Systems OS/VS2 Access Method Services
Total Page:16
File Type:pdf, Size:1020Kb
GC26-3841-0 File No. S370-30 Systems OS/VS2 Access Method Services Release 3 I !. ' First Edition (February 1975) This is the first edition of a new publication that applies to Release 3 of OS/VS2 and to all subsequent releases of that system unless otherwise indicated in new editions or technical newsletters. Another new publication, OS/VSJ Access Method Services, GC26-3840, contains corresponding OS/VS 1 information. OS/VS2 and OS/VS 1 information was previously intermingled in OS/VS Access Method Services, GC26-3836; this previous publication is now out of date for both OS/VS2 and OS/VS 1. (Information on the Mass Storage System is only for planning purposes until the availability of that product.) Significant system changes are summarized under "Summary of Amendments" following the list of figures. In additioll, miscellaneous editorial and technical changes have been made throughout the publication. Each technical change is marked by a vertical line to the left of the change. Information in this publication is subject to significant change. Any such changes will be published in new editions or technical newsletters. Before using the pUblication, consult the latest Virtual Storage Supplement (to IBM System/360 and System/370 Bibliography), GC20-0001, and the technical newsletters that amend the bibliography, to learn which editions and technical newsletters are applicable and current. Requests for copies of IBM publications should be made to the IBM branch office that serves you. Forms for readers' comments are provided at the back of the publication. If the forms have been removed, comments may be addressed to IBM Corporation, System Development Division, LDF Publishing-Department J04, 1501 California Avenue, Palo Alto, California 94304. All comments and suggestions become the property of IBM. © Copyright International Business Machines Corporation 1975 ABOIJT TIllS BOOK This book describes the use of Access Method Services commands for the Virtual Storage Access Method (VSAM). This publication provides all the VSAM information required to use Access Method Services to establish and maintain data sets. For information on the use of VSAM macro instructions, see OS/VS Virtual Storage Access Method (VSAM) Programmer's Guide. Readers of this book are presumed to have a background in programming. This book has the following major divisions: • "Guide to Access Method Services," which lists functions and the Access Method Services commands used to perform them. • "Introduction," which provides an overview of Access Method Services, including general language considerations, the structure of VSAM data sets, and the use of the 3850 Mass Storage System and the Time Sharing Option (TSO) with VSAM and Access Method Services. Everyone should read this chapter. • "Optimizing VSAM's Performance," which describes the factors that affect VSAM's performance that can be specified or influenced by values specified in Access Method Services commands. • "Data Security and Integrity," which describes the security and integrity features of VSAM that are specified as options in Access Method Services commands. • "Defining Entries," which describes the use of the DEFINE command to define catalogs, data spaces, VSAM data sets, and cataloging nonVSAM data sets. • "Altering Entries," which describes the use of the ALTER command to modify attributes in catalog entries. • "Listing Catalog Entries," which describes the use of the LISTCAT command to list catalog entries. • "Deleting Catalog Entries," which describes the use of the DELETE command to delete catalog entries. • "Moving Entries," which describes the use of the IMPORT and EXPORT commands to create a backup copy of a data set or to move a data set or user catalog between systems. • "Converting Catalog Entries," which describes the use of the CNVTCAT command to convert entries in an OS catalog to entries in a VSAM catalog. • "Verifying End-of-File," which describes the use of the VERIFY command to verify that the true end-of-file is reflected in the catalog. • "Copying and Printing ," which describes the use of the REPRO and PRINT commands to copy and print data, to reorganize data, to convert data from indexed-sequential or sequential organization to VSAM organization and from VSAM organization to sequential organization, and to copy catalogs. • "Listing Tape Volumes Mounted at Checkpoint," which describes the use of the CHKLIST command to list tape data sets that were open during a checkpoint. About This Book 3 • "Controlling Command Execution," which describes the use of the IF-DO-END command sequence, the SET command, and the P ARM command to control command execution and to specify diagnostic aids and printed-output options. • "Records Written to the SMF Data Set," which describes the contents of record types 63 and 67; these records conform to the SMF header format and are written to the SMF data set to provide for VSAM catalog recovery, but they are not to be treated as SMF records. • "Appendix A: Sample Output from Print," which shows output in each of the various formats provided by the PRINT command. • "Appendix B: Interpreting LISTCAT Output Listings," which provides information on the structure of LISTCAT output and shows sample output. "Appendix C: Sample Output from CHKLIST," which shows a CHKLIST I listing and explains its contents. • "Appendix D: JDL DD Parameters to Take Care With," which describes JCL parameters that have either no effect in a VSAM environment or that have a negative effect. • "Glossary," which defines terms relevant to Access Method Services and VSAM. • "Index," which is a subject index to the book. Required Publications The reader should be familiar with information presented in the following publications: • Operator's Library: OS/VS2 Reference (JES2), GC38-0210, which describes the initial program load (IPL) procedure; an alternate master catalog can be selected at IPL time in a VS2 system. • OS/VS Data Management Services Guide, GC26-3783, which presents basic concepts such as access method, direct-access storage, and the distinction between data-set organization and data-set processing. • OS/VS Message Library: VS2 System Messages, GC38-1002, which provides a complete listing of the messages issued by Access Method Services in a VS2 system. • OS/VS Utilities, GC35-0005, which describes the utility programs available for use with nonVSAM data sets in OS/VS2. • OS/VS Virtual Storage Access Method (VSAM) Programmer's Guide, GC26-3838, which describes the macro instructions used to process VSAM data sets and describes how to use an ISAM processing program to process a VSAM data set or an indexed-sequential data set that has been converted to VSAM format. • OS/VS2 JeL, GC28-0692, which describes the JCL parameters for VS2 described in this publication. • OS/VS2 Planning Guide for Release 3, GC28-0667, which describes the special features added to OS/VS2 with Release 3. 4 OS/VS2 Access Method Services • OS/VS2 System Programming Library: System Generation Reference, GC26-3792, which describes the use of the DATASET macro to create a master catalog in a VS2 system. Related Publications The following publications contain information that is related to this publication: • Introduction to the IBM 3850 Mass Storage System (MSS), GA32-0028, which introduces the storage devices and programming of the Mass Storage System. • OS/VS Checkpoint/Restart, GC26-3784, which explains how to take checkpoints and to restart processing. • OS /VS Mass Storage System (MSS) Planning Guide, GC35-0011, which gives a general description of the programming of the Mass Storage System. • OS/VS Mass Storage System (MSS) Services for Space Management, GC35-0012, which describes the Mass Storage System Access Method Services commands for space management in the Mass Storage System. This publication also describes the responsibilities of a person assigned to manage the space in the Mass Storage System. • OS/VS System Management Facilities (SMF), GC35-0004, which provides a complete description of the SMF records that describe VSAM. • OS/ VS Virtual Storage Access Method (VSAM) Options for Advanced Applications, GC26-3819, which provides information about advanced applications of VSAM, which the reader doesn't need to know about to make normal use of VSAM. The topics covered include: gaining access to control intervals; I/O buffering; constructing parameter lists for the macros that generate, modify, and examine control blocks at execution; processing an index as data; and processing a VSAM catalog as a key-sequenced data set. • OS/VS2 Access Method Services Logic, SY35-0010, which describes the functional operation of Access Method Services programs in an OS/VS2 system. • OS/VS2 Catalog Management Logic, SY26-3826, which describes the functional operation of VSAM Catalog Management in an OS/VS2 system. • OS/VS2 System Programming Library: Data Management, GC26-3830, which describes using the PROTECT macro. • OS/VS2 System Programming Library: Supervisor, GC28-0628, which describes the authorized program facility. • OS/VS2 TSO Command Language Reference, GC28-0646, which describes TSO commands. • OS/VS2 TSO Terminal User's Guide, GC28-0645, which describes commands available to the TSO terminal user. • OS/VS2 Using OS Catalog Management with the Master Catalog: CVOL Processor, GC35-0010, which describes the use of control volumes in a VS2 system. About This Book 5 • OS/VS2 Virtual Storage Access Method (VSAM) Logic, SY26-3825, which describes the functional operation of VSAM (Record Management, Open, Close, End-of-Volume, and Control Block Manipulation commands) in an OS/VS2 system. Notational Conventions A uniform system of notation describes the format of Access Method Services commands. This notation is not part of the language; it simply provides a basis for describing the structure of the commands. The command-format illustrations in this book use the following conventions: • Brackets [] indicate an optional field or parameter. • Braces { } indicate a choice of entry; unless a default is iindicated, you must choose one of the entries. • Items separated by a vertical bar ( I ) represent alternative items.