaks for any reason, then the adapter card will automatically
reconfigure the loop into two single loops. In the ESS, the most likely
scenario for a broken loop is if the actual disk drive interface electronics
should fail. If this should happen, the adapter card will dynamically
reconfigure the loop into two single loops, effectively isolating the failed disk.
If the disk were part of a RAID array, the adapter card would automatically
regenerate the missing disk using the remaining data and parity disks to the
SSA does not change disk technology, it changes the storage paradigm. In
essence, it changes the communications infrastructure of disk subsystems,
allowing them to transfer more information to and from hosts in a substantially
more efficient manner, at lower cost, over wider distances, with greater
configuration flexibility than ever before.
IBM has a range of products for all areas of networking such as IP routing
with the IBM 2210s, LAN switching with IBM 827xs and an expanding range
of ATM products.
TCP/IP comms
OSA (integrated adapter)
3746 (communications
controller)
3172 (interconnect controller)
2216 (channel attached router)
RS/6000 (channel attached)
Direct Channel
FICON (Fibre
Connections)
ESCON
MMC (MCA ESCON) card
SNA comms
OSA (integrated adapter)
PCI-ESCON
3745/6 (communications
Parallel
controller)
3172 (interconnect controller)
2216 (channel attached router)
RS/6000 (channel attached)
3174 (cluster controller)
3.1 TCP/IP
TCP/IP is a communications protocol specifically designed for the Internet.
What can confuse people is that most providers of TCP/IP (UNIX, NetWare,
Windows NT, OS/2, OS/390, VM and others) also include a standard set of
TCP/IP applications. When people talk about TCP/IP, it generally includes the
protocol and these standard applications. The applications generally include
both client and server components. Some of the more well-known
applications are as follows:
• Domain Naming System (DNS) allows the use of names rather than dotted
decimal IP addresses.
• File Transfer Program/Protocol (FTP) is a facility to transfer files between
TCP/IP systems.
• Telnet allows a user to login and work on a remote system. A common
variant of Telnet when connecting to S/390 systems is TN3270 which
provides a full screen 3270 session, although it can also connect as a
line-mode terminal.
• Network File System (NFS) -allows transparent access to files on a remote
system.
• X-Windows is a windowing system that provides simultaneous views of
several executing programs or processes on bit-mapped displays.
3.2 ESCON
ESCON, also called serial I/O interface, is a type of channel path that allows
attachment of one or more control units to an S/390 channel subsystem by
using optical fiber links and provides protocols required for information
transfer over that channel path. See Figure 31 on page 61.
CU
ESCON Channels
10 MB/sec --> 17 MB/sec Data CU
Features)
CU
43 km/26.7 miles with 9729
Wavelength Division Multiplexer CU
Switched Point-to-Point Topology -
Connectivity CU
Parallel channels use copper-based cable and are not easy to work with due
to their size and weight. The future is moving towards fiber-based technology
and the phasing out of the use of parallel channels.
infrastructure FICON
Over the last decade ESCON has been delivering to S/390 customers
increased distance, reduced cable bulk, disk and tape pooling, clustering and
data sharing, while providing sophisticated management. Numerous other
vendor systems also support ESCON, which was adopted as a national
standard in 1996 by NCITS. FICON is based on NCITS Fibre Channel
standards and therefore S/390 is positioned for full participation in
heterogeneous fiber channel-based SANs in the future.
FICON can coexist with current channels in any model G5, G6 or follow-on
server. It is designed to support 100 MB/s bi-directional data transfer rates
compared to ESCON's 17 MB/s unidirectional throughput at distances of up
to 20 kilometers over fiber-optic cables.
The initial FICON implementation attaches existing ESCON devices, via the
FICON Bridge, with each FICON channel supporting up to eight ESCON
channels. Native FICON devices permitting direct attachment to servers will
follow.
The OSA is a fully integrated, S/390 hardware feature which is now available
on the entire IBM 9672 R2 and R3 range up to the IBM G6 and Multiprise
2000 CMOS processors see Figure 33.
OSA OSA
OSA-1 OSA-2 Express Express
Future ?
1Q 1995 10-95 Token-Ring 06-99 GA 4/16/100 TR
Token-Ring 10-95 Ethernet Gigabit Ethernet 622 ATM
Ethernet 10-95 FDDI SOD:
FDDI 09-96 155 ATM Fast Ethernet
09-96 OSA-2 Standard 155 ATM
97 ATM Enhancements
97 SNA Enhancements
97 VSE support
04-98 Fast Ethernet
3.4.1 OSA-2
Current LAN-to-host gateway boxes consist of a control unit function (engine)
with one or more LAN adapters and one or more channel adapters. The LAN
adapters may be Token-Ring, Ethernet or FDDI. The channel adapters may
support either parallel or ESCON channel links.
Each OSA-2 option is a single card. This card plugs into an I/O channel slot
and takes on the first channel number associated with that slot. The
Multiprise 2000 can take up to six OSA-2 cards and all other supported
processors can take up to 12. The OSA-2 cards can be of any mix of the five
types; see Figure 34 on page 65.
FDDI The FDDI card has one LAN port that can be attached to a
100 Mbps FDDI LAN. The LAN must conform to either the
ANSI X3T9.5 specification or the ISO 9314 specification. The
FDDI card has three connectors; two are for the primary and
secondary LAN connections; the third is for an optical bypass
switch.
ENTR An ENTR card has two ports, which is equivalent to having
two LAN adapters. On the OSA-2 card, the two ports are one
below the other. Each port has three connectors which can
attach to a 10 Mb/s Ethernet LAN or a 4 or 16 Mb/s
Token-Ring LAN. So, with a single ENTR OSA-2 channel, two
Token-Ring, two Ethernet or one Token-Ring and one Ethernet
LAN can be linked.
ATM An ATM card has a single physical port but when set up for
ATM LAN emulation, it can be configured as two logical ports.
One logical port is for emulating a Token-Ring LAN, the other
for emulating an Ethernet LAN. The ATM OSA-2 supports both
TCP/IP and SNA in LAN emulation mode and can additionally
support SNA in native ATM mode. (The OSA-2 ATM offers
Forum Compliant LAN emulation).
Fast ethernet A Fast ethernet card increases the speed from 10 to 100
Mb/s, increases connectivity bandwidth, and delivers ease of
use. Additionally it preserves the frame format, wiring
structure, and management of 10 Mb/s Ethernet. The Fast
ATM,
Frame Relay
TCP/IP Network
SDLC
APPN Switch
V.35
HPR
ATM
Network
ATM
FDDI
Token-Ring
155 ATM
FDDI
Token-Ring
10/100 Ethernet
Ethernet
Gigabit Ethernet is ten times faster than today's Fast Ethernet standard at
1000 Mb/sec. This significant scalability benefit can only be realized through
integrated S/390 communications adapters becoming more tightly bound to
the IBM S/390 Enterprise Server with OSA-Express GbE.
IBM has also taken steps to ensure that customers can move to these new
I/O standards as required. G5 and G6 servers provide the ability to remove
older I/O cards non-disruptively and replace them with higher performance
cards supporting FICON channels, OSA-Express Gigabit Ethernet and other
evolving technologies that will meet the bandwidth demands of e-transaction
processing. For further discussions on the topic see the redbook S/390
OSA-Express Gigabit Ethernet Implementation Guide, SG24-5443.
Each CIP takes up a single slot in a Cisco 7000 or 7010 router and can
support up to two channel connections. Channel connections can be a
mixture of Parallel or ESCON or can be two of the same kind. This solution
supports speeds ranging from low-speed serial links, to moderate-speed
Ethernet and Token Ring LANs, to high-speed ATM and FDDI networks.
System Automation for OS/390 (SA OS/390) offers this broad scope and
power to cover monitoring, automation, and manual control of the full
operational life cycle of S/390 systems. SA OS/390 is a Tivoli product with a
prerequisite of NetView. It delivers the functions to combine and integrate
what were previously three separate products (however, the last two can be
run natively on OS/390):
The user interface is based on the NetView Graphic Monitor Facility, which
SA OS/390 exploits to present graphic images of systems, subsystems and
applications, and volumes. The status of the resource is updated dynamically
based on system events. Thus NetView itself, its Multisystem Manager, and
System Automation for OS/390 all provide function on a foundation that helps
organizations to bridge system and network operations. For example,
operators can monitor LAN resources (through Tivoli NetView) or OS/390
applications, Parallel Sysplex resources, or DASD volumes all using the same
user interface. SA for OS/390 provides host, as well as workstation, user
interfaces, and provides programming interfaces suitable for customer-related
automation.
Different workload types can have very different objectives in response time
or batch turnaround time. WLM will then manage dispatching priorities, use of
memory, and other resources to try to achieve the objectives for all of the
workloads. This is done automatically by the system on a second-by-second
basis. There is no need for the user to work out the right dispatching priorities
and memory usage for each application, and no need to monitor and change
the system as the workload mix changes.
Systems management 73
The topic previously discussed concerned systems management on the
S/390 platform itself. S/390 is now also playing a wider role in the systems
management of the enterprise. This involves being managed by or managing
distributed environments with Tivoli’s help.
Tivoli
Deployment Availability Security Operations
Value
Software Distributed Security Workload Remote
Distribution Monitoring Management Management Control
Infrastructure
Inventory Enterprise User
Netview Storage Service
Management Console Administration
Management Desk
Systems management 75
• Operations and administration - automates activities to ensure service
levels and streamlined tasks (Tivoli Remote Control, Tivoli Workload
Scheduler, Tivoli Output Manager, Tivoli Service Desk)
To bring it all together, Tivoli Global Enterprise Manager (GEM) unifies the
management of cross-platform business applications. GEM extends the
capabilities of Tivoli to provide a new paradigm for applications management
called business systems management. Business systems management
allows customers to manage groups of related applications that underpin and
enable critical business functions, such as catalog and order processing
systems, enterprise resource planning (ERP), or enterprise-wide e-mail.
The Tivoli management server controls and configures gateways and agents,
assigns agents to gateways, and keeps track of every agent in a Tivoli
Management Region (TMR).
Systems management 77
• System and network monitoring and operation
• Network problem determination and diagnosis
Used with Tivoli GEM, it supports the management of applications that extend
across multiple platforms. These two, working together, unify the
management of OS/390 and distributed environments.
Systems management 79
impact on availability and productivity. Because its actions can be
cross-platform these benefits can be much greater.
From the Tivoli GEM console shown in Figure 37 on page 82, the Credit
Check application’s components, spanning various server platforms including
MQ Series queues, can be controlled from one management console.
This “management by application” builds on the GEM services which link the
management of the OS/390 and distributed environments. It is available now,
as the application policy manager component of GEM, and does not depend
on Tivoli Framework being implemented on OS/390. For example, Tivoli GEM
supports a bidirectional flow of events and commands. Events occurring in
the environment being managed by Tivoli's distributed products can be
reported to NetView on OS/390. Commands can be sent back in response to
these events, either automatically or entered via NetView. Conversely,
messages and alerts visible to NetView can be passed to the TEC, running in
the distributed environment. If necessary, commands can be sent back to
NetView, OS/390, JES, TSO, and so on.
Systems management 81
Figure 37. Tivoli GEM console in Control mode
For further information and demos, visit the Tivoli Web site at:
http://www.tivoli.com
Systems management 83
84 S/390 Server Consolidation - A Guide for IT Managers
Chapter 5. Server consolidation on S/390
5.1.2 Interoperation
In cases where rehosting work to S/390 is not possible or is inappropriate,
then interoperation should be considered. This can cover many options,
some of which are described as follows:
• Improve data transfer links between UNIX, PC and S/390 servers.
• Use S/390 as a data repository and make it appear as if data is still on the
UNIX or PC server (for example, use LANRES, NFS, DFS/SMB).
• Create a single computing environment in which data can be held and
accessed on UNIX, PC and S/390 servers in a seamless way (for example,
use DCE/DFS).
• Use S/390 as a database while keeping the application on the UNIX or PC
server (for example, use an SAP R/3 database server). Alternatively,
maintain copies of data on OS/390 for distributed DB2 UNIX or PC
servers, including occasionally-connected systems (laptops), using Data
Propagator, in a fully automated way.
• For applications that are platform-independent, use the S/390 as the
primary server where, for possible geographic reasons, there are multiple
distributed servers on UNIX or PCs (for example, Lotus Domino).
• Use the S/390 as the primary management hub for network management,
data distribution and LAN data backup (for example, Tivoli Framework and
Tivoli ADSM).
• Use bridging software to link different applications on a whole variety of
different platforms (for example, IBM MQSeries).
There are many ways to interactively access these two aspects of OS/390.
MVS system administrators and programmers will continue to use TSO. To
access UNIX System Services, there is an OMVS command which brings the
TSO user into a UNIX shell session, and an ISPF shell (often referred to as
“the ishell” or simply “ish”). From OMVS, the ISPF editor can be used, but the
vi editor cannot, since the 3270 data stream is used for communications.
UNIX system administrators and programmers will want to access OS/390
UNIX using the conventional interactive login tools of telnet or rlogin. When
users are “telnetted” or “rlogged” in to OS/390 UNIX, the conventional UNIX
editor, vi, works fine, but OEDIT does not.
Often, getting these tools built and running on OS/390 requires additional
customization. More details of UNIX application development are available
from the following sources.
• The redbook Porting Applications to the OpenEdtion MVS Platform ,
GG24-4473.
• The redbook Networked Applications on OS/390 UNIX, SG24-5447. This
book includes a CD with some open source software packages and
installation scripts to make the customization of OS/390 easier.
• The OS/390 UNIX System Services page entitled Porting, on the Web at
http://www.s390.ibm.com/oe/bpxa1por.html
This library supports ASCII input and output characters by performing the
necessary iconv() translations before and after invoking the C/C++ run-time
library functions. This code was originally written to facilitate the port of Lotus
Notes and Lotus Domino to OS/390. DB2 Version 5 is able to hold data in
tables in ASCII format and allows SQL commands to operate against such
data without conversion to EBCDIC.
inquire
DBMS
Internet
respond escalate
update notify
alert
assign
Lotus Domino for S/390 also provides an ideal replacement for existing
host-based office systems giving scalable mail routing, directory, calendaring
and scheduling services. Pilots started on smaller platforms can easily be
replicated to a S/390 server to provide the integration and scalability required
for many corporate solutions.
For further information, see the redbook Lotus Domino for S/390 Release 5:
Installation, Customization and Administration , SG24-2083.
Internet connection
Servers
(Web Servers)
Intranet
It is the browser, not the server, that does most of the work. The Web browser
needs to understand what to do with the HTML file and how to display the
output with text and graphics as appropriate. It also has the “navigational”
The first shows a dumb screen link, generally static, to a central server. In this
scenario all processing and data storage is performed by the central server.
Display functions are limited to text only. Then came the PC which offered a
graphical user interface, performed its own processing, and stored all data
locally. Next came the LAN file server. This model shows the graphical display
and application functions being performed on the local workstation with data
stored on one or more LAN file servers.
Intelligent
Workstation G
Intelligent
Workstation
G LAN file server
Client / Server G
In order to prompt the user for data entry, HTML forms are used; see Figure
42. These contain data entry fields and are linked to specific CGI or other
APIs. When the user completes the entry fields and presses a submit button,
the data is sent back to the Web server, which invokes the appropriate
gateway program. CGI programs can be written in many different languages
which include C, REXX and Perl.
Web Browser
OS/390
machine HTTP
WebSphere
Java Application
Server for
OS/390 as
xxxxxxx xxxxxxx
xxxxxx
xx xxxxxxx xxxxx xxx
xxx Proxy Server
xxxxxxx xxxxxxx
xxxxxx
xx xxxxxxx xxxxx xxx
xxx
xxxxxxx
xxxxxxx CICS
xxxxxxx
xxxxxxx xxxxxxx
xxxxxx
DB2
HTML
document Internet
containing or Intranet
forms Lotus
Notes
or similar
Product gateways
For most major systems and subsystems that run on OS/390, there are
already IBM and/or third-party software vendor gateways available which
greatly simplify the task of creating the links required. In addition, OS/390
includes the Internet BonusPak. This is a set of tools, sample Web pages,
Java
Java is a state of the art, object-oriented programming language that is
becoming ubiquitous in the computer industry. The 'write once, run anywhere'
paradigm has created significant demand for the Java language. Java
provides the ability to write an application on any platform and run it on any
platform. Java was designed to let computers and devices communicate with
one another more easily than ever before.
Building on an existing S/390 infrastructure can not only speed the ERP
implementation, it permits a company to benefit from the knowledge, skills
and procedures that exist in the data center to ensure a smoother, more
trouble-free transition. The traditional S/390 strengths are necessary
elements for an enterprise seeking to create flexible computing infrastructure
required for ERP solutions.
The major ERP application vendors have ported the central parts of their
solutions on S/390. Originally developed as client/server applications on
UNIX servers, ERP solutions usually are based on a three-tier architecture
consisting of the following:
• A database layer
• An application layer
One of the world’s most popular ERP applications is SAP R/3, a suite of
enterprise applications covering a broad range of business activities,
including finance, payroll and personnel, manufacturing, sales, distribution
and human resources. Originally running in a three-tier implementation on
UNIX platforms, the database layer has been ported to S/390, becoming
generally available in September 1997. This was in direct response to
customer requests that SAP R/3 harness S/390's proven strength for handling
mission-critical applications with large numbers of concurrent users. Figure
43 shows an overview of the SAP R/3 architecture.
RS/6000
S/390 Server
AIX
RS/6000 SP
OS/2
CF
AIX
PC Server
Windows
NT
Other NT...
Database Approximately
Appl. + DB
40 %
Execution Time
DB
Application
Appl.
Appl.
UPDATE Dialog Steps
Comparison of avg. response times
Presentation Approximately
GUI
GUI
S/390 options for SAP R/3
Database Network Application
As shown in the right side of Figure 44, the S/390 applications servers can
provide significant performance improvements. In any SAP implementation,
there are multiple servers passing information, resulting in extensive network
overhead or latency. As the databases grow, this become more of a
bottleneck. The most affected applications are those that execute massive
database calls, such as batch and update. Due to its unique implementation
of DB2, S/390 is the only server that can host the application while
eliminating network lapse times, just using cross-memory services between
address spaces. Compared to a physical three-tier design, this
implementation can result in a 40 percent performance improvement in batch
mode. Coupled with dynamic update capabilities of the S/390 and Workload
Manager, the update improvements can be an even more dramatic 60
percent.
Coupling the reliability, availability, scalability and security of S/390 with the
proven attributes of DB2 ensures that SAP R/3 applications are always
available when users need them. SAP AG and IBM have come together to
combine the most popular suite of client/server applications on the most
powerful and reliable platform in the world. More information about SAP R/3
on S/390 are provided in the redbook Implementing SAP R/3 in an OS/390
Environment: AIX or Windows NT Application Servers, SG24-4945 and the
SAP brochure SAP R/3 on OS/390, May, 1999.
For each of these types of shops, the solution or solutions available on S/390
is described in the sections that follow.
Host-to-
Host
LAN
LANRES
Printing LAN-to-
Host
NetWare
Printing
Server
LANRES
NLMs
NetWare
Server
Figure 45. LANRES configuration
For customers who have large distributed NDS servers, NNS for OS/390
could allow multiple NetWare servers to be consolidated.
The function Novell Network Services is a new possibility for enterprises that
have decided NDS is their directory services solution and want the reliability,
scalability and security of S/390.
PC clients use SMB function included with their operating systems to access
shared directory paths and shared printers. SMB clients include Windows 95,
Windows 98, Windows NT, Windows 3.11 and OS/2.
In an OS/2 LAN Server environment there are two pieces of LFS/ESA code:
• That on the S/390 host
• That on the OS/2 LAN Server, known as the Front End Processor (FEP)
There are many details that could be included to describe the function offered
by LAN Server, however, the future of this product is limited. With the decline
in popularity of the OS/2 operating system, the strategic value of this solution
suffered a corresponding decline. OS/390 V2R9, targeted for March of 2000,
will be the last release in which the product will still be offered and support
will continue for three years after that. Another factor that could reduce the
future functionality of LAN Server is the fact that OS/2 V4.5 (Warp for
e-business) will not be supported on the FEP. Due to these issues, LAN
Server should not be viewed as a strategic LAN data consolidation solution.
IBM contracted with Mortise Kerns Systems (MKS) to port Samba V1.9.18p1
to OS/390. That port was completed in the first half of 1998. Since the
changes were not put back into the Samba source code stream, this specific
port, and not another from the Samba Web site, is necessary. The code can
be obtained from the MKS S/390 GNU Web site at
http://www.mks.com/s390/gnu/
The appeal of this solution is its simplicity. Since all modern Windows
desktops have the ability to “map network drives” (act as SMB clients),
DFS/SMB will allow Windows desktops to access OS/390 UNIX hierarchical
file systems.
(root)
Files in the HFS appear as a file system, so the NFS mount process is as it
would be on any other UNIX system.
Conventional MVS datasets, on the other hand, do not naturally fall into any
hierarchy, so OS/390 NFS uses dataset qualifiers as if they were directories.
For example, assume an NFS mount is made to the NFS server on OS/390
with a high level qualifier of “FRED” and that there are two datasets:
FRED.ONE.TWO, a sequential dataset, and FRED.THREE, a partitioned
dataset. The first dataset would appear to the NFS client as a file called
ONE.TWO and the second as a directory called THREE with the PDS
members as files within it.
Because data protection requirements may vary, ADSM can be set up to treat
data differently. For example, assume that LAN server data is classified as
either critical or standard. ADSM can be easily configured to maintain four
backup versions of critical data files, but only maintain two versions of
standard data files. Additionally, when critical files are deleted (either
intentionally or accidentally), ADSM could be configured to retain backup
copies of these for several years, whereas backups for deleted standard files
might just be kept for two months.
With central scheduling, ADSM provides “lights out”, unattended backup and
archive operations. These operations can be scheduled to complement
ordinary workflow. Backups can be scheduled during off-peak hours to
maximize network performance.
Windows
OS/2 MVS Windows/NT
AIX
VM OS/2 Dec
VSE -Ultrix
AS/400
Novell
Netware
Mac
SCO Sun
UNIX
ADSM supports over 30 different client systems today covering the Intel (for
example, DOS, Windows, Windows 95, Windows NT, NetWare and OS/2),
UNIX (for example, AIX, HP-UX, SunOS, Solaris, SGI and so on), Apple
Macintosh and other operating platforms.
ADSM Version 3 builds upon the strengths of Version 2 and addresses some
of these emerging trends. The main enhancements for ADSM Version 3 are:
• It provides improved performance to back up and restore increasingly
large databases and file systems with a shrinking or nonexistent backup
window. This includes new data transfer mechanisms such as “fat pipes”
and “small file aggregation”, enhanced restore performance and fault
tolerance features.
5.5 Sizing servers - how many S/390 MIPS per server MHz
Server workloads to be consolidated onto S/390 come from machines of
different architectures, vendors and operating systems. This leads to the
need for cross-vendor capacity comparisons. How to make such a
comparison has always been a difficult problem. At best, relative capacity can
be indirectly estimated using means which all vendors will claim are invalid. A
precise capacity comparison can be made only in head-to-head comparisons
of machines running the proposed workload.
There are various sizing tools and methods which have been developed for
specific applications such as SAP, Lotus Domino, Web applications,
PeopleSoft and so on that can help determine the size of the server on a
specific platform.
In running TPC-C benchmarks, vendors often tune the system and database
to achieve close to 100 percent utilization. This can be done by ensuring that
there is no skew in database usage or regular transaction arrival patterns,
and minimal interference between the multiple engines in a symmetric
multiprocessor (SMP), so that cache contents can be reused without a need
to refresh them. For example, in UNIX systems, it is often possible to stop
running functions that are not needed for the benchmark. Unfortunately, in a
real production environment, such functions would be needed; you may not
have the luxury of stopping them. In contrast, OS/390 has many of these
The result is that most UNIX systems running real commercial workloads
cannot achieve the transaction throughputs and processor utilizations that the
TPC-C results would indicate. Also, the additional throughput expected by
adding engines to an SMP is often much less in reality than would be
expected from such benchmarks.
The SAP R/3 SD benchmark addresses some but not all of the issues with
the TPC-C benchmark. There is significant data sharing and more data
movement in the benchmark, but there is still no batch report workload
included.
IBM has specialists in the field of sizing S/390, UNIX and NT servers.
The key to understanding the different terms is that what you need to know is
how much workload a particular machine can process relative to other
machines. This is exactly what ITRs tell you, and the results are numbers of
transactions per second or numbers of batch jobs per hour. Where other
measurements give you the same thing, they are useful to you in performance
comparisons. Where they do not, they are not.
Now what about MIPS? Many vendors make MIPS claims based on cycle
time in nanoseconds:
1000
MIPS = --------------------------------------------------------------------------------------------------------
cycleTime × ( ( cycles ) ⁄ ( instruction ) )
But using cycle time does not allow for valid comparisons between
processors with different types of architectures. To illustrated this, suppose
you want to buy a car, and are interested in how fast it can go. The
information you need is the top speed of the car. However, the MIPS rating
tells you the maximum Revolutions Per Minute (RPM) of the engine. That is
not a good measure of the top speed, since it totally ignores the gear ratios.
For processors of the same type (same gearing ratio), the MIPS rating may
be fairly representative. However, it is of very little value when comparing
processors with different base architectures.
All S/390 pricing structures are based on Millions of Service Units (MSU), and
processor capacity; following are more detailed explanations of non-PSLC
price structures.
• Entry Level
• Entry Server S/390 One Time Charge
• CPU potential capacity fewer than 80 MSU Graduated Monthly License
charges
• Basic License
• Distributed Systems License Option (DSLO)
• Multiple Operating System PR/SM (MOSP)
• CPU potential capacity more than 80 MSU
• Indexed Monthly License Charge (IMLC)
• Extended License Charge (ELC)
• New Application License Charge - this pricing method is to be used for
dedicated new workloads (that is, SAP, Baan, Domino) and typically do
not need the full suite of OS/390 products.
Note that features discussed may not be available in all countries. Consult
your local IBM business contact for information on services available in your
area.
S/390 Usage Pricing makes use of functions within the software to measure
and record the CPU service units utilized. When licensing software under
S/390 Usage Pricing terms and conditions, you measure the usage levels and
provide a report to IBM to determine initial pricing. The measurement
technology must remain active so that usage statistics continue to be
collected throughout the entire year. At the end of the year, all usage records
for the processor or group of processors in the Parallel Sysplex cluster are
analyzed and you send the new usage report to IBM. With reports required
only once a year, S/390 Usage Pricing makes budgeting more predictable
and reduces administrative tasks.
One of more pleasant surprises was the ability to manage the responsiveness
of a given task. The national warranty system has three primary functions.
• Lookup-customer is at the store and they are querying status
• Registration-customer has purchased a part and the database needed to
be updated
• Batch-activity that looks at database and creates reports.
In the S/390 environment, is was easy to prioritize the work and give the
customer at the store the best service at the expense to batch and
registration. The workload varies through the day and day of the week.
Even the weather has an effect on transaction rate. Workload manager
makes an easy task of dedicating all of the resources of the processor to
Lookup and customer satisfaction.
Future acquisitions can add stores to the chain and the processor can be
upgraded without disruption form the current size to something 14 times
bigger. Since DB2 can give you a single view of the data in a S/390 Parallel
Sysplex configuration, almost unlimited growth can be handled.
Certain issues arose during the port. There is a limit in DB2 whereby the
length of an SQL command cannot be longer than 80 characters. Header files
were somewhat different with pthread function calls. There were some
ASCIi-to-EBCDIC conversions necessary, but this code only required about a
week of effort. GNU’s flex and bison tools were needed on OS/390 for lexical
analysis code.
The customer is moving from a parallel channel to a 100 Mb/s ethernet over
TCP/IP attached FEP. This should offer better performance and easier
manageability.
IBM may have patents or pending patent applications covering subject matter
in this document. The furnishing of this document does not give you any
license to these patents. You can send license inquiries, in writing, to the IBM
Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY
10504-1785.
Licensees of this program who wish to have information about it for the
purpose of enabling: (i) the exchange of information between independently
created programs and other programs (including this one) and (ii) the mutual
use of the information which has been exchanged, should contact IBM
Corporation, Dept. 600A, Mail Drop 1329, Somers, NY 10589 USA.
The information contained in this document has not been submitted to any
formal IBM test and is distributed AS IS. The information about non-IBM
("vendor") products in this manual has been supplied by the vendor and IBM
assumes no responsibility for its accuracy or completeness. The use of this
information or the implementation of any of these techniques is a customer
responsibility and depends on the customer's ability to evaluate and integrate
them into the customer's operational environment. While each item may have
been reviewed by IBM for accuracy in a specific situation, there is no
guarantee that the same or similar results will be obtained elsewhere.
Any pointers in this publication to external Web sites are provided for
convenience only and do not in any manner serve as an endorsement of
these Web sites.
Reference to PTF numbers that have not been released through the normal
distribution process does not imply general availability. The purpose of
including these reference numbers is to alert IBM customers to specific
information relative to the implementation of the PTF when it becomes
available to each customer according to the normal IBM PTF distribution
process.
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Sun Microsystems, Inc. in the United States and/or other
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of
Microsoft Corporation in the United States and/or other countries.
SET and the SET logo are trademarks owned by SET Secure Electronic
Transaction LLC.
The publications listed in this section are considered particularly suitable for a
more detailed discussion of the topics covered in this redbook.
Most IBM white papers can be found by searching for the order number on
the S/390 Web site at:
http://www.s390.ibm.com
This section explains how both customers and IBM employees can find out about ITSO redbooks,
redpieces, and CD-ROMs. A form for ordering books and CD-ROMs by fax or e-mail is also provided.
• Redbooks Web Site http://www.redbooks.ibm.com/
Search for, view, download, or order hardcopy/CD-ROM redbooks from the redbooks Web site. Also
read redpieces and download additional materials (code samples or diskette/CD-ROM images) from
this redbooks site.
Redpieces are redbooks in progress; not all redbooks become redpieces and sometimes just a few
chapters will be published this way. The intent is to get the information out much quicker than the
formal publishing process allows.
• E-mail Orders
Send orders by e-mail including information from the redbooks fax order form to:
e-mail address
In United States usib6fpl@ibmmail.com
Outside North America Contact information is in the “How to Order” section at this site:
http://www.elink.ibmlink.ibm.com/pbl/pbl/
• Telephone Orders
United States (toll free) 1-800-879-2755
Canada (toll free) 1-800-IBM-4YOU
Outside North America Country coordinator phone number is in the “How to Order”
section at this site:
http://www.elink.ibmlink.ibm.com/pbl/pbl/
• Fax Orders
United States (toll free) 1-800-445-9269
Canada 1-403-267-4455
Outside North America Fax phone number is in the “How to Order” section at this site:
http://www.elink.ibmlink.ibm.com/pbl/pbl/
This information was current at the time of publication, but is continually subject to change. The latest
information may be found at the redbooks Web site.
Company
Address
We accept American Express, Diners, Eurocard, Master Card, and Visa. Payment by credit card not
available in all countries. Signature mandatory for credit card payment.
B F
BaanERP 103 FDDI 34
Backup-While-Open (BWO) 42 Fiber Channel (FC) 49
FICON 54, 61
C bridge card 54
Capacity BackUp (CBU) 33 direct attachment 55
Capacity Upgrade on Demand 32 switch connectivity 55
CGI 98 file serving 104
Channel Interface Processor (CIP) 67 firewall 43
CICS 45 Forum Compliant LAN emulation 64
CISC 120 FTP 60
Cisco 7000 67
CMOS 14 G
Common Gateway Interface (CGI) 97 Geographically Dispersed Parallel Sysplex (GDPS)
Concurrent Copy 19 41
consolidation Gigabit Ethernet 67
server 1 Global Enterprise Manager (GEM) 76
storage 4 Groupware applications 93
continuous availability 16
continuous operations 16
CORBA 37 H
coupling facility 31 Hardware Configuration Definition (HCD) 73
Cryptographic Coprocessor 44 Hardware Configuration Manager (HCM) 73
Hierarchical File System 47
high availability 16
D HTML 95
data warehousing 45 HTTP 95
database backup and recovery 42
DFS/SMB 110
DFSMS 41 I
DNS 60 ICAPI 98
Dynamic I/O Reconfiguration Management (DRM) IMS 45
17 Infomix 91
Ingres 91
Integrated Cluster Buses (ICB) 31
145
porting process 88
UNIX System Services 47
continuous availability 19
V
Versatile Storage Server (VSS) 56
Virtual Private Network (VPN) 44
Virtual Tape Server 56
Visual BASIC 92
Visual C/C++ 92
VSAM 45
W
Web Cache Manager 56
Web serving 95
WebSphere Application Server 95
Wind/U 92
WorkLoad Manager (WLM) 30, 73
X
XPG 46
X-Windows 60
Your feedback is very important to help us maintain the quality of ITSO redbooks. Please complete this
questionnaire and return it using one of the following methods:
• Use the online evaluation form found at http://www.redbooks.ibm.com/
• Fax this form to: USA International Access Code + 1 914 432 8264
• Send your comments in an Internet note to redbook@us.ibm.com
Please rate your overall satisfaction with this book using the scale:
(1 = very good, 2 = good, 3 = average, 4 = poor, 5 = very poor)
Was this redbook published in time for your needs? Yes___ No___