IBM Z15 Technical Introduction

Total Page:16

File Type:pdf, Size:1020Kb

IBM Z15 Technical Introduction May IBM z15 Technical Introduction Bill White Octavian Lascu John Troy Jannie Houlbjerg Frank Packheiser Paul Schouten Kazuhiro Nakajima Anna Shugol Hervey Kamga Redbooks IBM Redbooks IBM z15 Technical Introduction May 2021 SG24-8850-02 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. Third Edition (May 2021) This edition applies to the IBM z15 (machine type 8561 and 8562). © Copyright International Business Machines Corporation 2020, 2021. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix Authors. ix Now you can become a published author, too! . .x Comments welcome. xi Stay connected to IBM Redbooks . xi Chapter 1. Designed to take on today’s IT demands. 1 1.1 The IBM z15: The platform for the digital economy . 2 1.1.1 Using hybrid cloud integration services. 3 1.1.2 Securing and protecting data with encryption everywhere . 5 1.1.3 Providing resilience: The key to zero downtime . 6 1.1.4 Transforming a transactional platform into a data powerhouse . 7 1.1.5 Getting more out of the platform with operational analytics . 7 1.1.6 Accelerating digital transformation with agile service delivery . 8 1.1.7 Revolutionizing business processes . 9 1.1.8 Blending open source and IBM Z technologies. 9 1.2 z15 technical description. 10 1.2.1 Technical highlights . 10 1.2.2 IBM z15 features and functions . 12 1.2.3 Storage connectivity . 15 1.2.4 Network connectivity . 16 1.2.5 Cryptography . 17 1.2.6 Clustering connectivity . 18 1.2.7 Special-purpose features and functions . 18 1.2.8 Capacity on Demand and performance . 19 1.2.9 Reliability, availability, and serviceability. 20 1.3 z15 software support. 20 1.3.1 IBM compilers . 21 Chapter 2. IBM z15 Model T01 hardware overview . 23 2.1 Models and upgrade paths . 24 2.2 Frames and cabling. 26 2.3 CPC drawers. 28 2.3.1 Single-chip modules . 29 2.3.2 Processor unit . 29 2.3.3 Memory . 32 2.3.4 Hardware system area . 34 2.4 I/O system structure . 34 2.5 Power and cooling. 37 2.5.1 Power options . 37 2.5.2 Cooling options . 38 2.5.3 Power considerations . 38 Chapter 3. IBM z15 Model T02 hardware overview . 41 3.1 Models and upgrade paths . 42 3.2 Frames and cabling. 44 © Copyright IBM Corp. 2020, 2021. iii 3.3 CPC drawers. 46 3.3.1 Single-chip modules . 47 3.3.2 Processor unit . 47 3.3.3 Memory . 50 3.3.4 Hardware system area . 52 3.4 I/O system structure . 52 3.5 Power and cooling. 55 3.5.1 Power options . 55 3.5.2 Cooling options . 55 3.5.3 Power considerations . 55 Chapter 4. Supported features and functions . 57 4.1 z15 I/O connectivity overview . 58 4.2 Storage connectivity . 59 4.2.1 zHyperLink Express . 59 4.2.2 FICON Express features. 59 4.2.3 IBM Fibre Channel Endpoint Security. 61 4.3 Network connectivity . 61 4.4 Clustering connectivity . 64 4.5 Server Time Protocol . 65 4.6 Compression options . 66 4.6.1 On-core Compression coprocessor . 66 4.6.2 On-chip IBM Integrated Accelerator for zEnterprise Data Compression. 66 4.7 Cryptographic features . 67 4.7.1 Central Processor Assist for Cryptographic Functions . 67 4.7.2 Crypto Express7S . 67 4.7.3 Crypto Express6S and Crypto Express5S (carry forward only) . 69 4.8 IBM Virtual Flash Memory. 69 4.9 Hardware Management.
Recommended publications
  • IBM Z Systems Introduction May 2017
    IBM z Systems Introduction May 2017 IBM z13s and IBM z13 Frequently Asked Questions Worldwide ZSQ03076-USEN-15 Table of Contents z13s Hardware .......................................................................................................................................................................... 3 z13 Hardware ........................................................................................................................................................................... 11 Performance ............................................................................................................................................................................ 19 z13 Warranty ............................................................................................................................................................................ 23 Hardware Management Console (HMC) ..................................................................................................................... 24 Power requirements (including High Voltage DC Power option) ..................................................................... 28 Overhead Cabling and Power ..........................................................................................................................................30 z13 Water cooling option .................................................................................................................................................... 31 Secure Service Container .................................................................................................................................................
    [Show full text]
  • Leveraging Integrated Cryptographic Service Facility
    Front cover Leveraging Integrated Cryptographic Service Facility Lydia Parziale Redpaper International Technical Support Organization Leveraging Integrated Cryptographic Service Facility January 2018 REDP-5431-00 Note: Before using this information and the product it supports, read the information in “Notices” on page v. First Edition (January 2018) This edition applies to Version 2 Release 3 of IBM z/OS (product number 5650-ZOS). © Copyright International Business Machines Corporation 2018. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . .v Trademarks . vi Preface . vii Authors. vii Now you can become a published author, too! . vii Comments welcome. viii Stay connected to IBM Redbooks . viii Chapter 1. Overview . 1 1.1 The need for cryptography . 2 1.2 Cryptographic architectures . 3 1.2.1 PKCS #11 . 3 1.2.2 IBM Common Cryptographic Architecture. 3 1.3 System Authorization Facility . 4 1.4 What ICSF is . 5 1.4.1 ICSF services . 5 1.4.2 ICSF options . 6 1.4.3 SAF-protecting ICSF services and IBM CCA Keys. 8 Chapter 2. IBM Z hardware cryptography implementation . 9 2.1 CP Assist for Cryptographic Functions . 10 2.2 The IBM Cryptographic Coprocessor . 10 2.3 The Trusted Key Entry workstation . 12 2.3.1 Clear key versus secure key versus protected key. 12 2.3.2 TKE and the benefits of using ICSF and protected keys . 14 Chapter 3. Auditing . 15 3.1 ICSF: Enhanced logging for PCI audit requirements . 16 3.2 ICSF and SMF .
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 9,129,043 B2 Pandya (45) Date of Patent: Sep
    USOO9129043B2 (12) United States Patent (10) Patent No.: US 9,129,043 B2 Pandya (45) Date of Patent: Sep. 8, 2015 (54) 1OOGBPS SECURITY AND SEARCH (56) References Cited ARCHITECTURE USING PROGRAMMABLE INTELLIGENT SEARCH MEMORY U.S. PATENT DOCUMENTS 5, 187,800 A 2f1993 Sutherland (76) Inventor: Ashish A. Pandya, El Dorado Hills, CA 5,640,525 A 6/1997 Yumoto et al. 5,872,972 A 2f1999 Boland et al. (US) 5,968,176 A 10, 1999 Nessett et al. 6,018,779 A 1/2000 Blumenau 6,018,799 A 1/2000 Wallace et al. (*) Notice: Subject to any disclaimer, the term of this 6,021,490 A 2/2000 Vorbach et al. patent is extended or adjusted under 35 6,130,892 A 10/2000 Short et al. U.S.C. 154(b) by 0 days. 6,147,976 A 11/2000 Shand et al. 6,205,537 B1 3/2001 Albonesi 6,237,029 B1 5, 2001 Master et al. (21) Appl. No.: 13/472,042 6,304,973 B1 10/2001 Williams 6.421,742 B1 7, 2002 Tillier (22) Filed: May 15, 2012 6.427,170 B1 7/2002 Sitaraman et al. (Continued) (65) Prior Publication Data FOREIGN PATENT DOCUMENTS US 2013/OO18835A1 Jan. 17, 2013 JP 2002-63060 2, 2002 WO WO 98.54644 12/1998 Related U.S. Application Data (Continued) OTHER PUBLICATIONS (63) Continuation of application No. 13/172.276, filed on Jun. 29, 2011, now Pat. No. 8,200,599, which is a International Search Report Issued in PCT/US2007/86785, mailed continuation of application No.
    [Show full text]
  • IBM Z13 Server Technology
    Introducing the IBM® z13™ Server Platform Structure and Performance Monte Bauman Enterprise Server Technical Support IBM Columbus [email protected] January 2015 IBM z Systems Agenda § Design Imperatives § The IBM z Systems z13 Server § The z13 Big Data Server 2 © 2015 IBM Corporation IBM z Systems Design Imperatives IBM z Systems Business Imperatives The Mobile Moment The Odds are High … Business Management is interested in... Enterprise § Promoting High Retention Rates and Capturing Class Competitive share through mobile interactions Cloud § Driving integrated/smart transactions that improve the Client Experience (e.g. Next Best Action) Business- Critical § Growing and Improving the IT services consumer Analytics experience within Existing Environmental Envelope Smart Transactions 4 © 2015 IBM Corporation IBM z Systems IBM z13 Design Primitives The IBM z13 Server was developed with the intent to: § Capture transaction growth through mobile enablement of existing systems § Drive integrated analytics at the time of the transaction § Deliver higher levels of Capacity and Performance within the Existing Environmental Envelope Enclave-Encapsulated Systems of Engagement Systems of Record Systems of Insight 5 © 2015 IBM Corporation IBM z Systems The IBM z13 Server 6 © 2015 IBM Corporation IBMIBM z Systems z13 platform positioning Platform Core Capabilities: Transaction Processing • The world’s premier transaction and data engine now enabled for Data Serving the mobile generation Mixed Workloads Operational Efficiency • The integrated transaction
    [Show full text]
  • Linux on IBM Z13:Performance Aspects of New Technology And
    Linux on IBM z13: Performance Aspects of New Technology and Features Mario Held ([email protected]) Linux on z Systems Performance Analyst IBM Corporation Session 17772 August 13, 2015 Trademarks The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. BlueMix ECKD IBM* Maximo* Smarter Cities* WebSphere* z Systems BigInsights FICON* Ibm.com MQSeries* Smarter Analytics XIV* z/VSE* Cognos* FileNet* IBM (logo)* Performance Toolkit for VM SPSS* z13 z/VM* DB2* FlashSystem IMS POWER* Storwize* zEnterprise* DB2 Connect GDPS* Informix* Quickr* System Storage* z/OS* Domino* GPFS InfoSphere Rational* Tivoli* DS8000* Sametime* * Registered trademarks of IBM Corporation The following are trademarks or registered trademarks of other companies. Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. Windows Server and the Windows logo are trademarks of the Microsoft group of countries. ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S.
    [Show full text]
  • SIMD Processing on IBM Z14, Z13 and Z13s
    with current compilers. String and character array processing, traditional loop and array SIMD Processing on IBM z14, z13 and z13s Background Companies want to quickly and efficiently processing with integer and floating point data process huge amounts of information for can all be accelerated using SIMD. Complex analytics, mobile applications, data serving and mathematical processing, algorithmic-intensive more. To cost-effectively achieve these programs, image processing applications, and efficiencies new innovative technologies are other applications can be efficiently processed needed. Vector processing and SIMD optimize with SIMD. SIMD also enables processing of a performance by processing data in parallel on new class of applications on IBM Z using ® IBM Z . analytics, mathematical optimization without requiring an offload to specialized processors. What is SIMD? Standard SIMD math and linear algebra libraries SIMD stands for Single Instruction Multiple Data. enable easier porting from X86 platforms. Unlike instructions which performs a single operation on a single data point, SIMD instructions Compilers can perform the same operation on multiple data SIMD helps you achieve efficiencies using IBM points at once. z/OS® XL C/C++ V2.1.1, IBM Enterprise COBOL 5.2 and IBM Enterprise PL/I for z/OS V4.5, for SIMD is an innovation that was delivered with applications with character or integer IBM z13® (z13) and IBM z13s™ (z13s). With SIMD manipulation. IBM z/OS XL C/C++ V2.1.1 entire arrays of data can be processed by a compilers offer new capabilities, such as single instruction enabling more efficient architecture sections, inline assembly, and high processing of data.
    [Show full text]
  • The Fully Encrypted Data Center Encrypting Your Data Center on Oracle’S SPARC Servers
    The Fully Encrypted Data Center Encrypting Your Data Center on Oracle’s SPARC Servers O R A C L E T E C H N I C A L WHITE P A P E R | OCTOBER 2015 Table of Contents Introduction 1 Target Audience and Assumed Knowledge 1 The Role and Relevance of Oracle’s SPARC Processors 1 SPARC M7 Processor—Integrated Cryptographic Acceleration 1 SPARC Processor Cryptographic Operational Model 2 End-to-End Application Security Using SPARC Processors 3 SPARC Cryptography Performance 3 Configuring Application Tier Security 4 Oracle WebLogic Server Security Acceleration Using Oracle Ucrypto Provider 4 Accelerating TLS Using Oracle Ucrypto Provider 5 Accelerating Web Services Security Using the Oracle Ucrypto Provider 6 Using the Latest Version of TLS 7 Verifying Hardware-Assisted Security for Oracle Application Server 8 Database Tier Security 9 Oracle Database Security: Applied Scenarios 9 Master Key Management Using Oracle Solaris PKCS#11 Softtoken 9 Securing the Master Key Management for Transparent Data Encryption 10 Tablespace and Column Encryption 11 Encrypting and Decrypting Database Backup and Restore 12 Securing Data at Rest Using ZFS Encryption 13 Summary 14 References 14 THE FULLY ENCRYPTED DATA CENTER Introduction This document discusses how to secure applications using Oracle Solaris 11 security and the hardware-assisted cryptography capabilities of Oracle’s SPARC servers. This document explores the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers. In addition, this document covers the Oracle hardware-assisted cryptographic acceleration of the SPARC processor, a key feature when performance and data protection are deemed critical.
    [Show full text]
  • On Wide Area Network Optimization
    On Wide Area Network Optimization __________________________________________ © 2012 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. Citation: Y. Zhang, N. Ansari, M. Wu, and H. Yu, “On Wide Area Network Optimization,” IEEE Communications Surveys and Tutorials, Vol. 14, No.4, pp. 1090‐1113, Fourth Quarter 2012. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6042388 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, ACCEPTED FOR PUBLICATION 1 On Wide Area Network Optimization Yan Zhang, Nirwan Ansari, Mingquan Wu, and Heather Yu Abstract—Applications, deployed over a wide area network when the packet loss rate increases from 0.1% to 3% and 5%, (WAN) which may connect across metropolitan, regional or respectively. national boundaries, suffer performance degradation owing to unavoidable natural characteristics of WANs such as high latency Many factors, not normally encountered in LANs, can and high packet loss rate. WAN optimization, also known as WAN quickly lead to performance degradation of applications which acceleration, aims to accelerate a broad range of applications are run across a WAN.
    [Show full text]
  • IBM Z13s Frequently Asked Questions
    IBM z Systems Introduction April 2016 IBM z13s Frequently Asked Questions Worldwide ZSQ03076-USEN-09 1 Table of Contents z Systems Naming ........................................................................................................................................ 3 z13s Hardware .............................................................................................................................................. 4 z13 Hardware .............................................................................................................................................. 15 Performance ................................................................................................................................................ 24 z13 Warranty ............................................................................................................................................... 28 Hardware Management Console (HMC) ..................................................................................................... 30 Power requirements (including High Voltage DC Power option) ............................................................... 36 Overhead Cabling and Power ..................................................................................................................... 38 z13 Water cooling option ............................................................................................................................. 39 z Appliance Container Infrastructure - zACI ...............................................................................................
    [Show full text]
  • About This Template
    Introducing IBM z15 Cryptography And the Ecosystem around it Table of Contents ▪ IBM Z Crypto History ▪ IBM Z Crypto Solutions ▪ Enterprise Key Management Foundation (EKMF) ▪ IBM Z Crypto Hardware ▪ Security Key Lifecycle Manager (SKLM) ▪ CP Assist for Cryptographic Function ▪ Advanced Crypto Service Provider (ACSP) (CPACF) ▪ Crypto Analytics Tool (CAT) ▪ Crypto Express 7S (CEX7S) ▪ IBM Trusted Key Entry (TKE) Workstation ▪ Encryption Facility (EF) ▪ User-Defined Extensions (UDX) ▪ zSecure Suite ▪ IBM Z Pervasive Encryption ▪ IBM Z Crypto Hardware Virtualization ▪ z/OS Data Set Encryption ▪ z/VM Virtualization of Crypto Hardware ▪ Disk Encryption ▪ Coupling Facility (CF) Encryption ▪ IBM Z Crypto Software ▪ z/OS and Linux on z Network Security ▪ Linux on Z (and LinuxONE) ▪ Linux on z Volume Encryption ▪ z/OS ▪ Hyper Protect Virtual Servers ▪ z/VM ▪ z/VM Encrypted Paging ▪ z/VSE ▪ z/VM Network Security ▪ z/TPF Transparent Database Encryption IBM Z Crypto History IBM Z Crypto History 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010/11 2012 2013 Cryptographic Coprocessor Facility (CCF) G3, G4, G5, G6, z900, z800 PCI Cryptographic Coprocessor (PCICC) G5, G6, z900, z800 PCI Cryptographic Accelerator (PCICA) z800/z900 z990 z890 PCIX Cryptographic Coprocessor (PCIXCC) z990 z890 CP Assist for Cryptographic z990 z890 z9 EC z9 BC z10 EC/BC z196/z114 zEC12 zBC12 Functions z9 EC z9 BC z10 EC/BC Crypto Express2 z990/z890 ▪ Cryptographic Coprocessor Facility – Supports “Secure key” cryptographic processing ▪ PCICC Feature – Supports “Secure key” cryptographic
    [Show full text]
  • IBM Z Systems Hardware - 2016 Technical Overview
    IBM z Systems Hardware - 2016 Technical Overview Session B01 / C15 Walter Kläy, IMS SWAT Team [email protected] with support from Kevin Hite (SVL) and Silvia Mueller (BOB) © 2016 IBM Corporation Innovation never stops. …2016… Internet of things GA2 Cloud SMT MobileIMS Rockhopper z13s Mainframe Mainframe IBM SIMD Internet of things IBM IBMEmperor LinuxOne Cloud CloudInternet of things z13 Mobile Mobile 2 Digital Revolution Transform interactions World becoming smarter Personalized everything In the moment right now What is happening? 16 billion connected devices Infrastructure of the company 75 billion devices by 2020 Infrastructure of the city 7 billion smart phones Infrastructure of the world Respect and protect security and privacy 3 The market is moving, forcing businesses to transform Explosion in Analytics is Hybrid cloud is the transaction growth moving to real time new standard driven by mobility to capture new for delivering service, and the Internet of opportunities at the agility, trust and Things point of impact efficiency 4 z13 Overview © 2016 IBM Corporation IBM z Systems Evolution New Brand: LinuxOne 6 z13(s) Functions and Features (DGA Driver Level 22) System, Processor, Memory I/O Subsystem, Parallel Sysplex, STP, Security Five hardware models New PCIe Gen3 I/O fanouts with 16 GBps Buses Eight core 22nm PU SCM LCSS increased from 4 to 6 Up to 141 processors configurable as CPs, zIIPs, IFLs, ICFs, or optional SAPs 4th Subchannel Set per LCSS Increased Uni processor capacity z13 Maximum number of I/O Devices (subchannels)
    [Show full text]
  • IBM Db2 12 for Z/OS Performance Topics
    Front cover IBM Db2 12 for z/OS Performance Topics Akiko Hoshikawa Mai Nguyen Bart Steegmans Neena Cherian Bharat Verma Nguyen Dao Brian Baggett Ou Jin Chang Kim Peng Huang Chongchen Xu Ping Liang Chung Wu Robert Boon Cristian Molaro Todd Munk Jasmi Thekveli Xue Lian Zhang Kaitlin E. Murray Liang Zhang Lingyun Wang Redbooks International Technical Support Organization IBM Db2 12 for z/OS Performance Topics September 2017 SG24-8404-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (September 2017) © Copyright International Business Machines Corporation 2017. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x Preface . xi Authors. xi Now you can become a published author, too! . xiii Comments welcome. xiii Stay connected to IBM Redbooks . xiv Chapter 1. Introduction . 1 1.1 Overview . 2 1.1.1 Performance . 2 1.1.2 High-level expectations . 4 1.2 Db2 12 for z/OS performance features . 6 1.2.1 System-level performance . 6 1.2.2 Query performance improvement . 16 1.2.3 Access path stability for dynamic SQL statements . 17 1.3 Other key features in Db2 12 for z/OS . 18 1.3.1 Mobile application enablement . 18 1.3.2 Resiliency and continuous availability. 19 1.3.3 Simplified migration and continuous delivery support . 20 1.4 How to use this book . 21 1.4.1 Measurement environments . 22 Chapter 2. Scalability enhancements and subsystem performance .
    [Show full text]