Communications
The following topics provides you reference information on communications:
Summary of communication methods
Link security and user security compared
Intersystem security checklist
Common configuration problems with intersystem security
Data conversion for function shipping, distributed program link and asynchronous processing
Intersystem problem determination
How to use function shipping
Application programming for function shipping
Writing programs for CICS DTP
Synchronizing three or more CICS systems
DFHCNV - The data conversion macros
The conversation state tables
Migrating DTP applications
Link security and user security compared
Intersystem security checklist
Common configuration problems with intersystem security
Data conversion for function shipping, distributed program link and asynchronous processing
Intersystem problem determination
How to use function shipping
Application programming for function shipping
Writing programs for CICS DTP
Synchronizing three or more CICS systems
DFHCNV - The data conversion macros
The conversation state tables
Migrating DTP applications
Data conversion tables (TXSeries on Windows Systems only)
Summary of CICS intersystem security
Difference between the two CICS user security methods
Numeric data conversion considerations
Summary of data conversion for CICS intercommunication functions
Code page support
When is DFHTRUC called
Parameters passed to DFHTRUC
Writing your own version of DFHTRUC
Installing your version of DFHTRUC into the region
Summary of data conversion
How information is passed between CICS and the user exit
Indirect links for transaction routing
Using the assign command in the application-owning region
If the system is unavailable or not known
Invoking the user exit at the end of routed transactions
Invoking the user exit on abend
Deferred sending of START requests with the NOCHECK parameter
Local queuing of EXEC CICS START commands for remote transactions
Avoiding performance problems
Facilitating maintenance
Going for reliability
Protecting sensitive data
Data conversion
Safeguarding data integrity
Designing conversations
The EXEC CICS CONVERSE command
Information passed to the user exit
Initial invocation of the user exit
Changing the target CICS system
Changing the remote program name
Changing the mirror transaction name
Changing the user ID
Invoking the user exit at end of routed program
When a backout is required
SYNCPOINT in response to SYNCPOINT
SYNCPOINT in response to ISSUE PREPARE
SYNCPOINT ROLLBACK in response to SYNCPOINT ROLLBACK
SYNCPOINT ROLLBACK in response to SYNCPOINT
SYNCPOINT ROLLBACK in response to ISSUE PREPARE
ISSUE ERROR in response to SYNCPOINT
ISSUE ERROR in response to ISSUE PREPARE
ISSUE ABEND in response to SYNCPOINT
ISSUE ABEND in response to ISSUE PREPARE
Example to debug a problem in a DPL environment