Introduction to the New Mainframe: Z/OS Basics Access
Total Page:16
File Type:pdf, Size:1020Kb
Glossary of terms and abbreviations This glossary defines technical terms and abbreviations used in the z/OS® Basic Skills Information Center. If you do not find the term you are looking for, refer to the IBM® Glossary of Computing Terms, available from: http://www.ibm.com/ibm/terminology. The following cross-references are used in this glossary: Contrast with: This refers to a term that has an opposed or substantively different meaning. See: This refers the reader to (a) a related term, (b) a term that is the expanded form of an abbreviation or acronym, or (c) a synonym or more preferred term. Synonym for: This indicates that the term has the same meaning as a preferred term, which is defined in its proper place in the glossary. Synonymous with: This is a reference from a defined term to all other terms that have the same meaning. Obsolete term for: This indicates that the term should not be used and refers the reader to the preferred term. This glossary includes terms and definitions from American National Standard Dictionary for Information Systems, ANSI X3.172-1990, copyright 1990 by the American National Standards Institute (ANSI). Copies may be purchased from the American National Standards Institute, 11 West 42nd Street, New York, New York 10036. Definitions are identified by an asterisk (*) that appears between the term and the beginning of the definition; a single definition taken from ANSI is identified by an asterisk after the item number for that definition. © Copyright IBM Corp. 2006. All rights reserved. 1 2 Introduction to the New Mainframe: z/OS Basics access. The ability to read, update, or otherwise use a resource. Access to protected resources is usually controlled by system software. A access authority. An authority that relates to abend. abnormal end. a request for a type of access to protected resources. In RACF®, the access authorities abend dump. A kind of dump produced when are NONE, READ, UPDATE, ALTER, and a program ends abnormally. EXECUTE. abnormal end. End of a task, a job, or a access control. In computer security, subsystem because of an error condition that ensuring that the resources of a computer cannot be resolved by recovery facilities while system can be accessed only by authorized the task is performed. See abnormal users in authorized ways. termination. access list. A list within a profile of all abnormal termination. (1) The end of authorized users and their access authorities. processing prior to scheduled termination. (2) A system failure or operator action that causes access method. A technique for moving data a job to end unsuccessfully. Synonymous with between main storage and I/O devices. abend, abnormal end. ACID properties. The properties of a ABR. area border node. transaction: atomicity, consistency, isolation, and durability. In CICS®, the ACID properties ACB. access control block. apply to a unit of work (UoW). accept. In SMP/E, to install SYSMODs in the ACK. acknowledgment field. distribution libraries. This is done with the ACCEPT command. Address Resolution Protocol (ARP). In the Internet suite of protocols, the protocol that ACCEPT command. The SMP/E command dynamically maps an IP address to an used to install SYSMODs in the distribution address used by a supporting metropolitan or libraries. local area network such as Ethernet or token-ring. accepted SYSMOD. A SYSMOD that has been successfully installed by the SMP/E address. The unique code assigned to each ACCEPT command. Accepted SYSMODs do device, workstation or system connected to a not have the ERROR flag set and are found as network. SYSMOD entries in the distribution zone. © Copyright IBM Corp. 2006. All rights reserved. 3 address space. A range of contiguous virtual Advanced Peer-to-Peer Networking® storage addresses that the system creates for (APPN). An extension to SNA featuring: (a) the user, batch job, or system task. In z/OS, an greater distributed network control that avoids address space can range up to 16 exabytes of critical hierarchical dependencies, thereby contiguous virtual storage addresses that the isolating the effects of single points of failure; system creates for the user. An address space (b) dynamic exchange of network topology contains user data and programs, as well as information to foster ease of connection, system data and programs, some of which are reconfiguration, and adaptive route selection; common to all address spaces. See virtual (c) dynamic definition of network resources; address space, data space. and (d) automated resource registration and directory lookup. APPN extends the LU 6.2 addressing mode (AMODE). A program peer orientation for end-user services to attribute that refers to the address length that network control and supports multiple LU is expected to be in effect when the program is types, including LU 2, LU 3, and LU 6.2. entered. In z/OS, addresses can be 24, 31, or 64 bits in length. Advanced Program-to-Program Communication (APPC). An implementation adjacent link station (ALS). In SNA, a link of the SNA LU 6.2 protocol that allows station directly connected to a given node by a interconnected systems to communicate and link connection over which network traffic can share the processing of programs. be carried. AID. attention identifier. adjacent node. (1) In SNA, a node connected to another node by at least one path that AIW. APPN Implementation Workshop. connects no other node. (2) In OSI, a node that is attached to the same subnetwork as the alert. To cause the user's terminal to give local node. An adjacent node can be either a some audible or visual indication that an error destination node or a relay node. or some other event has occurred. adjacent subarea. A subarea connected by alias. An alternate label; for example, a label one or more links to another subarea with no and one or more aliases may be used to refer intervening subareas. See subarea. to the same data element or point in a computer program. ADJSSCP. adjacent SSCP table. allocate. To assign a resource for use in administrator. A person responsible for performing a specific task. administrative tasks such as access authorization and content management. ALLOCATE command. In z/OS, the TSO/E Administrators can also grant levels of command that serves as the connection authority to users. between a file's logical name (the ddname) and the file's physical name (the data set name). alphanumeric character. A letter or a number. 4 Introduction to the New Mainframe: z/OS Basics American Standard Code for Information application. A program or set of programs Interchange (ASCII). A standard code used that performs a task; some examples are for information exchange among data payroll, inventory management, and word processing systems, data communication processing applications. systems, and associated equipment. ASCII uses a coded character set consisting of 7-bit application layer. In the Open Systems coded characters. See Extended Binary Interconnection (OSI) reference model, the Coded Decimal Interchange Code (EBCDIC). layer that provides means for application processes residing in open systems to AMODE. addressing mode. exchange information and that contains the application-oriented protocols by which these anonymous user. A portal user who has not processes communicate. logged in to the portal with a valid user ID and password. application program. A collection of software components used to perform specific types of ANR. automatic network routing. work on a computer, such as a program that does inventory control or payroll. ANSI. American National Standards Institute. application programming interface (API). A AOR. application-owning region. software interface that enables applications to communicate with each other. An API is the APAR. authorized program analysis report. set of programming language constructs or APAR fix. A temporary correction of a defect statements that can be coded in an application in an IBM system control program or licensed program to obtain the specific functions and program that affects a specific user. An APAR services provided by an underlying operating fix is usually replaced later by a permanent system or service program. correction called a PTF. APAR fixes are application-instance DVIPA. A dynamic VIPA identified to SMP/E by the ++APAR statement. activated by an application that explicitly APF. authorized program facility. issues a bind() function call to the IP address. APF-authorized. A type of system application-owning region (AOR). In a authorization using the authorized program CICSPlex® configuration, a CICS region facility (APF) that allows an installation to devoted to running applications. identify system or user programs that can use apply. In SMP/E, to install SYSMODs in the sensitive system functions. To maintain target libraries. This is done with the APPLY system security and integrity, a program must command. be authorized by the APF before it can access restricted functions, such as supervisor calls APPLY command. The SMP/E command (SVC) or SVC paths. used to install SYSMODs in the target libraries. API. application programming interface. APPN. Advanced Peer-to-Peer Network. APPC. advanced program-to-program communications. 5 APPN end node. A node that provides a ARM. automatic restart management. broad range of end-user services and supports sessions between its local control ARP. Address Resolution Protocol. point (CP) and the CP in an adjacent network node. It uses these sessions to dynamically ARPANET. A network established by the register its resources with the adjacent CP (its United States Department of Defense network node server), to send and receive Advanced Research Projects Agency (now the directory search requests, and to obtain Defense Advanced Research Projects management services. An APPN end node Agency). can also attach to other end nodes. See ASCII. American Standard Code for Advanced Peer-to-Peer Networking. Information Interchange.