Rational Programming Patterns

Insertion relative to the physical access level in a Business Component

You can insert specific processing in function 80. This function manages the physical accesses to Segments. You can replace a standard subfunction, take into account or ignore a customized SQL access.

The function 80 of a Business Component is structured into subfunctions. There is one subfunction for each Segment and access type.

The physical accesses to data constitute a third processing level. A physical access is run by PERFORM from a logical access to the Segment. The generated processing for the physical accesses depends on the physical storage mode of data. Changing this storage mode does not modify the logical structure of the Business Component.

If you indicate an access type when you replace a standard subfunction, only the subfunction that corresponds to this access type is replaced. If you do not indicate any access type, all the access subfunctions to this Segment are replaced.

Access type

The information that you enter specifies the position of the created subfunction. It is displayed in various ways in the Macro code, depending on the access type:
  • REF=Segment Access type (such as REF= SS11 OP)
  • REF=Segment EX Extract method (such as REF=SS11 EX method1)
  • REF=Segment Access type (such as REF=SS11 R1 for Business Component calls). The access type is R1 for ALIM: Loading before call, R2 for CALL: Business Component call, or R3 for RETC : Return after Business Component call.
None
All the access subfunctions for this Segment are replaced.
Segment code
Enter or select the code of the accessed Segment.
Extract method
Enter the name of the extract method if selection criteria are to be taken into account. The name must be entered in uppercase letters.

An extract method is a particular selection that is requested upon a selection service. It is described in a Segment. To take it into account in a Business Component, you must indicate the name under which it is defined in the Segment.

In the standard generated processing, the physical access is run by PERFORM from a logical access to the Segment if no extract method is requested. If an extract method is requested, you must then write the PERFORM of the corresponding physical accesses. To do that, you must insert a specific processing after the PERFORM standard processing, whose condition is the extract method name.

Business Component call
You can specify the general processing relatively to which you want to insert a specific processing.
  • ALIM: Loading before call for the loading of the communication area. This call type is identified by R1 in the Macro code.
  • CALL: Business Component call. This call type is identified by R2 in the Macro code.
  • RETC : Return after Business Component call. This call type is identified by R3 in the Macro code.
Standard access
You can select a standard access to replace only the subfunction that corresponds to this access.
For the SQL accesses that are customized in the GG Lines of the selected Segment, the input in this field varies according to the access type in the following way:
  • Customized standard accesses are automatically generated with the customization that is entered on the Segment. However, if you want to ignore the customization, you must specify it by selecting the standard access in this field.
  • Nonstandard accesses are not automatically recognized. You can take them into account in one of the following manners:
    • If you select a standard access in this field and if you enter a nonstandard access in the code after this standard access, the customized nonstandard access will be recognized. It will be generated in the standard processing of function 80.
    • If you do not select any standard access in this field and if you enter a nonstandard access in the code, the customized nonstandard access will be recognized. It will be generated in a specific subfunction of function 80. It will constitute a user function that is unknown to the generator. You must then describe and manage it entirely with specific code.
    • f you select a standard access in this field and if you enter, before it, a nonstandard standard followed by the = sign in the code, the customized nonstandard access will be recognized. It will be completed by the processing that is automatically generated for the standard access in function 80.
Note: SQL accesses are documented in the Principle of customized SQL accesses page and its associated links.

In the Macro code, this piece of information is identified as REF=segm acc, where segm is the code of the selected Segment and acc is the access, if any.

Parameter
You can parameterize the access type to identify it in various use contexts. To do so, enter a $ symbol followed by a digit or a letter directly in the field.

Action type

Specific processing is inserted in function 80 with a relative positioning. Two action types are possible:
  • Insert to complement or create an SQL access. This action type is identified as ACTION=*C in the Macro code.
  • Replace a standard subfunction. This action type is identified as ACTION=*R in the Macro code.
.

Terms of use | Feedback

This information center is powered by Eclipse technology. (http://www.eclipse.org)