0% found this document useful (0 votes)
314 views39 pages

CICS - Intro and Overview V4

This document provides an introduction and overview of CICS (Customer Information Control System). CICS is a transaction processing and application server that handles over 30 billion transactions per day for over 16,000 customers worldwide. It provides capabilities such as application development, storage management, file control, DB2 and MQ integration, security, two-phase commit, and dispatching. The document discusses what CICS does, its transaction processing requirements, and the various services it provides including systems, data, communication, and application development services. It also describes how CICS regions can be connected and how systems can grow through technologies like ISC, MRO, IPIC and XCF.

Uploaded by

Alejandro Ponce
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
314 views39 pages

CICS - Intro and Overview V4

This document provides an introduction and overview of CICS (Customer Information Control System). CICS is a transaction processing and application server that handles over 30 billion transactions per day for over 16,000 customers worldwide. It provides capabilities such as application development, storage management, file control, DB2 and MQ integration, security, two-phase commit, and dispatching. The document discusses what CICS does, its transaction processing requirements, and the various services it provides including systems, data, communication, and application development services. It also describes how CICS regions can be connected and how systems can grow through technologies like ISC, MRO, IPIC and XCF.

Uploaded by

Alejandro Ponce
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

CICS

Introduction and Overview


Larry Trollope
Monday August 8, 2011 9:30 am Orlando, FL Session 9627

Abstract
This session provides an introduction to CICS and provides an overview of the product. CICS transaction processing and application server capabilities will be highlighted It provides the highlighted. attendee with information regarding important functionality such as Application Development, Storage Management, File Control, DB2 and MQ attach, Security, Two-phase commit, and Dispatching. The attendee also will see how resources are defined and will be introduced to the new face of CICS the IBM CICS Explorer. CICS, Explorer
2

CICS: IBM's best kept secret IBM s


30 billion transactions/day, >$300B/week
16,000 customers worldwide

40 years invested in applications

30 million users

CICS
50,000 CICS licenses

950,000 programmers earn their living from CICS

Over 900,000 concurrent users/system

5000 packages from 2000 ISVs

Used by 490 + of IBM''s top 500 customers

What is a transaction and what should software to manage transactions provide?


A transaction i the f d i is h fundamental unit of work f l i f k for which recovery, consistency and concurrency are managed in online processing environment. For a transaction manager to pass the ACID test it should provide: Atomicity, Consistency, Isolation and Durability
4

What else should transaction management software provide?


Should support major programming languages Should provide tools to assist in development Should have an API to shield developers Should have tools to assist in operations Should support major platforms Sh ld support major d t b Should t j database systems t Should support major network protocols And it should support Web-based applications
5

So CICS is a Transaction Manager? g Customer Information Control System


also known as .......
a Transaction Server a Transaction Monitor an Application Server

So what does CICS actually do?

CICS provides a concurrent program execution environment for multiple end users, who have access to multiple data types types. CICS will manage the operating environment to provide performance, scalability, security and id f l bilit it d integrity.

Transaction Processing Requirements

Large volume of business transactions to be rapidly and accurately processed Multiple users, single/sysplex or distributed With potentially: A huge number of users Simultaneous access to data A large volume of data residing in multiple database types Intense security and data integrity controls necessary The access to the data is such that: Each user has the perception of being the sole user of the system A set of changes is g g guaranteed to be logically consistent g y If a failure occurs, any intermediate results are undone before the system becomes available again A completed set of changes is immediately visible to other users
8

CICS Provides .......

Systems Services Storage, Program, Task and Time Control Security Workload Management Security, Communications Services To other CICS's, end-users, the web and other non-CICS programs SNA TCP/IP Data Management Services g with Commit with Logging with Recovery Application Development Services API Language Tools 9 Debug Support

Does CICS Run on a System z? y

Well yes it does ....... and on the UNIX platforms platforms, AIX, HP-UX, Solaris, and on Windows and VSE and OS/400 and Li d Linux (PRPQ 7J0468 on S t System x) ) TX Series for Multi platforms Multi-platforms C CS a so as Ga e ays, Clients, Connectors a d CICS also has Gateways, C e s, Co ec o s and Systems Management....much much more
10

CICS - Its really Middleware !


APPLICATION BUSINESS LOGIC CICS API
DATA MGMT SERVICES DATA BASE SUPPORT COMMUNICATION SERVICES TASK MANAGEMENT PROGRAM MANAGEMENT TIME MANAGEMENT RECOVERY SERVICES STORAGE MANAGEMENT LANGUAGE SUPPORT OPERATOR INTERFACE SYSTEM MANAGEMENT MONITORIING AND STATISTICS CONNECTIVITY MGMT WEB SERVICES

CICS

Communications

Database Manager g

Operating System Hardware


11

CICS Systems Services - Security

Strong security facilities are available in the CICS to implement identification, authentication and authorization Uses SAF calls to access External Security Manager Logon/Signon L /Si Passwords (8 characters upper/lower/special char) Passphrase ( p (100 character) ) CICS implements techniques to protect Transactions Resources Commands Encryption of communication flows
12

CICS Systems Services - Storage

Effective use of memory is key to performance Supported Virtual Storage, Paging Redesigned to ......... Utilize 31-bit addressing Allow data to be put in memory Provides storage protection within a region Exploiting 64-bit addressing 64 bit Storage has been a major evolution allowing for significant transactional growth
13

Other CICS Systems Services

Abnormal termination and exception handling Interval Control for time initiated events Multitasking and subtasking Different TCB's dispatched P i it scheduling Priority h d li Open Transaction Environment (OTE) Threadsafe JVM Server for threadsafe Java programs Pooled JVM for non-threadsafe Java programs p g
(See CICS TS 4.2 Statement of Direction)
14

CICS Systems Management


Operator commands to control the transaction processing environment (e.g. inquire/change trans, trace, purge trans .) CICS Explorer Web based definition, operation and monitoring p , p g Resource Definition Online (RDO) provides dynamic definitions Dynamic Program Library Management without CICS restart Exits and sample code allow for customization TRUES Task Related User Exits GLUES Global User Exits URMS S User Replaceable Modules Monitoring tools are available to analyze performance and load CICS Statistics Utilities CICS Performance Monitor CICS Performance Analyzer CICSPlex SM features provide operational and definitional tools Web based interface (WUI) included with CICS Transaction Server

15

CICS Communications Services

SNA - VTAM 3270 Terminals APPC / LU 6 2 sessions 6.2 CICS or IMS ISC (InterSystem Communication) FEPI Front End Programming Interface MRO M lti l R i O Multiple Region Operation ti XCF / MRO - Cross-system MRO (CTC or Coupling Facility) EXCI External CICS Interface TCP/IP TCP/IP Sockets Region to Region IP Connectivity (IPIC) Internet protocols (e.g. HTML, XML, SOAP) Remote Procedure Calls (ONC RPC) IIOP / EJB (N t (Note St t Statement of Di ti TS 4 2) t f Direction 4.2) 16 WebSphere MQ

CICS Data Services

Multiple types, multi-access within same t M lti l t lti ithi transaction ti VSAM (KSDS, ESDS, RRDS) and VSAM transparency too. Data Base Management Systems (DBMS) DB2 IMS DBCTL And many other third party database products Transient Data queues (TD queues) Temporary Storage (TS) Data Tables (> 2GB) ( Data integrity, logging, recovery, backout, restart
17

CICS Application Development Services

Command level Application Programming Interface XPI, SPI added for Systems Programmers Language S L Support t (Assembler, COBOL, PL/I, C, C++, Java, REXX) Dynamic Scripting with PHP and Groovy support Execution Diagnostic Facility (EDF) Command Interpreter End to end debugger for client and server

with

Support for BMS/3270 screens, Web Services, and Atom feeds


18

But What Does a CICS Command Look Like ?


EXEC CICS LINK PROGRAM( MyProgram ) PROGRAM(MyProgram') COMMAREA(MyData) LENGTH(LengthofMyData) EXEC CICS RETURN
EXEC CICS READNEXT DATASET(MENUFILE') INTO(MASTER-MENU-RECORD) ( ) RIDFLD(MENU-KEY) LENGTH(OPTION-LENGTH) RESP(CICS-RESPONSE)

EXEC CICS DOCUMENT CREATE DOCTOKEN(Atoken) TEXT(AppPgmCA) LENGTH(Input_data_len) NOHANDLE EXEC CICS WEB SEND DOCTOKEN(Atoken) STATUSCODE(StatusCode) STATUSTEXT(StatusText) LENGTH(StatusLen) CLNTCODEPAGE('819') NOHANDLE EXEC CICS GET CONTAINER(MsgInput) INTOCCSID(UTF8-CCID) INTOCCSID(UTF8 CCID) SET(Msg-Ptr) FLENGTH(Msg-Length)

EXEC CICS WRITEQ TD QUEUE('CSSL') FROM(IDMSG) LENGTH(IDMSGLN) RESP(RESPVAL)

19

CICS Events Processing

An e ent is an thing of significance to an enterprise event anything CICS allows users to capture, format and emit business events from CICS Events can be sent via HTTP, MQ queue, TS Queue or Start Transaction for further processing Events are bound to a CICS system using an event binding editor built into CICS Explorer and Rational Developer for System z with Java (RDz) The bindings are enabled using a BUNDLE resource CICS Explorer or Web User Interface (WUI) RDO or CEMT
20

CICS One or Many CICS Regions? y g

CICS can run in one single region CICS can run as several independent regions on a single system or across multiple systems CICS can run as several interconnected regions on multiple images on a single system or across several systems Sysplex - z/OS y p CICSplex a group of CICS regions CICSPLEX SM CICSplex Systems Manager
21

CICS What do a call a bunch of regions?


For manageability and recoverability CICS regions in a CICSplex are often segregated by function

TOR Terminal Owning Region WOR Web Owning Region ROR Remote Owning Region AOR Application Owning Region FOR File Owning Region DOR Data Owning Region
22

QOR Queue Owning Regions

CICS How Does Your System Grow? y

ISC and MRO InterSystems Communication - system to system M lti R i Multi-Region O Operation - region t region ti i to i XCF/MRO Cross System Coupling Facility MRO IPIC IP InterCommunications Multi-platform Clients and Gateways No i l N single points of f il i t f failure Systems Management Workload Balancing
23

CICS MRO, ISC, IPIC and XCF


SNA or TCP/IP Network

TOR AOR AOR AOR

TOR AOR AOR

TOR AOR

Sysplex A MVSA MVSB


CF

Sysplex A MVSC

Communicating among CICSs can be using memory, SNA or TCP/IP

24

CICS e-business options p

Distributed WebSphere and CICS Transaction Gateway z/OS WebSphere and CICS Transaction Gateway

New CICS Java Applications New Classic CICS Applications Existing Classic CICS Applications

CICS Native Interfaces

A pragmatic approach to implementing e business solutions e-business


25

CICS Transaction Gateway (TG) and the Universal Client (UC)

Enables client applications to invoke services in CICS Gives users at Web browsers access to business critical applications running on CICS servers Supported on multiple platforms:
Windows (XP, Vista, Windows 7) Linux HP UX HP-UX z/OS AIX Sun Solaris Su So a s

Client Interfaces
MQ client - WebSphere MQ queues External Presentation Interface (EPI) 3270 Screen Based External Call Interface (ECI) - Call and Return with Data

Remote Procedure Call

26

CICS Transaction Gateway


Support for IBM JEE and JCA connectors

WebSphere

Browser

H T T P

S e r v l e t

z/OS

CICS Transaction Server


EJB COBOL Program

Cobol Program

TCP/IP CICS Transaction Gateway Command Bean

ECI
DB2
Databases

Any platform that can run WebSphere and CTG

zServer

27

CICS Client Interfaces

CICS Application
3270 Presentation Logic

Program Link

Business Logic

EPI External PRESENTATION Interface te a S O te ace

ECI External Call Interface External CALL Interface

Intelligent Workstation or other CPU

Intelligent Workstation or other CPU

28

CICS access with Java


CICS Client and Gateway classes y Used by Java program to run a CICS transaction ECI, EPI calls available JCICS Classes Allow CICS function execution for Java programs Connection to CICS can be by CTG, WebSphere AS, either or both Program calls can be created by program development workbenches
29

CICS 3270 Bridge


CICS Transaction Server
Web Browser
CICS TCP/IP Service CICS Web Interface Business B siness Logic Interface 3270 Bridge Application

Rapid enablement of 3270 Terminal Transactions Allows 3270 terminal based transactions to run with map recompile Utilities provided to recover old maps CICS interprets HTML/XML flows, formats as if it came from 3270 Allows new web applications to be written using CICS skills Linkable bridge allows EXCI invocation of 3270 terminal based trans Can be sysplex enabled
30

CICS Web Support pp


CICS Transaction Server
Web Browser
CICS TCP/IP Service CICS Web Interface Business Logic Interface Application

Gives CICS applications direct access to web browser CICS interprets HTTP flows and executes transactions Allows new web applications to be written using CICS skills Secure Socket Layer (SSL) support using up to 256 bit encryption Certificates mapped to MVS USERID C ifi d Mixed case password and passphrase support Can be sysplex enabled y p
31

CICS Service Oriented Architecture (SOA)


CICS Web Services
Service Requestor
Msg Handler In 1 Msg Handler In - 2
Pipeline

Msg Handler In 3

CICS Application Program

Msg Handler Out 1

Msg Handler Out -2


Pipeline

Msg Handler Out - 3

Service Provider

Integrated into most current release g Defined by Web Service Description Language (WSDL) CICS role in SOA can be service requestor, service provider or both CICS Web Services utility programs Assist in converting existing application into a Web Service Use a Web Service provided by an external provider Support for web services standards and technologies WSDL 2.0 WS-I WS I Basic Profile 1 1 1.1 WS-Security WS-Trust WS-Addressing Message Transmission Optimization Mechanism / XML Binary Optimized Packaging (MTOM/XOP)
32

High Volume and High Availability CICS C fi Configuration ti


CTG CICS Port Sharing CTG EXCI CTG CICS CTG WebSphere TCP/IP CTG CICS Port Sharing CTG EXCI EXCI CTG CICS CTG Work Load Agent MQ MVS Work Load Manager
33

DB2 MQ DB2 MQ DB2 MQ DB2

CICS Tools

If CICS does not provide the needed functionality there are many tools available from IBM and other vendors to assist in creating and managing an online transaction processing system
For example IBM provides the following: CICS Batch Application Control CICS Configuration Manager for z/OS CICS Interdependency Analyzer CICS Online Transmission Time Opt C CS O e a s ss o e Optimizer for z/OS e o /OS CICS VSAM Recovery for z/OS CICS Performance Analyzer CICS Business Events Publisher CICS VSAM Transparency CICS Deployment Assistant for z/OS CICS Service Flow Runtime IBM Ti Tivoli OMEGAMON XE f CICS on z/OS li for /OS REXX for CICS Transaction Server for VSE/ESA Extensions to the CICS Information Center

34

CICS - Summary

CICS is ideal for existing transactional environments and your new ones too.. It provides: too Availability, Maintainability, and Scalability Tools for Development, Support and Operation Continues exploitation of new hardware and software technology Plenty of education is available

35

Some Useful CICS Information Some


http://www.SHARE.org p g SHARE Website Volunteer Center > Projects/Programs then select Data Program CICS Project Youll find information on: Y ll fi d i f ti CICS Announcements CICS Tools CICS User Groups CICS-L Discussion group (listserv) CICS Presentations made at Share
36

Some useful IBM Websites


http://www.ibm.com/software/htp/cics/ CICS Product Information http://publib.boulder.ibm.com/infocenter/cicsts/v4r2/index.jsp CICS Information Center for CICS Transaction Server http://www.redbooks.ibm.com/ Download Redbooks http://www.ibm.com/cics/soap/ SOAP for CICS Information http://www.ibm.com/software/ts/cics/education/ Lists Li t available training courses and certifications il bl t i i d tifi ti http://www.ibm.com/support/docview.wss?uid=swg27007241 pp CICS SupportPacs
37

CICS Redbooks www.redbooks.IBM.com www redbooks IBM com


Introduction to CICS Dynamic Scripting Redbook, published March 28, 2011 Threadsafe Considerations for CICS Redbook, published March 14, 2011 Extend The CICS Explorer: A Better Way to Manage Your CICS Redbook, published February 23, 2010 Java Application Development for CICS Redbook, published February 24, 2009 Implementing CICS Web Services Redbook, published November 12, 2008 Exploring Systems Monitoring for CICS Trans Gateway Redbook, Redbook published April 3 2008 3, CICS Web Services Workload Management and Availability Redbook published March 31, 2008 CICS Systems Manager in the WUI as the Principle Management Interface Redbook, published November 16 2007 SG24-7924-00 SG24-6351-03

SG24-7819-00

SG24-5275-03

SG24-7657-00

SG24-7562-00

SG24-7141-01

SG24-6793-01
38

CICS QUESTIONS

I never said most of the things I said. g If you ask me anything I don't know, I'm not going to answer. -- Yogi Berra
39

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy