Home > Store

UNIX for the Mainframer: The Essential Reference for Commands, Conversions, TCP/IP

Register your product to gain access to bonus material or receive a coupon.

UNIX for the Mainframer: The Essential Reference for Commands, Conversions, TCP/IP

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

If you know mainframes, this book will help you extend your expertise to UNIX environments.KEY TOPICS:This book is a quick, complete reference guide - and a powerful tutorial - for any mainframe professional who wants to understand UNIX and TCP/IP. It provides an overview comparing and contrasting mainframe and UNIX environments from the standpoint of the mainframe professional. It introduces mainframers to UNIX data and file handling methods; shows how UNIX provides for the commands and utilities mainframe programmers are familiar with; and discusses UNIX alternatives to mainframe JCL. It covers advanced UNIX shell scripts; UNIX editors; UNIX account configuration; and third-party tools that may make mainframe developers more comfortable in the UNIX environment. The book includes detailed lists of error messages, codes, UNIX signals, hints and techniques; conversion tables for ASCII and EBCDIC; an overview of the UNIX C Shell and TCP/IP, and much more.MARKET:All mainframe programmers, analysts, system analysts and consultants who need to learn UNIX. This including the rapidly increasing number of programmers in IBM environments working with mainframes as network hubs, or with IBM RS/6000 workstations.

Description

  • Copyright 1997
  • Dimensions: 7" x 9-1/4"
  • Pages: 416
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-632837-7
  • ISBN-13: 978-0-13-632837-7


63283-6

“I know how to do it on the mainframe, but what's the command under UNIX?”

More and more organizations are migrating to UNIX, leaving experienced programming staff frustrated by their lack of familiarity with the new environment. But mainframe skills are transferable!

Designed especially for mainframe professionals, UNIX for the Mainframer builds on existing computer knowledge to ease the technology transfer. Programmers, analysts, system analysts, database administrators, and consultants already know how computers work. This book maps that understanding to the UNIX paradigm without rehashing a lot of basic computing concepts or presuming prior familiarity with UNIX.

UNIX for the Mainframer provides a complete orientation to UNIX for users in transition. It is also an outstanding reference volume for looking up the answers to specific questions, for example:

  • “What's the command for ?????” - UNIX commands are mapped directly to the corresponding mainframe terms.
  • “What's a Shell Script?” - UNIX scripting languages are explained in terms of JCL, PROC's, CLIST, and REXX.
  • “How did these files get here?” - How to organize, specify, name, and retrieve UNIX files is detailed, along with full instructions for account configuration.
  • “How do you edit these files?” - Popular editors are reviewed and related to ISPF commands.
  • “What's going on deep down?” - A comparative history describes UNIX and mainframe operating systems and environments.

Appendices offer further resources for deciphering common error messages, converting data, comparing hardware, and accessing networks, along with general hints and suggestions for ongoing reading.

UNIX for the Mainframer is the only book that helps mainframers use their existing skills to get them up and running in the UNIX environment, fast.

“David Horvath has written an excellent introduction, tutorial, and reference for those mainframe programmers and administrators who need or want to become part of the larger computing and network world. It is solidly structured, technically sound, and more than passably readable.” Robert Slade, Internet Review Project.

Sample Content

Table of Contents



Dedication.


Preface.


Introduction.


Acknowledgments.


Trademarks and Copyright Acknowledgments.


Conventions.


1. Operating Systems and Environments.

UNIX History. What Is UNIX and How It Is Different From the Mainframe.



2. Files and Data.

UNIX Files. UNIX Directories. Filesystems. Filename Structure. Directory Name Structure and Pathnames. Moving From Datasetnames to UNIX File and Pathnames. UNIX Filename Conventions. Special UNIX Files. UNIX Tape File Access.



3. Utilities and Commands.

Logging In to UNIX. Terminal and Keyboard Behavior. Directory Navigation (cd and pwd Commands). Looking at Directories (the ls Command)—Replacement for ISPF Dataset List Utility. Wildcards and Filenames. Command Buffering. ISPF Browse and Edit Replacement—An Overview of UNIX Editors. IEBGENER and ISPF Move/Copy Utility Replacement. Copy, Move, and Link Commands (cp, mv, and ln). Common Errors and Problem Determination. Problem Determination—Permissions. Problem Determination—Available Space. Problem Determination—Used Space. Problem Determination—Limits on Resource Usage. IEFBR14 and ISPF Library and Dataset Utility Replacement. Delete and Create File Commands (rm and touch). Create, Delete, and Rename Directory Commands (mkdir, rmdir, and mv). ISPF Dataset List Utility Replacement find Command. Pipes and Redirection and the more Command. How To Get Help. Help Under UNIX—man, apropos, and what is Commands. Printing and Replacing ISPF Hardcopy Utility and /*ROUTE PRINT. UNIX Print Commands (lp and lpr). UNIX Print Status Commands (lpstat and lpq). Canceling UNIX Print Jobs (cancel and lprm Commands). Printing From Programs and Commands (Redirection to Printer). IDCAMS Replacement. Creating and Deleting Generation Data Groups. Creating and Deleting VSAM Datasets. ISPF SDSF or IOF Replacement. ps Command. who, finger, and w Commands. ISPF Foreground Processes and Command Replacements. ISPF Background Processes and Batch Submit Replacements. Job Control. Background Job Modifiers (nohup, nice, time, and timex Commands). Canceling Background Jobs and Commands. Job Scheduling—crontab and at Commands and the cron Daemon. cron table Format. crontab Command. at Command. JES2 /*ROUTE XEQ and /*XEQ Replacement. rsh and remsh Commands. rexec Command. ISPF Super-Compare Replacements. File Comparison Commands. diff, cmp, and comm Commands. bdiff, sdiff, and diff3 Commands. ISPF Search-For Replacement. grep Command. Regular Expressions for grep and egrep. egrep and fgrep Commands. Mimicking Search-For Word, Suffix, and Prefix Options. Summary.



4. JCL, PROCs, and CLISTs Become Shell Scripts.

Invoking and Exiting Shells. Creating a Simple Command Procedure. IKJEFTO1 (TSO in Batch) Replacement. What To Do With Batch JCL. Replacing Jobs in JCL With Shell Scripts. Where UNIX Looks for Programs and Scripts (the UNIX Path). Environmental Variables and Substitution. Replacing Jobs in JCL With Shell Scripts—Lines 9 through 90. Replacing Jobs and PROCs in JCL with Shell Scripts. Running Jobs. Sample Output—Job, Step, and Program Output—Simple Job Run Successfully. Sample Output—Job, Step, and Program Output—Simple Job Run Failed. Sample Output—Job, Step, and Program Output—Job/PROC Run Successful. Sample Output—Job, Step, and Program Output—Job/PROC Run Failed. Concatenating Files. Concatenated Datasets Through Temporary Files. Concatenated Datasets Through Named Pipes. Instream Proc Replacement. Additional Information on Redirection. Embedded SYSIN in Korn Shell. ISPF Retrieve or Command History. vi Command Line Editing Modes. emacs and gmacs Command Line Editing Modes. Summary.



5. Advanced Shell Script and Commands.

Korn Shell Meta-characters. Special Shell Variables. Additional Environmental Variable Substitution (Using Meta-characters). Korn Shell Flags. Restricted or Trusted Shells. Looping and Conditionals. for Loop. while Loop. until Loop. Ending Loops Early—Break and Continue. Testing Expressions. if/then - else - fi and elif/then Conditional Tests. case Statement. select Statement. Arithmetic Expressions and Related Commands (let, expr). Variable Attributes. More About Where UNIX Looks for Programs and Scripts. which, where, and alias Commands. Advanced Commands. File Security.



6. Editors.

Editing with vi. Creating a vi Configuration File ($HOME/.exrc). Browsing with vi. Heavy-duty vi Editing Example. Moving Around the Screen. Finding Text in vi (Moving to Specific Text). Joining and Splitting Lines. Adding and Replacing Text. Marking or Labeling Text. Changing Text. Deleting Text. Copying and Moving Text. Substituting Text. Moving From ISPF FIND and RFIND to vi. Moving From ISPF CHANGE and RCHANGE to vi. Command Summaries. Important vi Settings (:set Options). vi Command Summary. ex and ed Command Summary. Summary.



7. Account Configuration.

Bourne Shell .profile File. Korn Shell .profile and ENV Files. C Shell .login and .cshrc Files. C Shell .logout File. Other Configuration Files.



8. Third-Party Tools.

Programming Languages. 4th Generation Languages, Application Generators, and Application Development Environments. Other Development Tools. OLTP—CICS and Replacements. CASE Tools. Source Code Control and Configuration Management. Relational Databases. Other Databases and Data Access Methods. Middleware / Migration (Accessing Data on the Mainframe From Other Platforms). Code Translation. System Utilities. UNIX Sorting—An Overview. Replacement for SCRIPT—An Overview of Text Processing. Communications. An Overview of File Transfer. Other Sources of Tools. Summary and Conclusion.



Appendix A. Common Error Messages, Codes, and UNIX Signals.

Error Messages. Error Codes. UNIX Signals.



Appendix B. Hints and Techniques.

GDG Processing Under UNIX. gdg_idcm.ksh. gdg_use.ksh. gdg_del.ksh. rcp_gdg.ksh. Converting ASA Formatted Print Output. filter_asa.c. Mainframe Tape Processing. Comparing Sequential Files. compare_data.c. Converting Sequential Files to Line Sequential. Converting a Single Record Fixed Sequential File to Line Sequential. add_newline.c.



Appendix C. Data Conversion, ASCII and EBCDIC Charts.

Data Conversion—An Overview. Simple Data Conversion With the dd Command. Data Conversion Example Programs. swapbyte.cbl—Byte Order Swap Function. xlatecde.cbl—Character Set Conversion Function. xlatecde.cpy—Copybook Used by xlatecde.cbl. xlateuse.cbl—Program To Use xlatecde.cbl. xlateuse.ksh—Shell Script To Run xlateuse.cbl. ASCII and EBCDIC Chart.



Appendix D. Hardware Comparisons.


Appendix E. C Shell—An Overview.


Appendix F. Using TCP/IP Networks.

TCP/IP. TCP/IP Tools and Commands. TCP/IP Addresses. TCP/IP Commands. Other Internet Tools. SNA—IBM Systems Network Architecture.



Appendix G. References, Reading List, Other Sources.

Training. Local colleges (credit and non-credit). User Groups and Conferences. Books. Magazines/Newspapers. Glossary. Index.

Preface

Preface

You have just picked up YAUB (Yet Another UNIX Book). And you may be asking yourself why you should read this one instead of any of the other ones. The answer is simple: If you are a mainframe professional (programmer, analyst, project leader, DBA, etc.) and find yourself having to use the operating system generically known as UNIX, this book is for you.

The idea for this book came when I was working on a conversion project from the IBM mainframe to a UNIX machine. In addition to moving the code, we were supposed to help the staff learn the UNIX system. There were other departments in the same organization that were making similar transitions. Their mainframe professionals were very competent using the mainframe to get their job done, but were having trouble with the new operating system.

Because I am comfortable in both the mainframe and UNIX environments, I was called to help these people out. After they took training courses from outside vendors, they returned to their desks and were immediately hit with questions like “How do I do this?” They wanted to do something under UNIX that they were very quick and familiar with on the mainframe but had difficulty figuring out what to do in the new environment. While helping them solve their problems, one person remarked that he wished there was a book written for what he was going through.

I recommended several books that I had read and others that were on the market, such as UNIX for Dummies for example. The people with whom I was working, however, were no dummies and felt insulted at the idea of buying a book by that title. The introductory books were too simple, assuming little or no computer knowledge. But the more advanced books assumed that the reader knew certain things about UNIX already. Besides these problems, the books simply did not answer the question these people were asking: “I do X on the mainframe this way, how do I do it under UNIX?”

At about the same time, a new staff member joined the project, a person who was familiar with UNIX and another interactive operating system known as VMS, but did not know the mainframe. Fortunately, I gave a seminar a few years prior for VMS professionals on how to use the mainframe, so I made a copy of the handouts for the mainframe novice. The mainframe professionals remarked that they wished they could find a book that explained the UNIX operating system in terms with which they were familiar—much as the seminar materials did. That was the beginning of the idea to write this book. What you hold in your hands is the final result.

If you have questions about this book, you can contact me at UNIX_MF@COBS.COM. My Web page is at http://www.cobs.com/~dhorvath

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020