1 / 34

Introduction to CICS

Introduction to CICS. Contents. Introduction History Compatibility Typical Usage Components of CICS CICS Structure – Domains CICS Management Functions Defining Resources to CICS – Control Tables. Introduction. CICS: Customer Information Control System Product from IBM

khuong
Télécharger la présentation

Introduction to CICS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction to CICS

  2. Contents • Introduction • History • Compatibility • Typical Usage • Components of CICS • CICS Structure – Domains • CICS Management Functions • Defining Resources to CICS – Control Tables

  3. Introduction • CICS: Customer Information Control System • Product from IBM • Its principal function is to control multiple terminal users and enable them to access their files using a set of programs. • Its interface between Application Program and the Operating System.

  4. Introduction (Cont..) • It’s a OLTP System • It’s a Database/ Data Communication (DB/DC) system. • It’s a Terminal Control Program/ Terminal Monitor • Acts as a Application/ Transaction Server • E.g. Banks ATM programs Customer Information System, Student Registration System etc.

  5. History • Developed by IBM CICS developers in Hursley, England • pronounced "KIX" or "KICKS” • More than 30 years old. 90% of Fortune 500 companies use CICS. • Initially, IBM introduced CICS for small and medium mainframe systems with, perhaps, a maximum of 50 terminals. Larger sites would use IMS/DC. • As CICS has evolved, the maximum number of terminals has grown to many thousands.

  6. Compatibility • MVS, OS/390, z/OS • VSE • AIX • HP • OS/2 • Apple Macintosh

  7. Typical Usage • Message Switching • Batch Job Submission • Date Entry Transactions • Inquiry Transactions • Inquiry with Update Transactions

  8. Message Switching Typical Usage

  9. Batch Job Submission Typical Usage

  10. Date Entry Transactions Typical Usage

  11. Date Entry Transactions Typical Usage

  12. Inquiry Transactions Typical Usage

  13. Inquiry Transactions Typical Usage

  14. Typical Usage Inquiry with Update Transactions

  15. Components of CICS • Data Communication Functions • Data Handling Functions • Application Program Services • System Services • Monitoring Functions

  16. Componentsof CICS Data Communication Functions • This component provides an interface between CICS and terminals. • It acts as an interface to telecommunication access methods like VTAM, TCAM, BTAM. • It frees the application programs from terminal hardware through Basic Mapping Support (BMS) thus providing device and format independence. • It provides Multi Region Operations (MRO) through which more than one CICS region in a system can communicate. • Provides Inter System Communication (ISC), through which a CICS region in a system can communicate with other CICS regions systems or other non-CICS regions in other systems or other non-CICS systems.

  17. Componentsof CICS Data-Handling Functions • Provides an interface between CICS and data. • Interface with data access methods such as VSAM and BDAM. • Interface with database access methods like DB/2, SQL/DS and DL/I • Maintain data integrity by controlling simultaneous updates, providing data recovery facilities.

  18. Componentsof CICS Application Program Services • Provides an interface between CICS and Application programs. • Interface with COBOL, PL/1, and assembler programs. • Provides command level translation. • Provides Execution Diagnostic Facility (EDF), Command Interpreter, (CECI), Screen Definition Facility (SDF), Trace and Dump facilities.

  19. Componentsof CICS System Services • Provides an interface between CICS and operation system and carries out functions like loading and releasing of application programs, acquiring and freeing of storage, task scheduling.

  20. Componentsof CICS Monitoring Functions • Provides the function for monitoring the various events within CICS and the necessary statistics for system fine tuning.

  21. CICS Structure - Domains • CICS functions are performed by Domains • The domains replace the management modules used by old versions of CICS. • Each domain has a two-character identifier. • When a user requests CICS services, the different components are invoked as required.

  22. KE kernel - the main CICS control structure DS dispatcher domain DM domain manager domain DU dump domain GC global catalog domain LC local catalog domain LM lock domain ME message domain MN monitoring domain PA parameter domain ST statistics domain. SI systems initialization domain SM storage domain TI timer domain TR trace domain XM transaction manager domain XS security domain AP application domain: everything else in CICS CICS Structure – Important Domains • You will see these codes in messages: DFHSM0115

  23. CICS Management Functions • Terminal Management Most CICS applications start when an end user enters data from a terminal. Terminal Management allows your applications to send or receive messages. • Security Management You can restrict access to transaction and resources. • Task Management CICS provides its own multi-user or multi-thread environment. • Program Management A typical CICS system supports many different user application programs. Loading and accessing these programs is controlled by this management function.

  24. CICS Management Functions (cont..) • File Management Some applications use non-database files. File Management provides access to VSAM and direct access (BDAM) data sets. • Queue Management Some applications have the requirement to store data into a queue for later retrieval. CICS supports two methods of queuing. • Recovery Management You may ask CICS to protect selected resources, in the event of unexpected termination of the transaction or the system. • System Services * Storage Management

  25. CICS Management Functions (cont..) • System Services * Storage Management: Acquiring storage when CICS transactions needs it. * Time Management: A service that allows CICS transaction to request that certain actions be performed at a certain time of day, or after an elapsed period of time. * Trace Management: A service that can be very helpful in problem determination. * Application Program Interface (API): A ‘layer’ between application programs and CICS management functions.

  26. CICS Management Functions (cont..) • System Services * Storage Management: Acquiring storage when CICS transactions needs it. * Time Management: A service that allows CICS transaction to request that certain actions be performed at a certain time of day, or after an elapsed period of time. * Trace Management: A service that can be very helpful in problem determination. * Application Program Interface (API): A ‘layer’ between application programs and CICS management functions.

  27. CICS Management Functions (cont..)

  28. CICS Management Functions (cont..) • System Services * Storage Management: Acquiring storage when CICS transactions needs it. * Time Management: A service that allows CICS transaction to request that certain actions be performed at a certain time of day, or after an elapsed period of time. * Trace Management: A service that can be very helpful in problem determination. * Application Program Interface (API): A ‘layer’ between application programs and CICS management functions.

  29. CICS Management Functions (cont..) • System Services * Storage Management: Acquiring storage when CICS transactions needs it. * Time Management: A service that allows CICS transaction to request that certain actions be performed at a certain time of day, or after an elapsed period of time. * Trace Management: A service that can be very helpful in problem determination. * Application Program Interface (API): A ‘layer’ between application programs and CICS management functions.

  30. Defining Resources to CICS – Control Tables • You must define resources such as files to CICS, before you can use them. • CICS Control Program and Tables:

  31. Control Tables – PCT • Program Control Table (PCT) The primary function of the PCT is to register the control information of all CICS transactions. PCT contains a list of valid Trans-id paired with the name of a program CICS will load when the transaction is initiated with that transaction identifier. It identifies priority and security level (RSLC) of transaction.

  32. Control Tables - PPT • Processing Program Table (PPT) The Primary function of PPT is to register all CICS application programs and BMS mapsets. The PPT keeps track of which applications are loaded on the CICS address Space (storage). CICS uses this information to determine whether new copy of the program need to be loaded from Disk or it exists on storage. It contains information such as Location in memory, Library address of the disk and language being used.

  33. Control Tables – PCT & PPT

  34. Control Tables - FCT • File Control Table (FCT) The Primary function of FCT is to register the control information of all files, which are used under CICS. FCT contains the name and type of each file and in addition lists the file control operations that are valid for each file. It lists whether the existing records can be read sequentially or randomly, deleted or modified.

More Related