You are on page 1of 3

1. What is the difference between Upload and WS_Upload?

Ans. The difference between WS_Upload and Upload is when you use function Upload it prompts for a
dialog box where in you need to key in the file location. Where as in case of WS_Upload you specify the
file location in the function input parameters itself.

2. Call transaction method, how to capture the errors?

Ans. IN CALL TRANSACTION TO CAPTURE THE ERRORS WE SHOULD PERFORM THE


FOLLOWING.
FIRST ME MUST DECLARE AN INTERNAL TABLE WITH THE STRUCTURE OF BDCMSGCOLL
TABLE.
THEN WHILE WRITING THE CALL TRANSACTION STATEMENT WE SHOULD PUT THE 'E'
MODE FOR CAPTURING ALL THE ERRORS.
THEN FINALLY THE CAPTURED ERRORS MUST TO SENT TO THE INTERNAL TABLE WHICH
WE DECLARED IN THE BEGINNING WITH BDCMSGCOLL BY USING THE FUNCTION
MODULE "FORMAT_MESSAGE"
AND THUS THE ERROR MESSAGES WILL BE SENT TO THE INTERNAL TABLE WHICH WE
DECLARED AT THE BEGINNING.

The bdcmsgcoll structure will not store the message text. it will contain the message id message variables.
To get the message text there are 2 methods.
1. Read the table t100 by passing the message id captured in the table bdcmsgcoll and spras = sy-langu.
2. By using the function format message.
it will return the message text.

First u have to create a structure used to hold error messages.I have just send a sample code..ok..It is very
much useful for u..ok..

code:
DATA: gt_msgtab LIKE bdcmsgcoll OCCURS 0 WITH HEADER LINE.
********************************
AND WRITE UR PROGRAM LOGIC
*******************************
CALL TRANSACTION 'MM01' USING gt_bdcdata MODE p_mode UPDATE gv_update MESSAGES
INTO gt_msgtab.
*For Error Messages Handling.
LOOP AT gt_msgtab.
CALL FUNCTION 'FORMAT_MESSAGE'
EXPORTING
id = sy-msgid
lang = sy-langu
no = sy-msgno
v1 = sy-msgv1
v2 = sy-msgv2
v3 = sy-msgv3
v4 = sy-msgv4
IMPORTING
msg = gv_msg
EXCEPTIONS
not_found = 1
OTHERS = 2.
Write : gv_msg.
endloop.

2. Have you set up a back ground job? How to create a background job
without a variant?
Ans. Yes, user can create background job scheduling in two ways.
1. By calling the executable program RSBDCSUB And
2. Transaction Code SM37.
**************************************************************
in the transaction SA38 put the program to be executed and then from the
menu select program /execute in background.

3. How do you send files to the legacy systems from SAP and vice versa?
How does one know that the legacy files have come on to the SAP server
you are working on?

Ans. 1. Sending files from legacy system to SAP using upload, ws_upload, gui_upload function modules
can be used.
2. Sending files from SAP to legacy system using download, ws_download, gui_download function
module scan be used.
3. Used Open Dataset to identify the file for availability. read the file using read dataset. delete the file
.from the location using the delete dataset. run this program for every 2mins for the availability.

4. SM35 transaction. How to automate BDC?

Ans. After execution of batch input program , the session created is placed in the session queqe which can
be viewed using SM35 transaction executing / Releasing the session will start the transfer of the data from the
session into the database tables./

5. what is the difference between bdc and lsmw ?

Ans. bdc is for batch data input either using call transaction or session method..lsmw is a method of data
upload in which we can use bdc , direct update, bapi or idoc.

BDC is a programming method. LSMW is used by functional consultants to show to clients to they will
transfer data. IF one opens LSMW he has to just follow the radio buttons from the top and it will make u
reach to last button. LSMW is not a programmable section.

6. What kind of BDC programs is written?

Ans. There are five types of BDC methods available. They are 1.Batch input session 2.Call Transaction
3.Recording 4.Direct Input and 5.LSMW.

7. BDC vs Direct Loads( have you used direct loads on SAP tables ) ?

Ans. Ya. Direct loads is 5 times faster than uploading by normal BDC method. but some times while
updating the database referential integrity is violated.

You might also like