Knowledge (XXG)

Access method

Source 📝

186: 84: 43: 333:
Ease of programming - programmer would no longer deal with a specific device procedures, including error detection and recovery tactics in each and every program. A program designed to process a sequence of 80-character records would work no matter where the data are
378:
Programs can specify the size and number of buffers for a file. The same buffer or pool can be used for multiple files, allowing blocks of data to be read from one file and written to another without requiring data movement in
270:
that enables access to data on disk, tape or other external devices. Access methods were present in several mainframe operating systems since the late 1950s, under a variety of names; the name
340:
Ease shared data set access - an access method is a trusted program, that allows multiple programs to access the same file, while ensuring the basic data integrity and system security.
337:
Ease of hardware replacement - programmer would no longer alter a program when data should be migrated to newer model of storage device, provided it supports the same access methods.
816: 961: 624: 809: 966: 935: 777: 561: 495:
of data and also often read-ahead scheme. Queued access methods generally provide better performance, while basic methods provide more flexibility.
463: 848: 920: 534: 306:(CCWs). Programming those is a complex task requiring detailed knowledge of the hardware characteristics. Channel programs are initiated by a 802: 634: 749: 660: 690: 925: 543: 363:, and different ways of accessing data, such as via record keys. Access methods provide programs a way of dealing with this complexity. 518:(DASD), such as disk drives. In the latter case, a data set written with sequential access can be later processed in a direct manner. 371:
access methods) or allow the operation to be started and the program to continue to run, waiting for the completion at a later time (
195: 587: 246: 228: 167: 70: 650: 680: 930: 894: 552: 548: 435: 889: 884: 614: 426: 417: 956: 879: 408: 404: 105: 101: 56: 148: 899: 869: 594: 444: 120: 590:(IMS) uses the term "access method" to refer to its methods for manipulating "segments in a database record". These are: 515: 644: 604: 323: 28: 127: 874: 511: 399: 32: 20: 94: 670: 360: 24: 199: 480: 298:, a processor dedicated to control peripheral storage device access and data transfer to and from main memory. 134: 843: 367:
Programs can read or write a record or block of data and wait until the input/output operation is complete (
116: 825: 747:
M. A. Auslander, D. C. Larkin, A. L. Scherr: "The Evolution of the MVS Operating System", pages 478-479
608: 904: 492: 457: 453: 853: 746: 264: 206: 62: 701:
This is a different use of the term from the other access methods mentioned in this article.
674: 359:, mainframes offer a variety of data options and formats, such as varying types and sizes of 694: 664: 638: 286:
in non-mainframe operating systems, but typically provide a greater level of functionality.
267: 794: 684: 654: 618: 141: 753: 598: 382:
Programs can specify the type of error recovery to be used in case of input/output errors.
764: 476: 326:) that directs the operating system to issue the START IO on the application's behalf. 950: 294:
System/360 and successor systems perform input/output using a special program for an
283: 487:
access methods read or write one physical record – block – at a time.
210: 343:
Read-ahead - Queued access methods may start as many I/O operations as there are
344: 295: 83: 310:
instruction issued by the operating system. This is usually front ended by the
506:
access assumes that records can be processed only sequentially, as opposed to
282:
for programmers to transfer data to or from device, and could be compared to
355:, where all files and devices are considered to be an unformatted stream of 570: 514:, naturally enforce sequential access, but it can be used as well on 275: 526:
Network-oriented access methods in approximate chronological order:
391:
Storage-oriented access methods in approximate chronological order:
628: 565: 448: 710: 557: 539: 530: 440: 431: 422: 413: 395: 356: 352: 315: 798: 574: 279: 179: 77: 36: 347:
available, anticipating application program requirements.
713:
operating system, two elements provide access methods:
661:
Partitioned Hierarchical Indexed Direct Access Method
691:
Simple Hierarchical Indexed Sequential Access Method
913: 862: 836: 108:. Unsourced material may be challenged and removed. 577:- Transmission Control Protocol/Internet Protocol 318:) macro for application programmer convenience. 16:APIs in IBM mainframe computer operating systems 810: 651:Partitioned Hierarchical Direct Access Method 625:Hierarchical Indexed Sequential Access Method 466:- access methods for distributed file access. 8: 681:Simple Hierarchical Sequential Access Method 278:operating system. Access methods provide an 71:Learn how and when to remove these messages 817: 803: 795: 510:(or random) access. Some devices, such as 209:. Please do not remove this message until 615:Hierarchical Indexed Direct Access Method 247:Learn how and when to remove this message 229:Learn how and when to remove this message 168:Learn how and when to remove this message 766:ABCs of z/OS System Programming Volume 3 562:Virtual telecommunications access method 464:Distributed Data Management Architecture 205:Relevant discussion may be found on the 730: 280:application programming interface (API) 962:Computer-related introductions in 1963 535:Basic telecommunications access method 742: 740: 738: 736: 734: 635:Hierarchical Sequential Access Method 7: 595:Generalized Sequential Access Method 106:adding citations to reliable sources 544:Queued teleprocessing access method 274:was introduced in 1963 in the IBM 14: 645:Overflow sequential access method 605:Hierarchical Direct Access Method 588:IBM Information Management System 52:This article has multiple issues. 553:Telecommunications access method 436:Indexed sequential access method 184: 82: 41: 967:IBM mainframe operating systems 475:Both types of access deal with 427:Basic partitioned access method 418:Queued sequential access method 93:needs additional citations for 60:or discuss these issues on the 409:Basic sequential access method 1: 516:direct access storage devices 460:, introduced in MVS/SP (1989) 445:Virtual storage access method 351:Unlike systems derived from 671:Partitioned Secondary Index 324:supervisor call instruction 211:conditions to do so are met 29:Input/Output Control System 983: 752:November 19, 2008, at the 400:Basic direct access method 33:Record Management Services 21:Record-oriented filesystem 18: 522:Networking access methods 491:methods support internal 290:Purpose of access methods 25:Record (computer science) 778:"Types of IMS databases" 499:Sequential versus direct 329:Access methods provide: 312:Execute Channel Program 705:Modern implementations 387:Storage access methods 957:Computer file systems 826:OS/360 and successors 720:Communications Server 717:Data Facility Product 304:channel command words 458:Object access method 102:improve this article 471:Basic versus queued 263:is a function of a 198:of this article is 564:, introduced with 447:, introduced with 944: 943: 776:IBM Corporation. 257: 256: 249: 239: 238: 231: 178: 177: 170: 152: 75: 974: 819: 812: 805: 796: 789: 788: 786: 784: 773: 767: 762: 756: 744: 375:access methods). 302:are composed of 300:Channel programs 268:operating system 252: 245: 234: 227: 223: 220: 214: 188: 187: 180: 173: 166: 162: 159: 153: 151: 110: 86: 78: 67: 45: 44: 37: 982: 981: 977: 976: 975: 973: 972: 971: 947: 946: 945: 940: 909: 858: 832: 823: 793: 792: 782: 780: 775: 774: 770: 763: 759: 754:Wayback Machine 745: 732: 727: 707: 584: 524: 501: 473: 389: 322:issues an SVC ( 292: 253: 242: 241: 240: 235: 224: 218: 215: 204: 189: 185: 174: 163: 157: 154: 117:"Access method" 111: 109: 99: 87: 46: 42: 35: 17: 12: 11: 5: 980: 978: 970: 969: 964: 959: 949: 948: 942: 941: 939: 938: 933: 928: 923: 917: 915: 911: 910: 908: 907: 902: 897: 892: 887: 882: 877: 872: 866: 864: 860: 859: 857: 856: 851: 846: 840: 838: 834: 833: 830:access methods 824: 822: 821: 814: 807: 799: 791: 790: 768: 757: 729: 728: 726: 723: 722: 721: 718: 706: 703: 699: 698: 688: 678: 668: 658: 648: 642: 632: 622: 612: 602: 583: 580: 579: 578: 568: 555: 546: 537: 523: 520: 500: 497: 472: 469: 468: 467: 461: 451: 438: 429: 420: 411: 402: 388: 385: 384: 383: 380: 376: 349: 348: 341: 338: 335: 291: 288: 284:device drivers 255: 254: 237: 236: 192: 190: 183: 176: 175: 90: 88: 81: 76: 50: 49: 47: 40: 15: 13: 10: 9: 6: 4: 3: 2: 979: 968: 965: 963: 960: 958: 955: 954: 952: 937: 934: 932: 929: 927: 924: 922: 919: 918: 916: 912: 906: 903: 901: 898: 896: 893: 891: 888: 886: 883: 881: 878: 876: 873: 871: 868: 867: 865: 861: 855: 852: 850: 847: 845: 842: 841: 839: 835: 831: 827: 820: 815: 813: 808: 806: 801: 800: 797: 779: 772: 769: 765: 761: 758: 755: 751: 748: 743: 741: 739: 737: 735: 731: 724: 719: 716: 715: 714: 712: 704: 702: 696: 692: 689: 686: 682: 679: 676: 672: 669: 666: 662: 659: 656: 652: 649: 646: 643: 640: 636: 633: 630: 626: 623: 620: 616: 613: 610: 606: 603: 600: 596: 593: 592: 591: 589: 581: 576: 572: 569: 567: 563: 559: 556: 554: 550: 547: 545: 541: 538: 536: 532: 529: 528: 527: 521: 519: 517: 513: 512:magnetic tape 509: 505: 498: 496: 494: 490: 486: 482: 478: 470: 465: 462: 459: 455: 452: 450: 446: 442: 439: 437: 433: 430: 428: 424: 421: 419: 415: 412: 410: 406: 403: 401: 397: 394: 393: 392: 386: 381: 377: 374: 370: 366: 365: 364: 362: 358: 354: 346: 342: 339: 336: 332: 331: 330: 327: 325: 321: 317: 313: 309: 305: 301: 297: 289: 287: 285: 281: 277: 273: 272:access method 269: 266: 262: 261:access method 251: 248: 233: 230: 222: 212: 208: 202: 201: 197: 191: 182: 181: 172: 169: 161: 150: 147: 143: 140: 136: 133: 129: 126: 122: 119: –  118: 114: 113:Find sources: 107: 103: 97: 96: 91:This article 89: 85: 80: 79: 74: 72: 65: 64: 59: 58: 53: 48: 39: 38: 34: 30: 26: 22: 829: 783:September 4, 781:. Retrieved 771: 760: 708: 700: 585: 525: 507: 503: 502: 488: 484: 474: 390: 372: 368: 350: 328: 319: 311: 307: 303: 299: 293: 271: 260: 258: 243: 225: 216: 194: 164: 155: 145: 138: 131: 124: 112: 100:Please help 95:verification 92: 68: 61: 55: 54:Please help 51: 296:I/O channel 158:August 2012 951:Categories 725:References 504:Sequential 196:neutrality 128:newspapers 57:improve it 19:See also: 837:Low-level 265:mainframe 219:July 2020 207:talk page 63:talk page 750:Archived 493:blocking 481:data set 308:START IO 200:disputed 914:Network 863:Storage 854:STARTIO 709:In the 675:PSIMDEX 647:(OSAM), 477:records 379:memory. 361:records 345:buffers 334:stored. 142:scholar 849:EXCPVR 695:SHISAM 687:), and 665:PHIDAM 571:TCP/IP 508:direct 489:Queued 369:queued 276:OS/360 144:  137:  130:  123:  115:  31:, and 685:SHSAM 655:PHDAM 629:HISAM 619:HIDAM 566:OS/VS 485:Basic 479:of a 449:OS/VS 373:basic 357:bytes 149:JSTOR 135:books 936:VTAM 931:TCAM 926:QTAM 921:BTAM 900:VSAM 895:ISAM 890:BPAM 885:QSAM 880:BSAM 875:BDAM 870:XDAP 844:EXCP 828:I/O 785:2011 711:z/OS 639:HSAM 609:HDAM 599:GSAM 586:The 573:for 558:VTAM 549:TCAM 540:QTAM 531:BTAM 441:VSAM 432:ISAM 423:BPAM 414:QSAM 405:BSAM 396:BDAM 353:Unix 320:EXCP 316:EXCP 193:The 121:news 905:OAM 582:IMS 575:MVS 454:OAM 259:An 104:by 953:: 733:^ 697:). 677:), 667:), 657:), 641:), 631:), 621:), 611:), 601:), 560:- 551:- 542:- 533:- 483:. 456:- 443:- 434:- 425:- 416:- 407:- 398:- 66:. 27:, 23:, 818:e 811:t 804:v 787:. 693:( 683:( 673:( 663:( 653:( 637:( 627:( 617:( 607:( 597:( 314:( 250:) 244:( 232:) 226:( 221:) 217:( 213:. 203:. 171:) 165:( 160:) 156:( 146:· 139:· 132:· 125:· 98:. 73:) 69:(

Index

Record-oriented filesystem
Record (computer science)
Input/Output Control System
Record Management Services
improve it
talk page
Learn how and when to remove these messages

verification
improve this article
adding citations to reliable sources
"Access method"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
neutrality
disputed
talk page
conditions to do so are met
Learn how and when to remove this message
Learn how and when to remove this message
mainframe
operating system
OS/360
application programming interface (API)
device drivers
I/O channel

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.