An example FEPI configuration
An example configuration is given in Table 1.
Next, the target lists and node lists used in the example are given.
Then there are the definitions used to achieve this configuration. Figure 1 is a diagrammatic representation of
the configuration.
Note that this is not the configuration the sample programs use; it illustrates as many aspects of configuration as possible.
Resource | name | name | name | name | name |
---|---|---|---|---|---|
Pool name | GRPB | GRPC | GRPD | GRPE | GRPF |
Property set | SLUP | SLU2M3I | SLU2M3I | SLU2M2I | SLU2M2C |
Target names | IMSB | IMSA IMSB | IMSA | IMSA IMSB | CICSA |
Node names | N10 N11 N12 | N30 | N10 N11 N12 | N20 | N10 N11 N12 N20 |
Device type | LUP | T3278M3 | T3278M3 | T3278M2 | T3278M2 |
Logmode name | IBM3600 | D4A32783 | D4A32783 | D4A32782 | D4A32782 |
Exceptional events queue name | IEXEPTP | IEXEPT2 | IEXEPT2 | IEXEPT2 | CEXEPT2 |
Unsolicited-data transaction name or response | IUP | IU2 | IU2 | IU2 | Negative |
Begin-session transaction name | ISIP | ISI2 | ISI2 | ISI2 | CSI2 |
End-session transaction name | none | IXI2 | IXI2 | IXI2 | CXI2 |
STSN transaction name | ISTP | n/a | n/a | n/a | n/a |
Initial inbound data | No | Yes | Yes | Yes | Yes |