Hi,any one know ,in DRDA enviroment DB27.1 running in ZOS/E,I find when
apllication program access DB2 through DB2connect ,in mainframe two address
space TCPIP and DIST CPU usage were very high ,and DBM1 or MSTR address are
low,one sample maybe 15%(tcpip),10%( DIST),1%(DBM1), we are 100% DRDA
envirnoment,I don't know is it normally?
Do anyone has experience on this area?Hope can help me,thanks
--
Message posted via http://www.dbmonster.com 1 2727
Tony,
I don't know if I fully understand your question. So forgive me if
this isn't about what you asked.
When I upgraded from DB2 Connect V7 to V8 our DIST cpu went through the
roof. I opened an ETR with IBM. We found that our passwords were
being encrypted and the de-encryption is very expensive. The reason
our passwords were being encrypted was because of what I consider a bug
in the DB2 client.
I had my DB2 clients cataloged with the setting "Use authentication
value in server's DBM Configuration". On my DB2 Connect Server, I had
Authentication set to SERVER. Thus, my clients should be getting the
equivalent of "Server authentication" . However, once your DB2 Connect
Server is becomes V8, you must actually set your clients to "Server
authentication (SERVER)", or else you will actually get SERVER-ENCRYPT.
Hope this helps,
Craig Wahlmeier This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: Bob Harrison |
last post by:
I will be distributing an application that works with our
security panel. The application can be loaded on several
workstations in a network but only one workstation
actually communicates via serial port or tcpip with the
security panel. I modified the client chat sample that
you have in your .net tcpip samples so that I can send
info back and forth between the main (polling)
workstation and any other workstations. The info is not
keyed...
|
by: Steevo |
last post by:
Any suggestions as to the best programs for cloaking email addresses?
Many thanks
--
Steevo
|
by: TulasiKumar |
last post by:
hi all,
My requirment is i want to listen one perticular TCPIP port for one
IPAddress,Wheneverver the data in coming to this port that data i will be
save one text file..For example:www.msdn.microsoft.com is fixed with some
TCPIP port.Whene ever data is coming in to the TCPIP that data i will be
saved one text file.I have done the code regrading my requirement.Whenever i
have started my listner class it was giving one exception ,the...
|
by: joe.weinstein |
last post by:
Hi, and thanks in advance. I am reading documentation for
a JDBC driver which uses DRDA to talk to DB2, but seems
to imply that some DB2 installations/configurations might
make DRDA access optional.
Joe Weinstein at BEA Systems
|
by: Laurence |
last post by:
Hi all,
Does connection concentroator only support in DRDA environment?
Thanks in advance,
Laurence
| |
by: Ark Khasin |
last post by:
Unit testing is an integral component of both "formal" and "agile"
models of development. Alas, it involves a significant amount of tedious
labor.
There are test automation tools out there but from what limited exposure
I've had, they are pricey, reasonably buggy, and require compiler/target
adaptation.
Out of my frustration with two out of two of them came my own. Its
instrumentation approach is based solely on profound abuse of the C
|
by: Okonita |
last post by:
Hi all,
I have gone through the process of installing DB2 UDBv9 Express-C in
my local linux environment. I am used to having icon placed on my
Desktop or taskbar for easy access to (db2cc) Control Center. After
installation, how then can I get access to DB2? How can I place a
desktop icon in linux for easy access to DB2?
Also, I will like to know how I can make DB2 control center in my
windows environment detect the recent DB2...
|
by: mirandacascade |
last post by:
Apologies in advance for what I'm guessing may be a trivial question.
Assume the following:
1) multi-user environment
2) standard (i.e. not a class module) module with:
Public strSample as String
3) first user user opens app at 9:00 and runs code that results in
setting the variable strSample to "abc"
|
by: =?Utf-8?B?U2hhdW5P?= |
last post by:
I have a TCPIP socket providing data to my app.
My app works on messages (not textual) with a predefined footer (eg 0x01
followed by 0x02)
How should i go about buffering this and retrieving the complete messages ?
Current approach:
I have a byte array of eg 1MB to hold data until full messages are assembled
when socket is readable, i read all data into the buffer starting at the pos
after the last byte of data that was put into it...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
| |
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
| |
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
| |