Browse Prior Art Database

PC Network 3270 File Transfer Open Interface

IP.com Disclosure Number: IPCOM000062290D
Original Publication Date: 1986-Nov-01
Included in the Prior Art Database: 2005-Mar-09
Document File: 1 page(s) / 12K

Publishing Venue

IBM

Related People

Jeffries, LM: AUTHOR [+3]

Abstract

A method is described which provides the ability to use different types of file transfers when using the PC Network 3270 Program Product. The PC Network 3270 Program Product is a software package which allows the IBM Personal Computer to emulate a 3274 control unit with an attached 3278/3279 display and a 3287 printer in varying configurations, facilitating stand-alone and network operation. This product attaches to a host using SDLC/SNA protocols and has file transfer capabilities. Since both DDM and DIA file transfer architectures are incorporated into the product, data cannot be passed directly to the application when received from a host. A process to validate data prior to the application, and for deciding for which transfer application the data is intended, is provided by the new method.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 74% of the total text.

Page 1 of 1

PC Network 3270 File Transfer Open Interface

A method is described which provides the ability to use different types of file transfers when using the PC Network 3270 Program Product. The PC Network 3270 Program Product is a software package which allows the IBM Personal Computer to emulate a 3274 control unit with an attached 3278/3279 display and a 3287 printer in varying configurations, facilitating stand-alone and network operation. This product attaches to a host using SDLC/SNA protocols and has file transfer capabilities. Since both DDM and DIA file transfer architectures are incorporated into the product, data cannot be passed directly to the application when received from a host. A process to validate data prior to the application, and for deciding for which transfer application the data is intended, is provided by the new method. A transfer processor is put into place to recognize all outbound (from the host) transfer data. This data is recognized by the type of command which must be a write-structured field command for file transfer. Once this command is recognized, the accompanying data must be parsed for structured fields. Each structured field is validated according to length and type. If the structured field is valid, the transfer processor will then determine for which transfer application the data is intended. Only then is the data actually passed to the application for further processing. The transfer processor monitors the System Network Architec...