Oracle® Application Server Adapter for IMS/TM User's Guide 10g Release 3 (10.1.3.1.0) Part Number B31003-01 |
|
|
View PDF |
Oracle Connect includes a number of tuning parameters that can improve performance. Specifically, the daemon can be configured to optimize communication between the IBM OS/390 or z/OS platform and a client. In addition, the binding environment can be tuned to optimize request handling.
This section contains the following topics:
The daemon workspace is responsible for allocating server processes to clients. You can configure a workspace to use a pool of server processes so that a server process is always available for a client request. Use Oracle Studio to maintain daemon and daemon workspace parameters to control the allocation of server processes and their management in a pool.
You can also have a number of daemon workspace configurations. Therefore, you can create individual workspaces for use with different adapters.
Use Oracle Studio to add a new daemon configuration. You can set up different daemon configurations for different situations.
Perform the following steps to add a new daemon workspace configuration:
From the Start menu, select Programs, Oracle, and then select Studio.
In the Configuration Explorer, expand the node of the required computer.
Expand the Daemons node. The available daemon configurations are listed.
Right-click IRPCD and select New Workspace. The New Daemon Workspace screen is displayed, as shown in the following figure:
Figure 5-1 The New Daemon Workspace screen
Specify a name for the new workspace and optionally provide a description.
Specify whether you want default settings or copy the properties of an existing workspace.
To copy the properties of an existing workspace, click Ellipsis and select the workspace which properties you want to copy.
Click Next. The Select Scenario screen is displayed, as shown in the following figure:
Select Application Server using connection pooling and click Next.
Continue through the wizard and specify the required values for the workspace.
To complete the workspace definition, click Finish.
The new workspace is displayed under the IRPCD daemon node.
You edit a workspace by using the tabs described in the following table:
Table 5-1 Worspace Property tabs
Tab | Description |
---|---|
WS Info |
Specifies general information including the server type, the command procedure used to start the workspace, the binding configuration associated with this workspace and the timeout parameters. |
WS Server Mode |
Specifies workspace server information including features that control the operation of the servers started up by the workspace and allocated to clients. |
WS Logging |
Specifies parameters for logging and the format to use for a log file. |
WS Security |
Specifies administration privileges, user access, ports available to access the workspace and workspace account specifications. |
WS Governing |
This tab is not applicable for use with OracleAS Adapter for IMS/TM. |
Perform the following steps to access these tabs:
From the Start menu, select Programs, Oracle, and then select Studio.
In the Configuration Explorer, expand the the computer defined in "Setting Up the IBM OS/390 or z/OS Platform in Oracle Studio".
Expand the Daemons node. The daemon configurations available on this computer are listed.
Expand the IRPCD node. The daemon workspaces are listed.
Right-click the required workspace and select Edit Workspace.
Click the tab, which contains the information you want to edit. For full details of the tabs and the fields in these tabs, refer to "Workspaces".
After editing the workspace, click Save.
The server mode determines how the daemon starts up new processes. The daemon supports the following server modes:
singleClient: Each client receives a dedicated server process. The account in which a server process runs is determined either by the client login information or by the specific server workspace.
This mode enables servers to run under a particular user account and isolates clients from each other (because each receives its own process). However, this server mode incurs a high overhead due to process startup times and may use a lot of server resources (because it requires as many server processes as concurrent clients). The number of clients that share a process is determined by the Clients per server limit (the maximum number of concurrent clients a server process for the current workspace accepts).
reusable: This is an extension of the single client mode. Once the client processing finishes, the server process does not die and can be used by another client, reducing startup times and application startup overhead. This mode does not have the high overhead of single client mode because the servers are already initialized. However, this server mode may use a lot of server resources (because it requires as many server processes as concurrent clients).
The other modes can be set so that the server processes are reusable by setting the number of times a process can be reused with the Reuse limit value (the maximum number of times a particular server process can be reused or how many clients it can serve before it is retired). Reuse of servers enhances performance because it eliminates the need to repeat initializations. However, reuse runs a risk of higher memory leakage over time. The default for the Reuse limit
field value is None
, indicating that no reuse limit is enforced.
Set the server mode in the WS Server tab of the daemon workspace editor, as shown in the following figure:
When using any of the server modes you can specify a pool of server processes. These server processes are started when the daemon starts and are maintained in a pool. The server processes are available for use by new client requests from the pool, saving initialization time.
Instead of starting a new server process each time one is requested by a client, the client receives a process immediately from the pool of available processes. When the client finishes processing, this server process either dies, or if reusable servers have been specified, it is returned to the pool.
You set up a pool of server processes by specifying the following parameters in the WS Server tab.
Initial number of servers: The number of server processes that are prestarted for this workspace when the daemon starts up. These are available for use by new client processes with minimal initialization time. Instead of starting a new server process each time one is requested by a client, the daemon immediately allocates (to the client) a server from a pool of available servers. When the number of available server processes drops lower than the value specified in the Minimum number of available servers field, the daemon again starts server processes until the specified number of available servers is reached. The default for this parameter is 0, meaning that no servers are prestarted for this workspace.
Minimum number of available servers: The minimum number of server processes in the prestarted server's pool before the Oracle Connect daemon resumes creating new server processes (up to the number specified in the Initial number of servers field value, described earlier). If this parameter is set to a value greater than that of the Initial number of servers field value, the daemon considers the value to be the same as the value specified in the Initial number of servers field. In this case, a new server process is started and added to the pool each time a server process is removed from the pool and allocated to a client). The default for this parameter is 0, meaning that new servers are created only when there are no other available servers.
Set maximum number of servers: The maximum number of available server processes pooled for this workspace. If the server is reusable, once a client disconnects from the server, the daemon returns the server to the pool of available servers. If the limit is reached, excess server processes are discarded.
Number of sub-tasks: The number of sub-tasks for a server that are prestarted for this workspace when the daemon starts up. In addition to setting up a pool of server processes as described earlier, you can set additional server processes as sub-tasks by specifying this parameter. Thus, setting 10 servers and 10 prestarted sub-tasks results in 100 tasks started (10 sub-tasks for each process).
Each binding configuration includes the following:
Environment settings, which are used to configure the environment used by any of the adapters defined in the binding.
Application adapters on the current computer.
Perform the following steps to configure the environment settings:
From the Start menu, select Programs, Oracle, and then select Studio.
In the Configuration Explorer, expand the node of the computer defined in "Setting Up the IBM OS/390 or z/OS Platform in Oracle Studio".
Expand the Bindings node. The available binding configurations are listed.
Right-click NAV and select Edit Binding.
In the Properties tab, edit the required environment settings as needed. To edit an environment setting, click the property category node, and then click the required value to edit.
The binding Properties tab is shown in the following figure:
The binding environment is divided into the following categories:
The following table lists the parameters that define the communication buffers:
Table 5-2 comm Category Parameters
Parameter | Description |
---|---|
Specifies the size of a memory buffer on a client, which is used by the Oracle Connect client/server to store read-ahead data. The default is 200000 bytes. |
|
Specifies the maximum bytes that can be written in one chunk on a socket. The default is -1 (no limitation). |
|
Specifies the maximum size of an XML document held in memory. The default is 65535 bytes. |
|
Specifies the maximum size of an XML document passed to another computer. The default is 65535 bytes. |
The following table lists the parameters that define debugging and logging operations.
Table 5-3 debug Category Parameters
Parameter | Description |
---|---|
When set to |
|
This parameter is not applicable for use with OracleAS Adapter for IMS/TM. |
|
|
This parameter is not applicable for use with OracleAS Adapter for IMS/TM. |
When set to |
|
The high-level qualifier of the log file for messages. The following types of message are written to the log: Error messages. Trace information and information about the query optimization strategy if |
|
This parameter is not applicable for use with OracleAS Adapter for IMS/TM. |
|
This parameter is not applicable for use with OracleAS Adapter for IMS/TM. |
|
This parameter is not applicable for use with OracleAS Adapter for IMS/TM. |
|
This parameter is not applicable for use with OracleAS Adapter for IMS/TM. |
The following parameters define miscellaneous operations, including globalization support and the directory where temporary files are written.
Table 5-4 misc Category Parameters
Parameter | Description |
---|---|
For use with globalization support to identify the codepage for the workspace. See also: Appendix D, "Globalization Settings". |
|
The data type conversion policy when a conversion error occurs:
|
|
This parameter is not applicable for use with OracleAS Adapter for IMS/TM. |
|
Identifies the application language. A default codepage is selected based om the value specified for this parameter. See also: Appendix D, "Globalization Settings". |
|
Specifies the codepage used by a field whose data type is defined as
|
|
The directory where temporary files are written, including the temporary files created for use by hash joins and for sorting files. The default is the current high-level qualifier. |
|
Determines the way 2-digit years are converted into 4-digit years. When the parameter Two policies are provided:
|
The optimizer parameters are not applicable for use with OracleAS Adapter for IMS/TM.
The queryProcessor parameters are not applicable for use with OracleAS Adapter for IMS/TM.
The following table lists the parameters that define the transaction support:
Table 5-5 transactions Category Parameters
Parameter | Description |
---|---|
|
When set to |
|
When set to |
|
Set to |
|
The high-level qualifier and name of the log file that logs activity when using transactions. The |
|
The number of minutes from the start of a transaction before any recovery operation on that transaction can be attempted. The default is |
|
This parameter is not applicable for use with OracleAS Adapter for IMS/TM. |
You can migrate an adapter configuration from one platform to another. The configuration information is stored in the Oracle Connect repository on the source platform and is exported to an XML file which can then be imported to the target platform.
Note that when migrating a configuration, any file names and paths that are specific to the source platform must be changed to valid files on the target platform.
Perform the following steps to migrate an adapter configuration:
From the Start menu, select Programs, Oracle, and then select Studio.
In the Configuration Explorer, right-click the required computer and select Export XML definitions.
Specify the path and name of the XML file, which stores the XML representation and complete configuration.
Edit any paths in the XML definition to the paths required on the target platform. For example, the setting for the serverLogFile parameter might need changing, depending on the platform.
Set up the target platform in Oracle Studio in the same way you set up the source platform, as described in "Setting Up the IBM OS/390 or z/OS Platform in Oracle Studio".
In the Configuration Explorer, right-click the target computer and select Import XML definitions.
Import the XML file to the target platform.
Oracle Connect works within the confines of the platform security system. For example, on an OS/390 computer with RACF installed, and with the workspace server mode set to multi-tasking, a RACROUTE VERIFY
is performed for each task in the address space, according to the client connection.
In addition, Oracle Connect provides the following security:
A binary XML encryption mechanism, which is activated as follows:
The client's first message to the server includes a pre-defined shared key, includeing the key name and value in the connection string. The server gets the key value for the key name passed from the client from the native object store (NOS).
The server generates a random 128-bit RC4 session key which is returned encrypted to the client, using the shared key. If no predefined shared key is provided, then a predefined, hardcoded key is used (this key is hardcoded on the client and on the server).
Passwords are always encrypted when passed over the wire, using an RC4, 128-bit session key, regardless of whether the entire session is encrypted or not.
If a predefined shared key was provided, then the entire session is encrypted. Otherwise, only the password exchange is encrypted (using the hardcoded key).
Credentials: Passwords and usernames exchanged over the network are encrypted using a pre-defined, hardcoded, 128-bit RC4 session key.
Design Time: Security within Oracle Studio to grant access to Oracle Studio itself and to grant access to computers, user profiles and workspaces.
Run time: Security used to access IMS/TM, including controlling the daemon for the access.
Setting design time security is described in the following sections:
Securing access to Oracle Studio is described in "Setting Password Access to Oracle Studio".
Securing rights to configure a computer in Oracle Studio is described in "Specifying Users with Administrative Rights".
Securing access to user profiles is accomplished by right-clicking the relevant user profile in Oracle Studio and selecting Change Master Password. In the dialog box that is displayed, specify a password that must be provided in the future to edit the specific user profile.
Securing access to workspaces is accomplished by right-clicking the relevant workspace in Oracle Studio and selecting Set Authorization. In the dialog box that is displayed, specify a valid user and password that must be provided in the future to edit the specific workspace.
During run time, security considerations are implemented as follows:
When the client request accesses the legacy platform through the daemon, either anonymous access is allowed or a valid user name and password must be provided for the computer in the user profile. The userName and password properties in the J2CA 1.5 IMS/TM adapter are used at this stage to access the daemon.
Note:
The user name used to access the daemon must also be the name of a user profile used.Access by the client must be through a valid port, according to the list of ports specified in the Workspace Access section of the WS Security tab in Oracle Studio. For details of the WS Security tab, refer to "WS Security".
Note:
Access to the legacy platform through a firewall using the NAT protocol is specified when the computer is added to Oracle Studio.To be allocated a server process, the client must be granted anonymous access to the workspace or be listed in the Workspace Users section of the WS Security tab in Oracle Studio. For details of the WS Security tab, refer to "WS Security".
The ability to run commands on the daemon, such as starting or stopping a daemon or ending server processes is available only to administrators who have been registered in Oracle Connect as a daemon administrator. A client is registered as a valid daemon administrator in the Daemon Security tab in Oracle Studio, as described in "Daemon Security".
Note:
You can also specify administrators who can run commands only at the level of the workspace. Specify these administrators in the WS Security tab, as described in "WS Security".OracleAS Adapter for IMS/TM does not support global transactions.