114 Communications Server for z/OS V1R7 TCP/IP Implementation, Volume 1 - Base Functions, Connectivity, and Routing
Based on these considerations, we are going to show what we consider to be the
best-practice scenarios to build up a z/OS Communications Server TCP/IP configuration
scenario, using OSA-Express (QDIO), HiperSockets (iQDIO), and dynamic XCF.
This section focuses on the interface implementation only, which means establishing Layer 2
and a subset of Layer 3 (IP addressing) connectivity. For connectivity beyond the immediate
LAN environment, also refer to Chapter 5, “Routing” on page 139, for IP routing details.
To build our test scenario, we used the system environment shown in Figure 4-7 on page 115.
Note that we are defining our LPARs as end-points.
Recommendation: Although there are specialized cases where multiple stacks per LPAR
can provide value, we in general recommend implementing only one TCP/IP stack per
LPAR. The reasons for this recommendation are as follows:
A TCP/IP stack is capable of exploiting all available resources defined to the LPAR in
which it is running. Therefore, starting multiple stacks will not yield any increase in
throughput.
When running multiple TCP/IP stacks, additional system resources, such as memory,
CPU cycles, and storage, are required.
Multiple TCP/IP stacks add a significant level of complexity to TCP/IP system
administration tasks.
It is not necessary to start multiple stacks to support multiple instances of an application
on a given port number, such as a test HTTP server on port 80 and a production HTTP
server also on port 80. This type of support can instead be implemented using
BIND-specific support where the two HTTP server instances are each associated to
port 80 with their own IP address, via the BIND option on the PORT reservation
statement.
One example where multiple stacks can have value is when an LPAR needs to be
connected to multiple isolated security zones in such a way that there is no network level
connectivity between the security zones. In this case, a TCP/IP stack per security zone can
be used to provide that level of isolation, without any network connectivity between the
stacks.