1.difference Between Z/Os and LUW: Accessing DB2
1.difference Between Z/Os and LUW: Accessing DB2
Z/OS
One common system catalog for all databases defined within a subsystem • DSNDB06 –
This catalog contains the metadata for all objects defined within
Catalog database
the subsystem.
LUW
Three system tablespaces are created by default for every database 1. SYSCATSPACE –
Contains system catalog tables 2. TEMPSPACE – Holds temp tables used by UDB 3. USERSPACE1 –
Contains user tables unless tablespace specified (like DSNDB04)
StorAge management:
The physical devices for z/OS are known as volumes. The physical devices for
distributed platforms are known as containers. A container in itself is not a
physical device but a representation of how the space is defined.
LBAC:
A security label is composed of one or more security label components. There
are
three types of security label components that you can use to build your
security
labels:
• Sets. A set is a collection of elements where the order in which those
elements appear is not important. All elements are deemed equal.
• Arrays. An array is an ordered set that can be used to represent a simple
hierarchy. In an array, the order in which the elements appear is
important. For example, the first element ranks higher than the second
element and the second higher than the third.
• Trees. A tree represents a more complex hierarchy that can have multiple
nodes and branches. For example, trees can be used to represent
organizational charts. You use a security policy to define the security label
components that make up a particular security label.
A high-quality physical database design is one that meets the following goals:
• Minimizes I/O
• Balances design features that optimize query performance concurrently with
transaction performance and maintenance operations
• Improves the efficiency of database management, such as roll-in and roll-out of
data
• Improves the performance of administration tasks, such as index creation or
backup and recovery processing
• Minimizes backup and recovery elapsed time
• Set logindexbuild to ON
The digital certificate contains specific pieces of information about the identity of the
certificate owner and about the certificate authority, these being:
• The owner's distinguished name. A distinguished name is the combination of the
owner's common name and its context (position) in the directory tree. In the simple
directory tree shown in Figure 1, for example, LaurenA is the owner's common
name (CN), the organization unit (OU) is Engnring and the Organization (O) is
XYZCorp; therefore, the distinguished name is:
.CN=LaurenA.OU=Engnring.O=XYZCorp
• The owner's public key.
• The date the digital certificate was issued.
• The date the digital certificate expires.
• The issuer's distinguished name. This is the distinguished name of the issuing CA.
• The issuer's digital signature
The iKeyman utility is a tool you can use to manage your digital certificates. With
iKeyman, you can:
Create a new key database
Create a test digital certificate,
Add CA roots to your database,
Copy certificates from one database to another,
Request and receive a digital certificate from a CA,
Set default keys,
Change passwords
Jan works for a medium-size company that has just purchased another smaller organization.
Jan has been asked to import the certificates from the smaller company's OpenSSL keystore
into the company standard CMS format. Jan decides to create a new CMS keystore and add
the certificates from the OpenSSL store to it. Jan does not like to use a GUI tool and
decides to use the IKEYCMD command line tool to perform the operation. In order to
import the OpenSSL certificates into a new CMS keystore Jan must:
• Create a new CMS keystore.
• Add the root certificate from OpenSSL.
• Export the certificates from the OpenSSL key store.
• Import the OpenSSL certificates into the CMS keystore.
DB2 workload
Serves as the primary point of control, based on the source of submitters of
work, and routes work to service classes via connection attributes
DB2 service class
Serves as the primary point of resource control for all executing work activities
DB2 threshold
Provides limits to control behaviors of database activities based on predictive
and reactive elements for all activities occurring in a database or service class
DB2 work action set (work action > work class set > work class)
Provides ability to discriminate between different types of database activities
(read, write, call, DML, DDL and load) occurring in a database or service class
DB2 WLM monitor and control capabilities
db2pd utility, table functions, stored procedures and event monitors provide
real-time as well as historical monitoring capabilities
SET WORKLOAD TO SYSDEFAULTADMWORKLOAD;
---------------------------------------------------------------
-- create service classes
---------------------------------------------------------------
---------------------------------------------------------------
-- create work class sets
---------------------------------------------------------------
---------------------------------------------------------------
-- create work action sets
---------------------------------------------------------------
---------------------------------------------------------------
-- grant usage of workloads
---------------------------------------------------------------
The IEHLIST utility is used to list a partitioned data set directory or a disk volume
VTOC.
The IEHINITT utility is used to write standard labels on tapes. It can be used, as
needed, to label a single tape or it can be used to label large batches of tapes
The IEHPROGM utility is almost obsolete. It is used primarily to manage
catalogs, rename data sets, and delete data sets by a program instead of by JCL
actions. It was primarily used during system installation or the installation of a
major program product
The IEBDG utility is used to create records in which fields can be generated with
various types of data
//LOAD EXEC PGM=IDCAMS
//SYSPRINT DD *
//DATAIN DD DISP=OLD,DSN=OGDEN.SORTOUT
//SYSIN DD *
DEFINE CLUSTER (NAME (OGDEN.DATA.VSAM) -
VOLUMES(WORK02) CYLINDERS(1 1) -
RECORDSIZE (72 100) KEYS(9 8) INDEXED)
REPRO INFILE(DATAIN) OUTDATASET(OGDEN.DATA.VSAM) ELIMIT(200)
SMP/E is the z/OS tool for managing the installation of software products on a
z/OS system and for tracking modifications to those products. SMP/E controls
these changes at the component level by:
_ Selecting the proper levels of code to be installed from a large number of
potential changes.
_ Calling system utility programs to install the changes.
_ Keeping records of the installed changes by providing a facility to enable you
to inquire on the status of your software and to reverse the change if
necessary.
All code and its modifications are located in the SMP/E database called the
consolidated software inventory (CSI), which is comprised of one or more VSAM
data sets.
Use your
AMI
------------------------
cloud defination :
Common, Location-independent,Online Utility on Demand where Common implies
multi-tenancy, not single or isolated tenancy; Utility implies pay-for-use pricing ; on
Demand implies ~infinite, ~immediate, ~invisible scalability
------------------------------------------------------------------------
Multitenancy refers to a principle in software architecture where a single instance of the
software runs on a server, serving multiple client organizations (tenants).
------------------------------------------------------------------------
Cloud Software as a Service (SaaS)
Use provider’s applications over a network
Cloud Platform as a Service (PaaS)
Deploy customer-created applications to a cloud
Cloud Infrastructure as a Service (IaaS)
Rent processing, storage, network capacity, and other fundamental computing resources
-------------------------------------------------------------------------
The SOA lifecycle is the framework of the IBM SOA strategy. As Figure 2-1
shows, the SOA lifecycle consists of four stages:
_ Model: Use modeling tools to define the business process at a business level
and model the actual services that will be part of an assembled, composite
application.
_ Assemble: Assemble the individual services and write the code that is
needed to implement the business rules for the application. Preexisting
services can be reused, and new services can be developed, or both.
_ Deploy: Deploy the services to runtime environments, such as transaction
management engines, such as WebSphere Application Server, CICS, IMS,
and so forth. Use integration components primarily and enterprise service bus
(ESB) to link together the various services that are needed for the composite
application.
_ Manage: Implement the management infrastructure for monitoring and
managing the services and the service infrastructure, which includes not only
IT management tools, but also business management and monitoring tools to
measure actual business activities.
WAS is based on open standards is very important because it helps understand how
“WAS is WAS” yet also have platform exploitation. That’s possible because the open
standards represent application interfaces. That’s where the commonality takes place.
But the implementation of the function below the interfaces is handled in some places on
a platform-specific basis. Most of the code is common … but a small bit is platform
specific, and that all takes place under the open standard specification line.