An example FEPI configuration

An example configuration is given in Table 1. Next, the target lists and node lists used in the example are given. Then there are the definitions used to achieve this configuration. Figure 1 is a diagrammatic representation of the configuration.
Figure 1. The example FEPI configuration - a diagrammatic representation
The diagram represents an example configuration. It shows a front-end CICS system that uses FEPI, and three back-end systems (one CICS and two IMS). The back-end systems have VTAM APPLIDs of C1, I1, and I2. The front-end CICS has defined these APPLIDs as FEPI targets. The diagram shows the FEPI connections between the front-end CICS and the back-end systems, together with the pools and nodes used by the sample configuration.

Note that this is not the configuration the sample programs use; it illustrates as many aspects of configuration as possible.

Table 1. Resources used in the example FEPI configuration
Resource name name name name name
Pool name GRPB GRPC GRPD GRPE GRPF
Property set SLUP SLU2M3I SLU2M3I SLU2M2I SLU2M2C
Target names IMSB IMSA IMSB IMSA IMSA IMSB CICSA
Node names N10 N11 N12 N30 N10 N11 N12 N20 N10 N11 N12 N20
Device type LUP T3278M3 T3278M3 T3278M2 T3278M2
Logmode name IBM3600 D4A32783 D4A32783 D4A32782 D4A32782
Exceptional events queue name IEXEPTP IEXEPT2 IEXEPT2 IEXEPT2 CEXEPT2
Unsolicited-data transaction name or response IUP IU2 IU2 IU2 Negative
Begin-session transaction name ISIP ISI2 ISI2 ISI2 CSI2
End-session transaction name none IXI2 IXI2 IXI2 CXI2
STSN transaction name ISTP n/a n/a n/a n/a
Initial inbound data No Yes Yes Yes Yes