• a Series SYSTEMSTATUS Programming Reference Manual

Total Page:16

File Type:pdf, Size:1020Kb

• a Series SYSTEMSTATUS Programming Reference Manual • UNISYS A Series Systems Functional Overview Release 3.9.0 September 1991 Printed in U S America Priced Item 8600 0353-000 • UNISYS A Series Systems Functional Overview Copyright © 1991 Unisys Corporation. All Rights Reserved. Unisys is a registered trademark of Unisys Corporation. Release 3.9.0 September 1991 Printed in U S America Priced Item 8600 0353-000 The names, places, and/or events used in this publication are not intended to correspond to any individual, group, or association existing, living, or otherwise. Any similarity or likeness of the ) names, places, and/or events with the names of any individual, living or otherwise, or that of any group or association is purely coincidental and unintentional. NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THE DOCUMENT. Any product and related material disclosed herein are only furnished pursuant and subject to the terms and conditions of a duly executed Program Product License or Agreement to purchase or lease equipment. The only warranties made by Unisys, if any, with respect to the products described in this document are set forth in such License or Agreement. Unisys cannot accept any financial or other responsibility that may be the result of your use of the information in this document or software material, including direct, indirect, special or consequential damages. You should be very careful to ensure that the use of this information and/or software material complies with the laws, rules, and regulations of the jurisdictions with respect to which it is used. The information contained herein is subject to change without notice. Revisions may be issued to advise of such changes and/or additions. Correspondence regarding this publication may be forwarded using the Product Information card at the back of the manual, or may be addressed directly to Unisys, Product Information, 25725 Jeronimo Road, Mission Viejo, CA 92691. ,Page Status Page Issue iii -000 iv Blank v th rough xvi i -000 xviii Blank xix -000 xx Blank 1-1 through 1-8 -000 2-1 through 2-21 -000 2-22 Blank 3-1 through 3-22 -000 4-1 through 4-13 -000 4-14 Blank 5-1 through 5-24 -000 6-1 through 6-10 -000 7-1 through 7-26 -000 8-1 through 8-33 -000 8-34 Blank 9-1 through 9-20 -000 10-1 through 10-6 -000 11-1 through 11-4 -000 12-1 through 12-3 -000 12-4 Blank A-I th rough A-2 -000 B-1 th rough B-2 -000 Glossary-l through 24 -000 Bibliography-l through 14 -000 Index-l through 16 -000 Unisys uses an II-digit document numbering system. The suffix of the document number (1234 5678-xyz) indicates the document level. The first digit of the suffix (x) designates a revision level; the second digit (y) designates an update level. For example, the first release of a document has a suffix of -000. A suffix of -130 designates the third update to revision 1. The third digit (z) is used to indicate an errata for a particular level and, is not reflected in the page status summary. 86000353-000 iii iv 8600 0353-000 About This Overview Purpose The A Series Systems Functional Overview introduces the A Series line of computer systems and their associated system software and environmental software products. This overview is designed to answer the following types of questions: • "Should I buy an A Series system? Is it an effective solution for the types of business problems I face?" • "I've just received an A Series system and a large assortment of documentation. It's all new to me. What really is in an A Series system and what do all these products do?" • "I have an A Series system and there is a particular task I want to perform using this system. Which software product should I use to accomplish this task?" • "I've heard about a particular A Series software product, and it sounds like it might be relevant to my needs. What are the general capabilities of this software product?" Scope This overview presents a functionally organized description of all the system and environmental software products U nisys sells for use on A Series systems. This overview helps you to understand how each product is used, and some of the particular strengths of each product. Where two products serve a similar function, this overview helps you to choose between them. This overview is not a tutorial about how to administer or operate an A Series system. This overview refers you to other published Unisys docwnents for detailed information about how to operate the various products thB.t are introduced here. Audience If you are a new A Series system customer, are considering acquiring a system, or just want a general introduction to A Series systems, then you should read this manual. Prerequisites You do not need any prior knowledge ofUnisys systems to understand the information in this manual, but you should have a basic grasp of elementary computer concepts. 86000353-000 v About This Overview How to Use This Overview Part I of this overview, "Products," discusses A Series functions and the products that provide those functions. If you want an overview of A Series functions, or ifyou want to find out which product performs a particular function, you can use the table of contents. For example, suppose you are interested in database performance management. In the table of contents, you will find a section titled "Database Management." Within that section is a subsection on "Database Operations," which includes a smaller topic called "Database Performance Monitoring." Within each topic, the text introduces the product that provides the stated function (for example, the DMMONITOR utility). The text describes the function of the product in further detail, explaining four or five noteworthy capabilities of the product. The length of the presentation varies, depending on the complexity of the product being discussed. Mter reading the brief product descriptions given in this overview, you should be able to decide whether you want more details about any of the products. Each topic ends with a list of documents you can consult for further information about the product being discussed. If the online help text is available for the product, that is also mentioned. If you have heard the name of an A Series product, and you want information about that particular product, you should go to the index first. For example, if you are interested in InfoExec™, you will find that InfoExec appears in the index with references to the pages where various aspects of InfoExec are discussed. For information about A Series support services, migration policies, and documentation, refer to Part II of this overview, "Support." Throughout this overview, B 21, B 25, B 26, B 27, B 28, and B 38 systems are referred to as the BTOSTM workstations. Technical terms are defined and acronyms are spelled out in the text where they first appear. In addition, many of these terms and acronyms are defined in the glossary of this this overview. Unless otherwise noted, manuals referred to in this overview are for the A Series systems. Organization This overview contains the following parts, sections, and appendixes. In addition, a glossary, a bibliography, and an index appear at the end of this overview. Part 1. Products The sections in this part describe the products and features of A Series systems. InfoExec is a trademark of Unisys Corporation. STOS is a trademark of Unisys Corporation. vi 8600 0353-000 About Th is Overview Section 1. A Series Systems: A Design for Change This section provides a thumbnail sketch of the types of capabilities provided by A Series systems. These capabilities are explored in more detail in later sections of this overview. Section 2. A Series Architecture" This section introduces the basic hardware components and system software components of A Series systems. The presentation is brief and fairly nontechnical. Section 3. Database Management This section introduces the types of database architectures available on A Series systems. This section also introduces the utilities used for database creation, operations, and inquiry or updating. Section 4. Transaction Management This section introduces the A Series products that provide end users with easy online access to data, and the products that allow system administrators and programmers to effectively control online transactions. Section 5. Program Development This section introduces fourth-generation and third-generation programming languages and the associated utilities that increase programmer productivity. Section 6. Operational Interface This section discusses the products that system operators use to control the system. Section 7. Basic System Management This section describes the products and features used to manage processes, memory, files, disk units, printing, system configuration, and system reinitialization. Section 8. Data Communications Networks This section discusses the various types of networks that provide communication between terminals and the host system, or between two different host systems. Section 9. System Monitoring and Security This section introduces the tools used for monitoring system performance and reliability. This section also describes the products that provide flexible levels of security on the system, including features certified by the United States Department of Defense as providing the C2 controlled access protection level. 86000353-000 vii About This Overview Part 2. Support The sections in this part describe the support Unisys provides for users of A Series systems. Section 10. CUSTOMCARE@ Services This section describes hardware and software support services, customer education, and consulting services. Section 11. System Updates This section introduces the procedures used to distribute new firmware, system software, and environmental software to customers.
Recommended publications
  • Allgemeines Abkürzungsverzeichnis
    Allgemeines Abkürzungsverzeichnis L.
    [Show full text]
  • Networking Standards Mark Davies, Digital Equipment Corporation
    N92-12499 Networking Standards Mark Davies, Digital Equipment Corporation ABSTRACT The enterprise network is currently a multivendor environment consisting of many defacto and proprietary standards. During the 1990s, these networks will evolve towards networks which are based on international standards in both the LAN and WAN space. Also, you can expect to see the higher level functions and applications begin the same transition. The Open Network Advantage Market Requirements OPEN NETWORKS!!! Multi-protocol, multi-platform, multi-vendor networks working together International AND defacto standards Effortless communications within and between enter- prises Ability to move to standards at own pace What is an Open System? Defined as: A vendor-neutral computing environment: - compliant with International and defacto standards - permits system and network interoperability or software applications portability - includes consistency of data and human access - satisfies one or more of a business's functional requirements Standards Benefits from networks based on international and defacto standards o Vendor independence o Applications portability o Investment protection o Improved communications leading to increased productivity o Network flexibility 13DSDDED Network Architectures: DECnet, OSI, TCP/IP DECnet OS) IP Application Application Internet Applications Protocols Presentation DMA Session Control Session Transport Transport Transport (NSP) (TP 0,2,4) (TCP / UDP) Network Network Network (CLNS) (CLNS/CONS) (IP) Data Link Data Link Data Link
    [Show full text]
  • Decnet-Plusftam and Virtual Terminal Use and Management
    VSI OpenVMS DECnet-Plus FTAM and Virtual Terminal Use and Management Document Number: DO-FTAMMG-01A Publication Date: June 2020 Revision Update Information: This is a new manual. Operating System and Version: VSI OpenVMS Integrity Version 8.4-2 VSI OpenVMS Alpha Version 8.4-2L1 VMS Software, Inc., (VSI) Bolton, Massachusetts, USA DECnet-PlusFTAM and Virtual Terminal Use and Management Copyright © 2020 VMS Software, Inc. (VSI), Bolton, Massachusetts, USA Legal Notice Confidential computer software. Valid license from VSI required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for VSI products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. VSI shall not be liable for technical or editorial errors or omissions contained herein. HPE, HPE Integrity, HPE Alpha, and HPE Proliant are trademarks or registered trademarks of Hewlett Packard Enterprise. Intel, Itanium and IA-64 are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. UNIX is a registered trademark of The Open Group. The VSI OpenVMS documentation set is available on DVD. ii DECnet-PlusFTAM and Virtual
    [Show full text]
  • Database Language SQL: Integrator of CALS Data Repositories
    Database Language SQL: Integrator of CALS Data Repositories Leonard Gallagher Joan Sullivan U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Information Systems Engineering Division Computer Systems Laboratory Gaithersburg, MD 20899 NIST Database Language SQL Integrator of CALS Data Repositories Leonard Gallagher Joan Sullivan U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Information Systems Engineering Division Computer Systems Laboratory Gaithersburg, MD 20899 September 1992 U.S. DEPARTMENT OF COMMERCE Barbara Hackman Franklin, Secretary TECHNOLOGY ADMINISTRATION Robert M. White, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director Database Language SQL: Integrator of CALS Data Repositories Leonard Gallagher Joan Sullivan National Institute of Standards and Technology Information Systems Engineering Division Gaithersburg, MD 20899, USA CALS Status Report on SQL and RDA - Abstract - The Computer-aided Acquisition and Logistic Support (CALS) program of the U.S. Department of Defense requires a logically integrated database of diverse data, (e.g., documents, graphics, alphanumeric records, complex objects, images, voice, video) stored in geographically separated data banks under the management and control of heterogeneous data management systems. An over-riding requirement is that these various data managers be able to communicate with each other and provide shared access to data and
    [Show full text]
  • Application Layer
    APPLICATION LAYER The application layer in the OSI model is the closest layer to the end user which means that the application layer and end user can interact directly with the software application. The application layer programs are based on client and servers. The Application layer includes the following functions: • Identifying communication partners: The application layer identifies the availability of communication partners for an application with data to transmit. • Determining resource availability: The application layer determines whether sufficient network resources are available for the requested communication. • Synchronizing communication: All the communications occur between the applications requires cooperation which is managed by an application layer. Services of Application Layers o Network Virtual terminal: An application layer allows a user to log on to a remote host. To do so, the application creates a software emulation of a terminal at the remote host. The user's computer talks to the software terminal, which in turn, talks to the host. The remote host thinks that it is communicating with one of its own terminals, so it allows the user to log on. o File Transfer, Access, and Management (FTAM): An application allows a user to access files in a remote computer, to retrieve files from a computer and to manage files in a remote computer. FTAM defines a hierarchical virtual file in terms of file structure, file attributes and the kind of operations performed on the files and their attributes. o Addressing: To obtain communication between client and server, there is a need for addressing. When a client made a request to the server, the request contains the server address and its own address.
    [Show full text]
  • Ciena Acronyms Guide.Pdf
    The Acronyms Guide edited by Erin Malone Chris Janson 1st edition Publisher Acknowledgement: This is the first edition of this book. Please notify us of any acronyms we may have missed by submitting them via the form at www.ciena.com/acronymsguide. We will be happy to include them in further editions of “The Acronyms Guide”. For additional information on Ciena’s Carrier Ethernet or Optical Communications Certification programs please contact [email protected]. Table of Contents Numerics ..........................1 A .......................................1 B .......................................2 C .......................................3 D .......................................5 E .......................................7 F........................................9 G .....................................10 H .....................................11 I .......................................12 J ......................................14 K .....................................14 L ......................................14 M ....................................15 N .....................................17 O.....................................18 P .....................................20 Q.....................................22 R .....................................22 S......................................23 T .....................................26 U .....................................28 V .....................................29 W ....................................29 X .....................................30 Z......................................30
    [Show full text]
  • 2018–2019 Johns Hopkins Engineering for Professionals
    The Johns Hopkins University 3400 North Charles Street Engineering Baltimore, MD 21218 for Professionals Part-Time and Online Graduate Education in Engineering and Applied Sciences 2018–2019 Part-Time Graduate Programs ep.jhu.edu Dear Students, Technological advances occurring at a breathtaking pace are impacting every aspect of society. In this environment, the most successful engineers are those committed to seek- ing the resources they need to remain at the forefront of their professions. They know it is crucial not only to be well versed in the latest technologies, but also to understand how their fields are evolving, what the consequences of these changes will be, and the knowledge and skills they will need to remain ahead of the curve. The Whiting School of Engineering provides motivated working engineers around the world with the tools and experiences necessary to advance and deepen their educa- tions in ways that have a direct positive impact on their professional lives. The breadth of our degree and certificate programs, the real-world experience of our faculty, and our state-of-the-art instructional methods enable us to provide students with unparalleled opportunities—all of which come with the prestige and value of a Johns Hopkins education. Here, you will learn from instructors who are advancing and redefining their fields, including experienced professionals from the renowned Johns Hopkins Applied Physics Labora- tory, as well as outstanding members of the Johns Hopkins University faculty. These dedicated instructors understand how engineering joins the theoretical with the practical in order to implement solutions to today’s grand challeng- es, and they continually improve and update their course and project content to include the very latest in both the theoretical understanding and the applications of their areas of expertise.
    [Show full text]
  • The US Government's Open System Environment Profile OSE/1 Version
    C NIST Special Publication 500-21 Computer Systems APPLICATION PORTABILITY PROFILE Technology (APP) The U.S. Government's U.S. DEPARTMENT OF COMMERCE Technology Administration Open System Environment Profile National Institute of Standards and Technology OSE/1 Version 2.0 Nisr NAT L !NST."OF STAND i TECH R.I.C. llllllllllllllllllll NIST PUBLICATIONS AlllDM QEETfll APPLICA TION PORTABILITYPROFILE j)JT)) The U S. Government's ^ k^Open System Environment IL Profile OSE/1 Version 2.0 -QG 100 .U57 #500-210 1993 7he National Institute of Standards and Technology was established in 1988 by Congress to "assist industry in the development of technology . needed to improve product quality, to modernize manufacturing processes, to ensure product reliability . and to facilitate rapid commercialization ... of products based on new scientific discoveries." NIST, originally founded as the National Bureau of Standards in 1901, works to strengthen U.S. industry's competitiveness; advance science and engineering; and improve public health, safety, and the environment. One of the agency's basic functions is to develop, maintain, and retain custody of the national standards of measurement, and provide the means and methods for comparing standards used in science, engineering, manufacturing, commerce, industry, and education with the standards adopted or recognized by the Federal Government. As an agency of the U.S. Commerce Department's Technology Administration, NIST conducts basic and applied research in the physical sciences and engineering and performs related services. The Institute does generic and precompetitive work on new and advanced technologies. NIST's research facilities are located at Gaithersburg, MD 20899, and at Boulder, CO 80303.
    [Show full text]
  • IT Acronyms at Your Fingertips a Quick References Guide with Over 3,000 Technology Related Acronyms
    IT Acronyms at your fingertips A quick references guide with over 3,000 technology related acronyms IT Acronyms at your Fingertips We’ve all experienced it. You’re sitting in a meeting and someone spouts off an acronym. You immediately look around the table and no one reacts. Do they all know what it means? Is it just me? We’re here to help! We’ve compiled a list of over 3,000 IT acronyms for your quick reference and a list of the top 15 acronyms you need to know now. Top 15 acronyms you need to know now. Click the links to get a full definition of the acronym API, Application Programmer Interface MDM, Mobile Device Management AWS, Amazon Web Services PCI DSS, Payment Card Industry Data Security Standard BYOA, Bring Your Own Apps SaaS, Software as a Service BYOC, Bring Your Own Cloud SDN, Software Defined Network BYON, Bring Your Own Network SLA, Service Level Agreement BYOI, Bring Your Own Identity VDI, Virtual Desktop Infrastructure BYOE, Bring Your Own Encryption VM, Virtual Machine IoT, Internet of Things Quick Reference, over 3000 IT acronyms Click the links to get a full definition of the acronym Acronym Meaning 10 GbE 10 gigabit Ethernet 100GbE 100 Gigabit Ethernet 10HD busy period 10-high-day busy period 1170 UNIX 98 121 one-to-one 1xRTT Single-Carrier Radio Transmission Technology 2D barcode two-dimensional barcode Page 1 of 91 IT Acronyms at your Fingertips 3270 Information Display System 3BL triple bottom line 3-D three dimensions or three-dimensional 3G third generation of mobile telephony 3PL third-party logistics 3Vs volume, variety and velocity 40GbE 40 Gigabit Ethernet 4-D printing four-dimensional printing 4G fourth-generation wireless 7W seven wastes 8-VSB 8-level vestigial sideband A.I.
    [Show full text]
  • DRIVE/WINDOWS V1.1 SQL Statements For
    Preface DRIVE/WINDOWS allows you to access the SQL database system using SQL statements. While this directory gives you a brief description of the syntax of the DRIVE SQL statements for UDS, a detailed description is provided in the "SQL for UDS/SQL V1.0 Language Reference Manual" [13]. This directory describes the DRIVE SQL statements for UDS of the DRIVE/WINDOWS version 1.1 for BS2000 and SINIX. Complex statement sections which occur in both DRIVE and SQL statements are described separately in the chapter on "Metavariables" in the "DRIVE/WINDOWS V1.0: System Directory" [3]. Additional DRIVE SQL metavariables which are not included in this chapter are described in this statement directory under "UDS metavariables". The term "with the TP monitor" refers to UTM mode in BS2000. SQL return codes are accepted by UDS/SQL and output by DRIVE/WINDOWS as error messages in the form DRI9xxx. For their meaning, refer to the "SQL for UDS/SQL (BS2000) V1.0: Language Reference Manual" [13]. U20073-J-Z145-2-7600 1 UDS/SQL statements CLOSE Close the cursor CLOSE closes a cursor that you declared with the DECLARE statement for a query expression and opened with the OPEN statement. The cursor declaration is retained. You must open the cursor using the OPEN or RESTORE statement before accessing the cursor again using the FETCH statement. An open cursor is closed at the end of a transaction. In program mode, cursors can only be referenced in the source file in which they were declared. CLOSE cursor cursor Name of the cursor you wish to close.
    [Show full text]
  • HP FTAM/9000 Programmer's Guide Is to Introduce You to the File Transfer, Access and Management (FTAM) Concepts You Must Know to Write FTAM Applications
    HP FTAM/9000 Programmer’s Guide Edition 5 B1033-90014 HP 9000 Networking E0597 Printed in: U.S.A. © Copyright 1997, Hewlett-Packard Company. Legal Notices The information in this document is subject to change without notice. Hewlett-Packard makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Hewlett-Packard shall not be held liable for errors contained herein or direct, indirect, special, incidental or consequential damages in connection with the furnishing, performance, or use of this material. Warranty. A copy of the specific warranty terms applicable to your Hewlett- Packard product and replacement parts can be obtained from your local Sales and Service Office. Restricted Rights Legend. Use, duplication or disclosure by the U.S. Government is subject to restrictions as set forth in subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 for DOD agencies, and subparagraphs (c) (1) and (c) (2) of the Commercial Computer Software Restricted Rights clause at FAR 52.227-19 for other agencies. HEWLETT-PACKARD COMPANY 3000 Hanover Street Palo Alto, California 94304 U.S.A. Use of this manual and flexible disk(s) or tape cartridge(s) supplied for this pack is restricted to this product only. Additional copies of the programs may be made for security and back-up purposes only. Resale of the programs in their present form or with alterations, is expressly prohibited. Copyright Notices. ©copyright 1983-97 Hewlett-Packard Company, all rights reserved.
    [Show full text]
  • The Architecture of Open
    Preface By Professor Brian Warboys, University of Manchester It is now some 20 years since the foundations of the VME architecture were laid. The original objectives were to produce an architecture which would be flexible enough to allow for the many changes that were inevitable in the market, in the enabling technologies and in the end-user demands for IT systems. At the same time it was imperative that the architecture should be constraining enough to control the very long development process that long life implies. The result was essentially to define a simple but powerful approach which has basically remained unchanged during its long life. This is not a tribute to the remarkable foresight of the many people who contributed to that design but rather confirmation of the long known but often forgotten maxim that the best solution to mastering complexity is by the formulation of simple rules. The basic rules, which are enshrined in the architecture, have not had to be reformulated but merely extended in order to produce an architecture which meets the modern demands of Open Client-server systems. The essential architectural simplicity which guided the development of a complex Operating System throughout the 70's and 80's is as applicable in the 90's. Moreover this approach has been thoroughly tested over the last twenty years and there should be no doubt in anybody's mind about the capability of the OpenVME architecture to manage the complex design issues which confront modern Client-server systems. A splendid side effect of this text is that, for the first time, it enumerates, in a readily digestible form, the thinking behind the VME architecture.
    [Show full text]