



Title: IMS Version 7 Application Programming: Design Guide
Document Number: SC26-9423-00
Build Date: 08/18/00 15:40:23 Build Version: 1.3.0
Document Path: /home/webapps/epubs/htdocs/book/dfsp10e0.boo
CONTENTS Table of Contents
Summarize
COVER Book Cover
NOTICES Notices
EDITION Edition Notice
CONTENTS Table of Contents
FIGURES Figures
TABLES Tables
FRONT_1 Notices
FRONT_1.1 Programming Interface Information
FRONT_1.2 Trademarks
FRONT_1.3 Product Names
FRONT_2 Preface
FRONT_2.1 Linking to Related Information in IMS Publications
FRONT_2.2 Summary of Contents
FRONT_2.3 Prerequisite Knowledge
FRONT_2.4 How to Use This Book
FRONT_2.5 Syntax Diagrams
FRONT_2.6 How to Send Your Comments
CHANGES Summary of Changes
CHANGES.1 Changes to This Book for IMS Version 7
CHANGES.2 Library Changes for IMS Version 7
1.0 Concepts and Terminology
1.1 Storing and Processing Information in a Database
1.1.1 Storing Data in Separate Files
1.1.2 Storing Data in a Combined File
1.1.3 Storing Data in a Database
1.1.4 Database Hierarchies
1.1.5 Your Program's View of the Data
1.1.6 Processing a Database Record
1.2 A Look at the Tasks Ahead of You
1.2.1 Designing the Application
1.2.2 Developing Specifications
1.2.3 Implementing the Design
2.0 Introduction to Application Design
2.1 An Overview of Application Design
2.2 Identifying Application Data
2.2.1 Listing Data Elements
2.2.2 Naming Data Elements
2.2.3 Documenting Application Data
2.3 Designing a Local View
2.3.1 Analyzing Data Relationships
2.3.2 Local View Examples
3.0 Analyzing IMS Application Processing Requirements
3.1 Your Application's Requirements
3.2 The Database Your Program Accesses
3.3 Accessing Data: The Types of Programs You Can Write
3.3.1 DB Batch Processing
3.3.2 TM Batch Processing
3.3.3 Processing Messages: MPPs
3.3.4 Processing Messages: IFPs
3.3.5 Batch Message Processing: BMPs
3.4 Programming Integrity and Recovery Considerations
3.4.1 How IMS Protects Data Integrity: Commit Points
3.4.2 Planning for Program Recovery: Checkpoint and Restart
3.4.3 Data Availability Considerations
3.4.4 Use of STAE or ESTAE and SPIE in IMS Programs
3.5 Dynamic Allocation for IMS Databases
4.0 Analyzing CICS Application Processing Requirements
4.1 Your Application's Requirements
4.2 The Database Your Program Accesses
4.3 Writing a Program to Access IMS Databases: The Types of Programs
4.3.1 Writing a CICS Online Program
4.3.2 Writing an IMS Batch Program
4.3.3 Writing a Batch-Oriented BMP Program
4.4 Using Data Sharing
4.5 Scheduling and Terminating a PSB (CICS Online Programs Only)
4.6 Linking and Passing Control to Other Programs (CICS Online Programs Only)
4.7 Maximizing the Performance of Your CICS System
4.8 Programming Integrity and Database Recovery Considerations
4.8.1 How IMS Protects Data Integrity for Your Program (CICS Online Programs)
4.8.2 Recovering Databases Accessed by Batch and BMP Programs
4.9 Data Availability Considerations
4.9.1 Unavailability of a Database
4.9.2 Unavailability of Some Data in a Database
4.9.3 The SETS or SETU and ROLS Functions
4.10 Use of STAE or ESTAE and SPIE in IMS Batch Programs
4.11 Dynamic Allocation for IMS Databases
5.0 Gathering Requirements for Database Options
5.1 Analyzing Data Access
5.1.1 Direct Access
5.1.2 Sequential Access
5.1.3 Accessing MVS Files through IMS: GSAM
5.1.4 Accessing IMS Data through MVS: SHSAM and SHISAM
5.2 Understanding How Data Structure Conflicts Are Resolved
5.2.1 Using Different Fields: Field-Level Sensitivity
5.2.2 Resolving Processing Conflicts in a Hierarchy: Secondary Indexing
5.2.3 Creating a New Hierarchy: Logical Relationships
5.3 Providing Data Security
5.3.1 Providing Data Availability
5.3.2 Keeping a Program from Accessing the Data: Data Sensitivity
5.3.3 Preventing a Program from Updating Data: Processing Options
5.4 Read without Integrity -- What It Means
5.4.1 Read without Integrity
5.4.2 What It Means
5.4.3 Data Set Extensions
6.0 Gathering Requirements for Message Processing Options
6.1 Identifying Online Security Requirements
6.1.1 Limiting Access to Specific Individuals: Signon Security
6.1.2 Limiting Access for Specific Terminals: Terminal Security
6.1.3 Limiting Access to the Program: Password Security
6.1.4 Allowing Access to Security Data: Authorization Security
6.1.5 How IMS Security Relates to DB2 Security
6.1.6 Supplying Security Information
6.2 Analyzing Screen and Message Formats
6.2.1 An Overview of MFS
6.2.2 An Overview of Basic Edit
6.2.3 Editing Considerations in Your Application
6.3 Gathering Requirements for Conversational Processing
6.3.1 What Happens in a Conversation
6.3.2 Designing a Conversation
6.3.3 Important Points about the SPA
6.4 Identifying Output Message Destinations
6.4.1 The Originating Terminal
6.4.2 To Other Programs and Terminals
7.0 Application Design for APPC
7.1 Overview of APPC and LU 6.2
7.2 Application Program Types
7.2.1 Standard DL/I Application Program
7.2.2 Modified Standard DL/I Application Program
7.2.3 CPI Communications Driven Program
7.3 Application Objectives
7.4 Choosing Conversation Attributes
7.4.1 Synchronous Conversation
7.4.2 Asynchronous Conversation
7.4.3 MSC Synchronous and Asynchronous Conversation
7.5 Conversation Type
7.6 Conversation State
7.7 Synchronization Level
7.8 Distributed Sync Point
7.8.1 Concepts
7.8.2 Impact on the Network
7.9 Application Programming Interface for LU Type 6.2
7.9.1 Implicit API
7.9.2 Explicit API
7.10 LU 6.2 Partner Program Design
7.10.1 LU 6.2 Flow Diagrams
7.10.2 Integrity Tables
7.10.3 DFSAPPC Message Switch
8.0 Writing ODBA Application Programs
8.1 General Application Program Flow
8.1.1 Establish the Application Execution Environment
8.1.2 Allocate a PSB
8.1.3 Perform DB Calls
8.1.4 Commit Changes
8.1.5 Deallocate the PSB
8.1.6 Terminate the Connection
8.2 Server Program Structure
8.3 DB2 Stored Procedures Use of ODBA
9.0 Testing an IMS Application Program
9.1 What You Need to Test a Program
9.2 Testing DL/I Call Sequences (DFSDDLT0)
9.3 Using BTS II to Test Your Program
9.4 Tracing DL/I Calls with Image Capture
9.4.1 Using Image Capture with DFSDDLT0
9.4.2 Restrictions on Using Image Capture Output
9.4.3 Running Image Capture Online
9.4.4 Running Image Capture as a Batch Job
9.4.5 Retrieving Image Capture Data from the Log Data Set
9.5 Requests for Monitoring and Debugging
9.5.1 Retrieving Database Statistics: The STAT Call
9.5.2 Writing Information to the System Log: The LOG Request
9.6 What to Do When Your Program Terminates Abnormally
9.6.1 If You Have a Problem
9.6.2 Finding the Problem
10.0 Testing a CICS Application Program
10.1 What You Need to Test a Program
10.2 Testing Your Program
10.2.1 Using the Execution Diagnostic Facility (Command-Level Only)
10.2.2 Using CICS Dump Control
10.2.3 Using CICS Trace Control
10.2.4 Using the DL/I Test Program (DFSDDLT0)
10.2.5 Tracing DL/I Calls with Image Capture
10.3 Requests for Monitoring and Debugging
10.4 What to Do When Your Program Terminates Abnormally
10.4.1 If You Have a Problem
10.4.2 Finding the Problem
11.0 Testing an ODBA Application Program
11.1 Using the DL/I Test Program (DFSDDLT0)
11.2 Tracing DL/I Calls with Image Capture
11.3 Using Image Capture with DFSDDLT0
11.4 Running Image Capture Online
11.5 Retrieving Image Capture Data from the Log Data Set
11.6 Requests for Monitoring and Debugging
11.7 What to Do When Your Program Terminates Abnormally
11.7.1 If You Have a Problem
11.7.2 Finding the Problem
12.0 Documenting an Application Program
12.1 Documentation for Other Programmers
12.2 Documentation for Users
A.0 Appendix A. IMS Spool API Overall Design
A.1 Design Concept
A.1.1 Start Up
A.2 Performance Considerations
A.2.1 JES Initiator Considerations
A.2.2 Application Managed Text Units
A.2.3 BSAM I/O Area
A.3 Application Coding Considerations
A.3.1 Print Data Formats
A.3.2 Message Integrity Options
BIBLIOGRAPHY Bibliography
BIBLIOGRAPHY.1 IMS Version 7 Library
INDEX Index
BACK_1 We'd Like to Hear from You
COMMENTS Readers' Comments
© Copyright IBM Corp. 1974, 2000
IBM Library Server Copyright 1989, 2005 IBM Corporation. All rights reserved.