Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Sample jcl to send email with attachment

01/12/2021 Client: muhammad11 Deadline: 2 Day

Contents Assignment 2 Theory Introduction 4 Researching Your Answers 4 A Little Advice Before you start 5 Demonstrating Knowledge and Increased Penalties for Irrelevant Answers 6 You Must Submit YOUR Answer in this Original Word Document to Blackboard 6 You Must RENAME this Original Word Document to Include your LAST NAME 7 NEVER submitted an Assignment as an Email Attachment 7 ONLY Submit a FINAL Version of ALL Assignment 7 Requests to Clear Previously Assignments for Re-Submission 7 Submitting Late Assignments 7 Academic Integrity and Plagiarism 8 How to complete Content Questions 9 1.0 z13 System Hardware, I/O and Storage Technologies 10 1.1 Question - z13 System Hardware Concepts 11 1.2 Questions - z13 System Frames 13 1.3 Questions - Z13 CPC Drawers 14 2.0 z13 System External I/O Connectivity and Storage 17 2.1 Questions - PCIe Interfaces 17 2.2 Questions - Legacy CHPIDs, Physical I/O Addresses and Device Numbers 18 2.3 Questions - Storage Area Network (SAN) 19 3.0 – Memory Management, Task Management and Control Blocks 20 3.1 Questions – Introduction to Memory and task Management 20 3.2 Questions - Control Blocks 22 3.3 Questions - Program Status Word (PSW) 24 3.4 Memory Isolation 25 3.5 Storage Protect Keys 25 3.5 Questions – Memory Isolation and Storage Protect Keys 27 4.0 z System Virtualization, Sysplex and Parallel Sysplex 28 4.1 Questions – Introduction to Virtualization 28 4.2 Questions - Server Virtualization Technologies 30 4.3 Server Virtualization and Cluster Technologies 31 4.4 Server Virtualization and Cluster Technologies 32 5.0 - Virtual Memory Operating Systems, Virtual Addresses and Paging 34 5.1 Questions – Virtual Memory Operating System 35 5.2 Dynamic Address Translation 36 5.3 Questions - Format of a Virtual Address 37 Frames, pages and slots 38 5.2 Questions - z/OS Virtual Paging Concepts 39 5.0 Hexadecimal 40 5.1 Hexadecimal Number System 40 5.2 Displaying Hexadecimal Values when Using the ISPF Editor 42 5.3 Viewing Hidden Characters with Word 44 5.4 Other uses for Hexadecimal Notation 45 5.5 Questions – Hexadecimal 46 6.0 - Interrupt Processing, Serialization and System Messages 48 6.1 z/OS Interrupt Processing 48 6.2 Preemptable versus non-preemptable 50 6.3 Serializing the use of resources 50 6.4 Questions - Interrupt Processing and Multiprogramming 50 6.5 Questions - Types of z/OS Interrupts 51 6.6 Questions -Resource Serialization and Locking 52 6.7 Question - JES System Message format 53 7.0 Job Control Language 54 7.1 Questions - Introduction to JCL 55 7.2 Questions - JCL JOB Statement 58 7.3 Questions - JCL EXEC Statement 65 7.4 Questions - Return Codes and the JCL COND parameter 67 7.5 Question - JCL DD Statement 72 7.6 Questions - JCL Concatenation 76 7. 7 Questions - Find the JCL Error 77 7.8 JOBLIB, JOBCAT, STEPLIB, STEPCAT 78 7.9 Questions – Reserved DD names 79 7.10 Questions – Instream Data and Cataloged Procedures 80

Enter your Name Here

Assignment 2 Theory Introduction
Researching Your Answers
Most requirements of this assignment will require you to research answers from your text book (you must read the text book to get some answers), from the Internet, from a video or any other reasonable source. Many Internet sources, video links, text book and Blackboard presentations are provided in this document to help you START your research.

Assignments are always a great place to read and reference your text book. May students assume that they should start by reading the text book. While this reading the text book is ALWAYS at great idea, the following assignment questions may help you focus on what is important in this course . One strategy is to review an assignment question for important keywords, e.g., multitasking, Procedure Division, virtualization, etc. Then look for those key words in either 1) your text book "detailed" table of contents in the beginning of the book, or 2) in the index at the end of the book. Some text books have key word glossaries at the end of the chapter or end of the book.

Every semester the Internet sources, e.g., a Google keyword search, or Internet video, e.g., a YouTube keyword search may be improved. Better students start with research sources provided in this assignment, and then search for improved or updated answers. While your objective may be to demonstrate your knowledge to EARN an excellent grade on this assignment, better students are always looking towards the future to impress internship and career recruiters for those interesting and high entry-level salaries. Employers don't pay you for a grade in any single class or assignment. Employers will pay you BIG MONEY for demonstrated knowledge or skills. Hopefully, this assignment will prepare you.

A single research source maybe very incomplete or the format or the content may not be appropriate for some required answers. Some students do not READ the text book or review the Blackboard presentations provided to you in Blackboard. Some answers are only available from Blackboard presentations or update documents. When assignment requirements may be only answered by viewing a YouTube video, you will be notified.

You may cut-and-paste answers whenever appropriate. You MUST synthesize your answers to include multiple sources. I would be impressed that you consult a Google image search and paste and appropriate image to supplement your answer.

While I permit cut-and-paste, I do expect you use your own words so that you:

1. Organize the answer

2. Demonstrate that you have read what you have cut-and-pasted

3. Use any means that clearly displays that you have gained knowledge.

A Little Advice Before you start
There is NO requirement to read each reference link or view each video in detail. Some of the links will have overlapping content. Some links will provide more information than the question requirements, but employers consider these topics to be minimal knowledge of a RMU CIS graduate.

It is recommended to visit each reference link and overview the content. Then read each question and return to each reference link or video as needed. You may supplement your answers with content from your text book by using a question keyword and looking up in the glossary or index in the back of the book. PDF text books can be easily searched for keywords.

It is not required to read your text books before working on this assignment unless specified in a requirement. Text book contents are used to support quiz questions (which contain the answers), which are used on the tests. The reference links and videos are excellent resources.

The topics presented in the course assignments have been highly recommended by two or more employers who recruit RMU CIS students as minimum computer hardware, operating system, and application development knowledge. Employers expect that students should be able to present one or two sentences of the majority of keywords applicable to job requirements in a face-to-face interview.

On the other hand, each assignment is allocated 100 points out of a total of 1000 points. The number of questions or hands-on activity on each assignment varies. Assume that an average assignment has 50 requirement questions. This means that a requirement may be worth 2 points towards your final grade. The bottom line is that missing a few questions will have little effect of your assignment or final grade. Not completing an assignment will generally decrease your final grade by at least a letter grade. Do not waste time on the small problems.

Demonstrating Knowledge and Increased Penalties for Irrelevant Answers
If you can DEMONSTRATE your knowledge of the topic for the requirement there will be no penalty for your answer. It is not the intention of this assignment to be "not picky". Parital credit will be awarded as appropriate.

If you cut-and-paste and pray that your instructor will not read your inappropriate and irrelevant answer, the question will be penalized by increasing the deduction points beyond the original requirement points. The instructor hates irrelevant cut-and-paste BS, or answers that appears that the student is guessing and hopes the instructor does not read the answer.

The instructor reserves the right to increase the penalty for any submitted question or assignment that may be construed as "wasting the instructor's time". Therefore, a four-point requirement may be penalized as six-points (two additional point penalty for wasting the instructor's time). Sometimes blank answers will earn you’re a high assignment grade than BS answers. For example, a submitted 100-point assignment may be penalized as 125 minus points when your final grade is calculated for any assignment that should have never been submitted in the first place.

You Must Submit YOUR Answer in this Original Word Document to Blackboard
This Assignment Word Document will contain hidden markers that may be used to detect plagiarism and provide an audit trail of those who may have modified the Word document. Many students in my classes work very hard to complete and learn from their assignments. It is not fair to those students who have professionally demonstrated their knowledge to receive the same grade as those who have plagiarized their assignments

You MUST answer ALL requirement in this Word document and ONLY THIS Word Document. You MAY NOT use or edit any other word processor, except any version of Microsoft Word.

Do not use GOOGLE DOCS or Open Office DOCX files at any time. If you use any other Word Processor you will be assigned ZERO credit.

If you do not have a copy of WORD, you may use VMWARE VIEW (available from the RMU website) to access a virtual lab computer which contains any software needed for this course.

http://www.rmu.edu/web/cms/departments-offices/administration-services/it/Pages/vmware-view.aspx

NEVER STORE ANY DOCUMENTS ON THE DESKTOP OF VMWARE VIRTUAL COMPUTER. You will lose your document. It is preferable to store your documents on RMU Drive U: If necessary you can email the document to yourself.

You Must RENAME this Original Word Document to Include your LAST NAME
YOU MUST enter your name in the beginning of this document as provided and "Save As" this document using a new name that starts with your LAST NAME, assignment number and semester, e.g., Jones Assignment 1 Fall 2016.docx

If you do not rename your document your assignment will be penalized by 10%.

NEVER submitted an Assignment as an Email Attachment
All assignments are to be submitted to the instructor by using the Assignment Link in the Blackboard system. Assignments submitted as an email attachment will NOT be graded. THE INSTRUCTOR NEVER ACCEPTS ANY ASSIGNMENT AS AN EMAIL ATTACHMENT FOR ANY REASON.

ONLY Submit a FINAL Version of ALL Assignment
Never submit an incomplete assignment for grading. Only submit your final version of ALL assignment documents for grading. You can only submit an Assignment once.

Requests to Clear Previously Assignments for Re-Submission
If you make an error submitting an assignment you must contact the instructor to clear your previous assignment submission. If you made an error on any assignment you may request that the previous assignment submission be cleared so that you may resubmit the assignment again. Please only submit a completed assignment.

Submitting Late Assignments
While the assignments have a recommended due date, the instructor does not penalized your assignment grade if you are slightly late. Please do not send the instructor an email if you are going to submit your assignment late. The instructor is flexible and assumes you have a good excuse. But, after you are more than two weeks late the instructor does reserve to penalize the assignment or not accept the assignment if this late submission is unfair to other students enrolled in the course who had completed their assignments on time.

It has been the experience of the instructor that students who are excessively or consistently late asks a friend to provide them a copy of their assignment which will violate the RMU Academic Integrity Policy. (Please carefully read the next section!) If a friend asks you for a copy of your assignment "to get an idea what the instructor wants", you are risking a zero assignment grade, an F final grade, or a RMU Academic warning or suspension.

Academic Integrity and Plagiarism
When an instructor has possession of an electronic document it is easy to detect plagiarism. Microsoft Word provides a variety of FREE anti-plagiarizing tools. The content of your submitted Assignment WORD document will be COMPARED to each other student who has submitted this assignment in the current class or any previous class as time permits. The content of each student's assignment may NOT be copied from any other current or past student enrolled in this class. Each assignment is to be prepared by ONE student. Assignments are NOT a group-prepared assignment.

Some students may attempt to SAVE AS another student's completed assignment and rename it using their name. Some students may attempt to Cut-and-Paste answers from one student's assignment document to another student's assignment document. But as time permits, the forensic tools used to compare ALL student's assignments with other assignment will often detect anomalies which will provide absolute proof of plagiarism. On-ground tests may be used to compare the student’s knowledge to performance on assignments. All acts of plagiarism and forensic data will be submitted the RMU Academic Integrity Board to determine university-wide penalties, such as grade penalties, warnings, suspension, and change of a previous course grade for previous course students. All current and previous students involved in the plagiarism may be affected RMU Academic Integrity Board.

If a friend asks you for a copy of your assignment "to get an idea what the instructor wants", you are risking a zero assignment grade, an F final grade, or a RMU Academic warning or suspension. You are responsible to protect your assignment Word Document.

You, however, may discuss assignment requirements, provide research assistance, assist other students to debug programs or other hands-on-requirements, tutor students, or provide other advice that may assist the students in acquiring knowledge. But the actual preparation of an individual assignment must have been completely prepared by the student who submitted the assignment. Sections of the assignments may be copied from the internet as per the individual assignment's directions. Please contact the instructor if you need assistance interpreting this RMU Academic Integrity Policy. (Ref.16-1.)

Many believe that if you a "stupid" enough provide another student, whom may compete with you for a future internship or career, a copy of your assignment, then you deserve the same penalty as the other student. If you are a "real" friend, tutor your friend.

The instructor reserves the right to require face-to-face hands-on demonstrations or face-to-face tests to provide additional evidence to be submitted to the RMU Academic Integrity Board.

How to complete Content Questions
Review questions are also be provided at the end of the tutorial. The following is an example of a review question format. Since type the answer in provided grey or colored box.

1. What is the purpose of a partitioned data set? Answer:

Type in the answer to the question into the grey or colored box.

It is recommended that you use Table of Contents at the beginning of the tutorial to review and navigate to the concept presented in the review question. Students will find that using the document FIND tool or searching GOOGLE may also be valuable for researching the review question answer.

You MUST type or paste your answer in the box or table area provided, else you will receive ZERO credit. Simply position the cursor inside box or table and type or paste your answer.

1.0 z13 System Hardware, I/O and Storage Technologies
Read the Introduction to the System z13 Architecture Document

Read the Virtualization and Cloud Computing Document

IBM z13 Mainframe - www.slideshare.net/DarrenDonaldson/ibm-z13-mainframe

Z13 update - http://www.slideshare.net/StigQuistgaard/z13-update

The IBM z13 – Server - http://www.vmworkshop.org/docs/2015/r9fgSpBF.pdf

Bus and Tag Channels http://en.wikipedia.org/wiki/IBM_System/360#Channels

ESCON - http://en.wikipedia.org/wiki/ESCON

FICON - http://en.wikipedia.org/wiki/FICON

Channel subsystem (CSS) - http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.znetwork/znetwork_59.htm

IBM Storage - http://www-03.ibm.com/systems/storage/disk/

IBM Storage - https://en.wikipedia.org/wiki/IBM_Storage

1.1 Question - z13 System Hardware Concepts
1. Describe or define the following z System Mainframe Concepts using the following table.

z13 System Hardware Concepts

Concept

Description

Drawer

Busses

PU Processor

Storage Controller

DDR3

Sysplex

Coupling Facility Processor

Channel Subsystem

Node

IBM DS8000 Storage Server

IBM XIV

.Summer 2018

RAIM

IBM Flash Express

.Summer 2018

OSA

Opens System Adapter

FICON Express 16s

PCIe Drawers

.Summer 2018

1.2 Questions - z13 System Frames
2. An IBM mainframe design is based on a two-frame (storage rack) design, which are named the A-Frame and the Z-Frame. (See previous image.) List the mainframe hardware components that are normally installed in the A-Frame. Answer:

.Summer 2018

3. (See previous image.) List the mainframe hardware components that are normally installed in the z-Frame. Answer:

.Summer 2018

1.3 Questions - Z13 CPC Drawers

4. IBM z13 processor technologies are stored in a packaging unit called a "drawer". List the hardware components normally found in a z System book packaging unit. Answer:

.Summer 2018

5. What are the maximum number of "drawers" that may be installed in an IBM z 13 mainframe? Answer:

.Summer 2018

6. What are the differences between a z13 drawer and a z13 nodes? Answer:

.Summer 2018

7. List the total amount of system memory that can be installed z13 Mainframe and a CPU drawer? Answer:

IBM z13 Performance: The Benefits of Large Memory - http://mainframeinsights.com/ibm-z13-performance-benefits-large-memory/

Benefits of Configuring More Memory in the IBM z/OS Software Stack - http://www.redbooks.ibm.com/redpapers/pdfs/redp5238.pdf

8. List at least four advantages of using large memory? Answer:

9. List the maximum number of z13 CPU drawers that can be installed in a mainframe? Answer:

10. List the maximum number of processors that can be installed/activated in a z13 CPU drawer. Answer:

11. List the maximum number of cores in z/13 processors. Answer:

12. What is the difference between a z13 Physical Unit (PU) processor and a Storage Controller (SC) processor? Answer:

13. Compare the performance of z13 Physical Unit (PU) processors to Intel, AMD, etc., processor performance of in terms of general purpose and specialize workloads? Answer:

14. Explain the concept of Spare processors? Answer:

15. What are the advantages of Capacity-on-Demand processors and cores? Answer:

16. Which type of communication technology is used to interconnect z13 CPU drawers and external I/O technology? Answer:

17. What are the advantages of using IBM Flash Express? Answer:

18. Compare the access speeds between z13 DDR3 RAIM System Memory, IBM Flash Express, and external solid state drives. Answer:

19. Describe the functions and advantages of IBM zAware technologies. Answer:

20. List the communication technology used to interconnect z 13 CPC drawers. Answer:

2.0 z13 System External I/O Connectivity and Storage
Read the Introduction to the System z13 Architecture Document

Read the Virtualization and Cloud Computing Document

2.1 Questions - PCIe Interfaces
1. What is the difference between a z13 CPU Drawer and z12 PCIs Drawer? Answer:

.Summer 2018

2. List the three technology components of a PCIe Adaptor. Answer:

.Summer 2018

3. What are the advantages of using the z13 PCIe Fanout Adaptors? Answer:

.Summer 2018

4. What are the differences between a PCIe FICON Adaptor and a PCIe OSA Adaptor? Answer:

.Summer 2018

5. List four or more examples of the functions of PCIe OSA Adaptor in a data center. Answer:

.Summer 2018

2.2 Questions - Legacy CHPIDs, Physical I/O Addresses and Device Numbers
Enterprise System Connection - http://www.hill2dot0.com/wiki/index.php?title=ESCON

6. What is the function of CHPIDs or PHHIDs? Answer:

.Summer 2018

7. What is a Physical I/O address? Answer:

.Summer 2018

8. What are the components of a Physical I/O address? Answer:

.Summer 2018

.Summer 2018

9. What is the difference between a Device Number and a Physical I/O address? Answer:

What an I/O configuration is? - http://publib.boulder.ibm.com/infocenter/zos/v1r11/index.jsp?topic=/com.ibm.zos.r11.ieag800/iea2g89006.htm

10. Where are device numbers defined? Answer:

.Summer 2018

11. What is the function of a unit control block (UCB)? Answer:

.Summer 2018

2.3 Questions - Storage Area Network (SAN)
Most modern large scale architectures are based on SAN architectures or Storage Virtualization. SAN devices are no longer directly attached to the server, and can be shared by multiple servers using a variety or operating systems over long distances. Without SAN technologies, load balancing, fail over, data sharing, cloud computing technologies would not be possible

Fibre Channel Storage Area Networks (SAN) - http://www-03.ibm.com/systems/storage/san/

Start at page 31 Introduction to Storage Area Networks and System Networking - http://www.redbooks.ibm.com/redbooks/pdfs/sg245470.pdf

Video - NAS and SAN Introduction (Eli the Computer Guy) - https://www.youtube.com/watch?v=csdJFazj3h0

Video - Storage Virtualization - https://www.youtube.com/watch?v=-NeMJFT55YU

Video - What is iSCSI and how to use it - https://www.youtube.com/watch?v=pG2H-WatFbo

Video - Introduction to Storage Area Networks (SAN) - https://www.youtube.com/watch?v=teEsgqI49Dk

SAN Explained - Storage (or System) Area Networks - https://www.lifewire.com/definition-of-san-818007

10 Advantages of SAN vs. DAS - http://www.serverwatch.com/trends/article.php/3925351/10-Advantages-of-SAN-vs-DAS.htm

Advantages of using a Storage Area Network - http://blog.dnfcorp.com/?p=2063

Video - Introduction to Storage Area Networks (SAN) - https://www.youtube.com/watch?v=teEsgqI49Dk

11. What is a Storage Area Network (SAN)? Answer:

12. What are the components of a SAN network? Answer:

13. List 5 or more reasons why SAN architectures are important with mainframes, virtualization and data center? Answer:

14. What is the function of Fibre Channel? Answer:

15. What is function of iSCSI Answer:

16. If you were going to connect a z13 server to a SAN using iSCSI, explain which type of PCIe adaptor should be used. Answer:

3.0 – Memory Management, Task Management and Control Blocks
Read the Introduction to Memory Management and Task Management

Video - z/OS System Memory Architecture - Unit-10 https://youtu.be/viLXEL27R2s

IBM Paul Newton's presentation and demonstration of z/OS address spaces, virtual storage and paging, and using key-controlled protection for system integrity.

See Blackboard Folder "Paul Newton's System z Presentations" for a copy of this Presentation

Chapter 3: Overview of z/OS: Introduction to the Mainframe: z/OS basics

Video - Introduction to Operating Systems - http://www.youtube.com/watch?v=MzVGL44eq9w

Video - Principles of Operating System - Lecture 2 - http://www.youtube.com/watch?v=OJy9C5Gn4Sc

The following inserted discussions are designed to help the reader understand the text book better, compare z/OS to Windows and Linux, and most importantly to answer some of the following questions.

3.1 Questions – Introduction to Memory and task Management
1. What is function of a z/OS Address Space? Answer:

2. What is type of storage content is stored in an Address Space? Answer:

3. In a z/OS operating system how is address space uniquely identified? Answer:

4. What are the differences between the ASID and a z/OS Job or Job Name/JOBID? Answer:

5. A z/OS Job Name or Job ID is conceptually similar to which Windows or Linux concepts? Answer:

6. What is a z/OS subsystem? Answer:

7. What does z/OS subsystem, Linux Daemon, and Windows Service processes have in common? Answer:

8. ADD at least three additional process examples for each of the following operating systems using the following

Type of Processes

Specific Process Examples

Your Answers

z/OS Subsystem

DB2

Linux Daemon

httpd

Windows Service

Windows Update

9. Which z/OS JOBNAME is assigned the ASID value of 1? Answer:

10. Which Linux process is assigned the PID value of 1? Answer:

11. What are the function of z/OS *MASTER* JOBNAME or the Linux init process? Answer:

3.2 Questions - Control Blocks
Process Control Block

http://computer.howstuffworks.com/operating-system6.htm

z/OS Control Blocks for Beginners ( a little advanced)

http://www.trainersfriend.com/Papers/SHARE-Denver-Control-blocks.pdf

What are control blocks? (a little advanced)

http://idcp.marist.edu/pdfs/ztidbitz/31%20zNibbler%20%28zOS%20Control%20Blocks%29.pdf

Control Blocks for Beginners Pt 1: The Basics

http://www.longpelaexpertise.com.au/ezine/CtBlksBeginners1.php

Control Blocks for Beginners Pt 2: z/OS Control Blocks http://www.longpelaexpertise.com.au/ezine/CtBlksBeginners2.php

ABCs of Control Blocks

http://idcp.marist.edu/pdfs/ztidbitz/31%20zNibbler%20(zOS%20Control%20Blocks).pdf

Process control block http://en.wikipedia.org/wiki/Process_control_block

Task Control Block http://en.wikipedia.org/wiki/Task_Control_Block

How do Process Control Blocks work? (in IBM known as a Task Control Block) - http://computer.howstuffworks.com/operating-system6.htm

Resource Control - http://publib.boulder.ibm.com/infocenter/zos/v1r11/index.jsp?topic=/com.ibm.zos.r11.ieaa600/ienqrt.htm

Control blocks are special areas of memory which enables the operating system to remember where it left off. But, every time the operating system switches between processes it incurs a performance or overhead penalty. Control blocks may also contain status information. For example, how many processors and cores do I have? (A System Control Block) How storage devices do I have? (A Resource Control Block) How many jobs do I have waiting to be processed or currently executing? (A Job Control Block) An operating system can be viewed as an executing program managed by the data stored in the control blocks.

Many Definitions may be found in the Glossary of the Introduction to the New Mainframe: Z/OS Basics books

12. What is the function of a z/OS control block? Answer:

13. The address space executing application program (a process or task) normally contains program instructions and data. Control blocks are NOT stored within the address space of the executing program. In which program address space will control block data be stored? (Hint: Which program is control of the managing executing applications? When you are working at your desk at work who is iin charge of managing your work schedule? )

14. What type of information is stored in a z/OS control block? Answer:

15. Describe the data stored in each of the following types of z/OS Control blocks.

Data Stored in z/OS Control Blocks

Category of z/OS Control Block

Data Stored

System-related

Resource-related

Job-related

Task-related

16. What is the difference between a Job-related control block and a Task-related control block? Answer:

3.3 Questions - Program Status Word (PSW)
Control blocks contain operating system data for ALL system features, resource, jobs and tasks. However, the Process Status Word (PSW) stores data in a control register within in a processor or processor core for only the currently executing program, not for ALL programs. The content of the Program Status Word is copied to the task control block during a context switch. The PSW controls the processor during execution. The actual control data stored in a PSW varies by the computer architecture. A z System PSW will store multiple Storage Protect Keys (discussed shortly), the address on the currently executing instruction, and the address of next instruction to be executed. In addition, the PSW will store following data

· Access data and registers - Specifies the ASID where the data is to be found

· General data and registers - Binary numeric and text data (ECDBIC) that is being executed by the processor at this time

· Floating point registers - Floating-point the binary numeric data that is being executed by the processor at this time

A computer ABEND is an abnormal termination of software, or a program crash. To diagnose the cause the computer crash, the information stored in PSW may be useful.

Program Status Word - http://www.encyclopedia.com/doc/1O11-programstatusword.html

Program Status Word - https://www.ibm.com/support/knowledgecenter/SSB27U_6.3.0/com.ibm.zvm.v630.hcpc1/psw1.htm

Abnormal end (Abends) - https://en.wikipedia.org/wiki/Abnormal_end

Reporting abends - https://www.ibm.com/support/knowledgecenter/SSLTBW_2.1.0/com.ibm.zos.v2r1.gim0000/repabnd.htm

17. What is the purpose of the information stored in a Program Status Word (PSW)? Answer:

18. What is a mainframe ABEND? Answer:

19. What is the relationship between the Program Status Word (PSW) and a mainframe ABEND? Answer:

3.4 Memory Isolation
It is very important, the address space of the Word application program and data be separated and isolated from the address of Excel application program and data, just like you do not want virus not to invade the address space of an executing application or stored data on your disk. However, many operating systems were written in the C programming language, and these operating systems were unable to directly protect and isolate address space. While Windows, UNIX and Linux have introduced many solutions to improve address space isolation, no other solution is comparable close to the level protection and performance of z System Storage Protect Keys, which provides a hardware and software memory protection system for over 40 years. Since Windows, UNIX and Linux are designed to support any hardware platform, they cannot provide the same hardware enforced memory protection as z/OS Storage Protect Keys. Windows Vista introduced a secured kernel in 2003 and Linux introduced SeLINUX (Security-Enhanced Linux) in 1998, but neither operating system provides hardware protection. IBM software and hardware Storage Protect Keys have been in use for over 50 years.

Many programs and users are competing for the use of the system. So how does z/OS® preserves the integrity of each user's work? One technique is through the use of multiple storage protect keys.

3.5 Storage Protect Keys
Under z/OS, the information in central storage is protected from unauthorized use by means of multiple storage protect keys. A control field in storage called a key is associated with each 4K frame of central storage.

When a request is made to modify the contents of a central storage location, the key associated with the request is compared to the storage protect key. If the keys match or the program is executing in key 0, the request is satisfied. If the key associated with the request does not match the storage key, the system rejects the request and issues a program exception interruption.

When a request is made to read (or fetch) the contents of a central storage location, the request is automatically satisfied unless the fetch protect bit is on, indicating that the frame is fetch-protected. When a request is made to access the contents of a fetch-protected central storage location, the key in storage is compared to the key associated with the request. If the keys match, or the requestor is in key 0, the request is satisfied. If the keys do not match, and the requestor is not in key 0, the system rejects the request and issues a program exception interruption.

z/OS uses 16 storage protect keys. A specific key is assigned according to the type of work being performed. The key is stored in bits 8 through 11 of the program status word (PSW). A PSW is assigned to each job in the system.

Storage protect keys 0 through 7 are used by the z/OS base control program (BCP) and various subsystems and middleware products. Storage protect key 0 is the master key. Its use is restricted to those parts of the BCP that require almost unlimited store and fetch capabilities. In almost any situation, a storage protect key of 0 associated with a request to access or modify the contents of a central storage location means that the request will be satisfied.

By default ALL the z/OS operating system, subsystems and application program space are isolated. The Storage Protect Keys provide a mechanism that provides an application program the limited ability to access the address space operating system, subsystem and other application programs and data. Storage Protect Keys are assigned on a program -by-program basis. For example, the Storage Protect Key 0, also called the Master Key, means that those base control programs (system kernel) can access any address space, but very few programs can access its address space. How does this base control program give permission for others to access its address space? It assigns one or more protection keys to a list buddy's list FaceBook friend list (I think that is what they call it). This Storage Protect Key List may state that I will talk with all programs who have a Storage Protect Key of 2 and 4, but no other program.

O.K. Why can't I compile my own application program with a Storage Protect Key of 0? Good question. But, only IBM and third party vendors may use Storage Protect Keys 0 thru 7. An IBM customer cannot. On the other hand, IBM customer may use Storage Protect Keys 0 through 15 to create their own customized address space storage protection plan. But, most applications use NO Storage Protect Keys since they require the default to provide the most security for memory isolation.

Chapter 3: Overview of z/OS: Introduction to the Mainframe: z/OS basics (Pages 114 - 134)

Program Status Word

http://publib.boulder.ibm.com/infocenter/zvm/v5r4/index.jsp?topic=/com.ibm.zvm.v54.hcpc1/psw1.htm

Operating Systems and Program Status Word

http://www.edwardbosworth.com/My3121Textbook_HTM/MyText3121_Ch29_V01.htm

Storage Protect Keys

http://publib.boulder.ibm.com/infocenter/pseries/v5r3/index.jsp?topic=/com.ibm.aix.genprogc/doc/genprogc/storage_protect_keys.htm

What is storage protection?

http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp?topic=/com.ibm.zos.zconcepts/zconcepts_95.htm

IBM PSW and Storage Protect Key - http://research.microsoft.com/en-us/um/people/gbell/Computer_Structures__Readings_and_Examples/00000616.htm

Each executing program has a unique program status word associated with it. Within each program status word there is a storage protect key.

3.5 Questions – Memory Isolation and Storage Protect Keys
28. What are the advantage of using a private address space for each user? Answer:

.Summer 2018

20. What is the function of a storage protect key? Answer:

.Summer 2018

21. A storage protect key of 0 thru 7 indicates that a program is which type of program? Answer:

.Summer 2018

22. A storage protect key of 8 indicates that a program is which type of program? Answer:

.Summer 2018

.Summer 2018

23. A storage protect key of 9 thru 15 indicates that a program is which type of program? Answer:

.Summer 2018

4.0 z System Virtualization, Sysplex and Parallel Sysplex
Read the Introduction to the System z13 Architecture Document

Read the Virtualization and Cloud Computing Document

Video - Introduction to Virtualization - https://www.youtube.com/watch?v=zLJbP6vBk2M

What is Server Virtualization? - http://www.iscsi.com/resources/Server-Virtualization.asp

Top 10 benefits of server virtualization - http://www.infoworld.com/article/2621446/server-virtualization/server-virtualization-top-10-benefits-of-server-virtualization.html

How to Set Up a Virtualization Server - http://www.pcworld.com/article/201408/how_to_build_a_virtualization_server.html

Video - What is Server Virtualization - https://www.youtube.com/watch?v=p11lJOnALS4

10 Facts You Didn’t Know About Server Farms (2014) - https://www.cloudyn.com/blog/10-facts-didnt-know-server-farms/

Video - Inside a Google data center - https://www.youtube.com/watch?v=XZmGGAbHqa0

4.1 Questions – Introduction to Virtualization
1. What is Server Virtualization? Answer

.Summer 2018

2. List at least five benefits of Server Virtualization? Answer

.Summer 2018

3. What is a Virtual Machine? Answer

.Summer 2018

4. What is a Type 1 Hypervisor? Answer

.Summer 2018

5. List the name of a z System Type 1 Hypervisor? Answer

6. What is a Type 2 Hypervisor? Answer

7. List the name of two z System Type 2 Hypervisors? Answer

8. List the name of two or more non z System Type 2 Hypervisors? Answer

.Summer 2018

9. List the name of two or more non z System Type 2 Hypervisors? Answer

.Summer 2018

10. Explain how IBM PR/SM relates to z System virtualization. Answer

.Summer 2018

11. List three or more interesting Google data center statistics? Answer

12. List three or more interesting Amazon Google data center statistics? Answer

13. List the five major costs of a data center and indicate whether the category was fixed or variable? Answer

14. Compare the potential differences in data center costs between Goggle or Amazon and an IBM z13 LINUXONE virtualization. Answer

.Summer 2018

4.2 Questions - Server Virtualization Technologies
Logical Partitions

15. What is a LPAR? Answer:

16. What computing resources may be managed by a LPAR?

17. What are the advantages of z System LPARs as compared to other hardware and software LPARs? Answer:

18. What are the functions of the z Systems PR/SM technology? Answer:

19. What does one remotely access LPARS and virtual machines over a network? Answer:

20. What are the differences between an LPAR and zVM? Answer:

21. What are the advantages of zVM as compared to a LPAR? Answer:

22. What are technologies or products are similar to zVM? Answer:

23. What is Sysplex? Answer:

24. What is Parallel Sysplex? Answer:

25. What is Geographically Dispersed Parallel Sysplex (GDPS)? Answer:

4.3 Server Virtualization and Cluster Technologies
26. What is the purpose of Cluster Technologies? Answer:

27. What are the differences between virtualization and cluster technologies? Answer:

28. What are limitations of non-z System cluster processing? Answer:

29. How does z Systems over the limitations of cluster processing? Answer:

4.4 Cloud Computing
30. What is cloud computing? Answer:

31. What is cloud computing? Answer:

32. What are the differences between virtualization and cluster technologies, and cloud architectures? Answer:

33. Provide a descriptions and at least three example of the Cloud computing Service layers

Concept

Description

Examples

Infrastructure as a Service

(IaaS)

Platform as a Service

(PaaS)

Software as a Service (SaaS) Parallel Sysplex

34. What is the difference between single tenancy and multi-tenancy in cloud computing service layers? Answer:

35. Explain why a company want to use single-tenancy cloud service? Answer:

36. Explain why Microsoft Office 365 is an example of multitenancy cloud service? Answer:

37. Use the following table and describe each Parallel Sysplex concept using the following concept.

Concept

Description

Workload Manager (WLM)

Sysplex Failure Management (SFM)

Automatic Restart Manager (ARM)

Dynamic Workload Balancing

Cloning

'

Sysplex Application Compatibility

5.0 - Virtual Memory Operating Systems, Virtual Addresses and Paging
Read the Introduction to Memory Management and Task Management Document

Many Definitions may be found in the Glossary of the Introduction to the New Mainframe: Z/OS Basics books

Video - z/OS System Memory Architecture - Unit-10 https://youtu.be/viLXEL27R2s

IBM Paul Newton's presentation and demonstration of z/OS address spaces, virtual storage and paging, and using key-controlled protection for system integrity.

See Blackboard Folder "Paul Newton's z System Presentations" for a copy of this Presentation

Virtual address space - http://en.wikipedia.org/wiki/Virtual_address_space

What is virtual memory, how is it implemented, and why do operating systems use it?

http://www.programmerinterview.com/index.php/operating-systems/how-virtual-memory-works/

What are the advantages and disadvantages of virtual memory?

http://answers.yahoo.com/question/index?qid=20080928221645AAFAg23

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Essay Writing Help
Professional Accountant
Engineering Mentor
Assignments Hut
Smart Homework Helper
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$37 Chat With Writer
Essay Writing Help

ONLINE

Essay Writing Help

I have assisted scholars, business persons, startups, entrepreneurs, marketers, managers etc in their, pitches, presentations, market research, business plans etc.

$46 Chat With Writer
Professional Accountant

ONLINE

Professional Accountant

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$16 Chat With Writer
Engineering Mentor

ONLINE

Engineering Mentor

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$23 Chat With Writer
Assignments Hut

ONLINE

Assignments Hut

I am an experienced researcher here with master education. After reading your posting, I feel, you need an expert research writer to complete your project.Thank You

$41 Chat With Writer
Smart Homework Helper

ONLINE

Smart Homework Helper

I am an academic and research writer with having an MBA degree in business and finance. I have written many business reports on several topics and am well aware of all academic referencing styles.

$48 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Annotated Bibliography on Interstitial Cystitis - Sea anemone food chain - Dana hall funding a mission - A total charge q is distributed uniformly throughout - Create a family crest - Happy village organic sun dried smyrna figs costco - Does c++ use radians or degrees - Alternate or parallel forms reliability - Shark tank season 9 episode 2 stream - Information Technology Importance in Strategic Planning - Factset mergerstat bvr control premium study - Jones blair paint case study - Quality Improvement - Family processes readiness for enhanced - Jk rowling speaks at harvard commencement text - What general effects are associated with limited access to financing - All spells used in harry potter - Square stone keep castles advantages disadvantages - Little darlings rock and roll palace - Case study 6.3 johnson & rogers software engineering inc - Kensells tamworth used cars - The ghost map essay - Danish agency for international recruitment and integration - Marriage & Family - Bmw mini big decisions under the brexit cloud case study - 7 pin cdi wiring diagram - Military executive summary example template - Restorative theory of sleep - Yan yean recycle centre - Legal Brief Writing Assignment - Urgent. A+ Work Required. 12-14 Hours - What is the refutative pattern - Project 5 - Csi wildlife worksheet answer key - Change management validity tools for a chosen organization - Article Review - Food inc lesson plan - How to calculate mirr using financial calculator - Evidence based practice - Magnetic field of a solenoid lab answers - Economics homework - Printing at monash university - Corsair vengeance lpx height - Discussion - What is environmental scanning in management - Coffee break french season 5 - 23 15 military time - The relationship between insolation and air temperature through the course of day indicates that - How knowledge of access control helps in work environment? - Term paper - Crime scene sketch graph paper - In the study of older students attitudes - Media ethics issues 2016 - Magnetic field midway between two parallel wires - Trait theory vs humanistic theory - Curtin study package code - The story of the human body by daniel lieberman - The portuguese explored west africa searching for - I need 1500 words in IT Strategic Plan for Victoria University - Public speaking and the art of pursuasion - Reading and Answering 3 - Write bond line formula for isopropyl alcohol - Thevenin equivalent dependent source - Danny rivera shadow health cough answers - Memo (See attachment for template and Memo draft) - Blue mountains bus routes - A bar of steel has the minimum properties - What life experiences most influenced frida kahlo's artwork - 177a raleigh st thornbury - Flow measuring apparatus lab report discussion - Grave city is considering the relocation of several - 16742 e mason rd sidney oh 45365 - Whitehouse farm medical centre - Mr mrs miss ms - How to prepare tris hcl buffer - Imagined geographies - Importance of imago dei in healthcare - Soc 120 week 2 assignment waste reduction - What is vcaa student number - Which of the following statements is true about ethical decision making in business? - Prepare a trial balance at july 31 on a worksheet - You are a group of advisors to the Management Board in your company with Headquarters in Australia. - Acid base titration lab data table - Determine the centroid of the composite area - Motorola's global strategy case study answers - Brandlin company of anaheim california sells parts - Los vendidos analysis - The enrique camarena case a forensic nightmare questions and answers - Gcu 5 mission competencies - Effects of the crusades lesson plan - Secret life of walter mitty quotes - Demonstrating the phenomenon of _____, zajonc found that cockroaches will run faster when _____. - Explain the agency problem in financial management - What functions can companies improve by using wikis for collaboration - Can sohcahtoa be used on non right triangles - How much is a 45kg gas bottle from elgas - Servant leadership - Stainless steel nut and bolt torque settings - 1988 in roman numerals - What will cause the ppc to shift out - Melodic musical sales inc. is located at 5500