Browse Prior Art Database

Multi-System Command Routing and Response Aggregation

IP.com Disclosure Number: IPCOM000112062D
Original Publication Date: 1994-Apr-01
Included in the Prior Art Database: 2005-Mar-26
Document File: 2 page(s) / 56K

Publishing Venue

IBM

Related People

Day, AM: AUTHOR [+5]

Abstract

Disclosed is a technique to perform multi-system command routing and response aggregation. The MVS/ESA* multi-system command routing mechanism allows an operator (or a program) to enter a command once for execution on multiple systems, and then view a single list which contains an aggregation of all responses.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 54% of the total text.

Multi-System Command Routing and Response Aggregation

      Disclosed is a technique to perform multi-system command
routing and response aggregation.  The MVS/ESA* multi-system command
routing mechanism allows an operator (or a program) to enter a
command once for execution on multiple systems, and then view a
single list which contains an aggregation of all responses.

      The command routing and aggregation mechanism accepts an
arbitrary command as input and sends a copy of the command to every
system in a specified collection.  After the command instance
executes on each system, the mechanism collects all of the command
responses and combines them into a single response.  It then returns
this aggregated response to the command issuer.

The command routing and aggregation mechanism performs the following
steps:

1.  Allocates a programmable console to be used for obtaining the
    responses.

2.  Builds a list containing the name of each system in the sysplex.

3.  Sends a copy of the command text to each system for execution as
    a command.  Each individual instance of the command appears as if
    it originated from the programmable console, so that responses
    will be returned to the multi-system command processor.  For
    authorization purposes, the security environment of the command
    issuer is carried with each of the instances of the distributed
    command.

    This technique of manipulating the origin of the command,...