DMS overview
Access methods
Start
Commands
Data media
BS2000
The organization of data in files
File names
Access protection
Files can also be conventional input/output files from programs and load modules that represent executable programs.
Related data is collected in one named unit known as a file.
In the DMS every file is assigned a name in accordance with clearly defined rules so that they can be unambiguously distinguished from other files. Here are some of the most important details ...
For example, a file is comprised of several data records having similar content, thus forming a logical unit with specified organization parameters, much like a list of telephone numbers or a list of employees.
Characters permitted: Letters (at least one letter), Numbers (1, 2, 3, etc.) The following special characters/symbols: minus (-), at (@), hashtag (#), dollar ($), period/dot (.)
Limitations: The first character must never be a special character or symbol Blanks must never be used
Length of file names: 41 characters, maximum
Rules for naming files in the DMS
A slash replaces exactly one random character.
Using wildcards to select files
Wildcards can be used in commands that are employed to select a specified number of files. For example, if you want to display all of the files sharing a specific pattern, a wildcard may be used in the command.
Examples:
A dot at the end of the name means that at least one random character follows the dot.
An asterisk replaces a random (or blank) character sequence.
DEMO
PROJECT1
CHART
PROC
Examples: PROJECT1.SRC.COB.DEMO (fully qualified) PROJECT1.SRC.COB. (partially qualified)
EXAMPLE
COB
TEST
ASS
Test your knowledge
SRC
LAD
File names with a dot at the end are partially qualified file names. Users can take several of these partially qualified file names and form fully qualified file names. This enables users to set up folder-like structures when organizing files that are related to each other.
Partially qualified and fully qualified file names
File names can have any length.
Every name must contain at least one letter.
Test
Blanks must not be used.
File names in the DMS
True
Well? Can you tell which of the following statements is true or false?
False
A special character can be used as the first character in a file name.
PROJECT1.LAD.
Partially qualified
PROJECT1.SRC.ASS.
PROJECT1.SRC.COB.CHART
Which of the following file names are fully qualified, and which ones are partially qualified?
PROJECT1.PROC.DEMO
Fully qualified
The organization of files on data media
Files are saved to data media. BS2000 mainframe environments usually include disk storage systems like ETERNUS DX and tape storage systems such as the virtual ETERNUS CS8000 archive system.
ETERNUS CS
ETERNUS DX
The data media within the systems are identified by name in BS2000. These names – the VSN (Volume Serial Number) or the archive number – may be up to six characters in length.
Jedes Pubset enthält einen Benutzerkatalog. Er regelt, welche Benutzer auf einen Pubset zugreifen dürfen. Darin eingetragen sind zudem die Berechtigungen für jeden Benutzer.
Jedes Pubset enthält auch einen Dateikatalog. Jeder Katalogeintrag beschreibt Eigenschaften einer Datei und die Datenträger, auf der die Daten dieser Datei abgelegt sind.
Innerhalb von Disk Storage Systemen und Net-Storage, also Speicherbereichen auf NAS-Systemen, gibt es als gemeinschaftlich markierte Datenträger, so genannte Volumes.
Gemeinschaftliche Volumes werden zu Pubsets zusammengefasst. Jedem Pubset ist eine eigene Katalogkennung, die CATID, zugeordnet, die bis zu vier Zeichen lang sein kann. Beispiel hier: ein Pubset mit drei Volumes.
In dieser Maske wird der Cursor nun zum Paramter SPACE bewegt und anschließend nochmals die Return-Taste gedrückt …
Diese Maske bietet nun die Möglichkeit, das Kommando zu spezifizieren …
Zum Paramter SPACE öffnen sich die Optionen, die angepasst werden können. Der Cursor wird nun beim Paramter SPACE zu RELATIVE bewegt und nochmals die Return-Taste gedrückt.
Im Parameter FILE-NAME wird die Datei INFO angegeben …
Jetzt werden PRIMARY-ALLOCATION und SECONDARY-ALLOCATION angezeigt. Man bewegt den Cursor zu PRIMARY-ALLOCATION und drückt nochmals die Return-Taste.
Nun ist man in der Parameterstruktur des DVS an der richtigen Stelle, um für die Datei INFO den Speicherplatz zu vergrößern.
Für die Datei INFO werden in dieser Maske die entsprechenden Parameter angezeigt. Man bewegt den Cursor zum Parameter SUPPORT, dort zu PUBLIC-DISK() und drückt die Return-Taste
Schritt 1: Eingabe des Kommandos MODIFY-FILE-ATTRIBUTES
Schauen Sie sich am Beispiel des Kommandos MODIFY-FILE-ATTRIBUTES jetzt an, wie einfach man sich durch die Parameterstruktur des DVS hangeln kann. Das Ziel: Für die Datei INFO soll der Speicherplatz, also der Primary oder Secondary Allocator, vergrößert werden.
Working with files in the DMS
CREATE-FILE For making new files
SHOW-FILE-ATTRIBUTES For displaying file attributes
DELETE-FILE For deleting files
Examples with one click
SHOW-FILE For displaying file content
Commands support efficient file management. SDF is the command language in BS2000. SDF is easy to understand – commands are entered in accordance with English sentence structure (verb – object).
COPY-FILE For copying files
As described earlier, the data that is to be processed by programs in BS2000 is compiled in files. When a file is created, it is also assigned storage space. Two important operands are involved when creating or altering files: the Primary Allocator and the Secondary Allocator.
Example with one click
The Primary Allocator determines how much space is assigned to a file.
Secondary Allocation
Primary Allocation
The Secondary Allocator indicates how much space should be added when the primary allotted capacity is completely utilized.
Data processing in the DMS with access methods
Data records
File
Logical block
CLOSE
Users can also process the data from files by means of programs. The DMS provides program interfaces for this purpose that allow for read and write access to data. Data processing is generally performed in three phases.
Processing depends on the structure of the file. The types: SequentialIndexed sequentialDirect access (block-oriented)
PROCESS
OPEN
See details
When a file is being closed, the logical link between the file and the user's application is rescinded, and the file attributes in the catalog are updated.
When a file is being opened, the logical link between the file and the user's application is set up, and all of the information needed for file processing is collected and provided for use.
See illustration
From the user and DMS perspective, the files are comprised of logical blocks which themselves can originate from smaller units and records. A logical block consists of a multiple of 2 KB (2048 bytes) and can range in size up to 32 KB. A logical block can contain many data records with variable or fixed record lengths, whereby the maximum record length must not exceed the size of a logical block.
The data in the files is processed in the memory and not directly on the data media. The transfer of data between the memory and the data media is accomplished through the access methods and their action macros, such as those for reading and writing. There are two types of access methods: block-oriented and record-oriented.
The most important access methods with typical write and read action macros are:
Access method UPAM SAM ISAM
Details
In the record-oriented access method SAM (Sequential Access Method), the logical sequence of the data records is the same as the physical sequence of the data records on the data medium.
Acces type block-oriented record-oriented record-oriented
Action macros PAM READ, PAM WRITE GET, PUT GET, PUT
The block-oriented access method UPAM always transfers whole logical blocks and delivers these to the program for processing.
In the record-oriented access method ISAM (Index Sequential Access Method), the logical sequence is determined by an index according to which the data is stored in a separate management domain.
Overview
Access protection for files
When a file is opened, the protection attributes of the file are checked to see whether a user is permitted to open this file via reading or writing. Depending on the access method, a file can be opened and processed via writing by several users at the same time. In such cases, users must make special settings when opening the file so that the DMS can verify file compatibility.
Protection against unauthorized reading, writing/alteration and deletion of an existing file is ensured by limiting the access rights and access type by specifying a security time period, the use of passwords, etc. Access mechanisms vary in terms of the type and degree of detail used to define the access protection for files. Several protective mechanisms can be used to safeguard files. The strongest specified protective mechanism should be applied to prevent any conflicts.
Standard access control for the protection attributes ACCESS and USER-ACCESSSimple access control list (Basic Access Control List (BACL))Definition of access profiles by means of GUARD (GUARDS is a functionality in the SECOS software product)Stipulation of passwords (read, write and execute)Protection time frames within which a file may not be alteredEncrypted file storage
The DMS offers the following mechanisms to protect files:
Access rights
Encrypted file storage
Access rights (GUARDS)
Protection via time frames
Standard access control (ACCESS/USER-ACCESS)
Simple access control list (BACL)
Protection via password
Each pubset also contains a file catalog. Each catalog entry describes the file attributes and the data media which carry the data for the file.
Each pubset contains a user catalog. The user catalog determines which users are allowed to access a pubset. It contains the authorizations for every user.
According to the principle shown in the diagram, the data is stored on the data media in accordance with unambiguous path names in the DMS. A path name is comprised of a storage location, user ID and the file name.
These shared volumes are gathered together in pubsets. Every pubset is assigned its own catalog identification (CATID), which can be up to four characters long. This example shows a pubset with three volumes.
The disk storage systems and net storage, which are the areas designated for storage in NAS systems, also include so-called volumes, which are data media marked for shared usage.
View the training program offered by the Fujitsu EPS Academy
Introduction to BS2000 mainframes
Organisation von Daten in Dateien
The WBT "Introduction to BS2000 Mainframes" provides a brief overview and covers the advantages of BS2000. This WBT is available here.
Or send us an e-mail
This web-based training (WBT) provides you with insights into the Data Management System (DMS) in BS2000. This WBT covers only one small aspect of this comprehensive tool. Detailed know-how about DMS and other subsystems in the BS2000 mainframe operating system is provided in training offered by the Fujitsu EPS Academy.
Please turn on sound
Duration: approx 20 minutes
Interactive WBT
Titel-Szene
Video zur kurzen Einführung in das Thema (ca. 2 Min.)
Kurzes Video als Round-up zum Thema
Play
Using the command MODIFY-FILE-ATTRIBUTES as an example, see how the operand structure of the DMS functions (alternatively, commands can be entered directly in the line). The objective: The storage space for the INFO file, in other words the Primary or Secondary Allocator, is to be expanded.
The sub-screen of the SUPPORT operand then opens for the INFO file. The user overwrites *UNCHANGED with *PUBLIC-Disk(? and then presses the return key.
Step 1: Enter the command /MODIFY-FILE-ATTRIBUTES?
On this screen the user moves the cursor to the SPACE operand and enters a question mark (?). The sub-screen of SPACE then opens. The user overwrites *UNCHANGED with *RELATIVE(? and again presses the return key.
The user now has the option of specifying the command on the screen. After entering the INFO file name, we move the cursor to the support operand and enter a question mark (?) there.
If the user now enters a question mark (?) for PRIMARY-ALLOCATION and SECONDARY-ALLOCATION, the help screen will appear. Instead of entering a question mark (?), the user can enter a value directly after the operands – in this case, so doing would increase the storage space assigned to the INFO file.