Introduction to Mainframe Networking TCP/IP Problem Determination

Total Page:16

File Type:pdf, Size:1020Kb

Introduction to Mainframe Networking TCP/IP Problem Determination z/OS Basic Skills Information Center Networking on z/OS z/OS Basic Skills Information Center Networking on z/OS Note Before using this information and the product it supports, read the information in “Notices” on page 251. This edition applies to z/OS (product number 5694-A01). We appreciate your comments about this publication. Comment on specific errors or omissions, accuracy, organization, subject matter, or completeness of this book. The comments you send should pertain to only the information in this manual or product and the way in which the information is presented. For technical questions and information about products and prices, please contact your IBM branch office, your IBM business partner, or your authorized remarketer. When you send comments to IBM, you grant IBM a nonexclusive right to use or distribute your comments in any way it believes appropriate without incurring any obligation to you. IBM or any other organizations will only use the personal information that you supply to contact you about the issues that you state on this form. Send your comments through this web site: http://publib.boulder.ibm.com/infocenter/zoslnctr/v1r7/index.jsp?topic=/com.ibm.zcontact.doc/webqs.html © Copyright IBM Corporation 2006, 2010. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Before you begin the topic about Coupling channels ...........40 networking on z/OS .........vii Open Systems Adapter (OSA) .......40 HiperSockets ..............46 The I/O cage ..............48 Part 1. Introduction to networking on the mainframe...........1 Chapter 4. Sample network configuration ............49 Chapter 1. Mainframes and networks . 3 Requirements for a mainframe network .....49 Mainframes, networks, and you ........3 Example: the ZOS Company data center.....49 Networks and online systems.........4 Key mainframe network availability aspects . 52 Why are networks important? ........6 Hardware availability ..........53 Examples of mainframe-based networks .....6 Software availability ..........54 Technology choices abound in network technology 7 Who supports the network? .........8 Part 2. TCP/IP implementation on What are the basic elements of a network? ....9 Overview of mainframe network capabilities . 9 the mainframe ...........55 z/OS Communications Server .......11 SNA and TCP/IP on z/OS ........12 Chapter 5. TCP/IP on z/OS ......57 Security in a network ...........13 The TCP/IP daemon ...........57 Data protection in a mainframe network....13 The TCP/IP profile ............58 Availability of a mainframe network .....14 TCP/IP Profile statements ........59 The FTP server .............64 Chapter 2. Network layers and The telnet daemon ............67 protocols review ..........15 A good resolver is hard to find ........68 Networking terminology ..........15 How an application searches for resolver Network layers ............15 configuration information ........69 Physical media, layer 1 ..........16 The multi-stack environment .......72 Network interface card (NIC) .......16 TCP/IP clients .............72 Data link layer, layer 2 ..........17 Ethernet ..............17 Chapter 6. TCP/IP in a sysplex ....75 Media access control (MAC) addressing ....19 Computer cluster ............75 Network layer, layer 3 ...........19 The z/OS sysplex ............75 Address Resolution Protocol (ARP) .....20 Cross-system Coupling Facility (XCF) ....76 Network types ............20 Workload Manager (WLM) ........76 Virtual LAN .............22 Dynamic virtual addressing .........77 Network routing............22 Unique application-instance DVIPA .....77 Routing tables and protocols .......24 Multiple application-instance DVIPA .....80 Internet Control Message Protocol (ICMP) and Dynamic cross-system coupling........81 other layer 3 protocols..........26 Sysplex distributor ............83 Transport layer, layer 4 ..........27 Sysplex distributor roles .........84 Transmission Control Protocol (TCP) .....27 TCP/IP definitions for sysplex distributor . 85 User Datagram Protocol (UDP) .......29 How work can be distributed to the network . 90 Sockets ...............29 Problem detection and recovery in the cluster . 91 Network applications ...........29 The routing function in a sysplex .......91 Network security ............30 Network interface card .........94 Systems Network Architecture (SNA)......31 Part 3. SNA and SNA/IP Chapter 3. Hardware connectivity on implementation on the mainframe . 97 the mainframe ...........33 Channel subsystem (CSS)..........33 Chapter 7. Systems Network The mainframe channel subsystem and network links.................35 Architecture - basics and Hardware channels ............37 implementation ...........99 Channel command word (CCW) channels . 37 What is Systems Network Architecture (SNA)? . 99 © Copyright IBM Corp. 2006, 2010 iii The evolution of SNA ..........101 DLSw configuration ..........163 Subarea networking ...........102 Enterprise Extender ...........163 SNA nodes .............103 Why does Enterprise Extender use UDP System services control point (SSCP) ....105 packets? ..............166 Subareas and domains .........105 Class of service (CoS) and type of service (ToS) 167 Connecting subarea nodes ........106 EE implementation in non-z/OS remote sites 168 Architectural components of the SNA network . 108 Internet connectivity exploitation and Enterprise Path information unit (PIU).........111 Extender ..............169 How LU-LU sessions are initiated .....112 A comparison of Enterprise Extender and DLSw 169 Class of service (CoS)..........114 Enterprise Extender implementation......170 VTAM subarea definitions .........114 SNA/IP configuration examples .......172 VTAM start options ..........115 Enterprise Extender configuration .....173 VTAM configuration lists ........116 Extended border node configuration.....177 How VTAM resources are defined .....116 Cisco SNASw definitions ........178 Sift-down effect............118 Sample VTAM network .........118 Chapter 10. TN3270 Enhanced ....181 Introduction to the 3270 terminal .......181 Chapter 8. SNA Advanced 3270 data stream ...........182 Peer-to-Peer Networking (APPN) . 121 TN3270 Enhanced (TN3270E) ........184 Introduction to APPN ..........121 Telnet protocol and SNA meet.......184 Advanced Program-to Program TN3270E description ..........185 Communications (APPC) ........122 Additional TN3270E functions supported in Advanced Peer-to-Peer Networking (APPN) . 122 z/OS ...............186 APPC versus APPN ..........122 Where to place a TN3270E server.......187 APPN node types ............123 TN3270E server implementation .......188 Low-entry networking (LEN) nodes .....124 TELNETPARMS statement block ......188 End nodes (EN) ...........125 BEGINVTAM statement block .......190 Network nodes (NN) ..........125 VTAM setup for TN3270E server ......191 Specialized network node types ......127 Specialized VTAM Nodes ........129 Part 4. Network operations and Control point (CP-CP) sessions .......132 administration ..........193 APPN databases ............133 Topology database (TOPO DB) ......134 Directory services database (DS DB) .....135 Chapter 11. Network operational tasks 195 APPN network topology .........135 Network startup ............195 Topology data update (TDU) flows .....135 VTAM startup ............196 How directory services locate resources in TCP/IP startup............197 APPN ...............138 How the network is stopped ........198 Route calculation in APPN ........143 z/OS network administrator tasks ......199 Transmission group (TG) characteristics . 143 Examples of managing VTAM .......200 Class of service (CoS)..........144 Examples of managing TCP/IP ......203 High performance routing (HPR) .......145 Examples of controlling TCP/IP applications 207 Rapid transport protocol (RTP) ......146 Network environment documentation .....210 Automatic network routing (ANR) .....147 HPR headers ............148 Chapter 12. Network security ....213 Path switching ............149 About security .............213 Connection networks ...........149 TCP/IP security ............214 Dependent LU requester/server (DLUR/DLUS) 151 Industry standard network security features . 215 Defining a VTAM APPN network ......153 TCP/IP on z/OS security features .....220 Defining data sets and VTAM startup JCL. 153 TN3270 security ............224 Creating definitions in ATCSTRxx .....153 SNA security .............225 Defining VTAM major nodes .......154 Chapter 13. Network problem Chapter 9. SNA/IP implementation . 155 determination ...........227 Background on SNA/IP implementation ....155 Determining the network problem ......227 DLSw and Logical Link Control 2 (LLC2) ....157 Network tools and diagnostic aids ......228 How an LLC2 connection is established over a Common (z/OS-wide) tools and diagnostic aids 228 LAN...............157 VTAM tools and diagnostic aids ......231 Data link switching (DLSw) .......158 TCP/IP tools and diagnostic aids......235 How SDLC devices are connected using DLSw 159 VTAM problem determination........239 iv Introduction to Mainframe Networking TCP/IP problem determination .......241 Notices ..............251 Communications Storage Manager (CSM) ....244 Programming interface information ......252 Debugging CSM ...........244 Trademarks ..............253 Commands used to monitor CSM .....245 Network performance and tuning ......246 Related publications ........255 Part 5. Appendixes ........249 Contents v vi Introduction to Mainframe Networking Before you begin
Recommended publications
  • Operator's Guide for IBM 3270 Information Display Systems
    GA27-2742-1 Operator's Guide for IBM 3270 Information Systems Display Systems i i Second Edition (July, 1972) This is a major revision of GA27-2742-0 and incorporates Technical Newsletter GN31-3001. Operating instructions for the printer and operator identification card reader have been added. Comments and corrections have been incorporated throughout the manual. Any system changes affecting this publication will be reported in subsequent revisions or Technical Newsletters. Additional copies of this manual can be obtained through IBM branch offices. Text for this publication has been prepared with the IBM SE LECTR IC ® Composer. A form is provided at the back of this publication for reader's comments. If the form has been removed, comments may be addressed to: IBM Systems Development Division, Product Publications, Dept. 520, Neighborhood Road, Kingston, N.V., 12401 © Copyright International Business Machines Corporation, 1971, 1972 Contents iii Table of Contents First Words to the Operator Qu ick Reference . 3 Operating the 3270* . 4 Introduction to Display Station Operation 5 Operator Controls 7,8 The Display Image 8 Indicators . 15-19 Keyboards 20 Typewriter Keyboard* ............... 24 I Data Entry Keyboard* ............... 44 I Operator Console Keyboard* . 62 I ·" Printer Operation * . 76 I,.~' , Operator Identification Card Reader . 88 I A Typical Job . · 90 Correcting Operator Errors . 90 Trouble with Your Machine · 92 Operator Trouble Report 92 Extras for the 3270* . .100 Selector Pen . · 101 Secu rity Key Lock .105 Audible Alarm . .106 Numeric Lock Feature .109 Understanding the 3270* .. 110 Data Processing · 111 Display Stations .. · 114 The IBM 3270 Information Display System · 115 ) Index · 119 *The complete table of contents for each section is on the first page of that section.
    [Show full text]
  • User's Guide and Reference for IBM Z/OS® Remote Access Programs August 2, 2021
    User's Guide and Reference for IBM z/OS® Remote Access Programs August 2, 2021 International Business Machines Corporation IBM Z Dallas ISV Center Dallas, TX USA This document is intended for the sole use of participants in an IBM Z Dallas ISV Center Remote Development or Early Test Program and is not to be distributed to non-participants or used for purposes other than intended. © Copyright International Business Machines Corporation 2019. All rights reserved. 1 Table of Contents 1 Preface .................................................................................................................................................... 4 1.1 Links ................................................................................................................................................. 4 2 Overview – Remote Access Environment ........................................................................................... 5 2.1 Hardware / Software Platform .......................................................................................................... 5 2.2 Introduction to the Virtual Machine Concept ................................................................................... 5 2.3 z/OS Remote Access Environment ................................................................................................... 5 2.4 Printers .............................................................................................................................................. 7 2.5 System Availability..........................................................................................................................
    [Show full text]
  • Configuring TN3270 C H a P T E R
    CHAPTER 13 Configuring TN3270 IBM 3270 display terminals are among the computing community’s most widely implemented and emulated for host-based computing. Information in this chapter will help you understand the TN3270 terminal emulation environment, and how to use and create files that will allow terminals connected to the communication servers to be used for TN3270 operation. For a complete description of the commands in this chapter, see the Communication Server Command Reference publication. Cisco’s Implementation of TN3270 The TN3270 terminal emulation software is based on software developed at the University of California, Berkeley. This software allows any terminal to be used as an IBM 3270-type terminal. Users with non-3270 terminals can take advantage of the emulation capabilities to perform the functions of an IBM 3270-type terminal. Specifically, Cisco’s implementation supports emulation of an IBM 3278-2 terminal providing an 80 by 24 display. True IBM 3270-type terminals use a character format referred to as extended binary-coded decimal interchange code (EBCDIC). EBCDIC consists of 8-bit coded characters and was originally developed by IBM. Emulation is made possible by termcap and curses functions developed by Berkeley UNIX system developers. These functions translate the keyboard and terminal characteristics for ASCII-type terminals into those expected by an IBM host. ASCII characters are listed in the “ASCII Character Set” appendix in the Communication Server Command Reference publication. Formally, a termcap is a two-part terminal-handling mechanism. It consists of a database and a subroutine library. The database describes the capabilities of each terminal to be supported; the subroutine library allows programs to query the database and to make use of the values it contains.
    [Show full text]
  • Acrobat Distiller, Job 2
    A BRIEF HISTORY OF THE IBM ES/9000, SYSTEM/390 AND zSERIES 1990 IBM makes its most comprehensive product announcement in 25 years by introducing the System/390 family consisting of 18 Enterprise System/9000 processors ranging from midrange computers for office environments to the most powerful computers IBM has ever offered. Featuring enhanced function and capability to manage information systems, the System/390 provides increased processing power, better network management, improved communication among multivendor systems and the Enterprise System/9000 processors. In many cases, customers currently using IBM Enterprise System/3090 systems can easily upgrade their systems to System/390 processors. Other 1990 announcements include: several networking products to make it easier for customers to use their midrange, desktop and System/390 computers to communicate with non-IBM computers. 1991 IBM unveils seven new Enterprise System/9000 processors and operating system software — Advanced Interactive Executive/Enterprise System Architecture (AIX/ESA) — for the System/390 family. AIX/ESA is a further step in IBM’s implementation of open-systems computing across its product line and is based on UNIX and the Open Software Foundation’s OSF/1 standards. The company begins shipping in volume and on schedule two top-of-the-line ES/9000 models that were announced in September 1990. IBM Japan says it will supply Enterprise System/9000 processors and operating system software to Mitsubishi Electric Corp. for remarketing. The agreement marks the first time IBM has sold large processors as an original equipment manufacturer for resale. 1992 IBM introduces two entry-level Enterprise System/9000 processors and ships five new Enterprise System/9000 water-cooled processors — Models 520, 640, 660, 740 and 860 — one-to-four months ahead of schedule.
    [Show full text]
  • IBM Zenterprise BC12 (Zbc12) Enabling Enterprises of All Sizes to Build a Better Customer Experience with IBM Z Systems
    IBM Systems and Technology Data Sheet IBM zEnterprise BC12 (zBC12) Enabling enterprises of all sizes to build a better customer experience with IBM z Systems Organizations around the world are recognizing the increasing role that Highlights technology plays in driving change as they shift investments from infra- structure maintenance towards new projects, such as cloud, data analytics ●● ●●Delivers increased performance, flexibility and mobile applications. To remain competitive, they must constantly and scale in a lower cost package adapt and respond with increased speed to deliver new services through ●● ●●Helps save money through consolidation multiple channels to customers, partners and employees. To capitalize on Linux® and an efficient cloud delivery on this opportunity, organizations must be able to tap into their valuable model data and energize applications without going over budget while keeping ●● ●●Enables workloads to be deployed where everything protected and secure to reduce organizational and reputation they run best and cost less with proven risk. This requires an optimized infrastructure that is integrated, agile, hybrid computing trusted and secure. ●● ●●Lets you secure it all with confidence on a trusted and resilient infrastructure The newest member of the IBM® zEnterprise® System family is the IBM zEnterprise BC12 (zBC12). Designed as an entry point for enterprise computing it embodies the same innovation and value, flexible growth options, industry-leading virtualization, trusted resiliency, secure cloud, enterprise mobility and operational analytics capabilities as the massively scalable IBM zEnterprise EC12. The zBC12 delivers a lower and more granular cost structure with significant improvements in pack- aging, performance and total system scalability over prior generations.
    [Show full text]
  • Data Stream Programmer's Reference ------,------3270 Information ------ .-- Display System
    ----- - --- 3270 Information ---- - - --- --------- Display System Data Stream Programmer's Reference -------,----- - --- 3270 Information - - - --- -------_.-- Display System Data Stream Programmer's Reference GA23-0059-4 File Number 8360/8370/53/4300/8100-30 Fifth Edition (December 1988) This publication introduces and explains the functions of the 3270 Information Display System data stream. Changes are continually made to the information herein; before using this publication in connection with the operation of IBM systems, refer to the latest IBM System/360 or System 1370 SRL Newsletter for the editions that are applicable and current. It is possible that this material may contain reference to, or information about, IBM products (machines and programs), programming, or services that are not announced in your country. Such references or information must not be construed to mean that IBM intends to announce such IBM products, programming, or services in your country. The names and addresses used in the examples that appear in this manual are fictitious, and any similarity to the names and addresses of actual persons is entirely coincidental. Publications are not stocked at the address given below; requests for IBM publications should be made to your IBM representative or to the IBM branch office serving your locality. A form for readers' comments is provided at the back of this publication. Address additional comments to IBM Corporation, Communication Products Information Development, Department E02, PO Box 12195, Research Triangle Park, North Carolina, U.S.A. 27709. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation whatever. You may, of course, continue to use the information you supply.
    [Show full text]
  • Rising IBM Mainframe Software Costs
    Rising IBM Mainframe Software Costs By Kim A. Eckert, Certified IT Architect Rising IBM mainframe software costs started getting the attention of high level executives some years ago. This was partially due to realizing the software inventories analysis was inefficient and limited. In addition, a third party company was hired to review IBM Strategic Outsourcing (SO) account’s inventory. In other words, IBM was paying "green" dollars to save "blue" dollars! In order for the team to become competitive and provide extra value to our Integrated Technology Delivery (ITD) accounts, I architected an automated system that merged data from several sources and made it easy for the technical support teams to verify the inventory. Once the reports were produced, my team would analyze the data and make recommendations for cost take out opportunities. There were several issues surrounding software licensing and validation: 1. IBM only had tools that would report on what was installed on a customer’s machine then that output would be matched up to what was actually licensed. This approach had benefits as in ensuring they are paying for what they use, but did not do the opposite - ensuring they are actually using what they are paying for. 2. The only place to find where a product was superseded by another was either Announcement letters or the Dawn report web page. The Dawn report lists all monthly license type software and their replacement if available. For example, it would show 5647-A01 OS/390 is replaced by 5694-A01 z/OS. 3. End of Support information was only available through Announcement letters or the Lifecycle Support web page.
    [Show full text]
  • BALOO's BUGLE Volume 16, Number 10 "Make No Small Plans
    BALOO'S BUGLE Volume 16, Number 10 "Make no small plans. They have no magic to stir men's blood and probably will not themselves be realized." D. Burnham May 2010 Cub Scout Roundtable June 2010 Cub Scout Theme HOOP-DE-DOO Tiger Cub Activities Webelos Traveler and Handyman FOCUS COMMISSIONER’S CORNER Cub Scout Roundtable Leaders’ Guide Jump ball! Free throw! This month, Cub Scouts will have opportunities to play basketball and learn about sportsmanship. Invite a Boy Scout who is a member of his school's basketball team to teach the boys the rules of the game. Hold a pack basketball tournament, making sure to balance out the teams with older and younger boys. It's a The Boys' Life reading Contest is back!!! See information good time to start working on the Basketball belt loop and in Special Opportunities pin. Play other games with hoops. Months with similar themes to CORE VALUES Hoop-Dee-Do Cub Scout Roundtable Leaders’ Guide Dave D. in Illinois Some of the purposes of Cub Scouting developed through September 1939 was the very first month Cub Scouting this month’s theme are: used themes to provide program focus. CD Sportsmanship & Fitness, Cub Scouts will develop Month Year Theme better sportsmanship while playing games with others Name in the den and pack. September 1939 Cub Olympics Personal Achievement, Cub Scouts will feel a sense August 1945 Sports of accomplishment as they demonstrate their new August 1950 Cub Scout Olympics skills on the court. Respectful Relationships, Through interactive August 1953 Sports Carnival games, Cub Scouts' ability to get along and play with August 1956 Cub Scout Field Day others will be strengthened.
    [Show full text]
  • Oracle® Database Gateway for APPC Installation and Configuration Guide
    Oracle® Database Gateway for APPC Installation and Configuration Guide 19c for IBM AIX on POWER Systems (64-Bit), Linux x86-64, Oracle Solaris on SPARC (64-Bit), and HP- UX Itanium F18241-01 April 2019 Oracle Database Gateway for APPC Installation and Configuration Guide, 19c for IBM AIX on POWER Systems (64-Bit), Linux x86-64, Oracle Solaris on SPARC (64-Bit), and HP-UX Itanium F18241-01 Copyright © 2002, 2019, Oracle and/or its affiliates. All rights reserved. Primary Author: Rhonda Day Contributing Authors: Vira Goorah, Govind Lakkoju, Peter Wong, Juan Pablo Ahues-Vasquez, Peter Castro, Charles Benet This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S.
    [Show full text]
  • Audit Report No.: 2007-DP-0004
    Issue Date February 22, 2007 Audit Report Number 2007-DP-0004 TO: Lisa Schlosser, Chief Information Officer, Q Joseph A. Neurauter, Chief Procurement Officer, N Keith A. Nelson, Assistant Secretary, Administration, A FROM: Hanh Do, Director, Information Systems Audit Division, GAA SUBJECT: Fiscal Year 2006 Review of Information Systems Controls in Support of the Financial Statements Audit HIGHLIGHTS What We Audited and Why We reviewed general and application controls for selected information systems to assess management controls over HUD’s computing environments as part of the Office of Inspector General’s (OIG) audit of the U.S. Department of Housing and Urban Development’s (HUD) financial statements for fiscal year 2006 under the Chief Financial Officer’s Act of 1990. What We Found HUD did not ensure that its general and application controls over its financial systems conformed to federal requirements and guidelines. Proper configuration management controls for software and document changes are not always employed, and access controls and support for the IBM mainframe operating system console are inadequate. Physical security controls over computing operations facilities are weak, and personnel security practices continue to pose the risk of unauthorized access to HUD systems. As a result, HUD’s financial systems are at risk of compromise. What We Recommend We recommend that the chief information officer, chief procurement officer, and assistant secretary for the Office of Administration ensure that Office of Management and Budget requirements, Federal Information Security Management Act requirements, National Institute of Standards and Technology guidelines, and HUD’s own internal policies and procedures are implemented. For each recommendation without a management decision, please respond and provide status reports in accordance with HUD Handbook 2000.06, REV-3.
    [Show full text]
  • Kindle / Juggling for Beginners: 25+ Tricks to Astound Your Friends
    NK0AJFTA6X ~ Juggling for Beginners: 25+ Tricks to Astound Your Friends ~ PDF Juggling for Beginners: 25+ Tricks to A stound Y our Friends By Cassandra Beckerman Sterling Publishing Co Inc, United States, 2012. Kit. Condition: New. Language: English . Brand New Book. 1 - 2 - 3 balls in the air: now you re juggling! The complete and colorful guide in this cool kit walks you through the essentials--and you won t believe the incredible moves you can learn using the three deluxe balls that are also included. Soon you ll look like an expert at Over the Top, Columns, The Shower, The Claw, and other awesome tricks. Kit includes: - 64-page paperback - 3 juggling balls. READ ONLINE [ 5.47 MB ] Reviews This book is fantastic. This is certainly for all those who statte there had not been a really worth reading. It is extremely diicult to leave it before concluding, once you begin to read the book. -- Prof. Dale Fahey MD This ebook is wonderful. It generally fails to price too much. Your lifestyle period will be transform as soon as you comprehensive reading this ebook. -- Otho Bergstrom V4JTF9GDRC # Juggling for Beginners: 25+ Tricks to Astound Your Friends / Kindle Oth er eBooks Funny Poem Book For Kids - Cat Dog Humor Books Unicorn Humor Just Really Big Jerks Series - 3 in 1 Compilation Of Volume 1 2 3 CreateSpace Independent Publishing Platform. Paperback. Book Condition: New. This item is printed on demand. Paperback. 132 pages. Dimensions: 9.0in. x 6.0in. x 0.3in.LIMITED-TIME SPECIAL: Special Bonus Inside! Thats right. For a limited time you can download a FREE audiobook version..
    [Show full text]
  • Print Services Facility for Z/OS Version 4, Release 6.0
    Print Services Facility for z/OS Version 4, Release 6.0 Introduction IBM G550-0430-05 Note Before using this information and the product it supports, read the information in “Notices” on page 31. This edition applies to the IBM Print Services Facility Version 4 Release 6 Modification 0 for z/OS, Program Number 5655- M32, and to all subsequent releases and modifications until otherwise indicated in new editions. This edition replaces G550-0430-04. © Copyright International Business Machines Corporation 1999, 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures........................................................................................................ v List of Tables........................................................................................................vii About this publication...........................................................................................ix Who should read this publication............................................................................................................... ix How this publication is organized............................................................................................................... ix Related information.....................................................................................................................................ix How to send your comments to IBM.......................................................................xi
    [Show full text]