Professional Documents
Culture Documents
Topics:
Unit 2 contents
This unit also deals with methods of accessing and protecting data, an
important resource in any system.
Unit 2 objectives
Two very important domains are the domain manager domain and the
application domain.
When dealing with file access through the API, the command string
includes an identifier for the file that the command is accessing.
For example, if the user were reading a VSAM file, the command might
be
CICS TS for OS/390 is commonly divided into three regions: TOR, AOR
and FOR.
File owning region (FOR) – Owns data resources including data files
and tables, so its CSD includes definitions for those resources.
You will learn about these five methods for resource definition in this
unit:
Resource definition online (RDO) – Uses CICS-supplied transactions
(CEDA, CEDB, and CEDC) while a CICS region is running and stores
the definitions in the CSD file.
DFHCSDUP offline utility – Operates like RDO, but offline through a
batch job.
Automatic installation (Autoinstall) – Works only with user
modifications through a definition model. The utility then dynamically
creates new definitions based on the model which can prevent the
creation of large numbers of definitions.
(continued)
RDO can control which resources are accessed by which users. This is
done using the CEDA command LOCK, and also through such operator
ID-based security products as RACF.
To create a list, use either the ADD command to add a group to a list
(which also creates the new list) or use the APPEND command to add
one list to another (which also creates the new list). Again, list names
must be unique.
In a single-system environment,
lists with several different sets of
groups can be installed for
different days of the week,
depending on usage and
workload.
CICS needs to know what terminals are connected to the system. With
the CEDA command, the RDO facility is used to identify the VTAM-
supported terminals that operators are using to interact with CICS.
The advantage to this process is that terminals are defined only when in
use. This means that:
To do this, the address of the TCTTE for the initiating terminal is stored
in the TCA that has been set up for the task. Also, the address of the
TCA is stored in the TCTTE of the initiating terminal.
The FCP consults the FCT for the information necessary to access
application data files. The FCT must contain an entry for each file that a
CICS program accesses. Each FCT entry contains:
The name of the data set
The access method used with the file (for example: VSAM)
The type of access permitted (for example: update, read-only)
Other file attributes, such as the number of tasks CICS will permit to
access the file concurrently
These can be activated in the file control table at the discretion of the
CICS system administrator. These controls come into play when records
are updated, added to or deleted from a file control data set.
Other products used with CICS also have journaling and logging
procedures.
Atomicity
Consistency
Isolation
Durability
Sync points are logical points in the program execution and delimit a
logical unit of work (LUW).
Sync points occur where the changes being made are consistent and
complete, and can then be committed to the database. After a sync
point is reached:
One task may equal one LUW with no sync point, but most complex
tasks have several sync points.
Unit 2 summary
Two important domains in the CICS system are the domain manager
domain and the application domain.
The domain manager domain keeps track of all other domains.
The application domain contains components responsible for terminal
management, file access control, and the interface between CICS and
application programs.
Unit 2 summary
Unit 2 summary
CICS is commonly divided into three region types, each with its own
CSD files:
- Terminal owning region (TOR)
- Application owning region (AOR)
- File owning region (FOR)
CICS organizes related resources into named groups that are further
organized into lists.
Unit 2 summary
There are three major transaction groups in RDO: CEDA, CEDB, and
CEDC. The CEDA group of commands allows the most extensive
modification of the active CICS system and the CSD.
Two major CICS components are involved in the file control process:
the file control program (FCP), and the file control table (FCT).
(continued)
Unit 2 summary