Advanced Copy Services comprises the following functions and enhancements. Mirror functions provide a consistent point-in-time copy of data at the recovery. The purpose of this publication is to help you understand and use IBM Advanced; Copy Services functions. It describes three dynamic copy. Abstract for DFSMS Advanced Copy Services. This information supports z/OS® ( ZOS) and contains information about Data Facility Storage Management.

Author: Jutaur Goktilar
Country: Bhutan
Language: English (Spanish)
Genre: Relationship
Published (Last): 6 July 2014
Pages: 480
PDF File Size: 13.59 Mb
ePub File Size: 9.4 Mb
ISBN: 248-6-14214-361-6
Downloads: 51886
Price: Free* [*Free Regsitration Required]
Uploader: Febar

All the Metro Mirror volumes have to match all the volumes within the zGM session. In Figure 9, this system, SY1P. Writes to SDM journal data sets on these D volumes.

IBM z/OS DFSMS Advanced Copy Services (SC)

servives He holds a degree in electrical engineering. Linux is a trademark of Linus Torvalds in the United States, other countries, or both. You fdsms send license inquiries, in writing, to: However, this is a drawback for the zGM session, because it does not follow the HyperSwap in an incremental fashion, which shifts its primary volumes automatically from A to B.

All Copy Services functions are handled within the DS firmware. Figure 13 is advancde the same as Figure 10 on page 18; the only difference is the IP-based connectivity between the two GDPS instances that execute in this environment. In our discussion, we leave open as to whether SY10 and SY11 are in the same or in different sites and whether Figure 10 depicts a single or multiple site workload configuration.

The number of D volumes depends on the number of zGM volume pairs and the amount of data that is replicated from A to C because all replicated data is written twice in the remote location: In this context we recommend you configure the implicated disk storage subsystems to be identical as possible in regard to base volumes and alias volumes. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.

  BAILAME EL AGUA LIBRO DESCARGAR PDF

This command starts the actual resynchronization. This information contains examples of data and reports used in daily business operations. The journal or D volumes are used by SDM only.

Servicees the past years, IT service providers, either internal sdrvices external to a company, exploited the capabilities of new developments in disk storage subsystems. During normal operations, no software is dfsmss in driving this configuration.

Consult your local IBM representative for information on the products and services currently available in your area. Documents Flashcards Grammar checker. The HyperSwap function is made possible through the Metro Mirror relationship. However, the failure of volume B disables the HyperSwap function. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. He has written many IBM Redbooks and has developed and taught technical workshops.

In contrast, GDPS provides a controlling supervisor through its controlling LPAR swhich manage not only the result of a device swap operation but also offers complete Parallel Sysplex server management for planned and unplanned events. A first step is most likely the HyperSwap operation itself.

PREFACE About This Book

However, this table is not a complete list of all the relevant points of comparison. IOS then handles and manages all subsequent activities following the swap of all device pairs defined within the TPC-R HyperSwap session, which includes a freeze and failover in the context of Metro Mirror management. A current list of IBM trademarks is available on the Web at http: The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: Because of the way light is reflected, there are two High availability is achieved through HyperSwap between the A and B volumes.

MzGM is a three-site multiple target configuration in a System z environment.

CONTENTS “z/OS V1R DFSMS Advanced Copy Services” IBM Library Server

This three-site mirroring solution is often simply called MzGM. Such trademarks may also be registered or common law trademarks in other countries.

  EL CUARTO REICH PALOMO PDF

In this configuration, the following differences exist between these two management approaches: Later, the session between A and C can be resynchronized through the zGM hardware bitmaps that are maintained in the primary disk subsystem for each zGM suspended volume. In the present discussion, we are still referring to Basic HyperSwap, even when describing the process of incrementally swapping back to the original configuration. This quiescence operation is performed by the user.

In our example in Figure 4 on page 8, the reverse direction is from device to device The full initial copy after a volume A failure is the current drawback of the MzGM three-site configuration.

This action contributes to high availability and even to continuous availability when performing a HyperSwap in a planned fashion for whatever reasons, and there are plenty of reasons. Slide 1 – Western Cape Government. The next step is an SDM internal swap operation to swap its primary volumes from volume A to volume B.

As a result, new zGM session has to be created between B and C. Other company, product, or service names may be trademarks or service marks of others. This situation applies especially to the Global Mirror relationship where the firmware autonomically manages the formation of consistency groups and thus guarantees consistent data volumes at all times at the remote site.

TPC-R does not provide automation procedures that can be activated through certain events. This swap operation leads first to a validation process to determine whether the primary and secondary PPRC Metro Mirror volumes are in a state that guarantees that the actual swap is going to be successful and does not cause any integrity exposure to the data volumes.