Flylib.com
List of Tables
Previous page
Table of content
Next page
< Day Day Up >
Preface
Figure 1: A. Paulsen, Kang Yong Ying, Whei-Jen Chen, Peter Z. He, Sunminder S Saini
Chapter 1: Introduction
Figure 1-1: Overview of an on demand operating environment
Figure 1-2: On Demand integration
Figure 1-3: IBM Automation blueprint
Figure 1-4: On Demand virtualization
Figure 1-5: Performance tuning process
Chapter 2: Overview of Websphere Application Server V5
Figure 2-1: J2EE architecture
Figure 2-2: WebSphere Application Server V5 packaging
Figure 2-3: WebSphere Application Server V5 multi-tier application environment
Figure 2-4: Runtime architecture for WAS base configuration
Figure 2-5: Runtime architecture for WAS Network Deployment configuration
Chapter 3: Overview of DB2 UDB V8
Figure 3-1: DB2 UDB product overview
Figure 3-2: DB2 architecture overview
Figure 3-3: DB2 process model
Figure 3-4: Types of memory
Figure 3-5: How the database manager uses the memory
Figure 3-6: Storage hierarchy
Figure 3-7: Prefetching data using I/O servers
Figure 3-8: Distribution of extents in container
Figure 3-9: Connection concentrator concept
Chapter 4: DB2 UDB V8 and WAS V5 Integrated Environment
Figure 4-1: EJB environment
Figure 4-2: EJB types
Figure 4-3: Application flow
Figure 4-4: Single machine topology
Figure 4-5: Separating HTTP server
Figure 4-6: Separating the DB2 server
Figure 4-7: Separated Web container and EJB container
Figure 4-8: Vertical scaling
Figure 4-9: Horizontal scaling with clusters
Figure 4-10: Version 4 connection pooling
Figure 4-11: V5 Resource adapter
Figure 4-12: DB2 Java application architecture (Type 2 jdbc driver)
Figure 4-13: DB2 Java application architecture (Type 4 jdbc driver)
Figure 4-14: SQLJ application development
Figure 4-15: Type 2 connectivity from a non-z/OS platform
Figure 4-16: Type 4 connectivity from a non-z/OS platform
Figure 4-17: DB2 for z/OS and OS/390 as DRDA AR
Figure 4-18: DB2 for z/OS and S/390 as AR and DB2 UDB for Multiplatforms as AS
Chapter 5: Operational Setup
Figure 5-1: Using LaunchPad to install WAS Version 5
Figure 5-2: WebSphere Application Server admin console login
Figure 5-3: IBM HTTP Server Welcome Page
Figure 5-4: Using the hello servlet to verify the Web Server Plugin functionality
Figure 5-5: DB2 UDB z/OS - DB2 Connect EE - DB2 Client Connectivity
Figure 5-6: Creating JDBC Providers in WAS Administrative Console
Figure 5-7: Choosing the Type of DB2 JDBC Providers
Figure 5-8: Setting Properties for DB2 Universal JDBC Providers
Figure 5-9: Saving the changes
Figure 5-10: Managing WebSphere variables
Figure 5-11: Creating J2C Authentication Data Entry for the Data Source Connection
Figure 5-12: Creating New DB2 Data Source
Figure 5-13: Modify the Additional Properties for the New Data Source
Figure 5-14: Specifying Custom Properties for the New Data Source
Figure 5-15: Test Connection to the Data Source
Figure 5-16: Successful Connection Testing to the Data Source
Figure 5-17: Using AAT to application archive properties
Figure 5-18: Provide the EAR Path for Application Installation
Figure 5-19: Application Installation Summary Page
Figure 5-20: DB2 EJB Sample Application home page
Chapter 6: WebSphere Application Server V5 Performance Tuning
Figure 6-1: Performance monitoring components
Figure 6-2: Example performance group hierarch
Figure 6-3: Statistic data types
Figure 6-4: Show multiple counts from different resource categories
Figure 6-5: PMI request metrics configuration panel
Figure 6-6: WebSphere queuing network
Figure 6-7: WebSphere request queuing
Figure 6-8: Throughput curve
Figure 6-9: Web container queue settings
Figure 6-10: ORB thread pool size
Figure 6-11: EJB cache settings
Figure 6-12: TPV datasource monitoring
Figure 6-13: TPV Advisor output
Chapter 7: Monitoring and Tuning of DB2 UDB V8
Figure 7-1: Status of monitor switches for snapshot monitoring
Figure 7-2: Event monitors from within Control Center
Figure 7-3: Visual explain
Figure 7-4: Configuration Advisor
Figure 7-5: Normalization and denormalization
Figure 7-6: Table spaces
Figure 7-7: Steps of the SQL compiler
Chapter 8: DB2 UDB V8 and WAS V5 Integrated Performance
Figure 8-1: JDBC statements
Figure 8-2: PreparedStatement cache— An example
Figure 8-3: TPV statement cache discard field counter
Figure 8-4: Monitor WebSphere application from DB2 for zOS
Figure 8-5: Set client application properties
Figure 8-6: Output of DISPLAY THREAD using the feature
Figure 8-7: TVP monitors connection pooling
Figure 8-8: Using TPV tuning statement cache
Figure 8-9: Persistent session options
Figure 8-10: Session database settings
Figure 8-11: Session management tuning levels
Figure 8-12: Session management tuning parameters
Chapter 9: Integrated Troubleshooting
Figure 9-1: Problem determination methodology
Figure 9-2: Logging and tracing configuration in WAS Administrative Console
Figure 9-3: Creating New J2C Authentication Data for AccessEmployee
Figure 9-4: perfmon settings for Memory Overview
Figure 9-5: prefmon settings for Memory Overview
Figure 9-6: prefmon green signal
Figure 9-7: Task Manager settings
Figure 9-8: Memory usage
Figure 9-9: I/O activity for concurrency scenario
Figure 9-10: CPU consumption for concurrency scenario
Figure 9-11: High response time
Figure 9-12: CLP showing UOW waiting
Figure 9-13: Lock Escalation Event log
Figure 9-14: Disk I/O contention
Figure 9-15: CPU analysis for high CPU consumption scenario
Figure 9-16: Tivoli Performance Viewer for High CPU consumption scenario output
Figure 9-17: Webcontainer thread pool settings
Figure 9-18: Thread pool settings of Web Container
Appendix A: Trade3 Application
Figure A-1: Home page of Trade3
Figure A-2: Populate the database
Figure A-3: Reorganize the data
Figure A-4: Go Trade
< Day Day Up >
Previous page
Table of content
Next page
DB2 UDB V8 and WebSphere V5. Performance Tuning and Operations Guide2004
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 90
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Phase: Adapt
Practice: Product Vision Box and Elevator Test Statement
Practice: Product Feature List
Practice: Daily Team Integration Meetings
Structure and Tools
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 4.5 How to use OpenSSH Passphrase Agents
Step 4.6 How to use PuTTY Passphrase Agents
Step 5.2 Troubleshooting Common OpenSSH Errors/Problems
Conclusion
Appendix - Sample sshd_config File
Strategies for Information Technology Governance
Linking the IT Balanced Scorecard to the Business Objectives at a Major Canadian Financial Group
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
The Evolution of IT Governance at NB Power
Governance Structures for IT in the Health Care Industry
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 36. Estimate Network Performance
Hacks 6382: Introduction
Hack 70. Pebble
Hack 87. Primestar Dish with Waveguide Feed
Hack 96. Establish Line of Sight
Ruby Cookbook (Cookbooks (OReilly))
Checking Whether Daylight Saving Time Is in Effect
Hashes
Pretending a String Is a File
Writing a Method That Accepts a Block
Automatically Generating Documentation
802.11 Wireless Networks: The Definitive Guide, Second Edition
11 Framing in Detail
General Structure of an 802.11 Interface
Using 802.11 Access Points
Topology Examples
Choosing Your Logical Architecture
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies