IMS considerations

It is essential that you are familiar with using IMS and writing IMS applications.

When designing access programs that have IMS as a target back-end system, careful consideration must be given to the differences between CICS® and IMS under certain circumstances:
  • Message protocols
  • Use of response mode
  • Beginning and end of session
  • Effects of IMS restart and recovery features in a FEPI environment. (Because IMS is almost totally recoverable, this can present problems in the design of the FEPI application and some event handlers.)