Counters And Boundaries - IBM 3708 Description

Network conversion unit
Hide thumbs Also See for 3708:
Table of Contents

Advertisement

values correctly, a user is able to obtain a distribution of network responses for each
logical terminal.
Boundaries
1
2
3
4
Maximum
Value
Counter
Overflow
Counter 1
Counter 2
Counter 3
Counter 4
Counter
Figure 8-1. Counters and Boundaries
There are default values for the time boundaries built into the 3708. The default
values may be overridden from the host using NLDM, Release 2. These changes are
effective until the LV is deactivated, or until new values are defined by the host
program.
Boundaries must be specified in order of increasing magnitude. The maximum
boundary value is 27 minutes, 18.3 seconds. The maximum counter value is 65,535.
The counter does not wrap around when this value is reached. If any of the
boundaries is set to the maximum boundary value, the counter associated with it
becomes the overflow counter. The default values for the boundaries are 1,2,5, and
10 seconds.
The total response time is also kept for each logical terminal. Each time a counter
(including the overflow counter) is incremented, the corresponding transaction time
is added to a total-time register for that device. By dividing this total time by the
total number of transactions, the average response time may be calculated. This
average response time is available only through the host application; it is not
displayable at the control terminal.
Response time is measured from recognition of the inbound AID request in the 3708
until the end of the transaction. When the 3708 is attached via an SNA protocol,
response time is measured on the LV-LV flow only; none is measured for the
SSCP-LV session.
The default value built into the 3708 for the end-of-transaction parameter is "first
character." This value may be overridden from the host using NLDM Release 2.
Changes from the host for a specific LV are effective until the LV is deactivated, or
until a new end-of-transaction parameter is defined by the host program for that
LU.
Chapter 8. Network Management and Problem Determination
8-19

Advertisement

Table of Contents
loading

Table of Contents