Distributed Data Processing (DDP-PPC) TCP/IP Interface COBOL
|
|
|
- Gillian Hancock
- 10 years ago
- Views:
Transcription
1 !()+ OS 2200 Distributed Data Processing (DDP-PPC) TCP/IP Interface COBOL Programming Guide Copyright ( 1997 Unisys Corporation. All rights reserved. Unisys is a registered trademark of Unisys Corporation. Level 7R1 September 1997 Priced Item Printed in U S America v100
2 The names, places, and/or events used in this publication are not intended to correspond to any individual, group, or association existing, living, or otherwise. Any similarity or likeness of the names, places, and/or events with the names of any individual, living or otherwise, or that of any group or association is purely coincidental and unintentional. NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THE DOCUMENT. Any product and related material disclosed herein are only furnished pursuant and subject to the terms and conditions of a duly executed Program Product License or Agreement to purchase or lease equipment. The only warranties made by Unisys, if any, with respect to the products described in this document are set forth in such License or Agreement. Unisys cannot accept any financial or other responsibility that may be the result of your use of the information in this document or software material, including direct, indirect, special, or consequential damages. You should be very careful to ensure that the use of this information and/or software material complies with the laws, rules, and regulations of the jurisdictions with respect to which it is used. The information contained herein is subject to change without notice. Revisions may be issued to advise of such changes and/or additions. RESTRICTED - Use, reproduction, or disclosure is subject to the restrictions set forth in DFARS and /FAR and for commercial computer software. Correspondence regarding this publication should be forwarded to Unisys Corporation either by using the Business Reply Mail form included with this document, or by addressing remarks to Unisys Corporation, Tredyffrin/Malvern Product Information, Malvern Development Center, P.O. Box 203, Paoli, PA, 19301, U.S.A. Comments about documentation can also be sent through to [email protected] All terms mentioned in this document that are known to be trademarks or service marks have been appropriately capitalized. Unisys Corporation cannot attest to the accuracy of this information. Use of a term in this document should not be regarded as affecting the validity of any trademark or service mark.
3 Contents About This Guide :::::::::::::::::::::::::::::::::::::::::::::: xiii Section 1. Introduction 1.1. DDP-PPC and the COBOL Interface ::::::::::::: The TCP/IP Interface ::::::::::::::::::::::::: Overview of Program-to-Program Applications ::: Migration from DDN R1 to DDP-PPC 6R1 and Higher ::::::::::::::::::::::::::::::::::: 1-4 Section 2. Procedural Overview 2.1. DDP-PPC COBOL Program Structure ::::::::::: Copying Information Packets ::::::::::::::::::: Using the COBOL COPY DDN-PKTS Statement ::: Sample Information Packets Produced from Copy Verbs :::::::::::::::::::::::::::::::: Sample Initialization Packets ::::::::::::::::: Additional Working-Storage Items ::::::::::::: COBOL Verbs and Function Calls ::::::::::::::: Function Calls ::::::::::::::::::::::::::::: COPY Verbs :::::::::::::::::::::::::::::: Initializing Packet Field Values :::::::::::::::: 2-9 Section 3. Using DDP-PPC TCP/IP Function Calls 3.1. COBOL COPY Verbs and Function Calls :::::::::: Terminating a Conversation (DDN-ABORT) ::::::: Closing a Conversation (DDN-CLOSE) ::::::::::: Interrupting Current Processing without Closing (DDN-INT-PROCESS) ::::::::::::::::::::::: Opening a Conversation (DDN-OPEN) ::::::::::: Replacing a Program in a Conversation (DDN-PASSOFF) ::::::::::::::::::::::::::: v100 iii
4 Contents 3.7. Receiving a Message from a Host (DDN-RECEIVE) Sending a Message (DDN-SEND) ::::::::::::::: Detaching an Application Program from DDP-PPC (DDN-SIGNOFF) ::::::::::::::::::::::::::: Attaching an Application Program to DDP-PPC (DDN-SIGNON) :::::::::::::::::::::::::::: 3-27 Section 4. Designing and Writing the Application 4.1. Using a Block Diagram :::::::::::::::::::::::: Creating a Flow Diagram :::::::::::::::::::::: Using the Message Buffer Area ::::::::::::::::: Formatting and Defining the Buffer Area :::::::: Referencing the Buffer Area :::::::::::::::::: Writing a Program-to-Program Application ::::::: General Considerations ::::::::::::::::::::: Receiving Data from a Remote Host ::::::::::: 4-9 Method 1 :::::::::::::::::::::::::::::: 4-10 Method 2 :::::::::::::::::::::::::::::: Closing a Conversation ::::::::::::::::::::: 4-12 Section 5. Compiling and Executing Programs 5.1. Preparing Programs for Execution :::::::::::::: Calling TCP/IP functions only ::::::::::::::::: Calling TCP/IP and TAS Program Callable-Functions :::::::::::::::::::::: Run Streams for DDP-PPC COBOL Programs ::::: Banking Considerations ::::::::::::::::::::::: UCS COBOL :::::::::::::::::::::::::::::: ASCII COBOL ::::::::::::::::::::::::::::: 5-5 Appendix A. Conventions for Naming Hosts A.1. Introduction ::::::::::::::::::::::::::::::::: A-1 A.2. Host Identifiers ::::::::::::::::::::::::::::::: A-1 Appendix B. Program-to-Program Example B.1. Sample Program Run Streams ::::::::::::::::: B-1 B.2. Primary (Sending) Program Example ::::::::::: B-3 iv v100
5 Contents B.3. Secondary (Receiving) Program Example :::::::: B-7 Glossary Bibliography v100 v
6
7 Figures 1-1. Capabilities of the Program-to-Program Facility ::::::::::::::::::::: COBOL Verbs and Function Calls :::::::::::::::::::::::::::::::: Referencing Information Packets through Function Call USING Clauses :: Typical Block Diagram for Program-to-Program Passoff Succession :::: Typical Program-to-Program Block Diagram ::::::::::::::::::::::: Typical Procedure Division Program-to-Program Flow Diagram (Part 1) :: Typical Procedure Division Program-to-Program Flow Diagram (Part 2) :: Compile, Collect, and Execute Stream for an ASCII COBOL Application Program :::::::::::::::::::::::::::::::::::::::::::::::: Compile, Link, and Execute Stream for a UCS COBOL Application Program :::::::::::::::::::::::::::::::::::::::::::::::: v100 vii
8
9 Tables 1-1. Comparison of the DDN R1 and DDP-PPC 6R1 TCP/IP Interface :: Copy Verbs and Associated Function Calls and Information Packets ::::: Copy Verbs and Associated Error Codes :::::::::::::::::::::::::: v100 ix
10
11 Examples B-1. ASCII COBOL Compile and Collect Stream for Primary Program :::::::: B-1 B-2. UCS COBOL Compile and Link Stream for Primary Program ::::::::::: B v100 xi
12
13 About This Guide Purpose This guide is designed to instruct and guide you in using the Unisys OS2200 Distributed Data Processing Program-to-Program Communications (DDP-PPC) TCP/IP COBOL interface. It tells you how to write COBOL application programs that let you exchange data between programs on the host or on remote hosts. The DDP-PPC TCP/IP COBOL interface was previously part of the DDN 1100 product. This guide instructs an applications programmer how to: $ Use a Unisys-supplied COBOL copy library to insert pre-written information packets and function calls into an ASCII or Universal Compiling System (UCS) COBOL program $ Write a COBOL application program using the COBOL information packets and function calls $ Compile the program $ Execute the program Scope This guide provides detailed information on COBOL function calls and information packets. It describes how to organize the calls and packets to enable users to write customized COBOL applications that can exchange data between programs in a multihost network. The material covered in this Guide was previously contained in the OS1100 Defense Data Network (DDN 1100) COBOL Programming Guide. Audience The primary audience for this programming guide is the applications programmer. This person is typically a COBOL programmer with several years of experience. The person might have a limited knowledge of communications and is dependent on reading this documentation to be able to write a COBOL application with program-to-program communications. The secondary audience for this guide is the site administrator v100 xiii
14 About This Guide This person typically has network and data base management experience. The site administrator is responsible for installing and implementing new hardware and software, network management, data bases, and security. Prerequisites To use this manual, you must understand distributed data processing concepts and know how to write standard COBOL programs. How to Use This Guide Programmers should use this guide to learn how to design and construct program-to-program applications. The guide shows you how to use COBOL COPY verbs and function calls to insert and set information packets in your program. Use this guide also to learn how to compile, link, and execute your application program. Organization Section 1. Introduction Gives an overview of DDP-PPC, TCP/IP, and features of the COBOL interface. Also gives a brief overview of program-to-program applications and how to migrate programs written for the DDN R1 interface to the DDP_PPC 6R1 (and higher) TCP/IP interface. Section 2. Procedural Overview Discusses conventional COBOL versus DDP-PPC COBOL program structure. Describes how you use the working storage section and the procedure division in program-to-program applications. Section 3. Using DDP-PPC TCP/IP Function Calls Describes the COBOL function calls and the information packets that let you transfer data between COBOL programs in the same or remote hosts. Tells how to sign on and off; open, close, or abort a conversation; and interrupt a process without closing the conversation. Section 4. Designing and Writing the Application Discusses how to design the application and construct a basic program-to-program application. Section 5. Compiling and Executing Programs Describes the executive control language run stream used to compile, collect or link, and execute the programs. xiv v100
15 About This Guide Appendix A. Conventions for Naming Hosts Discusses how to name hosts and OS 2200 elements. Appendix B. Program-to-Program Example Contains a working example of a DDP-PPC TCP/IP COBOL program-to-program application. Related Product Information Note: For all manuals, use the version that corresponds to the release level of the product software in use on the system. The following manuals provide related information you may find helpful: OS 1100 Communications Management System (CMS 1100) Configuration Reference Manual ( ) An alphabetical reference manual that describes the network definition statements you use to configure CMS OS 1100 Communications Management System (CMS 1100) Installation and Configuration Guide ( ) Describes the installation and configuration process to install and configure CMS Explains the concepts, the tasks that form the process, and the key requirements for configuring protocols and features. OS 2200 Distributed Data Processing (DDP-PPC/DDP-FJT) DCA Interface COBOL Programming Guide ( ) Describes how to structure COBOL programs that run on the OS 2200 system and interface with the DDP-PPC software via the Distributed Communications Architecture (DCA) interface. OS 2200 Distributed Data Processing (DDP-PPC/DDP-FJT) Messages Reference Manual ( ) Describes the status codes, error messages, and informational messages for DDP-PPC and DDP-FJT. OS 2200 Distributed Data Processing (DDP-PPC) OSI Interface COBOL Programming Guide ( ) Describes how to write DDP-PPC/OSI application programs in COBOL to exchange data in a network that adheres to open systems interconnection standards v100 xv
16 About This Guide OS 2200 Distributed Data Processing (DDP-PPC) TCP/IP Interface C Language Programming Guide ( ) Describes how to write customized C language applications that can exchange data with other programs in the same or remote computers in a multihost TCP/IP network. OS 2200 Distributed Data Processing (DDP-PPC) TCP/IP Interface FORTRAN Programming Guide ( ) Describes how to write customized FORTRAN applications that can exchange data with other programs in the same or remote computers in a multihost TCP/IP network. OS 2200 Distributed Data Processing Program-to-Program Communications (DDP-PPC) Implementation and Administration Guide ( ) Describes procedures for configuring and operating in a DDP environment on OS 2200 systems. It lists the hardware and software requirements and tells how to: $ Initialize and terminate the DDP-PPC environment $ Manage normal DDP-PPC activity $ Perform error recovery and diagnostic procedures OS 2200 TCP/IP Application Services (TAS) COBOL Programming Guide ( ) Previous title: OS 1100 Defense Data Network (DDN 1100) COBOL Programming Guide. Describes how to write customized COBOL applications that can transfer files or process mail in a multihost TCP/IP network. OS 2200 TCP/IP Application Services (TAS) FORTRAN Programming Guide ( ) Previous title: OS 1100 Defense Data Network (DDN 1100) FORTRAN Programming Guide. Describes how to write customized FORTRAN applications that can transfer files or process mail in a multihost TCP/IP network. xvi v100
17 Section 1 Introduction 1.1. DDP-PPC and the COBOL Interface Distributed Data Processing Program to Program Communications (DDP-PPC) is a systems software product used to handle and control data throughout a distributed data communications network. The DDP-PPC COBOL interface accepts function calls from a COBOL program to: $ Communicate with other application programs $ Update records on the same or a remote host $ Pass data between programs quickly and easily The DDP-PPC COBOL interface uses either ASCII COBOL or Universal Compiling System (UCS) COBOL. The interface provides COPY verbs that are used in your application program to provide information packets and issue requests (function calls) to DDP-PPC. Application programs compiled with the COBOL program-to-program interface: $ Run on OS 2200 systems $ Communicate with peer programs written in COBOL or other languages $ Communicate with peer programs residing on local or remote hosts or nodes The DDP-PPC COBOL interface described in this guide uses the TCP/IP protocol for program-to-program communications. DDP-PPC also provides COBOL interfaces that use: $ Unisys Distributed Communications Architecture (DCA) protocol $ Open Systems Interconnection (OSI) protocol Those interfaces are described in the DDP-PPC/DDP-FJT DCA Interface COBOL Programming Guide and the DDP-PPC OSI Interface COBOL Programming Guide. DDP-PPC also provides FORTRAN and C language interfaces for program-to-program communications in a TCP/IP network. These interfaces are described in the DDP-PPC TCP/IP Interface FORTRAN Programming Guide and the DDP-PPC TCP/IP C Language Programming Guide respectively v100 1v1
18 The TCP/IP Interface 1.2. The TCP/IP Interface TCP/IP is a set of layered communications protocols originally defined by the Advanced Research Project Agencies (ARPA) of the United States Department of Defense (DoD). The Transmission Control Protocol/Internet Protocol (TCP/IP) element provides reliable communication between pairs of processes (applications). Thus, TCP/IP serves as the basis for the DoD concept of interprocess communications in communications systems. TCP/IP implements the transport layer in the hierarchy of layered protocols. It provides reliable connection-oriented, ordered, full-duplex data transfer, with capabilitiesfor flow control. TCP/IP, therefore, compensates for environments in which loss, damage, duplicated, or out-of-sequence data, and network congestion might otherwise occur. Consequently, it is well-suited to support military, governmental, and commercial applications. 1v v100
19 Overview of Program-to-Program Applications 1.3. Overview of Program-to-Program Applications The DDP-PPC TCP/IP program-to-program facility allows COBOL language application programs to pass data between programs in the same host or remote hosts in the network. For example, data may be status or informational messages, control information, or records from a file. This permits multiple message switching, status monitoring, or access to individual records of multiple files. Figure 1-1 shows the capabilities of the program-to-program facility. DDP-PPC TCP/IP Network Host Computer A Host Computer B COBOL Program A Data COBOL Program B Data COBOL Program C Figure 1-1. Capabilities of the Program-to-Program Facility Program-to-program facilities allow you to reconstruct files on the local host by using data gathered from many records, elements, or files on remote hosts. This eliminates duplication of large amounts of unnecessary and unwanted data. It also eliminates the need to use transportable mass storage devices, such as tapes or disks, to transfer data between hosts. The program-to-program facility lets you: $ Open, close, and terminate conversations $ Send and receive messages $ Access records at multiple sites to form a master file $ Access data bases at multiple sites for simultaneous real-time updates $ Attach and detach applications to DDP-PPC $ Interrupt current processing $ Replace a program in a conversation v100 1v3
20 Migration from DDN R1 to DDP-PPC 6R1 and Higher 1.4. Migration from DDN R1 to DDP-PPC 6R1 and Higher The DDP-PPC TCP/IP COBOL Programming interface was previously a component of DDN DDN R1 and DDP-PPC 5R1 used the GASIF interface to CMS. The GASIF interface is replaced by TSAM for DDP-PPC 6R1and higher. As a result, you may need to make certain changes in your TCP/IP programming application. (You must at least recompile current applications to pick up the new data and open packet sizes.) Table 1-1 summarizes the differences in the TCP/IP COBOL interface between DDN R1 and DDP-PPC 6R1and higher and describes the changes required in your application. Table 1-1. Comparison of the DDN R1 and DDP-PPC 6R1 TCP/IP Interface DDN R1 TCP/IP passes an open-id indication to the application after a passive open is issued. The application then loops, waiting for an open- indication to be returned. The host name field in the open packet is 24 characters long. An ASCII dotted-decimal local internet address is returned on an open-id. An ASCII dotted-decimal remote internet address is returned on an open-indication. DDP-PPC 6R1 The open-id is now returned to the user when an open indication arrives for the TSU. Therefore, the application must now loop waiting for the open-id after issuing a passive open. The host name field in the open packet has been increased to 255 characters to support domain names. (A domain name specifies the logical internet name whereas the host name is specified in internet physical address format.) Two fields have been added to the data packet: DDN-DOMAIN-HOST-INFO (contains the domain name) DDN-DOMAIN-HOST-LENGTH (contains the length of the domain name) DDP-PPC requests the domain name resolver to determine if the local or remote internet address has an associated domain name. If there is an associated domain name and the receive-event is an open-id, the user receives the local internet address and the local domain name. If there is an associated domain name and the receive-event is an open-indication, the user receives the remote internet address and the remote domain name. Current applications can therefore continue to function, and new ones can opt to use the associated domain name. (Current applications must recompile their programs to pick up the new data and open packet sizes.) continued 1v v100
21 Migration from DDN R1 to DDP-PPC 6R1 and Higher Table 1-1. Comparison of the DDN R1 and DDP-PPC 6R1 TCP/IP Interface (cont.) DDN R1 Since the GASIF interface sends TCP/IP data over a DCA session, errors are returned as data on a subsequent receive function. DDP-PPC 6R1 Errors are returned both when the function is issued and on the subsequent receive function. There are also additional error codes and some error codes are different than before. These are documented in the DDP-PPC/DDP-FJT Messages Reference Manual and returned to the application as received by DDP-PPC v100 1v5
22
23 Section 2 Procedural Overview 2.1. DDP-PPC COBOL Program Structure Though DDP-PPC COBOL programs are similar to conventional programs, certain additional features are required. For example, you must: $ Include information packets and any other necessary working-storage areas in the data division of your program $ Use the COBOL COPY verb to copy verbs and function calls into the procedure division The following example shows the DDP-PPC COBOL program structure. The WORKING-STORAGE SECTION and PROCEDURE DIVISION in the example are unique to a DDP-PPC program. DDP Cobol Program Structure v100 2v1
24 DDP-PPC COBOL Program Structure 2v v100
25 Copying Information Packets 2.2. Copying Information Packets The working-storage section of the data division supplies DDP-PPC with the information needed to control data transfer between programs. This section contains 01-, 02-, 04-, and 88-level data description items in information packet formats. These packets correspond to the USING clause parameters of the DDP-PPC function calls discussed in Section Using the COBOL COPY DDN-PKTS Statement You use information packets to supply the data transfer control information. These packets are constructed for you using standard data descriptions. Copy these packets into your working-storage section from the COBOL copy library using the COPY DDN-PKTS statement in the procedure division of the program. (See 2.3.) The COPY statements place all the necessary data descriptions into your working-storage section when the program is compiled Sample Information Packets Produced from Copy Verbs The following example shows the information packets produced by copying DDN-PKTS into the working-storage section of a DDP-PPC application program. All the fields and parameters forming the information packets are described in detail with the related function calls in Section Sample Initialization Packets The DDP-PPC TCP/IP packets contain several fields that are not required each time that you issue a function. Each command packet has an associated initialization packet that you can use to clear unused fields before specifying any parameters and issuing a function call. You can tell DDP-PPC TCP/IP to ignore specific fields by: $ Setting them to a value, usually spaces or zeroes, on a field-by-field basis $ Initializing the entire packet and then resetting specific fields to the desired values These initialization packets are shown in the following example. Initialization Packets v100 2v3
26 Copying Information Packets 2v v100
27 Copying Information Packets v100 2v5
28 Copying Information Packets Additional Working-Storage Items You also use the working-storage section to define message areas and to store error messages. These areas and values are specific to your program and are not supplied through COPY verb statements. You must define a message buffer area. All program-to-program commands reference this area to transfer data. The maximum buffer size is 8232 characters. See 4.3 for a discussion on alternative ways to define this area. Example: Depending on your application, optionally include: $ Storage areas to hold conversation-id and status information supplied by DDP-PPC $ The name of the destination host computer on which the destination program resides (the program with which you are going to have a conversation) $ Offset and text length values to define your data messages $ Data messages and error messages 2v v100
29 COBOL Verbs and Function Calls 2.3. COBOL Verbs and Function Calls Application programs use conventional COBOL verbs for input/output data transfers and procedure division manipulations. They also use conventional verbs to set information fields in the working-storage section information packets. See Figure 2-1. Data Files COBOL I/O Verb COBOL Application Program DDP-PPC TCP/IP COBOL Function Call Status Data TCP/IP COBOL Interface Element DDP-PPC CMS TCP/IP Network Figure 2-1. COBOL Verbs and Function Calls Function Calls Special function calls are used for DDP-PPC applications. Use these function calls to: $ Enter the COBOL applications interface element $ Pass control information that is in your program $ Issue requests to DDP-PPC. Figure 2-2 shows how a function call references information packets. In this case, it shows how to use a standard COBOL MOVE verb to set an information packet field before issuing the call v100 2v7
30 COBOL Verbs and Function Calls DATA DIVISION... WORKING-STORAGE SECTION. 01 DDN-STATUS-PKT DDN-SIGNON-PKT. 02 DDN-PROGRAM-NAME DDN-OPEN-PKT DDN-RECEIVE-PKT DDN-DATA-PKT.... PROCEDURE DIVISION. MOVE 'MYPROGRAM' TO DDN-PROGRAM-NAME. CALL 'DDN$SIGNON' USING DDN-STATUS-PKT, DDN-SIGNON-PKT. Figure 2-2. Referencing Information Packets through Function Call USING Clauses The format for a function call is: where: function Is the name of the DDP-PPC function call requested by your application program. USING Is the clause that references information packets or buffer areas in your working-storage section. Parameters in the USING list are positional. You must code them in the order shown in each function call. param Is the name of the information packet or buffer area in your working-storage section. Function call statements always contain USING clauses that reference information packets or buffer areas contained in your working-storage section. (See Table 3-1.) The information packets consist of control information and data needed for program communications. The buffer areas are used to pass data between DDP-PPC and your program. 2v v100
31 COBOL Verbs and Function Calls After processing a function call, DDP-PPC returns both a general, a detailed status code, and a specific error code. The general status code, or class code, gives a classification value. The detailed status code gives an expanded description of the error that occurred. The specific error code provides additional error information, such as the error code DDP-PPC received from CMS. These codes are explained in the DDP-PPC/DDP-FJT Messages Reference Manual COPY Verbs Use the COPY verb in the procedure division of the application program whenever you want to issue a function call. The expansion in your program ensures the correct order of the operands in the call. The format for a COPY statement is: where: text-name Is the name of the function or information packet. This is an example of a COPY verb used to produce a DDP-PPC function call with its information packets referenced: This produces: ZDDDDDDDDDD? Initializing Packet Field Values The DDP-PPC packets contain several fields that you do not require each time that you issue a function. You can tell DDP-PPC to ignore specific fields by: $ Setting them to a value, usually spaces or zeros, on a field-by-field basis $ Initializing the entire packet and then resetting specific fields to the desired values To initialize the packet and reset specific fields, perform the following steps: 1. Initialize or reinitialize all the allocated packets using a supplied set of packets that are pre-set to the required DDPvPPC initialization values. You can include this set of packets in you program by issuing the following statement: v100 2v9
32 COBOL Verbs and Function Calls 2. Set the default values for the DDP-PPC control packets by initializing individual packets: 3. The packet to be used in the function can then be initialized by assigning the initialization packet to it. For example, the DDN-OPEN-PKT can be initialized by coding the following in the main program: As a general practice, after you have moved the desired values into their respective fields, issued a command, and control has returned for the next operation, you should reinitialize all unused fields before issuing a different command. Without reinitialization, the command may generate an error message or produce unexpected results. 2v v100
33 Section 3 Using DDP-PPC TCP/IP Function Calls This section describes the usage of each COBOL COPY verb with its associated information packets. Table 3-1 lists the COPY verbs, function calls, and information packets in the order you would use the commands in a typical program COBOL COPY Verbs and Function Calls You can use COBOL COPY verbs or code your own COBOL function calls to issue program-to-program commands from your COBOL program. You can direct these commands to the same host or to any remote host defined in the network. When you use a COBOL COPY verbs, the associated function call referencing the required information packets replaces the COPY verb when the program is compiled. You can code the function call yourself, but you must then supply the information packet names in the correct sequential order shown in Table 3-1. See 2.2 and 2.3 for a discussion on how to use function calls, information packets, and COPY verbs. Unused fields should be cleared before specifying any parameters and issuing a function call. You can use the initialization packets provided by DDP-PPC to initialize the fields. Table 3-1. Copy Verbs and Associated Function Calls and Information Packets Function COPY Verb Function Call Information Packets Referenced in USING Clause by COPY Verb/Function Attach an application to DDP-PPC Open a conversation with a host or wait for another host to open a conversation COPY DDN-SIGNON DDN$SIGNON DDN-STATUS-PKT DDN-SIGNON-PKT COPY DDN-OPEN DDN$OPEN DDN-STATUS-PKT DDN-MSG-BUFFER DDN-DATA-PKT DDN-OPEN-PKT Send a message COPY DDN-SEND DDN$SEND DDN-STATUS-PKT DDN-MSG-BUFFER DDN-DATA-PKT continued v100 3v1
34 COBOL COPY Verbs and Function Calls Table 3-1. Copy Verbs and Associated Function Calls and Information Packets (cont.) Function COPY Verb Function Call Information Packets Referenced in USING Clause by COPY Verb/Function Receive a message COPY DDN-RECEIVE DDN$RECEIVE DDN-STATUS-PKT DDN-MSG-BUFFER DDN-DATA-PKT DDN-RECEIVE-PKT Interrupt current processing without terminating a conversation (Telnet only) Replace a program in a conversation Terminate a conversation abnormally Close a conversation normally Detach an application from DDP-PPC COPY DDN-INT-PROCESS DDN$INTPROC DDN-STATUS-PKT DDN-MSG-BUFFER DDN-DATA-PKT COPY DDN-PASSOFF DDN$PASSOFF DDN-STATUS-PKT DDN-DATA-PKT COPY DDN-ABORT DDN$ABORT DDN-STATUS-PKT DDN-MSG-BUFFER DDN-DATA-PKT COPY DDN-CLOSE DDN$CLOSE DDN-STATUS-PKT DDN-MSG-BUFFER DDN-DATA-PKT COPY DDN-SIGNOFF DDN$SIGNOFF DDN-STATUS-PKT Note: In the following subsections, the formats of the DDN-STATUS-PKT and DDN-DATA-PKT packets are the same for each COPY verb/function call. For each COPY verb, the field definitions for those packets only describe the fields used for that particular COPY verb/function call. 3v v100
35 Terminating a Conversation (DDN-ABORT) 3.2. Terminating a Conversation (DDN-ABORT) Function Use the DDN-ABORT copy verb to abnormally terminate a conversation in progress. The associated function call references the DDN-STATUS-PKT and DDN-DATA-PKT information packets. It also references the DDN-MSG-BUFFER working-storage area. Format or DDN-STATUS-PKT Packet Field definitions returned by DDP-PPC: DDN-PKT-ID DDN-ERR-FUNCTION DDN-CLASS-CODE DDN-DETAIL-STATUS DDP-PPC places DDN$ in this field after a successful function call. Redefines DDN-PKT-ID. When an error is encountered, an error code value is placed in this field. The value indicates which copy verb/function call had the error (see Table 3-2). DDP-PPC returns a general status code in this field to classify the status of error found. The error codes are described in the DDP-PPC/DDP-FJT Messages Reference Manual. DDP-PPC returns a detailed status code in this field to identify the specific status or error encountered. The error codes are described in the DDP-PPC/DDP-FJT Messages Reference Manual. continued v100 3v3
36 Terminating a Conversation (DDN-ABORT) continued DDN-SPECIFIC-ERROR DDN-STATUS-REDEF DDN-SIGNON-ID Contains more specific information about the error returned by this function call. The error codes are described in the DDP-PPC/DDP-FJT Messages Reference Manual. Redefines the DDN-STATUS-GROUP field to allow a COBOL program to reference the DDN-CLASS-CODE and DDN-DETAIL-STATUS fields as one field. DDP-PPC returns a signon-id to identify the program when a DDN-SIGNON is issued. You must supply this value (in the same DDN-SIGNON-ID field) for all subsequent DDP-PPC function calls. Table 3-2. Copy Verbs and Associated Error Codes COPY Verb Error Code DDN-OPEN 0 DDN-SEND 1 DDN-CLOSE 2 DDN-ABORT 7 DDN-RECEIVE 16 DDN-SIGNON 17 DDN-SIGNOFF 18 DDN-PASSOFF 20 DDN-INT-PROCESS 25 DDN-MSG-BUFFER This is a required storage area for messages. The DDN-ABORT copy verb and associated function call reference this area. You must code this area in the working-storage section of the application program. See subsection 4.3 for details on specifying the size of this message buffer area. 3v v100
37 Terminating a Conversation (DDN-ABORT) DDN-DATA-PKT Packet Field definitions set by user: DDN-CONV-ID Conversation-id. Required. Specify the same conversation-id value returned in this field by DDP-PPC on DDN-OPEN call completion. You do not have to set this field unless you have modified it since DDN-OPEN call completion. DDN-TEXT-LEN Text length. Required. Specify a value of v100 3v5
38 Terminating a Conversation (DDN-ABORT) Example The following example shows the lines of code you insert in the procedure division: Procedure Typical Procedure Division Statements 1. Set text length. MOVE 0 TO DDN-TEXT-LEN. 2. Issue the function call. COPY DDN-ABORT. 3v v100
39 Closing a Conversation (DDN-CLOSE) 3.3. Closing a Conversation (DDN-CLOSE) Function Use a DDN-CLOSE copy verb to close the conversation normally. The associated function call references the DDN-STATUS-PKT and DDN-DATA-PKT information packets. It also references the DDN-MSG-BUFFER working-storage area. Format or DDN-STATUS-PKT Packet See 3.2 for a description of the DDN-STATUS-PKT fields. DDN-MSG-BUFFER This is a required storage area for messages. Although the DDN-CLOSE copy verb and associated function call reference this area, no data is transferred on the close call. You must code this area in the working-storage section of the application program. See 4.3 for details on specifying the size of this message buffer area. DDN-DATA-PKT Packet v100 3v7
40 Closing a Conversation (DDN-CLOSE) Field definitions set by user: DDN-CONV-ID Conversation-id. Required. Specify the same conversation-id value returned in this field by DDP-PPCon DDN-OPEN call completion. You do not have to set this field unless you have modified it since DDN-OPEN call completion. DDN-TEXT-LEN Required. Specify a value of 0. Example The following example shows the lines of code you insert in the procedure division: Procedure Typical Procedure Division Statements 1. Set text length. MOVE 0 TO DDN-TEXT-LEN. 2. Issue the function call. COPY DDN-CLOSE. 3v v100
41 Interrupting Current Processing without Closing (DDN-INT-PROCESS) 3.4. Interrupting Current Processing without Closing (DDN-INT-PROCESS) Function Use a DDN-INT-PROCESS copy verb to interrupt current processing without closing the conversation. The associated function call references the DDN-STATUS-PKT and DDN-DATA-PKT information packets. It also references the DDN-MSG-BUFFER working-storage area. Format or DDN-STATUS-PKT Packet See 3.2 for a description of the DDN-STATUS-PKT fields. DDN-MSG-BUFFER This is a required storage area for messages. Although the DDN-INT-PROCESS copy verb and associated function call reference this area, no data is transferred on the interrupt call. You must code this area in the working-storage section of the application program. See 4.3 for details on specifying the size of this message buffer area. DDN-DATA-PKT Packet v100 3v9
42 Interrupting Current Processing without Closing (DDN-INT-PROCESS) Field definitions set by user: DDN-CONV-ID Required. Specify the same value returned by DDP-PPC in this field on DDN-OPEN function call completion. You do not have to set this field unless you have modified it since your DDN-OPEN. DDN-TEXT-LEN Required. Specify a value of 0. Example The following example shows the lines of code you insert in the procedure division: Procedure Typical Procedure Division Statements 1. Set text length. MOVE 0 TO DDN-TEXT-LEN. 2. Issue the function call. COPY DDN-INT-PROC. 3v v100
43 Opening a Conversation (DDN-OPEN) 3.5. Opening a Conversation (DDN-OPEN) Function Use a DDN-OPEN copy verb in the active mode to establish a conversation with a host. Use a DDN-OPEN copy verb in the passive mode to establish a listening post for conversations initiated by any host in the network. Use it in the open passive specific mode when you want to establish a listening post for a subsequent conversation initiated by a specific host. The associated function call references the DDN-STATUS-PKT, DDN-OPEN-PKT, and DDN-DATA-PKT information packets. It also references the DDN-MSG-BUFFER working-storage area. Format or DDN-STATUS-PKT Packet See 3.2 for a description of the DDN-STATUS-PKT fields. DDN-MSG-BUFFER This is a required storage area for messages. Although the DDN-OPEN copy verb and associated function call reference this area, no data is transferred on the open call. You must code this area in the working-storage section of the application program. See 4.3 for details on specifying the size of this message buffer area. DDN-DATA-PKT Packet v100 3v11
44 Opening a Conversation (DDN-OPEN) Field definitions set by user: DDN-TEXT-LEN Required. Specify a value of 0. Field definitions returned by DDP-PPC: DDN-CONV-ID DDP-PPC returns a conversation-id. Save the conversation-id when you are using multiple conversations. DDN-OPEN-PKT Packet 3v v100
45 Opening a Conversation (DDN-OPEN) Field definitions set by user: DDN-OPEN-TYPE Required. Set to 0 for open active. Set to 2 for open passive or 1 for open passive specific. DDN-LOCAL-PORT DDN-REMOTE-PORT DDN-HOST-ID-LEN DDN-HOST-ID DDN-OPEN-PROTOCOL Required if DDN-OPEN-TYPE is set to 2 (open passive) or 1 (open passive specific). Set to id of port on local host to open. For compatibility with other systems, you should use port numbers greater than 1024.* Required if DDN-OPEN-TYPE is set to 0 (open active) or 1 (open passive specific). Set to id of port on target host. For compatibility with other systems, you should use port numbers greater than 1024.* Required if DDN-OPEN-TYPE is set to 0 or 1 (open active or open passive specific). Specify the length of the host-id character string. Required if DDN-OPEN-TYPE is set to 0 or 1 (open active or open passive specific). Specify the host-id in the form of a domain name or an Internet physical address (n1-n2-n3-n4), where each n ranges from 0 to 255. See Appendix A for host-id naming conventions. Required. Set to 4 for Telnet protocol. Set to 5 for transmission control protocol (TCP). *When you are connected to a host other than a Unisys host, you must specify the numbering system used on that host. Examples The following shows the lines of code you insert in your program for an Open Active: Procedure Typical Procedure Division Statements 1. Set text length. MOVE 0 TO DDN-TEXT-LEN. 2. Set to active. MOVE 0 TO DDN-OPEN-TYPE. 3. Set remote port. MOVE 1075 TO DDN-REMOTE-PORT. 4. Set host-id length. MOVE 7 TO DDN-HOST-ID-LEN. 5. Specify host name. MOVE REMOTEB TO DDN-HOST-ID. 6. Set for Telnet. MOVE 4 TO DDN-OPEN-PROTOCOL. 7. Issue the function call. COPY DDN-OPEN v100 3v13
46 Opening a Conversation (DDN-OPEN) The following shows the lines of code you insert in your program for an Open Passive: Procedure Typical Procedure Division Statements 1. Set text length. MOVE 0 TO DDN-TEXT-LEN. 2. Set to passive. MOVE 2 TO DDN-OPEN-TYPE. 3. Set local port. MOVE 1275 TO DDN-LOCAL-PORT. 4. Set for Telnet. MOVE 4 TO DDN-OPEN-PROTOCOL. 5. Issue the function call. COPY DDN-OPEN. 3v v100
47 Opening a Conversation (DDN-OPEN) The following shows the lines of code you insert in your program for an Open Passive Specific: Procedure Typical Procedure Division Statements 1. Set text length. MOVE 0 TO DDN-TEXT-LEN. 2. Set to passive specific. MOVE 1 TO DDN-OPEN-TYPE. 3. Set local port. MOVE 1275 TO DDN-LOCAL-PORT. 4. Set remote port. MOVE 1280 TO DDN-REMOTE-PORT. 5. Set host-id length. MOVE 7 TO DDN-HOST-ID-LEN. 6. Specify host name. MOVE REMOTEA TO DDN-HOST-ID. 7. Set for Telnet. MOVE 4 TO DDN-OPEN-PROTOCOL. 8. Issue the function call. COPY DDN-OPEN. Additional Discussion You can select two distinct conversation protocol types: $ Transmission Control Protocol (TCP) $ Telnet protocol In a TCP conversation, data transfers are asynchronous. The lower layers of the TCP/IP interface software block the user messages and may even fragment them in transmission. Messages are received in the order sent, but a message may be delivered in its entirety or in fragments. An application program must recognize individual messages, so it can deblock the delivered data and reassemble messages from fragmented deliveries. If a message contains noncharacter data (such as binary integer), the application program compensates for the fact that the ninth bit is dropped in transit. In a Telnet conversation, the data transfer may be either synchronous or asynchronous. Telnet is a line-oriented protocol that expects a single line of ASCII character data. A carriage return and line feed character terminates each message. The only supported transmission mode is full-duplex v100 3v15
48 Replacing a Program in a Conversation (DDN-PASSOFF) 3.6. Replacing a Program in a Conversation (DDN-PASSOFF) Function A DDN-PASSOFF copy verb replaces a program with a different program in a conversation. The replacement program must already have issued a DDN-SIGNON call in the same host as the present program. The replacement program is called the processor. When two programs are already engaged in a conversation, each program can give the right to another program to replace it in the conversation. The conversation remains the same, only the participating programs change. If a program is involved in more than one concurrent conversation, not all conversations need to be passed off. Each conversation can be passed off individually. Figure 3-1 shows a block diagram of a typical passoff operation. In this illustration, primary program A in host A initially establishes a conversation with secondary program B in host B. At a user-designated time, the send/receive conversation loop is terminated, and program A performs a passoff request to program C. Control of the conversation is then transferred from Program A to Program C. Since Program A has no other conversations, it detaches from DDP-PPC. Program C, which is already attached to DDP-PPC, receives control of the conversation. The conversation continues uninterrupted, but now it exists between primary program C and secondary program B. Later, secondary program B terminates its receive/send loop, passes off to program D, and detaches program B from DDP-PPC. Again, the conversation continues, but it now exists between primary program C and secondary program D. 3v v100
49 Replacing a Program in a Conversation (DDN-PASSOFF) Host A Host B Program A Program B SIGNON SIGNON OPEN RECEIVE (NEW) RECEIVE (EXISTING) SEND (REPLY) Loop SEND RECEIVE (EXISTING) Participating Programs A-B RECEIVE (EXISTING) SEND (REPLY) Loop PASSOFF SIGNOFF Program C Loop SIGNON SEND RECEIVE (EXISTING) Participating Programs C-B RECEIVE (EXISTING) SEND (REPLY) RECEIVE (EXISTING) Loop SEND PASSOFF SIGNOFF Program D SIGNON RECEIVE (EXISTING) SEND (REPLY) Loop SEND RECEIVE (EXISTING) Participating Programs C-D RECEIVE (EXISTING) SEND (REPLY) Loop CLOSE RECEIVE (EXISTING) RECEIVE (EXISTING) SEND (END) SIGNOFF SIGNOFF Figure 3-1. Typical Block Diagram for Program-to-Program Passoff Succession The associated function call references the DDN-STATUS-PKT and DDN-DATA-PKT information packets. Format or v100 3v17
50 Replacing a Program in a Conversation (DDN-PASSOFF) DDN-STATUS-PKT Packet See 3.2 for a description of the DDN-STATUS-PKT fields. DDN-DATA-PKT Packet Field definitions set by user: DDN-CONV-ID DDN-SUCC-ID Conversation-id. Required. Specify the same conversation-id value returned in this field by DDP-PPC on DDN-OPEN call completion. You do not have to set this field unless you have modified it since DDN-OPEN call completion. Successor-id. Required. Specify the signon-id returned in the DDN-STATUS-PKT on the DDN-SIGNON call of the successor application program. 3v v100
51 Replacing a Program in a Conversation (DDN-PASSOFF) Example The following example shows the lines of code you insert in the procedure division: Procedure Typical Procedure Division Statements 1. Set successor-id. MOVE DDN-SIGNON-ID TO DDN-SUCC-ID. 2. Issue the function call. COPY DDN-PASSOFF v100 3v19
52 Receiving a Message from a Host (DDN-RECEIVE) 3.7. Receiving a Message from a Host (DDN-RECEIVE) Function A DDN-RECEIVE copy verb accepts messages from a local or remote host. The associated function call references the DDN-STATUS-PKT, DDN-RECEIVE-PKT and DDN-DATA-PKT information packets. Note that when you issue a DDN-RECEIVE after a DDN-OPEN, the data that DDP-PPC returns will overwrite the DDN-DATA-PKT packet. Therefore, you should: $ Save the DDN-DATA-PKT packet before issuing a DDN-RECEIVE $ Restore the DDN-DATA-PKT packet after issuing a DDN-RECEIVE It also references the DDN-MSG-BUFFER working-storage area. Format or DDN-STATUS-PKT Packet See 3.2 for a description of the DDN-STATUS-PKT fields. DDN-MSG-BUFFER This is a required storage area for messages. The DDN-RECEIVE copy verb and associated function call reference this area to transfer the data. You must code this area in the working-storage section of the application program. See 4.3 for details on specifying the size of this message buffer area. DDN-DATA-PKT Packet 3v v100
53 Receiving a Message from a Host (DDN-RECEIVE) Field definitions set by user: DDN-CONV-ID DDN-BUFFER-OFFSET DDN-TEXT-LEN Conversation-id. Required. Specify the same conversation-id value returned in this field by DDP-PPC on DDN-OPEN call completion. You do not have to set this field unless you have modified it since DDN-OPEN call completion. Required. Specify the offset, in characters, from beginning of DDN-MSG-BUFFER where text is to be stored. Required. Specify the length in characters of the text to be received. DDN-READ-START Required. This value must be 0 or a multiple of 4. DDN-RELEASE-MSG Required. Specify 1 to release the message from the DDP-PPC queue; specify 0 to hold the message. If you release the message, you cannot issue another receive for that message. If you hold the message, you must issue another receive with DDN-RELEASE-MSG set to 1 (to free the message from the DDP-PPC queue, thus allowing you to access the next message on the queue with a subsequent receive) v100 3v21
54 Receiving a Message from a Host (DDN-RECEIVE) Field definitions returned by DDP-PPC: DDN-LOCAL-HOST-NAME DDN-LOCAL-DOMAIN-HOST- NAME DDN-LOCAL-DOMAIN-HOST- LENGTH DDN-REMOTE-HOST-NAME DDN-REMOTE-DOMAIN-HOST- NAME DDN-REMOTE-DOMAIN-HOST- LENGTH The name of the local host in Internet physical address format. Returned when DDN-RCV-EVENT is DDN-OPEN-ID. The name of the local domain host. Returned when DDN-RCV-EVENT is DDN-OPEN-ID. The length of the local domain host name. Returned when DDN-RCV-EVENT is DDN-OPEN-ID. The name of the remote host in Internet physical address format. Returned when DDN-RCV-EVENT is DDN-OPEN-IND. The name of the remote domain host. Returned when DDN-RCV-EVENT is DDN-OPEN-IND. The length of the remote domain host name. Returned when DDN-RCV-EVENT is DDN-OPEN-IND. Note: See Appendix A for host-id naming conventions and 4.4 for details on restoring the receiving packet. DDN-RECEIVE-PKT Packet 3v v100
55 Receiving a Message from a Host (DDN-RECEIVE) Field definitions set by user: DDN-WAIT-TIME DDN-CONV-TYPE DDN-RCV-PROGRAM-NAME Required. Set this field to the time, in seconds, that you want to remain in a receive loop before receiving a No Message status. Required. Specify 4 for Telnet and 5 for TCP. See 3.5for additional information. Required. Set this field to the name used for DDN-PROGRAM-NAME in DDN-SIGNON-PKT. Field definitions returned by DDP-PPC: DDN-RCV-REASON DDN-RCV-EVENT DDN-RCV-REMOTE-PORT DDN-TOTAL-MSG-LEN DDN-RCV-TELNET-IND Posts errors encountered during a receive. Indicates the state of the conversation. Indicates the port number on the remote host. Returned when DDN-RCV-EVENT is DDN-OPEN-IND. Indicates the total length, in characters, of the message received in the DDP-PPC buffer (not the length of the current message increment). Contains indicators only when using Telnet. Example The following example shows the lines of code you insert in the procedure division: Procedure Typical Procedure Division Statements 1. Set buffer offset. MOVE 20 TO DDN-BUFFER-OFFSET. 2. Set text length. MOVE 80 TO DDN-TEXT-LEN. 3. Set read start. MOVE 0 TO DDN-READ-START. 4. Release the message. MOVE 1 TO DDN-RELEASE-MSG. 5. Set wait time. MOVE 10 TO DDN-WAIT-TIME. 6. Set for Telnet. MOVE 4 TO DDN-CONV-TYPE. 7. Set name of program to receive. MOVE MYPROGRAM TO DDN-RCV-PROGRAM NAME. 8. Issue the function call. COPY DDN-RECEIVE v100 3v23
56 Sending a Message (DDN-SEND) 3.8. Sending a Message (DDN-SEND) Function Use a DDN-SEND copy verb to send messages to a local or remote host. The associated function call references the DDN-STATUS-PKT and DDN-DATA-PKT information packets. It also references the DDN-MSG-BUFFER working-storage area. Format or DDN-STATUS-PKT Packet See 3.2 for a description of the DDN-STATUS-PKT fields. DDN-MSG-BUFFER This is a required storage area for messages. The DDN-SEND copy verb and associated function call reference this area to transfer the data. You must code this area in the working-storage section of the application program. See 4.3 for details on specifying the size of this message buffer area. DDN-DATA-PKT Packet 3v v100
57 Sending a Message (DDN-SEND) Field definitions set by user: DDN-CONV-ID DDN-BUFFER-OFFSET DDN-TEXT-LEN Conversation-id. Required. Specify the same conversation-id value returned in this field by DDP-PPC on DDN-OPEN call completion. You do not have to set this field unless you have modified it since DDN-OPEN call completion. Required. Specify offset, in characters, from beginning of DDN-MSG-BUFFER where text to be sentis located. Required. Specify length in characters of text to be sent. Example The following example shows the lines of code you insert in the procedure division: Procedure Typical Procedure Division Statements 1. Set buffer offset. MOVE 20 TO DDN-BUFFER-OFFSET. 2. Set text length. MOVE 132 TO DDN-TEXT-LEN. 3. Issue the function call. COPY DDN-SEND v100 3v25
58 Detaching an Application Program from DDP-PPC (DDN-SIGNOFF) 3.9. Detaching an Application Program from DDP-PPC (DDN-SIGNOFF) Function Use a DDN-SIGNOFF copy verb to detach your application program from DDP-PPC. The associated function call references the DDN-STATUS-PKT information packet. Format or DDN-STATUS Packet See 3.2 for a description of the DDN-STATUS-PKT fields. Example The following example shows the lines of code you insert in the procedure division: Procedure Typical Procedure Division Statements 1. Issue the function call. COPY DDN-SIGNOFF. 3v v100
59 Attaching an Application Program to DDP-PPC (DDN-SIGNON) Attaching an Application Program to DDP-PPC (DDN-SIGNON) Function A DDN-SIGNON copy verb attaches your application program to DDP-PPC. The associated function call references the DDN-STATUS-PKT and DDN-SIGNON-PKT information packets. Format or DDN-STATUS-PKT Packet Field definitions returned by DDP-PPC: DDN-PKT-ID DDN-ERR-FUNCTION DDN-CLASS-CODE DDN-DETAIL-STATUS DDP-PPC places DDN$ in this field after a successful function call. Redefines DDN-PKT-ID. When an error is encountered, an error code value is placed in this field. The value indicates which copy verb/function call had the error (see Table 3-2). DDP-PPC returns a general status code in this field to classify the status of error found. The error codes are described in the DDP-PPC/DDP-FJT Messages Reference Manual. DDP-PPC returns a detailed status code in this field to identify the specific status or error encountered. The error codes are described in the DDP-PPC/DDP-FJT Messages Reference Manual. continued v100 3v27
60 Attaching an Application Program to DDP-PPC (DDN-SIGNON) continued DDN-SPECIFIC-ERROR DDN-STATUS-REDEF DDN-SIGNON-ID Contains more specific information about the error returned by this function call. The error codes are described in the DDP-PPC/DDP-FJT Messages Reference Manual. Redefines the DDN-STATUS-GROUP field to allow a COBOL program to reference the DDN-CLASS-CODE and DDN-DETAIL-STATUS fields as one field. DDP-PPC returns a signon-id to identify the program when DDN-SIGNON is issued. You must supply this value (in the same DDN-SIGNON-ID field) for all subsequent DDP-PPC function calls. DDN-SIGNON-PKT Packet Field definitions set by user: DDN-PROGRAM-NAME Required. Specify up to 12 ASCII characters for the name you want to assign to your applications program. Example The following example shows the lines of code you insert in the procedure division: Procedure Typical Procedure Division Statements 1. Set program name. MOVE MYPROGRAM TO DDN-PROGRAM-NAME. 2. Issue the function call. COPY DDN-SIGNON. 3v v100
61 Section 4 Designing and Writing the Application 4.1. Using a Block Diagram When designing a DDP-PPC COBOL application, you should always lay out a block diagram of what you want to do. The description in this section is a basic conversation between two programs in two separate host computers. The numbers in parentheses in the following description are keyed to the circled numbers in the basic block diagram (Figure 4-1) and the expanded flow diagram (Figure 4-2 and Figure 4-3). This example: $ Ataches to DDP-PPC $ Opens a conversation with another program $ Sends a message to the other program $ Receives a reply $ Terminates the conversation $ Receives a close confirm $ Detaches from DDP-PPC The sender of the data is the primary program, and the receiver is the secondary program v100 4v1
62 Using a Block Diagram Primary Program Secondary Program 1A SIGNON (Host Z) 1B SIGNON (Host M) 2A ACTIVE OPEN REMOTE PORT=X LOCAL PORT=0 HOST ID=M 2B PASSIVE OPEN REMOTE PORT=0 LOCAL PORT=X 3B1 RECEIVE RCV-EVENT=Open identifier 3A RECEIVE RCV-EVENT=Open identifier 3B2 RECEIVE RCV-EVENT=Open indicator 4A SEND Loop (If status NE OK then error routine) 4B RECEIVE Loop (Until RCV-EVENT NE Data indicator) 5A CLOSE (When completed processing) 5B If RCV-EVENT= Close indicator then go to CLOSE 6A RECEIVE (Close confirm indicator)* 6B CLOSE 7A SIGNOFF 7B SIGNOFF * The primary program should be prepared to accept either a close indicator or a close confirm indicator. The primary program (sender): $ Signs on to DDP-PPC (1A) Figure 4-1. Typical Program-to-Program Block Diagram $ Issues an active open to establish a connection with the secondary program (2A) $ Enters a receive mode loop to await an open establishment acknowledgement from the secondary program (3A) $ Receives the open establishment acknowledgement and begins to send data (4A) 4v v100
63 Using a Block Diagram The secondary program (receiver): $ Signs on to DDP-PPC (1B) $ Enters a passive open mode to accept connection requests (2B) Note: The secondary program must be active with a listening port available before the primary program sends an open request. $ Enters a receive mode loop, waiting for a connection request from any sending program (3B1, 3B2) $ Receives the open connection request (as a result of a primary program performing an active open) (2A), and enters a receive mode loop awaiting data from the primary program (4B) After sending the last message, the primary program terminates the conversation with a close (5A). If the receive event from the primary program indicates a close (5B), the secondary program closes the conversation (6B). The primary program receives confirmation of the close (6A). Both programs now perform a signoff request to their respective hosts to detach from DDP-PPC (7A, 7B) v100 4v3
64 Creating a Flow Diagram 4.2. Creating a Flow Diagram Once you design the basic block diagram, you can create a flow diagram by filling in the blocks with COBOL procedure statements (as shown in Figure 4-2 and Figure 4-3) according to the requirements defined for each copy verb. In most cases, you fill in the blocks by taking the example given under each copy verb in 3.2 through 3.10 and placing it in the appropriate block. Some changes from the example might have to be made, depending on whether you are in the primary or secondary program. To keep the flow diagram as simple as possible, error/status checking routines are not shown. See the examples in subsections B.2 and B.3 for a complete working example. 4v v100
65 Creating a Flow Diagram Primary Program Secondary Program 1A SIGN-ON-RT. 1B SIGN-ON-RT. MOVE 'ACT1' TO DDN-PROGRAM-NAME. MOVE 'RCV1' TO DDN-PROGRAM-NAME. COPY DDN-SIGNON. COPY DDN-SIGNON. 2A OPEN-RT. (Active) 2B OPEN-RT. (Passive) MOVE 0 TO DDN-TEXT-LEN. MOVE 0 TO DDN-OPEN-TYPE. MOVE 280 TO DDN-REMOTE-PORT. MOVE 12 TO DDN-HOST-ID-LEN. MOVE 'HOST-ID-SYS1' TO DDN-HOST-ID. MOVE 4 TO DDN-OPEN-PROTOCOL. MOVE 0 TO DDN-TEXT-LEN. MOVE 2 TO DDN-OPEN-TYPE. MOVE 280 TO DDN-LOCAL-PORT. MOVE 4 TO DDN-OPEN-PROTOCOL. COPY DDN-OPEN. COPY DDN-OPEN. IF NOT DDN-OK PERFORM ERROR-RT. (See 3A1) 3B1 IF NOT DDN-OK PERFORM ERROR-RT. (See 2B1) RECEIVE-OPEN-ID. 3A RECEIVE-RT. MOVE 0 TO DDN-BUFFER-OFFSET. MOVE 256 TO DDN-TEXT-LEN. MOVE 0 TO DDN-READ-START. MOVE 1 TO DDN-RELEASE-MSG. MOVE 60 TO DDN-WAIT-TIME. MOVE 4 TO DDN-CONV-TYPE. MOVE 'ACT1' TO DDN-RCV-PROGRAM-NAME. COPY DDN-RECEIVE. IF NOT DDN-OK PERFORM ERROR-RT. (See 3A1) MOVE 0 TO DDN-BUFFER-OFFSET. MOVE 256 TO DDN-TEXT-LEN. MOVE 0 TO DDN-READ-START. MOVE 1 TO DDN-RELEASE-MSG. MOVE 10 TO DDN-WAIT-TIME. MOVE 4 TO DDN-CONV-TYPE. MOVE 'RCV1' TO DDN-RCV-PROGRAM-NAME. COPY DDN-RECEIVE. IF DDN-NO-MSG OR NOT DDN-OPEN-ID PERFORM RECEIVE-OPEN-ID. IF DDN-OK IF NOT DDN-OPEN-ID PERFORM ERROR-RT. (See 2B1) 3B2 RECEIVE-OPEN-IND. COPY DDN-RECEIVE. IF DDN-NO-MSG OR NOT DDN-OPEN-IND PERFORM CLOSE-RT. IF DDN-CLOSE-IND PERFORM CLOSE-RT. IF NOT DDN-OK PERFORM ERROR-RT. Legend Program to program flow Intraprogram flow Figure 4-2. Typical Procedure Division Program-to-Program Flow Diagram (Part 1) v100 4v5
66 Creating a Flow Diagram Primary Program Secondary Program 4A SEND-MSG-LOOP. 4B RECEIVE-MSG-RT. MOVE 0 TO DDN-BUFFER-OFFSET. MOVE 256 TO DDN-TEXT-LEN. COPY DDN-RECEIVE. COPY DDN-SEND. 5A CLOSE-RT. MOVE 0 TO DDN-TEXT-LEN. COPY DDN-CLOSE. 5B IF DDN-DATA-IND * GO TO RECEIVE-MSG-RT. (Process the message) 6A RECEIVE-CLOSE-CONFIRM-RT. 6B CLOSE-RT. COPY DDN-RECEIVE. MOVE 0 TO DDN-TEXT-LEN. COPY DDN-CLOSE. 7A SIGN-OFF-RT. RECEIVE-CLOSE-CONFIRM-RT. COPY DDN-SIGNOFF. COPY DDN-RECEIVE. 8A EXIT-RT. EXIT. IF NOT DDN-CLOSE-CONFIRM. 7B SIGN-OFF-RT. COPY DDN-SIGNOFF. 8B EXIT-RT. EXIT. 3A1 ERROR-RT. 2B1 ERROR-RT. DISPLAY ERROR-MSG. DISPLAY EROR-MSG. 3A2 ABORT-RT. 2B2 ABORT--RT. COPY DDN-ABORT. COPY DDN-ABORT. Legend Program to program flow Intraprogram flow Figure 4-3. Typical Procedure Division Program-to-Program Flow Diagram (Part 2) 4v v100
67 Using the Message Buffer Area 4.3. Using the Message Buffer Area DDP-PPC uses the message buffer area of your program to exchange data. This is the interface area that DDP-PPC uses to transfer messages. When you issue a COPY verb, DDP-PPC uses DDN-MSG-BUFFER in the function call as the name of the message buffer area. You must define this area in working-storage to meet the needs of your application. You can alternatively format and define this area to meet your own preferences. For example, you can define separate input and output buffers. You can also directly reference display messages, text messages, or error messages without moving them into the message buffer before issuing the COPY verb or function call Formatting and Defining the Buffer Area You can format your own message buffer area by using standard data descriptions to define the buffer in your working-storage section. You can define a single buffer for both input and output. For example: You can also define separate input and output buffers. For example: The maximum buffer size is 8232 characters Referencing the Buffer Area After you have formatted and defined the message buffer areas, you must reference the names you assigned to these areas in the USING phrase of the function call. To do this, use copy verbs with a REPLACING phrase as follows: This automatically gives you the correct format and parameter sequence. It also ensures that the names you assigned to the message buffer area are placed correctly in the function call v100 4v7
68 Using the Message Buffer Area For output messages, you can also directly reference data definition messages in the working-storage section. Using this method, you do not need to move the message into the message buffer area before issuing the copy verb or function call. For example: Replacing the name of the message buffer area with the name of the message text, a DDN$OPEN copy verb looks like: Producing the function call: 4v v100
69 Writing a Program-to-Program Application 4.4. Writing a Program-to-Program Application This subsection describes the more important factors to consider when writing a DDP-PPC program-to-program application. It does not contain a complete description of the fields that need to be set General Considerations Consider the following when writing a program-to-program application: $ Check the DDN-STATUS-PKT after every DDP-PPC function call to determine the success or failure of the function. $ Set the DDN-WAIT-TIME field in the DDN-RECEIVE-PKT to allow adequate time to receive data from a remote host. Consider network traffic and resources when specifying the time-out value. $ If the peer application is waiting for a response from your application, ensure that your application is not processing for a time period that exceeds the peer application time-out value. This may indicate that your application did not receive a message. $ Check the DDN-RCV-EVENT field in the DDN-RECEIVE-PKT after every DDN-RECEIVE function call to determine the processing that the application should do next. $ The application must restore the DDN-DATA-PKT after receiving a DDN-OPEN-ID or DDN-OPEN-IND in the DDN-RCV-EVENT field of the DDN-RECEIVE-PKT. DDP-PPC returns the DDN-LOCAL-HOST-NAME when the DDN-RCV-EVENT value is DDN-OPEN-ID and returns the DDN-REMOTE-HOST-NAME when the DDN-RCV-EVENT value is DDN-OPEN-IND. These host names overlay most of the DDN-DATA-PKT. $ Initialize unused fields in the packets Receiving Data from a Remote Host When you are receiving data from a remote host, consider the following: $ Data is stream-oriented $ Data may be segmented or concatenated Depending on resources and network traffic, data received may be: $ One message sent from the remote host $ Multiple messages sent from the remote host $ A partial message sent from the remote host v100 4v9
70 Writing a Program-to-Program Application The application must be able to handle data segments and concatenated data. Using the DDN-TEXT-LEN field in the DDN-DATA-PKT, the application indicates how much data DDP-PPC can give the application. The actual length of the data received is returned in the DDN-TOTAL-MSG-LEN field of the DDN-RECEIVE-PKT. Although the length of the data received may be larger, DDP-PPC never returns more data than the application requests. You can handle this situation in two ways: Method 1 1. Set the DDN-TEXT-LEN field in the DDN-DATA-PKT to a value above 8232 (the maximum size that the program product TCP-IP can give to DDP-PPC). 2. Set DDN-RELEASE-MSG to 1 to release the data from the input queue. 3. Issue a DDN-RECEIVE. 4. Parse the data based on the value in the DDN-TOTAL-MSG-LEN field of the DDN-RECEIVE-PKT to determine if more than one message or a partial message was received. This is the most efficient method of exchanging data with a remote application. For example, assume that the application: $ Expects 200-character messages $ Sets DDN-TEXT-LEN to 8232, DDN-RELEASE-MSG to 1, DDN-BUFFER-OFFSET to 0, and DDN-READ-START to 0 $ Issues a DDN-RECEIVE Then, if the DDN-TOTAL-MSG-LEN is: $ 200, the application receives one message sent from the remote application. $ 400, the application receives 400 characters and processes the data as two separate messages sent from the remote application. $ 100, the application receives 100 characters, which is a partial message sent from the remote application. The application should then issue a DDN-RECEIVE function call to receive the next message segment. Method 2 1. Set the DDN-TEXT-LEN field of the DDN-DATA-PKT to the size of the message that the remote application sends. 2. Set the DDN-RELEASE-MSG field to 0 to keep the data in the input queue. 3. Issue a DDN-RECEIVE function call. 4. Use the length returned in DDN-TOTAL-MSG-LEN to determine if DDP-PPC received more than one message. This determines how many more, if any, DDN-RECEIVE functions you must issue before releasing the data from the input queue. 4v v100
71 Writing a Program-to-Program Application Then, if the DDN-TOTAL-MSG-LEN field is: $ Greater than DDN-TEXT-LEN, the application must: 1. Initially set the DDN-READ-START field to Set DDN-BUFFER-OFFSET to indicate where to place the data in the application s buffer. 3. Increment DDN-READ-START by DDN-TEXT-LEN for each DDN-RECEIVE function until all data is received. 4. Issue another DDN-RECEIVE function with DDN-READ-START set to the offset in the input queue where the receive is to start. (DDN-READ-START must be a multiple of 4.) 5. When all data is received: a. Set DDN-RELEASE-MSG to 1. b. Set DDN-TEXT-LEN to 0. c. Issue a DDN-RECEIVE function to remove the data from the input queue. $ Equal to DDN-TEXT-LEN, the application received an entire message sent from the remote application and must: 1. Set DDN-RELEASE-MSG to Set DDN-TEXT-LEN to Issue a DDN-RECEIVE function to remove the data from the input queue. $ Less than DDN-TEXT-LEN. Then the application received a partial message sent from the remote application and must: 1. Set DDN-RELEASE-MSG to Set DDN-TEXT-LEN to Issue a DDN-RECEIVE function to remove the partial message from the input queue. If DDP-PPC received a partial message, your application must prepare the next DDN-RECEIVE function to handle the next segment of the message. Set the DDN-BUFFER-OFFSET field to indicate where to place the next segment in the application s buffer and issue the DDN-RECEIVE function. The value in the DDN-TOTAL-MSG-LEN field for the current DDN-RECEIVE determines what you do next. That is, the application follows the previous rules, depending on whether the current DDN-TOTAL-MSG-LEN field is greater than, equal to, or less than DDN-TEXT-LEN v100 4v11
72 Writing a Program-to-Program Application For example, assume that the application: $ Expects 200-character messages $ Sets DDN-TEXT-LEN to 200, DDN-RELEASE-MSG to 0, DDN-BUFFER-OFFSET to 0, and DDN-READ-START to 0 $ Issues a DDN-RECEIVE Then, if the DDN-TOTAL-MSG-LEN is: $ 200, the application receives the entire message, but must issue another DDN-RECEIVE with DDN-RELEASE-MSG set to 1 to release the message from the input queue. $ 400, the application processes the 200 characters, then sets DDN-RELEASE-MSG to 1, sets DDN-READ-START to 200, issues a DDN-RECEIVE to get the last 200 characters, and releases the data from the queue. $ 100, the application sets DDN-RELEASE-MSG to 1, sets DDN-TEXT-LEN to 0, and issues a DDN-RECEIVE function to release the partial message from the input buffer. At this point, the application can process this partial message or issue a DDN-RECEIVE function call to receive the next message segment Closing a Conversation To close a conversation, the application acting as the primary program must: 1. Issue a DDN-CLOSE function. 2. Check the DDN-STATUS-PKT to ensure that the close function was successful. 3. Issue a DDN-RECEIVE function. The application then: 1. Receives a DDN-CLOSE-IND, DDN-CLOSE-CONF, or DDN-ABORT-IND in the DDN-RCV-EVENT field of the DDN-RECEIVE-PKT. 2. If the application received a DDN-CLOSE-IND in step one, then it should continue to issue DDN-RECEIVE functions until the DDN-RCV-EVENT field contains a DDN-CLOSE-CONF or DDN-ABORT-IND. The conversation is then closed. 4v v100
73 Section 5 Compiling and Executing Programs 5.1. Preparing Programs for Execution After you write your COBOL application programs, you compile, collect or link, and execute the COBOL programs the same as any other ASCII or UCS COBOL program. There are only three special requirements: Calling TCP/IP functions only 1. If you use the supplied COBOL COPY elements in your program, you must issue the following statements before compiling your program: 2. You must include relocatable or object module elements when you collect each program into an absolute or output object module element. For ASCII COBOL, include DDN$COBPPPC. For UCS COBOL, include UCSINTFPPPP. Before running your ASCII COBOL application, keep these precautions in mind: $ You must follow the recommended MAP instructions in the collection of your programs. Failure to follow these instructions can corrupt data banks, resulting in the abnormal termination of your program. $ All buffer addresses, message lengths, user-ids, and conversation-ids must be correct. Errors passed to DDP-PPC can cause an abnormal termination of your program Calling TCP/IP and TAS Program Callable-Functions 1. Issue the following before compiling: 2. If calling TCP/IP and TAS DDN$COBPPPC program-callable functions from within the same program, instead of including for ASCII COBOL, include TCP$COBPPP from the SYS$LIB$*DDP-PPC-1 library v100 5v1
74 Run Streams for DDP-PPC COBOL Programs 5.2. Run Streams for DDP-PPC COBOL Programs Follow these steps to compile, collect or link, and execute a DDP-PPC COBOL program: 1. Obtain a clean compilation of the COBOL application program using the DDP-PPC supplied COBOL copy elements. 2. Collect (@MAP) or link (@LINK) the relocatable or object module application element obtained from the compilation along with the relocatable or object module DDP-PPC COBOL interface elements into one absolute or output object module element in a program file. 3. Then, execute the program (@XQT) using the absolute or output object module element name of the file and element you supplied on statement. The DDP-PPC COBOL interface elements are supplied on your release tape. They are installed in the file SYS$LIB$*DDP-PPC-4. To copy them into your own file, change the COB$PF and statements accordingly. In the sample streams, uppercase letters must be entered exactly as shown. Lowercase letters are names that you can select. See Appendix Afor file-naming conventions. Figure 5-1 shows a sample stream to: $ Compile an ASCII COBOL application program using DDP-PPC supplied COBOL copy elements $ Collect the application program and DDP-PPC COBOL interface relocatable elements into an absolute program $ Execute the absolute program For ASCII COBOL transaction processing (TIP) application programs, you can use the same procedure as you would use for non-tip application programs. 5v v100
75 Run Streams for DDP-PPC COBOL Programs Figure 5-1. Compile, Collect, and Execute Stream for an ASCII COBOL Application Program Notes: If the FLAGGER option is not set during your ACOB compilation, do not specify the RN options on the ACOB statement. ** These elements are no longer required. However, for compatibility purposes, they can remain in the map stream. Figure 5-2 shows a sample stream to: $ Compile a UCS COBOL application program using DDP-PPC supplied COBOL copy elements $ Link the application program and DDP-PPC COBOL interface object module element into an output object module element $ Execute the output object module v100 5v3
76 Banking Considerations Figure 5-2. Compile, Link, and Execute Stream for a UCS COBOL Application Program Note that Steps 2 and 3 in Figure 5-2 use the UCS static linking capability. Alternatively, you can use dynamic linking, which is faster. To use dynamic linking, replace Steps 2 and 3 with the following: $ Copy the UCSINTFPPPP object module from SYS$LIB$*DDP-PPC-4 to the same file that contains the UCS COBOL compiler output object module. $ Execute the UCS COBOL compiler output object module, as follows: 5.3. Banking Considerations UCS COBOL Consider the following when using UCS COBOL: $ Banks that contain the message buffer and packets must not be greater than 262 words. $ The entire message buffer must reside in one data bank. $ The packets and message buffer may reside in the same bank or different banks. 5v v100
77 Banking Considerations ASCII COBOL Consider the following when using ASCII COBOL $ The entire message buffer must reside in one data bank. $ The packets and message buffer may reside in the same bank or different banks v100 5v5
78
79 Appendix A Conventions for Naming Hosts A.1. Introduction Hosts can be local or remote. The local host is the system on which your program is running. A remote host is any system in the network, other than your local host. A.2. Host Identifiers Each host system has its own host identifier (host-id). To define a host-id, you can choose from two format types: $ Internet physical address This format is always valid for specifying a host-id. $ Logical host name This format is valid depending on how your site administrator configured the Telcon software. An internet physical address format host-id is: where n1 can range from 0 through 223, and n2 through n4 can range from 0 through 255. (n3 is currently always 0.) For example: Always include the dashes when you use this format v100 Av1
80 Host Identifiers A domain name: $ Can be up to 255 characters $ Can include alphanumerics as well as the minus sign (-) and the period (.) For example: This particular logical name represents the geographical location and system number of the host. The logical name translates to the physical address of the host. So, if you define a logical name, you can then specify a host-id by using either the logical host name or the physical address. You use host-ids in some commands. If you omit a host-id in a command, the local host-id is assumed by default. You can obtain host-id information from your site administrator. Notes: 1. Non-OS 2200 hosts sometimes use periods rather than dashes in the physical address format host-id. However, all host-ids entered in TCP-IP commands must contain dashes. Using periods causes an error message. 2. Throughout this manual, when we refer to the local host, we are referring to the OS 2200 host. Av v100
81 Appendix B Program-to-Program Example Subsections B.1 through B.3 contain an example of a program-to-program application. Example B-1 is the ASCII COBOL compile and collect stream for the primary program of the program-to-program application shown in subsection B.2. The example in subsection B.2 is the primary (sending) program, and the example in subsection B.3 is the secondary (receiving) program. B.1. Sample Program Run Streams Example B-1. ASCII COBOL Compile and Collect Stream for Primary Program v100 Bv1
82 Sample Program Run Streams Example B-2 is the UCS COBOL compile and link stream for the primary program of the program-to-program application shown in subsection B.2. Example B-2. UCS COBOL Compile and Link Stream for Primary Program Bv v100
83 Primary (Sending) Program Example B.2. Primary (Sending) Program Example The following example is the primary (sending) program of a program-to-program application. The program: $ Lets you enter the the number of messages to send to the secondary program $ Attaches to DDP-PPC $ Opens a conversation with the secondary program $ Sends the number of messages requested when it receives an open-id, indicating that the connection with the secondary program is established $ Performs a close after the messages have been sent $ Signs off when a close-confirm is received $ Detaches from DDP-PPC If any errors are encountered, appropriate messages are displayed on the printer. Source Code Listing for Primary Program v100 Bv3
84 Primary (Sending) Program Example Bv v100
85 Primary (Sending) Program Example v100 Bv5
86 Primary (Sending) Program Example Bv v100
87 Secondary (Receiving) Program Example B.3. Secondary (Receiving) Program Example The following example is a secondary (receiving) program of a program-to-program application. The program: $ Attaches to DDP-PPC $ Performs an open passive and goes into a receive state to await an open active from a primary program $ Receives the open active request from the primary program $ Receives the number of messages sent $ Closes its side of the conversation $ Detaches from DDP-PPC If any errors are encountered, appropriate messages are displayed on the printer. Source Code Listing for Secondary Program v100 Bv7
88 Secondary (Receiving) Program Example Bv v100
89 Secondary (Receiving) Program Example v100 Bv9
90 Secondary (Receiving) Program Example Bv v100
91 Secondary (Receiving) Program Example v100 Bv11
92
93 Glossary A abort absolute To terminate a program or processor immediately due to an error, operator keyin, or command. An element type for an OS 2200 program file. An absolute element is an executable machine-language element produced by the OS 2200 collector or linker from relocatable elements or object modules. absolute element An element containing a complete program in executable form. alphanumeric character string A string that contains letters, digits, special characters, and the space character. American Standard Code for Information Interchange (ASCII) A standard character code set for use by data processing systems. It defines an eight-bit code for each character in a limited set characters. This character set includes graphic characters (such as uppercase and lowercase letters, and punctuation marks) and control characters (such as the line-feed and the start-of-entry characters). ASCII See American Standard Code for Information Interchange. ASCII COBOL The COBOL programming language used to write programs for the OS 2200 ASCII COBOL compiler (ACOB). ASCII COBOL conforms to American National Standards Institute (ANSI-1974) standards. Symbolic elements written in the COBOL language, then compiled by the ASCII COBOL compiler, produce relocatable elements that use the ASCII character code set v100 Glossaryv1
94 Glossary C CCITT See Consultative Committee for International Telegraph and Telephone. checkpoint marker Coding used to indicate error recovery restart points in case of failure during data transmission. In an OSI environment, this is known as a serial point synchronization number. CMS 1100 See Communications Management System software. collect To use the OS 2200 collector (MAP processor) to process relocatable elements and produce absolute elements. Collect and map are used synonymously in OS 2200 documentation. collector The OS 2200 MAP processor, which processes relocatable elements and produces absolute elements. The collector is a component of the OS 2200 system control software. Communications Management System software (CMS 1100) An OS 2200 software product that provides communications and network capabilitiesfrom an OS 2200 system to a network or to local terminals and devices on the system. configuration The arrangement of a computer system or network as defined by the nature, number, and the chief characteristics of its functional units. The term may refer to a hardware or a software configuration. This can also refer to the devices and programs that make up a system, subsystem, or network. Consultative Committee for International Telegraph and Telephone (CCITT) An international advisory committee that proposes worldwide communications standards. D DCA DCP DDN See distributed communications architecture. See distributed communications processor. See defense data network. Glossaryv v100
95 Glossary DDN 1100 See TCP/IP Application Services (TAS). DDP See distributed data processing. DDP-PPC See Distributed Data Processing Program-to-Program Communications software. DDP-PPC application A user-written program that uses DDP-PPC. defense data network (DDN) An X.25 public data network (PDN) that allows communication with other hosts using the transmission control protocol/internet protocol (TCP/IP). Originally defined for the data network of the United States Department of Defense. Distributed Communications Architecture (DCA) The proprietary architecture for Unisys computer systems; the Unisys network architecture that draws together all aspects of the communications products by defining a set of logical concepts and rules (protocols and interfaces). These guidelines are used in the design of hardware, software, and network products. distributed communications processor (DCP) A programmable communications processor hardware unit that executes Telcon and DCP operating system (DCP/OS) software and serves as a communications subsystem that provides connections between hosts in a network; a modular communications processor that can be tailored to the needs of a broad range of users who implement Unisys distributed communications architecture. It performs the network management function, rather than the host. distributed data processing (DDP) The capability for users at one computer system to execute programs and access files on other computer systems that are connected in the same network. Distributed Data Processing Program-to-Program Communications (DDP-PPC) software The OS 2200 software product that provides distributed data processing services for OS 2200 systems. It is the base product required on any OS 2200 system to execute any other OS 2200 software product that provides distributed data processing capability. domain name A descriptive, easy-to-use identifier that specifies the logical internet name of the local or remote domain v100 Glossaryv3
96 Glossary E element Part of an OS 2200 program file that can be referenced by a unique name and type. There are four element types: symbolic, relocatable, absolute, and omnibus. error code A number that identifies a particular type of program error. The meanings of DDP-PPC error codes are in the Distributed Data Processing (DDP-PPC/DDP-FJT) Messages Reference Manual. H heterogeneous network A network comprised of hosts using different operating systems; in this case, both OS 2200 and non-os 2200 hosts. homogeneous network A network comprised of hosts using different operating systems; in this case, OS 2200 systems. host host-id A computer system, personal computer, or work station connected to a data transmission facility (a data transmission network in the case of DDP-PPC) that executes application or system programs on behalf of its users. The identifier for a local or remote host in the network, defined in the CMS configuration and specified in internet physical address format or in logical host name format. I interface (1) A facilityprovided by a software product to enable a computer user or program to use the product or exchange input and output with the product. (2) A hardware component that links two other hardware components; a portion of a hardware component where it links to another hardware component. International Standards Organization (ISO) The organization that established international standards for computer network architecture. ISO developed the OSI Reference Model, a seven-layered model for communications processing. internet The DoD network of host connections using the suite of TCP/IP protocols. Glossaryv v100
97 Glossary internet physical address A host-id specified in a format that consists of a network number, a host number, and an interface message processor number, each separated by a hyphen or period. Often associated with a logical host name for ease of use. internet protocol (IP) One element of transmission control protocol/internet protocol (TCP/IP). Internet protocol (IP) is the standard used for sending the basic unit of data (an IP datagram) through a Defense Data Network (DDN) internet. See also transmission control protocol/internet protocol (TCP/IP). ISO See International Standards Organization. L LAN See local area network. Linking System (link) A component of the Universal Compiling System (UCS) that links separately compiled routines (object modules) so that they can execute as one program. The Linking System software also permits object modules to be executed in the UCS environment. local area network (LAN) A group of interconnected workstations and supporting devices with high-speed, short-range communications capability within the group. A Unisys USERNET system is an example of a local area network. A local area network can be part of a DDP-PPC network. local host The host to which you are physically attached. logical host name A descriptive, easy-to-use host-id that is associated with, and translates to, an internet physical address. For example, three hosts at a site in New York could be given the logical host names of NY01, NY02, and NY03. M v100 Glossaryv5
98 Glossary map (1) To transform a particular computer system s file structure and attributes to or from a common format, called a virtual file. This enables a computer system that has an OSI software product to send all or part of a file to another computer system that has an OSI software product. The receiving computer system can then manipulate this file to conform to its own file structure and attributes. (2) To use the OS 2200 collector (MAP processor) to process relocatable elements and produce absolute elements. Mapand collect are used synonymously in OS 2200 documentation. N network Two or more independent computers (hosts) that are logically or geographically separated and electronically linked by communications lines or data communications devices for the purpose of exchanging information. network definition statement (NDS) A formatted statement that names and defines a network entity for CMS 1100 or Telcon. CMS 1100 NDS and Telcon NDS formats are different. In older manuals, an NDS may be called a system configuration statement (SCS). O object module element An element containing part of a program in a form that is combined with other object module elements to produce an executable program (output object module element). An object module element is the output of a language processor and the input to a collection or linkage process. omnibus OSI An element type for an OS 2200 program file. Programmers specify an omnibus element type when absolute, relocatable, or symbolic is not appropriate. See Open Systems Interconnection. Open Systems Interconnection (OSI) A network architecture developed by the International Standards Organization (ISO) and other standards organizations that enables computers made by different companies to communicate with each other. Glossaryv v100
99 Glossary P packet switching A data conversion routine usually used in public data networks to split a message into uniformly sized packets for transmission and restored at the destination to its original form. PDN protocol See public data network. A set of rules which controls network communication by defining the structure, content, sequencing procedures, and error detection and recovery techniques for data transmission. public data network (PDN) A network of line connections to various points furnished by a regulated carrier such as a telephone company. A communication network developed for the transmission of data and usually made accessible only to subscribers who share the network. Q qualifier A prefix for a file name on an OS 2200 system. An asterisk (*) character separates the qualifier and the rest of the file name. R relocatable element An element containing part of a program in relocatable binary form that is combined with other relocatable elements to produce an executable program (absolute element). A relocatable element is the output of a language processor and input to a collection process. remote host Any host in the network other than the one to which you are physically attached. run stream (runstream) A series of OS 2200 executive control language statements and any input, data, or programs associated with them v100 Glossaryv7
100 Glossary S SDF session See system data format. A logical connection between two network-addressable units (termination systems, end users, and so forth) that can be activated, tailored to provide various protocols, and deactivated, as requested. The session activation request and response can determine options for the rate and concurrency of data exchange, the control of contention and error recovery, and the characteristics of the data stream. Sessions compete for network resources, such as the links within the path control network. source host The host that sends a file or records in any transfer operation. symbolic element An element type for an OS 2200 program file. A symbolic element can contain a source program or subprogram written in a programming language, directives to an OS 2200 software processor, executive control language statements, or input for a program or OS 2200 software processor. Symbolic elements contain text in system data format (SDF). Typically, OS 2200 text editors create symbolic elements. system data format (SDF) A sequential record format used by OS 2200 software for store data. SDF recognizes data records and control records. Data records contain the data (the text of a record, for example). Control records provide special control information about the data, such as line numbers, page, and size. Symbolic elements are assumed to use SDF. T TAS TCP/IP See TCP/IP Application Services. See transmission control protocol/internet protocol. TCP/IP Application Services (TAS) TCP/IP Application Services software. An OS 2200 software product that communicates with other hosts in an X.25 public data network (PDN) or in a local area network (LAN) using the transmission control protocol/internet protocol (TCP/IP), originally defined for the data network of the United States Department of Defense (DoD). This product was previously called DDN Glossaryv v100
101 Glossary Telcon TIP A Unisys program product that is a distributed communications operating system for implementation of distributed communications architecture (DCA). The software resides and executes in a distributed communications processor (DCP). Transaction processing; allows the execution of transaction processing programs. These programs may be written in assembler language or in a high-level compiler language. OS 2200 TIP provides a general transaction processing capability that allows a remote terminal operator to initiate the execution of a preregistered program at the central computer site. Once in execution, the transaction program has access to the full capabilities of the OS 2200 executive system, as well as to the specialized capabilities and services of TIP. transmission control protocol/internet protocol (TCP/IP) Data transmission protocols originally defined for the United States Department of Defensedatanetwork. U UCS UDLC See Universal Compiling System. See universal data link control. Universal Compiling System (UCS) A set of OS 2200 software products that provide extended mode (virtual addressing) capability, a standardized system library, a linking system, compilers, and application development tools. UCS enables applications written in various programming languages to access the same files and databases. Universal Compiling System COBOL (UCS COBOL) An implementation of the COBOL programming language as defined by the X American National Standard for use with the OS 2200 UCS COBOL compiler (UCOB). universal data link control (UDLC) The Unisys line control method for data transfer over communication lines. user name A 1- to 20-character name that identifies you on your host v100 Glossaryv9
102 Glossary X X.25 public data network A packet-switched public data network that conforms to Consultative Committee for International Telegraph and Telephone (CCITT) standard X.25, which defines a protocol for communication between packet-switched public data networks and devices operating in packet-switched mode. Glossaryv v100
103 Bibliography OS 1100 ASCII COBOL Programming Reference Manual (UP-8582). Unisys Corporation. OS 1100 Communications Management System (CMS 1100) Configuration Reference Manual ( ). Unisys Corporation. OS 1100 Communications Management System (CMS 1100) Installation and Configuration Guide ( ). Unisys Corporation. OS 1100/DCP Series Open Systems Communications Software Conceptual Overview ( ). Unisys Corporation. OS 2200 Distributed Data Processing (DDP-PPC) DCA Interface C Language Programming Guide ( ). Unisys Corporation. OS 2200 Distributed Data Processing (DDP-PPC/DDP-FJT) DCA Interface COBOL Programming Guide ( ). Unisys Corporation. OS 2200 Distributed Data Processing (DDP-PPC/DDP-FJT) Messages Reference Manual ( ). Unisys Corporation. OS 2200 Distributed Data Processing (DDP-PPC) OSI Interface C Language Programming Guide ( ). Unisys Corporation. OS 2200 Distributed Data Processing (DDP-PPC) OSI Interface COBOL Programming Guide ( ). Unisys Corporation. OS 2200 Distributed Data Processing (DDP-PPC) TCP/IP Interface C Language Programming Guide ( ). Unisys Corporation. OS 2200 Distributed Data Processing (DDP-PPC) TCP/IP Interface FORTRAN Programming Guide ( ). Unisys Corporation. OS 2200 Distributed Data Processing Program to Program Communications (DDP-PPC) Implementation and Administration Guide ( ). Unisys Corporation. OS 2200 TCP/IP Application Services (TAS) COBOL Programming Guide ( ). Previously titled Defense Data Network (DDN 1100) COBOL Programming Guide. Unisys Corporation v100 Bibliographyv1
104 Bibliography OS 2200 TCP/IP Application Services (TAS) FORTRAN Programming Guide ( ). Previously titled Defense Data Network (DDN 1100) FORTRAN Programming Guide. Unisys Corporation. OS 1100 Universal Compiling System (UCS) COBOL Programming Reference Manual ( ). Unisys Corporation. Bibliographyv v100
unisys ClearPath Enterprise Servers Remote Database Backup Planning and Operations Guide ClearPath MCP 14.0 April 2012 8600 2052 309
unisys ClearPath Enterprise Servers Remote Database Backup Planning and Operations Guide ClearPath MCP 14.0 April 2012 8600 2052 309 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
BrightStor ARCserve Backup for Windows
BrightStor ARCserve Backup for Windows Tape RAID Option Guide r11.5 D01183-1E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's
Unisys INFOIMAGE FOLDER ON WINDOWS NT. Connector for Microsoft Exchange. Getting Started Guide
INFOIMAGE FOLDER ON WINDOWS NT Connector for Microsoft Exchange Unisys Getting Started Guide Copyright 1999 Unisys Corporation. All rights reserved. Unisys is a registered trademark of Unisys Corporation.
TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:
Due to the number of hardware possibilities for a network, there must be a set of rules for how data should be transmitted across the connection media. A protocol defines how the network devices and computers
Server Management Agent for Windows User s Guide. Server Management 2.0 and Higher
Server Management Agent for Windows User s Guide Server Management 2.0 and Higher March 2008 . unisys imagine it. done. Server Management Agent for Windows User s Guide Server Management 2.0 and Higher
Network Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
BrightStor ARCserve Backup for Windows
BrightStor ARCserve Backup for Windows Agent for Microsoft SQL Server r11.5 D01173-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the
Server Sentinel Monitored Server
Server Sentinel Monitored Server Installation and Reinstallation Guide for Systems Monitoring Third-Party Products Server Sentinel 4.4.3 and Higher April 2007 . unisys imagine it. done. Server Sentinel
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
Version 5.0. MIMIX ha1 and MIMIX ha Lite for IBM i5/os. Using MIMIX. Published: May 2008 level 5.0.13.00. Copyrights, Trademarks, and Notices
Version 5.0 MIMIX ha1 and MIMIX ha Lite for IBM i5/os Using MIMIX Published: May 2008 level 5.0.13.00 Copyrights, Trademarks, and Notices Product conventions... 10 Menus and commands... 10 Accessing online
unisys Server Management Agent for Windows User s Guide imagine it. done. Server Management 2.1 and Higher October 2008 3839 6412 003
unisys imagine it. done. Server Management Agent for Windows User s Guide Server Management 2.1 and Higher October 2008 3839 6412 003 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product
BrightStor ARCserve Backup for Linux
BrightStor ARCserve Backup for Linux Agent for MySQL Guide r11.5 D01213-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's
The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL
The OSI Model and the TCP/IP Protocol Suite - the OSI model was never fully implemented. - The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
System i and System p. Customer service, support, and troubleshooting
System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
Using RAID Admin and Disk Utility
Using RAID Admin and Disk Utility Xserve RAID Includes instructions for creating RAID arrays and monitoring Xserve RAID systems K Apple Computer, Inc. 2003 Apple Computer, Inc. All rights reserved. Under
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
Introduction. What is an Operating System?
Introduction What is an Operating System? 1 What is an Operating System? 2 Why is an Operating System Needed? 3 How Did They Develop? Historical Approach Affect of Architecture 4 Efficient Utilization
Modbus Protocol. PDF format version of the MODBUS Protocol. http://www.http://www.modicon.com/techpubs/toc7.html. The original was found at:
Modbus Protocol PDF format version of the MODBUS Protocol The original was found at: http://www.http://www.modicon.com/techpubs/toc7.html (In case of any discrepancies, that version should be considered
Upgrade Guide. CA Application Delivery Analysis 10.1
Upgrade Guide CA Application Delivery Analysis 10.1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
BrightStor ARCserve Backup for Windows
BrightStor ARCserve Backup for Windows Serverless Backup Option Guide r11.5 D01182-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the
Process Control and Automation using Modbus Protocol
Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has
MetroPro Remote Access OMP-0476F. Zygo Corporation Laurel Brook Road P.O. Box 448 Middlefield, Connecticut 06455
MetroPro Remote Access OMP-0476F Zygo Corporation Laurel Brook Road P.O. Box 448 Middlefield, Connecticut 06455 Telephone: (860) 347-8506 E-mail: [email protected] Website: www.zygo.com ZYGO CUSTOMER SUPPORT
GSM. Quectel Cellular Engine. GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1
GSM Cellular Engine GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1 Document Title GSM TCPIP Application Notes Version 1.1 Date 2011-09-22 Status Document Control ID Release GSM_TCPIP_AN_V1.1 General Notes
Expedite for Windows Software Development Kit Programming Guide
GXS EDI Services Expedite for Windows Software Development Kit Programming Guide Version 6 Release 2 GC34-3285-02 Fifth Edition (November 2005) This edition replaces the Version 6.1 edition. Copyright
CA ARCserve Backup for Windows
CA ARCserve Backup for Windows Agent for Sybase Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
etrust Audit Using the Recorder for Check Point FireWall-1 1.5
etrust Audit Using the Recorder for Check Point FireWall-1 1.5 This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end user s informational
Services. Vyatta System. REFERENCE GUIDE DHCP DHCPv6 DNS Web Caching LLDP VYATTA, INC.
VYATTA, INC. Vyatta System Services REFERENCE GUIDE DHCP DHCPv6 DNS Web Caching LLDP Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada) COPYRIGHT
Limi Kalita / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4802-4807. Socket Programming
Socket Programming Limi Kalita M.Tech Student, Department of Computer Science and Engineering, Assam Down Town University, Guwahati, India. Abstract: The aim of the paper is to introduce sockets, its deployment
Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
Computer Organization & Architecture Lecture #19
Computer Organization & Architecture Lecture #19 Input/Output The computer system s I/O architecture is its interface to the outside world. This architecture is designed to provide a systematic means of
CA ARCserve Backup for Windows
CA ARCserve Backup for Windows Agent for Microsoft SharePoint Server Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for
UNISYS. ClearPath Enterprise Servers. Authentication Sentinel for OS 2200 User Guide. ClearPath OS 2200 Release 8.2
ClearPath Enterprise Servers Authentication Sentinel for OS 2200 User Guide UNISYS 2004 Unisys Corporation. All rights reserved. ClearPath OS 2200 Release 8.2 Printed in USA September 2004 4729 2016 000
Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide
Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.
Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG
Networking A Beginner's Guide Sixth Edition BRUCE HALLBERG Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents Acknowledgments
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
Firewall REFERENCE GUIDE. VYATTA, INC. Vyatta System. IPv4 Firewall IPv6 Firewall Zone-Based Firewall. Title
Title VYATTA, INC. Vyatta System Firewall REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone-Based Firewall Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US
EView/400i Management Pack for Systems Center Operations Manager (SCOM)
EView/400i Management Pack for Systems Center Operations Manager (SCOM) Concepts Guide Version 6.3 November 2012 Legal Notices Warranty EView Technology makes no warranty of any kind with regard to this
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
524 Computer Networks
524 Computer Networks Section 1: Introduction to Course Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Course Outline The Aim The course is design to establish the terminology
CA Workload Automation Agent for Databases
CA Workload Automation Agent for Databases Implementation Guide r11.3.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the
Troubleshooting Procedures for Cisco TelePresence Video Communication Server
Troubleshooting Procedures for Cisco TelePresence Video Communication Server Reference Guide Cisco VCS X7.2 D14889.01 September 2011 Contents Contents Introduction... 3 Alarms... 3 VCS logs... 4 Event
CA ARCserve Backup for Windows
CA ARCserve Backup for Windows Agent for Sybase Guide r16.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Chapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
BrightStor ARCserve Backup for Windows
BrightStor ARCserve Backup for Windows Enterprise Option for Microsoft SQL Using HP-XP Snap-Shot Guide r11.5 D01190-2E This documentation and related computer software program (hereinafter referred to
DATA ITEM DESCRIPTION
DATA ITEM DESCRIPTION Form Approved OMB NO.0704-0188 Public reporting burden for collection of this information is estimated to average 110 hours per response, including the time for reviewing instructions,
Server Management 2.0
Server Management 2.0 Installation and Configuration Guide Server Management 2.0 and Higher May 2008 . unisys imagine it. done. Server Management 2.0 Installation and Configuration Guide Server Management
PART OF THE PICTURE: The TCP/IP Communications Architecture
PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals
WANSync SQL Server. Operations Guide
WANSync SQL Server Operations Guide This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational purposes only
Chapter 3. Internet Applications and Network Programming
Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
MailMarshal SMTP in a Load Balanced Array of Servers Technical White Paper September 29, 2003
Contents Introduction... 1 Network Load Balancing... 2 Example Environment... 5 Microsoft Network Load Balancing (Configuration)... 6 Validating your NLB configuration... 13 MailMarshal Specific Configuration...
Server Sentinel Client Workstation
Server Sentinel Client Workstation Installation and Reinstallation Guide Server Sentinel 4.4.3 and Higher April 2008 . unisys imagine it. done. Server Sentinel Client Workstation Installation and Reinstallation
DeltaV System Health Monitoring Networking and Security
DeltaV Distributed Control System White Paper DeltaV System Health Monitoring Networking and Security Introduction Emerson Process Management s DeltaV System Health Monitoring service enables you to proactively
Chapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
2.5 TECHNICAL NOTE FTP
Version 2.5 TECHNICAL NOTE FTP Protocol Agent Overview Stonesoft Corp. Itälahdenkatu 22A, FIN-00210 Helsinki Finland Tel. +358 (9) 4767 11 Fax. +358 (9) 4767 1234 email: [email protected] Copyright 2002
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
UNISYS. Server Management 2.0. Software Release Announcement. imagine it. done. Server Management 2.0 and Higher. May 2008 8216 3445 000
UNISYS imagine it. done. Server Management 2.0 Software Release Announcement Server Management 2.0 and Higher May 2008 8216 3445 000 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product
TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
3M Command Center. Installation and Upgrade Guide
3M Command Center Installation and Upgrade Guide Copyright 3M, 2015. All rights reserved., 78-8129-3760-1d 3M is a trademark of 3M. Microsoft, Windows, Windows Server, Windows Vista and SQL Server are
Agilent Technologies. Connectivity Guide. USB/LAN/GPIB Interfaces. Agilent Technologies
Agilent Technologies USB/LAN/GPIB Interfaces Connectivity Guide Agilent Technologies Notices Agilent Technologies, Inc. 2003, 2004 No part of this manual may be reproduced in any form or by any means (including
CA XCOM Data Transport for Windows Server/Professional
CA XCOM Data Transport for Windows Server/Professional Installation Guide Release 11.6 Second Edition This Documentation, which includes embedded help systems and electronically distributed materials,
TeamQuest SMFII and TeamQuest Online for Unisys MCP Systems
TeamQuest SMFII and TeamQuest Online for Unisys MCP Systems ADMINISTRATION GUIDE Copyright 2012 TeamQuest Corporation. All Rights Reserved. April 2012 Levels 54.017 and 55.017 TQ 02211.16 The names, places
Integration with CA Transaction Impact Monitor
Integration with CA Transaction Impact Monitor CA Application Delivery Analysis Multi-Port Monitor Version 10.1 This Documentation, which includes embedded help systems and electronically distributed materials,
KMSYS Worldwide, Inc. Host Gateway Server Configuration
KMSYS Worldwide, Inc. Host Gateway Server Configuration 11 December 2006 KMSYS Worldwide, Inc. Host Gateway Server Configuration Table Of Contents Introduction to HGS...1 Host Gateway Server from KMSYS
New SMTP client for sending Internet mail
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server New SMTP client for sending Internet mail z/os Communications Server Development, Raleigh, North Carolina This presentation
Module 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
How to Manage IT Resource Consumption
How to Manage IT Resource Consumption At an Application Level with TeamQuest Workloads In this paper, John Miecielica of Metavante, provides a step-by-step example showing how he uses TeamQuest software
Appendix B RCS11 Remote Communications
Appendix B RCS11 Remote Communications B.1 Host Computer Remote Communications Control and status messages are conveyed between the RCS11 and the host computer using packetized message blocks in accordance
Objectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version 6.3.1 Fix Pack 2.
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft
Data Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
BrightStor ARCserve Backup for Windows
BrightStor ARCserve Backup for Windows NDMP NAS Option Guide r11.5 D01180-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's
CA XOsoft Replication for Windows
CA XOsoft Replication for Windows Microsoft SQL Server Operation Guide r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the
Introduction. Assessment Test
61699ftoc.fm Page ix Friday, May 9, 2008 11:26 AM Introduction Assessment Test xvii xxviii Chapter 1 Understanding Windows Server 2008 Networking 1 Understanding the OSI Model 2 Protocol Stacks 4 Communication
cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)
Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI
MQSeries. Clients GC33-1632-07
MQSeries Clients GC33-1632-07 MQSeries Clients GC33-1632-07 Note! Before using this information and the product it supports, be sure to read the general information under Appendix C. Notices on page 169.
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
CA Nimsoft Unified Management Portal
CA Nimsoft Unified Management Portal HTTPS Implementation Guide 7.6 Document Revision History Document Version Date Changes 1.0 June 2014 Initial version for UMP 7.6. CA Nimsoft Monitor Copyright Notice
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
CHAPTER 15: Operating Systems: An Overview
CHAPTER 15: Operating Systems: An Overview The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint
Linux MPS Firewall Supplement
Linux MPS Firewall Supplement First Edition April 2007 Table of Contents Introduction...1 Two Options for Building a Firewall...2 Overview of the iptables Command-Line Utility...2 Overview of the set_fwlevel
Configuring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Last Updated: October 5, 2011 This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco
NEC Express5800 Series NEC ESMPRO AlertManager User's Guide
NEC Express5800 Series NEC ESMPRO AlertManager User's Guide 7-2006 ONL-4152aN-COMMON-128-99-0606 PROPRIETARY NOTICE AND LIABILITY DISCLAIMER The information disclosed in this document, including all designs
Arcserve Backup for Windows
Arcserve Backup for Windows Agent for Microsoft SharePoint Server Guide r16 Pre-release Document, only for reference This Documentation, which includes embedded help systems and electronically distributed
unisys OS 2200 Relational Data Management System (RDMS 2200) and IPF SQL Interface End Use Guide imagine it. done. ClearPath OS 2200 12.
unisys imagine it. done. OS 2200 Relational Data Management System (RDMS 2200) and IPF SQL Interface End Use Guide ClearPath OS 2200 12.1 Release June 2010 7831 0778 003 NO WARRANTIES OF ANY NATURE ARE
VERITAS NetBackup 6.0 for Oracle
VERITAS NetBackup 6.0 for Oracle System Administrator s Guide for UNIX and Linux N15262B September 2005 Disclaimer The information contained in this publication is subject to change without notice. VERITAS
GFI Product Guide. GFI MailArchiver Archive Assistant
GFI Product Guide GFI MailArchiver Archive Assistant The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
Cluster APIs. Cluster APIs
Cluster APIs Cluster APIs Cluster APIs include: Cluster Control APIs Cluster Resource Group APIs Cluster Resource Group Exit Program Topics covered here are: Cluster APIs Cluster Resource Services Characteristics
Transport Layer. Chapter 3.4. Think about
Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is
