Homework assignment operating system

User Generated

Nyrkvffn

Computer Science

Description

Here is an assignment for operating system that have 4 word documents which is the parts for the homework and an additional word document which can help you find the answer.

Unformatted Attachment Preview

Contents Assignment Introduction ......................................................................................................................................... 4 Researching Your Answers ................................................................................................................................. 4 A Little Advice Before you start ......................................................................................................................... 5 Demonstrating Knowledge and Increased Penalties for Irrelevant Answers ...................................................... 6 You Must Submit YOUR Answer in this Original Word Document to Blackboard .......................................... 6 You Must RENAME this Original Word Document to Include your LAST NAME ......................................... 7 NEVER submitted an Assignment as an Email Attachment ............................................................................... 7 ONLY Submit a FINAL Version of ALL Assignment ....................................................................................... 7 Requests to Clear Previously Assignments for Re-Submission .......................................................................... 7 Submitting Late Assignments ............................................................................................................................. 7 Academic Integrity and Plagiarism ..................................................................................................................... 8 How to complete Content Questions ................................................................................................................... 9 1.0 Introduction to z Systems ................................................................................................................................ 10 1.1 Questions - Introduction to z Systems......................................................................................................... 11 1.2 Questions - Specialized z System Family of Processors ............................................................................. 13 2.0 z13 System Hardware, I/O and Storage Technologies .................................................................................... 14 2.1 Question - z13 System Hardware Concepts ................................................................................................ 15 2.2 Questions - z13 System Frames .................................................................................................................. 17 2.3 Questions - Z13 CPC Drawers .................................................................................................................... 18 2.4 Questions - PCIe Interfaces ......................................................................................................................... 20 3.0 z System Workloads, Careers, File System, and Subsystems ......................................................................... 21 3.2 Questions - z System Roles and Careers ..................................................................................................... 22 3.3 Questions - Separation of Duties................................................................................................................. 23 3.4 Questions - Z System Subsystems and Concepts ........................................................................................ 24 3.5 Questions - DASD, File Systems, Sequential Data Sets and Partitioned Data Sets .................................... 24 3.6 Questions- Volumes, VTOCs and Catalogs ................................................................................................ 27 3.7 Questions - VSAM Concepts ...................................................................................................................... 28 3.8 Questions - JCL ........................................................................................................................................... 29 3.9 Questions - DB2 and IMS ........................................................................................................................... 30 3.10 Questions- RACF and SAF ....................................................................................................................... 30 3.11 Questions - SNA and TCP/IP .................................................................................................................... 31 3.1 Questions - Batch, OLTP, Web Applications and Web Services Workloads ............................................. 32 4.0 Mobile Online Transaction Processing ........................................................................................................... 33 4.1 Introduction to Mobile Online Transaction Processing .............................................................................. 33 4.2 Native mobile applications versus HTML5 and Hybrid mobile applications ............................................. 33 4.3 Questions - BYOD or BYOT ...................................................................................................................... 34 Page 2 of 45 4.4 Introduction to IBM MobileFirst Platform.................................................................................................. 34 4.5 Questions – Native, Hybrid and HTML Apps ............................................................................................ 35 4.6 Question – Choosing the Right Mobile App Architecture .......................................................................... 37 4.7 Questions - Mobile application servers ....................................................................................................... 37 4.8 Questions – Internal, External, ad Third-Party Mobile Application Development ..................................... 38 4.9 Questions – IBM MobileFirst Platform Components and Advantages ....................................................... 40 5.0 Cognitive Computing and Data Analytics ...................................................................................................... 41 5.1 Introduction to Cognitive Computing ......................................................................................................... 41 5.2 Questions - Cognitive Model ...................................................................................................................... 41 5.3 Questions - Big Data and Deep Analysis .................................................................................................... 42 5.4 Questions - Data Analytic Tools, Programing Languages, Statistical Packages, and Concepts ................. 42 Page 3 of 45 Enter your Name Here  Assignment Introduction Researching Your Answers Most requirements of this assignment will require you to research answers from your text book (you must read the text book to get some answers), from the Internet, from a video or any other reasonable source. Many Internet sources, video links, text book and Blackboard presentations are provided in this document to help you START your research. Assignments are always a great place to read and reference your text book. May students assume that they should start by reading the text book. While this reading the text book is ALWAYS at great idea, the following assignment questions may help you focus on what is important in this course. One strategy is to review an assignment question for important keywords, e.g., multitasking, Procedure Division, virtualization, etc. Then look for those key words in either 1) your text book "detailed" table of contents in the beginning of the book, or 2) in the index at the end of the book. Some text books have key word glossaries at the end of the chapter or end of the book. Every semester the Internet sources, e.g., a Google keyword search, or Internet video, e.g., a YouTube keyword search may be improved. Better students start with research sources provided in this assignment, and then search for improved or updated answers. While your objective may be to demonstrate your knowledge to EARN an excellent grade on this assignment, better students are always looking towards the future to impress internship and career recruiters for those interesting and high entry-level salaries. Employers don't pay you for a grade in any single class or assignment. Employers will pay you BIG MONEY for demonstrated knowledge or skills. Hopefully, this assignment will prepare you. A single research source maybe very incomplete or the format or the content may not be appropriate for some required answers. Some students do not READ the text book or review the Blackboard presentations provided to you in Blackboard. Some answers are only available from Blackboard presentations or update documents. When assignment requirements may be only answered by viewing a YouTube video, you will be notified. You may cut-and-paste answers whenever appropriate. You MUST synthesize your answers to include multiple sources. I would be impressed that you consult a Google image search and paste and appropriate image to supplement your answer. Page 4 of 45 While I permit cut-and-paste, I do expect you use your own words so that you: 1. Organize the answer 2. Demonstrate that you have read what you have cut-and-pasted 3. Use any means that clearly displays that you have gained knowledge. A Little Advice Before you start There is NO requirement to read each reference link or view each video in detail. Some of the links will have overlapping content. Some links will provide more information than the question requirements, but employers consider these topics to be minimal knowledge of a It is recommended to visit each reference link and overview the content. Then read each question and return to each reference link or video as needed. You may supplement your answers with content from your text book by using a question keyword and looking up in the glossary or index in the back of the book. PDF text books can be easily searched for keywords. It is not required to read your text books before working on this assignment unless specified in a requirement. Text book contents are used to support quiz questions (which contain the answers), which are used on the tests. The reference links and videos are excellent resources. The topics presented in the course assignments have been highly recommended by two or more employers who recruit students as minimum computer hardware, operating system, and application development knowledge. Employers expect that students should be able to present one or two sentences of the majority of keywords applicable to job requirements in a face-to-face interview. On the other hand, each assignment is allocated 100 points out of a total of 1000 points. The number of questions or hands-on activity on each assignment varies. Assume that an average assignment has 50 requirement questions. This means that a requirement may be worth 2 points towards your final grade. The bottom line is that missing a few questions will have little effect of your assignment or final grade. Not completing an assignment will generally decrease your final grade by at least a letter grade. Do not waste time on the small problems. Page 5 of 45 Demonstrating Knowledge and Increased Penalties for Irrelevant Answers If you can DEMONSTRATE your knowledge of the topic for the requirement there will be no penalty for your answer. It is not the intention of this assignment to be "not picky". Parital credit will be awarded as appropriate. If you cut-and-paste and pray that your instructor will not read your inappropriate and irrelevant answer, the question will be penalized by increasing the deduction points beyond the original requirement points. The instructor hates irrelevant cut-and-paste BS, or answers that appears that the student is guessing and hopes the instructor does not read the answer. The instructor reserves the right to increase the penalty for any submitted question or assignment that may be construed as "wasting the instructor's time". Therefore, a four-point requirement may be penalized as six-points (two additional point penalty for wasting the instructor's time). Sometimes blank answers will earn you’re a high assignment grade than BS answers. For example, a submitted 100-point assignment may be penalized as 125 minus points when your final grade is calculated for any assignment that should have never been submitted in the first place. You Must Submit YOUR Answer in this Original Word Document to Blackboard This Assignment Word Document will contain hidden markers that may be used to detect plagiarism and provide an audit trail of those who may have modified the Word document. Many students in my classes work very hard to complete and learn from their assignments. It is not fair to those students who have professionally demonstrated their knowledge to receive the same grade as those who have plagiarized their assignments You MUST answer ALL requirement in this Word document and ONLY THIS Word Document. You MAY NOT use or edit any other word processor, except any version of Microsoft Word. Do not use GOOGLE DOCS or Open Office DOCX files at any time. If you use any other Word Processor you will be assigned ZERO credit. If you do not have a copy of WORD, you may use VMWARE VIEW (available from the RMU website) to access a virtual lab computer which contains any software needed for this course. http://www.rmu.edu/web/cms/departments-offices/administration-services/it/Pages/vmware-view.aspx NEVER STORE ANY DOCUMENTS ON THE DESKTOP OF VMWARE VIRTUAL COMPUTER. You will lose your document. It is preferable to store your documents on RMU Drive U: If necessary you can email the document to yourself. Page 6 of 45 You Must RENAME this Original Word Document to Include your LAST NAME YOU MUST enter your name in the beginning of this document as provided and "Save As" this document using a new name that starts with your LAST NAME, assignment number and semester, e.g., Jones Assignment 1 Summer 2016.docx If you do not rename your document your assignment will be penalized by 10%. NEVER submitted an Assignment as an Email Attachment All assignments are to be submitted to the instructor by using the Assignment Link in the Blackboard system. Assignments submitted as an email attachment will NOT be graded. THE INSTRUCTOR NEVER ACCEPTS ANY ASSIGNMENT AS AN EMAIL ATTACHMENT FOR ANY REASON. ONLY Submit a FINAL Version of ALL Assignment Never submit an incomplete assignment for grading. Only submit your final version of ALL assignment documents for grading. You can only submit an Assignment once. Requests to Clear Previously Assignments for Re-Submission If you make an error submitting an assignment you must contact the instructor to clear your previous assignment submission. If you made an error on any assignment you may request that the previous assignment submission be cleared so that you may resubmit the assignment again. Please only submit a completed assignment. Submitting Late Assignments While the assignments have a recommended due date, the instructor does not penalized your assignment grade if you are slightly late. Please do not send the instructor an email if you are going to submit your assignment late. The instructor is flexible and assumes you have a good excuse. But, after you are more than two weeks late the instructor does reserve to penalize the assignment or not accept the assignment if this late submission is unfair to other students enrolled in the course who had completed their assignments on time. It has been the experience of the instructor that students who are excessively or consistently late asks a friend to provide them a copy of their assignment which will violate the RMU Academic Integrity Policy. (Please carefully read the next section!) If a friend asks you for a copy of your assignment "to get an idea what the instructor wants", you are risking a zero assignment grade, an F final grade, or a RMU Academic warning or suspension. Page 7 of 45 Academic Integrity and Plagiarism When an instructor has possession of an electronic document it is easy to detect plagiarism. Microsoft Word provides a variety of FREE anti-plagiarizing tools. The content of your submitted Assignment WORD document will be COMPARED to each other student who has submitted this assignment in the current class or any previous class as time permits. The content of each student's assignment may NOT be copied from any other current or past student enrolled in this class. Each assignment is to be prepared by ONE student. Assignments are NOT a group-prepared assignment. Some students may attempt to SAVE AS another student's completed assignment and rename it using their name. Some students may attempt to Cut-and-Paste answers from one student's assignment document to another student's assignment document. But as time permits, the forensic tools used to compare ALL student's assignments with other assignment will often detect anomalies which will provide absolute proof of plagiarism. On-ground tests may be used to compare the student’s knowledge to performance on assignments. All acts of plagiarism and forensic data will be submitted the RMU Academic Integrity Board to determine university-wide penalties, such as grade penalties, warnings, suspension, and change of a previous course grade for previous course students. All current and previous students involved in the plagiarism may be affected RMU Academic Integrity Board. If a friend asks you for a copy of your assignment "to get an idea what the instructor wants", you are risking a zero assignment grade, an F final grade, or a RMU Academic warning or suspension. You are responsible to protect your assignment Word Document. You, however, may discuss assignment requirements, provide research assistance, assist other students to debug programs or other hands-on-requirements, tutor students, or provide other advice that may assist the students in acquiring knowledge. But the actual preparation of an individual assignment must have been completely prepared by the student who submitted the assignment. Sections of the assignments may be copied from the internet as per the individual assignment's directions. Please contact the instructor if you need assistance interpreting this RMU Academic Integrity Policy. (Ref.16-1.) Many believe that if you a "stupid" enough provide another student, whom may compete with you for a future internship or career, a copy of your assignment, then you deserve the same penalty as the other student. If you are a "real" friend, tutor your friend. The instructor reserves the right to require face-to-face hands-on demonstrations or face-toface tests to provide additional evidence to be submitted to the RMU Academic Integrity Board. Page 8 of 45 How to complete Content Questions Review questions are also be provided at the end of the tutorial. The following is an example of a review question format. Since type the answer in provided grey or colored box. 1. What is the purpose of a partitioned data set? Answer: Type in the answer to the question into the grey or colored box. It is recommended that you use Table of Contents at the beginning of the tutorial to review and navigate to the concept presented in the review question. Students will find that using the document FIND tool or searching GOOGLE may also be valuable for researching the review question answer. Page 9 of 45 1.0 Introduction to z Systems It is recommended that you refer to following chapters in your text book. • • Chapter 1: Introduction to the new Mainframe. Text book " Introduction to the Mainframe: z/OS Basics" Glossary: Text book " Introduction to the Mainframe: z/OS Basics" Video - Overview of z System Environment - Unit-01 http://youtu.be/STD_C0TPb04 IBM Paul Newton's presentation of the z System Family of Processors, Operating Systems, Support and Services Technical Roles, and Virtualization Technologies See Blackboard Folder "Paul Newton's z System Presentations" for a copy of the Presentation Video – z System Documentation - Unit-02 https://youtu.be/UipoF_QDSiU IBM Paul Newton's presentation on locating IBM Redbooks, z/OS Manuals, z/OS Glossary of Terminology, z/OS Messages and Codes See Blackboard Folder "Paul Newton's z System Presentations" for a copy of this Presentation You MUST type or paste your answer in the box or table area provided, else you will receive ZERO credit. Simply position the cursor inside box or table and type or paste your answer. Read the Introduction to z System document Introduction to Data Processing and Processor Architecture Document Page 10 of 45 1.1 Questions - Introduction to z Systems 1. What is z System? Answer: . 2. How many years ago was IBM mainframes introduced for large-scale corporate and government processing? Answer: . 3a.Which operating systems are supported by z System? Answer: . 4. In spite of COBOL being very popular Z System programming language, why has the demand for z System C/C++ programmers increased? Answer: . 5. What does the "z' in z System mean? Answer: . 6. What are the advantages of IBM's "backward compatibility" as compared to Windows, Intel, Linux and UNIX platforms? Answer: . 7. List at least four reasons why should learn about z System? Answer: . 8. List at least five major Fortune 500 companies who uses z System as a mission-critical, secured high-volume transaction server. Answer: . Page 11 of 45 9. List at least five major government agencies who uses z System as a mission-critical, secured highvolume transaction server. Answer: . 10. Wallmart purchased their first IBM mainframe in 1952 and continues to use z System as their mission-critical IT platform. At that time the IBM mainframe was classified as a Centralized Processing Architecture. Explain the concept of a centralized processing architecture. Answer: . 11. List four major IT program processing sub-requirements using the analog of purchasing a rotisserie chicken at Wallmart. Answer: . 13. Describe limitations facing a centralized processing architecture using the analog of purchasing a rotisserie chicken at Wallmart's centralized mainframe technologies of the 1950s to 1970s. Answer: . 14. It is very inefficient to support a mouse or touch-based graphical user interface using a centralized computer architecture. Provide some estimates the processing overhead for a desktop computer system to support a mouse or touch-based graphical user interface. Answer: . 15. Why doesn't a centralized, multiuser, high-transaction volume mainframe directly support a mouse or touch-based graphical user interface? Answer: . 16. Explain the concept of a client-server processing architecture? Answer: . 17. Describe the process how Wallmart uses a client (the Kiosk) and a z System backend server processing architecture for Wallmart's customers to purchase a rotisserie chicken at a local Wallmart store. Answer: . Page 12 of 45 1.2 Questions - Specialized z System Family of Processors IBM mainframe - http://en.wikipedia.org/wiki/IBM_mainframe IBM System z - http://en.wikipedia.org/wiki/IBM_System_z z/Architecture - http://en.wikipedia.org/wiki/Z/Architecture Coupling Facility (ICF) - http://en.wikipedia.org/wiki/Coupling_Facility Integrated Facility for Linux - http://en.wikipedia.org/wiki/Integrated_Facility_for_Linux System z Application Assist Processor (zAAP) - http://www03.ibm.com/systems/z/hardware/features/zaap/index.html z System Application Assist Processor - http://en.wikipedia.org/wiki/Z_Application_Assist_Processor zIIP Processor - http://en.wikipedia.org/wiki/ZIIP Video - Overview of z System Environment - Unit-01 http://youtu.be/STD_C0TPb04 IBM Paul Newton's presentation of the z System Family of Processors, Operating Systems, Support and Services Technical Roles, and Virtualization Technologies See Blackboard Folder "Paul Newton's z System Presentations" for a copy of the Presentation 35. Describe the processor task specialization for each of following IBM processor-types using the following table z System Processors . Processor Type Designed (Optimized) for which type of Processing Task? CP ICF IFL zAAP zIIP Taking Advantage of Multicore PCs (can be applied to IBM mainframes) - http://www.washingtonpost.com/wpdyn/content/article/2008/08/04/AR2008080401582.html Multi-core processor - http://en.wikipedia.org/wiki/Multi-core_processor Page 13 of 45 2.0 z13 System Hardware, I/O and Storage Technologies Introduction to the System z13 Architecture Document Important- IBM z13 Mainframe - www.slideshare.net/DarrenDonaldson/ibm-z13-mainframe Z13 update - http://www.slideshare.net/StigQuistgaard/z13-update The IBM z13 – Server - http://www.vmworkshop.org/docs/2015/r9fgSpBF.pdf Bus and Tag Channels http://en.wikipedia.org/wiki/IBM_System/360#Channels ESCON - http://en.wikipedia.org/wiki/ESCON FICON - http://en.wikipedia.org/wiki/FICON Channel subsystem (CSS) http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.znetwork/znetwork_ 59.htm IBM Storage - http://www-03.ibm.com/systems/storage/disk/ IBM Storage - https://en.wikipedia.org/wiki/IBM_Storage Page 14 of 45 2.1 Question - z13 System Hardware Concepts 1. Describe or define the following z System Mainframe Concepts using the following table. z13 System Hardware Concepts Concept Description Drawer Busses PU Processor Storage Controller DDR3 Sysplex Coupling Facility Processor Channel Subsystem Node IBM DS8000 Storage Server RAIM IBM Flash Express . OSA Opens System Adapter FICON Express 16s PCIe Drawers . Page 15 of 45 Page 16 of 45 2.2 Questions - z13 System Frames 2. An IBM mainframe design is based on a two-frame (storage rack) design, which are named the AFrame and the Z-Frame. (See previous image.) List the mainframe hardware components that are normally installed in the A-Frame. Answer: . 3. (See previous image.) List the mainframe hardware components that are normally installed in the z-Frame. Answer: . Page 17 of 45 2.3 Questions - Z13 CPC Drawers 4. IBM z13 processor technologies are stored in a packaging unit called a "drawer". List the hardware components normally found in a z System book packaging unit. Answer: . 5. What are the maximum number of "drawers" that may be installed in an IBM z 13 mainframe? Answer: . 6. What are the differences between a z13 drawer and a z13 nodes? Answer: . Page 18 of 45 7. List the total amount of system memory that can be installed z13 Mainframe and a CPU drawer? Answer: IBM z13 Performance: The Benefits of Large Memory - http://mainframeinsights.com/ibm-z13performance-benefits-large-memory/ Benefits of Configuring More Memory in the IBM z/OS Software Stack http://www.redbooks.ibm.com/redpapers/pdfs/redp5238.pdf 8. List at least four advantages of using large memory? Answer: 9. List the maximum number of z13 CPU drawers that can be installed in a mainframe? Answer: 10. List the maximum number of processors that can be installed/activated in a z13 CPU drawer. Answer: 11. List the maximum number of cores in z/13 processors. Answer: 12. What is the difference between a z13 Physical Unit (PU) processor and a Storage Controller (SC) processor? Answer: 13. Compare the performance of z13 Physical Unit (PU) processors to Intel, AMD, etc., processor performance of in terms of general purpose and specialize workloads? Answer: 14. Explain the concept of Spare processors? Answer: 15. What are the advantages of Capacity-on-Demand processors and cores? Answer: Page 19 of 45 16. Which type of communication technology is used to interconnect z13 CPU drawers and external I/O technology? Answer: 17. What are the advantages of using IBM Flash Express? Answer: 2.4 Questions - PCIe Interfaces What is PCI Express? PCI Express, technically Peripheral Component Interconnect Express but often seen abbreviated as PCIe or PCI-E, is a standard type of connection for internal devices in a computer or mainframe. Generally, PCI Express refers to the actual expansion slots on the system board or drawer that accept PCIe-based expansion cards and to the types of expansion cards themselves. Some mainframe drawers contain slots similar to PC-type servers 1. What is the difference between a z13 CPU Drawer and z12 PCIs Drawer? Answer: . 2. List the three technology components of a PCIe Adaptor. Answer: . 3. What are the advantages of using the z13 PCIe Fanout Adaptors? Answer: . 4. What are the differences between a PCIe FICON Adaptor and a PCIe OSA Adaptor? Answer: . 5. List four or more examples of the functions of PCIe OSA Adaptor in a data center. Answer: . Page 20 of 45 3.0 z System Workloads, Careers, File System, and Subsystems Read the Introduction to z Systems document Chapter 2: Mainframe hardware systems and high availability. Text book " Introduction to the Mainframe: z/OS Basics" Chapter 5: Working with data sets. Text book " Introduction to the Mainframe: z/OS Basics" Glossary: Text book " Introduction to the Mainframe: z/OS Basics" What is JES? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm z/VM http://en.wikipedia.org/wiki/Z/VM Processing work on z/OS: How the system starts and manages batch jobs http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch. htm What is TSO? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch. htm What is ISPF? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch. htm What is JES? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch. htm Main Features of ISPF http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.zcourses/zcourses_ispfmain_book.pdf ISPF Primary menu and Datasets http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.zcourses/zcourses_ispfpdf_book.pdf ISPF Data Sets http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.zcourses/zcourses_ispfdsbasics_book.pd f ISPF http://en.wikipedia.org/wiki/ISPF Rexx - http://en.wikipedia.org/wiki/Rexx What is Rexx? - http://www.rexxla.org/rexxlang/ Page 21 of 45 3.2 Questions - z System Roles and Careers 7. Using the following table list several activities performed by each of the following mainframe roles. z System Roles and Careers . Role Activities Performed System Programmer System Administrator Application Programmer System Operator Production Control Analyst Customer Engineer FTSS (Field Technical Sale Support) SE (Systems Engineer) SPOC (Single Point of Contact) Page 22 of 45 3.3 Questions - Separation of Duties Separation of Duties and IT Security http://www.csoonline.com/article/446017/separation-of-duties-and-it-security Separation of duties http://en.wikipedia.org/wiki/Separation_of_duties Anatomy Of A Fraud - http://www.csoonline.com/article/2117911/fraud-prevention/anatomy-of-a-fraud.html How to prevent and detect fraud - http://www.csoonline.com/article/2118811/investigations-forensics/how-toprevent-and-detect-fraud.html The ERP Security Challenge - http://www.csoonline.com/article/2122277/application-security/the-erp-securitychallenge.html 8. Using examples from the previous table titled "z/Enterprise Roles", explain the concept of "Separation of Duties". Answer: 9. The web URL document "Separation of Duties and IT Security" provides an easy test to determine if principles of the "Separation of Duties" have been violated. Explain this test of "Separation of Duties". Search the document for the keyword "test". Answer: 10. Using examples from the previous table listing "Typical z/Enterprise" roles. Select any two z System roles. Explain the reasons that these roles are based of the security concept "Separation of Duties". Answer: Page 23 of 45 3.4 Questions - Z System Subsystems and Concepts 11. Given the following IBM z System Concepts. Your text book has some excellent definitions. Describe the following z System concepts using the following table. Z System Subsystems and Concepts . Concept Description JES ISPF SDSF WebSphere TSO JCL CICS REXX ISPF SNA 3270 Terminal LPAR z/VM Video - z/OS Data Sets, VSAM, System and User Catalogs, and zUnix File SystemsUnit-07 http://youtu.be/NT_1AmdmlGg IBM Paul Newton's presentation and demonstration of z/OS and VSAM data sets, VTOC, System and User Catalogs, and Unix System Services file systems. Ditto, Storage Management Subsystem (SMS), and using ISPF and ISMF to manage datasets are reviewed. Some sections of this video are introductory. Some sections of this video are at a more intermediate level. See Blackboard Folder "Paul Newton's z System Presentations" for a copy of this Presentation 3.5 Questions - DASD, File Systems, Sequential Data Sets and Partitioned Data Sets Page 24 of 45 Read the Introduction to z Systems document What is a data set? Direct access storage device - http://en.wikipedia.org/wiki/Direct_access_storage_device z/OS UNIX file systems http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm What is z/OS UNIX? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm 12. What are the functions of any file system, e.g., z/OS, Linux, or UNIX? Answer: 13. What is z System DASD? Answer: 14. What is a data sets? Answer: 15. What Windows or Linux storage concept is similar to a DASD? Answer: 16. List the rules for naming data sets. Answer: 17. How a z/OS sequential data set is organized? Answer: 18. What is the purpose of a Z/OS partitioned sequential data? Answer: Page 25 of 45 19. A Partitioned Data Set (PDS) is similar to which storage concept in a Windows, UNIX or Linux file systems? Answer: 20. What are the advantages of the PDS-extended (Library) disk organization as compared to the older PDS (Partitioned Organization (PO))? Answer: 21. What is meant by data set organization (DSORG)? Answer: 22. z/OS Data Set Organization (DSORG) is similar to which Windows file system concept? Answer: 23. Given the following data set named: RMU0202.COBOL.CLASS. What is the first named segment, i.e., RMU0202, is called? Answer: 24. Your High Level Data set Qualifier are used for three functions. List these three functions. Answer: 25. What is a function of a Low-level Data Set Qualifier? Answer: . 26. What Windows file system concept is comparable to a datasets? Answer: . Page 26 of 45 3.6 Questions- Volumes, VTOCs and Catalogs http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm What is a VTOC? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm VSAM Catalogs - http://www.exforsys.com/tutorials/mainframe/vsam-catalogs.html Difference between catalog and vtoc - http://ibmmainframeforum.com/viewtopic.php?f=6&t=1327 Disk Volume (computing) - http://en.wikipedia.org/wiki/Volume_%28computing%29 Disk volume - http://searchstorage.techtarget.com/definition/volume What is difference between volume and disk - http://www.storagecraft.com/support/forum/what-differencebetween-volume-and-disk Volume Label - http://pcsupport.about.com/od/termsv/g/volume-label.htm 5.6 How data sets are named - - Introduction to the New Mainframe: Z/OS Basics PDF What are DASD volumes and labels? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconcepts_151.htm 27. Explain the function of a VTOC (Volume Table of Contents). Answer: 28. Explain the function of a User Catalog. Answer: 29. What are the differences between a VTOC and a User Catalog? Answer: . 30. What is a VTOC similar to which storage concept in Windows? Answer: . Page 27 of 45 3.7 Questions - VSAM Concepts VSAM Tutorial - http://www.tutorialspoint.com/vsam/ VSAM Demystified (Chapter 1) - http://www.redbooks.ibm.com/redbooks/pdfs/sg246105.pdf Key-sequenced data set (KSDS) http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqnc d_data_set.html Relative record data set (RRDS) http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqnc d_data_set.html Entry-sequenced data set (ESDS) http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqnc d_data_set.html Record-oriented filesystem - http://en.wikipedia.org/wiki/Record-oriented_filesystem Introduction to Partitioned Data Sets - http://docweb.cns.ufl.edu/docs/d0068/ar01.html Since z System had its origin in the 1950s, there were very few types of data sets: Sequential and Partitioned Data. Sequential data was a collection of consecutive bytes used to store any types of data. But, only the application or operating system understood the internal contents of sequential data sets. The second type (data organization) of a data set was the partitioned data set which were used to organize the sequential data sets (a member) similar to a Windows or Linux folder or directory. Windows and Linux have hundreds of types of files, e.g., DOCX, MP3, MDB, etc. IBM had only two types of datasets and were designed for batch processing. As mainframe technology improved IBM introduce VSAM in the 1970s to improve the performance and features to datasets to meet the requirements of Online Transaction Processing. 31. What is VSAM? What is VSAM data used for? Answer: 32. Windows and Linux files are byte-oriented. Windows or Linux stores file contents, e.g., a Word Document, as a contiguous series of bytes until the end of the file marker is reached. Many z/OS BM data sets are stored using a record-oriented content format. A record is a group of related data, words, or fields treated as a meaningful unit; for instance, a Name, Address, and Telephone Number can be a "Personal Record". Many IBM data sets were primarily designed to store business data or application program code rather than unstructured content used by a Word document or graphic file. What were the advantages of an IBM recordoriented file format? (Assignment 1 hands-on explains this answer). Answer: 33. Use the following table and describe each of the following VSAM Dataset types that are used to store business transaction data. VSAM Data Set Organization Dataset Type Description Key-sequenced data set (KSDS) Entry-sequenced data set (ESDS) Page 28 of 45 Relative record data set (RRDS) Linear data set (LDS) 34. Use the following table and provide an image for each of the following VSAM Dataset type VSAM Data Set Organization Dataset Type Image Key-sequenced data set (KSDS) Entry-sequenced data set (ESDS) Relative record data set (RRDS) Linear data set (LDS) 3.8 Questions - JCL JCL Tutorial - https://www.tutorialspoint.com/jcl/index.htm JCL - JOB Statement - https://www.tutorialspoint.com/jcl/jcl_job_statement.htm JCL - EXEC Statement - https://www.tutorialspoint.com/jcl/jcl_exec_statement.htm JCL - DD Statement - https://www.tutorialspoint.com/jcl/jcl_dd_statement.htm 34. What is the function of JCL? Answer: 35. Within the structure of IBM JCL code explain the concept of the JCL JOB operator. Answer: 36. Within the structure of IBM JCL code explain the concept the JCL EXEC operator. Answer: 37. Within the structure of IBM JCL code explain the concept of a JCL DD operator. Answer: Page 29 of 45 3.9 Questions - DB2 and IMS DB2 – Introduction - https://www.tutorialspoint.com/db2/db2_introduction.htm DB2 http://en.wikipedia.org/wiki/IBM_DB2 IMS DB - https://www.tutorialspoint.com/ims_db/index.htm IMS http://en.wikipedia.org/wiki/Information_Management_System Hierarchical database systems http://en.wikipedia.org/wiki/Hierarchical_database 38. What are the functions provided by IBM's IMS Product Line (Information Management System)? Answer: 39. What are the functions provided by IBM's DB2 product line? Answer: 3.10 Questions- RACF and SAF RACF - Resource Access Control Facility - http://www.tutorialdownloads.com/tutorials/racf---resource-accesscontrol-facility+700.html RACF - http://en.wikipedia.org/wiki/RACF Security on z/OS - http://wwwlgis.informatik.unikl.de/cms/fileadmin/users/kschmidt/mainframe/lutzkuehner/Chapter11_Security_on_zOS_slides.pdf What is RACF? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zsecurity/zsecc_042.htm Resource Access Control Facility - http://en.wikipedia.org/wiki/Resource_Access_Control_Facility Security on z/OS http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.zsecurity/zsecurity_book.pdf 40. What are the functions and features provided by IBM's RACF product line (Resource Access Control Facility)? Answer: 41. What are the functions provided by IBM's SAF? Answer: Page 30 of 45 3.11 Questions - SNA and TCP/IP SNA http://en.wikipedia.org/wiki/IBM_Systems_Network_Architecture Networking on Z/OS http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.znetwork/znetwork_book.pdf 42. What is the primary function of SNA? Answer: 43. How is SNA compare to TCP/IP? Answer: Page 31 of 45 3.1 Questions - Batch, OLTP, Web Applications and Web Services Workloads Read the Introduction to z Systems document 1. Provide a detailed description and practical example of each of the following z/OS processing workloads or user/data interfaces. Workloads, User Description Practical Example and Data interfaces Batch Processing Online Transaction Processing (OLTP) Web Applications (WebSphere) Web Services (WebSphere MQ) 2. List the advantages and disadvantages of Batch Processing using the following table. Batch Processing Advantages Disadvantages 3. List the advantages and disadvantages of Transaction Processing (OLTP) using the following table. Transaction Processing (OLTP) Advantages Disadvantages 4. What z/OS subsystem manages batch processing? Answer: 5. Historically, the only interface to manage and execute jobs on an IBM operating system was keypunch cards. The popular online interface to access IBM operating systems, manage jobs, perform system program tasks is called? Answer: Page 32 of 45 6. What is the z/OS component that provides OLTP processing services for user transactions, e.g., inquiry to account balances, adding employee information into a database, etc. using legacy programming languages, e.g., COBOL? Answer: 4.0 Mobile Online Transaction Processing Read the Introduction to z Systems document 4.1 Introduction to Mobile Online Transaction Processing Many Web and Mobile OLTP applications are user-based interfaces are added to existing enterprise application server and databases. If the fundamental business transaction processing requirements rarely not change, a user text-based interface (a front-end system) may be replaced by more user-friendly web page (HTML, CSS, JavaScript) and mobile interfaces. Backend systems, which have satisfied business requirements and testing for decades will be modified less often. Therefore, the challenge facing modern user interfaces will be 1) how do enterprise user-interface applications systems keep up the changes and manage the variety of user-interface applications, and 2) how do how do enterprise user-interface applications communicate with backend application servers, databases, and security? 4.2 Native mobile applications versus HTML5 and Hybrid mobile applications Native mobile applications are developed specifically for one platform, e.g., Android, iOS, etc. and can take full advantage of all the device features — they can use the camera, the GPS, the accelerometer, the compass, the list of contacts, and so on. HTML5 and JavaScript Web technologies have provided alternatives to building mobile apps based on individual native mobile operating systems. This war between Web apps and native apps was hyperbolically billed by some as a war between efficiency and beauty, between penny-pinching and aesthetics. HTML5 champions touted the ease and speed of building and updating Web apps that relied on a single codebase that could run on any browser, and, by extension, any device. Meanwhile, advocates for native apps, while conceding the higher cost and time to build and maintain apps for multiple platforms, argued that being able to tailor for the strengths of each OS meant that apps looked and performed better than their browser-based equivalents. Page 33 of 45 4.3 Questions - BYOD or BYOT Mobile interface in diverse contexts and environments as opposed to focusing on devices alone or consumer roles. For example, the trend to introduce BYOB/ BYOT in the workplace or public space will continue to raise significant management challenges for IT organizations as they lose control of user endpoint devices. It will also require increased attention to user experience design. What is bring your own device? http://www.ibm.com/mobilefirst/us/en/bring-your-own-device/byod.html Bring your own device- https://en.wikipedia.org/wiki/Bring_your_own_device Pros and Cons of Bringing Your Own Device to Work http://www.pcworld.com/article/246760/pros_and_cons_of_byod_bring_your_own_device_.html 1. What is BYOT or BYOT? Answer => 2. List the advantages and disadvantages of BYOD/BYOT using the following table. Advantages and Disadvantages of BYOD/BYOT Projects In Business and Government Advantages Disadvantages 3. Using your personal example or an example from your current or previous employer, specifically describe a projects requirements, potential benefits (pros) and costs (cons) for a BYOD project. Answer => 4.4 Introduction to IBM MobileFirst Platform Introduction to z Systems Document (Very Important) An overview of IBM MobileFirst Platform http://www2.themsphub.com/rs/creationagencyibm/images/MobileFirst_Platform_Overview.pdf The IBM MobileFirst Platform (formerly IBM WorkLight) is a robust suite for 1) mobile application development, 2) mobile application testing and quality assurance, 3) mobile application and device administration, and 4) mobile enterprise middleware tools and standards. MobileFirst was not designed to replace Apple or Android mobile applications, but to improve mobile application development within an enterprise context. The popularity and success of Apple's IoS or Android mobile devices and apps as a consumer-based architecture continues to mature. One can download consumer-based mobile apps from the Apple Store, or Google Play from categories such as social networking, gaming, education, life style, entertainment, ecommerce, consumer business or utilities. IBM describes MobileFirst as an Enterprise Mobile Platform to contrast business-based mobile platforms with consumer-based mobile platforms. To illustrate consider the increased challenges facing large commercial bank who must both provide mobile device connectivity to its customers as well as its internal employees, e.g., BYOD (Bring-Your-Own-Device to work). Page 34 of 45 4.5 Questions – Native, Hybrid and HTML Apps Native vs Hybrid App Development - http://www.sitepoint.com/native-vs-hybrid-app-development/ HTML5 vs Native: The Mobile App Debate - http://www.html5rocks.com/en/mobile/nativedebate/ Native vs Mobile Web vs Hybrid applications - http://www.javacodegeeks.com/2013/12/native-vs-mobile-web-vshybrid-applications.html Five Alternatives for Developing Native iOS Apps - http://insights.dice.com/2015/04/02/five-alternatives-fordeveloping-native-ios-apps/ Responsive HTML5 Apps: Write Once, Run Anywhere? Where is Anywhere? http://www.wired.com/2013/11/responsive-html5-apps-write-once-run-anywhere-where-is-anywhere/ Mobile First Design: Why It's Great and Why It Sucks - https://codemyviews.com/blog/mobilefirst 4. Mobile application development is a popular project requirement. From a systems perspective one factor that needs to be considered is the choice of mobile application framework used to develop and deploy mobile applications, e.g. Native Language Apps ( Android, Objective-C, etc, HTML5/CSS, and JavaScript Frameworks cross platform Apps, or Hybrid. Describe the type of each mobile application framework listed below and provide a technology example of each type using the following table. A HTML Web App is NOT a HTML Web Page of Web Form Mobile Application Development Framework Description and Example Native Apps HTML Web Apps Hybrid Apps 5. List the Pros (Advantages) and Cons (Disadvantages) of Native Mobile Frameworks using the following table. Pros and Cons of Mobile Native Apps Advantages (Pros) Disadvantages (Cons) 6. List the Pros (Advantages) and Cons (Disadvantages) of Mobile HTML Web App Frameworks using the following table. Page 35 of 45 Pros and Cons of Mobile HTML Mobile Web Apps Advantages (Pros) Disadvantages (Cons) 7. List the Pros (Advantages) and Cons (Disadvantages) of Mobile Hybrid Apps using the following table. Pros and Cons of Mobile Hybrid Apps Advantages (Pros) Disadvantages (Cons) Page 36 of 45 4.6 Question – Choosing the Right Mobile App Architecture How to choose the right architecture for your mobile apps http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&ved=0CDIQFjAF&url=http%3A%2F%2F www.rapidvaluesolutions.com%2Fwp-content%2Fuploads%2F2013%2F04%2FHow-to-Choose-the-RightTechnology-Architecture-for-Your-Mobile-Application.pdf&ei=49GaVcvcLcneQH31ICoAQ&usg=AFQjCNEH_ohPIVhFFaiFhfX9xU9vnuRsbw Choosing the right mobile application architecture - http://enterpriseinnovation.net/article/choosing-right-mobileapplication-architecture-836468610 Mobile Application Architecture Guide- http://robtiffany.com/wpcontent/uploads/2012/08/Mobile_Architecture_Guide_v1.1.pdf Choosing The Right Architecture For Developing Mobile Application http://www.enterprisecioforum.com/en/blogs/sukumarofs/choosing-right-architecture-developing-m Why I use an application server for mobile applications - http://archive.thoughtsoncloud.com/2013/11/why-iuse-an-application-server-for-mobile-applications/ 8. Given the requirements of a university, who is noted for their "good-looking" Computer faculty (obviously not RMU), to develop, deploy and update mobile application systems for students, faculty and administrators. List the mobile application development framework(s) and reasons that you would recommend for mobile application systems for students, faculty and administrators. The rationale is important. You may select more that on framework. Your answer will be graded on your application of the previous questions and answers. Answer => 4.7 Questions - Mobile application servers Mobile application server - http://www.kony.com/resources/glossary/mobile-application-server Mobile Application Server - http://www.steponesystems.com/enterprise-mobility-applications/mobile-applicationserver/ Mobile App - Server Architecture - http://stackoverflow.com/questions/9165457/mobile-app-server-architecture How to Pick a Server for Your App - http://mashable.com/2011/11/16/mobile-app-cloud-servers/ 9. This course considers mobile applications beyond application coding. Therefore, what are the differences between a mobile application server and an application server? Answer => Page 37 of 45 10. Given the requirements of a university to develop, deploy and update mobile application systems for students, faculty and administrators, describe the listed mobile application server advantage and provide an example applying this concept using the following table. Advantages of Mobile Application Description and Example Servers Flexibility Security Scalability Deployment and Updates Database Integration Internal vs External team for mobile product development - http://www.thinslices.com/internal-vs-external-teamfor-mobile-product-development/ Here's Why Your Business Needs Its Own Mobile App http://www.forbes.com/sites/allbusiness/2014/11/17/heres-why-your-business-needs-its-own-mobile-app/ Why Your Enterprise Must Rethink Mobile App Development - http://www.wired.com/2013/02/why-yourenterprise-must-rethink-mobile-app-development/ Mobile web apps: The best option for business? - http://www.mrcproductivity.com/research/whitepapers/Whitepaper_Mobile.pdf 4.8 Questions – Internal, External, ad Third-Party Mobile Application Development 11. Mobile application systems is a popular project requirement. From a systems perspective one factor that needs to be considered is the development of the mobile app. Consider the three popular approaches to mobile application development: In-house (internal) development, External development, using third-parties mobile application and system. List the Pros (Advantages) and Cons (Disadvantages) of Internal Web Application Development using the following table. Pros and Cons of Internal Mobile App Development Advantages (Pros) Disadvantages (Cons) Page 38 of 45 12. List the Pros (Advantages) and Cons (Disadvantages) of External Mobile App Development s using the following table. Pros and Cons of External Mobile App Development Advantages (Pros) Disadvantages (Cons) 13. List the Pros (Advantages) and Cons (Disadvantages) of using Third Party Mobile Apps using the following table. Pros and Cons of Using Third Party Apps Advantages (Pros) Disadvantages (Cons) Page 39 of 45 4.9 Questions – IBM MobileFirst Platform Components and Advantages Read the Introduction to z Systems document 14. For each component of the MobileFirst platform 1) describe the functions of each component, and 2) describe the advantages of each MobileFirst platform component in an enterprise context using the following table. MobileFirst Platform Description of Functions MobileFirst Studio MobileFirst Server MobileFirst Application Center MobileFirst Console MobileFirst Platform Scanning Application MobileFirst Quality Assurance Page 40 of 45 Advantage to Mobile Apps in an Enterprise Context 5.0 Cognitive Computing and Data Analytics Read the Introduction to z Systems document 5.1 Introduction to Cognitive Computing Historically, IBM z Systems have dominated large-scale business transaction processing. However, in today's world, the ability to process and have access information to make decisions may be as valuable as recording a physical business transaction. Competition and technology advances are driving companies to adopt new business which will focus on INFORMATION. For example, Google, Facebook, Twitter, Instagram, Linked and other social media companies have provided free technology services to that they could collect and analyze large volumes of unstructured social data, and sell these analyses to organizations to make decisions. The analysis of this data will provide organizations with important insights to predict and plan for the future. The availability and analysis of Big Data has created a new Cognitive Era of Computing. Historically, enterprise computing started with Online Transaction Processing workloads. The objectives of Online Transaction Processing workloads are to efficiently, securely, process and store large number of transactions, to meet day-to-day process objectives and requirements and maintain data and transaction integrity in a multiuser, concurrent shared system. In the Cognitive Era, the analysis of Big Data from transaction and other sources to provide information to guide operational, tactical and strategic decision making has become very important to the design of enterprise systems. Big data analytics is the process of examining large data sets to uncover hidden patterns, unknown correlations, market trends, customer preferences and other useful business information. The analytical findings can lead to more effective marketing, new revenue opportunities, better customer service, improved operational efficiency, competitive advantages over rival organizations and other business benefits. http://searchbusinessanalytics.techtarget.com/definition/big-data-analytics 5.2 Questions - Cognitive Model 1. For each component of the Cognitive Model 1) describe the functions of each component, and 2) list several characteristics each Cognitive Model component in an enterprise context using the following table. Cognitive Model Characteristics Description System of Record System of Engagement Systems of Insight 2. What are the primary objectives of a System of Record? Answer => Page 41 of 45 5.3 Questions - Big Data and Deep Analysis Deep analytics is the application of sophisticated data processing techniques to yield information from large and typically multi-source data sets that may contain not only structured data but also unstructured and semistructured data. Deep analysis involves precisely targeted and sometimes complex queries on data sets that may be measured in petabytes and exabytes, often with requirements for real-time or near-real-time responses. The data is often unstructured and includes complex event analysis. Because real-time analysis of such large data sets can require distribution of the workload over hundreds or even thousands of computers, deep analytics is often associated with cloud computing. The workload distribution may be managed through some framework such as MapReduce. Approaches to speeding up the process of querying data include the use of columnar databases and in-memory analytics. The financial sector, the scientific community and the pharmaceutical and biomedical industries have conducted deep analytics for some years. In recent years, the practice has become increasingly common within the enterprise, as the amount of corporate data produced has increased -- and with it, the desire to extract business value from that data. 3. What is Big Data? Answer => 4. Describe each of the characteristics of Big Data in an enterprise context using the following table. Characteristics of Big Data Description. Volume Velocity . Variety Value . 5.4 Questions - Data Analytic Tools, Programing Languages, Statistical Packages, and Concepts Page 42 of 45 BI, Analytics, and Big Data: (Part 1) - https://www.mapr.com/blog/bi-analytics-and-big-data-%E2%80%9Cha%E2%80%9D-moment-part-1 Exploring the Relationship Between Hadoop and a Data Warehouse (Part 2) https://www.mapr.com/blog/exploring-relationship-between-hadoop-and-data-warehouse-part-2 What are Hadoop, SAS, and R, and what are the relationships between them? Is SAS a development of Hadoop? Which is better? - https://www.quora.com/What-are-Hadoop-SAS-and-R-and-what-are-therelationships-between-them-Is-SAS-a-development-of-Hadoop-Which-is-better Choosing R or Python for data analysis? - https://www.datacamp.com/community/tutorials/r-or-python-for-dataanalysis#gs.PcUqITc What Hadoop Is. What Hadoop Isn’t. - http://insideanalysis.com/2012/12/what-hadoop-is-what-is-isnt/ What’s the Difference between Apache Hadoop and Apache Spark? https://www.ibm.com/developerworks/community/blogs/f0f3cd83-63c2-4744-90219ff31e7004a9/entry/What_s_the_Difference_Between_Apache_Hadoop_and_Apache_Spark?lang=en SAS vs. R (vs. Python) – which tool should I learn? - https://www.analyticsvidhya.com/blog/2014/03/sas-vs-vspython-tool-learn/ What is R? - https://www.r-project.org/about.html R programming language-- http://searchbusinessanalytics.techtarget.com/definition/R-programming-language Why Scala Is Taking Over the Big Data World - https://www.google.com/#q=what+is+scala+big+data Scala 101 -Course - https://bigdatauniversity.com/courses/introduction-to-scala/ Video - IBM Watson: How it Works - https://www.youtube.com/watch?v=_Xcmh1LQB9I Video - IBM Watson - https://www.youtube.com/watch?v=rXVoRyIGGhU Video - IBM Watson: The Power of Artificial Intelligence - https://www.youtube.com/watch?v=z0BTZ6C8RAc What is machine learning? - http://whatis.techtarget.com/definition/machine-learning Evolution of machine learning - http://www.sas.com/en_us/insights/analytics/machine-learning.html Get the facts on IBM Watson Analytics - http://www.ibmbigdatahub.com/blog/get-facts-ibm-watson-analytics Page 43 of 45 5. Describe each of data analytic tools, programing languages, statistical packages, or concepts in an enterprise context using the following table. Data Analytic Tools and Concepts Description Text mining tools In-place Analytics Streaming Data analysis In-Transaction and Real-time Analytics Machine Learning Apache Hadoop (IBM Big Insights) Apache Spark . IBM Watson R IBM SPSS or SAS . SCALA Python 6. What are the differences between Watson and Hadoop? Answer => Page 44 of 45 7. What are the differences between Hadoop and Spark? Answer => 8. What are the differences between Scala and SPSS/SAS? Answer => Page 45 of 45 Contents Introduction ............................................................................................................................................................. 4 Tutorial Prerequisites .......................................................................................................................................... 4 Access or Installation of a 3270-client to Connect to z/OS .............................................................. 4 z/OS userID and Initial Password ..................................................................................................... 4 Objectives - Z System Tutorial – 2 ISPF and File System .................................................................................. 4 Tutorial Recommendations ................................................................................................................................. 5 Hands-on is the Best Way to Learn .................................................................................................. 5 Handling Common Errors submitting a JCL Job, using ISPF and SDSF ........................................ 5 Recommended Videos ...................................................................................................................... 5 How to complete Hand-on Tutorial Requirements and Review Questions ........................................................ 6 Windows Snipping Tool ..................................................................................................................................... 7 1.0 Preview to the z/OS Logon Process ................................................................................................................ 10 1.1 3270-Terminal Emulator Client Program ................................................................................................... 10 1.1.1 The functions of PCOMM 3270 emulator are to: .................................................................. 11 1.1.2 Can I use my mouse? ............................................................................................................. 12 1.1.3 Why doesn't TSO support a mouse? ...................................................................................... 12 1.1.4 RDz - Rational Developer for z Systems ............................................................................... 13 1.1.5 Configuring TN3270 clients .................................................................................................. 13 1.1.6 Tom Brennan's Vista tn3270-client and Master the Mainframe Contest. ............................. 13 1.1.7 Brown University - MAC OS X tn3270 client ...................................................................... 14 1.1.8 Android TN 3270 client apps for your mobile device ........................................................... 14 1.1.9 iOS TN 3270 client apps for your mobile device .................................................................. 14 1.1.10 Questions- 3270-emulator client.......................................................................................... 14 View ..................................................................................................................Error! Bookmark not defined. 1.3 What is ASCII and EBCDIC? ..................................................................................................................... 15 1.4 3270-Terminal Keyboard ............................................................................................................................ 18 1.5 System z TSO Logon .................................................................................................................................. 19 1.6 You are probably already a z/OS Mainframe User ..................................................................................... 20 2.0 LOGON to System z, TSO and ISPF .............................................................................................................. 21 2.1 Step 1. Follow the directions to start up your 3270 - emulator. ................................................................. 21 2.2 Step 2. After Connecting to System z a TSO Logon banner should appear. ............................................. 21 2.3 Possible System z Connection Problems using a 3270 Emulator Client..................................................... 22 2.4 Step 3. Enter your userID using the TSO LOGON command. .................................................................. 22 2.5 Error Typing in a Protected Area ................................................................................................................ 23 2.6 Step 4. Enter the TSO/RACF Password ..................................................................................................... 24 Page 2 of 47 2.7 The TSO Initial Password – Only on the First Logon ................................................................................. 25 2.8 Not authorized to UserID TSO Error .......................................................................................................... 26 2.9 You get an error that states you are already Logon ..................................................................................... 27 2.10 Reconnecting to a TSO session ................................................................................................................. 27 2.10 Step 5. TSO Broadcast or z/OS System Messages................................................................................... 28 2.11 What does those *** (three) asterisks mean? ............................................................................................ 28 2.12 Step 6. Almost Done – Still Working ...................................................................................................... 29 2.13 Step 7. ISPF Primary Option Menu ......................................................................................................... 30 2.14 Document your ISPF Primary Option Menu............................................................................................. 33 2.15 My ISPF Option = = > line is displayed at the bottom of screen!............................................................. 33 2.16 Questions - Document the new location of Option Line ........................................................................... 35 2.17 Questions - Using the TSO LOGON......................................................................................................... 35 2.18 Questions - TSO Logon Errors.................................................................................................................. 36 3.0 LOGGING OFF From ISPF and TSO ............................................................................................................ 38 3.1 The =X ISPF Command .............................................................................................................................. 38 3.2. Specify Disposition of the LOG Data Set .................................................................................................. 39 3.3 TSO Ready Prompt and LOGOFF Command ............................................................................................ 39 3.4 Staring ISPF from TSO Ready Prompt ....................................................................................................... 39 3.5 Questions - ISPF ......................................................................................................................................... 40 3.6 Questions - Exiting ISPF and Logoff .......................................................................................................... 41 4.0 PCOMM Installation ....................................................................................................................................... 42 Page 3 of 47 Enter your Name Here  Introduction Tutorial Prerequisites Access or Installation of a 3270-client to Connect to z/OS System z Tutorial – 1 LOGON will provide detailed instructions and demonstration examples to use a 3270-client to LOGON or LOGOFF an IBM z/OS operating system. You are REQUIRED to have access to a 3270-emmulator client to connect to a System Z server, e.g., TN3270, PCOMM, etc., installed on your personal computing device or a school lab computer. This emulator MUST be configured with the IP address and Port Number to connect to a System z system. The IP address identifies the location of the System z Mainframe. The port number identifies the listening location of TSO subsystem or program. More information concerning 3270-clients and PCOPMM installation are provided at the end of this tutorial. If necessary, consult your instructor for more support or details. z/OS userID and Initial Password You are REQUIRED to be assigned a z/OS userID and initial password BEFORE you start. If necessary, consult your for more support or details. Objectives - Z System Tutorial – 2 ISPF and File System ▪ ▪ ▪ ▪ ▪ ▪ ▪ Using an installed 3270-Client, connect to a z System Mainframe and LOGON to TSO (z/OS) using the assigned userid and initial password. After successfully entering the initial password students will change their initial TSO password. Students will review common TSO and Logon Problems, e.g., protected field errors, password has expired, and password not authorized. Students should review ISPF Primary Option Menu Student should move ISPF Option Line using the ISPF Settings Panel Students should exit ISPF and LOGOFF from TSO Students should re-logon and logoff and tst TSO Password Change - LOGON to TSO (z/OS) and LOGOFF Page 4 of 47 Tutorial Recommendations Hands-on is the Best Way to Learn It is recommended that students logon to z/OS and should attempt the hands-on demonstration examples while **reading this tutorial". The best way to learn z/OS is simply to read the directions and complete the hands-on requirements. The student should avoid getting distracted or becoming overwhelmed by a few technical concepts. If the student follows the hands-on directions, the technical concepts may be easier to understand after you have completed these hands-on requirements. Handling Common Errors submitting a JCL Job, using ISPF and SDSF Z System Tutorial - 1 includes explanations and possible solutions for common Logon, Logoff, and other z/OS problems. It is RECOMMENDED for a student to read these problem solving recommendations and attempt to resolve your specific problem BEFORE you ask your instructor for assistance. This tutorial is designed to introduce common ISPF troubleshooting strategies. If after you have read and attempted to apply these troubleshooting suggestions and you still need assistance, DO ASK YOUR INTRUCTOR FOR ASSISTANCE. It is important that your personal experience using the fastest commercial computer in the world will be a success for you. Recommended Videos Your instructor may decide to demonstrate this tutorial. You may also view the ISPF and COBOL and other videos listed below. You are NOT required to view these videos, but you may find that these videos are an excellent supplement to your instructor's demonstration or this System z Tutorial – 1 LOGON. ISPF and COBOL Video - http://youtu.be/ozXKLwRwuOo demonstration and presentation of the initial System z logon process, using ISPF, submitting a sample JCL job to set up tutorial data sets, submitting a JCL job to compile, link, and execute a sample COBOL program, and using SDSF to review the COBOL job output. Rated for beginners. Video - Accessing z/OS using TN3270, FTP, and SSH - Unit-03 https://youtu.be/seSW_hUePjA IBM Paul Newton's presentation and demonstration of accessing z/OS using TN3270 Emulator, a SSH client (PuTTY), and FTP. Video - TSO, ISPF, SDSF, the ISPF editor - Unit -04 http://youtu.be/vOiHiI7b9iY IBM Paul Newton's presentation and demonstration of TSO, ISPF, SDSF, the ISPF editor. Page 5 of 47 How to complete Hand-on Tutorial Requirements and Review Questions System z Tutorial - 1 LOGON will provide directions and demonstration examples to guide the student to perform a hands-on requirement. Using the tutorial demonstration examples the student will be required to perform a similar hands-on task. The following is an example of typical tutorial hands-on requirement. Use a graphical snipping tool to document your successful logon with a display of your ISPF Primary Option Menu below. The directions specify the use of a graphical snipping tool, such as the Window's Snipping Tool. (Directions to use the Window's Snipping Tool will be presented next.) Any graphic snipping tool may be used to demonstrate that you have successfully completed the required hands-on task. A grey or colored box will be provided after the requirement directions. You are required to provide a graphic image, e.g., using cut-and-paste, to document that the hands-on requirement was correctly completed. Review questions are also be provided at the end of the tutorial. The following is an example of a review question format. Since type the answer in provided grey or colored box. 1. What is the purpose of a partitioned data set? Answer: Type in the answer to the question into the grey or colored box. It is recommended that you use Table of Contents at the beginning of the tutorial to review and navigate to the concept presented in the review question. Students will find that using the document FIND tool or searching GOOGLE may also be valuable for researching the review question answer. Page 6 of 47 Windows Snipping Tool (If necessary, consult your instructor for other graphical copying tools) The following YouTube Videos will provide more directions for Windows 10, 8 and 7 Snipping Tool ➢ Windows 10 Tutorial | How to Use Snipping Tool https://www.youtube.com/watch?v=RbPAxcTf8h8 ➢ How To Use Snipping Tool & Print Screen | Windows 7 Tutorial https://www.youtube.com/watch?v=DQqwLkrqvmQ Copying a z/OS Image into your Hands-on Requirement (Using Windows 7) Step 1. Click on the Window's Start Button located at the lower left-hand corner of your desktop. In the "Search programs and file" text box type the key word Snipping. The name of the Snipping Tool should appear. Select the Snipping Tool entry. The following Snipping Tool Dialog Box will be displayed. It is recommended to drag this dialog box outside the area that you want to document before you continue, else you may copy the dialog box. Step 2. Once you have z/OS information displayed in your 3270 emulator that you wish to document, click on the "New" icon to start the image selecting process. Your desktop will be "greyed" or dimmed, which indicates that the Snipping Tool utility is ready to select an image. Step 3. Drag a copy box select tool using your right-mouse button around the image to be selected. Once you release the mouse button, a Snipping Tool windows box will display your selected image and a tool bar similar to the following. Snipping Tool Utility Window Example. Page 7 of 47 Step 4. For this tutorial you should select the Snipping Tool Copy Button/Icon which is displayed with two sheets of paper. Select the Copy Button. See previous red arrow. Step 5. Position the cursor inside the grey or color Hands-on requirement box and left-click to select the position. Step 6. Paste the image using Ctrl-V or the Edit/Paste drop down menu. Your documented result should look similar to the following. Page 8 of 47 Use the snipping tool to document your successful logon with a view of your ISPF Primary Option Menu below. Your image should be inserted in the box below. Page 9 of 47 1.0 Preview to the z/OS Logon Process 1.1 3270-Terminal Emulator Client Program System z Servers may be remotely accessed from your workplace, computer lab, or home by using a 3270-Client, such as TN3270 or IBM PCOMM. Your instructor may have provided you directions to download and install a 3270-Client on your Windows, MAC OS, Linux, Android or IoS operating system. These 3270-Client download and installation directions are not provided in this tutorial. This tutorial assumes that you are using 3270-Client in a computer lab or previously installed on your personal computer. The functions of a 3270-Terminal Emulator utility are 1) to CONNECT your personal computer or device to a System z mainframe or server using the TCP/IP over the Internet, 2) to convert ASCII binary-coded characters of your computer to the IBM Mainframe's EBCDIC binary-coded characters, and 3) to map the keyboard layout of a 3270-terminal keyboard to your personal computer's keyboard. Without the ASCII-to-ECBDIC code conversion process the IBM mainframe will not be able to communicate with your Windows, MAC OS, Linux, Android, or an IoS operating system. IBM Personal Communications (PCOMM) or Tom' Brenann's Vista TN3270 clients are used to connect a z/OS mainframe and TSO. During the period between 1950 and 1970s, there were no personal computers or no Internet or no TCP/IP. Mainframes used a character binary code called ECBDIC decades before ASCII and Unicode ever existed. Application programmers, system programmers, and users would communicate to the mainframe using 3270 ECBDIC, text-based, dumb terminal, and the SNA communication protocol. You cannot play computer games or use Microsoft Office on a 3270 dumb terminal. But 3270 terminals or were very efficient and were more functional than using punch cards. In the 1990s IBM introduced a proprietary version named PCOMM as a Windows 3270-client. Later Tom Brennan introduced a 3270-clients which may be installed a wider variety of other operating systems. During the period between 1950 and 1970s, there were no personal computers or no Internet or no TCP/IP. Mainframes used a character binary code called ECBDIC decades before ASCII and Unicode ever existed. Application programmers, system programmers, and users would communicate to the mainframe using 3270 ECBDIC, text-based, dumb terminal, and the SNA communication protocol. With a dumb terminal you cannot play computer games or use Microsoft Office. But 3270 terminals were very efficient. It was much better than using punch cards. In a modern world with personal computers, the Internet and TCP/IP IBM introduced the PCOMM as a Windows client. As a comparison, we use an Internet Browser (a HTTP client) to connect to a web server using TCP/IP. Page 10 of 47 1.1.1 The functions of PCOMM 3270 emulator are to: 1) Enable zOS users to use the TCP/IP communication protocol to connect to a remote IBM mainframe and TSO. 2) Convert Windows ASCII characters typed on your keyboard to ECBDIC characters so that TSO can understand your commands. 3) Convert IBM ECBDIC characters sent by TSO to an ASCII character so that the character may be displayed on your Windows computer. 4) To interface with function of the Windows client operating system. PCOMM does not support MAC OS or Linux. (There are other TN3270 clients listed later.) Page 11 of 47 1.1.2 Can I use my mouse? While it may appear that PCOMM may support a mouse, when using the default setting the mouse is only understood by Windows and PCOMM, not by IBM's TSO. Some 3270-clients will permit you to map a mouse button to a 3270-key to simulate the use of a mouse. By default PCOMM will try to approximate cursor movement and convert those movements to a format that may be understood by TSO. However, using a Windows mouse with PCOMM may frustrate or confuse you when you are trying to move the TSO cursor. When connected to TSO it is best to use the arrow keys to move the cursor and the tab key to move between unprotected fields. Unprotected fields are where you may type or enter data. PCOMM also does not understand mouse clicks when you are in TSO, but you can use the mouse to manage PCOMM. 1.1.3 Why doesn't TSO support a mouse? I thought that the mainframe was very powerful! To start, there was no mouse user interface available until the early 1980s - decades after the mainframe was introduced. A better question is why didn't they add the mouse, GUI or web interfaces later? Wouldn't these interfaces be more user-friendly? The estimated average processor overhead to manage a Windows operating system mouse and graphical user interface varies between 15% and 30% of the total processor power. To extend this microprocessor utilization analogy to the shared processor capacity of a TSO-based mainframe with 100-connected users using a mouse and graphical user interface, the mainframe would have no more processing cycles to do any other work. It is also estimate that the new gesture-based interfaces use on cell phones, mobile devices and personal will increase processor utilization to over 40% of the processor's core capacity. Your personal computer is not shared. You can allocate your processor's capacity to any user interface you may want, e.g., voice, mental telepathy, or communication with the deceased. (I prefer mental telepathy.) (Hopefully, you will appreciate the introduction of multicore processors. i.e., one processor core to manage the user interface the second processor core to get work done. Can you exceed this analogy to battery life of your mobile device?) Page 12 of 47 1.1.4 RDz - Rational Developer for z Systems IBM and other third party providers do provide GUI clients. For example, IBM Rational Developer for z Systems provides an enhanced toolset for creating and maintaining z/OS applications quickly and efficiently. This rich set of GUI TSO, COBOL, PL/I, C++, assembler and Java development tools designed for batch, IBM CICS, IBM IMS and IBM DB2® environments are optimized for the workstation-based Eclipse platform. RDz is available for almost every client operating system. You can get a free 90 day trial of RDz at http://www-03.ibm.com/software/products/en/rational-developerfor-z-systems RDz connects through a special RDz server and the RDz is licensed per workstation and per server. TSO, ISPF, and other text-based tools come with every mainframe with no extra cost. So as a System z manager would increase their budgets to make their entry level system z professionals happier by providing mouse and GUI capabilities. RDz executes on the client-side and hence adds little user-interface overload to the mainframe processor core. 1.1.5 Configuring TN3270 clients You must manually enter TCP/IP connection information for the following clients. Hostname or IP address is192.86.32.17 TSO Port Number is 623 (Make sure that your firewall does not clock this port.) While PCOMM is software designed for the Windows platform, other TN3270 emulators are available for Windows, MAC OS X and Android. Just enter the keyword TN3270 into Google and search for your operating. 1.1.6 Tom Brennan's Vista tn3270-client and Master the Mainframe Contest. Tom Brennan Software is providing Vista tn3270-client along with licensing to all contestants of the Master the Mainframe contest. Follow this link, download, and install Vista V1.27: http://www.tombrennansoftware.com/download.html Many students prefer this version over IBM PCOMM. Installation and other directions are provided. After signing up for the Master the Mainframe contest check the email from the IBM Master the Mainframe Contest team for the license key that allows permanent use of Vista tn3270. Tom Brennan's TN3270 client comes with a 30 day trial. Student's Marist College Student's License Key 644EMDM1H4 Page 13 of 47 1.1.7 Brown University - MAC OS X tn3270 client Brown University provides a tn3270 client that is freely-licensed for non-commercial use. Download it from here: http://www.brown.edu/cis/tn3270/ Select the tn3270 release that supports your OS X version. Most Mac users will select the latest 3.4.0 release as it supports OS X 10.3.9 and later. 1.1.8 Android TN 3270 client apps for your mobile device Android Mocha TN3270 Lite - A free version is available from the Google Play store. The paid version includes keys f1-f24. https://play.google.com/store/apps/details?id=dk.mochasoft.tn3270lite&hl=en 1.1.9 iOS TN 3270 client apps for your mobile device Apple iOS Mocha TN3270 – Lite. The MAC version may be found at https://itunes.apple.com/us/app/tn3270-lite/id290608522?mt=8 1.1.10 Questions- 3270-emulator client 1. You must use a 3270-emulator client, such as IBM PCOMM or TN3270, to connect to a z System mainframe. List the three functions provided by a 3270-emulator client? Answer: . 2. Explain the purpose and differences between ASCII character encoding and ECBDIC character encoding. Answer: . 3. The older 3270 terminal keyboard used to connect to mainframe is layout differently than your desktop or mobile device keyboard. The older 3270 keyboard had two Enter keys. On a Windows key board what is the purpose of the Right-Ctrl Key? Answer: . Page 14 of 47 4. To connect to a z System mainframe across the Internet, the 3270 emulator must be configured with two pieces of TCP/IP information: an IP Address and a Port Number. What are the functions of an IP Address and a Port Number? (This answer would be the same whether or not you connecting to an IBM mainframe and TSO or connecting to amazon.com.) Answer: . 5. When you use your 3270-emulator to connect to a mainframe, which IBM subsystem or program permits you to LOGON to z System Mainframe? Answer: . 1.3 What is ASCII and EBCDIC? Electronically, a digital computer is only capable of storing, understanding and processing information as combination of bits. A bit is conceptually similar to a simple light switch. Either the switch is on or it is off. Early computer hardware used a variety of different electronic technologies to store a bit. The following are some early pictures of storing bit from Pingdom (http://royal.pingdom.com/2008/04/08/the-history-of-computer-data-storage-in-pictures/) and Timeline of Computer History http://www.computerhistory.org/timeline/memory-storage/ The 1024-bit Selectron. The Magnetic Drum Can you imagine the size of your laptop if we would store a bit using these 1940s and 50s technologies? It doesn't matter which electronic storage method is used, a bit is any device that is capable of having two states. It is either ON or OFF. Most modern computers have electronic components that in theory works like a light switch it is either ON or OFF. To make life easier, the number 1 is used to represent ON or True. The number 0 is used to represent the OFF or false. Page 15 of 47 Binary electronics are reliable and inexpensive to build. Since all digital computer operations are based on two numeric states. All hardware computer functions are built on a combination of bits or multiples of twos, i.e., 2, 4, 8, 16, 32, 64, 128, 258, 512 and 1024. A combination of bits may be called byte or word. What is more important to remember is that a Binary Representation Code must be used by a computer to understand the meaning of those combination of bits. ASCII and ECBDIC are two examples of binary codes. While electrical engineers may get excited about the basic bit (or one light switch), a bit does little to help an average person store or manipulate human data and information inside a computer. A bit can only represents two states. Symbolically, the ON state can represent a "Passing Grade" and the OFF state can represent a "Failing Grade" Paul Revere was his famous for warning that the British were coming used a binary digit, or two simple values. "One by Land and Two by Sea". As history reports this data representation system was quite adequate. But, what if the British want to stop at Heinz Field during a Pittsburgh Steeler's game to eat a Parmenitti Bros Sandwich before the attack? There was no third state that could represent this change in the battle plan. (A little bit of humor - a real little bit. What can you expect from a Steeler fan?) The binary codes and bits does permit computers to process numeric data. But humans also require to communicate with letters of the alphabet, special characters and symbols. In 1963, IBM introduced a 8-bit binary code called EBCDIC (Extended Binary Coded Decimal Interchange Code), ECBDIC which would combine 8-bits (256 combinations) which would be used to arbitrarily represent a letter of alphabet. Behinds the scenes the IBM mainframe uses the ECBDIC would store the number 193 which symbolically meant to display a capital letter "A" on the display to make these humans happy. The letter "B" would be stored as an ECBDIC number 194, and so forth. Though IBM's 8-bit EBCDIC was a great idea to store upper and lower case alphabetic characters, numbers, and other symbols, it was proprietary binary code. While a computer can store numbers, this ECBDIC coded number may be assigned to symbolically represent any alphabetic or international character. There were three open coding standards introduced to compete with ECBDIC, i.e., ASCII 7-bit (128 combinations), ANSI 8-bit (256 combinations) and Unicode 16-bit (65353 combinations.) ASCII, ANSI, and Unicode are used by almost all server, desktop or mobile device operating systems, except IBM operating systems. EBCDIC is only used with System z mainframe operating systems. Let's review the previous two ECBDIC examples. ECBDIC will store the number 193 to display and represent the capital letter "A", and store the number 194 to the display and represent the a capital letter "B". However, your Windows and Apple computer uses ASCII. ASCII will store the number 65 to display and represent a capital letter "A", and store the number 66 to the display and represent the capital "B". To humans, all we see is the capital letter "A". But to the computer it only sees the decimal number ECBDIC 193 and ASCII 65. If you are confused can you imagine, the confusion if a Windows or Apple operating system uses ASCII to communicate IBM mainframe that uses ECBDIC? This one of the major reasons we use a 3270-client to convert the ASCII binary codes, e.g., the number 65 for a capital letter "A", to the number 193 so that the mainframe can understand that EBCDIC can interpret the transmit characters as a capital letter "A". This is the process of ASCII-to-ECBDIC binary code conversion. Page 16 of 47 Page 17 of 47 1.4 3270-Terminal Keyboard The old-style IBM 3270 terminal keyboard's layout is different than your Windows or MAC keyboard. ➢ Your keyboard has function keys on the top row labeled as F1...F12 key. This Function Key layout was based on the original IBM 3270-terminal key board, but were labeled PF1 through PF24. ➢ Modern keyboards have only ONE labeled ENTER key, but the 3270-terminal keyboards had two ENTER keys. The larger ENTER key is often called the Line Feed (skip a line key). The second, and more important 3270 ENTER key was located where the Right-CTRL key on the standard PC keyboard. The Right-CTRL key is VERY important on a 3270-terminal. The Right-CTRL key means to SEND information entered or typed on the terminal keyboard to the mainframe and to be executed. This second ENTER key, or the Windows Right-Ctrl key, is often called the RETURN key. The bottom line, the second ENTER or RETURN key is the most important. ➢ MAC computer and laptops keyboards do NOT have a right-CTRL Key. Your 3270emulator program must "map" or assign an alternative MAC key to perform the same function as the RETURN or right-ctrl key. ➢ An original 3270 keyboard had three keys called Program Attention keys, labeled PA1, PA2, and PA3 and another key labeled CLEAR. These keys are not available on a PC or MAC keyboard and must be mapped, or assigned, to different keys. These assignments are not standardized across keyboards or 3270-clients. Most emulators supplement your physical key board with a pop-up key board. ➢ PA1, assigned to the 3270-emulator ESC key, is pressed to interrupt a program/command or a job hangs-up. Pressing the PA1 or ESC key is similar to pressing the Ctrl+Break key combination with a Windows hangs-up. ➢ The 3270-terminal CLEAR key, assigned to the PAUSE key, means to refresh the screen. The CLEAR key is rarely used in z/OS, but may be used in many z/OS middle ware programs. Page 18 of 47 1.5 System z TSO Logon When one connects to a System z mainframe using the 3270-emulator client, one will connect to TSO to LOGON. The TSO LOGON process is similar to authenticating to other operating systems. One will enter a valid userID and password. The following graphic provides a preview summary of following tutorial directions to connect to the z/OS Mainframe, Logon with a userid, authenticate with a password, and TSO/ISPF Initialization process. Don't worry, the graphical summary will be easier to understand after you complete the hands-on tutorial directions. ➢ ➢ ➢ ➢ Connect to System z across the Internet using a 3270-emulator client. Authenticate to TSO/RACF. Allocate memory to your personal copy of the TSO subsystem. ISPF, a menu-based user interface F into the TSO memory area – Still Working – Almost There Page 19 of 47 1.6 You are probably already a z/OS Mainframe User Most consumers or the majority of Fortune 1000 employees have previously accessed the services of a System z server backend services by using a mobile device, an Internet browser, or a retail point-ofsale terminal. Examples of some System z backend services include static web page, dynamic web application, database, and security services. Consumers and employees never see backend services execute, they only enjoy the convenience of their graphical, web page or mobile user. Consider the use of your mobile device to purchase some product online at Walmart. Behind your user interface and shopping cart, the Walmart System z servers processes hundreds of inventory look up programs and database accesses, generation of dynamic web pages (what you see), calculations to update the purchase transactions, to interact with credit card companies in a secured environment. The list of System z backend services you may have previously accessed without your knowledge of using System z backend services would take hours-and-hours to discuss. But, if you accessed a major retailer, e.g., Wallmart, Home Depot, Macey's, etc., a major commercial bank, e.g., PNC, Bank or America, Well Fargo, Chase, etc., or used a major credit card company, e.g., Visa, Master Card, any major insurance company, e.g., State Farm, Gieco, All State, major Health Care System, major Health Care Insurance company, most 401K providers, any major federal, state or military government or agency, you are already a System z User. However, a few major Fortune 1000 companies do not rely on System z for most large-scale, mission-critical services. These companies include Google (Alphabet), Amazon, Facebook, Apple, Microsoft, and Dell. As a consumer or Fortune 1000 employee, you may have already used System z backend services listed in the left column of the previous graphic, such as CICS, Web Sphere, Web Sphere MQ, and the Apache HTTP server. However, this tutorial will provide you with hands-on experiences to introduce you to the backend professional z/OS system administration and application development systems which support System z services. As a comparison we all enjoy driving our car, but a professional mechanic needs to keep our car running. You will have the opportunity to see some of the System z "mechanic" systems on the most powerful business computer system in the world, e.g., a System z13 mainframe and server. Page 20 of 47 2.0 LOGON to System z, TSO and ISPF 2.1 Step 1. Follow the directions to start up your 3270 - emulator. You should automatically connect to System z and TSO. If necessary, consult your instructor for more support or details. 2.2 Step 2. After Connecting to System z a TSO Logon banner should appear. The TSO banner will appear similar to the following. The Marist College Logon Banner will appear differently. On a rare occasion, there may be a connection problem to System z. If necessary, consult your instructor for more support or details. Page 21 of 47 2.3 Possible System z Connection Problems using a 3270 Emulator Client. ➢ The 3270 Emulator Client was incorrectly configured and may have attempted to connect to an incorrect IP address or Port number. ➢ Your local computer's or school's firewall may be blocking either the Port Number or the IP Address. ➢ The System z server that you are attempting to connect to is currently being updated. The Marist College System z server is scheduled to be updated on last Wednesday of the month between the hours of 4AM to 8AM EST. Unlike Windows, System z is rarely automatically updated. All updates are fully tested before updates are applied by the z/OS SMPe (System Modification Program). SMPe was introduced in the 1960s decades before Windows, IoS, and Linux designed their installation and update utilities. 2.4 Step 3. Enter your userID using the TSO LOGON command. TSO displays text in protected regions of the terminal window. While the cursor will move anywhere in the terminal window, you can only type in an un-protected area of the window. Sometimes it is easy to distinguish between protected areas (where you can NOT type) and unprotected areas where you MAY type. For example, some unprotected areas are underlined. The cursor will automatically appear at the left-bottom line of the TSO logon. Type LOGON XXXXX, where XXXXXX is your TSO userID assigned by your instructor. TSO IDs may be up to eight characters. TSO is not case sensitive. After finished typing press the right-CTRL key or other key assigned on a MAC laptop or other system. Normally one does not use the ENTER KEY. Page 22 of 47 2.5 Error Typing in a Protected Area Help Me. Help me. I am stuck and I can’t go on!!! Some students encounter a problem when they press a key and nothing is displayed. You will notice the following symbol located at the bottom right-hand corner of the screen. The large Red X or person-like symbol indicates that you incorrectly attempted to type in a protected field, which is not permitted. This is called a Protected Field Error. One may only type in unprotected fields, but you may NOT type in data in a protected field. Normally, most unprotected fields are underlined, but this is not the case in the TSO LOGON Banner. An unprotected field is similar to an HTML form or GUI application text box where are user can type anything. All other areas are classified as protected fields Even if a field is clearly identified by an underline some individuals may try to type before the underline unprotected field, after the underline, or anywhere they please. To resume typing after a Protected Field Error or Between Unprotected Fields. 1) Press the ESC key to clear the Protected Filed Error message and reposition the cursor. 2) Press either the Right or Left Tab keys to move to the n...
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

This question has not been answered.

Create a free account to get help with this and any other question!

Similar Content

Related Tags