VSI.
(See VSAM shared information.)ABEND codes
access method services commands 23 access to
allocation parameters, choosing 53 ALTER command 21
upgrading when processing base cluster with control interval access 101
APF (authorized program facility) 58 argument lists
authorized program facility (APF) 58 authorization 142
block chaining, with ciphertext feedback 64
block size 45 for DASD 45
boundary values, of keys, through rear compression 110
brackets, in notation convention iii buffer allocation
for a path 50
general information 51
buffer modification, journaling of 97 buffer pool
busy flag 82 CBUF (control block update facility)
for reF catalogs 77
chaining request parameter lists control interval access 86
changing system residence volume serial number 36
restriction with a global resource pool 103
writing buffers 94 checkpoint/restart
options 126
CHKLIST command 211 41
CIDF (control information definition field) control information in control
interval 811 104
commandsl access method services common area
virtual storage 921 102 compressionl key
boundary values 110
control information in index entry 107 control block update facility
for ICF catalogs 77
responsibility for maintaining, with control interval access 86
section displacement field 107 control interval 8
debugging with normal control interval access 87
improved 87
passwords 87
responsibility for maintaining control information 86
to a data set 86, 101 to an index 111
control interval definition field (CIDF) end of data 81
global resource serialization 74 cryptographic key data set
See CKDS
cryptographic option for access method services
Data Encryption Standard (DES),
Programmed Cryptographic Facility 64 data records
position in a control interval 81 storage 8
data set
backing up 42
catalog password protection 62 copying 38, 43
deadlock in exclusive control, preventing 100
DECIPHER parameter 68 requirements 68 deciphering data 63-68 deferring write requests 94
deferring writes from a buffer pool 94 DEFINE ALIAS command 36
DEFINE ALTERNATEINDEX command 31 descriptive information 32 specifying information 32 DEFINE CLUSTER command 23
descriptive information 25 performance options 25 protection and integrity 26 RECATALOG parameter 23
DEFINE GENERATIONDATAGROUP command 36 DEFINE NON-VSAM command 35
DEFINE PAGESPACE command 36 DEFINE PATH command 35
delimiter parameters
See REPRO DECIPHER and ENCIPHER DES
See Data Encryption Standard DIAGNOSE command 21
displaying statistics about a buffer pool 93
displaying transaction ID of request parameter list 95
ellipses, in notation convention 111
empty data set 82, 83, 86, 87, 88, 91
loading with control interval access 87
processing with shared resources 101 RDFs 82 exception handling (EXCEPTION EXIT) 27 excessive paging with improved control interval
access 88
specification for key-sequenced data
specifying shared resources 92 used to open an index 111
generalized trace facility (GTF) 127 generation data group
global resource serialization (GRS) cross-region sharing 74
horizontal pointer, in index-record header 106
I/O-related control blocks, shared 91
ICF catalog
improved control interval access 87 debugging with normal control
interval access 88 sectioned to improve search
speed 107
use for search 106, 110 index level
index set 104, 106
indicator in index-record header 106 sequence set 104, 106 invalid buffers, refreshing 101
invocation of SRB or cross-memory mode See SRB invocation
invoking access method services from problem program 142 PL/I program 144
invoking macro instructions 142
ISAM (indexed sequential access method) converting a data set example 164 converting to VSAM 156
interface
JCL
journalizing a transaction (JRNAD) 27 JRNAD exit
control information in index entry 107
intermixed with control interval access 86
indicator in index-record header 106 sequence set 104, 106
loading an entry-sequenced data set with control interval access
PUT
87 modifying buffers, journaling of 97 mount a volume and acquire cylinders multiple string processing 29NCK subparameter with improved control interval
access 88
improved control interval access 87 options that influence 55
invoking access method services 144 placeholders with shared resources 91 POINT macro
control interval access 87 end-of-data 86
shared resources 91
positioning with shared resources 91 preformatting control areas 26
prestaging
macros used 118
prestaging using identified records 118 prestaging using range of records 118 preventing deadlock in exclusive
control 100 prime index 5
PRINT command 22, 40 printing a data set 40 problem program
invoking access method services 142 using macro instructions 142
procedures processor condition codes 146
processor invocation 144
loading an entry-sequenced data set with control interval access 87 updating with control interval
access 87
in AMP parameter 127 RDF (record definition field)
description 82 modifying and displaying 117
record
record definition field (RDF) description 82
illustration 83
record length (RECLEN field) of an RPL modifying and displaying 117
recovery procedures relating deferred requests by
transaction 95
releasing exclusive or shared control ENDREQ macro 101
Resource Access Control Facility (RACF) 63
resource pool
deferring writes 94 providing 92
restart 125
restoring end-of-file values 37 restrictions
control interval access 87
for shared resources 103 index processing 111 stage by keyrange 119
restrictions during CREATE mode 26 restrictions in the use of the ISAM modifying and displaying 117
SCHBFR macro
security-authorization record, user 137 security-verification routine, user 137 segment of spanned record 82 SHAREOPTIONS 4 (incompatible with
deferring write requests) 95 sharing
cross-system 77 SHOWCAT macro
determining size of resource pool 93 SHOWCB macro
displaying buffer-pool statistics 93 displaying transaction ID of request
parameter list 95
execute form used with parameter lists built by user 112
linking to VSAM directly 116
return codes 93, 95
DD statements describing 34 space
allocation 52, 53 SPANNED attribute
across control intervals 46 restrictions 46
specifying cluster information 25 splitting control areas, journaling
of 97
SRB dispatching (improved control interval access) 87 substituting processing parameters by
way of JCL 125
supplying operands 126 SYNAD exit routine
analyzing physical errors 130 contents of registers 131
relating deferred requests 95 transactions, journalizing 133 translating ISAM requests 149 TSO (time sharing option)
APF authorization 58
underlining, in notation convention iii UNIT
with control interval access
using work area as a buffer 87
upgrading alternate index when
processing base cluster with control interval access 101
user interactions 79
user-security-authorization record contents of registers at entry 137 description 137
user-written exit routine, example 141 using control interval access 86
using LASTCC 146
USVR (user-security-verification routine) 27, 137
password protection 63 utility program
See access method services
verification routine, user-security 137 VERIFY command 22, 37
implicit 22
vertical pointer, in index
free control interval entry 106 how used to calculate the RBA of a
control interval 106 index entry 108
length indicator, in index-record header 106
virtual storage common area 102 common area of 92 VOLUME
JCL parameter 124
VSAM (virtual access storage method)
storage 8
VSAM (virtual storage access method) data sets
staging keyrange for MSS 118 I/O buffering 87
password protection 59
use in development of utility programs and system control programs 81
VSAM performance
See optimizing VSAM performance
writing a buffer 28 deferred 28 forced 28 writing a record
addressed 27 skipping 27 WRTBFR macro
use under lSR and-GSR 77
3330 Disk Drive 47 3340 Disk Storage 47
GC26-4066-0
-- -- -- -- - - - - - - - _ . - - - - - - - - - - - - - - --- ---
®s <
CJ)
-
W ""-.Io
<
»
CJ)s
C en ctl ...
en
G>
c 0.: ctl
"TI CD
z
!='CJ) W ""-.I
o W S
~
g E.E
a.Vl'3 :2 0- ....
Q.l-ro 0lQ.l
c Vl
°t B o Q.l Vl a.
:= co .... co
E-o
-0 Q.l
e
Eco E E ~ o ....
.... Q.l
£ 16£ 0 .~ 0
Vl ~
E .;:::;
~ 'v;
.0 C
o Q.l .... '"
a.Q.l
~ :;
;:) '"
~
e
c a.
~ ~
'" ;:)
-5.~ co
Q.l
ci)a::
o
Q)z
MVS/370 VSAM Users Guide GC26-4066-0
Reader's Comment Form
This manual is part of a library that serves as a reference source for systems analysts, programmers, and operators of IBM systems. You may use this form to communicate your comments about this publication, its organization, or subject matter, with the understanding that IBM may use or distribute whatever information you supply in any way it believes appropriate without incurring any obligation to you.
Your comments will be sent to the author's department for whatever review and action, if any, are deemed appropriate.
Note: Copies of IBM publications are not stocked at the location to which this form is addressed. Please direct any requests for copies of publications, or for assistance in using your IBM system, to your IBM representative or to the IBM branch office serving your locality.
List TNLs here:
If you have applied any technical newsletters (TNLs) to this book, please list them here:
Last TNL
---Previous TNL ---Previous TNL __________________ __
Fold on two lines, tape, and mail. No postage stamp necessary if mailed in the U.S.A.
(Elsewhere, an IBM office or representative will be happy to forward your comments or you may mail directly to the address in the Edition Notice on the back of the title page.) Thank
GC26-4066-0
Reader's Comment Form
Fold and tape
Fold and tapa
- - - - ---..- - - - - - - - - , - - - - - - - - - - - - - - --- ---
®Please do not staple