Basic System Operations: Ibm I
Basic System Operations: Ibm I
Many of these topics provide an introduction and example, and then suggest
further resources for more detailed or advanced information.
Note: By using the code examples, you agree to the terms of the “Code license and
disclaimer information” on page 83.
To view or download the PDF version of this document, select Basic system
operations (about 565 KB).
You need Adobe Reader installed on your system to view or print these PDFs. You
can download a free copy from the Adobe Web site
(www.adobe.com/products/acrobat/readstep.html) .
Related reference:
“Related information for basic system operations” on page 82
IBM Redbooks® publications and other information center topic collections contain
information that relates to the Basic system operations topic collection. You can
view or print any of the PDF files.
You can access the system from character-based interfaces on an attached console
or emulator session and from the graphical user interface in System i Navigator.
The interface you need to use depends on your connection type to the system and
the task you need to perform. This topic describes how to access the system from
the character-based interface and discusses some functions of this access method.
Character-based interface
All system tasks are organized into categories accessible through the main menu.
You can enter menu selections to move through this hierarchy until you find the
task you are looking for. Different users might have different menu options
available to them, depending on the security strategy and on the restrictions set by
the system administrator and the active user profile. When you have found a
menu option you need to use, you can enter commands at the Selection or
Command prompt located at the bottom of the display. Many menu displays have
a name listed in the top-left corner of the display. You can use the GO command
followed by the name of the menu to access the menu display. For example, GO
JOB instructs the operating system to display the Jobs menu.
The character-based interface provides several methods for assisting users. First,
online help is available for many displays by pressing the help or F1 key. You can
often get help with a particular field or item by placing your cursor on it and then
pressing the help or F1 key. When you are entering data, you can also get help by
entering a ? in a data field. Finally, the amount and type of information displayed
on the display can be controlled by changing the assistance level. The assistance
level determines what version of a display you see. Many system displays have
two different versions:
v A basic assistance level version, which contains less information and does not use
technical terminology.
v An intermediate-assistance level version, which shows more information and uses
technical terms.
Some fields or functions are available only on a particular version of a display. The
instructions tell you which version to use. To change from one assistance level to
another, use F21 (Select assistance level). F21 is not available from all displays.
Related concepts:
“IBM i commands” on page 70
The operating system uses control language (CL) commands to interpret
instructions from users. You need to know the basic rules for using CL, and how to
get detailed help for any CL command.
Every device in the system has a current status that describes whether it is turned
on, and whether it is currently communicating with the system. Before a device
can function, both this device and all devices connecting it to the system must be
varied on (operational) and functioning. For example, if a communication line or
network adapter is varied off, any device attached to the system through those
devices cannot function.
Other types of status are possible for some specific device types, or to indicate a
specific problem. For example, a workstation that is waiting for a user to sign on
will have a status of Signon display, and a device that the operating system is
unable to locate will have a status of Resource not detected.
On System i Navigator, you can display the current status, physical location, and
configuration information for devices. To work with devices in System i Navigator,
expand Configuration and Service and select Hardware. To display detailed
information about the device, including its model, type and serial number, physical
location in the system, and logical address, right-click the device and select
Properties. Additionally, System i Navigator provides many functions for
managing tape devices, disk units, and pools. See the online help in System i
Navigator for more information.
To change the status or properties of a device, you must use the character-based
interface and type go device from any command line.
Related information:
Procedure
v To see a list of spooled files waiting specifically for printing, expand Basic
Operations, and then click Printer Output. This displays all spooled files
associated with the current user.
Right-click a spooled file to hold, release, move, or delete the print job, or
convert it to a PDF. Additionally, you can select Properties to change many of
the spooled file attributes.
v To work with other print jobs, select View > Customize this view > Include
from the System i Navigator menu.
v To see a list of all output queues, expand Work Management, and then click
Output queues. This will display all output queues for all users. An output
queue is an object that contains a list of spooled files to be written to an output
device, such as a printer.
Select any output queue to display the list of spooled files for that queue.
Starting printers
From the command-line interface, you can start a printer.
Procedure
1. Vary on the printer.
a. Enter WRKCFGSTS *DEV *PRT command. The Work with Configuration
Status display shows a list of devices.
b. Enter a 1 next to the printer device description to vary on the printer.
2. Use the Start Print Writer (STRPRTWTR) command to start the print writer, and
specify the printer and output queue (or queues) that the writer will service.
Procedure
1. From System i Navigator, select your system. Expand Basic Operations, and
click Printers.
2. If the status of the printer (shown in the right pane) is Unavailable, right-click
the printer and click Make Available.
3. Right-click the printer and click Start.
As a system operator, you might need to work with disk units and track their use
across your business. Removable storage devices are frequently used for backing
up the system and archiving data.
Related concepts:
Storage solutions
From the control panel, you can process the following system functions:
v Determine processor activity
v Display and get attributes or error codes to analyze problems
v Perform an IPL
v Turn on or off the system
You can use the physical control panel on the system or a remote control panel to
perform these operations. It might be helpful to you if you set up the virtual
control panel or the remote control panel. You can access control panel functions
and use APIs to operate your remote control panel with a user-written program.
Notes:
v If you have a partitioned system, only the primary partition can access the
control panel. All secondary partitions use the remote control panel through the
primary partition.
v The information in this topic pertains only to models 8xx and earlier. For all
other models, refer to the Managing the control panel functions topic collection
in the IBM Systems Hardware Information Center for more information.
Control panels include the virtual control panel, the remote control panel, and the
physical control panel. You can use these control panels to perform almost all of
the same functions. The remote control panel and virtual control panel provide a
way to perform control panel functions from a PC.
The physical control panel is your initial interface with the system. You can use the
physical control panel to perform functions, such as performing an initial program
load (IPL) and turning on and turning off the system. Control panel functions
range in complexity from functions that display status (such as IPL speed) to
low-level service functions that only service representatives can access.
Note: If the system has multiple partitions, some secondary partitions might not
start if they have been set to a status of hold.
Related concepts:
“Control panel buttons, lights, and indicators” on page 13
These figures illustrate the interface for each of the control panels, including the
buttons, lights, and indicators. The interface for the virtual control panel and
remote control panel are identical.
Related tasks:
Restarting and powering down a system with logical partitions
“Accessing control panel functions” on page 17
To access the control panel functions, follow these instructions, which apply to all
three kinds of control panels.
The remote control panel provides a way to use control panel functions through a
PC. The graphical user interface of the remote control panel looks similar to the
physical control panel.
With the virtual control panel, you can use control panel functions through a PC.
The graphical user interface for the virtual control panel is identical to the user
interface of the remote control panel. Also, the virtual control panel can perform
most of the same functions as the remote control panel. If your system uses a
keystick, the Mode button works with the same functions as the physical control
panel, depending on whether the keystick is inserted.
Unlike the remote control panel, the virtual control panel cannot turn on the
system. As an alternative, if you need to turn on the system at a later time, you
can use the IPL scheduling function in Operational Assistant by pressing the
Attention key. You can also use the GO POWER command and select option 2
(Change turn on and off schedule).
If you use the virtual control panel, be aware of the following considerations:
v The virtual control panel must have a direct connection to the system from
Operations Console using the serial console cable.
v The virtual control panel is only available while the Operations Console is
connected.
v You cannot use the virtual control panel remotely through a dial-up connection.
v You must meet several prerequisites when installing the virtual control panel,
such as a program temporary fix (PTF) for the server and service packs for the
client.
v If the PC has a parallel cable connection for a remote control panel, you must
remove it before you can install and use your virtual control panel.
v A unique service tools device profile must exist for each virtual control panel
connection.
v You cannot use an existing network name.
v More than one virtual control panel and remote control panel can be active at
the same time.
v To use the mode function provided by the virtual control panel, the service tools
user ID that is used to authenticate the connection must have the key privilege
How to choose between the virtual control panel and remote control panel
The following table shows which server models are recommended for the virtual
control panel and which models are recommended for the remote control panel.
Related concepts:
“Control panel buttons, lights, and indicators” on page 13
These figures illustrate the interface for each of the control panels, including the
buttons, lights, and indicators. The interface for the virtual control panel and
remote control panel are identical.
Related tasks:
“Accessing control panel functions” on page 17
To access the control panel functions, follow these instructions, which apply to all
three kinds of control panels.
Related information:
Operations Console Web site
There are few functional differences among these control panels. The main
difference is that the physical control panel and the remote control panel, when
cabled directly to the system, can turn on the system. The virtual control panel and
the remote control panel, if connected through a LAN, cannot turn on the system.
Notes:
1. Some control panel functions might not be available on all system types.
2. The x can be any number 0 through 9, any letter A through F, or a blank.
3. If you have selected a function, find the selected function in the table and
verify that you have completed the correct function.
4. If you cannot change the Function/Data display or complete the selected
function, contact your service provider.
The following table lists the codes and descriptions for each of the control panel
functions and whether each type of the control panel supports these functions.
Note: The remote control panel and virtual control panel recognize the presence of
a keystick. If your system uses a keystick, the Mode button works with the same
functions as the physical control panel, depending on whether the keystick is
inserted. LAN-connected remote control panels need special authority to use the
Mode button.
If you cannot find the function code in the previous table, the support for added
features or devices might not have been available when this information was
produced. Look for any supplemental unit function code information for the
function code you displayed on the control panel.
Related concepts:
“Instructions and descriptions for control panel functions” on page 19
Control panel functions can be classified into three categories: normal functions,
extended functions, and low-level debug functions. The remote control panel and
virtual control panel can perform most of these functions. The physical control
panel can perform all of them.
These figures illustrate the interface for each of the control panels, including the
buttons, lights, and indicators. The interface for the virtual control panel and
remote control panel are identical.
A keystick gives the operator security control over the control panel functions and
control over data that is accessible from the control panel. The keystick for the
electronic keylock activates the Mode button.
Related concepts:
“Physical control panel” on page 7
The physical control panel is your initial interface with the system. You can use the
physical control panel to perform functions, such as performing an initial program
load (IPL) and turning on and turning off the system. Control panel functions
range in complexity from functions that display status (such as IPL speed) to
low-level service functions that only service representatives can access.
“Remote control panel” on page 7
The remote control panel provides a way to use control panel functions through a
PC. The graphical user interface of the remote control panel looks similar to the
physical control panel.
“Virtual control panel” on page 8
With the virtual control panel, you can use control panel functions through a PC.
Related tasks:
“Accessing control panel functions” on page 17
To access the control panel functions, follow these instructions, which apply to all
three kinds of control panels.
To set up the remote control panel, you need to install Operations Console. Use the
Operations Console Configuration Wizard to select the remote control panel
functions.
The IBM i Access Operations Console Web site has specific instructions for setting
up your virtual control panel. You must have configured a local console directly
attached to the system for the virtual control panel to function. To configure a local
console directly attached to the system, you need to follow the instructions in
Operations Console. Be aware of those limitations and restrictions to the use of
virtual control panel functions in the installation instructions.
Related concepts:
“Remote control panel” on page 7
The remote control panel provides a way to use control panel functions through a
PC. The graphical user interface of the remote control panel looks similar to the
physical control panel.
If you use the virtual control panel or remote control panel, click the button where
the instructions say press. To use the control panel, follow these steps:
Procedure
1. If your physical control panel has a keystick, insert the keystick and press the
Mode button to select Manual mode. You must do this step even if you are
using the remote control panel or virtual control panel.
2. To select a function number, press the Increment or Decrement button on the
control panel until the function number you want is in the display.
3. Press Enter.
Results
The following figure shows a control panel with a keystick. It shows the following
items on the control panel:
v Power On indicator
v Power pushbutton
v System Attention light
v Function/Data display
v Increment and Decrement buttons
v Enter pushbutton
v Mode selector
v Electronic keystick slot
Related concepts:
“Physical control panel” on page 7
The physical control panel is your initial interface with the system. You can use the
physical control panel to perform functions, such as performing an initial program
load (IPL) and turning on and turning off the system. Control panel functions
range in complexity from functions that display status (such as IPL speed) to
low-level service functions that only service representatives can access.
“Remote control panel” on page 7
The remote control panel provides a way to use control panel functions through a
PC. The graphical user interface of the remote control panel looks similar to the
physical control panel.
“Virtual control panel” on page 8
With the virtual control panel, you can use control panel functions through a PC.
“Control panel buttons, lights, and indicators” on page 13
These figures illustrate the interface for each of the control panels, including the
buttons, lights, and indicators. The interface for the virtual control panel and
Note: The examples in the following topics show control panels with a 4-word (32
character) display. Control panels with a 1-word (8 character) display only show
the first word (8 characters) of each function.
Related concepts:
“Control panel functions” on page 9
There are few functional differences among these control panels. The main
difference is that the physical control panel and the remote control panel, when
cabled directly to the system, can turn on the system. The virtual control panel and
the remote control panel, if connected through a LAN, cannot turn on the system.
These instructions show how to use normal control panel functions 01 through 49.
Functions 21 through 49 are available when you select the Manual mode.
The instructions you follow for function 01 or 02 depend on whether your system
uses a keystick. Also, the following instructions for functions 01 and 02 alternate
between systems with a keystick and systems without a keystick.
Procedure
1. Does the control panel have an electronic keylock (a keystick)?
Results
Note: The function that is displayed is not activated until you press Enter on the
control panel.
Function 01 - Display Selected IPL Type and IPL Speed (on Systems with a
Keystick)
You can use this function to display the selected type and speed for the next IPL.
1. Display IPL types (A, B, C, or D).
2. Display IPL speed (F, S, SE, V=F, or V=S).
When selected, function 01 displays the currently selected IPL type and IPL speed
values (where each _ represents 1 character).
Function 01 - Display Selected IPL Type, Logical Key Mode, and IPL Speed (on
Systems without a Keystick)
You can use this function to display the selected IPL type, logical key mode, and
speed for the next IPL.
1. Display IPL types (A, B, C, or D).
2. Display the valid logical key modes (M or N).
3. Display IPL speed (F, S, SE, V=F, or V=S).
Function 02 with a keystick - Select IPL Type and IPL Speed Override (on
Systems with a Keystick)
Before you can use function 02, you must have the system in Manual mode. You
can change the IPL type with the system turned on or off. However, to select the
IPL speed override, you must turn off the system.
The following table shows the sequence used to select the IPL type on systems that
are turned on.
Table 5. Function 02 - Select IPL type on turned-on systems with a keystick
Function/data Action or description
0 2 _ _ _ _ _ _ _ _ _ _ _ _ _ _ Use the Increment or Decrement button to
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ scroll to function 02.
0 2 _ _ A < _ _ _ _ _ _ _ _ _ _ Press Enter to start function 02. The current
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ IPL type is displayed with a pointer.
0 2 _ _ B < _ _ _ _ _ _ _ _ _ _ Use the Increment or Decrement button to
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ scroll through the IPL types.
0 2 _ _ _ _ _ _ _ _ _ _ _ _ _ _ Press Enter to select the IPL type and exit
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ function 02.
0 1 _ _ _ _ _ _ _ _ _ _ _ _ _ _ Use the Increment or Decrement button to
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ scroll through the control panel functions.
The following table shows the sequence used to select the IPL type and IPL speed
on systems that are turned off.
Table 6. Function 02 - Select IPL type and IPL speed on turned-off systems with a keystick
Function/Data Action or Description
0 2 _ _ _ _ _ _ _ _ _ _ _ _ _ _ Use Increment or Decrement button to
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ scroll to function 02.
0 2 _ _ A < _ _ _ _ _ _ V _ _ _ Press Enter to start function 02:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ v The current IPL type is displayed with a
pointer.
v The current IPL speed is displayed.
0 2 _ _ B < _ _ _ _ _ _ V _ _ _ Use the Increment or Decrement button to
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ scroll through the IPL types and speeds.
Function 02 without a keystick - Select IPL type, IPL speed override, and Logical
key mode (on Systems without a Keystick)
You can use function 02 in either normal mode or manual mode. With the system
either turned on or off, this function allows you to select the IPL type and logical
key mode. Before you can select the IPL speed override, you must turn off the
system.
Turned-on systems
For turned-on systems without a keystick, function 02 is used to select the IPL
mode and logical key mode. The following table shows an example of the function
02 IPL type and logical key mode selection sequence for a turned-on system that
does not have a keystick.
Table 7. Function 02 - Select IPL type and logical key mode on turned-on systems without a
keystick
Function/data Action or description
0 2 _ _ _ _ _ _ _ _ _ _ _ _ _ _ Use the Increment or Decrement button to
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ scroll to function 02.
0 2 _ _ A < _ M _ _ _ _ _ _ _ _ Press Enter to start function 02.
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ v The current IPL type is displayed with a
pointer.
v The current logical key mode is displayed.
0 2 _ _ B < _ M _ _ _ _ _ _ _ _ Use the Increment or Decrement button to
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ scroll through the IPL types.
0 2 _ _ B _ _ M < _ _ _ _ _ _ _ Press Enter to select the IPL type.
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
0 2 _ _ B _ _ N < _ _ _ _ _ _ _ Use the Increment or Decrement button to
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ scroll through the logical key modes.
0 2 _ _ _ _ _ _ _ _ _ _ _ _ _ _ Press Enter to select the logical key mode
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ and exit function 02.
0 1 _ _ _ _ _ _ _ _ _ _ _ _ _ _ Use the Increment or Decrement button to
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ scroll through the control panel functions.
Turned-off systems
The system enables function 03 only when the key mode is Manual and the system
is turned on.
This function starts an IPL of the selected IPL type when you press the Enter
button. The system will load all the Licensed Internal Code.
Attention: No system shutdown is performed before IPL. The use of this function
can cause data loss.
The lamp test continues on the system control panel until you perform another
control panel function or a power procedure. The lamp test for the expansion unit
control panel is active for 25 seconds and does not flash.
Use this procedure to verify that the lights on the system control panel are
working correctly. If you cannot complete these steps, contact your service
provider.
1. Turn on the system.
2. Press the Increment or Decrement buttons on the control panel to display
function 04.
Press Enter on the control panel.
3. Do all of the lights and indicators on the system control panel flash on and off?
4. Do all the control panel lights on the expansion unit come on?
Yes End.
No Exchange the control panel on the expansion
unit.
In this format, RR represents the frame number where the failing unit is installed;
U represents the SPCN port to which the failing unit is connected; and rrr
represents unit reference code (URC).
Function 07
Function 08 is enabled only when the key mode is Manual and the system is
turned on.
Use this function when the system is suspended and you cannot turn off the
system.
The first time that you select function 08 and press Enter, the system displays an
attention SRC, 11 A1xx 8008. This SRC indicates that you selected Function 08. The
second time that you select function 08 and press Enter, you confirm the request to
turn off the system. To perform a fast turn off, see Stopping the system.
Attention:
v No system shutdown is performed before the initial program load (IPL). The use
of this function can cause loss of data.
v If the system password was changed at the most recent IPL, performing a fast
turn off might cause that new password information to be lost.
Functions 09 to 10 - Reserved
You must record SRC information for error reporting and contact your service
provider.
This function displays the machine type, model, processor feature code, hardware
level, and IPL path description in the following format:
t m m m c c c c _ _ _ _ _ _ _ _
h h h h _ _ _ _ i i i i i i i i
1 9401
2 9402
4 9404
6 9406
Values for iiiiiiii indicate the description of the system turn on or restart path:
This function makes DST available on the system console display. The Use
Dedicated Service Tools (DST) display appears on the primary or alternative
console.
To exit DST and return to the operating system, select the Resume operating
system display option on the Use Dedicated Service Tools (DST) display.
This function dumps main storage and processor data to the disk.
The first time that you select function 22 and press Enter, the system displays
attention SRC 11 A1xx 3022. This indicates that you selected function 22. To dump
main storage and system processor data to the disk, you must select function 22
again and press Enter.
Use this function only when a main storage dump is necessary, for example, after a
suspended (system hang) condition or after an operating system failure.
Attention: No system shutdown is performed before the main storage dump. The
use of this function can cause data loss.
In function 25, the service representative switch 1 is set. Function 25 is the first
step necessary to set the service function range (50 to 99).
In function 26, the service representative switch 2 is set. Function 26 is the second
step necessary to set the service function range (50 to 99).
This function puts the rack addresses in the correct order to show their position in
the system power control network (SPCN). Use it when you have added racks to
or removed them from the system.
Function 34 is enabled only for main storage dump (MSD) IPLs. You can use it
when the system is hung during the MSD IPL to try the IPL again without losing
the original dump information.
Related tasks:
“Stopping the system” on page 62
Turning off your system needs careful attention. If you turn off the system without
following this topic, data might be damaged, or the system might behave in
unpredictable ways.
The system enables service functions 50 through 70 when you select manual mode
and enter function 25 (service switch 1), then function 26 (service switch 2). You
use subfunctions with Functions 51 and 57 through 64.
Notes:
1. When a function has no data to display, FF is shown.
2. Some upper functions, 50 through 70, are not supported using the remote
control panel and virtual control panel, depending on connectivity.
Results
You can disable the service functions by selecting and entering either function 25
(service switch 1) or function 26 (service switch 2).
To disable functions 50 through 70, select function 25 and press Enter. Functions 50
through 70 are then no longer available.
Using Subfunctions
Attention: This function might cause the system to end abnormally. Use the
function only when directed to do so by your next level of support.
The data can be displayed 8 digits at a time. Select and enter a subfunction
number to display each word of data from 00 to 0F.
The following table is an example of a subfunction data display that shows Repeat
GARD information.
Table 10. Subfunction data display example
Function Subfunction Data Display
53 ** Subfunction mode entered
53 00 Clear memory, processor, L3
Repeat GARD
53 01 Enable memory, processor,
L3 Repeat GARD
53 02 Disable memory, processor,
L3 Repeat GARD
53 03 View enable/disable status
(E=Enabled, D=Disabled)
You can enable these functions by selecting Manual mode and selecting functions
25 and 26.
The remote control panel function of Operations Console provides a set of APIs
that system administrators can use to control the system through programs. The
APIs allow custom programs to interact with the system control panel and perform
many common system control panel functions.
You can use these APIs only if you are using the remote control panel that is
connected with the serial console cable. You cannot use these APIs with the virtual
control panel or remote control panel connected with a parallel cable.
The interface to the remote control panel APIs is established through a standard
TCP/IP socket connection. The socket connection can be implemented in any
programming language that supports sockets on the Windows platform (Java™ ,
C/C++, Visual Basic to name a few).
Procedure
1. Start Operations Console with the remote control panel function.
2. From a custom program, open a socket connection to port 2150 on the same
PC.
3. Send a supported command from the set of commands that are described
below (using uppercase and lowercase letters as shown for each API name).
4. Receive the byte stream that is sent back on the same socket connection.
5. Repeat steps 3 and 4 as necessary on the same socket connection.
6. Close the socket connection when done.
Results
Your program needs to interpret the byte stream that is sent back from the system.
The returned byte stream consists of a predefined format, which is the same for all
commands. The byte stream is at least 4 bytes long. Some commands return
additional bytes.
The first 2 bytes (0 and 1) will return the command status, typically successful or
unsuccessful. The next 2 bytes (2 and 3) will be a 16-bit number N, which tells
how many additional bytes will follow these first 4 bytes. If N is nonzero, then
there will be additional information in bytes 4 through 4 + N. This information
will be additional data related to the command, such as TRUE or FALSE.
Note: If the command sent is not one of the command strings defined below, then
the return code in bytes 0 and 1 of the return value will be 32 (0x20). This means
Command not Supported.
Your programs can perform the following control panel functions by using the
following APIs.
You can use these APIs to turn on and off the system and to perform and clear
panel lamp tests.
1 = Command unsuccessful
To perform the panel lamp test, you can use the DoLampTest API.
1 = Command unsuccessful
To clear the panel lamp test results, you can use the ClearLampTest API.
1 = Command unsuccessful
To turn off the system, you can use the PowerOff API.
1 = Command unsuccessful
IPL-related APIs:
You can use these APIs to set initial program load (IPL) modes, types, and speed,
and to start an IPL.
To set the system initial program load (IPL) mode to Manual, you can use the
SetIPLModeManual API.
You must insert a key to use this command (on systems with a keystick).
1 = Command unsuccessful
To set the system initial program load (IPL) mode to Normal, you can use the
SetIPLModeNormal API.
You must insert a key to use this command (on systems with a keystick).
1 = Command unsuccessful
To set the system initial program load (IPL) mode to Auto, you can use the
SetIPLModeAuto API.
You must insert a key to use this command (on systems with a keystick).
1 = Command unsuccessful
To set the system initial program load (IPL) mode to Secure, you can use the
SetIPLModeSecure API.
You must insert a key to use this command (on systems with a keystick).
1 = Command unsuccessful
To set the system initial program load (IPL) type to A, you can use the
SetIPLTypeA API.
You must insert a key to use this command (on systems with a keystick). The
system must be in Manual mode.
1 = Command unsuccessful
To set the system initial program load (IPL) type to B, you can use the SetIPLTypeB
API.
You must insert a key to use this command (on systems with a keystick). The
system must be in Manual mode.
1 = Command unsuccessful
To set the system initial program load (IPL) type to C, you can use the
SetIPLTypeC API.
You must insert a key to use this command (on systems with a keystick). The
system must be in Manual mode.
1 = Command unsuccessful
To set the system initial program load (IPL) type to D, you can use the
SetIPLTypeD API.
You must insert a key to use this command (on systems with a keystick). The
system must be in Manual mode.
1 = Command unsuccessful
Starting an IPL:
To start a system initial program load (IPL), you can use the StartIPL API.
1 = Command unsuccessful
To set the system initial program load (IPL) speed to Fast, you can use the
SetIPLSpeedFast API.
1 = Command unsuccessful
8 = System turned On
To set the system initial program load (IPL) speed to Slow, you can use the
SetIPLSpeedSlow API.
1 = Command unsuccessful
8 = System turned On
To set the system initial program load (IPL) speed to the default value, you can use
the SetIPLSpeedDefault API.
1 = Command unsuccessful
8 = System turned On
You can use these APIs to start dedicated service tools (DST), to start a main
storage dump (MSD), and to disable continuously powered main storage.
You can use the StartDST API to start the dedicated service tools (DST) on the
primary or alternative console.
1 = Command unsuccessful
To start a main storage dump (MSD), you can use the StartMSD API.
1 = Command unsuccessful
To disable the continuously powered main storage (CPM) on the system, you can
use the DisableCPM API.
1 = Command unsuccessful
8 = System turned On
Is CPM present?:
You can use the GetCPMPresent API to determine whether the continuously
powered main storage (CPM) is present on the system.
Is CPM enabled?:
You can use the GetCPMEnabled API to determine whether the system has
continuously powered main storage (CPM) enabled.
To determine whether the system has a keystick inserted, you can use the
GetKeyInserted API.
To determine whether you have the system powered on, you can use the
GetPowerOn API.
To determine whether the attention light is on, you can use the GetAttentionLight
API.
Is SPCN present?:
You can use the GetSPCNPresent API to determine whether the system powered
control network (SPCN) is present on the system.
To determine the system initial program load (IPL) mode, you can use the
GetIPLMode API.
To determine the system IPL type, you can use the GetIPLType API.
To determine the system initial program load (IPL) speed, you can use the
GetIPLSpeed API.
To determine the system type and model numbers, you can use the
GetType&Model API.
To return the system powered control network (SPCN) system reference code
(SRC), if available, you can use the GetSPCNSRC API.
To return all the system reference codes (SRCs) 1 through 9, if available, you can
use the GetSRCs API.
Note: The procedures for starting and stopping the system depend on whether
you have a partitioned system. The following instructions are relevant only for a
system without logical partitions. If you have a partitioned system without the
Basic system operations 43
Hardware Management Console, see Restarting and powering down a system with
logical partitions. If you have a partitioned system with the Hardware
Management Console, see Partitioning with IBM i.
Note: Several system values determine the available options for starting and
stopping the system.
The control panel displays a series of system reference codes that indicate its
current status and warn you of any problems. When the IPL is finished, the
character-based interface presents the sign-on display, and users can sign on with
System i Navigator.
During the IPL, the control panel displays a series of system resource codes (SRCs)
indicating the current system activity.
Prerequisites
This procedure assumes that the system is running, and requires that several
additional conditions be met before you begin an IPL. While most of these settings
are the default values, you must verify them if you are unsure.
v The IPL mode for the system must be set to Normal (unattended IPL).
v The Type of restart (QIPLTYPE) system value must be set to unattended (0).
v Turn on any devices, such as display stations, printers, tape devices, and
controllers, that you or others want to use.
Situation
Unattended IPLs reset system storage and recognize any configuration changes
automatically. The amount of time required for any IPL depends on the size and
complexity of the system, ranging from a few minutes to several hours. When the
unattended IPL is complete, the sign-on display appears on the display station.
Note: More options are available for the End System (ENDSYS) and the End
Subsystem (ENDSBS) commands, for example, to set delay time.
2. Type WRKSBS to verify that the controlling subsystems have ended and are in
the restricted state. The subsystems status must be RSTD.
3. Type PWRDWNSYS *IMMED RESTART(*YES) on any command line and press
Enter.
When the unattended IPL is done, the sign-on display appears on the display
station.
Related concepts:
“Operating mode of an IPL” on page 51
The operating mode determines the number of options that are presented to the
operator for consideration during and after the initial program load (IPL). It can
also secure (lock) the control panel to prevent an unauthorized or inadvertent IPL
from the control panel.
“System values that control IPL” on page 65
You can use these system values to control the type of initial program load (IPL)
and the way the system performs an IPL. You can now work with all system
values in System i Navigator.
Subsystems
“Scheduling a system shutdown and restart” on page 56
You can set up a schedule that automatically turns your system on and off at the
time of day you set. You can also specify special circumstances that change the
normal daily schedule, such as a holiday or special closing.
Related tasks:
Restarting and powering down a system with logical partitions
Related reference:
ENDSYS (End System) command
ENDSBS (End Subsystem) command
Prerequisites
This procedure assumes that the system is running, and requires that several
additional conditions be met before you begin an initial program load (IPL). Most
of these settings are the default values, but you must verify them if you are unsure
of the current setting.
v The IPL mode for the system must be set to Manual (attended IPL).
v The Type of restart (QIPLTYPE) system value must be set to attended (1).
Situation
If you want to change IPL options, install the operating system, use dedicated
service tools, work with logical partitions, or recover from a system failure, you
need to perform an attended IPL. This IPL mode requires that you respond to
several prompts during the startup sequence.
Note: More options are available for the End System (ENDSYS) and the End
Subsystem (ENDSBS) commands, for example, to set delay time.
2. Type WRKSBS to verify that the controlling subsystems have ended and are in
the restricted state. The subsystems status must be RSTD.
3. Type PWRDWNSYS *IMMED RESTART(*YES) on any command line and press
Enter.
After you begin the attended IPL, the system displays the IPL options display
where you can choose which options you want to work with during the IPL.
During the IPL, the system displays any options that you selected, or that are
required due to system changes.
Related concepts:
“Operating mode of an IPL” on page 51
The operating mode determines the number of options that are presented to the
operator for consideration during and after the initial program load (IPL). It can
also secure (lock) the control panel to prevent an unauthorized or inadvertent IPL
from the control panel.
“System values that control IPL” on page 65
You can use these system values to control the type of initial program load (IPL)
and the way the system performs an IPL. You can now work with all system
values in System i Navigator.
Subsystems
“Changing your password” on page 60
During the installation of the IBM i licensed program, you might need to enter the
system password for the initial program load (IPL) to continue.
Related reference:
ENDSYS (End System) command
ENDSBS (End Subsystem) command
During an attended initial program load (IPL), your display station or console
displays any required or selected displays.
The following displays appear during the IPL, if you select them on the IPL
options display:
v Set major system options
v Define or change the system
The Set Major System Options display allows you to select automatic
configuration, the type of device configuration naming, and the special
environment in which you want to run.
Procedure
1. Type the new values over the existing values in the following fields:
v Enable automatic configuration
– Y (Yes) automatically configures local devices.
– N (No) indicates no automatic configuration.
v Device configuration naming
– *NORMAL uses a naming convention unique to the IBM i platform; for
example, DSP01 and PRT01 for displays and printers, TAP01 and OPT01
for tape and CD-ROM devices.
– *DEVADR uses a naming convention which is obtained from the device
resource name, for example, DSP010203 for a display station, PRT010203
for a printer, TAP01 and OPT01 for tape and CD-ROM devices.
v Default special environment
– *NONE indicates that there is no special environment.
2. Press Enter.
On the Define or Change the System at IPL display, you can change the system
configuration, system values, user profiles, and system, network, object, or file
attributes during the initial program load (IPL).
This display is shown when you type Y (Yes) in the Define or change the system at
IPL field on the IPL Options display.
Procedure
1. Select any of the following options:
v To change the way the system starts, select option 3 (System value
commands).
v To change any of the other options, select them before exiting and continuing
the IPL.
2. When you finish using the options on this display, press F3 (Exit and continue
IPL) to continue the IPL.
Related concepts:
Applications use access paths to determine the order of records in a database file.
If the access paths have changed, use the Edit Rebuild of Access Paths display to
reconstruct them.
Access paths define the order that records in a database file are organized for
processing by a program. If there are access paths to rebuild, the Edit Rebuild of
Access Paths display is shown after the IPL Options display.
Tip: Use the online help information about this display to get more information
about each column and field.
A message notifies you that a journal needs to perform an access path recovery. A
journal is a system object. It is used to record entries in a journal receiver when a
change is made to an object associated with the journal. Any access path that is
recoverable (because it was recorded) is not shown on this display. The IPL
threshold indicates that access paths with a sequence less than or equal to the
number specified will be rebuilt at IPL time. It is a value from 1 through 99 that
you can set (the default is 50). If the IPL threshold changes, all access paths with a
status of IPL and AFTIPL changes to reflect the new status of the IPL threshold.
Procedure
v To change the sequence of access paths that are rebuilt, follow these steps:
1. Make any changes to the Seq column.
2. Press Enter.
v If you do not want to change the sequence, press Enter. The Display Access Path
Status display is shown if there are access paths left to be rebuilt.
Results
Tip: Press Enter to continue with the IPL from the Edit Rebuild of Access Paths
display.
If you press F3 (Exit and continue IPL), the access paths are rebuilt while the IPL
continues. If you press F12 (Cancel), you return to the Edit Rebuild of Access Paths
display.
Every 5 seconds, the display is updated with the current run time. After all the
access paths have been rebuilt (access paths with a sequence less than or equal to
the IPL threshold), the IPL continues.
Some physical files might have restrictions placed on them. These restrictions need
to be verified during an initial program load (IPL). On the Edit Check Pending
Constraints display, you can verify the status of these physical files.
During an attended IPL, the Edit Check Pending Constraints display is shown if
there are constraints to be verified. A constraint is an attribute that places a
restriction or limitation on a physical file.
Tip: Use the online help information about this display to get more information
about each column and field.
On the Edit Check Pending Constraints display, you can change the sequence (1
through 99) of the constraints to be verified. If the constraint has a sequence less
than or equal to the IPL threshold, it is verified during the IPL. If a constraint has
a sequence greater than the IPL threshold, it is verified after IPL. The sequence
*HLD indicates that the constraint is not verified until it is changed to a number
from 1 through 99. When the IPL threshold changes, all constraints with a status of
IPL or AFTIPL are changed to reflect the new status of the IPL threshold.
Procedure
v To change the sequence of check pending constraints, follow these steps:
1. Make any changes to the Seq column.
2. Press Enter.
v If you do not want to change the sequence, press Enter. The Display Constraint
Status display is shown if there are constraints left to be verified.
If you press F3 (Exit and continue IPL), the constraints are verified while the IPL
continues. Every five seconds, the display is updated with the current run time.
After all constraints with IPL status have been verified, the IPL continues. If you
press F12 (Cancel), you return to the Edit Check Pending Constraints display.
The Increment/Decrement buttons are used to change the IPL type and mode on
systems without a mode button. Use Function 02 to select the IPL type (A, B, or D)
and mode (normal or manual). To select the IPL type and mode from the control
panel, follow these steps:
Procedure
1. Use the Increment/Decrement buttons to select Function 02, and press Enter.
2. Use the Increment/Decrement buttons to select the IPL type and mode you
want, and then press the Enter button to save.
3. Optional: To specify a fast or slow IPL that can only be set one time at the
console panel when the system is turned off, follow these steps:
a. Select Function 02 and press Enter twice.
b. Use the Increment/Decrement buttons to select F (Fast), S (Slow), or V
(Value from IPL attributes).
Basic system operations 49
Results
The Hardware diagnostics IPL attribute determines the type of subsequent IPLs.
*MIN is the preferred setting. However, if you anticipate any hardware problems,
specify *ALL on the Hardware diagnostics parameter. Use the Change IPL
Attributes (CHGIPLA) command to change the IPL attribute.
Related tasks:
Restarting and powering down a system with logical partitions
IPL type:
The IPL type determines which copy of programs your system uses during the
initial program load (IPL).
Attention: Do not use this function. Data loss can occur with improper
use of this function.
IPL type D
Use IPL type D when directed for special work, such as installing and
reloading programs.
IPL type D loads the system programs from an alternate IPL load source,
such as a tape drive or CD-ROM.
Typically an IPL uses programs that are stored on the primary IPL load
source (typically a disk drive). Sometimes it is necessary to perform an IPL
from another source, such as programs that are stored on tape. To do this,
you must use IPL type D to perform an IPL from the alternate IPL load
source.
Use IPL type D only during one of the following situations:
The operating mode determines the number of options that are presented to the
operator for consideration during and after the initial program load (IPL). It can
also secure (lock) the control panel to prevent an unauthorized or inadvertent IPL
from the control panel.
By changing IPL types, you can perform an initial program load (IPL) from the
load-source media or from an alternate load source media. With this operation, you
can apply fixes (PTFs). By changing the operating mode, you have several options
in controlling the IPL.
Changing the IPL type and the operating mode for systems with a keystick
To change the IPL type and the operating mode for systems with a keystick, follow
these steps:
1. Insert the keystick.
2. Use the Mode button to scroll through the four operating modes (Manual,
Normal, Secure, and Auto) and select the Manual mode.
Note: An indicator light on the control panel shows the active mode.
3. Use the Increment or Decrement button to select function 02 (only available in
Manual mode), and press the Enter button.
4. Use the Increment or Decrement button to select the required IPL type (A, B, C,
or D) and press the Enter button.
Changing the IPL type and the operating mode for systems without a keystick
To change the IPL type and the operating mode for systems without a keystick,
follow these steps:
1. Use the Increment or Decrement button to select function 02, and press the
Enter button.
Note: The control panel displays both the IPL type and the operating mode.
For example, B_N indicates a B type IPL in a normal mode.
Related concepts:
“IPL type” on page 50
The IPL type determines which copy of programs your system uses during the
initial program load (IPL).
“Operating mode of an IPL” on page 51
The operating mode determines the number of options that are presented to the
operator for consideration during and after the initial program load (IPL). It can
also secure (lock) the control panel to prevent an unauthorized or inadvertent IPL
from the control panel.
System values control information that affects the operation of certain parts of the
system. On the System Value Commands display, you can change system values
that affect initial program load (IPL) or other areas of the system.
This display is shown when you type a Y (Yes) in the Define or change the system
at IPL field on the IPL Options display (see step 6).
Some system values that you change do not take effect until the next IPL, while
others take effect immediately.
Security considerations
The autostart job in the controlling subsystem transfers control to the program that
is specified in the startup program to set the QSTRUPPGM system value. You can
tailor this program.
You can create your own program and change the Startup program to set up the
QSTRUPPGM system value to that program name. Or, you can use the program
QSTRUP in the QSYS library as a base to create your own program. To do this,
follow these steps:
Procedure
1. Use the Retrieve CL Source (RTVCLSRC) command to retrieve the source of the
program, for example, RTVCLSRC PGM(QSYS/QSTRUP) SRCFILE(YOURLIB/
YOURFILE)).
2. Change the program.
3. Use the Create Control Language Program (CRTCLPGM) command to create
the program, and then save it to your own library.
4. Test the program to ensure that it works.
5. Change the Startup program to set up the QSTRUPPGM system value to the
program name and library you specified on the CRTCLPGM command.
Related concepts:
Restart system values: Start-up program to set up system
Here you can check the detailed source information for the CL Startup program.
Note: By using the code examples, you agree to the terms of the “Code license and
disclaimer information” on page 83.
QSYS/STRSBS SBSD(QSERVER)
MONMSG MSGID(CPF0000)
QSYS/STRSBS SBSD(QUSRWRK)
MONMSG MSGID(CPF0000)
QSYS/RLSJOBQ JOBQ(QGPL/QS36MRT)
MONMSG MSGID(CPF0000)
QSYS/RLSJOBQ JOBQ(QGPL/QS36EVOKE)
MONMSG MSGID(CPF0000)
QSYS/STRCLNUP
MONMSG MSGID(CPF0000)
QSYS/STRSBS SBSD(QINTER)
MONMSG MSGID(CPF0000)
QSYS/STRSBS SBSD(QBATCH)
MONMSG MSGID(CPF0000)
QSYS/STRSBS SBSD(QCMN)
MONMSG MSGID(CPF0000)
DONE:
QSYS/STRSBS SBSD(QSPL)
MONMSG MSGID(CPF0000)
CALL PGM(QSYS/QWCSWTRS)
MONMSG MSGID(CPF0000)
NOWTRS:
RETURN
CHGVAR VAR(&CPYR) VALUE(&CPYR)
ENDPGM
The program to set the QSTRUPPGM system value is the startup program. The
QSTRUPPGM system value specifies the name of the program that is called from
an autostart job when the controlling subsystem is started. This program performs
setup functions, such as starting subsystems and printers.
The default startup program QSTRUP in library QSYS performs the following
actions:
v Starts the QSPL subsystem for spooled work
v Starts the QSERVER subsystem for file server work
v Starts the QUSRWRK subsystem for user work
v Releases the QS36MRT and QS36EVOKE job queues if they were held (these are
used by the System/36 environment)
v Starts Operational Assistant cleanup, if allowed
v Starts all printer writers unless user specified not to on the IPL Options display
v If the controlling subsystem is QCTL, it starts the QINTER, QBATCH, and
QCMN subsystems
Table 12. Details of the default startup program QSYS/QSTRUP
Type Length Shipped CL value
Character 20 QSTRUP QSYS
For some systems, you might want to regularly schedule routine shutdowns and
startups. The operating system supports this function by allowing you to define a
schedule that alerts users to an upcoming shutdown, and then waits a predefined
amount of time to allow users to finish their work and sign off. For example, you
can define a schedule that must shut down your system Friday night and start it
again Monday morning. The schedule also allows you to define a message that is
sent to any signed-on users, and to specify how long to wait between sending the
message and beginning the shutdown sequence.
The power-on and power-off schedule ensures that the system is turned on and off
at specific times during the day or night. You can view this schedule.
Procedure
1. On any command line, type go power and press Enter.
2. Select option 1 (Display power-on and power-off schedule) on the Power On
and Off Tasks menu.
Results
The power-on and power-off schedule shows the date, day, and time (using the
24-hour clock) that the system will be turned on and off. The Description column
includes comments about those days that have been changed from the system's
regular schedule. Any user can display this schedule.
To set up your own power-on and power-off schedule, select option 2 (Change
power on and power off schedule) on the Power On and Off Tasks (POWER)
menu. On the Change Power On/Off Schedule display, press F10 (Change power
on/off defaults).
On this display, you can change the first day of the week by typing a number in
the First day of week field. Also, the system automatically sends users a message
telling them when the system will be turned off. In the Minutes before turning off
to send field, you can indicate the number of minutes before turning off that you
want the system to send this message.
When the system sends the power off message, you can delay the scheduled time
for turning off from 30 minutes to 3 hours when you reply to the message. Then
the system will wait the time specified before turning off. You do not have another
chance to delay the time.
For example, if you want the system turned on at 7:30 a.m. and off at 8:00 p.m. on
Saturdays and Sundays, type the new times in the Default Power On and Default
Power Off columns next to Saturday and Sunday. When you press Enter, your
changes are shown on the Display Power On/Off Schedule and the Change Power
On/Off Schedule displays.
You can create a one-time scheduled shutdown and startup, without adjusting the
default schedule.
Use the Change Power On/Off Schedule display to change the power-on and
power-off schedule for a single day.
Procedure
1. Type 14:30 in the Power Off column to turn the system off at 02:30 p.m. so the
employees can attend the picnic.
2. Type the reason for the change, Closing - Company picnic, in the Description
column across from the date and time and press Enter.
3. Type the start time 05:30 in the Power On column to turn the system back on
Thursday, May 4.
Results
To display the schedule starting on a different date, type the date you want to start
with in the Start list at field and press Enter. The information that is displayed
begins with the date you specify.
If the power schedule is not working, use this topic for diagnosis.
v Make sure that the Start Cleanup (STRCLNUP) command is part of your startup
program.
v The automatic power scheduler uses a job called QSYSSCD to process the
requests for schedule changes. The Start Cleanup (STRCLNUP) command must
be run to start the QSYSSCD job. The IBM-supplied startup program includes
the Start Cleanup (STRCLNUP) command. If you have your own startup
program from a previous release, it might not contain the Start Cleanup
(STRCLNUP) command.
v Make sure that you specify Yes on the Change Cleanup (CHGCLNUP) command
to allow automatic cleanup. The QSYSSCD job will not start if you do not allow
automatic cleanup.
v Make sure that the Start Cleanup (STRCLNUP) command submits the QSYSSCD
job to the job queue specified in the Change Cleanup (CHGCLNUP) command.
v Check to see if the QSYSSCD job is running; it could be on a held job queue.
v Make sure that the job queue to which the Start Cleanup (STRCLNUP)
command is submitted has the Maximum jobs parameter set to *NOMAX or a
number greater than 1. Because the QSYSSCD job always runs, the other jobs
that perform automatic cleanup and turn-off functions are not able to start if the
Maximum jobs parameter is set to 1. To change the Maximum jobs parameter on
the job queue entry, use the Change Job Queue Entry (CHGJOBQE) command.
v Make sure that the mode is set to Normal or Auto.
Related concepts:
“Operating mode of an IPL” on page 51
The operating mode determines the number of options that are presented to the
operator for consideration during and after the initial program load (IPL). It can
also secure (lock) the control panel to prevent an unauthorized or inadvertent IPL
from the control panel.
In addition to checking the password, the operating system uses the sign-on
operation to access the specified user profile. The operating system uses this profile
to customize the displays, providing consideration for the user's language and
available functions.
Procedure
1. Select a system.
2. At the IBM i Signon prompt, enter your user ID and password.
To sign on to the system using the character-based interface, follow these steps:
Notes:
v The Password field is displayed only if password security is active on the
system.
v The top right corner of the Sign On displays the name of the system you are
using, the subsystem the system is using, and the display station identifier
(ID).
2. Press Enter.
If this is an unattended IPL, one or more of the following displays is shown,
depending on what options you select on this display or what is defined in
your user profile:
v The Main Menu is displayed.
v Another menu is displayed.
v A program or procedure is run.
v A current library is inserted into your library list.
If you specify a program or procedure to run and a menu to be displayed, the
program or procedure is run first and then the menu is shown.
Results
Now that your system is up and running, be aware of the following aspects:
v The Operational Assistant displays are now the default.
v The system cleanup functions are automatically started with default values.
v The Attention key program displays the Operational Assistant (ASSIST) menu
(the default).
When you install the IBM i licensed program, the licensed program runs a check to
detect system model changes, certain service conditions, and ownership changes.
If the licensed program detects these changes or conditions, you are prompted to
enter the system password before IPL can continue. If no changes or conditions are
recognized, the IPL continues without a request for the system password.
You must enter the correct system password to complete the IPL. If the system
password is not available, you or your service representative can temporarily
bypass entering the system password for a limited time. When the bypass period
starts, immediately contact your marketing representative, who will have IBM send
you the correct system password. To order the system password, ask your
marketing representative to order nonstandard RPQ S40345 if you are in the
United States, Asia-Pacific, Canada, Latin America, or Japan. If you are in Europe,
Middle East, or Asia, request nonstandard RPQ S40346.
Related concepts:
You can change the system password during the initial program load (IPL).
Procedure
v If you have just installed new hardware, you might need to change the system
password during the first IPL. To do this, follow these steps:
1. Select option 1 (Change the system password) on the Verification of System
Password Failed display. The following system information about the Change
the System Password display is shown:
– System serial number
– System type number
– System model number
– System password version
– Processor card serial number
2. Type the password in the blank field and press Enter. If you do not know the
system password, press F12 (Cancel) and select option 2 (Bypass the system
password) on the Verification of System Password Failed display.
v To change the system password when your system is operational, follow these
steps:
1. Perform an attended IPL.
2. Select option 1 (Change the system password) on the Verification of System
Password Failed display.
3. Type the password in the blank field and press Enter.
You can use the Verification of System Password Failed display to bypass the
system password.
Note: If you type the password incorrectly five times, you must perform the
initial program load (IPL) again.
To bypass the system password during the first IPL, follow these steps:
Results
When the IPL has finished, you will receive hourly messages that tell how much
time is left in the bypass period.
When you receive the password, you can enter it by following these steps:
v Perform an attended IPL and select option 1 (Change the system password) on
the Verification of System Password Failed display.
v Perform an attended IPL and select option 1 (Change the system password) on
the Bypass Period has Ended display.
Before you turn off your system, complete the following steps:
Procedure
1. Make sure that all batch jobs are finished and that users are signed off the
system.
a. Send a message that interrupts all users that are signed on to the system,
telling them to sign off. To do this, follow these steps:
1) On any command line, type GO MANAGESYS and press Enter.
2) Select option 12 (Work with signed-on users) on the Manage Your
System, Users, and Devices (MANAGESYS) menu.
Note: If the Work with User Jobs display is shown, you need to switch
to basic assistance level using F21 (Select assistance level).
3) Press F10 (Send message to all) on the Work with Signed-On Users
display.
4) Type the message in the Message text field on the Send a Message
display and press F10 (Send).
b. Wait for the users to sign off.
c. Check to make sure that all users have signed off by pressing F5 (Refresh)
on the Work with Signed-On Users display. When everyone is signed off the
system, the display shows only your job. To sign someone off the system,
use option 4 (Sign off).
Note: If you have separate interactive subsystems other than the controlling
subsystem, you might want to stop the interactive subsystems when the
users have signed off. This prevents them from signing on again before you
Note: If the Work with User Jobs display is shown, you need to switch to
basic assistance level using F21.
c. Press F14 (Select other jobs) on the Work with Jobs display.
d. Type *all in the User field.
e. Type an N in every field except the Message waiting, Running, and
Running job held fields. The Work with Jobs display is shown again with
the batch jobs listed.
f. If any job queues have jobs waiting to run, press F22 (Work with job queues)
to see the Work with Job Queues display.
g. Hold any job queues that have jobs waiting to run on the Work with Job
Queues display. Release these job queues when you start the system again.
h. Press F12 (Cancel) to return to the Work with Jobs display.
i. Press F5 (Refresh) every few minutes until all batch jobs have completed
processing.
3. Check for removable media.
a. Check to see if there are any tapes in any tape units or CD-ROMs in any
optical units.
b. Remove any tapes or CD-ROM currently in the unit.
What to do next
The IBM i operating system provides several ways to safely turn off your system:
v Use the Power Down System (PWRDWNSYS) command to either perform a
controlled shutdown operation or to shut down the system immediately.
v You can stop the system using the Power On and Off Tasks (POWER) menu. To
get to the Power On and Off Tasks menu, type go power on any command line
and press Enter.
v You can set up a schedule that automatically turns your system on and off. You
can determine the time of day that you want the system turned on and off. You
can also specify special circumstances that change the normal daily schedule,
such as a holiday or special closing.
v In emergencies you can stop the system by using the Power button. However,
using the Power button might cause errors with your data files and other objects
on the system.
Related concepts:
“Scheduling a system shutdown and restart” on page 56
You can set up a schedule that automatically turns your system on and off at the
time of day you set. You can also specify special circumstances that change the
normal daily schedule, such as a holiday or special closing.
Type PWRDWNSYS and press F4 to view the power down options. You must have
QSYSOPR authority to use the Power Down System (PWRDWNSYS) command. If
this command does not work on your system, use the following methods.
Notes:
1. Do not turn the modem on or off when the system is turned off and is made
ready for remote initial program load (IPL). Otherwise, the system might start
unexpectedly, although it turns itself off in a few minutes.
2. If you stop the system using the automatic power schedule or one of the
options on the Power On and Off Tasks (POWER) menu, the IPL date and time
system value (QIPLDATTIM) is checked and, if necessary, reset to the next
scheduled power-on time. This checking does not occur if you turn off the
system in another way, so the system might not turn on automatically. To force
the power schedule to update the Date and time (QIPLDATTIM) system value,
enter the following command on any command line: CHGPWRSCDE
DAY(*TODAY) PWRONTIME(*SAME) PWROFFTIME(*SAME)
Note: Using the Power button to turn off the system might cause results that
cannot be predicted in your data files, and the next initial program load (IPL) will
take longer to complete. Using the Power button to turn off the system will turn
off all logical partitions.
Make sure that there are no tapes in the tape units or diskettes in the diskette
units, and that the mode is set to Manual.
Do not turn the modem on or off when the system is turned off and is made ready
for remote IPL. Otherwise, the system might start unexpectedly, although it turns
itself off in a few minutes.
To turn off the system using the Power button, follow these steps:
Procedure
1. On the control panel, press the Power button. The Function/Data display
flashes with 0 (the international turn off symbol).
2. Press the Power button again. The Power On light flashes as the system is
being turned off. When the system is completely turned off, the light goes off.
Note: If the system does not turn the power off within 30 minutes, wait for the
System Attention light to come on. When the System Attention light comes on,
go to Service and support, and Troubleshooting and follow the steps necessary
to solve the problem.
To work with system values in System i Navigator, select your system >
Configuration and Service > System Values.
If you do not have a System i Navigator connection, you can still use these system
values through the character-based interface. From the character-based interface,
change or display these values using the Work with System Values (WRKSYSVAL)
command.
The Allow scheduled restart (QIPLDATTIM) system value sets the date and time
for a scheduled restart.
From System i Navigator, select your system > Configuration and Service >
System Values > Restart > General.
The Previous restart type system value displays the way the system performed the
last IPL. You cannot change this system value.
From System i Navigator, select your system > Configuration and Service >
System Values > Restart > Previous. When needed, use the help associated with
the display.
The Type of restart system value defines the type of IPL the system performs from
the control panel.
From System i Navigator, select your system > Configuration and Service >
System Values > Restart > General. When needed, use the help associated with
the display.
From System i Navigator, select your system > Configuration and Service >
System Values > Restart > General. When needed, use the help associated with
the display.
Use the Allow remote power-on and restart system value to start the remote
system by using your telephone and a modem or the system power control
network (SPCN) signal. This means that any telephone call causes the system to
restart.
From System i Navigator, select your system > Configuration and Service >
System Values > Restart > General. When needed, use the help associated with
the display.
The When power failure occurs (QUPSDLYTIM) system value controls the length
of time the system waits before saving main storage and turning off the system. If
utility power is restored before the time ends, the system ends the timer. If the
timer ends first, the system begins to save main storage or goes into continuously
powered main storage (CPM).
From System i Navigator, select your system > Configuration and Service >
System Values > Power Control > General.
Automatically power down the entire The system automatically turns down when
system (0) system utility power fails.
Power down system after time interval Specifies the delay time in seconds before
(1-99999) the utility power fails.
Use the Message queue and library system value to specify where you want your
messages sent when the power to the system is interrupted. The default values are
QSYSOPR for the message queue and QSYS for the library.
From System i Navigator, select your system > Configuration and Service >
System Values > Power Control > General. When needed, use the help associated
with the display.
This system value sends the messages to the system operator's message queue
when power to the system is interrupted.
Related concepts:
“Starting the system without making configuration changes (unattended IPL)” on
page 44
This is the most common way to start the system. Unattended initial program
loads (IPLs) reset system storage and recognize any configuration changes
automatically.
“Changing the system during IPL (attended IPL)” on page 45
If you want to change initial program load (IPL) options, to install the operating
system, to use dedicated service tools, to work with logical partitions, or to recover
from a system failure, you need to perform an attended IPL. These situations
might require you to enter information or change system values.
“Changing system values during IPL” on page 53
System values control information that affects the operation of certain parts of the
system. On the System Value Commands display, you can change system values
that affect initial program load (IPL) or other areas of the system.
Restart system values: Allow scheduled restart
Restart system values: Previous restart type
IBM i concepts
IBM i is the operating system for the IBM i platform. It manages hardware and
software resources, and provides an interface that you can use to work with the
system. To best use the operating system, you need to be familiar with some
system concepts.
System maintenance
Logs and Record keeping is an important way for the system to protect data and track
journals system problems. Learn what logs and journals are for and how to use them.
Software Recent versions of IBM i software add functions and solve known problems.
fixes Learn how to install and manage software and software updates.
Messages
Messages are communications sent from another user, from the operating system,
or from an application.
Messages are communications that are sent from a person, a program, or the
operating system to a message queue. Every user profile and workstation has a
message queue associated with it. All message queues are named after the user or
workstation that they are associated with, and get created automatically when the
user signs on to the system for the first time, or when the workstation is first
defined. The message queue for the QSYSOPR profile is particularly important
because the system sends many messages about job completion and system status
to the QSYSOPR message queue.
You can use System i Navigator to display, reply to, and send messages. To work
with messages, expand Basic Operations, and click Messages. System i Navigator
displays all the messages for either your message queue, or a specified message
queue. To reply to, delete, or view the properties for a specific message, right-click
the message and select the required action. To send a message, right-click
Messages in System i Navigator, and click Send a message.
IBM i commands
The operating system uses control language (CL) commands to interpret
instructions from users. You need to know the basic rules for using CL, and how to
get detailed help for any CL command.
CL command syntax
Entering CL commands
Every command has a set of required and optional parameters. For example,
Create Library (CRTLIB) requires, at a minimum, that you specify the name of the
library that you want to create. The syntax for more complex CL commands is
command_name parameter (value). For example, CRTLIB LIB (FRED) enters the verb
If you are not familiar with the parameters associated with a CL command, you
can enter the command with the parameters you already know, place the cursor on
the command, and press F4 (Prompt). The system then displays the available
options for the command. Entering a command without any parameters also
causes the system to prompt you for any required fields, making field-level help
available. For example, entering CRTLIB causes the system to show the following
display.
The operating system provides several methods for helping users access and enter
CL commands. The Command Entry program provides a useful interface and
additional help. You can start this program by entering CALL QCMD from a
command line. The CL finder in the information center can also help you find a
specific command. Most importantly, remember that entering a command without
any parameters, or pressing F4 (Prompt) while your cursor is over the command,
displays a menu with detailed help for all associated parameters.
Related concepts:
“Using system interfaces” on page 2
Depending on the type of connection to the system and the task you need to
perform, several options are available for system interfaces. You can access and use
your system by the System i Navigator interface, by the character-based interface,
and by wireless clients.
“Objects” on page 79
Everything on the system that can be worked with is considered an object. Objects
provide a common interface for working with system components. This topic
discusses the different kinds of objects and how to work with them.
Related reference:
Security is a critical part of system operations. It is built into the operating system,
and impacts nearly every function on the system. The IBM i security environment
determines the commands and functions available to users, and the objects they
can access.
Typically the security strategy restricts the objects a user can access. For systems
with object-level security, there are several ways to provide authority to access
objects. Often, user profiles will explicitly grant types of access to specific objects.
To simplify the task of managing all these permissions, authorization lists can
specify groups of objects, and users can be given access to these lists. Accessing
these lists then provides access to all of the objects the list specifies.
The level of system security and other more detailed security practices often affect
system operations. The following concepts are important for understanding user
requirements in various security environments.
Security The operating system operates in one of several predefined levels of security.
levels The security level currently in effect determines the level of detail that user
profiles must provide to grant appropriate access to system resources. This
level of detail can range from simple password management to explicitly
providing a level of access to each object that a user can read or change.
Security Many more detailed aspects of system security are set by the system values.
system These system values set the security level, and grant or restrict options like
values adopted authority.
User profiles The user profile contains most of the authorizations and preferences for
individual users or groups. You can use System i Navigator to create and
manage users and groups across the system.
Authorization You can create authorization lists that specify groups of objects. Users and
lists groups can then be authorized to this list, granting them authority to
everything that list contains.
Also, security settings regarding policies and authorization lists are available in
System i Navigator under Security.
Related concepts:
System values
Assume that a user needs authorization to add, change and delete data in a
database, but does not need to delete tables or the database itself. The user can be
granted object data-level authority, rather than object-level authority.
Note: Adopted authority will grant users access to objects called by an object they
are working with. Administrators can allow or restrict adopted authority with
security system values.
Security levels
The operating system operates in one of several predefined levels of security. The
security level currently in effect determines the level of detail that user profiles
must provide to grant appropriate access to system resources. This level of detail
can range from simple password management to explicitly providing a level of
access to each object that a user can read or change.
You can use System i Navigator to change these settings on a single system or
across multiple systems.
Level 20
This level is referred to as password security. That is, users must have a
password and user ID that is recognized by your system to gain access to
the system. Both the user ID and initial password are created for users by
the system administrator.
This level of security offers all users on the system total authority to do
anything they want. That means they can access all data, files, objects, and
so on, on your system. This might be appropriate for small businesses
where internal security is a low priority, but will likely be inappropriate for
larger businesses that do not want every employee to be able to access
confidential payroll files, for example.
Level 30
This level is referred to as resource security. That is, users must have a
valid user ID and password defined for them by the system administrator,
and no longer have automatic access to everything on the system. User
access is limited by the security policies of the business.
Level 40
This level is referred to as system integrity security. That is, at this level,
the system itself is protected against users. User-written programs cannot
directly access the internal control blocks through pointer manipulation.
Level 40 is the default security level for every new installation.
Level 50
This level is referred to as enhanced system integrity security. Level 50 is
the recommended level of security for most businesses, because it offers
the highest level of security currently possible. Not only is the system
User profiles
The user profile contains most of the authorizations and preferences for individual
users or groups. With System i Navigator, you can create and manage users and
groups across the system.
User profiles contain the information that the system requires to allow users to
sign on to a system, to access their own customized session, including their own
message and output queue, and to access functions and objects to which they have
been granted authority.
User profiles can be included in group profiles. In this way, all group members
share attributes, access to specific objects, and ownership of objects. Group profiles
can simplify many user administration tasks by allowing you to apply a single
change to many users.
Use System i Navigator to create and manage user profiles and groups if your own
user profile has the required authority. Expand Users and groups to create and
manage user profiles. Additionally, you can use this function to perform some
common actions on a selected user, such as sending a message, and working with
that user's jobs and objects.
Related concepts:
Managing users and groups with Management Central
Providing each user with explicit access to every object the user needs to work
with might create a great deal of duplicated effort because many users need to
access the same group of objects. A much easier way to provide this access is to
create authorization lists. Users and groups can then be authorized to this list,
which grants them authority to everything that the list contains.
To work with authorization lists, open Security in System i Navigator and select
Authorization lists.
For example, an authorization list can be created to contain a list of objects related
to an inventory database. A user responsible for ordering new inventory items can
be granted authority to see the contents of the database objects. Additionally, a
user group in shipping and receiving needs to update this database as parts come
in and out of stock. This group can have authority to change the contents of the
objects.
Files in the operating system are significantly different from their counterparts in
the UNIX and Windows operating systems. In the operating system, a file is
another kind of object on your system. Each file has a description that describes its
characteristics and how the data associated with the file is organized. Whenever
the operating system processes a file, it uses this description.
In addition to differences in handling files, the operating system also uses unique
structures to store the files and other objects on the system. However, the
integrated file system in System i Navigator might look familiar to people who are
used to a hierarchy based on the Windows operating system. UNIX users might
recognize some elements of this hierarchy, as well as the presence of file pointers.
You can access the integrated file system in System i Navigator. With the
integrated file system, you can find, change, and copy files and libraries on your
system by navigating through a hierarchy that is similar to Windows Explorer. You
can use the integrated file system to copy data files onto your client PC.
Learn about traditional file management functions that your application uses in
creating and accessing data on the system and in ensuring the integrity of the data.
File management is the part of the operating system that controls the storing and
accessing of traditional file objects (*FILE objects in the QSYS.LIB library) on the
system.
Spooling is a system function that saves data in a database file for later processing
or printing. With spooled files, you can manage your data files on attached
devices, such as a diskette or printer.
Tape files
Tape files are device files that provide access to attached tape devices. The Tape
files topic collection describes the characteristics and use of tape device files for
application programs. This topic also provides information about storing and
accessing data from a tape device, and conceptual information about tape, tape
data files, and tape device files.
Related concepts:
“Objects” on page 79
Everything on the system that can be worked with is considered an object. Objects
provide a common interface for working with system components. This topic
discusses the different kinds of objects and how to work with them.
Database file management
Securing the integrated file system
Related information:
Spooled files and output queues
Restricted state is a condition that occurs when all subsystems are ended, either
manually or automatically by the system. When the operating system is in
restricted state, most jobs cannot be active, and users cannot connect to the system.
You need to ensure that information is saved and that other systems, such as a
Windows server, are properly powered down before putting the operating system
in restricted state. If not, there is a high risk that you will lose data.
The following examples show the most common tasks that require or highly
recommend restricted state status:
Performing a full system backup
When a full system backup is performed, the operating system is
automatically placed in restricted state. Restricted status is required
because the system requires sole access to everything it is backing up.
Saving multiple items
You should put the operating system in a restricted state when backing up
multiple items, such as libraries, documents, directories, and storage. As
was previously stated, the system requires sole access to each object it is
backing up. If the system is not in restricted state and someone is using a
library when the system tries to back it up, the save operation will not
complete successfully.
Software installation and upgrade
At various points during a software installation or upgrade, the operating
system is required to be in a restricted state. During these procedures, you
are given instructions on how to do this.
Notes:
v For the Delay parameter, specify a number of seconds that allows your system
time to bring most jobs to a normal end. On a large, busy system, you might
need a longer delay. For more information, use the online command help.
v The End System command (ENDSYS) will also put the system into restricted
state.
The system sends messages to the QSYSOPR message queue. These messages
indicate that the subsystems ended, and that the system is in the restricted state.
Jobs
All work done by the operating system is divided into units called jobs. Jobs are
how the operating system organizes, tracks, and processes work.
A job typically includes all of the information the system requires to complete a
specific task. This information might include data files, programs, and instructions
for processing and tracking the job throughout its processing. Jobs vary greatly in
their complexity, ranging from simple tasks, like printing a specified document, to
complex procedures, like generating reports based on information spread
throughout the system. Tracking and managing jobs is an important part of normal
system operation.
Jobs are an essential part of work management. To learn more about how jobs are
processed, including working with subsystems and job queues, see The structure of
your system. For an example of how jobs move through the system, see A job's
life.
You can work with jobs in System i Navigator. Jobs in the Basic Operations folder
displays all the jobs associated with the current user. To display other jobs,
right-click the Jobs folder, and select Customize this view > Include. The Server
Jobs - Include window allows you to limit the list of server jobs displayed in the
System i Navigator window to those that meet the criteria you specify.
Alternately, you can see the jobs submitted by the system by clicking Work
Management > Server jobs, or view the jobs currently being processed by clicking
Work Management > Active jobs.
After finding the jobs you want to work with, you can display their attributes or
change their queue, priority, messages, and other features by right-clicking the job
and clicking Properties. Additionally, your system administrator might decide to
set up a job monitor to work with some jobs.
Related concepts:
Managing jobs
Related tasks:
Creating a new monitor
During this process, you might want to monitor a job's progress or adjust its
priority. Also, if the system is having trouble processing certain types of jobs, you
might need to adjust the subsystems resources.
With System i Navigator, you can view subsystem properties, view job queues that
are in use by an active subsystem, start and stop a subsystem, and adjust memory
pools. These functions are available under Work Management in System i
Navigator. However, some subsystem commands are only available from the
character-based interface.
Related concepts:
The structure of your system
A job's life
Subsystems
Memory pools
Managing subsystems
Managing memory pools
Related tasks:
“Stopping the system” on page 62
Turning off your system needs careful attention. If you turn off the system without
following this topic, data might be damaged, or the system might behave in
unpredictable ways.
Objects
Everything on the system that can be worked with is considered an object. Objects
provide a common interface for working with system components. This topic
discusses the different kinds of objects and how to work with them.
One of the differences between the IBM i operating system and other operating
systems is the concept of objects. Anything that you can change in the operating
system is a type of object. For example, data files, programs, libraries, queues, user
profiles, and device descriptions are all types of objects. By treating everything as
an object, the operating system can provide all of these items with an interface that
defines what actions users can perform, and how the operating system needs to
treat the encapsulated data. Additionally, this interface allows for standardized
commands across different system elements; the commands for working with user
profiles and data files are similar.
One important type of object is the library. Libraries are essentially containers, or
organizational structures for other objects, and you can use libraries to reference
other objects on your system. Libraries can contain many objects, and can be
associated with a specific user profile or application. The only library that can
contain other libraries is called QSYS. It contains all other libraries on the system.
There are many different types of objects in the operating system. Finding objects
and performing actions on them are basic functions of system operations.
Related concepts:
Logs
A log is a database file that contains the history of backup, archive, recovery, and
media management operations that can be displayed online or printed for future
reference. Logs are used in backup and recovery situations. Logs can also contain
information about jobs, general system information, and problems.
Table 14. Types of logs
Log Description
Job logs Track the description, status, and action of jobs performed by the system.
History logs Get general system information, like device changes, operator messages, job
completion and other activities.
Problem Retrieve records of system problems that occurred on a system.
logs
Journals
Software fixes
You can use fixes to install and manage software and software updates.
You must configure Service Tools user IDs before starting SST. For more
information about how to configure a user ID, see Managing service tools user IDs
using DST and SST.
Procedure
1. Start System Service Tools (SST). On any command line, type STRSST (Start
System Service Tools) and press Enter.
2. Sign on to SST with your user ID.
3. Select option 1 (Start a service tool).
4. Select option 7 (Hardware Service Manager).
5. Use the Print function key (F6) on the Hardware Service Manager display to
request a printout. The Print Format Options display appears. You can sort the
information by location or by logical address.
Notes:
v The logical address sort and location sort are available only in 132-character
width.
v The logical hardware and the packaging hardware have unique resource
names.
To collect more details about the system configuration list, you can select the
Print function key from a display other than the Hardware Service Manager
display, but the system prints only the information that appears on the display.
To display or print details that include descriptions about the system bus, main
storage, or processor, follow these steps:
a. Select the Logical Hardware Resources option.
What to do next
Your system configuration list prints on the printer that you specified.
Familiarity with this process and the ability to perform basic troubleshooting and
problem handling procedures are a basic part of system operations.
Related concepts:
How your system manages problems
Analyzing and handling problems
Overview: Reporting problems
Service and support
Troubleshooting
IBM Redbooks
Other information
v Basic printing
v System i Navigator
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or send inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law: INTERNATIONAL
BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS"
WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE. Some states do not allow disclaimer of express or implied warranties in
certain transactions, therefore, this statement may not apply to you.
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
Software Interoperability Coordinator, Department YBWA
3605 Highway 52 N
Rochester, MN 55901
U.S.A.
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
All IBM prices shown are IBM's suggested retail prices, are current and are subject
to change without notice. Dealer prices may vary.
This information is for planning purposes only. The information herein is subject to
change before the products described become available.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
Each copy or any portion of these sample programs or any derivative work, must
include a copyright notice as follows:
© (your company name) (year). Portions of this code are derived from IBM Corp.
Sample Programs.
If you are viewing this information softcopy, the photographs and color
illustrations may not appear.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corp., registered in many jurisdictions worldwide.
Other product and service names might be trademarks of IBM or other companies.
A current list of IBM trademarks is available on the Web at “Copyright and
trademark information” at www.ibm.com/legal/copytrade.shtml.
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered
trademarks or trademarks of Adobe Systems Incorporated in the United States,
and/or other countries.
Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo,
Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or
registered trademarks of Intel Corporation or its subsidiaries in the United States
and other countries.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of
Microsoft Corporation in the United States, other countries, or both.
Notices 87
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Java and all Java-based trademarks and logos are trademarks of Oracle, Inc. in the
United States, other countries, or both.
Other product and service names might be trademarks of IBM or other companies.
Personal Use: You may reproduce these publications for your personal,
noncommercial use provided that all proprietary notices are preserved. You may
not distribute, display or make derivative works of these publications, or any
portion thereof, without the express consent of IBM.
Commercial Use: You may reproduce, distribute and display these publications
solely within your enterprise provided that all proprietary notices are preserved.
You may not make derivative works of these publications, or reproduce, distribute
or display these publications or any portion thereof outside your enterprise,
without the express consent of IBM.
IBM reserves the right to withdraw the permissions granted herein whenever, in its
discretion, the use of the publications is detrimental to its interest or, as
determined by IBM, the above instructions are not being properly followed.
You may not download, export or re-export this information except in full
compliance with all applicable laws and regulations, including all United States
export laws and regulations.
Personal Use: You may reproduce these publications for your personal,
noncommercial use provided that all proprietary notices are preserved. You may
not distribute, display or make derivative works of these publications, or any
portion thereof, without the express consent of IBM.
Commercial Use: You may reproduce, distribute and display these publications
solely within your enterprise provided that all proprietary notices are preserved.
You may not make derivative works of these publications, or reproduce, distribute
or display these publications or any portion thereof outside your enterprise,
without the express consent of IBM.
IBM reserves the right to withdraw the permissions granted herein whenever, in its
discretion, the use of the publications is detrimental to its interest or, as
determined by IBM, the above instructions are not being properly followed.
You may not download, export or re-export this information except in full
compliance with all applicable laws and regulations, including all United States
export laws and regulations.
Printed in USA