Implementing and Managing APPC Protected Conversations

Book description

APPC Protected Conversation is a function provided by the operating system to exploiters running on z/OS. This function improves data integrity in distributed processing environments by enabling participation in the two-phase commit protocol.

This IBM Redbooks publication provides system programmers with a solid understanding of the APPC Protected Conversation environment. It describes how to upgrade your environment to support protected conversations, how to configure protected conversation exploiters, how to operate in this environment, and how to manage resources. Sample scenarios illustrate how transactions are executed in a protected conversation environment, and how they fail. Design considerations for avoiding failures are also included, as well as a discussion of tools and utilities for monitoring and tuning your APPC environment. Detailed installation definitions are provided for protected conversation exploiters (IMS, CICS and DB2).

Please note that the additional material referenced in the text is not available from IBM.

Table of contents

  1. Notices
    1. Trademarks
  2. Preface
    1. The team that wrote this redbook
    2. Become a published author
    3. Comments welcome
  3. Chapter 1: APPC Protected Conversation introduction and theory
    1. Introduction to APPC Protected Conversation
      1. What it is
      2. Why it is needed (1/2)
      3. Why it is needed (2/2)
  4. Chapter 2: Upgrading your configuration to support APPC/MVS Protected Conversations
    1. PARMLIB updates
      1. Subsystem entries for System Logger and RRS
      2. Other parmlib entries
    2. APPC log stream
    3. RRS considerations
      1. Logging environment (1/2)
      2. Logging environment (2/2)
      3. WLM definitions
      4. RRS procedure
      5. RRS ISPF panels
      6. SAF authorization
      7. Component trace
    4. Security considerations
      1. Application level
      2. Network level
      3. Security Server level
    5. APPC/MVS ISPF admin panels
  5. Chapter 3: Protected Conversations exploiters
    1. IMS Protected Conversations
      1. Administering IMS and LU 6.2 devices
      2. APPC/IMS application program interfaces
    2. CICS protected conversations
      1. Administering CICS and LU 6.2 devices
      2. APPC/CICS application program interface (1/2)
      3. APPC/CICS application program interface (2/2)
    3. DB2
  6. Chapter 4: How to operate in an APPC/MVS Protected Conversations environment
    1. How to manage the resources
      1. APPC commands
    2. How to handle failures
      1. Solving unit of recovery problems
      2. Solving LUs warm/cold or name mismatch problems
      3. Solving RRS or System Logger problems
  7. Chapter 5: Sample scenario: IMS to IMS
    1. Description
      1. Additional scenarios
    2. How to manage and relate the pieces together
    3. How to handle failure scenarios
      1. When IMS is not connected to RRS (1/2)
      2. When IMS is not connected to RRS (2/2)
  8. Chapter 6: Sample scenario: IMS to CICS
    1. Description
      1. Architecture
      2. Scenarios
    2. How to manage and relate the pieces together
      1. The outbound program
      2. The inbound program
    3. Outbound and inbound conversation
      1. Example PCMIT: A successful sync-point and commit conversation
    4. How to handle failure scenarios
      1. Example PAEND: A CICS transaction abend requiring rollback
      2. Example generic error during a conversation and rollback
      3. Architecture and program design issues
  9. Chapter 7: Monitoring
    1. SMF records - collection and tooling
    2. SMF tool
      1. How to interpret the data
    3. The ATBTRACE REXX facility
    4. The RRS REXX batch log processor
  10. Appendix A: Installation definitions for Protected Conversation exploiters
    1. Overview of installed components
    2. General definitions
    3. CICS definitions (1/3)
    4. CICS definitions (2/3)
    5. CICS definitions (3/3)
    6. IMS definitions (1/4)
    7. IMS definitions (2/4)
    8. IMS definitions (3/4)
    9. IMS definitions (4/4)
    10. DB2 Definitions (1/2)
    11. DB2 Definitions (2/2)
  11. Appendix B: APPC exploiter sample source code
    1. CICS Programs
      1. CICS Inbound program - CICSPG1
      2. CICS Outbound program - GTCICS02
    2. IMS programs
      1. IMS Inbound program - CPISLAVE
      2. IMS Outbound program - IMS1PS3
      3. IMS Outbound program - IMS1PI3
      4. IMS Outbound Implicit program - IMS1PI1
      5. IMS Outbound Implicit program - IMS1PS1
      6. IMS Inbound Implicit program - IMS2IMI
      7. IMS Outbound Implicit program - IMS1PI2
      8. IMS Outbound Explicit program - IMS1PS2
      9. IMS Inbound Explicit program - IMS2EXP
      10. IMS DB2 program - IMS1DB2
      11. IMS DB2 program - IMS2DB2
  12. Appendix C: Additional material
    1. Locating the Web material
    2. Using the Web material
      1. How to use the Web material
  13. Related publications
    1. IBM Redbooks
    2. Other publications
    3. Online resources
    4. How to get IBM Redbooks
    5. Help from IBM
  14. Index (1/2)
  15. Index (2/2)
  16. Back cover

Product information

  • Title: Implementing and Managing APPC Protected Conversations
  • Author(s): Paola Bari, Mario Bezzi, Massimo Biancucci, Kenny Blackman, Graham Davis, Kim Patterson
  • Release date: February 2005
  • Publisher(s): IBM Redbooks
  • ISBN: None