Connecting Db2 for z/OS distributed database systems with VTAM (deprecated)
Virtual Telecommunications Access Method (VTAM®) is a program that you can use to control remote Db2 communication.
About this task
Remote communications terminology:
- Logical unit (LU)
- A source of requests entering the network and a receptor of replies from the network. For example, a particular Db2 is an LU.
- Session
- A logical connection between two LUs. Multiple sessions can run on a single physical connection.
- Conversation
- A dialog that uses a session to transfer information between transaction programs, such as Db2 to Db2. A single session can support multiple conversations, but only one at a time.
- Step 1: Customize VTAM for Db2
To make monitoring of the network easier, consider installing NetView®.
- Step 2: Choose names and a password
You need to choose two names for the local Db2 subsystem: a location name and a logical unit name (LU name).
A location name distinguishes a specific database management system in a network, so applications use this name to direct requests to your local Db2 subsystem. Other systems use different terms for a location name. For example, Db2 Connect calls this the target database name. The DRDA term, RDBNAM, is used to refer to non-Db2 systems' relational database names.
An LU name is the name by which VTAM recognizes this subsystem in the network. You might need to know the LU names of other systems that can request data from the local Db2 subsystem, or you can use a default LU name of eight blanks.
If you plan to request data from other systems, you need the LU names and location names for those serving systems. Most of the time, system administrators and operators need to know both names, because they can use both names in various commands, and Db2 uses both names in messages.
In addition to the names mentioned above, you can choose an optional password to validate your local Db2 subsystem to VTAM. If the z/OS® system on which Db2 is running is part of an z/OS Parallel Sysplex®, you can choose a generic LU name to define a Db2 group to remote locations.
- Step 3: Define the Db2 subsystem to VTAM
Use the VTAM APPL statement to make the Db2 subsystem known to VTAM. You must include the APPL definitions in the VTAM SYS1.VTAMLST library at VTAM startup.
Also use the VTAM MODEENT statement to define default session modes. You must include mode tables in the VTAM SYS1.VTAMLIB library at VTAM startup.
Sample VTAM definitions are provided in the data set DSN8VTAM in SDSNSAMP and in examples throughout this topic.
- Step 4: Populate the communications database
The Db2 catalog includes the communications database (CDB), which contains several tables that hold information about your connections with remote systems. You must populate some of these tables before you can request data from those remote systems. If this Db2 system only services data requests, you do not have to populate the CDB; you can use the default values.
- Step 5: Start VTAM to use Db2
When you start VTAM to use Db2, you must be sure that the proper definitions are in the VTAM libraries VTAMLST and VTAMLIB.
- Step 6: Tune the system
This is an optional step, which you can do after you have established communications between two or more systems. The procedure outlined up to this point gives you default values for your Db2 modes and your class of service. Although the defaults are probably adequate for your preliminary testing, you can change them to improve performance in the network, or to assign different modes to different application plans.
When VTAM links two nodes, it establishes a session. The number of available sessions can have a significant impact on performance; therefore, you might need to modify your session limit values. Also, large amounts of Db2 data travelling through the network can severely affect VTAM storage, and you might need to tune buffer storage.
You can also tune the system by changing mode options. A mode describes various characteristics of a session, such as the maximum number of bytes sent at one time. Modes can point to a class of service table, which ranks the available virtual routes for this mode with respect to preference of use and paths through the network. Essentially, the class of service table allows you to assign different network priorities to your modes.
- "Step 7: Create Aliases"
This is an optional step. Each Db2 location can create aliases for the tables it wants to access, using DRDA, at the other Db2 locations.
- "Step 8: Provide Authorization for an Appropriate Level of Security"