Home Page Icon
Home Page
Table of Contents for
Part 4 Appendixes
Close
Part 4 Appendixes
by Richard Mercadante, Manuela Mandelli, Robert Jones, Leigh Compton, Sue Bayliss,
The Complete Guide to CICS Transaction Gateway Volume 1 Configuration and Administration
Front cover
Notices
Trademarks
Preface
Authors
Now you can become a published author, too!
Comments welcome
Stay connected to IBM Redbooks
Part 1 Introduction
Chapter 1. Basic concepts
1.1 Overview of the CICS TG products
1.1.1 More you must know about IBM CICS Transaction Gateway
1.1.2 Business value
1.1.3 Solution overview
1.1.4 Solution architecture
1.1.5 Usage scenarios
1.1.6 Integration
1.1.7 Supported platforms
1.2 Connectivity and capability by CICS TG product
1.3 CICS TG topologies
1.3.1 Three-tier solutions
1.3.2 Two-tier solutions
1.3.3 CICS TG for z/OS
1.3.4 CICS TG for Multiplatforms
1.3.5 CICS TG Desktop Edition
1.4 High availability features
1.4.1 Connection balancing
1.4.2 Dynamic Server Selection
1.5 Transactionality
1.5.1 Sync-on-return
1.5.2 Distributed Transaction Processing
1.6 Security
Chapter 2. CICS Transaction Gateway for z/OS installations
2.1 Installing CICS TG for z/OS
2.1.1 Ordering CICS TG from Shopz
2.2 Anatomy of CICS TG for z/OS
2.3 CICS TG basic structure
2.3.1 Gateway daemon
2.4 Adding facilities to CICS TG
2.4.1 Automatic restart of a CICS TG region
2.4.2 Using EXCI to communicate with CICS TS
2.4.3 Clients passing a large amount of data to the CICS TS application
2.4.4 Client applications needing transactionality over EXCI
2.4.5 Client applications needing distributed LUWs
2.4.6 Using historical statistical data analysis
2.4.7 Using real-time statistical data analysis
2.4.8 Multiple Gateway daemons started on the same LPAR
2.4.9 Security
2.4.10 Setting up high availability
2.5 The benefits of CICS TG for z/OS
Chapter 3. CICS Transaction Gateway for Multiplatforms and Desktop Edition installations
3.1 Preparing to install CICS TG Multiplatforms and CICS TG Desktop Edition in a distributed environment
3.1.1 The Passport Advantage site
3.1.2 Files provided within the installable eImage
3.2 Anatomy of CICS TG in a Windows environment
3.3 Anatomy of CICS TG on UNIX
3.4 The CICS TG and Client daemons and runtime components
3.4.1 The Client daemon
3.4.2 The Gateway daemon
3.4.3 The IPIC protocol
3.4.4 The configuration tool
3.4.5 Resource adapters
Part 2 CICS Transaction Gateway capabilities
Chapter 4. Connecting to CICS
4.1 CICS communication protocols
4.1.1 What’s in a name?
4.1.2 IP interconnectivity (IPIC)
4.1.3 EXCI
4.1.4 TCPIP
4.1.5 SNA Advanced Program-to-Program Communication (APPC)
4.2 CICS TG APIs and connection type
4.3 Quality of service and connection types
4.3.1 IPIC
4.3.2 EXCI
4.3.3 TCPIP
4.3.4 SNA
4.4 IPIC autoinstall for WebSphere Application Server clusters
Chapter 5. Understanding the Gateway daemon
5.1 Three-tier concepts
5.2 Gateway daemon resources
5.2.1 Protocol handlers
5.2.2 The threading model
5.2.3 Estimating the number of connection manager threads
5.2.4 Estimating the number of worker threads
5.3 Connecting to CICS servers
5.3.1 All platforms: IPIC
5.3.2 Multiplatform and Desktop Edition specific: TCPIP
5.3.3 Multiplatform and Desktop Edition specific: SNA
5.3.4 z/OS specific: EXCI
5.4 System resources
5.4.1 Gateway daemon runtime environment
5.4.2 Information available at run time
5.4.3 Gateway daemon memory requirements
5.5 z/OS specific resources
5.5.1 Region size consideration in CICS TG for z/OS
5.5.2 Storage and EXCI in the Gateway daemon for z/OS
5.5.3 Using a 64-bit Gateway daemon on z/OS
5.6 z/OS Workload Manager suggestions for CICS TG for z/OS
5.6.1 WLM system-provided special service classes
5.6.2 Storage Critical option
5.6.3 MAXCPUTIME
5.7 Statistics
Chapter 6. CICS Transaction Gateway solution options
6.1 Deployment topologies
6.1.1 Remote mode
6.1.2 Local mode
6.2 CICS TG APIs and connection type
6.2.1 JCA client applications
6.2.2 Base class Java applications
6.2.3 Microsoft .NET framework-based applications
6.2.4 ECIv2 and ESIv2 applications
6.2.5 ECI, ESI, and EPI v1 applications
6.3 Transactional models
6.3.1 Two-phase commit
6.3.2 JCA and transactions
6.4 Choosing a Gateway topology
Chapter 7. High availability concepts
7.1 High availability overview
7.2 Connection balancing
7.2.1 Single point of failure: Single Gateway daemon
7.2.2 z/OS shared ports
7.2.3 Multiplatform IP load balancing solutions
7.3 Dynamic server selection
7.3.1 Default server
7.3.2 The CICS request exit
7.3.3 DSSPOLICY (z/OS only)
7.3.4 DFHXCURM (z/OS only)
7.3.5 Client API user exits
7.3.6 Client daemon Workload Manager on Windows
7.4 Importance of scaling and growing in a continuous availability system
7.5 Considerations for XA transaction support on z/OS
Chapter 8. Security
8.1 Security basics
8.1.1 The components of a security system
8.1.2 The role of cryptography
8.2 Network security
8.2.1 Secure Sockets Layer and Transport Layer Security
8.2.2 Digital signatures, certificates, and key rings
8.2.3 Enabling SSL in the CICS TG
8.2.4 Securing IPIC connections
8.2.5 Securing connections to the Gateway daemon
8.3 Passwords, PassTickets, and password phrases
8.4 Identity propagation
8.5 The external security interface
Part 3 Configuration
Chapter 9. Configuring IPIC in CICS Transaction Gateway for z/OS
9.1 Configuration overview
9.2 CICS definitions for IPIC
9.2.1 System initialization parameters
9.2.2 The mirror transaction
9.2.3 TCPIPSERVICE resource definition
9.2.4 IPCONN resource definition
9.3 The sample application programs
9.3.1 Transferring, compiling, and linking the CICS sample programs
9.3.2 Defining and installing the CICS sample program
9.3.3 Data conversion for the COMMAREA samples
9.4 Securing IPIC with SSL
9.4.1 Create a key ring for CICS
9.4.2 The KEYRING system initialization parameter
9.4.3 Configure a TCPIPSERVICE for SSL
9.5 Configuring IPIC autoinstall for WebSphere Application Server clusters
Chapter 10. CICS Transaction Gateway for z/OS configuration
10.1 Configure the Gateway daemon
10.1.1 Configuration summary
10.1.2 The CTGBATCH launcher
10.1.3 Configuration file
10.1.4 Environment variables
10.1.5 Overriding the configuration file
10.1.6 Started procedure and Gateway daemon user ID
10.2 Testing the Gateway daemon
10.2.1 Start the Gateway daemon
10.2.2 Test using the CTGTESTR job
10.3 Configure basic security
10.3.1 CICS TS configuration for USERAUTH(VERIFY)
10.3.2 Test using the CTGTESTR job
10.4 Configure secure connections
10.4.1 Secure the Gateway daemon
10.4.2 SSL application to Gateway daemon
10.4.3 SSL IPIC to CICS
10.4.4 Restricting cipher suites
10.5 Adding XA support
10.5.1 The CTGRRMS address space
10.5.2 System configuration for CTGRRMS
10.5.3 Gateway daemon configuration for XA transactions
10.5.4 Verifying the configuration for XA transactions
Chapter 11. CICS Transaction Gateway Multiplatforms and Desktop Edition configuration
11.1 Installing CICS TG
11.1.1 Installing on a Windows platform
11.1.2 Installing on a UNIX (AIX) platform
11.2 Configure the Gateway daemon
11.2.1 System-level configuration
11.2.2 Gateway daemon configuration summary
11.2.3 The PRODUCT section
11.2.4 The GATEWAY section
11.2.5 The IPICSERVER section
11.3 Starting and stopping CICS TG
11.3.1 The Windows platform
11.3.2 The UNIX and Linux platforms
11.4 Testing the Gateway daemon
11.4.1 Start the Gateway daemon
11.4.2 Test the connection
11.4.3 Test the channel and container support
11.5 Configuring secure connections
11.5.1 Secure the Gateway daemon
11.5.2 Test the secure Gateway connection
11.5.3 Add client authentication
11.5.4 Secure the IPIC connection
11.6 Client daemon configuration
11.6.1 The CLIENT section
11.6.2 The DRIVER section
11.6.3 The SERVER section
11.6.4 The LOADMANAGER section (Windows)
Chapter 12. Integrating with WebSphere Application Server
12.1 Java EE application servers supported by CICS TG
12.2 The CICS resource adapters
12.3 Topologies
12.4 WebSphere Application Server settings
12.4.1 Connection management
12.4.2 Transaction management
12.4.3 Security Management
12.4.4 WebSphere Application Server z/OS-specific settings for EXCI
12.5 Installing the ECI resource adapter
12.5.1 Install the ECI resource adapter
12.5.2 Upgrading the ECI resource adapter
12.6 Creating and configuring a Java EE Connector Architecture connection factory
12.6.1 Creating a Java EE Connector Architecture connection factory
12.6.2 Configuring the connection pool properties
12.6.3 Configuring a Java EE Connector Architecture connection factory for CICS TG local mode
12.6.4 Configuring a Java EE Connector Architecture connection factory for CICS TG remote mode
12.7 Testing end-to-end
12.7.1 Deploying and configuring the IVT
12.7.2 Running the IVT
12.8 Configuring the XA connection
12.9 Flowing the user ID and password on an ECI request
12.10 Securing the connection with Secure Sockets Layer
12.11 Transaction tracking with Cross Component Trace
Chapter 13. High availability configuration
13.1 High availability use case
13.2 High availability topology
13.3 Connection balancing
13.3.1 Sysplex Distributor
13.3.2 Enabling WLM recommendations for TCP/IP port sharing
13.3.3 Testing TCP/IP port sharing using WLM
13.3.4 Modifying or deleting a TCPIP port sharing definition
13.4 Highly available Gateway group
13.5 Configuring DSSPOLICY
13.5.1 Policy based on dynamic server selection (z/OS only)
13.6 WebSphere Application Server cluster
13.6.1 WebSphere Application Server high availability topology
13.6.2 Using ECI resource adapter in a WebSphere Application Server cluster
13.6.3 Configuring a Java EE Connector Architecture connection factory for CICS TG remote mode
13.7 XA considerations
Chapter 14. Explorer plug-in
14.1 Introduction
14.2 Installing CICS TG plug-in for CICS Explorer
14.3 Creating and administering z/OS Gateway daemons
14.3.1 Creating a z/OS Gateway daemon using z/OS Explorer
14.3.2 Starting and stopping a z/OS Gateway daemon
14.4 Preparing a Gateway daemon to use Explorer
14.5 Connecting to a Gateway daemon
14.5.1 Backing up and restoring connection definitions
14.6 Viewing information for a Gateway daemon
14.6.1 CICS TG Explorer view
14.6.2 Gateway daemons view
14.6.3 CICS connections view
Chapter 15. Troubleshooting techniques
15.1 Troubleshooting z/OS installations
15.1.1 Obtaining CTGRRMS traced
15.2 Gateway daemon source of information
15.3 Gateway Daemon and Java shared class caches
15.3.1 Startup messages
15.3.2 Useful commands to display the shared class cache
Part 4 Appendixes
Appendix A. Running the precompiled Java sample EciB1 from batch on z/OS
Use precompiled EciB1 from batch
z/OS UNIX script
Batch JOB CTGECIB1
EciB1 command-line syntax
Appendix B. Modifying the sample BasicCICSRequestExit
B.1 Introduction to the CICS request exit samples
B.2 Modify the sample CICS Request Exit
B.3 Compile the Java sample request exit
B.4 SupportPac CA1T
Related publications
IBM Redbooks
Online resources
Help from IBM
Back cover
IBM System x Reference Architecture for Hadoop: IBM InfoSphere BigInsights Reference Architecture
Introduction
Business problem and business value
Reference architecture use
Requirements
InfoSphere BigInsights predefined configuration
InfoSphere BigInsights HBase predefined configuration
Deployment considerations
Customizing the predefined configurations
Predefined configuration bill of materials
References
The team who wrote this paper
Now you can become a published author, too!
Stay connected to IBM Redbooks
Notices
Trademarks
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Chapter 15. Troubleshooting techniques
Next
Next Chapter
Appendix A. Running the precompiled Java sample EciB1 from batch on z/OS
Appendixes
This part includes additional information and examples.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset