This module manages the data file exchange, facilitating the access and integration of the transmission processes with the processes of the user applications, for which it avoids the problem of data presentation.
The EDITRAN/P module transmits files which contain the data generated by the applications. One of the basic features of the protocol is the resynchronization of the transmission after the automatic recover of the drops in communication circuits. This allows reanudating the transmission from the last record received properly by the reception extreme node.
This main feature requires that both the file being transmitted, and the one created in the reception extreme node, over which are stored the received records, have a structure oriented to communication processes. This task is performed by EDITRAN/G.
These files, with a specific structure, are called buffer files. That is to say, the files to be transmitted are stored in the buffers, with the properly format to be transmitted later in a secure way. The data are also zipped and signed, in case we choose this feature.
- Sending multiple application files: in the same transmission process, we can send multiple data files.
In the reception extreme node are generated as many different physical files as they were created in the transmission extreme node. But there is the possibility of receiving all the presentation files in a single one.
- Subenvironment: it allows the presentation of data from several source entities from the same computer.
- Compression of the file to be transmitted, and expansion of the received file.
- A presentation session (EDIran/G) can use multiple transmission sessions (EDITRAN/P). This feature allows the transmission of very large files by opening several parallel sessions, in order to improve the occupation of the line. It garanties that all the transmissions have been entirely received in the reception extreme node.
- Control of the integrity of the data through Hash (SHA-1) algorithms.
- Adaptation of the data language (EBCDIC/ASCII).
- Character conversion: possibility of changing a character for another, withing the received files, to obtain representative data in a specific environment.
- Data encryption: link with the different chryptographic modules incorporated to the platform to achieve a secure transmission.
- Application macrofiles (only for mainframe):
Application sequential file containing data to be transferred to different remote centers. It is useful for applications that generate many files to be transmitted, as it reduces drastically the number of files to manage, with the consequent time saving.
- Partitioned files (mainframe environments):
It is allowed to send a member of a partitioned library in source format. That is to say, the specified member will be uploaded as sequential file, it will be transmitted to the other extreme node, and this node will download that information in a sequential file.
- Generational files (mainframe envinronments).
- Procedures for the automation of the transmission processes. The integration of the EDITRAN/P and EDITRAN/G functionalities is done through different processes, materialized using jcl, script, cl, cmd, batch, etc.
- Upload the transmission presentation.
- Process the presentation after transmission.
- Transmit the presentation.
- Interrupt the trasmission presentation.
- Initialize the reception presentation.
- Download the reception presentation.
- Recieve the presentation.
- Interrupt the reception presentation.
- Interface for application programs.
- API to manage the user applications from a command, or from a program that allows the automation of all the transmission process and file reception, through a bidirectional exchange of requests/answers between the application and EDITRAN/G.
- Transmission upload and transmission start.
- Reception initialization and reception start.
- Transmission interruption.
- Process after transmission.
- Reception download.
- Reception initialization.
- Incidence notification.
- User programs. These programs, made by the user, perform specific functions according to the needs of each installation and application. They are executed during the processes before and after transmission, and also in case the communication is interrupted. This allows the user applications to have an easier automatic control.