VDS miner hardware configuration
1. Technically, VDS uses full virtualization technology to provide a completely independent virtual server environment, which is equivalent to a real physical machine. All kinds of operating systems can run on VDS at the same time. Typical technology platforms include VMware, Hyper-V, etc
VPS is mainly virtualization technology based on software layer, namely operating system level virtualization. It can not use virtual hardware environment, but it needs to make some necessary modifications to guest OS. The typical technology platforms are virtozzo and OpenVZ
in addition, it is worth mentioning that in practice, everyone is used to classify Xen as VPS, but the paravirtualization technology it uses is more similar to VDS in characteristics, so it is also more ambiguous< In terms of resources, once VDS allocates CPU, memory, bandwidth and other resources, it is always for its own use. The hardware resources will be allocated in advance before running, and the allocated resources should not exceed the maximum resources that can be allocated by the physical machine, that is, if the physical machine has 2G memory, it must not allocate 4G. Have swap memory
VPS share CPU, memory, bandwidth and other resources, and each VPS will influence each other. Its resource allocation is not subject to any restrictions, such as the physical machine is 2G memory, you can allocate 4G to virtual, but it doesn't make much sense. There is no swap memory
therefore, from the perspective of resource allocation, VDS is obviously a more stable and reliable choice. VDS is still rare among virtual service providers, while VPS is the most popular and cheaper< In terms of virtual quantity, VDS is more suitable for applications that require high stability and reliability, so it usually only runs about 3-4 VDS on a physical machine. VPS, however, is much more efficient than full virtual because of its low-level overhead, so it can run 20-40 VPS on a physical machine. In theory, V can virtualize hundreds of independent operating systems on a single server, but the result is conceivable and of little significance< In terms of security, VDS will not affect other VDS on the same server when attacked because both hardware resources and system are completely independent. Because the resources of VPS are always shared on the same server, when one VPS is attacked, it will directly affect the operation of all other VPS. In addition, because VPS has no swap memory, once the memory used exceeds the allocated memory, VPS will crash directly; Because VDS has swap memory, it will not crash immediately even if it is seriously exceeded, but the system response will be very slow. In general, both enhance the capability, security and reliability of physical machines< The cost of VPS is lower than that of VDS.
vds.exe process information in the network
process file: vds.exe -
process name: vds.exe
English Description: n / a
process analysis: virtualdiskservice, which provides software volume and hardware volume management services
process location: unknown
program purpose: unknown
Author: Microsoft
belongs to: unknown
security level (0-5): n / a (n / a no danger, 5 most dangerous)
interval Spyware: no
adware: no
virus: no
Trojan horse: no
solution: click here to view the "vds.exe" solution
system process: no
Application: no
background program: no
access: no
access to the Internet: no
Go to the control panel - management tools - services to find the disk management service and start it. If it can't be started, it will start automatically, and then restart the computer
S / 390 system running mode in order to meet the needs of different applications, S / 390 can run in different modes
s / 370 native mode. In this mode, S / 390 can also execute 217 instructions of S / 370, but it can expand the important memory to 64 bits by using the extended real address 26 of S / 370. The increase of the capacity of the central memory means the decrease of the number of page scheling, which improves the performance of the whole system
ESA / 390 mode is operated according to the functions determined by ESA / 390, and its instruction set is expanded to 229 instructions. It uses 32-bit addresses, so the virtual address space is expanded by 2GB, but it is still compatible with 24 bit programs. In the largest s / 390 computer system, a total of 256 channels can be configured. It supports parallel channel, ESCON channel and integrated I / O adapter. In addition, it can automatically process the "channel busy" condition in hardware, which can effectively rece the whole waiting or delay time related to I / O action
ESA / 390lpar mode, all s / 390 series computers can run in this mode. In this mode, the system is physically in a cabinet. But logically, it can be divided into 16 parts at most, which is completed by PR / SM microcode. Each system can have its own channel CPU and memory, and each part can work independently and install a system independently. In this mode, a physical CPU and a physical ESCON channel can be divided into different lpars at the same time. Memory is not OK
couple facility mode, in which the S / 390 host is used as a separate data management host. This mode is to run CFCC microcode, and there is no application running in CFCC. It is mainly applied in parallel coupling system
the operating system of S / 390 can run multiple operating systems at the same time on S / 390, and each operating system has its own application environment
MVs / esamvs / ESA operating system is a powerful and reliable operating system running on S / 390. It is actually a descendant of the OS / 360 operating system that IBM ran on its S / 360 in 1964. In 1972, IBM introced a new operating system OS / VS2, that is, single virtual memory system. Its main feature is to provide support for virtual storage. In 1988, IBM announced and released the MVS / ESA operating system. Similarly, MVS / ESA is designed for the new functions of ESA / 370, which came out in 1988. MVS / ESA can support up to 2GB of central memory and can be well applied to extended memory. In September 1990, IBM developed MVs / ESA spv4. This version of MVS / ESA manages memory in the same way as the previous MVs / ESA releases, but it improves support for the composite system clock of the ESCON channel. In 1994, IBM released the fifth edition of MVS / ESA, which realized the parallel coupling function of operating system. It can support up to 32 MVs / ESA systems. Each system can be a multiprocessor
OS / 390os / 390 is an integrated enterprise server operating system. It integrates the developed communication server, distributed data and file service, support of parallel coupling system, object-oriented programming, DCE and development of application program interface into a proct. Because it is developed on the basis of MVS operating system, it retains the excellent performance of MVS, such as high reliability, continuous availability and security, and provides users with an extensible system. But MVs is closed, and OS / 390 is developed. It includes many server software, with the function of integration
Z / os-z / OS kernel is developed from OS / 390, and it also provides a series of innovative functions closely combined with Z / 900 hardware and microcode. One of the core technologies is the Intelligent Resource Director (IRD) technology, also known as "LPAR cluster" technology. The essence of IRD technology is to organically integrate the workload manager (WLM) target management mode, combined with parallel system complex resource sharing and partition resource / system management (PR / SM) and other technologies, so as to proce maximum benefits and help users allocate valuable system resources to the most needed tasks at the right time- The new technologies adopted by each operating system of Z / series provide better support for mixed operation of multiple workloads on the platform. Z / OS provides an ideal running environment for traditional host applications and Java and UN IX applications that need the highest quality of service
VM and Linux VM (Ⅵ sualmachine) are the underlying operating systems that IBM installed on the mainframe in the early stage. Many other operating systems can be installed on VM at the same time. In the 1990s, with the birth of S / 390 LPAR mode, VM will almost be eliminated. However, with the rise of Linux, VM will be used again. On a s / 390 host, VM can run thousands of Linux at the same time. Of course, Linux can also run on a partition of S / 390. Linux running on the host is mostly Trubo and SUSE Linux. The latter two cooperated in Linux and launched United Linux. OS / 390 operating system consists of its basic parts and subsystems. This section briefly introces the basic parts and subsystems< BCP, the basic control program of MVS, and jes2 or jes3 form the backbone of OS / 390. It provides basic services, making OS / 390 more reliable, complete, complete processing of user data. Compared with MVS, OS / 390 enhances the support of linklst processing, system log and APPC
Job Entry subsystem (Jes)
the job entry subsystem accepts the job to be processed and processes the output of the job. There are two job entry subsystems, jes2 and jes3. They basically provide the same functionality. Jes2 is usually used. Jes work process is as follows: jobs enter the system through the card reader, time-sharing terminal system or network, or are generated by the program and transferred to the system. All jobs are scanned to verify their correctness, and then they are queued appropriately. Jes provides a means for the system to schele work in an orderly manner based on the priority hierarchical structure. The conversion program converts the job control statement (JCL) into an internal form that can be read by the system. At the same time, some other checks are carried out. If an error is found, the job is cleared from the system and the corresponding information is sent to the user. Next, the job is sent to the system for execution again according to the classification and priority. At this time, Jes gives up the control of the job until the printout is intercepted by Jes, Jes delivers it to the spooling disk, the job termination system notifies Jes, the job enters the next Jes operation output step, the output is cancelled from the system after printing or punching, and the spooling space used by the job can be reused. Jes dynamically adjusts the priority. The longer the job waits to run, the higher the priority will be raised
storage management subsystem (SMS
) the main functions of the storage management subsystem are as follows: managing external storage resources. The storage management subsystem allows you to define policies for automatically managing external storage systems for the operating system (mainly by defining appropriate SG, MC, SC, DC, acroute). The system can install the defined policies to automatically manage external storage systems. Provide cataloging mechanism (VTOC, vvds, vcat) to catalog the data on disk and tape (RMM), so that users can access the data conveniently and quickly. The program is stored in the program library for easy reading and execution. Define the input and output devices in the system and control their operation. It supports accessing the data of host system from workstation, personal computer or other systems based on SNA lu6.2 network through distributed file management (DFM).
time sharing system (TSO)
Tso is the software supporting time sharing system. Every instruction issued by end users is processed by Tso, and users interact with the system through Tso commands, but it is not convenient to do so, IBM has also developed ISPF / PDF (interact IV e proct VI ty facility / program development facility) in Tso. ISPF supports call back function and PDF supports program development function, which makes the conversation between end users and Tso more simple and intuitive and improves the application development efficiency of users. ISPF / PDF is a menu input mode based on screen. Users only need to make some simple menu choices to interact with the system. Another software that works under Tso is SDSF (system display and searchfacility). Users can easily view the return information of jobs submitted to the system by SDSF and modify the properties of jobs
device support mechanism (ickdsf) ickdsf can be used to perform the task of installing and using IBM direct access device (DASD / hard disk). For example, you can use ickdsf for DASD error checking, formatting, defragmentation and other maintenance
hardware configuration definition (HCD) HCD has the definition of operating system hardware configuration and processor hardware configuration. Because HCD verifies the validity of its data when the device is defined, rather than when the device is accessed, the inconsistency of device definition can be avoided
SMP / ESMP / E is a tool to install and maintain software. It provides a reliable way to install and maintain the software in OS / 390
VTAM
VTAM is a network communication access method to realize SNA and APPN. It provides an interface between applications on host processor and other resources on SNA network. VTAM establishes and terminates sessions for users on the network. In order to establish and terminate these sessions, VTAM activates and deactivates resources according to its control, including application program, network control program (NCP) and its controlled devices, and VTAM directly connected devices. VTAM also maintains network configuration information, activities and network conditions. To help users control the network, VTAM receives commands from the operator and then performs network services. It informs the operator of the status of the network through the operator. Anynet implements the multiprotocol switching network architecture. It eliminates the constraint of mandatory networking protocol between application and transport service. In other words, applications and their services can communicate with more than one protocol rather than the original implementation. This feature of anynet enables SNA applications to communicate over TCP / IP networks. SNA over unified architecture and TCP / IP supports logical unit communication. It supports all Lu types, including lu6.29.tcp/iptcp/ip is a set of instry standards and applications that allow you to share data and computer resources with other computers, whether they are IBM or non IBM. Standard TCP / IP applications include e-mail, file transfer, remote login, etc. TCP / IP cicssocket application provides the ability to use general application program interface in COBOL, PL / 1 and assembly language
OS / 390 security server (RACF)
RACF is a security management service in OS / 390, which can protect all resources in the system, authenticate the login of users, and effectively record security events in the system. RACF provides: flexible resource protection mode; Protect all resources; Centralized protection or decentralized protection can be selected; An ISPF menu is provided; Transparency to end users. Resource measurement facility (RMF) RMF is a window reflecting OS / 390 resource usage. It collects information at sysplex level, indivial system level and address level, and generates reports on any system in sysplex. Users can
purchase date: March 9, 2012
country of purchase: China
system version: 5.0.1
activation status: activated
latest activation date: March 10, 2012
telephone support time: 90 days
expiration of telephone support: June 7, 2012
expiration of hardware warranty: March 8, 2013
remaining warranty date: 354 days. Hope to adopt