28.2.2Managing Display Consoles . . . . . . . . . . . . . . . . . . . . . . . 444

28.2.3Extended MCS Consoles . . . . . . . . . . . . . . . . . . . . . . . . . 445

28.2.4 Understanding Message Formats and Replies . . . . . . . . . . . . 446

28.3Controlling the OS/390 System . . . . . . . . . . . . . . . . . . . . . . . . 447

28.3.1Starting the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447

28.3.2Displaying System Status . . . . . . . . . . . . . . . . . . . . . . . . . 447

28.3.3Stopping the System . . . . . . . . . . . . . . . . . . . . . . . . . . . 448

28.4Controlling Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448

28.4.1Displaying the Status of Devices . . . . . . . . . . . . . . . . . . . . 448

28.4.2Understanding Device Allocation . . . . . . . . . . . . . . . . . . . . 448

28.4.3JES2 Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449

28.4.4SDSF Device Panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449

28.5 Controlling TSO Users, Jobs and Started Tasks . . . . . . . . . . . . . . 449

28.5.1Displaying Work on Your System . . . . . . . . . . . . . . . . . . . . 449

28.5.2Controlling Time Sharing Users . . . . . . . . . . . . . . . . . . . . . 451

28.5.3Controlling Batch Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . 451

28.5.4Controlling Started Tasks . . . . . . . . . . . . . . . . . . . . . . . . . 451

28.6Managing Remote Operations . . . . . . . . . . . . . . . . . . . . . . . . 452

28.6.1JES2 RJE Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . 452

28.6.2NJE Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453

Chapter 29. Orientation for Utilities . . . . . . . . . . . . . . . . . . . . . . . . 455

29.1IEBxxx or IEHxxx . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455

29.2IEBCOPY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455

29.3IDCAMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455

29.4IEBGENER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455

29.5DFSMSdss . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456

Chapter 30. Systems Management Philosophy and Methodology

457

30.1 The Philosophy of Systems Management

457

30.1.1Systems Management Overview . . . . . . . . . . . . . . . . . . . . 457

30.1.2Systems Management Scope - What Needs to be Managed? . . . 459

30.1.3The Role of Automation . . . . . . . . . . . . . . . . . . . . . . . . . . 460

30.2Change Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460

30.2.1Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460

30.2.2Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460

30.2.3Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461

30.3Problem Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461

30.3.1Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461

30.3.2Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462

30.3.3Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462

30.4Performance Management . . . . . . . . . . . . . . . . . . . . . . . . . . 463

30.4.1Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463

30.4.2Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463

30.4.3Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464

30.5Operations Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465

30.5.1Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465

30.5.2Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465

30.5.3Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466

30.6Security Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468

30.6.1Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468

30.6.2Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468

30.6.3Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

30.7Configuration Management . . . . . . . . . . . . . . . . . . . . . . . . . . 469

30.7.1Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

Contents xiii

Page 15
Image 15
IBM OS/390 manual Understanding Message Formats and Replies, Systems Management Philosophy and Methodology

OS/390 specifications

IBM OS/390, a versatile operating system, was a cornerstone in enterprise environments and played a pivotal role in mainframe computing. Released in the mid-1990s, OS/390 combined the strengths of IBM's MVS (Multiple Virtual Storage) with new features and enhancements, targeting scalability, reliability, and performance in demanding business applications.

One of the key features of OS/390 was its robust support for multiple users and processes. The system allowed thousands of concurrent users to access applications and data, ensuring high availability and minimizing downtime—a critical requirement for many large organizations. This scalability was supported through various enhancements in memory management and processor scheduling, enabling optimal resource allocation across diverse workloads.

OS/390 was known for its superior workload management capabilities. The Workload Manager (WLM) component allowed administrators to define service policies, specifying how system resources would be allocated according to the priority of tasks. This ensured that critical business processes received the necessary resources while less critical tasks were managed more flexibly.

Another significant characteristic of OS/390 was its commitment to security. The operating system provided comprehensive security features, including user authentication, data encryption, and auditing capabilities. This focus on security was vital for organizations handling sensitive data, ensuring compliance with regulations and safeguarding against unauthorized access.

OS/390 also supported advanced technologies that facilitated integration and development. The system included features like the IBM CICS (Customer Information Control System) for transaction processing and IMS (Information Management System) for database management. These technologies allowed organizations to build robust, high-performance applications tailored to specific business needs.

The ease of network integration was another strength of OS/390. With the advent of the Internet and global connectivity, OS/390 systems could easily interface with various network protocols, enabling businesses to operate in a connected world. This inclusion paved the way for many organizations to expand their capabilities and offer new services, driving digital transformation.

In conclusion, IBM OS/390 represented a significant advancement in mainframe technology, combining scalability, security, and robust workload management. Its rich feature set and support for critical enterprise applications solidified its role as a vital component of many organizations' IT infrastructures, ensuring they could meet their operational challenges head-on while supporting future growth. As technology continues to evolve, the legacy of OS/390 remains influential in the realm of computing.