Data Management
An overview of file control
VSAM data sets
Key-sequenced data set (KSDS)
Entry-sequenced data set (ESDS)
Relative record data set (RRDS)
Empty data sets
VSAM alternate indexes
Accessing files in RLS mode
Some RLS limitations
BDAM data sets
CICS shared data tables
Coupling facility data tables
Coupling facility data table models
Techniques for sharing data
Using CICS commands to read records
Direct reading (using READ command)
Direct reading from a KSDS
Direct reading from an ESDS
Direct reading from an RRDS
Direct reading by way of a path
Read integrity (in RLS mode)
Sequential reading (browsing)
Browsing through a KSDS
Browsing through an ESDS
Browsing through an RRDS
Browsing using a path
Browse integrity (in RLS mode)
Ending the browse
Simultaneous browse operations
Skip-sequential processing
Using CICS commands to update records
Using CICS commands to delete records
Deleting single records
Updating and deleting records in a browse (VSAM RLS only)
Deleting groups of records (generic delete)
Read integrity
Using CICS commands to add records
Adding to a KSDS
Adding to an ESDS
Adding to an RRDS
Records that are already locked
Specifying record length
Sequential adding of records (WRITE MASSINSERT command)
File control command options
The RIDFLD option
The INTO and SET options
The FROM option
The TOKEN option
KEYLENGTH option for remote data sets
Transaction deadlocks
VSAM-detected deadlocks (RLS only)
Rules for avoiding deadlocks
File control--VSAM considerations
VSAM record identification
Key
Relative byte address (RBA) and relative record number (RRN)
RBA
RRN
Locking of VSAM records in recoverable files
Update locks and delete locks (non-RLS mode only)
RLS Record level locking
Exclusive locks and shared locks
Exclusive locks
Shared locks
Lock duration
Active and retained states for locks
Conditional VSAM file update requests
File control implementation of NOSUSPEND
CICS locking for writing to ESDS
File control--BDAM considerations
Identifying BDAM records
Block reference subfield
Physical key subfield
Deblocking argument subfield
Browsing records from BDAM data sets
Adding records to BDAM data sets
Updating records from BDAM data sets
Database control
DL/I databases
DB2 databases
Requests to DB2
CICS documents
Using the DOCUMENT programming interface
Creating a document
The BINARY option
The TEXT option
The FROMDOC option
Setting up document templates
Templates in a partitioned data set
Templates in a CICS program
Templates in CICS files, z/OS UNIX System Services HFS files, temporary storage, or transient data
Creating templates in exit programs
Programming with documents and document templates
Symbols and symbol lists
Setting symbol values
Embedded template commands
Using templates in your application
The lifespan of a document
Retrieving the document without control information
Constructing a document
Using Bookmarks
Replacing data in the document
Code page conversion for documents
Named counter servers
The named counter fields
Named counter pools
Named counter options table
Using the named counter EXEC interface
Using the named counter CALL interface
Application programming considerations
Syntax
Checking for result overflow
Example of DFHNCTR calls with null parameters
Return codes
Named counter recovery
[[
Contents
Previous Page
|
Next Page
Index
]]