SlideShare a Scribd company logo
1 of 38
Download to read offline
Network Access Methods
Introduction
• BTAM - Basic telecommunications access
method
• QTAM - Queued teleprocessing access method
• TCAM - Telecommunications access method
• VTAM - Virtual telecommunications access
method
Network access methods
Network access methods
Basic telecommunications access
method
• A low-level programming interface specified
by IBM for use on the IBM System/360
• For start-stop and binary
synchronous telecommunications terminals.
Basic telecommunications access
method
Basic telecommunications access
method
• BTAM requires the application program
or transaction processing system to handle
almost every detail of the protocol.
• Transaction processing is a style of computing
that divides work into individual, indivisible
operations, called transactions
Basic telecommunications access
method
• This is harder than using a higher-layer
protocol, but it permits interfacing to non-
standard devices in non-standard ways
Basic telecommunications access
method
• BTAM was an access method for interactively
communicating with remote terminals
• BTAM dynamically built CCW's for reading,
writing and "polling" terminals
• Dealt with specific responses from those
terminals, according to the success or failure
of the communication channel.
Basic telecommunications access
method
• A channel command word (CCW) is
an instruction to a specialized I/O channel
processor which is, in fact, a finite state
machine
• Polling refers to actively sampling the status of
an external device by a client program as a
synchronous activity
Basic telecommunications access
method
• It was not unusual for BTAM and later
developed access methods (such as VTAM) to
co-exist, supporting different devices
simultaneously under the same transaction
processing system.
Basic telecommunications access
method
• BM finally withdrew
support for BTAM in 2000.
Queued Telecommunications
Access Method
Queued Telecommunications Access Method
• Queued Telecommunications Access
Method (QTAM) is an IBM
System/360 communications access
method incorporating built-in queuing.
Network access methods
Queued Telecommunications Access Method
• Queuing is referring to message queues
• These are software-
engineering components used for interprocess
communication (a set of methods for the
exchange of data among multiple threads)
Queued Telecommunications Access Method
• Threads being the smallest sequence of
programmed instructions that can be
managed independently
Queued Telecommunications Access Method
• QTAM consisted of a Message Control
Program (MCP) and zero or more Message
Processing Programs (MPP)
• The MCP handled communications with the
terminals, identified input messages and
started MPPs to process them as required
Queued Telecommunications Access Method
• The MCP was assembled by the user
installation from a set of macros supplied by
IBM.
Queued Telecommunications Access Method
• These macros defined:
• The lines and terminals comprising the
system,
• The datasets required,
• And the procedures used to process received
and transmitted messages.
Queued Telecommunications Access Method
• The MPPs, incorporating logic to process the
various messages, were supplied by the
installation, and used standard OS/360 data
management macros.
Telecommunications Access Method
Telecommunications Access Method
• Telecommunications Access Method (TCAM) is
an access method that provides access to
terminals units within a teleprocessing
network.
Telecommunications Access Method
• Teleprocessing is a term coined by IBM and is
used to describe a computer with the
capability of connecting to another computer
or network device.
Telecommunications Access Method
• Though TCAM provided similar functionality
to QTAM, which it replaced, It had its
advantages over QTAM
Telecommunications Access Method
• It was said to have:
– Improved buffering, with more buffering options.
– Improved organization of message queuing on
disk including multiple volume support.
– Back-up copies of messages maintained on disk.
Telecommunications Access Method
• It was said to have:
– Improved testing and debugging (including off-line
testing, improved debugging, online terminal
testing, and logging.)
– Improved line handling for inquiry applications.
Telecommunications Access Method
• It was said to have:
– "Significantly increases speed and efficiency over
QTAM."
– Improved operator monitoring and control.
– Binary Synchronous Support.
– Checkpointing.
Telecommunications Access Method
• Binary Synchronous Communication, aka
BSC or Bisync,
• Is an IBM character-oriented, half-duplex link
protocol, announced in 1967
Telecommunications Access Method
• Checkpointing is a technique for inserting fault
tolerance into computing systems.
• It basically consists of storing a snapshot of
the current application state
• It may use it later on for restarting the
execution in case of failure.
Virtual Telecommunications
Access Method
Virtual Telecommunications Access Method
• VTAM provides an application programming
interface (API) for communication
applications,
• IT controls communication equipment such as
adapters and controllers.
Virtual Telecommunications Access Method
• In modern terminology, VTAM provides a
communication stack and device drivers.
Virtual Telecommunications Access Method
• After a series of delay, VTAM was introduced
in 1974 as a major component of SNA
(Systems Network Architecture)
Virtual Telecommunications Access Method
• VTAM is an access method software that
allows application programs to read and write
data to and from external devices.
• It is called 'virtual' because it was introduced
at the time when IBM was introducing virtual
storage
Virtual Telecommunications Access Method
• VTAM is an access method software that
allows application programs to read and write
data to and from external devices.
• It is called 'virtual' because it was introduced
at the time when IBM was introducing virtual
storage
Virtual Telecommunications Access Method
• Some Features Of VTAM Is That:
• Supports several network protocol
• Supports 'cross-domain' services
QUESITONS

More Related Content

What's hot (20)

Topic : X.25, Frame relay and ATM
Topic :  X.25, Frame relay and ATMTopic :  X.25, Frame relay and ATM
Topic : X.25, Frame relay and ATM
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Unit01
Unit01Unit01
Unit01
 
Iso layer detail
Iso layer detailIso layer detail
Iso layer detail
 
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)
 
Switching
SwitchingSwitching
Switching
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
 
Unit02
Unit02Unit02
Unit02
 
monotoring Basics2
monotoring Basics2monotoring Basics2
monotoring Basics2
 
Unit11
Unit11Unit11
Unit11
 
Unit06
Unit06Unit06
Unit06
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
 
Lan architecture
Lan architectureLan architecture
Lan architecture
 
2. network elements
2. network elements2. network elements
2. network elements
 
Network (Hub,switches)
Network  (Hub,switches)Network  (Hub,switches)
Network (Hub,switches)
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and Classifications
 
Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Topology
TopologyTopology
Topology
 
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)
 

Similar to Network access methods

Similar to Network access methods (20)

IT6601 Mobile Computing Unit I
IT6601 Mobile Computing Unit IIT6601 Mobile Computing Unit I
IT6601 Mobile Computing Unit I
 
M2M communications
M2M communicationsM2M communications
M2M communications
 
Chapter 6 computer and controls systems within manufacturing
Chapter 6   computer and controls systems within manufacturingChapter 6   computer and controls systems within manufacturing
Chapter 6 computer and controls systems within manufacturing
 
SCADA
SCADASCADA
SCADA
 
Ch 02 (1)
Ch 02 (1)Ch 02 (1)
Ch 02 (1)
 
Ch 02 (1)
Ch 02 (1)Ch 02 (1)
Ch 02 (1)
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
Modem technology
Modem technologyModem technology
Modem technology
 
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)
 
ATM - A Technology Perspective
ATM - A Technology PerspectiveATM - A Technology Perspective
ATM - A Technology Perspective
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
 
M2M Day Two
M2M Day TwoM2M Day Two
M2M Day Two
 
ATM
ATMATM
ATM
 
Atm intro
Atm introAtm intro
Atm intro
 
6 Month Telecommunication Training
6 Month Telecommunication Training6 Month Telecommunication Training
6 Month Telecommunication Training
 
Building Management Services
Building Management Services Building Management Services
Building Management Services
 
CN-Unit 1.pptx
CN-Unit 1.pptxCN-Unit 1.pptx
CN-Unit 1.pptx
 
Broadband isdn and atm
Broadband  isdn and atmBroadband  isdn and atm
Broadband isdn and atm
 
Slide 02 - Asynchronous Transfer Mode (ATM).pdf
Slide 02 - Asynchronous Transfer Mode (ATM).pdfSlide 02 - Asynchronous Transfer Mode (ATM).pdf
Slide 02 - Asynchronous Transfer Mode (ATM).pdf
 
LOCAL multipoint distribuition service.pdf
LOCAL multipoint distribuition service.pdfLOCAL multipoint distribuition service.pdf
LOCAL multipoint distribuition service.pdf
 

Recently uploaded

IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServiceRenan Moreira de Oliveira
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.francesco barbera
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 

Recently uploaded (20)

IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 

Network access methods

  • 2. Introduction • BTAM - Basic telecommunications access method • QTAM - Queued teleprocessing access method • TCAM - Telecommunications access method • VTAM - Virtual telecommunications access method
  • 5. Basic telecommunications access method • A low-level programming interface specified by IBM for use on the IBM System/360 • For start-stop and binary synchronous telecommunications terminals.
  • 7. Basic telecommunications access method • BTAM requires the application program or transaction processing system to handle almost every detail of the protocol. • Transaction processing is a style of computing that divides work into individual, indivisible operations, called transactions
  • 8. Basic telecommunications access method • This is harder than using a higher-layer protocol, but it permits interfacing to non- standard devices in non-standard ways
  • 9. Basic telecommunications access method • BTAM was an access method for interactively communicating with remote terminals • BTAM dynamically built CCW's for reading, writing and "polling" terminals • Dealt with specific responses from those terminals, according to the success or failure of the communication channel.
  • 10. Basic telecommunications access method • A channel command word (CCW) is an instruction to a specialized I/O channel processor which is, in fact, a finite state machine • Polling refers to actively sampling the status of an external device by a client program as a synchronous activity
  • 11. Basic telecommunications access method • It was not unusual for BTAM and later developed access methods (such as VTAM) to co-exist, supporting different devices simultaneously under the same transaction processing system.
  • 12. Basic telecommunications access method • BM finally withdrew support for BTAM in 2000.
  • 14. Queued Telecommunications Access Method • Queued Telecommunications Access Method (QTAM) is an IBM System/360 communications access method incorporating built-in queuing.
  • 16. Queued Telecommunications Access Method • Queuing is referring to message queues • These are software- engineering components used for interprocess communication (a set of methods for the exchange of data among multiple threads)
  • 17. Queued Telecommunications Access Method • Threads being the smallest sequence of programmed instructions that can be managed independently
  • 18. Queued Telecommunications Access Method • QTAM consisted of a Message Control Program (MCP) and zero or more Message Processing Programs (MPP) • The MCP handled communications with the terminals, identified input messages and started MPPs to process them as required
  • 19. Queued Telecommunications Access Method • The MCP was assembled by the user installation from a set of macros supplied by IBM.
  • 20. Queued Telecommunications Access Method • These macros defined: • The lines and terminals comprising the system, • The datasets required, • And the procedures used to process received and transmitted messages.
  • 21. Queued Telecommunications Access Method • The MPPs, incorporating logic to process the various messages, were supplied by the installation, and used standard OS/360 data management macros.
  • 23. Telecommunications Access Method • Telecommunications Access Method (TCAM) is an access method that provides access to terminals units within a teleprocessing network.
  • 24. Telecommunications Access Method • Teleprocessing is a term coined by IBM and is used to describe a computer with the capability of connecting to another computer or network device.
  • 25. Telecommunications Access Method • Though TCAM provided similar functionality to QTAM, which it replaced, It had its advantages over QTAM
  • 26. Telecommunications Access Method • It was said to have: – Improved buffering, with more buffering options. – Improved organization of message queuing on disk including multiple volume support. – Back-up copies of messages maintained on disk.
  • 27. Telecommunications Access Method • It was said to have: – Improved testing and debugging (including off-line testing, improved debugging, online terminal testing, and logging.) – Improved line handling for inquiry applications.
  • 28. Telecommunications Access Method • It was said to have: – "Significantly increases speed and efficiency over QTAM." – Improved operator monitoring and control. – Binary Synchronous Support. – Checkpointing.
  • 29. Telecommunications Access Method • Binary Synchronous Communication, aka BSC or Bisync, • Is an IBM character-oriented, half-duplex link protocol, announced in 1967
  • 30. Telecommunications Access Method • Checkpointing is a technique for inserting fault tolerance into computing systems. • It basically consists of storing a snapshot of the current application state • It may use it later on for restarting the execution in case of failure.
  • 32. Virtual Telecommunications Access Method • VTAM provides an application programming interface (API) for communication applications, • IT controls communication equipment such as adapters and controllers.
  • 33. Virtual Telecommunications Access Method • In modern terminology, VTAM provides a communication stack and device drivers.
  • 34. Virtual Telecommunications Access Method • After a series of delay, VTAM was introduced in 1974 as a major component of SNA (Systems Network Architecture)
  • 35. Virtual Telecommunications Access Method • VTAM is an access method software that allows application programs to read and write data to and from external devices. • It is called 'virtual' because it was introduced at the time when IBM was introducing virtual storage
  • 36. Virtual Telecommunications Access Method • VTAM is an access method software that allows application programs to read and write data to and from external devices. • It is called 'virtual' because it was introduced at the time when IBM was introducing virtual storage
  • 37. Virtual Telecommunications Access Method • Some Features Of VTAM Is That: • Supports several network protocol • Supports 'cross-domain' services