TurboIMAGE/XL Database Management System Reference Manual (30391-90012)
Table Of Contents
- 1 Introduction
- 2 Database Structure and Protection
- 3 Defining a Database
- 4 Using the Database
- 5 TurboIMAGE/XL Library Procedures
- Using TurboIMAGE/XL Intrinsics
- DBBEGIN
- DBCLOSE
- DBCONTROL
- DBDELETE
- DBEND
- DBERROR
- DBEXPLAIN
- DBFIND
- DBGET
- DBINFO
- INTRINSIC NUMBER 402
- Syntax
- Parameters
- Discussion
- Mode 101: Item Number
- Mode 102: Item Name
- Mode 103: Items in Database
- Mode 104: Items in Data Set
- Mode 113: BTREEMODE1 and Wildcard Character
- Mode 201: Set Number
- Mode 202: Set Name
- Mode 203: Sets in Database
- Mode 204: Sets with Item
- Mode 205: Set Capacity
- Mode 206: Number of Data Set Chunks
- Mode 207: Size of Data Set Chunks
- Mode 208: Primary and Actual Capacity
- Mode 209: B-Tree Attachment
- Mode 301: Paths
- Mode 302: Key or Search Item
- Mode 401: Logging
- Mode 402: ILR
- Mode 403: Dynamic Roll-Back
- Mode 404: Logging Subsystem Information
- Mode 406: Database Information
- Mode 501: Subsystem Access
- Mode 502: Critical Item Update
- Modes 8nn: Third-Party Indexing
- Mode 901: Language
- DBLOCK
- DBMEMO
- DBOPEN
- DBPUT
- DBUNLOCK
- DBUPDATE
- DBXBEGIN
- DBXEND
- DBXUNDO
- 6 Host Language Access
- Model Program
- ORDERS Database Model Program
- Main Body of Program
- Opening the Database
- Retrieving All the Records on a Chain (with Item Level Locking)
- Retrieving a Data Entry Using a Record Number
- Retrieving Master Data Using a Key Value
- Retrieving Data Serially (with Set Level Locking)
- Adding an Entry
- Updating an Entry
- Deleting an Entry
- Rewinding a Data Set
- Obtaining Database Information
- Obtaining Error Messages and Explanations
- Closing the Database
- C
- COBOL II
- Defining Data Types, Variables, and Intrinsics
- Main Body of Program
- Opening the Database
- Retrieving All the Records on a Chain (with Item Level Locking)
- Retrieving a Data Entry Using a Record Number
- Retrieving Master Data Using a Key Value
- Retrieving Data Serially (with Set Level Locking)
- Adding an Entry
- Updating an Entry
- Deleting an Entry
- Rewinding a Data Set
- Obtaining Database Information
- Obtaining Error Messages and Explanations
- Closing the Database
- FORTRAN 77
- Pascal
- RPG
- 7 Logging and Recovery
- Database Utilities Used in Logging and Recovery
- Recovery Options
- Logical Transactions
- Dynamic Roll-Back Recovery
- Intrinsic Level Recovery
- Logging Preparation
- Step 1--Checking MPE/iX Logging Configuration
- Step 2--Acquiring Logging Capability
- Step 3--Logging to Tape or Disk
- Step 4--Building a Log File for Logging to Disk
- Step 5--Creating the Log Identifier
- Step 6--Setting the Log Identifier
- Step 7--Setting Flags for the Database Backup Copy
- Step 8--Making a Database Backup Copy
- TurboSTORE/iX 7x24 True-Online Backup
- Logging Status
- Logging Maintenance
- Roll-Forward Recovery
- Roll-Back Recovery
- DBRECOV Commands Used with Roll-Forward and Roll-Back Recovery
- Recovery Tables
- Post-Recovery Options
- The Mirror Database
- 8 Using the Database Utilities
- Restructuring the Database with TurboIMAGE/XL Utilities
- Summary of Utility Routines
- Utility Program Operation
- DBLOAD
- DBRECOV
- >CONTROL
- >EXIT
- >FILE
- >RECOVER
- >ROLLBACK
- >RUN
- DBRESTOR
- DBSTORE
- DBUNLOAD
- DBUTIL
- >>ACTIVATE
- >>ADDINDEX
- >>CREATE
- >>DEACTIVATE
- >>DETACH
- >>DISABLE
- >>DROPINDEX
- >>ENABLE
- >>ERASE
- >>EXIT
- >>HELP
- >>MOVE
- >>PURGE
- >>REBUILDINDEX
- >>REDO
- >>RELEASE
- >>SECURE
- >>SET
- >>SHOW
- Syntax
- Parameters
- Example (Show Users)
- Example Discussion
- Example (Show All)
- Example Discussion
- Example (Show Capacity)
- Format of Show Device List
- Example (Show Device)
- Format of Show Indices
- Example (Show Indices)
- Format of Show Locks List
- Example 1 (Show Locks)
- Example 1 Discussion
- Example 2 (Show Locks)
- Example 2 Discussion
- >>VERIFY
- 9 Using a Remote Database
- 10 Internal Structures and Techniques
- 11 B-Tree Indices
- A Error Messages
- B Results of Multiple Access
- C Database Design Considerations
- D Multiple Calls to DBLOCK
- E TurboIMAGE/XL Log Record Formats
- F MPE/iX Log Record Formats
- G Recovery and Logging Quick Reference
- H TurboIMAGE/XL versus TurboIMAGE/V

98 Chapter4
Using the Database
Opening the Database
option, which can permit you to update the values of detail data set search and sort
items, is not available in this mode. Therefore, the access mode 2 user is able to read all
data entries and update some data entries, but is not permitted to add or delete data
entries in any data set.
The programmer must be aware of the possibility that other access mode 2 users are
simultaneously updating data entries. In many applications, it may be possible to
arrange for each user's process to update unique data entries or data items so that the
database will correctly reflect all changes, even data items in the same entry updated
by different processes. On the other hand, if two or more processes update the same
data items of the same entry, the database will reflect only the latest values. Locking
can be used, if desired, to coordinate update sequences to an entry or to coordinate with
access mode 6 readers.
• Access Mode 3. The database is opened for exclusive modify access. If any other users
are accessing the database, it cannot be opened in this mode. All TurboIMAGE/XL
procedures are available to the access mode 3 user. The critical item update (CIUPDATE)
option, which can permit you to update the values of detail data set search and sort
items, is available in this mode. No other concurrent process is permitted to gain any
type of access to the database.
• Access Mode 4. The database is opened for semi-exclusive modify access. Only one
access mode 4 user can access the database, and all other current users must be in
access mode 6 (read only). The access mode 4 user is permitted to call any
TurboIMAGE/XL procedure and has complete control over database content. The
critical item update (CIUPDATE) option, which can permit you to update the values of
detail data set search and sort items, is available in this mode. Other read-only users
are permitted concurrent access to the database in mode 4, but not in mode 3. Locking
can be used to coordinate with access mode 6 readers.
• Access Mode 5. The database is opened for shared read access. All other concurrent
users must be in access mode 1 or 5. Access mode 5 operates the same as access mode 1,
except that the DBUPDATE, DBPUT, and DBDELETE procedures, which alter the
database, are disabled for the access mode 5 user. Locking can be used, if desired, to
ensure that data is not being modified while you are reading it.
Access mode 5 is appropriate for inquiry-type applications if they can tolerate the
possibility of database modifications taking place simultaneously with access mode 1
users.
• Access Mode 6. The database is opened for shared read access. Concurrent users must
be in access mode 2, 4, 6, or 8. Access mode 6 can also be used while the database is
being stored with the TurboIMAGE/XL utility program DBSTORE. Some of these modes
are incompatible with each other as shown in the preceding discussion of concurrent
access modes. All TurboIMAGE/XL procedures that alter the database are disabled.
Locking can be used to synchronize with users who are concurrently updating.
Access mode 6 is appropriate for inquiry-type applications if they can tolerate the
possibility of database modifications taking place simultaneously with access mode 2
and 4 users.