IBM OS manual Which occurs for the rst Move

Page 89

For the Scanner output:

CICS TRANSACTION AFFINITIES UTILITY

 

1995/11/19

Page

1

LOAD MODULE SCANNER - DETAILED LISTING OF CICS.PRODN1.LOCLLOAD

 

 

 

Module Name - ACCT04

/ Load Module Length - 000159D0 / Module Entry Point - 00000028

 

 

Offset

Storage Content (HEX)

EDF DEBUG

Possible Command

Affinity

--------

-------------------------------------------------- ---------

----------------------- --------

000007A6

0A02E0000700004100

00669

WRITEQ TS

Trans

 

Total possible Affinity commands =

1

 

 

 

Total possible MVS POSTs

=

0

 

 

 

The COBOL source after translation was:

001123

 

 

 

 

 

001124

*EXEC CICS WRITEQ TS QUEUE(©ACERLOG©) FROM(ACCTERRO)

 

 

001125

*

LENGTH(ERR-LNG) END-EXEC.

 

 

001126

 

MOVE © \

© 00669 © TO DFHEIV0

97800000

1057

001127

 

MOVE ©ACERLOG© TO DFHC0080

 

1034

001128

 

CALL ©DFHEI1© USING DFHEIV0 DFHC0080 ACCTERRO ERR-LNG.

EXT 1057 1034 380 861

The equivalent Assembler-language is:

001126

MOVE

 

 

 

 

 

 

 

 

 

002764

D210

8558

A6C6

MVC

1368(17,8),1734(10)

DFHEIV0

PGMLIT AT +1718

00276A

9240

8569

 

MVI

1385(8),X©40©

DFHEIV0+17

 

00276E

D232

856A

8569

MVC

1386(51,8),1385(8)

DFHEIV0+18

DFHEIV0+17

001127

MOVE

 

 

 

 

 

 

 

 

 

002774

D207

8340

ACEA

MVC

832(8,8),3306(10)

DFHC0080

PGMLIT AT +3290

001128

CALL

 

 

 

 

 

 

 

 

 

00277A

4130

8558

 

LA

3,1368(0,8)

 

DFHEIV0

 

00277E

5030

D1B0

 

ST

3,432(0,13)

 

TS2=0

 

002782

4130

8340

 

LA

3,832(0,8)

 

DFHC0080

 

002786

5030

D1B4

 

ST

3,436(0,13)

 

TS2=4

 

00278A

4130

75A8

 

LA

3,1448(0,7)

 

ACCTERRO

 

00278E

5030

D1B8

 

ST

3,440(0,13)

 

TS2=8

 

002792

4130

9A0E

 

LA

3,2574(0,9)

 

ERR-LNG

 

002796

5030

D1BC

 

ST

3,444(0,13)

 

TS2=12

 

00279A

9680

D1BC

 

OI

444(13),X©80©

TS2=12

 

00279E

4110

D1B0

 

LA

1,432(0,13)

 

TS2=0

 

0027A2

4100

D150

 

LA

0,336(0,13)

 

CLLE@=2

 

0027A6

0530

 

 

BALR

3,0

 

 

 

 

0027A8

5030

D158

 

ST

3,344(0,13)

 

TGT FDMP/TEST-INFO. AREA +0

0027AC

58F0

A000

 

L

15,0(0,10)

 

V(DFHEI1

)

0027B0

05EF

 

 

BALR

14,15

 

 

 

0027B2

50F0

D078

 

ST

15,120(0,13)

 

TGTFIXD+120

0027B6

BF38 D089

 

ICM

3,8,137(13)

 

TGTFIXD+137

0027BA

0430

 

 

SPM

3,0

 

 

 

 

Figure 16. Example for ®nding an EXEC CICS command from the argument zero

 

 

 

 

 

For this, the calculations are:

 

 

 

 

 

 

 

Scanner offset

 

= X©7A6©

 

 

 

 

 

 

 

CICS stub length

= X©28©

 

 

 

 

 

 

 

Offset of CGT

 

= X©B8©

 

 

 

 

 

 

 

CGT base register

= GPR 10

 

 

 

 

 

 

 

Offset within CGT

= X©7A6© - X©28© - X©B8© = X©6C6© = 1734 (decimal)

 

 

 

 

MVC instruction looks like:

 

 

 

 

 

 

 

MVC

d(l,r),1734(10)

DFHEIV0

PGMLIT AT ...

 

 

 

 

To determine the EXEC CICS command:

 

 

 

 

 

 

1. Look at the Assembler-language for

 

 

 

 

 

 

MVC

d(l,r),1734(10)

DFHEIV0

PGMLIT AT ...

which occurs for the ®rst MOVE

Appendix B. Correlating Scanner and Reporter output to source 73

Image 89
Contents IBM Page IBM Third edition March Contents Appendix A. Details of what is detected Reporter output Scanner output Examples Vi Cics Transaction Affinities Utility Guide Vii Trademarks Preface Argument zero Cics books for Cics Transaction Server for OS/390 BibliographyCics Transaction Server for OS/390 Other Cics books CICSPlex SM books for Cics Transaction Server for OS/390Summary of changes Xiv Cics Transaction Affinities Utility Guide Affinities, see the Cics Application Programming Guide Introducing transaction affinitiesTarget region Requesting regionRouting region Transaction affinities Benets of dynamic routingWhat does dynamic routing cost? Transaction-system affinity Inter-transaction affinityAffinity relations GlobalCics programming techniques for transaction affinity Affinity lifetimesUnsafe programming techniques Safe programming techniquesSuspect programming techniques Avoiding the effects of transaction affinityProtecting applications from one another What next? Important note Introducing the Transaction Affinities UtilityAffinity utility program components Commands detected by the Transaction Affinities Utility Detector component Scanner componentDetector components What is detectedWorsening of transaction affinities relations What is not detectedHow the affinity data is collected Controlling the DetectorSaving affinity data Control record Vsam le Affinity data Vsam lesReporter component Detector performanceBuilder component Report presenting the affinity data in a readable formIntroducing the Transaction Affinities Utility Cics Transaction Affinities Utility Guide Estimating the size of the MVS data space and Vsam les Preparing to use the affinity utility programCreating the Vsam les #termids Dening the Vsam les to CicsPreparing to use the affinity utility program Cics Transaction Affinities Utility Guide Creating a summary report Running the ScannerAffmod DD statement Cics Transaction Affinities Utility Creating a detailed reportContents of a detailed report Is an example of a detailed report produced by the Scanner Cics Transaction Affinities Utility Guide Changing the options Running the DetectorChanging the state CAFF01 Displaying the Detector control screenStarting the collection of affinity data When you can start collecting affinity dataWhen you can pause affinity data collection Pausing the collection of affinity dataWhen you can resume collecting affinity data Resuming the collection of affinity dataStopping the collection of affinity data When you can stop collecting affinity dataCAFF02 Changing the Detector options„1… The control options Perform periodic saves Restore data on startSize of dataspace „4… Last update by useridTransid prex „2… Detect affinity typesDetector errors Cics Transaction Affinities Utility Guide Requesting a report from the Reporter Running the ReporterCAUAFF1, CAUAFF2, and CAUAFF3 DD statements Caucntl DD statementsTrangrps DD statement Output from the ReporterCmdgrps DD statement System Affinity report„2… Affinity types reported „1… Incorrect affinity types„3… Affinities reports TrangroupCommand RecoverableAffinity LifetimeTerminal Producing affinity transaction group denitionsBTS Task Total TransactionsAfflifesystem Descaddress CWA Using the affinity reportModifying affinity transaction groups Understanding the affinitiesRemove false affinities Remove affinity relation worseningCompressing affinity data SPI commands Using the IBM Cross System ProductENQUEUEs/DEQUEUEs Shared storageENQUEUE/DEQUEUE Detailed affinity analysisGetmain Shared SPI commands Cics Transaction Affinities Utility Guide CONTEXT=plexname Running the BuilderDSPSIZE=16number Affgrps DD statement Syntax for input to the BuilderRepgrps DD statement Builder input syntax Combined affinity transaction group denitions Header statementsOutput from the Builder Combining basic affinity transaction groups Relation a Relation B Resultant relation C Group merge report Data sets processed reportEmpty transaction groups report Sample group merge report Error reportSample error report Cics Transaction Affinities Utility Guide ENQ/DEQ Appendix A. Details of what is detectedLoad HOLD/RELEASE TS commandsAddress CWA CANCEL/DELAY/POST/START Wait commands SPI commandsCics Transaction Affinities Utility Guide Examples Reporter outputScanner output Example 2±VS Cobol Which occurs for the rst Move Move Unrecognized Transids Logon or System when Pconv expectedCobol affinities Cics Transaction Affinities Utility Guide Function code values Appendix D. DiagnosticsDetector table manager diagnostics Table identier values Reason code values Date formatter diagnostics Detector Cafb request queue manager diagnosticsReason code values This sectionIndex Bappl Vsam Cics Transaction Affinities Utility Guide Sending your comments to IBM Ibmr IBM

OS specifications

IBM OS, or IBM Operating System, refers to a family of operating systems developed by IBM to support its hardware architectures. IBM has produced a range of OS versions tailored for different computing needs, such as mainframes, servers, and personal computers. Among the most notable operating systems in IBM's portfolio are OS/2, z/OS, and AIX, representing a blend of innovation and reliability that has defined IBM's reputation in the computing world.

One of the defining features of IBM OS is its robust multitasking capabilities. Both z/OS, predominantly used in IBM's mainframe environments, and AIX, the Unix-based system for IBM Power Systems, support multiple users and processes simultaneously. This ability allows organizations to run numerous applications in parallel efficiently, maximizing resource utilization and improving productivity.

In terms of security, IBM OS incorporates advanced features aimed at protecting data and maintaining integrity. z/OS offers multifactor authentication, data encryption, and a security model that adheres to the latest regulatory requirements. AIX provides Secure Virtualization, which enhances isolation and security in cloud environments, essential for enterprises handling sensitive information.

Another key characteristic is the adaptability of IBM OS to modern technologies. For instance, z/OS is designed to integrate with cloud computing, open source, and DevOps practices. This adaptability supports organizations in modernizing their infrastructure while retaining the stability associated with IBM solutions. AIX similarly supports containerization and virtualization, which are critical for optimizing resource usage in dynamic computing environments.

IBM's commitment to scalability is evident across its OS offerings. Organizations leveraging z/OS can handle enormous workloads and transactional volumes, making it a preferred choice for industries like finance and telecommunications. AIX also supports scalability, allowing businesses to expand their computing resources as demands grow without significant downtime.

The availability of development tools and environments is another noteworthy aspect of IBM OS. With robust IDEs and programming languages support, developers can create and deploy applications smoothly. This assists businesses in streamlining their development processes and improving time-to-market for innovative solutions.

In summary, IBM OS encompasses a suite of operating systems characterized by multitasking, security, adaptability to modern technologies, scalability, and comprehensive development support. These features have cemented IBM's position as a leader in enterprise solutions, allowing organizations across various industries to thrive in an increasingly digital world.