Skip to main content

Systems Programmer's Guide to Resource Recovery Services (RRS)

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.


Published on 29 November 2004, updated 06 February 2007

  1. .PDF (1.8 MB)

Share this page:   

ISBN-10: 0738490768
ISBN-13: 9780738490762
IBM Form #: SG24-6980-00

Authors: Frank Kyne, Paola Bari and Alan Murphy

    menu icon


    This IBM Redbooks publication gives you a broad understanding of the Resource Recovery Services (RRS) environment. RRS provides a global syncpoint manager that any resource manager on z/OS can exploit. It enables transactions to update protected resources managed by many resource managers.

    RRS is increasingly becoming a prerequisite for new resource managers, and for new capabilities in existing resource managers. Rather than having to implement their own two-phase commit protocol, these products can use the support provided by RRS.

    Since older transaction managers like CICS already offered many of the benefits of RRS for processing their own data, not many people rushed to exploit RRS when it was first introduced. However, as more transaction managers have become RRS resource managers, and as the complexity of the exchanges of transactional data increases, more and more systems and application programmers will need to use RRS.

    This book provides information that will help you install, tailor, and manage the RRS environment. It covers RRS exploiters, helping you to understand the connections between RRS and its exploiters, how they work together, and how the installation should behave in recovery/restart situations.

    Table of Contents

    Part 1 Resource Recovery Services (RRS) introduction and concepts

    Ch. 1 Introduction to Resource Recovery Services (RRS)

    Ch. 2 Two-phase commit and RRS

    Ch. 3 Distributed RRS

    Part 2 Implementing and managing RRS

    Ch. 4 Implementing RRS

    Ch. 5 RRS operations

    Ch. 6 RRS performance and availability

    Ch. 7 RRS restart and recovery

    Part 3 RRS exploiters

    Ch. 8 WebSphere Application Server for z/OS

    Ch. 9 DB2 for z/OS

    Ch. 10 CICS Transaction Serve

    Ch. 11 IMS

    Ch. 12 WebSphere MQ for z/OS

    Ch. 13 APPC/MVS

    Ch. 14 DFSMStvs


    Others who read this also read