IBM 170 Servers manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation IBM 170 Servers. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel IBM 170 Servers ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation IBM 170 Servers décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation IBM 170 Servers devrait contenir:
- informations sur les caractéristiques techniques du dispositif IBM 170 Servers
- nom du fabricant et année de fabrication IBM 170 Servers
- instructions d'utilisation, de réglage et d’entretien de l'équipement IBM 170 Servers
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage IBM 170 Servers ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles IBM 170 Servers et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service IBM en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées IBM 170 Servers, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif IBM 170 Servers, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation IBM 170 Servers. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    IBM Power Systems Performance Capabilities Reference IBM i operating system Version 6.1 January/April/October 2008 This document is intended for use by qualified performance related programmers or analysts from IBM, IBM Business Partners and IBM customers using the IBM Power TM Systems platform running IBM i operating system. Information in this do[...]

  • Page 2

    Note! Before using this information, be sure to read the general information under “Special Notices.” Twenty Fifth Edition (January/April/October 2008 ) SC41-0607-13 This edition applies to IBM i operating System V6.1 running on IBM Power Systems. You can request a copy of this document by download from IBM i Center via the System i Internet si[...]

  • Page 3

    Table of Contents 62 4.14 Performance References for DB2 ................................................. 61 4.13 Reuse Deleted Record Space ..................................................... 59 4.12 Variable Length Fields .......................................................... 58 4.11 Triggers ...............................................[...]

  • Page 4

    154 References for JDBC .......................................................... 153 JDBC Performance Tuning Tips .................................................. 153 10.1 DB2 for i5/OS access with JDBC ................................................. 153 Chapter 10. DB2 for i5/OS JDBC and ODBC Performance ............................. 150 9.1[...]

  • Page 5

    195 14.1.3 571B ................................................................. 193 14.1.2 iV5R2 Direct Attach DASD ................................................... 192 14.1.1 Hardware Characteristics ............................................... 192 14.1.0 Direct Attach (Native) ........................................................ 191 1[...]

  • Page 6

    244 Data Compaction (COMPACT) ................................................... 244 Data Compression (DTACPR) .................................................... 244 Use Optimum Block Size (USEOPTBLK) ............................................ 244 15.2 Save Command Parameters that Affect Performance ................................. 243 15.1 S[...]

  • Page 7

    283 17.2.3 iSCSI virtual I/O private memory pool ........................................ 282 17.2.2 iSCSI Disk I/O Operations: ................................................. 281 17.2.1 IXS/IXA Disk I/O Operations: ............................................... 281 17.2 Effects of Windows and Linux loads on the host system .....................[...]

  • Page 8

    327 Chapter 21. High Availability Performance ........................................... 325 20.6 Aligning Floating Point Data on Power6 ........................................... 324 20.5 POWER6 520 Memory Considerations ............................................ 323 Models With/Without HMT .....................................................[...]

  • Page 9

    368 C.18 AS/400 CISC Model Capacities ................................................. 367 C.17 AS/400 Models 4xx, 5xx and 6xx Systems ......................................... 366 C.16 AS/400e Custom Application Server Model SB1 .................................... 365 C.15 AS/400 Advanced Servers .................................................[...]

  • Page 10

    Special Notices DISCLAIMER NOTICE Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. This information is presented along with general recommendations to assist the reader to have a better understanding of IBM(*) products. The actual throughput or performance that any user will experience [...]

  • Page 11

    The following terms, which may or may not be denoted by an asterisk (*) in this publication, are trademarks of the IBM Corporation. Power TM Systems Software Power TM Systems Software PowerPC POWER6+ POWER6 Power TM Systems POWER5+ POWER5 POWER POWER4+ POWER4 Micro-partitioning Lotus, Lotus Notes, Lotus Word Pro, Lotus 1-2-3 AIX IBM Network Station[...]

  • Page 12

    Purpose of this Document The intent of this document is to help provide guidance in terms of IBM i operating system performance, capacity planning information, and tips to obtain optimal performance on IBM i operating system. This document is typically updated with each new release or more often if needed. This October 2008 edition of the IBM i V6.[...]

  • Page 13

    Chapter 1. Introduction IBM System i and IBM System p platforms unified the value of their servers into a single, powerful lineup of servers based on industry leading POWER6 processor technology with support for IBM i operating system (formerly known as i5/OS), IBM AIX and Linux for Power. Following along with this exciting unification are a number[...]

  • Page 14

    versions. The primary public performance information web site is found at: http://www.ibm.com/systems/i/advantages/perfmgmt/index.html IBM i 6.1 Performance Capabilities Reference - January/April/October 2008 © Copyright IBM Corp. 2008 Chapter 1- Introduction 14[...]

  • Page 15

    Chapter 2. iSeries and AS/400 RISC Server Model Performance Behavior 2.1 Overview iSeries and AS/400 servers are intended for use primarily in client/server or other non-interactive work environments such as batch, business intelligence, network computing etc. 5250-based interactive work can be run on these servers, but with limitations. With iSeri[...]

  • Page 16

    interactive utilization - an average for the interval . Since average utilization does not indicate potential problems associated with peak activity, a second metric (SCIFTE) reports the amount of interactive utilization that occurred above threshold. Also, interactive feature utilization was reported when printing a System Report generated from Co[...]

  • Page 17

    2.1.4 V5R2 and V5R1 There were several new iSeries 8xx and 270 server model additions in V5R1 and the i890 in V5R2. However, with the exception of the DSD models, the underlying server behavi or did not change from V4R5. All 27x and 8xx models, including the new i890 utilize the same server behavior algorithm that was announced with the first 8xx m[...]

  • Page 18

    y The new server algorithm only applies to the new hardware available in V4R5 (2xx, 8xx and SBx models). The behavior of all other hardware, such as the 7xx models is unchanged (see section 2.2.3 Existing Model section for 7xx algorithm). 2.2.2 Choosing Between Similarly Rated Systems Sometimes it is necessary to choose between two systems that hav[...]

  • Page 19

    grows at a rate which can eventually eliminate server/batch capacity and limit additional interactive growth. It is best for interactive workloads to execute below (less than) the knee of the curve. (However, for those models having the knee at 1/3 of the total interactive capacity, satisfactory performance can be achieved.) The following graph ill[...]

  • Page 20

    2.3 Server Model Differences Server models were designed for a client/server workload and to accommodate an interactive workload. When the interactive workload exceeds an interactive CPW threshold (the “knee of the curve”) the client/server processing performance of the system becomes increasingly impacted at an accelerating rate beyond the kne[...]

  • Page 21

    0 6/7 Full Fraction of Interactive CPW 0 20 40 60 80 100 Available CPU available CFINT interactive Custom Server Model CPU Distribution vs. Interactive Utilization Knee Availabl e for Client/Serve r Applies to: AS /400e Cust om Servers, AS/400e Mixed Mode Servers Figure 2.2. Custom Server Model behavior 0 1/3 Int-CPW Full Int-CPW Fraction of Intera[...]

  • Page 22

    2.4 Performance Highlights of Model 7xx Servers 7xx models were designed to accommodate a mixture of traditional “green screen” applications and more intensive “server” environments. Interactive features may be upgraded if additional interactive capacity is required. This is similar to disk, memory, or other features. Each system is rated w[...]

  • Page 23

    2.5 Performance Highlights of Model 170 Servers iSeries Dedicated Server for Domino models will be generally available on September 24, 1999. Please refer to Section 2.13, iSeries Dedicated Server for Domino Performance Behavior , for additional information. Model 170 servers (features 2289, 2290, 2291, 2292, 2385, 2386 and 2388) are significantly [...]

  • Page 24

    The next chart shows the performance capacity of the curr ent and previous Model 170 servers . Previous vs. Curr ent AS/ 4 00e server 170 Per f ormance * Un constra ined V4R 2 rate s 73 114 210 319 319 50 73 115 220 460 460 1090 16 23 29 40 67 15 20 25 30 50 70 70 2159 2160 2164 2176 2183 2289 2290 2291 2292 2385 2386 2388 0 200 400 600 800 1000 12[...]

  • Page 25

    and higher than normal CFINT values. The goal is to avoi d exceeding the threshold (knee of the curve) value of interactive capacity. 2.8 Interactive Utilization When the interactive CPW utilization is beyond the knee of the curve, t he following formulas can be used to determine the effective interactive utilization or the available/remaining clie[...]

  • Page 26

    Now if the interactive CPU is held to less than 4 % CPU (the knee), then the CPU available fo r the System, Batch, and Client/Server work is 100% - the Interactive CPU used . If the interactive CPU is allowed to grow above the knee, say for e x ample 9 % (or 41 CPW), then the CPU percent remaining for the Batch and System is calculate d using the f[...]

  • Page 27

    If customers modify an IBM-supplied class description, they are responsible for ensuring the priority value is 35 or less after each new release or cumulative PTF package has been installed. One way to do this is to include the Change Class (CHGCLS) command in the system Start Up program. NOTE: Several IBM-supplied class descriptions already have R[...]

  • Page 28

    Server Dynamic Tuning Recommendations On the new systems and mixed mode servers have the QDYNPTYSCD and QDYNPTYADJ system value set on. This preserves non-interactive capa cities and the interactive response times will be dynamic beyond the knee regardless of the setting. Also set non-interactive class run prio rities to less than 35. On earlier se[...]

  • Page 29

    2.10 Managing Interactive Capacity Interactive/Server characteristics in the real world. Graphs and formulas listed thus far work perfectly, provided the workload on the system is highly regu lar and steady in nature. Of course, ver y few systems have workloads like that. The more typical case is a dynamic combination of transaction types, user act[...]

  • Page 30

    There are other means for determining interactive utilization . The easiest of these is the performance monitoring function of Management Central, whic h became available with V4R3. Management Central can provide: y Graphical, real-time monitoring of interactive CPU utilization y Creation of an alert threshold when an alert feature is turned on and[...]

  • Page 31

    2. A similar effect can be found with index builds. If parallelism is enabled, index creat ion (CRTLF, Create Index, Open a file with MAINT(*REBUILD), or running a query that requires an index to be build) will be sent to service jobs that operate in non-interactive mode, but charge their work back to the job that requested the service. Again, the [...]

  • Page 32

    2.11 Migration from Traditional Models This section describes a suggested methodology to determine which server model is appropriate to contain the interactive workload of a traditional model when a migration of a workload is occurring . It is assumed that the server model will have both interactive and client/server workloads. To get the same perf[...]

  • Page 33

    *********************************************************************************** Component Report Component Interval Activity Data collected 190396 at 1030 Member . . . : Q960791030 Model/Serial . : 310-2043/10-0751D Main St ... Library. . : PFR System name. . : TEST01 Version/Re.. 32.6 65.5 45.5 46.8 99.9 2.4 5,991 11:56 19.9 56.5 25.7 74.2 99.[...]

  • Page 34

    one third of the total possible interactive workload, for non-custom models. The equation shown in this section will migrate a traditional system to a server system and keep the interactive workload at or below the knee of the curve, that is, using less than two thirds of the total possible interactive workload. In some environments these equations[...]

  • Page 35

    2.13 iSeries for Domino and Dedicated Server for Domino Performance Behavior In preparation for future Domino releases which will provides support for DB2 files, the previous processing limitations associated with DSD models have been removed in i5/OS V5R3. In addition, a PTF is available for V5R2 which also removes the processi ng limitations for [...]

  • Page 36

    Domino-Complementary Processing Prior to V5R1, processing that did not spend the majority of its time in Domino code was considered non-Domino processing and was limited to approximately 10-15% of the system capacity. With V5R1, many applications that would previously have been treated as non-Domino may now be considered as Domino-complementary whe[...]

  • Page 37

    Similar to previous DSD performance behavior for interactive processing, the I nteractive CPW rating of 0 allows for system administrative functions to be performed by a single interactive user. In practice, a single interactive user will be able to perform necessary administrative functions without constraint. If multiple interactive users are sim[...]

  • Page 38

    processing present in the Linux logical partition, and all resources allocated to the Linux logical partition can essentially be used as though it were complementary processing. It is not necessary to propor tionally increase the amount of Domino processing in the OS/400 logical partition to account for the fact that Domino processing is not presen[...]

  • Page 39

    Chapter 3. Batch Performance In a commercial environment, batch workloads tend to be I/O intensive rather than CPU intensive. The factors that affect batch throughput for a given batch application include the following: y Memory (Pool size) y CPU (processor speed) y DASD (number and type) y System tuning parameters Batch Workload Description The Ba[...]

  • Page 40

    3.3 Tuning Parameters for Batch There are several system parameters that affect batch performance. The magnitude of the effect for each of them depends on the specific application and overall system characteristics. Some general information is provided here. y Expert Cache Expert Cache did not have a significant effect on the Commercial Mix batch w[...]

  • Page 41

    improve performance by eliminating disk I/O operations. y If communications lines are involved in the batch application, try to limit the number of communications I/Os by doing fewer (and perhaps larger) larger application sends and receives. Consider blocking data in the application. Try to place the application on the same system as the frequentl[...]

  • Page 42

    Chapter 4. DB2 for i5/OS Performance This chapter provides a summary of the new performance features of DB2 for i5/ OS on V6R1, V5R4 and V5R3, along with V5R2 highlights. Summaries of selected key topics on the performance of DB2 for i5/OS are provided. General information and some recommendations for improving performance are included along with l[...]

  • Page 43

    y DB2 Multisystem tables New function available in V6R1 whose use may affect SQL performance are derived key indexes, decimal floating point data type support, and the select from insert statement. A derived key index can have an expression in place of a column name that can use built-in functions, user defined functions, or some other valid expres[...]

  • Page 44

    the statement is complete. The implementation to invoke the locking causes a physical DASD write to the journal for each record, which causes journal waits. Journal caching on allows the journal writes to accumulate in memory and have one DASD write per multiple journal entries, greatly reducing the journal wait time. So select from insert statemen[...]

  • Page 45

    Table Expressions (RCTE) which allow for more elegant and better performing implementations of recursive processing. In addition, enhancements have been made in i5/OS V5R4 to the support for materialize query tables (MQTs) and partitioned table processing, which were both new in i5/OS V5R3. i5/OS V5R4 SQE Query Coverage The query dispatcher control[...]

  • Page 46

    Enhancements to extend the use of materialized query tables (MQTs) were added in i5/OS V5R4. New supported function in MQT queries by the MQT matching algorithm are unions and partitioned tables, along with limited support for scalar subselects, UDFs and user defined table functions, RCTE, and some scalar functions. Also new to i5/OS V5R4, the MQT [...]

  • Page 47

    SQL queries which continue to be routed to CQE in i5/OS V5R3 have the following attributes: y Tables with select/omit logicals over them y References to DDS logical files y ALWCPYDTA(*NO) y LOB columns y DB2 Multisystem y Like/Substring predicates y NLSS/CCSID translation between columns y Sensitive cursor i5/OS V5R3 SQE Performance Enhancements Ma[...]

  • Page 48

    Partitioned Table Support Table partitioning is a new feature introduced in i5/OS V5R3. The design is localized on an individual table basis rather than an entire library. The user specifies one or more fields which collectively act as a partitioning key. Next the records in the table are distributed into multiple disjoint sets based on the partiti[...]

  • Page 49

    y Statistical Strategies y SMP Considerations y Administration Examples (Adding a Partition, Dropping a Partition, etc.) Materialized Query Table Support The initial release of i5/OS V5R3 includes the Materialized Query Table (MQT) (also referred to as automatic summary tables or materialized views) support in UDB DB2 for i5/OS as essentially a tec[...]

  • Page 50

    more information may be used in the query plan costing phase than was available to the optimizer previously. The optimizer may now use newly implemented database statistics to make more accurate decisions when choosing the query access plan. Also, the enhanced optimizer may more often select plans using hash tables and sorted partial result lists t[...]

  • Page 51

    should be made to determine if the needed statistics are available. Also in environments where long running queries are run only one time, it may be beneficial to ensure that statistics are available prior to running the queries. Some properties of database column statistics are as follows: y Column statistics occupy little storage, on average 8-12[...]

  • Page 52

    SQE for V5R2 Summary Enhancements to DB2 for i5/OS, called SQE, were made in V5R2 . The SQE enhancements are object oriented implementations of the SQE optimizer, the SQE query engine and the SQE database statistics. In V5R2 a subset of the read-only SQL queries will be optimized and run with the SQE enhancements. The effect of SQE on performance w[...]

  • Page 53

    4.6 DB2 Symmetric Multiprocessing feature Introduction The DB2 SMP feature provides application transparent support for parallel query operations on a single tightly-coupled multiprocessor System i (shared memory and disk). In addition, the symmetric multiprocessing (SMP) feature provides additional query optimization algorithms for retrieving data[...]

  • Page 54

    limit the amount of data it brings into and keeps in memory to a job’s share of memory. The amount of memory available to each job is inversely proportional to the number of active jobs in a memory pool. The memory-sharing algorithms discussed above provide balanced performance for all the jobs running in a memory pool. Running short transactiona[...]

  • Page 55

    y Allows customers to replace current programming methods of capturing and transmitting journal entries between systems with more efficient system programming methods. This can result in lower CPU consumption and increased throughput on the source system. y Can significantly reduce the amount of time and effort required by customers to reconcile th[...]

  • Page 56

    There are 3 sets of tasks which do the SMAPP work. These tasks work in the background at low priority to minimize the impact of SMAPP on system performance. The tasks are as follows: y JO_EVALUATE-TASK - Evaluates indexes, estimates rebuild time for an index, and may start or stop implicit journaling of an index. y JO-TUNING-TASK - Periodically wak[...]

  • Page 57

    multiple nodes in the cluster, access to the database files is seamless and transparent to the applications and users that reference the database. To the users, the partitioned files still behave as though they were local to their system. The most important aspect of obtaining optimal performance with DB2 Multisystem is to plan ahead for what data [...]

  • Page 58

    4.10 Referential Integrity In a database user environment, there are frequent cases where the data in one file is dependent upon the data in another file. Without support from the database management system, each application program that updates, deletes or adds new records to the files must contain code that enforces the data dependency rules betw[...]

  • Page 59

    The following are performance tips to consider when using triggers support: y Triggers are activated by an external call. The user needs to weigh the benefit of the trigger against the cost of the external call. y If a trigger is going to be used, leave as much validation to the trigger program as possible. y Avoid opening files in a trigger progra[...]

  • Page 60

    To create the variable length field just described, use the following DB2 statement: CREATE TABLE library/table-name (field VARCHAR(50) ALLOCATE(20) NOT NULL) In this particular example the field was created with the NOT NULL option. The other two options are NULL and NOT NULL WITH DEFAULT. Refer to the NULLS section in the SQL Reference to determi[...]

  • Page 61

    01 DESCR. 49 DESCR-LEN PIC S9(4) COMP-4. 49 DESCRIPTION PIC X(40). EXEC SQL FETCH C1 INTO DESCR END-EXEC. For more detail about the vary-length character string, refer to the SQL Programmer's Guide. The above point is also true when using a high-level language to insert values into a variable length field. The variable that contains the value [...]

  • Page 62

    In contrast, when reuse is active, the database support will process the added record more like an update operation than an add operation. The database support will maintain a bit map to keep track of deleted records and to provide fast access to them. Before a record can be added, the database support must use the bit-map to find the next availabl[...]

  • Page 63

    2. The System i information center section on DB2 for i5/OS under Database and file systems has information on all aspects of DB2 for i5/OS including the section Monitor and Tune database under Administrative topics . This can be found at url: http://www.ibm.com/eserver/iseries/infocenter 3. Information on creating efficient running queries and que[...]

  • Page 64

    Chapter 5. Communications Performance There are many factors that affect System i performance in a communications environment. This chapter discusses some of the common factors and offers guidance on how to help achieve the best possible performance. Much of the information in this chapter was obtained as a result of analysis expe rience within the[...]

  • Page 65

    y IBM’s Host Ethernet Adapter (HEA) integrated 2-Port 10/100/1000 Based-TX PCI-E IOA supports checksum offloading, 9000-byte jumbo frames (1 Gigabit only) and LSO - Large Send Offload (IPv4 only). These adapters do not require an IOP to be installed in conjunction with the IOA. Additionally, each physical port has 16 logical ports that may be ass[...]

  • Page 66

    Notes: 1. Unshielded Twisted Pair (UTP) card; uses copper wire cabling 2. Uses fiber optics 3. Custom Card Identification Number and System i Feature Code 4. Virtual Ethernet enables you to establish communication via TCP/IP between logical partitions and can be used without any additional hardware or software. 5. Depends on the hardware of the sys[...]

  • Page 67

    To demonstrate communications performance in various ways, several workload scenarios are analyzed. Each of these scenarios may be executed with regular nonsecure sockets or with secure SSL using the GSK API: 1. Request/Response (RR): The client and server send a specified amount of data back and forth over a connection that remains active. 2. Asym[...]

  • Page 68

    75.0 10.4 3 Sessions 70.0 10.5 2 Sessions 42.0 10.8 1 Session 15 Disk Units ASP on 2757 IOA 1 Disk Unit ASP on 2757 IOA FTP Performance in MB per second Virtual Ethernet 5.4 TCP/IP non-secure performance In table 5.4 you will find the payload information for the different Ethernet types. The most important factor with streaming is to determine how [...]

  • Page 69

    Notes : y Capacity metrics are provided for nonsecure transactions y The table data reflects System i as a server (not a client) y The data reflects Sockets and TCP/IP y This is only a rough indicator for capacity planning. Actual results may differ significantly. y All measurement where taken with Packet Trainer off (See 5.6 for line dependent per[...]

  • Page 70

    Notes : y Capacity metrics are provided for nonsecure and each variation of security policy y The table data reflects System i as a server (not a client) y This is only a rough indicator for capacity planning. Actual results may differ significantly. y Each SSL connection was established with a 1024 bit RSA handshake. 6.5 31.9 36.9 53.3 55.7 478.4 [...]

  • Page 71

    Notes : y Capacity metrics are provided for nonsecure and each variation of security policy y The table data reflects System i as a server (not a client) y This is only a rough indicator for capacity planning. Actual results may differ significantly. y Each SSL connections was established with a 1024 bit RSA handshake. y x, y and z are scaling cons[...]

  • Page 72

    Notes : y Capacity metrics are provided for nonsecure and each variation of security policy y The table data reflects System i as a server (not a client) y VPN measurements used transport mode, TDES, AES128 or RC4 with 128-bit key symmetric cipher and MD5 message digest with RSA public/private keys. VPN anti-replay was disabled. y This is only a ro[...]

  • Page 73

    y For additional information regarding your Host Ethernet Adapter please see your specification manual and the Performance Management page for future white papers regarding iSeries and HEA. y 1 Gigabit Jumbo frame Ethernet enables 12% greater throughput compared to normal frame 1 Gigabit Ethernet. This may vary significantly based on your system, n[...]

  • Page 74

    only a few seconds may perform best. Setting this value too low may result in extra error handling impacting system capacity. y No single station can or is expected to use the full bandwidth of the LAN media. It offers up to the media's rated speed of aggregate capacity for the attached stations to share. The disk access time is usually the li[...]

  • Page 75

    there is network congestion or overruns to certain target system adapters, then increasing the value from the default=*NONE to 2 or something larger may improve performance. MAXLENRU for APPC on the mode description (MODD): If a value of *CALC is selected for the maximum SNA request/response unit (RU) the system will select an efficient size that i[...]

  • Page 76

    • FTS is a less efficient way to transfer data. However, it offers built in data compression for line speeds less than a given threshold. In some configurations, it will compress data when using LAN; this significantly slows down LAN transfers. 5.8 HPR and Enterprise extender considerations Enterprise Extender is a protocol that allows the transm[...]

  • Page 77

    5.9 Additional Information Extensive information can be found at the System i Information Center web site at: http://www.ibm.com/eserver/iseries/infocenter . y For network information select “Networking” : y See “TCP/IP setup” d “Internet Protocol version 6” for IPv6 information y See “Network communications” d “Ethernet” for Et[...]

  • Page 78

    Chapter 6. Web Server and WebSphere Performance This section discusses System i performance information in Web serving and WebSphere environments. Specific products that are discussed include: HTTP Server (powered by Apache) (in section 6.1), PHP - Zend Core for i (6.2), WebSphere Application Server and WebSphere Application Server - Express (6.3) [...]

  • Page 79

    Information source and disclaimer: The information in the sections that follow is based on performance measurements and analysis done in the internal IBM performance lab. The raw data is not provided here, but the highlights, general conclusions, and recommendations are included. Results listed here do not represent any particular customer environm[...]

  • Page 80

    y CGI : HTTP invokes a CGI program which builds a simple HTML page and serves it via the HTTP server. This CGI program can run in either a new or a named activation group. The CGI programs were compiled using a "named" activation group unless specified otherwise. Web Server Capacity Planning : Please use the IBM Systems Workload Estimator[...]

  • Page 81

    Notes/Disclaimers : y Data assumes no access logging, no name server interactions, KeepAlive o n, LiveLocalCache off y Secure: 128-bit RC4 symmetric cipher and MD5 message digest with 1024-bit RSA public/private keys y These results are relative to each other and do not scale with other environments y Transactions using more complex programs or ser[...]

  • Page 82

    Notes/Disclaimers : y Data assumes no access logging, no name server interactions, KeepAlive o n, LiveLocalCache off y Secure: 128-bit RC4 symmetric cipher and MD5 message digest with 1024-bit RSA public/private keys y These results are relative to each other and do not scale with other environments y Transactions using more complex programs or ser[...]

  • Page 83

    Notes/Disclaimers : y These results are relative to each other and do not scale with other environments. y IBM System i CPU features without an L2 cache will have lower web server capacities than the CPW value would indicate 2.622 1.873 13.539 7.691 34.730 11.564 Static Page - FRCA 1.243 0.958 3.044 2.095 3.538 2.407 Static Page - Local Cache 1.068[...]

  • Page 84

    a. V5R4 provides similar Web server performance compared with V5R3 for most transactions (with similar hardware). In V5R4 there are opportunities to exploit improved CGI performance. More information can be found in the FAQ section of the HTTP server website http://www.ibm.com/servers/eserver/iseries/software/http/services/faq.html under “ How ca[...]

  • Page 85

    variable overhead of encryption/decr yption, which is proportional to the number of bytes in the transaction. Note the capacity factors in the tables above comparing non-secure and secure serving. From Table 6.1, note that simple transactions (e.g., static page serving) , the impact of secure serving is around 20%. For complex transactions ( e.g., [...]

  • Page 86

    11. HTTP and TCP/IP Configuration Tips: Information to assist with the configuration for TCP/IP and HTTP can be viewed at http://publib.boulder.ibm.com/infocenter/iseries/v5r4/index.jsp and http://www.ibm.com/servers/eserver/iseries/software/http/ a. The number of HTTP server threads : The reason for having multiple server threads is that when one [...]

  • Page 87

    13. File System Considerations : Web serving performance varies significantly based on which file system is used. Each file system has different overheads and performance characteristics. Note that serving from the ROOT or QOPENSYS directories provide the best system capacity. If Web page development is done from another directory, consider copying[...]

  • Page 88

    6.2 PHP - Zend Core for i This section discusses the different performance aspects of running PHP transaction based applications using Zend Core for i, including DB access considerations, utilization of RPG program call, and the benefits of using Zend Platform. Zend Core for i Zend Core for i delivers a rapid development and production PHP foundati[...]

  • Page 89

    y Throughput - Orders Per Minute (OPM). Each order actually consists of 10 web requests to complete the order. y Order response time (RT) in milliseconds y Total CPU - Total system processor utilization y CPU Zend/AP - CPU for the Zend Core / Apache component. y CPU DB - CPU for the DB component Database Access The following four methods were used [...]

  • Page 90

    Conclusions: 1. The performance of each DB connection interface provides exceptional response time at very high throughput. Each order processed consisted of ten web requests. As a result, the capacity ranges from about 650 transactions per second up to about 870 transactions per second. Using Zend Platform will provide even higher performance (ref[...]

  • Page 91

    Conclusions: 1. As stated earlier, persistent connections can dramatically improve overall performance. When using persistent connections for all transactions, the DB CPU utilization is significantly less than when using non-persistent connections. 2. For any transactions that run with autocommit turned on, use persistent connections. If the transa[...]

  • Page 92

    Conclusions: 1. In both cases above, the overall system capacity improved significantly when using Zend Platform, by about 15-35% for this workload. Wi th each order consisting of 10 web requests, proc essing 6795 orders per minute translates into abo ut 1132 tr ansactions per second. 2. Zend Platform will reduce the amount of processing in the Zen[...]

  • Page 93

    6.3 WebSphere Application Server This section discusses System i performance information for the WebSphere Application Server, including WebSphere Application Server V6.1, WebSphere Application Server V6.0, WebSphere Application Server V5.0 and V5.1, and WebSphere Application Server Express V5.1. Historically, both WebSphere and i5/OS Java performa[...]

  • Page 94

    because the improvements largely resulted from significant reductions in pathlength and CPU, environments that are constrained by other resources such as IO or memory may not show the same level of improvements seen here. Tuning changes in V6R1 As indicated above, most improvements will require no changes to an application. However, there are a few[...]

  • Page 95

    For WebSphere 5.1 and earlier refer to the Performance Considerations guide at: www.ibm.com/servers/eserver/iseries/software/websphere/wsappserver/product/PerformanceConsideratio ns.html For WebSphere 5.1, 6.0 and 6.1 please refer to the following page and follow the appropriate link: w ww.ibm.com/software/webservers/appserv/was/library/ Although s[...]

  • Page 96

    Trade 6 Benchmark ( IBM Trade Performance Benchmark Sample for WebSphere Application Server ) Description: Trade 6 is the fourth generation of the WebSphere end-to-end benchmark and performance sample application. The Trade benchmark is designed and developed to cover the significantly expanding programming model and performance technologies associ[...]

  • Page 97

    The Trade 6 application allows a user, typically using a Web browser, to perform the following actions: y Register to create a user profile, user ID/password and initial account balance y Login to validate an already registered user y Browse current stock price for a ticker symbol y Purchase shares y Sell shares from holdings y Browse portfolio y L[...]

  • Page 98

    WebSphere Application Server V6.1 Historically, new releases of WebSphere Application Server have offered improved performance and functionality over prior releases of WebSphere . WebSphere Application Server V6.1 is no exception. Furthermore, the availability of WebSphere Application Server V6.1 offers an entirely new opportunity for WebSphere cus[...]

  • Page 99

    Trade3 Measurement Results: Figure 6.2 Trade Capacity R esults y Trade3 chart: WebSphere 5.0 was measured on both V5R2 a nd V5R3 on a 4 way (LPAR) 825/2473 system WebSphere 5.1 was measured on V5R3 on a 4 way (LPAR) 825/2473 system WebSphere 6.0 was measured on V5R3 on a 4 way (LPAR) 825/2473 system WebSphere 6.0 was measured on V5R4 on a 2 way (LP[...]

  • Page 100

    Trade Scalability Results : Figure 6.3 Trade Scaling R esults y Trade 3 chart: V5R2 - 890/2488 32-Way 1.3 G Hz, V5R2 was measured with WebSphere 5.0 and WebSphere 5.1 V5R3 - 890/2488 32-Way 1.3 G Hz, V5R3 was measured with WebSphere 5.1 POWER5 chart: POWER4 - V5R3 825/2473 2-Way (LPAR) 1.1 GHz ., Power4 was measured with WebSphere 5.1 POWER5 - V5R3[...]

  • Page 101

    PingServlet2TwoPhase drives a Session EJB which invokes an Entity EJB with findByPrimaryKey (DB Access) followed by posting a message to an MDB through a JMS Queue (Message access). These operations are wrapped in a global 2-phase transaction and commit. PingServlet2TwoPhase PingServlet2MDBTopic drives messages to a Topic based Publish/Subscribe Me[...]

  • Page 102

    Figure 6.4 WebSphere Trade 3 primitive results. Note: The measurements were performed on the same machine, an 270-2434 600 MHz 2-Way. All results are for a non-secure environment. IBM i 6.1 Performance Capabilities Reference - January/April/October 2008 © Copyright IBM Corp. 2008 Chapter 6 - Web Server and WebSphere 102 W ebS pher e T r ade 3 Pri [...]

  • Page 103

    Accelerator for System i Coinciding with the release of i5/OS V5R4, IBM introduces new entry IBM System i models. The models introduce accelerator technologies and/or L3 cache in order to improve options for clients in the low-end server space. As an overview, the Accelerator for System i affects two 520 Models: (1) 600 CPW with no L3 cache and (2)[...]

  • Page 104

    Figure 6.6 provides insight into response time information regarding low-end System i models. There are two key concepts that are displayed in the data in Figure 6.6. The first is that Accelerator for System i models can provide substantially better response times than previous models for a single or many users. The 600 CPW accelerated to 3100 CPW [...]

  • Page 105

    Performance Considerations When Using WebSphere Transaction Processing (XA) In a general sense, a transaction is the execution of a set of related operations that must be completed together. This set of operations is referred to as a unit-of-work. A transaction is said to commit when it completes successfully. Otherwise it is said to roll back . Wh[...]

  • Page 106

    Restriction: You cannot benefit from the one-phase commit optimization in the following circumstances: y If your application uses a reliability attribute other than assured persistent for its JMS messages. y If your application uses B ean Managed Persistence (BMP) entity beans, or JDBC clients. Before you configure your system, ensure that you cons[...]

  • Page 107

    6.4 IBM WebFacing The IBM WebFacing tool converts your 5250 application DDS display files, menu source, and help files into Java Servlets, JSPs, JavaBeans, and JavaScript to allow your application to run in either WebSphere Application Server V5 or V4. This is an easy way to bring your application to either the Internet, or the Intranet, both quick[...]

  • Page 108

    details on the number of I/O fields for each of these workloads. We ran the workloads on three separate machines (see table 6.5) to validate the performance characteristics with regard to CPW . In our running of the workloads, we tolerated only a 1.5 second server response time per panel. This value does not include the time it takes to render the [...]

  • Page 109

    • (Advanced Edition Only) Struts-compliant code generated by the WebFacing Tool conversion process which sets the foundation for extending your Webfaced applications using struts-compliant action architecture • Automatic configuration for UTF-8 support when you deploy to WebSphere Application Server version 5.0 • Support for function keys wit[...]

  • Page 110

    When set to an appropriate level for the Webfaced application, the Record Definition Cache can provide a decrease in memory usage, and slightly decreased processor usage. The number of record definitions that the cache will retain is set by an initialization parameter in the Webfaced application’s deployment descriptor (web.xml). By changing the [...]

  • Page 111

    To enable the servlet that will display the contents of the cache, first add the following segments to the Webfaced application’s web.xml. <servlet> <servlet-name> CacheDumper </servlet-name> <display-name> CacheDumper </display-name> <servlet-class> com.ibm.etools.iseries.webfacing.diags.CacheDumper </servl[...]

  • Page 112

    Save a list of all the cached record data definitions. This list is saved in the RecordJSPs directory of the Webfaced application. The actual record definitions are not saved, just the list of what record definitions are cached. Once the cache is optimally tuned, this list can be used to preload the Record Definition cache. Save List Drop all the c[...]

  • Page 113

    Refer to the following table for the functionality provided by the Record Definition Loader servlet. This option will load the record definitions listed in a file in the RecordJSPs directory. Typically this file is created with the CacheDumper servlet previously described. Load from File This will cause the loader servlet to infer record definition[...]

  • Page 114

    WebSphere Application Server . On System i servers, the recommended WebSphere application configuration is to run Apache as the web server and WebSphere Application Server as the application server. Therefore, it is recommended that you configure HTTP compression support in Apache. However, in certain instances HTTP compression configuration may be[...]

  • Page 115

    You also need to add the directive: SetOutputFilter DEFLATE to the container to be compressed, or globally if the compression can always be done. There is documentation on the Apache web site on mod_deflate ( http://httpd.apache.org/docs-2.0/mod/mod_deflate.html ) that has information specific to setting up for compression. That is the best place t[...]

  • Page 116

    PartnerWorld for Developers Webfacing website: http://www.ibm.com/ servers/enable/site/ebiz/webfacing/index.html IBM WebFacing Tool Performance Update - This white paper expains how to help optimize WebFaced Applications on IBM System i servers. Requests for the paper require user registration; there are no charges. http://www-919.ibm.com/servers/e[...]

  • Page 117

    6.5 WebSphere Host Access Transformation Services (HATS) WebSphere Host Access Transformation Services (HATS) gives you all the tools you need to quickly and easily extend your legacy applications to business partners, customers, and employees. HATS makes your 5250 applications available as HTML through the most popular Web browsers, while converti[...]

  • Page 118

    customization requires development effort, while Default Rendering requires minimal development resources. Default: The screens in the application’s main path are unchanged. Moderate: An average of 30% of the screens have been customized. Advanced : All screens have been customized. IBM i 6.1 Performance Capabilities Reference - January/April/Oct[...]

  • Page 119

    IBM Systems Workload Estimator for HATS The purpose of the IBM Systems Workload Estimator (WLE) is to provide a comprehensive System i sizing tool for new and existing customers interested in deploying new emerging workloads standalone or in combination with their current workloads. The Estimator recommends the model, processor, interactive feature[...]

  • Page 120

    requirements do not take into account the requirement for other web applications, such as customer applications. You should use IBM Systems Workload Estimator ( http://www-912.ibm.com/wle/EstimatorServlet ) to determine the system requirements for additional web applications. IBM i 6.1 Performance Capabilities Reference - January/April/October 2008[...]

  • Page 121

    6.7 WebSphere Portal The IBM WebSphere Portal suite of products enables companies to build a portal web site serving the individual needs of their empl oyees, business partners and customers. Users can sign on to the portal and view personalized web pages that provide access to the information, people and applications they need. This personalized, [...]

  • Page 122

    6.9 WebSphere Commerce Payments Use the IBM Systems Workload Estimator to predict the capacities and resource requirements for WebSphere Commerce Payments. The Estimator allows you to predict a standalone WCP environment or a WCP environment associated with the buy visits from a WebSphere Commerce estimation. Work with your marketing representative[...]

  • Page 123

    of access mechanisms. Please see the Connect for iSeries white paper located at the following URL for more information on Connect for iSeries. http://www-1.ibm.com/servers/eserver/iseries/btob/connect/pdf/whtpaperv11.pdf “B2B New Order Request” Workload Description: This workload is driven by a program that runs on a client work station that si[...]

  • Page 124

    1. Connector relative capacity: The different back-end connector types are meant to allow users a simple way to connect the Connect for iSeries product to their back-end application. Your choice in a connector type may be dictated by several factors. Clearly, one of these factors relate to your existing back-end application and the programming lang[...]

  • Page 125

    Chapter 7. Java Performance Highlights: y Introduction y What’s new in V6R1 y IBM Technology for Java (32-bit and 64-bit) y Classic VM (64-bit) y Determining Which JVM to Use y Capacity Planning y Tips and Techniques y Resources 7.1 Introduction Beginning in V5R4, IBM began a transition to a new VM implementation for i5/OS, IBM Technology for Jav[...]

  • Page 126

    option for Java applications which require large amounts of memory. The Classic VM remains available in V6R1, but future i5/OS releases are expected to support only IBM Technology for Java. The default VM in V6R1 is IBM Technology for Java 5.0, 32-bit. Other supported versions of IBM Technology for Java include 5.0 64-bit, 6.0 32-bit, and 6.0 64-bi[...]

  • Page 127

    On i5/OS, IBM Technology for Java runs in i5/OS Portable Application Solutions Environment (i5/OS PASE) with either a 32-bit (for the 32-bit VM) or 64-bit (for the 64-bit VM) environment. Due to sophisticated memory management, both the 32-bit and 64-bit VMs provide a significant reduction in memory requirements over the Classic VM for most applica[...]

  • Page 128

    Fortunately, it is not too difficult to come up with parameter values which will provide good performance. If you are moving an application from the Classic VM to IBM Technology for Java , you can use a tool like DMPJVM or verbose GC to determine how large the heap grows when running your application. This value can be used as the maximum heap size[...]

  • Page 129

    performance, it pays to apply analysis and optimizations to the Java bytecodes, and the resulting machine code. One approach to optimizing Java bytecode involves analyzing the object code “ahead of time” – before it is actually running. This “ahead-of-time” (AOT) compiler technology was used exclusively by the original AS/400 Java Virtual[...]

  • Page 130

    applications with a large number of classes. Running CRTJVAPGM with OPTIMIZE(*INTERPRET) will create this program ahead of time, making the first startup faster. Garbage Collection Java uses Garbage Collection (GC) to automatically manage memory by cleaning up objects and memory when they are no longer in use. This eliminates certain types of memor[...]

  • Page 131

    display; rates of 20 to 30 faults per second are usually acceptable, but larger values may indicate a performance problem. In this case, the size of the memory pool should be increased, or the collection threshold value (GCHINL or -Xms) should be decreased so the heap isn’t allowed to grow as large. In many cases the scenario may be complicated b[...]

  • Page 132

    later releases the cache is enabled and the maxpgms set to 20000 by default, so no adjustment is usually necessary. The verification cache operates by caching JVAPGMs that have been dynamically created for dynamically loaded classes. When the verification cache is not operating, these JVAPGMs are created as temporary objects, and are deleted as the[...]

  • Page 133

    libraries and environments may require a particular version. The Classic VM continues to support JDK 1.3, 1.4, 1.5 (5.0), and 1.6 (6.0) in V5R4, and JDK 1.4, 1.5 (5.0), and 1.6 (6.0) in V6R1. 3. The Classic VM supported an i5/OS-specific feature called Adopted Authority. IBM Technology for Java does not support this feature, so applications which r[...]

  • Page 134

    application itself or a reasonably complete subset of the application, using a load generating tool to simulate a load representative of your planned deployment environment. WebSphere applications running with IBM Technology for Java will be subject to the same constraints as plain Java applications; however, there are some considerations which are[...]

  • Page 135

    y Beware of misleading benchmarks. Many benchmarks are available to test Java performance, but most of these are not good predictors of server-side Java performance. Some of these benchmarks are single-threaded, or run for a very short period of time. Others will stress certain components of the JVM heavily, while avoiding other functionality that [...]

  • Page 136

    4. Database Specific. Use of database can invoke significant path length in i5/OS. Invoking it efficiently can maximize the performance and value of a Java application. i5/OS Specific Java Tips and Techniques y Load the latest CUM package and PTFs To be sure that you have the best performing code, be sure to load the latest CUM packages and PTFs fo[...]

  • Page 137

    does take advantage of programs created at optimization *INTERPRET. These programs require significantly less space and do not need to be deleted. Program objects (even at *INTERPRET) are not used by IBM Technology for Java. y Consider the special property os400.jit.mmi.threshold . This property sets the threshold for the MMI of the JIT. Setting th[...]

  • Page 138

    y The I/O method readLine ( ) (e.g. in java.io.BufferedReader) will create a new String. y String concatenation (e.g.: “The value is: “ + value) will generally result in creation of a StringBuffer, a String, and a character array. y Putting primitive values (like int or long ) into a collection (like List or Map ) requires wrapping it in a new [...]

  • Page 139

    int i = 0; try { while (true) { System.out.println (arr[i++]); } } catch (ArrayOutOfBoundsException e) { // Reached the end of the array....exit } } Instead, the above procedure should be written as: public void goodPrintArray (int arr[]) { int len = arr.length; for (int i = 0; i < len; i++) { System.out.println (arr[i]); } } In the “bad” ve[...]

  • Page 140

    applications. The Toolbox driver supports remote access, and should be used when accessing the database on a separate system. This recommendation is true for both the 64-bit Classic VM and the new 32-bit VM. y Pool Database Connections Connection pooling is a technique for sharing a small number of database connections among a number of threads. Ra[...]

  • Page 141

    Resources The i5/OS Java and WebSphere performance team maintains a list of performance-related documents at http://www.ibm.com/systems/i/solutions/perfmgmt/webjtune.html . The Java Diagnostics Guide provides detailed information on performance tuning and analysis when using IBM Technology for Java. Most of the document applies to all platforms usi[...]

  • Page 142

    Chapter 8. Cryptography Performance With an increasing demand for security in today’s information society, cryptography enables us to encrypt the communication and storage of secret or confidential data. This also requires data integrity, authentication and transaction non-repudiation. Together, cryptographic algorithms, shared/symmetric keys and[...]

  • Page 143

    CSP API Sets User applications can utilize cryptographic services indirectly via i5/OS functions (SSL/TLS, VPN IPSec) or directly via the following APIs: y The Common Cryptographic Architecture (CCA) API set is provided for running cryptographic operations on a Cryptographic Coprocessor. y The i5/OS Cryptographic Services API set is provided for ru[...]

  • Page 144

    8.3 Software Cryptographic API Performance This section provides performance information for System i systems using the following cryptograp hic services; i5/OS Cryptographic Services API and IBM JCE 1.2.1, an extension of JDK 1.4.2. Cryptographic performance is an important aspect of capacity planning, particularly for applications using secure ne[...]

  • Page 145

    Notes: y Transaction Length set at 1024 bytes y See section 8.2 for Test Environment Information 35 163 2048 10 SHA-1 / RSA 30 129 2048 1 SHA-1 / RSA 240 1,155 1024 10 SHA-1 / RSA 197 901 1024 1 SHA-1 / RSA JCE (Transactions/Second) i5/OS (Transactions/Second) RSA Key Length (Bits) Threads Encryption Algorithm Signing Performance Table 8.2 Notes: y[...]

  • Page 146

    which is designed to meet FIPS 140 -2 Level 4 security requirements. This new cryptographic card offers the security and performance required to support e-Business and emerging digital signature applications. For banking and finance applications the 4764 Cryptographic Coprocessor delivers improved performance for T-DES, RSA, and financial PIN proce[...]

  • Page 147

    Notes: y Transaction Length set at 1024 bytes y See section 8.2 for Test Environment information 465 2048 10 SHA-1 / RSA 308 2048 1 SHA-1 / RSA 1,074 1024 10 SHA-1 / RSA 794 1024 1 SHA-1 / RSA 4764 (Transactions/second) RSA Key Length (Bits) Threads Encryption Algorithm Signing Performance CCA CSP Table 8.5 Notes: y See section 8.2 for Test Environ[...]

  • Page 148

    y Supported number of 4764 Cryptographic Coprocessors: 8 8 IBM System i5 520, 550, 570 2/4W 8 32 IBM System i5 570 8/12/16W, 595 Maximum per partition Maximum per server server models Table 8.8 y Applications requiring a FIPS 140-2 Level 4 certified, tamper resistant module for storing cryptographic keys should use the IBM 4764 Cryptographic Coproc[...]

  • Page 149

    Chapter 9. iSeries NetServer File Serving Performance This chapter will focus on iSeries NetServer File Serving Performance. 9.1 iSeries NetServer File Serving Performance iSeries Support for Windows Network Neighborhood (iSeries NetServer) supports the Server Message Block (SMB) protocol through the use of Transmission Control Protocol/Internet Pr[...]

  • Page 150

    Measurement Results : Conclusion/Explanations : IBM i 6.1 Performance Capabilities Reference - January/April/October 2008 © Copyright IBM Corp. 2008 Chapter 9 - iSeries NetServer File Serving 150 environment can be obtained by sending an email to llhirsch@us.ibm.com. Thr oughput 0. 000 50. 000 100. 000 150. 000 200. 000 250. 000 1 4 8 1 21 6 2 02 [...]

  • Page 151

    From the charts above in the Measurement Results section, it is evident that when customers upgrade to V5R4 they can expect to se e an improvement in throughput and response time when using iSeries NetServer. IBM i 6.1 Performance Capabilities Reference - January/April/October 2008 © Copyright IBM Corp. 2008 Chapter 9 - iSeries NetServer File Serv[...]

  • Page 152

    Chapter 10. DB2 for i5/OS JDBC and ODBC Performance DB2 for i5/OS can be accessed through many different interfaces. Among these interfaces are: Windows .NET, OLE DB, Windows database APIs, ODBC and JDBC. This chapter will focus on access through JDBC and ODBC by providing programming and tuning hints as well as links to detailed information . 10.1[...]

  • Page 153

    y Use the lowest isolation level required by the application. Higher isolation levels can reduce performance levels as more locking and synchronization are required. Transaction levels in order of increasing level are: TRANSACTION_NONE, TRANSACTION_READ_UNCOMMITTED, TRANSACTION_READ_COMMITTED, TRANSACTION_REPEATABLE_READ, TRANSACTION_SERIALIZABLE y[...]

  • Page 154

    y Employ efficient SQL programming techniq ues to minimize the amount of data processed y Prepared statement reuse to minimize parsing and optimization overhead for frequently run queries y Use stored procedures when appropriate to bundle processing into fewer database requests y Consider extended dynamic package support for SQL statement and packa[...]

  • Page 155

    Packages may be shared by several clients to reduce the number of packages on the System i server. To enable sharing, the default libraries of the clients must be the same and the clients must be running the same application. Extended dynamic support will be deactivated if two clients try to use the same package but have different default libraries[...]

  • Page 156

    ‘All libraries on the system’ will cause all libraries on the system to be used for catalog requests and may cause significant degradation in response times due to the potential volume of libraries to process. References for ODBC y DB2 Universal Database for System i SQL Call Level Interface (ODBC) is found under the System i Information Center[...]

  • Page 157

    Chapter 11. Domino on i This chapter includes performance information for Lotus Domino on the IBM i operating system. Some of the information previously included in this section has been removed. Earlier versions of the document can be accessed at http://www.ibm.com/systems/i/solutions/perfmgmt/resource.html April 2008 Update : y Workload Estimator[...]

  • Page 158

    y IBM Lotus Domino V8 server with the IBM Lotus Notes V8 client: Performance , October 2007 http://www.ibm.com/developerworks/lotus/library/domino 8-performance/index.html y Lotus Domino 7 Server Performance, Part 2, November 2005 http://www.ibm.com/developerworks/lotus/library/domino7-internet-performance/index.html y Lotus Domino 7 Server Perform[...]

  • Page 159

     Delete documents marked for deletion  Create 1 appointment (every 90 minutes)  Schedule 1 meeting invitation ( every 90 minutes)  Close the view y Domino Web Access (formerly known as iNotes Web Access) Each user completes the following actions an average of every 15 minutes except where noted:  Open mail database which contains doc[...]

  • Page 160

    optimal performance but of course without the function provided in the Domino 7 templates. The following links refer to these articles: y Lotus Domino 7 Server Performance, Part 1, September 2005 http://www.ibm.com/developerworks/lotus/library/nd7-perform/index.html y Lotus Domino 7 Server Performance, Part 2, November 2005 http://www.ibm.com/devel[...]

  • Page 161

    <1% 72ms 51.5% 20,000 Domino 6 <1% >5sec 96.2% 20,000 Domino 5.0.11 <1% 65ms 11.0% 3,800 Domino 6 <1% 119ms 19.4% 3,800 Domino 5.0.11 <1% 64ms 24.0% 2,000 Domino 6 <1% 96ms 41.5% 2,000 Domino 5.0.11 Average Disk Utilization Average Response Time Average CPU Utilization Number of Domino Web Access users Domino Version The 3000 u[...]

  • Page 162

    The 2000 user comparison was done on a model i825-2473 with 6 1.1GHz POWER4 processors, 45GB of memory, and 60 18GB disk drives configured with RAID5, in a single Domino partition. The 3800 user comparison used a single Domino partition on a model i890-0198 with 32 1.3GHz POWER4 processors. This system had 64GB of memory and 89 18GB disk drives con[...]

  • Page 163

    shopping application , but would provide even better response times than the 270-2423 as projected in Figure 11.3. When using MHz alone to compare performance capabilities between models, it is necessary for those models to have the same processor technology and configuration. Factors such as L2 cache and type and speed of memory controllers also i[...]

  • Page 164

    The eServer i5 Domino Edition builds on the tradition of the DSD (Dedicated Server for Domino) and the iSeries for Domino offering - providing great price/performance for Lotus software on System i5 and i5/OS. Please visit the following sites for the latest information on Domino Edition solutions: y http://www.ibm.com/servers/eserver/iseries/domino[...]

  • Page 165

    that the larger the buffer pool size, the higher the fault rate, but the lower the cpu cost. If the faulting rate looks high, decrease the buffer pool size. If the faulting rate is low but your cpu utilization is high, try increasing the buffer pool size. Increasing the buffer pool size allocates larger objects specifically for Domino buffers, thus[...]

  • Page 166

    7. Full text indexes Consider whether to allow users to create full text indexes for their mail files , and avoid the use of them whenever possible. These indexes are expensive to maintain since they take up CPU processing time and disk space. 8. Replication. To improve replication performance, you may need to do the following: y Use selective repl[...]

  • Page 167

    11.8 Domino Web Access The following recommendations help optimize your Domino Web Access environment: 1. Refer to the redbooks listed at the beginning of this chapter. The redbook, “iNotes Web Access on the IBM eServer iSeries server,” contains performance information on Domino Web Access including the impact of running with SSL. 2. Use the de[...]

  • Page 168

    11.10 Performance Monitoring Statistics Function to monitor performance statistics was added to Domino Release 5.0.3. Domino will track performance metrics of the operating system and output the results to the server. Type "show stat platform" at the server console to display them. This feature can be enabled by setting the parameter PLAT[...]

  • Page 169

    2. *MINIMIZE The main storage will be allocated to minimize the space used by the object. That is, as little main storage as possible will be allocated and used. This minimizes main storage usage while increasing the number of disk I/O operations since less information is cached in main storage. 3. *DYNAMIC The system will dynamically determine the[...]

  • Page 170

    The following is an example of how to issue the command: CHGATR OBJ( name of object) ATR(*MAINSTGOPT) VALUE(*NORMAL, *MINIMIZE , or *DYNAMIC) The chart below depicts V5R3-based paging curve measurements performed with the following settings for the mail databases: *NORMAL, *MINIMIZE, and *DYNAMIC. 60775040 47026568 36388264 28156548 21787000 BASE P[...]

  • Page 171

    During the tests, the *DYNAMIC and *MINIMIZE settings used up to 5% more CPU resource than *NORMAL. Figure 11.5 below shows the response time data rather than fault rates for the same test shown in Figure 11.4 for the attributes *NORMAL, *DYNAMIC, and *MINIMIZE. 60775040 47026568 36388264 28156548 21787000 BASE POOL SIZE(KB) 0 10 20 30 40 50 60 70 [...]

  • Page 172

    NOTE: MCU ratings should NOT be used directly as a sizing guideline for the number of supported users. MCU ratings provide a relative comparison metric which enables System i models to be compared with each other based on their Domino processing capability . MCU ratings are based on an industry standard workl oad and the simulated users do not nece[...]

  • Page 173

    users or relatively low transaction rates, response times may be significa ntly higher for a small LPAR (such as 0.2 processor) or partial processor model as compared to a full processor allocation of the same technology. The IBM Systems Workload Esti mator will not recommend the 500 CPW or 600 CPW models for Domino processing. Be sure to read the [...]

  • Page 174

    Chapter 12. WebSphere MQ for iSeries 12.1 Introduction The WebSphere MQ for iSeries product allows application programs to communicate with each other using messages and message queuing. The applications can reside either on the same machine or on different machines or platforms that are separated by one or more networks. For example, iSeries appli[...]

  • Page 175

    enhancement should allow customers to run with smaller, more manageable, receivers with less concern about the checkpoint taken following a receiver roll-over during business hours. 12.3 Test Description and Results Version 5.3 of WebSphere MQ f or iSeries includes several performance enhancements designed to significantly improve queue manager thr[...]

  • Page 176

    applications using MQ Series are running, you may need to consider adding memory to these pools to help performance. y Nonpersistent messages use significantly less CPU and IO resource than persistent messages do because persistent messages use native journaling support on the iSeries to ensure that messages are recoverable. Because of this, persis[...]

  • Page 177

    Chapter 13. Linux on iSeries Performance 13.1 Summary Linux on iSeries expand s the iSeries platform solutions portfolio by allowing customers and software vendors to port existing Linux applications to the iSeries with minimal effort. But, how does it shape up in terms of performance? What does it look like generally and from a performance perspec[...]

  • Page 178

    y Shared Processors. This variation of LPAR allows the Hypervisor to use a given processor in multiple partitions. Thus, a uni-processor might be divided in various fractions between (say) three LPAR partitions. A four way SMP might give 3.9 CPUs to one partition and 0.1 CPUs to another. This is a large and potentially profitable subject, suitable [...]

  • Page 179

    iSeries Linux is a program-execution environment on the iSeries system that provides a traditional memory model (not single-level store) and allows direct access to machine instructions (without the mapping of MI architecture). Because they run in their own partition on a Linux Operating System, programs running in iSeries Linux do have direct acce[...]

  • Page 180

    13.4 Basic Configuration and Performance Questions Since, by definition, iSeries Linux means at least two independent partitions, questions of configuration and performance get surprisingly complicated, at least in the sense that not everything is on one operating system and whose overall performance is not visible to a single set of tools. Conside[...]

  • Page 181

    13.5 General Performance Information and Results A limited number of performance related tests have been conducted to date, comparing the performance of iSeries Linux to other env ironments on iSeries and to compare performance to similarly configured (especially CPU MHz) pSeries running the application in an AIX en vironment. Computational Perform[...]

  • Page 182

    Linux ILE PASE Computational Environment 0 0.2 0.4 0.6 0.8 1 1.2 Relative Performance (Bigger Better) Integer Floating Point Fraction of ILE Performance One virtue of the i870, i890, and i825 machines is that the hardware floating point unit can make up for some of the code generation deficit due to its superior hardware scheduling capabilities. Co[...]

  • Page 183

    Here, a model 840 was subdivided into the partition sizes shown and a typical web serving load was used. A "hit" is one web page or one image. The kttpd is a kernel-based daemon available on Linux which serves only static web pages or images. It can be cascaded with ordinary Apache to provide dynamic content as well. The other is a standa[...]

  • Page 184

    As noted above, many distributions are based on the 2.95 gcc compiler. The more recent 3.2 gcc is also used by some distributions. Results there shows some variability and not much net improvement. To the extent it improves, the gap with ILE should close somewhat. Floating point performance is improved, but proportionately. None of the recommendati[...]

  • Page 185

    y Cost. Because the disk is virtual, it can be created to any size desired. For some kinds of Linux partitions, a single modern physical disk is overkill -- providing far more data than required. These requirements only increase if RAID, in particular, is specified. Here, the Network Storage object can be created to any desired size, which helps ke[...]

  • Page 186

    typically recommended because it allows the Linux partitions to leverage the storage subsystem the customer has in the OS/400 hosting partition. 2. As the application gains in complexity, it is probably less likely that the application should switch from one product to the other. Such applications tend to implicitly play to particular design choice[...]

  • Page 187

    do so, you may wish to compare with the next previous version. This would be especially important if you have one key piece of open source code largely responsible for the performance of a given partition. There is no way of ensuring that a new distribution is actually faster than the predecessor except to test it out. While, formally, no open sour[...]

  • Page 188

    substantial amount of Virtual I/O. This is probably on the high side, but can be important to have something left over. If the hosting partition uses all its CPU, Virtual I/O may slow substantially. y Use Virtual LAN for connections between iSeries partitions whether OS/400 or Linux. If your OS/400 PTFs are up to date, it performs roughly on a par [...]

  • Page 189

    Native and Virtual LAN (e.g. from outside the box on Native LAN, through the partition with the Native LAN, and then moving to a second partition via Virtual LAN then to another). IBM i 6.1 Performance Capabilities Reference - January/April/October 2008 © Copyright IBM Corp. 2008 Chapter 13 - Linux 189[...]

  • Page 190

    Chapter 14. DASD Performance This chapter discusses DASD subsystems available for the System i platform. There are two separate considerations. Before IBM i operating system V6R1, one only had to consider particular devices, IOAs, IOPs, and SAN devices. All attached through similar strategies directly to IBM i operating system and were all supporte[...]

  • Page 191

    14.1.0 Direct Attach (Native) 14.1.1 Hardware Characteristics 14.1.1.1 Devices & Controllers N/A N/A N/A 2 4.0 3.5 15K 280 433D N/A N/A N/A 2 4.0 3.5 15K 140 433C N/A N/A N/A 2 4.0 3.5 15K 70 433B 320 Not Supported Not Supported 2 4.0 3.6 15K 280 4329 320 160 Not Supported 2 4.0 3.6 15K 140 4328 320 160 Not Supported 2 4.0 3.6 15K 70 4327 320 1[...]

  • Page 192

    14.1.2 iV5R2 Direct Attach DASD This section discusses the direct attach DASD subsystem performance improvements that were new with the iV5R2 release. These consist of the following new hardware and software offerings : y 2757 SCSI PCI RAID Disk Unit Controller (IOA) y 2780 SCSI PCI RAID Disk Unit Controller (IOA) y 2844 PCI Node I/O Processor (IOP[...]

  • Page 193

    14.1.2.2 250 165 82 Restore 250 165 82 Save *SAVF 2757 IOA 122 83 41 Restore 122 83 41 Save *SAVF 45 Units 30 Units 15 Units 2778 IOA Number of 35 GB DASD units (Measurement numbers in GB/HR) IOA and operation This restrictive test is intended to show the effect of the 2757 IOAs in a backup and recovery environment. The save and restore operations [...]

  • Page 194

    14.1.3 571B iV5R4 offers two new options on DASD configuration. y RAID6 which offers improved system protection on supported IOAs. y NOTE: RAID6 is supported under iV5R3 but we have chosen to look at performance data on a iV5R4 system. y IOPLess operation on supported IOAs. 14.1.3.1 571B RAID5 vs RAID6 - 10 15K 35GB DASD 14.1.3.2 571B IOP vs IOPLES[...]

  • Page 195

    14.1.4 571B, 5709, 573D, 5703, 2780 IOA Comparison Chart In the following two charts we are modeling a System i 520 with a 573D IOA using RAID5, comparing 3 70GB 15K RPM DASD to 4 70GB 15K RPM DASD. The 520 is capable of holding up to 8 DASD but many of our smaller customers do not need the storage. The charts try to point out that there may be per[...]

  • Page 196

    The charts below are an attempt to allow the different IOAs available to be compared on a single chart. An I/O Intensive Workload was used for our throughput measurements. The system used was a 520 model with a single 5094 attached which contained the IOAs for the measurements. Note: the 5709 and 573D are cache cards for the built in IOA in the 520[...]

  • Page 197

    14.1.5 Comparing Current 2780/574F with the new 571E/574F and 571F/575B NOTE: iV5R3 has support for the features in this section but all of our performance measurements were done on iV5R4 systems. For information on the supported features see the IBM Product Announcement Letters. A model 570 4 way system with 48 GB of mainstore memory was used for [...]

  • Page 198

    14.1.6 Comparing 571E/574F and 571F/575B IOP and IOPLess In comparing IOP and IOPLess runs we did not see any significant differences, including the system CPU used. The system we used was a model 570 4 way, on the IOP run the system CPU was 11.6% and on the IOPLess run the system CPU was 11.5%. The 571E/574F and 571F/575B display similar character[...]

  • Page 199

    14.1.7 Comparing 571E/574F and 571F/575B RAID5 and RAID6 and Mirroring System i protection information can be found at http://www.redbooks.ibm.com/ in the current System i Handbook or the Info Center http://publib.boulder.ibm.com/iseries/ . When comparing RAID5, RAID6 and Mirroring we are interested in looking at the strength of failure protection [...]

  • Page 200

    In comparing Mirroring and RAID one of the concerns is capacity differences and the hardware needed. We tried to create an environment where the capacity was the same in both environments. To do this we built the same size database on “15 35GB DASD using RAID5” and “14 70GB DASD using Mirroring spread across 2 IOAs”. The protection in the M[...]

  • Page 201

    14.1.8 Performance Limits on the 571F/575B In the following charts we try to characteri ze the 571F/575B in different DASD configuration. The 15 DASD experiment is used to give a comparison point with DASD experiments from chart 14.1.5.1 and 14.1.5.2. The 18, 24 and 36 DASD configurations are used to help in the discussion of performance vs capacit[...]

  • Page 202

    14.1.9 Investigating 571E/574F and 571F/575B IOA, Bus and HSL limitations. With the new DASD controllers and IOPLess capabilities, IBM has created many new options for our customers. Customers who needed more storage in their smaller configurations can now grow. With the ability to add more storage into an HSL loop the capacity and performance have[...]

  • Page 203

    14.1.9.1 14.1.9.2 IBM i 6.1 Performance Capabilities Reference - January/April/October 2008 © Copyright IBM Corp. 2008 Chapter 14 DASD Performance 203 La r g e Blo c k RE ADs o n a Si ngle 5 0 9 4 Tow e r in a n H SL Loop 1_ Tower 81_DAS D 3_571E & 1_571F 1_ Tower 117_DAS D 3_571E & 2_571F 1_ Tower 153_DAS D 3_571E & 3_571F La r g e Bl[...]

  • Page 204

    14.1.10 Direct Attach 571E/574F and 571F/575B Observations We did some simple comparison measurements to provide graphical examples for customers to observe characteristics of new hardware. We collected performance data using Collection Services and Performance Explorer to create our graphs after running our DASD IO workload (small block reads and [...]

  • Page 205

    14.2 New in iV5R4M5 14.2.1 9406-MMA CEC vs 9406-570 CEC DASD IBM i 6.1 Performance Capabilities Reference - January/April/October 2008 © Copyright IBM Corp. 2008 Chapter 14 DASD Performance 205 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0 200 400 600 800 1000 1200 9406-M M A 4 way 6 433B 70 GB D A SD M ir ror ed "N o C ac he" 9406-570 4 w ay[...]

  • Page 206

    14.2.2 RAID Hot Spare For the following test, the IO workload was setup to run for 14 hours. About 5 hours after starting A DASD was pulled from the configurations. This forced a RAID set rebuild. IBM i 6.1 Performance Capabilities Reference - January/April/October 2008 © Copyright IBM Corp. 2008 Chapter 14 DASD Performance 206 0.02 0.05 0.08 0.11[...]

  • Page 207

    14.2.3 12X Loop Testing A 9406-MMA 8 Way system with 96 GB of mainstore and 396 DASD in #5786 EXP24 Disk Drawer on 3 12X loops for the system ASP were used, ASP 2 was created on a 4th 12X loop by adding 5796 system expansion units with 571F IOAs attaching 36 4327 70 GB DASD in # 5786 EXP24 Disk Drawer with RAID5 turned on. I created a virtual tape [...]

  • Page 208

    14.3 New in iV6R1M0 14.3.1 Encrypted ASP More CPU and memory may be needed to achieve the same performance once encryption is enabled. IBM i 6.1 Performance Capabilities Reference - January/April/October 2008 © Copyright IBM Corp. 2008 Chapter 14 DASD Performance 208 Non Encryp te d AS P vs Encryp te d AS P 0 0.05 0.1 0.15 0.2 2000 4000 6000 8000 [...]

  • Page 209

    IBM i 6.1 Performance Capabilities Reference - January/April/October 2008 © Copyright IBM Corp. 2008 Chapter 14 DASD Performance 209 N on E ncrypt ed A SP vs E ncrypt ed A SP 0 5 10 15 20 25 6000 7300 8600 9800 W orkloa d Throughput CP U 9406 M M A 4 W ay 571F w ith 24 D A S D N on E nc r ypted A S P 9406 M M A 4 W ay 571F w ith 24 D A S D Enc r y[...]

  • Page 210

    14.3.2 57B8/57B7 IOA With the addition of the POWER6 520 and 550 systems comes the new 57B8/57B7 SAS Raid Ennoblement Controller with Auxiliary Write Cache. This controller is only available in the POWER6 520 and 550 systems and provides RAID5/6 capabilities, with 175MB redundant write cache. Below are some charts comparing the Storage Controllers [...]

  • Page 211

    The POWER6 520 and 550 also have an external SAS port, that is controlled by the 57B8/57B7, used to connect a single #5886 - EXP 12S SAS Disk Drawer which can contain up to 12 SAS DASD. Below is a chart showing the addition of the #5886 - EXP 12S SAS Disk Drawer. IBM i 6.1 Performance Capabilities Reference - January/April/October 2008 © Copyright[...]

  • Page 212

    14.3.3 572A IOA The 572A IOA is a SAS IOA that is mainly used for SAS tape attachment but the 5886 EXP 12S SAS Disk Drawer can also be attached. Performance will be poor as the IOA does not have any cache. The following charts help to show the performance characteristics that resulted during experiments in the Rochester lab. If storage space is all[...]

  • Page 213

    IBM i 6.1 Performance Capabilities Reference - January/April/October 2008 © Copyright IBM Corp. 2008 Chapter 14 DASD Performance 213[...]

  • Page 214

    14.4 SAN - Storage Area Network (External) There are many factors to consider when looking at external storage options, you can get more information through your IBM representative and the white papers that are available at the following location. https://www-304.ibm.com/systems/support/ IBM i 6.1 Performance Capabilities Reference - January/April/[...]

  • Page 215

    14.5 iV6R1M0 -- VIOS and IVM Considerations Beginning in iV6R1M0, IBM i operating system will participate in a new virtualization strategy by becoming a client of the VIOS product. Customers will view the VIOS product two different ways: y On blade products, through the regular configuration tool IVM (which includes an easy to use interface to VIOS[...]

  • Page 216

    14.5.1 General VIOS Considerations 14.5.1.1 Generic Concepts 520 versus 512 . Long time IBM i operating system users know that IBM i operating system disks are traditionally configured with 520 byte sectors. The extra eight bytes beyond the 512 used for data are used for various purposes by Single Level Store. For a variety of reasons, VIOS will al[...]

  • Page 217

    14.5.1.2 Generic Configuration Concepts There are several important principles to keep track of in terms of getting good performance. Most of the following are issues when the disks are configured. A great many problems can be eliminated (or, created) when the drives are originally configured. The exact nature of some of these difficulties might no[...]

  • Page 218

    3. Prefer external disks attached directly to IBM i operating system over those attached via VIOS This is basically a statement of the Fibre Channel adapter and who owns it. In some cases, it affects which adapter is purchased. If you do not need to share a given external disk's resources with non-IBM i operating system partitions, and the sup[...]

  • Page 219

    8. Ensure, within reason, a reasonable number of virtual disks are created and made available to IBM i operating system. One is tempted to simply lump all the storage one has in a virtual environment into a couple (or even one) large virtual disk. Avoid this if at all possible. For traditional (non-blade) systems: There is a great deal of variabili[...]

  • Page 220

    14.5.1.3 Specific VIOS Configuration Recommendations -- Traditional (non-blade) Machines 1. Avoid volume groups if possible . VIOS "hdisks" must have a volume identifier (PVID). Creating a volume group is an easy way to assign one and some literature will lead you to do it that way. However, the volume group itself adds overhead for no pa[...]

  • Page 221

    3. Limited number of virtual devices per virtual SCSI adapter. You will have to configure some number of virtual SCSI adapters so that VIOS can provide a path for IBM i operating system to talk to VIOS as if these were really physical SCSI devices. These adapters, in turn, implement some existing rules, so that only 16 virtual disks can be made par[...]

  • Page 222

    14.5.1.3 VIOS and JS12 Express and JS22 Express Considerations Most of our work consisted of measurements with the JS22 offering and external disks using the DS4800 product. The following are results obtained in various measurements and then a few general comments about configuration will follow. 14.5.1.3.1 BladeCenter H JS22 Express running IBM i [...]

  • Page 223

    The chart above shows some basic performance scaling for 1, 2, 3 and 4 processors. For this comparison both partition measurements were done with the processors set up as shared, and with the IBM i operating system partition set to capped. The rest of the resources stay constant, which consists of 90 RAID1 DDMs in a DS4800 under 16 LUNs 2 GB of mem[...]

  • Page 224

    The following charts are a view of the chara cteristics we observed during our Commercial Performance Workload testing on our JS22 Express. The first chart shows the effect on the Commercial Performance Workload when we apply 3 Dedicated processors and then switch to 3 shared processors. Then incremented the number of virtual processors available. [...]

  • Page 225

    In following single partition Commercial Performance Workload runs the average VIOS CPU stayed under 40%. So we seem to have VIOS resource available but in a lot of customer environments communications and other resources are also running and these resources will also be routed through VIOS. IBM i 6.1 Performance Capabilities Reference - January/Ap[...]

  • Page 226

    The following chart shows two IBM i operating system partitions using 14GB of memory and 1.7 processors each served by 1 VIOS partition using 2GB of memory and .6 processors. The Commercial Performance Workload was running the same amount of transactions on each of the partitions for the same time intervals. Although there is an observed cost for V[...]

  • Page 227

    14.5.1.3.2 BladeCenter S and JS12 Express The IBM i operating system is now supported on a JS12 Express in a BladeCenter S. The system is limited to 12 SAS DASD and the following charts try to characterize the performance we achieved during experiments with the Commercial Performance Workload in the IBM lab. Using a JS22 Express in a BladeCenter H [...]

  • Page 228

    14.5.1.3.3 JS12 Express and JS22 Express Configuration Considerations 1. The aggregate total of virtual disks (LUNs) will be sixteen at most. Many customers will want to deploy between 12 and 16 LUNs and maximize symmetry. Consult carefully with your support team on the choices here. This is the most important consideration as it is difficult to ch[...]

  • Page 229

    14.5.1.3.4 DS3000/DS4000 Storage Subsystem Performance Tips Physical disks can be configured various ways with RAID levels, number of disks in each array and number of LUNs created over those arrays. There are also various reasons for the configurations that are chosen. One end user might be looking for eas e of use and choose to create one array w[...]

  • Page 230

    IBM i 6.1 Performance Capabilities Reference - January/April/October 2008 © Copyright IBM Corp. 2008 Chapter 14 DASD Performance 230 Blade Cen t er H w it h a JS 22 4 W ay Comm er cial Per for mance W or k load 0.001 0. 01 0. 1 1 10 1000 11000 21000 31000 41000 51000 61000 Tr ans a ct ions/Minut e Syst em W o rkl oa d Re sp o n se T ime ( S ec o n[...]

  • Page 231

    14.6 IBM i operating system 5.4 Virtual SCSI Performance The primary goal of virtualization is to lower the total cost of ownership of equipment by improving utilization of the overall system resources and reducing the labor requirements to operate and manage many servers. With virtualization, the IBM Power Systems can now be used similar to the wa[...]

  • Page 232

    In the test results that follow, we see the CPU required for IBM i operating system Virtual SCSI server and the benefits of the IBM i operating system Virtual SCSI implementation should be assessed for a given environment. Simultaneous multithreading should be enabled in a virtual hosted disk environment. For most efficient virtual hosted disk impl[...]

  • Page 233

    14.6.1 Introduction In general, applications are functionally isolated from the exact nature of their storage subsystems by the operating system. An application does not have to be aware of whether its storage is contained on one type of disk or another when performing I/O. But different I/O subsystems have subtly different performance qualities, a[...]

  • Page 234

    All measurements were completed on a POWER5 570+ 4-Way (2.2 GHz). Each system is configured as an LPAR, and each virtual SCSI test was performed between two partitions on the same system with one CPU for each partition. IBM i operating system 5.4 was used on the virtual SCSI server and AIX 5.3 was used on the client partitions. The primitive disk w[...]

  • Page 235

    14.6.2.1 Native vs. Virtual Performance Figure 1 shows a comparison of measured bandwidth using virtual SCSI and local attached DASD for reads with varying block sizes of operations. The difference in the reads between virtual I/O and native I/O in these tests is attributable to the increased latency using virtual I/O. The difference in writes is c[...]

  • Page 236

    14.6.2.3 Virtual SCSI Bandwidth-Network Storage Description (NWSD) Scaling Figure 3 shows a comparison of measured bandwidth while scaling network storage descriptions with varying block sizes of operations. Each of the network storage descriptions have a single network storage space attached to them. The difference in the scaling of these tests is[...]

  • Page 237

    14.6.2.4 Virtual SCSI Bandwidth-Disk Scaling Figure 4 shows a comparison of measured bandwidth while scaling disk drives with varying block sizes of operations. Each of the network storage descriptions have a single network storage space attached to them. The difference in the scaling of these tests is attributable to the performance gain which can[...]

  • Page 238

    14.6.3 Sizing Sizing methodology is based on the observation that processor time required to perform an I/O on the IBM i operating system Virtual SCSI server is fairly constant for a given I/O size. The I/O devices supported by the Virtual SCSI server are sufficiently similar to provide good recommendations. These numbers are measured at the physic[...]

  • Page 239

    To calculate IBM i operating system Virtual SCSI CPU requirements the following formula is provided. The number of transactions per second could be collected by the IBM i operating system command WRKDSKSTS. Based on the average transaction size in WRKDSKSTS, select a number from the table. 282 148 82 54 36 26 21 Write 314 163 92 57 34 22 16 Read Ty[...]

  • Page 240

    14.6.3.2 Sizing when using Micro-Partitioning Defining Virtual SCSI servers in micro-partitions enables much better granularity of processor resource sizing and potential recovery of unused processor time by uncapped partitions. Tempering those benefits, use of micro-partitions for Virtual SCSI servers slightly increases I/O response time and creat[...]

  • Page 241

    14.6.3.3 Sizing memory The IBM i operating system Virtual SCSI server supports data read caching on the virtual hosted disk server partition. Thus all I/Os that it services could benefit from effects of caching heavily used data. Read performance can vary depending upon the amount of memory which is assigned to the server partition. Workloads which[...]

  • Page 242

    14.6.4 AIX Virtual IO Client Performance Guide The following is a link which will direct you to more in-depth performance tuning for AIX virtual SCSI client. Advanced POWER Virtualization on IBM p5 Servers: Architecture and Performance Considerations http://www.redbooks.ibm.com/abstracts/sg247940.html? 14.6.5 Performance Observations and Tips • I[...]

  • Page 243

    Chapter 15. Save/Restore Performance This chapter’s focus is on the IBM i operating system platform. For legacy system models, older device attachment cards, and the lower performing backup devices see the V 5R3 performance capabilities reference. Many factors influence the observable performance of save and restore operations. These factors incl[...]

  • Page 244

    15.2 Save Command Parameters that Affect Performance Use Optimum Block Size (USEOPTBLK) The USEOPTBLK parameter is used to send a larger block of data to backup devices that can take advantage of the larger block size. Every block of data that is sent has a certain amount of overhead that goes with it. This overhead includes block transfer time, IO[...]

  • Page 245

    15.3 Workloads The following workloads were designed to help evaluate the performance of single, concurrent and parallel save and restore operations for selected devices . Familiarization with these workloads can help in understanding differences in the save and restore rates . Database File related Workloads : The following workloads are designed [...]

  • Page 246

    15.4 Comparing Performance Data When comparing the performance data in this document with the actual performance on your system, remember that the performance of save and restore operations is data dependent. If the same backup device was used on data from three different systems, three different rates may result. The performance of save and restor[...]

  • Page 247

    15.5 Lower Performing Backup Devices With the lower performing backup devices, the devices themselves become the gating factor so the save rates are approximately the same, regardless of system CPU size (DVD-RAM). 25% Source File / 1 Directory Many Objects / Many Directories Many Objects 55% User Mix / Domino / Network Storage Space 95% Large Datab[...]

  • Page 248

    15.8 The Use of Multiple Backup Devices Concurrent Saves and Restores - The ability to save or restore different objects from a single library/directory to multiple backup devices or different libraries /directories to multiple backup devices at the same time from different jobs . The workloads that were used for the testing were Large Database Fil[...]

  • Page 249

    15.9 Parallel and Concurrent Library Measurements This section discusses parallel and concurrent library measurements for tape drives , while sections later in this chapter discuss measurements for virtual tape drives. 15.9.1 Hardware (2757 IOAs, 2844 IOPs, 15K RPM DASD) Hardware Environment. This testing consisted of an 840 24 way system with 128 [...]

  • Page 250

    15.9.2 Large File Concurrent For the concurrent testing 16 libraries were built, each containing a single 320 GB file with 80 4 GB members. The file size was chosen to sustain a flow across the HSL, system bus, processors, memory and tapes drives for about an hour. We were not interested in peak performance here but sustained performance. Measureme[...]

  • Page 251

    15.9.3 Large File Parallel For the measurements in this environment, BRMS was used to manage the save and restore, taking advantage of the ability built into BRMS to split an object between multiple tape drives. Starting with a 320 GB file in a single library and building it up to 2.1 TB for tape drive tests 1 - 4 and 8. The file was then duplicate[...]

  • Page 252

    15.9.4 User Mix Concurrent User Mix will generally portray a fair population of customer systems, where the real data is a mixture of programs, menus, commands along with their database files. The new ultra tape drives are in their glory when streaming large file data, but a lot of other factors play a part when saving and restoring multiple smalle[...]

  • Page 253

    15.10 Number of Processors Affect Performance With the Large Database File workload , it is possible to fully feed two backup devices with a single processor, but with the User Mix workload it takes 1+ processors to fully feed a backup device. A recommendation might be 1 and 1/3 processors for each backup device you want to feed with User Mix data.[...]

  • Page 254

    15.11 DASD and Backup Devices Sharing a Tower The system architecture does not require that DASD and backup devices be kept separated. Testing in the IBM Rochester Lab, we had attached one backup device to each tower and all towers had 45 DASD units in them, when we did the 3580 002 testing . The 3592J has similar characteristics to the 3580 002 bu[...]

  • Page 255

    15.12 Virtual Tape Virtual tape drives are being introduced in iV5R4 so those customers can make use of the sp eed of saving to DASD, then save the data using DUPTAP to the tape drives reducing the b ackup window where the system is unavailable to users. There are a lot of pieces to consider in setting up and using Virtual tape drives. The block si[...]

  • Page 256

    The following measurements were done on a system with newer hardware including a 3580 Ultrium 3 4Gb Fiber Channel Tape Drive, 571E sto rage adapters, and 4327 70GB (U320) DASD. Measurements were also done comparing save of 1000 empty libraries to tape versus save of these libraries to virtual tape followed by DUPTAP from the virtual tape to tape. T[...]

  • Page 257

    15.13 Parallel Virtual Tapes NOTE: Virtual tape is reading and writing to the same DASD so the maximum throughput with our concurrent and parallel measurements is different than our tape drive tests where we were reading from DASD and writing to tape. IBM i 6.1 Performance Capabilities Reference - January/April/October 2008 © Copyright IBM Corp. 2[...]

  • Page 258

    15.14 Concurrent Virtual Tapes NOTE: Virtual tape is reading and writing to the same DASD so the maximum throughput with our concurrent and parallel measurements is different than our tape drive tests where we were reading from DASD and writing to tape. IBM i 6.1 Performance Capabilities Reference - January/April 2008 © Copyright IBM Corp. 2008 Ch[...]

  • Page 259

    15.15 Save and Restore Scaling using a Virtual Tape Drive. A 570 8 way System i was used for the following tests. A user ASP was created using up to 3 571F IOAs with up to 36 U320 70 GB DASD on each IOA. T he Chart shows the number of DASD in each test and the Virtual tape drive was created using that DASD. The workload data was restored into the s[...]

  • Page 260

    15.16 Save and Restore Scaling using 571E IOAs and U320 15K DASD units to a 3580 Ultrium 3 Tape Drive. A 570 8 way System i was used for the following tests. A user ASP was created with the number of DASD listed in each test . The workload data was then saved to the tape drive , deleted from the system and restored to the user ASP. These charts are[...]

  • Page 261

    IBM i 6.1 Performance Capabilities Reference - January/April/October 2008 © Copyright IBM Corp. 2008 Chapter 15. Save/Restore Performance 261 U ser M i x Saves 0 50 100 150 200 250 300 350 6 D A S D 12 D A S D 18 D ASD 2 4 DA SD 30 D A S D 36 DA SD 4 2 DA SD 48 D A S D 54 DA SD 6 0 DA SD 66 D A S D 72 DA SD 7 8 DA SD 84 D A S D 90 DA SD GB/HR RA I[...]

  • Page 262

    15.17 High-End Tape Placement on System i The current high-end tape drives (ULTRIUM-2 / ULTRIUM-3 and 3592-J / 3592-E) need to be placed carefully on the System i buses and HSLs in order to avoid bottlenecking. The following rules-of thumb will help optimize performance in a large-file save environment, and help position the customer for future gro[...]

  • Page 263

    15.18 BRMS-Based Save/Restore Software Encryption and DASD-Based ASP Encryption The Ultrium-3 was used in the following experiments, which attempt to characterize the effects of BRMS-based save /restore software encryption and DASD-based ASP encryption. Some of the newer tape drives offer hardware encryption as an optio n but for those who are not [...]

  • Page 264

    Performance will be limited to the native drive rates (shown in table 15.1.1) because encrypted data blocks have a very low compaction ratio. IBM i 6.1 Performance Capabilities Reference - January/April 2008 © Copyright IBM Corp. 2008 Chapter 15. Save/Restore Performance 264 Ta pe B a c kup Pe rf orm a nce - R e s tores 0 50 100 150 200 250 300 1 [...]

  • Page 265

    15.19 5XX Tape Device Rates Note: Measurements for the high speed devices were completed on a 570 4 way system with 2844 IOPs and 2780 IOA’s and 180 15K RPM RAID5 DASD units. The smaller tape device tests were completed on a 520 2 way with 75 DASD units. The Virtual tape and *SAVF runs were completed on a 570 ML16 with 256GB of memory and 924 DAS[...]

  • Page 266

    34 19 R 34 19 S Network Storage Space 29 15 R 29 15 S Domino Mail Files 9 7 R 25 15 S Many Directories Many Objects 12 8 R 23 12 S 1 Directory Many Objects 32 37 R 32 39 S Large File 32GB 30 30 R 30 34 S User Mix 12GB 19 15 R 17 22 S Source File 1GB iV5R4 iV5R4M0 Release Measurements were done SLR60 from table 15.18.1 6258 4MM tape Drive Workload S[...]

  • Page 267

    15.20 5XX Tape Device Rates with 571E & 571F Storage IOAs and 4327 (U320) Disk Units Save/restore rates of 3580 Ultrium 3 (2Gb and 4Gb Fiber Channel) tape devices and of virtual tape devices were measured on a 570 8-way system with 571E and 571F storage adapters and 714 type 4327 70GB (U320) disk units. Customer performance will be dependent on[...]

  • Page 268

    15.21 5XX DVD RAM and Optical Library 9.8 9.8 9.8 9.8 9.6 9.6 R 2.6 2.6 2.0 2.0 1.8 1.8 S Network Storage Space 9.8 9.8 9.8 9.8 9.6 9.6 R 2.6 2.6 2.0 2.0 1.8 1.8 S Domino Mail Files 6.0 6.0 6.0 6.0 5.4 5.4 R 2.6 2.6 2.2 2.2 1.8 1.8 S Many Directories Many Objects 7.7 7.8 7.7 7.7 7.5 7.5 R 2.6 2.6 2.2 2.2 1.8 1.8 S 1 Directory Many Objects R S Large[...]

  • Page 269

    15.22 Software Compression The rates a customer will achieve will depend upon the system resources available. This test was run in a very favorable environment to try to achieve the maximum rates. Software compression rates were gathered using the QSRSAVO API. The CPU used in all compression schemes was near 100%. The compression algorithm cannot s[...]

  • Page 270

    15.23 9406-MMA DVD RAM 14.0 14.0 R 2.2 2.2 S Network Storage Space 14.5 14.5 R 2.3 2.3 S Domino Mail Files 5.5 5.5 R 2.2 2.2 S Many Directories Many Objects 9.0 9.0 R 2.3 2.3 S 1 Directory Many Objects 45.0 14.0 R 8.0 2.2 S Large File 4GB 28.0 12.5 R 8.0 2.3 S User Mix 3GB 9.3 7.3 R 13.4 3.0 S Source File 1GB iV5R4M5 iV5R4M5 Release Measurements we[...]

  • Page 271

    15.24 9406-MMA 576B IOPLess IOA 700 700 750 650 650 650 450 R 700 330 650 550 580 575 450 S Domino Mail Files 26 26 27 27 27 28 26 R 38 38 40 40 40 40 40 S Many Directories Many Objects 50 50 50 50 50 50 50 R 50 50 55 55 55 55 50 S 1 Directory Many Objects 485 475 770 750 1000 700 845 890 590 R 920 885 770 350 1100 700 920 890 625 S Large File 320G[...]

  • Page 272

    15.25 What’s New and Tips on Performance What’s New iV6R1M0 March 2008 BRMS-Based Save/Restore Software Encryption and DASD-Based ASP Encryption 576B IOPLess Storage IOA iV5R4M5 July 2007 3580 Ultrium 4 - 4Gb Fiber Channel Tape Drive 6331 SAS DVD RAM for 9406-MMA system models iV5R4 January 2007 571E and 571F storage IOAs (see DASD Performance [...]

  • Page 273

    Chapter 16 IPL Performance Performance information for Initial Program Load (IPL) is included in this section. The primary focus of this section is to present observations from IPL tests on different System i models. The data for both normal and abnormal IPL s are broken down into phases, making it easier to see the detail. For information on previ[...]

  • Page 274

    16.3 9406-MMA System Hardware Information 16.3.1 Small system Hardware Configuration 9406-MMA 7051 4 way - 32 GB Mainstore DASD / 30 70GB 15K rpm arms, 6 DASD in CEC Mirrored 24 DASD in a #5786 EXP24 Disk Drawer attached with a 571F IOA RAID5 Protected Software Configuration 100,000 spool files (100,000 completed jobs with 1 spool file per job) 500[...]

  • Page 275

    16.4 9406-MMA IPL Performance Measurements (Normal) The following tables provide a comparison summary of the measured performance data for a normal and abnormal IPL. Results provided do not represent any particular customer environment. Measurement units are in minutes and seconds 34:27 32:03 17:58 9:42 8:47 Total 2:22 2:41 2:12 1:23 :48 OS/400 9:5[...]

  • Page 276

    16.6 NOTES on MSD MSD is Mainstore Dump. General IPL phase as it relates to the SRCs posted on the operation panel: Processor MSD includes the D2xx xxxx and C2xx xxxx right after the system is forced to terminate. SLIC MSD IPL with Copy follows with the next series of C6xx xxxx , see the next heading for more information on the SLIC MSD IPL with Co[...]

  • Page 277

    16.7 5XX System Hardware Information 16.7.1 5XX Small system Hardware Configuration 520 7457 2 way - 16 GB Mainstore DASD / 23 35GB 15K rpm arms, RAID Protected Software Configuration 100,000 spool files (100,000 completed jobs with 1 spool file per job) 500 jobs in job queues (inactive) 500 active jobs in system during Mainstore dump 1000 user pro[...]

  • Page 278

    16.8 5XX IPL Performance Measurements (Normal) The following tables provide a comparison summary of the measured performance data for a normal and abnormal IPL. Results provided do not represent any particular customer environment. Measurement units are in minutes and seconds The workloads were increased for iV5R4 to better reflect common system lo[...]

  • Page 279

    16.10 5XX IOP vs IOPLess effects on IPL Performance (Normal ) Measurement units are in minutes and seconds . 28:18 26:59 Total 2:52 2:32 OS/400 7:20 6:43 SLIC 18:06 17:44 Hardware iV5R4 GA7 Firmware 16 Way IOPLess 570 7476 256 GB 924 DASD iV5R4 GA7 Firmware 16 Way IOP 570 7476 256 GB 924 DASD Table 16.10.2 Normal IPL - Power-On (Cold Start) 16.11 I[...]

  • Page 280

    Chapter 17. Integrated BladeCenter and System x Performance This chapter provides a performance overview and recommendations for the Integrated xSeries Server 4 , the Integrated xSeries Adapter and the iSCSI host bus adapter. In addition, the chapter presents some performance characteristics and impacts of these solutions on System i ™ . 17.1 Int[...]

  • Page 281

    Integrated xSeries Servers (IXS) An Integrated xSeries Server is an Intel processor-based server on a PCI-based interface card that plugs into a host system. This card provides the processor, memory, USB interfaces, and in some cases, a built-in gigabit E thernet adapter. There are several hardware versions of the IXS: y The 2.0 GHz Pentium® M IXS[...]

  • Page 282

    y Write Cache Property When the disk device write cache property is di sabled, disk operations have similar performance characteristics to shared disks. You may examine or change the “Write Cache” property on Windows by selecting disk “properties” and then the “Hardware tab”. Then view “Properties” for a selected disk and view the ?[...]

  • Page 283

    y With iSCSI, there are some Windows side disk configuration rules you must take into account to enable efficient disk operations. Windows disks should be configured as:  1 disk partition per virtual drive.  File system formatted with cluster sizes of 4 kbyte or 4 k byte multiples.  2 gigabyte or larger storage spaces (for which Windows cr[...]

  • Page 284

    2. Vary on any Network Server Description (NWSD) with a Network server connection ty pe of *ISCSI. During the iSCSI network server vary on processing the QFPHIS subsystem is automatically started if necessary. The subsystem will activate the private memory pool. iSCSI network server descriptions that are varied on will then utilize the first privat[...]

  • Page 285

    IXS and IXA I/O operations (disk, tape, optical and virtual Ethernet) communications occur through the individual IXS and IXA IOP resource. This IOP imposes a finite capacity. The IOP processor utilization may be examined via the iSeries Collection Services utilities. The performance results presented in the rest of this chapter are based on measur[...]

  • Page 286

    2.5 MBytes 22.5 MBytes Total: 1 MByte 12 0.5 MByte QFPHIS Private Pool: 0.5 MByte 1 MByte Base Pool: 1 MByte 21 MBytes Machine Pool: For Each NWSD For Each Target HBA Warning: To ensure expected performance and continuing machine operation, it is critical to allocate sufficient memory to support all of the devices that are varied on. Inadequate mem[...]

  • Page 287

    CP W per 1k Dis k Op e r at ion s 0 10 0 20 0 30 0 40 0 50 0 60 0 512 Wr i te 1k W ri te 2k W ri te 4k W ri te 8k W ri te 16 k Wr i te 24 k Wr i te 32 k Wr i te 64 k Wr i te 51 2 R ead 1k R ea d 2k R ea d 4k R ea d 8k R ea d 16 k R e ad 24 k R e ad 32 k R e ad 64 k R e ad 51 2 R W 1k R W 2k R W 4k R W 8k R W 16 k R W 24 k R W 32 k R W 64 k R W Fil [...]

  • Page 288

    y A storage space which is linked as shared, or a disk with caching disabled, requires more CPU to process write operations (approx. 45%). y Sequential operations cost approximately 10% less than the random I/O results shown above. y Even though a Windows disk driver may have write cache enabled, some Windows applications may request to bypass the [...]

  • Page 289

    The blue square line shows an iSCSI connection with a single target iSCSI HBA - single initiator iSCSI HBA connection, configured to run with standard frames. The pink circle line is a single target iSCSI HBA to multiple servers and initiators running also running with standard frames. With the initiators and switches configured to use 9k jumbo fra[...]

  • Page 290

    than an IXS or IXA attached VE connection. “Stream” means that the data is pushed in one direction, with only the TCP acknowledge packets running in the other direction. 17.6.2 VE CPW Cost CPW cost below is listed as CPW per Mbit/sec. For the point to point connection, the results are different depending on the direction of transfer. For connec[...]

  • Page 291

    The chart above shows the CPW efficiency of operations (larger is better). Note the CPW per Mbits/sec scale on the left - as it’s different for each chart. For an IXS or IXA, the port-based VE has the least CPW or smaller packets due to consolidation of transfers available in Licensed Internal Code. The VLAN-based transfers have the greatest cost[...]

  • Page 292

    The legend label “Mixed Files” indicates a save of many files of mixed sizes - equiv alent to the save of the Windows system file disk. “Large files” indicates a save of many large files - in this case many 100MB files. F L BU S AV / RS T Ra te s 0.00 10.00 20.00 30.00 40.00 50.00 60.00 70.00 80.00 90.00 SA V to di sk SAV to T ape R ST f ro[...]

  • Page 293

    Choose V5R4. In the “Contents” panel choose “iSeries Information Center”. Expand “Integrated operating environments” and then “Windows environment on iSeries” for Windows environment information or “Linux” and then “Linux on an integrated xSeries solution for Linux Information on an IXS or attached xSeries server. Microsoft Ha[...]

  • Page 294

    Chapter 18. Logical Partitioning (LPAR) 18.1 Introduction Logical partitioning (LPAR) is a mode of machine operation where multiple copies of operating systems run on a single physical machine. A logical partition is a collection of machine resources that are capable of running an operating system. The resources include processors (and associated c[...]

  • Page 295

    y Allocate fractional CPUs wisely. If your sizing indicates two partitions need 0.7 and 0.4 CPUs, see if there will be enough remaining capacity in one of the partitions with 0.6 and 0.4 or else 0.7 and 0.3 CPUs allocated. By adding fractional CPUs up to a "whole" processor, fewer physical processors will be used. Design implies that some[...]

  • Page 296

    The reasons for the LPAR overhead can be att ributed to contention for the s hared memory bus on a partitioned system, to the aggregate bandwi dth of the standalone systems being gre ater than the bandwidth of the parti tioned system, and to a lower number of system resources configured for a system partition than on a standalone system. For exampl[...]

  • Page 297

    Also note that part of the performance increase of an larger system may have come about because of a reduction in contention within the CPW workload itself. That is, the measurement of the stan dalone 12-way system required a larger number of users to drive the system’s CPU to 70 percent than what is required on a 4-way system. The larger number [...]

  • Page 298

    LPA R Throughput Increase 12-way 8-way+4-way 2 x 6-way 3 x 4-way LPA R Configuration 4600 4700 4800 4900 5000 5100 5200 5300 5400 Total CPW of all Partitions Total Increase in CPW Capacity of an LPAR Sy stem 7% 9% 13% Figure 18.2. 12 way LPAR Throughput Example To illustrate the impact that varying the workload in the partitions has on an LPAR syst[...]

  • Page 299

    18.4 LPAR Measurements The following chart shows measurements taken on a partitioned 12-way system with the syste m’s CPU utilized at 70 percent capacity. The system was at the V4R4M0 release level. Note that the standalone 12-way CPW value of 4700 in our meas urement is higher than the published V4R3M0 CPW value of 4550. This is because ther e w[...]

  • Page 300

    The following chart shows pro jected LPAR capacities for several LPAR configurations. The projections are based on measurements on 1 and 2 way measurements when the system’s CPU was utilized at 70 percent capacity. The LPAR ove rhead was also factored into the projections. The system was at the V4R4M0 release level. 21 % 5700 2-ways 6 26 % 5920 1[...]

  • Page 301

    Chapter 19. Miscellaneous Performance Information 19.1 Public Benchmarks (TPC-C, SAP, NotesBench, SPECjbb2000, VolanoMark) iSeries systems have been represented in several public performance benchmarks. The purpose of these benchmarks is to give an indication of relative strength in a general field of computing. Benchmark results can give confidenc[...]

  • Page 302

    The most commonly run of these is the SAP-SD (Sales and Distribution) benchmark. It can be run in a 2-tier environment, where the application and database reside on the same system, or on a 3-tier environment, where there are many application servers feeding into a database server. Care must be taken to ensure that the same level of software is bei[...]

  • Page 303

    This web site is primarily focused on results for systems that the Volano company measures themselves. These results tend to be for much smaller, Intel-based systems that are not comparable with iSeries servers. The web site also references articles written by other groups regarding their measurements of the benchmark, including AS/400 and iSeries [...]

  • Page 304

    of relatively lower delay cost. y Waiting Time The waiting time is used to determine the delay cost of a job at a particular time. The waiting time of a job which affects the cost is the time the job has been waiting on the TDQ for execution. y Delay Cost Curves The end-user interface for setting job priorities has not changed. However, internally [...]

  • Page 305

    y Priority 47-51 y Priority 52-89 y Priority 90-99 Jobs in the same group will have the same resource (CPU seconds and Disk I/O requests) usage limits. Internally, each group will be associated with one set of delay cost curves. This would give some preferential treatment to jobs of higher user priorities at low system utilization. With this mappin[...]

  • Page 306

    less CPU utilization resulting in slightly lower transaction rates and slightly longer response times. However, the batch job gets more CPU utilization and consequently shorter run time. y It is recommended that you run with Dynamic Priority Scheduling for optimum distribution of resources and overall system performance. For additional information,[...]

  • Page 307

    of printers in the configuration. 70% of the remaining memory is allocated to the interactive pool; 30% to the base pool. A QPFRADJ value of 1 ensures that memory is allocated on the system in a way that the system will perform adequately at IPL time. It does not allow for reaction to changes in workload over time. In general, this value is avoided[...]

  • Page 308

    files of differing characteristics are being accessed. The pool attribute can be changed from *FIXED to *CALC and back at any time, so making a change and evaluating its affect over a period of time is a fairly safe experiment. More information about Expert Cache can be found in the Work Management guide. In some situations, you may find that you c[...]

  • Page 309

    To determine a reasonable level of page faulting in user pools, determine how much the paging is affecting the interactive response time or batch throughput. These calculations will show the percentage of time spent doing page faults. The following steps can be used: (all data can be gathered w/STRPFRMON and printed w/PRTSYSRPT). The following assu[...]

  • Page 310

    NOTE : It is very difficult to predict the improvement of adding storage to a pool, even if the potential gain calculated above is high. There may be instances where adding storage may not improve anything because of the application design. For these circumstances, changes to the application design may be necessary. Also, these calculations are of [...]

  • Page 311

    0 100 200 300 400 500 600 Number of PC Clients 0 20 40 60 80 100 120 140 160 180 200 220 240 Total Collection Time (min) AS/400 NetFinity Software Inventory Performance AS/400 510-2142 Token Rings TPC/IP V4R1 About 100 client s were collecte d in 42 minutes Figure 19.1. AS/400 NetFinity Software Inventory Performan ce 0 100 200 300 400 500 600 Numb[...]

  • Page 312

    Conclusions/Recommendations for NetFinity 1. The time to collect hardware or software information for a number of clients is fairly linear. 2. The size of the AS/400 CPU is not a limitation. Data collection is performed at a batch priority. CPU utilization can spike quite high (ex. 80%) when data is arriving, but in general is quite low (ex. 10%). [...]

  • Page 313

    Chapter 20. General Performance Tips and Techniques This section's intent is to cover a variety of useful topics that "don't fit" in the document as a whole, but provide useful things that customers might do or deal with special problems customers might run into on iSeries. It may also contain some general guidelines. 20.1 Adjus[...]

  • Page 314

    Problem It is too easy to use the overall pool's value of MAXACT as a surrogate for controlling the number of Jobs. That is, you can forget the distinction between jobs and threads and use MAXACT to control the activity in a storage pool. But, you are not controlling jobs; you are controlling threads. It is also too easy to have your existing [...]

  • Page 315

    20.2 General Performance Guidelines -- Effects of Compilation In general, the higher the optimization, the less easy the code will be to debug. It may also be the case that the program will do things that are initially confusing. In-lining For instance, suppose that ILE Module A calls ILE Module B. ILE Module B is a C program that does allocation ([...]

  • Page 316

    20.3 How to Design for Minimum Main Storage Use (especially with Java, C, C++) The iSeries family has added popular languages whose usage continues to increase -- Java, C, C++. These languages frequently use a different kind of storage -- heap storage. Many iSeries programmers, with a background in RPG or COBOL are unaware of the influence this may[...]

  • Page 317

    Where a and b are constants. “a” is determined by adding up things like the static storage taken up by the application program. “b” is the size of the data base record plus the size of anything else, such as a Java object, that is created one entity per data base record. In some applications, “N” will refer to some freestanding fact, li[...]

  • Page 318

    SQL records in a result set Program stack storage Java Virtual Machine and most WebSphere storage System values Operating System copies (e.g. Data Base) copies of application records SQL Result Set (nonrecord) Static storage from RPG and COBOL. Static final in Java. Direct Execution Java Programs Java (and C/C++) objects File Buffers of all kinds T[...]

  • Page 319

    How practical this change would be, if it represented a large, existing data base, would be a separate question. If this is at the initial design, however, this is an easy change to make. Boundary considerations. In Java, we are done because Java will order the three entities such that the least amount of space is wasted. In C and C++, it might be [...]

  • Page 320

    One thing easily misunderstood is variable length characters. At first, one would think every character field should be variable length, especially if one codes in Java, where variable length data is the norm. However, when one considers the internals of data base, a field ought to be ten to twenty bytes long before variable length is even consider[...]

  • Page 321

    20.4 Hardware Multi-threading (HMT) Hardware multi-threading is a facility present in several iSeries processors. The eServer i5 models instead have the Simultaneous Multi-threading ( SMT) facility, which are discussed in the SMT white paper at the following website: http://www-1.ibm.com/servers/eserver/iseries/perfmgmt/pdf/SMT.pdf . HMT is mention[...]

  • Page 322

    HMT and SMT Compared and Contrasted Some key similarities and differences are: y SMT can improve throughput up to 40 per cent, in rare cases, higher. y HMT typically improves throughput by 10 to 25 per cent. y SMT can allow QPRCMLTTSK to change at any time. y HMT needs a full IPL for the change to QPRCMLTTSK to be activated. y SMT has three values [...]

  • Page 323

    20.5 POWER6 520 Memory Considerations Because of the design of the Power6 520 system, there are some key factors with the memory subsystem that one should keep in mind when sizing this system. The Power6 520, unlike the Power6 570, has no L3 cache, which does have an effect on memory sensitive workloads, like Java applications for instance. Having [...]

  • Page 324

    activation time. This means that a partition that requires 4 GB of memory could be assigned 2 GB from the quad with 4 GB DIMMs and the other 2 GB from the quad with 8 GB DIMMs. This too can cause an application to have different performance characteristics on partitions configured with exactly the same amount of resources. When system planning for [...]

  • Page 325

    floating-point data may be copied using the floating-point loads and store, resulting in an alignment interrupt. As an example, consider the following structures, one specifying "packed" and the other allowed to be aligned per the compiler. For example: struct FPAlignmentStruct Packed { long FloatingPointOp1; char ACharacter; long Floatin[...]

  • Page 326

    Chapter 21. High Availability Performance The primary focus of this chapter is to present data that compares the effects of high availability scenarios using different hardware configurations. The data for the high availability test are broken down into two different categories which include Switch able IASP’s, and Geographic Mirroring. High Avai[...]

  • Page 327

    · Inactive switchover - The switching time is measured from the point at which the CHGCRGPRI command is issued from the primary system which has no work until the I ASP is available on the new primary system. · Partition - An active partition is created by starting the database workload on the I ASP. Once the workload is stabilized an option 22(f[...]

  • Page 328

    Switchover Measurements NOTE: The information that follows is based on performance measurements and analysis done in the Server Group Division laboratory. Actual performance may vary significantly from these tests. Switchable IASP’s using Hardware Resources Time Required to Switch the IASP using Hardware Resources 6:55 10:19 4:31 Time(Minutes) Ac[...]

  • Page 329

    Active State: In geographic mirroring, pertaining to the configuration state of a mirror copy that indicates geographic mirroring is being performed, if the IASP is online. Workload Description Synchronization: This workload is performed by starting the synchronization process on the source side from an unsynchronized geographic mirrored I ASP. The[...]

  • Page 330

    Workload Configuration The wide variety of hardware configurations and software environments available make it difficult to characterize a ‘typical’ high availability environment and predict the results. The following section provides a simple description of the high availability test. Large System Configuration Cabling Map HS L Li n e 870 Cl u[...]

  • Page 331

    Geographic Mirroring Measurements NOTE: The information that follows is based on performance measurements and analysis done in the IBM Server Group Division laboratory. Actual performance may vary significantly from this test. Synchronization on an idle system: The following data shows the time required to synchronize 1 t erabyte of data. This test[...]

  • Page 332

    Geographic Mirroring Tips • For a quicker switchover time, keep the user-ID (UID) and group-ID (GID) of user profiles that own objects on the IASP the same between nodes of the cluster group. Having different UID’s lengthens vary on times. • Geographic mirroring is optimized for large files. A large number of small files will produce a slower[...]

  • Page 333

    Chapter 22. IBM Systems Workload Estimator 22.1 Overview The IBM Systems Workload Estimator (a.k.a., the Estimator or WLE) , located at: http://www.ibm.com/systems/support/tools/estimator , is a web-based sizing tool for System i, System p, and System x. You can use this tool to size a new system, to size an upgrade to an existing system, or to siz[...]

  • Page 334

    typical disclaimers that go with any performance estimate ("your experience might vary...") are especially true. We provide these sizing estimates as general guidelines only. 22.2 Merging PM for System i data into the Estimator The Measured Data workload of the Estimator is designed to accept data from various data sources. The most commo[...]

  • Page 335

    account features like detailed journaling, resource locking, single-threaded applications, time-limited batch job windows, or poorly tuned environments. The Estimator is a capacity sizing tool. Even though it does not represent actual transaction response times, it does adhere to the policy of giving recommendations that abide by generally accepted[...]

  • Page 336

    Appendix A. CPW and CIW Descriptions "Due to road conditions and driving habits, your results may vary." "Every workload is different." These are two hallmark statements of measuring performance in two very different industries. They are both absolutely correct. For iSeries and AS/400 systems, IBM has provided a measure called C[...]

  • Page 337

    CPW Application Description The CPW application simulates the database server of an online transaction processing (OLTP) environment. Requests for transactions are received from an outside source and are processed by application service jobs on the database server. It is based, in part, on the business model from benchmarks owned and managed by the[...]

  • Page 338

    A.2 Compute Intensive Workload - CIW Unlike CPW values, CIW values are not derived from specific measurements of a single workload. They are modeled projections which are based upon the characteristics of internal workloads such as Domino workloads and application server environments such as can be found with SAP or JDEdwards applications. CIW is m[...]

  • Page 339

    category that often fits into the CIW-like classification is overnight batch. Even though batch jobs often process a great deal of database work, there are relatively few jobs which means there is little switching of jobs from processor to processor. As a result, overnight batch data processing jobs sometimes act more like compute-intensive jobs. W[...]

  • Page 340

    Appendix B. System i Sizing and Performance Data Collection Tools The following section presents some of the alternative tools available for sizing and capacity planning. (Note: There are products from vendors not included here that perform similar functions.) All of the tools discussed here support the current range of System i products, and inclu[...]

  • Page 341

    B.1 Performance Data Collection Services Collecting performance data with Collection Serv ices is an operating system function designed to run continuously that collects system and job level performance data at regular intervals which can be set from 15 seconds to 1 hour. It runs a number of collection routines called probes which collect data from[...]

  • Page 342

    predefined profile containing commonly used categories. For example, if you do not hav e a need to monitor the performance of SNADS transaction data on a regular basis, you can c hoose to turn that category off so that S NADS transaction data is not collected. Since Collection Services is intended to be run continuously and trace mode is not, trace[...]

  • Page 343

    http://www.ibm.com/servers/eserver/iseries/perfmgmt/batch.html Unzip this file, transfer to your System i platform as a save file and restore library QBCHMDL. Add this library to your library list and start the tool by using the STRBCHMDL command. Tips, disclaimers, and general help are available in the QBCHMDL/ README file. It is recommended that [...]

  • Page 344

    Appendix C. CPW and MCU Relative Performance Values for System i This chapter details the relative system performance values: y Commercial Processing Workload ( CPW ). For a detailed description, refer to Appendix A, “CPW Benchmark Description”. CPW values are relative system performance metrics and reflect the relative system capacity for the [...]

  • Page 345

    C.1 V6R1 Additions (October 2008) C.1.1 CPW values for the IBM Power Systems - IBM i operating system 77600 56800 40300 21600 11000 2x4MB / 32MB 5.0 7388 570 (9117-MMA) 70000 51500 36200 19400 9850 2x4MB / 32MB 4.4 7387 570 (9117-MMA) 16 cores 12 cores 8 cores 4 cores 2 cores L2/L3 cache (1) per chip Chip Speed GHz Processor Feature Model Processor[...]

  • Page 346

    2. Memory speed differences account for some slight variations in performance difference between models. 3. CPW values for Power System models introduced in October 2008 were based on IBM i 6.1 plus enhancements in post-release PTFs. C.1.4 CPW values for IBM Power Systems - IBM i operating system 9200-32650 2 - 8 2x4MB / 32MB 4.2 4966 550 (8204-E8A[...]

  • Page 347

    4800-18000 1 - 4 2x4MB / 32MB 4200 4966 550 (9409-M50) 4300-8300 1 - 2 2x4MB / 0MB 4200 5634 520 (9408-M25) 4300 1 2x4MB / 0MB 4200 5633 520 (9407-M15) Processor CPW CPU (2) Range L2/L3 cache (1) per chip Chip Speed MHz Processor Feature Model Table C.3.1. CPW values for Power System Models *Note: 1. These models have a dedicated L2 cache per proce[...]

  • Page 348

    13800 3.7 of 4 (3) 2x4MB / 0 MB 4000 52BE n/a n/a JS22 (7998-61X) 11040 3 of 4 (2) 2x4MB / 0 MB 4000 52BE n/a n/a JS22 (7998-61X) Processor CPW CPUs L2/L3 cache (1) per chip Chip Speed MHz Processor Feature Edition Feature Server Feature Blade Model Table C.4.1. IBM BladeCenter models *Note: 1. These models have a dedicated L2 cache per processor c[...]

  • Page 349

    6100 2800 2800 1 (3) 1.9/36MB 1900 NA 7735 9406-520 6100 2800 2800 1 (3) 1.9/36MB 1900 NA 7374 (5) 9406-520 8200 0 3800 1 1.9/36MB 1900 NA 7691 (10) 9406-520 8200 0 3800 1 1.9/36MB 1900 NA 7784 9406-520 8200 - 15600 0 3800-7100 1 - 2 1.9/36MB 1900 NA 7785 9406-520 8200 - 15600 3800-7100 3800-7100 1 - 2 1.9/36MB 1900 NA 7736 9406-520 8200 - 15600 38[...]

  • Page 350

    NR - 6600 (9) 30 600-3100 9 1 (3) 1.9MB/NA 1900 7680 7140 9405-520 NR - 6600 (9) 30 600-3100 9 1 (3) 1.9MB/NA 1900 7681 7141 9405-520 NR - 6600 (9) 30 600-3100 9 1 (3) 1.9MB/NA 1900 7682 7142 9405-520 NR - 6600 (9) 30 600 - 3100 9 1 (3) 1.9/NA 1900 7353 7156 9405-520 2600 - 8200 (9) 60 1200-3800 9 1 (3) 1.9/36MB 1900 7687 7148 9405-520 2600 - 8200 [...]

  • Page 351

    NA recommended 30 500 1 (3) NA 1.9 MB 1500 520-0900 (7450) 2300 60 1000 1 (3) NA 1.9MB 1500 520-0901 (7451) 2300 1000 1000 1 (3) NA 1.9 MB 1500 520-0902 (7552) 5 2300 0 1000 1 (3) NA 1.9 MB 1500 520-0902 (7458) 2300 1000 1000 1 (3) NA 1.9 MB 1500 520-0902 (7459) ) 5500 2400 2400 1 NA 1.9 MB 1500 520-0903 ( 7553 ) 5 5500 0 2400 1 NA 1.9 MB 1500 520-[...]

  • Page 352

    8. The 64-way is measured as two 32-way par titions since i5/OS does not support a 64-way partition. 9. IBM stopped publishing CIW ratings for iSeries after V5R2. It is recommended that the IBM Systems Workload Estimator be used for sizing guidance, available at: http://www.ibm.com/eserver/iseries/support/estimator C.8 V5R2 Additions (February, May[...]

  • Page 353

    C.8.2 Model 810 and 825 iSeries for Domino (February 2003) 3100 380 0 1020 1 2 MB 540 810-2466 (7407) 4200 530 0 1470 1 4 MB 750 810-2467 (7410) 7900 950 0 2700 2 4 MB 750 810-2469 (7428) 11600 na 0 na 4 1.41 MB 1100 825-2473 (7416) 17400 2890 0 6600 6 1.41 MB 1100 825-2473 (7416) MCU Processor CIW* 5250 OLTP CPW* Processor CPW CPU Range L2 cache p[...]

  • Page 354

    10680 - 20910 1630 - 3220 4550 4200-7350 4 - 8 4 MB 540 830-2349 (1537) 10680 - 20910 1630 - 3220 2000 4200-7350 4 - 8 4 MB 540 830-2349 (1536) 10680 - 20910 1630 - 3220 1050 4200-7350 4 - 8 4 MB 540 830-2349 (1535) 10680 - 20910 1630 - 3220 560 4200-7350 4 - 8 4 MB 540 830-2349 (1534) 10680 - 20910 1630 - 3220 240 4200-7350 4 - 8 4 MB 540 830-2349[...]

  • Page 355

    C.10.1 Model 8 xx Servers 77800 10950 2000 20200 24 16 MB 600 840-2461 (1544) 77800 10950 1050 20200 24 16 MB 600 840-2461 (1543) 77800 10950 560 20200 24 16 MB 600 840-2461 (1542) 77800 10950 240 20200 24 16 MB 600 840-2461 (1541) 77800 10950 120 20200 24 16 MB 600 840-2461 (1540) 20910 3220 4550 7350 8 4 MB 540 830-2403 (1537) 20910 3220 2000 735[...]

  • Page 356

    77800 10950 20200 20200 24 16 MB 600 840-2461 (1548) 77800 10950 16500 20200 24 16 MB 600 840-2461 (1547) 77800 10950 10000 20200 24 16 MB 600 840-2461 (1546) 77800 10950 4550 20200 24 16 MB 600 840-2461 (1545) MCU Processor CIW Interactive CPW Processor CPW CPUs L2 cache per CPU Chip Speed MHz Model Table C.9.1.1 Model 8 xx Servers Note: 830 model[...]

  • Page 357

    C.10.4 Capacity Up grade on-demand Models New in V4R5 (December 2000) , Capacity Upgrade on Demand (CUoD) capability offered for the iSeries Model 840 enables users to start small, then increase processing capacity without disrupting any of their current operations. To accomplish this, six processor features are available for the Model 840. These n[...]

  • Page 358

    59600 - 77800 8380 - 10950 20200 16500 - 20200 18 - 24 16 MB 600 840-2354 (1548) 59600 - 77800 8380 - 10950 1 6500 16500 - 20200 18 - 24 16 MB 600 840-2354 (1547) 59600 - 77800 8380 - 10950 10000 16500 - 20200 18 - 24 16 MB 600 840-2354 (1546) 59600 - 77800 8380 - 10950 4550 16500 - 20200 18 - 24 16 MB 600 840-2354 (1545) 59600 - 77800 8380 - 10950[...]

  • Page 359

    C.11 V4R5 Additions For the V4R5 hardware additions, the tables show each new server model characteristics and its maximum interactive CPW capacity. For previously existing hardware, the tables show for each server model the maximum interactive CPW and its corresponding CPU % and the point (the knee of the curve) where the interactive utilization b[...]

  • Page 360

    16500 16500 24 8 MB 500 840-2420 (1547) 10000 16500 24 8 MB 500 840-2420 (1546) 4550 16500 24 8 MB 500 840-2420 (1545) 2000 16500 24 8 MB 500 840-2420 (1544) 1050 16500 24 8 MB 500 840-2420 (1543) 560 16500 24 8 MB 500 840-2420 (1542) 240 16500 24 8 MB 500 840-2420 (1541) 120 16500 24 8 MB 500 840-2420 (1540) 10000 10000 12 8 MB 500 840-2418 (15 46[...]

  • Page 361

    C.11.4 SB Models 120 16500 24 8 MB 500 SB3-2318 120 10000 12 8 MB 500 SB3-2316 70 7350 8 4 MB 540 SB2-2315 Interactive CPW Processor CPW* CPUs L2 cache per CPU Chip Speed MHz Model Table C.11.4.1 SB Models * Note: The "Processor CPW" values listed for the SB models are identical to the 830-2403-1531 (8-way), the 840-2418-1540 (12-way) and[...]

  • Page 362

    5308.3 4550 4550 12 8 MB 262 740-2070 (1513) 4270 3660 4550 12 8 MB 262 740-2070 (1512) 2333.3 2000 4550 12 8 MB 262 740-2070 (1511) 1225 1050 4550 12 8 MB 262 740-2070 (1510) 140 120 4550 12 8 MB 262 740-2070 (Base) 4270 3660 3660 8 8 MB 262 740-2069 (1512) 2333.3 2000 3660 8 8 MB 262 740-2069 (1511) 1225 1050 3660 8 8 MB 262 740-2069 (1510) 140 1[...]

  • Page 363

    Note: the CPU not used by the interactive workloads at their Max CPW is used by the system CFINTnn jobs. For example, for the 2386 model the interactive wor kloads use 17.8% of the CPU at their maximum and the CFINTnn jobs use the remaining 82.2%. The processor workloads use 0% CPU whe n the interactive workloads are using their maximum value. AS/4[...]

  • Page 364

    C.13 AS/400e Model Sxx Servers For AS/400e servers the knee of the curve is about 1/3 the maximum interactive CPW value. 0.9 2.7 21.3 64 2340 12 2261 1.2 3.6 21.3 64 1794 8 2256 0.8 2.6 40 120 4550 12 2208 1.1 3.2 40 120 3660 8 2207 S40 1.2 3.6 21.3 64 1794 8 2260 2.1 6.4 21.3 64 998.6 4 2259 3.7 11 21.3 64 583.3 2 2258 5.4 16.1 17.2 51.5 319 1 225[...]

  • Page 365

    2.6 7.7 10.9 32.2 650.0 4 n/a 2157 3 9 10.7 32.2 598.0 4 n/a 2156 4.5 13.5 10.7 32.2 319.0 2 n/a 2155 6.8 20.3 15.9 32.2 188.2 1 n/a 2154 53S 8.9 23.8 12.0 32.2 138.0 1 n/a 2122 10 30 10.7 32.2 111.5 1 n/a 2121 9.3 27.8 8.1 22.5 81.6 1 n/a 2120 9.9 29.8 10.8 32.2 91.0 1 n/a 2112 9.9 29.8 7.2 21.6 63.0 1 n/a 2111 50S 12.5 37.4 3.9 14.5 35 1 n/a 2110[...]

  • Page 366

    238,073.64 95,229.46 4.0B 396,789.40 158,715.76 3.1H 12 2313 164,655.74 65,862.29 4.0B 274,426.23 109,770.49 3.1H 8 2312 FI ds/hr @ 65% CPU Utilization SD ds/hr @ 65% CPU Utilization SAP Release CPUs Model Table C.16.1 AS/400e Custom Application Server Model SB1 C.17 AS/400 Models 4xx, 5xx and 6xx Systems 650 509.9 996 4096 4 2162 598 459.3 996 409[...]

  • Page 367

    C.18 AS/400 CISC Model Capacities 16.8 3.93 56 1 2117 9.6 3.93 40 1 2115 7.3 2.99 24 1 2114 P03 7.3 2.1 16 1 n/a P02 CPW Disk (GB) Maximum Memory (MB) Maximum CPUs Feature Model Table C.18.1 AS/400 CISC Model: 9401 9.6 8.2 40 1 F06 7.3 7.9 40 1 E06 7.3 4.1 24 1 F04 5.5 2.1 24 1 F02 5.5 4.0 24 1 E04 5.5 1.6 20 1 D06 4.5 2.0 24 1 E02 4.4 1.6 16 1 D04[...]

  • Page 368

    177.4 256 1536 4 F97 148.8 256 1280 4 F95 127.7 256 1024 3 F90 116.6 256 1152 4 E95 97.1 256 768 2 F80 96.7 256 1024 3 E90 69.4 256 512 2 E80 57.0 256 512 1 F70 56.6 256 384 2 D80 40.0 146 384 1 F60 39.2 146 256 1 E70 32.3 146 256 1 D70 28.1 146 192 1 E60 27.8 114 192 1 F50 23.9 146 192 1 D60 20.0 54.8 192 1 B70 18.1 98.0 128 1 E50 17.1 67.0 80 1 F[...]