460 likes | 788 Vues
10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using Shadow Direct and Shadow Web Server by Rex Bowe. SHADOW ® Natural Conference Agenda. Who is NEON? Shadow Architecture Shadow Direct NEON Client Transaction Level Security ADABAS Interface
E N D
10th Natural ConferenceOctober 29, 2001High PerformanceWeb-enablement ofADABAS/NaturalusingShadowDirectandShadowWeb Serverby Rex Bowe
SHADOW®Natural Conference Agenda • Who is NEON? • Shadow Architecture • Shadow Direct • NEON Client • Transaction Level Security • ADABAS Interface • Natural Interface • Data Mapping Facility • Monitoring, Diagnostics, & Controls • Shadow Event Facility • Shadow Web Server for OS/390 • Live Demo
NEON SystemsCorporate Information SHADOW®Who is NEON? • Founded in 1991 • Rapid Market Acceptance • Profitable in Four Years • No debt • Acquisition Growth Model • NASDAQ (NESY)
SHADOW®NEON History • History of Shadow • Peter Schaffer @ Texaco in 1990 – Power Builder Environment • Developed from 1991 - 1994 • First customer in 1995 (BASF) • Formation of NEON Systems • Shadow Today • Active Development - V 4.8 Shipping End of Month • ALL Industry Acceptance • Current Clients No 1 Priority • Customer References
More than 400 customers (over 40% of the Fortune 100) and most are Global 2000, spanning most industries
Wells Fargo Bank BUSINESS GOAL NEON Systems’ SOLUTION • Shadow Direct and Shadow Web Server were implemented eliminating problems associated with gateways and increasing customer support capabilities. • To Web-enable and optimize its customer support initiatives. COMPETITION • None SELECTION CRITERIA • Required a CICS transaction server. • Monitoring, control, and diagnostic capabilities. • Fault tolerance
Merrill Lynch BUSINESS GOAL NEON Systems’ SOLUTION • Current transaction volumes facilitated through Shadow Direct has topped 800,000 per day and is steadily growing 30%-40% per year. • As one of the world’s largest client/server to mainframe production environments, Merrill Lynch required a safe, simple solution to provide mainframe data access to its users. COMPETITION • An in-house application • IBM’s DB2 Connect • MDI Gateway SELECTION CRITERIA • Shadow Direct was chosen for its simple architecture, large application scalability, ease of implementation, low overall cost, speedy problem identification and resolution, and IT-friendly nature.
GMAC Insurance BUSINESS GOAL NEON Systems’ SOLUTION • GMAC employed Shadow Direct and JDBC driver for data access and legacy application renewal for is customer-focused Web service. • To build Web-enabled access to many years of GMAC ADABAS legacy mainframe data for an easy-to-use, self-service customer website. COMPETITION • EDA SQL • IBM DB2 Connect • EntireX SELECTION CRITERIA • NEON provided access to ADABAS, DB2, and Cobol RPC’s, and Read Write functionality without a required gateway and custom coding.
Boeing BUSINESS GOAL NEON Systems’ SOLUTION • Shadow Web Server accessing IMS/TM, DB2, and CICS • To rapidly Web-enable legacy programs (such as the Employee Timekeeping System) with a secure, scalable, and reliable solution. • Example: Employee Timekeeping System generates 1.5 million hits per day. COMPETITION • IBM's ICSS SELECTION CRITERIA • Scalability, security, and time required for deployment.
SHADOW® Shadow Architecture
DB2 CICS VSAM Thread Management TCB TCB TCB IMS/TM TCB TCB TCB IMS/DB ADABAS Natural RPC RSP SHADOW® Unique Architecture Web, Application or Integration ServerPackaged application: ERP, CRM, BI, Portal Running on NT or Unix OS/390 NEONClient TCPIP Shadow Server SNA Client App Windows, NT, Unix, OS/2, Mac RACF NEONClient ACF2 Monitoring/Diagnostics Top Secret Web Browser Internet Explorer, Netscape No gateway required direct access to OS/390 Auto Management Data Mapping RRS Flat Files WLM
SHADOW®Why is it scalable and reliable? • Runs as own MVS based address space (No USS required) • TCB Architecture (Isolation, scale, monitoring, control) • Run up to 36 address spaces (one address space supports 300-800 connections depending on data sources) • Load balancing among address spaces • Work Load Manager (WLM) Support • DB2 Thread Reuse (Virtual Connection Facility) • Supports ODBC and JDBC connection pooling • Boeing driving 2-3 million IMS Transactions in SWS during a 2 hour window
SHADOW® How secure is it? • Enforces native OS/390 security via Security Access Facility (SAF), provides tight integration with RACF, ACF2, TopSecret • Enforces subsystem security • DB2 • IMS • CICS • Natural • Encryption of data stream with SSL • Software • Hardware (GSK encryption chip, 10 times faster) • Complete accountability • Detail mainframe logging • Cuts SMF records for connection and query • Extended proxy user logging • Has not been hacked • Security through obscurity
SHADOW® ShadowDirect
SHADOWDirectTM NEON Client • High performance, multi-threaded, thread-safe, scalable driver • Single .dll approx. 2-3 meg (small footprint) • Supports Unix, NT, Windows, OS/2, Mac platforms • Supports ubiquitous database APIs • ODBC • JDBC J2EE Driver • JCA • Client-side optimizations, limits, debugging • Connection Pooling • NEON data stream • Data compression – up to 90%
SHADOWDirectTM provides access to OS/390 for these solutions and products… • Client/Server: VisualBasic, PowerBuilder, Delphi, Microsoft Office, C/C++... • Web Servers: IIS, Apache, Cold Fusion, ... • Application Servers: WebSphere, WebLogic, SilverStream, iPlanet, WebGain ... • Integration Servers: CrossWorlds, Vitria … • Business Intelligence: Brio, Cognos … • CRM and ERP: Siebel, Peoplesoft, … • Portals: Epicentric, Plumtree …
SHADOWDirectTM Transaction Level Security • Feature for Shadow Direct in a 3-tier web • When proxy Logon IDs are used by servers to access OS/390 data, applications and transactions • Shadow allows for detailed information about a user to be cut with SMF records for the proxy Logon ID • Provides traceability, chargeback to users, who would otherwise be masked by proxy Logon ID • Only way to properly handled infinite number of Internet users in conjunction with RACF, ACF2 or Top Secret
SHADOWDirectTM for ADABAS & Natural OS/390 - MVS Host Shadow Direct TCB Data Mapping Facility ADAREP FDT/ ADACMP TCB TCB ODBC/ JDBC TCP/IP ADABAS TCP/IP Listner SQL -> Direct Call Result set CICS/Batch Diagnostic Facility Event Facility A C I Natural-trans Natural-trans Natural-trans SAF RACF ACF2 TOP S WLM CALL SHADOW_ACI
SHADOW® Interface for ADABAS
SHADOW® Interface for ADABAS • SQL syntax and native database syntax • Supports ADABAS end transaction (ET) and Backout transaction (BT) commands • ADABAS File Level Security • Multi-file Joins in ADABAS • Up to 5 files • Supports Native ADABAS Constructs and Operations: • Multi-Value fields (MU), Periodic Group (PE) • Cursor Processing • Multi-descriptor Processing
SHADOW® Interface for ADABAS Access ADABAS Meta Data from a distributed tool.
SHADOW® Interface for Natural/ACI
SHADOW®Shadow ACI’s benefits • Simple Implementation • CALL SHADOW_ACI(‘SEND’,’NATSRV1,NATPDA1’,1009,’1’,…) • Input/Output data checking & transformation using mapping • Return multiple column, multiple records • CICS connection fail over • CICS load balancing • Resource protection. • Natural Storage leak protection by limiting the amount times the server is accessed before it is restarted. • Shadow Server automatically start and kill servers according to demand. • Allowing less frequently used servers to “Die” free’s up storage for more often used servers, utilizing the available resources more wisely
SHADOWSHADOW_ACI() SQL CALL CALL SHADOW_ACI(‘FUNC’,‘SERVER,MAPIN,MAPOUT’,‘DATA’,…) Parameter Description ‘FUNC’ Function for Call, ex. ‘SEND’, ‘SOC’, ‘EOC’. ‘SERVER’ Name of defined Natural “server” process. ‘MAPIN’ Name of Map definition taken from data area definition, to provide data-type checking ‘MAPOUT’ Name of Map definition taken from data area definition, to provide result set of Natural data area SQL example: CALL SHADOW_ACI('SEND','EXAMPLE1,PARMMAP1',3009,'1')
RACF ACF2 TOP SECRET CICS/TS REGION Shadow Server SHADOW_ACI DEFINE DATA LOCAL DFH$AXCS CALL ‘BROKER’ RECEIVEAREA FIND EMPLOYEE WITH NAME EQ NAME-IN MOVE DATA TO SENDAREA CALL ‘BROKER’ SENDAREA DATA MAPPING FACILITY Monitoring/Diagnostics ADABAS Automated Management SHADOWDirectTMInterface for CICS/ACI OS/390 EXCI XS01 1 SENDAREA (A250) 1 RECEIVEAREA (A250) XS02 XS03 XS04 XS05
SHADOW® Interface for Natural/CICS OS/390 Fail Over Support RACF ACF2 TOP SECRET Shadow Server CICS/TS REGION-A SHADOW_ACI CICS/TS REGION-B Monitoring/Diagnostics Automated Management
SHADOW® Natural Server Management View Map Details
SHADOW® Data Mapping Facility Powers Shadow in providing metadata and relational resultsets for non-relational data, applications and transactions
INPUT-ID CUSTOMER-NAME ADDRESS-NUMBER ADDRESS-STREET ADDRESS-CITY ADDRESS-STATE SHADOW® Data Mapping Facility Meta Data repository for non-relational data CICS COMMAREA, IMS MFS, VSAM Copybook, ADAREP, ADAWAN or Natural data area 01 DFHCOMMAREA 03 INPUT-ID 03 CUSTOMER-NAME 03 ADDRESS-DETAILS 04 ADDRESS-NUMBER 04 ADDRESS-STREET 04 ADDRESS-CITY 04 ADDRESS-STATE MAP NAME : CUSTINFO
SHADOW® Natural Data Map Creation Extract Meta Data From Source code
SHADOW® Data Mapping Facility Source code, Copybook, COMMAREA, MFS, Natural Data Area
SHADOW® Data Mapping Facility View Map Details
SHADOW® Monitoring and Diagnostics A centralized detailed tracing facility, monitoring real-time usage.
SHADOWTM Monitoring and Diagnostics • Trace ADABAS queries • SQL -> ADABAS Direct Calls • Display of ADABAS Control Block • Trace Natural servers • Natural Server activity • Display input and output data buffers • Record error messages • ISPF panel and web monitoring interfaces
SHADOW®Diagnostic Facility Monitoring Users
SHADOW ®Diagnostic Facility Trace Browse
Maximum Rows Limit resultset size Maximum DB2 Timerons Prevents expensive queries from starting Maximum CPU Usage Per Session Per Query DB2 Lock Utilization Limits Fail & Warning for: Shared Update Exclusive Wide range of detectable Shadow events Resource management events Security events SQL, DL/1, RPC, CICS, IMS Communication events Wide range of actions available Terminate connection and thread Adjust performance profiles Modify queries Adjust authorization details Limit rows and CPU Time SHADOW® Event Facility
SHADOW Event Facility SHADOW Event Facility ® ® What are customers doing with SEF? § • Limit the number of connections that a user can have • • • Restrict access to only certain DB2s from certain Shadows Obtaining ACF2 Logon information from a user’s ACEE and • • returning it to the client application. Granting users additional CPUTIME and unlimited FAILWAITIME • • . . based on userid • Restricting logons during certain parts of the day • Overriding client connection parameters • - like MAXROWS. • - like MAXROWS. • Quiescing the server rather than shutting down nightly when • running database backups • Modifying or rejection queries before they execute (check for • Modifying or rejection queries before they execute (check for WHERE clause) WHERE clause) • Prevent expensive queries from running • 17
SHADOW® ShadowWeb Servervisit http://mkt.neonsys.com
SDF (ISPF) RACF ACF2 Top Secret TCP/IP SHADOWWeb ServerTM 2-tier Shadow Web MVS-OS/390 ShadowWeb Server Intranet/Internet DB2 Web Client CICS, Natural HTTP IMS Windows, NT, OS/2, UNIX WWW Rules ADABAS VSAM, IDMS, others Trace Browse
SHADOWWeb ServerTM Why consider it? • It works on OS/390! • Leverage existing OS/390 skills & assets • Secure, scalable, and reliable • Turn-key and rapid development features • Supports proprietary development approaches (secure) • Adaptable to emerging http technologies • Cost effective • No additional hardware required • Rapid installation and development • Minimal support staff
SHADOW® Top Ten Benefits from the home office in Sugar Land, Texas 1. Reduce Costs: Reduce total cost of ownership (TCO) and manpower to maintain due to “no gateway” architecture 2. Leverage Investments: OS/390 hardware, software and skills 3. Integration Standards: ODBC, JDBC, XML, HTML 4. Quality of Service (QoS): High performance, reliable, scalable and secure architecture requiring no gateways 5. Reduce Network Load: Optimizations to reduce bandwidth requirements and network round trips 6. Security: Support RACF, ACF2, TopSecret via SAF; cuts SMF records; Encryption with SSL, TLS, support subsystem security, KILL command 7. Transparent access OS/390 Data and Transactions: One product to access DB2, IMS, ADABAS, VSAM, CICS/TS, Natural, more . . . 8. SYSPROG and DBA Control: Automated management to control utilization by distributed applications 9. Visibility: Extraordinary real-time end-to-end monitoring and diagnostics 10. References: Many high volume, high performance, HAPPY customers
NEON, Shadow, ShadowDirect, and Enterprise Direct are registered trademarks, and Shadow Activity Monitor, Shadow Advanced Scalability, Shadow AutoHTML, Shadow Enterprise Transactions, Shadow Event Facility, ShadowInterface, Shadow REXX/Tools, Shadow TLS, Shadow Web Interface, Shadow Web Server for OS/390, and Shadow Web Server for VM are trademarks of NEON Systems, Inc. ADABAS and Natural are registered trademarks of Software AG. DB2, CICS, MQSeries, and OS/390 are registered trademarks, and MVS and IMS are trademarks of the IBM Corporation. All other trademarks are the property of their respective owners.
SHADOW® ShadowLIVE DEMO!