Index
A
B
C
D
E
F
I
K
L
M
N
P
R
S
T
U
V
A
- abend, 4-4
- advanced program to program communication, 4-4
- advanced queuing adapter
- installation, 2-2
- already-verified protocols, 5-5
- api
- eci protocol, 3-8
- sna lu 6.2 cpi-c protocol, 3-7
- using the eci protocol api, 3-6
- using the sna lu 6.2 cpi-c, 3-5
- application
- startup, 3-12, 3-13
- application parameter, 2-5
B
- binary types, 6-10
- bind time security, 5-7
C
- cics, 4-5
- adapter information flow, 3-9
- as a transaction program, 4-15
- configuration, 2-4
- cpi communications, 1-3
- definitions, 1-2
- how the adapter communicates with cics, 3-5
- implementing the adapter, 3-7
- installation, 2-2
- installation tasks, 2-2
- logical unit, 1-2
- multi-threading, 3-10
- preinstallation, 2-2
- security implementation, 5-6
- security in general, 5-7
- system requirements, supported platforms, 1-2
- using the adapter inbound, 3-11
- what is, 1-2
- cics adapter, 3-2
- conversations, 5-2
- cics region, 4-5
- cics security implementation
- bind time security, 5-7
- cics transaction, 4-5
- classes, 3-3
- concepts, 4-3
- configuration, 2-4
- agent connection parameters, 2-7
- cics parameters, 2-11
- directories, 2-4, 2-5
- executable files, 2-4
- files, 2-5
- hub.ini, 2-6
- initialization file settings, 2-6
- configuration editor
- general, 7-4
- login, 7-3
- mode name, 7-4
- security, 7-5
- synchronization level, 7-5
- using, 7-2
- conversation, 4-5
- conversation level security, 5-5
- already-verified protocols, 5-5
- end-user verification, 5-5
- password expiration management, 5-6
- persistent verification, 5-6
- conversations
- cics adapter, 5-2
- cpi communications, 1-3
- cpi communications (cpi-c), 4-6
D
- data flow, 5-2
E
- end-user verification, 5-5
- error handling, 5-10
- event
- creating a subscribed event, 3-19
- explicitly delimited variable length sequences, 6-17
F
- fixed length tables, 6-17
- fixed precision numbers, 6-15
- fixed scale, 6-15
- floating point numbers, 6-14
- floating point types, 6-10
I
- implicitly delimited variable length sequences, 6-18
- inbound, 3-11
- design time, 3-13
- eci protocol, 3-12
- runtime, 3-14
- sna lu 6.2 cpi-c protocol, 3-11
- installation, 2-2
- tasks, 2-2
- integral types, 6-10
- istudio
- creating a subscribed event, 3-19
- creating an implemented procedure, 3-14
K
- keyword modifiers, 6-20
L
- length-prefixed strings, 6-11
- logical unit, 1-2, 5-2
- logical unit (LU), 4-7
- lu 6.2
- security, 5-8
- user security, 5-8
- lu 6.2 cpi-c protocol stack, 4-2
- lu-lu verification, 5-4
M
- MDL Classes
- Introducing, 6-2
- message description language, 3-2
- alias, 6-21
- array types (tables), 6-16
- case sensitivity, 6-22
- class declaration, 6-3
- comment insertion, 6-21
- complex types, 6-13
- date types, 6-13
- delimited strings, 6-12
- expression, 6-21
- file, 6-3
- file example, 6-22
- fixed-length padded strings, 6-12
- implicit strings, 6-13
- method declaration, 6-5
- null terminated strings, 6-12
- numerical types, 6-14
- struct declaration, 6-5
- structured types, 6-19
- supported data types, 6-9
- typedef declaration, 6-5
- what is, 6-2
- message description language file format
- general syntax conventions, 6-19
- type modifiers, 6-20
- type parameters, 6-19
- method declarations
- argument declarations, 6-8
- return type, 6-7
- mode name, 4-7
N
- node, 4-7
- node type, 4-7
P
- packed decimal, 6-16
- parallel sessions, 5-2
- password expiration management, 5-6
- persistent verification, 5-6
- physical unit, 4-8
- prefixed variable length tables, 6-17
- preinstallation, 2-2
- procedure
- creating implemented in istudio, 3-14
- protocol
- cics adapter, 3-8
- protocols
- lu6.2 cpi-c stack, eci stack, 3-4
R
- receiving
- cics adapter request, 3-13
S
- security, 5-3
- conversation level, 5-5
- lu 6.2, 5-4
- session level, 5-4
- using the eci protocol, 3-7
- session, 4-8
- session level cryptography, 5-4
- session level security, 5-4
- lu-lu verification, 5-4
- string types, 6-11
- supported platforms, 1-2
- synchronization levels, 4-9
- synchronization services, 4-10
- system management facility (SMF), 4-8
- system network architecture
- synchronization of changes, 5-9
- system network architecture (SNA), 4-8
- system requirements, 1-2
- systems network architecture controllers, 4-9
T
- terms, 4-3
- transaction program (TP), 4-12
- type declaration modifiers, 6-20
U
- url, 3-4
- urls, 4-2
V
- variable precision numbers, 6-15
- verb control block (vcb), 4-12
- verbs, 4-13