Glossary
This glossary defines the terms and abbreviations used in CICS® Transaction Gateway and in the documentation.
A
- abnormal end of task (abend)
- The termination of a task, job, or subsystem because of an error condition that recovery facilities cannot resolve.
- Advanced program-to-program communication (APPC)
- An implementation of the SNA/SDLC LU 6.2 protocol that allows interconnected systems to communicate and share the processing of programs. The Client daemon uses APPC to communicate with CICS systems.
- APAR
- See Authorized program analysis report.
- API
- See application programming interface.
- APPC
- See Advanced program-to-program communication.
- application programming interface (API)
- A functional interface that allows an application program that is written in a high-level language to use specific data or functions of the operating system or another program.
- APPLID
- On CICS Transaction Gateway: The application identifier that is used to identify connections on the CICS server and tasks in a CICSplex. See also APPLID qualifier and fully qualified APPLID.
- On CICS Transaction Server: The name by which a CICS system is known in a network of interconnected CICS systems. CICS Transaction Gateway application identifiers do not need to be defined in SYS1.VTAMLST. The CICS APPLID is specified in the APPLID system initialization parameter.
- APPLID qualifier
- Optionally used as a high-level qualifier for the APPLID to form a fully qualified APPLID. See also APPLID and fully qualified APPLID.
- ARM
- See automatic restart manager.
- ATI
- See automatic transaction initiation.
- attach
- In SNA, the request unit that flows on a session to initiate a conversation.
- Attach Manager
- The component of APPC that matches attaches received from remote computers to accepts issued by local programs.
- Authorized Program Analysis Report (APAR)
- A request for correction of a defect in a current release of an IBM-supplied program.
- autoinstall
- A method of creating and installing resources dynamically as terminals log on, and deleting them at logoff.
- automatic restart manager (ARM)
- An IBM® z/OS® recovery function that can improve the availability of specific batch jobs or started tasks, and therefore result in faster resumption of productive work.
- automatic transaction initiation (ATI)
- The initiation of a CICS transaction by an internally generated request, for example, the issue of an EXEC CICS START command or the reaching of a transient data trigger level. CICS resource definition can associate a trigger level and a transaction with a transient data destination. When the number of records written to the destination reaches the trigger level, the specified transaction is automatically initiated.
B
- Basic Mapping Support
- Basic mapping support is an interface between CICS and CICS application programs that move 3270 data streams to and from a terminal. The format of the input and output display data is defined by the BMS commands.
- bean
- A definition or instance of a JavaBeans component. See also JavaBeans.
- bean-managed transaction
- A transaction where the JEE bean itself is responsible for administering transaction tasks such as committal or rollback. See also container-managed transaction.
- BIND command
- In SNA, a request to activate a session between two logical units (LUs).
- BMS
- see Basic Mapping Support
- business logic
- The part of a distributed application that is concerned with the application logic rather than the user interface of the application. Compare with presentation logic.
C
- CA
- See certificate authority.
- callback
- A way for one thread to notify another application thread that an event has happened.
- CCIN
- The CCIN transaction is invoked by the Client daemon, for each TCP/IP or SNA connection established. CCIN installs a Client connection on the CICS server.
- CCSID
- Coded Character Set Identifier. A 16-bit number that includes a specific set of encoding scheme identifiers, character set identifiers, code page identifiers, and other information that uniquely identifies the coded graphic-character representation.
- certificate authority (CA)
- In computer security, an organization that issues certificates. The certificate authority authenticates the certificate owner's identity and the services that the owner is authorized to use. It issues new certificates and revokes certificates from users who are no longer authorized to use them.
- change-number-of-sessions (CNOS)
- An internal transaction program that regulates the number of parallel sessions between the partner LUs with specific characteristics.
- channel
- A channel is a set of containers, grouped together to pass data to CICS. There is no limit to the number of containers that can be added to a channel, and the size of individual containers is limited only by the amount of storage that you have available.
- CICS connectivity components
- The Client daemon, the EXCI (External CICS Interface), and the IPIC (IP Interconnectivity) protocol are collectively called the 'CICS connectivity components'. The Client daemon handles the TCP/IP and the SNA protocols.
- CICS Request Exit
- An exit that is invoked by the CICS Transaction Gateway for IBM z/OS at run time to determine which CICS server to use.
- CICS server name
- A defined server known to CICS Transaction Gateway.
- CICS TS
- Abbreviation of CICS Transaction Server.
- class
- In object-oriented programming, a model or template that can be instantiated to create objects with a common definition and therefore, common properties, operations, and behavior. An object is an instance of a class.
- CLASSPATH
- In the execution environment, an environment variable keyword that specifies the directories in which to look for class and resource files.
- Client API
- The Client API is the interface used by Client applications to interact with CICS using the Client daemon. See External Call Interface, External Presentation Interface, and External Security Interface.
- Client application
- The client application is a user application written in a supported programming language that uses one or more of the CICS Transaction Gateways APIs.
- Client daemon
- The Client daemon manages TCP/IP and SNA connections to CICS servers on UNIX, Linux®, and Windows. It processes ECI, EPI, and ESI requests, sending and receiving the appropriate flows to and from the CICS server to satisfy Client application requests. It can support concurrent requests to one or more CICS servers. The CICS Transaction Gateway initialization file defines the operation of the Client daemon and the servers and protocols used for communication.
- client/server
- Pertaining to the model of interaction in distributed data processing in which a program on one computer sends a request to a program on another computer and awaits a response. The requesting program is called a client; the answering program is called a server.
- CNOS
- See Change-Number-of-Sessions.
- code page
- An assignment of hexadecimal identifiers (code points) to graphic characters. Within a given code page, a code point can have only one meaning.
- color mapping file
- A file that is used to customize the 3270 screen color attributes on client workstations.
- COMMAREA
- See communication area.
- commit phase
- The second phase in a XA process. If all participants acknowledge that they are prepared to commit , the transaction manager issues the commit request. If any participant is not prepared to commit the transaction manager issues a back-out request to all participants.
- communication area (COMMAREA)
- A communication area that is used for passing data both between programs within a transaction and between transactions.
- configuration file
- A file that specifies the characteristics of a program, system device, server or network.
- connection
- In data communication, an association established between functional units for conveying information.
- container
- A container is a named block of data designed for passing information between programs. A container is a "named COMMAREA" that is not limited to 32KB. Containers are grouped together in sets called channels.
- container-managed transaction
- A transaction where the EJB container is responsible for administration of tasks such as committal or rollback. See also bean-managed transaction.
- control table
- In CICS, a storage area used to describe or define the configuration or operation of the system.
- conversation
- A connection between two programs over a session that allows them to communicate with each other while processing a transaction.
- conversation security
- In APPC, a process that allows validation of a user ID or group ID and password before establishing a connection.
- CTIN
- The CTIN transaction is invoked by the Client daemon to install a Client terminal definition on the CICS server.
D
- daemon
- A program that runs unattended to perform continuous or periodic systemwide functions, such as network control. A daemon can be launched automatically, such as when the operating system is started, or manually.
- data link control (DLC)
- A set of rules used by nodes on a data link (such as an SDLC link or a token ring) to accomplish an orderly exchange of information.
- DBCS
- See double-byte character set.
- default CICS server
- The CICS server that is used if a server name is not specified on an ECI, EPI, or ESI request. The default CICS server name is defined as a product wide setting in the configuration file (ctg.ini).
- dependent logical unit
- A logical unit that requires assistance from a system services control point (SSCP) to instantiate an LU-to-LU session.
- deprecated
- Pertaining to an entity, such as a programming element or feature, that is supported but no longer recommended, and that might become obsolete.
- digital certificate
- An electronic document used to identify an individual, server, company, or some other entity, and to associate a public key with the entity. A digital certificate is issued by a certificate authority and is digitally signed by that authority.
- digital signature
- Information that is encrypted with an entity's private key and is appended to a message to assure the recipient of the authenticity and integrity of the message. The digital signature proves that the message was signed by the entity that owns, or has access to, the private key or shared secret symmetric key.
- distinguished name
- The name that uniquely identifies an entry in a directory. A distinguished
name is made up of attribute:value pairs, separated by commas. The
format of a distinguished name is defined by RFC4514. For more information,
see
http://www.ietf.org/rfc/rfc4514.txt. See also realm name and identity propagation. - distributed application
- An application for which the component application programs are distributed between two or more interconnected processors.
- distributed identity
- User identity information that originates from a remote system. The distributed identity is created in one system and is passed to one or more other systems over a network. See also distinguished name and realm name.
- distributed processing
- The processing of different parts of the same application in different systems, on one or more processors.
- distributed program link (DPL)
- A link that enables an application program running on one CICS system to link to another application program running in another CICS system.
- DLC
- See data link control.
- DLL
- See dynamic link library.
- domain
- In the Internet, a part of a naming hierarchy in which the domain name consists of a sequence of names (labels) separated by periods (dots).
- domain name
- In TCP/IP, a name of a host system in a network.
- domain name server
- In TCP/IP, a server program that supplies name-to-address translation by mapping domain names to IP addresses. Synonymous with name server.
- dotted decimal notation
- The syntactical representation for a 32-bit integer that consists of four 8-bit numbers written in base 10 with periods (dots) separating them. It is used to represent IP addresses.
- double-byte character set (DBCS)
- A set of characters in which each character is represented by 2 bytes. Languages such as Japanese, Chinese and Korean, which contain more symbols than can be represented by 256 code points, require double-byte character sets. Because each character requires 2 bytes, the typing, display, and printing of DBCS characters requires hardware and programs that support DBCS. Contrast with single-byte character set.
- DPL
- See distributed program link.
- dynamic link library (DLL)
- A collection of runtime routines made available to applications as required.
- dynamic server selection (DSS)
- The mapping of a logical CICS server name to an actual CICS server name at run time.
E
- EBCDIC
- See extended binary-coded decimal interchange code.
- ECI
- See external call interface.
- EJB
- See Enterprise JavaBeans.
- emulation program
- A program that allows a host system to communicate with a workstation in the same way as it would with the emulated terminal.
- emulator
- A program that causes a computer to act as a workstation attached to another system.
- encryption
- The process of transforming data into an unintelligible form in such a way that the original data can be obtained only by using a decryption process.
- enterprise bean
- A Java™ component that can be combined with other resources to create JEE applications. There are three types of enterprise beans: entity beans, session beans, and message-driven beans.
- Enterprise Information System (EIS)
- The applications that comprise an enterprise's existing system for handling company-wide information. An enterprise information system offers a well-defined set of services that are exposed as local or remote interfaces or both.
- Enterprise JavaBeans (EJB)
- A component architecture defined by Oracle for the development and deployment of object-oriented, distributed, enterprise-level applications (JEE).
- environment variable
- A variable that specifies the operating environment for a process. For example, environment variables can describe the home directory, the command search path, the terminal in use, and the current time zone.
- EPI
- See external presentation interface.
- ESI
- See external security interface.
- Ethernet
- A local area network that allows multiple stations to access the transmission medium at will without prior coordination, avoids contention by using carrier sense and deference, and resolves contention by using collision detection and transmission. Ethernet uses carrier sense multiple access with collision detection (CSMA/CD).
- EXCI
- See external CICS interface.
- extended binary-coded decimal interchange code (EBCDIC)
- A coded character set of 256 8-bit characters developed for the representation of textual data.
- extended logical unit of work (extended LUW)
- A logical unit of work that is extended across successive ECI requests to the same CICS server.
- external call interface (ECI)
- A facility that allows a non CICS program to run a CICS program. Data is exchanged in a COMMAREA or a channel as for usual CICS interprogram communication.
- external communications interface (EXCI)
- An MVS application programming interface provided by CICS Transaction Server for IBM z/OS that enables a non-CICS program to call a CICS program and to pass and receive data using a COMMAREA. The CICS application program is started as if linked-to by another CICS application program.
- external presentation interface (EPI)
- A facility that allows a non CICS program to appear to CICS as one or more standard 3270 terminals. 3270 data can be presented to the user by emulating a 3270 terminal or by using a graphical user interface.
- external security interface (ESI)
- A facility that enables client applications to verify and change passwords for user IDs on CICS servers.
- External Security Manager (ESM)
- A security manager that operates outside CICS. For example, RACF® can be used as an external security manager with CICS Transaction Server.
F
- firewall
- A configuration of software that prevents unauthorized traffic between a trusted network and an untrusted network.
- FMH
- See function management header.
- fully qualified APPLID
- Used to identify CICS Transaction Gateway connections on the CICS server and tasks in a CICSplex. It is composed of an APPLID with an optional network qualifier. See also APPLID and APPLID qualifier.
- function management header (FMH)
- One or more headers, optionally present in the leading request units (RUs) of an RU chain, that allow one LU to (a) select a transaction program or device at the session partner and control the way in which the user data it sends is handled at the destination, (b) change the destination or the characteristics of the data during the session, and (c) transmit between session partners status or user information about the destination (for example, a program or device). Function management headers can be used with LU type 1, 4, and 6.2 protocols.
G
- Gateway
- A device or program used to connect two systems or networks.
- Gateway classes
- The Gateway classes provide APIs for ECI, EPI, and ESI that allow communication between Java client applications and the Gateway daemon.
- Gateway daemon
- A long-running Java process that listens for network requests from remote Client applications. It issues these requests to CICS servers using the CICS connectivity components. The Gateway daemon on IBM z/OS processes ECI requests and on UNIX, Windows, and Linux platforms it process EPI and ESI requests as well. The Gateway daemon uses the GATEWAY section of ctg.ini for its configuration.
- Gateway group
- A set of Gateway daemons that share an APPLID qualifier, and where each Gateway daemon has a unique APPLID within the Gateway group.
- Gateway token
- A token that represents a specific Gateway daemon, when a connection is established successfully. Gateway tokens are used in the C language statistics and ECI V2 APIs.
- global transaction
- A recoverable unit of work performed by one or more resource managers in a distributed transaction processing environment and coordinated by an external transaction manager.
H
- HA group
- See highly available Gateway group.
- highly available Gateway group (HA group)
- A Gateway group that utilizes TCP/IP load balancing, and can be viewed as a single logical Gateway daemon. A Gateway daemon instance in a HA group can recover indoubt XA transactions on behalf of another Gateway daemon within the HA group.
- host
- A computer that is connected to a network (such as the Internet or an SNA network) and provides an access point to that network. The host can be any system; it does not have to be a mainframe.
- host address
- An IP address that is used to identify a host on a network.
- host ID
- In TCP/IP, that part of the IP address that defines the host on the network. The length of the host ID depends on the type of network or network class (A, B, or C).
- host name
- In the Internet suite of protocols, the name given to a computer.
Sometimes, host name is used to mean the fully qualified domain name;
other times, it is used to mean the most specific subname of a fully
qualified domain name. For example, if
mycomputer.city.company.comis the fully qualified domain name, either of the following can be considered the host name:mycomputer.city.company.com,mycomputer. - hover help
- Information that can be viewed by holding a mouse over an item such as an icon in the user interface.
- HTTP
- See Hypertext Transfer Protocol.
- HTTPS
- See Hypertext Transfer Protocol Secure.
- Hypertext Transfer Protocol (HTTP)
- In the Internet suite of protocols, the protocol that is used to transfer and display hypertext and XML documents.
- Hypertext Transfer Protocol Secure (HTTPS)
- A TCP/IP protocol that is used by World Wide Web servers and Web browsers to transfer and display hypermedia documents securely across the Internet.
I
- ID data
- An ID data structure holds an individual result from a statistical API function.
- identity propagation
- The concept of preserving a user's security identity information (the distributed identity) independent of where the identity information has been created, for use during authorization and for auditing purposes. The distributed identity is carried with a request from the distributed client application to the CICS server, and is incorporated in the access control of the server as part of the authorization process, for example, using RACF. CICS Transaction Gateway flows the distributed identity to CICS. See also distributed identity.
- identity propagation login module
- A code component that provides support for identity propagation. The identity propagation login module is included with the CICS Transaction Gateway ECI resource adapter (cicseci.rar), conforms to the JAAS specification and is contained in a single Java class within the resource adapter. See also identity propagation.
- iKeyman
- A tool for maintaining digital certificates for JSSE.
- in doubt
- The state of a transaction that has completed the prepare phase of the two-phase commit process and is waiting to be completed.
- in flight
- The state of a transaction that has not yet completed the prepare phase of the two-phase commit process.
- independent logical unit
- A logical unit (LU) that can both send and receive a BIND, and which supports single, parallel, and multiple sessions. See BIND.
- <install_path>
- This term is used in file paths to represent the directory where you installed the product. For more information, see ../../installing/topics/cclahlinstfiles.html.
- Internet Architecture Board
- The technical body that oversees the development of the internet suite of protocols known as TCP/IP.
- Internet Protocol (IP)
- In TCP/IP, a protocol that routes data from its source to its destination in an Internet environment.
- interoperability
- The capability to communicate, run programs, or transfer data among various functional units in a way that requires the user to have little or no knowledge of the unique characteristics of those units.
- IP
- Internet Protocol.
- IP address
- A unique address for a device or logical unit on a network that uses the IP standard.
- IP interconnectivity (IPIC)
- The IPIC protocol enables Distributed Program Link (DPL) access from a non-CICS program to a CICS program over TCP/IP, using the External Call Interface (ECI). IPIC passes and receives data using COMMAREAs, or containers.
- IPIC
- See IP interconnectivity.
J
- Java
- An object-oriented programming language for portable interpretive code that supports interaction among remote objects.
- Java 2 Platform, Enterprise Edition (J2EE, Java EE)
- An environment for developing and deploying enterprise applications, defined by Oracle. The JEE platform consists of a set of services, application programming interfaces (APIs), and protocols that allow multi-tiered, Web-based applications to be developed.
- JavaBeans
- As defined for Java by Oracle, a portable, platform-independent, reusable component model.
- Java Client application
- The Java client application is a user application written in Java, including servlets and enterprise beans, that uses the Gateway classes.
- Java Development Kit (JDK)
- The name of the software development kit that Oracle provided for the Java platform.
- JavaGateway
- The URL of the CICS Transaction
Gateway with which the Java Client
application communicates. The JavaGateway takes the form
protocol://address:port. These protocols are supported:tcp://, ssl://,andlocal:. CICS Transaction Gateway runs with the default port value of 2006. This parameter is not relevant if you are using the protocollocal:. For example, you might specify a JavaGateway oftcp://ctg.business.com:2006. If you specify the protocol aslocal:you will connect directly to the CICS server, bypassing any CICS Transaction Gateway servers. - Java Native Interface (JNI)
- A programming interface that allows Java code running in a Java virtual machine to work with functions that are written in other programming languages.
- Java Runtime Environment (JRE)
- A subset of the Java Software Development Kit (SDK) that supports the execution, but not the development, of Java applications. The JRE comprises the Java Virtual Machine (JVM), the core classes, and supporting files.
- Java Secure Socket Extension (JSSE)
- A Java package that enables secure Internet communications. It implements a Java version of the Secure Sockets Layer (SSL) and Transport Layer Security (TSL) protocols and supports data encryption, server authentication, message integrity, and optionally client authentication.
- Java virtual machine (JVM)
- A software implementation of a processor that runs compiled Java code (applets and applications).
- JavaScript Object Notation (JSON)
- A lightweight data-interchange format that is based on the object-literal notation of JavaScript. JSON is programming-language neutral but uses conventions from languages that include C, C++, C#, Java, JavaScript, Perl, Python.
- JCA
- See JEE Connector Architecture.
- JDK
- See Java development kit.
- JEE (formerly J2EE)
- See Java 2 Platform Enterprise Edition.
- JEE Connector architecture (JCA)
- A standard architecture for connecting the JEE platform to heterogeneous enterprise information systems (EIS).
- JNI
- See Java Native Interface.
- JRE
- See Java Runtime Environment.
- JSON
- See JavaScript Object Notation (JSON).
- JSON Schema
- A JavaScript Object Notation (JSON) document that describes the structure and constrains the contents of other JSON documents.
- JSON web service
- A web service that accepts and produces JSON payloads.
- JSSE
- See Java Secure Socket Extension.
- JVM
- See Java Virtual Machine.
K
- keyboard mapping
- A list that establishes a correspondence between keys on the keyboard and characters displayed on a display screen, or action taken by a program, when that key is pressed.
- Keystore
- In the JSSE protocol, a file that contains public keys, private keys, trusted roots, and certificates.
L
- local mode
- Local mode describes the use of the CICS Transaction Gateway local protocol. The Gateway daemon is not used in local mode.
- local transaction
- A recoverable unit of work managed by a resource manager and not coordinated by an external transaction manager.
- logical CICS server
- An alias that can be passed on an ECI request when running in remote mode to CICS Transaction Gateway. The alias name is mapped to an actual CICS server name by a dynamic server selection (DSS) mechanism.
- logical end of day
- The local time of day on the 24-hour clock to which a Gateway daemon aligns statistics intervals. If the statistics interval is 24 hours, this is the local time at which interval statistics will be reset and, on IBM z/OS, optionally recorded to SMF. This time is set using the stateod parameter in the configuration file (ctg.ini).
- logical unit (LU)
- In SNA, a port through which a user accesses the SNA network to communicate with another user and through which the user accesses the functions provided by system services control points (SSCP). An LU can support at least two sessions, one with an SSCP and one with another LU, and might be capable of supporting many sessions with other logical units. See also network addressable unit, primary logical unit, secondary logical unit.
- logical unit 6.2 (LU 6.2)
- A type of logical unit that supports general communications between programs in a distributed processing environment.
- logical unit of work (LUW)
- The processing that a program performs between synchronization points.
- LU
- See logical unit.
- LU 6.2
- See logical unit 6.2.
- LU-LU session
- In SNA, a session between two logical units (LUs) in an SNA network. It provides communication between two users, or between a user and an LU services component.
- LU-LU session type 6.2
- In SNA, a type of session for communication between peer systems. Synonymous with APPC protocol.
- LUW
- See logical unit of work.
M
- managed mode
- Describes an environment in which connections are obtained from connection factories that the JEE server has set up. Such connections are owned by the JEE server.
- media access control (MAC) sublayer
- One of two sublayers of the ISO Open Systems Interconnection data link layer proposed for local area networks by the IEEE Project 802 Committee on Local Area Networks and the European Computer Manufacturers Association (ECMA). It provides functions that depend on the topology of the network and uses services of the physical layer to provide services to the logical link control (LLC) sublayer. The OSI data link layer corresponds to the SNA data link control layer.
- method
- In object-oriented programming, an operation that an object can perform. An object can have many methods.
- mode
- In SNA, a set of parameters that defines the characteristics of a session between two LUs.
N
- name server
- In TCP/IP, synonym for Domain Name Server. In Internet communications, a host that translates symbolic names assigned to networks and hosts into IP addresses.
- NAU
- See network addressable unit.
- network address
- In SNA, an address, consisting of subarea and element fields, that identifies a link, link station, or network addressable unit (NAU). Subarea nodes use network addresses; peripheral nodes use local addresses. The boundary function in the subarea node to which a peripheral node is attached transforms local addresses to network addresses and vice versa. See also network name.
- network addressable unit (NAU)
- In SNA, a logical unit, a physical unit, or a system services control point. The NAU is the origin or the destination of information transmitted by the path control network. See also logical unit, network address, network name.
- network name
- In SNA, the symbolic identifier by which users refer to a network addressable unit (NAU), link station, or link. See also network address.
- node type
- In SNA, a designation of a node according to the protocols it supports and the network addressable units (NAUs) it can contain. Four types are defined: 1, 2, 4, and 5. Type 1 and type 2 nodes are peripheral nodes; type 4 and type 5 nodes are subarea nodes.
- nonextended logical unit of work
- See SYNCONRETURN.
- nonmanaged mode
- An environment in which the application is responsible for generating and configuring connection factories. The JEE server does not own or know about these connection factories and therefore provides no Quality of Service facilities.
O
- object
- In object-oriented programming, a concrete realization of a class that consists of data and the operations associated with that data.
- object-oriented (OO)
- Describing a computer system or programming language that supports objects.
- one-phase commit
- A protocol with a single commit phase, that is used for the coordination of changes to recoverable resources when a single resource manager is involved.
- OO
- See object-oriented.
- OSGi
- A specification that describes a modular system and a service platform for the Java programming language that implements a complete and dynamic component model.
P
- pacing
- A technique by which a receiving station controls the rate of transmission of a sending station to prevent overrun.
- parallel session
- In SNA, two or more concurrently active sessions between the same two LUs using different pairs of network addresses. Each session can have independent session parameters.
- partner logical unit (PLU)
- In SNA, the remote participant in a session.
- partner transaction program
- The transaction program engaged in an APPC conversation with a local transaction program.
- password phrase
- A character string, between 9 and 100 characters in length, that is used for authentication when a user signs on to CICS. Because a password phrase can provide an exponentially greater number of possible combinations of characters than a standard 8 character password, the use of password phrases can enhance system security. Password phrases are verified by the External Security Manager (ESM), and can contain alphanumeric characters, and any of the other non alphanumeric characters that are supported by the ESM. See also External Security Manager (ESM).
- PING
- In Internet communications, a program used in TCP/IP networks to test the ability to reach destinations by sending the destinations an Internet Control Message Protocol (ICMP) echo request and waiting for a reply.
- PLU
- See primary logical unit and partner logical unit.
- port
- An endpoint for communication between devices, generally referring to a logical connection. A 16-bit number identifying a particular Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) resource within a given TCP/IP node.
- port sharing
- A way of load balancing TCP/IP connections across a group of servers running in the same IBM z/OS image.
- prepare phase
- The first phase of a XA process in which all participants are requested to confirm readiness to commit.
- presentation logic
- The part of a distributed application that is concerned with the user interface of the application. Compare with business logic.
- primary logical unit (PLU)
- In SNA, the logical unit that contains the primary half-session for a particular logical unit-to-logical unit (LU-to-LU) session. See also secondary logical unit.
- <product_data_path>
- This term represents the directory used by the Windows CICS Transaction Gateway for common application data. For more information, see File path terminology.
- protocol boundary
- The signals and rules governing interactions between two components within a node.
Q
- Query strings
- Query strings are used in the statistical data API. A query string is an input parameter, specifying the statistical data to be retrieved.
R
- RACF
- See Resource Access Control Facility.
- realm
- A named collection of users and groups that can be used in a specific security context. See also distinguished name and identity propagation.
- Recoverable resource management services (RRMS)
- The registration services, context services, and resource recovery services provided by the IBM z/OS sync point manager that enable consistent changes to be made to multiple protected resources.
- Resource Access Control Facility (RACF)
- An IBM licensed program that provides access control by identifying users to the system; verifying users of the system; authorizing access to protected resources; logging detected unauthorized attempts to enter the system; and logging detected accesses to protected resources.
- region
- In workload management on CICS Transaction Gateway for Windows, an instance of a CICS server.
- remote mode
- Remote mode describes the use of one of the supported CICS Transaction Gateway network protocols to connect to the Gateway daemon.
- remote procedure call (RPC)
- A protocol that allows a program on a client computer to run a program on a server.
- Request monitoring exits
- Exits that provide information about individual requests as they are processed by the CICS Transaction Gateway.
- request unit (RU)
- In SNA, a message unit that contains control information such as a request code, or function management (FM) headers, user data, or both.
- request/response unit
- A generic term for a request unit or a response unit. See also request unit and response unit.
- response file
- A file that contains predefined values that is used instead of someone having to enter those values one at a time. See also CID methodology.
- response unit (RU)
- A message unit that acknowledges a request unit; it can contain prefix information received in a request unit.
- Resource adapter
- A system-level software driver that is used by an EJB container or an application client to connect to an enterprise information system (EIS). A resource adapter plugs in to a container; the application components deployed on the container then use the client API (exposed by adapter) or tool-generated, high-level abstractions to access the underlying EIS.
- resource group ID
- A resource group ID is a logical grouping of resources, grouped for statistical purposes. A resource group ID is associated with a number of resource group statistics, each identified by a statistic ID.
- resource ID
- A resource ID refers to a specific resource. Information about the resource is included in resource-specific statistics. Each statistic is identified by a statistic ID.
- resource manager
- The participant in a transaction responsible for controlling access to recoverable resources. In terms of the CICS resource adapters this is represented by an instance of a ConnectionFactory.
- Resource Recovery Services (RRS)
- An IBM z/OS facility that provides two-phase sync point support across participating resource managers.
- RESTful
- Pertaining to applications and services that conform to Representational State Transfer (REST) constraints.
- Result set
- A result set is a set of data calculated or recorded by a statistical API function.
- Result set token
- A result set token is a reference to the set of results returned by a statistical API function.
- rollback
- An operation in a transaction that reverses all the changes made during the unit of work. After the operation is complete, the unit of work is finished. Also known as a backout.
- RPC
- See remote procedure call.
- RRMS
- See Recoverable resource management services.
- RRS
- See Resource Recovery Services.
- RU
- See Request unit and Response unit.
S
- SBCS
- See single-byte character set.
- secondary logical unit (SLU)
- In SNA, the logical unit (LU) that contains the secondary half-session for a particular LU-LU session. Contrast with primary logical unit. See also logical unit.
- Secure Sockets Layer (SSL)
- A security protocol that provides communication privacy. SSL enables client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, and message forgery. SSL applies only to internet protocols, and is not applicable to SNA.
- server name remapping
- See dynamic server selection.
- servlet
- A Java program that runs on a Web server and extends the server's functionality by generating dynamic content in response to Web client requests. Servlets are commonly used to connect databases to the Web.
- session limit
- In SNA, the maximum number of concurrently active logical unit to logical unit (LU-to-LU) sessions that a particular logical unit (LU) can support.
- sign-on capable terminal
- A sign-on capable terminal allows sign-on transactions that are either supplied with CICS (CESN) or written by the user, to be run. Contrast with sign-on incapable terminal.
- silent installation
- Installation that does not display messages or windows during its progress. Silent installation is not a synonym of "unattended installation", although it is often improperly used as such.
- single-byte character set (SBCS)
- A character set in which each character is represented by 1 byte. Contrast with double-byte character set.
- SIT
- See system initialization table.
- SLU
- See secondary logical unit.
- SMF
- The IBM z/OS System Management Facility (SMF) collects and records system and job-related information that your IBM z/OS installation can use for reporting, billing, analysis, profiling, and maintaining system security. CICS TG for IBM z/OS writes statistical data to SMF.
- SMIT
- See System Management Interface Tool.
- SNA
- See Systems Network Architecture.
- SNA sense data
- An SNA-defined encoding of error information In SNA, the data sent with a negative response, indicating the reason for the response.
- SNASVCMG mode name
- The SNA service manager mode name. This is the architecturally-defined mode name identifying sessions on which CNOS is exchanged. Most APPC-providing products predefine SNASVCMG sessions.
- socket
- A network communication concept, typically representing a point of connection between a client and a server. A TCP/IP socket will normally combine a host name or IP address, and a port number.
- SSL
- See Secure Sockets Layer.
- SSLight
- An implementation of SSL, written in Java, and no longer supported by CICS Transaction Gateway.
- standard error
- In many workstation-based operating systems, the output stream to which error messages or diagnostic messages are sent.
- statistic data
- A statistic data structure holds individual statistical result returned after calling a statistical API function.
- statistic group
- A generic term for a collection of statistic IDs.
- statistic ID
- A label referring to a specific statistic. A statistic ID is used to retrieve specific statistical data, and always has a direct relationship with a statistic group.
- subnet
- An interconnected, but independent segment of a network that is identified by its Internet Protocol (IP) address.
- subnet address
- In Internet communications, an extension to the basic IP addressing scheme where a portion of the host address is interpreted as the local network address.
- sync point
- Synchronization point. During transaction processing, a reference point to which protected resources can be restored if a failure occurs.
- SYNCONRETURN
- A request where the CICS server takes a sync point on successful completion of the server program. Changes to recoverable resources made by the server program are committed or rolled-back independently of changes to recoverable resources made by the client program issuing the ECI request, or changes made by the server in any subsequent ECI request. Also referred to as a nonextended logical unit of work.
- system initialization table (SIT)
- A table containing parameters used to start a CICS control region.
- System Management Command
- An administrative request received by a Gateway daemon (or Gateway daemon address space on IBM z/OS) from the ctgadmin command (on UNIX, Linux, or Windows) or the IBM z/OS console. The request might be made to retrieve information about the Gateway daemon, or to alter some aspect of Gateway daemon behavior. Typically, a ctgadmin command in the form ctgadmin <command string> is entered by an operator using the command line interface, or a modify command in the form /F <job name>,APPL=<command string> is entered by an operator on the IBM z/OS console.
- System Management Interface Tool (SMIT)
- An interface tool of the IBM AIX® operating system for installing, maintaining, configuring, and diagnosing tasks.
- Systems Network Architecture (SNA)
- An architecture that describes the logical structure, formats, protocols, and operational sequences for transmitting information units through the networks and also the operational sequences for controlling the configuration and operation of networks.
- System SSL
- An implementation of SSL, no longer supported by CICS Transaction Gateway on IBM z/OS.
T
- TCP/IP
- See Transmission Control Protocol/Internet Protocol.
- TCP/IP load balancing
- The ability to distribute TCP/IP connections across target servers.
- terminal emulation
- The capability of a personal computer to operate as if it were a particular type of terminal linked to a processing unit and to access data. See also emulator, emulation program.
- thread
- A stream of computer instructions that is in control of a process. In some operating systems, a thread is the smallest unit of operation in a process. Several threads can run concurrently, performing different jobs.
- timeout
- A time interval that is allotted for an event to occur or complete before operation is interrupted.
- TLS
- See Transport Layer Security.
- token-ring network
- A local area network that connects devices in a ring topology and allows unidirectional data transmission between devices by a token-passing procedure. A device must receive a token before it can transmit data.
- trace
- A record of the processing of a computer program. It exhibits the sequences in which the instructions were processed.
- transaction manager
- A software unit that coordinates the activities of resource managers by managing global transactions and coordinating the decision to commit them or roll them back.
- transaction program
- A program that uses the Advanced Program-to-Program Communications (APPC) application programming interface (API) to communicate with a partner application program on a remote system.
- Transmission Control Protocol/Internet Protocol (TCP/IP)
- An industry-standard, nonproprietary set of communications protocols that provide reliable end-to-end connections between applications over interconnected networks of different types.
- Transport Layer Security (TLS)
- A security protocol that provides communication privacy. TLS enables client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, and message forgery. TLS applies only to internet protocols, and is not applicable to SNA. TLS is also known as SSL 3.1.
- Two-phase commit
- A protocol with both a prepare and a commit phase, that is used for the coordination of changes to recoverable resources when more than one resource manager is used by a single transaction.
- type 2.0 node
- A node that attaches to a subarea network as a peripheral node and provides a range of user services but no intermediate routing services.
- type 2.1 node
- An SNA node that can be configured as an endpoint or intermediate routing node in a network, or as a peripheral node attached to a subarea network.
U
- unattended installation
- Unattended installation is installation performed without user interaction during its progress, or, with no user present at all, except for the initial launch of the process.
- Uniform Resource Locator (URL)
- A sequence of characters that represent information resources on a computer or in a network such as the Internet. This sequence of characters includes (a) the abbreviated name of the protocol used to access the information resource and (b) the information used by the protocol to locate the information resource.
- unit of recovery (UR)
- A defined package of work to be performed by the RRS.
- unit of work (UOW)
- A recoverable sequence of operations performed by an application between two points of consistency. A unit of work begins when a transaction starts or at a user-requested sync point. It ends either at a user-requested sync point or at the end of a transaction.
- UOW
- See unit of work.
- UR
- See unit of recovery.
- URL
- See Uniform Resource Locator.
- user registry
- The location where the distinguished name of a user is defined and authenticated. See also distinguished name.
- user session
- Any APPC session other than a SNASVCMG session.
V
- verb
- A reserved word that expresses an action to be taken by an application programming interface (API), a compiler, or an object program.
- version string
- A character string containing version information about the statistical data API.
W
- WAN
- See wide area network.
- Web browser
- A software program that sends requests to a Web server and displays the information that the server returns.
- Web server
- A software program that responds to information requests generated by Web browsers.
- wide area network (WAN)
- A network that provides communication services to a geographic area larger than that served by a local area network or a metropolitan area network, and that can use or provide public communication facilities.
- Wrapping trace
- On Windows, UNIX, and Linux,
a configuration in which the Maximum Client wrap size setting
is greater than 0. The total size of Client daemon binary trace files
is limited to the value specified in the Maximum Client wrap size setting.
With standard I/O tracing, two files, called
cicscli.binandcicscli.wrp, are used; each can be up to half the size of the Maximum Client wrap size. - WSBind file
- A Web service bind file is a resource that describes the specifics of the Web service.
X
- XA request
- Any request sent or received by the CICS Transaction Gateway in support of an XA transaction. These requests include the XA commands commit, complete, end, forget, prepare, recover, rollback, and start.
- XA transaction
- A global transaction that adheres to the X/Open standard for distributed transaction processing (DTP).