IBM Z/OS V2R2 CS TCP/IP Implementation Volume 3

Total Page:16

File Type:pdf, Size:1020Kb

IBM Z/OS V2R2 CS TCP/IP Implementation Volume 3 Front cover IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 3 High Availability, Scalability, and Performance Bill White Octavio Ferreira Teresa Missawa Teddy Sudewo Redbooks International Technical Support Organization IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 3 High Availability, Scalability, and Performance August 2016 SG24-8362-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (August 2016) This edition applies to Version 2, Release 2 of z/OS Communications Server. © Copyright International Business Machines Corporation 2016. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii IBM Redbooks promotions . ix Preface . xi Authors. xii Now you can become a published author, too! . xiii Comments welcome. xiii Stay connected to IBM Redbooks . xiv Chapter 1. An introduction to IBM z/OS Communications Server high availability technologies . 1 1.1 Overview of high availability . 2 1.2 Fundamental technologies for z/OS TCP/IP availability . 2 1.2.1 Single z/OS system availability . 2 1.2.2 z/OS Parallel Sysplex availability . 3 1.2.3 Virtual IP addressing. 4 1.2.4 z/OS network connectivity and dynamic routing . 5 1.2.5 Single-instance and multiple-instance applications. 7 1.2.6 Balancing workload across multiple application instances . 8 1.3 Quick-start table . 11 Chapter 2. Virtual IP addressing . 13 2.1 Basic concepts of virtual IP addressing . 14 2.1.1 Static VIPA . 14 2.1.2 Dynamic VIPA. 14 2.2 Importance of VIPA . 16 2.3 Types of DVIPA. 17 2.3.1 Stack-managed DVIPA . 17 2.3.2 Event-activated DVIPA . 17 2.3.3 Distributed DVIPA (sysplex distributor). 19 2.3.4 Single-stack DVIPA upper limit . 26 2.3.5 Making use of DVIPAs . 26 2.4 Static VIPA example . 27 2.5 Dynamic VIPA (DVIPA) example . 31 2.5.1 Stack-managed DVIPA . 31 2.5.2 Event-activated DVIPA example. 41 2.5.3 Distributed DVIPA (sysplex distributor) example . 41 2.6 Sysplex problem detection and recovery . 41 2.6.1 Problem detection . 41 2.6.2 Automatic control of leaving/joining the sysplex group . 41 2.6.3 Automatic control of the DVIPA activation timing . 42 2.6.4 Monitoring the network reachability. 45 2.7 Controlling DVIPA with commands . 53 2.7.1 LEAVEGROUP and JOINGROUP . 54 2.7.2 DEACTIVATE and REACTIVATE. 56 2.7.3 QUIESCE and RESUME. 58 © Copyright IBM Corp. 2016. All rights reserved. iii Chapter 3. VIPA without dynamic routing . 63 3.1 Basic concepts . 64 3.2 High availability using ARP takeover in one TCP/IP stack . 65 3.2.1 Implementation . 65 3.2.2 Verification . 67 3.3 High availability across multiple TCP/IP stacks using DVIPA . 71 3.3.1 Implementation . 72 3.3.2 Verification . 75 3.4 Debugging tips . 86 Chapter 4. VIPA with dynamic routing. 87 4.1 Basic concepts of high availability using dynamic routing. 88 4.1.1 Dynamic routing and OMPROUTE . 88 4.1.2 Advertisement of VIPA addresses . 88 4.1.3 Multiple links between IP nodes and LPARs. 92 4.2 Design example of DVIPA with dynamic routing. 97 4.2.1 Overview . 97 4.2.2 Implementation tasks . 98 4.2.3 Verifying that the configuration works as planned. 104 4.3 High availability scenarios. 107 4.3.1 Adapter interface failure . 107 4.3.2 Application movement using VIPADEFINE. 111 4.3.3 Stack failure scenario using VIPADEFINE and VIPABACKUP. 115 4.3.4 IPv6 stack failure scenario with VIPADEFINE and VIPABACKUP . 118 4.4 Sysplex-Wide Security Associations . 121 4.4.1 Enabling the SWSA in a stack with IPSec defined . 122 4.4.2 Verifying the SWSA . 125 4.4.3 Sysplex-Wide Security Associations for IPv6 . 127 Chapter 5. Internal application workload balancing . 129 5.1 Basic concepts of internal application workload balancing . 130 5.2 Sysplex distributor. 131 5.2.1 Sysplex distributor: Principles of operation . 131 5.2.2 Sysplex distributor and quality of service policy . 132 5.2.3 Monitoring the responsiveness of the target server . 133 5.2.4 Workload distribution methods . ..
Recommended publications
  • Linux on IBM Z Networking: OSA-Express and Roce Express Side by Side — Stefan Raspl Linux on IBM Z Development
    Linux on IBM Z Networking: OSA-Express and RoCE Express Side by Side — Stefan Raspl Linux on IBM Z Development IBM Z / © 2018 IBM Corporation Trademarks The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. AIX* DB2* HiperSockets* MQSeries* PowerHA* RMF System z* zEnterprise* z/VM* BladeCenter* DFSMS HyperSwap NetView* PR/SM Smarter Planet* System z10* z10 z/VSE* CICS* EASY Tier IMS OMEGAMON* PureSystems Storwize* Tivoli* z10 EC Cognos* FICON* InfiniBand* Parallel Sysplex* Rational* System Storage* WebSphere* z/OS* DataPower* GDPS* Lotus* POWER7* RACF* System x* XIV* * Registered trademarks of IBM Corporation The following are trademarks or registered trademarks of other companies. Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce. ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office. Java and all Java based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
    [Show full text]
  • Enhanced Networking on IBM Z/VSE
    Front cover Enhanced Networking on IBM z/VSE Use LFP on Z/VM and in LPAR for selected applications Experience the benefits of OpenSSL Learn how to use IPv6 on z/VSE Joerg Schmidbauer Jeffrey Barnard Ingo Franzki Karsten Graul Don Stoever Rene Trumpp ibm.com/redbooks International Technical Support Organization Enhanced Networking on IBM z/VSE December 2014 SG24-8091-01 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. Second Edition (December 2014) This edition (SG24-8091-01) applies to z/VSE V5 R2. © Copyright International Business Machines Corporation 2014. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x Preface . xi The team who wrote this book . xi Now you can become a published author, too! . xii Comments welcome. xii Stay connected to IBM Redbooks . xiii IBM Redbooks promotions . .xv Summary of changes. xvii December 2014, Second Edition . xvii Chapter 1. Networking options overview . 1 1.1 Overview . 2 1.2 Hardware options . 2 1.2.1 OSA-Express . 2 1.2.2 OSA-Integrated Console Controller . 3 1.2.3 OSA-Express in QDIO mode . 4 1.2.4 OSA-Express . 5 1.2.5 OSA for NCP support . 5 1.2.6 Intra-Ensemble Data Network support . 6 1.2.7 OSA-Express multi-port support . 7 1.2.8 Using VTAM (SNA) and TCP/IP (non-QDIO) parallel on the same CHPID . 8 1.2.9 HiperSockets (IQD).
    [Show full text]
  • Fireware XTM V11.6 Release Notes
    Fireware XTM v11.6 Release Notes Supported Devices XTMv, XTM 2, 3, 5, and 8 Series XTM 1050, XTM 2050 Fireware XTM OS Build 344207 WatchGuard System Manager 344359 Build Revision Date 10 July 2012 Introduction WatchGuard is pleased to announce the release of Fireware XTM v11.6 and WatchGuard System Manager v11.6.You can install Fireware XTM OS v11.6 on any WatchGuard XTM device, including 2 Series, 3 Series, 5 Series, 8 Series, XTM 1050 and 2050 devices, and with any edition of XTMv. The new features, feature enhancements, and bug fixes included in this release have been carefully chosen to improve the efficiency, performance, and reliability of all XTM devices. Feature areas with significant enhancements include: Authentication l Single Sign-On support for Citrix and Terminal Services environments l Authentication portal support for mobile devices l Authentication auto-redirect to host name to allow use of commercial CA-signed certificates WatchGuard Servers l Easy access to HIPAA and PCI Compliance Reporting on new Compliance reporting tab l Automatic WebBlocker database updates l New scheduled task options for OS updates, feature key synchronization, and reboots for Management Server management groups Networking l Increased maximum number of VLANs l Wireless Hot Spot splash screen updated to use HTTP l Configurable dynamic routing policies Branch Office VPN l Inbound IPSec pass-through l Improved VPN Phase 2 key expiration settings l VPN log message header improvements l New VPN Diagnostics Report Before You Begin Security Services
    [Show full text]
  • What Good Is a Linux Client?
    Preparing Today for Linux® Tomorrow What Good is a Linux Client? A Linux White Paper Preface Anyone who has followed the progress of Linux the past few years has noted the surprising gains that Linux has made in server operating system market share and “mindshare” against the entrenched opposition, notably Microsoft® Windows NT®, Novell Netware and various varieties of UNIX®. A complete Linux network, of course, would require Linux clients (networked PCs or terminals) as well. Therefore, an important question is, “Is Linux a viable desktop operating system for general business use?” or must we continue to be confined to the Windows world for our non-server needs? And what about laptop support, or a Small Office/Home Office (SOHO) user or home user, who does not need a network server? Is there a place for Linux in a stand-alone environment? These are some of the questions this paper addresses. I must confess that until recently I was merely a bystander watching with curiosity from the sidelines—without any real involvement— the progress Linux has made. So writing this paper not only gave me the excuse to join in on the action, but it also provides you with the perspective of a Linux “newbie” who is attempting to find the applications and utilities needed to create a working system. The conventional wisdom so far is that Linux is not “ready for prime time” as anything but a network operating system. We shall test this notion to see if I can find commercial, shareware and/or freeware programs for Linux to replace the existing applications I currently use with Windows.
    [Show full text]
  • An Apple Iigs Emulator
    About News Forum [http://www.emaculation.com/forum/] Emulators SheepShaver Basilisk II Mini vMac PearPC Other How-To Setup SheepShaver for Windows Setup SheepShaver for MacOS X Setup SheepShaver for Linux Setup Basilisk II for MacOS X Setup Basilisk II for Windows Setup Basilisk142 for Windows Setup Basilisk II for Linux Setup PearPC for Windows Setup Mini vMac for Windows More Guides Extras Interviews Compiling_&_Tidbits Macintosh ROM Images Compatibility Notes 68K Macintosh Software Mini vMac Games All Downloads Contact Kegs32: An Apple IIgs emulator (Last updated September 8, 2012) Information Kegs [http://kegs.sourceforge.net/] is an Apple IIgs emulator for Linux. There is a Windows port called Kegs32 [http://www.emaculation.com/kegs32.htm]. The Windows port is somewhat difficult to setup. Installing the GS/OS operating system and figuring out disk images are particularly tricky tasks. This guide provides some bootable GS/OS installation disks, a pre-prepared disk image and a few pointers for IIgs novices. I hope it helps. If you need some more assistance, I can be reached by e-mail [mailto:[email protected]], or on my forum [http://www.emaculation.com/forum]. The Emulator Download Kegs32 version 091 [http://www.emaculation.com/kegs/kegs32091.zip]. The homepage was lost when Geocities shut down, but a mirror is available here [http://www.emaculation.com/kegs32.htm]. ROM Image Asimov.net has a collection [ftp://ftp.apple.asimov.net/pub/apple_II/emulators/rom_images] of Apple II ROM images. For this emulator, you want to download gsrom01 or gsrom03. As far as the emulator is concerned, I guess that both are about the same.
    [Show full text]
  • Dissertation Submitted to the Graduate Faculty of Auburn University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy
    Repatterning: Improving the Reliability of Android Applications with an Adaptation of Refactoring by Bradley Christian Dennis A dissertation submitted to the Graduate Faculty of Auburn University in partial fulfillment of the requirements for the Degree of Doctor of Philosophy Auburn, Alabama August 2, 2014 Keywords:Refactoring, Code Smells, Patterns, Non-functional Requirements, Verification Copyright 2014 by Bradley Christian Dennis Committee: David Umphress, Chair, Associate Professor of Computer Science and Software Engineering James Cross, Professor of Computer Science and Software Engineering Dean Hendrix, Associate Professor of Computer Science and Software Engineering Jeffrey Overbey, Assistant Research Professor of Computer Science and Software Engineering Abstract Studies of Android applications show that NullPointerException, OutofMemoryError, and BadTokenException account for a majority of errors observed in the real world. The technical debt being born by Android developers from these systemic errors appears to be due to insufficient, or erroneous, guidance, practices, or tools. This dissertation proposes a re- engineering adaptation of refactoring, called repatterning, and pays down some of this debt. We investigated 323 Android applications for code smells, corrective patterns, or enhancement patterns related to the three exceptions. I then applied the discovered patterns to the locations suggested by the code smells in fifteen randomly selected applications. I measured the before and after reliability of the applications and observed a statistically significant improvement in reliability for two of the three exceptions. I found repatterning had a positive effect on the reliability of Android applications. This research demonstrates how refactoring can be generalized and used as a model to affect non-functional qualities other than the restructuring related attributes of maintainability and adaptability.
    [Show full text]
  • Applepickers August 8, 2012 Wikipedia Definition
    Virtualization on the Mac ApplePickers August 8, 2012 Wikipedia Definition In computing, virtualization is the creation of a virtual (rather than actual) version of something, such as a hardware platform, operating system (OS), storage device, or network resources. Two Main Avenues ✓Emulating older Mac operating systems ✓Emulating non-Apple OS’s What do you need for Mac OS? ✓Virtualization program — Free ✓A copy of the OS you wish to emulate ✓A suitable ROM image file Mac OS ✓ Mini vMac • Mac Plus through SE (68K machines) ✓ Basilisk II • OS 7 through OS 8.1 ✓ SpeepShaver • OS 7.5.3 through OS 9.0.4 • Setup Guide If you don’t have a Mac OS… ✓eBay ✓Borrow from friend ✓Download OS 7.5.3 from Apple • Individual parts ✓Some updaters are also available from archive site ROM Image ✓Protected by copyright … ✓If you have an old Mac laying around … • Use CopyROM on the older Mac • See this page in E-Maculation for details ✓Download from Redundant Robot Personal Experience ✓ Use SheepShaver • Most widely used and actively supported ✦ Developed initially for Be OS and sold commercially ✦ Released into public domain in 2002 ✦ Ported to Windows and Linux ✦ Supported by volunteers • PPC software on old CDs ✦ Software on floppies may no longer be readable • Can run in a folder or a self-contained virtual machine • Abandoned software still available on Internet ✦ Macintosh Garden ✦ info-mac WP Mac Appliance ✓Join Yahoo Group for WordPerfect on the Mac • Active volunteer group supporting this installation of SheepShaver ✓Access complete installation with
    [Show full text]
  • Cover by Michele Patterson
    Cover by Michele Patterson Masthead Publisher MPN, LLC Editor-in-Chief Robert L. Pritchett Assistant Editors Harry Babad Michele Patterson Consultants Harry {doc} Babad Ted Bade Advertising and Marketing Director Robert L. Pritchett Web Master Robert L. Pritchett Public Relations Robert L. Pritchett Contacts Webmaster at macCompanion dot com Feedback at macCompanion dot com Correspondence 1952 Thayer, Drive, Richland, WA 99352 USA 1-509-210-0217 1-888-684-2161 rpritchett at macCompanion dot com Skype: maccompanion macCompanion Staff Harry {doc} Babad Ted Bade Matt Brewer (MacFanatic) Dr. Eric Flescher Kale Feelhaver (AppleMacPunk) Steven Fyffe Jonathan Hoyle III Eddie Hargreaves Daphne Kalfon (I Love My Mac) Wayne Lefevre Daniel MacKenzie (Tech Fanatic) Michele Patterson (Dixie Graphics) Mike Potter (For Mac Eyes Only) Robert Pritchett Dennis Sellers (Macsimum News) Gene Steinberg (TechNightOwl) Rick Sutcliffe (The Northern Spy) Mike Swope (Swope Design) Tim Verpoorten (Surfbits) Julie M. Willingham Guest Authors Ed Prasek Application Service Provider for the macCompanion website: http://www.stephousehosting.com Our special thanks to all those who have allowed us to review their products! In addition, thanks to you, our readers, who make this effort all possible. MPN, LLC Copyright 2003-2007 Page 2 of 134 Volume 5 Issue 12 December 2007 MPN, LLC Copyright 2003-2007 Page 3 of 134 Volume 5 Issue 12 December 2007 MPN, LLC Copyright 2003-2007 Page 4 of 134 Volume 5 Issue 12 December 2007 Table of Contents .......................................................................................7
    [Show full text]
  • The Changing Face of the History of Computing: the Role of Emulation in Protecting Our Digital Heritage
    The Changing Face of the History of Computing: The Role of Emulation in Protecting Our Digital Heritage David Anderson, Janet Delve, and Vaughan Powell Future Proof Computing Group, School of Creative Technologies, University of Portsmouth, UK [email protected], {Janet.Delve,vaughan.powell}@port.ac.uk Abstract. It is becoming increasingly common for some source material to arrive on our desks after having been transferred to digital format, but little of the material on which we work was actually born digital. Anyone whose work is being done today is likely to leave behind very little that is not digital. Being digital changes everything. This article discusses the issues involved in the protection of digital objects. Keywords: digital preservation. Erasmus summarised well the outlook of many historians of computing when he remarked “When I get a little money, I buy books; and if any is left I buy food and clothes”! Most of us love second-hand bookshops, libraries and archives, their smell, their restful atmosphere, the ever-present promise of discovery, and the deep intoxication produced by having the accumulated knowledge of the world literally at our fingertips. Our research obliges us to spend many happy hours uncovering and studying old letters, notebooks, and other paper-based records. It is becoming increasingly common for some source material to arrive on our desks after having been transferred to digital format, but little of the material on which we work was actually born digital. Future historians of computing will have a very different experience. Doubtless they, like us, will continue to privilege primary sources over secondary, and perhaps written sources will still be preferred to other forms of historical record, but for the first time since the emergence of writing systems some 4,000 years ago, scholars will be increasingly unable to access directly historical material.
    [Show full text]
  • SMUG Sept/2002
    STANFORD/PALO ALTO MACINTOSH USERS GROUP NEWSLETTER Vol 11 No.9 • September 2002 Asanté Product Details in Depth port with automatic transfer for failed normal mode. Up September Meeting Report to 8 simultaneous tunnels are available. NAT firewall plus secure packet inspection is provided. System by Dell Bleiler & John Schipper detects, and protects against, 11 types of denial of ser- vice attacks and provides e-mail alerts and remote log- ging. This is a true VPN mode, not merely a pass- through. No special client software is required. Retail prices are $169 for the VR2004C and $325 for the VR2004AC. The Friendly NET FX4000 series is a 4- slot, chassis-based modular switching system with mul- tiple media options. AeroLan 1211-DP is available with Macintosh and Windows drivers and includes removable antennae for extended range and security mode. Retails for $159. The AeroLan 3011-DP provides PCI wireless conform- ing to IEEE 802.11b and works with OS 9.x and more recent OSs on any PCI slot PowerMac. Michael Prewitt, Territory Manager for Asanté Technologies, presented a very detailed discussion of Aasnté 1000 Base T Solutions includes a 1000 Base T many of the company’s networking products which network card that supports 1000T, 100TX and 10T for are available for the Macintosh and for other operat- 32-bit and 64-bit communications with PCI, and sup- ing systems. He also offered a special September Mac ports CAT 5. The Asanté 1000 Base T WorkGroup User Group promotional on several Asanté products Continued on page 3 –described later.
    [Show full text]
  • OSA-Express Implementation Guide
    Front cover OSA-Express Implementation Guide Product, planning, and quick start information Realistic examples and considerations Hardware and software setup definitions Mike Ebbers Wonjin Chung Dody Kurniadi Joselito Manoto ibm.com/redbooks International Technical Support Organization OSA-Express Implementation Guide June 2014 SG24-5948-06 Note: Before using this information and the product it supports, read the information in “Notices” on page xix. Seventh Edition (June 2014) This edition applies to OSA-Express4S and OSA-Express5S on z/OS Version 2, Release 1. © Copyright International Business Machines Corporation 2009, 2014. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . ix Tables . xiii Examples . .xv Notices . xix Trademarks . .xx Preface . xxi Authors. xxi Now you can become a published author, too . xxii Comments welcome. xxii Chapter 1. Open Systems Adapter overview . 1 1.1 Introduction to the Open Systems Adapter . 2 1.1.1 Operating modes . 3 1.2 OSA-Express for ensemble connectivity. 4 1.2.1 Intraensemble data network (IEDN) . 5 1.2.2 Intranode management network (INMN). 5 Chapter 2. Quick Start guide . 7 2.1 Software support . 8 2.2 Hardware and software definitions for the OSA . 8 2.2.1 Modes of operation and addressing support. 9 2.3 OSA Support Facility (OSA/SF) requirements . 10 2.4 Quick Start tables . 11 2.4.1 OSA function support . 11 2.4.2 Quick Start tables for IBM z/OS and z/VM operating systems . 13 2.5 Policy-based networking .
    [Show full text]
  • Mac Operating System 7.1 Introduction Mac OS Is a Series
    Page 1 of 6 Mac Operating System 7.1 Introduction Mac OS is a series of graphical user interface-based operating systems developed by Apple Inc. for their Macintosh line of computer systems. The original operating system was first introduced in 1984 as being integral to the original Macintosh, and referred to as the "System". Referred to by its major revision starting with "System 6 and "System 7", Apple rebranded version 7.6 as "Mac OS" as part of their Macintosh clone program in 1996. The Macintosh, specifically its system software, is credited with having popularized the early graphical user interface concept. Macintosh operating systems have been released in two major series. Up to major revision 9, from 1984 to 2000, it is historically known as Classic Mac OS. Major revision 10, from 2001 to present, is branded OS X (originally referred to as Mac OS X). Major revisions to the Macintosh OS are now issued as point revisions, such that, for example, 10.2 is substantially different from 10.5. Both series share a general interface design, and there has been some overlap with shared application frameworks and virtual machine technology for compatibility; but the two series also have deeply different architectures OS X, introduced as Mac OS X in 2001 and renamed OS X in 2012, is the latest version of Apple's operating system. Although it is officially designated as simply "version 10" of the Mac OS, it has a history largely independent of the earlier Mac OS releases. The operating system is the successor to Mac OS 9 and the "classic" Mac OS.
    [Show full text]