Adabas Natural Direction.pdf · 2017. 12. 17. · Created Date: 12/13/2010 4:06:01 PM
1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using...
-
date post
19-Dec-2015 -
Category
Documents
-
view
220 -
download
5
Transcript of 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using...
1
10th Natural ConferenceOctober 29, 2001
High PerformanceWeb-enablement of
ADABAS/Naturalusing
ShadowDirect and
ShadowWeb Server by Rex Bowe
10th Natural ConferenceOctober 29, 2001
High PerformanceWeb-enablement of
ADABAS/Naturalusing
ShadowDirect and
ShadowWeb Server by Rex Bowe
2
SHADOW ® Natural Conference
Agenda
SHADOW ® Natural Conference
Agenda
Who is NEON?
Shadow Architecture Shadow Direct
• NEON Client
• Transaction Level Security
ADABAS Interface Natural Interface Data Mapping Facility Monitoring, Diagnostics, & Controls
• Shadow Event Facility
Shadow Web Server for OS/390
Live Demo
Who is NEON?
Shadow Architecture Shadow Direct
• NEON Client
• Transaction Level Security
ADABAS Interface Natural Interface Data Mapping Facility Monitoring, Diagnostics, & Controls
• Shadow Event Facility
Shadow Web Server for OS/390
Live Demo
3
0
5
10
15
20
25
30
FY1996 FY1998 FY2000
Revenue
Founded in 1991 Rapid Market Acceptance Profitable in Four Years No debt Acquisition Growth Model NASDAQ (NESY)
NEON SystemsNEON SystemsCorporate InformationCorporate InformationNEON SystemsNEON SystemsCorporate InformationCorporate Information
SHADOW ® Who is NEON? SHADOW ® Who is NEON?
4
SHADOW ® NEON History SHADOW ® NEON History
History of Shadow
Peter Schaffer @ Texaco in 1990 – Power Builder Environment
Developed from 1991 - 1994
First customer in 1995 (BASF)
Formation of NEON Systems
Shadow Today
Active Development - V 4.8 Shipping End of Month
ALL Industry Acceptance
Current Clients No 1No 1 Priority
Customer References
History of Shadow
Peter Schaffer @ Texaco in 1990 – Power Builder Environment
Developed from 1991 - 1994
First customer in 1995 (BASF)
Formation of NEON Systems
Shadow Today
Active Development - V 4.8 Shipping End of Month
ALL Industry Acceptance
Current Clients No 1No 1 Priority
Customer References
5
More than 400 customers (over 40% of the Fortune 100) and most are Global 2000, spanning most industries
More than 400 customers (over 40% of the Fortune 100) and most are Global 2000, spanning most industries
6
Global 2000 Customer BaseGlobal 2000 Customer Base
7
Wells Fargo Bank Wells Fargo Bank BUSINESS GOAL NEON Systems’ SOLUTION
SELECTION CRITERIA
To Web-enable and optimize its customer support initiatives.
Shadow Direct and Shadow Web Server were implemented eliminating problems associated with gateways and increasing customer support capabilities.
Required a CICS transaction server.
Monitoring, control, and diagnostic capabilities.
Fault tolerance
None
COMPETITION
8
Merrill LynchMerrill LynchBUSINESS GOAL NEON Systems’ SOLUTION
SELECTION CRITERIA
As one of the world’s largest client/server to mainframe production environments, Merrill Lynch required a safe, simple solution to provide mainframe data access to its users.
Current transaction volumes facilitated through Shadow Direct has topped 800,000 per day and is steadily growing 30%-40% per year.
Shadow Direct was chosen for its simple architecture, large application scalability, ease of implementation, low overall cost, speedy problem identification and resolution, and IT-friendly nature.
An in-house application IBM’s DB2 Connect MDI Gateway
COMPETITION
9
GMAC InsuranceGMAC InsuranceBUSINESS GOAL NEON Systems’ SOLUTION
SELECTION CRITERIA
To build Web-enabled access to many years of GMAC ADABAS legacy mainframe data for an easy-to-use, self-service customer website.
GMAC employed Shadow Direct and JDBC driver for data access and legacy application renewal for is customer-focused Web service.
NEON provided access to ADABAS, DB2, and Cobol RPC’s, and Read Write functionality without a required gateway and custom coding.
EDA SQL IBM DB2 Connect EntireX
COMPETITION
10
BoeingBoeingBUSINESS GOAL NEON Systems’ SOLUTION
SELECTION CRITERIA
To rapidly Web-enable legacy programs (such as the Employee Timekeeping System) with a secure, scalable, and reliable solution.
Example: Employee Timekeeping System generates 1.5 million hits per day.
Shadow Web Server accessing IMS/TM, DB2, and CICS
Scalability, security, and time required for deployment.
IBM's ICSS
COMPETITION
11
Shadow ArchitectureShadow Architecture
SHADOW ®SHADOW ®
12
OS/390
SNA
TCPIP
Top Secret
ACF2
RACF
FlatFiles
Natural
ADABAS
IMS/DB
IMS/TM
VSAM
CICS
DB2Shadow Server
Web, Application or Integration ServerPackaged application: ERP, CRM, BI, Portal
Running on NT or Unix
Data Mapping
Auto Management
Monitoring/Diagnostics
RSPRPC
Thread Management
TCB TCB TCB
TCB TCB TCB
WLM
Client AppWindows, NT,
Unix, OS/2, Mac
No gateway required
direct access to OS/390
RRS
SHADOW ® Unique ArchitectureSHADOW ® Unique Architecture
NEONClient
NEONClient
Web BrowserInternet Explorer,
Netscape
13
Shadow NO gateways required Many Optimized Connection Modes
SSL Encryption
Load Balancing, Work Load Manager support
Real-time end-to-end diagnostics, Event Facility, Activity Monitor
Access OS/390 data, applications & transactions
Data Mapping Facility for non-relational data
Transaction Level Security
As scalable as S390
SHADOW ® ArchitectureSHADOW ® Architecture
14
Runs as own MVS based address space (No USS required)
TCB Architecture (Isolation, scale, monitoring, control)
Run up to 36 address spaces (one address space supports
300-800 connections depending on data sources)
Load balancing among address spaces
Work Load Manager (WLM) Support
DB2 Thread Reuse (Virtual Connection Facility)
Supports ODBC and JDBC connection pooling
Boeing driving 2-3 million IMS Transactions in SWS
during a 2 hour window
Runs as own MVS based address space (No USS required)
TCB Architecture (Isolation, scale, monitoring, control)
Run up to 36 address spaces (one address space supports
300-800 connections depending on data sources)
Load balancing among address spaces
Work Load Manager (WLM) Support
DB2 Thread Reuse (Virtual Connection Facility)
Supports ODBC and JDBC connection pooling
Boeing driving 2-3 million IMS Transactions in SWS
during a 2 hour window
SHADOW ® Why is it scalable and reliable?SHADOW ® Why is it scalable and reliable?
15
Enforces native OS/390 security via Security Access Facility (SAF), provides tight integration with RACF, ACF2, TopSecret
Enforces subsystem security• DB2• IMS• CICS• Natural
Encryption of data stream with SSL• Software• Hardware (GSK encryption chip, 10 times faster)
Complete accountability• Detail mainframe logging• Cuts SMF records for connection and query• Extended proxy user logging
Has not been hacked• Security through obscurity
Enforces native OS/390 security via Security Access Facility (SAF), provides tight integration with RACF, ACF2, TopSecret
Enforces subsystem security• DB2• IMS• CICS• Natural
Encryption of data stream with SSL• Software• Hardware (GSK encryption chip, 10 times faster)
Complete accountability• Detail mainframe logging• Cuts SMF records for connection and query• Extended proxy user logging
Has not been hacked• Security through obscurity
SHADOW ® How secure is it?SHADOW ® How secure is it?
16
ShadowDirectShadowDirect
SHADOW ®SHADOW ®
17
High performance, multi-threaded, thread-safe, scalable driver
Single .dll approx. 2-3 meg (small footprint)
Supports Unix, NT, Windows, OS/2, Mac platforms
Supports ubiquitous database APIs• ODBC • JDBC J2EE Driver• JCA
Client-side optimizations, limits, debugging
Connection Pooling
NEON data stream• Data compression – up to 90%
High performance, multi-threaded, thread-safe, scalable driver
Single .dll approx. 2-3 meg (small footprint)
Supports Unix, NT, Windows, OS/2, Mac platforms
Supports ubiquitous database APIs• ODBC • JDBC J2EE Driver• JCA
Client-side optimizations, limits, debugging
Connection Pooling
NEON data stream• Data compression – up to 90%
SHADOW DirectTM NEON ClientSHADOW DirectTM NEON Client
18
Client/Server: VisualBasic, PowerBuilder, Delphi, Microsoft Office, C/C++...
Web Servers: IIS, Apache, Cold Fusion, ...
Application Servers: WebSphere, WebLogic, SilverStream, iPlanet, WebGain ...
Integration Servers: CrossWorlds, Vitria …
Business Intelligence: Brio, Cognos …
CRM and ERP: Siebel, Peoplesoft, …
Portals: Epicentric, Plumtree …
Client/Server: VisualBasic, PowerBuilder, Delphi, Microsoft Office, C/C++...
Web Servers: IIS, Apache, Cold Fusion, ...
Application Servers: WebSphere, WebLogic, SilverStream, iPlanet, WebGain ...
Integration Servers: CrossWorlds, Vitria …
Business Intelligence: Brio, Cognos …
CRM and ERP: Siebel, Peoplesoft, …
Portals: Epicentric, Plumtree …
SHADOW DirectTM provides access to OS/390 for these solutions and products…
19
Feature for Shadow Direct in a 3-tier web
When proxy Logon IDs are used by servers to access OS/390 data, applications and transactions
Shadow allows for detailed information about a user to be cut with SMF records for the proxy Logon ID
Provides traceability, chargeback to users, who would otherwise be masked by proxy Logon ID
Only way to properly handled infinite number of Internet users in conjunction with RACF, ACF2 or Top Secret
Feature for Shadow Direct in a 3-tier web
When proxy Logon IDs are used by servers to access OS/390 data, applications and transactions
Shadow allows for detailed information about a user to be cut with SMF records for the proxy Logon ID
Provides traceability, chargeback to users, who would otherwise be masked by proxy Logon ID
Only way to properly handled infinite number of Internet users in conjunction with RACF, ACF2 or Top Secret
SHADOW DirectTM Transaction Level Security
20
SAF
Result setTCP/IPListner
OS/390 - MVS Host
TCB
TCP/IP
DiagnosticFacility
RACFACF2TOP S
WLM
ODBC/JDBC
ADABAS
AC I
Natural-transNatural-transNatural-trans
CICS/Batch
TCB
TCB
ADAREP FDT/ADACMP
EventFacility
Data MappingFacility
SQL -> Direct Call
CALL SHADOW_ACI
Shadow Direct
SHADOW DirectTM for ADABAS & NaturalSHADOW DirectTM for ADABAS & Natural
21
Interface for ADABASInterface for ADABAS
SHADOW ®SHADOW ®
22
SQL syntax and native database syntax
• Supports ADABAS end transaction (ET) and
Backout transaction (BT) commands
ADABAS File Level Security
Multi-file Joins in ADABAS
• Up to 5 files
Supports Native ADABAS Constructs and
Operations:
• Multi-Value fields (MU), Periodic Group (PE)
• Cursor Processing
• Multi-descriptor Processing
SQL syntax and native database syntax
• Supports ADABAS end transaction (ET) and
Backout transaction (BT) commands
ADABAS File Level Security
Multi-file Joins in ADABAS
• Up to 5 files
Supports Native ADABAS Constructs and
Operations:
• Multi-Value fields (MU), Periodic Group (PE)
• Cursor Processing
• Multi-descriptor Processing
SHADOW ® Interface for ADABASSHADOW ® Interface for ADABAS
23
SHADOW ® Interface for ADABASSHADOW ® Interface for ADABASAccess ADABAS Meta Data from adistributed tool.
24
Interface for Natural/ACIInterface for Natural/ACI
SHADOW ®SHADOW ®
25
SHADOW ® Shadow ACI’s benefitsSHADOW ® Shadow ACI’s benefits
Simple Implementation CALL SHADOW_ACI(‘SEND’,’NATSRV1,NATPDA1’,1009,’1’,…)
Input/Output data checking & transformation using mapping
Return multiple column, multiple records CICS connection fail over CICS load balancing Resource protection.
Natural Storage leak protection by limiting the amount times the server is accessed before it is restarted.
Shadow Server automatically start and kill servers according to demand.
Allowing less frequently used servers to “Die” free’s up storage for more often used servers, utilizing the available resources more wisely
Simple Implementation CALL SHADOW_ACI(‘SEND’,’NATSRV1,NATPDA1’,1009,’1’,…)
Input/Output data checking & transformation using mapping
Return multiple column, multiple records CICS connection fail over CICS load balancing Resource protection.
Natural Storage leak protection by limiting the amount times the server is accessed before it is restarted.
Shadow Server automatically start and kill servers according to demand.
Allowing less frequently used servers to “Die” free’s up storage for more often used servers, utilizing the available resources more wisely
26
SHADOW SHADOW_ACI() SQL CALL
CALL SHADOW_ACI(‘FUNC’,‘SERVER,MAPIN,MAPOUT’,‘DATA’,…)
Parameter Description‘FUNC’ Function for Call, ex. ‘SEND’, ‘SOC’, ‘EOC’.‘SERVER’ Name of defined Natural “server” process.‘MAPIN’ Name of Map definition taken from data area
definition, to provide data-type checking‘MAPOUT’ Name of Map definition taken from data area
definition, to provide result set of Natural data area
SQL example:
CALL SHADOW_ACI('SEND','EXAMPLE1,PARMMAP1',3009,'1')
27
OS/390
Shadow Server
RACF ACF2 TOP SECRET
ADABAS
Automated Management
Monitoring/Diagnostics
SHADOW_ACI
CICS/TSREGION
DATAMAPPINGFACILITY
EXCIXS01
XS02
XS03
XS04
XS05
SHADOW DirectTM Interface for CICS/ACI
DFH$AXCS DEFINE DATA LOCAL
CALL ‘BROKER’ RECEIVEAREAFIND EMPLOYEE WITH NAME EQ NAME-INMOVE DATA TO SENDAREACALL ‘BROKER’ SENDAREA
1 SENDAREA (A250)1 RECEIVEAREA (A250)
28
OS/390
Shadow Server
RACF ACF2 TOP SECRET
Automated Management
Monitoring/Diagnostics
CICS/TSREGION-A
CICS/TSREGION-B
SHADOW_ACI
SHADOW ® Interface for Natural/CICSSHADOW ® Interface for Natural/CICS
Fail OverSupport
29
SHADOW ® Natural Server ManagementSHADOW ® Natural Server Management
ViewMapDetails
30
Data Mapping Facility
Powers Shadow in providing metadata and relational resultsets for non-relational data, applications and transactions
Data Mapping Facility
Powers Shadow in providing metadata and relational resultsets for non-relational data, applications and transactions
SHADOW ®SHADOW ®
31
01 DFHCOMMAREA 03 INPUT-ID 03 CUSTOMER-NAME 03 ADDRESS-DETAILS 04 ADDRESS-NUMBER 04 ADDRESS-STREET 04 ADDRESS-CITY 04 ADDRESS-STATE
MAP NAME : CUSTINFO
INPUT-IDCUSTOMER-NAME
ADDRESS-NUMBER
ADDRESS-STREET
ADDRESS-CITY
ADDRESS-STATE
Meta Data repository for non-relational data CICS COMMAREA, IMS MFS, VSAM Copybook, ADAREP, ADAWAN or Natural data area
SHADOW ® Data Mapping FacilitySHADOW ® Data Mapping Facility
32
SHADOW ® Natural Data Map CreationSHADOW ® Natural Data Map Creation
ExtractMeta DataFromSource code
33
SHADOW ® Data Mapping FacilitySHADOW ® Data Mapping Facility
Source code,Copybook,COMMAREA,MFS,Natural Data Area
34
SHADOW ® Data Mapping FacilitySHADOW ® Data Mapping Facility
ViewMapDetails
35
Monitoring andDiagnostics
A centralized detailed tracing facility,monitoring real-time usage.
Monitoring andDiagnostics
A centralized detailed tracing facility,monitoring real-time usage.
SHADOW ®SHADOW ®
36
Trace ADABAS queries SQL -> ADABAS Direct Calls Display of ADABAS Control Block
Trace Natural servers Natural Server activity Display input and output data buffers
Record error messages
ISPF panel and web monitoring interfaces
Trace ADABAS queries SQL -> ADABAS Direct Calls Display of ADABAS Control Block
Trace Natural servers Natural Server activity Display input and output data buffers
Record error messages
ISPF panel and web monitoring interfaces
SHADOW TM Monitoring and Diagnostics
37
SHADOWSHADOW ®® Diagnostic FacilitySHADOWSHADOW ®®
Diagnostic Facility
Monitoring Users
38
SHADOW SHADOW ®® Diagnostic FacilityDiagnostic FacilitySHADOW SHADOW ®®
Diagnostic FacilityDiagnostic Facility
Trace Browse
39
Maximum Rows Limit resultset size
Maximum DB2 Timerons
• Prevents expensive queries from starting
Maximum CPU Usage
• Per Session• Per Query
DB2 Lock Utilization Limits
• Fail & Warning for:– Shared– Update– Exclusive
Wide range of detectable Shadow events
• Resource management events• Security events• SQL, DL/1, RPC, CICS, IMS• Communication events
Wide range of actions available
• Terminate connection and thread
• Adjust performance profiles• Modify queries• Adjust authorization details • Limit rows and CPU Time
SHADOW ® Event FacilitySHADOW ® Event Facility
4017
What are customers doing with SEF?What are customers doing with SEF?•••
•.
•• -like MAXROWS.•
•Modifying or rejection queries before they execute (check for WHERE clause)
•
•Limit the number of connections that a user can have•Restrict access to only certain DB2s from certain Shadows•Obtaining ACF2 Logon information from a user’s ACEE and returning it to the client application.•Granting users additional CPUTIME and unlimited FAILWAITIME
based on userid.•Restricting logons during certain parts of the day•Overriding client connection parameters -like MAXROWS.•Quiescingthe server rather than shutting down nightly when running database backups•Modifying or rejection queries before they execute (check for WHERE clause)
•Prevent expensive queries from running
SHADOW® Event FacilitySHADOW® Event Facility
41
ShadowWeb Servervisit http://mkt.neonsys.comShadowWeb Server
visit http://mkt.neonsys.com
SHADOW ®SHADOW ®
42
SHADOW Web ServerTM 2-tier Shadow Web SHADOW Web ServerTM 2-tier Shadow Web
MVS-OS/390
TCP/IP
Windows, NT, OS/2,
UNIX
Web Client
Intranet/Internet
Shadow Web ServerRACF
ACF2Top Secret
HTTP
SDF(ISPF)
WWW Rules
DB2
CICS,Natural
IMS
ADABAS
VSAM,IDMS,others
TraceBrowse
43
It works on OS/390!
Leverage existing OS/390 skills & assets
Secure, scalable, and reliable
Turn-key and rapid development features
Supports proprietary development approaches
(secure)
Adaptable to emerging http technologies
Cost effective
No additional hardware required
Rapid installation and development
Minimal support staff
It works on OS/390!
Leverage existing OS/390 skills & assets
Secure, scalable, and reliable
Turn-key and rapid development features
Supports proprietary development approaches
(secure)
Adaptable to emerging http technologies
Cost effective
No additional hardware required
Rapid installation and development
Minimal support staff
SHADOW Web ServerTM Why consider it?SHADOW Web ServerTM Why consider it?
44
10. References: Many high volume, high performance, HAPPY customers
from the home office in Sugar Land, Texas
SHADOW ® Top Ten Benefits SHADOW ® Top Ten Benefits
9. Visibility: Extraordinary real-time end-to-end monitoring and diagnostics
8. SYSPROG and DBA Control: Automated management to control utilization by distributed applications
7. Transparent access OS/390 Data and Transactions: One product to access DB2, IMS, ADABAS, VSAM, CICS/TS, Natural, more . . .
6. Security: Support RACF, ACF2, TopSecret via SAF; cuts SMF records; Encryption with SSL, TLS, support subsystem security, KILL command
5. Reduce Network Load: Optimizations to reduce bandwidth requirements and network round trips
4. Quality of Service (QoS): High performance, reliable, scalable and secure architecture requiring no gateways
3. Integration Standards: ODBC, JDBC, XML, HTML
2. Leverage Investments: OS/390 hardware, software and skills
1. Reduce Costs: Reduce total cost of ownership (TCO) and manpower to maintain due to “no gateway” architecture
45
NEON, Shadow, ShadowDirect, and Enterprise Direct are registered trademarks, and Shadow Activity Monitor, Shadow Advanced Scalability, Shadow AutoHTML, Shadow Enterprise Transactions, Shadow Event Facility, Shadow Interface, Shadow REXX/Tools, Shadow TLS, Shadow Web Interface, Shadow Web Server for OS/390, and Shadow Web Server for VM are trademarks of NEON Systems, Inc.
ADABAS and Natural are registered trademarks of Software AG.
DB2, CICS, MQSeries, and OS/390 are registered trademarks, and MVS and IMS are trademarks of the IBM Corporation.
All other trademarks are the property of their respective owners.
46
ShadowLIVE DEMO!
ShadowLIVE DEMO!
SHADOW ®SHADOW ®