SlideShare a Scribd company logo
1 of 89
Assignment 2 Directions
Enter your Name Here =
è
XXXXXXXXXX
Assignment 2 is divided into two documents: Assignment 2
Theory (50% of the assignment grade) and Assignment 2 Hands-
on (50% of the assignment grade).
Most requirements of this assignment will require you to
research answers from your text book (you must read the text
book to get some answers), from the Internet, or any other
reasonable source. Many Internet sources, video links, text book
and Blackboard presentation reference are provided to help you
START your research. I have found that any single Internet
source is very incomplete and the format may not conducive for
most answers required. Some students do not READ the text
book or review the Power Point presentation provided to you in
Blackboard.
Some answers are only available from my power point
presentations or update notes.
You may cut-and-paste answers whenever appropriate, you
should take care to synthesize your answers to include multiple
sources. I would be impressed that you consult a Google image
search and paste and
appropriate
image to supplement your answer.
While I permit cut-and-paste, I do expect you use your own
words so that you:
1. Organize the answer
2. Demonstrate that you have read what you have cut-and-pasted
3. Use any means that clearly displays that you have gained
knowledge.
If you are LEARNING the subject matter there should be no
problem. If you cut-and-paste and pray that it might answer the
question you will be penalized. I hate irrelevant cut-and-paste
BS.
The content of each student's assignment may NOT be copied
from any other current or past student enrolled in this class.
Each assignment is to be prepared by ONE student.
Assignments are NOT a group-prepared assignment. Copying
and pasting assignment any portion of the requirements from
another student either enrolled in the current semester and or a
previous semester is an act of plagiarism according to the RMU
Academic Integrity Policy.
Any assignment found to be "too much alike" will be subject to
a grade of zero for all parties concerned. Such an act constitutes
a violation of the Robert Morris University Academic Integrity
Policy.
The instructor reserves the right to review past assignments
with students who are unable to prepare assignments during the
hands-on portion of the exam to determine the student's mastery
of the assignment's objectives. The assignment grade based
upon the result of the instructor's review.
On-ground tests may be used to compare the student’s
knowledge to performance on assignments.
All acts of plagiarism will be submitted the RMU Academic
Integrity Board to determine university-wide penalties.
You, however, may discuss assignment requirements, assist
other students with debugging programs or other hands-on-
requirements, tutor students, or provide other advice that may
assist the students in acquiring knowledge. But the actual
preparation of an individual assignment must have been
completely prepared by the student who submitted the
assignment. Sections of the assignments may be copied from the
internet as per the individual assignment's directions. Please
contact the instructor if you need assistance interpreting this
RMU Academic Integrity Policy.
You are to enter all answers or Prtscrn requirements into this
Word Document.
You are not permitted to submit any other document format,
e.g., Wordpad, PDFs, etc. that is not based on this original
Word document.
This document contains hidden internal markers and
applications that will track the version of this assignment and
your assignment progress.
You MUST submit the assignments using the Word document(s)
provided you. You may not use any other word processor,
except Microsoft Word. Do not use Open Office DOCX files.
When an instructor has possession of an electronic document it
is very easy to detect plagiarism. Many instructors use Turnitin
assignments, which is applicable to assignments that permit cut-
and-paste as this assignment.
It is very easy to compare multiple copies of word documents
(see link below).
Microsoft provides a variety of FREE anti-plagiarizing tools.
And there is a wide variety of tools that can analyze hidden
information within a Word document (see sample link below).
Changing fonts, margins and spacing does not do it anymore.
Even when individuals try to artificially change content, a Word
document contains hidden markers that may provide an audit
trail to find previous authors and computer systems who have
edited the document.
Comparing and merging Microsoft Word documents -
http://support.microsoft.com/kb/306484
Compare documents side by side -
http://office.microsoft.com/en-us/word-help/compare-
documents-side-by-side-HA010102251.aspx
Fight crime. Unravel incidents... one byte at a time.
http://computer-
forensics.sans.org/community/papers/gcfa/computer-forensics-
investigation-image-file-analysis_170
Why am I providing some of this detailed information? There
are several reasons.
1)
The real world exists outside this class.
A student in this class must be aware of the dangers when
organizations or individuals provide electronic copies to others,
e.g., an email attachment.
2)
The objective of this assignment is to "introduce" minimal
knowledge that is required in the real world. If you do not
acquire this minimal knowledge, you will significantly harm
your employment, income, promotion and retention potentials.
If you do not want to do the hard work, I can recommend a
better alternative to plagiarism - get a new major or career plan.
Perhaps you can star in a reality TV show.
3) The majority of my students will exert the effort and submit
excellent assignments.
I will use many of the previous tools as time permits to ensure
that you do not steal their grade. I really don't understand why a
student would provide a student with a copy of their assignment
when they are competing in the same job market. In my class
both the original author and the plagiarizer will be punished.
If you do not have a copy of WORD
, you may use VMWARE VIEW (available from the RMU
website) to access a virtual lab computer which contains any
software needed for this course.
http://www.rmu.edu/web/cms/departments-
offices/administration-services/it/Pages/vmware-view.aspx
NEVER STORE ANY DOCUMENTS ON THE DESKTOP OF
VMWARE VIRTUAL COMPUTER.
You will lose your document. It is preferable to store you
documents on a local flash drive.
Since the quiz and test questions are based on your researched
answers, I would recommend that you refer to any quiz
questions on the assignment topics to ensure that your
assignment answer is complete. Some quiz answers will NOT be
provided to you unless 75% of your answers from practice
attempts are correct.
YOU MUST enter your name in the beginning of this document
as provided and "Save As" this document using a new name that
includes your name and the assignment number, e.g., Bob Jones
Assignment 2.docx
When completed, submit the FINAL version of this document to
Blackboard under the Assignment folder for this individual
assignment.
I NEVER ACCEPT AN ASSIGNMENT AS AN EMAIL
ATTACHMENT FOR ANY REASON.
If you made an error on an assignment you may request that the
previous assignment submission be cleared so that you may
resubmit the assignment again.
Please only submit a completed assignment.
All assignments must use the original Word Document format.
Wordpad,
PDFs, etc. formats are not permitted.
While the assignments have a recommended due date, I do not
penalized your assignment grade if you are slightly late.
Please do not send me an email if you are going to submit your
assignment late. I assume you have a good excuse.
Documenting your Results
Some requirements specify that you perform a specific action,
e.g., access a web site, execute a command, etc.
You will need to provide evidence that you performed this task.
There are two techniques
1. Window 7 Snipping Tool -
http://www.youtube.com/watch?v=Ax75dA1TGU0
2) Alt-PrtScrn - Available for all versions of Windows
1) Once the web site or the results of the command is displayed
hold down the ALT key and press the Prtsc. Some laptops may
require you to press the FN key to perform this action. 2)
Position the cursor to answer the question in this Word
document. 3) Press Ctrl-V or select Edit/paste.
To make your graphic more controllable in a Word Document,
after pasting 1) Right-click and select Format Picture, 2) Click
on the Layout tab, and 3) Select Square ( You may also other
justification settings). Now you graphic will flow with text
better and can be sized more easily. Page 117-14
Requirement 1 Virtual Memory Operating Systems, Paging and
Storage Protection
Many Definitions may be found in the Glossary of the
Introduction to the New Mainframe: Z/OS Basics books.
You can down load a PDF copy of this text book from
Blackboard/Course Documents
How Operating Systems Work -
http://computer.howstuffworks.com/operating-system.htm
Virtual address space -
http://en.wikipedia.org/wiki/Virtual_address_space
Address space -
http://searchstorage.techtarget.com/definition/address-space
What is virtual memory, how is it implemented, and why do
operating systems use it?
http://www.programmerinterview.com/index.php/operating-
systems/how-virtual-memory-works/
What are the advantages and disadvantages of virtual memory?
http://answers.yahoo.com/question/index?qid=20080928221645
AAFAg23
These videos have been written for Unix, but many of the
concepts can be applied to all operating systems
Video - Virtual Memory - Part 1 -
http://www.youtube.com/watch?v=iqfjWIYyQ9k
Video - Virtual Memory - Part 2 -
http://www.youtube.com/watch?v=4px3RrDBa6w
Video - Page Replacement -
http://www.youtube.com/watch?v=M0d-vLw5Eyk
Video - Process Management -
http://www.youtube.com/watch?v=mHPySA51t18
Video - Processes - Part I -
http://www.youtube.com/watch?v=TIa2mhKCeYo
Video - Processes - Part II -
http://www.youtube.com/watch?v=_5EV7isUJ6k
3.4.4 Virtual storage overview - Introduction to the New
Mainframe: Z/OS Basics - Please read
1. What is advantage of a virtual memory (storage) operating
system?
Answer:
2. What is disadvantage of a virtual memory (storage) operating
system? Answer:
All programs to be executed must be loaded into the memory
(RAM) of the computer. Programs and data must be copied from
storage, e.g., a disk, and loaded in to RAM by an operating
system program call a loader. In a multitasking operating
system user programs must be stored in RAM a manner that
doesn't overlap or conflict with other user or operating system
programs
In addition, user and system programs need a way to
communicate with each other.
If an operating system controls the hardware then a user
program needs a communication method to ask the operating
system to print output or store data on a disk.
Introduction to the New Mainframe: Z/OS Basics - Glossary
3.4.2 What is an address space?
- Introduction to the New Mainframe: Z/OS Basics - please read
3.4.3 What is dynamic address translation?
- Introduction to the New Mainframe: Z/OS Basics - please read
3.4.4 Virtual storage overview - Introduction to the New
Mainframe: Z/OS Basics - please read
3.4.5 What is paging? - Introduction to the New Mainframe:
Z/OS Basics - please read
3.4.7 What is Storage Protection? - Introduction to the New
Mainframe: Z/OS Basics - please read
3. Using the following table write a discussion of following
z/OS memory concepts and functions
z/OS Memory Concepts and Functions
Concept
Description
Address Space
ASID (Address Space ID)
Task Control Block
Private Space
Storage (Protection) Keys
Dynamic Address Translation (DAT)
z/OS address spaces are divided into three areas: Region,
Segment and Page. z/OS uses these concepts in dynamic address
translation find the virtual location of a specified area of
memory. While at first these concepts may sound confusing
assume that visitor from Ireland wanted to find my home.
Would they start searching at the first street in New York City -
obviously no
First, we would start by asking which state do you want to
locate (which Region)? Second, one would ask which city
within the state do you want to locate (the segment table)?
Third, which street within the city do you want to locate (the
page table)? Finally, one can sequentially search all houses on
the street or simply use the house address (the byte offset).
Likewise, a virtual address uses a similar approach to uniquely
identify a virtual address location and to quickly find the
address later when needed.
4. Using the following table identify each virtual address
concept.
z/OS Virtual Address Concepts
Concept
Function and Description
Region
Segment
Page
Byte Offset
5. How many bits are in a z/OS virtual address?
Answer:
6. The maximum of amount virtual address space the z/OS can
manage is ____? Answer:
11. Using the following table, list the concept that best
describes a type of page, or addressable unit.
z/OS Addressable Units
Concept
Description
A page or 4K block in central storage is called _______
A page or 4K block in virtual storage is called _______
A page or 4K block in auxiliary is called _______
12. When a program is selected for execution, z/OS first brings
the program into which type of storage? Answer:
Page faults
http://www.programmerinterview.com/index.php/operating-
systems/paging-and-page-faults/
What is the purpose of swapping?
http://www.programmerinterview.com/index.php/operating-
systems/purpose-of-swapping/
What is the difference between a thread and a process?
http://www.programmerinterview.com/index.php/operating-
systems/thread-vs-process/
13. z/OS uses a series of tables to determine whether a page is
located in real storage or auxiliary storage. Only pages within
real storage can be executed. Auxiliary storage is used to extend
the real memory.
Using the following table describe each of the following z/OS
paging concepts.
z/OS Virtual Paging Concepts
Concept
Description
Page fault
Page-in
Page-out
Page Stealing
Unreferenced interval count
Swapping
System Resource Manager
Workload Manager
Thrashing
14. Which pages are the most likely candidates to be stolen
when using Page stealing? Answer:
Chapter 3: Overview of z/OS : Introduction to the Mainframe:
z/OS basics ( pages 114 - 134)
Program Status Word
http://publib.boulder.ibm.com/infocenter/zvm/v5r4/index.jsp?to
pic=/com.ibm.zvm.v54.hcpc1/psw1.htm
Operating Systems and Program Status Word
http://www.edwardbosworth.com/My3121Textbook_HTM/MyTe
xt3121_Ch29_V01.htm
Storage Protect Keys
http://publib.boulder.ibm.com/infocenter/pseries/v5r3/index.jsp
?topic=/com.ibm.aix.genprogc/doc/genprogc/storage_protect_ke
ys.htm
What is storage protection?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconcepts_95.htm
IBM PSW and Storage Protect Key -
http://research.microsoft.com/en-
us/um/people/gbell/Computer_Structures__Readings_and_Exam
ples/00000616.htm
Each executing program in an address space has a unique
program status word associated with it. Also, within each
program status word there is storage protect key.
15. What is the purpose of a Program Status Word (PSW)?
Answer:
16. What is the purpose of using a private address space for
each user? Answer:
17. What is the function of a storage protect key? Answer:
18. A storage protect key of 0 thru 7 indicates that a program is
which type of program?
Answer:
19. A storage protect key of 8 indicates that a program is which
type of program?
Answer:
20. A storage protect key of 9 thru 15 indicates that a program
is which type of program? Answer:
Requirement 2 Storage Devices, Expansion Busses and Slots
Review the videos under the Video Folder/ Bus Architecture
Expansion Slots and Ports; Storage Technologies; Installing
Hard Drives DVDs and Other Storage Devices
Review Storage Bus Update 2010 and Managing Disks 2010
Video - Adding Hard Drives and Creating Volumes in Windows
Server 2012
-
https://www.youtube.com/watch?v=s4E6WcZKxRc
Video -
How a Hard Drive works
-
https://www.youtube.com/watch?v=rREkzeoJz1s
Video: How to Install a SATA Hard Drive
http://www.youtube.com/watch?v=zTzEp7dHWYY
How Hard Disks Work
-
http://computer.howstuffworks.com/hard-disk.htm
data transfer rate
-
http://www.webopedia.com/TERM/D/data_transfer_rate.html
PCI Express
-
http://en.wikipedia.org/wiki/PCI_Express
How PCI Express Works
-
http://computer.howstuffworks.com/pci-express.htm
Serial ATA
-
http://en.wikipedia.org/wiki/Serial_ATA
What are PATA and SATA?
-
http://hexus.net/tech/tech-explained/storage/1339-pata-vs-sata/
IOPS
-
http://en.wikipedia.org/wiki/IOPS
IOPS versus Throughput – Measuring Performance of Your
Storage
-
http://timradney.com/2012/07/06/iops-verses-throughput/
How to convert MBps to IOPS or calculate IOPS from MB/s
-
http://www.ssdfreaks.com/content/599/how-to-convert-mbps-to-
iops-or-calculate-iops-from-mbs
An explanation of IOPS and latency
-
http://recoverymonkey.org/2012/07/26/an-explanation-of-iops-
and-latency/
SSD Interface Comparison: PCI Express vs SATA
-
http://www.overclock.net/t/1489684/ssd-interface-comparison-
pci-express-vs-sata
Why SSDs are Transitioning from SATA to PCIe in the Next
Gen Form Factor
-
http://www.tested.com/tech/pcs/456464-why-ssds-are-
transitioning-sata-pcie-next-gen-form-factor/
Live USB
-
http://en.wikipedia.org/wiki/Live_USB
5 ways to use bootable Linux live discs -
http://www.computerworld.com/article/2519158/linux/5-ways-
to-use-bootable-linux-live-discs.html
Take a Secure Desktop Everywhere: Everything You Need to
Know About Linux Live CDs and USB Drives
-
http://www.howtogeek.com/172810/take-a-secure-desktop-
everywhere-everything-you-need-to-know-about-linux-live-cds-
and-usb-drives/
What are the advantages and disadvantages of always running
Ubuntu in “Try” mode?
-
http://askubuntu.com/questions/481057/what-are-the-
advantages-and-disadvantages-of-always-running-ubuntu-in-try-
mode
Serial ATA
http://en.wikipedia.org/wiki/Serial_ATA
A Guide to Serial ATA
http://www.pcmech.com/article/a-guide-to-serial-ata/
Install a New Hard Drive in Five Easy Steps
http://computershopper.com/hard-drives-burners/howto/install-
a-new-hard-drive-in-five-easy-steps
Data cluster
-
http://en.wikipedia.org/wiki/Data_cluster
Block Storage -
http://en.wikipedia.org/wiki/Block_%28data_storage%29
1. Using the following table describe the following concepts
related to data storage of auxiliary devices.
Concepts related to Storage Devices
Definition or Description
Disk Cylinder
Disk Track
Disk Sector
Data Cluster
Data Block
Data Transfer Rate
Seek Time
Throughput
MBPS
IOPS
SATA
PATA
2. Using the following table paste an appropriate Google image
that illustrates the concept.
Concepts related to Storage Devices
Google image that illustrates the concept.
Disk Cylinder
Disk Track
Disk Sector
Data Cluster
Data Block
Data Transfer Rate
Seek Time
Throughput
MBPS
IOPS
SATA
PATA
3. In what type of applications is an IOPS throughout
measurement standard more important than MBPS?
Explain your answer:
4. In what type of applications is a MBPS throughout
measurement standard more important than IOPS?
Explain your answer:
Introduction to Disk I/O
There are three architectures that can be used to connect Disk
/O devices, e.g., DASDs, tapes and printers, to a computer: 1)
Directed Attached Storage (DAS), 2) Network Attached Storage
(NAS), and 3) Storage Area Networks (SAN).
The following diagram illustrates three legacy storage
architectures used for Direct Attached Storage (DAS).
What is an I/O Channel?
Mainframes introduced the I/O Channel architecture to support
overlapped processing and multiprogramming.
Assume that a computer was to input payroll data stored on tape
and then output a payroll transaction record to a second tape
device.
Review the timing sequence when the CPU was required to
process the input, payroll calculations and output tasks.
Non Overlapped Processing
No Channels or I/O Processors
Performed by
Processing Step
Time Frame 1
Time Frame 2
Time Frame 3
Time Frame 4
Time Frame 5
Time Frame 6
CPU
Read Record
from Tape 1
Record 1
Record 2
CPU
Calculate Payroll
Record 1
Record 2
CPU
Write Payroll Transaction
on Tape 2
Record 1
Record 3
The CPU was required to perform all input, calculation and
output processing steps. In the first time frame the CPU would
read Record 1 from the Tape 1. In the second time frame the
CPU will perform the payroll calculations for Record 1, and in
the third time frame the CPU would output the modified Record
1 to Tape 2. Given the relative difference in performance
between CPUs and Tape devices in the 1960s, the CPU would
be idle 98% of the processing time waiting for the slower tape
device.
Non overlapped systems were I/O Bound, i.e., the CPU was
underutilized.
While the previous picture seems to imply that an I/O channel is
a connector, an I/O Channel is actual a specialized I/O
processor designed to work with the CPU. Modern I/O
architectures rarely use the terminology of a channel any more,
but every network card, SCSI card, USB root hub, etc. has a
specialized I/O processor that performs the same tasks
introduced by IBM in the 1960s.
Now review the timing sequence when the CPU and two
channels process the input, payroll calculations and output
tasks.
Overlapped Processing
A CPU and 2 I/O Channels
Performed by
Processing Step
Time Frame 1
Time Frame 2
Time Frame 3
Time Frame 4
Time Frame 5
Time Frame 6
Channel 1
Read Record
from Tape 1
Record 1
Record 2
Record 3
Record 4
Record 5
Record 6
CPU
Calculate Payroll
Record 1
Record 2
Record 3
Record 4
Record 5
Channel 2
Write Payroll Transaction
on Tape 2
Record 1
Record 2
Record 3
Record 4
In the first time frame the Channel 1 would read Record 1 from
the Tape 1. In the second time frame the Channel would read
the Record 2, while the CPU will perform the payroll
calculations for Record 1. In the third time frame, Channel 1
would read Record 3, the CPU will perform the payroll
calculations for Record 2, and Channel would output the
modified Record 1 to Tape 2. Sounds great?
But, one should ask if the tape device (or any storage device) is
so slow the CPU will have to wait to for the slower Channel 1
and Tape 1.
What is Record Blocking?
When one allocates a data set, they must specify the data length
of logical record and the block size (or blocking factor). The
length of the logical record is easy to understand. The payroll
department needs 200 characters to process a payroll
transaction; therefore the record length should be 200
characters.
But, consider the effects if one can tell Channel1 to read three
records at a time, instead of one record at a time.
This would be more efficient like instead of making one trip to
the pizza shop for each of three pizzas, if simply purchased
three pizzas at a time. Reading or writing multiple records at a
time is described as blocking records.
Consider overlapped processing with a block factor of 3 200-
byte records or a blocking size of 600 bytes.
Overlapped Processing
Read
and Write Three Records at a Time
A CPU and 2 I/O Channels
Performed by
Processing Step
Time Frame 1
Time Frame 2
Time Frame 3
Time Frame 4
Time Frame 5
Time Frame 6
Channel 1
Read Records
from Tape 1
Records 1, 2 and 3
Records 4, 5 and 6
CPU
Calculate Payroll
Record 1
Record 2
Record 3
Record 4
Record 5
Channel 2
Write Payroll Transaction
on Tape 2
Records 1, 2 and 3
What determines the most efficient Block size?
The most efficient blocking size is determined by the logical
record length and the specific hardware characteristics of the
storage device.
The Role of Multiprogramming and Batch Processing
Overlapped Processing and appropriate block size does not
solve all of the limitations of I/O bound systems. No matter
what, the potential for an idle processor always exists.
However, multiprogramming architectures are designed to
automatically switch to another job or task when the CPU
detects an idle condition waiting for an I/O device.
Batch processing systems, which require no user intervention,
can be scheduled at non-peak processing times.
The reality is that most large scale systems (not your laptop) are
most often process bound, i.e., too many tasks and input and
output requirements.
Other strategies to address the limitations of process bounds
systems include increase processor speed, increase RAM to
decrease virtual thrashing, the use of multicore processors,
multiprocessing and cluster architectures.
Identifying Physical Storage Devices.
Every operating system provides a system to physically identify
an I/O device and to logically identity a device. For example,
Windows may physically identify an I/O device by an interrupt,
I/O address and a DMA channel. However, users and
applications rarely identify an I/O device with those physical
attributes. Being more user-friendly a Windows user may
identify a disk as Drive C:
or an attached printer as LPT1:
Likewise z/OS physically identifies a device by a CHPID
(channel ID), switch port number, control unit address, and unit
address. Remember a control unit may have many different
devices connected to it. In PC-land, a SCSI control may have15
disk drives attached to it; each identified by a unique SCSI ID.
Likewise a IBM 3990 control unit may have many disk drives
attached to it; each identified by a unit address.
Since a z/OS Physical I/O address is complicated and maybe
static, JCL, commands, user interfaces,
and error messages use device numbers. A Device Number is a
unique combination of four hexadecimal numbers, e.g., 183F.
In theory, a Device Number is more easy to understand than a
Physical I/O address. But there is another advantage.
Assume that an existing JCL statement refers a given Physical
Unit number, e.g., a DASD unit number, instead of a Device
Number. Suppose that this unit number changes. Then all of the
JCL statements referring to that unit number needs to be change
or rewritten.
On the other hand, if the JCL contained a logical Device
Number that refers to a Physical I/O address, the Device
Number would not have to be changed on the JCL when the
Physical I/O address changes. This is exactly how Internet
domain names
are associated with an IP address work.
If Google decides to change its IP address, users do not care -
since google.com continues to work.
Just as domain names must be stored and mapped to an IP
address, so does a Device Number need to be stored and mapped
to a Physical I/O address.
A I/O control file, e.g., IOCDS (Input/Output Control Data Set)
or
IODF (Input/Outpt Definition File, maps the Physical I/O
address
to the Device Number.
During the boot process, more appropriately called IPL (Initial
Program Load) This data set is read and stored in system
memory as a Unit Control Block (UCB).
System programmers will use device numbers more than
application programmers.
When an application needs access to a data set they will need to
provide the name of data set and the device number. Given the
large number of device numbers and the possibility that the
device number may be changed, another feature will be used.
Application programmers may rely on catalog data sets.
When a data set is cataloged, the device number and disk
volume is stored. As long as data set has a unique name z/OS
looks up the data set name in the catalog to determine device
number of the DASD and volume name.
I/O Switches and I/O Directors
Original mainframe I/O architectures used a Bus and Tag cable
to directly attached one device or one chain of device managed
by a device controller to one channel. When the channel was
busy no other channel could access the device. I/O Switches and
directors permit multiple channels to be connected to multiple
storage device chains over higher speed connections. Not only
did this prevent channel bottle necks, it also enable to the
architecture to permit different LPARs to share the same
devices and provide fault tolerance.
Storage Area Networks:
ISCSI, IP Address and Port Numbers
Most modern large scale architectures are based on SAN
architectures or Storage Virtualization. SAN devices are no
longer directly attached to the server, and can be shared by
multiple servers using a variety or operating systems over long
distances. Without SAN technologies, load balancing, fail over,
data sharing, cloud computing
technologies would not be possible
Channel I/O
-
http://en.wikipedia.org/wiki/Channel_I/O
Channel subsystem (CSS) -
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.znetwork/znetwork_59.htm
Types of CCW Channels used to connect DASDs
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.znetwork/znetwork_59.htm
5. Using the following table describe the following concepts
related to data storage of auxiliary devices.
Concepts related to Storage Devices
Definition or Description
Disk Channel
Device Number or Disk Number
Disk Partition
Disk Volume
Mount Point
Master Boot Record
EFI
FDISK
IODF
6. Using the following table paste an appropriate Google image
that illustrates the concept.
Concepts related to Storage Devices
Google image that illustrates the concept.
Disk Channel
Device Number or Disk Number
Disk Partition
Disk Volume
7. Is SATA an example of a storage device or a hardware
interface?
Explain your answer:
8. Using the following table list the advantages and
disadvantages of SATA devices as compared to PATA devices.
SATA
Advantages
Disadvantages
Disk Partition
http://en.wikipedia.org/wiki/Disk_partitioning
Differences between volume, partition and drive
-
http://unix.stackexchange.com/questions/87300/differences-
between-volume-partition-and-drive
Partitions and Volumes
-
http://cquirke.mvps.org/9x/partition.htm
9. What utilities does one use to partition a Windows Hard
Drive? Answer:
10. What is the Primary Partition of a Windows Hard Drive?
Answer:
11. What is the maximum number of physical partitions that can
be created on a microcomputer disk drive?
Answer:
12. What is the function of an operating system boot loader?
Answer:
Video - What is the Bootloader in Android?
-
https://www.youtube.com/watch?v=-tXox11ngLY
GNU GRUB
-
http://en.wikipedia.org/wiki/GNU_GRUB
Securing the Windows 8 Boot Process
-
https://technet.microsoft.com/en-us/windows/dn168167.aspx
13. Complete the following table for the following popular boot
loaders.
Boot Loader
Operating System(s)
List the name of
Boot Configuration File
Grub
NTLDR
BOOTMGR
14.
In the link "Securing the Windows 8 Boot Process", list the and
explain the steps of the boot process using the following table
Windows 8 Boot Process Sequence
Explanation of the function
1. UEFI
2. OS Boot Loader
3. Loading the Kernel
4. Loading the System Drivers
5. Load the System Files
6. Load the ELAM Driver
7. Load 3
rd
Party Drivers
8. Load Anti Malware Software
9. Windows Sign-in
15.
Using the following tale describe the following categories of
rootkits.
Types of Rootkits
Description of the rootkit
Firmware Rootkits
Bootkits
Kernel Rootkits
Driver Rootkits
16.
Explain how the Windows 8 Secure Boot feature prevents
rootkits.
Answer:
17.
Explain how the Windows 8 Trusted Boot feature prevents
rootkits. Answer:
18.
Explain how the Windows 8 Early Launch Malware (ELAM)
feature prevents rootkits. Answer:
19.
Explain how the Windows 8 Measured Boot feature prevents
rootkits.
Answer:
20. What are the performance advantages of the Extensible
Firmware Interface (EFI)? Answer:
21. What are the security advantages of the Extensible Firmware
Interface (EFI)? Answer:
DVD
http://en.wikipedia.org/wiki/DVD
Blu-ray Disc
http://www.blu-ray.com/info/
Blu-ray Disc
http://en.wikipedia.org/wiki/Blu-ray_Disc
The Advantages and Disadvantages of Blu-Ray
http://ezinearticles.com/?The-Advantages-and-Disadvantages-
of-Blu-Ray&id=3368103
Digital Rights Management
http://en.wikipedia.org/wiki/Digital_rights_management
http://www.zdnet.com/blog/hardware/update-x2-avatar-blu-ray-
drm-bites-legitimate-customers/8193
22. Using the following table list and compare the storage
capacity, data transfer rates and recording technologies used
each of the following optical storage devices and media.
Optical Storage
CD
(Compact Disk)
DVD
(Digital Versatile Disk)
Blue- Ray
Storage Capacity
Data Transfer Rate
Recording Technology
23. Digital movies are available in both DVD and Blue-Ray
storage formats. Why are Blue-Ray disks replacing DVDs when
used for the digital storage of movies? Answer:
34. Use google.com and search for a good buy to add a Blue-
Ray drive to your computer, either internal or external. Copy-
and- paste your result below. Answer:
25. What is meant by "Digital Rights Management?"
Answer:
26. Which companies have been strong supporters of Digital
Rights Management?
Answer:
27. Legitimate customers have been having problems with
DRM.
What is the solution to this problem? Answer:
28. Using the following table list the advantages and
disadvantages of Blu-Ray
storage devices.
Blue-Ray Storage Devices
Advantages
Disadvantages
Universal Serial Bus
http://en.wikipedia.org/wiki/Universal_Serial_Bus
USB 3.0
Advantages and Disadvantages
http://techie-buzz.com/gadgets-news/usb-3-advantages-
disadvantages.html
Firewire
http://en.wikipedia.org/wiki/FireWire
What Is the Difference Between USB and FireWire® ?
http://www.wisegeek.com/what-is-the-difference-between-usb-
and-firewire.htm
Review the videos under the Video Folder/ Bus Architecture
Expansion Slots and Ports; Storage Technologies; Installing
Hard Drives DVDs and Other Storage Devices
Review Storage Bus Update 2010 and Managing Disks 2010
29. Using the following table list the maximum data transfer
rate for each of the following standards.
Standard
Maximum Data Transfer Rate
USB 1.0/1.1
USB 2.x
USB 3.x
FireWire 400
FireWire 800
FireWire S1600
FireWire S3200
30. Using the following table list the advantages and
disadvantages of the USB2.x/3.x interface standard..
USB 2.0/3.x
Advantages
Disadvantages
31. Using the following table list the advantages and
disadvantages of FireWire.
FireWire
Advantages
Disadvantages
Compact Flash memory
http://en.wikipedia.org/wiki/CompactFlash
Flash memory
http://en.wikipedia.org/wiki/Flash_memory
NAND flash memory -
http://whatis.techtarget.com/definition/nand-flash-memory.html
Flash Memory Utilities
http://www.sd-flash.com/file07.html
What are the disadvantages of USB Flash drives?
http://www.answers.com/Q/What_are_the_disadvantages_of_US
B_Flash_drives
Secure Digital
http://en.wikipedia.org/wiki/Secure_Digital
32. What is Flash Memory?
Answer:
33. Why is Flash Memory used for computer storage rather that
a replacement of SDRAM using for Computer memory? Answer:
34. Explain the concept of NAND and NOR memory?
Answer:
35. Compare the features and uses between NAND and NOR
memory?
Answer:
36. Using the following table list the advantages and
disadvantages of USB Memory Sticks or flash memory.
Flash Memory
Advantages
Disadvantages
37. Using the following table define the following concepts
related to Secure Digital Cards.
Secure Digital Cards
Definition
MiniSD
Class 2, 4 or 6
SDHC
SDXC
NAND
Requirement 3 Solid State Drives, NAS, SANS and TOR
Video - Introduction to Solid State Drives (SSD)
-
https://www.youtube.com/watch?v=AB-JUyQYxIw
Important to view the previous video since many of the
following questions are answered
1. What type of memory does SSD drives use?
Answer:
2. What are the differences between SSD drives as compared to
traditional hard drives?
Answer:
3. Since a SSD uses less power, which type of computer devices
and architectures will most likely benefit the most?
Answer:
4. What is function of SSD Trimming as compared to utilities
used on traditional hard drives? Answer:
5. SSD storage devices may be connected to a computer using
either SATA or PCIe interface technologies. Please explain the
pros and cons of both SATA and PCIe to connect future SSDs to
small computers and devices and enterprise systems?
Answer:
6. List and explain at least five uses of a Live CD, DVD or USB
device to boot an operating system? Answer:
NAS versus SANS
Video - NAS and SAN Introduction
-
https://www.youtube.com/watch?v=csdJFazj3h0
Important to view the previous video since many of the
following questions are answered
NAS versus SANS -
http://www.nas-san.com/differ.html
10 Advantages of SAN vs. DAS
-
http://www.serverwatch.com/trends/article.php/3925351/10-
Advantages-of-SAN-vs-DAS.htm
7. While are the advantage of NAS operating system as
compared to a traditional server operating system? Answer:
8. What type of communication hardware and network
technologies does a NAS architectures use?
Answer:
9. What type of communication hardware and network
technologies does a SAN architectures use?
Answer:
10. Using the following table explain
each of the following 10 advantages of Storage Area Networks
as compared to Directly Attached Storage.
Advantages of Storage Area Networks (SAN) as compared to
Directly Attached Storage (DAS)
Advantages of Storage Area Networks (SAN)
Explanation
1. Scalability
2. Performance
3. Data Isolation
4. Uptime
5. Workload Isolation
6. Long Distance Connectivity
7. Increased Utilization
8. Bootable
9. Centralized Management
10. Disaster Recovery
11. Explain how SANs may be used to support Load Balancing
Clusters. Answer:
12. Explain how SANs may be used to support Fail-over
Clusters. Answer:
Fibre Channel Storage Area Networks (SAN)
-
http://www-03.ibm.com/systems/storage/san/
13. What is Fibre Channel (FICON)?
Answer:
14. How does Fibre Channel relate to SCSI, IP and FICON?
Answer:
TOR - The Hidden Web ( A little more security _
Video
-
Introduction to TOR
-
https://www.youtube.com/watch?v=pyq4vwxqvSI
Video - TOR is Safe No More!
-
https://www.youtube.com/watch?v=95QfumZMerM
Video - TOR Security Concerns and Considerations
-
https://www.youtube.com/watch?v=IvaBc0Q49Ys
TOR Project
-
https://www.torproject.org/
Tor (anonymity network)
-
http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29
15. Explain the function and security implications of TOR.
Answer:
16. Why does web anonymity matter? Answer:
17. What were the U.S. Navy's interests in the development for
TOR? Answer:
18. How does TOR use Proxy servers? Answer:
19. In order for TOR to work, the Tor Project web site makes
several recommendations.
List at least three of these recommendations.
Answer:
20. How can you use TOR from a Live USB? Answer:
21. Why is the speed of TOR limited? Answer:
22. What are the problems of using TOR to connect to a illegal
web site? Answer:
23. What is the Hidden Internet (or the Deep Web) or the
".onion"
domain?
Answer:
Requirement 2
IBM Enterprise Concepts
Glossary: Text book " Introduction to the Mainframe: z/OS
Basics"
Introduction to z/OS and Processing Modes Hand outs -
Most answers are provided here.)
The videos to accompany this hand out are listed below
Video - Introduction to zOS and Processing Modes Part-1 3-14-
2014 -
http://youtu.be/TrVF5GjjmJY
Video - Introduction to zOS and Processing Modes Part-2 3-14-
2014 -
http://youtu.be/TrVF5GjjmJY
Video - Introduction to zOS and Processing Modes Part-3 3-14-
2014 -
http://youtu.be/PzrbdaGAtn8
Video - Introduction to zOS and Processing Modes Part-4 3-14-
2014 -
http://en.wikipedia.org/wiki/OS/360
http://en.wikipedia.org/wiki/Z/OS
http://en.wikipedia.org/wiki/MVS
http://en.wikipedia.org/wiki/OS/390
http://en.wikipedia.org/wiki/OpenVMS
1.7 Factors contributing to mainframe use - - Introduction to the
New Mainframe: Z/OS Basics
1. Using the following table list several of characteristics of
mainframe computers
Characteristics of Mainframe Architectures
1.
2.
3.
4.
5.
2. There are many factors that contributed to mainframe use.
Using the following table list each factor and describe and
provide an application of each factor.
Factors Attributed to Use of Mainframe Architectures
Factor
Description and application
http://en.wikipedia.org/wiki/OS/360
http://en.wikipedia.org/wiki/Z/OS
http://en.wikipedia.org/wiki/MVS
IBM System z -
http://en.wikipedia.org/wiki/IBM_System_z
OS/360 and successors -
http://en.wikipedia.org/wiki/OS/360_and_successors
What is batch processing?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
Batch processing -
http://www.webopedia.com/TERM/B/batch_processing.html
How Batch Processing Made Me 10 Times More Productive -
http://www.problogger.net/archives/2008/06/12/how-batch-
processing-made-me-10-times-more-productive/
Advantages and disadvantages of batch processing and real-time
processing?
http://wiki.answers.com/Q/Advantages_ad_disadvantages_of_ba
tch_processing_and_real-time_processing
Advantages & Disadvantages of Batch Processing -
http://www.ehow.com/list_6632199_advantages-disadvantages-
batch-processing.html
Online transaction processing -
http://en.wikipedia.org/wiki/Online_transaction_processing
Transaction processing -
http://www.webopedia.com/TERM/T/transaction_processing.ht
ml
OLTP (online transaction processing) -
http://searchdatacenter.techtarget.com/definition/OLTP
CICS (Customer Information Control System) -
http://searchdatacenter.techtarget.com/definition/CICS
3. Describe and provide an example of Batch Processing?
Answer:
4. Describe and provide an example of Transaction Processing
(Online Transaction Processing - OLTP)
Answer:
5. Use the following table to list the advantages and
disadvantages of Batch Processing?
Batch Processing
Advantages
Disadvantages
6.
Use the following table to list the advantages and disadvantages
of Transaction Processing (OLTP)?
Transaction Processing (OLTP)
Advantages
Disadvantages
7. IBM System/360 architecture and mainframe operating
system OS360 were the origins of the current IBM Z
Architecture. Using the following table answer the following
questions
Features of the IBM System/360 Architecture
Answer
32-bit or 64-bit processors?
Primary designed for batch or OLTP?
Type of User Interfaces, e.g.,
terminal, online, web, etc.
Support of
Linux Operating systems
Support for TCP/IP and Internet Services?
Support of COBOL applications
Support of Java Applications?
z/VM
http://en.wikipedia.org/wiki/Z/VM
Processing work on z/OS: How the system starts and manages
batch jobs -
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
What is TSO?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
What is ISPF?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
What is JES?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
Main Features of ISPF
-
http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.i
bm.zos.zcourses/zcourses_ispfmain_book.pdf
ISPF Primary menu and Datasets -
http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.i
bm.zos.zcourses/zcourses_ispfpdf_book.pdf
ISPF Data Sets
http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.i
bm.zos.zcourses/zcourses_ispfdsbasics_book.pdf
ISPF
http://en.wikipedia.org/wiki/ISPF
9. What z/OS subsystem manages the execution of batch
program, i.e., batch processing?
Answer:
10. Historically, the only interface to manage and execute jobs
on an IBM operating system was keypunch cards.
The popular command line interface that programs use to access
IBM operating systems, manage jobs, perform system program
tasks is called?
Answer:
11. What is the z/OS component (subsystem) that provides
OLTP processing services for user transactions, e.g., inquiry to
account balances, adding employee information into a database,
etc. using legacy programming languages, e.g., COBOL?
Answer:
12. z/OS is a full feature operating system that executes IBM
legacy applications.
z/OS frequently runs under Z/VM as a guest operating.
What is the function of the z/VM?
Answer:
13. What is the relationship between z/VM, z/OS and zLinux
IBM Enterprise systems? Answer:
What is JES?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
What is a data set?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
What is a VTOC?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
VSAM Catalogs -
http://www.exforsys.com/tutorials/mainframe/vsam-
catalogs.html
Difference between catalog and vtoc -
http://ibmmainframeforum.com/viewtopic.php?f=6&t=1327
Direct access storage device -
http://en.wikipedia.org/wiki/Direct_access_storage_device
z/OS UNIX file systems
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
What is z/OS UNIX?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
Clustering: A basic 101 tutorial -
http://www.ibm.com/developerworks/aix/tutorials/clustering/
LPAR -
http://www.pcmag.com/encyclopedia_term/0,1237,t=LPAR&i=4
6363,00.asp
Logical partition (virtual computing platform) -
http://en.wikipedia.org/wiki/Logical_partition_(virtual_computi
ng_platform)
Introduction to JCL
http://publibz.boulder.ibm.com/zoslib/books/tutorials/introjcl/in
dex.htm?noframes=true
IBM Parallel Sysplex
http://en.wikipedia.org/wiki/IBM_Parallel_Sysplex
What is a Parallel Sysplex 1443?
http://www-03.ibm.com/systems/z/advantages/pso/sysover.html
Rexx -
http://en.wikipedia.org/wiki/Rexx
What is Rexx? -
http://www.rexxla.org/rexxlang/
OS/2 REXX: From Bark to Byte -
http://www.redbooks.ibm.com/redbooks/pdfs/gg244199.pdf
Implementing REXX ot Support in SDSF -
http://www.redbooks.ibm.com/redbooks/pdfs/sg247419.pdf
What is a z/OS catalog?
https://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconcepts_172.htm
14. Given the following IBM Enterprise Concepts
IBM Enterprise Concepts
Concept
Description
JES
LPAR
VTOC
DASD
Data Set
JCL
Sysplex
Catalog
CICS
REXX
ISPF
TSO
3270 Terminal
15. From your previous research of use lookup images using
Google, paste an image that best illustrates the following
concepts in the table.
IBM Enterprise Concepts
Concept
Image
JES
LPAR
VTOC
DASD
Data Set
JCL
SysPlex
Catalog
CICS
REXX
ISPF
TSO
3270 Terminal
16. What concept in Windows is comparable to IBM datasets?
Answer:
Disk Volume (computing) -
http://en.wikipedia.org/wiki/Volume_%28computing%29
Disk volume -
http://searchstorage.techtarget.com/definition/volume
What is difference between volume and disk -
http://www.storagecraft.com/support/forum/what-difference-
between-volume-and-disk
Volume Label -
http://pcsupport.about.com/od/termsv/g/volume-label.htm
5.6 How data sets are named - - Introduction to the New
Mainframe: Z/OS Basics PDF
What are DASD volumes and labels? -
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconcepts_151.htm
17. What are DASD volumes and labels?
Answer:
18. On what type of device may data sets be stored?
Answer:
19. How are data sets named? Answer:
20. What is the difference between a VTOC and a catalog
Answer:
21. VTOC is similar to which storage concept in Windows?
Answer:
22. Partitioned Data Set is similar to which storage concept in
Windows? Answer:
What is VSAM? -
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconcepts_169.htm
Virtual Storage Access Method
(VSAM)
-
http://en.wikipedia.org/wiki/VSAM
VSAM Demystified (Chapter 1) -
http://www.redbooks.ibm.com/redbooks/pdfs/sg246105.pdf
Key-sequenced data set (KSDS) -
http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp
?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqncd_data_set.ht
ml
Relative record data set (RRDS) -
http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp
?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqncd_data_set.ht
ml
Entry-sequenced data set (ESDS) -
http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp
?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqncd_data_set.ht
ml
Record-oriented filesystem -
http://en.wikipedia.org/wiki/Record-oriented_filesystem
Introduction to Partitioned Data Sets -
http://docweb.cns.ufl.edu/docs/d0068/ar01.html
23. An IBM 3270 terminal is used with what z/OS operating
interactive facility? Answer:
24. What is VSAM?
What is VSAM used for? Answer:
25. IBM files are record-oriented. Windows and Linux files are
byte-oriented.
When Windows or Linux stores files, e.g., a Word Document it
stores the contents of the files as a contiguous series of bytes
until the end of the file.
On the other hand, a record is a group of related data, words, or
fields treated as a meaningful unit; for instance, a Name,
Address, and Telephone Number can be a "Personal Record".
Therefore, IBM files were primarily designed to store business
data rather than a Word document or graphic file.
What were the advantages of the IBM record-oriented files.
Answer:
26. Using the following table describe each of the following
VSAM Dataset types that are used to store business transaction
data.
VSAM DataSets Organization
Dataset
Type
Description
Key-sequenced data set (KSDS)
Entry-sequenced data set (ESDS)
Relative record data set (RRDS)
Linear data set (LDS)
27. As an alternative to a VSAM dataset
IBM
provides for a Partitioned Dataset . Describe how a Partition
data set stores data? Answer:
28. What type of data is normally stored in a Partitioned data
set?
Answer:
29. Using Google find an appropriate image that illustrates the
concept of a Partitioned Data Set
Answer:
30. Within the structure of IBM JCL what is a JOB? Answer:
31. Within the structure of IBM JCL what is a DD statement
Answer:
IMS
http://en.wikipedia.org/wiki/Information_Management_System
Hierarchical database systems
http://en.wikipedia.org/wiki/Hierarchical_database
DB2
http://en.wikipedia.org/wiki/IBM_DB2
RACF -
http://en.wikipedia.org/wiki/RACF
32. What are the functions provided by IBM's IMS Product Line
(Information Management System)? Answer:
33. What are the functions provided by IBM's DB2 product
line? Answer:
Security on z/OS -
http://wwwlgis.informatik.uni-
kl.de/cms/fileadmin/users/kschmidt/mainframe/lutzkuehner/Cha
pter11_Security_on_zOS_slides.pdf
What is RACF? -
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zsecurity/zsecc_042.htm
Resource Access Control Facility -
http://en.wikipedia.org/wiki/Resource_Access_Control_Facility
Security on z/OS
http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.i
bm.zos.zsecurity/zsecurity_book.pdf
SNA
http://en.wikipedia.org/wiki/IBM_Systems_Network_Architectu
re
Networking on Z/OS
http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.i
bm.zos.znetwork/znetwork_book.pdf
34.
What are the functions and features provided by IBM's RACF
product line (Resource Access Control Facility)? Answer:
35. What are the functions provided by IBM's SAF?
Answer:
36.
What is function of SNA?
Answer:
37. How is SNA related to TCP/IP? Answer:
38. What is IBM Web Sphere? Answer:
39. What is IBM Web Sphere MQ? Answer:

More Related Content

More from annrodgerson

Assignment 2 Explain the difference between the following 1. A .docx
Assignment 2 Explain the difference between the following 1. A .docxAssignment 2 Explain the difference between the following 1. A .docx
Assignment 2 Explain the difference between the following 1. A .docxannrodgerson
 
Assignment 2 Exploring the Art of Indigenous Cultures Part 1All .docx
Assignment 2 Exploring the Art of Indigenous Cultures Part 1All .docxAssignment 2 Exploring the Art of Indigenous Cultures Part 1All .docx
Assignment 2 Exploring the Art of Indigenous Cultures Part 1All .docxannrodgerson
 
Assignment 2 Ethical (Moral) RelativismIn America, many are comfo.docx
Assignment 2 Ethical (Moral) RelativismIn America, many are comfo.docxAssignment 2 Ethical (Moral) RelativismIn America, many are comfo.docx
Assignment 2 Ethical (Moral) RelativismIn America, many are comfo.docxannrodgerson
 
Assignment 2 Discussion—Risk Factors and Protective FactorsResear.docx
Assignment 2 Discussion—Risk Factors and Protective FactorsResear.docxAssignment 2 Discussion—Risk Factors and Protective FactorsResear.docx
Assignment 2 Discussion—Risk Factors and Protective FactorsResear.docxannrodgerson
 
Assignment 2 Discussion—The Impact of CommunicationRemember a tim.docx
Assignment 2 Discussion—The Impact of CommunicationRemember a tim.docxAssignment 2 Discussion—The Impact of CommunicationRemember a tim.docx
Assignment 2 Discussion—The Impact of CommunicationRemember a tim.docxannrodgerson
 
Assignment 2 Discussion—Migration and ImmigrationGlobalization .docx
Assignment 2 Discussion—Migration and ImmigrationGlobalization .docxAssignment 2 Discussion—Migration and ImmigrationGlobalization .docx
Assignment 2 Discussion—Migration and ImmigrationGlobalization .docxannrodgerson
 
Assignment 2 Discussion Research Questions for Correlational and.docx
Assignment 2 Discussion Research Questions for Correlational and.docxAssignment 2 Discussion Research Questions for Correlational and.docx
Assignment 2 Discussion Research Questions for Correlational and.docxannrodgerson
 
Assignment 2 Discussion QuestionCorporate leaders often encount.docx
Assignment 2 Discussion QuestionCorporate leaders often encount.docxAssignment 2 Discussion QuestionCorporate leaders often encount.docx
Assignment 2 Discussion QuestionCorporate leaders often encount.docxannrodgerson
 
Assignment 2 DiscussionDuring Module 5, we have studied socia.docx
Assignment 2 DiscussionDuring Module 5, we have studied socia.docxAssignment 2 DiscussionDuring Module 5, we have studied socia.docx
Assignment 2 DiscussionDuring Module 5, we have studied socia.docxannrodgerson
 
Assignment 2 Discussion Question Comparison of Theories on Anxie.docx
Assignment 2 Discussion Question Comparison of Theories on Anxie.docxAssignment 2 Discussion Question Comparison of Theories on Anxie.docx
Assignment 2 Discussion Question Comparison of Theories on Anxie.docxannrodgerson
 
Assignment 2 Discussion - Global ManagementThis assignment is d.docx
Assignment 2 Discussion - Global ManagementThis assignment is d.docxAssignment 2 Discussion - Global ManagementThis assignment is d.docx
Assignment 2 Discussion - Global ManagementThis assignment is d.docxannrodgerson
 
Assignment 2 Demographic TransitionsDemographic transition is the.docx
Assignment 2 Demographic TransitionsDemographic transition is the.docxAssignment 2 Demographic TransitionsDemographic transition is the.docx
Assignment 2 Demographic TransitionsDemographic transition is the.docxannrodgerson
 
Assignment 2 Current Events and U.S. DiplomacyThis paper will be .docx
Assignment 2 Current Events and U.S. DiplomacyThis paper will be .docxAssignment 2 Current Events and U.S. DiplomacyThis paper will be .docx
Assignment 2 Current Events and U.S. DiplomacyThis paper will be .docxannrodgerson
 
Assignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docxAssignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docxannrodgerson
 
Assignment 2 Decision-making and Philosophy Part II Philosophy and.docx
Assignment 2 Decision-making and Philosophy Part II Philosophy and.docxAssignment 2 Decision-making and Philosophy Part II Philosophy and.docx
Assignment 2 Decision-making and Philosophy Part II Philosophy and.docxannrodgerson
 
Assignment 2 Court StandardsTasksExplore court standards, rule.docx
Assignment 2 Court StandardsTasksExplore court standards, rule.docxAssignment 2 Court StandardsTasksExplore court standards, rule.docx
Assignment 2 Court StandardsTasksExplore court standards, rule.docxannrodgerson
 
Assignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docx
Assignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docxAssignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docx
Assignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docxannrodgerson
 
Assignment 2 Construction Law PaperIn this assignment, you wi.docx
Assignment 2 Construction Law PaperIn this assignment, you wi.docxAssignment 2 Construction Law PaperIn this assignment, you wi.docx
Assignment 2 Construction Law PaperIn this assignment, you wi.docxannrodgerson
 
Assignment 2 Community Prevention ProgramAfter hearing that a nei.docx
Assignment 2 Community Prevention ProgramAfter hearing that a nei.docxAssignment 2 Community Prevention ProgramAfter hearing that a nei.docx
Assignment 2 Community Prevention ProgramAfter hearing that a nei.docxannrodgerson
 
Assignment 2 Communicating Bad News Leaders and managers often ha.docx
Assignment 2 Communicating Bad News Leaders and managers often ha.docxAssignment 2 Communicating Bad News Leaders and managers often ha.docx
Assignment 2 Communicating Bad News Leaders and managers often ha.docxannrodgerson
 

More from annrodgerson (20)

Assignment 2 Explain the difference between the following 1. A .docx
Assignment 2 Explain the difference between the following 1. A .docxAssignment 2 Explain the difference between the following 1. A .docx
Assignment 2 Explain the difference between the following 1. A .docx
 
Assignment 2 Exploring the Art of Indigenous Cultures Part 1All .docx
Assignment 2 Exploring the Art of Indigenous Cultures Part 1All .docxAssignment 2 Exploring the Art of Indigenous Cultures Part 1All .docx
Assignment 2 Exploring the Art of Indigenous Cultures Part 1All .docx
 
Assignment 2 Ethical (Moral) RelativismIn America, many are comfo.docx
Assignment 2 Ethical (Moral) RelativismIn America, many are comfo.docxAssignment 2 Ethical (Moral) RelativismIn America, many are comfo.docx
Assignment 2 Ethical (Moral) RelativismIn America, many are comfo.docx
 
Assignment 2 Discussion—Risk Factors and Protective FactorsResear.docx
Assignment 2 Discussion—Risk Factors and Protective FactorsResear.docxAssignment 2 Discussion—Risk Factors and Protective FactorsResear.docx
Assignment 2 Discussion—Risk Factors and Protective FactorsResear.docx
 
Assignment 2 Discussion—The Impact of CommunicationRemember a tim.docx
Assignment 2 Discussion—The Impact of CommunicationRemember a tim.docxAssignment 2 Discussion—The Impact of CommunicationRemember a tim.docx
Assignment 2 Discussion—The Impact of CommunicationRemember a tim.docx
 
Assignment 2 Discussion—Migration and ImmigrationGlobalization .docx
Assignment 2 Discussion—Migration and ImmigrationGlobalization .docxAssignment 2 Discussion—Migration and ImmigrationGlobalization .docx
Assignment 2 Discussion—Migration and ImmigrationGlobalization .docx
 
Assignment 2 Discussion Research Questions for Correlational and.docx
Assignment 2 Discussion Research Questions for Correlational and.docxAssignment 2 Discussion Research Questions for Correlational and.docx
Assignment 2 Discussion Research Questions for Correlational and.docx
 
Assignment 2 Discussion QuestionCorporate leaders often encount.docx
Assignment 2 Discussion QuestionCorporate leaders often encount.docxAssignment 2 Discussion QuestionCorporate leaders often encount.docx
Assignment 2 Discussion QuestionCorporate leaders often encount.docx
 
Assignment 2 DiscussionDuring Module 5, we have studied socia.docx
Assignment 2 DiscussionDuring Module 5, we have studied socia.docxAssignment 2 DiscussionDuring Module 5, we have studied socia.docx
Assignment 2 DiscussionDuring Module 5, we have studied socia.docx
 
Assignment 2 Discussion Question Comparison of Theories on Anxie.docx
Assignment 2 Discussion Question Comparison of Theories on Anxie.docxAssignment 2 Discussion Question Comparison of Theories on Anxie.docx
Assignment 2 Discussion Question Comparison of Theories on Anxie.docx
 
Assignment 2 Discussion - Global ManagementThis assignment is d.docx
Assignment 2 Discussion - Global ManagementThis assignment is d.docxAssignment 2 Discussion - Global ManagementThis assignment is d.docx
Assignment 2 Discussion - Global ManagementThis assignment is d.docx
 
Assignment 2 Demographic TransitionsDemographic transition is the.docx
Assignment 2 Demographic TransitionsDemographic transition is the.docxAssignment 2 Demographic TransitionsDemographic transition is the.docx
Assignment 2 Demographic TransitionsDemographic transition is the.docx
 
Assignment 2 Current Events and U.S. DiplomacyThis paper will be .docx
Assignment 2 Current Events and U.S. DiplomacyThis paper will be .docxAssignment 2 Current Events and U.S. DiplomacyThis paper will be .docx
Assignment 2 Current Events and U.S. DiplomacyThis paper will be .docx
 
Assignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docxAssignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docx
 
Assignment 2 Decision-making and Philosophy Part II Philosophy and.docx
Assignment 2 Decision-making and Philosophy Part II Philosophy and.docxAssignment 2 Decision-making and Philosophy Part II Philosophy and.docx
Assignment 2 Decision-making and Philosophy Part II Philosophy and.docx
 
Assignment 2 Court StandardsTasksExplore court standards, rule.docx
Assignment 2 Court StandardsTasksExplore court standards, rule.docxAssignment 2 Court StandardsTasksExplore court standards, rule.docx
Assignment 2 Court StandardsTasksExplore court standards, rule.docx
 
Assignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docx
Assignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docxAssignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docx
Assignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docx
 
Assignment 2 Construction Law PaperIn this assignment, you wi.docx
Assignment 2 Construction Law PaperIn this assignment, you wi.docxAssignment 2 Construction Law PaperIn this assignment, you wi.docx
Assignment 2 Construction Law PaperIn this assignment, you wi.docx
 
Assignment 2 Community Prevention ProgramAfter hearing that a nei.docx
Assignment 2 Community Prevention ProgramAfter hearing that a nei.docxAssignment 2 Community Prevention ProgramAfter hearing that a nei.docx
Assignment 2 Community Prevention ProgramAfter hearing that a nei.docx
 
Assignment 2 Communicating Bad News Leaders and managers often ha.docx
Assignment 2 Communicating Bad News Leaders and managers often ha.docxAssignment 2 Communicating Bad News Leaders and managers often ha.docx
Assignment 2 Communicating Bad News Leaders and managers often ha.docx
 

Recently uploaded

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 

Recently uploaded (20)

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 

Assignment 2 Directions Enter your Name Here =è XXXXXXXXXX.docx

  • 1. Assignment 2 Directions Enter your Name Here = è XXXXXXXXXX Assignment 2 is divided into two documents: Assignment 2 Theory (50% of the assignment grade) and Assignment 2 Hands- on (50% of the assignment grade). Most requirements of this assignment will require you to research answers from your text book (you must read the text book to get some answers), from the Internet, or any other reasonable source. Many Internet sources, video links, text book and Blackboard presentation reference are provided to help you START your research. I have found that any single Internet source is very incomplete and the format may not conducive for most answers required. Some students do not READ the text book or review the Power Point presentation provided to you in Blackboard. Some answers are only available from my power point presentations or update notes. You may cut-and-paste answers whenever appropriate, you should take care to synthesize your answers to include multiple sources. I would be impressed that you consult a Google image search and paste and
  • 2. appropriate image to supplement your answer. While I permit cut-and-paste, I do expect you use your own words so that you: 1. Organize the answer 2. Demonstrate that you have read what you have cut-and-pasted 3. Use any means that clearly displays that you have gained knowledge. If you are LEARNING the subject matter there should be no problem. If you cut-and-paste and pray that it might answer the question you will be penalized. I hate irrelevant cut-and-paste BS. The content of each student's assignment may NOT be copied from any other current or past student enrolled in this class. Each assignment is to be prepared by ONE student. Assignments are NOT a group-prepared assignment. Copying and pasting assignment any portion of the requirements from another student either enrolled in the current semester and or a previous semester is an act of plagiarism according to the RMU Academic Integrity Policy. Any assignment found to be "too much alike" will be subject to a grade of zero for all parties concerned. Such an act constitutes
  • 3. a violation of the Robert Morris University Academic Integrity Policy. The instructor reserves the right to review past assignments with students who are unable to prepare assignments during the hands-on portion of the exam to determine the student's mastery of the assignment's objectives. The assignment grade based upon the result of the instructor's review. On-ground tests may be used to compare the student’s knowledge to performance on assignments. All acts of plagiarism will be submitted the RMU Academic Integrity Board to determine university-wide penalties. You, however, may discuss assignment requirements, assist other students with debugging programs or other hands-on- requirements, tutor students, or provide other advice that may assist the students in acquiring knowledge. But the actual preparation of an individual assignment must have been completely prepared by the student who submitted the assignment. Sections of the assignments may be copied from the internet as per the individual assignment's directions. Please contact the instructor if you need assistance interpreting this RMU Academic Integrity Policy. You are to enter all answers or Prtscrn requirements into this Word Document.
  • 4. You are not permitted to submit any other document format, e.g., Wordpad, PDFs, etc. that is not based on this original Word document. This document contains hidden internal markers and applications that will track the version of this assignment and your assignment progress. You MUST submit the assignments using the Word document(s) provided you. You may not use any other word processor, except Microsoft Word. Do not use Open Office DOCX files. When an instructor has possession of an electronic document it is very easy to detect plagiarism. Many instructors use Turnitin assignments, which is applicable to assignments that permit cut- and-paste as this assignment. It is very easy to compare multiple copies of word documents (see link below). Microsoft provides a variety of FREE anti-plagiarizing tools. And there is a wide variety of tools that can analyze hidden information within a Word document (see sample link below). Changing fonts, margins and spacing does not do it anymore. Even when individuals try to artificially change content, a Word document contains hidden markers that may provide an audit trail to find previous authors and computer systems who have edited the document.
  • 5. Comparing and merging Microsoft Word documents - http://support.microsoft.com/kb/306484 Compare documents side by side - http://office.microsoft.com/en-us/word-help/compare- documents-side-by-side-HA010102251.aspx Fight crime. Unravel incidents... one byte at a time. http://computer- forensics.sans.org/community/papers/gcfa/computer-forensics- investigation-image-file-analysis_170 Why am I providing some of this detailed information? There are several reasons. 1) The real world exists outside this class. A student in this class must be aware of the dangers when organizations or individuals provide electronic copies to others, e.g., an email attachment. 2) The objective of this assignment is to "introduce" minimal knowledge that is required in the real world. If you do not acquire this minimal knowledge, you will significantly harm your employment, income, promotion and retention potentials. If you do not want to do the hard work, I can recommend a
  • 6. better alternative to plagiarism - get a new major or career plan. Perhaps you can star in a reality TV show. 3) The majority of my students will exert the effort and submit excellent assignments. I will use many of the previous tools as time permits to ensure that you do not steal their grade. I really don't understand why a student would provide a student with a copy of their assignment when they are competing in the same job market. In my class both the original author and the plagiarizer will be punished. If you do not have a copy of WORD , you may use VMWARE VIEW (available from the RMU website) to access a virtual lab computer which contains any software needed for this course. http://www.rmu.edu/web/cms/departments- offices/administration-services/it/Pages/vmware-view.aspx NEVER STORE ANY DOCUMENTS ON THE DESKTOP OF VMWARE VIRTUAL COMPUTER. You will lose your document. It is preferable to store you documents on a local flash drive. Since the quiz and test questions are based on your researched answers, I would recommend that you refer to any quiz questions on the assignment topics to ensure that your
  • 7. assignment answer is complete. Some quiz answers will NOT be provided to you unless 75% of your answers from practice attempts are correct. YOU MUST enter your name in the beginning of this document as provided and "Save As" this document using a new name that includes your name and the assignment number, e.g., Bob Jones Assignment 2.docx When completed, submit the FINAL version of this document to Blackboard under the Assignment folder for this individual assignment. I NEVER ACCEPT AN ASSIGNMENT AS AN EMAIL ATTACHMENT FOR ANY REASON. If you made an error on an assignment you may request that the previous assignment submission be cleared so that you may resubmit the assignment again. Please only submit a completed assignment. All assignments must use the original Word Document format. Wordpad, PDFs, etc. formats are not permitted.
  • 8. While the assignments have a recommended due date, I do not penalized your assignment grade if you are slightly late. Please do not send me an email if you are going to submit your assignment late. I assume you have a good excuse. Documenting your Results Some requirements specify that you perform a specific action, e.g., access a web site, execute a command, etc. You will need to provide evidence that you performed this task. There are two techniques 1. Window 7 Snipping Tool - http://www.youtube.com/watch?v=Ax75dA1TGU0 2) Alt-PrtScrn - Available for all versions of Windows 1) Once the web site or the results of the command is displayed hold down the ALT key and press the Prtsc. Some laptops may require you to press the FN key to perform this action. 2) Position the cursor to answer the question in this Word document. 3) Press Ctrl-V or select Edit/paste. To make your graphic more controllable in a Word Document,
  • 9. after pasting 1) Right-click and select Format Picture, 2) Click on the Layout tab, and 3) Select Square ( You may also other justification settings). Now you graphic will flow with text better and can be sized more easily. Page 117-14 Requirement 1 Virtual Memory Operating Systems, Paging and Storage Protection Many Definitions may be found in the Glossary of the Introduction to the New Mainframe: Z/OS Basics books. You can down load a PDF copy of this text book from Blackboard/Course Documents How Operating Systems Work - http://computer.howstuffworks.com/operating-system.htm Virtual address space - http://en.wikipedia.org/wiki/Virtual_address_space Address space - http://searchstorage.techtarget.com/definition/address-space What is virtual memory, how is it implemented, and why do operating systems use it?
  • 10. http://www.programmerinterview.com/index.php/operating- systems/how-virtual-memory-works/ What are the advantages and disadvantages of virtual memory? http://answers.yahoo.com/question/index?qid=20080928221645 AAFAg23 These videos have been written for Unix, but many of the concepts can be applied to all operating systems Video - Virtual Memory - Part 1 - http://www.youtube.com/watch?v=iqfjWIYyQ9k Video - Virtual Memory - Part 2 - http://www.youtube.com/watch?v=4px3RrDBa6w Video - Page Replacement - http://www.youtube.com/watch?v=M0d-vLw5Eyk Video - Process Management - http://www.youtube.com/watch?v=mHPySA51t18 Video - Processes - Part I - http://www.youtube.com/watch?v=TIa2mhKCeYo Video - Processes - Part II - http://www.youtube.com/watch?v=_5EV7isUJ6k 3.4.4 Virtual storage overview - Introduction to the New
  • 11. Mainframe: Z/OS Basics - Please read 1. What is advantage of a virtual memory (storage) operating system? Answer: 2. What is disadvantage of a virtual memory (storage) operating system? Answer: All programs to be executed must be loaded into the memory (RAM) of the computer. Programs and data must be copied from storage, e.g., a disk, and loaded in to RAM by an operating system program call a loader. In a multitasking operating system user programs must be stored in RAM a manner that doesn't overlap or conflict with other user or operating system programs
  • 12. In addition, user and system programs need a way to communicate with each other. If an operating system controls the hardware then a user program needs a communication method to ask the operating system to print output or store data on a disk. Introduction to the New Mainframe: Z/OS Basics - Glossary 3.4.2 What is an address space? - Introduction to the New Mainframe: Z/OS Basics - please read 3.4.3 What is dynamic address translation? - Introduction to the New Mainframe: Z/OS Basics - please read 3.4.4 Virtual storage overview - Introduction to the New Mainframe: Z/OS Basics - please read 3.4.5 What is paging? - Introduction to the New Mainframe: Z/OS Basics - please read 3.4.7 What is Storage Protection? - Introduction to the New Mainframe: Z/OS Basics - please read
  • 13. 3. Using the following table write a discussion of following z/OS memory concepts and functions z/OS Memory Concepts and Functions Concept Description Address Space ASID (Address Space ID) Task Control Block Private Space Storage (Protection) Keys Dynamic Address Translation (DAT) z/OS address spaces are divided into three areas: Region, Segment and Page. z/OS uses these concepts in dynamic address translation find the virtual location of a specified area of memory. While at first these concepts may sound confusing assume that visitor from Ireland wanted to find my home. Would they start searching at the first street in New York City - obviously no First, we would start by asking which state do you want to locate (which Region)? Second, one would ask which city
  • 14. within the state do you want to locate (the segment table)? Third, which street within the city do you want to locate (the page table)? Finally, one can sequentially search all houses on the street or simply use the house address (the byte offset). Likewise, a virtual address uses a similar approach to uniquely identify a virtual address location and to quickly find the address later when needed. 4. Using the following table identify each virtual address concept. z/OS Virtual Address Concepts Concept Function and Description Region Segment Page Byte Offset
  • 15. 5. How many bits are in a z/OS virtual address? Answer: 6. The maximum of amount virtual address space the z/OS can manage is ____? Answer: 11. Using the following table, list the concept that best describes a type of page, or addressable unit. z/OS Addressable Units Concept Description A page or 4K block in central storage is called _______
  • 16. A page or 4K block in virtual storage is called _______ A page or 4K block in auxiliary is called _______ 12. When a program is selected for execution, z/OS first brings the program into which type of storage? Answer: Page faults http://www.programmerinterview.com/index.php/operating- systems/paging-and-page-faults/ What is the purpose of swapping? http://www.programmerinterview.com/index.php/operating- systems/purpose-of-swapping/ What is the difference between a thread and a process? http://www.programmerinterview.com/index.php/operating- systems/thread-vs-process/ 13. z/OS uses a series of tables to determine whether a page is located in real storage or auxiliary storage. Only pages within
  • 17. real storage can be executed. Auxiliary storage is used to extend the real memory. Using the following table describe each of the following z/OS paging concepts. z/OS Virtual Paging Concepts Concept Description Page fault Page-in Page-out Page Stealing Unreferenced interval count Swapping System Resource Manager Workload Manager Thrashing 14. Which pages are the most likely candidates to be stolen when using Page stealing? Answer:
  • 18. Chapter 3: Overview of z/OS : Introduction to the Mainframe: z/OS basics ( pages 114 - 134) Program Status Word http://publib.boulder.ibm.com/infocenter/zvm/v5r4/index.jsp?to pic=/com.ibm.zvm.v54.hcpc1/psw1.htm Operating Systems and Program Status Word http://www.edwardbosworth.com/My3121Textbook_HTM/MyTe xt3121_Ch29_V01.htm Storage Protect Keys http://publib.boulder.ibm.com/infocenter/pseries/v5r3/index.jsp ?topic=/com.ibm.aix.genprogc/doc/genprogc/storage_protect_ke ys.htm What is storage protection? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t opic=/com.ibm.zos.zconcepts/zconcepts_95.htm IBM PSW and Storage Protect Key - http://research.microsoft.com/en- us/um/people/gbell/Computer_Structures__Readings_and_Exam
  • 19. ples/00000616.htm Each executing program in an address space has a unique program status word associated with it. Also, within each program status word there is storage protect key. 15. What is the purpose of a Program Status Word (PSW)? Answer: 16. What is the purpose of using a private address space for each user? Answer: 17. What is the function of a storage protect key? Answer:
  • 20. 18. A storage protect key of 0 thru 7 indicates that a program is which type of program? Answer: 19. A storage protect key of 8 indicates that a program is which type of program? Answer: 20. A storage protect key of 9 thru 15 indicates that a program is which type of program? Answer: Requirement 2 Storage Devices, Expansion Busses and Slots
  • 21. Review the videos under the Video Folder/ Bus Architecture Expansion Slots and Ports; Storage Technologies; Installing Hard Drives DVDs and Other Storage Devices Review Storage Bus Update 2010 and Managing Disks 2010 Video - Adding Hard Drives and Creating Volumes in Windows Server 2012 - https://www.youtube.com/watch?v=s4E6WcZKxRc Video - How a Hard Drive works - https://www.youtube.com/watch?v=rREkzeoJz1s Video: How to Install a SATA Hard Drive http://www.youtube.com/watch?v=zTzEp7dHWYY How Hard Disks Work - http://computer.howstuffworks.com/hard-disk.htm
  • 22. data transfer rate - http://www.webopedia.com/TERM/D/data_transfer_rate.html PCI Express - http://en.wikipedia.org/wiki/PCI_Express How PCI Express Works - http://computer.howstuffworks.com/pci-express.htm Serial ATA - http://en.wikipedia.org/wiki/Serial_ATA What are PATA and SATA? - http://hexus.net/tech/tech-explained/storage/1339-pata-vs-sata/ IOPS - http://en.wikipedia.org/wiki/IOPS
  • 23. IOPS versus Throughput – Measuring Performance of Your Storage - http://timradney.com/2012/07/06/iops-verses-throughput/ How to convert MBps to IOPS or calculate IOPS from MB/s - http://www.ssdfreaks.com/content/599/how-to-convert-mbps-to- iops-or-calculate-iops-from-mbs An explanation of IOPS and latency - http://recoverymonkey.org/2012/07/26/an-explanation-of-iops- and-latency/ SSD Interface Comparison: PCI Express vs SATA - http://www.overclock.net/t/1489684/ssd-interface-comparison- pci-express-vs-sata Why SSDs are Transitioning from SATA to PCIe in the Next Gen Form Factor - http://www.tested.com/tech/pcs/456464-why-ssds-are- transitioning-sata-pcie-next-gen-form-factor/
  • 24. Live USB - http://en.wikipedia.org/wiki/Live_USB 5 ways to use bootable Linux live discs - http://www.computerworld.com/article/2519158/linux/5-ways- to-use-bootable-linux-live-discs.html Take a Secure Desktop Everywhere: Everything You Need to Know About Linux Live CDs and USB Drives - http://www.howtogeek.com/172810/take-a-secure-desktop- everywhere-everything-you-need-to-know-about-linux-live-cds- and-usb-drives/ What are the advantages and disadvantages of always running Ubuntu in “Try” mode? - http://askubuntu.com/questions/481057/what-are-the- advantages-and-disadvantages-of-always-running-ubuntu-in-try- mode Serial ATA http://en.wikipedia.org/wiki/Serial_ATA A Guide to Serial ATA http://www.pcmech.com/article/a-guide-to-serial-ata/ Install a New Hard Drive in Five Easy Steps http://computershopper.com/hard-drives-burners/howto/install-
  • 25. a-new-hard-drive-in-five-easy-steps Data cluster - http://en.wikipedia.org/wiki/Data_cluster Block Storage - http://en.wikipedia.org/wiki/Block_%28data_storage%29 1. Using the following table describe the following concepts related to data storage of auxiliary devices. Concepts related to Storage Devices Definition or Description Disk Cylinder Disk Track Disk Sector Data Cluster Data Block Data Transfer Rate
  • 26. Seek Time Throughput MBPS IOPS SATA PATA 2. Using the following table paste an appropriate Google image that illustrates the concept. Concepts related to Storage Devices Google image that illustrates the concept. Disk Cylinder Disk Track Disk Sector Data Cluster Data Block Data Transfer Rate Seek Time Throughput
  • 27. MBPS IOPS SATA PATA 3. In what type of applications is an IOPS throughout measurement standard more important than MBPS? Explain your answer: 4. In what type of applications is a MBPS throughout measurement standard more important than IOPS? Explain your answer:
  • 28. Introduction to Disk I/O There are three architectures that can be used to connect Disk /O devices, e.g., DASDs, tapes and printers, to a computer: 1) Directed Attached Storage (DAS), 2) Network Attached Storage (NAS), and 3) Storage Area Networks (SAN). The following diagram illustrates three legacy storage architectures used for Direct Attached Storage (DAS). What is an I/O Channel? Mainframes introduced the I/O Channel architecture to support overlapped processing and multiprogramming. Assume that a computer was to input payroll data stored on tape
  • 29. and then output a payroll transaction record to a second tape device. Review the timing sequence when the CPU was required to process the input, payroll calculations and output tasks. Non Overlapped Processing No Channels or I/O Processors Performed by Processing Step Time Frame 1 Time Frame 2 Time Frame 3 Time Frame 4 Time Frame 5 Time Frame 6 CPU Read Record from Tape 1 Record 1 Record 2 CPU Calculate Payroll Record 1 Record 2
  • 30. CPU Write Payroll Transaction on Tape 2 Record 1 Record 3 The CPU was required to perform all input, calculation and output processing steps. In the first time frame the CPU would read Record 1 from the Tape 1. In the second time frame the CPU will perform the payroll calculations for Record 1, and in the third time frame the CPU would output the modified Record 1 to Tape 2. Given the relative difference in performance between CPUs and Tape devices in the 1960s, the CPU would be idle 98% of the processing time waiting for the slower tape device. Non overlapped systems were I/O Bound, i.e., the CPU was underutilized. While the previous picture seems to imply that an I/O channel is a connector, an I/O Channel is actual a specialized I/O processor designed to work with the CPU. Modern I/O architectures rarely use the terminology of a channel any more, but every network card, SCSI card, USB root hub, etc. has a specialized I/O processor that performs the same tasks introduced by IBM in the 1960s.
  • 31. Now review the timing sequence when the CPU and two channels process the input, payroll calculations and output tasks. Overlapped Processing A CPU and 2 I/O Channels Performed by Processing Step Time Frame 1 Time Frame 2 Time Frame 3 Time Frame 4 Time Frame 5 Time Frame 6 Channel 1 Read Record from Tape 1 Record 1 Record 2 Record 3 Record 4 Record 5 Record 6 CPU Calculate Payroll Record 1 Record 2 Record 3 Record 4 Record 5 Channel 2
  • 32. Write Payroll Transaction on Tape 2 Record 1 Record 2 Record 3 Record 4 In the first time frame the Channel 1 would read Record 1 from the Tape 1. In the second time frame the Channel would read the Record 2, while the CPU will perform the payroll calculations for Record 1. In the third time frame, Channel 1 would read Record 3, the CPU will perform the payroll calculations for Record 2, and Channel would output the modified Record 1 to Tape 2. Sounds great? But, one should ask if the tape device (or any storage device) is so slow the CPU will have to wait to for the slower Channel 1 and Tape 1. What is Record Blocking? When one allocates a data set, they must specify the data length of logical record and the block size (or blocking factor). The length of the logical record is easy to understand. The payroll department needs 200 characters to process a payroll transaction; therefore the record length should be 200 characters.
  • 33. But, consider the effects if one can tell Channel1 to read three records at a time, instead of one record at a time. This would be more efficient like instead of making one trip to the pizza shop for each of three pizzas, if simply purchased three pizzas at a time. Reading or writing multiple records at a time is described as blocking records. Consider overlapped processing with a block factor of 3 200- byte records or a blocking size of 600 bytes. Overlapped Processing Read and Write Three Records at a Time A CPU and 2 I/O Channels Performed by Processing Step Time Frame 1 Time Frame 2 Time Frame 3 Time Frame 4 Time Frame 5 Time Frame 6 Channel 1 Read Records from Tape 1 Records 1, 2 and 3 Records 4, 5 and 6
  • 34. CPU Calculate Payroll Record 1 Record 2 Record 3 Record 4 Record 5 Channel 2 Write Payroll Transaction on Tape 2 Records 1, 2 and 3 What determines the most efficient Block size? The most efficient blocking size is determined by the logical record length and the specific hardware characteristics of the storage device.
  • 35. The Role of Multiprogramming and Batch Processing Overlapped Processing and appropriate block size does not solve all of the limitations of I/O bound systems. No matter what, the potential for an idle processor always exists. However, multiprogramming architectures are designed to automatically switch to another job or task when the CPU detects an idle condition waiting for an I/O device. Batch processing systems, which require no user intervention, can be scheduled at non-peak processing times. The reality is that most large scale systems (not your laptop) are most often process bound, i.e., too many tasks and input and output requirements. Other strategies to address the limitations of process bounds systems include increase processor speed, increase RAM to decrease virtual thrashing, the use of multicore processors, multiprocessing and cluster architectures. Identifying Physical Storage Devices. Every operating system provides a system to physically identify an I/O device and to logically identity a device. For example, Windows may physically identify an I/O device by an interrupt, I/O address and a DMA channel. However, users and applications rarely identify an I/O device with those physical
  • 36. attributes. Being more user-friendly a Windows user may identify a disk as Drive C: or an attached printer as LPT1: Likewise z/OS physically identifies a device by a CHPID (channel ID), switch port number, control unit address, and unit address. Remember a control unit may have many different devices connected to it. In PC-land, a SCSI control may have15 disk drives attached to it; each identified by a unique SCSI ID. Likewise a IBM 3990 control unit may have many disk drives attached to it; each identified by a unit address. Since a z/OS Physical I/O address is complicated and maybe static, JCL, commands, user interfaces, and error messages use device numbers. A Device Number is a unique combination of four hexadecimal numbers, e.g., 183F. In theory, a Device Number is more easy to understand than a Physical I/O address. But there is another advantage. Assume that an existing JCL statement refers a given Physical Unit number, e.g., a DASD unit number, instead of a Device Number. Suppose that this unit number changes. Then all of the JCL statements referring to that unit number needs to be change or rewritten. On the other hand, if the JCL contained a logical Device Number that refers to a Physical I/O address, the Device Number would not have to be changed on the JCL when the
  • 37. Physical I/O address changes. This is exactly how Internet domain names are associated with an IP address work. If Google decides to change its IP address, users do not care - since google.com continues to work. Just as domain names must be stored and mapped to an IP address, so does a Device Number need to be stored and mapped to a Physical I/O address. A I/O control file, e.g., IOCDS (Input/Output Control Data Set) or IODF (Input/Outpt Definition File, maps the Physical I/O address to the Device Number. During the boot process, more appropriately called IPL (Initial Program Load) This data set is read and stored in system memory as a Unit Control Block (UCB). System programmers will use device numbers more than application programmers. When an application needs access to a data set they will need to provide the name of data set and the device number. Given the large number of device numbers and the possibility that the device number may be changed, another feature will be used.
  • 38. Application programmers may rely on catalog data sets. When a data set is cataloged, the device number and disk volume is stored. As long as data set has a unique name z/OS looks up the data set name in the catalog to determine device number of the DASD and volume name. I/O Switches and I/O Directors Original mainframe I/O architectures used a Bus and Tag cable to directly attached one device or one chain of device managed by a device controller to one channel. When the channel was busy no other channel could access the device. I/O Switches and directors permit multiple channels to be connected to multiple storage device chains over higher speed connections. Not only did this prevent channel bottle necks, it also enable to the architecture to permit different LPARs to share the same devices and provide fault tolerance. Storage Area Networks: ISCSI, IP Address and Port Numbers Most modern large scale architectures are based on SAN architectures or Storage Virtualization. SAN devices are no longer directly attached to the server, and can be shared by multiple servers using a variety or operating systems over long
  • 39. distances. Without SAN technologies, load balancing, fail over, data sharing, cloud computing technologies would not be possible Channel I/O - http://en.wikipedia.org/wiki/Channel_I/O Channel subsystem (CSS) - http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t opic=/com.ibm.zos.znetwork/znetwork_59.htm Types of CCW Channels used to connect DASDs http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t opic=/com.ibm.zos.znetwork/znetwork_59.htm 5. Using the following table describe the following concepts related to data storage of auxiliary devices. Concepts related to Storage Devices Definition or Description Disk Channel Device Number or Disk Number
  • 40. Disk Partition Disk Volume Mount Point Master Boot Record EFI FDISK IODF 6. Using the following table paste an appropriate Google image that illustrates the concept. Concepts related to Storage Devices Google image that illustrates the concept. Disk Channel Device Number or Disk Number Disk Partition Disk Volume
  • 41. 7. Is SATA an example of a storage device or a hardware interface? Explain your answer: 8. Using the following table list the advantages and disadvantages of SATA devices as compared to PATA devices. SATA Advantages Disadvantages Disk Partition http://en.wikipedia.org/wiki/Disk_partitioning Differences between volume, partition and drive -
  • 42. http://unix.stackexchange.com/questions/87300/differences- between-volume-partition-and-drive Partitions and Volumes - http://cquirke.mvps.org/9x/partition.htm 9. What utilities does one use to partition a Windows Hard Drive? Answer: 10. What is the Primary Partition of a Windows Hard Drive? Answer: 11. What is the maximum number of physical partitions that can be created on a microcomputer disk drive? Answer:
  • 43. 12. What is the function of an operating system boot loader? Answer: Video - What is the Bootloader in Android? - https://www.youtube.com/watch?v=-tXox11ngLY GNU GRUB - http://en.wikipedia.org/wiki/GNU_GRUB Securing the Windows 8 Boot Process - https://technet.microsoft.com/en-us/windows/dn168167.aspx 13. Complete the following table for the following popular boot loaders. Boot Loader
  • 44. Operating System(s) List the name of Boot Configuration File Grub NTLDR BOOTMGR 14. In the link "Securing the Windows 8 Boot Process", list the and explain the steps of the boot process using the following table Windows 8 Boot Process Sequence Explanation of the function 1. UEFI 2. OS Boot Loader 3. Loading the Kernel 4. Loading the System Drivers
  • 45. 5. Load the System Files 6. Load the ELAM Driver 7. Load 3 rd Party Drivers 8. Load Anti Malware Software 9. Windows Sign-in 15. Using the following tale describe the following categories of rootkits. Types of Rootkits Description of the rootkit Firmware Rootkits Bootkits Kernel Rootkits Driver Rootkits 16.
  • 46. Explain how the Windows 8 Secure Boot feature prevents rootkits. Answer: 17. Explain how the Windows 8 Trusted Boot feature prevents rootkits. Answer: 18. Explain how the Windows 8 Early Launch Malware (ELAM) feature prevents rootkits. Answer: 19. Explain how the Windows 8 Measured Boot feature prevents rootkits.
  • 47. Answer: 20. What are the performance advantages of the Extensible Firmware Interface (EFI)? Answer: 21. What are the security advantages of the Extensible Firmware Interface (EFI)? Answer: DVD http://en.wikipedia.org/wiki/DVD Blu-ray Disc http://www.blu-ray.com/info/
  • 48. Blu-ray Disc http://en.wikipedia.org/wiki/Blu-ray_Disc The Advantages and Disadvantages of Blu-Ray http://ezinearticles.com/?The-Advantages-and-Disadvantages- of-Blu-Ray&id=3368103 Digital Rights Management http://en.wikipedia.org/wiki/Digital_rights_management http://www.zdnet.com/blog/hardware/update-x2-avatar-blu-ray- drm-bites-legitimate-customers/8193 22. Using the following table list and compare the storage capacity, data transfer rates and recording technologies used each of the following optical storage devices and media. Optical Storage CD (Compact Disk) DVD (Digital Versatile Disk) Blue- Ray Storage Capacity
  • 49. Data Transfer Rate Recording Technology 23. Digital movies are available in both DVD and Blue-Ray storage formats. Why are Blue-Ray disks replacing DVDs when used for the digital storage of movies? Answer: 34. Use google.com and search for a good buy to add a Blue- Ray drive to your computer, either internal or external. Copy- and- paste your result below. Answer: 25. What is meant by "Digital Rights Management?" Answer:
  • 50. 26. Which companies have been strong supporters of Digital Rights Management? Answer: 27. Legitimate customers have been having problems with DRM. What is the solution to this problem? Answer: 28. Using the following table list the advantages and disadvantages of Blu-Ray storage devices. Blue-Ray Storage Devices Advantages Disadvantages
  • 51. Universal Serial Bus http://en.wikipedia.org/wiki/Universal_Serial_Bus USB 3.0 Advantages and Disadvantages http://techie-buzz.com/gadgets-news/usb-3-advantages- disadvantages.html Firewire http://en.wikipedia.org/wiki/FireWire What Is the Difference Between USB and FireWire® ? http://www.wisegeek.com/what-is-the-difference-between-usb- and-firewire.htm Review the videos under the Video Folder/ Bus Architecture Expansion Slots and Ports; Storage Technologies; Installing Hard Drives DVDs and Other Storage Devices Review Storage Bus Update 2010 and Managing Disks 2010 29. Using the following table list the maximum data transfer
  • 52. rate for each of the following standards. Standard Maximum Data Transfer Rate USB 1.0/1.1 USB 2.x USB 3.x FireWire 400 FireWire 800 FireWire S1600 FireWire S3200 30. Using the following table list the advantages and disadvantages of the USB2.x/3.x interface standard.. USB 2.0/3.x Advantages Disadvantages
  • 53. 31. Using the following table list the advantages and disadvantages of FireWire. FireWire Advantages Disadvantages Compact Flash memory http://en.wikipedia.org/wiki/CompactFlash Flash memory http://en.wikipedia.org/wiki/Flash_memory NAND flash memory - http://whatis.techtarget.com/definition/nand-flash-memory.html Flash Memory Utilities http://www.sd-flash.com/file07.html What are the disadvantages of USB Flash drives?
  • 54. http://www.answers.com/Q/What_are_the_disadvantages_of_US B_Flash_drives Secure Digital http://en.wikipedia.org/wiki/Secure_Digital 32. What is Flash Memory? Answer: 33. Why is Flash Memory used for computer storage rather that a replacement of SDRAM using for Computer memory? Answer: 34. Explain the concept of NAND and NOR memory? Answer: 35. Compare the features and uses between NAND and NOR memory?
  • 55. Answer: 36. Using the following table list the advantages and disadvantages of USB Memory Sticks or flash memory. Flash Memory Advantages Disadvantages 37. Using the following table define the following concepts related to Secure Digital Cards. Secure Digital Cards Definition MiniSD Class 2, 4 or 6 SDHC
  • 56. SDXC NAND Requirement 3 Solid State Drives, NAS, SANS and TOR Video - Introduction to Solid State Drives (SSD) - https://www.youtube.com/watch?v=AB-JUyQYxIw Important to view the previous video since many of the following questions are answered 1. What type of memory does SSD drives use? Answer: 2. What are the differences between SSD drives as compared to traditional hard drives?
  • 57. Answer: 3. Since a SSD uses less power, which type of computer devices and architectures will most likely benefit the most? Answer: 4. What is function of SSD Trimming as compared to utilities used on traditional hard drives? Answer: 5. SSD storage devices may be connected to a computer using either SATA or PCIe interface technologies. Please explain the pros and cons of both SATA and PCIe to connect future SSDs to small computers and devices and enterprise systems? Answer:
  • 58. 6. List and explain at least five uses of a Live CD, DVD or USB device to boot an operating system? Answer: NAS versus SANS Video - NAS and SAN Introduction - https://www.youtube.com/watch?v=csdJFazj3h0 Important to view the previous video since many of the following questions are answered NAS versus SANS - http://www.nas-san.com/differ.html 10 Advantages of SAN vs. DAS - http://www.serverwatch.com/trends/article.php/3925351/10- Advantages-of-SAN-vs-DAS.htm
  • 59. 7. While are the advantage of NAS operating system as compared to a traditional server operating system? Answer: 8. What type of communication hardware and network technologies does a NAS architectures use? Answer: 9. What type of communication hardware and network technologies does a SAN architectures use? Answer: 10. Using the following table explain each of the following 10 advantages of Storage Area Networks
  • 60. as compared to Directly Attached Storage. Advantages of Storage Area Networks (SAN) as compared to Directly Attached Storage (DAS) Advantages of Storage Area Networks (SAN) Explanation 1. Scalability 2. Performance 3. Data Isolation 4. Uptime 5. Workload Isolation 6. Long Distance Connectivity 7. Increased Utilization 8. Bootable 9. Centralized Management 10. Disaster Recovery 11. Explain how SANs may be used to support Load Balancing Clusters. Answer:
  • 61. 12. Explain how SANs may be used to support Fail-over Clusters. Answer: Fibre Channel Storage Area Networks (SAN) - http://www-03.ibm.com/systems/storage/san/ 13. What is Fibre Channel (FICON)? Answer: 14. How does Fibre Channel relate to SCSI, IP and FICON? Answer: TOR - The Hidden Web ( A little more security _
  • 62. Video - Introduction to TOR - https://www.youtube.com/watch?v=pyq4vwxqvSI Video - TOR is Safe No More! - https://www.youtube.com/watch?v=95QfumZMerM Video - TOR Security Concerns and Considerations - https://www.youtube.com/watch?v=IvaBc0Q49Ys TOR Project - https://www.torproject.org/ Tor (anonymity network) - http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29 15. Explain the function and security implications of TOR. Answer:
  • 63. 16. Why does web anonymity matter? Answer: 17. What were the U.S. Navy's interests in the development for TOR? Answer: 18. How does TOR use Proxy servers? Answer: 19. In order for TOR to work, the Tor Project web site makes several recommendations. List at least three of these recommendations. Answer:
  • 64. 20. How can you use TOR from a Live USB? Answer: 21. Why is the speed of TOR limited? Answer: 22. What are the problems of using TOR to connect to a illegal web site? Answer: 23. What is the Hidden Internet (or the Deep Web) or the ".onion" domain? Answer:
  • 65. Requirement 2 IBM Enterprise Concepts Glossary: Text book " Introduction to the Mainframe: z/OS Basics" Introduction to z/OS and Processing Modes Hand outs -
  • 66. Most answers are provided here.) The videos to accompany this hand out are listed below Video - Introduction to zOS and Processing Modes Part-1 3-14- 2014 - http://youtu.be/TrVF5GjjmJY Video - Introduction to zOS and Processing Modes Part-2 3-14- 2014 - http://youtu.be/TrVF5GjjmJY Video - Introduction to zOS and Processing Modes Part-3 3-14- 2014 - http://youtu.be/PzrbdaGAtn8 Video - Introduction to zOS and Processing Modes Part-4 3-14- 2014 - http://en.wikipedia.org/wiki/OS/360 http://en.wikipedia.org/wiki/Z/OS http://en.wikipedia.org/wiki/MVS http://en.wikipedia.org/wiki/OS/390 http://en.wikipedia.org/wiki/OpenVMS 1.7 Factors contributing to mainframe use - - Introduction to the
  • 67. New Mainframe: Z/OS Basics 1. Using the following table list several of characteristics of mainframe computers Characteristics of Mainframe Architectures 1. 2. 3. 4. 5. 2. There are many factors that contributed to mainframe use. Using the following table list each factor and describe and provide an application of each factor. Factors Attributed to Use of Mainframe Architectures Factor Description and application
  • 68. http://en.wikipedia.org/wiki/OS/360 http://en.wikipedia.org/wiki/Z/OS http://en.wikipedia.org/wiki/MVS IBM System z - http://en.wikipedia.org/wiki/IBM_System_z OS/360 and successors - http://en.wikipedia.org/wiki/OS/360_and_successors What is batch processing? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm Batch processing - http://www.webopedia.com/TERM/B/batch_processing.html How Batch Processing Made Me 10 Times More Productive - http://www.problogger.net/archives/2008/06/12/how-batch- processing-made-me-10-times-more-productive/ Advantages and disadvantages of batch processing and real-time processing? http://wiki.answers.com/Q/Advantages_ad_disadvantages_of_ba tch_processing_and_real-time_processing Advantages & Disadvantages of Batch Processing - http://www.ehow.com/list_6632199_advantages-disadvantages- batch-processing.html
  • 69. Online transaction processing - http://en.wikipedia.org/wiki/Online_transaction_processing Transaction processing - http://www.webopedia.com/TERM/T/transaction_processing.ht ml OLTP (online transaction processing) - http://searchdatacenter.techtarget.com/definition/OLTP CICS (Customer Information Control System) - http://searchdatacenter.techtarget.com/definition/CICS 3. Describe and provide an example of Batch Processing? Answer: 4. Describe and provide an example of Transaction Processing (Online Transaction Processing - OLTP) Answer:
  • 70. 5. Use the following table to list the advantages and disadvantages of Batch Processing? Batch Processing Advantages Disadvantages 6. Use the following table to list the advantages and disadvantages of Transaction Processing (OLTP)? Transaction Processing (OLTP) Advantages Disadvantages
  • 71. 7. IBM System/360 architecture and mainframe operating system OS360 were the origins of the current IBM Z Architecture. Using the following table answer the following questions Features of the IBM System/360 Architecture Answer 32-bit or 64-bit processors? Primary designed for batch or OLTP? Type of User Interfaces, e.g., terminal, online, web, etc. Support of Linux Operating systems Support for TCP/IP and Internet Services? Support of COBOL applications Support of Java Applications?
  • 72. z/VM http://en.wikipedia.org/wiki/Z/VM Processing work on z/OS: How the system starts and manages batch jobs - http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm What is TSO? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm What is ISPF? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm What is JES? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm Main Features of ISPF - http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.i bm.zos.zcourses/zcourses_ispfmain_book.pdf ISPF Primary menu and Datasets -
  • 73. http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.i bm.zos.zcourses/zcourses_ispfpdf_book.pdf ISPF Data Sets http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.i bm.zos.zcourses/zcourses_ispfdsbasics_book.pdf ISPF http://en.wikipedia.org/wiki/ISPF 9. What z/OS subsystem manages the execution of batch program, i.e., batch processing? Answer: 10. Historically, the only interface to manage and execute jobs on an IBM operating system was keypunch cards. The popular command line interface that programs use to access IBM operating systems, manage jobs, perform system program tasks is called? Answer:
  • 74. 11. What is the z/OS component (subsystem) that provides OLTP processing services for user transactions, e.g., inquiry to account balances, adding employee information into a database, etc. using legacy programming languages, e.g., COBOL? Answer: 12. z/OS is a full feature operating system that executes IBM legacy applications. z/OS frequently runs under Z/VM as a guest operating. What is the function of the z/VM? Answer: 13. What is the relationship between z/VM, z/OS and zLinux IBM Enterprise systems? Answer:
  • 75. What is JES? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm What is a data set? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm What is a VTOC? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm VSAM Catalogs - http://www.exforsys.com/tutorials/mainframe/vsam- catalogs.html Difference between catalog and vtoc - http://ibmmainframeforum.com/viewtopic.php?f=6&t=1327 Direct access storage device - http://en.wikipedia.org/wiki/Direct_access_storage_device z/OS UNIX file systems http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm What is z/OS UNIX? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm Clustering: A basic 101 tutorial - http://www.ibm.com/developerworks/aix/tutorials/clustering/
  • 76. LPAR - http://www.pcmag.com/encyclopedia_term/0,1237,t=LPAR&i=4 6363,00.asp Logical partition (virtual computing platform) - http://en.wikipedia.org/wiki/Logical_partition_(virtual_computi ng_platform) Introduction to JCL http://publibz.boulder.ibm.com/zoslib/books/tutorials/introjcl/in dex.htm?noframes=true IBM Parallel Sysplex http://en.wikipedia.org/wiki/IBM_Parallel_Sysplex What is a Parallel Sysplex 1443? http://www-03.ibm.com/systems/z/advantages/pso/sysover.html Rexx - http://en.wikipedia.org/wiki/Rexx What is Rexx? - http://www.rexxla.org/rexxlang/ OS/2 REXX: From Bark to Byte -
  • 77. http://www.redbooks.ibm.com/redbooks/pdfs/gg244199.pdf Implementing REXX ot Support in SDSF - http://www.redbooks.ibm.com/redbooks/pdfs/sg247419.pdf What is a z/OS catalog? https://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t opic=/com.ibm.zos.zconcepts/zconcepts_172.htm 14. Given the following IBM Enterprise Concepts IBM Enterprise Concepts Concept Description JES LPAR VTOC DASD Data Set JCL Sysplex Catalog
  • 78. CICS REXX ISPF TSO 3270 Terminal 15. From your previous research of use lookup images using Google, paste an image that best illustrates the following concepts in the table. IBM Enterprise Concepts Concept Image JES LPAR VTOC DASD Data Set JCL
  • 79. SysPlex Catalog CICS REXX ISPF TSO 3270 Terminal 16. What concept in Windows is comparable to IBM datasets? Answer: Disk Volume (computing) - http://en.wikipedia.org/wiki/Volume_%28computing%29 Disk volume - http://searchstorage.techtarget.com/definition/volume
  • 80. What is difference between volume and disk - http://www.storagecraft.com/support/forum/what-difference- between-volume-and-disk Volume Label - http://pcsupport.about.com/od/termsv/g/volume-label.htm 5.6 How data sets are named - - Introduction to the New Mainframe: Z/OS Basics PDF What are DASD volumes and labels? - http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t opic=/com.ibm.zos.zconcepts/zconcepts_151.htm 17. What are DASD volumes and labels? Answer: 18. On what type of device may data sets be stored? Answer:
  • 81. 19. How are data sets named? Answer: 20. What is the difference between a VTOC and a catalog Answer: 21. VTOC is similar to which storage concept in Windows? Answer: 22. Partitioned Data Set is similar to which storage concept in Windows? Answer: What is VSAM? -
  • 82. http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t opic=/com.ibm.zos.zconcepts/zconcepts_169.htm Virtual Storage Access Method (VSAM) - http://en.wikipedia.org/wiki/VSAM VSAM Demystified (Chapter 1) - http://www.redbooks.ibm.com/redbooks/pdfs/sg246105.pdf Key-sequenced data set (KSDS) - http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp ?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqncd_data_set.ht ml Relative record data set (RRDS) - http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp ?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqncd_data_set.ht ml Entry-sequenced data set (ESDS) - http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp ?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqncd_data_set.ht ml Record-oriented filesystem - http://en.wikipedia.org/wiki/Record-oriented_filesystem
  • 83. Introduction to Partitioned Data Sets - http://docweb.cns.ufl.edu/docs/d0068/ar01.html 23. An IBM 3270 terminal is used with what z/OS operating interactive facility? Answer: 24. What is VSAM? What is VSAM used for? Answer: 25. IBM files are record-oriented. Windows and Linux files are byte-oriented. When Windows or Linux stores files, e.g., a Word Document it stores the contents of the files as a contiguous series of bytes until the end of the file. On the other hand, a record is a group of related data, words, or fields treated as a meaningful unit; for instance, a Name, Address, and Telephone Number can be a "Personal Record". Therefore, IBM files were primarily designed to store business data rather than a Word document or graphic file.
  • 84. What were the advantages of the IBM record-oriented files. Answer: 26. Using the following table describe each of the following VSAM Dataset types that are used to store business transaction data. VSAM DataSets Organization Dataset Type Description Key-sequenced data set (KSDS) Entry-sequenced data set (ESDS) Relative record data set (RRDS) Linear data set (LDS) 27. As an alternative to a VSAM dataset IBM
  • 85. provides for a Partitioned Dataset . Describe how a Partition data set stores data? Answer: 28. What type of data is normally stored in a Partitioned data set? Answer: 29. Using Google find an appropriate image that illustrates the concept of a Partitioned Data Set Answer: 30. Within the structure of IBM JCL what is a JOB? Answer: 31. Within the structure of IBM JCL what is a DD statement
  • 86. Answer: IMS http://en.wikipedia.org/wiki/Information_Management_System Hierarchical database systems http://en.wikipedia.org/wiki/Hierarchical_database DB2 http://en.wikipedia.org/wiki/IBM_DB2 RACF - http://en.wikipedia.org/wiki/RACF 32. What are the functions provided by IBM's IMS Product Line (Information Management System)? Answer: 33. What are the functions provided by IBM's DB2 product line? Answer:
  • 87. Security on z/OS - http://wwwlgis.informatik.uni- kl.de/cms/fileadmin/users/kschmidt/mainframe/lutzkuehner/Cha pter11_Security_on_zOS_slides.pdf What is RACF? - http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t opic=/com.ibm.zos.zsecurity/zsecc_042.htm Resource Access Control Facility - http://en.wikipedia.org/wiki/Resource_Access_Control_Facility Security on z/OS http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.i bm.zos.zsecurity/zsecurity_book.pdf SNA http://en.wikipedia.org/wiki/IBM_Systems_Network_Architectu re Networking on Z/OS http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.i bm.zos.znetwork/znetwork_book.pdf 34.
  • 88. What are the functions and features provided by IBM's RACF product line (Resource Access Control Facility)? Answer: 35. What are the functions provided by IBM's SAF? Answer: 36. What is function of SNA? Answer: 37. How is SNA related to TCP/IP? Answer:
  • 89. 38. What is IBM Web Sphere? Answer: 39. What is IBM Web Sphere MQ? Answer: