IBM Transaction Server OS User Manual
Page 5
![background image](/manuals/126598/5/background.png)
Contents
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . .
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . .
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . .
What this book is about . . . . . . . . . . . . . . . . . . . . .
Who this book is for. . . . . . . . . . . . . . . . . . . . . .
What you need to know to understand this book . . . . . . . . . . .
How to use this book . . . . . . . . . . . . . . . . . . . . .
Determining if a publication is current . . . . . . . . . . . . . . .
Notes on terminology . . . . . . . . . . . . . . . . . . . . .
Bibliography . . . . . . . . . . . . . . . . . . . . . . . . .
CICS Transaction Server for OS/390
. . . . . . . . . . . . . . . .
CICS books for CICS Transaction Server for OS/390
CICSPlex SM books for CICS Transaction Server for OS/390 . . . . . .
Other CICS books . . . . . . . . . . . . . . . . . . . . . .
Summary of changes. . . . . . . . . . . . . . . . . . . . . .
Chapter 1. Introducing transaction affinities . . . . . . . . . . . . .
The benefits of dynamic routing . . . . . . . . . . . . . . . . . .
What does dynamic routing cost?. . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
Transaction-system affinity . . . . . . . . . . . . . . . . . . .
Affinity relations . . . . . . . . . . . . . . . . . . . . . . .
Affinity lifetimes . . . . . . . . . . . . . . . . . . . . . . .
CICS programming techniques for transaction affinity
Safe programming techniques . . . . . . . . . . . . . . . . . .
Unsafe programming techniques . . . . . . . . . . . . . . . . .
Suspect programming techniques. . . . . . . . . . . . . . . . .
Avoiding the effects of transaction affinity . . . . . . . . . . . . . . .
Protecting applications from one another . . . . . . . . . . . . . . .
Chapter 2. Introducing the Transaction Affinities Utility . . . . . . . .
Commands detected by the Transaction Affinities Utility
The Scanner component . . . . . . . . . . . . . . . . . . . . .
The Detector component . . . . . . . . . . . . . . . . . . . . .
What is detected . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . .
Controlling the Detector . . . . . . . . . . . . . . . . . . . .
How the affinity data is collected . . . . . . . . . . . . . . . . .
Saving affinity data . . . . . . . . . . . . . . . . . . . . . .
The affinity data VSAM files . . . . . . . . . . . . . . . . . . .
The control record VSAM file . . . . . . . . . . . . . . . . . .
Detector performance . . . . . . . . . . . . . . . . . . . . .
The Reporter component . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . .
Chapter 3. Preparing to use the affinity utility program
© Copyright IBM Corp. 1994, 1999
iii