Chapter 5. Setting Up and Running IMS
This chapter provides an overview of the
In This Chapter:
The IMS installation task includes the following activities:
Most IMS installations involve migrating an existing version of IMS to a
Related Reading: For details about installing IMS, verifying the installation, tailoring IMS, and migrating IMS, see:
For more information about customizing IMS, see Chapter 20, "Customizing IMS," on page 347 and the IMS Version 9: Customization Guide .
Installing IMS Using SMP/E
System modification program/extended (SMP/E) is a z/OS tool designed to manage the installation of software products on your z/OS system and to track the modifications that you make to those products. The IMS code is shipped from IBM on cartridges and you use SMP/E to install IMS onto your computer. You can also use SMP/E to perform maintenance to your IMS.
IMS is delivered in multiple function modification identifiers (FMIDs) that need to be installed depending on what functions you want.
Related Reading: For complete information about SMP/E, see SMP/E V3R1.0 User's Guide .
IMS Installation Verification Program (IVP)
The Installation Verification Program (IVP) facility supplied by IMS is an ISPF application that verifies the majority of IMS features and functions of a newly installed IMS. The IVP uses a sample IMS system to perform this verification.
The IVP provides guidance for performing a combination of the following jobs and
You must define the IMS system and you must establish the interface between your IMS system and z/OS before you can run IMS.
Related Reading: For complete information about the IMS IVP, see IMS Version 9: Installation Volume 1: Installation Verification .
Defining an IMS System
Before you can use IMS TM or IMS DB, you must define the elements and functions that make up the IMS system, including:
IMS provides macros and procedures that enable you to define your system. IMS also provides user exits that enable you to customize processing. A
To define an IMS system, you can either customize the sample IMS system that is
Related Reading: For more information about the IMS definition process, see Chapter 19, "The IMS System Definition Process," on page 329 and IMS Version 9: Installation Volume 2: System Definition and Tailoring . For more information about the IMS user exits, see Chapter 20, "Customizing IMS," on page 347.
Setting up security for the IMS system is also part of the system definition process. IMS has its own built-in security functions and can provide more
Related Reading: For more information about IMS security, see Chapter 21, "IMS Security," on page 361. For complete information about IMS security, see IMS Version 9: Administration Guide: System .