Converting to DFSMSrmm from ICF-usercatalog

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

Published 03 February 2004

cover image

ISBN-10: 0738422622
ISBN-13: 9780738422626
IBM Form #: SG24-6244-01
(732 pages)

More options

Rate and comment

Authors: Mary Lovelace, Norbert Schlumberger

Abstract

DFSMSrmm is the IBM tape management system for OS/390 and z/OS platforms. As part of DFSMS, DFSMSrmm is completely integrated into the IBM storage management strategy. This allows an easier installation and maintenance, as well as standard interfaces with other system components, such as DFSMSdfp and DFSMShsm.

DFSMSrmm provides a simple and flexible tape management environment, with support for all tape technologies, including IBM automated tape libraries, manual tapes, and other tape libraries.

This IBM Redbooks publication is written for people who are planning to convert from ICF-usercatalog to DFSMSrmm. We have designed this book to help you with all aspects of the conversion, from the early planning stage through implementation and customization of DFSMSrmm into your production system.

We provide details on the differences between DFSMSrmm and ICF-usercatalog and compare the terminology, data, and functions. We explain how to use the IBM-supplied sample conversion programs and get the converted data validated and ready for use in a production environment. Working samples ready for use are included.

Table of contents

Chapter 1. Introduction
Chapter 2. Planning for conversion
Chapter 3. Preparing the environment
Chapter 4. DFSMSrmm ACS support
Chapter 5. ICF-catalog and DFSMSrmm
Chapter 6. Data Extraction
Chapter 7. Building the CDS
Chapter 8. Parallel running and validation
Chapter 9. Cutover to production
Chapter 10. Policy management
Chapter 11. Tailoring your DFSMSrm environment
Chapter 12. Reporting on your DFSMSrm environment
Chapter 13. Splitting and merging your DFSMSrmm CDS
Appendix A. Conversion checklist
Appendix B. Conversion record layouts
Appendix C. Security topics

Follow IBM Redbooks

Follow IBM Redbooks