Home >Documents >CICS for iSeries Administration and Operations Guide · PDF file About CICS for iSeries...

CICS for iSeries Administration and Operations Guide · PDF file About CICS for iSeries...

Date post:07-Aug-2020
Category:
View:0 times
Download:0 times
Share this document with a friend
Transcript:
  • iSeries

    CICS for iSeries Administration and Operations Guide Version 5

    SC41-5455-00

    ERserver

    ���

  • iSeries

    CICS for iSeries Administration and Operations Guide Version 5

    SC41-5455-00

    ERserver

    ���

  • Note! Before using this information and the product it supports, be sure to read the information in “Notices” on page 355.

    First Edition (September 2002)

    This edition applies to Version 5 of the IBM licensed program CICS Transaction Server for iSeries (also known as CICS for iSeries or CICS/400), program number 5722-DFH, and to all subsequent versions, releases, and modifications until otherwise indicated in new editions. This edition applies only to reduced instruction set computer (RISC) systems.

    This edition replaces Administration and Operations Guide for CICS/400, SC33-1387-01.

    © Copyright International Business Machines Corporation 2002. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

  • Contents

    About CICS for iSeries Administration and Operations Guide (SC41-5455) . . vii Who should read this book . . . . . . . . . vii Conventions and terminology used in this book viii Prerequisite and related information . . . . . . viii

    CICS/400 library . . . . . . . . . . . viii Books from related libraries . . . . . . . . ix

    How to send your comments . . . . . . . . ix

    Summary of Changes . . . . . . . . xi

    Part 1. Introduction . . . . . . . . . 1

    Chapter 1. Introducing CICS® for iSeries™. . . . . . . . . . . . . . . 3 What is CICS for iSeries? . . . . . . . . . . 3 What is CICS/400? . . . . . . . . . . . . 4

    Server support for CICS clients . . . . . . . 5 CICS/400 architecture . . . . . . . . . . 5

    OS/400 facilities used by CICS/400. . . . . . . 6 Presentation to the end user . . . . . . . . . 7 Operating interfaces . . . . . . . . . . . . 8 Data management . . . . . . . . . . . . 10 Resource management . . . . . . . . . . . 12 Intersystem communication . . . . . . . . . 13 Transaction management . . . . . . . . . . 14 Application development . . . . . . . . . . 15 Portability and migration . . . . . . . . . . 16

    Porting application programs . . . . . . . 16 Release-to-release compatibility . . . . . . . 17

    Summary . . . . . . . . . . . . . . . 18 Where next? . . . . . . . . . . . . . . 18

    Chapter 2. User-based pricing. . . . . 19 What is user-based pricing? . . . . . . . . . 19 How does the license manager count the number of users? . . . . . . . . . . . . . . . . 19

    What is a user? . . . . . . . . . . . . 19 What is not a user? . . . . . . . . . . . 20

    Chapter 3. Installing CICS/400 . . . . . 21 Installation . . . . . . . . . . . . . . 21 Migration . . . . . . . . . . . . . . . 21

    Upward migration . . . . . . . . . . . 21 INZCICS . . . . . . . . . . . . . . 22 Downward migration . . . . . . . . . . 22

    Installation verification procedure . . . . . . . 23 Installing the sample code from tape . . . . . 23

    The IVP process . . . . . . . . . . . . . 24 Step 1. Creating a working copy of QCICSSAMP 24 Step 2. Adding libraries to the OS/400 library list 24 Step 3. Translating the BMS map . . . . . . 25 Step 4. Translating the program. . . . . . . 26

    Step 5. Creating the recoverable/nonrecoverable resources . . . . . . . . . . . . . . 27 Step 6. Journaling the CICS/400 recoverable resources . . . . . . . . . . . . . . 28 Step 7. Defining the CICS/400 resources. . . . 28 Step 8. Creating the CL program . . . . . . 28 Step 9. Starting the CICS/400 control region . . 33 Step 10. Starting the sample transaction . . . . 33

    DEFCICSRGN . . . . . . . . . . . . . 34 DEFCICSRGN . . . . . . . . . . . . 34 Running DEFCICSRGN . . . . . . . . . 35 Autodefined resources . . . . . . . . . . 36 Deleting the autodefined control region . . . . 38

    Part 2. System administration . . . 39

    Chapter 4. Defining resources. . . . . 41 What is resource definition? . . . . . . . . . 41

    Gathering preliminary information . . . . . 41 Resource definition tables . . . . . . . . 42

    Resource definition architecture. . . . . . . . 42 Creating resource definitions . . . . . . . . 45 Defining and maintaining group definitions . . . 45

    What is a resource definition group? . . . . . 46 Using the resource definition CL commands . . 46 Specifying which groups are used . . . . . . 47 Recovering groups . . . . . . . . . . . 48

    Installing a group . . . . . . . . . . . . 48 Using the ADDCICSGLT command . . . . . 48 Using the INSCICSGRP command . . . . . . 48 Using the CEDA Install group function . . . . 49

    Defining and maintaining individual resource definitions . . . . . . . . . . . . . . . 51 How to use the resource definition commands. . . 52

    Entering CL commands from the command line 52 Using the prompt screens. . . . . . . . . 52 Entering resource and transaction identifiers . . 54 Getting further parameters . . . . . . . . 54 Getting help . . . . . . . . . . . . . 54 Using WRKCICSxxx commands . . . . . . 54 Using CEDA resource definition online . . . . 58

    Chapter 5. Defining a basic control region . . . . . . . . . . . . . . . 61 Defining the system initialization table (SIT) . . . 61 Defining temporary storage and transient data files 63

    File characteristics . . . . . . . . . . . 63 Creating the physical files . . . . . . . . 63

    Defining supplied transactions . . . . . . . . 65 Setting default wait times. . . . . . . . . . 67 Setting job priorities . . . . . . . . . . . 67 Storage considerations . . . . . . . . . . . 67

    Control region storage objects . . . . . . . 68 Shell storage objects . . . . . . . . . . 72

    © Copyright IBM Corp. 2002 iii

  • Summary . . . . . . . . . . . . . . . 74

    Chapter 6. Security requirements for CICS/400 . . . . . . . . . . . . . . 75 Signon security and display station security . . . 75 Initial menu and initial program security . . . . 76 OS/400 command security . . . . . . . . . 76

    Limited capability checking . . . . . . . . 76 Resource checking of command program objects 76

    Resource security . . . . . . . . . . . . 77 Supplied transactions . . . . . . . . . . 77 User transactions . . . . . . . . . . . 77 Application example . . . . . . . . . . 77

    Adoptive authority . . . . . . . . . . . . 78 Communication security . . . . . . . . . . 78 User profile and group profile security . . . . . 78

    Chapter 7. Defining your own control region . . . . . . . . . . . . . . . 81 OS/400 data management considerations . . . . 82 Transaction, program, and map considerations. . . 82

    Example PCT definitions . . . . . . . . . 83 Example PPT definitions . . . . . . . . . 83

    Temporary storage considerations . . . . . . . 84 Recoverable and nonrecoverable TS queues. . . 84 Example TST definitions . . . . . . . . . 85

    Transient data considerations . . . . . . . . 85 Extrapartition transient data . . . . . . . . 86 Recoverable intrapartition TD files. . . . . . 86 Example DCT definitions . . . . . . . . . 86 Defining a CSMT log destination . . . . . . 87

    File control considerations . . . . . . . . . 88 Supported file types . . . . . . . . . . 88 Automatic file closure . . . . . . . . . . 89 Recoverable files. . . . . . . . . . . . 90 Example FCT definitions . . . . . . . . . 90

    Interval control considerations . . . . . . . . 94 Timer-related tasks . . . . . . . . . . . 94 Protected interval control start requests . . . . 94 Interval control elements . . . . . . . . . 95 Acquiring terminals . . . . . . . . . . 95 Interval control batch shells . . . . . . . . 95 Request identifiers . . . . . . . . . . . 96 Start requests and autoinstalled terminals . . . 96

    Journal control considerations . . . . . . . . 96 Journal records . . . . . . . . . . . . 96 Journal output synchronization . . . . . . . 97 Creating CICS/400 user journals . . . . . . 97 Example creation of CICS/400 journal . . . . 99 Example JCT definitions . . . . . . . . . 100

    Device considerations . . . . . . . . . . 100 Defining local CICS terminals . . . . . . . 100 Example TCT definitions . . . . . . . . 100 Defining remote systems . . . . . . . . 101 Example TCS entry . . . . . . . . . . 101

    Remote resource considerations . . . . . . . 102 Defining remote resources . . . . . . . . 102 Defining remote terminals . . . . . . . . 102 Example TCT definitions for remote and shippable terminals . . . . . . . . . . 102

    Printer spooling considerations . . . . . . . 102 Trace considerations . . . . . . . . . . . 104

    Internal trace . . . . . . . . . . . . 104 Printing CICS/400 trace . . . . . . . . . 104

    Recovery considerations . . . . . . . . . . 104 Recoverable file commitment control requirements . . . . . . . . . . . . 104 OS/400 commitment control and logical unit of work (LUW). . . . . . . . . . . . . 105

    Chapter 8. Administering the control region . . . . . . . . . . . . . . 107 Introduction to the control region . . . . . . 107 Control region processing . . . . . . . . . 108

    Control region initialization . . . . . . . 108 Control region runtime processing . . . . . 109 Control region shutdown . . . . . . . . 111

    Starting a control region (STRCICS) . . . . . . 112 STRCICS . . . . . . . . . . . . . . 112 Setting the STRTYPE parameter . . . . . . 114

    Ending a control region (ENDCICS) . . . . . . 118 ENDCICS . . . . . . . . . . . . . 118

    Chapter 9. Administering a CICS/400 shell . . . . . . . . . . . . . . . 121 Introduction to the CICS/400 shell . . . . . . 121

    Shell objects .