United States       Office of Administration
           Environmental Protection  and Resources Management
           Agency          National Data Processing Division
                        Research Triangle Park, NC 27711
&EPA   Guide to
           NCC  Services

-------
              ABOUT THIS MANUAL
                Depicts how your terminal screen should appear for
                the specified task.
                Indicates an address to write to for more informa-
                tion.
                Indicates telephone numbers to call for assistance.
                Indicates a note, an exception, or a cautionary state-
                ment.
    Ill
Stands for the User-ID.
                Stands for the account code.
lowercase
Indicates that you should substitute your data set or
other name. For example:

      //ddname DD SYSOUT=class

ddname is the name you assign to the statement.

class is the printout class such as A or F.

-------
UPPERCASE Indicates that you should type as is, for example, DD
                  SYSOUT in the sample above.

                  Points you to other sources or to online documenta-
                  tion for more detailed information.

                  A number of text data sets reside on the IBM main-
                  frame as usage aids to describe methods and specific
                  details about the software, utilities, and procedures
                  at NCC.  Often this online documentation includes
                  the latest release information provided by the vendor.
                  Online documentation data sets usually take the
                  following form:

                         JUSD.package. DATA

                  How to access (for full-screen users):

                  After you are logged on to TSO on the IBM, choose UK
                  BROWSE function  of ISPF and then enter the data
                  set name.

                  How to access (for line terminal users):

                  After you are logged on to TSO on the IBM, type the
                  following  at the READY  prompt for a list of the
                  particular data set's members:

                         LISTDS 'JUSD.package.DATA' M

                  A list of members appears on your screen. When you
                  have determined which member you want to read
                  through, type in the following at the prompt:

                         LIST 'JUSD.package.DATAdnember)'

                  You can now view the text one screen at a time.

-------
              READER'S COMMENTARY
Please use this form to express your opinions and comments concerning this
publication. We are particularly interested in your views concerning the
completeness, technical accuracy, and organization.

Please complete the following:

       *     Name:              	

       •     Telephone Number:    	

       *     Title:               	
             How do you use this publication?

             	   Frequently for reference.
             	   For introductory purposes to a subject
             	   For information on a specific topic.
             	   Other. (Please specify.)  	
       •     Comments (Please include page numbers and give
             examples.)
This form, along with any supporting material, should be sent to the
following address:

                   NCC-IBM USER SUPPORT
                   EPA-NCC
                   MD-34B
                   Research Triangle Park, NC 27711

Thank you for your comments.

-------
GETTING
STARTED

-------
Getting Started

-------
GETTING STARTED
          JANUARY 1989

        Revised January 1990
            Prepared by:


    US Environmental Protection Agency
     National Data Processing Division
       National Computer Center
        Research Triangle Park
           North Carolina

-------
                        Preface

Getting Started provides essential information for the new user
of the National Computer Center, including short descriptions of
services and registration procedures and detailed instructions
about logon.
                           ill

-------
CONTENTS
WHAT IS THE NCC?	1

      MISSION	1

      SERVICES	2
      Planning and Acquisitions	2
      Computer Operations	2
      Telecommunications	2
      Technical Support	3
      User Support	3
      Training	3
      Data Base Support Services	3
      Information Centers	4

LINKING TO THE NCC	5

      TELECOMMUNICATIONS NETWORK	5

      TELECOMMUNICATIONS SERVICE REQUEST	5

REGISTRATION	6

      ADP COORDINATOR	6

      TSSMS OFFICE	6

      REGISTRATION FORMS	6

      NON-EPA USERS	6

      YOUR USER-ID	7

-------
CONTENTS
 HELP IS AVAILABLE	8




      USER SUPPORT	8




      "PHONE BOOTH"	8



      CENTRALIZED PROBLEM MANAGEMENT	8




      TELECOMMUNICATION DEVICE FOR THE DEAF	8




 DATA PROCESSING SUPPORT SERVICES	9




      FUNCTIONS	9




      TAPE LIBRARY	9



      I/O CONTROL	9



      MICROGRAPHICS SERVICES	10




      KEYPUNCH SERVCIES	10




      COURIER SERVICES	10



 TRAINING OPPORTUNITIES	11




      NCC TRAINING	11




      CLASSROOM TRAINING	11




      COMPUTER-BASED TRAINING	11




      VIDEOTAPE TRAINING	11




      INTERACTIVE VIDEO INSTRUCTION	12
                        v\

-------
CONTENTS
 BUSINESS HOURS	13

      OPERATIONS	13

 USERMEMOS	14

      WHAT ARE USER MEMOS?	14

      PICKING YOUR SUBJECTS	14

      HOW TO SIGN UP FOR USER MEMOS	14

      QUESTIONS?	14

 COSTS OF SERVICES AND REFUNDS	15

      COSTS OF SERVICES	15

      RESOURCES	15
      Chargeback Algorithm	15
      Computer-Related Charges	15
      Fiscal Year Rates	15

      REFUNDS	16

      REFUND REQUEST FORMS	16

 LOGON PROCEDURES	17

       HARDWIRED OR DIAL-UP?	17

       HARDWIRED TERMINALS	17

       DIAL-UP TERMINALS	25
       Modems and Software	25
       Type of Link	25
       Hardwired "Look-Alike"	25
                          vn

-------
CONTENTS
LOGOFF PROCEDURES	31

     NORMAL LOG OFF	31

     ABNORMAL LOG OFF	31

SIGNON ANNOUNCEMENTS	32

     NEWS ALERTS	32

     BROADCAST MESSAGES	32

PFKEYS	33

     WHAT ARE THEY?	33

     DEFAULT ASSIGNMENTS	33

     DISPLAYING AND CHANGING PF KEY
     ASSIGNMENTS	35

INDEX	Index-1
                      vui

-------
 WHAT IS THE NCC?
MISSION
The National Computer Center (NCC) is one of the
largest, most modern, high-speed computer centers in
the nation.  Its mission is to support the Environ-
mental Protection Agency in the area of scientific and
administrative applications. The NCC serves EPA
users and other qualified agencies and contractors
through a vast telecommunications network which
allows the distribution of computer services to remote
locations. Along with hardware and software, and the
means to communicate data, the NCC provides user
support and problem solving services.

The major operations center of the NCC is in Research
Triangle Park (RTP), North Carolina.  The RTP facil-
ity has three principal data processing capabilities:

    •  IBM-compatible mainframes.

    •  DEC mini system operation.

    •  Micro/mainframe support for uploading
       and downloading data on personal com-
       puters.

-------
SERVICES
Planning and
Acquisitions
Computer
Operations
Telecom-
munications
All NCC operations are conducted at the center in
RTF and at the Washington Information  Center
(WIG). The WIG provides EPA Headquarters users
with remote access through its Logical Mainframe
(LMFO to RTFs IBM mainframes. The computer
center supports all 10 EPA regional offices, state
environmental offices and the EPA labs throughout
the country.

The NCC provides a variety of services for its users
in eight major areas.

Mainframe, mini,  or personal computer hardware
and software requirements, as well as telecommuni-
cations and operating system needs, are identified,
planned, and procured.

The mainframe processors are monitored and main-
tained through consoles at the NCC production con-
trol desk.

NCC Operations responds to your requests for mount-
ing tapes, maintaining printers,  and loading disk
packs. Periodic maintenance checks are performed
to keep the computer system operating efficiently.

The NCC plans, installs, and implements all data
communications services requested by the EPA. The
requests  take the form of a  Telecommunications
Service Request (TSR).  After the request is made,
the NCC plans each network connection, issues the
work orders to carry out the connection, and tracks
the work implementation through a data base. The
NCC also manages voice coimnunications(telephones)
for the Agency.

-------
Technical
Support
User Support
Training
Data Base
Support
Services
NCC's technical support staff installs and maintains
all telecommunications software  and system soft-
ware products.  These programs allow the regional
Logical Mainframes to communicate with RTFs IBM
mainframes. Technical support also reconfigures the
system for maximum computer  performance and
installs and maintains IBM systems software, oper-
ating systems, and programming languages.

User Support is the primary point of contact between
the NCC user community and the NCC's computers.
The User Communications Center in RTF solved over
20,000 user problems last year in many areas such as
graphics,  PCs,  fourth generation languages, pro-
gramming languages,  and information  systems.
Overall, User Support resolves problems associated
with approximately 75 software products. When you
dial User  Support, an operator works with  you to
define the problem.  The operator records this infor-
mation in  the central problem management system
and then directs the problem to the appropriate spe-
cialist for resolution, thus providing a record for later
referral.

NCC Training provides instruction in the software
services available in the various hardware configura-
tions at the NCC.  PC training is offered and con-
ducted by  the Washington Information Center.  Po-
tential students may select training from classroom
courses, computer-based training, or videotape in-
struction.

NCC Data Base Support Services supports the Cen-
tral Data  Base Administrator in all facets of central
data base  administration. These tasks include such
activities as operating the Development, Production,
and Test ADABAS Systems; testing, implementing,

-------
                    and maintaining all Data Base Management System
                    software; providing technical consultation to Project
                    Managers, developers, and Application Data Base
                    Administrators on ADABAS and the central environ-
                    ment; solving Central Data Base Management Sys-
                    tem technical problems; and controlling ADABAS
                    data bases, data base files, and disk space.

Information         Information Centers have a wide variety of PC hard-
Centers             ware and software. These centers provide users with
                    the opportunity to receive individual assistance and
                    to explore current data processing techniques. The
                    information centers provide a wide variety of services
                    such as the following:

                       •  Special seminars.

                       •  Technical library for all users.

                       •  User group meetings.

                       •  Telephone hotline service for PC hard-
                          ware and software  problems.

-------
LINKING TO THE NCC
TELECOM-
MUNICATIONS
NETWORK
TELECOM-
MUNICATIONS
SERVICE
REQUEST
A complex telecommunications network links the
NCC to the user. The NCC plans, installs, andimple-
m ents all data communications services for the Agency.

The Telecommunications Service Request is initiated
each time a user requests a connection to the network
or requires a change in his service. To obtain a TSR
form, contact your ADP Coordinator  or call the Net-
work Support Group:

              (FTS) 629-4506
              (919) 541-4506

Users in the Washington area should contact the WIC
Telecommunications Group:

              (202) 382-HELP

If you have any questions or problems completing the
form, contact the Network Support group or the WIC
Telecommunications group.

After the TSR form is completed, a planning special-
ist may conduct further discussions with you to arrive
at the best possible network configuration. The NCC
works with you to meet your requirements and over-
sees the  satisfactory completion of your connection.

-------
REGISTRATION
ADP
COORDINATOR
TSSMS
OFFICE
REGISTRATION
FORMS
NON-EPA
USERS
The ADP Coordinator is the principal contact for the
user who wants to access the NCC's computers. The
ADP Coordinator initiates requests for User-IDs and
ensures that users who leave the organization no
longer have access to the computer. In brief, the ADP
Coordinator establishes accounts, registers users,
and controls the expenditure of time sharing funds.

The Time Sharing Services Management System
(TSSMS) Office controls the registration of accounts
and users who access the NCC's computers.  The
TSSMS Office, in conjunction with the Billing Serv-
ices group, collects data on the utilization of re-
sources and  produces reports which track each
organization's time sharing expenditures against its
ADP time sharing budget.

Registration forms are available through your ADP
Coordinator who will assign you an account number
through which your organization will be billed for
your use of computer resources.

NCC  resources  are  available to  non-EPA  users
through Interagency  Agreements (lAGs).  IAG ac-
counts can be set up for state environmental agencies
or other federal agencies who would regularly use the
NCC's computer resources.  For more information,
contact:

             IAG Coordinator
             EPA
             MD-34 NCC
             RTP.NC 27711

Other users who have only occasional need for EPA
computer-generated data are better served through
the National Technical Information Service (NTIS).

-------
                  NTIS sets up an account through which billing for
                  EPA services and computing resources is accomplished.
                  For more information, contact:

                                US Department of Commerce
                                NTIS
                                5285 Port Royal Road
                                Springfield, VA 22161

YOUR            When registration has been completed, you will re-
USER-ID         ceive  notification of your three-character User-ID,
                  initial password, and account codes. This information
                  is required each time you sign on  to the NCC-IBM.

-------
 HELP IS AVAILABLE
USER
SUPPORT
"PHONE
BOOTH"
CENTRALIZED
PROBLEM
MANAGEMENT
 TELECOMMUNI-
 CATION DEVICE
 FOR THE DEAF
The NCC has a comprehensive user support service.
It provides user technical assistance; problem diag-
nosis, solution, and tracking; and consultation for all
NCC methods, procedures, and software.

User Support is the primary point of contact bet ween
the NCC user community and the NCC-IBM facility.
You need only call one telephone number to request
assistance, no matter what the problem. The techni-
cian screens your call to decide which NCC specialist
or department can best handle your problem. The
telephone numbers  for this comprehensive  assis-
tance are:

             (FTS) 629-7862
             (919) 541-7862
             (800) 334-2405 (outside NC)

The technician needs your name, User-ID, and tele-
phone number, and, occasionally, your account num-
ber as well as a brief description of your problem. If
the problem is network related, you must also supply
your terminal ID number. All this information is en-
tered into the  Centralized Problem Management
(CPM) system to track the problem and document its
resolution. You are given a Problem Management
Record (PMR) number which may be used later. So,
it is a good idea to write this number down.

If you are hearing impaired, the NCC urges you to
take advantage of the Telecommunication Device for
the Deaf (TDD) at:

             (FTS) 629-2586
             (919) 541-2586

Be sure to include  enough information to open a
PMR.
                               8

-------
DATA PROCESSING SUPPORT SERVICES
FUNCTIONS
TAPE LIBRARY
 I/O CONTROL
As a part of the Operations department, Data Proc-
essing Support Services (DPSS) performs a variety of
related functions such as managing the tape library;
performing Input/Output (I/O) control; and schedul-
ing and overseeing micrographics,  keypunch,  and
courier services.

DPSS is responsible for all computer tapes stored at
the NCC. With a library numbering in the thousands,
the tape librarian uses an online Tape Management
System to assist in inventory control, utilization and
ownership reporting, replacement of defective tapes,
purchase of new tapes, and initialization of volumes
at regular intervals.  If you require tapes for storing
computer data or sending it offsite for micrographic
services, the tape library stores and tracks your tapes
and also ensures that the requested tapes are pulled
for use in your processing.

With the shift to electronic media, use of punched
cards has faded.  The emphasis is on retrieving,
separating, and  distributing  computer-generated
printouts and tapes.  I/O Control personnel prepare,
log, and ship output; control visitor access to the
computer room; and process "foreign"  tapes (those
tapes not owned by the NCC). If you submit a job for
printing, for example by the laser printer, I/O Control
picks up your printout from the printer room, ensures
that it goes to your assigned bin, and further ensures
that no unauthorized person has access to the con-
tents of your bin.

-------
MICROGRAPHICS
SERVICES
KEYPUNCH
SERVICES
COURIER
SERVICES
DPSS receives and monitors your requests for micro-
graphics services. They can help you set up the
specifications for microfiche output. These jobs are
sent to an offsite contractor on a computer tape, and
then the microfiche are distributed as output. The
WIG also provides the same service for EPA Head-
quarters users.

DPSS receives your requests for keypunch services,
logs  the request, pulls  any  requested tapes, and
forwards the tape with specifications to the keypunch
contractor. When the job is completed and returned,
DPSS notifies you or for wards the tape. The WIC also
provides the same service for EPA Headquarters
users.

DPSS coordinates the courier service at RTP. Twice
a day output is dispatched via the courier to various
RTP locations. Input is also delivered twice a day to
the NCC. The WIC also provides the same service for
EPA Headquarters users.

Direct any questions or  probems concerning DPSS
activities to User Support at the following telephone
numbers:

             (FTS) 629-7862
             (919) 541-7862
             (800) 334-2405 (outside NC)
                               10

-------
TRAINING OPPORTUNITIES
NCC TRAINING
CLASSROOM
TRAINING
 COMPUTER-
 BASED
 TRAINING
VIDEOTAPE
TRAINING
NCC Training provides a choice of methods for users
to learn about the software services available on the
various hardware configurations at the NCC.

Traditional classroom instruction is scheduled on a
quarterly basis, both at RTP and at the WIC. Courses
can also be provided at any location specified by the
requestor.  The classes are taught with a hands-on
approach. The instructor explains a concept, the stu-
dents practice on the terminal or PC, and then they
can refer to the customized training manuals pro-
vided to reinforce the learning process.  The classes
are paced so that adequate time is provided for ques-
tions and answers.

IBM Mainframe and DEC/VAX training are the re-
sponsibility of the RTP training staff; PC training is
conducted  by the WIC training staff.

Computer-based training (CBT) is a system of learn-
ing that is dependent on student interaction with the
computer.  The computer becomes the instructor and
responds to answers from the student. CBT instruc-
tion is self-paced, menu-driven,  and  easy-to-use.
Computer-based training for the NCC-IBM is pro-
vided via the PHOENIX system. PHOENIX courses
are available to any user who has access to the NCC-
IBM system with  a full-screen 3270-compatible ter-
minal.

The NCC has contracted with a major  supplier for
videotape training. The curriculum includes a vari-
ety of topics, such as data processing tools, manage-
ment, and communication skills. Catalogs are pro-
vided to Regional ADP Coordinators.
                               11

-------
INTERACTIVE
VIDEO
INSTRUCTION
NCC Training also makes available interactive video
instruction (TVIX IVI is an exciting new generation
of technology that is made up of a personal computer,
a laser videodisc player, a touch screen monitor, and
courseware for the PC. IVI learning centers have
been established at various regional offices and se-
lected laboratories.

More information about training services, course syl-
labus,Tegistration requirements, and quarterly sched-
ules are available through  the NCC Training Office.
Contact them through User Support:

              (FTS) 629-7862
              (919) 541-7862
              (800) 334-2405 (outside NC)

For information about PC  training and registration,
contact the WIC Training Office:

              (FTS) 475-7201
              (202) 475-7201
                                12

-------
BUSINESS HOURS
OPERATIONS
The scheduled hours of operation of the various NCC
facilities are shown below. Times are Eastern time
                  zone.
Facility
NCC Computer
TSO Services
Telecom.
CICS
AD ABAS
1/0 Control
User Support
Open
0700 Mon.
0700 Mon.
0700 Mon.
0700 Mon.
0700 Mon.
0700 Mon.
0800 Mon.
• 2000 Sun.
- 2000 Sun.
- 2000 Sun.
- 2000 Sun.
- 2000 Sun.
- 1800 Sat.
- 1900 Fri.
Closed
2000 Sun.
2000 Sun.
2000 Sun.
2000 Sun.
2000 Sun.
1800 Sat.
1900 Fri.
- 0700 Mon.
- 0700 Mon.
- 0700 Mon.
- 0700 Mon.
- 0700 Mon.
- 0700 Mon.
- 0800 Mon.
                  Exceptions to this schedule may occur because of
                  maintenance or system testing. Changes are posted
                  to the online data set JUSD.HOURS.
                             13

-------
 USER MEMOS
WHAT ARE
USER MEMOS?
PICKING YOUR
SUBJECTS
HOW TO
SIGNUP
FOR USER
MEMOS
QUESTIONS?
User Memos are our way of keeping you informed of
new products, enhancements, or changes in NCC 's
policies. They are our principal means of sending out
needed information. For example, the NCC takes
into consideration your notification  of  changes
through the User Memos when granting or denying
refunds. User Memos are paper documents usually
1-4 pages long that are mailed to your address or
placed in your bin.

NCC has established a communications system for
disseminating User Memos. This system allows you
to receive only  the types of information  that you
request. A data base contains your profile informa-
tion such as name, address, User-ID, and phone
number as well as your user interest keys.  The
interest keys allow User Memos to be distributed
only to those users who have expressed an interest in
a particular category. For example, if you only use
the IBM computer, your interest key can be set  to
block User Memos to you concerning DEC VAXhard-
ware.  Interest keys can be added or deleted at any
time.

Shortly after you  become a registered user with a
User-ID, the NCC Communications and  Training
Office will send you a User Profile Worksheet to be
completed. Unless you return the User Profile Work-
sheet, you will not receive User Memos.

If you have questions or need help completing the
User Profile Worksheet, contact NCC Communica-
tions and Training:

              (FTS) 629-7862
              (919) 541-7862
              (800) 334-2405 (outside NC)
                              14

-------
COSTS OF SERVICES AND REFUNDS
 COSTS OF
 SERVICES
 RESOURCES
 Chargeback
 Algorithm
 Computer-Related
 Charges
 Fiscal Year Rates
         MORE
         INFO
The IBM system is viewed as an Agency computing
environment that includes the NCC-IBM mainframe
and the installed base of Regional Logical Main-
frames.  The cost of providing services using this
network of hardware is recovered through a nonprofit
chargeback system. IBM chargeback rates are set
such that job processing charges are normalized within
the Agency's IBM computing environment. The CPU
rates for the WIG, Cincinnati, NEIC, and regional
Logical Mainframes are scaled to achieve uniform job
costs across all the IBM computers in the Agency. In
short, the system was designed to be fair, simple, pre-
dictable, and repeatable.

Dollars  charged to you are  determined by the re-
sources  used and  the level of service requested.
Resources are divided into computer job components
and computer-related resource components.

Computer job  component costs are  determined by
applying the NCC chargeback algorithm. These costs
include such items as Central Processing Unit (CPU)
rates and Execute Channel  Program (EXCP) com-
mands.

Computer-related charges are those components not
directly tied to computing time and memory, such as
data storage, archive tape storage, microfiche, key-
punch, etc.

Once a year the NCC reviews its chargeback struc-
ture and adjusts to new or changed requirements.
The costs are then set for the fiscal year.

Cost components are discussed in detail in the online
data set JUSD.USERS.REFER(COSTS).

-------
REFUNDS
 REFUND
 REQUEST
 FORMS
         MORE
         INFO
Each day User Support receives a list of the jobs that
were cancelled the previous day. User Support then
notifies the user and may, if warranted,  initiate a
refund request. Additionally, any user may request
a refund for the costs associated with the job which
fails due to an error by the operator, a hardware
failure, or an error in the system software or one of the
supported  application packages.  Refunds are not
granted for such situations as the job being run at a
higher priority to assure its turnaround in a certain
time period.  Refunds may also be requested for
miscellaneous changes such as disk rental, delivery,
tape usage, etc.

Refund request forms may be printed from the online
data set JUSD.USERS.REFER(SAMPFORM). The
completed form along with all documentation sup-
porting the request should be sent to:

              NCC-IBM User Support
              EPA NCC
              MD-34B
              RTP.NC 27711
              Attn: Refund Request

More details on refund requests are available in the
online data set JUSD.USERS.REFERCREFUNDS).

If you have questions or need help completing the
Refund Request, contact NCC User Support:

              (FTS) 629-7862
              (919) 541-7862
              (800) 334-2405 (outside NC)
                                16

-------
LOGON  PROCEDURES
HARDWIRED
OR DIAL-UP?
HARDWIRED
TERMINALS
In order to use the NCC IBM mainframe, you must
have a User-ID and a terminal linked to the NCC.
This link can be through hardwired equipment which
does not require dialing or through a dial-up modem
hooked to your terminal. Let's address the hardwired
terminals first. Discussion about dial-up terminals
then follows.

Firstmake sure that your terminal is turned on. If you
are hardwired to the NCC, your screen should appear
like the one below. If it does not, press the RE5ET key
or the ENTER key and the screen should appear; or
turn the terminal off and then on again.  If it still does
not appear, call User Support.
        gaga
                          WELCOME TO THE
                  US ENVIRONMENTAL PROTECTION AGENCY
                     TELECOMMUNICATIONS NETWORK

                     ENTER COMMAND OR M FOR MENU
                012/001 0-031 FT
                              17

-------
If you press M and ENTER, the following menu screen
will appear:
r
US EPA TELECOMMUNICATIONS
KETWORKMENU TERM T260624
15 20 Tuesday August 23, 1966 MODEL 2
NATIONAL COMPUTER CENTER
PFKEY
PF13
PF14
PFI9
PF9
PFIO






SELECTION SERVICE
PCICS ClCS-Productlon
DCICS CiCS-Oevelooment
TSO TSO-KCC
EMAIL EMAIL ACCESS
ARBITER Arbiter






LOGICAL MAINFRAME
PFKEY SELECTION SERVICE
PFI5 NY TSO-New York LMF
PFI6 DV TSO-DenverNEICLMF
PFI7 WIC TSO-Vtesh Info Center
PF20 5E TSO-SeattleLMF
PF2I AT TSO-Atlanta LMF
PF22 DA TSO-DallasLKF
PF23 KC TSO-Kansas City LMF
PF24 PH TSO-Phlladelphla LMF
PF2 Cl TSO-Cinclnnati LMF
PF3 BN TSO-Boston LMF
PF4 CH TSO-Chlcago LMF
PF5 5F TSO-San Francisco LMF
HIT PFKEY OR ENTER SELECTION •
gflงja 012/001 0-0 31 FT
.
When the logon process becomes routine, you may
bypass this menu screen by entering a command
such as TSO (for.the NCC's Time Sharing Option) or
by entering the code for another machine or LMF
that allows you access such as NY for the NY LMF.
Note the terminal ID number in  the upper right-
hand corner. You may need this number to report a
network problem. It's a good idea to copy it down so
that you can refer to it later if the hardware malfunc-
tions and does not allow you to look it up.
            18

-------
               If you choose, for example, TSO at the  NCC, the
               following will appear:
 	TSO/E LOGON	T260624
PFI/PF13 —> HELP  PF3/PF15 ---> LOGOFF     PAI --•> Attention  PA2 •••> Reshow
   ENTER LOGON PARAMETERS BELOW           RACF LOGON PARAMETERS
   USERID    ••-> |
   PASSWORD -—>                        NEW PASSWORD •ซ>
   PROCEDURE •-•>                        GROUP IDENT    ••->
   ACCTNMBR—>
   FIMAS    —>                        BIN NUMBER
   SIZE     —>                        SYSOUT DEST
   COMMAND  •••>

   ENTER AN 5 BEFORE EACH OPTION DESIRED BELOW
     -NOMAIL          -NONOTICE         -N05UMMARY       -CANCEL
                                   012/001 0-031 FT
                Just type in your three-character User-ID and press
                the ENTER key.
                               19

-------
               The next screen shows the cursor sitting at the pass-
               word entry point.  If you have logged on before with
               this User-ID, you need only to type in the password
               (it will not be displayed) and press ENTER.
 	TSO/E LOGON	T260624
PFI/PF13"->HELP  PF3XPF)5 —> LOGOFF     PAI •"> Attention  PA2 =ซ> Reshow

   ENTER LOGON PARAMETERS BELOW          RACF LOGON PARAMETERS

   USERID   "•>  III

   PASSWORD -">  |                   NEW PASSWORD =ซ>

   PROCEDURE ซ=>  JEPATSO               GROUP I DENT  ซ->

   ACCTNMBRซ=>  ACCT

   FIMAS    —>  FFFFMUIW              BIN NUMBER   —>   Bbbb

   SfZE     ™ >                      SYSOUTDEST  —>

   COMMAND  —>


   ENTER AN'S BEFORE EACH OPTION DESIRED BELOW

     -N3MAIL         -NONOTICE        -NOSLMMARY       -CANCEL
   gajgja                      012/001  D-D 31 FT
               If you are logging on for the first time with this User-
               ID, you must change your password and complete the
               required fields on the screen. Your password is the
               same as your User-ID when you log on for the first
               time.  So, to  change it, type your User-ID in the
               password field, TAB to the new password field, type
               the new password and press ENTER. Then the cursor
               is positioned for you to retype the new password for
               verification. As soon as you press ENTER, your new
               password becomes effective.
                            20

-------
The other required fields  are  PROCEDURE,
NUMBER, FIMAS, and BIN NUMBER. Procedure is
$EPATSO for TSO users.  Account number is the 4-
character code assigned to you for billing purposes.

The Facility Impact Monitoring and Analysis System
(FIMAS) code identifies a specific ADP system or
activity and associates computer usage statistics with
that activity.  The FIMAS code is depicted as follows:

       ffffmuuu

Where fflff is  a 4-character/digit code, m is a mode
character, and uuu is an optional 3-position field for
your use.  Modes can be one of the following:

       F     Feasibility study.
       D     Development of software.
       T     Testing.
       M     Maintenance.
       P     Production.
       R     Retrieval.
       U     Update.

Consult with your ADP Coordinator for more informa-
tion on FIMAS codes.

Bin number is the NCC assigned mailing code for your
printouts.

After these fields are completed at the first logon, they
will appear the next time you logon. After all required
fields are completed, press ENTER.
             21

-------
                  Note the X and the clock at the bottom of your screen.
                  This indicates that the IBM is "busy" carrying out
                  your instructions. You cannot type anything more
                  until it disappears.
                                 012/001  0-031 FT
\
                  Another picture (as shown below) indicates that you
                  tried to type while the IBM was busy. Just press the
                  RESET key to clear up this situation.
       gflgaX?+             012/00!  0-031 FT
                  You must also change the password in the following
                  cases:

                      •   If a "PASSWORD EXPIRED" message
                         appears.

                      •   If your password has been reset by User
                         Support.

                  To change your password:

                      •   Type the current password.

                      •   Press TAB
                              22

-------
    •   Type the new password.

    •   Press the ENTER key.

A password has the following characteristics:

    •   Contains from 6 to 8 alphanumeric or
       national characters ($, #, or @). There
       must be at least  one alpha and one
       numeric character.  Blanks are not al-
       lowed.

    •   Is unique to the associated User-ID and
       cannot equal the User-ID.

    •   Must be changed at least every 90 days.
       (Will be date stamped when changed.)

    •   Cannot be changed back to either of the
       10 most recently used passwords.  (In
       other words, you can't use the current or
       the previous 10.)

    •   Must not be included with any output.

    •   Must be obliterated on terminal devices
       through a clear screen or overprint.

    •   Should  be memorized and not written
       down.

The next screen, as shown below, is the end of the
logon process. Note the list of NEWS ALERT titles.
NEWS ALERTs are discussed in more detail  in  a
separate topic of this manual. The READY prompt in-
dicates that you are in the TSO environment and may
enter TSO commands.
            23

-------
   ICH700011  111      LAST ACCESS AT 15 25 47 ON MONDAY, AUGUST 22, 1988
   IKJ56455I  III   LOGON IN PROGRESS AT 15 38 24ON AUGUST 23. 1988

   08/18/88 FOCUS 553 AVAILABLE FOR TESTING. REVISD         -SEE NEV/S ALERT1
   08/11/88 UPGRADED WIC PRINTER LIMIT                     -SEE hฃWS ALERT2
   08/11/88 NATURAL DYNAMIC PARAMETER AVAILABILITV         -SEE NEWS ALERT3
   READY
I      gfigja                         012/001 0-031 FT        I
                                   24

-------
DIAL -UP
TERMINALS
Modems and
Software
Type of Link
Hardwired
"Look-Alike"
Dial-up terminals, often called line terminals, can be
linked to the NCC in a variety of ways. The common
denominator is the modem which requires you to dial
a telephone number before the link is complete.

Modems are the dialing hardware which link  the
telephone line to your terminal. Gettingyour modem's
"attention" through your keyboard may require help
from someone at your site who is familiar with your
modem and terminal. Once you know how to "talk" to
your modem, you must determine  the telephone
number to dial.  Along with the modem, you need
some type of telecommunications software (for ex-
ample, Crosstalk or KERMIT).

The Network Support Group has, in most instances,
worked with your site's  management to establish
communications. You may be linked to the NCC
through  the Washington Rotor,  TYMNET, or  the
Develcon. The type of linkage generally  depends on
your location and how many other users are in your
area. Try to determine the type of link that has been
established or what telephone number you must dial
for access.  If your local sources do not have this
information, call User Support at:

              (FTS) 629-7862
              (919) 541-7862
              (800) 334-2405 (outside NC)

At some sites, you may be able to link to the NCC in
a "full-screen" manner.  The Terminal/Controller
Processor (TCP) allows  you to use the full-screen
capabilities much like a user with a hardwired termi-
nal.  In that case, after you have chosen TCP, follow
the logon procedures for hardwired terminals previ-
ously discussed.
                               25

-------
                      When you have successfully established a connection
                      to the NCC, the following menu will appear.
f

\
        WELCOME 70 THE ENVIROM1ENTAL PROTECTION AGENCV NATIONAL COMPUTER CENTER


                     Please enter one of the following selections

                      IBHPSl for IBM
                      TCP for IBM 3270 EMULATION
                      VAXA for VAX SYS A
                      VAXB for VAX SYS 8
                      EMAIL for EMAIL
         Enter se lection
                      To choose the NCC IBM mainframe for a line termi-
                      nal, type  IBMPSI and press   ENTER.  Then  the
                      following menu appears.
                                   26

-------
Enter selection IBMPSl
CONNECTED
connected 310600908827/110504

U S EPA (TTY-X25-IBMJ
   A TSO - NCC
   B NY
   C NEIC
   D WIC
   E SEATTLE
   F ATLANTA
   G DALLAS
   I KANSAS CITY
   J PHILADELPHIA
   K CINCINNATI
   L SAN FRANC I SCO
   M BOSTON
   N CHICAGO

SELECTION ">
                 To access  TSO  at NCC, select A and then press
                 ENTER. The other selections are LMF sites. Then the
                 following message appears.
  SELECTION t A
  IKJ56700A ENTER USERIO •
                               27

-------
             If this is the first time you have logged on with this
             User-ID, your profile reflects the NOPROMPT char-
             acteristic. After you type your User-ID and press
             ENTER, the following will then appear.
SELECTION ? A
IKJ56700A ENTER U5ERID-
III
IKJ56706I MISSING PASSWORD FOR III
IKJ56400A ENTER LOGON OR LOGOFF-
             The system is askingfor a single line logon command.
             Type in the following and use your assigned values:
             LOGON m/pswd A(acct) S(nnnn) PROC(SEPATSO)

             
-------
              The following will then appear.
LOGON ilt/pswd A(acct) S(nnm> PROC(SEPATSO)
ICH700011(11       LAST ACCESS AT 13 50 42 ON TUESDAY, AUGUST 30, 1988
IKJ56455I III LOGON IN PROGRESS AT 140001 ON AUGUST 31. 1988
ENTER FIMAS ID -
              The FIMAS code identifies a specific ADP system or
              activity and associates computer usage statistics with
              that activity.  The FIMAS code is depicted as follows:

                     ffifmuuu

              Where fffT is  a 4-character/digit  code, m is a mode
              character, and uuu is an optional 3-position field for
              your use.  Modes can be one of the following:

                     F       Feasibility study.
                     D       Development of software.
                     T       Testing.
                     M      Maintenance.
                     P       Production.
                     R       Retrieval.
                     U       Update.

              Consult with your ADP Coordinator for more infor-
              mation on FIMAS codes.

              After you  have typed the FIMAS code and pressed
              ENTER, a list of NEWS ALERT titles appears. NEWS
              ALERTs are  discussed in more detail in a separate
              topic of this manual.

              The next screen,  as shown below, is the end  of the
              logon process.
                           29

-------
                                                                      •\
 ENTER FIMAS ID -
 ffffmuuu

 08/18/88 FOCUS 55 3 AVAILABLE FOR TESTING, REVISD         -SEE NEWS ALERT I
 08/11/88 UPGRADED WIC PRINTER LIMIT                    -SEE NEWS ALERT2
 08/11/88 NATURAL DYNAMIC PARAMETER AVAILABILITY         -SEE NEWS ALERT3
 READY
                   You can now change your profile  to prompt you for
                   your logon  information.  At  READY, just type the
                   command PROF ILE PROMPT and press ENTER.  The
                   following logon sequence will appear the next time
                   you log on.
  IKJ56700A ENTER U5ERID -
  III
  IKJ56714A ENTER CURRENT PASSWORD FOR 111
  DSwd
  ICH700011 111       LAST ACCESS AT 15 34 38 ON WEDNESDAY, AUGUST 31, 1988
  IKJ56700A ENTER ACCOUNT NUMBER -
  acct
  IKJ55700A ENTER PROCEDURE NAME -
  Seoatso
  IKJ56455! Ill LOGON IN PROGRESS AT 1351 02 ON SEPTEMBER 1. 1988
  rrrfmuuo

  OB/18/88 FOCUS 55 3 AVAILABLE FOR TESTING, REVISD         -SEE NEWS ALERT I
  08/11/88 UPGRADED WIC PRINTER LIMIT                    -SEE NEWS ALERT2
  08/U/88 NATURAL DYNAMIC PARAMETER AVAILABILITY         -SEE NEWS ALERT3
  READY
.

                                 30

-------
LOGOFF PROCEDURES
NORMAL
LOGOFF
ABNORMAL
LOGOFF
To log off, you must type the following command at the
READY prompt:

      LOGOFF

If you are in an application, you should "back out"
using normal end and/or save commands (or PF keys)
to return to the READY prompt. Then type LOGOFF.

If you have not completed the logon process and want
to "quit," you have several options:

   1. Continue the logon process until you get
      the READY prompt. Then type LOGOFF.

   2. Abort your session by turning off your
      terminal and breaking the communica-
      tions link.

   3. Call User Support at one of the telephone
      numbers listed below. They can termi-
      nate your session.

            (FTS) 629-7862
             (919) 541-7862
             (800) 334-2405 (outside NC)
                             31

-------
SIGNON ANNOUNCEMENTS
 NEWS ALERTS
BROADCAST
MESSAGES
NEWS ALERTs communicate important informa-
tion to NCC users. Each time you logon, whether
through a hardwired terminal or a dial-up terminal,
a list of NEWS ALERT titles appears. To read the
entire text of the NEWS ALERT message, type the
following at the READY prompt:

            NEWS*

Where * is the 1 or 2-digit NEWS ALERT number.

In  addition, LI5TBC will relist the NEWS ALERT
titles.

Broadcast messages are sent out to all users signed
on to TSO.  They may be the first appearance of a
NEWS ALERT or they may be im portant in structions
to  the entire user community such as "LOGOFF.
SYSTEM GOING DOWN."

Other types of broadcast messages are system gener-
ated, such as messages only you receive that inform
of a completed job or notify  you of a message from
another user.
                            32

-------
PF KEYS
WHAT ARE
THEY?
DEFAULT
ASSIGNMENTS
Program Function (PF) keys are a shortcut method of
entering commands on a full-screen IBM 3270-type
terminal (or a terminal that acts like a 3270 through
TCP).  PF keys are activated when you use the
Interactive System Productivity Facility (ISPF) and
their assigned functions are stored in your TSO/ISPF
profile.  These keys, usually  labeled PF1 -  PF12
(alternate) and/or PF13 - PF24 (primary), may re-
quire the use of the ALT key in combination with the
appropriate number key  on some  keyboards  (for
example, pressing 5 while holding down A_T yields
PF5). The default assignments are specified in ISPF
as follows:
PF KEYS  LABEL
                    1   13   HELP
                    2   14   SPLIT
                    3   15   END
                    4   16   RETURN
FUNCTION

Provides access to help
screens for more infor-
mation on a subject.

Divides screen into 2
screens for working in 2
concurrent ISPF
sessions at the same
time.  Dividing line is
at the cursor.

Returns you to the next
higher level panel, or in
other words, backs you
out one step at a time.

Returns you directly to
the Primary Option.
                              33

-------
PFKEyg  LABEL


  5  17   RFIND



  6  18   RCHANGE



  7  19   UP
  8   20   DOWN
  9   21   SWAP
10   22
11   23
12   24
LEFT


RIGHT


RETRIEVE
FUNCTION
Menu.

Repeats the last find
command that was en-
tered.

Repeats the last change
command that was
entered.

Scrolls up. Number of
lines is determined by
setting SCROLL field
on the current ISPF
panel display.

Scrolls down. Number
of lines is determined
by setting SCROLL
field on the current
ISPF panel display.

In split screen mode,
moves cursor from one
screen to another.

Scrolls current screen
display to the left.

Scrolls current screen
display to the right.

Recalls, at the com-
mand/option arrow, the
last command entered.
           34

-------
DISPLAYING
AND CHANGING
PFKEY
ASSIGNMENTS
         MORE |
         INFO
PFkeys can be reassigned to functions of your choice,
such as the editingfunctions of text entry, text split, or
text flow or to multiple operations such as shortcut
menu choices through the path to place you in the
Spool Display and Search Facility (SDSF). In fact,
some applications automatically assign different val-
ues to the PF keys (for example, the ISPF tutorial).

To view the keys, their associated commands, and
their labels under ISPF, select ISPF option 0.2 or
enter the following command at the option or com-
mand arrow (===>):

              KEYS

You may also display the keys at the bottom of your
screen by using the PF SHOW command. The display
will remain until you reverse the action by 'PF5HOW
OFF1.

To change  the default  PF key assignments,  enter
'PF5HOW TAI LOR' and overtype the values you wish
to change with new commands or labels.

A more detailed discussion of PF keys may be found in
the ISPF tutorial (Option T from the primary options
menu). Go to the tutorial index and enter K.
                               35

-------
'NDEX
A








B


Abnormal logoff
Aborting logon
Access (how to obtain)
Account code
AD ABAS
AD ABAS, business hours
ADP Coordinator
Assignment, for Program Function keys
Assistance
Billing
Broadcast message
Business hours
31
31
6
7,28
3
13
5,6,11,21
33
8
6,15
32
13
CBT (Computer-based training)               11
Central Processing Unit                      15
Centralized Problem Management              8
Chargeback algorithm                        15
Charges                                    15
CICS, business hours                        13
Classes                                    11
Classroom training                          11
Closed hours                                13
Communications, network                     5
Communications systems, for users            14
Communications, voice                        2
Computer Operations                         2
Computer-based training                     11
Computer-related charges                    15
Costs of services                             15
Courier services                             10
Courier services, WIC                        10
Courses                                    11
CPM (Centralized Problem Management)        8
CPU (Central Processing Unit)                15
Crosstalk                                   24
          Index-1

-------
INDEX
                   Data Base Support Services                    3
                   Data Processing Support Services              9
                   Deaf, Telecommunication Device for            8
                   DEC/VAX training                          11
                   Description, NCC                             1
                   Develcon                                   25
                   Dial-up terminal                            25
                   DPSS (Data Processing Support Services)        9

                   Education                                  11
                   EXCP (Execute Channel Program)             15
                   Execute Channel Program                    15

                   Facility Impact Monitoring
                          and Analysis System               21, 29
                   FIMAS (Facility Impact Monitoring
                          and Analysis System)              21, 29
                   Fiscal year rates                            15
                   Foreign tapes                                9
                   Full-screen terminal                      17, 25

                   Hardwired terminal                          17
                   Hardwired terminal, look-alike                25
                   Help                                        8
                   Hotline, PC                                  4
                   Hours of business                            13

                   I/O Control (Input/Output Control)              9
                   IAG (Interagency Agreement)                  6
                   IBM Mainframe training                     11
                   Information Centers                          4
                   Input/Output Control                         9
                   Input/Output Control, business hours          13
                   Interactive System Productivity Facility        33
                   Interagency Agreements                       6
                   ISPF (Interactive System Productivity
                           Facility)                            33
                             Index-2

-------
 INDEX	

K                 KERMIT                                  25
                   Keypunch services                          10
                   Keys, Program Function                     33

|_                 Line terminal                              25
                   Link', telecommunications                    25
                   LMF (Logical Mainframe)                     2
                   Logical Mainframe                           2
                   Logoff procedures                           31
                   Logon procedures                           17
                   Logon statement, for dial-up terminal          28

M                 Messages                                  32
                   Microfiche                                 10
                   Micrographics services                       10
                   Micrographics services, WIG                  10
                   Mission of the NCC                           1
                   Modem                                    25

ty                 National Technical Information Service         6
                   NCC computer, business hours               13
                   NCC services                                2
                   NCC's mission                               1
                   Network Support Group                      5
                   New user                                   6
                   News alert                           23, 29, 32
                   Non-EPA users                              6
                   Normal logoff                              31
                   NTIS (National Technical
                          Information Service)                   6

Q                 Open hours                                13
                   Operations, Computer                        2

p                 Password                                7,28
                   Password, changing                      20, 22
                   Password, characteristics                    23
                            Index-3

-------
 INDEX
                   PC training                              3,11
                   PF keys (Program Functions keys)             33
                   PHOENIX courses                          11
                   Phone booth                                 8
                   Planning and Acquisitions                     2
                   PMR (Problem Management Record)            8
                   Problem Management Record                  8
                   Problems                                   8
                   Profile of a user                             14
                   Profile, TSO/ISPF                           33
                   Program Function keys                      33
                   PROMPT profile                         28,30

Q                 Quit                                      31

p                 Refund Request                             16
                   Refunds                             14, 15, 16
                   Registration                                 6
                   Registration, forms                          6
                   Research Triangle Park                       1
                   Reset                                     22
                   RTF (Research Triangle Park)                 1

3                 Schedule (business hours)                    13
                   SDSF (Spool Display and Search Facility)      35
                   Services, NCC                               2
                   Signon announcement                       32
                   Software for telecommunications              25
                   Spool Display and Search Facility             35
                   Stop                                      31

T                 Tape library                                9
                   Tape Management System                    9
                   Tape, foreign                                9
                   TCP (Terminal Controller Processor)          25
                   TDD (Telecommunication Device for the Deaf)   8
                   Technical Library                            4
                   Technical Support                           3
                             Index-4

-------
INDEX
                 Telecommunication Device for the Deaf         8
                 Telecommunications                          2
                 Telecommunications Network                 5
                 Telecommunications Service Request         2, 5
                 Telecommunications, business hours           13
                 Telecommunications, link                    25
                 Telecommunications, software                25
                 Telephone, DPSS                           10
                 Telephone, for HELP                         8
                 Telephone, NCC training office                11
                 Telephone service                            2
                 Telephone, WIC training office                11
                 Terminal ID number                        18
                 Terminal, dial-up                           25
                 Terminal, full-screen look-alike               25
                 Terminal, hardwired                        17
                 Terminal, line                              25
                 Terminal/Controller Processor                25
                 Time Sharing Option                  18, 19, 27
                 Time Sharing Services Management System     6
                 TMS (Tape Management System)              9
                 Training                                3, 11
                 Training, DEC/VAX                         11
                 Training, IBM Mainframe                   11
                 Training, PC                             3, 11
                 Training, PHOENIX                        11
                 Troubleshooting                             8
                 TSO (Time Sharing Option)            18, 19, 27
                 TSO Services, business hours                13
                 TSR (Telecommunications Service Request)   2, 5
                 TSSMS (Time Sharing Services
                        Management System)                 6
                 TYMNET                                 25

                 US Department of Commerce                 7
                 User Assistance                             8
                 User Memos                               14
                 User Profile Worksheet                      14
                           Index-5

-------
INDEX
                  User Support                          3, 8,31
                  User Support; business hours                 13
                  User-ID                                 7,19
                  User-ID, establishing                         6

                  Video instruction, interactive                 12
                  Videotape training                          11
                  Voice communications                        2

                  Washington Information Center                2
                  Washington Information Center, HELP desk     5
                  Washington rotor                           25
                  Welcome screen                            17
                  WIC (Washington Information Center)         2
                           Index-6

-------
IBM READY
REFERENCE

-------
IBM Ready Reference

-------
IBM READY REFERENCE
             JANUARY 1989

          Revised January 1990
               Prepared by:

       US Environmental Protection Agency
        National Data Processing Division
           National Computer Center
           Research Triangle Park
              North Carolina

-------
                         Preface

Ready Reference provides essential information for users of the
National Computer Center.  Basic descriptions of procedures,
utilities, languages, and software are included as well as pointers
to online documentation.
                            111

-------
CONTENTS
 SECTION 1: LOGON PROCEDURES

 HARDWIRED OR DIAL-UP?	1-1

      HARDWIRED TERMINALS	1-1

      DIAL-UP TERMINALS	1-8
      Modems and Software	1-8
      Type of Link	1-8
      Hardwired "Look-Alike"	1-8


 SECTION 2: TSO AND ISPF

 TIME SHARING OPTION	2-1

      TSO COMMANDS	2-1

      EDITING SUBCOMMANDS	2-2

      HELP COMMAND	2-2

 INTERACTIVE SYSTEM PRODUCTIVITY FACILITY	2-3

      PRIMARY ISPF COMMANDS	2-4

      PRIMARY EDIT COMMANDS	2-5

      ISPF EDIT LINE COMMANDS	2-5

      PFKEYS	2-6
      Default Assignments for PF Keys	2-7

      HELP COMMAND	2-7

-------
CONTENTS
 SECTIONS: DATA SETS




 NAMING DATA SETS	3-1



      OPERATING SYSTEM STANDARDS	3-1



      NCC CONVENTIONS FOR USER DATA SETS	3-1



      NCC CONVENTIONS FOR SYSTEM DATA SETS	3-2




      SYSTEM CATALOG CONVENTIONS	3-2



      NON-STANDARD DATA SETS	3-2




 ALLOCATING DATA SETS	3-3



      TSO ALLOCATE COMMAND	3-3



      ALLOCATE FOR LINE TERMINAL USERS	3-S



      ALLOCATE USING ISPF UTILITY	3-6



 FILE STRUCTURE	3-12



      PARTITIONED VERSUS SEQUENTIAL	3-12
                        VI

-------
CONTENTS
SECTION 4: DISK MANAGEMENT




DIRECT ACCESS STORAGE DEVICE MANAGEMENT	4-1



     DATA FACILITY/HIERARCHICAL STORAGE MAN ACER.... 4-1



     HLIST COMMAND	4-2



     HRECOVER COMMAND	4-3



     HMIGRATE COMMAND	4-3




     HRECALL COMMAND	4-4



     HDELETE COMMAND	4-4



     CLEANUP OF DF/HSM POOL	4-4






SECTION 5: TAPE MANAGEMENT




TAPE STORAGE	5-1



     AVAILABLE TAPES	5-1



ASSIGNING A TAPE	5-2




TAPE RETENTION PERIODS	5-3




     TAPE ARCHIVING	5-4




     TAPE DEARCHIVING	5-5



TAPESCAN UTILITY	5-5




FOREIGN TAPES	5-6
                       vn

-------
 CONTENTS
SECTIONS: JOB ENTRY SUBSYSTEM

WHAT IS IT?	6-1

JES2 CONTROL STATEMENTS	6-1

     JOBPARM STATEMENT	6-1

     ROUTE STATEMENT	6-1

JES2 OPERATOR COMMANDS	.-	6-2

JOB STREAM MANAGER AND PRIORITIES	6-3



SECTION 7: PRINTING OPTIONS

PRINTING AT THE NCC	7-1

     TSO PRINTOFF COMMAND	7-1

     BATCH PRINTING	7-3
     Batch Utility for Printing	7-4
     OUTPUT JCL Statement	7-4

     CHOICES OF PAPER AND SIZE OF PRINT	7-5

     PRINTING USING ISPF LIST DATA SET	7-8
     How to Activiate LOG/LIST	7-8

     PRINTING UTILITY FOR DOCUMENTATION	7-9

PRINTING AT ANOTHER SITE	7-10
                       vin

-------
 CONTENTS
SECTION 8: NCC UTILITIES




BATCH UTTLmES	8-1



JES2 GLOBAL STATUS TRACKING	8-1



SPOOL DISPLAY AND SEARCH FACILITY	8-2




JOB STATUS TRACKING SYSTEM	8-3




BULK DATA TRANSFER	8-3




      INTERACTIVE TRANSFERS	8-4




      BATCH TRANSFERS	8-4




ARBITER	8-4



      ARBITER PC SOFTWARE	8-6



      ACCESSING ARBITER	8-6



EMAIL SERVICE	8-8



RESOURCE ACCESS CONTROL FACILITY	8-9




      UTILIZING RACF	8-10



      PROTECT A DATA SET	8-10



      ADD USERS AND GROUPS TO RACF LIST	8-10




      LIST RACF PROFILE	8-11



      CHANGE RACF PROFILE	8-11



      DELETE RACF PROTECTION	8-11
                         IX

-------
CONTENTS
SECTION 8: NCC UTILITIES (continued)

      JOB OUTPUT PROTECTION	8-11
      Create Resource Profile	8-11
      Change Resource Profile	8-12
      Delete Resource Profile	8-12
      List Resource Profile	8-12
      Build Access List	8-12
      Delete From Access List	8-12
      Tape Protection	8-12

PLSORT	8-13

KWIC/KWOC	8-14


SECTIONS: IBM UTILITIES

BATCH UTILITIES	9-1

IEFBR14	9-1

IEHPROGM	9-1

IDCAMS	9-2

BEBGENER	9-3

IEBCOPY	9-3

IEHMOVE	9-3

EBHLIST	9-4

-------
CONTENTS
 SECTION 9: IBM UTILITIES (continued)



 LINKAGE EDITOR	9-5



 VIRTUAL STORAGE ACCESS METHOD	9-6



      VSAMAID/XP	9-6






 SECTION 10: PROGRAMMING LANGUAGES




 COMPILERS, INTERPRETERS, AND ASSEMBLERS	10-1



      LINKAGE EDITOR	10-1



 ASSEMBLER LANGUAGE	10-2



      CATALOGED PROCEDURES	10-3



 COBOL	10-3



      CATALOGED PROCEDURES FOR VS COBOL II	10-4



 FORTRAN	10-4



      VECTOR PROCESSING	10-4



      CATALOGED PROCEDURES	10-6



 PL/1   	10-7



      CATALOGED PROCEDURES	10-7



 BASIC	10-7
                        XI

-------
CONTENTS
SOFTWARE CATALOG



DATA BASE SYSTEMS	SC-1



     AD ABAS	SC-1



     BASIS	SC-2



     S2K	SC-3



RETRIEVAL AND REPORTING SYSTEM	SC-4



     EASYTRIEVE PLUS	SC-4



MATHEMATICAL AND STATISTICAL SYSTEMS	SC-5



     BMDP	SC-5



     ESP	SC-6



     IMSL	:	SC-7



     PL-MATH	SC-8



     SAS	SC-9



     SUPERCALC	SC-10



GRAPHICS	SC-11



     CAGKS	SC-11



     CUECHART	SC-12



     DATA CONNECTION	SC-13



     DISSPLA	SC-14
                       xn

-------
CONTENTS
GRAPHICS (continued)



     GEOMAP	SC-15




     INTERORG	SC-16



     SAS/GRAPH	SC-17



     TELL-A-GRAF	SC-18



     TELLAPLAN	SC-19




     UNIEDIT	SC-20




     UNIMAP	SC-21



DATA DICTIONARY/DIRECTORY SYSTEM	SC-22



     DC2	SC-22



FILE MANAGEMENT SYSTEM	SC-23



     LIBRARIAN	SC-23



SIMULATION AND MODELING SYSTEM	SC-24



     GPSS	SC-24



TEXT EDITOR	SC-25



     SCRIPT	SC-25



FOURTH GENERATION LANGUAGE	SC-26




     FOCUS	SC-26




INDEX	Jndex-1
                        Kill

-------
 SECTION 1     LOGON  PROCEDURES
HARDWIRED
OR DIAL-UP?
HARDWIRED
TERMINALS
Much of the information in this section is also found
in the  "new user" documentation called Getting
Started. After the initial distribution, Getting Started
will  be sent only to new users.  LOGON PROCE-
DURES are repeated here for those users who only
log on occasionally or for those users who have train-
ing responsibilities. References to specific proce-
dures for "new users," such as changing passwords at
the first logon, have been removed.

In order to use the NCC IBM  mainframe, you must
have a  User-ID and a terminal linked to the NCC.
This link can be through hardwired equipment which
does not require dialing or through a dial-up modem
hooked to your terminal. Let's address the hardwired
terminals first. Discussion about dial-up terminals
then follows.

First make sure that your terminal is turned on. If
you are hardwired to the NCC, your screen should
appear like the following one. If it does not, press the
RESET  key or the ENTER key and the screen should
appear; or turn the terminal off and then on again. If
it still does not appear, call User Support.

             (FTS) 629-7862
             (919) 541-7862
             (800) 334-2405 (outside NC)
                              1-1

-------
        WELCOME TO THE
US ENVIRONMENTAL PROTECTION AGENCY
   TRECOmJNICATiONS NETWORK

     ENTER COmAND OR M FOR fENU
                 012/001 0-031  FT
If you press M and ENTER, the following menu screen
will appear:
             1-2

-------
                  When the logon process becomes routine, you may
                  bypass this menu screen by entering a command such
                  as ISO (for the NCC's Time Sharing Option) or by
                  entering the code for another machine or LMF that
                  allows you access such as NY for the NY LMF.
ruS EPA TELECOMMUNICATIONS NETWORK MENU
15:20 Tuesday August 23, 1988
NATIONAL COMPUTER CENTER
PFKEY SELECTION SERVICE PFKEY
PF13 PCICS CICS-Productlon PFI5
PF14 DCICS CICS-Development PFI6
PF19 TSO TSO-NCC PF17
PF8 EMAIL EMAIL ACCESS PF20
PF10 ARBITER Arbiter PF21
PF22
PF23
PF24
PF2
PF3
PF4
PF5
TERM: T260624 "%;
MODEL 2 I
LOGICAL MAINFRAME
SELECTION
NY
DV
WIC
SE
AT
OA
KC
PH
Cl
BN
CH
SF
SERVICE
TSO-New York LMF
TSO-Denver NEIC LMF .
T50-Wash Info Center
TSO-Seattle LMF
TSO-Atlanta LMF
TSO-DallasLMF
TSO-Kansas City LMF
TSO-Philadelphla LMF
TSO-Cincinnatl LMF
TSO-Boston LMF
TSO-Chicago LMF
TSO-San Francisco LMF
HIT PFKEY OR ENTER SELECTION |
^^^1 •ซ ^^TT ,*%. •ป ^+. t .^ ^s A .^H ^^ ^7 4 ^^H
   .
                                                             ;
x
  '3p
                                    ^JVdVW.
                   Note the terminal ID number in the upper right-hand
                   corner. You may need this number to report a net-
                   work problem. It's a good idea to copy it down so that
                   you can refer to it later if the hardware malfunctions
                   and does not not allow you to look it up.

                   If you choose, for example, TSO at the NCC, the fol-
                   lowing will appear:
                               1-3

-------
 --------- TSO/ELOGON ______ T260624
PFI/PF1J—>HELP   PF3/PF 15 —•> LOGOFF     PA I ซ=> Attention   PA2— >ReshOw

   ENTER LOGON PARAMETERS BELOW          RACF LOGON PARAMETERS
   U5ERID    — > |
   PASSWORD — >                       NEW PASSWORD ซซ"">
   PROCEDURE — >                       GROUP I DENT   •ซ>
                                                                l
FIMAS    •— >                       BINNLMBER    -">
SIZE      — >                       SrSOUTDEST   — >
COMMAND  -— >

ENTER AN -S BEFORE EACH OPTION DESIRED BELOV
  -NOMAIL          -NONOTICE         -NOSUMMARY       -CANCEL
                                012/001  0-031 FT
                                                                  J
             Just type in your three-character User-ID and press
             the ENTER key.
                            1-4

-------
               The next screen shows the  cursor sitting at the
               password entry point. If you have logged on before
               with this User-ID, you need only to type in the pass-
               word (it will not be displayed) and press ENTER.

               To  change your password, type your current pass-
               word in the password field, TAB to the new password
               field, type the new password, and press ENTER. Then
               the cursor is positioned for you to retype the new
               password for verification.  As soon as you press E N -
               TER, your new password becomes effective.
 	T50/E LOGON	T260624

PFI /Pf 13 "•> HELP  PF3/PF15 •"> LOGOFF
   ENTER LOGON PARAMETERS BELOW

   USERIO   —> IN

   PASSWORD <•"> |

   PROCEDURE"-* JEPATSO

   ACCT NMBR •"> ACCT

   FIMAS    -"•> FFFFMUUU

   SIZE     ซ=>

   COMMAND =-•>
PA1 —> Attention   PA2 —> Reshow

 RACF LOGON PARAMETERS


 NEW PASSWORD —>

 GROUP IDENT   — >
 BIN NUMBER

 SYSOUT DEST
                 BDDb
   ENTER AN 5 BEFORE EACH OPTION DESIRED BELOW

     -NOMAIL          -NONOTICE        -N05UMMARY
                -CANCEL
                                 012/001 0-031  FT
                If you have problems with this screen, contact User
                Support.
                             1-5

-------
You must  change the password in the following
cases:

   •   If a "PASSWORD EXPIRED" message
       appears.

   •   If your password has been reset by User
       Support.

A password has the following characteristics:

    •  Contains from 6 to 8 alphanumeric or
       national characters ($, #, or @). There
       must be at least one alpha and one
       numeric character. Blanks are not al-
       lowed.

    •  Is unique to the associated User-ID and
       cannot equal the User-ID.

    •  Must be changed at least every 90 days.
       (Will be date stamped when changed.)

    •  Cannot be changed back to either of the
       10  most recently used passwords. (In
       other words, you can't use the current or
       the previous 10.)

    •  Must not be included with any output

    •  Must be obliterated on terminal devices
       through a clear screen or overprint.

    •  Should be memorized and not written
       down.
             1-6

-------
                The next screen, as shown below, is the end of the
                logon process. Note the list of NEWS ALERT titles.
                The READY prompt indicates that you are in the TSO
                environment and may enter TSO commands.
ICH70001I III
IKJ56455I III
MMM
   LAST ACCESS AT 15:25:47 ON MONDAY. AUGUST 22, 1988
LOGON IN PROGRESS AT 15:38:24ON AUGUST 23. 1988
08/18/88: FOCUS 5.5.3 AVAILABLE FOR TESTING, REVISD.
08/11/88: UPGRADED WIC PRINTER LIMIT
08/11/88: NATURAL DYNAMIC PARAMETER AVAILABILITY
READY
                                 -SEE NEWS ALERT 1
                                 -SEE NEWS ALERT2
                                 -SEE NEWS ALERT3
                                  012/001 0-031 FT
                Some terminals may require that ENTER be pressed
                twice.
                              1-7

-------
DIAL-UP
TERMINALS
Modems and
Software
Type of Link
Hardwired
"Look-Alike"
Dial-up terminals, often called line terminals, can be
linked to the NCC in a variety of ways. The common
denominator is the modem which requires you to dial
a telephone number before the link is complete.

Modems are the dialing hardware which link the
telephone line to your terminal. Gettingy our modem's
"attention" through your keyboard may require help
from someone at your site who is familiar with your
modem and terminal. Once you know how to "talk" to
your modem, you  must determine  the telephone
number to dial.  Along with the  modem, you need
some type of telecommunications software  (for  ex-
ample, Crosstalk or KERMIT).

The Network Support Group has,  in most instances,
worked with your site's  management to establish
communications. You  may be linked to the  NCC
through the Washington Rotor,  TYMNET, or the
Develcon.  The type of linkage generally  depends on
your location and how many other users  are in your
area. Try to determine the type of link that has been
established or what telephone number you must dial
for access.  If your local sources do not have this
information, call User Support at:

             (FTS) 629-7862
             (919) 541-7862
             (800) 334-2405 (outside NC)

At some sites, you may be able to link to the NCC in
a "full-screen" manner.  The Terminal/Controller
Processor (TCP) allows you  to use the  full-screen
capabilities much like a user with a hardwired termi-
nal.  In that case, after  you have chosen TCP, follow
the logon procedures for hardwired terminals previ-
ously discussed.
                               1-8

-------
             When you have successfully established a connection
             to the NCC, the following menu will appear.
WELCCME TO THE ENVIRONMENTAL PROTECTION AGENCY NATIONAL COMPUTER CENTER


             Please enter one of the Following selections

              IBMPSI for IBM
              TCP for IBM 3270 EMULATION
              VAXA Tor VAX SVS A
              VAXB for VAX SYS B
              EMAIL for EM AIL
 Enter selection
              To choose the NCC IBM mainframe for a line termi-
              nal,  type IBMPSI  and press  ENTER.   Then the
              following menu appears.
                           1-9

-------
Enter selection IBMPSI
CONNECTED
connected 310600908827/110504

U 5 EPA (TTV-X25-IBM)
    A ISO - NCC
    B NY
   C NEIC
   0 W1C
   E SEATTLE
   F ATLANTA
   G DALLAS
    I KANSAS CITY
   J PHILADELPHIA
   K CINCINNATI
   L SAN FRANCISCO
   M BOSTON
   N CHICAGO

SELECTION 1
                 To  access TSO at  NCC,  select  A and then press
                 ENTER. The other selections are LMF sites. Then the
                 following message appears.
  SELECTION ? A
  IKJ56700A ENTER USERID -
                                1-10

-------
             If this is the first time you have logged on with this
             User-ID, your profile reflects the NOPROMPT char-
             acteristic. After you type your User-ID and press
             ENTER, the following will then appear.
SELECTION t A
IKJ56700A ENTER USERID-
III
IKJ56705I MISSING PASSWORD FOR In
IKJ56400A ENTER LOGON OR LOGOFF-
             The system is askingfor a single line logon command.
             Type in the following and use your assigned values:




             LOGON m/pswd A(acct) S(nnnn) PROC($EPAT50)

             ฎ   Your 3-character User-ID.

             (D   Your password (6 -8 characters).

             
-------
              The following will then appear.
LOGON Hi/pswd A(acct) 5(nnnn) PROQJEPATSO)
ICH700011 111       L AST ACCESS AT 13 50 42 ON TUESDAY. AUGUST 30, 1988
IKJ56455I 111 LOGON IN PROGRESS AT IA 00 01 ON AUGUST 31, 1988
ENTER FIMAS ID -
              The FIMAS code identifies a specific ADP system or
              activity and associates computer usage statistics with
              that activity. The FIMAS code is depicted as follows:

                     ffrTmuuu

              Where flfflf is a 4-character/digit code, m is a mode
              character, and uuu is an optional 3-position field for
              your use.  Modes can be one of the following:

                     F       Feasibility study.
                     D       Development of software.
                     T      Testing.
                     M     Maintenance.
                     P      Production.
                     R      Retrieval.
                     U      Update.

              Consult with your ADP Coordinator for more infor-
              mation on FIMAS codes.

              After you have typed the FIMAS code and pressed
              ENTER, a list of NEWS ALERT titles appears.

              The next screen, as shown  below, is the end of the
              logon process.
                           1-12

-------
ENTER FIMAS ID -
ffffmuuu
08/18/88- FOCUS 5 5.3 AVAILABLE FOR TESTING, REVI5D
08/11/88: UPGRADED WIC PRINTER LI MIT
08/11/88: NATURAL  DYNAMIC PARAMETER AVAILABILITY
READY
-SEE NEWS ALERT 1
-SEE NEWS ALERT2
-SEE NEWS ALERT3
                  You can now change your profile to  prompt you for
                  your logon information.  At READY, just type the
                  command PROFILE PROMPT andpress ENTER. The
                  following logon sequence will appear the next time
                  you log  on.
  IKJ56700A ENTER USERID -

  IKJ56714A ENTER CURRENT PASSWORD FOR ill

  KH700011t 11       LAST ACCESS AT 15:34:38 ON WEDNESDAY, AUGUST 31. 1988
  IKJ56700A ENTER ACCOUNT NUMBER -
  acct
  IKJ56700A ENTER PROCEDURE NAME -

  SSsSsSI Hi LOGON IN PROGRESS AT 13:51:02 ON SEPTEMBER I. 1988
  ENTER FIMAS ID -

  08/18/88: FOCUS 5.5.3 AVAILABLE FOR TESTING, REVISD.        -SEE NEWS ALERT I
  OB/11/88: UPGRADED WIC PRINTER LIMIT                    -SEE NEWS ALERT2
  OB/11/88- NATURAL DYNAMIC PARAMETER AVAILABILITY        -SEE NEWS ALERT3
  READY
                                   1-13

-------
SECTION 2     TSO AND ISPF
TIMESHARING
OPTION
Time Sharing Option (TSO) is a system which allows
you to use the IBM mainframe from a low-speed
terminal or from a 3270-type terminal. TSO has text
editing capabilities, a remote batch facility for exe-
cuting programs, and an extensive command proce-
dure (GUST) capability.

When you log on to TSO at the NCC and get the
READY prompt, you can type a command with its
operand(s) or the name of a CLIST. The most often
used commands and their meanings are listed below:
TSO COMMANDS   Command

                   ALLOCATE



                   ATTRIBUTE


                   FREE


                   LIST


                   PRINTOFF


                   IED
               Meaning

               Used to associate a data set with a
               program or to create a new data
               set.

               Allows multiple allocations of data
               sets with the same characteristics.

               Used to deallocate data sets or to
               delete attribute lists.

               Displays the contents of a data set
               on your terminal.

               Used to print a copy of a specified
               data set

               Used to manipulate data with such
               functions as input, edit, store, and
               retrieve.  INPUT mode is used to
               enter new data, a line at a time.
               EDIT mode allows you to use sub-
               commands.
                              2-1

-------
EDITING          The following are subcommands common ly used with
SUBCOMMANDS   the IED command.
                  Subcommand

                  UP, DOWN
                  TOP, BOTTOM

                  FIND
                  DELETE


                  INSERT

                  CHANGE

                  COPY


                  MOVE


                  SUBMIT


                  SAVE


                  END
Meaning

Moves the line pointer within
a data set.

Searches for a specified charac-
ter string.

Used to remove a line or range of
lines.

Used to add lines to a data set.

Used to replace a line or a string.

Duplicates any line  or block of
lines.

Moves any line or block of lines to
a new location.

Used to start a TSO batch  job
from a terminal.

Saves editingchanges with a data
set.

Terminates an IED session.
HELP COMMAND  The HELP command is a comprehensive source of
                  infomation readily available to you at the terminal.
                  You can type HE L P at the READY prompt and a list of
                  topics appears. Then just type HELP and the topic
                  name to display information on that subject. You can
                             2-2

-------
         MORE
         INFO
INTERACTIVE
SYSTEM
PRODUCTIVITY
FACILITY
also access the same HELP facility from within ISPF
by typing the following on the COMMAND ===> line:

      TSO HELP topic

Topic is optional and indicates the command for
information display.

For a general discussion of TSO and the TSO startup
CLIST, see the following online documentation:

      JUSD,USERS.REFER(TSOISPF)
      JUSD.TSOE.DATA
      JUSD.TSOE.V1R4.DATA

For more information and detailed explanations of
TSO commands and their operands, see the following
online documentation:

      JUSD.TSOLINE.GUIDE

Interactive System Productivity Facility (ISPF) is an
IBM product designed to improve your productivity.
It is a menu-driven system used on full-screen termi-
nals under the control of TSO.

To access ISPF, type 15PF at the READY prompt. The
Primary Option Menu appears as follows:
                              2-3

-------


OPTION <="> •
•
0 ISPFPARMS -
1 BROWSE
2 EDIT
3 UTILITIES
4 FOREGROUND -
5 BATCH
6 COMMAND
7 DIALOG TEST -
8 LM UTILITIES -
9 IBMPROOUCTS-
10 SCLM
C CHANGES
T TUTORIAL
X EXIT
E EPA
G Group
U User
__ icoC yonC ODtMADV fMVTIfMJ MCkTt 1 _ ___ _._ — __ __


Userld
Specify terminal and user parameters Prefix
Display source data or output listings Terminal -
Create or change source data PF Keys
Perform utility functions Time
Invoke language processors in foreground Date
Submit Job for language processing Julian
Enter TSO command or CLIST Proc
Perform dialog testing Applld
Perform library management utilities functions
Additional IBM program development products
Software Configuration and Library Manager
Display summary of changes for this release
Display Information about ISPF/ PDF
Terminate IPSF using log and list defaults
EPA/NCC Application Option Menu
Group Application Option Menu
User Defined Application Option Menu



til
IIIAAAA
3278
24
1045
90/01/17
90017
IEPATSO
I5R







Enter END command to terminate ISPF
5665-402(0 COPYRIGHT IBM CORP I960, 1989
gfigja
012/001 0-031
FT
PRIMARY ISPF
COMMANDS
From this menu you can browse, edit, delete, rename,
compress or allocate a data set, as well as use other
utilities and applications.

If, for example, you choose Option 2 EDIT, you can
create or modify data using ISPF commands.

Primary ISPF commands are those commands which
are entered in the COMMAND/OPTION Meld (===>).
Some primary commands can be entered  on every
ISPF panel. Others apply only to certain panel types
and can be used  only on those panels.   In many
instances primary ISPF commands correspond to the
PF keys, such as the following:
                              2-4

-------
PRIMARY EDIT
COMMANDS
 ISPF EDIT
 LINE
 COMMANDS
      END        RETRIEVE    SPLIT
      RETURN    HELP

Enter Primary Edit Commands, such as the follow-
ing commonly used ones, at the COMMAND ===>:

 Command    Meaning

CANcel       Returns to the previous menu with
             changes not saved.

END         Saves and returns to the previous
             menu.

SAVE        Saves but does not end.

FIND        Locates a specified character string.

CHANGE     Finds and changes the next occur-
             rence of a string.

Enter line commands by overtyping the line number
field of any line. The most frequently used line
commands are as follows:

Command    Meaning

    I         Inserts a line below the cursor.

    D        Deletes the line.

    R        Repeats the line.

    C        Copies the line.

    M        Moves the line.

    A        After
                              2-5

-------
                   Command    Meaning

                      B        Before

                      0        Overlay

                      X        Excludes the line.

                      F        Shows the first excluded line.

                      L        Shows the last excluded line.

                      <        Shifts data to the left.

                      >        Shifts data to the right

                      (         Shifts column to the left.

                      )         Shifts column to the right

                   Each of these line commands can be followed by a
                   number to indicate th e number of times to execute the
                   command. With the exception of the A, B, F, L, and
                   I commands, you can also make a line command apply
                   to a block of lines by entering the line command twice
                   on the first line of the block and twice on the last line.

PF KEYS           Program Function (PF) keys are a shortcut method of
                   entering commands, and their functions are stored in
                   your TSO/ISPF profile. They can be tailored to suit
                   your requirements.
                               2-6

-------
Default Assign-     The default assignments for PF keys are as follows:
ments for PF Keys
                        PFKev             Function
HELP COMMAND
                        PF1    PF13
                        PF2    PF14
                        PF3    PF15
PF4
PF5
PF6
PF7
PF8
PF16
PF17
PF18
PF19
PF20
                        PF9   PF21
                        PF10  PF22
                        PF11  PF23
                        PF12  PF24
                         HELP

                         SPLIT

                         END

                         RETURN

                         RFIND

                         RCHANGE

                         UP

                         DOWN

                         SWAP

                         LEFT

                         RIGHT

                         RETRIEVE
The ISPF HELP command is a comprehensive source
of information. When you type HELP on the COM-
MAND ===> line while in ISPF, you will access the
ISPF Tutorial. The type of information that will be
displayed depends on where you are when you type
the HELP command.  For example, if you choose
Option 2, Edit and then type HELP on the command
line, information on the Edit capabilities will be
displayed.
                             2-7

-------
For more general information on ISPF, see the follow-
ing online documentation:

      JUSD.USERS.REFERCTSOISPF)

For more details about ISPF commands, see the
following online documentation:

      JUSD.ISPF.GUIDE

Or, for information on commands and the PF keys,
select the TUTORIAL (T) from the ISPF/PDF Pri-
mary Option Menu.
           2-8

-------
SECTION 3     DATA SETS
NAMING
DATA SETS
OPERATING
SYSTEM
STANDARDS
                  The data set name is assigned to a particular set of
                  information and distinguishes that set of information
                  from others on the disk pack or tape. Data set names
                  must conform to specific standards.

                  The operating system requires that all data set names
                  are strings of up to 44 characters.  They must also
                  conform to the restrictions listed below:

                     •   Characters are alphabetic (A-Z), numeric
                         (0-9), national (@, #, and $), and periods
NCC CONVEN-
TIONS FOR USER
DATA SETS
                     •  The whole name must be divided into
                        segments (qualifiers) of up to eight char-
                        acters  each.     For  example,
                        SEPT.REPORT.DATA is the name of a
                        data set whose qualifiers are SEPT,
                        REPORT, and DATA.

                     •  The first character of the data set name
                        and the first character after a period
                        must be alphabetic or national.

                     •  The last character of a data set name
                        may not be a period; nor may there be
                        two consecutive periods.

                  Data sets at NCC are required to be cataloged and to
                  have standard names. To insure that one user's data
                  sets do not conflict with another user's, NCC has
                  adopted the standard of prefixing the data set name
                  with  User-ID  and account.    For example,
                  IIIAAAA.SEPT.REPORT.DATA is a fully qualified,
                  cataloged data set
                            3-1

-------
NCC CONVEN-
TIONS FOR
SYSTEM DATA
SETS
 SYSTEM
 CATALOG
 CONVENTIONS
NON-STANDARD
DATA SETS
Library names for vendor supported software are
standardized as follows:

    •  For IBM software, the prefix is SYS 1.

    •  For other vendors, the prefix is SYS2.
      and the product name.  For example,
      SYS2.SAS.

    •  Documentation is prefixed with JUSD.

    •  Other qualifiers  such as LOAD and
      OBJECT are added from a standardized
      list for descriptive purposes.

The operating system makes an entry in the system
catalog for each qualifier in a fully qualified data set
name with pointers to the lower level qualifiers or to
the qualified name. With this type of organization,
certain utility programs can list all the data sets with
any specified level of qualification. For this reason, a
character string used as a qualifier may not also be
used as a qualified name when both are preceded by
an identical  series of qualifiers.  For example, the
names

      IIIIAAAA.SOURCE.SPROJECT

      IIIAAAA.SOURCE

would cause  a conflict. The solution is to name the
first data set

      IIIAAAA.SPROJECT.SOURCE

Data sets that are not cataloged or that have non-
standard names are subject to deletion.
                              3-2

-------
ALLOCATING
DATA SETS
 TSO ALLOCATE
 COMMAND
More information on data set naming standards can
be found in the following online documentation:

      JUSD.USERS.REFER(STANDARD)
      JUSD.ISPF.GUIDE

The process of creating a new data set is  called
"allocating" a data set and accomplishes two tasks:

   1. Reserves disk space so there is a place
       for the information that the  data set
       will contain.

   2. Enters the name and address of the data
       set in the system catalog so  that the
       operating system can find the data set
       when you ask for it again.

There are a variety of ways to create a data  set,
depending mainly on your application and your ter-
minal connection.

Used in a TSO environment, the TSO ALLOCATE
command has the following format:
                  ALLOCATE
             DATASET(data-set-name)
             USING(attribute-list-name)
             SPACE(primary,secondary)
                   BLOCKS TRACKS
                   CYLINDERS
                   DIR( value)
                   BLKSIZE(value)
             DSORG(data-set-organization)
             RECFM(record-format)
             LRECL(record-length)
             NEW SHR OLD MOD
             REUSE RELEASE
                             3-3

-------
A description of the operands follows:

Operand     Description

DATASET    Specifies the name of a data set to be
             allocated.

USING       Uses characteristics assigned to an
             attribute list created  with the AT-
             TRIB command.

SPACE       Denotes the primary and secondary
             space allocation. If SPACE is used, a
             unit type must be specified.

BLOCKS     Indicates data set is allocated  in
             blocks.

TRACKS     Indicates data set is allocated  in
             tracks.

CYLINDERS  Indicates data set is allocated in cyl-
             inders.

DSORG       Organization of data sets. Types are
              PS (Physical Sequential)  or  PO
              (Partitioned Organization).

RECFM       Establishes the format and charac-
              teristics of data set records.  Some
              options are fixed block (FB) and vari-
              able block (VB).

LRECL       Establishes the maximum number of
              characters that can be placed on a
              line. Largest valid value is 32,756.
            3-4

-------
ALLOCATE FOR
LINE TERMINAL
USERS
Operand      Description

NEW        Data set is being newly created.

OLD         Data set exists. You want exclusive
             use.

SHR         Data set exists. More than one per-
             son can use the data set.

MOD        Used only with sequential data set;
             indicates output is to be appended to
             the current contents of the data set.

RELEASE    Returns unused  space after a data
             set is freed.

For more information on determining space, record
length, and optimum blocksize, see the following on-
line documentation:

      JUSD.USERS.REFERCDASD)
      JUSD.USERS.REFER(JCLDD)

The IED Line Editor will allow you to create a new
data set simply with the following command at the
TSO READY prompt:

      IED new.data.set.name

The system responds with the following:

IKJ523201 DATA SET OR MEMBER NOT FOUND, ASSUMED TO
BE NEW
INPUT
00010
                              3-5

-------
ALLOCATE
USING ISPF
UTILITY
TSO will assign default characteristics, and when the
data is entered and END SAVE is specified, TSO will
catalog the new data set.

The easiest way to allocate a new data set is with the
ISPF data set utility available to full-screen terminal
users.

To get into the ISPF environment, type ISPF at the
READY prompt, as shown below and press ENTER:
      08/18/68 FOCUS 553 AVAILABLE FOR TESTING. REVISD
      OS/11/88 UPGRADED WIC PRINTER LIMIT
      08/11 /88 NATURAL DYNAMIC PARAMETER AVAILABILITY
      READY
                              -SEE NEWS ALERT I
                              -SEE NEWS ALERT2
                              -SEE NEWS ALERT3
                    The following Primary Option Menu appears:
                               3-6

-------
                           ISPF/PDF PRIMARY OPTION MENU
           BROWSE
           EDIT
           UTILITIES
           FOREGROUND
           BATCH
           DIALOG TEST
         8 LM UTILITIES
         9 IBMPRODUCTS
        10 SCLM
         C CHANGES
           TUTORIAL
           EPA
         6 Group
         U User
Userid
Prefix
Terminal
PF Keys
Time
Date
Jul Ian
Proc
Applid
Specify terminal and user parameters
Display source data or output listings
Create or change source data
Perform utility functions
Invoke language processors In foreground
Submit Job for language processing
Enter TSO command or CLIST
Perform dialog testing
Perform library management utilities functions
Additional ISM program development products
Software Configuration and Library Manager
Display summary of changes for this release
Display information about ISPF/PDF
Terminate IP5F using log and list defaults
EPA/NCC Application Option Menu
Group Ap0! Ication Option Menu
User Defined Application Option Menu
    Enter END command to terminate ISPF.
      5665-402(0 COPYRIGHT IBM CORP 1980. 1989
III
IIIAAAA
3278
24
1045
90/01/17
90.017
SEPATSO
ISR
                                                012/001  0-031  FT
1 M        fc^4  fcnfe*
                          Choose Option 3, UTILITIES, and the following screen
                          appears:
                                          3-7

-------
OPTION -ซ>
                 	UTILITY SELECTION MENU	
     1  LIBRARY     -  Compress or print data set Print Index listing
                        Print, rename, delete, or browse members
     2 DATASET     -  Allocate, rename, delete, catalog, uncalalog, or
                        display Information of an entire data set
     3 MOVE/COPY   -  Move, copy, or promote members or data sets
     4 DSLIST      -  Print or display (to process) list or data set names
                        Print or display VTOC Information
     5 RESET       -  Reset statistics for members oMSPF library
     6 HARDCOPY    -  Initiate hardcopy output
     8 OUTLIST     -  Display, delete, or print held Job output
     9 COMMANDS   -  Create/change an application command table
    10 CONVERT     -  Convert old format menus/messages to new format
    11  FORMAT      -  Format definition for formatted data Edlt/Browse
    12 SUPERC      -  Compare data sets (Standard dialog)
    13 SUPERCE     -  Compare data sets (Extended dialog)
    14 SEAflCH-FOR  -  Search data sets for strings of data
                                     012/001 0-031 FT
J
               Now choose  Option 2, DATASET, and the following
               screen appears:
                               3-8

-------
                                                                       *•   ^ ** *
      OPTION
                               DATA SET UTILITY
r"
           A -  Allocate new data set
           R -  Rename entire data set
           D -  Del etc entire data set
           blank - Data set Information
         C - Catalog data set
         U - Uncatalog data set
         S - Data set information (short)
       ISPF LIBRARY:
         .  PROJECT
           GROUP
           TYPE

       OTHER PARTITIONED OR SEQUENTIAL DATA SET:
           DATA SET NAME   —>
           VOLUME SERIAL    =-=>     (If not cataloged, required for option "C")
       DATA SET PASSWORD
(I f password protected)
                                           012/001 0-031 FT
                        Select Aat the OPT ION arrow, tab down to DATA SET
                        NAME,  type in  the your chosen  name,  and  press
                        ENTER.  The following screen appears:
                                     3-9

-------


COMMAND™* •
— ALLOCATE NEW DATiซ

CCT 	



1
DATA SET NAME IIIAAAANEWOATASET NAME
VOLUTE SERIAL
GENERIC UNIT
SPACE UNITS
PRIMARY QUANTITY
.>
-> DISK
-> TRKS
•> 10
SECONDARY QUANTITY -> 5
DIRECTORY BLOCKS
RECORD FORMAT
RECORD LENGTH
BLOCK SIZE
EXPIRATION DATE



(* Only one of these
g"S!a
•> 25
•> FB
•> 80
•> 6160
=>



fields may be specified)

(Blank for authorized default volume) *
(Generic group name or unit address) *
(BLKS, TRKS, or CYLS)
(In above units)
(In above units)
(Zero for sequential data set)



(W/MM/DD
YYDD In Julian form
DODO for retention period in days
or blank)

012/001 0-031 FT














i
Note that the majority of the information is already
filled in.  These characteristics are those of the data
set that you last allocated and may be changed just by
pressing  TAB and overtyping.   If a volume-serial
number appears, be sure to blank it out using the
space bar.  When you press ENTER, the following
screen appears:
           3-10

-------
                                          —DATA SET ALLOCATED
      DAT A SET UTILITY
    A -  Allocate new data set
    R -  Rename entire data set
    D -  Delete entire data set
    blank - Data set Information
tSPF LIBRARY.
    PROJECT   ซ=>
    GROUP    —>
    TYPE     -—>
OTHER PARTITIONED OR SEQUENTIAL DATA SET:
    DATA SET NAME  —>
    VOLUME SERIAL   •ปป>     (I f not cataloged, required for option "C")
DATA SET PASSWORD
         (If password protected)
                                  012/001 0-031  FT
   MORE
   INFO
The message in the upper right-hand corner indi-
cates that the allocation was successful. You can now
end your session or go on to other tasks.


For more information on allocating data sets,  see
following online documentation:


        JUSD.ISPF.GUIDE


Or access the Tutorial from the ISPF/PDF Primary
Option Menu.
                             3-11

-------
FILE             Two basic types of data set organization are available
STRUCTURE     on the IBM.

PARTITIONED         •   Partitioned data sets (PDSs) are "parti-
VERSUS                 tioned" into  various  segments with
SEQUENTIAL            "member" names. For example, the fully
                         qualified data set JUSD.USERS.REFER
                         has over 100 members, such as CON-
                         TENTS or ##README, which are de-
                         noted by parentheses and are added to
                         the end  of the  data set name as in
                         JUSD.USERS.REFER
-------
SECTION 4      DISK MANAGEMENT
DIRECT ACCESS
STORAGE
DEVICE
MANAGEMENT
DATA FACILITY/
HIERARCHICAL
STORAGE
MANAGER
Direct Access Storage Device (DASD) Management
at NCC ensures integrity of your data on disks, main-
tains maximum disk space availability, and promotes
optimal use of disk space. The DASD management
practices that most directly affect you are those re-
lated to space release, data set migration (archiving),
and the daily backing up of new or modified disk data
sets.

The Data Facility/Hierarchical Storage Manager (DF/
HSM) provides space management, backup, and
recovery functions to manage data sets automatically
on a variety of storage devices.  It thus reduces
manual intervention and optimizes the use of pri-
mary storage space, such as USRxxx volumes. It does
so by moving (migrating) and compacting "aged" data
sets and then automatically recalling them to pri-
mary volumes when they are referenced by a batch
job or needed during a TSO session.

The current storage  hierarchy  at the NCC is  as
follows:

    1. Primary - USRxxx volumes. Incremental
      backups are taken when the data set is
      modified, up to a limit of seven genera-
      tions.

    2. Migration Level One - MLlxxx volumes.
      Uses the Migration Control Data Set
      (MCDS).

    3. Migration Level Two - Mxxxxx volumes.
      Also uses MCDS.
                             4-1

-------
                   After DF/HSM has migrated data sets, the System
                   Catalog indicates that they are cataloged to the vol-
                   ume MIGRAT. Although there is physically no such
                   volume mounted on the system, DF/HSM operates as
                   if there were. For example, if you reference migrated
                   data sets via a standard TSO or batch job command,
                   DF/HSM will recall the data sets for you and then will
                   process your TSO command or proceed with the batch
                   job.

HLIST             The HLIST command lists information about mi-
COMMAND        grated and/or backed up data sets using the MODS or
                   the BCDS (Backup Control Data Set).  If you do not
                   specify which type of information is desired, DF/HSM
                   will list migrated (MCDS) data sets.

                   The following will list information about the specified
                   data set from both the MCDS and the BCDS.

                     HLIST BOTH DATASETNAME(data.set.name)

                   The following will list information about the specified
                   backed up data set from the BCDS to the terminal:

                     HLIST BCDS DATASETNAME(data.set.name)

                   The following will list information about data sets
                   beginning with prefix 'iiiaaaa' within the MCDS to
                   your terminal:

                          HLIST LEVEL(iiiaaaa)

                   The following will list information about data sets
                   beginning with prefix 'iiiaaaa' within the MCDS to a
                   permanent data set:

                      HLIST LEVEL(iiiaaaa) ODS(data.set.name)
                              4-2

-------
HRECOVER
COMMAND
HMIGRATE
COMMAND
The results of the HLIST command default to the
terminal unless an OUTPUT data set parameter is
specified.

The command HRECOVER is used to recover a backup
version of one or more data sets.

The following will recover a data set from the most
recent backup generation:

          HRECOVER'iiiiaaaa.data.set.name1

The following will recover a data set from the Y
backup generation:

  HRECOVER 'iiiaaaa.data.set.name' GENERATION(x)

The generation number can be obtained via the HLIST
BCDS command.  Note that no minus sign is used
with the generation number.

The HMIGRATE command is used to explicitly mi-
grate one or more data sets.

The following will migrate a data set from primary
DASD to a migration level 2 volume with a 2-year ex-
piration date.

       HMIGRATE 'iiiiaaaa.data.set.name'

The following will migrate a data set from primary
 DASD to a migration level 2 volume with a 7-year ex-
 piration date.

    HMIGRATE 'iiiiaaaa.data.set.name' PERM
                              4-3

-------
HRECALL
COMMAND
HDELETE
COMMAND
CLEANUP OF
DF/HSM POOL
When DF/HSM recalls a data set from a migration
level two volume, the data set is physically removed
from that migration volume. The data set is treated
as a new allocation, and if deleted before another
backup is taken, the data set is lost. To ensure that
the data set is maintained for more than one year, you
must reissue the EMIGRATE command.

The following will recall a data set from a migration
pack to a USRxxx disk pack without tying up the TSO
session.

       HRECALL data.set.name NOWAIT

HDELETE deletes one or more migrated data sets
from a migration volume. DF/HSM deletes the data
set without recalling it to a primary volume. When
DF/HSM deletes the data set, it maintains any backup
versions of the data set and the information in the
BCDS.

HDELETE cannot be used to delete data sets from
primary volumes or backup volumes.

The following  deletes a migrated data set from the
MCDS without waiting for the command to complete:

       HDELETE data.set.name NOWATT

Ongoing cleanup of the BCDS is necessary to control
growth of the  DF/HSM backup volume pool. BCDS
entries are eligible for deletion if one of the following
conditions is met:

    1.  A BCDS entry is over 35 days old for a
       data set that is no longer cataloged.
                               4-4

-------
             2.  A data set has been unused for 35 days
                 and has been migrated to the Migration
                 Level Two.  (In this case, all but the
                 most recent BCDS entry is eligible for
                 deletion.)

             3.  A data set has been migrated for at least
                 2 months. (In this case, the last BCDS
                 entry is eligible for deletion.)

          Ongoing cleanup of the MCDS is also necessary to
          control growth of the DF/HSM Migration Level Two
          pool. MCDS entries are elibible for deletion 1 year
          from the date of migration unless the data set was
          migrated explicitly by the user with the HMIGRATE
          command for 2 or 7 years.

          For more information on DF/HSM and noted incom-
          patibilities with the IEHMOVE utility and the TSO
          commands DELETE and ALTER, see the following
          online documentation:

                 JUSD.USERS.REFER(DFHSM)
                 JUSD.DFHSM.DATA

          DF/HSM does not support  ISAM data sets.  These
          data sets reside on ISAMxx volumes and are main-
          tained by Automated Space Management (ASM2).
MORE!     For more information  on ASM2's archive  and
INFO |     dearchive commands, see the following online docu-
          mentation:

                 JUSD.USERS.REFER(DISK)
                 JUSD.DASD.DATA
                     4-5

-------
SECTION 5     TAPE MANAGEMENT
TAPE STORAGE
 AVAILABLE
 TAPES
NCC uses IBM 3480 magnetic cartridge tape technol-
ogy as the default tape storage medium. Magnetic
tape at the NCC is used most commonly for offline
storage of extremely large and/or infrequently used
data sets.  Because of the way the read/write head
operates, tapes are used almost exclusively for data
files which are processed in their physical order, and
which need not be shared by more than one program
at any given time. The magnetic tape technology in-
corporates new features that improve tape perform-
ance and reliability.  This new technology provides
higher data transfer rates,  data compression, and
superior error  recovery capabilities.  Consider  the
following characteristics when you are choosing tape
storage:

    •   When data on a tape is modified, the
       entire reel or cartridge must be copied to
       another reel with  the  appropriate
       changes made to individual records as
       they are carried forward. A single reel
       or cartridge is an awkward medium for
       storing volatile files.

    •   A reel of tape or cartridge may not be
       shared by multiple jobs, and two or more
       data  sets on the same reel must be
       processed one after the other by a single
       job.

The NCC maintains a supply of 9-track, 6250 bits per
inch (bpi) magnetic tapes and 18-track, 38000 BPI
tape cartridges for general use. Tapes owned and
supplied by the NCC are initialized and prepared for
use prior to job submission.
                               5-1

-------
ASSIGNING       Tapes are assigned at the NCC only in the batch
A TAPE           processing mode. In other words, you must submit a
                   batch job with the proper Job  Control Language
                   (JCL) statements and options.

                   To create a tape file use the DD statement in your
                   JCL. An example follows:

                   //anyname DD DSN=niAAAA.tape.rile.narae,
                   //           DISP=(NEW,CATLG,DELETE),
                   //           UNIT=(TAPE..DEFER),
                   //           DCB=(RECFM=FB.LRECL=80,BLKSIZE=8000),
                   //           LABELS 1,SL,EXPDT=98240)

                   Descriptions of these statements and the most com-
                   monly-used parameters and subparameters follow:

                   Anyname DD. Any valid data definition name.

                   DSN. Tape file name which conforms to the same
                   standards as a data set name if it is to be cataloged.

                   DISP. The first subparameter indicates the current
                   status of the  tape file; the  second  subparameter
                   indicates the disposition at normal termination; the
                   third subparameter indicates the disposition at ab-
                   normal termination.

                   UNIT. Specifies the particular I/O device type.

                   DCB. Data Control Block.

                   RECFM.  Specifies the record  format.  The  first
                   character may be one of the following:

                       U - Undefined record format
                       V - Variable length records
                       F - Fixed length records
                       D - Variable length ASCII tape records
                                5-2

-------
       MORE
       INFO
TAPE
RETENTION
PERIODS
The following may be used as the second and/or third
character in any combination:

   B - Blocked records
   8 - When used with F, indicates fixed, stan-
       dard format. When used with V indi-
       cates spanned records.
   A - ASA carriage control characters.
   M - Machine carriage control characters

LRECL. Specifies the length of the logical record for
fixed or variable length records.

BLKSIZE.  Size of each physical block in bytes.

LABEL.  Tape label information.

EXPDT.  Expiration date.

For more details on tape JCL, see the following on line
documentation:

       JUSD.USERS.REFER(TAPE)

The EXPDT subparameter on the tape DD statement
indicates the expiration date.  If you do  not specify
any expiration  date, the system defaults to a period
of 5 days. Thirteen months is the maximum length of
time for retention in the tape library. Expiration sub-
parameter values are as follows:
                   EXPDT=98000
                 Indicates a tape volume with no
                 record in the Tape Management
                 Catalog (usually  foreign/non-
                 NCC tapes).
                              5-3

-------
                   EXPDT=98xxx
TAPE
ARCHIVING
                 Indicates that the tape may only
                 be  released  if not  referenced
                 within xxx (001-365) days.  If the
                 tape is referenced once every xxx
                 days, it will remain in the tape
                 library indefinitely.
                   EXPDT=99000


                   EXPDT=99xxx
                 Identifies a
                 Group tape.
Generation  Data
                 Specifies the tape as one of a set of
                 tapes consisting  of xxx tapes.
                 Retained for the maximum of 13
                 months.
For an additional fee per month, tapes can be stored
in the archival library. To archive or dearchive a tape,
you must contact Data Processing Support Services:

              (FTS) 629-2385
              (919). 541-2385
              (800) 334-9700

Before archivinga tape, you should consider transfer-
ring the data to disk, and then archiving the data set.

The archival library provides for offsite storage of
cartidge tapes containing data that needs to be re-
tained but that has no immediate processing require-
ments. To qualify for placement in the archive tape-
library, at least 70 percent of the tape must have been
used. You are encouraged to consider migrating the
data instead of the tape itself. If you choose to archive
the physical tape, you must copy the tape to another
tape assigned by DPSS. Upon completion of the copy,
you must notify DPSS so that the tape can be trans-
ferred to the offsite archive library for storage.
                               5-4

-------
TAPE
DEARCHIVING
 TAPESCAN
 UTILITY
Consider the following when dearchiving a tape:

    •   Each trip to the archive tape library
       carries an additional charge.

    •   Advance notice of 24 hours is required
       before using a dearchived tape. You will
       be notified when it is available for proc-
       essing.

    •   Archived tapes are considered to be per-
       manently inactive and are' not in the
       Tape Management Catalog so the expi-
       ration date should be EXPDT=98000.

    •   Dearchived tapes can be read but not
       written to.  If you want to add data to
       your tape file, copy the tape file to a Tape
       Management System (TMS) controlled
       tape and then return the dearchived
       tape to the archive library or release it.

    •  Dearchived tapes will be returned to the
       archive library no later than 5 days from
       the date you were notified of availabil-
       ity. So, if you need more time, copy the
       tape file to a TMS controlled tape.

 TAPESCAN is a utility which produces a summary
 dump of the contents of a magnetic tape volume.
 Only the first 132 characters of each tape block are
 printed. TAPESCAN is particularly useful when the
 tape data set names and characteristics of the inter-
 nal label of the tape are not known.

 User Support will process TAPESCAN for the regis-
 tered owner (or creator) of a tape.  Just call User
 Support at one  of the following telephone numbers:
                                5-5

-------
FOREIGN
TAPES
             (FTS) 629-7862
             (919) 541-7862
             (800) 334-2405 (outside NC)

Be prepared to supply the User Support specialist
with your User-ID and the volume-serial number of
your tape.

Foreign tapes are those tapes not permanently stored
in the tape library nor resident in the Tape Manage-
ment Catalog. This category includes any tape cre-
ated with the intention of removing it from the NCC
or any tape submitted from an outside source for
processing.

To process a foreign tape and bypass the Tape Man-
agement Catalog, you must code the expiration date
in the DD JCL statement as EXPDT=98000.
A foreign  tape must  be properly labeled with an
identification sticker  which includes the following
information:

       User name
       User-ID
       Account number
       Telephone number
       Bin number or mailing address
       Volume-serial number or original reel
       identification

Foreign tapes are assumed to be ready for processing
upon arrival at the NCC unless you specifically re-
quest DPSS to label  the tape or  to tape  mark an
unlabeled tape. DPSS will notify you when the tape
arrives or when it is ready for processing. DPSS will
also inform you of the assigned slot number.
                               5-6

-------
          The JCL must include the slot number on the follow-
          ing tape mount statement:

                 /*TAPE Bxnnnn.www

          Where x = 0 for IBM or 2 for DEC,  nnnn is a slot
          number from 0001-9999, and www is the volume
          number.

          At NCC, foreign tapes are also referred to as B-tapes.
          The name comes from  the  slot number which is
          prefaced with the letter B.

          Other considerations about foreign tapes are as fol-
          lows:

             •   A file guard ring will be inserted in
                 every foreign tape received at NCC and
                 a "no write ring^ sticker will be placed
                 on the face of the tape.  If you want to
                 write to your tape, you must notify DPSS
                 when you submit the tape.

             •   There is no security on a foreign tape.

             •   Foreign  tapes are automatically  re-
                 turned to you in 90 days. If you need to
                 use the tape file on a foreign tape for a
                 longer period, copy it to an NCC tape or
                 disk.
MORE |     For more information on foreign tapes, see the follow-
INFO  j     ing online documentation:

                 JUSD.USERS.REFER(TAPE)
                     5-7

-------
SECTION 6     JOB ENTRY SUBSYSTEM
WHAT is rr?
JES2 CONTROL
STATEMENTS
JOBPARM
STATEMENT
 ROUTE
 STATEMENT
Job Entry Subsystem (JES2) is a program thathandles
the order of job execution, job submission, and
SYSOUT (printed and punched) output processing.
The program controls the communication with high-
speed Remote Job Entry (RJE) workstations and
handles commands related to job and system status.

JES2 command and control statements allow you a
degree of control over the submission, execution, and
retrieval of a job. The control statement is used in a
set of JCL statements and has the following format:

      /*command operands

One of the most commonly used control statements is
the JOBPARM statement which is inserted between
the JOB statement and the first EXEC statement.
For example:

/*JOBPARM COPIES=cc FORMS=ffff LINES=11111
/*JOBPARM BURST=Y(or N) DEST^dd

In the above statements, you can specify from 1 to 30
copies, a form number, the number of lines of print (in
thousands),  a bursted  printout, and a destination
printer.

Note that the above statements can be coded on one
line without repeating JOBPARM if you do not go
past column 71.

Another commonly used JES2 control statement is
ROUTE which directs printed or punched output to
a specific location. It also goes in a JCL stream after
the JOB statement and before the EXEC statement.
For example:

       /'ROUTE PRINT HOLD
                             6-1

-------
                   This ROUTE PRINT HOLD statement allows you to
                   view the output before printing by using the Spool
                   Display and Search Facility (SDSF) and then purge
                   the output or route it to the printer of your choice
                   using the output capabilities of SDSF.

                   In the following examples the ROUTE command al-
                   lows you to send the printout to a specific printer
                   (remote) associated with the system on which the job
                   executes, or to another computer system (node) within
                   the EPA network.

                         /*ROUTE PRINT R239

                         /*ROUTE PRINT N9

                         /*ROUTE PRINT N9R12

                   Other JES2 statements inserted in a job's JCL can
                   control the order of submission of data for processing,
                   such as the BEFORE, AFTER, or CNTL statements.

                   For more details about JES2 control statements and
                   their formats, see the following online-documenta-
                   tion:

                         JUSD.USERS.REFER(JES2CON)

JES2              The JES2 operator commands are the commands
OPERATOR        used by the operator of an RJE station to control its
COMMANDS       devices and the jobs whose output is routed to them.
                   The commands have the following format:

                         /*$command operands
                             6-2

-------
          MORE
          INFO
JOB STREAM
MANAGER AND
PRIORITIES
For more details on the JES2 operator commands,
see the following online documentation:

       JUSD.USERS.REFER(JES20P)

All batch jobs which are executed on the NCC-IBM
run under the control of one of the active initiators,
and JES2 controls the initiators.  The JES2 Job
Stream Manager assigns each job to a class (a queue
for similar jobs). Classes are defined according to the
CPU time a job requests. Within job classes, jobs are
ordered by the initiation priority which you assigned
on the JOB statement. Priority establishes:

    •   The job's importance in relation to all
       other jobs in the same class.

    •   How much you are willing to pay for job
       turnaround.

Priority is defined on the JOB statement with the
PRTY=n operand.  Values  for n  can be one of the
following:

   5 -  Receives the fastest batch turnaround.
       ADP Coordinator must  approve  this
       request. Costs six times as much as the
       default Priority 2. Usually the job will
       start within 5 minutes.

   2 -  Default value.  Turnaround times vary
       according to job class.

    1 -  Costs one-half as much as Priority  2.
       Turnaround time is overnight.
                              6-3

-------
For more information about batch job priorities.and
classes, see the following online documentation.

      JUSD.USERS.REFER(SCHEDULE)
          6-4

-------
SECTION 7    PRINTING OPTIONS
 PRINTING AT
 THENCC
 TSO PRINTOFF
 COMMAND
There are four basic ways to print a data set from the
NCC-IBM:

   •  TSO PRINTOFF command

   •  Batch job

   •  ISPF LIST data set

   •  Special documentation utility

The TSO PRINTOFF command is entered at the TSO
READY prompt. It has the following format:
                        PRINTOFF 'data-set-name1 bin# options
                  Options
             Meaning
                  CLASS(class) SYSOUT class in which output is to
                              be printed. System printer is A; laser
                              printer is F.

                  DEST(remote) Remote location to which SYSOUT
                              data sets are to be routed.  Form is
                              Rnnn, RMnnn, or RMTnnn.

                  COPIES(nnn) Number of copies  to  be  printed.
                              Default is 1.

                  OUTLM(lines) Output limit in number of lines. May
                              be 1-6 digits.

                  HOLD      Output is placed in HOLD  queue
                              upon deallocation; NOHOLD is de-
                              fault.
                             7-1

-------
Options       Meaning

LIST         Prints member names; using LIST
             without the PRINT option will list
             just the member names in each PDS
             in DSLIST.  NOLIST indicates that
             member names are not to be printed.

PRINT       Members are printed (following
             member name if LIST option is given).
             NOPRINT indicates that members
             are not to be printed.

NOMSG      Suppresses messages  to the termi-
             nal.

CAPS        Output is to be converted to upper
             case prior to printing.

ASIS         Output is printed without conversion
             to upper case.

UCS(image)   Print image to be used when printed
             (e.g., PN for upper case).
TEXT
Output is to be considered text. De-
faults to ASIS UCSCTN).
FORMS(form) Form (type and size of paper) on which
             the data set is to be printed.

HEADING    Output is to have heading informa-
             tion generated by PRINTOFF; head-
             ing will contain data set name.

NOHEADING Output is not to have heading infor-
             mation.
           7-2

-------
                  Options
                  SNUM
                  ASA
             Meaning

             Last 8 columns of fixed-length rec-
             ords or first 8 columns of variable-
             length records will not be printed.
             Allows sequence numbers to be sup-
             pressed from the print.

             Data set contains ASA carriage con-
             trols in Column 1.  Not necessary if
             RECFM indicates carriage control.

BATCH
PRINTING
VOLUME(#)  Volume where data sets to be printed
             are found.  Used for  all data sets
             specified in the data set list. Not
             required for cataloged data sets.

BURST      Output is to be separated into sheets,
             and sprocket holes are stripped off.
             Otherwise, output is printed in nor-
             mal fanfold mode.

For more information on the PRINTOFF command,
see the following online documentation:

       JUSD.USERS.REFERCPRINTOFF)

You can also print a data set using a set of Job Control
Language statements in the batch mode.  The gen-
eral form of the DD statement to print is as follows:

//ddname DD SYSOUT=class,optional-parameters
                              7-3

-------
Batch Utility
for Printing
 OUTPUT JCL
 Statement
The most commonly used SYSOUT classes are as
follows:

   A Output goes to a system printer.

   F Output goes to the IBM 3800 laser printer. To
      specify a special form, the format is as fol-
      lows:

             SYSOUT=(F,nnnn)

Where nnnn is the 4-digit form number.

The online data set JUSD.UTILITY.DATA can be
used to print data sets. Access the member PRINT to
print a data set on the system printer on 14-7/8" by
11" paper in upper case or the member PRNTTEST to
print a data set on the laser printer in compressed
print on 11" by 8-1/2" paper. Just substitute your job
card information and data set name and submit the
job for processing. Then type CANCEL (or CAN) on the
COMMAND ===> line to restore the utility to its
previous version.

For more information on printing, see the following
online documentation:

      JUSD.USERS.REFER(PRINT)
      JUSD.USERS.REFERCNCCLASER)
      JUSD.USERS.REFERCPNTNFORM)

Used in conjunction  with the DD statement, the
OUTPUT JCL statement can specify options for a
SYSOUT data set such as destination, number of
copies, class, spacing, orform number. The OUTPUT
JCL statement will allow you to print a job locally
while at the same time send the same job to a distant
site for printing.
                             7-4

-------
                   For more information on the OUTPUT JCL state-
                   ment, see the following online documentation:

                          JUSD.USERS.REFERCJCLOUT)
CHOICES OF      The NCC allows you several options with respect to
PAPER AND SIZE  type of paper and size of print. The form number is
OF PRINT         the key to requesting these options. The form num-
                   ber is defined as follows:
                   FORMSOCXXX)
                                Lc
arbon:  Number of parts Tor the paper (1-6)
                               I—Paper Size: 1 14-7/8" by 11" unlined
                                          2 14-7/8" by 11" lined
                                          5 8-1/2" by 11" unlined
                                          7 8-1/2" by 11" unlined,
                                            3-hole punch
                                          8 11" by 8-1/2" unlined,
                                            reduced print
                              	Print Train: 1 = Upper case (PN)
                                          3 = Upper and lower case (TN)

                              	Print Density: 6 or 8 lines per vertical inch
                   The following drawings depict the NCC's most com-
                   monly used types of paper.
                                7-5

-------
1 	
o
o
o
o
o
o

o
o
o
o
o



14-7/8" BY 1 1 "
6 LINES PER INCH
UPPER CASE
UNLINED
NO CARBONS




o
0
o
0
o
o

o
o
o
o
o











-
61 11

o
o
o
o
o
0
0
o
o
o
0


14-7/8 "BY II"
6 LINES PER INCH
UPPER & lower CASE
UNLINED
NO CARBONS




o
o
o
o
0
0
o
o
0
o
o





•t


-
631 t
  7-6

-------
JK-K
Ol
1
oi
i
ฐ"
0"
1
ฐl
o1
0,
0'
1
o1
o,
o1
J
"*""" 	 " 'Yl ' ' '••••'•••••""'fcf^fffffffffffffffffotem g
•o |

'ฐ 1
' ฃ
8-1/2" BY 1 r BURSTED SIZE |0 1
6 LINES PER INCH '„ g
UPPER & lower CASE ' g
UNLINED ' iซ %
NO CARBONS .0 |
!o 1
, |
'ฐ 1
iฐ i
1ฐ 1
'o 1
1 ฅ:
Jt^^I!^^IO^^^^^^^:o•^IO^^xoxo^^^x•"•"•"•"•"•x•"•"•"•"•'•"•"•"•"'"•"•"•"•"•"•"•*•"**
Ol
0
1
oi O
i
ฐ' 8- 1/2" by 11 ' BURSTED SIZE
oi 6 LINES PER INCH
i UPPER & lower CASE
ฐi 3-HOLE PUNCH
ol 0 UNLINED
, NO CARBONS

o
Ol
J
0
oi O
i
ฐi
oi
1
1
•>X*K*X'X-!
>o
i
|O
'o
1
,o
'o

1ฐ
ID
I

'o
i

'o
1
1ฐ
'o
1

1
!ji
>
|
•^
1
n.
>j
s
1
.V
|

y
g
1
>:,
:•:
j


6351
6371
t:::ฅ:ฅ
o
i
ฐF
Ol
o1
1
o.
1
0|
ol
1
Q
1
ฐ 1
Ol
1
0
1
0 1
0|








8- 1/2" BY 11" BURSTED SIZE
8 LINES PER INCH
UPPER & lower CASE
UNLINED
NO CARBONS







i&y
0

o
o
o

o
0
o

o
o
o

o

o
0
&
S
iv
1
i
1
•:•:
:-:j
ฃ;
1
*.;
8
g:
|
g
Vt
|

I
        8381
          7-7

-------
PRINTING
USING ISPF
LIST
DATA SET
How to Activate
LOG/LIST
If you are a full-screen user, you can take advantage
of ISPFs LIST data set to obtain printed copies of
data sets. A number of ISPF functions (for example,
the LIBRARY UTILITY, the DATA SET LIST UTIL-
ITY, and the MOVE/COPY UTILITY) provide op-
tions to "print" entire data sets or PDS members.
When hard copies are requested in this way, ISPF
copies the source data set (the one you asked to be
printed) into  the LIST data set that ISPF maintains
for every user's session. Then when you exit from
ISPF, one batch job is submitted to print everything
that has been  accumulated in the LIST data set
during the just ended session. This method is par-.
ticularly useful for printing multiple data sets, as
opposed to entering the PRINTOFF command for
each data set to be printed. In addition, it is some-
times convenient to use the ISPF primary command
PRINT to copy the contents of the terminal screen
into the LIST data set for subsequent printing.

To obtain hard copies using the LIST data set, you
must first set up the ISPF LOG/LIST DEFAULTS
panel. Choose Option 0 from the ISPF/PDF Primary
OptionsMenu;thenselectOption2,LOG/LIST. ISPF
displays the LOG/LIST DEFAULTS panel for you to
specify whether you want to print the contents of
these two data sets at the end of your ISRF session,
and if so, where. The LOG data set contains an "audit
trail" of your ISPF session.  For example, if you
created a new data set, that event would be recorded
in the LOG data set. The LOG listing may be of value
to a programmer investigating a program that con-
tinues to "bomb" by indicating at what point process-
ing stopped and by providing a mini dump. However,
most users elect  to suppress the LOG data set by
entering a D  in the process option and changing the
primary and secondary pages fields to zero. To obtain
                              7-8

-------
PRINTING
UTILITY FOR
DOCUMENTA-
TION
the hard copies you want from the LIST data set, the
recommended process option is PD (for print and
delete). This selection tells ISPF to delete the LIST
data set after its contents  have been sent to the
printer.

The final step to ensure that the contents of the LIST
data set are processed properly is to complete the job
card on the JCL at the bottom of the LOG/LIST DE-
FAULTS panel. ISPF uses that job card on the job it
submits to print your LIST data set. It should reflect
you own User-ID, account, FIMAS code, bin number
or mail code, and any other parameters you wish to
specify (like NOTIFY).  You may also enter a JES2
ROUTE statement  to direct your printout to the
printer of your choice.

Full-screen users can print most NCC documenta-
tion with a special utility under ISPF.

Just select E from  the ISPF/PDF Primary Option
Menu and then U for UTILITIES.

Then you can select a category of NCC-IBM documen-
tation or the NCC-IBM User's Guide. A list appears
on the screen. You  can then browse (B) or print (P)
your selection just by typing a B or a P to the left of
your selection.  Complete instructions are on the
screen.
                              7-9

-------
PRINTING AT     When you print jobs on the NCC's system printer or
ANOTHER SITE   on the IBM 3800 laser printer, the printout is placed
                  in your bin for courier delivery, or it is mailed to you.
                  If the printer hardware is available, you may choose
                  to print the results of a job at your site by routing the
                  job to your node or remote printer. Use the destina-
                  tion parameter on the PRINTOFF command as fol-
                  lows:

                  PRINTOFF 'data-set-name1 bbbb DESTCRMTnnn)

                  Where bbbb is the bin number and nnn is the remote
                  number.

                  The JES2 /*ROUTE statement is also used for rout-
                  ing print to  a remote location.  In the following
                  example, the output is sent to the LMF at New York:

                        /*ROUTE PRINT N7
         MORE I    For more information on routing print, see the follow-
                  ing online documentation:

                         JUSD.USERS.REFER(JES2CON)

                  High-quality, channel-connect printing from the IBM
                  3090 is available at the WIG through the use of two
                  Datagr aphix 9835 laser printers. To route to the WIG
                  submit your batch job with the following JES2 control
                  statement:

                         /*ROUTE PRINT N3

                  The default form at the WIG is 8381 (8 lines per inch,
                  upper and lower case, 11" by 8-1/2" paper,  no car-
                  bons).
                             7-10

-------
MORE
INFO
For more details on the policies and parameters
concerning the WIC's laser printers, see the following
online documentation:

      JUSD.USERS.REFERCWICLASER)
                    7-11

-------
SECTION 8      NCC UTILITIES
BATCH
UTILITIES
JES2 GLOBAL
STATUS
TRACKING
NCC User Support has developed a set of "skeleton"
batch jobs to help you complete various tasks in the
batch mode. This sample Job Control Language is in
the online  data set JUSD.UTILITY.DATA with
member names.  Each member has comment lines
which describe the utility and instruct you in its use.
The suggested method for using these data sets is to
allocate a partitioned data set under your User-ID
and then copy the members that you want to use.
Each set of JCL requires a job card as the first card,
and it  must contain your User-ID, account code,
FIMAS code, and bin number. In a short time you will
develop a "personalized" set of utilities for your most
frequent tasks.

Some of the  types of batch tasks that may be accom-
plished using JUSD.UTILITY.DATA include disk
space management, data set allocation, data set
maintenance, copy utilities, and print utilities. Refer
to member CONTENTS for the name and a descrip-
tion of the members of JUSD.UTILITY.DATA.

JES2 Global Status Tracking allows  you to deter-
mine the real-time status of jobs at different nodes in
the network. The utility will display the status of all
jobs  including those  executing,  those waiting for
print, and those  waiting for execution.

To use Global Status Tracking, enter the following
command at the TSO READY prompt:

       QX node prefix

Node is the destination of the request. A table of node
numbers is  listed  in  the  online  data  set
JUSD.NODE.LOCATION.DATA
                              8-1

-------
SPOOL
DISPLAY
AND SEARCH
FACILITY
Prefix is the job name prefix. If the prefix is omitted,
the prefix defaults to your User-ID.

For more information on JES2 Global Status Track-
ing, see the following online documentation:

      JUSD.USERS.REFER(GLOBAL)

The Spool Display and Search Facility (SDSF) allows
you to display the system log and the JES2 queues
and obtain information on the status of your jobs. For
example, you made changes to a text file and want to
proofread the output before it prints.  You can use
SDSF to view the output on the terminal screen. In
addition, you can reroute jobs from one remote site to
another, cancel jobs awaiting execution, change the
job class, or purge job output.

To use the utility, type SDSF after the READY prompt.
Or, if you are a full-screen user, choose E from the
ISPF/PDF Primary Option Menu and then S from the
next  screen.

The two most frequently used options are I to view the
input queues and 0 for the output queues. The prefix
is set by default for your User-ID and limits the
display to only your jobs.

For more information on SDSF, see the following
online documentation.

      JUSD.USERS.REFER(SDSF)
      JUSD.ISPF.GUIDE
      JUSD.SDSF.DATA
                              8-2

-------
JOB STATUS
TRACKING
SYSTEM

 BULK DATA
 TRANSFER
Job Status Tracking System (JSTS) is a utility that
allows you to track the activity of a job as it progresses
through the NCC-IBM system. Complete historical
data on jobs is available through JSTS, including
such information as when a job was submitted, when
it began execution, and when execution was com-
pleted.  You can also see when the job printed, which
device it was printed on, how many lines of output
were generated, and which form it was printed on.

To access JSTS, type JSTS at the READY prompt. Or,
if you are a full-screen user, choose E from the ISPF/
PDF Primary Option Menu and then J from the next
screen.

Three screens are provided:  the JSTS option menu;
the job list menu, which displays all jobs run under
your User-ID for the preceding 7 days;  and the de-
tailed job list panel.  To get information on jobs
submitted by other users, overtype the User-ID on
the JSTS option menu panel.

For more  information on JSTS, see the following
online documentation:

       JUSD.USERS.REFER(JSTS)
       JUSD.JSTS.GUIDE

Bulk Data Transfer (BDT) provides facilities to trans-
fer data sets from one mainframe computer to an-
other, such as from the NCC-IBM to an LMF or from
one LMF to another LMF.

The transfers can be accomplished through interac-
tive execution or through batch.
                              8-3

-------
INTERACTIVE
TRANSFERS
BATCH
TRANSFERS
         MORE
         INFO
ARBITER
Full-screen users can access Bulk Data Transfer by
choosing E from the ISPF/PDF Primary Option Menu
and then B or BD.   B presents NCC customized
dialogs; BD is a more generic version.

You can also use Bulk Data Transfer in batch mode by
creating a job containing JCL statements and BDT
transactions and then submitting it for  processing.

For more information on BDT and sample batch JCL,
see the following online documentation:

      JUSD.USERS.REFER(BDT)
      JUSD.BDT.DATA

Or, after you have selected B or BD from the  NCC
Option Menu,  type HELP on the COMMAND  ===>
line.

Arbiter,  a micro-to-mainframe software link  from
Tangram Software, employs software components on
both the mainframe  and your personal  computer to
allow the two to communicate with each  other and to
perform tasks unique to the separate environment of
each.

Arbiter extends the resources of the PC by providing
virtual disk drives into which you can mount remote
disks that exist as mainframe disk space (DASD).
That is, Arbiter intercepts all DOS  disk I/O  com-
mands and executes  remote disk commands against
the mainframe DASD files as though the disks were
physically attached to your PC. This allows you to
issue commands such as COPY and BACKUP to copy
files from the PC to the mainframe without having to
issue upload and download commands.
                              8-4

-------
Utilities and applications will work with remote
disks in that same way as with real PC disk drives.
You can readily share data and programs with other
PC users by storing the information on shared remote
disks. Furthermore, you can subset mainframe data
bases to a remote disk and can then use the data on
a PC without transferring the data to the PC's hard
drive. Besides supplying additional work space to PC
users, Arbiter also provides facilities for remote job
entry, printing mainframe data at the PC, and 3278
or 3279 terminal emulation.

Arbiter provides access to EPA's corporate data by
supplying interfaces to SAS and FOCUS as well as
application programming interfaces for mainframe
products such as COBOL, FORTRAN, and Assem-
bler. Software developers can  use these facilities to
develop specific retrievals on an ad hoc basis or on a
recurring basis. Arbiter allows the PC user to quickly
initiate "predefined extractions" from  DOS-level
command or from an easy-to-follow menu system.

Arbiter supplies device drivers that include all EPA
PC communications mainframe links to the IBM
3090, including synchronous and asynchronous links,
standalone and LAN connections, and common ven-
dor communications adapters such as  DCA,  IBM,
IRMA, and CXI. Dial-up access.is available through
the TCP and IBM PSI.

Arbiter may be used in place of Kermit and other file
transfer software such as IRMA's SEND/RECEIVE,
since it provides reliable data transfers in combina-
tion with conversion of mainframe data  to PC file
formats. Arbiter also provides facilities for uploading
and downloading mainframe flat files using selected
translate tables to maintain compatibility with other
NCC supported file transfer methods.
            8-5

-------
ARBITER PC       NCC has purchased and installed the Arbiter main-
SOFTWARE        frame components and is licensed to distribute the PC
                   component to any user with a valid IBM timeshare
                   account number. The PC software component and
                   documentation are available through PC Site Coordi-
                   nators and Information Centers in Washington and
                   RTF.

ACCESSING       To access Arbiter, type M for menu at the "Welcome
ARBITER          to EPA" screen as shown below:
                                                          1
                           WELCOME TO THE
                    US ENVIRONMENTAL PROTECTION AGENCY
                       TaECOMMUNICATIONS NETWORK

                      ENTER COMMAND OH M FOR MENU
                                  012/001 0-031 FT
                                                          J
                   When the following menu appears, type ARBITER or
                   press PF10.
                              8-6

-------
NATIONAL COMPUTER CENTER
      SELECTION SERVICE
PFKEY
PF13
PF14
PF19
PF8
PF10
      PCICS
      DCICS
      ISO
      EMAIL
      ARBITER
      U S. EPA TELECOMMUNICATIONS NETVvORK MENU
                  15:20 Tuesday August 23. 1988
                                             TERM:
                                                        T260624
                                                        MODEL 2
CICS-Production
CICS-Development
TSO-NCC
EMAIL ACCESS
Arbiter
PFKEY
PF15
PFI6
PFI7
PF20
PF21
PF22
PF23
PF24
PF2
PF3
PF4
PF5
SELE
NY
DV
WIC
SE
AT
DA
KC
PH
Cl
BN
CH
SF
                                        LOGICAL MAINFRAME
                                        SELECTION SERVICE
ISO-New York LMF
ISO-Denver NEICLMF
ISO-Wash Info Center
ISO-Seattle LMF
ISO-Atlanta LMF
ISO-Dallas LMF
ISO-Kansas City LMF
TSO-PhlladelphiaLMF
TSO-Clnclnnati LMF
ISO-Boston LMF
ISO-Chicago LMF
ISO-San Francisco LMF
                      HIT PFKEY OR ENTER SELECTION ARBITERl
                                 012/001  0—031 FT
   MORE
   INFO
                 The Arbiter system will then prompt for your User-
                 ID,  your  password, and your Timeshare account
                 number.

                 For more information on Arbiter, see the following
                 onli le documentation:

                         JUSD.USERS.REFER(ARBITER)
                         JUSD.ARBITER.DATA
                             8-7

-------
EMAIL SERVICE  Electronic Mail (Email) is an easy-to-use, computer-
                   based messaging service provided to  all Agency
                   employees and authorized affiliates.  The service
                   provides virtually instantaneous exchange of textual
                   messages and/or binary files regardless of the time or
                   location of transmission. Email is available through
                   all computer terminals supported by the Agency
                   including full-screen  IBM • mainframe  terminals,
                   ASCII terminals, PCs, Primes, and DECs.

                   To obtain Email service, you must register through
                   your Email Coordinator. (Check with your ADP
                   Coordinator or call User Support if you need the name
                   and telephone number of your  Email Coordinator.)
                   You will be issued an Email ID which is your "elec-
                   tronic" mailbox number and an initial password.

                   To access  Email, type EMAIL  on the WELCOME
                   screen, or press PF 8 at the Menu screen. You will be
                   prompted by the Email service to login to Email by
                   entering your Email ID and your password.

                   After you have successfully accessed the service, at
                   the Email system prompt (>), you have several com-
                   mand options including the following:

                   Command     Function

                   EPANET      Display the EPA network' telephone
                                 numbers.
                   ED           Access the Email text editor.
                   EMAIL NEWS
                   or EM        Access the EPA Email bulletin board.
                   HELP or ?     Access the Email online help facility.
                   LEARN       Access the Email online tutorial.
                   MAIL        Access the Email Mail service.
                   MAILCK      Check the current  status of your
                                 mailbox.
                               8-8

-------
RESOURCE
ACCESS
CONTROL
FACILITY
NETWORK   Display the telephone numbers for
             the public carriers.
OFF or LO    Sign off the Email service.
ON EPAxxxxx Logon to another Email ID.
PASSWD     Change your current password.

Using the Mail command, you can send messages to
other Email users or read (or scan) messages in your
mailbox. When you send messages to other users, the
messages can be created online in the Mail service, or
you can create them offline on your local computer
system, such as in a PC file or in an IBM mainframe
data set.  The message file can then be uploaded to
Email for transmission. If your message is more than
a few lines, creating it offline is probably easier and
more efficient.

An Email Quick Reference Guide is available which
explains the EPA's Email service in more detail.
Contact User Support or your Email Coordinator to
obtain a copy of the Guide.

In addition, you  can  refer to the Email Guide,  a
section in this Guide to NCC Services, for detailed
information on using Email.

IBM's Resource Access Control Facility (RACF) is the
security tool for protecting your computer resources
(e.g., data sets, job output, tapes, etc.)

Full-screen users can use RACF by selecting E from
the ISPF/PDF Primary Option Menu and then by
selecting R for RACF. The  menu/dialogs give you
options to modify or add protection to your resources.
Another method of protecting resources with RACF
uses a few simple TSO commands which are typed in
at the READY prompt.
                              8-9

-------
UTILIZING RACF
PROTECT A
DATA SET
ADD USERS AND
COUPS TO
RACP LIST
RACF manages resources on the system (e.g., data
sets, tapes etec.) through user-defined profiles..RACF
profiles identify the resource owner, access to the
resource, and audit notification criteria.  Generic
profiles can protect an individual resource or can
hierarchically protect multiple resources.  Wildcard
characters can be included in the generic profile to
provide masks for matching resource names.

The ADDSD command protects an unprotected data
set. The format is as follows:

 ADDSD 'dsname' OWNER(iii) UACCXacoess) GENERIC

The owner of a data set should be an individual user
(iii). Only the owner may change the RACF parame-
ters associated with the data set.

UACC means Universal Access or access granted to
all users on the system. You can specify NONE (no
access), READ (read-only access),  UPDATE (read/
write access), or ALTER (read/write, delete, create).

The PERMIT command is used to add a user to the
access list for a RACF protected data set. The format
is as follows:

 PERMIT 'dsname' ID(iii) ACCESS(access) GENERIC

In the ID parameter, you may indicate a User-ID or
an account. When an account is specified, you are
providing the specific access to any User-ID that is
valid under the specified account.

In the ACCESS parameter, you specify what type of
access that the added user is to have.
                             8-10

-------
LIST RACF
PROFILE
CHANGE RACF
PROFILE
 DELETE RACF
 PROTECTION
 JOB OUTPUT
 PROTECTION
 Create Resource
 File
The LISTDSD command is used to list the details of
a specific RACF profile. The format is as follows for
a list of all parameters:

    LISTDSD DATASETtdsname) ALL GENERIC

The ALTDSD command is used to change the RACF
profile for a data set.  The format is as follows:

     ALTDSD 'dsname'.-.parameters GENERIC

Where parameters can be any of those that provide
access authority to one or more users. In the follow-
ing example, any access authority that User-ID ABC
had for the data set is removed and no access to the
data set is reestablished for User-ID ABC.

ALTDSD 'dsname1 KXABC) ACCESS(NONE) GENERIC

The DELDSD command deletes all RACF protection
from a data set.  The format is as follows:

          DELDSD'dsname' GENERIC

Only the owner of the data  set or  someone  with
explicit  authority may use this  command for the
specified data set.

Job output can also be protected by a few simple TSO
commands. These functions are al so available through
ISPF panels.

The RDEFINE command is used to create a RACF
resource profile for a job. If the job name ends with
an asterisk, the profile will apply to all jobs beginning
with the sequence of characters. An example follows:
                             8-11

-------
                   RDEPINE OUTPUT jobname OWNER(iii) UACC(access)
Change RACF
Profile
Delete Resource
Profile
List Resource
Profile
Build Access
List
Delete from
Access List
Tape Protection
The RALTER command is used to change the UACC
and/or owner associated with the resource profile. An
example follows:

RALTER OUTPUTprofile-name OWNER(iii) UACC(access)

The RDELETE command deletes a RACF resource
profile. An example follows:

RDELETE OUTPUT profile-name OWNERfiii)
       UACC(acoess)

The RLIST command displays the resource profile.
An example follows:

       RLIST OUTPUT profile-name ALL

The PERMIT command allows you to build an access
list for the resource profile. Note that you can use an
individual User-ID (iii) or an account code (aaaa) for
the OUTPUT ID parameter.  An example follows:

PERMIT profile-name OUTPUT IDfiii) ACCESS(access)

The PERMIT command  also allows you to remove
access to a job for a User-ID/account.  An example
follows:

   PERMIT profile-name OUTPUT IDfiii) DELETE

Tapes may also be protected through  similar TSO
commands or through ISPF panels. Just substitute
the OUTPUT parameter with TAPEVOL and indi-
cate the tape volume number instead of a profile or job
name.  The GENERIC operand should be omitted
since all tape profiles are discrete.
                             8-12

-------
                  For more information on security and RACF protec-
                  tion, see the following online documentation:

                        JUSD.USERS.REFERCSECURITY)
                        JUSD.RACF
                        JUSD.RACF.DATA
                        JUSD.JOB.PROTECT

                  Or, access the tutorial by typing HELP after you
                  choose RACF from the ISPF/PDF Primary Option
                  Menu.

PLSORT          The NCC offers only software package for sort/merge
                  applications, Phase Linear Systems Inc.'s product
                  called PLSORT. The package offers all of the capa-
                  bilities  included  in IBM's Soft/Merge  program.
                  PLSORT can be initiated with job control language or
                  invoked from user-written FORTRAN, COBOL VSII,
                  PL/1, or Assembler programs.  It runs under the OS/
                  VS operating system. The utility processes fixed- or
                  variable-length, blocked or unblocked records as long
                  as the input and output have the same general record
                  type (fixed or variable). For input and output, PLSORT
                  supports sequential data  sets, VSAM files, and li-
                  brary members. Sequential data sets may reside on
                  disk, tape, or any other medium supported by BSAM.

                  The following JCL invokes the PLSORT procedure:

                         //stepname EXEC  PLSORT
                                         SORT

                  Tape sorts are not available on the IBM system.
                  Users should use MAXSORT if large volume sorts are
                  to be performed.  Since tape  sorts are not used, a
                  SORTLIB DD card is unnecessary.
                             8-13

-------
                  For more information on PLSORT, see the following
                  online documentation:

                         JUSD.USEBS.REFER(PLSORT)
                         JUSD.PLSORT.DATA

KWIC/KWOC      The Key-Word-In-Context (KWIC) system provides a
                  simple input procedure and flexible multipoint out-
                  put of almost any kind of non-computational informa-
                  tion.  It was originally designed to handle biblio-
                  graphical information.  The system, which can be
                  used for anything from a reprint file to a legal docu-
                  ment system, allows the automatic generation of
                  various indexes based on data provided by you.

                  The indexes requested most frequently are those by
                  author, title, Key-Word-In-Context, and Key-Word-
                  Out-of-Gontext (KWOC).
         MORE I     For more information on KWIC/KWOC, see the fol-
                   lowing online documentation:

                         JUSD.USERS.REFERCKWICKWOC)
                         JUSD.KWIDOC
                              8-14

-------
SECTION 9      IBM UTILITIES
BATCH
UTILITIES
IEFBR14
IEHPROGM
IBM-supplied utilities are an integral part of the IBM
system and provide a variety of useful functions.

These utilities are used in batch processing. Sample
Job Control Language (JCL) is as follows:

    //stepnameEXEC PGM=utility name
    //SYSPRINT   DD SYSOUT=class
    //SYSUT1     DD DSN=input-data-set-name
    //SYSUT2     DD DSN=output-data-set-name
    //SYSIN       DD *
      (control statements)

IEFBR14 is not a utility in the true sense of the word,
but it is useful as a program that terminates imme-
diately with a return code of zero. IEFBR14 allows
system allocation routines to be invoked so that you
can check JCL syntax and allocate, delete, catalog,
and uncatalog data sets through JCL alone. It  also
helps in ensuring that enough space is available for
data sets without invoking the main program.

For more information on IEFBR14, see the following
online documentation:

      JUSD.USERS.REFERCIEFBR14)

IEHPROGM is a data set maintenance utility with
the following functions:

    •  Scratches data sets or member of data
       sets on Direct Access Storage Device
       (DASD) volumes.

    •  Renames data sets or members of data
       sets on DASD volumes.

    •  Catalogs or uncatalogs data sets.
                              9-1

-------
IDCAMS
The DISP field is used most often for cataloging or
uncataloging a data set, but if you want to scratch a
data set without deleting the catalog entry, 'use the
IEHPROGM utility.

For more information on IEHPROGM, see the follow-
ing online documentation:

       JUSD.USERS.REFERdEHPROGM)

IDCAMS (Access Method Services) is a VSAM utility
which provides data set maintenance functions with-
out writing a program. These functions include the
following:
                         Defining VSAM data sets.
                         Deleting VSAM data sets.
                         Recovering and backing up data sets.
                         Printing data sets.
                         Creating alternate indexes for certain
                         types of data set organizations.
                         Creating catalog listings.
                         Altering tuning parameters.
                         Copying VSAM or SAM data sets to
                         VSAM or SAM data sets.
                         Listing a catalog.
                  For more information on IDCAMS, see the following
                  online documentation:

                         JUSD.USERS.REFER(IDCAMS)
                         JUSD.DFEF.DATA
                              9-2

-------
IEBGENER
IEBCOPY
IEHMOVE
IEBGENER has the following functions:

    •   Copies sequential data sets.
    •   Copies individual member of partitioned
       data sets.
    •   Reblocks data sets.

For more information on IEBGENER, see the follow-
ing online documentation:

       JUSD.USERS.REFERdEBGENER)

 IEBCOPY has the following functions:

    •   Copies a partitioned data set.  Often
       used  to expand allocation  or change
       directory space.

    •   Creates a backup copy on tape of a par-
       titioned data set.

    •   Compresses  a  partitioned data set in
       place.

For more information on IEBCOPY, see the following
online documentation:

       JUSD.USERS.REFERdEBCOPY)

IEHMOVE has the following functions:

    •   Copies or moves sequential, partitioned,
       or direct data  sets. COPY  leaves the
       original; MOVE scratches the original
       after the copy and changes the catalog
       entry.
                             9-3

-------
                      •   Automatically allocates space (or it may
                          be preallocated).

                      •   Reblocks the target data sets if re-
                          quested.

                   Although IEHMOVE has many duplicated functions
                   in IEBGENER and IEBCOPY, it allocates space
                   automatically, and it can handle direct as well as
                   partitioned and sequential data sets.

                   For more information on IEHMOVE, see the follow-
                   ing online documentation:

                          JUSD.USERS.REFER(IEHMOVE)

IEHLJST          IEHLIST lists the entries in the directory (i.e., the
                   members) of a partitioned data set created by the
                   Linkage Editor.

                   IEHLIST can list up to 10 partitioned data set direc-
                   tories in a single invocation.  A partitioned data set
                   directory is made up of blocks of 256 bytes.  Each
                   directory contains one or more entries which reflect
                   member and/or alias names as well as attributes
                   assigned by the Linkage Editor. Prom the listing, you
                   can see what members exist, their sizes, and their
                   various attributes.

                   For more information on IEHLIST, see the following
                   online documentation:

                          JUSD.USERS.REFER(IEHLIST)
                              9-4

-------
LINKAGE
EDITOR
         MORE
         INFO
The Linkage Editor is a program provided by IBM as
an adjunct to the various language translation pro-
grams. It is used to process the object modules pro-
duced by the language translators, resolving refer-
ences between programs, changing the form to that of
a relocatable load module, and storing attribute infor-
mation.

The  Linkage Editor takes a combination of object
modules, load modules, and control statements and
combines them into a single output load module.

The following specific DD names are used to call the
Linkage Editor.

    DD Name    Associated Data Set

    SYSLIN      Primary input

    SYSLIB      Automatic call library

    SYSUT1      Work data set

    SYSPRINT   Diagnostic messages

    SYSLMOD    Output module

The Linkage Editor may also be called with the TSO
LINK command.

For more information on the Linkage Editor, see the
following online documentation:

       JUSD.USERS.REFER(LINKED)

 Or, type HELP LINK at the TSO READY prompt.
                               9-5

-------
VIRTUAL
STORAGE
ACCESS
METHOD
VSAMAID/XP
Virtual Storage Access Method (VSAM) supports the
following data set organizations:

    •   Key Sequenced Data Sets (KSDS)
    •   Relative Record Data Sets (RRDS)
    •   Entry Sequenced Data Sets (ESDS)

VSAM maintains a comprehensive set of statistics to
provide information concerning utilization, perform-
ance, and access and update counts. It also provides
device independence, program independent tuning
parameters, RACF security support, a range of data
sharing and integrity options, and a comprehensive
set of utilities.

VSAMAID/XP provides the tools required to tune and
monitor VSAM clusters. It is primarily for the per-
formance analyst and  the capacity planning man-
ager,  but it can also be used for tuning individual
VSAM clusters.  Statistical history can be used to
produce cluster definition recommendations as fol-
lows:

    •   Attempt to reduce index levels.

    •   Maximize Direct Access Storage Device
       utilization.

    •   Estimate required free space by project-
       ing past growth.

    •   Estimate true allocation requirements
       based on calculated average size, device
       capacity for the selected  CISIZE, and
       free space requirements.
                               9-6

-------
For more information on VSAM, see the following
online documentation:

      JUSD.USERS.REFERCVSAM)
      JUSD.VSAM.DATA(DOC)
           9-7

-------
SECTION 10    PROGRAMMING LANGUAGES
 COMPILERS,     The NCC maintains many different programming
 INTERPRETERS, language compilers, interpreters, and assemblers for
 AND              EPA users.
 ASSEMBLERS
                   Compilers are software systems which accept state-
                   ments coded in specific languages as input and pro-
                   duce object code as output. During the compilation
                   process, syntactical errors are noted automatically
                   and many other  useful programmer aids can be
                   produced using selected compiler options. Compilers
                   are used exclusively to produce machine-executable
                   code from high-level language source statements.
                   High-level languages are so named since each lan-
                   guage statement  will  produce many machine lan-
                   guage instructions when compiled.

                   Interpreters also  operate on high-level source lan-
                   guages. They are significantly different from compil-
                   ers since they interpret and execute each statement
                   as it is encountered.  Consequently, interpretive
                   languages are generally  most economical  for one-
                   shot programs or time-critical development  work.
                   Programs which are to be run repeatedly would be far
                   too expensive to run continually in this mode.

                   Assemblers process low-level languages with instruc-
                   tion sets which have almost a one-to-one correspon-
                   dence with the machine instructions they produce.
                   Such languages are usually used for systems soft-
                   ware coding or for coding which has to be as efficient
                   as possible.
 LINKAGE
 EDITOR
The primary output produced by compilers and as-
semblers is object code. Object code cannot be exe-
cuted directly but must be processed by the Linkage
Editor.
                               10-1

-------
                   NCC has established standards governing the con-
                   struction and use of language processor cataloged*
                   procedures. Step names and commonly used symbol-
                   ics are given consistent names. Any procedure which
                   invokes a compiler, assembler, or interpreter must be
                   supplied with the following JCL statement:

                         //xxxx.SYSIN DD

                   This DD statement must refer to the data set contain-
                   ing the source program or is followed by the source
                   program in the input stream, xxxx is the name of the
                   compile step; e.g., FORT for FORTRAN, COB for
                   COBOL, COB2 for VS COBOL II, etc. Similarly, any
                   input into the Linkage Editor steps should be in-
                   cluded in order as the following:

                         //LKED.SYSLIN DD

                   Or, in the GO steps as the following:

                          //GO.name DD

ASSEMBLER      Assembler Language (ALC from Assembler Language
LANGUAGE       Coding) is a low-level symbolic programming lan-
                   guage. ALC instructions have almost a one-to-one
                   correspondence with absolute machine instructions.
                   ALC does allow macroinstructions to be created and
                   stored for inclusion  into any number of ALC pro-
                   grams.  This facility tends to make ALC program-
                   ming more reasonable over a period of time. ALC is
                   used for most system software work since it allows
                   the programmer to  code at the same level as the
                   computer operates. Because of ALC's micro nature,
                   it is rarely used for the development of application
                   systems since the cost of such developments and of
                   the subsequent maintenance can be cut substantially
                   by using a high-level language.
                              10-2

-------
CATALOGED
PROCEDURES
COBOL
Cataloged procedures for Assembler Language are as
follows:

   Procedure   Function

   ASMHC     Assemble only.
   ASMHCL   Assemble and link-edit.
   ASMHCLG  Assemble, link, and execute.
   ASMHCG   Assemble and execute with-
               out link-edit.
   ASMHLG   Link-edit and execute.

For more information about Assembler Language
and parameters for the cataloged procedures, see the
following online documentation:

       JUSD.USERS.REFERCASSEMBLR)

COBOL (Common Business Oriented Language) is a
high-level programming language, with English-like
syntax, which is used mainly for commercially-ori-
ented application programming.   The American
National Standards Institute has published stan-
dards which are intended to create a language that is
interchangeable  on  and by all computer systems
which offer COBOL.  Two versions of COBOL are
supported at the NCC.
                             10-3

-------
CATALOGED
PROCEDURES
FOR VS COBOL II
FORTRAN
VECTOR
PROCESSING
Cataloged procedures for VS COBOL II are as fol-
lows:

   Procedure   Function
                     COB2UC
                     COB2UCL
                     COB2UCLG

                     COB2UCG
                     COB2ULG
                     COB2UCX
              Compile only.
              Compile and link-edit.
              Compile, link-edit, and exe-
              cute.
              Compile, load, and execute.
              Load and execute.
              Alias for COB2UCG.
The VS COBOL II compiler at NCC supports 31-bit
addressing and includes many performance and
functional enhancements.

For more information about COBOL and parameters
for the cataloged procedures, see the following online
documentation:

      JUSD.USERS.REFERCCOBOL)

FORTRAN (Formula Translator) is a high-level pro-
gramming language which is used primarily for sci-
entific, engineering, and other applications which
involve extensive mathematical computation.  The
American National Standards Institute has defined a
standard for the FORTRAN language.

The compiler is available through the ISPF/PDF
Primary Option Menu or in batch via the cataloged
procedures.

The IBM mainframe vector facility provides a mecha-
nism for achieving a high level of performance when
identical operations are performed on large amounts
                            10-4

-------
of data. The VS FORTRAN Version 2 compiler allows
the FORTRAN programmer to take advantage of this
facility by automatically generating the necessary
vector instructions where appropriate.

Central to the operation of the vector facility are the
vector registers.  On the IBM mainframe, there are
16 vector registers, each of which contains 128 ele-
ments of 4 bytes each.  An operation on two FOR-
TRAN arrays can be carried out by loading each array
into  a  vector register,  and  then issuing a single
command to perform the desired operation on each
pair  of elements  in the two registers. If the arrays
contain more than 128 elements, they must be bro-
ken up into sections of  128 elements each and this
process must be repeated for each section.

For example, the FORTRAN loop:

       REAL*4  A(256),B(256)

       DO 101 = 1,256
           A(I) = A(I) +B(I)
     10 CONTINUE

could be executed by loading the first 128 elements of
A and B into vector registers, adding all of these
elements with a single vector instruction, storing the
result in A, and  then repeating the process for the
remainder of A and B.

(Actually, most vector instructions have formats that
allow one of the  operands to be taken directly from
storage.  Therefore, this operation could be carried
out using only a  single vector register.)
            10-5

-------
                  Notice that when using vector instructions, all of the
                  calculations for one section are performed before any
                  of the results are put back into storage. This means
                  that if a FORTRAN loop computes a value on one
                  iteration that will be used on a later iteration, it
                  cannot be translated into vector instructions.

CATALOGED       Cataloged procedures for FORTRAN are as follows:
PROCEDURES
                     Procedure   Function

                     FORTVC    Compile only.
                     FORTVCL  Compile and link-edit.
                     FORTVCLG Compile, link-edit, and exe-
                                cute.
                     FORTVCG  Compile, load, and execute.
                     FORTVLG  Link-edit and execute.
                     FORTVL    Load and execute.
                     FORTVG   Execute only.
                     FORTRC    Re-entrant compile only.
                     FORTRCL  Re-entrant compile and link-
                                edit
                     FORTRCLG Re-entrant compile, link-edit,
                                and execute.
                     FORTRLG  Re-entrant link-edit and exe-
                                cute.
                     FORTVIAD  Execute InterActive Debug in
                                batch.

                  For more information about FORTRAN and parame-
                  ters for the cataloged procedures, see the following
                  online documentation:

                        JUSD.USERS.REFER(FORTRAN)
                        JUSD.VSFORT2.DATA(PROCS)
                            10-6

-------
CATALOGED
PROCEDURES
BASIC
PL/1 (Programming Language 1) is a multipurpose,
high-level language which lends itself to commercial
and scientific applications as well as to real-time and
systems software work. The language contains many
of the capabilities of FORTRAN, COBOL, and AL-
GOL as well as some of the attributes of Assembler
Language. The NCC supports the PL/1 Optimizing
Compiler.

Cataloged procedures for PL/1 are as follows:

    Procedure   Function

    PLIXCC    Compile only.
    PLIXCL    Compile and link-edit.
    PLIXCLG   Compile, link-edit, and exe-
               cute.
    PLIXCG    Compile, load, and execute.
    PLIXLG    Load and execute; translate
               and interpret.

For more information about PL/1 and parameters for
the cataloged procedures, see the following online
documentation:

       JUSD.USERS.REFER(PLl)

BASIC (Beginners' All-purpose Symbolic Instruction
Code) is an interpretive language which was origi-
nally developed at Dartmouth College as a training
aid for student programmers.

BASIC is an inefficient language for production runs.
Because it is an interpreter, each statement is com-
piled immediately prior to its execution.  Its primary
benefit is the speed and ease with which it can be
learned and applied to a specific problem by a nonpro-
grammer.
                              10-7

-------
         Since BASIC is an interpreter, there are no cataloged
         procedures available at NCC.
MORE I    For more information about BASIC, see the following
INFO I    online documentation:

               JUSD.USERS.REFER(BASIC)
               JUSD.BASIC.DATA
                    10-8

-------
 DATA BASE SYSTEMS                        ADABAS
.JESCREPTION    ADABAS provides system developers with an effi-
                  cient, flexible,  and comprehensive  capability for
                  meeting data management requirements for a vari-
                  ety of application environments. EPA has installed
                  ADABAS to meet the Agency's Central Data Base
                  Management System requirements.

                  ADABAS can access data using multiple "keyed"
                  selection criteria, supports complex data structures,
                  conserves data base storage space through the use of
                  data compression techniques, provides  excellent
                  backup, recovery, and data security facilities, and
                  provides a comprehensive set of utilities to easily
                  accommodate  data base structural  changes  with
                  minimal impact on existing programs. ADABAS can
                  be used in both batch  and interactive processing
                  modes and can interface with application programs
                  written in COBOL, FORTRAN, PL/1, and Assembler
                  languages.

                  The vendor for ADABAS also provides a 4th Genera-
                  tion Language (4GL) called NATURAL that is a
                  nonprocedural  and highly productive application
                  development language.  NATURAL can provide end
                  users and programmers with the capability of query-
                  ing, reporting on, and updating ADABAS data bases.
                  It can  operate in both batch and  online modes.
                  ADABAS data bases can also be queried, reported on,
                  and updated using embedded ADABAS SQL state-
                  ments in COBOL, FORTRAN, or PUl programs. The
                  use  of these  programming languages  to  access
                  ADABAS data bases requires the approval of the
                  Central Data Base Administrator.

                  JUSD.USERS.REFER{ABABAS)
                  JUSD.ADABAS.DATA
                             SC-1

-------
DATA BASE SYSTEMS                           BASIS
DESCRIPTION    Battelle's Automated Search Information System
                   (BASIS) is a superior tool for managing and using
                   large text data bases. It has been particularly useful
                   to EPA in the areas of bibliographic/library systems
                   and litigation support Other clear choices for BASIS
                   applications include technical information lookup,
                   newspaper and journal archiving, law and regulation
                   tracking, and records management.

                   BASIS has some exceptionally useful retrieval capa-
                   bilities.  Among them are the ability to recognize
                   plurals of searched-for words. BASIS can also do
                   synonym searching through its Thesaurus feature.
                   Another aspect of the Thesaurus feature is the ability
                   to standardize data within the data base. For ex-
                   ample, you might allow state abbreviations to be
                   input, but full state names would be stored in the
                   data base.

                   JUSD.USERS.REFERCBASIS)
                   JUSD.BASIS.DATA
                              SC-2

-------
DATA BASE SYSTEMS
                                      S2K
DESCRIPTION
DBACCESS
SYSTEM 2000 (S2K) allows you to define, load, re-
trieve, and update data bases.  S2K uses its own
elementary command language and supports fully
nested Boolean logic for selection criteria. You can
define functions and command strings and  store
them for later use. Addressing and I/O operations
are handled automatically for you. The system also
includes a report writer, optional audit trail facility
for updates, and an interface which permits COBOL,
FORTRAN, or PL/1 languages to be used with the
data base.

Each S2K data base is composed of six BDAM files,
and if an audit trail is desired, an optional update file
is  available.  The command language syntax pro-
vides a complete set of commands for defining, re-
structuring, saving, sharing, and releasing a data
base, as well as for updating and retrieving data.
Security provisions may be used to restrict access to
the data base for retrieval and/or update purposes.
S2K also  has several built-in statistical functions
such as sum, count, mean, maximum, minimum, and
standard deviation.

The DBACCESS software  package gives COBOL
PLEX programmers in the S2K environment the
capability to dynamically issue the LOCATE com-
mand with full WHERE CLAUSE processing.

JUSD.USERS.REFER(S2K)
JUSD.S2K.DATA
                             SC-3

-------
RETRIEVAL AND
REPORTING SYSTEM            EASYTRIEVE PLUS
DESCRIPTION    EASYTRIEVE PLUS was designed to simplify com-
                  puter programming. Its English-like language and
                  simple declarative  statements provide the novice
                  with the tools needed to produce comprehensive
                  reports with ease, while its enhanced facilities pro-
                  vide the experienced data processor with the capa-
                  bilities to perform complex programming tasks.

                  EASYTRIEVE PLUS can be used for the following
                  types of tasks:

                        Report generation.
                        Information retrieval.
                        Record updating/editing.
                        Matching/merging files
                        Preprinted or customized forms or micro-
                        fiche output.

                  JUSD.USERS.REFERCEASYTRV)
                  JUSD.EASYT.DATA
                  JUSD.EASYTREV.PLUS.DATA
                            SC-4

-------
MATHEMATICAL AND
STATISTICAL PACKAGES
                                 BMDP
DESCRIPTION
Biomedical Computer Programs (BMDP) are a com-
prehensive and integrated library of statistical pro-
grams. These programs may be loosely classified into
                  six senes:
        MORE |
        INFO
                        Data Description
                        Frequency Tables
                        Regression Analysis
                        Analysis of Variance
                        Multivariate Analysis
                        Special including nonparametric statis-
                        tics and cluster analysis)
BMDP offers abroad set of descriptive and analytical
procedures. Data grouping or selection can be af-
fected through the control language.

JUSD.USERS.REFERCBMDP)
JUSD.BMDP.DATA
                            SC-5

-------
MATHEMATICAL AND
STATISTICAL PACKAGES                       ESP
DESCRIPTION   The Econometric Software Package (ESP) is a com-
                puter language for the statistical analysis of time
                series by the ordinary least squares method or the
                two-stage least squares method. It is designed to
                carry out the computational and data processing
                steps which occur routinely in econometric research.

PROC           ESP

                JUSD.USERS.REFERCESP)
                JUSD.ESP.DATA
                          SC-6

-------
MATHEMATICAL AND
STATISTICAL PACKAGES
                                    1MSL
DESCRIPTION
 PROCS
The International Mathematical and Statistical Li-
brary (IMSL) is an extensive collection of mathemati-
cal, statistical, and function subprograms written in
FORTRAN and supported by IMSL. In most cases,
the subroutines are available in both single and
double precision forms and support the vector feature
hardware available on the IBM mainframe.  With
these subroutines, complex computational routines
can be constructed quickly and inexpensively.
   Procedure

   IMS1CISP

   IMSLSCLG


   IMSLDCLG
Function

Compile, link, and go using
Level 10.
Compile, link, and go using
the interface to the Level 9
single precision library.
Compile, link, and go using
the interface to the Level 9
double precision library.
                  JUSD.USERS.REFER(IMSL)
                  JUSD.IMSL.DATA
                            SC-7

-------
MATHEMATICAL AND
STATISTICAL PACKAGES                  PL-MATH
DESCRIPTION    The Procedure Library-Mathematics (PL-MATH) is
                a set of basic computational procedures for PL/1
                language users. The PL-MATH routines do not in-
                clude I/O statements.  Many routines provide the
                option to handle double-precision computations.
                JUSD.USERS.REFERCPLMATH)
                         SC-8

-------
MATHEMATICAL AND
STATISTICAL PACKAGES
                                     SAS
DESCRIPTION
 PROG

 CLIST
SAS is an integrated system for data management
and statistical analysis.  It combines statistics rou-
tines, plotting, data manipulation, and report writ-
ing capabilities. .

SAS has a PL/1-like language which is used to trans-
form or delete variables, create new variables, create
new data sets, merge data sets, and print all or part
of a data set. SAS accepts data in most forms and can
handle many input devices.  The system also per-
forms general data manipulation and many statisti-
cal functions.

SAS

To execute SAS interactively, a CLIST  has been
developed. Just type SAS at the TSO READY prompt.

JUSD.USERS.REFER(SAS)
JUSD.SAS.DATA

Or, use the HELP statement in SAS for information
on SAS procedures, statements, formats, informats,
functions, and call routines. Just type the following
for a brief description of the HELP statement:

       HELP;
                             SC-9

-------
MATHEMATICAL AND
STATISTICAL PACKAGES             SUPERCALC
DESCRIPTION     SuperCalc/MF is a spreadsheet which provides for
                  data storage and allows ledger display with immedi-
                  ate recalculation upon value update. It is available
                  only in a full-screen, interactive mode. SuperCalc
                  supports over 90 commands for formatting data dis-
                  play and over 140 built-in functions for performing
                  mathematical, trigonometric, financial, statistical,
                  and logical processes.

                  Database facilities are provided in SuperCak as well
                  as the facility to process data from data sets external
                  to SuperCalc. SuperCalc supports uploading of Visi-
                  Calc and LOTUS 1-2-3 spreadsheets from a personal
                  computer.

                  To access SuperCalc, just type the following at the
                  TSO READY prompt:

                        SUPERCAL

                  JUSD.USERS.BEFERCSUPERCAL)
                  JUSD.SUPERCAL.DATA
                           SC-10

-------
GRAPHICS PACKAGES                       CA GKS
DESCRIPTION    CA-GKS provides an implementation of a Graphical
                  Kernel System (GKS) library. GKS consists of a set
                  of basic functions for graphics programming that has
                  been defined by the American National Standard. It
                  is a low-level graphics system for use in  creating
                  portable applications that produce computer-gener-
                  ated, two-dimensional pictures on vector or raster
                  output devices.  CA-GKS applications can be ported
                  to any installation supporting a GKS of the appropri-
                  ate level in the programming language used in the
                  application.   CA-GKS  is at level 2b in the GKS
                  classification system and uses FORTRAN 77 as the
                  language.

                  JUSD.USERS.REFER(CAGKS)
                  JUSD.CAGKS.DATA
                            SC-11

-------
GRAPHICS PACKAGES	CUECHART

DESCRIPTION   CUECHART is an easy-to-use, user-friendly graph-
                 ics package. To prepare a graph with CUECHART,
                 select any of the over 1100 standard stencils pictured
                 intheCUECHARTandCHARTBOOKUser'sGuides,
                 invoke CUECHART, and respond to simple, "Eng-
                 lish" prompts to provide information  necessary to
                 tailor the general stencil to your specific needs.
                 Stencils are available for creating line charts, pie
                 charts, bar charts, word/bullet charts, error bars, and
                 tables. The output of CUECHART is a file containing
                 TELL-A-GRAF commands. TELL-A-GRAF is subse-
                 quently invoked, the CUECHART file "included,"
                 and the chart plotted on any of a variety of graphic
                 output devices.

                 JUSD.USERS.REFER(CUECHART)
                 JUSD.CUECHART.DATA
                           SC-12

-------
GRAPHICS PACKAGES        DATA CONNECTION

DESCRIPTION   DATA CONNECTION is an integrated portfolio of
                 tools designed to solve data access problems. DATA
                 CONNECTION builds links between TELL-A-GRAF
                 and the many sources of data used to produce graphs.
                 Its components are as follows:

                 Report Connection. Reads tabular data from printed
                 reports stored in any format.

                 File Connection. Reads, selects, analyzes, and com-
                 pares data from any data file with uniform record for-
                 mats.

                 External Program Connection. Links TELL-A-GRAF
                 directly with user-written applications programs.

                 Decision Support Connection. Edits, modifies, and
                 mathematically manipulates data before it is  con-
                 verted to graphic output.

                 JUSD.USERS.REFER(DATACONN)
                 JUSD.DATACONN.DATA
                           SC-13

-------
GRAPHICS PACKAGES	DISSPLA


 DESCRIPTION   DISSPLA is a library of subroutines which enable a
                  programmer to present data in graphical form. The
                  DISSPLA package includes the capability to produce
                  two- and three-dimensional graphs, geographic maps,
                  color-shaded contour  maps, and business charts.
                  Object rendering capability provides for the repre-
                  sentation of complex geometric objects in wire frame
                  as well as fully shaded models.

                  DISSPLA CODEBOOK can be used to  facilitate
                  DISSPLA programming. CODEBOOK contains over
                  50 predefined graphics  prototypes.  You can just
                  select the prototype, answer the questions, and sup-
                  ply the data.  CODEBOOK generates the DISSPLA
                  code necessary to generate the specific chart.

                  JUSD.USERS.REFERCDISSPLA)
                  JUSD.DISSPLA.DATA
                            SC-14

-------
GRAPHICS PACKAGES	GEOMAP


DESCRIPTION     GEOMAP is an interactive computer mapping pro-
                  gram used for displaying and analyzing thematic
                  coded data.  You can select from several GEOMAP
                  formatted cartographic files, including those with
                  state, county, and ZIP code boundaries.

                  GEOMAP is menu-driven and allows you to control
                  the characteristics of the map, including titles, leg-
                  ends, colors, etc.  You may also overlay other bound-
                  ary files on the map.

                  GEOMAP runs as a front-end to TELL-A-GRAF and
                  the full range of TELL-A-GRAF formats and capabili-
                  ties is available.

                  JUSD.USERS.REFEIKGEOMAP)
                  JUSD.GEOMAP.DATA
                           SC-15

-------
GRAPHICS PACKAGES                   INTERORG'
DESCRIPTION    InterOrg allows you to interactively create organiza-
                  tion charts. The charts may be displayed on a variety
                  of graphics devices. You can specify box names, box
                  titles, optional comments, reporting relationships,
                  plot titles, footnotes, options for line style, colors,
                  fonts, page layout, etc.  Prompting mode reads all
                  input from the keyboard; menu mode reads chart
                  information from files saved during the previous
                  InterOrg session.

                  InterOrg runs as a front-end to TELL-A-GRAF and
                  the full range of TELL-A-GRAF devices, formats,
                  and capabilities are available.

                  JUSD.USERS.REFERUNTERORG)
                  JUSD.ORGCHART.DATA
                            SC-16

-------
GRAPHICS PACKAGES
                         SAS/GRAPH
DESCRIPTION
SAS/GRAPH is the graphics feature of the SAS Sys-
tem.   It consists of a set of SAS procedures for
displaying data graphically. Its capabilities include
X-Y plots, bar and pie charts, contour plots, 3D plots,
thematic maps, and text pages.  SAS/GRAPH sup-
ports a wide variety of graphics terminals, printers,
and plotters.

JUSD.USERS.REFER(SASGRAPH)
JUSD.SAS.DATA
                          SC-17

-------
GRAPHICS PACKAGES               TELL-A-GRAF
DESCRIPTION   TELL-A-GRAF is a conversational graphics system
                 which produces quality graphs from ordinary English
                 commands. TELL-A-GRAF may take on one of five
                 "personalities:"

                     •   Line plot
                     •   Area chart
                     •   Bar plot
                     •   Pie chart
                     •   Page of text

                 The program produces graphics interactively when
                 invoked from a terminal capable of drawing vectors
                 (lines), although any type of terminal may be used to
                 enter commands to create a graphics output-file. A
                 separate post-processor program can then use the
                 plot file to produce graphics output on a plotting
                 device.
         MORE I    JUSD.USERS.REFER(TELAGRAF)
         INFO I    JUSD.TELAGRAF.DATA
                           SC-18

-------
 GRAPHICS PACKAGES                 TELLAPLAN
DESCRIPTION    TELLAPLAN EXPERT is a project planning and
                  management tool.  You can use the  English-like
                  commands for the following tasks:

                     •  Build detailed plans for ongoing proj-
                        ects and events in order to control their
                        progress.

                     •  Report progress with a variety of Gantt
                        charts, cost/resource charts, or printed
                        reports.

                     •  Show planned, actual, and estimated
                        start  and end dates, in addition to de-
                        pendencies, critical paths, slack time,
                        and milestones.

                     •  Create sophisticated structure diagrams
                        including work breakdown structures,
                        arrow diagrams, and activity on node
                        diagrams.

                  TELLAPLAN EXPERT charts may be  plotted on a
                  wide variety of graphics output devices.

                  JUSD.USERS.REFER(TELAPLAN)
                  JUSD.TELAPLAN.EXPERT.DATA
                           SC-19

-------
 GRAPHICS PACKAGES	UNIEDIT


DESCRIPTION    UNIEDIT, an interactive graphics design and edit-
                 ing program, supports freehand drawing through
                 digitizing tablets, but its most significant feature is
                 the ability to editUNIMAP output UNIEDIT can be
                 used to correct errors, to reshape, delete, or replace
                 contours, and to add annotation.

                 JUSD.USERS.REFERCUNIMAP)
                 JUSD.UNIRAS.UNIEDIT.DATA
                          SC-20

-------
 GRAPHICS PACKAGES                       UNIMAP
DESCRIPTION    UNIMAP is an interactive  contour mapping and
                  modeling system. When you supply the X, Y, and Z
                  data, UNIMAP can produce a variety of graphic
                  displays, including two-dimensional contour plots,
                  three-dimensional bar maps, and three-dimensional
                  surface displays.  UNIMAP can shade between con-
                  tours with varying degrees of color and patterns. The
                  surface may be shaded according to a fourth variable,
                  thus producing a four-dimensional display. With full
                  use  of defaults, UNIMAP can produce a surface
                  quickly.  For example, you  can change from  two-
                  dimensional to three-dimensional quickly, or you can
                  view the surface from a different angle.
          MORE I    JUSD.USERS.REFERCUNIMAP)
          INFO  I    JUSD.UNIRAS.UNIMAP.DATA
                           SC-21

-------
 DATA DICTIONARY/DIRECTORY SYSTEM
DESCRIPTION
 PROGS
Data Catalog 2 (DC2) is a comprehensive data dic-
tionary/directory system.  It may be used to docu-
ment data, procedures, users, and their interactions.
The system can be equally effective as a systems de-
velopment tool, as a data administration tool, and as
an inventory of user data and procedures resources.
   Procedure

   DC2BKUP
   DC2CNVRT

   DC2COPY

   DC2INIT
   DC2MAINT
   DC2PURGE
   DC2QRY

   DC2RPT

   DC2RPTI

   DC2RSTR
   DC2UPD
   DC2UTL
Function

Backs up DC2 files.
Converts source programs
to dictionary entries.
Copies and moves between
dictionaries.
Initializes a dictionary.
Dictionary maintenance.
Deletes the master files.
Queries the dictionary; gen-
erates COBOL layouts.
Reports on the dictionary
(no index).
Reports on the dictionary
(index).
Restores the dictionary.
Updates the dictionary.
Performs utility functions.
                  JUSD.USERS.REFER(DC2)
                  JUSD.DC2.DATA
                            SC-22

-------
FILE MANAGEMENT SYSTEM
                             LIBRARIAN
 DESCRIPTION
 PROCS
          MORE
          INFO
The LIBRARIAN, a software product from Computer
Associates, is a highly sophisticated and flexible stor-
age medium, together with service routines that ma-
nipulate the data stored there. This data can be in the
form of source  programs, test data, or  text.  Any
collection of 80-byte records can be stored by the
LIBRARIAN as a module on a LIBRARIAN master
file, along with information about the data.

LIBRARIAN master files are highly efficient librar-
ies designed to maximize storage capacity while
minimizing  access and retrieval time. LIBRARIAN
master files offer such desirable features as data
compression, module archiving, program auditing,
and  automatic  library reorganization  to  recover
unused space.

Information is stored on a master file in discrete units
called modules. A module can be an individual
program, a  program segment or object code, or any
group of 80-byte records. The number of modules that
can be stored on a single master file is limited only by
the size of the master file and the size of the individual
modules.

LIBRARIAN is available in batch mode  and also in
TSO ISPF through Extended LIBRARIAN Interac-
tive Productivity Services (BLIPS) and LIB/CCF
(Change Control Facility).
 Procedure     Function

 LIBINIT      Initialize  LIBRARIAN
              master file
 LIBEXEC     Execute LIBRARIAN

 JUSD.LIBARIAN.DATA
                                                       disk
                              SC-23

-------
SIMULATION AND MODELING SYSTEM
                                 GPSS
 DESCRIPTION
General Purpose Simulation System (GPSS) is a
program for conducting evaluation of and experi-
ments with systems, methods, processes, and de-
signs. The program divides the simulation items into
four classes:
                      Class

                      Dynamic

                      Equipment

                      Statistical

                      Operational



                   GPSSVGO
               Function

               Transactions which repre-
               sent units of traffic.
               Objects which  are  acted
               upon by transactions.
               Queues and tables which
               measure system behavior.
               System logic which instructs
               transactions where to go and
               what to do.
                   JUSD.USERS.KEFER(GPSS)
                            SC-24

-------
TEXT EDITOR
                                SCRIPT
  DESCRIPTION

SCRIPT is a document-composition program.  It
accepts input, processes it, and produces output.
SCRIPT recognizes only two different types of input:
text and control words. SCRIPT can format files of
fixed or variable length.  Using control commands
which usually begin with a period in column one, you
can establish a page format (line length, number of
lines per page, etc.) along with headings and footers.
Other commands enable you to justify lines, indent
blocks of text, incorporate footnotes, and build a table
 of contents and an index.

JUSD.USERS.REFER(SCRIPT)
JUSD.SCRIPT.DATA
                              SC-25

-------
FOURTH GENERATION LANGUAGE         FOCUS

 DESCRIPTION    FOCUS is a comprehensive information processing
                  system designed for interactive or batch processing.
                  It contains facilities for describing external files and
                  FOCUS files and for generating reports.  FOCUS
                  provides a dialog manager to incorporate full-screen
                  maintenance procedures and to validate data based
                  on your definitions. The system can be used by
                  nonprogrammers as well as programmers.  It is
                  powerful enough for developers to build IBM 3270
                  menu-driven applications yet easy enough for non-
                  technical users to perform ad hoc queries and write
                  reports.

                  Other optional features include the following:

                     •  FOCUS Graph Subsystem
                     •  FIDEL, a full-screen data entry lan-
                        guage
                     •  Simultaneous Users
                     •  FOCUS Statistical Analysis System
                     •  FOCUS Host Language Interface
                     •  TABLETALK, a window-driven process
                        to create FOCUS report requests.
                     •  FILETALK, another window-driven
                        process to create FOCUS report requests
                     •  FOCUS Data Dictionary
                     •  PC Data Export

                  FOCUS also has optional data base interfaces to
                  ADABAS and System 2000 files.

                  JUSD.USERS.REFER(FOCUS)
                  JUSD.FOCUS.DATA
                            SC-26

-------
INDEX
A                 ACCESS  parameter, of RACF              8-10
                   Access control                            8-9
                   Access Method Services                    9-2
                   Account code                     1-4, 1-11, 8-1
                   ADABAS                               SC-1
                   ADDSD command                        8-10
                   ADP Coordinator                 1-7, 1-13, 6-3
                   AFTER statement                         6-2
                   ALC (Assembler Language Coding)         10-2
                   ALTER, with DF/HSM                     4-4
                   ARBITER                               8-4
                   Archiving, disk                           4-3
                   Archiving, tape                           5-4
                   ASM2 (Automated Space Management)       4-4
                   Assembler                              10-1
                   Assembler Language Coding               10-2
                   Assembler language                      10-2
                   Assembler, cataloged procedures            10-3
                   Assignments for PF keys                   2-7
                   Automated Space Management              4-4

g                 B-tapes                                 5-7
                   Backup Control Data Set                   4-2
                   Backup data set                          4-1
                   BASIC (Beginners' All-purpose Symbolic
                         Instruction Code)                    10-7
                   BASIS (Battelle's Automated Search Information
                         System)                          SC-2
                   Batch jobs                               8-1
                   BCDS (Backup Control Data Set)            4-2
                   BDT (Bulk Data Transfer)                 8-3
                   BDT, batch                              8-4
                   BDT, interactive                         8-4
                   BEFORE statement                       6-2
                   BMDP (Biomedical Computer Programs)     SC-5
                   Bulk Data Transfer                       8-3
                            Index-1

-------
INDEX
                    CA GKS (Graphical Kernel System)        SC-11
                    Cartridge tape                         5-1, 5-4
                    Cataloged procedures, Assembler            10-3
                    Cataloged procedures, FORTRAN            10-6
                    Cataloged procedures, PL/1                 10-7
                    Cataloged procedures, VS COBOL II         10-4
                    Changing password                         1-5
                    Classes, for jobs                            6-3
                    Cleanup of DF/HSM pool                    4-4
                    CLIST                                2-1,2-3
                    CNTL statement                           6-2
                    COBOL (Common Business
                           Oriented Language)                 10-3
                    Compiler                                10-1
                    Controlling access to data                    8-9
                    Conventions for data sets                    3-1
                    Conventions for system data sets             3-2
                    Copy, member                             9-3
                    Copy, sequential data set                    9-3
                    Creating a data set                         3-3
                    Crosstalk                                 1-8
                    CUECHART                           SC-12

                    DATA CONNECTION                   SC-13
                    Data base systems, ADABAS               SC-1
                    Data base systems, BASIS                 SC-2
                    Data base systems, S2K                    SC-3
                    Data Definition, for tape                    5-2
                    Data Dictionary/Directory System         SC-22
                    Data Facility/Hierarchical Storage Manager   4-1
                    Data set, archive                           4-1
                    Data set, backup                           4-2
                    Data set, characteristics                     3-1
                    Data set, copying                           9-3
                    Data set, maintenance                      9-1
                    Data set, migration                         4-1
                    Data set, moving                           9-3
                    Data set, names                           3-1
                              Index-2

-------
INDEX
                    Data set, partitioned                   3-12, 9-3
                    Data set, prefixes                          3-2
                    Data set, sequential                       3-12
                    Data set, utilities                          3-8
                    Datagraphix 9835 laser printer              7-10
                    DBACCESS                              SC-3
                    DC2 (Data Catalog 2)                    SC-22
                    DD ( Data Definition)                       5-2
                    Dearchiving, tape                          5-4
                    DELD8D  command                       8-11
                    DELETE, with DF/HSM                     4-4
                    DF/HSM (Data Facility/Hierarchical Storage
                          Manager)                          4-1
                    Direct Access Storage Device Management     4-1
                    Directory, listing                          9-4
                    Disk management                         4-1
                    DISSPLA                              SC-14

                    Email                                    8-8
                    Email Coordinator                         8-8
                    EASYTRIEVE PLUS                      SC-4
                    Editing commands                     2-2, 2-5
                    Electronic mail                             8-8
                    ELIPS (Extended Librarian Interactive
                          Productivity Services)             SC-23
                    ESP (Econometric Software Package)        SC-6

                    Facility Impact Monitoring and
                           Analysis System                   1-12
                    File guard ring                            5-8
                    File Management System                SC-23
                    File structure                            3-12
                    File transfer, ARBITER                 8-3, 8-4
                    FIMAS (Facility  Impact Monitoring and
                           Analysis System)                  1-12
                    FOCUS                                SC-26
                    Foreign tapes                             5-6
                             Index-3

-------
INDEX
                  Forms, examples                         7-6
                  Forms, printing                          7-5
                  Forms, WIC                            7-10
                  FORTRAN, cataloged procedures            10-6
                  FORTRAN, vector facility                  10-4
                  FORTRAN (Formula Translator)            10-4
                  Fourth Generation Language             SC-26
                  Freehand drawing                     SC-20

                  GDG (Generation Data Group)              5-4
                  Generation Data Group                   5-4
                  GEOMAP                            SC-15
                  GKS (Graphical Kernel System)          SC-11
                  Global Status Tracking                    8-1
                  GPSS (General Purpose Simulation System) SC-24
                  Graphics packages         SC-11 through SC-21
                  GST (Global Status Tracking)

                  Hardwired "look-alike"                     1-8
                  Hardwired terminal                       1-1
                  HELP command                      2-2, 2-7
                  HDELETE command                      4-4
                  HLIST command                         4-2
                  HMIGRATE command                     4-3
                  HRECALL command                      4-4
                  HRECOVER command                     4-3

                  IDCAMS                               9-2
                  IEBCOPY                              9-3
                  IEBGENER                             9-3
                  IEFBR14                               9-1
                  IEHLIST                               9-4
                  IEHMOVE                              9-3
                  IEHMOVE, with DF/HSM                  4-4
                  IEHPROGM                             9-1
                  IMSL (International Mathematical
                         and Statistical Library)            SC-7
                            Index-4

-------
INDEX
K
Indexing system                           8-14
Initiating a data set                        3-3
Interactive System Productivity Facility       2-3
InterOrg                                SC-16
Interpreter                                10-1
Interpreter, BASIC                         10-7
ISAM data set                              4-4
ISPF (Interactive System Producitivity
       Facility)                             2-3
ISPF, allocating from                        3-6
ISPF, commands                            2-4

JCL (Job Control Language)              8-1, 9-1
JES2 (Job Entry Subsystem)                  6-1
JES2 Global Status Tracking                 8-1
Job card                                   8-1
Job Control Language                   8-1, 9-1
Job Control Language, for tapes               5-2
Job Entry Subsystem                        6-1
JES2, control statement                      6-1
JES2, operator command                     6-2
Job classes                                 6-3
Job execution order                          6-1
Job output protection                       8-11
Job priority                             6-1, 6-3
Job statement                              8-1
Job Status Tracking System                  8-3
Job Stream Manager                        6-3
Job submission order                        6-1
JOBPARM statement                       6-1
JSTS (Job Status Tracking System)           8-3

KERMIT                                   1-8
Key word                                  8-14
KWIC/KWOC                             8-14
                             Index-5

-------
  INDEX
L                  Languages, programming                   10-1
                   Laser printer, at RTF                       7-4
                   Laser printer, at WIG                      7-11
                   LIB/CGF (Change Control Facility)         SC-23
                   LIBRARIAN                            SC-23
                   Limiting access to data                      8-9
                   Line commands                            2-5
                   Line editor                                3-5
                   Line terminal                              1-8
                   Line terminal, allocating from                3-5
                   Link, telecommunications                    1-8
                   Linkage editor                        9-5,10-1
                   LIST data set                              7-8
                   LMF (Logical Mainframe)                    1-3
                   Location, of nodes                          8-1
                   LOG data set                              7-8
                   LOG/LIST                                7-8
                   Logical Mainframe                          1-3
                   Logon procedures                          1-1
                   Logon statement                          1-11
                   Lowercase printing                         7-5

M                 Mail                                      8-8
                   Map program                     SC-15, SC-21
                   Mathematical packages             SC-5, SC-7,
                                                    SC-8, SC-10
                   Migration                                 4-2
                   Migration Control Data Set                  4-1
                   Modems                                   1-8
                   Moving data set                            9-3

M                 Naming data sets                          3-1
                   NATURAL                              SC-1
                   Network Support Group                     1-8
                   NEWS ALERT                        1-7,1-12
                   Node numbers                             8-1
                   Non-standard data sets                     3-2
                   NOPROMPT                             1-11
                            Index-6

-------
INDEX
                 Operating System standards                 3-1
                 Optimizing Compiler, for PL/1               10-7
                 Organization charts                      SC-16
                 OUTPUT JCL statement                    7-4
                 Output processing                          6-1

                 Paper, examples                            7-6
                 Paper, for printing                          7-5
                 Paper, WIG                               7-10
                 Partitioned data set                    3-12, 9-3
                 Password                              1-5,8-9
                 Password, changing                         1-5
                 Password, characterisitcs                    1-6
                 PERMIT command                    8-10, 8-12
                 PF (Program Function) keys                 2-6
                 PL-MATH (Procedure Library -
                        Mathematics)                     SC-8
                 PLSORT                                 8-13
                 PL/1 (Programming Language 1)             10-7
                 Plotting packages (see Graphics packages)
                 PN (Gothic 10 uppercase print train)          7-5
                 Primary Option Menu                   2-4, 3-6
                 Print trains                                7-5
                 Printing                                   7-1
                 Printing, batch mode                        7-3
                 Printing, batch utility                       7-4
                 Printing, documentation                     7-1
                 Printing, types of paper                     7-5
                 Printing, using ISPF LIST data set            7-8
                 Printing, utility for documentation            7-9
                 PRINTOFF command                       7-1
                 Priority, job                                6-3
                 PROFILE                                1-13
                 Profile, of resource                         8-11
                 Profile, RACF                             8-11
                 Program Function keys                      2-6
                 Program Function keys, assignments          2-7
                          Index-7

-------
INDEX
                  Programming languages                   10-1
                  Protection, job output                      8-11
                  Protection of resources                     8-11
                  Protection, tape                           8-12
                  PRTY operand                             6-3

                  Qualifier, data set                          3-2

                  RACF (Resource Access Control Facility)      8-9
                  RALTER command                        8-12
                  RDEFINE command                       8-11
                  RDELETE command                      8-12
                  Reels of tapes                              5-1
                  Remote sites                             7-10
                  RESET                                   M
                  Resource Access Control Facility             8-9
                  Resource profile                          8-11
                  Retrieval and reporting system             SC-4
                  RLIST command                          8-12
                  ROUTE statement                         6-1
                  Rules for data sets                         3-1

                  S2K (System 2000)                        SC-3
                  SAS                                    SC-9
                  SAS, cataloged procedure                  SC-9
                  SAS, CLIST                             SC-9
                  SAS/GRAPH                            SC-17
                  SCRIPT                                SC-25
                  SDSF (Spool Display and Search Facility )     5-6,
                                                        6-2, 8-4
                  Security                                 8-9
                  Security, on foreign tape                    5-8
                  Sequential data set                    3-12, 9-3
                  Simulation  and Modeling System          SC-24
                  Sort utility                               8-13
                  Space management                        4-1
                  Space release                             4-1
                  Spool Display and Search Facility     5-6, 6-2, 8-2


                            Index-8

-------
INDEX
                  Spreadsheet                            SC-10
                  Standards for data sets                      3-1
                  Statistical packages            SC-5, SC-6, SC-7,
                                                    SC-9, SC-17
                  SUPERCALC/MF                       SC-10
                  System catalog conventions                  3-2
                  System data sets                           3-2

                  Tape Management Catalog                  5-5
                  Tape management                          5-1
                  Tape, archiving                            5-4
                  Tape, assigning                            5-2
                  Tape, cartridge                         5-1, 5-4
                  Tape, dearchiving                          5-5
                  Tape, expiration date                       5-3
                  Tape, file guard ring                        5-8
                  Tape, foreign                              5-6
                  Tape, protection                           8-12
                  Tape, retention periods                      5-3
                  Tape, storage                              5-1
                  Tape, types available at NCC                 5-1
                  TAPESCAN                               5-5
                  TCP (Terminal/Controller Processor)          1-8
                  Telephone, User Support                    1-1
                  TELL-A-GRAF                   SC-12, SC-13,
                                             SC-15, SC-16, SC-18
                  TELLAPLAN EXPERT                   SC-19
                  Terminal ID number                       1-3
                  Terminal, dial-up                          1-8
                  Terminal, hardwired                       1-1
                  Terminal/Controller  Processor                1-8
                  Text editor                             SC-25
                  Time Sharing Option                   1-3, 2-1
                  TN (Text 1 and 2 uppercase and
                         lowercase print train)                 7-5
                  TSO (Time Sharing Option)              1-3, 2-1
                  TSO commands                            2-1
                            Index-9

-------
 INDEX
                   TSO startup CLIST                         2-3
                   Turnaround time for jobs                    6-3
                   TYMNET                                 1-8

U                 UNIEDIT                              SC-20
                   UNIMAP                        SC-20, SC-21
                   Uppercase printing                         7-5
                   User Support                              1-1
                   User-ID                               1-4,8-1
                   Utilities, ARBITER                         8-4
                   Utilities, batch                             8-1
                   Utilities, batch (IBM)                        9-1
                   Utilities, BDT                              8-5
                   Utilities, data set                           3-8
                   Utilities, GST                              8-1
                   Utilities, IBM                              9-1
                   Utilities, IDCAMS                          9-2
                   Utilities, IEBCOPY                         9-3
                   Utilities, IEBGENER                        9-3
                   Utilities, IEFBR14                          9-1
                   Utilities, IEHLIST                          9-4
                   Utilities, IEHMOVE                        9-3
                   Utilities, IEHPROGRM                     9-1
                   Utilities, JSTS                             8-3
                   Utilities, KWIC/KWOC                     8-13
                   Utilities, NCC                              8-1
                   Utilities, PLSORT                         8-13
                   Utilities, Primary Option Menu               3-7
                   Utilities, printing documentation             7-9
                   Utilities, RACF                            8-9
                   Utilities, SDSF                             8-2

V                 Vector facility                             10-4
                   VS COBOL II                             10-4
                   VSAM (Virtual Storage Access Method)        9-6
                   VSAM utility                               9-2
                   VSAM/AID                                9-6
                            Index-10

-------
INDEX
W
Welcome screen
Word processing
1-2, 8-6, 8-8
    SC-25
                         Index-11

-------
Micro-to-Mainframe Link

-------
MICRO-TO-MAINFRAME  LINK
             FEBRUARY 1990
                Prepared by:

        US Environmental Protection Agency
         National Data Processing Division
            National Computer Center
             Research Triangle Park
               North Carolina

-------
                        Preface

Micro-to-Mainframe Link provides essential information for
users of the National Computer Center who transfer files between
the mainframe and a Personal Computer.  Each type of file
transfer is discussed including asynchronous, coax, LAN SNA
gateway, and-Arbiter.
                          ill

-------
CONTENTS
INTRODUCTION	1

ASYNCHRONOUS FILE TRANSFERS	2

     KERMIT PROTOCOL	2

     MS-KERMIT	5

     MAINFRAME TO PC	5

     MS-KERMIT DOWNLOAD PROCEDURES	6

     CROSSTALK DOWNLOAD PROCEDURES	7

     UPLOADING DATA TO THE MAINFRAME VIA
         CROSSTALK OR MS-KERMIT	7

     KERMIT BINARY FILE TRANSFER	8

COAX FILE TRANSFERS	10

     IRMA CARD AND FORTE CARD	10

     UPLOADING USING IRMA OR FORTE	10

     CXI CARD	13

     UPLOADING USING THE CXI CARD	13

     DOWNLOADING USING COAX CARDS	13

LAN SNA GATEWAY FILE TRANSFERS	16

     UPLOADING USING THE LAN SNA GATEWAY	16

     DOWNLOADING USING THE LAN SNA GATEWAY	19

-------
CONTENTS
ARBITER FILE TRANSFERS	21



     TWO METHODS TO USE WITH ARBITER	21



     UPLOADING USING ARBITER	22



     DOWNLOADING USING ARBITER	25




     COMMAND LINE TRANSFERS	30



INDEX	:Index-l
                       VI

-------
INTRODUCTION
                   Although there are many data file transfer needs
                   within the Environmental Protection Agency, this
                   portion of the Guide to NCC Services is limited to
                   transfers of text or binary data from MS DOS, IBM-
                   compatible microcomputers to any of the NCC-IBM
                   mainframe computers.  It is assumed that you have
                   acquired a User-ID and account on at least one of the
                   NCC-IBM mainframes and are able to log on to TSO.

                   For more information on registration procedures and
                   for detailed logon instructions, refer to the section of
                   this guide entitled Getting Started.

                   File transfers can occur across any micro-to-main-
                   frame connection except the NCC's System Network
                   Architecture (SNA) protocol converter, also referred
                   to as the Terminal/Controller Processor (TCP). The
                   NCC supports transfer accesses in the following
                   categories:

                      •  Asynchronous: dialup, multiplexers, and DEC
                         terminal servers

                      •  Coaxial: IRMA, CXI, and FORTE

                      •  Local Area Network (LAN) SNA gateway
                         connections

                   Asynchronous connections are established through
                   modems such as HAYES 1200 or 2400 baud modems
                   or through direct wired connections. These direct
                   connections include multiplexer devices,  often re-
                   ferred to as muxes, and DEC terminal servers.

-------
ASYNCHRONOUS FILE TRANSFERS
KEBMTT           Kermit is a file transfer protocol which will ensure
PROTOCOL       error free data transfer between two computers across
                   asynchronous communications connections. A Ker-
                   mit file transfer requires that both computers in-
                   volved have Kermit software available. The Kermit
                   file transfer protocol was developed several years ago
                   by Columbia University for transferring data to and
                   from mainframes.  Columbia placed Kermit in the
                   public domain, and it has been developed for many
                   different computer systems including IBM-compat-
                   ible PC's and IBM mainframes. The version on the
                   NCC-1BM mainframe is called TSO-Kermit; the ver-
                   sion for the IBM PC is called MS-Kermit.

                   Both Crosstalk and MS-Kermit may be used on the
                   PC to accomplish Kermit text file transfers with
                   other computers across asynchronous connections.

            ป      Crosstalk and MS-Kermit both accomplish file trans-
                   fers, but each has its own set of display menus and
                   screens. Their similarities  lie in the fact that both
                   use the Kermit file transfer prototol.

                   While all versions of MS-Kermit will perform Kermit
                   file transfer, Crosstalk must be version 3.6 or later to
                   perform Kermit file transfers. The opening banner of
                   Crosstalk will display the version as you start the
                   program as shown below:

-------




k^






^

^


















CROSSTALK - XVI
Crosstalk XVI ver 37b
Copyright(C) 1982. 1988
Digital Communications Associates. Inc.
All Rights Reserved
IBM Personal Computer Version


f ' ^\
I • 1


V. -J

>

j






•^



s





This screen will disappear after a few seconds, or you
can just press ENTER and the following screen will
appear:

-------
              •CROSSTALK - XVI Status Screen-
                                            Off line
NAme   Crosstalk default settings
NUmber  0700
                             LOaded    STD
                             CApture   Off
I         Communications parameters'
Steed  2400  PArity Even DUplex
DAta   7     Slop   ]    EMulate
POrt   I                MOde
                           	1  I    Filter settings	1
                          Full     DEbug  OT  LFauto   Off
                          VT-100  TAbex  Off  BLankei Off
                          Call     INfilter  On  OUlfiltr  On
ATten
SWitch
GS (1)
Home
               Key settings"
COmmand ETX CO
BReak    End
l~ SEnd control settings ~1
CWait  None
LWait  None
I                     Available command files	1
1) EMAIL       2) NEWUSER     3) SETUP    4) STD     5) TSO
 .Enter numtwte Stetousft < I+J2
                Command files allow you to automatically access the
                hardware by storing the phone numbers and other
                parameters in a macro-like file.  For example, this
                screen has been set up to allow access to TSO on the
                mainframe simply by entering the number 5.

                For more information  on setting up your own com-
                mand files, see the Crosstalk documentation or call
                User Support.

-------
MS-KERMIT
MAINFRAME
TO PC
Note that if you add or delete a command file, num-
bering will change because Crosstalk arranges the
files alphabetically.

For convenience, the MS-Kermit version includes the
Hermit transfer protocol along with a terminal emu-
lation program to allow you to log on to the main-
frame and transfer data in the same program.

Every mainframe/PC transfer (either direction) must
begin with the mainframe because you are using the
PC as a way to enter commands.

Transferring data from a mainframe to a PC is
commonly referred to as  downloading. To begin a
Kermit file transfer from the mainframe to your PC,
log on to the IBM and get to the TSO READY prompt.
Refer to the section of this guide entitled Getting
Started for logon details.  Then enter the following
at the TSO READY prompt:
     READY
     KERMIT
                   The following prompt will then appear:

                          Kernmt-T50>

                   Then type SEND followed by the TSO data set name
                   you wish to transfer to your PC. A message should
                   appear instructing you to  begin receiving data on
                   your PC. An example follows:

-------
     Kermit-TSOปSEND data-set-name

     Delay in seconds before sending is  20
     Escape to your local KERMiT and enter the RECEIVE command
MS-KERMIT
DOWNLOAD
PROCEDURES
At this point procedures differ depending on whether
you are using Crosstalk (version 3.6 or later) or MS-
Kermit (currently version 2.30).

If you are using MS-Kermit, press CTRL-] followed
by C to escape to the command mode on the PC.  In
newer versions of MS-Kermit, Alt-X will function the
same way.

The  Kermit-MS> prompt  appears on  the screen.
Enter RECEIVE in response to the prompt as shown
below:
     Kermit-MS>RECEIVE
     Kermit-MS   V2 30
              File name
      KBytes transferred
              Receiving
      Number of packets
          Packet length
       Number of retries
              Last error.
           Last warning
   8 Jan 1988
     DATA SET NAME
     12345
     In progress
     0

     1
     None
     None
                    The transfer begins and Kermit continues to display
                    the status of the transfer until it completes.

-------
CROSSTALK
DOWNLOAD
PROCEDURES
              If you are using Crosstalk, press your Attn (atten-
              tion) key, which is usually defined as ESC, to go to the
              PC. You will see a Command? prompt on the bottom
              of your screen as shown below:
  I
Command?
1
UPLOADING
DATA TO THE
MAINFRAME VIA
CROSSTALK OR
MS-KERMIT
              Enter KERMIT RECEIVE in response to the prompt.
              The file transfer begins and continues to display the
              status of the transfer until it is complete.

              Commands can be abbreviated to their shortest
              unique length. For example, RECEIVE can be short-
              ened to REC.

              Sending data from your PC to the IBM mainframe is
              very much like receiving data. First log on to the
              mainframe and get the TSO READY prompt. Then
              type KERMIT to get the Kermit-TSO> prompt.  Tell
              the mainframe to begin receiving data by issuing a
              RECEIVE data set command at the Kermit-TSO>
              prompt as shown below:
    Kermlt-TSO>REC

    Entering receive mode
    Escape to your local KERMIT and enter the SEND command

-------
                    Then escape from the terminal mode of MS-Kermit
                    or Crosstalk, (CTRL-] or Attn key as discussed be-
                    fore) and tell your PC to send the data you wish to
                    transmit.  Crosstalk uses the following command at
                    the Command? prompt to send data to the TSO data
                    set:

                          HERMIT SEND filename

                    The command to do the same thing in MS-Kermit is
                    as follows:

                          SEND filename

                    An example follows:
                                            	
   1  Command^SEND myfite.tit                                   j

KERMIT BINARY   Kermit binary file transfers are used when the data
FILE TRANFER    being transferred is data that must not be changed.
                   Since text is represented differently on mainframes,
                   such as the NCC's IBM 3090, than on PC's, the text
                   must be converted as the data is transmitted. Kermit
                   translates unless you instruct it to leave the data
                   alone. If you disable the translate feature, you will be
                   affecting a binary file transfer.

                   To transfer binary data you  must first tell TSO-
                   Kermit to handle the data as binary by issuing the
                               8

-------
                following command at th e Kermit-TSO> prompt prior
                to starting your SEND or RECEIVE of any data:

                       SET FILE BINARY

                To reverse this and start text file transfers the com-
                mand is SET FILE TEXT.

                MS-Kermit requires no special commands to switch
                to binary mode from text mode. It recognizes the
                mainframe activities as binary activities and switches
                accordingly.

                However, Crosstalk must be told to switch to binary
                mode before starting to send or receive data with the
                following entered at the Command? prompt:
                                                        -,
I  Command?kermit mode binary                          I
                 Binary file transfers must not be used when sending
                 text data from a PC to the mainframe to be further
                 edited or printed. The resulting data on the main-
                 frame will be useless except by another PC which
                 could download the data in binary mode and have a
                 duplicate copy of what was transferred to the main-
                 frame.

                 Binary data file transfers are useful for distributing
                 data such as WordPerfect files, dBASE files, and
                 Lotus files as well as programs for IBM-compatible
                 PC's.

-------
COAX FILE TRANSFERS
                   Another method which is used within the EPA to
                   connect IBM-compatible  PCs to the various IBM
                   mainframes uses coaxial cable (often referred to as
                   coax). This coax is connected to the PC by use of coax
                   adapters or interface cards installed inside the PC.

                   There are three major coax cards used within EPA
                   and supported by NCC User Support:

                      •  IRMA
                      •  FORTE
                      •  CXI (PCOX)

                   All three products  can perform file transfers pro-
                   vided that you have the right software installed on
                   your PC.' As in any file transfer there must be
                   software on each computer capable of communicat-
                   ing with the other across the communications link.
                   The NCC  supports one  software package  called
                   IND$FILE on the IBM mainframes which will com-
                   municate with any of the three interface cards men-
                   tioned.

 IRMA CARD AND   The IRMA card from Digital Communications Asso-
 FORTE CARD      ciates (DCA) will transferees using IND$FILE with
                   software on the PC called FT3270 SEND/RECEIVE.
                   The product called FTTSO is not supported by the
                   NCC and should not be used.

                   Like the IRMA card, the FORTE card, also manufac-
                   tured by DCA, uses the FT3270 SEND/RECEIVE
                   software.

                   To send, or upload, a file to the IBM mainframe from
                   your PC using the IRMA or FORTE card, the IRMA
                   or FORTE terminal software must be loaded as
UPLOADING
USING IRMA
OR FORTE
                             10

-------
resident in the PC's memory for FT3270 to work. See
the IRMA or FORTE manuals for more information
on making the terminal software resident.

Access the IBM through the IRMA or FORTE connec-
tion (often just by selecting the software from the
AUTOMAX menu). Then log on to TSO and get to the
READY prompt. See the section of this guide called
Getting Started for logon details.  At  the READY
prompt, press the HOTKEY.

The HOTKEY is  usually defined as pressing both
shift keys simultaneously to escape to the DOS
prompt.  At the DOS prompt enter the following
command:

 SEND d:\path\pcfile.typ tso.dsn[(mbr)] [options]

Where the command elements are explained as fol-
lows:

 d:\path\ represents the DOS path  to the file to be
sent, such as C:\MAINV

pcfile.typ represents the DOS filename  of the file to
be sent to the mainframe.

tso.dsn is the destination data set name in TSO fol-
lowed by an optional partitioned data set member
name if the target data set is a partitioned data set.

options at the end of the command may include any
of the following:
            11

-------
                     •  Data Control Block (DCB) information:
                        BLKSIZE (size of logical data blocks)
                        LRECL (length of logical data records)
                        RECFM (record format such as fixed or vari-
                        able)
                        SPACE (how much  space to allow for the
                        data on the mainframe)
                        TRACKS  or  CYLINDERS to refer to the
                        SPACE option

                     •  ASCII (to translate from ASCII to EBCDIC)

                     •  CRLF (to define CRLF as end of logical rec-
                        ords)

                     •  APPEND (to add the new data to an existing
                        data set on the mainframe).

                 For  example, to  send  a  small  text file called
                 IRMATEXT.DOC  from the PC's A: disk drive to a
                 data set in TSO called ABCW123.IRMATEXT with
                 member MAY0189 to be printed from the IBM main-
                 frame, the command would look like  the following:
  C\>SEND A\IRMATEXTDOC 1ABCW123IRMATEXT(MAY0189)>
  RECFM(FB) LRBCU80) BLKSIZE(6160) SPACE(5.1) TRACKS ASCII CRLF
	
                 Since the DCB information is default values, the
                 command can be shortened to the following:
                            12

-------
        MORE
        INFO
CXI CARD
UPLOADING
USING THE
CXI CARD
DOWNLOADING
USING COAX
CARDS
SEND A:\IRMATEXT.DOC
'ABCW123.IRMATEXT(MAY0189)' ASCII CRLF

For more information on TSO data set data control
block information, refer to Section 3 of the IBM
Ready Reference or refer to IBM documentation.

After entering the SEND command, a status line
appears on the PC's screen and displays the progress
of the file transfer.  When it is complete, you can
HOTKEY back to the TSO session and browse, edit,
or print the newly uploaded data set.

The CXI card from Novell (sometimes called the
PCOX card) has its own SEND/RECEIVE software
product. However, like FT3270 SEND/RECEIVE the
CXI SEND/RECEIVE software will communicate
with IND$FILE to transfer files to and from the
mainframe.

The SEND command syntax for the CXI/PCOX card
is the same as the IRMA and FORTE syntax unless
you are using the WINDOWED version of the CXI/
PCOX product. For the WINDOWED (multi-session)
product, a window designator such as A: must be
placed in front of the TSO data set name to direct the
data to the appropriate session for transfer to a TSO
data set.

For more information on WINDOWED CXI/PCOX
sessions see the PCOX documentation.

The RECEIVE command is used to move data from a
TSO data set to a file on your PC. The  command
syntax is as follows:
                             13

-------
RECEIVE d:\path\pcfile.typ tso.dsn [(mbr)] [opt]

Where the command elements are explained as fol-
lows:

d:\path\ represents the DOS path to the file to be
created on the PC.

pcfile.typ represents the DOS filename of the file to
be received from the mainframe.

tso.dsn is the data set name in TSO from which you
wish to receive the data followed by an optional
partitioned data set member name if the source data
set is a partitioned data set.

There are fewer options at the end of the RECEIVE
command than in the SEND command:

   •   ASCII (to translate from EBCDIC to ASCII).

   •   CRLF (to define CRLF as end of logical rec-
       ords).

   •   APPEND (to add the new data to an existing
       file on the IBM PC).

For example, to receive a small text file  called
IRMATEXT.DOC to the A: disk drive on the PC from
a data set in TSO called 'ABCWm.IRMATEXr
member MAY0189 to be merged into a WordPerfect
document on the PC, the command would look like
the following:

RECEIVE A:\IRMATEXT.DOC
IABCW123.IRMATEXT(MAY0189)' ASCII CRLF
           14

-------
               After you enter the RECEIVE command, a status line
               appears on the PC's screen and displays the progress
               of the file transfer, as shown in the example below:
CVRECEIVE A \myirtna doc 'targei-dsn(mbr)1 ASCII CRLF

TRANSO1    File transfer command being processed
TRANS02    Number of bytes of file transferred so far ==>  8447
TRANS03    File transfer complete

Transfer statistics
  Total no  of chars received  8690
  Actual no of data bytes 8447
  overhead (X)  2
               Transfer messages are different for each type of coax
               transfer. But each will notify you that the transfer is
               complete.

               When your tranfer from the mainframe is complete,
               you can edit, merge, or print the new PC file.
                           15

-------
LAN SNA GATEWAY FILE TRANSFERS
 PC TOKEN
 RING LAN
 UPLOADING
 USING THE LAN
 SNA GATEWAY
 PC Token Ring LAN's, installed throughout the
 Agency, often provide an easily accessible pathway to
 the IBM mainframe.  EPA sites with Novell SNA
 gateways will have the Novell Workstation software
 available for 3270 emulation.  This software is simi-
 lar to the CXI/PCOX coax software discussed previ-
 ously.

 Like the CXI/PCOX software, the workstation soft-
 ware must be loaded as resident in memory for the
 SEND and RECEIVE software to function in the PC.
 The main difference between  the LAN file transfer
 and the coax file transfer is in the SEND command.

 The SEND command for the  LAN conflicts with a
 utility  which is available for LAN users to send
 messages to each other and is called SEND. To
 resolve this problem NCC has renamed the file trans-
 fer send command to the following:

       SENDFILE

 With the exception of SENDFILE, command syn-
 taxes for sending and receiving are the same as for
 the CXI/PCOX access method.

 The LAN SNA Gateway software from Novell in con-
junction with the IBM Token Ring cards will transfer
 files using IND$FILE with software on the PC called
 CXI PCOX SEND/RECEIVE.

To send, or upload, a file to the IBM mainframe from
your PC using the LAN SNA Gateway, the Gateway
 software must be resident on the PC's memory.
                             16

-------
For more information on making the terminal soft-
ware resident, see the CXI PCOX manual.

Access the IBM through the LAN SNA Gateway
connection. Then log on to TSO and get to the READY
prompt. See the section of this guide called Getting
Started for logon details. At the READY prompt,
press the HOTKEY (usually defined as Alt-PageUp)
to escape to the DOS prompt. At the DOS prompt
enter the following command:

SENDFILE d:\path\pcfile.typ w:tso.dsn[(mbr)]
[options]

Where the command elements are explained as fol-
lows:

 d:\path\ represents the DOS path to the file to be
sent, such as C:\MAINV

pcfile.typ represents the DOS filename of the file to
be sent to the mainframe.

w: refers to the window you wish to transfer the data
with, since the gateway software operates in a win-
dowed mode.

tso.dsn is the destination data set  name in TSO
followed by an optional partitioned data set member
name if the target data set is a partitioned data set.

options at the end of the command may include any
of the following:
            17

-------
    •   Data Control Block (DCB) information:
       BLKSIZE (size of logical data blocks)
       LRECL (length of logical data records)
       RECFM (record format such as fixed or vari-
       able)
       SPACE (how much space to allow for the data
       on the mainframe)
       TRACKS or CYLINDERS to refer to the
       SPACE option

    •   ASCII (to translate from ASCII to EBCDIC)

    •   CRLF (to define CRLF as end of logical rec-
       ords)

    •   APPEND (to add the new data to an existing
       data set on the mainframe)

For example,  to send  a  small text file  called
PCOXTEXT.DOC from the PC's C: disk drive to a
data set in TSO called 'ABCW123.PCOXTEXT with
member MAY0189 using the A: window to be printed
from the IBM mainframe, the command would look
like the following:
n*> w
L
C:\>SENDFILE C\POOXTEXT.DOC A:'ABCW1 23.POOXTEXT(MAYO 1 89)'
ASCII CRLF
L i

r ^fn
A
           18

-------
         MORE
         INFO
DOWNLOADING
USING THE LAN
SNA GATEWAY
For more information on TSO data set data control
block information, see Section 3 of IBM Ready Ref-
erence and IBM documentation.

After entering the SENDFILE command, a status
line appears on the PC's screen and displays the
progress of the file transfer. When it is complete, you
can HOTKEY back to the TSO session and browse,
edit, or print the newly uploaded data set.

The SEND and RECEIVE command syntax for the
CXI/PCOX LAN SNA Gateway product is the same
as the CXI/PCOX coax card syntax.

For more information on WINDOWED CXI/PCOX
sessions see the PCOX documentation.

The RECEIVE command is used to move data from
a TSO data set to a file  on your PC.  The command
syntax is as follows:

RECEIVE d:\path\pcfile.typ w:tso.dsn[(mbr)]
[options]

Where the command elements are explained as fol-
lows:

d:\path\ represents the DOS path to the file to be
created on the PC.

w: refers to the window you wish to transfer the data
with, since the gateway software operates in a win-
dowed mode.

pcfile.typ represents the DOS filename of the file to
be received from the mainframe.
                               19

-------
 tso.dsn is the data set name in TSO from which you
 wish to receive the data from followed by an optional
 partitioned data set member name if the source data
 set is a partitioned data set.

 options include the following:

    •  ASCII (to translate from EBCDIC to ASCII)

    •  CRLF (to define CRLF as end of logical rec-
       ords)

    •  APPEND (to add the new data to an existing
       file on the IBMPC)

 For example, to receive a small text file called
 CXITEXT.DOC to the C: disk drive on the PC from
 a data set in TSO called 'ABCW123.CXITEXT
 member MAYO 189 through PC OX window A: to be
 merged into a WordPerfect document on the PC, the
 command would look like the following:
I CVRECEIVE C \CXITEXT DOC A'ABCWlZSCXITEXKMAYOlSg)1
1 ASCII CRLF

41 Hซ
J
After entering the RECEIVE command a status line
appears on the PC's screen and displays the progress
of the file transfer. When it is complete you can edit,
merge, or print the new PC file.
            20

-------
ARBITER FILE TRANSFERS
ARBITER FILE
TRANSFERS
 TWO METHODS
 TO USE WITH
 ARBITER
Arbiter has many features including using the main-
frame as disk drive server, 3270 full-screen terminal
emulation, data translation, and file transfers.  This
section will cover the file transfer features of Arbiter.

Like MS-Kermit, Crosstalk, and IRMA, Arbiter can
transfer data between your PC and the NCC-IBM
mainframe. However, unlike all of the other meth-
ods available at the NCC, Arbiter is not specific to
any one connection type.  It can attach IBM-compat-
ible PC's to the IBM mainframe using a variety of
connection methods.  Arbiter supports almost all of
the NCC communications access methods. In addi-
tion, all features of Arbiter are available  to you
regardless of the access method you choose to use.

The NCC  purchases, installs, and maintains the
Arbiter mainframe products.  The PC software com-
ponents and documentation are available at no charge
through PC Site  Coordinators  and  Information
Centers at Washington and RTF.  Or Arbiter soft-
ware and documentation kits can be obtained from
NCC Production Control for a copy fee  of $25.00 per
kit. Contact Production Control at one of the tele-
phone numbers listed below and be sure to have a
valid IBM timeshare account number  available for
billing purposes.

       (FTS) 629-3609
       (919) 541-3609

After logging onto Arbiter, there are  two ways to
transfer a file:

Full-Screen Panels. Full screen panels prompt you
through the process.  All field data is retained from
one transfer session to the next to allow for easy
editing of repeated transfers.
                               21

-------
UPLOADING
USING ARBITER
Extended commands.  You can issue extended
commands on the DOS command line. This is useful
when automating file transfers using the DOS batch
functions.

To start a transfer of data from the PC to the main-
frame using full-screen prompting, issue the com-
mand $ at the DOS prompt. The following screen
appears:
                         "Arbiter **
                   Main Services Selection Menu
                 • Romote Disk Environment Services
                 • External File Interface Services

                 • Interactive Session Relay Terminal

                 V Signoff from Host Arbiter
                                02-15-90
                                                     Node
                                                     LUNAME
     Fl-Help  F2-Msgs  F3 Mam          ESC Quit  AF2-ISRAF3-DQS

                     F10 Select AFiO Terminate
                               22

-------
                Select the EXTERNAL FILE INTERFACE (EFI)
                option by moving the higlighted bar with your arrow
                keys and pressing F10. The next screen then ap-
                pears:
                      "ArWWC  **
              External File Interface Services
                        Fite transfer
             • SEND        PC file  --ป    Host
             • RBCV        Host   **ป   PC Fife
             • SBNDft       Remote tUsk  ซปป Host
             • RBCVR       Host  *ซป Remote Disk
                     Other ฃFJ Senloes
               SUBMIT
Predefined Extraction
Database Transfer
Submit Job to Host
Fl-Help  F2-Msgs  F3-Main           ESC-Quit  AF2-ISRAF3-DOS

                        FiO-Seioct
                Next, highlight the SEND command and press FIO.
                The following screen appears:
                           23

-------
,'f;
t*
f,
      PC **ป Hb$t
     frofc:
     To:
                                     11 f f f ,
                                   " -"
                                 >  „<  ',   ',/
                                 	jWf.		?.../;
      "ArWter *ป
     Fite Transfer
                     TEXT
                     Transfer Type
              TEXT
              nwz
              BINARY
Ho$tOSN
Append

No
Metol?er
ซ )

     Fl-Help F2-Msgs F3-Main F4-EFI FIO-Exec ESC-Quit AF2-ISR AF3-DOS

                     ?$~T       F6-4     F9-Visw
         MORE
         INFO
Specify the PC path and file name of the PC file you
wish to send, the T80 data set name which will
receive the data (including a member name if needed
for a partitioned data set), and the file transfer type
(TEXT or BINARY).

More information on the  file transfer type may be
found in the Arbiter Users Guide in Chapter 21.
                                24

-------
                   The filepath field requires a valid PC file name and
                   optional path that references an existing PC file.

            ป      The TSO data set field requires the name of a PRE-
                   ALLOCATED data set on the mainframe because
                   Arbiter is not capable of dynamic allocation of TSO
                   data sets.  However, members of partitioned data
                   sets (PDSs) will be dynamically created once the PDS
                   is allocated.

DOWNLOADING   Downloading data is easier than uploading because
USING ARBITER   you need not allocate PC files. The receive process is
                   started like the send process by issuing the $ com-
                   mand at the  DOS prompt. You will again see the
                   following screen:
                               25

-------
f
                            t*
Main Service* Se|ectf<ปi Menu
                                                       02-15
                  • Remote Diซk Ettvironmeftt Services
                  • External File Interface Services
                  • Interactive Session Relay Terminal

                  m Signoft froth Host Arbiter
     Fl-Help  F2-Msgs F3-Main
                                     VI.H
                                     Node
                                     LUNAME
                    ESC-Quit  AF2-ISRAF3-DOS
                     Select the EFI option with the highlighted bar, being
                     sure to press F10 to select the option. The following
                     screen appears:
                                  26

-------
v^ ,;,vฐ^ -%
                   External File Interface Cervices
                                  02-15-90
                                       -ปป>
RECV
                                Host    --ป  PC File
                                Ornate Oisfc  —ป> Host
                    SELECT       Predefined Eriractioa
                    OBXFER      Database Transfer
                    SUBMIT      Submit j&bio Host
    Fl-Help  F2-Msgs  F3-Main          ESC-Quit  AF2-ISRAF3-DOS

                             FiO-Sclect
                    Next, select RECV using the highlighted bar and
                    F10. The following screen appears:
                                 27

-------

 '*';
v ''•
S  :
'
4'
     Front;
HdstDSK

Member
( J
     To;
FllePath
Replace
ic
No

       Fl-Help F2-Msgs F3-Main F4-EFI FlO-Exec ESC-Qujt AF2-ISR AF3-DOS
                    On the Host ==ป PC panel, specify the host data set
                    name and a member name if the data set is a parti-
                    tioned data set, a PC file name to receive the host
                    data,  and the type  of data transfer (TEXT or BI-
                    NARY).

                    The type of file transfer may be one of the selections
                    you see by pressing the F5 and  F6  keys  on your
                    keyboard with the cursor placed in the box labeled
                                28

-------
Replace
No
             Transfer Type', or you may create a transfer type of
             your own by pressing the F9 key.

             For more information on modifying transfer charac-
             teristics, see the Arbiter Users Guide, Chapter 21.

             The last field on the the Host ==ป PC screen is the
             Replace field. The default is NO. If you place YES in
             this box, you will overwrite the data in the PC file if
             the PC file already exists; otherwise, the file transfer
             will abort and tell you that the PC  file cannot be
             overwritten.
             When all fields are complete, press F10 to begin the
             file transfer.  The PC will display a small window at
             the bottom of your screen showing the status of your
             file transfer.  This window displays the name of the
             file into which data is being written, the date and
             time of the transfer, and the number of bytes trans-
             ferred, as shown in  the following example:
                     Host —ป PC File transfer
                             sm   2 is so 3
Fl-Help F2-Msgs F3-Main F4-EFI FlO-Exec ESC-Qiiit AF2-ISR AF3-DOS
                          29

-------
COMMAND LINE
TRANSFERS
You may suppress the full-screen panels of Arbiter
if you wish to use PC batch processing to transmit
and receive data from the mainframe.  All of the
options available from the panels may be placed on
the command line of the $ command, as shown in the
following example:
   I C\>$SEND[devlfilepath /DSN-dsname /TXtype-TEXT /APPend /Batch

                   The $ SEND command is used to transfer data from
                   the PC to the mainframe. Some of the commonly
                   used options are as follows:
                   dev
                   filepath
                 Such as C: for a hard drive.

                 Such as \DOS\ for a DOS subdi-
                 rectory.
                  /DSN='dataset'   Defines the TSO data set.

                  /TXtype=TEXT   Transfer type such as TEXT or
                                   BINARY.
                  /APPend
                  /Batch
                 Appends file to end of mainframe
                 data set.

                 Suppresses the Arbiter panels.
                              30

-------
          More information on other transfer options may be
INFO I     found in the Arbiter Users Guide in Chapter 21.
                     31

-------
INDEX
                   $ command                                22

                   Account                                    1
                   Arbiter file transfer                         21
                   Arbiter PC software                         21
                   Asynchronous transfer                       1
                   AUTOMAX menu                           11

                   Binary file transfer                1, 8, 9, 24, 28
                   Binary file transfer, using Arbiter          24, 28
                   Binary file transfer, using Crosstalk            9
                   Binary file transfer, using Kermit              8

                   Coax cards                                10
                   Coax file transfer                           10
                   Coaxial cable                              10
                   Coaxial transfer                             1
                   Columbia  University                         2
                   Command line transfers, using Arbiter         30
                   Command mode, on the PC                    6
                   Command prompt                            7
                   Command, abbreviating                      7
                   Command, extended for Arbiter               22
                   Commands, KERMIT SEND                   8
                   Commands, RECEIVE                 6, 14, 19
                   Commands, RECV                          27
                   Commands, SEND                6, 8, 11, 16, 23
                   Commands, SENDFILE                     16
                   Crosstalk                                 2, 3
                   CXI (PCOX) card                           10
                   CXI                                       1
                   CXI card                                  13
                   CXI, WINDOWED version                    13

                   Data set, preallocated                       25
                   DEC terminal server                         1
                   Dialup connection                            1
                           Index-1

-------
INDEX
                  Digital Communications Associates            10
                  Direct wired connection                       1
                  Documentation, for Arbiter                   21
                  Downloading, using Arbiter                   25
                  Downloading, using coax cards                14
                  Downloading, using Crosstalk                  7
                  Downloading, using CXI                     14
                  Downloading, using FORTE                  14
                  Downloading, using IRMA                   14
                  Downloading, using Kennit                    5
                  Downloading, using MS-Kermit                6
                  Downloading, using the LAN SNA gateway     19

                  EFI (Extended File Interface)              23, 26
                  Extended command, for Arbiter               22
                  External File Interface                   23, 26

                  File transfer, introduction                     1
                  File transfer, Arbiter                        21
                  File transfer, coax                          10
                  File transfer, Hermit                         2
                  File transfer, LAN SNA gateway              16
                  FORTE                                    1
                  FORTE card                               10
                  FT3270 SEND/RECEIVE                    10
                  FTTSO                                   10
                  Full-screen panels, for Arbiter                21

                  HOTKEY                           11,13,17

                  IND$FILE                             10,16
                  IRMA                                     1
                  IRMA card                                10

                  HERMIT RECEIVE                          7
                  HERMIT SEND command                    8
                  Hermit protocol                             2
                            Index-2

-------
INDEX	

|_                 LAN (Local Area Network)                    1
                   LAN SNA gateway                           1
                   LAN SNA gateway file transfer               16
                   Local Area Network                          1

M                 Mainframe to PC                            5
                   Modem                                    1
                   MS-Kermit                               2,5
                   Multiplexer connection                       1

|SJ                 NCC Production Control                     21
                   Novell workstation                          16

p                 Preallocated data set                        25
                   Production Control                          21
                   Protocol converter                           1
                   Protocol, file transfer                         2

p                 RECEIVE command                   6,14,19
                   Receive, using MS-Kermit                    6
                   Receiving, using Arbiter                     25
                   Receiving, using coax  cards                  14
                   Receiving, using Crosstalk                    7
                   Receiving, using CXI                        14
                   Receiving, using FORTE                     14
                   Receiving, using IRMA                      14
                   Receiving, using MS-Kermit                  7
                   Receiving, using the LAN SNA gateway        19
                   RECV command                           27

C                 SEND command              6, 8,11,16, 23,30
                   SEND command, LAN SNA gateway          16
                   SENDFILE command                   16,17
                   Sending, using Arbiter                      22
                   Sending, using Crosstalk                     7
                   Sending, using CXI                         13
                   Sending, using FORTE                      10
                            Index-3

-------
INDEX	

                   Sending, using IRMA                        10
                   Sending, using LAN SNA gateway             16
                   Sending, using MS-Kermit                     5
                   Shift keys (HOTKEY)                        11
                   SNA (System Network Architecture)            1
                   SNA gateway                                1
                   System Network Architecture (SNA)            1

T                 Telephone numbers, Production Control        21
                   Terminal/Controller Processor (TCP)            1
                   Text file transfer                       1, 24, 28
                   Text file transfer, command to set              9
                   Text transfer, compared to binary              8
                   Time Sharing Option                         1
                   Token Ring card                            16
                   Token Ring LAN                            16
                   Translation, of text                           8
                   TSO (Time Sharing Option)                    1
                   TSO-Kermit                                 2

 y                 Uploading, using Arbiter                     22
                   Uploading, using Crosstalk                    7
                   Uploading, using CXI                        13
                   Uploading, using FORTE                     10
                   Uploading, using IRMA                      10
                   Uploading, using LAN SNA gateway           16
                   Uploading, using MS-Kermit                  7
                   User-ID                                    1

                   Workstation software                        16
                                     ซU S Government Printing Office  1990-728-527
                             Index-4

-------
VAX

-------
VAX Cluster Ready Reference

-------
    VAX  CLUSTER
READY REFERENCE
        DECEMBER 1989
          Prepared by:

    US Environmental Protection Agency
     National Data Processing Division
       National Computer Center
       Research Triangle Park
         North Carolina

-------
                        Preface

VAX Cluster Ready Reference provides essential information
for users of the National Computer Center's DEC VAX computers.
Basic descriptions of procedures, utilities, languages, and soft-
ware are included as well as pointers to online documentation.

This document and its associated online references replace the
previously published NCC-VAX User's Guide.
                          in

-------
                 BEFORE YOU BEGIN
The VAX Cluster Ready Reference is especially geared for the novice VAX
user. Therefore, the more basic subjects are covered in the greatest detail.
Topics of a more advanced nature, as well as information that is subject to
frequent change, has been placed in files on the VAX system itself where all
users may access them. These documents are referenced herein with the
following format:

      USERGUIDE:topic.DOC

USERGUIDE is a logical name which points to a directory where the docu-
mentation files are stored; topic.DOC is the file name.  A contents file,
$CONTENTS.README, is also provided which gives a short description of
each document. You may TYPE, COPY, or PRINT these files as desired. For
example:

      $ TYPE USERGUIDE:$CONTENTS.README
or
      $ COPY USERGUIDE:CLUSTER.DOC  [ABC ]CLUSTER.DOC

Any problems or inaccuracies noted within this document or the online files
should be reported to User  Support for correction. Please complete the
READER'S COMMENTARY form at the front of the manual.
                             w

-------
              TRAINING OPPORTUNITIES
NCC Training has developed courses specifically for VAX users.  These
courses are taught regularly at Research Triangle Park, NC but can also be
provided at other locations by special arrangement.

VAX Course I is designed to teach the basic fundamentals of the VAX/VMS
system. It covers the following: overview of the VAX/VMS system; logging
in and out; DCL commands; EDT and EVE editors; file naming conventions
and specifications, directories, and subdirectories; file protection; and MAIL
and PHONE.

VAX Course II, a follow-on to VAX Course I, covers the following:  using
logicals and symbols, writing command procedures, using disk and tape
volumes, and submitting batch and print jobs.

VAX FOCUS courses are also offered.

Refer to the following online documentation for more details:

       USERGUIDErCLASSES.DOC

-------
CONTENTS
SECTION 1: ACCESSING THE NCC VAX

DIAL-UP ACCESS	1-1

     PORT SELECTOR SWITCH	1-1

     TYMNET ACCESS	1-3

     WIG DATA SWITCH	1-4

     ETHERNET ACCESS	1-5
     Terminal Server Commands	1-5

LOGON PROCEDURES	1-7

     USERNAME	1-7

     PASSWORD	1-8

     PROJECT CODE	1-9

LOGOUT PROCEDURES	1-10


SECTION 2: THE VAX ENVIRONMENT

THE VAX CLUSTER	2-1

     OPERATING SYSTEM	2-1

     DCL COMMANDS	2-1
     Help Utility	2-1
     Command Abbreviation	2-2
     Command Continuation	2-2
     Command Recall	2-3

     INTERACTIVE CPU LIMIT	2-3
                        VI

-------
CONTENTS
     INACTIVE SESSION TERMINATION	2-4



     ACCOUNTING AND CHARGEBACK	2-4




     REFUNDS	2-5






SECTION 3: DISK AND FILE STRUCTURE




FILE SPECIFICATIONS	3-1




     WILDCARDS	3-2




DIRECTORIES	3-3




     CREATING SUBDIRECTORIES	3-3



FILE PROTECTION	3-4




     CHANGING FILE PROTECTION	3-6




     CHANGING DEFAULT PROTECTION LEVELS	3-6




     DISPLAYING FILE PROTECTION	3-7




     DIRECTORY PROTECTION	3-7






SECTION 4: FILE MANIPULATION




FILE MANIPULATION COMMANDS	4-1



     DIRECTORY	4-1



     SET DEFAULT	4-2



     TYPE	4-3
                       Vll

-------
CONTENTS
     COPY	4-3

     RENAME	4-4

     DELETE	4-4

     PURGE	4-5

     PRINTING FILES	4-6
     NCC VAX Cluster Printer	4-6
     PRINT Command	4-6
     Desktop Laser Printers	4-7
     Form Types	4-7
     Remote Node Printers	4-7
     NCC-IBM 3090 Printers	4-10


SECTIONS: DISK SPACE MANAGEMENT

SYSTEM BACKUPS	5-.

     RECOVERING FILES FROM INCREMENTAL BACKUPS	5-2

ARCHIVING FILES	5-4

STANDBY ARCHIVING	5-7

DISK QUOTAS	5-8

SCRATCH WORK SPACE	5-8


SECTION 6: LOGICAL NAMES AND SYMBOLS

LOGICAL NAMES	6-1
                       vm

-------
CONTENTS
     DEFINE	6-1

     LOGICAL NAME TABLES	6-2

     DISPLAYING LOGICAL NAMES	6-2

SYMBOLS	6-3


SECTION?: COMMAND PROCEDURES &
            BATCH JOBS

COMMAND PROCEDURES	7-1

     LOGIN COMMAND PROCEDURES	7-3

BATCH JOBS	7-4

     BATCH QUEUES	7-4

     BATCH JOB ACCOUNTING	7-5

     SUBMITTING A BATCH JOB	7-5


SECTION 8: EDITING FILES

EDT EDITOR	8-1

     COMMANDS	8-2

     EDT RECOVERY FEATURES	8-6

     EDT STARTUP COMMAND FILE	8-6

EXTENSIBLE VAX EDITOR (EVE)	8-7
                       IX

-------
CONTENTS
     COMMANDS	8-8



     MULTIPLE FILE EDITING	8-11



     EVE RECOVERY FEATURE	8-13



     USING DCL COMMAND FROM EVE	8-13






SECTION 9: VAX VMS UTILITIES




MAIL  	9-1



     INVOKING MAIL	9-1



     COMMANDS	9-1



     SENDING A MAIL MESSAGE	9-2



     READING A MAIL MESSAGE	9-L



PHONE	9-1



     INVOKING THE PHONE UTILITY	9-3



     COMMANDS	9-4



BACKUP	9-7



LIBRARIAN	9-8



SORT 	9-9



DIGITAL STANDARD RUNOFF (DSR)	9-11



NCC-SUPPLBED UTILITIES	9-11

-------
CONTENTS
     ABI (ARCHIVE/BACKUP INQUIRY)	9-12



     ABR (ARCHIVE/BACKUP RECOVERY)	9-12



     ARCHIVE	9-12



     AUTOPRINT	9-12



     EMAIL	9-12



     IBMSUBMIT	9-12




     LASERPRINT	9-13




     MEMO	9-13



     OPERATION_SCHEDULE	9-13




     PROTECT	9-13




     SCRATCH	9-13




     TUTOR	9-13






SECTION 10: TAPE MANAGEMENT




TAPES AT NCC	10-1



     VAX SYSTEM TAPES	10-1




     FOREIGN TAPES	10-1



     ALIEN TAPES	10-2




DPSS TAPE SERVICES	10-3
                        XI

-------
CONTENTS
TAPESYS TAPE MANAGEMENT SYSTEM	10-4



     VAX TAPE LABEL POLICY	10-4



     TAPESYS COMMANDS	10-5



     MODIFYING TAPE INFORMATION	10-6



     INQUIRING ABOUT TAPES	10-7



     FREEING TAPES	10-7



     BACKING UP FILES TO TAPE	10-8



     RESTORING FILES FROM TAPE	10-11



USING TAPES INTERACTIVELY	10-13



INITIALIZING TAPES	10-17






SECTION 11: COMMUNICATION & FILE TRANSFER



DECNET (VAX <—> VAX)	11-1



     DISPLAYING THE NETWORK	11-1




     LOGGING ON TO A REMOTE NODE	11-1



     USING DCL COMMANDS OVER THE NETWORK	11-2



DECNET/SNA GATEWAY (VAX <—> IBM)	11-2



     DECNET/SNA 3270 TERMINAL EMULATOR	11-3



DECNET/SNA REMOTE JOB ENTRY	11-7
                       Xll

-------
CONTENTS
     FILE TRANSFER USING DECNET/SNA RJE	11-8



DECNET/SNA DATA TRANSFER FACILITY	11-9



     TRANSFER/DTF	11-10



JNET/BITNET	11-11



KERMIT	11-12






SOFTWARE CATALOG




PROGRAMMING LANGUAGES	SC-1



     VAX FORTRAN	SC-2



     VAX MACRO	SC-4



     DEBUGGER	SC-5



     VAXSET	SC-4



APPLICATION PACKAGES	SC-5



     SAS	SC-9



     FOCUS	SC-10



     IMSL	SC-11



GRAPHICS PACKAGE	SC-12



     GKS	SC-12






INDEX	Index-1
                       xm

-------
SECTION 1     ACCESSING THE NCC VAX
DIAL-UP
ACCESS
 PORT SELECTOR
 SWITCH
You can access the NCC VAX Cluster in one of two
ways:

   •   By using a modem to connect to the
       system over a telephone line.

   •   Through the Ethernet network.

Video terminals or personal computers equipped
with modems are used to dial-up the VAX system.
Since there is a  wide variety of communications
packages and modems that can be used, you should
refer to your hardware documentation for specific
instructions.   There are, however, some general
guidelines that apply to all types of communication
with the VAX:

   •   You may dial-up at either 1200 or 2400
       baud.

   •   Your  communication software should
       be emulating a VTlOO-type terminal.

   •   Communication parameters should be 7
       data bits, 1 stop bit, and even parity.

The telephone number that your modem can use to
dial the VAX depends on your location and your
modem speed.  Local users will dial up the  Port
Selector switch directly. Users in other cities may
find it more economical to use TYMNET.  Users in
Washington,  DC may access the VAX through the
Headquarters Data Switch.

The NCC Port Selector switch  provides the most
direct means to access the VAX  Cluster with a mo-
dem.  Dial one of the following numbers:
                              1-1

-------
                •   1200 baud:    (919) 541-4642
                                  or (FTS) 629-4642

                •   2400 baud:    (919) 541-0700
                                  or (FTS) 629-0700

             When you make the connection, press the RETURN
             key once to display the Port Selection menu as shown
             below:
WELCOME TO THE ENVIRONMENTAL PROTECTION AGENCY NATIONAL COMPUTER CENTER

            Please enter one of the following selections

             IBMPSI for IBM
             TCP for IBM 3270 EMULATION
             VAXA for VAX SYS A
             VAXB for VAX SYS B
             EMAIL for EMAIL
Enter selection
             Most users select the VA
-------
TYMNET ACCESS   If you are not local to the NCC, you may reach the
                    Port Selector menu through the TYMNET communi-
                    cation network.  Contact User Support or Telecom-
                    munications Support for help in determining your
                    local TYMNET  number.   When  connecting to
                    TYMNET, you will be prompted with the following:
      Please type your terminal identifier:
                    Note that this line may appear as or may be preceded
                    by a line of garbage characters.

                    Type "3" in response to this prompt. Then you will see
                    a screen similar to the following:
       Please type your terminal Identifiers
                    Type EPA 1 if you are at 1200 baud, or EPA2 for 2400
                    baud.

                    The next message will be similar to the following:
                               1-3

-------
      NODE 3157
HOST 103B EPA IS ON LINE
WIG DATA
SWITCH
                   Then the Port Selector menu will appear and you can
                   proceed as described above for dial-up, Port Selector
                   Switch users.

                   The VAX Cluster may also be accessed directly from
                   the TYMNET "Please login:" prompt by entering one
                   of the following:
                          EPAPS 1:5002.1202
                          EPAPS 1:5002.1203
                           (forVAXA)
                           (forVAXB)
If you are located in the DC area, you can access the
VAX Cluster through the Washington Information
Center's Data Switch at  the following telephone
number:

              (202) 488-3671

The menu that appears on your screen is as follows:
                               1-4

-------
  r
WELCOME TO THE ENVIRONMENTAL PROTECTION AGENCY
       HEADQUARTERS DATA SWITCH
         To Access
         IBM (TTY)
         IBM 3270 EMULATION
         EPA/DIALCOM ELECTRONIC MAIL
         PRIME
         VAX
         MODEM POOL
         OTHER SERVICES

         YOUR SELECTION?)
                    Type

                    IBMPSI
                    TCP
                    EMAIL
                    system name
                    system name
                    MODEM,
                    HELP
ETHERNET
ACCESS
Terminal Server
Commands
   At the selection prompt, enter V^XA and your connec-
   tion is complete.

   Some users access the VAX with terminals that are
   linked directly to the Ethernet network through a
   terminal server. If this is the case for you, you need
   only turn on your terminal and press RETURN. The
   DECserver200Terminal Server LOCAL prompt should
   appear.  Then to connect to the VAX Cluster, type the
   following command:

          CONNECT VAX

   Other terminal server commands you may issue at
   the LOCAL prompt include the following:
                    Command
                           Function
                    HELP TUTORIAL
                    SHOW SERVICES
                           Displays a quick guide
                           on  using  a  terminal
                           server.

                           Displays  all  available
                           services on the network.
                               1-5

-------
Command

SHOW PORT


SHOW SESSIONS


SHOW USERS



SET BREAK REMOTE
SET BREAK LOCAL
Function

Displays  information
about your port setup.

Displays all active ses-
sions.

Shows all users logged
on  to  your terminal
server.

Allows your terminal to
send  charac-
ters to the remote sys-
tem.

Causes the 
character to return you
to  the terminal server
command prompt.
SET LOCAL SWITCH [char] Sets a character which,
                      when  pressed, returns
                      you to  the terminal
                      server command prompt.

SET FORWARD SWITCH [char] Sets a character
                      which,  when  pressed,
                      connects you to your next
                      sequentially numbered
                      session.

SET BACKWARD SWITCH [char] Sets a character
                      which,  when  pressed,
                      connects you to the pre-
                      viously numbered ses-
                      sion.
           1-6

-------
                  Command
                      Function
LOGON
PROCEDURES
USERNAME
                  SET SESSION PASSALL Sets the terminal server
                                         to pass binary data; use-
                                         ful for file transfer.
                  CONNECT xxxx
                      Connects you to the indi-
                      cated system.
                  DISCONNECT SESSION n Terminates an active
                                         session.
                  LOCK
                  LOGOUT
                       Locks your  terminal
                       server port with a pass-
                       word that you supply.
                       This password must be
                       reentered to unlock the
                       port.

                       Logs  out your terminal
                       off the server and discon-
                       nects any active sessions.
Once you have established a connection to the NCC
VAX Cluster, the system will prompt you for your
user name. You may need to press RETURN once to
get the following prompt:

      Username:

The system is asking for your 3-character User-ID
which was provided to you when you registered with
the NCC. Your usemame will identify you to the VAX
every time you log on to the VAX Cluster. Type it in
and press RETURN.
                              1-7

-------
PASSWORD         You will then be prompted to enter your password by
                    the following prompt:

                           Password:

             ป      Type your password carefully because it will not
                    appear on the screen, and press RETURN. If you type
                    an incorrect password, the following message will ap-
                    pear:

                           User Authorization Failure.

                    If this happens, press RETURN once, and the system
                    will prompt with Username: again.

             ป      After three consecutive unsuccessful password at-
                    tempts, you are disconnected from the line.

                    After five consecutive unsuccessful logon attempts
                    your User-ID is prohibited from attempting to logon
                    again.

                    If your current password has expired, as it will be the
                    first time you log on, you will be required to change
                    it immediately. You may also change your password
                    anytime by issuing the SET PASSWORD command.
                    In either case, you will be prompted by the system as
                    follows:
     ;0ld Password
     New Password
     Verlficatloa

                               1-8

-------
PROJECT CODE
In response to  the  "Old  Password" type in your
current password. Then type in the new password,
and verify it by typing the new password again.

The following rules apply to your VAX password:

    •   It can be from 6 to 31 characters in length.
       Valid characters are A-Z, 0-9, $ and _ (under-
       line character).  It is recommended that it
       include at least one alpha and one numeric
       character. It is not case sensitive.

    •   It expires every 90 days, and you are forced to
       change it.

    •   It cannot be changed back to its most recent
       value.

    •   It should be changed often, and immediately
       whenever its secrecy is compromised.

If you need help with your password, call NCC User
Support at one of the following telephone numbers:

              (FTS) 629-7862
              (919) 541-7862
              (800) 334-2405 (outside NC)

The last logon prompt asks for your project code.
When you registered, you were authorized for one or
more  projects.  These codes are used by  the VAX
Cluster accounting  system to allocate charges for
resources consumed. The project prompt is as fol-
lows:

       Project:
                               1-9

-------
            ป      If you are authorized for multiple projects, you may
                   change projects during a terminal session without
        ^^        logging off by typing the following command:

                          CP

                   At this point, the VAX $ prompt should appear. It
                   indicates that you are fully logged on, and the system
                   is ready to receive commands.

LOGOUT          To conclude a VAX Cluster terminal session, enter
PROCEDURES     one ฐftne following commands:

                      LOGOUT     Logs you off and provides full
                                    accounting information.

                      LO          Logs you  off quickly without
                                    showing session charges.
                              1-10

-------
SECTION 2     THE VAX ENVIRONMENT
THE VAX
CLUSTER
         MORE
         INFO
OPERATING
SYSTEM
 DCL COMMANDS
 Help Utility
The NCC VAX Cluster consists of several Digital
Equipment Corporation (DEC) VAX computers con-
figured as a "cluster." Each computer is identified by
its node name. Most users will access node VAXTM1,
the "timesharing" computer. The other nodes have
more specialized and, in some cases, restricted, uses.

For more information on the current configuration of
the VAX Cluster, see the following online documen-
tation:

      USERGUIDE:CLUSTER.DOC

The VAX Cluster uses an operating system called
Virtual Memory System (VMS). You communicate
with VMS using Digital Command Language (DCL).
DCL commands may be issued interactively (from
your terminal) or from command procedures and
batch jobs. When you successfully log on to the VAX
Cluster,  the "$" prompt indicates that the VAX is
ready to accept DCL commands.

Note that you may redefine the DCL prompt for your
session by using the SET PROMPT command.  An
example follows:

      $ SET PROMPT=WVAX>"
      VAX>

DCL consists of about 200 commands, most of which
have a number of qualifiers and parameters used
with them. However, since the most commonly used
options are often assumed by  default,  you do not
always have to explicitly specify command qualifiers.

Complete explanations of all the DCL commands and
their options are available to you online through the
                             2-1

-------
Command
Abbreviation
Command
Continuation
HELP utility. To access this utility, type the follow-
ing at the DCL prompt:

       HELP

A list of topics will appear on your screen, and then
you just type in the topic of your choice. If you already
know the topic or command, you may access the topic
information directly as shown in the example below:

       HELP SET PROMPT

For detailed help with using the HELP utility, enter
the command HELP HELP.

Most of the VAX topics in this manual are discussed
further in the HELP utility. It contains much of the
same text that is found in the VAX/VMS DCL Dic-
tionary.

DCL commands may be abbreviated to their shortest
unique length. For example, the DIRECTORY com-
mand may be abbreviated to DIR because no other
command begins with those same letters. In no case
is it necessary to use more that the first four letters
of a DCL command.

If a command is too long to fit on one line, you may
continue it onto one or more additional lines by
ending a line with a hyphen (-).  This may be done
either interactively or in a command procedure.
After ending a line  with a hyphen and pressing
RETURN, you prompt will be prefixed with an under-
score (e.g., "_$"), indicating that you are continuing a
command.

Note that this technique has been used in some of the
command examples in this manual, due to the neces-
                              2-2

-------
Command Recall
INTERACTIVE
CPU LIMIT
sary page formatting. It is not required that you
enter the commands this way.

Command recall allows you to recall a recently typed
command without typing it in  again.  Use the up
arrow key to scroll back through your 20 most re-
cently issued commands, bring back a  command,
make changes or corrections, and then reissue it. Or
use the RECALL command instead of the arrow key.
The following command displays a numbered list of
commands available for recall:

       RECALL/ALL

Then type the following to recall a specific numbered
command in the list.

       RECALL n

Where n is the number of the command.

The RECALL command can also be used to recall a
command by  name.   For example, the following
command will recall  the most recently issued com-
mand that starts with "DIR":

       $ RECALL DIR

To encourage you to process  large jobs in batch
instead of interactively, an interactive CPU limit of
20 minutes has been imposed. If you exceed the 20-
minute limit, your session will be terminated.

Spawning sub-processes will reduce this allotment
since the 20 minutes is divided among them.
                              2-3

-------
INACTIVE
SESSION
TERMINATION
ACCOUNTING
AND
CHARGEBACK
If no activity is detected for 30 minutes, your interac-
tive session will be terminated, in an effort to mini-
mize both security risks and unnecessary connect
time charges.

For more information about inactive process termi-
nation, see the following online documentation:

       USERGUIDE:HITMAN.DOC

The VAX Cluster uses an accounting system that
calculates usage statistics for each account and user
for chargeback purposes. There are two categories of
charges:

    •   Computer-related charges include tape
       and/or disk rental, disk quota, foreign tape
       storage, terminal rental, dedicated port, and
       batch privileges.  In addition, they also in-
       clude one-time charges such as terminal in
       stallation, technical charges, and graphics
       plotter charges.

    •   Processor charges include charges for con-
       nect time and system utilization measured
       by the VAX resources used.

ADP Coordinators receive monthly billing reports for
all registered accounts.  These reports are broken
down by the account and utilization categories.

Chargeback rates are reviewed each year and may be
changed at the beginning of the fiscal year (October
1). For current information on chargeback rates, see
the following online documentation:

       USERGU1DE:CHARGES.DOC
                               2-4

-------
REFUNDS          Charges will be refunded if a transaction fails due to
                    the following:

                       •  Console operator errors.

                       •  System hardware failures.

                       •  System software errors.

                    Jobs using more than 2 hours of CPU time must have
                    a user-defined save and restart capability to be eli-
                    gible for a refund. The refund will not exceed charges
                    greater than those incurred during 2 hours of CPU
                    utilization.  To apply  for a refund, contact User
                    Support.
                               2-5

-------
SECTION 3     DISK AND FILE STRUCTURE
FILE
SPECIFICA-
TIONS
A file specification tells the VAX/VMS operating sys-
tem where to locate a file.  A complete file specifica-
tion consists of several parts, but it is usually not
necessary to use them all. The maximum length is
255 characters. The format is as follows:

NODE: :DEVICE: [DffiECTORY]FILENAME.TYPE;VERSION

Each element is explained below:

NODE is the node (system) name. A node specifica-
tion is only necessary if the file is located on a system
other than the one you are currently using.

DEVICE is the device (usually a disk) that the file
resides on.  It is not needed if you are referencing a
file that is on the current default device.

DIRECTORY is the name of the directory contain-
ing the file. It is enclosed within square brackets,
and used when referencing a file not in the current
default directory.

FILENAME is the name of the file. It may be from
1 to 39 characters long. You may use letters, num-
bers, and the underline (J and dollar sign ($) charac-
ters in the file name.

TYPE is an extension to the file name.  It may be
from 0 to 39 characters long, but usually  it is 3
characters that identify the contents of the file. For
example, DAT is a data file, and COM is a command
procedure.

VERSION  is the version number of the file indicat-
ing how many times the file has been altered. It may
range from  1 to 32,767.  If omitted (or zero), the most
recent version is assumed.
                              3-1

-------
                   The following example illustrates each element of a
                   file specification:


                             disk device      file name   version
                   VAXTM1: :USER$DISK:[XYZ]PROGRAM.FOR;10

                    system            directory     file extension
                   This file specification refers to the tenth version of a
                   file called PROGRAM.FOR (a FORTRAN program)
                   that resides in directory XYZ, which is on disk device
                   USER$DISK, on the VAXTM1 system.

                   Keep in mind that when specifying a file, the system
                   will assume your current defaults for information
                   not given. Thus, if you were logged on to the VAXTM1
                   system and directory XYZ on USER$DISK was your
                   current default, you could specify the above file with
                   just PROGRAM.FOR; 10. (And if version 10 were the
                   most recent, PROGRAM.FOR would be sufficient.)

WILDCARDS       You may refer to more than one file with a single file
                   specification by using special characters (known as
                   wildcards) within your specification. This allows you
                   to affect more than one file with a single command.
                   There are two wildcard characters that can be used
                   in file specification:

                       1. Asterisk (*) is used to represent any number
                         of characters.  For example, *.DAT would
                         match any file that had a file type of DAT.
                         ABC*.* would match any file that began with
                         ABC  regardless  of its file  type.  And,  of
                         course, *.* will match everything.
                              3-2

-------
DIRECTORIES
CREATING
SUBDIRECTO-
RIES
    2.  Percent sign (%) works just like the asterisk
       except that it will only represent one charac-
       ter. Therefore, %%%.DAT will match all files
       that have a three-character name and a file
       type of DAT.

You can think of a directory as being a space where
files are kept. Every user on the VAX Cluster has a
private directory for file storage.  Your directory's
name is the same as your three-character User-ID
and will usually be enclosed in square brackets. For
example, user ABC's directory would be [ABC]. Often
this directory will be referred to as the "root" direc-
tory, because you have the ability to create subdirec-
tories under it.

Subdirectories will help you better organize your
files.  To create a subdirectory, use the following
command:

       CREATE/DIRECTORY

In the following example user ABC creates a subdi-
rectory called "reports":

       CREATE/DIRECTORY [ABC.REPORTS]

The result is a directory file called REPORTS.DIR in
the [ABC] directory.  To move to this subdirectory,
use the SET DEFAULT command as follows:

       SET DEFAULT [ABC.REPORTS]

You may create as many as seven levels of subdirec-
tories below your root directory with an unlimited
number of subdirectories on each level. The diagram
that follows depicts a typical disk structure.
                              3-3

-------
                     DISK STRUCTURE

• J


User
File
Directory


^

t
Subdirectory
(1st level)

1

!
Data
File








t
Data
File


Subdirectory
(2nd level)
Master
File
Directory

i

i
User
File
Directory
.




*
r

r






*
Subdirectory
(1st level)
.

Data
File


.

4
User
File
Directory
-* ^ *-
^
*
Data
File


Data
File


Data
File

FILE
PROTECTION
You have the ability to specify varying degrees of
protection for your files. The VAX protection system
recognizes four categories of users to which you may
grant or deny access to a file:

   1.  SYSTEM (S).  Includes console operators,
       system management, and user support per-
       sonnel.

   2.  OWNER (0). You, the owner of the file.
                             3-4

-------
   3.  GROUP (G).  Other users in your User Iden-
       tification  Code (UIC) group.  (Members of
       your UIC group are usually the other users in
       your office or work group.)

   4.  WORLD (W).  Everyone on the system.

For each category, you may grant any of four types of
access.

   1.  READ (R). A user can look at, but not change,
       the file. This access includes the ability to
       TYPE, COPY, and PRINT the file.

   2.  WRITE (W). A user can modify the file using
       such tools as an editor, etc.

   3.  EXECUTE (E). A user can execute the file (if
       it is a program or a command procedure) but
       cannot view or change it.

   4.  DELETE  (D). A user can delete the file.

Protection levels are often  referred to using the
abbreviations shown above.  For example, the de-
fault protection levels for files on the VAX Cluster are
as follows:

       S:RWED,0:RWED,G:RE,W

This means that:

SYSTEM has full access to the file. (It is inadvisable
to restrict this access because it may impact certain
system maintenance functions.)

OWNER also has full access. You may want to alter
this in certain cases. For example, you can prevent
           3-5

-------
                  accidental deletion by disallowing DELETE on your
                  files.

                  GROUP has only READ and EXECUTE access.

                  WORLD has no access. You may want to alter this
                  in some cases to allow a user in another group to
                  access your files.

CHANGING FILE  You may alter the protection levels of any files that
PROTECTION      yฐu own with the following command:

                     SET PROTECTION=(protect-codes)  filename

                  Where protect-codes are as described above (8:RWED,
                  etc.)

                  The following example allows WORLD tohave READ
                  access to a file called REPORT.DAT. None of the
                  other protection attributes will be changed,  since
                  they are not mentioned in the command.

                     $ SET PROT=(WORLD:R) REPORT.DAT

                  The next example specifies no access options; there-
                  fore, GROUP will have no access to PROGRAM. FOR.
CHANGING
DEFAULT
PROTECTION
LEVELS
   $ SET PROT=(GROUP) PROGRAM.FOR

You can specify the protection that you want applied
to all files that you create to be different from the
system defaults with the following command:

   $ SET PROT=(protect-codes)/DEFAULT

Where protect-codes are as described above (S:RWED,
etc.)
                            3-6

-------
DISPLAYING
FILE
PROTECTION
For example, after executing this command, files cre-
ated during your current session will allow full ac-
cess to GROUP and READ access to all users. The
defaults for SYSTEM and OWNER are unchanged.

    $ SET PROT=(G:RWED,W:R)/DEFAULT

You may check to see how a file is protected (provided
that you have appropriate access to it) by using the
DIRECTORY command as follows:

    DIRECTORY/PROTECTION filename

Where filename is the name of the file to check.

An example follows:

    $ DIR/PROTECTION  REPORT.DAT

The following is then displayed on the screen:
     Directory $2$DUAI [XYZ]

        REPORT DAT. 1  (RWED.RWED.RE.R)

        Total of I rile
DIRECTORY
PROTECTION
When applied to directory files (file type DIR), the
protection attributes have slightly different mean-
ings:

READ. A user can read the directory to locate and
access files.

WRITE. A user can make changes to the directory
(such as creating or deleting files in it.)
                             3-7

-------
EXECUTE. Similar to READ, except the user must
use an exact file specification when accessing the
directory.  Wildcard operations are not valid.

DELETE.  A user can delete the directory. A direc-
tory must be empty before it can be deleted. Also,
DELETE access is not provided by default, even to
the directory's owner. You must use SET PROTEC-
TION to allow yourself DELETE access before you
can delete it.

You can control access to a large group of files by
adjusting the protection of the directory they reside
in.  For example, by denying READ and EXECUTE
access to a directory, all files in that directory will be
inaccessible, regardless of their individual protec-
tion attributes.

The online utility PROTECT is available to assist
you in changing file protection levels.
           3-8

-------
SECTION 4     FILE MANIPULATION
FILE
MANIPULATION
COMMANDS
DIRECTORY
There are many DGL commands available for you to
use in maintaining and manipulating your files and
directories. Some of the most often used ones are
described below.  Keep in mind that all the  com-
mands have many additional qualifiers that can be
used with them. Use the HELP command to obtain
complete details on their use.

The DIRECTORY command provides a listing of the
files in a directory.   It can  also provide additional
information about the files, such as their size, protec-
tion, date of creation, etc.  If a file specification is
given with the command, only files that match it will
be displayed.

The format is as follows:

   DIRECTORY filename

In the following example, the system produces  a list
of all files in the default directory ([ABC]), because no
file specification was given. (This implies a file speci-
fication of "**;*".)
       $ DIRECTORY

       Directory $2$DUA I [ABC)

       REPORT DAT.5   REPORT DAT.4  TESTFILE.2  TEST FILE, I

       Total of 4 files
                              4-1

-------
                    In the next example, the command lists only files that
                    match the file name TEST.FILE and requests infor-
                    mation on the file size and date of creation.
     1$ DIRECTORY/SIZE/DATE TEST FILE

     TESTFILE.2       3   12-JUL-1989   12352849
     TEST FILE. I       I   12-JUL-1989   11555316

     Total or 2 files. 4 blocks
                    Some useful qualifiers are the following:

                    /SIZE            Gives the file's size in disk blocks
                                     (each equal to 512 bytes).

                    /DATE           Gives the file's date of creation.
                                     Other dates are also available.

                    /PROTECTION   Displays the file's protection at-
                                     tributes.

SET DEFAULT      The SET DEFAULT command is used to change your
                    current default directory; that is, you use it to "move"
                    between directories.

                    The format is as follows:

                       SET DEFAULT directory

                    For example:

                       $ SET DEFAULT [ABC.SUB]
                                4-2

-------
             ป      It is possible to SET DEFAULT to a nonexistent
        	         directory. No error message will be issued until you
        "^         execute a command that attempts to read the direc-
                    tory.

TYPE               The TYPE command is used to display a file on your
                    terminal screen. It does not allow you to edit the file;
                    it merely prints it to the screen for you to see.

                    The format is as follows:

                          $ TYPE filename

                    For example:
      $ TYPE TEST FILE
      This is a sample text rile
      S
                   A useful qualifier is the following:

                   /PAGE            Causes the file to be displayed
                                     one page at a  time.  You are
                                     prompted to press RETURN af-
                                     ter each page is displayed.

COPY             The COPY command creates  a new file from an
                   existing one.

                   The format is as follows:

                       COPY input-filename output-filename
                              4-3

-------
RENAME
DELETE
                  In the following example TEST.FILE is copied from
                  the  current default directory into a file called
                  NEWFILE.DAT in directory [XYZ].

                     $ COPY TEST.FILE [XYZ]NEWFILE.DATA

                  A useful qualifier is the following:
                  /LOG
                Causes a message to be displayed
                indicating the name and size of
                the file(s) copied.
The RENAME command assigns an existing file a
new name. It can also be used to "move" a file to
another directory by specifying a different directory
(on the same device) as part of the new name.

The format is as follows:

   RENAME filename new-filename

For example, you can rename the file JOE.DATA to
be JOHN.DATA.

   $ RENAME JOE.DATA  JOHN.DATA

Or you can move SAM.DAT from the current direc-
tory to [ABC.DAT]:

   $ RENAME SAM.DAT [ABC.DATISAM.DAT

The DELETE command is used  to delete unwanted
files.  When  deleting a file, you must specify its
version number.  The "*" wildcard may be used to
delete all versions of the file.
                             4-4

-------
                   The format is as follows:

                      DELETE filename

                   In the following example, the system deletes only
                   version 3 of JOHN.DATA.

                      $ DELETE JOHN.DATA;3

                   In the next example, the system deletes all versions
                   ofSAM.DATA.

                          $ DELETE SAM.DATA;*

PURGE            The PURGE command is used to "clean up" a direc-
                   tory. It deletes the old versions of files that accumu-
                   late as  new ones  are created. This saves you the
                   trouble of having to issue individual DELETE com-
                   mands.  By default, all but the most recent version
                   are deleted.

                   The format is as follows:

                      PURGE filename

                   In the following example all old versions of all files in
                   the default directory are purged, since no file speci-
                   fication is given.

                      $ PURGE

                   In the next example, only the old versions of the file
                   TEST.FILE are purged.

                      $ PURGE TEST.FILE
                             4-5

-------
                   Some useful qualifiers are as follows:
                   /KEEP=n
                   /CONFIRM
                Allows you to specify how many
                versions of a file are to be kept.
                For example, PURGE/KEEP=3
                will delete all but the 3 most
                recent versions.

                Causes you to be prompted be-
                fore a file is purged of old ver-
                sions.
PRINTING FILES   You may obtain a printed copy of a file by requesting
                   it to be printed on any of several available printers.

NCC VAX Cluster  All users can print files on the VAX Cluster system
Printer             line printer located at the NCC.
PRINT Command
Use the PRINT command which has the following
format:

       PRINT/NOTE=bin# filename

The /NOTE=bin# qualifier is required in order to
specify your bin number to the operators and to
ensure that your printout is correctly routed to you.
If you do not know your bin number, contact User
Support for assistance.

Some useful qualifiers are as follows:

/AFTER=time
                   /FORMS=type
Does not print the job until
after a specific time.

Specifies the name or num-
ber of the form for the print
job.   (See  Desktop Laser
Printers in this section.)
                             4-6

-------
                   /NOTIFY
 >esktop Laser
Printers
Form Types
                    Notifies you when the print
                    job completes.
                   /QUEUE=queue-name Requests a  print job  to  a
                                      specific queue. (See Desktop
                                      Laser Printers in this sec-
                                      tion.)
                   /COPIES=n
                   /DELETE
                    Specifies the number of cop-
                    ies to print.

                    Causes the file to be deleted
                    after printing.
For example, to print 10 copies ofMEMO.TXT after
8:00 p.m. (20:00):

       $ PRINT/AFTER=20/COPIES=10 MEMO.TXT

Some users can also access desktop laser printers
located in their local offices.

To route output to these printers, you must specify
the queue name and the form type.  The command
format  is as follows:

  PRINT/QUEUE=queue/FORM=type filename

The defined form types are depicted in the following
drawings.
                              4-7

-------
     PORTRAIT LASER PRINTER FORMS
     96 characters
s
$
LASER
or
NORMAL
(default)
 I
                      109 characters

                              COMPRESS
     78 characters
       LETTER
in
                       80 characters
                         LPT80

                     4-8

-------
LANDSCAPE LASER PRINTER FORMS
     o
     in
             134 characters
                WIDE
     a
     to
             147 characters
WIDE_COMPRESS

or

COMPRESS WIDE
               4-9

-------
Remote Node
Printers
NCC-IBM 3090
Printers
Users of remote VAX systems on DECnet can route
files to their system printers by using the  NET-
PRINT command.  The format is as follows:

      NETPRINT/NODE=node-name filename

Most of the PRINT command qualifiers can be used
on the NETPRINT command. For more information
on NETPRINT, type the following at the DCL prompt:

      HELP NETPRINT

Users of NCC-IBM 3090 system can route files to
print on the system's printers provided they have a
valid User-ID for the NCC-IBM system.

In particular you may want to make use of the IBM
3800 laser printer.  To use the VAX utility that
automates this process, type the following command
at the DCL prompt:

      LASERPRINT

You will be prompted for the information necessary
to print your file.

For more information on printing files on the IBM,
see the following online documentation:

      USERGUIDE:IBMPRINT.DOC
                            4-10

-------
SECTION 5      DISK SPACE MANAGEMENT
SYSTEM
BACKUPS
Files on disk volumes are regularly copied to mag-
netic tape by the NCC Operations staff using the
VMS BACKUP utility program.  Two types of back-
ups are performed:

    •   Incremental Backups are run every night
       and copy only those files which have been
       created or modified that day. The tapes are
       kept for a period of 30 days, during which you
       may recover files from them.

    •   Full (Standalone) Backups, which copy ALL
       files on the system, are run every other week
       on Saturday evening. They generally require
       10 to 12 hours to run, during which users are
       locked off the system.

       The procedure includes purging all but
       the latest two versions of all user files.

Full backup tapes are intended primarily for use in
recovering from disk hardware problems; however,
where possible, Data Management will assist users
in recovering individual files from them that cannot
be restored from any other source. Full backup tapes
are retained for 31 days.

Private user packs are not subject to system backups.
It is the responsibility of the owners of these disk
packs to perform backups. However, the Data Man-
agement staff will perform such backups by special
arrangement with the owners. Contact Data Man-
agement at the telephone number below for more
information:

             (FTS) 629-4078
             (919) 541-4078
                              5-1

-------
RECOVERING
FILES FROM
INCREMENTAL
BACKUPS
You may recover files from the system incremental
backup  tapes  without  any operator  assistance.
Typically, you might want to do this if you were to
accidentally delete a file, or if you wanted to get back
to an earlier version than your current one.  In any
case, keep in mind that the incremental backup tapes
are kept for only 30 days. If a file was not created or
altered within the past 30 days, it will not be avail-
able for recovery from these tapes.

Recovering a file requires two steps:

   •   Determine which tape it was backed up to.

   •   Issue a request to restore it back to disk.

Both of these tasks are performed through  the
TAPESYS tape management system.

Use the following command to get a listing of a file's
backup copies:

       $ TAPE REPORT/SYSTEM-
       _$ /HISTORY=DAILY filespec

Where filespec is a particular file or a file specifica-
tion which includes wildcards to reference multiple
files. Specifying "[...]*.*" will produce a listing of all
backed up files. Include the following qualifier to
send the report to a file instead of to the terminal
screen:

       /OUTPUT=filename

For  example, with  a  default directory  of
$2$DUA1:[XYZ] assume that user XYZ issues the
following command:
                               5-2

-------
                      $ TAPE REPORT/SYSTEM-
                      _$ /HISTORY=DAILY-
                      _$ /OUTPUT=REPORT.DAT LOGIN.COM

              The  following  report  would  be  written  to
              [XYZJREPORT.DAT:
       Run date 07-JUL-1989 09 45                  Page I

                      System Backup Report

Set DAILY - File * S2DUAI [XYZ1LOGIN COM*
VAXTMI J2JDUAUXYZILOGINCOM.48                    [USE.XYZ]
          I-JUL-I989 1901 097307     S2IDUAIBAK

VAXTMI $2$DUAI(XYZ]LOGlNCOri.47                    [USE.XYZ]
          27-JUN-1989 19 38 097861     $2$DUA I BAK

VAXTMI $2$DUAlfXYZlLOGINCOM.46                    IUSE,XYZl
          12-JUN-1989 19 14 097740     I21DUAI BAK

          End of report
               This report may also be produced using the Archive/
               Backup Inquiry (ABI) utility. Just type ABI at the
               DCL prompt.

               The listing indicates the date and time the backup
               was made, the six-digit reel number of the tape it was
               put on, and the name of the saveset that contains it
               (diskname.BAK). You will need this information to
               issue the request to restore the file with the following
               command:

                     $ TAPE RESTORE-
                     _$ /SELECT=filename reel-number-
                     _$ saveset output-file
                          5-3

-------
                    For example to restore the first file listed in the
                    report above, use the following command:

                           $TAPERESTORE-
                           $ /SELECT=LOGIN.COM;48  097307-
                           _$$2$DUA1.BAK  [XYZ]*.*

                    A batch job will be submitted to perform the restora-
                    tion, and you will receive a MAIL message when it is
                    completed.

            ป       The recovery request may also be made using the
                    TAPESYS  menu  system  or  the Archive/Backup
                    Recovery (ABR) utility. Just type ABR at the DCL
                    prompt.

ARCHIVING        To make the most efficient use of disk space on the
FILES              VAX Cluster, unused files are archived to tape. A file
                    is determined to be "unused" by the expiration date
                    associated with it. To see this date, use the following
                    command:

                           $ DIR/DATE=EXP

                    Each time  a file is accessed, its expiration date is
                    reset to 45 days from the present. An "access" can be
                    any read or write operation. Data Management jobs
                    are regularly run to look for files that have reached
                    their expiration dates (unused for 45 days). These
                    files are copied to tape and deleted from the disk. The
                    archive tapes are kept for a period of one year. A
                    second copy of the archive tapes  is also made and
                    stored offsite for use in disaster recovery.

                    Files may be recovered from the archive tapes with-
                    out any operator assistance in two steps:
                               5-4

-------
    •   Determine where the file is located (archive
       tape reel number and saveset name).

    •   Issue a request to restore it back to disk.

To get a listing of archived files, issue the following
command:

       $ TAPE REPORT/SYSTEM-
       _$ /HISTORY=ARCHIVE filespec

Where filespec is a particular file or a file specifica-
tion which includes wildcards to reference multiple
files. Specifying^...]*.*" will produce a listing of all
archived files. Include the following qualifier to send
the report to a file instead of to the terminal screen:

       /OUTPUT=filename

For  example,  with a default  directory  of
$2$DUA1:[XYZ] assume  that user XYZ issues the
following command:

       $ TAPE REPORT/SYSTEM-
       _$ /HISTORY=ARCHIVE-
       _$ /OUTPUT=ARCHIVE_REPORT.DAT-
       _$ MYDATA.DAT

The  following  report  would  be  written  to
[XYZ1ARCHIVE_REPORT.DAT:
          5-5

-------
           Run date 31 -JUL-1989 1234                 Page 1

}                          System Backup Report

     Set ARCHIVE - File ป 12DUA1IXYZIMVDATADAT ซ

     VAXTM1 $2$DUA1[XYZ1MYDATA.DAT,1
              28-JUL-1987 08 13 098469    S2IDUAI ARC

              End of report
                    This report may also be produced using the ABI
                    utility.

                    The listing indicates the date and time the file was
                    archived, the six-digit reel number of the tape it was
                    copied to, and the name of the saveset that contains
                    it (diskname.ARC). You will need this information to
                    issue the request to restore the file with the following
                    command:

                          $ TAPE RESTORE/SELECT=filename-
                          _$ reel-number saveset-name output-file

                    For example to restore the file listed in the report
                    above, use the following command:

                          $TAPERESTORE-
                           $ /SELECT=MYDATA.DAT 098469-
                          _$ $2$DUA1.ARC  * *

                    A batch job will be submitted to perform the restora-
                    tion, and you will receive a MAIL message when it is
                    completed.

                    The recovery request may also be made using the
                    TAPESYS menu system or the ABR utility.
                               5-6

-------
STANDBY         You may also request that a file be intentionally
ARCHIVING       archived for long-term (2-year) storage. To initiate
                   the procedure, called Standby Archiving, enter the
                   following command:

                          $ TAPE BACKUP/REEL=ARCHIVE-
                          _$ /NOTES=2_YEAR/RECORD/LOG^
                          _$ filename

                   Note the following about the command:

                      •   The REEL= specification must be the word
                          ARCHIVE.

                      •   The /NOTES= qualifier must be included in
                          all requests with the first word being 2_YEAR
                          (in uppercase letters) to indicate an archive
                          class to TAPESYS.

                      •   The /LOG option will include a log entry in
                          your directory.

                      •   The /RECORD option will make an entry in
                          the history file to enable you to inquire about
                          the file at a later date.

            *      Standby archiving may also be requested using the
                   ARCHIVE utility or the TAPESYS menu system.

                   Archiving is not accomplished immediately upon
                   executing the above command. The actual archiving
                   of the files is done by jobs executed by NCC Data
                   Management personnel several times a week. This
                   execution may be 1 or 2 days after the archive request
                   was made. You will receive a MAIL message when
                   the job runs and the file is archived.  You will be
                   charged only for issuing the command, not for un-
                   loading or storing the file.
                              5-7

-------
DISK QUOTAS
SCRATCH
WORKSPACE
At the time of this writing, disk quotas are not used
on the VAX Cluster to restrict the amount of space
you may occupy on public disk packs. However, you
are expected to exercise good judgment with regard
to the amount of space used. You are encouraged to
check periodically for unused files that can be deleted
and to purge old versions of files. Large files that are
used only occasionally should be moved to tape for
long-term storage.

VAX Cluster disk space management policy is cur-
rently undergoing revision, and it is anticipated that
disk quotas will be implemented. For current infor-
mation, see the following online documentation:

       USERGUIDE:DISKJSPACE.DOC

If you require a large amount of disk space on a short-
term basis, use the scratch work space that has been
established. This work space consists of three disks.
mounted as a volume set, providinga total of 2,673,216
blocks of space.  It may be referenced with the logical
nameWORKJSCRATCH. All users are free to make
use of this storage space; however, keep in mind that
the following policies apply to it:

    •   The  space is intended  for TEMPORARY
       storage only. Files which have existed on the
       pack for more than 48 hours will be auto-
       matically deleted by Data Management who
       will run jobs to check for such files every
       night, Monday through Thursday. Files will
       not be deleted on Friday, Saturday, or Sun-
       day nights to allow for large batch jobs that
       may require access to a file for more than 48
       hours.
                               5-8

-------
    •   The volume set will be reinitialized (com-
       pletely erased) every other Saturday night
       during the standalone backup period.

    •   No charges will be incurred for storage on
       these disks.

    •   No backups will be performed on these disksl

    •   Currently, these packs are emergency spares
       and their availability cannot be guaranteed.
       If the failure or impending failure of another
       system disk requires the use of a spare, they
       may be taken offline with little or no notice
       given.

For current status information about the scratch
packs, use the following command:

       $ SCRATCH
           5-9

-------
SECTION 6     LOGICAL NAMES AND SYMBOLS
LOGICAL
NAMES
DEFINE
Logical names are descriptive words defined to equate
to all or part of a file specification, or to a physical
device. They can save you time and keystrokes by
allowing you to use a short logical name in place of a
longer real name. They also allow device and file
independence in program design.

The DEFINE command is used to establish the con-
nection between the logical name and the equivalent
file specification or device.

The format is as follows:

      DEFINE logical-name equivalence-name

For example, you can define MRD  to equate to
MISSISSIPPLRIVER.DATA which allows you to
use MRD instead of the longer file name:

      $ DEFINE MRD MISSISSIPPLRIVER.DATA

The following command defines MYDIR to be the
directory [ABC] on device $2$DUA62:

      $ DEFINE MYDIR $2$DUA62:[ABC]

Logical names and their equivalence name strings
can each have as many as 255 characters. A logical
name can form all or part of a file specification. If only
part of a file specification is a logical name, it must be
the leftmost part of the file specification, and it must
be terminated with a colon, as in this example:

      $ DELETE MYDIR:OLD_DATA.DAT;1

A logical name also may be defined to equate to
another logical name, up to a limit of 10 levels.
                             6-1

-------
LOGICAL NAME
TABLES
DISPLAYING
LOGICAL NAMES
Logical names are stored in four logical name tables
which determine who can use them:

    •   Process logical names are available only to
       the process that defined them.

    •   Job logical names can be used by your proc-
       ess and its subprocesses.

    •   Group logical names can be used by all users
       in the same UIC group as the process that
       defined them.

    •   System logical names are accessible by all
       processes on the system.

The privileges GRPNAM and SYSNAM are neces-
sary to make entries in the Group and System logical
name tables, respectively.

The SHOW LOGICAL command will display the
contents of the Process, Group, and System logical
name tables.  You can use this command  with a
qualifier to display the entries in a particular table
(e.g., SHOW LOGICAL/PROCESS  to show those
logical names defined for your process). You can also
show individual logical names.  For example:
       t SHOW LOGICAL MYDIR
       TIYDIR-=$2$DUA62lABCr (Process)
                              6-2

-------
SYMBOLS         A symbol allows you to assign a short name to a
                   character string, numeric value or DCL command
                   string.  Symbols are often used  to redefine DCL
                   commands, based on personal preferences.

                   For example, the DIRECTORY command, when used
                   without any qualifiers, does not provide a very useful
                   listing of your files. It lists them horizontally, which
                   is difficult to read, and no extra information is pro-
                   vided. A much more informative listing is produced
                   by the following command:

                         DIRECTORY/SIZE/DATE

                   But this  command requires  more effort to type.
                   However, you could assign this command string to a
                   very short symbol, 'DSD' for example, that produces
                   the same result when entered as a command:

                         $ DSD=="DIRECTORY/SIZE/DATE"

                   The DIRECTORY/SIZE/DATE command could then
                   be issued simply by typing DSD.

            ป      The double equal signs indicate that the symbol will
                   be globally defined.

                   You can use this technique to create customized
                   commands. By placing the assignment statements in
                   your LOGIN.COM command procedure, the symbols
                   will be set up every time you log in.

                   Symbols are also used as variables within command
                   procedures as in the following examples:
                             6-3

-------
                           $ NAME = "BOB SMITH

                           $X = 5

                               = X+10
                    The single equal sign indicates that the symbol will
                    be  locally defined,  available only to  the current
                    command level (in this case, the  command proce-
                    dure).

                    A symbol's value may be displayed by  using the
                    SHOW SYMBOL command, as shown in the follow-
                    ing example:
'   /  $ SHOW SYM DSD
|      DSD="DIRECTORY/SIZE/DATEP

I   I  t SHOW SYM X
      X-15  HEX-OOOOOOOF OCTAL-00000000017
                                6-4

-------
SECTION 7
COMMAND PROCEDURES &
BATCH JOBS
COMMAND
PROCEDURES
A command procedure is simply a file containing a
sequence of DCL commands which can be executed
interactively or as a batch job. A command procedure
can save you time and keystrokes by allowing you to
execute a complicated or repetitive series of tasks
with a single command. However, a command proce-
dure  may be more than just a list of commands.
Various  functions, labels, symbols and relational
operators may also be used to create a program that
can use logic, prompt you for input at your terminal,
and extract and pass information.

When you create a command procedure with the text
editor, the following rules must be observed:

   •  The standard naming convention for a com-
      mand procedure is "procedure-name.COM".
      If you choose not to use COM for the file type,
      you must specify the file type when executing
      it.

   •  Each command line of a command procedure
      (and lines left blank) must start with a "$".

   •  Command lines may be continued on the next
      line. End the first line with a hyphen (-), and
      start the continued line without a $.

   •  An exclamation point (!) is used to include a
      comment.  Everything to the right  of the
      exclamation pointis ignored by the command
      interpreter.
                             7-1

-------
The following is an example of a simple command
procedure named RUNREPORT.COM:

$!   Th I s command procedure will comp 11 e, 1 i nk,
$!   and run REPORT.FOR
$
$!   Change default directory
$!   SET DEFAULT [ABC.FORTRAN_PROGRAMS]
$'   Compile the program
$   FORTRAN REPORT
$
$ i  Link the program
$  LINK REPORT
$
$ i  Run the program
$  RUN REPORT
$
$ i  Change the default directory back
$  SET DEFAULT [ABC]
$
$  EXIT

Execute a command procedure by typing its name
preceded by  an at sign (ฉ). For example, to execute
RUNREPORT.COM, you would issue the following
command:

       $ ฉRUNREPORT

For command procedures that you execute often, you
may wish to define a symbol that will allow you to
execute the procedure without the ฎ. For example:

       $ RUNREP=="@RUNREPORTn

Now, typing the command RUNREP will produce the
same result as ฉRUNREPORT.
           7-2

-------
LOGIN
COMMAND
PROCEDURE
When you log on to the VAX (either interactively or as
a batch job), the system checks to see if you have a
special command procedure called LOGIN.COM in
your root directory.  If it exists, the system executes
it as the last part of the logon process. This allows you
to automatically set up symbols, define logicals, set
terminal characteristics, or perform any other task
that you would like to have done every time that you
log on. All new users on the VAX Cluster are provided
with a sample LOGIN.COM file to get started.

The following sample LOGIN.COM file illustrates
some of the commands you may want to include in
your file:
                     !  SAMPLE LOGIN.COM COMMAND PROCEDURE

                     !  Check to see If this is a batch job and exit if it is.
                     IF FSMODEO .NES. "INTERACTIVE" THEN EXIT

                     !  Commands above this point will execute during
                     ! both batch and interactive logins; those below
                     ! will execute only during interactive logins

                     !  Set the DCL prompt
                     SET  PROMPT="VAX>"

                     !  Set the terminal type
                     SET TERMINAL/VT100/LINE_EDIT/INSERT

                     !  Set up command symbols
                     USER5=="SHOW USERS"
                     EVE=="EDIT/TPU"
                     DIR=="DIR/DATE/SIZE/PROT"
                     RUNREP=="@RUNREPORT"
                     EXIT
                              7-3

-------
BATCH JOBS
BATCH QUEUES
When you execute a program or command procedure
interactively, your terminal is tied up until it com-
pletes.  This can be inconvenient (as well as expen-
sive) when running  a program or  procedure that
requires a long time  to complete. Such a task is a
candidate for batch mode. A batch job is simply a
command procedure that is running in a queue in the
"background"5 independent of your terminal session.

Several different batch queues are available on the
VAX Cluster. They differ with regard to their priori-
ties, CPU limits, and the processor on which their
jobs run.  You can display the batch job queues that
are currently set up on the cluster by typing the
following command:

       $ SHOW QUEUE/BATCH

Batch job queue names begin with NORM, FAST, or
SLOW indicating their relative priority:
                   Speed   Priority      Cost*

                   FAST      3         2x
                   NORM      2         Ix
                   SLOW      1         -5x
                                  CPU Limit

                                  5 minutes
                                  180 minutes
                                  Unlimited
                          *Cost as a factor of interactive CPU cost.

                   Note that interactive sessions run at priority 4 with
                   a CPU limit of 20 minutes.

                   The remainder of the name indicates the node on
                   which the queue's jobs run, such as the following:
                               7-4

-------
BATCH JOB
ACCOUNTING
SUBMITTING A
BATCH JOB
                       Queue Name Ending

                            _GEN1

                            _GEN2

                            _MOD1

                            _MOD2
                                Node

                              VAXTM1

                              CASTOR

                              NCCORD

                              HYDRA
 Batch jobs are charged to your project code, just as
 interactive sessions are. If you have only one project
 code, you do not need to specify it in the job. If you
 have multiple projects, you may specify one as a
 comment in the first line of your job, as in  the
 following example:

       $!ABCD0001

 Otherwise, the system will charge one of your proj-
 ects by default.

 The SUBMIT command is used to enter a job in a
 batch queue. The format is as follows:

       SUBMIT filename

 For example:

       $ SUBMIT SASRUN.COM

 If no queue is specified, the job goes into the queue
 defined by the logical name SYS$BATCH. For most
 users, this is NORM_GEN1. If you want to place the
job in a different queue, you must specify it in the
 SUBMIT command.  In the following command the
job was placed in the SLOW queue:
                            7-5

-------
$ SUBMIT/QUEUE=SLOW_GEN1 SASRUN.COM

You will receive a message confirming that the job
was submitted and informing you of its queue entry
number.

A log file (filename.LOG) will be created in your root
directory. This log will document everything the job
does and can be very helpful in diagnosing errors.
However, by default, the log file is printed and de-
leted when the job completes.  The printed log will
NOT have the routing information (bin number) on it
necessary to deliver it to you. So, use the /NOPRINT
qualifier to retain the log until you are sure you have
no need for it.

Some useful qualifiers are as follows:

/NOTIFY         Sends a message to your termi-
                 nal when the job finishes.

/NOPRINT        Prevents the log file from being
                 printed and deleted.

/AFTER=time     Causes the job to be held in the
                 queue until the time you specify.

/LOG=filename    Allows you to define an alternate
                 log file name.

You can display status information about the queue
and your job by issuing the following command:

       $ SHOW QUEUE/ALL/FULL queue-name

An example follows:
           7-6

-------
f
$ SHOW QUEUE/ALL/FULL NORM-GENl
Batch queue NORM.GEN I. on VAXTM1
    /BASE-PRIORITY-2  /CPIMAXIMUM-030000 /JOB-LIMIT'S /OWNER-[SYSTEM]
/PROTECTION-(SE.O-D,GR,WW) /WSEXTENT-4096  /WQUOTA-1024
       Jobname
       SASRUN
                Usemame
                ABC
Entry
  382
Status
Executing
         Submitted21-JUL-1989 0906 /KEEP /NOTIFY /PRIORITY-IOO
         File  _$2JDUA1 [ABC]SASRUNCOM,6  (executing)
                                       7-7

-------
SECTION 8     EDITING FILES
EDT EDITOR
Similar to a word processor, a text editor is used to
enter text from your terminal into a newly created file
or to make changes to an existing file. You can use an
editor to create programs, data files, macros, letters,
etc. There are two editors available to you on the VAX
Cluster—EDT and EVE.  Try them both, and then
decide which one best suits your type of work.

The EDT editor is the standard text editor on DEC
VAX/VMS computers. It can be used in keypad mode
(full-screen editing, using the numeric keypad to
enter commands) with DEC VTxxx series terminals
as well as line mode from hardcopy terminals. EDT
has the following features:

    •   Allows you to work with several files simulta-
       neously.

    •   Gives you the ability to redefine your func-
       tion keys.

    •   Provides a mechanism to recover from sys-
       tem failures that would otherwise cause you
       to lose your file.

An online tutorial on the EDT editor is available on
the VAX Cluster by typing the following command:

       $ TUTOR

The course covers all features of EDT in a comprehen-
sive, easy-to-understand format.
                             8-1

-------
                   The EDT editor can be invoked with one of the
                   following commands:

                         $ EDIT/EOT filename

                   or

                         $ EDIT filename

                   or

                         $ EDT filename

                   When invoked, EDT is in line editing mode (indicated
                   by the asterisk prompt). If you need to use line mode,
                   enter the command  HELP for information on line
                   mode commands.

                   To change to the more versatile keypad mode, enter
                   the following command to be ready to begin full-
                   screen editing:

                         CHANGE

                   When you  are finished editing, exit from keypad
                   mode back to the * prompt by typing Ctrl-Z and
                   typing one of the following:

                         EXIT  Takes you out of EDT and saves the
                                contents of the file.

                         QUIT  Takes you out of EDT without saving
                                the file.

COMMANDS       While in a keypad mode editing session, you may
                   enter EDT commands  in two ways. The most effi-
                   cient is to use the functions assigned to the numeric
                   keypad.  Most keys have two functions:  a primary
                              8-2

-------
function invoked by simply pressing the key, and an
alternate one invoked by first pressing the Gold key
(PF1).  After pressing the Gold key, the next key
pressed will execute its alternate command. The PF2
key's function is help. Press it to display the keypad
map.

The following drawings depict  the keypads for the
VT100 and the VT200 using the EDT editor.
           8-3

-------
        VT100 EOT KEYPAD
        ^  '
 t  -    I
DOWN
                       LEFT
                     RIGHT
  PAGE

COMMAND
ADVANCE

 BOTTOKI
^	>

 1 WORD

tCHNGCASE
  HELP

^	.

8 SECT

  nu
^	^
5     >
 BACKUP

 TOP
ซ*	^>
f    ~^\
2 EOL
                  r PF3
                    FNDNXT
                     FIND
       APPEND
                 PF4
                 DELL

                 UNDL
                 DELW
                    CUT
                 DELC
      LINE

    OPEWL1N6
                  3 CHAR

                   SPECiNS
      SELECT
                 ENTER
                 SVBS
                 8-4

-------
              VT200 EOT KEYPAD
            DO
FIND ^/INSERTHERB fREMOVE
             NXTSCRN
      PRESCR   HEX SCR
                       8-5

-------
EDT RECOVERY
FEATURE
EDT STARTUP
COMMAND FILE
You may also enter line mode commands while in
keypad mode. The GOLD/7 function will prompt you
for a command.

While editing a file, EDT keeps a record of your
keystrokes, saving them in a journal file called
"filename. JOU". When you exit normally (with EXIT
or QUIT), the journal file is deleted. In the event of
a system crash or other abnormal termination, the
journal file is retained and can be used to recover the
edit session. In that case, invoke EDT again with the
following command:

       EDIT/RECOVER filename

EDT will rebuild the file, and you can continue your
editing session from the point at which it was inter-
rupted.

When invoked, EDT checks your default directory fo
a startup command file called EDTINI.EDT.  If it
finds it, the file is executed immediately. You can use
this file to direct EDT to automatically change to
keypad mode, set tab stops, set margins, or execute
any line mode commands you wish. The following is
an example of a startup file:

       SET MODE CHANGE
       SET QUIET
       SET WRAP 70

This file would change you to keypad mode automati-
cally, silence the bell that  normally accompanies
error messages, and enable word wrapping at screen
position 70.

For more information on the EDT editor, see the VAX
EDT Reference Manual.
                              8-6

-------
EXTENSIBLE      EVE (Extensible VAX Editor) is an editing interface
VAX EDITOR      to the VAX Text Processing Utility (VAXTPU).  Its
(EVE)             capabilities and operation are similar to those of
                   keypad mode EDT, but it includes several unique
                   features such as the following:

                       •   Split-screen editing.

                       •   Insert and overstrike mode.

                       •   Ability to execute DCL commands without
                          leaving the editor.

                   As with EOT, EVE HELP can be accessed with the
                   PF2 key.

                   The command to invoke EVE is as follows:

                          EDIT/TPU filename

                   For easiest access, you should include the following
                   command in your LOGIN.COM file:

                          $ EVE=="EDIT/TPU"

                   This will allow you to invoke the editor by simply
                   typing EVE.

                   To terminate EVE and save your edited text, use
                   either of the following:

                          Ctrl-Z

                   or

                          Prees the DO key (see the keypad diagram
                          following) and type EXIT.
                             8-7

-------
COMMANDS
      To terminate without saving, use the following se-
      quence:

            Press the DO key and type QUIT.

      Enter EVE commands using the keypad edit keys or
      the DO key and a command.

      The following drawings depict the keypads for the
      VT100 and the VT200 using the EVE editor.


      VT100 EVE  KEYPAD
Backspace
Ctrl-B
Clrl-E
Ctrl-K
Ctrl-R
Start of line
Recall
End of line
Learn
Remember
Ctrl-U
Ctrl-V
Ctrl-W
Ctrl-Z
Erase to start of line
Quote
Refresh
Exit
                              8-8

-------
VT200 EVE KEYPAD
                               DO

Note that the VT200 numeric keypad can function
like the one on the VT100 with the following com-
mand:

      $ SET KEYPAD VT100
         8-9

-------
The keypad allows you to perform many useful func-
tions including the following:

   a.  Move Cursor. The cursor may be moved by
       character or by line using the keypad.  The
       NEXT SCREEN and PREV SCREEN keys
       allow you to page through a file in either
       direction.

   b.  Cut and Paste. Blocks of text may be moved
       from one location in a file to another (or even
       from one file to another). The procedure is as
       follows:

       1.  Press the SELECT key and move the
          cursor to highlight the text to be moved.

       2.  Press the REMOVE key  to delete the
          text.

       3.  Move the cursor to the desired location
          and press the INSERT HERE key to
          restore the text.

   c.  Insert and Overstrike. You may toggle be-
       tween insert and overstrike mode by press-
       ing the INSERT-OVERSTR key.  Note  that
       the status line at the bottom of the screen
       displays the current mode.
           8-10

-------
MULTIPLE FILE
EDITING
                      d. Find Text.  Pressing the FIND key causes
                         EVE to prompt for the text string to be found.
                         Type in the text and press RETURN.  EVE
                         will position the cursor at the next occur-
                         rence of that text. The direction of search is
                         determined by the FORWARD-REVERSE
                         key; the current direction is displayed on
                         the status line. To search again for the same
                         text, press the FIND key twice.

                      e. Get Help. Pressing the HELP key displays
                         a map of the keypad and allows you to access
                         help for a key function by then pressing that
                         key.

                   Pressing the DO key causes EVE to prompt for a
                   command. Some examples of commands that may be
                   entered in this manner are as follows:
                   TOP
                   BOTTOM

                   MARK
                   GOTO
                   SET LEFT
                   (or RIGHT)
                   MARGIN
             Moves cursor to the top or bottom of
             the file.

             Marks current cursor location with
             an invisible label. Cursor may be re-
             turned to this location using GO TO
             command.

             Resets margins.
DEFINE KEY Assigns an EVE command to a single
             key or control key sequence.

EVE allows you to edit two or more files during an
edit session. This is especially useful if you want to
copy text from one file to another. The procedure is
as follows:
                             8-11

-------
       Action

Edit the first file.

Get command prompt.

Create new buffer.
   Command

$EDIT/TPUfilel.txt

Press the DO key.

GETFILEfile2.txt.
You are now editing file2.txt.  To change back to
filel.txt, use the following procedure:
       Action

Get command prompt.

Switch to filel.txt buffer.
   Command

Press the DO key.

BUFFERfilel.txt
To view what buffers have been created, use the
SHOW BUFFERS command.

It is also possible to view two or more files on your
screen simultaneously:
       Action

Edit the first file.

Get command prompt.

Split the screen into two
sections; each contains
a copy offilel.txt.

Get command prompt.

Display file2.txt in the
current window.
   Command

$EDIT/TPUfilel.txt

Press the DO key.

SPLIT WINDOW



Press the DO key.

GET FILE file2.txt
           8-12

-------
EVE RECOVERY
FEATURE
USING DCL
COMMANDS
FROM EVE
         MORE |
         INFO
You now have both files displayed on your screen.
The command OTHER WINDOW will move you back
and forth between them.

Similar to EDT, EVE creates a temporary journal file
(named filename.TJL) in which all editing commands
are recorded. If the EVE session is interrupted, the
file changes  can be recovered by using the /RE-
COVER qualifier as follows:

      $ EVE/RECOVER filename

Some of the last few keystrokes will be missing due
to EVE's storage system.

You may execute a DCL command without leaving
the EVE editor by pressing the DO key and entering
the following:

      DCL command-name

EVE will create a buffer and open a window on the
screen to display the command and its output.  You
may then move the cursor to the  DCL window and
copy text from the command output to the file you are
editing.

For more information on these and other EVE fea-
tures, consult the DEC VAX Text  Processing Utility
Manual.
                             8-13

-------
SECTION 9     VAX VMS UTILITIES
MAIL
INVOKING MAIL
COMMANDS
The VAX has its own electronic mail system (not to be
confused with the EPA's EMAIL system) that allows
you to send and receive messages from other users on
the VAX Cluster, as well as from other users on other
DECnet nodes. When you receive a mail message,
you are notified immediately at your terminal (or at
your next logon, if you are not logged on at the time).

To access the MAIL utility, type the following com-
mand at the DCL prompt:

       MAIL

Your prompt will change to MAIL> which indicates
that you are now executing the MAIL utility.

The command EXIT (or Ctrl-Z) will exit MAIL.

MAIL has its own HELP facility; use the HELP
command for complete details on all the commands
available to you. Some of the most common are as
follows:

Like DCL, MAIL commands can be shortened to four
letters, if desired.
                  Command
                   Function
                  DIRECTORY Displays a numbered list of the mes-
                               sages in the current folder. Includes
                               date, sender, and subject.

                  READ #      Displays a specified mail message
                               number. If no number is given, READ
                               displays the oldest message in the
                               folder.
                             9-1

-------
SENDING A MAIL
MESSAGE
Command           Function

SEND        Sends a message to another user.

FORWARD   Forwards a copy of the message just
             read to another user.

REPLY      Sends a message to the sender of the
             message just read.

DELETE     Deletes the most recently read mes-
             sage.  DELETE # deletes a specified
             message number.

EXTRACT    Copies the message just read into an
             ordinary file.

To send another user a message, invoke MAIL and
enter the command SEND at the prompt. MAIL will
then prompt you for the username of the recipient,
the subject of the message, and the message text.
When you enter the  text of your message, press
RETURN at the end of each line.

You cannot go back and change a line after pressing
RETURN.

When you have completed the text, press Ctrl-Z to
send the message or Ctrl-C to abort it.

An example follows:
                             9-2

-------
     SMAIL
     MAIL'SEND
     To Kyz
     Sub]  mall utility test

     Enter your message below Press CTRL/Z when complete, or CTRL/C to quit

     This is a test of the MAIL utility
READING A MAIL  To read a message, invoke the MAIL utility and enter
MESSAGE         the following command:

                         MAIL>READ #

                   Where # is a  message  number, as shown by the
                   DIRECTORY command. If no number is given, the
                   oldest message is displayed.
                   READ is the default command; therefore, you may
                   just press RETURN at the MAIL> prompt.

                   For more information about using the MAIL utility,
                   see the following online documentation:

                         USERGUIDE:MAIL.DOC

                   The PHONE utility allows you to simulate an inter-
                   active telephone conversation between 2-5 other users.
                   All parties simultaneously see what the others are
                   typing.

                   To access the PHONE utility,  type the following
                   command at the DCL prompt:

                         PHONE
         MORE
         INFO
PHONE
INVOKING THE
PHONE UTILITY
                             9-3

-------
                  Your terminal will respond by splitting the screen
                  and leaving the cursor at the % prompt.

            ป     The PHONE utility is available only on a full-screen
                  terminal such as the VT100.

COMMANDS      To access the PHONE utility's own HELP facility,
                  type HELP at the % prompt.

                  Some of the most common commands are as follows:

                  Command               Function

                  ANSWER    Answers the phone when you receive
                               a call.

                  DIRECTORY Lists users available on the system.

                  DIAL        Calls another user.
                  or PHONE

                  FACSIMILE  Allows users to include file contents
                               in the telephone conversation.

                  HELP       Di splays information on the PHONE
                               utility.

                  MAIL        Mails a short  message to another
                               user.

                  HOLD       Places caller on hold (or releases
                  or UNHOLD  them).
                   HANGUP     Disconnects all current links with-
                                out exiting the PHONE utility.
                              9-4

-------
Command                Function

EXIT        Executes HANGUP and exits the
             PHONE utility.

Ctrl-G       Rings the bell of all users in conver-
             sation.

Ctrl-L       Clears the view port.

Ctrl-W       Refreshes the screen.

Ctrl-Z       Hangs up.

For example, after invoking the PHONE utility, you
can call another user with the following command:

       % DIAL xyz

Or, if someone is ringingyou, reply with the following
command:

       % ANSWER

When a connection is established, the caller can type
on his screen, and the text will simultaneously be
displayed on the answering user's screen.
           9-5

-------
               The PHONE screen display is as follows:
                                               23-Auo-1939
i
                        VAXTM1 xyz

This is a test User xyz is calling user abc
                        VAXTM1 abc

This Is the same test User abc Is logged on to the VAX and Is answering user xyz
               To return to the command line, type %. Prom the
               command line, you can add other users to the conver-
               sation (DIAL), include the contents of a file (FAC-
               SIMILE), HANGUP, or EXIT.

               If you do not want your terminal session to be dis-
               turbed by PHONE or MAIL messages, enter the
               following command at the DCL prompt:

                      $ SET TERM/NOBROADCAST
                           9-6

-------
BACKUP          The VMS BACKUP utility is used for making backup
                   copies of files. A backup may be made to disk, but it
                   is usually made to tape, often for purposes of trans-
                   porting the files to another system. One advantage of
                   using BACKUP instead of COPY is that BACKUP
                   will preserve and reproduce the directory structure of
                   saved files. When backing up to tape, files are stored
                   in a special format called a "saveset" which can only
                   be read with the BACKUP utility.

                   The basic format of the command is as follows:

                         BACKUP input/qual output/qual

                   The BACKUP utility determines that it is to perform
                   a save, restore, or copy operation based on the devices
                   and qualifiers used in the above command.

            ป      Important: Tape use on the VAX Cluster is con-
                   trolled by the TAPESYS tape management system.
                   TAPESYS automates the use of the BACKUP utility
                   (with regard to tape backups) through various com-
                   mands and menu screens.  In most cases, its use is
                   considered preferable to issuing the BACKUP
                   command directly.   Outside of TAPESYS, the
                   BACKUP utility can, under certain circumstances,
                   generate misleading operator requests that may re-
                   sult in data loss.  TAPESYS offers significant secu-
                   rity advantages, and its use is strongly encouraged.

                   One exception to this is the case where you may need
                   to read a BACKUP tape that was created on another
                   VAX system.  TAPESYS cannot be used to restore
                   files from such a tape  because it always uses the
                   qualifier a/OWNER=ORIGINAL"  on its BACKUP
                   command, which  requires that you be the owner of
                   the file you are restoring.  Such a tape must be read
                             9-7

-------
                   without using TAPESYS. Contact User Support for
                   assistance.

                   For more information on backing up and restoring
                   files from tape, see the chapter in this document
                   entitled TAPE MANAGEMENT.

                   For more information on the BACKUP utility, type
                   HELP BACKUP at the DCL prompt, or see the VMS
                   BACKUP Utility Manual.

LIBRARIAN       The LIBRARIAN utility is used to  maintain and
                   access libraries which are indexed files containing
                   frequently used code or text modules. There are five
                   types of libraries:

                   HELP (file type HLB). Contains modules that pro-
                   vide information about editors, programs, utilities,
                   etc.

                   MACRO (file type MLB).  Contains macro defini-
                   tions used as input to the Assembler whenever the
                   Assembler encounters a macro not defined in  a
                   source program.

                   OBJECT(file type OLE). Containsfrequently called
                   routines used as Linker input The Linker searches
                   the object module library if it encounters a reference
                   that it cannot resolve from the input file(s).

                   SHAREABLE IMAGE (file type OLE).  Contains
                   the symbol tables of shareable images used as Linker
                   input.

                   TEXT (file type TLB). Can contain  any sequential
                   record files that are retrieved as data for programs.
                              9-8

-------
                    The LIBRARY command, with various  command
                    qualifiers, can be used to create, delete,  or modify
                    libraries, and to insert, delete, extract, and list li-
                    brary modules and symbols. The basic format of the
                    LIBRARY command is as follows:

                           $ LIBRARY/qual lib-filename input-filename

                    Where:

                    /qual(ifiers) are functions to be performed.  More
                    than one, if compatible, can be designated.

                    lib(rary)-filename is the name of the library to be
                    created or maintained.

                    input-filename is the name of the file containing
                    modules to be inserted in the specified library.

                    For complete information on LIBRARIAN, see the
                    VMS LIBRARIAN Utility Manual.

SORT              The SORT utility sorts records in input files based on
                    the fields defined in the SORT command and gener-
                    ates a reordered output file.  Unless specified other-
                    wise, the entire record will be sorted as a whole. By
                    using qualifiers, you can select complex sort specifi-
                    cations.

                    The format of the SORT command is as follows:

                          SORT/qualifiers input-file output-file
                              9-9

-------
Some useful qualifiers are as follows:

/KEY=(POSITION:n,SIZE:n) Specifies the starting
position of the field that the file is to be sorted on and
the size of that field.

/KEY=(...,ASCENDING) Will sort in ascending or-
der.

/KEY=(...,DESCENDING) Will sort in descending
order.

/[NO]DUPLICATES By default SORT will keep rec-
ords with duplicate keys.

In the following example, the file DATA1.LIS is
sorted on the first eight characters of each record and
output to DATA2.LIS:

       $ SORT/KEY=(POSITION:1,SIZE:8)-
       _$ DATA1.LIS DATA2.LIS

In the next example, the file STAT.LIS is sorted in
ascending order on the characters from position 8 to
position 27 and output to STAT2.LIS:

       $ SORT/KEY=(POS:8,SIZ=20t-
       _$ ASCENDING) STAT.LIS STAT2.LIS

In the next example, the entire personnel record file
is sorted and duplicate records are eliminated in the
output file:

       $ SORT/NODUPLICATES-
        $ PERSONNEL.DAT-
        $ PERSONNEL2.DAT
           9-10

-------
         MORE
         INFO
DIGITAL
STANDARD
RUNOFF (DSR)
 NCC-SUPPLJDED
 UTILITIES
For more information on the SORT utility, see the
VMS SORT/MERGE Utility Manual.

Digital Standard Runoff (DSR or RUNOFF) is a text
formatting utility that can assist you in creating a
formatted document, including a table of contents
and index. A text editor is used to create a file; then
RUNOFF is invoked to process it and format the text.
The formatted file can then be printed using the DCL
PRINT command.  DSR commands specify the for-
mat of text (size of pages, right justification, line
spacing, etc.). Flags emphasize text through special
characters such as  capital letters, spacing of text,
and others. The DCL command RUNOFF processes
the file and controls certain characteristics of the file.
The table of contents and index utilities provide a
quick method to create both.

A DSR command always begins with a control flag (.)
which must be in column 1 of a line unless it follows
another command in the same line. Multiple com-
mands on the same lines are permitted. A keyword
follows the flag to specify the function. Arguments
can follow certain functions and are separated  by
commas or spaces.  A terminator (;) ends the com-
mand or string of commands.

For more information, see the VAX Digital Standard
Runoff Reference Manual.

The utilities described below are not part of the VAX
VMS operating system. They have been created by
NCC User Support and Technical Services to assist
you with certain common tasks. To use the utilities,
type the utility name as a command at the DCL
prompt.
                              9-11

-------
ABI
(ARCHIVE/
BACKUP
INQUIRY)
ABR
(ARCHIVE/
BACKUP
RECOVERY)
ARCHIVE
AUTOPRINT


EMAIL



IBMSUBMIT
Although all these utilities are available to all users,
some commands may not work for you if you have
defined symbols using the same names.

ABI is used to locate files stored on the mandatory
archive and incremental system backup tapes. It is
simply an automated method of performing the TAPE
REPORT command. The report it produces can be
sent to your terminal, a file, or both. The information
in this report can then be used to request file recov-
ery (see Archive/Backup Recovery).  Detailed help
text is available within the utility.

ABR is used to request the recovery of a file from
archive or incremental backups.  You must supply
the file name, tape reel number, and saveset name
(information which may be obtained with ABI). The
ABR function is the same as that performed by the
TAPE RESTORE command and the TMENU restore
screen.

ARCHIVE is a utility that allows you to easily re-
quest files to be archived to system tape for 2 years
("standby archive"). Detailed help text is available
within the utility.

AUTOPRINT is a generic print utility used to assist
users in printing files on the VAX system printer.

EMAIL  allows you to access the  electronic mail
system at EPA. See the Email section of this manual
for detailed instructions on using Email.

IBMSUBMIT is a utility for submitting a batch job to
the IBM 3090 system. It prompts you for the name
of the file to be submitted and your VAX password
                             9-12

-------

LASERPRINT
MEMO


OPERATION.
SCHEDULE

PROTECT


SCRATCH



TUTOR
which it uses in an access control string to execute a
SUBMIT/SNA command. It uses the /NOLOG quali-
fier for security purposes.

IBMSUBMIT should not be used when submitting a
file containing records longer than 80 characters or
in cases where you want a log file.

For more information on IBMSUBMIT, see the fol-
lowing online documentation:

       USERGUIDEIBMJOBSUBMIT.DOC

LASERPRINT allows you to quickly and easily print
a file on the IBM system's laser printer. You must
have a valid IBM User-ID in order to use this utility.
You can specify your choice of form, the number of
copies,  and whether or  not to burst the resultant
printout.

MEMO is a menu-driven facility for accessing VAX-
related NCC User Memos.

OPERATION.SCHEDULE displays the VAX Clus-
ter operating schedule for the current week.

PROTECT will assist you in checking and changing
file protection levels.

SCRATCH displays status information about the
system scratch packs (WORK_SCRATCH) including
space available and clean-up  schedule.

TUTOR invokes online VMS and EOT tutorials.
                            9-13

-------
 SECTION 10    TAPE MANAGEMENT
TAPES AT NCC
VAX SYSTEM
TAPES
 FOREIGN TAPES
        I'.V.VJ
Tapes are most frequently used to either back up data
for safekeeping or to facilitate the transfer of data to
other sites.  Extremely large files that are used
infrequently may also be best stored on tape. Data
Processing Support Services maintains a supply of 9-
track, 6250 bpi magnetic tapes for general use. These
tapes are considered standard at the NCC.

Tapes are identified by a 6-digit number assigned to
them and are  classified as system, foreign, or alien.

System tapes are owned by the NCC and assigned to
users for use  on a particular system. VAX system
tapes are currently identified by the volume numbers
099000 and higher. A system tape has an internal
label identical to its volume number (i.e., tape 099123
has an internal label of 099123). A system tape may
not be  removed from the data center unless you
choose to purchase  it (at which point it  becomes a
foreign tape).

DPSS defines foreign tapes as those tapes not perma-
nently stored in the NCC tape library. This category
includes tapes brought in from other computer sites
for processing at the NCC, as well as tapes that have
been purchased from DPSS.  Foreign tapes are also
referred to as  B-tapes because they are identified by
a number prefixed with the letter "B".

If you want to  process a tape that you have created on
another system, send it to DPSS:

       Data Processing Support Services
       EPA-NCC
       MD-24
       Research Triangle Park, NC  27711
                               10-1

-------
                   Your tape must have an identification sticker on it
                   that provides the following information:

                          User name
                          User-ID
                          Account number
                          Telephone number
                          Bin number or mailing address
                          Volume serial number or original reel
                                 identification

                   You must also inform DPSS if you want the tape to be
                   write-enabled.  DPSS will notify you when your tape
                   has been received and is available for use and will
                   inform you of  the B-number that you will use to
                   reference it. B-numbers are of the following format:

                          Bxnnnn

                   Where x=0 for  IBM or 2 for VAX and where nnnn is
                   the slot number.  However, you may use a B-tape on
                   its non-resident system as well.

                   You can release a B-tape by either picking it up at
                   DPSS or by calling and requesting that it be mailed
                   to you. In no case can a B-tape be stored at the NGC
                   for more than 90 days. After 90 days, such tapes are
                   automatically  released and returned to the owner.
                   Data that is needed fer longer periods should be
                   copied to system  tapes or disk.

ALIEN TAPES      An alien tape is an NCC system tape that is tempo-
                   rarily being used on the opposite system (i.e., a VAX
                   tape being used on the IBM or vice versa). You must
                   contact DPSS  ahead of time to request that such a
                   tape be made  available to the other system. After
                   DPSS verifies  the tape's ownership, they will write-
                   protect the tape and move it to a staging area for the
                               10-2

-------
                   system that is to read it. At the end of the day, the
                   tape will be returned to its native system without the
                   write ring.

DPSS TAPE       Tape Cleaning. DPSS has three cleaner/evaluators
SERVICES        for magnetic tapes. Tapes are cleaned and/or evalu-
                   ated by user  request or as needed,  based on an
                   established set of standards.

                   Tape Degaussing. A tape degausser is a device that
                   passes magnetic tape through a strong magnetic field
                   thereby erasing any information recorded on it, in-
                   cluding any labels and header information  This
                   device ensures an erasure level of not less than 80
                   decibels; normal computer tape recording levels are
                   between 50 and 60  decibels.   This  erasure level
                   complies with the requirements of the Privacy Act of
                   1964 and meets National Security Agency standards.
                   The degausser will erase a 2400-foot reel of computer
                   tape in about 15 seconds.

                   Monthly Foreign Tape Report. Users who have
                   foreign tapes registered in the NCC Tape Library are
                   sent a monthly report  identifying these tapes and
                   their B-numbers.

                   Monthly TMS Tape Report. A report is sent to all
                   users who currently are assigned system tapes.  This
                   report provides the tape volume number, the date of
                   allocation, the scratch date and special notes text.

                   Tape Archiving. The NCC archival library is avail-
                   able for offsite storage of tapes containing data to be
                   retained indefinitely but with no immediate process-
                   ing requirement. A user may have a tape transferred
                   to (archived) or returned from (dearchived) the ar-
                   chive library by notifying DPSS. Advance notice of 24
                   hours is required for dearchival. You will be notified
                               10-3

-------
TAPESYS TAPE
MANAGEMENT
SYSTEM
VAX TAPE LABEL
POLICY
when the dearchived tape is onsite and available for
processing.

For information on tape-related charges, see the
following online documentation:

       USERGUIDE:CHARGES.DOC

Tape activities on the NCC VAX Cluster are accom-
plished through an automated tape management
system called TAPESYS. TAPESYS operations may
be performed in either of two ways:

   •   Menus are provided to automate certain
       commonly performed tasks such as backing
       up and restoring data from tapes. To access
       the menu system, type the following com-
       mand at the DCL prompt:

                   TMENU

   •   DCL-like commands can be used to perform
       the same operations as the tape menu sys-
       tem, and they may also be included in com-
       mand procedures. All  of these commands
       begin with the word TAPE.

An important feature of TAPESYS is the increased
security it provides tape users, thereby reducing the
risk of accidentally mounting and overwriting some-
one else's tape.  TAPESYS verifies that the tape
number requested for mounting matches the tape's
internal label. If they do not match, the operator will
be notified of the discrepancy, and TAPESYS will ask
him to either confirm or abort the mount. If the tape
involved is a VAX system tape (099000 or higher se-
ries), the mount request will be aborted.
                              10-4

-------
            ป      VAX tape policy requires that all such tapes have
                   matching internal and external labels.

                   However, the VAX VMS operating system will allow
                   you to overwrite a tape's label. Users should there-
                   fore exercise great care when performing tape opera-
                   tions that  could potentially alter the tape's label.
                   Non- VAX system tapes, such as B-tapes, are mounted
                   regardless of label status.  Users who  experience
                   problems mounting tapes should contact User Sup-
                   port for assistance.

TAPESYS          Allocate a new VAX system tape by  issuing  the
COMMANDS       following command:

                          $ TAPE ALLOCATE

                   TAPESYS  will then prompt you for three items:

                       1.  The quantity  of tapes desired. In most cases
                          you will reply with "1".  However, if the
                          amount of data you plan to put on tape is too
                          great to fit on a single reel, enter a larger
                          number.  TAPESYS will then allocate the
                          tapes as a volume set. This means the tapes
                          are logically linked in the TAPESYS library,
                          and the system  will automatically call for
                          subsequent tapes when used.

            ป      If you are not sure how many reels you will need, and
                   you intend to write files to the tape in VMS BACKUP
                   format, don't use TAPE ALLOCATE to obtain tapes
                   but instead use the FREE TAPE option of  the
                   TAPESYS backup menu, which will allocate as many
                   tapes as necessary to complete the job.
                              10-5

-------
MODIFYING
TAPE
INFORMATION
   2. Tape format.  Valid replies are BACKUP,
      LABELED,  UNLABELED,  ASCII,  and
      EBCDIC.   Usually you should choose
      BACKUP. Your choice has no physical effect
      on the tape you are allocating since all tapes
      are the same; however, its designated format
      will  be interpreted by TAPESYS for some
      backup and restore operations.

   3. Notes.  Up to 64 characters of text. Enter any
      information that will help you identify the
      use or contents of the tapes. (You will be able
      to reference this information online at any
      time without mounting the tape.)

The above information may also be provided all at
once along with the command, for example:

      $ TAPE ALLOCATE 1 BACKUP-
      _$ WATER PROJECT

TAPESYS will then assign a tape and display a
summary of information about it. The tape will be
pre-initialized with a density of 6250 and an internal
label identical to its external label (reel number).

The tape's scratch date will be set to 5 days from the
date of allocation, but it may be modified (see below).

You may change a tape's format, notes, and scratch
date at any time with the TAPE MODIFY command.
Use one of the following formats:

   TAPE MODIFY/FORMAT reel-# format

   TAPE MODIFY/NOTES reel-* notes

   TAPE MODIFY/SCRATCH reel* scratch-time
                             10-6

-------
INQUIRING
ABOUT YOUR
TAPES
FREEING TAPES
"Scratch-time" can be a specific date or a delta time,
in days, in the standard VMS date format.

In the following example, the scratch date is set to
January 1, 1990.

      $ TAPE MODIFY/SCRATCH 099000-
      _$ Ol-JAN-1990

In the next example, the scratch date is set to 30 days
from today.:

      $ TAPE MODIFY/SCRATCH 099000 "+30"

Several commands are available to provide informa-
tion about the tapes you currently own.

To obtain a detailed report about a specific tape, use
the following command:

      $ TAPE INQUIRE reel-id

To obtain a summary of all tapes you own, use the
following command:

      $ TAPE INQUIRE SUMMARY

To obtain a listing of your tapes in order of their
scheduled scratch dates, use the following command:

      $ TAPE INQUIRE FORECAST

A tape will be scratched automatically by TAPESYS
when its scratch date arrives. However, you may also
free a tape as soon as it is no longer needed by using
the following command:

      $ TAPE FREE reel-id
                             10-7

-------
BACKING UP
FILES TO TAPE
Since the NCC has a limited supply of tapes, you are
encouraged to release tapes as soon as possible to
avoid any shortages. In addition, you may be saving
yourself the cost of tape rental.

A common  use of tapes is to back up your disk files
using the VMS BACKUP utility. TAPESYS provides
an easy, automated method for backups using the
TAPESYS menus. TAPESYS takes care of allocating
a tape drive, loading the tape(s), and performing the
backup. When the job completes, you are notified via
MAIL and provided with a log file showing what was
done.
                     To begin  the process, type TMENU at the  DCL
                     prompt. The following TAPESYS main menu will be
                     displayed:
             TAPESVS V44I

        USER'S TAPE ACTIVITY MENU

       Backups              Reports

        Request a Backup via CRT
        Request a Restore via CRT
                        Commands
     S  inquire on a Specif fc Tape
     6  Modify a Scratch Date
     7  Modify Notes
     8  Free a Specific Tape (or Set)
             9  Inquire on All Owned Tapes
             10  List Tapes by Scratch Date
             II  List Files on Owned Tapes
             12  List Files on Sysmgr's Tapes
              T  Standard Tape Command
        Return to Entry Point
              Selection (type a number or letter)?
                                 10-8

-------
                 Choose Option 1, Request a Backup via CRT. The
                 following backup menu will be displayed:
                 SP3ZS TAPESYS V4 2 BACKUP MENU
  
Files to be included 


Files to be excluded 

Qualifiers
Date Options a*-Al}$-(98$ Q&$fr Reel ID Ffe$T8{*ฃ     Format
0  0 None     1  Created       Saveset $*Atf Bk Fct
   I Before   2  Modified         Time %            ^  Re Len
   2 Since    3  Expired        y ignore Locks?    * Verify Backup
             4  Backed up       ? Use/LOG?       * CRC enable?

Scratchdate  29-AUG-.98909560? ฐnllnereferenCe7
Size 2400  Density 6250  Pool     Media type 9TRACK
 Tape Notes
Licensed to Environmental Protection Agency - Durham, NC
                Use the tab key to move between the fields, filling in
                the blanks. The PF2 key can be used to get help with
                any item.  Most are already filled in with default
                values.  Critical information is the following:

                Files to be included.  Type in the name(s) of the
                file(s) you want to backup. Wildcards are acceptable
                (e.g., [xyz...] *.*;* to backup all your directories). You
                can enter up to 16 file specifications in this field.  (The
                window will scroll.)
                             10-9

-------
Files to be excluded.   List any files that are
included due to wildcards used above but which you
really do not want to be backed up.

Reel ID.  By default this fields says "Free Tape"
meaning that TAPESYS will allocate a tape(s) for
you to use in the backup operation. If you already
have a tape allocated that you would like to use, type
in its reel number instead. If you want to use a B-
tape, enter the word "FOREIGN" here.

Saveset. TAPESYS will offer a name composed of
the current date and time by default. You may want
to enter a different name to be used for the saveset on
the tape, e.g., MYFILES.BAK

Scratch date and Tape Notes. If you gave a reel-
ID, these fields already contain the information given
when the tape was allocated. If not, enter a scratch
date and whatever text you want to associate with
the tape.  If you entered "FOREIGN" for  the  reel
number, the notes field indicates a "private tape."
Blank that phrase out and enter the actual B-num-
ber.

When all fields are completed, press the RETURN key
to submit  your request.  TAPESYS will submit  a
batch job to perform the backup.   When it is  com-
pleted, you will receive a MAIL message informing
you of the job's status.

Backup commands may also be entered in command
form instead of through the TMENU. For instance,
you may want to issue a backup request from  a
command procedure. Then you would use the com-
mand with the following format:
           10-10

-------
                          $ TAPE BACKUP/qualifiers files

                   Where files is the list of files to be backed up and
                   qualifiers  include the  same parameters specified
                   through the menu:
                          /BAckup
                          /BEfore=time
                          /CRC
                          /CREated
                          /Density=density
                          /EXClude
                          /EXpired
                          /Fast
                          /INit
                          /Initialize
                           /Log
                           /Modified
                           /Owner_uic[=uic]
                           /Record
                           /Reel=reel-id
                           /SAve_set=save-set
                           /SCRAtch=time
                           /SINce=time
                           /SIze=reel-size
                           /Verify
RESTORING
FILES FROM
TAPE
TAPESYS also provides an automated method of
requesting the restoration of backed up files from
tape.

To begin the process,  type TMENU at the DCL
prompt (see screen depicted in discussion of back-
ups).

Choose Option 2, Request a Restore via CRT. The
following restore menu  will be displayed:
                             10-11

-------
J
i

\
                      SP3ZS TAPESY5 V4 2 RESTORE MENU
       

     Files to be restored (use down- and up-arrows to move about in window)
     * —  x ป ••"  •                                  ....... ......
     *
     I  ^     ^
     S* S VWl   ..... %

     Output me
     Duplicate file action       Reel * ^ .........  -  *'   Pos  "   '
     UJg 0 Report error, bomb   Saveset >*<*      "    ^;
        ] Make new version           BAC^Uft Format     Y ? Use /LOG?
        2 Overlay existing file        *    *  ' Blocking Fct^ ^  verify Restore
        3 Replace existing file        \       Rec Length  | Y ^ Check CRC
                                   o    ^           (Enter ~to abort,
                           V. \ Vป .. \   % ..  Vfc  ..   . V. ..
                      Use the tab key to move between the fields, filling in
                      the blanks. The PF2 key can be used to get help with
                      any item.  Critical information is the following:

                      Files to be restored. Enter the name(s) of the file(s)
                      you want to recover from tape.  Wildcards can be
                      used.

                      Output file. Indicate where the files are to be re-
                      stored to.  By default TAPESYS will complete the
                      item with the name of your current directory.
                                  10-12

-------
USING TAPES
INTERAC-
TIVELY
                  Reel #. Enter the reel number of the reel containing
                  the files.

                  Saveset.  Enter the name of the saveset containing
                  the files.

                  When all fields are completed, press the RETURN key
                  to submit your request.  TAPESYS will submit a
                  batch job  to perform the restore.  When it is com-
                  pleted, you will receive a MAIL message informing
                  you of the job's status.

                  Restore commands may also be entered in command
                  form instead of through the TMENU.  For instance,
                  you may  want  to issue  a restore request from a
                  command procedure. Then you would use the com-
                  mand with the following format:

                          $ TAPE RESTORE/qualifiers-
                         _$ reel-id saveset out-file

                  Where reel-id is the tape  number, saveset is the
                  backup saveset name, out-file is  the file name  to
                  which files will be restored, and qualifiers include
                  any of the following:
                         /Crc
                         /Log
                         /New_version
                         /OVerlay
                           /OWner_uic[=uic]
                           /REPlace
                           /Select=files
                           /Verify
At times, you may want to mount a tape for purposes
other than the backup and restore procedures de-
scribed above.  For example,  you might have a
FORTRAN program that requires the use of a tape.
Or you may need to read a tape received from another
                             10-13

-------
                site that was not written in BACKUP format. In this
                case, you must interactively request the tape to be
                loaded.

                First, allocate a tape drive to your process by using
                the following command:

                       $TAPE SELECT drive reel-id

                Where drive is a name of your choosing which will
                become a logical name for the tape drive you are
                assigned, and reel-id is the tape number of the tape
                you intend to mount.

                In the following example MYDRIVE indicates the
                drive name and 099123 is the reel-id:

                       $ TAPE SELECT MYDRIVE 099123

                TAPESYS  will recognize only VAX  system  tape
                numbers. If you are going to use a non-VAX system
                tape (such as a B-tape), specify the keyword BTAPE
                instead of the reel-ID.

                In the following example MYDRIVE indicates the
                drive name and BTAPE indicates that a foreign tape
                is to be used.

                       $ TAPE SELECT MYDRIVE BTAPE

                You will  then receive a message indicating that a
                tape drive has been allocated to you.  For example:
f t TAPE SaECT MYDRIVE 099123                                    I
1 SDCL-I-ALLOC._$3$MUA1 allocated                                  I
                           10-14

-------
               If all tape drives are in use, requests are answered in
               the order they were received, as drives become avail-
               able.

               After  allocating a drive, request that the operator
               load your tape with the following command:

                      $TAPE LOAD drive reel-id

               Where drive is the same name you specified in the
               TAPE SELECT command and reel-id is the  tape
               number. Specify a B-tape number here if applicable.

               If you want to write-enable the tape, add the qualifier
               /RING, as shown in the following example:

                      $ TAPE LOAD/RING MYDRIVE 099123

               Your terminal will display a message stating that the
               operator has been notified, and your  session will be
               suspended until the tape is loaded, as in the following
               example:
                                                            \
(TAPE LOAD/RING MYDRIVE 099123
CTAPE-I-OPRNOTIF, operatornotlf fed (I-AUG-1989 09 41 27)

i
!
I
58TAPE-I-REPLV, RS8RRSS8SSRR OPCOM  1- AUG- 1 989 09 44 57 88
Request 128260 was canceled
               The message, "Request n was cancelled", is normal.
               It indicates that your load request has been canceled
               because it was completed.
                          10-15

-------
              It is at this point that TAPE8YS verifies that the
              tape's  internal  label matches the volume you  re-
              quested.  If it does not, a message will appear re-
              questing the operator to respond to the discrepancy.
              The operator will either continue the load or abort it,
              depending on the type of tape involved. Contact User
              Support for assistance if you have a problem getting
              a tape loaded.

              Your tape is now physically mounted on the drive.
              The last step is to logically mount it with the MOUNT
              command. The command format is as follows:

                     MOUNT/qualifiers drive tape-label

              In the following example, the drive is MYDRIVE and
              the tape label is 099123:
$ MOUNT MYDRIVE 099123
jaiOUNT-l -MOUNTED, 099123 mounted on_$3MUA1
               In the next example the tape is mounted with the
               FOREIGN qualifier, which disables label process-
               ing. Therefore, no label is given. It is necessary to use
               /FOREIGN when mounting an unlabeled tape.
                          10-16

-------
     ft MOUNT/FOREIGN MYDRIVE
     5MOUNT-I-MOUNTED, mounted on _!31MUA1
         MORE
         INFO
INITIALIZING
TAPES
Various other qualifiers are available for the MOUNT
command. For more information type HELP MOUNT
or see the VMS MOUNT Utility Manual.

When you are finished using the tape, dismount it
with the DISMOUNT command and deallocate the
tape drive with the DEALLOCATE command, as in
the following example:

       $ DISMOUNT MYDRIVE
       $ DEALLOCATE MYDRIVE

The INITIALIZE command is used to write a label on
a tape immediately followed by an end-of-tape mark.
Any data that was on the tape becomes inaccessible.
All tapes in the NCC tape library are initialized (with
a label identical to the tape number) when placed into
service.  However, tapes are NOT reinitialized be-
tween users, so when you allocate a tape from the
system, it may contain old files. Since files cannot be
deleted from tape, the only way to erase them  is to
initialize the tape.

The command format is as follows:

       INITIALIZE drive label
                             10-17

-------
                     The  INITIALIZE command must be issued after
                     having the tape loaded but before using the MOUNT
                     command. The tape must also be write-enabled.

                     In the following example the tape is loaded with a
                     write ring, initialized, and mounted:
                   fVfff" % Vfff-
i   f I TAPE LOAD/RING MVDRIVE 099123
*     XTAPE-I-OPRNOTIF, operator notified ( I-AUG-1989 0941 27)
     XTAPE-I-REPLY, ftKXgXKKKgXX OPCOM 1 -AUG-1989 09 4457 88 KKKKnaOOOai
<     Request 128260 was canceled
*     $ INITIALIZE MYDRIVE 099123
     $ MOUNT MVDRIVE 099123
     XMOUNT-I-MOUNTED 099123 mounted on _$3$MUA1
t
f
                     It is imperative that you specify the tape number
                     correctly as the label  to be  written on  the tape.
                     Otherwise, future load attempts will be aborted.

                     The  TAPESYS automated backup  procedures de-
                     scribed previously have an option that will reinitial-
                     ize the tape before it begins the backup (the default
                     action when using "FREE TAPE").

                     For more online information on TAPESYS, use one of
                     the following commands:

                            $ HELP TAPESYS

                     or

                            $ HELP TAPE
                                10-18

-------

In addition, the TAPESYS User Guide is available
from the vendor. For ordering information and prices,
see the following online documentation:

      USERGUIDE:DOCUMENTATION.DOC
          10-19

-------
SECTION 11
COMMUNICATION &
FILE TRANSFER
DECNET
 (VAX <—> VAX)
DISPLAYING
THE NETWORK
DECnet is the collective name for the hardware and
software products that allow the VAX to function as
one of several interconnected nodes that make up a
network. Through DECnet, a user who is logged on
to one of the network's nodes is able to access any
other node on the network. DECnet may be used to
log on to another node or to access files residing on it.

To get information about the nodes available on the
network, type the following command:

       SHOW NETWORK

The current status of all network nodes will  be
displayed as shown in the following example:
       VAX/VMS Network status for local node  l I2VAXTM1 on I-AUG-I989 10535207

       The next hoo to the nearest area router Is node  I 20 UVAX
         Node         Links   Cost   Hops Next HOD to Node
12 VAXTM1 2 0 <
II NCCORD 0 2
13 CASTOR 1 2
14 HYDRA 0 2
20 UVAX 1 2
22 THULE 0 2
23 EUROPA 0 2
26 CHARON 0 2
30 SNAOOI 3 2
31 SNA002 0 2
36 G155UN 0 2
) (Loca
UNA-
UNA-
UNA-
UNA-
UNA-
UNA-
UNA-
UNA-
UNA-
UNA-
) -

-
-
-
-
-









>
>
i
i
ป
>
12 VAXTM1
1 1 NCCORD
13 CASTOR
14 HVDRA
20 UVAX
22 THJLE
23 EUROPA
26 CHARON
30 SNAOOI
3 1 SNA002
36 GISSUN
 LOGGING ON TO
 A REMOTE NODE
 Provided that you have a valid User-ID on the remote
 system, establish communications with another node
 using the following command:

       SET HOST nodename
                             11-1

-------
USING DCL
COMMANDS
OVER THE
NETWORK
DECNET/SNA
GATEWAY
(VAX <—> IBM)
Where nodename is one of the available nodes dis-
played by the SHOW NETWORK command.  The
remote system will then prompt for your username
and password. To return control to your local node,
log off from the remote system or press Ctrl-Y several
times in rapid succession.

Most DCL commands used to perform file operations
at a local node can also  be used to perform these
operations on remote nodes.  You can obtain file
directory  listings,  manipulate  files,  and execute
command procedures that reside on other nodes.

The extent to which you can access the remote sys-
tem will depend on whether you are an authorized
user on it. If you are not, you will only be able to
access directories and files which permit WORLD
access.  If you are an authorized user on the remote
node, you will have the same access authority as you
have when you are logged on to that node; however,
you must include your username and password in the
remote file specification.  The format is as follows:

 node "username password"::device:[dir]filename

For example, to copy a file located on node NARVAX,
a user could issue the following command:

      $ COPY NARVAX"XYZ SECRET"::-
      _$ USER$DISK:[XYZ]REPORT.DAT *.*

The DECnet/SNA gateway is software that links the
VAX Cluster and the IBM system. This link allows
VAX users to logon to the IBM interactively, submit
batch jobs on the IBM, and access files residing on the
IBM.
                             11-2

-------
DECNET/SNA
3270 TERMINAL
EMULATOR
You may logon to the NCC-IBM 3090 system as well
as the EPA-IBM Logical Mainframe systems through
the SNA Gateway. To access the network menu, type
the following command:

      $ NETSOL

The following menu will be displayed:
                                       / f Vff VW ff
U S EPA TELECOMMUNICATIONS NETWORK MENU
15 20 Tuesday August 22. 1 989
NATIONAL COMPUTER CENTER
PF KEY SELECTION SERVICE PFKEY
PF13 PCICS CICS-Producllon PFI5
PF14 DCICS CICS-Development PFI6
PF18 CICS Disaster Recovery PFI7
PF19 TSO TSO-NCC PF20
PF8 EMAIL EMAIL Access PF2I
PFIO ARBITER Arbiter PF22
PF23
PF24
PF2
PF3
PF4
PF5
TERM T260624
MODEL 2
LOGICAL MAINFRAME
SELECTION
NY
DV
WIC
SE
AT
DA
KC
PH
Cl
BN
CH
SF
SERVICE
TSO-New York LMF
TSO-DenverNEICLMF
TSO-Wash Info Center
TSO-SeattleLMF
TSO-Atlanta LMF
ISO-Dallas LMF
TSO-Kansas City LMF
TSO-Phiiadelphla LMF
TSO-Clnclnnatl LMF
TSO-Boston LMF
TSO-ChlcagoLMF
TSO-San Francisco LMF
HIT PFKEY OR ENTER SELECTION J

                       f f f f f f d
                  Select the system to connect with. To return to the
                  VAX, log off the remote system and press Ctrl-Z.
                            11-3

-------
You may also access TSO on the IBM 3090 directly by
using the following command:

       $TSO

While logged on to an IBM through DECnet/SNA,
your VT100 or VT200 type terminal will emulate an
IBM 3270.  The following drawings illustrate the
keyboard function conversions.
           11-4

-------
    VT100 KEYBOARD 3270 TERMINAL EMULATION
                      MS MHIB PRINT SYSAVL
                      O O O O
  ooooooooaoc
                          aooa
f VE
LJU
To use the function shown on
the front of the key above the
line, press the key.
To use the function shown on
the front of the key below the
line, press the EXT function
key and then the key.

M Y5
\ SB.  -EEl
I PF19 A PF2D
6	tf

                   RESET
^EREOF

ENTER
                          CUEAR
                   To use the single function shown
                   on the front of the key, press the
                   key. Note the following exceptions:

                   • To use the 0 (cent), I (logical OR),
                    and below the -.(logical NOT)
                    functions, press the EXT function
                    key and the key.

                   . To use the DEF KEY, DSP ATT,
                    EXIT, and REFR functions, press
                    the CTRL key and the key simul-
                    taneously.

-------
     VT200 KEYBOARD 3270 TERMINAL EMULATION
                                     F10
                                           F11  FH  FM  F14
       ooos
            D   oooa
         OOOOOOODOOOOOC
                                               RETURN
     DOQOOOOOOOOOO
OCDOOQODOOeOOQ
OCDOQOOO0OOOO(

                c
                                  J
To use the function shown
on the front of the key    ,—y	v
above the line, press the   [If00
                                Ftl
                                   Fli
                                      F!0
To use the function shown
on the front of the key
below the line, press the
EXT function key and
then the key.
                                 ] To use the single function
                                  shown on the front of the key,
                                   Kress the key. Note the
                                   blowing exceptions:
                                         * To use the ฃ (cent)
                                           OR), and below the
                                                 (logical
                                      ,           i Gogical
                                    NOT) functions, press the
                                    EXT function key and the
                                    key.

                                    To use the DBF KEY, EXIT,
                                    and REFR functions, press
                                    the CTRL key and the key
                                    simultaneously.

-------
DECNET/SNA
REMOTE JOB
ENTRY
For online help, press the keypad period key and then
the H key.

For more information on DECnet/SNA terminal
emulation, see the following online documentation:

       USERGUIDE:3270TEKM.DOC

The IBM 3090 perceives the VAX as an SNA Remote
Job Entry (RJE) workstation (RMT358). This emu-
lation allows VAX users to  submit batch jobs and
receive job output from the IBM.

Any job output coming back to the VAX from the IBM
must contain a special line specifying its disposition.
You may route the output to a file, print it, or both. To
route  the output to a specified file,  use the DNX
statement in your job with the following format

      //* DNX user-id device:[dir]filename

Where user-id is the 3-character code assigned to you
and device:[dir]filename is a file specification indi-
cating where the output will go.

If you want to print the output as well as route it to
a file, add the following qualifier to the command
above:

      /PRINT

To route the output to be printed and delivered to the
specified bin, use the DNX statement in your job with
the following format:

      //* DNX user-id /PRINT/NOTE=bin#
                             11-7

-------
FILE TRANSFER
USING DECNET/
SNARJE
Where user-id is the 3-character code assigned to you
and bin# is your bin code.

You will receive a MAIL message when the output is
received by the VAX.

After creating your job in a file using appropriate
JCL commands, send it to the IBM with the following
command:

       SUBMIT/SNA

For complete details on this procedure, see the fol-
lowing online documentation:

       USERGUIDE:IBMJOBSUBMIT.DOC

A specialized function of the DECnet/SNA RJE capa-
bilities is to transfer files.  An IBM batch job performs
the file transfer, and jobs may be transferred in
either direction through the SNA Gateway.

An IBM-to-VAX transfer may be initiated from the
IBM system by routing a data set to  RMT358 (the
VAX Cluster).

The following rules apply to file transfers using the
RJE method:

    •   Only text files may be sent in  this manner.

    •   Files with record lengths up to 254 may be
       sentVAX-to-IBM.

    •   Files with record lengths up to 132 may be
       sent IBM-to-VAX.
                             11-8

-------
         MORE!
         INFO
DECNET/SNA
DATA
TRANSFER
FACILITY
   •   Files with record lengths greater than 80 are
       sent IBM-to-VAX in print format (which re-
       quires some clean-up to restore to original
       form).

For detailed information on transferring files via
SNA/RJE and sample JCL jobs, see the following
online documentation:

       USERGUIDE:VAXTOIBM.DOC
       USERGUIDE:IBMTOVAX.DOC

The SNA Data Transfer Facility (DTF) allows you to
perform many common DCL commands, including
COPY, using an IBM data set as input or output.  As
such, it may be used to transfer files between the VAX
and the IBM 3090 system. Features are as follows:

   •   Transfers text or binary files.

   •   Has no record length limitations.

   •   Provides VAX users with record-level access
       to data sets residing on the IBM via many
       DCL commands.

   •   Initiates transfers  from IBM TSO, ISPF
       panels, or batch jobs.

The logical name "NCCIBM" has been defined on the
VAX Cluster to refer to the IBM 3090 system. Use the
following file specification to refer to IBM files:

       NCCIBM: :"data-set-name/qualifiers"

Where data-set-name is a fully qualified IBM data
set name and "qualifiers" are any optional qualifiers.
                             11-9

-------
                  In addition, the following specifies your IBM User-
                  ID:.

                         /USER:userid

                  And the following specifies your IBM password:

                         /PASS:password

           ป      Note that in both qualifiers a colon, not an equal sign,
                  is used.

                  Other qualifiers you may find useful are as follows:

                         /NOTRANSLATE.   Suppresses ASCII/
                         EBCDIC translation of the file (necessary
                         when copying binary data files).

                         /SUPERCEDE.  Specifies overlaying an ex-
                         isting file.

                  For example, to copy the VAX file REPORT.DAT to
                  the IBM data set XYZACCT.REPORT.DATA, over-
                  laying the existing version, use the following com-
                  mand:

                         $ COPY REPORT.DAT-
                          $ NCCIBM::"XYZACCT.REPORT.DATA-
                         _$ /SUPERCEDE/USERXYZ-
                         _$/PASS:SECRET"

TRANSFER/DTF    To copy extremely large files, use the TRANSFER/
                  DTP command interface. It has the following advan-
                  tages:

                      •   Does not tie up your  terminal while the
                         transfer takes place.
                            11-10

-------
         MORE
         INFO
JNET/BITNET
    •   Provides a checkpoint and recovery feature
       that allows you to restart a file transfer from
       the last checkpoint after a network or system
       failure.

To use the interface, enter the following command:

       TRANSFER/DTP

Your prompt will look this:

       TRANS/DTF>

Then use the COPY command as above and a batch
job will be generated to transfer the file.

For more information on the TRANSFER/DTF facil-
ity, you may also enter the HELP command at the
TRANS/DTF> prompt.

There is an obvious security concern associated with
using DTF, since your IBM User-ID and password
will be echoed on your terminal when issuing the
commands.  The DTF software includes a proxy data
base which  can preclude the need to use password
information in data set references.  If you intend to
make use of DTF frequently, use a proxy account.
Contact User Support for more details.

For more information on DTF, see the following
online documentation:

       USERGUIDE:DTF.DOC

Another method of transferring files between the
VAX and the IBM uses the BITNET network. BIT-
NET is an international telecommunication network
                             11-11

-------
                   that links data centers at hundreds of universities
                   and research centers. JNET is the VAX software
                   interface to the BITNET network. Using the JNET/
                   BITNET network has the following advantages:

                      •  Text or binary files may be transferred.

                      •  There are no record length limitations.

                   But transfer speed is relatively slow, so using JNET/
                   BITNET is inappropriate for large files.

                   For detailed information on using JNET/BITNET,
         INFO       see the following online documentation:

                         USERGUIDEjJNET_BITNET.DOC

KERMIT           KERMIT-32 is a file transfer protocol designed for
                   VAX computers under the VAX/VMS Version 3 or
                   higher operating systems.  On the VAX Cluster,
                   KERMIT is primarily used for file transfer between
                   the VAX and Personal Computers (PCs) also equipped
                   with KERMIT. Use the following command to access
                   the KERMIT protocol:

                         $ KERMIT

                   For more information on KERMIT, see the complete
                   KERMIT user guide in  the following online docu-
                   mentation:

                         USERGUIDE:KERMIT.DOC
                             11-12

-------
SOFTWARE CATALOG
                  The following section describes the software installed
                  on the VAX Cluster as of the time of this writing. For
                  the most current listing of system software, see the
                  following online documentation:

                        USERGUIDE:SOFTWARE.DOC

                  Software packages covered previously in this docu-
                  ment, such as TAPESYS, EDT, EVE, etc., are not
                  included in this catalog.
                            SC-1

-------
PROGRAMMING LANGUAGES       VAX FORTRAN


DESCRIPTION    FORTRAN (FORmula TRANslator) is a high-level
                 programming language used primarily for applica-
                 tions which involve extensive mathematical calcula-
                 tions.  The American National Standards Institute
                 (ANSI) has defined a standard FORTRAN.  The
                 FORTRAN language available on VAX/VMS sys-
                 tems,  called VAX FORTRAN, is based on ANSI
                 FORTRAN-77 (ANSI X3.9-1978). Some extensions to
                 ANSI FORTRAN-77 as well as support for programs
                 written under ANSI X3.9-1966 standards are in-
                 cluded.

                 By convention, a FORTRAN source code Hie has a file
                 type of FOR, i.e., SAMPLE.FOR. The compiler is
                 invoked with the FORTRAN command as in the
                 following example:

                        $ FORTRAN SAMPLE

                 There are many options available when compiling
                 FORTRAN programs.

                 VAX FORTRAN is a compatible superset of DEC'S
                 PDP-11 FORTRAN-77 enablingyou to compile exist-
                 ing PDP-11 FORTRAN-77 programs using the VAX
                 FORTRAN compiler.

                 FORTRAN upgrades are usually made available when
                 the VMS operating system is upgraded.

                 For more information, see the following DEC manu-
                 als:

                     •   VAX FORTRAN Users Manual
                     •   VAX FORTRAN Language Reference
                        Manual
                           SC-2

-------
PROGRAMMING LANGUAGES
                   VAX FORTRAN
       MORE
       INFO
For ordering information, see the following online
documentation:

     USERGUIDE:DOCUMENTATION.DOC
                       SC-3

-------
PROGRAMMING LANGUAGES        VAX MACRO

DESCRIPTION   MACRO is the assembly language for VAX VMS
                systems.  The Assembler reads a file of MACRO
                statements and produces relocatable object code suit-
                able for linking to other object modules, if necessary,
                by the VAX LINKER to create an executable image.

                A MACRO source code file has the file type MAR. The
                MACRO compiler is invoked by the the MACRO
                command as in the following example:

                      $ MACRO SAMPLE

                For more information, see the following DEC manual:

                      VAX MACRO and Instruction Set Refer-
                      ence Manual

                For ordering information, see the following online
                documentation:
                      USERGUIDE:DOCUMENTATION.DOC
                          SC-4

-------
PROGRAMMING LANGUAGES           DEBUGGER
DESCRIPTION    The VMS Debugger is an interactive tool that helps
                  you locate run-time programming or logic errors in
                  your FORTRAN or MACRO programs. Use the de-
                  bugger with a program that has been compiled and
                  linked successfully but does not run successfully. You
                  can locate errors by observing and manipulating your
                  program interactively as it executes.

                  Compile and link programs that you intend to debug
                  with the /DEBUG command qualifier as follows:

                         $ FORTRAN/DEBUG file-specification
                         $ LINK/DEBUG file-specification

                  The COMPILE command controls whether the com-
                  piler makes local symbol table and traceback infor-
                  mation available. Using the /DEBUG qualifier in the
                  LINK command includes that information in the ex-
                  ecutable image as well. The RUN command will call
                  Debugger and leave you at the Debugger prompt, as
                  in the following example:
     ttRUN file-specification

           VAX DEBUG Version 30
     SDEBUG-HNITIAL. language Is xxx, module set to 'file-specification1
     DBG>
                  Alternately,  if your program is running without
                  Debugger control and you want to call the Debugger,
                  interrupt the running program with Ctrl-Y and give
                  the DEBUG command as follows:
                             SC-5

-------
PROGRAMMING LANGUAGES          DEBUGGER
      S RUN file-specification
      Ctrl-Y
      SDEBUG
                  If you interrupt a running program and enter the
                  DEBUG command, you will not know which instruc-
                  tion was executing.  The instruction can be deter-
                  mined by the SHOW CALLS command, as in the
                  following example:
 :  | S DEBUG
 |  I       VAX DEBUG Version 30
 i  I SOEBUG-MNITIAL. language Is xxx. module set to 'file specification'
 •  J       OBG>5HOW CALLS


                  At the initiation of a debugging session, the language
                  (xxx) in which the program (module) being debugged
                  is written will determine certain parameters for
                  Debugger. These language-dependent parameters
                  are MODE, OUTPUT, STEP, and TYPE.

                  For more information about Debugger, see the follow-
                  ing DEC manuals:

                      •   VMS Debugger Manual
                      •   VAX FORTRAN User's Guide

                  For ordering information, see the following online
                  documentation:

                         USERGUIDE:DOCUMENTATION.DOC


                            SC-6

-------
PROGRAMMING LANGUAGES	VAXSET


DESCRIPTION    VAX Software Engineering Tools (VAXset) is a collec-
                   tion of programmer productivity tools developed and
                   marketed by DEC that include the following:

                      •  The DEC/Code Management System (CMS)
                         offers a series of utilities that will provide
                         source code or documentation archiving and
                         historical tracking for an individual software
                         developer or an entire project team.

                      •  The DEC/Test Manager (DTM) automates
                         the process of software testing by organizing
                         software tests and evaluating test results.

                      •  The VAX Language-Sensitive Editor (LSE) is
                         a multi-language, advanced text editor spe-
                         cifically designed for software development.
                         The FORTRAN version of the editor is avail-
                         able on the NCC VAX Cluster.

                      •  The VAX Source Code Analyzer (SCA) is an
                         interactive, multi-language source code cross-
                         reference and static analysis tool designed to
                         aid developers in understanding the  com-
                         plexities of large-scale software systems.

                      •  The DEC/Module  Management System
                         (MMS) updates files by comparing the revi-
                         sion times of specified files in a description
                         file. If a "source" file (for example, an object
                         module) is newer than its "target" (for ex-
                         ample, an executable image), MMS updates
                         the source by executing commands supplied
                         in the description file. If some of the sources
                         need updating, MMS updates them before
                         building the target. If the target is newer that
                         its sources, it is already up to date and MMS
                         does not rebuild it.
                              SC-7

-------
PROGRAMMING LANGUAGES	VAXSET

                     •  The VAX Performance and Coverage Ana-
                        lyzer (PGA) is a software development tool
                        that helps you analyze the run-time behavior
                        of application programs.  The VAX PCA can
                        pinpoint execution bottlenecks  and other
                        performance problems in user programs.
                        Using this information, you can modify your
                        programs to run faster. This tool also meas-
                        ures which parts of your program are or are
                        not executed by a given set of test data so that
                        you can devise tests that exercise all parts of
                        your program.

                  For information on ordering a DEC manual for each
                  of these products, see the following online documen-
                  tation:

                        USERGUIDE:DOCUMENTATION.DOC
                            SC-8

-------
APPLICATION PACKAGES
                                     SAS
DESCRIPTION
         MORE
         INFO
         MORE
         INFO
Statistical Analysis System (SAS) was originally a
statistical package, but it has evolved into a more
general data analysis system. SAS reads data from
disk or tape and then organizes the values into a SAS
data set which contains both the data and its descrip-
tion. The data set can be combined with other data
sets, analyzed statistically, and incorporated into
reports. SAS produces both preformatted and user-
formatted reports.  SAS-GRAPH allows graphical
presentation of data in the form of color plots, charts,
maps, and slides on terminals and hard copy devices.

SAS products available on the VAX Cluster include
the following (in addition to the base SAS product):

    •   SAS/GRAPH

    •   Full Screen Product (FSP)

    •   Econometrics and Time Series Analysis (ETS).

SAS is licensed on nodes VAXTM1 and HYDRA and
may be invoked interactively with the following com-
mand:

       $SAS

For information on ordering complete SAS documen-
tation, see the following online documentation:

       USERGUIDE:DOCUMENTATION.DOC

For information on using the CalComp 1051 plotter
as a SAS/GRAPH device,  see the following online
documentation:

       USERGUIDE:CALCOMP1051.DOC
                             SC-9

-------
APPLICATION PACKAGES                    FOCUS
DESCRIPTION    FOCUS, a fourth-generation language, is a complete
                  "information control system" with comprehensive
                  features for entering, maintaining, retrieving, and
                  analyzing data.  The nonprocedural FOCUS lan-
                  guage was designed to replace traditional program-
                  ming languages in  most applications programming
                  situations. The simplicity of the command syntax in
                  the language stems from the fact that it uses simple
                  English phrases. FOCUS is licensed on node VAXTM1
                  and may be invoked with the following command:

                        $ FOCUS

                  NCC Training offers a course in FOCUS on the VAX.
                  For more information on training classes, see the
                  following online documentation:

                        USERGUIDE:CLASSES.DOC

                  Comprehensive documentation is available directly
                  from the vendor. For ordering information, see the
                  following online documentation:

                        USERGUIDE:DOCUMENTATION.DOC
                           SC-10

-------
APPLICATION PACKAGES
                                    IMSL
DESCRIPTION
        MORE I
        INFO
International Mathematical and Statistical Library
(IMSL) is a set of mathematical and statistical rou-
tines for use in FORTRAN programs.  The IMSL
libraries consist of three separate but coordinated
libraries that allow easy user access:

   •  MATH/LIBRARY (General applied mathe-
      matics)

   •  STAT/LIBRARY (Statistics)

   •  SPUN/LIBRARY (Special functions)

The IMSL libraries on the VAX Cluster can be refer-
enced with the logical name "IMSL" and can be linked
as follows:

      $ LINK program-name,IMSL/LIB

Most of the subprograms are available in both single
and double precision versions. For an overview of
IMSL subroutine capabilities, see the following on-
line documentation:

      USERGUIDE:IMSL.DOC

For information on ordering manuals from the ven-
dor, see the following online documentation:

      USERGUIDE:DOCUMENTATION.DOC
                            SC-11

-------
GRAPHICS PACKAGE                            GKS
DESCRIPTION    VAX Graphical Kernel System (GKS) is a run-time
                 library of graphical functions that are defined by the
                 ANSI X3.124-1985 and ISO 7942-1985 Graphical
                 Kernel System standards.  GKS functions provide
                 application programs with a standard method of pro-
                 ducing graphics on a potentially large number of
                 physical devices such as  workstations, terminal
                 screens, pen plotters, or graphic printers.

                  For more information on VAX GKS, see the following
                 online documentation:

                       USERGUIDE:VAXGKS.DOC.

                 For information on ordering the GKS DEC manual,
                 see the following online documentation:

                       USERGUIDE:DOCUMENTATION.DOC
                           SC-12

-------
INDEX
B
Abbreviation of commands
ABI (Archive/Backup Inquiry)
ABR (Archive/Backup Recovery)
Access, dial-up
Access, ETHERNET
Access, TYMNET
Accessing the NCC VAX
Accounting and chargeback
Accounting, by project code
ADP Coordinators
Alien tape
Application packages, FOCUS
Application packages, IMSL
Application packages, SAS
ARCHIVE
Archive, standby
Archive, tape
Archive, using ABI
Archive/Backup Inquiry
Archive/Backup Recovery
Archiving files
Archiving, 2-year
Assistance
Asterisk, as wildcard character
AUTOPRINT

B-tapes
BACKUP
Backups, full
Backups, incremental
Backups, standalone
Backups, tape
Batch job accounting
Batch job, submitting
Batch jobs
Batch queues
Baud rate
    10-1
     9-7
     5-1
     5-1
     5-1
    10-8
     7-5
7-5,9-12
 7-1, 7-4
     7-4
     1-1
                            Index-1

-------
INDEX
                 Billing                                 2-4
                 Bin number                             4-6
                 BITNET                             11-11
                 Business hours                         9-13

                 CalComp 1051 plotter                   SC-9
                 CASTOR                               1-1
                 Changing password                       1-8
                 Chargeback rates                        2-4
                 Charges                                2-4
                 Charging, to project code                   7-5
                 Command file, startup                    8*6
                 Command procedure, login                 7-3
                 Command procedure                      7-1
                 Command procedure, example of            7-2
                 Command, abbreviating                   2-2
                 Command, BACKUP                9-7, 10-10
                 Command, continuation                   2-2
                 Command, COPY                        4-3
                 Command, DCL                     2-1, 7-1
                 Command, DCL from EVE                8-13
                 Command, DEFAULT                    4-2
                 Command, DELETE                      4-4
                 Command, DIRECTORY            3-3,4-1, 6-3
                 Command, EDT editing                   8-2
                 Command, EVE                         8-8
                 Command, file manipulation                4-1
                 Commans, INITIALIZE                 10-18
                 Command, LIBRARY                     9-9
                 Command, MAIL                        9-1
                 Command, MOUNT                    10-16
                 Command, PHONE                       9-4
                 Command, PRINT                       4-6
                 Command, PURGE                       4-5
                 Command, recall                         2-3
                 Command, RENAME                     4-4
                 Command, short form                     2-2
                          Index-2

-------
INDEX
                  Command, SUBMIT                       7-5
                  Command, TAPESYS                     10-5
                  Command, terminal server                 1-5
                  Command, TRANSFER/DTP interface      11-10
                  Command, TYPE                         4-3
                  Command, using over the network          11-2
                  Communication, among systems            11-1
                  Compiler, FORTRAN                    SC-22
                  Compiler, with Debugger                  SC-5
                  Computer-related charges                  2-4
                  Connect time charges                      2-4
                  Continuation of commands                 2-2
                  Conventions, for command procedures        7-1
                  COPY                                  4-3
                  Costs                                   2-4

                  Data Management                        5-1
                  Data Processing Support Services           10-1
                  Data Switch, headquarters                 1-1
                  Data Switch, WIC                         1-4
                  Data Transfer Facility                    11-9
                  Data transfer                          11-10
                  DCL (Digital Command Language)           2-1
                  DCL commands                       2-1, 7-1
                  DCL commands, from EVE                8-13
                  DCL commands, over the network           11-2
                  Debugger                               SC-5
                  DECnet                                11-1
                  DECnet/SNA Data Transfer Facility         11-9
                  DECnet/SNA Gateway                    11-2
                  DECnet/SNA remote job entry              11-7
                  DECnet/SNA RJE, file transfer             11-8
                  DECnet/SNA terminal emulator            11-3
                  DEFINE                                6-1
                  Degaussing tapes                         10-3
                  DELETE                                4-4
                  Desktop laser printer                      4-7
                          Index-3

-------
INDEX
                   Device                                     3-1
                   Dial-up access                              1-1
                   Digital Command Language                  2-1
                   Digital Standard Runoff                    9-11
                   DIRECTORY                               4-1
                   Directory                              3-1,3-3
                   Directory, clean-up                          4-5
                   Directory, PURGE                          4-5
                   Disk and file structure                       3-1
                   Disk quotas                                5-8
                   Disk space management                     5-1
                   Disk structure                              3-4
                   DNX statement                            11-7
                   DO key                               8-7, 8-11
                   Drive, tape                               10-14
                   DSR (Digital Standard Runoff)              9-11
                   DTP (Data Transfer Facility)                11-9

                   Editing files                                8-1
                   Editing, multiple files                      8-11
                   EDT Editor                                8-1
                   EOT recovery feature                       8-6
                   EDT startup                               8-6
                   EDTINI.EDT                               8-6
                   EMAIL                                   9-12
                   Ending session automatically                 2-4
                   Erasing tapes                              10-7
                   ETHERNET access                         1-5
                   ETS (Econometrics and Time Series Analysis) SC-9
                   EVE (Extensible VAX Editor)                 8-7
                   EVE keypads                               8-8
                   EVE recovery feature                      8-13
                   Expiration date, of file                       5-4
                   Extensible VAX Editor                       8-7

                   File editing                                8-1
                   File manipulation                          4-1
                             Index-4

-------
INDEX
                   File name                                 3-1
                   File name extension                         3-1
                   File printing                               4-6
                   File protection                             3-4
                   File protection, displaying                   3-7
                   File specification                           3-1
                   File structure                              3-1
                   File transfer                         11-1, 11-8
                   File transfer protocol                      11-12
                   File type                                  3-1
                   File version                                3-1
                   FOCUS                                SC-10
                   Foreign tape                              10-1
                   Foreign tape report                        10-3
                   Format of commands                        2-1
                   Forms                                    4-7
                   FORTRAN                               SC-2
                   FORTRAN, IMSL routines               SC-11
                   Fourth-generation language              SC-10
                   Freeing tapes                             10-7
                   Full backups                              5-1

(5                 Geographical Information System            1-2
                   GIS (Geographical Information System)       1-2
                   GKS (Graphical Kernel System)           SC-12
                   Graphics package, GKS                  SC-12
                   Group logical names                        6-2

 U                 Headquarters Data Switch                  1-1
                   Help                                      2-1
                   Hitman                                   2-4
                   Hyphen, in command format                 2-2

 |                  IBMSUBMIT                             9-12
                   IMSL (International Mathematical and Statistical
                   Library)                               SC-11
                   Incremental backups                       5-1
                             Index-5

-------
INDEX
                  Incremental backups, recovering files          5-2
                  Initializing tape                          10-17
                  Interactive CPU limit                       2-3
                  Interactive session termination               2-4
                  International Mathematical and Statistical Library
                                                         SC-11

                  JNET/BITNET                           11-11
                  Job logical names                           6-2

                  KERMIT                                11-12
                  Keyboard equivalents                 11-5,11-6
                  Keypad, VT100                             8-3
                  Keypad, VT200                             8-3

                  Label, tape                               10-4
                  Landscape forms                           4-9
                  Laser printer                         4-10, 9-13
                  Laser printer forms                         4-8
                  Laser printer, desktop                       4-7
                  LIBRARIAN                               9-8
                  Limits, disk                                5-8
                  Limits, on CPU time                        2-3
                  Loading tape                             10-14
                  LOCAL prompt                             1-5
                  Log file                                   7-6
                  Logical names                             6-1
                  Logical names, displaying                   6-2
                  Login command procedure                   7-3
                  LOGIN.COMfile                           7-3
                  Logon procedures                       1-1,1-7
                  Logon, to a remote node                    11-1
                  Logout procedures                         1-10

                  MACRO                                 SC-4
                  MAIL                                9-1,11-8
                  MAIL message                         5-6, 5-7
                            Index-6

-------
INDEX
N
0

P
MAIL, reading
MAIL, sending
MEMO
Messages, MAIL
Messages, PHONE
Mounting tape
Multiple file editing

Netprint
NETSOL
Network
Node
NOTE qualifier

Operating system

Paper, for printing
Password
Password, changing
Password, characteristics of
Password, criteria
Password, expired
Password, for new user
Percent sign, as wildcard character
Personal  computers, using KERMIT
PHONE
Plotter
Port selector switch
Portrait forms
PRINT
Printer, IBM 3090
Printer, laser
Printer, remote node
Printer, VAX Cluster
Printing files
Printing files, with AUTOPRINT
Priority, of batch jobs
       4-10
       11-3
       11-1
1-2, 3-1, 11-1
        4-6

        2-1

        4-7
        1-8
        1-8
        1-9
        1-9
        1-8
        1-8
        3-3
       11-12
        9-3
       SC-9
        1-1
        4-8
        4-6
       4-10
    4-7, 9-13
       4-10
        4-6
        4-6
       9-12
        7-4
                            Index-7

-------
INDEX
                  Private user packs                          5-1
                  Privileges (GRPNAM and SYSNAM)          6-2
                  Process logical names                       6-2
                  Processor charges                          2-4
                  Programming languages, Debugger         SC-5
                  Programming languages, VAX FORTRAN    SC-2
                  Programming languages, VAX MACRO      SC-4
                  Project code                           1-9, 7-5
                  Project code, changing                      1-10
                  Prompt, changing                          2-1
                  PROTECT                                9-13
                  Protection levels                      3-5, 9-13
                  Protection levels, default                    3-6
                  Protection,  changing file                     3-6
                  Protection,  directory                        3-7
                  Protection,  displaying file                    3-7
                  Protection,  file                             3-4
                  PURGE                                   4-5

                  Quotas, disk                               5-8

                  Recalling commands                        2-3
                  Recovery, EDT                             8-6
                  Recovery, EVE                            8-13
                  Recovery, using ABR                      9-12
                  Refunds                                  2-5
                  Releasing tapes                           10-7
                  Remote Job Entry                         11-7
                  Remote workstation (RMT358)              11-7
                  RENAME                                 4-4
                  Reports, monthly for ADP Coordinators        2-4
                  Restoring file                        5-2,10-11
                  Restoring file, from tape                   10-11
                  Recovering file, from incremental backups     5-2
                  Restrictions, disk                          5-8
                  RJE (Remote Job Entry)                    11-7
                  Routing printout                           4-6
                            Index-8

-------
INDEX
                   SAS (Statistical Analysis System)
                   SAS/GRAPH
                   Schedule
                   SCRATCH
                   Scratch space
                   Scratching tapes
                   Security
                   Security, file
                   Session termination
                   SET DEFAULT
                   Shortening commands
                   SNA gateway
                   Software catalog
                   Software Engineering Tools
                   SORT
                   Space limitations
                   Spawning
                   Specifications, file
                   Standalone backups
                   Standby archive
                   Startup, EOT
                   Statistical Analysis System
                   Storage, temporary
                   Subdirectory, creating
                   Symbols
                   System backups
                   System logical names
                   System tape
                   System utilization charges

                   Tables, logical name                        6-2
                   Tape archive                             10-3
                   Tape cleaning                            10-3
                   Tape degaussing                          10-3
                   Tape drive                              10-14
                   Tape information                         10-6
                   Tape inquiries                            10-7
                            Index-9

-------
INDEX
                  Tape label                               10-4
                  Tape Management System                 10-4
                  Tape management                        10-1
                  Tape services                            10-3
                  Tape, alien                              10-2
                  Tape, foreign                            10-1
                  Tape, initializing                        10-17
                  Tape, load                              10-14
                  Tape, system                            10-1
                  Tape, using interactively                 10-13
                  TAPESYS               5-6, 5-7, 9-7,10-4,10-11
                  TAPESYS menu                         10-8
                  TAPESYS tape management system          5-2
                  Telecommunications Network Menu         11-3
                  Temporary storage                         5-8
                  Temporary work space                    9-13
                  Terminal server commands                 1-5
                  Terminating session                       2-4
                  Text editor, EOT                          8-1
                  Text editor, EVE                          8-7
                  Text editor, with DSR                     9-11
                  Text formatting                          9-11
                  Text Processing Utility (TPU)               8-7
                  Time Sharing Option                      11-4
                  TMS report                             10-3
                  Tools, software engineering                SC-7
                  Transferring data                        11-9
                  TSO (Time Sharing Option)                11-4
                  TUTOR                             8-1,9-13
                  TYMNET                             1-1,1-3
                  TYMNET prompt                         1-4
                  TYPE                                   4-3

U                User Memo                             9-13
                  User packs                               5-1
                  User-ID                                 1-7
                  Username                                1-7
                           Index-10

-------
INDEX
                 Utility, ABI                             9-12
                 Utility, ABR                            9-12
                 Utility, ARCHIVE                         5-7
                 Utility, ARCHIVE                        9-12
                 Utility, AUTOPRINT                     9-12
                 Utility, BACKUP                         9-7
                 Utility, EMAIL                          9-12
                 Utility, help                             2-1
                 Utility, IBMSUBMIT                     9-12
                 Utility, LASERPRINT                    9-13
                 Utility, LIBRARIAN                       9-8
                 Utility, MAIL                            9-1
                 Utility, MEMO                          9-13
                 Utility, NCC-supplied                     9-11
                 Utility, OPERATION SCHEDULE          9-13
                 Utility, PHONE                          9-3
                 Utility, PROTECT                    3-8, 9-13
                 Utility, SCRATCH                        9-13
                 Utility, SORT                            9-9
                 Utility, text processing                     8-7
                 Utility, TUTOR                         9-13
                 Utility, VAX                             9-1

                 VAX environment                         2-1
                 VAX FORTRAN                         SC-2
                 VAX Software Engineering Tools            SC-7
                 VAX to IBM                            11-2
                 VAX to VAX                            11-1
                 VAXA                                  1-2
                 VAXB                                  1-2
                 VAXset                                SC-7
                 VAXTM1                                1-2
                 VAXTPU                                8-7
                 Version, file                             3-1
                 Version, purging                          5-1
                 Virtual Memory System                    2-1
                 VMS (Virtual Memory System)              2-1
                          Index-11

-------
INDEX
                 VMS utilities                             9-1
                 VT100 EVE keypad                        8-8
                 VT100 keyboard 3270 terminal emulation    11-5
                 VT100 keypad                            8-3
                 VTlOO-type terminal                       1-1
                 VT200 EVE keypad                        8-9
                 VT200 keyboard 3270 terminal emulation    11-6
                 VT200 keypad                            8-3

                 WIG Data Switch                          1-4
                 Wildcards                               3-2
                 Work space, scratch                        5-8
                 WORK.SCRATCH                       9-13
                 Write ring, on tape                      10-15
                          Index-12

-------
Email Guide

-------
TELECOM

-------
E-MAIL

-------
   MICRO-TO-
MAINFRAME LINK

-------
 EMAIL  GUIDE
     DECEMBER 1989
         Prepared by:

US Environmental Protection Agency
 National Data Processing Division
    National Computer Center
     Research Triangle Park
        North Carolina

-------
                         Preface

Email Guide provides essential information for users of the
EPA's Electronic Mail Service, called Email, provided by Dialcom,
Inc.
                           in

-------
Dialcom is a registered trademark of
Dialcom, Inc.

OAG is a registered trademark of
Official Airline Guides.

LEARN, PCMAIL, and Tradepost are
servicemarks of Dialcom, Inc.

TYMNET is a registered trademark of
TYMSHARE, INC.
IV

-------
CONTENTS
SECTION 1: PRELIMINARIES




WELCOME TO THE EMAIL SERVICE	1-1



HOW TO USE THIS SECTION	1-2




SPECIAL KEYS	1-2



EMAIL SERVICES	1-3



     BASIC SERVICES	1-3




     PREMIUM SERVICES	1-3



REGISTRATION	1-4




USAGE GUIDELINES	1-6




REQUIRED EQUIPMENT	1-7




COMMUNICATION METHODS	1-8



     DIRECT CONNECTION	1-9



     DIAL-UP CONNECTION	1-15



DISCONNECTING FROM EMAIL	1-19






SECTION 2: BASIC SERVICES




MAIL SERVICE	2-1




     YOUR MAILBOX	2-1



     HOW TO SEND MAIL	2-2

-------
CONTENTS
     SEND OPTIONS	2-4



     HOW TO READ MAIL	2-6



     READ OPTIONS	2-7



     HOW TO SCAN MAIL	2-8



     SCAN OPTIONS	2-10



PCMAIL SERVICE	2-11



     CREATING A MAIL MESSAGE FILE	2-11



     HOW TO SEND MAIL VIA PCMAIL	2-12



     PCMAIL OPTIONS	2-14



TEXT EDITOR SERVICE	2-15



     TEXT EDITOR COMMANDS	2-15



     LINE CHANGING COMMANDS	2-16






SECTION 3: HELPFUL HINTS



MAIL DIRECTORY	3-1



     SEARCH THE MAIL DIRECTORY	3-1



MAILJIEF FILE	3-3




MAIL OPTIONS	3-5



     DATE ACTIVATE YOUR MAIL	3-5
                        VI

-------
CONTENTS
     PROTECT MAIL WITH PASSWORD	3-6



     SPECIAL READ OPTIONS	3-6



     TRACK YOUR MAIL	3-7



     SWITCH BETWEEN MAIL IDs	3-8



COMMAND LINE MODE	3-9



CHANGE YOUR PASSWORD	3-9




NETWORK PHONE NUMBERS	3-10




RECONNECT FEATURE	3-11



TERM COMMAND	3-12




HELP AND MORE INFORMATION	3-13




BULLETIN BOARD	3-13




     CHECK FOR NEW INFORMATION	3-16




     POST INFORMATION TO EMAILNEWS	3-16




     EXIT EMAILNEWS	3-17






SECTION 4:  COMMAND SUMMARIES




MAIL COMMAND SUMMARY	4-1




     SEND	4-1



     READ	4-4
                       VII

-------
CONTENTS
     SCAN	4-7



SYSTEM LEVEL COMMAND SUMMARY	4-8



TEXT EDITOR COMMAND SUMMARY	4-9



PCMAIL COMMAND SUMMARY	4-11






INDEX	Index-l
                      Vlll

-------
SECTION 1
 PRELIMINARIES
WELCOME TO
THE EMAIL
SERVICE
Welcome to the EPA Electronic Mail Service, called
Email, provided by Dialcom, Inc. Email is an easy-to-
use, computer-based messaging system that allows
EPA employees, contractors, independent research-
ers, and others to correspond with each other through
computer terminals. Using Email, you are instantly
in touch with EPA's people, activities, business is-
sues, and concerns.

Similar to the Email Quick Reference Guide, this
section of the Guide to NCC Services provides  an
easy-to-use, desktop reference  for Email informa-
tion. It is divided into four sections:

Section 1:  Preliminaries describes what Email
services are offered, how to register to use the serv-
ices, and what equipment is required. This section
also includes an explanation of the preferred meth-
ods of accessing Email based on your location and
computer system.

Section 2:  Basic Services  explains the MAIL
services and its basic functions including SEND,
READ, and SCAN. This section describes PCMAIL,
an efficient means for transmitting text messages
through Email  directly from  a PC hard drive or
floppy disk. The basic Email Editor is also described
in this section.

Section 3:  Helpful  Hints provides some useful
information including where help is available, how to
get network numbers, how to change your password
and terminal attributes, and how to create  a refer-
ence list, etc.

Section 4: Command Summary provides a sum-
mary of all the available MAIL, PCMAIL, Editor, and
System Level commands.
                              M

-------
HOW TO USE
THIS SECTION
SPECIAL KEYS
Questions and comments should be directed to Email
User Support:

       (FTS) 382-7539
       (202) 382-7539

or send an Email message to USER.SUPPORT.

Throughout the Email section of the Guide to NCC
Services, conventions other than the ones described
in the front of the manual have been adopted specifi-
cally for Email:

    •   Upper and lower case text is used to dupli-
       cate as closely as possible the appearance of
       the terminal screen.

    •   Bold text depicts your typed responses and in
       some cases only the first letter or two of a
       command or option is required.

RETURN (or ENTER key). Enter a line of informa-
tion into the computer or terminal.  You must press
the RETURN key after each line of information.

@ (at sign). Ignore or kill the current line.

This can be a problem if you need to include an @ in
your message.   See  HELPFUL HINTS,  TERM
COMMAND for more details.

Ctrl-H (Control key and H). Backspace and erase,
one character at a time.

Ctrl-S (Control key and S). Freeze a scrolling screen.

Ctrl-Q (Control key and Q).  Resume a scrolling
screen.
                              1-2

-------
                   Ctrl-P (Control key and P) or BREAKkey. Interrupt
                   the current command.
EMAIL
SERVICES

BASIC
SERVICES
PREMIUM
SERVICES
Note that the Ctrl key will not work on IBM 3270-
type terminals.

The EPA Email service, provided through Dialcom,
Inc., offers both basic and premium services.

MAIL, the basic Email service, is a computer-based
messaging system provided to each Email user. With
MAIL, you can instantly send and receive correspon-
dence from other Email users through their com-
puter terminals.  MAIL  provides various options to
both the sender and receiver to improve communica-
tion efficiency.

PCMAIL is a batch mail transfer service that allows
you to electronically transmit text messages created
offline on a PC or word processor. With PCMAIL, the
messages are sent directly from a PC hard drive or
floppy disk to an  Email mailbox.

EDITOR is a basic text processing program.  With
the EDITOR, you can edit MAIL messages and create
special text files.

PREMIUM SERVICES are available in addition to
the basic services described above.  These include
such  features as the  Official  Airlines  Guide,
Newswires, and  specialized EPA data bases.  For
more information on these premium services, contact
the EPA Email System Manager at one of the follow-
ing telephone numbers:

       (FTS) 629-2377
       (919) 541-2377
                               1-3

-------
REGISTRATION
EPA employees and affiliates (such as contractors,
etc.) who require an EPA Email mailbox must first
complete an Email request form.  This form can be
completed online on the Email system, or a hardcopy
can be obtained through your EPA organization's
Email Coordinator.

To complete the form online, work with any currently
registered Email user to access Email. At the system
level prompt (>), enter the following command:

       REQUEST EMAIL.REQ.xxxx

Where xxxx is your EPA organization's abbreviation
as listed below:

Abbreviation  Organization
                  OA
                  OEA
                  OIG
                  OPPE

                  OECM

                  NEIC

                  OGC
                  OARM-HQ

                  OARM-RTP


                  OARM-CINC

                  OW
                  OSWER
             Office of the Administrator
             Office of External Affairs
             Office of Inspector General
             Office of Policy, Planning, and Evalu-
             ation
             Office of Enforcement and Compli-
             ance
             National Enforcement Investigations
             Center
             Office of General Counsel
             Office of Administration  and Re-
             sources Management, Headquarters
             Office of Administration  and Re-
             sources Management, Research Tri-
             angle Park
             Office of Administration  and Re-
             sources Management, Cincinnati
             Office of Water
             Office of Solid Waste and Emergency
             Response - Immed. Office
                             1-4

-------
Abbreviation  Organization
OSWER-SF

OSWER-SW

OSWER-WPE


 OAR
OPTS

OPTS-CM

OPTS-TS

OPTS-PP

ORD
REG01 thru
REG10
Office of Solid Waste and Emergency
Response - Superfund
Office of Solid Waste and Emergency
Response - Solid Waste
Office of Solid Waste and Emergency
Response - Water Programs Enforce-
ment
Office of Air and Radiation
Office of Pesticides and Toxic Sub-
stances - Immed. Office
Office of Pesticides and Toxic Sub-
stances - Compl. Monitoring
Office of Pesticides and Toxic Sub-
stances - Toxic Substances
Office of Pesticides and Toxic Sub-
stances - Pest Programs
Office of Research and Development
Regional Offices
The request form will ask for information regarding
your proposed use of the system and some basic
information about you.  If you are a non-EPA em-
ployee, you will be asked for the name of your EPA
Project Office or sponsor.

After the request form is completed and has been
reviewed and approved by the appropriate  Email
Coordinator, it is sent to Email User Support for
processing. When you mailbox is ready, you will be
notified by your Email Coordinator.
           1-5

-------
USAGE            The basic guidelines for Email usage are as follows:
GUIDELINES
                      •  Minimize processing and connect time.
                         Prepare and read long documents offline with
                         a PC or a word processor. Avoid periods of
                         inactivity or idle time.  Log off the system
                         when your work is completed. The system
                         will terminate Email sessions after 10 min-
                         utes of idle time.

                      •  Utilize the EPA private data network.
                         The EPA network offers the most cost effi-
                         cient access to  Email.  See COMMUNICA-
                         TION METHODS later in this section.

                      •  Minimize disk storage. Read and act on
                         messages on a regular basis.  Delete mes-
                         sages ASAP. READ messages are automati-
                         cally deleted after 30 days. UNREAD mes-
                         sages are automatically deleted after 60 days.
                         Deleted messages cannot be restored. If you
                         want to reference Email messages later,
                         download them to a file on your PC or word
                         processor.

                      •  Keep directory information up-to-date.
                         Review and submit directory changes as
                         needed to Email  User Support.   Release
                         unused mailboxes. Boxes inactive over 90
                         days are subject to reassignment.

                   The basic guidelines for Email system security are as
                   follows:

                      •  Change your initial password immedi-
                         ately.  The first time you access the Email
                         system, change your password.  See HELP-
                         FUL HINTS, CHANGE YOUR PASSWORD.
                             1-6

-------
                      •   Change  your password  regularly.
                         Change your password at least every 90 days.
                         An EPA banner will appear as a reminder.

                      •   Protect your password. Do not include it
                         in script files or post it on your terminal.  If
                         you use a Group Box, share the Group Box
                         password only with those who"need to know."

                      •   Protect confidential data. Add the PASS-
                         WORD option PA to messages  that require
                         confidentiality. See HELPFUL HINTS, MAIL
                         OPTIONS.

                      •   Do  not  use  Email  for   sensitive
                         communications. The Email system was
                         not designed  to provide a high level of secu-
                         rity necessary for transmitting sensitive data.
                         If you have doubts, do not use Email.

REQUIRED       To use Email, you'll need the  proper equipment.
EQUIPMENT     Specifically, this includes a terminal with access to a
                  communication link to the Email computers.

                  You can use almost any type of terminal such as a
                  3270, ASCII (dumb) computer terminal, word proces-
                  sor, or personal computer. If you use a word processor
                  or PC, you will also need a communication program
                  such as Kermit or Crosstalk.

                  The communication link to the Email computers, for
                  most EPA Email users, is available  through the
                  private EPA data network.  This communication link
                  can be a direct or indirect connection depending upon
                  your equipment and  location.

                  For those users with a terminal connected to the IBM
                  mainframe, a Logical Mainframe (LMF) system, one
                              1-7

-------
                   of the other host computer systems (VAX or Prime),
                   or an EPA network data switch, a direct connection to
                   Email is available via the EPA private data network.
                   For other users,  a dial-up connection to Email is
                   available through a modem and telephone line. The
                   dial-up connection can be directly through the EPA
                   private data network or indirectly through the EPA
                   private network via a commercial data network, such
                   as TYMNET.

             •      Access to Email through the EPA private data net-
                   work  is encouraged since it offers significant cost
                   savings to the Agency.

COMMUNICA-     There are many different terminals and communica-
TION METHODS  tion connections used throughout the Agency. A brief
                   description of the preferred Email access method for
                   each is outlined in  the following pages. If you are
                   unsure of your terminal configuration or the appro-
                   priate access method for your configuration, contact
                   your local Information Center staff, ADP personnel,
                   or NCC Telecommunication Support for assistance.

             *     Throughout the following pages EPAxxxx is your
                   Email ID where xxxx is a 4- or 5-digit number.

             ป     A reference card of Very Important Phone #s (VIP#s)
                   for the Email system is available through Email User
                   Support. This card includes all the EPA private data
                   network numbers plus the phone numbers for tele-
                   communication and general Email assistance.
                               1-8

-------
DIRECT
CONNECTION
3270-Type Terminal Connected to the IBM
Mainframe or an IBM Logical Mainframe
(LMF)
                                      WELCOME TO THE
                               US ENVIRONMENTAL PROTECTION AGENCY
                                 TELECOMMUNICATIONS NETWORK

                                 ENTER COMMAND OR M FOR MENU
                          email
                          Please Sign On
                          >ID EPAxxxx
                               1-9

-------
Terminals Connected to the RTP-NCC Data
Switch
         WELCOME TO THE EPA NATIONAL COMPUTER CENTER

            Please enter one of the fol lowing selections

             IBMPSl for IBM
             TCP for IBM 3270 EMULATION
             VAXA for VAX SYS A
             VAXB for VAX SYS B
             EMAIL for EMAIL



       Enter selection  email
       Please Sign On
       >ID EPAxxxx
   V
             1-10

-------
Terminals Connected to a Prime System
        OK.
        LOGIN EPAxxxx -ON SYS53
Some Email services are not available through this
logon procedure. Contact your Prime System Admin-
istrator if you have problems.
          1-11

-------
Terminals Connected to a VAX System
       S email
Then the following message appears:
       SPAD-I-COM. call conected to remote DTE
       Prlmecom Network 19 40 79 System 63
       Please Sign On
       >ID EPAxxxx
             1-12

-------
Terminals Connected via Ethernet

Use the Ethernet commands to connect to the local
data switch. Once connected to the data switch, the
screen will appear as follows:
         WELCOME TO THE EPA NATIONAL COT1PLJTER CENTER

            Please enter one of the following selections

             IBMPSI for IBM
             TCP for IBM 3270 EMULATION
             VAXAforVAXSYSA
             VAXB for VAX SYS B
             EMAIL for EMAIL



        Enter selection email
       Please Sign On
       >IO EPAxxxx
            1-13

-------
Terminals Connected to an EPA TYMNET Node
      Please Log in
      EPAEMAIL  63
      Please Sign On
      >ID EPAxxxx
   \
            1-14
1

-------
DIAL-UP
CONNECTION
You can get access to the Email services through a
dial-up connection via the EPA private data network
or a local call (DC users only).

Washington, DC Users - Option 1

You  can access the Email computers  directly by
calling the local Dialcom number as follows:

              738-0135
                           "C063
                           Please Sign On
                           >IO EPAxxxx
                              1-15

-------
Washington, DC Users - Option 2

You can access the Washington Information Center
data switch by dialing a local number. This number
is available through the EPANET command (if you
have other access to Email). Or you can call Email
User Support for help.
        WELCOME TO THE EPA NATIONAL COMPUTER CENTER

                HEADQUARTERS DATA SWITCH

        TO ACCESS                TYPE

        IBM (TTY)                 IBMPSI
        IBM 3270 EMULATION         TCP
        EPA/DIALCOM ELECTRONIC MAIL  EMAIL
        PRIME                    system name
        VAX                     system name
        MODEM POOL               MODEM. 999-9999
        OTHER SERVICES            HELP

                  NEED HELP?  TYPE HELP

        YOUR SELECTlON7>ecnall	
        Welcome to EMAIL I - Please enter a carriage return
        to continue
        To access EMAIL type LOGIN EPAxxxx -ON SYS63

        WIC1 -3671 /09 CONNECTED TO S0007002

        Login please
        login eoaxxx -on sys63
        Primecom Network 19 40 79 System 63

        Please Sign On
        > Password
             1-16

-------
 Users Outside DC Area via a Local EPA Data
 Switch

 You may be able to access your local data switch by
 dialing a  local number.  This number is available
 through the EPANET command (if you have other
 access to Email). Or you can call Email User Support
 for help.
         WELCOME TO THE EPA NATIONAL COMPUTER CENTER

            Please enter one of the following selections

             IBMP5I for IBM
             TCP for IBM 3270 EMULATION
             VAXA for VAX SYS A
             VAXB for VAX SYS B
             EMAIL for EMAIL



        Enter selection  email
J        Please Sign On                             |
        >IDEPAxxxx                             I
or
J       Please Sign On                             I
       >LOGIN EPAxxxx -ON SYS63                  I
            1-17

-------
Users Outside DC via a Local TYMNET Number

If you do not have local telephone access to the EPA
private data network, you may be able to obtain
access through a local call throuh the public TYMNET
network. When the connection is made, you will
either get a Termnal Identifier prompt or "garbage
characters".  In response to either of these, enter an
"A".  Then the following will appear:
       Please Login
       EPAEMAll 63
    ^' V+f Sn. -. J  ซ. •*




              . n.  ซ. *.   *.      If.    ป....   *. '  " ^
       Please Sign On
       >ID EPAxxxx
           1-18

-------
DISCONNECT-
ING FROM
EMAIL
Other Dial-Up Users

A limited number of 800 numbers  are available
through NCC-RTP.  Call NCC Telecommunication
Support at one of the telephone numbers listed below
for a valid 800 number:

             (919) 541-4506
             (FTS) 629-4506
             (800) 334-0741

When you are ready to end your Email session, enter
one of the following at the system level prompt(>):
                         off
                  or
                         lo
                             1-19

-------
SECTION 2     BASIC SERVICES
MAIL SERVICE
YOUR MAILBOX
The MAIL Service is an efficient alternative to the
traditional methods of writing letters and memos,
replying to incoming correspondence, sending time
critical items for overnight delivery, and general
filing of any resultant copies. MAIL is a computer-
based messaging service that allows you to electroni-
cally create, read, and distribute messages, instantly,
to or from anywhere throughout the Agency, at a time
convenient to you.

Each registered Email user is assigned a mailbox.
Your individual mailbox contains the messages you
have sent to other users and the messages other users
have sent to you. Your mailbox is a computerized In/
Out box, and each time you sign on or off the MAIL
service, the system displays the contents of your In
box.  Something like  the following example may
appear:

       Mail Call (1 read, 3 unread, Total 4)

You can also receive your In box status information at
any time by entering the following at the system level
prompt (or >):

       mailck

To access the MAIL service, type the following at the
system level prompt:

       mail

The system will display the Send,  Read or Scan:
prompt.  Send, read, and  scan are the three major
functions available to you. But, in addition, two other
functions are most useful.  To receive on-line help,
enter the following at any prompt:
                               2-1

-------
                           help

                    The system provides help information in accordance
                    with where you are in the system. For example, when
                    you type help at the Send, Read or Scan: prompt, you
                    will get explanations of commands that you can use
                    at this prompt.

                    To exit MAIL and return to the system level prompt,
                    enter the following at any prompt:

                           quit

HOW TO SEND      To send a message, enter the following at the Send,
MAIL              Read or Scan: prompt.

                           send

                    The system will respond with the following prompt:

                           To:

                    At the To: prompt, enter the IDs or familiar names of
                    your message recipients, placing a blank space be-
                    tween each ID or name. (Or you can enter the help
                    command to receive online help.)  Once the system
                    has verified that each recipient is in the Mail direc-
                    tory, it will display the Subject:  prompt. At the
                    Subject: prompt, enter a brief, one-line description of
                    your message.

                    Next you will receive the Text: prompt. At the Text:
                    prompt, enter your message. To receive on-line help,
                    enter the following on a line by itself, at the beginning
                    of a line:

                           .help
                               2-2

-------
               Note the use of the period preceding the command.

               Note that you must enter a RETURN or press the
               ENTER key at the end of each line. Text does not
               automatically wrap as it would in a PC word process-
               ing program.

               When you have finished entering your text, enter the
               following on a line by itself, at the beginning of a line:

                      .send

               You will  receive a message verifying that your mes-
               sage was sent. The system will display an interper-
               sonal message (IPM) number which uniquely identi-
               fies your message.

               The following is an example of sending a message:
Send. Read or Scan s
To User Support ex
Subject Email Training
Text
Are there any Email classes scheduled this month?
cc Pgm Mgr
s
Mai I Id  IPM-163-890228-150130293
User Support -Sent Express
Pgm Mgr -Sent
To q
                           2-3

-------
SEND OPTIONS
The following are the most common send command
options. (See Section 4, COMMAND SUMMARIES
for a complete list.)

Comm and/Meaning   Function

ex (express priority)   Places the message at the
                    "top" of the recipient's In box.
                    If the recipient is online, his
                    terminal will beep, and  a
                    message stating that an ex-
                    press  message  has been
                    placed in his In box will be
                    displayed.
                   cc (carbon copy)
                   be (blind copy)
                    Sends  a complimentary
                    (carbon) copy.

                    Sends a blind copy.
                   ar (acknowledgment  The system sends you an ac-
                   requested)          knowledgment  when  the
                                       message is read.
                    rr (reply requested)



                    quit

                    quiet
                    Forces the recipient to reply
                    to your message by display-
                    ing the Text: prompt.

                    Quits the MAIL service.

                    Suppresses the verifications
                    of to whom the message was
                    sent after the .sendcommand
                    is entered.
                   The send options can be entered at either the To: or
                   the Text: prompt. If entered at the To: prompt, the
                               2-4

-------
option(s) apply to all the recipients listed after it.  In
the following example, only C.User would get the ex-
press priority message.

       To: J.Doe A.Smith B.Jones  ex C.User

If entered at the end of the To: line, the option(s)
apply to all recipients listed. In the next example, all
recipients would receive the express priority mes-
sage.

       To: J.Doe A.Smith B.Jones C.User ex

To enter a send option at the Text: prompt, you must
include a period before the option, enter the option at
the beginning of a line, and have no other entries on
the line.  For example, to send a copy to Email User
Support, type in the following after you have entered
your text:

       .cc User.Support
       .s

If you change your mind about sending to one of your
recipients, you can remove the name without start-
ing over.  For example, you can use the following
command at the Text: prompt:

       .to -J.Doe

Or if you want to add a recipient, you can use the .to
command at the Text: prompt as follows:

       .to EPA1234

This command may  be particularly useful with a
distribution  (MAIL.REF)  list to  add or  remove a
recipient on a one-time basis.
           2-5

-------
HOW TO READ     To read a message, enter the following at the Send,
MAIL              Read or Scan: prompt:

                          read

                   The system will respond with the "header" associ-
                   ated with the mail message at the "top" of your
                   mailbox. The header tells you the basic facts about
                   the message, including its subject, who sent it, who
                   received copies of it, when it was sent, and how long
                   it is. After the header information, the system will
                   display the following prompt:

                          -More~

                   To continue reading,  press the ENTER key. At the
                   end of the text, the system will display a Disposition:
                   prompt. At this prompt, you must decide what to do
                   with the message.

             ป      Note that messages should be deleted as soon as pos-
                   sible. READ messages will be automatically deleted
                   after 30 days; UNREAD messages will be automati-
                   cally deleted after 60 days.  Disregard any system
                   message indicating  your  messages  have  been
                   AUTOFILED.

                   By default, the system allows you to read messages
                   in the following order:

                           1.  Express messages, most recent first.

                          2.  Remaining  messages in chronological
                              order.

                   The following is an  example of reading an Email
                   message:
                               2-6

-------
      Send. Read or Scan r
      To User Support (EPA0004)
      cc PgmMgr(EPAxxxx)
      From New User (EPAnnnn)  Delivered Tue 2B-Feb-89 1501 ESTSys 163(2)
      Subject Email Training
      Mai I Id IPM-163-890228-150130293
      --More--
      Are there any Email classes scheduled thts month?
      Disposition d
READ OPTIONS    You can use tne read options to tell the system which
                    messages you want to read.  The following are the
                    most common read command options. (See Section 4,
                    COMMAND SUMMARIES for a complete list.)

                    Commanj            Function

                    read unread          Reads unread mail.

                    read unread express   Reads unread express mail.

                    read from ID         Reads messages from a speci-
                                          fied Email ID.

                    The -More- prompt is displayed after the header
                    and after every 23 lines of text. The -More- prompt
                    serves two purposes: (1) it gives you the option to stop
                    reading a message, and (2) it gives you the time to
                    read the text before it scrolls off the  screen.   The
                    following options may be entered after the -More--
                    prompt:
                                2-7

-------
                   Command           Function

                   ENTER or yes        Continues the message.

                   no                  Skips  to  the  Disposition:
                                       prompt.

                   next                Skips to the next message.

                   The following options can be entered at the Disposi-
                   tion: prompt as well as the -More- prompt:

                   Command           Function

                   ENTER             Leaves message in mailbox
                                       and goes  to the next mes-
                                       sage.

                   reply                Allows you to type in a reply.

                   ap reply             Allows you to append a reply.

                   forward ID          Forwards the message to a
                                       specific Email ID.

                   delete               Deletes the message.

                   quit                Quits the MAIL service.

HOW TO SCAN     If you have several mail messages currently in your
MAIL              mailbox, you may find it convenient to scan through
                   the messages before deciding which one to read first.
                   The scan, or quick scan (qscan) command allows you
                   to scan your mailbox by displaying the message
                   "headers." A message header tells you who sent the
                   message, when it  was sent, the subject of the mes-
                   sage, and how long it is.
                               2-8

-------
                To scan you mailbox, enter the following at the Send,
                Read or Scan: prompt:

                        scan

                Headers of the messages in your mailbox are then
                displayed.

                If you enter the following at the Send, Read or Scan:
                prompt, the system will display condensed, one-line
                headers:

                        qscan

                After you have scanned your mailbox, the  Read or
                Scan: prompt appears. You can either read messages
                or perform  another scan.  If you perform  another
                scan, you will scan the entire mailbox again, not just
                the numbered list of messages displayed  on  your
                screen.  (This function includes any new messages
                received since the last scan.)

                The following is an example of scanning a mailbox:
Send, Read or Scan sc
      From      New User(E PAnnnn) Del I vered
               Tue 28-Feo-89 15 01 EST Sys 63
      Subject     Email Training
      Mai 11 d     I PM 163-890228-150130293

      From      Pgm Mgr (EPAxxxx) Del ivered
               Tue 28-Feb-89 16 34 EST Sys 63
      Subject     Monthly Status Rpts
      Mai 11 d     I PM 163-890228-17279999
Read or Scan r 2
                           2-9

-------
SCAN OPTIONS    The following are the most common scan command
                   options. (See Section 4, COMMAND SUMMARIES
                   for a complete list.)

                   Command           Function

                   scan unread         Scans only unread messages.

                   scan unread express  Scans only unread express
                                       messages.

                   scan from ID        Scans messages from a speci-
                                       fied Email ID.

                   The following command options are available at the
                   Read or Scan: prompt. (See Section 4, COMMAND
                   SUMMARIES for a complete list.)

                   Command     Function

                   read #        Reads a specific numbered message.

                   read # #      Reads a  series of specifically num-
                                 bered messages.

                   read #-       Reads from the  specified message,
                                 inclusive.

                   read -#       Reads up to the specified message,
                                 inclusive.

                   read #-#      Reads messages  # through #.

                   In the read option commands listed above, you can
                   substitute delete for read. Some examples follow:
                              2-10

-------
PCMAIL
SERVICE
CREATING A
MAIL MESSAGE
FILE
delete 3      Deletes message 3.

delete 3 5     Deletes messages 3 and 5.

delete 2-      Deletes all messages from 2 on.

The PCMAIL batch mail transfer service allows you
to send mail messages that you have created offline
on a PC or a word processor. Your messages are
transmitted directly from the PC floppy or hard disk
to another  user's  mailbox.  PCMAIL differs from
MAIL used with a prepared message file in two ways:

    •   PCMAIL allows you to prepare the en-
       tire process in one file to include the
       mail commands and the message text.
       This is very convenient if you have a
       series of messages or a number of recipi-
       ents.

    •   PCMAIL conserves the amount of time
       spent on the Email system itself, thus
       reducing the Agency's overall cost for
       Email.

The first step to using PCMAIL is to create the offline
"mail  message" file on your PC or word processor.
Keep in mind that this file must be an ASCII file.
Type into the file the messages that you want to send
along with a MAIL command line and a .send com-
mand for each message.  (See Section 3, HELPFUL
HINTS for more  information on Command Line
Mode.) At the end of the file, you must also type in the
.end command on a line by itself. The .end command
indicates to PCMAIL the end of the mail message
                              2-11

-------
                    file. In the following example, the mail message file
                    contains  two mail  messages.   The first  is  to
                    User .Support; the second is to "staff", a distribution
                    list containing several users.
      mall User Support ex su Special Request
      Please register me for your next Email
      class  Thank you
      s
      mall staff su Monthly Status Reports
      Email your monthly staff reports to me
      by Friday
      s
      end
HOWTOSEND
MAIL VIA
PCMAIL
After you have created the mail message file, save it
on your floppy disk or hard disk. Then access Email.

At the system level prompt,  enter  the  following
command:

       pcmail

At the Prepare your diskette prompt, use your PC
communication software to upload your mail mes-
sage file from your floppy or hard disk to your Email
ID.  The specific methods used to accomplish this
may vary according to your communications soft-
ware. For example, in Crosstalk you would press the
escape key and type send. Then Crosstalk asks for
the file name. Refer to the  instruction manuals for
your particular communications software for specific
directions.

After the mail message file has been uploaded, the
following notice will appear:
                                2-12

-------
                       Transfer complete.


                PCMAIL  then displays a confirmation as it mails
                each message for you.  When PCMAIL is finished
                mailing all the  messages in your message file, the
                system level prompt will be displayed.


                Note that if there is an error, such as a format error,
                in any of your messages, only the error-free messages
                will be sent. To display a description of the error, type
                the following at the system level prompt:


                       ty pcerror


                You can then return to your PC  to edit the mail
                message, correct the errors, and re-send the message.


                The following is an example of sending mail via
                PCMAIL:
>pcmail
PCMAIL version 30
Prepare your diskette and begin sending
Transfer complete 2 messages processed
Mailing 2 correct messages Please wait

-Mai I ing message l-
Item Mail User Support ex su Spec Req
2 lines loaded
User Support -Sent Express
-rial I ing message 2-
item mail staff si
item mail staff su Monthly Slat Rpts
2 lines loaded
AsslMgrl -Sent
AsslMgr2-Sent
All done  2 messages completed
                            2-13

-------
PCMAIL            PCMAIL options use the following format:
OPTIONS
                           >pcmail -optionl -option2...

                    The following are the most common PCMAIL op-
                    tions. (See Section 4, COMMAND SUMMARIES for
                    a complete list.)

                    Command
                    -check        Causes PCMAIL to check for errors
                                 in your mail  message file before
                                 sending the messages.  If PCMAIL
                                 finds any  errors, none  of the  mes-
                                 sages are sent, and you are returned
                                 to the system level prompt.

                    -echo         Displays the text of your messages as
                                 they are mailed.

                    -end         Allows you to substitute a command
                                 other than .end to indicate the end of
                                 your mail message file. For example,
                                 enter -end .done if .end is used for
                                 another function on your PC.

                    -linesize nn xx Allows you to  indicate or  change
                                 where  you want PCMAIL to insert
                                 carriage returns in your messages.
                                 If you enter -linesize 60 70, PCMAIL
                                 will insert a carriage return at the
                                 first blank space it detects between
                                 the 60th and 70th characters.

                    -stop         Allows you to pause and correct er-
                                 rors, such as format errors, while
                                 PCMAIL is in the process of mailing
                                 the messages in your message file.


                              2-14

-------
TEXT EDITOR
SERVICE
The Text Editor provided through Email is a basic
text processing program. With the Text Editor, you
can edit messages or create text files.  Remember,
however, it is a line editor, and its functions are not
as extensive as those of a word processor.

To edit your message, enter the following on a line by
itself:
                          .ed
                   Since messages are stored in the system line by line,
                   to edit a message you will need to move the cursor (see
                   list of cursor moving commands below) to each line
                   that you want to change and then enter a line chang-
                   ing command.  When you have finished editing your
                   message, save your changes with the following com-
                   mand:
                          save
TEXT EDITOR
COMMANDS
The system will display the More Text: prompt. At
this point, you can continue creating your message,
you can send your message, or you can enter the quit
command to delete the message.

The following are the most common Text Editor
Commands. (See Section 4, COMMAND SUMMA-
RIES for complete list.)

Command     Function
                    t

                    b

                    P
             Moves cursor to top of message.

             Moves cursor to bottom of message.

             Prints current line.
                              2-15

-------
                    Command     Function

                    p#           Prints a specified number of lines,
                                 beginning with the current line.

                    p*           Prints all lines, beginning with the
                                 current line.

                    n            Moves cursor to the next line.

                    n#           Moves cursor a specified number of
                                 lines down.

                    u            Moves cursor up one line.

                    u#           Moves cursor a specified number of
                                 lines up.

                    1 string       Moves cursor to the first line  con-
                                 taining the specified string.

LINE CHANGING    The following are the most common Line Changing
COMMANDS        Commands. (See Section 4, COMMAND SUMMA-
                    RIES for a complete list.)

                    Command     Function

                    c/current/new  Changes current string to new string.

                    a string       Appends string to end of current line.

                    r line         Allows you to retype current line.

                    i line         Allows  you to insert a line of text
                                 between current line and the  next
                                 line.
                              2-16

-------
Command     Function

d             Deletes line.

d#            Deletes a specified number of lines,
              beginning with the current line.

oops          Restores a line.

h             Displays the online help.
           2-17

-------
SECTION 3      HELPFUL HINTS
 MAIL
 DIRECTORY
SEARCH THE
MAIL DIRECTORY
An important feature of the MAIL service is the
MAIL directory. The MAIL directory contains the
familiar or directory names and IDs (EPAxxxx) of all
the Email users in the Agency.  In addition, the
directory contains the telephone number and organ-
izational information for each user. Since the direc-
tory contains familiar names as well as IDs, you do
not need to remember a user's ID when sending a
mail message. Either the familiar name or the ID is
a valid mail address. For example, to send a message
to  Email  User Support, you can use EPA0004 or
User .Support. Most people find the familiar names
easier to remember.

Every effort should be made to keep the MAIL direc-
tory up to date. If you have changes in your directory
entry, submit them to Email User Support.

In some instances, you may need to search the MAIL
directory for a particular ID or group of IDs. The next
topic explains how to search the directory. But before
experimenting with the DISplay DIRectory com-
mand, be aware that the EPA MAIL directory is quite
large.  If you  ask for a Display DIRectory without
specifying a particular ID or name, your terminal will
be busy for over 15 minutes while the entire directory
is displayed. If you find yourself in this predicament,
use the Break key or Ctrl-P to stop the screen display.

To search the MAIL directory for a particular ID,
enter  the following command at the Send, Read or
Scan:  prompt:

       dis dir ?EPAxxxx?

Where xxxx represents the particular ID. Be sure to
enter  the ? as indicated.
                               3-1

-------
                An example of searching for a specific ID is shown
                below:
>mall

Send. Read or Scan dls dlr 7EPA0004?

USER SUPPORT      I63EPA0004   CNTR-PMSB/NDPD/OARM-RTP OARM FTS 382-7539
                If you are not sure of the ID or the familiar name of
                an Email user, you can use the "wildcard"  search
                function of the MAIL directory. Enter the following
                command at the Send, Read or Scan: prompt:

                       dis dir ?name?

                Where name represents the character string you are
                looking for. A character string is any combination of
                letters, numbers, or punctuation marks.

                An example of searching using the "wildcard" func-
                tion is shown below:
>mall

Send. Read or Scan 
-------
                   The following commands can be used to control the
                   screen display while looking through the directory:
MAIL.REF FILE
                   Command

                   Ctrl-S

                   Ctrl-Q

                   Break or Ctrl-P
                 Function

                 Freezes the screen display.

                 Resumes the screen display.

                 Terminates the display and re-
                 turns you to the Send, Read or
                 Scan: prompt.
If you regularly send mail to the same group of users,
you may want to customize the MAIL service to meet
this particular need. This is easily done by creating
a distribution list of these frequently referenced
users. The distribution list is stored in a file named
MAIL.REF.  Once created, instead of entering each
recipient's ID at the To: prompt, you simply enter the
distribution list name, such as staff or ADP.Chiefs.

There are two types of MAIL.REF files:

    •   Public - Maintained by the Email User Sup-
       port Group and available to all users.

    •   Private - Created and maintained by an indi-
       vidual user and available  only to that user.

You can review the public distribution lists by enter-
ing the following command at the Send, Read or Scan:
prompt:

       dis ref
                               3-3

-------
Or you can search for a particular name in a public
distribution list by entering the following command
at the Send, Read or Scan: prompt:

       dis ref ?name?

If you would like to establish a public distribution
list, you can submit a request to Email User Support.
At the system level prompt enter the following com-
mand:

       request email .reflist

An online form is displayed for you to complete.

You can create your own private MAIL.REF file by
using the Email Text Editor.  To access the Text
Editor, enter the following command at the system
level prompt:

       ed

When you are in the input mode, enter the name of
your distribution list and skip a space. Then enter
the IDs or directory names of each user you want to
include in the list. Names are acceptable, but IDs
make your list more efficient. Precede each ID with
an asterisk (*) and separate IDs with a space.  If your
list includes more IDs than can fit on one line, begin
each new line with an ampersand  (&) followed by a
space.  Up to 500 IDs can be included.

When you are finished  creating your list,  press
RETURN and the system will display the Edit prompt.
Then enter the following command:

       save mail.ref
           3-4

-------
                    Mail options can also be added to a distribution list.
                    Use the noshow option in long distribution lists to
                    suppress the To: list.

                    An example is shown below:
     >ed
     INPUT
     staff noshow *EPAxxxx "EPAxxxx
     & "EPAxxxx "EPAxxxx

     EDIT
     >save mall ref
MAIL OPTIONS
DATE ACTIVATE
YOUR MAIL
Note that the instructions described above explain
how to initially create your own MAIL.REF file. If
you have already created a MAIL.REF file and you
want to add or delete entries in your file, enter the fol-
lowing command at the system level prompt:

       ed mail.ref

Then  use the Text Editor commands to make the
required changes or additions.

The following MAIL options can be used to customize
the Mail service to meet your needs.

The da option allows you to create a message and
delay its delivery. At the To: prompt, enter the
following:

       da m/d/y

Where m is the month, day is the day, and y is the
year.
                               3-5

-------
                   or

                         da m/d/y h:m

                   Where h:m is the time after which you want the
                   message sent. Time is expressed in terms of the 24-
                   hour clock.

                   For example:

                         To: USER.SUPPORT DA 2/10/89

PROTECT MAIL    The password option adds additional protection to a
WITH PASSWORD  message by prompting the recipient for a password
                   before the text is displayed.

            ป      Note that the recipient must know the password
                   before he can read the message.

                   To password protect a message, enter the following
                   at the To: prompt after the recipient's Email ID:

                         pa passwd

                   Where passwd is the message password which must
                   be 4 or more letters and no special characters.

SPECIAL READ    The following options are entered at the Send, Read
OPTIONS          or Scan:  prompt:

                   Command       Function

                   nomore          Turns off the  --More- prompt
                                   displayed  after  the message
                                   header.
                              3-6

-------
                    Command        Function

                    hardcopy         Turns off the —More— prompts
                                     displayed after every 23  lines.
                                     An entire message is displayed
                                     without pauses.  This option is
                                     particularly  useful if you are
                                     capturing the messages on disk
                                     to print out later.

                    read "char string"  Allows you to read all messages
                                     containing the specified charac-
                                     ter string in the  text.  If single
                                     quotes are used, allows you  to
                                     read all messages containing the
                                     character string  in the header
                                     subjects.

                    read all           Allows you to read all messages
                                     without any pauses.

                    read back         Allows you to read all messages,
                                     starting with the most recent.

                    read da mfdly    Allowsyou to read messages from
                                     a specified date.

TRACK YOUR       Mail options can also be used to track your messages.
MAIL               The following are entered at the Send, Read or Scan:
                    or the Read or Scan: prompt:

                    Command     Function

                    scan out       Allows you to check the headers of
                                  the messages in your Out box. At the
                                  Read or Scan: prompt you can delete
                                  any unread messages.
                               3-7

-------
                   read out      Allows you to read the messages in
                                 your Out box.  At the Read or Scan:
                                 prompt you can delete any unread
                                 message.

                   read check    Allows you (after you have scanned
                                 the messages) to see whether a re-
                                 cipient has read your message. At
                                 the Read or Scan: prompt, you can
                                 use one of the variations to indicate
                                 the message number from the scan
                                 out list, such as the following:

                                 re #   Checks specified message.

                                 re #-#  Checks a series of messages.

                                 rc#-  Checks  from a  specified
                                       message on.

                                 rc-#  Checks up  to a specified
                                       message.

SWITCH           Another user can quickly check his Email using your
BETWEEN EMAIL  terminal even if you are already signed on to the
IDs                system. The on command eliminates the time-con-
                   suming task of signing off and disconnectingfrom the
                   system and then reconnecting and signing on. To use
                   the on command, enter the following at the system
                   level prompt:

                          on EPAxxxx

                   Where xxxx is the other user's ID.  The system logs
                   you off and prompts the other user for his password.
                   Then you could use the on command again to recon-
                   nect to Email.  Often  someone who has to check
                   multiple mail IDs finds the on command very helpful.
                               3-8

-------
COMMAND
LINE MODE
CHANGE YOUR
PASSWORD
Command line mode allows you to enter several
commands at one time instead of waiting for each
command to execute, as in conversational mode.

Here are some examples:

       >mail r un fir d.jackson

This command line tells the system you wanted to
access the MAIL service and read all your unread
mail from d. Jackson.

       >mail h.williams su New Audit

This command line tells the system that you wanted
to access the MAIL service to send a message to
h.williams about the New Audit. Note that the send
command  is omitted because it is assumed as a
default.

Your password is a security code that prevents un-
authorized persons from using your Email ID.  For
security reasons, your password mustbe changed the
first time you access the system and at least every 90
days thereafter.

The password should be at least four characters.

For a nonprinting password, hold down the control
key while typing the letters of your password.

Caution: Do not use the letters H, L, M, O, P, Q, or S
in a nonprinting password. These letters have spe-
cial meanings in combination with the control key.

To change your password, type the following at the
system level prompt:
                               3-9

-------
NETWORK
PHONE
NUMBERS
       passwd

At the old password prompt enter your old (current)
password. The system will then ask you for your new
owner password. Just type in the new password and
then type it in again when the system asks for
verification.

The preferred access method to Email services  is
through the EPA private data network. This net-
work is available nationwide, and in most cases as a
local telephone call. To find the telephone number
for your location, enter the following at the system
level prompt:

       EPANET

The system displays a list of data switch telephone
numbers located throughout the country including
Regional Offices, Labs, EPA Headquarters, andNCC-
RTP.

If you cannot dial one of these telephone numbers
locally, you can indirectly access the Email services
through the EPA network via any local TYMNET
node. To display a list of TYMNET telephone num-
bers, enter the following at the system level prompt:

       NETWORK

Then answer the sequence of questions as follows:
                              3-10

-------
                   Prompt                Answer

                   Which Network?         TYMNET

                   Which State?           Two-character state ab-
                                          breviation.

                   Which City or Area Code? City name or area code

                   Then you will receive a list of local TYMNET tele-
                   phone numbers.

                   After you have dialed the number and have identified
                   your terminal type (see Section 1,  PRELIMINAR-
                   IES), the system will display a please login: prompt.
                   It is important to enter the following at the prompt to
                   route  your call to Email through the EPA private
                   data network.

                          EPAEMAIL:.63

                   It is important to use the EPA private data network
                   if at all possible!  TYMNET usage is 6 times more
                   expensive than the EPA private data network.
RECONNECT      'n ^ne unlikely event that the Email system goes
FEATURE         down in the middle of your session, use the Reconnect
                   feature to sign back on and continue with what you
                   were doing when you were unexpectedly terminated.

                   To use the Reconnect feature, sign back on the sys-
                   tem. The system displays a message stating that you
                   have a disconnected job with some information about
                   it. Then it will ask if you want to reconnect. Respond
                   with yes or no, as shown in the following example:
                              3-11

-------
     Please Sign On
     >ld EPAxxxx
     >Password password

     Olalcom Computer Sen/fees 194052(633
     Last on At 8 20 02/28/89 E5T
     < I other user under this Id)
     You have a Disconnected Job
     EPAxxxx dll I 213 Tl MAI I Scanning 7 1
     Do you want to Reconnect? n
     Mai I Call (4 Read)
TERM              The TERM command allows you to customize the
COMMAND         Email system defaults to work with your particular
                     terminal.  To display  your terminal's attributes,
                     enter the following at the system level prompt:

                            term -display

                     Then you can determine if you want to change any of
                     the characteristics.

                     One  common example of a change is to modify the
                     terminal line width.  If you need to send a message
                     with a line length longer than the normal 80 charac-
                     ters, enter the following at the system level prompt:

                            term widthxxx

                     Where xxx is your required line width which must be
                     between 8 and 255.

                     Another example of a change is to modify the kill
                     character. If your message includes an at sign (@),
                     you will have a problem sending the message because
                     the @ is the system kill character. To change the kill
                     character, enter the  following at the system level
                     prompt:
                                3-12

-------
HELP AND
MORE INFOR-
MATION
BULLETIN
BOARD
       term -kill *

Where * is the new kill character.

You can get immediate online assistance by entering
help or ? at any prompt. You will receive online help
instructions related to the command you are execut-
ing.

An online tutorial is also available.  It allows you to
teach yourself how to use the MAIL service. To access
the LEARN tutorial, type the following at the system
level prompt:

       LEARN

Additional assistance is available from the Email
User Support Group. Send them a message through
Email to USER.SUPPORT or call one of the following
telephone numbers:

             (FTS) 382-7539
             (202) 382-7539

An online  bulletin board or Tradepost for the EPA
Email Service is also available.  The Tradepost,
called EMAILNEWS, contains news and information
items specifically related to the Agency's Email sys-
tem and users. To access the EPA Email Tradepost,
type the following at the system level prompt:

       EMAILNEWS
                    or
                          EM
                    The following screen will then appear:
                              3-13

-------
f

s.
      Tradepost Version 3 0

      EPA EMAI LNEW5 BULLET IN BOARD

      Welcome to EMAILNEWS. a customized bulletin board for EPA

                                 NEW
      CATEGORY                   ITEMS
      "New Category

      ปAA> Emai I & Network News         0
      ปAB> EPA Emal I Documentat ton      0
      *AC> EPA HDO News & Announcements  0
      *AD> Regs/Labs News & Announcements 0
      *AE> NCC/RTP News & Announcements  0
      ปAF> EPA Email Request Forms      0
      *AG> Prime Systems News          0

      Category Menu
      •New Category

      ซAA> Email & Network News             *AB> EPA Email Documentation
      "AC> EPA HDO News & Announcements      MAD> Regs/Labs News & Announcements
      *AE> NCC/RTP News & Announcements      *AF> EPA Emal I Request Forms
      *AG> Prime Systems News
      Current category selection aa

      Ptost  RJead  SOan  Categories   Dtelete   OJptlons  Htelp

      Comm3nd
                       Once you have accessed EMAILNEWS, the available
                       commands are very similar to the commands used in
                       the basic MAIL service, for example, READ, SCAN,
                       QSCan, and Quit. A complete list of commands is as
                       follows:


                       Command     Function


                       P)ost           Post items to bulletin board.
                       R)ead          Read items posted to bulletin board.
                       SQan          Scan headers of items posted to bul-
                                       letin  board.
                       Categories    Select categories of special interest.
                                   3-14

-------
                Command     Function

                D)elete        Delete items posted to bulletin board.
                Options       Change user options.
                QSOan        Scan headers of items posted in ab-
                               breviated form.
                TP)check      Display tally of new items posted by
                               category.
                S)top          Exit from bulletin board.
                B)ack          Exit from bulletin board.
                Q)uit          Exit from bulletin board.
                H)elp          Display help messages.

                Only the most commonly used commands are dis-
                played onthe screen menu.

                Enter the letters) indicated in uppercase to execute
                the function.  For example, if you wanted to read EPA
                Email  Documentation, enter R and the  following
                screen would appear:
Command r

Category Menu
*New Category

*AA> Email & Network News
*AC> EPA HDO News & Announcements
*AE> NCC/RTP News & Announcements
*AG> Prime Systems News
ซAB> EPA Email Documentation
*AD> Regs/Labs News & Announcements
*AF> EPA Email Request Forms
Category ab

Ftorward.  Backward.  UJnread.  H)elp.   Item-
                If you choose to read forward, enter F and the earliest
                posted item will be displayed. If you choose to read
                backward, enter B and the latest posted item will be
                displayed.
                           3-15

-------
CHECK FOR NEW
INFORMATION
POST
INFORMATION
TO EMAILNEWS
In addition to documentation, the Email bulletin
board contains information targeted to individual
segments of the Agency (Regional Offcies) and spe-
cial user groups such as Prime system users.  The
Forms category contains up-to-date information on
the forms available through  Email,  such as the
mailbox registration request form. Other categories
will be added as required.

To check for new information on the bulletin board,
type the following at the system level prompt:

       >TPCHECK EMAILNEWS

or enter TP at the Command: prompt if you are
already in EMAILNEWS.

You will then receive a display of the number of new
items posted to each category.

To post an item to the bulletin  board, simply choose
P)ost at the menu and the category to which you
want to post the item. Complete the To: and Subject:
lines and enter your text. The format is very similar
to MAIL processing. Then finally, to post the item,
enter the following on a line by itself:

       .send

Remember that the bulletin board system manager
has established certain defaults such as expiration
dates. In  addition, items posted to some categories,
such as Email documentation and Forms, are re-
viewed before they are actually posted to the board.
                              3-16

-------
EXIT
EMAILNEWS
To exit from EMAILNEWS, type the following at any
prompt:

       quit
                  or
                             3-17

-------
SECTION 4     COMMAND SUMMARIES
MAIL Command Summary
Send To:
                            SEND
Command
ar
be
cc
dam/d/y[h:m]
dis dir ?EPAxxxx
dis dir 1stringl
ex (or ur)
help (or?)
noshow
pa password
quiet
quit
rr
Meaning
Acknowledgement requested.
Blind copy.
Carbon copy.
Date activate.
Search directory for ID.
Search directory for string.
Express (urgent) message.
Online help.
Suppress To: list.
Password protect message.
Suppress verification list.
Exit MAIL.
Immediate reply requested.
                          4-1

-------
MAIL Command Summary                      SEND


Subject:


Command             Meaning


help (or ?)             Online help.


quit                  Exit MAIL.



Text:

      K. —
             (Note the use of the period preceding the command.)


.again header         Display header again.

.ar                   Acknowledgement requested.

.be                   Blind copy.

.cc                   Carbon copy.

.da dimly [h.-m]        Date activate.


.dis                   Display text


.dis subject            Display subject.


.dis ref               Display reference directory.


.dis ref ?name?         Search reference directory for name.


.ed                   Edit message.
                             4-2

-------
MAIL Command Summary
                              SEND
Text:  (cont.)



Comnifind



.ex (or .ur)



.help (or?)



.hold



.noshow



.pa password



.quiet



.quit



JT



.send



.sp



.su [subject]



.to [-]name
Meaning



Express (or urgent) message.



Online help.



Hold message.




Suppress To: list.



Password protect message.




Suppress verification list.




Exit MAIL.



Immediate reply requested.




Send the message.



Check message spelling.



Change subject.



Add [or delete] ID from To: list
                            4-3

-------
MAIL Command Summary
                              READ
READ

Command

read

read all

read back


read dall

read dam

read dam/d/y

read dam Id ly-

read da-m/d/y

read da m/d/y-m/d/y

read ex (or ur)

read fr ID

read hardcopy


read nomore

read out

read 'string1
Meaning

Read messages.

Read messages without pausing.

Read messages in reverse order (most recent
first).

Read all messages and delete.

Delete all messages without reading.

Read message dated m/d/y.

Read message from date forward.

Read messages prior to specific date.

Read messages from one date to another.

Read express messages.

Read messages from ID.

Turn off-More- prompt after every 23 lines
of text.

Turn off initial --More- prompt.

Read messages in Out box.

Read message with string in subject.
                             4-4

-------
MAIL Command Summary
                             READ
READ (cont.)



Command



read "string*



read to ID



read un






--More--



RETURN or y         Continue.



no                   Stop reading.



(any Disposition: option)
Meaning




Read message with string in text.




Read messages to ID.




Read unread messages.
Disposition:




again



again header



ap forward



ap reply



crt



delete
Read message again.




Read header again.




Add comments; send to another user.




Reply to sender; append message.




Turn on -More- prompt.




Delete message.
                            4-5

-------
MAIL Command Summary
Disposition: (cont.)
Command           Meaning
dq
tID
help (or ?)
more
next
quit
reply
                            READ
reply all
Delete message and exit mail.
Forward message to ID.
Online help.
Turn on initial -More- prompt.
Read next message.
Exit MAIL.
Reply to sender of message.
Send reply to all recipients.
                           4-6

-------
MAIL Command Summary
                              SCAN
SCAN

Command

qsc

scboth

(any Read option)
Meaning

Display 1 line message headers.

Display message headers from In/Out box.
Read or Scan:

any Scan option or any Read option
delete #

dis dir ?EPAxxxx

dis dir ?string?

help (or ?)

quit

rcheck # (or re #)


read#

read**

read#-

read -#

read # - #
Delete a specific message.

Directory search for ID.

Directory search for string.

Online help.

Exit MAIL.

Check if recipient has read the specified
message.

Read a specific message.

Read message # and #.

Read from message #, inclusive.

Read up to message #, inclusive.

Read message # through #.

      4-7

-------
System Level Command Summary
Commands Available at the System Level Prompt (>)
Command            Meaning
epanet               Display EPA network numbers.
ed                   Access the Email Text editor.
emailnews (or em)
help (or ?)
learn
mail
mailck
network
off or lo
on EPAxxxx

passwd
pcmail
ty pcerror
term
Access EPA Email Tradepost.
Display help message.
Access online tutorial.
Access the MAIL service.
Check status of your In box.
Display public network numbers.
Sign off Email system.
Quick method to sign off one ID and sign on
another.
Change your password.
Access the PCMAIL service.
Display PCMAIL error file.
Set terminal attributes.
                            4-8

-------
Text Editor Command Summary
Cursor Moving Commands

Command             Meaning

b                     Move cursor to bottom of message.
1 string
n#

P

p#

P*

t

u

u#

#

w
Move cursor to line containing first occurrence
of string.

Move cursor to next line down.

Move cursor # lines down.

Print current line.

Print # lines, beginning with current line.

Print all lines, beginning with current line.

Move cursor to top of message.

Move cursor up one line.

Move cursor # lines up.

Move cursor to line number #.

Display current line number.
                            4-9

-------
Text Editor Command Summary

Line Changing Commands
Command

a string

c/string/new string


c/string/new string/g


c/string/new string/g*

d

d#

iline


oops

quit

r string

RETURN

save (filename)
Meaninga

Append string to end of current line.

Change first occurrence of string to new
string.

Change all occurrences of string on current
line to new string.

Change all occurrences of string to new string.

Delete current line.

Delete # lines beginning with current line.

Insert line between current line and the next
line.

Restore a line.

Ignore changes to file.

Retype current line.

Toggle between input/edit mode.

Save changes to (filename).
                            4-10

-------
PCMAIL Command Summary
Command

-check


-echo


end

-end xxx

-linesize # #


-If

-nobreak
Meaning

Send messages in your message file, only if all
messages are correct.

Display header and text of messages as they
are transmitted.

Signal the end of message file.

Specify another end of message file signal.

Insert automatic carriage return if blank
space detected between # #.

Echo a line feed to your terminal.

Disable BREAK key or Ctrl-P key.
                            4-11

-------
INDEX
A                  Acknowledgement                           2-4
                    ASCII file                                 2-11
                    Assistance                         1-2, 2-2, 3-13
                    At sign                                    3-12
                    Autofiled                                   2-6

B                  Backspace and erase                         1-2
                    Batch mail transfer service              1-3, 2-11
                    Blind copy                                  2-4
                    Break key                                  1-3
                    Bulletin board                             3-13

C                  Carbon copy                                2-4
                    Change password                            1-7
                    Check multiple IDs                          3-8
                    Checking mail                              2-1
                    Command line mode                         3-9
                    Communication methods                     1-8
                    Complimentary copy                         2-4
                    Confirmation, PCMAIL                     2-13
                    Connection, dial-up                          1-8
                    Connection, direct                           1-8
                    Contractor employee                         1-5
                    Control keys                                1-2
                    Cost savings                                1-8
                    Crosstalk                              1-7,2-12

D                  Data bases                                  1-3
                    Data network                      1-6, 1-7, 3-10
                    Data switch, RTF                           1-10
                    Data switch, Washington                    1-16
                    Date activate                               3-5
                    Delete read messges                         2-6
                    Delete unread messages                      2-6
                    Dial-up connection                      1-8, 1-15
                    Dialcom, Inc.                          1-1, 1-15
                    Direct connection                        1-8, 1-9
                    Directory                                   1-6


                             Index-1

-------
INDEX
Disconnecting from Email
Disk storage
Distribution list
E Editing MAIL.REF file
EDITOR
800 numbers
Email Coordinator
Email Quick Reference Guide
Email request form
Email services
Email System Manager
EMAILNEWS
Ending Email
Enter key
EPA data bases
EPA private data network
EPA Project Officer
EPANET
Equipment
Erase
Error
Ethernet
Exiting Email
Exiting EMAILNEWS
Express mail
Express messages
F Familiar name
First password
Format error
Freeze scroll
1-19
1-6
2-5, 3-3
3-5
1-3
1-19
1-4, 1-5
1-1
1-4
1-3
1-3
3-13
1-19
1-2
1-3
1-6, 1-7, 3-10
1-5
1-16, 1-17, 3-10
1-7
1-2
2-13
1-13
1-19
3-17
2-4
2-6
3-1
1-6
2-13
1-2
G
Group box                               1-7
H                Hardware                               1-7
                  Header                              2-6,2-9
                  Help                            1-2, 2-2, 3-13


                           Index-2

-------
INDEX
,






K


L


M









IBM Logical Mainframe
IBM Mainframe
Idle time
IDs
In/Out box
Initial password
Interpersonal message number
Interrupt
Kermit
Keys, special
Kill character
LEARN
Logical Mainframe
Logoff
MAIL
MAIL directory
MAIL options
MAIL service
Mail message file
MAIL.REF
Mailbox
Mainframe
Messaging service
More
1-9
1-9
1-6
3-1
2-1
1-6
2-3
1-3
1-7
1-2
3-12
3-13
1-7, 1-9
1-19
1-3
3-1
3-5
2-1
2-11
2-5, 3-3
1-4, 2-1
1-9
1-3
2-6, 2-7
N
NETWORK
Network
Network phone numbers
New user, password
New users
Newswires
Non-EPA employee
Nonprinting password
       3-10
1-6, 1-7, 3-10
       3-10
        1-6
        1-4
        1-3
        1-5
        3-9
                           Index-3

-------
INDEX
0

P













Q


R











S


Official Airlines Guide
Organization abbreviations
Password
Password, changing
Password, nonprinting
PCMAIL
PCMAIL options
PCMAIL services
Period, preceding command
Personal computer
Premium services
Prime
Private data network
Private distribution list
Project Officer
Public distribution list
Qscan
Quick scan
Quit
READ messages
Read mail
Read messages
Read options
Reconnect feature
Reference card, of phone numbers
Registration
Registration request form
Registration, online
Reply requested
Resume scroll
Return key
Scan mail
Scan options
Search, directory
1-3
1-4
1-7, 3-6
3-9
3-9
1-3
2-14
2-11
2-3
1-7
1-3
1-8, 1-11
1-6, 1-7, 3-10
3-3
1-5
3-3
2-9
2-8
1-19
1-6
2-6
2-6
2-7, 3-6
3-11
1-8
1-4
3-16
1-4
2-4
1-2
1-2
2-8
2-10
3-1
Index-4

-------
 INDEX
                   Security guidelines
                   Send mail
                   Send mail via PCMAIL
                   Send options
                   Sensitive communications
                   Signing up for Email
                   Special keys
                   Switch between Email IDs

T                 Telephone numbers                         1-8
                   TERM command                          3-12
                   Terminal                                  1-7
                   Terminal characteristics                    3-12
                   Text editor service                         2-15
                   Tracking mail                              3-7
                   Tradepost                                3-13
                   Training                                 3-13
                   Tutorial                                  3-13
                   TYMNET                           1-18,3-10
                   TYMNET node                            1-14

U                 UNREAD messages                         1-6
                   Unread messages                           2-6
                   Usage guidelines                           1-6
                   User Support                              1-2

V                 VAX                                 1-8, 1-12
                   Very Important Phone #s                    1-8

W                 Wildcard                                  3-2
                             Index-5
                               irUS GOVERNMENT PRINTING OFFICE 1990-727-090/07010

-------