network access methods

38
Network Access Methods

Upload: jaleel-james

Post on 13-Dec-2014

250 views

Category:

Technology


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Network access methods

Network Access Methods

Page 2: Network access methods

Introduction• BTAM - Basic telecommunications access

method• QTAM - Queued teleprocessing access method• TCAM - Telecommunications access method• VTAM - Virtual telecommunications access

method

Page 3: Network access methods
Page 4: Network access methods
Page 5: Network access methods

Basic telecommunications access method

• A low-level programming interface specified by IBM for use on the IBM System/360

• For start-stop and binary synchronous telecommunications terminals.

Page 6: Network access methods

Basic telecommunications access method

Page 7: Network access methods

Basic telecommunications access method

• BTAM requires the application program or transaction processing system to handle almost every detail of the protocol.

• Transaction processing is a style of computing that divides work into individual, indivisible operations, called transactions

Page 8: Network access methods

Basic telecommunications access method

• This is harder than using a higher-layer protocol, but it permits interfacing to non-standard devices in non-standard ways

Page 9: Network access methods

Basic telecommunications access method

• BTAM was an access method for interactively communicating with remote terminals

• BTAM dynamically built CCW's for reading, writing and "polling" terminals

• Dealt with specific responses from those terminals, according to the success or failure of the communication channel.

Page 10: Network access methods

Basic telecommunications access method

• A channel command word (CCW) is an instruction to a specialized I/O channel processor which is, in fact, a finite state machine

• Polling refers to actively sampling the status of an external device by a client program as a synchronous activity

Page 11: Network access methods

Basic telecommunications access method

• It was not unusual for BTAM and later developed access methods (such as VTAM) to co-exist, supporting different devices simultaneously under the same transaction processing system.

Page 12: Network access methods

Basic telecommunications access method

• BM finally withdrew support for BTAM in 2000.

Page 13: Network access methods

Queued Telecommunications Access Method 

Page 14: Network access methods

Queued Telecommunications Access Method 

• Queued Telecommunications Access Method (QTAM) is an IBM System/360 communications access method incorporating built-in queuing.

Page 15: Network access methods
Page 16: Network access methods

Queued Telecommunications Access Method 

• Queuing is referring to message queues• These are software-

engineering components used for interprocess communication (a set of methods for the exchange of data among multiple threads)

Page 17: Network access methods

Queued Telecommunications Access Method 

• Threads being the smallest sequence of programmed instructions that can be managed independently

Page 18: Network access methods

Queued Telecommunications Access Method 

• QTAM consisted of a Message Control Program (MCP) and zero or more Message Processing Programs (MPP)

• The MCP handled communications with the terminals, identified input messages and started MPPs to process them as required

Page 19: Network access methods

Queued Telecommunications Access Method 

• The MCP was assembled by the user installation from a set of macros supplied by IBM.

Page 20: Network access methods

Queued Telecommunications Access Method 

• These macros defined:• The lines and terminals comprising the

system, • The datasets required, • And the procedures used to process received

and transmitted messages.

Page 21: Network access methods

Queued Telecommunications Access Method 

• The MPPs, incorporating logic to process the various messages, were supplied by the installation, and used standard OS/360 data management macros.

Page 22: Network access methods

Telecommunications Access Method 

Page 23: Network access methods

Telecommunications Access Method 

• Telecommunications Access Method (TCAM) is an access method that provides access to terminals units within a teleprocessing network.

Page 24: Network access methods

Telecommunications Access Method 

• Teleprocessing is a term coined by IBM and is used to describe a computer with the capability of connecting to another computer or network device.

Page 25: Network access methods

Telecommunications Access Method 

• Though TCAM provided similar functionality to QTAM, which it replaced, It had its advantages over QTAM

Page 26: Network access methods

Telecommunications Access Method 

• It was said to have:– Improved buffering, with more buffering options.– Improved organization of message queuing on disk

including multiple volume support.– Back-up copies of messages maintained on disk.

Page 27: Network access methods

Telecommunications Access Method 

• It was said to have:– Improved testing and debugging (including off-line

testing, improved debugging, online terminal testing, and logging.)

– Improved line handling for inquiry applications.

Page 28: Network access methods

Telecommunications Access Method 

• It was said to have:– "Significantly increases speed and efficiency over

QTAM."– Improved operator monitoring and control.– Binary Synchronous Support.– Checkpointing.

Page 29: Network access methods

Telecommunications Access Method 

• Binary Synchronous Communication, aka BSC or Bisync,

• Is an IBM character-oriented, half-duplex link protocol, announced in 1967

Page 30: Network access methods

Telecommunications Access Method 

• Checkpointing is a technique for inserting fault tolerance into computing systems.

• It basically consists of storing a snapshot of the current application state

• It may use it later on for restarting the execution in case of failure.

Page 31: Network access methods

Virtual TelecommunicationsAccess Method

Page 32: Network access methods

Virtual Telecommunications Access Method 

• VTAM provides an application programming interface (API) for communication applications,

• IT controls communication equipment such as adapters and controllers.

Page 33: Network access methods

Virtual Telecommunications Access Method 

• In modern terminology, VTAM provides a communication stack and device drivers.

Page 34: Network access methods

Virtual Telecommunications Access Method 

• After a series of delay, VTAM was introduced in 1974 as a major component of SNA (Systems Network Architecture)

Page 35: Network access methods

Virtual Telecommunications Access Method 

• VTAM is an access method software that allows application programs to read and write data to and from external devices.

• It is called 'virtual' because it was introduced at the time when IBM was introducing virtual storage

Page 36: Network access methods

Virtual Telecommunications Access Method 

• VTAM is an access method software that allows application programs to read and write data to and from external devices.

• It is called 'virtual' because it was introduced at the time when IBM was introducing virtual storage

Page 37: Network access methods

Virtual Telecommunications Access Method 

• Some Features Of VTAM Is That:• Supports several network protocol• Supports 'cross-domain' services

Page 38: Network access methods

QUESITONS