• Aucun résultat trouvé

Sharing Resources-An Introduction

, ~

-

Logical

-

Unit

Terminal System

f-4-

Work Station

~-- - . . . . Flow of data outside of VTAM's control Figure 2-4. Data Flow Through a VTAM Telecommunication System

The application is responsible for any data transfer activity in which the application program uses auxiliary storage devices. (The application program can use an access method such as IBM's Virtual Storage Access Method (VSAM) for access to auxiliary storage of the host system.)

Sharing Resources-An Introduction

Because VTAM allocates network resources, it permits parts of the network to be shared among the application programs executed in the host CPU. Shared resources include:

• Communications controllers, physical units, and lines, which may be used by more than one application program. Actually, an application program is unaware of communications controllers, physical units, and lines; it communicates only with terminals. By sharing these items, several application programs may communicate with different terminals on the same multipoint line. Also, the terminals on a single multipoint line may communicate with any of the application programs using VT AM.

• Terminals, which may be used by more than one application program. Anyone terminal may communicate with anyone of the application programs that is using VTAM. However, once a terminal and an application program are connected, the terminal can communicate with only that application program until released by the program.

Figure 2-5 shows how resources can be shared in a VT AM telecommunication network.

Through VT AM, TCAM application programs can share resources in the same manner as VT AM application programs. For more details on resource sharing through VTAM, see

"Sharing Telecommunication Resources," in Chapter 7.

Chapter 2. VTAM's Role in an SNA Telecommunication System 13

Program A can communicate with these terminals,

v-rAM

While Program B communicates with these terminals.

VTAM

Later, Program A can communicate with this terminal,

VTAM

While Prqgram B communicates with these terminals.

VTAM

Figure 2-5. Sharing Resources

Overview of VT AM

Four Views ofa VTAM System

This section describes the relationship among the major elements of a VTAM system and also introduces concepts that must be understood for proper planning and use of VT AM.

These concepts are expanded later in tlus manual.

To understand VT AM, a user should know what the system looks like from four viewpoints. These viewpoints are shown in Figure 2-6, which depicts the system: (a) as seen in terms of its physical components, (b) as seen by the operating system, (c) as seen by VTAM, and (d) as seen by application programs.

Section A of Figure 2-6 shows a possible physical configuration of the system. A VT AM system includes a central processing unit (referred to as the host CPU) with a system console (labeled SI). The system console is used to enter VT AM operator commands (called network operator commands) to control the telecommunication system. Also attached to the host CPU are auxiliary storage devices that contain data sets used by VTAM.

The network shown in Section A includes a locally attached 3270 terminal (labeled Ll), a locally attached 3790 terminal (labeled L2), and a locally attached communications controller. Attached to the local communications controller are three terminals (labeled Tl, T2, and T3) and a remote communications controller. Tl is attached on a point-to-point line. T2 and ~3 are logical units (in a 3600 system). Attached to the remote communications controller are three terminals (labeled T4, T5, and T6). T4 is attached on a point-to-point line; T5 and T6 are attached on the same multipoint line.

A telecommunication system has a definite physical configuration, but its definition and uses are different for the operating system, VTAM, and application programs. Sections B, C, and D of Figure 2-6 depict these differences.

Section B of Figure 2-6 depicts the telecommunication system as viewed by the operating system.

Support is generated in the operating system for only the system console, the auxiliary storage devices, and the locally attached devices of the telecommunication network.

Remote device support need not be generated at system generation if these attachments are to be used only through VTAM. Such support is generated within VTAM, as explained later.

The number of auxiliary storage devices used by VT AM depends upon data requirements that, in turn, are influenced by factors such as the size and complexity of the telecommunication system. In general, data used by or generated by VTAM falls into one of three categories as shown in Section B of Figure 2-6:

VTAM libraries whlch contain VT AM load modules, descriptions of the telecommunica-tion system, and operatelecommunica-tional specificatelecommunica-tions of the installatelecommunica-tion

NCP libraries, which contain NCP load modules and dump records

RAS (reliability, availability, and serviceability) libraries, which contain records to assist in error recording and maintenance of the VT AM system

VTAM and NCP libraries include VTAM, NCP, and operating system data sets; most of the library requirements for RAS involve operating system data sets. The composition and organization of these libraries depend upon the operating system under which VT AM is being executed. (See Chapter 7 for details on operating system requirements and on data set requirements for VT AM.)

Chapter 2. VTAM's Role in an SNA Telecommunication System 15

....

'"I:l

A

PHYSICAL CONFIGURATION OF A TELECOMMUNICATION SYSTEM

B

THE TELECOMMUNICATION SYSTEM VIEWED BY THE OPERATING SYSTEM

C

THE TELECOMMUNICATION SYSTEM VIEWED BY VTAM

o

THE TELECOMMUNICATION SYSTEM VIEWED BY

APPLICATION PROGRAMS

370x = 3704 or 3705 Communications Controller

Section C of Figure 2-6 depicts the telecommunication system as viewed by VTAM.

The host CPU must contain the operating system (DOS/VS, OS/VS1, or OS/VS2), VTAM, and one or more application programs. To VTAM, an active application program is an open (that is, an initialized) access method control block (ACB). As shown in Section B, all locally attached devices are initially "owned" by the operating system, but (as indicated in section C) when VT AM is started and begins activating parts of the telecommunication network, VTAM acquires the use of these devices. Some of the devices are allocated explicitly to VT AM, some are allocated implicitly, and others are used by VTAM but remain allocated to the operating system.

Devices that are explicitly allocated to VT AM include the local 3270, the local 3790, and the local communications controller. These devices are explicitly allocated because support for these devices is generated in the operating system, and this support is extended to VT AM. When one of these devices is allocated to VT AM, VT AM becomes its sole "owner"; the only access to the device is through VT AM. Locally attached devices not allocated to VTAM remain available for allocation by the operating system to other, non-VT AM users.

The remote attachments (terminals T1 through T6, the remote communications controller, and the 3601 controller in Figure 2-6, Section C) are implicitly allocated to VT AM. They are implicitly allocated because the only access to these devices is through the local communications controller, and VTAM controls access to this controller. Note:

In the case of an NCP with PEP, VTAM only controls the access to that part of the remote network serviced by the network control mode of the NCP.

Also allocated to VT AM are the data sets on the auxiliary storage devices. These data sets contain the VT AM libraries, the NCP libraries, and some of the RAS libraries. RAS libraries not allocated directly to VT AM are used by VT AM through the RAS facilities of the operating system.

The system console is used by VT AM but not actually allocated to VT AM.

Communication is established between VTAM and the network operator through this console. The network operator enters VT AM commands through this console, and VT AM transmits messages to the network operator at this console.

As noted previously, a primary purpose of VTAM is to provide the communication link between application programs and terminals. VT AM uses the operator services of the operating system to communicate with the network operator at the system console; it uses the operating system's data management services and, in some cases, its RAS facilities, to gain access to the libraries on the auxiliary storage devices; but VT AM directly handles communication with terminals in the telecommunication network and with application programs in the host CPU are handled directly by VT AM.

Section D of Figure 2-6 shows the telecommunication system as viewed by the application program. This view results from VT AM's ownership of all elements in the network and from the way VTAM allocates the use of these elements. VTAM connects application programs to only terminals; the other, intermediate, elements are allocated only for the time needed to satisfy a specific transmission request.

As shown in Section D of the figure, application programs connect with terminals and need not be concerned with intermediate connections such as channels, communications controllers (and NCPs), and telecommunication lines. Application programs are also not directly concerned with the system console used by the network operator or with the VTAM, NCP, or RAS libraries.

Chapter 2. VTAM's Role in an SNA Telecommunication System 17

VTAMin Operation

Installing a VT AM System

To operate VT AM requires derming the telecommunication system, controlling the activities of VT AM from the network operator's console, and executing application programs that use VTAM for data transmission.

Derming the system to VT AM involves identifying and describing all of the elements in the system. These element descriptions are collected and fued as members in OS/VS, or books in DOS/VS, in a VTAM library. Activating an element in VTAM includes using the description to establish a defmition of, and control information for, the element. VT AM uses this information to control the allocation of the element.

When VT AM is started, its initiation function establishes the telecommunication system according to the specifications of the installation. Once VTAM has been started, active application programs can connect with active terminals in the telecommunication network. As long as a terminal is connected to an application program, it can communicate with that application program.

To form a connection with a terminal, an application program must fIrst identify itself to VTAM. Once identifIed, the application program can request connection to a specific terminal (or list of terminals). An application program can either acquire or accept a connection. When it acquires a connection, the application program initiates the connection; when it accepts a connection, the connection is initiated by a logon. When a logon is requested, the terminal is "queued" to the application program; that is, the connection process is initiated but not completed. The application program must accept the terminal to complete the connection. Connection is made to the terminal, not the line. When the connection request is completed, the application program is able to transmit data (by input/output requests) to the terminal.

In transmitting data to a terminal, the data is moved from the application program's output data areas to VT AM buffers. VT AM then transmits the data to the terminal (through the NCP for remotely attached devices).

Input from the terminals travels the same (but reverse) route. The transmission moves from the terminal to VTAM (through the NCP for remotely attached devices). VTAM then moves the information to the application program input areas.

When an application program no longers needs a terminal, it can disconnect from the terminal. VT AM can then reallocate the terminal to another application program.

When the telecommunication system is to be closed down, VTAM's termination function enables the installation to terminate VT AM processing in an orderly manner and to cease telecommunication activity.

From the time that VTAM is started to the time it is terminated, the VTAM network operator facilities enable the installation to control and monitor the telecommunication system. Most modifIcations to the network can be made dynamically, without terminating VT AM.

The steps involved in installing an operating telecommunication system with VT AM are discussed in "Installing a VTAM System," below.

To install a VT AM system, it must be created, procedures should be defIned for using it, the active system must be controlled, and application programs must be designed and coded for the host CPU. These steps are discussed below.

Creating the System

Controlling the Network

Designing VI AM Application Programs

Establishing Procedures for Using the System

A VTAM telecommunication system is created by generating VTAM into the operating system, defining the network to the communications controllers and to VT AM, and defining special VT AM facilities.

Generating VT AM is part of operating system generation. Defining the network to VT AM is a separate process of identifying and describing the network and then ftling these definitions in a VT AM library. Defining special VT AM facilities includes coding exit routines that perform functions such as checking the validity of connection requests between application programs and terminals, collecting information, and structuring VT AM's logon facility to the installation's specifications.

See Chapter 3 for detailed information on using VTAM to create a telecommunication system.

VTAM enables a network operator to dynamically control the telecommunication network. The network operator can start and stop VT AM, monitor the activity of the telecommunication system, activate and deactivate network elements such as data links, physical units, and logical units, and start and stop specified VT AM facilities. To perform these functions, the network operator has a set of VT AM commands. The operator uses these commands to monitor and dynamically configure the network as it was dermed.

See Chapter 4 for detailed information on the responsibilities and actions of the network operator and for a description of the VT AM network operator facilities. Chapter 4 also contains detailed information on activation of network elements.

VT AM enables application programs to request connection with specific terminals and to request the transfer of data between the applications and their connected terminals.

VTAM also provides facilities for application programs to process requests synchronously or asynchronously. Other facilities include exit routines that are scheduled upon the completion of specified events and an extensive error notification scheme.

Chapter 5 introduces the VT AM facilities available to the application program, and it provides suggestions on designing VT AM application programs. It also provides more detail on VT AM concepts pertinent to application programs-such as connection, communication, and synchronous and asynchronous processing.

Once a VTAM telecommunication system has been started, it is available to application programs, terminal operators, and the network operator. To ensure that the telecommuni-cation system is used effectively and efficiently, the installation needs to establish procedures for users of the system and controls that monitor these procedures.

Procedures should be established for the network operator for starting, stopping, and manipulating the VT AM system. The network operator needs to know how and when to activate and deactivate nodes and specific VTAM functions. The network operator also must know what to do when error conditions are encountered and what action to take to avoid unnecessary downtime. (These actions might include responding to error messages, collecting status information, or correcting the problem.)

The application programmer needs to know the conventions to be followed when connecting with VT AM and with terminals. Procedures should also be established for the interaction between the application program and the rest of the system. Such procedures might encompass passing terminal connections between application programs and reacting to system c1osedown.

Chapter 2. VTAM's Role in an SNA Telecommunication System 19

The terminal operator may need to know how to log on to and log off from application programs.

Controls should be established to ensure that only authorized users can gain access to VTAM resources. VTAM facilities can be used to control connection to VTAM and between application programs and terminals. Facilities are also available to restrict the use of certain VT AM functions to only authorized users and to protect confidential data.

Chapter 6 discusses the RAS capabilities of VTAM. Chapter 7 describes various VTAM planning considerations. The exact procedures defined by an installation depends upon the needs and requirements of the installation itself coupled with the functions and facilities of VT AM as addressed in this publication.

CHAPTER 3. CREATING A TELECOMMUNICATION SYSTEM WITHVTAM

This chapter describes in general how a VT AM telecommunication system is created to meet installation requirements. The VTAM System Programmer's Guide for each operating system describes these procedures in detail.

Creating a VT AM telecommunication system consists of:

• Defming VT AM and local devices to the operating system

• Generating a network control program (NCP)

• Defining the network to VTAM

• Defining connection and disconnection procedures for terminals in the network

• Coding and including installation exit routines

• Defining start options (the status of the system when it is initialized and the size, thresholds, and other characteristics of VT AM storage pools to be used for incoming and outgoing data and for control blocks)

Creating a VTAM telecommunication system may also include the defining of network operating procedures, described in Chapter 4, and the writing of VTAM application programs, described in Chapter 5.

Figure 3-1 summarizes the steps in creating a VT AM telecommunication system that are discussed in this chapter. Some of the steps in Figure 3-1 are related to other steps. For example, step C, defining the network to VT AM, consists not only of describing the structure of the network to VT AM but also of relating each described logical unit to an associated logon mode table. Thus, step C also involves step E, defining connection and disconnection procedures. The steps in Figure 3-1, based on the separate sets of statements that may be required in setting up the system, are the basis for the organization of this chapter and are a convenient way to look at the processes involved in planning and setting up a VT AM system.

Defining VT AM and Local Devices to the Operating