Baker Assignment 2 Part 1 Spring 2022
docx
keyboard_arrow_up
School
RMU *
*We aren’t endorsed by this school
Course
3212
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
84
Uploaded by SuperHumanRookPerson1476
S
ASSIGNMENT 2
HANDS-ON – PART 1
TOPAZ LOGIN
AND DATASET SETUP
J. Packy Laverty
laverty@rmu.edu
To better Access and Search the content of this assignment, turn on the Word
Navigation Pane (Windows - Click on View and Check Navigation; MAC – Click on View
and Select Document Map). Students will find that using the document FIND tool or
searching GOOGLE may also be valuable for researching the review question answer.
Page 2 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Enter your Name Here
è
Nicholas Baker
Introduction
Tutorial Prerequisites
Your instructor will assign a z/OS userID and initial password.
If necessary, consult your
instructor for more support or details.
You will need access to the Compuware Topaz Workbench client.
The Topaz Workbench
installation file and directions to install Topaz on your personal Windows computer may be
found in the Blackboard Main folder name "Mainframe 3270 Client Connections and IDEs"
Download - Compuware Topaz Workbench Eclipse-based client
May be may be installed on your personal Windows computer.
https://sentry.rmu.edu/download/topaz/Topaz_Workbench_20.03.02_20200804.exe
Topaz Workbench is also may be installed of your Windows personal computer, or available
on RMU AppStream, or RMU Lab computers.
Tutorial Recommendations
Hands-on is the Best Way to Learn
It is recommended that students logon to z/OS and should attempt the hands-on demonstration
examples while **reading this tutorial".
The best way to learn z/OS is simply to read the
directions and complete the hands-on requirements.
The student should avoid getting distracted
or becoming overwhelmed by a few technical concepts.
If the student follows the hands-on
directions, the technical concepts may be easier to understand after you have completed
these hands-on requirements.
Your instructor will schedule a Google Meet Session to demonstrate this tutorial.
Previous Enterprise Students
If the student or faculty member had previously logon the IBM RMU Mainframe AND your User
ID is active, you should first attempt to Login using Topaz Workbench using your previous
User ID and password. If successful, these students will NOT be required to change their Initial
Password, i.e., BLUESKY, or install their practice data sets.
If you are previous students, you will be able to access all of your previous work stored in our
catalog data sets.
Page 3 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
How to complete Hand-on Tutorial Requirements and Review Questions
In this tutorial directions and demonstration examples to guide the student to perform hands-on
requirements. Using the tutorial demonstration examples the student will be required to perform a
similar hands-on task.
The student will be required document the answers and completed work.
For
example following is an example of typical tutorial hands-on requirement.
Use a Snipping tool to document your successful logon with a display of your Topaz
Workbench Host Explorer below.
The directions specify the use of a graphical snipping tool, such as the Window's Snipping Tool.
(Directions to use the Window's Snipping Tool will be presented next.) Any graphic snipping tool may
be used to demonstrate that you have successfully completed the required hands-on task.
A grey or colored box will be provided after the requirement directions. You are required to provide a
graphic image, e.g., using cut-and-paste, to document that the hands-on requirement was correctly
completed.
Review questions are also be provided at the end of the tutorial. The following is an example of a
review question format. Since type the answer in provided grey or colored box.
1. What is the purpose of a partitioned data set? Answer:
A partitioned data set is a data set containing multiple members, each of which holds a separate sub-
data set, similar to a directory in other types of file systems. This type of data set is often used to hold
load modules, source program libraries, ISPF screen definitions, and Job Control Language.
Type in the answer to the question into the grey or colored box.
It is recommended that you use Table of Contents at the beginning of the tutorial to review and
navigate to the concept presented in the review question.
Students will find that using the
Page 4 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
document FIND tool or searching GOOGLE may also be valuable for researching the review
question answer.
Page 5 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Windows Snipping Tool
(If necessary, consult your instructor for other graphical copying tools)
The following YouTube Videos will provide more directions for Windows 10, 8 and 7 Snipping Tool
Windows 10 Tutorial | How to Use Snipping Tool -
https://www.youtube.com/watch?
v=RbPAxcTf8h8
How To Use Snipping Tool & Print Screen | Windows 7 Tutorial -
https://www.youtube.com/watch?v=DQqwLkrqvmQ
Copying a z/OS Image into your Hands-on Requirement (Using Windows 7)
Step 1
.
Click on the Window's
Start Button
located at the lower left-hand corner of your desktop. In
the "
Search programs and file
" text box type the
key word Snipping
. The name of the Snipping
Tool should appear.
Select the Snipping Tool entry.
The following Snipping Tool Dialog Box will be displayed. It is recommended to drag this dialog box
outside the area that you want to document before you may continue; else, you may copy the dialog
box.
Step 2.
Once you have z/OS information displayed in your 3270 emulator that you wish to document,
click on the "
New
" icon to start the image selecting process. Your desktop will be colored greyed, or
dimmed, which indicates that the Snipping Tool utility is ready to select an image.
Step 3.
Drag a copy box select tool using your right-mouse button around the image to be selected.
Once you release the mouse button, a Snipping Tool windows box will display your selected image
and a tool bar similar to the following.
Step 4.
For this tutorial you should select the Snipping Tool
Copy Button
/Icon which is displayed with
two sheets of paper. Select the Copy Button. See previous red arrow.
Step 5.
Position the cursor inside the grey or color Hands-on requirement box and left-click to select
the position.
Step 6.
Paste the image using Ctrl-V or the Edit/Paste drop down menu.
Your documented result
should look similar to the following.
Page 6 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Use the snipping tool to document your successful logon with a view of your ISPF
Primary Option Menu below.
Your image should be inserted in the box below.
Page 7 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
1.0 Connecting to System z Mainframe and the z/OS Logon Process
1.1 Client/Server Architectures
Video - What is client server architecture?
https://www.youtube.com/watch?reload=9&v=ggp5C1q0gNA
Client/Server architectures are a distributed computer and application model, which will
connect
or
shares processing responsibilities
with another computer or application.
A Client program
REQUESTS services that a Server executes a program to return a RESPONSE to the client program.
For example, a HTTP Browser is a client program, e.g., Chrome, which requests web pages and other
services. Server programs, such as Apache or IIS, may provide HTML web pages or other data and
services to the client program. The HTTP browser/web server model provides both connection and
sharing of processing responsibilities.
Client/ Server applications enable interoperability. Interoperability is the ability of different systems,
devices, applications or products to connect and communicate in a coordinated way, without effort
from the program or user. These benefits of client/server architecture provides flexibility between two
computer applications that share common processing requirements, even though:
A client and server may use different hardware or operating systems, such as Windows, z/OS,
Linux or other operating systems.
A client and server may use different binary codes, to transmit, display and store applications
and data.
A client and server may use different program languages to develop, test and execute services
A client and server may use different local security systems, or may use a common security
system to share processing responsibilities.
Page 8 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
1.2 Mainframe Client – Server Alternatives
1.2.1 3270 and TN32070 Access
Video - TN3270
http://www.redbooks.ibm.com/courses/CRSE0304/CRSE0304_L5.mp4
3270 was an IBM physical display
.
3270 was also a streaming character data protocol
, which
would position data on a terminal screen (rows and columns) and then return user-entered and device
data back to the mainframe. The 3270 protocol was introduced in 1971 a decade before HTML, an
alternative character data protocol, was introduced.
Both 3270 and HTML transmitted data between
the client and the server. Neither are network protocols.
3270 was only used for dumb terminal clients.
TN3270, or terminal emulation 3270, permits the 3270
protocol to transmit data between an operating system client and the mainframe.
The 3270 primary objectives were to minimize the data to be transmitted and communication
overhead for the mainframe to be managed.
For example, a user or programmer would type and
format data of a 3270 display screen. Data would not be transmitted to the mainframe until an Enter
key was pressed to transmit an entire screen.
From the perspective of a Windows computer, the mainframe assumes that Windows is text-based,
3270 dumb terminal, using a few extra features, e.g., some text-based, 3270-clients will support a
mouse and color screens. TN3270 terminal emulation clients are available for Windows, Linux, IOS,
and Android
Decades later, programmers would describe this 3270 communication protocol as an
Asynchronous
Request or Response
. No how much time idle time a student dreams of their next Expedia or
Priceline get-away trip, Expedia does care until you press that "Book It" button to process that
request.
The mainframe does not see the terminal devices until the terminal client completes the
complete data entry and presses an Enter, Submit, or other key.
Most are more familiar and prefer a modern
Synchronous Request or Response communication
protocols. For each character a user or client types, each character is automatically transmitted the
character to the server, which may returns a list of suggestions to autocomplete an input. For each
movement of a client or mouse over a picture, each change in mouse screen position is automatically
transmitted to the server, which may return a list of suggestions or display a new picture. While
Synchronous Request or Response technologies have grown in popularity, this technology requires
significantly more client or server processing requirements and overhead.
Page 9 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Over the decades, three major types of mainframe 3270 clients were used by application and system
programmers to connect and login to a mainframe:
3270 Terminals
– non-intelligent hardware device, which included a keyboard, display device and a
network connection to pass data between the client and the mainframe.
All processing and storage
services are performed by the mainframe server using text-based user interfaces.
TN3270 Client Terminal Emulation
software
provides connections to a mainframe and is executed
on Windows, Linux, Mac OS, mobile devices and other client operating systems. All processing and
storage services are performed by the mainframe server using text-based user interfaces, such as
PCOMM, TN3270, etc.
TN3270 Mainframe IDE software
also provides connections to a mainframe and is executed on
Windows, Linux, Mac OS, mobile devices and other client operating systems. All processing and
storage services are performed by the mainframe server
. Mainframe IDE software emphasizes user-
friendly, advanced graphical user interface and graphics, and may also provide most text-based
legacy tools, e.g., TSO, ISPF, and SDSF
Page 10 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
1.2.4 What is ASCII and EBCDIC?
Electronically, a digital computer is only capable of storing, understanding and processing information
as combination of bits. A bit is conceptually similar to a simple light switch. Either the switch is on or it
is off.
Early computer hardware used a variety of different electronic technologies to store a bit.
The
following are some early pictures of storing bit from Pingdom
(
http://royal.pingdom.com/2008/04/08/the-history-of-computer-data-storage-in-pictures/
) and Timeline
of Computer History
http://www.computerhistory.org/timeline/memory-storage/
The 1024-bit Selectron.
The Magnetic Drum
Can you imagine the size of your laptop if we would store a bit using these 1940s and 50s
technologies?
It does not matter which electronic storage method is used, a bit is any device that is capable of
having two states. It is either ON or OFF. Most modern computers have electronic components that in
theory works like a light switch it is either ON or OFF. To make life easier, the number 1 is used to
represent an ON or a True state. The number 0 is used to represent an OFF or a False state.
Binary electronics are reliable and inexpensive to build.
Digital computer are based on two numeric
states. All hardware computer functions are built on a combination of bits or multiples of twos, i.e., 2,
4, 8, 16, 32, 64, 128, 258, 512 and 1024.
A byte or word is a combination of bits.
What is more
important to remember is that a Binary Representation Code must be used by a computer to
understand the meaning of those combinations of bits. ASCII and ECBDIC are two examples of binary
codes.
While electrical engineers may get excited about the basic bit (or one light switch), a bit does little to
help an average person store or manipulate human data and information inside a computer. A bit can
only represents two states. Symbolically, the ON state can represent a "Passing Grade" and the OFF
state can represent a "Failing Grade"
Paul Revere was famous for his warning that the British were coming, which used a binary digit, or
two simple values. "One by Land and Two by Sea". As history reports this data representation system
was quite adequate. What would have been the result if the British wanted to stop at Heinz Field
during a Pittsburgh Steeler's game to eat a Parmenitti Bros Sandwich before the attack?
There was
provision for a third option, which could have changed the revolutionary war. (A little bit of humor - a
real little bit. What can you expect from a Steeler fan?)
Simple binary codes and bits do permit computers to process numeric data.
However, humans also
required to communicate using letters of the alphabet, special characters and symbols. In the late
1950s, IBM introduced an 8-bit binary code called EBCDIC (Extended Binary Coded Decimal
Page 11 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Interchange Code
), ECBDIC that would combine 8-bits (256 combinations), which would be
used to arbitrarily represent a letter of alphabet.
Behinds the scenes the IBM mainframe uses the ECBDIC would store the number
193
which
symbolically meant to display a capital letter "
A
" on the display to make these humans happy. The
letter "
B
" would be stored as an
ECBDIC number 194
, and so forth.
Though IBM's 8-bit EBCDIC was
could store both upper and lower case alphabetic characters, numbers, and other symbols, it was
proprietary binary code. Originally, binary codes could only store and process numeric data.
There are three binary coding standards introduced to compete with IBM’s ECBDIC, i.e.,
ASCII 7-bit
(128 combinations),
ANSI 8-bit
(256 combinations) and
Unicode 16-bit
(65353 combinations.)
Almost all computers use ASCII, ANSI, and Unicode.
EBCDIC is only used by z/OS mainframes
operating systems.
The example compares the differences between how z/OS stores the letter “A”, and how ASCII stores
the letter ”A”.
ECBDIC will store the number 193 to display and represent the capital letter "A", and
stores the number 194 to the display and represent the a capital letter "B". However, your Windows
and Apple computer uses ASCII. ASCII will store the number 65 to display and represent a capital
letter "A", and stores the number 66 to the display and represent the capital "B".
To humans, all we
see is the capital letter "A".
However, each computer system sees a different value, such as, the
integer numbers for ECBDIC as 193 and ASCII as 65.
If you are confused, can you imagine the confusion if a Windows or Apple operating system,
which uses ASCII to communicate IBM mainframe that uses ECBDIC?
This one of the major
reasons we use a 3270-client to convert the ASCII binary codes, e.g., the number 65 for a
capital letter "A", to the number 193 so that the mainframe can understand that EBCDIC can
interpret the transmit characters
as a capital letter "A".
This is the process of ASCII-to-
ECBDIC binary code conversion.
Page 12 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
1.3.5 3270-Terminal Keyboard
The old-style IBM 3270 terminal keyboard's layout is different than your Windows or MAC keyboard.
Your keyboard has
function keys on the top row labeled as F1...F12 key
.
This Function
Key layout was based on the original IBM 3270-terminal key board, but were labeled PF1
through PF24.
Modern keyboards have only ONE labeled ENTER key, but the
3270-terminal keyboards had
two ENTER keys
. The larger ENTER key is often called the Line Feed (skip a line key). The
second, and more important 3270 ENTER key was located where the Right-CTRL key on the
standard PC keyboard. The Right-CTRL key is VERY important on a 3270-terminal. The Right-
CTRL key means to SEND information entered or typed on the terminal keyboard to the
mainframe and to be executed.
This second ENTER key, or the Windows Right-Ctrl key, is
often called the RETURN key. The bottom line, the second ENTER or RETURN key is the
most important.
MAC computer and laptops keyboards do NOT have a right-CTRL Key.
Your 3270-
emulator program must "map" or assign an alternative MAC key to perform the same function
as the RETURN or right-ctrl key.
An original 3270 keyboard had three keys called
Program Attention keys, labeled PA1, PA2,
and PA3 and another key labeled CLEAR.
These keys are not available on a PC or MAC
keyboard and must be mapped, or assigned, to different keys. These assignments are not
standardized across keyboards or 3270-clients. Most emulators supplement your physical key
board with a pop-up key board.
PA1
, assigned to the 3270-emulator ESC key, is pressed to interrupt a program/command or a
job hangs-up. Pressing the PA1 or ESC key is similar to pressing the Ctrl+Break key
combination with a Windows hangs-up.
The 3270-terminal
CLEAR
key, assigned to the PAUSE key, means to refresh the screen. The
CLEAR key is rarely used in z/OS, but may be used in many z/OS middle ware programs.
Page 13 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
1.3 Client/Server Network Connection Services
TCP/IP is a very popular transport and network protocol, which a client and server may use to connect
and share processing responsibilities. System z mainframes are popularly accessed by TCP/IP. IBM
mainframes also supports their proprietary network protocol SNA. To connect a server, a TCP/IP client
must be configured with an IP address and a Port Number
An IP address uniquely identifies a
computer
or connection, e.g., our z/OS server is 192.86.32.17.
Since two different computers on the same network must be assigned a unique IP address. Your client
computer will have a different IP address.
A Port Number uniquely identifies a
program,
e.g., TN3270, web server, or Topaz server, which
interfaces with a client.
An Internet Browser, e.g., Chrome, Web server uses an IP address or a domain name to connect to a
web server. The default web server port number is port 80. Likewise, each TN3270 client will require
the client provides a method to specify an IP address.
Each 3270 client has its own method to specify
to identify the mainframe's IP address and the Port number.
IBM PCOMM,
a legacy client, configures the access using a
Profile or WS text file
to connect to
TSO For example, IP Address 192.86.32.17 and Port Number 623.
Topaz Workbench IDE
, configures Client Access using a Host Connections Interface (HCI) specifies
IP address 192.86.32.17 and port number 16196 to connect to the Topaz Server. Details are
presented in Requirement 2.0 Compuware System z Topaz Workbench
Zowe Explorer IDE
, configures the client access using a
Profile
to connect to zOSMF and Zowe.
Details are presented in Requirement 4.0 Visual Studio Code, Zowe Explorer (COBOL), and IBM Z
Open Editor
Page 14 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
1.4 Overview of z/OS Operating System, Subsystems and Daemons
z/OS is a 64-bit operating system, which combined the strengths and advantages of IBM's historical
MVS (Multiple Storage System)
operating system and the strength advantages of UNIX operating
system.
A operating system kernel or MVS base control programs controls everything, is collection of
programs that provided minimum set of required services and is always memory resident.
The computer hardware will IPL or boots to loads and initializes the cores of MVS and UNIX operating
systems. After the boot process, JES or UNIX exetd will load optional z/OS subsystems or UNIX
daemons or services. z/OS subsystems provides specialized subsystems provides services when
requested by a client program.
The following graphic provides an overview of z/OS subsystems,
daemons or services, and external and internal clients identified by an IP address and TCP port
number used Topaz Workbench to connect and login.
Page 15 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Please review the Introduction to System z - Section 5.0
for more Details of the System z Subsystems presented below.
Page 16 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
The z/OS operating system kernel is a collection of base control modules (programs) that provide
functions similar to
other operating systems
e.g., physical and virtual memory management, task
management, I/O control management, file system management, and some other core operating
systems.
Most are familiar with Windows, Linux or UNIX operating system kernel.
z/OS does not use
the term "kernel", but rather calls these core functions Base Control Programs (BCP). Unlike Linux
and UNIX, z/OS does not permit system administrators to compile or modify the kernel for security
reasons. z/OS only permits system programmers to customize the parameters under which a fully
tested z/OS base control program will function. Rootkits do not exist in z/OS. A rootkit is malware that
compromises, either legitimately or maliciously, of the operating system or functions.
1.5 Subsystems, Daemons or Services
What is z/OS subsystem?
A z/OS subsystem is similar to the concepts of a Linux or
Window's
daemon or service
that executes in the background waiting for either a user,
another subsystem or kernel of the operating system to request service that the kernel does
not directly provide.
A Subsystem or Daemon are example of a backend server
application that listens for service requests from a client application
A client
application may be a program or user.
For example, a DB2 Database Management
subsystem (a client) may make a request to the RACF security subsystem to see if a DB2
SQL request has been authorized. Large-scale systems will apply division of labor and
specialization across a sequence of multiple computers or applications.
Similar to the Domino pizza analogy consider another client-server analogy in which your
instructor assumes the role as a technical computer specialist. Your instructor needs the
support of another specialist to perform certain functions. The academic secretary will provide
support services to proof-read and store class resources. Academic counselor will provide
support services to interact with student's problems. Tutors may support students. School
security may handle academic security problems. In z/OS terminology, these functional
specialists will provide services to your instructor in a manner that z/OS subsystems provide
specialized services when requested.
Most have used an Internet client browser, such as, Chrome, Internet Explorer, or Firefox, to
request a web page from an HTTP or web server.
The z/OS web server is an Apache HTTP
(Web) server similar to the Open-Source Apache version used by Linux or Windows. The
Windows Server also uses a proprietary version of the Microsoft web server called IIS
(Internet Information Server).
While each program may provide the same functionality they
will have different names. For example:
The z/OS Apache web server is called a "subsystem",
The Linux Apache server is called a "daemon", and
The Windows IIS web service is called a "service."
A z/OS subsystem, a Linux daemon, or a Window's server provides the same functions, but
are called different names. All three server programs will wait idle in the processing
background until a client program requests a service to be performed on the client's behalf.
Perhaps, students listening this lecture may be classified as a subsystem, daemon or service
program. Many students are idle, sleeping, texting, or sitting in their seats until the instructor
wakes them up and ask them a question.
Page 17 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
1.6 Questions
1.6.1 Questions - Client/Server Architecture, 3270, Network Connectivity
1. Explain the functional differences between a Client and Server. Answer
à
A server is a program or machine that waits for and processes incoming requests from a client while a
client is a program or machine that sends requests to servers.
2. Client/Server architectures offers benefits beyond sharing processing responsibilities. Client/Server
architectures provides for interoperability. List several interoperability benefits that Client/Server
architectures offers. Answer
à
Some benefits are that a client and server may use different hardware or operating systems, such as
Windows, z/OS, Linux or other operating systems, a client and server may use different binary codes,
to transmit, display and store applications and data, a client and server may use different program
languages to develop, test and execute services, and a client and server may use different local
security systems, or may use a common security system to share processing responsibilities.
3.
List the two functions of the IBM 3270 data protocol? Answer
à
The 3270 primary objectives were to minimize the data to be transmitted and communication
overhead for the mainframe to be managed.
4. Describe the difference between IBM 3270 and the TN3270 data protocols. Answer
à
3270 was only used for dumb terminal clients while the TN3270 permits the 3270 protocol to transmit
data between an operating system client and the mainframe.
5.
List the modern data streaming protocol introduced a decade after 3270, which is most popular
than 3270 and most students use every day.
Answer
à
TN3270 Mainframe IDE
2. Explain the purpose and differences between ASCII character encoding and ECBDIC character
encoding.
Answer:
ASCII and ECBDIC character encoding were both used to encode letters so that they could be
processed in some way. They are different in the way that they enode the letters. Ascii encodes the
actual letter while ecbdic stores a number to represent the letter.
3. The older 3270 terminal keyboard used to connect to mainframe is layout differently than your
desktop or mobile device keyboard. The older 3270 keyboard had two Enter keys. On a Windows
keyboard what is the purpose of the Right-Ctrl Key?
Answer:
The right-CTRL key means to send information entered or typed on the terminal keyboard to the
mainframe and to be executed.
Page 18 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4. To connect to a z System mainframe across the Internet, the 3270 emulator must be configured
with two pieces of TCP/IP information: an IP Address and a Port Number. What are the functions of an
IP Address and a Port Number? (This answer would be the same whether or not you connecting to an
IBM mainframe and TSO or connecting to amazon.com.) Answer:
An IP address uniquely identifies a computer or connection and a Port Number uniquely identifies a
program.
5. When you use your 3270-emulator to connect to a mainframe, which IBM subsystem or program
permits you to LOGON to z System Mainframe? Answer:
Zowe Explorer IDE
Page 19 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
6. When using a 3270 client, e.g., terminal emulation or IDE, where are mainframe application
executed?
(Hint: the client or the mainframe server). Answer
à
In the mainframe server
7. To connect to a mainframe using the TCP/IP network protocol, one must configure an IP address.
Describe the function of an IP address. Answer
à
An IP address uniquely identifies a computer or connection
8. To connect to a mainframe using the TCP/IP network protocol one must configure a Port address.
Describe the function of a Port address. Answer
à
A Port Number uniquely identifies a program
9. Explain the difference and relationship between the 3270 and TCP/IP protocols. Answer
à
The TCP/IP protocol identifies and specifies who is connecting to the mainframe or server while the
3270 protocol provides the connection to that mainframe or server.
1.6.2 Questions – z/OS Mainframe Operating Systems and Subsystems
1. List three or more functions of an Operating System kernel. Answer
à
A operating system kernel controls everything, is collection of programs that provided minimum set of
required services, and is always memory resident.
2. Describe the functions of a Mainframe Subsystem or a Linux Daemon. Answer
à
A subsystem is similar to the concepts of a Linux or Window's daemon or service that executes in the
background waiting for either a user, another subsystem or kernel of the operating system to request
service that the kernel does not directly provide.
3. List a z/OS subsystem which is responsible to provide authentication and authorization security
services for clients.
Answer
à
The RACF security subsystem
Page 20 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
1.7 Types of Application and System Programmer Clients and Mainframe Tools
1.7.1 Overview of Text-Based TN3270 Clients and System Tools
Text-based 3270 clients, such as PCOMM and Vista TN3270, will connect to System z TSO. System z
TSO, ISPF and SDSF are commonly referred to as
mainframe legacy tools
, which are often
preferred by mainframe experienced application and system programmers, and system
administrators.
Video - TSO
http://www.redbooks.ibm.com/courses/CRSE0304/CRSE0304_L6.mp4
Video - ISPF – Interactive System Productivity Facility
http://www.redbooks.ibm.com/courses/CRSE0304/CRSE0304_L7.mp4
Video - SDSF – System Display and Search Facility | z/OS Introduction
https://www.youtube.com/watch?v=S4apMxxXlyM
Video - Meet the Mainframe - Connecting to TSO, Navigating ISPF, and using SDSF
https://www.youtube.com/watch?v=lYPCUhbKEDM
TSO
was the first text-based,
command line interface (CLI)
. Windows, Linux and UNIX operating
systems also provide a text-based CLI.
During a text-based logon, TSO will request RACF to
authenticate the logon user.
TSO is similar Windows CMD or Linux bash shell.
Most application
deployment and administrative tasks can be performed in TSO
ISPF
is a customized, text-based menu system that provides a
full-screen text editor
(similar to
EDIT, nano or gedit, DSLIST (
similar to Windows File Explorer)
, and common file utilities, such as,
copy, move, delete, etc.
ISPF is easier-to use than TSO, and provides menu panels for develop and
maintain databases, RACF Security, use UNIX, and manage the file system
SDSF
is a text-based menu system that provides system administration tools, which is used to
debug
application and system program syntax and run-time errors
, displays active applications or
subsystem
similar to Windows Task Manager.
SDSF may also starts and stops subsystems
similar
to Windows Service Manager.
Page 21 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
1.7.2 Overview of System z Client-based IDE (Integrated Development Environment) and Tools
Students or new developers may be more familiar with graphical user interfaces than text-based CLI
or menu interfaces, such as Visual Studio and Eclipse-based plugin IDEs
Integrated Development
Environment (IDE) clients and software for building applications that combines common
developer tools into a single graphical user interface (GUI).
Mainframe DEs are often called thick
clients. The following is a summary of the common features of System z application and system
programming IDE tools:
System z IDE Source Code editors
assist in writing software code faster and with less experience.
Highlights syntax with visual cues, e.g., highlights program structure and distinguishes
statements and clauses from data.
Provides language specific auto-completion, e.g., predicts program syntax or data names after
a few keystrokes.
Checks for bugs and syntax errors or autocorrects program code is being written.
System z IDE Local or Server Build and Testing Automation tools
will simplify the process or
compiling source code into executable code, package binary executable code, and runs automated
tests. Testing focuses on finding bugs and errors and are used to ensure that the program is correct
and meets specification standards. Source code is edited by the client operating systems. Unlike
Visual Studio or Eclipse-based IDEs,
System z application source code is stored, compile, link
executed, and tested on a mainframe.
After an application has been successfully tested it may be
deployed to a live mainframe system.
System z IDE Debugger Tools
are designed to assist programmers to troubleshoot the cause of run-
time, logic, or program specification errors after program bug has been found.
There are hundreds of IDE Clients and Tools available to support a variety of server and mobile
operating systems, program languages, web page (HTML) design, middleware integration and data
storage, and application security testing. Availability of IDEs may be centralized at the server level,
access is decentralized through remote "fat" clients, or available web "thin" clients.
Every COBOL IDE supports a File Manager similar to Windows Explorer, which has been modified to
the z/OS operating system.
Every COBOL IDE supports an intelligent GUI source code editor, which
assists in writing COBOL code faster and with less experience, which minimizes the number of syntax
errors.
The following sections will overview the three popular client-based IDEs that support
mainframe COBOL
Page 22 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
1.7.3 System z Web-based IDEs and System Tools
While Client-based IDEs, such as Visual Studio, Eclipse, Topaz, IDz or Zowe Explorer and Web-
based IDEs may provide similar functions, there are many technical and cost differences.
Client-based IDEs and development workbenches must be installed and maintain a client
computer operating system. Client-based IDEs must be compatible with the client operating
system. Web-based IDEs are normally available on the cloud and may be accessed by a
browser.
If an application or system program programmer is editing a file or dataset, a Client-based IDE
may be required to be downloaded from the server, and then the edited version must be
uploaded to the server.
Legacy text-based and web-based IDEs will edit the file or dataset
directly stored to the server.
Client-based IDEs often provide more mature capabilities or may be used to offload and
distribute computation-intensive workloads to the client. However, client-based IDEs are also
designed to distribute tasks to a centralized server, e.g., program compilation and execution,
system administration, etc.
Page 23 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
1.7.4 Questions - – Legacy, Client-based IDE and Web-based IDE
1. List the System z text-based tool that may be used to debug COBOL syntax coding errors or run
time errors. Answer
à
SDSF
2. List the System z text-based tool that may be used to ode a C or C++ using a full-screen text editor.
Answer
à
ISPF
3. List the System z subsystem which provides a text–based command line interface similar to a
Windows CMD or the Linux Bash shell.
Answer
à
TSO
4. List the Windows tool that is similar to the text–based ISPF DSLIST Panel.
Answer
à
Windows file explorer
Page 24 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
5. List the Windows tool that is similar to the text–based SDSF utility that displays currently executing
programs and subsystems.
Answer
à
Windows Task Manager
6. List and describe three major System z IDE application development tools.
Answer
à
System z IDE Source Code editors assist in writing software code faster and with less experience.
System z IDE Local or Server Build and Testing Automation tools will simplify the process or compiling
source code into executable code, package binary executable code, and runs automated tests.
System z IDE Debugger Tools are designed to assist programmers to troubleshoot the cause of run-
time, logic, or program specification errors after program bug has been found.
Page 25 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
COBOL Training Course GitHub:
https://github.com/openmainframeproject/cobol-programming-course
2.0 Compuware System z Topaz Workbench Client and Tools
2.1 Introduction to Topaz Workbench
Download - Compuware Topaz Workbench Eclipse-based client
May be may be installed on your personal Windows computer.
https://sentry.rmu.edu/download/topaz/Topaz_Workbench_20.03.02_20200804.exe
'
The Compuware Topaz Server component is installed on the RMU IBM mainframe and will be
introduced in FALL 2020.
The Topaz Workbench client has been made available and is academically
supported by a grant from Compuware. The Topaz Workbench is a proprietary,
student-and-
developer-friendly
COBOL IDE and DevOp client and server architecture, which compiles, executes,
tests and provides interactive troubleshooting tools directly on the mainframe. Topaz supports TSO,
ISPF, SDSF and other legacy tools.
1.
The Topaz intelligent, multi-language source code editor may be also used to code, integrate
and execute CCOBOL, PL/I, C/C++, Java,
Assembly (HLASM), ReXX, JCL, and many other
programming and scripting languages.
2.
The Topaz IDE also provides a Visual Program analysis tool, which makes it easier for
students and developers to understand the hierarchical flow of a program and data.
3.
Topaz provides access and editing capabilities for z/OS data sets, UNIX files, and DB2 tables,
without coding and application.
4.
However, the Topaz Workbench does not provide advanced application interactive debugging,
troubleshooting, or analysis tools for DB2, IMS or CICS.
5.
Using third-party Topaz Workbench Eclipse plug-ins, the Topaz Workbench will extend the
workbench capabilities and provide DevOps tools and capabilities beyond the Topaz
Workbench IDE.
Extra licenses may be required advanced interactive troubleshooting tools, such as, Expediter and
Abend-AID
2.2 Topaz Workbench
Concepts and tools
Video - Compuware Topaz Workbench
User-friendly details will be presented later.
https://www.youtube.com/watch?v=fIdDNSu3mDc&list=PLVZm6RRmczLaPiwJFbbnaKrAkbDu3OcA7
Compuware Topaz Workbench is an Eclipse platform used to integrate multiple Topaz IDE tools.
Beginner COBOL programmers will start learning introductory COBOL application development using
the Topaz Host Explorer and JES Explorer Tools.
Later students will learn to debug and troubleshoot
COBOL logic and ABEND errors by using Topaz's Xpediter, File-AID and Abend-AID tools
Page 26 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
2.2.1 Host Explorer
Topaz's Host Explorer
is similar to Window's File Explorer or ISPF's DSLIST to manage files/data
sets and GUI text editor, or to the legacy ISPF tool. The Host Explorer editor assists in writing
software code faster and with less experience, which minimizes the number of syntax errors.
By
default, Topaz will display the following four-frame view, when you start Topaz.
Hosts Explorer Frame
displays Host Connection Icons (HCI), which will enable the
programmer to login, or connect to a System z mainframe. After a successful login, you
connect to any DB2 for z/OS table, z/OS program or data set, or UNIX program or file.
You
may SUBMIT or find the properties of any data set.
Text Editor Frame
will permit you to edit and syntax check multiple applications or JCL source
code.
Outline Frame
displays an outline of data and paragraphs of a COBOL program to facilitate
easy navigation the text Editor frame. Clicking on a COBOL data element or paragraph will
jump to that location in the COBOL source code in the Text Editor.
Console Frame
toggles between TSO prompt, JES JOB status, SYSLOG and other consoles.
During your Topaz session, you may close or resize a frame. The easiest method to reset Host
Explorer default four-frame view is to click on the Host Explorer Icon, displayed in the upper- right
corner, and select RESET.
Page 27 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
2.2.2 JES Explorer
Topaz's JES Explorer is similar the SDSF Status Panel, which will provide a COBOL programmer
error messages which may be used to correct JCL and COBOL syntax error messages. COBOL
programs which have either JCL or COBOL syntax errors will not execute.
2.2.3 Xpediter
Topaz's Xpediter
mainframe application debugging and analysis tool, which enables developers to get
into an interactive test session to monitor and control source code during execution line by line to
analyze COBOL execution logical errors. Logic errors are errors that does not satisfy program
requirements or provides incorrect or unexpected results. File-AID and Xpediter are complimentary
execution logic tools, except File-AID focus on data management.
2.2.4 File-AID and SQL Editor
Topaz's File-AID and SQL Editor allows the programmer to
1.
Display or edit Sequential and VSAM datasets, Db2 tables, and IMS hierarchical DBMS, and
z/OS UNIX and UNIX files without coding a program.
2.
Enables the programmer to create and update File-AID XREF
3.
Provides Compare and Search capabilities
4.
Enables you to dynamically build, edit, and test SQL statements without having to type SQL
code with the SQL Query Builder.
Assume that a COBOL application requirement is to update customer and credit card transaction
data.
File-AID enables developers to retrieve the right data to ensure all test conditions
(requirements) were met, or to adjust and simulate other test data conditions.
2.2.5 Abend-AID
Topaz's Abend-AID is used to troubleshoot and analyze a z/OS System or User Abend.
A mainframe
Abend is an abnormal termination of software, or a program crash.
A program crash may be
caused may be caused by improper execution of COBOL or Java application program, etc., attempt to
store invalid data, file or program not found, insufficient disk space, divide by zero exceptions. A
program crash may be cause by a middleware abends, such as a DB2 database error.
When a mainframe program crash occurs, operating system will
1.
Display a four-character Abend code, normally starting with the letter "S", and
2.
Store the recorded state of the working memory of a computer program at a specific time,
generally when the program has crashed or otherwise terminated abnormally in an abend
diagnosis file is called a "memory or system dump" file.
On many occasions, Microsoft Word or Excel crashes will display a message such a user-friendly
abend condition, such as Word is not responding or Working.
The user will then request to send a
crash report, a system dump, to Microsoft (the programmers who wrote Word program code). Few are
experienced enough to debug a Word program crash.
Page 28 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Debugging and troubleshooting Abend codes and memory dumps is challenging and requires
advanced programming skills. Topaz's Abend-AID tool simplifies the abend, or program crash,
troubleshooting process. Advanced COBOL students who desire to earn a starting salary above
$100,000, will be introduced to Topaz Abend-Aid.
2.3 Questions – Topaz Concepts
1. Describe the function of the Topaz Workbench Host Explorer Frame. Answer
à
The Host Explorer editor assists in writing software code faster and with less experience, which
minimizes the number of syntax errors.
2.
Topaz Workbench Host Explorer Frame is similar to which Windows tools? Answer
à
Windows File Explorer
3. Describe the function of the Topaz Workbench Outline Frame. Answer
à
The Outline Frame displays an outline of data and paragraphs of a COBOL program to facilitate easy
navigation the text Editor frame.
4. Which Topaz tool will help a programmer find COBOL to find program syntax errors? Answer
à
Text editor frame
5. Which Topaz tool will help a programmer find COBOL logic errors while the program is executing?
Answer
à
Xpediter
Page 29 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
3.0 Topaz Workbench Login
3.1 Overview of Using Topaz to Connect and Login to a System z Mainframe
Download - Compuware Topaz Workbench Eclipse-based client
May be may be installed on your personal Windows computer.
https://sentry.rmu.edu/download/topaz/Topaz_Workbench_20.03.02_20200804.exe
The System z login process is similar to authenticating to any other operating system. A valid User ID
and password provided by the instructor, will be used for authentication credentials.
The following
graphic summarizes
1.
Access Topaz Workbench client may be installed on your Windows personal
computer (recommended), RMU AppStream or RMU lab computers.
2.
Connect to z/OS across the Internet using a 3270-emulator client.
3.
Authenticate to RACF – the IBM Security Server
4.
Allocate mainframe memory and processing to your Topaz TSO session.
Page 30 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Page 31 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
If the student or faculty member had previously logon the IBM RMU Mainframe AND your User
ID is active, you should first attempt to Login using Topaz Workbench using your previous
User ID and password. If successful, these students will NOT be required to change their Initial
Password, i.e., BLUESKY, or install their practice data sets.
If you are previous students, you will be able to access all of your previous work stored in our
catalog data sets.
3.2 Create a Host Connection Interface (HCI), if necessary
RMU's lab computer or Windwos virtual desktop, e.g., RMU AppStream, may have previously
configured a Host Connection Interface (HCI) for you.
For example, your Host Connection Interface
icon (HCI), such as RMU, may be initially displayed listed.
Download Link for Compuware Topaz Workbench Eclipse-based client
https://sentry.rmu.edu/download/topaz/Topaz_Workbench_20.03.02_20200804.exe
A student or faculty member may download and install the Topaz icon on their Topaz on their personal
Windows computer. You must manually configure Topaz Host Connection Interface (HCI).
However,
the installed client Topaz Workbench must have access to a Topaz server, installed on your school or
employer's System z mainframe.
Note: The Topaz server is not installed on the IBM Master the Mainframe System z mainframe.
A Topaz Host Connection Interface (HCI) specifies a named combination of an IP address and
Port Number, and other network parameters used to make a TCP/IP connection to a mainframe
server.
A Topaz HCI is roughly similar to Internet Browser's bookmark.
If you do not see a mainframe connection (HCI) icon displayed, you MUST create a HCI using
and specify the Host IP and Port number of your System z mainframe.
Start the Topaz Workbench by either selecting Topaz Workbench from the Windows Main Menu or by
clicking on the Topaz desktop icon. The time to start the Topaz client may be slow as the Eclipse IDE
loads and initializes Topaz plugins. If you had installed the Topaz Workbench on your personal
computer a Topaz Welcome Screen may appear. You may decide exit the Welcome screen.
Page 32 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
1. From the
Window
menu, then select
Preferences
. The
Preferences
dialog box appears.
2. Select
Compuware,
then select
>Host Connections
from the navigation tree. The Host
Connections page appears.
3. Enter the appropriate
Description
,
Host IP,
and
Port Number
.
Your instructor will specify the
Description that you should enter. Click on Add.
In the mainframe professional world, it is common to
logon to multiple z/OS mainframes.
6.2.1 HCI Host Descriptions, Virtualization and Cloud Computing
A Topaz Host Description is a symbolic name of z/OS LPAR name or a virtual machine (VM). Most are
familiar with a Virtualization and Virtual Machines, and Cloud computing. Virtualization is the
technology that permits multiple copies of an operating system to share a physical resources of a
computer. Cloud Computing is a higher layer software that 1) creates, modifies, deletes, or manages
the physical hardware resources assigned to a virtual machine across multiple physical computers,
and 2) manages and allocates the costs of the physical hardware resources assigned to a virtual
machine.
Page 33 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Virtualization is a foundation technology. Cloud computing is virtualization management
system.
IBM was the first to introduce virtualization and cloud computing technologies in 1973
decades before other virtualization and cloud providers, such as, AWS, VMWare, Xen and Azure,
existed.
Unlike other virtualization providers, IBM mainframe servers provides two types of virtualization
technologies: LPARs and Virtual Machines. Both a Logical Partitions (LPAR) and Virtual Machine
represents an allocation CPUs or Processor cores, memory, and other resources so that each set of
resources can be operated independently with its own independent operating system instance and
application.
However, mainframe LPARs "directly and physically control" the allocated resources; whereas, virtual
machines are managed by virtualization host manager, and a VM does not "directly and physically
control" the allocated resources. While IBM LPARs provides improved performance and security,
there is limited number of LPARs, z15 mainframe supports 85 LPARs; whereas, thousands of virtual
machines may be created.
In 1973, IBM mainframes were the only large-scale computing technology available and faced the
following challenges for Fortune 500 companies:
Allocation of physical hardware resources to computing functions, such as, applications, databases,
user interfaces
6.2.2 Right-click on the RMU Host Interface Icon to Connect to the Mainframe.
Right-click on your Topaz HCI icon, such as RMU, to Connect to the RMU IBM Mainframe. A
drop- down menu will be displayed.
Select the Login option from the drop-down menu, and a Topaz Logon Credentials for RMU
(the HCI) will be displayed.
Page 34 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
3.3 First Time Login - Topaz Login Credential Dialog Box
Your instructor will provide you a z/OS User id and an initial password, e.g., BLUESKY.
You
MUST change your initial password, e.g., BLUESKY, to the new password.
On the RMU IBM z/OS mainframe, User ids and passwords are not case-sensitive. Upper-case letters
may be used to make the documentation easier to read.
3.3.1 User Security or Authentication
User Security or Authentication is the process of verifying the identity of a Login user.
Most operating
systems default to the standard User Id and Password authentication model.
The following
demonstrates the Topaz error messages, which are normally displayed when a user incorrectly enters
a User id or Password.
z/OS supports two major discretionary access control security managers, which are named
IBM
RACF and CA ACF2 security managers.
Both support standard security protocols, but also provides
other proprietary security protocols beyond the capabilities of other operating systems.
3.3.2 Login Credentials Dialog Box and Change Password
The first time you use the Topaz Host Explorer, you will first see a Login Credential Logon similar to
the following:
Enter your User ID and
Initial Password
, e.g.,
BLUESKY
, provided by your instructor.
Do not click on OK yet!
You MUST change your password be during your first Login attempt.
3.3.3 Change Password
Click on Change Password
and enter your new password into New Password and Confirm New
Password text boxes. You MUST change your password during this initial (FIRST) Login, or your
Login attempt will fail and a Logon Credentials error message will be displayed.
It is recommended that you use a simple and short password, such as, 1234.
This will
prevent you from mistyping your password, adding extra spaces, or forgetting your
Page 35 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
password. Once you are comfortable with login process, you may change your
password at any time.
The maximum password length is 7 characters.
Click on
OK
when you are finished.
Use your new password on the next Logon. You may be prompted to change your password every 60
days.
The instructor can reset your password. Do not contact the Help Desk.
3.4 Topaz Login Credentials Error Messages
3.4.1 The specified user ID is revoked
Assume that your z/OS User id is RMU0191, and an invalid User ID, e.g., RMU000191, was
incorrectly typed. Topaz will display the message:
User security could not be established on the
HCI. The specified user ID is revoked.
After THREE Unsuccessful Password attempts, you will be automatically locked out of
the system and the error message. "
The specified user ID is revoked" will be displayed.
If
you forgot you password, contact your instructor to RESET the initial password if you forgot your
password.
3.4.2 The specified password is not correct.
Page 36 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Three Strikes and you are OUT!
After THREE Unsuccessful Password attempts, you will be
automatically locked out of the system and the error message.
The instructor can reset your password. Do not contact the Help Desk.
3.5 Possible z/OS Connection Problems using a Topaz
The Topaz Host Connection Interface, e.g., the RMU icon, was incorrectly configured. For
example, one may have attempted to connect to an
incorrect IP address or Port number
.
Your local computer or school
firewall
may be blocking either the Port Number or the IP
Address.
The System z server that you are attempting to connect to is currently being updated.
The Marist College z/OS server is scheduled to be updated on last Wednesday of the month
between the hours of 4AM to 8AM EST.
The RMU mainframe may be updated on Sundays,
normally between 11:00 AM and 2:00 PM
.
Unlike Windows, z/OS is rarely automatically
updated. All updates are fully tested before updates are applied by the z/OS SMPe (System
Modification Program). SMPe was introduced in the 1960s decades before Windows, IoS, and
Linux designed their installation and update utilities.
Page 37 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
3.6 Questions - Topaz Logon
1. Explain the function of a Topaz Host Connection Interface (HCI).
Answer
è
A Topaz Host Connection Interface (HCI) specifies a named combination of an IP address and Port
Number, and other network parameters used to make a TCP/IP connection to a mainframe server.
2. After entering your user ID and Password, the Login Credentials Dialog box display the error
message "The specified user ID is revoked."
List two reasons why the error message "The specified
user ID is revoked" is displayed?
Answer
è
1. The id was typed incorrectly
2.the three tries were used and you forgot your password
3. How does a user correct the user correct the error message "The specified user ID is revoked"?
Answer
è
Enter the correct user id and password or contact the instructor to have the password reset.
4. List three possible reasons why you cannot connect to the RMU IBM mainframe from your Topaz
client.
Answer
è
The Topaz Host Connection Interface, e.g., the RMU icon, was incorrectly configured.
Your local computer or school firewall may be blocking either the Port Number or the IP Address.
The System z server that you are attempting to connect to is currently being updated.
Page 38 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4.0 Host Explorer z/OS Datasets, Files and DB2 Tables
4.1 Topaz Data Set Filters
The Topaz Host Frame Tool displays and functions are similar to Windows File Explorer.
For
example, both Host Explorer and File Explorer will display folders and files. Both will permit you to
display, edit, rename, delete, move or copy files or data sets.
However, Host Explorer is more powerful and flexible than Windows File Explorer.
After a
successful login, you may connect to 1) any DB2 or IMS DBMS table, 2) any z/OS program or
data set, or 3) any UNIX program or file.
Host Explorer integrates all different types of enterprise
physical and logical storage systems. Windows requires different tools to integrate multiple enterprise
storage systems.
On the other hand, the Windows file system, i.e., NTFS, is more powerful and flexible than the System
z file system.
The differences among file systems will compared later.
What is important to understand is that one does not navigate a hierarchical structure of folders in
z/OS as you do in Windows, Linux or UNIX. There is no "cd" line command. There is no "Folder Up or
Folder Down".
The z/OS file system is a flat system. There are no sub or child folders inside a parent folder. The only
method to search a z/OS file system is to use data set FILTER.
A z/OS Dataset filter is similar to using the wildcard asterisk character,
i.e., "*",
in Windows, Linux or UNIX
Hmmm. Since IBM introduced the wildcard asterisk character and filters in 1959, I wonder where
Microsoft and UNIX got the idea of filters and wildcard characters.
Page 39 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
The first time you sucessfully login with Topaz Workbench, no data sets, files, or tables will be
displayed. To access, or filter,
your z/OS datasets 1) right-click to open the z/OS Datasets icon folder,
and 2) then select Add Filter and the following dialog box will appear.
Normally, the User Catalog filter may be configured by default. (We will discuss the concepts of a user
catalog shortly.)
Enter the following In the Filter text box:
1.
Enter your User ID or catolog name assigned by your insturctor,
such as, RMU0191,
folowed by a period,
2.
Enter two asterisks follwed by a period (**.) , and
3.
Enter two more asterisks (**).
4.
Clieck on the OK button.
Enter your User ID assigned by your instrucutor, not
RMU0191. A z/OS catalog name will
contain your personal, data sets simlar to your Windows user or Linux
home directories or
folders.
The first two asterisks means to
display all datasets stored in this catalog.
The second two asteriks with
display all members with a partiioned data set.
If you have not previously installed your practice data sets, you will see the Filter name, i.e.,
RMU0191.**.**, followed by a personal partioned dataset settings.
If the student is using z/OS for the first time, there will be no practice data sets contained in
the user catalog.
Requirement 4.3 will provide directions to use the SUBMIT command to
install practice data sets to be used in the following tutorials.
Page 40 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4.2 Introduction to File Systems and z/OS Data sets
A File System is a collection of operating system programs that control the manner in which
files are named, are created (Allocated), stored (Saved), retrieved (Opened), and managed.
Most operating systems support one or more file systems.
While most file systems are similar, the
rules to use each file system varies.
Each file system varies by degree of content flexibility,
organization, storage efficiency and performance.
Older mainframe file systems introduced in the disk drive (DASD) during a time period when the cost
of a single 30-megabyte disk drive (DASD) exceeded $18,000.
There were no Word documents,
sound and video files, or other modern stored content. The personal computer or desktop applications
did not exist.
A Data Set is z/OS's file system name for a file
.
Windows, UNIX and Linux (Mac OS) stores content
such as data and programs as a file. IBM stores data and programs on a storage device as a data set.
Windows describes a Word document as a file. On the other hand, z/OS would describe any
document as a data set or data set member
.
In z/OS terminology one may edit or browse a data
set. Windows would describe this process as opening a file.
The mainframe z File system was designed for storage and processing performance and
offered almost no content flexibility.
While we may prefer user-friendly, content flexible file systems
similar to Windows NTFSv5 or Linux ext-4, neither of these file systems are as storage or
performance efficient as the IBM z File system for large-scale transaction processing. If you require a
more user-friendly, content flexible file system, then it is recommended to use the UNIX System
Services or Linux for z System operating systems or directly use a Windows or Linux server system.
Page 41 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4.3 Install your Practice z/OS Data sets
4.3.1 Compuware Command Console
To install the practice data sets into your User ID Catalog, we are going to execute a pre-coded JCL
program located in the Public catalog.
The Compuware Console Frame is where text-based TSO commands and z/OS system messages
are displayed.
The Compuware Console is by default displayed at the right-bottom of Topaz
window.
If you do not see the Console, the easiest method to reset Topaz's default four-frame
view is to click on the Host Explorer Icon, displayed in the upper- right corner, and select
RESET
.
4.3.2 Select the TSO Commands Console
In the upper right-hand corner of the Compuware Console there are several icons displayed. Click on
the down arrow and select the TSO commands console.
TSO Commands Console is a command line interface, which is similar to the Windows and Linux
command prompt.
Notice the command prompt which is a
>
(greater than symbol.
You may see a
Connect Prompt, Simply click Connect to connect to TSO. In a previous section, the Topaz sever is
assigned to a different port number than TSO. The Connect action finds the port number of TSO.
Page 42 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4.4.3 SUBMIT a JCL JOB to install your practice data sets.
z/OS uses a JCL job to execute (run) and manage system and application programs.
One may
compare the process of submitting a JCL JOB to execute programs as similar to right-clicking
on an icon to start executing a Window's application
.
To install the practice data sets for this assignment, this requirement will execute a prewritten JCL
program to set up your data sets so that you may complete this tutorial. To execute the program we
will use the SUBMIT command. (Sorry, there will be no mouse clicking to start programs in this
tutorial.)
The JCL instructions to setup your data sets for this hands-on tutorial is stored in
RMU.PUBLIC.JCL(LAB)
. This JCL program will copy data sets from a public library (folder) into your
personal user catalog.
After the TSO Command Prompt type the SUBMIT command followed by at least one
space, then type a single-quote followed by the data set or data set member name to be
executed.
This command line will end with a closing single-quote. The single quote character is
located near the ENTER key on your PC keyboard).
Ignore the ending bar cursor character.
z/OS commands are not case-sensitive.
However, these commands will require the correct
spacing, a proper data set name or data set member name and punctuation. If you incorrectly type
this command you will get an error code. Interpreting this error code requires a little more
experience then presented now.
Try to be careful when typing this command.
You need to only execute this tutorial data set setup job once.
If you incorrectly type the
following command, there will be little evidence to help debug your typing error. So be careful to type
in the following SUBMIT command carefully.
Complete the following steps if you have no tutorial data
sets.
The details of submitting a JCL job will be discussed in Part 2 of this Assignment
Page 43 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4.3.4 Successful Job Execution and z/OS Data set Refresh
If the SUBMITed the job to install practice datasets was successful, ad READY response.
However,
the datasets displayed in your Host Explorer window has not changed.
Unlike Windows and Linux, z/OS does not automatically display the copied data sets.
Right-Click on
the Catalog Filter, e.g., RMU0191.**.**,
and click on Refresh
.
Your refreshed Catalog Filter should
appear similar to the following.
Page 44 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4.4 Comparative Examples of Topaz Host Explorer and Legacy ISPF DSLIST
After you install your practice data sets, the previous ISPF DSLIST will appear similar to the following
Topaz User Catalog Filter.
However, the Topaz User Catalog Filter looks familiar to Windows File
Explorer, which displays Window-like folders and file name.
The z/OS ISPF legacy tool uses the Data Set List Utility (DSLIST) may display a user's datasets
similar to Windows Explorer will display your files. As an example, the following example will display
the datasets owned by user RMU0191.
4.5 Document your Host Explorer Frame, Filter and Installed Practice Data sets
Page 45 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Using a Snipping tool Document your Host Explorer Frame, Filter and Installed
Practice Datasets
à
1. What is the purpose of z/OS JCL (Job Control Language)?
Answer:
It instructs the system on how to run a batch job or start a subsystem.
2. What is a JCL Job?
Answer:
It is any process or instruction done by the JCL.
3. What is the purpose of using the z/OS SUBMIT command? Answer:
The SUBMIT command runs a program
Page 46 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
5.0 Datasets, Catalogs and Volumes
5.1 Naming Files or Datasets
5.1.1 Naming files in the Windows NTFSv5 file system.
A Window's file or folder may contain up to 255 characters, embedded spaces, and will retain
the case of letters in a file name, but the use of upper and lower-case does not make the file
or folder name unique. For example, PACKY.DOCX is the same file name as packy.docx.
A fully-qualified NTFSv4 file has three major components.
C:\LOCATION FOLDER\ SUBFOLDER\FILE NAME.FILE EXTENSION
C:\USERS\LAVERTY\MY DOCUMENTS\PACKY.DOCX
If you do not specify the device or parent folders (the location of the file), Windows NTSFv5
assumes that the file will be stored or located in the current folder.
Backward slashes are
used to separate storage location information from the file name.
A period is used to
separate the File Extension (.DOCX) from the file name.
The File Extension is used by the
Windows file system to specify which application understands the content of the file.
5.1.2 Naming z System Data sets
A Window's file is similar to a z File System data set
. A
Data Set name cannot be longer
than 44 characters, may not contain embedded spaces, the first character must be a letter,
and can be letters, numbers, special characters (only #, @, or $), or a hyphen (-). All lower-
case characters will be converted and stored as upper-case characters.
The following is data set name, which will be used as an example in this tutorial.
RMUI001.DATA.ACCOUNTS
5.1.3 High-Level and Low Level-Qualifiers
A z/FS data set name can contain several
SEGMENT;
each segment is separated by a
period. The first segment is the
High-Level-Qualifier, or HLQ
. Though the HLQ appears
similar to your logon userid, e.g.,
RMUI001
, this example specifies your private user catalog
name. The HLQ is somewhat similar to your My Documents folder in Windows, which is also
used to find your data files. In this example, RMUI001 is the data set High-Level-Qualifier, or
catalog name. The segments that appear to the right of HLQ are called
Low-Level-Qualifiers
(LLQ).
It is recommended that the LLQ be descriptive of the content stored in the file. The
LLQ of the previous example is
ACCOUNTS.
Page 47 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
May you access data sets outside your HLQ or your Window's personal folder My
Documents? As long has you have been authorized to access files or folders outside your
personal folder or catalog, you may access anything.
5.2 What is a data set?
A Data Set is a z/OS's file system name for a file
.
Windows, UNIX and Linux (Mac OS) stores data
and programs on a storage device as a file. IBM stores data and programs on a storage device as a
data set.
The Data Set List Utility will display your datasets in a similar manner that Windows
Explorer will display your files. Windows describes a Word document as a file. On the other hand,
z/OS would describe any document as a data set or data set member
.
In z/OS terminology one
would edit or browse a data set. Windows would describe this process as opening a file.
5.3 Managing the Content of a File or Data set
Windows files and z/OS data sets are simple storage containers
that may store
unstructured information (bytes) or structured information (records).
The file system does not
understand the details of the content of a file or data set. The applications, e.g., Word, a
COBOL Program, etc. that stores the data or content in the file container will understand the
structure of the content, not the operating system or file system.
Records contain structured information
such as the employee name, address, and phone
number of an employee information file. Files and z/OS records may also contain
unstructured information
as a collection or bytes (characters); such as graphic, audio and
video files.
Most Windows file extensions are published on the Internet and are well-known.
For
example, the .DOCX file extension indicates that the Word application understands the
content of the file; whereas, the .XLSX file extension indicates that the EXCEL application
understands the content of the file.
Page 48 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
5.4 Dataset Properties
5.4.1 Property Frame
Right-click on your RMUXXXX.COBOL Data Set, where XXXX will be you student number.
Select Properties. The Properties Frame will appear in the lower-right corner of your Window,
replacing the Console Frame.
It should appear similar to the following example.
The information provided by the properties of a mainframe data set is similar to the
information provided by the properties of a Windows or Linux file. (To be presented shortly.)
Notice that a vertical scroll bar appears on the right edge of Properties Frame.
Of course,
this means that you may scroll, or page down to see more properties.
Page 49 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
5.4.2 Switching to Full Screen Size Frames and Restoring Frame Size
As an alternative, you can drag a frame boundary to resize the Property Frame, a.k.a., Yuk.
Or you can
double left-click
on the Console – Properties – Contents Frame Blue Menu Bar
ro
switch to a full-frame view of the properties
. For example
Or you can
double left-click
on the Console – Properties – Contents Blue Frame Menu Bar
again to
restore your frame size back to the original size.
You may double left-click on "any" Frame Blue Menu Bar to switch between Full-Size
and Original Size
.
Page 50 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
5.4.3 Data Set Organization and Data Set Name Type Properties
The manner in which z/OS structures the internal content stored in a data set is called the
data set
organization, or DSORG
. JCL uses the attribute DSORG to specify the data set organization.
There
are three popular types of z/OS data set organizations: Sequential Data Sets (PS organization),
Partitioned Data Set (PO organization), or Partitioned Data Set –Extended (PO-E organization).
A sequential data set
is a simple collection of records stored in the order that they are written
and then read from beginning to end. A Physical Sequential Dataset is a simple data set
structure. Over the years, PS file have been replaced by a VSAM Entry-Sequenced Data Set
(ESDS). Your practice data sets do not contain any VSAM data sets.
Records contain structured information such as the employee name, address, and
phone number of an employee information file
.
z/OS’s sequential data sets will be
displayed with a label of
PS
(physical sequential) in the Topaz Organization property or under
the DSORG column of ISPF DSLIST. The Dataset Name Type will be blank.
Topaz Host
Explorer will display a simple file icon for a sequential Partitioned Dataset
A Partitioned Data Set (PO organization)
contains a directory structure and sequential
members.
In a Windows or Linux file System, one generally organizes files by using folders of
directories. The z File System organizes related members (comparable to a file) together in a
partition data set. From an organizational point of view a Windows folder is similar to a
Partitioned dataset (PDS), except a PDS cannot contain a subfolder or PDS.
Folders contain
many related files. A PDS contains many related members. z/OS partition data sets will be
displayed with a label of
PO
(partitioned organization) under the Topaz Organization property
under the
DSORG column of ISPF DSLIST.
The Dataset Name Type will be blank.
Topaz
Host Explorer will display a folder icon for a Partitioned Dataset
A Partitioned Data Set – Extended (PO-E organization)
is a modern version of the older
partitioned dataset organization. To avoid confusion, the PO-E organization is also called a
LIBRARY
.
While both PO and PO-E organizations are both similar to Windows and Linux subdirectories
or folders, the older PO organization requires extra maintenance. For example, when one
deleted a member in older partitioned data set organization the freed space could not be
reclaimed or re-used.
Hence, Partitioned Data Set – Extended (PO-E organization) is much
more popular. A z/OS partition data set – extended may also be e displayed with a label of
PO-
E
under the Topaz Organization property under the
DSORG column of ISPF DSLIST. The
Dataset Name Type will contain the name LIBRARY.
Topaz Host Explorer will display a
folder icon for a Partitioned Dataset
Page 51 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
5.4.4 Dataset Organization and DSORG is conceptually similar to a Window’s file type.
When using the Window’s file system NTFSv5 a file will be automatically created, assigned a file
name and file type when you SAVE it for the first time. During this initial “Saving” process a storage
location in a volume and folder is selected. Storage space must first be allocated (reserved) for the file
container, then the data content is stored in the file container. For example, when a Word document is
stored as a file type and extension of .DOCX, which will use sequential organization and the rules to
store the internal structure of a Word document.
Comparing the concept of a Word document type to
z/OS, a DOCX file would be similar to the z/OS concept of Data Set Organization.
5.4.5 Allocation Extents, Units, Types, and First Extent Unit
The minimum size of data allocation under z/OS is 1 track, or 56,664 bytes.
This means that a
Physical Sequential file which contained three 80 byte records will contain 240 bytes, but occupy
56,664 which is very wasteful. It also mean that two datasets cannot exist on the same track.
A Partitioned Dataset (PDS) solves this problem by combining a lot of small files into one large
container. The individual files are stored as members within the PDS. Each member must have a
unique 1-8 character name and the members are located by an index that is called a PDS directory.
PDS files have DSORG=PO and DSTYPE=PDS.
5.4.6 Used and Maximum Directory Blocks Property
Both types of Partitioned Data sets contain structures.
A PDS Member Storage area and a Directory
area. To review,
a PDS is similar to a Windows or Linux subdirectory/subfolder, and a member
is similar to a file store in the subdirectory/subfolder.
A previous discussion, stated that the minimum amount of storage space that can be allocated to a
data sets is 56,664 bytes, or a track. Assume that a programmer wants to store a COBOL or C
program that requires approximately 3,000 bytes of storage. If you save this COBOL or C program,
how space did you use up? The answer is 56,664 bytes, but you only required 3,000 bytes! You
wasted disk space. (Windows and Linux may also waste disk space.)
When you code and save COBOL program, you will save a Partitioned Data Set
member,
or program.
Your COBOL Program A may require 300 bytes of storage. Your COBOL Program B may require 400
bytes of storage. And your COBOL Program F may require 3000 bytes of storage, and you still have a
little space left of 56,664 to store more COBOL programs. The bottom line is that you code a COBOL
program, but you save a PDS member.
A PDS member is composed of records, similar to a row in a database table. All members a PDS
must have the same Logical Record Length. The most popular Logical Record Length Property for a
PDS than contains COBOL, C, ReXX, JCL or Java program source code is 80 characters. Historically,
mainframe programs was coded on a fixed length, 80-column punch card. While the days of the 80
column punch card are gone, legacy 80-column COBOL, JCL and other program code is still being
used every day. To maintain compatibility with the billions-and billions of dollars invested in legacy
code. 80-column program rules are still popular.
Here comes the challenge. The file system only knows the beginning track of a partition data set or
subdirectory. The file system does not know which location of programs, Word documents and so
forth be stored in the partitioned data set of subdirectory.
Page 52 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
How does the PDS then keep track of its members? The members of a PDS can be scattered
anywhere in the PDS storage space.
The z/OS file system can consult the
PDS directory
information to find the names and location of the members stored within the partitioned data
set.
Similar to a library book index, the index contains a list of keywords you are looking for and the page
no. where the keywords may be found.
Thus, the directory maintains the list of member names and
storage pointers to the actual physical allocation
a stored PDS member.
In this example, the Maximum Directory Blocks specifies NOLIMIT.
You may enjoy that your
personal laptop or note book you may not ever run out of disk storage. On the other hand,
System z mainframe storage is expensive and the amount of storage space that a user or a
business organization, must budget there share on the expense.
An important question may be, which is the best operating system?
It depends.
If a user or a business organization unit must budget, and pay for the storage costs, would you
recommend to store email messages, graphic files videos, and word processing documents in the
mainframe storage system?
As stated previously, System z mainframes will be best to support 1) large-scale, 2) mission-critical,
and 3) secured transaction and real time data analysis processing.
Other operating system platforms,
e.g., Windows, Linux and UNIX, may be more cost effective for non-priority workloads.
Page 53 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
8.4.5.1 Example of Topaz RMU0191XXX.COBOL Partitioned Dataset and Members
The
Number of Members Property
for RMUXXXX.COBOL is 12
RMU0191.COBOL is an example of a Partitioned Dataset (PDS) and Topaz use a folder icon to
identify a z/OS PDS. Click on the Partitioned dataset named RMU0191.COBOL in Host Explorer, the
folder will open, and the names of the PDS's members will be displayed. CBL0001 is a partitioned
dataset member.
8.4.5.2 Editing RMU0191.COBOL(CBL0001)
PDS COBOL Program Member
Right-click on the Partitioned Data Set Member name, such as, RMU0191.COBOL. Select the
Edit mode. The COBOL Program member named RMU0191.COBOL(CBL0001) will be opened in
the Edit mode.
Page 54 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
8.4.5.3 Browsing RMU0191.COBOL(CBL0001)
PDS COBOL Program Member
Right-click on the Partitioned Data Set Member name, such as, RMU0191.COBOL. Select the
Browse mode. The COBOL Program member named RMU0191.COBOL(CBL0001) will be
opened in the Browse Mode.
Only one user can edit a data set or data set member at a time
. If you change the dataset or
member, you will be prompted to confirm that you want to change the dataset or member.
The
Browse mode
is useful to prevent accidental changes to a data set or a member.
If you are
member of a team of programmers, team members or your instructor may browse a shared dataset or
member, while another team member or student edits the dataset or member. To Edit, Browse, Copy,
or Delete a data set or member, a User ID must be authorized. The RMU IBM System z mainframe
does not authorize students to access other student's catalogs.
Page 55 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
5.4.7 Logical Record Length Property
However, when a file contains data to be process by a program, e.g., a customer or employee record,
the Logical Record Length property may be any number of bytes or columns that a company's
business requirements require.
For example, to code a COBOL program that will process a customer
sequential data set records, your instructor will inform you of the Logical Record Length of a record,
e.g., 170, and specifications for the layout of customer's record data, e.g., name, street, city, state,
etc.
Page 56 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
5.5.5 Questions – Dataset Properties
Use a graphical snipping tool to document the Dataset Organization of your cataloged
Data sets below
è
.
It is required that your HLQ is displayed.
1. What is function of z System Dataset Organization (DSORG)? Answer:
The manner in which z/OS structures the internal content stored in a data set is called the data set
organization, or DSORG. JCL uses the attribute DSORG to specify the data set organization. It
organizes the content so that the information can be found easily and efficiently.
2. List the three major types of z System Dataset Organizations. Answer:
Sequential data set
Partitioned data set
Partitioned data set-extended
3. Which Windows or Linux file system concept is similar to the concept of z/OS Data set Organization
(DSORG)?
Answer:
Windows folders
4. Explain the structure and practical use of a sequential dataset.
Answer:
A sequential data set is a simple collection of records stored in the order that they are written and then
read from beginning to end. An example would be writing down employee information such as
employee id, address, phone number etc...
5. Explain the structure of a z/OS partitioned data set. Answer:
A Partitioned Data Set (PO organization) contains a directory structure and sequential members.
Page 57 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
6. Explain the main advantage of using a z/OS partitioned data set. Answer:
The partitioned data set can have information be found much faster than in windows file system.
7. What is the purpose of a z/OS partitioned data set MEMBER? Answer:
They are the files and are clumped together based on their relationship to each other to make finding
the related files faster.
8. Which Windows or Linux file system concept is similar to concept of a z/OS partitioned data set?
Answer:
Windows folder
9. List the advantages of z/OS Partitioned Dataset – Extended (PO-E or Library) Organization as
compared to the older Partitioned Dataset (PO) Organization. Answer:
More modern
Does not require as much maintenance
Allows for freed space to be reclaimed or reused
Page 58 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
5.5 Physical Storage Devices, Volumes, Catalogs, and Data Sets
5.5.1 Identifying Storage Devices
All file systems conceptually start with a physical disk and a volume.
In older and large-
scaled storage systems the physical storage unit was the first method to store, organize and
separate data by function. Every file system has structure that organizes files and improves
the efficiency to find and locate files within and between physical storage devices. Most
modern hard disk or solid state drives (DASD) may individually store billions of files and the
files system may organize files across thousands of distributed hard drives. I can't remember
which drawer I put (stored) my socks.
Can you imagine the complexity of organizing files in
today's modern file systems?
5.5.2 Volume Serial and VTOCs (Volume Table of Contents)
Each physical disk may have more than one disk volume.
A z/OS volume is a subdivision of space on
a Direct Access Storage Device (DASD), or a physical disk.
Each Volume will be assigned a Volume name or Volume Serial (identifier).
Each Volume will also have a VTOC (Volume table of contents), which stores a row for every
data set within the volume. Every row referred as file control block has an array of pointers to
extents.
Each File Control Block (Dataset) will be allocated units of storage called extents.
The amount of physical storage space is frequently measured in cylinders which may or may
not be spread over multiple DASDs (disk drives).
A Volume Table of Contents will store
Page 59 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
datasets which may be owned by multiple users, but RACF will secure each owner's
data sets.
VTOCs and root directories will store information about data sets and files within its
physical storage boundaries,
this system may get very complicated when there are
thousands of VTOCs or volumes.
All z/OS data sets are physically stored in a DASD (disk)
volume. The maximum storage space allocated to a DASD volume is limited and cannot be
dynamically increased.
5.4.3 z/OS User Catalogs
A
User Catalog
, e.g., RMUI001, is a logical structure which makes it easier to organize,
group, and secure data sets stored
across one or more DASD (disk) volumes.
A User
Catalog has NOTHING to do with physical DASD devices or in which volumes your
data sets are stored.
Every data set must follow the rules for naming a data set.
The z/OS file system uses a
system to organize files by using name segments or "qualified" data set name.
Consider the
following data set name: RMUI001.COBOL.ASSIGN1 This data set name example has three
segments,
each separated by a period.
The leftmost segment name, e.g., RMUI001, is
called the high-level qualifier (HLQ) - the most important.
The rightmost segment name, e.g.,
ASSIGN1, is called the lowest-level qualifier (LLQ)
A benefit of user catalogs is to organize data sets by owner.
In this example, all
cataloged data sets are displayed no matter in which volume they are stored. For a Fortune
500 company these cataloged data sets could be physically stored on DASD devices and
volumes located across the world.
Page 60 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
6.0 Logout Direction for Topaz Workbench
Clicking on the Topaz Workbench Window's X icon located in the upper-right hand corner of
your Topaz Window will only exit the Windows Application and will not logout of the
mainframe.
While a student may not be executing applications a background job, the best and safest
method to logout from RMU IBM Mainframe and then exit Topaz.
Step1
. Right-click on the Host Connection Interface (HCI), e.g., RMU, then Select Logout from the
menu.
You will be warned if you have not saved your edited datasets, or if there is no executing jobs.
Step 2.
[Optional]
Repeat Step 1 for any other HCI, which not be normal to be accessing more than
one mainframe in this class.
Step 3.
Then Select
Exit.
Page 61 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7.0 Legacy Text–based TN3270 clients and Application and System tools.
7.1 Summary of System z TSO Login Process
When one connects to a z/OS mainframe using the 3270-emulator
client, one will connect to TSO to LOGIN. The TSO LOGIN process.
The TCP/IP network protocol is used to connect or 3270-client to our
z/OS mainframe.
The Host IP address, i.e.,
192.86.32.17
, identities our z/OS Mainframe.
The Host Port Number, i.e.,
623
, identifies a subsystem, a daemon or service. In this example, Port
number 623 identifies the port number, which is listened by TSO.
Your port number or the Master the
Mainframe port number may be different
1.
Connect using a 3270-emulator client to IP Address 192.86.32.17 and Port 623 (Make
sure that your firewall does not block this port.)
2.
Authenticate to RACF – the IBM Security Server
3.
Allocate memory to your personal copy of the TSO session.
4.
Start ISPF, a menu-based user interface
Page 62 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Page 63 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
8.0 z/OS System Information
Text Link - How to get system Information of a Mainframe?
http://www.longpelaexpertise.com/ezine/InfoFromzOS.php
Many may familiar with Windows administration tools, such as Device Manager, Task Manager,
Control Panel System, Network Connections, Disk Management, Event Viewer, MSINFO and the
Command Prompt. These system programming tools will access and configure system administration
information stored in the Windows Registry
Likewise, Linux stores current system status information in special virtual directory named /proc,
including its cpus, disks, kernel, processes, and other configuration parameters. Linux also support a
large number of specialized command line and GUI system administration tools, such as, ps, top
vmstat, w, free, iostat, sar, and pmap.
The list of operating system users include system programmers, application programmers, and
system users.
z/OS system programmers and administration require the same information as
Windows and Linux system administrators.
The following assignment requirements introduces the
system tools that a z/OS systems or application programmer to retrieve information about z/OS
hardware devices, operating system, middleware subsystems, logon users, job management
(process management), and command line interfaces (TSO and z/OS consoles).
8.1 System Programmers and Application Programmers
8.1.1 System Programmers
Text Link – Who is a System Programmer?
https://www.ibm.com/support/knowledgecenter/zosbasics/com.ibm.zos.zmainframe/zconc_sysprogrol
e.htm
System Programmers
are important IT roles who installs or upgrades operating systems (z/OS,
Linux, etc.) and middleware, customizes, and maintains the operating system and middleware that run
on the system.
Middleware is a software "layer" between the operating system and the end user or end user
applications.
Middleware software provides functions not provided by the operating system, such as
the DB2 database management system, CICS application server, or RACF security server.
All students should be familiar to access system administration for Windows, Linux, or z/OS.
Topaz Workbench makes that learning process easier
ALL OPERATING SYSTEMS provide the same operating system functions. Hence, all
operating systems will provide basic operating system information.
Student must learn more
details concerning the status of Windows, Linux, or z/OS operating systems.
This hands-on tutorial will reinforce the theory concepts leaned in other assignment
requirements. The last time I checked, no company was hiring CIS students for their
experience in Windows or Mac gaming, or social networking.
Page 64 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Other system programmer roles include:
Coding, debugging and Submitting
JCL
programs
Automating system administration by coding and executing and
ReXX or CLIST
scripts
Integration-testing the new products with existing applications and user procedures
System and middleware performance tuning to meet required levels of service and to minimize
cooperating system costs.
Debugging and correcting operating system, middleware, or hardware problems.
8.1.2 Application Programmers
Text Link - Who are the application designers and programmers?
https://www.ibm.com/support/knowledgecenter/zosbasics/com.ibm.zos.zmainframe/zconc_applprogrol
e.htm
Based on requirements gathered from business analysts and end users, the
application designer
role creates design specifications from which the programmer constructs an application.
An
application programmer
writes or updates application program code using program languages such
as COBOL, Java, PL/I, C/C++, or assembly language.
The application development process includes
several iterations of code changes and compilation, application builds, and unit testing.
8.1.3 JCL (Job Control Language)
JCL (Job Control Language) is the language that is required to create batch jobs to execute an
application program or start a z/OS subsystem
. Batch jobs run in the background and cannot
communicate interactively with a user or with a terminal. JCL is used for 1) identify and schedule a
JOB, 2) specify the system or application programs to be executed, and 3) to specify the data sets,
data set properties and other system resources required for a job.
JCL is not a programming language.
The TSO command SUBMIT will be used to execute a JCL programs in the background.
A z/OS User IDcan execute multiple JCL jobs in the background at one time.
Sample JCL Program
Page 65 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
8.1.4 TSO Commands and TSO Command Console
TS0 is an interactive command line user interface
similar to the Windows, Linux and UNIX
command prompts.
TSO commands permit system programmers to interactively execute many
system administration commands, one TSO command at a time.
TSO commands may be executed in
the batch mode by inserting TSO commands into a JCL program, ReXX EXEC or CLIST scripts to
automate system administration tasks.
Users may use TSO LOGON to be authenticated and will
switch to the ISPF menu interface.
Two popular methods to execute TSO commands are 1) TSO Command Prompt,
2) ISPF TSO
Command Shell, and 3) Topaz TSO
command console.
1.1.4.1 TSO Command Prompt
The TSO command prompt is READY. The TSO LISTCAT command, which be used to display your
user catalog will be executed.
The Topaz Command Console prompt is a > (greater than sign). The TSO LISTCAT command, which
be used to display your user catalog will be executed.
8.1.4.2 ISPF TSO Command Shell
The ISPF Command prompt is =
è
. The TSO LISTCAT command, which be used to display your user
catalog will be executed.
Page 66 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
8.1.4.3 Topaz TSO Commands Console and TSO COMMAND LIST
The following example demonstrates the use TSO HELP command will display a summary of TSO
Commands.
You will find the following very useful!
HELP LISTCAT
Page 67 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
8.1.5 MVS / zOS Commands and z/OS Command Console
Text Link - MVS system commands reference
https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.3.0/com.ibm.zos.v2r3.ieag100/cmdref.
htm
TSO commands are designed to manage the z/OS data sets, application development and JCL
execution (SUBMIT).
z/OS or MVS commands are designed to manage
and display the status of the z/OS (MVS)
operating system, subsystems, resources, and hardware.
z/OS interactive commands may be executed at the Topaz z/OS Console Prompt or SDSF
1.1.5.1 z/OS Console Prompt
The z/OS console prompt is z/OS> to distinguish the prompt from the TS0 command prompt. For
example, the following console displays CPU hardware information.
8.1.5.2 SDSF Command Line
There is no help for the z/OS console commands.
Page 68 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
8.1.6 CLIST, or Command List
CLIST, or Command List, is an interpreted programming language that allows you to develop
automated TSO/E commands and/or ISPF processes. These programs will run in the foreground,
which you can only execute one CLIST at a time. CLIST is very rarely used in modern shops. While
CLISTs are similar to Windows batch programs, Power Shell or Linux scripts, ReXX EXEC scripts are
very powerful to automat system administration commands.
8.1.7 REXX
Video - Mainframe REXX Intro - Mainframe REXX Tutorial - Part 1
https://www.youtube.com/watch?v=Uq0CWQDK8rc
Text Link - Hello world in REXX on IBM z/OS
https://www.youtube.com/watch?v=BZmXkpXm_sw
Text Link - Learning the REXX Language
https://www.ibm.com/support/knowledgecenter/SSLTBW_2.2.0/com.ibm.zos.v2r2.ikjc300/part1.htm
Text Link - Rexx – Overview
https://www.tutorialspoint.com/rexx/rexx_overview.htm
REXX is a very powerful, easy to code, and interpreted or compiled program language that can be
used to automate many system administration tasks.
The following displays a REXX script to
generate 50 student userids by applying REXX variables, an IF conditional statement and a DO loop.
Page 69 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
9.0 Using the Topaz z/OS Command Console
z/OS or MVS commands are designed to manage
and display the status of the z/OS (MVS)
operating system, subsystems, hardware resources, and hardware.
9.1 Accessing the Topaz z/OS Console
Text Link - How to Get System Information without being a z/OS Systems Programmer
http://www.longpelaexpertise.com/ezine/InfoFromzOS.php
The z/OS Console may be use the DISPLAY command, or D abbreviation, to document hardware and
system status information.
The Topaz Console View is displayed by default displayed at the
right-bottom of the Topaz Workbench window.
If the Topaz Console View, the easiest method to reset Topaz's default four-frame view is to
click on the Host Explorer Icon, displayed in the upper-right corner of the Topaz Workbench
Window.
Then select RESET option of the drop-down menu.
.
9
.1.1.1 Select the z/OS Console by clicking on the down-arrow
In the upper right-hand corner of the Compuware Console View there are several icons displayed.
Click on the down arrow and select the z/OS Console.
The z/OS command prompt changes to
z/OS
>
.
You may see a Connect Prompt, Simply click
Connect to connect to TSO. In a previous section, the Topaz sever is assigned to a different port
number than TSO. The Connect action finds the port number of TSO.
Page 70 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
The Console, Properties, Contents, JES Explorer, Event History tools are combined into one Topaz
Workbench View, but will provide different services.
9
.1.1.2 Clear your z/OS Console
While executing command z/OS Console or TSO Commands Console, the student may accidentally
mistype commands, or pervious commands are not erased. Before you document the execution z/OS
Console command, it is best to clear your z/OS console.
Located at the upper right-hand corner of the Compuware Console View there are several icons
displayed. Click on the left-most document x icon to clear your z/OS Console View.
9.2 CPU Information
9.2.1 Document z/OS CPU Information
1. Type DISPLAY M=CPU at the z/OS> prompt.
2. Press Enter to execute. The system information will appear similar to the following.
3. This system information is complete. Double left-click on the Console Header to switch to the Full
Screen view to document the command and the complete system report.
If your z/OS command does not execute (no command response is displayed), your Topaz
client may have logoff in the background even the Topaz Workbench is still displayed on your
Windows computer,
Simply Logout of the mainframe and Login again.
Page 71 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Z/OS operating system will display the following information somewhat similar to the following:
Hidden in this output is the model number: in this case 2094-722 (a System z9 EC). The following
table shows processor models, and what they mean.
Mainframe model IDs and Numbers
2064-xxx = z Series 900
2066-xxx = z Series 800
2084-xxx = z Series 990
2086-xxx = z Series 890
2094-xxx = System z9 EC
2096-xxx = System z9 BC
2097-xxx = System z10 EC
2098-xxx = System z10 BC
2817-xxx = zEnterprise 196
1. Use the Snipping Tool to document the z/OS CPU information below =
è
Page 72 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
2. From the CPU information listed above, what is the serial number of z/OS CPU that you are using?
Your answer is
è
06E2872964
3. From the CPU information listed above, what is the model number of your z System mainframe?
Your answer is
è
NC9
4. List the MVS command that may be used to provide the system programmer CPU information.
Answer:
DISPLAY
9.2.2 Document Windows CPU Information
In Windows, one can review the
Window's System Properties under the Control Panel
to
determine processor and other information.
For example, my laptop provides the following system
information concerning the processor type, processor speed and the amount of installed RAM.
Page 73 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
One can use the Windows command
WMIC
to display the processor serial number, which is used to
uniquely identity your processor and is used for auditing and licensing purposes.
The processor serial number and type of computer is often used to automatically to identify the name
of a Windows computer.
Windows Management Instrumentation (WMI)
is a command line utility used for management data
and operations on Windows-based operating systems.
WMIC extends WMI for operation from
several command-line interfaces and through batch scripts. For more information concerning the
WMIC command interface consult the following links. Windows Power shell to a preferred
replacement for WMIC, but is beyond the scope of this assignment.
Text Link- WMIC - Take Command-line Control over WMI
https://msdn.microsoft.com/en-us/library/bb742610.aspx
Video - Windows Management Instrumentation Tutorial #1 Introduction
https://www.youtube.com/watch?v=V4vdwAD3aJ0
Video - WMIC - Command Line
https://www.youtube.com/watch?v=vrmKepZZn1c
Windows will permit you to run the
SYSTEMINFO
command at the command prompt to display more
system information.
For example:
Notice the detailed system information. Take notice of the Windows hotfix(s) or operating system patches
applied to this example. e.g., KB2764913, KB2764916, etc.
This are the updates installed on our
mainframe using
SMP/E that
we will discuss later in the course. Windows Update got its start
decades after SMP/E was introduced.
Page 74 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
1. Use the Snipping Tool to document Windows CPU information using System
Properties below =
è
2. Use the Snipping Tool to document Windows CPU information using the
SYSTEMNFO command below =
è
3. List several important specific examples of system information that is provided by this Windows
WMIC
command. Answer:
The name of the computer, name of the processor and some general information such as amount of
cores and processing speed, installed ram, device id, product id, and system type.
4.
List several important specific examples of system information that is provided by this Windows
SYSINFO
command. Answer:
Processor(s), bios version, windows directory, system directory, boot device, system locale, and input
locale.
Page 75 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
9.2.3 Questions - Linux CPU information- lscpu, /proc/cpuinfo and lstopo (hwloc)
The Linux commands lscpu, cat /proc/cpuinfo and lstopo (hwloc) can report detailed information about
the cpu cores/processing units.
For example, the most frequently used Linux command to display system information about the
processor is
cat /proc/cpuinfo
.
The Linux cat command displays the content of a file. The Linux
/proc subdirectory is a virtual directory, which contains information about the system hardware and
functionality. The Linux /proc subdirectory does not really exist. During the Linux boot process, this
virtual directory is created. The system information stored in RAM contains many of the same
information that you can find in the Windows Device Manager. The following is a partial example of
the information of display by cat /proc/cpuinfo
Virtual files such as /
proc/interrupts, /proc/meminfo, /proc/mounts, and /proc/partitions
provide
an up-to-the-moment glimpse of the system's hardware. Others, like the /proc/filesystems file and
the /proc/sys/ directory provide system configuration information and interfaces.
1. List three examples of three Linux commands that may be used to provide the system programmer
CPU information.
Answer:
lscpu, cat /proc/cpuinfo, and lstopo (hwloc).
Page 76 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
9.3 Virtual Memory Paging Information
9.3.1 Virtual Memory Review
Video - Virtual Storage and Address Spaces
http://www.redbooks.ibm.com/courses/CRSE0304/CRSE0304_L21.mp4
In a previous assignment, virtual memory and memory pages were discussed. When the real system
memory (frames) is full, excess pages of a program or subsystems are temporarily stored as auxiliary
storage or as a slot. The role of the virtual memory is to serve as table that determines the current
location of the page, i.e., in real memory or on disk.
The maximum amount of virtual memory
available is dependent on the amount of disk storage dedicated to slots and the amount of
physical system memory.
9.3.2 Document z/OS Virtual Memory
1. The z/OS Console displays the execution results from the previous assignment requirement, Clear
the z/OS Console by clicking on Clear Console icon
Located at the upper right-hand corner of the Compuware Console View there are several icons
displayed. Click on the left-most document x icon to clear your z/OS Console View.
.
2. Type
DISPLAY ASM
, or
D ASM
at the z/OS> prompt.
3. Press Enter to execute.
If your z/OS command does not execute (no command response is displayed), your Topaz
client may have logoff in the background even the Topaz Workbench is still displayed on your
Windows computer,
Simply Logout of the mainframe and Login again.
Page 77 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Use the Snipping Tool to document your page data set names and utilization
information below =
è
Your Virtual memory display may appear similar to the following.
The first allocated slot has a data set named
PAGE.SOW1. PLPA
, which is VSAM Linear data set that
is your systems SWAP file.
Let's review the data set naming conventions presented in a previous assignment requirement as
applied to the data set named
PAGE.SOW1. PLPA
The first segment named
PAGE
is the high-level qualifier which may be user catalog name (a user
directory) or a system catalog name that represent the z/OS BCP (kernel) or z/OS subsystem.
Obviously, the z/OS Virtual memory operation system owns the PAGE high level qualifier.
The second segment named
SOW1
is System ID (name) of the z/OS mainframe.
Every z/OS,
Windows or Linux computer must have a unique name to identify an operating system in a cloud
(sysplex) or managed network system, such as tz/OS System ID: SOW1.
Consider the example of a credit card processing company creates a Sysplex of four z/OS
virtual machines to supports credit card processing.
A z/OS Sysplex refers to a cluster of
independent instances of the z/OS operating system that shares processing tasks.
Using a unique System ID, such as SOW1, SOW2, SOW3, or SOW4 is important to manage
virtual memory operating systems and page storage
Each system may have separate page
files (slot data sets) or shared separate page files (slot data sets)
The third segment named
PLPA
identifies a unique page (slot data set) which is stored on DEVICE
0CED (notice the hexadecimal number) and it is 81% full.
Every virtual memory operating system
Page 78 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
uses a default name for page file to support the z/OS operating system and subsystems z/OS uses
PLPA and COMMON1.
The credit card processing applications also require swap file storage (slots) space, such as
LOCALD to LOCALJ. Currently, these swap data sets are unused (FULL 0%)
The system
programmer must balance the costs of allocating storage to unused data sets to
running out of slots, which may cause credit card processing to stop during peak
demand loads.
9.3.3 Windows Page information – Performance Options/Virtual Memory
The name of the paging file in Windows is a hidden file named
PAGEFILE.SYS
.
One can 1)
determine amount of storage space that slots are currently using PAGEFILE.SYS, 2) change the
amount of disk space allocated to PAGEFILE.SYS, or 3) change the location of PAGEFILE.SYS.
Since the demonstration, most Window's desktop computers supports only one disk, the Drive C: is
greyed out. Other options are prevented by Windows security settings. [Having too little space
allocated to the paging file will cause Windows to be unable to execute more programs even though
you have enough disk space.]
Students and faculty are often prevented to view or change virtual memory settings. The following
Windows 7 display is very similar to Windows 10 and Windows Sever
Windows support a similar host or z/OS System ID and virtual memory swap (slot files) name. You may find
those name using System Information or the systeminfo command.
Page 79 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Page 80 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
9.3.4 Linux Page information – swapon and free commands
The Linux
swapon
command will display the location and amount of page file space used to store
slots
The Linux
free
command will display the both the real (mem) and swap space. If a large percentage
of the swap space is used, then one of two actions may be warranted: either you may want to add an
additional swap disk to increase the available swap space, or you may want to add additional physical
memory to the system.
9.4.4 Questions
- z/OS Virtual Memory
4A
In reference to virtual memory operating systems, what is a Frame? Your answer is
è
A frame is a small fragment of main memory when paging occurs.
4B. In reference to virtual memory operating systems, what is a Page? Your answer is
è
A page is a fixed-length contiguous block of virtual memory that is described by a single entry in the
page table. It is the smallest unit of data for memory management in a virtual memory operating
system.
4C. In reference to virtual memory operating systems, what is a Slot? Your answer is
è
It is the physical connecting spot for additional virtual memory to be added.
Page 81 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
5. How does one display Windows Page file information? Your answer is
è
The page file information can be displayed by going through the control panel and navigating to the
page file section.
6. How does one display Linux Memory and page file information? Your answer is
è
Using the code “
dd if=/dev/mem” in the command line allows the user to view the contents of the
memory.
9.5 Logon User and JOB information.
9.5.1 Document Users - D TS,ALL
The z/OS console may be used to number of logged-on time-sharing users and active batch jobs.
Topaz users are not considered a TSO user and their owner names will not be displayed.
1. The z/OS Console displays the execution results from the previous assignment requirement, Clear
the z/OS Console by clicking on Clear Console icon
Located at the upper right-hand corner of the Compuware Console View there are several icons
displayed. Click on the left-most document x icon to clear your z/OS Console View.
.
2. Type
DISPLAY TS,ALL
, or
D TS,ALL
at the z/OS> prompt.
z/OS TSO , and most other command line operating systems require
At least one space following the command, e.g., DISPLAY or D
NO spaces between the command parameters.
TS,ALL is acceptable.
TS,
ALL is not
acceptable.
A command parameter is information to control how the command DISPLAY will execute. In this
example, the parameter ALL means display ALL logon USERS
3. Press Enter to execute.
Page 82 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
If your z/OS command does not execute (no command response is displayed), your Topaz
client may have logoff in the background even the Topaz Workbench is still displayed on your
Windows computer,
Simply Logout of the mainframe and Login again.
Use the Snipping Tool to document execution of DISPLAY command (even if no TSO
users are logon) below =
è
10.0 Logout Direction for Topaz Workbench
While clicking on the Topaz Workbench Window's X icon located in the upper-right hand
corner of your Topaz Window, this will only exit the Windows Application and will not logout of
the mainframe.
While a student may not be executing applications a background job, the best and
safest method to logout from RMU IBM Mainframe and then exit Topaz.
Step1
. Right-click on the Host Connection Interface (HCI), e.g., RMU, then Select Logout from the
menu.
You will be warned if you have not saved your edited datasets, or if there is no executing jobs.
Step 2.
[Optional]
Repeat Step 1 for any other HCI, which not be normal to be accessing more than
one mainframe in this class.
Step 3.
Then Select
Exit.
Page 83 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Page 84 of 84
ASSIGNMENT 2 TOPAZ HANDS-ON - PART 1 LOGIN (SPRING 2022)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Recommended textbooks for you
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage

Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L

Microsoft Visual C#
Computer Science
ISBN:9781337102100
Author:Joyce, Farrell.
Publisher:Cengage Learning,

New Perspectives on HTML5, CSS3, and JavaScript
Computer Science
ISBN:9781305503922
Author:Patrick M. Carey
Publisher:Cengage Learning
Recommended textbooks for you
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:CengageProgramming with Microsoft Visual Basic 2017Computer ScienceISBN:9781337102124Author:Diane ZakPublisher:Cengage LearningMicrosoft Windows 10 Comprehensive 2019Computer ScienceISBN:9780357392607Author:FREUNDPublisher:Cengage
- COMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE LMicrosoft Visual C#Computer ScienceISBN:9781337102100Author:Joyce, Farrell.Publisher:Cengage Learning,New Perspectives on HTML5, CSS3, and JavaScriptComputer ScienceISBN:9781305503922Author:Patrick M. CareyPublisher:Cengage Learning
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage

Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L

Microsoft Visual C#
Computer Science
ISBN:9781337102100
Author:Joyce, Farrell.
Publisher:Cengage Learning,

New Perspectives on HTML5, CSS3, and JavaScript
Computer Science
ISBN:9781305503922
Author:Patrick M. Carey
Publisher:Cengage Learning