The DRDA Specification

Total Page:16

File Type:pdf, Size:1020Kb

The DRDA Specification Technical Standard DRDA, Version 4, Volume 1: Distributed Relational Database Architecture (DRDA) The Open Group ©February 2007, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owners. This documentation and the softwaretowhich it relates arederived in part from copyrighted materials supplied by International Business Machines. Neither International Business Machines nor The Open Group makes any warranty of any kind with regardtothis material, including but not limited to, the implied warranties of merchantability and fitness for a particular purpose. The Open Group shall not be liable for errors contained herein, or for any direct or indirect, incidental, special, or consequential damages in connection with the furnishing, performance, or use of this material. Technical Standard DRDA, Version 4, Volume 1: Distributed Relational Database Architecture(DRDA) ISBN: 1-931624-70-4 Document Number: C066 Published in the U.K. by The Open Group, February 2007. Any comments relating to the material contained in this document may be submitted to: The Open Group Thames Tower 37-45 Station Road Reading Berkshire, RG1 1LX United Kingdom or by Electronic Mail to: [email protected] ii Technical Standard (2007) Contents Chapter 1 The DRDA Specification ................................................................ 1 1.1 The DRDA Reference .............................................................................. 2 1.1.1 What it Means to Implement Different Levels of DRDA ............... 2 1.1.2 What it Means to Implement DRDA Level 6 ................................... 3 1.1.3 What it Means to Implement DRDA Level 5 ................................... 9 1.1.4 What it Means to Implement DRDA Level 4 ................................... 29 1.1.5 What it Means to Implement DRDA Level 3 ................................... 32 1.1.6 What it Means to Implement DRDA Distributed Unit of Work .......................................................................................... 35 1.2 The FD:OCA Reference .......................................................................... 38 1.3 The DDM Reference ................................................................................ 39 Part 1 Database Access Protocol .......................................................... 43 Chapter 2 Introduction to DRDA..................................................................... 45 2.1 DRDA Structureand Other Architectures ........................................... 45 2.2 DRDA and SQL ....................................................................................... 45 2.3 DRDA Connection Architecture........................................................... 46 2.4 Types of Distribution .............................................................................. 46 2.5 DRDA Protocols and Functions............................................................ 49 Chapter 3 Using DRDA: Overall Flows........................................................ 53 3.1 Introduction to Protocol Flows ............................................................. 53 3.1.1 Initialization Flows .............................................................................. 54 3.1.2 Bind Flows ............................................................................................. 57 3.1.3 SQL Statement Execution Flows........................................................ 59 3.1.4 Commit Flows ...................................................................................... 61 3.1.5 Termination Flows ............................................................................... 63 3.1.6 Utility Flows .......................................................................................... 65 3.1.6.1 Packet Flow ........................................................................................ 65 Chapter 4 The DRDA Processing Model and Command Flows ................................................................................. 67 4.1 DDM and the Processing Model........................................................... 68 4.2 DRDA Relationship to DDM................................................................. 69 4.3 The DRDA Processing Model ............................................................... 70 4.3.1 DRDA Managers .................................................................................. 70 4.3.1.1 SNA Communications Manager..................................................... 70 4.3.1.2 SNA Sync Point Communications Manager................................. 71 4.3.1.3 TCP/IP Communications Manager ............................................... 71 4.3.1.4 Agent................................................................................................... 71 4.3.1.5 Supervisor .......................................................................................... 72 4.3.1.6 Security Manager .............................................................................. 72 4.3.1.7 Directory ............................................................................................. 73 DRDA, Version 4, Volume 1: Distributed Relational Database Architecture (DRDA) iii Contents 4.3.1.8 Dictionary........................................................................................... 73 4.3.1.9 Resynchronization Manager............................................................ 73 4.3.1.10 Sync Point Manager.......................................................................... 73 4.3.1.11SQL Application Manager ............................................................... 74 4.3.1.12 Relational Database Manager.......................................................... 76 4.3.1.13 CCSID Manager ................................................................................. 77 4.3.1.14 XA Manager ....................................................................................... 77 4.3.2 The DRDA Processing Model Flow................................................... 78 4.3.3 Product-Unique Extensions................................................................ 84 4.3.4 Diagnostic and Problem Determination Support in DRDA .......... 84 4.3.5 Intermediate Server Processing .......................................................... 85 4.3.5.1 Overview and Terminology ............................................................. 85 4.3.5.2 Examples ............................................................................................ 86 4.4 DDM Commands and Replies .............................................................. 88 4.4.1 Accessing aRemote Relational Database Manager ........................ 89 4.4.2 DRDA Security Flows ......................................................................... 97 4.4.2.1 Identification and Authentication Security Flows ....................... 97 4.4.2.2 Security-Sensitive Data Encryption Security Flow ...................... 111 4.4.2.3 Intermediate Server Processing Security Flow for Security-Sensitive Data Encryption................................................ 117 4.4.2.4 Trusted Application Server.............................................................. 119 4.4.2.5 Establishing aTrusted Connection ................................................. 119 4.4.2.6 Switch ID Associated with a Trusted Connection........................ 123 4.4.3 Performing the Bind Operation and Creating a Package............... 127 4.4.3.1 Perform the Bind Copy Operation to Copy an Existing Package................................................................................ 132 4.4.3.2 Perform the Bind Deploy Operation to Deploy an Existing Package................................................................................ 136 4.4.4 Deleting an Existing Package ............................................................. 139 4.4.4.1 Delete Many Existing Packages ...................................................... 141 4.4.5 Performing aRebind Operation......................................................... 143 4.4.6 Activating and Processing Queries ................................................... 145 4.4.6.1 Fixed Row Protocol ........................................................................... 148 4.4.6.2 Limited Block Protocol (No FD:OCA Generalized String Data in Answer Set)................ 157 4.4.6.3 Limited Block Protocol (FD:OCA Generalized String Data in Answer Set) ...................... 164 4.4.7 Executing aBound SQL Statement.................................................... 171 4.4.7.1 Executing Ordinary Bound SQL Statements................................. 171 4.4.7.2 Invoking aStored Procedurethat Returns Result Sets................ 177 4.4.7.3 Executing Chained Ordinary Bound SQL Statements as an Atomic Operation ................................................................... 188 4.4.7.4 Executing Bound SQL Statement with Array Input .................... 193 4.4.8 Preparing an SQL Statement .............................................................. 195 4.4.9 Retrieving the Data Variable Definitions of an SQL Statement ...................................................................................... 198 4.4.10 Executing aDescribe Table SQL Statement...................................... 200 4.4.11Executing a Dynamic SQL Statement ............................................... 202
Recommended publications
  • DB2 UDB for Z/OS Security Target
    DB2 UDB for z/OS Security Target Version 1.3.13 Status: Final Last Update: 2007-12-06 DB2 UDB for z/OS Security Target IBM atsec is a trademark of atsec GmbH IBM, IBM logo, DB2 UDB for z/OS are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. The following terms are trademarks of International Business Machines Corporation in the United States, other countries, or both: • Advanced Function Presentation • AFP • DFS • DFSORT • • IBM • Infoprint • MVS • PR/SM • Print Services Facility • Processor Resource/Systems Manager • RACF • VTAM • z/Architecture • z/OS • z/VM • zSeries Intel and Pentium are trademarks of Intel Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States, other countries, or both. Java and all Java-based products are trademarks of Sun Microsystems, Inc., in the United States, other countries, or both. Other company, product, and service names may be trademarks or service marks of others. This document is provided AS IS with no express or implied warranties. Use the information in this document at your own risk. This document may be reproduced or distributed in any form without prior permission provided the copyright notice is retained on all copies. Modified versions of this document may be freely distributed provided that they are clearly identified as such, and this copyright is included intact. Copyright (c) 2004, 2005 by atsec GmbH and IBM Corporation or its wholly
    [Show full text]
  • Oracle® Tuxedo Product Overview 12C Release 1 (12.1.1)
    Oracle® Tuxedo Product Overview 12c Release 1 (12.1.1) June 2012 Oracle Tuxedo Product Overview, 12c Release 1 (12.1.1) Copyright © 1996, 20112, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S.
    [Show full text]
  • Technical Standard DRDA, Version 2, Volume 1: Distributed Relational Database Architecture (DRDA) Document Number: C911
    Technical Standard DRDA, Version 2, Volume 1: Distributed Relational Database Architecture (DRDA) NICAL H S C T A E N T D A R D [This page intentionally left blank] Open Group Technical Standard DRDA, Version 2, Volume 1: Distributed Relational Database Architecture (DRDA) The Open Group December 1999, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owners. This documentation and the software to which it relates are derived in part from copyrighted materials supplied by International Business Machines. Neither International Business Machines nor The Open Group makes any warranty of any kind with regard to this material, including but not limited to, the implied warranties of merchantability and fitness for a particular purpose. The Open Group shall not be liable for errors contained herein, or for any direct or indirect, incidental, special, or consequential damages in connection with the furnishing, performance, or use of this material. Open Group Technical Standard DRDA, Version 2, Volume 1: Distributed Relational Database Architecture (DRDA) Document Number: C911 Published in the U.K. by The Open Group, December 1999. Any comments relating to the material contained in this document may be submitted to: The Open Group Apex Plaza Forbury Road Reading Berkshire, RG1 1AX United Kingdom or by Electronic Mail to: [email protected] ii Open Group Technical Standard (1999) Contents Chapter 1 The DRDA Specification................................................................... 1 1.1 The DRDA Reference................................................................................
    [Show full text]
  • Brand Identity Manual As of January 2018
    Brand Identity Manual as of January 2018 © 2018 The Open Group 1 Contents The Open Group Brand Identity 3 What is the Brand Identity and why is it important? 4 How was The Open Group Brand Identity created? 4 How to use The Open Group trademarked brand name 5 Trademarks 7 Copyrights 7 The Open Group positioning statement 7 The Open Group category descriptor 8 The Open Group primary features and benefts 9 The Open Group organizational values 10 The Open Group brand archetype 11 Brand Identity messages and how to use them 13 Strategic creative theme 14 Imagery Graphic Identity Standards 15 The Open Group logo 16 The Open Group logo — “don’ts” 17 Other logos of The Open Group 18 Color palette 19 Fonts 19 Language standards 20 File formats 22 Print standards 23 Stationery templates 27 Conclusion Addenda 28 Messaging Rollout: Talking Points 31 Messaging Rollout: Positioning 38 Resources 2 The Open Group Brand Identity What is the Brand Identity and why is it important? In its simplest form, The Open Group brand is represented by the promises we make and keep with our members, partners, sponsors, etc. Brand Identity is the proprietary visual, emotional, and cultural image that surrounds The Open Group and its standards, certifcations, products, brands, forums, events, etc. as well as each of us as representatives of The Open Group. It defnes and represents who we are and how we act with respect to ourselves, our communities, and to the world as a whole. It is our best “sales pitch” and increases perceived value and reputation.
    [Show full text]
  • Introduction to the Open Group
    Welcome! Great to meet you! Apex Plaza, Forbury Road Chris Parnell Reading Director RG1 1AX Membership Services UK [email protected] Tel: +44 (0)23 9225 7694 Fax: +44 (0)700 609 9522 www.opengroup.org American Football … Rugby Football … Agenda Introduction to The Open Group What's New in The Open Group? Conference Overview About The Open Group • International Consortium • >350 Member organizations • >8,000 participants • > 80 countries • <50 staff • Vendor/technology neutral • Non-profit operation • >25 years experience South America OFFICES • San Francisco, CA • Boston, MA • Reading, UK • Tokyo, Japan • Shenzhen, China • Paris, France • Johannesburg, RSA • Dubai, UAE • Mumbai, India • Göteborg, Sweden • Istanbul, Turkey How The Open Group Works Governing Board Silver*/Gold Members Platinum Members Elected Representatives Customer Supplier Council Council ArchiMate Forum President & CEO Architecture Forum Enterprise Management Forum Identity Management Forum Management Team Platform Membership & Certification Full Consortia Real-time & Embedded Systems Events Authority Services Security Forum Legal, HR & Marketing Operations Council Work Groups Business Architecture Finance & IT Semantic Interoperability Service Oriented Architecture Legal Homesteading The Open Group Members Wide range of company sizes, industries and public/private organizations Customers . Financial Sector . Government Departments & Agencies . Manufacturers, Utilities and Materials . Retail . Telecommunications Suppliers . Systems Vendors . Software, Middleware
    [Show full text]
  • Windows Release 8206
    WebFOCUS and ReportCaster Installation and Configuration for Windows Release 8206 July 29, 2020 Active Technologies, EDA, EDA/SQL, FIDEL, FOCUS, Information Builders, the Information Builders logo, iWay, iWay Software, Parlay, PC/FOCUS, RStat, Table Talk, Web390, WebFOCUS, WebFOCUS Active Technologies, and WebFOCUS Magnify are registered trademarks, and DataMigrator and Hyperstage are trademarks of Information Builders, Inc. Adobe, the Adobe logo, Acrobat, Adobe Reader, Flash, Adobe Flash Builder, Flex, and PostScript are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Due to the nature of this material, this document refers to numerous hardware and software products by their trademarks. In most, if not all cases, these designations are claimed as trademarks or registered trademarks by their respective companies. It is not this publisher's intent to use any of these names generically. The reader is therefore cautioned to investigate all claimed trademark rights before using any of these names other than to refer to the product described. Copyright © 2019, by Information Builders, Inc. and iWay Software. All rights reserved. Patent Pending. This manual, or parts thereof, may not be reproduced in any form without the written permission of Information Builders, Inc. Contents Preface ......................................................................... 9 Conventions ........................................................................10 Related Publications .................................................................11
    [Show full text]
  • Oracle Database Gateway for DRDA User's Guide Is Included As Part of Your Product Shipment
    Oracle® Database Gateway for DRDA User’s Guide 11g Release 1 (11.1) B31046-01 June 2007 Oracle Database Gateway for DRDA User’s Guide, 11g Release 1 (11.1) B31046-01 Copyright © 2004, 2007, Oracle. All rights reserved. Primary Author: Maitreyee Chaliha Contributing Author: Denis Raphaely, Peter A. Castro The Programs (which include both the software and documentation) contain proprietary information; they are provided under a license agreement containing restrictions on use and disclosure and are also protected by copyright, patent, and other intellectual and industrial property laws. Reverse engineering, disassembly, or decompilation of the Programs, except to the extent required to obtain interoperability with other independently created software or as specified by law, is prohibited. The information contained in this document is subject to change without notice. If you find any problems in the documentation, please report them to us in writing. This document is not warranted to be error-free. Except as may be expressly permitted in your license agreement for these Programs, no part of these Programs may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose. If the Programs are delivered to the United States Government or anyone licensing or using the Programs on behalf of the United States Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the Programs, including documentation and technical data, shall be subject to the licensing restrictions set forth in the applicable Oracle license agreement, and, to the extent applicable, the additional rights set forth in FAR 52.227-19, Commercial Computer Software--Restricted Rights (June 1987).
    [Show full text]
  • Systems Programmer's Guide To
    Front cover Systems Programmer’s Guide to Resource Recovery Services (RRS) Managing, optimizing, and sizing RRS environments Restart and recovery with RRS How exploiters can get the most out of RRS Paola Bari Frank Kyne Alan Murphy ibm.com/redbooks International Technical Support Organization Systems Programmer’s Guide to Resource Recovery Services (RRS) November 2004 SG24-6980-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (November 2004) This edition applies to Version 1, Release 4 of z/OS (product number 5694-A01, 5655-G52). © Copyright International Business Machines Corporation 2004. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix The team that wrote this redbook. ix Become a published author . .x Comments welcome. .x Part 1. Resource Recovery Services (RRS) introduction and concepts . 1 Chapter 1. Introduction to Resource Recovery Services (RRS) . 3 1.1 Transactions . 4 1.2 Resource managers and protected resources . 5 1.3 The role of Resource Recovery Services (RRS). 6 1.3.1 Who uses RRS . 7 Chapter 2. Two-phase commit and RRS . 9 2.1 Introduction to two-phase commit . 10 2.2 Two-phase commit as supported by legacy resource managers . 13 2.2.1 CICS . 14 2.2.2 IMS . 15 2.2.3 DB2 . 15 2.3 How RRS works . 16 2.3.1 Registration services. 16 2.3.2 Context services . 17 2.3.3 RRS invocation .
    [Show full text]
  • The Single UNIX® Ingle UNIX Specification History & Timeline
    The Single UNIX® Specifi cationcation HistoryHistory && TTimelineimeline The history of UNIX starts back in 1969, when Ken UNIX System Laboratories (USL) becomes a company Thompson, Dennis Ritchie and others started working on 1969 The Beginning “The Single UNIX Specifi cation brings all the benefi ts of a single standard 1991 - majority-owned by AT&T. Linus Torvalds commences the “little-used PDP-7 in a corner” at Bell Labs and what operating system, namely application and information portability, scalability, Linux development. Solaris 1.0 debuts. was to become UNIX. fl exibility and freedom of choice for customers” USL releases UNIX System V Release 4.2 (Destiny). It had an assembler for a PDP-11/20, fi le system, fork(), October - XPG4 Brand launched by X/Open. December 1992 SVR4.2 1971 First Edition roff and ed. It was used for text processing of patent Allen Brown, President and CEO, The Open Group 22nd - Novell announces intent to acquire USL. Solaris documents. 2.0 and HP-UX 9.0 ship. 4.4BSD the fi nal release from Berkeley. June 16 - Novell First UNIX The fi rst installations had 3 users, no memory protection, 1993 4.4BSD 1972 The Story of the License Plate... acquires USL Installations and a 500 KB disk. Novell decides to get out of the UNIX business. Rather It was rewritten in C. This made it portable and changed than sell the business as a single entity, Novell transfers 1973 Fourth Edition In 1983 Digital Equipment Corporation the middle of it, Late the rights to the UNIX trademark and the specifi cation the history of OS’s.
    [Show full text]
  • Archimate 3.1 Specification
    The Open Group Standard ArchiMate® 3.1 Specification © 2012-2019 The Open Group, All Rights Reserved Personal PDF Edition. Not for redistribution Copyright © 2012-2019, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the copyright owner. It is fair use of this specification for implementers to use the names, labels, etc. contained within the specification. The intent of publication of the specification is to encourage implementations of the specification. The Open Group Standard ArchiMate® 3.1 Specification ISBN: 1-947754-30-0 Document Number: C197 Published by The Open Group, November 2019. For information on licensing refer to www.opengroup.org/legal. Comments relating to the material contained in this document may be submitted to: The Open Group, Apex Plaza, Forbury Road, Reading, Berkshire, RG1 1AX, United Kingdom or by electronic mail to: [email protected] © 2012-2019 The Open Group, All Rights Reserved ii The Open Group Standard (2019) Personal PDF Edition. Not for redistribution Contents 1 Introduction ............................................................................................................... 1 1.1 Objective ......................................................................................................... 1 1.2 Overview ........................................................................................................
    [Show full text]
  • API Standards Briefing: ISO/JTC1 Linux Study Group Meeting
    APIAPI StandardsStandards Briefing:Briefing: ISO/JTC1ISO/JTC1 LinuxLinux StudyStudy GroupGroup MeetingMeeting Andrew Josey The Open Group Email: [email protected] UNIX is a registered trademark of The Open Group Linux is a registered trademark of Linus Torvalds 1 This talk covers ! Why Standards Matter… ! The Standards " A review of the latest API standards " How Linux shapes up to them ! Their use… " POSIX " The Single UNIX Specification " The Linux Standard Base (LSB) 2 “Despite their well earned reputation as a source of confusion, standards are one of the enabling factors behind the success of Linux. If it weren't for the adoption of the right standards by Linus Torvalds and other developers, Linux would likely be a small footnote in the history of operating systems.” - Dan Quinlan, Free Standards Group Chairman 3 The Free Market ! The key to the growth of the Linux market is the free-market demands placed upon suppliers by customers " Open Standards ! These systems ultimately compete on quality and added value features to retain customers ! Dissatisfied customers can move on to another supplier 4 Background: Source Standards versus Binary Standards Source Specific Binary API Stds Linux Stds Behavior enables enables Shrink Application Wrapped Source Applications Portability 5 What is an API? ! Application Program Interface ! A written contract between system developers and application developers ! It is not a piece of code, it is a piece of paper defining what the two sets of developers are guaranteed to receive and are in turn
    [Show full text]
  • Product Standard
    Product Standard Operating System and Languages: UNIX 98 The Open Group Copyright January 1998, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owners. Motif, OSF/1, UNIX, and the ‘‘X Device’’ are registered trademarks and IT DialToneTM and The Open GroupTM are trademarks of The Open Group in the U.S. and other countries. Product Standard Operating System and Languages: UNIX 98 Document Number: X98XX Published in the U.K. by The Open Group, January 1998. Any comments relating to the material contained in this document may be submitted to: The Open Group Apex Plaza Forbury Road Reading Berkshire RG1 1AX U.K. Or by email to: [email protected] 2 Product Standard ____________________________________________________ Product Standard ____________________________________________________ NAME UNIX 98 LABEL FOR LOGO UNIX. When this logo is used on, or in relation to a product registered as conformant to this Product Standard, it must be accompanied by an attribution, in the form defined in the Trademark License Agreement, which includes the UNIX 98 Product Standard name. DESCRIPTION The UNIX 98 Product Standard is a significantly enhanced version of the UNIX 95 Product Standard. The mandatory enhancements include: • Threads interfaces, fully aligned with the POSIX Threads Extension,1 together with a set of X/Open-defined threads extensions. • Multibyte Support Extension (MSE), aligned with ISO/IEC 9899:1990/Amendment 1:1995 (E),2 to further support internationalized applications.
    [Show full text]