z/os v1r5.0 dfsms: using data sets - anikvn.ruanikvn.ru/ibm_mainframe/dgt2d420.pdf · vsam data...
TRANSCRIPT
-
z/OS
DFSMS:
Using
Data
Sets
SC26-7410-03
-
z/OS
DFSMS:
Using
Data
Sets
SC26-7410-03
-
Note!
Before
using
this
information
and
the
product
it
supports,
be
sure
to
read
the
general
information
under
Notices
on
page
635.
Fourth
Edition,
March
2004
This
edition
applies
to
Version
1
Release
5
of
z/OS
(5694-A01),
Version
1
Release
5
of
z/OS.e
(5655-G52),
and
to
all
subsequent
releases
and
modifications
until
otherwise
indicated
in
new
editions.
This
edition
replaces
SC26-7410-02.
IBM
welcomes
your
comments.
A
form
for
readers
comments
may
be
provided
at
the
back
of
this
publication,
or
you
may
address
your
comments
to
the
following
address:
International
Business
Machines
Corporation
Department
55JA,
Mail
Station
P384
2455
South
Road
Poughkeepsie,
NY
12601-5400
United
States
of
America
FAX
(United
States
&
Canada):
1+845+432-9405
FAX
(Other
Countries):
Your
International
Access
Code
+1+845+432-9405
IBMLink
(United
States
customers
only):
IBMUSM10(MHVRCFS)
Internet
e-mail:
World
Wide
Web:
http://www.ibm.com/servers/eserver/zseries/zos/webqs.html
If
you
would
like
a
reply,
be
sure
to
include
your
name,
address,
telephone
number,
or
FAX
number.
Make
sure
to
include
the
following
in
your
comment
or
note:
v
Title
and
order
number
of
this
document
v
Page
number
or
topic
related
to
your
comment
When
you
send
information
to
IBM,
you
grant
IBM
a
nonexclusive
right
to
use
or
distribute
the
information
in
any
way
it
believes
appropriate
without
incurring
any
obligation
to
you.
Copyright
International
Business
Machines
Corporation
1987,
2004.
All
rights
reserved.
US
Government
Users
Restricted
Rights
Use,
duplication
or
disclosure
restricted
by
GSA
ADP
Schedule
Contract
with
IBM
Corp.
http://www.ibm.com/servers/eserver/zseries/zos/webqs.html -
Contents
Figures
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. xix
Tables
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. xxiii
About
This
Document
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. xxv
Major
Divisions
of
This
Document
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. xxv
Required
product
knowledge
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. xxv
Referenced
documents
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. xxvi
Accessing
z/OS
DFSMS
documents
on
the
Internet
.
.
.
.
.
.
.
.
.
.
. xxvi
Using
LookAt
to
look
up
message
explanations
.
.
.
.
.
.
.
.
.
.
.
. xxvi
Accessing
z/OS
licensed
documents
on
the
Internet
.
.
.
.
.
.
.
.
.
. xxvii
Summary
of
Changes
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. xxix
Summary
of
Changes
for
SC26-7410-03
z/OS
Version
1
Release
5
.
.
.
.
. xxix
New
Information
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. xxix
Changed
Information
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. xxix
Moved
Information
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. xxx
Summary
of
Changes
for
SC26-7410-02
z/OS
Version
1
Release
3
.
.
.
.
. xxx
New
Information
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. xxx
Changed
Information
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. xxx
Part
1.
All
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 1
Chapter
1.
Working
with
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 5
Data
Storage
and
Management
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 5
System-Managed
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 6
Distributed
File
Manager
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 6
Access
Methods
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 6
Basic
Direct
Access
Method
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 6
Basic
Partitioned
Access
Method
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 7
Basic
Sequential
Access
Method
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 7
Data-in-Virtual
(DIV)
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 7
Indexed
Sequential
Access
Method
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 7
Object
Access
Method
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 8
Queued
Sequential
Access
Method
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 8
Virtual
Storage
Access
Method
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 8
Access
to
z/OS
UNIX
Files
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 9
Selection
of
an
Access
Method
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 9
Direct
Access
Storage
Device
(DASD)
Volumes
.
.
.
.
.
.
.
.
.
.
.
.
. 10
DASD
Labels
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 10
Track
Format
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 10
Track
Overflow
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 11
VSAM
Record
Addressing
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 11
Actual
and
Relative
Addressing
with
Non-VSAM
Access
Methods
.
.
.
.
. 12
Magnetic
Tape
Volumes
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 13
Using
Magnetic
Tape
Labels
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 13
Specifying
the
File
Sequence
Number
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 14
Identifying
Unlabeled
Tapes
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 16
Using
Tape
Marks
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 17
Data
Management
Macros
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 17
Data
Set
Processing
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 18
Allocating
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 18
Processing
Data
Sets
through
Programs
.
.
.
.
.
.
.
.
.
.
.
.
.
. 19
Copyright
IBM
Corp.
1987,
2004
iii
||
||
-
Using
Access
Methods
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 19
Using
Addressing
Modes
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 20
Using
Hiperspace
and
Hiperbatch
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 20
Processing
VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 20
Processing
PDSs,
PDSEs,
and
UNIX
Directories
.
.
.
.
.
.
.
.
.
.
. 21
Processing
Sequential
Data
Sets
and
Members
of
PDSEs
and
PDSs
.
.
.
. 22
Processing
UNIX
Files
with
an
Access
Method
.
.
.
.
.
.
.
.
.
.
.
. 22
Processing
EXCP,
EXCPVR,
and
XDAP
Macros
.
.
.
.
.
.
.
.
.
.
. 23
Distributed
Data
Management
(DDM)
Attributes
.
.
.
.
.
.
.
.
.
.
.
.
. 23
Virtual
I/O
for
Temporary
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 24
Data
Set
Names
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 25
Catalogs
and
Volume
Table
of
Contents
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 26
VTOC
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 26
Catalogs
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 26
Data
Set
Names
and
Metadata
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 26
Security
of
Data
Set
Names
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 27
Chapter
2.
Using
the
Storage
Management
Subsystem
.
.
.
.
.
.
.
.
. 29
Using
Automatic
Class
Selection
Routines
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 31
Allocating
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 32
Allocating
Data
Sets
with
JCL
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 32
Allocating
System-Managed
Data
Sets
with
the
Access
Method
Services
ALLOCATE
Command
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 34
Allocating
Data
Sets
with
the
TSO
ALLOCATE
Command
.
.
.
.
.
.
.
. 35
Allocating
Data
Sets
with
Dynamic
Allocation
.
.
.
.
.
.
.
.
.
.
.
.
. 36
Chapter
3.
Allocating
Space
on
Direct
Access
Volumes
.
.
.
.
.
.
.
.
. 37
Specification
of
Space
Requirements
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 37
Blocks
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 37
Average
Record
Length
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 38
Tracks
or
Cylinders
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 38
Absolute
Track
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 39
Additional
Space-Allocation
Options
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 39
Maximum
Data
Set
Size
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 39
Maximum
Size
on
One
Volume
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 39
Maximum
Number
of
Volumes
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 39
Maximum
VSAM
Data
Set
Size
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 39
Primary
and
Secondary
Space
Allocation
without
the
Guaranteed
Space
Attribute
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 40
Multivolume
VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 40
Multivolume
Non-VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 40
Extended-Format
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 40
Allocation
of
Data
Sets
with
the
Guaranteed
Space
Attribute
.
.
.
.
.
.
.
. 41
Guaranteed
Space
with
DISP=NEW
or
MOD
.
.
.
.
.
.
.
.
.
.
.
.
. 41
Guaranteed
Space
for
VSAM
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 41
Guaranteed
Space
with
DISP=OLD
or
SHR
.
.
.
.
.
.
.
.
.
.
.
.
. 42
Guaranteed
Space
with
Extended-Format
Data
Sets
.
.
.
.
.
.
.
.
.
. 42
Guaranteed
Space
Example
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 42
Allocation
of
Data
Sets
with
the
Space
Constraint
Relief
Attributes
.
.
.
.
.
. 43
Extension
to
Another
DASD
Volume
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 43
Examples
of
Dynamic
Volume
Count
When
Defining
a
Data
Set
.
.
.
.
.
. 44
Examples
of
Dynamic
Volume
Count
When
Allocating
an
Existing
Data
Set
45
Multiple
Volume
Considerations
for
Sequential
Data
Sets
.
.
.
.
.
.
.
.
. 45
Additional
Information
on
Space
Allocation
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 46
Chapter
4.
Backing
Up
and
Recovering
Data
Sets
.
.
.
.
.
.
.
.
.
.
. 47
iv
z/OS
V1R5.0
DFSMS:
Using
Data
Sets
||||
||
-
Using
REPRO
for
Backup
and
Recovery
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 48
Using
EXPORT
and
IMPORT
for
Backup
and
Recovery
of
VSAM
Data
Sets
49
Structure
of
an
Exported
Data
Set
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 50
EXPORT
and
IMPORT
Commands
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 50
Writing
a
Program
for
Backup
and
Recovery
.
.
.
.
.
.
.
.
.
.
.
.
.
. 50
Using
Concurrent
Copy
for
Backup
and
Recovery
.
.
.
.
.
.
.
.
.
.
.
. 51
Updating
a
Data
Set
After
Recovery
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 51
Synchronizing
Catalog
and
VSAM
Data
Set
Information
During
Recovery
.
.
. 51
Handling
an
Abnormal
Termination
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 52
Using
VERIFY
to
Process
Improperly
Closed
Data
Sets
.
.
.
.
.
.
.
.
. 52
CICS
VSAM
Recovery
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 53
Chapter
5.
Protecting
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 55
z/OS
Security
Server
(RACF)
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 55
RACF
Protection
for
VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 55
Generic
and
Discrete
Profiles
for
VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
. 56
RACF
Protection
for
Non-VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
. 56
Hiding
Data
Set
Names
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 57
Data
Set
Password
Protection
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 57
Passwords
for
VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 58
Passwords
for
Non-VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 61
User-Security-Verification
Routine
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 62
Erasure
of
Residual
Data
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 62
Erasing
DASD
Data
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 62
Erasing
Tape
Data
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 63
Authorized
Program
Facility
and
Access
Method
Services
.
.
.
.
.
.
.
.
. 64
Access
Method
Services
Cryptographic
Option
.
.
.
.
.
.
.
.
.
.
.
.
. 65
Data
Enciphering
and
Deciphering
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 65
REPRO
ENCIPHER
and
DECIPHER
on
ICSF
.
.
.
.
.
.
.
.
.
.
.
. 68
Part
2.
VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 69
Chapter
6.
Organizing
VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 77
VSAM
Data
Formats
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 77
Data
Set
Size
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 77
Control
Intervals
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 78
Control
Information
Fields
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 78
Compressed
Control
Information
Field
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 79
Control
Areas
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 80
Spanned
Records
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 80
Selection
of
VSAM
Data
Set
Types
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 81
Entry-Sequenced
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 82
Simulated
VSAM
Access
to
UNIX
files
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 84
Key-Sequenced
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 85
Linear
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 89
Fixed-Length
Relative-Record
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
. 89
Variable-Length
Relative-Record
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
. 90
Summary
of
VSAM
Data
Set
Types
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 91
Extended-Format
VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 92
Restrictions
on
Defining
Extended-Format
Data
Sets
.
.
.
.
.
.
.
.
.
. 93
VSAM
Data
Striping
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 93
Compressed
Data
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 97
Access
to
Records
in
a
VSAM
Data
Set
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 97
Access
to
Entry-Sequenced
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 98
Access
to
Key-Sequenced
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 98
Access
to
Linear
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 99
Contents
v
||
||
-
Access
to
Fixed-Length
Relative-Record
Data
Sets
.
.
.
.
.
.
.
.
.
. 99
Access
to
Variable-Length
Relative-Record
Data
Sets
.
.
.
.
.
.
.
.
. 100
Access
to
Records
through
Alternate
Indexes
.
.
.
.
.
.
.
.
.
.
.
.
. 100
Alternate
Index
Structure
for
a
Key-Sequenced
Data
Set
.
.
.
.
.
.
.
. 101
Alternate
Index
Structure
for
an
Entry-Sequenced
Data
Set
.
.
.
.
.
.
. 102
Building
of
an
Alternate
Index
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 103
Automatic
Upgrade
of
Alternate
Indexes
.
.
.
.
.
.
.
.
.
.
.
.
.
. 103
Data
Compression
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 103
Chapter
7.
Defining
VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 105
Using
Cluster
Names
for
Data
and
Index
Components
.
.
.
.
.
.
.
.
.
. 106
Defining
a
Data
Set
with
Access
Method
Services
.
.
.
.
.
.
.
.
.
.
. 106
Naming
a
Cluster
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 106
Specifying
Cluster
Information
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 108
Using
Access
Method
Services
Parameters
.
.
.
.
.
.
.
.
.
.
.
.
. 108
Allocating
Space
for
VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 110
Calculating
Space
for
the
Data
Component
of
a
KSDS
.
.
.
.
.
.
.
.
. 113
Calculating
Space
for
the
Index
Component
.
.
.
.
.
.
.
.
.
.
.
.
. 114
Using
ALTER
to
Modify
Attributes
of
a
Component
.
.
.
.
.
.
.
.
.
. 114
Using
ALTER
to
Rename
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 114
Defining
a
Data
Set
with
JCL
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 114
Loading
a
VSAM
Data
Set
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 115
Using
REPRO
to
Copy
a
VSAM
Data
Set
.
.
.
.
.
.
.
.
.
.
.
.
. 115
Using
a
Program
to
Load
a
Data
Set
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 117
Reusing
a
VSAM
Data
Set
as
a
Work
File
.
.
.
.
.
.
.
.
.
.
.
.
. 118
Copying
and
Merging
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 119
Defining
Alternate
Indexes
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 120
Naming
an
Alternate
Index
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 121
Specifying
Alternate
Index
Information
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 121
Building
an
Alternate
Index
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 122
Maintaining
Alternate
Indexes
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 123
Defining
a
Path
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 124
Defining
a
Page
Space
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 124
Checking
for
Problems
in
Catalogs
and
Data
Sets
.
.
.
.
.
.
.
.
.
.
. 126
Listing
Catalog
Entries
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 126
Printing
the
Contents
of
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 126
Deleting
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 127
Chapter
8.
Defining
and
Manipulating
VSAM
Data
Sets:
Examples
.
.
.
. 129
Example
of
Defining
a
VSAM
Data
Set
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 130
Examples
of
Defining
Temporary
VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
. 132
Example
1:
Defining
a
Temporary
VSAM
Data
Set
Using
ALLOCATE
.
.
. 132
Example
2:
Creating
a
Temporary
Data
Set
with
Default
Parameter
Values
133
Examples
of
Defining
Alternate
Indexes
and
Paths
.
.
.
.
.
.
.
.
.
.
. 133
JCL
Statements
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 133
Commands
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 134
Chapter
9.
Processing
VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
. 137
Creating
an
Access
Method
Control
Block
.
.
.
.
.
.
.
.
.
.
.
.
.
. 138
Creating
an
Exit
List
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 138
Opening
a
Data
Set
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 139
Creating
a
Request
Parameter
List
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 140
Manipulating
the
Contents
of
Control
Blocks
.
.
.
.
.
.
.
.
.
.
.
.
. 142
Generating
a
Control
Block
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 142
Testing
the
Contents
of
ACB,
EXLST,
and
RPL
Fields
.
.
.
.
.
.
.
.
. 142
Modifying
the
Contents
of
an
ACB,
EXLST,
or
RPL
.
.
.
.
.
.
.
.
.
. 143
vi
z/OS
V1R5.0
DFSMS:
Using
Data
Sets
||
-
Displaying
the
Contents
of
ACB,
EXLST,
and
RPL
Fields
.
.
.
.
.
.
.
. 143
Requesting
Access
to
a
Data
Set
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 143
Inserting
and
Adding
Records
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 144
Retrieving
Records
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 146
Updating
Records
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 148
Deleting
Records
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 149
Deferring
and
Forcing
Buffer
Writing
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 149
Retaining
and
Positioning
Data
Buffers
.
.
.
.
.
.
.
.
.
.
.
.
.
. 149
Processing
Multiple
Strings
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 150
Making
Concurrent
Requests
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 151
Using
a
Path
to
Access
Records
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 151
Making
Asynchronous
Requests
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 152
Ending
a
Request
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 153
Closing
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 153
Operating
in
SRB
or
Cross-Memory
Mode
.
.
.
.
.
.
.
.
.
.
.
.
.
. 154
Using
VSAM
Macros
in
Programs
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 155
Chapter
10.
Optimizing
VSAM
Performance
.
.
.
.
.
.
.
.
.
.
.
.
. 157
Optimizing
Control
Interval
Size
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 157
Control
Interval
Size
Limitations
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 157
Data
Control
Interval
Size
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 159
Index
Control
Interval
Size
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 160
How
VSAM
Adjusts
Control
Interval
Size
.
.
.
.
.
.
.
.
.
.
.
.
.
. 160
Optimizing
Control
Area
Size
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 161
Advantages
of
a
Large
Control
Area
Size
.
.
.
.
.
.
.
.
.
.
.
.
.
. 162
Disadvantages
of
a
Large
Control
Area
Size
.
.
.
.
.
.
.
.
.
.
.
. 162
Optimizing
Free
Space
Distribution
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 162
Selecting
the
Optimal
Percentage
of
Free
Space
.
.
.
.
.
.
.
.
.
.
. 164
Altering
the
Free
Space
Specification
When
Loading
a
Data
Set
.
.
.
.
. 165
Determining
I/O
Buffer
Space
for
Nonshared
Resource
.
.
.
.
.
.
.
.
. 166
Obtaining
Buffers
Above
16
MB
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 166
Tuning
for
System-Managed
Buffering
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 167
Allocating
Buffers
for
Concurrent
Data
Set
Positioning
.
.
.
.
.
.
.
.
. 172
Allocating
Buffers
for
Direct
Access
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 172
Allocating
Buffers
for
Sequential
Access
.
.
.
.
.
.
.
.
.
.
.
.
.
. 174
Allocating
Buffers
for
a
Path
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 175
Acquiring
Buffers
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 175
Using
Index
Options
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 176
Increasing
Virtual
Storage
for
Index
Set
Records
.
.
.
.
.
.
.
.
.
.
. 176
Avoiding
Control
Area
Splits
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 177
Putting
the
Index
and
Data
on
Separate
Volumes
.
.
.
.
.
.
.
.
.
.
. 177
Obtaining
Diagnostic
Information
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 177
Migrating
from
the
Mass
Storage
System
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 177
Using
Hiperbatch
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 177
Chapter
11.
Processing
Control
Intervals
.
.
.
.
.
.
.
.
.
.
.
.
.
. 179
Access
to
a
Control
Interval
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 180
Structure
of
Control
Information
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 181
CIDFControl
Interval
Definition
Field
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 182
RDFRecord
Definition
Field
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 182
User
Buffering
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 186
Improved
Control
Interval
Access
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 187
Opening
an
Object
for
Improved
Control
Interval
Access
.
.
.
.
.
.
.
. 187
Processing
a
Data
Set
with
Improved
Control
Interval
Access
.
.
.
.
.
. 187
Fixing
Control
Blocks
and
Buffers
in
Real
Storage
.
.
.
.
.
.
.
.
.
. 188
Control
Blocks
in
Common
(CBIC)
Option
.
.
.
.
.
.
.
.
.
.
.
.
.
. 188
Contents
vii
-
Chapter
12.
Sharing
VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 191
Subtask
Sharing
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 192
Building
a
Single
Control
Block
Structure
.
.
.
.
.
.
.
.
.
.
.
.
.
. 192
Resolving
Exclusive
Control
Conflicts
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 193
Preventing
Deadlock
in
Exclusive
Control
of
Shared
Resources
.
.
.
.
. 195
Cross-Region
Sharing
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 197
Cross-Region
Share
Options
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 197
Read
Integrity
During
Cross-Region
Sharing
.
.
.
.
.
.
.
.
.
.
.
. 198
Write
Integrity
During
Cross-Region
Sharing
.
.
.
.
.
.
.
.
.
.
.
. 199
Cross-System
Sharing
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 200
Control
Block
Update
Facility
(CBUF)
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 201
Considerations
for
CBUF
Processing
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 202
Checkpoints
for
Shared
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 203
Techniques
of
Data
Sharing
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 203
Cross-Region
Sharing
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 203
Cross-System
Sharing
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 205
User
Access
to
VSAM
Shared
Information
.
.
.
.
.
.
.
.
.
.
.
.
. 206
Chapter
13.
Sharing
Resources
Among
VSAM
Data
Sets
.
.
.
.
.
.
.
. 207
Provision
of
a
Resource
Pool
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 207
Building
a
Resource
Pool:
BLDVRP
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 207
Connecting
a
Data
Set
to
a
Resource
Pool:
OPEN
.
.
.
.
.
.
.
.
.
. 211
Deleting
a
Resource
Pool
Using
the
DLVRP
Macro
.
.
.
.
.
.
.
.
.
. 211
Management
of
I/O
Buffers
for
Shared
Resources
.
.
.
.
.
.
.
.
.
.
. 212
Deferring
Write
Requests
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 212
Relating
Deferred
Requests
by
Transaction
ID
.
.
.
.
.
.
.
.
.
.
.
. 213
Writing
Buffers
Whose
Writing
is
Deferred:
WRTBFR
.
.
.
.
.
.
.
.
. 213
Accessing
a
Control
Interval
with
Shared
Resources
.
.
.
.
.
.
.
.
. 215
Restrictions
and
Guidelines
for
Shared
Resources
.
.
.
.
.
.
.
.
.
.
. 216
Chapter
14.
Using
VSAM
Record-Level
Sharing
.
.
.
.
.
.
.
.
.
.
. 219
Controlling
Access
to
VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 219
Accessing
Data
Sets
Using
DFSMStvs
and
VSAM
Record-Level
Sharing
219
Record-Level
Sharing
CF
Caching
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 220
Using
VSAM
RLS
with
CICS
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 221
Using
VSAM
RLS
Outside
of
CICS
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 224
Read
Sharing
of
Recoverable
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
. 224
Read-Sharing
Integrity
across
KSDS
CI
and
CA
Splits
.
.
.
.
.
.
.
.
. 224
Read
and
Write
Sharing
of
Nonrecoverable
Data
Sets
.
.
.
.
.
.
.
.
. 224
Using
Non-RLS
Access
to
VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
. 225
Comparing
RLS
Access
and
Non-RLS
Access
.
.
.
.
.
.
.
.
.
.
.
. 225
Requesting
VSAM
RLS
Run-Mode
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 228
Using
VSAM
RLS
Read
Integrity
Options
.
.
.
.
.
.
.
.
.
.
.
.
.
. 228
Specifying
Read
Integrity
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 229
Specifying
a
Timeout
Value
for
Lock
Requests
.
.
.
.
.
.
.
.
.
.
.
.
. 230
Chapter
15.
Checking
VSAM
Key-Sequenced
Data
Set
Clusters
for
Structural
Errors
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 231
EXAMINE
Command
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 231
Types
of
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 231
EXAMINE
Users
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 231
How
to
Run
EXAMINE
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 232
Deciding
to
Run
INDEXTEST,
DATATEST,
or
Both
Tests
.
.
.
.
.
.
.
. 232
Skipping
DATATEST
on
Major
INDEXTEST
Errors
.
.
.
.
.
.
.
.
.
. 232
Examining
a
User
Catalog
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 232
Understanding
Message
Hierarchy
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 233
viii
z/OS
V1R5.0
DFSMS:
Using
Data
Sets
||||||||||||||||||||||||||||||
-
Controlling
Message
Printout
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 233
Samples
of
Output
from
EXAMINE
Runs
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 234
INDEXTEST
and
DATATEST
Tests
of
an
Error-Free
Data
Set
.
.
.
.
.
. 234
INDEXTEST
and
DATATEST
Tests
of
a
Data
Set
with
a
Structural
Error
234
INDEXTEST
and
DATATEST
Tests
of
a
Data
Set
with
a
Duplicate
Key
Error
235
Chapter
16.
Coding
VSAM
User-Written
Exit
Routines
.
.
.
.
.
.
.
.
. 237
Guidelines
for
Coding
Exit
Routines
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 237
Programming
Guidelines
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 238
Multiple
Request
Parameter
Lists
or
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
. 239
Return
to
a
Main
Program
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 239
IGW8PNRU
Routine
for
Batch
Override
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 240
Register
Contents
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 240
Programming
Considerations
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 240
EODAD
Exit
Routine
to
Process
End
of
Data
.
.
.
.
.
.
.
.
.
.
.
.
. 241
Register
Contents
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 241
Programming
Considerations
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 241
EXCEPTIONEXIT
Exit
Routine
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 242
Register
Contents
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 242
Programming
Considerations
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 242
JRNAD
Exit
Routine
to
Journalize
Transactions
.
.
.
.
.
.
.
.
.
.
.
. 243
Register
Contents
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 243
Programming
Considerations
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 243
LERAD
Exit
Routine
to
Analyze
Logical
Errors
.
.
.
.
.
.
.
.
.
.
.
.
. 249
Register
Contents
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 250
Programming
Considerations
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 250
RLSWAIT
Exit
Routine
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 250
Register
Contents
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 251
Request
Environment
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 251
SYNAD
Exit
Routine
to
Analyze
Physical
Errors
.
.
.
.
.
.
.
.
.
.
.
. 252
Register
Contents
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 252
Programming
Considerations
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 252
Example
of
a
SYNAD
User-Written
Exit
Routine
.
.
.
.
.
.
.
.
.
.
. 253
UPAD
Exit
Routine
for
User
Processing
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 254
Register
Contents
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 255
Programming
Considerations
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 256
User-Security-Verification
Routine
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 257
Chapter
17.
Using
31-Bit
Addressing
Mode
with
VSAM
.
.
.
.
.
.
.
. 259
VSAM
Options
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 259
Chapter
18.
Using
Job
Control
Language
for
VSAM
.
.
.
.
.
.
.
.
.
. 261
Using
JCL
Statements
and
Keywords
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 261
Data
Set
Name
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 261
Disposition
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 261
Creating
VSAM
Data
Sets
with
JCL
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 262
Temporary
VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 264
Examples
Using
JCL
to
Allocate
VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
. 265
Retrieving
an
Existing
VSAM
Data
Set
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 268
Migration
Consideration
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 268
Keywords
Used
to
Process
VSAM
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
. 268
Chapter
19.
Processing
Indexes
of
Key-Sequenced
Data
Sets
.
.
.
.
.
. 271
Access
to
a
Key-Sequenced
Data
Set
Index
.
.
.
.
.
.
.
.
.
.
.
.
. 271
Access
to
an
Index
with
GETIX
and
PUTIX
.
.
.
.
.
.
.
.
.
.
.
.
. 271
Access
to
the
Index
Component
Alone
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 271
Contents
ix
-
Prime
Index
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 272
Index
Levels
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 273
Format
of
an
Index
Record
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 275
Header
Portion
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 275
Free
Control
Interval
Entry
Portion
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 277
Index
Entry
Portion
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 277
Key
Compression
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 278
Index
Update
Following
a
Control
Interval
Split
.
.
.
.
.
.
.
.
.
.
.
. 281
Index
Entries
for
a
Spanned
Record
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 282
Part
3.
Non-VSAM
Data
Sets
and
UNIX
Files
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 283
Chapter
20.
Selecting
Record
Formats
for
Non-VSAM
Data
Sets
.
.
.
.
. 291
Format
Selection
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 291
Fixed-Length
Record
Formats
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 292
Standard
Format
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 292
Restrictions
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 293
Variable-Length
Record
Formats
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 294
Format-V
Records
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 294
Spanned
Format-VS
Records
(Sequential
Access
Method)
.
.
.
.
.
.
. 296
Spanned
Format-V
Records
(Basic
Direct
Access
Method)
.
.
.
.
.
.
. 299
Undefined-Length
Record
Format
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 301
ISO/ANSI
Tapes
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 302
Character
Data
Conversion
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 302
Format-F
Records
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 303
Format-D
Records
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 305
ISO/ANSI
Format-DS
and
Format-DBS
Records
.
.
.
.
.
.
.
.
.
.
. 307
Format-U
Records
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 310
Record
FormatDevice
Type
Considerations
.
.
.
.
.
.
.
.
.
.
.
.
. 310
Using
Optional
Control
Characters
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 311
Using
Direct
Access
Storage
Devices
(DASD)
.
.
.
.
.
.
.
.
.
.
.
. 312
Using
Magnetic
Tape
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 312
Using
a
Printer
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 313
Using
a
Card
Reader
and
Punch
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 314
Using
a
Paper
Tape
Reader
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 315
Chapter
21.
Specifying
and
Initializing
Data
Control
Blocks
.
.
.
.
.
. 317
Processing
Sequential
and
Partitioned
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
. 318
Using
OPEN
to
Prepare
a
Data
Set
for
Processing
.
.
.
.
.
.
.
.
.
.
. 323
Filling
in
the
DCB
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 324
Specifying
the
Forms
of
Macros,
Buffering
Requirements,
and
Addresses
326
Coding
Processing
Methods
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 326
Selecting
Data
Set
Options
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 327
Block
Size
(BLKSIZE)
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 327
Data
Set
Organization
(DSORG)
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 332
Key
Length
(KEYLEN)
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 333
Record
Length
(LRECL)
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 333
Record
Format
(RECFM)
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 333
Write
Validity
Check
Option
(OPTCD=W)
.
.
.
.
.
.
.
.
.
.
.
.
.
. 334
DD
Statement
Parameters
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 334
Changing
and
Testing
the
DCB
and
DCBE
.
.
.
.
.
.
.
.
.
.
.
.
.
. 335
Using
the
DCBD
Macro
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 336
Changing
an
Address
in
the
DCB
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 336
Using
the
IHADCBE
Macro
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 337
Using
CLOSE
to
End
the
Processing
of
a
Data
Set
.
.
.
.
.
.
.
.
.
.
. 337
Issuing
the
CHECK
Macro
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 337
x
z/OS
V1R5.0
DFSMS:
Using
Data
Sets
-
Closing
a
Data
Set
Temporarily
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 337
Using
CLOSE
TYPE=T
with
Sequential
Data
Sets
.
.
.
.
.
.
.
.
.
. 338
Releasing
Space
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 339
Managing
Buffer
Pools
When
Closing
Data
Sets
.
.
.
.
.
.
.
.
.
.
. 340
Opening
and
Closing
Data
Sets:
Considerations
.
.
.
.
.
.
.
.
.
.
.
. 340
Parameter
Lists
with
31-Bit
Addresses
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 340
Open
and
Close
of
Multiple
Data
Sets
at
the
Same
Time
.
.
.
.
.
.
.
. 340
Factors
to
Consider
When
Allocating
Direct
Access
Data
Sets
.
.
.
.
.
. 341
Guidelines
for
Opening
and
Closing
Data
Sets
.
.
.
.
.
.
.
.
.
.
.
. 341
Open/Close/EOV
Errors
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 341
Installation
Exits
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 342
Positioning
Volumes
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 343
Releasing
Data
Sets
and
Volumes
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 343
Processing
End-of-Volume
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 343
Positioning
During
End-of-Volume
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 344
Forcing
End-of-Volume
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 345
Managing
SAM
Buffer
Space
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 346
Constructing
a
Buffer
Pool
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 347
Building
a
Buffer
Pool
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 347
Building
a
Buffer
Pool
and
a
Record