• Aucun résultat trouvé

VSAM shared information. Blocks that are used for cross-system sharing

Dans le document Program Product (Page 187-200)

VSI.

(See VSAM shared information.)

ABEND codes

access method services commands 23 access to

allocation parameters, choosing 53 ALTER command 21

upgrading when processing base cluster with control interval access 101

APF (authorized program facility) 58 argument lists

authorized program facility (APF) 58 authorization 142

block chaining, with ciphertext feedback 64

block size 45 for DASD 45

boundary values, of keys, through rear compression 110

brackets, in notation convention iii buffer allocation

for a path 50

general information 51

buffer modification, journaling of 97 buffer pool

busy flag 82 CBUF (control block update facility)

for reF catalogs 77

chaining request parameter lists control interval access 86

changing system residence volume serial number 36

restriction with a global resource pool 103

writing buffers 94 checkpoint/restart

options 126

CHKLIST command 211 41

CIDF (control information definition field) control information in control

interval 811 104

commandsl access method services common area

virtual storage 921 102 compressionl key

boundary values 110

control information in index entry 107 control block update facility

for ICF catalogs 77

responsibility for maintaining, with control interval access 86

section displacement field 107 control interval 8

debugging with normal control interval access 87

improved 87

passwords 87

responsibility for maintaining control information 86

to a data set 86, 101 to an index 111

control interval definition field (CIDF) end of data 81

global resource serialization 74 cryptographic key data set

See CKDS

cryptographic option for access method services

Data Encryption Standard (DES),

Programmed Cryptographic Facility 64 data records

position in a control interval 81 storage 8

data set

backing up 42

catalog password protection 62 copying 38, 43

deadlock in exclusive control, preventing 100

DECIPHER parameter 68 requirements 68 deciphering data 63-68 deferring write requests 94

deferring writes from a buffer pool 94 DEFINE ALIAS command 36

DEFINE ALTERNATEINDEX command 31 descriptive information 32 specifying information 32 DEFINE CLUSTER command 23

descriptive information 25 performance options 25 protection and integrity 26 RECATALOG parameter 23

DEFINE GENERATIONDATAGROUP command 36 DEFINE NON-VSAM command 35

DEFINE PAGESPACE command 36 DEFINE PATH command 35

delimiter parameters

See REPRO DECIPHER and ENCIPHER DES

See Data Encryption Standard DIAGNOSE command 21

displaying statistics about a buffer pool 93

displaying transaction ID of request parameter list 95

ellipses, in notation convention 111

empty data set 82, 83, 86, 87, 88, 91

loading with control interval access 87

processing with shared resources 101 RDFs 82 exception handling (EXCEPTION EXIT) 27 excessive paging with improved control interval

access 88

specification for key-sequenced data

specifying shared resources 92 used to open an index 111

generalized trace facility (GTF) 127 generation data group

global resource serialization (GRS) cross-region sharing 74

horizontal pointer, in index-record header 106

I/O-related control blocks, shared 91

ICF catalog

improved control interval access 87 debugging with normal control

interval access 88 sectioned to improve search

speed 107

use for search 106, 110 index level

index set 104, 106

indicator in index-record header 106 sequence set 104, 106 invalid buffers, refreshing 101

invocation of SRB or cross-memory mode See SRB invocation

invoking access method services from problem program 142 PL/I program 144

invoking macro instructions 142

ISAM (indexed sequential access method) converting a data set example 164 converting to VSAM 156

interface

JCL

journalizing a transaction (JRNAD) 27 JRNAD exit

control information in index entry 107

intermixed with control interval access 86

indicator in index-record header 106 sequence set 104, 106

loading an entry-sequenced data set with control interval access

PUT

87 modifying buffers, journaling of 97 mount a volume and acquire cylinders multiple string processing 29

NCK subparameter with improved control interval

access 88

improved control interval access 87 options that influence 55

invoking access method services 144 placeholders with shared resources 91 POINT macro

control interval access 87 end-of-data 86

shared resources 91

positioning with shared resources 91 preformatting control areas 26

prestaging

macros used 118

prestaging using identified records 118 prestaging using range of records 118 preventing deadlock in exclusive

control 100 prime index 5

PRINT command 22, 40 printing a data set 40 problem program

invoking access method services 142 using macro instructions 142

procedures processor condition codes 146

processor invocation 144

loading an entry-sequenced data set with control interval access 87 updating with control interval

access 87

in AMP parameter 127 RDF (record definition field)

description 82 modifying and displaying 117

record

record definition field (RDF) description 82

illustration 83

record length (RECLEN field) of an RPL modifying and displaying 117

recovery procedures relating deferred requests by

transaction 95

releasing exclusive or shared control ENDREQ macro 101

Resource Access Control Facility (RACF) 63

resource pool

deferring writes 94 providing 92

restart 125

restoring end-of-file values 37 restrictions

control interval access 87

for shared resources 103 index processing 111 stage by keyrange 119

restrictions during CREATE mode 26 restrictions in the use of the ISAM modifying and displaying 117

SCHBFR macro

security-authorization record, user 137 security-verification routine, user 137 segment of spanned record 82 SHAREOPTIONS 4 (incompatible with

deferring write requests) 95 sharing

cross-system 77 SHOWCAT macro

determining size of resource pool 93 SHOWCB macro

displaying buffer-pool statistics 93 displaying transaction ID of request

parameter list 95

execute form used with parameter lists built by user 112

linking to VSAM directly 116

return codes 93, 95

DD statements describing 34 space

allocation 52, 53 SPANNED attribute

across control intervals 46 restrictions 46

specifying cluster information 25 splitting control areas, journaling

of 97

SRB dispatching (improved control interval access) 87 substituting processing parameters by

way of JCL 125

supplying operands 126 SYNAD exit routine

analyzing physical errors 130 contents of registers 131

relating deferred requests 95 transactions, journalizing 133 translating ISAM requests 149 TSO (time sharing option)

APF authorization 58

underlining, in notation convention iii UNIT

with control interval access

using work area as a buffer 87

upgrading alternate index when

processing base cluster with control interval access 101

user interactions 79

user-security-authorization record contents of registers at entry 137 description 137

user-written exit routine, example 141 using control interval access 86

using LASTCC 146

USVR (user-security-verification routine) 27, 137

password protection 63 utility program

See access method services

verification routine, user-security 137 VERIFY command 22, 37

implicit 22

vertical pointer, in index

free control interval entry 106 how used to calculate the RBA of a

control interval 106 index entry 108

length indicator, in index-record header 106

virtual storage common area 102 common area of 92 VOLUME

JCL parameter 124

VSAM (virtual access storage method)

storage 8

VSAM (virtual storage access method) data sets

staging keyrange for MSS 118 I/O buffering 87

password protection 59

use in development of utility programs and system control programs 81

VSAM performance

See optimizing VSAM performance

writing a buffer 28 deferred 28 forced 28 writing a record

addressed 27 skipping 27 WRTBFR macro

use under lSR and-GSR 77

3330 Disk Drive 47 3340 Disk Storage 47

GC26-4066-0

-- -- -- -- - - - - - - - _ . - - - - - - - - - - - - - - --- ---

®

s <

CJ)

-

W ""-.I

o

<

»

CJ)

s

C en ctl ...

en

G>

c 0.: ctl

"TI CD

z

!='

CJ) W ""-.I

o W S

~

g E.E

a.Vl

'3 :2 0- ....

Q.l-ro 0lQ.l

c Vl

°t B o Q.l Vl a.

:= co .... co

E-o

-0 Q.l

e

E

co E E ~ o ....

.... Q.l

£ 16£ 0 .~ 0

Vl ~

E .;:::;

~ 'v;

.0 C

o Q.l .... '"

a.Q.l

~ :;

;:) '"

~

e

c a.

~ ~

'" ;:)

-5.~ co

Q.l

ci)a::

o

Q)

z

MVS/370 VSAM Users Guide GC26-4066-0

Reader's Comment Form

This manual is part of a library that serves as a reference source for systems analysts, programmers, and operators of IBM systems. You may use this form to communicate your comments about this publication, its organization, or subject matter, with the understanding that IBM may use or distribute whatever information you supply in any way it believes appropriate without incurring any obligation to you.

Your comments will be sent to the author's department for whatever review and action, if any, are deemed appropriate.

Note: Copies of IBM publications are not stocked at the location to which this form is addressed. Please direct any requests for copies of publications, or for assistance in using your IBM system, to your IBM representative or to the IBM branch office serving your locality.

List TNLs here:

If you have applied any technical newsletters (TNLs) to this book, please list them here:

Last TNL

---Previous TNL ---Previous TNL __________________ __

Fold on two lines, tape, and mail. No postage stamp necessary if mailed in the U.S.A.

(Elsewhere, an IBM office or representative will be happy to forward your comments or you may mail directly to the address in the Edition Notice on the back of the title page.) Thank

GC26-4066-0

Reader's Comment Form

Fold and tape

Fold and tapa

- - - - ---..- - - - - - - - - , - - - - - - - - - - - - - - --- ---

®

Please do not staple

Dans le document Program Product (Page 187-200)