186:
84:
43:
333:
Ease of programming - programmer would no longer deal with a specific device procedures, including error detection and recovery tactics in each and every program. A program designed to process a sequence of 80-character records would work no matter where the data are
378:
Programs can specify the size and number of buffers for a file. The same buffer or pool can be used for multiple files, allowing blocks of data to be read from one file and written to another without requiring data movement in
270:
that enables access to data on disk, tape or other external devices. Access methods were present in several mainframe operating systems since the late 1950s, under a variety of names; the name
340:
Ease shared data set access - an access method is a trusted program, that allows multiple programs to access the same file, while ensuring the basic data integrity and system security.
337:
Ease of hardware replacement - programmer would no longer alter a program when data should be migrated to newer model of storage device, provided it supports the same access methods.
816:
961:
624:
809:
966:
935:
777:
561:
495:
of data and also often read-ahead scheme. Queued access methods generally provide better performance, while basic methods provide more flexibility.
463:
848:
920:
534:
306:(CCWs). Programming those is a complex task requiring detailed knowledge of the hardware characteristics. Channel programs are initiated by a
802:
634:
749:
660:
690:
925:
543:
363:, and different ways of accessing data, such as via record keys. Access methods provide programs a way of dealing with this complexity.
518:(DASD), such as disk drives. In the latter case, a data set written with sequential access can be later processed in a direct manner.
371:
access methods) or allow the operation to be started and the program to continue to run, waiting for the completion at a later time (
195:
587:
246:
228:
167:
70:
650:
680:
930:
894:
552:
548:
435:
889:
884:
614:
426:
417:
956:
879:
408:
404:
105:
101:
56:
148:
899:
869:
594:
444:
120:
590:(IMS) uses the term "access method" to refer to its methods for manipulating "segments in a database record". These are:
515:
644:
604:
323:
28:
127:
874:
511:
399:
32:
20:
94:
670:
360:
24:
199:
480:
298:, a processor dedicated to control peripheral storage device access and data transfer to and from main memory.
134:
843:
367:
Programs can read or write a record or block of data and wait until the input/output operation is complete (
116:
825:
747:
M. A. Auslander, D. C. Larkin, A. L. Scherr: "The
Evolution of the MVS Operating System", pages 478-479
608:
904:
492:
457:
453:
853:
746:
264:
206:
62:
701:
This is a different use of the term from the other access methods mentioned in this article.
674:
359:, mainframes offer a variety of data options and formats, such as varying types and sizes of
694:
664:
638:
286:
in non-mainframe operating systems, but typically provide a greater level of functionality.
267:
794:
684:
654:
618:
141:
753:
598:
382:
Programs can specify the type of error recovery to be used in case of input/output errors.
764:
476:
326:) that directs the operating system to issue the START IO on the application's behalf.
950:
294:
System/360 and successor systems perform input/output using a special program for an
283:
487:
access methods read or write one physical record – block – at a time.
210:
343:
Read-ahead - Queued access methods may start as many I/O operations as there are
344:
295:
83:
310:
instruction issued by the operating system. This is usually front ended by the
506:
access assumes that records can be processed only sequentially, as opposed to
282:
for programmers to transfer data to or from device, and could be compared to
355:, where all files and devices are considered to be an unformatted stream of
570:
514:, naturally enforce sequential access, but it can be used as well on
275:
526:
Network-oriented access methods in approximate chronological order:
391:
Storage-oriented access methods in approximate chronological order:
628:
565:
448:
710:
557:
539:
530:
440:
431:
422:
413:
395:
356:
352:
315:
798:
574:
279:
179:
77:
36:
347:
available, anticipating application program requirements.
713:
operating system, two elements provide access methods:
661:
691:
913:
862:
836:
108:. Unsourced material may be challenged and removed.
577:- Transmission Control Protocol/Internet Protocol
318:) macro for application programmer convenience.
16:APIs in IBM mainframe computer operating systems
810:
651:Partitioned Hierarchical Direct Access Method
625:Hierarchical Indexed Sequential Access Method
466:- access methods for distributed file access.
8:
681:Simple Hierarchical Sequential Access Method
278:operating system. Access methods provide an
71:Learn how and when to remove these messages
817:
803:
795:
510:(or random) access. Some devices, such as
209:. Please do not remove this message until
615:Hierarchical Indexed Direct Access Method
247:Learn how and when to remove this message
229:Learn how and when to remove this message
168:Learn how and when to remove this message
766:ABCs of z/OS System Programming Volume 3
562:Virtual telecommunications access method
464:Distributed Data Management Architecture
205:Relevant discussion may be found on the
730:
280:application programming interface (API)
962:Computer-related introductions in 1963
535:Basic telecommunications access method
742:
740:
738:
736:
734:
635:Hierarchical Sequential Access Method
7:
595:Generalized Sequential Access Method
106:adding citations to reliable sources
544:Queued teleprocessing access method
274:was introduced in 1963 in the IBM
14:
645:Overflow sequential access method
605:Hierarchical Direct Access Method
588:IBM Information Management System
52:This article has multiple issues.
553:Telecommunications access method
436:Indexed sequential access method
184:
82:
41:
967:IBM mainframe operating systems
475:Both types of access deal with
427:Basic partitioned access method
418:Queued sequential access method
93:needs additional citations for
60:or discuss these issues on the
409:Basic sequential access method
1:
516:direct access storage devices
460:, introduced in MVS/SP (1989)
445:Virtual storage access method
351:Unlike systems derived from
671:Partitioned Secondary Index
324:supervisor call instruction
211:conditions to do so are met
29:Input/Output Control System
983:
752:November 19, 2008, at the
400:Basic direct access method
33:Record Management Services
21:Record-oriented filesystem
18:
522:Networking access methods
491:methods support internal
290:Purpose of access methods
25:Record (computer science)
778:"Types of IMS databases"
499:Sequential versus direct
329:Access methods provide:
312:Execute Channel Program
705:Modern implementations
387:Storage access methods
957:Computer file systems
826:OS/360 and successors
720:Communications Server
717:Data Facility Product
304:channel command words
458:Object access method
102:improve this article
471:Basic versus queued
263:is a function of a
198:of this article is
564:, introduced with
447:, introduced with
944:
943:
776:IBM Corporation.
257:
256:
249:
239:
238:
231:
178:
177:
170:
152:
75:
974:
819:
812:
805:
796:
789:
788:
786:
784:
773:
767:
762:
756:
744:
375:access methods).
302:are composed of
300:Channel programs
268:operating system
252:
245:
234:
227:
223:
220:
214:
188:
187:
180:
173:
166:
162:
159:
153:
151:
110:
86:
78:
67:
45:
44:
37:
982:
981:
977:
976:
975:
973:
972:
971:
947:
946:
945:
940:
909:
858:
832:
823:
793:
792:
782:
780:
775:
774:
770:
763:
759:
754:Wayback Machine
745:
732:
727:
707:
584:
524:
501:
473:
389:
322:issues an SVC (
292:
253:
242:
241:
240:
235:
224:
218:
215:
204:
189:
185:
174:
163:
157:
154:
117:"Access method"
111:
109:
99:
87:
46:
42:
35:
17:
12:
11:
5:
980:
978:
970:
969:
964:
959:
949:
948:
942:
941:
939:
938:
933:
928:
923:
917:
915:
911:
910:
908:
907:
902:
897:
892:
887:
882:
877:
872:
866:
864:
860:
859:
857:
856:
851:
846:
840:
838:
834:
833:
830:access methods
824:
822:
821:
814:
807:
799:
791:
790:
768:
757:
729:
728:
726:
723:
722:
721:
718:
706:
703:
699:
698:
688:
678:
668:
658:
648:
642:
632:
622:
612:
602:
583:
580:
579:
578:
568:
555:
546:
537:
523:
520:
500:
497:
472:
469:
468:
467:
461:
451:
438:
429:
420:
411:
402:
388:
385:
384:
383:
380:
376:
349:
348:
341:
338:
335:
291:
288:
284:device drivers
255:
254:
237:
236:
192:
190:
183:
176:
175:
90:
88:
81:
76:
50:
49:
47:
40:
15:
13:
10:
9:
6:
4:
3:
2:
979:
968:
965:
963:
960:
958:
955:
954:
952:
937:
934:
932:
929:
927:
924:
922:
919:
918:
916:
912:
906:
903:
901:
898:
896:
893:
891:
888:
886:
883:
881:
878:
876:
873:
871:
868:
867:
865:
861:
855:
852:
850:
847:
845:
842:
841:
839:
835:
831:
827:
820:
815:
813:
808:
806:
801:
800:
797:
779:
772:
769:
765:
761:
758:
755:
751:
748:
743:
741:
739:
737:
735:
731:
724:
719:
716:
715:
714:
712:
704:
702:
696:
692:
689:
686:
682:
679:
676:
672:
669:
666:
662:
659:
656:
652:
649:
646:
643:
640:
636:
633:
630:
626:
623:
620:
616:
613:
610:
606:
603:
600:
596:
593:
592:
591:
589:
581:
576:
572:
569:
567:
563:
559:
556:
554:
550:
547:
545:
541:
538:
536:
532:
529:
528:
527:
521:
519:
517:
513:
512:magnetic tape
509:
505:
498:
496:
494:
490:
486:
482:
478:
470:
465:
462:
459:
455:
452:
450:
446:
442:
439:
437:
433:
430:
428:
424:
421:
419:
415:
412:
410:
406:
403:
401:
397:
394:
393:
392:
386:
381:
377:
374:
370:
366:
365:
364:
362:
358:
354:
346:
342:
339:
336:
332:
331:
330:
327:
325:
321:
317:
313:
309:
305:
301:
297:
289:
287:
285:
281:
277:
273:
272:access method
269:
266:
262:
261:access method
251:
248:
233:
230:
222:
212:
208:
202:
201:
197:
191:
182:
181:
172:
169:
161:
150:
147:
143:
140:
136:
133:
129:
126:
122:
119: –
118:
114:
113:Find sources:
107:
103:
97:
96:
91:This article
89:
85:
80:
79:
74:
72:
65:
64:
59:
58:
53:
48:
39:
38:
34:
30:
26:
22:
829:
783:September 4,
781:. Retrieved
771:
760:
708:
700:
585:
525:
507:
503:
502:
488:
484:
474:
390:
372:
368:
350:
328:
319:
311:
307:
303:
299:
293:
271:
260:
258:
243:
225:
216:
194:
164:
155:
145:
138:
131:
124:
112:
100:Please help
95:verification
92:
68:
61:
55:
54:Please help
51:
296:I/O channel
158:August 2012
951:Categories
725:References
504:Sequential
196:neutrality
128:newspapers
57:improve it
19:See also:
837:Low-level
265:mainframe
219:July 2020
207:talk page
63:talk page
750:Archived
493:blocking
481:data set
308:START IO
200:disputed
914:Network
863:Storage
854:STARTIO
709:In the
675:PSIMDEX
647:(OSAM),
477:records
379:memory.
361:records
345:buffers
334:stored.
142:scholar
849:EXCPVR
695:SHISAM
687:), and
665:PHIDAM
571:TCP/IP
508:direct
489:Queued
369:queued
276:OS/360
144:
137:
130:
123:
115:
31:, and
685:SHSAM
655:PHDAM
629:HISAM
619:HIDAM
566:OS/VS
485:Basic
479:of a
449:OS/VS
373:basic
357:bytes
149:JSTOR
135:books
936:VTAM
931:TCAM
926:QTAM
921:BTAM
900:VSAM
895:ISAM
890:BPAM
885:QSAM
880:BSAM
875:BDAM
870:XDAP
844:EXCP
828:I/O
785:2011
711:z/OS
639:HSAM
609:HDAM
599:GSAM
586:The
573:for
558:VTAM
549:TCAM
540:QTAM
531:BTAM
441:VSAM
432:ISAM
423:BPAM
414:QSAM
405:BSAM
396:BDAM
353:Unix
320:EXCP
316:EXCP
193:The
121:news
905:OAM
582:IMS
575:MVS
454:OAM
259:An
104:by
953::
733:^
697:).
677:),
667:),
657:),
641:),
631:),
621:),
611:),
601:),
560:-
551:-
542:-
533:-
483:.
456:-
443:-
434:-
425:-
416:-
407:-
398:-
66:.
27:,
23:,
818:e
811:t
804:v
787:.
693:(
683:(
673:(
663:(
653:(
637:(
627:(
617:(
607:(
597:(
314:(
250:)
244:(
232:)
226:(
221:)
217:(
213:.
203:.
171:)
165:(
160:)
156:(
146:·
139:·
132:·
125:·
98:.
73:)
69:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.