Book description
Beginning with IBM® CICS® Version 2, applications can run on TCBs apart from the QR TCB, which has positive implications for improving system throughput and for implementing new technologies inside of CICS. Examples of implementing new technologies include using the IBM MVS™ Java virtual machine (JVM) inside CICS and enabling listener tasks written for other platforms to be imported to run under CICS.
The newest release, CICS Transaction Server for z/OS® (CICS TS) V4.2, includes scalability enhancements so that you can perform more work more quickly in a single CICS system. The advantage of this enhancement is that you can increase vertical scaling and decrease the need to scale horizontally, reducing the number of regions that are required to run the production business applications. The scalability enhancements in CICS TS V4.2 fall into two broad areas, which are increased usage of open transaction environment (OTE) and of 64-bit storage.
This IBM Redbooks® publication is a comprehensive guide to threadsafe concepts and implementation for IBM CICS. This book explains how systems programmers, applications developers, and architects can implement threadsafe applications in an environment. It describes the real-world experiences of users, and our own experiences, of migrating applications to be threadsafe. This book also highlights the two most critical aspects of threadsafe applications: system performance and integrity.
Table of contents
- Front cover
- Notices
- Preface
- Summary of changes
- Part 1 Threadsafe concepts and definitions
- Chapter 1. Introduction to CICS open transaction environment
-
Chapter 2. Overview of an open transaction environment and threadsafe applications
- 2.1 Overview of quasi-reentrant and threadsafe programs
-
2.2 Open transaction environment: A brief history
- 2.2.1 Before CICS Transaction Server V1.3
- 2.2.2 CICS Transaction Server V1.3
- 2.2.3 CICS Transaction Server V2.2
- 2.2.4 CICS Transaction Server V2.3
- 2.2.5 CICS Transaction Server V3.1
- 2.2.6 CICS Transaction Server V3.2
- 2.2.7 CICS Transaction Server V4.2
- 2.2.8 Open TCB modes in CICS Transaction Server V2
- 2.2.9 Open TCB modes in CICS Transaction Server V3 and later
- 2.3 Techniques to ensure threadsafe processing
- 2.4 Program definition
- 2.5 Task-related user exit APIs
- 2.6 TCB limits
- 2.7 Open TCB performance
- 2.8 TCB considerations with UNIX System Services
- 2.9 Static and dynamic calls
- 2.10 Threadsafe and nonthreadsafe commands in CICS Transaction Server
- 2.11 Function shipping considerations
- Chapter 3. Threadsafe techniques
- Part 2 Threadsafe implementation
- Chapter 4. Threadsafe tasks
- Chapter 5. Application review
-
Chapter 6. System programmer tasks
- 6.1 Role of the system programmer
- 6.2 Understanding threadsafe operation
- 6.3 Analyzing the CICS regions
- 6.4 Providing a threadsafe CICS operating environment
- 6.5 Making your exits threadsafe
- 6.6 Nonthreadsafe data integrity example
- 6.7 Coordinating and driving individual application conversions
- 6.8 Post-conversion monitoring
- 6.9 Summary
- Chapter 7. Threadsafe conversion considerations
- Chapter 8. Migration scenario
-
Chapter 9. Threadsafe enablement using CICS Tools
- 9.1 Four-step CICS Tools process
- 9.2 Application case study using the CICS Tools process
- 9.3 Identifying candidates and capturing a baseline
-
9.4 Analyzing the program behavior
- 9.4.1 Collecting interdependency data
- 9.4.2 Loading CICS IA dependency data
- 9.4.3 Analyzing interdependency data
- 9.4.4 Analyzing the MAIL transaction
- 9.4.5 Running the CICS IA Command Flow feature
- 9.4.6 Analyzing the CICS IA command flow data
- 9.4.7 The Dynamic Threadsafe Analysis report
- 9.4.8 Analyzing the TXM* transaction
- 9.5 Changing the program definitions
- 9.6 Testing and benchmarking the results
- Part 3 Performance and general questions
- Chapter 10. Performance case studies
- Chapter 11. Common threadsafe questions
- Part 4 Appendixes and related publications
- Appendix A. Overview of CICS Tools
- Appendix B. Maintenance of CICS, DB2, and WebSphere MQ
- Appendix C. Assembler routines
- Related publications
- Back cover
Product information
- Title: Threadsafe Considerations for CICS
- Author(s):
- Release date: April 2012
- Publisher(s): IBM Redbooks
- ISBN: 9780738436692
You might also like
book
WebSphere MQ in a z/OS Parallel Sysplex Environment
This IBM Redbooks publication looks at the latest enhancements to WebSphere MQ for z/OS and shows …
book
VSAM Demystified
Virtual Storage Access Method (VSAM) is one of the access methods used to process data. Many …
book
VSAM Demystified
Virtual Storage Access Method (VSAM) is one of the access methods used to process data. Many …
book
Event Processing with CICS
This completely refreshed IBM Redbooks® publication provides a detailed introduction to the latest capabilities for business …