Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Data allocation and in Mainframe server

Posted on 2006-06-10
1
Medium Priority
?
490 Views
Last Modified: 2010-04-03
Hi ,

How the physical data distribution and data allocation is done in the Mainframe server?

How the logical data seperation is done and how the processes are differed from the general JCL and cobol code?
0
Comment
Question by:m_razesh
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 57

Accepted Solution

by:
giltjr earned 375 total points
ID: 16879636
Which mainframe?  I am assuming you mean IBM's mainframes.  This is sort of tough to define.  Today the real physical dasd is the same dasd you use on any business class distributed server, that is SCSI drives.   SANs that are compatiable with IBM mainframes emulate IBM's mainframe DASD archicture.  The most recent are the IBM 3390 DASD units.

As with any DASD unit they have tracks and cylinders.  Files are allocated by tracks or cylinders, a cylinder has 15 tracks.  A track has about 50K bytes.  Files are written in "blocks" where a block is about equal to a cluster in the distributed world.  Records are more of a logical idea and based on a file definiton that defines how long records are.  The traditional mainframe file system does NOT use CR or CRLF for end of record markers.  

You can go here and you will find books that introduce you to IBM's z/OS enviroment.

http://www.redbooks.ibm.com/cgi-bin/searchsite.cgi?query=ABCs

I would suggest volumes 1 and 3.

Please note that z/OS has a split personality (at least I look at it that way) when it come to data allocation.  It has the traditional MVS file structure and it also has a Unix type HFS system.
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Finding original email is quite difficult due to their duplicates. From this article, you will come to know why multiple duplicates of same emails appear and how to delete duplicate emails from Outlook securely and instantly while vital emails remai…
Concerto Cloud Services, a provider of fully managed private, public and hybrid cloud solutions, announced today it was named to the 20 Coolest Cloud Infrastructure Vendors Of The 2017 Cloud  (http://www.concertocloud.com/about/in-the-news/2017/02/0…
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
Suggested Courses

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question