Fact-checked by Grok 2 weeks ago

Systems Network Architecture

Systems Network Architecture () is a architecture developed by , introduced in , that defines a set of protocols and conventions for interconnecting computers, terminals, and other devices in a networked environment. It establishes common rules for data exchange to ensure reliability, integrity, and efficient resource management across IBM mainframes and compatible systems. SNA is structured as a layered architecture comprising three primary layers: the , which handles user interactions and data formatting; the Function Management Layer, responsible for session and data presentation; and the Transmission Subsystem Layer, which manages , , and error recovery. Central to its design are Network Addressable Units (NAUs), including System Services Control Points (SSCPs) for network supervision, Physical Units (PUs) for device , and Logical Units (LUs) for end-user communication endpoints. This modular approach promotes device independence, allowing changes in hardware without disrupting applications, and distributed processing to enhance performance and fault tolerance. Originally designed to support interactive on mainframe systems like the , SNA replaced earlier batch-oriented networking by enabling real-time data sharing and remote access for terminals and printers. It became the dominant architecture for in the and , powering critical applications in companies through integration with software like and IMS. Over time, SNA evolved with the introduction of Advanced Networking (APPN) in the , which added and capabilities, reducing reliance on centralized control. In the modern era, while TCP/ has largely supplanted for general networking, the architecture remains vital for maintaining legacy mainframe investments, with trillions of dollars in and IMS applications still operational. IBM's SNA/IP implementation allows SNA traffic to traverse IP networks, ensuring compatibility with contemporary infrastructures like Ethernet and supporting hybrid environments alongside Windows, , and other platforms. Today, continues to provide robust features such as automatic recovery from failures, congestion avoidance, and alternative , underscoring its enduring role in secure, high-availability enterprise communications.

Overview

Definition and Scope

Systems Network Architecture () is 's proprietary networking architecture, introduced in 1974 as a complete for interconnecting computers, terminals, and peripherals in a mainframe-centric environment. It establishes common conventions for among , software, and compatible platforms, unifying functions and structures across communication products. The scope of SNA encompasses a hierarchical, host-dominated model designed for reliable across multidomain networks, where the mainframe serves as the central authority managing resources and routes. This contrasts with models by emphasizing centralized control to ensure , flow control, and error recovery in enterprise settings. SNA's core role lies in enabling structured communication between mainframes, such as the System/370, and attached devices including printers, displays, and remote systems. Structurally, SNA comprises three primary layers that provide a for these interactions, separating functions to support compatibility and efficient data exchange without delving into specific layer operations here.

Objectives

Systems Network Architecture () was developed to establish a unified for data communication across IBM products, specifying common conventions that replaced disparate vendor-specific protocols and enabled consistent in environments. This design aimed to support advanced teleprocessing applications in a growth-oriented setting, relieving users from direct network control and resource management to focus on application development. By providing a layered structure for modularity, SNA facilitated the integration of diverse components while promoting scalability for expanding networks. A core emphasis of SNA's objectives was hierarchical control, achieved through centralized elements like the System Services Control Point (SSCP) that manage nodes, sessions, and resources across domains. This approach supported efficient resource sharing via multiplexing of paths and links for multiple applications, along with robust error recovery through session resynchronization and selective retransmission in large-scale, multidomain setups. Such mechanisms ensured reliable operation in complex environments by distributing functions to reduce main processor loads and enabling concurrent access to shared elements like physical and logical units. SNA's goals further prioritized , with features allowing local processing to continue during network failures and nondisruptive switching to backup paths or routes. Load balancing was addressed through dynamic traffic distribution across multilink transmission groups and adaptive pacing to optimize throughput and manage congestion in multidomain networks. Additionally, the supported both batch and interactive processing via specialized protocols and session types, accommodating half-duplex and full-duplex modes for diverse workloads. Underlying principles included domain-based organization, structuring networks into subareas that differentiate local resources from network-addressable ones for controlled activation and management. SNA also maintained independence from specific hardware or transmission media, insulating applications through abstract layers and supporting various node types and link protocols without altering data content during routing. This flexibility allowed deployment across different physical configurations while preserving core communication integrity.

Historical Development

Origins and Creation

In the early 1970s, initiated internal development of () to standardize communication protocols for its System/370 mainframes, addressing the limitations of earlier technologies like Binary Synchronous Communication (BSC), which relied on point-to-point connections and lacked scalability for expanding enterprise networks. This effort was motivated by the growing demand for reliable data transmission in resource-constrained environments, where computer memory was scarce and communication lines operated at low speeds such as 9600 bits per second, necessitating protocols that ensured message integrity and supported the shift from to interactive applications. SNA was publicly announced in September 1974 as part of IBM's "Advanced Function for Communications" initiative, introducing a unified designed to connect computers, terminals, and peripherals in a controlled, hierarchical manner. The architecture emphasized device independence, allowing application programs to interact with diverse endpoints without custom adjustments, while prioritizing functions like improved response times, cost reduction, and distributed processing to meet enterprise requirements for centralized data handling. Initial design focused on enabling remote job entry for batch operations and interactive terminal sessions, fostering a structured under supervision to enhance reliability over unreliable legacy lines. The first major implementations of SNA appeared in 1976, with the release of the Virtual Access Method (VTAM) as the primary software for host-based network control on System/370 under operating systems like OS/VS2. VTAM facilitated the practical deployment of 's hierarchical model, managing sessions between network addressable units and providing the foundational access method for in IBM environments.

Evolution and Versions

Following its initial introduction in , Systems Network Architecture (SNA) underwent significant enhancements starting in the late 1970s with the rollout of Advanced Communication Function (ACF), which provided improved capabilities, including better control over virtual circuits and resource allocation in hierarchical environments. ACF, comprising components like ACF/VTAM and ACF/NCP, addressed limitations in early SNA implementations by introducing more robust telecommunication access methods and network control programs, enabling more efficient handling of multisystem communications without requiring frequent system reconfigurations. In the 1980s, SNA shifted toward communication paradigms to support distributed processing needs, marked by the introduction of Advanced Program-to-Program Communication (APPC) and Logical Unit 6.2 (LU 6.2) in 1982. APPC, leveraging LU 6.2 as its foundation, allowed programs on different systems to communicate as equals, independent of a central host, using standardized verbs for session initiation, data exchange, and synchronization, which facilitated integration across heterogeneous environments. This evolution continued with Advanced Networking (APPN) in the mid-1980s, which extended LU 6.2 principles to the network layer, enabling dynamic resource discovery, route calculation, and load balancing without predefined static definitions, thus reducing administrative overhead in larger deployments. The 1990s saw further adaptations to accommodate the rise of -based infrastructures, particularly through Enterprise Extenders introduced in 1999, which encapsulated SNA traffic within / packets to run over existing / networks without altering legacy applications. These enhancements, building on APPN, included support for High (HPR) to optimize paths and ensure session continuity during network changes, allowing SNA to coexist with and leverage IP backbones for cost-effective scaling in enterprise settings. After the early 2000s, new SNA development largely declined as IP technologies dominated, but maintained ongoing support and enhancements within environments, as reaffirmed in its 2002 Statement of Direction, ensuring compatibility and security updates for existing SNA workloads through at least 2025 and continuing as of November 2025 with no announced end of support.

Architectural Framework

Layers of SNA

Systems Network Architecture (SNA) employs a seven-layer model to organize functions, providing a structured approach to in IBM's environment. This architecture divides responsibilities hierarchically, ensuring that higher layers can leverage services from lower ones for tasks such as connection establishment, data routing, and application interaction. Unlike the , SNA's layers are tailored to IBM's mainframe-centric ecosystem, emphasizing host-dominated networks over . The lowest layer, Physical Control (Layer 1), handles the physical transmission of bits over media such as cables, managing signaling, modulation, and basic connectivity without regard to data content. It provides the foundational bit-stream service to the layer above. Data Link Control (Layer 2), the second layer, establishes and maintains between adjacent nodes, framing data into packets, detecting errors via techniques like cyclic redundancy checks, and retransmitting corrupted frames to ensure reliable point-to-point delivery. This layer operates independently on each link, supporting multiple protocols for medium access. Path Control (Layer 3) manages the end-to-end path through the network, including routing message units across multiple links, segmentation and reassembly of data units, and congestion control to prevent network overload. It treats the network as a virtual circuit, optimizing paths based on IBM's hierarchical topology. Transmission Control (Layer 4) oversees end-to-end communication between network addressable units, implementing flow control to regulate data rates, error recovery through acknowledgments and timeouts, and session multiplexing to handle multiple concurrent connections. This layer ensures orderly data exchange despite network variability. Data Flow Control (Layer 5) coordinates the logical flow of data between sessions, managing brackets for request-response sequences, synchronization points for , and medium access priorities to prioritize critical transactions in a host-dominated setup. It builds on services to enforce structured dialogues. Presentation Services (Layer 6) formats and transforms data for application use, handling code , data to ensure between diverse systems, while abstracting details from user applications. This layer supports SNA's focus on reliable, formatted data . At the top, Transaction Services (Layer 7) provides user-oriented functions for application-to-application interactions, including transaction initiation, dialogue management, and resource allocation, enabling distributed processing in IBM environments. It relies on all lower layers for seamless operation. The hierarchical design of SNA layers ensures modularity, where each level offers well-defined interfaces to the one above, promoting reliability in mainframe networks as originally intended for VTAM and other IBM systems. This structure contrasts with OSI by prioritizing IBM-specific optimizations like explicit path control over general-purpose layering.

Principal Components

Systems Architecture () relies on a set of principal components that form the foundational structure for operations, including points, , and pathways. points serve as the primary mechanisms for managing domains and facilitating communication. The System Services Point (SSCP), typically hosted in type 5 nodes, acts as the central authority for management, overseeing , session mediation, and configuration. The Physical Unit (PU) handles node-level , managing local such as and link stations in subarea and peripheral nodes, while ensuring compliance with SSCP directives for and monitoring. Complementing these, the Logical Unit (LU) provides the interface for end-user sessions, enabling applications and devices to exchange data through the network. Resources in SNA are defined as network-addressable entities, encompassing applications, devices, and pathways that serve as origins or destinations for . These resources, collectively known as Network Addressable Units (NAUs), include SSCPs, , and LUs, each assigned unique network addresses to support identification and across the . Pathways enable the between these resources, with transmission groups representing aggregated physical links for data transport and explicit routes defining logical paths based on network addresses for efficient decisions. Intercomponent interactions ensure seamless functionality, particularly through SSCP-LU sessions, which handle , session activation, and in hierarchical networks. During session initialization, the bind image—a within the BIND request—specifies parameters such as and resource limits, allowing the primary LU to negotiate terms with the secondary LU under SSCP oversight. These interactions integrate with SNA's layered framework to support reliable end-to-end communication without delving into protocol specifics.

Key Concepts

Network Addressable Units

In Systems Network Architecture (SNA), a Network Addressable Unit (NAU) is defined as any resource or element within the network that possesses a unique address, enabling it to originate or receive data and control messages. NAUs serve as the fundamental points of access and communication in the SNA hierarchy, allowing users, applications, and network components to interact across the system. This addressability ensures that messages can be routed precisely through the path control layer, forming the basis for all network sessions and resource interactions. NAUs are categorized based on their within the structure. Local NAUs operate within a single , where they are directly managed by a System Services Control Point (SSCP), facilitating communication without the need for external . In contrast, network NAUs extend beyond a single , requiring cross- and coordination between multiple SSCPs to enable access across broader segments. This distinction supports the of , ensuring efficient management of resources at both local and global levels. NAUs play a central in key operations, including resource discovery, session , and unbinding. During resource discovery, the SSCP locates and verifies available NAUs within its domain or coordinates with other SSCPs for remote ones, often using initialization requests to establish awareness of resources. Session occurs when an NAU initiates a via a request, negotiated through the SSCP to activate protocols and allocate paths for data flow. Unbinding follows similarly, with UNBIND requests terminating sessions and releasing resources, ensuring orderly operations. These processes underpin the reliability and structure of SNA communications. Examples of NAU types include control points, which manage node-level resources and session in advanced configurations, and resources such as those representing applications or terminals that participate in end-to-end interactions. These NAUs, including SSCPs as supervisory entities, collectively enable the scalable addressing essential to SNA's design.

Logical Units

In Systems Network Architecture (SNA), a logical unit (LU) serves as the primary interface between end users or application programs and the SNA network, enabling access to network resources and managing communication sessions with other LUs or system services control points. LUs are a category of network addressable units (NAUs) that focus on application-level interactions rather than physical connectivity. This abstraction allows applications and terminals to communicate transparently across the network, handling session establishment, data exchange, and termination. SNA defines several LU types, each tailored to specific communication needs and data stream requirements:
  • LU 0: Provides a programmer-defined interface for custom protocols, using SNA transmission control but allowing implementation-specific session protocols for flexible, non-standard applications.
  • LU 1: Supports print-oriented sessions for nondisplay input/output devices, such as printers or keyboard-printer terminals, facilitating simple data transmission without interactive formatting.
  • LU 2: Manages data stream sessions for interactive display terminals, such as IBM 3270 devices, enabling structured screen presentation and user input handling.
  • LU 3: Supports unformatted output to printers using a subset of the 3270 data stream.
  • LU 6.2: Enables peer-to-peer communication between application programs (Advanced Program-to-Program Communication, or APPC), supporting distributed transaction processing across heterogeneous systems.
Key functions of LUs include data formatting to ensure compatibility with network protocols and device capabilities, such as structuring information units () with function management headers (FMHs) for request and response bracketing during sessions. For LU 2 sessions, screen management involves controlling cursor positioning, field highlighting, and on 3270 terminals via the 3270 , which supports attributes like color and protection levels to enhance user interaction. Session bracketing is achieved through commands that negotiate parameters like modes and error recovery, ensuring orderly data flow and bracketing of related request units () into chain sequences. Over time, LUs evolved to accommodate advanced networking paradigms, particularly with the introduction of LU 6.2 in later SNA versions, which extended support for distributed processing by allowing transaction programs on remote nodes to initiate and manage sessions independently, reducing reliance on centralized hosts. This development aligned with SNA's shift toward Advanced Peer-to-Peer Networking (APPN), enabling scalable, location-transparent application integration in enterprise environments.

Physical Units

In Systems Network Architecture (SNA), a Physical Unit (PU) is defined as a network-addressable unit (NAU) that serves as the controller for a physical , managing local resources such as attached communication links, adjacent link stations, and subordinate Logical Units (LUs). PUs enable the to participate in the by handling node-level operations, distinct from the application-focused functions of LUs. SNA specifies several PU types, each tailored to different node capabilities and roles within the network topology. Type 1 PUs represent low-function peripheral nodes, such as single-station terminals like the 3767, which manage basic terminal attachments without advanced routing. Type 2 PUs are enhanced peripheral nodes, exemplified by cluster controllers such as the 3174 and 3274, supporting local addressing and peer communication in type 2.1 nodes. Type 4 PUs function in subarea nodes, often as communication controllers like the 3745 in a subarea configuration or host processors, providing boundary functions for protocol translation. Type 5 PUs are advanced subarea nodes, typically host processors such as the ES/9000 or System/370 running VTAM, which house the System Services Control Point (SSCP) for . The primary responsibilities of a PU include activating and deactivating links to adjacent under SSCP direction, performing detection and at the level to ensure link reliability, and maintaining dependency on the SSCP for overall configuration and activation through dedicated SSCP-PU sessions. These sessions must be established by the SSCP before the PU can integrate into the active network, allowing the PU to report , exchange control data, and monitor resources like links and subordinate LUs. statistics and maintenance data are collected via the SSCP to support network diagnostics. PUs play a central role in SNA's hierarchical structures, forming a tree-like where Type 5 PUs act as roots, overseeing subordinate Type 4 PUs in communication controllers, which in turn manage lower-level peripheral PUs like Types 1 and 2. This hierarchy ensures orderly resource allocation and control, with activation propagating from Type 5 nodes outward to subordinates, facilitating scalable in subarea environments.

Protocols and Technologies

In Systems Network Architecture (SNA), the data link control layer manages the reliable transfer of data over physical links, primarily through Synchronous Data Link Control (SDLC), a bit-oriented designed for serial-by-bit transmission in point-to-point or multipoint configurations. SDLC operates in full-duplex or half-duplex modes, with a primary station controlling one or more secondary stations to initiate and terminate data exchanges. It supports both nonswitched and switched networks, enabling efficient communication over dedicated lines or dial-up connections. SDLC frames data using a structured format that includes a starting flag sequence (01111110 binary) to delineate frames, an 8-bit address field for , an 8-bit field for command or supervisory functions, an optional variable-length information field (multiples of 8 bits), and a 16-bit (FCS) for integrity verification. Acknowledgments are handled via numbers: the N(s) field indicates the sequence of the transmitted frame, while N(r) confirms the next expected frame, allowing positive of received and detection of missing frames. Error detection relies on cyclic redundancy checking () with the generating X^{16} + X^{12} + X^5 + 1, where the FCS is the one's complement of the obtained by dividing the frame contents by this polynomial, ensuring high reliability in noisy environments. Link management in SDLC includes error recovery through automatic retransmission of unacknowledged frames, with supervisory commands like Receive Ready (RR) and Receive Not Ready (RNR) for flow control, and poll/final bits to coordinate primary-secondary interactions. For legacy compatibility, SNA provides fallback to Binary Synchronous Communication (BSC), or bisync, which uses control characters for asynchronous framing on non-SNA devices, though SDLC remains the primary protocol for modern SNA links. Physical Units (PUs) in SNA oversee these links, configuring and activating them via transmission groups that aggregate multiple physical connections. The path control layer in SNA handles intranode and internode routing of path information units (), establishing virtual and explicit routes to direct traffic across transmission groups (TGs) while avoiding congestion. Explicit routes are statically defined, unidirectional paths comprising sequences of subarea nodes and TGs, numbered from 0 to 15, that activate automatically upon session initiation and deactivate on failures, with up to 16 such routes per network to provide redundancy. Virtual routes, in contrast, are bidirectional logical overlays on explicit routes, supporting up to 24 per subarea pair (8 numbers with 3 transmission priority levels), and inherit physical characteristics like while enabling shared session traffic. Intermediate session routing facilitates traffic distribution in Advanced Peer-to-Peer Networking (APPN) environments, using session connectors to propagate data across multiple nodes via local-form session identifiers (LFSIDs), which are 17-bit values swapped at each hop for address translation. Intermediate nodes process PIUs by consulting tables (in subarea networks) or databases (in APPN), stripping adaptive network (ANR) labels from headers, and applying hop-by-hop pacing to maintain order and prevent buffer overflows. Congestion avoidance employs adaptive pacing mechanisms, where virtual route windows adjust dynamically—reducing from a maximum of three times the minimum (set to the number of TGs) during high load—combined with priority queuing and aging algorithms to reorder delayed PIUs. In multidomain setups, adaptive enhances path by dynamically selecting optimal paths in APPN using least-weight algorithms based on class-of-service tables, exchanges, and border nodes, contrasting with the fixed of subarea . Path supports diverse through TGs, including SDLC for links, System/370 channels for high-speed attachments, and local area like Token-Ring or Ethernet, with segmentation and blocking to match varying link capacities.

Transmission and Session Control

Transmission Control in Systems Network Architecture (SNA) operates at Layer 4 of the SNA protocol stack, providing end-to-end reliability for data transmission across virtual routes by managing the sequencing, bracketing, and recovery of Request Units (RUs). Sequence numbers, ranging from 1 to 65,535 and wrapping to 0 after session activation, ensure that Path Information Units (PIUs) or RUs are delivered in the correct order, with the receiving end verifying this integrity. Bracketing groups related RUs or PIUs into logical units using Begin Bracket (BB), End Bracket (EB), or Conditional End Bracket (CEB) indicators, facilitating coordinated exchanges and reassembly of Basic Information Units (BIUs) to maintain transaction integrity. Recovery procedures at this layer support selective retransmission of lost or corrupted RUs through resynchronization or positive/negative responses, ensuring reliable delivery without relying solely on lower-layer path controls. Data Flow Control, functioning at Layer 5, regulates the rate of data transmission to prevent network congestion using credit-based mechanisms and supports prioritized flows. Credit-based flow control employs pacing windows, with a maximum size of 32,767 credits negotiated during session setup, allowing the receiver to grant permissions for sending data and avoiding overruns. Adaptive session-level pacing dynamically adjusts these windows based on network capacity or congestion, enhancing efficiency over fixed methods. Expedited flow enables priority transmission for urgent data, such as control information up to 86 bytes, bypassing normal flow queues via protocols like the Rapid Transport Protocol (RTP). Request/response modes further structure data exchanges, supporting half-duplex (flip-flop), full-duplex, immediate (requiring a response before proceeding), or delayed (non-blocking) operations, as negotiated during session initiation. Session establishment in SNA relies on bind requests to activate communication between Logical Units (LUs), supporting both LU-LU sessions and SSCP-LU sessions mediated by the System Services Control Point (SSCP). Normal bind requests initiate sessions by specifying protocols, modes, and security parameters through CINIT and BIND messages, with SSCP involvement required for dependent LUs in subarea networks to locate partners. Fast binds accelerate setup in Type 2.1 nodes by being SSCP-independent, leveraging local control points and boundary functions for efficient reuse without full SSCP mediation. These binds define primary/secondary LU roles and session parameters, enabling reliable half-duplex or full-duplex interactions between compatible LUs. Error recovery procedures at the transmission and session layers emphasize robustness through mechanisms like reverse recovery and adaptive pacing to handle disruptions without full session termination. Reverse recovery restores the session to a prior consistent state or resynchronizes after errors, often used in conjunction with extended recovery facilities for backup switching in failure scenarios. Adaptive pacing complements this by dynamically modifying flow rates via Isolated Pacing Messages (IPMs) or session-level adjustments, responding to detected congestion or capacity changes to maintain performance. These procedures build on LU roles for session management, ensuring end-to-end reliability across the supported virtual routes.

Network Implementations

SNA over Token-Ring

Systems Network Architecture () was adapted to operate over IBM's Token-Ring local area networks in the early , coinciding with the introduction of Token-Ring as a robust LAN technology compliant with IEEE 802.5 standards at speeds of 4 Mbps and later 16 Mbps. This integration allowed SNA to leverage Token-Ring's token-passing mechanism for reliable, deterministic access in enterprise environments, particularly for connecting mainframes to cluster controllers and terminals without the need for dedicated leased lines. Source-Route Bridging (SRB) emerged as a key enabler, permitting SNA traffic to traverse multiple interconnected Token-Ring segments while maintaining path integrity across bridged networks. In SNA over Token-Ring implementations, SNA paths are mapped to Token-Ring frames through the (LLC) sublayer, specifically using LLC Type 2 to provide connection-oriented, reliable data transfer with sequencing and error recovery. LLC Type 2 establishes virtual circuits between SNA nodes via service access points (s), where source SAP (SSAP) and destination SAP (DSAP) identifiers encapsulate SNA protocol data units (PDUs) within Token-Ring Media Access Control (MAC) frames that include up to 17,800 bytes of to accommodate larger SNA transmissions efficiently. The frame structure incorporates a () when SRB is employed, embedding and numbers to guide packets along predetermined routes without flooding the network. Source-route discovery facilitates this mapping by enabling SNA end stations to dynamically learn optimal paths across Token-Ring bridges using broadcast frames such as All Routes Explorer (ARE) or Single Route Explorer (SRE), which carry test or exchange identification (XID) commands to probe network topology. In mixed environments combining Token-Ring with other media like Ethernet, SRB supports translational bridging to preserve SNA's source-routing semantics, while transparent bridging can be used for non-routed SNA traffic to simplify connectivity in hybrid LANs without altering frame formats. These mechanisms ensure SNA's path control layer functions seamlessly over Token-Ring, as referenced in broader SNA protocol definitions. Performance advantages of SNA over Token-Ring include higher throughput for cluster controllers in enterprise LANs, achieved through features like early token release in 16 Mbps half-duplex modes, which allows immediate transmission after token acquisition rather than waiting for the full ring circulation, yielding near-wire-speed utilization of up to 15.99 Mbps for SNA sessions. Larger sizes and adjustable parameters, such as maximum output size (*LANMAXOUT) and frequency (*LANACKFRQ), further optimize for bursty SNA traffic, reducing overhead and in multi-hop bridged configurations compared to earlier bisynchronous or SDLC links. This made Token-Ring a preferred medium for SNA in corporate networks, supporting scalable campus-wide deployments with predictable response times for interactive applications.

SNA over TCP/IP

Systems Network Architecture (SNA) over TCP/IP enables the integration of legacy SNA applications and networks with modern IP infrastructures by tunneling SNA traffic over IP protocols, allowing organizations to consolidate networks without disrupting established SNA session semantics. Developed primarily in the as IP adoption grew, this approach addressed the need to migrate SNA-dependent systems—such as mainframe applications in banking and enterprise environments—to cost-effective IP backbones while preserving the reliability and control features of SNA, including session management from transmission control layers. A key technology in this integration is IBM's Enterprise Extender (EE), introduced in the late , which encapsulates frames within / packets to transport them transparently over networks. EE treats the infrastructure as an SNA data link, supporting high-performance routing (HPR) for efficient path selection and automatic link activation without requiring changes to the underlying stack or SNA applications. This encapsulation preserves SNA's end-to-end session integrity, enabling seamless connectivity for advanced networking (APPN) environments across wide-area networks. For terminal access, the TN3270E protocol extends the traditional 3270 standard to emulate terminals over connections, supporting enhanced controls like identifiers and LU name negotiation. Defined in RFC 2355, TN3270E allows up to 128,000 concurrent emulated sessions per server, facilitating access to SNA-hosted applications from IP-based clients without native SNA support. It integrates with SNA session control by mapping Telnet sessions to logical unit () types, ensuring compatibility with 3270 in environments like VTAM. IBM's AnyNet provides gateway functions for SNA over TCP/IP by implementing the Multi-Protocol Transport Networking (MPTN) architecture, which maps SNA application interfaces like APPC (Advanced Program-to-Program Communication) to TCP/IP sockets. AnyNet acts as an intermediary, converting SNA requests to IP transports and vice versa, supporting APPC over IP for application interactions without altering legacy code. Although now deprecated in favor of EE, AnyNet was instrumental in early migrations, enabling SNA applications to leverage IP for connectivity in heterogeneous networks. Standards such as 1538 outline a simple transport for establishing sessions over , providing a foundation for APPC integration by defining session initiation and data flow mechanisms. These standards, alongside 2355 for TN3270E, facilitate SNA/IP , including APPC over IP for distributed transaction processing. Common use cases include migrating SNA traffic from dedicated leased lines or to IP backbones in enterprise settings, such as connecting branch office servers to central mainframes while maintaining SNA's bracketing and sequencing for reliable delivery. This approach supports gradual consolidation, allowing organizations to route SNA alongside IP traffic over shared infrastructures like Ethernet or the , reducing costs without sacrificing application performance or session preservation.

Security

Mechanisms and Features

Systems Network Architecture (SNA) incorporates session-level security mechanisms to authenticate users and systems during the establishment of logical unit (LU) to system services control point (SSCP) binds. This process involves logon validation where user IDs and passwords are exchanged and verified, ensuring that only authorized entities can initiate sessions. Specifically, in LU 6.2 environments, bind-time security requires the exchange of encrypted bind flows containing user credentials, which are validated against predefined profiles to prevent unauthorized connections. These binds enforce APPC=YES and VERIFY=REQUIRED parameters in application definitions, mandating password authentication for each LU-LU pair before session activation. Resource access controls in SNA are primarily enforced through the integration of Virtual Telecommunications Access Method (VTAM) with the (RACF), providing robust authorization for network resources. VTAM leverages RACF profiles in classes such as VTAMAPPL, TERMINAL, and APPCLU to regulate access to applications, terminals, and LU sessions, requiring READ or permissions based on the operation. For instance, VTAMAPPL profiles control the opening of access control blocks (ACBs) for regions, while APPCLU profiles secure LU 6.2 binds by matching session keys stored in RACF. System initialization parameters like SEC= and BINDSECURITY=YES activate these checks, ensuring that surrogate user validation and transaction attachments are authorized via RACF before resource utilization. SNA supports data protection in transit through encryption options, notably the and its triple variant (), introduced in later extensions and enhanced via program temporary fixes (PTFs). Session-level encryption (SLE) applies with 8-byte keys or with 24-byte keys to encrypt payload data end-to-end, configurable via the ENCRTYPE parameter on LU application definitions and logmode entries. These mechanisms use shared symmetric keys installed per node and exchanged during session setup, protecting sensitive data without encrypting SNA headers unless combined with additional protocols. PTFs have been issued to strengthen and algorithm support, such as enabling for improved confidentiality over legacy implementations. Domain isolation in SNA is achieved through SSCP boundaries, which segment the network into subdomains to restrict unauthorized cross-domain access and resource discovery. Each SSCP manages resources within its domain, using adjacent control point (ADJCP) tables with parameters like ALIASRCH=NO to limit directory searches and prevent exposure of resources across NetIDs. VTAM options such as AUTHNET (introduced in V1R10) further enforce NetID-based restrictions on session routing, ensuring that SSCP-SSCP sessions for cross-domain setup require explicit authorization. This hierarchical structure maintains isolation while allowing controlled inter-domain communication via cross-domain resource managers (CDRMs). In 3.1 and later (as of 2025), Communications Server includes general security improvements for SNA, such as enhanced authentication services.

Vulnerabilities and Mitigations

One notable vulnerability in early implementations of involves weak mechanisms, where passwords were often transmitted or stored in clear text, such as in the SYS1.UADS , exposing them to unauthorized access by local or through misconfigured systems. This issue was particularly prevalent in pre-1990s deployments relying on basic VTAM sessions without additional safeguards, allowing potential interception of credentials during logon processes. Furthermore, SNA's optional features meant that data on unencrypted links could be vulnerable to packet sniffing, enabling attackers to capture sensitive transaction information in transit over subarea or APPN networks. While unencrypted sessions pose risks like sniffing, SNA's LU ensures consistency to mitigate impersonation. Insufficient logging compounded these issues, as early SNA lacked comprehensive audit trails for session activities, making it difficult to detect or investigate unauthorized attempts in mainframe setups. To mitigate these vulnerabilities, organizations can implement SSL/TLS wrappers around SNA sessions, particularly for APPN over via Enterprise Extender, ensuring encrypted tunnels that prevent sniffing. Upgrading to the () provides stronger authentication, replacing clear-text passwords with encrypted profiles and supporting through external integrations like LDAP. , using firewalls and virtual local area networks (VLANs) to isolate SNA traffic, further reduces exposure, while enabling the Integrated Cryptographic Service Facility (ICSF) enforces data encryption with algorithms like for LU-to-LU communications. Enhanced logging via the System Management Facility (SMF) records, combined with tools like Security zSecure, allows for real-time auditing and in modern environments. recommends applying the latest patches, which include fixes for session management flaws in VTAM, to maintain compliance and .

Advantages and Limitations

Advantages

Systems Network Architecture (SNA) excels in centralized control, which facilitates efficient resource management and across large enterprise environments. Through its hierarchical structure, SNA employs System Services Control Points (SSCPs) to oversee network resources within a domain, while enabling coordination across multiple domains via SSCP-SSCP sessions. This centralized approach supports operator commands for activating and deactivating resources remotely, streamlining administration and minimizing disruptions. SNA incorporates robust error recovery and flow control mechanisms that enhance reliability in mission-critical applications by reducing . The architecture automatically detects and recovers from during transmission, while flow control procedures prevent data overrun and . Path control detects inoperative routes and notifies session partners, enabling automatic reestablishment over alternate paths, with control further minimizing errors to ensure session integrity. The architecture demonstrates strong , supporting configurations for thousands of sessions and high-volume in sectors such as banking. Features like multiple active —up to eight explicit routes between subarea nodes—and virtual-route pacing allow handling of peak loads without requiring separate links for diverse terminals. Multi-domain support via Advanced Communication Function (ACF) distributes resources effectively, enabling expansion to increased transaction volumes, terminals, or applications while maintaining performance. SNA's backward compatibility preserves decades of legacy investments by avoiding the need for full application rewrites. Its layered design isolates changes in lower layers, permitting of new telecommunication facilities without impacting upper-layer applications. programs, such as those under the Network Terminal Option (NTO) with ACF/NCP/VS, bridge SNA and non-SNA components, ensuring seamless attachment of legacy devices.

Disadvantages

One significant limitation of Systems Network Architecture (SNA) is its design, which binds users to the ecosystem, fostering and elevating operational costs through reliance on IBM-specific , software, and support services. This exclusivity restricts with non-IBM systems, making it challenging and expensive to integrate third-party components without custom gateways or emulators. SNA's original hierarchical model in subarea networking, centered around a mainframe-dominated structure with predefined paths and centralized control, limits flexibility for communications and compared to open standards like TCP/IP. However, extensions like Advanced Networking (APPN) provide capabilities and to address these issues. This rigidity in classic SNA suits reliable, controlled environments but hampers in distributed setups, as updates to the network require extensive reconfiguration of the entire . The architecture's complexity in and demands specialized skills, often necessitating dedicated IBM-trained personnel to manage its layered protocols, session controls, and definitions. Routine tasks like path optimization or fault isolation involve intricate tools such as VTAM, leading to higher administrative overhead and prolonged downtime risks for organizations lacking in-house expertise. Natively, SNA lacks robust support for internet-scale networking or mobile integration, as its session-oriented, bandwidth-reserved design does not accommodate the variable, connectionless traffic of modern environments without significant extensions like SNA over . While such adaptations partially mitigate these issues by tunneling SNA over for broader connectivity, they introduce additional latency and do not fully resolve the underlying architectural constraints.

Competitors and Alternatives

Main Competitors

TCP/IP emerged as the primary open alternative to proprietary networking architectures like , developed under the project by the U.S. Department of Defense's Advanced Research Projects Agency () during the 1970s and 1980s. The protocols were first specified in detail in 1974, with initial implementations on hosts beginning in 1977, and a full transition from the earlier Network Control Protocol (NCP) to / occurring on January 1, 1983, marking the operational birth of the modern . /'s core characteristics emphasized decentralized, connectionless at the layer for and reliable, connection-oriented transport at the layer, enabling scalable, internet-compatible networking across heterogeneous systems without reliance on a central host. DECnet, developed by (DEC), served as a key rival in environments, particularly for operating systems, with its initial phases introduced in the early . Building on DEC's Digital Data Communications Message Protocol (DDCMP), DECnet Phase I launched in 1975 as a networking solution, evolving through subsequent phases to support multi-vendor interoperability by the 1980s. Its architecture focused on symmetric, end-to-end communication between nodes, including and remote terminal access, optimized for DEC's and VAX minicomputers in distributed enterprise settings. X.25, standardized by the (ITU-T, formerly CCITT), represented a foundational protocol for wide-area packet-switched networks, with its first recommendation approved in 1976 following development in the early . Designed primarily for public data networks (PDNs), X.25 enabled virtual circuit-based communication over shared infrastructures like the (PSTN), supporting reliable data transfer for applications such as banking and . The protocol's three-layer structure—physical, (using Link Access Procedure Balanced, LAPB, for framing and error detection/correction), and network (for packet multiplexing and flow control)—ensured robust operation in error-prone analog lines, with built-in retransmission mechanisms to maintain . Other contemporaries targeting similar mainframe niches included Burroughs Network Architecture (BNA), introduced in 1978 to facilitate terminal-host interactions and computer-to-computer data exchange in Burroughs' A-series environments. BNA emphasized hierarchical yet flexible networking for and database access across distributed mainframes. Similarly, 's Distributed Systems Architecture (DSA), introduced in 1981, provided an open, layered framework for interconnecting Honeywell DPS systems, promoting distributed processing and multi-vendor compatibility in enterprise mainframe deployments. DSA focused on modular communications to support remote job entry and resource sharing without central bottlenecks.

Key Comparisons

Systems Network Architecture (SNA) differs fundamentally from its competitors in architectural design, emphasizing hierarchical control suited to mainframe environments, while alternatives like TCP/IP, DECnet, and X.25 offer varying degrees of openness, distribution, and adaptability for broader or public networks. These distinctions influenced SNA's strong position in IBM-centric enterprises during the but led to its gradual displacement by more scalable protocols in diverse settings by the 1990s. In comparison to /IP, employs a hierarchical with centralized control through mainframes, enforcing deterministic paths, predefined , and session for reliable in enterprise settings. /IP, by contrast, uses a flat, model with distributed , enabling unpredictable but highly scalable connectivity across heterogeneous devices without central oversight. 's proprietary nature limits to ecosystems, requiring gateways for non-IBM integration, whereas /IP's open standards foster broad compatibility and global . While excels in reliability for mainframe workloads like banking transactions, its rigidity hampers scalability for expansive, dynamic networks, contributing to /IP's dominance in mixed environments by the mid-1990s as adoption surged. Compared to DECnet, SNA is mainframe-centric, relying on a hierarchical structure where peripheral nodes depend on central for and , providing for high-volume operations. DECnet, developed for Digital Equipment Corporation's VAX and systems, adopts a decentralized, approach that supports workstation-focused with greater autonomy among nodes. This makes SNA superior for centralized management in large-scale mainframe shops but less flexible than DECnet's adaptable design, which eases expansion in multi-vendor workstation networks without strict host dependency. challenges persist for both stacks, often necessitating gateways, though DECnet's Ethernet compatibility offers marginal advantages in settings. SNA contrasts with X.25 in its private enterprise orientation versus X.25's role as a public carrier standard for packet-switched wide-area networks. SNA maintains end-to-end control by treating X.25 links as mere transmission media, allowing networks to manage , , and session protocols independently at higher layers. This enables seamless where SNA applications dictate connectivity over X.25 infrastructure, providing tighter control for internal enterprise data flows compared to X.25's link-level focus on virtual circuits for public services. Suitability diverges accordingly: SNA optimizes for controlled, reliable private intranets, while X.25 suits cost-shared public access but lacks SNA's comprehensive end-to-end governance.
AspectSNA (vs. TCP/IP)SNA (vs. DECnet)SNA (vs. X.25)
ArchitectureHierarchical, centralized mainframe controlHierarchical mainframe dependencyPrivate layered control over public links
InteroperabilityProprietary, IBM-limited; gateways neededRigid, gateway-dependent for multi-vendorEnd-to-end SNA dominance via X.25 as
SuitabilityReliable transactions; limited scaleCentral control for mainframes; less flexibilityPrivate intranets vs. public access
Overall, SNA's architecture ensured dominance in IBM-dominated shops for mission-critical reliability through the , but its proprietary hierarchy yielded to TCP/IP's open scalability in heterogeneous, internet-driven environments by the , with DECnet and X.25 serving niche distributed or public roles respectively.

Implementations Beyond IBM

Third-Party and Emulation

Third-party vendors have developed software gateways and emulators to extend Systems Network Architecture (SNA) compatibility to non-IBM platforms, such as personal computers and Unix systems, enabling access to SNA hosts without native hardware. (formerly Wall Data's Rumba), for instance, is a terminal emulation suite that supports SNA connections via protocols like Data Link Control () and Advanced Program-to-Program Communication (APPC), allowing Windows users to interface with mainframe applications as if using traditional 3270 s. integrates with SNA servers, such as SNA Server, to facilitate session management and data transfer over local area networks. Open-source initiatives have contributed to SNA emulation primarily through terminal emulators that handle the 3270 data stream over (TN3270), providing partial support for SNA protocol elements without full stack implementation due to SNA's proprietary nature. Projects like x3270 offer multi-platform TN3270 clients that emulate terminals, connecting to SNA gateways or hosts for interactive access to legacy applications. Similarly, the Open3270 library provides a .NET-based for TN3270 sessions, supporting enhanced features like SSL to secure connections to SNA environments. These efforts, often hosted under or independent repositories, focus on client-side emulation rather than complete SNA network stacks, bridging modern IP-based systems to SNA backends. In 2025, Rocket Software released Secure Host Access, a consolidating multiple tools for secure access to and SNA environments. Hardware solutions from networking vendors further enable SNA interoperability by incorporating TN3270 server functionality into routers and appliances. Cisco's TN3270 Server, available on channel-attached routers, acts as an SNA-dependent logical unit requester (DLUR) to offload 3270 session processing from mainframes, converting TN3270 traffic over into native SNA Logical Unit () sessions via VTAM, with support for up to 255 LUs per Physical Unit () in APPN or non-APPN configurations. Attachmate (now part of ) offers SNA Gateway appliances and software, such as EXTRA! X-treme, which provide /IP-to-SNA connectivity, emulating 3270 terminals and supporting LU pooling for efficient host access across Unix, Windows, and mainframe environments. To ensure compatibility and fidelity with IBM SNA implementations, third-party products undergo compliance testing through IBM's interoperability programs, which validate adherence to standards like RFC 2355 for TN3270 enhancements and integration with VTAM for session routing. These tests, outlined in IBM Communications Server documentation, confirm proper handling of SNA control blocks, PU types, and APPN directory services, allowing certified vendors like to achieve seamless operation in mixed environments.

Current and Legacy Usage

Systems Network Architecture (SNA) continues to underpin critical operations in sectors such as , , and , where it supports high-volume on zSystems mainframes. In banking, for instance, SNA facilitates core systems like Customer Information Control System (CICS) transactions, handling billions of daily interactions that demand reliability and low . Insurance firms rely on SNA for policy management and claims processing, while agencies use it for secure exchange in legacy environments, with 56% of organizations in these sectors reporting increased mainframe workloads as of 2025 driven by integration and compliance needs. Modern hybrid environments integrate SNA with cloud platforms through protocols like Enterprise Extender, which encapsulates SNA traffic over IP for seamless connectivity to services such as AWS Mainframe Modernization and 's Host Integration Server (HIS). AWS enables replatforming of SNA-dependent applications to cloud-native runtimes, supporting and workloads in hybrid setups without full rewrites. Similarly, Logic Apps and HIS provide SNA over IP connectors, allowing Azure applications to interact with mainframe SNA resources for data synchronization and API calls in real-time hybrid scenarios. These integrations address the need for agility while preserving SNA's role in transaction-heavy operations. While greenfield deployments of SNA have declined in favor of IP-based architectures, maintenance persists across over 70% of mainframe sites as of 2025, reflecting its embedded role in mission-critical infrastructure. Surveys indicate 95% of enterprises report stable or growing mainframe usage, with only 28% of applications migrated off-platform, underscoring SNA's longevity despite modernization pressures. Migration from SNA-based systems presents challenges, including skills shortages affecting 65% of and 63% of organizations, as well as the complexity of refactoring proprietary protocols into open standards. IBM's Connect addresses these by enabling exposure of SNA applications, such as services, as RESTful endpoints with minimal code changes, facilitating integration with and ecosystems. This tool supports hybrid modernization strategies, allowing organizations to gradually phase out legacy SNA dependencies while maintaining operational continuity.

References

  1. [1]
    What is Systems Network Architecture (SNA)? - IBM
    Systems Network Architecture (SNA) is a data communication architecture established by IBM to specify common conventions for communication.
  2. [2]
    [PDF] Systems Network Architecture General Information - Bitsavers.org
    Systems Network Architecture (SNA) is a unified communication system design that defines functions and structure for IBM communication products.
  3. [3]
    Systems Network Architecture (SNA) - IBM
    SNA is the original networking architecture for mainframe computers, now used for application communication, with a new version called SNA/APPN.
  4. [4]
    [PDF] Introduction to Systems Network Architecture (SNA) on z/OS - IBM
    Mar 6, 2025 · ▫ Systems Network Architecture (SNA) 1970s. – 1974 IBM announced SNA. • VTAM (Virtual Telecommunications Access Method) is the mainframe. SNA ...
  5. [5]
    Systems Network Architecture - basics and implementation - IBM
    Systems Network Architecture (SNA) is a data communication architecture by IBM, using a hierarchical network paradigm, with the mainframe at the top.Missing: scope | Show results with:scope
  6. [6]
    None
    Below is a merged summary of the SNA and networking content from the provided z/OS Basics PDF segments, consolidating all information into a single, comprehensive response. To retain maximum detail and ensure clarity, I’ve organized the information into a table in CSV format, followed by a narrative summary that integrates key points and useful URLs. This approach ensures all details are preserved while maintaining readability.
  7. [7]
    Systems Network Architecture Technical Overview
    Chapter 1. Introduction. The Architecture . . . . . SNA Layers ..... . SNA and the Networking Blueprint. Advanced Peer-to-Peer Networking (APPN) .
  8. [8]
    IBM Announces Systems Network Architecture - History of Information
    SNA was a uniform set of rules and procedures for computer communications to free computer users from the technical complexities of communicating through local, ...
  9. [9]
    The Virtual Telecommunications Access Method: A Systems ...
    The Virtual Telecommunications Access Method: A Systems Network Architecture perspective ; Page(s): 53 - 80 ; Date of Publication: 31 December 1976 ; ISSN ...
  10. [10]
    The evolution of SNA - IBM
    SNA evolved from a static, hierarchical subarea network to a dynamic, peer-to-peer APPN, with later enhancements like HPR and SNA/IP.
  11. [11]
    Advanced Program-to Program Communications (APPC) - IBM
    APPC, also known as LU 6.2, was introduced by IBM in 1982 to address the exchange of data between two peer programs that are located either in the same ...Missing: 1980s | Show results with:1980s
  12. [12]
    Background on SNA/IP implementation - IBM
    In the early 1990s, enterprises began to implement router technology in their backbone networks. At that time, enterprise networks resembled the Tower of ...
  13. [13]
    [PDF] Understanding Enterprise Extender - IBM
    IBM SNA Statement of Direction. IBM's plans to support SNA workloads have not changed since the Statement of Direction made in 2002. As of. June 2004 ...
  14. [14]
    [PDF] z/OS Communications Server - SNA Operation - IBM
    Jun 17, 2025 · This document is intended to help network operators use VTAM® commands and messages to control and maintain a telecommunication network.
  15. [15]
    Architectural components of the SNA network - IBM
    SNA network components include physical units (PUs) that manage resources, logical units (LUs) for user access, and system services control points (SSCPs).
  16. [16]
    Network accessible units - IBM
    Each element with such an address is known as a network accessible unit (NAU). The network address uniquely identifies the element and contains the information ...Missing: Addressable | Show results with:Addressable
  17. [17]
    [PDF] Systems Network Architecture Technical Overview - Bitsavers.org
    specified by SNA and implemented in IBM software and hardware products. ... network addressable unit (NAU) , a link station, or a link. See also network.
  18. [18]
    Basic SNA terms and concepts - IBM
    A network addressable unit (NAU) is a resource managed by the communications system. NAUs provide a window through which users access the communications system ...
  19. [19]
    Logical units - IBM
    A logical unit is a device or application program by which an end user (an application program, a terminal user, or an input/output mechanism) gains access ...Missing: documentation | Show results with:documentation
  20. [20]
    Session types - IBM
    Session types · LU 0: These protocols are not defined by SNA. · LU 1: LU 1 protocols provide access to nondisplay I/O devices such as printers and keyboard ...
  21. [21]
    [PDF] Introduction to Sessions between Logical Units - Bitsavers.org
    Chapter 3, Types of Logical-Unit to Logical-Unit Sessions, describes six types of lU-lU sessions that have been defined by SNA -- types 0, 1, 2,.
  22. [22]
    [PDF] GA27-3093-2_SDLC_General_Information_Mar79.pdf - Bitsavers.org
    This manual describes IBM Synchronous Data Link Control (SDLC). It includes a brief communications overview, a basic description to familiarize the reader with ...
  23. [23]
    None
    Summary of each segment:
  24. [24]
    [PDF] Token Ring Solutions - ibmfiles.com
    Source-route bridging is especially useful in SNA networks, because it allows multiple paths between two points across the network and also allows configuration ...
  25. [25]
    Understanding Logical Link Control - Cisco
    Sep 9, 2005 · IBM originally designed LLC as a sublayer in the IBM Token Ring architecture ... Connection-oriented data transfer is referred to as LLC type 2, ...
  26. [26]
    SNA/IP implementation - IBM
    SNA/IP implementation uses DLSw, which encapsulates SNA into TCP, and Enterprise Extender, which encapsulates SNA into UDP, for running SNA over IP.
  27. [27]
    Enterprise Extender - IBM
    Enterprise Extender (EE) enables running SNA applications over IP networks, treating IP as a type of SNA connection, without changes to the IP infrastructure.
  28. [28]
    [PDF] SNA and TCP/IP Integration - Infania Networks
    The Enterprise Extender technology was implemented on most of IBM's ... Because TCP/IP underlies SNA in an Enterprise Extender configuration, we.
  29. [29]
    [PDF] Modernizing SNA: Enterprise Extender Concepts and Considerations
    •SNA transport over native IP network ... enabled for EE, the EE connectivity test is repeated for each valid TCP/IP interface which routes EE traffic.
  30. [30]
    RFC 2355: TN3270 Enhancements
    This document describes a protocol that more fully supports 3270 devices than do traditional tn3270 practices.
  31. [31]
    TN3270E description - IBM
    TN3270E is a protocol converter that emulates a 3270 terminal, allowing clients to access resources on a server, and it can alter some data flows.
  32. [32]
    TN3270 Enhanced (TN3270E) - IBM
    TN3270E server supports 128,000 emulated terminals via software clients. It uses the TN3270E protocol, but the target application expects SNA protocol.
  33. [33]
    IBM AnyNet Configuration (SNA over TCP/IP)
    Dec 18, 2019 · AnyNet (a method used to run SNA communications traffic over IP) is no longer supported. Users of AnyNet are encouraged to migrate to Enterprise Extenders as a ...
  34. [34]
    AnyNet SNA over TCP/IP - IBM
    This chapter describes the AnyNet® SNA over TCP/IP function of Personal Communications. What Does AnyNet SNA over TCP/IP Do? How Does SNA over TCP/IP Work?
  35. [35]
    Information on RFC 1538 - » RFC Editor
    ... RFC 1538. Abstract. This RFC provides information for the Internet community about a method for establishing and maintaining SNA sessions over an IP internet.
  36. [36]
    None
    ### Summary of SNA Security Mechanisms
  37. [37]
    Authentication of the remote system that sent the request - IBM
    Systems Network Architecture (SNA): When an SNA connection is acquired, sessions are activated in both systems by the exchange of encrypted bind flows. You ...
  38. [38]
    [PDF] CICS TS for z/OS: RACF Security Guide - IBM
    Jan 4, 2024 · This PDF describes how to plan and implement security across your CICS systems. It is intended for security administrators responsible for ...
  39. [39]
    ENCRTYPE - IBM
    Specifies that VTAM must use a minimum of DES encryption with an 8–byte key when performing session level encryption. This is the default. ENCRTYPE=TDES24 ...<|separator|>
  40. [40]
    [PDF] Enterprise Extender Implementation Guide - IBM Redbooks
    Note: Before using this information and the product it supports, read the information in “Notices” on page xi. Page 5. © Copyright IBM Corp. 2007. All rights ...
  41. [41]
    [PDF] Security on the IBM Mainframe: Volume 1
    VTAM® configuration, TCP/IP configuration, Intrusion Detection Services, AT-TLS, IPSec,. FTP, and similar components. These subjects must be covered for all ...
  42. [42]
    SNA security - IBM
    SNA can be roughly divided into two types of implementation: subarea and APPN. The security considerations are slightly different between them. Subarea security.Missing: vulnerabilities | Show results with:vulnerabilities
  43. [43]
  44. [44]
    [PDF] Systems Network Architecture Concepts and Pioducts - Bitsavers.org
    This publication introduces the IBM Systems Network Architecture to individuals who need to acquaint themselves with its benefits, its concepts, and the IBM ...Missing: motivations | Show results with:motivations
  45. [45]
    SNA and OSI: three strategies for interconnection - ACM Digital Library
    Connectivity features such as security and network management are more difficult due to the varying oper- ating systems between differing proprietary networks.Missing: limitations | Show results with:limitations
  46. [46]
    [PDF] A comparative study of System Network Architecture Vs Digital ...
    SNA has designed for IBM systems only to provide the networking facility. Due to this, it is used by only limited set of users. It is. IBM's proprietary ...Missing: disadvantages limitations
  47. [47]
    SNA and TCP/IP on z/OS - IBM
    With the prevalence of TCP/IP and the introduction of SNA/IP integration technology and additional tools, current mainframe networks are migrating to IP-based ...
  48. [48]
    Introduction to SNA
    ### Summary of SNA Complexity, Maintenance, and Specialized Skills
  49. [49]
    Integrating SNA and TCP/IP: body - Museo del Computer:
    The demand for centralized data processing in the early-1970s resulted in the building of the IBM Systems Network Architecture (SNA). In September 1974 IBM ...
  50. [50]
    RFC 2235 - Hobbes' Internet Timeline - IETF Datatracker
    This document presents a history of the Internet in timeline fashion, highlighting some of the key events and technologies which helped shape the Internet as ...
  51. [51]
    OSI: The Internet That Wasn't - IEEE Spectrum
    Jul 29, 2013 · January 1983: U.S. Department of Defense's mandated use of TCP/IP on the ARPANET signals the “birth of the Internet.” May 1983: ISO ...
  52. [52]
    DIGITAL Computing Timeline - Text Version
    Feb 2, 1998 · DDCMP, which was used to develop DIGITAL's Network Architecture (DECnet), was based on peer-to-peer communications where information is managed ...
  53. [53]
    [PDF] Nothing Stops It! - Computer History Museum - Archive Server
    But in the early 1970s, DIGITAL pioneered peer-to-peer computer networking with the introduction of its first suc cessful networking software product, DECnet.
  54. [54]
    [PDF] Digital at work: snapshots from the first thirty-five years
    Digital Equipment Corporation-History. 2. Computer industry-. United States ... 1980s as a leader in peer-to-peer networking, Digital created a large, complex.
  55. [55]
    history - ITU
    Packet switched networks was the hot topic of the 70s and 80s with the first edition of the famous X.25 Recommendation approved in 1976. An ever-increasing ...
  56. [56]
    1970s - 1980s - ITU's 160th anniversary
    X.25, developed in the early 1970s, was a landmark achievement in packet-switched technology, allowing telecom providers to build public networks that ...
  57. [57]
    [PDF] AN INFANT INDUSTRY . IS GROWING UP - Bitsavers.org
    May 25, 1979 · transistor control terminals; and the unveiling of Burroughs. Network Architecture (BNA) aimed at bolstering the firm's strength in ...
  58. [58]
    [PDF] Burroughs A 1 0 - Bitsavers.org
    Mar 20, 1986 · Burroughs Network Architecture (BNA) software is de- signed to enhance the interaction of terminals with host. CPUs in a network environment.
  59. [59]
    [PDF] Untitled - Bitsavers.org
    Systems Environment with the introduction of Distributed Systems Architecture (DSA). The unveiling ofDSA makes Honeywell one .ofthe last major mainframe ...
  60. [60]
  61. [61]
    [PDF] Introduction to the New Mainframe: z/OS Basics - IBM
    In the early 1990s, the client/server model of computing, with its distributed nodes of less powerful computers, emerged to challenge the dominance of mainframe ...<|control11|><|separator|>
  62. [62]
    [PDF] TCP/IP Tutorial and Technical Overview - IBM Redbooks
    This tutorial covers networking fundamentals of the TCP/IP protocol suite, advanced concepts, new technologies, and the latest TCP/IP protocols.
  63. [63]
    [PDF] Networking DEC and IBM Computers
    This paper discusses what is currently available to allow Local Area. Networking of DEC and IBM computers within the structure of the ISO-OSI.
  64. [64]
    [PDF] Mass Distributed Server Consolidation - IBM
    Feb 8, 2025 · (IBM SNA, DECNet, and IPX, etc.) used till then. Enterprises consolidated on IP-based networking technology/TCP/IP protocol. These emerged ...
  65. [65]
    Appendix G: Wall Data Rumba Office 95/NT
    The first screen presented in the configuration tool allows you to enter a Network Name and Control Point Name. Enter the network name for this SNA network.Missing: emulation | Show results with:emulation
  66. [66]
    Quick Beginnings for OS/2 and Windows NT - IBM
    support on Windows NT. Communications Server for Windows NT SNA Client (269); IBM Communications Server for NT SNA Client (232); Wall Data Rumba (231). APPC ...
  67. [67]
    Open3270/Open3270 - GitHub
    Open3270 provides a high level API to connect to mainframe 3270 sessions from a .NET application. Key features include. Support for TN3270 and TN3270E from all ...Missing: SNA | Show results with:SNA
  68. [68]
    Chapter: Configuring the TN3270 Server - Cisco
    Sep 9, 2007 · Specifies the IP address and TCP port number to create a listen point. The default TCP port number is 23. This command changes the configuration ...
  69. [69]
    The Attachmate SNA Gateway via TCP/IP General Page
    Use this page to configure an Attachmate SNA Gateway connection via TCP/IP. You can define a new connection configuration, edit an existing configuration, ...Missing: appliances | Show results with:appliances
  70. [70]
    [PDF] SNA Network Implementation Guide - IBM
    This is a SNA Network Implementation Guide for z/OS Communications Server, Version 2 Release 2, applying to z/OS Version 2 Release 2 and later.
  71. [71]
    IBM SNA Networking - Cisco
    Sep 9, 2005 · Systems Network Architecture (SNA), IBM's proprietary networking architecture, has reached a position of prominence in the computer industry ...Missing: objectives | Show results with:objectives<|control11|><|separator|>
  72. [72]
    [PDF] Kyndryl's 2025 State of Mainframe Modernization Survey Report
    Furthermore, almost all respondents (95%) have reported their mainframe usage has increased (56%) or stayed the same. (39%) in the past 12 months– suggesting ...
  73. [73]
    Mainframes: The Backbone Of The Worldwide Economy - Forbes
    Nov 12, 2024 · Over 70 percent of Fortune 500 companies still rely on mainframes despite the rise of cloud computing​.
  74. [74]
    AWS Mainframe Modernization
    AWS Mainframe Modernization Service (Managed Runtime Environment experience) is no longer open to new customers starting November 7, 2025.Pricing page · Features · FAQs
  75. [75]
    What is HIS - Host Integration Server - Microsoft Learn
    Nov 24, 2023 · Network Integration. Network integration services connect Azure applications and infrastructure to existing IBM mainframe and midrange Systems ...
  76. [76]
    Enabling SNA Applications with Azure Integration Services
    Apr 21, 2023 · In this video we explain the alternatives to connect from Azure to an IBM Mainframe to interact with SNA Applications.
  77. [77]
    Mainframe State of the Platform: 2025 Security Assessment - NetSPI
    Jun 25, 2025 · Multiple businesses remain heavily dependent on mainframe technology, with over 71% of Fortune 500 financial institutions relying on mainframes ...Missing: percentage | Show results with:percentage
  78. [78]
    Modernizing CICS APIs with z/OS Connect: Fast, Simple, and Code ...
    Jul 11, 2025 · With IBM z/OS Connect 3.0.88, exposing CICS services as REST APIs is now simpler, faster, and less complex than traditional CICS web services.
  79. [79]
    Modernizing Mainframe Data with IBM z/OS Connect ... - Ensono
    Learn how IBM's z/OS Connect and Data Virtualization Manager simplify mainframe data access and modernization. Discover the best tools for APIs, ...Missing: SNA | Show results with:SNA<|control11|><|separator|>