Implementing and managing APPC protected conversations
APPC Protected Conversation is a function provided by the operating system to exploiters running on z/OS. This function improves data integrity in distributed processing environments by enabling participation in the two-phase commit protocol. This IBM Redbooks publication provides system programmers...
Autor Corporativo: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
San Jose, CA :
IBM, International Support Organization
c2005.
|
Edición: | 1st ed |
Colección: | IBM redbooks.
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627104306719 |
Tabla de Contenidos:
- Front cover
- Contents
- Notices
- Trademarks
- Preface
- The team that wrote this redbook
- Become a published author
- Comments welcome
- Chapter 1. APPC Protected Conversation introduction and theory
- 1.1 Introduction to APPC Protected Conversation
- 1.1.1 What it is
- 1.1.2 Why it is needed
- Chapter 2. Upgrading your configuration to support APPC/MVS Protected Conversations
- 2.1 PARMLIB updates
- 2.1.1 Subsystem entries for System Logger and RRS
- 2.1.2 Other parmlib entries
- 2.2 APPC log stream
- 2.3 RRS considerations
- 2.3.1 Logging environment
- 2.3.2 WLM definitions
- 2.3.3 RRS procedure
- 2.3.4 RRS ISPF panels
- 2.3.5 SAF authorization
- 2.3.6 Component trace
- 2.4 Security considerations
- 2.4.1 Application level
- 2.4.2 Network level
- 2.4.3 Security Server level
- 2.5 APPC/MVS ISPF admin panels
- Chapter 3. Protected Conversations exploiters
- 3.1 IMS Protected Conversations
- 3.1.1 Administering IMS and LU 6.2 devices
- 3.1.2 APPC/IMS application program interfaces
- 3.2 CICS protected conversations
- 3.2.1 Administering CICS and LU 6.2 devices
- 3.2.2 APPC/CICS application program interface
- 3.3 DB2
- Chapter 4. How to operate in an APPC/MVS Protected Conversations environment
- 4.1 How to manage the resources
- 4.1.1 APPC commands
- 4.2 How to handle failures
- 4.2.1 Solving unit of recovery problems
- 4.2.2 Solving LUs warm/cold or name mismatch problems
- 4.2.3 Solving RRS or System Logger problems
- Chapter 5. Sample scenario: IMS to IMS
- 5.1 Description
- 5.1.1 Additional scenarios
- 5.2 How to manage and relate the pieces together
- 5.3 How to handle failure scenarios
- 5.3.1 When IMS is not connected to RRS
- Chapter 6. Sample scenario: IMS to CICS
- 6.1 Description
- 6.1.1 Architecture
- 6.1.2 Scenarios
- 6.2 How to manage and relate the pieces together.
- 6.2.1 The outbound program
- 6.2.2 The inbound program
- 6.3 Outbound and inbound conversation
- 6.3.1 Example PCMIT: A successful sync-point and commit conversation
- 6.4 How to handle failure scenarios
- 6.4.1 Example PAEND: A CICS transaction abend requiring rollback
- 6.4.2 Example generic error during a conversation and rollback
- 6.4.3 Architecture and program design issues
- Chapter 7. Monitoring
- 7.1 SMF records - collection and tooling
- 7.2 SMF tool
- 7.2.1 How to interpret the data
- 7.3 The ATBTRACE REXX facility
- 7.4 The RRS REXX batch log processor
- Appendix A. Installation definitions for Protected Conversation exploiters
- Overview of installed components
- General definitions
- CICS definitions
- IMS definitions
- DB2 Definitions
- Appendix B. APPC exploiter sample source code
- CICS Programs
- CICS Inbound program - CICSPG1
- CICS Outbound program - GTCICS02
- IMS programs
- IMS Inbound program - CPISLAVE
- IMS Outbound program - IMS1PS3
- IMS Outbound program - IMS1PI3
- IMS Outbound Implicit program - IMS1PI1
- IMS Outbound Implicit program - IMS1PS1
- IMS Inbound Implicit program - IMS2IMI
- IMS Outbound Implicit program - IMS1PI2
- IMS Outbound Explicit program - IMS1PS2
- IMS Inbound Explicit program - IMS2EXP
- IMS DB2 program - IMS1DB2
- IMS DB2 program - IMS2DB2
- Appendix C. Additional material
- Locating the Web material
- Using the Web material
- How to use the Web material
- Related publications
- IBM Redbooks
- Other publications
- Online resources
- How to get IBM Redbooks
- Help from IBM
- Index
- Back cover.