SlideShare a Scribd company logo
1 of 4
System-Z Dataset Naming Standards

   Business data comes in many forms. It is found in program libraries, databases,
extracts from databases, files created from manipulating database data, unloads, backups,
access logs, stored procedures, and so on. Controlling access to business data seems
daunting, if not impossible. If we remember all business data (except printed reports)
exists as datasets on some form of electronic media, the task becomes manageable, even
relatively easy. The key is a good dataset naming standard.

   A proper dataset naming standard has these features.

    The HLQ is unique, not only to the application but also to the data’s purpose
     within that application.
    It describes the owning application and indicates the usage of the data.
    It indicates whether the data is production or test.
    The second qualifier describes the dataset uniquely.
    The third qualifier describes the type of data on the dataset. In other words, is it a
     database, an unload, a log, or some other dataset?

   There are two exceptions to these rules. The first exception is DB2, which has its own
naming standard. However, DB2’s standard is easily amenable to the general rules. The
second exception is the existence of “working copies” of databases, i.e. a copy of the
database for problem investigation, utility testing, and other purposes.

                   Database versus Non-database Business Data

    In almost all cases, database datasets already have a form of naming standard.
Whether this is a DD-name based standard (IMS) or a table space standard (DB2), there
are certain rules inherent in the DBMS. Non-database datasets, however, have no such
limits and may carry any name the IT person can think of. Non-database datasets come
in two forms: “control” datasets (procedures, parameters, and programs) and “data”
datasets (everything else). Because batch jobs create “data” datasets specific to the job, it
makes sense to use the creating batch job name as the dataset’s unique descriptor (i.e. the
second qualifier). For “control” datasets, the second qualifier may be anything describing
the library’s purpose as long as it is unique within the high-level qualifier.

                  A Note on Other Mainframe Naming Standards

   There are many IBM mainframes, running a variety of operating systems. One
example is the VM LINUX virtual machines. Of course, naming standards and even file
storage are different for each of these operating systems. Because Linux and other
variations of UNIX work on a file system with both directories and files, it is not critical
to name the owner in the file name. The owner can be determined from the directory
and/or disk where the file is located, thus the file name can be more descriptive of its
contents.
An “Ideal” Dataset Naming Standard for zOS

 HLQ:
  o Code a “P” for production, anything else for test.
  o Code the chargeback code for the owning application. This typically ranges
      from two to four characters.
  o Code IMS for IMS databases and related datasets, VSM for VSAM databases
      and related datasets, and DB2 for DB2 databases. Related datasets include
      backups, unloads, and copies. Applications may use any other character set
      for non-database datasets.
 The second qualifier is the DD name of the database dataset.
 The third qualifier is a data type indicator, UNLOAD, or COPYx (where “x”
  describes the use of the copy, e.g. library or vault).
 Working copies of databases must have a “fourth” qualifier to show the date of
  the copy. This qualifier is a “J” followed by the Julian date of the backup.

                                  Examples

The examples here assume a two-character chargeback code.

o Production Amalgamated Assurance claims database (HDAM):
   PAAIMS.DDCLM01D.OSAM                    OSAM dataset, first partition
   PAAIMS.DDCLM01D.J2007153.OSAM working copy of the database
   PAAIMS.DDCLM01D.UNLOAD                  unload dataset
   PAAIMS.DDCLM01D.COPYL                   backup of database, library copy
   PAAIMS.DDCLM01D.COPYV                   backup of database, vaulted tape
o Production Amalgamated Assurance billing code database (HIDAM):
   PAAIMS.DDBILCDD.OSAM          database DSN, data dataset
   PAAIMS.DDBILCDD.KSDS          database DSN, index dataset
   PAAIMS.DDBILCDD.UNLOAD unload dataset for CLAIM first partition
   PAAIMS.DDBILCDD.COPYL backup of database, library copy
   PAAIMS.DDBILCDD.COPYV backup of database, vaulted tape
o Test Amalgamated Assurance claims database (HDAM):
   TAAIMS.DDCLM01D.OSAM          database, OSAM dataset, first partition
   TAAIMS.DDCLM01D.UNLOAD unload dataset for CLAIM first partition
   TAAIMS.DDCLM01D.COPYL backup of database, library copy
   TAAIMS.DDCLM01D.COPYV backup of database, vaulted tape
o Test Amalgamated Assurance futures database (DB2):
       TAADB2.DSNDBC.TS00001A.I0001.A001
o Other Amalgamated Assurance production datasets:
       PAAPARM.BATCH.PARMLIB
       PAAPGM.GENERAL.LOADLIB
       PAACLM.<jobname>.CLMRPT.G0012V00
       PAACLM.<jobname>.CLMBAD.G0001V00
You may note the “other” production dataset names are self-explanatory, or nearly so.
Advantages and Disadvantages

   There are enormous advantages to the naming standard spelled out above.

   A. Clarity. The dataset name instantly identifies who owns it, what is in the dataset,
      and what type of data it is.
   B. Chargeback is easy because the chargeback control information is always in the
      same place.
   C. Security. Whether you have RACF, Top Secret, ACF2, or another security
      package, the HLQ of the dataset is the owner of the protection rules. Placing the
      application’s unique chargeback information in the HLQ leaves no doubt who
      owns the security responsibility for the data. It also drastically reduces the
      overhead and number of RACF objects needed to protect business data.
   D. Automation. Automation tools can construct dataset names using a few simple
      rules. The tools do not need to keep or search for extra data. That reduces CPU
      cycles and reduces the storage required to maintain a list of backups.
   E. Storage. This standard makes it very easy to code ACS routines, both for sending
      datasets to various pools and for excluding datasets from pools. It reduces CPU
      and simplifies ACS routines. Further, dataset allocation is faster with fewer
      dataset screening criteria.

    There is really only one disadvantage to this naming standard: it is an ideal. Starting
out with this ideal, or a similar naming standard, is something to try for. However, while
it is possible to change a legacy system’s dataset names, going from a very simple
naming standard to this standard can be a complicated process.

   A. Many job changes. DSNs must change wherever they occur. Using a global find/
      change utility simplifies the task, but it is still no small undertaking.
   B. In IMS regions, we must change dynamic allocation members. There are
      automated tools to do this.
   C. Many new GDG bases. However, we can easily automate creating the new GDG
      bases. A relatively simple REXX exec would generate the GDGs, RACF profiles,
      and new vaulting lists very rapidly given a list of chargeback codes plus the
      member list of the DBDLIB and a list of the DD names of VSAM databases.
   D. Coordination. It is important to verify, before changing names, what applications
      (OS as well as business applications) are affected. Converting one application at
      a time lessens this disadvantage.

   While there are technical difficulties, none of them is impossible to surmount. By far
the hardest task is convincing the application to make the change. It is easier to do so if
the application already has a good standard; in fact, if their standard follows the general
guidelines set out on the first page, there may be no need to change at all.

More Related Content

What's hot

Mass Storage Structure
Mass Storage StructureMass Storage Structure
Mass Storage StructureVimalanathan D
 
Hadoop Distributed File System(HDFS) : Behind the scenes
Hadoop Distributed File System(HDFS) : Behind the scenesHadoop Distributed File System(HDFS) : Behind the scenes
Hadoop Distributed File System(HDFS) : Behind the scenesNitin Khattar
 
Snapshot in Hadoop Distributed File System
Snapshot in Hadoop Distributed File SystemSnapshot in Hadoop Distributed File System
Snapshot in Hadoop Distributed File SystemBhavesh Padharia
 
Vsam interview questions and answers.
Vsam interview questions and answers.Vsam interview questions and answers.
Vsam interview questions and answers.Sweta Singh
 
Hadoop HDFS NameNode HA
Hadoop HDFS NameNode HAHadoop HDFS NameNode HA
Hadoop HDFS NameNode HAHanborq Inc.
 
11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMSkoolkampus
 
Ch 17 disk storage, basic files structure, and hashing
Ch 17 disk storage, basic files structure, and hashingCh 17 disk storage, basic files structure, and hashing
Ch 17 disk storage, basic files structure, and hashingZainab Almugbel
 
Mass storagestructure pre-final-formatting
Mass storagestructure pre-final-formattingMass storagestructure pre-final-formatting
Mass storagestructure pre-final-formattingmarangburu42
 
tempdb and Performance Keys
tempdb and Performance Keystempdb and Performance Keys
tempdb and Performance KeysNaji El Kotob
 
DBMS Unit IV and V Material
DBMS Unit IV and V MaterialDBMS Unit IV and V Material
DBMS Unit IV and V MaterialArthyR3
 
Storage Area Networks Unit 2 Notes
Storage Area Networks Unit 2 NotesStorage Area Networks Unit 2 Notes
Storage Area Networks Unit 2 NotesSudarshan Dhondaley
 

What's hot (20)

Ch10
Ch10Ch10
Ch10
 
Mass Storage Structure
Mass Storage StructureMass Storage Structure
Mass Storage Structure
 
Hadoop Distributed File System(HDFS) : Behind the scenes
Hadoop Distributed File System(HDFS) : Behind the scenesHadoop Distributed File System(HDFS) : Behind the scenes
Hadoop Distributed File System(HDFS) : Behind the scenes
 
File organisation
File organisationFile organisation
File organisation
 
Snapshot in Hadoop Distributed File System
Snapshot in Hadoop Distributed File SystemSnapshot in Hadoop Distributed File System
Snapshot in Hadoop Distributed File System
 
Vsam interview questions and answers.
Vsam interview questions and answers.Vsam interview questions and answers.
Vsam interview questions and answers.
 
Hadoop HDFS NameNode HA
Hadoop HDFS NameNode HAHadoop HDFS NameNode HA
Hadoop HDFS NameNode HA
 
11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS
 
Ch 17 disk storage, basic files structure, and hashing
Ch 17 disk storage, basic files structure, and hashingCh 17 disk storage, basic files structure, and hashing
Ch 17 disk storage, basic files structure, and hashing
 
Operation System
Operation SystemOperation System
Operation System
 
Mass storagestructure pre-final-formatting
Mass storagestructure pre-final-formattingMass storagestructure pre-final-formatting
Mass storagestructure pre-final-formatting
 
Hadoop introduction
Hadoop introductionHadoop introduction
Hadoop introduction
 
Os
OsOs
Os
 
Chapter13
Chapter13Chapter13
Chapter13
 
tempdb and Performance Keys
tempdb and Performance Keystempdb and Performance Keys
tempdb and Performance Keys
 
Hadoop and HDFS
Hadoop and HDFSHadoop and HDFS
Hadoop and HDFS
 
Pandi
PandiPandi
Pandi
 
DBMS Unit IV and V Material
DBMS Unit IV and V MaterialDBMS Unit IV and V Material
DBMS Unit IV and V Material
 
HDF5 Life cycle of data
HDF5 Life cycle of dataHDF5 Life cycle of data
HDF5 Life cycle of data
 
Storage Area Networks Unit 2 Notes
Storage Area Networks Unit 2 NotesStorage Area Networks Unit 2 Notes
Storage Area Networks Unit 2 Notes
 

Viewers also liked

Advanced REXX Programming Techniques
Advanced REXX Programming TechniquesAdvanced REXX Programming Techniques
Advanced REXX Programming TechniquesDan O'Dea
 
TSO Productivity
TSO ProductivityTSO Productivity
TSO ProductivityDan O'Dea
 
White Paper, The Basics Of Data Security
White Paper, The Basics Of Data SecurityWhite Paper, The Basics Of Data Security
White Paper, The Basics Of Data SecurityDan O'Dea
 
Some ISPF Tricks
Some ISPF TricksSome ISPF Tricks
Some ISPF TricksDan O'Dea
 
Basic IMS For Applications
Basic IMS For ApplicationsBasic IMS For Applications
Basic IMS For ApplicationsDan O'Dea
 

Viewers also liked (7)

Advanced REXX Programming Techniques
Advanced REXX Programming TechniquesAdvanced REXX Programming Techniques
Advanced REXX Programming Techniques
 
TSO Productivity
TSO ProductivityTSO Productivity
TSO Productivity
 
White Paper, The Basics Of Data Security
White Paper, The Basics Of Data SecurityWhite Paper, The Basics Of Data Security
White Paper, The Basics Of Data Security
 
Some ISPF Tricks
Some ISPF TricksSome ISPF Tricks
Some ISPF Tricks
 
Basic IMS For Applications
Basic IMS For ApplicationsBasic IMS For Applications
Basic IMS For Applications
 
IMSDB - DBRC
IMSDB - DBRCIMSDB - DBRC
IMSDB - DBRC
 
UVP, Mine
UVP, MineUVP, Mine
UVP, Mine
 

Similar to White Paper, System Z Dataset Naming Standards

Database systems - Chapter 1
Database systems - Chapter 1Database systems - Chapter 1
Database systems - Chapter 1shahab3
 
Database Performance Management in Cloud
Database Performance Management in CloudDatabase Performance Management in Cloud
Database Performance Management in CloudDr. Amarjeet Singh
 
Towards secure and dependable storage
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storageKhaja Moiz Uddin
 
databasesystemsconollyslide1-151102101031-lva1-app6892.pptx
databasesystemsconollyslide1-151102101031-lva1-app6892.pptxdatabasesystemsconollyslide1-151102101031-lva1-app6892.pptx
databasesystemsconollyslide1-151102101031-lva1-app6892.pptxsalutiontechnology
 
Database-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptxDatabase-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptxDhruveeHalvadiya
 
Mca ii-dbms- u-i-introductory concepts of dbms
Mca ii-dbms- u-i-introductory concepts of dbmsMca ii-dbms- u-i-introductory concepts of dbms
Mca ii-dbms- u-i-introductory concepts of dbmsRai University
 
RMAN in 12c: The Next Generation (WP)
RMAN in 12c: The Next Generation (WP)RMAN in 12c: The Next Generation (WP)
RMAN in 12c: The Next Generation (WP)Gustavo Rene Antunez
 
Database-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptxDatabase-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptxAnmolThakur67
 
csedatabasemanagementsystemppt-170825044344.pdf
csedatabasemanagementsystemppt-170825044344.pdfcsedatabasemanagementsystemppt-170825044344.pdf
csedatabasemanagementsystemppt-170825044344.pdfSameerKhanPathan7
 
Bsc cs ii-dbms- u-i-database systems
Bsc cs ii-dbms- u-i-database systemsBsc cs ii-dbms- u-i-database systems
Bsc cs ii-dbms- u-i-database systemsRai University
 
Migration to Oracle 12c Made Easy Using Replication Technology
Migration to Oracle 12c Made Easy Using Replication TechnologyMigration to Oracle 12c Made Easy Using Replication Technology
Migration to Oracle 12c Made Easy Using Replication TechnologyDonna Guazzaloca-Zehl
 
Database System Concepts and Architecture
Database System Concepts and ArchitectureDatabase System Concepts and Architecture
Database System Concepts and Architecturesontumax
 
Data base management system
Data base management systemData base management system
Data base management systemSuneel Dogra
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2Mario Redón Luz
 

Similar to White Paper, System Z Dataset Naming Standards (20)

27 fcs157al2
27 fcs157al227 fcs157al2
27 fcs157al2
 
Intro to IDMS
Intro to IDMSIntro to IDMS
Intro to IDMS
 
Database systems - Chapter 1
Database systems - Chapter 1Database systems - Chapter 1
Database systems - Chapter 1
 
Database Performance Management in Cloud
Database Performance Management in CloudDatabase Performance Management in Cloud
Database Performance Management in Cloud
 
DBMS.pptx
DBMS.pptxDBMS.pptx
DBMS.pptx
 
Towards secure and dependable storage
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storage
 
databasesystemsconollyslide1-151102101031-lva1-app6892.pptx
databasesystemsconollyslide1-151102101031-lva1-app6892.pptxdatabasesystemsconollyslide1-151102101031-lva1-app6892.pptx
databasesystemsconollyslide1-151102101031-lva1-app6892.pptx
 
Database-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptxDatabase-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptx
 
Mca ii-dbms- u-i-introductory concepts of dbms
Mca ii-dbms- u-i-introductory concepts of dbmsMca ii-dbms- u-i-introductory concepts of dbms
Mca ii-dbms- u-i-introductory concepts of dbms
 
DbMs
DbMsDbMs
DbMs
 
RMAN in 12c: The Next Generation (WP)
RMAN in 12c: The Next Generation (WP)RMAN in 12c: The Next Generation (WP)
RMAN in 12c: The Next Generation (WP)
 
Database-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptxDatabase-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptx
 
csedatabasemanagementsystemppt-170825044344.pdf
csedatabasemanagementsystemppt-170825044344.pdfcsedatabasemanagementsystemppt-170825044344.pdf
csedatabasemanagementsystemppt-170825044344.pdf
 
Database Management System ppt
Database Management System pptDatabase Management System ppt
Database Management System ppt
 
Bsc cs ii-dbms- u-i-database systems
Bsc cs ii-dbms- u-i-database systemsBsc cs ii-dbms- u-i-database systems
Bsc cs ii-dbms- u-i-database systems
 
Migration to Oracle 12c Made Easy Using Replication Technology
Migration to Oracle 12c Made Easy Using Replication TechnologyMigration to Oracle 12c Made Easy Using Replication Technology
Migration to Oracle 12c Made Easy Using Replication Technology
 
Database System Concepts and Architecture
Database System Concepts and ArchitectureDatabase System Concepts and Architecture
Database System Concepts and Architecture
 
Data base management system
Data base management systemData base management system
Data base management system
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2
 
Unit01 dbms
Unit01 dbmsUnit01 dbms
Unit01 dbms
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

White Paper, System Z Dataset Naming Standards

  • 1. System-Z Dataset Naming Standards Business data comes in many forms. It is found in program libraries, databases, extracts from databases, files created from manipulating database data, unloads, backups, access logs, stored procedures, and so on. Controlling access to business data seems daunting, if not impossible. If we remember all business data (except printed reports) exists as datasets on some form of electronic media, the task becomes manageable, even relatively easy. The key is a good dataset naming standard. A proper dataset naming standard has these features.  The HLQ is unique, not only to the application but also to the data’s purpose within that application.  It describes the owning application and indicates the usage of the data.  It indicates whether the data is production or test.  The second qualifier describes the dataset uniquely.  The third qualifier describes the type of data on the dataset. In other words, is it a database, an unload, a log, or some other dataset? There are two exceptions to these rules. The first exception is DB2, which has its own naming standard. However, DB2’s standard is easily amenable to the general rules. The second exception is the existence of “working copies” of databases, i.e. a copy of the database for problem investigation, utility testing, and other purposes. Database versus Non-database Business Data In almost all cases, database datasets already have a form of naming standard. Whether this is a DD-name based standard (IMS) or a table space standard (DB2), there are certain rules inherent in the DBMS. Non-database datasets, however, have no such limits and may carry any name the IT person can think of. Non-database datasets come in two forms: “control” datasets (procedures, parameters, and programs) and “data” datasets (everything else). Because batch jobs create “data” datasets specific to the job, it makes sense to use the creating batch job name as the dataset’s unique descriptor (i.e. the second qualifier). For “control” datasets, the second qualifier may be anything describing the library’s purpose as long as it is unique within the high-level qualifier. A Note on Other Mainframe Naming Standards There are many IBM mainframes, running a variety of operating systems. One example is the VM LINUX virtual machines. Of course, naming standards and even file storage are different for each of these operating systems. Because Linux and other variations of UNIX work on a file system with both directories and files, it is not critical to name the owner in the file name. The owner can be determined from the directory and/or disk where the file is located, thus the file name can be more descriptive of its contents.
  • 2. An “Ideal” Dataset Naming Standard for zOS  HLQ: o Code a “P” for production, anything else for test. o Code the chargeback code for the owning application. This typically ranges from two to four characters. o Code IMS for IMS databases and related datasets, VSM for VSAM databases and related datasets, and DB2 for DB2 databases. Related datasets include backups, unloads, and copies. Applications may use any other character set for non-database datasets.  The second qualifier is the DD name of the database dataset.  The third qualifier is a data type indicator, UNLOAD, or COPYx (where “x” describes the use of the copy, e.g. library or vault).  Working copies of databases must have a “fourth” qualifier to show the date of the copy. This qualifier is a “J” followed by the Julian date of the backup. Examples The examples here assume a two-character chargeback code. o Production Amalgamated Assurance claims database (HDAM):  PAAIMS.DDCLM01D.OSAM OSAM dataset, first partition  PAAIMS.DDCLM01D.J2007153.OSAM working copy of the database  PAAIMS.DDCLM01D.UNLOAD unload dataset  PAAIMS.DDCLM01D.COPYL backup of database, library copy  PAAIMS.DDCLM01D.COPYV backup of database, vaulted tape o Production Amalgamated Assurance billing code database (HIDAM):  PAAIMS.DDBILCDD.OSAM database DSN, data dataset  PAAIMS.DDBILCDD.KSDS database DSN, index dataset  PAAIMS.DDBILCDD.UNLOAD unload dataset for CLAIM first partition  PAAIMS.DDBILCDD.COPYL backup of database, library copy  PAAIMS.DDBILCDD.COPYV backup of database, vaulted tape o Test Amalgamated Assurance claims database (HDAM):  TAAIMS.DDCLM01D.OSAM database, OSAM dataset, first partition  TAAIMS.DDCLM01D.UNLOAD unload dataset for CLAIM first partition  TAAIMS.DDCLM01D.COPYL backup of database, library copy  TAAIMS.DDCLM01D.COPYV backup of database, vaulted tape o Test Amalgamated Assurance futures database (DB2):  TAADB2.DSNDBC.TS00001A.I0001.A001 o Other Amalgamated Assurance production datasets:  PAAPARM.BATCH.PARMLIB  PAAPGM.GENERAL.LOADLIB  PAACLM.<jobname>.CLMRPT.G0012V00  PAACLM.<jobname>.CLMBAD.G0001V00
  • 3. You may note the “other” production dataset names are self-explanatory, or nearly so.
  • 4. Advantages and Disadvantages There are enormous advantages to the naming standard spelled out above. A. Clarity. The dataset name instantly identifies who owns it, what is in the dataset, and what type of data it is. B. Chargeback is easy because the chargeback control information is always in the same place. C. Security. Whether you have RACF, Top Secret, ACF2, or another security package, the HLQ of the dataset is the owner of the protection rules. Placing the application’s unique chargeback information in the HLQ leaves no doubt who owns the security responsibility for the data. It also drastically reduces the overhead and number of RACF objects needed to protect business data. D. Automation. Automation tools can construct dataset names using a few simple rules. The tools do not need to keep or search for extra data. That reduces CPU cycles and reduces the storage required to maintain a list of backups. E. Storage. This standard makes it very easy to code ACS routines, both for sending datasets to various pools and for excluding datasets from pools. It reduces CPU and simplifies ACS routines. Further, dataset allocation is faster with fewer dataset screening criteria. There is really only one disadvantage to this naming standard: it is an ideal. Starting out with this ideal, or a similar naming standard, is something to try for. However, while it is possible to change a legacy system’s dataset names, going from a very simple naming standard to this standard can be a complicated process. A. Many job changes. DSNs must change wherever they occur. Using a global find/ change utility simplifies the task, but it is still no small undertaking. B. In IMS regions, we must change dynamic allocation members. There are automated tools to do this. C. Many new GDG bases. However, we can easily automate creating the new GDG bases. A relatively simple REXX exec would generate the GDGs, RACF profiles, and new vaulting lists very rapidly given a list of chargeback codes plus the member list of the DBDLIB and a list of the DD names of VSAM databases. D. Coordination. It is important to verify, before changing names, what applications (OS as well as business applications) are affected. Converting one application at a time lessens this disadvantage. While there are technical difficulties, none of them is impossible to surmount. By far the hardest task is convincing the application to make the change. It is easier to do so if the application already has a good standard; in fact, if their standard follows the general guidelines set out on the first page, there may be no need to change at all.