SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Register your product to gain access to bonus material or receive a coupon.
The Only Up-to-the-Minute Guide to IMS Version 9--Straight from IBM IMS Experts
IMS serves more than 95 percent of Fortune 1000 companies, manages 15,000,000 gigabytes of production data, and supports more than two hundred million users per day. The brand-new IBM IMS Version 9 is not just the world's #1 platform for very large online transaction processing: it integrates with Web application server technology to enable tomorrow's most powerful Web-based applications. Now, for the first time in many years, there's a completely up-to-date guide to understanding IMS in your business environment.
An Introduction to IMS covers
Whether you've spent a career running IMS or you are encountering IMS for the first time, this book delivers the insights and skills you need to succeed--as an application designer, developer, or administrator.
Accessing IBM's Information Management System
IBM's Information Management System: Then and Now
Download Chapter 1 related to this title.
Download Chapter 3 related to this title.
History of IMS: Beginnings at NASA 3
Is IMS Still Strategic for Customers and IBM? 4
IMS Database Manager 10
IMS Transaction Manager 12
IMS System Services 13
IMS Documentation 13
Hardware and Software Requirements for IMS 13
Accessing IMS from Application Programs 17
Accessing IMS from Other Products 22
How IMS Relates to z/OS 27
Structure of IMS Subsystems 28
Running an IMS System 43
Running Multiple IMS Systems 44
How IMS Uses z/OS Services 45
Installing IMS 49
Defining an IMS System 51
IMS Startup 51
IMS Logging 54
IMS Utility Programs 54
IMS Recovery 55
IMS Shutdown 56
Functions of the IMS Database Manager 61
Implementation of IMS Databases 62
Storing Data in IMS and DB2 UDB for z/OS 64
Storing XML Data in IMS 65
IMS Hierarchical Database Basics 68
Basic Segment Types 72
Sequence Fields and Access Paths 73
Segments, Records, and Pointers 84
IMS Hierarchical Access Methods 87
Operating System Access Methods 109
IMS Checkpoints 111
Locking Data 114
How Applications Share Data 120
DBRC and Data Sharing 121
Purpose of Database Reorganization 124
When to Reorganize Databases 124
Overview of the Database Reorganization Process 128
Determining When Recovery Is Needed 151
Overview of the Database Recovery Process 152
IMS Backup and Recovery Utilities 153
IMS TM Control Region 170
IMS TM Messages 171
IMS Transaction Flow 173
IMS TM Network Overview 175
The Data Communication Control (DCCTL) Environment 189
Operating an IMS Network 190
Input Message Types 195
Terminal Types 197
Input Message Origin 197
Terminal Input Destination 197
Message Queuing 198
Message Scheduling 206
Transaction Scheduling 208
Java Programs 218
Application Program Structure 218
IMS Setup for Applications 230
IMS Application Programming Interfaces 235
IMS Application Calls 235
Accessing DB2 for z/OS Using a Resource Translation Table 237
IMS System Service Calls 237
Testing IMS Applications 239
Introduction to Database Processing 241
Processing a Single Database Record 246
COBOL and PL/I Programming Considerations 261
Processing Databases with Logical Relationships 265
Processing Databases with Secondary Indexes 267
Loading Databases 269
Using Batch Checkpoint/Restart 275
Application Program Processing 281
Transaction Manager Application Design 289
Message Format Service 298
Basic Edit Function 308
Describing an IMS Database to the IMS Java Function 312
Supported SQL Keywords 313
Developing JMP Applications 314
Developing JBP Applications 315
Enterprise COBOL Interoperability with JMP and JBP Applications 316
Accessing DB2 UDB for z/OS Databases from JMP or JBP Applications 317
Developing Java Applications That Run Outside of IMS 317
XML Storage in IMS Databases 321
Overview of the IMS System Definition Process 330
IMS System Definition Macros 335
The Extended Terminal Option (ETO) 338
What You Can Customize 348
Naming the Routines 349
Changeable Interfaces and Control Blocks 349
IMS Standard User Exit Parameter List 349
Binding the Routines 349
Saving Registers 350
IMS Callable Services 350
Considering Performance 351
Summary of IMS Exit Routines 352
History of IMS Security 361
Security Overview 361
Securing Resources 363
IMS System Checkpoints 367
Database Recovery Control Facility (DBRC) 368
IMS Log Components 368
Overview of DBRC 376
DBRC Tasks 376
DBRC Components 377
When Should You Use DBRC? 378
Communicating with DBRC 379
DBRC Functions 381
Overview of the RECON Data Sets 395
Defining and Creating the RECON Data Sets 398
Initializing the RECON Data Sets 399
Allocating the RECON Data Sets to an IMS System 400
Maintaining the RECON Data Sets 401
Reorganizing RECON Data Sets 403
Recreating the RECON Data Sets 404
Summary of Recommendations for RECON Data Sets 404
Monitoring the System 405
Processing IMS System Log Information 406
Choosing Tools for Detailed Monitoring 413
Executing Recovery-Related Functions 419
Modifying and Controlling System Resources 421
Controlling Data Sharing 428
Controlling Log Data Set Characteristics 431
Connecting and Disconnecting Subsystems 436
Overview of Extended Recovery Facility (XRF) 440
Overview of Remote Site Recovery (RSR) 440
Comparison of XRF and RSR 441
Summary of When to Use XRF or RSR 442
Database Administration Tools 443
Application Management Tools 447
Performance Management Tools 450
Recovery Management Tools 452
Information Integration Management Tools 455
Utilities Management Tools 456
TM Management Tools 461
Miscellaneous IMS Tools 463
Goals of a Sysplex Environment 468
IMS and the Sysplex Environment 469
Other Advantages of Running IMS TM in a Sysplex Environment 485
Components of an IMSplex 496
Requirements for an IMSplex 498
Operating an IMSplex 499
IBM Information Management System (IMS) is one of the world's premiere software products. Period. IMS is not in the news and is barely mentioned in today's computer science classes, but it has been and, for the foreseeable future, will continue to be, a major, crucial component of the world's software infrastructure.
From its beginnings with NASA, IMS has provided the foundation that enables government agencies and businesses to manage, access, manipulate, and exploit their vast stores of data. As the Information Age evolves and matures, so does IMS.
The purpose of this book is twofold.
Before reading this book