Cover image for Implementing and Managing APPC Protected Conversations.
Implementing and Managing APPC Protected Conversations.
Title:
Implementing and Managing APPC Protected Conversations.
Author:
Redbooks, IBM.
Personal Author:
Physical Description:
1 online resource (186 pages)
Contents:
Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Chapter 1. APPC Protected Conversation introduction and theory -- 1.1 Introduction to APPC Protected Conversation -- 1.1.1 What it is -- 1.1.2 Why it is needed -- Chapter 2. Upgrading your configuration to support APPC/MVS Protected Conversations -- 2.1 PARMLIB updates -- 2.1.1 Subsystem entries for System Logger and RRS -- 2.1.2 Other parmlib entries -- 2.2 APPC log stream -- 2.3 RRS considerations -- 2.3.1 Logging environment -- 2.3.2 WLM definitions -- 2.3.3 RRS procedure -- 2.3.4 RRS ISPF panels -- 2.3.5 SAF authorization -- 2.3.6 Component trace -- 2.4 Security considerations -- 2.4.1 Application level -- 2.4.2 Network level -- 2.4.3 Security Server level -- 2.5 APPC/MVS ISPF admin panels -- Chapter 3. Protected Conversations exploiters -- 3.1 IMS Protected Conversations -- 3.1.1 Administering IMS and LU 6.2 devices -- 3.1.2 APPC/IMS application program interfaces -- 3.2 CICS protected conversations -- 3.2.1 Administering CICS and LU 6.2 devices -- 3.2.2 APPC/CICS application program interface -- 3.3 DB2 -- Chapter 4. How to operate in an APPC/MVS Protected Conversations environment -- 4.1 How to manage the resources -- 4.1.1 APPC commands -- 4.2 How to handle failures -- 4.2.1 Solving unit of recovery problems -- 4.2.2 Solving LUs warm/cold or name mismatch problems -- 4.2.3 Solving RRS or System Logger problems -- Chapter 5. Sample scenario: IMS to IMS -- 5.1 Description -- 5.1.1 Additional scenarios -- 5.2 How to manage and relate the pieces together -- 5.3 How to handle failure scenarios -- 5.3.1 When IMS is not connected to RRS -- Chapter 6. Sample scenario: IMS to CICS -- 6.1 Description -- 6.1.1 Architecture -- 6.1.2 Scenarios -- 6.2 How to manage and relate the pieces together.

6.2.1 The outbound program -- 6.2.2 The inbound program -- 6.3 Outbound and inbound conversation -- 6.3.1 Example PCMIT: A successful sync-point and commit conversation -- 6.4 How to handle failure scenarios -- 6.4.1 Example PAEND: A CICS transaction abend requiring rollback -- 6.4.2 Example generic error during a conversation and rollback -- 6.4.3 Architecture and program design issues -- Chapter 7. Monitoring -- 7.1 SMF records - collection and tooling -- 7.2 SMF tool -- 7.2.1 How to interpret the data -- 7.3 The ATBTRACE REXX facility -- 7.4 The RRS REXX batch log processor -- Appendix A. Installation definitions for Protected Conversation exploiters -- Overview of installed components -- General definitions -- CICS definitions -- IMS definitions -- DB2 Definitions -- Appendix B. APPC exploiter sample source code -- CICS Programs -- CICS Inbound program - CICSPG1 -- CICS Outbound program - GTCICS02 -- IMS programs -- IMS Inbound program - CPISLAVE -- IMS Outbound program - IMS1PS3 -- IMS Outbound program - IMS1PI3 -- IMS Outbound Implicit program - IMS1PI1 -- IMS Outbound Implicit program - IMS1PS1 -- IMS Inbound Implicit program - IMS2IMI -- IMS Outbound Implicit program - IMS1PI2 -- IMS Outbound Explicit program - IMS1PS2 -- IMS Inbound Explicit program - IMS2EXP -- IMS DB2 program - IMS1DB2 -- IMS DB2 program - IMS2DB2 -- Appendix C. Additional material -- Locating the Web material -- Using the Web material -- How to use the Web material -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: