Glossary

This glossary defines the terms and abbreviations used in CICS Transaction Gateway and in the information centers.

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z

A
abnormal end of task (abend)
The termination of a task, job, or subsystem because of an error condition that recovery facilities cannot resolve.
Advanced program-to-program communication (APPC)
An implementation of the SNA/SDLC LU 6.2 protocol that allows interconnected systems to communicate and share the processing of programs. The Client daemon uses APPC to communicate with CICS® systems.
APAR
See Authorized program analysis report.
API
See application programming interface.
APPC
See Advanced program-to-program communication.
application programming interface (API)
A functional interface that allows an application program that is written in a high-level language to use specific data or functions of the operating system or another program.
APPLID
  1. On CICS Transaction Gateway: The application identifier that is used to identify connections on the CICS server and tasks in a CICSplex. See also APPLID qualifier and fully-qualified APPLID.
  2. On CICS Transaction Server: The name by which a CICS system is known in a network of interconnected CICS systems. CICS Transaction Gateway application identifiers do not need to be defined in SYS1.VTAMLST. The CICS APPLID is specified in the APPLID system initialization parameter.
APPLID qualifier
Optionally used as a high-level qualifier for the APPLID to form a fully-qualified APPLID. See also APPLID and fully-qualified APPLID.
ARM
See automatic restart manager.
Authorized program analysis report (APAR)
A request for correction of a defect in a current release of an IBM-supplied program.
ATI
See automatic transaction initiation.
attach
In SNA, the request unit that flows on a session to initiate a conversation.
Attach Manager
The component of APPC that matches attaches received from remote computers to accepts issued by local programs.
autoinstall
A method of creating and installing resources dynamically as terminals log on, and deleting them at logoff.
automatic restart manager (ARM)
A z/OS® recovery function that can improve the availability of specific batch jobs or started tasks, and therefore result in faster resumption of productive work.
automatic transaction initiation (ATI)
The initiation of a CICS transaction by an internally generated request, for example, the issue of an EXEC CICS START command or the reaching of a transient data trigger level. CICS resource definition can associate a trigger level and a transaction with a transient data destination. When the number of records written to the destination reaches the trigger level, the specified transaction is automatically initiated.

TOP

B

bean
A definition or instance of a JavaBeans component. See also JavaBeans.
bean-managed transaction
A transaction where the JEE bean itself is responsible for administering transaction tasks such as committal or rollback. See also container-managed transaction.
BIND command
In SNA, a request to activate a session between two logical units (LUs).
business logic
The part of a distributed application that is concerned with the application logic rather than the user interface of the application. Compare with presentation logic.

TOP

C

CA
See certificate authority.
CCIN
The CCIN transaction is invoked by the Client daemon, for each TCP/IP or SNA connection established. CCIN installs a Client connection on the CICS server.
CCSID
Coded Character Set Identifier. A 16-bit number that includes a specific set of encoding scheme identifiers, character set identifiers, code page identifiers, and other information that uniquely identifies the coded graphic-character representation.
CTIN
The CTIN transaction is invoked by the Client daemon to install a Client terminal definition on the CICS server.
callback
A way for one thread to notify another application thread that an event has happened.
certificate authority (CA)
In computer security, an organization that issues certificates. The certificate authority authenticates the certificate owner's identity and the services that the owner is authorized to use. It issues new certificates and revokes certificates from users who are no longer authorized to use them.
change-number-of-sessions (CNOS)
An internal transaction program that regulates the number of parallel sessions between the partner LUs with specific characteristics.
channel
A channel is a set of containers, grouped together to pass data to CICS. There is no limit to the number of containers that can be added to a channel, and the size of individual containers is limited only by the amount of storage that you have available.
CICS connectivity components
A generic reference to the Client daemon, EXCI, and the IPIC protocol.
CICS connectivity components
The Client daemon, the EXCI (External CICS Interface), and the IPIC (IP Interconnectivity) protocol are collectively called the 'CICS connectivity components'. The Client daemon handles the TCP/IP and the SNA protocols.
CICS Request Exit
An exit that is invoked by the CICS Transaction Gateway for z/OS at run time to determine which CICS server to use.
CICS server name
A defined server known to CICS Transaction Gateway.
CICS TS
Abbreviation of CICS Transaction Server.
class
In object-oriented programming, a model or template that can be instantiated to create objects with a common definition and therefore, common properties, operations, and behavior. An object is an instance of a class.
CLASSPATH
In the execution environment, an environment variable keyword that specifies the directories in which to look for class and resource files.
Client API
The Client API is the interface used by Client applications to interact with CICS using the Client daemon. See External Call Interface, External Presentation Interface, and External Security Interface.
Client application
The client application is a user application written in a supported programming language that uses one or more of the CICS Transaction Gateways APIs.
Client daemon
The Client daemon manages TCP/IP and SNA connections to CICS servers on UNIX, Linux, and Windows. It processes ECI, EPI, and ESI requests, sending and receiving the appropriate flows to and from the CICS server to satisfy Client application requests. It can support concurrent requests to one or more CICS servers. The CICS Transaction Gateway initialization file defines the operation of the Client daemon and the servers and protocols used for communication.
client/server
Pertaining to the model of interaction in distributed data processing in which a program on one computer sends a request to a program on another computer and awaits a response. The requesting program is called a client; the answering program is called a server.
CNOS
See Change-Number-of-Sessions.
code page
An assignment of hexadecimal identifiers (code points) to graphic characters. Within a given code page, a code point can have only one meaning.
color mapping file
A file that is used to customize the 3270 screen color attributes on client workstations.
COMMAREA
See communication area.
commit phase
The second phase in a XA process. If all participants acknowledge that they are prepared to commit , the transaction manager issues the commit request. If any participant is not prepared to commit the transaction manager issues a back-out request to all participants.
communication area (COMMAREA)
A communication area that is used for passing data both between programs within a transaction and between transactions.
Configuration file
A file that specifies the characteristics of a program, system device, server or network.
connection
In data communication, an association established between functional units for conveying information.
In Open Systems Interconnection architecture, an association established by a given layer between two or more entities of the next higher layer for the purpose of data transfer.
In TCP/IP, the path between two protocol application that provides reliable data stream delivery service.
In Internet, a connection extends from a TCP application on one system to a TCP application on another system.
container
A container is a named block of data designed for passing information between programs. A container is a "named COMMAREA" that is not limited to 32KB. Containers are grouped together in sets called channels.
container-managed transaction
A transaction where the EJB container is responsible for administration of tasks such as committal or rollback. See also bean-managed transaction.
control table
In CICS, a storage area used to describe or define the configuration or operation of the system.
conversation
A connection between two programs over a session that allows them to communicate with each other while processing a transaction.
conversation security
In APPC, a process that allows validation of a user ID or group ID and password before establishing a connection.

TOP

D

daemon
A program that runs unattended to perform continuous or periodic systemwide functions, such as network control. A daemon can be launched automatically, such as when the operating system is started, or manually.
data link control (DLC)
A set of rules used by nodes on a data link (such as an SDLC link or a token ring) to accomplish an orderly exchange of information.
DBCS
See double-byte character set.
default CICS server
The CICS server that is used if a server name is not specified on an ECI, EPI, or ESI request. The default CICS server name is defined as a product wide setting in the configuration file (ctg.ini).
dependent logical unit
A logical unit that requires assistance from a system services control point (SSCP) to instantiate an LU-to-LU session.
deprecated
Pertaining to an entity, such as a programming element or feature, that is supported but no longer recommended, and that might become obsolete.
digital certificate
An electronic document used to identify an individual, server, company, or some other entity, and to associate a public key with the entity. A digital certificate is issued by a certificate authority and is digitally signed by that authority.
digital signature
Information that is encrypted with an entity's private key and is appended to a message to assure the recipient of the authenticity and integrity of the message. The digital signature proves that the message was signed by the entity that owns, or has access to, the private key or shared secret symmetric key.
distinguished name
The name that uniquely identifies an entry in a directory. A distinguished name is made up of attribute:value pairs, separated by commas. The format of a distinguished name is defined by RFC4514. For more information, see http://www.ietf.org/rfc/rfc4514.txt. See also realm name and identity propagation.
distributed application
An application for which the component application programs are distributed between two or more interconnected processors.
distributed identity
User identity information that originates from a remote system. The distributed identity is created in one system and is passed to one or more other systems over a network. See also distinguished name and realm name.
distributed processing
The processing of different parts of the same application in different systems, on one or more processors.
distributed program link (DPL)
A link that enables an application program running on one CICS system to link to another application program running in another CICS system.
DLC
See data link control.
DLL
See dynamic link library.
domain
In the Internet, a part of a naming hierarchy in which the domain name consists of a sequence of names (labels) separated by periods (dots).
domain name
In TCP/IP, a name of a host system in a network.
domain name server
In TCP/IP, a server program that supplies name-to-address translation by mapping domain names to IP addresses. Synonymous with name server.
dotted decimal notation
The syntactical representation for a 32-bit integer that consists of four 8-bit numbers written in base 10 with periods (dots) separating them. It is used to represent IP addresses.
double-byte character set (DBCS)
A set of characters in which each character is represented by 2 bytes. Languages such as Japanese, Chinese and Korean, which contain more symbols than can be represented by 256 code points, require double-byte character sets. Because each character requires 2 bytes, the typing, display, and printing of DBCS characters requires hardware and programs that support DBCS. Contrast with single-byte character set.
DPL
See distributed program link.
dynamic link library (DLL)
A collection of runtime routines made available to applications as required.
dynamic server selection (DSS)
The mapping of a logical CICS server name to an actual CICS server name at run time.

TOP

E

EBCDIC
See extended binary-coded decimal interchange code.
ECI
See external call interface.
EJB
See Enterprise JavaBeans.
emulation program
A program that allows a host system to communicate with a workstation in the same way as it would with the emulated terminal.
emulator
A program that causes a computer to act as a workstation attached to another system.
encryption
The process of transforming data into an unintelligible form in such a way that the original data can be obtained only by using a decryption process.
enterprise bean
A Java™ component that can be combined with other resources to create JEE applications. There are three types of enterprise beans: entity beans, session beans, and message-driven beans.
Enterprise Information System (EIS)
The applications that comprise an enterprise's existing system for handling company-wide information. An enterprise information system offers a well-defined set of services that are exposed as local or remote interfaces or both.
Enterprise JavaBeans (EJB)
A component architecture defined by Sun Microsystems for the development and deployment of object-oriented, distributed, enterprise-level applications (JEE).
environment variable
A variable that specifies the operating environment for a process. For example, environment variables can describe the home directory, the command search path, the terminal in use, and the current time zone.
EPI
See external presentation interface.
ESI
See external security interface.
Ethernet
A local area network that allows multiple stations to access the transmission medium at will without prior coordination, avoids contention by using carrier sense and deference, and resolves contention by using collision detection and transmission. Ethernet uses carrier sense multiple access with collision detection (CSMA/CD).
EXCI
See external CICS interface.
extended binary-coded decimal interchange code (EBCDIC)
A coded character set of 256 8-bit characters developed for the representation of textual data.
extended logical unit of work (extended LUW)
A logical unit of work that is extended across successive ECI requests to the same CICS server.
external call interface (ECI)
A facility that allows a non CICS program to run a CICS program. Data is exchanged in a COMMAREA or a channel as for usual CICS interprogram communication.
external communications interface (EXCI)
An MVS™ application programming interface provided by CICS Transaction Server for z/OS that enables a non-CICS program to call a CICS program and to pass and receive data using a COMMAREA. The CICS application program is started as if linked-to by another CICS application program.
external presentation interface (EPI)
A facility that allows a non CICS program to appear to CICS as one or more standard 3270 terminals. 3270 data can be presented to the user by emulating a 3270 terminal or by using a graphical user interface.
external security interface (ESI)
A facility that enables client applications to verify and change passwords for user IDs on CICS servers.
External Security Manager (ESM)
A security manager that operates outside CICS. For example, RACF® can be used as an external security manager with CICS Transaction Server.

TOP

F

firewall
A configuration of software that prevents unauthorized traffic between a trusted network and an untrusted network.
FMH
See function management header.
fully-qualified APPLID
Used to identify CICS Transaction Gateway connections on the CICS server and tasks in a CICSplex. It is composed of an APPLID with an optional network qualifier. See also APPLID and APPLID qualifier.
function management header (FMH)
One or more headers, optionally present in the leading request units (RUs) of an RU chain, that allow one LU to (a) select a transaction program or device at the session partner and control the way in which the end-user data it sends is handled at the destination, (b) change the destination or the characteristics of the data during the session, and (c) transmit between session partners status or user information about the destination (for example, a program or device). Function management headers can be used with LU type 1, 4, and 6.2 protocols.

TOP

G

Gateway
A device or program used to connect two systems or networks.
Gateway classes
The Gateway classes provide APIs for ECI, EPI, and ESI that allow communication between Java client applications and the Gateway daemon.
Gateway daemon
A long-running Java process that listens for network requests from remote Client applications. It issues these requests to CICS servers using the CICS connectivity components. The Gateway daemon on z/OS processes ECI requests and on UNIX, Windows, and Linux platforms it process EPI and ESI requests as well. The Gateway daemon uses the GATEWAY section of ctg.ini for its configuration.
Gateway group
A set of Gateway daemons that share an APPLID qualifier, and where each Gateway daemon has a unique APPLID within the Gateway group.
Gateway token
A token that represents a specific Gateway daemon, when a connection is established successfully. Gateway tokens are used in the C language statistics and ECI V2 APIs.
global transaction
A recoverable unit of work performed by one or more resource managers in a distributed transaction processing environment and coordinated by an external transaction manager.

TOP

H

HA group
See highly available Gateway group.
highly available Gateway group (HA group)
A Gateway group that utilizes TCP/IP load balancing, and can be viewed as a single logical Gateway daemon. A Gateway daemon instance in a HA group can recover indoubt XA transactions on behalf of another Gateway daemon within the HA group
host
A computer that is connected to a network (such as the Internet or an SNA network) and provides an access point to that network. The host can be any system; it does not have to be a mainframe.
host address
An IP address that is used to identify a host on a network.
host ID
In TCP/IP, that part of the IP address that defines the host on the network. The length of the host ID depends on the type of network or network class (A, B, or C).
host name
In the Internet suite of protocols, the name given to a computer. Sometimes, host name is used to mean the fully qualified domain name; other times, it is used to mean the most specific subname of a fully qualified domain name. For example, if mycomputer.city.company.com is the fully qualified domain name, either of the following can be considered the host name: mycomputer.city.company.com, mycomputer.
hover help
Information that can be viewed by holding a mouse over an item such as an icon in the user interface.
HTTP
See Hypertext Transfer Protocol.
HTTPS
See Hypertext Transfer Protocol Secure.
Hypertext Transfer Protocol (HTTP)
In the Internet suite of protocols, the protocol that is used to transfer and display hypertext and XML documents.
Hypertext Transfer Protocol Secure (HTTPS)
A TCP/IP protocol that is used by World Wide Web servers and Web browsers to transfer and display hypermedia documents securely across the Internet.

TOP

I

ID data
An ID data structure holds an individual result from a statistical API function.
identity propagation
The concept of preserving a user's security identity information (the distributed identity) independent of where the identity information has been created, for use during authorization and for auditing purposes. The distributed identity is carried with a request from the distributed client application to the CICS server, and is incorporated in the access control of the server as part of the authorization process, for example, using RACF. CICS Transaction Gateway flows the distributed identity to CICS. See also distributed identity.
identity propagation login module
A code component that provides support for identity propagation. The identity propagation login module is included with the CICS Transaction Gateway ECI resource adapter (cicseci.rar), conforms to the JAAS specification and is contained in a single Java class within the resource adapter. See also identity propagation.
iKeyman
A tool for maintaining digital certificates for JSSE.
in doubt
The state of a transaction that has completed the prepare phase of the two-phase commit process and is waiting to be completed.
in flight
The state of a transaction that has not yet completed the prepare phase of the two-phase commit process.
independent logical unit
A logical unit (LU) that can both send and receive a BIND, and which supports single, parallel, and multiple sessions. See BIND.
<install_path>
This term is used in file paths to represent the directory where you installed the product. For more information, see File path terminology.
Internet Architecture Board
The technical body that oversees the development of the internet suite of protocols known as TCP/IP.
Internet Protocol (IP)
In TCP/IP, a protocol that routes data from its source to its destination in an Internet environment.
interoperability
The capability to communicate, run programs, or transfer data among various functional units in a way that requires the user to have little or no knowledge of the unique characteristics of those units.
IP
Internet Protocol.
IPIC
See IP interconnectivity.
IP address
A unique address for a device or logical unit on a network that uses the IP standard.
IP interconnectivity (IPIC)
The IPIC protocol enables Distributed Program Link (DPL) access from a non-CICS program to a CICS program over TCP/IP, using the External Call Interface (ECI). IPIC passes and receives data using COMMAREAs, or containers.

TOP

J

JEE (formerly J2EE)
See Java 2 Platform Enterprise Edition
JEE Connector architecture (JCA)
A standard architecture for connecting the JEE platform to heterogeneous enterprise information systems (EIS).
Java
An object-oriented programming language for portable interpretive code that supports interaction among remote objects.
Java 2 Platform Enterprise Edition (JEE)
An environment for developing and deploying enterprise applications, defined by Sun Microsystems Inc. The JEE platform consists of a set of services, application programming interfaces (APIs), and protocols that allow multi-tiered, Web-based applications to be developed.
JavaBeans
As defined for Java by Sun Microsystems, a portable, platform-independent, reusable component model.
Java Client application
The Java client application is a user application written in Java, including servlets and enterprise beans, that uses the Gateway classes.
Java Development Kit (JDK)
The name of the software development kit that Sun Microsystems provided for the Java platform, up to and including v 1.1.x. Sometimes used erroneously to mean the Java platform or as a generic term for any software developer kits for Java.
JavaGateway
The URL of the CICS Transaction Gateway with which the Java Client application communicates. The JavaGateway takes the form protocol://address:port. These protocols are supported: tcp://, ssl://, and local:. CICS Transaction Gateway runs with the default port value of 2006. This parameter is not relevant if you are using the protocol local:. For example, you might specify a JavaGateway of tcp://ctg.business.com:2006. If you specify the protocol as local: you will connect directly to the CICS server, bypassing any CICS Transaction Gateway servers.
Java Native Interface (JNI)
A programming interface that allows Java code running in a Java virtual machine to work with functions that are written in other programming languages.
Java Runtime Environment (JRE)
A subset of the Java Software Development Kit (SDK) that supports the execution, but not the development, of Java applications. The JRE comprises the Java Virtual Machine (JVM), the core classes, and supporting files.
Java Secure Socket Extension (JSSE)
A Java package that enables secure Internet communications. It implements a Java version of the Secure Sockets Layer (SSL) and Transport Layer Security (TSL) protocols and supports data encryption, server authentication, message integrity, and optionally client authentication.
Java virtual machine (JVM)
A software implementation of a processor that runs compiled Java code (applets and applications).
JDK
See Java development kit.
JCA
See JEE Connector Architecture .
JNI
See Java Native Interface.
JRE
See Java Runtime Environment
JSSE
See Java Secure Socket Extension.
JVM
See Java Virtual Machine.

TOP

K

keyboard mapping
A list that establishes a correspondence between keys on the keyboard and characters displayed on a display screen, or action taken by a program, when that key is pressed.
Keystore
In the JSSE protocol, a file that contains public keys, private keys, trusted roots, and certificates.

TOP

L

local mode
Local mode describes the use of the CICS Transaction Gateway local protocol. The Gateway daemon is not used in local mode.
local transaction
A recoverable unit of work managed by a resource manager and not coordinated by an external transaction manager.
logical CICS server
An alias that can be passed on an ECI request when running in remote mode to CICS Transaction Gateway for z/OS. The alias name is mapped to an actual CICS server name by a dynamic server selection (DSS) mechanism.
logical end of day
The local time of day on the 24-hour clock to which a Gateway daemon aligns statistics intervals. If the statistics interval is 24 hours, this is the local time at which interval statistics will be reset and, on z/OS, optionally recorded to SMF. This time is set using the stateod parameter in the configuration file (ctg.ini).
logical unit (LU)
In SNA, a port through which an end user accesses the SNA network to communicate with another end user and through which the end user accesses the functions provided by system services control points (SSCP). An LU can support at least two sessions, one with an SSCP and one with another LU, and might be capable of supporting many sessions with other logical units. See also network addressable unit, primary logical unit, secondary logical unit.
logical unit 6.2 (LU 6.2)
A type of logical unit that supports general communications between programs in a distributed processing environment.
The LU type that supports sessions between two applications using APPC.
logical unit of work (LUW)
The processing that a program performs between synchronization points
LU
See logical unit.
LU 6.2
See logical unit 6.2.
LU-LU session
In SNA, a session between two logical units (LUs) in an SNA network. It provides communication between two end users, or between an end user and an LU services component.
LU-LU session type 6.2
In SNA, a type of session for communication between peer systems. Synonymous with APPC protocol.
LUW
See logical unit of work.

TOP

M

managed mode
Describes an environment in which connections are obtained from connection factories that the JEE server has set up. Such connections are owned by the JEE server.
media access control (MAC) sublayer
One of two sublayers of the ISO Open Systems Interconnection data link layer proposed for local area networks by the IEEE Project 802 Committee on Local Area Networks and the European Computer Manufacturers Association (ECMA). It provides functions that depend on the topology of the network and uses services of the physical layer to provide services to the logical link control (LLC) sublayer. The OSI data link layer corresponds to the SNA data link control layer.
method
In object-oriented programming, an operation that an object can perform. An object can have many methods.
mode
In SNA, a set of parameters that defines the characteristics of a session between two LUs.

TOP

N

name server
In TCP/IP, synonym for Domain Name Server. In Internet communications, a host that translates symbolic names assigned to networks and hosts into IP addresses.
NAU
See network addressable unit.
network address
In SNA, an address, consisting of subarea and element fields, that identifies a link, link station, or network addressable unit (NAU). Subarea nodes use network addresses; peripheral nodes use local addresses. The boundary function in the subarea node to which a peripheral node is attached transforms local addresses to network addresses and vice versa. See also network name.
network addressable unit (NAU)
In SNA, a logical unit, a physical unit, or a system services control point. The NAU is the origin or the destination of information transmitted by the path control network. See also logical unit, network address, network name.
network name
In SNA, the symbolic identifier by which end users refer to a network addressable unit (NAU), link station, or link. See also network address.
node type
In SNA, a designation of a node according to the protocols it supports and the network addressable units (NAUs) it can contain. Four types are defined: 1, 2, 4, and 5. Type 1 and type 2 nodes are peripheral nodes; type 4 and type 5 nodes are subarea nodes.
nonextended logical unit of work
See SYNCONRETURN.
nonmanaged mode
An environment in which the application is responsible for generating and configuring connection factories. The JEE server does not own or know about these connection factories and therefore provides no Quality of Service facilities.

TOP

O

object
In object-oriented programming, a concrete realization of a class that consists of data and the operations associated with that data.
object-oriented (OO)
Describing a computer system or programming language that supports objects.
one-phase commit
A protocol with a single commit phase, that is used for the coordination of changes to recoverable resources when a single resource manager is involved.
OO
See object-oriented.

TOP

P

pacing
A technique by which a receiving station controls the rate of transmission of a sending station to prevent overrun.
parallel session
In SNA, two or more concurrently active sessions between the same two LUs using different pairs of network addresses. Each session can have independent session parameters.
PING
In Internet communications, a program used in TCP/IP networks to test the ability to reach destinations by sending the destinations an Internet Control Message Protocol (ICMP) echo request and waiting for a reply.
partner logical unit (PLU)
In SNA, the remote participant in a session.
partner transaction program
The transaction program engaged in an APPC conversation with a local transaction program.
password phrase
A character string, between 9 and 100 characters in length, that is used for authentication when a user signs on to CICS. Because a password phrase can provide an exponentially greater number of possible combinations of characters than a standard 8 character password, the use of password phrases can enhance system security. Password phrases are verified by the External Security Manager (ESM), and can contain alphanumeric characters, and any of the other non alphanumeric characters that are supported by the ESM. See also External Security Manager (ESM).
PLU
See primary logical unit and partner logical unit.
port
An endpoint for communication between devices, generally referring to a logical connection. A 16-bit number identifying a particular Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) resource within a given TCP/IP node.
port sharing
A way of load balancing TCP/IP connections across a group of servers running in the same z/OS image.
prepare phase
The first phase of a XA process in which all participants are requested to confirm readiness to commit.
presentation logic
The part of a distributed application that is concerned with the user interface of the application. Compare with business logic.
primary logical unit (PLU)
In SNA, the logical unit that contains the primary half-session for a particular logical unit-to-logical unit (LU-to-LU) session. See also secondary logical unit.
<product_data_path>
This term represents the directory used by the Windows CICS Transaction Gateway for common application data. For more information, see File path terminology.
protocol boundary
The signals and rules governing interactions between two components within a node.

TOP

Q

Query strings
Query strings are used in the statistical data API. A query string is an input parameter, specifying the statistical data to be retrieved.

TOP

R

RACF
See Resource Access Control Facility.
realm
A named collection of users and groups that can be used in a specific security context. See also distinguished name and identity propagation.
Recoverable resource management services (RRMS)
The registration services, context services, and resource recovery services provided by the z/OS sync point manager that enable consistent changes to be made to multiple protected resources.
Resource Access Control Facility (RACF)
An IBM® licensed program that provides access control by identifying users to the system; verifying users of the system; authorizing access to protected resources; logging detected unauthorized attempts to enter the system; and logging detected accesses to protected resources.
region
In workload management on CICS Transaction Gateway for Windows, an instance of a CICS server.
remote mode
Remote mode describes the use of one of the supported CICS Transaction Gateway network protocols to connect to the Gateway daemon.
remote procedure call (RPC)
A protocol that allows a program on a client computer to run a program on a server. 
Request monitoring exits
Exits that provide information about individual requests as they are processed by the CICS Transaction Gateway.
request unit (RU)
In SNA, a message unit that contains control information such as a request code, or function management (FM) headers, end-user data, or both.
request/response unit
A generic term for a request unit or a response unit. See also request unit and response unit.
response file
A file that contains predefined values that is used instead of someone having to enter those values one at a time. See also CID methodology.
response unit (RU)
A message unit that acknowledges a request unit; it can contain prefix information received in a request unit.
Resource adapter
A system-level software driver that is used by an EJB container or an application client to connect to an enterprise information system (EIS). A resource adapter plugs in to a container; the application components deployed on the container then use the client API (exposed by adapter) or tool-generated, high-level abstractions to access the underlying EIS.
resource group ID
A resource group ID is a logical grouping of resources, grouped for statistical purposes. A resource group ID is associated with a number of resource group statistics, each identified by a statistic ID.
resource ID
A resource ID refers to a specific resource. Information about the resource is included in resource-specific statistics. Each statistic is identified by a statistic ID.
resource manager
The participant in a transaction responsible for controlling access to recoverable resources. In terms of the CICS resource adapters this is represented by an instance of a ConnectionFactory.
Resource Recovery Services (RRS)
A z/OS facility that provides two-phase sync point support across participating resource managers.
Result set
A result set is a set of data calculated or recorded by a statistical API function.
Result set token
A result set token is a reference to the set of results returned by a statistical API function.
rollback
An operation in a transaction that reverses all the changes made during the unit of work. After the operation is complete, the unit of work is finished. Also known as a backout.
RU
See Request unit and Response unit.
RPC
See remote procedure call.
RRMS
See Recoverable resource management services.
RRS
See Resource Recovery Services.

TOP

S

SBCS
See single-byte character set.
secondary logical unit (SLU)
In SNA, the logical unit (LU) that contains the secondary half-session for a particular LU-LU session. Contrast with primary logical unit. See also logical unit.
Secure Sockets Layer (SSL)
A security protocol that provides communication privacy. SSL enables client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, and message forgery. SSL applies only to internet protocols, and is not applicable to SNA.
server name remapping
See dynamic server selection.
servlet
A Java program that runs on a Web server and extends the server's functionality by generating dynamic content in response to Web client requests. Servlets are commonly used to connect databases to the Web.
session limit
In SNA, the maximum number of concurrently active logical unit to logical unit (LU-to-LU) sessions that a particular logical unit (LU) can support.
silent installation
Installation that does not display messages or windows during its progress. Silent installation is not a synonym of "unattended installation", although it is often improperly used as such.
single-byte character set (SBCS)
A character set in which each character is represented by 1 byte. Contrast with double-byte character set.
sign-on capable terminal
A sign-on capable terminal allows sign-on transactions that are either supplied with CICS (CESN) or written by the user, to be run. Contrast with sign-on incapable terminal.
SIT
See system initialization table.
SLU
See secondary logical unit.
SMF
The z/OS System Management Facility (SMF) collects and records system and job-related information that your z/OS installation can use for reporting, billing, analysis, profiling, and maintaining system security. CICS TG for z/OS writes statistical data to SMF.
SMIT
See System Management Interface Tool.
SNA
See Systems Network Architecture.
SNA sense data
An SNA-defined encoding of error information In SNA, the data sent with a negative response, indicating the reason for the response.
SNASVCMG mode name
The SNA service manager mode name. This is the architecturally-defined mode name identifying sessions on which CNOS is exchanged. Most APPC-providing products predefine SNASVCMG sessions.
socket
A network communication concept, typically representing a point of connection between a client and a server. A TCP/IP socket will normally combine a host name or IP address, and a port number.
SSL
See Secure Sockets Layer.
SSLight
An implementation of SSL, written in Java, and no longer supported by CICS Transaction Gateway.
statistic data
A statistic data structure holds individual statistical result returned after calling a statistical API function.
statistic group
A generic term for a collection of statistic IDs.
statistic ID
A label referring to a specific statistic. A statistic ID is used to retrieve specific statistical data, and always has a direct relationship with a statistic group.
standard error
In many workstation-based operating systems, the output stream to which error messages or diagnostic messages are sent.
subnet
An interconnected, but independent segment of a network that is identified by its Internet Protocol (IP) address.
subnet address
In Internet communications, an extension to the basic IP addressing scheme where a portion of the host address is interpreted as the local network address.
sync point
Synchronization point. During transaction processing, a reference point to which protected resources can be restored if a failure occurs.
SYNCONRETURN
A request where the CICS server takes a sync point on successful completion of the server program. Changes to recoverable resources made by the server program are committed or rolled-back independently of changes to recoverable resources made by the client program issuing the ECI request, or changes made by the server in any subsequent ECI request. Also referred to as a nonextended logical unit of work.
system initialization table (SIT)
A table containing parameters used to start a CICS control region.
System Management Command
An administrative request received by a Gateway daemon (or Gateway daemon address space on z/OS) from the ctgadmin command (on UNIX, Linux, or Windows) or the z/OS console. The request might be made to retrieve information about the Gateway daemon, or to alter some aspect of Gateway daemon behavior. Typically, a ctgadmin command in the form ctgadmin <command string> is entered by an operator using the command line interface, or a modify command in the form /F <job name>,APPL=<command string> is entered by an operator on the z/OS console.
System Management Interface Tool (SMIT)
An interface tool of the AIX® operating system for installing, maintaining, configuring, and diagnosing tasks.
Systems Network Architecture (SNA)
An architecture that describes the logical structure, formats, protocols, and operational sequences for transmitting information units through the networks and also the operational sequences for controlling the configuration and operation of networks.
System SSL
An implementation of SSL, no longer supported by CICS Transaction Gateway on z/OS.

TOP

T

TCP/IP
See Transmission Control Protocol/Internet Protocol.
TCP/IP load balancing
The ability to distribute TCP/IP connections across target servers.
terminal emulation
The capability of a personal computer to operate as if it were a particular type of terminal linked to a processing unit and to access data. See also emulator, emulation program.
thread
A stream of computer instructions that is in control of a process. In some operating systems, a thread is the smallest unit of operation in a process. Several threads can run concurrently, performing different jobs.
timeout
A time interval that is allotted for an event to occur or complete before operation is interrupted.
TLS
See Transport Layer Security.
token-ring network
A local area network that connects devices in a ring topology and allows unidirectional data transmission between devices by a token-passing procedure. A device must receive a token before it can transmit data.
trace
A record of the processing of a computer program. It exhibits the sequences in which the instructions were processed.
transaction manager
A software unit that coordinates the activities of resource managers by managing global transactions and coordinating the decision to commit them or roll them back.
transaction program
A program that uses the Advanced Program-to-Program Communications (APPC) application programming interface (API) to communicate with a partner application program on a remote system.
Transmission Control Protocol/Internet Protocol (TCP/IP)
An industry-standard, nonproprietary set of communications protocols that provide reliable end-to-end connections between applications over interconnected networks of different types.
Transport Layer Security (TLS)
A security protocol that provides communication privacy. TLS enables client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, and message forgery. TLS applies only to internet protocols, and is not applicable to SNA. TLS is also known as SSL 3.1.
Two-phase commit
A protocol with both a prepare and a commit phase, that is used for the coordination of changes to recoverable resources when more than one resource manager is used by a single transaction.
type 2.0 node
A node that attaches to a subarea network as a peripheral node and provides a range of end-user services but no intermediate routing services.
type 2.1 node
An SNA node that can be configured as an endpoint or intermediate routing node in a network, or as a peripheral node attached to a subarea network.

TOP

U

unattended installation
Unattended installation is installation performed without user interaction during its progress, or, with no user present at all, except for the initial launch of the process. -
Uniform Resource Locator (URL)
A sequence of characters that represent information resources on a computer or in a network such as the Internet. This sequence of characters includes (a) the abbreviated name of the protocol used to access the information resource and (b) the information used by the protocol to locate the information resource.
unit of recovery (UR)
A defined package of work to be performed by the RRS.
unit of work (UOW)
A recoverable sequence of operations performed by an application between two points of consistency. A unit of work begins when a transaction starts or at a user-requested sync point. It ends either at a user-requested sync point or at the end of a transaction.
UOW
See unit of work.
UR
See unit of recovery.
URL
See Uniform Resource Locator.
user registry
The location where the distinguished name of a user is defined and authenticated. See also distinguished name.
user session
Any APPC session other than a SNASVCMG session.

TOP

V

verb
A reserved word that expresses an action to be taken by an application programming interface (API), a compiler, or an object program.
In SNA, the general name for a transaction program's request for communication services.
version string
A character string containing version information about the statistical data API.

TOP

W

WAN
See wide area network.
Web browser
A software program that sends requests to a Web server and displays the information that the server returns.
Web server
A software program that responds to information requests generated by Web browsers.
wide area network (WAN)
A network that provides communication services to a geographic area larger than that served by a local area network or a metropolitan area network, and that can use or provide public communication facilities.
Wrapping trace
On Windows, UNIX, and Linux, a configuration in which the Maximum Client wrap size setting is greater than 0. The total size of Client daemon binary trace files is limited to the value specified in the Maximum Client wrap size setting. With standard I/O tracing, two files, called cicscli.bin and cicscli.wrp, are used; each can be up to half the size of the Maximum Client wrap size.

TOP

X

XA request
Any request sent or received by the CICS Transaction Gateway in support of an XA transaction. These requests include the XA commands commit, complete, end, forget, prepare, recover, rollback, and start.
XA transaction
A global transaction that adheres to the X/Open standard for distributed transaction processing (DTP.)

Information Information

Feedback


Timestamp icon Last updated: Tuesday, 19 November 2013


https://ut-ilnx-r4.hursley.ibm.com/tg_latest/help/topic/com.ibm.cics.tg.doc//common/gloss.html