Connecting systems with VTAM

Virtual Telecommunications Access Method (VTAM®) is a program that you can use to control remote DB2® communication.

About this task

Remote communications terminology:
Logical unit (LU)
A source of requests entering the network and a receptor of replies from the network. For example, a particular DB2 is an LU.
Session
A logical connection between two LUs. Multiple sessions can run on a single physical connection.
Conversation
A dialog that uses a session to transfer information between transaction programs, such as DB2 to DB2. A single session can support multiple conversations, but only one at a time.
To prepare DB2 for communication using VTAM and the distributed data facility (DDF), complete the following steps. You can complete steps 1, 2, and 3 after installing DB2. Steps 6 through 8 are optional.
  • Step 1: Customize VTAM for DB2

    To make monitoring of the network easier, consider installing NetView®.

  • Step 2: Choose names and a password

    You need to choose two names for the local DB2 subsystem: a location name and a logical unit name (LU name).

    A location name distinguishes a specific database management system in a network, so applications use this name to direct requests to your local DB2 subsystem. Other systems use different terms for a location name. For example, DB2 Connect™ calls this the target database name. The DRDA term, RDBNAM, is used to refer to non-DB2 systems' relational database names.

    An LU name is the name by which VTAM recognizes this subsystem in the network. You might need to know the LU names of other systems that can request data from the local DB2 subsystem, or you can use a default LU name of eight blanks.

    If you plan to request data from other systems, you need the LU names and location names for those serving systems. Most of the time, system administrators and operators need to know both names, because they can use both names in various commands, and DB2 uses both names in messages.

    In addition to the names mentioned above, you can choose an optional password to validate your local DB2 subsystem to VTAM. If the z/OS® system on which DB2 is running is part of an z/OS Parallel Sysplex®, you can choose a generic LU name to define a DB2 group to remote locations.

  • Step 3: Define the DB2 subsystem to VTAM

    Use the VTAM APPL statement to make the DB2 subsystem known to VTAM. You must include the APPL definitions in the VTAM SYS1.VTAMLST library at VTAM startup.

    Also use the VTAM MODEENT statement to define default session modes. You must include mode tables in the VTAM SYS1.VTAMLIB library at VTAM startup.

    Sample VTAM definitions are provided in the data set DSN8VTAM in SDSNSAMP and in examples throughout this topic.

  • Step 4: Populate the communications database

    The DB2 catalog includes the communications database (CDB), which contains several tables that hold information about your connections with remote systems. You must populate some of these tables before you can request data from those remote systems. If this DB2 system only services data requests, you do not have to populate the CDB; you can use the default values.

  • Step 5: Start VTAM to use DB2

    When you start VTAM to use DB2, you must be sure that the proper definitions are in the VTAM libraries VTAMLST and VTAMLIB.

  • Step 6: Tune the system

    This is an optional step, which you can do after you have established communications between two or more systems. The procedure outlined up to this point gives you default values for your DB2 modes and your class of service. Although the defaults are probably adequate for your preliminary testing, you can change them to improve performance in the network, or to assign different modes to different application plans.

    When VTAM links two nodes, it establishes a session. The number of available sessions can have a significant impact on performance; therefore, you might need to modify your session limit values. Also, large amounts of DB2 data travelling through the network can severely affect VTAM storage, and you might need to tune buffer storage.

    You can also tune the system by changing mode options. A mode describes various characteristics of a session, such as the maximum number of bytes sent at one time. Modes can point to a class of service table, which ranks the available virtual routes for this mode with respect to preference of use and paths through the network. Essentially, the class of service table allows you to assign different network priorities to your modes.

  • "Step 7: Create Aliases"

    This is an optional step. Start of changeEach DB2 location can create aliases for the tables it wants to access, using DRDA, at the other DB2 locations.End of change

  • "Step 8: Provide Authorization for an Appropriate Level of Security"

Related information