Contents
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Preface | ix |
What this book is about | ix |
Who this book is for | ix |
What you need to know to understand this book | ix |
How to use this book | ix |
Determining if a publication is current | ix |
Notes on terminology | x |
Bibliography | xi |
CICS Transaction Server for OS/390 | xi |
CICS books for CICS Transaction Server for OS/390 | xi |
CICSPlex SM books for CICS Transaction Server for OS/390 | xii |
Other CICS books | xii |
Summary of changes. . . . . . . . . . . . . . . . . . . . . . xiii
Changes for the CICS Transaction Server for OS/390 Release 3 edition . . . | xiii |
Changes for the CICS Transaction Server for OS/390 Release 2 edition . . . | xiii |
Changes for the CICS Transaction Server for OS/390 Release 1 edition . . . | xiii |
Chapter 1. Introducing transaction affinities | 1 |
The bene®ts of dynamic routing | 3 |
What does dynamic routing cost? | 3 |
Transaction affinities | 3 |
4 | |
4 | |
Affinity relations | 4 |
Affinity lifetimes | 5 |
CICS programming techniques for transaction affinity | 5 |
Safe programming techniques | 6 |
Unsafe programming techniques | 6 |
Suspect programming techniques | 6 |
Avoiding the effects of transaction affinity | 6 |
Protecting applications from one another | 7 |
Chapter 2. Introducing the Transaction Affinities Utility | 9 |
Commands detected by the Transaction Affinities Utility | 11 |
The Scanner component | 12 |
The Detector component | 12 |
What is detected | 13 |
What is not detected | 14 |
Controlling the Detector | 15 |
How the affinity data is collected | 15 |
Saving affinity data | 16 |
The affinity data VSAM ®les | 17 |
The control record VSAM ®le | 17 |
Detector performance | 18 |
The Reporter component | 18 |
The Builder component | 18 |
Chapter 3. Preparing to use the affinity utility program | 21 |
© Copyright IBM Corp. 1994, 1999 | iii |