Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Structure of the CNM routing table z/OS Communications Server: SNA Customization SC27-3666-00 |
|||||||||||||||||||||||||||||||||||||||||||
A CNM routing table consists of a 12-byte header entry and routing table entries. The 12-byte header entry contains the size and number of routing table entries that follow it. Each routing table entry contains the network services RU type to be routed, followed by the application program name to which the network services RU is to be routed. The header format is described in Table 1.
A CNM routing table entry consists of 12 bytes as described in Table 2.
Bit 0 of the flag byte specifies whether the RU is to be sent to the VTAM operator designated to receive unsolicited messages as well as to the CNM application program named in the table entry. This flag bit is supported only for requests for which VTAM has operator message support (that is, ROUTE-INOP). Bit 1 of the flag byte allows you to specify that an RU is to be sent to a user-written CNM application program without being embedded in a DELIVER RU. If this flag bit is set to 1, VTAM sends the request unit to the application program without embedding it in a DELIVER RU. If the flag bit is set to 0, the request unit is embedded in the DELIVER RU. The following types of requests can be received by an application program that uses the CNM interface. You should provide an entry in the table for each type of unsolicited network services RU. The network services header value listed below must be coded in the respective entry for that network services RU type (bytes 1–3).
You can code more than one entry associating a single type of RU with more than one application program; however, no more than one program associated with that type of RU can be active at the same time. For example, if an application program associated with the RECMS RU is already active, another application program associated with the RECMS RU is unable to open its ACB. For a CNM routing table that permits either of two CNM
application programs (CNMAPPL1 or CNMALT) to receive unsolicited requests,
you might code the following:
Note that in
the above example, CNMAPPL1 and CNMALT have each been defined to receive
the same type of unsolicited requests (RECMS and RECFMS). In this
case, both application programs cannot be active (that is, have open
ACBs for application programs whose network names are CNMALT and CNMAPPL1)
at the same time.
Notes:
|
Copyright IBM Corporation 1990, 2014
|