As you become familiar with how VTAM control blocks relate to one another, you will be able to use Query to diagnose increasingly complex issues within VTAM.
This chapter provides samples of how you can diagnose specific questions about a VTAM network using Query:
Determining a Session's BIND Image.
Determining an Application's Privileges.
Let's say that you want to determine the BIND image that is being used between a particular VTAM application program (the PLU) and a device named T010001 (the SLU).
The information that you seek is a function of an existing session. VTAM stores this information in a Session Information Block (the SIB).
Steps:
|
The first and second columns list the LU names of the two session partners. The third column indicates the type of control block.
|
Sibbpptr and Sibbsptr contain navigational values that point at the SIB extensions for the Logical Units in session. The field prompt of Sibblgmd contains the logmode name that was used for session setup.
|
The values from this Query display are related to the VTAM MODEENT macro by the identified operands (MODEENT FMPROF= is equivalent to the Binfm panel element, etc.).
You may also interrogate the meanings of individual BIND image supplemental fields by using the cursor (see Viewing additional field information). For example, selecting the BINPRIP field would cause the following pop up to appear:
|
The interpreted bits represent the settings that are in effect for the selected supplemental field.
|
If you have dealt with BIND images previously, you should recognize the BIND beginning at offset 8 in the display.
Assume that you would like to determine if a specific application is authorized for the Secondary Program Operator privilege (SPO).
This information is defined to VTAM in the VTAMLST member or file associated with defining the Application, which you can locate easily via the Resource definition table.
However, to provide a better demonstration of the connection between VTAM control blocks, we will start from the Application Program Blocks.
Steps:
|
|
|
|
|
The Acdrdte field contains the address of the RDT (Resource Definition Table) entry for A01TNC.
|
|
The Rapbitan flags indicate that A01TNC has several characteristics provided via the AUTH= keyword of the APPL definition. The one we are interested in (Rapaspo) is on, which means that the application is authorized for the Secondary Program Operator interface (VTAM commands can be generated by the program).