z/OS VSAM and Access Method Services
Schedule
Start | End | Duration | Location | Details |
---|
Course Details
z/OS VSAM and Access Method Services
Course code: SS83G
Duration: 4 Days
Prerequisite:
You should complete:
• z/OS Facilities (ES15)
• z/OS Job Control Language and Utilities (ES07) or
• Fundamental System Skills in z/OS (ES10)
• or have equivalent experience
Course Description:
This course is designed to teach how to manage VSAM and non-VSAM data sets by coding and using the functions and features of the Access Method Services program, IDCAMS.
Course Objectives:
• Understand the structure and use of VSAM data sets or clusters
• Code IDCAMS commands to define and load VSAM clusters
• Code IDCAMS commands to define and load alternate indexes
• Code IDCAMS commands to list, alter, and delete catalog entries
• Code IDCAMS commands to print data sets
• Calculate the Direct Access Storage Device (DASD) space requirements for VSAM clusters
• Code the Job Control Language (JCL) for IDCAMS and programs which process VSAM clusters
• Use IDCAMS and JCL options to improve the performance of a VSAM job
• Reorganize, back up, and recover VSAM and non-VSAM data sets
• Interpret an IDCAMS listing of an Integrated Catalog Facility (ICF) catalog
• Select and use the appropriate documentation to utilize VSAM and IDCAMS
Intended Audience:
This is an intermediate course for individuals who manage data sets using IDCAMS and VSAM.
Course Outlines:
Introduction to VSAM data sets
• describe the structure, organization, and use of VSAM clusters
• explain the function of Control Intervals (CI) and Control Areas (CA)
• describe the purpose of CI splits and CA splits and how they are accomplished
• estimate DASD space requirements for various cluster types
ICF catalogs
• discuss the use of the ICF catalog
• describe the structure, purpose, and basic contents of the master catalog
• describe how the master catalog is located at initial program load (IPL) time
• discuss the structure, purpose, and basic contents of user catalogs
• create the ICF catalogs
• describe the catalog search
• discuss and create the two types of alias
IDCAMS commands, part 1
• discuss the IDCAMS program
• code the JCL to run IDCAMS
• code the DEFINE CLUSTER command to create specific VSAM data set organizations
• code the LISTCAT command to format and print entries from the catalog
JCL for VSAM
• explain creation and deletion of VSAM clusters using JCL and the DFSMS data class facility
• describe the additional JCL parameters that support VSAM clusters
• discuss the purpose of data class
• explain the assignment of data class through JCL and the Automatic Class Selection (ACS) routines
IDCAMS commands, part 2
• describe the function of REPRO, PRINT and DELETE commands
• use REPRO to load and back up a VSAM cluster
• use PRINT to print a VSAM cluster in various formats
• use DELETE to remove the catalog entry for the data set and scratch the data set from the volume
• describe and code modal commands to provide for conditional execution of Access Method Services (AMS) statements
Buffering
• explain how buffer space may impact performance either positively or negatively
• explain the use of data and index buffers in sequential processing and direct processing
• evaluate the use of JCL Access Method Parameters (AMP) keywords to manage buffers
• code the buffer keywords on the Dataset Definition (DD) statement
VSAM integrity and security
• explain how integrity and security is maintained
• discuss the meaning and use of SHAREOPTIONS
• discuss the need for serialization of updates to a data set
• describe how ENQ/DEQ macros are used to serialize data set updates in multiregion and multisystem environments
• explain the impact of buffering and SHAREOPTION modifications
• explain VSAM record level sharing
• use the VSAM integrity and security options: RECOVERY, ERASE, VERIFY, and passwords
• compare VSAM passwords with Resource Access Control Facility (RACF) security
Tuning
• explain the use of CI and CA FREESPACE
• discuss the performance impact of cache
• describe the space allocation process with KEYRANGES and multivolume data sets
• explain the contents of an Index CI
• explain how VSAM key compression works
IDCAMS ALTER
• explain the basic functions of the ALTER command
• code the ALTER command to modify options for processing existing VSAM objects
• code the ALTER command to modify options for buffering, FREESPACE, SHAREOPTIONS and passwords
Alternate indexes
• describe the reasons for using an alternate index
• discuss the basic contents of an alternate index
• use a PATH to process base cluster records directly and in alternate key sequence
• define and load an alternate index
• explain the impact of SHAREOPTIONS when opening a base cluster and associated alternate indices
• explain programming and JCL considerations
Advanced functions and extended format data sets
• explain VSAM advanced functions, extended format data sets, and their major features
• explain data stripping
• explain compression
• explain multivolume allocation options
• explain extended addressability
• explain system managed buffering
• explain partial space release
• explain space constraint relief
Data set reorganization, backup, and recovery
• describe the need for data set backup
• explain the advantages and disadvantages of REPRO
• explain the advantages and disadvantages of EXPORT / IMPORT
• explain the advantages and disadvantages of DFSMS Data Set Services (DFSMSdss) DUMP / RESTORE
• explain the advantages and disadvantages of DFSMS Hierarchical Storage Management (DFSMShsm) HBACKDS / HRECOVER
• discuss backup frequency
• determine when reorganization is required
• code the AMS commands for backup, recovery, and reorganization
Linear Data Sets (LDS)
• describe Data-In-Virtual (DIV)
• explain the structure and use of LDS
• explain the use of the DIV macro to access LDS
• discuss candidates for LDS
Management and problem analysis aids
• explain the use of the DCOLLECT command to gather management and planning information about the storage subsystem
• discuss tools used to identify and trace VSAM errors
• code the AMS EXAMINE command to test the structure of a Key Sequenced Data Set (KSDS)
• interpret EXAMINE output to determine how to recover from a KSDS structural error
• invoke the Generalized Trace Facility (GTF) to track VSAM-related events
• invoke utilities to print GTF trace output
Local and global shared resources
• explain techniques to conserve virtual storage by sharing buffers and control blocks
• discuss the concept of shared resource pools
• discuss the advantages and disadvantages of Local Shared Resources (LSR)
• discuss the advantages and disadvantages of Global Shared Resources (GSR)
• describe macros that control use and allocation of shared resources
• discuss how to specify and monitor shared buffer allocation in CICS and Information Management System (IMS)
CICS VSAM recovery
• describe the major functions of CICS VSAM recovery
• explain the concept of transaction processing, backup, and recovery
• explain how to implement and manage CICS VSAM recovery
Application coding considerations
• describe VSAM processing terminology
• define various VSAM processing options
• explain the merge of catalog entries, JCL parameters, and program definitions that determine processing options
• discuss VSAM programming support, and JCL requirements in Common Business Oriented Language (COBOL), Programming
Language One (PL/I), and Assembler languages
• describe JCL and programming requirements for COBOL, PL/I, and Assembler languages