Baker Assignment 2 Part 1 Spring 2022

docx

School

RMU *

*We aren’t endorsed by this school

Course

3212

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

84

Uploaded by SuperHumanRookPerson1476

Report
S ASSIGNMENT 2 HANDS-ON – PART 1 TOPAZ LOGIN AND DATASET SETUP J. Packy Laverty laverty@rmu.edu
To better Access and Search the content of this assignment, turn on the Word Navigation Pane (Windows - Click on View and Check Navigation; MAC – Click on View and Select Document Map). Students will find that using the document FIND tool or searching GOOGLE may also be valuable for researching the review question answer. Page 2 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Enter your Name Here è Nicholas Baker Introduction Tutorial Prerequisites Your instructor will assign a z/OS userID and initial password. If necessary, consult your instructor for more support or details. You will need access to the Compuware Topaz Workbench client. The Topaz Workbench installation file and directions to install Topaz on your personal Windows computer may be found in the Blackboard Main folder name "Mainframe 3270 Client Connections and IDEs" Download - Compuware Topaz Workbench Eclipse-based client May be may be installed on your personal Windows computer. https://sentry.rmu.edu/download/topaz/Topaz_Workbench_20.03.02_20200804.exe Topaz Workbench is also may be installed of your Windows personal computer, or available on RMU AppStream, or RMU Lab computers. Tutorial Recommendations Hands-on is the Best Way to Learn It is recommended that students logon to z/OS and should attempt the hands-on demonstration examples while **reading this tutorial". The best way to learn z/OS is simply to read the directions and complete the hands-on requirements. The student should avoid getting distracted or becoming overwhelmed by a few technical concepts. If the student follows the hands-on directions, the technical concepts may be easier to understand after you have completed these hands-on requirements. Your instructor will schedule a Google Meet Session to demonstrate this tutorial. Previous Enterprise Students If the student or faculty member had previously logon the IBM RMU Mainframe AND your User ID is active, you should first attempt to Login using Topaz Workbench using your previous User ID and password. If successful, these students will NOT be required to change their Initial Password, i.e., BLUESKY, or install their practice data sets. If you are previous students, you will be able to access all of your previous work stored in our catalog data sets. Page 3 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
How to complete Hand-on Tutorial Requirements and Review Questions In this tutorial directions and demonstration examples to guide the student to perform hands-on requirements. Using the tutorial demonstration examples the student will be required to perform a similar hands-on task. The student will be required document the answers and completed work. For example following is an example of typical tutorial hands-on requirement. Use a Snipping tool to document your successful logon with a display of your Topaz Workbench Host Explorer below. The directions specify the use of a graphical snipping tool, such as the Window's Snipping Tool. (Directions to use the Window's Snipping Tool will be presented next.) Any graphic snipping tool may be used to demonstrate that you have successfully completed the required hands-on task. A grey or colored box will be provided after the requirement directions. You are required to provide a graphic image, e.g., using cut-and-paste, to document that the hands-on requirement was correctly completed. Review questions are also be provided at the end of the tutorial. The following is an example of a review question format. Since type the answer in provided grey or colored box. 1. What is the purpose of a partitioned data set? Answer: A partitioned data set is a data set containing multiple members, each of which holds a separate sub- data set, similar to a directory in other types of file systems. This type of data set is often used to hold load modules, source program libraries, ISPF screen definitions, and Job Control Language. Type in the answer to the question into the grey or colored box. It is recommended that you use Table of Contents at the beginning of the tutorial to review and navigate to the concept presented in the review question. Students will find that using the Page 4 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
document FIND tool or searching GOOGLE may also be valuable for researching the review question answer. Page 5 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Windows Snipping Tool (If necessary, consult your instructor for other graphical copying tools) The following YouTube Videos will provide more directions for Windows 10, 8 and 7 Snipping Tool Windows 10 Tutorial | How to Use Snipping Tool - https://www.youtube.com/watch? v=RbPAxcTf8h8 How To Use Snipping Tool & Print Screen | Windows 7 Tutorial - https://www.youtube.com/watch?v=DQqwLkrqvmQ Copying a z/OS Image into your Hands-on Requirement (Using Windows 7) Step 1 . Click on the Window's Start Button located at the lower left-hand corner of your desktop. In the " Search programs and file " text box type the key word Snipping . The name of the Snipping Tool should appear. Select the Snipping Tool entry. The following Snipping Tool Dialog Box will be displayed. It is recommended to drag this dialog box outside the area that you want to document before you may continue; else, you may copy the dialog box. Step 2. Once you have z/OS information displayed in your 3270 emulator that you wish to document, click on the " New " icon to start the image selecting process. Your desktop will be colored greyed, or dimmed, which indicates that the Snipping Tool utility is ready to select an image. Step 3. Drag a copy box select tool using your right-mouse button around the image to be selected. Once you release the mouse button, a Snipping Tool windows box will display your selected image and a tool bar similar to the following. Step 4. For this tutorial you should select the Snipping Tool Copy Button /Icon which is displayed with two sheets of paper. Select the Copy Button. See previous red arrow. Step 5. Position the cursor inside the grey or color Hands-on requirement box and left-click to select the position. Step 6. Paste the image using Ctrl-V or the Edit/Paste drop down menu. Your documented result should look similar to the following. Page 6 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Use the snipping tool to document your successful logon with a view of your ISPF Primary Option Menu below. Your image should be inserted in the box below. Page 7 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
1.0 Connecting to System z Mainframe and the z/OS Logon Process 1.1 Client/Server Architectures Video - What is client server architecture? https://www.youtube.com/watch?reload=9&v=ggp5C1q0gNA Client/Server architectures are a distributed computer and application model, which will connect or shares processing responsibilities with another computer or application. A Client program REQUESTS services that a Server executes a program to return a RESPONSE to the client program. For example, a HTTP Browser is a client program, e.g., Chrome, which requests web pages and other services. Server programs, such as Apache or IIS, may provide HTML web pages or other data and services to the client program. The HTTP browser/web server model provides both connection and sharing of processing responsibilities. Client/ Server applications enable interoperability. Interoperability is the ability of different systems, devices, applications or products to connect and communicate in a coordinated way, without effort from the program or user. These benefits of client/server architecture provides flexibility between two computer applications that share common processing requirements, even though: A client and server may use different hardware or operating systems, such as Windows, z/OS, Linux or other operating systems. A client and server may use different binary codes, to transmit, display and store applications and data. A client and server may use different program languages to develop, test and execute services A client and server may use different local security systems, or may use a common security system to share processing responsibilities. Page 8 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
1.2 Mainframe Client – Server Alternatives 1.2.1 3270 and TN32070 Access Video - TN3270 http://www.redbooks.ibm.com/courses/CRSE0304/CRSE0304_L5.mp4 3270 was an IBM physical display . 3270 was also a streaming character data protocol , which would position data on a terminal screen (rows and columns) and then return user-entered and device data back to the mainframe. The 3270 protocol was introduced in 1971 a decade before HTML, an alternative character data protocol, was introduced. Both 3270 and HTML transmitted data between the client and the server. Neither are network protocols. 3270 was only used for dumb terminal clients. TN3270, or terminal emulation 3270, permits the 3270 protocol to transmit data between an operating system client and the mainframe. The 3270 primary objectives were to minimize the data to be transmitted and communication overhead for the mainframe to be managed. For example, a user or programmer would type and format data of a 3270 display screen. Data would not be transmitted to the mainframe until an Enter key was pressed to transmit an entire screen. From the perspective of a Windows computer, the mainframe assumes that Windows is text-based, 3270 dumb terminal, using a few extra features, e.g., some text-based, 3270-clients will support a mouse and color screens. TN3270 terminal emulation clients are available for Windows, Linux, IOS, and Android Decades later, programmers would describe this 3270 communication protocol as an Asynchronous Request or Response . No how much time idle time a student dreams of their next Expedia or Priceline get-away trip, Expedia does care until you press that "Book It" button to process that request. The mainframe does not see the terminal devices until the terminal client completes the complete data entry and presses an Enter, Submit, or other key. Most are more familiar and prefer a modern Synchronous Request or Response communication protocols. For each character a user or client types, each character is automatically transmitted the character to the server, which may returns a list of suggestions to autocomplete an input. For each movement of a client or mouse over a picture, each change in mouse screen position is automatically transmitted to the server, which may return a list of suggestions or display a new picture. While Synchronous Request or Response technologies have grown in popularity, this technology requires significantly more client or server processing requirements and overhead. Page 9 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Over the decades, three major types of mainframe 3270 clients were used by application and system programmers to connect and login to a mainframe: 3270 Terminals – non-intelligent hardware device, which included a keyboard, display device and a network connection to pass data between the client and the mainframe. All processing and storage services are performed by the mainframe server using text-based user interfaces. TN3270 Client Terminal Emulation software provides connections to a mainframe and is executed on Windows, Linux, Mac OS, mobile devices and other client operating systems. All processing and storage services are performed by the mainframe server using text-based user interfaces, such as PCOMM, TN3270, etc. TN3270 Mainframe IDE software also provides connections to a mainframe and is executed on Windows, Linux, Mac OS, mobile devices and other client operating systems. All processing and storage services are performed by the mainframe server . Mainframe IDE software emphasizes user- friendly, advanced graphical user interface and graphics, and may also provide most text-based legacy tools, e.g., TSO, ISPF, and SDSF Page 10 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
1.2.4 What is ASCII and EBCDIC? Electronically, a digital computer is only capable of storing, understanding and processing information as combination of bits. A bit is conceptually similar to a simple light switch. Either the switch is on or it is off. Early computer hardware used a variety of different electronic technologies to store a bit. The following are some early pictures of storing bit from Pingdom ( http://royal.pingdom.com/2008/04/08/the-history-of-computer-data-storage-in-pictures/ ) and Timeline of Computer History http://www.computerhistory.org/timeline/memory-storage/ The 1024-bit Selectron. The Magnetic Drum Can you imagine the size of your laptop if we would store a bit using these 1940s and 50s technologies? It does not matter which electronic storage method is used, a bit is any device that is capable of having two states. It is either ON or OFF. Most modern computers have electronic components that in theory works like a light switch it is either ON or OFF. To make life easier, the number 1 is used to represent an ON or a True state. The number 0 is used to represent an OFF or a False state. Binary electronics are reliable and inexpensive to build. Digital computer are based on two numeric states. All hardware computer functions are built on a combination of bits or multiples of twos, i.e., 2, 4, 8, 16, 32, 64, 128, 258, 512 and 1024. A byte or word is a combination of bits. What is more important to remember is that a Binary Representation Code must be used by a computer to understand the meaning of those combinations of bits. ASCII and ECBDIC are two examples of binary codes. While electrical engineers may get excited about the basic bit (or one light switch), a bit does little to help an average person store or manipulate human data and information inside a computer. A bit can only represents two states. Symbolically, the ON state can represent a "Passing Grade" and the OFF state can represent a "Failing Grade" Paul Revere was famous for his warning that the British were coming, which used a binary digit, or two simple values. "One by Land and Two by Sea". As history reports this data representation system was quite adequate. What would have been the result if the British wanted to stop at Heinz Field during a Pittsburgh Steeler's game to eat a Parmenitti Bros Sandwich before the attack? There was provision for a third option, which could have changed the revolutionary war. (A little bit of humor - a real little bit. What can you expect from a Steeler fan?) Simple binary codes and bits do permit computers to process numeric data. However, humans also required to communicate using letters of the alphabet, special characters and symbols. In the late 1950s, IBM introduced an 8-bit binary code called EBCDIC (Extended Binary Coded Decimal Page 11 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Interchange Code ), ECBDIC that would combine 8-bits (256 combinations), which would be used to arbitrarily represent a letter of alphabet. Behinds the scenes the IBM mainframe uses the ECBDIC would store the number 193 which symbolically meant to display a capital letter " A " on the display to make these humans happy. The letter " B " would be stored as an ECBDIC number 194 , and so forth. Though IBM's 8-bit EBCDIC was could store both upper and lower case alphabetic characters, numbers, and other symbols, it was proprietary binary code. Originally, binary codes could only store and process numeric data. There are three binary coding standards introduced to compete with IBM’s ECBDIC, i.e., ASCII 7-bit (128 combinations), ANSI 8-bit (256 combinations) and Unicode 16-bit (65353 combinations.) Almost all computers use ASCII, ANSI, and Unicode. EBCDIC is only used by z/OS mainframes operating systems. The example compares the differences between how z/OS stores the letter “A”, and how ASCII stores the letter ”A”. ECBDIC will store the number 193 to display and represent the capital letter "A", and stores the number 194 to the display and represent the a capital letter "B". However, your Windows and Apple computer uses ASCII. ASCII will store the number 65 to display and represent a capital letter "A", and stores the number 66 to the display and represent the capital "B". To humans, all we see is the capital letter "A". However, each computer system sees a different value, such as, the integer numbers for ECBDIC as 193 and ASCII as 65. If you are confused, can you imagine the confusion if a Windows or Apple operating system, which uses ASCII to communicate IBM mainframe that uses ECBDIC? This one of the major reasons we use a 3270-client to convert the ASCII binary codes, e.g., the number 65 for a capital letter "A", to the number 193 so that the mainframe can understand that EBCDIC can interpret the transmit characters as a capital letter "A". This is the process of ASCII-to- ECBDIC binary code conversion. Page 12 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
1.3.5 3270-Terminal Keyboard The old-style IBM 3270 terminal keyboard's layout is different than your Windows or MAC keyboard. Your keyboard has function keys on the top row labeled as F1...F12 key . This Function Key layout was based on the original IBM 3270-terminal key board, but were labeled PF1 through PF24. Modern keyboards have only ONE labeled ENTER key, but the 3270-terminal keyboards had two ENTER keys . The larger ENTER key is often called the Line Feed (skip a line key). The second, and more important 3270 ENTER key was located where the Right-CTRL key on the standard PC keyboard. The Right-CTRL key is VERY important on a 3270-terminal. The Right- CTRL key means to SEND information entered or typed on the terminal keyboard to the mainframe and to be executed. This second ENTER key, or the Windows Right-Ctrl key, is often called the RETURN key. The bottom line, the second ENTER or RETURN key is the most important. MAC computer and laptops keyboards do NOT have a right-CTRL Key. Your 3270- emulator program must "map" or assign an alternative MAC key to perform the same function as the RETURN or right-ctrl key. An original 3270 keyboard had three keys called Program Attention keys, labeled PA1, PA2, and PA3 and another key labeled CLEAR. These keys are not available on a PC or MAC keyboard and must be mapped, or assigned, to different keys. These assignments are not standardized across keyboards or 3270-clients. Most emulators supplement your physical key board with a pop-up key board. PA1 , assigned to the 3270-emulator ESC key, is pressed to interrupt a program/command or a job hangs-up. Pressing the PA1 or ESC key is similar to pressing the Ctrl+Break key combination with a Windows hangs-up. The 3270-terminal CLEAR key, assigned to the PAUSE key, means to refresh the screen. The CLEAR key is rarely used in z/OS, but may be used in many z/OS middle ware programs. Page 13 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
1.3 Client/Server Network Connection Services TCP/IP is a very popular transport and network protocol, which a client and server may use to connect and share processing responsibilities. System z mainframes are popularly accessed by TCP/IP. IBM mainframes also supports their proprietary network protocol SNA. To connect a server, a TCP/IP client must be configured with an IP address and a Port Number An IP address uniquely identifies a computer or connection, e.g., our z/OS server is 192.86.32.17. Since two different computers on the same network must be assigned a unique IP address. Your client computer will have a different IP address. A Port Number uniquely identifies a program, e.g., TN3270, web server, or Topaz server, which interfaces with a client. An Internet Browser, e.g., Chrome, Web server uses an IP address or a domain name to connect to a web server. The default web server port number is port 80. Likewise, each TN3270 client will require the client provides a method to specify an IP address. Each 3270 client has its own method to specify to identify the mainframe's IP address and the Port number. IBM PCOMM, a legacy client, configures the access using a Profile or WS text file to connect to TSO For example, IP Address 192.86.32.17 and Port Number 623. Topaz Workbench IDE , configures Client Access using a Host Connections Interface (HCI) specifies IP address 192.86.32.17 and port number 16196 to connect to the Topaz Server. Details are presented in Requirement 2.0 Compuware System z Topaz Workbench Zowe Explorer IDE , configures the client access using a Profile to connect to zOSMF and Zowe. Details are presented in Requirement 4.0 Visual Studio Code, Zowe Explorer (COBOL), and IBM Z Open Editor Page 14 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
1.4 Overview of z/OS Operating System, Subsystems and Daemons z/OS is a 64-bit operating system, which combined the strengths and advantages of IBM's historical MVS (Multiple Storage System) operating system and the strength advantages of UNIX operating system. A operating system kernel or MVS base control programs controls everything, is collection of programs that provided minimum set of required services and is always memory resident. The computer hardware will IPL or boots to loads and initializes the cores of MVS and UNIX operating systems. After the boot process, JES or UNIX exetd will load optional z/OS subsystems or UNIX daemons or services. z/OS subsystems provides specialized subsystems provides services when requested by a client program. The following graphic provides an overview of z/OS subsystems, daemons or services, and external and internal clients identified by an IP address and TCP port number used Topaz Workbench to connect and login. Page 15 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Please review the Introduction to System z - Section 5.0 for more Details of the System z Subsystems presented below. Page 16 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
The z/OS operating system kernel is a collection of base control modules (programs) that provide functions similar to other operating systems e.g., physical and virtual memory management, task management, I/O control management, file system management, and some other core operating systems. Most are familiar with Windows, Linux or UNIX operating system kernel. z/OS does not use the term "kernel", but rather calls these core functions Base Control Programs (BCP). Unlike Linux and UNIX, z/OS does not permit system administrators to compile or modify the kernel for security reasons. z/OS only permits system programmers to customize the parameters under which a fully tested z/OS base control program will function. Rootkits do not exist in z/OS. A rootkit is malware that compromises, either legitimately or maliciously, of the operating system or functions. 1.5 Subsystems, Daemons or Services What is z/OS subsystem? A z/OS subsystem is similar to the concepts of a Linux or Window's daemon or service that executes in the background waiting for either a user, another subsystem or kernel of the operating system to request service that the kernel does not directly provide. A Subsystem or Daemon are example of a backend server application that listens for service requests from a client application A client application may be a program or user. For example, a DB2 Database Management subsystem (a client) may make a request to the RACF security subsystem to see if a DB2 SQL request has been authorized. Large-scale systems will apply division of labor and specialization across a sequence of multiple computers or applications. Similar to the Domino pizza analogy consider another client-server analogy in which your instructor assumes the role as a technical computer specialist. Your instructor needs the support of another specialist to perform certain functions. The academic secretary will provide support services to proof-read and store class resources. Academic counselor will provide support services to interact with student's problems. Tutors may support students. School security may handle academic security problems. In z/OS terminology, these functional specialists will provide services to your instructor in a manner that z/OS subsystems provide specialized services when requested. Most have used an Internet client browser, such as, Chrome, Internet Explorer, or Firefox, to request a web page from an HTTP or web server. The z/OS web server is an Apache HTTP (Web) server similar to the Open-Source Apache version used by Linux or Windows. The Windows Server also uses a proprietary version of the Microsoft web server called IIS (Internet Information Server). While each program may provide the same functionality they will have different names. For example: The z/OS Apache web server is called a "subsystem", The Linux Apache server is called a "daemon", and The Windows IIS web service is called a "service." A z/OS subsystem, a Linux daemon, or a Window's server provides the same functions, but are called different names. All three server programs will wait idle in the processing background until a client program requests a service to be performed on the client's behalf. Perhaps, students listening this lecture may be classified as a subsystem, daemon or service program. Many students are idle, sleeping, texting, or sitting in their seats until the instructor wakes them up and ask them a question. Page 17 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
1.6 Questions 1.6.1 Questions - Client/Server Architecture, 3270, Network Connectivity 1. Explain the functional differences between a Client and Server. Answer à A server is a program or machine that waits for and processes incoming requests from a client while a client is a program or machine that sends requests to servers. 2. Client/Server architectures offers benefits beyond sharing processing responsibilities. Client/Server architectures provides for interoperability. List several interoperability benefits that Client/Server architectures offers. Answer à Some benefits are that a client and server may use different hardware or operating systems, such as Windows, z/OS, Linux or other operating systems, a client and server may use different binary codes, to transmit, display and store applications and data, a client and server may use different program languages to develop, test and execute services, and a client and server may use different local security systems, or may use a common security system to share processing responsibilities. 3. List the two functions of the IBM 3270 data protocol? Answer à The 3270 primary objectives were to minimize the data to be transmitted and communication overhead for the mainframe to be managed. 4. Describe the difference between IBM 3270 and the TN3270 data protocols. Answer à 3270 was only used for dumb terminal clients while the TN3270 permits the 3270 protocol to transmit data between an operating system client and the mainframe. 5. List the modern data streaming protocol introduced a decade after 3270, which is most popular than 3270 and most students use every day. Answer à TN3270 Mainframe IDE 2. Explain the purpose and differences between ASCII character encoding and ECBDIC character encoding. Answer: ASCII and ECBDIC character encoding were both used to encode letters so that they could be processed in some way. They are different in the way that they enode the letters. Ascii encodes the actual letter while ecbdic stores a number to represent the letter. 3. The older 3270 terminal keyboard used to connect to mainframe is layout differently than your desktop or mobile device keyboard. The older 3270 keyboard had two Enter keys. On a Windows keyboard what is the purpose of the Right-Ctrl Key? Answer: The right-CTRL key means to send information entered or typed on the terminal keyboard to the mainframe and to be executed. Page 18 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4. To connect to a z System mainframe across the Internet, the 3270 emulator must be configured with two pieces of TCP/IP information: an IP Address and a Port Number. What are the functions of an IP Address and a Port Number? (This answer would be the same whether or not you connecting to an IBM mainframe and TSO or connecting to amazon.com.) Answer: An IP address uniquely identifies a computer or connection and a Port Number uniquely identifies a program. 5. When you use your 3270-emulator to connect to a mainframe, which IBM subsystem or program permits you to LOGON to z System Mainframe? Answer: Zowe Explorer IDE Page 19 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
6. When using a 3270 client, e.g., terminal emulation or IDE, where are mainframe application executed? (Hint: the client or the mainframe server). Answer à In the mainframe server 7. To connect to a mainframe using the TCP/IP network protocol, one must configure an IP address. Describe the function of an IP address. Answer à An IP address uniquely identifies a computer or connection 8. To connect to a mainframe using the TCP/IP network protocol one must configure a Port address. Describe the function of a Port address. Answer à A Port Number uniquely identifies a program 9. Explain the difference and relationship between the 3270 and TCP/IP protocols. Answer à The TCP/IP protocol identifies and specifies who is connecting to the mainframe or server while the 3270 protocol provides the connection to that mainframe or server. 1.6.2 Questions – z/OS Mainframe Operating Systems and Subsystems 1. List three or more functions of an Operating System kernel. Answer à A operating system kernel controls everything, is collection of programs that provided minimum set of required services, and is always memory resident. 2. Describe the functions of a Mainframe Subsystem or a Linux Daemon. Answer à A subsystem is similar to the concepts of a Linux or Window's daemon or service that executes in the background waiting for either a user, another subsystem or kernel of the operating system to request service that the kernel does not directly provide. 3. List a z/OS subsystem which is responsible to provide authentication and authorization security services for clients. Answer à The RACF security subsystem Page 20 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
1.7 Types of Application and System Programmer Clients and Mainframe Tools 1.7.1 Overview of Text-Based TN3270 Clients and System Tools Text-based 3270 clients, such as PCOMM and Vista TN3270, will connect to System z TSO. System z TSO, ISPF and SDSF are commonly referred to as mainframe legacy tools , which are often preferred by mainframe experienced application and system programmers, and system administrators. Video - TSO http://www.redbooks.ibm.com/courses/CRSE0304/CRSE0304_L6.mp4 Video - ISPF – Interactive System Productivity Facility http://www.redbooks.ibm.com/courses/CRSE0304/CRSE0304_L7.mp4 Video - SDSF – System Display and Search Facility | z/OS Introduction https://www.youtube.com/watch?v=S4apMxxXlyM Video - Meet the Mainframe - Connecting to TSO, Navigating ISPF, and using SDSF https://www.youtube.com/watch?v=lYPCUhbKEDM TSO was the first text-based, command line interface (CLI) . Windows, Linux and UNIX operating systems also provide a text-based CLI. During a text-based logon, TSO will request RACF to authenticate the logon user. TSO is similar Windows CMD or Linux bash shell. Most application deployment and administrative tasks can be performed in TSO ISPF is a customized, text-based menu system that provides a full-screen text editor (similar to EDIT, nano or gedit, DSLIST ( similar to Windows File Explorer) , and common file utilities, such as, copy, move, delete, etc. ISPF is easier-to use than TSO, and provides menu panels for develop and maintain databases, RACF Security, use UNIX, and manage the file system SDSF is a text-based menu system that provides system administration tools, which is used to debug application and system program syntax and run-time errors , displays active applications or subsystem similar to Windows Task Manager. SDSF may also starts and stops subsystems similar to Windows Service Manager. Page 21 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
1.7.2 Overview of System z Client-based IDE (Integrated Development Environment) and Tools Students or new developers may be more familiar with graphical user interfaces than text-based CLI or menu interfaces, such as Visual Studio and Eclipse-based plugin IDEs Integrated Development Environment (IDE) clients and software for building applications that combines common developer tools into a single graphical user interface (GUI). Mainframe DEs are often called thick clients. The following is a summary of the common features of System z application and system programming IDE tools: System z IDE Source Code editors assist in writing software code faster and with less experience. Highlights syntax with visual cues, e.g., highlights program structure and distinguishes statements and clauses from data. Provides language specific auto-completion, e.g., predicts program syntax or data names after a few keystrokes. Checks for bugs and syntax errors or autocorrects program code is being written. System z IDE Local or Server Build and Testing Automation tools will simplify the process or compiling source code into executable code, package binary executable code, and runs automated tests. Testing focuses on finding bugs and errors and are used to ensure that the program is correct and meets specification standards. Source code is edited by the client operating systems. Unlike Visual Studio or Eclipse-based IDEs, System z application source code is stored, compile, link executed, and tested on a mainframe. After an application has been successfully tested it may be deployed to a live mainframe system. System z IDE Debugger Tools are designed to assist programmers to troubleshoot the cause of run- time, logic, or program specification errors after program bug has been found. There are hundreds of IDE Clients and Tools available to support a variety of server and mobile operating systems, program languages, web page (HTML) design, middleware integration and data storage, and application security testing. Availability of IDEs may be centralized at the server level, access is decentralized through remote "fat" clients, or available web "thin" clients. Every COBOL IDE supports a File Manager similar to Windows Explorer, which has been modified to the z/OS operating system. Every COBOL IDE supports an intelligent GUI source code editor, which assists in writing COBOL code faster and with less experience, which minimizes the number of syntax errors. The following sections will overview the three popular client-based IDEs that support mainframe COBOL Page 22 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
1.7.3 System z Web-based IDEs and System Tools While Client-based IDEs, such as Visual Studio, Eclipse, Topaz, IDz or Zowe Explorer and Web- based IDEs may provide similar functions, there are many technical and cost differences. Client-based IDEs and development workbenches must be installed and maintain a client computer operating system. Client-based IDEs must be compatible with the client operating system. Web-based IDEs are normally available on the cloud and may be accessed by a browser. If an application or system program programmer is editing a file or dataset, a Client-based IDE may be required to be downloaded from the server, and then the edited version must be uploaded to the server. Legacy text-based and web-based IDEs will edit the file or dataset directly stored to the server. Client-based IDEs often provide more mature capabilities or may be used to offload and distribute computation-intensive workloads to the client. However, client-based IDEs are also designed to distribute tasks to a centralized server, e.g., program compilation and execution, system administration, etc. Page 23 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
1.7.4 Questions - – Legacy, Client-based IDE and Web-based IDE 1. List the System z text-based tool that may be used to debug COBOL syntax coding errors or run time errors. Answer à SDSF 2. List the System z text-based tool that may be used to ode a C or C++ using a full-screen text editor. Answer à ISPF 3. List the System z subsystem which provides a text–based command line interface similar to a Windows CMD or the Linux Bash shell. Answer à TSO 4. List the Windows tool that is similar to the text–based ISPF DSLIST Panel. Answer à Windows file explorer Page 24 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
5. List the Windows tool that is similar to the text–based SDSF utility that displays currently executing programs and subsystems. Answer à Windows Task Manager 6. List and describe three major System z IDE application development tools. Answer à System z IDE Source Code editors assist in writing software code faster and with less experience. System z IDE Local or Server Build and Testing Automation tools will simplify the process or compiling source code into executable code, package binary executable code, and runs automated tests. System z IDE Debugger Tools are designed to assist programmers to troubleshoot the cause of run- time, logic, or program specification errors after program bug has been found. Page 25 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
COBOL Training Course GitHub: https://github.com/openmainframeproject/cobol-programming-course 2.0 Compuware System z Topaz Workbench Client and Tools 2.1 Introduction to Topaz Workbench Download - Compuware Topaz Workbench Eclipse-based client May be may be installed on your personal Windows computer. https://sentry.rmu.edu/download/topaz/Topaz_Workbench_20.03.02_20200804.exe ' The Compuware Topaz Server component is installed on the RMU IBM mainframe and will be introduced in FALL 2020. The Topaz Workbench client has been made available and is academically supported by a grant from Compuware. The Topaz Workbench is a proprietary, student-and- developer-friendly COBOL IDE and DevOp client and server architecture, which compiles, executes, tests and provides interactive troubleshooting tools directly on the mainframe. Topaz supports TSO, ISPF, SDSF and other legacy tools. 1. The Topaz intelligent, multi-language source code editor may be also used to code, integrate and execute CCOBOL, PL/I, C/C++, Java, Assembly (HLASM), ReXX, JCL, and many other programming and scripting languages. 2. The Topaz IDE also provides a Visual Program analysis tool, which makes it easier for students and developers to understand the hierarchical flow of a program and data. 3. Topaz provides access and editing capabilities for z/OS data sets, UNIX files, and DB2 tables, without coding and application. 4. However, the Topaz Workbench does not provide advanced application interactive debugging, troubleshooting, or analysis tools for DB2, IMS or CICS. 5. Using third-party Topaz Workbench Eclipse plug-ins, the Topaz Workbench will extend the workbench capabilities and provide DevOps tools and capabilities beyond the Topaz Workbench IDE. Extra licenses may be required advanced interactive troubleshooting tools, such as, Expediter and Abend-AID 2.2 Topaz Workbench Concepts and tools Video - Compuware Topaz Workbench User-friendly details will be presented later. https://www.youtube.com/watch?v=fIdDNSu3mDc&list=PLVZm6RRmczLaPiwJFbbnaKrAkbDu3OcA7 Compuware Topaz Workbench is an Eclipse platform used to integrate multiple Topaz IDE tools. Beginner COBOL programmers will start learning introductory COBOL application development using the Topaz Host Explorer and JES Explorer Tools. Later students will learn to debug and troubleshoot COBOL logic and ABEND errors by using Topaz's Xpediter, File-AID and Abend-AID tools Page 26 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
2.2.1 Host Explorer Topaz's Host Explorer is similar to Window's File Explorer or ISPF's DSLIST to manage files/data sets and GUI text editor, or to the legacy ISPF tool. The Host Explorer editor assists in writing software code faster and with less experience, which minimizes the number of syntax errors. By default, Topaz will display the following four-frame view, when you start Topaz. Hosts Explorer Frame displays Host Connection Icons (HCI), which will enable the programmer to login, or connect to a System z mainframe. After a successful login, you connect to any DB2 for z/OS table, z/OS program or data set, or UNIX program or file. You may SUBMIT or find the properties of any data set. Text Editor Frame will permit you to edit and syntax check multiple applications or JCL source code. Outline Frame displays an outline of data and paragraphs of a COBOL program to facilitate easy navigation the text Editor frame. Clicking on a COBOL data element or paragraph will jump to that location in the COBOL source code in the Text Editor. Console Frame toggles between TSO prompt, JES JOB status, SYSLOG and other consoles. During your Topaz session, you may close or resize a frame. The easiest method to reset Host Explorer default four-frame view is to click on the Host Explorer Icon, displayed in the upper- right corner, and select RESET. Page 27 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
2.2.2 JES Explorer Topaz's JES Explorer is similar the SDSF Status Panel, which will provide a COBOL programmer error messages which may be used to correct JCL and COBOL syntax error messages. COBOL programs which have either JCL or COBOL syntax errors will not execute. 2.2.3 Xpediter Topaz's Xpediter mainframe application debugging and analysis tool, which enables developers to get into an interactive test session to monitor and control source code during execution line by line to analyze COBOL execution logical errors. Logic errors are errors that does not satisfy program requirements or provides incorrect or unexpected results. File-AID and Xpediter are complimentary execution logic tools, except File-AID focus on data management. 2.2.4 File-AID and SQL Editor Topaz's File-AID and SQL Editor allows the programmer to 1. Display or edit Sequential and VSAM datasets, Db2 tables, and IMS hierarchical DBMS, and z/OS UNIX and UNIX files without coding a program. 2. Enables the programmer to create and update File-AID XREF 3. Provides Compare and Search capabilities 4. Enables you to dynamically build, edit, and test SQL statements without having to type SQL code with the SQL Query Builder. Assume that a COBOL application requirement is to update customer and credit card transaction data. File-AID enables developers to retrieve the right data to ensure all test conditions (requirements) were met, or to adjust and simulate other test data conditions. 2.2.5 Abend-AID Topaz's Abend-AID is used to troubleshoot and analyze a z/OS System or User Abend. A mainframe Abend is an abnormal termination of software, or a program crash. A program crash may be caused may be caused by improper execution of COBOL or Java application program, etc., attempt to store invalid data, file or program not found, insufficient disk space, divide by zero exceptions. A program crash may be cause by a middleware abends, such as a DB2 database error. When a mainframe program crash occurs, operating system will 1. Display a four-character Abend code, normally starting with the letter "S", and 2. Store the recorded state of the working memory of a computer program at a specific time, generally when the program has crashed or otherwise terminated abnormally in an abend diagnosis file is called a "memory or system dump" file. On many occasions, Microsoft Word or Excel crashes will display a message such a user-friendly abend condition, such as Word is not responding or Working. The user will then request to send a crash report, a system dump, to Microsoft (the programmers who wrote Word program code). Few are experienced enough to debug a Word program crash. Page 28 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Debugging and troubleshooting Abend codes and memory dumps is challenging and requires advanced programming skills. Topaz's Abend-AID tool simplifies the abend, or program crash, troubleshooting process. Advanced COBOL students who desire to earn a starting salary above $100,000, will be introduced to Topaz Abend-Aid. 2.3 Questions – Topaz Concepts 1. Describe the function of the Topaz Workbench Host Explorer Frame. Answer à The Host Explorer editor assists in writing software code faster and with less experience, which minimizes the number of syntax errors. 2. Topaz Workbench Host Explorer Frame is similar to which Windows tools? Answer à Windows File Explorer 3. Describe the function of the Topaz Workbench Outline Frame. Answer à The Outline Frame displays an outline of data and paragraphs of a COBOL program to facilitate easy navigation the text Editor frame. 4. Which Topaz tool will help a programmer find COBOL to find program syntax errors? Answer à Text editor frame 5. Which Topaz tool will help a programmer find COBOL logic errors while the program is executing? Answer à Xpediter Page 29 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
3.0 Topaz Workbench Login 3.1 Overview of Using Topaz to Connect and Login to a System z Mainframe Download - Compuware Topaz Workbench Eclipse-based client May be may be installed on your personal Windows computer. https://sentry.rmu.edu/download/topaz/Topaz_Workbench_20.03.02_20200804.exe The System z login process is similar to authenticating to any other operating system. A valid User ID and password provided by the instructor, will be used for authentication credentials. The following graphic summarizes 1. Access Topaz Workbench client may be installed on your Windows personal computer (recommended), RMU AppStream or RMU lab computers. 2. Connect to z/OS across the Internet using a 3270-emulator client. 3. Authenticate to RACF – the IBM Security Server 4. Allocate mainframe memory and processing to your Topaz TSO session. Page 30 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Page 31 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
If the student or faculty member had previously logon the IBM RMU Mainframe AND your User ID is active, you should first attempt to Login using Topaz Workbench using your previous User ID and password. If successful, these students will NOT be required to change their Initial Password, i.e., BLUESKY, or install their practice data sets. If you are previous students, you will be able to access all of your previous work stored in our catalog data sets. 3.2 Create a Host Connection Interface (HCI), if necessary RMU's lab computer or Windwos virtual desktop, e.g., RMU AppStream, may have previously configured a Host Connection Interface (HCI) for you. For example, your Host Connection Interface icon (HCI), such as RMU, may be initially displayed listed. Download Link for Compuware Topaz Workbench Eclipse-based client https://sentry.rmu.edu/download/topaz/Topaz_Workbench_20.03.02_20200804.exe A student or faculty member may download and install the Topaz icon on their Topaz on their personal Windows computer. You must manually configure Topaz Host Connection Interface (HCI). However, the installed client Topaz Workbench must have access to a Topaz server, installed on your school or employer's System z mainframe. Note: The Topaz server is not installed on the IBM Master the Mainframe System z mainframe. A Topaz Host Connection Interface (HCI) specifies a named combination of an IP address and Port Number, and other network parameters used to make a TCP/IP connection to a mainframe server. A Topaz HCI is roughly similar to Internet Browser's bookmark. If you do not see a mainframe connection (HCI) icon displayed, you MUST create a HCI using and specify the Host IP and Port number of your System z mainframe. Start the Topaz Workbench by either selecting Topaz Workbench from the Windows Main Menu or by clicking on the Topaz desktop icon. The time to start the Topaz client may be slow as the Eclipse IDE loads and initializes Topaz plugins. If you had installed the Topaz Workbench on your personal computer a Topaz Welcome Screen may appear. You may decide exit the Welcome screen. Page 32 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
1. From the Window menu, then select Preferences . The Preferences dialog box appears. 2. Select Compuware, then select >Host Connections from the navigation tree. The Host Connections page appears. 3. Enter the appropriate Description , Host IP, and Port Number . Your instructor will specify the Description that you should enter. Click on Add. In the mainframe professional world, it is common to logon to multiple z/OS mainframes. 6.2.1 HCI Host Descriptions, Virtualization and Cloud Computing A Topaz Host Description is a symbolic name of z/OS LPAR name or a virtual machine (VM). Most are familiar with a Virtualization and Virtual Machines, and Cloud computing. Virtualization is the technology that permits multiple copies of an operating system to share a physical resources of a computer. Cloud Computing is a higher layer software that 1) creates, modifies, deletes, or manages the physical hardware resources assigned to a virtual machine across multiple physical computers, and 2) manages and allocates the costs of the physical hardware resources assigned to a virtual machine. Page 33 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Virtualization is a foundation technology. Cloud computing is virtualization management system. IBM was the first to introduce virtualization and cloud computing technologies in 1973 decades before other virtualization and cloud providers, such as, AWS, VMWare, Xen and Azure, existed. Unlike other virtualization providers, IBM mainframe servers provides two types of virtualization technologies: LPARs and Virtual Machines. Both a Logical Partitions (LPAR) and Virtual Machine represents an allocation CPUs or Processor cores, memory, and other resources so that each set of resources can be operated independently with its own independent operating system instance and application. However, mainframe LPARs "directly and physically control" the allocated resources; whereas, virtual machines are managed by virtualization host manager, and a VM does not "directly and physically control" the allocated resources. While IBM LPARs provides improved performance and security, there is limited number of LPARs, z15 mainframe supports 85 LPARs; whereas, thousands of virtual machines may be created. In 1973, IBM mainframes were the only large-scale computing technology available and faced the following challenges for Fortune 500 companies: Allocation of physical hardware resources to computing functions, such as, applications, databases, user interfaces 6.2.2 Right-click on the RMU Host Interface Icon to Connect to the Mainframe. Right-click on your Topaz HCI icon, such as RMU, to Connect to the RMU IBM Mainframe. A drop- down menu will be displayed. Select the Login option from the drop-down menu, and a Topaz Logon Credentials for RMU (the HCI) will be displayed. Page 34 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
3.3 First Time Login - Topaz Login Credential Dialog Box Your instructor will provide you a z/OS User id and an initial password, e.g., BLUESKY. You MUST change your initial password, e.g., BLUESKY, to the new password. On the RMU IBM z/OS mainframe, User ids and passwords are not case-sensitive. Upper-case letters may be used to make the documentation easier to read. 3.3.1 User Security or Authentication User Security or Authentication is the process of verifying the identity of a Login user. Most operating systems default to the standard User Id and Password authentication model. The following demonstrates the Topaz error messages, which are normally displayed when a user incorrectly enters a User id or Password. z/OS supports two major discretionary access control security managers, which are named IBM RACF and CA ACF2 security managers. Both support standard security protocols, but also provides other proprietary security protocols beyond the capabilities of other operating systems. 3.3.2 Login Credentials Dialog Box and Change Password The first time you use the Topaz Host Explorer, you will first see a Login Credential Logon similar to the following: Enter your User ID and Initial Password , e.g., BLUESKY , provided by your instructor. Do not click on OK yet! You MUST change your password be during your first Login attempt. 3.3.3 Change Password Click on Change Password and enter your new password into New Password and Confirm New Password text boxes. You MUST change your password during this initial (FIRST) Login, or your Login attempt will fail and a Logon Credentials error message will be displayed. It is recommended that you use a simple and short password, such as, 1234. This will prevent you from mistyping your password, adding extra spaces, or forgetting your Page 35 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
password. Once you are comfortable with login process, you may change your password at any time. The maximum password length is 7 characters. Click on OK when you are finished. Use your new password on the next Logon. You may be prompted to change your password every 60 days. The instructor can reset your password. Do not contact the Help Desk. 3.4 Topaz Login Credentials Error Messages 3.4.1 The specified user ID is revoked Assume that your z/OS User id is RMU0191, and an invalid User ID, e.g., RMU000191, was incorrectly typed. Topaz will display the message: User security could not be established on the HCI. The specified user ID is revoked. After THREE Unsuccessful Password attempts, you will be automatically locked out of the system and the error message. " The specified user ID is revoked" will be displayed. If you forgot you password, contact your instructor to RESET the initial password if you forgot your password. 3.4.2 The specified password is not correct. Page 36 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Three Strikes and you are OUT! After THREE Unsuccessful Password attempts, you will be automatically locked out of the system and the error message. The instructor can reset your password. Do not contact the Help Desk. 3.5 Possible z/OS Connection Problems using a Topaz The Topaz Host Connection Interface, e.g., the RMU icon, was incorrectly configured. For example, one may have attempted to connect to an incorrect IP address or Port number . Your local computer or school firewall may be blocking either the Port Number or the IP Address. The System z server that you are attempting to connect to is currently being updated. The Marist College z/OS server is scheduled to be updated on last Wednesday of the month between the hours of 4AM to 8AM EST. The RMU mainframe may be updated on Sundays, normally between 11:00 AM and 2:00 PM . Unlike Windows, z/OS is rarely automatically updated. All updates are fully tested before updates are applied by the z/OS SMPe (System Modification Program). SMPe was introduced in the 1960s decades before Windows, IoS, and Linux designed their installation and update utilities. Page 37 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
3.6 Questions - Topaz Logon 1. Explain the function of a Topaz Host Connection Interface (HCI). Answer è A Topaz Host Connection Interface (HCI) specifies a named combination of an IP address and Port Number, and other network parameters used to make a TCP/IP connection to a mainframe server. 2. After entering your user ID and Password, the Login Credentials Dialog box display the error message "The specified user ID is revoked." List two reasons why the error message "The specified user ID is revoked" is displayed? Answer è 1. The id was typed incorrectly 2.the three tries were used and you forgot your password 3. How does a user correct the user correct the error message "The specified user ID is revoked"? Answer è Enter the correct user id and password or contact the instructor to have the password reset. 4. List three possible reasons why you cannot connect to the RMU IBM mainframe from your Topaz client. Answer è The Topaz Host Connection Interface, e.g., the RMU icon, was incorrectly configured. Your local computer or school firewall may be blocking either the Port Number or the IP Address. The System z server that you are attempting to connect to is currently being updated. Page 38 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4.0 Host Explorer z/OS Datasets, Files and DB2 Tables 4.1 Topaz Data Set Filters The Topaz Host Frame Tool displays and functions are similar to Windows File Explorer. For example, both Host Explorer and File Explorer will display folders and files. Both will permit you to display, edit, rename, delete, move or copy files or data sets. However, Host Explorer is more powerful and flexible than Windows File Explorer. After a successful login, you may connect to 1) any DB2 or IMS DBMS table, 2) any z/OS program or data set, or 3) any UNIX program or file. Host Explorer integrates all different types of enterprise physical and logical storage systems. Windows requires different tools to integrate multiple enterprise storage systems. On the other hand, the Windows file system, i.e., NTFS, is more powerful and flexible than the System z file system. The differences among file systems will compared later. What is important to understand is that one does not navigate a hierarchical structure of folders in z/OS as you do in Windows, Linux or UNIX. There is no "cd" line command. There is no "Folder Up or Folder Down". The z/OS file system is a flat system. There are no sub or child folders inside a parent folder. The only method to search a z/OS file system is to use data set FILTER. A z/OS Dataset filter is similar to using the wildcard asterisk character, i.e., "*", in Windows, Linux or UNIX Hmmm. Since IBM introduced the wildcard asterisk character and filters in 1959, I wonder where Microsoft and UNIX got the idea of filters and wildcard characters. Page 39 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
The first time you sucessfully login with Topaz Workbench, no data sets, files, or tables will be displayed. To access, or filter, your z/OS datasets 1) right-click to open the z/OS Datasets icon folder, and 2) then select Add Filter and the following dialog box will appear. Normally, the User Catalog filter may be configured by default. (We will discuss the concepts of a user catalog shortly.) Enter the following In the Filter text box: 1. Enter your User ID or catolog name assigned by your insturctor, such as, RMU0191, folowed by a period, 2. Enter two asterisks follwed by a period (**.) , and 3. Enter two more asterisks (**). 4. Clieck on the OK button. Enter your User ID assigned by your instrucutor, not RMU0191. A z/OS catalog name will contain your personal, data sets simlar to your Windows user or Linux home directories or folders. The first two asterisks means to display all datasets stored in this catalog. The second two asteriks with display all members with a partiioned data set. If you have not previously installed your practice data sets, you will see the Filter name, i.e., RMU0191.**.**, followed by a personal partioned dataset settings. If the student is using z/OS for the first time, there will be no practice data sets contained in the user catalog. Requirement 4.3 will provide directions to use the SUBMIT command to install practice data sets to be used in the following tutorials. Page 40 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4.2 Introduction to File Systems and z/OS Data sets A File System is a collection of operating system programs that control the manner in which files are named, are created (Allocated), stored (Saved), retrieved (Opened), and managed. Most operating systems support one or more file systems. While most file systems are similar, the rules to use each file system varies. Each file system varies by degree of content flexibility, organization, storage efficiency and performance. Older mainframe file systems introduced in the disk drive (DASD) during a time period when the cost of a single 30-megabyte disk drive (DASD) exceeded $18,000. There were no Word documents, sound and video files, or other modern stored content. The personal computer or desktop applications did not exist. A Data Set is z/OS's file system name for a file . Windows, UNIX and Linux (Mac OS) stores content such as data and programs as a file. IBM stores data and programs on a storage device as a data set. Windows describes a Word document as a file. On the other hand, z/OS would describe any document as a data set or data set member . In z/OS terminology one may edit or browse a data set. Windows would describe this process as opening a file. The mainframe z File system was designed for storage and processing performance and offered almost no content flexibility. While we may prefer user-friendly, content flexible file systems similar to Windows NTFSv5 or Linux ext-4, neither of these file systems are as storage or performance efficient as the IBM z File system for large-scale transaction processing. If you require a more user-friendly, content flexible file system, then it is recommended to use the UNIX System Services or Linux for z System operating systems or directly use a Windows or Linux server system. Page 41 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4.3 Install your Practice z/OS Data sets 4.3.1 Compuware Command Console To install the practice data sets into your User ID Catalog, we are going to execute a pre-coded JCL program located in the Public catalog. The Compuware Console Frame is where text-based TSO commands and z/OS system messages are displayed. The Compuware Console is by default displayed at the right-bottom of Topaz window. If you do not see the Console, the easiest method to reset Topaz's default four-frame view is to click on the Host Explorer Icon, displayed in the upper- right corner, and select RESET . 4.3.2 Select the TSO Commands Console In the upper right-hand corner of the Compuware Console there are several icons displayed. Click on the down arrow and select the TSO commands console. TSO Commands Console is a command line interface, which is similar to the Windows and Linux command prompt. Notice the command prompt which is a > (greater than symbol. You may see a Connect Prompt, Simply click Connect to connect to TSO. In a previous section, the Topaz sever is assigned to a different port number than TSO. The Connect action finds the port number of TSO. Page 42 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4.4.3 SUBMIT a JCL JOB to install your practice data sets. z/OS uses a JCL job to execute (run) and manage system and application programs. One may compare the process of submitting a JCL JOB to execute programs as similar to right-clicking on an icon to start executing a Window's application . To install the practice data sets for this assignment, this requirement will execute a prewritten JCL program to set up your data sets so that you may complete this tutorial. To execute the program we will use the SUBMIT command. (Sorry, there will be no mouse clicking to start programs in this tutorial.) The JCL instructions to setup your data sets for this hands-on tutorial is stored in RMU.PUBLIC.JCL(LAB) . This JCL program will copy data sets from a public library (folder) into your personal user catalog. After the TSO Command Prompt type the SUBMIT command followed by at least one space, then type a single-quote followed by the data set or data set member name to be executed. This command line will end with a closing single-quote. The single quote character is located near the ENTER key on your PC keyboard). Ignore the ending bar cursor character. z/OS commands are not case-sensitive. However, these commands will require the correct spacing, a proper data set name or data set member name and punctuation. If you incorrectly type this command you will get an error code. Interpreting this error code requires a little more experience then presented now. Try to be careful when typing this command. You need to only execute this tutorial data set setup job once. If you incorrectly type the following command, there will be little evidence to help debug your typing error. So be careful to type in the following SUBMIT command carefully. Complete the following steps if you have no tutorial data sets. The details of submitting a JCL job will be discussed in Part 2 of this Assignment Page 43 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4.3.4 Successful Job Execution and z/OS Data set Refresh If the SUBMITed the job to install practice datasets was successful, ad READY response. However, the datasets displayed in your Host Explorer window has not changed. Unlike Windows and Linux, z/OS does not automatically display the copied data sets. Right-Click on the Catalog Filter, e.g., RMU0191.**.**, and click on Refresh . Your refreshed Catalog Filter should appear similar to the following. Page 44 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4.4 Comparative Examples of Topaz Host Explorer and Legacy ISPF DSLIST After you install your practice data sets, the previous ISPF DSLIST will appear similar to the following Topaz User Catalog Filter. However, the Topaz User Catalog Filter looks familiar to Windows File Explorer, which displays Window-like folders and file name. The z/OS ISPF legacy tool uses the Data Set List Utility (DSLIST) may display a user's datasets similar to Windows Explorer will display your files. As an example, the following example will display the datasets owned by user RMU0191. 4.5 Document your Host Explorer Frame, Filter and Installed Practice Data sets Page 45 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Using a Snipping tool Document your Host Explorer Frame, Filter and Installed Practice Datasets à 1. What is the purpose of z/OS JCL (Job Control Language)? Answer: It instructs the system on how to run a batch job or start a subsystem. 2. What is a JCL Job? Answer: It is any process or instruction done by the JCL. 3. What is the purpose of using the z/OS SUBMIT command? Answer: The SUBMIT command runs a program Page 46 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
5.0 Datasets, Catalogs and Volumes 5.1 Naming Files or Datasets 5.1.1 Naming files in the Windows NTFSv5 file system. A Window's file or folder may contain up to 255 characters, embedded spaces, and will retain the case of letters in a file name, but the use of upper and lower-case does not make the file or folder name unique. For example, PACKY.DOCX is the same file name as packy.docx. A fully-qualified NTFSv4 file has three major components. C:\LOCATION FOLDER\ SUBFOLDER\FILE NAME.FILE EXTENSION C:\USERS\LAVERTY\MY DOCUMENTS\PACKY.DOCX If you do not specify the device or parent folders (the location of the file), Windows NTSFv5 assumes that the file will be stored or located in the current folder. Backward slashes are used to separate storage location information from the file name. A period is used to separate the File Extension (.DOCX) from the file name. The File Extension is used by the Windows file system to specify which application understands the content of the file. 5.1.2 Naming z System Data sets A Window's file is similar to a z File System data set . A Data Set name cannot be longer than 44 characters, may not contain embedded spaces, the first character must be a letter, and can be letters, numbers, special characters (only #, @, or $), or a hyphen (-). All lower- case characters will be converted and stored as upper-case characters. The following is data set name, which will be used as an example in this tutorial. RMUI001.DATA.ACCOUNTS 5.1.3 High-Level and Low Level-Qualifiers A z/FS data set name can contain several SEGMENT; each segment is separated by a period. The first segment is the High-Level-Qualifier, or HLQ . Though the HLQ appears similar to your logon userid, e.g., RMUI001 , this example specifies your private user catalog name. The HLQ is somewhat similar to your My Documents folder in Windows, which is also used to find your data files. In this example, RMUI001 is the data set High-Level-Qualifier, or catalog name. The segments that appear to the right of HLQ are called Low-Level-Qualifiers (LLQ). It is recommended that the LLQ be descriptive of the content stored in the file. The LLQ of the previous example is ACCOUNTS. Page 47 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
May you access data sets outside your HLQ or your Window's personal folder My Documents? As long has you have been authorized to access files or folders outside your personal folder or catalog, you may access anything. 5.2 What is a data set? A Data Set is a z/OS's file system name for a file . Windows, UNIX and Linux (Mac OS) stores data and programs on a storage device as a file. IBM stores data and programs on a storage device as a data set. The Data Set List Utility will display your datasets in a similar manner that Windows Explorer will display your files. Windows describes a Word document as a file. On the other hand, z/OS would describe any document as a data set or data set member . In z/OS terminology one would edit or browse a data set. Windows would describe this process as opening a file. 5.3 Managing the Content of a File or Data set Windows files and z/OS data sets are simple storage containers that may store unstructured information (bytes) or structured information (records). The file system does not understand the details of the content of a file or data set. The applications, e.g., Word, a COBOL Program, etc. that stores the data or content in the file container will understand the structure of the content, not the operating system or file system. Records contain structured information such as the employee name, address, and phone number of an employee information file. Files and z/OS records may also contain unstructured information as a collection or bytes (characters); such as graphic, audio and video files. Most Windows file extensions are published on the Internet and are well-known. For example, the .DOCX file extension indicates that the Word application understands the content of the file; whereas, the .XLSX file extension indicates that the EXCEL application understands the content of the file. Page 48 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
5.4 Dataset Properties 5.4.1 Property Frame Right-click on your RMUXXXX.COBOL Data Set, where XXXX will be you student number. Select Properties. The Properties Frame will appear in the lower-right corner of your Window, replacing the Console Frame. It should appear similar to the following example. The information provided by the properties of a mainframe data set is similar to the information provided by the properties of a Windows or Linux file. (To be presented shortly.) Notice that a vertical scroll bar appears on the right edge of Properties Frame. Of course, this means that you may scroll, or page down to see more properties. Page 49 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
5.4.2 Switching to Full Screen Size Frames and Restoring Frame Size As an alternative, you can drag a frame boundary to resize the Property Frame, a.k.a., Yuk. Or you can double left-click on the Console – Properties – Contents Frame Blue Menu Bar ro switch to a full-frame view of the properties . For example Or you can double left-click on the Console – Properties – Contents Blue Frame Menu Bar again to restore your frame size back to the original size. You may double left-click on "any" Frame Blue Menu Bar to switch between Full-Size and Original Size . Page 50 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
5.4.3 Data Set Organization and Data Set Name Type Properties The manner in which z/OS structures the internal content stored in a data set is called the data set organization, or DSORG . JCL uses the attribute DSORG to specify the data set organization. There are three popular types of z/OS data set organizations: Sequential Data Sets (PS organization), Partitioned Data Set (PO organization), or Partitioned Data Set –Extended (PO-E organization). A sequential data set is a simple collection of records stored in the order that they are written and then read from beginning to end. A Physical Sequential Dataset is a simple data set structure. Over the years, PS file have been replaced by a VSAM Entry-Sequenced Data Set (ESDS). Your practice data sets do not contain any VSAM data sets. Records contain structured information such as the employee name, address, and phone number of an employee information file . z/OS’s sequential data sets will be displayed with a label of PS (physical sequential) in the Topaz Organization property or under the DSORG column of ISPF DSLIST. The Dataset Name Type will be blank. Topaz Host Explorer will display a simple file icon for a sequential Partitioned Dataset A Partitioned Data Set (PO organization) contains a directory structure and sequential members. In a Windows or Linux file System, one generally organizes files by using folders of directories. The z File System organizes related members (comparable to a file) together in a partition data set. From an organizational point of view a Windows folder is similar to a Partitioned dataset (PDS), except a PDS cannot contain a subfolder or PDS. Folders contain many related files. A PDS contains many related members. z/OS partition data sets will be displayed with a label of PO (partitioned organization) under the Topaz Organization property under the DSORG column of ISPF DSLIST. The Dataset Name Type will be blank. Topaz Host Explorer will display a folder icon for a Partitioned Dataset A Partitioned Data Set – Extended (PO-E organization) is a modern version of the older partitioned dataset organization. To avoid confusion, the PO-E organization is also called a LIBRARY . While both PO and PO-E organizations are both similar to Windows and Linux subdirectories or folders, the older PO organization requires extra maintenance. For example, when one deleted a member in older partitioned data set organization the freed space could not be reclaimed or re-used. Hence, Partitioned Data Set – Extended (PO-E organization) is much more popular. A z/OS partition data set – extended may also be e displayed with a label of PO- E under the Topaz Organization property under the DSORG column of ISPF DSLIST. The Dataset Name Type will contain the name LIBRARY. Topaz Host Explorer will display a folder icon for a Partitioned Dataset Page 51 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
5.4.4 Dataset Organization and DSORG is conceptually similar to a Window’s file type. When using the Window’s file system NTFSv5 a file will be automatically created, assigned a file name and file type when you SAVE it for the first time. During this initial “Saving” process a storage location in a volume and folder is selected. Storage space must first be allocated (reserved) for the file container, then the data content is stored in the file container. For example, when a Word document is stored as a file type and extension of .DOCX, which will use sequential organization and the rules to store the internal structure of a Word document. Comparing the concept of a Word document type to z/OS, a DOCX file would be similar to the z/OS concept of Data Set Organization. 5.4.5 Allocation Extents, Units, Types, and First Extent Unit The minimum size of data allocation under z/OS is 1 track, or 56,664 bytes. This means that a Physical Sequential file which contained three 80 byte records will contain 240 bytes, but occupy 56,664 which is very wasteful. It also mean that two datasets cannot exist on the same track. A Partitioned Dataset (PDS) solves this problem by combining a lot of small files into one large container. The individual files are stored as members within the PDS. Each member must have a unique 1-8 character name and the members are located by an index that is called a PDS directory. PDS files have DSORG=PO and DSTYPE=PDS. 5.4.6 Used and Maximum Directory Blocks Property Both types of Partitioned Data sets contain structures. A PDS Member Storage area and a Directory area. To review, a PDS is similar to a Windows or Linux subdirectory/subfolder, and a member is similar to a file store in the subdirectory/subfolder. A previous discussion, stated that the minimum amount of storage space that can be allocated to a data sets is 56,664 bytes, or a track. Assume that a programmer wants to store a COBOL or C program that requires approximately 3,000 bytes of storage. If you save this COBOL or C program, how space did you use up? The answer is 56,664 bytes, but you only required 3,000 bytes! You wasted disk space. (Windows and Linux may also waste disk space.) When you code and save COBOL program, you will save a Partitioned Data Set member, or program. Your COBOL Program A may require 300 bytes of storage. Your COBOL Program B may require 400 bytes of storage. And your COBOL Program F may require 3000 bytes of storage, and you still have a little space left of 56,664 to store more COBOL programs. The bottom line is that you code a COBOL program, but you save a PDS member. A PDS member is composed of records, similar to a row in a database table. All members a PDS must have the same Logical Record Length. The most popular Logical Record Length Property for a PDS than contains COBOL, C, ReXX, JCL or Java program source code is 80 characters. Historically, mainframe programs was coded on a fixed length, 80-column punch card. While the days of the 80 column punch card are gone, legacy 80-column COBOL, JCL and other program code is still being used every day. To maintain compatibility with the billions-and billions of dollars invested in legacy code. 80-column program rules are still popular. Here comes the challenge. The file system only knows the beginning track of a partition data set or subdirectory. The file system does not know which location of programs, Word documents and so forth be stored in the partitioned data set of subdirectory. Page 52 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
How does the PDS then keep track of its members? The members of a PDS can be scattered anywhere in the PDS storage space. The z/OS file system can consult the PDS directory information to find the names and location of the members stored within the partitioned data set. Similar to a library book index, the index contains a list of keywords you are looking for and the page no. where the keywords may be found. Thus, the directory maintains the list of member names and storage pointers to the actual physical allocation a stored PDS member. In this example, the Maximum Directory Blocks specifies NOLIMIT. You may enjoy that your personal laptop or note book you may not ever run out of disk storage. On the other hand, System z mainframe storage is expensive and the amount of storage space that a user or a business organization, must budget there share on the expense. An important question may be, which is the best operating system? It depends. If a user or a business organization unit must budget, and pay for the storage costs, would you recommend to store email messages, graphic files videos, and word processing documents in the mainframe storage system? As stated previously, System z mainframes will be best to support 1) large-scale, 2) mission-critical, and 3) secured transaction and real time data analysis processing. Other operating system platforms, e.g., Windows, Linux and UNIX, may be more cost effective for non-priority workloads. Page 53 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
8.4.5.1 Example of Topaz RMU0191XXX.COBOL Partitioned Dataset and Members The Number of Members Property for RMUXXXX.COBOL is 12 RMU0191.COBOL is an example of a Partitioned Dataset (PDS) and Topaz use a folder icon to identify a z/OS PDS. Click on the Partitioned dataset named RMU0191.COBOL in Host Explorer, the folder will open, and the names of the PDS's members will be displayed. CBL0001 is a partitioned dataset member. 8.4.5.2 Editing RMU0191.COBOL(CBL0001) PDS COBOL Program Member Right-click on the Partitioned Data Set Member name, such as, RMU0191.COBOL. Select the Edit mode. The COBOL Program member named RMU0191.COBOL(CBL0001) will be opened in the Edit mode. Page 54 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
8.4.5.3 Browsing RMU0191.COBOL(CBL0001) PDS COBOL Program Member Right-click on the Partitioned Data Set Member name, such as, RMU0191.COBOL. Select the Browse mode. The COBOL Program member named RMU0191.COBOL(CBL0001) will be opened in the Browse Mode. Only one user can edit a data set or data set member at a time . If you change the dataset or member, you will be prompted to confirm that you want to change the dataset or member. The Browse mode is useful to prevent accidental changes to a data set or a member. If you are member of a team of programmers, team members or your instructor may browse a shared dataset or member, while another team member or student edits the dataset or member. To Edit, Browse, Copy, or Delete a data set or member, a User ID must be authorized. The RMU IBM System z mainframe does not authorize students to access other student's catalogs. Page 55 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
5.4.7 Logical Record Length Property However, when a file contains data to be process by a program, e.g., a customer or employee record, the Logical Record Length property may be any number of bytes or columns that a company's business requirements require. For example, to code a COBOL program that will process a customer sequential data set records, your instructor will inform you of the Logical Record Length of a record, e.g., 170, and specifications for the layout of customer's record data, e.g., name, street, city, state, etc. Page 56 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
5.5.5 Questions – Dataset Properties Use a graphical snipping tool to document the Dataset Organization of your cataloged Data sets below è . It is required that your HLQ is displayed. 1. What is function of z System Dataset Organization (DSORG)? Answer: The manner in which z/OS structures the internal content stored in a data set is called the data set organization, or DSORG. JCL uses the attribute DSORG to specify the data set organization. It organizes the content so that the information can be found easily and efficiently. 2. List the three major types of z System Dataset Organizations. Answer: Sequential data set Partitioned data set Partitioned data set-extended 3. Which Windows or Linux file system concept is similar to the concept of z/OS Data set Organization (DSORG)? Answer: Windows folders 4. Explain the structure and practical use of a sequential dataset. Answer: A sequential data set is a simple collection of records stored in the order that they are written and then read from beginning to end. An example would be writing down employee information such as employee id, address, phone number etc... 5. Explain the structure of a z/OS partitioned data set. Answer: A Partitioned Data Set (PO organization) contains a directory structure and sequential members. Page 57 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
6. Explain the main advantage of using a z/OS partitioned data set. Answer: The partitioned data set can have information be found much faster than in windows file system. 7. What is the purpose of a z/OS partitioned data set MEMBER? Answer: They are the files and are clumped together based on their relationship to each other to make finding the related files faster. 8. Which Windows or Linux file system concept is similar to concept of a z/OS partitioned data set? Answer: Windows folder 9. List the advantages of z/OS Partitioned Dataset – Extended (PO-E or Library) Organization as compared to the older Partitioned Dataset (PO) Organization. Answer: More modern Does not require as much maintenance Allows for freed space to be reclaimed or reused Page 58 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
5.5 Physical Storage Devices, Volumes, Catalogs, and Data Sets 5.5.1 Identifying Storage Devices All file systems conceptually start with a physical disk and a volume. In older and large- scaled storage systems the physical storage unit was the first method to store, organize and separate data by function. Every file system has structure that organizes files and improves the efficiency to find and locate files within and between physical storage devices. Most modern hard disk or solid state drives (DASD) may individually store billions of files and the files system may organize files across thousands of distributed hard drives. I can't remember which drawer I put (stored) my socks. Can you imagine the complexity of organizing files in today's modern file systems? 5.5.2 Volume Serial and VTOCs (Volume Table of Contents) Each physical disk may have more than one disk volume. A z/OS volume is a subdivision of space on a Direct Access Storage Device (DASD), or a physical disk. Each Volume will be assigned a Volume name or Volume Serial (identifier). Each Volume will also have a VTOC (Volume table of contents), which stores a row for every data set within the volume. Every row referred as file control block has an array of pointers to extents. Each File Control Block (Dataset) will be allocated units of storage called extents. The amount of physical storage space is frequently measured in cylinders which may or may not be spread over multiple DASDs (disk drives). A Volume Table of Contents will store Page 59 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
datasets which may be owned by multiple users, but RACF will secure each owner's data sets. VTOCs and root directories will store information about data sets and files within its physical storage boundaries, this system may get very complicated when there are thousands of VTOCs or volumes. All z/OS data sets are physically stored in a DASD (disk) volume. The maximum storage space allocated to a DASD volume is limited and cannot be dynamically increased. 5.4.3 z/OS User Catalogs A User Catalog , e.g., RMUI001, is a logical structure which makes it easier to organize, group, and secure data sets stored across one or more DASD (disk) volumes. A User Catalog has NOTHING to do with physical DASD devices or in which volumes your data sets are stored. Every data set must follow the rules for naming a data set. The z/OS file system uses a system to organize files by using name segments or "qualified" data set name. Consider the following data set name: RMUI001.COBOL.ASSIGN1 This data set name example has three segments, each separated by a period. The leftmost segment name, e.g., RMUI001, is called the high-level qualifier (HLQ) - the most important. The rightmost segment name, e.g., ASSIGN1, is called the lowest-level qualifier (LLQ) A benefit of user catalogs is to organize data sets by owner. In this example, all cataloged data sets are displayed no matter in which volume they are stored. For a Fortune 500 company these cataloged data sets could be physically stored on DASD devices and volumes located across the world. Page 60 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
6.0 Logout Direction for Topaz Workbench Clicking on the Topaz Workbench Window's X icon located in the upper-right hand corner of your Topaz Window will only exit the Windows Application and will not logout of the mainframe. While a student may not be executing applications a background job, the best and safest method to logout from RMU IBM Mainframe and then exit Topaz. Step1 . Right-click on the Host Connection Interface (HCI), e.g., RMU, then Select Logout from the menu. You will be warned if you have not saved your edited datasets, or if there is no executing jobs. Step 2. [Optional] Repeat Step 1 for any other HCI, which not be normal to be accessing more than one mainframe in this class. Step 3. Then Select Exit. Page 61 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7.0 Legacy Text–based TN3270 clients and Application and System tools. 7.1 Summary of System z TSO Login Process When one connects to a z/OS mainframe using the 3270-emulator client, one will connect to TSO to LOGIN. The TSO LOGIN process. The TCP/IP network protocol is used to connect or 3270-client to our z/OS mainframe. The Host IP address, i.e., 192.86.32.17 , identities our z/OS Mainframe. The Host Port Number, i.e., 623 , identifies a subsystem, a daemon or service. In this example, Port number 623 identifies the port number, which is listened by TSO. Your port number or the Master the Mainframe port number may be different 1. Connect using a 3270-emulator client to IP Address 192.86.32.17 and Port 623 (Make sure that your firewall does not block this port.) 2. Authenticate to RACF – the IBM Security Server 3. Allocate memory to your personal copy of the TSO session. 4. Start ISPF, a menu-based user interface Page 62 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Page 63 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
8.0 z/OS System Information Text Link - How to get system Information of a Mainframe? http://www.longpelaexpertise.com/ezine/InfoFromzOS.php Many may familiar with Windows administration tools, such as Device Manager, Task Manager, Control Panel System, Network Connections, Disk Management, Event Viewer, MSINFO and the Command Prompt. These system programming tools will access and configure system administration information stored in the Windows Registry Likewise, Linux stores current system status information in special virtual directory named /proc, including its cpus, disks, kernel, processes, and other configuration parameters. Linux also support a large number of specialized command line and GUI system administration tools, such as, ps, top vmstat, w, free, iostat, sar, and pmap. The list of operating system users include system programmers, application programmers, and system users. z/OS system programmers and administration require the same information as Windows and Linux system administrators. The following assignment requirements introduces the system tools that a z/OS systems or application programmer to retrieve information about z/OS hardware devices, operating system, middleware subsystems, logon users, job management (process management), and command line interfaces (TSO and z/OS consoles). 8.1 System Programmers and Application Programmers 8.1.1 System Programmers Text Link – Who is a System Programmer? https://www.ibm.com/support/knowledgecenter/zosbasics/com.ibm.zos.zmainframe/zconc_sysprogrol e.htm System Programmers are important IT roles who installs or upgrades operating systems (z/OS, Linux, etc.) and middleware, customizes, and maintains the operating system and middleware that run on the system. Middleware is a software "layer" between the operating system and the end user or end user applications. Middleware software provides functions not provided by the operating system, such as the DB2 database management system, CICS application server, or RACF security server. All students should be familiar to access system administration for Windows, Linux, or z/OS. Topaz Workbench makes that learning process easier ALL OPERATING SYSTEMS provide the same operating system functions. Hence, all operating systems will provide basic operating system information. Student must learn more details concerning the status of Windows, Linux, or z/OS operating systems. This hands-on tutorial will reinforce the theory concepts leaned in other assignment requirements. The last time I checked, no company was hiring CIS students for their experience in Windows or Mac gaming, or social networking. Page 64 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Other system programmer roles include: Coding, debugging and Submitting JCL programs Automating system administration by coding and executing and ReXX or CLIST scripts Integration-testing the new products with existing applications and user procedures System and middleware performance tuning to meet required levels of service and to minimize cooperating system costs. Debugging and correcting operating system, middleware, or hardware problems. 8.1.2 Application Programmers Text Link - Who are the application designers and programmers? https://www.ibm.com/support/knowledgecenter/zosbasics/com.ibm.zos.zmainframe/zconc_applprogrol e.htm Based on requirements gathered from business analysts and end users, the application designer role creates design specifications from which the programmer constructs an application. An application programmer writes or updates application program code using program languages such as COBOL, Java, PL/I, C/C++, or assembly language. The application development process includes several iterations of code changes and compilation, application builds, and unit testing. 8.1.3 JCL (Job Control Language) JCL (Job Control Language) is the language that is required to create batch jobs to execute an application program or start a z/OS subsystem . Batch jobs run in the background and cannot communicate interactively with a user or with a terminal. JCL is used for 1) identify and schedule a JOB, 2) specify the system or application programs to be executed, and 3) to specify the data sets, data set properties and other system resources required for a job. JCL is not a programming language. The TSO command SUBMIT will be used to execute a JCL programs in the background. A z/OS User IDcan execute multiple JCL jobs in the background at one time. Sample JCL Program Page 65 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
8.1.4 TSO Commands and TSO Command Console TS0 is an interactive command line user interface similar to the Windows, Linux and UNIX command prompts. TSO commands permit system programmers to interactively execute many system administration commands, one TSO command at a time. TSO commands may be executed in the batch mode by inserting TSO commands into a JCL program, ReXX EXEC or CLIST scripts to automate system administration tasks. Users may use TSO LOGON to be authenticated and will switch to the ISPF menu interface. Two popular methods to execute TSO commands are 1) TSO Command Prompt, 2) ISPF TSO Command Shell, and 3) Topaz TSO command console. 1.1.4.1 TSO Command Prompt The TSO command prompt is READY. The TSO LISTCAT command, which be used to display your user catalog will be executed. The Topaz Command Console prompt is a > (greater than sign). The TSO LISTCAT command, which be used to display your user catalog will be executed. 8.1.4.2 ISPF TSO Command Shell The ISPF Command prompt is = è . The TSO LISTCAT command, which be used to display your user catalog will be executed. Page 66 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
8.1.4.3 Topaz TSO Commands Console and TSO COMMAND LIST The following example demonstrates the use TSO HELP command will display a summary of TSO Commands. You will find the following very useful! HELP LISTCAT Page 67 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
8.1.5 MVS / zOS Commands and z/OS Command Console Text Link - MVS system commands reference https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.3.0/com.ibm.zos.v2r3.ieag100/cmdref. htm TSO commands are designed to manage the z/OS data sets, application development and JCL execution (SUBMIT). z/OS or MVS commands are designed to manage and display the status of the z/OS (MVS) operating system, subsystems, resources, and hardware. z/OS interactive commands may be executed at the Topaz z/OS Console Prompt or SDSF 1.1.5.1 z/OS Console Prompt The z/OS console prompt is z/OS> to distinguish the prompt from the TS0 command prompt. For example, the following console displays CPU hardware information. 8.1.5.2 SDSF Command Line There is no help for the z/OS console commands. Page 68 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
8.1.6 CLIST, or Command List CLIST, or Command List, is an interpreted programming language that allows you to develop automated TSO/E commands and/or ISPF processes. These programs will run in the foreground, which you can only execute one CLIST at a time. CLIST is very rarely used in modern shops. While CLISTs are similar to Windows batch programs, Power Shell or Linux scripts, ReXX EXEC scripts are very powerful to automat system administration commands. 8.1.7 REXX Video - Mainframe REXX Intro - Mainframe REXX Tutorial - Part 1 https://www.youtube.com/watch?v=Uq0CWQDK8rc Text Link - Hello world in REXX on IBM z/OS https://www.youtube.com/watch?v=BZmXkpXm_sw Text Link - Learning the REXX Language https://www.ibm.com/support/knowledgecenter/SSLTBW_2.2.0/com.ibm.zos.v2r2.ikjc300/part1.htm Text Link - Rexx – Overview https://www.tutorialspoint.com/rexx/rexx_overview.htm REXX is a very powerful, easy to code, and interpreted or compiled program language that can be used to automate many system administration tasks. The following displays a REXX script to generate 50 student userids by applying REXX variables, an IF conditional statement and a DO loop. Page 69 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
9.0 Using the Topaz z/OS Command Console z/OS or MVS commands are designed to manage and display the status of the z/OS (MVS) operating system, subsystems, hardware resources, and hardware. 9.1 Accessing the Topaz z/OS Console Text Link - How to Get System Information without being a z/OS Systems Programmer http://www.longpelaexpertise.com/ezine/InfoFromzOS.php The z/OS Console may be use the DISPLAY command, or D abbreviation, to document hardware and system status information. The Topaz Console View is displayed by default displayed at the right-bottom of the Topaz Workbench window. If the Topaz Console View, the easiest method to reset Topaz's default four-frame view is to click on the Host Explorer Icon, displayed in the upper-right corner of the Topaz Workbench Window. Then select RESET option of the drop-down menu. . 9 .1.1.1 Select the z/OS Console by clicking on the down-arrow In the upper right-hand corner of the Compuware Console View there are several icons displayed. Click on the down arrow and select the z/OS Console. The z/OS command prompt changes to z/OS > . You may see a Connect Prompt, Simply click Connect to connect to TSO. In a previous section, the Topaz sever is assigned to a different port number than TSO. The Connect action finds the port number of TSO. Page 70 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
The Console, Properties, Contents, JES Explorer, Event History tools are combined into one Topaz Workbench View, but will provide different services. 9 .1.1.2 Clear your z/OS Console While executing command z/OS Console or TSO Commands Console, the student may accidentally mistype commands, or pervious commands are not erased. Before you document the execution z/OS Console command, it is best to clear your z/OS console. Located at the upper right-hand corner of the Compuware Console View there are several icons displayed. Click on the left-most document x icon to clear your z/OS Console View. 9.2 CPU Information 9.2.1 Document z/OS CPU Information 1. Type DISPLAY M=CPU at the z/OS> prompt. 2. Press Enter to execute. The system information will appear similar to the following. 3. This system information is complete. Double left-click on the Console Header to switch to the Full Screen view to document the command and the complete system report. If your z/OS command does not execute (no command response is displayed), your Topaz client may have logoff in the background even the Topaz Workbench is still displayed on your Windows computer, Simply Logout of the mainframe and Login again. Page 71 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Z/OS operating system will display the following information somewhat similar to the following: Hidden in this output is the model number: in this case 2094-722 (a System z9 EC). The following table shows processor models, and what they mean. Mainframe model IDs and Numbers 2064-xxx = z Series 900 2066-xxx = z Series 800 2084-xxx = z Series 990 2086-xxx = z Series 890 2094-xxx = System z9 EC 2096-xxx = System z9 BC 2097-xxx = System z10 EC 2098-xxx = System z10 BC 2817-xxx = zEnterprise 196 1. Use the Snipping Tool to document the z/OS CPU information below = è Page 72 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
2. From the CPU information listed above, what is the serial number of z/OS CPU that you are using? Your answer is è 06E2872964 3. From the CPU information listed above, what is the model number of your z System mainframe? Your answer is è NC9 4. List the MVS command that may be used to provide the system programmer CPU information. Answer: DISPLAY 9.2.2 Document Windows CPU Information In Windows, one can review the Window's System Properties under the Control Panel to determine processor and other information. For example, my laptop provides the following system information concerning the processor type, processor speed and the amount of installed RAM. Page 73 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
One can use the Windows command WMIC to display the processor serial number, which is used to uniquely identity your processor and is used for auditing and licensing purposes. The processor serial number and type of computer is often used to automatically to identify the name of a Windows computer. Windows Management Instrumentation (WMI) is a command line utility used for management data and operations on Windows-based operating systems. WMIC extends WMI for operation from several command-line interfaces and through batch scripts. For more information concerning the WMIC command interface consult the following links. Windows Power shell to a preferred replacement for WMIC, but is beyond the scope of this assignment. Text Link- WMIC - Take Command-line Control over WMI https://msdn.microsoft.com/en-us/library/bb742610.aspx Video - Windows Management Instrumentation Tutorial #1 Introduction https://www.youtube.com/watch?v=V4vdwAD3aJ0 Video - WMIC - Command Line https://www.youtube.com/watch?v=vrmKepZZn1c Windows will permit you to run the SYSTEMINFO command at the command prompt to display more system information. For example: Notice the detailed system information. Take notice of the Windows hotfix(s) or operating system patches applied to this example. e.g., KB2764913, KB2764916, etc. This are the updates installed on our mainframe using SMP/E that we will discuss later in the course. Windows Update got its start decades after SMP/E was introduced. Page 74 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
1. Use the Snipping Tool to document Windows CPU information using System Properties below = è 2. Use the Snipping Tool to document Windows CPU information using the SYSTEMNFO command below = è 3. List several important specific examples of system information that is provided by this Windows WMIC command. Answer: The name of the computer, name of the processor and some general information such as amount of cores and processing speed, installed ram, device id, product id, and system type. 4. List several important specific examples of system information that is provided by this Windows SYSINFO command. Answer: Processor(s), bios version, windows directory, system directory, boot device, system locale, and input locale. Page 75 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
9.2.3 Questions - Linux CPU information- lscpu, /proc/cpuinfo and lstopo (hwloc) The Linux commands lscpu, cat /proc/cpuinfo and lstopo (hwloc) can report detailed information about the cpu cores/processing units. For example, the most frequently used Linux command to display system information about the processor is cat /proc/cpuinfo . The Linux cat command displays the content of a file. The Linux /proc subdirectory is a virtual directory, which contains information about the system hardware and functionality. The Linux /proc subdirectory does not really exist. During the Linux boot process, this virtual directory is created. The system information stored in RAM contains many of the same information that you can find in the Windows Device Manager. The following is a partial example of the information of display by cat /proc/cpuinfo Virtual files such as / proc/interrupts, /proc/meminfo, /proc/mounts, and /proc/partitions provide an up-to-the-moment glimpse of the system's hardware. Others, like the /proc/filesystems file and the /proc/sys/ directory provide system configuration information and interfaces. 1. List three examples of three Linux commands that may be used to provide the system programmer CPU information. Answer: lscpu, cat /proc/cpuinfo, and lstopo (hwloc). Page 76 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
9.3 Virtual Memory Paging Information 9.3.1 Virtual Memory Review Video - Virtual Storage and Address Spaces http://www.redbooks.ibm.com/courses/CRSE0304/CRSE0304_L21.mp4 In a previous assignment, virtual memory and memory pages were discussed. When the real system memory (frames) is full, excess pages of a program or subsystems are temporarily stored as auxiliary storage or as a slot. The role of the virtual memory is to serve as table that determines the current location of the page, i.e., in real memory or on disk. The maximum amount of virtual memory available is dependent on the amount of disk storage dedicated to slots and the amount of physical system memory. 9.3.2 Document z/OS Virtual Memory 1. The z/OS Console displays the execution results from the previous assignment requirement, Clear the z/OS Console by clicking on Clear Console icon Located at the upper right-hand corner of the Compuware Console View there are several icons displayed. Click on the left-most document x icon to clear your z/OS Console View. . 2. Type DISPLAY ASM , or D ASM at the z/OS> prompt. 3. Press Enter to execute. If your z/OS command does not execute (no command response is displayed), your Topaz client may have logoff in the background even the Topaz Workbench is still displayed on your Windows computer, Simply Logout of the mainframe and Login again. Page 77 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Use the Snipping Tool to document your page data set names and utilization information below = è Your Virtual memory display may appear similar to the following. The first allocated slot has a data set named PAGE.SOW1. PLPA , which is VSAM Linear data set that is your systems SWAP file. Let's review the data set naming conventions presented in a previous assignment requirement as applied to the data set named PAGE.SOW1. PLPA The first segment named PAGE is the high-level qualifier which may be user catalog name (a user directory) or a system catalog name that represent the z/OS BCP (kernel) or z/OS subsystem. Obviously, the z/OS Virtual memory operation system owns the PAGE high level qualifier. The second segment named SOW1 is System ID (name) of the z/OS mainframe. Every z/OS, Windows or Linux computer must have a unique name to identify an operating system in a cloud (sysplex) or managed network system, such as tz/OS System ID: SOW1. Consider the example of a credit card processing company creates a Sysplex of four z/OS virtual machines to supports credit card processing. A z/OS Sysplex refers to a cluster of independent instances of the z/OS operating system that shares processing tasks. Using a unique System ID, such as SOW1, SOW2, SOW3, or SOW4 is important to manage virtual memory operating systems and page storage Each system may have separate page files (slot data sets) or shared separate page files (slot data sets) The third segment named PLPA identifies a unique page (slot data set) which is stored on DEVICE 0CED (notice the hexadecimal number) and it is 81% full. Every virtual memory operating system Page 78 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
uses a default name for page file to support the z/OS operating system and subsystems z/OS uses PLPA and COMMON1. The credit card processing applications also require swap file storage (slots) space, such as LOCALD to LOCALJ. Currently, these swap data sets are unused (FULL 0%) The system programmer must balance the costs of allocating storage to unused data sets to running out of slots, which may cause credit card processing to stop during peak demand loads. 9.3.3 Windows Page information – Performance Options/Virtual Memory The name of the paging file in Windows is a hidden file named PAGEFILE.SYS . One can 1) determine amount of storage space that slots are currently using PAGEFILE.SYS, 2) change the amount of disk space allocated to PAGEFILE.SYS, or 3) change the location of PAGEFILE.SYS. Since the demonstration, most Window's desktop computers supports only one disk, the Drive C: is greyed out. Other options are prevented by Windows security settings. [Having too little space allocated to the paging file will cause Windows to be unable to execute more programs even though you have enough disk space.] Students and faculty are often prevented to view or change virtual memory settings. The following Windows 7 display is very similar to Windows 10 and Windows Sever Windows support a similar host or z/OS System ID and virtual memory swap (slot files) name. You may find those name using System Information or the systeminfo command. Page 79 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Page 80 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
9.3.4 Linux Page information – swapon and free commands The Linux swapon command will display the location and amount of page file space used to store slots The Linux free command will display the both the real (mem) and swap space. If a large percentage of the swap space is used, then one of two actions may be warranted: either you may want to add an additional swap disk to increase the available swap space, or you may want to add additional physical memory to the system. 9.4.4 Questions - z/OS Virtual Memory 4A In reference to virtual memory operating systems, what is a Frame? Your answer is è A frame is a small fragment of main memory when paging occurs. 4B. In reference to virtual memory operating systems, what is a Page? Your answer is è A page is a fixed-length contiguous block of virtual memory that is described by a single entry in the page table. It is the smallest unit of data for memory management in a virtual memory operating system. 4C. In reference to virtual memory operating systems, what is a Slot? Your answer is è It is the physical connecting spot for additional virtual memory to be added. Page 81 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
5. How does one display Windows Page file information? Your answer is è The page file information can be displayed by going through the control panel and navigating to the page file section. 6. How does one display Linux Memory and page file information? Your answer is è Using the code “ dd if=/dev/mem” in the command line allows the user to view the contents of the memory. 9.5 Logon User and JOB information. 9.5.1 Document Users - D TS,ALL The z/OS console may be used to number of logged-on time-sharing users and active batch jobs. Topaz users are not considered a TSO user and their owner names will not be displayed. 1. The z/OS Console displays the execution results from the previous assignment requirement, Clear the z/OS Console by clicking on Clear Console icon Located at the upper right-hand corner of the Compuware Console View there are several icons displayed. Click on the left-most document x icon to clear your z/OS Console View. . 2. Type DISPLAY TS,ALL , or D TS,ALL at the z/OS> prompt. z/OS TSO , and most other command line operating systems require At least one space following the command, e.g., DISPLAY or D NO spaces between the command parameters. TS,ALL is acceptable. TS, ALL is not acceptable. A command parameter is information to control how the command DISPLAY will execute. In this example, the parameter ALL means display ALL logon USERS 3. Press Enter to execute. Page 82 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
If your z/OS command does not execute (no command response is displayed), your Topaz client may have logoff in the background even the Topaz Workbench is still displayed on your Windows computer, Simply Logout of the mainframe and Login again. Use the Snipping Tool to document execution of DISPLAY command (even if no TSO users are logon) below = è 10.0 Logout Direction for Topaz Workbench While clicking on the Topaz Workbench Window's X icon located in the upper-right hand corner of your Topaz Window, this will only exit the Windows Application and will not logout of the mainframe. While a student may not be executing applications a background job, the best and safest method to logout from RMU IBM Mainframe and then exit Topaz. Step1 . Right-click on the Host Connection Interface (HCI), e.g., RMU, then Select Logout from the menu. You will be warned if you have not saved your edited datasets, or if there is no executing jobs. Step 2. [Optional] Repeat Step 1 for any other HCI, which not be normal to be accessing more than one mainframe in this class. Step 3. Then Select Exit. Page 83 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Page 84 of 84 ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help