Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Easy REXX for Communications in Client/Server Programming

IP.com Disclosure Number: IPCOM000115827D
Original Publication Date: 1995-Jun-01
Included in the Prior Art Database: 2005-Mar-30
Document File: 4 page(s) / 99K

Publishing Venue

IBM

Related People

Satoh, H: AUTHOR [+2]

Abstract

Disclosed is a programming methodology that enables users to develop REXX programs for communication with PC and S/390* or AS/400* Host system easily.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 53% of the total text.

Easy REXX for Communications in Client/Server Programming

      Disclosed is a programming methodology that enables users to
develop REXX programs for communication with PC and S/390* or AS/400*
Host system easily.

The advantages of this methodology are:
  1.  Users don't need to learn a programming language and all
       necessary code is generated by Record-By-Example.  Users'
       operations are translated to programming logic on-the-fly.
  2.  End of communication transaction is automatically detected by
AID
       key operation.
  3.  Any kind of Host applications can be applicable by using this
       methodology.
  4.  Users is navigated by messages displayed on the screen and can
       understand the next action.
  5.  Not only main routine but also a sub-routine (parts) can be
       generated and be re-used for other REXX applications.

      Fig. 1 shows the relation between Easy REXX programming
WorkFrame and communication API layers.

      Fig. 2 shows the automatic programming logic by
Record-By-Example.  The main routine is regenerated on the
programming work sheet when a user starts the Record-By-Example.  The
main routine registers external functions used for communication API
and arguments passed from a user when this REXX program is executed.
All communication transactions are detected automatically and
converted to a REXX program logic on-the-fly by following method.

      The most important thing is that this program logic must be
independent of network environment.  In fact, there are various
network environment and it is sometimes slow response due to low
speed communication line or heavy network traffic.
  1.  Cursor move keys and alphanumeric keys are simply recorded as
       REX...