- abbreviated
trace
- Optional format for CICS trace entries which summarizes
the information in full trace entries. Each trace entry is described by a
single line of text that is usually sufficient for debugging. See the CICS® Problem Determination Guidefor further information about trace. Also see full trace.
- absolute time
- (1) A point in time relative to a selected previous
point in time from which the timescale (or measurement of time) begins. For
example if you wanted to start a batch job using absolute time and the timescale
begins at midnight, then specifying an absolute time of 07:00 would mean that
the batch job runs at 7am. If the timescale begins at 9am with an absolute
time of 07:00, the batch job would run at 4pm.
- (2) As returned by
an EXEC CICS ASKTIME command and input to an EXEC CICS FORMATTIME command,
the number of milliseconds since 00.00 on 1 January 1900.
- ACB
- See access method control block (ACB).
- access
- The ability to read, update, or otherwise
use a resource. Access to protected resources is usually controlled by system
software.
- access authority
- One of a range of possible authority levels that
control access to protected resources. In RACF, the access authorities are:
NONE, EXECUTE, READ, UPDATE, CONTROL, and ALTER.
- access control environment element (ACEE)
- In RACF, a control block
containing details of the current user, including user ID, current connect
group, user attributes, and group authorities. An ACEE is constructed during
user identification and verification.
- accessibility
- Accessibility
features help a user who has a physical disability, such as restricted mobility
or limited vision, to use software products successfully.
- access intent
- (1) In RACF, a subsystem's intended use of a protected resource.
- (2) In IMS, a subsystem's intended use of a database. This is in contrast
to the sharing level of the database itself, which specifies how the database
can be shared.
- access key
- In ESA key-controlled storage, a key associated with
a storage access request. When key-controlled protection applies to a storage
access, a store operation (write) is permitted only when the storage key matches
the access key; a fetch (read) is permitted when the keys match or when the
fetch-protection bit of the storage key is zero. In most cases, the access
key for a storage operation is the program status word (PSW) key in the current
PSW. For information about how ESA determines when access keys match storage
keys, see the IBM Enterprise Systems Architecture/390 Principles of Operation manual.
- access list
- In RACF, the part
of a resource profile that specifies the users and groups that may access
the resource and the level of access granted to each.
- access method
- A technique for moving data between main storage and input/output devices.
- access method control block (ACB)
- A control block that links an
application program to VSAM or VTAM.
- access method services
(AMS)
- A facility that is used to define and reproduce VSAM key-sequenced
data sets.
- access program
- A user-provided part
of a FEPI application that handles the main communications with application
programs in CICS or IMS systems.
- access register (AR)
- A register through which one address space accesses the data in another address
space or data space.
- access register mode (AR mode)
- The address space control mode in which the system uses general purpose
registers and the corresponding access register (AR) to resolve an address
in an address space or a data space. See also address space control mode, primary mode.
- access scheduling
- The selection by
DL/I of IMS, DL/I, or SQL/DS database access tasks that are to be run. A CICS
application program designed to access DL/I databases must schedule its access
to DL/I. Scheduling includes ensuring that the PSB is valid, the application
is not already scheduled, the databases referred to are open and enabled,
and there is no intent conflict between the PSB and already scheduled PSBs
from other application programs. Negative responses to any of the above prevents
scheduling.
- access security information field (ASIF)
- In SNA, a field within
Function Management Header Type 5 (FMH-5), which is used to convey security
information.
- access security information subfield (ASIS)
- In SNA, a subfield
within Function Management Header Type 5 (FMH-5), which is used to convey
security information.
- accounting class data
- High-level
data produced by the CICS monitoring facility which can be used for installation
accounting purposes, such as the number of transactions for a given combination
of transaction identifier, transaction type, terminal, and operator. This
data is the minimum required to enable accounting routines to associate particular
transactions with particular users or terminals.
- ACEE
- See access control environment element (ACEE).
- ACF
- See Advanced Communications Function (ACF)
- ACID
properties
- The term, coined by Haerder and Reuter [1983], and
used by Jim Gray and Andreas Reuter to denote the properties of a transaction:
Transaction Processing: Concepts and Techniques (1993). The properties are
atomicity, consistency, isolation, and durability. In CICS, the ACID properties
apply to a unit of work (UOW). See also unit of work (UOW), atomicity, Consistency, Isolation, Durability.
- acquired
activity
- An activity that a program
executing outside the process that contains the
activity has gained access to, by issuing an ACQUIRE command. The activity
remains acquired until the next syncpoint occurs.
Acquiring an activity enables the program to read and write to the activity's data-containers, read the process data-containers of the process
that contains the activity and issue various commands, including RUN and LINK,
against the activity. See also acquired process.
- acquired
process
- The process whose root activity a
program currently has access to. A program acquires a process in one of two
ways: either by defining it; or, if the process already exists, by issuing
an ACQUIRE PROCESS command. The process remains acquired until the next syncpoint occurs. Acquiring a process enables the program
to read and write to the process's data-containers, read and write to the
root activity's data-containers, and issue various commands, including RUN
and LINK, against the process. See also acquired activity.
- action command
- A CICSPlex SM command that affects one or more of the resources
represented in a view. Action commands can be issued from either the COMM
field in the control area of the information display panel or the COMMAND
field in a displayed view. Valid action commands are listed with the description
of each view.
- action definition (ACTNDEF)
- In real-time analysis, a definition
of the type of external notification that is to be issued when the conditions
identified in an analysis definition are true.
- activation
- The attachment
of an activity to perform one of a series of processing
steps. In order to perform all its processing, an activity may need to be
activated several times. In between, it "sleeps". See pseudoconversational
- active-alternate pair
- An SAA run-time library that establishes
a common execution environment for a number of SAA programming languages.
See also Systems Application Architecture (SAA)
- active partition
- In BMS,
the partition that contains the cursor. It can be scrolled vertically. While
a partition is active, the cursor wraps round at the viewport boundaries,
and any input key transmits data from that partition only.
- active session
- (1) A session that connects the active CICS to an end user.
- (2) In XRF, a session between a class 1 terminal and the active system.
- active system
- In an XRF environment, the CICS system that currently
supports the processing requests of the user.
- active task
- (1) A CICS task
that is eligible for dispatching by CICS.
- (2) During emergency restart,
a task that completed an LUW and started another, but that did not cause any
records to be written to the system log during the second LUW. During recovery-control
processing, an LUW completion but no physical end-of-task (that is, task DETACH)
is found.
- activity
- In BTS, one part of a process managed
by CICS business transaction services. Typically, an activity is part of a business transaction. A program that implements an activity differs
from a traditional CICS application program only in its being designed to
respond to BTS events.
- activity completion event
- An atomic event that fires when an activity completes.
- activity identifier
- A means of uniquely referring to an instance of a BTS activity. Activity identifiers are assigned by CICS.
- activity keypoint
- A record of task and DCT entry status on the system log made
on a periodic basis to facilitate the identification of transaction backout
information during emergency restart. In the event of an uncontrolled shutdown
and subsequent emergency restart, activity keypoints can shorten the process
of backward scanning through the system log. Activity keypoints are written
automatically by the system (system activity keypoints) or by the user (user
activity keypoints). See also system activity keypoint, user activity keypoint
- activity
tree
- A hierarchy of activities. An activity tree may be several
levels deep.
- ACTNDEF
- See action definition (ACTNDEF).
- addressed direct access
- In VSAM, the retrieval or storage of a data record identified
by its relative byte address.
- addressed sequential access
- In VSAM, the retrieval or storage of a data record in its entry
sequence relative to the previously stored or retrieved record.
- addressing
- In data communications, the way that the sending or control station selects
the station to which it is sending data.
- addressing mode (AMODE)
- The mode, 24-bit or 31-bit, in which a program holds and processes
addresses. The AMODE linkage-editor control statement specifies the addressing
mode of the load module produced.
- address space
- A range
of up to two gigabytes of contiguous virtual storage addresses that the system
creates for the user. Unlike a data space, an address space contains user
data and programs, as well as system data and programs, some of which are
common to all address spaces. Instructions execute in an address space, not
a data space. See also >data space.
- address
space control mode
- The mode, determined by the program status
word, that indicates where to find referenced data. Three types of address
space control modes are primary, secondary, and access register. VTAM macroinstructions
must be invoked in primary address space control mode. See also access register mode (AR mode).
- ADI
- See alternate delay interval (ADI)
- adjacent CMAS
- A CICSPlex
SM address space (CMAS) that is connected to local CMAS via a direct CMAS-to-CMAS
link.
- ADS
- See area data set (ADS).
- ADSP
- See automatic data set protection (ADSP)
- Advanced Communications Function (ACF)
- A group of IBM licensed
programs, principally VTAM, TCAM, NCP, and SSP, that use the concepts of Systems
Network Architecture (SNA), including distribution of function and resource
sharing.
- advanced program-to-program
communication (APPC)
- An implementation of the SNA LU 6.2 protocol
that allows interconnected systems to communicate and share the processing
of programs. The APPC protocol is used for communication between IBM CICS
Clients and CICS on System/390 systems.
- AFCB
- See authorized function control block (AFCB)
- after-image
- A record of the contents of a data element after it
has been changed. After images are used for forward recovery.
- agent
- In a two-phase
commit syncpointing sequence (LU6.2 or MRO), a task that receives syncpoint
requests from an initiator (a task that initiates syncpointing activity).
See also initiator.
- AGN
- See application group name (AGN)
- AID
- See automatic initiate descriptor (AID). See attention identifier (AID).
- AITM
- See autoinstall terminal model (AITM).
- AIX VSAM
- See alternate index (AIX).
- allocation
- The assigning of various types of programs and record
categories to system storage locations, such as main storage or disk storage.
- alternate delay interval (ADI)
- In XRF, the interval that must
elapse between the (apparent) loss of surveillance signal from the active
system and any reaction from the alternate system. The ADI system initialization
parameter specifies the alternate delay interval for use with XRF. The corresponding
parameter for the active system is PDI. See the CICS System Definition Guideor the CICS/VSE System Definition and Operations Guide for
more information.
- alternate facility
- In distributed
transaction programming, an IRC or SNA session that is obtained by a transaction
by means of an ALLOCATE command. See also principal facility.
- alternate
index
- (1) For VSAM key-sequenced data sets and entry-sequenced data
sets, an index of alternate keys that provides a path for secondary access
to the data set. If the records have alternate keys,the alternate index is
built when the data set is created. See also secondary index.
- (2) A subordinate index in a hierarchy of indexes.
- alternate index base data set (AIX VSAM)
- The VSAM data set that
is the base or normal route of file access in a VSAM alternate index arrangement.
- alternate key
- In VSAM, a field, other than the primary key, of
fixed length and position in a record. A set of alternate keys is used to
build an alternate index that provides an alternative or secondary path for
access to the data set. There can be any number of alternate keys in a record
and they need not be unique.
- alternate routing
- A
function provided by the VTAM class of service (COS) facility in which virtual
routes for a given class of service can be assigned to different physical
paths (explicit routes).
- alternate screen size
- An option
that permits the size of a display screen to be defined differently from the
standard size.
- alternate system
- In an XRF environment, a CICS system that stands
by to take over the user workload when the active CICS system fails or a takeover
is initiated.
- alternate TP PCB
- In IMS, a PCB that defines an alternate destination
(a logical terminal or a message program) and that can be used instead of
the I/O PCB when it is necessary to direct a response to a terminal. The existence
of alternate PCBs in the PSB affects the PCB number used in the PCB keyword
in an EXEC DLI application program.
- American National Standards Institute (ANSI)
- A private, nonprofit organization whose membership includes private companies,
U.S. government agencies, and professional, technical, trade, labor, and consumer
organizations. ANSI coordinates the development of voluntary consensus standards
in the U.S.
- American
Standard Code for Information Interchange
- See ASCII.
- AMODE
- See addressing mode (AMODE).
- AMS
- See access method services (AMS).
- AMT
- See autoinstall model table (AMT).
- analysis definition
- In real-time analysis, a definition of the evaluations to be performed
on specified CICS resources, the intervals at which those evaluations are
to be performed, and the actions to be taken when a notif condition occurs.
- analysis group
- In real-time analysis, a group of one or more analysis
definitions, status definitions, or both. Analysis definitions and status
definitions belong to an analysis group if they are to be installed automatically
in
- analysis point monitoring (APM)
- In real-time analysis, resource
monitoring across multiple CICS system within a CICSplex that results in a
single notification of a condition, rather than one notification for each
system.
- analysis point specification
- In real-time analysis, a specification
that identifies the CMAS that are to be responsible for analysis point monitoring.
- analysis specification
- In real-time analysis, a specification
that establishes system availability monitoring or MAS resource monitoring
within a group of CICS systems.
- ANSI
- See ***.
- anticipatory paging
- In CICS, the acquisition at task initialization
time of one or more consecutive pages in real storage for a task's TCA and
data areas. Anticipatory paging can be used to have asynchronous paging of
the task control and work areas (TCA/TWA), associated task data areas, and
program storage associated with the task.
- AOR
- See application-owning region (AOR).
- AP
- See application program.
- APAR
- See authorized program analysis report (APAR).
- APF
- See authorized program facility (APF).
- API
- See application programming interface (API).
- APM
- See analysis point monitoring (APM).
- APPC
- See Advanced Program-to-Program Communication (APPC).
- application
- (1) A particular use to which an information processing
system is put - for example, a stock control application, an airline reservation
application, an order entry application.
- (2) A program or suite of
programs that perform a task or specific function. For example, a stock control
application or an airline reservation application.
- application
domain
- CICS domain that contains several major components, including
application and system services, XRF, intercommunication (ISC and MRO), system
control, and reliability. Application programs run in this domain. Most application
domain functions are either provided by modules that are an integral part
of the CICS system and are loaded at system initialization, or they are system
application programs that are loaded as needed, in the same way as user applications.
- application group name (AGN)
- In DBCTL, the name of an application
group. An application group is a set of PSBs that can be accessed by one particular
CICS system or BMP as a single entity.
- application
identifier
- The name by which a logical unit is known in a VTAM
network. The CICS applid is specified in the APPLID system initialization
parameter.
- Application Migration Aid
- A program which simplifies conversion
of assembler language and COBOL applications from macro to command-level.
The Application Migration Aid reads assembler language and COBOL source code
and writes a new source file, converting the simpler macros to equivalent
API commands and providing guidance on the complex macros.
- application-owning region (AOR)
- In multiregion operation (MRO)
or intersystem communication (ISC), a CICS address space whose primary purpose
is to manage application programs. It receives transaction routed requests
from a terminal-owning region (TOR). In a configuration that does not have
a data-owning region (DOR), the AOR may contain file-related resources. See
also data-owning region (DOR) and terminal-owning region (TOR).
- application
partition set
- The partition set that CICS loads into the buffers
of a display device when a user application program issues an output request.
By default, this is the partition set that was named when the transaction
was added to the CICS system. Alternatively, it is the partition set named
by the most recent SEND PARTNSET command that the program issued.
- application
program (AP)
- (1) A program used to connect and communicate with stations
in a network, enabling users to perform application-oriented activities.
- (2) A complete, self-contained program, such as an editor or electronic
mail, that performs a specific task for the user, in contrast to system software,
such as the operating system kernel, server processes, and program libraries.
See also application programming interface (API).
- application
programming interface (API)
- (1) The formally defined programming language
interface that is between a system control program or a licensed program and
the user of the program.
- (2) In CICS, the command-level programming
interface supported by CICS for user application programs.
- application
server
- A server program in a distributed network that provides
the execution environment for an application program. For example, the WebSphere
Commerce Server provides the execution environment for online stores.
- application unit of work
- A set of actions within an application
that the designer chooses to regard as an entity in its own right. The designer
decides how (if at all) an application should be subdivided into application
units of work, and whether any application unit of work shall consist of just
one or of many CICS logical units of work (LUWs). Typically, but not exclusively,
an application unit of work would correspond to a CICS transaction.
- AR
- See access register (AR).
- archive
- To store backup
copies of data sets, usually for a given period of time.
- area data
set (ADS)
- A data set that contains a DEDB area. IMS can maintain
up to seven copies of this data set.
- ARF
- See automatic reconfiguration facility (ARF)
- argument
- An independent variable or any value of an independent variable;
for example, a search key; a number identifying the location of an item in
a table.
- ARM
- See automatic restart manager (ARM).
- AR mode
- See access register mode (AR mode).
- ASCII (American Standard Code for Information Interchange)
- The
standard code, using a coded character set consisting of 7-bit coded characters
(8-bits including parity check), that is used for information interchange
among data processing systems, data communication systems, and associated
equipment. The ASCII set consists of control characters and graphic characters.(A)
IBM has defined an extension to ASCII code (characters 128-255) that uses
all 8 bits. DCF uses this 8-bit extension. See also EBCDIC.
- ASIF
- See access security information field (ASIF).
- ASIS
- See access security information subfield (ASIS).
- assembler
- A computer program that converts assembler language
instructions into object code.
- assembler language
- A symbolic programming language in which the set of instructions includes
the instructions of the machine and whose data structures correspond directly
to the storage and registers of the machine.
- ASU
- See automatic screen update (ASU).
- ASYNC
- See asynchronous.
- asynchronous (ASYNC)
- Pertaining to events that are not synchronized in time or do not occur in
regular or predictable time intervals. For example, input events are controlled
by the user; the program can read them later. See also synchronous.
- asynchronous processing
- A series of operations that are done separately
from the job in which they were requested; for example, submitting a batch
job from an interactive job at a work station. See also synchronous processing.
- ATI
- See automatic transaction initiation (ATI).
- atomic event
- A single,
"low-level" non-composite event. The types of atomic event are activity completion event, input event, timer event, and system event. See
also composite event.
- atomicity
- A transaction's
changes to the state (of resources) are atomic: either all happen or none
happen. See also ACID properties.
- attach
- (1) In programming, to
create a task that can execute concurrently with the attaching code.
- (2) In SNA, the request unit that flows on a session to initiate a conversation.
- attach FMH
- See FMH-5.
- attach header
- In SNA,
a function management header (FMH5) that causes a remote process or transaction
to be attached.
- attach request
- A request that causes
a remote process or transaction to be attached.
- attention identifier
(AID)
- A character in a data stream that is sent to the host system
when a display station user presses an attention identifier (AID) key. Typical
AID keys are function keys or the Clear, Enter, Page Up, Page Down, Help,
Print, and Home keys.
- attention routine
- In CICS/VSE, a
routine of the system that receives control when the operator presses the
Attention key. The routine sets up the console for the input of a command,
reads the command, and initiates the system service requested by the command.
- audit trail
- Data, in the form of a logical path that links a sequence
of events, used for tracing the transactions that affected the contents of
a record.
- audit trail utility
- A CICS-supplied
utility program, DFHATUP, that enables you to print selected BTS audit records from a specified logstream.
- authority
- The right to access objects, resources, or functions. See access authority, group authority, and class authority (CLAUTH).
- authorization checking
- The action of determining whether a user is permitted access
to a protected resource. RACF performs authorization checking as a result
of a RACHECK or FRACHECK request
- authorized
function control block (AFCB)
- Control block used to contain control
information for various functions that require special authorization, and
the addresses of the common system area (CSA) and the application interface
block. The AFCB is used as an address vector for the CICS type 3 SVC, or for
the authorization of use of the SVC.
- authorized
program analysis report (APAR)
- A request for correction of a defect
in a current release of an IBM-supplied program.
- authorized program facility (APF)
- A facility that permits the
identification of programs that are authorized to use restricted functions.
- autoinstall
- A method of creating and installing resources dynamically
as terminals log on, and deleting them at logoff. Autoinstall can be used
for VTAM terminals, MVS consoles, APPC connections, programs, map sets, partition
sets, and journals.
- autoinstall control program
- A user-replaceable CICS program used to select some of the data needed
to automatically install terminals, notably the CICS terminal identifier (TERMID)
and the model name to be used in each instance. For programming information,
see the CICS Customization Guide.
- autoinstall model
table (AMT)
- CICS control table that contains model terminal definitions
to be used during autoinstall.
- autoinstall
terminal model (AITM)
- A model terminal definition used by CICS
during autoinstall of terminals. Definitions can be user-created or supplied
by CICS, and are held in the autoinstall model table (AMT). The acronym AITM
is sometimes loosely used to refer to the CICS routines that manage operations
involving the autoinstall model table (AMT).
- autolink
- An automatic library
look-up function of the linkage editor. The function (1) resolves any external
reference that is included in the currently processed module and (2) searches
the active search chain for an object module of the same name as the encountered
external reference.
- automatic data set protection
(ADSP)
- A user attribute that causes all permanent data sets created
by the user to be automatically defined to RACF with a discrete RACF profile.
- automatic initiate descriptor (AID)
- A control block used internally
by CICS for scheduling purposes. An example of AID use is scheduling a transaction,
optionally associating it with a terminal and a temporary storage queue. Another
use is scheduling MRO, LU6.1, and LU6.2 ALLOCATE requests.
- automatic
journal archiving
- A function that automatically creates and submits
an archive job for a journal that is ready for archiving. When a journal,
defined to use this function, is ready for archiving, CICS automatically creates
and submits an archive job. The journal data set is not reused until archiving
is complete, and CICS ensures that the archive jobs are submitted promptly.
- automatic reconfiguration facility (ARF)
- In a multisystem sysplex
on PR/SM, the XCF component that provides automatic reconfiguration when one
ESA system in the sysplex fails. ARF provides high availability for multisystem
applications in the sysplex. ARF is also known as XCF PR/SM policy.
- automatic restart manager (ARM)
- A z/OS recovery function that
can improve the availability of specific batch jobs or started tasks, and
therefore result in faster resumption of productive work.
- automatic screen update (ASU)
- A CICSPlex SM facility that automatically
updates the data in all unlocked windows at user-defined intervals.
- automatic screen update interval
- The time interval between one
automatic screen update and the next. The interval can be set in the CICSPlex
SM user profile or when the ASU facility is turned on.
- automatic transaction initiation (ATI)
- The initiation of a CICS
transaction by an internally-generated request, for example, the issue of
an EXEC CICS START command or the reaching of a transient data trigger level.
CICS resource definition can associate a trigger level and a transaction with
a transient data destination. When the number of records written to the destination
reaches the trigger level, the specified transaction is automatically initiated.
See also trigger level.
- auxiliary storage
- All
addressable storage other than main storage. See also main storage.
- auxiliary trace
- An optional CICS function that causes trace entries
to be recorded in the auxiliary trace data set, a sequential data set on disk
or tape.
- auxiliary trace data set
- A sequentially organized data set on
disk or tape, used to record all trace entries generated while the auxiliary
trace function is active. Either one or two auxiliary trace data sets can
be defined; the latter allows the data sets to be switched when the one currently
being used is full. The trace utility program (DFHTUP) can be used to print
records from auxiliary trace data sets.
- availability
- The degree
to which a system or resource is ready when needed to process data; the percentage
of time a system, network, or component can be utilized, within a certain
time frame. Generally, the percentage is derived by dividing actual availability
time by scheduled availability time.
- availability manager
(AVM)
- In XRF, the programs that handle communication between active
and alternate IMS, DL/I, or SQL/DS XRF systems. See also CICS availability manager (CAVM).
- average throughput rate
- The power of a system to process a representative
work load. The power of the system is measured in units of data processing
work; for example, jobs or transactions successfully completed per hour, minute,
or second.
- AVM
- See availability manager (AVM).
- AXM
- The "authorized cross-memory"
server environment. A series of modules providing run-time services for CICS-related
cross-memory servers which run in MVS authorized state (unlike CICS itself,
which runs unauthorized once initialization has completed) such as the temporary
storage data sharing server.
[[ Contents Previous Page | Next Page Index ]]