Assignment | Computer Science homework help

Category: Computer Science

Assignment 2 Directions                                      Enter your Name Here =è XXXXXXXXXX

 

 

 

Assignment 2 is divided into two documents: Assignment 2 Theory (50% of the assignment grade) and Assignment 2 Hands-on (50% of the assignment grade).

 

 

 

Most requirements of this assignment will require you to research answers from your text book (you must read the text book to get some answers), from the Internet, or any other reasonable source. Many Internet sources, video links, text book and Blackboard presentation reference are provided to help you START your research. I have found that any single Internet source is very incomplete and the format may not conducive for most answers required. Some students do not READ the text book or review the Power Point presentation provided to you in Blackboard.   Some answers are only available from my power point presentations or update notes.

 

 

 

You may cut-and-paste answers whenever appropriate, you should take care to synthesize your answers to include multiple sources. I would be impressed that you consult a Google image search and paste and appropriate image to supplement your answer.

 

 

 

While I permit cut-and-paste, I do expect you use your own words so that you:

 

1. Organize the answer

 

2. Demonstrate that you have read what you have cut-and-pasted

 

3. Use any means that clearly displays that you have gained knowledge.

 

 

 

If you are LEARNING the subject matter there should be no problem. If you cut-and-paste and pray that it might answer the question you will be penalized. I hate irrelevant cut-and-paste BS.

 

 

 

The content of each student’s assignment may NOT be copied from any other current or past student enrolled in this class. Each assignment is to be prepared by ONE student.  Assignments are NOT a group-prepared assignment. Copying and pasting assignment any portion of the requirements from another student either enrolled in the current semester and or a previous semester is an act of plagiarism according to the RMU Academic Integrity Policy.  Any assignment found to be “too much alike” will be subject to a grade of zero for all parties concerned. Such an act constitutes a violation of the Robert Morris University Academic Integrity Policy.  The instructor reserves the right to review past assignments with students who are unable to prepare assignments during the hands-on portion of the exam to determine the student’s mastery of the assignment’s objectives. The assignment grade based upon the result of the instructor’s review.  On-ground tests may be used to compare the student’s knowledge to performance on assignments.  All acts of plagiarism will be submitted the RMU Academic Integrity Board to determine university-wide penalties.

 

 

 

You, however, may discuss assignment requirements, assist other students with debugging programs or other hands-on-requirements, tutor students, or provide other advice that may assist the students in acquiring knowledge. But the actual preparation of an individual assignment must have been completely prepared by the student who submitted the assignment. Sections of the assignments may be copied from the internet as per the individual assignment’s directions. Please contact the instructor if you need assistance interpreting this RMU Academic Integrity Policy.    

 

 

 

 

You are to enter all answers or Prtscrn requirements into this Word Document.  You are not permitted to submit any other document format, e.g., Wordpad, PDFs, etc. that is not based on this original Word document.  This document contains hidden internal markers and applications that will track the version of this assignment and your assignment progress.

 

 

 

You MUST submit the assignments using the Word document(s) provided you. You may not use any other word processor, except Microsoft Word. Do not use Open Office DOCX files.

 

 

 

When an instructor has possession of an electronic document it is very easy to detect plagiarism. Many instructors use Turnitin assignments, which is applicable to assignments that permit cut-and-paste as this assignment.  It is very easy to compare multiple copies of word documents (see link below).  Microsoft provides a variety of FREE anti-plagiarizing tools.  And there is a wide variety of tools that can analyze hidden information within a Word document (see sample link below).  Changing fonts, margins and spacing does not do it anymore.  Even when individuals try to artificially change content, a Word document contains hidden markers that may provide an audit trail to find previous authors and computer systems who have edited the document.

 

 

 

Comparing and merging Microsoft Word documents – http://support.microsoft.com/kb/306484

 

Compare documents side by side – http://office.microsoft.com/en-us/word-help/compare-documents-side-by-side-HA010102251.aspx

 

Fight crime. Unravel incidents… one byte at a time.

 

http://computer-forensics.sans.org/community/papers/gcfa/computer-forensics-investigation-image-file-analysis_170

 

 

 

Why am I providing some of this detailed information? There are several reasons.

 

1)  The real world exists outside this class.  A student in this class must be aware of the dangers when organizations or individuals provide electronic copies to others, e.g., an email attachment.

 

2)  The objective of this assignment is to “introduce” minimal knowledge that is required in the real world. If you do not acquire this minimal knowledge, you will significantly harm your employment, income, promotion and retention potentials.  If you do not want to do the hard work, I can recommend a better alternative to plagiarism – get a new major or career plan.  Perhaps you can star in a reality TV show.

 

3) The majority of my students will exert the effort and submit excellent assignments.  I will use many of the previous tools as time permits to ensure that you do not steal their grade. I really don’t understand why a student would provide a student with a copy of their assignment when they are competing in the same job market. In my class both the original author and the plagiarizer will be punished.

 

 

 

If you do not have a copy of WORD, you may use VMWARE VIEW (available from the RMU website) to access a virtual lab computer which contains any software needed for this course.

 

http://www.rmu.edu/web/cms/departments-offices/administration-services/it/Pages/vmware-view.aspx

 

 

 

NEVER STORE ANY DOCUMENTS ON THE DESKTOP OF VMWARE VIRTUAL COMPUTER.  You will lose your document. It is preferable to store you documents on a local flash drive.

 

 

 

Since the quiz and test questions are based on your researched answers, I would recommend that you refer to any quiz questions on the assignment topics to ensure that your assignment answer is complete. Some quiz answers will NOT be provided to you unless 75% of your answers from practice attempts are correct.

 

 

 

YOU MUST enter your name in the beginning of this document as provided and “Save As” this document using a new name that includes your name and the assignment number, e.g., Bob Jones Assignment 2.docx

 

 

 

 

When completed, submit the FINAL version of this document to Blackboard under the Assignment folder for this individual assignment.  I NEVER ACCEPT AN ASSIGNMENT AS AN EMAIL ATTACHMENT FOR ANY REASON.  If you made an error on an assignment you may request that the previous assignment submission be cleared so that you may resubmit the assignment again.  Please only submit a completed assignment.  All assignments must use the original Word Document format.  Wordpad,  PDFs, etc. formats are not permitted.

 

 

 

While the assignments have a recommended due date, I do not penalized your assignment grade if you are slightly late. Please do not send me an email if you are going to submit your assignment late. I assume you have a good excuse.

 

 

 

 

 

Documenting your Results

 

 

 

Some requirements specify that you perform a specific action, e.g., access a web site, execute a command, etc.  You will need to provide evidence that you performed this task.  There are two techniques

 

 

 

1. Window 7 Snipping Tool – http://www.youtube.com/watch?v=Ax75dA1TGU0

 

 

 

2) Alt-PrtScrn – Available for all versions of Windows

 

1) Once the web site or the results of the command is displayed hold down the ALT key and press the Prtsc. Some laptops may require you to press the FN key to perform this action. 2) Position the cursor to answer the question in this Word document. 3) Press Ctrl-V or select Edit/paste.  To make your graphic more controllable in a Word Document, after pasting 1) Right-click and select Format Picture, 2) Click on the Layout tab, and 3) Select Square ( You may also other justification settings). Now you graphic will flow with text better and can be sized more easily. Page 117-14

 

 

 

 

 

 

Requirement 1 Virtual Memory Operating Systems, Paging and Storage Protection

 

 

 

Many Definitions may be found in the Glossary of the Introduction to the New Mainframe: Z/OS Basics books.   You can down load a PDF copy of this text book from Blackboard/Course Documents

 

 

 

How Operating Systems Work – http://computer.howstuffworks.com/operating-system.htm

 

Virtual address space – http://en.wikipedia.org/wiki/Virtual_address_space

 

Address space – http://searchstorage.techtarget.com/definition/address-space

 

What is virtual memory, how is it implemented, and why do operating systems use it?

 

http://www.programmerinterview.com/index.php/operating-systems/how-virtual-memory-works/

 

What are the advantages and disadvantages of virtual memory?

 

http://answers.yahoo.com/question/index?qid=20080928221645AAFAg23

 

 

 

 

 

 

 

 

3.4.4 Virtual storage overview – Introduction to the New Mainframe: Z/OS Basics – Please read

 

 

 

1. What is advantage of a virtual memory (storage) operating system?  Answer:

 

 

 

 

2. What is disadvantage of a virtual memory (storage) operating system? Answer:

 

 

 

 

 

 

 

 

 

 

 

All programs to be executed must be loaded into the memory (RAM) of the computer. Programs and data must be copied from storage, e.g., a disk, and loaded in to RAM by an operating system program call a loader. In a multitasking operating system user programs must be stored in RAM a manner that doesn’t overlap or conflict with other user or operating system programs

 

 

 

In addition, user and system programs need a way to communicate with each other.  If an operating system controls the hardware then a user program needs a communication method to ask the operating system to print output or store data on a disk.

 

 

 

Introduction to the New Mainframe: Z/OS Basics – Glossary

 

 

 

3.4.2 What is an address space?  – Introduction to the New Mainframe: Z/OS Basics – please read

 

3.4.3 What is dynamic address translation?  – Introduction to the New Mainframe: Z/OS Basics – please read

 

3.4.4 Virtual storage overview – Introduction to the New Mainframe: Z/OS Basics – please read

 

3.4.5 What is paging? – Introduction to the New Mainframe: Z/OS Basics – please read

 

3.4.7 What is Storage Protection? – Introduction to the New Mainframe: Z/OS Basics – please read

 

 

 

 

3. Using the following table write a discussion of following z/OS memory concepts and functions

 

z/OS Memory Concepts and Functions

Concept

Description

Address Space

 

ASID (Address Space ID) 

 

Task Control Block

 

Private Space

 

Storage (Protection) Keys

 

Dynamic Address Translation (DAT)

 

 

 

 

z/OS address spaces are divided into three areas: Region, Segment and Page. z/OS uses these concepts in dynamic address translation find the virtual location of a specified area of memory. While at first these concepts may sound confusing assume that visitor from Ireland wanted to find my home. Would they start searching at the first street in New York City – obviously no 

 

 

 

First, we would start by asking which state do you want to locate (which Region)? Second, one would ask which city within the state do you want to locate (the segment table)? Third, which street within the city do you want to locate (the page table)? Finally, one can sequentially search all houses on the street or simply use the house address (the byte offset).  Likewise, a virtual address uses a similar approach to uniquely identify a virtual address location and to quickly find the address later when needed.   

 

 

 

 

 

 

 

4. Using the following table identify each virtual address concept.

 

z/OS Virtual Address Concepts

Concept

Function and Description

Region

 

Segment

 

Page

 

Byte Offset

 

 

 

 

 

 

 

 

 

 

 

5. How many bits are in a z/OS virtual address?  Answer:

 

 

 

 

6. The maximum of amount virtual address space the z/OS can manage is ____? Answer:

 

 

 

 

 

 

 

 

 

11. Using the following table, list the concept that best describes a type of page, or addressable unit.  

 

z/OS Addressable Units

Concept

Description

 

A page or 4K block in central storage is called _______

 

A page or 4K block in virtual storage is called _______

 

A page or 4K block in auxiliary is called _______

 

 

 

12. When a program is selected for execution, z/OS first brings the program into which type of storage? Answer:

 

 

 

 

Page faults

 

http://www.programmerinterview.com/index.php/operating-systems/paging-and-page-faults/

 

What is the purpose of swapping?

 

http://www.programmerinterview.com/index.php/operating-systems/purpose-of-swapping/

 

What is the difference between a thread and a process?

 

http://www.programmerinterview.com/index.php/operating-systems/thread-vs-process/

 

 

 

 

 

13. z/OS uses a series of tables to determine whether a page is located in real storage or auxiliary storage. Only pages within real storage can be executed. Auxiliary storage is used to extend the real memory.  Using the following table describe each of the following z/OS paging concepts.

 

z/OS Virtual Paging Concepts

Concept

Description

Page fault

 

Page-in

 

Page-out

 

Page Stealing

 

Unreferenced interval count

 

Swapping

 

System Resource Manager

 

Workload Manager

 

Thrashing

 

 

 

 

 

 

14. Which pages are the most likely candidates to be stolen when using Page stealing? Answer:

 

 

 

 

 

 

Chapter 3: Overview of z/OS : Introduction to the Mainframe: z/OS basics ( pages 114 – 134)

 

 

 

Program Status Word

 

http://publib.boulder.ibm.com/infocenter/zvm/v5r4/index.jsp?topic=/com.ibm.zvm.v54.hcpc1/psw1.htm

 

Operating Systems and Program Status Word

 

http://www.edwardbosworth.com/My3121Textbook_HTM/MyText3121_Ch29_V01.htm

 

Storage Protect Keys

 

http://publib.boulder.ibm.com/infocenter/pseries/v5r3/index.jsp?topic=/com.ibm.aix.genprogc/doc/genprogc/storage_protect_keys.htm

 

What is storage protection?

 

http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconcepts_95.htm

 

IBM PSW and Storage Protect Key –  http://research.microsoft.com/en-us/um/people/gbell/Computer_Structures__Readings_and_Examples/00000616.htm

 

 

 

 

Each executing program in an address space has a unique program status word associated with it. Also, within each program status word there is storage protect key.

 

 

 

 

 

 

15. What is the purpose of a Program Status Word (PSW)? Answer:

 

 

 

 

16. What is the purpose of using a private address space for each user? Answer:

 

 

 

 

17. What is the function of a storage protect key? Answer:

 

 

 

 

18. A storage protect key of 0 thru 7 indicates that a program is which type of program?  Answer:

 

 

 

 

19. A storage protect key of 8 indicates that a program is which type of program?  Answer:

 

 

 

 

20. A storage protect key of 9 thru 15 indicates that a program is which type of program? Answer:

 

 

 

 

 

Requirement 2 Storage Devices, Expansion Busses and Slots

 

 

 

Review the videos under the Video Folder/ Bus Architecture Expansion Slots and Ports; Storage Technologies; Installing Hard Drives DVDs and Other Storage Devices

 

 

 

Review Storage Bus Update 2010 and Managing Disks 2010

 

 

 

 

 

 

 

 

How Hard Disks Work  http://computer.howstuffworks.com/hard-disk.htm

 

data transfer rate    http://www.webopedia.com/TERM/D/data_transfer_rate.html

 

PCI Express    http://en.wikipedia.org/wiki/PCI_Express

 

How PCI Express Works    http://computer.howstuffworks.com/pci-express.htm

 

Serial ATA    http://en.wikipedia.org/wiki/Serial_ATA

 

What are PATA and SATA?    http://hexus.net/tech/tech-explained/storage/1339-pata-vs-sata/

 

IOPS    http://en.wikipedia.org/wiki/IOPS

 

IOPS versus Throughput – Measuring Performance of Your Storage    http://timradney.com/2012/07/06/iops-verses-throughput/

 

How to convert MBps to IOPS or calculate IOPS from MB/s    http://www.ssdfreaks.com/content/599/how-to-convert-mbps-to-iops-or-calculate-iops-from-mbs

 

An explanation of IOPS and latency    http://recoverymonkey.org/2012/07/26/an-explanation-of-iops-and-latency/

 

SSD Interface Comparison: PCI Express vs SATA    http://www.overclock.net/t/1489684/ssd-interface-comparison-pci-express-vs-sata

 

Why SSDs are Transitioning from SATA to PCIe in the Next Gen Form Factor     http://www.tested.com/tech/pcs/456464-why-ssds-are-transitioning-sata-pcie-next-gen-form-factor/

 

Live USB    http://en.wikipedia.org/wiki/Live_USB

 

5 ways to use bootable Linux live discs –  http://www.computerworld.com/article/2519158/linux/5-ways-to-use-bootable-linux-live-discs.html

 

Take a Secure Desktop Everywhere: Everything You Need to Know About Linux Live CDs and USB Drives    http://www.howtogeek.com/172810/take-a-secure-desktop-everywhere-everything-you-need-to-know-about-linux-live-cds-and-usb-drives/

 

What are the advantages and disadvantages of always running Ubuntu in “Try” mode?  http://askubuntu.com/questions/481057/what-are-the-advantages-and-disadvantages-of-always-running-ubuntu-in-try-mode

 

Serial ATA http://en.wikipedia.org/wiki/Serial_ATA

 

A Guide to Serial ATA http://www.pcmech.com/article/a-guide-to-serial-ata/

 

Install a New Hard Drive in Five Easy Steps http://computershopper.com/hard-drives-burners/howto/install-a-new-hard-drive-in-five-easy-steps

 

Data cluster    http://en.wikipedia.org/wiki/Data_cluster

 

Block Storage –  http://en.wikipedia.org/wiki/Block_%28data_storage%29

 

 

 

 

 

 

1. Using the following table describe the following concepts related to data storage of auxiliary devices.

 

Concepts related to Storage Devices

Definition or Description

Disk Cylinder 

 

Disk Track

 

Disk Sector

 

Data Cluster

 

Data Block

 

Data Transfer Rate

 

Seek Time

 

Throughput

 

MBPS

 

IOPS

 

SATA

 

PATA

 

 

 

 

2. Using the following table paste an appropriate Google image that illustrates the concept.

 

Concepts related to Storage Devices

Google image that illustrates the concept.

Disk Cylinder 

 

Disk Track

 

Disk Sector

 

Data Cluster

 

Data Block

 

Data Transfer Rate

 

Seek Time

 

Throughput

 

MBPS

 

IOPS

 

SATA

 

PATA

 

 

 

 

 

 

3. In what type of applications is an IOPS throughout measurement standard more important than MBPS?  Explain your answer:

 

 

 

 

4. In what type of applications is a MBPS throughout measurement standard more important than IOPS?  Explain your answer:

 

 

 

 

 

 

Introduction to Disk I/O

 

 

 

There are three architectures that can be used to connect Disk /O devices, e.g., DASDs, tapes and printers, to a computer: 1) Directed Attached Storage (DAS), 2) Network Attached Storage (NAS), and 3) Storage Area Networks (SAN).  The following diagram illustrates three legacy storage architectures used for Direct Attached Storage (DAS).      

 

 

 

 

 

 

 

 

What is an I/O Channel?

 

 

 

Mainframes introduced the I/O Channel architecture to support overlapped processing and multiprogramming.

 

 

 

 

 

 

 

Assume that a computer was to input payroll data stored on tape and then output a payroll transaction record to a second tape device.  Review the timing sequence when the CPU was required to process the input, payroll calculations and output tasks. 

 

 

 

Non Overlapped Processing

No Channels or I/O Processors

Performed by

Processing Step

Time Frame 1

Time Frame 2

Time Frame 3

Time Frame 4

Time Frame 5

Time Frame 6

CPU

Read Record

from Tape 1

Record 1

 

 

Record 2

 

 

CPU

Calculate Payroll

 

Record 1

 

 

Record 2

 

CPU

Write Payroll Transaction  on Tape 2

 

 

Record 1

 

 

Record 3

 

 

 

The CPU was required to perform all input, calculation and output processing steps. In the first time frame the CPU would read Record 1 from the Tape 1. In the second time frame the CPU will perform the payroll calculations for Record 1, and in the third time frame the CPU would output the modified Record 1 to Tape 2. Given the relative difference in performance between CPUs and Tape devices in the 1960s, the CPU would be idle 98% of the processing time waiting for the slower tape device.  Non overlapped systems were I/O Bound, i.e., the CPU was underutilized.

 

 

 

While the previous picture seems to imply that an I/O channel is a connector, an I/O Channel is actual a specialized I/O processor designed to work with the CPU. Modern I/O architectures rarely use the terminology of a channel any more, but every network card, SCSI card, USB root hub, etc. has a specialized I/O processor that performs the same tasks introduced by IBM in the 1960s.

 

 

 

Now review the timing sequence when the CPU and two channels process the input, payroll calculations and output tasks.

 

 

 

Overlapped Processing

A CPU and 2 I/O Channels

Performed by

Processing Step

Time Frame 1

Time Frame 2

Time Frame 3

Time Frame 4

Time Frame 5

Time Frame 6

Channel 1

Read Record

from Tape 1

Record 1

Record 2

Record 3

Record 4

Record 5

Record 6

CPU

Calculate Payroll

 

Record 1

Record 2

Record 3

Record 4

Record 5

Channel 2

Write Payroll Transaction  on Tape 2

 

 

Record 1

Record 2

Record 3

Record 4

 

 

 

In the first time frame the Channel 1 would read Record 1 from the Tape 1. In the second time frame the Channel would read the Record 2, while the CPU will perform the payroll calculations for Record 1. In the third time frame, Channel 1 would read Record 3, the CPU will perform the payroll calculations for Record 2, and Channel would output the modified Record 1 to Tape 2. Sounds great?  But, one should ask if the tape device (or any storage device) is so slow the CPU will have to wait to for the slower Channel 1 and Tape 1.

 

 

 

What is Record Blocking?

 

 

 

When one allocates a data set, they must specify the data length of logical record and the block size (or blocking factor). The length of the logical record is easy to understand. The payroll department needs 200 characters to process a payroll transaction; therefore the record length should be 200 characters.

 

 

 

But, consider the effects if one can tell Channel1 to read three records at a time, instead of one record at a time.  This would be more efficient like instead of making one trip to the pizza shop for each of three pizzas, if simply purchased three pizzas at a time. Reading or writing multiple records at a time is described as blocking records.  Consider overlapped processing with a block factor of 3 200-byte records or a blocking size of 600 bytes.

 

 

 

Overlapped Processing

Read  and Write Three Records at a Time

A CPU and 2 I/O Channels

Performed by

Processing Step

Time Frame 1

Time Frame 2

Time Frame 3

Time Frame 4

Time Frame 5

Time Frame 6

Channel 1

Read Records

from Tape 1

Records 1, 2 and 3

 

 

Records 4, 5 and 6

 

 

 

CPU

Calculate Payroll

 

Record 1

Record 2

Record 3

Record 4

Record 5

Channel 2

Write Payroll Transaction  on Tape 2

 

 

 

 

Records 1, 2 and 3

 

 

 

 

 

 

What determines the most efficient Block size?

 

 

 

The most efficient blocking size is determined by the logical record length and the specific hardware characteristics of the storage device.

 

 

 

The Role of Multiprogramming and Batch Processing

 

 

 

Overlapped Processing and appropriate block size does not solve all of the limitations of I/O bound systems. No matter what, the potential for an idle processor always exists. However, multiprogramming architectures are designed to automatically switch to another job or task when the CPU detects an idle condition waiting for an I/O device.  Batch processing systems, which require no user intervention, can be scheduled at non-peak processing times.  The reality is that most large scale systems (not your laptop) are most often process bound, i.e., too many tasks and input and output requirements.  Other strategies to address the limitations of process bounds systems include increase processor speed, increase RAM to decrease virtual thrashing, the use of multicore processors, multiprocessing and cluster architectures.

 

 

 

 

 

Identifying Physical Storage Devices.

 

 

 

Every operating system provides a system to physically identify an I/O device and to logically identity a device. For example, Windows may physically identify an I/O device by an interrupt, I/O address and a DMA channel. However, users and applications rarely identify an I/O device with those physical attributes. Being more user-friendly a Windows user may identify a disk as Drive C:  or an attached printer as LPT1:

 

 

 

Likewise z/OS physically identifies a device by a CHPID (channel ID), switch port number, control unit address, and unit address. Remember a control unit may have many different devices connected to it. In PC-land, a SCSI control may have15 disk drives attached to it; each identified by a unique SCSI ID. Likewise a IBM 3990 control unit may have many disk drives attached to it; each identified by a unit address. 

 

 

 

Since a z/OS Physical I/O address is complicated and maybe static, JCL, commands, user interfaces,  and error messages use device numbers. A Device Number is a unique combination of four hexadecimal numbers, e.g., 183F.   In theory, a Device Number is more easy to understand than a Physical I/O address. But there is another advantage.  Assume that an existing JCL statement refers a given Physical Unit number, e.g., a DASD unit number, instead of a Device Number. Suppose that this unit number changes. Then all of the JCL statements referring to that unit number needs to be change or rewritten.  On the other hand, if the JCL contained a logical Device Number that refers to a Physical I/O address, the Device Number would not have to be changed on the JCL when the Physical I/O address changes. This is exactly how Internet domain names  are associated with an IP address work.  If Google decides to change its IP address, users do not care – since google.com continues to work.

 

 

 

Just as domain names must be stored and mapped to an IP address, so does a Device Number need to be stored and mapped to a Physical I/O address.  A I/O control file, e.g., IOCDS (Input/Output Control Data Set) or  IODF (Input/Outpt Definition File, maps the Physical I/O address  to the Device Number.  During the boot process, more appropriately called IPL (Initial Program Load) This data set is read and stored in system memory as a Unit Control Block (UCB).

 

 

 

 System programmers will use device numbers more than application programmers.  When an application needs access to a data set they will need to provide the name of data set and the device number. Given the large number of device numbers and the possibility that the device number may be changed, another feature will be used. Application programmers may rely on catalog data sets.  When a data set is cataloged, the device number and disk volume is stored. As long as data set has a unique name z/OS looks up the data set name in the catalog to determine device number of the DASD and volume name.

 

 

 

I/O Switches and I/O Directors

 

 

 

Original mainframe I/O architectures used a Bus and Tag cable to directly attached one device or one chain of device managed by a device controller to one channel. When the channel was busy no other channel could access the device. I/O Switches and directors permit multiple channels to be connected to multiple storage device chains over higher speed connections. Not only did this prevent channel bottle necks, it also enable to the architecture to permit different LPARs to share the same devices and provide fault tolerance.  

 

 

 

Storage Area Networks:  ISCSI, IP Address and Port Numbers

 

 

 

Most modern large scale architectures are based on SAN architectures or Storage Virtualization. SAN devices are no longer directly attached to the server, and can be shared by multiple servers using a variety or operating systems over long distances. Without SAN technologies, load balancing, fail over, data sharing, cloud computing  technologies would not be possible

 

 

 

Channel I/O    http://en.wikipedia.org/wiki/Channel_I/O

 

Channel subsystem (CSS) –  http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.znetwork/znetwork_59.htm

 

Types of CCW Channels used to connect DASDs

 

http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.znetwork/znetwork_59.htm

 

 

 

 

 

5. Using the following table describe the following concepts related to data storage of auxiliary devices.

 

Concepts related to Storage Devices

Definition or Description

Disk Channel

 

Device Number or Disk Number

 

Disk Partition

 

Disk Volume

 

Mount Point

 

Master Boot Record

 

EFI

 

FDISK

 

IODF

 

 

 

 

6. Using the following table paste an appropriate Google image that illustrates the concept.

 

Concepts related to Storage Devices

Google image that illustrates the concept.

Disk Channel

 

Device Number or Disk Number

 

Disk Partition

 

Disk Volume

 

 

 

 

 

 

 

 

 

 

7. Is SATA an example of a storage device or a hardware interface?  Explain your answer:

 

 

 

 

8. Using the following table list the advantages and disadvantages of SATA devices as compared to PATA devices.

 

SATA

Advantages

Disadvantages

 

 

 

 

 

 

 

 

 

Disk Partition  http://en.wikipedia.org/wiki/Disk_partitioning

 

Differences between volume, partition and drive     http://unix.stackexchange.com/questions/87300/differences-between-volume-partition-and-drive
Partitions and Volumes   
http://cquirke.mvps.org/9x/partition.htm

 

 

 

 

 

9. What utilities does one use to partition a Windows Hard Drive? Answer:

 

 

 

 

10. What is the Primary Partition of a Windows Hard Drive?  Answer:

 

 

 

 

11. What is the maximum number of physical partitions that can be created on a microcomputer disk drive?  Answer:

 

 

 

 

12. What is the function of an operating system boot loader? Answer:

 

 

 

 

Video – What is the Bootloader in Android?    https://www.youtube.com/watch?v=-tXox11ngLY

 

GNU GRUB    http://en.wikipedia.org/wiki/GNU_GRUB

 

Securing the Windows 8 Boot Process     https://technet.microsoft.com/en-us/windows/dn168167.aspx

 

 

 

13. Complete the following table for the following popular boot loaders.

 

 

Boot Loader

 

Operating System(s)

List the name of

Boot Configuration File

Grub

 

 

NTLDR

 

 

BOOTMGR

 

 

 

 

 

 

 

 

14.   In the link “Securing the Windows 8 Boot Process”, list the and explain the steps of the boot process using the following table  

 

Windows 8 Boot Process Sequence

Explanation of the function

1. UEFI

 

2. OS Boot Loader

 

3. Loading the Kernel

 

4. Loading the System Drivers

 

5. Load the System Files

 

6. Load the ELAM Driver

 

7. Load 3rd Party Drivers

 

8. Load Anti Malware Software

 

9. Windows Sign-in

 

 

 

 

 

 

15.  Using the following tale describe the following categories of rootkits.

 

Types of Rootkits

Description of the rootkit

Firmware Rootkits

 

Bootkits

 

Kernel Rootkits

 

Driver Rootkits

 

 

 

 

16.  Explain how the Windows 8 Secure Boot feature prevents rootkits.  Answer:

 

 

 

 

17.  Explain how the Windows 8 Trusted Boot feature prevents rootkits. Answer:

 

 

 

 

18.  Explain how the Windows 8 Early Launch Malware (ELAM) feature prevents rootkits. Answer:

 

 

 

 

19.  Explain how the Windows 8 Measured Boot feature prevents rootkits.

 

 Answer:

 

 

 

 

20. What are the performance advantages of the Extensible Firmware Interface (EFI)? Answer:

 

 

 

 

21. What are the security advantages of the Extensible Firmware Interface (EFI)? Answer:

 

 

 

 

 

 

 

DVD  http://en.wikipedia.org/wiki/DVD

 

Blu-ray Disc  http://www.blu-ray.com/info/

 

Blu-ray Disc  http://en.wikipedia.org/wiki/Blu-ray_Disc

 

The Advantages and Disadvantages of Blu-Ray  http://ezinearticles.com/?The-Advantages-and-Disadvantages-of-Blu-Ray&id=3368103

 

Digital Rights Management http://en.wikipedia.org/wiki/Digital_rights_management

 

http://www.zdnet.com/blog/hardware/update-x2-avatar-blu-ray-drm-bites-legitimate-customers/8193

 

 

 

22. Using the following table list and compare the storage capacity, data transfer rates and recording technologies used each of the following optical storage devices and media. 

 

 

Optical Storage

CD

 (Compact Disk)

DVD

 (Digital Versatile Disk)

 

Blue- Ray

Storage Capacity

 

 

 

Data Transfer Rate

 

 

 

Recording Technology

 

 

 

 

 

 

23. Digital movies are available in both DVD and Blue-Ray storage formats. Why are Blue-Ray disks replacing DVDs when used for the digital storage of movies? Answer:

 

 

 

 

34. Use google.com and search for a good buy to add a Blue-Ray drive to your computer, either internal or external. Copy-and- paste your result below. Answer:

 

 

 

 

25. What is meant by “Digital Rights Management?”  Answer:

 

 

 

 

26. Which companies have been strong supporters of Digital Rights Management?  Answer:

 

 

 

 

27. Legitimate customers have been having problems with DRM.  What is the solution to this problem? Answer:

 

 

 

 

28. Using the following table list the advantages and disadvantages of Blu-Ray  storage devices.

 

Blue-Ray Storage Devices

Advantages

Disadvantages

 

 

 

 

 

 

 

 

 

Universal Serial Bus http://en.wikipedia.org/wiki/Universal_Serial_Bus

 

USB 3.0  Advantages and Disadvantages http://techie-buzz.com/gadgets-news/usb-3-advantages-disadvantages.html

 

Firewire http://en.wikipedia.org/wiki/FireWire

 

What Is the Difference Between USB and FireWire® ? http://www.wisegeek.com/what-is-the-difference-between-usb-and-firewire.htm

 

 

Review the videos under the Video Folder/ Bus Architecture Expansion Slots and Ports; Storage Technologies; Installing Hard Drives DVDs and Other Storage Devices

 

 

 

Review Storage Bus Update 2010 and Managing Disks 2010

 

 

 

 

 

 

 

29. Using the following table list the maximum data transfer rate for each of the following standards.

 

 

Standard

 

Maximum Data Transfer Rate

USB 1.0/1.1

 

USB 2.x

 

USB 3.x

 

FireWire 400

 

FireWire 800

 

FireWire S1600

 

FireWire S3200

 

 

 

 

30. Using the following table list the advantages and disadvantages of the USB2.x/3.x interface standard..

 

USB 2.0/3.x 

Advantages

Disadvantages

 

 

 

 

 

 

 

 

 

31. Using the following table list the advantages and disadvantages of FireWire.

 

FireWire 

Advantages

Disadvantages

 

 

 

 

 

 

 

 

 

 

 

Compact Flash memory http://en.wikipedia.org/wiki/CompactFlash

 

Flash memory http://en.wikipedia.org/wiki/Flash_memory

 

NAND flash memory –  http://whatis.techtarget.com/definition/nand-flash-memory.html

 

Flash Memory Utilities http://www.sd-flash.com/file07.html

 

What are the disadvantages of USB Flash drives?  http://www.answers.com/Q/What_are_the_disadvantages_of_USB_Flash_drives

 

Secure Digital http://en.wikipedia.org/wiki/Secure_Digital

 

 

 

32. What is Flash Memory?   Answer:

 

 

 

 

33. Why is Flash Memory used for computer storage rather that a replacement of SDRAM using for Computer memory? Answer:

 

 

 

 

34. Explain the concept of NAND and NOR memory?  Answer:

 

 

 

 

35. Compare the features and uses between NAND and NOR memory?  Answer:

 

 

 

 

 

 

36. Using the following table list the advantages and disadvantages of USB Memory Sticks or flash memory.

 

Flash Memory 

Advantages

Disadvantages

 

 

 

 

 

 

 

 

 

37. Using the following table define the following concepts related to Secure Digital Cards.

 

Secure Digital Cards

Definition

MiniSD

 

Class 2, 4 or 6

 

SDHC

 

SDXC

 

NAND

 

 

 

 

 

Requirement 3 Solid State Drives, NAS, SANS and TOR

 

 

 

Video – Introduction to Solid State Drives (SSD)    https://www.youtube.com/watch?v=AB-JUyQYxIw

Important to view the previous video since many of the following questions are answered

 

 

 

1. What type of memory does SSD drives use?  Answer:

 

 

 

 

2. What are the differences between SSD drives as compared to traditional hard drives?  Answer:

 

 

 

 

3. Since a SSD uses less power, which type of computer devices and architectures will most likely benefit the most?  Answer:

 

 

 

 

4. What is function of SSD Trimming as compared to utilities used on traditional hard drives? Answer:

 

 

 

 

5. SSD storage devices may be connected to a computer using either SATA or PCIe interface technologies. Please explain the pros and cons of both SATA and PCIe to connect future SSDs to small computers and devices and enterprise systems?   Answer:

 

 

 

 

6. List and explain at least five uses of a Live CD, DVD or USB device to boot an operating system? Answer:

 

 

 

 

NAS versus SANS

 

 

 

 

NAS versus SANS –  http://www.nas-san.com/differ.html

 

10 Advantages of SAN vs. DAS    http://www.serverwatch.com/trends/article.php/3925351/10-Advantages-of-SAN-vs-DAS.htm

 

 

 

 

 

7. While are the advantage of NAS operating system as compared to a traditional server operating system? Answer:

 

 

 

 

 

 

8. What type of communication hardware and network technologies does a NAS architectures use?  Answer:

 

 

 

 

 

9. What type of communication hardware and network technologies does a SAN architectures use?  Answer:

 

 

 

 

10. Using the following table explain  each of the following 10 advantages of Storage Area Networks as compared to Directly Attached Storage.

 

Advantages of Storage Area Networks (SAN) as compared to

Directly Attached Storage (DAS)

Advantages of Storage Area Networks (SAN)

Explanation

1. Scalability

 

2. Performance

 

3. Data Isolation

 

4. Uptime

 

5. Workload Isolation

 

6. Long Distance Connectivity

 

7. Increased Utilization

 

8. Bootable

 

9. Centralized Management

 

10. Disaster Recovery

 

 

 

 

11. Explain how SANs may be used to support Load Balancing Clusters. Answer:

 

 

 

 

12. Explain how SANs may be used to support Fail-over Clusters. Answer:

 

 

 

 

Fibre Channel Storage Area Networks (SAN)    http://www-03.ibm.com/systems/storage/san/

 

 

 

13. What is Fibre Channel (FICON)?  Answer:

 

 


14. How does Fibre Channel relate to SCSI, IP and FICON? Answer:

 

 

 

TOR – The Hidden Web ( A little more security _

 

 

 

 

TOR Project  https://www.torproject.org/

 

Tor (anonymity network)     http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29

 

 

 

15. Explain the function and security implications of TOR. Answer:

 

 

 

 

16. Why does web anonymity matter? Answer:

 

 

 

 

17. What were the U.S. Navy’s interests in the development for TOR? Answer:

 

 

 

 

18. How does TOR use Proxy servers? Answer:

 

 

 

 

19. In order for TOR to work, the Tor Project web site makes several recommendations.  List at least three of these recommendations.   Answer:

 

 

 

 

20. How can you use TOR from a Live USB? Answer:

 

 

 

 

21. Why is the speed of TOR limited? Answer:

 

 

 

 

22. What are the problems of using TOR to connect to a illegal web site? Answer:

 

 

 

 

 

 

23. What is the Hidden Internet (or the Deep Web) or the  “.onion”  domain?   Answer:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Requirement 2   IBM Enterprise Concepts

 

 

 

Glossary: Text book ” Introduction to the Mainframe: z/OS Basics”

 

 

 

Introduction to z/OS and Processing Modes Hand outs –  Most answers are provided here.)  

 

 

 

The videos to accompany this hand out are listed below

 

 

 

Video – Introduction to zOS and Processing Modes Part-1 3-14-2014 – http://youtu.be/TrVF5GjjmJY

Video – Introduction to zOS and Processing Modes Part-2 3-14-2014 – http://youtu.be/TrVF5GjjmJY

Video – Introduction to zOS and Processing Modes Part-3 3-14-2014 – http://youtu.be/PzrbdaGAtn8

Video – Introduction to zOS and Processing Modes Part-4 3-14-2014 –

 

 

 

http://en.wikipedia.org/wiki/OS/360

 

http://en.wikipedia.org/wiki/Z/OS

 

http://en.wikipedia.org/wiki/MVS

 

http://en.wikipedia.org/wiki/OS/390

 

http://en.wikipedia.org/wiki/OpenVMS

 

                       

 

1.7 Factors contributing to mainframe use – – Introduction to the New Mainframe: Z/OS Basics

 

 

 

1. Using the following table list several of characteristics of mainframe computers 

 

Characteristics of Mainframe Architectures

1.

2.

3.

4.

5.

 

 

 

2. There are many factors that contributed to mainframe use.  Using the following table list each factor and describe and provide an application of each factor.

 

Factors Attributed to Use of Mainframe Architectures

Factor

Description and application

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

http://en.wikipedia.org/wiki/OS/360

 

http://en.wikipedia.org/wiki/Z/OS

 

http://en.wikipedia.org/wiki/MVS

 

IBM System z – http://en.wikipedia.org/wiki/IBM_System_z

 

OS/360 and successors – http://en.wikipedia.org/wiki/OS/360_and_successors

 

What is batch processing?

 

http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm

 

Batch processing – http://www.webopedia.com/TERM/B/batch_processing.html

 

How Batch Processing Made Me 10 Times More Productive – http://www.problogger.net/archives/2008/06/12/how-batch-processing-made-me-10-times-more-productive/

 

Advantages and disadvantages of batch processing and real-time processing? http://wiki.answers.com/Q/Advantages_ad_disadvantages_of_batch_processing_and_real-time_processing

 

Advantages & Disadvantages of Batch Processing – http://www.ehow.com/list_6632199_advantages-disadvantages-batch-processing.html

 

Online transaction processing – http://en.wikipedia.org/wiki/Online_transaction_processing

 

Transaction processing –  http://www.webopedia.com/TERM/T/transaction_processing.html

 

OLTP (online transaction processing) – http://searchdatacenter.techtarget.com/definition/OLTP

 

CICS (Customer Information Control System) –    http://searchdatacenter.techtarget.com/definition/CICS

 

 

 


3. Describe and provide an example of Batch Processing? Answer:

 

 

 

 

4. Describe and provide an example of Transaction Processing (Online Transaction Processing – OLTP)  Answer:

 

 

 

 

5. Use the following table to list the advantages and disadvantages of Batch Processing?

 

Batch Processing

Advantages

Disadvantages

 

 

 

 

 

 

 

 

 

 

 

 

 

6.  Use the following table to list the advantages and disadvantages of Transaction Processing (OLTP)?

 

Transaction Processing (OLTP)

Advantages

Disadvantages

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

7. IBM System/360 architecture and mainframe operating system OS360 were the origins of the current IBM Z Architecture. Using the following table answer the following questions

 

Features of the IBM System/360 Architecture

 

Answer

32-bit or 64-bit processors?

 

Primary designed for batch or OLTP?

 

Type of User Interfaces, e.g.,  terminal, online, web, etc.

 

Support of  Linux Operating systems

 

Support for TCP/IP and Internet Services?

 

Support of COBOL applications

 

Support of Java Applications?

 

 

 

 

 

 

z/VM

 

http://en.wikipedia.org/wiki/Z/VM

 

Processing work on z/OS: How the system starts and manages batch jobs –  http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm

 

What is TSO?

 

http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm

 

What is ISPF?

 

http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm

 

What is JES? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm

 

Main Features of ISPF  http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.zcourses/zcourses_ispfmain_book.pdf

 

ISPF Primary menu and Datasets –

 

http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.zcourses/zcourses_ispfpdf_book.pdf

 

ISPF Data Sets

 

http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.zcourses/zcourses_ispfdsbasics_book.pdf

 

ISPF http://en.wikipedia.org/wiki/ISPF

 

 

 

9. What z/OS subsystem manages the execution of batch program, i.e., batch processing?  Answer:

 

 

 

 

10. Historically, the only interface to manage and execute jobs on an IBM operating system was keypunch cards.  The popular command line interface that programs use to access IBM operating systems, manage jobs, perform system program tasks is called?  Answer:

 

 

 

 

11. What is the z/OS component (subsystem) that provides OLTP processing services for user transactions, e.g., inquiry to account balances, adding employee information into a database, etc. using legacy programming languages, e.g., COBOL?   Answer:

 

 

 

 

12. z/OS is a full feature operating system that executes IBM legacy applications.  z/OS frequently runs under Z/VM as a guest operating.    What is the function of the z/VM?  Answer:

 

 

 

 

13. What is the relationship between z/VM, z/OS and zLinux IBM Enterprise systems? Answer:

 

 

 

 

What is JES? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm

 

What is a data set? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm

 

What is a VTOC? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm

 

VSAM Catalogs – http://www.exforsys.com/tutorials/mainframe/vsam-catalogs.html

 

Difference between catalog and vtoc –  http://ibmmainframeforum.com/viewtopic.php?f=6&t=1327

 

Direct access storage device – http://en.wikipedia.org/wiki/Direct_access_storage_device

 

z/OS UNIX file systems

 

http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm

 

What is z/OS UNIX?

 

http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm

 

Clustering: A basic 101 tutorial –  http://www.ibm.com/developerworks/aix/tutorials/clustering/

 

LPAR – http://www.pcmag.com/encyclopedia_term/0,1237,t=LPAR&i=46363,00.asp

 

Logical partition (virtual computing platform) –  http://en.wikipedia.org/wiki/Logical_partition_(virtual_computing_platform)

 

Introduction to JCL 

 

http://publibz.boulder.ibm.com/zoslib/books/tutorials/introjcl/index.htm?noframes=true

 

IBM Parallel Sysplex

 

http://en.wikipedia.org/wiki/IBM_Parallel_Sysplex

 

What is a Parallel Sysplex 1443?

 

http://www-03.ibm.com/systems/z/advantages/pso/sysover.html

 

 

 

Rexx –  http://en.wikipedia.org/wiki/Rexx

 

What is Rexx? –  http://www.rexxla.org/rexxlang/

 

OS/2 REXX: From Bark to Byte –  http://www.redbooks.ibm.com/redbooks/pdfs/gg244199.pdf

 

Implementing REXX ot Support in SDSF – http://www.redbooks.ibm.com/redbooks/pdfs/sg247419.pdf

 

 

 

What is a z/OS catalog? https://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconcepts_172.htm

 

 

 

 

14. Given the following IBM Enterprise Concepts

 

IBM Enterprise Concepts

Concept

Description

JES

 

LPAR

 

VTOC

 

DASD

 

Data Set

 

JCL

 

Sysplex

 

Catalog

 

CICS

 

REXX

 

ISPF

 

TSO

 

3270 Terminal

 

 

 

 

 

 

 

 

15. From your previous research of use lookup images using Google, paste an image that best illustrates the following concepts in the table.

 

IBM Enterprise Concepts

Concept

Image

JES

 

LPAR

 

VTOC

 

DASD

 

Data Set

 

JCL

 

SysPlex

 

Catalog

 

CICS

 

REXX

 

ISPF

 

TSO

 

3270 Terminal

 

 

 

 

 

 

16. What concept in Windows is comparable to IBM datasets?  Answer:

 

 

 

 

Disk Volume (computing) –  http://en.wikipedia.org/wiki/Volume_%28computing%29

 

Disk volume –  http://searchstorage.techtarget.com/definition/volume

 

What is difference between volume and disk –  http://www.storagecraft.com/support/forum/what-difference-between-volume-and-disk

 

Volume Label – http://pcsupport.about.com/od/termsv/g/volume-label.htm

 

5.6 How data sets are named – – Introduction to the New Mainframe: Z/OS Basics PDF

 

What are DASD volumes and labels? –  http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconcepts_151.htm

 

 

 

17. What are DASD volumes and labels?  Answer:

 

 

 

 

18. On what type of device may data sets be stored?  Answer:

 

 

 

 

19. How are data sets named? Answer:

 

 

 

 

 

 

20. What is the difference between a VTOC and a catalog Answer:

 

 

 

 

21. VTOC is similar to which storage concept in Windows? Answer:

 

 

 

 

 

 

22. Partitioned Data Set is similar to which storage concept in Windows? Answer:

 

 

 

 

What is VSAM? –  http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconcepts_169.htm

 

Virtual Storage Access Method  (VSAM)  http://en.wikipedia.org/wiki/VSAM

 

VSAM Demystified (Chapter 1) – http://www.redbooks.ibm.com/redbooks/pdfs/sg246105.pdf  

 

Key-sequenced data set (KSDS) –  http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqncd_data_set.html

 

Relative record data set (RRDS) – http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqncd_data_set.html

 

Entry-sequenced data set (ESDS) –  http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqncd_data_set.html

 

Record-oriented filesystem –  http://en.wikipedia.org/wiki/Record-oriented_filesystem

 

Introduction to Partitioned Data Sets –  http://docweb.cns.ufl.edu/docs/d0068/ar01.html

 

 

 

23. An IBM 3270 terminal is used with what z/OS operating interactive facility? Answer:

 

 

 

 

24. What is VSAM?  What is VSAM used for? Answer:

 

 

 

 

25. IBM files are record-oriented. Windows and Linux files are byte-oriented.  When Windows or Linux stores files, e.g., a Word Document it stores the contents of the files as a contiguous series of bytes until the end of the file.    On the other hand, a record is a group of related data, words, or fields treated as a meaningful unit; for instance, a Name, Address, and Telephone Number can be a “Personal Record”.  Therefore, IBM files were primarily designed to store business data rather than a Word document or graphic file.  What were the advantages of the IBM record-oriented files.  Answer:

 

 

 

 

 

 

26. Using the following table describe each of the following VSAM Dataset types that are used to store business transaction data.

 

VSAM DataSets Organization

Dataset  Type

Description

Key-sequenced data set (KSDS)

 

Entry-sequenced data set (ESDS)

 

Relative record data set (RRDS)

 

Linear data set (LDS)

 

 

 

 

27. As an alternative to a VSAM dataset  IBM  provides for a Partitioned Dataset . Describe how a Partition data set stores data? Answer:

 

 

 

 

28. What type of data is normally stored in a Partitioned data set?  Answer:

 

 

 

 

29. Using Google find an appropriate image that illustrates the concept of a Partitioned Data Set  Answer:

 

 

 

 

30. Within the structure of IBM JCL what is a JOB? Answer:

 

 

 

 

31. Within the structure of IBM JCL what is a DD statement Answer:

 

 

 

 

IMS http://en.wikipedia.org/wiki/Information_Management_System

 

Hierarchical database systems http://en.wikipedia.org/wiki/Hierarchical_database

 

DB2 http://en.wikipedia.org/wiki/IBM_DB2

 

RACF – http://en.wikipedia.org/wiki/RACF

 

 

 

 

 

32. What are the functions provided by IBM’s IMS Product Line (Information Management System)? Answer:

 

 

 

 

33. What are the functions provided by IBM’s DB2 product line? Answer:

 

 

 

 

Security on z/OS – http://wwwlgis.informatik.uni-kl.de/cms/fileadmin/users/kschmidt/mainframe/lutzkuehner/Chapter11_Security_on_zOS_slides.pdf

 

What is RACF? – http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zsecurity/zsecc_042.htm

 

Resource Access Control Facility – http://en.wikipedia.org/wiki/Resource_Access_Control_Facility

 

Security on z/OS

 

http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.zsecurity/zsecurity_book.pdf

 

SNA

 

 http://en.wikipedia.org/wiki/IBM_Systems_Network_Architecture

 

Networking on Z/OS

 

http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.znetwork/znetwork_book.pdf

 

 

 

 

 

34.  What are the functions and features provided by IBM’s RACF product line (Resource Access Control Facility)? Answer:

 

 

 

 

35. What are the functions provided by IBM’s SAF?  Answer:

 

 

 

 

36.  What is function of SNA?  Answer:

 

 

 

 

37. How is SNA related to TCP/IP? Answer:

 

 

 

 

38. What is IBM Web Sphere? Answer:

 

 

 

 

39. What is IBM Web Sphere MQ? Answer:

 

 

 

 

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Pay Someone To Write Essay