Skip Headers

Oracle9iAS InterConnect Adapter for CICS Installation and User's Guide
Release 2 (9.0.2)

Part Number A95442-01
Go To Documentation Library
Home
Go To Table Of Contents
Contents

Go to previous page

Index

A  B  C  D  E  F  I  K  L  M  N  P  R  S  T  U  V 


A

abend, 4-4
advanced program to program communication, 4-4
advanced queuing adapter
installation, 2-2
already-verified protocols, 5-5
api
eci protocol, 3-8
sna lu 6.2 cpi-c protocol, 3-7
using the eci protocol api, 3-6
using the sna lu 6.2 cpi-c, 3-5
application
startup, 3-12, 3-13
application parameter, 2-5

B

binary types, 6-10
bind time security, 5-7

C

cics, 4-5
adapter information flow, 3-9
as a transaction program, 4-15
configuration, 2-4
cpi communications, 1-3
definitions, 1-2
how the adapter communicates with cics, 3-5
implementing the adapter, 3-7
installation, 2-2
installation tasks, 2-2
logical unit, 1-2
multi-threading, 3-10
preinstallation, 2-2
security implementation, 5-6
security in general, 5-7
system requirements, supported platforms, 1-2
using the adapter inbound, 3-11
what is, 1-2
cics adapter, 3-2
conversations, 5-2
cics region, 4-5
cics security implementation
bind time security, 5-7
cics transaction, 4-5
classes, 3-3
concepts, 4-3
configuration, 2-4
agent connection parameters, 2-7
cics parameters, 2-11
directories, 2-4, 2-5
executable files, 2-4
files, 2-5
hub.ini, 2-6
initialization file settings, 2-6
configuration editor
general, 7-4
login, 7-3
mode name, 7-4
security, 7-5
synchronization level, 7-5
using, 7-2
conversation, 4-5
conversation level security, 5-5
already-verified protocols, 5-5
end-user verification, 5-5
password expiration management, 5-6
persistent verification, 5-6
conversations
cics adapter, 5-2
cpi communications, 1-3
cpi communications (cpi-c), 4-6

D

data flow, 5-2

E

end-user verification, 5-5
error handling, 5-10
event
creating a subscribed event, 3-19
explicitly delimited variable length sequences, 6-17

F

fixed length tables, 6-17
fixed precision numbers, 6-15
fixed scale, 6-15
floating point numbers, 6-14
floating point types, 6-10

I

implicitly delimited variable length sequences, 6-18
inbound, 3-11
design time, 3-13
eci protocol, 3-12
runtime, 3-14
sna lu 6.2 cpi-c protocol, 3-11
installation, 2-2
tasks, 2-2
integral types, 6-10
istudio
creating a subscribed event, 3-19
creating an implemented procedure, 3-14

K

keyword modifiers, 6-20

L

length-prefixed strings, 6-11
logical unit, 1-2, 5-2
logical unit (LU), 4-7
lu 6.2
security, 5-8
user security, 5-8
lu 6.2 cpi-c protocol stack, 4-2
lu-lu verification, 5-4

M

MDL Classes
Introducing, 6-2
message description language, 3-2
alias, 6-21
array types (tables), 6-16
case sensitivity, 6-22
class declaration, 6-3
comment insertion, 6-21
complex types, 6-13
date types, 6-13
delimited strings, 6-12
expression, 6-21
file, 6-3
file example, 6-22
fixed-length padded strings, 6-12
implicit strings, 6-13
method declaration, 6-5
null terminated strings, 6-12
numerical types, 6-14
struct declaration, 6-5
structured types, 6-19
supported data types, 6-9
typedef declaration, 6-5
what is, 6-2
message description language file format
general syntax conventions, 6-19
type modifiers, 6-20
type parameters, 6-19
method declarations
argument declarations, 6-8
return type, 6-7
mode name, 4-7

N

node, 4-7
node type, 4-7

P

packed decimal, 6-16
parallel sessions, 5-2
password expiration management, 5-6
persistent verification, 5-6
physical unit, 4-8
prefixed variable length tables, 6-17
preinstallation, 2-2
procedure
creating implemented in istudio, 3-14
protocol
cics adapter, 3-8
protocols
lu6.2 cpi-c stack, eci stack, 3-4

R

receiving
cics adapter request, 3-13

S

security, 5-3
conversation level, 5-5
lu 6.2, 5-4
session level, 5-4
using the eci protocol, 3-7
session, 4-8
session level cryptography, 5-4
session level security, 5-4
lu-lu verification, 5-4
string types, 6-11
supported platforms, 1-2
synchronization levels, 4-9
synchronization services, 4-10
system management facility (SMF), 4-8
system network architecture
synchronization of changes, 5-9
system network architecture (SNA), 4-8
system requirements, 1-2
systems network architecture controllers, 4-9

T

terms, 4-3
transaction program (TP), 4-12
type declaration modifiers, 6-20

U

url, 3-4
urls, 4-2

V

variable precision numbers, 6-15
verb control block (vcb), 4-12
verbs, 4-13

Go to previous page
Oracle
Copyright © 2002 Oracle Corporation.

All Rights Reserved.
Go To Documentation Library
Home
Go To Table Of Contents
Contents