Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Access method

From Wikipedia, the free encyclopedia
APIs in IBM mainframe computer operating systems
See also:Record-oriented filesystem,Record (computer science),Input/Output Control System, andRecord Management Services
This article has multiple issues. Please helpimprove it or discuss these issues on thetalk page.(Learn how and when to remove these messages)
This articleneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "Access method" – news ·newspapers ·books ·scholar ·JSTOR
(August 2012) (Learn how and when to remove this message)
Theneutrality of this article isdisputed. Relevant discussion may be found on thetalk page. Please do not remove this message untilconditions to do so are met.(July 2020) (Learn how and when to remove this message)
(Learn how and when to remove this message)

Anaccess method is a function of amainframeoperating system that enables access to data on disk, tape or other external devices. Access methods were present in several mainframe operating systems since the late 1950s, under a variety of names; the nameaccess method was introduced in 1963 in the IBMOS/360 operating system.[1] Access methods provide anapplication programming interface (API) for programmers to transfer data to or from device, and could be compared todevice drivers in non-mainframe operating systems, but typically provide a greater level of functionality.

Purpose of access methods

[edit]

System/360 and successor systems perform input/output using a special program for anI/O channel, a processor dedicated to control peripheral storage device access and data transfer to and from main memory.Channel programs are composed ofchannel command words (CCWs). Programming those is a complex task requiring detailed knowledge of the hardware characteristics. Channel programs are initiated by aSTART IO instruction issued by the operating system. This is usually front ended by theExecute Channel Program (EXCP) macro for application programmer convenience.EXCP issues an SVC (supervisor call instruction) that directs the operating system to issue the START IO on the application's behalf.[2]

Access methods provide:

  • Ease of programming - programmer would no longer deal with a specific device procedures, including error detection and recovery tactics in each and every program. A program designed to process a sequence of 80-character records would work no matter where the data are stored.[1]
  • Ease of hardware replacement - programmer would no longer alter a program when data should be migrated to newer model of storage device, provided it supports the same access methods.[1]
  • Ease shared data set access - an access method is a trusted program, that allows multiple programs to access the same file, while ensuring the basic data integrity and system security.[1]
  • Read-ahead - Queued access methods may start as many I/O operations as there arebuffers available, anticipating application program requirements.

Unlike systems derived fromUnix, where all files and devices are considered to be an unformatted stream ofbytes, mainframes offer a variety of data options and formats, such as varying types and sizes ofrecords, and different ways of accessing data, such as via record keys. Access methods provide programs a way of dealing with this complexity.

  • Programs can read or write a record or block of data and wait until the input/output operation is complete (queued access methods) or allow the operation to be started and the program to continue to run, waiting for the completion at a later time (basic access methods).
  • Programs can specify the size and number of buffers for a file. The same buffer or pool can be used for multiple files, allowing blocks of data to be read from one file and written to another without requiring data movement in memory.
  • Programs can specify the type of error recovery to be used in case of input/output errors.

Storage access methods

[edit]

Storage-oriented access methods in approximate chronological order:

Basic versus queued

[edit]

Both types of access deal withrecords of adata set.Basic access methods read or write one physical record – block – at a time.Queued methods support internalblocking of data and also often read-ahead scheme.[1] Queued access methods generally provide better performance, while basic methods provide more flexibility.

Sequential versus direct

[edit]

Sequential access assumes that records can be processed only sequentially, as opposed todirect (or random) access. Some devices, such asmagnetic tape, naturally enforce sequential access, but it can be used as well ondirect access storage devices (DASD), such as disk drives. In the latter case, a data set written with sequential access can be later processed in a direct manner.

Networking access methods

[edit]

Network-oriented access methods in approximate chronological order:

IMS

[edit]

TheIBM Information Management System (IMS) uses the term "access method" to refer to its methods for manipulating "segments in a database record". These are:

This is a different use of the term from the other access methods mentioned in this article.

Modern implementations

[edit]

In thez/OS operating system, two elements provide access methods:

  • Data Facility Product
  • Communications Server

References

[edit]
  1. ^abcdeM. A. Auslander, D. C. Larkin, A. L. Scherr: "The Evolution of the MVS Operating System", pages 478-479Archived November 19, 2008, at theWayback Machine
  2. ^[1] ABCs of z/OS System Programming Volume 3
  3. ^IBM Corporation."Types of IMS databases". RetrievedSeptember 4, 2011.
Low-level
Storage
Network
Retrieved from "https://en.wikipedia.org/w/index.php?title=Access_method&oldid=1218895465"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp