You are previewing JES3 to JES2 Migration Considerations.
O'Reilly logo
JES3 to JES2 Migration Considerations

Book Description

This book deals with the migration from JES3 to JES2. Part One describes this decision. Part Two describes the steps and considerations of this migration.

This IBM® Redbooks® publication provides information to help clients that have JES3 and would like to migrate to JES2. It provides a comprehensive list of the differences between the two job entry subsystems and provides information to help you determine the migration effort and actions.

The book is aimed at operations personnel, system programmers, and application developers.

Table of Contents

  1. Front cover
  2. Notices
    1. Trademarks
  3. IBM Redbooks promotions
  4. Preface
    1. Authors
    2. Now you can become a published author, too!
    3. Comments welcome
    4. Stay connected to IBM Redbooks
  5. Part 1 The decision to migrate from JES3 to JES2
    1. Positioning for migration
    2. Information provided in this book
  6. Chapter 1. How JES2 works
    1. 1.1 What is a job entry subsystem (JES)?
    2. 1.2 JES2 overview
      1. 1.2.1 JES2 environment
      2. 1.2.2 JES2 PROC JCL
      3. 1.2.3 MAS members
      4. 1.2.4 SPOOL
      5. 1.2.5 Checkpoint data set
      6. 1.2.6 Functional subsystem interface (FSI)
      7. 1.2.7 Remote job entry (RJE)
      8. 1.2.8 Network job entry (NJE)
      9. 1.2.9 JESXCF
      10. 1.2.10 JES2 initialization deck
      11. 1.2.11 JES2 monitor
    3. 1.3 JES2 internal components
      1. 1.3.1 Processor control element (PCE)
      2. 1.3.2 Daughter task element (DTE)
      3. 1.3.3 Device control table (DCT)
      4. 1.3.4 HASP communication tables (HCT and HCCT)
      5. 1.3.5 Checkpointed data areas
    4. 1.4 JES2 start types
    5. 1.5 Activation levels
    6. 1.6 JES2 job processing
      1. 1.6.1 Pre-execution job phases
      2. 1.6.2 Post-execution job phases
  7. Chapter 2. Terminology differences
    1. 2.1 JES3 terminology
    2. 2.2 Different use of terms
      1. 2.2.1 Non-specific JES2 and JES3 references
      2. 2.2.2 Collections of JESes
      3. 2.2.3 JES startup processing
      4. 2.2.4 JES parameter statements
      5. 2.2.5 SYSOUT processors
      6. 2.2.6 Remote workstations
      7. 2.2.7 JES threads
      8. 2.2.8 Multiple JES2 images
      9. 2.2.9 JES initialization statements
  8. Chapter 3. Differences between JES2 and JES3 are becoming smaller
    1. 3.1 JES3 functions
      1. 3.1.1 Dependent Job Control (DJC)
      2. 3.1.2 Deadline scheduling
      3. 3.1.3 Priority aging
      4. 3.1.4 HSM early recall
      5. 3.1.5 Main Device Scheduling (MDS)
      6. 3.1.6 JES3 device control and device fencing
      7. 3.1.7 Inish deck checker
      8. 3.1.8 JES3 Monitoring Facility
      9. 3.1.9 Disk reader
    2. 3.2 JES3 features
      1. 3.2.1 Data Set Name disposition conflict resolution
      2. 3.2.2 Job class groups
      3. 3.2.3 Single point of control
      4. 3.2.4 Printer naming conventions usage
    3. 3.3 On-the-surface convergence
      1. 3.3.1 JES3 role in today’s zWorld
      2. 3.3.2 Job correlator
      3. 3.3.3 MVS resource serialization: JCL examples
      4. 3.3.4 JES2 symbols for instream data
      5. 3.3.5 New PARMDD EXEC keyword
      6. 3.3.6 JES new functions in z/OS V2R1
    4. 3.4 Checklist
  9. Chapter 4. JECL and JCL differences
    1. 4.1 JCL processing
      1. 4.1.1 SYSOUT HOLD processing
      2. 4.1.2 Scanning jobs for JCL errors
      3. 4.1.3 OUTPUT statement parameters
      4. 4.1.4 Command statements
    2. 4.2 JECL statements
      1. 4.2.1 PROCESS and DATASET JECL
      2. 4.2.2 FORMAT JECL
      3. 4.2.3 MAIN JECL
      4. 4.2.4 NET JECL
      5. 4.2.5 NETACCT JECL
      6. 4.2.6 OPERATOR JECL
      7. 4.2.7 PAUSE JECL
      8. 4.2.8 ROUTE XEQ JECL
    3. 4.3 Other JCL considerations
      1. 4.3.1 Allocation differences
      2. 4.3.2 JCL standards
      3. 4.3.3 Retaining tapes
    4. 4.4 JES2 options
    5. 4.5 Identifying jobs that require changes
    6. 4.6 Reference information
  10. Chapter 5. Migration considerations
    1. 5.1 Making an informed decision
    2. 5.2 Discovery analysis process
      1. 5.2.1 Identifying JCL and JECL changes
      2. 5.2.2 Activating the exit
      3. 5.2.3 Understanding the output
      4. 5.2.4 JES JECL cards
      5. 5.2.5 Other components for discovery analysis
      6. 5.2.6 The use of a Parallel Sysplex
    3. 5.3 Building a business case
  11. Part 2 Details of the migration
  12. Chapter 6. Planning for a JES3 to JES2 migration
    1. 6.1 Planning
      1. 6.1.1 Positioning moves
    2. 6.2 Choosing a target system
      1. 6.2.1 Storage management
      2. 6.2.2 Education
      3. 6.2.3 Vendor management
    3. 6.3 Migration process
      1. 6.3.1 JES2 setup
    4. 6.4 Functional testing
    5. 6.5 System and integration testing
    6. 6.6 Implementation
  13. Chapter 7. JES procs and initialization decks
    1. 7.1 Introduction
    2. 7.2 Types of start
    3. 7.3 Initialization statements
      1. 7.3.1 Dynamic changes
      2. 7.3.2 Verifying the JES initialization deck
    4. 7.4 JES procedures
      1. 7.4.1 The JES3 procedure
      2. 7.4.2 Typical JES2 procedure
      3. 7.4.3 Other procedures
    5. 7.5 Automation considerations
  14. Chapter 8. User exits
    1. 8.1 JES3 user exits
    2. 8.2 Source code changes (usermods)
  15. Chapter 9. Operational considerations
    1. 9.1 Operational differences
    2. 9.2 Single System Interface
    3. 9.3 Operator commands
      1. 9.3.1 Commands
      2. 9.3.2 Command filtering
      3. 9.3.3 Syntax checking of JES commands
    4. 9.4 Consoles and DLOG
      1. 9.4.1 Automation considerations
    5. 9.5 System Display and Search Facility
      1. 9.5.1 Starting writers on printers
    6. 9.6 Starting JES
      1. 9.6.1 In a JES3 environment
      2. 9.6.2 In a JES2 environment
      3. 9.6.3 JES2 Checkpoint Reconfiguration Dialog
      4. 9.6.4 Starting NJE lines and nodes
    7. 9.7 Shutdown considerations
    8. 9.8 Dynamic changes
    9. 9.9 DFSMSdfp ACS routines &SYSNAME and &SYSPLEX
    10. 9.10 DFSMShsm
      1. 9.10.1 Difference for non-SMS managed volumes and data sets
      2. 9.10.2 Difference for SMS-managed volumes and data sets
    11. 9.11 Miscellaneous other differences
      1. 9.11.1 Duplicate job names and multiple system signons
      2. 9.11.2 Display of job numbers and job IDs
      3. 9.11.3 System symbols
      4. 9.11.4 MVS checkpoint/restart
      5. 9.11.5 Network Resource Monitor
      6. 9.11.6 Printer naming restrictions
  16. Chapter 10. Related products
    1. 10.1 JES-neutral interface
    2. 10.2 Products that interact with JES
    3. 10.3 Print output and archive products
    4. 10.4 Batch schedulers
    5. 10.5 JES-managed printers
    6. 10.6 NJE and RJP devices
    7. 10.7 JCL generators
    8. 10.8 JES operator, users, and administrator tools
    9. 10.9 SMF analysis
    10. 10.10 Users of JES exits
    11. 10.11 JCL checkers
    12. 10.12 Application software control
    13. 10.13 Other products
    14. 10.14 Automation
    15. 10.15 Home-grown ISPF-based tools
    16. 10.16 Migration tools
      1. 10.16.1 Migration assistance products
  17. Chapter 11. Security considerations
    1. 11.1 Security considerations
      1. 11.1.1 JES Started Task
      2. 11.1.2 JES data sets
    2. 11.2 Initialization parameters that affect security
    3. 11.3 JES-related SAF classes
      1. 11.3.1 JES3 consoles
      2. 11.3.2 FACILITY class
      3. 11.3.3 DEVICES class
      4. 11.3.4 NODES class
      5. 11.3.5 WRITER class
      6. 11.3.6 JESINPUT class
      7. 11.3.7 JESSPOOL class
      8. 11.3.8 JES SPOOL data sets
      9. 11.3.9 OPERCMDS class
  18. Chapter 12. Workload Manager considerations
    1. 12.1 JES2 address spaces
    2. 12.2 WLM-managed initiators
    3. 12.3 WLM scheduling environments
    4. 12.4 WLM classification rules
      1. 12.4.1 Defining z/OS WLM classification rules for performance policies
  19. Chapter 13. Performance and throughput considerations
    1. 13.1 Performance of JES2 compared to JES3
      1. 13.1.1 Steady state processing
    2. 13.2 Throughput considerations
      1. 13.2.1 MAS considerations
      2. 13.2.2 Setting limits and counts
      3. 13.2.3 Configuring work queues
  20. Chapter 14. Output processing
    1. 14.1 Held on spool for TSO
    2. 14.2 Processed by an external writer
      1. 14.2.1 IBM supplied external writer
      2. 14.2.2 Vendor-supplied external writers
    3. 14.3 Local printing
      1. 14.3.1 Printer naming conventions
      2. 14.3.2 Advanced Function Printers (Infoprint)
      3. 14.3.3 JES printers
    4. 14.4 Remote printing
      1. 14.4.1 BSC remote workstations
      2. 14.4.2 SNA remote workstations
    5. 14.5 Archiving output
      1. 14.5.1 JES3 dump job (DJ)
      2. 14.5.2 JES2 OFFLOAD
      3. 14.5.3 Limitation between JES3 dump job and JES2 spool offload
    6. 14.6 Spin processing
    7. 14.7 Printer processing
    8. 14.8 SYSOUT class redirection
  21. Chapter 15. NJE considerations
    1. 15.1 Networking protocols
    2. 15.2 Product considerations
    3. 15.3 Operating system considerations
    4. 15.4 Pathing differences
    5. 15.5 JES2 subnets
    6. 15.6 Performance considerations
    7. 15.7 Initialization statement comparison
    8. 15.8 NJE examples
      1. 15.8.1 JES3 example
      2. 15.8.2 JES2 example
    9. 15.9 NJE exits
    10. 15.10 Security considerations
    11. 15.11 SMF considerations
    12. 15.12 Entering commands from a remote node
    13. 15.13 NJE incompatibilities
      1. 15.13.1 JES3 NJE functions not supported in JES2
      2. 15.13.2 Unnecessary JES3 NJE parameters
      3. 15.13.3 Additional JES2 NJE parameters
      4. 15.13.4 BDT parameters
    14. 15.14 Using networking with TCP/IP
    15. 15.15 JES3 TCP/IP networking
      1. 15.15.1 The NETSERV address space
      2. 15.15.2 Defining TCP/IP NJE definitions with commands
      3. 15.15.3 NJE security enhancements
      4. 15.15.4 JES3 commands to start TCP/IP NJE
    16. 15.16 JES2 supported protocol for TCP/IP networking
      1. 15.16.1 Secure sign-on protocol
      2. 15.16.2 TCP/IP NJE address space
      3. 15.16.3 JES2 NODE definitions
    17. 15.17 Migration considerations
      1. 15.17.1 Single event
      2. 15.17.2 New JESplex
  22. Chapter 16. Accounting and chargeback considerations
    1. 16.1 Overview of resource usage accounting within IT
    2. 16.2 Chargeback overview
    3. 16.3 SMF record types
      1. 16.3.1 SMF type 6: External writer
      2. 16.3.2 SMF type 24: JES2 spool offload
      3. 16.3.3 SMF type 25: JES3 device allocation
      4. 16.3.4 SMF type 26: job purge
      5. 16.3.5 SMF type 30: common address space work
      6. 16.3.6 SMF type 43: JES start
      7. 16.3.7 SMF type 45: stop
      8. 16.3.8 SMF type 59: MVS/BDT
    4. 16.4 Job accounting information
      1. 16.4.1 Scanning the JOB statement accounting field
    5. 16.5 Processing differences
  23. Chapter 17. Availability considerations
    1. 17.1 Standard practices for availability
    2. 17.2 Tailoring JES for best availability
      1. 17.2.1 JES3 global-local communication
      2. 17.2.2 JES3 spool partitions
      3. 17.2.3 JES3 spool volume recovery
      4. 17.2.4 JES3 system select phase
      5. 17.2.5 JES2 checkpoint data set
      6. 17.2.6 Coupling facility structure duplexing
      7. 17.2.7 JES2 SPOOL partitioning
      8. 17.2.8 JES2 SPOOL affinity
    3. 17.3 Updating the configuration
      1. 17.3.1 In a JES3 environment
      2. 17.3.2 In a JES2 environment
      3. 17.3.3 Secondary JES
    4. 17.4 Unplanned outage
      1. 17.4.1 JES3 unplanned outages
      2. 17.4.2 JES2 unplanned outage
      3. 17.4.3 JES2 abend
      4. 17.4.4 JES2 checkpoint data set errors
  24. Appendix A. Sample JES3 exit to analyze JECL usage
    1. Sample JES3 user exit 33
  25. Appendix B. Comparison of JES3 and JES2 commands
    1. List of commonly used JES3 and JES2 commands
  26. Related publications
    1. IBM Redbooks
    2. Other publications
    3. Online resources
    4. Help from IBM
  27. Back cover
  28. IBM System x Reference Architecture for Hadoop: IBM InfoSphere BigInsights Reference Architecture
    1. Introduction
    2. Business problem and business value
    3. Reference architecture use
    4. Requirements
    5. InfoSphere BigInsights predefined configuration
    6. InfoSphere BigInsights HBase predefined configuration
    7. Deployment considerations
    8. Customizing the predefined configurations
    9. Predefined configuration bill of materials
    10. References
    11. The team who wrote this paper
    12. Now you can become a published author, too!
    13. Stay connected to IBM Redbooks
  29. Notices
    1. Trademarks