TurboIMAGE/XL Database Management System Reference Manual (30391-90012)
Table Of Contents
- 1 Introduction
- 2 Database Structure and Protection
- 3 Defining a Database
- 4 Using the Database
- 5 TurboIMAGE/XL Library Procedures
- Using TurboIMAGE/XL Intrinsics
- DBBEGIN
- DBCLOSE
- DBCONTROL
- DBDELETE
- DBEND
- DBERROR
- DBEXPLAIN
- DBFIND
- DBGET
- DBINFO
- INTRINSIC NUMBER 402
- Syntax
- Parameters
- Discussion
- Mode 101: Item Number
- Mode 102: Item Name
- Mode 103: Items in Database
- Mode 104: Items in Data Set
- Mode 113: BTREEMODE1 and Wildcard Character
- Mode 201: Set Number
- Mode 202: Set Name
- Mode 203: Sets in Database
- Mode 204: Sets with Item
- Mode 205: Set Capacity
- Mode 206: Number of Data Set Chunks
- Mode 207: Size of Data Set Chunks
- Mode 208: Primary and Actual Capacity
- Mode 209: B-Tree Attachment
- Mode 301: Paths
- Mode 302: Key or Search Item
- Mode 401: Logging
- Mode 402: ILR
- Mode 403: Dynamic Roll-Back
- Mode 404: Logging Subsystem Information
- Mode 406: Database Information
- Mode 501: Subsystem Access
- Mode 502: Critical Item Update
- Modes 8nn: Third-Party Indexing
- Mode 901: Language
- DBLOCK
- DBMEMO
- DBOPEN
- DBPUT
- DBUNLOCK
- DBUPDATE
- DBXBEGIN
- DBXEND
- DBXUNDO
- 6 Host Language Access
- Model Program
- ORDERS Database Model Program
- Main Body of Program
- Opening the Database
- Retrieving All the Records on a Chain (with Item Level Locking)
- Retrieving a Data Entry Using a Record Number
- Retrieving Master Data Using a Key Value
- Retrieving Data Serially (with Set Level Locking)
- Adding an Entry
- Updating an Entry
- Deleting an Entry
- Rewinding a Data Set
- Obtaining Database Information
- Obtaining Error Messages and Explanations
- Closing the Database
- C
- COBOL II
- Defining Data Types, Variables, and Intrinsics
- Main Body of Program
- Opening the Database
- Retrieving All the Records on a Chain (with Item Level Locking)
- Retrieving a Data Entry Using a Record Number
- Retrieving Master Data Using a Key Value
- Retrieving Data Serially (with Set Level Locking)
- Adding an Entry
- Updating an Entry
- Deleting an Entry
- Rewinding a Data Set
- Obtaining Database Information
- Obtaining Error Messages and Explanations
- Closing the Database
- FORTRAN 77
- Pascal
- RPG
- 7 Logging and Recovery
- Database Utilities Used in Logging and Recovery
- Recovery Options
- Logical Transactions
- Dynamic Roll-Back Recovery
- Intrinsic Level Recovery
- Logging Preparation
- Step 1--Checking MPE/iX Logging Configuration
- Step 2--Acquiring Logging Capability
- Step 3--Logging to Tape or Disk
- Step 4--Building a Log File for Logging to Disk
- Step 5--Creating the Log Identifier
- Step 6--Setting the Log Identifier
- Step 7--Setting Flags for the Database Backup Copy
- Step 8--Making a Database Backup Copy
- TurboSTORE/iX 7x24 True-Online Backup
- Logging Status
- Logging Maintenance
- Roll-Forward Recovery
- Roll-Back Recovery
- DBRECOV Commands Used with Roll-Forward and Roll-Back Recovery
- Recovery Tables
- Post-Recovery Options
- The Mirror Database
- 8 Using the Database Utilities
- Restructuring the Database with TurboIMAGE/XL Utilities
- Summary of Utility Routines
- Utility Program Operation
- DBLOAD
- DBRECOV
- >CONTROL
- >EXIT
- >FILE
- >RECOVER
- >ROLLBACK
- >RUN
- DBRESTOR
- DBSTORE
- DBUNLOAD
- DBUTIL
- >>ACTIVATE
- >>ADDINDEX
- >>CREATE
- >>DEACTIVATE
- >>DETACH
- >>DISABLE
- >>DROPINDEX
- >>ENABLE
- >>ERASE
- >>EXIT
- >>HELP
- >>MOVE
- >>PURGE
- >>REBUILDINDEX
- >>REDO
- >>RELEASE
- >>SECURE
- >>SET
- >>SHOW
- Syntax
- Parameters
- Example (Show Users)
- Example Discussion
- Example (Show All)
- Example Discussion
- Example (Show Capacity)
- Format of Show Device List
- Example (Show Device)
- Format of Show Indices
- Example (Show Indices)
- Format of Show Locks List
- Example 1 (Show Locks)
- Example 1 Discussion
- Example 2 (Show Locks)
- Example 2 Discussion
- >>VERIFY
- 9 Using a Remote Database
- 10 Internal Structures and Techniques
- 11 B-Tree Indices
- A Error Messages
- B Results of Multiple Access
- C Database Design Considerations
- D Multiple Calls to DBLOCK
- E TurboIMAGE/XL Log Record Formats
- F MPE/iX Log Record Formats
- G Recovery and Logging Quick Reference
- H TurboIMAGE/XL versus TurboIMAGE/V

Chapter 4 121
Using the Database
Using the Locking Facility
entries. At system design time, a compromise must be made between the benefits of
low-level locking and the extra programming effort required.
Data entry locking should give the best concurrency; however, there are situations in
which the extra programming effort for data entry locking is not worthwhile. Concurrency
is least optimum at the higher level of the lock. Concurrency and programming effort
should be considered; some other considerations that could affect your choice of locking
level are discussed below.
Locking at the Same Level
All programs concurrently accessing a database should lock at the same level most of the
time. For example, one process locking a data set will hold up all other processes that are
attempting to lock entries in that set. Therefore, the attempt by the process locking at the
data entry level to allow other processes to share the database is nullified by the process
locking at the data set level and the effect is as if all processes were locking at the data set
level. The rule of locking at the same level can be violated for infrequent operations such
as exception handling or rare transactions.
Length of Transactions
Generally, the longer the lock is to be held, the lower the level it should be. In other words,
if you are performing lengthy transactions, you should probably lock at the entry level. For
shorter transactions, you can use locks at either the database or data set level with
satisfactory results.
An extreme case of a long transaction is one in which user dialog takes place while a lock is
held. For example, a program can read some data entries, interact with a terminal
operator, and modify some or all of the entries. A lock to cover this transaction can last
several minutes which is an unacceptable amount of time to stop all database or data set
activity. In this situation, data entry level locking should be used.
Because the length of different transactions varies, the longest transaction (that is also
frequently used) should guide the choice of locking level.
Locking During User Dialog
In the situation described above, where a lock is held during interactive dialog with a
terminal operator, the terminal time-out feature of MPE/iX can be used to avoid having the
locked entity inaccessible when the terminal operator is interrupted in the middle of the
dialog. The time-out feature can be used to cause the terminal read to terminate
automatically if no response is received within a certain time period. Refer to the
discussion of "FCONTROL" in the MPE/iX Intrinsics Manual.
Strong Locking and Dynamic Transactions
Dynamic transactions, which are described later in this chapter, are only allowed with a
database access mode that enforces locking, because strong locking is required for this type
of transaction. TurboIMAGE/XL requires that dynamic transactions be independent of all
other types of transactions. This is guaranteed when the database access mode is 3 or 4,
because the mode guarantees exclusive modify access.
When a database is opened in access mode 1, the programmer must ensure that strong
locks are in place. In other words, any call to DBUNLOCK must occur after the call to DBXEND,