SlideShare una empresa de Scribd logo
1 de 39
SKILLWISE-CICS APPLICATION
PROGRAMMING
Pre-requisites
 MVS and TSO/ISPF subsystem
 JCL & VSAM concepts
 Programming in COBOL
References
TITLE AUTHOR PUBLISHER
CICS for COBOL
programmer
Doug Lowe Mike Murach &
Associates
CICS Handbook Kageyama Tata McGraw Hill
CICS command level
Programming
Alida M Jatich John Wiley and Sons
Inc.,
CICS using COBOL Andrew M. Suhy Galgotia
Course Schedule
Introduction to CICS
Basic CICS commands
Application programming
CICS-Customer Information Control System
• CICS is a transaction manager designed for rapid, high-volume online
processing. This processing is mostly interactive (screen-oriented).
• CICS being a transaction processing system is also called as Online
Transaction Processing (OLTP) Software.
• The initial version of CICS was macro level i.e. assembler type
commands were used to request a CICS service.
• In CICS command level, each command could achieve the function of
what a series of CICS macros could achieve.
CICS System Concepts
Operating system
mDatabase/Data access methods
mTelecommunication Access methods
CICS Application Programs
(COBOL,PLI,Assembler)
Data
Handling
System Services
Monitoring Functions
Data
Communication
Functions
Application Program Services
CICS
CICS System Components
CICS consists of five major system components
Data-Communication Functions
Data-Handling Functions
Application Program Services
System Services
Monitoring Functions
CICS System Components(contd..)
Data Communication Functions :-
Provides an interface between CICS and terminals
or other systems.
Data Handling Functions :-
Provides an interface between CICS and data.
CICS System Components (contd..)
Application Program Services :-
Provides an interface between CICS and application
programs
System Services :-
Provides an interface between CICS and the operating
system.
Monitoring Functions :-
Monitors various events within CICS and provides a series of
statistics to be used for system tuning.
CICS Control Program and Tables
The core portion of CICS(called the CICS nucleus)
consists of IBM-supplied CICS control programs and
corresponding user-specified CICS control tables.
CICS Region
CICS Nucleus
Application program
TCA
TIOA
PCP
PPT PCT
SCPKCP
TCT
TCP
Others
LOADLIB
Terminal
DCA
CICS Control Program and Tables
CICS Control Program CICS Control Tables
FCP(File Control Program) FCT(File Control Table)
JCP(Journal Control Program) JCT(Journal Control Table)
KCP(Task Control Program) PCT(Program Control Table)
PCP(Program Control Program) PPT(Processing Program Table)
SCP(Storage Control Program) No Associated Table.
SCP(System Initialization
Program)
SIT(System Initialization Table)
TCP(Terminal Control Program) TCT(Terminal Control Table)
TDP(Transient Data Program) DCT(Destination Control Table)
TSP(Temporary Storage Program) TST(Temporary Storage Table)
Transaction
• CICS transaction is a collection of logically related
programs in an application
• All CICS transactions have four character identifiers
associated with them known as Trans IDs
CICS Start-Up
CICS itself is a job in which the main job step is the
CICS System Initialization Program (SIP).
Upon execution SIP loads the corresponding System
Initialization Table (SIT), based on which all the
control programs and tables are loaded.
Finally CICS is ready to execute a transaction within
it’s own region.
CICS SIGNON AND SIGNOFF
CICS supplied transaction CESN/CSSN is used to sign
on to the CICS region. The security information of all
users is registered in SignOn Table(SNT).
The primary function of CICS sign-off is used to
disassociate CICS user identifier from CICS in terms of
security.
Structure of CICS Application Program
IDENTIFICATION DIVISION
• Program-ID is required.
ENVIRONMENT DIVISION
• Only the header is required. No other entries such as INPUT-
OUTPUT SECTION, FILE CONTROL or SELECT needed
DATA DIVISION
• FILE SECTION (including FD) not required.
• WORKING-STORAGE SECTION is required.
• LINKAGE SECTION is optional
Structure of CICS Application
Program(Cont..)
PROCEDURE DIVISION
• Code is mixture of standard COBOL statements and special CICS
commands
• The following statements are prohibited:
ACCEPT, DISPLAY, STOP RUN, CURRENT-DATE, DAY
Any I/O statements
(OPEN,CLOSE,READ,WRITE,REWRITE,DELETE.START)
• SORT feature
• CICS application programs must end with CICS RETURN
command.
Compilation of Cobol-CICS program
SOURCE CODE
TRANSLATOR TRANSLATOR LISTING
TRANSLATED SOURCE CODE
COMPILER COMPILER LISTING
OBJECT MODULE
LINKAGE EDITOR
LOAD MODULE
LINK EDIT LISTING
CICS Command Format
• General Command Format:
EXEC CICS Command
[option (value)] ....
END-EXEC
• command : a CICS service request
• option : one of the options available to command
• value : determines the characteristics of the value to be
placed for the option as detailed information
Example: EXEC CICS SEND
FROM(ws-var)
LENGTH(emprec)
END-EXEC
Program Execution Process
• Plan the transaction and design the program
• Code the program
• Translate, compile and link edit the program to create Load
module
• Define Program in PPT
• Define transaction in PCT with program name
• Define the mapset in PPT
• Define the files, if required, in FCT
• Sign on to CICS
• Enter the transaction identifier
CICS Program Invocation
User Enters
TRANS-ID
CICS finds
TRANS-ID in PCT
to get program name
CICS finds
program name
in PPT
CICS loads program
into memory/
starts program
CICS runs program
in address space
TRANS-ID = Transaction Identifier
PCT = Program Control Table
PPT= Processing Program Table
Basic CICS Commands
SEND command:
To sent data to a terminal.
Syntax
EXEC CICS SEND
FROM(variable name)
LENGTH(length of variable)
END-EXEC.
22
Ways of Initiating a Transaction
Entering a transaction identifier in a terminal with
ENTER key.
Transaction identifier associated with a terminal for
pseudo-conversation.
START command which initiates a transaction
specified in the parameter.
Automatic Transaction Initiation(ATI).
By a 3270 attention identifier by defining PF and PA
keys in PCT for IBM 3270 terminal.
23
Basic CICS commands (Cont…)
RECEIVE command:
To receive data from a terminal.
Syntax
EXEC CICS RECEIVE
INTO (variable name)
LENGTH(length of variable)
END-EXEC.
24
Basic CICS commands (Cont…)
• RETURN command:
To terminate the transaction and return control to CICS.
Syntax:
EXEC CICS RETURN
END-EXEC.
25
Exception Handling in CICS
• To handle expected CICS errors
– HANDLE CONDITION
– RESP
– The above errors can be ignored by using IGNORE
CONDITION or NO HANDLE
26
Handle and Ignore Condition
• HANDLE CONDITION
EXEC CICS HANDLE CONDITION
LENGERR (LENGTH-ERR-PARA)
INVREQ (INVREQ-ERR-PARA)
DUPKEY (DUPKEY-ERR-PARA)
ERROR (GEN-ERR-PARA)
END-EXEC.
• IGNORE CONDITION
EXEC CICS IGNORE CONDITION
LENGERR
END-EXEC.
27
RESP Code Handling
WORKING-STORAGE SECTION.
01 WS-RCODE PIC S9(8) COMP.
---------
PROCEDURE DIVISION.
---------
EXEC CICS SEND
FROM (-----)
LENGTH (-----)
RESP (WS-RCODE)
END-EXEC.
IF WS-RCODE = DFHRESP (LENGERR)
PERFORM LENGTH-ERROR-PARA-0100.
28
Handle Aid Command
It is used to specify the label to which control is to be
passed when the specified AID is received.
Example
EXEC CICS HANDLE AID
PF3(END-ROUTINE)
PA1(CANCEL-ROUTINE)
ENTER(NORMAL-ROUTINE)
ANYKEY(WRONG-KEY-ROUTINE)
END-EXEC.
29
EXEC INTERFACE BLOCK
• EIB contains system related information pertaining to a task .
Gives information like
Task number
Transaction ID and Terminal ID
CICS response code from the last command etc.
30
Attention Identifiers
It indicates which method the terminal operator has
used to initiate the transfer of information from the
terminal device to CICS.
Example
IF EIBAID=DFHPF3
PERFORM END-ROUTINE.
IF EIBAID =DFHPA1
PERFORM CANCEL-ROUTINE.
IF EIBAID =DFHENTER
PERFORM NORMAL-ROUTINE.
GO TO WRONG-KEY-ROUTINE.
31
CICS Supplied Transactions
CESN : CICS Execute Sign ON
CEDA : CICS Execute Definition and Administration
CEMT :CICS Execute Master Terminal
CECI : CICS Execute Command Interpreter
CEDF : CICS Execute Debug Facility
CESF : CICS Execute Sign OFF
CEBR : CICS Execute temporary storage BRowse
CICS Hello World – Sample Program
33
Step 1: Open a tso session.
Step 2: Create a new PDS.
Step 3: Code the following program in a new member.
Execution of Hello World Program
34
After the translation and compilation process, Open an CICS
session for Mainframe. Enter your User id and Password
and press the Enter Key.
Defining Resource in Control Tables
• To define a Transaction entry in PCT Table use the below
command in CICS region.
CEDA DEFINE TRANSACTION(TRAN-
ID) PROGRAM(PROGRAM-NAME)
• Once define process is completed , need
the Installation process for Transaction id in PCT table. Use the
below command for installation.
CEDA INSTALL TRANSACTION(TRAN-ID)
• Once Installation is completed for Tran-id, use the below
command in CICS region To Find out a Transaction- Id details
from PCT table.
CEMT INQUIRE TRANSACTION(TRAN-ID)
35
Defining Resource in Control Tables
(Cont…)
• PPT(Processing Program Table) :This Table contains the name
of the program and map details.
• To define a program entry or MAP entry in PPT table , use the
below command in CICS region.
CEDA DEFINE PROGRAM(PROGRAM- NAME) -
For program definition
CEDA DEFINE MAPSET(MAPSET- NAME)
– For Map definition
36
Defining Resource in Control Tables
(Cont…)• Once define process is completed , need the installation
process for Program, Map
CEDA INSTALLATION PROGRAM(PROGRAM-NAME)
CEDA INSTALLATION MAPSET(MAPSET NAME)
• After completing the installation process for entry, use the
command in CICS region to find out the program details from
PPT Table.
CEMT INQUIRE PROGRAM(PROGRAM-NAME)
• By using below command in CICS region, we can find the Tran-
id Details for the specified program.
CEMT INQUIRE TRANSACTION PROGRAM(PROGRAM-NAME)
37
Defining Resource in Control Tables
(Cont…)
• If CICS program is modified or compiled, the new copy of the
load module has to be loaded into main storage. CEMT is used
to refresh the load module
CEMT SET PROGRAM(PROGRAM-
NAME) NEWCOPY (OR)
CECI SET PROGRAM(PROGRAM- NAME) NEWCOPY
• Using below command we can test the map
CECI SEND MAP(MAPNAME) MAPSET(MAPS ET-
NAME)
Skillwise cics part 1

Más contenido relacionado

La actualidad más candente

Mainframe Architecture & Product Overview
Mainframe Architecture & Product OverviewMainframe Architecture & Product Overview
Mainframe Architecture & Product Overviewabhi1112
 
Mainframe JCL Part - 1
Mainframe JCL Part - 1Mainframe JCL Part - 1
Mainframe JCL Part - 1janaki ram
 
CICS basics overview session-1
CICS basics overview session-1CICS basics overview session-1
CICS basics overview session-1Srinimf-Slides
 
Z4R: Intro to Storage and DFSMS for z/OS
Z4R: Intro to Storage and DFSMS for z/OSZ4R: Intro to Storage and DFSMS for z/OS
Z4R: Intro to Storage and DFSMS for z/OSTony Pearson
 
Datasets and catalogs
Datasets and catalogs Datasets and catalogs
Datasets and catalogs Roma Vyas
 
IMS DC Self Study Complete Tutorial
IMS DC Self Study Complete TutorialIMS DC Self Study Complete Tutorial
IMS DC Self Study Complete TutorialSrinimf-Slides
 
JCL UTILITIES IEBCOPY
JCL UTILITIES IEBCOPYJCL UTILITIES IEBCOPY
JCL UTILITIES IEBCOPYjanaki ram
 
Vsam presentation PPT
Vsam presentation PPTVsam presentation PPT
Vsam presentation PPTAnil Polsani
 
Job Control Language
Job Control LanguageJob Control Language
Job Control Languagekapa rohit
 
Jcl tutor
Jcl tutorJcl tutor
Jcl tutorshivas
 
DB2 for z/OS Architecture in Nutshell
DB2 for z/OS Architecture in NutshellDB2 for z/OS Architecture in Nutshell
DB2 for z/OS Architecture in NutshellCuneyt Goksu
 
Reading the LISTCAT entries for VSAM
Reading the LISTCAT entries for VSAMReading the LISTCAT entries for VSAM
Reading the LISTCAT entries for VSAMDan O'Dea
 
DB2 Interview Questions - Part 1
DB2 Interview Questions - Part 1DB2 Interview Questions - Part 1
DB2 Interview Questions - Part 1ReKruiTIn.com
 
Advanced REXX Programming Techniques
Advanced REXX Programming TechniquesAdvanced REXX Programming Techniques
Advanced REXX Programming TechniquesDan O'Dea
 

La actualidad más candente (20)

Mainframe Architecture & Product Overview
Mainframe Architecture & Product OverviewMainframe Architecture & Product Overview
Mainframe Architecture & Product Overview
 
Mainframe JCL Part - 1
Mainframe JCL Part - 1Mainframe JCL Part - 1
Mainframe JCL Part - 1
 
CICS basics overview session-1
CICS basics overview session-1CICS basics overview session-1
CICS basics overview session-1
 
Cics Connectivity
Cics ConnectivityCics Connectivity
Cics Connectivity
 
Skillwise JCL
Skillwise JCLSkillwise JCL
Skillwise JCL
 
Z4R: Intro to Storage and DFSMS for z/OS
Z4R: Intro to Storage and DFSMS for z/OSZ4R: Intro to Storage and DFSMS for z/OS
Z4R: Intro to Storage and DFSMS for z/OS
 
Datasets and catalogs
Datasets and catalogs Datasets and catalogs
Datasets and catalogs
 
IMS DC Self Study Complete Tutorial
IMS DC Self Study Complete TutorialIMS DC Self Study Complete Tutorial
IMS DC Self Study Complete Tutorial
 
JCL UTILITIES IEBCOPY
JCL UTILITIES IEBCOPYJCL UTILITIES IEBCOPY
JCL UTILITIES IEBCOPY
 
Mainframe
MainframeMainframe
Mainframe
 
Vsam presentation PPT
Vsam presentation PPTVsam presentation PPT
Vsam presentation PPT
 
DB2 utilities
DB2 utilitiesDB2 utilities
DB2 utilities
 
Job Control Language
Job Control LanguageJob Control Language
Job Control Language
 
Jcl tutor
Jcl tutorJcl tutor
Jcl tutor
 
IBM SMP/E
IBM SMP/EIBM SMP/E
IBM SMP/E
 
Tso and ispf
Tso and ispfTso and ispf
Tso and ispf
 
DB2 for z/OS Architecture in Nutshell
DB2 for z/OS Architecture in NutshellDB2 for z/OS Architecture in Nutshell
DB2 for z/OS Architecture in Nutshell
 
Reading the LISTCAT entries for VSAM
Reading the LISTCAT entries for VSAMReading the LISTCAT entries for VSAM
Reading the LISTCAT entries for VSAM
 
DB2 Interview Questions - Part 1
DB2 Interview Questions - Part 1DB2 Interview Questions - Part 1
DB2 Interview Questions - Part 1
 
Advanced REXX Programming Techniques
Advanced REXX Programming TechniquesAdvanced REXX Programming Techniques
Advanced REXX Programming Techniques
 

Similar a Skillwise cics part 1

Cics application programming - session 2
Cics   application programming - session 2Cics   application programming - session 2
Cics application programming - session 2Srinimf-Slides
 
Understanding IBM Tivoli OMEGAMON for DB2 Batch Reporting, Customization and ...
Understanding IBM Tivoli OMEGAMON for DB2 Batch Reporting, Customization and ...Understanding IBM Tivoli OMEGAMON for DB2 Batch Reporting, Customization and ...
Understanding IBM Tivoli OMEGAMON for DB2 Batch Reporting, Customization and ...Cuneyt Goksu
 
SHARE 2014, Pittsburgh CICS scalability
SHARE 2014, Pittsburgh CICS scalabilitySHARE 2014, Pittsburgh CICS scalability
SHARE 2014, Pittsburgh CICS scalabilitynick_garrod
 
SHARE 2014, Pittsburgh CICS scalability
SHARE 2014, Pittsburgh CICS scalabilitySHARE 2014, Pittsburgh CICS scalability
SHARE 2014, Pittsburgh CICS scalabilitynick_garrod
 
Siemens s7 300 programming
Siemens s7 300 programming Siemens s7 300 programming
Siemens s7 300 programming satyajit patra
 
CS304PC:Computer Organization and Architecture Session 33 demo 1 ppt.pdf
CS304PC:Computer Organization and Architecture  Session 33 demo 1 ppt.pdfCS304PC:Computer Organization and Architecture  Session 33 demo 1 ppt.pdf
CS304PC:Computer Organization and Architecture Session 33 demo 1 ppt.pdfAsst.prof M.Gokilavani
 
Parallel Processing Techniques Pipelining
Parallel Processing Techniques PipeliningParallel Processing Techniques Pipelining
Parallel Processing Techniques PipeliningRNShukla7
 
Computer_Architecture_3rd_Edition_by_Moris_Mano_Ch_09.ppt
Computer_Architecture_3rd_Edition_by_Moris_Mano_Ch_09.pptComputer_Architecture_3rd_Edition_by_Moris_Mano_Ch_09.ppt
Computer_Architecture_3rd_Edition_by_Moris_Mano_Ch_09.pptHermellaGashaw
 
Unit 3-pipelining & vector processing
Unit 3-pipelining & vector processingUnit 3-pipelining & vector processing
Unit 3-pipelining & vector processingvishal choudhary
 
IBM MQ - Monitoring and Managing Hybrid Messaging Environments
IBM MQ - Monitoring and Managing Hybrid Messaging EnvironmentsIBM MQ - Monitoring and Managing Hybrid Messaging Environments
IBM MQ - Monitoring and Managing Hybrid Messaging EnvironmentsMarkTaylorIBM
 
Service-Level Objective for Serverless Applications
Service-Level Objective for Serverless ApplicationsService-Level Objective for Serverless Applications
Service-Level Objective for Serverless Applicationsalekn
 
An Effective Approach to Migrate Cassandra Thrift to CQL (Yabin Meng, Pythian...
An Effective Approach to Migrate Cassandra Thrift to CQL (Yabin Meng, Pythian...An Effective Approach to Migrate Cassandra Thrift to CQL (Yabin Meng, Pythian...
An Effective Approach to Migrate Cassandra Thrift to CQL (Yabin Meng, Pythian...DataStax
 
Software Defined Service Networking (SDSN) - by Dr. Indika Kumara
Software Defined Service Networking (SDSN) - by Dr. Indika KumaraSoftware Defined Service Networking (SDSN) - by Dr. Indika Kumara
Software Defined Service Networking (SDSN) - by Dr. Indika KumaraThejan Wijesinghe
 
1961 no rainclouds here! using cics platform and policies to keep your privat...
1961 no rainclouds here! using cics platform and policies to keep your privat...1961 no rainclouds here! using cics platform and policies to keep your privat...
1961 no rainclouds here! using cics platform and policies to keep your privat...Matthew Webster
 
Short.course.introduction.to.vhdl for beginners
Short.course.introduction.to.vhdl for beginners Short.course.introduction.to.vhdl for beginners
Short.course.introduction.to.vhdl for beginners Ravi Sony
 

Similar a Skillwise cics part 1 (20)

Cics application programming - session 2
Cics   application programming - session 2Cics   application programming - session 2
Cics application programming - session 2
 
Cics faqs
Cics faqsCics faqs
Cics faqs
 
Understanding IBM Tivoli OMEGAMON for DB2 Batch Reporting, Customization and ...
Understanding IBM Tivoli OMEGAMON for DB2 Batch Reporting, Customization and ...Understanding IBM Tivoli OMEGAMON for DB2 Batch Reporting, Customization and ...
Understanding IBM Tivoli OMEGAMON for DB2 Batch Reporting, Customization and ...
 
SHARE 2014, Pittsburgh CICS scalability
SHARE 2014, Pittsburgh CICS scalabilitySHARE 2014, Pittsburgh CICS scalability
SHARE 2014, Pittsburgh CICS scalability
 
SHARE 2014, Pittsburgh CICS scalability
SHARE 2014, Pittsburgh CICS scalabilitySHARE 2014, Pittsburgh CICS scalability
SHARE 2014, Pittsburgh CICS scalability
 
Siemens s7 300 programming
Siemens s7 300 programming Siemens s7 300 programming
Siemens s7 300 programming
 
CS304PC:Computer Organization and Architecture Session 33 demo 1 ppt.pdf
CS304PC:Computer Organization and Architecture  Session 33 demo 1 ppt.pdfCS304PC:Computer Organization and Architecture  Session 33 demo 1 ppt.pdf
CS304PC:Computer Organization and Architecture Session 33 demo 1 ppt.pdf
 
Parallel Processing Techniques Pipelining
Parallel Processing Techniques PipeliningParallel Processing Techniques Pipelining
Parallel Processing Techniques Pipelining
 
Computer_Architecture_3rd_Edition_by_Moris_Mano_Ch_09.ppt
Computer_Architecture_3rd_Edition_by_Moris_Mano_Ch_09.pptComputer_Architecture_3rd_Edition_by_Moris_Mano_Ch_09.ppt
Computer_Architecture_3rd_Edition_by_Moris_Mano_Ch_09.ppt
 
Unit 3-pipelining & vector processing
Unit 3-pipelining & vector processingUnit 3-pipelining & vector processing
Unit 3-pipelining & vector processing
 
sairam_CV
sairam_CVsairam_CV
sairam_CV
 
syn3-en.pdf
syn3-en.pdfsyn3-en.pdf
syn3-en.pdf
 
IBM MQ - Monitoring and Managing Hybrid Messaging Environments
IBM MQ - Monitoring and Managing Hybrid Messaging EnvironmentsIBM MQ - Monitoring and Managing Hybrid Messaging Environments
IBM MQ - Monitoring and Managing Hybrid Messaging Environments
 
BTCS501_MM_Ch9.pptx
BTCS501_MM_Ch9.pptxBTCS501_MM_Ch9.pptx
BTCS501_MM_Ch9.pptx
 
Service-Level Objective for Serverless Applications
Service-Level Objective for Serverless ApplicationsService-Level Objective for Serverless Applications
Service-Level Objective for Serverless Applications
 
An Effective Approach to Migrate Cassandra Thrift to CQL (Yabin Meng, Pythian...
An Effective Approach to Migrate Cassandra Thrift to CQL (Yabin Meng, Pythian...An Effective Approach to Migrate Cassandra Thrift to CQL (Yabin Meng, Pythian...
An Effective Approach to Migrate Cassandra Thrift to CQL (Yabin Meng, Pythian...
 
Software Defined Service Networking (SDSN) - by Dr. Indika Kumara
Software Defined Service Networking (SDSN) - by Dr. Indika KumaraSoftware Defined Service Networking (SDSN) - by Dr. Indika Kumara
Software Defined Service Networking (SDSN) - by Dr. Indika Kumara
 
1961 no rainclouds here! using cics platform and policies to keep your privat...
1961 no rainclouds here! using cics platform and policies to keep your privat...1961 no rainclouds here! using cics platform and policies to keep your privat...
1961 no rainclouds here! using cics platform and policies to keep your privat...
 
Short.course.introduction.to.vhdl for beginners
Short.course.introduction.to.vhdl for beginners Short.course.introduction.to.vhdl for beginners
Short.course.introduction.to.vhdl for beginners
 
Atul_T_Biradar_CV
Atul_T_Biradar_CVAtul_T_Biradar_CV
Atul_T_Biradar_CV
 

Más de Skillwise Group

Skillwise Consulting New updated
Skillwise Consulting New updatedSkillwise Consulting New updated
Skillwise Consulting New updatedSkillwise Group
 
Retailing & logistics profile
Retailing & logistics profileRetailing & logistics profile
Retailing & logistics profileSkillwise Group
 
Overview- Skillwise Consulting
Overview- Skillwise Consulting Overview- Skillwise Consulting
Overview- Skillwise Consulting Skillwise Group
 
Skillwise corporate presentation
Skillwise corporate presentationSkillwise corporate presentation
Skillwise corporate presentationSkillwise Group
 
Skillwise Softskill Training Workshop
Skillwise Softskill Training WorkshopSkillwise Softskill Training Workshop
Skillwise Softskill Training WorkshopSkillwise Group
 
Skillwise Insurance profile
Skillwise Insurance profileSkillwise Insurance profile
Skillwise Insurance profileSkillwise Group
 
Skillwise Train and Hire Services
Skillwise Train and Hire ServicesSkillwise Train and Hire Services
Skillwise Train and Hire ServicesSkillwise Group
 
Skillwise Digital Technology
Skillwise Digital Technology Skillwise Digital Technology
Skillwise Digital Technology Skillwise Group
 
Skillwise Boot Camp Training
Skillwise Boot Camp TrainingSkillwise Boot Camp Training
Skillwise Boot Camp TrainingSkillwise Group
 
Skillwise Academy Profile
Skillwise Academy ProfileSkillwise Academy Profile
Skillwise Academy ProfileSkillwise Group
 
SKILLWISE - OOPS CONCEPT
SKILLWISE - OOPS CONCEPTSKILLWISE - OOPS CONCEPT
SKILLWISE - OOPS CONCEPTSkillwise Group
 
Skillwise - Business writing
Skillwise - Business writing Skillwise - Business writing
Skillwise - Business writing Skillwise Group
 

Más de Skillwise Group (20)

Skillwise Consulting New updated
Skillwise Consulting New updatedSkillwise Consulting New updated
Skillwise Consulting New updated
 
Email Etiquette
Email Etiquette Email Etiquette
Email Etiquette
 
Healthcare profile
Healthcare profileHealthcare profile
Healthcare profile
 
Manufacturing courses
Manufacturing coursesManufacturing courses
Manufacturing courses
 
Retailing & logistics profile
Retailing & logistics profileRetailing & logistics profile
Retailing & logistics profile
 
Skillwise orientation
Skillwise orientationSkillwise orientation
Skillwise orientation
 
Overview- Skillwise Consulting
Overview- Skillwise Consulting Overview- Skillwise Consulting
Overview- Skillwise Consulting
 
Skillwise corporate presentation
Skillwise corporate presentationSkillwise corporate presentation
Skillwise corporate presentation
 
Skillwise Profile
Skillwise ProfileSkillwise Profile
Skillwise Profile
 
Skillwise Softskill Training Workshop
Skillwise Softskill Training WorkshopSkillwise Softskill Training Workshop
Skillwise Softskill Training Workshop
 
Skillwise Insurance profile
Skillwise Insurance profileSkillwise Insurance profile
Skillwise Insurance profile
 
Skillwise Train and Hire Services
Skillwise Train and Hire ServicesSkillwise Train and Hire Services
Skillwise Train and Hire Services
 
Skillwise Digital Technology
Skillwise Digital Technology Skillwise Digital Technology
Skillwise Digital Technology
 
Skillwise Boot Camp Training
Skillwise Boot Camp TrainingSkillwise Boot Camp Training
Skillwise Boot Camp Training
 
Skillwise Academy Profile
Skillwise Academy ProfileSkillwise Academy Profile
Skillwise Academy Profile
 
Skillwise Overview
Skillwise OverviewSkillwise Overview
Skillwise Overview
 
SKILLWISE - OOPS CONCEPT
SKILLWISE - OOPS CONCEPTSKILLWISE - OOPS CONCEPT
SKILLWISE - OOPS CONCEPT
 
Skillwise - Business writing
Skillwise - Business writing Skillwise - Business writing
Skillwise - Business writing
 
Imc.ppt
Imc.pptImc.ppt
Imc.ppt
 
Skillwise AML
Skillwise AMLSkillwise AML
Skillwise AML
 

Último

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 

Último (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 

Skillwise cics part 1

  • 2. Pre-requisites  MVS and TSO/ISPF subsystem  JCL & VSAM concepts  Programming in COBOL
  • 3. References TITLE AUTHOR PUBLISHER CICS for COBOL programmer Doug Lowe Mike Murach & Associates CICS Handbook Kageyama Tata McGraw Hill CICS command level Programming Alida M Jatich John Wiley and Sons Inc., CICS using COBOL Andrew M. Suhy Galgotia
  • 4. Course Schedule Introduction to CICS Basic CICS commands Application programming
  • 5. CICS-Customer Information Control System • CICS is a transaction manager designed for rapid, high-volume online processing. This processing is mostly interactive (screen-oriented). • CICS being a transaction processing system is also called as Online Transaction Processing (OLTP) Software. • The initial version of CICS was macro level i.e. assembler type commands were used to request a CICS service. • In CICS command level, each command could achieve the function of what a series of CICS macros could achieve.
  • 6. CICS System Concepts Operating system mDatabase/Data access methods mTelecommunication Access methods CICS Application Programs (COBOL,PLI,Assembler) Data Handling System Services Monitoring Functions Data Communication Functions Application Program Services CICS
  • 7. CICS System Components CICS consists of five major system components Data-Communication Functions Data-Handling Functions Application Program Services System Services Monitoring Functions
  • 8. CICS System Components(contd..) Data Communication Functions :- Provides an interface between CICS and terminals or other systems. Data Handling Functions :- Provides an interface between CICS and data.
  • 9. CICS System Components (contd..) Application Program Services :- Provides an interface between CICS and application programs System Services :- Provides an interface between CICS and the operating system. Monitoring Functions :- Monitors various events within CICS and provides a series of statistics to be used for system tuning.
  • 10. CICS Control Program and Tables The core portion of CICS(called the CICS nucleus) consists of IBM-supplied CICS control programs and corresponding user-specified CICS control tables.
  • 11. CICS Region CICS Nucleus Application program TCA TIOA PCP PPT PCT SCPKCP TCT TCP Others LOADLIB Terminal DCA
  • 12. CICS Control Program and Tables CICS Control Program CICS Control Tables FCP(File Control Program) FCT(File Control Table) JCP(Journal Control Program) JCT(Journal Control Table) KCP(Task Control Program) PCT(Program Control Table) PCP(Program Control Program) PPT(Processing Program Table) SCP(Storage Control Program) No Associated Table. SCP(System Initialization Program) SIT(System Initialization Table) TCP(Terminal Control Program) TCT(Terminal Control Table) TDP(Transient Data Program) DCT(Destination Control Table) TSP(Temporary Storage Program) TST(Temporary Storage Table)
  • 13. Transaction • CICS transaction is a collection of logically related programs in an application • All CICS transactions have four character identifiers associated with them known as Trans IDs
  • 14. CICS Start-Up CICS itself is a job in which the main job step is the CICS System Initialization Program (SIP). Upon execution SIP loads the corresponding System Initialization Table (SIT), based on which all the control programs and tables are loaded. Finally CICS is ready to execute a transaction within it’s own region.
  • 15. CICS SIGNON AND SIGNOFF CICS supplied transaction CESN/CSSN is used to sign on to the CICS region. The security information of all users is registered in SignOn Table(SNT). The primary function of CICS sign-off is used to disassociate CICS user identifier from CICS in terms of security.
  • 16. Structure of CICS Application Program IDENTIFICATION DIVISION • Program-ID is required. ENVIRONMENT DIVISION • Only the header is required. No other entries such as INPUT- OUTPUT SECTION, FILE CONTROL or SELECT needed DATA DIVISION • FILE SECTION (including FD) not required. • WORKING-STORAGE SECTION is required. • LINKAGE SECTION is optional
  • 17. Structure of CICS Application Program(Cont..) PROCEDURE DIVISION • Code is mixture of standard COBOL statements and special CICS commands • The following statements are prohibited: ACCEPT, DISPLAY, STOP RUN, CURRENT-DATE, DAY Any I/O statements (OPEN,CLOSE,READ,WRITE,REWRITE,DELETE.START) • SORT feature • CICS application programs must end with CICS RETURN command.
  • 18. Compilation of Cobol-CICS program SOURCE CODE TRANSLATOR TRANSLATOR LISTING TRANSLATED SOURCE CODE COMPILER COMPILER LISTING OBJECT MODULE LINKAGE EDITOR LOAD MODULE LINK EDIT LISTING
  • 19. CICS Command Format • General Command Format: EXEC CICS Command [option (value)] .... END-EXEC • command : a CICS service request • option : one of the options available to command • value : determines the characteristics of the value to be placed for the option as detailed information Example: EXEC CICS SEND FROM(ws-var) LENGTH(emprec) END-EXEC
  • 20. Program Execution Process • Plan the transaction and design the program • Code the program • Translate, compile and link edit the program to create Load module • Define Program in PPT • Define transaction in PCT with program name • Define the mapset in PPT • Define the files, if required, in FCT • Sign on to CICS • Enter the transaction identifier
  • 21. CICS Program Invocation User Enters TRANS-ID CICS finds TRANS-ID in PCT to get program name CICS finds program name in PPT CICS loads program into memory/ starts program CICS runs program in address space TRANS-ID = Transaction Identifier PCT = Program Control Table PPT= Processing Program Table
  • 22. Basic CICS Commands SEND command: To sent data to a terminal. Syntax EXEC CICS SEND FROM(variable name) LENGTH(length of variable) END-EXEC. 22
  • 23. Ways of Initiating a Transaction Entering a transaction identifier in a terminal with ENTER key. Transaction identifier associated with a terminal for pseudo-conversation. START command which initiates a transaction specified in the parameter. Automatic Transaction Initiation(ATI). By a 3270 attention identifier by defining PF and PA keys in PCT for IBM 3270 terminal. 23
  • 24. Basic CICS commands (Cont…) RECEIVE command: To receive data from a terminal. Syntax EXEC CICS RECEIVE INTO (variable name) LENGTH(length of variable) END-EXEC. 24
  • 25. Basic CICS commands (Cont…) • RETURN command: To terminate the transaction and return control to CICS. Syntax: EXEC CICS RETURN END-EXEC. 25
  • 26. Exception Handling in CICS • To handle expected CICS errors – HANDLE CONDITION – RESP – The above errors can be ignored by using IGNORE CONDITION or NO HANDLE 26
  • 27. Handle and Ignore Condition • HANDLE CONDITION EXEC CICS HANDLE CONDITION LENGERR (LENGTH-ERR-PARA) INVREQ (INVREQ-ERR-PARA) DUPKEY (DUPKEY-ERR-PARA) ERROR (GEN-ERR-PARA) END-EXEC. • IGNORE CONDITION EXEC CICS IGNORE CONDITION LENGERR END-EXEC. 27
  • 28. RESP Code Handling WORKING-STORAGE SECTION. 01 WS-RCODE PIC S9(8) COMP. --------- PROCEDURE DIVISION. --------- EXEC CICS SEND FROM (-----) LENGTH (-----) RESP (WS-RCODE) END-EXEC. IF WS-RCODE = DFHRESP (LENGERR) PERFORM LENGTH-ERROR-PARA-0100. 28
  • 29. Handle Aid Command It is used to specify the label to which control is to be passed when the specified AID is received. Example EXEC CICS HANDLE AID PF3(END-ROUTINE) PA1(CANCEL-ROUTINE) ENTER(NORMAL-ROUTINE) ANYKEY(WRONG-KEY-ROUTINE) END-EXEC. 29
  • 30. EXEC INTERFACE BLOCK • EIB contains system related information pertaining to a task . Gives information like Task number Transaction ID and Terminal ID CICS response code from the last command etc. 30
  • 31. Attention Identifiers It indicates which method the terminal operator has used to initiate the transfer of information from the terminal device to CICS. Example IF EIBAID=DFHPF3 PERFORM END-ROUTINE. IF EIBAID =DFHPA1 PERFORM CANCEL-ROUTINE. IF EIBAID =DFHENTER PERFORM NORMAL-ROUTINE. GO TO WRONG-KEY-ROUTINE. 31
  • 32. CICS Supplied Transactions CESN : CICS Execute Sign ON CEDA : CICS Execute Definition and Administration CEMT :CICS Execute Master Terminal CECI : CICS Execute Command Interpreter CEDF : CICS Execute Debug Facility CESF : CICS Execute Sign OFF CEBR : CICS Execute temporary storage BRowse
  • 33. CICS Hello World – Sample Program 33 Step 1: Open a tso session. Step 2: Create a new PDS. Step 3: Code the following program in a new member.
  • 34. Execution of Hello World Program 34 After the translation and compilation process, Open an CICS session for Mainframe. Enter your User id and Password and press the Enter Key.
  • 35. Defining Resource in Control Tables • To define a Transaction entry in PCT Table use the below command in CICS region. CEDA DEFINE TRANSACTION(TRAN- ID) PROGRAM(PROGRAM-NAME) • Once define process is completed , need the Installation process for Transaction id in PCT table. Use the below command for installation. CEDA INSTALL TRANSACTION(TRAN-ID) • Once Installation is completed for Tran-id, use the below command in CICS region To Find out a Transaction- Id details from PCT table. CEMT INQUIRE TRANSACTION(TRAN-ID) 35
  • 36. Defining Resource in Control Tables (Cont…) • PPT(Processing Program Table) :This Table contains the name of the program and map details. • To define a program entry or MAP entry in PPT table , use the below command in CICS region. CEDA DEFINE PROGRAM(PROGRAM- NAME) - For program definition CEDA DEFINE MAPSET(MAPSET- NAME) – For Map definition 36
  • 37. Defining Resource in Control Tables (Cont…)• Once define process is completed , need the installation process for Program, Map CEDA INSTALLATION PROGRAM(PROGRAM-NAME) CEDA INSTALLATION MAPSET(MAPSET NAME) • After completing the installation process for entry, use the command in CICS region to find out the program details from PPT Table. CEMT INQUIRE PROGRAM(PROGRAM-NAME) • By using below command in CICS region, we can find the Tran- id Details for the specified program. CEMT INQUIRE TRANSACTION PROGRAM(PROGRAM-NAME) 37
  • 38. Defining Resource in Control Tables (Cont…) • If CICS program is modified or compiled, the new copy of the load module has to be loaded into main storage. CEMT is used to refresh the load module CEMT SET PROGRAM(PROGRAM- NAME) NEWCOPY (OR) CECI SET PROGRAM(PROGRAM- NAME) NEWCOPY • Using below command we can test the map CECI SEND MAP(MAPNAME) MAPSET(MAPS ET- NAME)