Answer Posted / vinod
The "dirty read" technique can be used to provide a high
degree of concurrent access to VSAM files while avoiding
the complications associated with CI and CA splits. The
dirty read protocol can be summarized as follows:
1.The VSAM file must be defined with cross-region
SHAREOPTIONS 4.
2.The file must be allocated with DISP=SHR.
3.All operations on the file, including reads, must be
preceded with an ENQ for the data set. The data set name is
specified for the ENQ "rname", but any string can be used
for the ENQ "qname" (though it must be the same string for
all accessors).
4.After a lock is obtained, the user's buffer must be
refreshed with a GET request. This step also applies to new
record insertions.
5.At the end of all file operations, the enqueue is
released with a DEQ function call.
6.No lock is held during a wait (such as terminal input
wait).
7.Before updating a previously read record, a fresh copy of
the record must be obtained and compared to the original to
ensure that no other user has updated the record while it
was being browsed and modified. As always, the second read,
the record comparison, and the update must be shielded by a
lock.
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
What are the distinctive features of a ksda, key sequenced dataset?
Explain the purpose of the file status clause in the select statement?
If fspc(100 100) is specified does it mean that both the control interval and control area will be left empty because 100 % of both ci and ca are specified to be empty?
Can you delete vsam files with the delete option of the disposition parameter of jcl?
Explain the device independent method to indicate where a record is stored?
What is the main function of key-sequenced data set?
write a program to read from a VSAM file , there will be a 5 records to create name. empno. resignation and address to update in a db2 table and call another program using dynamic call to find the matching fields in program 1 to update in db2 table. anybody pls send de program for dis ? thanks in advance...
What are the different dataset organizations used in vsam?
what is the probability of a complete system distortion under high end low performing multiprocessor job?
explain the differences between vsam and non-vsam files
What does the keyranges parameter in define cluster command do?
if you wish to use the rewrite command how must the vsam file be opened?
Yes. Because the alternate key would first locate the primary key, which in turn locates the actual record. Needs twice the number of I/Os.
can you specify some the distinctive features of a ksds, key sequenced dataset?
is it required that primary key values have to be unique? Do alternate key values have to be unique?