4 Course - Kit - 2 - 1
4 Course - Kit - 2 - 1
cover
Exercises
Getting Started with the IBM Mainframe with z/OS
Commands and Panels
August 2019 edition
Notices
This information was developed for products and services offered in the US.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM
representative for information on the products and services currently available in your area. Any reference to an IBM product, program,
or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent
product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's
responsibility to evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this
document does not grant you any license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
North Castle Drive, MD-NC119
Armonk, NY 10504-1785
United States of America
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY
KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some jurisdictions do not allow disclaimer
of express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein;
these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s)
and/or the program(s) described in this publication at any time without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any manner serve as an
endorsement of those websites. The materials at those websites are not part of the materials for this IBM product and use of those
websites is at your own risk.
IBM may use or distribute any of the information you provide in any way it believes appropriate without incurring any obligation to you.
Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other
publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other
claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those
products.
This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible,
the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to
actual people or business enterprises is entirely coincidental.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many
jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM
trademarks is available on the web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml.
© Copyright International Business Machines Corporation 2019.
This document may not be reproduced in whole or in part without the prior written permission of IBM.
US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
V11.3
Contents
TOC
Contents
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv
Exercise 5. Copy, move, rename, delete data sets and members . . . . . . . . . . . . . . . . . . . . . . . . 5-1
Section 1: Copy, move, rename, delete data sets, and members . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .X-7
TMK
Trademarks
The reader should recognize that the following terms, which appear in the content of this training
document, are official trademarks of IBM or other companies:
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide.
The following are trademarks of International Business Machines Corporation, registered in many
jurisdictions worldwide:
AIX® BookManager® CICS®
DB2® DS8000® Easy Tier®
ECKD™ Enterprise Storage Server® eServer™
Express® FICON® FlashCopy®
GDPS® Geographically Dispersed HACMP™
Parallel Sysplex™
Hiperspace™ HyperSwap® IBM LinuxONE™
IBM Spectrum™ IBM Spectrum Control™ IBM z Systems®
IBM z® IBM z13® IMS™
MVS™ Notes® Open Class®
Operating System/400® OS/390® OS/400®
Parallel Sysplex® Power Architecture® Power Systems™
Power® PowerHA® POWER8®
RACF® Resource Measurement RMF™
Facility™
RS/6000® System p5® System Storage®
System z10® Tivoli® VTAM®
z Systems® z/Architecture® z/OS®
z/VM® z/VSE® zEnterprise®
z10™ z13® z9®
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other
countries, or both.
Java™ and all Java-based trademarks and logos are trademarks or registered trademarks of
Oracle and/or its affiliates.
UNIX is a registered trademark of The Open Group in the United States and other countries.
VMware is a registered trademark or trademark of VMware, Inc. or its subsidiaries in the United
States and/or other jurisdictions.
Other product and service names might be trademarks of IBM or other companies.
EXempty
Overview
The steps in this exercise are to guide you through accessing the Skytap environment to gain entry
into the IBM mainframe system. The screens displayed in this exercise are intended as a reference
to assist you as you progress through the remaining lab exercises. These action items are to be
performed on the actual live system.
Objectives
• Access the Skytap environment
• Access the system image
• Log on to TSO
• Access the ISPF Primary Option Menu
• Navigate through the TSO/ISPF screens
• Logoff TSO
References
SC34-4823 Interactive System Productivity Facility (ISPF) User's Guide
EXempty
Exercise instructions
Preface
Note
The Enter key on your keyboard may/may not be the Enter key.
On some keyboards, the Enter key for VM is the right CTRL key. Take care when entering your
password. If you enter the password incorrectly four times, your user ID will be revoked. Contact
the Help Desk for support.
EXempty
This will provide you with all of the information you will need to progress through this course.
The following is just an example. Do not use the information below to record your information.
Ensure that you use the information in your Course Lab Kit.
EXempty
EXempty
Wait patiently while your image is being created. This may take a while.
__ 6. Left click in the middle of the next screen:
EXempty
__ 8. Once the icons appear on the desktop, using the information you recorded in step 3, double
click the system name.
__ 9. Using the information you recorded in step 3, enter the assigned TSO user ID and press the
Enter Key.
EXempty
EXempty
• Command: You can enter a TSO command at logon time. This is processed after any
command the TSO/E administrator has entered in the parm field on the EXEC statement of the
logon procedure. TSO/E does not execute the command you enter in the COMMAND field if the
command specified in the parm field of the logon procedure fails.
• New Password: If your user ID is defined to RACF, you might want to change your password, or
you might be required to do so. To change your password, enter your current password in the
PASSWORD field, and then enter your new password in this field. The same password rules as
for the old password apply. When you enter a new password in this field, you are prompted to
verify the password. Only then, the password is changed.
DO NOT change the password.
• Group Ident: If your user ID is defined to RACF, you can enter a RACF group ID. Your RACF
group ID can be up to 8 characters in length. The first character must be alphabetic or national
(A-Z, #, ¢ or @). The remaining characters, if any, can also contain numerics (0-9).
• -Nomail By entering S before this option, you choose not to display messages intended
specifically for you during logon processing. If you do not select this option, all messages
intended for you are displayed on your terminal during logon.
• -Nonotice: By entering S before this option, you elect not to receive messages intended for all
TSO users during logon processing. If you do not select this option, all messages intended for
all TSO users are displayed on your terminal during logon.
• -Reconnect: By entering S before this option, you indicate that you want to reconnect your
logon session if the session was disconnected. If the session was not disconnected and your
user ID does not currently have a session established, logon processing occurs.
• -OIDcard: If your user ID is defined to RACF and you want to enter data through the Operator
Identification Card (OIDCARD), you are prompted to do so during the logon process. To enter
data, slide your OIDCARD through your OIDCARD reader attached to your terminal.
__ 10. Using the information you recorded in step 3, enter the assigned TSO password and press
the Enter Key.
EXempty
__ 11. Once you have successfully logged on, the following screen will appear:
__ 12. When three asterisks (***) appear, press the Enter Key to continue.
You are now logged on to TSO.
What you see now depends upon how your installation has modified the logon process. Some
installations display one or more groups of messages at the top of the screen. In our lab
system, you should see messages similar to the ones displayed on the visual.
When *** (three asterisks) appear on the screen, press the Enter Key to continue.
EXempty
Section 3: ISPF Primary Menu
__ 13. Press the Enter key to remove the Licensed Material copyright information from the screen.
__ 14. Your first task is now to alter the settings for your ISPF/PDF session. Select the proper
panel option (0), and proceed to the next page.
__ 15. Use this panel to familiarize yourself with the ISPF settings.
EXempty
__ 16. Place a forward slash in front of Command line at bottom and press the Enter key.
The command line now displays at the bottom of the screen.
__ 17. Remove the forward slash front the front of Command line at bottom and press the Enter
key.
The command line now displays at the top of the screen.
__ 18. Change the display of the long message so that it appears in a pop-up window.
__ 19. Enter an invalid selection on the Command ===>______ line and press Enter. A short
message reading Invalid command should now appear in the upper right corner of your
screen.
__ 20. Now press F1 to display the corresponding long message. The message is undefined
should now appear in a pop-up window. Press F1 again for additional help. Return to ISPF
Settings panel.
__ 21. To continue, clear the command line and press Enter again.
__ 22. Ensure that option Tab to Option bar choices is selected in the ISPF settings panel.
__ 23. Select all of the options to see what their functions are capable of.
EXempty
__ 26. Select the function keys choice of the Action bar again and select Disable keylists. Notice
the change to the function keys. This setting (keylists disabled) is the recommended setting
for most z/OS users.
__ 27. Select Identifier from the action bar and activate the panel identifier display. Check your
panel for the panel name in the upper left corner.
Panels can be modified, and this tells us the panelid (member name) of the panel.
Reset the panel identification display to off. You can also display the system name and your
user ID on every panel by activating the corresponding option.
EXempty
__ 30. The other way to view a data set from the View Entry Panel is in the Other Partitioned,
Sequential or VSAM Data Set, or z/OS UNIX file section.
__ 31. The data set is entered in the Name field, with apostrophes:
EXempty
You now have ended the ISPF session and returned to the TSO command line mode. Your
TSO session is still running.
The LOG and LIST commands allow you to process the log and list data sets at any time
during an ISPF session. The log and list data sets must have been allocated. You control
the data set processing by specifying on the LOG or LIST command one of the three
keyword options: PRINT, DELETE, or KEEP.
ISPF maintains a log of significant user activities. This information can be useful, for
example, when diagnosing problems. The log data is stored in a data set named
userid.SPFLOGx.LIST, where userid is your TSO user ID.
EXempty
At the end of an ISPF session you, as the user, can specify what has to be done with the log
data set. Enter the selection of your choice.
Print data set and delete: Prints the data set, then deletes it. You must specify an output
class or a local printer ID. If you specify an output class, ISPF submits a background job to
print and delete the data set. If you specify a local printer ID, ISPF uses TSO's PRINTDS
command to route the data set to the printer and then deletes the data set.
Delete data set without printing: Just deletes the data set.
Keep data set - Same: This option closes and frees the data set and allocates the same
data set in the next session.
Keep data set - New: This option closes and frees the data set but allocates a new data set
when starting the next ISPF session.
Delete data set without printing or Keep data set - Same is the usual choice unless you
have had problems.
If you do want to print, then the printer class (SYSOUT class) or destination (local printer ID)
must be entered.
Additionally, the four lines of Job statement information must be entered if you use the
SYSOUT option.
The line List Data Set Options not available indicates there is no list data set to print.
If we performed a print under ISPF, then a similar set of options are provided to dispose of
the list data set.
Section 9: Logoff
__ 33. To terminate your TSO session, enter the TSO command logoff on your terminal.
EXempty
TSO then replies with a message like IKJ56470I userid LOGGED OFF TSO AT 14:40:51
on July 16, 2019 to indicate that your TSO session has been terminated.
End of exercise
EXempty
Overview
This exercise begins with how to access additional assistance, if needed. Then, you will have the
opportunity to allocate a sequential, partitioned, and partitioned extended data sets. After the
allocation process, you will be guided through verifying the successful allocation of each data set.
Objectives
• Access additional assistance, as needed.
• Allocate a Sequential Data Set
• Allocate a Partitioned Data Set (PDS)
• Allocate a Partitioned Data Set Extended (PDS/E)
• Verify the successful allocation of the newly created data sets
References
SC34-4823 Interactive System Productivity Facility (ISPF) User's Guide
GC28-1758 MVS JCL User's Guide
SC26-7410 z/OS DFSMS Using Data Sets
SG24-7419 Implementing REXX Support in SDSF
EXempty
Exercise instructions
Preface
• This exercise depends on the successful completion of the previous exercise.
• The answers to all questions are located at the end of this exercise.
__ 2. On the Course Selection Menu, enter the number 2 to access help menu for most of the
labs for course Fundamental System Skills in z/OS.
EXempty
__ 3. When performing a lab and you require additional assistance, enter the appropriate
selection for the specific lab.
Note: Assistance is available for all exercises, except lab exercise 11: z/OS Management
Facility (option B).
__ 4. Press the F3 End key until you are at the ISPF Primary Option Menu.
You may have to hold down the Fn key while pressing the F3 key.
EXempty
__ 8. After Data set allocated appears in the upper right corner, press the Enter key to see the
allocation attributes on the Data Set Information screen:
Block size (BLKSIZE) specifies the maximum length, in bytes, of a physical block of storage
in z/OS.
If BLKSIZE(0) is specified, the system will determine the optimal block size based on the
maximum record length (LRECL) and the physical characteristics of the disk, or
approximately half of a physical track.
The following chart is an example of default Block sizes for a Record Format of Fixed
Blocked:
EXempty
Section 3: Allocate a Partitioned Data Set
__ 9. Allocate a Partitioned Data Set (PDS) named userid.ES10.PDS (where userid is the
user ID you used to log on to TSO with) according to the following specifications:
__ a. Ten blocks primary space.
__ b. Five blocks secondary space.
__ c. Directory size two blocks.
__ d. Variable length records.
__ e. Block records.
__ f. Block size determine by system.
__ g. Record length 255 bytes.
__ 10. To verify whether the data set has been allocated properly, use the Data Set information
panel.
If a block size is not specified for the creation of a data set, the system attempts to
determine the block size.
Using a system-determined block size has the following benefits:
- The program can write to DASD, tape, or SYSOUT without you or the program
calculating the optimal block size. DASD track capacity calculations are complicated.
Optimal block sizes differ for various models of DASD and tape.
- If the data set is later moved to a different DASD type, such as by DFSMShsm, the
system recalculates an appropriate block size and re-blocks the data.
Questions
Q1: Which field on the Allocate New Data Set panel distinguishes a PDSE from a PDS?
__________________________________________________________________
EXempty
__ 12. To verify whether the data set has been allocated properly, use the Data Set information
panel.
End of exercise
EXempty
Exercise answers
Section 4: Allocate a Partitioned Data Set Extended
Q1: Which field on the Allocate New Data Set panel distinguishes a PDSE from a PDS?
A1: Data set name type field. Entering the word Library in this field indicates that this is a PDSE
and not a PDS.
EXempty
Overview
In the previous exercise, you created three data sets; a sequential data set, a partitioned data set,
and a partitioned data set extended. In this exercise, you will create a member in the previously
created partitioned data set. You will then edit the member and copy a member from a different
data set into the one you created. After modifying the member, you will execute a REXX exec and
view its output.
Objectives
• Create a member in a partitioned data set
• Edit the member
• Copy a member
• Execute a REXX exec
References
SC34-4823 Interactive System Productivity Facility (ISPF) User's Guide
GC28-1758 MVS JCL User's Guide
SC26-7410 z/OS DFSMS Using Data Sets
SG24-7419 Implementing REXX Support in SDSF
EXempty
Exercise instructions
Preface
• This exercise depends on the successful completion of the previous exercises.
• All action items followed by a * sign, include exercise hints, which are located at the end of this
exercise.
Note
TSO commands are not case sensitive. They are presented here in uppercase for ease of reading.
EXempty
__ 5. Perform the following modifications:
__ a. Set the boundaries to 1-8 and change all xxxxxxxx to the word ANSWER.*
__ b. Reset the boundaries to 1-80 and change all xxxxxxxx to the word NUMBER.
__ 6. Exclude all of the lines from the display.
__ 7. Display the first line containing @@@ and type over @@@ with the word SAY.
__ 8. Use the RFIND key (F5) to find all further occurrences of @@@ and type over them with the
word SAY.
__ 9. Show all of the lines on the display that may have been previously excluded.
The first line must contain a comment with the word REXX. REXX comments start with a /*
and end with an */.
__ 10. Enter: This is a little REXX-Exec on line 1, in comments signs /* . . . */
__ 11. Set the boundaries to 40-50.
__ 12. Change SAY to Y/N.
__ 13. Enter the word SAVE on the command line to save your changes.
__ 14. Start the Rexx_exec by entering the following on the command line:
TSO EX ‘userid.ES10.PDS(LITLGAME)’ EXEC
__ 15. If you receive the following error, locate the problem, correct the error and start the Rexx
exec again. *
__ 16. When you have finished playing computer games, take a few minutes to inspect
LITLGAME.
LITLGAME is written in a procedural language, called REXX.
REXX programs (or execs) can be complied or not, as you choose. This program has not
been complied, and so it is interpreted as the instructions are executed, resulting in poorer
performance, but less administration work.
EXempty
__ 17. Before logging off or continue on to the next exercise, ensure that you reset the BOUNDS
command.
End of exercise
EXempty
Exercise hints
Section 2: Edit the LITLGAME member
Step 4: If you receive a message that “LITLGAME not replaced” on the data set to panel, ensure
that you have a forward slash (/) in front of option Replace like-names members:
Step 5a: Enter: BOUNDS 1 8, then Enter: CHANGE xxxxxxxx ANSWER ALL
Step 15: To correct the error, delete the line which contains THIS IS A LITTLE REXX-EXEC on line
2.
EXempty
Overview
In this exercise, you will create a member in a previously allocated partitioned data set. You
perform functions, such as copying data, overlaying commands, inserting and repeating lines using
the newly created member.
Objectives
• Create a member
• Copy data
• Overlay commands
• Insert lines
• Repeat lines
References
SC34-4823 Interactive System Productivity Facility (ISPF) User's Guide
GC28-1758 MVS JCL User's Guide
SC26-7410 z/OS DFSMS Using Data Sets
EXempty
Exercise instructions
Preface
• This exercise depends on the successful completion of the previous exercises.
• All action items followed by a * sign, include exercise hints, which are located at the end of this
exercise.
Note
Enter I1 or I2 in the prefix area to add one or two lines. Then, using the tab key, tab to the newly
inserted lines and tab to the data filed and enter blanks (space bar).
EXempty
Section 2: Copy / overlay commands
The data will look like the following:
Note
If the BOUNDS command was not reset from the previous lab exercise, results in the following steps
are unpredictable.
__ 6. Use copy/overlay that is c and oo, to copy line 1 over the first four lines you copied in, so
the result looks like the following:
Information
Notice that the former line 1 has disappeared because of the move.
EXempty
__ 8. Insert the following heading lines at the top of the table:
You can do this the efficient / lazy way by copying the second line to the end of the table and
type over TOP with BOTTOM.
__ 11. Repeat entry Davis, and change the repeated line to:
__ 12. Insert a new line after Newman, and enter Claudia as first name.
__ 13. Use copy/overlay, that is c and o, to copy the old entry Newman over the new line.
__ 14. Change the user ID to CNEWMAN and the phone to 31654.
__ 15. Exclude the detail lines.
__ 16. Resort the detail lines by last name as the primary sort field and use given name as the
secondary sort field. *
__ 17. Review sorted lines to very sort on primary and secondary names.
__ 18. Save your changes by entering Save on the command line.
End of exercise
EXempty
Exercise hints
Section 1: Create a new member and copy data
Step 4: Using the ruler makes it easier to enter the first data line with vertical bars “|” in columns 1,
16, 32, and 48.
Step 5: Enter the letter A (for after) in the prefix area, and enter COPY
‘D80WW.ES10V15.CNTL(TABLE)’ on the command line.
EXempty
Overview
In this exercise, you will allocate data sets and create multiple members. After creating new
members, you will add data to those members. Then, copy members from one data set to another.
When completing this process, you learn how to delete data sets and members.
Objectives
• Allocate data sets
• Create members
• Add data to members
• Copy members from one data set to another
• Delete members
• Delete data sets
References
SC34-4823 Interactive System Productivity Facility (ISPF) User's Guide
EXempty
Exercise instructions
Preface
• This exercise depends on the successful completion of the previous exercises.
• All action items followed by a * sign, include exercise hints, which are located at the end of this
exercise.
Important
__ 6. Verify whether the members D and H have been copied correctly by editing or viewing them.
__ 7. Delete userid.ES10.INDATA.
__ 8. Rename userid.ES10.OUTDATA to userid.ES10.DATA.
__ 9. Delete all members in userid.ES10.DATA except members A, D, and H.
__ 10. Rename these members to DATA1, DATA2, and DATA3, respectively.
__ 11. Move members DATA1 and DATA3 to userid.ES10.PDS.
__ 12. Delete userid.ES10.TEXT and userid.ES10.PDSE.
End of exercise
EXempty
Exercise hints
Section 1: Copy, move, rename, delete data sets, and members
Important: Make sure to specify the proper copy options. Replace like-named members option.
EXempty
Overview
During this exercise, you will have the opportunity to become familiar with the options offered by the
ISPF Data List menu. Using this menu, you will display data sets, move members, and compress
data sets.
Objectives
• Utilize the ISPF Data List menu
• Display data sets
• Move members
• Compress data sets
References
SC34-4823 Interactive System Productivity Facility (ISPF) User's Guide
SC26-7410 z/OS DFSMS Using Data Sets
EXempty
Exercise instructions
Preface
• This exercise depends on the successful completion of the previous exercises.
• The answers to all questions are located at the end of this exercise.
• All action items followed by a * sign, include exercise hints, which are located at the end of this
exercise.
Questions
Q1: What does the first entry user ID stand for? ____________________________________
Questions
__ 10. Determine the volume on which the data set userid.ES10.DATA resides.
__ 11. Press PF11 as necessary and answer the following questions:
EXempty
Questions
__ 12. List all data sets residing on the same volume as data set userid.ES10.DATA that start
with first four letters of your TSO user ID.
__ 13. Select the data set userid.ES10.DATA from your list and display all members in the data
set.
__ 14. Delete data set userid.ES10.DATA.
__ 15. Return to the ISPF Primary Option menu.
End of exercise
EXempty
Exercise answers
Section 1: Data set lists
Q1: What does the first entry user ID stand for?
A1: Is the alias entry of the user ID in the master catalog.
Q2: What letter is used to compress a data set?
A2: The letter Z.
Q3: What is the number of allocated tracks in userid.ES10.CNTL?
A3: 15.
Q4: What is the %Used of userid.ES10.CNTL?
A4: 6%.
Q5: What is the catalog in which userid.ES10.DATA is cataloged?
A5: ICFCAT.MVS100.UCAT.STUD3.
Exercise hints
Section 1: Data set lists
Step 2a: Record length 80 bytes.
Step 2b: Block length 27,920 bytes.
Step 5: A shortcut way to rename a data set member:
Enter the letter R (for rename) to the left of the member, enter the New Name and press the
Enter key.
Q4: From the Data Set Information screen, press the F3 key to go back to the screen which lists the
data sets starting with your userid. Place the cursor to the left of userid.ES10.DATA and press the
F11 key. Continue to press the F11 key to view additional information.
EXempty
Overview
This exercise guides you through using TSO commands to manage data sets.
Objectives
• Utilize TSO commands
• Allocate data sets
• Verify allocation of data sets
• Delete data sets
References
SC34-4823 Interactive System Productivity Facility (ISPF) User's Guide
SC28-1968 TSO/E User's Guide
EXempty
Exercise instructions
Preface
• The answers to all questions are located at the end of this exercise.
• All action items followed by a * sign, include exercise hints, which are located at the end of this
exercise.
Important
All TSO commands must start with TSO. TSO commands are not case sensitive.
Example: TSO HELP ALLOCATE FUNCTION
This command displays the function of the allocate command.
EXempty
Section 2: TSO commands
__ 2. Use the proper TSO/E command to display only the function of the ALLOCATE command.
__ 3. Use the proper TSO/E command to display only the syntax of the ALLOCATE command.
__ 4. Find out the purpose of the LIKE operand of the ALLOCATE command. *
__ 5. Allocate a new data set called userid.ES10.TSOEPDS.
Allocate the data set with the same characteristics as D80WW.ES10V15.PROC.
Questions
__ 10. Display your TSO/E profile and change the prefix setting to HUGO.
__ 11. Enter the following command: LISTDS ES10.TSOEPS.
__ 12. Reset the prefix to its previous value. *
Note
The previous prefix was noprefix. The solution sets the prefix to the userid.
EXempty
Questions
Questions
Questions
Q4: What are the first three letters of the VOLSER on which the data set was allocated? ________
EXempty
This command displays the alias entry associated to your user ID HLQ (High Level
Qualifier). All data sets that are created with your HLQ will be cataloged in the user catalog
defined by the alias entry: ICFCAT.MVS100.UCAT.STUDx.
__ 20. Enter the following command:
LISTC LVL(‘userid’) CAT(‘ICFCAT.MVS100.UCAT.STUDx’)
This command lists all of your user data sets cataloged in this user catalog.
__ 21. Enter the following command:
LISTC LVL(‘userid’) CAT(‘ICFCAT.MVS100.UCAT.STUDx’) ALL
This command provides more information from the catalog (with the ALL option).
End of exercise
EXempty
Exercise answers
Section 2: TSO commands
Q1: Did the command work?
A1: It worked only if the profile prefix is set to the user ID high level qualifier (Your TSO user ID).
Q2: What is the result of entering the command?
A2: Message IKJ56700A ENTER DATA SET NAME - appears.
Q3: What is the result of entering the command?
A3: Message IKJ56701I MISSING DATA SET NAME - appears.
Q4: What are the first three letters of the VOLSER on which the data set was allocated?
A4: The VOLSER starts with SMS (Storage Management Subsystem) and is followed by three
numbers.
Exercise hints
Section 2: TSO commands
Step 4: TSO HELP ALLOCATE OPERANDS (LIKE)
Step 6: TSO LISTDS userid.ES10.TSOEPDS and TSO LISTDS D80WW.ES10V15.PROC
Try it with quotes around the data set name and try it without the quotes.
Step 7: ALLOC DA(‘userid.ES10.TSOEPS’) FI(ALLOCPS) TRACKS SPACE(2,1)
LRECL(80) RECFM(F,B) DSORG(PS)
Step 12: PROFILE PREFIX (TSO userid)
glos
Glossary
Synonym for: This indicates that the term has
the same meaning as a preferred term, which is
This glossary includes terms and definitions defined in its proper place in the glossary.
from:
Synonymous with: This is a backward
• The American National Standard Dictionary reference from a defined term to all other terms
for Information Systems, ANSI that have the same meaning.
X3.172-1990, copyright 1990 by the
American National Standards Institute See: This refers the reader to multiple-word
(ANSI). Copies can be purchased from the terms that have the same last word.
American National Standards Institute, 11 See also: This refers the reader to terms that
West 42nd Street, New York, New York have a related, but not synonymous, meaning.
10036. Definitions are identified by the
symbol (A) after the definition. Deprecated term for: This indicates that the
term should not be used. It refers to a preferred
• The ANSI/EIA Standard— 440-A, Fiber term, which is defined in its proper place in the
Optic Terminology. Copies can be glossary.
purchased from the Electronic Industries
Association, 2001 Pennsylvania Avenue, Numerics
N.W., Washington, DC 20006. Definitions
are identified by the symbol (E) after the
definition.
A
• The Information Technology Vocabulary,
developed by Subcommittee 1, Joint AC:
Technical Committee 1, of the International See Alternating Current.
Organization for Standardization and the Access:
International Electrotechnical Commission
1) To obtain computing services or data.
(ISO/IEC JTC1/SC1). Definitions of
2) In computer security, a specific type of
published parts of this vocabulary are
interaction between a subject and an object that
identified by the symbol (I) after the
results in flow of information from one to the
definition; definitions taken from draft
other.
international standards, committee drafts,
and working papers being developed by Access-any mode:
ISO/IEC JTC1/SC1 are identified by the One of the two access modes that can be set
symbol (T) after the definition, indicating for the storage system during initial
that final agreement has not yet been configuration. It enables all Fibre
reached among the participating National Channel-attached host systems with no defined
Bodies of SC1. access profile to access all logical volumes on
• The Network Working Group Request for the storage system. With a profile defined in
Comments: 1208. DS8000 Storage Management GUI for a
particular host, that host has access only to
The following cross-references are used in this volumes that are assigned to the WWPN for
glossary: that host. See also pseudo host and worldwide
Contrast with: This refers to a term that has an port name.
opposed or substantively different meaning.
AOS: ASIC:
See Assist On Site. See Application Specific Integrated Circuit.
APAR (Authorized Program Analysis Assigned storage:
Report): The space that is allocated to a volume and that
A request for correction of a problem caused by is assigned to a port.
a defect in a current release of a program
unaltered by the user. Assist On Site (AOS):
Application programming interface (API): The components of Assist On-site (AOS)
interact together to start and maintain a support
Is a set of routines, protocols, and tools for
session between the support engineer and the
building software applications. An API specifies
customer.
how software components should interact and
APIs are used when programming graphical
user interface (GUI) components.
request for primary or secondary space for data typically smaller and faster than the primary
sets that are eligible for the cylinder-managed memory or storage medium. In addition to
space. If not enough cylinder-managed space residing in cache memory, the same data also
is available, then the system uses the resides on the storage devices in the storage
track-managed space or will use both areas. system.
The breakpoint value is expressed in cylinders.
Cache miss:
When the size of a disk space request is less
An event that occurs when a read operation is
than the breakpoint value, the system prefers to
sent to the cluster, but the data is not found in
use the track-managed area. If not enough
cache. Contrast with cache hit.
space is available there, then the system will
use the cylinder-managed space, or will use Call home:
both areas. A communication link established between the
storage product and a service provider. The
BSM:
storage product can use this link to place a call
See Battery Service Module (BSM) set. to IBM or to another service provider when it
Business Class configuration: requires service. With access to the machine,
service personnel can process service tasks,
A high-density, high-performance storage
such as viewing error logs and problem logs or
configuration that includes standard disk
initiating trace and dump retrievals. See also
enclosures and high-performance flash heartbeat and Remote Technical Assistance
enclosures and is optimized and configured for Information Network (RETAIN).
cost, by minimizing the number of device
adapters and maximizing the number of storage Capacity Backup (CBU):
enclosures that are attached to each storage Provides the ability to replace model capacity or
system. specialty engines to a backup server in the
event of an unforeseen loss of server capacity
C because of an emergency.
Cache: Capacity Upgrade on Demand (CUoD):
Memory used to improve access times to Activates additional processors and memory
instructions, data, or both. Data that resides in units on selected servers by purchasing a
cache memory is normally a copy of data that permanent processor or memory unit activation
resides elsewhere in slower, less expensive feature. CUoD adds capacity for new
storage, such as on a disk or on another workloads, which enables the server to adapt to
network node. unexpected performance demands.
Cache fast write: Cascading:
A form of the fast-write operation in which the 1) Connecting network controllers to each other
storage server writes the data directly to cache, in a succession of levels to concentrate many
where it is available for later destaging. more lines than a single level permits.
Cache hit: 2) In high-availability cluster system
MultiProcessing (HACMP), pertaining to a
An event that occurs when a read operation is
system configuration in which the system node
sent to the cluster, and the requested data is
with the highest priority for a particular resource
found in cache. Contrast with cache miss.
acquires the resource if the primary node fails.
Cache memory: The cluster system node relinquishes the
Memory, typically volatile memory, that a resource to the primary node upon reintegration
storage server uses to improve access times to of the primary node into the system.
instructions or data. The cache memory is
Cataloged procedure:
Concurrent installation of licensed machine and synchronizes the operation of such devices
code: with the operation of the system as a whole.
Process of installing Licensed Internal Code on 2) For IBM Z, a storage server with FICON or
a DS8000 series while applications continue to OEMI interfaces. The control unit adapts a
run. native device interface to an I/O interface that
an IBM Z Systems host system supports.
Configure:
3) The portion of the storage system that
In storage, to define the logical and physical supports the attachment of emulated count key
devices, optional features, and program data devices over ESCON, FICON, or OEMI
products of the input/output subsystem through interfaces. See also cluster.
the user interface that the storage system
provides for this function. Control-unit image:
In mainframe computing, a logical subsystem
Configuration task commands:
that is accessed through an ESCON I/O
Used for creating, modifying, and deleting interface. One or more control-unit images exist
resources.
in each control unit. Each image appears as an
Consistency group: independent control unit, but all control-unit
A group of volumes participating in FlashCopy images share a common set of hardware
relationships in a logical subsystem, across facilities. The DS8000 series can emulate
logical subsystems, or across multiple storage 3990-3, TPF, 3990-6, or 2105 control units.
systems that must be kept in a consistent state
to ensure data integrity. Control-Unit-Initiated Reconfiguration
(CUIR):
Consistency group interval time:
A software mechanism that the DS8000 series
The value in seconds that indicates the length uses to request that an operating system of IBM
of time between the formation of consistency Z host verify that one or more subsystem
groups. resources can be taken offline for service. The
Consistent copy: DS8000 series can use this process to
A copy of a data entity (a logical volume, for automatically vary channel paths offline and
example) that contains the contents of the online to facilitate bay service or concurrent
entire data entity at a single instant in time. code installation. Depending on the operating
system, support for this process might be
Console: model-dependent, might depend on the IBM
A user interface to a server, for example, the Enterprise Storage Server Subsystem Device
interface provided on a personal computer. See Driver, or might not exist.
also Hardware Management Console.
Copy Services:
Control path: A collection of optional software features, with a
The route that is established from the master web-browser interface, that is used for
storage system to the subordinate storage configuring, managing, and monitoring
system when more than one storage system data-copy functions.
participates in a Global Mirror session. If there
is only one storage system (the master) in the Core:
Global Mirror session, no control path is See processor.
required. Count field:
Control unit: The first field of a Count Key Data (CKD)
1) A device that coordinates and controls the record. This 8-byte field contains a 4-byte track
operation of one or more input/output devices, address (CCHH). It defines the cylinder and
head that are associated with the track, and a
1-byte record number (R) that identifies the Allows you to define how z/OS is to manage
record on the track. It defines a 1-byte key coupling facility resources.
length that specifies the length of the record's
CP:
key field (0 means no key field). It defines a
See Central Processor.
2-byte data length that specifies the length of
the record's data field (0 means no data field). CP Assist for Cryptographic Function
Only the end-of-file record has a data length of (CPACF):
zero.
Is a set of cryptographic instructions providing
Count Key Data (CKD): improved performance.
In mainframe computing, a data-record format CPC:
employing self-defining record formats in which
See Central Processing Complex.
each record is represented by up to three fields:
a count field that identifies the record and CPU:
specifies its format, an optional key field that See Central Processing Unit.
identifies the data area contents, and an
CRC:
optional data field that typically contains the
See Cyclic Redundancy Check.
user data. For CKD records on the storage
system, the logical volume size is defined in Cross-cluster communication:
terms of the device emulation mode (3390 or DS8880 uses PCIe paths between the I/O
3380 track format). The count field is always 8 enclosures to provide the cross-cluster (XC)
bytes long and contains the lengths of the key communication between CPCs. This
and data fields, the key field has a length of 0 to configuration means that no separate path is
255 bytes, and the data field has a length of 0 between the XC communications and I/O traffic,
to 65 535 or the maximum that will fit on the which simplifies the topology. During normal
track. See also data record. operations, the XC communication traffic uses
Couple Data Set (CDS): a small portion of the overall available PCIe
bandwidth (less than 1.7%) so that the XC
Couple data sets provides a central shared
communication traffic has a negligible effect on
repository of data that needs to be visible to
I/O performance.
every system in the sysplex. The CDS and all
accesses to the data therein are managed by
XCF. Cross-System Coupling Facility (XCF):
Is a component of z/OS that manages
Coupling Facility (CF):
communications between applications in a
Is a piece of computer hardware which allows sysplex. Applications may be on the same
multiple processors to access the same data. A system or different systems.
Parallel Sysplex relies on one or more Coupling Systems communicate using messages
Facilities (CFs). transported by one of two mechanisms:
Coupling Facility Control Code (CFCC): Dedicated channel-to-channel links (CTC links)
and Structures in a Coupling Facility, only
Is an IBM licensed Internal Code that always
available in Parallel Sysplex, not in standard
runs under an LPAR, regardless of whether the
sysplex.
CF is in a standalone CPC or in a general
purpose CPC. Cross-System Extended Services (XES):
The process of eliminating gaps, empty fields, any, or all, attached host systems. To use this
redundancies, and unnecessary data to shorten capability, the host program must be designed
the length of records or blocks. to support data that it is sharing.
Data Facility Storage Management DC:
Subsystem data set services (DFSMSdss) See Direct Current.
utilities:
DFSMSdss is a component of DFSMS (Data DC-UPS (Direct Current-Uninterruptible
Facility Storage Management Subsystem). It is Power Supply:
used to move and replicate data, manage Converts incoming AC line voltage to rectified
storage space efficiently, backup and recover AC, and contains an integrated battery
data, and convert data sets and volumes. subsystem.
Data field: Decrypt:
The optional third field of a Count Key Data In Cryptographic Support, to convert ciphertext
(CKD) record. The count field specifies the into plaintext. See also encrypt.
length of the data field. The data field contains
Decryption:
data that the program writes.
In computer security, the process of
Data record: transforming encoded text or ciphertext into
The basic unit of IBM Z storage on a DS8000, plaintext. The process of decoding data that
also known as a Count Key Data (CKD) record. has been encrypted into a secret format.
Data records are stored on a track. The records Decryption requires a secret key or password.
are sequentially numbered starting with 0. The
DELETE command (In UNIX):
first record, R0, is typically called the track
descriptor record and contains data that the Use the DELETE command to delete one or
operating system normally uses to manage the more data set entries or one or more members
track. See also count-key-data and fixed-block of a partitioned data set.
architecture. Demote:
Data set FlashCopy: To remove a logical data unit from cache
For IBM Z hosts, a feature of FlashCopy that memory. A storage server demotes a data unit
indicates how many partial volume FlashCopy to create room for other logical data units in the
relationships are active on a volume. cache or because the logical data unit is not
valid. The storage system must destage logical
Data space / Hiperspace: data units with active write units before they can
A data space or hiperspace contains only user be demoted. See also destage.
data or user programs stored as data.
Dense Wavelength Division Multiplexing
Data Set Command Line Interface (DS CLI): (DWDM):
A software package that allows open systems Is a technology that puts data from different
hosts to invoke and manage Copy Services sources together on an optical fiber, with each
functions as well as to configure and manage signal carried at the same time on its own
all storage units in a storage complex. The DS separate light wavelength. Using DWDM, up to
CLI is a full-function command set. 80 (and theoretically more) separate
wavelengths or channels of data can be
Data sharing: multiplexed into a lightstream transmitted on a
The ability of multiple host systems to single optical fiber. Each channel carries a Time
concurrently utilize data that they store on one Division Multiplexed (TDM) signal. In a system
or more storage devices. The storage system with each channel carrying 2.5 Gbps (billion bits
enables configured storage to be accessible to per second), up to 200 billion bits can be
delivered a second by the optical fiber. DWDM
A collection of 4 disk drives that are connected See Domain Name System.
to the same pair of IBM Serial Storage adapters
Domain:
and can be used to create a RAID array. A disk
1) That part of a computer network in which the
group can be formatted as count key data or
data processing resources are under common
fixed block, and as RAID or non-RAID, or it can
control.
be left unformatted. A disk group is a logical
2) In TCP/IP, the naming system used in
assemblage of disk drives.
hierarchical networks.
Disk Operating System (DOS):
Domain Name System (DNS):
Is an operating system that runs from a hard In TCP/IP, the server program that supplies
disk drive. name-to-address translation by mapping
Disk scrubbing: domain names to Internet addresses. The
The DS8000 periodically reads all sectors on a address of a DNS server is the Internet address
disk. This reading is designed to occur without of the server that hosts the DNS software for
any interference with application performance. the network.
If Error Correction Code (ECC) detects DOS:
correctable bad bits, the bits are corrected
See Disk Operating system.
immediately. This ability reduces the possibility
of multiple bad bits accumulating in a sector Dotted decimal notation:
beyond the ability of ECC to correct them. If a A convention used to identify IP addresses. The
sector contains data that is beyond ECC's notation consists of four 8-bit numbers written
ability to correct, RAID is used to regenerate in base 10. For example, 9.113.76.250 is an IP
the data and write a new copy onto a spare address that contains the octets 9, 113, 76, and
sector of the drive. This scrubbing process 250.
applies to drives that are array members and
DRAM:
spares.
See Dynamic Random Access Memory.
Disk Storage Feature Activation (DSFA):
Drawer:
The Data Storage Feature Activation (DSFA)
application provides feature activation codes A unit that contains multiple drive modules and
and license keys to technically activate provides power, cooling, and related
functions acquired for IBM storage products. interconnection logic to make the drive modules
accessible to attached host systems.
Distributed Network Block Device (DNBD):
Drive:
Uses UDP as its transport protocol, and thus
supports multicasting, client-side caching, and A drive can be either a magnetic drive or a Solid
server redundancy. It only supports RO exports. State Drive (SSD).
A field replaceable unit that consists of a single
Distributed ledger technology (DLT): drive and its associated packaging.
Allow their users to store and access
DS CLI:
information relating to a given set of assets and
their holders in a shared database of either See Data Set Command Line Interface.
transactions or account balances. This DS Network Interface (DSNI):
information is distributed among users who See Enterprise Storage Server Network
could then use it to settle their transfers of, for Interface.
example, securities and cash, without needing
to rely on a trusted central validation system. DS8000 series:
See IBM DS8000.
DNS:
Duplex: E
1) Regarding Copy Services, the state of a
volume pair after Remote Mirror and Copy has EAM:
completed the copy operation and the volume See Extent Allocation Method.
pair is synchronized. EAV:
2) In general, pertaining to a communication See Extended Address Volume.
mode in which data can be sent and received at
the same time. Easy Tier:
Is a built-in dynamic data relocation feature that
Dynamic Address Translation (DAT): allows the host-transparent movement of data
When a virtual address is used by a CPU to among the storage system resources. This
access main storage, it is first converted by feature significantly improves configuration
Dynamic Address Translation (DAT) to a real flexibility and performance tuning and planning.
address and then by prefixing, to an absolute EC:
address. See Engineering Change.
Dynamic CHPID Management (DCM): ECC:
Provides the ability to have the system See Error Correction Code.
dynamically manage ESCON and FICON
Bridge (FICON converter, or FCV) connected to See Elliptic Curve Cryptography.
DASD subsystems, based on the current work ECKD:
load and its service goals.
See Extended Count Key Data.
Dynamic Partition Manager (DPM):
eDRAM:
Is a guided management interface in the HMC
See Embedded DRAM.
that can be used to define the IBM Z hardware
and virtual infrastructure, including integrated ElectroStatic Discharge (ESD):
dynamic I/O management that runs a KVM for An undesirable discharge of static electricity
IBM Z Systems environment. that can damage equipment and degrade
Dynamic Random Access Memory (DRAM): electrical circuitry.
A type of memory that is typically used for data Elliptic Curve Cryptography (ECC):
or program code that a computer processor Cryptographic capabilities that are designed to
needs to function. DRAM is a common type of provide public key support for constrained
Random Access Memory (RAM) used in digital environments.
Personal Computers (PCs), workstations and Embedded DRAM (eDRAM):
servers. Random access allows the PC Is Dynamic Random Access Memory (DRAM)
processor to access any part of the memory integrated on the same die or Multi-Chip
Module (MCM) of an Application-Specific This term refers to a volume with more than
Integrated Circuit (ASIC) or microprocessor. 65520 cylinders. Only 3390 Model A devices
eDRAM's cost-per-bit is higher when compared can be an EAV.
to equivalent standalone DRAM chips used as
Engineering change:
external memory, but the performance
An update to a machine, part, or program.
advantages of placing eDRAM onto the same
chip as the processor outweigh the cost Enterprise Service Bus (ESB):
disadvantages in many applications.
It implements a communication system
Emergency Power Off (EPO): between mutually interacting software
A means of turning off power during an applications in a service-oriented architecture
emergency, usually a switch. (SOA)
See Emergency Power Off. each LPAR with its own channel-subsystem
image.
ERDS:
See Error-Recording Data Set. EsconNet:
In the DS8000 Storage Management GUI, the
Error Correction Code (ECC):
label on a pseudo host icon that represents a
Checks read or transmitted data for errors and
host connection that uses the ESCON protocol
corrects them as soon as they are found. ECC
and that is not completely defined onDS8000
is similar to parity checking except that it
series. See also pseudo host and access-any
corrects errors immediately upon detection.
mode.
Error-Recording Data Set (ERDS):
ESD:
On IBM Z hosts, a data set that records
See ElectroStatic Discharge.
data-storage and data-retrieval errors. A
Service Information Message (SIM) provides ESE:
the error information for the ERDS. See Extent Space-Efficient.
Error recovery procedure: ESSNet:
Procedures designed to help isolate and, where See IBM Enterprise Storage Server Network.
possible, to recover from errors in equipment.
ESSNI:
The procedures are often used in conjunction
See Enterprise Storage Server Network
with programs that record information on
Interface.
machine malfunctions.
Evaluation Assurance Level (EAL):
SSB:
The Evaluation Assurance Level (EAL1 through
See Enterprise Service Bus. EAL7) of an IT product or system is a numerical
ESCD: grade assigned following the completion of a
See ESCON Director. Common Criteria security evaluation, an
international standard in effect since 1999. The
ESCON: increasing assurance levels reflect added
See Enterprise System Connection. assurance requirements that must be met to
ESCON channel: achieve Common Criteria certification. The
intent of the higher levels is to provide higher
An IBM Z channel that supports ESCON
confidence that the system's principal security
protocols.
features are reliably implemented. The EAL
ESCON Director (ESCD): level does not measure the security of the
An I/O interface switch that allows the system itself, it simply states at what level the
interconnection of multiple ESCON interfaces in system was tested.
a distributed-star topology. Extended Count Key Data (ECKD):
ESCON host systems: An extension of the Count Key Data (CKD)
IBM Z hosts that attach to the DS8000 series architecture.
with an ESCON adapter. Such host systems Extended Addressing Space (EAS):
run on operating systems that include z/OS,
On an extended address volume, this term
VSE, TPF, or versions of VM.
refers to cylinders with addresses that are
ESCON Multiple Image Facility (EMIF): equal to or greater than 65,536. These cylinder
For IBM Z, a function that enables LPARs to addresses are represented by 28-bit cylinder
share an ESCON channel path by providing numbers.
Extended Address Volume (EAV):
A volume with more than 65,520 cylinders. An in the storage system fails. See also cluster and
extended address volume increases the failback.
amount of addressable DASD storage per
volume beyond 65,520 cylinders by changing Fast File System (FFS):
how tracks on ECKD (Extended Count Key FFS invented cylinder groups, which break the
Data) volumes are addressed. disk up into smaller chunks, with each group
having its own inodes and data blocks.
Extent:
A continuous space on a disk that is occupied Fast write:
by or reserved for a particular data set, data A write operation at cache speed that does not
space, or file. The unit of increment is a track. require immediate transfer of data to a disk
See also multiple allegiance and parallel drive. The subsystem writes the data directly to
access volumes. cache, to nonvolatile storage, or to both. The
data is then available for destaging. A fast-write
Extent Allocation Method (EAM):
operation reduces the time an application must
Defines how volumes extents are allocated on
wait for the I/O operation to complete.
the ranks in the Extent Pool.
FBA:
Extent pool:
See Fixed-Block Architecture.
A group of extents. See also extent.
FC:
Extent Space-Efficient:
See feature code.
A thin-provisioning method in which capacity is
Note: FC is a common abbreviation for Fibre
allocated in a performance efficient manner on
Channel in the industry, but the DS8000
a per extent basis in pool or ESE repository if
customer documentation library reserves FC for
one is created on an as-needed basis.
feature code.
Extent Space Efficient (ESE) volumes:
FC:
Are the actual thin provisioned volumes that
See Fibre Channel.
can be used by host applications.The dynamic
allocation increments for ESE logical volumes FC-AL:
is based on the same existing 1 GB extents See Fibre Channel Arbitrated Loop.
used for standard volumes.
FCP:
F See Fibre Channel Protocol.
FCS:
Fabric:
See Fibre Channel standard.
In Fibre Channel technology, a routing
structure, such as a switch, receives addressed Feature Code (FC):
information and routes to the appropriate A code that identifies a particular orderable
destination. A fabric can consist of more than option and that is used by service personnel to
one switch. When multiple Fibre Channel process hardware and software orders.
switches are interconnected, they are said to be Individual optional features are each identified
cascaded. by a unique feature code.
Failback: Fibre Channel (FC):
Pertaining to a cluster recovery from failover A data-transmission architecture based on the
following repair. See also failover. ANSI Fibre Channel standard, which supports
full-duplex communication. DS8000 series
Failover:
supports data transmission over fiber-optic
Pertaining to the process of transferring all
cable through its Fibre Channel adapters. See
control to a single cluster when the other cluster
also Fibre Channel Protocol and Fibre Channel hosts that run LINUX on a Fibre Channel
standard. Protocol z/OS channel.
Fibre Channel Arbitrated Loop (FC-AL): FICON:
An implementation of the Fibre Channel See Fibre Channel CONnection.
Standard that uses a ring topology for the
FiconNet:
communication fabric. Refer to American
In the DS8000 Storage Management GUI, the
National Standards Institute (ANSI)
label on a pseudo host icon that represents a
X3T11/93-275. In this topology, two or more
host connection that uses the FICON protocol
Fibre Channel end points are interconnected
and that is not completely defined on DS8000
through a looped interface. This topology
series. See also pseudo host and access-any
directly connects the storage system to an open
mode.
systems host without going through a fabric
switch. Field Replaceable Unit (FRU):
Fibre Channel Connection (FICON): An assembly that is replaced in its entirety
when any one of its components fails. In some
A Fibre Channel communications protocol that
cases, a field replaceable unit might contain
is designed for IBM mainframe computers and
other field replaceable units.
peripherals. It connects the storage system to
one or more IBM Z hosts using a FICON z/OS File Transfer Protocol (FTP):
channel either directly or through a FICON In TCP/IP, an application protocol used to
switch. transfer files to and from host computers. See
Fibre Channel Protocol (FCP): also Transmission Control Protocol/Internet
Protocol.
A protocol used in Fibre Channel
communications with five layers that define how Firewall:
Fibre Channel ports interact through their A protection against unauthorized connection to
physical links to communicate with other ports. a computer or a data storage system. The
FCP (Fibre Channel Protocol) supports access protection is usually in the form of software on a
to Small Computer System Interface (SCSI) gateway server that grants access to users who
peripheral devices. meet authorization criteria.
Fibre Channel Standard (FCS): Fixed Block Architecture:
An ANSI standard for a computer peripheral An architecture for logical devices that specifies
interface. The I/O interface defines a protocol the format of and access mechanisms for the
for communication over a serial interface that logical data units on the device. The logical
configures attached units to a communication data unit is a block. All blocks on the device are
fabric. The protocol has two layers. The IP layer the same size (fixed size). The subsystem can
defines basic interconnection protocols. The access them independently.
upper layer supports one or more logical
protocols (for example, FCP for SCSI command
protocols and SBCON for IBM Z command Flag parameter:
protocols). Refer to American National An integer flag that indicates whether the match
Standards Institute (ANSI) X3.230-199x. needs to be performed on the supplied project
Fibre Channel Switched Fabric (FC-SF): name or number.
An implementation of the Fibre Channel Flash cards:
Standard that connects the storage system to Are high2-IOPS (Input/Output Operations Per
one or more open systems hosts through a Second) class enterprise storage devices that
fabric switch or connects one or more z/OS are targeted at Tier 0, I/O-intensive workload
applications that can use a high level of microcode takes this idea one step further. It
fast-access storage. might choose to allow the hot spare to remain
where it has been moved, but it can instead
FlashCopy:
choose to migrate the spare to a more optimum
FlashCopy is an IBM feature supported on
position. This will be done to better balance the
various IBM storage devices that made it
spares across the DA pairs, the loops, and the
possible to create, nearly instantaneously,
disk enclosures.
point-in-time snapshot copies of entire logical
volumes or data sets. The copies are FMID:
immediately available for both read and write See Function Modification Identifier.
access.
Frame:
FlashCopy relationship:
The hardware support structure, covers, and all
A mapping of a FlashCopy source volume and electrical parts mounted therein that are
a FlashCopy target volume that allows a packaged as one entity for shipping.
point-in-time copy of the source volume to be
copied to the target volume. FlashCopy FREE command (In UNIX):
relationships exist from the time that you initiate Use the FREE command to release (deallocate)
a FlashCopy operation until the storage system previously allocated data sets or Hierarchical
copies all data from the source volume to the File System (HFS) files that you no longer
target volume or until you delete the FlashCopy need. You can also use this command to
relationship, if it is persistent. change the output class of SYSOUT data sets
to delete attribute lists, and to change the data
FlashCopy SE:
set disposition specified with the ALLOCATE
An optional feature of DS8880 series that command. There is a maximum number of data
allocates storage space on an ‘as-needed’ sets that can be allocated to you at any one
basis and uses only the required number of time.
tracks to write changed data during the lifetime
of the FlashCopy relationship. FRU:
See Field Replaceable Unit.
Flash Raid Adapter:
An adapter that manages external I/O FSP:
interfaces that use Fibre Channel protocols for See Flexible Service Processor.
host-system attachment. It is also used for FTP:
replicating data between storage systems.
See File Transfer Protocol.
Flexible Service Processor (FSP):
Full duplex:
Firmware that provides diagnostics,
See duplex.
initialization, configuration, run-time error
detection, and correction. FSP is what connects Full Disk Encryption (FDE):
the managed system to the Hardware Is the encryption of all data on a disk drive,
Management Console (HMC). including the program that encrypts the
bootable operating system partition. It is
Floating spare:
performed by disk encryption software or
When a DDM fails and the data it contained is
hardware that is installed on the drive during
rebuilt onto a spare, then when the disk is
manufacturing or from an additional software
replaced, the replacement disk becomes the
driver. FDE converts all device data into a form
spare. The data is not migrated to another
that can be only understood by the one who
DDM, such as the DDM in the original position
has the key to decrypt the encrypted data. An
the failed DDM occupied. The DS8000
authentication key is used to reverse
conversion and render the data readable. FDE A base-10 unit of measurement equal to
prevents unauthorized drive and data access. 1,000,000,000 bytes (10^9). A decimal gigabyte
(GB) is used as a measure of capacity. A binary
Fully provisioned:
gigabyte (or gibibyte [GiB]) is used as a
The volume capacity is entirely allocated at the
measure of memory.
time the volume is created. In this case, the
host to which the fully provisioned volume is Gibibyte (GiB):
attached owns the full capacity, therefore A base-2 unit of measurement equal to
consuming unused storage in the back-end 1,073,741,824 bytes (2^30).
system. Note: A GiB is used as a measure of memory
and is also known as a binary gigabyte.
Function Modification Identifier (FMID):
Gigapack:
An identifier that is used to identify a separate
Connects to the drive adapter (in DS8000)
product or function of a product.
through Fibre Channel protocol and converts to
Fuzzy copy: SAS protocol through the control card switch in
A function of the Global Copy feature wherein the RAID adapter.
modifications to the primary logical volume are
Global Copy:
performed on the secondary logical volume at a
An optional capability of the DS8000 remote
later time. The original order of update is not
mirror and copy feature that maintains a fuzzy
strictly maintained. See also Global Copy.
copy of a logical volume on the same DS8000
G storage system or on another DS8000 storage
system. In other words, all modifications that
GB: any attached host performs on the primary
See gigabyte. logical volume are also performed on the
secondary logical volume at a later point in
GiB: time. The original order of update is not strictly
See gibibyte. maintained. See also Remote Mirror and Copy
GDPS: and Metro Mirror.
See Geographically Dispersed Parallel Global Mirror:
Sysplex. An optional capability of the remote mirror and
Geographically Dispersed Parallel Sysplex copy feature that provides a 2-site extended
(GDPS): distance remote copy. Data that is written by
the host to the storage system at the local site
Is a multi-site or single-site end to end
is automatically maintained at the remote site.
application availability solution that provides the
See also Metro Mirror and Remote Mirror and
capability to manage remote copy configuration
Copy.
and storage subsystems (including IBM
TotalStorage Enterprise Storage Server) to Global Network Block Device (GNBD):
automate Parallel Sysplex operation tasks and Is the basis for GFS (the Global file system).
perform failure recovery from a single point of
Global Resource Serialization (GRS):
control. GDPS helps automate recovery
procedures for planned and unplanned outages Is the component within the IBM z/OS operating
to provide near-continuous availability and system responsible for enabling fair access to
disaster recovery capability. serially reusable computing resources, such as
datasets and tape drives or virtual resources,
Gigabyte (GB):
such as lists, queues, and control blocks.
Group:
The HyperSwap technology enables the host to The brand name used to identify storage
transparently switch an application's I/O products from IBM, including DS8000 series.
operations to the secondary Metro Mirror See also DS8000 and DS Storage Manager.
volumes, provided physical connectivity exists
IBM DS8000:
between the host and the secondary storage
A member of the IBM Resiliency Family of
subsystem. This affords the ability to provide
storage servers and attached storage devices
continuous operations from a single site or from
(drive modules). The DS8000 series storage
multiple locations within metro distances. By
product delivers high-performance,
implementing HyperSwap, disk failures and
fault-tolerant storage and management of
maintenance functions can be endured without
enterprise data, affording access through
incurring any interruption to the application
multiple concurrent operating systems and
service.
communication protocols. High performance is
Hypertext Transfer Protocol (HTTP): provided by multiple symmetrical
Is an application protocol for distributed, multiprocessors, integrated caching, RAID
collaborative, and hypermedia information support for the drive modules, and disk access
systems. HTTP is the foundation of data through a high-speed serial storage
communication for the World Wide Web. architecture interface.
Hypervisor: IBM DS8880 Series (DS8884, DS8886,
Is a piece of computer software, firmware, or DS8888):
hardware that creates and runs virtual New IBM DS8880 family of data systems
machines. A computer on which a hypervisor architected and built for the cognitive business.
runs one or more virtual machines is called a IBM DS8884: Business class system. Enables
host machine, and each virtual machine is organizations to overcome storage challenges
with advanced, easy-to-use operations and
called a guest machine. The hypervisor
24x7 availability for running critical workloads,
presents the guest operating systems with a
either as a dedicated platform for consolidated
virtual operating platform and manages the systems or for multiple platforms. Delivered
execution of the guest operating systems. within an affordable, flexible, and space-saving
package. Up to 256 GB cache, 64 x 16 GB
I Fibre Channel/FICON ports and up to 768
HDD/SSD drives, plus 120 flash cards.
IaaS: IBM DS8886: Enterprise class system. Helps
See Infrastructure as a Service. accelerate mission-critical applications, backed
by 24x7 availability, and superior functionality,
IBF:
all provided in an easily scalable package. Up
See Internal Battery Feature. to 2 TB total system memory, 128 x 16 GB
Fibre Channel/FICON ports and up to 1,536
IBM i: HDD/SSD drives, plus 240 flash cards.
The IBM licensed program that is the integrated IBM DS8888: Enterprise class system. Delivers
operating system for Power Systems servers. It mission-critical performance and lower latency
integrates such functions as relational for applications with up to 4.5 times better
database, security, web services, networking, performance through an all-flash configuration.
and storage management capabilities. The Up to 2 TB total system memory, 128 x 16 GB
predecessor to IBM i was i5/OS, which was Fibre Channel/FICON ports and up to 480 flash
preceded by Operating System/400 (OS/400). cards.
IBM DS Storage Manager (DS8000 Storage workstation called the IBM TotalStorage ESS
Management GUI): Master Console, supplied with the first ESS
Software with a web-browser interface for delivery.
configuring DS8000 series. IBM Z:
IBM MQ: The IBM family of products, which emphasizes
near-zero downtime and includes System z10
IBM MQ is a family of network software
and System z10s.
products that IBM launched for the first time as
an IBM product in December 1993. It was ICKDSF (Device Support Facility):
originally called MQSeries, and was renamed The z/OS ICKDSF utility performs functions
WebSphere MQ in 2002 to join the suite of needed for the installation, use, and
WebSphere products. In April 2014, it was maintenance of IBM direct-access storage
renamed IBM MQ. The products that are devices (DASD). Also used to perform service
included in the MQ family are IBM MQ, IBM MQ functions, error detection, and media
Advanced, IBM MQ Appliance, and IBM MQ for maintenance. The ICKDSF utility is used
z/OS. primarily to initialize disk volumes. At a
IBM Multipath Subsystem Device Driver minimum, this process involves creating the
(SDD): disk label record and the volume table of
contents (VTOC). ICKDSF also can scan a
IBM software that provides multipath volume to ensure that it is usable, can reformat
configuration support for a host system that is all the tracks, can write home addresses, as
attached to storage devices. SDD provides well as other functions.
enhanced data availability, dynamic
input/output load balancing across multiple ICF:
paths, and automatic path failover protection. See Internal Coupling Facility.
IBM POWER8 Processor: ICON:
POWER8 is a family of superscalar symmetric A picture representing something that exists on
multiprocessors based on the Power the computer.
Architecture.
Systems based on POWER8 became available IEBCOMPR:
from IBM in June 2014. IEBCOMPR is a z/OS data set utility that is
IBM Resiliency Family: used to compare two sequential data sets, two
A set of hardware and software features and partitioned data sets, or two Partitioned Data
products, as well as integrated software and Sets Extended (PDSE) at the logical record
services that are available on the DS8000 level to verify a backup copy.
series and the IBM TotalStorage Enterprise IEBCOPY:
Storage Server, Models 750 and 800.
IEBCOPY is a z/OS data set utility that is used
IBM Spectrum Control: to copy or merge members between one or
An interface that allows administrators to more partitioned data sets, or Partitioned Data
configure, manage, and monitor the Sets Extended (PDSE), in full or in part.
performance of SAN storage devices from a
IEBDG:
single console.
IEBDG is a z/OS data set utility that is used to
IBM Enterprise Storage Server Network
provide a pattern of test data to be used as a
(ESSNet)
programming debugging aid.
A private network providing web browser
access to the Enterprise Storage Server. IBM IEBGENER:
installs the ESSNet software on an IBM
The IEBGENER utility is a z/OS copy program IFHSTATR is a system utility that formats and
that is part of the operating system. It is used to prints information from Type 21 SMF (system
copy a sequential data set, a member of a management facilities) records. These records
Partitioned Data Set (PDS), or PDSE. provide error statistics by volume (ESV) data.
IEBIMAGE: image:
IEBIMAGE is a z/OS data set utility that creates See storage image.
and maintains specific printer type modules and
IML:
stores them in a library.
See Initial Microcode Load.
IEBPTPCH:
Information Management System (IMS):
IEBPTPCH is used to print or punch all, or
Is a database and transaction management
selected portions of a sequential data set or
system.
PDSE.
Information Management System
IEBUPTE:
transaction manager (IMS TM):
IEBUPTE is used to create or modify sequential
Is a message-based transaction processor.
or partitioned data sets, or PDSE.
Information Technology (IT):
IEFBR14:
IEFBR14 is a dummy program, normally Is the use of computers to store, retrieve,
inserted in JCL when the only desired action is transmit, and manipulate data, or information,
allocation or deletion of data sets. often in the context of a business or other
enterprise.
IEHINITT:
EHINITT is a z/OS system utility used to place Integrated Coupling Facility (ICF):
standard volume label sets onto any number of These processors run only Licensed Internal
magnetic tapes mounted on one or more tape Code. They are not visible to normal operating
units. systems or applications. A coupling facility is, in
IEHLIST: effect, a large memory scratch pad used by
multiple systems to coordinate work. ICFs must
IEHLIST is a z/OS system utility used to list
be assigned to LPARs that then become
entries in the directory of one or more
coupling facilities.
partitioned data sets or PDSEs, or entries in an
indexed or non-indexed volume table of Infrastructure as a Service (IaaS):
contents. Any number of listings can be Is a form of cloud computing that provides
requested in a single execution of the program. virtualized computing resources over the
IEHMOVE: Internet. IaaS is one of three main categories of
cloud computing services, alongside Software
IEHMOVE is a z/OS system utility used to move
as a Service (SaaS) and Platform as a Service
or copy logical collections of operating system
(PaaS).
data.
Initial Microcode Load (IML):
IEHPROGM:
The action of loading microcode for a computer
IEHPROGM is a z/OS system utility that is used
into that computer's storage.
to modify system control data and to maintain
data sets at an organizational level. Initial Program Load (IPL):
The action of loading software into a computer,
IFL:
typically an operating system that controls the
See Integrated Facility for Linux. computer.
IFHSTATR: Initiator:
A SCSI device that communicates with and Are procedures whose JCL statements are
controls one or more targets. Contrast with placed within the job executing them. The
target. beginning of an in-stream procedure must be
marked by a PROC statement, its ending by a
Inode:
PEND statement. In-stream procedures must
An inode is a data structure on a filesystem on
be defined before they can be used, meaning
Linux and other UNIX-like operating systems
the procedure definition must precede its
that stores all the information about a file except
invocation.
its name and its actual data. A data structure is
a way of storing data so that it can be used Integrated Facility for Linux (IFL):
efficiently. This is a normal processor with one or two
Input/Output (I/O): instructions disabled that are used only by
Pertaining to (a) input, output, or both or (b) a z/OS. Linux does not use these instructions and
device, process, or channel involved in data can be executed by an IFL. Linux can be
input, data output, or both. executed by a CP as well. The difference is that
an IFL is not counted when specifying the
I/O Adapter: model number of the system. This can make a
A generic term for an electronic circuit, substantial difference in software costs.
expansion card, or plug-in module that accepts
Intelligent Resource Director:
input and generates output in a particular
format. The ‘adapter’ part of the term means Intelligent Resource Director (IRD) is software
that a conversion of the data format and that automates the management of CPU
electronic timing takes place between the resources and certain I/O resources.
input/output streams and the internal computer
Intelligent Write Caching (IWC):
circuits.
Improves performance through better write
Input/Output Configuration Data Set cache management and a better destaging of
(IOCDS): order of writes.
A configuration definition built by the I/O
Interactive mode:
Configuration Program (IOCP) and stored on
The interactive command mode provides a
disk files associated with the processor
history function that makes repeating or
controller.
checking prior command usage easy to do. Log
Input/Output Definition File (IODF): on to the DS CLI application at the directory
Created by HCD (Hardware Configuration where it is installed, and begin using the DS CLI
Definition) and contains information about the commands and parameters.
I/O configuration, such as: Operating system
Interactive System Productivity Facility
data, Switch data, Device data, including EDT
(ISPF):
definition, Processor data, Partition data,
Is a software product for the z/OS operating
Channel path data, Control unit data, and
system that runs on IBM mainframes. ISPF
Channel subsystem data.
primarily provides an IBM 3270 terminal
I/O enclosure: interface with a set of panels. Each panel may
The I/O enclosures hold the adapters and include menus and dialogs to run tools on the
provide connectivity between the adapters and underlying Time Sharing Option (TSO). ISPF is
the processors. Both device adapters and host frequently used to manipulate z/OS data sets
adapters are installed in the I/O enclosure. from its Program Development Facility named
ISPF/PDF, where PDF refers to Program
In-stream procedure:
Development Facility.
1) For processor storage, real, and virtual Is an open source API, daemon, and
storage, and channel volume, 210 or 1024 management tool for managing platform
bytes. virtualization. It can be used to manage KVM,
2) For disk storage capacity and Xen, VMware ESX, QEMU, and other
communications volume, 1000 bytes. virtualization technologies. These APIs are
widely used in the orchestration layer of
Korn shell:
hypervisors in the development of a
Interactive command interpreter and a
cloud-based solution.
command programming language.
LIC:
L See License Internal Code.
Defines a standard method to access and Use the LISTDS command to have the
update information in a directory. attributes of specific data sets displayed at your
terminal. The LISTDS command works
Light-Emitting Diode (LED):
differently for VSAM than for non-VSAM data
A semiconductor chip that displays visible or
sets. A VSAM data set causes the LISTDS
infrared light when activated.
command to display only the data set
Link address: organization, which is VSAM. Use the LISTCAT
On an ESCON interface, the portion of a source command to obtain more information about a
or destination address in a frame that ESCON VSAM data set.
uses to route a frame through an ESCON Local Area Network (LAN):
director. ESCON associates the link address
A computer network located on a user's
with a specific switch port that is on the ESCON
premises within a limited geographic area.
director. Equivalently, it associates the link
address with the channel subsystem or control Log Structured File System (LFS):
unit link-level functions that are attached to the LFS is a file system in which data and metadata
switch port. are written sequentially to a circular buffer,
called a log.
Link-level facility:
The ESCON hardware and logical functions of Logical Block Address (LBA):
a control unit or channel subsystem that allow The address assigned by DS8000 series to a
communication over an ESCON write interface sector of a disk.
and an ESCON read interface.
Logical Control Unit (LCU):
Linux: An LCU is equivalent to a Logical SubSystem
Is system software that manages computer (LSS). Like an LSS, an LCU can have a
hardware and software resources and provides maximum of 256 logical devices or volumes.
common services for computer programs.
Logical device:
LinuxONE: The facilities of a storage server (such as
Built on IBM Z technology and designed for DS8000 series) associated with the processing
Linux-only environments. The LinuxONE of I/O operations directed to a single
Emperor, which is built on the IBM z13 host-accessible emulated I/O device. The
mainframe and its z13 CPU, and its little associated storage is referred to as a logical
brother, Rockhopper, which uses the older z12 volume. The logical device is mapped to one or
processor. more host-addressable units, such as a device
on IBM Z I/O interface or a logical unit on a
LISTALC command (In UNIX):
SCSI I/O interface, such that the host initiating
Use the LISTALC command to obtain a list of
I/O operations to the I/O-addressable unit
the currently allocated data sets. LISTALC
interacts with the storage on the associated
without operands displays a list of all currently
logical device.
allocated data set names.
Lightweight Directory Access Protocol
LISTCAT command (In UNIX):
(LPAP):
Use the LISTCAT command to list entries from
Is a protocol, which makes directory information
a catalog. The entries listed can be selected by
available.
name or entry type, and the fields to be listed
for each entry can additionally be selected. Logical Partition (LPAR):
For IBM Z, a set of functions that create the
LISTDS command (In UNIX):
programming environment in which more than
one Logical PARtition (LPAR) is established on
Multi-Chip Module (MCM: Each job gets just the amount of memory it
needs. That is, the partitioning of memory
Is an electronic assembly (such as a package
changes as jobs enter and leave. MVT is a
with a number of conductor terminals or "pins")
more efficient user of resources.
where multiple integrated circuits,
semiconductor dies and/or other discrete Multiprogramming variable number of tasks
components are integrated, usually onto a (MVT):
unifying substrate, so that in use it is treated as Is a feature of large computers that allows more
if it were a single component. efficient operation by having multiple programs
Multicylinder Unit (MCU): (tasks) present and operating in the mainframe
This term refers to a fixed unit of disk space that computer simultaneously.
is larger than a cylinder. Currently, on an EAV, a Multiple Virtual Systems (MVS):
multicylinder unit is 21 cylinders and the
Was the most commonly used operating
number of the first cylinder in each multicylinder
system on the System/370 and System/390
unit is a multiple of 21.
IBM mainframe computers.
Multipath Subsystem Device Driver:
See IBM DS8000 Multipath Subsystem Device
Driver. N
Multi-link Aggregation (MLAG):
Enables arrangement of aggregated groups on Name server:
two separate switchboards of the A server that stores names of the participating
MLAG-domain. DS8000 clusters.
and runs shell scripts and C-language systems are those hosts that connect to
programs interactively (in the foreground), in DS8000 series through SCSI or FCP protocols.
the background, or in batch. See also small computer system interface and
Fibre Channel Protocol.
OnLine Transaction Processing (OLTP): Open System Adapter (OSA):
A class of information systems that facilitate Is the only LAN (Local Area Network)
and manage transaction-oriented applications, attachment to the IBM Systems.
typically for data entry and retrieval transaction
Open vSwitch (OVS):
processing. OLTP has also been used to refer
Open vSwitch is a production quality, multilayer
to processing in which the system responds
virtual switch licensed under the open source
immediately to user requests.
Apache 2.0 license. It is designed to enable
OpenFlow: massive network automation through
Is a protocol that allows a server to tell network programmatic extension, while still supporting
switches where to send packets. In a standard management interfaces and
protocols.
conventional network, each switch has
proprietary software that tells it what to do. With Operating System (OS):
OpenFlow, the packet-moving decisions are Is system software that manages computer
centralized, so that the network can be hardware and software resources and provides
programmed independently of the individual common services for computer programs.
switches and data center gear.
Open Systems / 390: (OS/390):
OpenStack:
Is an IBM operating system for the System/390
Is a set of software tools for building and IBM mainframe computers.
managing cloud computing platforms for public
and private clouds. Backed by some of the
biggest companies in software development
and hosting, as well as thousands of individual
P
community members, many think that PaaS:
OpenStack is the future of cloud computing.
See Platform As A Service.
Open source software:
PAM:
Open source refers to a program or software in
See Pluggable Authentication Module.
which the source code (the form of the program
when a programmer writes a program in a Panel:
particular programming language) is available The formatted display of information that
to the general public for use and/or modification appears on a display screen.
from its original design free of charge. Open
Parallel Access Volume (PAV):
source code is typically created as a
collaborative effort in which programmers A licensed function of DS8000 series that
improve upon the code and share the changes enables z/OS systems to issue concurrent I/O
within the community. requests against a count key data logical
volume by associating multiple devices of a
Open system: single control-unit image with a single logical
A system whose characteristics comply with device. Up to eight device addresses can be
standards made available throughout the assigned to a PAV. The PAV function enables
industry and that therefore can be connected to two or more concurrent write operations to the
other systems complying with the same same logical volume, as long as the write
standards. Applied to DS8000 series, such operations are not to the same extents.
Parallel Sysplex License Charge (PSLC): See Partitioned Data Set Extended.
Charges for Parallel Sysplex licenses. PDU:
Parity: See Protocol Data Unit.
A data checking scheme used in a computer PDU:
system to ensure the integrity of the data. The
See Power Distribution Unit.
RAID implementation uses parity to re-create
data if a disk drive fails. Peripheral Component Interconnect (PCI):
An architecture for a system bus and
Partitioned Data Set (PDS):
associated protocols that supports attachments
Is a data set containing multiple members, each
of adapter cards to a system backplane.
of which holds a separate sub-data set, similar
to a directory in other types of file systems. Peripheral Component Interconnect
Express (PCIe or PCIe):
Partitioned Data Set Extended (PDSE):
Is a serial expansion bus standard for
Is a data set type that is managed by DFSMS.
connecting a computer to one or more
Externally, a PDSE is very similar to a PDS.
peripheral devices. PCIe provides lower latency
Internally, the PDSE has a different directory
and higher data transfer rates than parallel
structure, member format, and record format. A
busses such as PCI and PCI-X. Every device
PDSE is indistinguishable from a PDS through
that's connected to a motherboard with a PCIe
most interfaces used to access a PDS directory
link has its own dedicated point-to-point
or member. All ISPF functions support the
connection. This means that devices are not
PDSE.
competing for bandwidth because they are not
Path group: sharing the same bus.
In IBM Z architecture, a set of channel paths Peer-to-Peer Remote Copy (PPRC):
that are defined to a control unit as being
Is a protocol to replicate a storage volume to
associated with a single Logical PARtition
another control unit in a remote site.
(LPAR). The channel paths are in a group state
Synchronous PPRC causes each write to the
and are online to the host. See also logical
primary volume to be performed to the
partition.
secondary as well, and the I/O is only
PAV: considered complete when update to both
See Parallel Access Volumes. primary and secondary have completed.
Asynchronous PPRC will flag tracks on the
PCHID:
primary to be duplicated to the secondary when
See Physical Channel Path Identifier. time permits.
PCI: Performance Groups:
See Peripheral Component Interconnect. Are used to assign a numerical value to a
PCIe: performance policy.
See Peripheral Component Interconnect Peripheral:
Express. Is defined as any auxiliary device such as a
PDF: tape drive, disk drive, mouse, or keyboard that
See Program Development Facility. connects to and works with the computer in
some way.
PDS:
Persistent FlashCopy:
See Partitioned Data Set.
A state where a FlashCopy relationship
PDSE: remains indefinitely until the user deletes it. The
relationship between the source and target Pluggable Authentication Module (PAM):
volumes is maintained after a background copy A mechanism to integrate multiple low-level
completes. authentication schemes into a high-level API. It
PFI: allows programs that rely on authentication to
be written independently of the underlying
See Predictive Failure Analysis.
authentication scheme.
Physical Channel Path Identifier (PCHID):
Point-to-point connection:
Specifies a physical channel identifier related to A Fibre Channel topology that enables the
their physical location.
direct interconnection of ports. See also
Physical path: arbitrated loop and switched fabric.
A single path through the I/O interconnection Port:
fabric that attaches two units. For Copy A physical connection on a host adapter to the
Services, this is the path from a host adapter on cable that connects the DS8000 storage
one DS8000 storage system (through cabling system to hosts, switches, or another DS8000
and switches) to a host adapter on another storage system. DS8000 series uses SCSI and
DS8000 storage system. ESCON host adapters that have two ports per
Pinned data: adapter, and Fibre Channel host adapters that
Data that is held in cache until either an error have one port. See also ESCON, Fibre
condition is corrected and it can be moved to Channel, host adapter, and small computer
disk storage or until the data is discarded by a system interface.
host command. Pinned data conditions can Portable Operating System Interface
only occur on an ESS Model 800 during (POSIX):
fast-write or dual-copy functions. POSIX is a set of standard operating system
PKI: interfaces based on the UNIX operating
See Public Key Infrastructure. system.
database; and it is also available for Microsoft The program which provides the sequential
Windows and Linux. scheduling of jobs and basic operating systems
functions.
Power Distribution Unit (PDU):
A type of electrical component that distributes Primary control unit:
and manages electricity supply to computers, The DS8000 storage system to which a
servers, and networking devices within a data Remote Mirror and Copy primary device is
center environment. It provides a central unit to physically attached.
control and distribute electricity across the data
Primary Power Supply (PPS):
center components. Power distribution units are
also known as Main Distribution Units (MDUs). A wide range power supply that converts AC
input voltage into DC voltage.
Power Supply Unit (PSU):
PRINTDS command (In UNIX):
Converts mains AC to low-voltage regulated
DC power for the internal components of a Use the PRINTDS command to format and print
computer. data sets on any printer defined to the Job
Entry Subsystem (JES).
PPS:
Processor:
See Primary Power Supply.
The key component of a computing device that
Predictive Failure Analysis (PFA): contains the circuitry necessary to interpret and
Can anticipate certain forms of failures by execute electrical signals fed into the device. Its
keeping internal statistics of read and write basic job is to receive input and provide the
errors. If the error rates exceed predetermined appropriate output. Also referred to as CPU or
threshold values, the drive is nominated for core.
replacement. Because the drive has not yet
Processor complex:
failed, data can be copied directly to a spare
drive. This copy ability avoids the use of RAID The set of hardware that defines a mainframe,
recovery to reconstruct all of the data onto the which includes the central processing units,
spare drive. memory, channels, controllers, and power
supplies included in the box. Also known as
Preventive Service Planning (PSP): ‘Central Electronics Complex (CEC)’.
Is formation, which contains the latest
Processor node:
information that is applicable to machine’s
hardware and software. PSP information A partition of a storage server that is capable of
should be reviewed before all system installs, performing all defined functions of the storage
hardware, and software updates. PSP server. Multiple processor complexes provide
information is provided by the IBM software redundancy.
support center to use when installing a licensed Processor Resource System Manager
program, cumulative PTF packages, or (PR/SM):
hardware. It can also be used to order
Is a type-1 Hypervisor (a virtual machine
preventive service planning information and
monitor) that allows multiple logical partitions to
review the recommended High Impact
share physical resources such as CPUs, I/O
PERvasive (HIPER) fixes periodically or to
channels and direct access storage devices
order the HIPER PTF group. The HIPER PTF
(DASD). It is integrated with all IBM Z
group is updated every other week.
mainframes.
Primary control program (PCP):
Processor Unit (PU):
All of the processors in the CPC begin as
equivalent processor units (PUs) or engines
that have not been characterized for use. Each A unit of data specified in the protocol of a given
processor is characterized by IBM during layer and consisting of protocol control
installation or at a later time. information for the layer and, possibly, user
data for the layer.
The potential characterizations are:
PR/SM:
• Central Processor (CP)
• System Assistance Processor (SAP) See Processor Resource System Manager.
• Integrated Facility for Linux (IFL)
Pseudo host:
• z Application Assist Processor (zAAP)
A host connection that is not explicitly defined
• The System z9 Integrated Information
to the DS8000 storage system and that has
Processor (zIIP)
access to at least one volume that is configured
• Integrated Coupling Facility (ICF)
on the DS8000 storage system. The FiconNet
• Spare: An uncharacterized PU functions as
pseudo host icon represents the FICON
a spare. If the system controllers detect a
protocol. The EsconNet pseudo host icon
failing CP or SAP, it can be replaced with a
represents the ESCON protocol. The pseudo
spare PU. In most cases this can be done
host icon labeled Anonymous represents hosts
without any system interruption, even for
connected through the FCP protocol.
the application running on the failing
Anonymous host is a commonly used synonym
processor.
for pseudo host. DS8000 series adds a pseudo
PROFILE command (In UNIX): host icon only when it is set to access-any
The PROFILE command establishes, changes, mode. See also access-any mode.
or lists your user profile. The information in your
PSP:
profile tells the system how you want to use
See Preventive Service Planning.
your terminal.
PSU:
Program:
See Power Supply Unit.
On a computer, a generic term for software that
controls the operation of the computer. PTF:
Typically, the program is a logical assemblage See Program Temporary Fix.
of software modules that perform multiple
Public Key Infrastructure (PKI):
related tasks.
Supports the distribution and identification of
Program Development Facility (PDF): public encryption keys, enabling users and
Provides a panel-driven menu interface and a computers to both securely exchange data over
number of services through which users can networks such as the Internet and verify the
work with source code and data stored on a identity of the other party.
host.
PV Links:
Program Temporary Fix (PTF): Short for Physical Volume Links, an alternate
A temporary solution to, or bypass of, a pathing solution from Hewlett-Packard that
problem diagnosed by IBM as the result of a provides for multiple paths to a volume, as well
defect in a current unaltered release of a as static load balancing.
licensed program.
Promote:
Q
To add a logical data unit to cache memory. qcow2 (QEMU Copy On Write):
Protocol Data Unit (PDU): Is a file format for disk image files used by
QEMU, a hosted virtual machine monitor. It
uses a disk storage optimization strategy that
type of memory found in computers and other Is a design feature found in certain computers'
devices, such as printers. main random access memory. RAIM utilizes
additional memory modules and striping
Rank:
algorithms to protect against the failure of any
One or more arrays that are combined to create
particular module and keep the memory system
a logically contiguous storage space.
operating continuously.
RAS:
Relative Record Data Set (RRDS):
See Reliability, Availability, and Serviceability.
Has fixed-length slots, predefined to VSAM, in
Reboot: which records can be stored. An RRDS record
Booting is starting a computer's operating is always fixed length, equal to the slot size. A
system, so rebooting is to start it for a second or record that is in an RRDS is identified by the
third time. Rebooting is usually necessary after Relative Record Number (RRN) of the slot that
a computer crashes, meaning it stops working holds it. When a new record is added to an
because of a malfunction. Rebooting allows the RRDS, VSAM uses the number that you supply
computer to restart and get back to working with the file control request.
normally. After a crash, the computer is useless
Reliability, Availability, and Serviceability
until it is rebooted.
(RAS):
Recovery Point Objective (RPO): Is a computer hardware engineering term
The maximum targeted period in which data involving reliability engineering, high availability,
might be lost from an IT service due to a major and serviceability design. Computers designed
incident. with higher levels of RAS have many features
Recovery Time Objective (RTO): that protect data integrity and help them stay
The targeted duration of time and a service available for long periods of time without failure,
level within which a business process must be this data integrity and uptime is a particular
restored after a disaster (or disruption) in order selling point for mainframes and fault-tolerant
to avoid unacceptable consequences systems.
associated with a break in business continuity. Remote I/O loop (RIO loop):
RECEIVE command (In UNIX): I/O subsystems are connected to the processor
The RECEIVE command is used by the subsystem through Remote I/O cable loops.
addressee of a file transmission to retrieve The cable loops are connected to ports that are
transmitted files and to restore them to their available from the rear of the processor
original format. subsystem. The RIO cables are connected in
loops so that the system has two paths to each
Reduced Instruction Set Computer (RISC):
I/O subsystem.There are two typical RIO loops:
Is one whose instruction set architecture (ISA) 1) one port of a hub connected to the input port
allows it to have fewer cycles per instruction of an I/O drawer, and the output port of this I/O
(CPI) than a complex instruction set computer. drawer connected to the companion port of the
Redundant Array of Independent Disks same hub; 2) one port of a hub connected to
(RAID): the input port of an I/O drawer, the output port
A methodology of grouping disk drives for of this I/O drawer connected to the input port of
managing disk storage to insulate data from a another I/O drawer, and the output port of the
failing disk drive. other I/O drawer connected to the companion
port of the same hub.
Redundant Array of Independent Memory
(RAIM): Remote Mirror and Copy:
A feature of a storage server that constantly Define a collection of resources and associate
updates a secondary copy of a logical volume a set of policies relative to how the resources
to match changes made to a primary logical are configured and managed.
volume. The primary and secondary volumes
RESTful API:
can be on the same storage server or on
Is an application programming interface (API)
separate storage servers. See also Global
that uses HTTP requests to GET, PUT, POST,
Mirror, Metro Mirror, and Global Copy.
and DELETE data.
Remote Procedure Call (RPC):
Restructured Extended Executor (REXX):
In distributed computing, a remote procedure
REXX is an interpreted programming language
call (RPC) is when a computer program causes
developed at IBM. It is a structured, high-level
a procedure (subroutine) to execute in a
programming language designed for ease of
different address space (commonly on another
learning and reading. Proprietary and open
computer on a shared network), which is coded
source REXX interpreters exist for a wide range
as if it were a normal (local) procedure call,
of computing platforms; compilers exist for IBM
without the programmer explicitly coding the
mainframe computers.
details for the remote interaction.
Revolutions Per Minute (RPM):
Reporting task commands:
Used for creating reports. Used to help determine the access time on
computer hard drives. RPM is a measurement
Resource Access Control Facility (RACF): of how many revolutions a computer's hard
A security system that provides access control drive makes in a single minute. The higher the
and auditing functionality for the z/OS and z/VM RPM, the faster the data will be accessed.
operating systems.
RIO loop:
Resource Management Facility (RMF): See Remote I/O loop.
IBM's strategic product for z/OS performance
RISC:
measurement and management. It is the base
product to collect performance data for z/OS See Reduced Instruction Set Computer.
and sysplex environments to monitor systems' R0:
performance behavior and provides the ability
See track-descriptor record.
to optimally tune and configure the system
according to business needs. Rotate extents:
REST API: Distributes the extents of each volume
A REST API defines a set of functions which successfully across all ranks in a pool to
developers can perform requests and receive achieve a well balanced capacity based
responses using HTTP protocol such as GET distribution of the workload. See Storage Pool
and POST. Because REST API’s use HTTP, Striping.
they can be used by practically any Rotate volume:
programming language and easy to test (it’s a Reduces the configuration effort compared to
requirement of a REST API that the client and single rank extent pools by easily distributing a
server are independent of each other allowing set of volumes to different ranks in a specific
either to be coded in any language and extent pool for workloads where the use of host
improved upon supporting longevity and based stripping methods is still present.
evolution).
RPC:
Resource Group:
See Rack Power Control cards or Remote
Procedure Call.
minimal region of the disk upon which data can a single view of time to Processor
be read or written at one time. Resource/Systems Manager (PR/SM).
SEND command (In UNIX): Service clearance:
Use the SEND command to send messages to The area that is required to open the service
other users. To receive the messages, the covers and to pull out components for servicing.
recipient's profile setting must include
Service Information Message (SIM):
INTERCOM.
A message sent by a storage server to service
Sequential access: personnel through an IBM Z operating system.
A mode of accessing data on a medium in a
Service personnel:
manner that requires the storage device to
A generalization referring to individuals or
access consecutive storage locations on the
companies authorized to service the DS8880.
medium.
The terms service provider, service
Sequential Adaptive Replacement Cache representative, and IBM service representative
(SARC): refer to types of service personnel. See also
Is a caching algorithm that allows you to run System Services Representative.
different workloads, such as sequential and
Service provider interface (SPI):
random workloads, without negatively affecting
each other. The set of public interfaces and abstract
classes that a service defines. The SPI defines
Sequential Data Set: the classes and methods available to your
In a sequential data set, records are data items application.
that are stored consecutively.
SES:
Serial Attached SCSI (SAS): SCSI Enclosure Services.
Full-duplex. Uses the native SCSI command
Session:
set, which has more functionality. A SAS drive
uses SCSI error checking and reporting. This A collection of volumes within a logical
allows your storage system to collect richer subsystem that are managed together during
information from the drive if errors are occurring the creation of consistent copies of data. All
(such as a failing or marginal disk). SAS drives volumes in a session must transfer their data
are dual ported, which is vital in dual controller successfully to the remote site before the
enclosures. increment can be called complete.
designed to handle the effects of concurrent An operating system from IBM. OS/VS2 R1
access. was known as SVS (Single Virtual Storage) as
it had a single 16 MB virtual address space.
Shortwave cable:
Takes advantage of virtual memory.
Shortwave laser uses a wavelength of
approximately 850 nm. Typically used for Small Computer System Interface (SCSI):
medium and longer distance connections (up to A standard hardware interface that enables a
500m). variety of peripheral devices to communicate
with one another.
SIM:
See Service Information Message. Smart relay host:
A mail relay or mail gateway that has the
Simple Network Management Protocol
capability to correct email addressing problems.
(SNMP):
In the Internet suite of protocols, a network Small Form Factor (SFF):
management protocol that is used to monitor 2.5-inch hard disk drives (HDDs). The
routers and attached networks. SNMP is an measurement represent the approximate
application layer protocol. Information on diameter of the platter within the drive
devices managed is defined and stored in the enclosures.
application's Management Information Base
SMF:
(MIB). See also management information base.
See System Management Facility.
Simultaneous Multithreading (SMT):
Is a technique for improving the overall SMP:
efficiency of superscalar CPUs with hardware See Symmetrical MultiProcessor.
multithreading. SMT permits multiple SMT:
independent threads of execution to better
See Simultaneous Multithreading.
utilize the resources provided by modern
processor architectures. SNMP:
See Simple Network Management Protocol.
Single-Byte Command Code Sets
Connection (SBCON): SNMP agent:
The ANSI standard for the ESCON I/O A server process that resides on a network
interface. node and is responsible for communicating with
managers regarding that node. The node is
Single Point Of Failure (SPOF):
represented as a managed object, which has
A potential risk posed by a flaw in the design,
various fields or variables that are defined in the
implementation, or configuration of a circuit or
appropriate MIB.
system in which one fault or malfunction causes
an entire system to stop operating. SNMP manager:
Single-shot mode: A managing system that runs a managing
application or suite of applications. These
Use the DS CLI single-shot command mode if
applications depend on Management
your want to issue an occasional command but
Information Base (MIB) objects for information
do not want to keep a history of the commands
that resides on the managed system. Managers
that you have issued. When typing the
generate requests for this MIB information, and
command, you can use the host name or the IP
an SNMP agent on the managed system
address of the DS HMC. Wait for the command
responds to these requests. A request can
to process and display the end results.
either be the retrieval or modification of MIB
Single Virtual Storage (SVS): information.
p5, eServer pSeries, eServer OpenPower, and are typically I/O devices. A SCSI target is
RS/6000. analogous to an IBM Z control unit. See also
small computer system interface.
System Services Representative (SSR):
Responsible for performing basic technical Target device:
services for IBM customers including some or One of the devices in a dual-copy or
all of the following: element exchange, minor remote-copy volume pair that contains a
repair, depot or bench maintenance, equipment duplicate of the data that is on the source
refurbish, installation, relocation, device. Unlike the source device, the target
discontinuance, upgrade and modification, and device might only accept a limited subset of
so on. Services are typically performed in a data. See also source device.
high volume environment with access to
TB:
exchangeable units and parts requiring
See terabyte.
minimum, if any, problem determination activity.
Services may be directed by a service call TCO:
management process or be performed as part See Total Cost of Ownership.
of a team.
TCP/IP:
System Storage Productivity Center (SSPC): See Transmission Control Protocol/Internet
IBM System Storage Productivity Center is an Protocol.
integrated offering that provides a consolidated
focal point for managing IBM storage products Telemetry:
as well as managing mixed-vendor storage OpenStack Telemetry provides user-level
environments. SSPC provides enhancements usage data for OpenStack-based clouds. The
to daily storage administration by making data can be used for customer billing, system
available a broad set of configuration functions. monitoring, or alerts. Telemetry can collect data
System Storage Productivity Center’s
from notifications sent by existing OpenStack
user-friendly interface provides utilities to
components such as Compute usage events, or
configure storage devices, and enhancements
that offer a wide range of management by polling OpenStack infrastructure resources
capabilities. such as libvirt. Telemetry includes a storage
daemon that communicates with authenticated
System x: agents through a trusted messaging system to
The IBM family of products, which emphasizes collect and aggregate data. Additionally, the
industry-standard server scalability and service uses a plug-in system that you can use
self-managing server technologies. It includes to add new monitors. You can deploy the API
System x3nnn, eServer xSeries, and AMD Server, central agent, data store service, and
processor-based eServer servers. collector agent on different hosts.
Systems Network Architecture (SNA): Terabyte (TB):
SNA is IBM's proprietary networking 1) Nominally, 1 000 000 000 000 bytes, which is
architecture. It is a complete protocol stack for accurate when speaking of bandwidth and disk
interconnecting computers and their resources. storage capacity.
2) For DS8000 cache memory, processor
T storage, real and virtual storage, a terabyte
Target: refers to 240 or 1 099 511 627 776 bytes.
A SCSI device that acts as a subordinate to an Total Cost of Ownership (TCO):
initiator and consists of a set of one or more
logical units, each with an assigned Logical Unit
Number (LUN). The logical units on the target
Is a financial estimate intended to help buyers The name of the suite of products comprising
and owners determine the direct and indirect the Tivoli Storage Productivity Center.
costs of a product or system.
TPF:
Tracks: See Transaction Processing Facility.
Are concentric circles around the disk. The
Track:
operating system and disk drive keep track of
A unit of storage on a CKD device that can be
where information is stored on the disk by
formatted to contain a number of data records.
noting the range of track and sector numbers.
See also home address, track-descriptor
Transport Control Word (TCW): record, and data record.
A TCW combines the functions of the Prefix
Track address:
CCW and the Read or Write CCW into a single
entity that further reduces channel overhead. This term refers to a 32-bit number that
Used by z High Performance FICON (zHPF) identifies each track within a volume. It is in the
channel programs. format hexadecimal CCCCcccH, where CCCC
is the low order 16 bits of the cylinder number,
Time Sharing Option (TSO):
ccc is the high order 12 bits of the cylinder
An operating system option that provides number, and H is the four-bit track number. For
interactive time sharing from remote terminals. compatibility with older programs, the ccc
Thin provisioning: portion is hexadecimal 000 for tracks in the
A mechanism that provides the ability to define base addressing space.
logical volume sizes that are larger than the Track managed space:
physical capacity installed on the system. The This term refers to the space on a volume that
volume allocates capacity on an as-needed is managed in tracks and cylinders.
basis as a result of host-write actions. Track-managed space ends at cylinder address
Tivoli Key Lifecycle Manager (TKLM): 65519. Each data set occupies an integral
JAVA software program that manages keys multiple of tracks. Track-managed space also
enterprise wide and provides encryption enable exists on all non-EAVs.
tape drives with keys for encryption and Track Space Efficient (TSE) volumes:
decryption. Are used as target volumes of a FlashCopy
Tivoli Productivity Center for Replication Space Efficient operation and require the
(TPC-R): definition of a repository from which tracks are
Provides support for Metro Mirror and Global gradually allocated.
Mirror configurations as well as three-site Transaction Processing Facility (TPF):
recovery management, supporting IBM System A high-availability, high-performance IBM
Storage DS8000 Metro Global Mirror and Metro operating system, designed to support
Global Mirror with HyperSwap. It is designed to real-time, transaction-driven applications. The
support fast failover and failback, fast specialized architecture of TPF is intended to
reestablishment of three-site mirroring, data optimize system efficiency, reliability, and
currency at the remote site with minimal lag responsiveness for data communication and
behind the local site, and quick database processing. TPF provides real-time
re-synchronization of mirrored sites using inquiry and updates to a large, centralized
incremental changes only. database, where message length is relatively
TKLM: short in both directions, and response time is
See Tivoli Key Lifecycle Manager. typically less than three seconds. Formerly
known as the Airline Control
Tivoli Storage Productivity Center (TPC):
Program/Transaction Processing Facility Each data set profile defined using RACF
(ACP/TPF). requires a universal access authority (UACC).
The UACC is the default access authority that
Transmission Control Protocol (TCP):
RACF gives to users and groups that are not
A communications protocol used in the Internet
defined in the profile's access list. If one of
and in any network that follows the Internet
these users or groups requests access to a
Engineering Task Force (IETF) standards for
data set that is protected by the profile, RACF
internetwork protocol. TCP provides a reliable
grants or denies the request based on the
host-to-host protocol between hosts in
UACC.
packet-switched communications networks and
in interconnected systems of such networks. It Unit address:
uses the Internet Protocol (IP) as the underlying For IBM Z, the address associated with a
protocol. device on a given control unit. On ESCON
interfaces, the unit address is the same as the
Transmission Control Protocol/Internet
device address. On OEMI interfaces, the unit
Protocol (TCP/IP):
address specifies a control unit and device pair
1) A combination of data-transmission protocols
on the interface.
that provide end-to-end connections between
applications over interconnected networks of Unit Control Block (UCB):
different types. z/OS control block used to define channel
2) A suite of transport and application protocols attached devices.
that run over the Internet Protocol. See also UNIX System Services (USS):
Internet Protocol and Transmission Control
UNIX System Services (USS) is a required,
Protocol.
included component of z/OS. USS is a certified
TRANSMIT command (In UNIX): UNIX operating system implementation
Use the TRANSMIT command to send optimized for mainframe architecture.
messages, data sets, or both, to another user. Upper-layer protocol:
The TRANSMIT command converts this data
The layer of the Internet Protocol (IP) that
into a special format so that it can be
supports one or more logical protocols (for
transmitted to other users in the network.
example, a SCSI-command protocol and an
Transparency: ESA/390 command protocol). Refer to ANSI
See software transparency. X3.230-199x.
Trusted Key Entry (TKE):
A feature that is a means for ensuring secure V
creation and management of key material and
for managing the crypto adapters on the host. virsh:
TSE: Is a command line interface tool for managing
See Track Space Efficient. guests and the hypervisor.
The act of creating a virtual (rather than actual) Virtual Private Network (VPN):
version of something, including virtual computer is a network that is constructed using public
hardware platforms, operating systems, storage wires, usually the Internet, to connect to a
devices, and computer network resources. private network, such as a company's internal
Virtual machine facility: network.
A virtual data processing machine that appears Vital Product Data (VPD):
to the user to be for the exclusive use of that Information that uniquely defines the system,
user, but whose functions are accomplished by hardware, software, and microcode elements of
sharing the resources of a shared data a processing system.
processing system. An alternate name for the
Virtual Storage Access Method (VSAM):
VM/370 IBM operating system.
VSAM is a file storage access method used in
Virtual Local Access Network (VLAN): z/OS operating systems. It is a high
Is any broadcast domain that is partitioned and performance access method used to organize
isolated in a computer network at the data link data in form of files in Mainframes.
layer. VLANs work by applying tags to network
Virtual Telecommunications Access Method
packets and handling these tags in networking
(VTAM):
systems - creating the appearance and
functionality of network traffic that is physically VTAM is the IBM subsystem that implements
on a single network but acts as if it is split Systems Network Architecture (SNA) for
between separate networks. In this way, VLANs mainframe environments. VTAM provides an
can keep network applications separate despite application programming interface (API) for
being connected to the same physical network, communication applications, and controls
and without requiring multiple sets of cabling communication equipment such as adapters
and networking devices to be deployed. and controllers.
For IBM Z, the information recorded on a single WebSM (Web-based System Manager):
unit of recording medium. Indirectly, it can refer Is a client/server application that gives the user
to the unit of recording medium itself. On a non a powerful interface to manage UNIX systems.
removable-medium storage device, the term Web-based System Manager uses its graphical
can also indirectly refer to the storage device interface to enable the user to access and
associated with the volume. When multiple manage multiple remote machines.
volumes are stored on a single storage medium Weight distribution area:
transparently to the program, the volumes can The area that is required to distribute the weight
be referred to as logical volumes. of the storage system.
Volume group: Workload Manager (WLM):
A collection of either physical or logical Is a base component of the z/OS mainframe
volumes. operating system. It controls the access to
Volume Table Of Contents (VTOC): system resources for the work executing on
A table on a Direct Access Storage Device z/OS based on administrator-defined goals.
(DASD) volume that describes the location, Worldwide Node Name (WWNN):
size, and other characteristics of each data set
A unique 64-bit identifier for a host that contains
on the volume.
a Fibre Channel port. See also worldwide port
VPD: name.
See Vital Product Data.
Worldwide port name (WWPN):
VSE/ESA: A unique 64-bit identifier associated with a
An IBM operating system, the letters of which Fibre Channel adapter port. It is assigned in an
represent virtual storage extended/enterprise implementation- and protocol-independent
systems architecture. manner. See also worldwide node name.
VSAM: WWNN:
See Virtual Storage Access Method. See Worldwide Node Name.
VTAM: WWPN:
See Virtual Telecommunications Access See Worldwide Port Name.
Method.
X
W
XCF:
Warm demotion:
See Cross-System Coupling Facility.
An operation of IBM Easy Tier automatic mode.
The movement of an extent of moderately Xen:
active data to a lower tier when its tier has Xen Project is a hypervisor using a micro kernel
exceeded its optimal bandwidth capacity. design, providing services that allow multiple
computer operating systems to execute on the
Wavelength-Division Multiplexing (WDM):
same computer hardware concurrently.
Is a method of combining multiple signals on
laser beams at various Infrared (IR) XES:
wavelengths for transmission along fiber optic
See Cross-System Extended Services.
media. Each laser is modulated by an
independent set of signals. Extensible Markup Language (XML):
Wavelength-sensitive filters, the IR analog of
visible-light color filters, are used at the
receiving end.
Is a markup language that defines a set of rules zKVM (KVM for IBM Z):
for encoding documents in a format that is both A virtualization infrastructure for the Linux
human-readable and machine-readable. kernel that turns it into a hypervisor. It simplifies
configuration and operation of server
Y virtualization, leverages common Linux
administration skills to administer virtualization,
Z supports flexibility and agility leveraging the
z Application Assist Processor (zAAP): open source community, and provides an Open
Source virtualization choice.
This is a processor with a number of functions
disabled (interrupt handling, some instructions) Zoning:
such that no full operating system can be In Fibre Channel environments, the grouping of
executed on the processor. However, z/OS can multiple ports to form a virtual, private, storage
detect the presence of zAAP processors and network. Ports that are members of a zone can
will use them to execute Javacode. The same communicate with each other, but are isolated
Java code can be executed on a standard CP. from ports in other zones.
Again, zAAP engines are not counted when zSeries File System (ZFS):
specifying the model number of the system.
zFS is a z/OS UNIX file system that can be
Like IFLs, they exist only to control software
used like the Hierarchical File System (HFS).
costs.Note: zAAPs are not supported on IBM
zFS file systems contain files and directories,
z13, z13s, and the z14 mainframes.
including Access Control Lists (ACLs), that can
zDAC: be accessed with the z/OS HFS application
programming interfaces (APIs).
See z/OS Discovery and Auto Configuration.
z/OS:
Integrated Information Processor (zIIP):
An operating system for the IBM Z family of
Is a specialized engine for processing eligible products.
database workloads. The zIIP is designed to
help lower software costs for select workloads z/OS Discovery and Auto Configuration
on the mainframe, such as business (zDAC):
intelligence (BI), enterprise resource planning Designed to automatically run several I/O
(ERP) and customer relationship management configuration definition tasks for new and
(CRM). The zIIP reinforces the mainframe's changed disk and tape controllers that are
role as the data hub of the enterprise by helping connected to a switch or director, when
to make direct access to DB2® more cost attached to a FICON channel.
effective and reducing the need for multiple
z/OS Global Mirror:
copies of the data.
Remote mirror and copy feature for IBM Z
zHPF: environments. A function of a storage server
See High Performance FICON for IBM Z. that assists a control program to maintain a
consistent copy of a logical volume on another
zHPF:
storage system. All modifications of the primary
See High Performance FICON for IBM Z. logical volume by any attached host are
presented in order to a single host. The host
IBM Z Hypervisor Performance Manager
then makes these modifications on the
(zHPM):
secondary logical volume. This function was
Monitors virtual machines running on KVM to
formerly called Extended Remote Copy or
achieve goal-oriented policy based
XRC.
performance goals.
backpg