|
CICS/TS Internal Structure & Debug Systems
Course: CDE
Duration: 3 Days
Level: III
Course Summary
The course will provide a detailed explanation of the CICS Internal Structure and how to Debug both Application and System Dumps using IPCS. This includes dump reading workshops. Students are introduced to the "external symptoms" that may be evident when a system or transaction dump is created. CICS messages and codes, no response-waits and system recovery are discussed in detail.
« Hide The Details
Topics Covered In This Course
INTRODUCTION
- Students are introduced to the "external symptoms" that
may be evident when a system or transaction dump is created.
New CICS messages and codes, no response-waits and system
recovery are discussed in detail. Types of dumps, using
IPCS and the relevant CICS control blocks (DTAs/TXNs/SMXs/TCAs)
are outlined. Transaction Definition changes - runaway
vs ICVR, TRANCLASS vs TCLASS and CMXTLIM vs PURGETHRESH
are explained.
RECURSIVE ABENDS
- Task logical levels (PLCB's), ABEND exits and link control
blocks are discussed in the context of recursive abends.
The new layout of a dump is analyzed checking Program
Status Word (PSW), program entry and load points and short
symptom string. COBOL II compile listings are reviewed
with emphasis on condensed listings, DSA, TGT, BLW, BLL,
working storage and linkage. Methods for solving recursive
ASRA's are investigated. Program definition autoinstall
is discussed.
STORAGE VIOLATION
- Storage Manager Domain (SM) functions are reviewed. Subpools,
LSCZ,TSCZ, SAAs, STORAGE PROTECTION, Transaction Isolation,
ERDSA, RDSA, Page Allocation Maps (PAM), Storage Element
Descriptors, Free Storage Descriptors and EXECKEYs are
described. Ways in which storage may be violated are investigated.
Violations are solved and traced back to the source coding
error. Storage acquisition by CICS modules is examined.
Using the Storage Trap is discussed. New DSA management
techniques (Extents/Page Segment Tables) are investigated.
DEADLY EMBRACES.
- Resources and insuring integrity are discussed. Tasks in
the system examined. The dispatcher domain (DS) summary
is investigated and resource types and names explained.
The use of Enqueues and possible problems are investigated.
Resource management including VSAM Strings, Local Shared
Resources (LSR), Control Intervals (CIs), and Logging
is covered. Temporary Storage Domain is discussed. VSAM
RLS and the shared vs exclusive locks are examined.
TRACES
- The use of Traces and the Trace Domain (TR) are reviewed.
Activating tracing through CETR and the types of tracing,
for example Standard or Special, Component Tracing, Internal/Auxiliary
or GTF traces, are examined. The four different trace
styles are explained, i.e. Level Two Tracing is investigated
with the new VERBEXIT keyword TRS.
DOMAINS
- The Domain Architecture is discussed. The Kernel Domain
Task Summary is explained. Evidence from the summary is
tracked through to the Storage Manager Domain Summary.
The Kernel Error Data Report is investigated. The Kernel
Linkage Stack Entries are reviewed together with Kernel
Domain and subroutine calls. The transaction manager and
the dispatcher domain are examined in detail. OTE support
for JVM and DB2 is discussed. The dump domain and dump
table are discussed. Program Manager Domain, Loader Domain,
Directory Domain, Enqueue Domain, Sockets and Web Domains,
Document Domain, Temp Storage Domain and the roles played
by Application Domain and Transaction Manager are reviewed.
RECOVERY MANAGER/LOG MANAGER
- Management of tasks in a distributed environment through
UOWs and RMCs. The new commands are discussed. RRM in
the EXCI Environment and SYNCONRETURN are studied.
INITIALIZATION AND SHUTDOWN
- The Initialization process is discussed. The PLTPI is reviewed.
Types of Shut Down, including Initial, and the problems
that may be encountered are discussed.
IPCS
- Formatting SDUMPS using IPCS is discussed.
What You Can Expect
- Describe the internal structure of CICS/TS, including the
domain structure.
- Provides the student with step-by-step procedures for solving
a variety of CICSabends and failures.
- CICS/TS failure situations are explained.
- How failures are internally handled and how the user can
participate in ABENDprocessing is discussed.
- Control Blocks and internal logic for specific failures
are presented.
- Transaction dumps and system dumps are investigated.
- Dump reading skills are honed.
- Dumps and Workshops are provided.
- IPCS is also taught so that students become familiar with
this product.
- Recovery Manager, RRMS and UOW's are explained together
with DFHLOG and DFHSHUNT.
Who Should Take This Course
System Programmers and Technical Support Staff responsible
for supporting a CICS
system. CICS Application Programmers who are responsible
for reading their own CICS dumps.
Recommended Prerequisites
System Programmers and Technical Support Staff should have
at least six months CICS experience. Application Programmers
should have a minimum of nine months CICS programming
experience.
Training Style
This class is taught by lecture and hands-on workshops.
Dumps will be provided.
« Hide The Details
Related Courses
Code |
Course Title |
Duration |
Level |
|
CC1 |
CICS/TS Command Level (CC1) |
4 Days |
I |
Details |
CCWE |
CICS Web Enablement (CCWE) |
3 Days |
I |
Details |
IC |
CICS Fundamentals |
3 Days |
I |
Details |
CSA |
CICS Systems Administration |
5 Days |
II |
Details |
CAE |
CICS/TS Performance and Tuning (CAE) |
4 Days |
II |
Details |
Every student attending a Verhoef Training class will receive
a certificate good for $100 toward their next public class taken
within a year.
You can also buy "Verhoef Vouchers" to get a discounted rate for a
single student in any of our public or web-based classes.
Contact your account manager or our sales office for details.
|
|
Notify me the next time this course is confirmed!
|