![]() ![]() |
|
PerformanceThe majority of legacy applications tend to be launched from a "logon" proc and usually also require a certain amount of initialization before launching the application. For example setting the terminal type and assigning spooler queues. Once these applications have been ported the application launch procedure should be reviewed with a view to reducing the number of resources required to simply start the application. For Example: Imported application "logon" procedure:
As can be seen from the above that four processes are required just to start the menu. Also in the above scenario it maybe possible if to secured that the user can exit the main program then they can gain access to the jsh and or ksh, which may not be desirable. The number of processes can usually be reduced and in doing so also provide better protection from ksh or jsh. For Example: Modified "logon" procedure : Now the application is only using one process to execute the main program therefore reducing the resource requirement of the machine. Any initialization required can usually be handled in the .profile before executing the MainMenu. In addition if the user attempts to exit to ksh or jsh the user is disconnected as there is no ksh or jsh process available, thus securing the application.
BASICThe BASIC command is provided as a front end program to the jBASE jbc compiler. The jbc compiler converts the BASIC code into "C" and envokes the native "C" compiler to convert the "C" source code into a machine native object file. Basic syntax and options BASIC -v -wn -Ipath FileName Itemlist (On En Wn Ipath
If the record key selection is omitted, BASIC will use any preceding select list. If the BASIC command has no select list, it will use all records in the specified file.When processing the list of record keys, the BASIC command will ignore any $ prefixes and .o or .obj suffixes and build up a list of source names. Using this mechanism, you can safely use BASIC on all records in a file, and it will only process the sources you intended. The jbc and BASIC commands allows 4 levels of warning to be generated. The "O" option should be invoked when compiling programs for final release. The default for this option is optimization level 3, which still provides debug information but the C code is optimized. Level 4 "O4" provides full optimization. The default level for the BASIC command is level 2. Note To copy binary object files such as $PROG or PROG.o from Hash files to directories or vice versa use the B option of the jBASE COPY command. This will ensure conversion of attribute mark characters to new line and vice versa is suppressed thus invalidating the binary object.
CATALOGThe CATALOG command can be used to improve the memory efficiency of the machine by grouping regularly used subroutines into the same or adjacent shared libraries. Also redundant subroutines should not be cataloged. For example, an application making regular calls to subroutine "OFTEN", which was initially catalogued directly before or between or after subroutines "NEVER" and "BLUEMOON" may well reside in the same shared library as the other two little used subroutines. When a library function is required the whole shared library is loaded into memory. i.e. When the subroutine "OFTEN" is first called the shared library containing that subroutine is loaded into memory along with any other library routines it contains like "NEVER" and "BLUEMOON". Therefore if regularly used subroutines can be identified then system resources can be maximized by initially cataloging each subroutine by order of use. This can easily be achieved via a preset select list.
PATHSWhen first starting or executing an application program the system uses the environment variable "PATH" to find the required executable. The "PATH" is searched in order from right to left, the search is complete when the first matching executable is located. To optimize executable lookup ensure that the executable path for the application is the directory after the jBASE release directory. The "PATH" environment variable is also a useful tool, which can be manipulated to force users to find customized or development executables before the default or originals. When searching for shared libraries the environment variable "LD_LIBRARY_PATH", "LIBPATH", "SHLIB_PATH" or "LIB" is used dependent upon the platform. This environment variable is usually only used to find jBASE or system shared libraries. Shared libraries containing application subroutines are located using the JBCOBJECTLIST environment variable or by default the
"lib"
PROFILERThe jBASE profiling tools jprof enables developers to analyze applications to determine potential bottlenecks or trouble spots within the application code. By default, no profiling is done in the program. Programs do not have to be compiled in any special manner to enable profiling for that program. All that is required is that the programs were not compiled with optimization, as this discards the debug information which is required for profiling. The mechanism works by receiving a signal at every clock tick and keeping note of where the program was when the signal arrived. Thus, for the profiling to be accurate, the application must be run for a relatively long time. It will not show particularly good results if, for example, a program executes in less than a second. Several minutes or longer is preferred.
ENABLING PROFILINGProfiling can either be enabled using the _JP option on program execution or via the
JBCPROFILE environment variable. e.g. This command generates a profiling file called "jprof" in the current
directory. When the application stops or chains to another program This command generates a different profiling file for each process executed in the form "jprof_pid_n", where pid is the process id and n is an incrementing number starting at the number set be JBCPROFILE. The profiling file generated will only contain information about user CPU time. The time spent in system calls is not included. Therefore, doing a lot of file I/O means that this time will not be included in the profiling statistics.
PROFILE REPORTINGThe jprof command is used to provide profile analysis of the jprof files generated by a program executed with the -JP option. Called as :
jprof{_nnn} Profile name (default "jprof")
EXAMPLE OF PROFILINGImagine the source "test1.b" below has been edited into file BP, where BP is a directory. Notice the INCLUDE of another source file "test2.b".
The program can be created normally with the following command:
or it can be created with BASIC and CATALOG:
By default, when the program is run, no profiling will take place. Now run the program with the -JP switch to create a file "jprof":
We can now examine the profile file with the "jprof" command, using the -f option to generate optional source code listings from the file BP.
PROFILE REPORT
The -i option would sort the output with incrementing Ticks counts. The -n option would
additionally sort it by file name, so the |