[an error occurred while processing this directive]
HP OpenVMS Systems Documentation |
HP TCP/IP Services for OpenVMSRelease Notes
March 2010
This document describes the new features and changes introduced with Version 5.7 of the HP TCP/IP Services for OpenVMS software product.
Revision/Update Information: This is an updated document. Software Version: HP TCP/IP Services for OpenVMS Version 5.7 Operating Systems: OpenVMS Version 8.4 for Integrity servers OpenVMS Alpha Version 8.4
Palo Alto, California
© Copyright 2010 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Intel and Itanium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. UNIX is a registered trademark of The Open Group. The HP TCP/IP Services for OpenVMS documentation is available on CD-ROM.
PrefaceThe HP TCP/IP Services for OpenVMS product is the HP implementation of the TCP/IP protocol suite and Internet services for OpenVMS Alpha and OpenVMS Integrity server systems. This document describes the latest release of the HP TCP/IP Services for OpenVMS product. TCP/IP Services provides a comprehensive suite of functions and applications that support industry-standard protocols for heterogeneous network communications and resource sharing. For installation instructions, see the HP TCP/IP Services for OpenVMS Installation and Configuration manual. The release notes provide version-specific information that supersedes the information in the documentation set. The features, restrictions, and corrections in this version of the software are described in the release notes. Always read the release notes before installing the software. Intended AudienceThese release notes are intended for experienced OpenVMS and UNIX® system managers and assume a working knowledge of OpenVMS system management, TCP/IP networking, TCP/IP terminology, and some familiarity with the TCP/IP Services product. Document StructureThese release notes are organized into the following chapters:
Related DocumentsTable 1 lists the documents available with this version of TCP/IP Services.
For additional information about HP OpenVMS products and services, see:
For a comprehensive overview of the TCP/IP protocol suite, refer to the book Internetworking with TCP/IP: Principles, Protocols, and Architecture, by Douglas Comer. Reader's CommentsHP welcomes your comments on this manual. Please send comments to openvmsdoc@hp.com. How to Order Additional DocumentationFor information about how to order additional documentation, see:
ConventionsIn the product documentation, the name TCP/IP Services means any of the following:
In addition, please note that all IP addresses are fictitious. The following conventions are used in the documentation.
Chapter 1
|
TCP/IP Services Version 5.7 is supported on OpenVMS Alpha and OpenVMS for Integrity servers systems only. On VAX systems, use TCP/IP Services Version 5.3. To use TCP/IP Services Version 5.7, you must upgrade to OpenVMS Version 8.4 or higher. |
For information about installing and configuring TCP/IP Services, see the
HP TCP/IP Services for OpenVMS Installation and Configuration guide.
1.1 New features
Table 1-1 lists the new features of TCP/IP Services Version 5.7 and the sections that describe them.
Feature | Section | Description |
---|---|---|
Packet Processing Engine | 1.1.1 | This release includes Packet Processing Engine, a CPU for processing TCP/IP that increases the performance efficiency. |
FTP Anonymous Light | 1.1.2 | This release includes FTP Anonymous Light, used for restricting user access for a particular set of directories. |
1.1.1 Packet Processing Engine
TCP/IP Packet Processing Engine (PPE) is modeled on the OpenVMS
Dedicated Lock Manager. If you are familiar with Dedicated Lock
Manager, you will only need to learn the different methods used to
manage TCP/IP PPE.
TCP/IP runs on a single CPU, which is normally shared with other processes. However, some system loads result in near saturation of the TCP/IP CPU and causes TCP/IP to become a system-wide bottleneck. By dedicating a CPU for processing TCP/IP, a significant performance efficiency can be achieved, but, at the cost of dedicating a CPU for TCP/IP.
Since TCP/IP PPE is recommended only in environments where the TCP/IP CPU is near saturation, dedicating a CPU to TCP/IP is a mere formality; except with significant payback. |
Also, note that TCP/IP PPE can be dynamically enabled and disabled.
System administrator can dynamically change the state of the TCP/IP PPE
to suit the required load.
1.1.1.1 Configuring PPE
This section describes the hardware and software configuration required to configure PPE.
Hardware configuration
TCP/IP PPE will run only on systems with more than one active CPU. If TCP/IP PPE was running and the configuration changes such that there is only one active CPU remaining, the TCP/IP PPE becomes dormant.
Because, TCP/IP PPE dedicates an entire CPU for processing TCP/IP, it is recommended that TCP/IP must be enabled only on systems with a large number of CPUs, and only if the current TCP/IP CPU is nearing saturation.
Software configuration
For optimum performance, a CPU must be dedicated to PPE.
Normally, the TCP/IP BG0: driver shares the CPU with other fastpath drivers and processes. However, to achieve the best results with TCP/IP PPE, it is necessary to configure BG0: to be the only driver using the nominated CPU; all other fastpath drivers must be moved to other CPUs.
If TCP/IP PPE is running and other drivers are associated with the same CPU as BG0:, it results in suboptimal performance for both drivers.
Sample configuration
$ SHOW FASTPATH |
$ SET DEVICE PEA0 /PREF=5 ! move PEA0 to CPU 5. |
$ SET DEVICE BG0/PREF=3 |
$ SHOW FASTPATH/CPU=3 |
TCP/IP PPE is managed using the SYSCONFIG subsystem. To manage the TCP/IP PPE, complete the following steps:
Dynamically enable or disable PPE
$ @SYS$MANAGER:TCPIP$DEFINE_COMMANDS |
$ SYSCONFIG -q INET PPE_ENABLE |
$ SYSCONFIG -r INET PPE_ENABLE=1 |
Although, the "ppe_enable" attribute may indicate that TCP/IP PPE is enabled, you must also verify that PPE is running. As described in Section 1.1.1, PPE does not run if the number of active CPUs drops to 1. To verify that TCP/IP PPE is running, execute the following:
An output similar to the following is displayed:
The priority of this process is set to 63. This ensures that TCP/IP PPE is not rescheduled and no other process will use CPU 3. |
$ MONITOR MODES/CPU=3 ! it will be 100% in Kernel Mode |
$ SYSCONFIG -r INET PPE_ENABLE=0 |
Enabling TCP/IP PPE at system startup
To enable TCP/IP PPE after TCP/IP has started, use one of the following methods:
inet: ppe_enable=1 # Enable TCP/IP PPE |
$ @SYS$MANAGER:TCPIP$DEFINE_COMMANDS $ SYSCONFIG -r INET PPE_ENABLE=1 ! Enable TCP/IP PPE |
This section describes how to monitor PPE.
When PPE is disabled, the performance of the TCP/IP CPU can be monitored with following command:
$ MONITOR MODES/CPU=xx ! where xx is the TCP/IP CPU Id |
When PPE is enabled, the TCP/IP CPU runs 100% in the kernel mode, because the CPU is dedicated entirely to TCP/IP. Hence, the monitor command is not useful when PPE is running.
This section describes how to collect statistics when PPE is running. Also note that this method provides a much finer granularity and can also be used when PPE is disabled. This approach also helps you compare performance when PPE is enabled or disabled.
To gather statistics, enable profiling by executing the following:
$SYSCONFIG -r INET PROFILING=1 |
Note that with profiling enabled, there is a small processing overhead to collect the statistics. It is recommended to enable profiling only while gathering statistics. With profiling enabled, the statistics can be gathered using the TCPMON command as follows:
$ SET COMMAND TCPIP$EXAMPLES:TCPIP$TCP_MON $ TCPMON/SHOW=INET |
For more information on how to use the TCPMON command, see the help by executing the following:
$ HELP/LIBRARY=TCPIP$EXAMPLES:TCPIP$TCP_MON TCPMON |
You can also use the Performance Data Collector (TDC) to monitor PPE. TDC can automatically gather the PPE statistics. For more information about TDC, visit the Web site at:
http://h71000.www7.hp.com/openvms/products/tdc/index.html |
Next | Contents |