Professional Documents
Culture Documents
Informatica PowerExchange For VSAM
Informatica PowerExchange For VSAM
Figure 1: PowerExchange provides on-demand access to complex data, including bidirectional VSAM data,
for a wide range of data integration and business intelligence initiatives
Unlock VSAM data easily and seamlessly for broader use by processes or systems
Enforce user- and data-level security requirements for safe operation and rapid deployment
Improve leverage of existing assets through support for multiple file formats
Meet comprehensive solution needs with seamless design and run-time integration with Informatica PowerCenter,
EAI, and other data integration technologies
Deliver VSAM data on demand through flexible Batch, Change, and Real-time options
Deploy a noninvasive architecture that uses VSAM exit points for change capture
Maximize flexibility with support for CICS and native (batch) VSAM
Condense all changes to common records into an end representation to minimize overall processing
Enforce user and data-level security for safe operation and rapid deployment.
PowerExchange supplies security at both the user authentication and data stream levels to ensure safe operation and rapid
deployment. When PowerExchange is used in conjunction with Informatica PowerCenter or a third-party product, the security
model is seamless across products.
At the user authentication level, PowerExchange supports granular, user-level security through a hierarchy of action scheme
(read, write, update, create, and so on). This scheme is supported by integration with mainframe security packages including
RACF, ACF/2, and Top Secret and is enforced at design time and run time.
If PowerExchange is used in conjunction with Informatica PowerCenter or a third-party product, security is enforced on a passthrough basis where logon/authentication dialogs prompt for the appropriate detail for each specific action. This capability
ensures seamless, end-to-end security.
At the data stream level, PowerExchange provides the ability to encrypt a point-to-point data connection using RSA key-based
encryption capabilities. This feature ensures security of data while in transit for more stringent environmental security
requirements.
By supplying multilevel, comprehensive security capabilities, PowerExchange ensures that VSAM data is securely available to
the right people, processes, or systems with minimal risk.
Improve leverage of existing assets through support for multiple file formats.
CICS or batch-based mainframe applications were originally designed using a variety of file formats and VSAM technologies.
PowerExchange supports a broad range of formats to ensure that all applications in the enterprise are supported in the same
architecture. Formats include KSDS, ESDS (batch only), and RRDS (fixed and variable). QSAM, CDG, PDS members, and
sequential file formats are also supported.
Meet comprehensive solution needs with seamless design and run-time integration
with Informatica PowerCenter, EAI, and other data integration technologies.
PowerExchange can operate as a standalone product or combine seamlessly with third-party products. For example,
PowerExchange can push data directly to an EAI-based message queue, or a data integration product can pull data through a
SQL request. This inherent flexibility is possible through a service-oriented architecture, an intrinsic part of the Informatica UDS
architecture.
Batch Option
The Batch option furnishes direct access to bulk VSAM data. Powered by VSAM data maps, SQL statements are translated
into native access calls that result in a stream of data for a calling program such as Informatica PowerCenter; and that data
can also be delivered directly to another system, message queue, database, or file. The incoming SQL statement can filter
the data to return smaller data sets as well as perform write operations back to the VSAM files themselves on a key-driven
basis.
Change Option
The Change option provides direct access to change-only data on a scheduled basis. Additional, patented components of
the PowerExchange architecture are configured to perform the change-capture function. Based on the type of VSAM
application (CICS or batch), different exit-based approaches allow for noninvasive change capture. The Change Option also
includes restart/recovery, performance tuning, and configuration optimization options.
Real-time Option
The Real-time option extends the value of capturing change-only data by including the capability to deliver that data in near
real time to a message queue, a database, or a calling program. This option employs the same change-capture facility of
the Change option but leverages additional architecture components to enable real-time delivery. The Real-time option also
features restart/recovery, performance tuning, and configuration optimization options.
Deploy a noninvasive architecture that uses VSAM exit points for change capture.
The PowerExchange architecture is delivered as a set of components that all work together to perform all aspects of the changecapture, management, and recovery process.
Capture AgentThe Capture Agent is a data platformspecific module that leverages transactional exit points or interfaces
to perform the change-capture function. It leverages high-speed mainframe HiperSpace as the location for writing changed
data.
CICS VSAM Capture AgentFor CICS VSAM, the Capture Agent consists of four global user exits and one task exit
that leverage standard CICS facilities for installation and execution without requiring changes to CICS or to existing
applications. These exits monitor CICS processing states to detect transaction changes and capture committed
records for the change stream. In general, processing is minimally impacted through the nonintrusive operation.
Native VSAM (Batch) Capture AgentFor native VSAM (batch), the Capture Agent can be deployed as part of an
individual batch job or on a system-wide basis. Each strategy detects a file's open and close states by various
interacting applications to simulate a unit of work.
Collector AgentThe Collector Agent is a generic architecture module that manages the distribution, persistence, or
condensing of changed, committed transactions. It also manages change stream recovery and synchronization for
subscribing applications. To ensure complete synchronization, only committed transactions based on units of work in the
source system are available on the change stream.
PowerExchange ListenerThe PowerExchange Listener is a generic architecture module that coordinates activities across
modules, initiates requests, or processes requests from third-party applications. The Listener also processes requests for
metadata during the design. As its name implies, the PowerExchange Listener waits on a TCP/IP port to initiate processing.
Maximize flexibility with support for CICS and native (batch) VSAM.
PowerExchange provides a unique, patented CDC architecture that does not require changes to existing applications to
implement change capture. It can be deployed in both VSAM CICS and native (batch) VSAM environments using platformspecific technologies for integrating with each transaction layer.
Why PowerExchange?
PowerExchange for VSAM is ideal for any organization seeking to use VSAM-based application data for broader business
benefit. It can significantly improve ITs ability to fully use this critical resource to address new business initiatives while
dramatically improving current integration methods. It provides significant end-to-end cost savings and fits easily into existing IT
environments. PowerExchange for VSAM is a clear choice for organizations that need to unlock VSAM data to meet on-demand
business objectives.
Environmental Requirements
Navigator Client Requirements
PowerExchange Navigator requires Windows PC
Networking Requirements
A minimum of one TCP/IP port must be available for PowerExchange usage
Port 2480 has been registered with IANA
System Requirements
z/OS Version 1.1 and higher
OS/390 Version 2.6 and higher
CICS/TS V2.3.0, V2.2.0, V2.1.0, V1.3.0, V1.2.0, V1.1.0, and CICS/ESA V4.1.0
TSO USERID user required for PowerExchange administration
VSAM File TypesKSDS, ESDS (batch only), and RRDS (fixed and variable)
QSAM, IAM file formats supported
For CICS VSAM, files must beset to RECOVERABLE
Paths over alternate index are supported
VSAM limitations
Records > 32660 bytes
Spanned ESDS
CI mode
Multiple TCBs environments accessing same file
Record level sharing (RLS)
Any PATH defined over a cluster
2004 Informatica Corporation. All rights reserved. Printed in the U.S.A. Informatica, the Informatica logo, Turning integration into insight, PowerCenter, and
PowerExchange are trademarks or registered trademarks of Informatica Corporation in the United States and in jurisdictions throughout the world. All other
company and product names may be tradenames or trademarks of their respective owners.
6518.0904