manual is also copyrighted and all rights are reserved. This manual may not, in whole or in part, be copied,
photocopied, translated, or reduced to any electronic medium or machine-readable form without prior consent, in
writing, from Progress Software Corporation.
The information in this manual is subject to change without notice, and Progress Software Corporation assumes no
responsibility for any errors that may appear in this document.
The references in this manual to specific platforms supported are subject to change.
A (and design), Actional, Actional (and design), Affinities Server, Allegrix, Allegrix (and design), Apama, Business
Empowerment, ClientBuilder, ClientSoft, ClientSoft (and Design), Clientsoft.com, DataDirect (and design), DataDirect
Connect, DataDirect Connect64, DataDirect Connect OLE DB, DataDirect Technologies, DataDirect XQuery,
DataXtend, Dynamic Routing Architecture, EasyAsk, EdgeXtend, Empowerment Center, eXcelon, Fathom,
IntelliStream, Neon, Neon New Era of Networks, O (and design), ObjectStore, OpenEdge, PDF, PeerDirect,
Persistence, Persistence (and design), POSSENET, Powered by Progress, PowerTier, ProCare, Progress, Progress
DataXtend, Progress Dynamics, Progress Business Empowerment, Progress Empowerment Center, Progress
Empowerment Program, Progress Fast Track, Progress OpenEdge, Progress Profiles, Progress Results, Progress
Software Developers Network, ProVision, PS Select, SequeLink, Shadow, ShadowDirect, Shadow Interface, Shadow
Web Interface, ShadowWeb Server, Shadow TLS, SOAPStation, Sonic ESB, SonicMQ, Sonic Orchestration Server,
Sonic Software (and design), SonicSynergy, SpeedScript, Stylus Studio, Technical Empowerment, Voice of
Experience, WebSpeed, and Your Software, Our Technology-Experience the Connection are registered trademarks of
Progress Software Corporation or one of its subsidiaries or affiliates in the U.S. and/or other countries. AccelEvent,
Apama Dashboard Studio, Apama Event Manager, Apama Event Modeler, Apama Event Store, AppsAlive,
AppServer, ASPen, ASP-in-a-Box, BusinessEdge, Cache-Forward, DataDirect Spy, DataDirect SupportLink,
DataDirect XML Converters, Future Proof, Ghost Agents, GVAC, Looking Glass, ObjectCache, ObjectStore Inspector,
ObjectStore Performance Expert, Pantero, POSSE, ProDataSet, Progress ESP Event Manager, Progress ESP Event
Modeler, Progress Event Engine, Progress RFID, PSE Pro, SectorAlliance, SmartBrowser, SmartComponent,
SmartDataBrowser, SmartDataObjects, SmartDataView, SmartDialog, SmartFolder, SmartFrame, SmartObjects,
SmartPanel, SmartQuery, SmartViewer, SmartWindow, Sonic, Sonic Business Integration Suite, Sonic Process
Manager, Sonic Collaboration Server, Sonic Continuous Availability Architecture, Sonic Database Service, Sonic
Workbench, Sonic XML Server, The Brains Behind BAM, WebClient, and Who Makes Progress are trademarks or
service marks of Progress Software Corporation or one of its subsidiaries or affiliates in the U.S. and other countries.
IBM is a registered trademark of IBM Corporation. Java and all Java-based marks are trademarks or registered
trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Any other trademarks or service marks
contained herein are the property of their respective owners.
DataDirect Shadow for ODBC includes:
Software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http:/www.openssl.org/).
Software Foundation. All rights reserved. The names, "Ant", "Axis", "crossdb" "Xalan," "wsfx", "wsif" "poi," "Xalan",
"Tomcat", "lucene", "Xerces" and/or "Apache Software Foundation" must not be used to endorse or promote products
derived from the Product without prior written permission. Any product derived from the Product may not be called
"Apache", nor may "Apache" appear in their name, without prior written permission. For written permission, please
contact apache@apache.org.
Shadow z/Enterprise Web Server Administration Guidexi
xiiShadow z/Enterprise Web Server Administration Guide
About this Publication
This book contains user information about the Shadow z/Enterprise Web Server™. This guide
expands on the concepts and information presented in the Shadow z/Enterprise Web Server Getting Started Guide. If you do not find the information in this manual, refer to the Getting Star ted Guide or
one of the publications in the related set of manuals.
How this Publication is Organized
This book contains the following chapters:
Chapter 1, “Shadow z/Enterprise Web Server - An Overview,” provides an introduction
to Shadow z/Enterprise Web Server by reviewing information covered in the Shadow
z/Enterprise Web Server Getting S tarted Guide and covering additional info rmation on
re-scanning to a new URL, error recovery, flush requests, and more in-depth
information on HTTP and TCP/IP.
Ch ap te r 2, “Qu ick Start,” provides a summary about Shadow z/Enterprise Web
Server’s event based architecture that matches incoming URLs to predefined event
procedures or rules.
Chapter 3, “The Shadow Event Facility (SEF),” covers the structure of an event
procedure (header statements an d process sections), the different types of variables,
and how to control SEF from a batch environment.
Chapter 4, “Defining Event Procedure Types,” covers the different event procedures
types, what they do, how they work, and the valid syntax for each.
Chapter 5, “Web Transaction Security,” covers security parameters and subsyste m
security.
Chapter 6, “Writing Web Transactions in REXX,” covers the syntax for coding /*REXX
process sections.
Chapter 7, “File Serving Using the Shadow z/Enterprise Web Server,” discusses
supported files, how Shadow z/Enterprise Web Server han dles files, and how to build
WWW rules using /*FILE.
Chapter 8, “HTML Extension Facility,” covers the rules for coding HTML extension
statements, run-time condition checking, iteration statements, and merge processing.
Chapter 9, “Automated State Management Facility (ASMF),” covers state information,
which provides the ability to “remember” information at the end of a client/server
interaction if the information has some bearing on a future anticipated interaction.
Chapter 10, “Executing User Programs,” describes the basics of the /*PROGRAM
process section, such as what programs can be executed, where they must reside,
and how to code the process section; discusses the use of other REXX interpreters;
and covers instructions related to writing transaction programs in C/370, COBOL, and
PL/I.
Chapter 11, “Writing DB2-Based Web Applications,” covers the operation and coding
of the /*EXECSQL process section. It also covers SQL statements for the /*EXECSQL
Shadow z/Enterprise Web Server Administration Guidexiii
section. The Shadow/REXXTOOLs DB2/SQL interface is discussed in the HTML
online documentation and the Shadow z/Enterprise Web Server Programming Reference Guide.
Chapter 12, “Shadow AutoHTML for IMS/TM,” discusses how to use the Shadow
AutoHTML™ for IMS/TM feature. This chapter includes a discussion of how to format
the /*EXECIMS section. The Shadow z/Enterprise Web Server Installation Guide
covers how to configure the system so you can use Shadow AutoHTML.
Chapter 13, “Shadow AutoHTML for CICS/TS,” discusses how to use the Shadow
AutoHTML™ for CICS/TS feature. This chapter details the installation and
configuration required, the administration of the Shadow AutoHTML for CICS/TS
feature, and the steps required to execute a CICS transaction.
Chapter 14, “Shadow Data Mapping Facility,” discusses the data mapping facility,
including how it works, what it does, and its various related ISPF pane ls.
Chapter 15, “Using Shadow Interface for ADABAS,” covers the new add-on
component to Shadow z/Enterprise Web Server that provides reliable, high
performance access to ADABAS data from the desktop.
Ch ap te r 16 , “Us ing the Shadow Interface for VSAM,” covers the new add-on
component to Shadow z/Enterprise Web Server that provides reliable, high
performance access to VSAM data.
Chapter 17, “Using the OS/390 UNIX OpenEdition Hierarchical File System (HFS),”
covers support for the OS/390 UNIX System Services Hierarchical File System (HFS).
Appendix A, “Trace Browse,” covers the different features of the Trace Browse
Facility, such as how it works, changing columns (or displaying extra columns), and
locating messages.
Appendix B, “Trace Browse Archival Facility,” discusses the basics of the Trace
Browse Archival Facility, how it works, handling backups and extracts, and configuring
automatic backups.
Appendix C, “Starting a Test Version,” covers using the debugging control screen,
setting up the server to run under TSO, and using the code/370 debug tool.
Appendix D, “Server Error Codes,” lists the different server error codes and their
descriptions.
Appendix E, “Supported SMF Fields,” explains the records that are written by Shadow
z/Enterprise Web Server whenever a URL is executed (Offset, Field Name, Field
Type/Value, and Description ).
Ap pe nd ix F, “Language Codes,” lists the country codes and the language.
Appendix G, “Processing Web Transactions and URLs,” includes information on
Internet protocols, application layer protocols, the client/server roles in HTTP, what is
a URL, how the Web server handle URLs, what happens when a match is made to an
inbound request, and when and why a rescans to a new URL occurs.
Ap pe nd ix H, “Transaction Status Codes,” provides a list of internal Shadow
transaction status codes.
xivShadow z/Enterprise Web Server Administration Guide
Shadow Products and Publications
For a comprehensive list of the current Shadow product, visit the following website:
xvShadow z/Enterprise Web Server Administration Guide
Working with Shadow Support
Shadow Support provides a number of ways for you to obtain assist ance fo r our product s.
All product support inquiries are handled by the same support group, regardless ifyou are
a trial or a licensed customer. The following are available support options:
Support
Option
E-mailTo contact Shadow Support via
How to AccessHow it WorksThis Option is Best for:
e-mail, please use the following
link:
shadowsupport@datadirect.
com
E-mail is available for receipt 24
hours a day, 7 days a week and is
answered between 9AM-7PM CST
Monday through Friday.
PhoneTo contact Shadow Support,
please visit the following Web site
and select the “Phone” link:
E-mail goes to the support
queue, which is continuously
monitored by a staff of crossfunctional technical experts. It
is answered in the order it is
received. It is logged in the
support database and
assigned a trouble ticket
number for tracking purposes.
During normal working hours
you will be transferred to a
technical expert within the
Customer Support group. Y ou
may be required to page a
support person via our phone
mail system after hours.
The DataDirect Technologies
Website is maintained to
provide current, relevant
materials to support our
customers. Links to a
searchable Knowledge Base
and various technical tips are
available from the DataDirect
Technologies Website. In
addition, software updates
and product documentation
can be downloaded from the
Web site. The DataDirect
Technologies Website also
allows you to track open
support incidents.
This type of support is
excellent for low to medium
priority requests. It is a proven
method for providing further
information on critical
problems that may have been
phoned in. E-mail is a
convenient way of sending us
a list of lower priority items
you have collected at a time
that is convenient for you.
This type of support is best for
high priority requests and
initial installation questions.
Use this option for any
obvious system errors or
anytime you need the most
rapid reply to your question.
This option provides
immediate access to
documentation, updated
client-side Drivers, and our
product Knowledge Base. The
Knowledge Base is a
collection of questions
answered by Customer
Support. Use this option to
answer your own questions or
to get a better understanding
of what customers ask on an
ongoing basis.
Account
Manager
To contact your Sales
Representative (U.S.),please visit
the following Web site and select
the “Phone” link:
http://
www.datadirect.com/
Your Sales Representative is
your account manager. This
person is ultimately
responsible for your complete
satisfaction with the Shadow
product.
support/contactus/phone/
index.ssp
xviShadow z/Enterprise Web Server Administration Guide
Contact your Sales
Representative for pricing
information, contract details,
password renewal, or if you
feel your needs are not being
met.
CHAPTER 1:
Shadow z/Enterprise Web Server - An Overview
The Shadow z/Enterprise Web Server allows you to unite the power of the Internet with the rich
resources of legacy System 390/MVS applications and data to fully exploit the growing revolution in
eBusiness. Topics include:
Shadow z/Enterprise Web Server is a native MVS Web server that provides controlled
access to MVS data and applications using a Web browser, such as Netscape
Navigator™ or Internet Explorer™. It does not require an intermediate server, nor is it
limited to simple file transfers or screen scraping. Shadow z/Enterprise Web Server is an
MVS transaction processor product designed specifically to connect MVS resident
resources to the World Wide Web (WWW).
How It Works
Shadow z/Enterprise Web Server is an OS/390-based product that is installed and
initiated as a started task within OS/390. Once installed, Shadow z/Enterprise Web Server
“listens” for Web client sessions (URLs), inbound from the Internet or an intranet. Each
inbound session is assigned to a thread, an individu al un it of work in OS/ 39 0 that is used
for authorization, data access, transaction access, monitoring, and control.
The URLs from the client are matched against pre-defined rules, or event procedures,
established within Shadow z/Enterprise Web Server to enforce a controlled-transaction
paradigm. Because Shadow z/Enterprise Web Server can access all standard
Shadow z/Enterprise Web Server Administration Guide1-1
Shadow z/Enterprise Web Server - An Overview
OS/390 functions, rules ensure that only pre-approved actions can be taken by users.
Rules process the URLs and return HTML or binary data via HTTP to the client.
Why Use It?
eCommerce began with a scattering of consumer-oriented Web-based retail sites. But
innovation and the redesign of business models has take n e Comme rce beyon d its simple
beginnings to create a new definition of what it means to exploit the powers of the Internet
or intranet. The Web is changing the way the world does business. For those who can
exploit it creatively, the rewards can be enormous:
In cr ea se d pr odu c tivit y
Reduced expenses
Increased efficiency of business processes
Strategic advantage over competitors
Shadow z/Enterprise Web Server Architecture
Shadow z/Enterprise Web Server uses a simple two-tier architecture that provides direct
Web-to-mainframe access, thus eliminating the need for mid-tier Web servers. The result
is a comprehensive access environment for integrating System/390 and the Internet. By
eliminating the need for gateways:
Production is enhanced.
Learning curves are lowered.
There are no performance bottlenecks.
It uses maximum throughput and fast response time, regardle ss of th e nu m be r of
users.
There is higher availability of data.
There is no gateway to purchase, install, or maintain.
There are no additional components to fail.
The IT investment in legacy systems is preserved.
How It Works
A key component of the Shadow event-based architecture is the concept of an event
procedure, or rule. Rules are site-defined actions to be taken by Shadow z/Enterprise
Web Server in response to inbound URLs. Once a rule is defined using the Shadow Event
Facility™ (SEF) component, it may be made immediately available for execution.
Rules, typically defined by a designated Webmaster, can perform a variety of processing
roles, such as:
Ru n a SQL statemen t.
Execute CICS programs, IMS transactions, or TSO/E command procedures.
Transmit authorized OS/390 files to the client.
Execute customized REXX-language scripting procedures.
Execute customer-written programs in COBOL, PL/I, or C.
Execute powerful built-in facilities that provide turnkey access to data files or existing
OS/390 applications.
Figure 1–1 illustrates the basic architecture of Shadow z/Enterprise Web Server.
1-2Shadow z/Enterprise Web Server Administration Guide
Shadow z/Enterprise Web Server Architecture
Figure 1–1. The Basic Architecture for Shadow z/Enterprise Web Server
Accessing Rules Using URLs
Web browsers use URLs (Uniform Request Locators) to access Web resources. The
following is a URL:
The first portion of the URL identifies the TCP/IP address of the OS/390 system and the
port assigned to Shadow z/Enterprise Web Server. When an HTTP (Hypertext Transfer
Protocol) request arrives, the second part of the URL is passed to Shadow z/Enterprise
Web Server, which compares the URL to a list of pre-defined rules, or event procedures,
created in the Shadow Event Facility (SEF). Table 1–1 shows how Shadow z/Enterprise
Web Server handles URLs.
Table 1–1. How Shadow z/Enterprise Web Server (SWS) Handles URLs
Discarded once it arrives at the portSWS matches this to a rule (event procedure)
When a match is found, Shadow z/Enterprise Web Server executes the associated event
and the results are returned from the OS/390 system to Shadow z/Ente rprise Web Server,
which converts the information into an HTML data stream before sending the results back
to the client. Relational tables may be formatted as HTML tables. Additionally, Shadow z/
Enterprise Web Server supports all standard MIME (Multimedia Internet Mail Extension)
file types for transfer to the client.
Shadow z/Enterprise Web Server Administration Guide1-3
Shadow z/Enterprise Web Server - An Overview
Distributed Transaction Administration
To facilitate administration and to prevent accidental or malicious misuse of security
related parameters, Shadow z/Enterprise Web Server provides both a master list of event
procedures and the ability to create subordinate lists. This allows diverse groups to still
have responsibility for writing and maintaining Web transactions definitions, which can be
grouped by application, user community, resou rce requirements, or by any breakdown
that offers administrative convenience.
Controlled Transaction Paradigm
Shadow z/Enterprise Web Server provides another point of control. This is known as the
controlled transaction paradigm and ensures that only desired access is provided to
users. Execution privileges may be granted at the event level, DBMS level,
OS/390 level, or transaction level.
Threading Architecture
Inside the Shadow z/Enterprise Web Server address space, there are two dedicated
listener threads (TCBs) for communication processing. One thread handles IBM TCP/IP;
the other handles Interlink TCP/IP. These threads are responsible for all inbound session
requests.
Inbound session requests are handled by binding a socket to a well-known port number
and then establishing a listen queue. The TCP/IP communication thread then issues an
accept for each inbound session request. A unique child thread (attachment TCB) is
created for every inbound session request and is dedicated to the sessio n an d kept for as
long as the session is active.
There are several reasons for this architectural decision:
The overhead of thread creation, user authentication, transaction program initiation, and
database thread allocation is incurred only once . After all the initialization steps have been
completed, a direct path is available for passing database requests from the client
application directly to the host database. This approach is now recommended by IBM as
the most efficient way of communicating with DB2, enhancing both capacity an d response
time.
Parallel processing
The creation of a dedicated thread for each client application allows Shadow z/Enterprise
Web Server to exploit the multiprocessing and multiprogramming capabilities of IBM
mainframes and OS/390. Over a period of many years, IBM has steadily expanded the
1-4Shadow z/Enterprise Web Server Administration Guide
Product Capabilities and Benefits
multiprocessing capabilities of its hardware and the multiprogramming facilities of its
software. These capabilities can be exploited only by products that create multiple units of
dispatchability (TCBs or SRBs).
Scalability
The dedicated thread approach provides the highest degree of scalability for the client/
server computing environment. Because Shadow z/Enterprise Web Server creates
threads for all client sessions, rather than using the services of CICS or IMS, it avoids
scalability issues inherent in those subsystems. The only limits are those physical
constraints imposed by OS/390 or the subsystem itself (i.e., DB2 thread limits).
Security
Shadow z/Enterprise Web Server creates an ACEE control block for each client support
thread. This ACEE is initialized with the current userid provided by Shadow z/Enterprise
Web Server on behalf of the client. This approach ensures that all client actions ha ve been
authenticated by the existing security system.
Isolation
Multiple threads may be active concurrently without affecting each other. In addition, both
OS/390 and DB2 provide task-level resource cleanup. This mean s that if a thre ad fails, a ll
related OS/390 and DB2 resources are released automatically and any da tabase changes
are rolled back automatically without affecting other threads.
Accounting
OS/390 tracks resource utilization by threads. Because one and only one thread is
responsible for all work done on behalf of the client, the dedicated server thread is
charged for all of the resources used by the client. Shadow z/Enterprise Web Server
creates standard SMF records that detail usage by subsystem and user connection.
Manageability
Threads are the smallest unit of dispatchability and control in the OS/390 environment.
Threads are also the fundamental unit of DB2 connectivity. Shadow z/Enterprise Web
Server exploits its dedicated threads to implement several automated and manual
controls. These controls include a CPU throttling facility and a thread cancellation
mechanism.
Product Capabilities and Benefits
Shadow z/Enterprise Web Server provides direct Web access to MVS with several
capabilities and benefits.
Fast, Simple Implementation
Implementation of Shadow z/Enterprise Web Server is quick and easy. No intermediate
server is required, and programming requirements on the host are kept to a minimum
through the use of supplied functions and capabilities. Existing programs and transactions
Shadow z/Enterprise Web Server Administration Guide1-5
Shadow z/Enterprise Web Server - An Overview
can be executed, often with no changes to the transaction code. IT departments can take
advantage of browser or “thin client” application development and leverage the lower cost
of application development and maintenance with high quality OS/390 data and business
access logic.
Easily Understandable (Native MVS Web Server)
Shadow z/Enterprise Web Server is a native MVS Web server. It is not UNIX-based, nor is
it derived from early UNIX Web server source code implementations. Sh adow z/Enterprise
Web Server was designed on MVS for MVS. This means your systems programmers do
not need to spend hours researching unfamiliar system configuration options or adding
new and unfamiliar security control paradigms to your configuration. Users, developers,
and security administrators already know which security limits are imposed and how they
are configured and administered.
High Performance
Shadow z/Enterprise Web Server was built with high performance as a key consideration
in all aspects of product development. The performance characteristics of Shadow z/
Enterprise Web Server are maintained whether a few or tens-of-thousands of users are
using the software. This is possible because there are no built-in bottlenecks, such as
mid-tier Web servers, or other architectural limitations.
Comprehensive Management, Monitoring, and Control
Capabilities
To ensure speedy development, you need rapid access to detailed diagnostics. Shadow
z/Enterprise Web Server provides a detailed monitoring and trace facility for end-to-end
diagnostics and rapid resolution of development problems and a diagnostic facility.
Together, the Shadow z/Enterprise Web Server product’s trace and the Shadow
Diagnostic Facility provide the most complete, powerful, and flexible set of administration
tools available in the OS/390 middleware arena.
The Trace Facility
Shadow z/Enterprise Web Server incorporates an extensive trace facility that is
implemented by adding trace records to a trace buffer maintaine d in virtual storage . Trace
operations are performed entirely with memory-to-memory instructions, and nothing is
written to disk until the session is complete, at which point the trace information is
automatically saved on disk. This approach combines the performance advantages of
memory-to-memory tracing with the non-volatility of standard disk storage.
Trace records are created for a wide variety of events in the Shadow z/Enterprise Web
Server address space. Specifically, trace records are written for SQL operations, IMS
calls, CICS calls, communication events (LU 6.2, TCP/IP, and messages), thread attach
and detach events, RPC events, message events, and errors (abends). It is even possible
for an RPC to add its own trace messages to trace records for diagnostic purposes.
The Shadow Diagnostic Facility
The Shadow Diagnostic Facility (SDF), an ISPF application shipped with Shadow z/
Enterprise Web Server, provides an interface to the controls and diagnostics. Using this
facility, administrators can reset controls, view, filter, and search the trace data, and
1-6Shadow z/Enterprise Web Server Administration Guide
display all currently active users. This display can also be used to reconstruct the session
of any currently active user or, with authorization, to terminate any active session.
The Shadow Diagnostic Facility includes a security mechanism that allows you to restrict
what each user can do with SDF.
Extreme Scalability Capabilities
Shadow z/Enterprise Web Server offers extreme scalability, whether users number in the
hundreds or hundreds-of-thousands by providing unparalleled ability to maintain response
times within pre-established services levels as numbers of users grow. End-to-end
multithreaded capabilities exploit all available hardware and operating system facilities for
processing on the client and server components.
Extreme scalability ensures that applications will perform as designed both today and in
the future, adapting easily to volume increases and new technologies that accompany
internal and external corporate change. Multiple address space load balancing, workload
management, and dynamic thread pooling enable high volume user access. The result is
that you can leverage single-platform applications, participate in e-business opportunities,
engage in personalized marketing, and provide a global workgroup environment quickly
and easily.
How Shadow z/Enterprise Web Server Is Used
Top-Notch Security
Shadow z/Enterprise Web Server supports a full range of System/390 security systems,
such as RACF, ACF2, and Top Secret, to validate userids and passwords p rovided e ither
directly by the user or via LAN authentication mechanisms. The ability to use existing
security is of paramount importance in protecting OS/390-MVS assets and ensuring rapid
application development. Shadow z/Enterprise Web Server supports the highest client/
server security standard in practical use today: Secure Socket Layer (SSL). The support
of SSL and GSK SSL meets the most demanding security needs in the industry.
How Shadow z/Enterprise Web Server Is Used
Shadow z/Enterprise Web Server is being used in a growing number of enterprises
around the globe to bring the resources and power o f the main fram e to Web applications.
A worldwide shipping firm uses Shadow z/Enterprise Web Server to allow employees
to access its OS/390 applications and data from any port that has a telephone line.
A major university allows students to retrieve curriculum and grade infor mation and to
register for classes by combining Web and mainframe applications.
One of Europe’s largest insurance companies uses Shadow z/Enterprise Web Server
for intranet applications and external investment management programs.
One of the world’s largest aircraft manufacturers uses Shadow z/Enterprise Web
Server to browser-enable its employee time-keeping system.
Whenever production Web applications for OS/390 are required with a need for minimal
development time and maximum security, companies are finding the most efficient and
cost-effective solution to be Shadow z/Enterprise Web Server.
Shadow z/Enterprise Web Server Administration Guide1-7
Shadow z/Enterprise Web Server - An Overview
Connection
3270 Terminal
VTAM
IMSMPP
Optional Shadow Interfaces
The optional Shadow Interface™ components for DB2, IMS/DB, IMS/TM, CICS/TS,
VSAM, ADABAS, and Natural simplify, speed, and streamline your access to OS/390
resources. In most cases, the Shadow Interfaces provide a method to execute legacy
programs from Web browsers without any modification to the host code. Existing OS/390based applications can be executed, returning data in HTML format. This functionality
allows you to reuse existing business and access logic that is at the heart of many
production applications today.
Shadow Interfaces eliminate the need for coding remote procedure calls (RPCs) on the
host and, when used with the Data Mapping Facility (DMF), display the results in the
format you designate, without the need to sort or parse returned data. With Shadow
Interfaces, you gain the speed and simplicity of a desktop tool, cut development time
significantly, increase productivity, and reduce time to market for applications.
Shadow z/Enterprise Web Server can be used with interfaces for:
DB2, IMS/DB, and ADABAS databases
IMS and CICS transactions
VSAM data
Natural programs
Sequential files and PDSs
RPC stored procedures for data sources such as:
−IDMS
−Oracle for the System/390
−CA Datacom
−CA Sapphire
−Total
−M204
Executing IMS Transactions
Shadow z/Enterprise Web Server provides access to IMS transactions across the Internet
using Web browsers.
Figure 1–2. Executing an IMS Transaction on a 3270 Terminal
The Figure 1–2 shows IMS on a 3270 Terminal while Figure 1–3 shows the same
transaction using a Web browser and Shadow z/Enterprise Web Server.
1-8Shadow z/Enterprise Web Server Administration Guide
Executing IMS Transactions
TCP/IP
Web Browser
SWS
IMS
Figure 1–3. Executing an IMS Transaction Using the Shadow z/Enterprise Web Server
You can use an (optional) interface, such as a program (Shadow/REXX, COBOL, PL/1, C,
C++ or Assembler) or a non-program interface (Data Mapping or RPC) to retrieve the
information.
Comparison Table
Table 1.
3270 TerminalWeb browser
1.The form is filled-in on screen. Press the
appropriate key to transmit.
2.3270 screen loads data into the buffer and passes
it to the connection using LU2 protocol. The
information is then passed onto VTAM.
3.VTAM passes data to IMS.3.TCP/IP passes messages to SWS.
4.IMS identifies the transaction code from the
message and schedules the appropriate message
processing program (MPP).
5.MPP receives the message from IMS and
processes the transaction.
6.MPP passes the results back to IMS.6.SWS passes the results to TCP/IP.
7.IMS passes the message to VTAM , which passes
it back to terminal via connection using LU2
protocol.
8.Results are displayed on the screen.8.Results are displayed on the screen.
1.The form is filled-in on screen. Press Enter to
transmit.
2.Web browser puts data into a string (URL) and
passes it to TCP/IP using HTTP.
4.SWS strips the destination information and
matches the remaining value against a sitedefined WWW rule (event procedure). The
transaction is scheduled for processing.
5.The event procedure is processed.
7.TCP/IP passes the information back to the PC
using HTTP protocol.
Once Shadow z/Enterprise Web Server is installed, the only setup task is to define an
event procedure for each IMS transaction invoked through the Shadow z/Enterprise Web
Server.
Shadow z/Enterprise Web Server Administration Guide1-9
Shadow z/Enterprise Web Server - An Overview
EXCI
Web Browser
SWS
CICS
Pro-
gram
TCP/IP
AutoHTML
Shadow z/Enterprise Web Server provides a feature known as Shadow AutoHTML™,
which generates a base level of HTML for rapid deployment of a first generation Web
application. The base HTML can be modified to further enhance the application by using
standard point and click Web development tools.
Executing CICS Transactions
Shadow z/Enterprise Web Server provides access to CICS transactions across the
Internet using Web browsers. without involving any modifications to the CICS code. This
means existing CICS programs can be executed and data returned in easily form atted
HTML.
From one URL, many existing physical CICS programs can be accessed to create one
new “logical” view of the data.
For CICS access, Shadow z/Enterprise Web Server uses technology known as the
Transaction Server for CICS, which connects to CICS via an EXCI (External CICS
Interface).
Summary
Shadow z/Enterprise Web Server is the product of choice for uniting the power of the
Internet with the rich resources of legacy System 390/MVS applications and data to fully
support IT initiatives in e-commerce and e-engineering. With Shadow z/Enterprise Web
Server, you’re assured of the scalability, security, performance, reliability, and control to
confidently combine the Internet and OS/390 data and applications.
Many enterprises use Shadow z/Enterprise Web Server to:
Web-enable mainframe applications without custom coding
Support e-initiatives by enabling global information-sharing without a gateway
Leverage existing production infrastructures and in-house System/390 expertise
Speed time to market by installing in less than one day, without on-site assistance or
interruption of operations
Figure 1–4. Executing a CICS Transaction
1-10Shadow z/Enterprise Web Server Administration Guide
Summary
Combine mainframe performance, reliability, security, and control while exploiting the
cost-effectiveness and eBusiness opportunities of the Internet
Provide automatic generation of HTML for CICS and IMS transactions
Accommodate up to hundreds of thousands of users with no performance degradation
or downtime
Eliminate the need for gateway hardware, software or application coding
Keep data on System/390 with no migration or loss of data integrity
In co rp or at e ce nt ra lize d, fully inte ra ctiv e on lin e mo nit or ing , co nt ro l, and dia gnos tics
capabilities
Speed and simplify development of new and composite applications
Shadow z/Enterprise Web Server Administration Guide1-1 1
Shadow z/Enterprise Web Server - An Overview
1-12Shadow z/Enterprise Web Server Administration Guide
CHAPTER 2:
Quick Start
A key component of the Shadow z/Enterprise Web Server is its even t based architecture that matches
incoming URLs to predefined event procedures or rules. These rules are site -defined actions that allow
you to perform a variety of processing roles. Topics include:
Before the information/procedure can be accessed on the mainframe, a “rule” must be
created and enabled on the mainframe. To access the rule from the PC, use your Web
browser and send the appropriate URL.
Rule
(Event Procedure) A rule is a member within an MVS PDS data set that contains
executable procedures.
URL
This is the acronym for Uniform Resource Locator. URLs:
Identify the Internet service protocol, such as HTTP or FTP
Specify the location of a file on the World Wide Web, network, or hard drive
Shadow z/Enterprise Web Server uses URLs to access rules. The following is a
URL:
How Shadow z/Enterprise Web Server Processes
Transactions
Unlike other Web servers, Shadow z/Enterprise Web Server does not attempt to match
the URL to an MVS file system entity. Instead, it looks up the URL value in a list of WWW
rule event procedure definitions.
Shadow z/Enterprise Web Server Administration Guide2-1
Quick Start
Executes
WWW Rule
Event
Matches
SWS
Client (Web Browser)
5
3
4
1,2
6,7
Tip: Naming Data Sets
Name the members in the data sets to correspond to the URL. That way, you can
easily find the rule to edit.
For example, “/NEON/SAMPDATA/htxother.htm” would be stored in the SAMPDATA
file with HTXOTHER as one of the members.
Shadow z/Enterprise Web Server processes the URL
http://www.neonsys.com/NEON/SA MPDATA/htxother.ht m
as shown in Table 2–1.
Table 2–1. How Shadow z/Enterprise Web Server (SWS) Handles URLs
Discarded once it arrives at the portSWS matches this to a rule (event procedure)
Figure 2–1 shows what happens when the URL finds a matching rule.
Figure 2–1. Finding a match on an inbound request
1. The client uses a Web browser and sends the URL to Shadow z/Enterprise Web
Server.
2. Shadow z/Enterprise Web Server stores the inbound input URL (
then creates the current URL by stripping the destination information (address).
3. It uses the current URL (stored in the
against the event procedure rule.
WWW.INPUTURL),
WWW.CURRENTURL) as the criteria to match
2-2Shadow z/Enterprise Web Server Administration Guide
4. When the match is made, the rule is executed. (This process is discussed in detail
later.) The results can be buffered before being sent back to Shadow z/Enterprise
Web Server.
5. Shadow z/Enterprise Web Server receives the results and creates the HTTP header.
6. Shadow z/Enterprise Web Server sends this information to the client without altering
the information.
Loading...
+ 386 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.