Converting to DFSMSrmm from Control-T

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

Published 08 January 2004

cover image

ISBN-10: 073849884X
ISBN-13: 9780738498843
IBM Form #: SG24-6243-02
(768 pages)

More options

Rate and comment

Authors: Mary Lovelace, Norbert Schlumberger


DFSMSrmm is the IBM tape management system for OS/390 and z/OS platforms. As part of DFSMS, DFSMSrmm is completely integrated into the IBM storage management strategy. This allows easier installation and maintenance, as well as standard interfaces with other systems components, such as DFSMSdfp and DFSMShsm.

DFSMSrmm provides a simple and flexible tape management environment, with support for all tape technologies, including IBM automated tape libraries, manual tapes, and other tape libraries.

This IBM Redbooks publication is written for people who are planning to convert from Control-T to DFSMSrmm. We have designed this book to help you with all aspects of the conversion, from the early planning stage through implementation and customization of DFSMSrmm into your production system.

We provide details on the differences between DFSMSrmm and Control-T and compare the terminology, data, and functions. We also explain how to use the IBM-supplied sample conversion programs, validate the converted data, and prepare it for use in a production environment. Working samples that are ready for use both during and after conversion are included.

Table of contents

Chapter 1. Introduction
Chapter 2. Planning for conversion
Chapter 3. Preparing the environment
Chapter 4. DFSMSrmm ACS support
Chapter 5. Control-Tand DFSMSrmm
Chapter 6. Data Extraction
Chapter 7. Building the CDS
Chapter 8. Parallel running and validation
Chapter 9. Cutover to production
Chapter 10. Policy management
Chapter 11. Tailoring your DFSMSrm environment
Chapter 12. Reporting on your DFSMSrm environment
Chapter 13. Splitting and merging your DFSMSrmm CDS
Appendix A. Conversion checklist
Appendix B. Conversion record layouts
Appendix C. Security topics

Follow IBM Redbooks

Follow IBM Redbooks