Implementing and managing APPC protected conversations

APPC Protected Conversation is a function provided by the operating system to exploiters running on z/OS. This function improves data integrity in distributed processing environments by enabling participation in the two-phase commit protocol. This IBM Redbooks publication provides system programmers...

Descripción completa

Detalles Bibliográficos
Autor Corporativo: International Business Machines Corporation. International Technical Support Organization (-)
Otros Autores: Bari, Paola (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: San Jose, CA : IBM, International Support Organization c2005.
Edición:1st ed
Colección:IBM redbooks.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627104306719
Tabla de Contenidos:
  • Front cover
  • Contents
  • Notices
  • Trademarks
  • Preface
  • The team that wrote this redbook
  • Become a published author
  • Comments welcome
  • Chapter 1. APPC Protected Conversation introduction and theory
  • 1.1 Introduction to APPC Protected Conversation
  • 1.1.1 What it is
  • 1.1.2 Why it is needed
  • Chapter 2. Upgrading your configuration to support APPC/MVS Protected Conversations
  • 2.1 PARMLIB updates
  • 2.1.1 Subsystem entries for System Logger and RRS
  • 2.1.2 Other parmlib entries
  • 2.2 APPC log stream
  • 2.3 RRS considerations
  • 2.3.1 Logging environment
  • 2.3.2 WLM definitions
  • 2.3.3 RRS procedure
  • 2.3.4 RRS ISPF panels
  • 2.3.5 SAF authorization
  • 2.3.6 Component trace
  • 2.4 Security considerations
  • 2.4.1 Application level
  • 2.4.2 Network level
  • 2.4.3 Security Server level
  • 2.5 APPC/MVS ISPF admin panels
  • Chapter 3. Protected Conversations exploiters
  • 3.1 IMS Protected Conversations
  • 3.1.1 Administering IMS and LU 6.2 devices
  • 3.1.2 APPC/IMS application program interfaces
  • 3.2 CICS protected conversations
  • 3.2.1 Administering CICS and LU 6.2 devices
  • 3.2.2 APPC/CICS application program interface
  • 3.3 DB2
  • Chapter 4. How to operate in an APPC/MVS Protected Conversations environment
  • 4.1 How to manage the resources
  • 4.1.1 APPC commands
  • 4.2 How to handle failures
  • 4.2.1 Solving unit of recovery problems
  • 4.2.2 Solving LUs warm/cold or name mismatch problems
  • 4.2.3 Solving RRS or System Logger problems
  • Chapter 5. Sample scenario: IMS to IMS
  • 5.1 Description
  • 5.1.1 Additional scenarios
  • 5.2 How to manage and relate the pieces together
  • 5.3 How to handle failure scenarios
  • 5.3.1 When IMS is not connected to RRS
  • Chapter 6. Sample scenario: IMS to CICS
  • 6.1 Description
  • 6.1.1 Architecture
  • 6.1.2 Scenarios
  • 6.2 How to manage and relate the pieces together.
  • 6.2.1 The outbound program
  • 6.2.2 The inbound program
  • 6.3 Outbound and inbound conversation
  • 6.3.1 Example PCMIT: A successful sync-point and commit conversation
  • 6.4 How to handle failure scenarios
  • 6.4.1 Example PAEND: A CICS transaction abend requiring rollback
  • 6.4.2 Example generic error during a conversation and rollback
  • 6.4.3 Architecture and program design issues
  • Chapter 7. Monitoring
  • 7.1 SMF records - collection and tooling
  • 7.2 SMF tool
  • 7.2.1 How to interpret the data
  • 7.3 The ATBTRACE REXX facility
  • 7.4 The RRS REXX batch log processor
  • Appendix A. Installation definitions for Protected Conversation exploiters
  • Overview of installed components
  • General definitions
  • CICS definitions
  • IMS definitions
  • DB2 Definitions
  • Appendix B. APPC exploiter sample source code
  • CICS Programs
  • CICS Inbound program - CICSPG1
  • CICS Outbound program - GTCICS02
  • IMS programs
  • IMS Inbound program - CPISLAVE
  • IMS Outbound program - IMS1PS3
  • IMS Outbound program - IMS1PI3
  • IMS Outbound Implicit program - IMS1PI1
  • IMS Outbound Implicit program - IMS1PS1
  • IMS Inbound Implicit program - IMS2IMI
  • IMS Outbound Implicit program - IMS1PI2
  • IMS Outbound Explicit program - IMS1PS2
  • IMS Inbound Explicit program - IMS2EXP
  • IMS DB2 program - IMS1DB2
  • IMS DB2 program - IMS2DB2
  • Appendix C. Additional material
  • Locating the Web material
  • Using the Web material
  • How to use the Web material
  • Related publications
  • IBM Redbooks
  • Other publications
  • Online resources
  • How to get IBM Redbooks
  • Help from IBM
  • Index
  • Back cover.