JES2 INITIALIZATION AND TUNING GUIDE PDF

Abstract for JES2 Initialization and Tuning Guide · How to send your comments to IBM · Summary How to initialize JES2 in a multi-access SPOOL configuration. JES2 Initialization and Tuning Guide. z/OS JES2 Initialization and Tuning Guide contains the following information in support of JES2 Email Delivery Services. JES2 initialization statement and parameter summary tables · JES2 initialization statement descriptions · APPL(jxxxxxxx) – Application Characteristics.

Author: Vihn Akirn
Country: Sierra Leone
Language: English (Spanish)
Genre: History
Published (Last): 16 December 2007
Pages: 295
PDF File Size: 17.52 Mb
ePub File Size: 13.56 Mb
ISBN: 904-6-40435-895-4
Downloads: 1133
Price: Free* [*Free Regsitration Required]
Uploader: Dikasa

This is often when the owning JES2 address space is not running due to a failure or having not been partitioned out of the sysplex. This round-robin approach might break when the number of JES2 members increase. Skip to content Skip to main menu Resources Disclaimer. This information should be used as capacity planning data to gauge whether you have significant growth and need to take any action.

Just because one member inktialization unable to access the queues another member might be performing useful work. It also provides a mechanism to have spool space online and ready to use if spool volumes start to fill up. There are potential failure scenarios at UCB level that continue to qualify the availability benefits of fenced volumes.

To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. Use the online Contact us review redbook form found at: The primary write operation is used to bring the down level DASD copy tuninv the queues up to date. Checkpoint allocation summary You can be use the values in Table 1 as starting points for checkpoint allocation.

  LEY 11330 SANTA FE PDF

IBM may use or distribute any of the information you supply in any way it believes appropriate jds2 incurring any obligation to you. The prime objective is availability. This paper discusses JES2 processor utilization, checkpoint and spool considerations, workload manager WLM managed initiators, scalability, command processing, and identifying issues with performance degradation.

Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply tunng you. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used.

If it must take two cycles, then it can take two or more seconds to complete and can write twice as much data to the checkpoint. Abbreviated forms of these titles are used throughout this document. Gide gives availability benefits. Guids following are the most commonly used traces that are used for JES2 performance analysis: If one particular PCE is shown to be far busier than others, then you can balance the associated work across more members of the MAS to spread out initializaton activity.

So, you can run them with confidence. Because spool volumes are read by a number of vendor products including SDSFany change to how spool addressing operates affects these products. RMF Coupling Facility report for analysis of delays when the checkpoint is resident on a coupling facility.

  GREAT TERRIBLE BEAUTY LIBBA BRAY PDF

Commands such as these should be broken up into ranges, such as: For guid, performance can be seriously degraded if you allow your checkpoint data set to share the same volume as that of your spool.

See HASP origin storyif interested.

Red books JES2 Performance and Availability Considerations

However, it is the user’s responsibility to evaluate and verify the operation of any non-IBM product, program, or service. Processes within JES2 which do not need to access the checkpoint will run uninterrupted even during a time frame when the checkpoint is in a non-useful state.

Tuning the checkpoint really starts with getting a good HOLD value for each system. To identify the most active member or members, the simplest approach is to establish which has the most checkpoint activity locks. In reality, the HOLD parameter is a minimum hold value.

Table of Contents (exploded view)

This limit uses a track address that is relative to the start of the spool data set. Standard JES2 processing allows the allocation of track groups across any available spool volume. This technology assists the checkpoint useful time. There are many possibilities about the cause of the issue.