- Computers & electronics
- Computers
- Servers
- Siemens
- GENERAL INTERFACE FOR NETWORK APPLICATIONS V 4.0
- User's manual
advertisement
▼
Scroll to page 2
of 244
umschlag Druck vom 24. 01.2001 17:00.14 GINA V4.0 General Interface for Network Applications System Administrator Guide Comments Suggestions Corrections The User Documentation Department would like to know your opinion on this manual. Your feedback helps us to optimize our documentation to suit your individual needs. Fax forms for sending us your comments are included at the back of the manual. Order number of this manual: GINA V4.0 System Administrator Guide – September 2000 titel Druck vom 24. 01.2001 17:00.15 GINA V4.0 General Interface for Network Applications System Administrator Guide Edition September 2000 Copyright and Trademarks GINA is a registered trademark of Siemens Business Services GmbH & Co OHG. SINIX® Copyright © Siemens Nixdorf Informationssysteme AG 1990. SINIX is the UNIX® System derivative of Siemens Nixdorf Informationssysteme AG. Reliant® is a registered trademark of Pyramid Technology Corporation. UNIX is a registered trademark in the United States and other countries, licensed exlusively through X/Open Company Limited. Base: OSF/Motif™, Copyright © Open Software Foundation, Inc. X Window System™, Copyright © Massachusetts Institute of Technology. OSF/Motif is a registered trademark of Open Software Foundation, Inc. X Window System is a registered trademark of Massachusetts Institute of Technology. Copyright © Siemens Business Services GmbH & Co OHG 2000. All rights reserved. Delivery subject to availability; right of technical modifications reserved. All hardware and software names used are trademarks of their respective manufacturers. Introduction Changes since Version 3 Installation and deinstallation Creating GINA applications Configuring the Persistency Service Configuring T-ORB for openUTM Configuring T-ORB for BEA TUXEDO Operating GINA applications Glossary Abbreviations Continued Related publications Index verwivz.doc Druck vom 24. 01.2001 17:00.16 Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 2.1 2.2 Changes since Version 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Interface cancelations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Revisions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 5 7 3 3.1 3.2 3.2.1 3.2.2 3.2.3 3.3 3.3.1 3.3.2 3.3.3 3.3.4 3.3.5 3.4 3.4.1 3.4.2 3.4.3 3.5 Installation and deinstallation . . . Requirements . . . . . . . . . . . . Scope of supply and structure of GINA Delivery package . . . . . . . . . . . Licensing of GINA . . . . . . . . . . Directory structure . . . . . . . . . . Installation . . . . . . . . . . . . . . UNIX (Solaris, SINIX) . . . . . . . . UNIX / HP-UX . . . . . . . . . . . . Windows NT . . . . . . . . . . . . . BS2000 . . . . . . . . . . . . . . . . Environment variables . . . . . . . . Deinstallation . . . . . . . . . . . . . UNIX (Solaris, SINIX) . . . . . . . . UNIX / HP-UX . . . . . . . . . . . . Windows NT . . . . . . . . . . . . . Availability, restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 10 11 11 12 14 15 16 17 18 20 21 23 23 23 24 25 4 4.1 4.2 4.3 4.4 Creating GINA applications Application variants . . . . Environment . . . . . . . . The generators . . . . . . . Makefiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 27 28 29 30 5 5.1 Configuring the Persistency Service . . . . . . . . . . . . . . . . . . . . . . Setting up the database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 31 . . . . . . . . . GINA V4.0 System Administrator Guide – September 2000 . . . . . . . . . . . . . . . . . . . . . . . . . 5.2 5.2.1 5.2.2 5.2.3 Customizing the database layout . . The pfx file . . . . . . . . . . . . . The tbl file . . . . . . . . . . . . . . Further options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 34 35 40 6 6.1 6.2 6.2.1 6.2.2 6.2.3 6.3 6.4 6.5 6.6 6.6.1 6.6.1.1 6.6.1.2 6.6.2 6.6.2.1 6.6.2.2 6.6.3 6.6.3.1 6.6.3.2 6.6.4 6.7 6.7.1 6.7.2 6.7.2.1 6.7.2.2 6.7.2.3 6.7.3 Configuring T-ORB for openUTM . . . . . Overview . . . . . . . . . . . . . . . . . . Configuration language . . . . . . . . . . . Statements . . . . . . . . . . . . . . . . . Lexical structure . . . . . . . . . . . . . . . Syntax . . . . . . . . . . . . . . . . . . . . Revision generation . . . . . . . . . . . . . Sample configuration file . . . . . . . . . . Call and options . . . . . . . . . . . . . . . Generated files . . . . . . . . . . . . . . . Generated files for UNIX hosts . . . . . . . Development option . . . . . . . . . . . . . Runtime option . . . . . . . . . . . . . . . Generated files for WindowsNT hosts . . . Development option . . . . . . . . . . . . . Runtime option . . . . . . . . . . . . . . . Generated files for BS2000/OSD hosts . . . Development option . . . . . . . . . . . . . Runtime option . . . . . . . . . . . . . . . Example . . . . . . . . . . . . . . . . . . . Creating a configuration file using WinConfig Calling WinConfig . . . . . . . . . . . . . Elements of the graphical user interface . . Host edit window . . . . . . . . . . . . . . Application edit window . . . . . . . . . . . WinConfig menu bar . . . . . . . . . . . . Mouse key assignments and mouse actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 43 46 46 68 69 88 90 94 95 97 97 97 99 99 99 101 101 101 102 103 104 105 110 112 120 153 7 7.1 7.2 7.2.1 7.2.2 7.2.3 7.3 7.4 7.5 Configuring T-ORB for BEA TUXEDO Overview . . . . . . . . . . . . . . Configuration language . . . . . . . Statements . . . . . . . . . . . . . Lexical structure . . . . . . . . . . . Syntax . . . . . . . . . . . . . . . . Revision generation . . . . . . . . . Sample configuration file . . . . . . Call and options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 155 158 158 165 166 174 175 177 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . GINA V4.0 System Administrator Guide – September 2000 verwivz.doc Druck vom 24. 01.2001 17:00.17 7.6 7.6.1 7.6.2 7.6.3 7.7 7.7.1 7.7.2 7.7.3 7.7.4 7.7.5 Generated files . . . . . . . . . . . . . . Generated files for UNIX hosts . . . . . . Generated files for WindowsNT hosts . . Example . . . . . . . . . . . . . . . . . BEA TUXEDO domains . . . . . . . . . . Statements . . . . . . . . . . . . . . . . Syntax . . . . . . . . . . . . . . . . . . Example of a configuration file with domains Generated files . . . . . . . . . . . . . . Special points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 179 181 182 184 185 186 188 190 191 8 8.1 8.1.1 8.1.2 8.2 8.2.1 8.2.2 8.2.3 8.3 8.3.1 8.3.2 8.3.3 8.4 8.4.1 8.4.2 8.4.3 8.4.4 Operating GINA applications . . . . . . . . Communication administration . . . . . . . . Communication structure of a server application Communication structure of a client application DB administration . . . . . . . . . . . . . . . Security management . . . . . . . . . . . . Data backup . . . . . . . . . . . . . . . . . Logging database errors . . . . . . . . . . . Starting and stopping GINA applications . . . Environment variables . . . . . . . . . . . . Transaction-monitored applications . . . . . Non-transaction-monitored applications . . . Administering GINA applications . . . . . . . TP monitor . . . . . . . . . . . . . . . . . . Cyclical timer . . . . . . . . . . . . . . . . . Monitoring alarms . . . . . . . . . . . . . . Cyclical tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 193 193 193 194 194 194 195 196 196 196 196 199 199 199 200 201 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Related publications Index . . . . . . . 213 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 GINA V4.0 System Administrator Guide – September 2000 GINA V4.0 System Administrator Guide – September 2000 einleit Druck vom 24. 01.2001 17:00.18 1 Introduction GINA (General Interface for Network Applications) provides a framework for the implementation and operation of object-oriented, transaction-oriented client/server applications. The GINA-API is an object-oriented solution for the mixed, distributed applications which are encountered everywhere in modern business life. GINA is suitable for use in many types of client/server environment– for systems which place high demands on the criteria of data consistency and reliability (business-critical applications) as well as for the rightsizing of mainframe-based systems for decentralized online transaction processing (OLTP). GINA is based on standards and can adapt to individual circumstances. The object-oriented paradigm saves programming time and makes system structures clearer. Modifications and corrections are easier. GINA is a high-performance development environment for distributed and persistent objects. GINA is an open system and provides connectivity to external OLTP systems in a variety of environments such as the BS2000 or MVS environments. About this manual This manual is intended for system administrators who need to install GINA or applications used by GINA. It describes how the communications system and GINA applications are configured. This manual also deals with the operation of GINA applications in client/server environments. Developers and programmers of GINA applications may also want to refer to this manual on occasions. For more information, please contact us at the address below: Siemens Nixdorf Informationssysteme AG SBS MPM CPI Otto-Hahn-Ring 6 81739 München Fax (089) 636-48 303 E-Mail [email protected] GINA V4.0 System Administrator Guide – September 2000 1 Structure of this manual Chapter 1 describes the structure and contents of this manual as well as other documentation on GINA. Chapter 2 contains a listing of the essential changes since the last version of this manual as well as a brief description of each. Chapter 3 Installation and deinstallation describes the installation of GINA, including prerequisites. Chapter 4 Creating GINA applications describes the necessary steps in creating GINA applications. Chapters 5 ... 8 describe the configuration and administration of GINA applications: Chapter 5 Configuring the Persistency Service Chapter 6 Configuring T-ORB for openUTM Chapter 7 Configuring T-ORB for BEA TUXEDO Chapter 8 Operating GINA applications The Glossary and Abbreviations chapters explain important technical terms and abbreviations. The Related publications section contains a list of manuals and secondary literature. The table of contents and index simplify the task of finding information. Documentation on GINA GINA Introductory Guide GINA Introductory Guide 2 This manual provides a brief summary of the performance characteristics and underlying philosophy of GINA. It also presents the various components which make up GINA. It is aimed at decision-makers who want to assess the possible usefulness of GINA or users who intend to work with GINA and want to become familiar with its structure. GINA V4.0 System Administrator Guide – September 2000 einleit Druck vom 24. 01.2001 17:00.18 GINA Developer Manual GINA Developer Manual This manual is intended for developers of GINA applications. It provides a detailed description of GINA concepts and gives practical instructions and assistance for use.You should read this manual first as it describes the theory and principles on which GINA is based. Application developers should be familiar with the fundamentals of the object-oriented paradigm; knowledge of C++ is essential. GINA Reference Manual Persistency Service This is the manual for GINA application programmers. It contains formal descriptions of Persistency Service interfaces set out in alphabetical order. GINA Reference -Manual Persist. Service It also contains descriptions of the associated tools. Programmers must be familiar with object-oriented programming and must be able to program in C++. They must be familiar with the concepts of the Persistency Service and Support components which are described in the Developer Manual GINA Reference Manual T-ORB This is the manual for GINA application programmers. It contains formal descriptions of T-ORB interfaces set out in alphabetical order. GINA Reference Manual T-ORB It also contains descriptions of the associated tools. Programmers must be familiar with object-oriented programming and must be able to program in C++. They must be familiar with the concepts of the T-ORB and Support components which are described in the Developer Manual. The Related publications sections of the manuals listed above also provide references to related topics. Ordering manuals If you would like to order these manuals please contact your local Siemens office. GINA V4.0 System Administrator Guide – September 2000 3 Notational conventions used in this manual This character draws your attention to special features or points of interest; you will also find useful or secondary information there. ❍❍● Particular attention must be paid to the information indicated by this symbol. ❍❍● Terms that are explained in the text are highlighted in bold. Program code, messages, keywords or class names are indicated by typewriter text. Italic typewriter text indicates variables for parameters that you must enter. Text parts that are to be emphasized are represented by italics. [1] Numbers in square brackets refer to the Related publications section. ◊ 4 Rhombuses introduce processing statements. GINA V4.0 System Administrator Guide – September 2000 aender Druck vom 24. 01.2001 17:00.19 2 Changes since Version 3 2.1 Interface cancelations The interfaces listed in the following section were changed in Version 4.0 of GINA. This version contains the new variant. Each section indicates the GINA version as of which the relevant interface or its old variant is no longer supported. G_Exception eliminated In earlier versions, GINA used the exception handling simulation of the Generic++ class library [11] on some platforms. To facilitate this, the GINA exception classes were derived internally from the Generic class G_Exception. This derivation process has had to be eliminated because of a compiler problem. The message and name methods derived from G_Exception described in the Reference Manual are omitted from GINA Version 4.0 and later. OQL Version 3.0 of GINA sees the introduction of a new, improved interface for database queries which is a subset of ODMG-OQL. Up to this version, the new OQL existed in parallel to the old one and the user can decide the variant to be used. Access via the old OQL will be eliminated as of GINA Version 4.0. Entering special options in the mgen2 and mdiff generators As of Version 3.3, special options (e.g. noansi, nohinfo) for the mgen2 and mdiff generators can be defined in a file, i.e. you no longer need to specify them individually in the call. Instead, you reference an existing file using the -k option when you call a generator. All of the special options can be specified in this file. As of Version 3.3, special options were supported both as call options and via a special option file. As of Version 4, however, special options will only be read from a file. GINA V4.0 System Administrator Guide – September 2000 5 Interface cancelations Changing the names of the iterator methods max/min to maxValue/minValue The methods max and min in the iterator classes PMibs::MibsFilterIt, PMibs::MibsSeqIt, and VIEWITERATOR(P) were renamed maxValue and minValue respectively in Version 3.0 of GINA in order to prevent conflicts with the max and min macros defined in some environments. The old API containing the method names max and min was supported as a transitional aid. These methods are inline methods which call the methods maxValue and minValue respectively. You can suppress these methods explicitly using the GINA_WITHOUT_MINMAX compiler switch in order to prevent conflicts with macros of the same name. The method names max and min will be omitted from GINA Version 4.0 and later. mgen2: Column aliases (mnemonics for SQL) and PS-DB-API The algorithm for defining the names of the column aliases as well as the parameters for the functions in the PS-DB-API will be changed as of GINA V5.0. To avoid name clashes, underscores contained in the names of the specialist attributes will be doubled. In terms of the PS-DB-API, this change will not affect the GINA user as it is the datatype of the individual attributes that is the decisive factor there. In terms of column aliases, this change will affect all SQL queries where a search is to be performed for attributes with an underscore in their names. The underscores in the relevant attribute names must then simply be doubled. C runtime libraries under WindowsNT Version 4.0 and above will be shipped with multithreaded libraries only. 6 GINA V4.0 System Administrator Guide – September 2000 aender Druck vom 24. 01.2001 17:00.19 Revisions 2.2 Revisions Replacement of idlgen by idlgen1 The idlgen1 generates two definitions from an interface definition (x.idl) specified in CORBA-IDL (Revision 2.2): x.hi which defines the data members to be encoded and decoded and x.hd which defines the methods to be exported. The interim format x.hi serves as input for the MIO generator miogen2. The interim format x.hd serves as input for the T-ORB generator dogen2. GINA V4.0 System Administrator Guide – September 2000 7 Revisions 8 GINA V4.0 System Administrator Guide – September 2000 install Druck vom 24. 01.2001 17:00.19 3 Installation and deinstallation This chapter describes how to install and deinstall GINA. Some of the technical information given here is for the purposes of example only, e.g. it may vary partially depending on the details of the operating system. The current version of GINA can run under: – – – – UNIX-SVR4 BS2000/OSD (under special release) WindowsNT Windows95/98 Further information on your respective system base can be found in the Release Notice supplied with GINA. Please read this Release Notice carefully. ❍❍● GINA V4.0 System Administrator Guide – September 2000 9 Requirements 3.1 Requirements The following third-party products are required to implement the GINA components. Please note that the products listed may be based on other products, which must then likewise be installed. Up-to-date information on the products required can be found in the Release Notice included in the delivery. ❍❍● ● Generic++ V2.5 [11] GINA requires the class library Generic++ V2.5, which is contained in the GINA scope of supply and is installed under the name libsupport2. ● openUTM V5.0 and openUTM-Client V5.0 For communication and transaction monitoring, the T-ORB server uses the TP monitor UTM. GINA Version 4.0 requires UTM Version openUTM (UNIX, NT, BS2000/OSD) V5.0 or later [29]. To connect non-transaction-monitored applications (T-ORB client) to a transactionmonitored server, the CPIC interface is used. This requires the product openUTM-Client (UNIX, NT) V5.0A or later [36]. The software component UTM-D is also required when using GINA with BS2000. ● INFORMIX Dynamic Server 2000 (IDS.2000) V9.2 The Persistency Service in GINA V3.3 uses INFORMIX as the data storage system. INFORMIX Dynamic Server 2000 [19] (UNIX & NT) and Client SDK 2.40 (UNIX and NT) are required. The XA interface [5] is required for the integrated use of T-ORB and the Persistency Service. This interface is only integrated under UNIX in V9.2. Detailed information on coupling T-ORB and the Persistency Service under WindowsNT can be found in chapter 6, Compiling and linking, of the Developer Manual [13]. 10 GINA V4.0 System Administrator Guide – September 2000 install Druck vom 24. 01.2001 17:00.20 Scope of supply and structure of GINA 3.2 Scope of supply and structure of GINA This section describes the delivery packages and the general delivery structure of GINA Version 4.0. 3.2.1 Delivery package GINA V4.0 is supplied as a full-feature version (UNIX, NT) and as a partial version (WindowsNT only). The full-feature version contains the following GINA components: ● Persistency Service development, runtime system and PS browser The development system of the Persistency Service comprises the generators mgen1, mgen2, mgendb, mspgen2 and mdiff, the runtime system comprises the libraries of the Persistency Service and the Persistency Service/client. The PS browser comprises the components bruno and cuno. ● T-ORB development and runtime system The development system of T-ORB comprises the generators config, miogen1, miogen2, dogen1, dogen2 and idlgen, the runtime system comprises the libraries of T-ORB and T-ORB/client. ● Support runtime system The runtime system of the Support component comprises two libraries, one of which contains support functions for T-ORB and the Persistency Service and the other of which makes available the valid Generic++ class library. The partial version under WindowsNT contains only the runtime environment (RT version) for a T-ORB client. It is also prepared for use under Windows95 and Windows98. More detailed information can be found in the Release Notice included with the relevant version of GINA. The delivery medium is a CD. GINA V4.0 System Administrator Guide – September 2000 11 Scope of supply and structure of GINA 3.2.2 Licensing of GINA The tool FLEXlm from the company GLOBEtrotter is used to license GINA. Both the generators and the GINA runtime system are protected by licenses. Before GINA can be used, the GINA Competence Center must generate the licenses for the machine you require (processor ID) and convey them to you. If you require an evaluation license, refer to the Release Notice for a template which you must return completed to the GINA Competence Center. Installing licenses Store the license entries received from the Competence Center in the file GinaLicense.dat. This file is a text file. All machines where GINA is installed must be able to access this file. The environment variable LM_LICENSE_FILE must be set on each of these machines. This variable contains the path and the name of the license file. Example (UNIX, csh) setenv LM_LICENSE_FILE /home/usr/license/Ginalicense.dat If the file already exists on your machine, insert in file license.dat the lines of relevance to GINA. You can also specify several license files: Example (UNIX, csh) setenv LM_LICENSE_FILE /home0/GinaLicense.dat:/home1/GinaLicense.dat 12 GINA V4.0 System Administrator Guide – September 2000 install Druck vom 24. 01.2001 17:00.20 Scope of supply and structure of GINA Structure of the license file The license file has the following structure: Keyword License DaemonVersion Valid N License code Processor ID Licensename Example FEATURE GinaDEV ginad 1.000 1-jan-0 0 C2348347 2387823 "Gina license" Keyword Keyword for FLEXlm License Type of license used (GinaDEV, GinaRTS, TorbDEV, TorbRTS, PsDEV, PsRTS, TorbClient, PsClient) Daemon Name of the license daemon Version Version number Valid Date until which the license is valid N Number of licenses (0 = unrestricted license) License code 20-digit license code Processor ID Processor ID which is assigned to the license code License name Name of the license GINA V4.0 System Administrator Guide – September 2000 13 Scope of supply and structure of GINA 3.2.3 Directory structure bin doc Generators of the PS development system Generators of the T-ORB development system text psbrowser Release notice Online documentation of the PS browser doms mibs psc include support support2 trace usr java directory for the PS browser lib Libraries of the PSund PS /client runtime system and PS browser Libraries of the T-ORB runtime system Libraries of the Support runtime system template comment scr Note comment is a directory containing code templates used by the generators dogen2 and idlgen1. src contains code templates for the user outputs of the T-ORB The illustration shows the GINA default directory structure. The actual structure may differ from that shown above. You should therefore study the Release Notice, which can also be found under the file name readme.Version in the doc directory. ❍❍● 14 GINA V4.0 System Administrator Guide – September 2000 install Druck vom 24. 01.2001 17:00.21 Installation 3.3 Installation The installation procedures depend on the system base. The variants described here are examples only. You must always perform installation and deinstallation in accordance with the description of your system base or the information in the Release Notice. ❍❍● GINA is shipped as a package which is created using a system-specific packet assembly procedure (package under UNIX, setup under NT). The full-feature version of GINA V4.0 under UNIX is divided up into subpackages so that you do not have to install the entire product folder. The functional scope of a full-feature version can only be achieved by installing all of the subpackages. The names and contents of the subpackages as well as the order in which they must be installed can be found in the Release Notice. Depending on the selected variant, GINA builds on standard products (openUTM, INFORMIX). These must be installed using their own installation procedures and are not described here. If the GINA package is stored on the delivery CD as a file in compressed format, it must be copied to an intermediate directory and unpacked prior to installation (refer to the description for the relevant platform). The following actions, for example, must be carried out to install GINA itself on the platforms listed below. GINA V4.0 System Administrator Guide – September 2000 15 Installation 3.3.1 UNIX (Solaris, SINIX) Start the installation under UNIX using the command pkgadd. The installation directory in which GINA is to be installed may not exist before the pkgadd command is called. ❍❍● 1. Log in as root. 2. Set up a new user group tmns. 3. Set up a new user gina. 4. Create a new directory e.g. /opt/gina for GINA: mkdir -p /opt/gina chmod 775 /opt/gina chown gina:tmns /opt/gina 5a. Insert the GINA delivery CD in the CD drive and install the uncompressed GINA package using the following command: pkgadd -d <CD drive directory>/<gina package file name> You are then prompted to do the following: ◊ Select the GINA subpackage to be installed. ◊ Specify the directory in which GINA is to be installed, e.g. /opt/gina/GINA ◊ Define users for this and the directories below: e.g. gina as userid (default: root) e.g. tmns as groupid (default: root) ◊ Specify the source directory from which GINA is installed. <CD drive directory> The GINA package is then installed under /opt/gina/GINA, the directory structure created and the structure filled with the files. 16 GINA V4.0 System Administrator Guide – September 2000 install Druck vom 24. 01.2001 17:00.21 Installation 5b. The following steps are required if the GINA package is stored on the delivery CD in compressed format: ◊ Copy the GINA package from the CD to an intermediate directory cp <CD drive directory>/<gina package file name>.gz <intermediate directory name> ◊ Unpack the file in the intermediate directory using gunzip. ◊ Install the unpacked GINA package pkgadd -d <intermediate directory name>/<gina package file name> You are then prompted to do the following: ◊ Select the GINA package to be installed. ◊ Specify the directory in which GINA is to be installed, e.g. /opt/gina/GINA ◊ Define users for this and the directories below: e.g. gina as userid (default: root) e.g. tmns as groupid (default: root) ◊ Specify the source directory from which GINA is installed. <intermediate directory name>/<gina package file name> The GINA package is then installed under /opt/gina/GINA, the directory structure created and the structure filled with the files. 3.3.2 UNIX / HP-UX See UNIX (Solaris, SINIX) on page 16 for steps 1 through 4. 5. Insert the GINA delivery CD into the CD drive and install the uncompressed GINA package using the following command: swinstall The swinstall command opens a menu interface via which the aforementioned information is queried. The GINA package is then installed, the directory structure created and the structure filled with the files. GINA V4.0 System Administrator Guide – September 2000 17 Installation 3.3.3 Windows NT Installation of the full-feature or partial version (RT version) under Windows NT is performed using the setup command, the installation tool is included in the GINA package on the delivery CD. 1. Log in as administrator. 2. Create a new directory for GINA. 3. Insert the GINA delivery CD in the CD drive and start the graphical installation interface using the command <drive>:\setup The dialog box which is displayed queries the path of the installation directory and the components to be installed. The GINA package is then installed, the directory structure created and the structure filled with the files. If, during installation, you selected GINA packages containing the services DomsEventHandler and DomsDynConnectHandler, they will be automatically activated the next time the system starts (under WindowsNT only). Further information on this can be found in the Developer Manual [13] in the section entitled Compiling and linking, Special features under Windows NT. ❍❍● If you intend to run GINA on a machine without a network link, you must set the LM_NO_NETWORK environment variable in order to avoid the wait times resulting from futile attempts to access a license server. ❍❍● Special points in relation to the operation of the GINA PS browser Before the GINA PS browser is called (on UNIX platforms), the directory in which the GINA phases were installed must be included in the PATH environment variable. Example for csh sentenev PATH <gina_install_dir>/:$PATH Furthermore, the environment variable LD_LIBRARY_PATH (for Solaris, SINIX) or SHLIB_PATH (for HP-UX) must contain the file in which the GINA library is located. 18 GINA V4.0 System Administrator Guide – September 2000 install Druck vom 24. 01.2001 17:00.22 Installation Example for csh – Solaris, SINIX setenv LD_LIBRARY_PATH <gina_install_dir>/lib:$LD_LIBRARY_PATH – HP-UX setenv SHLIB_PATH <gina_install_dir>/lib:$LD_LIBRARY_PATH On Windows NT all information necessary to the operation of the PS browser is entered during installation by the setup routine. That is, the environment variable GINADIR points to the file <gina_install_dir>, <%GINADIR%\bin> is added to the PATH variable. The PS browser is started using the Start > Programs menu. ❍❍● Removing TPStartShut.o If a T-ORB application which is to run on a WindowsNT machine uses custom startup and shutdown exits, the dummy implementation of TPStartShut.o shipped with GINA must be removed from the libraries .../lib/doms.lib and .../lib/domsmt.lib before this application is linked. The two scripts extpss.bat and extpssmt.bat are made available for this. extpss.bat removes the object TPStartShut.o from the library .../lib/doms.lib and stores it in the library .../lib/domstpss.lib. extpssmt.bat removes the object TPStartShut.o from the library .../lib/domsmt.lib and stores it in the library .../lib/domstpssmt.lib. The scripts must be executed in the lib directory of the GINA installation directory. One prerequisite is that the %MSVCBIN% variable must be set. It must point to the bin directory of the Microsoft Developer Studio. Once TPStartShut.o has been removed, the library domstpss.lib or domstpssmt.lib must be specified when linking T-ORB applications which do not use custom startup or shutdown exits. Further information on special points to be noted when creating a GINA application under NT can be found in the section entitled Compiling and linking, Special features under Windows NT in the Developer Manual [13]. ❍❍● GINA V4.0 System Administrator Guide – September 2000 19 Installation 3.3.4 BS2000 The following steps are required when installing under BS2000: 1. Log in to BS2000/OSD under the name $GINA 2. Read in the tape using ARCHIVE, IMPORT ..., DEVICE=TAPE-C4 The following DVS files are created under the $GINA account: GINA.PAX pax archive containing the POSIX files of the transfer LIBxxx libraries of the GINA runtime system in PLAM format 3. Copy GINA.PAX as a POSIX file and unpack it within a POSIX shell: /START-POSIX-SHELL $ cd <gina_install_dir> $ bs2cp ’bs2:gina.pax’ gina.pax $ pax -r -f gina.pax A directory GINA which contains the subdirectories and files described above is created in <gina_install_dir>. For further information please see the Release Notice. The compiler C/C++ V3.0B requires the CRTE 2.1 runtime system. Refer to the Release Notice for the C/C++ compiler V3.0A for information on dependencies with other BS2000 system components. The GINA T-ORB component requires the XDR functionality from the POSIX-NSL 010 software unit. This has been available as a special release since the end of May 1998. ❍ ❍ ● 20 GINA V4.0 System Administrator Guide – September 2000 install Druck vom 24. 01.2001 17:00.22 Installation 3.3.5 Environment variables Certain environment variables must be set when implementing the various components of GINA. Depending on the components implemented, these variables are: Using the T-ORB on basis of openUTM UTMPATH This environment variable contains the path of the installed openUTM environment. UPICPATH This environment variable contains the name of the directory with the upicfile file. upicfile is created using the configuration generator config (see chapter 6 on page 43). This variable need only be set if you are starting a client application in a directory other than that containing the upicfile file. GINACONFIG This variable is used to select a directory other than the actual directory for the servernames file generated by config for the execution of a client application. Using the T-ORB on basis of BEA TUXEDO TUXDIR This environment variable contains the path to the BEA TUXEDO installation directory. TUXCONFIG This environment variable contains the name of the TUXCONFIG configuration file.The absolute path name must be specified here. This file is created using the crbincf script generated by the config-tux configuration generator. BDMCONFIG This environment variable contains the name of the BDMCONFIG configuration file. The absolute path name must be specified here. This file is created using the crbincf script. This variable need only be set if you are using the Domains component from BEA TUXEDO. GINACONFIG This variable is used to select a directory other than the actual directory for the servernames file generated by config-tux for the execution of a client application. GINA V4.0 System Administrator Guide – September 2000 21 Installation Implementation of the Persistency Service INFORMIXDIR This environment variable contains the name of the directory for the installed INFORMIX environment. The environment variable PATH must contain an $INFORMIXDIR/bin entry. INFORMIXSERVER This environment variable identifies the current instance of the database server processed by the application database. Following installation, you should inform the users of the correct values for the variables UTMPATH, INFORMIXDIR and INFORMIXSERVER, or configure their environment accordingly. When using NLS/GLS functionality, the following variables must also be set: DB_LOCALE If this environment variable is set, then the new databases will be generated on the database server using the locale specified by the variable DB_LOCALE instead of the standard locale. CLIENT_LOCALE This environment variable is needed for the database client and the database server. It must also be set before an application that works with an NLS/ GLS-capable database is started. No further actions are required for BS2000/OSD. Refer to the section Compiling and linking in the Developer Manual [13] for information on special points to note when configuring the environment under Windows NT. ❍❍● 22 GINA V4.0 System Administrator Guide – September 2000 install Druck vom 24. 01.2001 17:00.23 Deinstallation 3.4 Deinstallation The installation procedures used depend on the system base; the variants described below are examples only. Installation and deinstallation should, therfore, always be carried out as described for your system base or in accordance with the information contained in the Release Notice. ❍ ❍ ● System-specific commands are used to deinstall GINA. 3.4.1 UNIX (Solaris, SINIX) 1. Log in as root. 2. Switch to the GINA directory: cd /opt/gina/GINA 3. Delete all GINA subdirectories and files using the system command: pkgrm gina 4. Delete the GINA root directory: cd / rmdir /opt/gina/GINA 5. Remove the gina user set up at installation. 6. Remove the tmns user group set up at installation. 3.4.2 UNIX / HP-UX Deinstallation of GINA under HP-UX is performed using the swremove command. The swremove command opens a menu interface via which the information required for deinstallation is queried. The GINA package is then deinstalled, and the subdirectories and files are deleted. GINA V4.0 System Administrator Guide – September 2000 23 Deinstallation 3.4.3 Windows NT Deinstallation of GINA under Windows NT, Windows95 and Windows98 is performed by selecting the Software icon (Start > Settings > System Controls). Then select GINA, and start the graphical deinstallation interface. The necessary information is queried in the dialog box. The GINA package is then deinstalled, and the subdirectories and files are deleted. 24 GINA V4.0 System Administrator Guide – September 2000 install Druck vom 24. 01.2001 17:00.23 Availability, restrictions 3.5 Availability, restrictions This section provides information on platform-related restrictions, the availability of the GINA components as well as libraries which are missing. UNIX with CFront compilers The GINA component PS/client is not available on UNIX systems with CFront compilers (e.g. HP-UX). WindowsNT ● The configuration generator for T-ORB with the graphical interface (WinConfig) is not available. ● INFORMIX V9.2 does not contain an implementation of the XA interface. For that reason, GINA offers a simulation. This means that INFORMIX cannot currently be used to its full potential with openUTM and BEA TUXEDO. For further information please see the enclosed Release Notice. Further information on this can be found in the Developer Manual [13] in the section entitled Compiling and linking, Special features under Windows NT. Windows95/98 ● Only the GINA runtime system for T-ORB/client applications (type 4) is available on Windows95/98. This means that a T-ORB/client application can only be run on Windows95. The application must be created in full on WindowsNT, i.e. execution of the GINA generators, compilation, linking, and creation of the configuration. ● Installing GINA An RT version for WindowsNT must be used for the GINA installation under Windows95/98. ● C runtime system DLLs required (multithreaded) msvcrt.dll msvcirt.dll GINA V4.0 System Administrator Guide – September 2000 25 Availability, restrictions ● Configuration file The configuration file (the file that reads the config) must contain the line OPERATING_SYSTEM("OS_WINNT") for both WindowsNT and Windows95. ● Environment variable The COMPUTERNAME environment variable is automatically set on WindowsNT, it must be set by the user on Windows95. BS2000/OSD The PS/client (client part) as well as the direct database system connection are not available in the runtime system of T-ORB/client under BS2000/OSD. The mgendb, WinConfig, mspgen2 and idlgen1 as well as the PS browser (bruno and cuno) generators of the development system are not supplied. 26 GINA V4.0 System Administrator Guide – September 2000 inbtrieb Druck vom 24. 01.2001 17:00.23 4 Creating GINA applications GINA applications comprise a range of modules which must be linked as a program before execution time, at the latest. Since GINA represents a framework which offers different functionality in different variants, special activities must be carried out to create an application, depending on its specific type. Further details are provided in the following sections. 4.1 Application variants The modular structure of GINA results in the following application types: Type 1 Transaction-monitored communication with integrated local data store This corresponds to using the full functionality of GINA. Both T-ORB and the Persistency Service are used; object-oriented transactions are supported. Type 2 Transaction-monitored local data store This corresponds to using the Persistency Service for applications which do not require transaction-monitored communication in the network and which do not use T-ORB. Transaction-monitored local data storage means that the transaction system of the database is used. Type 3 Transaction-monitored communication This corresponds to using T-ORB for applications which do not require transactionmonitored data storage or which do not implement the Persistency Service. Important fields of application for this type involve pure message queuing or connectivity to mainframe applications. Type 4 Linking applications of types 1 and 3 without transaction monitoring These are client applications which establish the connection between the user and GINA server applications, e.g. via a GUI. Type 5 Persistency Service/client applications In addition to T-ORB/client, these non-transaction monitored applications also use the Persistency Service in the form of the Persistency Service/client. GINA V4.0 System Administrator Guide – September 2000 27 Environment Type 6 GINA applications associated with a Persistency Service/client application These use T-ORB and the Persistency Service of GINA jointly. Type 7 Dynamic client without a PS/client component Type 8 Dynamic Persistency Service/client applications Application of the type 5 as a dynamic client with a PS/client component. Depending on the type of your application, you may have to specify different libraries when linking. 4.2 Environment If your system administrator has not already done so, you must at least set the environment variables INFORMIXDIR and UTMPATH. Please refer to section 3.3.5 on page 21. You must also know the directory in which GINA has been installed on your system. It is also advisable to read through the Release Notice, as this may also contain information on creating GINA applications. The Release Notice can be found in the subdirectory doc of the GINA directory (see section 3.2.3 on page 14). 28 GINA V4.0 System Administrator Guide – September 2000 inbtrieb Druck vom 24. 01.2001 17:00.24 The generators 4.3 The generators The generators of GINA can be found in the bin directory of the GINA installation (see section 3.2 on page 11). These are listed below: ● ● The generator of the Persistency Service mgen1 for analyzing C++ header files mgen2 for generating the database schema and access methods mgendb for creating the database mdiff replaces mgen2 in the context of schema evolution The T-ORB generator config for configuring T-ORB with the WinConfig graphical user interface for creating config input files. WinConfig is only available on UNIX platforms. ● ● ● ❍❍● The T-ORB generator dogen1 for analyzing C++ header files dogen2 for creating global interface, stub, and export interface classes The MIO generator miogen1 for analyzing C++ header files miogen2 for creating encryption and decryption methods The IDL compiler idlgen for creating global interface, stub and export interface classes, as well as creating encryption and decryption methods. The generators of the Persistency Service are described in the Developer Manual [13] and the Reference Manuals [14]. A description of the configuration options can be found in chapter 5 on page 31 of the present manual. The T-ORB generator config is described in chapter 6 on page 43. GINA V4.0 System Administrator Guide – September 2000 29 Makefiles 4.4 Makefiles Software development for larger systems, in particular, is much easier to handle with the UNIX program make. The Developer Manual [13] contains a detailed example of a possible makefile configuration. 30 GINA V4.0 System Administrator Guide – September 2000 per-konf Druck vom 24. 01.2001 17:00.24 5 Configuring the Persistency Service When examining the configuration of the Persistency Service, it is generally a good idea to consult the documentation relating to the underlying database management system. All explanations in this chapter relate to the database management system INFORMIX on the UNIX platform. The environment can be different for other database management systems or on other operating systems. 5.1 Setting up the database The database is set up in several stages. First of all the system software of the database management system used must be installed as prescribed by the manufacturer [19]. In addition, IDs must be created for the administration of the database system. In this context, it is also important to consider the definition of roles (IDs) in the area of administration and security. Both the database server environment, for example INFORMIX Dynamic Server 2000, and that of the development environment, for example ESQL (in the client SDK), must be installed. In the next phase, the resources assigned to the database system must be configured. This particularly includes system resources such as – the number of needed semaphores, – size and number of shared memory segments, – configuration of disk memory (raw devices, RAID controller), and the – definition of connections (connectivity) to the database server. When using the INFORMIX database system, for example, the entries in the files /etc/hosts and /etc/services must match those in the sqlhosts file. In general, these global activities must be performed under the root administrator ID. The next step is for the database administrator to structure the assigned disk resources (dividing into chunks), applying a structure (dbspaces, blobspaces) which can be used in the definition of the database schema and in the backup and recovery concept. The aim of this activity is to achieve an optimum solution under the aspects of fault tolerance, performance and availability. These activities are supported by appropriate tools, which are supplied with the database system. For example, here INFORMIX offers the onmode tool. GINA V4.0 System Administrator Guide – September 2000 31 Setting up the database To enable these aims to be achieved, knowledge is required on datasets and their dynamics (static, low frequency of change, high rate of change), as well as the access behavior to the data (navigating, value-based). This information is supplied to the Persistency Service generator as customizing[14] input in an optimization process. From this input, the Persistency Service generator produces the optimized definition of the database schema (table layout, indexing, constraints) and the access functions to database tables (see section 5.2 on page 33). A further task of the database administrator is to configure the database server. Here, the parameters for the operation of the database are defined in the appropriate configuration files and runtime procedures (specific to the selected database system). These parameters include maximum values such as – the number of transactions permitted in parallel – the wait time for a response from a remote database server – name spaces for the current session like DBSERVERNAME or SERVERNUM – parameters that affect the execution of the session, e. g. the time interval between two checkpoints. If the database and transaction monitor are linked via the XA interface, the information required by the participating systems must be configured in appropriate generation and start procedures. The initialization of the database is particularly important. This includes the initialization of tables from a file which contains the data in ASCII notation, or the transfer of binaryencoded data as an excerpt from a secondary database of the same type. Migration tools which are specific to the database system are available for transferring data from existing databases or files. 32 GINA V4.0 System Administrator Guide – September 2000 per-konf Druck vom 24. 01.2001 17:00.24 Customizing the database layout 5.2 Customizing the database layout GINA offers you the option of customizing the database layout and the access privileges. One aspect of this relates to the assignment of names of database tables for persistent classes, whereby the default is that the class names of the specialist models are also used to designate the database tables. However, this may cause problems if the maximum permitted length for identifiers is subject to specific restrictions. For example, table names are limited to 18 characters in the INFORMIX version used. Since GINA itself requires a character as a prefix, class names that are longer than 17 characters must be mapped to a shorter table name. ❍❍● Another aspect is the definition of the actual storage space for tables in the physical database structures, i.e. the dbspaces. Performance requirements can be considered here, and the optimization functions of the database system can be used. In terms of access privileges, requirements with regard to access protection are defined at database or table level. The functionality also depends on the concrete database server. The specifications for this customization are defined in description files. These are made known to the mgen2 generator using the -r and -t options [14]. The generator then creates an appropriately modified database schema. The following description files exist: – – the pfx file and the tbl file GINA V4.0 System Administrator Guide – September 2000 33 Customizing the database layout 5.2.1 The pfx file The description file that is called using the -r option, the so-called pfx file, handles the specification of class-wide attribute names. The attribute names used for the mapping to the database consist of the following components: classPrefix_attributCounter_extension classPrefix is the part of the field name that is common to all fields in a class. Neither does inheritance change it, i.e. it has the same value in the subclass as in the superclass. It can be specified by the user with the help of the description file specified below. When using identical views, this prefix is used to generate the attribute names of both the table and also the view belonging to the class. attributCounter and extension are always created by mgen2. Layout of the description file The description file consists of formatted lines with the following line format. classname prefix Classname represents a valid C++ identifier. prefix represents a valid SQL identifier. The prefix entries must differ for all classes and can be a maximum of 6 characters in length. Please note that all entries in the description file are case-sensitive. If no prefix is found for a specific class, it is automatically generated by the mgen2 generator. The created prefixes have the following format: Xdddd or Xddddd with d=0,1,2,..,9 The generation starts at Xdddd=X1024 or Xmmmm, where mmmm represents the highest value for dddd+1 found in the description file. That means that if X10200 was found in the description file, the generation starts at X10201. Once prefixes have been specified by the mgen2 for all classes, both those found in the description file and the newly generated prefixes are output to the specified description file. The old version of the pfx file is first backed up to a file with the extension .bak. An empty or non-existent description file can be specified for use in the creation of the first description file. 34 GINA V4.0 System Administrator Guide – September 2000 per-konf Druck vom 24. 01.2001 17:00.25 Customizing the database layout 5.2.2 The tbl file The description file that is called using the -t option, the so-called tbl file, contains the customizing functions: – – – – – name mapping of database tables and definition of the concrete storage space required by tables (section 1 on page 35), fragmentation of a database table (section 2 on page 37), name mapping of views (section 3 on page 37), versioning of the database (section 4 on page 38) and access privileges for tables and views (section 5 on page 38). The specification of this file, and of all entries in it, is optional. The structure of the tbl files follows the general structure of the intermediate format files (see the chapter entitled Tools in the Reference Manuals [14]). The following line types are supported: # for identifying a comment line #| comment text t for identifying a definition line for the mapping of database table names or for defining the concrete storage space required by tables fr for identifying a definition line for fragmenting a database table v for identifying the version control s for identifying a definition line for access privileges vw for identifying a definition line for the mapping of database view names The meaning of the individual lines as well as the necessary columns are now described for each customizing function. 1. Name mapping of database tables and definition of the concrete storage space required by tables A table line contains the following fields: t | ident | name | resource | firstExtent | nextExtent | Only one definition line of this type is permitted per class. Note that all “|” separators must be set. ident Name of the class in the specialist model. Mandatory entry GINA V4.0 System Administrator Guide – September 2000 35 Customizing the database layout name Name of the table to which the specialist model classes are to be mapped. The default value is the class name. Optional entry resource Entry to identify a dbspace in which the tables are to be stored. Such a dbspace is a storage area which is based on the physical storage media. Additional storage instructions are entered using the “fr definition lines” and result in the fragmentation of the table. Assigning tables to storage structures allows for the implementation of optimization strategies for backing up data and for access functions. The default value for storing a table is the dbspace in which the database is generated (-d dbspace option for the mgendb generator [14]). Optional entry firstExtent Entry for defining settings for the size of physically related storage areas, which are reserved with the first entry in the table. Like resource, this function serves to optimize the storage layout and enables it to be adapted to the volume of data involved. The minimum, maximum and default values depend on the database system and on the layout of the storage media. They are specified as integer multiples of pages (generally 2 Kb). Optional entry nextExtent Optional entry for defining settings for the size of physically related storage areas, which are reserved with each extension to a table. As with the firstExtent entry, this function serves to optimize the storage layout. Example t | myClassname1 | myNewTableName1 | dbspaceName | 4 | 4 | t | myClassname2 | myNewTableName2 | | | | 36 GINA V4.0 System Administrator Guide – September 2000 per-konf Druck vom 24. 01.2001 17:00.25 Customizing the database layout 2. Fragmentation of a database table A fragmentation line contains the following fields: fr | ident | resource | A number of definition lines of this type are permitted per class, at least two resources must be defined for the purpose of fragmenting. Note that a partitioning of storage space which is taken into account during the fragmentation can also be specified in the t definition line. ident Name of the class in the specialist model. Mandatory entry resource Entry to identify a dbspace in which the tables are to be stored. Such a dbspace is a storage area which is based on the physical storage media. The dbspace must exist and can only be assigned once per table. Optimization strategies for access functions can be realized through the fragmentation of tables across several storage structures. Mandatory entry Example fr| myClassname1 | Dbspace_1| fr| myClassname1 | Dbspace_2| 3. Name mapping of database views A view line contains the following entries: vw | ident | name Only one definition line of this type is permitted per class. ident Name of the class in the specialist model Mandatory entry name Name of the view to which the class of the specialist model is to be mapped. Example vw | myClassname | myNewViewName| GINA V4.0 System Administrator Guide – September 2000 37 Customizing the database layout 4. Versioning of the database A version line contains the following entries: v | indent| Only one version line is permitted per database. ident Version of the database schema (string with a maximum of 30 characters) Mandatory entry Example v | 1.0 | 5. Access privileges for tables and identical views A privilege line contains the following entries: s | ident | name | resource | A number of definition lines of this type are permitted per class. ident Name of the class in the specialist model Mandatory entry name Name of the user that is assigned the privilege defined in the resource column Mandatory entry resource Mandatory entry in a definition line for privileges. It names the privilege assigned to the user. Value range: INSERT allows you to make an object persistent. DELETE allows you to delete a persistent object. UPDATE allows you to modify a persistent object. SELECT allows you to instance a persistent object. Only privileges are permitted at table and view level and only those that do not change the schema (ALTER TABLE, CREATE TABLE). If the ident class is a view class, only the privilege SELECT is permitted. Only the CONNECT TO PUBLIC privilege is generated at database level. 38 GINA V4.0 System Administrator Guide – September 2000 per-konf Druck vom 24. 01.2001 17:00.26 Customizing the database layout Example s | myClassname | hubert | INSERT | If a user is assigned the DELETE privilege, he/she also needs the SELECT privilege for the purpose of internal consistency checks. ❍❍● GINA V4.0 System Administrator Guide – September 2000 39 Customizing the database layout 5.2.3 Further options The mgendb tool can also be used to influence the configuration of the database. In addition to specifications concerning the default database user and NLS/GLS specifications, the -d option can be used to determine a dbspace in which the database tables to be created are to be set up. The mgendb supports the following options: -d dbspace The named dbspace of the database instance is used as the default storage area of the database to be generated. If this option is not set, the database is generated in the root dbspace of the instance. See also [19]. Example mgendb ... -d gina ... -l ltype Specifying this option generates the database in such a way that it is NLS-/GLS-compatible (native language support/global language support), assuming the database server supports this functionality. The concrete language variant (locale) is specified by ltype. The syntax of ltype depends on the current database server and the operating system used. It is described in the database reference manual or the NLS documentation of the operating system. If the -l option is not set, the database is generated without NLS/GLS. The following environment variables are set in the mgendb for an NLS-/GLS-compatible database: CLIENT_LOCALE=ltype DB_LOCALE=ltype The DB_LOCALE environment variable is needed for the database server. If this variable is set, then the new databases will be generated using the locale specified by the variable DB_LOCALE instead of the standard locale. The CLIENT_LOCALE environment variable is needed for the database client and the database server. It must also be set before an application that works with an NLS-/GLScapable database is started. Example for INFORMIX V9.2 for creating a database with the German character set: 40 on SunOS mgendb -l de_de.8859-1 myDB (LANG=de) on SINIX mgendb -l de_de.8859-1 myDB (LANG="De_DE.88591@TE") on HP-UX mgendb -l de_de.8859-1 myDB (LANG=de_DE.iso88591) GINA V4.0 System Administrator Guide – September 2000 per-konf Druck vom 24. 01.2001 17:00.26 Customizing the database layout Note ltype must be a valid locale on the database server platform. If mgendb is called in another operating system environment, errors can occur since ltype is not recognized as a valid locale identifier. Therefore mgendb should be called on the same platform as the one on which the database server is running. -u userName A default database user can be entered if this option is specified. The default DB user is identified by userName and must be a valid UNIX user. If a default user is specified, no public user has access to the database. If no default user is specified, all users have access to the database. Example mgendb ... -u ginauser ... GINA V4.0 System Administrator Guide – September 2000 41 Customizing the database layout 42 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.26 6 Configuring T-ORB for openUTM This chapter describes how to configure communication between GINA applications. The configuration does not require any modifications to the source program. However, it cannot take place while the application is running; rather it must be performed before the application starts. The configuration of T-ORB is based on the configuration of openUTM [29] and openUTMClient [31]. Knowledge of the respective manuals will therefore aid comprehension. These manuals are listed under Related publications at the back of this manual. 6.1 Overview To operate a distributed system on the basis of GINA, certain information must be known on the desired system structure, the current parameter settings of the host, and the characteristics of the GINA applications. The configuration tool described here records this information in the form of a general system description, from which it generates the data required by GINA. The information you must enter can be divided into the following parts (see Figure 1 on page 44): – specifications on system-wide settings, such as the participating systems – specifications on host-specific parameters, such as operating system resources – specifications on application-specific parameters, such as the number of work processes – specifications on the connections between applications Practically speaking, some of the parameters can be specified in more than one of these areas. In such cases, the values set higher up in the hierarchy must be taken as default settings. These values are then overwritten by the settings in more specific areas. The desired settings can thus be specified separately for each application if required (customizing). A connection between two applications is defined by the number of parallel communication channels and the definition of the controlling application of each communication channel. Even if all communication channels are controlled by one application, messages can be GINA V4.0 System Administrator Guide – September 2000 43 Overview transmitted by both sides. The controlling application simply has priority over the passive application. From a performance point of view, the controlling application should be the one which generally (or more frequently) opens the communication. The definition of the type and number of all connections between the applications is equivalent to the definition of the communication structure for the entire system. Figure 1 on page 44 is a symbolic representation of the hierarchies in the definition of this communication structure. It is not drawn to scale to reflect the scope of the individual subdescriptions. Depending on the particular network structure, the definition of the connections between the applications can be much larger than the definition of the applications. System-wide settings Parameters valid throughout the system Participating host: H1, H2, etc. Host-specific parameters R1 etc. R2 Applications in R1, R2 etc. Application-specific parameters A1 A2 etc. Connection parameters V1 Figure 1 44 V2 V3 V4 etc. The logical hierarchy when defining the communication structure of a system GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.26 Overview The communication structure of a system can be depicted by a graph with nodes and edges. The nodes correspond to the applications, while the edges represent the communication channels. The first three blocks in the diagram define the nodes of the graph with respect to the specific system, host or application; the last block describes the edges of the graph. From the input data (which has already been explained), the configuration generator config creates the following output data for each application of each host: – for each application: a GINA-specific address file containing all addressable server applications – for each application: a configuration file for the transaction monitor used by GINA – for each host: a list of the necessary TNSX entries The configuration can be performed on a central computer for the entire system. The files created in the process can then be distributed to the target computers and installed there. The final tasks which must be performed locally are carried out during this installation. Moving the final tasks to the target computers eliminates the need to install the transaction monitor on the generation computer. Because the output data for the generation comprises only text files, the hardware and operating system independence of the configuration process is also guaranteed. In the first version of the configuration tool, the procedure is that change requests are sent to a central location and that a new configuration process will be implemented from there only. The configuration generator makes it easier to configure the runtime environment for T-ORB and T-ORB/Client. Revision generation is described in section 6.3 on page 88. A central configuration is recommended for the following reasons: – It does not make sense to change the configuration on the local target computers because these modifications will be overwritten with the next global update process. – Another argument against changing the settings locally is that modifications to the hierarchy of the system often affect more than one host. It is precisely changes of this type that require consistency checks, which are not possible on the local level. GINA V4.0 System Administrator Guide – September 2000 45 Configuration language 6.2 Configuration language The configuration generator config reads a text file which describes the configuration of the entire system in a T-ORB-specific language. This file contains the necessary information on the network protocol, the transaction monitor, T-ORB, and the specialist application. The elements of the language include keywords, literals, separators and comments. Blanks, tabs, line feeds, form feeds and white spaces are ignored. The characters // introduce a comment, the line feed character terminates it. 6.2.1 Statements The configuration language contains a range of statements which are introduced by keywords; these are explained below. The statements include numerous UTM parameters [31]. The statements may contain two different styles: uppercase letters only or lowercase letters only. ❍❍● ADMIN The ADMIN statements on the system level apply to all hosts, if there is no ADMIN statement with the same user ID in the HOST statement. The ADMIN statements on the host level apply accordingly to all applications, if there is no ADMIN statement in the application. The optional ADMIN statement has the following parameters: – – user ID (LETTER) password (LETTER) Example ADMIN ( "srv1", "srv1" ) ADDRESS The ADDRESS statement describes how the foreign openUTM application is to be addressed by the GINA application. It has the following parameters: – – name of the transaction code (LETTER) name of the subroutine (LETTER) Example 46 ADDRESS ( "VSVONREB", "MV1VON" ) GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.27 Configuration language The ADDRESS statement describes how the GINA application is to be addressed by the foreign openUTM application. It has the following parameters: – – local name of the GINA application (LETTER) name of the local transaction code (LETTER) APPLICATION The APPLICATION statement describes a client which is connected via T-ORB/Client. It comprises the following components: – OsId of the application (NUMBER, 1 ... 32767) – LayerId of the application (NUMBER, 1 ... 32767) – User-friendly name of the application (LETTER) – The REMOTE flag can be specified as an option for a client connected via T-ORB/Client. The REMOTE flag classifies a client as a remote client [31]. If the REMOTE flag is not specified as the last parameter, a client is generated locally if it only has local connections to servers; otherwise, a remote generation is created. – A user ID and password can be specified. This information is generated automatically if it is not specified explicitly. Example APPLICATION ( 131, 1, "CmdTrm1" ) AREA The AREA statements on the system level apply to all hosts, if there is no AREA statement with the same data area name in the HOST statement. The AREA statements on the host level apply accordingly to all applications, if there is no AREA statement in the application. The optional AREA statement has one mandatory parameter – Data area name (LETTER) and the following optional parameters – – – – – "ACCESS" = "DIRECT" | "INDIRECT" "LOAD-MODULE" = "lmodname" "LOAD" = "STATIC" "LOAD" = "(POOL,poolname)" "LIB" = "omlname" Example (OS_UNIX, OS_WINNT) (OS_BS2000) (OS_BS2000) (OS_BS2000) (OS_BS2000) AREA ( "area1", "ACCESS" = "DIRECT" ) GINA V4.0 System Administrator Guide – September 2000 47 Configuration language ASYN_PRIORITY The ASYN_PRIORITY statement defines the priority classes for the processing of asynchronous requests (see also the description of the PRIORITIES keyword). The statement has the following format: ASYN_PRIORITY(RELATIVE | ABSOLUTE | EQUAL) { PRIO(1 [,TIMER] [,EVENT] [,CYCLIC] [,PGWT] PRIO(2 [,TIMER] [,EVENT] [,CYCLIC] [,PGWT] PRIO(3 [,TIMER] [,EVENT] [,CYCLIC] [,PGWT] PRIO(4 [,TIMER] [,EVENT] [,CYCLIC] [,PGWT] PRIO(5 [,TIMER] [,EVENT] [,CYCLIC] [,PGWT] PRIO(6 [,TIMER] [,EVENT] [,CYCLIC] [,PGWT] PRIO(7 [,TIMER] [,EVENT] [,CYCLIC] [,PGWT] } ) ) ) ) ) ) ) The ASYN_PRIORITY statement can be used to define up to seven classes (PRIO1 through PRIO7). As part of this process, PRIO1 is mapped to TAC class 10, PRIO2 to TAC class 11, etc. of openUTM. TAC class 10 has the second highest priority, TAC class 16 the lowest. TAC class 9 with the highest priority is reserved for the T-ORB. The RELATIVE, ABSOLUTE and EQUAL attributes of the ASYN_PRIORITY statement were transferred 1:1 from the openUTM generation. These attributes are used to determine the priority with which processes will be distributed to the asynchronous TAC classes containing executable asynchronous requests or interrupted asynchronous requests. No new pending asynchronous requests will be started once the maximum number of asynchronous operations that can be open simultaneously is reached (set in MAX ASYNTASKS=(...,service_number)), instead an interrupted outstanding asynchronous operation will be selected on the basis of priority and continued. ABSOLUTE attribute: Absolute priority A free process will always be assigned to the class with the highest priority, i.e. Class 9, provided that there are pending asynchronous requests or interrupted asynchronous requests for this class. Processes that become free will only process requests from a class with a lower priority if the message queues of all classes with a higher priority do not contain any pending or interrupted asynchronous requests. 48 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.27 Configuration language RELATIVE attribute: Relative priority Free processes will be assigned to higher priority classes more often than lower priority classes provided that there are pending or interrupted requests for these higher priority classes. If there are requests present for all classes, a free process will be assigned to TAC class 9 twice as often as to TAC class 10, and twice as often to TAC class 10 as to TAC class 11, etc. EQUAL attribute: Equal priority All classes will be serviced equally if there are requests present. This equal distribution can be disrupted if a class does not contain any pending requests at times or subprogram runs with blocking calls (e.g. KDCS call PGWT) frequently occur in that class. Further information on the RELATIVE, ABSOLUTE and EQUAL attributes can be found in the openUTM documentation V5.0A, Generating and Handling Applications [26] in the section entitled TAC-PRIORITIES – specify priorities of the TAC classes. The following TIMER, EVENT, CONTROL and PGWT attributes are optional and can be specified in any order. TIMER attribute The T-ORB runtime system has an internal cyclical timer. This is a cyclical order (controlled by means of the CYCLETIME statement of the config generator) that takes over various tasks within T-ORB, e. g. initiation of the EventControl mechanism (see the EVENT attribute). The TIMER attribute can be used to determine which priority class is to be assigned to the internal cyclical timer. TIMER can only be specified for one priority class. If the TIMER attribute is not specified, the class with the average priority (rounded up to the next highest priority) will be assigned to the cyclical timer. If, for example, PRIO1 through PRIO4 is specified, PRIO2 will be assigned to the timer. EVENT attribute The T-ORB runtime system maintains the so-called EventControl mechanism internally. This mechanism is responsible for ensuring that requests to T-ORB/client applications that are buffered in the T-ORB application for technical reasons are actually delivered. The EVENT attribute can be used to determine the priority class in which the EventControl mechanism is to run. EVENT can only be specified for one priority class. If the EVENT attribute is not specified, the class with the average priority (rounded down to the next lowest priority) will be assigned to the EventControl mechanism. If, for example, PRIO3 through PRIO7 is specified, PRIO5 will be assigned to the EventControl mechanism. This attribute is only needed if T-ORB/client applications are connected to the T-ORB application. GINA V4.0 System Administrator Guide – September 2000 49 Configuration language CYCLIC attribute A so-called administration order is created for each cyclical timed request (DomsClient::cyclicOrder). This administration order makes sure that the cyclical timed request is executed in the selected timeframe. The CYCLIC attribute can be used to determine the priority class in which these administration orders are to run. CYCLIC can only be specified for one priority class. If the CYCLIC attribute is not specified, the class with the average priority (rounded up to the next highest priority) will be assigned to the administration orders. If, for example, PRIO1 through PRIO6 is specified, PRIO3 will be assigned to the administration orders. PGWT attribute If a priority class is assigned requests that need to execute callAndWait and execChainAndWait calls, the class must have the appropriate authorization. The PGWT attribute can be used to grant this authorization to the priority class. PGWT can be specified for each priority class. BCAMAPPL The optional BCAMAPPL statement permits the specification of BCAM application names for a TA application. The number of application names required depends on the configuration and is checked by config. If too few application names are specified, config outputs an appropriate error message. A BCAMAPPL statement is only permitted within a TA_APPLICATION statement. The application names are generated without the BCAMAPPL statement. Example BCAMAPPL ( "GINA1", "GINA2" ) BEST_BCAMAPPL The keyword BEST_BCAMAPPPL results in a separate BCAMAPPL statement being generated for each connection. CANCEL The CANCEL statement of the EVENTCONTROL block defines the interval after which an event on a client expires, i.e. the event has exceeded its delivery time since the CANCEL time, in relation to its start time. The interval is specified by four values for days, hours, minutes, and seconds. The default value is CANCEL(2,0,0,0). 50 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.28 Configuration language The CANCEL statement on system level applies to all hosts if there is no CANCEL statement in the HOST statement. The CANCEL statement on host level applies accordingly to all TA applications if there is no CANCEL statement in the TA_APPLICATION statement. CHECK The CHECK statement of the EVENTCONTROL block defines the interval after which an event on a client is overdue, i.e. incorporated into the checking mechanism, in relation to its start time. The interval is specified by four values for days, hours, minutes and seconds. The default value is CHECK(0,1,0,0). The CHECK statement on system level applies to all hosts if there is no CHECK statement in the HOST statement. The CYCLICTIME statement on the host level applies accordingly to all TA applications if there is no CHECK statement in the TA_APPLICATION statement. CONNECT The CONNECT entry describes a connection between a T-ORB/Client and a T-ORB-Server. The statement has the following parameters: – – – – OsId of the first partner (e.g. client) LayerId of the first partner OsId of the second partner (e.g. server) LayerId of the second partner Example CONNECT ( 221, 1, 204, 1 ) CYCLE The CYCLE statement of the EVENTCONTROL block defines the interval in which the events on the client that have not yet been delivered are checked. The interval is specified by four values for days, hours, minutes and seconds. The default value is CYCLE(0,0,10,0). The CYCLE statement on system level applies to all hosts if there is no CYCLE statement in the HOST statement. The CYCLE statement on host level applies accordingly to all TA applications if there is no CYCLE statement in the TA_APPLICATION statement. GINA V4.0 System Administrator Guide – September 2000 51 Configuration language CYCLICORDER The CYCLICORDER statement defines the maximum number of cyclical tasks permitted per TA_APPLICATION. The default value is CYCLICORDER(10). The CYCLICORDER statement on system level applies to all hosts if there is no CYCLICORDER statement in the HOST statement. The CYCLICORDER statement on host level applies accordingly to all TA applications if there is no CYCLICORDER statement in the TA_APPLICATION statement. CYCLICTIME The CYCLICTIME statement defines the interval for activation of the application-specific timer. The interval is specified by four values for days, hours, minutes and seconds. The default value is CYCLICTIME(0,0,0,0). The CYCLICTIME statement on system level applies to all hosts if there is no CYCLICTIME statement in the HOST statement. The CYCLICTIME statement on host level applies accordingly to all TA applications if there is no CYCLICTIME statement in the TA_APPLICATION statement. DYNAMIC_CONNECT A DYNAMIC_CONNECT statement on system level and on host level permits the definition of connections which are used by non-transaction-monitored clients to communicate with transaction-monitored T-ORB applications. This statement can be used to define connections to several different T-ORB applications. DYNAMIC_CONNECT((os,layer,number), ...) The parameters os and layer refer to the OsLayerId in the TA_APPLICATION statement of the transaction-monitored T-ORB application to which connections are to be generated. The parameter number defines the number of connections. If there is no DYNAMIC_CONNECT statement for a host, then this host inherits the connections specified at system level. If this list is empty, this means that this host does not inherit any connections from the system level. 52 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.28 Configuration language EVENTCONTROL The EVENTCONTROL statement comprises the following components: – – – CYCLE CHECK CANCEL Each component is optional. Example EVENTCONTROL { CYCLE ( 0, 0, 20, 0 ) CHECK ( 0, 2, 0, 0 ) CANCEL ( 3, 0, 0, 0 ) } FOREIGN_APPLICATION The FOREIGN_APPLICATION statement describes a foreign openUTM application. It comprises the following components: – – – – OsId of the application (NUMBER, 1 ... 32767) LayerId of the application (NUMBER, 1 ... 32767) optional: a foreign application number user-friendly name of the application (LETTER)) Example FOREIGN_APPLICATION ( 1, 4, "FA1" ) FOREIGN_APPLICATION_NUMBER The FOREIGN_APPLICATION_NUMBER statement summarizes a list of ADDRESS statements: this list is referenced by means of a number. An ADDRESS statement defines the following components: – – – – FunctionId of the converter function (NUMBER) TransactionCode of the application (LETTER) TransactionType of the application (LETTER) optional: ConverterId of the application (NUMBER). GINA V4.0 System Administrator Guide – September 2000 53 Configuration language FOREIGN_SESSION The FOREIGN_SESSION statement describes connections between a GINA application and a foreign openUTM application. It comprises the following components: – – – – session type (LETTER); the generator currently supports LU6.1 mapping (optional MAP_SYSTEM parameter) MAP= controls ASCII/EBCDIC conversion when exchanging unformatted messages with other applications. SYSTEM openUTM converts the data in the message area from ASCII to EBCDIC prior to dispatch or from EBCDIC to ASCII following receipt. The message may only contain printable characters. See the KDCDEF control statement SESCHA in [26]. a SESSIONPOINT statement for the GINA application a SESSIONPOINT statement for the foreign openUTM application HOST The HOST statement describes the configuration of a host. The HOST statement comprises the following components: – – – – – – – – – host name optional: the CMX version of the host (default CMX040) optional: the UTM version of the host (default UTM040) optional: the flag RESERVE Internet address of the host (INTERNETADDRESS) shared memory and semaphore key (KEYVECTOR) (not OS_BS2000) available port numbers (PORTADDRESS) (not OS_BS2000) host-specific customizing statements (ADMIN, CYCLICTIME, EVENTCONTROL, MAX, RMXA, START and START_RM) description of existing applications Example 54 HOST ( "Host2" ) { INTERNETADDRESS ( 127.0.0.2 ) KEYVECTOR ( 5005, 5040 ) PORTADDRESSES ( 2000, 2100 ) ... } GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.28 Configuration language IMPORT The IMPORT statements on the system level apply to all hosts, if there is no IMPORT statement with the same file name in the HOST statement. The IMPORT statements on the host level apply accordingly to all applications, if there is no IMPORT statement with the same parameters in the application. The optional IMPORT statement has one parameter: – filename The IMPORT statement is transformed into the KDCDEF control statement OPTION DATA. IN_CONVERTER The IN_CONVERTER statement describes a converter function or converter class method that is called if there is a message from a foreign openUTM application. The IN_CONVERTER statement has the following parameters: – – FunctionId of the converter function or ClassId and ClassMethodId of the converter class method INTERNETADDRESS The INTERNETADRESS statement is used to specify the current Internet address of the host. KEYVECTOR The KEYVECTOR statement contains the keys for the following UTM areas: – – – – the global application semaphore (SEMKEY) the access key for the KAA shared memory segment (KAASHMKEY) the access key for communication (IPCSHMKEY) the access key for file accesses (CACHESHMKEY) The KEYVECTOR statement has the following parameters: – – start key end key For the areas of importance, see the CMX documentation [7]. The difference between the start key and end key must be large enough for all applications on the host to have their own key. ❍❍● GINA V4.0 System Administrator Guide – September 2000 55 Configuration language The following number of keys must be defined for each application: – 1 key each for CACHESHMKEY, IPCSHMKEY and KAASHMKEY – (6 + n + m)/10 semaphore keys for SEMKEY n = maximum number of work processes m = maximum number of communication partners connected simultaneously When calculated, the value must be rounded off to a whole number. MAX The MAX statement allows you to customize TP applications. On system level, the MAX statement applies to all hosts if there is no MAX statement of the same name in the HOST statement. MAX statements on host level apply accordingly to all applications. The optional MAX statement has the following parameters: – – name of the statement (LETTER) value of the statement as a string The statement names APPLINAME, CACHESHMKEY, CONRTIME, DPUTLIMIT1, DPUTLIMIT2, IPCSHMKEY, KAASHMKEY, NB, SEMARRAY and TRMSGLTH must not be specified, as these statements are generated automatically. If the KDCFILE statement is not specified or if the file name is omitted from the value string, a MAX statement with the name KDCFILE is generated. MPOOL The MPOOL statement is only supported for TA applications on a host using the OS_BS2000 operating system. The MPOOL statements on the system level apply to all hosts, if there is no MPOOL statement with the same pool name in the HOST statement. The MPOOL statements on the host level apply accordingly to all applications, if there is no MPOOL statement in the application. The optional MPOOL statement has two mandatory parameters – – Poolname LSIZE = poolsize and the following optional parameters – – – – – 56 ACCESS = READ | WRITE LIB = omlname PAGE = X'xxxxxxxx' SCOPE = GROUP | GLOBAL SHARETAB = csectname GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.29 Configuration language NET_ACCESS The NET_ACCESS statement describes the manner in which the application is linked to the network. The NET_ACCESS statements on system level apply to all hosts if there is no NET_ACCESS statement with the same name in the HOST statement. The NET_ACCESS statements on host level apply accordingly to all applications. The optional NET_ACCESS statement has the following parameters: – – – – SINGLE-THREADED Each network connection is administered in a separate network process. MULTI-THREADED A number of network connections are administered in a single process. Network connections are assigned to network processes via listener IDs that you assign to the application name (BCAMAPPL statement) of your application. If you specify MULTI-THREADED, ALL, a LISTENER-ID is specified for each BCAMAPPL statement. If you specify MULTI-THREADED, number, number LISTENER-IDs are specified for each BCAMAPPL statement. The default value is SINGLE-THREADED. OPERATING_SYSTEM The optional OPERATING_SYSTEM statement defines the operating system of the host. Possible values are OS_UNIX, OS_WINNT and "OS_BS2000" The default value is OPERATING_SYSTEM(OS_UNIX). The OPERATING_SYSTEM statement on system level applies to all hosts if there is no OPERATING_SYSTEM statement in the HOST statement. OUT_CONVERTER The OUT_CONVERTER statement describes a converter function that is called before a message from a foreign openUTM application is delivered. The optional OUT_CONVERTER statement has the following parameter: – converter ID of the converter function GINA V4.0 System Administrator Guide – September 2000 57 Configuration language PORTADDRESSES The PORTADDRESSES statement contains the port numbers for the TNSX entries. The statement has the following parameters: – – first port number last port number See the CMX documentation [7] for information on value ranges. The difference between the start address and end address must be large enough for each BCAMAPPL entry on the host to have its own port number. The following rules apply when calculating the number of BCAMAPPL entries of an application: – Each CONNECT statement creates two BCAMAPPL entries. – If the BEST_BCAMAPPL flag is set in the APPLICATION statement, a separate BCAMAPPL entry is generated for each SESSION statement of the application. – Without the BEST_BCAMAPPL flag, the number of BCAMAPPL entries generated corresponds to the maximum number of SESSION entries specified between the current server application and one of its partners. ❍❍● PRIORITIES The PRIORITIES statement has the following format: PRIORITIES { SYNC_PRIORITY(RELATIVE | ABSOLUTE | EQUAL [,free_sync] ) { PRIO(1 [,PGWT] ) PRIO(2 [,PGWT] ) PRIO(3 [,PGWT] ) PRIO(4 [,PGWT] ) PRIO(5 [,PGWT] ) PRIO(6 [,PGWT] ) PRIO(7 [,PGWT] ) } ASYN_PRIORITY(RELATIVE | ABSOLUTE | EQUAL) { PRIO(1 [,TIMER] [,EVENT] [,CYCLIC] [,PGWT] ) PRIO(2 [,TIMER] [,EVENT] [,CYCLIC] [,PGWT] ) PRIO(3 [,TIMER] [,EVENT] [,CYCLIC] [,PGWT] ) PRIO(4 [,TIMER] [,EVENT] [,CYCLIC] [,PGWT] ) PRIO(5 [,TIMER] [,EVENT] [,CYCLIC] [,PGWT] ) PRIO(6 [,TIMER] [,EVENT] [,CYCLIC] [,PGWT] ) 58 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.29 Configuration language PRIO(7 [,TIMER] [,EVENT] [,CYCLIC] [,PGWT] ) } SCHEDULE { FUNCTION(<FunctionId>,<SyncPriority>,<AsyncPriority>,<Infostring>) INSTMETHOD(<ClassId>,<InstMethodIdd>,<SyncPriority>, <AsyncPriority>,<Infostring>) CLASSMETHOD(<ClassId>,<ClassMethodId>,<SyncPriority>, <AsyncPriority>,<Infostring>) CLASS(<ClassId>,<Syncpriority>,<AsyncPriority>,<Infostring>) } } The individual SYNC_PRIORITY, ASYN_PRIORITY and SCHEDULE blocks are described under the relevant keywords. – The new PRIORITIES statement and the old PRIORITY and SCHEDULE statements are mutually exclusive, i. e. you can only assign one type of priority control to a TA_APPLICATION. – If you do not specify the PRIORITIES statement, priority control will be effected by means of the function for controlling processing of orders by restricting processes. – You can specify the PRIORITIES statement at system, host and TA application level. The statement will be passed on from SYSTEM to HOST and from HOST to TA_APPLICATION. – Both the old priority control and the priority control described here can be used within a T-ORB configuration. PRIORITY TAC classes are controlled at the level of the specialist class, class method, instance method and function. The PRIORITY statement defines three TAC classes with the priorities HIGH, MEDIUM and LOW. This statement summarizes a list of three entries: HIGH ( tasks [, SYNC_WAIT] ) MEDIUM ( tasks [, SYNC_WAIT] ) LOW ( tasks [, SYNC_WAIT] ) The parameter tasks specifies the maximum number of processes in the application which work concurrently with this TAC class. It depends on the statements MAX TASKS and MAX TASKS-IN-PGWT. GINA V4.0 System Administrator Guide – September 2000 59 Configuration language The attribute SYNC_WAIT specifies whether synchronous calls (callAndWait, addToChain and execChainAndWait) are permitted in this TAC class. This attribute can only be assigned to one of the three TAC classes. The PRIORITY statement may only be used once on system, host or TA application level. The PRIORITY statement on the system level applies to all hosts, if there is no PRIORITY statement in the HOST statement. The PRIORITY statement on the host level applies accordingly to all TA applications. REMOTE The REMOTE keyword classifies a client as a remote client. If the REMOTE flag is not specified as the last parameter, a client is generated locally if it only has local connections to servers; otherwise, a remote generation is created. REPOSITORY The REPOSITORY statement defines the file name of a repository in the current directory. This repository contains the generation number and the associated port numbers and keys for each of the OsId and LayerId pair. If the file exists, these values are read, saved internally, and used during generation. If the file does not exist, the values are generated automatically. The repository is written once generation of these values is concluded. The repository supports generation for a modified configuration. If an application is removed, the same identifiers are used in the kdcdf file for the remaining applications. The same port numbers are also used for the TNSX entries. The REPOSITORY statement is optional. If this statement is not specified, no memory is used in the generation. REREADTIME The REREADTIME statement has one parameter that defines a time interval in minutes. REREADTIME(minutes) The status of the gina.config file of a TA_APPLICATION will be checked every minutes minutes. The file will be read in once more if there has been a change in the status. The REREADTIME statements at system level apply for all hosts unless the HOST statement contains a REREADTIME statement. The REREADTIME statements at host level apply accordingly for all TA applications. 60 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.30 Configuration language RMXA The RMXA statement describes a Resource Manager. The RMXA statements on system level apply to all hosts if there is no RMXA statement of the same name in the HOST statement. The RMXA statements on host level apply accordingly to all applications. The optional RMXA statement has the following parameters: – – – manufacturer name of the Resource Manager form of the XA interface name of the OML with connection module (OS_BS2000 only) SCHEDULE The SCHEDULE statement is used to explicitly assign the specialist classes, class methods, instance methods and functions to the TAC classes with the priorities HIGH, MEDIUM and LOW. This statement summarizes a list of entries: CLASS CLASSMETHOD INSTMETHOD FUNCTION ( ( ( ( ClassId, Priority ) ClassId, ClassMethodId, Priority ) ClassId, InstMethodId, Priority ) FunctionId, Priority ) The parameter Priority has the values HIGH, MEDIUM or LOW. The SCHEDULE statement may only be used once on system, host or TA application level. The SCHEDULE statement on the system level applies to all hosts, if there is no SCHEDULE statement in the HOST statement. The SCHEDULE statement on the host level applies accordingly to all TA applications. SCHEDULE (PRIORITIES) The SCHEDULE statement defines the priority assigned to the specialist (synchronous/ asynchronous) processing mechanism (see also the description of the PRIORITIES keyword). The statement has the following format: SCHEDULE { FUNCTION(<FunctionId>,<SyncPriority>,<AsyncPriority>,<Infostring>) INSTMETHOD(<ClassId>,<InstMethodIdd>,<SyncPriority>, <AsyncPriority>,<Infostring>) CLASSMETHOD(<ClassId>,<ClassMethodId>,<SyncPriority>, <AsyncPriority>,<Infostring>) CLASS(<ClassId>,<Syncpriority>,<AsyncPriority>,<Infostring>) } GINA V4.0 System Administrator Guide – September 2000 61 Configuration language The SCHEDULE statement can be used to assign functions, instance methods, class methods or all methods of a class to a specific priority. Classes, class methods, instance methods and functions that are not explicitly assigned to a specific category using the SCHEDULE statement will be automatically assigned to the second highest priority class. The following minimum and maximum values apply to the individual parameters of the SCHEDULE statement:: Parameter Minimum value Maximum value ClassId 1025 SHRT_MAX ClassMethodId 1 SHRT_MAX InstMethodId 1 SHRT_MAX Function 1025 LONG_MAX SyncPriority 1 7 AsyncPriority 1 7x SESSION The SESSION statement describes connections between server applications. The SESSION statement comprises the following components: – – – 62 session type (LETTER); at present, the generator supports LU6.1 mapping (optional MAP_SYSTEM parameter) MAP= controls ASCII/EBCDIC conversion when exchanging unformatted messages with other applications. SYSTEM openUTM converts the data in the message area from ASCII to EBCDIC prior to dispatch or from EBCDIC to ASCII following receipt. The message may only contain printable characters. See the KDCDEF control statement SESCHA in [26]. one SESSIONPOINT statement for each accessible application GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.30 Configuration language SESSIONPOINT The SESSIONPOINT statement specifies the number of connections that can be controlled by an application. The SESSIONPOINT statement has the following parameters: – – – OsId of the current application (NUMBER) LayerId of the current application (NUMBER) number of connections controlled by this application A SESSIONPOINT statement that describes the connections from a GINA application to a foreign openUTM application has the following additional components: – – An ADDRESS statement This statement describes the parameters used to specify how the foreign openUTM application is to be addressed. An optional OUT_CONVERTER statement This statement describes a converter function that is called before a message from a foreign openUTM application is delivered. A SESSIONPOINT statement that describes the connections from a foreign openUTM application to a GINA application has the following additional components: – – An ADDRESS statement This statement describes the parameters used to specify how the GINA application is to be addressed. An IN_CONVERTER statement This statement describes a converter function or converter class method that is called if there is a message from a foreign openUTM application. START The START statement allows you to customize TP statements. The START statements on system level apply to all hosts if there is no START statement of the same name in the HOST statement. The START statements on host level apply accordingly to all applications. The optional START statement has the following parameters: – – name of the statement value of the statement as a string Permissible statement names are TASKS, ASYNTASKS and TASKS-IN-PGWT. GINA V4.0 System Administrator Guide – September 2000 63 Configuration language START_RM The START_RM statements on system level apply to all hosts if there is no START_RM statement with the same manufacturer name in the HOST statement. The START_RM statements on host level apply accordingly to all applications. The optional START_RM statement has the following parameters: – – manufacturer name of the database Openstring OS If the keyword APPLICATION is written instead of the Openstring parameter, the TA_application name is used as the Openstring. START_VALUE The START_VALUE statement defines the first generation number that is used in the generation of identifiers in statements for the kdcdef program. This results in unique reproductions of the OsId and LayerId pair in these identifiers. By specifying different start values, different subsystems that can be combined can be generated. The subsystem connections, however, must still be completed. The START_VALUE statement is optional. If this statement is not specified, generation of the identifiers starts with the value 1. If a repository exists, it is used to ascertain the generation numbers, i.e. the START_VALUE statement is ignored. SYNC_PRIORITY The SYNC_PRIORITY statement defines the priority classes for the processing of dialog requests (see also the description of the PRIORITIES keyword). The statement has the following format: SYNC_PRIORITY(RELATIVE | ABSOLUTE | EQUAL [,free_sync] ) { PRIO(1 [,PGWT] ) PRIO(2 [,PGWT] ) PRIO(3 [,PGWT] ) PRIO(4 [,PGWT] ) PRIO(5 [,PGWT] ) PRIO(6 [,PGWT] ) PRIO(7 [,PGWT] ) } 64 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.31 Configuration language The SYNC_PRIORITY statement can be used to define up to seven classes (PRIO1 through PRIO7). As part of this process, PRIO1 is mapped to TAC class 2, PRIO2 to TAC class 3 etc. of openUTM. TAC class 2 has the second highest priority, TAC class 8 the lowest. TAC class 1 with the highest priority is reserved for the T-ORB. The RELATIVE, ABSOLUTE, EQUAL attributes of the SYNC_PRIORITY statement and the free_sync parameter were transferred 1:1 from the openUTM generation. These attributes are used to specify the strategy by which free processes will be distributed to the dialog TAC classes containing pending requests. Pending dialog requests only arise if the number of requests retrieved from the request exchange at any one time exceeds the number of processes available for the dialog TAC classes. These pending requests will be written to the request queues of the transaction codes from which they will be read and processed in accordance with their priority by the processes that become free. ABSOLUTE attribute: Absolute priority A free process will always be assigned to the class with the highest priority (TAC class 1) provided that there are pending requests for this class. Lower priority classes will only be serviced if there are no pending requests in any of the higher priority classes. RELATIVE attribute: Relative priority Free processes will be assigned to higher priority classes more often than lower priority classes provided that there are pending requests for these higher priority classes. If there are requests present for all dialog classes, a free process will be assigned to TAC class 1 twice as often as to TAC class 2, and twice as often to TAC class 2 as to TAC class 3, etc. EQUAL attribute: Equal priority All classes will be serviced equally if there are requests present. This equal distribution can be disrupted if a class does not contain any pending requests at times or subprogram runs with blocking calls (e.g. KDCS call PGWT) frequently occur in that class. free_sync parameter This parameter allows you to restrict the total number of processes that may process requests to dialog TAC classes relative to the number of processes in the application. In free_sync specify the number of processes in the application that are to be kept free for processing requests and that do not belong to any dialog TAC class. Minimum value: 0 (no restriction) Maximum value: TASKS - 1 (TASKS from MAX statement) Default: 1 GINA V4.0 System Administrator Guide – September 2000 65 Configuration language PGWT attribute If a priority class is assigned requests that need to execute callAndWait and execChainAndWait calls, the class must have the appropriate authorization. The PGWT attribute can be used to grant this authorization to the priority class. PGWT can be specified for each priority class. Further information on the RELATIVE, ABSOLUTE and EQUAL attributes as well as on the free_sync parameter can be found in the openUTM documentation V5.0, Generating and Handling Applications [26] in the section entitled TAC-PRIORITIES – specify priorities of the TAC classes. SYSTEM The SYSTEM keyword must always be the first keyword in the description. The current description is enclosed in braces, i.e. SYSTEM {...}. Example SYSTEM {...}. The SYSTEM statement can be written with a flag in rounded brackets. Example SYSTEM (TNS_LESS_SESSION){...} The flag TNS_LESS_SESSION means: No entries will be generated in the files tnsxin and tnsxdel for the statements SESSION and FOREIGN_SESSION. TA_APPLICATION The TA_APPLICATION statement describes a transaction-monitored application on the current host (HOST). It comprises the following components: – – – – – TP application name (LETTER) OsId of the application (NUMBER, 1 ... 32767) LayerId of the application (NUMBER, 1 ... 32767) User-friendly name of the application (LETTER) optional: BCAMAPPL name can be assigned exclusively to a GINA application (BEST_BCAMAPPL) A further form describes a future application with the following parameters: – – – 66 OsId of the application (NUMBER, 1 .. 32767) LayerId of the application (NUMBER, 1 .. 32767) Flag RESERVE GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.31 Configuration language This statement acts as a wildcard so that a GINA-SESSION between a T-ORB application without the flag RESERVE and a T-ORB application with the flag RESERVE can be defined (see SESSION). A T-ORB application can then be generated from this session in the event of a revision generation. The normal syntax of this statement must then be used. OsId and LayerId may not then be changed. Customizing statements (ADMIN, CYCLICTIME, EVENTCONTROL, MAX, RMXA, START and START_RM) are permitted after the TA_APPLICATION description of a server. Example TA_APPLICATION ( "OS1", 1, 1, "OS1" ) { ... } GINA V4.0 System Administrator Guide – September 2000 67 Configuration language 6.2.2 Lexical structure This section describes how the configuration generator combines the contents of the configuration file into symbols (like the keywords) for syntax analysis. The description is in the notation used by the UNIX command lex. %{ %} letter DGS letter_or_digit [a-zA-Z_] [0-9]+ [a-zA-Z_0-9] %% [ \t\n\v\r\f]+ \/\/.*\n \{ \} \( \) \, \= {DGS} ; ; {return(BBOPEN);} {return(BBCLOSE);} {return(SBOPEN);} {return(SBCLOSE);} {return(COMMA);} {return(EQUAL);} {yylval.number=atol(yytext); return(NUMBER);} {DGS}\.{DGS}\.{DGS}\.{DGS} {strcpy(yylval.string,yytext); return(INADDRESS);}; \"[^"\n]* {yytext[yyleng++] = yyinput(); yytext[yyleng] = '\0'; lettercpy(yylval.string,yytext); return(LETTER);}; {letter}{letter_or_digit}* {return(rwlookup());}; . {return(ERROR);}; %% 68 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.31 Configuration language 6.2.3 Syntax This section describes the syntax of the configuration language in the notation used by the UNIX command yacc. %{ %} %start sysblock %union { SessPoint *sessPt; long number; char string[80]; } %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token <number> NUMBER ADDRESS ADMIN APPLICATION AREA ASYN_PRIORITY BCAMAPPL CANCEL CHECK CLASS CLASSMETHOD CONNECT CYCLE CYCLICORDER CYCLICTIME DYNAMIC_CONNECT EVENTCONTROL FOREIGN_APPLICATION FOREIGN_APPLICATION_NUMBER FOREIGN_SESSION FUNCTION HOST IMPORT INSTMETHOD INTERNETADDRESS GINA V4.0 System Administrator Guide – September 2000 /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* positive integer statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ 69 Configuration language %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token 70 IN_CONVERTER KEY_VECTOR MAX_STMT MPOOL NET_ACCESS OPERATING_SYSTEM OUT_CONVERTER PORTADDRESSES PRIO PRIORITIES PRIORITY REPOSITORY REREADTIME RMXA SCHEDULE SESSION SESSIONPOINT START START_RM START_VALUE SYNC_PRIORITY SYSTEM TA_APPLICATION ABSOLUTE BEST_BCAMAPPL CYCLIC EVENT EQUAL HIGH LOW MAP_SYSTEM MEDIUM PGWT RELATIVE REMOTE RESERVE SYNC_WAIT TIMER TNS_LESS_SESSION <string> INADDRESS <string> LETTER BBOPEN BBCLOSE SBOPEN /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement statement flag flag flag flag flag flag flag flag flag flag flag flag flag flag flag flag Internet address string { } ( */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.32 Configuration language %token %token %token %token %% SBCLOSE COMMA EQUALS CONFIG_ERROR sysblock system /* /* /* /* ) , = error code (internal) */ */ */ */ : system BBOPEN sys_statement_list_opt multi_host multi_link_opt BBCLOSE ; : SYSTEM | SYSTEM SBOPEN TNS_LESS_SESSION SBCLOSE ; sys_statement_list_opt : /* empty */ | sys_statement_list ; sys_statement_list : org_statement_list | ; s_statement_list_opt s_statement_list org_statement_list : org_statement | org_statement_list org_statement ; s_statement_list_opt : /* empty */ | s_statement_list ; s_statement_list : s_statement | s_statement_list s_statement ; GINA V4.0 System Administrator Guide – September 2000 71 Configuration language s_statement : statement | foreign_app_number | dynamic_connect ; org_statement : start_value | repository | operating_system ; start_value : START_VALUE SBOPEN NUMBER SBCLOSE ; repository : REPOSITORY SBOPEN LETTER SBCLOSE ; foreign_app_number : foreig_app_number_header BBOPEN address_list BBCLOSE ; foreign_app_number_header : FOREIGN_APPLICATION_NUMBER SBOPEN NUMBER SBCLOSE ; address_list : address_elm | address_list address_elm ; address_elm : ADDRESS SBOPEN NUMBER COMMA LETTER COMMA LETTER SBCLOSE | ADDRESS SBOPEN NUMBER COMMA LETTER COMMA LETTER COMMA NUMBER SBCLOSE ; operating_system : OPERATING_SYSTEM SBOPEN LETTER SBCLOSE ; 72 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.32 Configuration language statement : | | | | | | | | | | | | | | | ; cyclictime : CYCLICTIME SBOPEN NUMBER COMMA NUMBER COMMA NUMBER COMMA NUMBER SBCLOSE ; cyclicorder : CYCLICORDER SBOPEN NUMBER SBCLOSE ; : EVENTCONTROL BBOPEN eventcontrol_body BBCLOSE ; eventcontrol max rm admin start start_rm cyclictime cyclicorder eventcontrol net_access area mpool import priorities priority schedule rereadtime eventcontrol_body : cycle cyclic_rest | check check_rest | cancel ; cyclic_rest : check check_rest | check_rest ; GINA V4.0 System Administrator Guide – September 2000 73 Configuration language check_rest : cancel | /* empty */ ; cycle : CYCLE SBOPEN NUMBER COMMA NUMBER COMMA NUMBER COMMA NUMBER SBCLOSE ; check : CHECK SBOPEN NUMBER COMMA NUMBER COMMA NUMBER COMMA NUMBER SBCLOSE ; cancel : CANCEL NUMBER NUMBER NUMBER NUMBER ; net_access : NET_ACCESS SBOPEN LETTER COMMA LETTER SBCLOSE | NET_ACCESS SBOPEN LETTER SBCLOSE | NET_ACCESS SBOPEN NUMBER SBCLOSE ; area : AREA SBOPEN LETTER area_parameter_list_opt SBCLOSE ; SBOPEN COMMA COMMA COMMA SBCLOSE area_parameter_list_opt : /* empty */ | COMMA area_parameter_list ; area_parameter_list : area_parameter | area_paramter_list area_parameter ; 74 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.32 Configuration language area_parameter : LETTER EQUAL LETTER ; mpool : MPOOL SBOPEN LETTER COMMA mpool_parameter_list SBCLOSE ; mpool_parameter_list : mpool_parameter | mpool_parameter_list COMMA mpool_parameter ; mpool_parameter: LETTER EQUAL LETTER ; import : IMPORT SBOPEN LETTER SBCLOSE ; priorities : PRIORITIES BBOPEN priorities_body BBCLOSE ; priorities_body: sync_priority asyn_priority p_schedule ; sync_priority : SYNC_PRIORITY SBOPEN r_a_e free_sync SBCLOSE BBOPEN prio_list BBCLOSE ; r_a_e : RELATIVE | ABSOLUTE | EQUAL ; free_sync : /* empty */ | COMMA NUMBER ; prio_list : prio_element | prio_list prio_element ; prio_element : PRIO SBOPEN NUMBER prio_rest ; GINA V4.0 System Administrator Guide – September 2000 75 Configuration language prio_rest : SBCLOSE | COMMA PGWT SBCLOSE ; asyn_priority : ASYN_PRIORITY SBOPEN r_a_e SBCLOSE BBOPEN aprio_list BBCLOSE ; aprio_list : i aprio_element | aprio_list aprio_element ; aprio_element : PRIO SBOPEN NUMBER aprio_rest ; aprio_rest : SBCLOSE | COMMA tecp_list SBCLOSE ; tecp_list : tecp_element | tecp_list COMMA tecp_element ; tecp_element : | | | ; p_schedule : SCHEDULE BBOPEN p_schedule_list BBCLOSE ; TIMER EVENT CYCLIC PGWT p_schedule_list: p_schedule_element | p_schedule_list p_schedule_element ; 76 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.33 Configuration language p_schedule_element : FUNCTION SBOPEN NUMBER COMMA NUMBER COMMA NUMBER COMMA LETTER SBCLOSE | INSTMETHOD SBOPEN NUMBER COMMA NUMBER COMMA NUMBER COMMA NUMBER COMMA LETTER SBCLOSE | CLASSMETHOD SBOPEN NUMBER COMMA NUMBER COMMA NUMBER COMMA NUMBER COMMA LETTER SBCLOSE | CLASS SBOPEN NUMBER COMMA NUMBER COMMA NUMBER COMMA LETTER SBCLOSE ; priority : PRIORITY BBOPEN priority_body BBCLOSE ; priority_body : low_task low_task_rest | medium_task medium_task_rest | high_task high_task_rest ; low_task : LOW SBOPEN NUMBER opt_sync_wait SBCLOSE ; medium_task : MEDIUM SBOPEN NUMBER opt_sync_wait SBCLOSE ; high_task : HIGH SBOPEN NUMBER opt_sync_wait SBCLOSE ; low_task_rest : medium_task high_task | high_task medium_task ; medium_task_rest : low_task high_task | high_task low_task ; high_task_task : low_task medium_task | medium_task low_task ; opt_sync_wait : /* empty */ | COMMA SYNC_WAIT ; GINA V4.0 System Administrator Guide – September 2000 77 Configuration language rereadtime : REREADTIME SBOPEN NUMBER SBCLOSE ; schedule : SCHEDULE BBOPEN schedule_list BBCLOSE ; schedule_list : schedule_element | schedule_list schedule_element ; schedule_element : CLASS SBOPEN NUMBER | CLASSMETHOD SBOPEN NUMBER SBCLOSE | INSTMETHOD SBOPEN NUMBER SBCLOSE | FUNCTION SBOPEN NUMBER ; COMMA prio SBCLOSE COMMA NUMBER COMMA prio COMMA NUMBER COMMA prio COMMA prio SBCLOSE prio : LOW | MEDIUM | HIGH ; ta_attrib : /* empty */ | BBOPEN ta_appl_statement_list_opt BBCLOSE ; non_ta_attrib : /* empty */ | BBOPEN non_ta_appl_statement_list_opt BBCLOSE ; foreign_attrib : /* empty */ | BBOPEN foreign_appl_statement_list_opt BBCLOSE ; 78 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.33 Configuration language ta_appl_statement_list_opt : /* empty */ | ta_appl_statement_list ; non_ta_appl_statement_list_opt : /* empty */ | non_ta_appl_statement_list ; ta_appl_statement_list : ta_appl_statement | ta_appl_statement_list ta_appl_statement ; non_ta_appl_statement_list : non_ta_appl_statement | non_ta_appl_statement_list non_ta_appl_statement ; ta_appl_statement : statement | bcamappl_statement ; bcamappl_statement : BCAMAPPL SBOPEN bcam_list SBCLOSE ; bcam_list : bcam_element | bcam_list COMMA bcam_element ; bcam_element : LETTER ; non_ta_appl_statement : authentication ; foreign_appl_statement_list_opt : /* empty */ | foreign_appl_statement_list ; GINA V4.0 System Administrator Guide – September 2000 79 Configuration language foreign_appl_statement_list : foreign_appl_statement | foreign_appl_statement_list foreign_appl_statement ; foreign_appl_statement : authentication | bcamppl_statement ; 80 rm : RMXA SBOPEN LETTER COMMA LETTER SBCLOSE ; admin : ADMIN SBOPEN LETTER COMMA LETTER SBCLOSE ; max : MAX SBOPEN LETTER COMMA LETTER SBCLOSE | max_header max_list_opt SBCLOSE ; max_header : MAX SBOPEN LETTER EQUAL LETTER ; max_list_opt : /* empty *? | COMMA max_list ; max_list : max_element | max_list COMMA max_element ; max_element : LETTER EQUAL LETTER ; start : START SBOPEN LETTER COMMA LETTER SBCLOSE ; start_rm : START_RM SBOPEN LETTER COMMA LETTER SBCLOSE | START_RM SBOPEN LETTER COMMA APPLICATION SBCLOSE ; GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.33 Configuration language multi_host : hostblock | multi_host hostblock ; hostblock : HOST SBOPEN LETTER SBCLOSE hostbody /* Hostname */ | HOST SBOPEN LETTER COMMA RESERVE SBCLOSE hostbody /* Hostname, CMX-Version oder UTM-Version */ | HOST SBOPEN LETTER COMMA LETTER SBCLOSE hostbody /* Hostname, CMX-Version oder UTM-Version */ | HOST SBOPEN LETTER COMMA LETTER COMMA RESERVE SBCLOSE hostbody /* Hostname, CMX-Version oder UTM-Version */ | HOST SBOPEN LETTER COMMA LETTER COMMA LETTER SBCLOSE hostbody /* Hostname, CMX-Version, UTM-Version */ | HOST SBOPEN LETTER COMMA LETTER COMMA LETTER COMMA RESERVE SBCLOSE hostbody /* Hostname, CMX-Version, UTM-Version */ ; hostbody : BBOPEN i_v_a vector_aaddress_opt host_statements multi_applicat_opt BBCLOSE ; i_v_a : internet internet_rest | vector vector_rest | address adress_rest ; address_rest : internet vector_opt | vector internet_opt ; internet_rest : /* empty */ | vector address_opt | adress vector_opt ; GINA V4.0 System Administrator Guide – September 2000 81 Configuration language vector_rest : internet address_opt | address internet_opt ; internet : INTERNETADDRESS SBOPEN INADDRESS SBCLOSE ; ; internet_opt : /* empty */ | internet ; vector_opt : /* empty */ | vector ; host_statements : /* empty */ | operating_system host_statement_list_opt | host_statement_list ; host_statement_list_opt : /* empty */ | host_statement_list ; host_statement_list : host_statement | host_statement_list host_statement ; host_statement : statement | dynamic_connect_host ; dynamic_conect_host : dynamic_connect opt_dyn_block | dynamic_connect_empty ; dynamic_connect_empty : DYNAMIC_CONNECT SBOPEN SBCLOSE ; 82 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.34 Configuration language dynamic_connect: DYNAMIC_CONNECT SBOPEN dyn_conn_list SBCLOSE ; dyn_conn_list : /* empty */ | dyn_conn_list ; dyn_conn_list : dyn_conn_element | dyn_conn_list COMMA dyn_conn_element ; dyn_conn_element : SBOPEN NUMBER COMMA NUMBER COMMA NUMBER SBCLOSE ; opt_dyn_block : /* empty */ | dyn_block ; dyn_block : BBOPEN authentication BBCLOSE ; multi_applicat_opt : /* empty */ | multi_applicat ; multi_applicat : applicat | multi_applicat applicat ; applicat : ta_appl ta_attrib | non_ta_appl | foreign_appl foreign_attrib ; ta_appl : ta_appl_1 | ta_appl_2 ; ta_appl_1 : ta_appl_best | ta_appl_max ; GINA V4.0 System Administrator Guide – September 2000 /* server */ /* client */ 83 Configuration language 84 non_ta_appl : nonta_appl_remote | nonta_appl_1 ; ta_appl_best : TA_APPLICATION SBOPEN LETTER COMMA NUMBER COMMA NUMBER COMMA LETTER COMMA BEST_BCAMAPPL SBCLOSE ; ta_appl_max : TA_APPLICATION SBOPEN LETTER COMMA NUMBER COMMA NUMBER COMMA LETTER SBCLOSE ; ta_appl_2 : TA_APPLICATION SBOPEN NUMBER COMMA NUMBER COMMA RESERVE SBCLOSE ; nonta_appl_1 : APPLICATION SBOPEN NUMBER COMMA NUMBER COMMA LETTER SBCLOSE | APPLICATION SBOPEN NUMBER COMMA NUMBER COMMA GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.34 Configuration language LETTER COMMA LETTER COMMA /* userid */ LETTER /* passwd */ SBCLOSE ; nonta_appl_remote : APPLICATION SBOPEN NUMBER COMMA NUMBER COMMA LETTER COMMA REMOTE SBCLOSE | APPLICATION SBOPEN NUMBER COMMA NUMBER COMMA LETTER COMMA REMOTE COMMA LETTER COMMA LETTER SBCLOSE ; foreign_appl /* userid */ /* passwd */ : FOREIGN_APPLICATION SBOPEN NUMBER COMMA NUMBER COMMA LETTER SBCLOSE | FOREIGN_APPLICATION SBOPEN NUMBER COMMA NUMBER COMMA LETTER COMMA LETTER SBCLOSE | FOREIGN_APPLICATION SBOPEN NUMBER COMMA NUMBER COMMA NUMBER COMMA /* foreign application number */ LETTER SBCLOSE | FOREIGN_APPLICATION SBOPEN GINA V4.0 System Administrator Guide – September 2000 85 Configuration language NUMBER NUMBER NUMBER LETTER COMMA COMMA COMMA /* foreign application number */ COMMA LETTER SBCLOSE ; vector : KEYVECTOR SBOPEN NUMBER COMMA NUMBER SBCLOSE ; address : PORTADDRESSES SBOPEN NUMBER COMMA NUMBER SBCLOSE ; multi_link_opt : multi_link | /* empty */ ; multi_link : link | multi_link link ; link : sessblock | connect ; connect : CONNECT SBOPEN NUMBER COMMA NUMBER COMMA NUMBER COMMA NUMBER SBCLOSE ; sessblock : session_header BBOPEN sesspoint sesspoint BBCLOSE | foreign_session_header BBOPEN foreign_sesspoint foreign_sesspoint BBCLOSE ; foreign_session_header : FOREIGN_SESSION SBOPEN LETTER SBCLOSE | FOREIGN_SESSION SBOPEN LETTER COMMA MAP_SYSTEM SBCLOSE ; 86 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.34 Configuration language session_header : SESSION SBOPEN LETTER SBCLOSE | SESSION SBOPEN LETTER COMMA MAP_SYSTEM SBCLOSE ; foreign_sesspoint : foreign_sesspoint_header BBOPEN address_converter BBCLOSE | foreign_sesspoint_header ; foreign_sesspoint_header : SESSIONPOINT SBOPEN NUMBER COMMA NUMBER COMMA NUMBER SBCLOSE ; address_converter : foreign_address converter_opt ; foreign_address : ADDRESS SBOPEN LETTER COMMA LETTER SBCLOSE ; converter_opt : /* empty */ | converter ; converter : IN_CONVERTER SBOPEN NUMBER SBCLOSE | IN_CONVERTER SBOPEN NUMBER COMMA NUMBER SBCLOSE | OUT_CONVERTER SBOPEN NUMBER SBCLOSE ; sesspoint : SESSIONPOINT SBOPEN NUMBER COMMA NUMBER COMMA NUMBER SBCLOSE ; %% GINA V4.0 System Administrator Guide – September 2000 87 Revision generation 6.3 Revision generation The purpose of the revision generation is as follows: when the configuration is revised, the generation for the applications not affected by the revision remain the same. Prerequisites The use of a repository is an absolute must for this revision generation (see the statement REPOSITORY on page 60). The repository must be created when generating the previous version or updated to the new status. The applications use host resources such as authorization keys (KEYVECTOR) and port numbers (PORTADDRESSES). The applications not affected by a revision must use the same resources. The authorization keys and port numbers are stored in the repository for each application. When creating the kdcdf script, the generator config must generate unique identifiers for each application. The same identifiers must then be used in a revision generation. In the case of a first generation with an empty repository, a generation number is written to the repository for each application so that this number will be used to generate the identifiers (see the statement START_VALUE on page 64). The following further characteristics or values are entered in the repository for each server application: 88 – KDCFILE, DOUBLE If the KDCFILE is maintained in duplicate for security reasons, the characteristic DOUBLE is stored and can then be taken into account during the next generation. – PGPOOLFS The PGPOOLFS parameter defines the number of files across which the page pool is distributed. This number is entered in the repository and can thus be evaluated during the next generation. – RECBUFFS RECBUFFS defines the number of files across which the restart area is to be distributed. This number is stored in the repository and read during the next generation. GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.35 Revision generation Performing the revision generation The user must perform the following steps when revising the configuration so that no user data is lost from an application: – Adapt the configuration file The modifications to the configuration, e.g. new hosts, new applications and connections must be defined in the input file of the configuration generator config. – Perform the generation The generator reads the configuration file and generates, among other things, kdcdf scripts. The following steps must be performed on all hosts affected by the modifications: – Terminate the application normally The application must be terminated using the command kdcshut normal or kdcdshut warn so that the files KDCA, R01A, ..., P01A, ..., KDCB, R01B, ..., P01B, ... are in a consistent state. – Execute the kdcdf script The files KDCA, etc. are first copied to the directory old. The files KDCA, etc. are then recreated using the openUTM utility routine kdcdef [29]. This openUTM utility routine kdcupd transfers the data from the old files to the newly generated files. – Restart the applications The shell script utmstart.multi is one of many which is generated when the kdcdf script is executed. This shell script must be executed. GINA V4.0 System Administrator Guide – September 2000 89 Sample configuration file 6.4 Sample configuration file This section illustrates the syntactic structure using a sample configuration. SYSTEM { // // system-wide MAX statements. // MAX("TASKS","7") MAX("ASYNTASKS","4") MAX("PGPOOL","(200,80,96)") MAX("RECBUF","(32,4096)") MAX("TASKS-IN-PGWT","3") RMXA("INFORMIX","C") ADMIN("upicadm","valentin") ADMIN("admin","4711") START_RM("INFORMIX",APPLICATION) // // first operating system of the system. // in this example the hostname is // used as symbolic name. // HOST("kotw002") { // // internetaddress of first host. // INTERNETADDRESS(192.200.94.8) // // available shared memory and semaphore keys. // KEYVECTOR(5011,5047) 90 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.35 Sample configuration file // // available port addresses. // PORTADDRESSES(10111,10126) // // host wide MAX statements. // MAX("LSSBS","200") MAX("TASKS","6") // // first application of first operating system. // a1 is the utm known application name. // buslay is the user friendly name. // the third parameter is optional for BCAMAPPL // optimization. // TA_APPLICATION("a1",1,1,"buslay") { // // application wide MAX statements // MAX("TASKS","5") } TA_APPLICATION("a2",1,2,"servlay") HOST("kotw005") { INTERNETADDRESS(192.200.94.4) KEYVECTOR(5000,5015) PORTADDRESSES(10114,10135) TA_APPLICATION("a1",1,3,"nwlay") TA_APPLICATION("a2",1,4,"nellay") APPLICATION(1,5,"client1","userid","password") APPLICATION(1,6,"client2") APPLICATION(1,7,"client3",REMOTE) } GINA V4.0 System Administrator Guide – September 2000 91 Sample configuration file // // first session of the system between application a2 // of kotw002 // and a1 of kotw005. // a2 controls 3 connections // a1 controls 1 connection // SESSION("LU6.1") { SESSIONPOINT(1,1, 3) SESSIONPOINT(1,2, 1) } SESSION("LU6.1") { SESSIONPOINT(1,1, 1) SESSIONPOINT(1,3, 2) } SESSION("LU6.1") { SESSIONPOINT(1,2, 3) SESSIONPOINT(1,3, 2) } SESSION("LU6.1") { SESSIONPOINT(1,3, 2) SESSIONPOINT(1,4, 4) } // // connection between client1 of kotw005 and a1 // of kotw005 // client is configured local // CONNECT(1,5, 1,3) 92 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.35 Sample configuration file // // client2 of kotw005 is configured remote because // of remote server 1,1 // CONNECT(1,1, 1,6) CONNECT(1,6, 1,3) // // client3 of kotw005 is configured remote because // of REMOTE statement in the client3 definition // CONNECT(1,7, 1,3) } GINA V4.0 System Administrator Guide – September 2000 93 Call and options 6.5 Call and options The configuration generator config is called as follows: config [-a] [-d] [-k nohinfo] [-m] [-r] [-u] [-v] [-V] configfile -a The all option contains the -d and -r options that are described below. If no option is set in the call, -a is assumed, i.e. all of the files are generated. -d If the development option is set, the configuration generator creates files required in the application development process (see below for a description of the individual files). -k nohinfo The -k nohinfo option suppresses output of the time of generation in the generated files. -m If the mainframe option is set, the configuration generator creates identifiers in the file kdcdf made up solely of uppercase letters and digits. This option must be specified if the configuration description includes BS2000/OSD hosts. -r If the runtime option is set, the configuration generator creates files required to run a distributed application (see below for a description of the individual files). -u The -u option outputs the call syntax. -v With the verbose option, generator messages are output to stdout. -V If -V is specified, only the version message is output to stdout and execution of the program is terminated. For configfile, you must specify the name of your configuration file. 94 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.36 Generated files 6.6 Generated files The configuration generator config analyzes a description file and generates from it resource files and configuration scripts for the runtime environment of the distributed system. Some of the generated files are host-specific and some are application-specific. config creates a directory tree in the current directory. The basic structure of this tree is illustrated in Figure 2 below. There is a subdirectory for each host under the root system. Each of these host subdirectories bears as its name the descriptive name from the HOST statement. All of these subdirectories also have their own subdirectories bearing the names of the applications which are to run on the respective hosts. No directory will be created for a host marked with the RESERVE flag. In the same way no directory will be created for a TA_APPLICATION labeled with the RESERVE flag. System Host name User-friendly name Figure 2 Host name User-friendly name User-friendly name Model of the directory structure as created by config Most of the files created by config are incorporated directly into the runtime environment of the distributed application. In addition, config generates a script for each T-ORB application which calls the configuration tools of the underlying transaction monitor and in the process creates files which are needed to develop or run the distributed system. The script is generated in accordance with the operating system of the host on which the relevant T-ORB application is to run and must be executed under this operating system. – A C shell script with the file name kdcdf is generated for a UNIX host, i.e. the shell /bin/csh must exist on the relevant host. – A batch processing file kdcdf.bat is generated for the WindowsNT operating system. – An SDF command procedure KDCDF is generated for BS2000/OSD. GINA V4.0 System Administrator Guide – September 2000 95 Generated files The call options specified for the configuration generator result in different variants of the script being generated. These different variants generate different files: – If kdcdf was generated using the config -d development option, it generates source files for program parts which are needed to link the T-ORB application to the transaction monitor. – If kdcdf was generated using the config -r development option, it generates configuration and runtime files for the transaction monitor, as well as some utility procedures. – If kdcdf was generated using the “all” option (config -a), it generates the same files as the development and runtime variants combined. In the case of an external openUTM application, the kdcdf file is not generated as a script, but rather as a file containing openUTM configuration statements. It must be included in the configuration process of the external openUTM application. ❍❍● 96 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.36 Generated files 6.6.1 Generated files for UNIX hosts 6.6.1.1 Development option The development variant of the C shell script kdcdf generates the following C source files: – GinaRoot.c – OwnMsgs.c This files must be compiled using a C compiler and linked to the T-ORB application (see the GINA Developer Manual [13], chapter Compiling and linking). The name of the Resource Manager manufacturer from the RMXA statement is incorporated into the GinaRoot source. If this statement is modified, GinaRoot must be regenerated and compiled and the application must be linked once more. ❍❍● 6.6.1.2 Runtime option TNSX configuration Two text files, tnsxin and tnsxdel, are created for each host. These files simplify the process of configuring the Transport Name Service TNSX. The file tnsxin contains all of the information required to make the TNSX entries for setting up the connections with other hosts. It is processed using the command tnsxcom -S tnsxin. In the event of a deinstallation or reconfiguration, these TNSX entries can be deleted again using tnsxcom -S tnsxdel. upicfile A file upicfile is generated for each T-ORB/client application. This file acts as a kind of server directory for addressable servers. For a static T-ORB/client (APPLICATION) this file is created in the directory which is assigned to the application; for dynamic T-ORB/clients (DYNAMIC_CONNECT) the file is created in the corresponding HOST directory. gina.config A file gina.config is generated for each T-ORB application (TA_APPLICATION), static T-ORB/client application (APPLICATION) and for dynamic T-ORB clients (DYNAMIC_CONNECT). It acts as a directory for addressable applications. Among other things, the file also contains intervals for an application-specific timer and for controlling events. For T-ORB applications and static T-ORB clients, this file is generated in the directory assigned to the application; for dynamic clients the file is created in the directory of the host on which the dynamic clients are configured. GINA V4.0 System Administrator Guide – September 2000 97 Generated files The gina.config file must normally be copied to the directory where the application is called. You can, however, choose a directory other than "." using the environment variable GINACONFIG. gina.dynamic A file gina.dynamic is generated for each host for which dynamic T-ORB clients are configured (statement DYNAMIC_CONNECT). This file contains information on the dynamic connections and is used by DomsDynConnectHandler (see Dynamic Connection Handler on page 197). Configuration data for the transaction monitor If the kdcdf script was created with the runtime option config -r, it generates a file KDCA and possibly other elements of KDCFILE. This data is configuration data for openUTM. The kdcdf script must be called in the directory where the KDCA file will reside when the application is running. MAX statements in the configuration description can be used to influence the files other than KDCA which are generated [26]. If the file KDCA already exists when kdcf is called, it is backed up under the name old/KDCA (UNIX). Start and administration scripts The runtime variant of the kdcdf script which was created using config -r generates procedures for starting and administering a T-ORB application when called. These procedures are generated as scripts for the C shell, i.e. the shell /bin/csh must be installed on the relevant host. 98 – utmstart.multi Start procedure for the application – utmstart.single Start procedure for the debug variant of the application – start Start parameters for openUTM – dtp Procedure for openUTM administration GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.36 Generated files 6.6.2 Generated files for WindowsNT hosts 6.6.2.1 Development option The development variant of the batch processing file kdcdf.bat generates the following C source files: – GinaRoot.c – OwnMsgs.c This files must be compiled using a C compiler and linked to the T-ORB application (see the GINA Developer Manual [13], chapter Compiling and linking). The name of the Resource Manager manufacturer from the RMXA statement is incorporated into the GinaRoot source. If this statement is modified, GinaRoot must be regenerated and the application must be linked once more. ❍❍● 6.6.2.2 Runtime option TNSX configuration PCMX Transport Name Service Source Files with the names tnsxin.tns and tnsxdel.tns are created for each host. These files simplify the process of configuring the Transport Name Service TNSX. The file tnsxin.tns contains all of the information required to make the TNSX entries for setting up the connections with other hosts. The data is entered when the file is executed. In the event of a deinstallation or reconfiguration, these TNSX entries can be deleted again using tnsxdel.tns. upicfile A file upicfile is generated for each T-ORB/client application. This file acts as a kind of server directory for addressable servers. For a static T-ORB/client (APPLICATION) this file is created in the directory which is assigned to the application; for dynamic T-ORB/clients (DYNAMIC_CONNECT) the file is created in the corresponding HOST directory. gina.config A file gina.config is generated for each T-ORB application (TA_APPLICATION), static T-ORB/client application (APPLICATION) and for dynamic T-ORB clients (DYNAMIC_CONNECT). It acts as a directory for addressable applications. Among other things, the file also contains intervals for an application-specific timer and for controlling events. GINA V4.0 System Administrator Guide – September 2000 99 Generated files For T-ORB applications and static T-ORB clients, this file is generated in the directory assigned to the application; for dynamic clients the file is created in the directory of the host on which the dynamic clients are configured. The gina.config file must normally be copied to the directory where the application is called. You can, however, choose a directory other than "." using the environment variable GINACONFIG. gina.dynamic A file gina.dynamic is generated for each host for which dynamic T-ORB clients are configured (statement DYNAMIC_CONNECT). This file contains information on the dynamic connections and is used by DomsDynConnectHandler (see Dynamic Connection Handler on page 197). Configuration data for the transaction monitor If the kdcdf.bat script was created with the runtime option config -r, it generates a file KDCA and possibly other elements of KDCFILE. This data is configuration data for openUTM. The kdcdf.bat script must be called in the directory where the KDCA file will reside when the application is running. Before the call, ensure that the %PATH% variable contains <install-dir>\bin (where <install-dir> is the GINA installation directory). MAX statements in the configuration description can be used to influence the files other than KDCA which are generated [26]. If the file KDCA already exists when kdcf.bat is called, it is backed up under the name old\KDCA (UNIX). Start and administration scripts The runtime variant of kdcdf.bat (created using config -r) generates scripts for starting and administering a T-ORB application when called. 100 – utmstart.multi.bat Start procedure for the application – utmstart.single.bat Start procedure for the debug variant of the application – start Start parameters for openUTM – dtp.bat Procedure for openUTM administration GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.37 Generated files 6.6.3 Generated files for BS2000/OSD hosts 6.6.3.1 Development option The development variant of the command procedure KDCDF generates assembler source files for the following program parts: – GinaRoot – OwnMsgs The script KDCDF automatically calls a file assembly routine and writes the objects created to an LMS library as the LLM elements GINART and OWNMSGS. The LMS library has the name TP_application_name.LIB. From there they must be linked to the T-ORB application. A different library name to the TP application name can be selected via a call parameter of the KDCDF script. The name of the Resource Manager manufacturer from the RMXA statement is incorporated into the GinaRoot source. If this statement is modified, GinaRoot must be regen❍❍● erated and the application must be linked once more. 6.6.3.2 Runtime option gina.config A file GINA.CONFIG.TP_application_name is generated for each T-ORB application (TA_APPLICATION) and static T-ORB/client application (APPLICATION). It acts as a directory for addressable applications. Among other things, the file also contains intervals for an application-specific timer and for controlling events. Configuration data for the transaction monitor If the kdcdf script was created with the runtime option config -r, it generates a file KDCA and possibly other elements of KDCFILE. This data is configuration data for openUTM. The kdcdf script must be called in the directory where the KDCA file will reside when the application is running. MAX statements in the configuration description can be used to influence which files other than KDCA are generated [27]. KDCA must also exist as a DMS file under BS2000/OSD. To avoid naming conflicts, the file name is prefixed with the string GINA and the TP application name from the configuration description, i.e. GINA.TP_application_name.KDCA. If the file KDCA already exists when kdcf is called, it is backed up under the name old/KDCA (UNIX) or old\KDCA (WindowsNT) or OLD.GINA.TP_application_name.KDCA (BS2000/OSD). GINA V4.0 System Administrator Guide – September 2000 101 Generated files Start and administration scripts The runtime variant of the procedure KDCDF (created using config -r) creates an ENTER file with the name START.TP_application_name when called. This file is used to start a T-ORB application. It must be copied as a DMS file to the host on which the application is to run. 6.6.4 Example The file structure illustrated in Figure 3 is an example of the structure created for the sample configuration file on page 90. Directory Text file system tnsxin kotw002 kotw005 tnsxdel tnsxin tnsxdel buslay nwlay nellay kdcdf kdcdf kdcdf kdcdf gina.config gina.config gina.config gina.config Figure 3 102 servlay client1 client2 client3 upicfile gina.config ..... File structure for the sample GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.38 Creating a configuration file using WinConfig 6.7 Creating a configuration file using WinConfig The configuration file described in the preceding sections contains all the necessary information on the desired system structure and can be created either with an editor or using the WinConfig graphical user interface. The WinConfig graphical user interface is only available on UNIX platforms and only for openUTM. ❍❍● WinConfig contains a direct connection to the GINA configuration generator config. This means that the configuration process can be executed almost entirely within the graphical user interface. The user controls the creation of a configuration file and the calling of the configuration generator by using WinConfig. The individual configuration elements (HOST, TA-APPLICATION, APPLICATION, FOREIGN_APPLICATION, SESSION, CONNECTION and FOREIGN_SESSION) of the configuration language from section 6.2 on page 46 are represented in WinConfig by icons and lines. Clicking on the icons or lines opens dialog windows in which you can enter or change the relevant parameters. The next sections frequently use the terms “TA application”, “non-TA application”, “foreign application”, “session”, “connection” and “foreign session”. In the context described, they mean the following: TA application Transaction-monitored application that is connected via T-ORB. In the configuration language, TA applications are represented by the TA_APPLICATION statement. Non-TA application Transaction-free application (e. g. GUI clients) that is connected via T-ORB/Client. In the configuration language, non-TA applications are represented by the APPLICATION statement. Foreign application A foreign openUTM application. In the configuration language, foreign applications are represented by the FOREIGN_APPLICATION statement. Session Connection between two transaction-monitored applications. In the configuration language, sessions are represented by the SESSION statement. Connection Connection between a transaction-monitored application and a transaction-free application. In the configuration language, connections are represented by the CONNECTION statement. Foreign session Connection between a transaction-monitored application and a foreign openUTM application. In the configuration language, foreign sessions are represented by the FOREIGN_SESSION statement. GINA V4.0 System Administrator Guide – September 2000 103 Creating a configuration file using WinConfig The configuration file created using WinConfig is the input for the GINA configuration generator config. The configuration generator creates the files required for configuring the entire system based on the information provided in the configuration file (see section 6.5 on page 94). This chapter explains the steps for working with the WinConfig graphical user interface. The description requires knowledge of the configuration language specified in section 6.2 on page 46. 6.7.1 Calling WinConfig The WinConfig graphical user interface is called as follows: WinConfig [-V] | [configfile] The interface can be started with or without a configuration file. If a configuration file is specified in the call, WinConfig tries to load this file immediately after it is started. If the -V option is specified, only the version message is output to stdout and execution of the program is terminated. No environment variables or X resources must be set. However, the font, if required, can be specified via the X resource WinConfig*fontList. 104 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.38 Creating a configuration file using WinConfig 6.7.2 Elements of the graphical user interface After startup, the WinConfig main window is displayed (see Figure 4): Host icon TA application icon Menu bar Non-TA application icon Connection Session Foreign session Host edit window Figure 4 Foreign application icon Application edit window WinConfig: Main window (with a sample configuration) The WinConfig main window consists of two edit windows with the associated scroll bars and a menu bar. GINA V4.0 System Administrator Guide – September 2000 105 Creating a configuration file using WinConfig Host edit window For information on editing the hosts in a configuration (physical view), see section 6.7.2.1 on page 110. Application edit window For information on editing the applications (TA applications, non-TA applications and foreign applications), as well as their sessions, connections, and foreign sessions (logical view), see section 6.7.2.2 on page 112. Menu bar Contains the File menu with general file operations, the System, Hosts, TA-Apps, Non-TA-Apps, Foreign-Apps menus for modifying customizing settings, the Links menu for the multiple generation and multiple deletion of sessions, connections and foreign sessions, as well as the Moves menu for changing the graphical layout; see section 6.7.2.3 on page 120. If the Autoscroll option is activated in the pop-up menu of the right mouse button, WinConfig scrolls in the application edit window automatically if the cursor goes beyond the edge of this area. In the default case, scroll bars are used for scrolling. The configuration example illustrated in Figure 4 on page 105 contains the four hosts Berlin, Koeln (= Cologne), Bremen and Foreign. The following applications are running on the relevant hosts: 106 Berlin Transaction-monitored application B.big, non-transaction-monitored application B.adm. Koeln Transaction-monitored application K.big, non-transaction-monitored applications K.adm and order. Bremen Transaction-monitored application HB.big, non-transaction-monitored application HB.adm. Foreign The foreign openUTM application for.big. GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.39 Creating a configuration file using WinConfig There are a total of six connections, two sessions, and a foreign session in this configuration example: Connections The non-transaction-monitored applications B.adm, K.adm and HB.adm are connected locally with the transaction-monitored applications B.big, K.big or HB.big respectively. The non-transaction-monitored application order is connected with each of the three transaction-monitored applications. Sessions There are connections between the transaction-monitored applications B.big and K.big, as well as between K.big and HB.big. Foreign session Connection between the transaction-monitored application HB.big and the foreign openUTM application for.big. The parameters of hosts, TA applications, non-TA applications and foreign applications are edited using dialog boxes. Clicking on a host icon or application icon opens the relevant dialog box. Figure 5 on page 108 shows the dialog boxes for the host Berlin, for the non-TA application order, for the TA application HB.big, and for the foreign application for.big. The parameters of sessions, connections and foreign sessions can also be edited. Clicking on a connecting line opens appropriate dialog boxes; see the dialog boxes for HB.big K.big and HB.big - order in Figure 5 on page 108. GINA V4.0 System Administrator Guide – September 2000 107 Creating a configuration file using WinConfig Figure 5 WinConfig: main window with open dialog boxes With few exceptions, all WinConfig dialog windows are based on the same model: the lefthand column in the window shows the parameter names, and the right-hand column shows the input fields with the relevant values. Parameter input is terminated by clicking with the left mouse button on OK, Delete or Cancel. The dialog window is closed. 108 GINA V4.0 System Administrator Guide – September 2000 torb-kon Creating a configuration file using WinConfig Druck vom 24. 01.2001 17:00.40 Figure 6 shows the WinConfig main window with a graphical representation of the configuration file from section 6.4 on page 90. The individual application icons were positioned manually, see also the File>Open menu item on page 121. Figure 6 WinConfig: main window with the loaded configuration file from section 6.4 The next sections describe the individual elements of the graphical user interface and the corresponding dialog windows in detail. GINA V4.0 System Administrator Guide – September 2000 109 Creating a configuration file using WinConfig 6.7.2.1 Host edit window Each host in a configuration is represented in the host edit window by a host icon. A label underneath the icon shows the name of the host. Each new host is generated using the pop-up menu of the right mouse button. However, newly generated hosts do not yet have a label underneath the icon showing the host’s name. WinConfig arranges all host icons one below the other in the host edit window. The host parameters can be edited by clicking on the host icon with the left mouse button. The following dialog window is opened via the host icon: Figure 7 Dialog window: Host parameters The Last Port, Last Key and #T, #N, #F input fields cannot be edited. WinConfig calculates their values automatically. The following table describes the dialog window entries; the “Statement” column specifies the corresponding statement that is generated by WinConfig when saving to a configuration file. 110 Parameter name Value Default Statement Hostname Name of the host none HOST OS Name of the operating system, possible values: UNIX, WINNT, BS2000 Selected via a pull-down menu - OPERATING_SYSTEM Inetaddress Internet address of the host none INTERNETADDRESS Cmx Version CMX version of the host CMX040 HOST Utm Version UTM version of the host UTM040 HOST GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.41 Creating a configuration file using WinConfig Parameter name Value Default Statement First Port First port number for the TNSX entries 10000 PORTADDRESSES Last Port 10000 Last port number for the TNSX entries This parameter value is calculated automatically by WinConfig. The calculation is explained in section 6.2 on page 46. WinConfig only uses the new value if it is larger than the old value. PORTADDRESSES First Key Start key for the KEYVECTOR state- 1000 ment (shared memory and semaphore key) KEYVECTOR Last Key End key for the KEYVECTOR state- 1000 ment This parameter value is calculated automatically by WinConfig. The calculation is explained in section 6.2 on page 46. WinConfig only uses the new value if it is larger than the old value. KEYVECTOR #T, #N, #F Number of TA, non-TA and foreign applications running on the host This parameter value is generated automatically by WinConfig. none 0,0,0 Hosts with the BS2000 operating system do not require any port addresses or KEYVECTOR statements. For this reason, the entries First Port, Last Port, First Key and Last Key in the dialog window cannot be edited for BS2000 hosts. The buttons in the dialog window execute the following actions: OK The entered parameter values are confirmed. Delete The corresponding host is deleted, i.e. the host icon in the host edit window disappears. Cancel The entered parameter values are discarded again. An application (represented by an icon in the application edit window) that is running on a host and whose dialog window is open is displayed by WinConfig with a frame around it. In addition, changing the host name in the host dialog window automatically also changes the host name of all of the applications on this host. GINA V4.0 System Administrator Guide – September 2000 111 Creating a configuration file using WinConfig 6.7.2.2 Application edit window a) Editing non-TA application parameters Each non-TA application in a configuration is represented in the application edit window by an icon. The name of the non-TA application is displayed within the icon. The position of an icon within the edit window can be changed by clicking once on the relevant icon using the middle mouse button. The icon tracks the movement of the mouse until you once again press the middle mouse button. Each new non-TA application is generated using the pop-up menu of the right mouse button. The new non-TA application is represented by an icon that is positioned at the current mouse position within the application edit window. Newly generated non-TA applications do not yet have a name within the icon. The parameters can be edited by double-clicking on the non-TA application icon with the left mouse button. The following dialog window is opened via the icon: Figure 8 Dialog window: Non-TA application parameters The UserId and Passwd input fields have a different background color to the other input fields when the window is first called. This means that these values cannot initially be changed. The values can only be changed after calling the Non-TA-Apps>Admin... menu. The following table describes the dialog window entries; the “Statement” column specifies the corresponding statement that is generated by WinConfig when saving to a configuration file. 112 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.42 Creating a configuration file using WinConfig Parameter name Value Default Statement Userfriendlyname User-friendly name of the non-TA application none APPLICATION OsId Operating system ID of the non-TA is generated APPLICATION application by WinConfig LayerId Layer ID of the non-TA application is generated APPLICATION by WinConfig UserId User ID none APPLICATION Passwd Password none APPLICATION Remote Possible values: remote / not remote see page 47 Selected via a toggle button not remote APPLICATION Hostname Name of the host on which the non- none TA application is running HOST The simplest way of entering the host name is to perform a drag-and-drop operation on the host label: ◊ Click on the label of a host icon with the middle mouse key and drag the label into the Hostname input field by holding down the mouse key. The buttons in the dialog window execute the following actions: OK The entered parameter values are confirmed. Delete The corresponding non-TA application is deleted, i.e. the icon in the application edit window disappears. Cancel The entered parameter values are discarded again. b) Editing TA application parameters Each TA application in a configuration is represented in the application edit window by an icon. The name of the TA application is displayed within the icon. The position of an icon within the application edit window can be changed by clicking once on the relevant icon with the middle mouse button. The icon tracks the movement of the mouse until you once again press the middle mouse button. GINA V4.0 System Administrator Guide – September 2000 113 Creating a configuration file using WinConfig Each new TA application is generated using the pop-up menu of the right mouse button. The new TA application is represented by an icon that is positioned at the current mouse position within the application edit window. Newly generated TA applications do not yet have a name within the icon. The parameters can be edited by clicking on the TA application icon with the left mouse button. The following dialog window is opened via the icon: Figure 9 Dialog window: TA application parameters The following table describes the dialog window entries; the “Statement” column specifies the corresponding statement that is generated by WinConfig when saving to a configuration file. 114 Parameter name Value Default Statement Userfriendlyname User-friendly name of the TA appli- none cation OsId Operating system ID of the TA application is generAPPLICATION ated by WinConfig LayerId Layer ID of the TA application is generAPPLICATION ated by WinConfig Appliname Name of the TA application none APPLICATION Bcamappl Possible values: Min, Best, Thread Selected via a pull-down menu Min APPLICATION Hostname Name of the host on which the TA application is running none HOST APPLICATION GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.43 Creating a configuration file using WinConfig The simplest way of entering the host name is to perform a drag-and-drop operation on the host label: ◊ Click on the label of a host icon with the middle mouse button and drag the label into the Hostname input field by holding down the mouse key. The buttons in the dialog window execute the following actions: OK The entered parameter values are confirmed. Delete The corresponding TA application is deleted, i.e. the icon in the application edit window disappears. Cancel The entered parameter values are discarded again. c) Editing foreign application parameters Each foreign application in a configuration is represented in the application edit window by an icon. The name of the foreign application is displayed within the icon. The position of an icon within the application edit window can be changed by clicking once on the relevant icon with the middle mouse button. The icon tracks the movement of the mouse until you once again press the middle mouse button. Each new foreign application is generated using the pop-up menu of the right mouse button. The new foreign application is represented by an icon that is displayed at the current mouse position within the application edit window. Newly generated foreign applications do not yet have a name within the icon. The parameters can be edited by clicking on the foreign application icon with the left mouse button. The following dialog window is opened via the icon: Figure 10 Dialog window: Foreign application parameters GINA V4.0 System Administrator Guide – September 2000 115 Creating a configuration file using WinConfig The following table describes the dialog window entries; the “Statement” column specifies the corresponding statement that is generated by WinConfig when saving to a configuration file. Parameter name Value Default Statement Userfriendlyname User-friendly name of the foreign application none FOREIGN_ APPLICATION OsId Operating system ID of the foreign is generFOREIGN_ APPLICATION application ated by WinConfig LayerId Layer ID of the foreign application Foreign_App_no Foreign application number 0 If 0 is entered, WinConfig does not create any corresponding parameter in the FOREIGN-APPLICATION statement. FOREIGN_ APPLICATION Hostname Name of the host on which the for- none eign application is running HOST is generFOREIGN_ ated by APPLICATION WinConfig The simplest way of entering the host name is to perform a drag-and-drop operation on the host label: ◊ Click on the label of a host icon with the middle mouse button and drag the label into the Hostname input field by holding down the mouse key. The buttons in the dialog window execute the following actions: 116 OK The entered parameter values are confirmed. Delete The corresponding foreign application is deleted, i.e. the icon in the application edit window disappears. Cancel The entered parameter values are discarded again. GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.43 Creating a configuration file using WinConfig d) Editing sessions A session between two TA applications is represented graphically by a connecting line between the two icons. A session between two TA applications is generated by clicking once on the two relevant icons with the left mouse button. The session parameters can be edited by clicking on the connecting line with the left mouse button. A dialog window that is positioned on the first icon that was clicked on is displayed. This TA application is then the “Me application”. The other TA application represents the “Other application”. Figure 11 Dialog window: Session parameters The following table describes the dialog window entries; the “Statement” column specifies the corresponding statement that is generated by WinConfig when saving to a configuration file Parameter name Value Default Statement Protocol Name of the protocol used LU6.1 SESSION Me -> Other Number of connections controlled by the Me application 1 SESSION-POINT Other -> Me Number of connections controlled by the Other application 1 SESSION-POINT Map_System Enable/disable mapping, see section SESSION on page 62. Possible values: yes / no Selected via a toggle button no SESSION The buttons in the dialog window execute the following actions: OK The entered parameter values are confirmed. Delete The corresponding session is deleted, i.e. the line between the two icons in the application edit window disappears. Cancel The entered parameter values are discarded again. GINA V4.0 System Administrator Guide – September 2000 117 Creating a configuration file using WinConfig e) Editing connections A connection between a TA application and a non-TA application is represented graphically by a connecting line between the two icons. A connection between a TA application and a non-TA application is generated by clicking once on the two relevant icons with the left mouse button. A connection can be editing by clicking on the connecting line with the left mouse button. A dialog window that is positioned on the first icon that was clicked on is displayed. Figure 12 Dialog window: Connection A connection itself has no parameter values. You can only confirm it in the dialog window with OK or delete it by pressing Delete. f) Editing foreign sessions A foreign session between a foreign application and a TA application is represented graphically by a connecting line between the two icons. A foreign session between a foreign session and a TA application is generated by clicking once on the two relevant icons with the left mouse button. The foreign session parameters can be edited by clicking on the connecting line with the left mouse button. A dialog window that is positioned on the first icon that was clicked on is displayed. This application is then the “Me application”. The other application represents the “Other application”. Figure 13 118 Dialog window: Foreign session parameters GINA V4.0 System Administrator Guide – September 2000 torb-kon Creating a configuration file using WinConfig Druck vom 24. 01.2001 17:00.44 The following table describes the dialog window entries; the “Statement” column specifies the corresponding statement that is generated by WinConfig when saving to a configuration file. Parameter name Value Default Statement Protocol Name of the protocol used LU6.1 FOREIGN_SESSION Me -> Other Number of connections controlled by the Me application 1 SESSION-POINT Other -> Me Number of connections controlled by the Other application 1 SESSION-POINT AddressMe Specifies how the other foreign or none TA application is to be addressed (see section 6.2 on page 46). The two parameter values must be separated by a dot. ADDRESS AddressOther Specifies how the other foreign or none TA application is to be addressed (see section 6.2 on page 46). The two parameter values must be separated by a dot. ADDRESS In_Converter Function ID of the converter func- none tion or Class ID and ClassMethod ID of the converter class method (see section 6.2 on page 46 ). When entering a Class ID and a ClassMethod ID, they must be separated by a dot. IN_CONVERTER Out_Converter Converter ID of the converter func- 0 tion (see section 6.2 on page 46). If you enter 0, WinConfig does not create an OUT_CONVERTER statement. OUT_CONVERTER Map_System Enable/disable mapping (see section FOREIGN_SESSION on page 54) Possible values: yes / no Selected via a toggle button FOREIGN_SESSION GINA V4.0 System Administrator Guide – September 2000 no 119 Creating a configuration file using WinConfig The buttons in the dialog window execute the following actions: 6.7.2.3 OK The entered parameter values are confirmed. Delete The corresponding foreign session is deleted, i.e. the line between the two icons in the application edit window disappears. Cancel The entered parameter values are discarded again. WinConfig menu bar The menu bar contains the File, System, Hosts, TA-Apps, Non-TA-Apps, Links and Moves menus. The functionality of the menus can be roughly divided into four function areas: File General WinConfig operations e. g. terminating an application, loading/saving a configuration file, starting the GINA configuration generator config. System, Hosts, TA-Apps, Non-TA-Apps, Foreign-Apps Modification of customizing settings for the various hierarchies (system-host-application). The customizing information specified for the system is passed on to the hosts as default values. In addition, all applications on a host inherit that host’s customizing information. Inherited customizing information can be overwritten using the customizing menus. WinConfig only shows the modified customizing information for the relevant hosts or applications. The consistency of the customizing information is not completely checked in Version 2.0 of WinConfig. All customizing statements mentioned in this section are described in more detail in section 6.2 on page 46. Links Multiple generation or multiple deletion of sessions, connections and foreign sessions as well as the hiding and showing of specific sessions, connections and foreign sessions. Moves Functionality for changing the graphical layout of the configuration currently being displayed. 120 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.46 Creating a configuration file using WinConfig File menu New All customizing settings are assigned defaults which means that parameter input for the hosts, non-TA applications, TA applications, foreign applications, sessions, connections and foreign sessions is sufficient to configure a system. The default values can be queried and changed via the System menu item in the individual customizing menus. Open... Loads a configuration file. A selection box for selecting the file name is displayed. Configuration files that were not created using WinConfig can also be loaded if they are syntactically correct. In this case, the position information for the application icon is missing and all application icons are placed one on top of the other in the upper left corner of the application edit window. The application icons must be dragged to the required position using the mouse. Once the configuration file is loaded, the path name of the file is displayed in the title line of the WinConfig main window. Save Saves the configuration file currently being edited. The name of the file is displayed in the title line of the WinConfig main window. If WinConfig was started without parameters or the File>New menu item was called, WinConfig: New is displayed in the title line of the main window. In this case, calling Save has the same effect as calling SaveAs.... SaveAs... Saves the configuration description currently being edited to a file. A selection box for entering the file name is displayed. Config This menu item starts the GINA configuration generator config with the configuration file displayed in the title line of the main window. An exact description of the config call options can be found in section 6.5 on page 94. The Config menu item contains four submenu items: Config>Check Syntax The configuration file is checked for completeness. A configuration file is complete if all of the parameter values for hosts, TA applications, non-TA applications, foreign applications, sessions and foreign sessions are entered. The GINA configuration generator config only accepts complete configuration files as input. GINA V4.0 System Administrator Guide – September 2000 121 Creating a configuration file using WinConfig Config>Generate all Calls the GINA configuration generator config with the option -a. Config>Generate runtime Calls the GINA configuration generator config with the option -r. Config>Generate development Calls the GINA configuration generator config with the option -d. If the configuration includes BS2000 hosts, config (when calling the menu items Config>Generate all, Config>Generate runtime, Config>Generate development) is also called with the option -m. Quit Terminates WinConfig. 122 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.46 Creating a configuration file using WinConfig System menu This menu can be used to modify the customizing settings for the system. Init System... This menu entry permits the input of system-specific data for START_VALUE, REPOSITORY and OPERATING_SYSTEM statements. Three input fields are displayed in the dialog window when this menu item is activated: Figure 14 Dialog window: Init System The following table describes the dialog window entries; the “Statement” column specifies the corresponding statement that is generated by WinConfig when saving to a configuration file. Parameter name Value Default Statement OS Name of the operating system Possible values: UNIX, WINNT, BS2000 Selected via a pull-down menu UNIX OPERATING_SYSTEM Startvalue 0 Start value of the first generation number that is used in the generation of identifiers (see section 6.2 on page 46) START_VALUE Repository Name of the repository file (see section 6.2 on page 46) REPOSITORY none The buttons in the dialog window execute the following actions: OK The entered parameter values are confirmed. Delete All parameter values are deleted. Cancel The entered parameter values are discarded again. GINA V4.0 System Administrator Guide – September 2000 123 Creating a configuration file using WinConfig Foreign-TA-App-Numbers... This menu item is used to input FOREIGN_APPLICATION_NUMBER statements. A FOREIGN_APPLICATION_NUMBER statement summarizes a list containing ADDRESS statements. This list is referenced by a number (see section 6.2 on page 46). The following list window is displayed when this menu item is called: Figure 15 Dialog window: Foreign-TA-App-Numbers The list window displays the current FOREIGN_APPLICATION_NUMBER settings. There are no default settings. The statements displayed in the list window are transferred to a configuration file when they are saved. The current settings can be modified using the Del Statement and Add Statement buttons. ● Deleting a statement ◊ Mark a FOREIGN_APPLICATION_NUMBER statement in the display area with the left mouse button. ◊ Click on Del Statement with the left mouse button. ● Inserting a statement ◊ Enter the parameters for the FOREIGN_APPLICATION_NUMBER statement in the input fields beneath the display area. The meaning of the input fields is as follows: Input field 1: Number of the FOREIGN_APPLICATION_NUMBER statement The next input fields represent an ADDRESS statement for the FOREIGN_APPLICATION_NUMBER statement with the number specified in the first parameter: Input field 2: FunctionID of the converter function Input field 3: TransactionsCode of the application 124 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.47 Creating a configuration file using WinConfig Input field 4: TransactionsType of the application Input field 5: optional, ConverterId of the application ◊ Click on Add Statement with the left mouse button. Terminate the input of FOREIGN_APPLICATION_NUMBER statements with OK or Cancel. The dialog window closes. The buttons execute the following actions: OK The entered FOREIGN_APPLICATION_NUMBER statements are confirmed. Cancel The modified FOREIGN_APPLICATION_NUMBER statements are discarded again. GINA V4.0 System Administrator Guide – September 2000 125 Creating a configuration file using WinConfig MaxState... Customizes the MAX statements for the system. The following list window is displayed when this menu item is called: Figure 16 Dialog window: MAX system The list window always displays the current MAX settings for the system. Figure 15 shows the default settings. The statements displayed in the list window are transferred to a configuration file when they are saved. The current settings can be modified using the Del Statement and Add Statement buttons. ● Deleting a statement ◊ Mark a MAX statement in the display area with the left mouse button. ◊ Click on Del Statement with the left mouse button. ● Inserting a statement ◊ Enter the first and second parameters in the left or right input field beneath the display area. WinConfig always expects that both parameters will be entered. ◊ Click on Add Statement with the left mouse button. Terminate the input of MAX statements with OK or Cancel. The dialog window closes. The buttons execute the following actions: 126 OK The entered MAX statements are confirmed. Cancel The modified MAX statements are discarded again. GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.47 Creating a configuration file using WinConfig Admin... Customizes the ADMIN statement for the system. The following list window is displayed when this menu item is called: Figure 17 Dialog window: Admin system The list window always displays the current ADMIN settings for the system. Figure 17 shows the default setting. The statements displayed in the list window are transferred to a configuration file when they are saved. The current settings can be modified using the Del Statement and Add Statement buttons. ● Deleting a statement ◊ Mark an ADMIN statement in the display area with the left mouse button. ◊ Click on Del Statement with the left mouse button. ● Inserting a statement ◊ Enter the first and second parameters in the left or right input field beneath the display area. WinConfig always expects that both parameters will be entered. ◊ Click on Add Statement with the left mouse button. The buttons in the list window execute the following actions: OK The entered ADMIN statements are confirmed. Cancel The modified ADMIN statements are discarded again. GINA V4.0 System Administrator Guide – September 2000 127 Creating a configuration file using WinConfig Start... The Start menu item permits the customizing of the START and START_RM statements. A dialog window with five input fields is displayed when this menu item is activated: Figure 18 Dialog window: Start system The following table describes the dialog window entries; the “Statement” column specifies the corresponding statement that is generated by WinConfig when saving to a configuration file. Parameter name Value Default Statement Tasks Number of work processes none START Asyntasks Number of asynchronous work pro- none cesses START Tasks-in-Pgwt Number of tasks for PGWT tasks START DBVendor Name of the database vendor InforPossible values: mix Informix, Oracle, UDS or None Selected via a pull-down menu START_RM DBName Name of the database START_RM none none If a database vendor is defined in line 4 of the dialog box but line 5 is left blank, the application name of the corresponding GINA application is the database name. The buttons execute the following actions: 128 OK The entered parameter values are confirmed. Delete All parameter values are deleted. Cancel The modified parameter values are discarded again. GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.48 Creating a configuration file using WinConfig Rmxa... Customizes the RMXA statements. A dialog window with two input fields is displayed when this menu item is activated: Figure 19 Dialog window: RMXA system The following table describes the dialog window entries; the “Statement” column specifies the corresponding statement that is generated by WinConfig when saving to a configuration file. Parameter name Value Default Statement Informix XA interface used Possible values: Informix_C (XA-CAE interface), Informix-P (XA-P interface), None Informix_C RMXA Oracle XA interface used Possible values: Oracle_C (XA-CAE interface), Oracle-P (XA-P interface), None None RMXA Uds_spec Entry name of the database, if UDS is None used as the database system RMXA Uds_lib Name of the OML with connection module, if UDS is used as the database system RMXA None The buttons in the dialog box execute the following actions: OK The entered parameter values are confirmed. Delete All parameter values are deleted. Cancel The modified parameter values are discarded again. GINA V4.0 System Administrator Guide – September 2000 129 Creating a configuration file using WinConfig Timer... Customizes the statements for CYCLICTIME, CYCLICORDER, CYCLE, CHECK and CANCEL. The following dialog window is displayed when this menu item is called: Figure 20 Dialog window: Timer system The following table describes the dialog window entries; the “Statement” column specifies the corresponding statement that is generated by WinConfig when saving to a configuration file. Parameter name Value Default Statement Cyclictime Time interval for activation of the application-specific timer none CYCLICTIME Cyclicorder Maximum permitted cyclical tasks none CYCLICORDER Cycle Time interval in which events on the none client that have not yet been delivered are checked CYCLE Check Time interval after which an event on a client is incorporated in the check mechanism none CHECK Cancel Time interval after which an event on a client expires none CANCEL The time intervals are entered using four values for days, hours, minutes, seconds. Note that the individual values must be separated by a dot. The buttons in the dialog box execute the following actions: 130 OK The entered parameter values are confirmed. Delete All parameter values are deleted. Cancel The modified parameter values are discarded again. GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.49 Creating a configuration file using WinConfig Netaccess... Customizes the NETACCESS statement. The following dialog window is opened when this menu item is called: Figure 21 Dialog window: Netaccess system The following table describes the dialog window entries; the “Statement” column specifies the corresponding statement that is generated by WinConfig when saving to a configuration file. Parameter name Value Netaccess Default Statement Linking of the application to the network. Possible values: S-Thread (SINGLE-THREADED), M-Thread (MULTI-THREADED), M-Thread-All (MULTI-THREADED,ALL) NETACCESS The buttons in the dialog window execute the following actions: OK The entered parameter values are confirmed. Delete All parameter values are deleted. Cancel The modified parameter values are discarded again. GINA V4.0 System Administrator Guide – September 2000 131 Creating a configuration file using WinConfig Priority... The menu item is used to customize the PRIORITY statement in line with TAC class control. The following dialog window is displayed when this menu item is called: Figure 22 Dialog window: Priority-System The following table describes the dialog window entries; the “Statement” column specifies the corresponding statement that is generated by WinConfig when saving to a configuration file. 132 Parameter name Value Default Statement High Maximum number, the number of 0 processes in the application that can work concurrently with the TAC class with the priority HIGH. PRIORITY Medium Maximum number, the number of 0 processes in the application that can work concurrently with the TAC class with the priority MEDIUM. PRIORITY Low Maximum number, the number of 0 processes in the application that can work concurrently with the TAC class with the priority LOW. PRIORITY Sync_Wait Specifies for which of the three TAC classes synchronous calls are permitted. Possible values: HIGH, MEDIUM, LOW Selected via a pull-down menu PRIORITY GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.49 Creating a configuration file using WinConfig The buttons in the dialog window execute the following actions: OK The entered parameter values are confirmed. If the three parameter values for High, Medium, Low are equal to 0, WinConfig does not generate a PRIORITY statement. WinConfig outputs an error message if there is at least one parameter value equal to 0 and at least one parameter value not equal to 0. Delete All parameter values are deleted. Cancel The modified parameters are discarded again. GINA V4.0 System Administrator Guide – September 2000 133 Creating a configuration file using WinConfig Schedule... This menu item permits the input of entries for the SCHEDULE statement. The SCHEDULE statement is used to explicitly assign the specialist classes, class methods, instance methods and functions to the TAC classes with the priorities HIGH, MEDIUM and LOW (see section 6.2 on page 46). The following list window is displayed when this menu item is called: Figure 23 Dialog window: SCHEDULE-System The list window displays the current SCHEDULE statement entries for the system. There are no default settings. The elements displayed in the list window are transferred to a configuration file (within the Schedule block) when saved. The current settings can be modified using the Del Statement and Add Statement buttons. ● Deleting an entry ◊ Mark an entry in the display area with the left mouse button. ◊ Click on Del Statement with the left mouse button. ● Inserting an entry ◊ Insert the entry for the SCHEDULE statement in the input fields beneath the display area. The meaning of the input fields is as follows: 134 Input field 1 Allows you to enter one of the keywords CLASS, CLASSMETHOD, INSTMETHOD or FUNCTION. Input field 2 Allows you to enter the ClassId (not required if FUNCTION was entered in the first input field). Input field 3 Allows you to enter the ClassmethodID, InstMethodId, FunctionId (not required if CLASS was entered in the first input field CLASS). GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.50 Creating a configuration file using WinConfig Input field 4 ◊ Allows you to enter one of the keywords LOW, MEDIUM or HIGH (to define the TAC class). Click on Add Statement with the left mouse button. The buttons execute the following actions: OK The entered entries for the SCHEDULE statement are confirmed. Cancel The modified entries for the SCHEDULE statement are discarded again. GINA V4.0 System Administrator Guide – September 2000 135 Creating a configuration file using WinConfig Import... This menu item allows you to customize the IMPORT statement. The following list window is displayed when this menu item is called: Figure 24 Dialog window: IMPORT-System The list window always displays the current IMPORT statements for the system. There are no default settings. The statements displayed in the list window are transferred to a configuration file when they are saved. The current settings can be modified using the Del Statement and Add Statement buttons. ● Deleting a statement ◊ Mark an IMPORT statement in the display area with the left mouse button. ◊ Click on Del Statement with the left mouse button. ● Inserting a statement ◊ Enter the parameter (filename) for the IMPORT statement in the input field beneath the display area. ◊ Click on Add Statement with the left mouse button. The buttons execute the following actions: 136 OK The entered IMPORT statements are confirmed. Cancel The modified IMPORT statements are discarded again. GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.50 Creating a configuration file using WinConfig Area... This menu item allows you to customize the AREA statement. The following list window is displayed when this menu item is called: Figure 25 Dialog window: AREA-System The list window always displays the current AREA statements for the system. There are no default settings. The statements displayed in the list window are transferred to a configuration file when they are saved. The current settings can be modified using the Del Statement and Add Statement buttons. ● Deleting a statement ◊ Mark an AREA statement in the display area with the left mouse button. ◊ Click on Del Statement with the left mouse button. ● Inserting a statement ◊ Enter the mandatory parameter (data area name) for the AREA statement in the input field beneath the display area. ◊ Click on Add Statement with the left mouse button. Further optional parameters for this AREA statement can be entered by marking an AREA statement and clicking on More... with the left mouse button. A further dialog window is displayed: Figure 26 Dialog window: AREA-Param GINA V4.0 System Administrator Guide – September 2000 137 Creating a configuration file using WinConfig The following table describes the dialog window entries; the “Statement” column specifies the corresponding statement that is generated by WinConfig when saving to a configuration file. Parameter name Value Default Statement Access Mode of access to the additional data area. Possible values: DIRECT INDIRECT Selected via a pull-down menu. (This parameter only exists for OS_UNIX or OS_WINNT.) AREA Load Specifies when and where the data range is to be loaded. Possible values: STATIC POOL Selected via a pull-down menu. You must specify a poolname with POOL. (This parameter only exists for OS_BS2000.) AREA Poolname Name with which the data area in the com- None mon memory pool is loaded. (This parameter only exists for OS_BS2000.) AREA Load-Module Name of the load module in which the module (i.e. the data area which can be used jointly) is linked. (This parameter only exists for OS_BS2000.) None AREA Lib Program library from which the module is to be dynamically loaded or linked. (This parameter only exists for OS_BS2000.) None AREA The buttons in the dialog window execute the following actions: 138 OK The entered additional parameter values are confirmed. Delete All additional parameter values are deleted. Cancel The modified parameters are discarded again. GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.51 Creating a configuration file using WinConfig The buttons in the list window execute the following actions: OK The entered AREA statements are confirmed. Cancel The modified AREA statements are discarded again. Mpool... This menu item allows you to customize the Mpool statement. This statement is only of relevance for BS2000 hosts. The following list window is displayed when this menu item is called: Figure 27 Dialog window: Mpool-System The list window always displays the current MPOOL statements for the system. There are no default settings. The statements displayed in the list window are transferred to a configuration file when they are saved. The current settings can be modified using the Del Statement and Add Statement buttons. ● Deleting a statement ◊ Mark an MPOOL statement in the display area with the left mouse button. ◊ Click on Del Statement with the left mouse button. ● Inserting a statement ◊ Enter the two mandatory parameters (name of the common memory pool, number of 64K memory segments in the pool) for the MPOOL statement in the two input fields beneath the display area. ◊ Click on Add Statement with the left mouse button. Further optional parameters for this MPOOL statement can be entered by marking an MPOOL statement and clicking on More... with the left mouse button. A further dialog window is displayed: GINA V4.0 System Administrator Guide – September 2000 139 Creating a configuration file using WinConfig Figure 28 Dialog window: MPOOL-Param The following table describes the dialog window entries; the “Statement” column specifies the corresponding statement that is generated by WinConfig when saving to a configuration file. Parameter name Value Default Statement Access Defines the access authorization. Possible values: DIRECT INDIRECT Selected via a pull-down menu. - MPOOL Lib Identifies the object module library when switching programs using KDCLOAD. None MPOOL Page Sedecimal address in the form X'xxxxxxxxx' None MPOOL Scope Defines the scope of the common memory pool. Possible values: GLOBAL GROUP Selected via a pull-down menu. MPOOL Sharetab CSECT name of the KDCSHARE table to be None loaded in this common memory pool. MPOOL The buttons in the dialog window execute the following actions: 140 OK The entered additional parameter values are confirmed. Delete All additional parameter values are deleted. Cancel The modified parameters are discarded again. GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.52 Creating a configuration file using WinConfig The buttons in the list window execute the following actions: OK The entered MPOOL statements are confirmed. Cancel The modified MPOOL statements are discarded again. Dyn_Connect This menu item supports the definition of connections which are to be used by nontransaction-monitored dynamic clients for communication with transaction-monitored T-ORB applications (see section 6.2 on page 46). The Dyn_Connect menu item contains two submenu items: Dyn_Connect>System... This menu item allows you to customize the DYNAMIC_CONNECT statement. The following list window is displayed when this menu item is called: Figure 29 Dialog window: Dyn_Connect-System The list window always displays the current entries for the DYNAMIC_CONNECT statement for the system. There are no default settings. The entries displayed in the list window are transferred to a configuration file as parameters of the DYNAMIC_CONNECT statement when they are saved. The current entries can be modified using the Del Statement and Add Statement buttons. ● Deleting an entry ◊ Mark an entry in the display area with the left mouse button. ◊ Click on Del Statement with the left mouse button. GINA V4.0 System Administrator Guide – September 2000 141 Creating a configuration file using WinConfig ● Inserting an entry ◊ Insert the entries for the DYNAMIC_CONNECT statement in the two input fields beneath the display area. The meaning of the two input fields is as follows: ◊ Input field 1 Application name of the TA_APPLICATION for which connections are to be generated. Input field 2 Number of connections. Click on Add Statement with the left mouse button. The buttons in the list window execute the following actions: 142 OK The entered entries are confirmed. Cancel The modified entries are discarded again. GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.52 Creating a configuration file using WinConfig Dyn_Connect>not_inherit_for_hosts... This menu item allows you to input the hosts which are not to inherit the DYNAMIC_CONNECT statement from the system. The following list window is displayed when this menu item is called: Figure 30 Dialog window: Hosts (not inherit DYNAMIC_CONNECT) The list window always displays all hosts which are not to inherit the DYNAMIC_CONNECT statement from the system, i.e. when saving to a configuration file, WinConfig generates an empty DYNAMIC_CONNECT statement in the respective host block (if there are no hostspecific SCHEDULE entries). There are no default settings. The current settings can be modified using the Del Statement and Add Statement buttons. ● Deleting a host entry ◊ Mark a host name in the display area with the left mouse button. ◊ Click on Del Statement with the left mouse button. ● Inserting a host entry ◊ Enter the host name beneath the display area. ◊ Click on Add Statement with the left mouse button. The buttons in the list window execute the following actions: OK The entered host name are confirmed. Cancel The modified host name are discarded again. GINA V4.0 System Administrator Guide – September 2000 143 Creating a configuration file using WinConfig Hosts menu This menu allows you to modify the customizing settings for the hosts. MaxState... This menu item allows you to customize MAX statements for all hosts whose icons are open. The MAX statements are input in the same way as for the menu item System>MaxState.... There are no default values. Admin... This menu item allows you to customize ADMIN statements for all hosts whose icons are open. The ADMIN statements are input in the same way as for the menu item System>Admin.... There are no default values. Start... This menu item allows you to customize START and START_RM statements for all hosts whose icons are open. The statements are input in the same way as for the menu item System>Start.... There are no default values. Rmxa... This menu item allows you to customize RMXA statements for all hosts whose icons are open. The statements are input in the same way as for the menu item System>Rmxa.... There are no default values. Timer... This menu item allows you to customize CYCLICTIME, CYCLICORDER, CYCLIC, CHECK and CANCEL statements for all hosts whose icons are open. The statements are input in the same way as for the menu item System>Timer.... There are no default values. Netaccess... This menu item allows you to customize the NETACCESS statement for all hosts whose icons are open. The statements are input in the same way as for the menu item System>Netaccess.... There are no default values. 144 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.53 Creating a configuration file using WinConfig Priority... This menu item allows you to customize the PRIORITY statement for all hosts whose icons are open. The statements are input in the same way as for the menu item System>Priority.... Default values are the same as for System. Schedule... This menu item allows you to customize the SCHEDULE statement for all hosts whose icons are open. The entries are input in the same way as for the menu item System>Schedule.... There are no default values. Import... This menu item allows you to customize the IMPORT statement for all hosts whose icons are open. The statements are input in the same way as for the menu item System>Import.... There are no default values. Area... This menu item allows you to customize the AREA statement for all hosts whose icons are open. The statements are input in the same way as for the menu item System>Area.... There are no default values. Mpool... This menu item allows you to customize the MPOOL statement for all hosts whose icons are open. The statements are input in the same way as for the menu item System>Mpool.... There are no default values. Dyn_Connect... This menu item allows you to customize the DYNAMIC_CONNECT statement for all hosts whose icons are open. The entries are input in the same way as for the menu item System>Dyn_Connect>System.... There are no default values. GINA V4.0 System Administrator Guide – September 2000 145 Creating a configuration file using WinConfig TA-Apps menu This menu allows you to modify the customizing settings for the TA applications. MaxState... This menu item allows you to customize MAX statements for all TA applications whose icons are open. The MAX statements are input in the same way as for the menu item System>MaxState.... There are no default values. Admin... This menu item allows you to customize ADMIN statements for all TA applications whose icons are open. The ADMIN statements are input in the same way as for the menu item System>Admin.... There are no default values. Start... This menu item allows you to customize START and START_RM statements for all TA applications whose icons are open. The START and START_RM statements are input in the same way as for the menu item System>Start.... There are no default values. Rmxa... This menu item allows you to customize RMXA statements for all TA applications whose icons are open. The statements are input in the same way as for the menu item System>Rmxa.... There are no default values. Timer... This menu item allows you to customize CYCLICTIME, CYCLICORDER, CYCLIC, CHECK and CANCEL statements for all TA applications whose icons are open. The statements are input in the same way as for the menu item System>Timer.... There are no default values. Netaccess... This menu item allows you to customize the NETACCESS statement for all TA applications whose icons are open. The statements are input in the same way as for the menu item System>Netaccess.... There are no default values. 146 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.53 Creating a configuration file using WinConfig Priority... This menu item allows you to customize the PRIORITY statement for all TA applications whose icons are open. The statements are input in the same way as for the menu item System>Priority.... Default values are the same as for System. Schedule... This menu item allows you to customize the SCHEDULE statement for all TA applications whose icons are open. The statements are input in the same way as for the menu item System>Schedule.... There are no default values. Import... This menu item allows you to customize the IMPORT statement for all TA applications whose icons are open. The statements are input in the same way as for the menu item System>Import.... There are no default values. Area... This menu item allows you to customize the AREA statement for all TA applications whose icons are open. The statements are input in the same way as for the menu item System>Area.... There are no default values. Mpool... This menu item allows you to customize the MPOOL statement for all TA applications whose icons are open. The statements are input in the same way as for the menu item System>Mpool.... There are no default values. GINA V4.0 System Administrator Guide – September 2000 147 Creating a configuration file using WinConfig Bcamappl... This menu item allows you to customize the BCAMAPPL statement. When this menu item is called, the following list window is displayed for each TA application whose icon is open: Figure 31 Dialog window: BCAMAPPL The list window displays the current BCAMAPPL parameters for a specific TA application. There are no default settings. The BCAMAPPL parameters displayed in the list window are transferred to a configuration file when they are saved. The current parameters can be modified using the Del Statement and Add Statement buttons. ● Deleting a statement ◊ Mark a BCAMAPPL parameter in the display area with the left mouse button. ◊ Click on Del Statement with the left mouse button. ● Inserting a parameter ◊ Enter the parameter (appliname) for the BCAMAPPL statement in the input field beneath the display area. ◊ Click on Add Statement with the left mouse button. The buttons in the list window execute the following actions: 148 OK The entered BCAMAPPL parameters are confirmed. Cancel The modified BCAMAPPL parameters are discarded again. GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.54 Creating a configuration file using WinConfig Non-TA-Apps menu This menu permits the input of a UserId and Password for non-TA applications. Admin... The optional input of a UserId and Password is enabled in the non-TA application window for all non-TA applications whose icons are open. Foreign-Apps menu This menu can be used to modify the customizing settings for the foreign applications. Bcamappl... This menu item allows you to customize the BCAMAPPL statement for all foreign applications whose icons are open. The parameters of the BCAMAPPL statement are input in the same way as for the menu item TA-Apps>Bcamappl... . There are no default values. Links menu This menu supports the simultaneous generation/deletion of a number of sessions, connections and foreign sessions as well as the hiding and showing of selected sessions, connections and foreign sessions. Link This menu item contains the two submenus set Filter and Filter off: Link>set Filter For a better overview with larger configurations, all sessions, connections and foreign sessions of applications whose dialog boxes are not open can be hidden. This is done by calling the Link>set Filter menu. Link>Filter off Calling the Link>Filter off menu disables the filter and redisplays all sessions, connections and foreign sessions. GINA V4.0 System Administrator Guide – September 2000 149 Creating a configuration file using WinConfig Multi Link This menu item contains the two submenus Create Some and Erase Some. These two submenus can be used to generate or delete groups of sessions, connections and foreign sessions in a targeted manner. Link>Create Some The following dialog window opens when the Link>Create Some menu is called: Figure 32 Dialog window: Create links Patterns can be entered in each of the From Pattern and To Pattern input fields that define a group of applications for which sessions, connections or foreign sessions are to be created. WinConfig supports the following metacharacters in the patterns: * Any number of characters ? Exactly one character . ORing of two patterns For example, the a*.b? pattern represents all applications that start with an a as well as all applications that start with a b, followed by any other letter. The third input field defines the protocol used (default: LU6.1). The From->To and To-> From input fields specify the number of connections checked by the source application or target application respectively (default: 1 each). These two parameters are only of importance for sessions and foreign sessions. There are of no importance for a connection. WinConfig displays the number of sessions, connections or foreign sessions created using the Create links dialog in the sixth, seventh and eighth lines of the window. This information cannot be edited – it is calculated automatically. 150 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.55 Creating a configuration file using WinConfig The buttons in the dialog window execute the following actions: OK Generates all of the sessions/connections/foreign sessions between applications that were specified by the pattern entered. Delete Deletes the values entered by the user. Cancel Closes the dialog window. Link>Erase Some The following dialog window opens when the Link>Erase Some menu is called: Figure 33 Dialog window: Erase links Patterns can be defined in each of the From Pattern and To Pattern input fields that define a group of applications for which sessions, connections or foreign sessions are to be deleted. WinConfig recognizes the same metacharacters (*, ? and .) in the patterns as in the Link>Create Some menu item. WinConfig outputs the number of sessions, connections or foreign sessions deleted using the Erase links dialog in the third, fourth and fifth lines of the window. This information cannot be edited – it is calculated automatically. The buttons in the dialog window execute the following actions: OK Generates all of the sessions/connections/foreign sessions between applications that were specified by the pattern entered. Delete Deletes the values entered by the user. Cancel Closes the dialog window. GINA V4.0 System Administrator Guide – September 2000 151 Creating a configuration file using WinConfig Moves menu This menu allows the user to change the layout of the configuration file displayed in the WinConfig main window. Move Param Among other things, the Moves menu permits a group of applications to be shifted using the Right, Left, Up, Down menu items and the cursor keys. The Move Param... menu item is used to define which applications belong to a group. The following dialog window is opened when this menu item is called: Figure 34 Dialog window: Move Param A pattern can be entered in the upper input field by means of which the group of applications is specified. WinConfig recognizes the same metacharacters (*, ? and .) in a pattern as in the Link>Create Some menu item (see page 150). In the lower input field, the user defines the distance by which a group of applications is to be moved. The default value is 1. The buttons in the dialog box execute the following actions: OK The entered parameter values are confirmed. Delete All parameter values are deleted. Cancel The modified parameter values are discarded again. Right, Left, Up, Down You can use these menu items to move a group of applications (defined by the Move Param... menu item, see page 152) to the right, left, top or bottom by a specific delta (also specified using Param...). The movement can also be performed using the cursor keys. Grid on | off You can move a group of applications in grid formation if you call the Grid on | off menu. A mark at the lower edge of the open Moves menu (beside the Grid on | off menu item) shows that grid formation is enabled.If you call this menu item again, the grid format is disabled and the mark disappears again. 152 GINA V4.0 System Administrator Guide – September 2000 torb-kon Druck vom 24. 01.2001 17:00.55 Creating a configuration file using WinConfig 6.7.3 Mouse key assignments and mouse actions This section summarizes once again all of the mouse actions used by WinConfig and their effect. The most important mouse actions have already been explained in the preceding sections. Physical mouse key Position of the mouse cursor Mouse action Effect Left mouse button Menu bar Press Opens the menu Left mouse button Open menu Drag to a menu item Executes the action of the selected menu item Left mouse button Toggle button Click Selects one of the alternatives Left mouse button Pushbutton Click Executes the relevant action Left mouse button Host icon Click Opens the host dialogue window Left mouse button TA, non-TA or for- Double-click eign application icon Left mouse button Configures a session, connecTA, non-TA or for- Click, drag to eign application another applica- tion or foreign session between icon tion icon, click two application icons again Left mouse button Connecting line between two application icons Click Opens a session, connection or foreign session dialogue window Middle mouse button TA, non-TA or for- Click eign application icon The icon tracks the cursor movement until the next mouse click Middle mouse button Host icon label Press and drag to an input field Copies the label to the input field Right mouse button WinConfig window Press Pop-up menu for generating a new host, a new TA, non-TA or foreign application with WinConfig or for autoscrolling GINA V4.0 System Administrator Guide – September 2000 Opens the TA, non-TA or foreign application dialogue window 153 Creating a configuration file using WinConfig 154 Physical mouse key Position of the mouse cursor Mouse action Effect Right mouse button Pop-up menu for generating a new host, a new TA, non-TA or foreign application or for autoscrolling Drag to the menu item New Host, New TAApp, New NonTA-App, New Foreign-App or Autoscroll Depending on the menu selected, a new host, TA, non-TA or foreign application will be generated or autoscrolling activated GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:00.56 7 Configuring T-ORB for BEA TUXEDO This chapter describes how to configure communication between GINA applications. The configuration does not require any modifications to the source program. However, it cannot take place while the application is running; rather it must be performed before the application starts. The configuration of T-ORB is based on the configuration of BEA TUXEDO. Knowledge of the respective manuals will therefore aid comprehension. These manuals are listed under Related publications at the back of this manual. The WinConfig graphical user interface is only available on UNIX platforms and only for openUTM. ❍❍● 7.1 Overview To operate a distributed system on the basis of GINA, certain information must be known on the desired system structure, the current parameter settings of the host, and the characteristics of the GINA applications. The configuration tool described here records this information in the form of a general system description, from which it generates the data required by GINA. The information you must enter can be divided into the following parts (see Figure 35 on page 156): – – – specifications on system-wide settings, such as the participating systems specifications on host-specific parameters, such as operating system resources specifications on application-specific parameters, such as the number of work processes Practically speaking, some of the parameters can be specified in more than one of these areas. In such cases, the values set higher up in the hierarchy must be taken as default settings. These values are then overwritten by the settings in more specific areas. The desired settings can thus be specified separately for each application if required (customizing). If parameters are specified more than once at system level, they are then valid for the rest of the system level or until a new parameter is specified. GINA V4.0 System Administrator Guide – September 2000 155 Overview Figure 35 is a symbolic representation of the hierarchies in the definition of the system. It is not drawn to scale to reflect the scope of the individual sub-descriptions. System-wide settings Parameters valid throughout the system Participating host: H1, H2, etc. Host-specific parameters R1 R2 etc. Applications in R1, R2 etc. Application-specific parameters A1 Figure 35 A2 etc. The logical hierarchy when defining the communication structure of a system The communication structure of a system can be depicted by a graph with nodes and edges. The nodes correspond to the applications, while the edges represent the communication channels. The blocks in the diagram define the nodes of the graph with respect to the specific system, host or application. The edges of the graph represent the applications’ connections, with each application connected to all of the other applications. From the input data (which has already been explained), the configuration generator config-tux creates the following output data: 156 – for each host a GINA-specific address file containing all addressable server applications. – for each application a GINA-specific address file containing all addressable server applications and client applications. – for each transaction-monitored application a GINA-specific environment file preset with the definition of the GINACONFIG environment variable. GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:00.57 Overview – for the MASTER host a configuration file ubbconfig for the BEA TUXEDO transaction monitor and the shell scripts crbincf and crtlogs. – for each host a shell script crdevqu for setting up the “Queue Device”, “Queue Space” and “Queues” and for generating the database transaction manager. The configuration can be performed on a central computer for the entire system. The files created in the process must then be distributed to the target computers and installed there. The final tasks which must be performed locally are carried out during this installation. Moving the final tasks to the target computers eliminates the need to install the transaction monitor on the generation computer. Because the output data for the generation comprises only text files, the hardware and operating system independence of the configuration process is also guaranteed. You must observe the different ways in which UNIX and WindowsNT display the end of a line in a text file if the generation computer and the target computer are running different operating systems. In the first version of the configuration tool, the procedure is that change requests are sent to a central location and that a new configuration process will be implemented from there only. The configuration generator makes it easier to configure the runtime environment for T-ORB and T-ORB/Client. Revision generation is described in section 7.3 auf Seite 174. A central configuration is recommended for the following reasons: – It does not make sense to change the configuration on the local target computers because these modifications will be overwritten with the next global update process. – Another argument against changing the settings locally is that modifications to the hierarchy of the system often affect more than one host. It is precisely changes of this type that require consistency checks, which are not possible on the local level. GINA V4.0 System Administrator Guide – September 2000 157 Configuration language 7.2 Configuration language The configuration generator config-tux reads a text file which describes the configuration of the entire system in a T-ORB-specific language. This file contains the necessary information on the transaction monitor, the T-ORB, and the specialist application. The elements of the language include keywords, literals, separators and comments. Blanks, tabs, line feeds, form feeds and white spaces are ignored. The characters // introduce a comment, the line feed character terminates it. 7.2.1 Statements The configuration language contains a range of statements which are introduced by keywords; these are explained below. The statements may include numerous BEA TUXEDO parameters. The statements may contain two different styles: uppercase letters only or lowercase letters only. ❍❍● APPLICATION The APPLICATION statement describes a client which is connected via T-ORB/Client. It comprises the following components: – – – OsId of the application (NUMBER, 1 ... 32767) LayerId of the application (NUMBER, 1 ... 32767) User-friendly name of the application (LETTER) Example APPLICATION ( 131, 1, "CmdTrm1" ) CM_APPLICATION The CM_APPLICATION statement describes a conversational mode application on the current host (HOST). It comprises the following components: – – – – TP application name (LETTER, max. 30 characters) OsId of the application (NUMBER, -128 ... -32767 ) LayerId of the application (NUMBER, 1 .. .32767 ) User-friendly name of the application (LETTER) Customizing statements (MAX statements only) are permitted after the CM_APPLICATION description of a server. 158 GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:00.57 Configuration language Example CM_APPLICATION ( "CM1",-330, 1, "CM1" ) { ... } CM_PREFIX The CM_PREFIX statement defines a unique character string for each host which is used as a prefix when generating the parts resulting from conversational mode applications. The CM_PREFIX statement is mandatory if conversational mode applications are to be assigned to the host. The string may not exceed 5 characters and must start with a letter. Example CM_PREFIX ( "mch" ) CM_APPLICATIONS The CM_APPLICATIONS statement defines a list of conversational mode applications at system level. Each such list must be assigned a different number and can be copied to a host using the statement USE_CM_APPLICATIONS. Example CM_APPLICATIONS ( 20 ) { CM_APPLICATION ( "CM20",-220, 1, "CM20" ) { ... } ... } : HOST The HOST statement describes the configuration of a host. The HOST statement comprises the following components: – – – – – – – host name, max. 30 characters optional parameter MASTER or BACKUP Internet address of the host (INTERNETADDRESS) shared memory and semaphore key (KEYVECTOR) available port numbers (PORTADDRESS) host-specific customizing statements (MAX, OPENINFO) description of existing applications GINA V4.0 System Administrator Guide – September 2000 159 Configuration language Example HOST ( "Host2" ) { INTERNETADDRESS ( 127.0.0.2 ) KEYVECTOR ( 5005, 5040 ) PORTADDRESSES ( 2000, 2100 ) ... } INTERNETADDRESS The INTERNETADRESS statement is used to specify the current Internet address of the host. or the relative domain name of the domain name system. KEYVECTOR The KEYVECTOR statement contains the keys for the BEA TUXEDO areas: – a key to identify IPC resources for the “Queue Space” for each host with server applications The KEYVECTOR statement has the following parameters: – – start key end key MAX The MAX statement allows you to customize TP applications. At system level, the MAX statement applies to all hosts if there is no MAX statement of the same name in the HOST statement. The MAX statements with the names CM_IDLETIME, CM_IDLETIME_MS, ENVDIR, GINACONFIGDIR, MIN, MAX, REQUESTQUEUE,TMQF_IDLETIME and TMQF_TRANSACTIONTIME at host level apply accordingly to all server applications. The optional MAX statement has the following parameters: – – statement name (LETTER) value of the statement as a string The statement name IPCKEY must be defined at system level. If the configuration generator config-tux is called with the option -s, then GINACONFIGDIR must be defined at system level. 160 GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:00.57 Configuration language The statement names APPDIR (78), ENVDIR, GINACONFIGDIR, TLOGDEVICE (64), TUXCONFIG (64), TUXDIR (78) and QUEUEFILE (78) must be defined indirectly or directly for all server machines. The numbers in brackets indicate the maximum number of characters permitted in the parameter value. The statement names ENVFILE, LDBAL, LMID, MASTER, MODEL, OPTIONS and TYPE may not be specified as these statements are generated automatically. The statement names MAXDRT, MAXRFT and MAXRTDATA may not be specified as this functionality is not used. The statement names MESSAGES and PAGES are used to define the corresponding parameters of the qspacecreate utility routine. The default values are "MESSAGES" = "100" and "PAGES" = "2048". The statement name REQUESTQUEUE is used to control generation of the parameters REPLYQ and RQADDR for each server application in the file ubbconfig. The default value is "REQUESTQUEUE" = "N". The REPLYQ parameter specifies whether a separate REPLY-QUEUE will be set up (values: Y or N). See TUXEDO Administration Guide [2], Section 3 Services, Servers & Server Groups. The statement name TMQF_IDLETIME is used to control generation of the parameter -i idltime for each TMQFORWARD server in the file ubbconfig. -i idletime is not generated if this statement is omitted. The statement name TMQF_TRANSACTIONTIME is used to control generation of the parameter -t transactiontime for each TMQFORWARD server in the file ubbconfig. -t transactiontime is not generated if this statement is omitted. See TMQFORWARD – TUXEDO System/T Message Forwarding Server in [1]. The statement name CM_IDLETIME is used to control generation of the parameter -i idltime for each conversational mode server in the file ubbconfig. -i idletime is not generated if this statement is omitted. The statement name CM_IDLETIME_MS is used to control generation of the parameter -I idltime for each conversational mode server in the file ubbconfig. -I idletime is not generated if this statement is omitted. CM_IDLETIME and CM_IDLETIME_MS are mutually exclusive. Example MAX ( "CM_IDLETIME_MS" = "570" ) GINA V4.0 System Administrator Guide – September 2000 161 Configuration language OPENINFO The optional statement OPENINFO defines the Resource Manager. The parameters contain the following information: – – – the name of the database manufacturer the keyword APPLICATION or a string The current application name is used if APPLICATION is specified. the optional parameter TMS_NAME The default values is "TMS_INFX72". The OPENINFO statement at system level applies to all hosts unless the HOST statement contains an OPENINFO statement. The OPENINFO statement at host level applies to all TA applications unless the TA_APPLICATION statement contains an OPENINFO statement. Example OPENINFO ( "INFORMIX-OnLine" = APPLICATION, "TMS_INFX3") OPERATING_SYSTEM The optional OPERATING_SYSTEM statement defines the operating system of the host. Possible values are "OS_UNIX" and "OS_WINNT". The default value is OPERATING_SYSTEM( "OS_UNIX" ). The OPERATING_SYSTEM statement on system level applies to all hosts if there is no OPERATING_SYSTEM statement in the HOST statement. PORTADDRESSES The PORTADDRESSES statement contains the port numbers. The statement has the following parameters: – – first port number last port number Example PORTADDRESSES ( 5000, 5005 ) REPOSITORY The REPOSITORY statement defines the file name of a repository in the current directory. This repository contains the generation number for each of the OsId and LayerId pair. If the file exists, these values are read, saved internally, and used during generation. If the file does not exist, the values are generated automatically. The repository is written once generation of these values is concluded. 162 GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:00.58 Configuration language The repository supports generation for a modified configuration. If an application is removed, the same identifiers are used in the ubbconfig file for the remaining applications. The REPOSITORY statement is optional. If this statement is not specified, no memory is used in the generation. Example REPOSITORY ( "repository" ) START_VALUE The START_VALUE statement defines the first generation number that is used in the generation of identifiers in statements for the ubbconfig file. This results in unique reproductions of the OsId and LayerId pair in these identifiers. By specifying different start values, different subsystems that can be combined can be generated. The START_VALUE statement is optional. If this statement is not specified, generation of the identifiers starts with the value 1. If a repository exists, it is used to ascertain the generation numbers, i.e. the START_VALUE statement is ignored. Example START_VALUE ( 240800312 ) SYSTEM The SYSTEM keyword must always be the first keyword in the description. The current description is enclosed in braces, i.e. SYSTEM {...}. The flag DEBUG can be specified as an option: SYSTEM(DEBUG){...}. Scripts for WindowsNT, for example, will then be generated with ECHO ON. TA_APPLICATION The TA_APPLICATION statement describes a transaction-monitored application on the current host (HOST). It comprises the following components: – – – – TP application name (LETTER, max. 30 characters) OsId of the application (NUMBER, 1 ... 32767) LayerId of the application (NUMBER, 1 ... 32767) User-friendly name of the application (LETTER) Customizing statements (MAX and OPENINFO) are permitted after the TA_APPLICATION description of a server. GINA V4.0 System Administrator Guide – September 2000 163 Configuration language Example TA_APPLICATION ( "OS1", 1, 1, "OS1" ) { ... } USE_CM_APPLICATIONS The optional statement USE_CM_APPLICATIONS on the current machine (HOST) copies the conversational mode applications from the system level on this machine. Example 164 USE_CM_APPLICATIONS ( 50, 55 ) GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:00.58 Configuration language 7.2.2 Lexical structure This section describes how the configuration generator combines the contents of the configuration file into symbols (like the keywords) for syntax analysis. The description is in the notation used by the UNIX command lex. %{ %} letter DGS letter_or_digit [a-zA-Z_] [0-9]+ [a-zA-Z_0-9] %% [ \t\n\v\r\f]+ \/\/.*\n \{ \} \( \) \, \= \{DGS} ; ; {return(BBOPEN);} {return(BBCLOSE);} {return(SBOPEN);} {return(SBCLOSE);} {return(COMMA);} {return(EQUAL);} {return(MINUS);} {yylval.number=atol(yytext); return(NUMBER);} {DGS}\.{DGS}\.{DGS}\.{DGS} {strcpy(yylval.string,yytext); return(INADDRESS);}; \"[^"\n]* {yytext[yyleng++] = yyinput(); yytext[yyleng] = '\0'; lettercpy(yylval.string,yytext); return(LETTER);}; {letter}{letter_or_digit}* {return(rwlookup());}; . {return(CONFIG_ERROR);}; %% GINA V4.0 System Administrator Guide – September 2000 165 Configuration language 7.2.3 Syntax This section describes the syntax of the configuration language in the notation used by the UNIX command yacc. %{ %} %start sysblock %union { long char } %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token %token 166 number; string[80]; <number> NUMBER BACKUP DEBUG CM_PREFIX SYSTEM HOST APPLICATION CM_APPLICATION TA_APPLICATION MASTER MAX_STMT KEYVECTOR OPENINFO PORTADDRESSES INTERNETADDRESS REPOSITORY START_VALUE OPERATING_SYSTEM UFN USE_CM_APPLICATIONS <string> INADDRESS <string> LETTER BBOPEN BBCLOSE SBOPEN SBCLOSE /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* /* positive integer flag flag statement statement statement statement statement statement flag statement statement statement statement statement statement statement statement flag statement Internet address string with a..Z,0..9, _ { } ( ) */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ */ GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:00.58 Configuration language %token %token %token %token %% COMMA EQUAL MINUS CONFIG_ERROR /* /* /* /* , = error code (internal) sysblock : system BBOPEN sys_statement_list_opt multi_host BBCLOSE ; system : SYSTEM | SYSTEM SBOPEN DEBUG SBCLOSE ; */ */ */ */ sys_statement_list_opt : /* empty */ | sys_statement_list ; sys_statement_list : org_statement_list | ; s_statement_list_opt s_statement_list org_statement_list : org_statement | org_statement_list org_statement ; s_statement_list_opt : /* empty */ | s_statement_list ; s_statement_list : s_statement | s_statement_list s_statement ; GINA V4.0 System Administrator Guide – September 2000 167 Configuration language s_statement : statement | conv_mode_appls ; org_statement : start_value | repository | operating_system ; start_value : START_VALUE SBOPEN NUMBER SBCLOSE ; repository : REPOSITORY SBOPEN LETTER SBCLOSE ; operating_system : OPERATING_SYSTEM SBOPEN LETTER SBCLOSE ; statement : max | openinfo ; conv_mode_appls: conv_mode_appl_header conv_mode_appls_body ; conv_mode_appls_header : CM_APPLICATIONS SBOPEN NUMBER SBCLOSE ; conv_mode_appls_body : BBOPEN cm_appl_list BBCLOSE ; 168 cm_appl__list : cm_appl_s | cm_appl__list cm_appl_s ; cm_appl_s : cm_appl cm_attrib ; GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:00.59 Configuration language ta_attrib : /* empty */ | BBOPEN ta_appl_statement_list_opt BBCLOSE ; ta_appl_statement_list_opt : /* empty */ | ta_appl_statement_list ; ta_appl_statement_list : ta_appl_statement | ta_appl_statement_list ta_appl_statement ; ta_appl_statement : statement ; cm_attrib : /* empty */ | BBOPEN cm_appl_statement_list_opt BBCLOSE ; cm_appl_statement_list_opt : /* empty */ | cm_appl_statement_list ; cm_appl_statement_list : cm_appl_statement | cm_appl_statement_list cm_appl_statement ; cm_appl_statement : max ; GINA V4.0 System Administrator Guide – September 2000 169 Configuration language 170 openinfo : OPENINFO SBOPEN LETTER COMMA LETTER SBCLOSE | OPENINFO SBOPEN LETTER COMMA APPLICATION SBCLOSE | OPENINFO SBOPEN LETTER COMMA LETTER COMMA LETTER SBCLOSE | OPENINFO SBOPEN LETTER COMMA APPLICATION COMMA LETTER SBCLOSE ; max : max_header max_list_opt SBCLOSE ; max_header : MAX_STMT SBOPEN LETTER EQUAL LETTER ; max_list_opt : /* empty */ | COMMA max_list ; max_list : max_element | max_list COMMA max_element ; max_element : LETTER EQUAL LETTER ; multi_host : hostblock | multi_host hostblock ; hostblock : hostblock1 hostblock2 hostblock3 ; hostblock1 : HOST SBOPEN LETTER SBCLOSE /* Hostname */ | HOST SBOPEN LETTER COMMA MASTER SBCLOSE /* Hostname, MASTER */ | HOST SBOPEN LETTER COMMA BACKUP SBCLOSE /* Hostname, BACKUP */ ; GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:00.59 Configuration language hostblock2 : BBOPEN i_v_a host_statements_opt multi_applicat_opt BBCLOSE ; i_v_a : | | | ; internet_rest : vector address | address vector ; vector_rest : internet address | address internet ; address_rest : internet vector | vector internet ; hostblock3 : /* empty */ | after_host_statements ; /* empty */ internet internet_rest vector vector_rest address adddress_rest after_host_statements : after_statement | after_host_statements after_statement ; after_statement : statement | operating_system ; internet : INTERNETADDRESS SBOPEN INADDRESS SBCLOSE | INTERNETADDRESS SBOPEN LETTER SBCLOSE ; GINA V4.0 System Administrator Guide – September 2000 171 Configuration language host_statements_opt : /* empty */ | operating_system host_statement_list_opt | host_statement_list ; host_statement_list_opt : /* empty */ | host_statement_list ; host_statement_list : host_statement | host_statement_list host_statement ; host_statement : statement | cm_prefix | use_cm_applications ; cm_prefix : CM_PREFIX SBOPEN LETTER SBCLOSE : use_cm_applications : USE_CM_APPLICATIONS SBOPEN number_list SBCLOSE ; number_list : NUMBER | number_list COMMA NUMBER ; multi_applicat_opt : /* empty */ | multi_applicat ; multi_applicat : applicat | multi_applicat applicat ; 172 GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:00.59 Configuration language applicat : ta_appl ta_attrib | non_ta_appl | cm_appl cm_attrib ; /* server */ /* client */ /* conv. mode */ ta_appl : TA_APPLICATION SBOPEN LETTER COMMA NUMBER COMMA NUMBER COMMA LETTER SBCLOSE SBCLOSE ; nonta_appl : APPLICATION SBOPEN NUMBER COMMA NUMBER COMMA LETTER SBCLOSE ; cm_appl : CM_APPLICATION SBOPEN LETTER COMMA MINUS NUMBER COMMA NUMBER COMMA LETTER SBCLOSE ; vector : KEYVECTOR SBOPEN NUMBER COMMA NUMBER SBCLOSE ; address : PORTADDRESSES SBOPEN NUMBER COMMA NUMBER SBCLOSE ; %% GINA V4.0 System Administrator Guide – September 2000 173 Revision generation 7.3 Revision generation The purpose of the revision generation is as follows: when the configuration is revised, the generation for the applications not affected by the revision remain the same. Prerequisites The use of a repository is an absolute must for this revision generation (see the statement REPOSITORY on page 162). The repository must be created when generating the previous version or updated to the new status. When creating the ubbconfig file, the generator config-tux must generate unique identifiers for each application. The same identifiers must then be used in a revision generation like in the first generation. In the case of a first generation with an empty repository, a generation number is written to the repository for each application so that this number will be used to generate the identifiers (see the statement START_VALUE on page 163). Performing the revision generation The user must perform the following steps when revising the configuration so that no user data is lost from an application: – Adapt the configuration file The modifications to the configuration, e.g. new hosts and new applications must be defined in the input file of the configuration generator config-tux. – Perform the generation The generator reads the configuration file and generates, among other things, the generation file ubbconfig and shell scripts. The following steps must be performed on all hosts affected by the modifications: 174 – Terminate the application normally The application must be terminated using the command tmshutdown -y on the MASTER host. – Execute scripts – Restart the applications GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:01.00 Sample configuration file 7.4 Sample configuration file This section illustrates the syntactic structure using a sample configuration. SYSTEM { // // system-wide MAX statements. // MAX( "IPCKEY" = "65024" ) MAX( "APPDIR" = "/tmp/appdir" ) MAX( "ENVDIR" = "/tmp/appdir/envdir" ) MAX( "GINACONFIGDIR" = "/tmp/appdir/ginaconfigdir" ) MAX( "TUXCONFIG" = "/tmp/tuxconfig/TUXCONFIG" ) MAX( "TUXDIR" = "/opt/TUXEDO" ) MAX( "QUEUEFILE" = "/tmp/queuefile/QUE" ) MAX( "MIN" = "2" ) MAX( "MESSAGES" = "111" ) // // first operating system of the system. // in this example the hostname is // used as symbolic name. // HOST("kotw002", BACKUP) { // // internetaddress of first host. // INTERNETADDRESS(192.200.94.8) // // available shared memory and semaphore keys. // KEYVECTOR(5011,5047) // // available port addresses. // PORTADDRESSES(10111,10126) GINA V4.0 System Administrator Guide – September 2000 175 Sample configuration file // // first application of first operating system. // a1 is the utm known application name. // buslay is the user friendly name. // TA_APPLICATION("a1",1,1,"buslay") { } TA_APPLICATION("a2",1,2,"servlay") } HOST("kotw005") { INTERNETADDRESS(192.200.94.4) KEYVECTOR(5000,5015) PORTADDRESSES(10114,10135) TA_APPLICATION("a1",1,3,"nwlay") TA_APPLICATION("a2",1,4,"nellay") APPLICATION(1,5,"client1") APPLICATION(1,6,"client2") APPLICATION(1,7,"client3") } } 176 GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:01.00 Call and options 7.5 Call and options The configuration generator config-tux is called as follows: config-tux [-s] [-u] [-v] [-V] configfile -s The -s option outputs the addressing and name server data in a compact format. -u The -u option outputs the call syntax. -v With the verbose option, generator messages are output to stdout. -V If -V is specified, only the version message is output to stdout and execution of the program is terminated. For configfile, you must specify the name of your configuration file. GINA V4.0 System Administrator Guide – September 2000 177 Generated files 7.6 Generated files The configuration generator config-tux analyzes a description file and generates from it resource files and configuration scripts for the runtime environment of the distributed system. Some of the generated files are host-specific and some are application-specific. config-tux creates a directory tree in the current directory. The basic structure of this tree is illustrated in Figure 36. There is a subdirectory for each host under the root system. Each of these host subdirectories bears as its name the descriptive name from the HOST statement. All of these subdirectories also have their own subdirectories bearing the names of the applications which are to run on the respective hosts. System Host name User-friendly name Figure 36 Host name User-friendly name User-friendly name Model of the directory structure as created by config The files created by config-tux are incorporated directly into the runtime environment of the distributed application. The scripts are generated in accordance with the operating system of the host on which the relevant T-ORB application is to run and must be executed under this operating system. – The configuration file ubbconfig and the scripts crbincf and crtlogs are created for the MASTER host, i. e. the shell /bin/sh must exist on the relevant UNIX host (suffix .sh) or the command line interpreter must exist on the WindowsNT host (suffix .cmd). – The script crdevqu is created for the other server hosts. – Batch processing files *.cmd are generated for the WindowsNT operating system. Certain conditions must be satisfied before the scripts are executed: – 178 The directories and files specified using the parameters APPDIR, ENVDIR, GINACONFIGDIR, TLOGDEVICE, TUXCONFIG and QUEUEFILE must be set up on all server hosts. GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:01.00 Generated files – The BEA TUXEDO daemon process tlisten must be started on all server hosts. – The scripts must be executed in the order crbincf (MASTER), crdevqu (MASTER and then on all server hosts) and crtlogs (MASTER). Make sure that each one executes correctly. 7.6.1 Generated files for UNIX hosts readme The readme file is generated in the system directory. This file contains a list of the server host names with the related port numbers of the BEA TUXEDO system processes tlisten and WSL. gina.config ● Generation without the -s option A file gina.config is generated for each T-ORB application (TA_APPLICATION) and T-ORB/client application (APPLICATION). It acts as a directory for addressable applications. For T-ORB applications and T-ORB clients, this file is generated in the directory assigned to the application. ● Generation with the -s option The file gina.config is the same for all server hosts and is therefore created once in the system directory. This file is not created for T-ORB applications and T-ORB clients. <user_friendly_name>.evf ● Generation without the -s option For T-ORB applications, this file is generated in the directory assigned to the application. It contains the definition of the GINACONFIG environment variable. GINACONFIG=<gina_config_path>/<user_friendly_name> The application reads this file after it starts and sets the environment variables. ● Generation with the -s option The file is created with the name gina.evf in the host directory. GINA V4.0 System Administrator Guide – September 2000 179 Generated files ubbconfig The ubbconfig configuration file is generated in the directory assigned to the MASTER host. It contains configuration data for the BEA TUXEDO transaction monitor. crbincf.sh The script crbincf.sh calls the BEA TUXEDO utility routine tmloadcf and should only be executed on the MASTER host. crdevqu.sh The script crdevqu.sh is called with one parameter. The values which the parameter can assume are -y or -d or -q or -t, where -y contains the values -d, -q and -t. If you specify -d, the BEA TUXEDO utility routine tmadmin (function crdl) will be called, if you specify -q, qmadmin (functions crdl, qspacecreate and qcreate) will be called and if you specify -t, buildtms will be called. The script must be executed on all server hosts, first on the MASTER host, then on the other server hosts. The files needed for queues and transaction logs are generated during execution of the script. crtlogs.sh The script crtlogs.sh calls the BEA TUXEDO utility routine tmadmin and is only to be executed on the MASTER host. The log files for backing up the transactions (function crlog) for all server hosts are set up during execution of the script. 180 GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:01.01 Generated files 7.6.2 Generated files for WindowsNT hosts readme The readme file is generated in the system directory. This file contains a list of the server host names with the related port numbers of the BEA TUXEDO system processes tlisten and WSL. gina.config ● Generation without the -s option A file gina.config is generated for each T-ORB application (TA_APPLICATION) and T-ORB/client application (APPLICATION). It acts as a directory for addressable applications. For T-ORB applications and T-ORB clients, this file is generated in the directory assigned to the application. ● Generation with the -s option The file gina.config is the same for all server hosts and is therefore created once in the system directory. This file is not created for T-ORB applications and T-ORB clients. <user_friendly_name>.evf ● Generation without the -s option For T-ORB applications, this file is generated in the directory assigned to the application. It contains the definition of the GINACONFIG environment variable. GINACONFIG=<gina_config_path>/<user_friendly_name> The application reads this file after it starts and sets the environment variables. ● Generation with the -s option The file is created with the name gina.evf in the host directory. ubbconfig The ubbconfig configuration file is generated in the directory assigned to the MASTER host. It contains configuration data for the BEA TUXEDO transaction monitor. GINA V4.0 System Administrator Guide – September 2000 181 Generated files crbincf.cmd The script crbincf.cmd calls the BEA TUXEDO utility routine tmloadcf and should only be executed on the MASTER host. crdevqu.cmd The script crdevqu.cmd calls the BEA TUXEDO utility routines tmadmin (function crdl), qmadmin (functions crdl, qspacecreate and qcreate) and buildtms. The script must be executed on all server hosts, first on the MASTER host, then on the other server hosts. The files needed for queues and transaction logs are generated during execution of the scripts. The WindowsNT version of this script does not need any parameters, i. e. -y is the default value here. crtlogs.cmd The script crtlogs.cmd calls the BEA-TUXEDO utility routine tmadmin and is only to be executed on the MASTER host. The log areas for backing up the transactions (function crlog) for all server hosts are set up during execution of the script. The three scripts crbincf.cmd, crdevqu.cmd and crtlogs.cmd must be executed in this order. 7.6.3 Example The file structures illustrated in Figure 37 and 38 is an example of the structure created for the sample configuration file on page 175. 182 GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:01.01 Generated files Directory crtlogs kotw002 ubbconfig buslay buslay.evf Figure 37 crbincf crdevqu kotw005 crdevqu servlay nwlay servlay.evf gina.config readme system Text file nwlay.evf gina.config client1 nellay client2 client3 nellay.evf gina.config gina.config gina.config File structure for the example of generation without the -s option Directory readme system Text file gina.config crdevqu crtlogs kotw002 kotw005 gina.evf ubbconfig buslay crbincf gina.evf crdevqu servlay nwlay nellay client1 client2 client3 gina.config Figure 38 ... ... File structure for the example of generation with the -s option GINA V4.0 System Administrator Guide – September 2000 183 BEA TUXEDO domains 7.7 BEA TUXEDO domains A BEA TUXEDO domain refers to an administrative unit, a BEA TUXEDO application, which is independent of other BEA TUXEDO applications. These independent domains can, however, communicate with each other using gateways, i. e. services which offer and export a domain can be imported into another domain and then called. A BEA TUXEDO application (domain) refers to a system where all BEA TUXEDO services made known through the configuration are managed from a central location. Several machines can be part of a single BEA TUXEDO application. Domains allow one large BEA TUXEDO application to be split up into smaller, manageable parts. The information you must enter can be divided into four parts (see Figure 35 on page 156): – – – – specifications on system-wide settings, such as the participating domains specifications on domain-wide settings, such as the participating hosts specifications on host-specific parameters, such as operating system resources specifications on application-specific parameters, such as the number of work processes Practically speaking, some of the parameters can be specified in more than one of the four areas. In such cases, the values set higher up in the hierarchy must be taken as default settings. These values are then overwritten by the settings in more specific areas. The desired settings can thus be specified separately for each application if required (customizing). If parameters are specified more than once at system level, they are then valid for the rest of the system level or until a new parameter is specified. Figure 35 on page 156 is a symbolic representation of the hierarchies in the definition of the system. It is not drawn to scale to reflect the scope of the individual sub-descriptions. 184 GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:01.01 BEA TUXEDO domains 7.7.1 Statements DOMAIN The DOMAIN statement defines the name of the domain and describes its configuration. – domain name, max. 30 characters – domain-specific customizing statements (MAX, OPENINFO) – description of the host Example DOMAIN ( "Domain1" ) { START_VLAUE( MAX ... HOST ("Host1",MASTER) { ... } ... } EXPORT The keyword EXPORT attributes a TA_APPLICATION (...,EXPORT). This application will then be exported by the domain. Hosts can also be attributed in this way: HOST (...,EXPORT). All server applications will then export this host. IMPORT The optional statement IMPORT in the current domain (DOMAIN) imports server applications from other domains. The applications are defined by the numeric pair OsId and LayerId. The user-friendly name of the application or a host name can also be used instead of the numeric pair. If a host name is specified, all exported server applications of this host will be imported. Example IMPORT (( 50, 55 ), (47, 11), ... ) IMPORT (UFN = "userfn", HOST = "Host2", ... ) GINA V4.0 System Administrator Guide – September 2000 185 BEA TUXEDO domains 7.7.2 Syntax sysblock : SYSTEM BBOPEN sys_statement_list_opt system_body BBCLOSE ; system_body : multi_host | multi_domain ; multi_domain : domain_block | multi_domain domain_block ; domain_block : domain_block1 domain_block2 domain_block3 ; domain_block1 : DOMAIN SBOPEN LETTER SBCLOSE ; domain_block2 : BBOPEN domain_statement_list multi_host BBCLOSE ; domain_block3 : /* empty */ | after_domain_statement_list ; domain_statement_list : domain_statement | domain_statement_list domain_statement ; domain_statement : | | | | ; 186 statement operating_system start_value import conv_mode_appls GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:01.02 BEA TUXEDO domains after_domain_statement_list : after_domain_statement | after_domain_statement_list after_domain_statement ; after_domain_statement : statement | operating_system ; import : IMPORT SBOPEN import_list SBCLOSE ; import_list : import_element | import_list COMMA import_element ; import_element : | | | ; SBOPEN NUMBER COMMA NUMBER SBCLOSE HOST = LETTER UFN = LETTER LETTER /* user friendly name */ GINA V4.0 System Administrator Guide – September 2000 187 BEA TUXEDO domains 7.7.3 Example of a configuration file with domains // // // // // // // // Configuration File: Version: Description: Changes: file for the DOMSTEST for NT %M% %I% %E% source file for config-tux Adapted to GINA on TUXEDO Adapted to Windows NT SYSTEM { REPOSITORY("repository") OPERATING_SYSTEM("OS_WINNT") MAX("IPCKEY"="0x0e011") MAX("TUXDIR"="c:\tuxedo") MAX("TUXCONFIG"="c:\domaintest\bin\tuxconfig") MAX("BDMCONFIG"="c:\domaintest\bin\bdmconfig") MAX("TLOGDEVICE"="c:\domaintest\bin\TLOG") MAX("QUEUEFILE"="c:\domaintest\bin\QUE") MAX("APPDIR"="c:\domaintest\bin") MAX("GINACONFIGDIR"="c:\domaintest\bin") MAX("ENVDIR"="c:\domaintest\bin") MAX("MAX"="10") MAX("REQUESTQUEUE"="Y") DOMAIN("dom_nt") { MAX("IPCKEY"="0x0e011") START_VALUE(125) IMPORT((2,1),(3,1)) HOST("M19041PP",MASTER) { INTERNETADDRESS("m19041pp") KEYVECTOR(6210,6299) PORTADDRESSES(4049,4055) OPERATING_SYSTEM("OS_WINNT") TA_APPLICATION("DT_OS",1,1,"dt_os1",export) { MAX("MIN"="2") } 188 GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:01.02 BEA TUXEDO domains APPLICATION(1,9,"client1") APPLICATION(2,9,"client2") APPLICATION(3,9,"client3") } } DOMAIN("dom_sun") { MAX("IPCKEY"="0x0e011") START_VALUE(250) IMPORT((1,1)) MAX("GINACONFIGDIR"="/tmp/domaintest/bin") MAX("ENVDIR"="/tmp/domaintest/bin") HOST("m61930pp",MASTER) { INTERNETADDRESS("m61930pp") KEYVECTOR(6210,6299) PORTADDRESSES(4049,4055) OPERATING_SYSTEM("OS_UNIX") MAX("TUXDIR"="/opt/TUXEDO") MAX("TUXCONFIG"="/tmp/domaintest/bin/tuxconfig") MAX("BDMCONFIG"="/tmp/domaintest/bin/bdmconfig") MAX("TLOGDEVICE"="/tmp/domaintest/bin/TLOG") MAX("QUEUEFILE"="/tmp/domaintest/bin/QUE") MAX("APPDIR"="/tmp/domaintest/bin") TA_APPLICATION("DT_OS",2,1,"dt_os2",export) { MAX("MIN"="2") } TA_APPLICATION("DT_OS",3,1,"dt_os3",export) { MAX("MIN"="2") } APPLICATION(1,9,"client1") APPLICATION(2,9,"client2") APPLICATION(3,9,"client3") } } } GINA V4.0 System Administrator Guide – September 2000 189 BEA TUXEDO domains 7.7.4 Generated files dmconfig The configuration file dmconfig is generated in the directory assigned to the MASTER host. This file contains configuration data for the BEA TUXEDO domain. The scripts crbincf.sh and crbincf.cmd call the BEA TUXEDO utility routine dmloadcf. Figure 39 illustrates the file structure for the sample configuration file on page 188. Directory File system readme dom_nt gina.config M19041pp gina.evf gina.config m61930pp gina.evf crbincf.cmd crtlogs.cmd ubbconfig crbincf.sh crtlogs.sh ubbconfig crdevqu.cmd Figure 39 190 dom_sun dmconfig crdevqu.sh dmconfig File structure for the example of a configuration file with domains (generation with the -s option) GINA V4.0 System Administrator Guide – September 2000 torbkontux Druck vom 24. 01.2001 17:01.03 BEA TUXEDO domains 7.7.5 Special points CM_APPLICATIONS The CM_APPLICATIONS statement defines a list of conversational mode applications at domain level. MAX The MAX statement with the name BDMCONFIG (64) must be defined for the MASTER host. The BDMCONFIG environment variable is used by BEA TUXEDO to locate the file BDMCONFIG (binary). REPOSITORY If a REPOSITORY statement was specified at system level, then a separate repository file with the name < String from the repository statement > . < domain name > .rep will be created for each domain. The CM applications will be stored in the repository with the name < String from the repository statement > .rep If these repositories are present when a new generation operation is carried out, they are read in prior to analysis of the input and recreated as part of a successful generation. START_VALUE The START_VALUE statement is a mandatory statement for each domain. A different value must be specified for each domain to facilitate the import and/or export of applications, i. e. the difference must exceed 99. The START_VALUE statement at system level defines a generation number which is used when generating all conversational mode applications. Call and options The following options are supported in connection with the generation of domains: -i repository-file Imports the repository file. The repository file describes a domain from which server applications are imported. This domain is not part of the input file. GINA V4.0 System Administrator Guide – September 2000 191 BEA TUXEDO domains 192 GINA V4.0 System Administrator Guide – September 2000 sys-adm Druck vom 24. 01.2001 17:01.03 8 Operating GINA applications This chapter provides an introduction to the runtime administration of configured GINA applications. 8.1 Communication administration 8.1.1 Communication structure of a server application Communication in GINA is based on the openUTM transaction monitor. Its functionality with respect to transaction-monitored message interchange and restart is thus inherited in the event of error. With the support of the XA interface, data storage is also integrated in this transaction bracket. Knowledge of the administration and diagnostic options offered by UTM is required for the successful operation of (networked) GINA applications. A precise description of the concepts involved can be found in the Developer Manual [13]. The description of the network in the configuration generator determines which partners can communicate with each other and in what way (chapter 6 on page 43). 8.1.2 Communication structure of a client application Unlike the transaction-monitored communication between server applications, client applications (generally as GUI applications) connect to server applications using non-transaction-monitored protocols. Here too, knowledge is required of the underlying openUTM-Client product and the diagnostic tools. A precise description can be found in the corresponding manuals on openUTM and openUTM-Client or in the communication protocols used by openUTM [29], [31]. GINA V4.0 System Administrator Guide – September 2000 193 DB administration 8.2 DB administration The database system INFORMIX Dynamic Server 2000 Version 9.2 is used for data storage within the Persistency Service. This results in a range of tasks for DB administration which can be completed with the aid of appropriate utilities. As already described, the transaction monitor and the database are synchronized by the XA protocol. It must be ensured that this link is supported in the current installation. The main tasks in operating the database lie in the area of precautionary backup and tuning in the distribution of data on the available storage media. In this case too, knowledge is required of the respective service functions in the database system, which are described in the relevant manuals. 8.2.1 Security management The database system allows you to log events in an audit procedure in order to obtain information on the activities of users or user groups, particularly in relation to attempts to acquire rights for themselves or others. The ID of the database administrator (informix) should always be monitored by the audit function. In Version 9.2 of INFORMIX Dynamic Server 2000, the functionality of the database administrator can also be distributed over a number of roles in order to improve the separation of administration and security functions. The actual steps involved are described in the relevant manuals [21]. Moreover, access rights to database objects (tables, procedures) can be assigned on the level of the GRANT and REVOKE function. A precise description can be found in [16]. 8.2.2 Data backup This aspect is concerned with the use of backed up data to fully or partially recover a database which can no longer be used due to the failure of a disk drive, for example. This type of backup archive is created and subsequently recovered with the aid of utilities which are provided by the database system. The task of the database administrator is to minimize the effort involved, whilst working on the basis of restoring a database securely. The backup can be installed as an automatic process, whereby utilities of the INFORMIX database system, such as onarchive, can be used in conjunction with onautovop.1) An important function in increasing availability lies in the use of RAID memory or in the utilization of the database function to mirror disk areas (chunks). 1) 194 The dbexport and dbimport commands from INFORMIX-OnLine do not back up the full information on the status of the XA interface. You should therefore never use these commands to back up data. GINA V4.0 System Administrator Guide – September 2000 sys-adm Druck vom 24. 01.2001 17:01.04 DB administration Should a recovery procedure be required, manual interception to diagnose the error on the one hand and rectify it on the other (replace the faulty component) is generally necessary. Only then can the data recovery be performed from the backup archives using the appropriate programs (onarchive). This process can take a long time, during which the database can only be partially used or not at all. If this cannot be tolerated in reality (error-protected 24-hour operation), additional replica databases can be installed on a secondary system, with the option of automatically switching over to the replica in the event of error. Of course, this also means that appropriate access possibilities (connections) are required to communicate with this secondary system. A detailed description of these topics can be found in the appropriate manuals for the database system [19], [20], [21]. 8.2.3 Logging database errors GINA allows you to log INFORMIX errors in a file for the purpose of debugging during the development phase. If the GINA_DBPROT environment variable is set when the application is started, database errors at SQL level are logged to the file specified by the value in this variable. In the case of errors in filter iterators, the relevant select statement is output before the INFORMIX error message. GINA_DBPROT must contain a valid file name. The file is created automatically if it does not yet exist. If the file already exists, new error messages are simply appended to the existing file. GINA V4.0 System Administrator Guide – September 2000 195 Starting and stopping GINA applications 8.3 Starting and stopping GINA applications 8.3.1 Environment variables Please note that certain environment variables must be set so that GINA applications can run. These variables are explained in section 3.3.5 on page 21. 8.3.2 Transaction-monitored applications A GINA application which is based on the T-ORB service is made available by a start process. This means that authorized partners can connect to the application following a successful start in order to use its functions. The start process itself is implemented by the shell script utmstart.multi. The script is created during the production process of an application with the aid of the configuration generator. Setting the -r option creates the kdcdf script, whose execution then results in the creation of the start script. An application is terminated using the administration (see section 8.4 on page 199). Before a GINA application is started, the database instance with which the application works must be available. With INFORMIX, this can be achieved using the interactive program onmonitor or the program oninit. These programs and the necessary environment variables are described in [21]. 8.3.3 Non-transaction-monitored applications When using a database with NLS functionality, you must ensure that the appropriate environment variables (DBNLS, LANG) are set. A description can be found in [18]. Event Handler The DomsEventHandler (contained in the bin directory of the GINA installation) must be available as a daemon process/NT service for all machines running non-transaction-monitored applications. We recommend that this daemon process be started in the boot script. The DomsEventHandler is required for local communication to the T-ORB/Client application; the daemon process informs this application that a message has arrived at the GINA application. A description of the interoperation of the participating partners can be found in the Developer Manual [13]. Communication via the Event Handler is based on the TCP/IP protocol and thus requires one of corresponding entries in the system file 196 GINA V4.0 System Administrator Guide – September 2000 sys-adm Druck vom 24. 01.2001 17:01.04 Starting and stopping GINA applications UNIX /etc/services NIS /etc/yp/services WindowsNT %WINDIR%\system32\drivers\etc\services The entry comprises the following parts: Name domsehd Port# free, nonprivileged port number Type tcp Example The following entry would be made for port 7419: domsehd 7419/tcp # DomsEventHandler Dynamic Connection Handler The DomsDynConnectHandler (resides in the bin directory of the GINA installation directory) must be available as a daemon process for all machines on which dynamic T-ORB/ client applications (type 7, 8) run. The Dynamic Connection Handler needs the file gina.dynamic in order to run. By default it expects this file to be in the directory in which it (the Dynamic Connection Handler) is started. The environment variable GINA_DYNAMIC can be used to specify the name of a different directory in which the file gina.dynamic is to be read. Communication with the DomsDynConnectHandler is based on the TCP/IP protocol and therefore requires an appropriate entry in the system file /etc/services or in /etc/yp/ services when using NIS. The entry comprises the following elements: Name domschd Port# Free, non-privileged port number Type tcp Example The following entry would be required for the port 7420: domschd 7420/tcp # DomsDynConnectHandler GINA V4.0 System Administrator Guide – September 2000 197 Starting and stopping GINA applications Event Handler and Dynamic Connection Handler under WindowsNT The DomsEventHandler and the DomsDynConnectHandler are installed under WindowsNT as services which are automatically started when the system starts. The port number must be entered as described above in the file: C:\WINNT\system32\drivers\etc\Services Make sure that the lines end with an end of line character. Dynamic T-ORB/clients Dynamic clients need the files gina.config and upicfile to run (see section 6.5 on page 94). By default, a dynamic client looks for these files in the directory in which it is started. The environment variables GINACONFIG and UPICPATH can be used to select a directory other than “.” for the file gina.config or upicfile. 198 GINA V4.0 System Administrator Guide – September 2000 sys-adm Druck vom 24. 01.2001 17:01.04 Administering GINA applications 8.4 Administering GINA applications 8.4.1 TP monitor While an application is active, the administrator can decide to query information on the status and load or to interrupt the sequence. He/she uses the dtp script that is also created by the configuration generator to perform these activities. The administrator then gets a local dialog interface to the application by means of which he/she can execute control functions, for example the controlled termination of the application as well as the attachment and reattachment of resources. In this context, it is important to consider the possibility of customizing applications to changing environments, such as the connection of new partners or new functions. A description of the complete range of functions can be found in the openUTM administration User Guide [27]. 8.4.2 Cyclical timer When a transaction-monitored application is started, T-ORB activates a cyclical timer that activates monitoring of the alarms (cf. section 8.4.3 on page 200) at specific intervals. The interval is specified by the CYCLICTIME(d,h,m,s) parameter of the T-ORB generator config when the configuration is being created. The T-ORB generator config generates the gina.config file for each transaction-monitored application in which the interval for the cyclical timer is stored (see Figure 40). CTL1 0 0 10 0 Figure 40 // corresponds to CYCLICTIME(0,0,10,0) Time interval of the cyclical timer in gina.config If the interval is to be changed while the transaction-monitored application is running, the gina.config file must be modified using a suitable editor (e.g. vi) and then the DNEWCYCA administration command activated using the administration facility (see section 8.4.1 on page 199). GINA V4.0 System Administrator Guide – September 2000 199 Administering GINA applications 8.4.3 Monitoring alarms The delivery of an alarm to a non-transaction-monitored application is broken up into two parts. The partner is first informed of the event “Message n exists” via the auxiliary process EventHandler, and then the message is collected. The termination of the non-transaction-monitored partner or the EventHandler, for example as a result of a power failure, can result in alarms being lost during delivery. To prevent this, T-ORB provides a mechanism that monitors the delivery of alarms to nontransaction-monitored partners. T-ORB checks at certain intervals whether alarms that were announced to the partner via the EventHandler have actually been collected. If this is not the case, T-ORB announces them again. The time intervals are defined by the CYCLE(d,h,m,s), CHECK(d,h,m,s) and CANCEL(d,h,m,s) parameters in the EVENTCONTROL statement of the T-ORB generator config when the configuration is being created. For each transaction-monitored application, the T-ORB generator config generates the gina.config file, in which the intervals for the monitoring of alarms are stored (see Figure 41). CTL2 0 0 10 0 100 CTL3 0 1 0 0 CTL4 2 0 0 0 Figure 41 // corresponds to CHECK(0,0,10,0) // corresponds to CHECK(0,1,0,0) // corresponds to CANCEL(2,0,0,0) Time intervals for the monitoring of alarms If these time intervals are to be changed while the transaction-monitored application is running, the gina.config file must be modified using a suitable editor (e.g. vi) and then the DNEWCYCA administration command activated using the administration facility (cf. section 8.4.1 on page 199). 200 GINA V4.0 System Administrator Guide – September 2000 sys-adm Druck vom 24. 01.2001 17:01.05 Administering GINA applications 8.4.4 Cyclical tasks The number of cyclical tasks that a transaction-monitored application can place at one time is limited. It is defined by the CYCLICORDER(n) parameter of the T-ORB generator config when the configuration is being created. For each transaction-monitored application, the T-ORB generator config generates the gina.config file, in which the number of cyclical tasks (cf. Figure 42) is stored. COL 10 Figure 42 // corresponds to CYCLICORDER(10) Number of cyclical tasks If this number is to be changed while the transaction-monitored application is running, the gina.config file must be modified using a suitable editor (e.g. vi) and then the DNEWORDA administration command activated using the administration facility. GINA V4.0 System Administrator Guide – September 2000 201 Administering GINA applications 202 GINA V4.0 System Administrator Guide – September 2000 fachwort Druck vom 24. 01.2001 17:01.05 Glossary action point A number of remote subcalls can be started in the T-ORB procedure “action point”. Given that the →server process is subsequently released, an action point is always a potential →end of transaction, a potential →monitoring and restart point. The results of all subcalls are evaluated by the Continuation of the action point. The continuation is a parallel callback which is only started when all the results have been received. A →client cannot recognize whether the →server is carrying out an action point. A server cannot recognize whether it was called from an action point. agent see →server annotation The parsers of the GINA development systems sometimes need more information than can be formulated in C++. GINA comments are used for this purpose. They are ignored by the compiler but not by the GINA parsers. These comments contain a sequence of expressions that are referred to as annotations. application A GINA application is a transaction-monitored application under T-ORB. A GINA application can include a number of →server processes. A non-transaction-monitored application can be connected to a transaction-monitored application using T-ORB/Client. asynchronous request/call When you use the T-ORB procedure “asynchronous call”, the →client does not wait for the call to be executed and the result returned. Possible results are thus discarded (see also →notification). Under T-ORB, even asynchronous requests/calls undergo transaction monitoring, i.e. they are executed in an independent transaction after a successful end of transaction (commit). The asynchronous call under T-ORB is a relative →time request with zero delay. GINA V4.0 System Administrator Guide – September 2000 203 Glossary callback A procedure is called when an event occurs in an event-monitored environment (e.g. in an X application). This procedure is called a callback function, or simply only callback. class method A class method is a method which is used on the class, rather than on an object. In C++ we also talk about static methods. client In a client/server system, a client makes requests/calls to a →server. It requests a →service from the server. A client can also be the server of a client. In addition to transaction-monitored clients, non-transaction-monitored clients, e.g. X applications, can also be connected under T-ORB using T-ORB/Client. client stub In DCE terminology, a client stub is the same as a →stub under GINA. commit see →end of transaction cursor A cursor can be used to scroll through a list or set one element at a time. An important special case is a database cursor, which is used to scroll through the result of a database query. customizing This describes the feature which allows the user to carry out individual customizations. The following mechanisms are available in the GINA environment: →Persistency Service In the persistency framework, the customizing concept allows you to embed external classes from a class library as complete modules. Customizing to specific DBMS is also possible; these special features offered can be exploited. →T-ORB The user-specific generation of the runtime environment in the T-ORB framework using a special description language, whereby the description of the environment is transformed accordingly using a generator. 204 GINA V4.0 System Administrator Guide – September 2000 fachwort Druck vom 24. 01.2001 17:01.05 Glossary data link point A data link point is an →end of a transaction using commit. Transaction-monitored changes become visible and permanent outside the transaction at a data link point (see ACID property of →transactions). data reference A data reference DREF(P) is a special →global reference. It cannot be dereferenced. A data reference can however be used as an object, a data member, an argument or a result. distributed transaction Distributed processing is when a →transaction covers a number of processes, generally on a number of machines. In this case, a number of →local transactions from different →resource managers are grouped together by a →transaction monitor to form a →global transaction. end of transaction At the end of a transaction, the entire operation must either be confirmed (commit) or reversed (rollback). A (local) end of transaction occurs at the end of a transactionmonitored call or at an →action point, which is a →data link point. In →distributed transaction processing, all the local end of transactions only come into effect when a global end of transaction occurs. Since the →server process is automatically released under T-ORB when an end of transaction occurs, the end of transaction is not only a →data link point for the database, but also a →restart point for the operation. exception handling In addition to indicating processing errors using special return codes in the case of method calls, exception situations in GINA are indicated by initiating exceptions. This procedure is used in particular when resource bottlenecks occur. external interface A method in the external interface of a →server is called using a remote request/call. The external interface method decodes the parameters, calls the technical operation and encodes the results which are sent back to the →client. In DCE we call this a server stub, in CORBA we talk about a skeleton. framework A framework refers to a general framework in which the application constructor adds application-specific code as modules. GINA V4.0 System Administrator Guide – September 2000 205 Glossary general reference A general reference GREF(P) is a →global reference. The →smart pointer GREF(P) can refer to a local →persistent object or a stub object. A method call is handled accordingly using either a local or a →remote call. global interface The global interface of a class is the subset of the methods of the class which can also be called →remotely. global reference A global reference is used in GINA to address an object, which is (possibly) remote. There are different types of global references – pure →data references or →smart pointers in the form of →remote references or →general references. A global reference can be reduced to a local Persistency Service reference on the target application. global transaction In a →distributed transaction, a →transaction monitor groups together a number of →local transactions to form a global transaction. When the end of the global transaction is reached, either all the local transactions are rolled back, or all the local transactions are terminated with a commit. The local transactions do not therefore behave like nested transactions. inheritance In object-oriented languages, a derived class inherits the interface of its base classes. In C++, the implementation of the base classes is also inherited together with the interface. instance method An instance method is a method which is used on a certain instance, i.e. an object, of a class. These are also called object methods or simply methods. instantiation In object-oriented database systems, an object is generally accessed directly using a reference. In Persistency Service, the persistent object is instantiated when it is first accessed, i.e. it is loaded into the process address space. job submitter see →client 206 GINA V4.0 System Administrator Guide – September 2000 fachwort Druck vom 24. 01.2001 17:01.05 Glossary job receiver see →server join We talk about a join when two or more database tables (i.e. persistent classes) are linked for a database query. lazy evaluation Lazy evaluation is when an expression can only ever be evaluated to the extent that is required, as dictated by its use. In connection with Persistency Service, the procedures used to access persistent objects follow a lazy evaluation strategy. When an object is accessed, the directly dereferenced object is loaded, rather than the transitive shell of all the references subobjects. local transaction A transaction which is restricted to one process is called a local transaction. A →distributed transaction includes all the local transactions. navigating access In object-oriented database systems, an object is generally accessed directly using a reference. If this is done on a number of levels, it is called navigating access. notification In a hierarchical client/server architecture, only one client can instruct one server. However, in some cases, e.g. for alarms, the reverse information flow is required. In these cases, the server sends a notification to the client. Technically, this is done using an →asynchronous call. Even the results of →asynchronous calls and →time requests can be presented to the client in the form of a notification. This must be modeled technically. object-oriented transaction The transaction principle in GINA is object-oriented. This means that, in contrast to the conventional transaction concept, both the →persistency of objects and communication between objects in the form of calls using the T-ORB undergo transaction monitoring. Persistency Service The Persistency Service provides the user programs with an object-oriented view of the related database system. GINA V4.0 System Administrator Guide – September 2000 207 Glossary persistent A persistent object, unlike a →transient object, has a life span which does not depend on a process. In contrast to this, the life span of a transient object is limited by the life span of its process. polymorphy In object-oriented languages, a derived class inherits the interface of its base class(es). Polymorphy is when an object of the derived class can be used instead of an object of a base class. In C++ we use C++ references and C++ pointers here. A pointer to a base class can refer to an object of a derived class. In order to call a method of the derived class in this case, it must already be declared as virtual in the base class. The method is then linked dynamically at runtime, depending on the current object (dynamic binding). proxy see →stub reference 1. An alias for an object is called a reference in C++. If you access a reference, you actually access the referenced object. The reference is thus used in the same way as an object, from the syntactic point of view. 2. The ODMG uses the term reference to refer to →smart pointers, which are used to access a persistent object by dereferencing it. In C++, a reference of this kind, like a pointer, is dereferenced using the operators -> and *. Persistency Service uses local references PMibs::MibsRef to access local persistent objects, and T-ORB uses →global references to address remote objects. referential integrity Referential integrity relates to the relations between objects. With the exception of the →0 reference, an object can only contain references to an existing object. An object which is deleted can no longer be referenced by another object. Persistency Service and Database systems can monitor referential integrity. remote call A remote call, i.e. a call between two processes (generally on different machines) is implemented by sending and receiving messages. 208 GINA V4.0 System Administrator Guide – September 2000 fachwort Druck vom 24. 01.2001 17:01.06 Glossary remote reference A remote reference RREF(P) is a special global reference. The →smart pointer always refers to a stub object. Given this, a method call using a remote reference is always handled using a →remote call. Remote references occur on the client side in strict client/server hierarchies. request Request is a synonym for call. resource manager Resource managers, which manage their resources locally using transaction monitoring, are only used in relation to distributed transaction processing. The most common example of a resource manager of this kind is a database. restart point An →end of transaction or a →data link point is a restart point under GINA. In the case of a rollback, the operation is restarted at the restart point using the same request/call. rollback see →end of transaction Run Time Type Information RTTI allows you to specify the type of the object at runtime. server A server waits in a client/server system for a request/call from a →client. It provides →services for the client. A server can make subrequests/subcalls to other servers and can thus act as a client. Servers are transaction-monitored under T-ORB. Non-transaction-monitored servers can also be connected using T-ORB/Client. server process A server can consist of one or more operating system processes. A number of client queries are generally processed by different server processes. server stub In DCE terminology, a server stub is the same as the →external interface under GINA. GINA V4.0 System Administrator Guide – September 2000 209 Glossary service A →server provides services. Services are generally provided in rpc-like interfaces in an API. Services are thus called. T-ORB provides an object-oriented API. Functions, class methods and instance methods can be called remotely (with transaction monitoring). →Stubs relieve the application of the task of dealing with communication details. shadowed attribute A shadowed attribute is an attribute inherited from a base class (Base::attr) that redefines (Derived::attr) the inheriting class (class Derived : public Base). In C++, this type of attribute can be addressed in the name scope of the base class (Base::attr) as well as in that of the derived class (Derived::attr). signature The signature of an operation consists of the type list of parameters used in the operation. skeleton In CORBA terminology, a skeleton is the same as the →external interface under GINA. smart pointer The term smart pointer is used in C++ to refer to classes which overload the dereferencing operators * and ->. Smart pointers are often used to access →persistent objects (see Persistency Service), or to access remote objects (see T-ORB). stub A stub shields the client application from the details of a →remote call. A stub method or stub function can be called in the same way as a local method. The parameters are encoded, the remote call is actually made and the results are decoded, if necessary, within the stub method or stub function. A representative object is needed for calling methods. We call this a stub object or a proxy. In DCE, we talk about a client stub, rather than a stub. synchronous request/call In the case of the T-ORB procedure synchronous call, a client waits for the result of a synchronous request/call, thereby blocking further operations. A normal C++ function or method call is a synchronous call. Furthermore, T-ORB allows clients to make a number of synchronous, remote requests in parallel. The client waits until the results of all the calls have been received. 210 GINA V4.0 System Administrator Guide – September 2000 fachwort Druck vom 24. 01.2001 17:01.06 Glossary T-ORB The Transaction-monitored Object Request Broker allows local objects to send messages to remote objects with transaction monitoring. This means that not only the (persistent) states of the object, but also the messages undergo transaction monitoring. The sender does not have to worry about communication details. time request In the T-ORB procedure “time request”, a call is executed either at a certain time (absolutely) or with a certain time delay (relatively). A client does not wait for the result of a time request. Any events that may occur are thus discarded (see also →notification). transaction A transaction is an operation which is executed in accordance with the all-or-nothing rule. Transactions must comply with the ACID property (Atomicity, Consistency, Isolation, Durability): A transaction is atomic, i.e. it is executed without “interruption” as a result of individual steps. A transaction changes an inconsistent state to a consistent state. Transactions are isolated, i.e. any inconsistent interim states that may exist are not visible from the outside. Their results are permanent, i.e. protected from errors. see also →end of transaction transaction-monitored request/call A transaction-monitored request/call is carried out in a →transaction in accordance with the all-or-nothing rule. Transaction-monitored calls can occur in a distributed way under T-ORB. They then form a →distributed transaction. A transaction-monitored call can be terminated with a commit or a rollback. transaction manager see →transaction monitor transaction monitor A transaction monitor or transaction manager coordinates a number of →resource managers and combines their →local transactions in a →distributed transaction operation to form a →global transaction. transient In contrast to a →persistent object, the life span of a transient object is limited by the life span of its process. Normal C++ objects are transient objects. GINA V4.0 System Administrator Guide – September 2000 211 Glossary two-phase commit refers to a transaction manager protocol, which ensures that all the changes in the resources are made atomically in a →distributed transaction operation, and that all the changes in all the resources are reversed if an error occurs in one resource. value-based access Access on a database using a search criterion. XA protocol The →transaction monitor and the →resource manager are connected over the standard X/Open XA interface. It coordinates the transactions using the services provided by the resource manager. 212 GINA V4.0 System Administrator Guide – September 2000 abkuerzg Druck vom 24. 01.2001 17:01.06 Abbreviations ACID Atomicity, Consistency, Isolation, Durability ANS American National Standard ANSI American National Standards Institute API Application Programming Interface ASN.1 Abstract Syntax Notation One BER Basic Encoding Rules BLOB Binary Large OBject CCITT Comité Consultatif International Télégraphique et Téléphonique International Telegraph and Telephone Consultive Committee CDE Common Desktop Environment CER Canonical Encoding Rules CICS Customer Information Control System CMISE Common Management Service Element CMIP Common Management Information Protocol CMIS Common Management Information Service CMX Communications Manager in SINIX CORBA Common Object Request Broker Architecture CPI-C Common Programming Interface for Communication CTP Connection Termination Point GINA V4.0 System Administrator Guide – September 2000 213 Abbreviations 214 DB DataBase DBMS DataBase Management System DCE Distributed Computing Environment DCN Data Communication Network DER Distinguished Encoding Rules DOMS Distributed Object Management Service GINA General Interface for Network Applications GUI Graphical User Interface IC Information Conversion IDL Interface Definition Language IIOP Internet InterORB Protocol IRONMAN Integrated Regionalized Object-oriented Network MANagement System ISO International organization for standardization ITU International Telecommunication Union LAN Local Area Network LU6.x Logical Unit type 6.x (SNA protocols) MCF Message Communication Function (ITU recommendation M.3010) MIBS Management Information Base Service NDR Network Data Representation NE Network Element NEL Net Element Layer NK Network node (German abbreviation) GINA V4.0 System Administrator Guide – September 2000 abkuerzg Druck vom 24. 01.2001 17:01.07 Abbreviations NLS Native Language Support NWL Network Layer ODMG Object Database Management Group OLTP Online Transaction Processing OMG Object Management Group OO Object Orientation OODB Object-Oriented DataBase OOP Object-Oriented Programming ORB Object Request Broker OS Operating System OSI Open Systems Interconnection OSI-TP Open Systems Interconnection distributed Transaction Processing PCMX Portable Communication Manager Q3 TMN interface in accordance with CCITT recommendation M.3010 RAID Redundant Array of Independent Disks RDBMS Relational DataBase Management System RPC Remote Procedure Call RTTI Run Time Type Information SNA System Network Architecture SQL Structured Query Language TCP/IP Transmission Control Protocol/Internet Protocol TMN Telecommunication Management Network GINA V4.0 System Administrator Guide – September 2000 215 Abbreviations 216 TNSX Transport Name Server SINIX T-ORB Transaction-monitored Object Request Broker TP Transaction Processing TTP Trail Termination Point UPIC Universal Programming Interface for Communication UTM Universal Transaction Monitor WAN Wide Area Network WS Work Station XA defines an Application Interface for Distributed Transaction Processing XDR eXternal Data Representation XMP X/Open Management Protocols Application Interface XOM X/Open OSI Abstract Data Manipulation X/Open is an independent worldwide open systems non-profit organization XPG X/Open Portability Guide GINA V4.0 System Administrator Guide – September 2000 literat Druck vom 24. 01.2001 17:01.07 Related publications Contact your local Siemens Nixdorf office to order manuals whose order numbers begin with a U. Information relating to version and order numbers is only valid for the period in which this manual is published. Please ask for information on the latest editions. ❍❍● [1] BEA TUXEDO Reference Manual Release 6.3, BEA Systems Inc., April 1997 Part No. 801-001010-002 [2] BEA TUXEDO Administration Guide Release 6.3, BEA Systems Inc., April 1997 Part No. 801-001007-002 [3] Booch, G.: Object-Oriented Analysis and Design Benjamin/Cummings, Readwood City, 2nd edition, 1994, 589 p. [4] Booch, G.; Rumbaugh, J.; Jacobson, I.: Unified Modeling Language Semantics and Notation Guide 1.0 Rational Software Corp., San Jose, CA, 1997 [5] CAE Specification Distributed Transaction Processing: The XA Specification Reading, UK, 1991, 80 p. X/Open Document Number XO/CAE/91/300 [6] CCITT: Principles for a Telecommunications Management Network Recommendation M.3010, 1992 GINA V4.0 System Administrator Guide – September 2000 217 Related publications 218 [7] CMX V5.1 Communications Manager in UNIX Operation and Administration Fujitsu Siemens Computers GmbH U6519-J-Z145-4-76 http://www.fujitsu-siemens.com/servers/man/man_de/utm_man/outm_50.htm [8] The Common Object Request Broker: Architecture and Specification Revision 2.2, February 1998 Object Management Group, Framingham, USA http://www.omg.org [9] CPI-C/LU6.2 (SINIX, BS2000, MS-DOS) Reference Manual Siemens Nixdorf Informationssysteme AG, November 1992, 446 p. U9939-J-Z715-1-7600 [10] Ellis, M.; Stroustrup, B.: The Annotated C++ Reference Manual Addison-Wesley, Reading, 1990 [11] Generic++ 2.5 Portable C++ Foundation Class Library User Manual OO.Tec GmbH, Gauting, June 1999 http://www.ootec.de [12] GINA Introductory Guide Siemens Nixdorf Informationssysteme AG, April 1996 http://www.oo-gina.com [13] GINA V4.0 Developer Manual Siemens Business Services GmbH & Co OHG, September 2000 http://www.oo-gina.com [14] GINA V4.0 Reference Manual Persistency Service Reference Manual T-ORB Siemens Business Services GmbH & Co OHG, September 2000 http://www.oo-gina.com GINA V4.0 System Administrator Guide – September 2000 literat Druck vom 24. 01.2001 17:01.07 Related publications [15] IDL C++ Language Mapping Specification, September 1994, 135 p. OMG Document No. 94-9-14 [16] Informix Guide to SQL Syntax IDS.2000, V9.2, December 1999 Part No.: 000-6527 CD: Informix Answers Online, Product Documentation, Version 3.2 [17] INFORMIX-ESQL/C Programmer's Manual Client SDK 2.30, Version 9.21 April 1999 Part No.: 000-5424 CD: Informix Answers Online, Product Documentation, Version 3.2 [18] Informix Guide to SQL Reference IDS.2000, V9.2, December 1999 Part No.: 000-6526 CD: Informix Answers Online, Product Documentation, Version 3.2 [19] Administrators Guide for Informix Dynamic Server 2000, V9.2, September1999 Part No.: 000-6202 CD: Informix Answers Online, Product Documentation, Version 3.2Administrator's [20] Archive and Backup Guide for Informix Dynamic Server 2000, V9.2, September 1999 Part No.: 000-6205 CD: Informix Answers Online, Product Documentation, Version 3.2 [21] Trusted Facility Manual for Informix Dynamic Server 2000, V9.2, September 1999 Part No.: 000-6234 CD: Informix Answers Online, Product Documentation, Version 3.2 [22] ISO WG 21: Draft Proposed International Standard for Information Systems – Programming Language C++ WG21/N0687, April 1995 GINA V4.0 System Administrator Guide – September 2000 219 Related publications 220 [23] LU6.2-OSI-TP-GATE (SINIX) V1.0 Gateway between LU6.2 and OSI-TP Product Manual Siemens Nixdorf Informationssysteme AG, August 1993, 68 p. U21141-J-Z815-1-7600 [24] The Object Database Standard: ODMG-93, Release 1.1 Morgan Kaufmann Publishers, 1994 [25] openUTM V5.0 Concepts and Functions Fujitsu Siemens Computers GmbH U20683-J-Z135-3-76 http://www.fujitsu-siemens.com/servers/man/man_de/utm_man/outm_50.htm [26] openUTM V5.0 (UNIX, Windows NT) Generating and Handling Applications Fujitsu Siemens Computers GmbH U4083-J-Z135-6-76 http://www.fujitsu-siemens.com/servers/man/man_de/utm_man/outm_50.htm [27] openUTM V5.0 (BS2000/OSD) Generating and Handling Applications Fujitsu Siemens Computers GmbH U3034-J-Z135-7-76 http://www.fujitsu-siemens.com/servers/man/man_de/utm_man/outm_50.htm [28] openUTM V5.0 (BS2000/OSD, UNIX, Windows NT) Administering Applications User Guide Fujitsu Siemens Computers GmbH U24410-J-Z135-2-76 http://www.fujitsu-siemens.com/servers/man/man_de/utm_man/outm_50.htm [29] openUTM V5.0 (UNIX, Windows NT) Messages, Debugging and Diagnostics Fujitsu Siemens Computers GmbH U21400-J-Z135-4-76 http://www.fujitsu-siemens.com/servers/man/man_de/utm_man/outm_50.htm [30] openUTM V5.0 (BS2000/OSD) Messages, Debugging and Diagnostics Fujitsu Siemens Computers GmbH U20632-J-Z135-4-76 http://www.fujitsu-siemens.com/servers/man/man_de/utm_man/outm_50.htm GINA V4.0 System Administrator Guide – September 2000 literat Druck vom 24. 01.2001 17:01.08 Related publications [31] openUTM-Client V5.0 (UNIX, WindowsNT) for the UPIC Carrier System Fujitsu Siemens Computers GmbH U25770-J-Z135-2-76 http://www.fujitsu-siemens.com/servers/man/man_de/utm_man/outm_50 GINA V4.0 System Administrator Guide – September 2000 221 Related publications 222 GINA V4.0 System Administrator Guide – September 2000 verwsix.doc Druck vom 24. 01.2001 17:01.08 Index /bin/csh 178 A access key 55 ADMIN 46 APPLICATION 47, 53, 158 application types 27 APPLINAME 56 ASYNTASKS 63 audit 194 availability 31 B BCAMAPPL 50, 51, 58, 66 BDMCONFIG 21 BEST_BCAMAPPL 50 C C runtime libraries 6 CACHESHMKEY 55, 56 CANCEL 50 CHECK 51 client application 193 CM_APPLICATION 158 CM_APPLICATIONS 159, 191 CM_PREFIX 159 CMX version 54 communication channel 43 communication structure 44, 193 COMPUTERNAME 26 config 29, 45, 88, 89, 94 config-tux 156, 174, 177 generated files 178 GINA V4.0 System Administrator Guide – September 2000 configuration of communication 43, 155 CONNECT 51 connections between applications 43 CONRTIME 56 CPIC 10 crbincf.cmd 182 crbincf.sh 180 crdevqu.cmd 182 crdevqu.sh 180 crtlogs.cmd 182 crtlogs.sh 180 customizing 32, 33, 43, 54, 56, 57, 63, 67, 155, 158, 159, 160, 163, 184, 185 CYCLE 51, 57 CYCLICTIME 52 D data backup 194 database 31 database layout 33 database server 22, 31, 32 dbexport 194 dbimport 194 DBSERVERNAME 32 dbspace 31, 33 default DB user 41 default user 41 deinstall GINA 9 delivery structure 11 Developer Manual 3 directory structure 14 dmconfig 190 documentation on GINA 2 dogen1 29 dogen2 29 DOMAIN 185 223 DomsDynConnectHandler 197 DomsEventHandler 196 DPUTLIMIT1 56 DPUTLIMIT2 56 dtp 98, 199 dtp.bat 100 Dynamic Connection Handler 197, 198 dynamic T-ORB/client application 197 DYNAMIC_CONNECT 52 INFORMIXDIR 22, 28 INFORMIXSERVER 22 initialization of the database 32 install GINA 9 Internet address 55, 160 INTERNETADDRESS 55, 160 Introductory Guide 2 IPCSHMKET 56 IPCSHMKEY 55, 56 E environment variables 21 EVENTCONTROL 53 EXPORT 185 external openUTM application 96 K -k 5 KAASHMKEY 55, 56 KDCA 98, 100, 101 KDCDF procedure for BS2000/OSD 95 runtime variant 102 kdcdf 60, 88, 89, 94, 95, 196 kdcdf script 98, 100, 101 development variant 97, 99 runtime variant 98, 100, 101 kdcdf.bat 95 KDCFILE 98, 100, 101 KEYVECTOR 55, 160 keywords of configuration language 68, 165 F fault tolerance 31 FOREIGN_APPLICATION 53 FOREIGN_APPLICATION_NUMBER 53 G G_Exception 5 generators 29 Generic++ 10 GINA 1 documentation 2 gina.config 179, 181, 198 GINA.CONFIG.TP_application_name 101 gina.dynamic 98, 100, 197 GINA.TP_application_name.KDCA 101 GINA_DYNAMIC 197 GINACONFIG 21, 98, 100, 198 GinaRoot 97, 99, 101 GinaRoot.c 97, 99, 101 GRANT 194 H HOST 54, 159 I idlgen 7, 29 IMPORT 55, 185 INFORMIX Dynamic Server 2000 10 224 L local client 47 logging database errors 195 LU6.1 54, 62 M make 30 manuals 2 ordering 3 MAX 56, 57, 160, 191 max 6 mdiff 5, 29 message 5 mgen1 29 mgen2 5, 29 mgendb 29 mibsDev 11 mibsRun 11 GINA V4.0 System Administrator Guide – September 2000 verwsix.doc Druck vom 24. 01.2001 17:01.09 min 6 miogen1 29 miogen2 29 MPOOL 56 N name 5 National Language Support 40 NB 56 NIS 197 NLS 40 noansi 5 nohinfo 5 O ODMG-OQL 5 OPENINFO 162 openUTM 10 openUTM client 10 operating system resources 43, 155, 184 OPERATING_SYSTEM 162 OQL 5 OwnMsgs.c 97, 99, 101 P PCMX 99 performance 31, 33, 44 Persistency Service, generator 29 pfx file 34 PMibs::MibsFilterIt 6 PMibs::MibsSeqIt 6 port 58, 162 port number 60 PORTADDRESS 58 PORTADDRESSES 162 PRIORITY 59 public user 41 R readme 179 Reference Guide Persistency Service 3 Reference Guide T-ORB 3 Release Notice 9, 14, 28 REMOTE 60 GINA V4.0 System Administrator Guide – September 2000 remote client 47, 60 replica database 195 REPOSITORY 162, 191 requirements for installation 10 Resource Manager 61 revision generation 45, 157 REVOKE 194 RMXA 61 role distribution (database administration) 194 S SCHEDULE 61 security 194 semaphore 55 SEMARRAY 56 SEMKEY 55, 56 server application 193 servernames 21, 97, 98, 99, 100, 101, 179, 181 SERVERNUM 32 services 197 SESSION 54, 62 SESSIONPOINT 63 setting up the database 31 shared memory 55 special options 5 sqlhosts 31 START 46, 55, 57, 63 start 98, 100 START.TP_application_name 102 START_RM 64 START_VALUE 163, 191 starting GINA applications 196 stopping GINA applications 196 SYSTEM 66, 163 system resources 31 T TA_APPLICATION 66, 163 TAC classes 59 TASKS 63 TASKS-IN-PGWT 63 tbl file 35 TNSX entry 45, 58, 60, 97, 99 225 tnsxcom 97 tnsxdel 97, 99 tnsxdel.tns 99 tnsxin 97 tnsxin.tns 99 T-ORB, generator 29 TP monitor 10 transfer of data 32 TRMSGLTH 56 TUXCONFIG 21 TUXDIR 21 type 7, 8 197 types of application 27 user default 41 public 41 user_friendly_name 179, 181 UTM 10 UTMPATH 21, 28 utmstart.multi 98, 196 utmstart.multi.bat 100 utmstart.single 98 utmstart.single.bat 100 U ubbconfig 163, 174, 180, 181 upicfile 21, 97, 99, 198 UPICPATH 21, 198 USE_CM_APPLICATIONS 164 W workprocess 43, 56, 155, 184 226 V VIEWITERATOR(P) 6 X XA interface 10, 61, 194 XA protocol 194 GINA V4.0 System Administrator Guide – September 2000 kritik Druck vom 24. 01.2001 17:01.11 Siemens Business Services GmbH & Co OHG SBS MPM CPI 81730 Munich Germany Fax: (089) 636-48 303 Internet: [email protected] Submitted by Comments on GINA V4.0 System Administrator Guide ✁ GINA V4.0 System Administrator Guide – September 2000 Comments Suggestions Corrections kritik Druck vom 24. 01.2001 17:01.11 Siemens Business Services GmbH & Co OHG SBS MPM CPI 81730 Munich Germany Fax: (089) 636-48 303 Internet: [email protected] Submitted by Comments on GINA V4.0 System Administrator Guide ✁ GINA V4.0 System Administrator Guide – September 2000 Comments Suggestions Corrections Herausgegeben von / Published by Siemens Business Services GmbH & Co OHG D-81730 München Printed in Germany Bestell-Nr./ Order No. GINA V4.0 System Administrator Guide – September 2000
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project