External Interfaces Guide

Total Page:16

File Type:pdf, Size:1020Kb

External Interfaces Guide CICS Transaction Server for z/OS 5.4 External Interfaces Guide IBM Note Before using this information and the product it supports, read the information in “Notices” on page 161. This edition applies to the IBM CICS® Transaction Server for z/OS® Version 5 Release 4 (product number 5655-Y04) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 1974, 2020. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this PDF.......................................................................................................v Chapter 1. CICS external interfaces....................................................................... 1 Interfaces to CICS transactions and programs...........................................................................................1 The client/server model......................................................................................................................... 2 Distributed computing............................................................................................................................2 TCP/IP protocols.....................................................................................................................................3 ONC and DCE concepts.......................................................................................................................... 6 EXCI concepts.........................................................................................................................................6 3270 bridge concepts............................................................................................................................ 7 Chapter 2. Bridging to 3270 transactions................................................................9 Introduction to the 3270 bridge..................................................................................................................9 The Link3270 bridge mechanism.......................................................................................................... 9 The bridge facility.................................................................................................................................10 The application data structure (ADS).................................................................................................. 11 Link3270 programming considerations...............................................................................................11 Transaction Routing considerations.................................................................................................... 15 Using the Link3270 bridge.........................................................................................................................17 Establish Link3270 suitability..............................................................................................................18 Writing the Link3270 client..................................................................................................................18 Using Link3270 messages................................................................................................................... 22 Using Link3270 single transaction mode............................................................................................ 25 Using Link3270 session mode............................................................................................................. 26 Calling the Link3270 bridge................................................................................................................. 31 Using data conversion with Link3270..................................................................................................32 Managing the Link3270 bridge environment............................................................................................ 33 Defining Link3270 system initialization parameters...........................................................................34 Defining the bridge facility .................................................................................................................. 34 Administering the Link3270 bridge...........................................................................................................40 INQUIRE/SET AUTOINSTALL with the Link3270 bridge..................................................................... 40 INQUIRE/SET BRFACILITY with the Link3270 bridge........................................................................ 40 INQUIRE TASK with the Link3270 bridge............................................................................................41 INQUIRE/SET TRACETYPE with the Link3270 bridge.........................................................................41 INQUIRE TRANSACTION with the Link3270 bridge........................................................................... 41 XPI commands for the Link3270 bridge..............................................................................................41 Using Link3270 bridge load routing.....................................................................................................42 Link3270 message formats.......................................................................................................................43 Link3270 message header (BRIH).......................................................................................................44 Inbound Link3270 vectors...................................................................................................................51 Outbound Link3270 vectors................................................................................................................ 57 Link3270 ADS descriptor..................................................................................................................... 73 Link3270 diagnostics.................................................................................................................................76 BRIH-RETURNCODE values................................................................................................................. 77 Link3270 sample programs.......................................................................................................................82 About the NACT transaction................................................................................................................ 82 Running the sample client programs...................................................................................................83 Setting up the NACT transaction .........................................................................................................86 Chapter 3. CICS ONC RPC support........................................................................89 iii Introduction to ONC RPC...........................................................................................................................89 ONC RPC concepts............................................................................................................................... 90 ONC RPC facilities................................................................................................................................ 91 ONC RPC naming and routing.............................................................................................................. 93 CICS ONC RPC concepts ..................................................................................................................... 94 Setting up CICS ONC RPC .......................................................................................................................102 CICS ONC RPC setup tasks................................................................................................................ 103 Defining CICS ONC RPC resources to CICS....................................................................................... 104 Configuring CICS ONC RPC using the connection manager................................................................... 106 Starting the connection manager...................................................................................................... 106 Updating CICS ONC RPC status......................................................................................................... 109 Enabling CICS ONC RPC.....................................................................................................................111 Defining, saving, modifying, and deleting 4-tuples...........................................................................113 Registering the 4-tuples.................................................................................................................... 118 Unregistering 4-tuples....................................................................................................................... 118 Disabling CICS ONC RPC....................................................................................................................121 Updating the CICS ONC RPC data set................................................................................................122 Processing the alias list......................................................................................................................126 Developing CICS ONC RPC
Recommended publications
  • Operator's Guide for IBM 3270 Information Display Systems
    GA27-2742-1 Operator's Guide for IBM 3270 Information Systems Display Systems i i Second Edition (July, 1972) This is a major revision of GA27-2742-0 and incorporates Technical Newsletter GN31-3001. Operating instructions for the printer and operator identification card reader have been added. Comments and corrections have been incorporated throughout the manual. Any system changes affecting this publication will be reported in subsequent revisions or Technical Newsletters. Additional copies of this manual can be obtained through IBM branch offices. Text for this publication has been prepared with the IBM SE LECTR IC ® Composer. A form is provided at the back of this publication for reader's comments. If the form has been removed, comments may be addressed to: IBM Systems Development Division, Product Publications, Dept. 520, Neighborhood Road, Kingston, N.V., 12401 © Copyright International Business Machines Corporation, 1971, 1972 Contents iii Table of Contents First Words to the Operator Qu ick Reference . 3 Operating the 3270* . 4 Introduction to Display Station Operation 5 Operator Controls 7,8 The Display Image 8 Indicators . 15-19 Keyboards 20 Typewriter Keyboard* ............... 24 I Data Entry Keyboard* ............... 44 I Operator Console Keyboard* . 62 I ·" Printer Operation * . 76 I,.~' , Operator Identification Card Reader . 88 I A Typical Job . · 90 Correcting Operator Errors . 90 Trouble with Your Machine · 92 Operator Trouble Report 92 Extras for the 3270* . .100 Selector Pen . · 101 Secu rity Key Lock .105 Audible Alarm . .106 Numeric Lock Feature .109 Understanding the 3270* .. 110 Data Processing · 111 Display Stations .. · 114 The IBM 3270 Information Display System · 115 ) Index · 119 *The complete table of contents for each section is on the first page of that section.
    [Show full text]
  • Introduction to Mainframe Networking TCP/IP Problem Determination
    z/OS Basic Skills Information Center Networking on z/OS z/OS Basic Skills Information Center Networking on z/OS Note Before using this information and the product it supports, read the information in “Notices” on page 251. This edition applies to z/OS (product number 5694-A01). We appreciate your comments about this publication. Comment on specific errors or omissions, accuracy, organization, subject matter, or completeness of this book. The comments you send should pertain to only the information in this manual or product and the way in which the information is presented. For technical questions and information about products and prices, please contact your IBM branch office, your IBM business partner, or your authorized remarketer. When you send comments to IBM, you grant IBM a nonexclusive right to use or distribute your comments in any way it believes appropriate without incurring any obligation to you. IBM or any other organizations will only use the personal information that you supply to contact you about the issues that you state on this form. Send your comments through this web site: http://publib.boulder.ibm.com/infocenter/zoslnctr/v1r7/index.jsp?topic=/com.ibm.zcontact.doc/webqs.html © Copyright IBM Corporation 2006, 2010. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Before you begin the topic about Coupling channels ...........40 networking on z/OS .........vii Open Systems Adapter (OSA) .......40 HiperSockets ..............46 The I/O cage ..............48 Part 1. Introduction to networking on the mainframe...........1 Chapter 4. Sample network configuration ............49 Chapter 1.
    [Show full text]
  • User's Guide and Reference for IBM Z/OS® Remote Access Programs August 2, 2021
    User's Guide and Reference for IBM z/OS® Remote Access Programs August 2, 2021 International Business Machines Corporation IBM Z Dallas ISV Center Dallas, TX USA This document is intended for the sole use of participants in an IBM Z Dallas ISV Center Remote Development or Early Test Program and is not to be distributed to non-participants or used for purposes other than intended. © Copyright International Business Machines Corporation 2019. All rights reserved. 1 Table of Contents 1 Preface .................................................................................................................................................... 4 1.1 Links ................................................................................................................................................. 4 2 Overview – Remote Access Environment ........................................................................................... 5 2.1 Hardware / Software Platform .......................................................................................................... 5 2.2 Introduction to the Virtual Machine Concept ................................................................................... 5 2.3 z/OS Remote Access Environment ................................................................................................... 5 2.4 Printers .............................................................................................................................................. 7 2.5 System Availability..........................................................................................................................
    [Show full text]
  • Configuring TN3270 C H a P T E R
    CHAPTER 13 Configuring TN3270 IBM 3270 display terminals are among the computing community’s most widely implemented and emulated for host-based computing. Information in this chapter will help you understand the TN3270 terminal emulation environment, and how to use and create files that will allow terminals connected to the communication servers to be used for TN3270 operation. For a complete description of the commands in this chapter, see the Communication Server Command Reference publication. Cisco’s Implementation of TN3270 The TN3270 terminal emulation software is based on software developed at the University of California, Berkeley. This software allows any terminal to be used as an IBM 3270-type terminal. Users with non-3270 terminals can take advantage of the emulation capabilities to perform the functions of an IBM 3270-type terminal. Specifically, Cisco’s implementation supports emulation of an IBM 3278-2 terminal providing an 80 by 24 display. True IBM 3270-type terminals use a character format referred to as extended binary-coded decimal interchange code (EBCDIC). EBCDIC consists of 8-bit coded characters and was originally developed by IBM. Emulation is made possible by termcap and curses functions developed by Berkeley UNIX system developers. These functions translate the keyboard and terminal characteristics for ASCII-type terminals into those expected by an IBM host. ASCII characters are listed in the “ASCII Character Set” appendix in the Communication Server Command Reference publication. Formally, a termcap is a two-part terminal-handling mechanism. It consists of a database and a subroutine library. The database describes the capabilities of each terminal to be supported; the subroutine library allows programs to query the database and to make use of the values it contains.
    [Show full text]
  • Data Stream Programmer's Reference ------,------3270 Information ------ .-- Display System
    ----- - --- 3270 Information ---- - - --- --------- Display System Data Stream Programmer's Reference -------,----- - --- 3270 Information - - - --- -------_.-- Display System Data Stream Programmer's Reference GA23-0059-4 File Number 8360/8370/53/4300/8100-30 Fifth Edition (December 1988) This publication introduces and explains the functions of the 3270 Information Display System data stream. Changes are continually made to the information herein; before using this publication in connection with the operation of IBM systems, refer to the latest IBM System/360 or System 1370 SRL Newsletter for the editions that are applicable and current. It is possible that this material may contain reference to, or information about, IBM products (machines and programs), programming, or services that are not announced in your country. Such references or information must not be construed to mean that IBM intends to announce such IBM products, programming, or services in your country. The names and addresses used in the examples that appear in this manual are fictitious, and any similarity to the names and addresses of actual persons is entirely coincidental. Publications are not stocked at the address given below; requests for IBM publications should be made to your IBM representative or to the IBM branch office serving your locality. A form for readers' comments is provided at the back of this publication. Address additional comments to IBM Corporation, Communication Products Information Development, Department E02, PO Box 12195, Research Triangle Park, North Carolina, U.S.A. 27709. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation whatever. You may, of course, continue to use the information you supply.
    [Show full text]
  • Systems Network Architecture Concepts and Pioducts
    ---- -------- ---- Systems --------- - ------- -~- .. - Network Architecture Concepts and Pioducts GC30-3072-1 File No. 370/4300-30 Second Edition (February 1984) This is a reprint of GC30-3072-0 incorporating changes released in Technical Newsletter: GN30-3205 (dated 22 September 1981) Changes are continually made to the information in IBM systems publications. Before using this publication in connection with the operation of IBM systems, refer to the latest IBM System/370 and 4300 Processors Bibliography, GC20-o001, for the editions that are applicable and current. References in this publication to IBM products, programs, or services do not imply that IBM intends to make these available in all countries in which IBM operates. Publications are not stocked at the address given below. Requests for copies of IBM publications should be made to your IBM representative or to the IBM branch office serving your locality. A form for readers' comments has been provided at the back of this publication. If the form has been removed address comments to IBM Corporation, Publications Development, Department E02, P.O. Box 12195, Research Triangle Park, North Carolina, U.S.A. 27709. IBM may use or distribute whatever information you supply in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 1981 Preface This publication introduces the IBM Systems Network Architecture to individuals who need to acquaint themselves with its benefits, its concepts, and the IBM products that are designed for use in SNA networks. This is the basic publication about Systems Network Architecture (SNA) for managers, system designers, and others involved in making decisions about planning or implementing distributed data processing within an organization.
    [Show full text]
  • OSA-Express Integrated Console Controller Implementation Guide October 2005
    Front cover OSA-Express Integrated Console Controller Implementation Guide Product planning and implementation information Realistic examples and considerations Step-by-step configuration procedures Bill White Jeff Nesbitt ibm.com/redbooks International Technical Support Organization OSA-Express Integrated Console Controller Implementation Guide October 2005 SG24-6364-01 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. Second Edition (October 2005) This edition applies to IBM System z9 and eServer zSeries (z990 and z890) servers, which support the OSA-Express Integrated Console Controller (OSA-ICC) function. © Copyright International Business Machines Corporation 2004, 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix The team that wrote this redbook. ix Become a published author . .x Comments welcome. .x Chapter 1. Introduction. 1 1.1 OSA-ICC description. 2 1.2 Hardware support . 3 1.3 Software support . 4 1.4 Comparison. 5 1.5 Migration considerations . 6 1.5.1 Migrating OSA-ICC configurations from z990 to z9-109 servers . 6 1.5.2 Migrating from IBM 2074 to OSA-ICC. 7 1.5.3 Migrating from IBM 3174 to OSA-ICC. 8 Chapter 2. Pre-install . 11 2.1 Planning overview . 12 2.2 Configuration steps . 15 2.2.1 HCD and IOCP planning. 17 2.2.2 OSA-ICC planning . 21 2.2.3 Network considerations. 33 2.2.4 TN3270E emulator planning . 35 Chapter 3. Configuration tasks . 39 3.1 Configuration tasks overview .
    [Show full text]
  • Emulator User's Reference
    Personal Communications for Windows, Ver sion 5.8 Emulator User’s Reference SC31-8960-00 Personal Communications for Windows, Ver sion 5.8 Emulator User’s Reference SC31-8960-00 Note Before using this information and the product it supports, read the information in “Notices,” on page 217. First Edition (September 2004) This edition applies to Version 5.8 of Personal Communications (program number: 5639–I70) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 1989, 2004. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . vii Using PDT Files . .24 Double-Byte Character Support. .25 Tables . .ix Printing to Disk . .26 Workstation Profile Parameter for Code Page . .27 About This Book. .xi Chapter 5. Key Functions and Who Should Read This Book. .xi How to Use This Book . .xi Keyboard Setup . .29 Command Syntax Symbols . .xi Default Key Function Assignments . .29 Where to Find More Information . xii Setting the 3270 Keyboard Layout Default . .29 InfoCenter. xii Default Key Functions for a 3270 Layout . .29 Online Help . xii Setting the 5250 Keyboard Layout Default . .32 Personal Communications Library. xii Default Key Functions for a 5250 Layout . .32 Related Publications . xiii Default Key Functions for the Combined Package 34 Contacting IBM. xiii Setting the VT Keyboard Layout Default . .34 Support Options . xiv Default Key Functions for the VT Emulator Layout . .35 Keyboard Setup (3270 and 5250) . .36 Part 1. General Information . .1 Keyboard File . .36 Win32 Cut, Copy, and Paste Hotkeys .
    [Show full text]
  • Guía Para El Administrador De PC Y Multiusuarios Tun Plus 2014 - Version 15.0.0 Issued December 2013 Copyright © 1989-2014 Esker S.A
    Guía para el administrador de PC y Multiusuarios Tun Plus 2014 - Version 15.0.0 Issued December 2013 Copyright © 1989-2014 Esker S.A. All rights reserved. Copyright © 1998-2008 The OpenSSL Project. All rights reserved. Copyright © 1995-1998 Eric Young ([email protected]). All rights reserved. Copyright © 1995-2005 The Cryptix Foundation Limited. All rights reserved. Copyright © 1995 Tatu Ylonen <[email protected]>, Espoo, Finland. All rights reserved Copyright © 1998 CORE SDI S.A., Buenos Aires, Argentina. All rights reserved Copyright © 1995, 1996 by David Mazieres <[email protected]> Copyright © 1983, 1990, 1992, 1993, 1995 The Regents of the University of California. All rights reserved. Copyright © 1998-2003 by Neil Hodgson [email protected]. All Rights Reserved. For additional information, conditions of use, and disclaimers, see copyright.pdf file. Use and duplicate only in accordance with the Software License Agreement: Tun Products. Esker, the Esker logo, Esker Pro, Extending the Reach of Information, Tun, and Tun Emul are trademarks, registered trademarks or service marks of Esker S.A. in the U.S., France and other countries. The following are trademarks of their respective owners in the United States and other countries: Microsoft, Windows, BackOffice, MS-DOS, XENIX are registered trademarks of Microsoft Corp. Netscape and Netscape Navigator are registered trademarks of Netscape Communications Corp. IBM, AS/400, and AIX are registered trademarks of IBM Corp. SCO is a registered trademark of Caldera International, Inc. NetWare is a registered trademark of Novell, Inc. Sun, Sun Microsystems and Java are trademarks of Sun Microsystems, Inc. Oracle is a registered trademark of Oracle Corp.
    [Show full text]
  • Vp Terminal Emulation of Ibm 3270
    VP TERMINAL EMULATION OF IBM 3270 XEROX VP Series Reference Library Version 1.0 This publication could contain technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of this publication. ThiS publication was printed in September 1985 and is based on the VP Series 1.0 software. Address comments to: Xerox Corporation Attn: Product Education (N2-15) 701 S. Aviation Blvd. EI Segundo, California 90245 WARNING: This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions manual, may cause interference to radio communications. It has been tested and found to comply with the limits for a Class A computing device pursuant to subpart} of part 15 of the FCC rules, which are designed to provide reasonable protection against such interference when operated in a commercial environment. Operation of this equipment in a residential area is likely to cause interference, in which case the user at his own expense will be required to take whatever measures may be required to correct the interference. Printed in U.S.A. Publication number: 610E01190 XEROX~, 6085,8000,8010,860,820-11,8040,5700,8700,9700, 495-1, ViewPoint, and VP are trademarks of Xerox Corporation. IBM is a registered trademark of International Business Machines. DEC and VAX are trademarks of Digital Equipment Corporation. Wang Professional Computer is a trademark of Wang Laboratories, Inc. Lotus 1-2-3 is a trademark of Lotus Development Corporation. MS-DOS is a trademark of Microsoft Corporation.
    [Show full text]
  • Reflection Desktop Data Sheet
    Data Sheet Application Modernization and Connectivity Reflection Desktop Micro Focus Reflection Desktop is a Windows-based terminal emulator that connects desktop and mobile users to IBM, UNIX, Linux, OpenVMS, HP 3000, and HP NonStop*. Secure, manageable, and easy to use, Reflection Desktop continually delivers new and better ways of doing business. Product Highlights Quick View ■ Get the One-Stop Host-Access Solution New Macro panel for managing all automations. ■ Reflection Desktop connects Windows desk- New Support for sending commands entered tops and mobile devices to IBM, UNIX, Linux, into a single VT session/window to multiple OpenVMS, and HP systems—all in one pack- open VT sessions. ■ age. It also supports a mix of technologies, New 3270 APL keyboard support. including Windows 10, and Windows 8; Active ■ Directory and Group Policy; Microsoft App-V, New User experience updates, including new fonts, product colors, and icons. VMware, and Citrix Virtual Apps and Desktops ■ (formerly XenApp); and IPv6 and 64-bit com- Print multiple screens utility for collating data puting. When it comes to host access, we have from multiple host applications. ■ you covered. Reflection Desktop can mask data as it is being Easily automate business processes with a typed into host sessions. visual code editor (Express Macro Language). ■ Add Layers of Security Share VBA macros capability for accelerating Reflection Desktop shields data in motion Grant or deny access based on group or role. productivity on a wide scale. ■ and at rest. Built to support the highest U.S. Make post-install adjustments on the fly. Next Input data via Bluetooth barcode scanning.
    [Show full text]
  • Introduction to the New Mainframe: Networking
    Front cover Introduction to the New Mainframe: Networking Concepts of mainframe-based data communications Methods for implementing TCP/IP and SNA on z/OS Basic skills in network operations, security, and problem determination Christopher Hastings Matt Nuttall Micky Reichenberg ibm.com/redbooks International Technical Support Organization Introduction to the New Mainframe: Networking August 2006 SG24-6772-00 Note: Before using this information and the product it supports, read the information in “Notices” on page 329. First Edition (August 2006) This edition applies to Version 1, Release 7, Modification 0 of z/OS (5694-A01). © Copyright International Business Machines Corporation 2006. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. iii iv Introduction to the New Mainframe: Networking Contents Preface . xiii How this text is organized . xiv How each chapter is organized . xv The team that wrote this redbook. xvi Comments welcome. xvii Part 1. Introduction to networking on the mainframe . 1 Chapter 1. Mainframes and networks . 3 1.1 Mainframes, networks, and you . 4 1.2 Networks and online systems . 5 1.3 Why are networks important? . 7 1.4 Examples of mainframe-based networks . 7 1.4.1 ATM cash withdrawal . 8 1.4.2 Credit purchase at a retail store . 9 1.4.3 Technology choices abound in network technology . 9 1.5 Who supports the network?. 10 1.6 What are the basic elements of a network? . 11 1.7 Overview of mainframe network capabilities . 12 1.7.1 z/OS Communications Server.
    [Show full text]