z/os v1r5.0 dfsms: using data sets - anikvn.ruanikvn.ru/ibm_mainframe/dgt2d420.pdf · vsam data...

720
z/OS DFSMS: Using Data Sets SC26-7410-03

Upload: vankhanh

Post on 23-Apr-2018

226 views

Category:

Documents


3 download

TRANSCRIPT

  • z/OS

    DFSMS:

    Using

    Data

    Sets

    SC26-7410-03

  • z/OS

    DFSMS:

    Using

    Data

    Sets

    SC26-7410-03

  • Note!

    Before

    using

    this

    information

    and

    the

    product

    it

    supports,

    be

    sure

    to

    read

    the

    general

    information

    under

    Notices

    on

    page

    635.

    Fourth

    Edition,

    March

    2004

    This

    edition

    applies

    to

    Version

    1

    Release

    5

    of

    z/OS

    (5694-A01),

    Version

    1

    Release

    5

    of

    z/OS.e

    (5655-G52),

    and

    to

    all

    subsequent

    releases

    and

    modifications

    until

    otherwise

    indicated

    in

    new

    editions.

    This

    edition

    replaces

    SC26-7410-02.

    IBM

    welcomes

    your

    comments.

    A

    form

    for

    readers

    comments

    may

    be

    provided

    at

    the

    back

    of

    this

    publication,

    or

    you

    may

    address

    your

    comments

    to

    the

    following

    address:

    International

    Business

    Machines

    Corporation

    Department

    55JA,

    Mail

    Station

    P384

    2455

    South

    Road

    Poughkeepsie,

    NY

    12601-5400

    United

    States

    of

    America

    FAX

    (United

    States

    &

    Canada):

    1+845+432-9405

    FAX

    (Other

    Countries):

    Your

    International

    Access

    Code

    +1+845+432-9405

    IBMLink

    (United

    States

    customers

    only):

    IBMUSM10(MHVRCFS)

    Internet

    e-mail:

    [email protected]

    World

    Wide

    Web:

    http://www.ibm.com/servers/eserver/zseries/zos/webqs.html

    If

    you

    would

    like

    a

    reply,

    be

    sure

    to

    include

    your

    name,

    address,

    telephone

    number,

    or

    FAX

    number.

    Make

    sure

    to

    include

    the

    following

    in

    your

    comment

    or

    note:

    v

    Title

    and

    order

    number

    of

    this

    document

    v

    Page

    number

    or

    topic

    related

    to

    your

    comment

    When

    you

    send

    information

    to

    IBM,

    you

    grant

    IBM

    a

    nonexclusive

    right

    to

    use

    or

    distribute

    the

    information

    in

    any

    way

    it

    believes

    appropriate

    without

    incurring

    any

    obligation

    to

    you.

    Copyright

    International

    Business

    Machines

    Corporation

    1987,

    2004.

    All

    rights

    reserved.

    US

    Government

    Users

    Restricted

    Rights

    Use,

    duplication

    or

    disclosure

    restricted

    by

    GSA

    ADP

    Schedule

    Contract

    with

    IBM

    Corp.

    http://www.ibm.com/servers/eserver/zseries/zos/webqs.html
  • Contents

    Figures

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xix

    Tables

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xxiii

    About

    This

    Document

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xxv

    Major

    Divisions

    of

    This

    Document

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xxv

    Required

    product

    knowledge

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xxv

    Referenced

    documents

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xxvi

    Accessing

    z/OS

    DFSMS

    documents

    on

    the

    Internet

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xxvi

    Using

    LookAt

    to

    look

    up

    message

    explanations

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xxvi

    Accessing

    z/OS

    licensed

    documents

    on

    the

    Internet

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xxvii

    Summary

    of

    Changes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xxix

    Summary

    of

    Changes

    for

    SC26-7410-03

    z/OS

    Version

    1

    Release

    5

    .

    .

    .

    .

    . xxix

    New

    Information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xxix

    Changed

    Information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xxix

    Moved

    Information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xxx

    Summary

    of

    Changes

    for

    SC26-7410-02

    z/OS

    Version

    1

    Release

    3

    .

    .

    .

    .

    . xxx

    New

    Information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xxx

    Changed

    Information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xxx

    Part

    1.

    All

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 1

    Chapter

    1.

    Working

    with

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 5

    Data

    Storage

    and

    Management

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 5

    System-Managed

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 6

    Distributed

    File

    Manager

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 6

    Access

    Methods

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 6

    Basic

    Direct

    Access

    Method

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 6

    Basic

    Partitioned

    Access

    Method

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7

    Basic

    Sequential

    Access

    Method

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7

    Data-in-Virtual

    (DIV)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7

    Indexed

    Sequential

    Access

    Method

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7

    Object

    Access

    Method

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 8

    Queued

    Sequential

    Access

    Method

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 8

    Virtual

    Storage

    Access

    Method

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 8

    Access

    to

    z/OS

    UNIX

    Files

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9

    Selection

    of

    an

    Access

    Method

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9

    Direct

    Access

    Storage

    Device

    (DASD)

    Volumes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 10

    DASD

    Labels

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 10

    Track

    Format

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 10

    Track

    Overflow

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 11

    VSAM

    Record

    Addressing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 11

    Actual

    and

    Relative

    Addressing

    with

    Non-VSAM

    Access

    Methods

    .

    .

    .

    .

    . 12

    Magnetic

    Tape

    Volumes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 13

    Using

    Magnetic

    Tape

    Labels

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 13

    Specifying

    the

    File

    Sequence

    Number

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 14

    Identifying

    Unlabeled

    Tapes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 16

    Using

    Tape

    Marks

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 17

    Data

    Management

    Macros

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 17

    Data

    Set

    Processing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 18

    Allocating

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 18

    Processing

    Data

    Sets

    through

    Programs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 19

    Copyright

    IBM

    Corp.

    1987,

    2004

    iii

    ||

    ||

  • Using

    Access

    Methods

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 19

    Using

    Addressing

    Modes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 20

    Using

    Hiperspace

    and

    Hiperbatch

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 20

    Processing

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 20

    Processing

    PDSs,

    PDSEs,

    and

    UNIX

    Directories

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 21

    Processing

    Sequential

    Data

    Sets

    and

    Members

    of

    PDSEs

    and

    PDSs

    .

    .

    .

    . 22

    Processing

    UNIX

    Files

    with

    an

    Access

    Method

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22

    Processing

    EXCP,

    EXCPVR,

    and

    XDAP

    Macros

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 23

    Distributed

    Data

    Management

    (DDM)

    Attributes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 23

    Virtual

    I/O

    for

    Temporary

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 24

    Data

    Set

    Names

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 25

    Catalogs

    and

    Volume

    Table

    of

    Contents

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 26

    VTOC

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 26

    Catalogs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 26

    Data

    Set

    Names

    and

    Metadata

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 26

    Security

    of

    Data

    Set

    Names

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 27

    Chapter

    2.

    Using

    the

    Storage

    Management

    Subsystem

    .

    .

    .

    .

    .

    .

    .

    .

    . 29

    Using

    Automatic

    Class

    Selection

    Routines

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 31

    Allocating

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 32

    Allocating

    Data

    Sets

    with

    JCL

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 32

    Allocating

    System-Managed

    Data

    Sets

    with

    the

    Access

    Method

    Services

    ALLOCATE

    Command

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 34

    Allocating

    Data

    Sets

    with

    the

    TSO

    ALLOCATE

    Command

    .

    .

    .

    .

    .

    .

    .

    . 35

    Allocating

    Data

    Sets

    with

    Dynamic

    Allocation

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 36

    Chapter

    3.

    Allocating

    Space

    on

    Direct

    Access

    Volumes

    .

    .

    .

    .

    .

    .

    .

    .

    . 37

    Specification

    of

    Space

    Requirements

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 37

    Blocks

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 37

    Average

    Record

    Length

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 38

    Tracks

    or

    Cylinders

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 38

    Absolute

    Track

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 39

    Additional

    Space-Allocation

    Options

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 39

    Maximum

    Data

    Set

    Size

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 39

    Maximum

    Size

    on

    One

    Volume

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 39

    Maximum

    Number

    of

    Volumes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 39

    Maximum

    VSAM

    Data

    Set

    Size

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 39

    Primary

    and

    Secondary

    Space

    Allocation

    without

    the

    Guaranteed

    Space

    Attribute

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 40

    Multivolume

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 40

    Multivolume

    Non-VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 40

    Extended-Format

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 40

    Allocation

    of

    Data

    Sets

    with

    the

    Guaranteed

    Space

    Attribute

    .

    .

    .

    .

    .

    .

    .

    . 41

    Guaranteed

    Space

    with

    DISP=NEW

    or

    MOD

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 41

    Guaranteed

    Space

    for

    VSAM

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 41

    Guaranteed

    Space

    with

    DISP=OLD

    or

    SHR

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 42

    Guaranteed

    Space

    with

    Extended-Format

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 42

    Guaranteed

    Space

    Example

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 42

    Allocation

    of

    Data

    Sets

    with

    the

    Space

    Constraint

    Relief

    Attributes

    .

    .

    .

    .

    .

    . 43

    Extension

    to

    Another

    DASD

    Volume

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 43

    Examples

    of

    Dynamic

    Volume

    Count

    When

    Defining

    a

    Data

    Set

    .

    .

    .

    .

    .

    . 44

    Examples

    of

    Dynamic

    Volume

    Count

    When

    Allocating

    an

    Existing

    Data

    Set

    45

    Multiple

    Volume

    Considerations

    for

    Sequential

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    . 45

    Additional

    Information

    on

    Space

    Allocation

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 46

    Chapter

    4.

    Backing

    Up

    and

    Recovering

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 47

    iv

    z/OS

    V1R5.0

    DFSMS:

    Using

    Data

    Sets

    ||||

    ||

  • Using

    REPRO

    for

    Backup

    and

    Recovery

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 48

    Using

    EXPORT

    and

    IMPORT

    for

    Backup

    and

    Recovery

    of

    VSAM

    Data

    Sets

    49

    Structure

    of

    an

    Exported

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 50

    EXPORT

    and

    IMPORT

    Commands

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 50

    Writing

    a

    Program

    for

    Backup

    and

    Recovery

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 50

    Using

    Concurrent

    Copy

    for

    Backup

    and

    Recovery

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 51

    Updating

    a

    Data

    Set

    After

    Recovery

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 51

    Synchronizing

    Catalog

    and

    VSAM

    Data

    Set

    Information

    During

    Recovery

    .

    .

    . 51

    Handling

    an

    Abnormal

    Termination

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 52

    Using

    VERIFY

    to

    Process

    Improperly

    Closed

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    . 52

    CICS

    VSAM

    Recovery

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 53

    Chapter

    5.

    Protecting

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 55

    z/OS

    Security

    Server

    (RACF)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 55

    RACF

    Protection

    for

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 55

    Generic

    and

    Discrete

    Profiles

    for

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 56

    RACF

    Protection

    for

    Non-VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 56

    Hiding

    Data

    Set

    Names

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 57

    Data

    Set

    Password

    Protection

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 57

    Passwords

    for

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 58

    Passwords

    for

    Non-VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 61

    User-Security-Verification

    Routine

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 62

    Erasure

    of

    Residual

    Data

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 62

    Erasing

    DASD

    Data

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 62

    Erasing

    Tape

    Data

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 63

    Authorized

    Program

    Facility

    and

    Access

    Method

    Services

    .

    .

    .

    .

    .

    .

    .

    .

    . 64

    Access

    Method

    Services

    Cryptographic

    Option

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 65

    Data

    Enciphering

    and

    Deciphering

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 65

    REPRO

    ENCIPHER

    and

    DECIPHER

    on

    ICSF

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 68

    Part

    2.

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 69

    Chapter

    6.

    Organizing

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 77

    VSAM

    Data

    Formats

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 77

    Data

    Set

    Size

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 77

    Control

    Intervals

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 78

    Control

    Information

    Fields

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 78

    Compressed

    Control

    Information

    Field

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 79

    Control

    Areas

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 80

    Spanned

    Records

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 80

    Selection

    of

    VSAM

    Data

    Set

    Types

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 81

    Entry-Sequenced

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 82

    Simulated

    VSAM

    Access

    to

    UNIX

    files

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 84

    Key-Sequenced

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 85

    Linear

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 89

    Fixed-Length

    Relative-Record

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 89

    Variable-Length

    Relative-Record

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 90

    Summary

    of

    VSAM

    Data

    Set

    Types

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 91

    Extended-Format

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 92

    Restrictions

    on

    Defining

    Extended-Format

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 93

    VSAM

    Data

    Striping

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 93

    Compressed

    Data

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 97

    Access

    to

    Records

    in

    a

    VSAM

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 97

    Access

    to

    Entry-Sequenced

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 98

    Access

    to

    Key-Sequenced

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 98

    Access

    to

    Linear

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 99

    Contents

    v

    ||

    ||

  • Access

    to

    Fixed-Length

    Relative-Record

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 99

    Access

    to

    Variable-Length

    Relative-Record

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    . 100

    Access

    to

    Records

    through

    Alternate

    Indexes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 100

    Alternate

    Index

    Structure

    for

    a

    Key-Sequenced

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    . 101

    Alternate

    Index

    Structure

    for

    an

    Entry-Sequenced

    Data

    Set

    .

    .

    .

    .

    .

    .

    . 102

    Building

    of

    an

    Alternate

    Index

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 103

    Automatic

    Upgrade

    of

    Alternate

    Indexes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 103

    Data

    Compression

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 103

    Chapter

    7.

    Defining

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 105

    Using

    Cluster

    Names

    for

    Data

    and

    Index

    Components

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 106

    Defining

    a

    Data

    Set

    with

    Access

    Method

    Services

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 106

    Naming

    a

    Cluster

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 106

    Specifying

    Cluster

    Information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 108

    Using

    Access

    Method

    Services

    Parameters

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 108

    Allocating

    Space

    for

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 110

    Calculating

    Space

    for

    the

    Data

    Component

    of

    a

    KSDS

    .

    .

    .

    .

    .

    .

    .

    .

    . 113

    Calculating

    Space

    for

    the

    Index

    Component

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 114

    Using

    ALTER

    to

    Modify

    Attributes

    of

    a

    Component

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 114

    Using

    ALTER

    to

    Rename

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 114

    Defining

    a

    Data

    Set

    with

    JCL

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 114

    Loading

    a

    VSAM

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 115

    Using

    REPRO

    to

    Copy

    a

    VSAM

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 115

    Using

    a

    Program

    to

    Load

    a

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 117

    Reusing

    a

    VSAM

    Data

    Set

    as

    a

    Work

    File

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 118

    Copying

    and

    Merging

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 119

    Defining

    Alternate

    Indexes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 120

    Naming

    an

    Alternate

    Index

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 121

    Specifying

    Alternate

    Index

    Information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 121

    Building

    an

    Alternate

    Index

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 122

    Maintaining

    Alternate

    Indexes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 123

    Defining

    a

    Path

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 124

    Defining

    a

    Page

    Space

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 124

    Checking

    for

    Problems

    in

    Catalogs

    and

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 126

    Listing

    Catalog

    Entries

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 126

    Printing

    the

    Contents

    of

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 126

    Deleting

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 127

    Chapter

    8.

    Defining

    and

    Manipulating

    VSAM

    Data

    Sets:

    Examples

    .

    .

    .

    . 129

    Example

    of

    Defining

    a

    VSAM

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 130

    Examples

    of

    Defining

    Temporary

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 132

    Example

    1:

    Defining

    a

    Temporary

    VSAM

    Data

    Set

    Using

    ALLOCATE

    .

    .

    . 132

    Example

    2:

    Creating

    a

    Temporary

    Data

    Set

    with

    Default

    Parameter

    Values

    133

    Examples

    of

    Defining

    Alternate

    Indexes

    and

    Paths

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 133

    JCL

    Statements

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 133

    Commands

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 134

    Chapter

    9.

    Processing

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 137

    Creating

    an

    Access

    Method

    Control

    Block

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 138

    Creating

    an

    Exit

    List

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 138

    Opening

    a

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 139

    Creating

    a

    Request

    Parameter

    List

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 140

    Manipulating

    the

    Contents

    of

    Control

    Blocks

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 142

    Generating

    a

    Control

    Block

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 142

    Testing

    the

    Contents

    of

    ACB,

    EXLST,

    and

    RPL

    Fields

    .

    .

    .

    .

    .

    .

    .

    .

    . 142

    Modifying

    the

    Contents

    of

    an

    ACB,

    EXLST,

    or

    RPL

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 143

    vi

    z/OS

    V1R5.0

    DFSMS:

    Using

    Data

    Sets

    ||

  • Displaying

    the

    Contents

    of

    ACB,

    EXLST,

    and

    RPL

    Fields

    .

    .

    .

    .

    .

    .

    .

    . 143

    Requesting

    Access

    to

    a

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 143

    Inserting

    and

    Adding

    Records

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 144

    Retrieving

    Records

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 146

    Updating

    Records

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 148

    Deleting

    Records

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 149

    Deferring

    and

    Forcing

    Buffer

    Writing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 149

    Retaining

    and

    Positioning

    Data

    Buffers

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 149

    Processing

    Multiple

    Strings

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 150

    Making

    Concurrent

    Requests

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 151

    Using

    a

    Path

    to

    Access

    Records

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 151

    Making

    Asynchronous

    Requests

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 152

    Ending

    a

    Request

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 153

    Closing

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 153

    Operating

    in

    SRB

    or

    Cross-Memory

    Mode

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 154

    Using

    VSAM

    Macros

    in

    Programs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 155

    Chapter

    10.

    Optimizing

    VSAM

    Performance

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 157

    Optimizing

    Control

    Interval

    Size

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 157

    Control

    Interval

    Size

    Limitations

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 157

    Data

    Control

    Interval

    Size

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 159

    Index

    Control

    Interval

    Size

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 160

    How

    VSAM

    Adjusts

    Control

    Interval

    Size

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 160

    Optimizing

    Control

    Area

    Size

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 161

    Advantages

    of

    a

    Large

    Control

    Area

    Size

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 162

    Disadvantages

    of

    a

    Large

    Control

    Area

    Size

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 162

    Optimizing

    Free

    Space

    Distribution

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 162

    Selecting

    the

    Optimal

    Percentage

    of

    Free

    Space

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 164

    Altering

    the

    Free

    Space

    Specification

    When

    Loading

    a

    Data

    Set

    .

    .

    .

    .

    . 165

    Determining

    I/O

    Buffer

    Space

    for

    Nonshared

    Resource

    .

    .

    .

    .

    .

    .

    .

    .

    . 166

    Obtaining

    Buffers

    Above

    16

    MB

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 166

    Tuning

    for

    System-Managed

    Buffering

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 167

    Allocating

    Buffers

    for

    Concurrent

    Data

    Set

    Positioning

    .

    .

    .

    .

    .

    .

    .

    .

    . 172

    Allocating

    Buffers

    for

    Direct

    Access

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 172

    Allocating

    Buffers

    for

    Sequential

    Access

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 174

    Allocating

    Buffers

    for

    a

    Path

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 175

    Acquiring

    Buffers

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 175

    Using

    Index

    Options

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 176

    Increasing

    Virtual

    Storage

    for

    Index

    Set

    Records

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 176

    Avoiding

    Control

    Area

    Splits

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 177

    Putting

    the

    Index

    and

    Data

    on

    Separate

    Volumes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 177

    Obtaining

    Diagnostic

    Information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 177

    Migrating

    from

    the

    Mass

    Storage

    System

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 177

    Using

    Hiperbatch

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 177

    Chapter

    11.

    Processing

    Control

    Intervals

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 179

    Access

    to

    a

    Control

    Interval

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 180

    Structure

    of

    Control

    Information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 181

    CIDFControl

    Interval

    Definition

    Field

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 182

    RDFRecord

    Definition

    Field

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 182

    User

    Buffering

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 186

    Improved

    Control

    Interval

    Access

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 187

    Opening

    an

    Object

    for

    Improved

    Control

    Interval

    Access

    .

    .

    .

    .

    .

    .

    .

    . 187

    Processing

    a

    Data

    Set

    with

    Improved

    Control

    Interval

    Access

    .

    .

    .

    .

    .

    . 187

    Fixing

    Control

    Blocks

    and

    Buffers

    in

    Real

    Storage

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 188

    Control

    Blocks

    in

    Common

    (CBIC)

    Option

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 188

    Contents

    vii

  • Chapter

    12.

    Sharing

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 191

    Subtask

    Sharing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 192

    Building

    a

    Single

    Control

    Block

    Structure

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 192

    Resolving

    Exclusive

    Control

    Conflicts

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 193

    Preventing

    Deadlock

    in

    Exclusive

    Control

    of

    Shared

    Resources

    .

    .

    .

    .

    . 195

    Cross-Region

    Sharing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 197

    Cross-Region

    Share

    Options

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 197

    Read

    Integrity

    During

    Cross-Region

    Sharing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 198

    Write

    Integrity

    During

    Cross-Region

    Sharing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 199

    Cross-System

    Sharing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 200

    Control

    Block

    Update

    Facility

    (CBUF)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 201

    Considerations

    for

    CBUF

    Processing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 202

    Checkpoints

    for

    Shared

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 203

    Techniques

    of

    Data

    Sharing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 203

    Cross-Region

    Sharing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 203

    Cross-System

    Sharing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 205

    User

    Access

    to

    VSAM

    Shared

    Information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 206

    Chapter

    13.

    Sharing

    Resources

    Among

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    . 207

    Provision

    of

    a

    Resource

    Pool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 207

    Building

    a

    Resource

    Pool:

    BLDVRP

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 207

    Connecting

    a

    Data

    Set

    to

    a

    Resource

    Pool:

    OPEN

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 211

    Deleting

    a

    Resource

    Pool

    Using

    the

    DLVRP

    Macro

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 211

    Management

    of

    I/O

    Buffers

    for

    Shared

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 212

    Deferring

    Write

    Requests

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 212

    Relating

    Deferred

    Requests

    by

    Transaction

    ID

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 213

    Writing

    Buffers

    Whose

    Writing

    is

    Deferred:

    WRTBFR

    .

    .

    .

    .

    .

    .

    .

    .

    . 213

    Accessing

    a

    Control

    Interval

    with

    Shared

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    . 215

    Restrictions

    and

    Guidelines

    for

    Shared

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 216

    Chapter

    14.

    Using

    VSAM

    Record-Level

    Sharing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 219

    Controlling

    Access

    to

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 219

    Accessing

    Data

    Sets

    Using

    DFSMStvs

    and

    VSAM

    Record-Level

    Sharing

    219

    Record-Level

    Sharing

    CF

    Caching

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 220

    Using

    VSAM

    RLS

    with

    CICS

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 221

    Using

    VSAM

    RLS

    Outside

    of

    CICS

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 224

    Read

    Sharing

    of

    Recoverable

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 224

    Read-Sharing

    Integrity

    across

    KSDS

    CI

    and

    CA

    Splits

    .

    .

    .

    .

    .

    .

    .

    .

    . 224

    Read

    and

    Write

    Sharing

    of

    Nonrecoverable

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    . 224

    Using

    Non-RLS

    Access

    to

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 225

    Comparing

    RLS

    Access

    and

    Non-RLS

    Access

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 225

    Requesting

    VSAM

    RLS

    Run-Mode

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 228

    Using

    VSAM

    RLS

    Read

    Integrity

    Options

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 228

    Specifying

    Read

    Integrity

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 229

    Specifying

    a

    Timeout

    Value

    for

    Lock

    Requests

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 230

    Chapter

    15.

    Checking

    VSAM

    Key-Sequenced

    Data

    Set

    Clusters

    for

    Structural

    Errors

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 231

    EXAMINE

    Command

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 231

    Types

    of

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 231

    EXAMINE

    Users

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 231

    How

    to

    Run

    EXAMINE

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 232

    Deciding

    to

    Run

    INDEXTEST,

    DATATEST,

    or

    Both

    Tests

    .

    .

    .

    .

    .

    .

    .

    . 232

    Skipping

    DATATEST

    on

    Major

    INDEXTEST

    Errors

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 232

    Examining

    a

    User

    Catalog

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 232

    Understanding

    Message

    Hierarchy

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 233

    viii

    z/OS

    V1R5.0

    DFSMS:

    Using

    Data

    Sets

    ||||||||||||||||||||||||||||||

  • Controlling

    Message

    Printout

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 233

    Samples

    of

    Output

    from

    EXAMINE

    Runs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 234

    INDEXTEST

    and

    DATATEST

    Tests

    of

    an

    Error-Free

    Data

    Set

    .

    .

    .

    .

    .

    . 234

    INDEXTEST

    and

    DATATEST

    Tests

    of

    a

    Data

    Set

    with

    a

    Structural

    Error

    234

    INDEXTEST

    and

    DATATEST

    Tests

    of

    a

    Data

    Set

    with

    a

    Duplicate

    Key

    Error

    235

    Chapter

    16.

    Coding

    VSAM

    User-Written

    Exit

    Routines

    .

    .

    .

    .

    .

    .

    .

    .

    . 237

    Guidelines

    for

    Coding

    Exit

    Routines

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 237

    Programming

    Guidelines

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 238

    Multiple

    Request

    Parameter

    Lists

    or

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 239

    Return

    to

    a

    Main

    Program

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 239

    IGW8PNRU

    Routine

    for

    Batch

    Override

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 240

    Register

    Contents

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 240

    Programming

    Considerations

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 240

    EODAD

    Exit

    Routine

    to

    Process

    End

    of

    Data

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 241

    Register

    Contents

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 241

    Programming

    Considerations

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 241

    EXCEPTIONEXIT

    Exit

    Routine

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 242

    Register

    Contents

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 242

    Programming

    Considerations

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 242

    JRNAD

    Exit

    Routine

    to

    Journalize

    Transactions

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 243

    Register

    Contents

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 243

    Programming

    Considerations

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 243

    LERAD

    Exit

    Routine

    to

    Analyze

    Logical

    Errors

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 249

    Register

    Contents

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 250

    Programming

    Considerations

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 250

    RLSWAIT

    Exit

    Routine

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 250

    Register

    Contents

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 251

    Request

    Environment

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 251

    SYNAD

    Exit

    Routine

    to

    Analyze

    Physical

    Errors

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 252

    Register

    Contents

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 252

    Programming

    Considerations

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 252

    Example

    of

    a

    SYNAD

    User-Written

    Exit

    Routine

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 253

    UPAD

    Exit

    Routine

    for

    User

    Processing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 254

    Register

    Contents

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 255

    Programming

    Considerations

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 256

    User-Security-Verification

    Routine

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 257

    Chapter

    17.

    Using

    31-Bit

    Addressing

    Mode

    with

    VSAM

    .

    .

    .

    .

    .

    .

    .

    . 259

    VSAM

    Options

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 259

    Chapter

    18.

    Using

    Job

    Control

    Language

    for

    VSAM

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 261

    Using

    JCL

    Statements

    and

    Keywords

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 261

    Data

    Set

    Name

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 261

    Disposition

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 261

    Creating

    VSAM

    Data

    Sets

    with

    JCL

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 262

    Temporary

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 264

    Examples

    Using

    JCL

    to

    Allocate

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 265

    Retrieving

    an

    Existing

    VSAM

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 268

    Migration

    Consideration

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 268

    Keywords

    Used

    to

    Process

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 268

    Chapter

    19.

    Processing

    Indexes

    of

    Key-Sequenced

    Data

    Sets

    .

    .

    .

    .

    .

    . 271

    Access

    to

    a

    Key-Sequenced

    Data

    Set

    Index

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 271

    Access

    to

    an

    Index

    with

    GETIX

    and

    PUTIX

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 271

    Access

    to

    the

    Index

    Component

    Alone

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 271

    Contents

    ix

  • Prime

    Index

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 272

    Index

    Levels

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 273

    Format

    of

    an

    Index

    Record

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 275

    Header

    Portion

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 275

    Free

    Control

    Interval

    Entry

    Portion

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 277

    Index

    Entry

    Portion

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 277

    Key

    Compression

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 278

    Index

    Update

    Following

    a

    Control

    Interval

    Split

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 281

    Index

    Entries

    for

    a

    Spanned

    Record

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 282

    Part

    3.

    Non-VSAM

    Data

    Sets

    and

    UNIX

    Files

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 283

    Chapter

    20.

    Selecting

    Record

    Formats

    for

    Non-VSAM

    Data

    Sets

    .

    .

    .

    .

    . 291

    Format

    Selection

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 291

    Fixed-Length

    Record

    Formats

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 292

    Standard

    Format

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 292

    Restrictions

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 293

    Variable-Length

    Record

    Formats

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 294

    Format-V

    Records

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 294

    Spanned

    Format-VS

    Records

    (Sequential

    Access

    Method)

    .

    .

    .

    .

    .

    .

    . 296

    Spanned

    Format-V

    Records

    (Basic

    Direct

    Access

    Method)

    .

    .

    .

    .

    .

    .

    . 299

    Undefined-Length

    Record

    Format

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 301

    ISO/ANSI

    Tapes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 302

    Character

    Data

    Conversion

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 302

    Format-F

    Records

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 303

    Format-D

    Records

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 305

    ISO/ANSI

    Format-DS

    and

    Format-DBS

    Records

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 307

    Format-U

    Records

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 310

    Record

    FormatDevice

    Type

    Considerations

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 310

    Using

    Optional

    Control

    Characters

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 311

    Using

    Direct

    Access

    Storage

    Devices

    (DASD)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 312

    Using

    Magnetic

    Tape

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 312

    Using

    a

    Printer

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 313

    Using

    a

    Card

    Reader

    and

    Punch

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 314

    Using

    a

    Paper

    Tape

    Reader

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 315

    Chapter

    21.

    Specifying

    and

    Initializing

    Data

    Control

    Blocks

    .

    .

    .

    .

    .

    . 317

    Processing

    Sequential

    and

    Partitioned

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 318

    Using

    OPEN

    to

    Prepare

    a

    Data

    Set

    for

    Processing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 323

    Filling

    in

    the

    DCB

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 324

    Specifying

    the

    Forms

    of

    Macros,

    Buffering

    Requirements,

    and

    Addresses

    326

    Coding

    Processing

    Methods

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 326

    Selecting

    Data

    Set

    Options

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 327

    Block

    Size

    (BLKSIZE)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 327

    Data

    Set

    Organization

    (DSORG)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 332

    Key

    Length

    (KEYLEN)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 333

    Record

    Length

    (LRECL)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 333

    Record

    Format

    (RECFM)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 333

    Write

    Validity

    Check

    Option

    (OPTCD=W)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 334

    DD

    Statement

    Parameters

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 334

    Changing

    and

    Testing

    the

    DCB

    and

    DCBE

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 335

    Using

    the

    DCBD

    Macro

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 336

    Changing

    an

    Address

    in

    the

    DCB

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 336

    Using

    the

    IHADCBE

    Macro

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 337

    Using

    CLOSE

    to

    End

    the

    Processing

    of

    a

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 337

    Issuing

    the

    CHECK

    Macro

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 337

    x

    z/OS

    V1R5.0

    DFSMS:

    Using

    Data

    Sets

  • Closing

    a

    Data

    Set

    Temporarily

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 337

    Using

    CLOSE

    TYPE=T

    with

    Sequential

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 338

    Releasing

    Space

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 339

    Managing

    Buffer

    Pools

    When

    Closing

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 340

    Opening

    and

    Closing

    Data

    Sets:

    Considerations

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 340

    Parameter

    Lists

    with

    31-Bit

    Addresses

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 340

    Open

    and

    Close

    of

    Multiple

    Data

    Sets

    at

    the

    Same

    Time

    .

    .

    .

    .

    .

    .

    .

    . 340

    Factors

    to

    Consider

    When

    Allocating

    Direct

    Access

    Data

    Sets

    .

    .

    .

    .

    .

    . 341

    Guidelines

    for

    Opening

    and

    Closing

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 341

    Open/Close/EOV

    Errors

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 341

    Installation

    Exits

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 342

    Positioning

    Volumes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 343

    Releasing

    Data

    Sets

    and

    Volumes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 343

    Processing

    End-of-Volume

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 343

    Positioning

    During

    End-of-Volume

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 344

    Forcing

    End-of-Volume

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 345

    Managing

    SAM

    Buffer

    Space

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 346

    Constructing

    a

    Buffer

    Pool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 347

    Building

    a

    Buffer

    Pool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 347

    Building

    a

    Buffer

    Pool

    and

    a

    Record