You are previewing Architect's Guide to IBM CICS on System z.
O'Reilly logo
Architect's Guide to IBM CICS on System z

Book Description

IBM® CICS® Transaction Server (CICS TS) has been available in various guises for over 40 years, and continues to be one of the most widely used pieces of commercial software. This IBM Redbooks® publication helps application architects discover the value of CICS Transaction Server to their business.

This book can help architects understand the value and capabilities of CICS Transaction Server and the CICS tools portfolio. The book also provides detailed guidance on the leading practices for designing and integrating CICS applications within an enterprise, and the patterns and techniques you can use to create CICS systems that provide the qualities of service that your business requires.

Table of Contents

  1. Front cover
  2. Notices
    1. Trademarks
  3. Preface
    1. The team who wrote this book
    2. Now you can become a published author, too!
    3. Comments welcome
    4. Stay connected to IBM Redbooks
  4. Part 1 Why CICS
  5. Chapter 1. Business value of CICS
    1. 1.1 Today’s enterprise computing
      1. 1.1.1 Reliability
      2. 1.1.2 Business agility
      3. 1.1.3 Flexibility
      4. 1.1.4 Cost effectiveness
    2. 1.2 CICS: The smart choice
      1. 1.2.1 Simplifying the environment
      2. 1.2.2 Application design
      3. 1.2.3 Reliability
      4. 1.2.4 Creating a market advantage with CICS TS
    3. 1.3 CICS market presence
    4. 1.4 Cost effectiveness
      1. 1.4.1 Understanding the cost of CICS
      2. 1.4.2 Cost benefits of CICS qualities of service
    5. 1.5 The future of CICS
  6. Chapter 2. CICS capabilities
    1. 2.1 Agile development & deployment
      1. 2.1.1 CICS application programming interfaces
      2. 2.1.2 Programming languages
      3. 2.1.3 Java framework
      4. 2.1.4 Development and deployment lifecycle
      5. 2.1.5 CICS and cloud computing
    2. 2.2 Flexible integration options
    3. 2.3 Proven integrity
      1. 2.3.1 Transaction integrity
      2. 2.3.2 Data integrity
    4. 2.4 Secured environment
      1. 2.4.1 CICS security integration
      2. 2.4.2 End-to-end security
    5. 2.5 Highly available and scalable processing
      1. 2.5.1 High availability
      2. 2.5.2 Scalability
      3. 2.5.3 Techniques and facilitators
      4. 2.5.4 z/OS Workload Manager
    6. 2.6 Simplified administration with CICSPlex System Manager
  7. Part 2 Developing CICS applications
  8. Chapter 3. CICS application architecture
    1. 3.1 Application architecture
      1. 3.1.1 CICS application architecture principles
      2. 3.1.2 Reusable modular model
    2. 3.2 Adapter layer
      1. 3.2.1 Message serialization adapters
      2. 3.2.2 Adapter technology
    3. 3.3 Presentation layer
      1. 3.3.1 The 3270 terminals
      2. 3.3.2 Web support
      3. 3.3.3 Liberty JSP support
      4. 3.3.4 State management
    4. 3.4 Integration layer
      1. 3.4.1 Service flows
      2. 3.4.2 Enterprise service bus
    5. 3.5 Business layer
      1. 3.5.1 Business rules
      2. 3.5.2 Event processing
      3. 3.5.3 Transaction integrity
      4. 3.5.4 Threadsafe programming
    6. 3.6 Data access layer
      1. 3.6.1 Data stores
      2. 3.6.2 Batch integration
  9. Chapter 4. CICS application modernization
    1. 4.1 Introduction to application modernization
    2. 4.2 Business rules modernization overview
      1. 4.2.1 Analyzing existing CICS applications
      2. 4.2.2 Introduction to the business rules mining process
      3. 4.2.3 Preparation activities for rules mining process
      4. 4.2.4 Rule mining activities
    3. 4.3 Event processing in CICS
      1. 4.3.1 Why is events processing important to today’s business?
      2. 4.3.2 Key concepts about CICS event processing
      3. 4.3.3 How CICS events work
      4. 4.3.4 Events consumers
      5. 4.3.5 Designing event driven solutions for CICS
      6. 4.3.6 Business scenarios for CICS events
    4. 4.4 Reusing business logic from CICS applications
      1. 4.4.1 Migration from COMMAREAs to channels and containers
      2. 4.4.2 CICS integration options
      3. 4.4.3 Java Connector Architecture through CICS Transaction Gateway
      4. 4.4.4 JCA through WebSphere z/OS Optimized Local Adapters (WOLA)
      5. 4.4.5 CICS web support
      6. 4.4.6 Asynchronous messaging
      7. 4.4.7 CICS sockets
      8. 4.4.8 Integration options comparison
    5. 4.5 Modernizing data layer using CICS VSAM Transparency
    6. 4.6 Modernizing 3270 presentation layer
      1. 4.6.1 Front End Programming Interface (FEPI)
      2. 4.6.2 Rational Host Access Transformation Services (HATS)
      3. 4.6.3 CICS Link3270 bridge
      4. 4.6.4 Service Flow Modeler (SFM)
  10. Chapter 5. Application development lifecycle
    1. 5.1 CICS application development lifecycle
      1. 5.1.1 Eclipse-based environment
      2. 5.1.2 CICS Explorer
    2. 5.2 Procedural application development lifecycle
      1. 5.2.1 Application analysis and design
      2. 5.2.2 Development and build
      3. 5.2.3 Functional testing
      4. 5.2.4 Performance testing and tuning
      5. 5.2.5 Deployment to production
      6. 5.2.6 Service delivery management
    3. 5.3 Java application development and deployment lifecycle
      1. 5.3.1 Basic concepts of Java development in CICS
      2. 5.3.2 Java application development on CICS
      3. 5.3.3 Debugging and troubleshooting Java applications running on CICS
      4. 5.3.4 CICS diagnostics tools for Java
      5. 5.3.5 Profiling and tuning CICS Java applications
  11. Chapter 6. Exploring the CICS development tools
    1. 6.1 Rational tools
      1. 6.1.1 Rational Asset Analyzer
      2. 6.1.2 Rational Developer for System z
      3. 6.1.3 Rational Development and Test Environment for System z
      4. 6.1.4 Rational Team Concert
    2. 6.2 CICS and z/OS tools
      1. 6.2.1 CICS Interdependency Analyzer (IA)
      2. 6.2.2 z/OS Problem Determination Tools
      3. 6.2.3 CICS Performance Analyzer for z/OS
      4. 6.2.4 CICS Application Performance Analyzer for z/OS
      5. 6.2.5 CICS Configuration Manager for z/OS
      6. 6.2.6 CICS Deployment Assistant for z/OS
      7. 6.2.7 IBM Session Manager for z/OS
  12. Part 3 CICS system design
  13. Chapter 7. High availability and continuous operation
    1. 7.1 Availability requirements
      1. 7.1.1 Types of availability requirement
      2. 7.1.2 Unplanned outages
      3. 7.1.3 Planned outages
    2. 7.2 z/OS Parallel Sysplex and CICSplex
      1. 7.2.1 z/OS Parallel Sysplex
      2. 7.2.2 CICSplex
    3. 7.3 Data availability
      1. 7.3.1 CICS data requiring high availability
      2. 7.3.2 Application data requiring high availability
      3. 7.3.3 WebSphere MQ
    4. 7.4 Application availability
      1. 7.4.1 Transaction deadlocks
      2. 7.4.2 Application errors: Damage limitation
      3. 7.4.3 Isolating applications in separate CICS regions
  14. Chapter 8. Scalability and workload management
    1. 8.1 Building a scalable enterprise system
      1. 8.1.1 Scalable architecture
    2. 8.2 Single region considerations
      1. 8.2.1 Virtual storage constraint relief
      2. 8.2.2 CPU contention
      3. 8.2.3 Managing the workload in a single region
    3. 8.3 Multiregion considerations
      1. 8.3.1 Client access
      2. 8.3.2 Data access
      3. 8.3.3 Other multiregion considerations
      4. 8.3.4 Global CICS ENQ/DEQ
      5. 8.3.5 Considerations for multi-LPAR CICS regions
      6. 8.3.6 Communication options
      7. 8.3.7 Workload management in a CICSplex
      8. 8.3.8 Workload separation
      9. 8.3.9 Preparing for workload management
  15. Chapter 9. Security and auditing
    1. 9.1 Security requirements
    2. 9.2 Authentication and identification
      1. 9.2.1 Considerations
      2. 9.2.2 Identification
      3. 9.2.3 CICS and identity propagation: The end-to-end security solution
    3. 9.3 Authorization
      1. 9.3.1 Securing access to resources
      2. 9.3.2 Securing access to DB2
      3. 9.3.3 Intercommunication security
      4. 9.3.4 Securing network access
    4. 9.4 Integrity
      1. 9.4.1 System z security and integrity capabilities
      2. 9.4.2 CICS storage protection and transaction isolation
    5. 9.5 Confidentiality
    6. 9.6 Cryptography
    7. 9.7 Auditing and non-repudiation
      1. 9.7.1 Auditing unauthorized access to CICS resources
      2. 9.7.2 Auditing updates to CICS resource definitions
      3. 9.7.3 Auditing updates to CICS application programs
      4. 9.7.4 Non-repudiation
  16. Part 4 Appendix and related publications
  17. Appendix A. Supported standards
    1. Networking standards
    2. Web service standards
    3. Security standards
    4. Other standards and frameworks
  18. Related publications
    1. IBM Redbooks
    2. Other publications
    3. Online resources
    4. Help from IBM
  19. Back cover