Parallel Sysplex Application Considerations.
Material type:
- text
- computer
- online resource
- 9780738424064
- 004/.35
- QA76.58 -- .P3786 2004eb
Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Chapter 1. Introduction to Parallel Sysplex -- 1.1 What is a sysplex? -- 1.1.1 Why use a sysplex? -- 1.2 Data sharing in a sysplex -- 1.3 Parallel processing in a sysplex -- 1.4 Managing work in a sysplex -- Chapter 2. Application design -- 2.1 Applications in a sysplex -- 2.2 Enabling for continuous availability -- 2.2.1 Affinities -- 2.2.2 Locking -- 2.2.3 Batch window -- 2.2.4 Single points of failure -- 2.2.5 Performance -- 2.3 Step-wise deployment/versioning -- 2.4 Other considerations -- 2.4.1 Granularity, modularity, and generally reused modules -- 2.4.2 Fault tolerance -- 2.4.3 Debugging and tracing -- 2.4.4 Testing environment -- Chapter 3. DB2 application considerations -- 3.1 Introduction to DB2 data sharing -- 3.1.1 Advantages of data sharing -- 3.1.2 How data sharing works -- 3.2 Application considerations for developers -- 3.2.1 Locking -- 3.2.2 Lock avoidance -- 3.2.3 Commit frequency -- 3.2.4 Locking recommendations -- 3.2.5 DB2 database design -- 3.2.6 Batch considerations -- 3.2.7 Managing commit frequency in batch -- 3.2.8 Distributed access to a data sharing group -- 3.2.9 Programming guidelines -- 3.2.10 Additional DB2 considerations -- 3.3 Application considerations for DB2 system administrators -- 3.3.1 BIND options -- 3.3.2 DDL options -- 3.3.3 DB2 installation options -- 3.3.4 Deadlock and time-out detection -- 3.3.5 Backup and recovery -- 3.4 Example application -- 3.4.1 Batch processing -- 3.4.2 Parallelizing sequential processes -- 3.4.3 Extraordinary processes -- Chapter 4. DFSMStvs application considerations -- 4.1 Introduction to DFSMStvs -- 4.2 Batch application considerations -- 4.2.1 Unit of recovery -- 4.2.2 Sharing files in the batch job structure.
4.3 Transactional recovery -- 4.3.1 Using DFSMStvs: unique input -- 4.3.2 Using DFSMStvs: shared input -- 4.4 Programming changes -- Chapter 5. CICS application considerations -- 5.1 Introduction to CICS TS -- 5.2 How to exploit sysplex in CICS TS applications -- 5.2.1 Affinities through use of CICS commands -- 5.2.2 CICS Transaction Affinities Utility -- 5.2.3 Programing facilities and techniques and their implications on affinities -- 5.2.4 Affinity summary -- 5.2.5 What happens if you have to create an affinity? -- 5.3 CICS TS application checklist -- Chapter 6. IMS application considerations -- 6.1 IMS Transaction Manager overview -- 6.1.1 IMS basics -- 6.1.2 IMS in Parallel Sysplex architecture -- 6.1.3 Related improvements -- 6.2 IMS Database Manager -- 6.2.1 Supported IMS databases -- 6.2.2 Data sharing integrity overview -- 6.2.3 Locking recommendations -- 6.2.4 Single points of failure -- 6.2.5 Batch considerations -- 6.2.6 Converting MSDBs -- 6.3 IMS Transaction Manager -- 6.3.1 Affinities -- 6.3.2 Transaction workload balancing -- 6.3.3 Transaction simplification -- 6.3.4 General IMS TM application performance considerations -- 6.3.5 Connectivity -- 6.3.6 IMS configuration considerations -- Chapter 7. WebSphere MQ application considerations -- 7.1 A brief introduction to WebSphere MQ -- 7.2 A standalone queue manager -- 7.3 Queue managers in a queue-sharing group -- 7.4 Coupling Facility list structures -- 7.5 Channels in a queue-sharing group -- 7.5.1 Channel initiators -- 7.5.2 Shared inbound channels -- 7.5.3 Shared outbound channels -- 7.6 Intra-group queuing -- 7.7 Benefits of using queue sharing groups -- 7.8 Initial considerations related to the use of QSGs -- 7.8.1 Technical setup -- 7.8.2 Application development -- 7.9 How applications can exploit WebSphere MQ shared queues -- 7.9.1 Multiple cloned servers.
7.9.2 Replicated local queues with shared inbound channels -- 7.9.3 IMS Bridge -- 7.9.4 Queue partitions -- 7.9.5 Serialized applications -- 7.9.6 Shared queues and clustering -- 7.9.7 Inbound channels and target queues -- 7.9.8 Shared queue triggering -- 7.10 Limitations and restrictions -- 7.11 Sharing and clustering -- 7.12 Some final considerations -- Chapter 8. Implementation and migration -- 8.1 Migration planning -- 8.2 CICS -- 8.2.1 Create the CICS sysplex environment -- 8.2.2 Exploit the sysplex environment with the applications -- 8.3 DB2 data sharing implementation -- 8.3.1 Plan a naming convention -- 8.3.2 Planning for availability -- 8.3.3 Migrating DB2 applications -- 8.3.4 Monitoring DB2 data sharing -- 8.4 WebSphere MQ -- 8.4.1 Migrating your existing applications to use shared queues -- 8.4.2 Migration scenario -- 8.4.3 Recommendations -- Glossary -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.