TurboIMAGE/XL Database Management System Reference Manual (30391-90012)
Table Of Contents
- 1 Introduction
- 2 Database Structure and Protection
- 3 Defining a Database
- 4 Using the Database
- 5 TurboIMAGE/XL Library Procedures
- Using TurboIMAGE/XL Intrinsics
- DBBEGIN
- DBCLOSE
- DBCONTROL
- DBDELETE
- DBEND
- DBERROR
- DBEXPLAIN
- DBFIND
- DBGET
- DBINFO
- INTRINSIC NUMBER 402
- Syntax
- Parameters
- Discussion
- Mode 101: Item Number
- Mode 102: Item Name
- Mode 103: Items in Database
- Mode 104: Items in Data Set
- Mode 113: BTREEMODE1 and Wildcard Character
- Mode 201: Set Number
- Mode 202: Set Name
- Mode 203: Sets in Database
- Mode 204: Sets with Item
- Mode 205: Set Capacity
- Mode 206: Number of Data Set Chunks
- Mode 207: Size of Data Set Chunks
- Mode 208: Primary and Actual Capacity
- Mode 209: B-Tree Attachment
- Mode 301: Paths
- Mode 302: Key or Search Item
- Mode 401: Logging
- Mode 402: ILR
- Mode 403: Dynamic Roll-Back
- Mode 404: Logging Subsystem Information
- Mode 406: Database Information
- Mode 501: Subsystem Access
- Mode 502: Critical Item Update
- Modes 8nn: Third-Party Indexing
- Mode 901: Language
- DBLOCK
- DBMEMO
- DBOPEN
- DBPUT
- DBUNLOCK
- DBUPDATE
- DBXBEGIN
- DBXEND
- DBXUNDO
- 6 Host Language Access
- Model Program
- ORDERS Database Model Program
- Main Body of Program
- Opening the Database
- Retrieving All the Records on a Chain (with Item Level Locking)
- Retrieving a Data Entry Using a Record Number
- Retrieving Master Data Using a Key Value
- Retrieving Data Serially (with Set Level Locking)
- Adding an Entry
- Updating an Entry
- Deleting an Entry
- Rewinding a Data Set
- Obtaining Database Information
- Obtaining Error Messages and Explanations
- Closing the Database
- C
- COBOL II
- Defining Data Types, Variables, and Intrinsics
- Main Body of Program
- Opening the Database
- Retrieving All the Records on a Chain (with Item Level Locking)
- Retrieving a Data Entry Using a Record Number
- Retrieving Master Data Using a Key Value
- Retrieving Data Serially (with Set Level Locking)
- Adding an Entry
- Updating an Entry
- Deleting an Entry
- Rewinding a Data Set
- Obtaining Database Information
- Obtaining Error Messages and Explanations
- Closing the Database
- FORTRAN 77
- Pascal
- RPG
- 7 Logging and Recovery
- Database Utilities Used in Logging and Recovery
- Recovery Options
- Logical Transactions
- Dynamic Roll-Back Recovery
- Intrinsic Level Recovery
- Logging Preparation
- Step 1--Checking MPE/iX Logging Configuration
- Step 2--Acquiring Logging Capability
- Step 3--Logging to Tape or Disk
- Step 4--Building a Log File for Logging to Disk
- Step 5--Creating the Log Identifier
- Step 6--Setting the Log Identifier
- Step 7--Setting Flags for the Database Backup Copy
- Step 8--Making a Database Backup Copy
- TurboSTORE/iX 7x24 True-Online Backup
- Logging Status
- Logging Maintenance
- Roll-Forward Recovery
- Roll-Back Recovery
- DBRECOV Commands Used with Roll-Forward and Roll-Back Recovery
- Recovery Tables
- Post-Recovery Options
- The Mirror Database
- 8 Using the Database Utilities
- Restructuring the Database with TurboIMAGE/XL Utilities
- Summary of Utility Routines
- Utility Program Operation
- DBLOAD
- DBRECOV
- >CONTROL
- >EXIT
- >FILE
- >RECOVER
- >ROLLBACK
- >RUN
- DBRESTOR
- DBSTORE
- DBUNLOAD
- DBUTIL
- >>ACTIVATE
- >>ADDINDEX
- >>CREATE
- >>DEACTIVATE
- >>DETACH
- >>DISABLE
- >>DROPINDEX
- >>ENABLE
- >>ERASE
- >>EXIT
- >>HELP
- >>MOVE
- >>PURGE
- >>REBUILDINDEX
- >>REDO
- >>RELEASE
- >>SECURE
- >>SET
- >>SHOW
- Syntax
- Parameters
- Example (Show Users)
- Example Discussion
- Example (Show All)
- Example Discussion
- Example (Show Capacity)
- Format of Show Device List
- Example (Show Device)
- Format of Show Indices
- Example (Show Indices)
- Format of Show Locks List
- Example 1 (Show Locks)
- Example 1 Discussion
- Example 2 (Show Locks)
- Example 2 Discussion
- >>VERIFY
- 9 Using a Remote Database
- 10 Internal Structures and Techniques
- 11 B-Tree Indices
- A Error Messages
- B Results of Multiple Access
- C Database Design Considerations
- D Multiple Calls to DBLOCK
- E TurboIMAGE/XL Log Record Formats
- F MPE/iX Log Record Formats
- G Recovery and Logging Quick Reference
- H TurboIMAGE/XL versus TurboIMAGE/V

Figures
19
Figure 1-1.. How to Use TurboIMAGE/XL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Figure 2-1.. CUSTOMER Data Set Sample. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Figure 2-2.. Master and Detail Data Set Relationships . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Figure 2-3.. Master and Detail Data Sets Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Figure 2-4.. Adding Entries to a Sorted Chain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Figure 2-5.. ORDERS Data Sets and Paths. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Figure 2-6.. A Sample Entry for Each Data Set in the ORDERS Database . . . . . . . . . . . 47
Figure 2-7.. Granting Capability to User Class 11 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Figure 2-8.. Security Flowchart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Figure 3-1.. Database Definition Process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Figure 3-2.. Sample Schema Creation Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Figure 3-3.. Schema Processor Batch Job Stream. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Figure 3-4.. Data Set Summary Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Figure 3-5.. ORDERS Database Schema ORDERS Database Schema . . . . . . . . . . . . . . . 89
Figure 4-1.. Sample Data Entries from ORDERS Database. . . . . . . . . . . . . . . . . . . . . . . 103
Figure 4-2.. Reading Access Methods (DBGET Procedure) . . . . . . . . . . . . . . . . . . . . . . . 106
Figure 4-3.. Lock Descriptor List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Figure 5-1.. Sample DBEXPLAIN Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Figure 5-2.. Qualifier Array Format for Locking Modes 5 and 6 . . . . . . . . . . . . . . . . . . . 209
Figure 5-3.. Lock Descriptor Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Figure 5-4.. Lock Descriptor Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Figure 6-1.. ORDERS Database Schema Listing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Figure 7-1.. Transactions and Transaction Blocks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
Figure 7-2.. Suppression of Transactions Due to Inadequate Locking. . . . . . . . . . . . . . . 318
Figure 7-3.. Transferring Log Files to the Secondary System . . . . . . . . . . . . . . . . . . . . . 367
Figure 8-1.. DBUNLOAD File: Sequence of Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418
Figure 9-1.. Using a Remote Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Figure 9-2.. Using Method 1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466
Figure 9-3.. Using Method 2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
Figure 9-4.. Using Method 3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468
Figure 9-5.. Preparing a Database-Access File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
Figure 9-6.. Using a Database-Access File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
Figure 10-1.. Media Record for Detail Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Figure 10-2.. Media Record for Primary Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Figure 10-3.. Media Record for Secondary Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Figure 10-4.. Block with Blocking Factor of Four . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Figure 10-5.. Independent Sub-Databases for Concurrency. . . . . . . . . . . . . . . . . . . . . . . 485
Figure B-1.. Actions Resulting from Multiple Access of Databases . . . . . . . . . . . . . . . . . 650
Figure C-1.. Selected Prime Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 653