OpenVMS Technical Journal V5, February 2005

Order Number: XX-84A41-F0
Volume 5

This document is the fifth volume of the OpenVMS Technical Journal from February 2005, containing several technical articles related to the OpenVMS operating system and associated technologies.

Key articles and their summaries include:

  • A Survey of Cluster Technologies: This article provides a comprehensive overview of clustering technologies from various vendors (e.g., IBM AIX, HP-UX, Linux, OpenVMS, Solaris, Windows, Oracle RAC, Veritas). It defines and compares cluster types based on availability, reliability, scalability, and manageability, differentiating between "multisystem-view" (failover focused) and "single-system-view" (shared resource, higher scalability) clusters. It delves into cluster I/O attributes (network vs. direct access), distributed lock managers, quorum mechanisms for split-brain prevention, and various configurations. The paper also discusses application support (single- vs. multi-instance), cluster resilience (dynamic partitions, disk high availability, network aliases), and disaster tolerance via physical and logical data replication.

  • Porting the Macro-32 Compiler to OpenVMS I64: This paper details the complex process of adapting the Macro-32 compiler from the Alpha architecture to the Itanium (I64) architecture for OpenVMS. The primary goal was to allow existing Macro-32 code to recompile without source changes. The article explains modifications made across the compiler's phases, including handling I64's different register passing conventions, managing Itanium's unique NaT bit to prevent system crashes, and implementing new directives and system services to ensure compatibility with existing Alpha PAL calls and calling standards.

  • Introduction to the Performance Data Collector for OpenVMS (TDC): This article introduces TDC Version 2.1, a robust and extensible framework for collecting and analyzing system performance metrics on OpenVMS Alpha and Integrity Servers. It describes the TDC software architecture, comprising a TDC Engine, Processor Modules (Producers, Extractors, Consumers, Timers), and Client Applications. The system enforces a temporal separation between data production and utilization, aggregates data into snapshot structures, and supports both real-time data collection and file-based data extraction. The article highlights the API's C/C++ focus, its use of ASTs, and system management aspects, including its installation as a System Integrated Product.

  • Are you Certifiable?: This piece explains the rigorous process behind creating OpenVMS certification exams (Certified Systems Administrator, Certified Systems Engineer, Accredited Systems Engineer). It outlines the use of competency models and exam blueprints to ensure exams test practical experience rather than rote memorization. The article details the beta testing phase, where statistical analysis (p-value, point-biserial, r-value) is used to validate and refine exam items. It also provides guidelines for good item writing and advice for candidates taking the exams.

  • Removing the 32-bit Limit from System Space (OpenVMS V6.1 – V7.3-2): This paper tracks the historical changes made to OpenVMS to overcome the 32-bit (1GB) system space limitation, which historically restricted system growth. It describes major consumers of system space (balance slots, nonpaged pool, memory disks, VIOC cache) and the architectural evolutions across OpenVMS versions 6.1 to 7.3-2. These changes included combining S0/S1 space to 2GB, introducing 64-bit addressing with a new S2 space, and migrating large data structures and components (like virtual page tables, lock manager data, and Extended File Cache) out of the original 32-bit system space, enabling OpenVMS to support much larger memory configurations.

  • Taking OpenVMS Security One Step Further: This article addresses the need for enhanced security in OpenVMS environments, despite its inherent robustness. It identifies common security problems like user irresponsibility, probing, penetration, and social engineering. The paper introduces PointSecure products: PointAudit, a vulnerability assessment tool for checking security settings against policies, and System Detective, which provides real-time user activity monitoring, inactive session management, and intrusion protection with automated responses. It also highlights HP's OpenVMS System Security Audit Service, offering comprehensive security assessments and proactive policy enforcement.

  • DECnet-Plus Technical Overview: This overview details DECnet-Plus (DNA Phase V), the current implementation of Digital Network Architecture for OpenVMS. It traces DECnet's evolution, highlighting its shift towards OSI standards, host-based routing, and multi-homed end systems. The article explains the layered OSI model, the Network Control Language (NCL) for management, and various node name and address resolution services (Local, DECdns, DNS/BIND). It also covers availability features like load balancing and failover, the Distributed Time Synchronization Service (DTSS), and the ability for DECnet applications to operate over TCP/IP networks.

  • Delivering Web Access to OpenVMS: This article presents a case study of Southeastern Freight Lines (SEFL) successfully modernizing its mission-critical OpenVMS legacy applications by integrating them with web access and a portal using WRQ Verastream host integration software. SEFL needed to leverage its existing OpenVMS investment and Cobol applications without extensive re-engineering. The solution provided transparent web access for 6,000 employees and customers, centralized application access via portlets, improved user productivity, reduced IT costs, and enhanced business agility, allowing remote access and rapid adaptation to business changes.

XX-84A41-F0
December 2005
108 pages
Quality

Original
2.4MB

Site structure and layout ©2025 Majenko Technologies