Library View Topics Framed Contents Revised Topics Previous Topic Next Topic Search Search ResultsPrevious Topic MatchNext Topic Match Notes List Notes Print Download No PDF Handheld DisconnectedHandheld ConnectedHelp
Title: CICS Application Programming Guide
Document Number: SC33-1687-30
Build Date: 09/24/99 23:32:50 Build Version: 1.3.0
Document Path: /home/webapps/epubs/htdocs/book/dfhjap32.boo

CONTENTS Table of Contents




Summarize

COVER         Book Cover 

ABSTRACT      Abstract 

CONTENTS      Table of Contents 

FIGURES       Figures 

TABLES        Tables 

FRONT_1       Notices 

PREFACE       Preface 

FRONT_2       Bibliography 
FRONT_2.1     CICS Transaction Server for OS/390 
FRONT_2.2     Books from related libraries 
FRONT_2.3     Determining if a publication is current 

CHANGES       Summary of Changes 
CHANGES.1     Changes for this CICS Transaction Server for OS/390 Release 3 edition 
CHANGES.2     Changes for this CICS Transaction Server for OS/390 Release 2 edition 
CHANGES.3     Changes for the CICS Transaction Server for OS/390 Release 1 edition 

1.0           Part 1.  Getting started 

1.1           Chapter 1.  Preparing your application to run 
1.1.1         Writing CICS programs 
1.1.2         Preparing your program 
1.1.3         Locale support 
1.1.4         The translation process 
1.1.5         Copybooks 
1.1.6         Specifying translator options 
1.1.7         Translator options 
1.1.8         EXEC interface stubs 
1.1.9         Preparing BMS maps 

1.2           Chapter 2.  Programming in COBOL 
1.2.1         Based addressing 
1.2.2         Mixing languages 
1.2.3         Calling subprograms from COBOL 
1.2.4         COBOL with the ANSI 85 COBOL standards 
1.2.5         Literals intervening in blank lines 
1.2.6         Sequence numbers containing any character 
1.2.7         REPLACE statement 
1.2.8         Batch compilation 
1.2.9         Nested programs 
1.2.10        Reference modification 
1.2.11        Global variables 
1.2.12        Comma and semicolon as delimiters 
1.2.13        Symbolic character definition 
1.2.14        Summary of restrictions 
1.2.15        COBOL2 translator option 
1.2.16        COBOL3 translator option 
1.2.17        OO COBOL translator option 

1.3           Chapter 3.  Programming in C and C++ 
1.3.1         Data declarations needed for C and C++ 
1.3.2         Naming EIB fields 
1.3.3         Restrictions 
1.3.4         C++ considerations 

1.4           Chapter 4.  Programming in PL/I 
1.4.1         Restrictions 
1.4.2         PL/I STAE execution-time option 
1.4.3         OPTIONS(MAIN) specification 
1.4.4         PL/I and dynamic storage 

1.5           Chapter 5.  Programming in Assembler 
1.5.1         Compilers supported 
1.5.2         Restrictions for 31-bit addressing 
1.5.3         MVS restrictions 

1.6           Chapter 6.  Language Environment 
1.6.1         Levels of support in Language Environment 
1.6.2         Abend handling in an LE environment 
1.6.3         Defining run-time options 

2.0           Part 2.  Object Oriented programming in CICS 

2.1           Chapter 7.  Object Oriented (OO) programming concepts 
2.1.1         What is OO? 
2.1.2         OO Terminology 
2.1.3         Accessing CICS services from OO programs 

2.2           Chapter 8.  Programming in Java 
2.2.1         The JCICS Java classes 
2.2.2         JCICS programming considerations 
2.2.3         Using JCICS 

2.3           Chapter 9.  JCICS sample programs 
2.3.1         Supplied sample components 
2.3.2         Building the Java samples 
2.3.3         Building the CICS native applications 
2.3.4         Running the Hello World sample 
2.3.5         Running the Program Control sample 
2.3.6         Running the TDQ sample 
2.3.7         Running the TSQ sample 

2.4           Chapter 10.  Support for VisualAge for Java, Enterprise ToolKit for OS/390 
2.4.1         Building a CICS Java program 
2.4.2         Running a CICS Java program 

2.5           Chapter 11.  Using the CICS Java virtual machine 
2.5.1         JVM execution environment 
2.5.2         Running JVM programs 
2.5.3         JCICS programming considerations for JVM programs 
2.5.4         Using the Abstract Windows Toolkit (AWT) classes 

3.0           Part 3.  Application design 

3.1           Chapter 12.  Designing efficient applications 
3.1.1         Program structure 
3.1.2         General programming techniques 
3.1.3         Storing data within a transaction 
3.1.4         Lengths of areas passed to CICS commands 
3.1.5         Temporary storage 
3.1.6         Intrapartition transient data 
3.1.7         GETMAIN SHARED command 
3.1.8         Your own data sets 
3.1.9         Data operations 
3.1.10        Terminal operations 

3.2           Chapter 13.  Sharing data across transactions 
3.2.1         Common work area (CWA) 
3.2.2         TCTTE user area (TCTUA) 
3.2.3         COMMAREA in RETURN commands 
3.2.4         Display screen 

3.3           Chapter 14.  Affinity 
3.3.1         What is affinity? 
3.3.2         Techniques used by CICS application programs to pass data 
3.3.3         Safe programming techniques 
3.3.4         Unsafe programming techniques 
3.3.5         Suspect programming techniques 
3.3.6         Detecting inter-transaction affinities 
3.3.7         Duration and scope of inter-transaction affinities 
3.3.8         Recommendations 

3.4           Chapter 15.  Using CICS documents 
3.4.1         The DOCUMENT application programming interface 
3.4.2         Programming with documents 

3.5           Chapter 16.  Using named counter servers 
3.5.1         Overview 
3.5.2         Named counter pools 
3.5.3         The named counter API commands 
3.5.4         The named counter CALL interface 

3.6           Chapter 17.  Intercommunication considerations 
3.6.1         Design considerations 
3.6.2         Transaction routing 
3.6.3         Function shipping 
3.6.4         Distributed program link (DPL) 
3.6.5         Asynchronous processing 
3.6.6         Distributed transaction processing (DTP) 
3.6.7         Common Programming Interface Communications (CPI Communications) 
3.6.8         External CICS interface (EXCI) 

3.7           Chapter 18.  Recovery considerations 
3.7.1         Journaling 
3.7.2         Syncpointing 

3.8           Chapter 19.  Minimizing errors 
3.8.1         Protecting CICS from application errors 
3.8.2         Testing applications 

3.9           Chapter 20.  Dealing with exception conditions 
3.9.1         Default CICS exception handling 
3.9.2         Handling exception conditions by in-line code 
3.9.3         Modifying the default CICS exception handling 

3.10          Chapter 21.  Access to system information 
3.10.1        System programming commands 
3.10.2        EXEC interface block (EIB) 

3.11          Chapter 22.  Abnormal termination recovery 
3.11.1        Creating a program-level abend exit 
3.11.2        Restrictions on retrying operations 
3.11.3        Trace 
3.11.4        Monitoring 
3.11.5        Dump 

4.0           Part 4.  Files and databases 

4.1           Chapter 23.  An overview of file control 
4.1.1         VSAM data sets 
4.1.2         BDAM data sets 
4.1.3         CICS shared data tables 
4.1.4         Coupling facility data tables 
4.1.5         Comparison of different techniques for sharing data 
4.1.6         Reading records 
4.1.7         Updating records 
4.1.8         Deleting records 
4.1.9         Adding records 
4.1.10        Review of file control command options 
4.1.11        Avoiding transaction deadlocks 
4.1.12        KEYLENGTH option for remote data sets 

4.2           Chapter 24.  File control--VSAM considerations 
4.2.1         Record identification 
4.2.2         Locking of VSAM records in recoverable files 
4.2.3         Record locking of VSAM records for files accessed in RLS mode 
4.2.4         Conditional update requests 
4.2.5         CICS locking for writing to ESDS 

4.3           Chapter 25.  File control--BDAM considerations 
4.3.1         Record identification 
4.3.2         Updating records from BDAM data sets 
4.3.3         Browsing records from BDAM data sets 
4.3.4         Adding records to BDAM data sets 
4.3.5         BDAM exclusive control 

4.4           Chapter 26.  Database control 
4.4.1         DL/I databases 
4.4.2         DATABASE 2 (DB2) databases 

5.0           Part 5.  Data communication 

5.1           Chapter 27.  Introduction to data communication 
5.1.1         Basic CICS terms 
5.1.2         How tasks are started 
5.1.3         Which transaction? 
5.1.4         CICS APIs for terminals 
5.1.5         Topics elsewhere in this book 
5.1.6         Where to find more information 

5.2           Chapter 28.  The 3270 family of terminals 
5.2.1         Background 
5.2.2         The 3270 buffer 
5.2.3         3270 display data: defining 3270 fields 
5.2.4         Input from a 3270 terminal 
5.2.5         Unformatted mode 

5.3           Chapter 29.  Basic mapping support 
5.3.1         Other sources on BMS 
5.3.2         Sending mapped output: basics 
5.3.3         Receiving data from a display 
5.3.4         Support for non-3270 terminals 
5.3.5         The MAPPINGDEV facility 
5.3.6         Block data 
5.3.7         Sending mapped output: additional facilities 
5.3.8         Page formation: the ACCUM option 
5.3.9         Floating maps: how BMS places maps using ACCUM 
5.3.10        Formatting text output 
5.3.11        Message routing: the ROUTE command 
5.3.12        Using SET 
5.3.13        Partition support 
5.3.14        Logical device components 
5.3.15        BMS support for other special hardware 

5.4           Chapter 30.  Terminal control 
5.4.1         Access method support 
5.4.2         Terminal control commands 
5.4.3         VTAM considerations 
5.4.4         Sequential terminal support 
5.4.5         TCAM considerations 
5.4.6         Batch data interchange 

5.5           Chapter 31.  CICS support for printing 
5.5.1         Formatting for CICS printers 
5.5.2         CICS printers: getting the data to the printer 
5.5.3         Non-CICS printers 
5.5.4         Printing display screens 

5.6           Chapter 32.  CICS interface to JES 
5.6.1         Creating a spool file 

6.0           Part 6.  CICS management functions 

6.1           Chapter 33.  Interval control 
6.1.1         Expiration times 
6.1.2         Request identifiers 

6.2           Chapter 34.  Task control 
6.2.1         Controlling sequence of access to resources 

6.3           Chapter 35.  Program control 
6.3.1         Application program logical levels 
6.3.2         Link to another program expecting return 
6.3.3         Passing data to other programs 

6.4           Chapter 36.  Storage control 
6.4.1         Overview of CICS storage protection and transaction isolation 
6.4.2         Storage protection 
6.4.3         Deciding what execution and storage key to specify 
6.4.4         Storage protection exception conditions 
6.4.5         Transaction isolation 
6.4.6         Using transaction isolation 
6.4.7         MVS subspaces 

6.5           Chapter 37.  Transient data control 
6.5.1         Intrapartition queues 
6.5.2         Extrapartition queues 
6.5.3         Indirect queues 
6.5.4         Automatic transaction initiation (ATI) 

6.6           Chapter 38.  Temporary storage control 
6.6.1         Temporary storage queues 
6.6.2         Typical uses of temporary storage control 

6.7           Chapter 39.  Security control 
6.7.1         QUERY SECURITY command 
6.7.2         Non-terminal transaction security 

7.0           Part 7.  Testing applications 

7.1           Chapter 40.  Testing applications: the process 
7.1.1         Preparing the application and system table entries 
7.1.2         Preparing the system for debugging 
7.1.3         Single-thread testing 
7.1.4         Multithread testing 
7.1.5         Regression testing 

7.2           Chapter 41.  Execution diagnostic facility (EDF) 
7.2.1         Getting started 
7.2.2         Where does EDF intercept the program? 
7.2.3         What does EDF display? 
7.2.4         How to use EDF 
7.2.5         Security considerations 

7.3           Chapter 42.  Temporary storage browse (CEBR) 
7.3.1         How to use the CEBR transaction 
7.3.2         What does the CEBR transaction display? 
7.3.3         The CEBR commands 
7.3.4         Using the CEBR transaction with transient data 
7.3.5         Security considerations 

7.4           Chapter 43.  Command-level interpreter (CECI) 
7.4.1         How to use CECI 
7.4.2         What does CECI display? 
7.4.3         Additional displays 
7.4.4         Making changes 
7.4.5         How CECI runs 
7.4.6         Security considerations 

APPENDIX1     Part 8.  Appendixes 

APPENDIX1.1   Appendix A.  CICS commands and their equivalent obsolete macros 

APPENDIX1.2   Appendix B.  OS/VS COBOL 
APPENDIX1.2.1 Translator options 
APPENDIX1.2.2 Programming restrictions 
APPENDIX1.2.3 Converting to VS COBOL II 
APPENDIX1.2.4 Bibliography 

INDEX         Index 


Previous Topic Next Topic © Copyright IBM Corp. 1989, 1999

IBM Library Server Copyright 1989, 2005 IBM Corporation. All rights reserved.