Technology Driven IT Training Longstanding IT Technologists Computer Education Techniques
Distance-learning - Db2: System Performance

Home

distance-learning center

Distance-learning Distance-learning_Building

Professional Distance-learning

IT Training Services


MFRDB11

Db2: System Performance
DURATION: 2 days

FEE: $1,190

PRIVATE GROUP FEE: $
Based upon a class size of six students.

Scheduling can be adjusted to employee work hours and incorporate client assignments.

SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.

AUDIENCE:

  • Database Administrator
  • System Analyst
  • System Programmer
  • IT Professional
 
   

DATES:

CONTENT AND OBJECTIVES:
    1. Monitoring Tools
      • Use the monitoring tools to perform a variety of tasks.
      • Utilize the available tools and perform a scenario analysis.
    2. Processing of Db2 Transaction / Queries
      • Recognize the issues and concerns associated with the processing of Db2 transactions and queries.
      • Given a group of queries, analyze and determine the issues relating to performance.
    3. Thread Allocation and Workload Control
      • WLM: Workload Manager is the priority and resource manager for z/OS and implicitly for Db2.
      • How WLM manages CPU, I/O, and memory resources as required by the workload.
      • How WLM is used to manage Db2 workflow and review the Db2 distributed and Db2 stored procedure workload.
    4. Buffer Pools and I/O
      • Determine the memory and I/O processing usage.
      • Given the system report of memory usage, identify the issues which relate to processing performance.
    5. Locking and Concurrency
      • Monitor the locks on applications.
      • Monitor and determine what locks are used at the beginning, middle, and end of an application.
    6. Other Design Considerations
      • How the design process addresses the origins and data available for analyzing, tuning, and tracking the performance of the Db2 system and applications.
      • Recognize the inter-dependencies and relationships between the various data elements.
      • Appreciate the effect of design decisions on the CPU component of the three major Db2 system address spaces.
    7. Monitoring Strategy
      • Determine an appropriate monitoring strategy.
      • The instructor will present two strategies; determine the preferred approach.
      • What are the reasons for it being the preferred strategy.
    8. Problem Investigation
      • Perform an investigation of Db2 performance issues; begin by examining the database design.
      • Given a physical design of a system, identify expected issues and fixes.
    9. Single Table Access Paths
      • Determine optimal performance for single table processing.
      • Review SQL statements and determine whether there are underlying performance issues which need to be addressed.
      • If there are issues to be addressed, determine the appropriate fixes.
    10. EXPLAIN for Analyzing Access Paths
      • Use the EXPLAIN statement.
      • Given multiple tables and queries, process queries using the EXPLAIN statement.
      • How to identify and fix issues.
    11. Multiple Table Access
      • Acquire expertise in using the EXPLAIN statement with complex SQL.
      • Given several table and queries, process queries through the EXPLAIN statement.
      • Learn to identify and fix issues.
    12. Transaction Locking
      • Determine the current locks.
      • List the locks, the locks extent, and who has issued the locks.
    13. Optimizer Topics
      • Use the Accounting Trace to monitor applications.
      • Use the Db2 Instrumentation Facility for analyzing elapsed-time components and monitoring SQL and locking.

    Virtual Classroom   Blended Learning    

Synchronous
Instruction
Asynchronous
Instruction

Effective February 27, 2012, the course dates listed on the CETi schedules only will be available based upon approved and authorized user ID.

Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. CETi makes no representation regarding ownership in any of the software products that we train on.

CETi courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the CETi course and that the employer has a licensed version of the software.

Certain courses only should be taught by the source software company training company and open source purveyor.