Professional Documents
Culture Documents
Session: 17148
Thursday, March 5, 2015: 10:00 AM-11:00 AM
Insert
Custom
Session
QR if
Desired.
The following terms are trademarks or registered trademarks of International Business Machines Corporation in the United States or other countries or both:
Advanced Peer-to-Peer
Networking
AIX
alphaWorks
AnyNet
AS/400
BladeCenter
Candle
CICS
DataPower
DB2 Connect
DB2
DRDA
e-business on demand
e-business (logo)
e business(logo)
ESCON
FICON
GDDM
GDPS
Geographically Dispersed
Parallel Sysplex
HiperSockets
HPR Channel Connectivity
HyperSwap
i5/OS (logo)
i5/OS
IBM eServer
IBM (logo)
IBM
IBM zEnterprise System
IMS
InfiniBand
IP PrintWay
IPDS
iSeries
LANDP
Language Environment
MQSeries
MVS
NetView
OMEGAMON
Open Power
OpenPower
Operating System/2
Operating System/400
OS/2
OS/390
OS/400
Parallel Sysplex
POWER
POWER7
PowerVM
PR/SM
pSeries
RACF
Rational Suite
Rational
Redbooks
Redbooks (logo)
Sysplex Timer
System i5
System p5
System x
System z
System z9
System z10
Tivoli (logo)
Tivoli
VTAM
WebSphere
xSeries
z9
z10 BC
z10 EC
zEnterprise
zSeries
z/Architecture
z/OS
z/VM
z/VSE
The following terms are trademarks or registered trademarks of International Business Machines Corporation in the United States or other countries or both:
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries.
Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license there from.
Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.
InfiniBand is a trademark and service mark of the InfiniBand Trade Association.
Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel
Corporation or its subsidiaries in the United States and other countries.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office.
IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency, which is now part of the Office of Government Commerce.
Notes:
Performance is in Internal Throughput Rate (ITR) ratio based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput that any
user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload
processed. Therefore, no assurance can be given that an individual user will achieve throughput improvements equivalent to the performance ratios stated here.
IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply.
All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have
achieved. Actual environmental costs and performance characteristics will vary depending on individual customer configurations and conditions.
This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to
change without notice. Consult your local IBM business contact for information on the product or services available in your area.
All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.
Information about non-IBM products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the
performance, compatibility, or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.
Prices subject to change without notice. Contact your IBM representative or Business Partner for the most current pricing in your geography.
Refer to www.ibm.com/legal/us for further legal information.
Page 2
Agenda
CICS and TCP/IP Connectivity Overview
CICS Sockets (aka IP Sockets) and the CICS Sockets Domain
Configuration of CICS Sockets (IP Sockets)
Configuration of TCPIPSERVICE for CICS Sockets Domain
Monitoring TCP/IP connectivity (CICS Transaction Tracking, APPLDATA
support in TCP/IP)
High Availability Considerations
Sysplex Distributor, SHAREPORT, CP/SM
Securing TCP/IP Communications in CICS
AT-TLS overview, Native SSL/TLS support, future directions
CICS Connection Management
Page 3
Inbound
Connections
CICS
Sockets
Domain
HTTP
IPIC
ECI
USER
CICS
IP
Sockets
z/OS
z/OS
CICS
Sockets
Domain
Page 4
HTTP
IPIC
CICS
IMS
IPIC
CICS
Outbound
Connections
CICS
Sockets
Domain
CICS
IP
Sockets
dd
Distributed Platforms,
DataPower, CICS TXSeries,
WAS, CTG, z/OS Systems, etc.
Application-layer
protocol is
transparent to the
enhanced CICS
Sockets listener.
These services are
based on the
Sockets Extended
sockets APIs
(provided by
Communications
server)
Inbound and
outbound
connections,
UDP and
multicast
support, IPv4
and IPv6
Page 6
CICS
Sockets
generic
Listener
ECI over
TCP/IP
Listener
USER
Listener
IPIC
Listener
EZASOKET
A conversational
model - or a
request/reply model
Primarily a request/reply
model but persistent
connections supported
TCPIPServices
represent the
"application" layer
protocols
supported by CICS
Sockets Domain
CICS Sockets
transaction
P
a
s
c
a
l
R
e
x
x
C
I
C
S
C
a
l
l
EZASOKET
EZASMI
A
S
M
M
A
C
R
O
X
T
I
R
P
C
R
P
C
RFC
1006
SUN
3.9
NCS
X
W
I
N
S
N
M
P
X
T
I
R
P
C
R
P
C
X11
R4
DPI
1.2
XPG
4.2
SUN
4.0
DCE
CICS Sockets
Domain
X
W
I
N
S
N
M
P
X11
R6
DPI
2.0
UNIX Systems Services and TCP/IP provided Physical File Systems (PFS) - AF_INET and AF_INET6
Page 7
An attempt at a comparison
Attribute
CICS Sockets
Development productivity
Low to medium
Low
IPv6 support
Yes
No specific support
Yes
Page 8
CICS Sockets
Secure connections
OTE support
Yes
Yes
Yes
No
Yes
Yes
No
Management (configuration),
trace/debug, and monitoring
integral part of CICS
No
Yes
No
Connection persistence
Somewhat complicated
requires use of an iterative
server design or home-written
listener
Yes
Perceived lower
Perceived higher
Page 9
http://www.redbooks.ibm.com/redpapers/pdfs/redp4906.pdf
Page 10
Configuring TCPIPSERVICE
1-65535
Open | Closed
IIop | Http | Eci | User | IPic
0-32767
No | 0-240000 (HHMMSS)
3-524288
Yes | No | Clientauth
Page 12
IP address is used to
turn your service into a
bind-specific server only servicing
connection requests
that are received for this
local IP address.
2.
1-65535
Open | Closed
IIop | Http | Eci | User | IPic
0-32767
No | 0-240000 (HHMMSS)
3-524288
Yes | No | Clientauth
Or have the TCP/IP systems programmer control it in the TCP/IP configuration data set (the
TCP/IP Profile)
PORT
5081 TCP IMWEBSRV BIND 10.1.1.64
5081 TCP CICSTS32 BIND 10.1.1.161
Page 13
The easiest way is to use the netstat command from either TSO or the UNIX shell (or the
MVS console).
TSO: ALLCONN APPLDATA TCP TCPCS ( CLI
CICSTS32
13:22:46
ABC HTTP
CICS ECI
CICS IPI
The services you did not make bind-specific - in this example ECI on port 5082, and IPIC on port 5084 show
up in your netstat display with the local socket IP address as 0.0.0.0.
They will receive connection requests that arrive on any of the IP addresses in the HOME list.
Which is better? Bind-specific or not?
It depends! When using Dynamic VIPAs (DVIPA) bind-specific is typically preferred
Guarantees that clients only use DVIPA addresses
Allows multiple TCPIPServices to use use the same well known port
Page 14
TCP/IP
Stack
LST2
TRNA
T
R
U
E
EZAO
EZAC
OTE enabled
IPv6 support
Pool of reusable
socket subtasks
LST1
PLTx
Build
EZACICD
Conf.
file
CICS/ESA or
CICS TS Region
APPLID = CICS1A
Overtype to Enter
APPLID
TCPADDR
NTASKS
DPRTY
CACHMIN
CACHMAX
CACHRES
ERRORTD
SMSGSUP
TERMLIM
TRACE
OTE
TCBLIM
PLTSDI
APPLDAT
PF 3 END
===>
===>
===>
===>
===>
===>
===>
===>
===>
===>
===>
===>
===>
===>
===>
CICS1A
TCPCS
100
010
010
020
005
CSMT
NO
000
YES
NO
00000
NO
YES
CICS Sockets
always uses
one TCP/IP
stack only which one is
specified with
the TCPADDR
keyword.
12 CNCL
To get APPLDATA in Netstat for CICS Sockets Sockets, you must specify YES to APPLDAT on the CICS entry
Page 17
screen 1 of 2)
APPLID = CICS1A
Overtype to Enter
APPLID
TRANID
PORT
AF
IMMEDIATE
BACKLOG
NUMSOCK
ACCTIME
GIVTIME
REATIME
RTYTIME
LAPPLD
===>
===>
===>
===>
===>
===>
===>
===>
===>
===>
===>
===>
CICS1A
CSKL
03001
INET
YES
040
100
060
000
000
015
INHERIT
You specify if
the listener is
an IPv4 or an
IPv6 listener
(INET or INET6)
Similar
comments
about the
backlog value.
Ensure this is
large enough to
handle
workload spikes
8 NEXT
12 CNCL
To get APPLDATA in Netstat for this listener, specify YES or INHERIT (inherit from the CICS entry)
Page 18
screen 2 of 2)
APPLID = CICS1A
Overtype to Enter
MINMSGL
TRANTRN
TRANUSR
SECEXIT
GETTID
USERID
===>
===>
===>
===>
===>
===>
004
NO
NO
NO
Page 19
7 PREV
12 CNCL
Connect
Send/Receive
CICS Task
Sockets Client
CICS Task
Remote
Sockets
Client
Connect
Send/Receive
CICS Task
Connect
Remote
Sockets
Client
Send TRM
Sockets Listener
(CSKL)
Pass the socket
CICS Task
Send/Receive
EXEC
CICS
START
Concurrent Sockets
Child Server
Concurrent Sockets Server
CICS Region
Client
Connect to listener
[Send TRM]
Do Forever
Accept connection request
[Read TRM from client]
[Call security exit]
Givesocket
EXEC CICS START passing TIM
If errors, send err message
end
Send Request
Read Reply
Close socket
Child Server
EXEC CICS Retrieve of TIM
Takesocket
[Send OK Message to client]
Read request data from client
Process request
Send reply to client
Close socket
Page 21
CICS Sockets
Listener port1
CICS Transaction
TRA1
Application input
CICS Sockets
Listener port2
Associate to TRA2
CICS Transaction
TRA2
Application input
CICS Sockets
Listener port3
User exit to assign
transaction code
CICS Transaction
TRA3
Application input
TRA1,user1/pwd1
TCP/IP
Network
CICS Region
14:27:37
Establsh
.
.
.
Ancillary Input Queue: N/A
Application Data:
EZACICSO SRV1 0000038 CICSUSER CICP
CICS
Sockets
Interface
Page 25
Tran ID
Task
Userid
Number associated
with
transaction
CICS ID
I
First 8 characters of
CICS
HTTP
Inbound
TCPIPSERVICE
APPLID
Protocol
Connection
Description
Tranid
TCPIPSERVICE
CWXN
Name
HTTP inbound
Page 26
Page 27
CICS Sockets transaction tracking support for CICS TCP/IP IBM Listener
In z/OS V2R2, the CICS Sockets Listener will provide to CICS the IP addresses and port
numbers of the local and remote session partners for use by the CICS Explorer or Session
Monitor.
This support is only for transactions that are started via the CSKL listener.
Page 29
Value
ODAPTRID
ODAPTRDATA1
TCP=tcpip_name
ODAPTRDATA2
ODAPTRDATA3
Page 30
Application location
independence
VIPA#2
CICS Appl-A
VIPA#1
VIPA#4
TN3270e Server
FTP Services
VIPA#5
Web Services
OSA
Cooperation by applications
Operations procedures
Page 32
OSA
IP#10
DB2 subsystem
VIPA#3
The objective is to
make the Sysplex
look like one large
server that has a
number of physical
network interfaces
for performance and
availability - and that
provides a number of
highly available and
scalable services.
OSA
SNA
LLC2
IP#11
Name
server
Connect to VIPA#1
SNA and
TCP/IP
Connect to
CICS-Appl-A.xyz.com
Resolve CICS-Appl-A.xyz.com
Belongs to one TCP/IP stack, but backup policies govern which TCP/IP stack in the Sysplex takes it over if the primary TCP/IP
stack leaves the Sysplex
Individual stack-managed dynamic VIPAs can be moved between primary and backup stacks using MVS operator commands
Belongs to an application. Becomes active on the TCP/IP stack in the Sysplex where the application is started. Moves with
the application.
Belongs to whatever TCP/IP stack in the Sysplex on which a MODDVIPA utility to activate the address has been executed.
Moves between TCP/IP stacks based on execution of the MODDVIPA utility.
Used with Sysplex Distributor as a cluster IP address that represents a cluster of equal server instances in the Sysplex.
From a routing perspective it belongs to one TCP/IP stack.
From an application perspective it is distributed among the TCP/IP stacks in the Sysplex where an instance of the server
application is executing.
Page 33
Either because the application needs exclusive access to certain resources, or because
there is no need to start it in more than one instance.
Availability from an IP perspective then becomes an issue of being able to restart the
application on the same LPAR or on another LPAR with as little impact to end-users as
possible.
10.1.1.1
10.1.1.1
cicsappl
1
Restart application
cicsappl
1
Application-specific
dynamic VIPA
addresses come in
very handy for this
purpose.
Connect to 10.1.1.1
Use 10.1.1.1
DNS
cicsappl1.mycom.com
:
10.1.1.1
Page 34
Either
1 Resolve cicsappl1.mycom.com
2 connect to returned address
or
Resolve cicsappl1.mycom.com
3
4
2015 SHARE and IBM Corporation
Performance
Workload management across a cluster of server
instances
One server instance on one hardware node may not
be sufficient to handle all the workload
Server Cluster
Server
Availability
As long as one server instance is up-and-running, the
service is available
Individual server instances and associated hardware
components may fail without impacting overall
availability
Data
Load
Balancing
decision
maker
Server
Server
Server
Data
Mirroring w.
HyperSwap
Coupling
Facility
Feedback
loop
In order for the load balancing decision maker
to meet those objectives, it must be capable of
obtaining feedback dynamically, such as server
instance availability, capacity, performance,
and overall health.
2015 SHARE and IBM Corporation
App2
PortSharing
It makes a decision when it sees an inbound SYN segment for one of the Distributed Dynamic VIPA
(DDVIPA) IP address/port combinations it load balances for
SD
Sysplex Distributor uses MAC-level forwarding when connection routing takes place over XCF
Sysplex Distributor uses GRE when connection routing takes place over any network between
the z/OS images
WLM
All inbound packets for a distributed connection must be routed through the Sysplex Distributor
LPAR
Only the Sysplex Distributor LPAR advertises routing ownership for a DDVIPA, so downstream
routers will forward all inbound packets for a given DDVIPA to the distributing LPAR
All outbound packets from the server instances can take whatever route is most optimal from the
server instance node back to the client
App3
App4
PortSharing
Port sharing
PORTSHARING can be used within a z/OS node to distribute connections among multiple
server address spaces within that z/OS node
Page 37
SHAREPORT TCP/IP Server Efficiency Factor (SEF) value used to perform a weighted round robin
distribution to the server instances
SHAREPORTWLM WLM input is used to select server for new connection
2015 SHARE and IBM Corporation
WEIGHTEDACTIVE
Incoming connections are distributed so the available server instances percentage of active
connections match specified weights
SERVERWLM
Similar to BASEWLM but takes into account WLM service class and how well individual application
servers are performing (i.e. meeting specified WLM goals) and how much CPU capacity is available
for the specific workload being load balanced
Enhanced to account for WLM provided server health
Supports autonomic TCP/IP health detection metrics
Generally, the recommended distribution method for Sysplex Distributor
Page 38
DB2
Preferred
CICS
server
Backup
CICS
server
Sysplex
Distributor
Page 39
Target
Client
SD
Target
TCP
Client
Lower SEF
SD
Target
New TCP
Connections
accept()
TCP
Page 41
Higher SEF
Server
Application
2015 SHARE and IBM Corporation
z/OS
WLM
Transaction Service Class
Server Specific Capacity
Abnormal Terminations
CICS
SD
TCPIP
Page 43
WLM instumented
and managed
TCPIP
TCPIP
DB2
WLM
STC Service Class
Server Specific Capacity
Health Status
2
Connector
address
space
z/OS
EIS
WLM instrumented
and managed
Target Server
Responsiveness
(TSR) and
subcomponents
(applied to WLM
weight)
WLM Information:
Raw Weights,
Proportional
Weights, Abnormal
Transaction Rate
and Midleware
reported health
15:35:26
Rdy TotalConn
WLM TSR
Flg
-----------
----- ------------
--- ---------
--- ---
---
201.2.10.14
00244 201.3.10.16
001 0002304546 12
080
DistMethod: ServerWLM
TCSR: 100
CER: 095
SEF: 080
Weight: 58
Raw
Health: 100
ActConn:
0000000101
QosPlcAct:
*DEFAULT*
201.2.10.14
W/Q: 01
00244 201.3.10.17
001 0001543454 10
100
DistMethod: ServerWLM
TCSR: 100
CER: 100
SEF: 100
Weight: 40
Raw
Page 44
Health: 100
ActConn:
0000000030
QosPlcAct:
*DEFAULT*
W/Q: 01
Server instance
performance as
seen by WLM
Server instance
self-perceived
health (as
reported to
WLM)
SD ROUNDROBIN
No
No
No
SD WEIGHTEDACTIVE
No
No
Yes
Yes
No
SD BASEWLM
Yes
No
No
Yes
Yes
SD SERVERWLM
Yes
Yes
Yes
Yes
Yes
No
No
No
No
No
Yes
Yes
No
Technology
SD TARGETCONTROLLED
SD HOTSTANDBY
Yes
(SD agent)
No
Server instance
TCP/IP
perceived
health (the TSR
value)
Yes
(if TSR=zero)
QoS perceived
network
performance
(the QoS
fraction)
No
Yes
PORT SHAREPORT
No
No
No
(Only SEF
value)
No
Yes
PORT SHAREPORTWLM
Page 45
No
Yes
Yes
(Only SEF
value)
No
Sysplex
z/OS LPAR
CICS
Region
V
I
P
A
Advertised
Dynamic
TCP/IP
VIPA
HTTP
Distributing
Stack
V
I
P
A
XCF
HTTP Client
Port
sharing
Coupling
Facility
XCF
Target Stack 1
z/OS LPAR
V
I
P
A
Target Stack 2
CICS
Region
Port
sharing
Page 46
LPAR
Routing
region
Listener
region
1.
Distributing
Stack
V
I
P
A
CSKL
givesocket
AOR
region
Child
Mirror
takesocket Server
2.
START
RETRIEVE
Txn
DPL
3
socket
LPAR
Routing
region
Listener
region
CSKL
Child
Server
Txn
AOR
region
Mirror
CICS Sockets
Child server transaction can be defined in a remote CICS region
CICS dynamic routing can be used to route remote START to AOR
Routing region must be on the same LPAR and share the same TCP/IP stack
Can exploit TCP/IP port sharing or Sysplex Distributor
Page 47
Client regions
LPAR 1
CICS B
IPIC
Syplex
Distributor
1.2.3.4
TCPIPSERVICE
(Generic)
1.2.3.4
Static IP
1.2.3.9
TCPIPSERVICE
(Specific)
1.2.3.9
CICS 1
1.2.3.4
CICS A
DVIPA
LPAR 2
Reconnect
on failure
1.2.3.4
TCPIPSERVICE
(Generic)
1.2.3.4
Static IP
1.2.3.8
TCPIPSERVICE
(Specific)
1.2.3.8
CICS 2
Sysplex
TLS
server
TLS
client
TLS
session
IP network
TLS/SSL
encryption:
SrcIP
DestIP
SrcPort
DestPort
Data
192.168.100.1
192.168.1.1
50002
443
@%$#*&&^^!:"J)*GVM><
** For our purposes, SSL and TLS are equivalent and one term implies the other
Page 50
TCP connection
appl
(client)
appl
(server)
Handshake messages
Page 51
appl
(client)
appl
(server)
TLS session
TLS
Encrypted
Applications
TLS/SSL
System SSL API
Sockets
Sockets
TCP
TCP
IP Networking Layer
Network Interfaces
Page 52
IP Networking Layer
Network
Network Interfaces
AT-TLS
policy
Application transparency
Can be fully transparent to application
An optional API allows applications to inspect or control
certain aspects of AT-TLS processing applicationaware and application-controlled AT-TLS, respectively
Transport (TCP)
AT-TLS
System SSL
encrypted
Sockets API
z/OS CS Policy
infrastructure
AT-TLS policy
administrator
using
Configuration
Assistant
Networking
IPv4, IPv6
DLC
Page 54
Basic
Policy enables AT-TLS for application traffic
Application is unchanged and unaware of AT-TLS
Application protocol unaffected by use of AT-TLS (think HTTP vs. HTTPS)
Aware
Policy enables AT-TLS for application traffic
Application uses the SIOCTTLSCTL ioctl to extract AT-TLS information such as
partner certificate, negotiated version and cipher, policy status, etc.
Controlling
Policy enables AT-TLS and specifies ApplicationControlled ON for application
traffic
Application protocol may negotiate the use of TLS in cleartext with its partner
Application uses the SIOCTTLSCTL ioctl to extract AT-TLS information (like an
aware application) and to control TLS operations:
Start secure session
Reset session
Reset cipher
Page 57
Page 58
AT-TLS
IPSec and IP filtering
IDS
Quality of Service
Policy-based routing
Page 60
Describe traffic
Page 61
Page 62
Define key ring in this case use the z/OS image level key ring
Page 63
Page 64
Option to limit the number of persistent connections from web clients that
are allowed on a port (at any one time)
Default is NO
66
Page 66
67
Page 67
Region A
Running
Task
Running
Task
P
or
t
S
pr
ay
Region B
TCPIPSERVICE
<MAXPERSIST> 1
<CONNECTIONS> 2
1
Running
Task
Running Task
6. The task handles a closed
connection.
Running
Task
68
Page 68
Non-zero value means HTTP requests using that URIMAP can use connections
(sockets) from a pool
SOCKETCLOSE is timeout time for length of time socket remains available for
reuse from the pool
Socket will be removed from pool if errors returned, or if any problems are
detected
69
Page 69
70
Page 70
URIMAP
SocketClose>0
Sockets Domain
0..1
Socket Pool
<Timeout>
Socket Pool
<Chain>
<Timeout>
<Count>
<Chain>
<Count> 1
Socket
Connected
71
Page 71
Sockets Domain
URIMAP
SocketClose>0
0..1
Socket Pool
<Timeout>
Socket Pool
<Chain>
<Timeout>
<Count>
<Chain>
<Count> 0
1. Create a connection
Task
Socket
Connected
2. Socket owned by
task. No longer in pool
72
Page 72
Sockets Domain
URIMAP
SocketClose>0
0..1
Socket Pool
<Timeout>
Socket Pool
<Chain>
<Timeout>
<Count>
<Chain>
<Count> 0
Task
Socket
Error
URIMAP
SocketClose>0
Task
Sockets Domain
0..1
Socket Pool
<Timeout>
Socket Pool
<Chain>
<Timeout>
<Count>
<Chain>
<Count> 1
Socket
Connected
74
Page 74
Page 75
CWXN
Long running task on its own
TCB that listens for work.
User Transaction
i.e. CWBA, CPIH
Page 76
CWXN
Long running task on its own
TCB. It must not be blocked
by an individual request.
If CICS SSL OR
Web analyser program OR
Static response OR
Not enough data => CWXN
Gets tran ID and user ID from
URIMAP and/or AT-TLS
Start the application
transaction with the specific
tranid and userid
Run when
unable to
establish
context
in SOLS
Lower overhead
results in lower
CPU usage
User Transaction
i.e. CWBA, CPIH
Page 77
CWXN
Long running task on its own
TCB. It must not be blocked
by an individual request.
If CICS SSL
User Transaction
i.e. CWBA, CPIH
Decryption
Page 78
Page 79
Thank you!
Page 80
Appendix Backup
Page 81
Page 82
Page 83
Page 84
Page 85
==>
==>
==>
==>
==>
==>
==>
==>
==>
If you want a display of all your CICS Socket connections, leave all
selection fields above blank.
Page 86
Remote
client
LISTENER
TakeSocket()
Connected
Socket (taken)
Accept()
TAKEN
Connected
Socket (given)
GiveSocket()
GIVEN
Connected
Socket (given)
CONNECT
Remote
server
Connected
Socket
CICS
Page 87