Exercise Guide ESU03GX-3
Exercise Guide ESU03GX-3
Exercise Guide ESU03GX-3
cover
Front cover
Basic System Programming with the IBM
Mainframe
Course code ESU03G ERC 1.0
August 2019 edition
Notices
This information was developed for products and services offered in the US.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative
for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not
intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or
service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate
and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this
document does not grant you any license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
North Castle Drive, MD-NC119
Armonk, NY 10504-1785
United States of America
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY
KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some jurisdictions do not allow disclaimer
of express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein;
these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s)
and/or the program(s) described in this publication at any time without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any manner serve as an
endorsement of those websites. The materials at those websites are not part of the materials for this IBM product and use of those
websites is at your own risk.
IBM may use or distribute any of the information you provide in any way it believes appropriate without incurring any obligation to you.
Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other
publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other
claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those
products.
This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible,
the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to
actual people or business enterprises is entirely coincidental.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many
jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM
trademarks is available on the web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml.
© Copyright International Business Machines Corporation 2019.
This document may not be reproduced in whole or in part without the prior written permission of IBM.
US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
V11.3
Contents
TOC
Contents
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .X-17
TMK
Trademarks
The reader should recognize that the following terms, which appear in the content of this training
document, are official trademarks of IBM or other companies:
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide.
The following are trademarks of International Business Machines Corporation, registered in many
jurisdictions worldwide:
AIX® BookManager® CICS®
DB2® DS8000® Easy Tier®
ECKD™ Enterprise Storage Server® eServer™
Express® FICON® FlashCopy®
GDPS® Geographically Dispersed HACMP™
Parallel Sysplex™
Hiperspace™ HyperSwap® IBM LinuxONE™
IBM Spectrum™ IBM Spectrum Control™ IBM z Systems®
IBM z® IBM z13® IMS™
MVS™ Notes® Open Class®
Operating System/400® OS/390® OS/400®
Parallel Sysplex® Power Architecture® Power Systems™
Power® PowerHA® POWER8®
RACF® Resource Measurement RMF™
Facility™
RS/6000® System p5® System Storage®
System z10® Tivoli® VTAM®
z Systems® z/Architecture® z/OS®
z/VM® z/VSE® zEnterprise®
z10™ z13® z9®
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other
countries, or both.
Java™ and all Java-based trademarks and logos are trademarks or registered trademarks of
Oracle and/or its affiliates.
UNIX is a registered trademark of The Open Group in the United States and other countries.
VMware is a registered trademark or trademark of VMware, Inc. or its subsidiaries in the United
States and/or other jurisdictions.
Other product and service names might be trademarks of IBM or other companies.
EXempty
Overview
The steps in this exercise are to guide you through accessing the Skytap environment to gain entry
into the IBM mainframe system and exit ISPF and logoff TSO. These action items are to be
performed on the actual live system.
Objectives
• Access the Skytap environment
• Access the system image
• Log on to TSO
• Logoff TSO
References
SC34-4823 Interactive System Productivity Facility (ISPF) User's Guide
EXempty
Exercise instructions
Preface
Note
The Enter key on your keyboard may/may not be the Enter key.
On some keyboards, the Enter key for VM is the right CTRL key. Take care when entering your
password. If you enter the password incorrectly four times, your user ID will be revoked. Contact
the Help Desk for support.
__ 2. Select Course Lab Kit on the top left of the screen, by clicking the link (highlighted in red
below)
EXempty
This will provide you with all of the information you will need to progress through this course.
The following is just an example. Do not use the information below to record your information.
Ensure that you use the information in your Course Lab Kit.
EXempty
EXempty
Wait patiently while your image is being created. This may take a while.
__ 6. Left click in the middle of the next screen:
EXempty
__ 8. Once the icons appear on the desktop, using the information you recorded in step 3, double
click the system name.
__ 9. Using the information you recorded in step 3, enter the assigned TSO user ID and press the
Enter Key.
EXempty
__ 10. Using the information you recorded in step 3, enter the assigned TSO password and press
the Enter Key.
__ 11. Once you have successfully logged on, the following screen will appear:
EXempty
__ 12. When three asterisks (***) appear, press the Enter Key to continue.
You are now logged on to TSO.
When *** (three asterisks) appear on the screen, press the Enter Key to continue.
You now have ended the ISPF session and returned to the TSO command line mode. Your
TSO session is still running.
Section 3: Logoff
__ 14. To terminate your TSO session, enter the TSO command logoff on your terminal.
EXempty
TSO then replies with a message like IKJ56470I userid LOGGED OFF TSO AT 14:40:51
on July 16, 2019 to indicate that your TSO session has been terminated.
End of exercise
EXempty
Overview
This exercise provides an opportunity to allocate a partitioned data set, edit a member and execute
an IEBCOPY program.
Objectives
• Allocate a data set
• Copy a member
• Submit a job
• View the job output
References
GC35-0033 Device Support Facilities User’s Guide and Reference
GC28-1758 MVS JCL User’s Guide
z/OS Introduction and Workshop Unit Job Control Language (JCL)
https://labs.edu.ihost.com/irlp_medias/system_z/OS_Workshop_JCL.pdf
EXempty
Exercise instructions
Preface
• All action items followed by a * sign, include exercise hints, which are located at the end of this
exercise.
• Example solutions for many of the following exercise parts can be found in data set
(D80WW.ES10V15.SOLUTION). DO NOT MODIFY this data set. Attempt to resolve any editing
and JCL errors using the course materials before referencing data set.
Note
Remember not to put single quotation marks around the data set name for batch JCL DD
statements.
Note
Data set userid.ES10.CNTL may already exist, and can be used as it is with no modifications to its
allocation characteristics.
__ 3. Use option 3.3 to copy member LAB5#01 from data set D80WW.ES10V15.CNTL into data
set userid.ES10.CNTL.
__ 4. Edit member LAB5#01 in data set userid.ES10.CNTL.
__ 5. Enter your JOB statement with the following specifications:
__ a. Job name is useridA (Yes, your user ID with an A at the end).
__ b. Account #: See member JOBCARD in D80WW.ES10V15.CNTL.*
__ c. Programmer's name is your name.
__ d. Message class is: See member JOBCARD in D80WW.ES10V15.CNTL.
__ e. Message level is: 1,1.
__ f. You are to be informed when the job has completed execution.
EXempty
__ g. Run the job in Class A: See member JOBCARD in D80WW.ES10V15.CNTL.
__ h. Instead of typing your own job card, why not copy your sample jobcard member
userid.ES10.CNTL(JOBCARD) and modify it if needed.
__ 6. Complete the EXEC statement by calling the program IEBCOPY.
__ 7. Complete the DD statements as follows:
__ a. SYSUT1 is D80WW.ES10V15.PROC.
__ b. SYSUT2 is a new cataloged data set called userid.ES10.PROC to be allocated with the
same characteristics as D80WW.ES10V15.PROC.
__ 8. Submit the job.
__ 9. View its output with SDSF. Leave the output on the spool. *
__ 11. From the ISPF Primary Option Menu, select S (SDSF), and press the Enter key.
__ 12. From the SDSF Primary Option Menu, select ST (Status of jobs), and press the Enter key.
__ 13. Locate the Job number.
Note: You might need to press the F8 (Forward) key to advance to the next screen.
__ 14. Enter the letter S to the left of the Job ID, press the Enter key.
EXempty
__ 15. Using the F8 (Forward) key, ensure that the job completed without any errors.
A RC (Return Code) of 0 is a successful job completion status.
Note: The following output is three pages in length:
EXempty
EXempty
End of exercise
EXempty
Exercise hints
Section 1: Create a data set
Step 5b:
Step 9:
The completion message will not be sent to the TSO/E session asynchronously; it will be sent with
the response to a command input (that is, pressing the Enter key), or, when you log off while the job
is running, you will receive the message when you log on again. This is such a small job that you
most likely will see the completion message when you press Enter in response to *** to clear the
submission message.
EXempty
Overview
This exercise provides an opportunity to code an IEBCOPY job to copy a member from one data
set to another. Also, IEBCOPY is used to perform a secure compress of a PDS, which reclaims
unused spaces between members. There are optional exercises which include copying in-stream
data to a PS, print a sequential data set and a PDS member, and creating an additional PDS
member.
Objectives
• Copy a member of a PDS
• Copy PDS and PDSE
• Replace a member
• Perform a secure compress
• Compress a data set in place
References
GC35-0033 Device Support Facilities User’s Guide and Reference
GC28-1758 MVS JCL User’s Guide
z/OS Introduction and Workshop Unit Job Control Language (JCL)
https://labs.edu.ihost.com/irlp_medias/system_z/OS_Workshop_JCL.pdf
EXempty
Exercise instructions
Preface
• This exercise depends on the successful completion of the previous exercises.
• The answers to all questions are located at the end of this exercise.
• All action items followed by a * sign, include exercise hints, which are located at the end of this
exercise.
Important
Note
Do not create a job card; TSO creates a default job card for you.
EXempty
__ 4. Check the results of your job using SDSF. *
In case of errors, remove the cause of error and rerun the job.
__ 5. Now tailor the copied JOBCARD member so that this job card can be copied into each new
JCL member.
Your JOBCARD should look something like the following:
//useridA JOB (ACCOUNT),'userid',MSGCLASS=Q,MSGLEVEL=(1,1),
// NOTIFY=userid,CLASS=A,REGION=6M
//********************************************************************
//* JOB SUBMITTED FROM userid.ES10.CNTL(LAB5#XX) ***
//* DOC: WRITE THE PURPOSE OF YOUR JOB RIGHT HERE ***
//********************************************************************
The comment lines shown in the sample above are for documentation purposes so that you
will be able to trace from where the JCL was submitted.
__ 6. Save the changes to the member.
EXempty
You may specify a disposition of ‘share’ (DISP=SHR) or DISP=OLD for the output dataset,
because userid.COPY.CNTL is not detained or used by any other process or TSO user
session. Your job should look like the following:
//STEP1 EXEC PGM=IEBCOPY
//IN DD DISP=SHR,DSN=D80WW.ES10V15.CNTL
//OUT DD DISP=SHR,DSN=userid.COPY.CNTL
//SYSPRINT DD SYSOUT=*
//SYSIN DD *
COPY OUTDD=OUT,INDD=IN
SELECT MEMBER=((JOBCARD,,R))
/*
Important
Do not compress a partitioned data set currently being used by more than one user. If you do, the
other users will see the data set as damaged, even though it is not. If any of these other users
update the partitioned data set after you compress it, then their update will actually damage the
partitioned data set.
__ 17. Create member LAB5#14 in data set userid.ES10.CNTL. Copy the member JOBCARD
into it and create job steps that do the following: *
Use the first step to allocate a data set named userid.COMPRESS.DATA like data set
userid.COPY.CNTL. The second step should only run when the RC=0 in the previous
step. Use the IF/THEN/ELSE/ENDIF clause for this purpose.
__ 18. Copy the entire data set userid.COPY.CNTL into userid.COMPRESS.DATA, thus
creating a backup of userid.COPY.CNTL.
__ 19. Submit the job.
__ 20. Check that the above step was successful using the IF/THEN/ELSE/ENDIF clause, and
verify with ISPF 3.4 data set list utility, or ISPF 3.2 data set utility that dataset
userid.COMPRESS.DATA was actually created.
EXempty
__ 21. If the above steps were executed with RC=0, go on to LAB 5 #15, else delete
userid.COMPRESS.DATA, remove the cause of the error, and rerun the job. *
Note
IEBCOPY performs a compress when both the input and output are the same data set on the same
volume.
__ 25. Delete data set userid.COMPRESS.DATA, but only if previous step was executed with
RC=0.
__ 26. Check the results of your job and verify with ISPF 3.4 data set list utility, or ISPF 3.2 data set
utility that dataset userid.COMPRESS.DATA was actually deleted.In case of errors,
remove the cause of error and rerun the job.
__ 27. You should see the following message in the job output:
IGD105I TSOZA05.COMPRESS.DATA DELETED, DDNAME=DD1
EXempty
__ 30. Create member LAB5#16 in data set userid.ES10.CNTL.
__ 31. Copy the member JOBCARD into it and create a job step that copies data set
userid.ES10.CNTL into data set userid.COPY.PDS.
Important
Questions
EXempty
Section 7: Optional: Copy in-stream data to PS
Important
The successful completion of this section is required to perform exercise 4, section 3: Create
cataloged procedure.
__ 39. After submitting the job, check the results of the job. Using ISPF 3.4 or ISPF 2 verify that
dataset TSOZA05.GENER.COPY#1 has actually been created and that it contains the
above data records. In the case of an error, fix the error(s), and rerun the job.
__ 40. Create member LAB5#22 in data set userid.ES10.CNTL.
__ 41. Copy the member JOBCARD into it and create a job step that copies the (input) data set
userid.GENER.COPY#1 into data set userid.GENER.COPY#2.
__ 42. Since the output data set does not yet exist, allocate it during the COPY step. The
characteristics are the same as for userid.GENER.COPY#1. (Use the LIKE parameter to
copy it.)
__ 43. After submitting the job, check the results of the job. Using ISPF 3.4 or ISPF 2 verify that
dataset TSOZA05.GENER.COPY#2 has actually been created and that it is an exact copy
of the contents of TSOZA05.GENER.COPY#1. In the case of an error, fix the error(s) and
rerun the job.
EXempty
__ 45. Copy the member JOBCARD into it and create a job step that does the following:
__ a. Print data set userid.GENER.COPY#1 to a SYSOUT dataset.
__ b. After submitting the job, check the results of the job. Verify that dataset
TSOZA05.GENER.COPY#1 has actually been copied in the job’s sysprint, as a
SYSOUT dataset. In the case of an error, fix the error(s) and rerun the job.
__ 51. After submitting the job, check the results of the job. Using ISPF 3.4 or ISPF 2 verify that
member TEST has actually been created in data set userid.COPY.CNTL. In the case of an
error, fix the error(s) and rerun the job.
BROWSE TSOZA05.COPY.CNTL(TEST) Line 000000
Command ===>
********************************* Top of Data *****************
TEST TEST TEST TEST TEST TEST TEST TEST TEST TEST TEST
AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA
BBBB BBBB BBBB BBBB BBBB BBBB BBBB BBBB BBBB BBBB BBBB
TEST TEST TEST TEST TEST TEST TEST TEST TEST TEST TEST
******************************** Bottom of Data ***************
EXempty
Exercise answers
Section 6: Copy a PDS and a PDSE data set
Q1: Does member LAB5#16 complete successfully?
A1: No. Member LAB5#16 fails (or ABENDS) due to running out of directory space. This PDS was
allocated with only one directory block.
Q2: Does member LAB5#17 complete successfully?
A2: Yes. LAB5#17 completed successfully because the output data set is a PDSE, and a PDSE
dynamically creates more directory space as needed.
Exercise hints
Section 1: Copy a selected member of a PDS
Step 1: Make sure you specify a disposition of ‘share’ (DISP=SHR) for the output dataset.
Step 2: Ensure you complete the MSGCLASS in the example JOBCARD.
EXempty
Exercise 4. Procedures
Estimated time
00:30
Optional sections: 00:30
Overview
This exercise provides an opportunity modify JCL to override DD statements on an in-stream
procedure. You will create and run cataloged procedures in a PDS. Using both DFSORT and
IEBGENER, you will learn how to copy data sets. There are optional exercises, which provide the
ability to invoke conditional processing and using IEBGENER to route a job to INTRDR, which
defines a logical device for jobs entering the system through the internal reader facility.
Objectives
• Override DD statements
• Create and run cataloged procedures
• Use DFSORT
• Use IEBGENER
References
GC35-0033 Device Support Facilities User’s Guide and Reference
SC26-7527 DFSORT Getting Started
SG23-6878 DFSORT Application Programming Guide
GC28-1758 MVS JCL User’s Guide
EXempty
Exercise instructions
Preface
• This exercise depends on the successful completion of the previous exercises.
• All action items followed by a * sign, include exercise hints, which are located at the end of this
exercise.
EXempty
As you can see, this job has an in-stream procedure that makes a secure compress of data
set userid.ES10.CNTL.
__ 2. Your task is now to execute the job so that the data set userid.COPY.CNTL will be
compressed during the job's execution. *
Note
Do not change the in-stream procedure. Perform this task by overriding DD statements.
EXempty
The procedure looks like:
***************************** Top of Data *****************************
//COMP PROC INDS=FORGOTTEN,BACK=FORGOTTEN
//********************************************************************
//* DOC: COMPRESS DATA SETS SPECIFIED WITH VARIABLES. ***
//********************************************************************
//**********************************************************
//******** MAKE BACKUP
//**********************************************************
//S1 EXEC PGM=IEBCOPY
//SYSPRINT DD SYSOUT=*
//SYSUT1 DD DISP=SHR,DSN=&INDS.
//SYSUT2 DD DISP=(,CATLG),DSN=&BACK.,
// LIKE=&INDS
//SYSIN DD DUMMY
//IFOK1 IF (S1.RC=0) THEN
//**********************************************************
//******** COMPRESS DATA SET
//**********************************************************
//S2 EXEC PGM=IEBCOPY
//SYSPRINT DD SYSOUT=*
//SYSUT1 DD DISP=SHR,DSN=&INDS.
//SYSUT2 DD DISP=OLD,DSN=&INDS.
//SYSIN DD DUMMY
//IFOKEND1 ENDIF
//IFOK2 IF (S2,RC=0) THEN
//**********************************************************
//******** COMPRESS SUCCESSFUL, DELETE BACKUP
//**********************************************************
//S3 EXEC PGM=IEFBR14
//DD1 DD DISP=(OLD,DELETE),DSN=&BACK.
//IFOKEND2 ENDIF
As you can see, there are two variables needed to run this procedure without problems.
Furthermore, you see that this is also a secure compress like the one you had as an
in-stream procedure.
__ 5. Run this procedure to compress data set userid.ES10.CNTL and define userid.ES10.BACK
as the backup of the secure compress.
Important
This section is dependent on the successful completion of exercise 3, section 7: Optional: Copy
in-stream data to PS.
EXempty
During this exercise, you will code a cataloged procedure in your own data set and test it. It allows
you to copy any kind of PDS or sequential data set to another PDS or PS data set.
__ 6. In exercise 2, Submit a job, Section 1 Create a data set, step 7, you should have allocated a
PDS named userid.ES10.PROC with the same attributes as data set D80WW.ES10V15.PROC
and you have copied some sample procedure members, including a PROC member named
COPY.
__ 7. Verify and validate member COPY (browse, view, edit) in your own PDS named
userid.ES10.PROC, which holds the cataloged procedure. The procedure should do the
following:
BROWSE TSOZA05.ES10.PROC(COPY) - 01.01 Line 0000000000 Col
Command ===> Scroll ==
********************************* Top of Data **************************
//COPY PROC PROG=IEBCOPY,DISPI=,INDS=,DISPO=,OUTDS=,LIKEDS=
//S1 EXEC PGM=&PROG
//SYSUT1 DD DISP=&DISPI,DSN=&INDS
//SYSUT2 DD DISP=&DISPO,DSN=&OUTDS,
// LIKE=&LIKEDS.
//SYSPRINT DD SYSOUT=*
//SYSIN DD DUMMY
__ a. Depending on the input variable, it calls IEBCOPY or IEBGENER. Name the variable
PROG. The default for this variable is IEBCOPY.
__ b. The disposition of DD-statements SYSUT1 and SYSUT2 is defined as JCL symbols.
Name the symbols DISPI for input and DISPO for output.
__ c. The data set names should be variable so that they can vary from procedure call to
procedure call. Name their JCL symbols INDS and OUTDS.
__ d. The data set defined for SYSUT2 might be new. If this is the case, allocate it like the
input data set. Use the JCL symbol &LIKEDS to do this.
__ e. Do not specify any default values for the symbols except for PROG.
__ 8. Once you have validated your own cataloged procedure, test it.
__ a. Create member LAB5#33 in data set userid.ES10.CNTL and copy member JOBCARD
into it.
__ b. Create job steps that call the new cataloged procedure to copy:
i. PDS Data set userid.ES10.CNTL to the new data set userid.ES10.XXXX.
ii. Sequential Data set userid.GENER.COPY#1 to the new data set
userid.ES10.YYYY.
__ c. Verify with SDSF that your job has executed successfully, and with ISPF 3.4 that both
PDS Data set userid.ES10.XXXX and sequential Data set userid.ES10.YYYY have
been created and populated from their respective input dataset.
__ d. If the job fails, remove the cause of error and rerun the job.
EXempty
Section 4: Use of DFSORT (ICEMAN)
ICEMAN is the program name for DFSORT. You can invoke DFSORT with PGM=ICEMAN.
DFSORT is also shipped with an alias of SORT, so you can use PGM=SORT.
__ 13. Now that you have enough familiarity to create this sort step, do the following:
Sort member SORTTEST that you have copied in the previous step into dataset
userid.ES10.CNTL and write the results to userid.ES10.CNTL(SORTOUT1).
__ 14. Skip the first record.
__ 15. Sort by the number of years in the company (columns 1-3).
__ a. Data type is character (CH)
__ b. Descending order (D)
As the second sort criteria:
__ 16. Sort the records by employee name, starting in column 4 until column 16.
__ a. Data type: character (CH)
__ b. Ascending order (A)
__ 17. Check the results of your job and edit member SORTOUT1 for the sorted output. *
__ 18. In case of errors, remove the cause of errors and rerun the job.
EXempty
End of exercise (Optional exercises follow)
EXempty
Section 5: Optional: Create PS from in-stream
__ 19. Create member LAB5#41 in data set userid.ES10.CNTL.
__ 20. Copy the member JOBCARD into it and create a job step that copies in-stream data to a
new Physical Sequential (PS) data set with name userid.ES10.INPUT and the following
characteristics:
__ a. Space: 1 track primary, no secondary allocation
__ b. RECFM: FB
__ c. LRECL: 80
__ d. BLKSIZE: 0
__ 21. Copy the in-stream data from member INSTREAM in data set D80WW.ES10V15.CNTL. The
in-stream data looks like this:
__ 22. Use the //SYSUT1 DD DATA,DLM=$$.... statement to define the input string.
//STEP1 EXEC PGM=IEBGENER
//SYSUT1 DD DATA,DLM=$$
TEST1
TEST2
TEST3
TEST4
TEST5
TEST6
TEST7
TEST8
TEST9
TEST10
TEST11
TEST12
TEST13
TEST14
TEST15
TEST16
$$
//SYSUT2 DD DISP=(,CATLG),DSN=TSOZXXX.ES10.INPUT,
// SPACE=(TRK,(1,0)),RECFM=FB,LRECL=80,BLKSIZE=0
//SYSPRINT DD SYSOUT=*
//SYSIN DD DUMMY
/*
EXempty
__ 23. Check the results of your job. Verify with ISPF 3.4 that dataset TSOZXXX.ES10.INPUT has
been created and populated with the above instream data records. In case of error, remove
the cause and rerun the job.
__ 27. The data set userid.ES10.DATA must have the same characteristics as
userid.ES10.CNTL.
__ 28. If the first step returns RC=0, copy member TEXT1 to a new PS data set named
userid.ES10.OUT.
__ a. One track primary, one track secondary
__ b. Fixed blocked
__ c. Record length 80
__ d. Best block size
__ 29. If the second step returns with RC=0, then print data set userid.ES10.OUT to
SYSOUT=* using IEBGENER.
__ 30. If the third step ends with RC=0, delete data set userid.ES10.OUT using IEFBR14.
__ 31. For all conditional JCL, use the IF/THEN/ELSE clause.
__ 32. Check the results of your job. In case of error, remove the cause of the error and rerun the
job.
EXempty
__ 36. With the in-stream procedure PROC32, execute IEBGENER to route a job from any input
data set to SYSOUT=.
__ 37. To define the input data set, use the symbol &DS, and for the SYSOUT= value, use &OUT.
__ 38. Run the in-stream procedure with the values:
DS= userid.ES10.CNTL(LAB5#43),OUT=(,INTRDR)
__ 39. Submit your LAB5#44 job, this will in turn submit another job LAB5#43.
__ 40. So you should see two jobs being submittted:
__ a. the one you just submited with your submit command in LAB5#44, and
__ b. the job submited to the internal reader LAB5#43.
14.54.04 JOB01386 $HASP165 TSOZA054 ENDED AT MVSCZ01 MAXCC=0000 CN(INTERNAL)
14.54.04 JOB01387 $HASP165 TSOZA053 ENDED AT MVSCZ01 MAXCC=0000 CN(INTERNAL)
***
__ 41. Check the results of your jobs. In case of errors, remove the cause of error and rerun the
job.
EXempty
Exercise hints
Section 1: Override DD-statements of an in-stream procedure
Step 2:
//FINAL EXEC COMP
//S1.SYSUT1 DD DISP=SHR,DSN=TSOZA60.COPY.CNTL
//S1.SYSUT2 DD DISP=(,CATLG),DSN=TSOZA60.ES10.BACK,
// LIKE=TSOZA60.COPY.CNTL
//S2.SYSUT1 DD DISP=SHR,DSN=TSOZA60.COPY.CNTL
//S2.SYSUT2 DD DISP=OLD,DSN=TSOZA60.COPY.CNTL
//S3.DD1 DD DSN=TSOZA60.ES10.BACK,DISP=(OLD,DELETE)
Section 4: Use of DFSORT (ICEMAN)
Step 12: FIELDS=(start column,column count,data type,sort order,next field)
SKIPREC=(amount of records to be skipped)
Step 17: JCL:
EXempty
Overview:
The IBM z/OS Management Facility (z/OSMF) is a z/OS component that simplifies, optimizes, and
modernizes the z/OS system programmer experience.
In this exercise, you will see how z/OSMF delivers solutions in a task-oriented, web browser-based
user interface with integrated user assistance. Its focus is to improve system programmer
productivity, and make the z/OS functions easier to understand and use.
Objectives:
• Logon and access z/OSMF
• Explore the layout of z/OSMF
• Access TSO
• Access web links
• Access z/OS consoles
• Enter and decipher z/OS commands
• Enter z/OS commands to decipher the system configuration
References
SA27-8419 IBM z/OS Management Facility Configuration Guide V2R3
SG24-7851 z/OS Management Facility V2R3 Redbook
SA38-0666 z/OS MVS System Commands V2R3
z/OSMF Knowledge Center:
https://www.ibm.com/support/knowledgecenter/SSLTBW_2.3.0/com.ibm.zos.v2r3.izu/izu.htm
EXempty
Exercise instructions
Prefix
• The answers to all questions are located at the end of this exercise.
• All action items followed by a * sign, include exercise hints, which are located at the end of this
exercise.
• IMPORTANT: You MUST log-off TSO BEFORE starting this exercise!
Important
If you receive a message indicating “Your connection is not secure”, select Advanced and add an
exception to allow access.
__ 4. On the IBM z/OS Management Facility window, enter your TSO user ID and password.
EXempty
After logging in to IBM z/OS Management Facility, you will see the Welcome screen:
EXempty
Questions
Q1: How can you determine if a task on the list is new for the current release?
_____________________________________________________________
__ 13. Scroll through the tasks which are shipped with z/OSMF.
__ 14. Collapse all expanded items in the navigation bar.
Note
To see the ISPF screen to allocate a new data set, you may have to click the ‘close all’ link to
suppress all messages and make space on the screen.
EXempty
__ 17. As you can see, this is the ISPF Primary Option Menu screen.
__ 18. You may need to use the slider bar to scroll up and down to view all of the options.
__ 19. Allocate a Partitioned Data Set Extended (PDSE) named userid.ES10.ZOSMF (where
userid is the user ID you used to log on to TSO with) according to the following
specifications: *
__ a. Ten blocks primary space (Primary quantity)
__ b. Five block secondary space (Secondary quantity)
__ c. Directory size five blocks (Directory blocks)
__ d. Fixed length records (Record format = F)
__ e. Record length 80 bytes (Record length)
__ 20. Press the Enter key to allocate the data set.
EXempty
As you can see, z/OSMF can also be used to allocate data sets.
__ 21. To verify whether the data set has been allocated properly, use the Data Set information
panel.
Section 4: Links
The z/OSMF provides features to customize the screen by adding links to web sites and
other tailored external applications.
When you are performing system management tasks with z/OSMF, you might find it helpful
to refer to other tools and information on the web. The z/OSMF navigation area comes
supplied with several useful links in the Links category.
Installations can customize the z/OSMF navigation area with its own links, as needed. Links
can be added to the Links category or to any other category in the z/OSMF navigation area.
When a link is selected, the link launches in either a separate browser window or tab, or as
a tab in the z/OSMF work area. This launch behavior is specified when the link is defined to
z/OSMF.
__ 22. Select the twistie to the left of Links in the navigation pane.
__ 23. Take a few minutes to explore the various links that are configured for this z/OSMF.
EXempty
Note
__ 24. When you are finished, close all open browser sessions except the main z/OSMF screen.
__ 25. Collapse the twistie to the left of Links by selecting it.
__ 29. If you see ‘setup required’, click ‘actions’, then click ‘complete setup’
EXempty
EXempty
EXempty
Note
z/OS commands are not case sensitive. They are displayed in upper case for ease of reading.
Use the DISPLAY system command to display information about the operating system, the
jobs and application programs that are running, the processor, devices that are on-line and
off-line, central storage, workload management service policy status, and the time of day.
__ 33. On the command line, enter: D A
An example of the D A command is displayed below:
When entering z/OS commands, the output is displayed with a message number.
The IBM Z: Look@ Knowledge Center is a site used for Message Lookup Facility.
__ 34. Open a new browser and access the following website:
https://www-304.ibm.com/servers/resourcelink/svc00100.nsf/pages/lookatkc?OpenDocument
EXempty
Questions
__ 35. Enter the message ID for the D A command in the IBM Z: Look@ Knowledge Center field
and select Go.
__ 36. Click the message ID to expand its contents:
__ 37. Review the information for the D A command and answer the following questions:
Questions
Q3: Which field in the command output identifies the number of address spaces running under
initiators? __________________________________________________________________
Q4: What is the correct syntax of the z/OS command to display a list of all active TSO/E users?
_______________________________________________________________________
Q5: Which column field displays the status of the job? _______________________________ *
EXempty
Every z/OS message ID contains message codes. The last letter at the end of the message
ID identifies the type of message.
Questions
Even though the above z/OS message ID is a system failure, there is no action to be taken.
__ 38. Enter: D U,DASD,ONLINE
The UNIT is the Device Number.
A Device number is any 4 digit hexadecimal numbers assigned to a device for
communication purposes.
Questions
EXempty
Section 8: Identifying the system configuration
__ 39. Select a device number from the output of the previous command.
__ 40. Enter: D M=DEV(xxxx)
The following command was entered for device number 0502:
There is a possibility that the system configuration could change. If this occurs, then the
output data from your command could differ from the one displayed above.
__ 41. If your output does not reflect the correct data as the one above, use the above example to
answer the following questions:
Questions
Q9: What CHPID numbers are defined to access device 0502? __________________________
Q10: What are the entry ports into a FICON switch for each CHPID? ______________________
Q11: What are exit ports from the FICON switch for each CHPID? ________________________
__ 42. Using the above information, complete the following diagram, filling in the CHPID number,
entry and exit ports. *
EXempty
EXempty
__ 44. If your output does not reflect the correct data as the one above, use the above example to
answer the following questions:
Questions
Questions
Q15: What is the syntax of the DEVSERV command for eight devices? _____________________
EXempty
__ 47. Issue the DEVSERV command to eight devices.
__ 48. Take some time to decipher the output.
__ 49. If you would like to experiment with other z/OS commands, please feel free to do so at this
time.
__ 50. After experimenting with other commands, display the allocation attributes for data set
userid.ES10.ZOSMF using the ISPF Classic interface tab of z/OSMF.
Important
Now first perform a logoff from the ISPF classic application, otherwise you will retain an ENQ on
ISPPROF, and you will no longer be able to logon to TSO in the next exercise!
__ 51. You can enter ‘=xall’ on all ISPF active screens, until all screens close, and the ISPF tab
disappears.
EXempty
__ 54. Select Log Out.
Important
End of exercise
EXempty
Exercise answers
Section 2: z/OSMF interface layout
Q1: How can you determine if a task on the list is new for the current release?
A1: Its name is followed by the new icon:
EXempty
A13: Device numbers: 0502 through 0503, 0BCD through 0BCF, and 0BFF.
Q14: What type of CHPID if CHPID 96?
A14: FICON switched.
Section 9: The DEVSERV command
Q15: What is the syntax of the DEVSERV command for eight devices?
A15: DS P,xxxx,8
EXempty
Exercise hints
Section 3: TSO interface
Step 20. From the ISPF Primary Option Menu, Enter 3.2.
Do not forget to specify the word LIBRARY in the Data set name type to allocate a PDSE instead of
a PDS:
Section 4: Links
Note after step 24:
EXempty
Overview
In this exercise, you access ISHELL. ISHELL is a good starting point for users familiar with TSO
and ISPF who want to use z/OS UNIX. ISHELL will also be used to list the contents of, and create,
a file system and directories.
Objectives
• Access and customize ISHELL
• List the contents of the file system
• Create a hierarchical file system
• Create files and directories using ISHELL
References
GA32-0884 UNIX System Services Planning
SA22-7801 UNIX System Services User's Guide
SC26-7410 z/OS DFSMS Using Data Sets
REDP-4193 z/OS UNIX Security Fundamentals
EXempty
Exercise instructions
Preface
• The answers to all questions are located at the end of this exercise.
• All action items followed by a * sign, include exercise hints, which are located at the end of this
exercise.
Questions
Q1: What character on the File System and Setup actions indicates certain options require
superuser or the special attribute for full function? _______________________________
Important
Do not do the next step before saving the path name displayed on the UNIX System Services ISPF
Shell. This path name is both your home directory and your current working directory. Write it down
or copy it to the clipboard for pasting later.
EXempty
List the contents of the root file system.
__ 4. The name of the root directory is / *
__ 5. If a / is not already specified on the UNIX System Services ISPF Shell, enter it like it is
shown on the following panel:
There are different methods for displaying the contents of a directory. See whether you can
find one way of doing it.
__ 6. List the contents of the directory /bin in the root file system.
__ a. Find the directory /bin on the root directory list and choose the option to list its contents.
(you can also use action code L in front of the /bin entry)
__ 7. Choose a file in this directory to browse.
The procedure is similar to the previous one, but the action is different.
Take notice that the short form of Browse is B. If you remember this you can use B directly
when you want to browse a file instead of prompting the pop-up menu to choose actions
from.
__ 8. List the contents of the directory /dev in the root file system.
You can use the same way as you did to list the /bin directory.
Suggestion: Try the action code for list instead of using the pop-up menu.
__ 9. Find out from the panels, which type of files are in the /dev directory.
__ a. Try listing the attributes of a file.
__ 10. List the actions that can be done for the files in this directory.
The pop-up menu contains a list of actions.
The only actions available for a character special file are:
- Attributes (A)
- Delete (D)
- Rename (R) done for the files in this directory.
EXempty
__ 11. Create a new file called NEWFILE in your home directory.
To create a new file, you have to go back to the main ISHELL panel. As an alternative you
can also enter 'n' in front of __DIR when you are in your home directory (n stands for new)
__ a. Use the default permission bits for this file.
__ 12. Display the contents of your home directory now to see the new file there.
Do this the same way as you listed the ROOT directory.
__ 13. Edit that new file and add a few lines of text in the file.
__ a. The editor is the ISPF editor.
F3 saves the file and return from editing the file.
Questions
Q2: What is the default action for character special files? ___________________________
__ 17. Specify that you want the command line to be on top of the ISHELL screen.
__ 18. Change it back to be at the bottom.
Note
ISPF 3.17 UDLIST is the preferred and strategic way to work with the Unix filesystem under ISPF.
ISHELL has been deprecated and is no longer enhanced.
EXempty
Check column labeled TYPE using F8 to scroll the list.
Notice that the Size of the file is not displayed.
__ 21. Select the Options pull down and select option: 2 - Directory List Column Arrangement.
On the next screen, you can change the width of the fields. Make the fields smaller or
remove them completely from the display.
__ 22. Change the width of the fields so the Size column appears.
__ 23. Display the entries in your directory tsoz###.
__ 24. Create a new regular UNIX file in your directory: Name it date1 with permission bits 755.
__ 25. Once created, edit the file, add one line containing the word date, and save it.Now try to
execute this UNIX file, by entering X in front of it, and specify a run method of Option 2:
Login Shell.
__ 26. Execute the UNIX date command under the shell:
__ a. Return to the TSO option 6 Command prompt. (you can use ‘start’ to initialize a new
ISPF screen session).
__ b. Enter OMVS to invoke the shell.
__ c. Enter unix command 'date', then enter command 'date1' or '. date1' (with a dot)
__ d. Enter unix command ‘ls -al’
__ e. What are the permission bits of date1 ? ____________________
__ f. Change the permission bits to 444: ‘chmod 444 date1’
__ g. and try to execute date1 again.
EXempty
Questions
EXempty
Section 5: Optional: Create a hierarchical file system
__ 27. Go into the ISHELL.
__ 28. List file systems that are already mounted.
Look under the action File_systems on the action bar. Select mount table
__ 29. List the mount point of a mounted file system.
__ a. Choose a file system to display from the list of mounted file systems.
__ b. Look for an action that will display information about the file system.
The mount point of the root file system / is determined by displaying the Attributes (A) of the system
name OMVS2.SYSPLEX.ROOT
Note
__ 30. Use the ISHELL to allocate a new file system called userid.OMVS.HFS. Allocate one
cylinder for primary and one cylinder for secondary space.
__ a. Use the action File_systems on the action bar. Select 2. New HFS.
__ 31. List the contents of your home directory.
__ 32. Create a directory called dir1 with perm bits 666
EXempty
__ 35. Delete file file3.
__ a. When the panel to confirm the deletion is displayed, press the Enter key to confirm that
you want to delete the file and the file will be deleted.
__ 36. Find the string Test in the file file9, and call the output file FINDSTR1 in your home
directory.
A panel is displayed where you can specify a path name for the output file.
Another panel will be displayed where you can enter the text strings to be searched for.
__ 37. Enter ? in front of current (dot) dir ‘,’ , then use option 10. Find (F)
__ 38. Find the string test in your home directory and call the output file FINDSTR2 in the same
directory.
The action for this is similar to the previous task, except that this is for a directory.
Note
When searching a file, only the selected file is searched, and the output contains the lines of the file
that match the search criteria. When searching a directory, all files in this and lower directories are
searched, and the output contains the directories and files searched as well as the lines of each file
that matched the criteria.
Note
A good tip: Since file names can be up to 255 characters, referencing files relative to a working
directory can potentially save a lot of typing.
__ 41. Create a new directory in your home directory called LABS. Use these permissions:
__ a. Owner: Read and write
__ b. Group: Read and search
__ c. Other: Read
__ d. Creating a new directory is similar to creating a new file.
__ e. Check the permission bits and set them according to the exercise instructions. Use the
Help key to find out what the numbers mean.
EXempty
__ 42. Try to create a new file called LAB2A (Upper case) in the LABS directory.
Creating a new file was done in a previous step.
__ 43. Change the permission bits for the LABS directory to allow the owner to list the directory and
add new files in it.
__ a. Edit the mode fields to change the permission bits.
Questions
Q4: What is the permission expressed in octal value that allows this? _____________________
__ 44. Try again to create a new file called lab2a (Lower Case) in the LABS directory. It is a
different file, as unix is case sensitive (not like MVS dataset names which must always be
treated as upper case).
See previous instructions if you don't remember how to create a new file, or use F1 to get
help.
__ 45. Write a few lines of text in the new file.
__ a. Choose the Edit action to edit a file.
__ 46. Copy members PROG1, PROG2, PROG3 from the z/OS PDS called
D80WW.ES10V15.OMVS.LABS into your home directory and add the suffix c to the files.
On the panel where you specify the name of the PDS (between single quotes !) and some
copy options, you can also specify a suffix for the files that will be copied.
__ 47. Create a new directory called NEWDIR in your home directory.
__ a. Set the permissions value to 755.
__ 48. Compare the contents of directories LABS and NEWDIR.
If you have time, try any other action that you would like to try, or some actions you would like to
practice more.
Below are some additional optional exercises to get you more familiar with the ISPF UNIX shell
environment.
EXempty
Placing the cursor under any of the actions listed on the action bar and pressing the Enter
key, results in a pop-up window (also called pop-up menu or pull-down menu) for that action
being displayed. The window shows a list of actions that can be chosen.
Use the help key (PF1) on any field if you do not know what to do.
__ 50. Locate the actions, which can be done for the File pull down.
__ 51. The attributes for a file or directory can be displayed:
__ a. In Menu File, select 2 to display attributes of current file or directory. Note the use of F8
and F7 to scroll display.
__ b. In Command Line, use command A to display attributes of current file or directory. Note
the use of F11 to go to command line.
Questions
__ 53. Display (list) the contents of the directory bin in the root file system.
__ 54. Find the directory bin on the root directory list and choose the option to list its contents.
__ 55. Sort the directory list just displayed. Sort items by size, then sort by last change date. For
better viewing, make sure you enabled fields display in the directory list, by going back to
primary menu, then options, then dir list, and enable the fields to display permission bits
(octal display only), change time, owner, and size.
EXempty
__ 56. Go back to root directory list (/); enter the command sort in the command line, and select
Sort by size (or tab to Commands) then option 2. Sort...
__ 57. Sort can be done in two levels on:
▪ Default, File name mixed case, File name, File type, Permissions, Size, Owner, and Change
time.
▪ You can also put the cursor on any of the column titles to sort on the wanted criteria, and
press Enter; try it for the Changed-GMT, Size, and file name.
Default sort sequence is file name mixed case. The default can be changed by selecting
F10, then select Options, then select 1 for Directory List, then select View/Change sort
options.
Questions
__ 60. If you want to display the content of /dev as a directory and not the content of the symlink
(it points to $SYSNAME/dev), you must append / (forward slash) after /dev, and specify
/dev/; try it now; it should display some special files like null, random, console.
__ 61. Create some new files called NEWFILE1, NEWFILE2.... in the /u/es10/students/tsozxxx
directory, where tsozxxx is your TSO user ID.
__ 62. To create a new file, go back to the main ISHELL panel, input the file name on the path
name (example: /u/es10/students/tsozxxx/newfile2), then press Enter (or select option
File, then 1 (New)).
__ a. Use file type regular file, and set the permission bits to 755.
__ b. Select file source for regular file as edit.
EXempty
__ 63. There is also another easier way to create a new file or directory using the ISHELL, by
entering n in front of the . special directory (see example below).
You are then prompted to create either a file (2) or directory (1) or else.
__ 64. Display the contents of your /u/es10/students/tsozxxx directory now to see the new files
there. Do this the same way as you listed the root directory.
Questions
__ 65. Edit one of the new files and add a few lines of text in the file.
The editor is the ISPF editor
PF3 saves the file and returns from editing the file.
Note
The following items create three new files. Each create uses a different set of panels. This
demonstrates that there are frequently several ways to accomplish a task in the ISHELL.
__ 66. Create a new file called: /u/es10/students/tsozxxx/test1 using any method you want,
for instance:
▪ Enter the absolute path name on the path name line:
/u/es10/students/tsozxxx/test1
▪ On the Action bar, select File.
▪ On the pull-down menu, select New.
▪ Set permission bits to: 755.
__ 67. Create a new file called: /u/es10/students/tsozxxx/test2
__ 68. Enter the absolute path name on the path name line: /u/es10/students/tsozxxx/test2
__ 69. Press the Enter key.
__ 70. Set permission bits to 755 and select option to create a regular file.
EXempty
__ 71. Create a new file called: /u/es10/students/tsozxxx/test3
__ 72. Enter the absolute path name on the path name line: /u/es10/students/tsozxxx/test3
__ 73. On the command line, enter: n (the action code for creating a new file).
__ 74. Set permission bits to 755 and select option to create a regular file.
__ 75. Try to find in which file system all your UNIX files have been created:
__ a. In your /u/es10/students/tsozxxx, select any file, and enter U file system, or tab to
File, then select opt15 (U).
__ 76. Enable directory list reference.
__ 77. Go back to Options on primary menu, then option 5 Advanced, then select / Enable
directory reference list.
__ 78. Now go to Tools, then select option 4. Reference list (REF).
You have a direct shortcut to any of the previously used directories, which you can select
using S or / (forward slash).
You can now use the ref command on any panel to display the reference list.
Note: the list is initially empty since it was just enabled.
ISPF provides a direct interface to edit/view/browse UNIX files and directories. This
interface is called UDLIST. In the VIEW (opt1) and EDIT (opt2) panels of ISPF, you can now
enter UNIX files and directory paths directly in the Other Partitioned, Sequential or VSAM
Data Set, or z/OS UNIX file, instead of specifying an MVS classical non-UNIX data set.
__ 79. Go to ISPF primary option 2 (EDIT), and enter /u/es10/students as the path name.
__ 80. Now select your own directory, by entering L in front of tsozxxx as the path name.
The same UDLIST interface is available in ISPF option 3.17; go to ISPF 3.17; you can use
the REFLIST panel option to retrieve and work with one of the last used UNIX directories, or
EXempty
specify a starting directory name in the path name; try it with your home directory
/u/es10/students/tsozxxx.
Note that in the Options you can change the column arrangement, as well as the width of
columns.
__ 81. You can also run USS commands from TSO option 6 with the OSHELL and execute TSO
command OSHELL to run various shell commands with the OSHELL. Try the following
under TSO command option 6:
__ a. OSHELL ps -ef
__ b. OSHELL ls -al
__ c. OSHELL id
__ d. OSHELL df
EXempty
Exercise answers
Section 1: ISHELL introduction
Q1: What character on the File System and Setup actions indicates certain options require
superuser or the special attribute for full function?
A1: An asterisk.
Section 3: Customize ISHELL
Q2: What is the default action for character special files?
A2: Attributes or A.
Section 4: UNIX directory list
Q3: Was it successful?
A3: No, because it is no longer executable (does not have the execute bit on).
Optional sections:
Section 5: Optional: Managing files
You also need search permission to add a new file to a directory.
Q4: What is the permission expressed in octal value that allows this?
A4: Octal 7 allows Read + Write + Search or Execute. The new permissions should be 754.
Section 7: Optional: Introduction to the file system
You also need search permission to add a new file to a directory.
Q5: What are the ways to display the contents of a directory?
A5: Here are some of the ways:
▪ Press b. Listing the directory is the default action, if a directory is displayed.
▪ Use PF10 tab twice, and then 1.
▪ Use PF11, and l (for list).
Q6: Is it a file or directory? Or something else?
A6: No, it is something else. It is a symbolic link.
Q7: Can you browse an empty file this way?
A7: No.
Exercise hints
Section 2: Introduction to the file system
Step 4: Forgot your home directory path name? Issue the following ISHELL command: Sh echo
$HOME
EXempty
Step 16: On the Action Bar, select Options, then select Command line on...
glos
Glossary
Synonym for: This indicates that the term has
the same meaning as a preferred term, which is
This glossary includes terms and definitions defined in its proper place in the glossary.
from:
Synonymous with: This is a backward
• The American National Standard Dictionary reference from a defined term to all other terms
for Information Systems, ANSI that have the same meaning.
X3.172-1990, copyright 1990 by the
American National Standards Institute See: This refers the reader to multiple-word
(ANSI). Copies can be purchased from the terms that have the same last word.
American National Standards Institute, 11 See also: This refers the reader to terms that
West 42nd Street, New York, New York have a related, but not synonymous, meaning.
10036. Definitions are identified by the
symbol (A) after the definition. Deprecated term for: This indicates that the
term should not be used. It refers to a preferred
• The ANSI/EIA Standard— 440-A, Fiber term, which is defined in its proper place in the
Optic Terminology. Copies can be glossary.
purchased from the Electronic Industries
Association, 2001 Pennsylvania Avenue, Numerics
N.W., Washington, DC 20006. Definitions
are identified by the symbol (E) after the
definition.
A
• The Information Technology Vocabulary,
developed by Subcommittee 1, Joint AC:
Technical Committee 1, of the International See Alternating Current.
Organization for Standardization and the Access:
International Electrotechnical Commission
1) To obtain computing services or data.
(ISO/IEC JTC1/SC1). Definitions of
2) In computer security, a specific type of
published parts of this vocabulary are
interaction between a subject and an object that
identified by the symbol (I) after the
results in flow of information from one to the
definition; definitions taken from draft
other.
international standards, committee drafts,
and working papers being developed by Access-any mode:
ISO/IEC JTC1/SC1 are identified by the One of the two access modes that can be set
symbol (T) after the definition, indicating for the storage system during initial
that final agreement has not yet been configuration. It enables all Fibre
reached among the participating National Channel-attached host systems with no defined
Bodies of SC1. access profile to access all logical volumes on
• The Network Working Group Request for the storage system. With a profile defined in
Comments: 1208. DS8000 Storage Management GUI for a
particular host, that host has access only to
The following cross-references are used in this volumes that are assigned to the WWPN for
glossary: that host. See also pseudo host and worldwide
Contrast with: This refers to a term that has an port name.
opposed or substantively different meaning.
AOS: ASIC:
See Assist On Site. See Application Specific Integrated Circuit.
APAR (Authorized Program Analysis Assigned storage:
Report): The space that is allocated to a volume and that
A request for correction of a problem caused by is assigned to a port.
a defect in a current release of a program
unaltered by the user. Assist On Site (AOS):
Application programming interface (API): The components of Assist On-site (AOS)
interact together to start and maintain a support
Is a set of routines, protocols, and tools for
session between the support engineer and the
building software applications. An API specifies
customer.
how software components should interact and
APIs are used when programming graphical
user interface (GUI) components.
request for primary or secondary space for data typically smaller and faster than the primary
sets that are eligible for the cylinder-managed memory or storage medium. In addition to
space. If not enough cylinder-managed space residing in cache memory, the same data also
is available, then the system uses the resides on the storage devices in the storage
track-managed space or will use both areas. system.
The breakpoint value is expressed in cylinders.
Cache miss:
When the size of a disk space request is less
An event that occurs when a read operation is
than the breakpoint value, the system prefers to
sent to the cluster, but the data is not found in
use the track-managed area. If not enough
cache. Contrast with cache hit.
space is available there, then the system will
use the cylinder-managed space, or will use Call home:
both areas. A communication link established between the
storage product and a service provider. The
BSM:
storage product can use this link to place a call
See Battery Service Module (BSM) set. to IBM or to another service provider when it
Business Class configuration: requires service. With access to the machine,
service personnel can process service tasks,
A high-density, high-performance storage
such as viewing error logs and problem logs or
configuration that includes standard disk
initiating trace and dump retrievals. See also
enclosures and high-performance flash heartbeat and Remote Technical Assistance
enclosures and is optimized and configured for Information Network (RETAIN).
cost, by minimizing the number of device
adapters and maximizing the number of storage Capacity Backup (CBU):
enclosures that are attached to each storage Provides the ability to replace model capacity or
system. specialty engines to a backup server in the
event of an unforeseen loss of server capacity
C because of an emergency.
Cache: Capacity Upgrade on Demand (CUoD):
Memory used to improve access times to Activates additional processors and memory
instructions, data, or both. Data that resides in units on selected servers by purchasing a
cache memory is normally a copy of data that permanent processor or memory unit activation
resides elsewhere in slower, less expensive feature. CUoD adds capacity for new
storage, such as on a disk or on another workloads, which enables the server to adapt to
network node. unexpected performance demands.
Cache fast write: Cascading:
A form of the fast-write operation in which the 1) Connecting network controllers to each other
storage server writes the data directly to cache, in a succession of levels to concentrate many
where it is available for later destaging. more lines than a single level permits.
Cache hit: 2) In high-availability cluster system
MultiProcessing (HACMP), pertaining to a
An event that occurs when a read operation is
system configuration in which the system node
sent to the cluster, and the requested data is
with the highest priority for a particular resource
found in cache. Contrast with cache miss.
acquires the resource if the primary node fails.
Cache memory: The cluster system node relinquishes the
Memory, typically volatile memory, that a resource to the primary node upon reintegration
storage server uses to improve access times to of the primary node into the system.
instructions or data. The cache memory is
Cataloged procedure:
Concurrent installation of licensed machine and synchronizes the operation of such devices
code: with the operation of the system as a whole.
Process of installing Licensed Internal Code on 2) For IBM Z, a storage server with FICON or
a DS8000 series while applications continue to OEMI interfaces. The control unit adapts a
run. native device interface to an I/O interface that
an IBM Z Systems host system supports.
Configure:
3) The portion of the storage system that
In storage, to define the logical and physical supports the attachment of emulated count key
devices, optional features, and program data devices over ESCON, FICON, or OEMI
products of the input/output subsystem through interfaces. See also cluster.
the user interface that the storage system
provides for this function. Control-unit image:
In mainframe computing, a logical subsystem
Configuration task commands:
that is accessed through an ESCON I/O
Used for creating, modifying, and deleting interface. One or more control-unit images exist
resources.
in each control unit. Each image appears as an
Consistency group: independent control unit, but all control-unit
A group of volumes participating in FlashCopy images share a common set of hardware
relationships in a logical subsystem, across facilities. The DS8000 series can emulate
logical subsystems, or across multiple storage 3990-3, TPF, 3990-6, or 2105 control units.
systems that must be kept in a consistent state
to ensure data integrity. Control-Unit-Initiated Reconfiguration
(CUIR):
Consistency group interval time:
A software mechanism that the DS8000 series
The value in seconds that indicates the length uses to request that an operating system of IBM
of time between the formation of consistency Z host verify that one or more subsystem
groups. resources can be taken offline for service. The
Consistent copy: DS8000 series can use this process to
A copy of a data entity (a logical volume, for automatically vary channel paths offline and
example) that contains the contents of the online to facilitate bay service or concurrent
entire data entity at a single instant in time. code installation. Depending on the operating
system, support for this process might be
Console: model-dependent, might depend on the IBM
A user interface to a server, for example, the Enterprise Storage Server Subsystem Device
interface provided on a personal computer. See Driver, or might not exist.
also Hardware Management Console.
Copy Services:
Control path: A collection of optional software features, with a
The route that is established from the master web-browser interface, that is used for
storage system to the subordinate storage configuring, managing, and monitoring
system when more than one storage system data-copy functions.
participates in a Global Mirror session. If there
is only one storage system (the master) in the Core:
Global Mirror session, no control path is See processor.
required. Count field:
Control unit: The first field of a Count Key Data (CKD)
1) A device that coordinates and controls the record. This 8-byte field contains a 4-byte track
operation of one or more input/output devices, address (CCHH). It defines the cylinder and
head that are associated with the track, and a
1-byte record number (R) that identifies the Allows you to define how z/OS is to manage
record on the track. It defines a 1-byte key coupling facility resources.
length that specifies the length of the record's
CP:
key field (0 means no key field). It defines a
See Central Processor.
2-byte data length that specifies the length of
the record's data field (0 means no data field). CP Assist for Cryptographic Function
Only the end-of-file record has a data length of (CPACF):
zero.
Is a set of cryptographic instructions providing
Count Key Data (CKD): improved performance.
In mainframe computing, a data-record format CPC:
employing self-defining record formats in which
See Central Processing Complex.
each record is represented by up to three fields:
a count field that identifies the record and CPU:
specifies its format, an optional key field that See Central Processing Unit.
identifies the data area contents, and an
CRC:
optional data field that typically contains the
See Cyclic Redundancy Check.
user data. For CKD records on the storage
system, the logical volume size is defined in Cross-cluster communication:
terms of the device emulation mode (3390 or DS8880 uses PCIe paths between the I/O
3380 track format). The count field is always 8 enclosures to provide the cross-cluster (XC)
bytes long and contains the lengths of the key communication between CPCs. This
and data fields, the key field has a length of 0 to configuration means that no separate path is
255 bytes, and the data field has a length of 0 between the XC communications and I/O traffic,
to 65 535 or the maximum that will fit on the which simplifies the topology. During normal
track. See also data record. operations, the XC communication traffic uses
Couple Data Set (CDS): a small portion of the overall available PCIe
bandwidth (less than 1.7%) so that the XC
Couple data sets provides a central shared
communication traffic has a negligible effect on
repository of data that needs to be visible to
I/O performance.
every system in the sysplex. The CDS and all
accesses to the data therein are managed by
XCF. Cross-System Coupling Facility (XCF):
Is a component of z/OS that manages
Coupling Facility (CF):
communications between applications in a
Is a piece of computer hardware which allows sysplex. Applications may be on the same
multiple processors to access the same data. A system or different systems.
Parallel Sysplex relies on one or more Coupling Systems communicate using messages
Facilities (CFs). transported by one of two mechanisms:
Coupling Facility Control Code (CFCC): Dedicated channel-to-channel links (CTC links)
and Structures in a Coupling Facility, only
Is an IBM licensed Internal Code that always
available in Parallel Sysplex, not in standard
runs under an LPAR, regardless of whether the
sysplex.
CF is in a standalone CPC or in a general
purpose CPC. Cross-System Extended Services (XES):
The process of eliminating gaps, empty fields, any, or all, attached host systems. To use this
redundancies, and unnecessary data to shorten capability, the host program must be designed
the length of records or blocks. to support data that it is sharing.
Data Facility Storage Management DC:
Subsystem data set services (DFSMSdss) See Direct Current.
utilities:
DFSMSdss is a component of DFSMS (Data DC-UPS (Direct Current-Uninterruptible
Facility Storage Management Subsystem). It is Power Supply:
used to move and replicate data, manage Converts incoming AC line voltage to rectified
storage space efficiently, backup and recover AC, and contains an integrated battery
data, and convert data sets and volumes. subsystem.
Data field: Decrypt:
The optional third field of a Count Key Data In Cryptographic Support, to convert ciphertext
(CKD) record. The count field specifies the into plaintext. See also encrypt.
length of the data field. The data field contains
Decryption:
data that the program writes.
In computer security, the process of
Data record: transforming encoded text or ciphertext into
The basic unit of IBM Z storage on a DS8000, plaintext. The process of decoding data that
also known as a Count Key Data (CKD) record. has been encrypted into a secret format.
Data records are stored on a track. The records Decryption requires a secret key or password.
are sequentially numbered starting with 0. The
DELETE command (In UNIX):
first record, R0, is typically called the track
descriptor record and contains data that the Use the DELETE command to delete one or
operating system normally uses to manage the more data set entries or one or more members
track. See also count-key-data and fixed-block of a partitioned data set.
architecture. Demote:
Data set FlashCopy: To remove a logical data unit from cache
For IBM Z hosts, a feature of FlashCopy that memory. A storage server demotes a data unit
indicates how many partial volume FlashCopy to create room for other logical data units in the
relationships are active on a volume. cache or because the logical data unit is not
valid. The storage system must destage logical
Data space / Hiperspace: data units with active write units before they can
A data space or hiperspace contains only user be demoted. See also destage.
data or user programs stored as data.
Dense Wavelength Division Multiplexing
Data Set Command Line Interface (DS CLI): (DWDM):
A software package that allows open systems Is a technology that puts data from different
hosts to invoke and manage Copy Services sources together on an optical fiber, with each
functions as well as to configure and manage signal carried at the same time on its own
all storage units in a storage complex. The DS separate light wavelength. Using DWDM, up to
CLI is a full-function command set. 80 (and theoretically more) separate
wavelengths or channels of data can be
Data sharing: multiplexed into a lightstream transmitted on a
The ability of multiple host systems to single optical fiber. Each channel carries a Time
concurrently utilize data that they store on one Division Multiplexed (TDM) signal. In a system
or more storage devices. The storage system with each channel carrying 2.5 Gbps (billion bits
enables configured storage to be accessible to per second), up to 200 billion bits can be
delivered a second by the optical fiber. DWDM
is also sometimes called Wave Division response is a display of basic status information
Multiplexing (WDM). about a device, a group of devices, or storage
Destage: control units. Because the DEVSERV command
causes the system to issue an I/O request on
The storage system stages incoming data into
paths to a device or devices, the resulting
cache and then destages it to disk.
display reflects the current physical state of the
Device: path.
For IBM Z, a disk drive.
DFSMSdss:
Device Adapter (DA): See Data Facility Storage Management
A physical component of DS8000 series that Subsystem data set services utilities.
provides communication between the clusters
DFSORT:
and the storage devices. DS8000 series has
DFSORT is IBM’s high-performance sort,
eight device adapters that it deploys in pairs,
merge, copy, analysis, and reporting product for
one from each cluster. Device adapter pairing
z/OS.
enables DS8000 series to access any disk
drive from either of two paths, providing fault DIMM:
tolerance and enhanced availability. See Dual In-line Memory Module.
Device address: Direct Access Device Space Management
For IBM Z, the field of an ESCON device-level (DADSM):
frame that selects a specific device on a Performs the functions required to allocate or
control-unit image. free space on a Direct Access Storage Device
(DASD). The DADSM routines control
Device ID:
allocation of space on DASD volumes, and
The unique two-digit hexadecimal number that provide information on volume contents on
identifies the logical device. request. The information is kept by DADSM in
its own data set which it maintains for each
device interface card: volume: the Volume Table Of Contents (VTOC).
A physical subunit of a storage cluster that
Direct Access Storage Device (DASD):
provides the communication with the attached
1) A mass storage medium on which a
device drive modules.
computer stores data.
Device number: 2) A disk device.
For IBM Z, a four-hexadecimal-character Direct Current (DC):
identifier, for example 13A0, that the systems Is an electrical current, which flows consistently
administrator associates with a device to in one direction.
facilitate communication between the program
and the host operator. The device number is Disk Drive Module (DDM):
associated with a subchannel. A Field Replaceable Unit (FRU) that consists of
a single disk drive and its associated
Device Support Facility (ICKDSF):
packaging.
Is the utility used to install, initialize, and
maintain IBM DASD. It can be run as a Disk enclosure:
standalone job or under a system such as The DS8000 data disks are installed in
z/OS. ‘ICK’ is not an acronym for anything. enclosures called disk enclosures or storage
enclosures. These disk enclosures are installed
DEVSER command:
in pairs.
A z/OS command used to request a display of
the status of DASD and tape devices. The Disk group:
A collection of 4 disk drives that are connected See Domain Name System.
to the same pair of IBM Serial Storage adapters
Domain:
and can be used to create a RAID array. A disk
1) That part of a computer network in which the
group can be formatted as count key data or
data processing resources are under common
fixed block, and as RAID or non-RAID, or it can
control.
be left unformatted. A disk group is a logical
2) In TCP/IP, the naming system used in
assemblage of disk drives.
hierarchical networks.
Disk Operating System (DOS):
Domain Name System (DNS):
Is an operating system that runs from a hard In TCP/IP, the server program that supplies
disk drive. name-to-address translation by mapping
Disk scrubbing: domain names to Internet addresses. The
The DS8000 periodically reads all sectors on a address of a DNS server is the Internet address
disk. This reading is designed to occur without of the server that hosts the DNS software for
any interference with application performance. the network.
If Error Correction Code (ECC) detects DOS:
correctable bad bits, the bits are corrected
See Disk Operating system.
immediately. This ability reduces the possibility
of multiple bad bits accumulating in a sector Dotted decimal notation:
beyond the ability of ECC to correct them. If a A convention used to identify IP addresses. The
sector contains data that is beyond ECC's notation consists of four 8-bit numbers written in
ability to correct, RAID is used to regenerate base 10. For example, 9.113.76.250 is an IP
the data and write a new copy onto a spare address that contains the octets 9, 113, 76, and
sector of the drive. This scrubbing process 250.
applies to drives that are array members and
DRAM:
spares.
See Dynamic Random Access Memory.
Disk Storage Feature Activation (DSFA):
Drawer:
The Data Storage Feature Activation (DSFA)
application provides feature activation codes A unit that contains multiple drive modules and
and license keys to technically activate provides power, cooling, and related
functions acquired for IBM storage products. interconnection logic to make the drive modules
accessible to attached host systems.
Distributed Network Block Device (DNBD):
Drive:
Uses UDP as its transport protocol, and thus
supports multicasting, client-side caching, and A drive can be either a magnetic drive or a Solid
server redundancy. It only supports RO exports. State Drive (SSD).
A field replaceable unit that consists of a single
Distributed ledger technology (DLT): drive and its associated packaging.
Allow their users to store and access
DS CLI:
information relating to a given set of assets and
their holders in a shared database of either See Data Set Command Line Interface.
transactions or account balances. This DS Network Interface (DSNI):
information is distributed among users who See Enterprise Storage Server Network
could then use it to settle their transfers of, for Interface.
example, securities and cash, without needing
to rely on a trusted central validation system. DS8000 series:
See IBM DS8000.
DNS:
Duplex: E
1) Regarding Copy Services, the state of a
volume pair after Remote Mirror and Copy has EAM:
completed the copy operation and the volume See Extent Allocation Method.
pair is synchronized. EAV:
2) In general, pertaining to a communication See Extended Address Volume.
mode in which data can be sent and received at
the same time. Easy Tier:
Is a built-in dynamic data relocation feature that
Dynamic Address Translation (DAT): allows the host-transparent movement of data
When a virtual address is used by a CPU to among the storage system resources. This
access main storage, it is first converted by feature significantly improves configuration
Dynamic Address Translation (DAT) to a real flexibility and performance tuning and planning.
address and then by prefixing, to an absolute EC:
address. See Engineering Change.
Dynamic CHPID Management (DCM): ECC:
Provides the ability to have the system See Error Correction Code.
dynamically manage ESCON and FICON
Bridge (FICON converter, or FCV) connected to See Elliptic Curve Cryptography.
DASD subsystems, based on the current work ECKD:
load and its service goals.
See Extended Count Key Data.
Dynamic Partition Manager (DPM):
eDRAM:
Is a guided management interface in the HMC
See Embedded DRAM.
that can be used to define the IBM Z hardware
and virtual infrastructure, including integrated ElectroStatic Discharge (ESD):
dynamic I/O management that runs a KVM for An undesirable discharge of static electricity
IBM Z Systems environment. that can damage equipment and degrade
Dynamic Random Access Memory (DRAM): electrical circuitry.
A type of memory that is typically used for data Elliptic Curve Cryptography (ECC):
or program code that a computer processor Cryptographic capabilities that are designed to
needs to function. DRAM is a common type of provide public key support for constrained
Random Access Memory (RAM) used in digital environments.
Personal Computers (PCs), workstations and Embedded DRAM (eDRAM):
servers. Random access allows the PC Is Dynamic Random Access Memory (DRAM)
processor to access any part of the memory integrated on the same die or Multi-Chip
Module (MCM) of an Application-Specific This term refers to a volume with more than
Integrated Circuit (ASIC) or microprocessor. 65520 cylinders. Only 3390 Model A devices
eDRAM's cost-per-bit is higher when compared can be an EAV.
to equivalent standalone DRAM chips used as
Engineering change:
external memory, but the performance
An update to a machine, part, or program.
advantages of placing eDRAM onto the same
chip as the processor outweigh the cost Enterprise Service Bus (ESB):
disadvantages in many applications.
It implements a communication system
Emergency Power Off (EPO): between mutually interacting software
A means of turning off power during an applications in a service-oriented architecture
emergency, usually a switch. (SOA)
EMIF: Enterprise Systems Architecture/390
See ESCON Multiple Image Facility. (ESA/390):
An IBM architecture for mainframe computers
Enclosure:
and peripherals. Processor systems that follow
A unit that houses the components of a storage the ESA/390 architecture include the ES/9000
subsystem, such as a control unit, disk drives, family. See also z/Architecture.
and power source.
Enterprise Class configuration:
Encrypt:
A high-density, high-performance storage
In Cryptographic Support, to systematically configuration that includes standard disk
scramble information so that it cannot be read enclosures and high-performance flash
without knowing the coding key. See also enclosures and is optimized and configured for
decrypt. performance and throughput, by maximizing
Encryption: the number of device adapters and paths to the
In computer security, the process of storage enclosures.
transforming data into an unintelligible form in Enterprise Storage Server Network Interface
such a way that the original data either cannot (ESSNI):
be obtained or can be obtained only by using a Is the logical server that communicates with the
decryption process. DS GUI server and interacts with the two
Encryption algorithm: processor nodes of the DS8880. Also referred
to as DS Network Interface (DSNI).
An algorithm that scrambles the data so that it
becomes unreadable to someone who Enterprise Systems Connection (ESCON):
intercepts it. 1) An IBM Z computer peripheral interface. The
Encryption group: I/O interface uses IBM Z logical protocols over
a serial interface that configures attached units
Indicates whether encryption is enabled (select
to a communication fabric.
1) or disabled (select None) for ranks.
2) A set of IBM products and services that
Enhanced Network Block Device (ENBD): provide a dynamically connected environment
Is being pushed along by one active developer; within an enterprise.
there is a mailing list that sees a couple of Entropy Encoding:
messages a month. ENBD extends NBD
adding an automatic restart if the connection is Is a lossless data compression scheme that is
lost, authentication, and support for removable independent of the specific characteristics of
media. the medium.
See Emergency Power Off. each LPAR with its own channel-subsystem
image.
ERDS:
See Error-Recording Data Set. EsconNet:
In the DS8000 Storage Management GUI, the
Error Correction Code (ECC):
label on a pseudo host icon that represents a
Checks read or transmitted data for errors and
host connection that uses the ESCON protocol
corrects them as soon as they are found. ECC
and that is not completely defined onDS8000
is similar to parity checking except that it
series. See also pseudo host and access-any
corrects errors immediately upon detection.
mode.
Error-Recording Data Set (ERDS):
ESD:
On IBM Z hosts, a data set that records
See ElectroStatic Discharge.
data-storage and data-retrieval errors. A
Service Information Message (SIM) provides ESE:
the error information for the ERDS. See Extent Space-Efficient.
Error recovery procedure: ESSNet:
Procedures designed to help isolate and, where See IBM Enterprise Storage Server Network.
possible, to recover from errors in equipment.
ESSNI:
The procedures are often used in conjunction
See Enterprise Storage Server Network
with programs that record information on
Interface.
machine malfunctions.
Evaluation Assurance Level (EAL):
SSB:
The Evaluation Assurance Level (EAL1 through
See Enterprise Service Bus. EAL7) of an IT product or system is a numerical
ESCD: grade assigned following the completion of a
See ESCON Director. Common Criteria security evaluation, an
international standard in effect since 1999. The
ESCON: increasing assurance levels reflect added
See Enterprise System Connection. assurance requirements that must be met to
ESCON channel: achieve Common Criteria certification. The
intent of the higher levels is to provide higher
An IBM Z channel that supports ESCON
confidence that the system's principal security
protocols.
features are reliably implemented. The EAL
ESCON Director (ESCD): level does not measure the security of the
An I/O interface switch that allows the system itself, it simply states at what level the
interconnection of multiple ESCON interfaces in system was tested.
a distributed-star topology. Extended Count Key Data (ECKD):
ESCON host systems: An extension of the Count Key Data (CKD)
IBM Z hosts that attach to the DS8000 series architecture.
with an ESCON adapter. Such host systems Extended Addressing Space (EAS):
run on operating systems that include z/OS,
On an extended address volume, this term
VSE, TPF, or versions of VM.
refers to cylinders with addresses that are
ESCON Multiple Image Facility (EMIF): equal to or greater than 65,536. These cylinder
For IBM Z, a function that enables LPARs to addresses are represented by 28-bit cylinder
share an ESCON channel path by providing numbers.
Extended Address Volume (EAV):
A volume with more than 65,520 cylinders. An in the storage system fails. See also cluster and
extended address volume increases the failback.
amount of addressable DASD storage per
volume beyond 65,520 cylinders by changing Fast File System (FFS):
how tracks on ECKD (Extended Count Key FFS invented cylinder groups, which break the
Data) volumes are addressed. disk up into smaller chunks, with each group
having its own inodes and data blocks.
Extent:
A continuous space on a disk that is occupied Fast write:
by or reserved for a particular data set, data A write operation at cache speed that does not
space, or file. The unit of increment is a track. require immediate transfer of data to a disk
See also multiple allegiance and parallel drive. The subsystem writes the data directly to
access volumes. cache, to nonvolatile storage, or to both. The
data is then available for destaging. A fast-write
Extent Allocation Method (EAM):
operation reduces the time an application must
Defines how volumes extents are allocated on
wait for the I/O operation to complete.
the ranks in the Extent Pool.
FBA:
Extent pool:
See Fixed-Block Architecture.
A group of extents. See also extent.
FC:
Extent Space-Efficient:
See feature code.
A thin-provisioning method in which capacity is
Note: FC is a common abbreviation for Fibre
allocated in a performance efficient manner on
Channel in the industry, but the DS8000
a per extent basis in pool or ESE repository if
customer documentation library reserves FC for
one is created on an as-needed basis.
feature code.
Extent Space Efficient (ESE) volumes:
FC:
Are the actual thin provisioned volumes that
See Fibre Channel.
can be used by host applications.The dynamic
allocation increments for ESE logical volumes FC-AL:
is based on the same existing 1 GB extents See Fibre Channel Arbitrated Loop.
used for standard volumes.
FCP:
F See Fibre Channel Protocol.
FCS:
Fabric:
See Fibre Channel standard.
In Fibre Channel technology, a routing
structure, such as a switch, receives addressed Feature Code (FC):
information and routes to the appropriate A code that identifies a particular orderable
destination. A fabric can consist of more than option and that is used by service personnel to
one switch. When multiple Fibre Channel process hardware and software orders.
switches are interconnected, they are said to be Individual optional features are each identified
cascaded. by a unique feature code.
Failback: Fibre Channel (FC):
Pertaining to a cluster recovery from failover A data-transmission architecture based on the
following repair. See also failover. ANSI Fibre Channel standard, which supports
full-duplex communication. DS8000 series
Failover:
supports data transmission over fiber-optic
Pertaining to the process of transferring all
cable through its Fibre Channel adapters. See
control to a single cluster when the other cluster
also Fibre Channel Protocol and Fibre Channel hosts that run LINUX on a Fibre Channel
standard. Protocol z/OS channel.
Fibre Channel Arbitrated Loop (FC-AL): FICON:
An implementation of the Fibre Channel See Fibre Channel CONnection.
Standard that uses a ring topology for the
FiconNet:
communication fabric. Refer to American
In the DS8000 Storage Management GUI, the
National Standards Institute (ANSI)
label on a pseudo host icon that represents a
X3T11/93-275. In this topology, two or more
host connection that uses the FICON protocol
Fibre Channel end points are interconnected
and that is not completely defined on DS8000
through a looped interface. This topology
series. See also pseudo host and access-any
directly connects the storage system to an open
mode.
systems host without going through a fabric
switch. Field Replaceable Unit (FRU):
Fibre Channel Connection (FICON): An assembly that is replaced in its entirety
when any one of its components fails. In some
A Fibre Channel communications protocol that
cases, a field replaceable unit might contain
is designed for IBM mainframe computers and
other field replaceable units.
peripherals. It connects the storage system to
one or more IBM Z hosts using a FICON z/OS File Transfer Protocol (FTP):
channel either directly or through a FICON In TCP/IP, an application protocol used to
switch. transfer files to and from host computers. See
Fibre Channel Protocol (FCP): also Transmission Control Protocol/Internet
Protocol.
A protocol used in Fibre Channel
communications with five layers that define how Firewall:
Fibre Channel ports interact through their A protection against unauthorized connection to
physical links to communicate with other ports. a computer or a data storage system. The
FCP (Fibre Channel Protocol) supports access protection is usually in the form of software on a
to Small Computer System Interface (SCSI) gateway server that grants access to users who
peripheral devices. meet authorization criteria.
Fibre Channel Standard (FCS): Fixed Block Architecture:
An ANSI standard for a computer peripheral An architecture for logical devices that specifies
interface. The I/O interface defines a protocol the format of and access mechanisms for the
for communication over a serial interface that logical data units on the device. The logical data
configures attached units to a communication unit is a block. All blocks on the device are the
fabric. The protocol has two layers. The IP layer same size (fixed size). The subsystem can
defines basic interconnection protocols. The access them independently.
upper layer supports one or more logical
protocols (for example, FCP for SCSI command
protocols and SBCON for IBM Z command Flag parameter:
protocols). Refer to American National An integer flag that indicates whether the match
Standards Institute (ANSI) X3.230-199x. needs to be performed on the supplied project
Fibre Channel Switched Fabric (FC-SF): name or number.
An implementation of the Fibre Channel Flash cards:
Standard that connects the storage system to Are high2-IOPS (Input/Output Operations Per
one or more open systems hosts through a Second) class enterprise storage devices that
fabric switch or connects one or more z/OS are targeted at Tier 0, I/O-intensive workload
applications that can use a high level of microcode takes this idea one step further. It
fast-access storage. might choose to allow the hot spare to remain
where it has been moved, but it can instead
FlashCopy:
choose to migrate the spare to a more optimum
FlashCopy is an IBM feature supported on
position. This will be done to better balance the
various IBM storage devices that made it
spares across the DA pairs, the loops, and the
possible to create, nearly instantaneously,
disk enclosures.
point-in-time snapshot copies of entire logical
volumes or data sets. The copies are FMID:
immediately available for both read and write See Function Modification Identifier.
access.
Frame:
FlashCopy relationship:
The hardware support structure, covers, and all
A mapping of a FlashCopy source volume and electrical parts mounted therein that are
a FlashCopy target volume that allows a packaged as one entity for shipping.
point-in-time copy of the source volume to be
copied to the target volume. FlashCopy FREE command (In UNIX):
relationships exist from the time that you initiate Use the FREE command to release (deallocate)
a FlashCopy operation until the storage system previously allocated data sets or Hierarchical
copies all data from the source volume to the File System (HFS) files that you no longer
target volume or until you delete the FlashCopy need. You can also use this command to
relationship, if it is persistent. change the output class of SYSOUT data sets
to delete attribute lists, and to change the data
FlashCopy SE:
set disposition specified with the ALLOCATE
An optional feature of DS8880 series that command. There is a maximum number of data
allocates storage space on an ‘as-needed’ sets that can be allocated to you at any one
basis and uses only the required number of time.
tracks to write changed data during the lifetime
of the FlashCopy relationship. FRU:
See Field Replaceable Unit.
Flash Raid Adapter:
An adapter that manages external I/O FSP:
interfaces that use Fibre Channel protocols for See Flexible Service Processor.
host-system attachment. It is also used for FTP:
replicating data between storage systems.
See File Transfer Protocol.
Flexible Service Processor (FSP):
Full duplex:
Firmware that provides diagnostics,
See duplex.
initialization, configuration, run-time error
detection, and correction. FSP is what connects Full Disk Encryption (FDE):
the managed system to the Hardware Is the encryption of all data on a disk drive,
Management Console (HMC). including the program that encrypts the
bootable operating system partition. It is
Floating spare:
performed by disk encryption software or
When a DDM fails and the data it contained is
hardware that is installed on the drive during
rebuilt onto a spare, then when the disk is
manufacturing or from an additional software
replaced, the replacement disk becomes the
driver. FDE converts all device data into a form
spare. The data is not migrated to another
that can be only understood by the one who
DDM, such as the DDM in the original position
has the key to decrypt the encrypted data. An
the failed DDM occupied. The DS8000
authentication key is used to reverse
conversion and render the data readable. FDE A base-10 unit of measurement equal to
prevents unauthorized drive and data access. 1,000,000,000 bytes (10^9). A decimal gigabyte
(GB) is used as a measure of capacity. A binary
Fully provisioned:
gigabyte (or gibibyte [GiB]) is used as a
The volume capacity is entirely allocated at the
measure of memory.
time the volume is created. In this case, the
host to which the fully provisioned volume is Gibibyte (GiB):
attached owns the full capacity, therefore A base-2 unit of measurement equal to
consuming unused storage in the back-end 1,073,741,824 bytes (2^30).
system. Note: A GiB is used as a measure of memory
and is also known as a binary gigabyte.
Function Modification Identifier (FMID):
Gigapack:
An identifier that is used to identify a separate
Connects to the drive adapter (in DS8000)
product or function of a product.
through Fibre Channel protocol and converts to
Fuzzy copy: SAS protocol through the control card switch in
A function of the Global Copy feature wherein the RAID adapter.
modifications to the primary logical volume are
Global Copy:
performed on the secondary logical volume at a
An optional capability of the DS8000 remote
later time. The original order of update is not
mirror and copy feature that maintains a fuzzy
strictly maintained. See also Global Copy.
copy of a logical volume on the same DS8000
G storage system or on another DS8000 storage
system. In other words, all modifications that
GB: any attached host performs on the primary
See gigabyte. logical volume are also performed on the
secondary logical volume at a later point in
GiB: time. The original order of update is not strictly
See gibibyte. maintained. See also Remote Mirror and Copy
GDPS: and Metro Mirror.
See Geographically Dispersed Parallel Global Mirror:
Sysplex. An optional capability of the remote mirror and
Geographically Dispersed Parallel Sysplex copy feature that provides a 2-site extended
(GDPS): distance remote copy. Data that is written by the
host to the storage system at the local site is
Is a multi-site or single-site end to end
automatically maintained at the remote site.
application availability solution that provides the
See also Metro Mirror and Remote Mirror and
capability to manage remote copy configuration
Copy.
and storage subsystems (including IBM
TotalStorage Enterprise Storage Server) to Global Network Block Device (GNBD):
automate Parallel Sysplex operation tasks and Is the basis for GFS (the Global file system).
perform failure recovery from a single point of
Global Resource Serialization (GRS):
control. GDPS helps automate recovery
procedures for planned and unplanned outages Is the component within the IBM z/OS operating
to provide near-continuous availability and system responsible for enabling fair access to
disaster recovery capability. serially reusable computing resources, such as
datasets and tape drives or virtual resources,
Gigabyte (GB):
such as lists, queues, and control blocks.
Group:
The HyperSwap technology enables the host to The brand name used to identify storage
transparently switch an application's I/O products from IBM, including DS8000 series.
operations to the secondary Metro Mirror See also DS8000 and DS Storage Manager.
volumes, provided physical connectivity exists
IBM DS8000:
between the host and the secondary storage
A member of the IBM Resiliency Family of
subsystem. This affords the ability to provide
storage servers and attached storage devices
continuous operations from a single site or from
(drive modules). The DS8000 series storage
multiple locations within metro distances. By
product delivers high-performance,
implementing HyperSwap, disk failures and
fault-tolerant storage and management of
maintenance functions can be endured without
enterprise data, affording access through
incurring any interruption to the application
multiple concurrent operating systems and
service.
communication protocols. High performance is
Hypertext Transfer Protocol (HTTP): provided by multiple symmetrical
Is an application protocol for distributed, multiprocessors, integrated caching, RAID
collaborative, and hypermedia information support for the drive modules, and disk access
systems. HTTP is the foundation of data through a high-speed serial storage
communication for the World Wide Web. architecture interface.
Hypervisor: IBM DS8880 Series (DS8884, DS8886,
Is a piece of computer software, firmware, or DS8888):
hardware that creates and runs virtual New IBM DS8880 family of data systems
machines. A computer on which a hypervisor architected and built for the cognitive business.
runs one or more virtual machines is called a IBM DS8884: Business class system. Enables
host machine, and each virtual machine is organizations to overcome storage challenges
with advanced, easy-to-use operations and
called a guest machine. The hypervisor
24x7 availability for running critical workloads,
presents the guest operating systems with a
either as a dedicated platform for consolidated
virtual operating platform and manages the systems or for multiple platforms. Delivered
execution of the guest operating systems. within an affordable, flexible, and space-saving
package. Up to 256 GB cache, 64 x 16 GB
I Fibre Channel/FICON ports and up to 768
HDD/SSD drives, plus 120 flash cards.
IaaS: IBM DS8886: Enterprise class system. Helps
See Infrastructure as a Service. accelerate mission-critical applications, backed
by 24x7 availability, and superior functionality,
IBF:
all provided in an easily scalable package. Up
See Internal Battery Feature. to 2 TB total system memory, 128 x 16 GB
Fibre Channel/FICON ports and up to 1,536
IBM i: HDD/SSD drives, plus 240 flash cards.
The IBM licensed program that is the integrated IBM DS8888: Enterprise class system. Delivers
operating system for Power Systems servers. It mission-critical performance and lower latency
integrates such functions as relational for applications with up to 4.5 times better
database, security, web services, networking, performance through an all-flash configuration.
and storage management capabilities. The Up to 2 TB total system memory, 128 x 16 GB
predecessor to IBM i was i5/OS, which was Fibre Channel/FICON ports and up to 480 flash
preceded by Operating System/400 (OS/400). cards.
IBM DS Storage Manager (DS8000 Storage workstation called the IBM TotalStorage ESS
Management GUI): Master Console, supplied with the first ESS
Software with a web-browser interface for delivery.
configuring DS8000 series. IBM Z:
IBM MQ: The IBM family of products, which emphasizes
near-zero downtime and includes System z10
IBM MQ is a family of network software
and System z10s.
products that IBM launched for the first time as
an IBM product in December 1993. It was ICKDSF (Device Support Facility):
originally called MQSeries, and was renamed The z/OS ICKDSF utility performs functions
WebSphere MQ in 2002 to join the suite of needed for the installation, use, and
WebSphere products. In April 2014, it was maintenance of IBM direct-access storage
renamed IBM MQ. The products that are devices (DASD). Also used to perform service
included in the MQ family are IBM MQ, IBM MQ functions, error detection, and media
Advanced, IBM MQ Appliance, and IBM MQ for maintenance. The ICKDSF utility is used
z/OS. primarily to initialize disk volumes. At a
IBM Multipath Subsystem Device Driver minimum, this process involves creating the
(SDD): disk label record and the volume table of
contents (VTOC). ICKDSF also can scan a
IBM software that provides multipath volume to ensure that it is usable, can reformat
configuration support for a host system that is all the tracks, can write home addresses, as
attached to storage devices. SDD provides well as other functions.
enhanced data availability, dynamic
input/output load balancing across multiple ICF:
paths, and automatic path failover protection. See Internal Coupling Facility.
IBM POWER8 Processor: ICON:
POWER8 is a family of superscalar symmetric A picture representing something that exists on
multiprocessors based on the Power the computer.
Architecture.
Systems based on POWER8 became available IEBCOMPR:
from IBM in June 2014. IEBCOMPR is a z/OS data set utility that is
IBM Resiliency Family: used to compare two sequential data sets, two
A set of hardware and software features and partitioned data sets, or two Partitioned Data
products, as well as integrated software and Sets Extended (PDSE) at the logical record
services that are available on the DS8000 level to verify a backup copy.
series and the IBM TotalStorage Enterprise IEBCOPY:
Storage Server, Models 750 and 800.
IEBCOPY is a z/OS data set utility that is used
IBM Spectrum Control: to copy or merge members between one or
An interface that allows administrators to more partitioned data sets, or Partitioned Data
configure, manage, and monitor the Sets Extended (PDSE), in full or in part.
performance of SAN storage devices from a
IEBDG:
single console.
IEBDG is a z/OS data set utility that is used to
IBM Enterprise Storage Server Network
provide a pattern of test data to be used as a
(ESSNet)
programming debugging aid.
A private network providing web browser
access to the Enterprise Storage Server. IBM IEBGENER:
installs the ESSNet software on an IBM
The IEBGENER utility is a z/OS copy program IFHSTATR is a system utility that formats and
that is part of the operating system. It is used to prints information from Type 21 SMF (system
copy a sequential data set, a member of a management facilities) records. These records
Partitioned Data Set (PDS), or PDSE. provide error statistics by volume (ESV) data.
IEBIMAGE: image:
IEBIMAGE is a z/OS data set utility that creates See storage image.
and maintains specific printer type modules and
IML:
stores them in a library.
See Initial Microcode Load.
IEBPTPCH:
Information Management System (IMS):
IEBPTPCH is used to print or punch all, or
Is a database and transaction management
selected portions of a sequential data set or
system.
PDSE.
Information Management System
IEBUPTE:
transaction manager (IMS TM):
IEBUPTE is used to create or modify sequential
Is a message-based transaction processor.
or partitioned data sets, or PDSE.
Information Technology (IT):
IEFBR14:
IEFBR14 is a dummy program, normally Is the use of computers to store, retrieve,
inserted in JCL when the only desired action is transmit, and manipulate data, or information,
allocation or deletion of data sets. often in the context of a business or other
enterprise.
IEHINITT:
EHINITT is a z/OS system utility used to place Integrated Coupling Facility (ICF):
standard volume label sets onto any number of These processors run only Licensed Internal
magnetic tapes mounted on one or more tape Code. They are not visible to normal operating
units. systems or applications. A coupling facility is, in
IEHLIST: effect, a large memory scratch pad used by
multiple systems to coordinate work. ICFs must
IEHLIST is a z/OS system utility used to list
be assigned to LPARs that then become
entries in the directory of one or more
coupling facilities.
partitioned data sets or PDSEs, or entries in an
indexed or non-indexed volume table of Infrastructure as a Service (IaaS):
contents. Any number of listings can be Is a form of cloud computing that provides
requested in a single execution of the program. virtualized computing resources over the
IEHMOVE: Internet. IaaS is one of three main categories of
cloud computing services, alongside Software
IEHMOVE is a z/OS system utility used to move
as a Service (SaaS) and Platform as a Service
or copy logical collections of operating system
(PaaS).
data.
Initial Microcode Load (IML):
IEHPROGM:
The action of loading microcode for a computer
IEHPROGM is a z/OS system utility that is used
into that computer's storage.
to modify system control data and to maintain
data sets at an organizational level. Initial Program Load (IPL):
The action of loading software into a computer,
IFL:
typically an operating system that controls the
See Integrated Facility for Linux. computer.
IFHSTATR: Initiator:
A SCSI device that communicates with and Are procedures whose JCL statements are
controls one or more targets. Contrast with placed within the job executing them. The
target. beginning of an in-stream procedure must be
marked by a PROC statement, its ending by a
Inode:
PEND statement. In-stream procedures must
An inode is a data structure on a filesystem on
be defined before they can be used, meaning
Linux and other UNIX-like operating systems
the procedure definition must precede its
that stores all the information about a file except
invocation.
its name and its actual data. A data structure is
a way of storing data so that it can be used Integrated Facility for Linux (IFL):
efficiently. This is a normal processor with one or two
Input/Output (I/O): instructions disabled that are used only by
Pertaining to (a) input, output, or both or (b) a z/OS. Linux does not use these instructions and
device, process, or channel involved in data can be executed by an IFL. Linux can be
input, data output, or both. executed by a CP as well. The difference is that
an IFL is not counted when specifying the
I/O Adapter: model number of the system. This can make a
A generic term for an electronic circuit, substantial difference in software costs.
expansion card, or plug-in module that accepts
Intelligent Resource Director:
input and generates output in a particular
format. The ‘adapter’ part of the term means Intelligent Resource Director (IRD) is software
that a conversion of the data format and that automates the management of CPU
electronic timing takes place between the resources and certain I/O resources.
input/output streams and the internal computer
Intelligent Write Caching (IWC):
circuits.
Improves performance through better write
Input/Output Configuration Data Set cache management and a better destaging of
(IOCDS): order of writes.
A configuration definition built by the I/O
Interactive mode:
Configuration Program (IOCP) and stored on
The interactive command mode provides a
disk files associated with the processor
history function that makes repeating or
controller.
checking prior command usage easy to do. Log
Input/Output Definition File (IODF): on to the DS CLI application at the directory
Created by HCD (Hardware Configuration where it is installed, and begin using the DS CLI
Definition) and contains information about the commands and parameters.
I/O configuration, such as: Operating system
Interactive System Productivity Facility
data, Switch data, Device data, including EDT
(ISPF):
definition, Processor data, Partition data,
Is a software product for the z/OS operating
Channel path data, Control unit data, and
system that runs on IBM mainframes. ISPF
Channel subsystem data.
primarily provides an IBM 3270 terminal
I/O enclosure: interface with a set of panels. Each panel may
The I/O enclosures hold the adapters and include menus and dialogs to run tools on the
provide connectivity between the adapters and underlying Time Sharing Option (TSO). ISPF is
the processors. Both device adapters and host frequently used to manipulate z/OS data sets
adapters are installed in the I/O enclosure. from its Program Development Facility named
ISPF/PDF, where PDF refers to Program
In-stream procedure:
Development Facility.
1) For processor storage, real, and virtual Is an open source API, daemon, and
storage, and channel volume, 210 or 1024 management tool for managing platform
bytes. virtualization. It can be used to manage KVM,
2) For disk storage capacity and Xen, VMware ESX, QEMU, and other
communications volume, 1000 bytes. virtualization technologies. These APIs are
widely used in the orchestration layer of
Korn shell:
hypervisors in the development of a
Interactive command interpreter and a
cloud-based solution.
command programming language.
LIC:
L See License Internal Code.
Defines a standard method to access and Use the LISTDS command to have the
update information in a directory. attributes of specific data sets displayed at your
terminal. The LISTDS command works
Light-Emitting Diode (LED):
differently for VSAM than for non-VSAM data
A semiconductor chip that displays visible or
sets. A VSAM data set causes the LISTDS
infrared light when activated.
command to display only the data set
Link address: organization, which is VSAM. Use the LISTCAT
On an ESCON interface, the portion of a source command to obtain more information about a
or destination address in a frame that ESCON VSAM data set.
uses to route a frame through an ESCON Local Area Network (LAN):
director. ESCON associates the link address
A computer network located on a user's
with a specific switch port that is on the ESCON
premises within a limited geographic area.
director. Equivalently, it associates the link
address with the channel subsystem or control Log Structured File System (LFS):
unit link-level functions that are attached to the LFS is a file system in which data and metadata
switch port. are written sequentially to a circular buffer,
called a log.
Link-level facility:
The ESCON hardware and logical functions of Logical Block Address (LBA):
a control unit or channel subsystem that allow The address assigned by DS8000 series to a
communication over an ESCON write interface sector of a disk.
and an ESCON read interface.
Logical Control Unit (LCU):
Linux: An LCU is equivalent to a Logical SubSystem
Is system software that manages computer (LSS). Like an LSS, an LCU can have a
hardware and software resources and provides maximum of 256 logical devices or volumes.
common services for computer programs.
Logical device:
LinuxONE: The facilities of a storage server (such as
Built on IBM Z technology and designed for DS8000 series) associated with the processing
Linux-only environments. The LinuxONE of I/O operations directed to a single
Emperor, which is built on the IBM z13 host-accessible emulated I/O device. The
mainframe and its z13 CPU, and its little associated storage is referred to as a logical
brother, Rockhopper, which uses the older z12 volume. The logical device is mapped to one or
processor. more host-addressable units, such as a device
on IBM Z I/O interface or a logical unit on a
LISTALC command (In UNIX):
SCSI I/O interface, such that the host initiating
Use the LISTALC command to obtain a list of
I/O operations to the I/O-addressable unit
the currently allocated data sets. LISTALC
interacts with the storage on the associated
without operands displays a list of all currently
logical device.
allocated data set names.
Lightweight Directory Access Protocol
LISTCAT command (In UNIX):
(LPAP):
Use the LISTCAT command to list entries from
Is a protocol, which makes directory information
a catalog. The entries listed can be selected by
available.
name or entry type, and the fields to be listed
for each entry can additionally be selected. Logical Partition (LPAR):
For IBM Z, a set of functions that create the
LISTDS command (In UNIX):
programming environment in which more than
one Logical PARtition (LPAR) is established on
reflects how IBM rates the machine in terms of A DS8000 hardware function that is
charging capacity. independent of software support. This function
enables multiple system images to concurrently
Mirrored pair:
access the same logical volume on DS8000
Two units that contain the same data. The
series as long as the system images are
system refers to them as one entity.
accessing different extents. See also extent
Mirroring: and parallel access volumes.
In host systems, the process of writing the Multiple relationship FlashCopy:
same data to two disk units within the same
An option of DS8000 series that creates backup
auxiliary storage pool at the same time.
copies from one source to multiple targets by
MLAG: simultaneously establishing multiple FlashCopy
See Multi-link Aggregation. relationships.
MRPD: Multiplex:
See Machine Reported Product Data. The action of transmitting simultaneously.
MSUs: Multiprocessor:
See Million Service Units. A computer that includes two or more
processors that have common access to a main
MySQL:
storage. For DS8000 series, the
Is a freely available open source Relational multiprocessors operate in parallel.
Database Management System (RDBMS) that
uses Structured Query Language (SQL). Multiprogramming with a fixed number of
tasks (MFT):
Multi-Chip Module (MCM:
Each job gets just the amount of memory it
Is an electronic assembly (such as a package needs. That is, the partitioning of memory
with a number of conductor terminals or "pins") changes as jobs enter and leave. MVT is a
where multiple integrated circuits, more efficient user of resources.
semiconductor dies and/or other discrete
components are integrated, usually onto a Multiprogramming variable number of tasks
unifying substrate, so that in use it is treated as (MVT):
if it were a single component. Is a feature of large computers that allows more
Multicylinder Unit (MCU): efficient operation by having multiple programs
(tasks) present and operating in the mainframe
This term refers to a fixed unit of disk space that
computer simultaneously.
is larger than a cylinder. Currently, on an EAV, a
multicylinder unit is 21 cylinders and the Multiple Virtual Systems (MVS):
number of the first cylinder in each multicylinder
Was the most commonly used operating
unit is a multiple of 21.
system on the System/370 and System/390
Multipath Subsystem Device Driver: IBM mainframe computers.
See IBM DS8000 Multipath Subsystem Device
Driver.
Multi-link Aggregation (MLAG): N
Enables arrangement of aggregated groups on
Name server:
two separate switchboards of the
MLAG-domain. A server that stores names of the participating
DS8000 clusters.
Multiple allegiance:
NAS:
See Network Attached Storage. is one of the oldest Internet protocols in current
use.
NBD:
See Network Block Device. Node:
The unit that is connected in a Fibre Channel
Near-line:
network. DS8000 series is a node in a Fibre
A type of intermediate storage between online
Channel network.
storage (which provides constant, rapid access
to data) and off-line storage (which provides Non-removable medium:
infrequent data access for backup purposes or A recording medium that cannot be added to or
long-term storage). removed from a storage device.
Network Attached Storage (NAS): NonVolatile Storage (NVS):
Is a file-level computer data storage server Memory that stores active write data to avoid
connected to a computer network providing data loss in the event of a power loss.
data access to a heterogeneous group of
NVS:
clients. NAS is specialized for serving files
See NonVolatile Storage.
either by its hardware, software, or
configuration. N+1 redundancy:
Network Block Device (NBD): Is a form of resilience that ensures system
availability in the event of component failure.
Is a device node whose content is provided by
Components (N) have at least one independent
a remote machine. Typically, network block
backup component (+1).
devices are used to access a storage device
that does not physically reside in the local O
machine but on a remote one.
Network File System (NFS): Octal:
Octal, from Latin octo or “eight”) is a term that
Is a client/server application that lets a describes a base-8 number system. An octal
computer user view and optionally store and number system consists of eight single-digit
update files on a remote computer as though numbers: 0, 1, 2, 3, 4, 5, 6, and 7.
they were on the user's own computer.
OMVS:
Network Interface Card (NIC):
The first implementation was known as MVS
A network interface controller (NIC, also known OpenEdition (or OE, or OMVS), then it became
as a network interface card, network adapter, OS/390 UNIX System Services, and finally
LAN adapter or physical network interface, and z/OS UNIX System Services, as we know it
by similar terms) is a computer hardware today.
component that connects a computer to a
computer network. OMVS command:
programs interactively (in the foreground), in DS8000 series through SCSI or FCP protocols.
the background, or in batch. See also small computer system interface and
Fibre Channel Protocol.
OnLine Transaction Processing (OLTP): Open System Adapter (OSA):
A class of information systems that facilitate Is the only LAN (Local Area Network)
and manage transaction-oriented applications, attachment to the IBM Systems.
typically for data entry and retrieval transaction
Open vSwitch (OVS):
processing. OLTP has also been used to refer
Open vSwitch is a production quality, multilayer
to processing in which the system responds
virtual switch licensed under the open source
immediately to user requests.
Apache 2.0 license. It is designed to enable
OpenFlow: massive network automation through
Is a protocol that allows a server to tell network programmatic extension, while still supporting
switches where to send packets. In a standard management interfaces and
protocols.
conventional network, each switch has
proprietary software that tells it what to do. With Operating System (OS):
OpenFlow, the packet-moving decisions are Is system software that manages computer
centralized, so that the network can be hardware and software resources and provides
programmed independently of the individual common services for computer programs.
switches and data center gear.
Open Systems / 390: (OS/390):
OpenStack:
Is an IBM operating system for the System/390
Is a set of software tools for building and IBM mainframe computers.
managing cloud computing platforms for public
and private clouds. Backed by some of the
biggest companies in software development
and hosting, as well as thousands of individual
P
community members, many think that PaaS:
OpenStack is the future of cloud computing.
See Platform As A Service.
Open source software:
PAM:
Open source refers to a program or software in
See Pluggable Authentication Module.
which the source code (the form of the program
when a programmer writes a program in a Panel:
particular programming language) is available The formatted display of information that
to the general public for use and/or modification appears on a display screen.
from its original design free of charge. Open
Parallel Access Volume (PAV):
source code is typically created as a
collaborative effort in which programmers A licensed function of DS8000 series that
improve upon the code and share the changes enables z/OS systems to issue concurrent I/O
within the community. requests against a count key data logical
volume by associating multiple devices of a
Open system: single control-unit image with a single logical
A system whose characteristics comply with device. Up to eight device addresses can be
standards made available throughout the assigned to a PAV. The PAV function enables
industry and that therefore can be connected to two or more concurrent write operations to the
other systems complying with the same same logical volume, as long as the write
standards. Applied to DS8000 series, such operations are not to the same extents.
systems are those hosts that connect to
Parallel Sysplex License Charge (PSLC): See Partitioned Data Set Extended.
Charges for Parallel Sysplex licenses. PDU:
Parity: See Protocol Data Unit.
A data checking scheme used in a computer PDU:
system to ensure the integrity of the data. The
See Power Distribution Unit.
RAID implementation uses parity to re-create
data if a disk drive fails. Peripheral Component Interconnect (PCI):
An architecture for a system bus and
Partitioned Data Set (PDS):
associated protocols that supports attachments
Is a data set containing multiple members, each
of adapter cards to a system backplane.
of which holds a separate sub-data set, similar
to a directory in other types of file systems. Peripheral Component Interconnect
Express (PCIe or PCIe):
Partitioned Data Set Extended (PDSE):
Is a serial expansion bus standard for
Is a data set type that is managed by DFSMS.
connecting a computer to one or more
Externally, a PDSE is very similar to a PDS.
peripheral devices. PCIe provides lower latency
Internally, the PDSE has a different directory
and higher data transfer rates than parallel
structure, member format, and record format. A
busses such as PCI and PCI-X. Every device
PDSE is indistinguishable from a PDS through
that's connected to a motherboard with a PCIe
most interfaces used to access a PDS directory
link has its own dedicated point-to-point
or member. All ISPF functions support the
connection. This means that devices are not
PDSE.
competing for bandwidth because they are not
Path group: sharing the same bus.
In IBM Z architecture, a set of channel paths Peer-to-Peer Remote Copy (PPRC):
that are defined to a control unit as being
Is a protocol to replicate a storage volume to
associated with a single Logical PARtition
another control unit in a remote site.
(LPAR). The channel paths are in a group state
Synchronous PPRC causes each write to the
and are online to the host. See also logical
primary volume to be performed to the
partition.
secondary as well, and the I/O is only
PAV: considered complete when update to both
See Parallel Access Volumes. primary and secondary have completed.
Asynchronous PPRC will flag tracks on the
PCHID:
primary to be duplicated to the secondary when
See Physical Channel Path Identifier. time permits.
PCI: Performance Groups:
See Peripheral Component Interconnect. Are used to assign a numerical value to a
PCIe: performance policy.
See Peripheral Component Interconnect Peripheral:
Express. Is defined as any auxiliary device such as a
PDF: tape drive, disk drive, mouse, or keyboard that
See Program Development Facility. connects to and works with the computer in
some way.
PDS:
Persistent FlashCopy:
See Partitioned Data Set.
A state where a FlashCopy relationship
PDSE: remains indefinitely until the user deletes it. The
relationship between the source and target Pluggable Authentication Module (PAM):
volumes is maintained after a background copy A mechanism to integrate multiple low-level
completes. authentication schemes into a high-level API. It
PFI: allows programs that rely on authentication to
be written independently of the underlying
See Predictive Failure Analysis.
authentication scheme.
Physical Channel Path Identifier (PCHID):
Point-to-point connection:
Specifies a physical channel identifier related to A Fibre Channel topology that enables the
their physical location.
direct interconnection of ports. See also
Physical path: arbitrated loop and switched fabric.
A single path through the I/O interconnection Port:
fabric that attaches two units. For Copy A physical connection on a host adapter to the
Services, this is the path from a host adapter on cable that connects the DS8000 storage
one DS8000 storage system (through cabling system to hosts, switches, or another DS8000
and switches) to a host adapter on another storage system. DS8000 series uses SCSI and
DS8000 storage system. ESCON host adapters that have two ports per
Pinned data: adapter, and Fibre Channel host adapters that
Data that is held in cache until either an error have one port. See also ESCON, Fibre
condition is corrected and it can be moved to Channel, host adapter, and small computer
disk storage or until the data is discarded by a system interface.
host command. Pinned data conditions can Portable Operating System Interface
only occur on an ESS Model 800 during (POSIX):
fast-write or dual-copy functions. POSIX is a set of standard operating system
PKI: interfaces based on the UNIX operating
See Public Key Infrastructure. system.
database; and it is also available for Microsoft The program which provides the sequential
Windows and Linux. scheduling of jobs and basic operating systems
functions.
Power Distribution Unit (PDU):
A type of electrical component that distributes Primary control unit:
and manages electricity supply to computers, The DS8000 storage system to which a
servers, and networking devices within a data Remote Mirror and Copy primary device is
center environment. It provides a central unit to physically attached.
control and distribute electricity across the data
Primary Power Supply (PPS):
center components. Power distribution units are
also known as Main Distribution Units (MDUs). A wide range power supply that converts AC
input voltage into DC voltage.
Power Supply Unit (PSU):
PRINTDS command (In UNIX):
Converts mains AC to low-voltage regulated
DC power for the internal components of a Use the PRINTDS command to format and print
computer. data sets on any printer defined to the Job Entry
Subsystem (JES).
PPS:
Processor:
See Primary Power Supply.
The key component of a computing device that
Predictive Failure Analysis (PFA): contains the circuitry necessary to interpret and
Can anticipate certain forms of failures by execute electrical signals fed into the device. Its
keeping internal statistics of read and write basic job is to receive input and provide the
errors. If the error rates exceed predetermined appropriate output. Also referred to as CPU or
threshold values, the drive is nominated for core.
replacement. Because the drive has not yet
Processor complex:
failed, data can be copied directly to a spare
drive. This copy ability avoids the use of RAID The set of hardware that defines a mainframe,
recovery to reconstruct all of the data onto the which includes the central processing units,
spare drive. memory, channels, controllers, and power
supplies included in the box. Also known as
Preventive Service Planning (PSP): ‘Central Electronics Complex (CEC)’.
Is formation, which contains the latest
Processor node:
information that is applicable to machine’s
hardware and software. PSP information should A partition of a storage server that is capable of
be reviewed before all system installs, performing all defined functions of the storage
hardware, and software updates. PSP server. Multiple processor complexes provide
information is provided by the IBM software redundancy.
support center to use when installing a licensed Processor Resource System Manager
program, cumulative PTF packages, or (PR/SM):
hardware. It can also be used to order
Is a type-1 Hypervisor (a virtual machine
preventive service planning information and
monitor) that allows multiple logical partitions to
review the recommended High Impact
share physical resources such as CPUs, I/O
PERvasive (HIPER) fixes periodically or to
channels and direct access storage devices
order the HIPER PTF group. The HIPER PTF
(DASD). It is integrated with all IBM Z
group is updated every other week.
mainframes.
Primary control program (PCP):
Processor Unit (PU):
All of the processors in the CPC begin as
equivalent processor units (PUs) or engines
that have not been characterized for use. Each A unit of data specified in the protocol of a given
processor is characterized by IBM during layer and consisting of protocol control
installation or at a later time. information for the layer and, possibly, user
data for the layer.
The potential characterizations are:
PR/SM:
• Central Processor (CP)
• System Assistance Processor (SAP) See Processor Resource System Manager.
• Integrated Facility for Linux (IFL)
Pseudo host:
• z Application Assist Processor (zAAP)
A host connection that is not explicitly defined
• The System z9 Integrated Information
to the DS8000 storage system and that has
Processor (zIIP)
access to at least one volume that is configured
• Integrated Coupling Facility (ICF)
on the DS8000 storage system. The FiconNet
• Spare: An uncharacterized PU functions as
pseudo host icon represents the FICON
a spare. If the system controllers detect a
protocol. The EsconNet pseudo host icon
failing CP or SAP, it can be replaced with a
represents the ESCON protocol. The pseudo
spare PU. In most cases this can be done
host icon labeled Anonymous represents hosts
without any system interruption, even for
connected through the FCP protocol.
the application running on the failing
Anonymous host is a commonly used synonym
processor.
for pseudo host. DS8000 series adds a pseudo
PROFILE command (In UNIX): host icon only when it is set to access-any
The PROFILE command establishes, changes, mode. See also access-any mode.
or lists your user profile. The information in your
PSP:
profile tells the system how you want to use
See Preventive Service Planning.
your terminal.
PSU:
Program:
See Power Supply Unit.
On a computer, a generic term for software that
controls the operation of the computer. PTF:
Typically, the program is a logical assemblage See Program Temporary Fix.
of software modules that perform multiple
Public Key Infrastructure (PKI):
related tasks.
Supports the distribution and identification of
Program Development Facility (PDF): public encryption keys, enabling users and
Provides a panel-driven menu interface and a computers to both securely exchange data over
number of services through which users can networks such as the Internet and verify the
work with source code and data stored on a identity of the other party.
host.
PV Links:
Program Temporary Fix (PTF): Short for Physical Volume Links, an alternate
A temporary solution to, or bypass of, a pathing solution from Hewlett-Packard that
problem diagnosed by IBM as the result of a provides for multiple paths to a volume, as well
defect in a current unaltered release of a as static load balancing.
licensed program.
Promote:
Q
To add a logical data unit to cache memory. qcow2 (QEMU Copy On Write):
Protocol Data Unit (PDU): Is a file format for disk image files used by
QEMU, a hosted virtual machine monitor. It
uses a disk storage optimization strategy that
type of memory found in computers and other Is a design feature found in certain computers'
devices, such as printers. main random access memory. RAIM utilizes
additional memory modules and striping
Rank:
algorithms to protect against the failure of any
One or more arrays that are combined to create
particular module and keep the memory system
a logically contiguous storage space.
operating continuously.
RAS:
Relative Record Data Set (RRDS):
See Reliability, Availability, and Serviceability.
Has fixed-length slots, predefined to VSAM, in
Reboot: which records can be stored. An RRDS record
Booting is starting a computer's operating is always fixed length, equal to the slot size. A
system, so rebooting is to start it for a second or record that is in an RRDS is identified by the
third time. Rebooting is usually necessary after Relative Record Number (RRN) of the slot that
a computer crashes, meaning it stops working holds it. When a new record is added to an
because of a malfunction. Rebooting allows the RRDS, VSAM uses the number that you supply
computer to restart and get back to working with the file control request.
normally. After a crash, the computer is useless
Reliability, Availability, and Serviceability
until it is rebooted.
(RAS):
Recovery Point Objective (RPO): Is a computer hardware engineering term
The maximum targeted period in which data involving reliability engineering, high availability,
might be lost from an IT service due to a major and serviceability design. Computers designed
incident. with higher levels of RAS have many features
Recovery Time Objective (RTO): that protect data integrity and help them stay
The targeted duration of time and a service available for long periods of time without failure,
level within which a business process must be this data integrity and uptime is a particular
restored after a disaster (or disruption) in order selling point for mainframes and fault-tolerant
to avoid unacceptable consequences systems.
associated with a break in business continuity. Remote I/O loop (RIO loop):
RECEIVE command (In UNIX): I/O subsystems are connected to the processor
The RECEIVE command is used by the subsystem through Remote I/O cable loops.
addressee of a file transmission to retrieve The cable loops are connected to ports that are
transmitted files and to restore them to their available from the rear of the processor
original format. subsystem. The RIO cables are connected in
loops so that the system has two paths to each
Reduced Instruction Set Computer (RISC):
I/O subsystem.There are two typical RIO loops:
Is one whose instruction set architecture (ISA) 1) one port of a hub connected to the input port
allows it to have fewer cycles per instruction of an I/O drawer, and the output port of this I/O
(CPI) than a complex instruction set computer. drawer connected to the companion port of the
Redundant Array of Independent Disks same hub; 2) one port of a hub connected to
(RAID): the input port of an I/O drawer, the output port
A methodology of grouping disk drives for of this I/O drawer connected to the input port of
managing disk storage to insulate data from a another I/O drawer, and the output port of the
failing disk drive. other I/O drawer connected to the companion
port of the same hub.
Redundant Array of Independent Memory
(RAIM): Remote Mirror and Copy:
A feature of a storage server that constantly Define a collection of resources and associate
updates a secondary copy of a logical volume a set of policies relative to how the resources
to match changes made to a primary logical are configured and managed.
volume. The primary and secondary volumes
RESTful API:
can be on the same storage server or on
Is an application programming interface (API)
separate storage servers. See also Global
that uses HTTP requests to GET, PUT, POST,
Mirror, Metro Mirror, and Global Copy.
and DELETE data.
Remote Procedure Call (RPC):
Restructured Extended Executor (REXX):
In distributed computing, a remote procedure
REXX is an interpreted programming language
call (RPC) is when a computer program causes
developed at IBM. It is a structured, high-level
a procedure (subroutine) to execute in a
programming language designed for ease of
different address space (commonly on another
learning and reading. Proprietary and open
computer on a shared network), which is coded
source REXX interpreters exist for a wide range
as if it were a normal (local) procedure call,
of computing platforms; compilers exist for IBM
without the programmer explicitly coding the
mainframe computers.
details for the remote interaction.
Revolutions Per Minute (RPM):
Reporting task commands:
Used for creating reports. Used to help determine the access time on
computer hard drives. RPM is a measurement
Resource Access Control Facility (RACF): of how many revolutions a computer's hard
A security system that provides access control drive makes in a single minute. The higher the
and auditing functionality for the z/OS and z/VM RPM, the faster the data will be accessed.
operating systems.
RIO loop:
Resource Management Facility (RMF): See Remote I/O loop.
IBM's strategic product for z/OS performance
RISC:
measurement and management. It is the base
product to collect performance data for z/OS See Reduced Instruction Set Computer.
and sysplex environments to monitor systems' R0:
performance behavior and provides the ability
See track-descriptor record.
to optimally tune and configure the system
according to business needs. Rotate extents:
REST API: Distributes the extents of each volume
A REST API defines a set of functions which successfully across all ranks in a pool to
developers can perform requests and receive achieve a well balanced capacity based
responses using HTTP protocol such as GET distribution of the workload. See Storage Pool
and POST. Because REST API’s use HTTP, Striping.
they can be used by practically any Rotate volume:
programming language and easy to test (it’s a Reduces the configuration effort compared to
requirement of a REST API that the client and single rank extent pools by easily distributing a
server are independent of each other allowing set of volumes to different ranks in a specific
either to be coded in any language and extent pool for workloads where the use of host
improved upon supporting longevity and based stripping methods is still present.
evolution).
RPC:
Resource Group:
See Rack Power Control cards or Remote
Procedure Call.
minimal region of the disk upon which data can a single view of time to Processor
be read or written at one time. Resource/Systems Manager (PR/SM).
SEND command (In UNIX): Service clearance:
Use the SEND command to send messages to The area that is required to open the service
other users. To receive the messages, the covers and to pull out components for servicing.
recipient's profile setting must include
Service Information Message (SIM):
INTERCOM.
A message sent by a storage server to service
Sequential access: personnel through an IBM Z operating system.
A mode of accessing data on a medium in a
Service personnel:
manner that requires the storage device to
A generalization referring to individuals or
access consecutive storage locations on the
companies authorized to service the DS8880.
medium.
The terms service provider, service
Sequential Adaptive Replacement Cache representative, and IBM service representative
(SARC): refer to types of service personnel. See also
Is a caching algorithm that allows you to run System Services Representative.
different workloads, such as sequential and
Service provider interface (SPI):
random workloads, without negatively affecting
each other. The set of public interfaces and abstract
classes that a service defines. The SPI defines
Sequential Data Set: the classes and methods available to your
In a sequential data set, records are data items application.
that are stored consecutively.
SES:
Serial Attached SCSI (SAS): SCSI Enclosure Services.
Full-duplex. Uses the native SCSI command
Session:
set, which has more functionality. A SAS drive
uses SCSI error checking and reporting. This A collection of volumes within a logical
allows your storage system to collect richer subsystem that are managed together during
information from the drive if errors are occurring the creation of consistent copies of data. All
(such as a failing or marginal disk). SAS drives volumes in a session must transfer their data
are dual ported, which is vital in dual controller successfully to the remote site before the
enclosures. increment can be called complete.
designed to handle the effects of concurrent An operating system from IBM. OS/VS2 R1
access. was known as SVS (Single Virtual Storage) as it
had a single 16 MB virtual address space.
Shortwave cable:
Takes advantage of virtual memory.
Shortwave laser uses a wavelength of
approximately 850 nm. Typically used for Small Computer System Interface (SCSI):
medium and longer distance connections (up to A standard hardware interface that enables a
500m). variety of peripheral devices to communicate
with one another.
SIM:
See Service Information Message. Smart relay host:
A mail relay or mail gateway that has the
Simple Network Management Protocol
capability to correct email addressing problems.
(SNMP):
In the Internet suite of protocols, a network Small Form Factor (SFF):
management protocol that is used to monitor 2.5-inch hard disk drives (HDDs). The
routers and attached networks. SNMP is an measurement represent the approximate
application layer protocol. Information on diameter of the platter within the drive
devices managed is defined and stored in the enclosures.
application's Management Information Base
SMF:
(MIB). See also management information base.
See System Management Facility.
Simultaneous Multithreading (SMT):
Is a technique for improving the overall SMP:
efficiency of superscalar CPUs with hardware See Symmetrical MultiProcessor.
multithreading. SMT permits multiple SMT:
independent threads of execution to better
See Simultaneous Multithreading.
utilize the resources provided by modern
processor architectures. SNMP:
See Simple Network Management Protocol.
Single-Byte Command Code Sets
Connection (SBCON): SNMP agent:
The ANSI standard for the ESCON I/O A server process that resides on a network
interface. node and is responsible for communicating with
managers regarding that node. The node is
Single Point Of Failure (SPOF):
represented as a managed object, which has
A potential risk posed by a flaw in the design,
various fields or variables that are defined in the
implementation, or configuration of a circuit or
appropriate MIB.
system in which one fault or malfunction causes
an entire system to stop operating. SNMP manager:
Single-shot mode: A managing system that runs a managing
application or suite of applications. These
Use the DS CLI single-shot command mode if
applications depend on Management
your want to issue an occasional command but
Information Base (MIB) objects for information
do not want to keep a history of the commands
that resides on the managed system. Managers
that you have issued. When typing the
generate requests for this MIB information, and
command, you can use the host name or the IP
an SNMP agent on the managed system
address of the DS HMC. Wait for the command
responds to these requests. A request can
to process and display the end results.
either be the retrieval or modification of MIB
Single Virtual Storage (SVS): information.
p5, eServer pSeries, eServer OpenPower, and are typically I/O devices. A SCSI target is
RS/6000. analogous to an IBM Z control unit. See also
small computer system interface.
System Services Representative (SSR):
Responsible for performing basic technical Target device:
services for IBM customers including some or One of the devices in a dual-copy or
all of the following: element exchange, minor remote-copy volume pair that contains a
repair, depot or bench maintenance, equipment duplicate of the data that is on the source
refurbish, installation, relocation, device. Unlike the source device, the target
discontinuance, upgrade and modification, and device might only accept a limited subset of
so on. Services are typically performed in a data. See also source device.
high volume environment with access to
TB:
exchangeable units and parts requiring
See terabyte.
minimum, if any, problem determination activity.
Services may be directed by a service call TCO:
management process or be performed as part See Total Cost of Ownership.
of a team.
TCP/IP:
System Storage Productivity Center (SSPC): See Transmission Control Protocol/Internet
IBM System Storage Productivity Center is an Protocol.
integrated offering that provides a consolidated
focal point for managing IBM storage products Telemetry:
as well as managing mixed-vendor storage OpenStack Telemetry provides user-level
environments. SSPC provides enhancements usage data for OpenStack-based clouds. The
to daily storage administration by making data can be used for customer billing, system
available a broad set of configuration functions. monitoring, or alerts. Telemetry can collect data
System Storage Productivity Center’s
from notifications sent by existing OpenStack
user-friendly interface provides utilities to
components such as Compute usage events, or
configure storage devices, and enhancements
that offer a wide range of management by polling OpenStack infrastructure resources
capabilities. such as libvirt. Telemetry includes a storage
daemon that communicates with authenticated
System x: agents through a trusted messaging system to
The IBM family of products, which emphasizes collect and aggregate data. Additionally, the
industry-standard server scalability and service uses a plug-in system that you can use
self-managing server technologies. It includes to add new monitors. You can deploy the API
System x3nnn, eServer xSeries, and AMD Server, central agent, data store service, and
processor-based eServer servers. collector agent on different hosts.
Systems Network Architecture (SNA): Terabyte (TB):
SNA is IBM's proprietary networking 1) Nominally, 1 000 000 000 000 bytes, which is
architecture. It is a complete protocol stack for accurate when speaking of bandwidth and disk
interconnecting computers and their resources. storage capacity.
2) For DS8000 cache memory, processor
T storage, real and virtual storage, a terabyte
Target: refers to 240 or 1 099 511 627 776 bytes.
A SCSI device that acts as a subordinate to an Total Cost of Ownership (TCO):
initiator and consists of a set of one or more
logical units, each with an assigned Logical Unit
Number (LUN). The logical units on the target
Is a financial estimate intended to help buyers The name of the suite of products comprising
and owners determine the direct and indirect the Tivoli Storage Productivity Center.
costs of a product or system.
TPF:
Tracks: See Transaction Processing Facility.
Are concentric circles around the disk. The
Track:
operating system and disk drive keep track of
A unit of storage on a CKD device that can be
where information is stored on the disk by
formatted to contain a number of data records.
noting the range of track and sector numbers.
See also home address, track-descriptor
Transport Control Word (TCW): record, and data record.
A TCW combines the functions of the Prefix
Track address:
CCW and the Read or Write CCW into a single
entity that further reduces channel overhead. This term refers to a 32-bit number that
Used by z High Performance FICON (zHPF) identifies each track within a volume. It is in the
channel programs. format hexadecimal CCCCcccH, where CCCC
is the low order 16 bits of the cylinder number,
Time Sharing Option (TSO):
ccc is the high order 12 bits of the cylinder
An operating system option that provides number, and H is the four-bit track number. For
interactive time sharing from remote terminals. compatibility with older programs, the ccc
Thin provisioning: portion is hexadecimal 000 for tracks in the
A mechanism that provides the ability to define base addressing space.
logical volume sizes that are larger than the Track managed space:
physical capacity installed on the system. The This term refers to the space on a volume that
volume allocates capacity on an as-needed is managed in tracks and cylinders.
basis as a result of host-write actions. Track-managed space ends at cylinder address
Tivoli Key Lifecycle Manager (TKLM): 65519. Each data set occupies an integral
JAVA software program that manages keys multiple of tracks. Track-managed space also
enterprise wide and provides encryption enable exists on all non-EAVs.
tape drives with keys for encryption and Track Space Efficient (TSE) volumes:
decryption. Are used as target volumes of a FlashCopy
Tivoli Productivity Center for Replication Space Efficient operation and require the
(TPC-R): definition of a repository from which tracks are
Provides support for Metro Mirror and Global gradually allocated.
Mirror configurations as well as three-site Transaction Processing Facility (TPF):
recovery management, supporting IBM System A high-availability, high-performance IBM
Storage DS8000 Metro Global Mirror and Metro operating system, designed to support
Global Mirror with HyperSwap. It is designed to real-time, transaction-driven applications. The
support fast failover and failback, fast specialized architecture of TPF is intended to
reestablishment of three-site mirroring, data optimize system efficiency, reliability, and
currency at the remote site with minimal lag responsiveness for data communication and
behind the local site, and quick database processing. TPF provides real-time
re-synchronization of mirrored sites using inquiry and updates to a large, centralized
incremental changes only. database, where message length is relatively
TKLM: short in both directions, and response time is
See Tivoli Key Lifecycle Manager. typically less than three seconds. Formerly
known as the Airline Control
Tivoli Storage Productivity Center (TPC):
Program/Transaction Processing Facility Each data set profile defined using RACF
(ACP/TPF). requires a universal access authority (UACC).
The UACC is the default access authority that
Transmission Control Protocol (TCP):
RACF gives to users and groups that are not
A communications protocol used in the Internet
defined in the profile's access list. If one of
and in any network that follows the Internet
these users or groups requests access to a
Engineering Task Force (IETF) standards for
data set that is protected by the profile, RACF
internetwork protocol. TCP provides a reliable
grants or denies the request based on the
host-to-host protocol between hosts in
UACC.
packet-switched communications networks and
in interconnected systems of such networks. It Unit address:
uses the Internet Protocol (IP) as the underlying For IBM Z, the address associated with a
protocol. device on a given control unit. On ESCON
interfaces, the unit address is the same as the
Transmission Control Protocol/Internet
device address. On OEMI interfaces, the unit
Protocol (TCP/IP):
address specifies a control unit and device pair
1) A combination of data-transmission protocols
on the interface.
that provide end-to-end connections between
applications over interconnected networks of Unit Control Block (UCB):
different types. z/OS control block used to define channel
2) A suite of transport and application protocols attached devices.
that run over the Internet Protocol. See also UNIX System Services (USS):
Internet Protocol and Transmission Control
UNIX System Services (USS) is a required,
Protocol.
included component of z/OS. USS is a certified
TRANSMIT command (In UNIX): UNIX operating system implementation
Use the TRANSMIT command to send optimized for mainframe architecture.
messages, data sets, or both, to another user. Upper-layer protocol:
The TRANSMIT command converts this data
The layer of the Internet Protocol (IP) that
into a special format so that it can be
supports one or more logical protocols (for
transmitted to other users in the network.
example, a SCSI-command protocol and an
Transparency: ESA/390 command protocol). Refer to ANSI
See software transparency. X3.230-199x.
Trusted Key Entry (TKE):
A feature that is a means for ensuring secure V
creation and management of key material and
for managing the crypto adapters on the host. virsh:
TSE: Is a command line interface tool for managing
See Track Space Efficient. guests and the hypervisor.
The act of creating a virtual (rather than actual) Virtual Private Network (VPN):
version of something, including virtual computer is a network that is constructed using public
hardware platforms, operating systems, storage wires, usually the Internet, to connect to a
devices, and computer network resources. private network, such as a company's internal
Virtual machine facility: network.
A virtual data processing machine that appears Vital Product Data (VPD):
to the user to be for the exclusive use of that Information that uniquely defines the system,
user, but whose functions are accomplished by hardware, software, and microcode elements of
sharing the resources of a shared data a processing system.
processing system. An alternate name for the
Virtual Storage Access Method (VSAM):
VM/370 IBM operating system.
VSAM is a file storage access method used in
Virtual Local Access Network (VLAN): z/OS operating systems. It is a high
Is any broadcast domain that is partitioned and performance access method used to organize
isolated in a computer network at the data link data in form of files in Mainframes.
layer. VLANs work by applying tags to network
Virtual Telecommunications Access Method
packets and handling these tags in networking
(VTAM):
systems - creating the appearance and
functionality of network traffic that is physically VTAM is the IBM subsystem that implements
on a single network but acts as if it is split Systems Network Architecture (SNA) for
between separate networks. In this way, VLANs mainframe environments. VTAM provides an
can keep network applications separate despite application programming interface (API) for
being connected to the same physical network, communication applications, and controls
and without requiring multiple sets of cabling communication equipment such as adapters
and networking devices to be deployed. and controllers.
For IBM Z, the information recorded on a single WebSM (Web-based System Manager):
unit of recording medium. Indirectly, it can refer Is a client/server application that gives the user
to the unit of recording medium itself. On a non a powerful interface to manage UNIX systems.
removable-medium storage device, the term Web-based System Manager uses its graphical
can also indirectly refer to the storage device interface to enable the user to access and
associated with the volume. When multiple manage multiple remote machines.
volumes are stored on a single storage medium Weight distribution area:
transparently to the program, the volumes can The area that is required to distribute the weight
be referred to as logical volumes. of the storage system.
Volume group: Workload Manager (WLM):
A collection of either physical or logical Is a base component of the z/OS mainframe
volumes. operating system. It controls the access to
Volume Table Of Contents (VTOC): system resources for the work executing on
A table on a Direct Access Storage Device z/OS based on administrator-defined goals.
(DASD) volume that describes the location, Worldwide Node Name (WWNN):
size, and other characteristics of each data set
A unique 64-bit identifier for a host that contains
on the volume.
a Fibre Channel port. See also worldwide port
VPD: name.
See Vital Product Data.
Worldwide port name (WWPN):
VSE/ESA: A unique 64-bit identifier associated with a
An IBM operating system, the letters of which Fibre Channel adapter port. It is assigned in an
represent virtual storage extended/enterprise implementation- and protocol-independent
systems architecture. manner. See also worldwide node name.
VSAM: WWNN:
See Virtual Storage Access Method. See Worldwide Node Name.
VTAM: WWPN:
See Virtual Telecommunications Access See Worldwide Port Name.
Method.
X
W
XCF:
Warm demotion:
See Cross-System Coupling Facility.
An operation of IBM Easy Tier automatic mode.
The movement of an extent of moderately Xen:
active data to a lower tier when its tier has Xen Project is a hypervisor using a micro kernel
exceeded its optimal bandwidth capacity. design, providing services that allow multiple
computer operating systems to execute on the
Wavelength-Division Multiplexing (WDM):
same computer hardware concurrently.
Is a method of combining multiple signals on
laser beams at various Infrared (IR) XES:
wavelengths for transmission along fiber optic
See Cross-System Extended Services.
media. Each laser is modulated by an
independent set of signals. Extensible Markup Language (XML):
Wavelength-sensitive filters, the IR analog of
visible-light color filters, are used at the
receiving end.
Is a markup language that defines a set of rules zKVM (KVM for IBM Z):
for encoding documents in a format that is both A virtualization infrastructure for the Linux
human-readable and machine-readable. kernel that turns it into a hypervisor. It simplifies
configuration and operation of server
Y virtualization, leverages common Linux
administration skills to administer virtualization,
Z supports flexibility and agility leveraging the
z Application Assist Processor (zAAP): open source community, and provides an Open
Source virtualization choice.
This is a processor with a number of functions
disabled (interrupt handling, some instructions) Zoning:
such that no full operating system can be In Fibre Channel environments, the grouping of
executed on the processor. However, z/OS can multiple ports to form a virtual, private, storage
detect the presence of zAAP processors and network. Ports that are members of a zone can
will use them to execute Javacode. The same communicate with each other, but are isolated
Java code can be executed on a standard CP. from ports in other zones.
Again, zAAP engines are not counted when zSeries File System (ZFS):
specifying the model number of the system.
zFS is a z/OS UNIX file system that can be
Like IFLs, they exist only to control software
used like the Hierarchical File System (HFS).
costs.Note: zAAPs are not supported on IBM
zFS file systems contain files and directories,
z13, z13s, and the z14 mainframes.
including Access Control Lists (ACLs), that can
zDAC: be accessed with the z/OS HFS application
programming interfaces (APIs).
See z/OS Discovery and Auto Configuration.
z/OS:
Integrated Information Processor (zIIP):
An operating system for the IBM Z family of
Is a specialized engine for processing eligible products.
database workloads. The zIIP is designed to
help lower software costs for select workloads z/OS Discovery and Auto Configuration
on the mainframe, such as business (zDAC):
intelligence (BI), enterprise resource planning Designed to automatically run several I/O
(ERP) and customer relationship management configuration definition tasks for new and
(CRM). The zIIP reinforces the mainframe's changed disk and tape controllers that are
role as the data hub of the enterprise by helping connected to a switch or director, when
to make direct access to DB2® more cost attached to a FICON channel.
effective and reducing the need for multiple
z/OS Global Mirror:
copies of the data.
Remote mirror and copy feature for IBM Z
zHPF: environments. A function of a storage server
See High Performance FICON for IBM Z. that assists a control program to maintain a
consistent copy of a logical volume on another
zHPF:
storage system. All modifications of the primary
See High Performance FICON for IBM Z. logical volume by any attached host are
presented in order to a single host. The host
IBM Z Hypervisor Performance Manager
then makes these modifications on the
(zHPM):
secondary logical volume. This function was
Monitors virtual machines running on KVM to
formerly called Extended Remote Copy or
achieve goal-oriented policy based
XRC.
performance goals.
backpg