Library View Topics Framed Contents Revised Topics Previous Topic Next Topic Search Search ResultsPrevious Topic MatchNext Topic Match Notes List Notes Print Download Download PDF Handheld DisconnectedHandheld ConnectedHelp
Title: IMS Version 7 Application Programming: Design Guide
Document Number: SC26-9423-00
Build Date: 08/18/00 15:40:23 Build Version: 1.3.0
Document Path: /home/webapps/epubs/htdocs/book/dfsp10e0.boo

CONTENTS Table of Contents




Summarize

COVER         Book Cover 

NOTICES       Notices 

EDITION       Edition Notice 

CONTENTS      Table of Contents 

FIGURES       Figures 

TABLES        Tables 

FRONT_1       Notices 
FRONT_1.1     Programming Interface Information 
FRONT_1.2     Trademarks 
FRONT_1.3     Product Names 

FRONT_2       Preface 
FRONT_2.1     Linking to Related Information in IMS Publications 
FRONT_2.2     Summary of Contents 
FRONT_2.3     Prerequisite Knowledge 
FRONT_2.4     How to Use This Book 
FRONT_2.5     Syntax Diagrams 
FRONT_2.6     How to Send Your Comments 

CHANGES       Summary of Changes 
CHANGES.1     Changes to This Book for IMS Version 7 
CHANGES.2     Library Changes for IMS Version 7 

1.0           Concepts and Terminology 
1.1           Storing and Processing Information in a Database 
  1.1.1         Storing Data in Separate Files 
  1.1.2         Storing Data in a Combined File 
  1.1.3         Storing Data in a Database 
  1.1.4         Database Hierarchies 
  1.1.5         Your Program's View of the Data 
  1.1.6         Processing a Database Record 
1.2           A Look at the Tasks Ahead of You 
  1.2.1         Designing the Application 
  1.2.2         Developing Specifications 
  1.2.3         Implementing the Design 

2.0           Introduction to Application Design 
2.1           An Overview of Application Design 
2.2           Identifying Application Data 
  2.2.1         Listing Data Elements 
  2.2.2         Naming Data Elements 
  2.2.3         Documenting Application Data 
2.3           Designing a Local View 
  2.3.1         Analyzing Data Relationships 
  2.3.2         Local View Examples 

3.0           Analyzing IMS Application Processing Requirements 
3.1           Your Application's Requirements 
3.2           The Database Your Program Accesses 
3.3           Accessing Data: The Types of Programs You Can Write 
  3.3.1         DB Batch Processing 
  3.3.2         TM Batch Processing 
  3.3.3         Processing Messages: MPPs 
  3.3.4         Processing Messages: IFPs 
  3.3.5         Batch Message Processing: BMPs 
3.4           Programming Integrity and Recovery Considerations 
  3.4.1         How IMS Protects Data Integrity: Commit Points 
  3.4.2         Planning for Program Recovery: Checkpoint and Restart 
  3.4.3         Data Availability Considerations 
  3.4.4         Use of STAE or ESTAE and SPIE in IMS Programs 
3.5           Dynamic Allocation for IMS Databases 

4.0           Analyzing CICS Application Processing Requirements 
4.1           Your Application's Requirements 
4.2           The Database Your Program Accesses 
4.3           Writing a Program to Access IMS Databases: The Types of Programs 
  4.3.1         Writing a CICS Online Program 
  4.3.2         Writing an IMS Batch Program 
  4.3.3         Writing a Batch-Oriented BMP Program 
4.4           Using Data Sharing 
4.5           Scheduling and Terminating a PSB (CICS Online Programs Only) 
4.6           Linking and Passing Control to Other Programs (CICS Online Programs Only) 
4.7           Maximizing the Performance of Your CICS System 
4.8           Programming Integrity and Database Recovery Considerations 
  4.8.1         How IMS Protects Data Integrity for Your Program (CICS Online Programs) 
  4.8.2         Recovering Databases Accessed by Batch and BMP Programs 
4.9           Data Availability Considerations 
  4.9.1         Unavailability of a Database 
  4.9.2         Unavailability of Some Data in a Database 
  4.9.3         The SETS or SETU and ROLS Functions 
4.10          Use of STAE or ESTAE and SPIE in IMS Batch Programs 
4.11          Dynamic Allocation for IMS Databases 

5.0           Gathering Requirements for Database Options 
5.1           Analyzing Data Access 
  5.1.1         Direct Access 
  5.1.2         Sequential Access 
  5.1.3         Accessing MVS Files through IMS: GSAM 
  5.1.4         Accessing IMS Data through MVS: SHSAM and SHISAM 
5.2           Understanding How Data Structure Conflicts Are Resolved 
  5.2.1         Using Different Fields: Field-Level Sensitivity 
  5.2.2         Resolving Processing Conflicts in a Hierarchy: Secondary Indexing 
  5.2.3         Creating a New Hierarchy: Logical Relationships 
5.3           Providing Data Security 
  5.3.1         Providing Data Availability 
  5.3.2         Keeping a Program from Accessing the Data: Data Sensitivity 
  5.3.3         Preventing a Program from Updating Data: Processing Options 
5.4           Read without Integrity -- What It Means 
  5.4.1         Read without Integrity 
  5.4.2         What It Means 
  5.4.3         Data Set Extensions 

6.0           Gathering Requirements for Message Processing Options 
6.1           Identifying Online Security Requirements 
  6.1.1         Limiting Access to Specific Individuals: Signon Security 
  6.1.2         Limiting Access for Specific Terminals: Terminal Security 
  6.1.3         Limiting Access to the Program: Password Security 
  6.1.4         Allowing Access to Security Data: Authorization Security 
  6.1.5         How IMS Security Relates to DB2 Security 
  6.1.6         Supplying Security Information 
6.2           Analyzing Screen and Message Formats 
  6.2.1         An Overview of MFS 
  6.2.2         An Overview of Basic Edit 
  6.2.3         Editing Considerations in Your Application 
6.3           Gathering Requirements for Conversational Processing 
  6.3.1         What Happens in a Conversation 
  6.3.2         Designing a Conversation 
  6.3.3         Important Points about the SPA 
6.4           Identifying Output Message Destinations 
  6.4.1         The Originating Terminal 
  6.4.2         To Other Programs and Terminals 

7.0           Application Design for APPC 
7.1           Overview of APPC and LU 6.2 
7.2           Application Program Types 
  7.2.1         Standard DL/I Application Program 
  7.2.2         Modified Standard DL/I Application Program 
  7.2.3         CPI Communications Driven Program 
7.3           Application Objectives 
7.4           Choosing Conversation Attributes 
  7.4.1         Synchronous Conversation 
  7.4.2         Asynchronous Conversation 
  7.4.3         MSC Synchronous and Asynchronous Conversation 
7.5           Conversation Type 
7.6           Conversation State 
7.7           Synchronization Level 
7.8           Distributed Sync Point 
  7.8.1         Concepts 
  7.8.2         Impact on the Network 
7.9           Application Programming Interface for LU Type 6.2 
  7.9.1         Implicit API 
  7.9.2         Explicit API 
7.10          LU 6.2 Partner Program Design 
  7.10.1        LU 6.2 Flow Diagrams 
  7.10.2        Integrity Tables 
  7.10.3        DFSAPPC Message Switch 

8.0           Writing ODBA Application Programs 
8.1           General Application Program Flow 
  8.1.1         Establish the Application Execution Environment 
  8.1.2         Allocate a PSB 
  8.1.3         Perform DB Calls 
  8.1.4         Commit Changes 
  8.1.5         Deallocate the PSB 
  8.1.6         Terminate the Connection 
8.2           Server Program Structure 
8.3           DB2 Stored Procedures Use of ODBA 

9.0           Testing an IMS Application Program 
9.1           What You Need to Test a Program 
9.2           Testing DL/I Call Sequences (DFSDDLT0) 
9.3           Using BTS II to Test Your Program 
9.4           Tracing DL/I Calls with Image Capture 
  9.4.1         Using Image Capture with DFSDDLT0 
  9.4.2         Restrictions on Using Image Capture Output 
  9.4.3         Running Image Capture Online 
  9.4.4         Running Image Capture as a Batch Job 
  9.4.5         Retrieving Image Capture Data from the Log Data Set 
9.5           Requests for Monitoring and Debugging 
  9.5.1         Retrieving Database Statistics: The STAT Call 
  9.5.2         Writing Information to the System Log: The LOG Request 
9.6           What to Do When Your Program Terminates Abnormally 
  9.6.1         If You Have a Problem 
  9.6.2         Finding the Problem 

10.0          Testing a CICS Application Program 
10.1          What You Need to Test a Program 
10.2          Testing Your Program 
  10.2.1        Using the Execution Diagnostic Facility (Command-Level Only) 
  10.2.2        Using CICS Dump Control 
  10.2.3        Using CICS Trace Control 
  10.2.4        Using the DL/I Test Program (DFSDDLT0) 
  10.2.5        Tracing DL/I Calls with Image Capture 
10.3          Requests for Monitoring and Debugging 
10.4          What to Do When Your Program Terminates Abnormally 
  10.4.1        If You Have a Problem 
  10.4.2        Finding the Problem 

11.0          Testing an ODBA Application Program 
11.1          Using the DL/I Test Program (DFSDDLT0) 
11.2          Tracing DL/I Calls with Image Capture 
11.3          Using Image Capture with DFSDDLT0 
11.4          Running Image Capture Online 
11.5          Retrieving Image Capture Data from the Log Data Set 
11.6          Requests for Monitoring and Debugging 
11.7          What to Do When Your Program Terminates Abnormally 
  11.7.1        If You Have a Problem 
  11.7.2        Finding the Problem 

12.0          Documenting an Application Program 
12.1          Documentation for Other Programmers 
12.2          Documentation for Users 

A.0           Appendix A.  IMS Spool API Overall Design 
A.1           Design Concept 
  A.1.1         Start Up 
A.2           Performance Considerations 
  A.2.1         JES Initiator Considerations 
  A.2.2         Application Managed Text Units 
  A.2.3         BSAM I/O Area 
A.3           Application Coding Considerations 
  A.3.1         Print Data Formats 
  A.3.2         Message Integrity Options 

BIBLIOGRAPHY  Bibliography 
BIBLIOGRAPHY.1 IMS Version 7 Library 

INDEX         Index 

BACK_1        We'd Like to Hear from You 

COMMENTS      Readers' Comments 


Previous Topic Next Topic © Copyright IBM Corp. 1974, 2000

IBM Library Server Copyright 1989, 2005 IBM Corporation. All rights reserved.