network access methods
DESCRIPTION
TRANSCRIPT
![Page 1: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/1.jpg)
Network Access Methods
![Page 2: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/2.jpg)
Introduction• BTAM - Basic telecommunications access
method• QTAM - Queued teleprocessing access method• TCAM - Telecommunications access method• VTAM - Virtual telecommunications access
method
![Page 3: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/3.jpg)
![Page 4: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/4.jpg)
![Page 5: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/5.jpg)
Basic telecommunications access method
• A low-level programming interface specified by IBM for use on the IBM System/360
• For start-stop and binary synchronous telecommunications terminals.
![Page 6: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/6.jpg)
Basic telecommunications access method
![Page 7: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/7.jpg)
Basic telecommunications access method
• BTAM requires the application program or transaction processing system to handle almost every detail of the protocol.
• Transaction processing is a style of computing that divides work into individual, indivisible operations, called transactions
![Page 8: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/8.jpg)
Basic telecommunications access method
• This is harder than using a higher-layer protocol, but it permits interfacing to non-standard devices in non-standard ways
![Page 9: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/9.jpg)
Basic telecommunications access method
• BTAM was an access method for interactively communicating with remote terminals
• BTAM dynamically built CCW's for reading, writing and "polling" terminals
• Dealt with specific responses from those terminals, according to the success or failure of the communication channel.
![Page 10: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/10.jpg)
Basic telecommunications access method
• A channel command word (CCW) is an instruction to a specialized I/O channel processor which is, in fact, a finite state machine
• Polling refers to actively sampling the status of an external device by a client program as a synchronous activity
![Page 11: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/11.jpg)
Basic telecommunications access method
• It was not unusual for BTAM and later developed access methods (such as VTAM) to co-exist, supporting different devices simultaneously under the same transaction processing system.
![Page 12: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/12.jpg)
Basic telecommunications access method
• BM finally withdrew support for BTAM in 2000.
![Page 13: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/13.jpg)
Queued Telecommunications Access Method
![Page 14: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/14.jpg)
Queued Telecommunications Access Method
• Queued Telecommunications Access Method (QTAM) is an IBM System/360 communications access method incorporating built-in queuing.
![Page 15: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/15.jpg)
![Page 16: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/16.jpg)
Queued Telecommunications Access Method
• Queuing is referring to message queues• These are software-
engineering components used for interprocess communication (a set of methods for the exchange of data among multiple threads)
![Page 17: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/17.jpg)
Queued Telecommunications Access Method
• Threads being the smallest sequence of programmed instructions that can be managed independently
![Page 18: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/18.jpg)
Queued Telecommunications Access Method
• QTAM consisted of a Message Control Program (MCP) and zero or more Message Processing Programs (MPP)
• The MCP handled communications with the terminals, identified input messages and started MPPs to process them as required
![Page 19: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/19.jpg)
Queued Telecommunications Access Method
• The MCP was assembled by the user installation from a set of macros supplied by IBM.
![Page 20: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/20.jpg)
Queued Telecommunications Access Method
• These macros defined:• The lines and terminals comprising the
system, • The datasets required, • And the procedures used to process received
and transmitted messages.
![Page 21: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/21.jpg)
Queued Telecommunications Access Method
• The MPPs, incorporating logic to process the various messages, were supplied by the installation, and used standard OS/360 data management macros.
![Page 22: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/22.jpg)
Telecommunications Access Method
![Page 23: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/23.jpg)
Telecommunications Access Method
• Telecommunications Access Method (TCAM) is an access method that provides access to terminals units within a teleprocessing network.
![Page 24: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/24.jpg)
Telecommunications Access Method
• Teleprocessing is a term coined by IBM and is used to describe a computer with the capability of connecting to another computer or network device.
![Page 25: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/25.jpg)
Telecommunications Access Method
• Though TCAM provided similar functionality to QTAM, which it replaced, It had its advantages over QTAM
![Page 26: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/26.jpg)
Telecommunications Access Method
• It was said to have:– Improved buffering, with more buffering options.– Improved organization of message queuing on disk
including multiple volume support.– Back-up copies of messages maintained on disk.
![Page 27: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/27.jpg)
Telecommunications Access Method
• It was said to have:– Improved testing and debugging (including off-line
testing, improved debugging, online terminal testing, and logging.)
– Improved line handling for inquiry applications.
![Page 28: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/28.jpg)
Telecommunications Access Method
• It was said to have:– "Significantly increases speed and efficiency over
QTAM."– Improved operator monitoring and control.– Binary Synchronous Support.– Checkpointing.
![Page 29: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/29.jpg)
Telecommunications Access Method
• Binary Synchronous Communication, aka BSC or Bisync,
• Is an IBM character-oriented, half-duplex link protocol, announced in 1967
![Page 30: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/30.jpg)
Telecommunications Access Method
• Checkpointing is a technique for inserting fault tolerance into computing systems.
• It basically consists of storing a snapshot of the current application state
• It may use it later on for restarting the execution in case of failure.
![Page 31: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/31.jpg)
Virtual TelecommunicationsAccess Method
![Page 32: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/32.jpg)
Virtual Telecommunications Access Method
• VTAM provides an application programming interface (API) for communication applications,
• IT controls communication equipment such as adapters and controllers.
![Page 33: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/33.jpg)
Virtual Telecommunications Access Method
• In modern terminology, VTAM provides a communication stack and device drivers.
![Page 34: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/34.jpg)
Virtual Telecommunications Access Method
• After a series of delay, VTAM was introduced in 1974 as a major component of SNA (Systems Network Architecture)
![Page 35: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/35.jpg)
Virtual Telecommunications Access Method
• VTAM is an access method software that allows application programs to read and write data to and from external devices.
• It is called 'virtual' because it was introduced at the time when IBM was introducing virtual storage
![Page 36: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/36.jpg)
Virtual Telecommunications Access Method
• VTAM is an access method software that allows application programs to read and write data to and from external devices.
• It is called 'virtual' because it was introduced at the time when IBM was introducing virtual storage
![Page 37: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/37.jpg)
Virtual Telecommunications Access Method
• Some Features Of VTAM Is That:• Supports several network protocol• Supports 'cross-domain' services
![Page 38: Network access methods](https://reader035.vdocuments.mx/reader035/viewer/2022081413/548b4fbcb4795929318b461c/html5/thumbnails/38.jpg)
QUESITONS