Assignment 2 Directions Enter your Name Here =è XXXXXXXXXX
Assignment 2 is divided into two documents: Assignment 2 Theory (50% of the assignment grade) and Assignment 2 Hands-on (50% of the assignment grade).
Most requirements of this assignment will require you to research answers from your text book (you must read the text book to get some answers), from the Internet, or any other reasonable source. Many Internet sources, video links, text book and Blackboard presentation reference are provided to help you START your research. I have found that any single Internet source is very incomplete and the format may not conducive for most answers required. Some students do not READ the text book or review the Power Point presentation provided to you in Blackboard. Some answers are only available from my power point presentations or update notes.
You may cut-and-paste answers whenever appropriate, you should take care to synthesize your answers to include multiple sources. I would be impressed that you consult a Google image search and paste and appropriate image to supplement your answer.
While I permit cut-and-paste, I do expect you use your own words so that you:
1. Organize the answer
2. Demonstrate that you have read what you have cut-and-pasted
3. Use any means that clearly displays that you have gained knowledge.
If you are LEARNING the subject matter there should be no problem. If you cut-and-paste and pray that it might answer the question you will be penalized. I hate irrelevant cut-and-paste BS.
The content of each student’s assignment may NOT be copied from any other current or past student enrolled in this class. Each assignment is to be prepared by ONE student. Assignments are NOT a group-prepared assignment. Copying and pasting assignment any portion of the requirements from another student either enrolled in the current semester and or a previous semester is an act of plagiarism according to the RMU Academic Integrity Policy. Any assignment found to be “too much alike” will be subject to a grade of zero for all parties concerned. Such an act constitutes a violation of the Robert Morris University Academic Integrity Policy. The instructor reserves the right to review past assignments with students who are unable to prepare assignments during the hands-on portion of the exam to determine the student’s mastery of the assignment’s objectives. The assignment grade based upon the result of the instructor’s review. On-ground tests may be used to compare the student’s knowledge to performance on assignments. All acts of plagiarism will be submitted the RMU Academic Integrity Board to determine university-wide penalties.
You, however, may discuss assignment requirements, assist other students with debugging programs or other hands-on-requirements, tutor students, or provide other advice that may assist the students in acquiring knowledge. But the actual preparation of an individual assignment must have been completely prepared by the student who submitted the assignment. Sections of the assignments may be copied from the internet as per the individual assignment’s directions. Please contact the instructor if you need assistance interpreting this RMU Academic Integrity Policy.
You are to enter all answers or Prtscrn requirements into this Word Document. You are not permitted to submit any other document format, e.g., Wordpad, PDFs, etc. that is not based on this original Word document. This document contains hidden internal markers and applications that will track the version of this assignment and your assignment progress.
You MUST submit the assignments using the Word document(s) provided you. You may not use any other word processor, except Microsoft Word. Do not use Open Office DOCX files.
When an instructor has possession of an electronic document it is very easy to detect plagiarism. Many instructors use Turnitin assignments, which is applicable to assignments that permit cut-and-paste as this assignment. It is very easy to compare multiple copies of word documents (see link below). Microsoft provides a variety of FREE anti-plagiarizing tools. And there is a wide variety of tools that can analyze hidden information within a Word document (see sample link below). Changing fonts, margins and spacing does not do it anymore. Even when individuals try to artificially change content, a Word document contains hidden markers that may provide an audit trail to find previous authors and computer systems who have edited the document.
Comparing and merging Microsoft Word documents – http://support.microsoft.com/kb/306484
Compare documents side by side – http://office.microsoft.com/en-us/word-help/compare-documents-side-by-side-HA010102251.aspx
Fight crime. Unravel incidents… one byte at a time.
Why am I providing some of this detailed information? There are several reasons.
1) The real world exists outside this class. A student in this class must be aware of the dangers when organizations or individuals provide electronic copies to others, e.g., an email attachment.
2) The objective of this assignment is to “introduce” minimal knowledge that is required in the real world. If you do not acquire this minimal knowledge, you will significantly harm your employment, income, promotion and retention potentials. If you do not want to do the hard work, I can recommend a better alternative to plagiarism – get a new major or career plan. Perhaps you can star in a reality TV show.
3) The majority of my students will exert the effort and submit excellent assignments. I will use many of the previous tools as time permits to ensure that you do not steal their grade. I really don’t understand why a student would provide a student with a copy of their assignment when they are competing in the same job market. In my class both the original author and the plagiarizer will be punished.
If you do not have a copy of WORD, you may use VMWARE VIEW (available from the RMU website) to access a virtual lab computer which contains any software needed for this course.
http://www.rmu.edu/web/cms/departments-offices/administration-services/it/Pages/vmware-view.aspx
NEVER STORE ANY DOCUMENTS ON THE DESKTOP OF VMWARE VIRTUAL COMPUTER. You will lose your document. It is preferable to store you documents on a local flash drive.
Since the quiz and test questions are based on your researched answers, I would recommend that you refer to any quiz questions on the assignment topics to ensure that your assignment answer is complete. Some quiz answers will NOT be provided to you unless 75% of your answers from practice attempts are correct.
YOU MUST enter your name in the beginning of this document as provided and “Save As” this document using a new name that includes your name and the assignment number, e.g., Bob Jones Assignment 2.docx
When completed, submit the FINAL version of this document to Blackboard under the Assignment folder for this individual assignment. I NEVER ACCEPT AN ASSIGNMENT AS AN EMAIL ATTACHMENT FOR ANY REASON. If you made an error on an assignment you may request that the previous assignment submission be cleared so that you may resubmit the assignment again. Please only submit a completed assignment. All assignments must use the original Word Document format. Wordpad, PDFs, etc. formats are not permitted.
While the assignments have a recommended due date, I do not penalized your assignment grade if you are slightly late. Please do not send me an email if you are going to submit your assignment late. I assume you have a good excuse.
Documenting your Results
Some requirements specify that you perform a specific action, e.g., access a web site, execute a command, etc. You will need to provide evidence that you performed this task. There are two techniques
1. Window 7 Snipping Tool – http://www.youtube.com/watch?v=Ax75dA1TGU0
2) Alt-PrtScrn – Available for all versions of Windows
1) Once the web site or the results of the command is displayed hold down the ALT key and press the Prtsc. Some laptops may require you to press the FN key to perform this action. 2) Position the cursor to answer the question in this Word document. 3) Press Ctrl-V or select Edit/paste. To make your graphic more controllable in a Word Document, after pasting 1) Right-click and select Format Picture, 2) Click on the Layout tab, and 3) Select Square ( You may also other justification settings). Now you graphic will flow with text better and can be sized more easily. Page 117-14
Requirement 1 Virtual Memory Operating Systems, Paging and Storage Protection
Many Definitions may be found in the Glossary of the Introduction to the New Mainframe: Z/OS Basics books. You can down load a PDF copy of this text book from Blackboard/Course Documents
How Operating Systems Work – http://computer.howstuffworks.com/operating-system.htm
Virtual address space – http://en.wikipedia.org/wiki/Virtual_address_space
Address space – http://searchstorage.techtarget.com/definition/address-space
What is virtual memory, how is it implemented, and why do operating systems use it?
http://www.programmerinterview.com/index.php/operating-systems/how-virtual-memory-works/
What are the advantages and disadvantages of virtual memory?
http://answers.yahoo.com/question/index?qid=20080928221645AAFAg23
3.4.4 Virtual storage overview – Introduction to the New Mainframe: Z/OS Basics – Please read
1. What is advantage of a virtual memory (storage) operating system? Answer:
2. What is disadvantage of a virtual memory (storage) operating system? Answer:
All programs to be executed must be loaded into the memory (RAM) of the computer. Programs and data must be copied from storage, e.g., a disk, and loaded in to RAM by an operating system program call a loader. In a multitasking operating system user programs must be stored in RAM a manner that doesn’t overlap or conflict with other user or operating system programs
In addition, user and system programs need a way to communicate with each other. If an operating system controls the hardware then a user program needs a communication method to ask the operating system to print output or store data on a disk.
Introduction to the New Mainframe: Z/OS Basics – Glossary
3.4.2 What is an address space? – Introduction to the New Mainframe: Z/OS Basics – please read
3.4.3 What is dynamic address translation? – Introduction to the New Mainframe: Z/OS Basics – please read
3.4.4 Virtual storage overview – Introduction to the New Mainframe: Z/OS Basics – please read
3.4.5 What is paging? – Introduction to the New Mainframe: Z/OS Basics – please read
3.4.7 What is Storage Protection? – Introduction to the New Mainframe: Z/OS Basics – please read
3. Using the following table write a discussion of following z/OS memory concepts and functions
z/OS Memory Concepts and Functions |
|
Concept |
Description |
Address Space |
|
ASID (Address Space ID) |
|
Task Control Block |
|
Private Space |
|
Storage (Protection) Keys |
|
Dynamic Address Translation (DAT) |
|
z/OS address spaces are divided into three areas: Region, Segment and Page. z/OS uses these concepts in dynamic address translation find the virtual location of a specified area of memory. While at first these concepts may sound confusing assume that visitor from Ireland wanted to find my home. Would they start searching at the first street in New York City – obviously no
First, we would start by asking which state do you want to locate (which Region)? Second, one would ask which city within the state do you want to locate (the segment table)? Third, which street within the city do you want to locate (the page table)? Finally, one can sequentially search all houses on the street or simply use the house address (the byte offset). Likewise, a virtual address uses a similar approach to uniquely identify a virtual address location and to quickly find the address later when needed.
4. Using the following table identify each virtual address concept.
z/OS Virtual Address Concepts |
|
Concept |
Function and Description |
Region |
|
Segment |
|
Page |
|
Byte Offset |
|
5. How many bits are in a z/OS virtual address? Answer:
6. The maximum of amount virtual address space the z/OS can manage is ____? Answer:
11. Using the following table, list the concept that best describes a type of page, or addressable unit.
z/OS Addressable Units |
|
Concept |
Description |
|
A page or 4K block in central storage is called _______ |
|
A page or 4K block in virtual storage is called _______ |
|
A page or 4K block in auxiliary is called _______ |
12. When a program is selected for execution, z/OS first brings the program into which type of storage? Answer:
Page faults
http://www.programmerinterview.com/index.php/operating-systems/paging-and-page-faults/
What is the purpose of swapping?
http://www.programmerinterview.com/index.php/operating-systems/purpose-of-swapping/
What is the difference between a thread and a process?
http://www.programmerinterview.com/index.php/operating-systems/thread-vs-process/
13. z/OS uses a series of tables to determine whether a page is located in real storage or auxiliary storage. Only pages within real storage can be executed. Auxiliary storage is used to extend the real memory. Using the following table describe each of the following z/OS paging concepts.
z/OS Virtual Paging Concepts |
|
Concept |
Description |
Page fault |
|
Page-in |
|
Page-out |
|
Page Stealing |
|
Unreferenced interval count |
|
Swapping |
|
System Resource Manager |
|
Workload Manager |
|
Thrashing |
|
14. Which pages are the most likely candidates to be stolen when using Page stealing? Answer:
Chapter 3: Overview of z/OS : Introduction to the Mainframe: z/OS basics ( pages 114 – 134)
Program Status Word
http://publib.boulder.ibm.com/infocenter/zvm/v5r4/index.jsp?topic=/com.ibm.zvm.v54.hcpc1/psw1.htm
Operating Systems and Program Status Word
http://www.edwardbosworth.com/My3121Textbook_HTM/MyText3121_Ch29_V01.htm
Storage Protect Keys
What is storage protection?
IBM PSW and Storage Protect Key – http://research.microsoft.com/en-us/um/people/gbell/Computer_Structures__Readings_and_Examples/00000616.htm
Each executing program in an address space has a unique program status word associated with it. Also, within each program status word there is storage protect key.
15. What is the purpose of a Program Status Word (PSW)? Answer:
16. What is the purpose of using a private address space for each user? Answer:
17. What is the function of a storage protect key? Answer:
18. A storage protect key of 0 thru 7 indicates that a program is which type of program? Answer:
19. A storage protect key of 8 indicates that a program is which type of program? Answer:
20. A storage protect key of 9 thru 15 indicates that a program is which type of program? Answer:
Requirement 2 Storage Devices, Expansion Busses and Slots
Review the videos under the Video Folder/ Bus Architecture Expansion Slots and Ports; Storage Technologies; Installing Hard Drives DVDs and Other Storage Devices
Review Storage Bus Update 2010 and Managing Disks 2010
How Hard Disks Work – http://computer.howstuffworks.com/hard-disk.htm
data transfer rate – http://www.webopedia.com/TERM/D/data_transfer_rate.html
PCI Express – http://en.wikipedia.org/wiki/PCI_Express
How PCI Express Works – http://computer.howstuffworks.com/pci-express.htm
Serial ATA – http://en.wikipedia.org/wiki/Serial_ATA
What are PATA and SATA? – http://hexus.net/tech/tech-explained/storage/1339-pata-vs-sata/
IOPS – http://en.wikipedia.org/wiki/IOPS
IOPS versus Throughput – Measuring Performance of Your Storage – http://timradney.com/2012/07/06/iops-verses-throughput/
How to convert MBps to IOPS or calculate IOPS from MB/s – http://www.ssdfreaks.com/content/599/how-to-convert-mbps-to-iops-or-calculate-iops-from-mbs
An explanation of IOPS and latency – http://recoverymonkey.org/2012/07/26/an-explanation-of-iops-and-latency/
SSD Interface Comparison: PCI Express vs SATA – http://www.overclock.net/t/1489684/ssd-interface-comparison-pci-express-vs-sata
Why SSDs are Transitioning from SATA to PCIe in the Next Gen Form Factor – http://www.tested.com/tech/pcs/456464-why-ssds-are-transitioning-sata-pcie-next-gen-form-factor/
Live USB – http://en.wikipedia.org/wiki/Live_USB
5 ways to use bootable Linux live discs – http://www.computerworld.com/article/2519158/linux/5-ways-to-use-bootable-linux-live-discs.html
Take a Secure Desktop Everywhere: Everything You Need to Know About Linux Live CDs and USB Drives – http://www.howtogeek.com/172810/take-a-secure-desktop-everywhere-everything-you-need-to-know-about-linux-live-cds-and-usb-drives/
What are the advantages and disadvantages of always running Ubuntu in “Try” mode? – http://askubuntu.com/questions/481057/what-are-the-advantages-and-disadvantages-of-always-running-ubuntu-in-try-mode
Serial ATA http://en.wikipedia.org/wiki/Serial_ATA
A Guide to Serial ATA http://www.pcmech.com/article/a-guide-to-serial-ata/
Install a New Hard Drive in Five Easy Steps http://computershopper.com/hard-drives-burners/howto/install-a-new-hard-drive-in-five-easy-steps
Data cluster – http://en.wikipedia.org/wiki/Data_cluster
Block Storage – http://en.wikipedia.org/wiki/Block_%28data_storage%29
1. Using the following table describe the following concepts related to data storage of auxiliary devices.
Concepts related to Storage Devices |
Definition or Description |
Disk Cylinder |
|
Disk Track |
|
Disk Sector |
|
Data Cluster |
|
Data Block |
|
Data Transfer Rate |
|
Seek Time |
|
Throughput |
|
MBPS |
|
IOPS |
|
SATA |
|
PATA |
|
2. Using the following table paste an appropriate Google image that illustrates the concept.
Concepts related to Storage Devices |
Google image that illustrates the concept. |
Disk Cylinder |
|
Disk Track |
|
Disk Sector |
|
Data Cluster |
|
Data Block |
|
Data Transfer Rate |
|
Seek Time |
|
Throughput |
|
MBPS |
|
IOPS |
|
SATA |
|
PATA |
|
3. In what type of applications is an IOPS throughout measurement standard more important than MBPS? Explain your answer:
4. In what type of applications is a MBPS throughout measurement standard more important than IOPS? Explain your answer:
Introduction to Disk I/O
There are three architectures that can be used to connect Disk /O devices, e.g., DASDs, tapes and printers, to a computer: 1) Directed Attached Storage (DAS), 2) Network Attached Storage (NAS), and 3) Storage Area Networks (SAN). The following diagram illustrates three legacy storage architectures used for Direct Attached Storage (DAS).
What is an I/O Channel?
Mainframes introduced the I/O Channel architecture to support overlapped processing and multiprogramming.
Assume that a computer was to input payroll data stored on tape and then output a payroll transaction record to a second tape device. Review the timing sequence when the CPU was required to process the input, payroll calculations and output tasks.
Non Overlapped Processing No Channels or I/O Processors |
|||||||
Performed by |
Processing Step |
Time Frame 1 |
Time Frame 2 |
Time Frame 3 |
Time Frame 4 |
Time Frame 5 |
Time Frame 6 |
CPU |
Read Record from Tape 1 |
Record 1 |
|
|
Record 2 |
|
|
CPU |
Calculate Payroll |
|
Record 1 |
|
|
Record 2 |
|
CPU |
Write Payroll Transaction on Tape 2 |
|
|
Record 1 |
|
|
Record 3 |
The CPU was required to perform all input, calculation and output processing steps. In the first time frame the CPU would read Record 1 from the Tape 1. In the second time frame the CPU will perform the payroll calculations for Record 1, and in the third time frame the CPU would output the modified Record 1 to Tape 2. Given the relative difference in performance between CPUs and Tape devices in the 1960s, the CPU would be idle 98% of the processing time waiting for the slower tape device. Non overlapped systems were I/O Bound, i.e., the CPU was underutilized.
While the previous picture seems to imply that an I/O channel is a connector, an I/O Channel is actual a specialized I/O processor designed to work with the CPU. Modern I/O architectures rarely use the terminology of a channel any more, but every network card, SCSI card, USB root hub, etc. has a specialized I/O processor that performs the same tasks introduced by IBM in the 1960s.
Now review the timing sequence when the CPU and two channels process the input, payroll calculations and output tasks.
Overlapped Processing A CPU and 2 I/O Channels |
|||||||
Performed by |
Processing Step |
Time Frame 1 |
Time Frame 2 |
Time Frame 3 |
Time Frame 4 |
Time Frame 5 |
Time Frame 6 |
Channel 1 |
Read Record from Tape 1 |
Record 1 |
Record 2 |
Record 3 |
Record 4 |
Record 5 |
Record 6 |
CPU |
Calculate Payroll |
|
Record 1 |
Record 2 |
Record 3 |
Record 4 |
Record 5 |
Channel 2 |
Write Payroll Transaction on Tape 2 |
|
|
Record 1 |
Record 2 |
Record 3 |
Record 4 |
In the first time frame the Channel 1 would read Record 1 from the Tape 1. In the second time frame the Channel would read the Record 2, while the CPU will perform the payroll calculations for Record 1. In the third time frame, Channel 1 would read Record 3, the CPU will perform the payroll calculations for Record 2, and Channel would output the modified Record 1 to Tape 2. Sounds great? But, one should ask if the tape device (or any storage device) is so slow the CPU will have to wait to for the slower Channel 1 and Tape 1.
What is Record Blocking?
When one allocates a data set, they must specify the data length of logical record and the block size (or blocking factor). The length of the logical record is easy to understand. The payroll department needs 200 characters to process a payroll transaction; therefore the record length should be 200 characters.
But, consider the effects if one can tell Channel1 to read three records at a time, instead of one record at a time. This would be more efficient like instead of making one trip to the pizza shop for each of three pizzas, if simply purchased three pizzas at a time. Reading or writing multiple records at a time is described as blocking records. Consider overlapped processing with a block factor of 3 200-byte records or a blocking size of 600 bytes.
Overlapped Processing Read and Write Three Records at a Time A CPU and 2 I/O Channels |
|||||||
Performed by |
Processing Step |
Time Frame 1 |
Time Frame 2 |
Time Frame 3 |
Time Frame 4 |
Time Frame 5 |
Time Frame 6 |
Channel 1 |
Read Records from Tape 1 |
Records 1, 2 and 3 |
|
|
Records 4, 5 and 6
|
|
|
CPU |
Calculate Payroll |
|
Record 1 |
Record 2 |
Record 3 |
Record 4 |
Record 5 |
Channel 2 |
Write Payroll Transaction on Tape 2 |
|
|
|
|
Records 1, 2 and 3 |
|
What determines the most efficient Block size?
The most efficient blocking size is determined by the logical record length and the specific hardware characteristics of the storage device.
The Role of Multiprogramming and Batch Processing
Overlapped Processing and appropriate block size does not solve all of the limitations of I/O bound systems. No matter what, the potential for an idle processor always exists. However, multiprogramming architectures are designed to automatically switch to another job or task when the CPU detects an idle condition waiting for an I/O device. Batch processing systems, which require no user intervention, can be scheduled at non-peak processing times. The reality is that most large scale systems (not your laptop) are most often process bound, i.e., too many tasks and input and output requirements. Other strategies to address the limitations of process bounds systems include increase processor speed, increase RAM to decrease virtual thrashing, the use of multicore processors, multiprocessing and cluster architectures.
Identifying Physical Storage Devices.
Every operating system provides a system to physically identify an I/O device and to logically identity a device. For example, Windows may physically identify an I/O device by an interrupt, I/O address and a DMA channel. However, users and applications rarely identify an I/O device with those physical attributes. Being more user-friendly a Windows user may identify a disk as Drive C: or an attached printer as LPT1:
Likewise z/OS physically identifies a device by a CHPID (channel ID), switch port number, control unit address, and unit address. Remember a control unit may have many different devices connected to it. In PC-land, a SCSI control may have15 disk drives attached to it; each identified by a unique SCSI ID. Likewise a IBM 3990 control unit may have many disk drives attached to it; each identified by a unit address.
Since a z/OS Physical I/O address is complicated and maybe static, JCL, commands, user interfaces, and error messages use device numbers. A Device Number is a unique combination of four hexadecimal numbers, e.g., 183F. In theory, a Device Number is more easy to understand than a Physical I/O address. But there is another advantage. Assume that an existing JCL statement refers a given Physical Unit number, e.g., a DASD unit number, instead of a Device Number. Suppose that this unit number changes. Then all of the JCL statements referring to that unit number needs to be change or rewritten. On the other hand, if the JCL contained a logical Device Number that refers to a Physical I/O address, the Device Number would not have to be changed on the JCL when the Physical I/O address changes. This is exactly how Internet domain names are associated with an IP address work. If Google decides to change its IP address, users do not care – since google.com continues to work.
Just as domain names must be stored and mapped to an IP address, so does a Device Number need to be stored and mapped to a Physical I/O address. A I/O control file, e.g., IOCDS (Input/Output Control Data Set) or IODF (Input/Outpt Definition File, maps the Physical I/O address to the Device Number. During the boot process, more appropriately called IPL (Initial Program Load) This data set is read and stored in system memory as a Unit Control Block (UCB).
System programmers will use device numbers more than application programmers. When an application needs access to a data set they will need to provide the name of data set and the device number. Given the large number of device numbers and the possibility that the device number may be changed, another feature will be used. Application programmers may rely on catalog data sets. When a data set is cataloged, the device number and disk volume is stored. As long as data set has a unique name z/OS looks up the data set name in the catalog to determine device number of the DASD and volume name.
I/O Switches and I/O Directors
Original mainframe I/O architectures used a Bus and Tag cable to directly attached one device or one chain of device managed by a device controller to one channel. When the channel was busy no other channel could access the device. I/O Switches and directors permit multiple channels to be connected to multiple storage device chains over higher speed connections. Not only did this prevent channel bottle necks, it also enable to the architecture to permit different LPARs to share the same devices and provide fault tolerance.
Storage Area Networks: ISCSI, IP Address and Port Numbers
Most modern large scale architectures are based on SAN architectures or Storage Virtualization. SAN devices are no longer directly attached to the server, and can be shared by multiple servers using a variety or operating systems over long distances. Without SAN technologies, load balancing, fail over, data sharing, cloud computing technologies would not be possible
Channel I/O – http://en.wikipedia.org/wiki/Channel_I/O
Channel subsystem (CSS) – http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.znetwork/znetwork_59.htm
Types of CCW Channels used to connect DASDs
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.znetwork/znetwork_59.htm
5. Using the following table describe the following concepts related to data storage of auxiliary devices.
Concepts related to Storage Devices |
Definition or Description |
Disk Channel |
|
Device Number or Disk Number |
|
Disk Partition |
|
Disk Volume |
|
Mount Point |
|
Master Boot Record |
|
EFI |
|
FDISK |
|
IODF |
|
6. Using the following table paste an appropriate Google image that illustrates the concept.
Concepts related to Storage Devices |
Google image that illustrates the concept. |
Disk Channel |
|
Device Number or Disk Number |
|
Disk Partition |
|
Disk Volume |
|
7. Is SATA an example of a storage device or a hardware interface? Explain your answer:
8. Using the following table list the advantages and disadvantages of SATA devices as compared to PATA devices.
SATA |
|
Advantages |
Disadvantages |
|
|
|
|
|
|
Disk Partition http://en.wikipedia.org/wiki/Disk_partitioning
Differences between volume, partition and drive – http://unix.stackexchange.com/questions/87300/differences-between-volume-partition-and-drive
Partitions and Volumes – http://cquirke.mvps.org/9x/partition.htm
9. What utilities does one use to partition a Windows Hard Drive? Answer:
10. What is the Primary Partition of a Windows Hard Drive? Answer:
11. What is the maximum number of physical partitions that can be created on a microcomputer disk drive? Answer:
12. What is the function of an operating system boot loader? Answer:
Video – What is the Bootloader in Android? – https://www.youtube.com/watch?v=-tXox11ngLY
GNU GRUB – http://en.wikipedia.org/wiki/GNU_GRUB
Securing the Windows 8 Boot Process – https://technet.microsoft.com/en-us/windows/dn168167.aspx
13. Complete the following table for the following popular boot loaders.
Boot Loader |
Operating System(s) |
List the name of Boot Configuration File |
Grub |
|
|
NTLDR |
|
|
BOOTMGR |
|
|
14. In the link “Securing the Windows 8 Boot Process”, list the and explain the steps of the boot process using the following table
Windows 8 Boot Process Sequence |
Explanation of the function |
1. UEFI |
|
2. OS Boot Loader |
|
3. Loading the Kernel |
|
4. Loading the System Drivers |
|
5. Load the System Files |
|
6. Load the ELAM Driver |
|
7. Load 3rd Party Drivers |
|
8. Load Anti Malware Software |
|
9. Windows Sign-in |
|
15. Using the following tale describe the following categories of rootkits.
Types of Rootkits |
Description of the rootkit |
Firmware Rootkits |
|
Bootkits |
|
Kernel Rootkits |
|
Driver Rootkits |
|
16. Explain how the Windows 8 Secure Boot feature prevents rootkits. Answer:
17. Explain how the Windows 8 Trusted Boot feature prevents rootkits. Answer:
18. Explain how the Windows 8 Early Launch Malware (ELAM) feature prevents rootkits. Answer:
19. Explain how the Windows 8 Measured Boot feature prevents rootkits.
Answer:
20. What are the performance advantages of the Extensible Firmware Interface (EFI)? Answer:
21. What are the security advantages of the Extensible Firmware Interface (EFI)? Answer:
DVD http://en.wikipedia.org/wiki/DVD
Blu-ray Disc http://www.blu-ray.com/info/
Blu-ray Disc http://en.wikipedia.org/wiki/Blu-ray_Disc
The Advantages and Disadvantages of Blu-Ray http://ezinearticles.com/?The-Advantages-and-Disadvantages-of-Blu-Ray&id=3368103
Digital Rights Management http://en.wikipedia.org/wiki/Digital_rights_management
http://www.zdnet.com/blog/hardware/update-x2-avatar-blu-ray-drm-bites-legitimate-customers/8193
22. Using the following table list and compare the storage capacity, data transfer rates and recording technologies used each of the following optical storage devices and media.
Optical Storage |
CD (Compact Disk) |
DVD (Digital Versatile Disk) |
Blue- Ray |
Storage Capacity |
|
|
|
Data Transfer Rate |
|
|
|
Recording Technology |
|
|
|
23. Digital movies are available in both DVD and Blue-Ray storage formats. Why are Blue-Ray disks replacing DVDs when used for the digital storage of movies? Answer:
34. Use google.com and search for a good buy to add a Blue-Ray drive to your computer, either internal or external. Copy-and- paste your result below. Answer:
25. What is meant by “Digital Rights Management?” Answer:
26. Which companies have been strong supporters of Digital Rights Management? Answer:
27. Legitimate customers have been having problems with DRM. What is the solution to this problem? Answer:
28. Using the following table list the advantages and disadvantages of Blu-Ray storage devices.
Blue-Ray Storage Devices |
|
Advantages |
Disadvantages |
|
|
|
|
|
|
Universal Serial Bus http://en.wikipedia.org/wiki/Universal_Serial_Bus
USB 3.0 Advantages and Disadvantages http://techie-buzz.com/gadgets-news/usb-3-advantages-disadvantages.html
Firewire http://en.wikipedia.org/wiki/FireWire
What Is the Difference Between USB and FireWire® ? http://www.wisegeek.com/what-is-the-difference-between-usb-and-firewire.htm
Review the videos under the Video Folder/ Bus Architecture Expansion Slots and Ports; Storage Technologies; Installing Hard Drives DVDs and Other Storage Devices
Review Storage Bus Update 2010 and Managing Disks 2010
29. Using the following table list the maximum data transfer rate for each of the following standards.
Standard |
Maximum Data Transfer Rate |
USB 1.0/1.1 |
|
USB 2.x |
|
USB 3.x |
|
FireWire 400 |
|
FireWire 800 |
|
FireWire S1600 |
|
FireWire S3200 |
|
30. Using the following table list the advantages and disadvantages of the USB2.x/3.x interface standard..
USB 2.0/3.x |
|
Advantages |
Disadvantages |
|
|
|
|
|
|
31. Using the following table list the advantages and disadvantages of FireWire.
FireWire |
|
Advantages |
Disadvantages |
|
|
|
|
|
|
Compact Flash memory http://en.wikipedia.org/wiki/CompactFlash
Flash memory http://en.wikipedia.org/wiki/Flash_memory
NAND flash memory – http://whatis.techtarget.com/definition/nand-flash-memory.html
Flash Memory Utilities http://www.sd-flash.com/file07.html
What are the disadvantages of USB Flash drives? http://www.answers.com/Q/What_are_the_disadvantages_of_USB_Flash_drives
Secure Digital http://en.wikipedia.org/wiki/Secure_Digital
32. What is Flash Memory? Answer:
33. Why is Flash Memory used for computer storage rather that a replacement of SDRAM using for Computer memory? Answer:
34. Explain the concept of NAND and NOR memory? Answer:
35. Compare the features and uses between NAND and NOR memory? Answer:
36. Using the following table list the advantages and disadvantages of USB Memory Sticks or flash memory.
Flash Memory |
|
Advantages |
Disadvantages |
|
|
|
|
|
|
37. Using the following table define the following concepts related to Secure Digital Cards.
Secure Digital Cards |
Definition |
MiniSD |
|
Class 2, 4 or 6 |
|
SDHC |
|
SDXC |
|
NAND |
|
Requirement 3 Solid State Drives, NAS, SANS and TOR
Video – Introduction to Solid State Drives (SSD) – https://www.youtube.com/watch?v=AB-JUyQYxIw
Important to view the previous video since many of the following questions are answered
1. What type of memory does SSD drives use? Answer:
2. What are the differences between SSD drives as compared to traditional hard drives? Answer:
3. Since a SSD uses less power, which type of computer devices and architectures will most likely benefit the most? Answer:
4. What is function of SSD Trimming as compared to utilities used on traditional hard drives? Answer:
5. SSD storage devices may be connected to a computer using either SATA or PCIe interface technologies. Please explain the pros and cons of both SATA and PCIe to connect future SSDs to small computers and devices and enterprise systems? Answer:
6. List and explain at least five uses of a Live CD, DVD or USB device to boot an operating system? Answer:
NAS versus SANS
NAS versus SANS – http://www.nas-san.com/differ.html
10 Advantages of SAN vs. DAS – http://www.serverwatch.com/trends/article.php/3925351/10-Advantages-of-SAN-vs-DAS.htm
7. While are the advantage of NAS operating system as compared to a traditional server operating system? Answer:
8. What type of communication hardware and network technologies does a NAS architectures use? Answer:
9. What type of communication hardware and network technologies does a SAN architectures use? Answer:
10. Using the following table explain each of the following 10 advantages of Storage Area Networks as compared to Directly Attached Storage.
Advantages of Storage Area Networks (SAN) as compared to Directly Attached Storage (DAS) |
|
Advantages of Storage Area Networks (SAN) |
Explanation |
1. Scalability |
|
2. Performance |
|
3. Data Isolation |
|
4. Uptime |
|
5. Workload Isolation |
|
6. Long Distance Connectivity |
|
7. Increased Utilization |
|
8. Bootable |
|
9. Centralized Management |
|
10. Disaster Recovery |
|
11. Explain how SANs may be used to support Load Balancing Clusters. Answer:
12. Explain how SANs may be used to support Fail-over Clusters. Answer:
Fibre Channel Storage Area Networks (SAN) – http://www-03.ibm.com/systems/storage/san/
13. What is Fibre Channel (FICON)? Answer:
14. How does Fibre Channel relate to SCSI, IP and FICON? Answer:
TOR – The Hidden Web ( A little more security _
TOR Project – https://www.torproject.org/
Tor (anonymity network) – http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29
15. Explain the function and security implications of TOR. Answer:
16. Why does web anonymity matter? Answer:
17. What were the U.S. Navy’s interests in the development for TOR? Answer:
18. How does TOR use Proxy servers? Answer:
19. In order for TOR to work, the Tor Project web site makes several recommendations. List at least three of these recommendations. Answer:
20. How can you use TOR from a Live USB? Answer:
21. Why is the speed of TOR limited? Answer:
22. What are the problems of using TOR to connect to a illegal web site? Answer:
23. What is the Hidden Internet (or the Deep Web) or the “.onion” domain? Answer:
Requirement 2 IBM Enterprise Concepts
Glossary: Text book ” Introduction to the Mainframe: z/OS Basics”
Introduction to z/OS and Processing Modes Hand outs – Most answers are provided here.)
The videos to accompany this hand out are listed below
Video – Introduction to zOS and Processing Modes Part-1 3-14-2014 – http://youtu.be/TrVF5GjjmJY
Video – Introduction to zOS and Processing Modes Part-2 3-14-2014 – http://youtu.be/TrVF5GjjmJY
Video – Introduction to zOS and Processing Modes Part-3 3-14-2014 – http://youtu.be/PzrbdaGAtn8
Video – Introduction to zOS and Processing Modes Part-4 3-14-2014 –
http://en.wikipedia.org/wiki/OS/360
http://en.wikipedia.org/wiki/Z/OS
http://en.wikipedia.org/wiki/MVS
http://en.wikipedia.org/wiki/OS/390
http://en.wikipedia.org/wiki/OpenVMS
1.7 Factors contributing to mainframe use – – Introduction to the New Mainframe: Z/OS Basics
1. Using the following table list several of characteristics of mainframe computers
Characteristics of Mainframe Architectures |
1. |
2. |
3. |
4. |
5. |
2. There are many factors that contributed to mainframe use. Using the following table list each factor and describe and provide an application of each factor.
Factors Attributed to Use of Mainframe Architectures |
|
Factor |
Description and application |
|
|
|
|
|
|
|
|
|
|
http://en.wikipedia.org/wiki/OS/360
http://en.wikipedia.org/wiki/Z/OS
http://en.wikipedia.org/wiki/MVS
IBM System z – http://en.wikipedia.org/wiki/IBM_System_z
OS/360 and successors – http://en.wikipedia.org/wiki/OS/360_and_successors
What is batch processing?
Batch processing – http://www.webopedia.com/TERM/B/batch_processing.html
How Batch Processing Made Me 10 Times More Productive – http://www.problogger.net/archives/2008/06/12/how-batch-processing-made-me-10-times-more-productive/
Advantages and disadvantages of batch processing and real-time processing? http://wiki.answers.com/Q/Advantages_ad_disadvantages_of_batch_processing_and_real-time_processing
Advantages & Disadvantages of Batch Processing – http://www.ehow.com/list_6632199_advantages-disadvantages-batch-processing.html
Online transaction processing – http://en.wikipedia.org/wiki/Online_transaction_processing
Transaction processing – http://www.webopedia.com/TERM/T/transaction_processing.html
OLTP (online transaction processing) – http://searchdatacenter.techtarget.com/definition/OLTP
CICS (Customer Information Control System) – http://searchdatacenter.techtarget.com/definition/CICS
3. Describe and provide an example of Batch Processing? Answer:
4. Describe and provide an example of Transaction Processing (Online Transaction Processing – OLTP) Answer:
5. Use the following table to list the advantages and disadvantages of Batch Processing?
Batch Processing |
|
Advantages |
Disadvantages |
|
|
|
|
|
|
|
|
|
|
6. Use the following table to list the advantages and disadvantages of Transaction Processing (OLTP)?
Transaction Processing (OLTP) |
|
Advantages |
Disadvantages |
|
|
|
|
|
|
|
|
|
|
7. IBM System/360 architecture and mainframe operating system OS360 were the origins of the current IBM Z Architecture. Using the following table answer the following questions
Features of the IBM System/360 Architecture |
|
|
Answer |
32-bit or 64-bit processors? |
|
Primary designed for batch or OLTP? |
|
Type of User Interfaces, e.g., terminal, online, web, etc. |
|
Support of Linux Operating systems |
|
Support for TCP/IP and Internet Services? |
|
Support of COBOL applications |
|
Support of Java Applications? |
|
z/VM
http://en.wikipedia.org/wiki/Z/VM
Processing work on z/OS: How the system starts and manages batch jobs – http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
What is TSO?
What is ISPF?
What is JES? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
Main Features of ISPF –http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.zcourses/zcourses_ispfmain_book.pdf
ISPF Primary menu and Datasets –
ISPF Data Sets
ISPF http://en.wikipedia.org/wiki/ISPF
9. What z/OS subsystem manages the execution of batch program, i.e., batch processing? Answer:
10. Historically, the only interface to manage and execute jobs on an IBM operating system was keypunch cards. The popular command line interface that programs use to access IBM operating systems, manage jobs, perform system program tasks is called? Answer:
11. What is the z/OS component (subsystem) that provides OLTP processing services for user transactions, e.g., inquiry to account balances, adding employee information into a database, etc. using legacy programming languages, e.g., COBOL? Answer:
12. z/OS is a full feature operating system that executes IBM legacy applications. z/OS frequently runs under Z/VM as a guest operating. What is the function of the z/VM? Answer:
13. What is the relationship between z/VM, z/OS and zLinux IBM Enterprise systems? Answer:
What is JES? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
What is a data set? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
What is a VTOC? http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
VSAM Catalogs – http://www.exforsys.com/tutorials/mainframe/vsam-catalogs.html
Difference between catalog and vtoc – http://ibmmainframeforum.com/viewtopic.php?f=6&t=1327
Direct access storage device – http://en.wikipedia.org/wiki/Direct_access_storage_device
z/OS UNIX file systems
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconc_whatisbatch.htm
What is z/OS UNIX?
Clustering: A basic 101 tutorial – http://www.ibm.com/developerworks/aix/tutorials/clustering/
LPAR – http://www.pcmag.com/encyclopedia_term/0,1237,t=LPAR&i=46363,00.asp
Logical partition (virtual computing platform) – http://en.wikipedia.org/wiki/Logical_partition_(virtual_computing_platform)
Introduction to JCL
http://publibz.boulder.ibm.com/zoslib/books/tutorials/introjcl/index.htm?noframes=true
IBM Parallel Sysplex
http://en.wikipedia.org/wiki/IBM_Parallel_Sysplex
What is a Parallel Sysplex 1443?
http://www-03.ibm.com/systems/z/advantages/pso/sysover.html
Rexx – http://en.wikipedia.org/wiki/Rexx
What is Rexx? – http://www.rexxla.org/rexxlang/
OS/2 REXX: From Bark to Byte – http://www.redbooks.ibm.com/redbooks/pdfs/gg244199.pdf
Implementing REXX ot Support in SDSF – http://www.redbooks.ibm.com/redbooks/pdfs/sg247419.pdf
What is a z/OS catalog? https://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconcepts_172.htm
14. Given the following IBM Enterprise Concepts
IBM Enterprise Concepts |
|
Concept |
Description |
JES |
|
LPAR |
|
VTOC |
|
DASD |
|
Data Set |
|
JCL |
|
Sysplex |
|
Catalog |
|
CICS |
|
REXX |
|
ISPF |
|
TSO |
|
3270 Terminal |
|
15. From your previous research of use lookup images using Google, paste an image that best illustrates the following concepts in the table.
IBM Enterprise Concepts |
|
Concept |
Image |
JES |
|
LPAR |
|
VTOC |
|
DASD |
|
Data Set |
|
JCL |
|
SysPlex |
|
Catalog |
|
CICS |
|
REXX |
|
ISPF |
|
TSO |
|
3270 Terminal |
|
16. What concept in Windows is comparable to IBM datasets? Answer:
Disk Volume (computing) – http://en.wikipedia.org/wiki/Volume_%28computing%29
Disk volume – http://searchstorage.techtarget.com/definition/volume
What is difference between volume and disk – http://www.storagecraft.com/support/forum/what-difference-between-volume-and-disk
Volume Label – http://pcsupport.about.com/od/termsv/g/volume-label.htm
5.6 How data sets are named – – Introduction to the New Mainframe: Z/OS Basics PDF
What are DASD volumes and labels? – http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconcepts_151.htm
17. What are DASD volumes and labels? Answer:
18. On what type of device may data sets be stored? Answer:
19. How are data sets named? Answer:
20. What is the difference between a VTOC and a catalog Answer:
21. VTOC is similar to which storage concept in Windows? Answer:
22. Partitioned Data Set is similar to which storage concept in Windows? Answer:
What is VSAM? – http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconcepts_169.htm
Virtual Storage Access Method (VSAM) – http://en.wikipedia.org/wiki/VSAM
VSAM Demystified (Chapter 1) – http://www.redbooks.ibm.com/redbooks/pdfs/sg246105.pdf
Key-sequenced data set (KSDS) – http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqncd_data_set.html
Relative record data set (RRDS) – http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqncd_data_set.html
Entry-sequenced data set (ESDS) – http://publib.boulder.ibm.com/infocenter/txformp/v7r1/index.jsp?topic=/com.ibm.cics.tx.doc/concepts/c_key_sqncd_data_set.html
Record-oriented filesystem – http://en.wikipedia.org/wiki/Record-oriented_filesystem
Introduction to Partitioned Data Sets – http://docweb.cns.ufl.edu/docs/d0068/ar01.html
23. An IBM 3270 terminal is used with what z/OS operating interactive facility? Answer:
24. What is VSAM? What is VSAM used for? Answer:
25. IBM files are record-oriented. Windows and Linux files are byte-oriented. When Windows or Linux stores files, e.g., a Word Document it stores the contents of the files as a contiguous series of bytes until the end of the file. On the other hand, a record is a group of related data, words, or fields treated as a meaningful unit; for instance, a Name, Address, and Telephone Number can be a “Personal Record”. Therefore, IBM files were primarily designed to store business data rather than a Word document or graphic file. What were the advantages of the IBM record-oriented files. Answer:
26. Using the following table describe each of the following VSAM Dataset types that are used to store business transaction data.
VSAM DataSets Organization |
|
Dataset Type |
Description |
Key-sequenced data set (KSDS) |
|
Entry-sequenced data set (ESDS) |
|
Relative record data set (RRDS) |
|
Linear data set (LDS) |
|
27. As an alternative to a VSAM dataset IBM provides for a Partitioned Dataset . Describe how a Partition data set stores data? Answer:
28. What type of data is normally stored in a Partitioned data set? Answer:
29. Using Google find an appropriate image that illustrates the concept of a Partitioned Data Set Answer:
30. Within the structure of IBM JCL what is a JOB? Answer:
31. Within the structure of IBM JCL what is a DD statement Answer:
IMS http://en.wikipedia.org/wiki/Information_Management_System
Hierarchical database systems http://en.wikipedia.org/wiki/Hierarchical_database
DB2 http://en.wikipedia.org/wiki/IBM_DB2
RACF – http://en.wikipedia.org/wiki/RACF
32. What are the functions provided by IBM’s IMS Product Line (Information Management System)? Answer:
33. What are the functions provided by IBM’s DB2 product line? Answer:
Security on z/OS – http://wwwlgis.informatik.uni-kl.de/cms/fileadmin/users/kschmidt/mainframe/lutzkuehner/Chapter11_Security_on_zOS_slides.pdf
What is RACF? – http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zsecurity/zsecc_042.htm
Resource Access Control Facility – http://en.wikipedia.org/wiki/Resource_Access_Control_Facility
Security on z/OS
http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.zsecurity/zsecurity_book.pdf
SNA
http://en.wikipedia.org/wiki/IBM_Systems_Network_Architecture
Networking on Z/OS
http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.znetwork/znetwork_book.pdf
34. What are the functions and features provided by IBM’s RACF product line (Resource Access Control Facility)? Answer:
35. What are the functions provided by IBM’s SAF? Answer:
36. What is function of SNA? Answer:
37. How is SNA related to TCP/IP? Answer:
38. What is IBM Web Sphere? Answer:
39. What is IBM Web Sphere MQ? Answer: