Solved

Using DB2Connect

Posted on 2008-06-16
6
521 Views
Last Modified: 2008-06-20
1) I believe that DB2Connect is used to connect to host systems from non-host systems. Is this
correct? Is this the only way?

2) Does host systems mean only mainframes with AS/400, MVS, OS/2, OS/390 etc. as OS? Does
non-host systems mean mid-range AIX, IBM PC desktop UNIX, Solaris, Linux, laptops & palmtops?

3) What about apple-mcintosh & HP-UX? Is DB2 available and can we use DB2Connect to connect to
host systems?

4) What about the other way round from host systems to non-host ones?

5) What about non-host ones to non-host ones? Is DB2Connect optional in this case?

6) When is a DB2Connect Server/Gateway used? What is the difference with & without it?

7) What is Data Distribution Facility(DDF)? Is this mainframe specific? How does it interact with DB2Connect gateway/client?
0
Comment
Question by:k_murli_krishna
  • 3
  • 3
6 Comments
 
LVL 37

Accepted Solution

by:
momi_sabag earned 200 total points
Comment Utility
1) you are correct. it's not the only way. there are 3rd party products that also do it like HIS by microsoft. you can also use the universal jdbc driver
2) yes
3) i don't think db2 has a version for macintosh. hp-ux is not an host, so you can connect to it using a regular client
4) implement drda protocol client yourself
5) you don't need db2 connect here. non-host db2's can communicate between themselfs natively
6) db2 connect always has a server component and a client component. the server component connects to the host, the client component connects to the server component (unless you use some versions that has only servers and are only capable to connect a single non-host server to host servers for  example - personal edition)
7) ddf is the component on the mainframe db2 that is responsible for communication (inbound and outbound). it is the component that interacts with the db2 connect gateway
0
 
LVL 17

Author Comment

by:k_murli_krishna
Comment Utility
Thanks, momi.
4) implement drda protocol client yourself: Does that mean we need to code the entire client OR DRDA client is available to install and we need to do some fine tune coding/configuration.
Please post some good link(s) if they can help further.
0
 
LVL 17

Author Comment

by:k_murli_krishna
Comment Utility
Momi, please answer or post a link so that I can close this question.
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 37

Expert Comment

by:momi_sabag
Comment Utility
no drda client is available, the protocol is available and you will need to implement it, but i would not choose that solution as it is very error prone
what do you need to accomplish?
0
 
LVL 17

Author Comment

by:k_murli_krishna
Comment Utility
I need to suggest good approaches to migrate data from iSeries AS/400 database schema to SUSE Linux x8664 DB2. So, if control is kept on mainframes side then we need to connect from host to non-host. But AS/400 DB2 is production which is being migrated along with application migration to Linux boxes.
0
 
LVL 37

Expert Comment

by:momi_sabag
Comment Utility
so you should use db2 connect
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Recursive SQL in UDB/LUW (you can use 'recursive' and 'SQL' in the same sentence) A growing number of database queries lend themselves to recursive solutions.  It's not always easy to spot when recursion is called for, especially for people una…
Recursive SQL in UDB/LUW (it really isn't that hard to do) Recursive SQL is most often used to convert columns to rows or rows to columns.  A previous article described the process of converting rows to columns.  This article will build off of th…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now