Assignment 2 Directions
Enter your Name Here =
è
XXXXXXXXXX
Assignment 2 is divided into two documents: Assignment 2 Theory (50% of the assignment grade) and Assignment 2 Hands-on (50% of the assignment grade).
Most requirements of this assignment will require you to research answers from your text book (you must read the text book to get some answers), from the Internet, or any other reasonable source. Many Internet sources, video links, text book and Blackboard presentation reference are provided to help you START your research. I have found that any single Internet source is very incomplete and the format may not conducive for most answers required. Some students do not READ the text book or review the Power Point presentation provided to you in Blackboard.
Some answers are only available from my power point presentations or update notes.
You may cut-and-paste answers whenever appropriate, you should take care to synthesize your answers to include multiple sources. I would be impressed that you consult a Google image search and paste and
appropriate
image to supplement your answer.
While I permit cut-and-paste, I do expect you use your own words so that you:
1. Organize the answer
2. Demonstrate that you have read what you have cut-and-pasted
3. Use any means that clearly displays that you have gained knowledge.
If you are LEARNING the subject matter there should be no problem. If you cut-and-paste and pray that it might answer the question you will be penalized. I hate irrelevant cut-and-paste BS.
The content of each student's assignment may NOT be copied from any other current or past student enrolled in this class. Each assignment is to be prepared by ONE student.
Assignments are NOT a group-prepared assignment. Copying and pasting assignment any portion of the requirements from another student either enrolled in the current semester and or a previous semester is an act of plagiarism according to the RMU Academic Integrity Policy.
Any assignment found to be "too much alike" will be subject to a grade of zero for all parties concerned. Such an act constitutes a violation of the Robert Morris University Academic Integrity Policy.
The instructor reserves the right to review past assignments with students who are unable to prepare assignments during the hands-on portion of the exam to determine the student's mastery of the assignment's objectives. The assignment grade based upon the result of the instructor's review.
On-ground tests may be used to compare the student’s knowledge to performance on assignments.
All acts of plagiarism will be submitted the RMU Academic Integrity Board to determine university-wide penalties.
You, however, may discuss assignment requirements, assist other students with debugging programs or other hands-on-requirements, tutor students, or provide other advice that may assist the students in acquiring knowledge. But the actual preparation of an individual assignment must hav.
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
Assignment 2 Directions Enter your Name Here =è XXXXXXXXXX.docx
1. Assignment 2 Directions
Enter your Name Here =
è
XXXXXXXXXX
Assignment 2 is divided into two documents: Assignment 2
Theory (50% of the assignment grade) and Assignment 2 Hands-
on (50% of the assignment grade).
Most requirements of this assignment will require you to
research answers from your text book (you must read the text
book to get some answers), from the Internet, or any other
reasonable source. Many Internet sources, video links, text book
and Blackboard presentation reference are provided to help you
START your research. I have found that any single Internet
source is very incomplete and the format may not conducive for
most answers required. Some students do not READ the text
book or review the Power Point presentation provided to you in
Blackboard.
Some answers are only available from my power point
presentations or update notes.
You may cut-and-paste answers whenever appropriate, you
should take care to synthesize your answers to include multiple
sources. I would be impressed that you consult a Google image
search and paste and
2. appropriate
image to supplement your answer.
While I permit cut-and-paste, I do expect you use your own
words so that you:
1. Organize the answer
2. Demonstrate that you have read what you have cut-and-pasted
3. Use any means that clearly displays that you have gained
knowledge.
If you are LEARNING the subject matter there should be no
problem. If you cut-and-paste and pray that it might answer the
question you will be penalized. I hate irrelevant cut-and-paste
BS.
The content of each student's assignment may NOT be copied
from any other current or past student enrolled in this class.
Each assignment is to be prepared by ONE student.
Assignments are NOT a group-prepared assignment. Copying
and pasting assignment any portion of the requirements from
another student either enrolled in the current semester and or a
previous semester is an act of plagiarism according to the RMU
Academic Integrity Policy.
Any assignment found to be "too much alike" will be subject to
a grade of zero for all parties concerned. Such an act constitutes
3. a violation of the Robert Morris University Academic Integrity
Policy.
The instructor reserves the right to review past assignments
with students who are unable to prepare assignments during the
hands-on portion of the exam to determine the student's mastery
of the assignment's objectives. The assignment grade based
upon the result of the instructor's review.
On-ground tests may be used to compare the student’s
knowledge to performance on assignments.
All acts of plagiarism will be submitted the RMU Academic
Integrity Board to determine university-wide penalties.
You, however, may discuss assignment requirements, assist
other students with debugging programs or other hands-on-
requirements, tutor students, or provide other advice that may
assist the students in acquiring knowledge. But the actual
preparation of an individual assignment must have been
completely prepared by the student who submitted the
assignment. Sections of the assignments may be copied from the
internet as per the individual assignment's directions. Please
contact the instructor if you need assistance interpreting this
RMU Academic Integrity Policy.
You are to enter all answers or Prtscrn requirements into this
Word Document.
4. You are not permitted to submit any other document format,
e.g., Wordpad, PDFs, etc. that is not based on this original
Word document.
This document contains hidden internal markers and
applications that will track the version of this assignment and
your assignment progress.
You MUST submit the assignments using the Word document(s)
provided you. You may not use any other word processor,
except Microsoft Word. Do not use Open Office DOCX files.
When an instructor has possession of an electronic document it
is very easy to detect plagiarism. Many instructors use Turnitin
assignments, which is applicable to assignments that permit cut-
and-paste as this assignment.
It is very easy to compare multiple copies of word documents
(see link below).
Microsoft provides a variety of FREE anti-plagiarizing tools.
And there is a wide variety of tools that can analyze hidden
information within a Word document (see sample link below).
Changing fonts, margins and spacing does not do it anymore.
Even when individuals try to artificially change content, a Word
document contains hidden markers that may provide an audit
trail to find previous authors and computer systems who have
edited the document.
5. Comparing and merging Microsoft Word documents -
http://support.microsoft.com/kb/306484
Compare documents side by side -
http://office.microsoft.com/en-us/word-help/compare-
documents-side-by-side-HA010102251.aspx
Fight crime. Unravel incidents... one byte at a time.
http://computer-
forensics.sans.org/community/papers/gcfa/computer-forensics-
investigation-image-file-analysis_170
Why am I providing some of this detailed information? There
are several reasons.
1)
The real world exists outside this class.
A student in this class must be aware of the dangers when
organizations or individuals provide electronic copies to others,
e.g., an email attachment.
2)
The objective of this assignment is to "introduce" minimal
knowledge that is required in the real world. If you do not
acquire this minimal knowledge, you will significantly harm
your employment, income, promotion and retention potentials.
If you do not want to do the hard work, I can recommend a
6. better alternative to plagiarism - get a new major or career plan.
Perhaps you can star in a reality TV show.
3) The majority of my students will exert the effort and submit
excellent assignments.
I will use many of the previous tools as time permits to ensure
that you do not steal their grade. I really don't understand why a
student would provide a student with a copy of their assignment
when they are competing in the same job market. In my class
both the original author and the plagiarizer will be punished.
If you do not have a copy of WORD
, you may use VMWARE VIEW (available from the RMU
website) to access a virtual lab computer which contains any
software needed for this course.
http://www.rmu.edu/web/cms/departments-
offices/administration-services/it/Pages/vmware-view.aspx
NEVER STORE ANY DOCUMENTS ON THE DESKTOP OF
VMWARE VIRTUAL COMPUTER.
You will lose your document. It is preferable to store you
documents on a local flash drive.
Since the quiz and test questions are based on your researched
answers, I would recommend that you refer to any quiz
questions on the assignment topics to ensure that your
7. assignment answer is complete. Some quiz answers will NOT be
provided to you unless 75% of your answers from practice
attempts are correct.
YOU MUST enter your name in the beginning of this document
as provided and "Save As" this document using a new name that
includes your name and the assignment number, e.g., Bob Jones
Assignment 2.docx
When completed, submit the FINAL version of this document to
Blackboard under the Assignment folder for this individual
assignment.
I NEVER ACCEPT AN ASSIGNMENT AS AN EMAIL
ATTACHMENT FOR ANY REASON.
If you made an error on an assignment you may request that the
previous assignment submission be cleared so that you may
resubmit the assignment again.
Please only submit a completed assignment.
All assignments must use the original Word Document format.
Wordpad,
PDFs, etc. formats are not permitted.
8. While the assignments have a recommended due date, I do not
penalized your assignment grade if you are slightly late.
Please do not send me an email if you are going to submit your
assignment late. I assume you have a good excuse.
Documenting your Results
Some requirements specify that you perform a specific action,
e.g., access a web site, execute a command, etc.
You will need to provide evidence that you performed this task.
There are two techniques
1. Window 7 Snipping Tool -
http://www.youtube.com/watch?v=Ax75dA1TGU0
2) Alt-PrtScrn - Available for all versions of Windows
1) Once the web site or the results of the command is displayed
hold down the ALT key and press the Prtsc. Some laptops may
require you to press the FN key to perform this action. 2)
Position the cursor to answer the question in this Word
document. 3) Press Ctrl-V or select Edit/paste.
To make your graphic more controllable in a Word Document,
9. after pasting 1) Right-click and select Format Picture, 2) Click
on the Layout tab, and 3) Select Square ( You may also other
justification settings). Now you graphic will flow with text
better and can be sized more easily. Page 117-14
Requirement 1 Virtual Memory Operating Systems, Paging and
Storage Protection
Many Definitions may be found in the Glossary of the
Introduction to the New Mainframe: Z/OS Basics books.
You can down load a PDF copy of this text book from
Blackboard/Course Documents
How Operating Systems Work -
http://computer.howstuffworks.com/operating-system.htm
Virtual address space -
http://en.wikipedia.org/wiki/Virtual_address_space
Address space -
http://searchstorage.techtarget.com/definition/address-space
What is virtual memory, how is it implemented, and why do
operating systems use it?
10. http://www.programmerinterview.com/index.php/operating-
systems/how-virtual-memory-works/
What are the advantages and disadvantages of virtual memory?
http://answers.yahoo.com/question/index?qid=20080928221645
AAFAg23
These videos have been written for Unix, but many of the
concepts can be applied to all operating systems
Video - Virtual Memory - Part 1 -
http://www.youtube.com/watch?v=iqfjWIYyQ9k
Video - Virtual Memory - Part 2 -
http://www.youtube.com/watch?v=4px3RrDBa6w
Video - Page Replacement -
http://www.youtube.com/watch?v=M0d-vLw5Eyk
Video - Process Management -
http://www.youtube.com/watch?v=mHPySA51t18
Video - Processes - Part I -
http://www.youtube.com/watch?v=TIa2mhKCeYo
Video - Processes - Part II -
http://www.youtube.com/watch?v=_5EV7isUJ6k
3.4.4 Virtual storage overview - Introduction to the New
11. Mainframe: Z/OS Basics - Please read
1. What is advantage of a virtual memory (storage) operating
system?
Answer:
2. What is disadvantage of a virtual memory (storage) operating
system? Answer:
All programs to be executed must be loaded into the memory
(RAM) of the computer. Programs and data must be copied from
storage, e.g., a disk, and loaded in to RAM by an operating
system program call a loader. In a multitasking operating
system user programs must be stored in RAM a manner that
doesn't overlap or conflict with other user or operating system
programs
12. In addition, user and system programs need a way to
communicate with each other.
If an operating system controls the hardware then a user
program needs a communication method to ask the operating
system to print output or store data on a disk.
Introduction to the New Mainframe: Z/OS Basics - Glossary
3.4.2 What is an address space?
- Introduction to the New Mainframe: Z/OS Basics - please read
3.4.3 What is dynamic address translation?
- Introduction to the New Mainframe: Z/OS Basics - please read
3.4.4 Virtual storage overview - Introduction to the New
Mainframe: Z/OS Basics - please read
3.4.5 What is paging? - Introduction to the New Mainframe:
Z/OS Basics - please read
3.4.7 What is Storage Protection? - Introduction to the New
Mainframe: Z/OS Basics - please read
13. 3. Using the following table write a discussion of following
z/OS memory concepts and functions
z/OS Memory Concepts and Functions
Concept
Description
Address Space
ASID (Address Space ID)
Task Control Block
Private Space
Storage (Protection) Keys
Dynamic Address Translation (DAT)
z/OS address spaces are divided into three areas: Region,
Segment and Page. z/OS uses these concepts in dynamic address
translation find the virtual location of a specified area of
memory. While at first these concepts may sound confusing
assume that visitor from Ireland wanted to find my home.
Would they start searching at the first street in New York City -
obviously no
First, we would start by asking which state do you want to
locate (which Region)? Second, one would ask which city
14. within the state do you want to locate (the segment table)?
Third, which street within the city do you want to locate (the
page table)? Finally, one can sequentially search all houses on
the street or simply use the house address (the byte offset).
Likewise, a virtual address uses a similar approach to uniquely
identify a virtual address location and to quickly find the
address later when needed.
4. Using the following table identify each virtual address
concept.
z/OS Virtual Address Concepts
Concept
Function and Description
Region
Segment
Page
Byte Offset
15. 5. How many bits are in a z/OS virtual address?
Answer:
6. The maximum of amount virtual address space the z/OS can
manage is ____? Answer:
11. Using the following table, list the concept that best
describes a type of page, or addressable unit.
z/OS Addressable Units
Concept
Description
A page or 4K block in central storage is called _______
16. A page or 4K block in virtual storage is called _______
A page or 4K block in auxiliary is called _______
12. When a program is selected for execution, z/OS first brings
the program into which type of storage? Answer:
Page faults
http://www.programmerinterview.com/index.php/operating-
systems/paging-and-page-faults/
What is the purpose of swapping?
http://www.programmerinterview.com/index.php/operating-
systems/purpose-of-swapping/
What is the difference between a thread and a process?
http://www.programmerinterview.com/index.php/operating-
systems/thread-vs-process/
13. z/OS uses a series of tables to determine whether a page is
located in real storage or auxiliary storage. Only pages within
17. real storage can be executed. Auxiliary storage is used to extend
the real memory.
Using the following table describe each of the following z/OS
paging concepts.
z/OS Virtual Paging Concepts
Concept
Description
Page fault
Page-in
Page-out
Page Stealing
Unreferenced interval count
Swapping
System Resource Manager
Workload Manager
Thrashing
14. Which pages are the most likely candidates to be stolen
when using Page stealing? Answer:
18. Chapter 3: Overview of z/OS : Introduction to the Mainframe:
z/OS basics ( pages 114 - 134)
Program Status Word
http://publib.boulder.ibm.com/infocenter/zvm/v5r4/index.jsp?to
pic=/com.ibm.zvm.v54.hcpc1/psw1.htm
Operating Systems and Program Status Word
http://www.edwardbosworth.com/My3121Textbook_HTM/MyTe
xt3121_Ch29_V01.htm
Storage Protect Keys
http://publib.boulder.ibm.com/infocenter/pseries/v5r3/index.jsp
?topic=/com.ibm.aix.genprogc/doc/genprogc/storage_protect_ke
ys.htm
What is storage protection?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconcepts_95.htm
IBM PSW and Storage Protect Key -
http://research.microsoft.com/en-
us/um/people/gbell/Computer_Structures__Readings_and_Exam
19. ples/00000616.htm
Each executing program in an address space has a unique
program status word associated with it. Also, within each
program status word there is storage protect key.
15. What is the purpose of a Program Status Word (PSW)?
Answer:
16. What is the purpose of using a private address space for
each user? Answer:
17. What is the function of a storage protect key? Answer:
20. 18. A storage protect key of 0 thru 7 indicates that a program is
which type of program?
Answer:
19. A storage protect key of 8 indicates that a program is which
type of program?
Answer:
20. A storage protect key of 9 thru 15 indicates that a program
is which type of program? Answer:
Requirement 2 Storage Devices, Expansion Busses and Slots
21. Review the videos under the Video Folder/ Bus Architecture
Expansion Slots and Ports; Storage Technologies; Installing
Hard Drives DVDs and Other Storage Devices
Review Storage Bus Update 2010 and Managing Disks 2010
Video - Adding Hard Drives and Creating Volumes in Windows
Server 2012
-
https://www.youtube.com/watch?v=s4E6WcZKxRc
Video -
How a Hard Drive works
-
https://www.youtube.com/watch?v=rREkzeoJz1s
Video: How to Install a SATA Hard Drive
http://www.youtube.com/watch?v=zTzEp7dHWYY
How Hard Disks Work
-
http://computer.howstuffworks.com/hard-disk.htm
22. data transfer rate
-
http://www.webopedia.com/TERM/D/data_transfer_rate.html
PCI Express
-
http://en.wikipedia.org/wiki/PCI_Express
How PCI Express Works
-
http://computer.howstuffworks.com/pci-express.htm
Serial ATA
-
http://en.wikipedia.org/wiki/Serial_ATA
What are PATA and SATA?
-
http://hexus.net/tech/tech-explained/storage/1339-pata-vs-sata/
IOPS
-
http://en.wikipedia.org/wiki/IOPS
23. IOPS versus Throughput – Measuring Performance of Your
Storage
-
http://timradney.com/2012/07/06/iops-verses-throughput/
How to convert MBps to IOPS or calculate IOPS from MB/s
-
http://www.ssdfreaks.com/content/599/how-to-convert-mbps-to-
iops-or-calculate-iops-from-mbs
An explanation of IOPS and latency
-
http://recoverymonkey.org/2012/07/26/an-explanation-of-iops-
and-latency/
SSD Interface Comparison: PCI Express vs SATA
-
http://www.overclock.net/t/1489684/ssd-interface-comparison-
pci-express-vs-sata
Why SSDs are Transitioning from SATA to PCIe in the Next
Gen Form Factor
-
http://www.tested.com/tech/pcs/456464-why-ssds-are-
transitioning-sata-pcie-next-gen-form-factor/
24. Live USB
-
http://en.wikipedia.org/wiki/Live_USB
5 ways to use bootable Linux live discs -
http://www.computerworld.com/article/2519158/linux/5-ways-
to-use-bootable-linux-live-discs.html
Take a Secure Desktop Everywhere: Everything You Need to
Know About Linux Live CDs and USB Drives
-
http://www.howtogeek.com/172810/take-a-secure-desktop-
everywhere-everything-you-need-to-know-about-linux-live-cds-
and-usb-drives/
What are the advantages and disadvantages of always running
Ubuntu in “Try” mode?
-
http://askubuntu.com/questions/481057/what-are-the-
advantages-and-disadvantages-of-always-running-ubuntu-in-try-
mode
Serial ATA
http://en.wikipedia.org/wiki/Serial_ATA
A Guide to Serial ATA
http://www.pcmech.com/article/a-guide-to-serial-ata/
Install a New Hard Drive in Five Easy Steps
http://computershopper.com/hard-drives-burners/howto/install-
26. Seek Time
Throughput
MBPS
IOPS
SATA
PATA
2. Using the following table paste an appropriate Google image
that illustrates the concept.
Concepts related to Storage Devices
Google image that illustrates the concept.
Disk Cylinder
Disk Track
Disk Sector
Data Cluster
Data Block
Data Transfer Rate
Seek Time
Throughput
27. MBPS
IOPS
SATA
PATA
3. In what type of applications is an IOPS throughout
measurement standard more important than MBPS?
Explain your answer:
4. In what type of applications is a MBPS throughout
measurement standard more important than IOPS?
Explain your answer:
28. Introduction to Disk I/O
There are three architectures that can be used to connect Disk
/O devices, e.g., DASDs, tapes and printers, to a computer: 1)
Directed Attached Storage (DAS), 2) Network Attached Storage
(NAS), and 3) Storage Area Networks (SAN).
The following diagram illustrates three legacy storage
architectures used for Direct Attached Storage (DAS).
What is an I/O Channel?
Mainframes introduced the I/O Channel architecture to support
overlapped processing and multiprogramming.
Assume that a computer was to input payroll data stored on tape
29. and then output a payroll transaction record to a second tape
device.
Review the timing sequence when the CPU was required to
process the input, payroll calculations and output tasks.
Non Overlapped Processing
No Channels or I/O Processors
Performed by
Processing Step
Time Frame 1
Time Frame 2
Time Frame 3
Time Frame 4
Time Frame 5
Time Frame 6
CPU
Read Record
from Tape 1
Record 1
Record 2
CPU
Calculate Payroll
Record 1
Record 2
30. CPU
Write Payroll Transaction
on Tape 2
Record 1
Record 3
The CPU was required to perform all input, calculation and
output processing steps. In the first time frame the CPU would
read Record 1 from the Tape 1. In the second time frame the
CPU will perform the payroll calculations for Record 1, and in
the third time frame the CPU would output the modified Record
1 to Tape 2. Given the relative difference in performance
between CPUs and Tape devices in the 1960s, the CPU would
be idle 98% of the processing time waiting for the slower tape
device.
Non overlapped systems were I/O Bound, i.e., the CPU was
underutilized.
While the previous picture seems to imply that an I/O channel is
a connector, an I/O Channel is actual a specialized I/O
processor designed to work with the CPU. Modern I/O
architectures rarely use the terminology of a channel any more,
but every network card, SCSI card, USB root hub, etc. has a
specialized I/O processor that performs the same tasks
introduced by IBM in the 1960s.
31. Now review the timing sequence when the CPU and two
channels process the input, payroll calculations and output
tasks.
Overlapped Processing
A CPU and 2 I/O Channels
Performed by
Processing Step
Time Frame 1
Time Frame 2
Time Frame 3
Time Frame 4
Time Frame 5
Time Frame 6
Channel 1
Read Record
from Tape 1
Record 1
Record 2
Record 3
Record 4
Record 5
Record 6
CPU
Calculate Payroll
Record 1
Record 2
Record 3
Record 4
Record 5
Channel 2
32. Write Payroll Transaction
on Tape 2
Record 1
Record 2
Record 3
Record 4
In the first time frame the Channel 1 would read Record 1 from
the Tape 1. In the second time frame the Channel would read
the Record 2, while the CPU will perform the payroll
calculations for Record 1. In the third time frame, Channel 1
would read Record 3, the CPU will perform the payroll
calculations for Record 2, and Channel would output the
modified Record 1 to Tape 2. Sounds great?
But, one should ask if the tape device (or any storage device) is
so slow the CPU will have to wait to for the slower Channel 1
and Tape 1.
What is Record Blocking?
When one allocates a data set, they must specify the data length
of logical record and the block size (or blocking factor). The
length of the logical record is easy to understand. The payroll
department needs 200 characters to process a payroll
transaction; therefore the record length should be 200
characters.
33. But, consider the effects if one can tell Channel1 to read three
records at a time, instead of one record at a time.
This would be more efficient like instead of making one trip to
the pizza shop for each of three pizzas, if simply purchased
three pizzas at a time. Reading or writing multiple records at a
time is described as blocking records.
Consider overlapped processing with a block factor of 3 200-
byte records or a blocking size of 600 bytes.
Overlapped Processing
Read
and Write Three Records at a Time
A CPU and 2 I/O Channels
Performed by
Processing Step
Time Frame 1
Time Frame 2
Time Frame 3
Time Frame 4
Time Frame 5
Time Frame 6
Channel 1
Read Records
from Tape 1
Records 1, 2 and 3
Records 4, 5 and 6
34. CPU
Calculate Payroll
Record 1
Record 2
Record 3
Record 4
Record 5
Channel 2
Write Payroll Transaction
on Tape 2
Records 1, 2 and 3
What determines the most efficient Block size?
The most efficient blocking size is determined by the logical
record length and the specific hardware characteristics of the
storage device.
35. The Role of Multiprogramming and Batch Processing
Overlapped Processing and appropriate block size does not
solve all of the limitations of I/O bound systems. No matter
what, the potential for an idle processor always exists.
However, multiprogramming architectures are designed to
automatically switch to another job or task when the CPU
detects an idle condition waiting for an I/O device.
Batch processing systems, which require no user intervention,
can be scheduled at non-peak processing times.
The reality is that most large scale systems (not your laptop) are
most often process bound, i.e., too many tasks and input and
output requirements.
Other strategies to address the limitations of process bounds
systems include increase processor speed, increase RAM to
decrease virtual thrashing, the use of multicore processors,
multiprocessing and cluster architectures.
Identifying Physical Storage Devices.
Every operating system provides a system to physically identify
an I/O device and to logically identity a device. For example,
Windows may physically identify an I/O device by an interrupt,
I/O address and a DMA channel. However, users and
applications rarely identify an I/O device with those physical
36. attributes. Being more user-friendly a Windows user may
identify a disk as Drive C:
or an attached printer as LPT1:
Likewise z/OS physically identifies a device by a CHPID
(channel ID), switch port number, control unit address, and unit
address. Remember a control unit may have many different
devices connected to it. In PC-land, a SCSI control may have15
disk drives attached to it; each identified by a unique SCSI ID.
Likewise a IBM 3990 control unit may have many disk drives
attached to it; each identified by a unit address.
Since a z/OS Physical I/O address is complicated and maybe
static, JCL, commands, user interfaces,
and error messages use device numbers. A Device Number is a
unique combination of four hexadecimal numbers, e.g., 183F.
In theory, a Device Number is more easy to understand than a
Physical I/O address. But there is another advantage.
Assume that an existing JCL statement refers a given Physical
Unit number, e.g., a DASD unit number, instead of a Device
Number. Suppose that this unit number changes. Then all of the
JCL statements referring to that unit number needs to be change
or rewritten.
On the other hand, if the JCL contained a logical Device
Number that refers to a Physical I/O address, the Device
Number would not have to be changed on the JCL when the
37. Physical I/O address changes. This is exactly how Internet
domain names
are associated with an IP address work.
If Google decides to change its IP address, users do not care -
since google.com continues to work.
Just as domain names must be stored and mapped to an IP
address, so does a Device Number need to be stored and mapped
to a Physical I/O address.
A I/O control file, e.g., IOCDS (Input/Output Control Data Set)
or
IODF (Input/Outpt Definition File, maps the Physical I/O
address
to the Device Number.
During the boot process, more appropriately called IPL (Initial
Program Load) This data set is read and stored in system
memory as a Unit Control Block (UCB).
System programmers will use device numbers more than
application programmers.
When an application needs access to a data set they will need to
provide the name of data set and the device number. Given the
large number of device numbers and the possibility that the
device number may be changed, another feature will be used.
38. Application programmers may rely on catalog data sets.
When a data set is cataloged, the device number and disk
volume is stored. As long as data set has a unique name z/OS
looks up the data set name in the catalog to determine device
number of the DASD and volume name.
I/O Switches and I/O Directors
Original mainframe I/O architectures used a Bus and Tag cable
to directly attached one device or one chain of device managed
by a device controller to one channel. When the channel was
busy no other channel could access the device. I/O Switches and
directors permit multiple channels to be connected to multiple
storage device chains over higher speed connections. Not only
did this prevent channel bottle necks, it also enable to the
architecture to permit different LPARs to share the same
devices and provide fault tolerance.
Storage Area Networks:
ISCSI, IP Address and Port Numbers
Most modern large scale architectures are based on SAN
architectures or Storage Virtualization. SAN devices are no
longer directly attached to the server, and can be shared by
multiple servers using a variety or operating systems over long
39. distances. Without SAN technologies, load balancing, fail over,
data sharing, cloud computing
technologies would not be possible
Channel I/O
-
http://en.wikipedia.org/wiki/Channel_I/O
Channel subsystem (CSS) -
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.znetwork/znetwork_59.htm
Types of CCW Channels used to connect DASDs
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.znetwork/znetwork_59.htm
5. Using the following table describe the following concepts
related to data storage of auxiliary devices.
Concepts related to Storage Devices
Definition or Description
Disk Channel
Device Number or Disk Number
40. Disk Partition
Disk Volume
Mount Point
Master Boot Record
EFI
FDISK
IODF
6. Using the following table paste an appropriate Google image
that illustrates the concept.
Concepts related to Storage Devices
Google image that illustrates the concept.
Disk Channel
Device Number or Disk Number
Disk Partition
Disk Volume
41. 7. Is SATA an example of a storage device or a hardware
interface?
Explain your answer:
8. Using the following table list the advantages and
disadvantages of SATA devices as compared to PATA devices.
SATA
Advantages
Disadvantages
Disk Partition
http://en.wikipedia.org/wiki/Disk_partitioning
Differences between volume, partition and drive
-
43. 12. What is the function of an operating system boot loader?
Answer:
Video - What is the Bootloader in Android?
-
https://www.youtube.com/watch?v=-tXox11ngLY
GNU GRUB
-
http://en.wikipedia.org/wiki/GNU_GRUB
Securing the Windows 8 Boot Process
-
https://technet.microsoft.com/en-us/windows/dn168167.aspx
13. Complete the following table for the following popular boot
loaders.
Boot Loader
44. Operating System(s)
List the name of
Boot Configuration File
Grub
NTLDR
BOOTMGR
14.
In the link "Securing the Windows 8 Boot Process", list the and
explain the steps of the boot process using the following table
Windows 8 Boot Process Sequence
Explanation of the function
1. UEFI
2. OS Boot Loader
3. Loading the Kernel
4. Loading the System Drivers
45. 5. Load the System Files
6. Load the ELAM Driver
7. Load 3
rd
Party Drivers
8. Load Anti Malware Software
9. Windows Sign-in
15.
Using the following tale describe the following categories of
rootkits.
Types of Rootkits
Description of the rootkit
Firmware Rootkits
Bootkits
Kernel Rootkits
Driver Rootkits
16.
46. Explain how the Windows 8 Secure Boot feature prevents
rootkits.
Answer:
17.
Explain how the Windows 8 Trusted Boot feature prevents
rootkits. Answer:
18.
Explain how the Windows 8 Early Launch Malware (ELAM)
feature prevents rootkits. Answer:
19.
Explain how the Windows 8 Measured Boot feature prevents
rootkits.
47. Answer:
20. What are the performance advantages of the Extensible
Firmware Interface (EFI)? Answer:
21. What are the security advantages of the Extensible Firmware
Interface (EFI)? Answer:
DVD
http://en.wikipedia.org/wiki/DVD
Blu-ray Disc
http://www.blu-ray.com/info/
48. Blu-ray Disc
http://en.wikipedia.org/wiki/Blu-ray_Disc
The Advantages and Disadvantages of Blu-Ray
http://ezinearticles.com/?The-Advantages-and-Disadvantages-
of-Blu-Ray&id=3368103
Digital Rights Management
http://en.wikipedia.org/wiki/Digital_rights_management
http://www.zdnet.com/blog/hardware/update-x2-avatar-blu-ray-
drm-bites-legitimate-customers/8193
22. Using the following table list and compare the storage
capacity, data transfer rates and recording technologies used
each of the following optical storage devices and media.
Optical Storage
CD
(Compact Disk)
DVD
(Digital Versatile Disk)
Blue- Ray
Storage Capacity
49. Data Transfer Rate
Recording Technology
23. Digital movies are available in both DVD and Blue-Ray
storage formats. Why are Blue-Ray disks replacing DVDs when
used for the digital storage of movies? Answer:
34. Use google.com and search for a good buy to add a Blue-
Ray drive to your computer, either internal or external. Copy-
and- paste your result below. Answer:
25. What is meant by "Digital Rights Management?"
Answer:
50. 26. Which companies have been strong supporters of Digital
Rights Management?
Answer:
27. Legitimate customers have been having problems with
DRM.
What is the solution to this problem? Answer:
28. Using the following table list the advantages and
disadvantages of Blu-Ray
storage devices.
Blue-Ray Storage Devices
Advantages
Disadvantages
51. Universal Serial Bus
http://en.wikipedia.org/wiki/Universal_Serial_Bus
USB 3.0
Advantages and Disadvantages
http://techie-buzz.com/gadgets-news/usb-3-advantages-
disadvantages.html
Firewire
http://en.wikipedia.org/wiki/FireWire
What Is the Difference Between USB and FireWire® ?
http://www.wisegeek.com/what-is-the-difference-between-usb-
and-firewire.htm
Review the videos under the Video Folder/ Bus Architecture
Expansion Slots and Ports; Storage Technologies; Installing
Hard Drives DVDs and Other Storage Devices
Review Storage Bus Update 2010 and Managing Disks 2010
29. Using the following table list the maximum data transfer
52. rate for each of the following standards.
Standard
Maximum Data Transfer Rate
USB 1.0/1.1
USB 2.x
USB 3.x
FireWire 400
FireWire 800
FireWire S1600
FireWire S3200
30. Using the following table list the advantages and
disadvantages of the USB2.x/3.x interface standard..
USB 2.0/3.x
Advantages
Disadvantages
53. 31. Using the following table list the advantages and
disadvantages of FireWire.
FireWire
Advantages
Disadvantages
Compact Flash memory
http://en.wikipedia.org/wiki/CompactFlash
Flash memory
http://en.wikipedia.org/wiki/Flash_memory
NAND flash memory -
http://whatis.techtarget.com/definition/nand-flash-memory.html
Flash Memory Utilities
http://www.sd-flash.com/file07.html
What are the disadvantages of USB Flash drives?
55. Answer:
36. Using the following table list the advantages and
disadvantages of USB Memory Sticks or flash memory.
Flash Memory
Advantages
Disadvantages
37. Using the following table define the following concepts
related to Secure Digital Cards.
Secure Digital Cards
Definition
MiniSD
Class 2, 4 or 6
SDHC
56. SDXC
NAND
Requirement 3 Solid State Drives, NAS, SANS and TOR
Video - Introduction to Solid State Drives (SSD)
-
https://www.youtube.com/watch?v=AB-JUyQYxIw
Important to view the previous video since many of the
following questions are answered
1. What type of memory does SSD drives use?
Answer:
2. What are the differences between SSD drives as compared to
traditional hard drives?
57. Answer:
3. Since a SSD uses less power, which type of computer devices
and architectures will most likely benefit the most?
Answer:
4. What is function of SSD Trimming as compared to utilities
used on traditional hard drives? Answer:
5. SSD storage devices may be connected to a computer using
either SATA or PCIe interface technologies. Please explain the
pros and cons of both SATA and PCIe to connect future SSDs to
small computers and devices and enterprise systems?
Answer:
58. 6. List and explain at least five uses of a Live CD, DVD or USB
device to boot an operating system? Answer:
NAS versus SANS
Video - NAS and SAN Introduction
-
https://www.youtube.com/watch?v=csdJFazj3h0
Important to view the previous video since many of the
following questions are answered
NAS versus SANS -
http://www.nas-san.com/differ.html
10 Advantages of SAN vs. DAS
-
http://www.serverwatch.com/trends/article.php/3925351/10-
Advantages-of-SAN-vs-DAS.htm
59. 7. While are the advantage of NAS operating system as
compared to a traditional server operating system? Answer:
8. What type of communication hardware and network
technologies does a NAS architectures use?
Answer:
9. What type of communication hardware and network
technologies does a SAN architectures use?
Answer:
10. Using the following table explain
each of the following 10 advantages of Storage Area Networks
60. as compared to Directly Attached Storage.
Advantages of Storage Area Networks (SAN) as compared to
Directly Attached Storage (DAS)
Advantages of Storage Area Networks (SAN)
Explanation
1. Scalability
2. Performance
3. Data Isolation
4. Uptime
5. Workload Isolation
6. Long Distance Connectivity
7. Increased Utilization
8. Bootable
9. Centralized Management
10. Disaster Recovery
11. Explain how SANs may be used to support Load Balancing
Clusters. Answer:
61. 12. Explain how SANs may be used to support Fail-over
Clusters. Answer:
Fibre Channel Storage Area Networks (SAN)
-
http://www-03.ibm.com/systems/storage/san/
13. What is Fibre Channel (FICON)?
Answer:
14. How does Fibre Channel relate to SCSI, IP and FICON?
Answer:
TOR - The Hidden Web ( A little more security _
62. Video
-
Introduction to TOR
-
https://www.youtube.com/watch?v=pyq4vwxqvSI
Video - TOR is Safe No More!
-
https://www.youtube.com/watch?v=95QfumZMerM
Video - TOR Security Concerns and Considerations
-
https://www.youtube.com/watch?v=IvaBc0Q49Ys
TOR Project
-
https://www.torproject.org/
Tor (anonymity network)
-
http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29
15. Explain the function and security implications of TOR.
Answer:
63. 16. Why does web anonymity matter? Answer:
17. What were the U.S. Navy's interests in the development for
TOR? Answer:
18. How does TOR use Proxy servers? Answer:
19. In order for TOR to work, the Tor Project web site makes
several recommendations.
List at least three of these recommendations.
Answer:
64. 20. How can you use TOR from a Live USB? Answer:
21. Why is the speed of TOR limited? Answer:
22. What are the problems of using TOR to connect to a illegal
web site? Answer:
23. What is the Hidden Internet (or the Deep Web) or the
".onion"
domain?
Answer:
65. Requirement 2
IBM Enterprise Concepts
Glossary: Text book " Introduction to the Mainframe: z/OS
Basics"
Introduction to z/OS and Processing Modes Hand outs -
66. Most answers are provided here.)
The videos to accompany this hand out are listed below
Video - Introduction to zOS and Processing Modes Part-1 3-14-
2014 -
http://youtu.be/TrVF5GjjmJY
Video - Introduction to zOS and Processing Modes Part-2 3-14-
2014 -
http://youtu.be/TrVF5GjjmJY
Video - Introduction to zOS and Processing Modes Part-3 3-14-
2014 -
http://youtu.be/PzrbdaGAtn8
Video - Introduction to zOS and Processing Modes Part-4 3-14-
2014 -
http://en.wikipedia.org/wiki/OS/360
http://en.wikipedia.org/wiki/Z/OS
http://en.wikipedia.org/wiki/MVS
http://en.wikipedia.org/wiki/OS/390
http://en.wikipedia.org/wiki/OpenVMS
1.7 Factors contributing to mainframe use - - Introduction to the
67. New Mainframe: Z/OS Basics
1. Using the following table list several of characteristics of
mainframe computers
Characteristics of Mainframe Architectures
1.
2.
3.
4.
5.
2. There are many factors that contributed to mainframe use.
Using the following table list each factor and describe and
provide an application of each factor.
Factors Attributed to Use of Mainframe Architectures
Factor
Description and application
68. http://en.wikipedia.org/wiki/OS/360
http://en.wikipedia.org/wiki/Z/OS
http://en.wikipedia.org/wiki/MVS
IBM System z -
http://en.wikipedia.org/wiki/IBM_System_z
OS/360 and successors -
http://en.wikipedia.org/wiki/OS/360_and_successors
What is batch processing?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
Batch processing -
http://www.webopedia.com/TERM/B/batch_processing.html
How Batch Processing Made Me 10 Times More Productive -
http://www.problogger.net/archives/2008/06/12/how-batch-
processing-made-me-10-times-more-productive/
Advantages and disadvantages of batch processing and real-time
processing?
http://wiki.answers.com/Q/Advantages_ad_disadvantages_of_ba
tch_processing_and_real-time_processing
Advantages & Disadvantages of Batch Processing -
http://www.ehow.com/list_6632199_advantages-disadvantages-
batch-processing.html
69. Online transaction processing -
http://en.wikipedia.org/wiki/Online_transaction_processing
Transaction processing -
http://www.webopedia.com/TERM/T/transaction_processing.ht
ml
OLTP (online transaction processing) -
http://searchdatacenter.techtarget.com/definition/OLTP
CICS (Customer Information Control System) -
http://searchdatacenter.techtarget.com/definition/CICS
3. Describe and provide an example of Batch Processing?
Answer:
4. Describe and provide an example of Transaction Processing
(Online Transaction Processing - OLTP)
Answer:
70. 5. Use the following table to list the advantages and
disadvantages of Batch Processing?
Batch Processing
Advantages
Disadvantages
6.
Use the following table to list the advantages and disadvantages
of Transaction Processing (OLTP)?
Transaction Processing (OLTP)
Advantages
Disadvantages
71. 7. IBM System/360 architecture and mainframe operating
system OS360 were the origins of the current IBM Z
Architecture. Using the following table answer the following
questions
Features of the IBM System/360 Architecture
Answer
32-bit or 64-bit processors?
Primary designed for batch or OLTP?
Type of User Interfaces, e.g.,
terminal, online, web, etc.
Support of
Linux Operating systems
Support for TCP/IP and Internet Services?
Support of COBOL applications
Support of Java Applications?
72. z/VM
http://en.wikipedia.org/wiki/Z/VM
Processing work on z/OS: How the system starts and manages
batch jobs -
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
What is TSO?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
What is ISPF?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
What is JES?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
Main Features of ISPF
-
http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.i
bm.zos.zcourses/zcourses_ispfmain_book.pdf
ISPF Primary menu and Datasets -
74. 11. What is the z/OS component (subsystem) that provides
OLTP processing services for user transactions, e.g., inquiry to
account balances, adding employee information into a database,
etc. using legacy programming languages, e.g., COBOL?
Answer:
12. z/OS is a full feature operating system that executes IBM
legacy applications.
z/OS frequently runs under Z/VM as a guest operating.
What is the function of the z/VM?
Answer:
13. What is the relationship between z/VM, z/OS and zLinux
IBM Enterprise systems? Answer:
75. What is JES?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
What is a data set?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
What is a VTOC?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
VSAM Catalogs -
http://www.exforsys.com/tutorials/mainframe/vsam-
catalogs.html
Difference between catalog and vtoc -
http://ibmmainframeforum.com/viewtopic.php?f=6&t=1327
Direct access storage device -
http://en.wikipedia.org/wiki/Direct_access_storage_device
z/OS UNIX file systems
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
What is z/OS UNIX?
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
Clustering: A basic 101 tutorial -
http://www.ibm.com/developerworks/aix/tutorials/clustering/
76. LPAR -
http://www.pcmag.com/encyclopedia_term/0,1237,t=LPAR&i=4
6363,00.asp
Logical partition (virtual computing platform) -
http://en.wikipedia.org/wiki/Logical_partition_(virtual_computi
ng_platform)
Introduction to JCL
http://publibz.boulder.ibm.com/zoslib/books/tutorials/introjcl/in
dex.htm?noframes=true
IBM Parallel Sysplex
http://en.wikipedia.org/wiki/IBM_Parallel_Sysplex
What is a Parallel Sysplex 1443?
http://www-03.ibm.com/systems/z/advantages/pso/sysover.html
Rexx -
http://en.wikipedia.org/wiki/Rexx
What is Rexx? -
http://www.rexxla.org/rexxlang/
OS/2 REXX: From Bark to Byte -
77. http://www.redbooks.ibm.com/redbooks/pdfs/gg244199.pdf
Implementing REXX ot Support in SDSF -
http://www.redbooks.ibm.com/redbooks/pdfs/sg247419.pdf
What is a z/OS catalog?
https://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconcepts_172.htm
14. Given the following IBM Enterprise Concepts
IBM Enterprise Concepts
Concept
Description
JES
LPAR
VTOC
DASD
Data Set
JCL
Sysplex
Catalog
78. CICS
REXX
ISPF
TSO
3270 Terminal
15. From your previous research of use lookup images using
Google, paste an image that best illustrates the following
concepts in the table.
IBM Enterprise Concepts
Concept
Image
JES
LPAR
VTOC
DASD
Data Set
JCL
79. SysPlex
Catalog
CICS
REXX
ISPF
TSO
3270 Terminal
16. What concept in Windows is comparable to IBM datasets?
Answer:
Disk Volume (computing) -
http://en.wikipedia.org/wiki/Volume_%28computing%29
Disk volume -
http://searchstorage.techtarget.com/definition/volume
80. What is difference between volume and disk -
http://www.storagecraft.com/support/forum/what-difference-
between-volume-and-disk
Volume Label -
http://pcsupport.about.com/od/termsv/g/volume-label.htm
5.6 How data sets are named - - Introduction to the New
Mainframe: Z/OS Basics PDF
What are DASD volumes and labels? -
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconcepts_151.htm
17. What are DASD volumes and labels?
Answer:
18. On what type of device may data sets be stored?
Answer:
81. 19. How are data sets named? Answer:
20. What is the difference between a VTOC and a catalog
Answer:
21. VTOC is similar to which storage concept in Windows?
Answer:
22. Partitioned Data Set is similar to which storage concept in
Windows? Answer:
What is VSAM? -
82. http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zconcepts/zconcepts_169.htm
Virtual Storage Access Method
(VSAM)
-
http://en.wikipedia.org/wiki/VSAM
VSAM Demystified (Chapter 1) -
http://www.redbooks.ibm.com/redbooks/pdfs/sg246105.pdf
Key-sequenced data set (KSDS) -
http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp
?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqncd_data_set.ht
ml
Relative record data set (RRDS) -
http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp
?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqncd_data_set.ht
ml
Entry-sequenced data set (ESDS) -
http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp
?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqncd_data_set.ht
ml
Record-oriented filesystem -
http://en.wikipedia.org/wiki/Record-oriented_filesystem
83. Introduction to Partitioned Data Sets -
http://docweb.cns.ufl.edu/docs/d0068/ar01.html
23. An IBM 3270 terminal is used with what z/OS operating
interactive facility? Answer:
24. What is VSAM?
What is VSAM used for? Answer:
25. IBM files are record-oriented. Windows and Linux files are
byte-oriented.
When Windows or Linux stores files, e.g., a Word Document it
stores the contents of the files as a contiguous series of bytes
until the end of the file.
On the other hand, a record is a group of related data, words, or
fields treated as a meaningful unit; for instance, a Name,
Address, and Telephone Number can be a "Personal Record".
Therefore, IBM files were primarily designed to store business
data rather than a Word document or graphic file.
84. What were the advantages of the IBM record-oriented files.
Answer:
26. Using the following table describe each of the following
VSAM Dataset types that are used to store business transaction
data.
VSAM DataSets Organization
Dataset
Type
Description
Key-sequenced data set (KSDS)
Entry-sequenced data set (ESDS)
Relative record data set (RRDS)
Linear data set (LDS)
27. As an alternative to a VSAM dataset
IBM
85. provides for a Partitioned Dataset . Describe how a Partition
data set stores data? Answer:
28. What type of data is normally stored in a Partitioned data
set?
Answer:
29. Using Google find an appropriate image that illustrates the
concept of a Partitioned Data Set
Answer:
30. Within the structure of IBM JCL what is a JOB? Answer:
31. Within the structure of IBM JCL what is a DD statement
87. Security on z/OS -
http://wwwlgis.informatik.uni-
kl.de/cms/fileadmin/users/kschmidt/mainframe/lutzkuehner/Cha
pter11_Security_on_zOS_slides.pdf
What is RACF? -
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?t
opic=/com.ibm.zos.zsecurity/zsecc_042.htm
Resource Access Control Facility -
http://en.wikipedia.org/wiki/Resource_Access_Control_Facility
Security on z/OS
http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.i
bm.zos.zsecurity/zsecurity_book.pdf
SNA
http://en.wikipedia.org/wiki/IBM_Systems_Network_Architectu
re
Networking on Z/OS
http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.i
bm.zos.znetwork/znetwork_book.pdf
34.
88. What are the functions and features provided by IBM's RACF
product line (Resource Access Control Facility)? Answer:
35. What are the functions provided by IBM's SAF?
Answer:
36.
What is function of SNA?
Answer:
37. How is SNA related to TCP/IP? Answer:
89. 38. What is IBM Web Sphere? Answer:
39. What is IBM Web Sphere MQ? Answer: