TCP/IP for VSE Modernization Guide
TCP/IP for VSE is a networks and communication product by CSI International. Explore technical details, modernization strategies, and migration paths below.
Product Overview
TCP/IP for VSE enables zVSE/VSEn systems to communicate over TCP/IP networks.
Administration is primarily through a command-line interface (CLI).
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What standard TCP/IP services are included?
TCP/IP for VSE provides standard TCP/IP services such as FTP for file transfer, TN3270 for terminal emulation, and an HTTP server for web services. It also supports email protocols like SMTP and POP3.
What programming languages are supported for TCP/IP access?
The product includes APIs for COBOL, PL/1, C, Assembler, and REXX, allowing applications written in these languages to directly utilize TCP/IP functions. These APIs enable tasks such as creating sockets, sending and receiving data, and managing network connections.
What are the main system components?
Key components include the TCP/IP stack itself, the TN3270 server, the FTP server, and the HTTP server. These components work together to provide comprehensive network services.
What authentication methods are supported?
TCP/IP for VSE supports authentication methods such as username/password authentication for services like FTP and Telnet. It may also integrate with external security systems for enhanced authentication capabilities.
Technical
What are some common commands and how are they used?
Common commands include FTP for file transfer (e.g., `FTP
What types of APIs are exposed and what protocols are used?
The product exposes native APIs for various programming languages. These APIs allow direct access to TCP/IP functions. Communication protocols include TCP, UDP, and IP.
How do the system components communicate?
The main components communicate through standard TCP/IP protocols. The TCP/IP stack handles routing and data transmission, while the servers (e.g., FTP, HTTP) listen on specific ports for incoming connections.
What administrative interfaces are available?
Administrative interfaces are available through a command-line interface (CLI) and potentially through web-based consoles. User management is typically handled through VSE security mechanisms or integrated security systems.
What encryption and audit logging capabilities exist?
The product supports standard encryption protocols such as SSL/TLS for secure communication. Audit logging captures network events and security-related activities.
Business Value
How does this product enhance business value?
TCP/IP for VSE enables VSE systems to participate in modern networks, allowing applications to communicate with other systems using standard protocols. This facilitates integration with other platforms and supports various business applications.
What specific business applications are supported?
By providing standard TCP/IP services, the product allows VSE systems to host web applications, provide file transfer services, and support terminal emulation. This extends the capabilities of VSE systems and enables new business opportunities.
How does the API support benefit businesses?
The product's API support allows developers to create custom applications that leverage TCP/IP functionality. This enables businesses to tailor network services to their specific needs and integrate VSE systems with other platforms.
Security
What authentication and access control methods are supported?
The product supports authentication methods such as username/password, and can integrate with external security systems like LDAP or Kerberos. Access control is typically managed through VSE security mechanisms or role-based access control (RBAC).
How is data encrypted?
Encryption is provided through SSL/TLS for secure communication channels. This ensures that sensitive data transmitted over the network is protected from eavesdropping and tampering.
What audit logging capabilities exist?
The product provides audit logging capabilities, recording network events and security-related activities. These logs can be used to monitor system activity, detect security breaches, and ensure compliance with security policies.
Operations
How is the product administered and configured?
The product is administered through a command-line interface (CLI) and potentially through web-based consoles. Configuration parameters are typically stored in configuration files, which can be edited to customize the product's behavior.
What monitoring capabilities are available?
Monitoring capabilities include logging network traffic, system events, and security-related activities. These logs can be analyzed to identify performance bottlenecks, detect security threats, and ensure system stability.
How is user management handled?
User management is typically handled through VSE security mechanisms or integrated security systems. This allows administrators to control access to network resources and ensure that only authorized users can access sensitive data.
Ready to Start Your Migration?
Download our comprehensive migration guide for TCP/IP for VSE or calculate your ROI.