The Scanner component

The Scanner is a batch utility that scans a load module library to detect those programs in the library that issue EXEC CICS commands that may cause transaction affinity. It examines the individual object programs looking for patterns matching the argument zero 3 format for the commands in question.

The Scanner detects the use of the EXEC CICS commands listed in Table 1 on page 11, and MVS POST requests.

The report produced by the Scanner indicates only that potential affinity problems may exist because it only identi®es the programs that issue the commands. It cannot obtain dynamic information about the transactions using the programs, or the names of the resources acted upon. Use the report in conjunction with the main report produced by the Reporter (see ªThe Reporter componentº on page 18).

Notes:

1.The Scanner operation is independent of the language the scanned program was written in and the release of CICS the scanned program was translated under.

2.The Scanner may indicate an affinity problem that does not really exist, because the bit pattern found accidentally matches the argument zero format for an affinity command.

3.The Scanner does not detect CICS macro-level commands.

 

4. The Scanner distinguishes between ENQ by name and ENQ by address based

 

on the presence of a length parameter on the EXEC CICS ENQ command. It

 

does the same for DEQs. The reports show which ENQs and DEQs are by

 

name and which are by address.

 

 

 

 

The Detector component

You can use the Detector in real-time to detect transaction affinities in a running CICS region, and to save details of the affinities in an MVS data space. This data is subsequently saved to DASD. The Detector consists of:

vA control transaction, CAFF

vAn autosave transaction, CAFB

vSome global user exit programs

vA task-related user exit program

This is shown in Figure 3 on page 13.

The data is collected by the global user exit programs at exit points XEIOUT,

XBADEACT, XMEOUT, and XICEXP, and a task-related user exit at task start and task end. Between them, these exit programs intercept all the EXEC CICS commands and other events (pseudoconversation end, terminal log off, user sign off) that are needed to deduce the affinities and their relations and lifetimes. These exit programs coexist with any other exit programs at the same exit points. (They can be placed before or after other exit programs, without any of the exit programs being affected.)

3. For an explanation of argument zero, see ªNotes on terminologyº on page x.

12 CICS Transaction Affinities Utility Guide

Page 28
Image 28
IBM OS manual Scanner component, Detector component

OS specifications

IBM OS, or IBM Operating System, refers to a family of operating systems developed by IBM to support its hardware architectures. IBM has produced a range of OS versions tailored for different computing needs, such as mainframes, servers, and personal computers. Among the most notable operating systems in IBM's portfolio are OS/2, z/OS, and AIX, representing a blend of innovation and reliability that has defined IBM's reputation in the computing world.

One of the defining features of IBM OS is its robust multitasking capabilities. Both z/OS, predominantly used in IBM's mainframe environments, and AIX, the Unix-based system for IBM Power Systems, support multiple users and processes simultaneously. This ability allows organizations to run numerous applications in parallel efficiently, maximizing resource utilization and improving productivity.

In terms of security, IBM OS incorporates advanced features aimed at protecting data and maintaining integrity. z/OS offers multifactor authentication, data encryption, and a security model that adheres to the latest regulatory requirements. AIX provides Secure Virtualization, which enhances isolation and security in cloud environments, essential for enterprises handling sensitive information.

Another key characteristic is the adaptability of IBM OS to modern technologies. For instance, z/OS is designed to integrate with cloud computing, open source, and DevOps practices. This adaptability supports organizations in modernizing their infrastructure while retaining the stability associated with IBM solutions. AIX similarly supports containerization and virtualization, which are critical for optimizing resource usage in dynamic computing environments.

IBM's commitment to scalability is evident across its OS offerings. Organizations leveraging z/OS can handle enormous workloads and transactional volumes, making it a preferred choice for industries like finance and telecommunications. AIX also supports scalability, allowing businesses to expand their computing resources as demands grow without significant downtime.

The availability of development tools and environments is another noteworthy aspect of IBM OS. With robust IDEs and programming languages support, developers can create and deploy applications smoothly. This assists businesses in streamlining their development processes and improving time-to-market for innovative solutions.

In summary, IBM OS encompasses a suite of operating systems characterized by multitasking, security, adaptability to modern technologies, scalability, and comprehensive development support. These features have cemented IBM's position as a leader in enterprise solutions, allowing organizations across various industries to thrive in an increasingly digital world.