04.04.2013 Views

Addressing OLTP Solutions with CICS: The Transaction Server ... - Ibm

Addressing OLTP Solutions with CICS: The Transaction Server ... - Ibm

Addressing OLTP Solutions with CICS: The Transaction Server ... - Ibm

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• EPI<br />

<strong>The</strong> EPI enables a non-<strong>CICS</strong> application program, running in the client<br />

machine, to access the <strong>CICS</strong> for AIX region as if it was from a 3270 terminal.<br />

As the EPI uses DCE RPC, DCE Base Services are required on the client<br />

machine. With EPI you can have up to 15 concurrent logical terminals on<br />

one client workstation. However, investment in programming the non-<strong>CICS</strong><br />

application is required to exploit the ability to serve several logical terminals<br />

from a single EPI session.<br />

With EPI, security is handled by DCE and can be controlled in the same way<br />

as for cicsterm.<br />

<strong>The</strong> EPI uses multiple threads when processing data to and from the <strong>CICS</strong><br />

for AIX region. cicsterm, however, communicates synchronously <strong>with</strong><br />

aixterm. <strong>The</strong>refore, we believe that the EPI is more efficient than cicsterm or<br />

cicsteld even after adding the overhead of a display manager such as X<br />

Windows or Motif. <strong>The</strong> EPI provides a good opportunity to add a GUI front<br />

end to existing applications. You have to consider the required<br />

programming investment against the efficiency gain when using the EPI.<br />

• cicsterm<br />

cicsterm provides 3270 emulation for AIX terminals and is probably the most<br />

straightforward way of accessing the <strong>CICS</strong> for AIX region. It runs as an AIX<br />

process, on the server machine or on the desktop client machine. Running<br />

cicsterm on the <strong>CICS</strong> for AIX server machine uses up to 40% of the server′s<br />

processing and hence greatly undermines the server′s performance.<br />

If DCE CDS is used, for successful connection the <strong>CICS</strong> Client for AIX client<br />

machine must belong to the same DCE cell as the <strong>CICS</strong> for AIX server<br />

machine. If DCE CDS is not in use, see 5.2.2, “Configuration <strong>with</strong>out DCE<br />

CDS and Security Services” on page 73.<br />

For security, you can define the level of authentication used for RPCs<br />

between the <strong>CICS</strong> for AIX region and the cicsterm. <strong>The</strong> higher the<br />

authentication level used, for example, pkt_integ instead of none, the greater<br />

the impact on performance. <strong>The</strong>refore you have to balance between the<br />

security requirements and an acceptable level of performance. To protect<br />

from possible eavesdropping, you can encrypt the information flow across<br />

the connection.<br />

Each cicsterm process requires about 560 KB of real storage for its working<br />

set and about 1.4 MB of virtual storage. Using these figures you can<br />

estimate the number of cicsterm processes that a particular RISC<br />

System/6000 machine can support or you can calculate the storage<br />

requirements for a given number of cicsterm processes.<br />

• cicsteld<br />

<strong>CICS</strong> Client for AIX provides support for Telnet 3270 clients through the<br />

cicsteld process. <strong>The</strong> cicsteld process that acts as a 3270 Telnet server has<br />

to run on a machine located in the same DCE cell as the <strong>CICS</strong> for AIX server<br />

machine. <strong>The</strong> Telnet 3270 client does not use DCE and hence is not required<br />

to be in the same DCE cell as the server machine. A limitation of this<br />

method is that you cannot encrypt, nor can you protect against<br />

eavesdropping between the Telnet 3270 client and the cicsteld process.<br />

cicsteld uses less processor power than cicsterm because the keystroke<br />

handling and 3270 emulation costs are incurred by the machine running the<br />

Telnet 3270 client. You can therefore potentially run the cicsteld process in<br />

the same machine as the <strong>CICS</strong> for AIX region. However, for maximum<br />

Chapter 4. Using <strong>CICS</strong> Clients 65

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!