SS84 IBM DFSMS Implementation

4.6 out of 5 rating

Jump to dates

Duration

4 Days

24 CPD hours

This course is intended for

This is an intermediate course for individuals responsible for developing and implementing effective storage management techniques.

Overview

Establish a DFSMS configuration to automatically enforce your installation's storage management policies Convert service level requirements into appropriate parameters for data class, storage class, management class, and storage groups Create and test Automatic Class Selection (ACS) routines Convert volumes and move data to system-managed volumes with DFSMS Data Set Services (DFSMSdss) Specify appropriate management class and storage group parameters for DFSMS Hierarchical Storage Management (DFSMShsm) processing of system-managed data sets Plan to maintain your DFSMS environment using Naviquest Establish procedures to control, manage, and recover the storage management subsystem with ISMF and operator commands Develop a DFSMS implementation plan

Description

In this course you will learn how to plan and implement DFSMS and learn how to manage temporary and permanent data sets with an emphasis on disk storage.

Course introduction and DFSMS overview
  • Specify the storage administration functions that can be automatically performed by the system
  • Identify the types of data set services that need to be established by negotiating service level agreements
  • Correlate data set service requirements to the SMS configuration components: data class, storage class, management class, storage group, and automatic class selection routines
Activating SMS
  • Identify the functions eligible for exploitation with the installation of DFSMS Data Facility Product (DFSMSdfp) and the activation of SMS
  • Create SMS control data sets
  • Code SYS1.PARMLIB operands necessary to bring up SMS
  • Create a minimal configuration
  • Activate a configuration
Writing ACS routines
  • Identify the purpose of the ACS routines
  • Develop an understanding of the statements
  • Differentiate between literals and masks
  • Describe the read variables available in the ACS routines
Managing temporary data sets
  • Create/alter storage classes and storage groups
  • Identify steps to install and use the starter set
  • Write ACS routines to handle temporary data sets
  • Activate a system to manage temporary data sets
  • Code commands to change volume/group SMS status
  • Issue operator commands to display current status
Exploiting DFSMS
  • Describe the purpose of the data class
  • Identify the features that the data class can exploit
  • Create data sets using the space parameter
  • Define Virtual Storage Access Method (VSAM) and volume attributes for data class
  • Identify special data sets and their exploitation through the data class
Managing permanent data sets
  • Create/alter data classes, storage classes, management classes, and storage groups
  • Translate current (DFSMShsm) service level agreements to management class parameters
  • Identify alternatives and concerns for standard naming conventions
  • Establish the controls for automatic backup of data sets
  • Establish the controls for automatic volume dump
  • Write ACS routines to manage permanent data
  • Create a configuration that manages permanent data sets
  • Create a new managed data set
  • Identify function of storage class exit provided by Custom-Built Installation Process Offering (CBIPO) and resulting System Management Facility (SMF) records
Using Naviquest
  • Create test cases using Naviquest
  • Perform storage administration tasks in batch
  • Create online DFSMS reports
  • Create model commands using Naviquest
  • Use the COPYFILT macro
Device preparation and data movement
  • Initialize volumes as system-managed
  • Move data into/out from system-managed control
  • Convert volumes to/from system-managed
  • Move data to utilize new hardware capabilities
Controlling DFSMS
  • Code commands to change SMS volume/group status
  • Issue commands to save configurations and use alternate Active Control Data Set (ACDS)
  • Issue command to use alternate Communication Data Set (COMMDS)
  • Issue VARY SMS commands
  • Communicate with the security administrator about storage management requirements
Additional considerations
  • Establish a plan for implementing SMS
  • Locate sources of implementation planning checklists
  • Identify the tools available to document the current system
  • Identify multiple site considerations for recovery and exploitation
Training Insurance Included!

When you organise training, we understand that there is a risk that some people may fall ill, become unavailable. To mitigate the risk we include training insurance for each delegate enrolled on our public schedule, they are welcome to sit on the same Public class within 6 months at no charge, if the case arises.

What people say about us


Find out more about this course

Interested in alternative dates? Would like to book a private session of this course for your company? Or for any other queries please simply fill out the form below.