Addressing OLTP Solutions with CICS: The Transaction Server ... - Ibm
Addressing OLTP Solutions with CICS: The Transaction Server ... - Ibm
Addressing OLTP Solutions with CICS: The Transaction Server ... - Ibm
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
• EPI<br />
<strong>The</strong> EPI enables a non-<strong>CICS</strong> application program, running in the client<br />
machine, to access the <strong>CICS</strong> for AIX region as if it was from a 3270 terminal.<br />
As the EPI uses DCE RPC, DCE Base Services are required on the client<br />
machine. With EPI you can have up to 15 concurrent logical terminals on<br />
one client workstation. However, investment in programming the non-<strong>CICS</strong><br />
application is required to exploit the ability to serve several logical terminals<br />
from a single EPI session.<br />
With EPI, security is handled by DCE and can be controlled in the same way<br />
as for cicsterm.<br />
<strong>The</strong> EPI uses multiple threads when processing data to and from the <strong>CICS</strong><br />
for AIX region. cicsterm, however, communicates synchronously <strong>with</strong><br />
aixterm. <strong>The</strong>refore, we believe that the EPI is more efficient than cicsterm or<br />
cicsteld even after adding the overhead of a display manager such as X<br />
Windows or Motif. <strong>The</strong> EPI provides a good opportunity to add a GUI front<br />
end to existing applications. You have to consider the required<br />
programming investment against the efficiency gain when using the EPI.<br />
• cicsterm<br />
cicsterm provides 3270 emulation for AIX terminals and is probably the most<br />
straightforward way of accessing the <strong>CICS</strong> for AIX region. It runs as an AIX<br />
process, on the server machine or on the desktop client machine. Running<br />
cicsterm on the <strong>CICS</strong> for AIX server machine uses up to 40% of the server′s<br />
processing and hence greatly undermines the server′s performance.<br />
If DCE CDS is used, for successful connection the <strong>CICS</strong> Client for AIX client<br />
machine must belong to the same DCE cell as the <strong>CICS</strong> for AIX server<br />
machine. If DCE CDS is not in use, see 5.2.2, “Configuration <strong>with</strong>out DCE<br />
CDS and Security Services” on page 73.<br />
For security, you can define the level of authentication used for RPCs<br />
between the <strong>CICS</strong> for AIX region and the cicsterm. <strong>The</strong> higher the<br />
authentication level used, for example, pkt_integ instead of none, the greater<br />
the impact on performance. <strong>The</strong>refore you have to balance between the<br />
security requirements and an acceptable level of performance. To protect<br />
from possible eavesdropping, you can encrypt the information flow across<br />
the connection.<br />
Each cicsterm process requires about 560 KB of real storage for its working<br />
set and about 1.4 MB of virtual storage. Using these figures you can<br />
estimate the number of cicsterm processes that a particular RISC<br />
System/6000 machine can support or you can calculate the storage<br />
requirements for a given number of cicsterm processes.<br />
• cicsteld<br />
<strong>CICS</strong> Client for AIX provides support for Telnet 3270 clients through the<br />
cicsteld process. <strong>The</strong> cicsteld process that acts as a 3270 Telnet server has<br />
to run on a machine located in the same DCE cell as the <strong>CICS</strong> for AIX server<br />
machine. <strong>The</strong> Telnet 3270 client does not use DCE and hence is not required<br />
to be in the same DCE cell as the server machine. A limitation of this<br />
method is that you cannot encrypt, nor can you protect against<br />
eavesdropping between the Telnet 3270 client and the cicsteld process.<br />
cicsteld uses less processor power than cicsterm because the keystroke<br />
handling and 3270 emulation costs are incurred by the machine running the<br />
Telnet 3270 client. You can therefore potentially run the cicsteld process in<br />
the same machine as the <strong>CICS</strong> for AIX region. However, for maximum<br />
Chapter 4. Using <strong>CICS</strong> Clients 65