Unformatted Attachment Preview
Contents
Assignment Introduction ......................................................................................................................................... 4
Researching Your Answers ................................................................................................................................. 4
A Little Advice Before you start ......................................................................................................................... 5
Demonstrating Knowledge and Increased Penalties for Irrelevant Answers ...................................................... 6
You Must Submit YOUR Answer in this Original Word Document to Blackboard .......................................... 6
You Must RENAME this Original Word Document to Include your LAST NAME ......................................... 7
NEVER submitted an Assignment as an Email Attachment ............................................................................... 7
ONLY Submit a FINAL Version of ALL Assignment ....................................................................................... 7
Requests to Clear Previously Assignments for Re-Submission .......................................................................... 7
Submitting Late Assignments ............................................................................................................................. 7
Academic Integrity and Plagiarism ..................................................................................................................... 8
How to complete Content Questions ................................................................................................................... 9
1.0 Introduction to z Systems ................................................................................................................................ 10
1.1 Questions - Introduction to z Systems......................................................................................................... 11
1.2 Questions - Specialized z System Family of Processors ............................................................................. 13
2.0 z13 System Hardware, I/O and Storage Technologies .................................................................................... 14
2.1 Question - z13 System Hardware Concepts ................................................................................................ 15
2.2 Questions - z13 System Frames .................................................................................................................. 17
2.3 Questions - Z13 CPC Drawers .................................................................................................................... 18
2.4 Questions - PCIe Interfaces ......................................................................................................................... 20
3.0 z System Workloads, Careers, File System, and Subsystems ......................................................................... 21
3.2 Questions - z System Roles and Careers ..................................................................................................... 22
3.3 Questions - Separation of Duties................................................................................................................. 23
3.4 Questions - Z System Subsystems and Concepts ........................................................................................ 24
3.5 Questions - DASD, File Systems, Sequential Data Sets and Partitioned Data Sets .................................... 24
3.6 Questions- Volumes, VTOCs and Catalogs ................................................................................................ 27
3.7 Questions - VSAM Concepts ...................................................................................................................... 28
3.8 Questions - JCL ........................................................................................................................................... 29
3.9 Questions - DB2 and IMS ........................................................................................................................... 30
3.10 Questions- RACF and SAF ....................................................................................................................... 30
3.11 Questions - SNA and TCP/IP .................................................................................................................... 31
3.1 Questions - Batch, OLTP, Web Applications and Web Services Workloads ............................................. 32
4.0 Mobile Online Transaction Processing ........................................................................................................... 33
4.1 Introduction to Mobile Online Transaction Processing .............................................................................. 33
4.2 Native mobile applications versus HTML5 and Hybrid mobile applications ............................................. 33
4.3 Questions - BYOD or BYOT ...................................................................................................................... 34
Page 2 of 45
4.4 Introduction to IBM MobileFirst Platform.................................................................................................. 34
4.5 Questions – Native, Hybrid and HTML Apps ............................................................................................ 35
4.6 Question – Choosing the Right Mobile App Architecture .......................................................................... 37
4.7 Questions - Mobile application servers ....................................................................................................... 37
4.8 Questions – Internal, External, ad Third-Party Mobile Application Development ..................................... 38
4.9 Questions – IBM MobileFirst Platform Components and Advantages ....................................................... 40
5.0 Cognitive Computing and Data Analytics ...................................................................................................... 41
5.1 Introduction to Cognitive Computing ......................................................................................................... 41
5.2 Questions - Cognitive Model ...................................................................................................................... 41
5.3 Questions - Big Data and Deep Analysis .................................................................................................... 42
5.4 Questions - Data Analytic Tools, Programing Languages, Statistical Packages, and Concepts ................. 42
Page 3 of 45
Enter your Name Here
Assignment Introduction
Researching Your Answers
Most requirements of this assignment will require you to research answers from your text book (you
must read the text book to get some answers), from the Internet, from a video or any other
reasonable source. Many Internet sources, video links, text book and Blackboard presentations are
provided in this document to help you START your research.
Assignments are always a great place to read and reference your text book. May students assume
that they should start by reading the text book. While this reading the text book is ALWAYS at great
idea, the following assignment questions may help you focus on what is important in this course. One
strategy is to review an assignment question for important keywords, e.g., multitasking,
Procedure Division, virtualization, etc. Then look for those key words in either 1) your text
book "detailed" table of contents in the beginning of the book, or 2) in the index at the end of
the book. Some text books have key word glossaries at the end of the chapter or end of the
book.
Every semester the Internet sources, e.g., a Google keyword search, or Internet video, e.g., a
YouTube keyword search may be improved. Better students start with research sources provided in
this assignment, and then search for improved or updated answers. While your objective may be to
demonstrate your knowledge to EARN an excellent grade on this assignment, better students
are always looking towards the future to impress internship and career recruiters for those
interesting and high entry-level salaries. Employers don't pay you for a grade in any single class or
assignment. Employers will pay you BIG MONEY for demonstrated knowledge or skills. Hopefully,
this assignment will prepare you.
A single research source maybe very incomplete or the format or the content may not be appropriate
for some required answers. Some students do not READ the text book or review the Blackboard
presentations provided to you in Blackboard. Some answers are only available from Blackboard
presentations or update documents. When assignment requirements may be only answered by
viewing a YouTube video, you will be notified.
You may cut-and-paste answers whenever appropriate. You MUST synthesize your answers to
include multiple sources. I would be impressed that you consult a Google image search and paste
and appropriate image to supplement your answer.
Page 4 of 45
While I permit cut-and-paste, I do expect you use your own words so that you:
1. Organize the answer
2. Demonstrate that you have read what you have cut-and-pasted
3. Use any means that clearly displays that you have gained knowledge.
A Little Advice Before you start
There is NO requirement to read each reference link or view each video in detail. Some of the links
will have overlapping content. Some links will provide more information than the question
requirements, but employers consider these topics to be minimal knowledge of a
It is recommended to visit each reference link and overview the content. Then read each question and
return to each reference link or video as needed. You may supplement your answers with content
from your text book by using a question keyword and looking up in the glossary or index in the back of
the book. PDF text books can be easily searched for keywords.
It is not required to read your text books before working on this assignment unless specified in a
requirement. Text book contents are used to support quiz questions (which contain the answers),
which are used on the tests. The reference links and videos are excellent resources.
The topics presented in the course assignments have been highly recommended by two or more
employers who recruit students as minimum computer hardware, operating system, and application
development knowledge. Employers expect that students should be able to present one or two
sentences of the majority of keywords applicable to job requirements in a face-to-face interview.
On the other hand, each assignment is allocated 100 points out of a total of 1000 points. The number
of questions or hands-on activity on each assignment varies. Assume that an average assignment
has 50 requirement questions. This means that a requirement may be worth 2 points towards your
final grade. The bottom line is that missing a few questions will have little effect of your assignment or
final grade. Not completing an assignment will generally decrease your final grade by at least a letter
grade. Do not waste time on the small problems.
Page 5 of 45
Demonstrating Knowledge and Increased Penalties for Irrelevant Answers
If you can DEMONSTRATE your knowledge of the topic for the requirement there will be no penalty
for your answer. It is not the intention of this assignment to be "not picky". Parital credit will be
awarded as appropriate.
If you cut-and-paste and pray that your instructor will not read your inappropriate and irrelevant
answer, the question will be penalized by increasing the deduction points beyond the original
requirement points. The instructor hates irrelevant cut-and-paste BS, or answers that appears that the
student is guessing and hopes the instructor does not read the answer.
The instructor reserves the right to increase the penalty for any submitted question or
assignment that may be construed as "wasting the instructor's time". Therefore, a four-point
requirement may be penalized as six-points (two additional point penalty for wasting the instructor's
time). Sometimes blank answers will earn you’re a high assignment grade than BS answers. For
example, a submitted 100-point assignment may be penalized as 125 minus points when your final
grade is calculated for any assignment that should have never been submitted in the first place.
You Must Submit YOUR Answer in this Original Word Document to Blackboard
This Assignment Word Document will contain hidden markers that may be used to detect
plagiarism and provide an audit trail of those who may have modified the Word document.
Many students in my classes work very hard to complete and learn from their assignments. It is not
fair to those students who have professionally demonstrated their knowledge to receive the same
grade as those who have plagiarized their assignments
You MUST answer ALL requirement in this Word document and ONLY THIS Word
Document. You MAY NOT use or edit any other word processor, except any version of
Microsoft Word.
Do not use GOOGLE DOCS or Open Office DOCX files at any time. If you use any other
Word Processor you will be assigned ZERO credit.
If you do not have a copy of WORD, you may use VMWARE VIEW (available from the RMU
website) to access a virtual lab computer which contains any software needed for this course.
http://www.rmu.edu/web/cms/departments-offices/administration-services/it/Pages/vmware-view.aspx
NEVER STORE ANY DOCUMENTS ON THE DESKTOP OF VMWARE VIRTUAL COMPUTER. You
will lose your document. It is preferable to store your documents on RMU Drive U: If necessary you
can email the document to yourself.
Page 6 of 45
You Must RENAME this Original Word Document to Include your LAST NAME
YOU MUST enter your name in the beginning of this document as provided and "Save As" this
document using a new name that starts with your LAST NAME, assignment number and
semester, e.g., Jones Assignment 1 Summer 2016.docx
If you do not rename your document your assignment will be penalized by 10%.
NEVER submitted an Assignment as an Email Attachment
All assignments are to be submitted to the instructor by using the Assignment Link in the Blackboard
system. Assignments submitted as an email attachment will NOT be graded. THE INSTRUCTOR
NEVER ACCEPTS ANY ASSIGNMENT AS AN EMAIL ATTACHMENT FOR ANY REASON.
ONLY Submit a FINAL Version of ALL Assignment
Never submit an incomplete assignment for grading. Only submit your final version of ALL assignment
documents for grading. You can only submit an Assignment once.
Requests to Clear Previously Assignments for Re-Submission
If you make an error submitting an assignment you must contact the instructor to clear your previous
assignment submission. If you made an error on any assignment you may request that the previous
assignment submission be cleared so that you may resubmit the assignment again. Please only
submit a completed assignment.
Submitting Late Assignments
While the assignments have a recommended due date, the instructor does not penalized your
assignment grade if you are slightly late. Please do not send the instructor an email if you are going to
submit your assignment late. The instructor is flexible and assumes you have a good excuse. But,
after you are more than two weeks late the instructor does reserve to penalize the assignment or not
accept the assignment if this late submission is unfair to other students enrolled in the course who
had completed their assignments on time.
It has been the experience of the instructor that students who are excessively or consistently late asks
a friend to provide them a copy of their assignment which will violate the RMU Academic Integrity
Policy. (Please carefully read the next section!) If a friend asks you for a copy of your assignment
"to get an idea what the instructor wants", you are risking a zero assignment grade, an F final
grade, or a RMU Academic warning or suspension.
Page 7 of 45
Academic Integrity and Plagiarism
When an instructor has possession of an electronic document it is easy to detect plagiarism. Microsoft
Word provides a variety of FREE anti-plagiarizing tools. The content of your submitted Assignment
WORD document will be COMPARED to each other student who has submitted this assignment in
the current class or any previous class as time permits. The content of each student's assignment
may NOT be copied from any other current or past student enrolled in this class. Each
assignment is to be prepared by ONE student. Assignments are NOT a group-prepared
assignment.
Some students may attempt to SAVE AS another student's completed assignment and rename it
using their name. Some students may attempt to Cut-and-Paste answers from one student's
assignment document to another student's assignment document. But as time permits, the forensic
tools used to compare ALL student's assignments with other assignment will often detect anomalies
which will provide absolute proof of plagiarism. On-ground tests may be used to compare the
student’s knowledge to performance on assignments. All acts of plagiarism and forensic data
will be submitted the RMU Academic Integrity Board to determine university-wide penalties,
such as grade penalties, warnings, suspension, and change of a previous course grade for
previous course students. All current and previous students involved in the plagiarism may
be affected RMU Academic Integrity Board.
If a friend asks you for a copy of your assignment "to get an idea what the instructor wants",
you are risking a zero assignment grade, an F final grade, or a RMU Academic warning or
suspension. You are responsible to protect your assignment Word Document.
You, however, may discuss assignment requirements, provide research assistance, assist
other students to debug programs or other hands-on-requirements, tutor students, or provide
other advice that may assist the students in acquiring knowledge. But the actual preparation
of an individual assignment must have been completely prepared by the student who
submitted the assignment. Sections of the assignments may be copied from the internet as
per the individual assignment's directions. Please contact the instructor if you need
assistance interpreting this RMU Academic Integrity Policy. (Ref.16-1.)
Many believe that if you a "stupid" enough provide another student, whom may compete with you for a
future internship or career, a copy of your assignment, then you deserve the same penalty as the
other student. If you are a "real" friend, tutor your friend.
The instructor reserves the right to require face-to-face hands-on demonstrations or face-toface tests to provide additional evidence to be submitted to the RMU Academic Integrity
Board.
Page 8 of 45
How to complete Content Questions
Review questions are also be provided at the end of the tutorial. The following is an example of a
review question format. Since type the answer in provided grey or colored box.
1. What is the purpose of a partitioned data set? Answer:
Type in the answer to the question into the grey or colored box.
It is recommended that you use Table of Contents at the beginning of the tutorial to review and
navigate to the concept presented in the review question. Students will find that using the
document FIND tool or searching GOOGLE may also be valuable for researching the review
question answer.
Page 9 of 45
1.0 Introduction to z Systems
It is recommended that you refer to following chapters in your text book.
•
•
Chapter 1: Introduction to the new Mainframe. Text book " Introduction to the
Mainframe: z/OS Basics"
Glossary: Text book " Introduction to the Mainframe: z/OS Basics"
Video - Overview of z System Environment - Unit-01
http://youtu.be/STD_C0TPb04
IBM Paul Newton's presentation of the z System Family of Processors, Operating
Systems, Support and Services Technical Roles, and Virtualization Technologies
See Blackboard Folder "Paul Newton's z System Presentations" for a copy of the Presentation
Video – z System Documentation - Unit-02 https://youtu.be/UipoF_QDSiU
IBM Paul Newton's presentation on locating IBM Redbooks, z/OS Manuals, z/OS
Glossary of Terminology, z/OS Messages and Codes
See Blackboard Folder "Paul Newton's z System Presentations" for a copy of this Presentation
You MUST type or paste your answer in the box or table area provided, else you will receive ZERO
credit. Simply position the cursor inside box or table and type or paste your answer.
Read the
Introduction to z System document
Introduction to Data Processing and Processor Architecture Document
Page 10 of 45
1.1 Questions - Introduction to z Systems
1. What is z System? Answer:
.
2. How many years ago was IBM mainframes introduced for large-scale corporate and government
processing? Answer:
.
3a.Which operating systems are supported by z System? Answer:
.
4. In spite of COBOL being very popular Z System programming language, why has the demand for z
System C/C++ programmers increased? Answer:
.
5. What does the "z' in z System mean? Answer:
.
6. What are the advantages of IBM's "backward compatibility" as compared to Windows, Intel, Linux
and UNIX platforms? Answer:
.
7. List at least four reasons why should learn about z System? Answer:
.
8. List at least five major Fortune 500 companies who uses z System as a mission-critical, secured
high-volume transaction server. Answer:
.
Page 11 of 45
9. List at least five major government agencies who uses z System as a mission-critical, secured highvolume transaction server. Answer:
.
10. Wallmart purchased their first IBM mainframe in 1952 and continues to use z System as their
mission-critical IT platform. At that time the IBM mainframe was classified as a Centralized Processing
Architecture. Explain the concept of a centralized processing architecture. Answer:
.
11. List four major IT program processing sub-requirements using the analog of purchasing a
rotisserie chicken at Wallmart. Answer:
.
13. Describe limitations facing a centralized processing architecture using the analog of purchasing a
rotisserie chicken at Wallmart's centralized mainframe technologies of the 1950s to 1970s. Answer:
.
14. It is very inefficient to support a mouse or touch-based graphical user interface using a centralized
computer architecture. Provide some estimates the processing overhead for a desktop computer
system to support a mouse or touch-based graphical user interface. Answer:
.
15. Why doesn't a centralized, multiuser, high-transaction volume mainframe directly support a mouse
or touch-based graphical user interface? Answer:
.
16. Explain the concept of a client-server processing architecture? Answer:
.
17. Describe the process how Wallmart uses a client (the Kiosk) and a z System backend server
processing architecture for Wallmart's customers to purchase a rotisserie chicken at a local Wallmart
store. Answer:
.
Page 12 of 45
1.2 Questions - Specialized z System Family of Processors
IBM mainframe - http://en.wikipedia.org/wiki/IBM_mainframe
IBM System z - http://en.wikipedia.org/wiki/IBM_System_z
z/Architecture - http://en.wikipedia.org/wiki/Z/Architecture
Coupling Facility (ICF) - http://en.wikipedia.org/wiki/Coupling_Facility
Integrated Facility for Linux - http://en.wikipedia.org/wiki/Integrated_Facility_for_Linux
System z Application Assist Processor (zAAP) - http://www03.ibm.com/systems/z/hardware/features/zaap/index.html
z System Application Assist Processor - http://en.wikipedia.org/wiki/Z_Application_Assist_Processor
zIIP Processor - http://en.wikipedia.org/wiki/ZIIP
Video - Overview of z System Environment - Unit-01
http://youtu.be/STD_C0TPb04
IBM Paul Newton's presentation of the z System Family of Processors, Operating
Systems, Support and Services Technical Roles, and Virtualization Technologies
See Blackboard Folder "Paul Newton's z System Presentations" for a copy of the Presentation
35. Describe the processor task specialization for each of following IBM processor-types using the following
table
z System Processors .
Processor
Type
Designed (Optimized) for which type of Processing Task?
CP
ICF
IFL
zAAP
zIIP
Taking Advantage of Multicore PCs (can be applied to IBM mainframes) - http://www.washingtonpost.com/wpdyn/content/article/2008/08/04/AR2008080401582.html
Multi-core processor - http://en.wikipedia.org/wiki/Multi-core_processor
Page 13 of 45
2.0 z13 System Hardware, I/O and Storage Technologies
Introduction to the System z13 Architecture Document
Important- IBM z13 Mainframe - www.slideshare.net/DarrenDonaldson/ibm-z13-mainframe
Z13 update - http://www.slideshare.net/StigQuistgaard/z13-update
The IBM z13 – Server - http://www.vmworkshop.org/docs/2015/r9fgSpBF.pdf
Bus and Tag Channels http://en.wikipedia.org/wiki/IBM_System/360#Channels
ESCON - http://en.wikipedia.org/wiki/ESCON
FICON - http://en.wikipedia.org/wiki/FICON
Channel subsystem (CSS) http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.znetwork/znetwork_
59.htm
IBM Storage - http://www-03.ibm.com/systems/storage/disk/
IBM Storage - https://en.wikipedia.org/wiki/IBM_Storage
Page 14 of 45
2.1 Question - z13 System Hardware Concepts
1. Describe or define the following z System Mainframe Concepts using the following table.
z13 System Hardware Concepts
Concept
Description
Drawer
Busses
PU Processor
Storage
Controller
DDR3
Sysplex
Coupling Facility
Processor
Channel
Subsystem
Node
IBM DS8000
Storage Server
RAIM
IBM Flash
Express
.
OSA
Opens System
Adapter
FICON Express
16s
PCIe Drawers
.
Page 15 of 45
Page 16 of 45
2.2 Questions - z13 System Frames
2. An IBM mainframe design is based on a two-frame (storage rack) design, which are named the AFrame and the Z-Frame. (See previous image.) List the mainframe hardware components that are
normally installed in the A-Frame. Answer:
.
3. (See previous image.) List the mainframe hardware components that are normally installed in the
z-Frame. Answer:
.
Page 17 of 45
2.3 Questions - Z13 CPC Drawers
4. IBM z13 processor technologies are stored in a packaging unit called a "drawer". List the hardware
components normally found in a z System book packaging unit. Answer:
.
5. What are the maximum number of "drawers" that may be installed in an IBM z 13 mainframe?
Answer:
.
6. What are the differences between a z13 drawer and a z13 nodes? Answer:
.
Page 18 of 45
7. List the total amount of system memory that can be installed z13 Mainframe and a CPU drawer?
Answer:
IBM z13 Performance: The Benefits of Large Memory - http://mainframeinsights.com/ibm-z13performance-benefits-large-memory/
Benefits of Configuring More Memory in the IBM z/OS Software Stack http://www.redbooks.ibm.com/redpapers/pdfs/redp5238.pdf
8. List at least four advantages of using large memory? Answer:
9. List the maximum number of z13 CPU drawers that can be installed in a mainframe? Answer:
10. List the maximum number of processors that can be installed/activated in a z13 CPU drawer.
Answer:
11. List the maximum number of cores in z/13 processors. Answer:
12. What is the difference between a z13 Physical Unit (PU) processor and a Storage Controller (SC)
processor? Answer:
13. Compare the performance of z13 Physical Unit (PU) processors to Intel, AMD, etc., processor
performance of in terms of general purpose and specialize workloads? Answer:
14. Explain the concept of Spare processors? Answer:
15. What are the advantages of Capacity-on-Demand processors and cores? Answer:
Page 19 of 45
16. Which type of communication technology is used to interconnect z13 CPU drawers and external
I/O technology? Answer:
17. What are the advantages of using IBM Flash Express? Answer:
2.4 Questions - PCIe Interfaces
What is PCI Express?
PCI Express, technically Peripheral Component Interconnect Express but often seen abbreviated as
PCIe or PCI-E, is a standard type of connection for internal devices in a computer or mainframe.
Generally, PCI Express refers to the actual expansion slots on the system board or drawer that accept
PCIe-based expansion cards and to the types of expansion cards themselves. Some mainframe
drawers contain slots similar to PC-type servers
1. What is the difference between a z13 CPU Drawer and z12 PCIs Drawer? Answer:
.
2. List the three technology components of a PCIe Adaptor. Answer:
.
3. What are the advantages of using the z13 PCIe Fanout Adaptors? Answer:
.
4. What are the differences between a PCIe FICON Adaptor and a PCIe OSA Adaptor? Answer:
.
5. List four or more examples of the functions of PCIe OSA Adaptor in a data center. Answer:
.
Page 20 of 45
3.0 z System Workloads, Careers, File System, and Subsystems
Read the Introduction to z Systems document
Chapter 2: Mainframe hardware systems and high availability. Text book " Introduction to the Mainframe: z/OS
Basics"
Chapter 5: Working with data sets. Text book " Introduction to the Mainframe: z/OS Basics"
Glossary: Text book " Introduction to the Mainframe: z/OS Basics"
What is JES?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
z/VM
http://en.wikipedia.org/wiki/Z/VM
Processing work on z/OS: How the system starts and manages batch jobs http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.
htm
What is TSO?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.
htm
What is ISPF?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.
htm
What is JES?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.
htm
Main Features of ISPF http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.zcourses/zcourses_ispfmain_book.pdf
ISPF Primary menu and Datasets http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.zcourses/zcourses_ispfpdf_book.pdf
ISPF Data Sets
http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.zcourses/zcourses_ispfdsbasics_book.pd
f
ISPF http://en.wikipedia.org/wiki/ISPF
Rexx - http://en.wikipedia.org/wiki/Rexx
What is Rexx? - http://www.rexxla.org/rexxlang/
Page 21 of 45
3.2 Questions - z System Roles and Careers
7. Using the following table list several activities performed by each of the following mainframe roles.
z System Roles and Careers .
Role
Activities Performed
System
Programmer
System
Administrator
Application
Programmer
System Operator
Production
Control Analyst
Customer
Engineer
FTSS (Field
Technical Sale
Support)
SE (Systems
Engineer)
SPOC (Single
Point of Contact)
Page 22 of 45
3.3 Questions - Separation of Duties
Separation of Duties and IT Security
http://www.csoonline.com/article/446017/separation-of-duties-and-it-security
Separation of duties
http://en.wikipedia.org/wiki/Separation_of_duties
Anatomy Of A Fraud - http://www.csoonline.com/article/2117911/fraud-prevention/anatomy-of-a-fraud.html
How to prevent and detect fraud - http://www.csoonline.com/article/2118811/investigations-forensics/how-toprevent-and-detect-fraud.html
The ERP Security Challenge - http://www.csoonline.com/article/2122277/application-security/the-erp-securitychallenge.html
8. Using examples from the previous table titled "z/Enterprise Roles", explain the concept of "Separation of
Duties". Answer:
9. The web URL document "Separation of Duties and IT Security" provides an easy test to determine if
principles of the "Separation of Duties" have been violated. Explain this test of "Separation of Duties". Search
the document for the keyword "test". Answer:
10. Using examples from the previous table listing "Typical z/Enterprise" roles. Select any two z System roles.
Explain the reasons that these roles are based of the security concept "Separation of Duties". Answer:
Page 23 of 45
3.4 Questions - Z System Subsystems and Concepts
11. Given the following IBM z System Concepts. Your text book has some excellent definitions. Describe the
following z System concepts using the following table.
Z System Subsystems and Concepts .
Concept
Description
JES
ISPF
SDSF
WebSphere
TSO
JCL
CICS
REXX
ISPF
SNA
3270
Terminal
LPAR
z/VM
Video - z/OS Data Sets, VSAM, System and User Catalogs, and zUnix File SystemsUnit-07 http://youtu.be/NT_1AmdmlGg
IBM Paul Newton's presentation and demonstration of z/OS and VSAM data sets,
VTOC, System and User Catalogs, and Unix System Services file systems. Ditto,
Storage Management Subsystem (SMS), and using ISPF and ISMF to manage datasets
are reviewed. Some sections of this video are introductory. Some sections of this
video are at a more intermediate level.
See Blackboard Folder "Paul Newton's z System Presentations" for a copy of this Presentation
3.5 Questions - DASD, File Systems, Sequential Data Sets and Partitioned Data Sets
Page 24 of 45
Read the Introduction to z Systems document
What is a data set?
Direct access storage device - http://en.wikipedia.org/wiki/Direct_access_storage_device
z/OS UNIX file systems
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
What is z/OS UNIX?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
12. What are the functions of any file system, e.g., z/OS, Linux, or UNIX? Answer:
13. What is z System DASD? Answer:
14. What is a data sets? Answer:
15. What Windows or Linux storage concept is similar to a DASD?
Answer:
16. List the rules for naming data sets. Answer:
17. How a z/OS sequential data set is organized? Answer:
18. What is the purpose of a Z/OS partitioned sequential data? Answer:
Page 25 of 45
19. A Partitioned Data Set (PDS) is similar to which storage concept in a Windows, UNIX or Linux file systems?
Answer:
20. What are the advantages of the PDS-extended (Library) disk organization as compared to the older PDS
(Partitioned Organization (PO))? Answer:
21. What is meant by data set organization (DSORG)? Answer:
22. z/OS Data Set Organization (DSORG) is similar to which Windows file system concept? Answer:
23. Given the following data set named: RMU0202.COBOL.CLASS. What is the first named segment, i.e.,
RMU0202, is called? Answer:
24. Your High Level Data set Qualifier are used for three functions. List these three functions. Answer:
25. What is a function of a Low-level Data Set Qualifier? Answer:
.
26. What Windows file system concept is comparable to a datasets? Answer:
.
Page 26 of 45
3.6 Questions- Volumes, VTOCs and Catalogs
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
What is a VTOC?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
VSAM Catalogs - http://www.exforsys.com/tutorials/mainframe/vsam-catalogs.html
Difference between catalog and vtoc - http://ibmmainframeforum.com/viewtopic.php?f=6&t=1327
Disk Volume (computing) - http://en.wikipedia.org/wiki/Volume_%28computing%29
Disk volume - http://searchstorage.techtarget.com/definition/volume
What is difference between volume and disk - http://www.storagecraft.com/support/forum/what-differencebetween-volume-and-disk
Volume Label - http://pcsupport.about.com/od/termsv/g/volume-label.htm
5.6 How data sets are named - - Introduction to the New Mainframe: Z/OS Basics PDF
What are DASD volumes and labels? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconcepts_151.htm
27. Explain the function of a VTOC (Volume Table of Contents). Answer:
28. Explain the function of a User Catalog. Answer:
29. What are the differences between a VTOC and a User Catalog? Answer:
.
30. What is a VTOC similar to which storage concept in Windows? Answer:
.
Page 27 of 45
3.7 Questions - VSAM Concepts
VSAM Tutorial - http://www.tutorialspoint.com/vsam/
VSAM Demystified (Chapter 1) - http://www.redbooks.ibm.com/redbooks/pdfs/sg246105.pdf
Key-sequenced data set (KSDS) http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqnc
d_data_set.html
Relative record data set (RRDS) http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqnc
d_data_set.html
Entry-sequenced data set (ESDS) http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqnc
d_data_set.html
Record-oriented filesystem - http://en.wikipedia.org/wiki/Record-oriented_filesystem
Introduction to Partitioned Data Sets - http://docweb.cns.ufl.edu/docs/d0068/ar01.html
Since z System had its origin in the 1950s, there were very few types of data sets: Sequential and
Partitioned Data. Sequential data was a collection of consecutive bytes used to store any types of data.
But, only the application or operating system understood the internal contents of sequential data sets.
The second type (data organization) of a data set was the partitioned data set which were used to
organize the sequential data sets (a member) similar to a Windows or Linux folder or directory.
Windows and Linux have hundreds of types of files, e.g., DOCX, MP3, MDB, etc. IBM had only two types
of datasets and were designed for batch processing. As mainframe technology improved IBM introduce
VSAM in the 1970s to improve the performance and features to datasets to meet the requirements of
Online Transaction Processing.
31. What is VSAM? What is VSAM data used for? Answer:
32. Windows and Linux files are byte-oriented. Windows or Linux stores file contents, e.g., a Word Document,
as a contiguous series of bytes until the end of the file marker is reached. Many z/OS BM data sets are stored
using a record-oriented content format. A record is a group of related data, words, or fields treated as a
meaningful unit; for instance, a Name, Address, and Telephone Number can be a "Personal Record". Many
IBM data sets were primarily designed to store business data or application program code rather than
unstructured content used by a Word document or graphic file. What were the advantages of an IBM recordoriented file format? (Assignment 1 hands-on explains this answer). Answer:
33. Use the following table and describe each of the following VSAM Dataset types that are used to store
business transaction data.
VSAM Data Set Organization
Dataset Type
Description
Key-sequenced
data set (KSDS)
Entry-sequenced
data set (ESDS)
Page 28 of 45
Relative record data
set (RRDS)
Linear data set
(LDS)
34. Use the following table and provide an image for each of the following VSAM Dataset type
VSAM Data Set Organization
Dataset Type
Image
Key-sequenced
data set (KSDS)
Entry-sequenced
data set (ESDS)
Relative record data
set (RRDS)
Linear data set
(LDS)
3.8 Questions - JCL
JCL Tutorial - https://www.tutorialspoint.com/jcl/index.htm
JCL - JOB Statement - https://www.tutorialspoint.com/jcl/jcl_job_statement.htm
JCL - EXEC Statement - https://www.tutorialspoint.com/jcl/jcl_exec_statement.htm
JCL - DD Statement - https://www.tutorialspoint.com/jcl/jcl_dd_statement.htm
34. What is the function of JCL? Answer:
35. Within the structure of IBM JCL code explain the concept of the JCL JOB operator. Answer:
36. Within the structure of IBM JCL code explain the concept the JCL EXEC operator. Answer:
37. Within the structure of IBM JCL code explain the concept of a JCL DD operator. Answer:
Page 29 of 45
3.9 Questions - DB2 and IMS
DB2 – Introduction - https://www.tutorialspoint.com/db2/db2_introduction.htm
DB2 http://en.wikipedia.org/wiki/IBM_DB2
IMS DB - https://www.tutorialspoint.com/ims_db/index.htm
IMS http://en.wikipedia.org/wiki/Information_Management_System
Hierarchical database systems http://en.wikipedia.org/wiki/Hierarchical_database
38. What are the functions provided by IBM's IMS Product Line (Information Management System)? Answer:
39. What are the functions provided by IBM's DB2 product line? Answer:
3.10 Questions- RACF and SAF
RACF - Resource Access Control Facility - http://www.tutorialdownloads.com/tutorials/racf---resource-accesscontrol-facility+700.html
RACF - http://en.wikipedia.org/wiki/RACF
Security on z/OS - http://wwwlgis.informatik.unikl.de/cms/fileadmin/users/kschmidt/mainframe/lutzkuehner/Chapter11_Security_on_zOS_slides.pdf
What is RACF? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zsecurity/zsecc_042.htm
Resource Access Control Facility - http://en.wikipedia.org/wiki/Resource_Access_Control_Facility
Security on z/OS
http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.zsecurity/zsecurity_book.pdf
40. What are the functions and features provided by IBM's RACF product line (Resource Access Control
Facility)? Answer:
41. What are the functions provided by IBM's SAF? Answer:
Page 30 of 45
3.11 Questions - SNA and TCP/IP
SNA
http://en.wikipedia.org/wiki/IBM_Systems_Network_Architecture
Networking on Z/OS
http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.znetwork/znetwork_book.pdf
42. What is the primary function of SNA? Answer:
43. How is SNA compare to TCP/IP? Answer:
Page 31 of 45
3.1 Questions - Batch, OLTP, Web Applications and Web Services Workloads
Read the Introduction to z Systems document
1. Provide a detailed description and practical example of each of the following z/OS processing workloads or
user/data interfaces.
Workloads, User
Description
Practical Example
and Data interfaces
Batch Processing
Online Transaction
Processing (OLTP)
Web Applications
(WebSphere)
Web Services
(WebSphere MQ)
2. List the advantages and disadvantages of Batch Processing using the following table.
Batch Processing
Advantages
Disadvantages
3. List the advantages and disadvantages of Transaction Processing (OLTP) using the following table.
Transaction Processing (OLTP)
Advantages
Disadvantages
4. What z/OS subsystem manages batch processing? Answer:
5. Historically, the only interface to manage and execute jobs on an IBM operating system was keypunch cards.
The popular online interface to access IBM operating systems, manage jobs, perform system program tasks is
called? Answer:
Page 32 of 45
6. What is the z/OS component that provides OLTP processing services for user transactions, e.g., inquiry to
account balances, adding employee information into a database, etc. using legacy programming languages,
e.g., COBOL? Answer:
4.0 Mobile Online Transaction Processing
Read the Introduction to z Systems document
4.1 Introduction to Mobile Online Transaction Processing
Many Web and Mobile OLTP applications are user-based interfaces are added to existing enterprise application
server and databases. If the fundamental business transaction processing requirements rarely not change, a
user text-based interface (a front-end system) may be replaced by more user-friendly web page (HTML, CSS,
JavaScript) and mobile interfaces. Backend systems, which have satisfied business requirements and testing
for decades will be modified less often. Therefore, the challenge facing modern user interfaces will be 1) how
do enterprise user-interface applications systems keep up the changes and manage the variety of user-interface
applications, and 2) how do how do enterprise user-interface applications communicate with backend
application servers, databases, and security?
4.2 Native mobile applications versus HTML5 and Hybrid mobile applications
Native mobile applications are developed specifically for one platform, e.g., Android, iOS, etc. and can take full
advantage of all the device features — they can use the camera, the GPS, the accelerometer, the compass, the
list of contacts, and so on.
HTML5 and JavaScript Web technologies have provided alternatives to building mobile apps based on
individual native mobile operating systems. This war between Web apps and native apps was hyperbolically
billed by some as a war between efficiency and beauty, between penny-pinching and aesthetics. HTML5
champions touted the ease and speed of building and updating Web apps that relied on a single codebase that
could run on any browser, and, by extension, any device. Meanwhile, advocates for native apps, while
conceding the higher cost and time to build and maintain apps for multiple platforms, argued that being able to
tailor for the strengths of each OS meant that apps looked and performed better than their browser-based
equivalents.
Page 33 of 45
4.3 Questions - BYOD or BYOT
Mobile interface in diverse contexts and environments as opposed to focusing on devices alone or consumer
roles. For example, the trend to introduce BYOB/ BYOT in the workplace or public space will continue to raise
significant management challenges for IT organizations as they lose control of user endpoint devices. It will also
require increased attention to user experience design.
What is bring your own device? http://www.ibm.com/mobilefirst/us/en/bring-your-own-device/byod.html
Bring your own device- https://en.wikipedia.org/wiki/Bring_your_own_device
Pros and Cons of Bringing Your Own Device to Work http://www.pcworld.com/article/246760/pros_and_cons_of_byod_bring_your_own_device_.html
1. What is BYOT or BYOT? Answer =>
2. List the advantages and disadvantages of BYOD/BYOT using the following table.
Advantages and Disadvantages of BYOD/BYOT Projects In Business and Government
Advantages
Disadvantages
3. Using your personal example or an example from your current or previous employer, specifically describe a
projects requirements, potential benefits (pros) and costs (cons) for a BYOD project. Answer =>
4.4 Introduction to IBM MobileFirst Platform
Introduction to z Systems Document (Very Important)
An overview of IBM MobileFirst Platform http://www2.themsphub.com/rs/creationagencyibm/images/MobileFirst_Platform_Overview.pdf
The IBM MobileFirst Platform (formerly IBM WorkLight) is a robust suite for 1) mobile application development,
2) mobile application testing and quality assurance, 3) mobile application and device administration, and 4)
mobile enterprise middleware tools and standards.
MobileFirst was not designed to replace Apple or Android mobile applications, but to improve mobile
application development within an enterprise context. The popularity and success of Apple's IoS or Android
mobile devices and apps as a consumer-based architecture continues to mature. One can download
consumer-based mobile apps from the Apple Store, or Google Play from categories such as social networking,
gaming, education, life style, entertainment, ecommerce, consumer business or utilities.
IBM describes MobileFirst as an Enterprise Mobile Platform to contrast business-based mobile platforms with
consumer-based mobile platforms. To illustrate consider the increased challenges facing large commercial
bank who must both provide mobile device connectivity to its customers as well as its internal
employees, e.g., BYOD (Bring-Your-Own-Device to work).
Page 34 of 45
4.5 Questions – Native, Hybrid and HTML Apps
Native vs Hybrid App Development - http://www.sitepoint.com/native-vs-hybrid-app-development/
HTML5 vs Native: The Mobile App Debate - http://www.html5rocks.com/en/mobile/nativedebate/
Native vs Mobile Web vs Hybrid applications - http://www.javacodegeeks.com/2013/12/native-vs-mobile-web-vshybrid-applications.html
Five Alternatives for Developing Native iOS Apps - http://insights.dice.com/2015/04/02/five-alternatives-fordeveloping-native-ios-apps/
Responsive HTML5 Apps: Write Once, Run Anywhere? Where is Anywhere? http://www.wired.com/2013/11/responsive-html5-apps-write-once-run-anywhere-where-is-anywhere/
Mobile First Design: Why It's Great and Why It Sucks - https://codemyviews.com/blog/mobilefirst
4. Mobile application development is a popular project requirement. From a systems perspective one factor that
needs to be considered is the choice of mobile application framework used to develop and deploy mobile
applications, e.g. Native Language Apps ( Android, Objective-C, etc, HTML5/CSS, and JavaScript
Frameworks cross platform Apps, or Hybrid. Describe the type of each mobile application framework listed
below and provide a technology example of each type using the following table.
A HTML Web App is NOT a HTML Web Page of Web Form
Mobile Application
Development
Framework
Description and Example
Native Apps
HTML Web Apps
Hybrid Apps
5. List the Pros (Advantages) and Cons (Disadvantages) of Native Mobile Frameworks using the following table.
Pros and Cons of Mobile Native Apps
Advantages (Pros)
Disadvantages (Cons)
6. List the Pros (Advantages) and Cons (Disadvantages) of Mobile HTML Web App Frameworks using the
following table.
Page 35 of 45
Pros and Cons of Mobile HTML Mobile Web Apps
Advantages (Pros)
Disadvantages (Cons)
7. List the Pros (Advantages) and Cons (Disadvantages) of Mobile Hybrid Apps using the following table.
Pros and Cons of Mobile Hybrid Apps
Advantages (Pros)
Disadvantages (Cons)
Page 36 of 45
4.6 Question – Choosing the Right Mobile App Architecture
How to choose the right architecture for your mobile apps http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&ved=0CDIQFjAF&url=http%3A%2F%2F
www.rapidvaluesolutions.com%2Fwp-content%2Fuploads%2F2013%2F04%2FHow-to-Choose-the-RightTechnology-Architecture-for-Your-Mobile-Application.pdf&ei=49GaVcvcLcneQH31ICoAQ&usg=AFQjCNEH_ohPIVhFFaiFhfX9xU9vnuRsbw
Choosing the right mobile application architecture - http://enterpriseinnovation.net/article/choosing-right-mobileapplication-architecture-836468610
Mobile Application Architecture Guide- http://robtiffany.com/wpcontent/uploads/2012/08/Mobile_Architecture_Guide_v1.1.pdf
Choosing The Right Architecture For Developing Mobile Application http://www.enterprisecioforum.com/en/blogs/sukumarofs/choosing-right-architecture-developing-m
Why I use an application server for mobile applications - http://archive.thoughtsoncloud.com/2013/11/why-iuse-an-application-server-for-mobile-applications/
8. Given the requirements of a university, who is noted for their "good-looking" Computer faculty (obviously not
RMU), to develop, deploy and update mobile application systems for students, faculty and administrators. List
the mobile application development framework(s) and reasons that you would recommend for mobile application
systems for students, faculty and administrators. The rationale is important. You may select more that on
framework. Your answer will be graded on your application of the previous questions and answers. Answer =>
4.7 Questions - Mobile application servers
Mobile application server - http://www.kony.com/resources/glossary/mobile-application-server
Mobile Application Server - http://www.steponesystems.com/enterprise-mobility-applications/mobile-applicationserver/
Mobile App - Server Architecture - http://stackoverflow.com/questions/9165457/mobile-app-server-architecture
How to Pick a Server for Your App - http://mashable.com/2011/11/16/mobile-app-cloud-servers/
9. This course considers mobile applications beyond application coding. Therefore, what are the differences
between a mobile application server and an application server? Answer =>
Page 37 of 45
10. Given the requirements of a university to develop, deploy and update mobile application systems for
students, faculty and administrators, describe the listed mobile application server advantage and provide an
example applying this concept using the following table.
Advantages of
Mobile Application
Description and Example
Servers
Flexibility
Security
Scalability
Deployment and
Updates
Database
Integration
Internal vs External team for mobile product development - http://www.thinslices.com/internal-vs-external-teamfor-mobile-product-development/
Here's Why Your Business Needs Its Own Mobile App
http://www.forbes.com/sites/allbusiness/2014/11/17/heres-why-your-business-needs-its-own-mobile-app/
Why Your Enterprise Must Rethink Mobile App Development - http://www.wired.com/2013/02/why-yourenterprise-must-rethink-mobile-app-development/
Mobile web apps: The best option for business? - http://www.mrcproductivity.com/research/whitepapers/Whitepaper_Mobile.pdf
4.8 Questions – Internal, External, ad Third-Party Mobile Application Development
11. Mobile application systems is a popular project requirement. From a systems perspective one factor that
needs to be considered is the development of the mobile app. Consider the three popular approaches to mobile
application development: In-house (internal) development, External development, using third-parties mobile
application and system.
List the Pros (Advantages) and Cons (Disadvantages) of Internal Web Application Development using the
following table.
Pros and Cons of Internal Mobile App Development
Advantages (Pros)
Disadvantages (Cons)
Page 38 of 45
12. List the Pros (Advantages) and Cons (Disadvantages) of External Mobile App Development s using the
following table.
Pros and Cons of External Mobile App Development
Advantages (Pros)
Disadvantages (Cons)
13. List the Pros (Advantages) and Cons (Disadvantages) of using Third Party Mobile Apps using the following
table.
Pros and Cons of Using Third Party Apps
Advantages (Pros)
Disadvantages (Cons)
Page 39 of 45
4.9 Questions – IBM MobileFirst Platform Components and Advantages
Read the Introduction to z Systems document
14. For each component of the MobileFirst platform 1) describe the functions of each component, and 2)
describe the advantages of each MobileFirst platform component in an enterprise context using the following
table.
MobileFirst
Platform
Description of Functions
MobileFirst
Studio
MobileFirst
Server
MobileFirst
Application
Center
MobileFirst
Console
MobileFirst
Platform
Scanning
Application
MobileFirst
Quality
Assurance
Page 40 of 45
Advantage to Mobile Apps in an
Enterprise Context
5.0 Cognitive Computing and Data Analytics
Read the Introduction to z Systems document
5.1 Introduction to Cognitive Computing
Historically, IBM z Systems have dominated large-scale business transaction processing. However, in today's
world, the ability to process and have access information to make decisions may be as valuable as recording a
physical business transaction. Competition and technology advances are driving companies to adopt new
business which will focus on INFORMATION. For example, Google, Facebook, Twitter, Instagram, Linked
and other social media companies have provided free technology services to that they could collect and analyze
large volumes of unstructured social data, and sell these analyses to organizations to make decisions. The
analysis of this data will provide organizations with important insights to predict and plan for the future. The
availability and analysis of Big Data has created a new Cognitive Era of Computing.
Historically, enterprise computing started with Online Transaction Processing workloads. The objectives of
Online Transaction Processing workloads are to efficiently, securely, process and store large number of
transactions, to meet day-to-day process objectives and requirements and maintain data and transaction
integrity in a multiuser, concurrent shared system.
In the Cognitive Era, the analysis of Big Data from transaction and other sources to provide information to guide
operational, tactical and strategic decision making has become very important to the design of enterprise
systems. Big data analytics is the process of examining large data sets to uncover hidden patterns, unknown
correlations, market trends, customer preferences and other useful business information. The analytical findings
can lead to more effective marketing, new revenue opportunities, better customer service, improved operational
efficiency, competitive advantages over rival organizations and other business benefits.
http://searchbusinessanalytics.techtarget.com/definition/big-data-analytics
5.2 Questions - Cognitive Model
1. For each component of the Cognitive Model 1) describe the functions of each component, and 2) list several
characteristics each Cognitive Model component in an enterprise context using the following table.
Cognitive Model
Characteristics
Description
System of
Record
System of
Engagement
Systems of
Insight
2. What are the primary objectives of a System of Record? Answer =>
Page 41 of 45
5.3 Questions - Big Data and Deep Analysis
Deep analytics is the application of sophisticated data processing techniques to yield information from large and
typically multi-source data sets that may contain not only structured data but also unstructured and semistructured data. Deep analysis involves precisely targeted and sometimes complex queries on data sets that
may be measured in petabytes and exabytes, often with requirements for real-time or near-real-time responses.
The data is often unstructured and includes complex event analysis.
Because real-time analysis of such large data sets can require distribution of the workload over hundreds or
even thousands of computers, deep analytics is often associated with cloud computing. The workload
distribution may be managed through some framework such as MapReduce. Approaches to speeding up the
process of querying data include the use of columnar databases and in-memory analytics.
The financial sector, the scientific community and the pharmaceutical and biomedical industries have conducted
deep analytics for some years. In recent years, the practice has become increasingly common within the
enterprise, as the amount of corporate data produced has increased -- and with it, the desire to extract business
value from that data.
3. What is Big Data? Answer =>
4. Describe each of the characteristics of Big Data in an enterprise context using the following table.
Characteristics of
Big Data
Description.
Volume
Velocity
.
Variety
Value
.
5.4 Questions - Data Analytic Tools, Programing Languages, Statistical Packages, and
Concepts
Page 42 of 45
BI, Analytics, and Big Data: (Part 1) - https://www.mapr.com/blog/bi-analytics-and-big-data-%E2%80%9Cha%E2%80%9D-moment-part-1
Exploring the Relationship Between Hadoop and a Data Warehouse (Part 2) https://www.mapr.com/blog/exploring-relationship-between-hadoop-and-data-warehouse-part-2
What are Hadoop, SAS, and R, and what are the relationships between them? Is SAS a development of
Hadoop? Which is better? - https://www.quora.com/What-are-Hadoop-SAS-and-R-and-what-are-therelationships-between-them-Is-SAS-a-development-of-Hadoop-Which-is-better
Choosing R or Python for data analysis? - https://www.datacamp.com/community/tutorials/r-or-python-for-dataanalysis#gs.PcUqITc
What Hadoop Is. What Hadoop Isn’t. - http://insideanalysis.com/2012/12/what-hadoop-is-what-is-isnt/
What’s the Difference between Apache Hadoop and Apache Spark? https://www.ibm.com/developerworks/community/blogs/f0f3cd83-63c2-4744-90219ff31e7004a9/entry/What_s_the_Difference_Between_Apache_Hadoop_and_Apache_Spark?lang=en
SAS vs. R (vs. Python) – which tool should I learn? - https://www.analyticsvidhya.com/blog/2014/03/sas-vs-vspython-tool-learn/
What is R? - https://www.r-project.org/about.html
R programming language-- http://searchbusinessanalytics.techtarget.com/definition/R-programming-language
Why Scala Is Taking Over the Big Data World - https://www.google.com/#q=what+is+scala+big+data
Scala 101 -Course - https://bigdatauniversity.com/courses/introduction-to-scala/
Video - IBM Watson: How it Works - https://www.youtube.com/watch?v=_Xcmh1LQB9I
Video - IBM Watson - https://www.youtube.com/watch?v=rXVoRyIGGhU
Video - IBM Watson: The Power of Artificial Intelligence - https://www.youtube.com/watch?v=z0BTZ6C8RAc
What is machine learning? - http://whatis.techtarget.com/definition/machine-learning
Evolution of machine learning - http://www.sas.com/en_us/insights/analytics/machine-learning.html
Get the facts on IBM Watson Analytics - http://www.ibmbigdatahub.com/blog/get-facts-ibm-watson-analytics
Page 43 of 45
5. Describe each of data analytic tools, programing languages, statistical packages, or concepts in an enterprise
context using the following table.
Data Analytic
Tools and
Concepts
Description
Text mining
tools
In-place
Analytics
Streaming Data
analysis
In-Transaction
and Real-time
Analytics
Machine Learning
Apache Hadoop
(IBM Big Insights)
Apache Spark
.
IBM Watson
R
IBM SPSS or SAS
.
SCALA
Python
6. What are the differences between Watson and Hadoop? Answer =>
Page 44 of 45
7. What are the differences between Hadoop and Spark? Answer =>
8. What are the differences between Scala and SPSS/SAS? Answer =>
Page 45 of 45
Contents
Introduction ............................................................................................................................................................. 4
Tutorial Prerequisites .......................................................................................................................................... 4
Access or Installation of a 3270-client to Connect to z/OS .............................................................. 4
z/OS userID and Initial Password ..................................................................................................... 4
Objectives - Z System Tutorial – 2 ISPF and File System .................................................................................. 4
Tutorial Recommendations ................................................................................................................................. 5
Hands-on is the Best Way to Learn .................................................................................................. 5
Handling Common Errors submitting a JCL Job, using ISPF and SDSF ........................................ 5
Recommended Videos ...................................................................................................................... 5
How to complete Hand-on Tutorial Requirements and Review Questions ........................................................ 6
Windows Snipping Tool ..................................................................................................................................... 7
1.0 Preview to the z/OS Logon Process ................................................................................................................ 10
1.1 3270-Terminal Emulator Client Program ................................................................................................... 10
1.1.1 The functions of PCOMM 3270 emulator are to: .................................................................. 11
1.1.2 Can I use my mouse? ............................................................................................................. 12
1.1.3 Why doesn't TSO support a mouse? ...................................................................................... 12
1.1.4 RDz - Rational Developer for z Systems ............................................................................... 13
1.1.5 Configuring TN3270 clients .................................................................................................. 13
1.1.6 Tom Brennan's Vista tn3270-client and Master the Mainframe Contest. ............................. 13
1.1.7 Brown University - MAC OS X tn3270 client ...................................................................... 14
1.1.8 Android TN 3270 client apps for your mobile device ........................................................... 14
1.1.9 iOS TN 3270 client apps for your mobile device .................................................................. 14
1.1.10 Questions- 3270-emulator client.......................................................................................... 14
View ..................................................................................................................Error! Bookmark not defined.
1.3 What is ASCII and EBCDIC? ..................................................................................................................... 15
1.4 3270-Terminal Keyboard ............................................................................................................................ 18
1.5 System z TSO Logon .................................................................................................................................. 19
1.6 You are probably already a z/OS Mainframe User ..................................................................................... 20
2.0 LOGON to System z, TSO and ISPF .............................................................................................................. 21
2.1 Step 1. Follow the directions to start up your 3270 - emulator. ................................................................. 21
2.2 Step 2. After Connecting to System z a TSO Logon banner should appear. ............................................. 21
2.3 Possible System z Connection Problems using a 3270 Emulator Client..................................................... 22
2.4 Step 3. Enter your userID using the TSO LOGON command. .................................................................. 22
2.5 Error Typing in a Protected Area ................................................................................................................ 23
2.6 Step 4. Enter the TSO/RACF Password ..................................................................................................... 24
Page 2 of 47
2.7 The TSO Initial Password – Only on the First Logon ................................................................................. 25
2.8 Not authorized to UserID TSO Error .......................................................................................................... 26
2.9 You get an error that states you are already Logon ..................................................................................... 27
2.10 Reconnecting to a TSO session ................................................................................................................. 27
2.10 Step 5. TSO Broadcast or z/OS System Messages................................................................................... 28
2.11 What does those *** (three) asterisks mean? ............................................................................................ 28
2.12 Step 6. Almost Done – Still Working ...................................................................................................... 29
2.13 Step 7. ISPF Primary Option Menu ......................................................................................................... 30
2.14 Document your ISPF Primary Option Menu............................................................................................. 33
2.15 My ISPF Option = = > line is displayed at the bottom of screen!............................................................. 33
2.16 Questions - Document the new location of Option Line ........................................................................... 35
2.17 Questions - Using the TSO LOGON......................................................................................................... 35
2.18 Questions - TSO Logon Errors.................................................................................................................. 36
3.0 LOGGING OFF From ISPF and TSO ............................................................................................................ 38
3.1 The =X ISPF Command .............................................................................................................................. 38
3.2. Specify Disposition of the LOG Data Set .................................................................................................. 39
3.3 TSO Ready Prompt and LOGOFF Command ............................................................................................ 39
3.4 Staring ISPF from TSO Ready Prompt ....................................................................................................... 39
3.5 Questions - ISPF ......................................................................................................................................... 40
3.6 Questions - Exiting ISPF and Logoff .......................................................................................................... 41
4.0 PCOMM Installation ....................................................................................................................................... 42
Page 3 of 47
Enter your Name Here
Introduction
Tutorial Prerequisites
Access or Installation of a 3270-client to Connect to z/OS
System z Tutorial – 1 LOGON will provide detailed instructions and demonstration examples to use a
3270-client to LOGON or LOGOFF an IBM z/OS operating system. You are REQUIRED to have
access to a 3270-emmulator client to connect to a System Z server, e.g., TN3270, PCOMM, etc.,
installed on your personal computing device or a school lab computer. This emulator MUST be
configured with the IP address and Port Number to connect to a System z system. The IP address
identifies the location of the System z Mainframe. The port number identifies the listening
location of TSO subsystem or program. More information concerning 3270-clients and PCOPMM
installation are provided at the end of this tutorial. If necessary, consult your instructor for more
support or details.
z/OS userID and Initial Password
You are REQUIRED to be assigned a z/OS userID and initial password BEFORE you
start. If necessary, consult your for more support or details.
Objectives - Z System Tutorial – 2 ISPF and File System
▪
▪
▪
▪
▪
▪
▪
Using an installed 3270-Client, connect to a z System Mainframe and LOGON to TSO (z/OS)
using the assigned userid and initial password.
After successfully entering the initial password students will change their initial TSO password.
Students will review common TSO and Logon Problems, e.g., protected field errors, password
has expired, and password not authorized.
Students should review ISPF Primary Option Menu
Student should move ISPF Option Line using the ISPF Settings Panel
Students should exit ISPF and LOGOFF from TSO
Students should re-logon and logoff and tst TSO Password Change - LOGON to TSO (z/OS)
and LOGOFF
Page 4 of 47
Tutorial Recommendations
Hands-on is the Best Way to Learn
It is recommended that students logon to z/OS and should attempt the hands-on demonstration
examples while **reading this tutorial". The best way to learn z/OS is simply to read the
directions and complete the hands-on requirements. The student should avoid getting distracted
or becoming overwhelmed by a few technical concepts. If the student follows the hands-on
directions, the technical concepts may be easier to understand after you have completed
these hands-on requirements.
Handling Common Errors submitting a JCL Job, using ISPF and SDSF
Z System Tutorial - 1 includes explanations and possible solutions for common Logon, Logoff, and
other z/OS problems. It is RECOMMENDED for a student to read these problem solving
recommendations and attempt to resolve your specific problem BEFORE you ask your instructor for
assistance. This tutorial is designed to introduce common ISPF troubleshooting strategies. If after
you have read and attempted to apply these troubleshooting suggestions and you still need
assistance, DO ASK YOUR INTRUCTOR FOR ASSISTANCE. It is important that your personal
experience using the fastest commercial computer in the world will be a success for you.
Recommended Videos
Your instructor may decide to demonstrate this tutorial. You may also view the ISPF and COBOL and
other videos listed below. You are NOT required to view these videos, but you may find that these
videos are an excellent supplement to your instructor's demonstration or this System z Tutorial – 1
LOGON.
ISPF and COBOL Video - http://youtu.be/ozXKLwRwuOo
demonstration and presentation of the initial System z logon process, using ISPF, submitting a
sample JCL job to set up tutorial data sets, submitting a JCL job to compile, link, and execute
a sample COBOL program, and using SDSF to review the COBOL job output. Rated for
beginners.
Video - Accessing z/OS using TN3270, FTP, and SSH - Unit-03 https://youtu.be/seSW_hUePjA
IBM Paul Newton's presentation and demonstration of accessing z/OS using TN3270 Emulator,
a SSH client (PuTTY), and FTP.
Video - TSO, ISPF, SDSF, the ISPF editor - Unit -04
http://youtu.be/vOiHiI7b9iY
IBM Paul Newton's presentation and demonstration of TSO, ISPF, SDSF, the ISPF editor.
Page 5 of 47
How to complete Hand-on Tutorial Requirements and Review Questions
System z Tutorial - 1 LOGON will provide directions and demonstration examples to guide the student
to perform a hands-on requirement. Using the tutorial demonstration examples the student will be
required to perform a similar hands-on task. The following is an example of typical tutorial hands-on
requirement.
Use a graphical snipping tool to document your successful logon with a display of
your ISPF Primary Option Menu below.
The directions specify the use of a graphical snipping tool, such as the Window's Snipping Tool.
(Directions to use the Window's Snipping Tool will be presented next.) Any graphic snipping tool may
be used to demonstrate that you have successfully completed the required hands-on task.
A grey or colored box will be provided after the requirement directions. You are required to provide a
graphic image, e.g., using cut-and-paste, to document that the hands-on requirement was correctly
completed.
Review questions are also be provided at the end of the tutorial. The following is an example of a
review question format. Since type the answer in provided grey or colored box.
1. What is the purpose of a partitioned data set? Answer:
Type in the answer to the question into the grey or colored box.
It is recommended that you use Table of Contents at the beginning of the tutorial to review and
navigate to the concept presented in the review question. Students will find that using the
document FIND tool or searching GOOGLE may also be valuable for researching the review
question answer.
Page 6 of 47
Windows Snipping Tool
(If necessary, consult your instructor for other graphical copying tools)
The following YouTube Videos will provide more directions for Windows 10, 8 and 7 Snipping Tool
➢ Windows 10 Tutorial | How to Use Snipping Tool https://www.youtube.com/watch?v=RbPAxcTf8h8
➢ How To Use Snipping Tool & Print Screen | Windows 7 Tutorial https://www.youtube.com/watch?v=DQqwLkrqvmQ
Copying a z/OS Image into your Hands-on Requirement (Using Windows 7)
Step 1. Click on the Window's Start Button located at the lower left-hand corner of your desktop. In
the "Search programs and file" text box type the key word Snipping. The name of the Snipping
Tool should appear. Select the Snipping Tool entry.
The following Snipping Tool Dialog Box will be displayed. It is recommended to drag this dialog box
outside the area that you want to document before you continue, else you may copy the dialog box.
Step 2. Once you have z/OS information displayed in your 3270 emulator that you wish to document,
click on the "New" icon to start the image selecting process. Your desktop will be "greyed" or dimmed,
which indicates that the Snipping Tool utility is ready to select an image.
Step 3. Drag a copy box select tool using your right-mouse button around the image to be selected.
Once you release the mouse button, a Snipping Tool windows box will display your selected image
and a tool bar similar to the following.
Snipping Tool Utility Window Example.
Page 7 of 47
Step 4. For this tutorial you should select the Snipping Tool Copy Button/Icon which is displayed with
two sheets of paper. Select the Copy Button. See previous red arrow.
Step 5. Position the cursor inside the grey or color Hands-on requirement box and left-click to select
the position.
Step 6. Paste the image using Ctrl-V or the Edit/Paste drop down menu. Your documented result
should look similar to the following.
Page 8 of 47
Use the snipping tool to document your successful logon with a view of your ISPF
Primary Option Menu below. Your image should be inserted in the box below.
Page 9 of 47
1.0 Preview to the z/OS Logon Process
1.1 3270-Terminal Emulator Client Program
System z Servers may be remotely accessed from your workplace, computer lab, or home by using a
3270-Client, such as TN3270 or IBM PCOMM. Your instructor may have provided you directions to
download and install a 3270-Client on your Windows, MAC OS, Linux, Android or IoS operating
system. These 3270-Client download and installation directions are not provided in this tutorial. This
tutorial assumes that you are using 3270-Client in a computer lab or previously installed on your
personal computer.
The functions of a 3270-Terminal Emulator utility are 1) to CONNECT your personal computer
or device to a System z mainframe or server using the TCP/IP over the Internet, 2) to convert
ASCII binary-coded characters of your computer to the IBM Mainframe's EBCDIC binary-coded
characters, and 3) to map the keyboard layout of a 3270-terminal keyboard to your personal
computer's keyboard. Without the ASCII-to-ECBDIC code conversion process the IBM mainframe
will not be able to communicate with your Windows, MAC OS, Linux, Android, or an IoS operating
system.
IBM Personal Communications (PCOMM) or Tom' Brenann's Vista TN3270 clients are used to
connect a z/OS mainframe and TSO.
During the period between 1950 and 1970s, there were no personal computers or no Internet or no
TCP/IP. Mainframes used a character binary code called ECBDIC decades before ASCII and Unicode
ever existed. Application programmers, system programmers, and users would communicate to the
mainframe using 3270 ECBDIC, text-based, dumb terminal, and the SNA communication protocol.
You cannot play computer games or use Microsoft Office on a 3270 dumb terminal. But 3270
terminals or were very efficient and were more functional than using punch cards.
In the 1990s IBM introduced a proprietary version named PCOMM as a Windows 3270-client. Later
Tom Brennan introduced a 3270-clients which may be installed a wider variety of other operating
systems.
During the period between 1950 and 1970s, there were no personal computers or no Internet or no
TCP/IP. Mainframes used a character binary code called ECBDIC decades before ASCII and Unicode
ever existed. Application programmers, system programmers, and users would communicate to the
mainframe using 3270 ECBDIC, text-based, dumb terminal, and the SNA communication protocol.
With a dumb terminal you cannot play computer games or use Microsoft Office. But 3270 terminals
were very efficient. It was much better than using punch cards.
In a modern world with personal computers, the Internet and TCP/IP IBM introduced the PCOMM as a
Windows client. As a comparison, we use an Internet Browser (a HTTP client) to connect to a web
server using TCP/IP.
Page 10 of 47
1.1.1 The functions of PCOMM 3270 emulator are to:
1) Enable zOS users to use the TCP/IP communication protocol to connect to a remote IBM
mainframe and TSO.
2) Convert Windows ASCII characters typed on your keyboard to ECBDIC characters so that TSO
can understand your commands.
3) Convert IBM ECBDIC characters sent by TSO to an ASCII character so that the character may be
displayed on your Windows computer.
4) To interface with function of the Windows client operating system. PCOMM does not support MAC
OS or Linux. (There are other TN3270 clients listed later.)
Page 11 of 47
1.1.2 Can I use my mouse?
While it may appear that PCOMM may support a mouse, when using the default setting the mouse is
only understood by Windows and PCOMM, not by IBM's TSO. Some 3270-clients will permit you to
map a mouse button to a 3270-key to simulate the use of a mouse.
By default PCOMM will try to approximate cursor movement and convert those movements to a
format that may be understood by TSO. However, using a Windows mouse with PCOMM may
frustrate or confuse you when you are trying to move the TSO cursor. When connected to TSO it is
best to use the arrow keys to move the cursor and the tab key to move between unprotected fields.
Unprotected fields are where you may type or enter data.
PCOMM also does not understand mouse clicks when you are in TSO, but you can use the mouse to
manage PCOMM.
1.1.3 Why doesn't TSO support a mouse?
I thought that the mainframe was very powerful!
To start, there was no mouse user interface available until the early 1980s - decades after the
mainframe was introduced. A better question is why didn't they add the mouse, GUI or web interfaces
later? Wouldn't these interfaces be more user-friendly?
The estimated average processor overhead to manage a Windows operating system mouse and
graphical user interface varies between 15% and 30% of the total processor power. To extend this
microprocessor utilization analogy to the shared processor capacity of a TSO-based mainframe with
100-connected users using a mouse and graphical user interface, the mainframe would have no more
processing cycles to do any other work.
It is also estimate that the new gesture-based interfaces use on cell phones, mobile devices and
personal will increase processor utilization to over 40% of the processor's core capacity. Your
personal computer is not shared. You can allocate your processor's capacity to any user interface you
may want, e.g., voice, mental telepathy, or communication with the deceased. (I prefer mental
telepathy.)
(Hopefully, you will appreciate the introduction of multicore processors. i.e., one processor core to
manage the user interface the second processor core to get work done. Can you exceed this analogy
to battery life of your mobile device?)
Page 12 of 47
1.1.4 RDz - Rational Developer for z Systems
IBM and other third party providers do provide GUI clients. For example, IBM Rational Developer for z
Systems provides an enhanced toolset for creating and maintaining z/OS applications quickly and
efficiently. This rich set of GUI TSO, COBOL, PL/I, C++, assembler and Java development tools
designed for batch, IBM CICS, IBM IMS and IBM DB2® environments are optimized for the
workstation-based Eclipse platform. RDz is available for almost every client operating system. You
can get a free 90 day trial of RDz at http://www-03.ibm.com/software/products/en/rational-developerfor-z-systems
RDz connects through a special RDz server and the RDz is licensed per workstation and per server.
TSO, ISPF, and other text-based tools come with every mainframe with no extra cost. So as a
System z manager would increase their budgets to make their entry level system z professionals
happier by providing mouse and GUI capabilities. RDz executes on the client-side and hence adds
little user-interface overload to the mainframe processor core.
1.1.5 Configuring TN3270 clients
You must manually enter TCP/IP connection information for the following clients.
Hostname or IP address is192.86.32.17
TSO Port Number is 623 (Make sure that your firewall does not clock this port.)
While PCOMM is software designed for the Windows platform, other TN3270 emulators are available
for Windows, MAC OS X and Android. Just enter the keyword TN3270 into Google and search for
your operating.
1.1.6 Tom Brennan's Vista tn3270-client and Master the Mainframe Contest.
Tom Brennan Software is providing Vista tn3270-client along with licensing to all contestants of the
Master the Mainframe contest. Follow this link, download, and install Vista V1.27:
http://www.tombrennansoftware.com/download.html
Many students prefer this version over IBM PCOMM. Installation and other directions are provided.
After signing up for the Master the Mainframe contest check the email from the IBM Master the
Mainframe Contest team for the license key that allows permanent use of Vista tn3270. Tom
Brennan's TN3270 client comes with a 30 day trial. Student's Marist College Student's License Key
644EMDM1H4
Page 13 of 47
1.1.7 Brown University - MAC OS X tn3270 client
Brown University provides a tn3270 client that is freely-licensed for non-commercial use. Download it
from here: http://www.brown.edu/cis/tn3270/ Select the tn3270 release that supports your OS X
version. Most Mac users will select the latest 3.4.0 release as it supports OS X 10.3.9 and later.
1.1.8 Android TN 3270 client apps for your mobile device
Android Mocha TN3270 Lite - A free version is available from the Google Play store. The paid
version includes keys f1-f24.
https://play.google.com/store/apps/details?id=dk.mochasoft.tn3270lite&hl=en
1.1.9 iOS TN 3270 client apps for your mobile device
Apple iOS Mocha TN3270 – Lite. The MAC version may be found at
https://itunes.apple.com/us/app/tn3270-lite/id290608522?mt=8
1.1.10 Questions- 3270-emulator client
1. You must use a 3270-emulator client, such as IBM PCOMM or TN3270, to connect to a z System
mainframe. List the three functions provided by a 3270-emulator client? Answer:
.
2. Explain the purpose and differences between ASCII character encoding and ECBDIC character
encoding. Answer:
.
3. The older 3270 terminal keyboard used to connect to mainframe is layout differently than your
desktop or mobile device keyboard. The older 3270 keyboard had two Enter keys. On a Windows key
board what is the purpose of the Right-Ctrl Key? Answer:
.
Page 14 of 47
4. To connect to a z System mainframe across the Internet, the 3270 emulator must be configured
with two pieces of TCP/IP information: an IP Address and a Port Number. What are the functions of
an IP Address and a Port Number? (This answer would be the same whether or not you connecting to
an IBM mainframe and TSO or connecting to amazon.com.) Answer:
.
5. When you use your 3270-emulator to connect to a mainframe, which IBM subsystem or program
permits you to LOGON to z System Mainframe? Answer:
.
1.3 What is ASCII and EBCDIC?
Electronically, a digital computer is only capable of storing, understanding and processing information
as combination of bits. A bit is conceptually similar to a simple light switch. Either the switch is on or it
is off. Early computer hardware used a variety of different electronic technologies to store a bit. The
following are some early pictures of storing bit from Pingdom
(http://royal.pingdom.com/2008/04/08/the-history-of-computer-data-storage-in-pictures/) and Timeline
of Computer History http://www.computerhistory.org/timeline/memory-storage/
The 1024-bit Selectron.
The Magnetic Drum
Can you imagine the size of your laptop if we would store a bit using these 1940s and 50s
technologies?
It doesn't matter which electronic storage method is used, a bit is any device that is capable of having
two states. It is either ON or OFF. Most modern computers have electronic components that in theory
works like a light switch it is either ON or OFF. To make life easier, the number 1 is used to represent
ON or True. The number 0 is used to represent the OFF or false.
Page 15 of 47
Binary electronics are reliable and inexpensive to build. Since all digital computer operations are
based on two numeric states. All hardware computer functions are built on a combination of bits or
multiples of twos, i.e., 2, 4, 8, 16, 32, 64, 128, 258, 512 and 1024. A combination of bits may be
called byte or word. What is more important to remember is that a Binary Representation Code must
be used by a computer to understand the meaning of those combination of bits. ASCII and ECBDIC
are two examples of binary codes.
While electrical engineers may get excited about the basic bit (or one light switch), a bit does little to
help an average person store or manipulate human data and information inside a computer. A bit can
only represents two states. Symbolically, the ON state can represent a "Passing Grade" and the OFF
state can represent a "Failing Grade"
Paul Revere was his famous for warning that the British were coming used a binary digit, or two
simple values. "One by Land and Two by Sea". As history reports this data representation system was
quite adequate. But, what if the British want to stop at Heinz Field during a Pittsburgh Steeler's game
to eat a Parmenitti Bros Sandwich before the attack? There was no third state that could represent
this change in the battle plan. (A little bit of humor - a real little bit. What can you expect from a Steeler
fan?)
The binary codes and bits does permit computers to process numeric data. But humans also require
to communicate with letters of the alphabet, special characters and symbols. In 1963, IBM introduced
a 8-bit binary code called EBCDIC (Extended Binary Coded Decimal Interchange Code), ECBDIC
which would combine 8-bits (256 combinations) which would be used to arbitrarily represent a
letter of alphabet.
Behinds the scenes the IBM mainframe uses the ECBDIC would store the number 193 which
symbolically meant to display a capital letter "A" on the display to make these humans happy. The
letter "B" would be stored as an ECBDIC number 194, and so forth. Though IBM's 8-bit EBCDIC was
a great idea to store upper and lower case alphabetic characters, numbers, and other symbols, it was
proprietary binary code. While a computer can store numbers, this ECBDIC coded number may be
assigned to symbolically represent any alphabetic or international character.
There were three open coding standards introduced to compete with ECBDIC, i.e., ASCII 7-bit (128
combinations), ANSI 8-bit (256 combinations) and Unicode 16-bit (65353 combinations.) ASCII,
ANSI, and Unicode are used by almost all server, desktop or mobile device operating systems, except
IBM operating systems. EBCDIC is only used with System z mainframe operating systems.
Let's review the previous two ECBDIC examples. ECBDIC will store the number 193 to display and
represent the capital letter "A", and store the number 194 to the display and represent the a capital
letter "B". However, your Windows and Apple computer uses ASCII. ASCII will store the number 65 to
display and represent a capital letter "A", and store the number 66 to the display and represent the
capital "B". To humans, all we see is the capital letter "A". But to the computer it only sees the
decimal number ECBDIC 193 and ASCII 65.
If you are confused can you imagine, the confusion if a Windows or Apple operating system uses
ASCII to communicate IBM mainframe that uses ECBDIC? This one of the major reasons we use a
3270-client to convert the ASCII binary codes, e.g., the number 65 for a capital letter "A", to the
number 193 so that the mainframe can understand that EBCDIC can interpret the transmit characters
as a capital letter "A". This is the process of ASCII-to-ECBDIC binary code conversion.
Page 16 of 47
Page 17 of 47
1.4 3270-Terminal Keyboard
The old-style IBM 3270 terminal keyboard's layout is different than your Windows or MAC keyboard.
➢ Your keyboard has function keys on the top row labeled as F1...F12 key. This Function
Key layout was based on the original IBM 3270-terminal key board, but were labeled PF1
through PF24.
➢ Modern keyboards have only ONE labeled ENTER key, but the 3270-terminal keyboards
had two ENTER keys. The larger ENTER key is often called the Line Feed (skip a line key).
The second, and more important 3270 ENTER key was located where the Right-CTRL key on
the standard PC keyboard. The Right-CTRL key is VERY important on a 3270-terminal. The
Right-CTRL key means to SEND information entered or typed on the terminal keyboard to the
mainframe and to be executed. This second ENTER key, or the Windows Right-Ctrl key, is
often called the RETURN key. The bottom line, the second ENTER or RETURN key is the
most important.
➢ MAC computer and laptops keyboards do NOT have a right-CTRL Key. Your 3270emulator program must "map" or assign an alternative MAC key to perform the same function
as the RETURN or right-ctrl key.
➢ An original 3270 keyboard had three keys called Program Attention keys, labeled PA1,
PA2, and PA3 and another key labeled CLEAR. These keys are not available on a PC or
MAC keyboard and must be mapped, or assigned, to different keys. These assignments are
not standardized across keyboards or 3270-clients. Most emulators supplement your physical
key board with a pop-up key board.
➢ PA1, assigned to the 3270-emulator ESC key, is pressed to interrupt a program/command or a
job hangs-up. Pressing the PA1 or ESC key is similar to pressing the Ctrl+Break key
combination with a Windows hangs-up.
➢ The 3270-terminal CLEAR key, assigned to the PAUSE key, means to refresh the screen. The
CLEAR key is rarely used in z/OS, but may be used in many z/OS middle ware programs.
Page 18 of 47
1.5 System z TSO Logon
When one connects to a System z mainframe using the 3270-emulator client, one will connect to TSO
to LOGON. The TSO LOGON process is similar to authenticating to other operating systems. One will
enter a valid userID and password. The following graphic provides a preview summary of following
tutorial directions to connect to the z/OS Mainframe, Logon with a userid, authenticate with a
password, and TSO/ISPF Initialization process. Don't worry, the graphical summary will be easier to
understand after you complete the hands-on tutorial directions.
➢
➢
➢
➢
Connect to System z across the Internet using a 3270-emulator client.
Authenticate to TSO/RACF.
Allocate memory to your personal copy of the TSO subsystem.
ISPF, a menu-based user interface F into the TSO memory area – Still Working –
Almost There
Page 19 of 47
1.6 You are probably already a z/OS Mainframe User
Most consumers or the majority of Fortune 1000 employees have previously accessed the services of
a System z server backend services by using a mobile device, an Internet browser, or a retail point-ofsale terminal. Examples of some System z backend services include static web page, dynamic web
application, database, and security services. Consumers and employees never see backend services
execute, they only enjoy the convenience of their graphical, web page or mobile user.
Consider the use of your mobile device to purchase some product online at Walmart. Behind your
user interface and shopping cart, the Walmart System z servers processes hundreds of inventory look
up programs and database accesses, generation of dynamic web pages (what you see), calculations
to update the purchase transactions, to interact with credit card companies in a secured environment.
The list of System z backend services you may have previously accessed without your knowledge of
using System z backend services would take hours-and-hours to discuss. But, if you accessed a
major retailer, e.g., Wallmart, Home Depot, Macey's, etc., a major commercial bank, e.g., PNC, Bank
or America, Well Fargo, Chase, etc., or used a major credit card company, e.g., Visa, Master Card,
any major insurance company, e.g., State Farm, Gieco, All State, major Health Care System, major
Health Care Insurance company, most 401K providers, any major federal, state or military
government or agency, you are already a System z User. However, a few major Fortune 1000
companies do not rely on System z for most large-scale, mission-critical services. These companies
include Google (Alphabet), Amazon, Facebook, Apple, Microsoft, and Dell.
As a consumer or Fortune 1000 employee, you may have already used System z backend services
listed in the left column of the previous graphic, such as CICS, Web Sphere, Web Sphere MQ, and
the Apache HTTP server. However, this tutorial will provide you with hands-on experiences to
introduce you to the backend professional z/OS system administration and application development
systems which support System z services. As a comparison we all enjoy driving our car, but a
professional mechanic needs to keep our car running. You will have the opportunity to see some of
the System z "mechanic" systems on the most powerful business computer system in the world, e.g.,
a System z13 mainframe and server.
Page 20 of 47
2.0 LOGON to System z, TSO and ISPF
2.1 Step 1. Follow the directions to start up your 3270 - emulator.
You should automatically connect to System z and TSO. If necessary, consult your instructor for
more support or details.
2.2 Step 2. After Connecting to System z a TSO Logon banner should appear.
The TSO banner will appear similar to the following. The Marist College Logon Banner will appear
differently.
On a rare occasion, there may be a connection problem to System z. If necessary, consult your
instructor for more support or details.
Page 21 of 47
2.3 Possible System z Connection Problems using a 3270 Emulator Client.
➢ The 3270 Emulator Client was incorrectly configured and may have attempted to connect to an
incorrect IP address or Port number.
➢ Your local computer's or school's firewall may be blocking either the Port Number or the IP
Address.
➢ The System z server that you are attempting to connect to is currently being updated.
The Marist College System z server is scheduled to be updated on last Wednesday of the
month between the hours of 4AM to 8AM EST. Unlike Windows, System z is rarely
automatically updated. All updates are fully tested before updates are applied by the z/OS
SMPe (System Modification Program). SMPe was introduced in the 1960s decades before
Windows, IoS, and Linux designed their installation and update utilities.
2.4 Step 3. Enter your userID using the TSO LOGON command.
TSO displays text in protected regions of the terminal window. While the cursor will move
anywhere in the terminal window, you can only type in an un-protected area of the window.
Sometimes it is easy to distinguish between protected areas (where you can NOT type) and unprotected areas where you MAY type. For example, some unprotected areas are underlined.
The cursor will automatically appear at the left-bottom line of the TSO logon. Type LOGON
XXXXX, where XXXXXX is your TSO userID assigned by your instructor. TSO IDs may be up to eight
characters. TSO is not case sensitive. After finished typing press the right-CTRL key or other key
assigned on a MAC laptop or other system. Normally one does not use the ENTER KEY.
Page 22 of 47
2.5 Error Typing in a Protected Area
Help Me. Help me. I am stuck and I can’t go on!!!
Some students encounter a problem when they press a key and nothing is displayed. You will notice
the following symbol located at the bottom right-hand corner of the screen. The large Red X or
person-like symbol indicates that you incorrectly attempted to type in a protected field, which is not
permitted. This is called a Protected Field Error.
One may only type in unprotected fields, but you may NOT type in data in a protected field. Normally,
most unprotected fields are underlined, but this is not the case in the TSO LOGON Banner. An
unprotected field is similar to an HTML form or GUI application text box where are user can type
anything. All other areas are classified as protected fields
Even if a field is clearly identified by an underline some individuals may try to type before the
underline unprotected field, after the underline, or anywhere they please.
To resume typing after a Protected Field Error or Between Unprotected Fields.
1) Press the ESC key to clear the Protected Filed Error message and reposition the cursor.
2) Press either the Right or Left Tab keys to move to the n...