Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Intelligence
Data
Centre
Cloud
Mobility
Student Manual
Comunidad de Madrid
UNIN EUROPEA
FONDO SOCIAL EUROPEO
El Fondo Social Europeo invierte en tu futuro
EDUCATION
S
V8.0
cover
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Front cover
Student Notebook
pr
Ex
cl
ERC 11.0
Student Notebook
Trademarks
IBM is a registered trademark of International Business Machines Corporation.
The following are trademarks of International Business Machines Corporation in the United
States, or other countries, or both:
AIX
CICS
ESCON
HiperSockets
MVS
Parallel Sysplex
PR/SM
BookManager
DataPower
eServer
IMS
Open Class
Power
RACF
RMF
S/390
System x
System z9
WebSphere
z/VM
zSeries
System z
System/390
z/Architecture
z/VSE
z10
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
AIX/ESA
C/370
DB2
FICON
Language Environment
OS/390
POWER7
Resource Measurement
Facility
SecureWay
System z10
VTAM
z/OS
zEnterprise
z9
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or
both.
cl
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Ex
Java and all Java-based trademarks and logos are trademarks or registered trademarks of
Oracle and/or its affiliates.
pr
The information contained in this document has not been submitted to any formal IBM test and is distributed on an as is basis without
any warranty either express or implied. The use of this information or the implementation of any of these techniques is a customer
responsibility and depends on the customers ability to evaluate and integrate them into the customers operational environment. While
each item may have been reviewed by IBM for accuracy in a specific situation, there is no guarantee that the same or similar results will
result elsewhere. Customers attempting to adapt these techniques to their own environments do so at their own risk.
Student Notebook
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Other product and service names might be trademarks of IBM or other companies.
iii
z/OS Fundamentals
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
iv
z/OS Fundamentals
V8.0
Student Notebook
Contents
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Course description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Agenda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
cl
pr
Ex
TOC
Contents
Student Notebook
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
z/OS Fundamentals
V8.0
Student Notebook
2-56
2-57
2-58
2-59
2-60
2-61
2-62
2-63
2-64
2-65
2-66
2-67
2-68
2-69
2-71
2-72
2-73
2-74
2-75
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
cl
pr
Ex
TOC
Contents
vii
Student Notebook
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
viii
z/OS Fundamentals
V8.0
Student Notebook
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
TOC
Contents
ix
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
z/OS Fundamentals
V8.0
Student Notebook
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
TOC
Contents
xi
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
z/OS Fundamentals
V8.0
Student Notebook
6-44
6-45
6-46
6-47
6-48
6-49
6-50
6-51
6-52
6-54
6-55
6-56
6-57
6-58
6-59
6-61
6-62
6-63
6-64
6-65
6-66
6-67
6-68
6-69
6-70
6-71
6-72
6-73
6-74
6-75
6-76
6-77
6-78
6-79
6-80
6-82
6-83
6-84
6-86
6-87
6-89
6-90
6-91
6-92
6-93
6-94
6-95
6-96
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
TOC
Contents
xiii
Student Notebook
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . X-1
xiv
z/OS Fundamentals
V8.0
Student Notebook
Trademarks
The reader should recognize that the following terms, which appear in the content of this
training document, are official trademarks of IBM or other companies:
IBM is a registered trademark of International Business Machines Corporation.
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
The following are trademarks of International Business Machines Corporation in the United
States, or other countries, or both:
AIX/ESA
C/370
DB2
FICON
Language Environment
OS/390
POWER7
Resource Measurement
Facility
SecureWay
System z10
VTAM
z/OS
zEnterprise
z9
AIX
CICS
ESCON
HiperSockets
MVS
Parallel Sysplex
PR/SM
BookManager
DataPower
eServer
IMS
Open Class
Power
RACF
RMF
S/390
System x
System z9
WebSphere
z/VM
zSeries
System z
System/390
z/Architecture
z/VSE
z10
cl
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or
both.
Ex
TMK
UNIX is a registered trademark of The Open Group in the United States and other
countries.
pr
Java and all Java-based trademarks and logos are trademarks or registered trademarks of
Oracle and/or its affiliates.
Other product and service names might be trademarks of IBM or other companies.
Trademarks
xv
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
xvi
z/OS Fundamentals
V8.0
Student Notebook
Course description
Fundamental System Skills in z/OS
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Duration: 4 days
Purpose
Audience
Prerequisites
Objectives
cl
pr
Ex
pref
Use ISPF/PDF to allocate data sets and edit data sets (including
hierarchical file system (HFS) files) via the ISPF Editor primary and
line commands
Use ISPF to create and manipulate (copy, rename, delete, list, sort
and merge) data sets
Course description
xvii
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Contents
How to submit jobs for execution and view the output online
Curriculum relationship
H3838
ES52
OP05
pr
Ex
cl
ES05
V8.0
Student Notebook
Agenda
Day 1
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Welcome
Unit 1: Review of the z/Architecture and z/OS
Unit 2: An Introduction to ISPF, ISPF/PDF, and RACF
Exercise 1: System familiarization
Unit 3: Working with ISPF/PDF (Part 1)
Exercise 2: Allocate new data sets
Day 2
Review/wrap up
Unit 3: Working with ISPF/PDF (Part 2)
Exercise 3: ISPF editor primary commands
Exercise 4: ISPF editor line command
Exercise 5: Copy/move/rename/delete data sets and members
Exercise 6: Data set lists
Unit 4: Working with TSO/E
Exercise 7: Using TSO/E commands
Day 3
Review/wrap up
Unit 5: Working with JCL
Exercise 8: Submit a job
Exercise 9: JCL exercises
cl
Day 4
Review/wrap up
Unit 6: Working with UNIX System Services
Exercise 10: Procedures
Exercise 11: ISHELL and hierarchical file system
pr
Ex
pref
Agenda
xix
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
xx
z/OS Fundamentals
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
This unit reviews the basic concepts of the z/Architecture and the z/OS
operating system at the level of knowledge that is required or helpful in
understanding the education presented in the units of this course.
SC26-7397
DFSMS Introduction
GA22-7502
GA22-7504
SA22-7500
SA22-7535
JES2 Introduction
SA22-7551
JES3 Introduction
SA22-7661
GC35-0033
SA22-7832
pr
Ex
cl
References
1-1
Student Notebook
SA22-7643
SC26-7410
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
SC26-7409
1-2
z/OS Fundamentals
V8.0
Student Notebook
Uempty
Unit objectives
After completing this unit, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
1-3
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
1-4
z/OS Fundamentals
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
1-5
Student Notebook
z/Architecture overview
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
z/Architecture overview
z/OS system overview
ES1011.0
pr
Ex
cl
Notes:
1-6
z/OS Fundamentals
V8.0
Student Notebook
Uempty
Topic objectives
After completing this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
1-7
Student Notebook
z/Architecture overview
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ESA/390
Architecture
z/Architecture
z/Architecture software
z/OS
z/VM
z/VSE
z/TPF
Linux on
System z
z/Architecture hardware
IBM System z servers
ES1011.0
Notes:
cl
pr
Ex
The z/Architecture is a blueprint providing a set of definitions and rules required for the
interaction of z/Architecture hardware with an operating system control program that
coordinates the use of system resources, executes all I/O instructions, handles exceptional
conditions, and supervises scheduling and execution of multiple programs. z/Architecture
determines processor instruction sets, addressing range and modes, communication
mechanisms such as interrupts, and so on. It lays the groundwork for every System z
server and every operating system running on it.
z/Operating System (z/OS) is the IBM flagship operating system designed to run on a
z/Architecture platform. In total there are five operating systems that are supported on the
IBM mainframes. They are the z/OS, z/VSE, z/TPF and Linux for System z.
z/OS supports great numbers of users along with large amounts of data while still providing
reasonable performance.
1-8
z/OS Fundamentals
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
The design of the z/Architecture still incorporates an evolutionary approach, meaning, even
though it grows in functionality, it still provides a high degree of compatibility with its
ancestors, ESA/390, System/390, System/370, and System/360.
pr
Ex
cl
Uempty
1-9
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Used in smaller mainframe shops, does not contain all the QoS as
z/OS, and provides a smaller, less complex base for batch processing
and transaction processing.
ES1011.0
Notes:
cl
There are five operating systems that are supported on the IBM mainframes. Identified
here are the z/OS, z/VSE and z/TPF operating systems that are developed and supported
by IBM.
pr
Ex
The z/OS operating system is IBMs premier flagship OS. It is the most widely used
mainframe OS in business today. z/OS is built for a wide variety of workloads, online
transaction processing (OLTP), batch and even analytics. IBM provides extensive support,
backward compatibility and OS migration assistance that is the best in the industry. z/OS is
a highly secure, scalable, high-performance enterprise operating system on which to build
and deploy Internet and Java-enabled applications, providing a comprehensive and diverse
application execution environment.
z/VSE would be used by smaller shops that does not need the high Quality of Service
(QoS) that z/OS provides. Compared to z/OS, the z/VSE operating system provides a
smaller, less complex base for batch processing and transaction processing. The design
and management structure of z/VSE is excellent for running routine production workloads
consisting of multiple batch jobs (running in parallel) and extensive, traditional transaction
1-10 z/OS Fundamentals
V8.0
Student Notebook
Uempty
processing. In practice, most z/VSE users also have the z/VM operating system and use
this as a general terminal interface for z/VSE application development and system
management.
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
The z/TPF system is a high availability operating system designed to provide quick
response times to high volumes of messages from large networks of terminals and
workstations. It is most commonly used for the purpose of accessing a large centralized
database that is an inventory of business information. An example of this would be a
reservation system that is used for large hotels or airlines.
pr
Ex
cl
z/TPF was once known as Airline Control Program (ACP). It is still used by airlines and
other business that require high-speed, high-volume transaction processing requirements.
1-11
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
The z/VM control program is a hypervisor that can run other operating
systems in the virtual machines it creates.
Any IBM OS, such as z/OS, Linux on System z, z/VSE, and z/TPF,
can be run as guest systems in their own virtual machines, and z/VM
can run any combination of guest systems.
Linux on System z
ES1011.0
Notes:
Here the remaining two supported mainframe operating systems are identified, z/VM and
Linux on System z.
cl
pr
Ex
z/Virtual Machine (z/VM) has two basic components: a control program (CP) and a
single-user operating system (CMS). The control program artificially creates multiple virtual
machines from the real hardware resources. To users, it appears as though they have
dedicated use of the shared real resources. The shared real resources include printers,
disk storage devices, and the central processors. The control program ensures data and
application security among the guest systems. The real hardware can be shared among
the guests, or dedicated to a single guest for performance reasons. The system
programmer allocates the real devices among the guests. For most customers, the use of
guest systems avoids the need for larger hardware configurations.
V8.0
Student Notebook
Uempty
z/VMs other major component is the Conversational Monitor System (CMS). This
component of z/VM runs in a virtual machine and provides both an interactive user
interface and the general z/VM application programming interface.
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Linux on System z is used to refer to Linux running on a System z system. It does not
specifically refer to a 31-bit version or the 64-bit version. Linux on System z exploits the
strengths and reliability features of the System z hardware, while preserving the openness
and stability of Linux. Linux on System z distributions are offered by Linux distribution
partners who provide services and support.
1-13
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
cl
64-bit addressing mode is actually two things: Real and virtual 64-bit addressing. 64-bit real
addressing came first; virtual 64-bit addressing came later in z/OS. z/OS must run on
z/Architecture in 64-bit mode.
Ex
Starting in z/OS release 2, system software packages started to use the increased virtual
address range for buffers, status areas, and management functionality. User applications
created by standard compilers, however, could not exploit this storage for their own
purposes. The C and C++ compilers can be used to create 64-bit applications.
In z/OS release, many components support 64-bit AMODE 64:
pr
Workload Manager (WLM) Virtual 64-bit support provides services to 64 bit applications
z/OS UNIX enables C interface for usages for 64-bit applications
Language Environment provides a 64-bit run-time environment
z/OS has a 64-bit C/C++/Java programming environment
And a 64-bit C/C++ compiler and debugger
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Memory
Channels
Four LCSSs
PCIe and InfiniBand I/O infrastructure
Three subchannel sets
FICON Express4, Express8 and 8S
HiperSockets: Up to 32
ES1011.0
Notes:
cl
The IBM zEnterprise EC12, machine type of 2827 with five model offerings (H20, H43,
H66, H89, and HA1), builds upon the strengths of its predecessor, the IBM zEnterprise 196.
It was designed to help overcome problems in today's IT infrastructures and provide a
foundation for the future. The zEC12 continues the evolution of integrated hybrid systems
beginning with the z196.
pr
Ex
The zEC12 central processor complex (CPC) has a redesigned z/Architecture chip. It is the
first six-core chip in mainframe history and operates at an industry leading, high frequency,
5.5 GHz. The zEC12 is a scalable symmetric multiprocessor (SMP) that can be configured
with up to 101 processors running concurrent production tasks with up to 3 TB of memory.
It introduces several PCIe I/O features, such as exploitation of Storage Class Memory
through the Flash Express feature, and technologies, such as the IBM System z Advanced
Workload Analysis Reporter (IBM zAware), an appliance with cutting edge pattern
recognition analytics that uses heuristic techniques and represents the next generation of
system health monitoring.
1-15
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Flash Express is an innovative optional feature introduced with the zEC12, with the
objective of driving performance improvements and better availability for critical business
workloads that cannot afford any hits to service levels. It implements Storage Class
Memory (SCM) in a PCIe card form factor using internal NAND Flash solid state disk (SSD)
providing a total maximum capacity of 6.4 TB of storage that can be used for paging. Each
PCIe card has a capacity of 1.6 TB of usable storage, are installed in pairs providing
mirrored data to ensure a high level of availability and redundancy.
pr
Ex
cl
The zEC12 goes beyond previous designs while continuing to enhance the traditional
mainframe qualities, delivering unprecedented performance and capacity growth. The
zEC12 has a well-balanced general-purpose design that allows it to be equally at ease with
compute-intensive and I/O-intensive workloads
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
On Demand capabilities
Memory
Channels
Four LCSSs
Three subchannel sets
63.75 subchannels
Up to 240 ESCON channels
Up to 288 FICON channels
FICON Express4 and 8
InfiniBand Coupling Links
HiperSockets: Up to 32
ES1011.0
Notes:
cl
The IBM zEnterprise 196 is designed with improved scalability, performance, security,
resiliency, availability, and virtualization. The z196 Model M80 provides up to 1.6 times the
total system capacity of the z10 EC Model E64, and all z196 models provide up to twice the
available memory of the z10 EC.
Ex
pr
Quad-core 5.2 GHz processor chips with 100+ new instructions that enable improved
code efficiency, and are designed to help improve the execution of CPU-intensive
workloads.
Up to 3 terabytes (TB) of available real memory per server for growing application
needs (with up to 1 TB real memory per LPAR).
Availability in the memory subsystem with redundant array of independent memory
(RAIM).
1-17
Student Notebook
Up to 128 coupling CHPIDs (double that of z10) and up to 80 physical external coupling
links (12x InfiniBand, 1x InfiniBand, ISC-3), a 25% increase compared to z10.
Up to 72 I/O, networking, and crypto features.
Up to 240 ESCON channels.
Up to 32 HiperSockets (double the number available on z10 EC).
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Optional water cooling, providing the ability to cool systems with user-chilled water.
pr
Ex
cl
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Seven PU cores per processor drawer (one for M05 and two for M10)
Up to two SAPs per system, standard
Two spares designated for Model M10
Dependant on the H/W model, up to 5 or 10 PU cores available for
characterization:
Central processors (CPs), Integrated Facility for Linux (IFLs), Internal
Coupling Facility (ICFs), System z Application Assist Processors (zAAPs),
System z Integrated Information Processor (zIIP), optional - additional SAPs
130 capacity settings
Memory:
I/O:
ES1011.0
Notes:
cl
The z114 continues the heritage in mainframe qualities of service with extreme granularity.
structure and significant improvements in packaging, performance, and total system
scalability over prior generations.
Ex
pr
Its superscalar microprocessor chip has a higher-frequency design that leverages IBM
technology leadership with a new out-of-order execution sequence that delivers
world-class per-thread performance. With over 100 new instructions and numerous
compiler related enhancements, the z114 can deliver up to 25% performance
improvement, based on measurements and projections, for CPU Intensive workloads when
accompanied by multiple C/C++ compiler level improvements going from XL C/C++ V1R9
to V1R12.
Copyright IBM Corp. 2001, 2013
1-19
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Scalability and flexibility for growth: The z114 will be available in two models: a single
central processing drawer model, the M05, and a two drawer model, the M10, which offers
the additional flexibility for I/O and coupling expansion and/or increased specialty engine
capability. With up to 10 configurable cores, the model naming is indicative of how many
total processor units are available for user characterization. The cores can be configured
as general purpose processors (CPs), Integrated Facilities for Linux (IFLs), System z
Application Assist Processors (zAAPs), System z Integrated Information Processors
(zIIPs), Internal Coupling Facilities (ICFs), additional System Assist Processors (SAPs), or
can be used as additional spares (M10 only).
With 130 available capacity settings and a granular cost structure offered across either
model, you have the freedom to choose the right capacity setting for your needs with the
flexibility to scale on demand as workload demands increase.
To help secure sensitive data and business transactions, the z114 is designed for Common
Criteria Evaluation Assurance Level 5 (EAL5) certification for security of logical partitions.
Support for the next generation of public key technologies is available with Elliptic Curve
Cryptography (ECC), which is ideal for constrained environments such as mobile devices.
The z114 also offers support for key ANSI and ISO standards for the banking and finance
industry.
256 GB memory for application growth: The z114 will support up to 248 GB of real
(usable) RAIM-protected memory, an industry exclusive currently available only on System
z. Beyond the purchased memory, there is an additional 8 GB of memory for the hardware
system area (HSA), which holds the I/O configuration data for the server.
cl
pr
Ex
Packaging: For ease of installation, the z114 is a single-frame, air-cooled system that now
supports either top- or bottom-exit I/O and power, raised-floor and non-raised-floor options,
and high-voltage DC power, providing increased flexibility to accommodate small data
center installations and support for future data center design and efficiencies.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
cl
The IBM System z10 Enterprise Class (z10 EC) represents the latest state of the art
scalable server designed and optimized for growth and large scale consolidation as well as
the premier platform to host traditional mission critical workloads alongside new application
workloads. The z10 EC provides an advanced combination of scalability, availability,
reliability, security, and virtualization.
pr
Ex
Built with modular book design, the z10 EC delivers higher total system capacity, memory,
and I/O bandwidth. The z10 EC is focused on providing a strong combination of mainframe
characteristics plus new functions designed around scalability, availability and security. The
intent of the z10 EC is to help increase the flexibility to configure a server to meet current
needs, provide a powerful and advanced data serving environment, and help reduce risks
and business costs without sacrificing features or functions.
1-21
Student Notebook
The
z10 EC is designed and optimized for growth and large scale consolidation. The z10
EC provides:
Up to 64 customer processor units (PUs)
Up to 384 GB of memory per book
Up to 1.5 TB of total available server memory
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
zIIP is a specialty engine designed to help improve resource optimization and lower the
cost of eligible workloads, enhancing the role of the mainframe as the data hub of the
enterprise.
IBM System z10 Application Assist Processor (zAAP)
cl
An IFL is a specialty engine that provides additional processing capacity exclusively for
Linux workloads.
Ex
pr
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
12 PUs
Two SAPs, standard
Zero spares when all PUs characterized
Up to 10 PUs available for characterization
Central processors (CPs), optional specialty processors, and
optional additional system assist processors (SAPs)
Memory:
System minimum of 4 GB
Up to 128 GB, included HSA.
8 GB fixed HSA, standard
Up to 120 GB for Customer use
Four and eight GB increments
M/T 2097
I/O:
y CMOS 11S
y 12 PU cores per z10 BC
y Core cycle time is 0.286 ns,
frequency 3.5 GHz
y 4 GB 128 GB memory
ES1011.0
Notes:
Ex
cl
The IBM System z10 BC updates the processor packaging using drawers instead of the
traditional book technology to provide additional cost savings and availability. The CPC
drawer package contains single chip modules (SCMs), storage controllers, memory and
interfaces to I/O. This new packaging also leverages the new Enterprise Quad-core z10
processor chips introduced with z10 EC. The z10 BC processors operates at 3.5 GHz,
which deliver up to 1.9x performance improvements for CPU intensive jobs over the z9 BC.
pr
There are 12 processor unit cores on the z10 BC, of which up to 10 can be configured as
various processor types. Up to five general purpose cores and up to five additional
specialty engines or up to 10 IFLs or coupling facility cores may be configured. Two system
assist processors (SAPs) used with I/O processing are standard on z10 BC, while z9 BC
had one. Two additional optional SAPs may be added.
The z10 BC is designed to provide spares for a failing engine only when the full ten engines
are not configured.
The big news in memory on the z10 BC is the size and a lower entry point of 4 GB and up
to 248 GB of memory in a fully configured server almost four times that offered in z9 BC.
Copyright IBM Corp. 2001, 2013
1-23
Student Notebook
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
The other significant change is that the standard 8GB hardware system area (HSA) is
separately managed, whereas in the past a customer had to use some of their purchased
memory to house the HSA.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
pr
Ex
cl
The IBM System z9, while having classic strengths on which its reputation was formed,
continues to be a leader in areas such as data management, availability, security and
resiliency, virtualization, and integration. Its ability to support many open and industry
standards, with comprehensive support for service-oriented architecture (SOA), makes it
an ideal platform for deploying new workloads or for interoperating with new workloads on
alternative technologies. The System z9 Business Class (z9 BC) provides tight
collaboration with IBM storage and software to help achieve advanced I/O function and
performance. The z9 BC represents the continuation of the new generation of System z9
servers introduced with the IBM System z9 Enterprise Class (z9 EC), formerly the IBM
System z9 109 (z9-109) that is designed and optimized for On Demand Business.
This new generation of IBM mainframes provides an advanced combination of reliability,
availability, security, scalability, and virtualization, together with the ability to reallocate
processing power, and is designed to match changing business priorities on demand.
PUs defined as Internal Coupling Facilities (ICFs), Integrated Facility for Linux (IFLs),
System z Application Assist Processors (zAAPs) and System z9 Integrated Information
Copyright IBM Corp. 2001, 2013
1-25
Student Notebook
Processor (zIIPs) are no longer grouped together in one pool as on the z890, but are
grouped together in their own pool, from which they can be managed separately. This
simplifies LPAR capacity planning and management significantly. The separation also has
an effect on weight management since CP weights and zAAP and zIIP weights can now be
managed separately. Capacity BackUp (CBU) features are available for IFLs, ICFs, zAAPs
and zIIPs.
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
The System z Application Assist Processor (zAAP), available also on the z9 EC, z990 and
z890 servers, is a specialized processor that provides a strategic z/OS (z/OS.e) application
execution environment for those who desire the powerful integration advantages and
traditional qualities of service of the platform. Java is the first application exploiter of the
zAAP.
The System z9 Integrated Information Processor (zIIP) is the latest customer inspired
specialty engine designed to help improve resource optimization and lower the cost of
portions of eligible workloads. The zIIP can help to strengthen the System z9 mainframe as
the data serving hub, helping customers to more fully leverage their valuable assets.
DB2 for z/OS V8 (and DB2 9 for z/OS) exploits the zIIP capability for portions of eligible
workload. Eligible work that access DB2 (such as Customer Relationship Management
(CRM), Enterprise Resource Planning (ERP), Business Intelligence (BI), and data
warehousing applications) can have portions of their work directed to the zIIP.z9 EC,
building upon the structure introduced on the IBM eServer zSeries 990 (z990) scalability
and z/Architecture.
z/Architecture is implemented on the System z9 platform to allow 64-bit real and virtual
storage support. A maximum 512 GB of real storage is available on z9 EC. z9 EC can
define any logical partition as having 31-bit or 64-bit addressability.
With a modular book design, the z9 EC is designed to provide up to 95% more total system
capacity than the z990 Model D32, and has up to double the available memory. The
maximum number of processor units (PUs) has grown from 32 to 54, and memory capacity
has doubled, up to 128 GB per book and up to 512 GB per system.
pr
Ex
cl
The z9 EC has five models offering between 1 to 54 PUs, which can be configured to
provide a highly scalable solution designed to meet the needs of both high transaction
processing applications and On Demand Business. Four models (S08, S18, S28 and S38)
have 12 PUs per book, and the high capacity model, S54, offers 16 PUs in each of its four
books. The PUs can be characterized as either CPs, IFLs, ICFs, zAAPs or zIIPs. An
easy-to-enable ability to turn off CPs or IFLs is available on z9 EC, allowing you to
purchase capacity for future use with minimal or no impact on software billing. An
miscellaneous equipment specification (MES) feature will enable the turned off CPs or
IFLs for use where you require the increased capacity.
V8.0
Student Notebook
Uempty
Balanced system
CPU, nWay, memory,
I/O bandwidth*
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
288 GB/sec*
172.8 GB/sec*
96 GB/sec
Memory
3 TB**
24 GB/sec
1.5 TB**
512 GB
256 64
GB GB
300
450
600
920
PCI for
1-way
1202
1514
16-way
32-way
zEC12
54-way
z196
64-way
80-way
z10 EC
z9 EC
zSeries 990
101-way
processors
zSeries 900
ES1011.0
Notes:
cl
When a mainframe system is designed many items and how they interact must be
considered.
pr
Ex
The four identified items in the chart: processors, memory, IO bandwidth, and internal
throughput rate (ITR) shown for the zEC12 server is also contrasted with previous IBM
mainframe servers.
1-27
Student Notebook
z/OS highlights
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
pr
Ex
cl
V8.0
Student Notebook
Uempty
Processor types
n-way processor
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Uniprocessor
CP
Storage
Channel Subsystem
Channel subsystem
CP
CP
CP
CP
Storage
Channel subsystem
ES1011.0
Notes:
Ex
cl
An IBM z/Architecture system consists of hardware and software products. The hardware
consists of the central processor, the storage, channels, and so forth. The software running
on the System z hardware comprises system application programs, end-user applications,
tools, utilities, and so on. The primary program executing on the system is an operating
system such as z/OS or zLinux. Together, the hardware and software make up a central
processor complex (CPC).
pr
The z/Architecture requires that each central processor processes one and only one
program instruction at a time. The operating system manages the instructions to be
processed and the resources required to process them. A single processor system is called
a uniprocessor.
1-29
Student Notebook
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Some of these n-way processors provide the physical capability to be divided into two
separate systems, running two separate operating systems. An n-way processor system
that possesses this feature is a multiprocessor.
V8.0
Student Notebook
Uempty
.....
Image n
LPAR
.....
Image 3
zVM
Image 2
PR/SM
Image 1
CPC
LPAR
CPC
LPAR
LPAR
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Logical partitioning
ES1011.0
Notes:
A single z/Architecture system can be partitioned to run multiple operating system images.
Logical partitioning and partitioning through the use of zVM are both supported.
cl
Logical partitioning
Ex
pr
- Storage (central/expanded)
- Channel Paths
1-31
Student Notebook
You can share channels among logical partitions via PR/SM and the multiple image
facility (MIF) that is on every current IBM mainframe server.
Partitioning with zVM
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Using Virtual Machine (zVM) to partition a system is the most flexible way of running
multiple images on the same physical machine. zVM acts as a resource manager to
build multiple virtual machines which each run their own operating system image.
Note
pr
Ex
cl
Logical partitioning, and partitioning through zVM, can be combined for flexibility.
V8.0
Student Notebook
Uempty
Topic summary
Having completed this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
1-33
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
1-35
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Topic objectives
After completing this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
1-37
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
LAN Services
Security Services
e-Business
Services
CICS
Cryptographic
Services
Distributed
Computing
IMS/TM
System Services
TSO
Batch
UNIX
APPC
STC
Application
Enablement
UNIX System
Services
Applications
DB2
NonVSAM
Systems management
Communications Services
VSAM
IMS/DB
HFS
zFS
ES1011.0
Notes:
pr
Ex
cl
z/OS provides basic system services for the traditional workloads as well as the UNIX or
Java workloads.
V8.0
Student Notebook
Uempty
LAN
Services
Systems
Management
Services
Communications
Server
Softcopy
Publication
Services
Application
Enablement
Services
e-Business
Services
UNIX
System
Services
Security
Services
(RACF)
Cryptographic
Services
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
System
Services
Integrated
Security
Services
ES1011.0
Notes:
cl
Prior to OS/390 and the later z/OS, large software system consisted of many different
products that had to be ordered, installed, and maintained separately.
Now, with z/OS, customers order products en bloc and receive a tailored package of all the
base and optional products they need for their IS installation. IBM ensures that all products
shipped with the order are at the proper release level and that all prerequisites are met.
Ex
pr
System Services
1-39
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Communications Server
e-Business Services
LAN Services
Ex
cl
pr
Cryptographic Services
V8.0
Student Notebook
Uempty
Slot
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
D
Frame
Auxiliary storage
Central storage
A
D
G
J
Page
E
H
K
C
F
I
L
Virtual storage
ES1011.0
Notes:
Note
pr
Ex
cl
z/OS allows users to access a greater range of storage than is physically available in the
form of central storage. This storage range is called virtual storage. Before 64-bit virtual
storage support, each user has access to a maximum of 2 GB of virtual storage. z/OS
Release 2 is the first phase of 64-bit virtual storage support. This support allows each user
to have access to a maximum of 16 EB of virtual storage. What makes virtual storage work
is that the operating system keeps only active portions of virtual storage in central storage
(memory). Inactive portions are moved to expanded storage (memory) or auxiliary storage
(DASD).
Expanded storage was supported by previous z/OS releases on older mainframe servers in
ESA/390 mode. Current z/OS releases do not support expanded storage with
z/Architecture.
1-41
Student Notebook
Virtual storage consists of 4 KB blocks called pages. A page can be stored in real storage
or on auxiliary storage. A 4 KB block in real storage is referred to as a frame, a 4 KB block
in on auxiliary storage is called a slot.
A storage location within the virtual storage is identified through a virtual address.
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Dynamic address translation (DAT) is the hardware process of translating a virtual storage
address, during a storage reference, into the corresponding central storage address (called
real address).
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
64-bit address
Central
storage
Data
spaces
Hiperspaces
Auxiliary
storage
ES1011.0
Notes:
Ex
cl
In z/OS, address spaces, data spaces, and hiperspaces are backed by central storage and
auxiliary storage.
pr
Pages (virtual storage), frames (real storage), and slots (auxiliary storage) are all 4K bytes
in size.
Note, however, that with the z10 and zEnterprise, large page support (1 megabyte pages)
is supported.
1-43
Student Notebook
User/system
data
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
2 GB
(for 64-bit
programs only)
2 GB
(the bar)
User data
User programs
and data
System programs
16 MB
and data
User programs
and data
4 KB
Address space
Data space
or
Hiperspace
4 KB
ES1011.0
Notes:
Ex
cl
The sequence of virtual addresses associated with a virtual storage is called an address
space. An address space contains 2 GB of virtual storage before z/OS. An address space
can contain 16 EB of virtual storage beginning with z/OS Release 2. z/OS offers this virtual
addressing capability to every user in the system by assigning each user its own separate
address space. Programs in separated address spaces are protected from each other.
Isolating data in its own address space also protects the data.
pr
The concept of having multiple virtual storages is the basic concept of the z/OS operating
systems base control programs (BCP). The BCP is often called MVS because it is based
on the Multiple Virtual Storage/ESA (MVS/ESA) operating system.
System address spaces are created when the z/OS system is started. Other address
spaces are generated when a user logs on to the system, when a task is started from the
operating system console, or when JES creates initiators for batch jobs to execute in.
Data spaces and hiperspaces are similar in that both are areas of virtual storage that can
be created by the system upon user request. The size of data spaces and hiperspaces can
range from 4 KB to 2 GB, depending on the user's request. Unlike an address space, a
1-44 z/OS Fundamentals
V8.0
Student Notebook
Uempty
data space or hiperspace contains only user data or user programs stored as data.
Program code cannot directly be executed in a data space or a hiperspace. A program
references data in a data space directly, in much the same way it references data in an
address space. The program uses the same instructions that it would use to access data in
its own address space.
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
To access the address space storage between 2 GB and 16 EB, a program must be
running in 64-bit mode (using 64-bit storage addresses). Programs cannot execute in this
storage area, so it is limited to storing user data for programs that are loaded in the address
space below 2 GB.
1-45
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
z/OS
64-bit
tri-modal
addressing
High
private area
K - kilo - 210
M - mega -220
G - giga - 230
High
storage
T - tera - 240
P - peta - 250
E - exa - 260
64-bit
The bar
2 GB
Extended
private area
31-bit
The line
24-bit
Extended
common area
Common
area
Private
area
Above
storage
16 MB
ES1011.0
Notes:
Ex
cl
Private area and extended private area: This area can contain the user programs, data
buffers and control information. Since no other user can address this area, its contents are
secure.
pr
Common area and extended common area: The common area contains system control
programs and control blocks.
A z/OS virtual address space has also a private area above the bar, that is, above 2 GB.
V8.0
Student Notebook
Uempty
At execution time
Central storage
Loaded by z/OS
Program Manager
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Pages
PROGRAM
DATA
ES1011.0
Notes:
cl
The data to be processed and the program that processes it must be identified to the
operating system. The way we do this is different for each environment, ISPF, TSO/E,
batch, and UNIX.
Ex
The basics, though, are conceptually the same. We must first allocate the data sets and
then call the program to do the processing.
Allocate means to make a logical connection with the data set.
pr
The program is found using a standard method we will discuss later in the course.
1-47
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Loosely coupled
JES2
devices
JES2
devices
z/OS + JES2
z/OS + JES2
Processor
Processor
SPOOL
ES1011.0
Notes:
cl
z/OS use a job entry subsystem (JES) to receive jobs into the operating system, schedule
them for processing, and to control their output processing. IBM provides two JESs: JES2
and JES3. The management of jobs and resources in z/OS is handled between JES and
the base control program (BCP). In this manner, JES manages jobs before and after
execution; the base control program manages them during processing.
pr
Ex
JES has data sets that contain input job queues (that is, lists of jobs to be processed by
z/OS) and output queues on direct access storage devices (DASD). Future work is added
to these queues and JES selects work for processing from them. These data sets are
called spool and checkpoint data sets.
Spool: Simultaneous Peripheral Operation OnLine
In an installation that has only one processor, JES2 and JES3 perform similar functions.
That is, they read jobs into the system, convert them to internal machine-readable form,
select them for processing, process their output, and purge them from the system.
V8.0
Student Notebook
Uempty
However, for an installation that has more than one processor in a configuration, (a loosely
coupled multiprocessor) JES2 and JES3 work differently.
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Within JES2, each processor controls its own job input, job scheduling, and job output
processing, while sharing the spool and checkpoint data sets.
1-49
Student Notebook
z/OS + JES3
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Local
processor
z/OS + JES3
Global
processor
JES3
devices
SPOOL
z/OS + JES3
Local
processor
ES1011.0
Notes:
In contrast, JES3 exercises centralized control over its processing functions through a
single global JES3 processor.
pr
Ex
cl
This global processor provides all job selection, scheduling, and device allocation functions
for all the other JES3 systems. The centralized control that JES3 exercises provides
increased job scheduling control, deadline scheduling capabilities, and increased control
by providing its own device allocation.
V8.0
Student Notebook
Uempty
Catalog management
Master catalog
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
y Alias
y System DS
User catalog
User catalog
SYSRE
S
USRVOL
VVDS
VTO
User catalog
C
Data set
y User DS
ES1011.0
Notes:
cl
z/OS keeps track of the location of its data sets through the use of catalogs. A catalog is a
data set which contains information about other data sets. It provides users with the ability
to locate a data set by name, without having to know where the data set resides; data can
be moved from one device to another, without, for example, requiring a change in its
references.
Ex
z/OS uses Integrated Catalog Facility (ICF) catalogs to administer data sets on DASD. All
VSAM data sets and all SMS-managed data sets must be cataloged.
pr
In a z/OS system, there is usually one master catalog and one or more user catalogs. The
master catalog contains direct pointers to all system data sets, used for system
initialization, and indirect pointers, called aliases, to the user data sets.
An alias is a pointer, based on a predefined number of qualifiers (usually the first), that
directs catalog management to a user catalog where the related data set is cataloged.
1-51
Student Notebook
System-managed storage
Storage management subsystem
Data set
allocation
request
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Managed?
System
resources
manager
NO
YES
Managed volumes
Non-managed
volumes
ES1011.0
Notes:
cl
The Data Facility Storage Management Subsystem (DFSMS) simplifies the task of
managing storage by providing the storage management subsystem (SMS) facility. Under
the storage administrator's control, the storage management subsystem of DFSMS works
with other components of DFSMS to help automate and optimize storage management.
Ex
As a new data set is created, the storage management subsystem automatically assigns
services and attributes to the data using values defined by the installation. The storage
management subsystem also automatically controls system storage and decreases user
concern about the physical characteristics of storage devices (device independence).
pr
With SMS, users can establish policies for the use of hardware resources and effectively
control how those resources are used and what service levels are to be provided.
Requirements for data availability, performance, space, and security are handled by the
Storage Management Subsystem.
The DFSMS allows IS installations to separate the logical view of data from its physical
characteristics. A user is no longer responsible for the device allocation; the system takes
care of that through a set of Automatic Class Selection (ACS) routines. These ACS
1-52 z/OS Fundamentals
V8.0
Student Notebook
routines, to be defined for every installation, are run at data set allocation time and assign a
new data set a Management class, data class, storage class, and storage group. Together
these four describe every aspect of the data set:
Data set management information such as number of backup
versions, migration criteria, expiration date, and so on.
Data class
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Management class
Storage class
Storage group
pr
Ex
cl
Uempty
1-53
Student Notebook
Security
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Job
management
Application
development
Maintenance
ISPF ISPF
ISPF
ISPF
Storage
management
ISPF
TSO
Data
ISPF management
ES1011.0
Notes:
Ex
cl
TSO/E
pr
ISPF
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
y TSO user ID
(logon screen)
y Password
y READY or ISPF
Buffer
ES1011.0
Notes:
Performing a logon to a TSO system means starting a TSO/E session and identifying
yourself to TSO/E. To do so you have to provide:
cl
Ex
(In addition, you might also have to specify an account number, a procedure name, and
possibly a RACF GROUP name.)
pr
To actually log on to a TSO system, you have to enter the TSO LOGON command. The
logon request is passed on to terminal control access space (TCAS). If TCAS accepts the
logon request, it creates the user's address space and initializes its buffers. Once the user
address space is set up, TCAS declares the user address space to VTAM, which now
handles all further communications.
1-55
Student Notebook
Administrator
User Services
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
READY
_
----------------------------- TSO/E LOGON------------------------------To use this panel you must have completed the customization
Enter LOGON
below: Information Center
RACF
LOGON parameters:
forparameters
TSO/E in section
Facility
of the
MVS
CBIPO
CUSTOMIZATION
AND
USE
GUIDE.
Userid
===> AUES100
Password ===>
PRESS END or RETURN key to terminate
Procedure ===> LOGON
===>
===> 4096
F1=HELP
F2=SPLIT
F7=UP
F8=DOWN
Perform
===>
Command
F3=END
F9=SWAP
F4=RETURN
F10=LEFT
F5=RFIND
F11=RIGHT
F6=RCHANGE
F12=RETRIEVE
===> isppdf
-OIDcard
ES1011.0
Notes:
cl
You can use TSO/E in many environments, such as with the Interactive System
Productivity Facility/Program Development Facility (ISPF/PDF), session manager, and line
mode TSO/E. How you interact with TSO/E depends upon the environment.
pr
Ex
ISPF/PDF
Session manager
Line mode
V8.0
Student Notebook
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Uempty
1-57
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Settings
View
Edit
Utilities
Foreground
Batch
Command
Dialog Test
LM Facility
IBM Products
SCLM
Workplace
User ID . :
Time. . . :
Terminal. :
Screen. . :
Language. :
Appl ID . :
TSO logon :
TSO prefix:
System ID :
MVS acct. :
Release . :
AUES100
14:41
3278
1
ENGLISH
ISR
LOGON
AUES100
SYS1
ACCNT#
ISPF 4.8
Option ===>
F1=Help
F3=Exit
F10=Actions
F12=Cancel
ES1011.0
Notes:
pr
Ex
cl
V8.0
Student Notebook
Uempty
Topic summary
Having completed this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
1-59
Student Notebook
Checkpoint (1 of 3)
1. Which operating systems are supported by the System z hardware?
(Mark all that apply.)
OS/400
UNIX
Windows NT
zLinux
z/OS
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
a.
b.
c.
d.
e.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Checkpoint (2 of 3)
3. Which of the following are functional groups of z/OS?
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
d. Communications server
ES1011.0
pr
Ex
cl
Notes:
1-61
Student Notebook
Checkpoint (3 of 3)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Unit summary
Having completed this unit, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
1-63
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
The first part of this unit should give you a brief overview of the
components of Interactive System Productivity Facility (ISPF) in
general and of Interactive System Productivity Facility/Program
Development Facility (ISPF/PDF) in particular. You will learn how to
perform a logon to the lab system and how to activate and use the
Program Development Facility.
In the second part of the unit, you will discover how the z/OS system
security product Security Server (RACF) authenticates a user logon to
the z/OS system and how it authorizes users to access resources
such as system data sets.
pr
Ex
cl
Identify the main functions of Security Server (RACF) and the role
it plays in controlling user access to the system
Describe the contents of RACF user, group, and resource profiles
2-1
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
References
ISPF Users Guide Vol I
SC34-4823
SA22-7784
SA22-7787
TSO/E Primer
pr
Ex
cl
SC34-4822
2-2
z/OS Fundamentals
V8.0
Student Notebook
Uempty
Unit objectives
After completing this unit, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Identify the main functions of Security Server (RACF) and the role it
plays in controlling user access to the system
Describe the contents of RACF user, group, and resource profiles
ES1011.0
pr
Ex
cl
Notes:
2-3
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
2-4
z/OS Fundamentals
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
2-5
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
2-6
z/OS Fundamentals
V8.0
Student Notebook
Uempty
Topic objectives
After completing this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
2-7
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
What is ISPF?
Dialog Manager
I
S
P
F
Interactive
System
Productivity
Facility
ES1011.0
Notes:
cl
pr
Ex
A dialog receives requests and data from a user at a terminal. The dialog responds by
using ISPF services to obtain information from, or enter information into, the z/OS system.
2-8
z/OS Fundamentals
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
We do not deal with the software configuration and library manager or the ISPF
client/server component in the rest of this course.
2-9
Student Notebook
Dialog Manager
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Dialog Manager
Display services
Dialog
Select services
Verify selection
Table manipulation
services
Display message
..
.
Dialog variable
services
ES1011.0
Notes:
cl
The Dialog Manager provides various kinds of services to dialogs during their execution
and controls the interaction of the dialog's elements. For example, ISPF can issue requests
for panels to be displayed and screens to be formatted. It can verify, process, store input,
create output, and so forth. ISPF can also function as a simplified data management
system for small amounts of data stored in tables.
Ex
pr
Display services for panels, pop-up windows, pull-down menus, messages, tables, and
so forth
Select services for panels and functions
Table manipulation services
File tailoring services
Services to handle and display dialog variables
V8.0
Student Notebook
Uempty
Panel hierarchy
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
POM
0 Settings
1 Browse
2 Edit
3 Utilities
4 DS List
5 ...
Settings
/ Cursor at ..
_ ...
_ ...
_ ...
View
Proj ____
Group ____
Type ____
Edit
Proj ____
Group ____
Type ____
Other Dsn __
Other Dsn __
Edit
****************
0 //JOB1 JOB
0 //S1 EXEC
0 //DD1 DD
0 ..
***************
Utilities
1 Dataset
2 Library
3 Copy/Move
4 DS List
Dialog Test
1 ......
2 .....
3 ......
4 ......
Copy/Move
C Copy M Mo
Library
CP Cop MP
Dataset
b Blank
Proj ____
b Display
D Delete
D Delete
Proj Group
____ ____
Type
Proj Group
____
____ ____
Group
________
Type
Type ____
ES1011.0
Notes:
This visual shows three common panel types, arranged in a hierarchy. The starting panel at
the top is a selection panel known as the ISPF Primary Option Menu.
cl
From the ISPF Primary Option Menu (POM), other selection panels can be selected.
pr
Ex
Panels used for features like View and Edit use scrollable panels.
2-11
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Settings
View
Edit
Utilities
Foreground
Batch
Command
Dialog Test
LM Facility
Classes
ITS Menu
ITS Schedule
SDSF
SCLM
Workplace
User ID . :
Time. . . :
Terminal. :
Screen. . :
Language. :
Appl ID . :
TSO logon :
TSO prefix:
System ID :
MVS acct. :
Release . :
TSOFT98
09:22
3278
1
ENGLISH
ISR
STUDENT
TSOFT98
MVS1
1ES10G12
ISPF 5.9
Option ===>
F1=Help
F10=Actions
F2=Split
F12=Cancel
F3=Exit
F7=Backward
F8=Forward
F9=Swap
ES1011.0
Notes:
cl
The Program Development Facility component of ISPF provides the dialog or application
developer with a variety of services to create and test applications. PDF lets you manage
data sets, create and test panels and messages, generate tables, keep track of variable
values, set checkpoints, trace applications, and so forth.
Ex
This visual shows the ISPF Primary Option Menu (the main menu of the PDF). It contains
the options that you can use to create your own applications online. It is possible to
customize the ISPF Primary Option Menu, therefore the PDF main menu at your home
system might offer additional or alternative choices to the following options:
Lets you display and change ISPF parameters such as function
key definitions, panel display, display colors, and so forth.
pr
0 - Settings
1 - View
2 - Edit
Lets you create or update data sets and members. The ISPF/PDF
Editor provides macros and models which help you change or
create data sets.
V8.0
Student Notebook
4 - Foreground
5 - Batch
6 - Command
7 - Dialog Test
8 - LM Utilities
9 - IBM Products
10 - SCLM
11 - Workplace
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
3 - Utilities
pr
Ex
cl
Uempty
2-13
Student Notebook
0
1
2
3
4
5
6
7
8
9
10
11
Settings
View
Edit
Utilities
Foreground
Batch
Command
Dialog Test
LM Facility
IBM Products
SCLM
Workplace
User ID . :
Time. . . :
Terminal. :
Screen. . :
Language. :
Appl ID . :
TSO logon :
TSO prefix:
System ID :
MVS acct. :
Release . :
AUES100
16:14
3278
1
ENGLISH
ISR
LOGON
AUES100
SYS1
ACCNT#
ISPF 5.8
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Panel options
Dynamic status
area
SD SDSF
Command line
Option ===>
Function keys
F1=Help
F10=Actions
F2=Split
F12=Cancel
F3=Exit
F7=Backward
F8=Forward
F9=Swap
ES1011.0
Notes:
cl
Action bar
Ex
Panel options
Most ISPF/PDF panels have an action bar at the top. The action
bar offers a set of functions grouped in categories.
This area contains a list of all options that can be selected from
this panel.
The dynamic status area is ISPF/PDF main menu-specific and
displays a set of important ISPF/PDF settings.
Command line
pr
Function keys
This area is used to display the settings of the functions keys valid
for this panel.
V8.0
Student Notebook
Uempty
Navigating in ISPF/PDF
Action bar
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Point-and-shoot
0
1
2
3
.
Settings
View
Edit
Utilities
Option number
0 Settings
1 View
2 Edit
3 Utilities
.
.
Options ===> 3
Function keys
F1=Help
F10=Actions
F3=Exit
F7=Bkwd
F11=Retrieve F12=Cancel
F8=Fwd
ES1011.0
Notes:
cl
Action bars
pr
Ex
Point-and-shoot
2-15
Student Notebook
Function keys
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
.
.
.
Option ===> 3.4
equals
Next Panel
.
.
Option ===> 4
ES1011.0
Notes:
pr
Ex
cl
ISPF's jump function allows you to branch from one ISPF/PDF panel directly to another
panel. When you do so, the old function is ended, before the new one is displayed. To jump
from one panel to another, simply enter its ISPF Primary Option Menu selection code
preceded by an equal sign on any command line or on most data entry fields. Here is an
example of the jump function:
Command ===> =1
This command line entry causes ISPF to leave the current function and to display the entry
panel of the first selection of the ISPF Primary Option Menu. ISPF also allows you to
combine multiple subsequent panel selections by entering them on the same line
separated by a period (.). If you enter 3.4 on a panel's command line, ISPF selects the
panel option 3 of the current panel and then option 4 of the second panel. If you enter =3.4
on a panel's command line, ISPF selects the ISPF Primary Option Menu panel option 3 and
then panel option 4 of the ISPF Primary Option Menu selection 3.
To enter more than one command on a command line, you can stack them by using a
delimiter between the commands. The default delimiter is a semicolon (;). If two or more
commands are entered in this manner, they are executed in the order of their entry.
Copyright IBM Corp. 2001, 2013
2-17
Student Notebook
Utilities
1.
2.
3.
4.
5.
6.
7.
8.
9.
*0.
11.
12.
13.
14.
15.
16.
17.
Compilers
Library
Data set
Move/Copy
Data Set List
Reset Statistics
Hardcopy
ISPF C/S Install...
Outlist
Commands...
Reserved
Format
SuperC
SuperCE
Search-For
Search-ForE
Tables
Udlist
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Pull-down
menu
Menu
----7
0
1
2
3
4
5
6
7
8
9
10
11
Se
Vi
Ed
Ut
Fo
Ba
Co
Di
LM
IB
SC
Wo
SD SDSF
arameters
or listings
urce data
ctions
e processing
uage processing
ation commands
ing
or functions
ment products
brary Manager
Workplace
User ID . :
Time. . . :
Terminal. :
Screen. . :
Language. :
Appl ID . :
TSO logon :
TSO prefix:
System ID :
MVS acct. :
Release . :
AUES100
16:16
3278
1
ENGLISH
ISR
LOGON
AUES100
SYS1
ACCNT#
ISPF 5.8
Option ===>_____________________________________________________________
F1=Help
F3=Exit
F10=Actions F12=Cancel
ES1011.0
Notes:
To move the cursor from any screen location to the action bar:
cl
Ex
2. Enter ACTIONS on any command line and press the Enter key.
pr
Use the Tab key to move the cursor among action bar choices. To display the pull-down
menu of one of the action bar choices, place the cursor on a choice and press Enter. To
select a choice from the pull-down menu, type its number in the entry field (underlined) or
place the cursor on your choice and press Enter. To leave a pull-down menu without further
selection, press F12 (Cancel).
V8.0
Student Notebook
Uempty
Pop-up window
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Settings
View
Edit
Utilities
Foreground
Batch
Command
Dialog Test
LM Facility
IBM Products
SCLM
Workplace
SD SDSF
User ID . :
Time. . . :
Terminal. :
Screen. . :
Language. :
Appl ID . :
TSO logon :
TSO prefix:
System ID :
MVS acct. :
Release . :
AUES100
16:16
3278
1
ENGLISH
ISR
LOGON
AUES100
SYS1
5820
ISPF 5.8
Pop-up
window
Option ===> Z
F1=Help
F3=Exit
F10=Actions
F12=Cancel
ES1011.0
Notes:
cl
Ex
Modal pop-up windows are a special kind of pop-up window. They require the user's
interaction, that is, some kind of reply, before the underlying dialog continues.
pr
Modeless pop-up windows, in contrast, allow you to interact with the dialog before you
interact with the window.
2-19
Student Notebook
Option 0: Settings
Log/List Function keys Colors Environ Workstation Identifier Help
-------------------------------------------------------------------------Print Graphics
Family printer type 2
Device name . . . .
Aspect ratio . . . 0
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Options
Enter "/" to select option
/ Command line at bottom
/ Panel display CUA mode
/ Long message in pop-up
/ Tab to action bar choices
/ Tab to point-and-shoot fields
/ Restore TEST/TRACE options
Session Manager mode
/ Jump from leader dots
Edit PRINTDS Command
/ Always show split line
_ Enable EURO sign
Terminal Characteristics
Screen format
1 1. Data
Terminal Type
1. 3277
2. 3277A
3. 3278
General
Input field pad . . N
Command delimiter . ;
2. Std
3. Max
4. 3278A
5. 3290A
6. 3278T
4. Part
7. 3278CF
8. 3277KN
9. 3278KN
a. 3278DE
b. 3278FI
Command ===>
F1=Help
F10=Actions
F2=Split
F12=Cancel
F3=Exit
F7=Backward
F8=Forward
F9=Swap
ES1011.0
Notes:
cl
The ISPF Settings option allows you to display and modify selected ISPF parameters. The
Settings panel can be invoked from the Primary Option Menu as option 0 or from any panel
by entering the SETTINGS command on a command line. All settings are persistent across
ISPF sessions except some of those available from the Identifier action bar.
Ex
The main ISPF Settings panel has setting options displayed in four areas on the panel:
Options
Terminal characteristics
pr
Print graphics
General
V8.0
Student Notebook
Additional settings are available from the action bars. Some individual settings can be set
from the command line using the following commands:
Controls the display of the function key area at the bottom of the
screen.
KEYLIST
KEYS
Invokes the appropriate utility to modify function keys for the panel
from which the command was invoked.
PFSHOW
ZKEYS
COLOR
Invokes the Global Color Change Utility to modify the display of all
colors.
CUAATTR
PSCOLOR
ENVIRON
PANELID
Turns the display of the panel ID on or off. This setting does not
persist across ISPF sessions and only affects the screen from
which it was entered.
MSGID
SCRNAME
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
FKA
Ex
cl
Uempty
pr
ISPFVAR
2-21
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
. AUES100
. TSOE
. EXEC
.
. . .
. . .
. . .
Initial Macro . .
Profile Name . . .
Format Name . . .
Data Set Password
.
.
.
.
Options
/ Confirm Cancel/Move/Replace
_ Browse Mode
_ View on Workstation
/ Warn on First Data Change
Mixed Mode
.
.
.
.
Command ===>
F1=Help
F2=Split
F10=Actions F12=Cancel
F3=Exit
F7=Backward
F8=Forward
F9=Swap
ES1011.0
Notes:
The View Entry Panel, which is selected from the ISPF Primary Options Menu by option 1,
allows you to either view or browse a data set.
Ex
cl
View allows you to display source data or output listings. With View, members of partitioned
data sets or DASD-resident sequential data sets can be displayed and updated using
editor commands. These changes cannot be saved to the original data set, but can be
saved to another data set using Create or Replace.
pr
Browse also allows you to display data or output listings. With Browse, members of
partitioned data sets, or DASD-resident sequential data sets can be displayed, and can be
scrolled forward, backward, left, or right. You cannot alter the data sets displayed. The
Browse mode is selected from the View Entry Panel.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
. AUES100
. TSOE
. EXEC
.
. . .
. . .
. . .
Workstation File:
File Name . . . . .
Initial Macro . .
Profile Name . . .
Format Name . . .
Data Set Password
.
.
.
.
Options
/ Confirm Cancel/Move/Replace
Mixed Mode
Edit on Workstation
/ Preserve VB record length
.
.
.
.
Command ===>
F1=Help
F2=Split
F10=Actions F12=Cancel
F3=Exit
F7=Backward
F8=Forward
F9=Swap
ES1011.0
Notes:
pr
Ex
cl
When you select option 2 from the ISPF Primary Options Menu, the Edit Entry Panel is
displayed. Edit is very similar to View, except in this case the Save function is enabled.
Changes to the edited data set or member can therefore be saved.
2-23
Student Notebook
Option 3: Utilities
Menu Help
-----------------------------------------------------------------------------Utility Selection Panel
Library
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Option ===>
F1=Help
F10=Actions
F2=Split
F12=Cancel
F3=Exit
F7=Backward
F8=Forward
F9=Swap
ES1011.0
Notes:
The Utilities Selection Panel, option 3 of the ISPF Primary Option Menu, offers a collection
of tools and utilities to work with data sets and ISPF.
cl
Ex
Library
Print an index or data set, work with data set members, compress
a data set, or display data set information.
Allocate, rename, delete, catalog, or uncatalog a data set and
display data set information.
It also offers some VSAM functions.
Move/Copy
Dslist
Reset
Hardcopy
pr
Data Set
V8.0
Student Notebook
Outlist
Commands
Reserved
Format
SuperC
SuperCE
Search-For
Search-ForE
Tables
Udlist
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ISPF C/S
pr
Ex
cl
Uempty
2-25
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
listds es10.cntl
lista st h
printds dataset(jcl.cntl) members
profile
submit jcl(test)
F3=Exit
F7=Backward
F8=Forward
F9=Swap
ES1011.0
Notes:
cl
The ISPF Command Shell, ISPF/PDF option 6, allows TSO commands, CLISTs, and REXX
execs to be executed under ISPF. Commands entered on the ISPF command shell are
appended to a list of most recent issued commands from where they can be retrieved.
Ex
Note
ISPF allows TSO commands to be entered in the command input field of any panel. The
commands have to be prefixed with TSO.
pr
Example:
When issuing a command from a panel's command line, you are limited to the length of the
command line. The ISPF command shell allows you to enter commands wrapping to the
next lines.
2-26 z/OS Fundamentals
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Active users
Input queue
Output queue
Held output queue
Status of jobs
LOG
SR
JC
SE
RES
ENC
PS
System log
System requests
Job classes
Scheduling environments
WLM resources
Enclaves
Processes
END
Exit SDSF
INIT
PR
PUN
RDR
LINE
NODE
SO
SP
Initiators
Printers
Punches
Readers
Lines
Nodes
Spool offload
Spool volumes
ULOG
5694-A01 (C) Copyright IBM Corp. 1981, 2006. All rights reserved.
US Government Users Restricted Rights - Use, duplication or
disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
F3=END
F4=RETURN
ES1011.0
Notes:
pr
Ex
cl
The ISPF Primary Option Menu selection SD displays the System Display and Search
Facility (SDSF), an optional product that lets you display active users and job input queues,
browse job output, show logs, check printers, and so forth.
2-27
Student Notebook
Topic summary
Having completed this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Exercise
Tasks:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
System familiarization
1. Log on to TSO
ES1011.0
pr
Ex
cl
Notes:
2-29
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
2-31
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Topic objectives
After completing this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
2-33
Student Notebook
Optional
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Security Server
Standard
Standard
Cryptographic Services:
y ICSF
y PKI Services
Integrated Security
Services:
y
y
y
y
y
y
Note
ES1011.0
cl
The z/OS Security Services tower includes all the security product software that is shipped
with the z/OS system. Some products in this tower are optional, others are standard.
Security services software is categorized into three component groups.
Ex
The z/OS Security Server component group is an z/OS optional feature. It contains only
one software component Resource Access Control Facility (RACF). RACF provides a
high degree of data security for both local users in a single z/OS installation as well as
remote networked users using z/OS applications.
pr
The third component group is Integrated Security Services (also standard). These products
are used to interface z/OS with other security environments that might be used by clients or
applications on other networked hosts (typically non-z/OS systems). When you activate
these products on z/OS, they talk to the remote host or application using the appropriate
2-34 z/OS Fundamentals
V8.0
Student Notebook
Uempty
security protocol on the one hand, while on the other hand, they interface with the local
RACF security environment in order to control the remote users access to z/OS resources
in the same way as local users might access them.
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
The scope of the whole z/OS security is an immense area, and this topic only deals with
selected parts of the security environment. Note that the prefix Secureway was associated
with the z/OS security products in the past, so you might still see references to Secureway
Security Server RACF or Secureway Security Server DCE Security Server, which refer to
the same products.
2-35
Student Notebook
Data security is
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Destruction
Modification
Disclosure
Use
ES1011.0
Notes:
Note that data security is concerned with unauthorized access to information resources,
whether intentional or accidental.
Ex
cl
Note also that this definition says nothing about the form in which the information
resources exist printed, hand-written, typed, graphs, magnetic tape or disk, or other
electronic media.
pr
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Data sets
DASD
volumes
Tape
volumes
User
RACF
z/OS
Terminals
RACF
IMS/CICS
transactions
Programs
User-defined
resources
ES1011.0
Notes:
The Security Server Resource Access Control Facility (RACF) controls access to
information stored within a z/OS installation.
cl
Ex
pr
2-37
Student Notebook
Public key
infrastructure
Certificate
authority
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Certificate
authority
RACF
DCE clients
Use DCE
tokens to
authenticate
http/s clients
Use X509
certificates to
authenticate
DCE security
server
DCE
infrastructure
Kerberos
security
server
Wintel and
UNIX clients
Use
Kerberos
tokens to
authenticate
Kerberos
infrastructure
ES1011.0
Notes:
cl
In the e-business environment, there are multiple security threats not addressed by central
security products like RACF. Some of these are eavesdropping, impersonation, and
forgery. The other problem is that a separate logon, often with a different user identity, has
to be performed for each system that a user client intends to use. RACF can interact with
three other security environments in a multi-host network.
Ex
pr
A client asks the Kerberos security server to dynamically create a security token for a
service request containing client user identity. The client then passes the Kerberos token
with any network request sent to a remote server application. The remote server extracts
the client user identity from the token and uses it to authorize access to local resources.
A Distributed Computing Environment (DCE)
V8.0
Student Notebook
Uempty
security tokens containing the requesters identity. DCE and Kerberos environments cannot
interact successfully.
A Public Key Infrastructure
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
This type of infrastructure applies to web clients using browsers interacting with
Web-based applications. A web client requests a trusted Certificate Authority (CA) to
construct a signed client certificate file that contains the client true identity. When the client
issues an HTTPS web request, the client certificate is attached to the request. The remote
web server extracts the user identity from the certificate, and passes it to the local security
package on the server system, which uses the identity to control access to resources.
2-39
Student Notebook
Distributed signon
TSO logon
z/OS RACF
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
USERID
TSO user PASSWORD
DCE security
server
DCE RPC
DCE client
DCE
token
PRINCIPAL
RACF
database
http request
System SSL
User
identity
Map
certificate
RACF
user ID
PRINCIPAL
Web client
RPC
Wintel,
UNIX
client
Kerberos
token
Map
PRINCIPAL
Key database
ES1011.0
Notes:
cl
A local TSO z/OS client supplies a RACF user ID and password to do a LOGON. If RACF
validates the user ID/password, the TSO session is authorized by RACF based on this user
ID.
pr
Ex
When a DCE client uses a Remote Procedure Call (RPC) to call a DCE service application
on z/OS, it supplies a DCE security token with the call. The DCE security server extracts
the user identity (principal) from the token and authenticates it using the DCE Security
Server database. If successful, the DCE principal name is mapped to an existing RACF
user ID. The DCE service application then accesses local resources using this RACF user
ID, which is used to authorize any access by the application to z/OS resources.
A Kerberos client RPC is processed similarly. The security function that authenticates the
Kerberos token passed on the RPC is network authentication service (NAS). NAS uses the
Kerberos key database to authenticate the identity of the principal in the Kerberos token
and then assigns a mapped RACF user ID to the resulting service request.
V8.0
Student Notebook
A web client can send an HTTPS request to the Web server (IBM HTTP server) on z/OS
and attach to this request a client certificate. System SSL on z/OS validates the client
certificate, and uses a public key infrastructure (PKI) key ring to check that the signing CA
is a trusted CA. If this is successful, system SSL extracts the client user name from the
certificate and maps it to the name of a RACF user ID. The Web server associates the web
request with the mapped-to RACF user ID and uses that to authorize access to resources
made by the web request.
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Uempty
pr
Ex
cl
The big message: All work arriving in z/OS must be associated with a RACF user ID
before it can successfully start execution.
2-41
Student Notebook
General users
IMS
transaction
Data
set
VM
mini
disk
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
CICS
transaction
Tape
ES1011.0
Notes:
We have several general users of our system. These users have multiple job functions
and therefore need access to various resources to do their jobs.
cl
Without an access control mechanism, they can access any resources they want. There
are no restrictions on data access.
pr
Ex
V8.0
Student Notebook
Uempty
z/OS RACF
User
identification
and
verification
CICS
transaction
IMS
transaction
Data
set
VM
mini
disk
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
General users
User1
User2
Logon
User3
Tape
RACF database
User2
ES1011.0
Notes:
Security Server RACF has four major functions. The first of these is the identification and
verification of users.
cl
Ex
pr
2-43
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Password phrase
ES1011.0
Notes:
cl
RACF will allow you to specify a password or a password phrase for a user. Passwords 1-8
characters long are assumed to be passwords. Passwords 9-100 characters long are
assumed to be password phrases.
A password is a string of up to eight characters.
Ex
A password phrase is a string consisting of mixed case letters, numbers, and special
characters, including blanks, that is used to control access to data and systems.
pr
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
User profile
Userid
Password /
Owner
phrase
Attributes
Security
classification
Segments
Groups
TSO DFP
CICS
Encrypted
ES1011.0
Notes:
A Security Server RACF user profile is defined for all valid users of the system.
The name of a user profile is the user ID.
cl
The owner of a profile (can be a user or a group) has complete control over the profile.
Ex
- The encrypted password entry is unable to be read by listing the user profile entry.
pr
2-45
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
- The security administrator possesses the SPECIAL user attribute, which allows
almost all Security Server RACF commands to be issued.
- The AUDITOR attribute allows a user to look at all RACF profiles and specify any
logging.
- The OPERATIONS attribute allows a user to access all z/OS data sets and zVM
resources.
- The PROTECTED attribute defines a protected user. A protected user cannot enter
the system by any means that would normally require a password / phrase to be
specified, such as a TSO or CICS logon.
pr
Ex
cl
The RACF user profile is made up of a base segment, and can have several other
segments, such as a TSO, DFP, CICS, OPERPARM, WORKATTR, OMVS, NETVIEW,
DCE, or LANGUAGE segment.
V8.0
Student Notebook
Uempty
Groups
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Administrative
group
Clerks
Analysts
Data
Functional group
Functional group
Resource group
ES1011.0
Notes:
cl
Every user is a member of a group. A user can be an active member of any number of
additional groups. A user is said to be connected to these groups. One of these groups has
been defined as the user's default group.
Logically, groups are likely to fall into the following types:
Ex
Functional groups
pr
We consider only the functional group, which is named because all of the members of the
group perform the same job function and therefore need access to the same resources.
2-47
Student Notebook
Superior
group
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
DIVA
Owner=DIVA
Owner=DIVA
DIVAUADM
DIVASALE
Subgroup
Owner=DIVASALE
DIVACUSR
Owner=DIVASALE
DIVAORDE
User-to-group
connection
ANN
JOE
TOM
User
SUE
ES1011.0
Notes:
pr
Ex
cl
Each group, with the exception of SYS1, has a superior, or owning, group. In the visual,
the group DIVA is the superior group of group DIVASALE.
DIVA has two subgroups, DIVASALE and DIVAUADM.
DIVASALE has two subgroups, DIVACUSR and DIVAORDE.
The superior group of DIVACUSR is DIVASALE.
Note that each group profile has an owner. The owner can be either a Security Server
RACF-defined user or group.
When a user is a member of a group, we say that user is connected to the group.
A Security Server RACF user must be connected to at least one group and might be
connected to several groups.
In the diagram, users TOM, SUE, JOE, and ANN are all connected to the DIVAUADM
group. TOM and SUE are also connected to the DIVACUSR group. JOE and ANN are
also connected to the DIVAORDE group.
One of a user's connect groups is designated as the user's default group.
V8.0
Student Notebook
Uempty
Resources
CICS
transaction
IMS
transaction
Data
set
VM
mini
disk
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
General users
User1
User2
Ac
Re cess
qu
es
t
Resource
authorization
checking
User3
Tape
RACF Database
Resource
ES1011.0
Notes:
The second of Security Server RACF's primary tasks is resource authorization checking:
cl
When a user attempts to access a specific resource, Security Server RACF is called to
determine whether this user should be allowed to access the resource.
Ex
Security Server RACF can be used to control access to many types of resources, such
as z/OS data sets, CICS and IMS transactions, and zVM minidisks.
When a user attempts to access a resource, Security Server RACF is called to
determine whether this user should be allowed to access the resource.
pr
2-49
Student Notebook
Security
Server
RACF
processing
SAF
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
User
request
Resource
Manager
Response
to user
RACF
database
ES1011.0
Notes:
Security Server RACF provides a generalized authorization service that can be invoked
with the RACROUTE macro.
cl
The user requests access to a resource that is protected by Security Server RACF.
Ex
pr
Security Server RACF passes its decision back to the resource manager which then
actually allows or denies the access.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Profile
name
Owner
UACC
Access
list
Security
classification
Auditing
ES1011.0
Notes:
cl
The name of a resource profile can be either the exact resource name or a generic
resource name.
The owner of a profile has complete control over the profile.
Ex
The universal access authority (UACC) is the level of access (such as NONE or READ)
that most of the users are allowed to this resource. This is sometimes called the default
level of access.
pr
The Access List contains the names of users who are exceptions to the UACC.
Security classification is optional.
2-51
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ALTER
CONTROL
UPDATE
READ
EXECUTE
NONE
ES1011.0
Notes:
For generic profiles, the specified user or group has full access to the
resource and can create new data sets covered by this generic profile.
Only the profile owner, the SPECIAL user, and group-SPECIAL users
have the ability to administer the profile to give access to other users. For
discrete profiles, the specified user has full access to the resource and
can authorize other users and/or groups to access the resource.
Ex
cl
ALTER
For VSAM data sets, this is the same access as the VSAM control
interval password. Same as UPDATE for non-VSAM data sets.
UPDATE
The specified user or group is allowed to access the resource for the
purpose of reading or writing.
pr
CONTROL
READ
The specified user or group is allowed to access the resource for the
purpose of reading only.
V8.0
Student Notebook
This access level has meaning only for z/OS load libraries. This access
level allows a user to open the data set for the purpose of loading a
program from the library.
NONE
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
EXECUTE
pr
Ex
cl
Uempty
2-53
Student Notebook
UACC
Access
list
Security
classification
Auditing
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Owner
NONE
GROUP
Clerks(READ)
GROUP
Analysts
Clerks
User1
User2
User3
User5
User4
ES1011.0
Notes:
pr
Ex
cl
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
System maintenance
Access = ALTER
Master
catalog
Data Manager
Access = UPDATE
Other users
Access = READ
System maintenance
Access = ALTER
User
catalogs
Users
Access = UPDATE
ES1011.0
Notes:
Catalogs are VSAM data sets that need to be protected. Different catalog types need
different universal and specific access controls.
cl
Master catalog:
Ex
- System programmers who have the responsibility of maintaining the master catalog
require ALTER access.
- People responsible for defining aliases in the master catalog require UPDATE
access.
pr
User catalogs:
- Persons who have the responsibility of maintaining user catalogs require ALTER
access to the appropriate catalogs.
- Users update the user catalog when they allocate new data sets and should,
therefore, be given UPDATE access to the appropriate user catalogs.
Copyright IBM Corp. 2001, 2013
2-55
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
SPECIAL
Users
c
Ac
Ac
ce
ss
ss
Trusted or
privileged
started task
SPECIAL
Ac
c
es
ss
ce
c
A
ES1011.0
Notes:
When PROTECTALL is activated, it prevents any access to a data set not covered by
either a discrete or generic data set profile.
Ex
cl
The exceptions to PROTECTALL are SPECIAL users and privileged or trusted started
tasks which are allowed to access unprotected data sets. These exceptions allow
recovery if a critical data set profile is accidentally deleted.
pr
V8.0
Student Notebook
Uempty
z/OS RACF
CICS
transaction
IMS
transaction
Data
set
VM
mini
disk
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
General users
User1
User2
Ac
re ces
qu s
es
t
User3
Access
violation
on
lati
o
i
V
User
identification and
verification
Resource
authorization
checking
Logging and
reporting
Tape
Ac
eve cess
nt
Report
SMF
RACF database
Resource
ES1011.0
Notes:
The third major function Security Server RACF performs is logging and reporting of
attempts to access resources.
Ex
cl
After Security Server RACF has made the decision to allow or deny access to the
requested resource, it checks to see if any logging was requested. Auditing can be
specified by the security administrator or the auditor.
If logging is requested, then the access event is written to System management
Facilities (SMF).
pr
2-57
Student Notebook
z/OS RACF
General users
CICS
transaction
IMS
transaction
Data
set
VM
mini
disk
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
User
identification and
verification
User1
User2
A
re cces
qu s
es
t
User3
Access
violation
la
Vio
tion
Resource
authorization
checking
Logging and
reporting
Access
Tape
A cc
eve ess
nt
Report
SMF
Administration
AUDITOR
RACF database
Resource
Security Administration
SPECIAL
ES1011.0
Notes:
pr
Ex
cl
When a user attempts to enter the system, Security Server RACF verifies the user's
identity by checking the user profile in the Security Server RACF database. This
process is called user identification and verification or user authentication.
When a user attempts to access a resource, Security Server RACF performs access
authorization checking.
Access events are logged to SMF based upon the auditing specified in the resource
profile and the Security Server RACF options.
The security administrator (SPECIAL) defines user, group, and resource profiles and
sets the system options by using either Security Server RACF commands or ISPF
panels.
The AUDITOR is responsible for auditing the security system and does this by looking
at the profiles, specifying logging, and running reports.
The user with the OPERATIONS attribute can access data in order to maintain the
volumes on the system.
The profiles are stored in the Security Server RACF database.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
OPTION ===>
SELECT ONE OF THE FOLLOWING:
1
SYSTEM OPTIONS
7
99
ES1011.0
Notes:
This is the main menu for the Security Server RACF panels.
pr
Ex
cl
2-59
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
OPTION ===> d
ADD
CHANGE
DELETE
CONNECT
REMOVE
D or 8
S or 9
DISPLAY
SEARCH
===> divasale
ES1011.0
Notes:
To display a group profile, we begin by selecting the DISPLAY option from this panel.
pr
Ex
cl
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
COMMAND ===>
ES1011.0
Notes:
pr
Ex
cl
We did not specify any items on this panel since we did not want to display the DFP or
OMVS segments.
2-61
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
cl
pr
Ex
If any users are connected to a group, those user IDs are listed on this display.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
OPTION ===> 8
SELECT ONE OF THE FOLLOWING:
1
2
3
4
5
D or 8
S or 9
ADD
CHANGE
DELETE
PASSWORD
AUDIT
DISPLAY
SEARCH
===> tom
Userid
ES1011.0
Notes:
To display a user profile with the panels, we use Option D or 8 on the Security Server
RACF - USER PROFILE SERVICES panel.
pr
Ex
cl
2-63
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
COMMAND ===>
To select the following options, enter any character.
ES1011.0
Notes:
pr
Ex
cl
Here you can select to list any of the segments of the user profile.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
pr
Ex
cl
The display of a user profile shows information about the user, including any groups to
which the user is connected. In this display, we did not ask for any segments to be
displayed.
2-65
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
User profile
User data set
Bill
BILL.DATA
Group profile
PAY
PAY .SAL.MAR2000
A.B.C
ES1011.0
Notes:
Ex
cl
Types of data
Data can come in many forms. Not all of those forms can be protected by Security
Server RACF.
While paper, paper tape, punched cards, and the like do not come under the control of
Security Server RACF, items such as DASD and TAPE do.
Types of data sets
There are three types of data sets:
The high-level qualifier (HLQ) for the data set name is the same as a
Security Server RACF-defined user.
pr
USER
GROUP
The HLQ for the data set name matches the name of a Security Server
RACF-defined group.
OTHER
All others. The HLQ does not match a Security Server RACF-defined
user ID or group. Security Server RACF does not allow you to define
data set profiles unless the HLQ is either a Security Server RACF user
or group.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Data set
profile
name
Owner
UACC
Notify
Access
list
Security
classification
Warning
Auditing
DFP
segment
ES1011.0
Notes:
The key information that Security Server RACF stores in the data set profile is:
pr
Ex
cl
2-67
Student Notebook
Generic profile
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Discrete profile
HLQ.X.DATA
HLQ.X.DATA
HLQ.Y.DATA
HLQ.Y.DATA
HLQ.X.DATA
HLQ.*.DATA
HLQ.Y.DATA
HLQ.Z.DATA
HLQ.Z.DATA
HLQ.Z.DATA
ES1011.0
Notes:
Ex
cl
pr
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Generic
ES1011.0
Notes:
This visual summarizes the differences between generic and discrete profiles.
cl
Because of the advantages of generic profiles, we generally avoid the use of discrete
profiles in z/OS.
Ex
In a shared DASD environment, the Security Server RACF database should also be
shared. This is especially important with generic profiles. Otherwise, a system that is
sharing the data could have a Security Server RACF database with different data set
profiles. Thus, the data set could have different access depending upon which system a
user was logged onto when accessing the data set.
pr
A Security Server RACF-indicated data set cannot be accessed unless a data set
profile exists that protects it. When the Security Server RACF indicator bit is set but a
discrete profile does not exist, this is known as an out-of-sync condition.
The Security Server RACF indicator bit is set on and a discrete profile is created when:
- A user who has the automatic data set protection (ADSP) attribute allocates a new
data set.
2-69
Student Notebook
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
The Security Server RACF indicator bit is set on in the VTOC for Non-VSAM data sets.
The Security Server RACF indicator bit is set on in the catalog entry for VSAM data
sets.
V8.0
Student Notebook
Uempty
PERMIT command
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Read
PAY.SAL.DATA
Update
PRUSER
PAYUPD
PERMIT 'PAY.SAL,**'
PERMIT 'PAY.SAL.**
'
WHEN(PROGRAM(PAYUPD))
Profile name
PAY.SAL.**
UACC
NONE
ID(PRUSER)
ID(PRUSER)
Standard
access list
PRUSER(READ)
ACCESS(READ)
ACCESS(UPDATE)
PRUSER(UPDATE)
WHEN(PROGRAM(PAYUPD))
ES1011.0
Notes:
pr
Ex
cl
Use the PERMIT command to build and maintain the lists of users and groups that are
authorized to access a particular resource.
To use PERMIT, one of the following conditions must be met:
- You have the SPECIAL attribute.
- The profile is within the scope of a group in which you have the group-SPECIAL
attribute.
- You are the owner of the resource.
- If the resource is a DATASET, the high-level qualifier of the profile is your user ID.
- For a discrete profile:
You are on the access list with ALTER authority.
Your group to which you are connected is on the access list with ALTER
authority.
The UACC is ALTER.
2-71
Student Notebook
Topic summary
Having completed this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Checkpoint (1 of 2)
1. Which one of the following is not a major task of the Security Server
RACF?
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
2. True or False: Security Server RACF protects data sets with generic
and discrete profiles. If a data set does not have a discrete profile, a
generic profile protects it.
ES1011.0
pr
Ex
cl
Notes:
2-73
Student Notebook
Checkpoint (2 of 2)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
b. TSO commands
c. Point-and-shoot
d. Option numbers
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Unit summary
Having completed this unit, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Identify the main functions of Security Server (RACF) and the role it
plays in controlling user access to the system
Describe the contents of RACF user, group, and resource profiles
ES1011.0
pr
Ex
cl
Notes:
2-75
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
This unit teaches students how to perform the essential data set
management tasks using ISPF/PDF dialogs. In this unit students learn
how to allocate, copy, move, rename, and delete a data set or
member, as well as how to use the ISPF/PDF editor.
cl
Checkpoint questions
Machine exercises
SC26-7410
SC34-4822
SC34-4820
pr
Ex
References
3-1
Student Notebook
Unit objectives
After completing this unit, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Display and modify the edit profile, control scrolling, and manage
multiple screens
Use commands such as FIND, BOUNDS, CHANGE, CREATE, and MOVE
when working with a data set member
ES1011.0
pr
Ex
cl
Notes:
3-2
z/OS Fundamentals
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
3-3
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
3-4
z/OS Fundamentals
V8.0
Student Notebook
Uempty
Topic objectives
After completing this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
3-5
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Data set
Physical record
Unit of data
transfer from
device
Logical record
ES1011.0
Notes:
Data sets in z/OS do not only differ in their content, name, length, and data set type, but
also vary internally in the length and format of their records.
cl
z/OS data sets can have both logical records and physical records.
Ex
A logical record is the unit of data that the program wants to process. It usually
consists of a number of fields concatenated together.
A physical record describes the amount of data transferred in an I/O operation.
pr
Combining multiple logical records in a single physical record (called blocking) has certain
advantages over storing and retrieving a logical record as a physical record. These include
a more efficient space usage as well as an improved performance when transferring data.
3-6
z/OS Fundamentals
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Fixed-length record
unblocked
Fixed-length record
blocked
Variable-length record
unblocked
Variable-length record
blocked
UTILIZATION
BLOCKSIZE
BLOCKSIZE + GAP
ES1011.0
Notes:
cl
Upon allocation of a new data set, users have to specify a record format. The most
commonly used record formats are the fixed-length record format and the variable-length
record format.
Ex
A fixed-length record format tells the system that all records within the data set are of the
same length, that is, they all require the same amount of space, whether they contain only
a single character or many characters.
pr
The variable-length record consists of records that vary in length according to their content.
This means records that hold little data require less storage than those containing a lot of
data. The actual length of a record is specified within it as part of the record.
Both fixed as well as variable format records are commonly grouped in blocks, thus saving
space and requiring fewer I/O operations than unblocked record storage. Blocking is the
process of storing multiple data set records in a single block. Whenever an I/O operation
takes place, an entire block rather than a single record is transferred.
3-7
Student Notebook
Dept
Salary
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Emp#
A logical record: The unit of data that the program will process
Record 1
Record 2
Record 3
Record 4
Record ...
Record n
EOF
ES1011.0
Notes:
pr
Ex
cl
In a sequential data set, also referred to as physical sequence (PS), records are arranged
sequentially in the order in which they are written. New records are appended at the end of
the data set. In sequential data sets, data is organized for sequential access. To retrieve
the fifth record of the data set, the system first has to read the preceding four. Sequential
data sets can be stored on DASD or on tape. They are required for the use of magnetic
tape devices or printed output.
3-8
z/OS Fundamentals
V8.0
Student Notebook
Uempty
Free
space
Directory
entries for
A, B, C, D
Member C
Member B
Member E
Member D
Member A
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Member C
Space of deleted
member
Member
B
Member D
Space of deleted
member
Member D
Member A
Free
space
Member A
Free space of
deleted member
Directory entries
for
E, X
Member D
Member X
Free space
Free space
Free Space
Free space
ES1011.0
Notes:
pr
Ex
cl
A partitioned data set (PDS) is divided into sequentially organized members, each of which
can have one or more records. Each member has a unique name, stored in a directory that
is part of the data set. The directory is located at the beginning of the data set and contains
an entry for each member. Each directory entry contains the member name and the starting
location of the member within the data set. The directory entries are arranged by name in
alphanumeric collating sequence. The main advantage of using a partitioned data set is
that, without searching the entire data set, you can retrieve any individual member after the
data set is opened. Individual members can be added or deleted as required. A deleted
member is removed from the directory. Its space cannot be reused until the data set is
reorganized using a system utility.
Partitioned data set extended
In appearance, a partitioned data set extended (PDSE) is very similar to a partitioned data
set. For accessing a partitioned data set directory or member, most PDSE interfaces are
3-9
Student Notebook
indistinguishable from PDS data set interfaces. However, PDSEs have a different internal
format, which gives them increased usability.
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
The main advantage of using a PDSE over a PDS is that PDSEs use DASD space much
more efficiently. The size of a PDS directory is fixed regardless of the number of members
in it, while the size of a PDSE directory is flexible and expands to fit the members stored in
it. Also, the system reclaims space automatically whenever a member is deleted or
replaced and returns it to the pool of space available for allocation to other members of the
same PDSE. The space can be reused without having to reorganize the data set.
V8.0
Student Notebook
Uempty
Record 3
...............
Record n
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Record 1
Key
Data
Key
Data
.......
Key
Record 2
Record 1
Data
Record n
...Unstructured bit-stream...
Empty
Slot 1
Slot 2
Record 1
Record 2
Record
Slot 3
Empty
...............
Record
Fixed
Slot n
ES1011.0
Notes:
Ex
cl
ESDS
In a key-sequenced data set, logical records are placed in the data set
in ascending collating sequence by a field, called the key. The key
contains a unique value, such as an employee number or part number,
which determines the record's collating position in the data set. The
key must be in the same position in each record, the key data must be
contiguous, and each record's key must be unique. After it is specified,
the value of the key cannot be altered, but the entire record can be
erased or deleted. When a new record is added to the data set, it is
inserted in its collating sequence by key.
pr
KSDS
3-11
Student Notebook
A key-sequenced data set always has an index that relates key values to the
relative locations of the logical records in a data set. This index is called the
prime index, or simply index. It has two uses:
To locate the collating position when inserting records
To locate records for retrieval
A linear data set is a VSAM data set with a control interval size of 4096
bytes to 32768 bytes in increments of 4096 bytes. A linear data set
has a block size of 4096 bytes and does not have embedded control
information. All linear data set bytes are data bytes. A linear data set is
processed as an entry-sequenced data set, with certain restrictions.
Because a linear data set does not contain control information, it
cannot be accessed as if it contained individual records.
RRDS
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
LDS
pr
Ex
cl
V8.0
Student Notebook
Uempty
Simple name:
One to eight characters long
First character is A thru Z @ # $
Second through eighth characters
are A thru Z @ # $ and/or 0-9
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Examples:
Maximum 44
A
characters
SYS1.PROCLIB
PETE.TEST
ACCT.B100.DATA
PAYROLL.DAILY.BACKUP.G0012V00
ES1011.0
Notes:
Before allocating a new data set, we briefly discuss the data set naming rules.
pr
Ex
cl
A data set name consists of one or more parts, called qualifiers. They are
connected by periods (.).
Each qualifier must be a simple name.
- A simple name is up to eight characters long.
- The first character of a simple name can be alphabetic (A-Z) or a national
character (@, #, ).
- The second through eighth character of a simple name can be alphabetic
(A-Z), a national character (@, #, ), or a numeric (0-9).
The maximum length of a data set name is 44 characters (including the
connecting periods). Qualifiers must be simple names. The leftmost qualifier is
known as the high-level qualifier (hlq), and the rightmost qualifier is known as the
low-level qualifier (llq).
3-13
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
A partitioned data set (PDS) or a partitioned data set extended (PDSE) is also referred to
as a library. System libraries usually have a two-level (two qualifier) data set name. TSO
user libraries usually have a three-level (three qualifier) data set name.
pr
Ex
cl
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Dataset.Name.Up.To.Forty.Four.Char.Acters
Dataset Name - max. 44 Characters
Examples:
SYS1.PROCLIB
TSOFS20.PAYROLL.COBOL
Dataset.Name.Up.To.Forty.Four.Char.Acters(Membname)
Dataset Name - max. 44 Characters
Examples: SYS1.PROCLIB(COB2UCLG)
TSOFS20.PAYROLL.COBOL(CALCTAX)
ES1011.0
Notes:
The PDS and PDSE data sets are named exactly the same as other z/OS data sets.
PDSs and PDSEs are host to members, which are really just (small) sequential data sets.
cl
pr
Ex
The maximum length of a data set name including the member name and parentheses is
54 characters.
3-15
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Data set names can consist of up to 22 qualifiers but are usually a lot
less.
TSO user data set names usually consist of three qualifiers, known as
PROJECT.GROUP.TYPE.
The PROJECT field reflects your TSO profile prefix or a valid user ID.
The GROUP field is a user-defined, meaningful name, for example,
JOB, TEST, ISPF.
The TYPE field describes the type of data stored, for example, CNTL,
DATA, EXEC, ASM, PLI.
Examples:
TSOFS20.TEST.CNTL
SAM.ISPF.EXEC
ES1011.0
Notes:
In addition to the rules for the naming of data sets, certain conventions, especially for
ISPF/PDF, apply. These conventions are:
cl
Ex
PROJECT is the common identifier for all ISPF data sets belonging to the same
programming project. PROJECT usually equals your user ID, unless a specific
name has been defined.
pr
GROUP defines a particular set of ISPF data sets belonging to the same project.
GROUP could reflect the application the data set belongs to or perhaps the name
of the programmer who owns it. In any case, it is usually a meaningful name.
TYPE identifies the kind of information stored in the data set, whether it is code,
data, or text.
V8.0
Student Notebook
Uempty
TSOF0_
TSOE
CNTL
_
. . .
. . .
. . .
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ISPF Library:
Project . .
Group . . .
Type . . .
Member . .
- - - - - - - - - - - - - - - - - - - - - - - -
ISPF Library:
Project . .
Group . . .
Type . . .
Member . .
.
.
.
.
TSOFS20_
TSOE
. . .
. . .
. . .
CNTL
_
(Blank or pattern for member selection list)
ES1011.0
Notes:
cl
Any cataloged data set with a three-level name can be entered in the PROJECT, GROUP,
and TYPE fields. If a data set name with more or less than three qualifiers is to be specified,
the name must be entered in the Other Partitioned or Sequential Data Set field.
Ex
pr
If you specify the full data set name, known as the fully qualified name, enclose it in single
quotes: 'data set name'. If you omit the quotes (and a TSO prefix is defined), that prefix is
added as the data set name's first qualifier.
To refer to a member, add its name enclosed in parentheses at the end of the data set
name, for example, TSOFS20.ISPF.PANELS(PANEL01).
If both an ISPF Library name and an Other Partitioned or Sequential Data Set name are
specified on the same panel, the Other Partitioned or Sequential Data Set name takes
precedence.
Copyright IBM Corp. 2001, 2013
3-17
Student Notebook
TSOFS20_
TSOE
. . .
. . .
. . .
CNTL
JOB23
(Blank or pattern for member selection list)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ISPF Library:
Project . .
Group . . .
Type . . .
Member . .
- - - - - - - - - - - - - - - - - - - - - - - ISPF Library:
Project . .
Group . . .
Type . . .
Member . .
.
.
.
.
TSOFS20_
TSOE
. . .
. . .
. . .
CNTL
J%B2
(Blank or pattern for member selection list)
ES1011.0
Notes:
On almost every panel that allows for the specification of a data set, a member entry field is
available.
Ex
cl
To select a single member, enter the member name, and the action (edit and so forth) will
be performed for that member only. If you leave the member field blank, ISPF displays a
member list, from which you select a member.
pr
Instead of a complete member name, you can enter a pattern made up of a partial member
name plus pattern characters. The pattern characters are % and *. The character %
represents a single character and * represents zero to multiple characters. ISPF then
displays all member names that match the pattern.
Here is another example:
Project . . . TSOFS20
Group . . . . TEST
Type . . . . EXEC
Member . . . A*
This will select all members starting with the character A.
3-18 z/OS Fundamentals
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Option ===> 3
0 Settings
1 View
2 Edit
3 Utilities
4 Foreground
5 Batch
6 Command
7 Dialog Test
8 LM Facility
9 IBM Products
10 SCLM
11 Workplace
SDSF
User ID . :
Time. . . :
Terminal. :
Screen. . :
Language. :
Appl ID . :
TSO logon :
TSO prefix:
System ID :
MVS acct. :
Release . :
TSOFS20
16:12
3278
1
ENGLISH
ISR
LOGON
AUES100
SYS1
ACCNT#
ISPF 5.8
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
To get to the Utility Selection panel, choose option 3 from the ISPF Primary Option Menu.
3-19
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Menu Help
---------------------------------------------------------------------------Utility Selection Panel
Option ===> 2
1 Library
Compress or print data set. Print index listing. Print
rename, delete, browse, edit or view members
2 Data Set
Allocate, rename, delete, catalog, uncatalog, or display
information of an entire data set
3 Move/Copy
Move, copy, or promote members or data sets
4 Dslist
Print or display (to process) list of data set names.
Print or display VTOC information
5 Reset
Reset statistics for members of ISPF library
6 Hardcopy
Initiate hardcopy output
7 ISPF C/S
Install ISPF C/S workstation code from MVS to your workstation.
8 Outlist
Display, delete, or print held job output
9 Commands
Create/change an application command table
* Reserved
This option reserved for future expansion.
11 Format
Format definition for formatted data Edit/Browse
12 SuperC
Compare data sets
(Standard Dialog)
13 SuperCE
Compare data sets Extended
(Extended Dialog)
14 Search-For Search data sets for strings of data
(Standard Dialog)
15 Search-ForE Search data sets for strings of data Extended (Extended Dialog)
16 Tables
ISPF Table Utility
17 Udlist
Print or Display (to process) z/OS UNIX directory list
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
Now that we have clarified the rules and conventions for naming ISPF data sets as well as
their specification on ISPF panels, let us move on to the allocation of a new data set.
Ex
cl
There are several ways to allocate a new data set. Data sets can, for example, be created
using job control language (JCL), TSO commands, or ISPF panels. Since we have not
discussed job control language nor TSO commands yet, we will use the latter approach,
that is, use ISPF panels.
pr
To allocate a new data set, select the Utility Selection panel, that is, option 3 from the ISPF
Primary Option Menu. Once the Utility Selection panel is displayed, select option 2 (Data
Set).
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ISPF Library:
Project . . TSOFS20
Group . . . TEST
Type . . . . DATA
F1=Help
F7=Up
. .
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
As you can see, the Data Set Utility panel offers a variety of data set-related functions.
cl
To allocate a new data set, select option A (Allocate new data set) by entering A on the
command line. Also enter the name of the new data set or library in one of the following
fields:
pr
Ex
ISPF Library:
Project . . ________
Group . . . ________
Type . . . . ________
3-21
Student Notebook
RefList
Utilities
Help
Allocate New Data Set
+
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
More:
Command ===>
Data Set Name . . . : TSOFS20.TEST.DATA
Volume serial . . .
Generic unit. . . .
Space units . . . .
Primary quantity. .
Secondary quantity.
Directory blocks. .
Record format . . .
Record length . . .
Block size . . . .
Expiration date . .
.
.
.
.
.
.
.
.
.
.
TRKS
5
1
5
FB
80
0
F1=Help
F3=Exit
Option ===>
F1=Help
F2=Split
F7=Up
F8=Down
(YY/MM/DD, YYYY/MM/DD
YY.DDD, YYYY.DDD in Julian form
DDDD for retention period in days
or blank)
F12=Cancel
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
Ex
cl
After you have entered the data set name on the Data Set Utility panel, ISPF shows the
Allocate New Data Set panel, which is used to specify the type, size, location, and so forth
of the new data set. Several input fields might have been pre-entered. ISPF remembered
these values from your most recent data set allocation or display of data set information.
You can leave these values as displayed or specify your own values. Here is a brief
overview of all fields:
The name of the data set to be allocated as entered
on the previous Data Set Utility panel.
Volume serial
pr
Generic unit
V8.0
Student Notebook
Uempty
Primary quantity
Secondary quantity
Directory blocks
Record format
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Space units
cl
F
V
U
B
A
M
S
Block size
pr
Ex
Record length
Expiration date
3-23
Student Notebook
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Once you have entered all requested data set characteristics, confirm the data set
allocation request by pressing Enter.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F7=Up
. .
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
Once you have issued your data set allocation request, ISPF redisplays the Data Set Utility
panel as well as a message indicating the result of the allocation request.
cl
In case of a successful data set allocation, the message should read Data Set
allocated.
pr
Ex
In any other case, ISPF displays a message indicating the data set allocation failure and its
probable cause.
3-25
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Command ===>
Data Set Name
General Data
Management class . .
Storage class . . .
Volume serial . . .
Device type . . . .
Data class . . . . .
Organization . . .
Record format . . .
Record length . . .
Block size . . . .
1st extent tracks .
Secondary tracks .
Data set name type
:
:
:
:
:
:
:
:
:
:
:
:
STANDARD
BASE
USER09
3390
PO
FB
80
27920
5
1
PDS
Current Allocation
Allocated tracks . : 5
Allocated extents . : 1
Maximum dir. blocks : 5
Current Utilization
Used tracks . . . .
Used extents . . .
Used dir. blocks .
Number of members .
:
:
:
:
1
1
1
0
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
To confirm whether the data set has been allocated according to your specifications, select
the blank option from the Data Set Utility panel, enter the name of the data set that has
been allocated, and press Enter. ISPF now displays the actual characteristics of the
specified data set in its Data Set Information panel.
V8.0
Student Notebook
Uempty
Topic summary
Having completed this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
3-27
Student Notebook
Exercise
Allocate new data sets
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Tasks:
1. Log on to TSO.
2. Allocate three data sets.
Sequential, PDS, and
PDSE
3. Log off.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
3-29
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Topic objectives
After completing this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Display and modify the edit profile, control scrolling, and manage
multiple screens
Use commands such as FIND, BOUNDS, CHANGE, CREATE, and MOVE
when working with a data set member
ES1011.0
pr
Ex
cl
Notes:
3-31
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Workstation File:
File Name . . . . .
Initial Macro . .
Profile Name . . .
Format Name . . .
Data Set Password
F1=Help
F7=Up
F2=Split
F8=Down
.
.
.
.
.
.
.
.
Options
/ Confirm Cancel/Move/Replace
Mixed Mode
Edit on Workstation
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
To edit a data set or member of a data set, select option 2 (Edit) from the ISPF Primary
Option Menu. Enter the name of the data set or library in the following fields:
Ex
cl
Project . . . ________
Group . . . . ________
Type . . . . ________
pr
If the data set you are about to edit is partitioned organized and you know the member
name, you can specify the name in the area labeled as follows:
Member . . . ________
V8.0
Student Notebook
Uempty
If you know only part of the name, you can specify only that part followed by an asterisk (*),
as shown in the following example:
Member . . . A*______
Once you have entered all required information, press Enter to continue.
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
What is the third way to specify a data set name on this panel?
3-33
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
10
18
10
18
0 TSOFS20
0 TSOFS20
0 TSOFS20
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
If you are editing a partitioned data set and did not specify a member name or only a
pattern in the Edit Entry Panel, ISPF prompts you with a member list for this data set. You
can scroll through the list using the Up and Down scroll commands and select one member
at a time by placing the cursor or an s in the column on the left of the member name or by
entering s membername (select member name) on the command line. To continue, press
Enter.
V8.0
Student Notebook
Uempty
ISPF/PDF editor
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
cl
After having specified a sequential data set or the member of a partitioned data set, ISPF
now displays the data set or member contents in the ISPF/PDF editor. You can now add,
alter, delete, sort, and so forth, the displayed data.
Ex
ISPF displays the name of the data set (and member) you are editing at the top of the
screen. In this case it is TSOFS20.TEST.CNTL(AMS). The field titled Columns indicates
which part of the data set or member you are editing. The editor allows you to change your
view by scrolling up and down as well as left and right. Columns lists the columns you are
currently editing.
pr
3-35
Student Notebook
ISPF/PDF profile
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
cl
Each user has at least one edit profile. An edit profile is a set of characteristics that defines
the way you can edit a data set. For example, a profile can be set up to edit data that is all
in capital letters or to edit data that is in mixed-case letters.
Ex
ISPF generates a default edit profile based on the library type of the data set you are
editing. Usually, the default profile is suitable for the kind of data you want to put in the data
set. Sometimes, however, it is not. To display the edit profile for a data set, type profile
on the command line and press Enter.
pr
ISPF now displays the default profile settings in the five =PROF> lines at the top of the
screen.
Edit automatically remembers the current setting for each mode in the profile. If you, for
example, change from NUMBER OFF to NUMBER ON, you are telling edit to start
generating sequence numbers. Edit then automatically remembers that NUMBER mode is
on, so the next time that you edit with the same profile, NUMBER mode is on.
V8.0
Student Notebook
Uempty
When a new profile is defined, default values are used for the initial mode settings. You can
either accept the defaults or change them with edit commands. Once you have changed
them, your values are remembered.
Notice that RECOVERY is off. It is recommended you turn it on for each member so that
you get both automatic edit RECOVERY and the UNDO function.
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Profile lines are deleted from the display when you enter RESET on the command line or by
overtyping the =PROF> at the start of each profile line with a d for delete.
3-37
Student Notebook
Scrolling
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Press F7 to move UP the data (that is, towards the first record)
Press F8 to move DOWN the data (that is, towards the last record)
The useful scroll amounts are:
Cursor
Page
Half
To change move cursor to scroll area and enter first character of the amount. For
example, C or P or H
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
The editor allows you to change your view by scrolling up and down as well as left and
right. Columns lists the columns you are currently editing.
pr
Ex
cl
To scroll up and down, use the function keys F7 and F8 or enter up or down with or without
a numeric value, indicating the number of lines to scroll. If you do not specify a value or use
the function keys to scroll, ISPF scrolls by the amount indicated in the Scroll ===> field.
You can change its setting to PAGE, HALF, CSR, MAX, DATA, or to a numeric value.
Accordingly, ISPF scrolls by the page, half page, to the current cursor position, to the
top/bottom of the data set or member, by a page minus a line, or by number of lines
specified, respectively.
Most people prefer CSR. You should try PAGE and HALF.
The settings of MAX, DATA, or a numeric value are not very useful in the scroll field.
V8.0
Student Notebook
Uempty
More scrolling
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Press F7 to move UP the data (that is, towards the first record)
Press F8 to move DOWN the data (that is, towards the last record)
Alternatively, override scroll amount for the next action but entering an M (for
Maximum) or an number you choose (for example, 8) in the command area.
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
The scroll amount can be adjusted for the next move by coding M for MAX, or a numeric
value on the command line.
3-39
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
The scroll amount can be adjusted for the next move by coding M for MAX, or a numeric
value on the command line.
V8.0
Student Notebook
Uempty
Split screen (1 of 2)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
3-41
Student Notebook
Split screen (2 of 2)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Original
screen
New
screen
ES1011.0
Notes:
To change the split, position the cursor to the new split line and press F2.
pr
Ex
cl
V8.0
Student Notebook
Uempty
Resplit screen
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
SDSF
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
3-43
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
pr
Ex
cl
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
The command enables or disables the display of point-and-shoot fields for each
logical screen on the physical screen.
Syntax:
SWAPBAR [ON|OFF]
ON
The point-and-shoot fields for each logical screen are displayed across the line at the
bottom of the physical screen
OFF
The point-and-shoot fields for each logical screen are removed from the physical
screen display
The current logical screen changed by placing the cursor on SWAPBAR field and
pressing Enter.
Each point-and-shoot field can be up to eight characters in length.
Displays screen name or panel name for logical screen.
ES1011.0
Notes:
The SWAPBAR system command is used to enable or disable the display of the
point-and-shoot fields for each logical screen on the physical screen.
cl
The point-and-shoot fields are displayed across the line at the bottom of the physical
screen.
Ex
Display on the physical screen point-and-shoot fields associated with each logical screen
for the session.
Use the point-and-shoot field to invoke the associated logical screen:
pr
User can readily identify each of the logical screens for the session
3-45
Student Notebook
SWAPBAR example (1 of 2)
Note:
swapbar
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Option ===>
0
1
2
3
4
5
6
7
8
9
10
11
12
13
Settings
View
Edit
Utilities
Foreground
Batch
Command
Dialog Test
LM Facility
IBM Products
SCLM
Workplace
Subsystems
DB2 SWAT
User ID . :
Time. . . :
Terminal. :
Screen. . :
Language. :
Appl ID . :
TSO logon :
TSO prefix:
System ID :
MVS acct. :
Release . :
PRICHAR
14:25
3278A
4
ENGLISH
PDF
IKJACCNT
X9
V21
ISPF 6.0
SWAPBAR
command
SWAPBAR
list
0 Settings
1 View
2 Edit
3 Utilities
4 Foreground
5 Batch
6 Command
7 Dialog Test
8 LM Facility
12 Subsystems
13 DB2 SWAT
User ID . :
Time. . . :
Terminal. :
Screen. . :
Language. :
Appl ID . :
TSO logon :
TSO prefix:
System ID :
PRICHAR
14:25
3278A
4
ENGLISH
PDF
IKJACCNT
Cursor sensitive
LEFT/RIGHT scrolling
enabled
> (greater than) displayed
at the right of the list to
indicate RIGHT scrolling
possible
< (less than) displayed at
the left of the list to indicate
LEFT scrolling possible
X9
DB/DC Subsystems
SWAT team tools
DSLIST
ES1011.0
Notes:
This slide shows using the SWAPBAR system command display the SWAPBAR list.
cl
The current or active logical session is changed by positioning the cursor on the related
SWAPBAR point-and-shoot field and pressing Enter.
Ex
The SWAPBAR point-and-shoot fields use the same physical attribute as the action bar
choices. If the Tab to action bar choices option is selected, then tabbing to SWAPBAR
entries is enabled.
The point-and-shoot field for each logical screen can be up to 8 characters in length.
pr
The field will display the screen name if assigned otherwise it displays the name of the
current panel for the logical screen.
The entry for the current or active logical session will have an * in the first character
position and if the name is 8 bytes long the last character will not be displayed.
The entry for the screen opposite the current logical screen will have a - in the first position
and the 8th character will not be displayed.
V8.0
Student Notebook
Uempty
SWAPBAR example (2 of 2)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
12 Subsystems
13 DB2 SWAT
Place cursor on
SWAPBAR field for
SDSF screen and
press ENTER
User ID . :
Time. . . :
Terminal. :
Screen. . :
Language. :
Appl ID . :
TSO logon :
TSO prefix:
System ID :
PRICHAR
14:25
3278A
4
ENGLISH
PDF
IKJACCNT
X9
DB/DC Subsystems
SWAT team tools
DSLIST
SDSF becomes
current logical
screen
DA
I
O
H
ST
Active users
Input queue
Output queue
Held output queue
Status of jobs
LOG
SR
RES
ENC
PS
System log
System requests
WLM resources
Enclaves
Processes
END
Exit SDSF
DSLIST
INIT
PR
PUN
RDR
LINE
NODE
SO
SP
Initiators
Printers
Punches
Readers
Lines
Nodes
Spool offload
Spool volumes
ULOG
ES1011.0
Notes:
pr
Ex
cl
This slide shows using the SWAPBAR to change the current screen from the ISPF Settings
panel to SDSF.
3-47
Student Notebook
Action
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Command
Type save
Press F3
Type cancel/can
or press F12 (if it is
set to cancel)
ES1011.0
Notes:
cl
To save the contents of an altered data set or member enter the Save primary command on
the command line and press Enter. ISPF saves the contents of the edited data set or
member but remains in Edit mode.
Ex
To save the contents of an edited data set or member while quitting the editor, press F3.
ISPF saves the changes and displays the previously shown panel.
pr
To quit the ISPF editor without saving any changes since the last save, press F12 or enter
cancel or can on the command line and press Enter. ISPF returns to the previous panel.
V8.0
Student Notebook
Uempty
FIND command (1 of 2)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
The FIND primary command is used to locate and display the occurrences of a specified
character string in the data set or member you are currently editing.
cl
Along with the FIND command, you always have to specify a character string.
pr
Ex
3-49
Student Notebook
FIND command (2 of 2)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
pr
Ex
cl
FIND characterstring
V8.0
Student Notebook
Uempty
FIND characterstring
NEXT | PREV | FIRST | LAST
Locates and displays the next occurrence of
characterstring starting from the current cursor position.
NEXT is the default for FIND.
PREV
FIRST
LAST
RFIND
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
NEXT
pr
Ex
cl
For additional parameters of the FIND command, refer to ISPF Users Guide Vol I.
3-51
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
cl
Use the BOUNDS primary command to specify the range of columns to which other
commands, such as FIND, EXCLUDE, CHANGE, and so on, apply. Columns outside the
specified area remain unaffected.
Ex
BOUNDS leftcolumn rightcolumn sets the boundaries for all following editor
commands to columns leftcolumn and rightcolumn.
The EXCLUDE primary command, which can also be entered as X, excludes specific lines
of the data set or member being edited from display.
pr
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
cl
Use the BOUNDS primary command to specify the range of columns to which other
commands such as, FIND, EXCLUDE, CHANGE and so on apply. Columns outside the
specified area remain unaffected.
Here are some examples of BOUNDS:
pr
Ex
BOUNDS leftcolumn *
BOUNDS
3-53
Student Notebook
N
For additional parameters of the BOUNDS command, refer to ISPF Edit and Edit Macros.
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
The EXCLUDE primary command (or X for short) excludes specific lines of the data set or
member being edited from display. Here are some examples of the EXCLUDE command:
EXCLUDE characterstring
EXCLUDE * column
pr
Ex
cl
For additional parameters of the EXCLUDE command, see ISPF Users Guide Vol I.
V8.0
Student Notebook
Uempty
CHANGE command (1 of 2)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
cl
The CHANGE primary command is used to locate the occurrence of a specified character
string within the data set or member you are currently editing and to replace it with another
character string.
pr
Ex
3-55
Student Notebook
CHANGE command (2 of 2)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
cl
The CHANGE primary command is used to locate the occurrence of a specified character
string within the data set or member you are currently editing and to replace it with another
character string. Here are some examples of the CHANGE command:
Ex
pr
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
RCHANGE
pr
Ex
cl
For additional parameters of the CHANGE command, refer to ISPF Edit and Edit Macros.
3-57
Student Notebook
CREATE command (1 of 2)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Note the
CCs
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F6=RChange
F11=Left
F12=Cursor
New member JOBCARD
ES1011.0
Notes:
cl
The CREATE macro command creates a member of a partitioned data set from the data
you are editing. This command cannot be used to create a sequential data set. CREATE
adds a member to a partitioned data set only if a member with the same name does not
already exist. Use REPLACE if the member already exists.
pr
Ex
CREATE membername creates a new member from the data set you are editing. Use cc in
the numeric prefix area of a line to mark the start and the end of the data to be copied into
the new member.
V8.0
Student Notebook
Uempty
CREATE command (2 of 2)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
New member
JOBCARD created
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=C
ES1011.0
Notes:
cl
The CREATE macro command creates a member of a partitioned data set from the data
you are editing. This command cannot be used to create a sequential data set. CREATE
adds a member to a partitioned data set only if a member with the same name does not
already exist. Use REPLACE if the member already exists.
Ex
Creates a new member from the data set you are editing.
Use cc in the numeric prefix area of a line to mark the
start and the end of the data to be copied into the new
member.
pr
CREATE membername
3-59
Student Notebook
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Note: For additional information on the CREATE command, refer to ISPF Edit and Edit
Macros.
V8.0
Student Notebook
Uempty
COPY command (1 of 2)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
NewF12=Cursor
member
JOBCARD
ES1011.0
Notes:
The COPY command imports records into your edit session at the point you choose. Use A
or B to indicate where the imported records are positioned.
cl
The MOVE command does the same as the COPY command, except that MOVE deletes the
original data after the records have been imported.
pr
Ex
This example imports the whole member, and the member must be in the same PDS.
There are options which allow you to import from other sources. Refer to ISPF HELP for
details.
3-61
Student Notebook
COPY command (2 of 2)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
There are options which allow you to select the records to be imported. Use ISPF HELP for
details.
V8.0
Student Notebook
Uempty
SORT command (1 of 2)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
The SORT macro command rearranges records in the sequence you choose, based on the
contents of one or more selected fields.
pr
Ex
cl
SORT startcolumn endcolumn sequence sorts the records into ascending (A) or
descending (D) order as required. The startcolumn and endcolumn parameters specify
the part of the record to use as the sort field or fields.
3-63
Student Notebook
SORT command (2 of 2)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
Ex
cl
pr
Note: For additional information on the SORT command, refer to ISPF Edit and Edit
Macros.
V8.0
Student Notebook
Uempty
Reset:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Locate:
Submit:
Renum:
Move:
Edit:
Undo:
Unnum:
ES1011.0
Notes:
Reset
Ex
cl
Locate
pr
Submit
Renum
3-65
Student Notebook
Move
Edit
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Unnum
pr
Ex
cl
Undo
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
COLS:
Hide:
RESet Hide:
ES1011.0
Notes:
cl
COLS
pr
Ex
Hide x
RESet Hide
3-67
Student Notebook
Topic summary
Having completed this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Display and modify the edit profile, control scrolling, and manage
multiple screens,
Use commands such as FIND, BOUNDS, CHANGE, CREATE, and MOVE
when working with a data set member
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Exercise
ISPF editor primary commands
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Tasks:
1. Log on to TSO.
2. Use ISPF primary commands.
BOUNDS, FIND, CHANGE
Execute a REXX program
3. Log off.
ES1011.0
pr
Ex
cl
Notes:
3-69
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
3-71
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Topic objectives
After completing this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
3-73
Student Notebook
Prefix area
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
Figure 3-57. Editing data sets: The ISPF/PDF editor line commands
ES1011.0
Notes:
cl
Apart from the command line, the ISPF editor features another area to be used for
command entry, the prefix area. The prefix area is the six-digit field at the beginning of each
line. It is used to process so-called line commands. To enter a line command, overtype the
sequence number at the beginning of a line. The following pages discuss the various line
commands and their effects in more detail.
pr
Ex
While some line commands apply to a single line only, other line commands apply to a
block of lines. Usually, when the action code of a command, for example, c, d, r, and so
forth, is entered twice, for example, cc, dd, or rr, it marks the beginning of the block of
lines to which the command applies. The end of the block is indicated by a repetition of the
same action code. If only a single-character action code is entered, then the command
affects only the line on which it was entered.
V8.0
Student Notebook
Uempty
000007
000008
000009
000010
000011
AAAA
BBBB
AAAA
CCCC
DDDD
000007
000008
000009
000010
AAAA
CCCC
BBBB
DDDD
000007
000008
000009
000010
000011
AAAA
BBBB
BBBB
CCCC
DDDD
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
0c0007
00a008
000009
000010
Move line:
000007
0m0008
000009
0b0010
AAAA
BBBB
CCCC
DDDD
Repeat line:
000007
000r08
000009
000010
AAAA
BBBB
CCCC
DDDD
Figure 3-58. Prefix area commands: Copy, move, and repeat a single line
ES1011.0
Notes:
The line commands c and m mark a single line for copy or move, respectively. The target
line for the copy or move operation has to be identified by:
The copied line is inserted after this line.
The copied line overlays this line. All blank positions of the target line are
overlaid with the data of the source line. All non-blank positions remain
unchanged. See the next visual.
Ex
cl
pr
The line command r repeats a single line, that is, it inserts a line directly after the repeated
line and copies the contents of the repeated line into it.
3-75
Student Notebook
000007
000008
000009
000010
123456
B2B4B6
CCCCCC
DDDDDD
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
0c0007
00o008
000009
000010
Move line:
0m0007
00o008
000009
000010
123456
B B B
CCCCCC
DDDDDD
000007 B2B4B6
000008 CCCCCC
000009 DDDDDD
ES1011.0
Notes:
The line commands c and m mark a single line for copy or move, respectively. The target
line for the copy or move operation has to be identified by:
The copied line overlays this line. All blank positions of the target line are
overlaid with the data of the source line. All non-blank positions remain
unchanged.
pr
Ex
cl
V8.0
Student Notebook
Uempty
000007
000008
000009
000010
000011
000012
AAAA
BBBB
CCCC
DDDD
AAAA
BBBB
000007
000008
000009
000010
AAAA
CCCC
DDDD
BBBB
000007
000008
000009
000010
000011
000012
000013
000014
AAAA
BBBB
AAAA
BBBB
AAAA
BBBB
CCCC
DDDD
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
0cc007
0cc008
000009
0000a0
Move lines:
000007
0b0008
000mm9
0000mm
AAAA
BBBB
CCCC
DDDD
Repeats lines:
0rr207
0rr008
000009
000010
AAAA
BBBB
CCCC
DDDD
Figure 3-60. Prefix area commands: Copy, move, and repeat multiple lines
ES1011.0
Notes:
cl
To copy, move or repeat entire blocks of lines, use the cc, mm, and rr line commands.
Enter the appropriate line command twice, that is, on the first and the last line of the block
of lines that you want to copy, move, or repeat. As with the line commands discussed on
the previous visual, the target for the copy or move operation is specified by a, b or o.
Ex
pr
When specifying an overlay, oo has to be entered on the first and last line of the block that
is to be overlaid.
Repeated lines are always inserted right after their source lines. To repeat a line or block of
lines multiple times, specify r or rr...rr and an integer value, as shown on the example
in this visual.
3-77
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Insert line:
0i0007
000008
000009
000010
AAAA
BBBB
CCCC
DDDD
000007
......
000008
000009
000010
AAAA
000007
000008
000009
000010
AAAA
CCCC
DDDD
EEEE
BBBB
CCCC
DDDD
Delete line:
000007
0d0008
000009
000010
000011
AAAA
BBBB
CCCC
DDDD
EEEE
ES1011.0
Notes:
pr
Ex
cl
To add or delete a line, use the i (insert) and d (delete) ISPF editor line commands. The
line command i inserts a line after the line in which it was specified, and d deletes the line
on which it is entered.
V8.0
Student Notebook
Uempty
000007
......
......
......
000008
000009
000010
AAAA
BBBB
CCCC
DDDD
000007
000008
000009
000010
DDDD
EEEE
FFFF
GGGG
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
0i3007
000008
000009
000010
line 000007
Delete line:
0dd007
000008
0dd009
000010
000011
000012
000013
AAAA
BBBB
CCCC
DDDD
EEEE
FFFF
GGGG
ES1011.0
Notes:
cl
To add more than a single line to the data set or member you are editing, enter i and an
integer value in its prefix area. The line command i tells the ISPF editor to insert lines and
the integer value how many.
pr
Ex
To delete a block of lines either enclose them by dds, that is, enter dd in the first and last
lines of the block to be deleted, or enter dd and an integer value in the first line of the block.
The number specified in conjunction with the dd line command reflects the number of lines
to be deleted. If this value is greater than the number of lines remaining in the data set or
member, ISPF deletes all lines up to the end of the data set or member and ignores the
rest.
3-79
Student Notebook
COLS command
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
cl
The COLS line command is used to display a column identification line. This column
identification line contains a numeration of all columns within the edited data set or
member. Displaying the column identification line can be very useful when setting tabs and
boundaries.
Ex
To remove the Cols line from display, enter reset on the command line or delete the
=COLS> line using the d line command.
Additional information about Flagged Lines
pr
Flagged lines are lines that contain highlighted flags in the line command area. They can
be divided into the following categories:
Changed lines
Error lines
Special lines
V8.0
Student Notebook
=CHG>
=ERR>
Special Lines
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Uempty
=PROF> Contains the settings of the individual edit modes. This line is not saved as
part of your data set or member.
=TABS> Defines tab positions. This line is not saved as part of your data set or
member.
=MASK> Can contain data to be inserted into your data set or member when you use
the I (insert) line command. This line is not saved as part of your data set or
member.
=BNDS> Specifies left and right boundaries that are used by other commands. This
line is not saved as part of your data set or member.
=COLS> Identifies the columns in a line. The column identification line can be saved
as part of the data set or member if you use the md (make dataline) line command to
convert it to a data line.
Message, note, and information lines:
=MSG> Message lines inform you of changes to the edit profile. These changes are
caused by inconsistencies between the data to be edited and the edit profile
settings. Message lines are not saved as part of your data set or member unless you
use the md (make dataline) line command to convert them to data lines.
cl
=NOTE= Note lines display information when you insert edit models. However, these
lines do not appear if the edit profile is set to NOTE OFF. Note lines are not saved as
part of the data set or member unless you use the md (make dataline) line command
to convert them to data lines.
pr
Ex
====== Temporary information lines are lines you can add to provide temporary
information that is not saved with the data. Information lines are not saved a part of
the data set or member unless you use the md (make dataline) line command to
convert them to data lines.
3-81
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
CUT and PASTE are used to copy lines from one member or data set to another.
cl
The lines to be copied are marked with a cc copy block, and then cut is entered on the
command line. Then switch to the member or data set and enter an a or b where you want
the lines to go. Type paste on the command line and press Enter.
pr
Ex
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
Enter an a or b where you want the lines to go. Type paste on the command line and
press Enter.
3-83
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
move:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
copy:
() <> :
x:
s:
fn:
ln:
ts:
tf:
lc:
uc:
mask:
tabs:
ES1011.0
Notes:
Use ( or (( to shift columns left on one or more lines. The same rules
as for ) and )) apply. Line commands >, >>, <, and << work in a
similar manner as ), )), (, and (( but does not shift data beyond
boundaries or truncate data when shifting it.
pr
Ex
cl
()<>
The x (exclude) line command excludes one or more lines of data from
display. You can exclude multiple lines from display by specifying x in
conjunction with an integer value or by entering xx on the first and last
line of the block to be excluded.
3-85
Student Notebook
The s (show line) line command causes one or more lines in a block of
excluded lines to be redisplayed. If you want to redisplay more than
one line, type a number greater than 1 after the s command.
ts
ts (text split) lets you split a line at a specified position. To do so, enter
ts in the line's prefix area, move the cursor to the position where the
split is to occur, and press Enter.
tf (text flow) reformats the lines of a paragraph. Remaining space on
the first line is filled with data from the second line. The second line is
then filled with data from the third line, and so on.
lc
uc
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
tf
V8.0
Student Notebook
Uempty
Topic summary
Having completed this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
3-87
Student Notebook
Exercise
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
3-89
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Figure 3-70. Copying, moving, renaming, deleting data sets and data set members
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Topic objectives
After completing this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
3-91
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F7=Up
. .
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
To copy or move an entire data set, sequential or partitioned, select option 3.3 from the
ISPF Primary Option Menu. On the Move/Copy Utility panel, type c for copy or m for move
as your selection on the command line. Enter the name of the source data set, that is, the
name of the data set to be copied or moved. If the source data set is partitioned and you
want to copy or move all members, enter an asterisk (*) in the Member field. If your entries
are correct, press Enter to proceed.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Replace option:
Enter "/" to select option
Replace like-named members
. .
F1=Help
F7=Up
F2=Split
F8=Down
Pack Option
3 1. Yes
2. No
3. Default
F3=Exit
F9=Swap
F4=
F10=Right
SCLM Setting
3 1. SCLM
2. Non-SCLM
3. As is
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
cl
After having entered the source data set of the copy/move operation on the previous panel,
ISPF now displays the panel for the specification of the target data set. Enter the name of
the target data set. Select Replace like-named members if you are copying or moving a
partitioned data set and want already existing members of the target data set to be overlaid
by those of the source data set in case their names match.
pr
Ex
3-93
Student Notebook
Copy/move complete
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F7=Up
. .
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
ISPF now copies the data set or member as specified to their new destination. In case of a
move, ISPF deletes the source after a successful copy operation. The completion of the
copy/move is indicated by a message. It should read Data set copied or Data set
moved.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F7=Up
. .
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
To copy or move one or more members of a partitioned data set, enter the name of the
source data set as well as the proper panel selection on the Move/Copy Utility panel. You
might want to specify a pattern in the Member field to narrow down the list of eligible
members, or, in case of a single member, specify its name. If you enter a pattern, ISPF
displays a member list of all members meeting the selection criteria. Without pattern, ISPF
lists all members. If you enter a member name, ISPF omits the member list.
3-95
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Replace option:
Enter "/" to select option
Replace like-named members
. .
F1=Help
F7=Up
F2=Split
F8=Down
Pack Option
3 1. Yes
2. No
3. Default
F3=Exit
F9=Swap
F4=
F10=Right
SCLM Setting
3 1. SCLM
2. Non-SCLM
3. As is
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
After having entered the source data set of the copy/move operation on the previous panel,
ISPF now displays the panel for the specification of the target data set.
pr
Ex
cl
Enter the name of the target data set. Select Replace like-named members if you want to
overlay existing members through the ones to be copied.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
In case of a missing member name or a pattern specification, ISPF displays a member list
as shown above.
cl
To select a member for the copy/move operation, enter an s in its prefix area.
Ex
To browse the contents of a member prior to making any selection, use the b line
command.
To select a member for the copy/move and rename it in the target data set, select this
member, and enter the new member name in the Prompt field after its current name.
pr
3-97
Student Notebook
Copy/move complete
Scroll ===> PAGE
AUES100.TEST.DATA
Row 00001 of 00005
Changed
Size Init
Mod
ID
08/05/17 18:23
10
10
0 TSOFS20
08/02/06 14:39
12
12
0 TSOFS20
07/11/18 10:32
12
12
0 TSOFS20
07/11/19 10:21
7
7
0 TSOFS20
07/11/19 11:25
11
7
0 TSOFS20
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
After a successful copy/move, ISPF displays a *COPIED, *MOVED, or *REPL next to each
member.
The member was copied or copied/locked successfully
*MOVED -
*REPL -
Ex
cl
*COPIED -
pr
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ISPF Library:
Project . .
Group . . .
Type . . . .
TSOFS20
TEST
CNTL
F1=Help
F7=Up
. .
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
To rename a data set, select ISPF/PDF option 3.2, the Data Set Utility panel. Enter the old
data set name and specify r as your selection on the command line. To enter the new data
set name, press Enter.
3-99
Student Notebook
RefList
Utilities
Help
Rename Data Set
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
TSOFS20
TEST
NEWCNTL
Command ===>
F1=Help
F3=Exit
F1=Help
F7=Up
F2=Split
F8=Down
F12=Cancel
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
Figure 3-80. Data Set Utility panel: Specifying the new data set name
ES1011.0
Notes:
pr
Ex
cl
To complete the information needed for a data set rename, ISPF/PDF now prompts you for
the new data set name, that is, the name under which it will be cataloged after the change.
Fill in the required information and confirm it by pressing Enter.
V8.0
Student Notebook
Uempty
RefList
Utilities
Help
Data Set Utility
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Option ===>
A
R
D
blank
ISPF Library:
Project . .
Group . . .
Type . . . .
C
U
S
M
V
TSOFS20
TEST
CNTL
F1=Help
F7=Up
. .
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor1
Figure 3-81. Data Set Utility panel: Successful data set rename
ES1011.0
Notes:
pr
Ex
cl
After ISPF/PDF has performed the data set rename, it will notify you in any case of its
outcome by issuing a message on the Data Set Utility panel. In case of a successful
rename of the data set, the message Data set renamed is issued.
3-101
Student Notebook
RefList
Utilities
Help
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Library Utility
Option ===> r
blank Display member list
E Edit member
C Compress data set
V View member
X Print index listing
B Browse member
L Print entire data set
D Delete member
I Data set information
R Rename member
S Short data set information
P Print member
ISPF Library:
Project . .
Group . . .
Type . . .
Member . .
New name .
.
.
.
.
.
TSOFS20
TEST
NEWCNTL
TESTA
TESTB
. . .
. . .
. . .
F1=Help
F7=Up
. .
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
Figure 3-82. Library Utility panel: Specifying the old member name
ES1011.0
Notes:
pr
Ex
cl
To rename a single member rather than an entire data set, select ISPF/PDF option 3.1, the
Library Utility panel. Specify the name of the data set containing the member to be
renamed as well as the current member name and the new member name. Enter the
selection r on the command line, and proceed with the member rename operation by
pressing Enter.
V8.0
Student Notebook
Uempty
RefList
Utilities
Help
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Library Utility
Member TESTA Renamed
Option ===>
blank Display member list
E Edit member
C Compress data set
V View member
X Print index listing
B Browse member
L Print entire data set
D Delete member
I Data set information
R Rename member
S Short data set information
P Print member
ISPF Library:
Project . .
Group . . .
Type . . .
Member . .
New name .
.
.
.
.
.
TSOFS20
TEST
NEWCNTL
. . .
. . .
. . .
F1=Help
F7=Up
. .
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
After the member rename operation has been performed, ISPF/PDF issues a message,
which case should read Member member_name Renamed.
3-103
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
TSOFS20
SAMPLE
DATA
F1=Help
F7=Up
. .
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
To delete an entire data set, choose the Data Set Utility panel, that is, ISPF/PDF option 3.2,
and enter the name of the data set to be deleted as well as the command line selection d.
Before the data set is now actually deleted, ISPF/PDF will prompt you for your delete
confirmation.
V8.0
Student Notebook
Uempty
RefList
Utilities
Confirm Delete
------
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Help
t)
on
Instructions:
"C")
Command ===>
F1=Help
F2=Split
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F3=Exit
F9=Swap
F9=Swap
F4=
F10=Right
F12=Cancel
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
cl
You are now prompted to confirm the data set delete. Since data set deletion is an
irrevocable process, ISPF requires you to confirm that you really want the data set deleted.
If you want to delete the data set, press the Enter key. If you made a mistake and do not
want to delete the data set, enter the END command.
Ex
If the data set you are deleting has an expiration date that has not expired, you will also be
shown the Confirm Purge panel. If you want to delete the data set, enter a forward slash (/)
in the PURGE DATA SET field. If you made a mistake and do not want to delete the data
set, press Enter or enter the END command.
pr
You cannot delete VSAM data sets nor password protected data sets with this utility.
3-105
Student Notebook
RefList
Utilities
Help
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ISPF Library:
Project . .
Group . . .
Type . . . .
C
U
S
M
V
TS0FS20
SAMPLE
DATA
F1=Help
F7=Up
. .
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
If you confirmed the data set deletion request, the message issued by ISPF/PDF should be
Data set deleted. If you did not confirm the delete, it should read Data set not
deleted. Any other message indicates an error.
V8.0
Student Notebook
Uempty
RefList
Utilities
Help
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Library Utility
Option ===> d
blank Display member list
E Edit member
C Compress data set
V View member
X Print index listing
B Browse member
L Print entire data set
D Delete member
I Data set information
R Rename member
S Short data set information
P Print member
ISPF Library:
Project . .
Group . . .
Type . . .
Member . .
New name .
.
.
.
.
.
TSOFS20
TEST
NEWCNTL
TESTA
. . .
. . .
. . .
F1=Help
F7=Up
. .
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
To delete only selected members of a data set, choose the Library Utility panel, ISPF/PDF
option 3.1. Enter the name of the data set containing the member to be deleted and the
member name and specify d for delete on the command line. Press Enter.
3-107
Student Notebook
RefList
Utilities Help
ISPF Utilities
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Member to be Deleted:
TESTA
elected)
New name
. .
(If R selected)
F1=Help
F7=Up
. .
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
cl
Depending on your settings, ISPF/PDF now either performs the member delete or prompts
you to confirm the member delete. If your settings contain Set member delete
confirmation off, ISPF/PDF does not prompt you for your confirmation. If your settings do
not contain Set member delete confirmation off, ISPF/PDF prompts you for your
confirmation by displaying the Confirm Member Delete window as shown above.
pr
Ex
To confirm the delete, press Enter. To cancel the delete, press either CANCEL or EXIT.
You might also want to change the setting for the confirmation prompting in case of a
member delete. This change does not apply until the next member delete request.
V8.0
Student Notebook
Uempty
RefList
Utilities
Help
TESTA Deleted
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Library Utility
Member
Option ===>
blank Display member list
E Edit member
C Compress data set
V View member
X Print index listing
B Browse member
L Print entire data set
D Delete member
I Data set information
R Rename member
S Short data set information
P Print member
ISPF Library:
Project . .
Group . . .
Type . . .
Member . .
New name .
TSOFS20_
TEST
NEWCNTL
.
.
.
.
.
. . .
. . .
. . .
F1=Help
F7=Up
. .
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
3-109
Student Notebook
Topic summary
Having completed this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Exercise
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
3-111
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
3-113
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Topic objectives
After completing this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
3-115
Student Notebook
RefMode
Utilities
Help
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Menu
1.
2.
3.
4.
Volume
Space
Attrib
Total
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
One way to display a data set list is to use ISPF/PDF option 3.4, which displays the Data
Set List Utility panel. A list can be created by either specifying a data set name level, that is,
one or more qualifiers, by specifying a volume serial or a combination of both data set
name level and volume serial. Do not enter any selection on the command line.
In the example in this visual, a data set name level of TSOFS20 is entered. The result is a
list of all catalog entries that contain TSOFS20 as their first qualifier, as displayed on the
following visual. You might want to use *, **, or % to narrow down your search results. *
acts a placeholder for at least one qualifier, ** stands for zero or more qualifiers, and %
stands for a single character within a data set name. When no Volume serial is specified,
the list is created through a catalog search, otherwise through a search of the VTOC.
The Initial view field specifies which view of the data set list information you would like to
be displayed first with the data set list. Alternate views are available using the LEFT and
RIGHT scroll commands, and the View action bar choice.
The Confirm Data Set Delete and Confirm Member Delete options let you choose whether
you want to be prompted for your confirmation if a data set or member delete request is
issued.
3-116 z/OS Fundamentals
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
cl
You now see a typical data set list as created with ISPF/PDF option 3.4. If the list exceeds
the displayable area, you can use the UP and DOWN commands to scroll through the list.
You can also use the LEFT and RIGHT commands to perform a horizontal scroll, which
displays other data set characteristics, such as device type, data set organization, record
size, expiration date, and so on.
Ex
To work with data sets from the list, enter one of the following line commands in the
Command field that precedes the data set name.
This list is not comprehensive. See the ISPF literature for a complete listing.
Browse data set
Edit data set
View data set
Rename data set
Delete data set
Catalog data set
Copy data set
pr
b
e
v
r
d
c
co
3-117
Student Notebook
mo
i|s
p
z
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
In addition a forward slash (/) next to the data set name can be used to display a pop-up
window that will list the available commands.
V8.0
Student Notebook
Uempty
View
Row 1 of 12
===> PAGE
Volume
----------*ALIAS
USER06
USER02
USER04
USER05
USER05
USER05
USER03
USER04
USER08
USER02
USER02
************
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
D
C
C
-
Options
DSLIST Action
1. Edit
1
2. View
3. Browse
4. Member List
5. Delete
6. Rename
7. Info
8. Short Info
9. Print
10. Catalog
11. Uncatalog
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
Compress
Free
Print Index
Reset
Move
Copy
Refadd
Exclude
Unexclude 'NX'
Unexclude first 'NXF'
Unexclude last 'NXL'
F1=Help
F7=Up
F2=Split
F8=Down
F3=Exit
F9=Swap
F4=
F10=Right
F5=RFind
F11=Left
F6=RChange
F12=Cursor
ES1011.0
Notes:
pr
Ex
cl
Instead of entering the command in the Command field before the data set name, you can
also enter a forward slash (/) to bring up with a Data Set List Action window, from which the
desired operation can be selected.
3-119
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
cl
Starting with z/OS V1R10, ISPF DSLIST now allows you to issue commands against a
block of data sets grouped together in the list. A block of line commands is marked by
entering two forward slash characters (//) at the start and end of the block.
Ex
For the ISPF Data Set List Utility, line commands can now be entered in block command
format to execute the same line command for several data sets at once. The block is
marked by typing a // at the beginning and another // at the end of a block of rows.
The line command must follow the // immediately on the first or last row of the block.
pr
All line commands, including TSO commands, Clists and REXX execs can be executed as
block commands.
Several blocks of commands can be entered at the same time, but they cannot be nested.
Single line commands are not allowed within a block command.
Benefit: Removes the need to enter the line command against each data set when they
are grouped together in the list
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
cl
ISPF DSLIST now allows you to issue commands against a block of data sets grouped
together in the list. A block of line commands is marked by entering two forward slash
characters (//) at the start and end of the block.
Ex
You must type the line command either immediately after the // on the first row of the block,
or immediately after the // on the last row of the block. Figure 3-98, "Block commands in
Data Set List: Usage," on page 3-121 shows an example of entering a delete command
against 7 data sets in the list.
You can enter several blocks of commands at the same time, but you cannot nest them.
pr
Single line commands are not allowed within a block command. You can execute all line
commands, including TSO commands, Clists and REXX execs as block commands. If you
have selected the DSLIST settings option Execute Block Commands for excluded data
sets, all applicable excluded rows are unexcluded before the block commands are
executed.
3-121
Student Notebook
Topic summary
Having completed this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Checkpoint (1 of 3)
1. Which are the standards for naming partition data sets? (Mark all that
apply.)
Simple names connected with periods
Simple name must be eight characters in length
Data set name can be a maximum of 54 characters in length
Data set names can have up to 22 qualifiers
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
a.
b.
c.
d.
Directories
Members
Characters
Partitions
ES1011.0
pr
Ex
cl
Notes:
3-123
Student Notebook
Checkpoint (2 of 3)
4. What is an edit profile?
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
a. Set of characteristics that define the way you can edit a data set
b. Description of the ISPF user
c. Definition of the way you can edit a data set
d. Definition of the data attributes
5. True or False: In edit mode, to scroll up and down use F10 and F11.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Checkpoint (3 of 3)
7. The prefix area is the six-digit field at the beginning of each line. It is
used to process so-called (blank).
Procedures
Clist
Shell scripts
Line commands
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
a.
b.
c.
d.
8. True or False: CUT and PASTE is used to copy lines from one member
or data set to another.
9. To browse the contents of a member prior to making any selection,
use which line command?
a.
b.
c.
d.
s
b
r
e
ES1011.0
pr
Ex
cl
Notes:
3-125
Student Notebook
Exercise
Data set lists
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Tasks:
1. Log on to TSO.
2. Work with data set lists.
3. Move, rename, and
delete members.
4. Compress and delete
data sets.
5. Log off.
ES1011.0
Notes:
cl
Ex
ISPF/PDF Editor:
pr
V8.0
Student Notebook
Uempty
Unit summary
Having completed this unit, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Display and modify the edit profile, control scrolling, and manage
multiple screens
Use commands such as FIND, BOUNDS, CHANGE, CREATE, and MOVE
when working with a data set member
ES1011.0
pr
Ex
cl
Notes:
3-127
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
SA22-7784
SA22-7787
TSO/E Primer
SA22-7782
pr
Ex
cl
References
4-1
Student Notebook
Unit objectives
After completing this unit, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ALLOCATE
DELETE
LISTDS
LISTCAT
LISTALC
FREE
PRINTDS
PROFILE
SUBMIT
SEND
RECEIVE
TRANSMIT
ES1011.0
pr
Ex
cl
Notes:
4-2
z/OS Fundamentals
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
4-3
Student Notebook
TSO/E commands
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Command
name
LISTDS
Keyword
operand
Positional
operand
TSOFS20.TEST.DATA
MEMBERS
ES1011.0
Notes:
cl
pr
Ex
Positional operands
Keyword operands
4-4
z/OS Fundamentals
V8.0
Student Notebook
Uempty
LINESIZE(integer)
If you enter conflicting, mutually exclusive keywords, the last
keyword operand overrides the previous ones.
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
When you type a command, you must separate the command name from the first operand
by one or more blanks. You must separate operands by one or more blanks or a comma.
When it is necessary to continue a command to the next line, use a plus (+) or minus (-)
sign as the last character of the line you want to continue, for example:
pr
Ex
cl
4-5
Student Notebook
6
KEYWORD
OPERAND
KEYWORD
OPERAND
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
1
COMMAND
CMD
KEYWORD
OPERAND
4
10
KEYWORD
OPERAND
KEYWORD
OPERAND
KEYWORD
OPERAND
11
additional parameter
KEYWORD
OPERAND
ES1011.0
Notes:
pr
Ex
cl
How to read the notation of a TSO/E command from the visuals in this unit and other
TSO/E documentation:
Double arrows indicate the beginning and ending of a statement.
If a statement syntax requires more than one line to be shown, single arrows indicate
their continuation.
Required items appear on the horizontal line (the main path).
Optional items appear below the main path.
If you can choose from two or more items, they are stacked vertically.
If you must choose one of the items, an item of the stack appears on the main path.
If choosing one of the items is optional, the entire stack appears below the main path.
An arrow returning to the left above main line indicates an item that can be repeated.
A repeat arrow above a stack indicates that you can make more than one choice from
the stacked items, or repeat a single choice.
Default values appear either underlined or above the main path in the diagrams.
A dotted arrow indicates that only a subset of the entire command syntax is shown.
(This notation is used in this course only, as we explain only a subset of all parameters.)
4-6
z/OS Fundamentals
V8.0
Student Notebook
Uempty
ALL
ALL
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
command_name
command_name
subcommand_name
subcommand_name
FUNCTION
SYNTAX
SYNTAX
OPERANDS
operand
POSITIONAL(nn)
POSITIONAL(nn)
Example:
MSGID(
MSGID(
READY
identifier
))
ES1011.0
Notes:
Ex
cl
Use the HELP command to obtain information about the function, syntax, and operands of
commands and subcommands, as well as information about certain messages. The
reference information is contained within the system and is displayed at your terminal in
response to your request for help. The scope of available information ranges from general
to specific. When entering the HELP command with no operands, TSO/E displays a list of
all the TSO/E commands grouped by function. If you require more information about a
specific command or subcommand, use HELP with the selected command or subcommand
name as an operand. You then receive:
pr
4-7
Student Notebook
If you do not want to have all of the detailed information, you can request only the portion
that you need. The following is a brief description of the command's parameters:
command_name/subcommand_name
The name of the command/subcommand about which to obtain
information.
Displays all information available concerning the command or
subcommand.
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ALL
SYNTAX
OPERANDS(operand)
POSITIONAL(nn)
MSGID(identifier)
pr
Ex
cl
FUNCTION
4-8
z/OS Fundamentals
V8.0
Student Notebook
Uempty
DATASET
ALLOC
DSNAME
)
(name)
FILE
dsname
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
DDNAME
OLD
SHR
MOD
NEW
DATACLAS(name)
STORCLAS(name)
MGMTCLAS(name)
SPACE(quantity)
increment
BLKSIZE(value)
VOLUME(volser)
DIR(n)
REUSE
BLOCK(value)
AVBLOCK(value)
TRACKS
CYLINDERS
UNIT(type)
LIKE(dsn)
Example:
LRECL(n)
RECFM(
F
V
B
additional
Parameter
READY
ES1011.0
Notes:
cl
Use the ALLOCATE command to dynamically allocate VSAM, non-VSAM, and hierarchical
file system (HFS) data sets. You can specify data set attributes for the allocation of
non-VSAM data sets in several ways:
pr
Ex
Describe all attributes of a new data set explicitly on the ALLOCATE command.
Use the LIKE operand to obtain the attributes from an existing model data set. You can
override model data set attributes by explicitly specifying the desired attributes on the
ALLOCATE command.
Use the ATTRIB command to build a list of attributes. During the remainder of your
terminal session, you can have the system refer to this list when allocating new data
sets.
With the storage management subsystem (SMS) installed and active, use the
DATACLAS operand. Your storage administrator might provide default data set attributes
through the automatic class selection (ACS) routine.
4-9
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
OLD indicates the data set currently exists and you require
exclusive use of the data set.
SHR indicates the data set currently exists, but you do not
require exclusive use of the data set. Others can use it
concurrently.
MOD indicates you want to append data to the end of the
sequential data set.
NEW (non-VSAM only) indicates the data set does not exist and
it is to be created. If you specify a data set name, a new data
set is kept and cataloged. If you do not specify a data set name,
it is deleted when you free it or log off. SMS only manages data
sets that were allocated with a disposition of NEW while SMS
was active.
DATACLAS(data_class_name)
Specifies the name of the data class for the data set. Using the
DATACLAS operand to define the data class makes specifying
all the attributes for a data set unnecessary.
cl
MGMTCLAS(management_class_name)
Ex
pr
STORCLAS(storage_class_name)
V8.0
Student Notebook
Uempty
SPACE(quantity,increment)
Specifies the amount of space to be allocated for a new data
set. The variable quantity specifies desired primary space,
increment the desired secondary space quantity. If you omit the
SPACE operand, the system uses the IBM-supplied default.
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
BLKSIZE(blocksize)
Specifies the data control block (DCB) block size for the data
set.
DIR(integer)
REUSE
UNIT(type)
LIKE(dsn)
LRECL(n)
RECFM(F|V|B)
cl
pr
Ex
(The operands listed here represent only a subset of all operands of this command. For
additional information, refer to TSO/E Command Reference.)
4-11
Student Notebook
CATALOG(catalog_name
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
DELETE ( name
)
/password
DEL
/password
FILE(ddname)
NOPURGE
NPRG
SCRATCH
PURGE
PRG
NOSCRATCH
NSCR
additional
parameter
Example:
READY
delete test.data
ES1011.0
Notes:
Use the DELETE command to delete one or more data set entries or one or more members
of a partitioned data set.
cl
Ex
name/password
pr
CATALOG(catalog_name/password)
FILE(ddname)
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
(The operands listed here represent only a subset of all operands of this command. For
additional information, refer toTSO/E Command Reference.)
4-13
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
LISTDS ( data_set )
STATUS
CATALOG ( catalog_name )
HISTORY
MEMBERS
LABEL
LEVEL
Example:
READY
listds TSOFS20.test.data'
TSOFS20.TEST.DATA
--RECFM-LRECL-BLKSIZE-DSORG
FB
80
27920
PO
--VOLUMES-USER04
READY
ES1011.0
Notes:
cl
Use the LISTDS command to have the attributes of specific data sets displayed at your
terminal. The LISTDS command works differently for VSAM than for non-VSAM data sets.
A VSAM data set causes the LISTDS command to display only the data set organization,
which is VSAM. Use the LISTCAT command to obtain more information about a VSAM
data set. For non-VSAM data sets, you can obtain:
Volume identification
Logical record length
Block size
Record format
Data set organization
Directory information for members of partitioned data sets
Creation date, expiration date, and, for non-VSAM only, security attributes.
File name and disposition
Data set control blocks
pr
Ex
V8.0
Student Notebook
Uempty
Name of the data sets you want to obtain data about. You can
use a single asterisk as a wild card in place of any level except
the first.
STATUS
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
HISTORY
Obtains the creation and expiration dates for the specified data
sets and find out whether the non-VSAM data sets are
password-protected or if the data set is RACF-protected.
MEMBERS
LABEL
Lists the entire data set control block (DSCB) at your terminal.
CATALOG(catalog_name)
Names the user catalog that contains the names in the data set
list.
pr
Ex
cl
LEVEL
4-15
Student Notebook
CATALOG ( catalog_name
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
/password
OUTFILE
OFILE
(ddname)
ENTRIES
entry_name
/password
LEVEL
( level )
LVL
CLUSTER
DATA
GENERATIONDATAGROUP
GDG
INDEX
IX
PAGESPACE
PGSPC
USERCATALOG
UCAT
NONVSAM
NVSAM
ALIAS
CREATION (days)
ES1011.0
Notes:
cl
Use the LISTCAT command to list entries from a catalog. The entries listed can be
selected by name or entry type, and the fields to be listed for each entry can additionally be
selected.
Ex
The original TSO LISTCAT command has been replaced by an Access Method Services
command of the same name. The operand descriptions that follow provide the information
required to use these services for normal TSO/E operations. The TSO/E user who wants to
manipulate VSAM data sets or use the other Access Method Services from the terminal
should refer to z/OS DFSMS Access Method Services for Catalogs, SC26-7394.
pr
The LISTCAT command supports unique operand abbreviations in addition to the usual
abbreviations produced by truncation. The syntax and operand explanations show these
unique cases.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
OUTFILE(ddname) | OFILE(ddname)
ENTRIES(entry_name/password)
cl
Ex
CLUSTER
pr
DATA
INDEX | IX
4-17
Student Notebook
NONVSAM | NVSAM
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
SPACE | SPC
USERCATALOG | UCAT
GENERATIONDATAGROUP | GDG
PAGESPACE | PGSPC
ALIAS
CREATION(days)
pr
Ex
cl
V8.0
Student Notebook
Uempty
DATACLAS
MGMTCLAS
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
EXPIRATION (days)
HISTORY
STORCLAS
Example:
READY
listcat level(aues100)
NONVSAM-------TSOFS20.TEST.DATA
IN-CAT---CATALOG.USERCAT1
NONVSAM-------TSOFS20.PROJ1.DATA
IN-CAT---CATALOG.USERCAT1
READY
ES1011.0
Notes:
cl
When LISTCAT is invoked and no operands are specified, the user ID or the prefix
specified by the PROFILE command becomes the highest level of entry name qualification.
Only those entries associated with the user ID are listed.
The list of LISTCAT command operands continued:
Ex
EXPIRATION(days)
pr
ALL |
VOLUME
4-19
Student Notebook
ALLOCATION
DATACLAS
MGMTCLAS
STORCLAS
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
HISTORY
V8.0
Student Notebook
Uempty
HISTORY
MEMBERS
SYSNAMES
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
STATUS
Example:
READY
lista st h
--DSORG--CREATED---EXPIRES---SECURITY--DDNAME---DISP-ISPF.SYSPROG.CLIST.EDUCMVS.FB
PO
07/09/00 00/00/00 NONE
SYSPROC KEEP
IAS.COURSE.CLIST.FB
PO
11/14/00 00/00/00 NONE
KEEP
SYS1.AZE1CLIB
PO
08/24/00 00/00/00 NONE
KEEP
ISPF.MAIN.CLIST.FB
PO
07/12/00 00/00/00 NONE
KEEP
ISPF.MAIN.MSGS
PO
07/12/00 00/00/00 NONE
ISPMLIB KEEP
...
ES1011.0
Notes:
pr
Ex
cl
Use the LISTALC command to obtain a list of the currently allocated data sets. LISTALC
without operands displays a list of all currently allocated data set names. Here is a list of
parameters:
Displays information about the status of each data set. This
STATUS
operand provides you with:
The DDname for the data set allocated and information
about attribute lists.
The termination dispositions of the data set
HISTORY
Specifies that you want to obtain information about the history
of each data set. This operand provides information on:
Creation date.
Expiration date.
Data set protection
MEMBERS
Lists the member names of each of your partitioned data sets.
SYSNAMES
Specifies that you want to obtain a list of all allocated data sets,
including temporary data sets.
Copyright IBM Corp. 2001, 2013
4-21
Student Notebook
ALL
DEST(station_id)
ATTRLIST (
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
attr_list_name
DSNAME
data_set_name
DATASET
DDNAME
file_name
FILE
OUTDES ( output_descriptor_name
KEEP
HOLD
NOHOLD
DELETE
CATALOG
UNCATALOG
SYSOUT(class)
SPIN (
UNALLOC
NO
KEEP
PATH (
/pathname
PATHDISP (
DELETE
ES1011.0
Notes:
Ex
cl
Use the FREE command to release (deallocate) previously allocated data sets or
hierarchical file system (HFS) files that you no longer need. You can also use this
command to change the output class of SYSOUT data sets, to delete attribute lists, and to
change the data set disposition specified with the ALLOCATE command. There is a
maximum number of data sets that can be allocated to you at any one time. The allowable
number must be large enough to accommodate:
Data sets allocated by the LOGON and ALLOCATE commands
Data sets allocated dynamically by the system's command processors
pr
The data sets allocated by the LOGON and ALLOCATE commands are not freed
automatically. To avoid the possibility of reaching your limit and being denied necessary
resources, you should use the FREE command to release these data sets when they are no
longer needed.
When you enter the LOGOFF command, all data sets allocated to you and attribute lists
created during the terminal session are freed by the system.
V8.0
Student Notebook
Uempty
UNALLOC is the alias of FREE and is intended for use under TEST because FREE is an alias
for the FREEMAIN subcommand.
Note
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Data sets that are dynamically allocated by a command processor are not automatically
freed when the command processor terminates. You must explicitly free dynamically
allocated data sets.
ALL
DSNAME(data_set_name) | DATASET(data_set_name)
Specifies one or more data set names that identify the data sets
that you want to free. The data set name must include the
descriptive (rightmost) qualifier and can contain a member
name in parentheses. If you omit this operand, you must specify
either FILE, DDNAME, or the ATTRLIST operand.
DDNAME(file_name) | FILE(file_name)
Specifies one or more file names that identify the data sets to
be freed. If you omit this operand, you must specify either the
DATASET or DSNAME or the ATTRLIST operand.
OUTDES(output_descriptor_name)
cl
ATTRLIST(attr_list_names)
Ex
Specifies the names of one or more attribute lists that you want
to delete. If you omit this operand, you must specify either the
DATASET or DSNAME or the FILE or DDNAME operand.
pr
DEST(station_id)
HOLD | NOHOLD
4-23
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
cl
pr
Ex
SPIN(UNALLOC | NO)
PATH(/pathname)
Specifies when the system should make the SYSOUT data set
available for printing. UNALLOC specifies that the system should
make the SYSOUT data set available for printing immediately
after deallocation. NO specifies that the system should make the
SYSOUT data set available for printing at the end of the step.
V8.0
Student Notebook
Uempty
PATHDISP(KEEP | DELETE)
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
4-25
Student Notebook
dsname
)
CLASS
( class )
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
DATASET
DSNAME
FILE
PR
( file_name )
SYSOUT
DDNAME
ALL
COPIES (nnn
,
,( group_value
MEMBERS
DIRECTORY
additional Parameter
Example:
READY
printds da(test.data)sysout(a)
READY
ES1011.0
Notes:
Use the PRINTDS command to format and print data sets on any printer defined to the Job
Entry Subsystem (JES). PRINTDS allows you to:
Print data sets or members.
Reference output descriptors.
Format the data and either print it or copy it to a data set.
Print data sets that contain DCF data.
Ex
cl
pr
DATASET(dsname) | DSNAME(dsname)
FILE(file_name) | DDNAME(file_name)
The name of the file to be printed. All data sets within the
concatenation are printed.
V8.0
Student Notebook
Uempty
CLASS(output_class) | SYSOUT(output_class)
Specifies the output class JES is to use for processing the
specified data set. SYSOUT is an alias for CLASS.
COPIES(nnn,(group_value,...))
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
4-27
Student Notebook
PROMPT
PAUSE
NOPAUSE
NOINTERCOM
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
NOPROMPT
INTERCOM
PREFIX(prefix)
MSGID
NOMSGID
PLANGUAGE(planguage)
NOPREFIX
SLANGUAGE(slanguage)
additional Parameter
Example:
READY
prof
CHAR(0) LINE(0)
PROMPT
INTERCOM
NOPAUSE NOMSGID NOMODE NOWTPMSG
NORECOVER PREFIX(TSOFS20) PLANGUAGE(ENU) SLANGUAGE(ENU)
DEFAULT LINE/CHARACTER DELETE CHARACTERS IN EFFECT FOR THIS TERMINAL
READY
prof nopref
ES1011.0
Notes:
cl
The PROFILE command establishes, changes, or lists your user profile. The information in
your profile tells the system how you want to use your terminal. The profile contains
information on the following:
Prefixing
Prompting
Message display
Message number display
Primary and secondary languages
And so forth
pr
Ex
To display the current user profile, enter the PROFILE command without operands. Change
your profile by using the PROFILE command with the appropriate operands. The changes
remain valid from session to session.
V8.0
Student Notebook
Uempty
PROMPT | NOPROMPT
INTERCOM | NOINTERCOM
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
PAUSE | NOPAUSE
MSGID | NOMSGID
PREFIX(dsname_prefix) | NOPREFIX
PLANGUAGE(planguage)
SLANGUAGE(slanguage)
pr
Ex
cl
4-29
Student Notebook
SUBMIT
HOLD
PAUSE
END(nn)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
SUB
( data_set
NOJOBCHAR
NOTIFY
JOBCHAR(char)
NONOTIFY
additional Parameter
Example:
READY
submit 'aues100.tsoe.cntl(iefbr14)'
JOB TSOFS20A(JOB04970) SUBMITTED
READY
ES1011.0
Notes:
Use the SUBMIT command to submit one or more batch jobs for background processing.
cl
The names of the data sets or data set members that contain
the job control language (JCL). An asterisk (*) specifies that the
job stream is to be obtained from the current source of input (for
example, the terminal). TSO/E commands can be entered
directly without creating and editing a data set.
PAUSE | END(nn)
PAUSE lets you decide, after the job stream has been read in,
whether to continue or terminate the SUBMIT process. END(nn)
defines a 1- or 2-character string to indicate the end of the job
stream. If not specified, a null or blank line is used as delimiter.
pr
Ex
(data_set) | *
HOLD | NOHOLD
HOLD specifies SUBMIT is to have job output held for use with
the OUTPUT command. Output directed to DD statements is held
V8.0
Student Notebook
Uempty
JOBCHAR(characters) | NOJOBCHAR
JOBCHAR(characters) appends specified job characters to
the job name on every JOB statement.
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
NOTIFY | NONOTIFY
pr
Ex
cl
4-31
Student Notebook
NOWAIT
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
NOW
SEND
SE
'text '
USER(
*
user_id
LOGON
SAVE
WAIT
additional
Parameter
Example:
READY
ES1011.0
Notes:
cl
Use the SEND command to send messages to other users. To receive the messages, the
recipient's profile setting must include INTERCOM. Installations can use security
enhancements to customize how the SEND command works.
SEND command operands:
Ex
'text'
pr
USER(user_id | *)
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Uempty
NOWAIT | WAIT
pr
Ex
cl
WAIT specifies that you want to wait until system output buffers
are available for all specified logged on terminals.
4-33
Student Notebook
TRANSMIT
XMIT
TERMINAL
,
addressee )
DATASET
DSNAME
(dataset)
DDNAME
FILE
(ddname)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
(
MEMBERS(
member )
NOTIFY
(ALL)
NONOTIFY
SEQUENTIAL
additional
Parameter
PDS
Example:
READY
ES1011.0
Notes:
cl
Use the TRANSMIT command to send messages, data sets, or both, to another user. The
TRANSMIT command converts this data into a special format so that it can be transmitted
to other users in the network. TRANSMIT command operands:
Specifies the target users.
Ex
(addressee)
pr
V8.0
Student Notebook
Uempty
MEMBERS(member)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
PDS | SEQUENTIAL
pr
Ex
cl
4-35
Student Notebook
(ddname)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
USERID(user_id)
INFILE
INDSNAME
(dsname)
INDATASET
DISPLAY
additional Parameter
NODISPLAY
Example:
READY
ES1011.0
Notes:
cl
Ex
USERID(user_id)
pr
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
===>
printds da(test.data)sysout(a)
ES1011.0
Notes:
pr
Ex
cl
TSO/E commands can be issued from various places, including the TSO/E command line
editor, ISPF panels, and ISPF option 6, the ISPF Command Shell.
If you are in PDF and would like to issue TSO/E commands, you can either enter them in
any command line or select ISPF option 6. To enter the commands in the TSO command
line editor, leave PDF until READY appears on your screen. READY indicates that you are
now in TSO/E mode and can enter any TSO/E command.
When you enter TSO/E commands from a panel's command line, make sure to prefix them
with TSO to signal ISPF/PDF to pass it on to TSO/E. When using the ISPF Command Shell
to issue TSO/E commands, enter them here:
Enter TSO or Workstation commands below:
===> __________________________________________________________________
Commands that are entered here must not be prefixed. Any issued command appears in
the list of recently used commands. To retrieve a command from this list, place the cursor
on its line and press Enter. The selected command is now displayed on the command line
and can be reissued, with or without modifications.
Copyright IBM Corp. 2001, 2013
4-37
Student Notebook
Checkpoint
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
4. Text messages can be sent to other TSO users using the (blank)
command.
a.
b.
TRANSMIT
CALL
c.
SEND
d.
MESSAGE
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Exercise
Using TSO/E commands
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Tasks:
1. Log on to TSO.
2. Use ALLOCATE to create new
data sets.
3. Verify the create.
4. Use the LISTDS command.
5. Exercise the PROFILE command.
6. Use DELETE with data sets.
7. Modify an ISPF panel and CLIST.
8. Reallocate data sets and start
ISPF.
9. Log off.
ES1011.0
pr
Ex
cl
Notes:
4-39
Student Notebook
Unit summary
Having completed this unit, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ALLOCATE
DELETE
LISTDS
LISTCAT
LISTALC
FREE
PRINTDS
PROFILE
SUBMIT
SEND
RECEIVE
TRANSMIT
ES1011.0
Notes:
Ex
cl
- Command name
- Positional operands
- Keyword operands
TSO commands:
pr
HELP
DELETE
LISTCAT
FREE
PROFILE
SEND
ALLOCATE
LISTDS
LISTALC
PRINTDS
SUBMIT
TRANSMIT / RECEIVE
V8.0
Student Notebook
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Uempty
4-41
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
5-1
Student Notebook
References
SDSF Operation and Customization
SA22-7597
SA22-7782
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
SA22-7670
5-2
z/OS Fundamentals
V8.0
Student Notebook
Uempty
Unit objectives (1 of 2)
After completing this unit, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
IEBGENER
IDCAMS
ES1011.0
pr
Ex
cl
Notes:
5-3
Student Notebook
Unit objectives (2 of 2)
After completing this unit, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
5-4
z/OS Fundamentals
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
5-5
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
5-6
z/OS Fundamentals
V8.0
Student Notebook
Uempty
Topic objectives
After completing this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
5-7
Student Notebook
JES3:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Loosely
coupled
JES2
dev
z/OS
+
JES2
Processor
JES2
dev
JES3
dev
z/OS
+
JES2
Processor
z/OS + JES3
Processor
Global processor
SPOOL
z/OS
+
JES3 Local
Processor
SPOOL
z/OS
+
JES3 Local
Processor
ES1011.0
Notes:
cl
z/OS use a Job Entry Subsystem (JES) to receive jobs into the operating system, schedule
them for processing, and to control their output processing. IBM provides two JESs: JES2
and JES3. The management of jobs and resources in z/OS is handled between JES and
the base control program (BCP). In this manner, JES manages jobs before and after
execution; the base control program manages them during processing.
Ex
Within JES2, each processor controls its own job input, job scheduling, and job output
processing, while sharing the spool and checkpoint data sets.
pr
In contrast, JES3 exercises centralized control over its processing functions through a
single global JES3 processor.
This global processor provides all job selection, scheduling, and device allocation functions
for all the other JES3 systems. The centralized control that JES3 exercises provides
increased job scheduling control, deadline scheduling capabilities, and increased control
by providing its own device allocation.
In an installation that has only one processor, JES2 and JES3 perform similar functions.
5-8
z/OS Fundamentals
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
JCL
Conversion
PROCLIB
In stream data
Execution
Printout
Output
Purge
ES1011.0
Notes:
The process of job processing in JES2 can be divided into the following five stages:
Ex
cl
Input phase
pr
Conversion phase
Execution phase
After JES2 reads the job input which can be local or remote, a
unique job number is assigned to each job. Then the job and its
in-stream data (often called SYSIN data) are written to the
SPOOL.
5-9
Student Notebook
Purge phase
Now that the job has been fully processed, JES frees all allocated
SPOOL areas and signals the job completion to the operator.
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Output phase
V8.0
Student Notebook
Uempty
Input
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
JCL
Conversion
PROCLIB
Resource allocation
In stream data
Execution
Printout
Output
Purge
ES1011.0
Notes:
Job management in JES3 can be divided into six stages. These are:
After JES3 reads the job input, which can be local or remote, a
unique job number is assigned to each job. Then the job and its
in-stream data (often called SYSIN data) are written to a
SPOOL volume.
Ex
cl
Input phase
pr
Conversion phase
Resource Allocation
5-11
Student Notebook
Output phase
Purge phase
Now that the job has been fully processed, JES frees all
allocated SPOOL areas and signals the job completion to the
operator.
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Execution phase
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Job queue
Job
10
121
854
1096
.
.
.
Class
T
Z
B
A
.
.
.
JES2
Spool
JCL
DATA
ES1011.0
Notes:
cl
JES2 jobs can be entered on input devices such as card readers, remote terminals, or
other programs. Jobs can also come from other nodes in a job entry network and from
internal readers. (An internal reader is a program that other programs can use to submit
jobs, control statements, and commands to JES2.)
pr
Ex
As JES2 reads the input stream, it assigns a job identifier to each job and places each job's
JCL, optional JES2 control statements, and data within the job (SYSIN data) onto DASD
data sets called spool data sets. The term simultaneous peripheral operations online
(spool) refers to the direct access device that contains the spool data sets. Spooling
provides simultaneous processing and a temporary storage area for work that is not yet
completed.
Later on, JES2 selects jobs from the spool data sets for processing and subsequent
running.
5-13
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
PROCLIB
CONVERSION
Spool
Spool
JCL
DATA
Internal text
ES1011.0
Notes:
cl
JES2 uses a converter program to analyze each job's JCL statements and to perform a
syntax check. It also determines if the JCL includes any procedure calls. If so, the
converter takes the job's JCL and merges it with the JCL from the procedure library (for
example, SYS1.PROCLIB) and converts the composite JCL into internal text.
pr
Ex
The internal text is stored in the spool data set. If during the job conversion any JCL errors
are detected, JES2 issues the proper error messages and queues the job for output
processing. If JES2 detects no errors, it queues the job for further processing according to
its priority within its job class.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Job
10
121
854
1096
.
.
.
JES2
T
Z
B
A
.
.
.
Request
Address
spaces
INITIATOR
n
PGM
Spool
ES1011.0
Notes:
pr
Ex
cl
Before work can be processed on an z/OS system, initiators have to be started. An initiator
is started either by an operator or automatically by JES2 when the system is initialized. If
an initiator is ready to process work, it requests a job from JES2. JES2 selects jobs based
on the job classes that are assigned to the initiator and the priority order in which the job
classes should be searched. When JES2 selects a job, it passes it to the initiator. The
initiator then invokes the interpreter to build control blocks from the internal text that the
converter created for the job.
The initiator allocates the resources specified in the JCL for the first step of the job. This
allocation ensures that the devices are available before the job step starts running. The
initiator then starts the program requested in the JCL EXEC statement.
JES2 and the base control program communicate constantly to control system processing.
The communication mechanism, known as the subsystem interface, allows z/OS to request
services of JES2. For example, a requester can ask JES2 to find a job, do message or
command processing, or open (access) a SYSIN or SYSOUT data set. Further, the base
control program notifies JES2 of events such as messages, operator commands, the end
of a job, or the end of a task.
Copyright IBM Corp. 2001, 2013
5-15
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Before
Spool
JCL
DATA
Results
JES2
Spool
After
Message
JCL
DATA
Results
ES1011.0
Notes:
cl
JES2 controls all output processing, that is, system messages that must be printed, as well
as data sets requested by the user that must be printed or punched. After a job finishes,
JES2 analyzes the characteristics of the job's output in terms of its output class and device
setup requirements; then JES2 groups data sets with similar characteristics. JES2 queues
the output for print or punch processing.
pr
Ex
JES2 selects output for processing from the output queue. It can contain output that is to
be processed locally or output to be processed at a remote location (either a remote job
entry (RJE) workstation or another node known as network job entry (NJE)). After
processing all the output for a particular job, JES2 puts the job on the purge queue.
When all processing for a job completes, JES2 releases the spool space assigned to the
job, making the space available for allocation to subsequent jobs. JES2 then issues a
message to the operator indicating that the job has been purged from the system.
V8.0
Student Notebook
Uempty
Topic summary
Having completed this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
5-17
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
5-19
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Topic objectives
After completing this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
5-21
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
//... DD ...
//... DD ...
ES1011.0
Notes:
Ex
cl
The origins of job control language (JCL) lay back in the 1960s. At that time, programmers
used punched cards rather than terminals to enter their jobs into the system. To code a job,
you actually had to punch the cards, which were then read by a local card reader. The
cards that made up a job were referred to as a batch. Each card contained one JCL
statement or part of a JCL statement, and the terms JCL statement and JCL card are still
used synonymously.
pr
The basic structure of JCL statements has not changed since its beginnings. Even today,
JCL is coded on 80 positions per line, a limitation that has its roots in the use of 80-column
punched cards.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Job
Jobstep
Jobstep
ES1011.0
Notes:
cl
pr
Ex
Within each job, the control statements are grouped into job steps. A job step consists of all
the control statements needed to run one program. It contains the program call and all the
necessary allocations to execute this particular program. A job that needs to run more than
one program contains a different job step for each one of those programs. The use of
multiple job steps allows a programmer to implement dependencies between steps, for
example, to make the execution of a job step dependent on the result of another job step.
5-23
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
A JCL statement consists of one or more 80-byte records. Each JCL statement is logically
divided into the following five fields:
Ex
cl
Identifier
Name
pr
Operation
Parameter
Comments
V8.0
Student Notebook
Uempty
Except for the identifier field, which must begin in column 1, and the name field, which
follows it with no intervening blanks, all other fields can be entered in free form, that is, they
need not begin in a particular column. Between fields leave at least one blank, which
serves as the delimiter between fields.
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Do not code fields, except on the comment statement, past column 71. If the total length of
the fields would exceed 71 columns, continue the fields onto one or more following
statements.
5-25
Student Notebook
******************************************
//...
Identifies a JCL statement
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
******
000100
000200
000300
000400
000500
000600
//*...
/*...
ES1011.0
Notes:
The identifier field at the beginning of each line indicates to the system what kind of
statement is contained in that line.
Ex
cl
pr
Apart from JCL statements, jobs can also contain JES2 and JES3 control statements.
JES2 control statements contain /* in columns 1 and 2. JES3 control statements, with a few
exceptions, begin with //* in columns 1 through 3.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
000100
000200
000300
000400
000500
000600
000700
000800
000900
001000
001100
ES1011.0
Notes:
The name field identifies a particular control statement therefore allowing other statements
to reference it. For JCL statements the following naming rules apply:
cl
Ex
pr
5-27
Student Notebook
//TSOFS20A JOB(TSOFS20),'REXX',
//
MSGCLASS=T,CLASS=L,NOTIFY=AUES100
//** * * * * * * * * * * * * * * * * * * * * * * * *
//** EXECUTE TSO-COMMANDS IN BACKGROUND
//** * * * * * * * * * * * * * * * * * * * * * * * *
//STEP1 EXEC PGM=IKJEFT01
//SYSEXEC DD DUMMY
//SYSTSPRT DD SYSOUT=*
//SYSTSIN DD *
LISTDS TSOE.CNTL
/*
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
000100
000200
000300
000400
000500
000600
000700
000800
000900
001000
001100
ES1011.0
Notes:
The operation field specifies the type of statement. Code the operation field of a JCL
statement as follows:
cl
Ex
CNTL...
DD...
ENDCNTL...
EXEC...
IF... THEN...
ELSE...
ENDIF...
INCLUDE...
JCLLIB...
pr
//...
//...
//...
//...
//...
//...
//...
- //...
- //...
V8.0
Student Notebook
//... JOB...
//... OUTPUT...
// (Null Statement)
//... PEND...
//... PROC...
//... SET...
//... XMIT...
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
5-29
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
000100
000200
000300
000400
000500
000600
000700
000800
000900
001000
001100
ES1011.0
Notes:
The parameter field consists of two types of parameters: positional parameters and
keyword parameters.
cl
Ex
Keyword parameters can be added to a statement in any order in the parameter field after
the positional parameters.
The parameters are separated by commas. The parameter field:
Follows the operation field with at least one blank.
pr
V8.0
Student Notebook
Uempty
Positional parameters
Examples:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
cl
When entering parameters, code positional parameters first. Code them in the order
indicated by the syntax for this JCL statement. If you omit a positional parameter and code
a following positional parameter, code a comma to indicate the omitted parameter. Do not
code the replacing comma if:
Ex
pr
5-31
Student Notebook
Keyword parameters
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Examples:
Statement syntax:
//name OPERATION P1,P2,P3,K1=n,K2=n
Free flow:
//name OPERATION P1,,P3,K2=9,K1=4
Omitting a keyword parameter:
//name OPERATION P1,,P3,K2=9
ES1011.0
Notes:
cl
Since keyword parameters are recognized by their names. Keyword parameters for a
statement can be coded in any order after the positional parameters. No comma is
necessary to indicate the absence of a keyword parameter.
Ex
pr
When a parameter contains more than one subparameter, separate the subparameters by
commas and enclose the subparameter list in parentheses or, if indicated in the syntax, by
apostrophes. If the list is a single keyword subparameter or a single positional
subparameter with no omitted preceding subparameters, omit the parentheses or
apostrophes.
V8.0
Student Notebook
Uempty
Comment field
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
000100
000200
000300
000400
000500
000600
000700
000800
000900
001000
001100
ES1011.0
Notes:
The comment field contains any documentary information that might be helpful for
understanding the JCL.
cl
Ex
pr
5-33
Student Notebook
Statement continuation
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
****** ********************************************
=COLS> ----+----1----+----2----+----3----+----4----+----5----+----6----+----7-000100 //TSOFS20A JOB (TSOFS20),
000200 //
'REXX',
000300 //
MSGCLASS=T,
000400 //
CLASS=L,
000500 //
NOTIFY=TSOFS20
000600 //STEP1 EXEC PGM=CHECK,PARM='THIS IS A VERY LONG PARAMETER LIST IN
000700 //
APOSTROPHES, CONTINUED IN COLUMN 16'
000800 //DATA DD DSN=ATSOFS20.TEST.DATA,DISP=SHR THIS IS A CONFUSING METHOD OF C
00900 // CONTINUING A COMMENT, BETTER TO START A NEW COMMENT STATEMENT
ES1011.0
Notes:
cl
When coding JCL, the maximum length of a control statement must not exceed 71
characters on a single line. To code statements that exceed 71 characters in length, the
statements have to be continued on the succeeding lines.
Ex
Note
pr
The command statement, the comment statement, the delimiter statement, and the null
statement are limited to a single line only. They cannot be continued. All other JCL
statements can be continued either in the parameter field or the comments field.
DSNAME=SWITCH.LEVEL18.GROUP12,UNIT=3350,
V8.0
Student Notebook
Uempty
Continue the statement on the next line. This line must start with // in columns 1 and 2,
continued by at least one blank.
Continue the interrupted field beginning in any column from 4 through 16.
Example:
//
VOLUME=335023,SPACE=(TRK,(80,15)),DISP=(,PASS)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
The parameter must be extended to column 71. Do not code an apostrophe in column 71 of
a JCL statement as the system interprets it as the final character in the statement and
ignores the continuation.
|
Col 71 V
// COMMAND 'R0 MVSA,S GTF.RLW,,,MBR=UNITTEST,SPC=(CYL,(100,100)),VLSR='
//
VOL=SER=VOL001,'',ODSN-W123456'
To avoid this, split the statement differently. Continue the parameter in column 16 of the
following statement even if this splits the parameter.
Example:
|
Col 71 V
// COMMAND 'R0 MVSA,S GTF.RLW,,,MBR=UNITTEST,SPC=(CYL,(100,100)),VLSR=
//
'VOL=SER=VOL001,'',ODSN-W123456'
Continuing a comment
To continue a comment, interrupt it at any location before column 72, and code any
nonblank character in column 72. After entering // and a blank on the following line, you can
continue with the comment.
COND.BILL=((20,GE),(30,LT,CHGE)) THIS STATEMENT CALLS
THE BILLING PROCEDURE AND SPECIFIES RETURN CODE TESTS
FOR THREE PROCEDURE STEPS.
X
X
cl
//
//
//
Ex
Note
pr
Comment continuation is very confusing, and might lead to JCL errors or the comment not
being seen. It is recommended that you use several comment statements entered in
sequence, because this is much easier to read.
//
COND.BILL=((20,GE),(30,LT,CHGE))
//*********************************************************************
//* THIS STATEMENT CALLS THE BILLING PROCEDURE AND SPECIFIES RETURN
//* CODE TESTS FOR THREE PROCEDURE STEPS.
//*********************************************************************
Copyright IBM Corp. 2001, 2013
5-35
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
Every job must contain at least a JOB and an EXEC statement. A DD statement is optional.
Ex
cl
pr
//... DD ...
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Keyword parameter:
9
y
9
9
9
y
y
9
y
y
y
y
CLASS
COND
MSGCLASS
MSGLEVEL
NOTIFY
PASSWORD
PRTY
REGION
RESTART
SCHENV
USER
And so on
ES1011.0
Notes:
cl
Use the JOB statement to mark the beginning of a job and to tell the system how to process
the job. Also, when jobs are stacked in the input stream, the JOB statement marks the end
of the preceding job.
The job name must be a unique 1-8 character long identifier of
the job. The name must start in column 3 with an either
alphabetic or national character (, #, @). All following
characters can be alphanumeric or national.
Ex
jobname
pr
JOB
5-37
Student Notebook
Positional parameter
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Programmer's name
They must precede all keyword parameters. You must code the accounting parameter first,
followed by the programmer's name parameter.
Keyword parameter
CLASS
COND
MSGCLASS
MSGLEVEL
NOTIFY
PASSWORD
PRTY
REGION
RESTART
USER
Ex
cl
SCHENV
pr
Note
The parameter list is not comprehensive. Refer to the MVS JCL Reference for a complete
list of parameters.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
JOB 1511,BYRD,CLASS=T,MSGCLASS=A,
MSGLEVEL=(2,0),NOTIFY=BYRD,
PASSWORD=ABCDE
//WORK
JOB ,PORTER,RESTART=(PROCESS,CHKPT3)
ES1011.0
Notes:
pr
Ex
cl
5-39
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
//stepname
Positional parameter:
9 PGM
9 procedure-name |
PROC
Keyword parameter:
y ACCT
9 COND
9 PARM
9 REGION
y TIME
y And so forth
ES1011.0
Notes:
Use the execute (EXEC) statement to identify the program or cataloged or in-stream
procedure that this job step is to execute and to tell the system how to process the job step.
cl
The EXEC statement marks the beginning of each step in a job or a procedure. A job can
have up to 255 job steps, including all steps in any procedures the EXEC statements call.
pr
Ex
stepname
EXEC
V8.0
Student Notebook
Uempty
Positional parameter
PGM
PROC | procedure_name
Names the procedure to be executed.
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ACCT
COND
PARM
REGION
Note
pr
Ex
cl
The parameter list is not comprehensive. Refer to the MVS JCL Reference for a complete
list of parameters.
5-41
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
PARM.LKED='LIST,LET,NODECK'
REGION=0M
ES1011.0
Notes:
pr
Ex
cl
V8.0
Student Notebook
Uempty
The DD statement
//ddname
DD
Keyword parameter:
y DCB
(SMS-only)
y DDNAME
9 AVGREC
9 DISP
y DATACLAS
9 DSN
9 LIKE
y DSNTYPE
y MGMTCLAS
9 LRECL
y RECORG
9 RECFM
y REFDD
9 RETPD
y STORCLAS
9 SPACE
y And so forth
9 SYSOUT
y UNIT
y VOLUME
y And so forth
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Positional parameter:
9 * | DATA
9 DUMMY
y DYNAM
pos-parms[,keyw-parms]
ES1011.0
Notes:
cl
Use the data definition (DD) statement to describe a data set (existing or new) and to
specify the input and output resources needed for the data set. A DD statement is required
for each data set. The maximum number of DD statements per job step is 3273.
Ex
ddname
pr
DD
5-43
Student Notebook
Positional parameter
DUMMY
DYNAM
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
* | DATA
DDNAME
DISP
DSN
DSNTYPE
LRECL
RECFM
RETPD
SPACE
SYSOUT
UNIT
VOLUME
pr
Ex
cl
DCB
Use the following parameters with SMS only. If SMS is not installed or is not active, the
system syntax checks and then ignores any of these parameters.
AVGREC
V8.0
Student Notebook
DATACLAS
LIKE
MGMTCLAS
RECORG
REFDD
STORCLAS
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Uempty
Note
pr
Ex
cl
This parameter list is not comprehensive. Refer to the MVS JCL Reference for a complete
list of parameters.
5-45
Student Notebook
Examples of DD statements (1 of 2)
DD DSN=T0.TEST.DATA,DISP=OLD
//DCBINFO
//
//
//
DD DSN=TSOFS20.TEST.RESULTS,
DISP=(NEW,CATLG),
UNIT=SYSDA,SPACE=(TRK,(1,1)),
LRECL=80,RECFM=FB,BLKSIZE=0
//EXPDT
//
//
//
DD DSN=TSOFS20.BACKUP.COPY,
DISP=(NEW,CATLG),
DATACLAS=DCLAS02,
LRECL=256,EXPDT=2002/180
//LIKE
//
//
//
DD DSN=TSOFS20.LIKE.TEST.RESULTS,
DISP=(NEW,DELETE,DELETE),
LIKE=TSOFS20.TEST.RESULTS,
SPACE=(4096,(10,2)),AVGREC=K
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
//INPUT
ES1011.0
Notes:
pr
Ex
cl
V8.0
Student Notebook
Uempty
Examples of DD statements (2 of 2)
DD DSN=TSOFS20.TEST.LIB1,DISP=SHR
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
//CONCAT
//
DD DSN=TSOFS20.TEST.LIB2,DISP=SHR
//NULLIFY
DD DUMMY
//SPOOL
DD SYSOUT=T
ES1011.0
Notes:
pr
Ex
cl
5-47
Student Notebook
In-stream data (1 of 2)
//MYJOB JOB...
000200
000300
//OUTPUT DD DSN=...
000400
//INPUT
000500
xxxxxybbb1123
000600
ABC something
000700
123
000800
/*
000900
// on next statement
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
000100
456
Indicates begin of
in-stream data
DD *
789
Instream
data
Explicit delimiter of
in-stream data
Implicit delimiter of
in-stream data
ES1011.0
Notes:
cl
DD statements offer you the possibility to supply a job's input data within the job stream.
This kind of data is referred to as in-stream data. A DD statement that contains in-stream
data uses * or DATA as a positional parameter to indicate the beginning of an in-stream
data set. The data records immediately follow the DD * or DD DATA statement.
Ex
pr
End of data
V8.0
Student Notebook
Uempty
In-stream data (2 of 2)
//MYJOB JOB...
//STEP1 EXEC PGM=ANYPGM
//OUTPUT DD DSN=...
//INPUT DD DATA
xxxxxybbb1123
In-stream
//ABC DD something
Data
//* Comment
/*
000100
000200
000300
000400
000500
000600
000700
000800
000900
//MYJOB JOB...
//STEP1 EXEC PGM=ANYPGM
//OUTPUT DD DSN=...
//INPUT DD DATA,DLM=$$
xxxxxybbb1123
In-stream
/*
//ABC DD something Data
$$
Indicates begin of
in-stream data that
contains // in
columns 1 and 2
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
000100
000200
000300
000400
000500
000600
000700
000800
000900
Explicit delimiter of
in-stream data
Indicates begin of
in-stream data that
contains // and /* in
columns 1 and 2
Selected delimiter of
in-stream data
ES1011.0
Notes:
When DD DATA is coded, the end of the data records is marked by:
/* in the input data
cl
End of data
Ex
pr
As noted, when you use the DD DATA statement a // does not mark the end of data.
This enables you to have JCL statements in your data stream. If you require /* in
columns 1 and 2 of your input, you cannot use the first option.
5-49
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
IF/THEN/ELSE/ENDIF statements
ES1011.0
Notes:
cl
The IF/THEN/ELSE/ENDIF statement is used to specify the conditions for a job step's
execution. If these conditions are not met, the job step is not executed. The THEN clause
specifies the job steps to be processed when the conditions in the IF clause are met. If they
are not met, then the specifications on the ELSE clause apply.
pr
Ex
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
y Keywords
RC
ABEND
ABEND
ABENDCC
RUN
RUN
y NOT operator
NOT |
y Logical operators
AND | &
OR | |
ES1011.0
Notes:
Keywords
pr
Ex
cl
RC
Indicates a return code.
ABEND
Indicates an abend condition occurred.
ABEND
Indicates no abend condition occurred.
Indicates a system or user completion code.
ABENDCC
RUN
Indicates the specified step started execution.
RUN
Indicates the specified step did not start execution.
Comparison operators Comparison operators are used to compare the value behind a
keyword with another numeric value, for example:
IF RC GT 12 THEN ...
NOT operators
Negates the expression that follows it, for example,
IF RC =4 THEN
In this case, the expression is true if RC does not equal 4.
Logical operators
Logical operators are used to combine two or more expressions
to a single logical expression, for example,
IF RC GT 4 AND RC LT 12 THEN...
Copyright IBM Corp. 2001, 2013
5-51
Student Notebook
IF/THEN/ELSE/ENDIF example
EXEC PGM=MERGE
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
//S1
[comment]
//S2
EXEC PGM=PROCESS
//TEST2
//S3
EXEC PGM=PRINT
//TEST2
ELSE
//S4
[comment]
EXEC PGM=CLEANUP
//TEST2
ENDIF
//TEST1 ENDIF
[comment]
[comment]
ES1011.0
Notes:
Q1. Check off the steps that run if Step S1 returns a 0000 COND CODE (return code).
cl
( ) Step S2
( ) Step S3
( ) Step S4
Ex
Q2. Check off the steps that run if step S1 returns a 0000 COND CODE and step S2 returns
a 0004 COND CODE.
( ) Step S3
( ) Step S4
pr
Q3. Check off the steps that run if step S1 returns a 0004 COND CODE and step S2 returns
a 0000 COND CODE.
( ) Step S3
( ) Step S4
V8.0
Student Notebook
Uempty
Topic summary
Having completed this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
5-53
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
5-55
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Topic objectives
After completing this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
5-57
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
READY
submit 'tsofs20.tsoe.cntl(iefbr14)'
JOB TSOFS20A(JOB04970) SUBMITTED
READY
ISPF/PDF editor
F2=SPLIT
F8=DOWN
F3=END
F9=SWAP
F4=RETURN
F10=LEFT
F5=IFIND
F11=RIGHT
F6=BOOK
F12=RETRIEVE
ES1011.0
Notes:
To submit a job, you can either use the TSO/E command SUBMIT, as introduced in the
previous unit, or the ISPF/PDF primary command SUBMIT.
Ex
cl
To submit a job using the TSO/E SUBMIT command, enter submit followed by the data set
and member name on any command line or in basic TSO/E line mode. (Do not forget to
prefix the command with TSO.)
To use the ISPF/PDF primary command SUBMIT just enter submit on the command line
while editing the data set or member containing the JCL.
pr
Note
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
For Job to be
Jobname .
Class . .
JobID . .
selected:
.
.
.
F1=HELP
F7=UP
F2=SPLIT
F8=DOWN
. .
F3=END
F9=SWAP
(A for ANSI
)
(M for machine )
(Blank for none)
F4=RETURN
F10=LEFT
F5=IFIND
F11=RIGHT
F6=BOOK
F12=RETRIEVE
ES1011.0
Notes:
Ex
cl
The ISPF/PDF option 3.8, the Outlist Utility, allows you to browse, print, delete, or requeue
job output that is in a held SYSOUT queue. When you select the Outlist Utility, ISPF/PDF
displays the panel above. To display a job's held output, enter at least its job name and, if
two or more jobs of the same job name exist, its jobID. You can also enter a job class in
addition to the job name to identify the job whose output is to be displayed.
Note
pr
The specification of a job name is required for all Outlist Utility options except option L.
5-59
Student Notebook
Help
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Menu
L
D
P
R
blank
F1=HELP
F7=UP
F2=SPLIT
F8=DOWN
F3=END
F9=SWAP
F4=RETURN
F10=LEFT
F5=IFIND
F11=RIGHT
F6=BOOK
F12=RETRIEVE
ES1011.0
Notes:
cl
If two or more jobs of the same job name exist, the specification of a job name is no longer
sufficient to uniquely identify the job output to be displayed. Upon submission of a job, each
job assigned is a unique jobID. This jobID has to be supplied by the user in case of multiple
jobs with the same name.
pr
Ex
To display the jobIDs for the job submitted under the same name, enter option L on the
Outlist Utility panel. You can also specify a job name. If you leave the job name blank or if
the job name is your user ID plus one identifying character, the status is listed for all jobs
having job names consisting of your user ID and an additional character. In case you
specify a job name, the status for that exact job is displayed.
Once the list of jobs is displayed, find out the jobID of the job you want to work with and
enter its ID in addition to its name and the desired panel selection on the Outlist Utility
panel.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
cl
To display a job's output using the Outlist Utility, supply its name on the Outlist Utility panel.
If the job name is not unique, also enter the proper jobID, but do not enter any selection on
the option input line. ISPF/PDF displays the output of the job that you specified in Browse
mode.
pr
Ex
To return to the Outlist Utility panel, enter END or RETURN. If you want to delete the job
output, select panel option D.
5-61
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
TUTOR
END
F1=HELP
F7=UP
Display
Display
Display
Display
Display
Display
Display
Display
Display
Display
Display
Display
Display
F2=SPLIT
F8=DOWN
F3=END
F9=SWAP
F4=RETURN
F10=LEFT
F5=IFIND
F11=RIGHT
F6=BOOK
F12=RETRIEVE
ES1011.0
Notes:
cl
The System Display and Search Facility (SDSF) lets you control job processing (hold,
release, cancel, purge), monitor job execution, display job output, control printers and
initiators, check network lines, work with spools, issue JES2 and z/OS commands, and so
forth.
Ex
To work with SDSF, select option SD from the ISPF Primary Option Menu. This results in
the display of the SDSF Primary Option Menu, as shown above.
To browse a job's output, choose option H. This selection displays a list of all jobs in the
JES2 held output queue.
pr
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F3=END
F9=SWAP
F4=RETURN
F10=LEFT
F5=IFIND
F11=RIGHT
Figure 5-47. Display the JES2 held output queue with SDSF
ES1011.0
Notes:
Now, with all the jobs in the JES2 held output queue on display, you can select from a
number of actions to be performed on the job's held output, including the following:
Release a job's output.
pr
Ex
cl
Enter S as an action character in the NP column of your selected job while the list of held
output for all jobs is displayed.
Copyright IBM Corp. 2001, 2013
5-63
Student Notebook
Note
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
To browse all jobs output using SDSF, select the Option O (Display jobs in the JES2 output
queue) from the SDSF PRIMARY OPTION MENU. This displays the JES2 output queue
instead of the JES2 held output queue.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
Ex
cl
To browse a job's held output using SDSF, select (Display jobs in the JES2 held output
queue) from the SDSF Primary Option Menu and then enter an S as an action character.
When you place an S in our selected job's NP column, SDSF displays the job's held
output. To return to the previous panel, enter END.
Note
pr
To delete a job's output, enter the P action character in a job's NP column or prefix area.
5-65
Student Notebook
Topic summary
Having completed this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Exercise
Submit a job
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Tasks:
1. Log on on to TSO.
2. Allocate a PDS and copy
a member in.
3. Edit the member and
then submit it.
4. Examine the job's output
using SDSF.
5. Optional: Examine the
jobs output using Outlist.
6. Delete as required.
7. Log off.
ES1011.0
pr
Ex
cl
Notes:
5-67
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
5-69
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Topic objectives
After completing this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
IEBGENER
IDCAMS
ES1011.0
pr
Ex
cl
Notes:
5-71
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
System utility
programs:
y IEHINITT
y IEHLIST
y IEHMOVE
y IEHPROGM
y IFHSTATR
y IDCAMS
ES1011.0
Notes:
cl
A utility can be understood as a program that performs one or more functions useful for the
operation, organization and maintenance of a system.
One distinguishes three types of utility programs:
pr
Ex
System utility programs System utility programs are used to list or change information
related to data sets and volumes, such as data set names,
catalog entries, and volume labels.
IEHINITT
Write standard labels on tape volumes.
IEHLIST
Lists all kinds of control data.
IEHMOVE
Moves and copies collections of data.
IEHPROGM
Builds and maintains system control data.
IFHSTATR
Selects, formats, and writes information about tape errors from
the IFASMFDP tape.
IDCAMS
Defines VSAM data sets, deletes all data sets and performs a
vast array of functions for both data set and volume
maintenance as well as hardware management functions for
advanced devices.
5-72 z/OS Fundamentals
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Ex
cl
Uempty
pr
Most utility programs have been available for a long time, and therefore some of the utility
program functions are nowadays better performed by newer applications. The main reason
why IBM continues to ship these utility programs is to provide compatibility with systems
running previous versions of the operating system.
5-73
Student Notebook
IEFBR14
Registers
15 ...
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
... 14
...
...
Branches to address
in register 14
Clears register 15
returns RC=0
IEFBR14 CSECT
SR R15,R15
BR R14
....
Initiator
Address spaces
ES1011.0
Notes:
cl
IEFBR14 is a dummy program that does not perform any real function. It consists of two
program statements. The first clears register 15, which passes a return code of 0. The
second branches to the address in register 14, which returns control to the system. If a step
requests IEFBR14, the system does the following:
Ex
Checks all the job control statements in the step for syntax.
Allocates direct access space for data sets.
Performs data set disposition processing.
pr
To test with IEFBR14, substitute IEFBR14 for the name of the program the JCL actually
supports, as follows:
//stepname EXEC PGM=IEFBR14,...
Even though IEFBR14 does not serve any real function, it allows JCL statements to be
grouped in job steps. Its typical use is the allocation and deletion of data sets required for
following job steps.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
//SYSUT1 DD ...
//SYSUT2 DD ...
PGM=
IEBCOPY
IEBGENER
//SYSIN DD *
//SYSPRINT DD
ES1011.0
Notes:
Most utilities require the use of the DDnames SYSUT1, SYSUT2, SYSIN, and SYSPRINT to
define their input and output and to pass control information to the executed program.
Ex
cl
SYSUT1
SYSIN
Specifies the control data, which is usually supplied with the input
stream or specifies DUMMY.
SYSPRINT
Defines a sequential data set for messages. The data set can be
written to a system output device, a tape volume, or a DASD
volume.
pr
SYSUT2
5-75
Student Notebook
Here is an example:
JOB...
EXEC PGM=IEBGENER
DD DSNAME=AUES100.IN.DATA,DISP=SHR
DD DSNAME=AUES100.OUT.DATA,DISP=OLD
DD SYSOUT=*
DD DUMMY
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
//PRINT
//STEP1
//SYSUT1
//SYSUT2
//SYSPRINT
//SYSIN
//...
V8.0
Student Notebook
Uempty
IEBCOPY
Copy
PDS
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
PDS
Copy
PDSE
Convert
PDS
PDS
PDSE
PDSE
Load/unload
PDSE
IEBCOPY
PDSU
Merge
PDS
PDSE
PDS
PDSE
Compress
PDS
ES1011.0
Notes:
IEBCOPY is a data set utility for the management of partitioned data sets. It allows you to:
Make a copy of a partitioned data set or PDSE.
cl
Ex
Unload (back up) and load (restore) a partitioned data set or PDSE.
Select or exclude specific members of a partitioned data set or PDSE when copying,
merging, loading, or unloading.
pr
5-77
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Copy
PDS or
PDSE
Unload
PDS or
PDSE
Load
PDSU
ES1011.0
Notes:
Ex
cl
IEBCOPY can be used to create a complete or partial copy of a partitioned data set. The
data set can be copied to the same volume (under a different name) or to another volume.
Members copied into a partitioned data set are not physically reordered; members are
copied in the physical order in which they occur in the original data set.
IEBCOPY job control statements
pr
SYSUT3 and SYSUT4 DD - can be used to define a spill (work area) utility dataset on a
direct access device if needed.
SYSIN DD - defines the control dataset which normally resides in the input stream.
Utility control statements
IEBCOPY uses three control statements:
5-78 z/OS Fundamentals
V8.0
Student Notebook
Uempty
COPY - Specifies output and input DD names that correspond to the partitioned datasets
to be copied to and from respectively.
SELECT - Specifies the members to be selected from the input partitioned dataset(s)
and to be copied into an output PDS. This statement is also used to rename and/or
replace selected members in the output PDS.
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
JOB
...
EXEC PGM=IEBCOPY
DD SYSOUT=*
DD DSNAME=AUES100.IN.DATA,UNIT=3390,VOL=SER=USER05,
DISP=SHR
DD DSNAME=AUES100.OUT.DATA,UNIT=3390,VOL=SER=USER12,
DISP=(NEW,KEEP),SPACE=(TRK,(3,1,2))
Note
Because the input and output data sets are identified as SYSUT1 and SYSUT2, SYSIN is
not required.
cl
//SYSIN
COPYMEM
Ex
IEBCOPY can be used to create a backup copy of a partitioned data set by copying
(unloading) it to a sequential data set on DASD, tape, or other device supported by QSAM.
The generated sequential data set is referred to as PDS unloaded (PDSU).
pr
IEBCOPY creates an unload data set when you specify physical sequential organization
(DSORG=PS) for the output data set. (To create a partitioned data set, specify DSORG=PO
and DSNTYPE=PDS or DSNTYPE=LIBRARY.)
Multiple data sets cannot be unloaded in one operation or to one sequential data set. Each
data set unload requires its own step and target data set.
IEBCOPY can copy a PDSU to a PDSU directly without the need to reload it to a PDS and
then unload the PDS to create the new PDSU.
5-79
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
//UNLOAD
//STEP1
//SYSPRINT
//INDS
//
//OUTDS
//
//SYSIN
pr
Ex
cl
/*
V8.0
Student Notebook
Uempty
PDS/E
member
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
PDS/E
member
Figure 5-58. Renaming and replacing data set members with IEBCOPY
ES1011.0
Notes:
IEBCOPY examples
cl
In the following examples, replace infile and outfile with any unique input and output
DD names, and replace inpds with the name of the PDS to be copied and outpds with the
name of the output PDS.
Ex
To copy only particular members of one PDS to be new members of another PDS, where
mbr1, mbr2,..., mbrn are the names of the members to be copied:
pr
// EXEC PGM=IEBCOPY
//SYSPRINT DD SYSOUT=A
//infile DD DSN=inpds,DISP=SHR
//outfile DD DSN=outpds,DISP=SHR
//SYSIN DD *
COPY OUTDD=outfile,INDD=infile
SELECT MEMBER=(mbr1,mbr2,...,mbrn)
/*
5-81
Student Notebook
To copy all members of a PDS to another PDS, replacing all duplicate-named members in
the output PDS (the R in the INDD parameter implies that replace mode is to be used):
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
// EXEC PGM=IEBCOPY
//SYSPRINT DD SYSOUT=A
//infile DD DSN=inpds,DISP=SHR
//outfile DD DSN=outpds,DISP=SHR
//SYSIN DD *
COPY OUTDD=outfile,INDD=(infile,R)
/*
Here is an example where mbri is to replace any member in the output PDS by the name of
newnamei, the following control statements can be used:
pr
Ex
cl
COPY OUTDD=outfile,INDD=infile
SELECT MEMBER=(mbr1,mbr2,...,(mbri,newnamei,R),...,mbrn)
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
DDname A
Directory
A
Directory
...
Member
A
IEBCOPY
Member
A
Member
C
...
Member
B
Member
C
Member
B
ES1011.0
Notes:
Unlike a PDSE, a partitioned data set cannot reuse the directory of deleted members
unless the data set is compressed in place or the data set is copied to another data set.
cl
The simplest way to request a compress-in-place operation is to specify the same DDname
for both the OUTDD and INDD parameters of a COPY statement.
Ex
However, a compress is actually performed when both the input and output are the same
data set on the same volume. For example, this job step will compress the data set
AUES100.DATA:
pr
//COMPRESS
EXEC
PGM=IEBCOPY
//SYSPRINT
DD
SYSOUT=*
//A
DD
DSNAME=AUES100.DATA,DISP=OLD
//B
DD
DSNAME=AUES100.DATA,DISP=OLD
//SYSIN
DD *
COPY OUTDD=B,INDD=A
5-83
Student Notebook
In this example, the data set allocated under DDname A is copied to the data set allocated
under DDname B and they are the same data set, so B is compressed.
It is recommended that a backup copy be made of a data set prior to compressing it.
A partitioned data set can be destroyed if IEBCOPY is interrupted during processing, for
example, by a power failure, abend, TSO attention, or I/O error.
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Also, do not compress a partitioned data set currently being used by more than one user.
V8.0
Student Notebook
Uempty
IEBGENER
Backup
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
y SEQ.DS
y MEMBER
y PDS
y PDSE
y MEMBER
Create
y SEQ.DS
Add
y SEQ.DS
y MEMBER
IEBGENER
y SEQ.DS
y PDS
y PDSE
Create/edit
y SEQ.DS
y MEMBER
y PDS
y PDSE
y MEMBER
Reblock/change
y Data Set
ES1011.0
Notes:
cl
Produce a PDS or PDSE or a member of a PDS or PDSE from a sequential data set.
Ex
Expand an existing PDS or PDSE by creating partitioned members and merging them
into the existing data set.
Print sequential data sets or members of PDSs or PDSEs.
Reblock or change the logical record length of a data set.
pr
And so forth
5-85
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
y Sequential
data set
IEBGENER
y Member of
PDS/PDSE
ES1011.0
Notes:
pr
Ex
cl
IEBGENER can be used to create a backup copy of a sequential data set or a member of a
partitioned data set or PDSE. The sequential data set or member can be copied to any
supported output device, such as tape or DASD.
A data set that resides on a direct access volume can be copied to its own volume,
provided that you change the name of the data set.
The following is an example of a sequential data set being copied from one volume to
another:
//COPYSEQ JOB ...
//STEP1
EXEC PGM=IEBGENER
//SYSUT1
DD DSNAME=AUES100.TESTIN.DATA,DISP=SHR
//SYSUT2
DD DSNAME=AUES100.NEW.OUT,DISP=(,KEEP),
//
VOLUME=SER=USER10,SPACE=(TRK,(5,1,0)),
//
RECFM=FB,LRECL=80,BLKSIZE=3120
//SYSPRINT DD SYSOUT=*
//SYSIN
DD DUMMY
(DUMMY is specified for SYSIN as the output is sequential and no editing is required.)
5-86 z/OS Fundamentals
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Control
statements
IDCAMS
ES1011.0
Notes:
IDCAMS can be used for perform multiple functions for both data set and volume
maintenance as well as hardware management functions for advanced devices.
pr
Ex
cl
5-87
Student Notebook
DFSORT
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Sorted
Data sets
Merged
DFSORT
Copied
ES1011.0
Notes:
Ex
cl
A data set contains the information that you want to sort, merge, or copy. For most
processing done by DFSORT, the whole data set is affected. Data sets can be cataloged,
which permits the data set to be referred to by name without specifying where the data set
is stored. A cataloged data set should not be confused with a cataloged procedure. A
cataloged procedure is a named collection of JCL stored in a data set, and a cataloged
data set is a data set whose name is recorded by the system.
pr
V8.0
Student Notebook
SORT
Uempty
FIELDS=(110,5,CH,A)
| | | |______Sort Order = Ascending
| | |________Data Type = Character
| |___________Column count
|______________Start Column
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
SORT
FIELDS=(110,5,CH,A,115,6,CH,A,1,40,CH,A)
|
|
|_________Lowest
priority
|
|___________________Second
priority
|______________________________Highest
priority
Ex
cl
pr
5-89
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
SORT
FIELDS=COPY
MERGE FIELDS=COPY
pr
Ex
cl
OPTION COPY
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
//SORTOUT DD ...
//SORTIN DD ...
PGM=DFSORT
//SYSIN DD *
//SYSOUT DD
//SORTWK.. DD
ES1011.0
Notes:
SORTOUT
SORTWKnn
Ex
cl
SORTIN
SYSOUT
SYSIN
pr
5-91
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
BAKER
ABLE
ECHO
DELTA
CHARLIE
KILO
LIMA
INDIA
GOLF
HOTEL
FOXTROT
JULIET
SORT
SORT FIELDS=(1,7,CH,A)
ES1011.0
Notes:
This shows the basic sort process using one field of 7 bytes. The subparameters indicate:
Sort the field starting in column 1
The sort field is 7 bytes long
Data type is character
Sort order is ascending
Ex
cl
pr
SORT FIELDS=(2,6,CH,A)
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
pr
Ex
cl
5-93
Student Notebook
Topic summary
Having completed this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
IEBGENER
IDCAMS
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Exercise
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
JCL exercise
Tasks:
1. Log on to TSO.
2. Copy a data set.
3. Sort a data set.
4. Log off.
ES1011.0
pr
Ex
cl
Notes:
5-95
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
5-97
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Topic objectives
After completing this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
5-99
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
What is a procedure?
JOB
________
_______________
____________
PROCEDURE
_________
PROCEDURE
___________
____________
____________
______________
_____________
ES1011.0
Notes:
cl
A procedure is a set of frequently used JCL statements that have been grouped together
and named so that they can be invoked via their name. Most JCL procedures perform a
general function which allows them to be called from a variety of jobs.
pr
Ex
Procedures are usually stored in system data sets, so called procedure libraries or proclibs
for short. By storing procedures in system proclibs, they can be made available to a wide
audience. Procedures, however, can also be stored in private procedure libraries or within
a job, restricting their use to authorized users or a single job only.
V8.0
Student Notebook
Uempty
Types of procedures
In-stream procedures
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Cataloged procedures
JOB
Other PROCLIB
SYS1.PROCLIB
PROC
IPROC
In-stream Procedure
PEND
...
PROC7 PROC8
...
EXEC IPROC
EXEC PROC3
ES1011.0
Notes:
cl
Ex
pr
Cataloged procedure
5-101
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
In-stream procedure
pr
Ex
cl
V8.0
Student Notebook
Uempty
Procedure usage
Cataloged procedures
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
PROCLIB
In-stream procedures
JOB1
PROC7 PROC8
JOB2
.
.
.
.
JOBn
...
//TEST PROC
.
.
.
//
PEND
//... EXEC TEST
.
.
.
//... EXEC TEST
.
.
ES1011.0
Notes:
cl
The use of procedures has many advantages. A procedure allows a programmer to group
a set of JCL statements under one name and to execute them by calling the procedure
name. This way redundant coding is avoided and the job becomes more
programmer-friendly as the use of procedures drastically reduces the amount of JCL
statements within a job.
pr
Ex
Since cataloged procedures are stored in private or system-wide procedure libraries, they
can be made available to a greater group of users. This way, programmers have access to
a great variety of procedures, making them more productive. The use of cataloged
procedures also eases procedure maintenance since they can be stored and maintained at
a central location. Before procedures are placed in a procedure library, they are often
tested as in-stream procedures, which simplifies procedure testing.
5-103
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
In-stream
procedure
//STEP2
EXEC INPROC
ES1011.0
Notes:
cl
The visual shows an example of an in-stream procedure. In-stream procedures are part of
the job that executes them. To distinguish the in-stream procedure's JCL statements from
the other JCL statements, they are enclosed by:
//name PROC
Ex
and
//
PEND
pr
PEND
If, however, a //name PROC statement is coded in a cataloged procedure, it has to be the
procedure's first statement.
V8.0
Student Notebook
Uempty
Calling procedures
When calling a procedure you can:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
cl
When you call a procedure you can use it as is, add additional DD statements, override or
nullify the procedure's EXEC and/or DD statements, or use JCL symbols to set variable
values for the execution of the procedure.
pr
Ex
All additions or alterations on a procedure's invocation are only temporary, valid only for the
current job step. The actual procedure code remains unchanged.
5-105
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
//jobname JOB...
//name PROC
.
.
//
PEND
.
//step EXEC PROC=name
or
//step EXEC name
Private
Proclib(s)
System
Proclib(s)
ES1011.0
Notes:
To call a procedure, code the EXEC statement in either one of the following forms:
//name EXEC PROC=procname
cl
or
Ex
The system then retrieves the procedure using the following search order:
pr
1. If the called procedure is an in-stream procedure, the system retrieves it from the job
input stream. (Remember to place the in-stream procedure before the EXEC statement
calling it.)
2. If the procedure is a cataloged procedure stored in a private procedure library, the
system retrieves it from the library specified on the job's JCLLIB statement. (The
JCLLIB statement has to appear before the EXEC statement.)
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
MY.PROC1
//MYJOB JOB ...
.
.
//MYLIB JCLLIB ORDER=(MY.PROC1,
//
MY.PROC2)
.
.
//STEP1 EXEC PROC=PRC23
.
.
.
...
MY.PROC2
...
ES1011.0
Notes:
Ex
cl
When working with private procedure libraries, the JCLLIB statement is used to identify
the names of the private data sets to be searched. Apart from specifying the names of the
data sets to be searched in case of a procedure call, the JCLLIB statement also
determines the order in which they are searched. The system searches private procedure
libraries in the order they are entered on the JCLLIB statement prior to searching any
default system procedure library.
The JCLLIB statement syntax is:
//[name] JCLLIB ORDER=(library[,library]...)
pr
Note
If a private procedure library is to be used, a JCLLIB statement must appear after the JOB
statement and before the first EXEC statement in the job.
5-107
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
.
.
//INPROC PROC
//STEP1 EXEC PGM=APGM
//IN
DD
DSN=TESTA.DATA,DISP=SHR
.
.
//
PEND
.
.
//STEPn EXEC INPROC
//STEP1.IN DD DSN=TESTB.DATA
//...
.
Overrides
ES1011.0
Notes:
Ex
cl
Overriding a parameter modifies only that parameter; the system uses all other parameters
on the original statement. For example, if you override the data set name on a DD
statement that includes UNIT and VOL=SER parameters, the system will still use the UNIT
and VOL=SER parameters. Invalid parameters in a procedure cannot be corrected through
overrides. Before processing overrides, the system scans the original procedure
statements for errors and issues error messages. A cataloged or in-stream procedure can
be modified by:
pr
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
//STEPn
//STEP1.IN
EXEC INPROC
DD DSN=TESTB.DATA
pr
Ex
cl
5-109
Student Notebook
JCL symbols
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Example
:
000100
000200
000300
000400
000500
000600
000700
000800
ES1011.0
Notes:
cl
JCL symbols allow you to easily modify JCL statements in a job through the use of
variables. JCL symbols are valid only for the current job. When you code JCL symbols
within a job, you must define or override them every time the job runs.
A JCL symbol can be set by:
A PROC statement marks the beginning of an in-stream
procedure, but can also be used in a cataloged procedure.
Ex
PROC statements
pr
Example:
//MYPROC PROC DSNAME='DEES100.DEFAULT.DATA'
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
SET statements
Example:
Note
pr
Ex
cl
5-111
Student Notebook
INCLUDE groups
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
cl
An INCLUDE statement specifies the name of a member of a PDS or PDSE that contains a
set of JCL statements. The set of JCL statements referred to by the INCLUDE statement is
called an INCLUDE group. The INCLUDE group statements replace the INCLUDE
statement. The system processes the JCL statements of the INCLUDE group as part of the
JCL stream.
Ex
pr
The member storing the INCLUDE group must be part of a procedure library. The same
search order as for procedures applies.
An INCLUDE statement:
Can appear anywhere in the job after the JOB statement, with one exception: if there is
a JCLLIB statement, the INCLUDE statement must follow the JCLLIB statement
Can appear within an INCLUDE group. INCLUDE groups can contain INCLUDE
statements and can be nested up to a maximum of 15 levels of nesting
5-112 z/OS Fundamentals
V8.0
Student Notebook
Uempty
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
5-113
Student Notebook
Topic summary
Having completed this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Checkpoint (1 of 4)
1. Which one of the following is not a JES2 job processing phase?
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
a. Input phase
b. Conversion phase
c. Linking phase
d. Execution phase
e. Output phase
f.
Purge phase
3. True or False: During the conversion phase, the JCL of any called
procedure is added to the jobs JCL. The result is called external text.
ES1011.0
pr
Ex
cl
Notes:
5-115
Student Notebook
Checkpoint (2 of 4)
4. What is the purpose of a procedure library?
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
5. True or False: The job processing phases are also referred to as job
steps.
6. Is this job card correct? If not, what is incorrect?
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Checkpoint (3 of 4)
7. What is wrong with the following JCL statements?
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
ES1011.0
pr
Ex
cl
Notes:
5-117
Student Notebook
Checkpoint (4 of 4)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
d. IF/THEN/ELSE/ENDIF
d. IF/THEN/ELSE/ENDIF
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Exercise
Procedures
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Tasks:
1. Log on to TSO.
2. Override a procedure.
3. Create and execute
procedures.
4. Log off.
ES1011.0
pr
Ex
cl
Notes:
5-119
Student Notebook
Unit summary (1 of 2)
Having completed this unit, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
IEBGENER
IDCAMS
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Unit summary (2 of 2)
Having completed this unit, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
5-121
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
cl
Checkpoint questions
Machine exercises
GA22-7800
SA22-7801
SA22-7806
pr
Ex
References
6-1
Student Notebook
Unit objectives
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
6-2
z/OS Fundamentals
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
6-3
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
6-4
z/OS Fundamentals
V8.0
Student Notebook
Uempty
Topic objectives
After completing this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
6-5
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
LAN services
Softcopy services
Security services
e-Business
services
CICS
Distributed
computing
IMS/TM
System services
UNIX System
Application
Services
enablement
TSO
Batch
UNIX
APPC
STC
Applications
DB2
nonVSAM
Systems management
Communications services
VSAM
IMS/DB
HFS
ES1011.0
Notes:
z/OS is IBM's integrated solution for an open system platform that provides broad
functionality for almost every aspect of computing.
cl
pr
Ex
System Services
6-6
z/OS Fundamentals
V8.0
Student Notebook
Uempty
Security Services
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Communications Server
e-Business Services
LAN Services
Ex
cl
pr
Softcopy Services
Note that CICS and IMS/TM are transaction managers, and IMS/DB and DB2 are database
managers.
The referenced applications are customer-provided programs.
6-7
Student Notebook
UNIX applications
z/OS services
UNIX System Services
z/OS data
sets
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
HFS files
Mixed
programs
UNIX
programs
Application programmer
using the shell
UNIX
workstation
Traditional
z/OS
programs
Application programmer
using TSO/E and ISPF
ES1011.0
Notes:
cl
z/OS provides traditional MVS programming services plus the UNIX System Services, the
UNIX shell and utilities feature, the IBM Language Environment for z/OS and zVM, and the
C/C++ for z/OS Compiler.
Ex
The services that support UNIX application programming make it possible to develop and
run C application programs that provide XPG4.2 defined function. The C program source
can be developed on an z/OS system using UNIX System Services or on a programmable
workstation (PWS). Creation of an application executable file must be done using UNIX
System Services through the shell.
pr
UNIX applications that conform to XPG4.2 can be ported to z/OS, and XPG4.2 applications
on z/OS can be ported to any XPG4.2 supported platform.
Many of the XPG4.2 function calls are available as callable services, which can be used in
z/OS applications to exploit XPG4.2 functions. This provides the capability to access
hierarchical files from an z/OS program. UNIX System Services programs can also invoke
z/OS system services and access z/OS data sets. These types of applications are called
mixed programs. None of these services affect existing z/OS applications.
6-8
z/OS Fundamentals
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Applications
People
Portability
Scalabilty
Interoperability
Skills
ES1011.0
Notes:
cl
UNIX System Services meet open system requirements. There are thousands of
UNIX-based applications available today. Those applications, which conform to XPG4
standards, can be ported to z/OS. These can be vendor applications or self-developed
applications.
Ex
Not all applications are meant for z/OS, but a UNIX application should be considered if it
requires:
Large DASD capacity
Access to high-speed printers
Support for a large number of users than traditionally on a LAN
Shared applications
High reliability
Large batch jobs
High security
pr
A benefit of z/OS UNIX System Services is scalability. Resources like DASDs, CP power,
CPC storage, network, and peripherals can be scaled up for a UNIX system.
Copyright IBM Corp. 2001, 2013
6-9
Student Notebook
Interpret
Utilities
User
Shell
Process
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Input
ar
yacc
make
c89
printf
locate
awk
grep
diff
find
mkdir
Read input
Interprets command
Creates process
Executes process
Built-in commands
Script
"EXEC"
"CLIST"
od
continue
kill
sort
wait
unset
ES1011.0
Notes:
cl
The UNIX System Services Shell is a command interpreter that accepts commands defined
in XPG4.2 standards. To perform some command requests, the shell calls other programs,
known as utilities. The shell can be used to:
Ex
pr
IBM has licensed Mortice Kern System's InterOpen XPG4.2 Shell and Utilities source code
so that z/OS is XPG4.2 compliant. It is a popular compliant shell based on the Korn shell.
With z/OS, the shell environment can be accessed directly from workstations using rlogin
and telnet commands from ASCII terminals attached to a communication server or from a
TSO session.
V8.0
Student Notebook
Uempty
XPG4.2
shell
3270 Emulator
(ASCII appearance)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
rlogin
TCP/IP
Channel
or LAN
3270 data
stream
Communications
ASCII
server
SNA
telnet
rlogin
Workstations
3270 Terminal
3270 Emulator
(ASCII appearance)
ES1011.0
Notes:
cl
Through TSO/E from 3270 displays or workstations using 3270 emulators. (The
workstations can attach to UNIX System Services via SNA or TCP/IP networks.)
From a TCP/IP-attached terminal.
Ex
A user invokes the shell from TSO/E by issuing the OMVS command.
pr
When the INETD daemon is set up and active on the host, rlogin to the shell from a
TCP/IP connected workstation can occur.
6-11
Student Notebook
z/OS
data sets
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
HFS files
Traditional
z/OS-like
interface
UNIX-like
interface
TSO/E
Shell
ES1011.0
Notes:
Ex
cl
UNIX System Services offers TSO interactive users the choice and ability to switch
between the UNIX-like interface of the UNIX System Services shell and command
interpreter, and the traditional TSO/E panel or command interface. An installation can
customize TSO/E logon so that users who prefer a UNIX-like interface are put directly into
the UNIX System Services shell. From there, the users can choose to switch to TSO/E
when desired or required.
Examples of interaction between TSO/E and the shell:
pr
Move data between z/OS data sets and the hierarchical file system.
Use TSO/E commands, the ISPF panel interface with UNIX System Services support,
or shell commands to work with HFS files.
Issue TSO/E commands from the shell command line.
Write z/OS JCL that includes shell commands.
Use the ISPF/PDF full-screen editor or the shell line editor to edit HFS files.
V8.0
Student Notebook
Uempty
Shell
awk
grep
diff
find
mkdir
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
z/OS
Commands and
utilities
OMVS
TCP/IP
VTAM
SNA
network
TCP/IP
network
ES1011.0
Notes:
cl
The shell is the interactive interface to UNIX System Services. The shell is part of the UNIX
System Services base element of z/OS. Although some functions can be performed by
TSO/E, it is recommended that you use the shell.
Ex
The network connection to the shell via TSO/E can be either VTAM (SNA) or TCP/IP. This
includes:
Real and emulated 3270 terminals in an SNA network.
pr
UNIX systems and other workstations that in a TCP/IP network support the TELNET
3270 (TN3270) client function. The TN3270 client communicates with the TELNET
server (TN-S) in TCP/IP on z/OS.
UNIX System Services supports block mode and canonical mode 3270-type terminals.
Character asynchronous terminals and non-canonical (raw) mode terminals are not
supported.
6-13
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
===> OMVS
SESSIONS(3) CONVERT((BPXFX111))
ESCAPE(^)
ES1011.0
Notes:
pr
Ex
cl
The OMVS command is a TSO command which is used to invoke the shell.
V8.0
Student Notebook
Uempty
ALARM | NOALARM
AUTOSCROLL | NOAUTOSCROLL
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
CONVERT
DBCS | NODBCS
DEBUG()
ECHO | NOECHO
ENDPASSTHROUGH
ESCAPE()
LINES(n)
PFn()
PFSHOW | NOPFSHOW
SESSIONS()
SHAREAS | NOSHAREAS
pr
Ex
cl
WRAPDEBUG(n)
6-15
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
IBM
Licensed Material - Property of IBM
5655-A01 (C) Copyright IBM Corp. 1993, 2006
(C) Copyright Mortice Kern Systems, INC., 1985, 1996.
(C) Copyright Software Development Group, University of
Waterloo, 1989.
All Rights Reserved.
$
===>
RUNNING <1>
ESC=^ 1=Help
2=SubCmd
7=BackScr 8=Scroll
3=HlpRetrn
9=NextSess
4=Top
5=Bottom
6=TSO
10=Refresh 11=FwdRetr 12=Retrieve
ES1011.0
Notes:
Ex
cl
This is the screen that is displayed when a user invokes the shell. At the bottom of the
screen you see:
The command line (===>) used for input.
The default function key settings and the default escape character assignment. The
function keys can be customized, or they can be turned off.
The status indicator in the right-hand corner. When you first enter the shell, the status is
RUNNING.
pr
The $ prompt is an indication from the shell that it is ready to accept input from the
command line. For a superuser, the default prompt is #. A user can decide to use a
different prompt than $.
The shell works in 3270 mode, and everything typed on the command line is processed in
line mode (canonical mode). This means the input is not processed until the user presses
the Enter key.
The shell screen for the non-TSO user looks the same except for the absence of the
bottom section.
6-16 z/OS Fundamentals
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
$rlogin ZOS1
$rlogin -l jane
enter password:
ZOS1
1. TCP/IP
login or telnet port
2. INETD
fork an address space
3. Rlogind or otelnetd
validate user and
spawn new process
4. Shell
ES1011.0
Notes:
The rlogin or telnet commands used by the end user are in the syntax of the remote
system. The picture shows only some examples.
Ex
cl
The rlogin command names the z/OS system that you want to connect to and a user
name if you are logging onto z/OS with a different user identity. The telnet command
may name the terminal type, the host name or IP address, and the port number if different
from the well-known ports used by TCP/IP daemons. In either case, z/OS asks the user for
a password.
pr
On the UNIX System Services system, the INETD system daemon must be running to
receive these requests. It creates an address space for each user which contains the
appropriate server daemon (rlogind or otelnetd). The shell is started by this daemon after it
validates the user identity. The daemon is also responsible for ASCII to EBCDIC
conversion as data flows from the terminal to the host.
Once the shell is started, the user's profile or individual commands are used to set up the
user's shell environment. A user can start multiple shells by issuing multiple rlogin or
telnet commands.
Copyright IBM Corp. 2001, 2013
6-17
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
IBM
Licensed Material - Property of IBM
5655-A01 (C) Copyright IBM Corp. 1993, 2006
(C) Copyright Mortice Kern Systems, INC., 1985, 1996.
(C) Copyright Software Development Group, University of
Waterloo, 1989.
All Rights Reserved.
ES1011.0
Notes:
This is the screen that is displayed when a user invokes the shell after logging on with
rlogin or telnet.
Ex
cl
The $ prompt is an indication from the shell that it is ready to accept input from the
command line. For a superuser the default prompt is #. A user can decide to use a
different prompt than $, as this example shows.
The shell works in line mode and everything typed on the command line is processed in
line mode (canonical mode). This means the input is not processed until the user presses
the Enter key.
pr
When an application that requires character mode (or raw mode) support is invoked, the
shell runs the application as defined. For example, the vi editor executes in character
mode, and when you exit this editor the shell returns to line mode.
In this mode, the ASCII control key on the terminal works as it should. For instance, to
interrupt an application use <Ctrl-C>, and to end the shell session use <Ctrl-D>.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
cd
chaudit
chgrp
chmod
chown
cp
ed
ln
ls
mkdir
mknod
mkfifo
mv
pwd
rm
rmdir
Shell
HFS/zFS
file
ES1011.0
Notes:
UNIX System Services provides commands for the shell user to create and work with
directories and files.
Ex
cl
mkdir creates a directory, ed creates or edits a file, mkfifo creates a FIFO, mknod
creates a character special file or a FIFO, and ln creates a hard link or symbolic link to
a file.
cp copies a file, ls lists files in a directory, mv moves or renames a file, rm deletes a
file, and rmdir deletes an empty directory.
cd changes a working directory, and pwd displays the working directory for a user.
pr
chaudit, chgrp, chmod, and chown are commands used to change audit
information, group name, permission bits, and owner of a file or directory, respectively.
6-19
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
$ ls -l /usr/lib
total 237
drwxr-xr-x 2 ELVIS
-rw-r--r-- 2 ELVIS
-rw-r--r-- 2 ELVIS
-rw-r--r-- 2 ELVIS
drwxr-xr-x 5 ELVIS
-r-sr-xr-x 2 ELVIS
$
SYS1
SYS1
SYS1
SYS1
SYS1
SYS1
0
5200
12076
4706
0
98304
Jul
Jul
Jul
Jul
Jul
Jul
29
29
29
29
29
29
20:14
20:12
20:12
20:12
19:52
20:08
IBM
lib.b
libl.a
liby.a
nls
tsmail
ES1011.0
Notes:
cl
The UNIX System Services shell is, above all, a programmer's interface. The shell has
many general tools that can help any programmer, and, in addition, there are several
commands designed especially for the C programmer.
Ex
Shell commands are entered on the command line (===>) and processed when the user
presses the Enter key. Shell command options are usually specified by a minus (-) sign
followed by a single character, for example, ls -l. Some commands accept options that
have accompanying arguments, for example, ls -l /usr/lib. The argument may be a
number, a string, a file name, or something else.
pr
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
z/OS Applications
Option ===>
1
2
3
4
5
7
8
9
10
11
12
13
14
Book Build
Read Doc
Read Index
DFSMSrmm
DFSMSdfp
BDT
IPCS
Unix Browse
Unix Edit
Unix Shell
Security
TSO/E ICF
SDSF
BookManager/Build
BookManager/Read Online Documentation
BookManager/Read Bookshelf Index Creation
DFSMSrmm/ISMF
DFSMSdfp/ISMF
BDT File-to-File Feature
IPCS for dump reading
z/OS Unix Browse Files
z/OS Unix Edit Files
z/OS Unix Shell
Security Server
TSO/E Information Center Facility
SDSF
ES1011.0
Notes:
Ex
cl
The user enters the TSO command OMVS to enter the shell environment
The TSO command ISHELL supports file handling for HFS files via ISPF dialogs
Select the z/OS UNIX directory list utility by either:
- Selecting option 3.17 from the Primary Option menu, or
- Selecting option 17 from the Utility selection menu.
The installation uses the above ISPF panels
pr
After entering the shell environment, the user can toggle between TSO and UNIX. The user
can also issue TSO commands from the shell.
6-21
Student Notebook
ISPF shell
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
- Press Enter.
- Select an action bar choice.
- Specify an action code or command on the command line.
More:
/
________________________________________________________________
________________________________________________________________
________________________________________________________________
EUID=0
ES1011.0
Notes:
cl
The UNIX System Services ISPF shell provides the ability for users and system
administrators to use ISPF dialogs instead of shell commands to perform many tasks
related to file systems and files. A regular user can use the ISPF shell to work with:
Directories
Regular files
FIFO special files
Symbolic links
Ex
pr
V8.0
Student Notebook
Uempty
Special_file
Tools
List directory(L)...
New(N)...
Attributes(A)...
Delete(D)...
Rename(R)...
Copy to PDS(C)...
Copy from PDS(I)...
Print(P)
Compare(M)...
Find strings(F)...
Set working directory(W)
File system(U)...
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
File
------
Enter
Retur
rent pathname.
More:
/
__
__________________________
__
__________________________
________________________________________________________________
EUID=21
ES1011.0
Notes:
pr
Ex
cl
6-23
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
cl
Support has been added to ISPF for the processing of z/OS UNIX files. This support
includes the ability to edit, browse, create, delete, rename, copy, and replace z/OS UNIX
files. This new support is implemented as a directory list utility (known as the z/OS UNIX
Directory List Utility), available as option 17 on the ISPF Utilities menu.
Ex
This initial implementation of the directory list utility provides a subset of the functions
supported by ISHELL. The set of functions supported by the directory list facility are aimed
to assist with basic tasks undertaken by users such as programmers. This utility is not
aimed at users such as z/OS UNIX file system administrators.
pr
As far as possible, the directory list utility is designed to behave and support commands
similar to the data set list utility (ISPF option 3.4). This is done to assist users who are
familiar with the operation of the data set list utility but have little experience working with
z/OS UNIX files through utilities such as OMVS or ISHELL.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
-CMD
*UDLIST
ES1011.0
Notes:
When option 17 on the ISPF Utility Selection panel (that is, ISPF option 3.17) is entered,
the z/OS UNIX Directory List Utility entry panel is displayed.
cl
Ex
pr
For either option, the user must enter in the Pathname field the pathname of the directory
they want to display or print. If a path name is not entered, the users home path is
assumed.
6-25
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Command Filename
Message
Type Permission
------------------------------------------------------------------------------.
Dir rwxr-xr-x
..
Dir rwxrwxrwt
auto.master
File rwxr-xr-x
bpa
Dir rwxr-xr-x
cmx
Dir rwxr-xr-x
dce
Dir rwxr-xr-x
dfs
Dir rwxr-xr-x
httpd.conf
File rwxr-xr-x
httpd.envvars
File rw-r--r-ics_pics.conf
File rw-r--r-init.options
File rwx-----mvsds.conf
File rw-r--r-osnmpd.data
File rwxrwxrwx
pkiserv
Dir rwxr-xr-x
profile
File rwxr-xr-x
rc
File rwx-----recover
Dir rwxrwxrwx
-CMD
*UDLIST
ES1011.0
Notes:
The z/OS UNIX Directory List panel is displayed when the option field is left blank and enter
is pressed on the entry panel.
cl
Ex
The information for each entry in the directory is displayed in column fields across the
screen.
The number of columns displayed depends on the available screen width.
pr
The above example shows the initial directory list display on a terminal with a screen width
of 85 and a screen depth of 31.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Command Filename
Message
Owner
Group
Links Size
------------------------------------------------------------------------------.
DFS
14
8192
..
DFS
OMVSGRP
52
237568
auto.master
DFS
1
29
bpa
DFS
2
8192
cmx
DFS
2
8192
dce
DFS
9
8192
dfs
DFS
8
8192
httpd.conf
WEBADM
1
162841
httpd.envvars
WEBADM
1
476
ics_pics.conf
WEBADM
1
2943
init.options
DFS
1
2588
osnmpd.data
DFS
1
1218
pkiserv
DFS
2
8192
profile
DFS
1
9983
rc
DFS
1
3079
recover
DFS
2
8192
-CMD
*UDLIST
Figure 6-23. Horizontal scrolling through RIGHT and LEFT commands/column order and size
ES1011.0
Notes:
cl
Horizontal scrolling is supported using the RIGHT and LEFT primary commands (or
function keys 11 and 10). The example in this visual shows the directory list display after
entering the command RIGHT 5 on the directory list shown on the previous visual.
Ex
Note: The Filename and Message columns are not included in the set of columns that
scroll when the RIGHT or LEFT primary commands are entered. These columns are fixed
as the left-hand columns of the directory list display.
The order in which columns appear in the directory list display, and these size of the fields
can be customized using the z/OS UNIX Directory List Column Arrangement panel.
pr
This panel is accessed via the pull-down menu displayed when the Options choice is
selected from the action bar on the z/OS UNIX Directory List entry and display panels.
Here the user can change the order in which the columns are displayed and the width of
the column fields.
If a column fields width is set to zero, the column is not displayed in the directory list.
6-27
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
E
V
B
N
L
D
MM
MO
MF
UA
FS
Edit a file
View a file
Browse a file
Create new entry
List a directory
Delete an entry
Modify mode fields
Modify owner
Modify format
User auditing
Display file system
EA
VA
CO
CI
I
R
MX
MG
X
AA
RA
ES1011.0
Notes:
cl
The following line commands are available on the z/OS UNIX Directory List panel:
E: The E (edit) line command can be entered against a regular file. The z/OS UNIX
OEDIT command is invoked, enabling the use of the ISPF editor to change the data in
the file.
Ex
B: The B (browse) line command can be entered against a regular file. The z/OS UNIX
OBROWSE command is invoked, enabling the use of the ISPF browse facility to display
the data in the file.
pr
N: The N (new) line command is used to create a new file and can be entered against
any directory entry. This command causes the Create New z/OS UNIX File panel to be
displayed.
L: The L (list directory) line command can be entered against a directory. This
command causes the causes a new z/OS UNIX Directory List panel to be displayed.,
showing the entries for the selected directory. This new directory list display is nested
so entering the END or EXIT command on this panel will return the user to the previous
directory list.
6-28 z/OS Fundamentals
V8.0
Student Notebook
Uempty
D: The D (delete file) line command can be entered against any directory entry. Options
are available for confirmation panels to be displayed when the D line command is
entered.
R: The R (rename file) line command can be entered against any directory entry. This
line command causes the Rename z/OS UNIX File panel to be displayed.
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
CO: The CO (copy out) line command can be entered against a regular file or directory.
When entered against a regular file, this command allows the user to copy the data
from that file to another z/OS UNIX file, a sequential data set, or a member of a
partitioned data set. When entered against a directory, this command allows the user to
copy regular files from the directory into members in an existing PDS/E.
CI: The CI (copy in) line command can be entered against a regular file or directory.
When entered against a regular file, this command allows the user to have data from
another z/OS UNIX file, a sequential data set, or a member of a partitioned data set
replace the data in the selected file. When entered against a directory, this command
allows the user to have the members from a PDS/E copies as regular files into the
selected directory.
I: The I (information) line command can be entered against any directory entry. This
line command causes a panel to be displayed showing information and attributes for the
selected file.
MM: The MM (modify mode) line command can be entered against any directory entry
except a symbolic link. This line command causes the Modify z/OS UNIX File Mode
Fields panel to be displayed. This panel allows the permissions, and the set UID, set
GID, and sticky bits to be modified.
MX: The MX (modify extended) line command can be entered against a regular file. This
line command causes the Modify z/OS UNIX File Extended Attributes panel to be
displayed. This panel allows the extended attributes for the file to be modified.
pr
Ex
cl
X: The X (execute) line command can be entered against a regular file or directory. This
line command causes the Execute Command for z/OS UNIX File panel to be displayed.
This panel allows you to run the selected file in z/OS UNIX or enter a z/OS UNIX
command, TSO command, CLIS T, or REXX exec which is passed the pathname of the
of the selected file as a parameter.
6-29
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Command ===>
Pathname . . . . /u/prichar/file1
Permissions
. .
(Octal)
Link . . . . . .
File Type
. . .
2 1.
2.
3.
4.
5.
6.
Directory
Regular file
FIFO
Symbolic Link
External Link
Hard Link
Options
Set sticky bit
Copy...
Edit...
ES1011.0
Notes:
The Create New z/OS UNIX File panel allows a user to create a file and is invoked using
the N line command.
cl
The user must enter the pathname and permissions for the new file, and identify the file
type.
Ex
When creating a symbolic or external link, the user must identify the file the link refers to.
pr
Options are available to have data copied from another file or data set into the new file and
to edit the new file. The sticky bit can also be set on for the new file.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Command ===>
Options
/ Confirm copy to existing target
Update permissions for existing target file
Binary copy
Convert
Conversion Table
ES1011.0
Notes:
cl
The Copy From z/OS UNIX File panel allows the data from a file to be copied to another
file, sequential data set, or member of a partitioned data set and is invoked using the CO
line command against a regular file.
Ex
The user must specify the name of the target z/OS UNIX file, sequential data set, or
partitioned data set and member. When the data is to be copied to a z/OS UNIX file, the
user can specify the permissions for this file.
Options are available to:
pr
When the target is an existing z/OS UNIX file, have its permissions updated.
Cause a binary copy to occur when copying to a sequential data set or member.
Cause data conversion to take place during the copy operation. An optional conversion
table can be specified.
6-31
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Command ===>
Options
Replace like-named members
Selection list...
/ Include lowercase names
/ Strip suffix
Binary copy
Convert
(Suffix to strip)
Conversion Table
ES1011.0
Notes:
cl
The Copy From z/OS UNIX Directory panel allows the data from regular files in a directory
to be copied to member in a partitioned data set and is invoked using the CO line command
against a directory.
The user must specify the name of the target partitioned data set. Options are available to:
Ex
Have data in existing members overwritten with the data from the source file
Display a selection list where the user can select the files in the directory that are to be
copied.
pr
Allow files with names containing suffixes to be copied by having the suffix removed.
Cause a binary copy to occur when copying to the target member.
Cause data conversion to take place during the copy operation. An optional conversion
table can be specified.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Command ===>
Options
Binary copy
Convert
Conversion Table
ES1011.0
Notes:
cl
The Replace z/OS UNIX File panel allows the data in a regular z/OS UNIX file to be
replaced with the data from another file, sequential data set, or member of a partitioned
data set and is invoked using the CI line command against a regular file.
Use CI (- Copy data in) line command.
Ex
The user must specify the name of the source z/OS UNIX file, sequential data set, or
partitioned data set and member. Options are available to:
Cause a binary copy to occur when copying from a sequential data set or member.
pr
Cause data conversion to take place during the copy operation. An optional conversion
table can be specified.
6-33
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Command ===>
Options
Replace like-named files
Update permissions for replaced files
Selection list...
/ Convert to lowercase
Binary copy
Convert
Conversion Table
ES1011.0
Notes:
Ex
cl
The Copy Into z/OS UNIX Directory panel allows the data from members in a partitioned
data set to be copied into regular files in a directory and is invoked using the CI line
command against a directory. The user must specify the name of the source partitioned
data set. The user can specify the permissions to apply to the files the members are copied
into. The user can also specify a suffix which is appended to the member name to make
the name of the regular file created/updated during the copy operation. Options are
available to:
pr
Have data in existing files overwritten with the data from the source member.
Have the permissions for existing files overwritten during the copy operation updated
using the permissions value specified by the user.
Display a selection list where the user can select the members that are to be copied
Have the member name converted to lowercase before it is used to generate the
filename for the target regular file.
Cause a binary copy to occur when copying to the target file.
Cause data conversion to take place during the copy operation. An optional conversion
table can be specified.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Modify Display
--------------------------------------------------------------------------------z/OS UNIX File Information
Command ===>
Pathname
. . : /u/prichar/biorhytm.C
General Data
File Type . .
File Size . .
Links . . . .
Inode . . . .
File Format .
Last Modified
Last Changed
Last Accessed
Created . . .
CCSID . . . .
Text Convert
:
:
:
:
:
:
:
:
:
:
:
File
8774
1
1617
nl
2000/04/05
2000/04/05
2006/02/20
2000/03/13
Mode Fields
Permissions .
Set User ID .
Set Group ID
Sticky Bit .
12:02:50
12:02:50
19:35:52
19:07:57
:
:
:
:
600
NO
NO
NO
Extended Attributes
Shared AS . . : YES
APF Auth . . : NO
Pgm Control . : NO
Shared Lib . : NO
NO
Owner
File . . . . : DFS(0)
Group . . . . : OMVSGRP(0)
Audit
Auditor . . . : --User . . . . : fff
Device Data
Device Number : 36
Major Device :
Minor Device :
ES1011.0
Notes:
The z/OS UNIX File Information panel displays the attributes for a file or directory and is
invoked using the I line command.
pr
Ex
cl
The Modify pull-down contains options to modify either the mode fields or the extended
attributes for the file.
6-35
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Command ===>
Pathname . : /u/prichar/biorhytm.C
Type . . . : File
Permissions
600
(Octal)
ES1011.0
Notes:
The Modify z/OS UNIX File Mode Fields panel allows the user to change the permissions,
set UID bit, set GID bit, and the sticky bit for a file.
pr
Ex
cl
It is invoked using the MM line command or via the Modify pull-down on the z/OS UNIX File
Information panel.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Command ===>
Pathname . . . . /u/prichar/calc.c
Run method . . . 1
1. Direct
2. Login shell
3. TSO
ES1011.0
Notes:
The Execute Command for z/OS UNIX File panel allows the user to run a file, or execute a
z/OS UNIX command, TSO command, CLIST, or REXX exec against a file.
cl
It is invoked using the X line command against a regular file, directory, or symbolic link to a
regular file.
Ex
For a command that runs in z/OS UNIX, the user has the option to run the command under
the login shell or directly in z/OS UNIX.
pr
To simply run the selected file, the user can leave the Command for file field blank. By
default, the pathname of the selected file is appended to the end of the command entered
by the user.
The panel on this visual shows a request to run the c89 command to compile, assemble,
and link-edit the C program in /u/prichar/calc.c. The command is to run in the z/OS UNIX
login shell.
When you press Enter, you get a message like: Running shell command: /bin/sh
-Lc /bin/c89 /u/prichar/calc.c PID=50397274 .
Copyright IBM Corp. 2001, 2013
6-37
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
~ (tilde):
. (dot):
.. (dot dot):
Figure 6-33. Native ISPF edit and browse z/OS UNIX files
ES1011.0
Notes:
z/OS 1.9 provides z/OS UNIX file support into native ISPF EDIT and BROWSE functions.
cl
The Edit Entry, Browse/View Entry, Edit Copy, Edit Move, Edit Create, and Edit Replace
panels are modified in z/OS 1.9 so that the Other data set name field is a scrollable field
which accepts a z/OS UNIX pathname of up to 1023 characters in length.
Ex
ISPF assumes a z/OS UNIX path name is entered in this field when the first character is
one of the following:
Identifies an absolute path name.
~ (tilde)
Represents the path name for the users home or initial working
directory.
pr
/ (forward slash)
. (dot)
.. (dot dot)
Represents the path name of the parent directory for the current
working directory.
V8.0
Student Notebook
Uempty
Some examples:
~/test/tst1.shIs equivalent to specifying absolute path name
/u/jsmith/test/tst1.sh when the users home directory is defined as
/u/jsmith.
Is equivalent to specifying absolute path name /u/proj1/dev/pgma.c
when the users current working directory is set to /u/proj1/dev.
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
./pgma.c
pr
Ex
cl
6-39
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
z/OS UNIX Directory List displayed when path name for directory
entered in the Other data set name field
Edit Entry Panel
Command ===>
ISPF Library:
Project . .
Group . . .
Type . . .
Member . .
.
.
.
.
. . .
. . .
. . .
Command Filename
Message
Type Permission
------------------------------------------------------------------------------.
Dir rwxr-xr-x
..
Dir rwxr-xr-x
bin
Dir rwxr-xr-x
include
Dir rwxr-xr-x
lib
Dir rwxr-xr-x
local
Dir rwxrwxr-x
lpp
Dir rwxr-xr-x
ES1011.0
Notes:
A z/OS UNIX directory selection list is displayed when the pathname for a directory is
specified:
cl
Ex
With the edit/view MOVE, COPY, BROWSE, EDIT, and VIEW primary commands
pr
The directory selection list is almost identical to the list displayed from the z/OS UNIX
Directory List Utility (PDF option 3.17). The selection list supports the S (select) line
command, allowing you to select the file to be processed with the function (for example,
edit) that invoked the list.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
RefList
RefMode Utilities
View Entry Panel
Workstation
Help
Command ===>
ISPF Library:
Project . .
Group . . .
Type . . .
Member . .
.
.
.
.
. . .
. . .
. . .
Workstation File:
File Name . .
Initial Macro . .
Profile Name . . .
Format Name . . .
Data Set Password
Record Length . .
.
.
.
.
.
.
.
.
.
.
Options
/ Confirm Cancel/Move/Replace
Browse Mode
View on Workstation
/ Warn on First Data Change
Mixed Mode
View ASCII data
ES1011.0
Notes:
The View Entry Panel, displayed via ISPF option 1, is changed to allow a z/OS UNIX file
pathname to be entered in the Other data set name field.
pr
Ex
cl
Also the new Record Length field is added to allow a record length to be specified when
browsing a z/OS UNIX. The value entered in this field is used by ISPF to display the data in
the file as fixed-length records, rather than using the newline character to delimit each
record. This is useful for browsing files which would otherwise have very large records if
the newline character is used as the record delimiter.
6-41
Student Notebook
Note
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
The Record Length field can be used when editing a z/OS UNIX file. It allows you to specify
a record length which is used by the editor to load the records from the file into the edit
session as fixed-length records. When the file is saved, it is saved with fixed length
records. So the Record Length field allows you to convert a variable length file to a fixed
length file.
pr
Ex
cl
The value specified in the Record Length field must be able to accommodate the largest
record in the file. If the editor finds a record that is larger than the length specified, an error
message is displayed and the edit session does not proceed.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Other data set name field supports z/OS UNIX path names.
Record Length field used to display and save data for a z/OS UNIX
file data as fixed-length records.
Menu RefList RefMode Utilities Workstation Help
ssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss
View Entry Panel
Command ===>
ISPF Library:
Project . .
Group . . .
Type . . .
Member . .
.
.
.
.
. . .
. . .
. . .
Workstation File:
File Name . .
Initial Macro . .
Profile Name . . .
Format Name . . .
Data Set Password
Record Length . .
.
.
.
.
.
.
.
.
.
.
Options
/ Confirm Cancel/Move/Replace
Browse Mode
View on Workstation
/ Warn on First Data Change
Mixed Mode
View ASCII data
ES1011.0
Notes:
The Edit Entry Panel, displayed via ISPF option 2, is changed to allow a z/OS UNIX file
pathname to be entered in the Other data set name field.
cl
Also the new Record Length field is added to allow a record length to be specified when
editing a z/OS UNIX.
pr
Ex
ISPF normally treats z/OS UNIX file as having variable length records. This field allows you
to specify a record length which is used by the editor to load the records from the file into
the edit session as fixed-length records. When the file is saved it is saved with fixed length
records. So the Record Length field allows you to convert a variable length file to fixed
length.
6-43
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Log on to TSO/E
Issue any TSO cmd
Issue the OMVS cmd
Shell
Become a logged-on
shell user
Run any shell cmd
Escape to TSO mode
ES1011.0
Notes:
cl
A TSO/E user logs on to TSO/E and issues some TSO/E commands or uses the
ISPF/PDF panels to do some work.
The user issues the OMVS command to invoke the UNIX System Services shell.
Ex
After issuing the OMVS command, the TSO/E user becomes a logged on shell user.
The shell user is interactively communicating with the UNIX System Services
environment through the shell and has all the facilities of the shell available.
pr
The user can jump or escape back to TSO/E, run a TSO/E command, and return to the
shell. When jumping back and forth between TSO/E and the shell, the user remains
logged on to both TSO/E and the UNIX System Services environment.
The user issues an exit command to log off from the shell and return to TSO/E.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
awk
cat
cc
cd
cp
date
diff
find
grep
head
kill
ls
mail
man
mkdir
mv
ps
pwd
rm
sort
vi
ES1011.0
Notes:
The UNIX commands and utilities are distributed with the UNIX system. There are over 100
UNIX commands and utilities.
Ex
cl
A command is a UNIX program that is executed in the shell. Commands are sometimes
referred to as tools. For some commands, the shell calls other programs called utilities. For
the user, there is no difference between a command and a utility.
UNIX commands have very short names. This dates back from the time when teletypes
were in use.
pr
UNIX commands are usually very small programs designed to do one simple task.
Commands can be combined together in a shell script, which then becomes a new
powerful command.
6-45
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
MKDIR
MKNOD
MOUNT
OBROWSE
TSO/E
OCOPY
OEDIT
OGET,OGETX
HFS
data set
OPUT,OPUTX
UNMOUNT/
UMOUNT
ISHELL/ISH
ES1011.0
Notes:
There are some TSO/E commands which support the hierarchical files:
pr
Ex
cl
MKDIR creates a new directory, and MKNOD creates a character special file.
OEDIT creates or edits a file using ISPF editor, and OBROWSE browses a file using ISPF.
OCOPY copies a file from HFS to a z/OS data set, copies a z/OS data set to an HFS file,
copies an HFS file to an HFS file, or z/OS data set to z/OS data set.
OGET and OGETX are used to copy HFS files to z/OS data sets.
OPUT and OPUTX are used to copy z/OS data sets to HFS files.
MOUNT and UNMOUNT/UMOUNT are used to mount and unmount hierarchical file
systems.
ISHELL or ISH invoke the UNIX System Services ISPF shell. This is a panel interface
for performing user and administrator tasks.
V8.0
Student Notebook
Uempty
File copy
TSO/E
commands
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
TSO/E
OPUT/OPUTX
HFS files
OCOPY
OGET/OGETX
ES1011.0
Notes:
cl
File copy between z/OS data sets and HFS files can be useful if you need to send and
receive files between z/OS systems, for DFSMS backup and restore of HFS files, or to
copy HFS files to tapes.
Ex
OGET:
OGETX
pr
OPUT
OPUTX
OCOPY
6-47
Student Notebook
Topic summary
Having completed this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
6-49
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Topic objectives
After completing this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
6-51
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Directory
Directory
Directory
Directory
File
File
File
File
Directory
File
File
File
File
File
File
File
File
File
ES1011.0
Notes:
cl
The UNIX System Services file system is hierarchical in structure in the same way as a
UNIX file system. All files are members of a directory, and each directory is in turn a
member of another directory at a higher level in the hierarchy. The highest level in the
hierarchy is called the root directory.
Ex
A directory is a special kind of file which consists of the names of a set of files and other
information about them. Usually the files in a directory are related to each other in some
way. A directory can have subdirectories.
pr
A UNIX System Services user has a directory defined as its home directory. After logon,
the home directory becomes the working directory.
A regular file is a named unit of text or binary data information. A file can, for example, be C
source code, a list of names or places, a printer formatted document, a string of numbers
organized in a certain way, an employee record, or a memo. A user or application must
understand how to access and use the individual increments of data within a file.
V8.0
Student Notebook
Uempty
A file in the hierarchical file system is called an HFS file. HFS files are byte-oriented and
there is no concept of a record structure.
A file system is contained in a z/OS data set type called HFS data set.
The hierarchical file system in UNIX System Services is similar to the file system in DOS
and Windows systems.
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
The z/OS Distributed File Service zSeries File System (zFS) is a z/OS UNIX file system
that can be used like the Hierarchical File System (HFS). zFS file systems contain files and
directories.
6-53
Student Notebook
Users
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Complimentary to HFS
USS
Improved performance
Improved recovery
Other
PFSs
HFS
zFS
HFSVOL
IP sockets,
NFS and so on
zFSVOL
VSAM LDS
ES1011.0
Notes:
zFS is a physical file system (PFS) like HFS. It is not a HFS replacement, it is
complimentary.
Ex
cl
A zFS aggregate is a data set that contains zFS file systems. The aggregate is a VSAM
linear data set (VSAM LDS) and is a container that can contain one or more zFS file
systems.
An aggregate can only have one VSAM LDS, but it can contain an unlimited number of file
systems. The name of the aggregate is the same as the VSAM LDS name.
pr
A zFS aggregate that contains only a single zFS file system can be defined and is called a
compatibility mode aggregate.
Compatibility mode aggregates are more like HFS.
Aggregates that contain multiple file systems are called multi-file system aggregates.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
File types
Directories
Regular files
Named pipes (FIFO)
Character special files
Symbolic links
ES1011.0
Notes:
cl
Regular files
Ex
pr
Users and programs create directories, regular files, pipes, and symbolic links; a system
programmer creates character special files.
6-55
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
smith
jones
jones
smith
progabc ...
projecta ...
ProgABC ...
projectb ...
JCL ...
progabc
projecta
ProgABC
projectb
JCL
ES1011.0
Notes:
cl
A directory is a special kind of file which consists of the names of a set of files and other
information about them. Usually the files in a directory are related to each other in some
way. A directory can have subdirectories.
Ex
A UNIX System Services user has a directory defined as its home directory. After logon,
the home directory becomes the working directory.
pr
A regular file is a named unit of text or binary data information. A file can, for example, be C
source code, a list of names or places, a printer formatted document, a string of numbers
organized in a certain way, an employee record, or a memo. A user or application must
understand how to access and use the individual increments of data within a file.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
SMSVL1
HFS
SMSVL2
Data
set
Data
set
F F F
HFS /
Data set
HFS
F F F
Data set
ES1011.0
Notes:
cl
A hierarchical file system is contained in a data set type called HFS. An HFS data set is a
single volume data set, which means that a file system cannot span more than one
physical DASD volume.
Ex
HFS data sets must be SMS-managed, and they can reside with other z/OS data sets on
SMS-managed volumes.
pr
HFS data sets are PDSE-like data sets. They are allocated like any other z/OS data set.
Although an HFS data set is a z/OS data set, a z/OS OPEN request fails.
6-57
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
SMSVOL
HFS
SMS managed or
non-SMS managed
DSNTYPE=HFS
F F
ES1011.0
Notes:
cl
Ex
Multiple systems can share the data set in a sysplex environment or if the HFS is
mounted in read-only mode on all systems.
HFS data sets can be opened by UNIX System Services z/OS kernel operations, and
some types can be processed by standard z/OS access methods.
pr
HFS data sets can reside on the same volumes as other z/OS data sets.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
D1
D3
HFS
data set
D2
D4
HFS
data set
D5
ES1011.0
Notes:
Ex
cl
z/OS views an entire file system hierarchy as a collection of HFS and or z/OS file system
(zFS) data sets. Each HFS or zFS data set is a mountable file system. Connecting one file
system to another is called mounting. HFS or zFS data sets can be mounted onto each
other in a hierarchy. The root file system is the first file system mounted. Subsequent file
systems can be mounted on any directory within the root file system or on a directory within
any mounted file system.
The place within a file system where another file system is mounted is called a mount point.
A file system can be mounted only in one place at a time.
pr
The command mount is used to mount a file system, and unmount is used for
disconnecting a file system from another. Mount and unmount are authorized commands.
The root file system is the starting point of the overall file system. It consists of the root
directory (/) and related directories and files.
6-59
Student Notebook
The system programmer defines the root file system. The root file system usually contains
system-related files and files that belong to a program product. User files are usually
located in other mountable file systems.
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Altogether, the root file system and mountable file systems contain the file systems used by
shell users and applications.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
bin
dev
etc
usr
tmp
lib
samples
sh
smith
jones
JCL
progabc
projectb
projecta
ProgABC
ES1011.0
Notes:
The set of names required to specify a particular file in a hierarchy of directories is called
the path to the file. The path is specified as a path name.
Ex
cl
pr
A file name can be up to 255 characters long, and can consist of uppercase and lowercase
letters. UNIX System Services is case sensitive, which means a file called ProgABC is
different from progabc. File names can include extensions which identify the contents of a
file, for example, proga.c, and name.lst.
6-61
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
DSCB
A.B.C
pathname
dsname
/a/b/c
A.B.C
//DD1
DD
DSN=A.B.C,DCB=
path=/a/b/c
ES1011.0
Notes:
cl
In z/OS, a data set is identified by a data set name, and if the data set is a PDS or PDSE,
the file has a member name. The characteristics of the data sets, such as DCB (RECFM,
BLKSIZE) information or DSNTYPE, are kept in catalogs or the VTOC. Executable
modules can have multiple names (ALIAS).
pr
Ex
In the hierarchical file system, files are identified by pathnames, which consist of directory
names and the file name. Files can have multiple names created by symbolic links and
hard links. There is no concept of a defined record format or blocksize. An open file gets a
file descriptor which is used as pointer to the file in C programs.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Root /
Master catalog
ALIAS IBMUSER
User catalog
/u/IBMUSER
IBMUSER.C
/u/IBMUSER/c
IBMUSER.C(PGMA)
/u/IBMUSER/c/pgma
IBMUSER
LIST
(SEQ)
C
(PDS)
PGMA
PGMB
IBMUSER
DATA
(VSAM)
list
data
c
pgma pgmb
ES1011.0
Notes:
cl
A traditional z/OS data set can be searched through the catalogs or through the VTOC if
UNIT and VOLSER is specified. The z/OS master catalog contains ALIASes which are
pointers to user catalogs. An ALIAS in the master catalog decides in which user catalog a
data set should be cataloged and where to search for cataloged data sets. The user
catalogs contain a list of data sets and some information about the data sets.
pr
Ex
The POSIX file system is based on the root file system. All files are referenced by a
pathname based on the root directory or relative to a working directory. There is no concept
of catalogs in POSIX. All files are listed in directories, and directories are listed in a
directory on a higher level in the hierarchy.
6-63
Student Notebook
UNIX files
open()
read()
write()
fcntl()
close()
Security through
data set profiles
Permission bits
on each file
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Allocation
OPEN
GET
PUT
ENQ
CLOSE
Deallocation
EXCP
BDAM
BSAM
BPAM
ISAM
VSAM: KSDS, ESDS
Byte stream
file organization
is application
responsibility
ES1011.0
Notes:
cl
z/OS uses an enqueue (ENQ) at allocation of a data set to guarantee data integrity. The
correct disposition must be coded in the JCL or on the ALLOCATE command.
Ex
There are multiple access methods which recognize data set characteristics and
simplify programming.
Hierarchical Files:
pr
XPG4.2 does not have mandatory file locking but uses the concept of advisory locking
to ensure data integrity. The programmer must decide when to use locking. Locking is
done by the fcntl() function and can be used to lock parts of a hierarchical file.
There are no access methods for hierarchical files. A file is a stream of bytes, and the
application programmer defines how to manage the contents of the files.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
HFS CREATION
//FS DD
DSN=TSOJDOE.OMVS.HFS,
//
DISP=(,CATLG),DATACLAS=SPDS,
//
SPACE=(CYL,(80,40,1)),
//
DSNTYPE=HFS
ES1011.0
Notes:
pr
Ex
cl
6-65
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
JCL support
DSNTYPE=HFS|PIPE
PATH=pathname
PATHDISP=(normal-termination-disp,abnormal-term-disp)
PATHMODE=(file-access-attribute,file-acc-attr, . . . )
PATHOPTS=(file-option,file-option,. . . )
ES1011.0
Notes:
One way of using a file in the hierarchical file system is to refer to it by JCL. The following
changes have been made to support hierarchical files:
cl
DSNTYPE=HFS|PIPE
Ex
PATH
pr
PATHDISP
PATHMODE
PATHOPTS
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
OMVS.VOS3RS1.ROOT
ES1011.0
Notes:
This shows an example of how to allocate an HFS data set for the root file system.
The important JCL keyword here is DSNTYPE=HFS.
pr
Ex
cl
Note that an HFS can be either SMS or non SMS managed, but must be cataloged for the
mount to succeed.
6-67
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
The IOEAGFMT utility is used to format an existing VSAM LDS as a zFS aggregate. All zFS
aggregates must be formatted before use (including HFS compatibility mode aggregates).
pr
Ex
cl
IOEAGFMT does not require the zFS physical file system to be active on the system. The
size of the aggregate is as many as 8 KB blocks and fits in the primary allocation of the
VSAM LDS. To extend it to its secondary allocation (assuming it has a secondary
allocation), use the zfsadm grow command.
V8.0
Student Notebook
Uempty
JCL example
JOB (XX,YY,ZZ),MSGCLASS=H,CLASS=A,
MSGLEVEL=(1,1)
EXEC PGM=IEWBLINK,
PARM='LIST,REUS,RENT,LET,CASE=MIXED'
DD *
DD DSN=POSIX.LOADLIB,DISP=SHR
DD PATH='/u/posix/llib',
PATHOPTS=(OWRONLY,OCREAT,OTRUNC),
PATHMODE=(SIRWXU,SIRWXG,SIRWXO)
//SYSLIN
DD *
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
//LINK
//
//LKED
//
//SYSPRINT
//INLIB
//*
//SYSLMOD
//
//
INCLUDE INLIB(PAYRLL)
ENTRY CEESTART
NAME payrll(R)
/*
ES1011.0
Notes:
This JCL example shows a program in an z/OS data set being relinked to reside in the
hierarchical file system.
Ex
cl
PATH defines the path name of the directory where the program payroll will reside when
link-edited. The path name is in lowercase letters and therefore enclosed by single
quotes.
PATHOPTS:
pr
PATHMODE:
- SIRWXU specifies that the file owner has read, write, and execute permission.
- SIRWXG specifies that file group has read, write, and execute permission.
- SIRWXO specifies that all other users have read, write, and execute permission.
6-69
Student Notebook
Topic summary
Having completed this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
Uempty
6-71
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Topic objectives
After completing this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
6-73
Student Notebook
after fork()
PID 20
PID 20
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
PID 18
after exec()
Program A
Program A
...
fork()
...
exec(progB,...
...
...
...
fork()
...
exec(progB,...
...
...
Parent
process
Child
process
Program B
.....
.....
.....
.....
.....
Child
process
ES1011.0
Notes:
Processes are used in UNIX to allocate resources to users and programs. They are
equivalent to address spaces in z/OS.
Ex
cl
pr
The fork() system call creates a new process with identical characteristics as the process
that issued the fork(). The new process is called the child process, and the process that
created it is called the parent process. After the fork(), the two processes are running
exactly the same program. However, the return code from the fork() is different for the
parent and child. The two processes also have different process IDs. The child inherits the
file descriptors of the parent process, which means it has access to the same files,
including pipes, as its parent.
The exec() system call is used to start a new program in a process. The sequence of fork()
followed by exec() is used very often in UNIX to create a new process and start a new
program.
6-74 z/OS Fundamentals
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
C language program
open()
close()
read()
write()
fcntl()
fopen()
fclose()
fread()
fwrite()
z/OS data
sets
HFS files
ES1011.0
Notes:
cl
The ANSI C standard defines the functions fopen(), fclose(), fread(), and fwrite() to access
files. This enables C language programs to access z/OS data sets. These functions are
included in the POSIX standard, and, with UNIX System Services, they can be used to
access hierarchical files as well.
Ex
The POSIX/XPG4.2 standard also provides the I/O functions open(), close(), read(), write(),
and fcntl() for accessing hierarchical files.
pr
open() or
fopen()
read() or
fread()
fcntl()
write() or
fwrite()
close() or
fclose()
Used to lock out other users from a part of a file, so that the user can
read or write to that part of the file without interference from others.
Writes a given number of bytes to a file.
Closes a file.
6-75
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
OS/2
z/OS
UNIX
TCP/IP
network
z/OS DS
DFSMS
NFS server
HFS
files
UNIX system
services
OS/390
z/OS DS
z/OS
NFS client
NFS server
ES1011.0
Notes:
cl
Network File System (NFS) is the most widely used solution for distributed files in a
network. The DFSMS Network File System Server (NFSS) feature implements the NFS
protocols of SUN Microsystems, Inc.
Ex
NFSS enables the host processor to act as a file server to authorized NFS clients in a
TCP/IP network. NFSS allows remote access to data on the z/OS host from workstations,
personal computers, or any other system in the network that is using NFS client software. A
client system can be OS/2, DOS, AIX/2, AIX/6000, AIX/ESA, SUN/OS 3 and 4, any UNIX
system with NFS client software, and z/OS.
pr
The NFS server allows access to z/OS data sets and HFS files on the z/OS host as if they
were local files on the client system. A workstation can mount a part of the hierarchical file
system on the local file system (LFS), and thereafter create, delete, read, write, and
otherwise treat that part of the file system as an extension to the local file system.
z/OS can be an NFS client. The NFS client support can be used to access data on another
system. This facility can be used to share HFS file systems between multiple z/OS
processors.
6-76 z/OS Fundamentals
V8.0
Student Notebook
Uempty
UNIX pipes
Process
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Process
open()
write()
Named
pipe (FIFO)
Unnamed
pipe
read()
open()
read()
pipe()
write()
ES1011.0
Notes:
cl
Pipes are used to communicate an array of data between processes. Conceptually, pipes
are like a sequential file, and one process can write to the pipe while another process will
read from the pipe. There are two types of pipes: unnamed pipes and FIFO (named) pipes.
Ex
Unnamed pipes (also referred to as just pipes) are defined by a pseudo-device type,
and the pipes are buffered in memory by the pipe device driver. Unnamed pipes have
the restriction that they can only be used by processes which have the same parent
process. The pipe system call is used to invoke an unnamed pipe. Processes use read
and write system calls to access the data in a pipe.
pr
FIFO (named) pipes have names and reside in the UNIX file system. Because of this
they can be used for communication between any two processes. A FIFO pipe must be
opened by the open system call. Only one process can access a FIFO pipe for reading
or writing at a time.
6-77
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
BPXBATCH SH rm
-ir /u/smith/testdir/dbtest.c
or
ES1011.0
Notes:
pr
Ex
cl
The BPXBATCH utility provides support to run shell scripts or UNIX System Services
application programs as z/OS batch jobs. BPXBATCH can be invoked in the following ways:
By JCL as a z/OS batch job.
As a command in TSO/E: BPXBATCH SH shell_command to run shell commands or
scripts, or BPXBATCH PGM pgm_name to run C executable files.
From within a REXX exec to run shell commands or C executable files.
Invoked by the REXX exec OSHELL to run non-interactive shell commands from the
TSO/E READY prompt.
UNIX System Services C programs require that stdin, stdout, and stderr be defined. Many
C functions also use this to define input and output. For BPXBATCH, the default for sdtin
and stdout is /dev/null, and stderr is the same as stdout. This can be changed to file
names by using the DD names STDIN, STDOUT, and STDERR. When using BPXBATCH to
run shell commands in batch, redirection can be used, for example, BPXBATCH SH ps
-el >>/tmp/ps.out.
Environment variables can be specified by using the STDENV DD card, which can point to a
hierarchical file, a z/OS data set, or the variables can be defined in JCL as in-stream data.
6-78 z/OS Fundamentals
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Standard input
//'full.PDS.name(member)'
//'full.dataset.name'
ES1011.0
Notes:
cl
The JCL itself still follows all JES conventions, including line limits of 71 characters.
Ex
Multiple jobs can be submitted from one file, however, only the last jobID will be
displayed.
Data sets should not contain ANSI control characters.
pr
file2.jcl | submit
JOB32497 submitted
JOB32499 submitted
JOB32504 submitted
file1.jcl - file3.jcl
from path 'file1.jcl'
from stdin
from path 'file2.jcl'
Unit 6. Working with UNIX System Services
6-79
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Shell
commands
read
stdin
fd=0
write
write
stderr
fd=2
stdout
fd=1
ES1011.0
Notes:
cl
Standard input
Ex
Standard output
pr
Standard error
A shell user can redirect the input, output, and error files.
To redirect output to a file, enter >filename at the end of a command, for example,
sort -u file1 >outfile. If the file does not exist, it is created, and if it does exist,
the output writes over any information in the file. If >>filename is specified, output is
appended to the existing file.
6-80 z/OS Fundamentals
V8.0
Student Notebook
Uempty
A command which normally takes input from the keyboard can be redirected to take
input from a file. For example, mailx DEEJ <file where file is input to command
mailx and is sent to the user DEEJ.
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Error messages can be redirected from the screen to a file using 2> (2 is the file
descriptor). For example, sort -u >file1 2>errfile directs the output from the
sort to file1 and the error messages to errfile.
6-81
Student Notebook
Activity
Shell environment
Shell scripts
and REXX
ISPF
Editing
ed/sed/vi/ispf
SDSF
Job control
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Background job
Submit job
Editing
Character conversion
DFSMShsm
TSM
Data management
command and
CONVERT chcp
ES1011.0
Notes:
cl
Ex
Hierarchical files can be edited from z/OS using ISPF menus. The ISPF menus can be
invoked by the TSO commands OEDIT/OBROWSE. In the shell, the ed editor can be
used to edit HFS files.
pr
In z/OS, SDSF is used to monitor and control batch jobs. The TSO/E commands
STATUS, CANCEL, and OUTPUT can also be used. In the shell, there are multiple
commands to control jobs: ps, jobs, kill, fg, bg, and wait.
Background jobs are submitted with the TSO/E command SUBMIT in a z/OS
environment. In the shell, a command ended with an ampersand (&) runs in the
background.
V8.0
Student Notebook
Uempty
What is a socket?
Socket
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
IP address,Port ID
Application
A
Port
2001
Port
21
Application
A
Application
B
Port 2002
Port
623
Application
B
Application
C
Port 2003
Port 1003
Application
C
Application
D
Port 2004
Port 1004
Application
D
IP address
9.12.1.38
TCP/IP
TCP/IP
IP address
9.12.13.69
ES1011.0
Notes:
cl
In TCP/IP, sockets are used as communication end-points. A socket has a name and a
network address. Sockets allow a program to communicate with another program across a
TCP/IP network using file-like semantics.
Ex
A system connected to a TCP/IP network is identified by its Internet address. The Internet
address is a unique 32-bit address consisting of a network number and a local address.
Internet addresses are represented in dotted-decimal notation.
pr
A program accesses a socket by using functions like read(), write() and close() in the same
way as I/O accesses to a hierarchical file. However, communicating in a network is more
complex than dealing with file I/O. Because of this, the network I/O operations do not use
the same I/O functions as used for files. When a socket is created, an integer called a
socket descriptor (sd) is returned. The sd is used by the application to reference the socket.
Copyright IBM Corp. 2001, 2013
6-83
Student Notebook
Sockets example
Server
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
socket()
Client
bind()
socket()
listen()
accept()
connect()
TCP/IP
connection
write()
read()
read()
write()
close()
close()
ES1011.0
Notes:
cl
1. Both the client and the server program use the socket() function to create a socket
returning socket descriptor.
2. bind() assigns a name to a socket and makes it known in the network.
Ex
3. The server uses the listen() function to show that it is willing to receive communication.
The bind() call defines the size of the queue for incoming requests.
pr
4. The client uses the connect() function to initiate a connection to the server. On a
successful return, the client socket is associated with the server.
5. The server uses the accept() function to accept a connection request. The server
creates a new socket which is connected to the client socket. The original server socket
is available to receive requests from other clients.
6. The write() function sends data from the client to the server.
7. The server uses the read() function to receive data from the client.
6-84 z/OS Fundamentals
V8.0
Student Notebook
Uempty
8. The server uses the write() function to send data to the client.
9. The client uses the read() function to receive data from the server.
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
10. The close() function ends the conversation between the client and the server. Both the
client and server must terminate their session.
6-85
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Security
uid=0
uid=0
uid=45
uid=60
ES1011.0
Notes:
Security in a UNIX system is based on file access security, data encryption, and user logon
security.
Ex
cl
UNIX files and directories are protected by permission bits. Access is granted on three
levels: owner, group, and world. World is all users in the system. Owner and group are
defined when a file is created, and it can be changed by commands later. Users with
common access permissions can be gathered in a group. File permission is defined for
read, write, and execute access. The system checks a user's user ID for permission to
access a file or directory.
pr
UNIX has two categories of users: user and superuser. Users must use a password to log
in to a UNIX system. The users are defined in a file called /etc/passwd. The superuser
bypasses all security checking and has access to all files. Only the superuser can perform
authorized functions or commands, such as mounting a file system.
V8.0
Student Notebook
Uempty
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Group=sys
GID=0
Smith
UID=0
Jones
UID=0
Brown
UID=10
Greene
UID=35
White
UID=45
BPX.SUPERUSER
Greene
White
SU
Superusers
Greene
UID=0
White
UID=0
ES1011.0
Notes.
There are two categories of UNIX System Services shell users: superuser and user.
cl
The superuser has special authority to perform certain tasks such as mounting and
unmounting a file system. The superuser can also access all UNIX System Services
services and all files in the hierarchical file system.
Ex
UNIX System Services users have a numerical user identifier. The superuser has a UID=0,
while all other users have UIDs between 1 and 2147483647. The UNIX System Services
users are z/OS users defined to SecureWay Security Server RACF with a new user
segment containing their:
pr
6-87
Student Notebook
All users should have a unique UID, although multiple users with the same UID are
supported. Superusers should have their own UID and then they can switch into superuser
status when they need to perform authorized functions.
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
UNIX System Services users belong to groups similar to z/OS groups in SecureWay
Security Server RACF. The z/OS groups defined in SecureWay Security Server RACF can
be defined as UNIX System Services groups by adding a group identifier number (GID).
V8.0
Student Notebook
Uempty
File security
UNIX System
Services
RACF
UID=103
GID=42
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
n()
ope
Verify
UID/GID
UID=103
GID=42
es s
Ac c
OK
Check file
permission bits
/usr/lib/lib.a
UID=75 GID=42
Hierarchical
file system
ES1011.0
Notes:
pr
Ex
cl
In UNIX System Services, each user has a user ID (UID) and a group ID (GID). When a
user creates a directory or a file, it is automatically associated with the user's UID, and the
GID is set to the GID of the parent directory. A user's UID and GID can be defined in
SecureWay Security Server RACF or an equivalent security product. The system verifies
that a user or a program has access to a file by comparing the UID and GID in SecureWay
Security Server RACF with the definitions in the hierarchical file system. There are three
classes of users:
Owner: The user's UID must match the UID for the file.
Group: A member of any group whose GID matches the GID of the file.
Other: Anyone else.
Access to files and directories is controlled by permission bits. Each file gets its permission
bits set when it is created. The permission bits can be changed by the chmod command.
There are three types of permissions that can be granted the owner, group, and others:
read: notated by r
write: notated by w
execute: notated by x
Copyright IBM Corp. 2001, 2013
6-89
Student Notebook
Permission bits
Files
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Directories
Read or print
contents of file
Change/add/delete
contents of file
Read
Write
Change/add/delete
entries in directory
Execute
Execute file
Search a directory
ES1011.0
Notes:
The permission bits have different meanings when related to files and directories, as this
chart shows.
Ex
cl
If you want to put a new file in a directory, you need both search and write access to the
directory. The system needs to search the directory to determine if the entry is already
there.
pr
As you create files and directories, there are default permission bits defined. These differ
depending on the method used to create the entity.
V8.0
Student Notebook
Uempty
Topic summary
Having completed this topic, you should be able to:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
6-91
Student Notebook
Checkpoint (1 of 3)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
UNIX Call
b.
c.
ISHELL
OMVS
d.
TSOSTART
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Checkpoint (2 of 3)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
rlogin
ishell
telnet
mkdir
PIPE
File
Directory
HFS data set
ES1011.0
pr
Ex
cl
Notes:
6-93
Student Notebook
Checkpoint (3 of 3)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
b. Index
c. Map
d. Regular file
9. The two categories of UNIX System Services shell users are (blank).
(Mark all that apply.)
a. Privileged users
b. Superusers
c. Users
d. Regular users
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
Uempty
Exercise
ISHELL and hierarchical file system
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Tasks:
1. Log on to TSO.
2. Invoke the ISHELL.
3. Display directories and
files.
4. Create new files and
customize the ISHELL
screen.
5. Log off.
ES1011.0
pr
Ex
cl
Notes:
6-95
Student Notebook
Unit summary
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Checkpoint solutions (1 of 3)
OS/400
UNIX
Windows NT
zLinux
z/OS
cl
a.
b.
c.
d.
e.
f.
pr
Ex
AP
A-1
Student Notebook
Checkpoint solutions (2 of 3)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
A-2
z/OS Fundamentals
V8.0
Student Notebook
Checkpoint solutions (3 of 3)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
cl
pr
Ex
AP
A-3
Student Notebook
1.
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Checkpoint solutions (1 of 2)
Which one of the following is not a major task of the Security Server RACF?
a.
b.
c.
d.
e.
Administration
2.
3.
True or False: Security Server RACF protects data sets with generic and discrete
profiles. If a data set does not have a discrete profile, a generic profile protect s it.
The answer is false. It is protected only if a generic profile is defined or
PROTECTALL is on.
True or False: If the universal access authority (UACC) PROTECTALL entry in a
user's profile is set to Control or higher, the user has full access to all resources.
The answer is false; data set profile, not user.
pr
Ex
cl
A-4
z/OS Fundamentals
V8.0
Student Notebook
Checkpoint solutions (2 of 2)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
b. TSO commands
c. Point-and-shoot
d. Option numbers
cl
pr
Ex
AP
A-5
Student Notebook
1.
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Checkpoint solutions (1 of 3)
Which are the standards for naming partition data sets? (Mark all that
apply.)
a.
b.
c.
d.
The answers are simple names connected with periods, simple name must
be eight characters in length, and data set names can have up to 22
qualifiers.
2.
3.
Directories
Members
Characters
Partitions
pr
Ex
cl
A-6
z/OS Fundamentals
V8.0
Student Notebook
Checkpoint solutions (2 of 3)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Set of characteristics that define the way you can edit a data set
Description of the ISPF user
Definition of the way you can edit a data set
Definition of the data attributes
The answer is set of characteristics that define the way you can edit a
data set.
5. True or False: In edit mode, to scroll up and down use F10 and F11.
The answer is false.
cl
pr
Ex
AP
A-7
Student Notebook
Checkpoint solutions (3 of 3)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
7. The prefix area is the six-digit field at the beginning of each line. It is
used to process so-called line commands.
a.
b.
c.
d.
Procedures
Clist
Shell scripts
Line commands
8. True or False: CUT and PASTE is used to copy lines from one member
or data set to another.
The answer is true.
9. To browse the contents of a member prior to making any selection,
use which line command?
a.
b.
c.
d.
s
b
r
e
The answer is b.
pr
Ex
cl
A-8
z/OS Fundamentals
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Checkpoint solutions
4. Text messages can be sent to other TSO users using the SEND
command.
a.
b.
c.
d.
TRANSMIT
CALL
SEND
MESSAGE
cl
pr
Ex
AP
A-9
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Checkpoint solutions (1 of 4)
Input phase
Conversion phase
Linking phase
Execution phase
Output phase
Purge phase
3. True or False: During the conversion phase, the JCL of any called
procedure is added to the jobs JCL. The result is called external text.
The answer is false. (Reference conversion phase visual.)
pr
Ex
cl
V8.0
Student Notebook
Checkpoint solutions (2 of 4)
4.
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
a.
b.
c.
The answer is both contains frequently used JCL statements and to enable
procedures to be imbedded in a job through a JCL procedure call. A procedure
library contains frequently used JCL statements stored as procedures. The JCL of
these procedures can be imbedded in a job through a procedure call. (Reference
conversion phase visual.)
5.
True or False: The job processing phases are also referred to as job steps.
The answer is false. (Reference general layout of a job visual.)
6.
The answer is no, the job card is not correct. EDUCATION exceeds the limit of
eight characters for name fields. MSGLEVEL=(/)must be specified as
MSGLEVEL=(1,1). No comma after MSGCLASS=T, as the job card does not
continue. (Reference name field visual).
cl
pr
Ex
AP
A-11
Student Notebook
Checkpoint solutions (3 of 4)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
pr
Ex
cl
V8.0
Student Notebook
Checkpoint solution (4 of 4)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
8. Which JCL statement allows to define and describe a jobs input and
output data?
a.
b.
c.
d.
EXEC
JOB
DD
IF/THEN/ELSE/ENDIF
EXEC
JOB
DD
IF/THEN/ELSE/ENDIF
cl
pr
Ex
AP
A-13
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Checkpoint solutions (1 of 3)
2. What are the two TSO commands that invoke a UNIX shell? (Mark all
that apply.)
a.
b.
c.
d.
UNIX Call
ISHELL
OMVS
TSOSTART
pr
Ex
cl
V8.0
Student Notebook
Checkpoint solutions (2 of 3)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
rlogin
ishell
telnet
mkdir
PIPE
File
Directory
HFS data set
cl
pr
Ex
AP
A-15
Student Notebook
Checkpoint solutions (3 of 3)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Pipe
Index
Map
Regular file
Privileged users
Superusers
Users
Regular users
pr
Ex
cl
V8.0
Student Notebook
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
You will also learn more about the BookManager product and the lookat facility.
pr
Ex
AP
B-1
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Settings
View
Edit
Utilities
Foreground
Batch
Command
Dialog Test
LM Facility
Classes
ITS Menu
ITS Schedule
SDSF
SCLM
Workplace
ISHELL
OpenEdition Shell
8
SDSF defaultsSyslog Display and Search Facility
Enter X to Terminate using log/list
9
A
B
G
H
R
W
SMP/E
APPC
OMVS
Bookshelves
HCD
RMF
WLM
ES1011.0
Notes:
pr
Ex
cl
On our system (ESSMVS1), the option to select Bookmanager on the primary option is:
E.G (E= ITS menu, then G=BookManager/Read).
B-2
z/OS Fundamentals
V8.0
Student Notebook
AP
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Always up to date
ES1011.0
Notes:
pr
Ex
cl
B-3
Student Notebook
Softcopy information
http://www.s390.ibm.com/os390
ffffkjfjkfjfkdkfsdfdsfdfsd
ffffkjfjkfjfkdkfsdfdsfdfsd
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ffffkjfjkfjfkdkfsdfdsfdfsd
ffffkjfjkfjfkdkfsdfdsfdfsd
ffffkjfjkfjfkdkfsdfdsfdfsd
ffffkjfjkfjfkdkfsdfdsfdfsd
ffffkjfjkfjfkdkfsdfdsfdfsd
View
Internet
z/OS
IBM
z/OS
Home
Page
View
Load
System
Information
Library
z/OS
Hypertext linking
ES1011.0
pr
Ex
cl
Notes:
B-4
z/OS Fundamentals
V8.0
Student Notebook
AP
Softcopy publications
FRONT_2.2
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
The following table lists books that contain information related to the
information in this book.
When this book references information in other books, the softcopy version
of the book title is used. The following table shows the softcopy titles,
complete titles, and order numbers of the books you might need while you
are using this book.
Books
Help Number
Short Title Used
in GoTo
This Search
TitleNotes Services Options Order
-----------------------------------------------------------------------Book
z/OS
MVS
and Tuning
z/OS
MVS
and Tuning
z/OS
MVS
z/OS
Guide
MVS
Command
===> __________________________________________
Initialization
OS/390 MVS Initialization
SC28-1751SCROLL ===> PAGE
Linked
close Guide
this book to return.
Guide to another book;
and Tuning
CONTENTS Table of Contents
Copyright IBM Corp. 1988, 2006
Topic
lines 1 to 34 of 97
Initialization
OS/390 MVS Initialization
SC28-1752
COVER
Book and
Cover
Reference
Tuning Reference
NOTICES
Notices
EDITION
Notice
JCL Reference Edition
OS/390
MVS JCL Reference
GC28-1757
CONTENTS
Table of Contents
FIGURES
Figures
JCL User's
OS/390 MVS JCL User's
GC28-1758
FRONT_1
Notices
Guide
FRONT_1.1
Programming Interface Information
FRONT_1.2
Trademarks
PREFACE
About This Book
PREFACE.1
Who Should Use This Book
PREFACE.2
Where to Find More Information
PREFACE.3
Elements and Features in z/OS
CHANGES
Summary of Changes
1.0
Chapter 1. Storage Management Overview
1.1
Initialization Process
1.1.1
System Address Space Creation
ES1011.0
Notes:
pr
Ex
cl
B-5
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Softcopy print
z/OS softcopy
print
Subset of:
ES1011.0
Notes:
pr
Ex
cl
BookManager allows you to print part or all of a book, and a series of services are
provided.
B-6
z/OS Fundamentals
V8.0
Student Notebook
AP
Bookshelves
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
pr
Ex
cl
B-7
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Table of contents
Chapters
Bibliography
Index
ES1011.0
pr
Ex
cl
Notes:
B-8
z/OS Fundamentals
V8.0
Student Notebook
AP
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
B-9
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
View additional information for words in the text (for example, a word's
definition in the glossary).
Change the appearance of a book on your screen using color and
highlighting.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
AP
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
B-11
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
AP
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Open a book.
Set display, search, print, edit, and copy options for books.
ES1011.0
pr
Ex
cl
Notes:
B-13
Student Notebook
Using panels
Each BookManager READ panel contains several areas:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
An action bar
A scroll field
A command line
A status line
You can select any action bar item by placing the cursor on the
item and pressing Enter. Additional choices for Action bar
items are displayed in pull-down menus.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
AP
Utilities
Compilers
Options
Status
Help
-----------------------------------------------------------------------------Location
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Settings
User ID . : TSOFT98
View
Time. . . : 10:20
Edit
Terminal. : 3278
Utilities
Screen. . : 1
Foreground
Language. : ENGLISH
Batch
Appl ID . : ISR
Command
Dialog Test
LM Facility
System ID : MVS1
Classes
ITS Menu
ITS Schedule
ITS schedules
SD SDSF
10 SCLM
11 Workplace
ES1011.0
Notes:
pr
Ex
cl
The MOP CLP system (ESSMVS1) has BookManager on a subordinate panel. (E;G)
B-15
Student Notebook
Go to BookManager in ISPF
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
IPCS
RACF
ISMF
ISHELL
SDSF
SMP/E
APPC
OMVS
Bookshelves
HCD
RMF
WLM
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
AP
Copyright notice
BookManager(*) READ/MVS Release 3.0
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F2=Split
F3=Exit
F9=Swap
F12=Cancel
ES1011.0
Notes:
We are IN.
pr
Ex
cl
B-17
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
__
__
__
__
__
__
__
__
__
__
__
__
__
__
__
__
__
__
Shelf Name
EZ2VM11B
EZ2VM21B
EZ2VM306
EZ2ZO10K
EZ2ZO20E
AITS
IPH0BK06
EZ2VMS33
EOXEOY07
DFHPUSH0
IGYSH208
IGYSH210
DM1SH000
DMTSH000
HA3BKS10
DB2BS001
DSNSHH10
DSNSHJ10
Shelves 1 to 22 of 170
Description
All-VM Disc 1 Bookshelf (z/VM V4R4, System Control)
All-VM Disc 2 Bookshelf (Software Products)
All-VM Disc 3 Bookshelf (z/VM V3R1, z/VM V4R2, z/VM V4R3)
All-z/OS Disc 1 Bookshelf (V1R9.0 Base Elements, Optional Featur
All-z/OS Disc 2 Bookshelf (V1R9.0 Base Elements and Optional Fea
An ITS Install
AnyNet Workstation Products
Booklet for VM Collection, August 2003 Bookshelf
BookManager READ/MVS and BUILD/MVS V1.3.0
CICS Transaction Server for z/OS 2.2
COBOL for OS/390 & VM V2.1 (VisualAge)
COBOL for OS/390 & VM V2.2
Data Management Tools for DB2 March 2002
Data Management Tools for OS/390
Data Stream and Object Architectures
DB2 Administration Tools
DB2 UDB for OS/390 and z/OS V7
DB2 UDB for z/OS V8 Licensed
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
AP
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
B-19
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
AP
Select a bookshelf
Books View Options Help
------------------------------------------------------------------------------
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
__
__
__
/_
__
__
__
__
__
__
__
__
__
__
__
__
__
__
Shelf Name
EZ2VM11B
EZ2VM21B
EZ2VM306
EZ2ZO10K
EZ2ZO20E
AITS
IPH0BK06
EZ2VMS33
EOXEOY07
DFHPUSH0
IGYSH208
IGYSH210
DM1SH000
DMTSH000
HA3BKS10
DB2BS001
DSNSHH10
DSNSHJ10
Shelves 1 to 22 of 170
Description
All-VM Disc 1 Bookshelf (z/VM V4R4, System Control)
All-VM Disc 2 Bookshelf (Software Products)
All-VM Disc 3 Bookshelf (z/VM V3R1, z/VM V4R2, z/VM V4R3)
All-z/OS Disc 1 Bookshelf (V1R9.0 Base Elements, Optional Featu
All-z/OS Disc 2 Bookshelf (V1R9.0 Base Elements and Optional Fe
An ITS Install
AnyNet Workstation Products
Booklet for VM Collection, August 2003 Bookshelf
BookManager READ/MVS and BUILD/MVS V1.3.0
CICS Transaction Server for z/OS 2.2
COBOL for OS/390 & VM V2.1 (VisualAge)
COBOL for OS/390 & VM V2.2
Data Management Tools for DB2 March 2002
Data Management Tools for OS/390
Data Stream and Object Architectures
DB2 Administration Tools
DB2 UDB for OS/390 and z/OS V7
DB2 UDB for z/OS V8 Licensed
ES1011.0
pr
Ex
cl
Notes:
B-21
Student Notebook
Bookshelf displayed
Books View Search Group Options Help
------------------------------------------------------------------------------
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
__
__
__
__
__
__
__
__
__
__
__
__
__
__
__
__
__
__
Book Name
DGT2J103
DGT2E100
IEA2UN71
BPXBB100
FCXD2A00
DGT2M510
EUVA2A00
EUVA3A00
EUVA4A00
EUVA5A00
EUVA6A00
EUVA7A00
EUVA8A00
EUVA1A00
EUVA9A00
EUVB4A00
EUVB1A00
IEA2I810
Book
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
Books 1 to 21 of 296
Title
Date
DFSMS Software Support for IBM System Storage TS 06/10/24
DFSMS Software Support for IBM TotalStorage Tape 02/06/28
Support for Unicode: Using Unicode Services
08/01/18
V1R1.0 C Curses
01/01/19
V1R1.0 Distributed File Service Customization
02/01/13
V1R1.0 Distributed FileManager Guide and Referen 05/07/15
V1R1.0 DCE Administration Guide
01/01/19
V1R1.0 DCE App Dev Gde: Core Comp
01/01/15
V1R1.0 DCE App Dev Gde: Dir Svces
01/01/19
V1R1.0 DCE App Dev Gde: Intro & Style
01/01/15
V1R1.0 DCE App Dev Ref Vols 1 & 2
01/01/15
V1R1.0 DCE Command Reference
01/01/12
V1R1.0 DCE Configuring and Getting Started
01/01/12
V1R1.0 DCE Introduction
01/01/12
V1R1.0 DCE Messages and Codes
01/01/12
V1R1.0 DCE Planning
01/01/12
V1R1.0 DCE User's Guide
01/01/12
V1R1.0 MVS JES Common Coupling Services
06/06/20
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
AP
Book selected
Books View Search Group Options Help
------------------------------------------------------------------------------
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
__
__
__
__
__
__
__
__
/_
__
__
__
__
__
__
__
__
__
Book Name
IEA2G281
IEA2M181
IEA2MA81
IEA2M281
IEA2M381
IEA2M481
IEA2M581
IEA2M681
IEA2M781
IEA2M881
IEA2M981
IEA2F250
CDSA1A10
E0Z1P160
GSKA1A50
CBCMG160
CBCLR170
CBCDG150
Book
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
z/OS
Title
V1R9.0
V1R9.0
V1R9.0
V1R9.0
V1R9.0
V1R9.0
V1R9.0
V1R9.0
V1R9.0
V1R9.0
V1R9.0
V1R9.0
V1R9.0
V1R9.0
V1R9.0
V1R9.0
V1R9.0
V1R9.0
ES1011.0
pr
Ex
cl
Notes:
B-23
Student Notebook
Book displayed
Books GoTo Search Notes Services Options Help
------------------------------------------------------------------------------
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Table of Contents
COVER
NOTICES
EDITION
CONTENTS
PREFACE
PREFACE.1
PREFACE.2
PREFACE.3
PREFACE.3.1
PREFACE.3.2
PREFACE.3.3
PREFACE.3.4
CHANGES
1.0
1.1
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5
1.1.6
1.2
1.2.1
F1=Help
F7=Bkwd
Book Cover
Notices
Edition Notice
Table of Contents
About this document
Who should use these MVS System Messages documents
How to use these documents
Where to find more information
Where to find the most current message information
Information updates on the web
Using LookAt to look up message explanations
Using IBM Health Checker for z/OS
Summary of changes
Chapter 1. Introduction
Message format
Format of the message body
Messages sent to MCS/SMCS consoles
Messages sent to hardcopy log in JES2 system
Messages sent to hardcopy log in JES3 system
Messages sent to the job log, to other data sets, and to dis
Truncated data in multi-line messages
Message description
Description items
F2=Split
F3=Exit
F4=Unlink
F5=Notes
F6=Review
F8=Fwd
F9=Swap
F10=Actions F11=Retrieve F12=Cancel
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
AP
Scroll down
Books GoTo Search Notes Services Options Help
------------------------------------------------------------------------------
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Table of Contents
1.2.2
1.2.3
1.3
1.4
1.4.1
1.4.2
1.4.3
1.5
1.6
2.0
3.0
4.0
A.0
A.1
A.2
A.3
BACK_1
BACK_1.1
BACK_2
COMMENTS
F1=Help
F7=Bkwd
Routing codes
Descriptor codes
Message directory
Building your own message library
Basic documents
Optional documents
CD-ROM collection
Translating messages
Finding changes to system message texts
Chapter 2. IEB Messages
Chapter 3. IEC Messages
Chapter 4. IEE Messages
Appendix A. Accessibility
Using assistive technologies
Keyboard navigation of the user interface
z/OS information
Notices
Trademarks
Communicating Your Comments to IBM
Reader's Comments -- We'd Like to Hear from You
F2=Split
F8=Fwd
F3=Exit
F9=Swap
F4=Unlink
F10=Actions
F5=Notes
F6=Review
F11=Retrieve F12=Cancel
ES1011.0
pr
Ex
cl
Notes:
B-25
Student Notebook
Cursor select
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Table of Contents
1.2.2
1.2.3
1.3
1.4
1.4.1
1.4.2
1.4.3
1.5
1.6
2.0
3.0
4.0
A.0
A.1
A.2
A.3
BACK_1
BACK_1.1
BACK_2
COMMENTS
Routing codes
Descriptor codes
Message directory
Building your own message library
Basic documents
Optional documents
CD-ROM collection
Translating messages
Finding changes to system message texts
Chapter 2. IEB Messages
Chapter 3. IEC Messages
Chapter 4. IEE Messages
Appendix A. Accessibility
Using assistive technologies
Keyboard navigation of the user interface
z/OS information
Notices
Trademarks
Communicating Your Comments to IBM
Reader's Comments -- We'd Like to Hear from You
ES1011.0
Notes:
pr
Ex
cl
V8.0
Student Notebook
AP
Topic displayed
Books GoTo Search Notes Services Options Help
------------------------------------------------------------------------------
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Chapter 2.
IEB Messages
Subtopics
2.1 IEBA01I
2.2 IEBA02I
2.3 IEBA03I
2.4 IEBA04I
2.5 IEBA05I
2.6 IEBA06I
2.7 IEBA07I
2.8 IEBA08I
2.9 IEBA09I
2.10 IEBA10I
2.11 IEBA11I
2.12 IEBA12I
2.13 IEBA13I
2.14 IEBA14I
2.15 IEBA15I
2.16 IEBA16I
2.17 IEBA17I
2.18 IEBA18I
2.19 IEBA19I
2.20 IEBA20I
2.21 IEBA21I
F1=Help
F2=Split
F7=Bkwd
F8=Fwd
F3=Exit
F9=Swap
F4=Unlink
F10=Actions
F5=Notes
F6=Review
F11=Retrieve F12=Cancel
ES1011.0
pr
Ex
cl
Notes:
B-27
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
pr
Ex
cl
Move your cursor to the action bar choice, and press Enter.
V8.0
Student Notebook
AP
Select exit (1 of 2)
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F1=Help
F7=Bkwd
F2=Split
F8=Fwd
F3=Exit
F9=Swap
F4=Unlink
F10=Actions
F5=Notes
F6=Review
F11=Retrieve F12=Cancel
ES1011.0
pr
Ex
cl
Notes:
B-29
Student Notebook
Select exit (2 of 2)
Books GoTo Search Notes Services Options Help
------------------------------------------------------------------------------
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
F2=Split
F8=Fwd
F3=Exit
F9=Swap
F4=Unlink
F10=Actions
F5=Notes
F6=Review
F11=Retrieve F12=Cancel
ES1011.0
pr
Ex
cl
Notes:
V8.0
Student Notebook
AP
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
z/OS basics
Application development basics
Systems programmer basics
Networking basics
Security basics
Security basics
http://publib.boulder.ibm.com/infocenter/zos/basics/index.jsp
ES1011.0
Notes:
cl
With the Information Center, users can view, browse, and search online information. The
Information Center is built upon open source software developed by the Eclipse Project
(www.eclipse.org). It can display content that has been packaged as an Eclipse
documentation plug-in.
Ex
The Information Center uses an embedded web application server to handle content
requests in the system. This embedded web server uses a random port to avoid port
conflicts between applications.
pr
Product or application developers can create their own documentation plug-ins and
integrate them in the information center for viewing by their users. To learn about creating
and packaging documentation plug-ins, see the Eclipse Project's website: www.eclipse.org.
B-31
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
ES1011.0
Notes:
Ex
cl
Application Programming: Introduce the tools and utilities for developing a simple
program to run on z/OS. The topics that follow guide the student through the process of
application design, choosing a programming language, and using a runtime environment.
Networking on z/OS: In this course, we use simplified examples and focus mainly on
basic system functions. Hands-on exercises are provided throughout the course to help
students explore the mainframe style of computing.
pr
V8.0
Student Notebook
z/OS Security: In this part, we examine the mechanisms in z/OS that provide security for
its users and applications.
Systems Programming on z/OS: In this part, we reveal the inner workings of z/OS with
discussions of system libraries, change management, and procedures for starting (IPLing)
and stopping a z/OS system. This part also includes topics on hardware details and
virtualization, and the clustering of multiple z/OS systems in a sysplex.
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
The Introduction to JCL course consists of several units to help you learn about and use
JCL on the job.
pr
Ex
AP
B-33
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Go to ibm.com/software/info/education/assistant/.
Click on Systems and Servers.
ES1011.0
Notes:
cl
Ex
Clicking the z/OS IEA link will take you to the z/OS IEA web site, select z/OS operating
systems.
http://publib.boulder.ibm.com/infocenter/ieduasst/stgv1r0/topic/com.ibm.iea.zos/zos_cover
page.html
pr
V8.0
Student Notebook
AP
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
http://www-03.ibm.com/systems/z/os/zos/bkserv/
ES1011.0
Notes:
cl
z/OS Library Centers have been replaced by z/OS Information Centers starting with z/OS
V1R11. Information Centers are indexed by Google and other search engines which make
finding z/OS documentation even easier.
Ex
Internet Library
and LibraryCenter
http://www-03.ibm.com/systems/z/os/zos/bkserv
http://www-03.ibm.com/systems/z/os/zos/bkserv/lookat
Softcopy Website
http://www.ibm.com/servers/eserver/zseries/softcopy
Softcopy Reader
V3.7 for Windows
http://www.ibm.com/software/office/bkmgr/softcopyread.html
pr
LookAt
Softcopy
Reader V3.7
for Linux
http://www.ibm.com/support/docviewss?doc=4000251&org=SW&rs=4
B-35
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
http://www-03.ibm.com/systems/z/os/zos/bkserv/lookat/
ES1011.0
Notes:
cl
LookAt is an online facility that allows you to look up explanations for z/OS messages,
system abends, and some codes. Using LookAt to find information is faster than a
conventional search because in most cases LookAt goes directly to the message
explanation.
Ex
http://www.ibm.com/servers/eserver/zseries/zos/bkserv/lookat/lookat.html
or from anywhere in z/OS where you can access a TSO command line (for example, TSO
prompt, ISPF, z/OS UNIX System Services running OMVS).
pr
Why LookAt?
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
cl
pr
Ex
AP
B-37
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
IMS?
IEA200I ???
CICS
DB2
Explanation: During
system initialization, the
system could not use a
data set member that
was to contain an
alternate version of the
master scheduler JCL.
IEA200I
LookAt
ES1011.0
Notes:
pr
Ex
cl
V8.0
Student Notebook
AP
Exercise
Tasks:
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
1. Log on to TSO
2. In the BookManager online
manuals, read:
3. Log off
ES1011.0
pr
Ex
cl
Notes:
B-39
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
V8.0
Student Notebook
Bibliography
Booklets:
None.
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Manuals:
GA22-7502
GA22-7504
SA22-7500
SA22-7597
SA22-7598
SA22-7535
SA22-7551
SA22-7661
SA22-7784
SA22-7787
SA22-7782
GC35-0033
SA22-7832
SA22-7670
SC26-7527
SC26-7409
SA22-7643
SC26-7414
SC26-7410
SC34-4822
SC34-4823
SC34-4820
SA22-7801
cl
SC26-7397
pr
Ex
bibl
Bibliography
X-1
Student Notebook
SC38-2034
SA22-7637
SA22-7638
SA22-7626
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
SA22-7806
Technical Bulletins:
SG24-7516
SG24-7832
SG24-7333
SG24-6366
SG24-7834
SG24-7832
SG24-7833
SG24-5444
Web URLs:
http://www.ibm.com/systems/z/os/zos/
General Q & A
http://www.ibm.com/systems/z/faq/
http://www.ibm.com/systems/z/os/zos/zos_sods.html
http://www.ibm.com/systems/z/os/zos/bkserv/
cl
Ex
http://publib.boulder.ibm.com/infocenter/zos/v1r12/index.jsp
pr
http://www-03.ibm.com/systems/z/os/zos/bkserv/v1r12b
ooks.html
X-2
z/OS Fundamentals
V8.0
Student Notebook
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
http://www.ibm.com/services/learning
z/OS downloads
http://www.ibm.com/servers/eserver/zseries/zos/downloads/
CustomPac
http://www.ibm.com/ca/custompac
ShopzSeries
http://www.ibm.com/software/shopzseries
http://www.ibm.com/software/network/commserver/zos/
ibm.com/servers/eserver/zseries/zos/bkserv/hot_topics.html
cl
Hot Topics
pr
Ex
bibl
Bibliography
X-3
pr
Ex
cl
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
Student Notebook
X-4
z/OS Fundamentals
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
backpg
pr
cl
Ex
V8.0
Back page
pr
u
oy si
ec vo
to fo
C rm
.F a
.T ci
.I. n
C
.
cl
Ex
CONTACTO
Telfono
91 761 21 78
Pngase en contacto con nuestro equipo y le
informaremos de cualquier duda o cuestin
que pueda surgirle.
Email
formacion@arrowecs.es
Mndenos un email y le atenderemos
enseguida.
Online
@Arrow_Edu_ES
O bien puede contactarnos a travs de
nuestro perfil en Twitter.
Vistenos
Arrow ECS Education Services
Avenida de Europa 21,
Parque Empresarial La Moraleja
28108 Alcobendas, Madrid
EDUCATION
S