Db2 for z/OS Image Copy Connector > Introduction to Db2 for z/OS Image Copy Connector > Integration with the PowerExchange CDC environment
  

Integration with the PowerExchange CDC environment

You must have a functional on-premises PowerExchange environment that can connect to a Db2 for z/OS database and that can retrieve records from the image copy data sets on a z/OS system.
You must have a license that allows your organization to use the Db2 for z/OS Image Copy Connector and PowerExchangeClient packages. On each system from which you plan to use Db2 for z/OS Image Copy Connector, install the Secure Agent. After you start the Secure Agent the first time, the Db2 for z/OS Image Copy Connector and PowerExchangeClient package are installed locally. You then can use Cloud Data Integration, Administrator, and Monitor interfaces to configure Db2 for z/OS Image Copy connections, mappings, and mapping tasks and to run and monitor mapping tasks.
The following image shows the general architecture of the Db2 for z/OS Image Copy Connector components in relation to Cloud Data Integration and the remote Db2 for z/OS Image Copy source system:
This configuration spans the following on-premises systems:
Based on this configuration, the following processing occurs:
  1. 1PowerExchange reads from Db2 image copy data sets where the PowerExchange Listener for z/OS resides.
  2. 2When you design a mapping in Data Integration, you associate the source transformation with a Db2 for z/OS Image Copy connection. You can define the connection in either Data Integration or Administrator. The PWX Bulk Metadata Adapter then uses the connection to connect to the PowerExchange Listener on z/OS and read from Db2 image copy data sets.
  3. In the mapping, you must also define a Target transformation and connection and map the source fields to target fields.
  4. 3The Secure Agent in conjunction with Data Integration sends the Db2 metadata to the Informatica Intelligent Cloud Services repository in the cloud.
  5. 4When you run the mapping task that is associated with the mapping, all of the metadata, connection properties, mapping information, advanced source properties, runtime properties, and advanced session properties are pushed down to the on-premises Secure Agent in the form of a session .xml file.
  6. 5The PWX Bulk Reader on the Secure Agent machine communicates with the PowerExchange Listener on the z/OS machine to retrieve the records from the PowerExchange Listener.
  7. 6Data Integration transmits the data to the mapped target.