At our site we have had lots of "issues" with users using HOD from
various geographic regions loosing sessions to TSO.  When people were
crying that HOD was broken my point of view was HOD was probably
functioning as designed, something might not be right somewhere in the
network topology.  Management finally got our outsourcer to work with
CISCO and some really highly skilled network folks to really look at
what was happening beyond the "I lost my TSO session" sort of problem
reporting.
 
After much investigation we have got most of the issues stabilized.
There were numerous contributing factors like back level router IOS
levels, network hardware that had been up for close to two years without
a reboot, and various network settings that CISCO recommended changing.
Lots of things have been fixed, rebooted, flashed, changed etc.
 
The one area left, in my opinion is some of the MVS TCP/IP settings.  
 
We have the following settings in TCPPROF:  
 
INACTIVE 0       
TIMEMARK 900     
SCANINTERVAL 120 
 
and in SMFPRMxx:
 
JWT(0030)  (This was (0060) until recently)
 
Back when JWT was an hour there seemed to be a clustering of reported
timeout values in end user reports.  The problem was TSO sessions for
people half way around the world that were in use but idle would
reputedly drop after around 15 minutes of no activity, sometimes 30
minutes, or more frequently (in reliably repeatable testing) 45 minutes.

My contention was something in the TIMEMARK-SCANINTERVAL handshaking
with a TN3270 session was getting missed for users in an ISPF edit
session when they were not hitting enter for a long time.
 
Moving a cursor around, typing text etc doesn't do anything to say to
VTAM et al "I'm still active".  Sending an AID like ENTER or a PF key is
needed for all the network layers to see traffic and reset timers like
TIMEMARK, JWT, etc.
 
The end users who were getting blown off TN3270 sessions at about 15
minutes were not be able to get in until the TSO timeout of an hour had
expired.  Navigating all the international calling issues to get to a
help desk to get to an operator to cancel a TSO user id was more than
folks were either willing or able to do.
 
So, my question is, how many sites have a TIMEMARK less than JWT?
Knowing end user work habits there will sometimes be a lot of "think
time" before an AID is sent.  Why time out the TCP/IP session before the
TSO session?
 
Oh, and I did RTFM and RTFA (read the "fine" archives), and I know IBM
recommends TIMEMARK to be many hours but there seem to be issues with
people believing that these values are good to use at our site.  I'm
wanting to know what some of you all do so I can get some traction on
getting things changed.
 
Thanks!
 
Peter Duffy
Operations Support - Mainframe/AS400
                NISSAN NORTH AMERICA 
Information Systems Department 
Gardena, CA, USA
310-771-6472 


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to