Book description
APPC Protected Conversation is a function provided by the operating system to exploiters running on z/OS. This function improves data integrity in distributed processing environments by enabling participation in the two-phase commit protocol.
This IBM Redbooks publication provides system programmers with a solid understanding of the APPC Protected Conversation environment. It describes how to upgrade your environment to support protected conversations, how to configure protected conversation exploiters, how to operate in this environment, and how to manage resources. Sample scenarios illustrate how transactions are executed in a protected conversation environment, and how they fail. Design considerations for avoiding failures are also included, as well as a discussion of tools and utilities for monitoring and tuning your APPC environment. Detailed installation definitions are provided for protected conversation exploiters (IMS, CICS and DB2).
Please note that the additional material referenced in the text is not available from IBM.
Table of contents
- Notices
- Preface
- Chapter 1: APPC Protected Conversation introduction and theory
- Chapter 2: Upgrading your configuration to support APPC/MVS Protected Conversations
- Chapter 3: Protected Conversations exploiters
- Chapter 4: How to operate in an APPC/MVS Protected Conversations environment
- Chapter 5: Sample scenario: IMS to IMS
- Chapter 6: Sample scenario: IMS to CICS
- Chapter 7: Monitoring
- Appendix A: Installation definitions for Protected Conversation exploiters
-
Appendix B: APPC exploiter sample source code
- CICS Programs
-
IMS programs
- IMS Inbound program - CPISLAVE
- IMS Outbound program - IMS1PS3
- IMS Outbound program - IMS1PI3
- IMS Outbound Implicit program - IMS1PI1
- IMS Outbound Implicit program - IMS1PS1
- IMS Inbound Implicit program - IMS2IMI
- IMS Outbound Implicit program - IMS1PI2
- IMS Outbound Explicit program - IMS1PS2
- IMS Inbound Explicit program - IMS2EXP
- IMS DB2 program - IMS1DB2
- IMS DB2 program - IMS2DB2
- Appendix C: Additional material
- Related publications
- Index (1/2)
- Index (2/2)
- Back cover
Product information
- Title: Implementing and Managing APPC Protected Conversations
- Author(s):
- Release date: February 2005
- Publisher(s): IBM Redbooks
- ISBN: None
You might also like
book
Understanding DB2® 9 Security: DB2® Information Management Software
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful …
book
Preparing for DB2 Near-Realtime Business Intelligence
In this IBM Redbooks publication we discuss primary processes and various alternatives that prepare you in …
book
DB2 II: Performance Monitoring, Tuning and Capacity Planning Guide
This IBM Redbooks publication provides an overview of DB2 Information Integrator V8.2 key performance drivers; best …
book
Understanding and Using Q Replication for High Availability Solutions on the IBM z/OS Platform
With ever-increasing workloads on production systems from transaction, batch, online query and reporting applications, the challenges …