SlideShare a Scribd company logo
VSAM NEW (NOT SO) FEATURES – FROM DFSMS 1.3 TO 1.12
                  Journal of Computer Resource Management

                           Prepared by the CMG Publications Committee
                Journal of Computer Resource Management, a publication of CMG
                              August, 2011 – Alvaro Guimaraes Salla

       This article describes briefly the new features of Virtual Sequential Access Method
          (VSAM) a component of DFSMS. It encompasses the most important VSAM
        enhancements from DFSMS 1.3 to DFSMS 1.12. The sequencing of the items is
                 from the most important to the least one, in the author´s opinion.


In the early 1970s, Virtual Sequential Access Method
(VSAM) was introduced by IBM as a collection of three     ENHANCEMENTS DESCRIPTION
data set organizations — sequential, indexed, and
direct-access, together with the access method            Follows the description of the VSAM enhancements.
software and utilities to be used on the mainframe IBM
operating systems.                                        General functions
The word virtual means only that VSAM was
introduced at approximately the same time as the               Empty CA reclaim. Orphan data control areas are
initial IBM virtual storage operating systems OS/VS1             control areas with lots of free space (or totally free)
and OS/VS2. Since then VSAM has been continually                 located below the HURBA mark. They orphans are
improved and enhanced.                                           created through the following scenario: if at load time
                                                                 an specific data CA was loaded with records
.                                                                belonging to a specific key range and later on the
                                                                 majority of these records are deleted (and the same
VSAM, AN ACCESS METHOD OF z/OS                                   key value is not re-utilized), as the example of a
                                                                 timestamp key, the CA is under populated, and this
                                                                 free space is never reclaimed for records with keys
VSAM is a z/OS access method, that is, a set of
                                                                 out of such specific and original key range. This set of
programs written by IBM to help application code to
                                                                 keys (like the timestamp ones) are called creeping
access data through I/O operations.                              keys, the ones that continues to grow in its numeric
The access method runs under the application task                value. Traditionally, VSAM was not designed to
that invokes it using a branch instruction (no PSW               process well creeping keys. The solution is to add
change status, such as, problem mode, PSW Key)).                 these empty CAs to a free CA list (that originally
                                                                 contains the ones above HURBA) when VSAM
VSAM Functionality                                               realizes the last original record is deleted. This
                                                                 function applies only to KSDS clusters and to ICF
The major access method functions are:                           catalogs. It is important to know that for an existing
       Blocking by clustering logical records in one             VSAM data set, by just enabling CA reclaim, does not
       physical block                                            reclaim the previous internal CAs totally free. Only the
       Buffering by managing the buffer pool                     ones that will be totally freed in the future, will be
       efficiently                                               reclaimed. This function will even decrease the need
       An access method understands the way                      of defrags.
       logical records are organized on the 3390               VSAM Partial Release on multiple volumes data set.
       tracks. Then, it is in charge of writing virtual          Partial release was only available for sequential data
                                                                 sets. Later was made available only for VSAM, but
       channel programs for accessing such records.
                                                                 for single volume data sets.
       Invoking the I/O driver through an SVC
                                                               Ignore DEFINE parameters IMBED, REPLICATE,
       (usually SVC 00 – also named EXCP)                         KEYRANGE, ORDERED options.
       Synchronize through the Wait function, the              Health Check to detect and identify catalogs with
       running task with the end of the I/O operation            IMBED and REPLICATE.
       (if needed).                                            DFSMS Data Set Separation, to allocate data sets in
       Execute I/O error recovery.                               distinct physical DASD controllers.
Media Manager the unique VSAM I/O driver,                 existing data sets. Through data sharing implemented by
        exception for Improved Control Interval Processing       the use of coupling facility structures VSAM RLS offers a
        (ICIP)                                                   high level of continuous availability. Follows a list of RLS
                                                                 enhancements:
Extending the capacity of VSAM clusters                                 Use of RLS coupling facility cache structure for storing
                                                                         data sets with CI size bigger than 4KB.
All the following enhancements extends the capacity of                  Use of RLS coupling facility cache structure for all data
VSAM clusters.                                                           or some accordingly with DB manager option
        Extended addressability for VSAM KSDS. It increases             RLS system-managed duplexing rebuild process for
          RBA from 4-byte to 8-byte allowing VSAM                        cache structures.
          components cross the 4-GB limit capacity. For the             RLS Coupling Facility structure system-managed
          majority of the applications this is done with total           duplexing.
          compatibility. Extended addressability when                   Data buffer pools may be allocated above the bar
          announced was not available for KSDS                          VSAM RLS DIAG command to find latch contentions
          organization.                                                 Enhanced RLS recovery.
                                                                        SMF performance data of VSAM RLS usage of 64-bit
       RLS support of extended addressability of VSAM                    data buffers
        KSDS. As stated at title, Extended Addressability is            Speeding up the SMSVSAM address address space
        now available for KSDS organization running with                 with TERMINATESERVER command
        RLS buffering.                                                  Health Checks for VSAM RLS: indicating latch
       Extended addressability for all VSAM data sets                    contention and a single point of failure (SPOF) in the
       More than 255 extents for SMS-managed VSAM data                   SHCDS
        sets. The increase of the maximum number of                     Support for VSAM striping in RLS mode
        extents is a must to avoid frequent defrags. Follows
        a list of such limits:                                   System Managed Buffering (SMB) enhancements
              o Sequential: 16 per volume.
              o Extended-format sequential:123.
              o PDS: 16,                                         SMB is a function available to all VSAM data sets types
              o PDSE: 123.                                       opened for NSR buffering processing. SMB enables
              o Non-system-managed VSAM up to 255
                                                                 VSAM to determine the optimum number of index and
                   per component. If System-managed limit
                                                                 data buffers, as well as the type of buffer management:
                   removed if DC has extent constraint
                   removal.                                      LSR (LRU, lots of index buffers, lots of data buffers
              o Non-system-managed VSAM can have up              containing up to 20% of all data records, no look-ahead)
                   to 255 extents per stripe. If System-         or NSR (discard the ones already processed, just one
                   managed VSAM the limit removed if DC          index buffer, look-ahead). SMB boost the performance
                   has extent constraint removal specified.      mainly of random NSR accesses. The late
              o An HFS can have 123 extents on each              enhancements are:
                   volume
       Extended Address Volume (EAV) for VSAM data sets
                                                                        SMB initially for VSAM KSDS clusters.
        allowing the allocation of such data sets at cylinders
                                                                        SMB retry capability for Direct Option (DO) access bias.
        beyond 64K addressing at EAV volumes.
                                                                        SMB support for AIX® files.
       Maximum Volume Count, allows volumes be added
                                                                        Limit the SMB buffer size for Direct Option (DO) at data
        dynamically to a VSAM data set without manual
                                                                          Class SMS construct. It avoids to have up to 20% of
        intervention and taking down the application.
                                                                          all data in data buffers.
       Real addresses greater than 2 GB available for all
                                                                        Enhancement in SMB for DO: buffers for index
        VSAM data sets. Allowing pages above the bar
                                                                          allocated based on SMBVSP value or data set size.
        being located at frames above 2-GB.
                                                                 Data Stripping enhancements
VSAM Data Sharing (RLS)
                                                                 Usually, in a multi-extent, multi-volume VSAM data set
VSAM RLS is another mode of managing buffer pools,
                                                                 processed in sequential access, processing does not allow for
which allows any number of applications within your
                                                                 any type of parallelism for I/O operations among the volumes.
Parallel Sysplex to share your existing VSAM clusters.
                                                                 This means that when an I/O operation is executed for an
It provides full data integrity (read and write). The            extent in a volume, no other I/O activity from the same task or
serialization is done at record level.                           same data set is scheduled to the other volumes. In a situation
VSAM RLS does not introduce new types of VSAM                    where I/O is the major bottleneck, and there are available
clusters; rather, it is just a new way of accessing              resources in the channel subsystem and controllers, it is
a waste of these resources.
Data striping addresses this sequential access performance
problem by adding two modifications to the traditional data
organization:
  The records are not placed in key ranges along the
volumes; instead they are organized in stripes.
  Parallel I/O operations are scheduled to sequential stripes
(CIs) in different volumes

The enhancements for data striping are:
      Data striping for VSAM LDS through a small program
        enhancement (SPE)
      Data striping and multi-layering for all VSAM data set
      VSAM data striping support for data sets with REUSE
        attribute

Problem Determination enhancements

Here we have the features that will decrease the mean time
to repair by making the problem determination more
efficient:.

       Enhancements in VSAM problem determination:
         VDUMP option in F CATALOG command
       Trap for data component and Trace enhancements
       Dynamic trace for record management

More Related Content

Similar to VSAM for ever, Alvaro Salla, CMG Brasil 2011

Samind brain power_v2a
Samind brain power_v2aSamind brain power_v2a
Samind brain power_v2a
Otto Kee LeakPeng
 
Basic VSAM
Basic VSAMBasic VSAM
Basic VSAM
Dan O'Dea
 
Z105760 whats new-dfsms-istanbul-v1902a
Z105760 whats new-dfsms-istanbul-v1902aZ105760 whats new-dfsms-istanbul-v1902a
Z105760 whats new-dfsms-istanbul-v1902a
Tony Pearson
 
Vsam presentation PPT
Vsam presentation PPTVsam presentation PPT
Vsam presentation PPT
Anil Polsani
 
3487570
34875703487570
Vsam
VsamVsam
Vmug V Sphere Storage (Rev E)
Vmug V Sphere Storage (Rev E)Vmug V Sphere Storage (Rev E)
Vmug V Sphere Storage (Rev E)
guesta849bc8b
 
SAN Concepts
SAN ConceptsSAN Concepts
SAN Concepts
Ramkaliyaperumal
 
Oracle rac 10g best practices
Oracle rac 10g best practicesOracle rac 10g best practices
Oracle rac 10g best practices
Haseeb Alam
 
San 101 basics of administrating a san
San 101 basics of administrating a sanSan 101 basics of administrating a san
San 101 basics of administrating a san
pineapplebed24
 
10g rac asm
10g rac asm10g rac asm
10g rac asm
Victor
 
Specification_of_NVRAM_Manager.pptx
Specification_of_NVRAM_Manager.pptxSpecification_of_NVRAM_Manager.pptx
Specification_of_NVRAM_Manager.pptx
PushkarBaheti1
 
Ss83 g formation-z-os-vsam-et-access-method-services
Ss83 g formation-z-os-vsam-et-access-method-servicesSs83 g formation-z-os-vsam-et-access-method-services
Ss83 g formation-z-os-vsam-et-access-method-services
CERTyou Formation
 
Vx vm
Vx vmVx vm
2017 VMUG Storage Policy Based Management
2017 VMUG Storage Policy Based Management2017 VMUG Storage Policy Based Management
2017 VMUG Storage Policy Based Management
Cormac Hogan
 
Sas Grid Migration and Roadmap
Sas Grid Migration and RoadmapSas Grid Migration and Roadmap
Sas Grid Migration and Roadmap
d-Wise Technologies
 
O Racle Asm Best Practices Presentation
O Racle Asm Best Practices PresentationO Racle Asm Best Practices Presentation
O Racle Asm Best Practices Presentation
eraz
 
Distribute Key Value Store
Distribute Key Value StoreDistribute Key Value Store
Distribute Key Value Store
Santal Li
 
Distribute key value_store
Distribute key value_storeDistribute key value_store
Distribute key value_store
drewz lin
 
I Didn't Know You Could Do That with zOS.pdf
I Didn't Know You Could Do That with zOS.pdfI Didn't Know You Could Do That with zOS.pdf
I Didn't Know You Could Do That with zOS.pdf
Marna Walle
 

Similar to VSAM for ever, Alvaro Salla, CMG Brasil 2011 (20)

Samind brain power_v2a
Samind brain power_v2aSamind brain power_v2a
Samind brain power_v2a
 
Basic VSAM
Basic VSAMBasic VSAM
Basic VSAM
 
Z105760 whats new-dfsms-istanbul-v1902a
Z105760 whats new-dfsms-istanbul-v1902aZ105760 whats new-dfsms-istanbul-v1902a
Z105760 whats new-dfsms-istanbul-v1902a
 
Vsam presentation PPT
Vsam presentation PPTVsam presentation PPT
Vsam presentation PPT
 
3487570
34875703487570
3487570
 
Vsam
VsamVsam
Vsam
 
Vmug V Sphere Storage (Rev E)
Vmug V Sphere Storage (Rev E)Vmug V Sphere Storage (Rev E)
Vmug V Sphere Storage (Rev E)
 
SAN Concepts
SAN ConceptsSAN Concepts
SAN Concepts
 
Oracle rac 10g best practices
Oracle rac 10g best practicesOracle rac 10g best practices
Oracle rac 10g best practices
 
San 101 basics of administrating a san
San 101 basics of administrating a sanSan 101 basics of administrating a san
San 101 basics of administrating a san
 
10g rac asm
10g rac asm10g rac asm
10g rac asm
 
Specification_of_NVRAM_Manager.pptx
Specification_of_NVRAM_Manager.pptxSpecification_of_NVRAM_Manager.pptx
Specification_of_NVRAM_Manager.pptx
 
Ss83 g formation-z-os-vsam-et-access-method-services
Ss83 g formation-z-os-vsam-et-access-method-servicesSs83 g formation-z-os-vsam-et-access-method-services
Ss83 g formation-z-os-vsam-et-access-method-services
 
Vx vm
Vx vmVx vm
Vx vm
 
2017 VMUG Storage Policy Based Management
2017 VMUG Storage Policy Based Management2017 VMUG Storage Policy Based Management
2017 VMUG Storage Policy Based Management
 
Sas Grid Migration and Roadmap
Sas Grid Migration and RoadmapSas Grid Migration and Roadmap
Sas Grid Migration and Roadmap
 
O Racle Asm Best Practices Presentation
O Racle Asm Best Practices PresentationO Racle Asm Best Practices Presentation
O Racle Asm Best Practices Presentation
 
Distribute Key Value Store
Distribute Key Value StoreDistribute Key Value Store
Distribute Key Value Store
 
Distribute key value_store
Distribute key value_storeDistribute key value_store
Distribute key value_store
 
I Didn't Know You Could Do That with zOS.pdf
I Didn't Know You Could Do That with zOS.pdfI Didn't Know You Could Do That with zOS.pdf
I Didn't Know You Could Do That with zOS.pdf
 

More from Joao Galdino Mello de Souza

Explorando a API Rest Jira Cloud
Explorando a API Rest Jira CloudExplorando a API Rest Jira Cloud
Explorando a API Rest Jira Cloud
Joao Galdino Mello de Souza
 
Enterprise computing for modern business workloads por Lívio Sousa (IBM)
Enterprise computing for modern business workloads por Lívio Sousa (IBM)Enterprise computing for modern business workloads por Lívio Sousa (IBM)
Enterprise computing for modern business workloads por Lívio Sousa (IBM)
Joao Galdino Mello de Souza
 
Pré-Anúncio z/OS 2.4 por Alvaro Salla (MAFFEI) e Fernando Ferreira (IBM)
Pré-Anúncio z/OS 2.4 por Alvaro Salla (MAFFEI) e Fernando Ferreira (IBM)Pré-Anúncio z/OS 2.4 por Alvaro Salla (MAFFEI) e Fernando Ferreira (IBM)
Pré-Anúncio z/OS 2.4 por Alvaro Salla (MAFFEI) e Fernando Ferreira (IBM)
Joao Galdino Mello de Souza
 
Scaling Multi-cloud with Infrastructure as Code por André Rocha Agostinho (S...
Scaling  Multi-cloud with Infrastructure as Code por André Rocha Agostinho (S...Scaling  Multi-cloud with Infrastructure as Code por André Rocha Agostinho (S...
Scaling Multi-cloud with Infrastructure as Code por André Rocha Agostinho (S...
Joao Galdino Mello de Souza
 
Alta Disponibilidade SQL Server por Marcus Vinicius Bittencourt (O Boticário)
Alta Disponibilidade SQL Server por Marcus Vinicius Bittencourt (O Boticário)Alta Disponibilidade SQL Server por Marcus Vinicius Bittencourt (O Boticário)
Alta Disponibilidade SQL Server por Marcus Vinicius Bittencourt (O Boticário)
Joao Galdino Mello de Souza
 
Cloud no Banco Votorantim por Marcus Vinícius de Aguiar Magalhaes (Banco Voto...
Cloud no Banco Votorantim por Marcus Vinícius de Aguiar Magalhaes (Banco Voto...Cloud no Banco Votorantim por Marcus Vinícius de Aguiar Magalhaes (Banco Voto...
Cloud no Banco Votorantim por Marcus Vinícius de Aguiar Magalhaes (Banco Voto...
Joao Galdino Mello de Souza
 
Descomplicando a Ciência de Dados por Adelson Lovatto (IBM)
Descomplicando a Ciência de Dados por Adelson Lovatto (IBM)Descomplicando a Ciência de Dados por Adelson Lovatto (IBM)
Descomplicando a Ciência de Dados por Adelson Lovatto (IBM)
Joao Galdino Mello de Souza
 
Pré-Anúncio z/OS 2.4 por Alvaro Salla (MAFFEI)
Pré-Anúncio z/OS 2.4 por Alvaro Salla (MAFFEI)Pré-Anúncio z/OS 2.4 por Alvaro Salla (MAFFEI)
Pré-Anúncio z/OS 2.4 por Alvaro Salla (MAFFEI)
Joao Galdino Mello de Souza
 
Consumo de CPU, Distorções e Redução de custo de SW por Maria Isabel Soutello...
Consumo de CPU, Distorções e Redução de custo de SW por Maria Isabel Soutello...Consumo de CPU, Distorções e Redução de custo de SW por Maria Isabel Soutello...
Consumo de CPU, Distorções e Redução de custo de SW por Maria Isabel Soutello...
Joao Galdino Mello de Souza
 
Qualidade no desenvolvimento de Sistemas por Anderson Augustinho (Celepar)
Qualidade no desenvolvimento de Sistemas por Anderson Augustinho (Celepar)Qualidade no desenvolvimento de Sistemas por Anderson Augustinho (Celepar)
Qualidade no desenvolvimento de Sistemas por Anderson Augustinho (Celepar)
Joao Galdino Mello de Souza
 
Assets Tokenization: Novas Linhas de negócio por Lívio Sousa (IBM)
Assets Tokenization: Novas Linhas de negócio por Lívio Sousa (IBM)Assets Tokenization: Novas Linhas de negócio por Lívio Sousa (IBM)
Assets Tokenization: Novas Linhas de negócio por Lívio Sousa (IBM)
Joao Galdino Mello de Souza
 
Intelligent Edge e Intelligent Cloud por Vivian Heinrichs (Softline)
Intelligent Edge e Intelligent Cloud por Vivian Heinrichs (Softline)Intelligent Edge e Intelligent Cloud por Vivian Heinrichs (Softline)
Intelligent Edge e Intelligent Cloud por Vivian Heinrichs (Softline)
Joao Galdino Mello de Souza
 
Evolução da eficiência operacional no mainframe por Emerson Castelano (Eccox)
Evolução da eficiência operacional no mainframe por Emerson Castelano (Eccox)Evolução da eficiência operacional no mainframe por Emerson Castelano (Eccox)
Evolução da eficiência operacional no mainframe por Emerson Castelano (Eccox)
Joao Galdino Mello de Souza
 
Gestão de Capacidade, desempenho e custos no ambiente mainframe zOS: Um caso ...
Gestão de Capacidade, desempenho e custos no ambiente mainframe zOS: Um caso ...Gestão de Capacidade, desempenho e custos no ambiente mainframe zOS: Um caso ...
Gestão de Capacidade, desempenho e custos no ambiente mainframe zOS: Um caso ...
Joao Galdino Mello de Souza
 
Eletricidade e Eletrônica 1.01 por Luiz Carlos Orsoni (MAFFEI)
Eletricidade e Eletrônica 1.01 por Luiz Carlos Orsoni (MAFFEI)Eletricidade e Eletrônica 1.01 por Luiz Carlos Orsoni (MAFFEI)
Eletricidade e Eletrônica 1.01 por Luiz Carlos Orsoni (MAFFEI)
Joao Galdino Mello de Souza
 
Pervasive Encryption por Eugênio Fernandes (IBM)
Pervasive Encryption por Eugênio Fernandes (IBM)Pervasive Encryption por Eugênio Fernandes (IBM)
Pervasive Encryption por Eugênio Fernandes (IBM)
Joao Galdino Mello de Souza
 
Minimizar RNI ambiente CICS por Milton Ferraraccio (Eccox Technology)
Minimizar RNI ambiente CICS por Milton Ferraraccio (Eccox Technology)Minimizar RNI ambiente CICS por Milton Ferraraccio (Eccox Technology)
Minimizar RNI ambiente CICS por Milton Ferraraccio (Eccox Technology)
Joao Galdino Mello de Souza
 
Scaling Multi-Cloud with Infrastructure as a Code por André Rocha Agostinho (...
Scaling Multi-Cloud with Infrastructure as a Code por André Rocha Agostinho (...Scaling Multi-Cloud with Infrastructure as a Code por André Rocha Agostinho (...
Scaling Multi-Cloud with Infrastructure as a Code por André Rocha Agostinho (...
Joao Galdino Mello de Souza
 
Como obter o melhor do Z por Gustavo Fernandes Araujo (Itau Unibanco)
Como obter o melhor do Z por Gustavo Fernandes Araujo (Itau Unibanco)Como obter o melhor do Z por Gustavo Fernandes Araujo (Itau Unibanco)
Como obter o melhor do Z por Gustavo Fernandes Araujo (Itau Unibanco)
Joao Galdino Mello de Souza
 
Lei geral de proteção de dados por Kleber Silva e Ricardo Navarro (Pise4)
Lei geral de proteção de dados por Kleber Silva  e Ricardo Navarro (Pise4)Lei geral de proteção de dados por Kleber Silva  e Ricardo Navarro (Pise4)
Lei geral de proteção de dados por Kleber Silva e Ricardo Navarro (Pise4)
Joao Galdino Mello de Souza
 

More from Joao Galdino Mello de Souza (20)

Explorando a API Rest Jira Cloud
Explorando a API Rest Jira CloudExplorando a API Rest Jira Cloud
Explorando a API Rest Jira Cloud
 
Enterprise computing for modern business workloads por Lívio Sousa (IBM)
Enterprise computing for modern business workloads por Lívio Sousa (IBM)Enterprise computing for modern business workloads por Lívio Sousa (IBM)
Enterprise computing for modern business workloads por Lívio Sousa (IBM)
 
Pré-Anúncio z/OS 2.4 por Alvaro Salla (MAFFEI) e Fernando Ferreira (IBM)
Pré-Anúncio z/OS 2.4 por Alvaro Salla (MAFFEI) e Fernando Ferreira (IBM)Pré-Anúncio z/OS 2.4 por Alvaro Salla (MAFFEI) e Fernando Ferreira (IBM)
Pré-Anúncio z/OS 2.4 por Alvaro Salla (MAFFEI) e Fernando Ferreira (IBM)
 
Scaling Multi-cloud with Infrastructure as Code por André Rocha Agostinho (S...
Scaling  Multi-cloud with Infrastructure as Code por André Rocha Agostinho (S...Scaling  Multi-cloud with Infrastructure as Code por André Rocha Agostinho (S...
Scaling Multi-cloud with Infrastructure as Code por André Rocha Agostinho (S...
 
Alta Disponibilidade SQL Server por Marcus Vinicius Bittencourt (O Boticário)
Alta Disponibilidade SQL Server por Marcus Vinicius Bittencourt (O Boticário)Alta Disponibilidade SQL Server por Marcus Vinicius Bittencourt (O Boticário)
Alta Disponibilidade SQL Server por Marcus Vinicius Bittencourt (O Boticário)
 
Cloud no Banco Votorantim por Marcus Vinícius de Aguiar Magalhaes (Banco Voto...
Cloud no Banco Votorantim por Marcus Vinícius de Aguiar Magalhaes (Banco Voto...Cloud no Banco Votorantim por Marcus Vinícius de Aguiar Magalhaes (Banco Voto...
Cloud no Banco Votorantim por Marcus Vinícius de Aguiar Magalhaes (Banco Voto...
 
Descomplicando a Ciência de Dados por Adelson Lovatto (IBM)
Descomplicando a Ciência de Dados por Adelson Lovatto (IBM)Descomplicando a Ciência de Dados por Adelson Lovatto (IBM)
Descomplicando a Ciência de Dados por Adelson Lovatto (IBM)
 
Pré-Anúncio z/OS 2.4 por Alvaro Salla (MAFFEI)
Pré-Anúncio z/OS 2.4 por Alvaro Salla (MAFFEI)Pré-Anúncio z/OS 2.4 por Alvaro Salla (MAFFEI)
Pré-Anúncio z/OS 2.4 por Alvaro Salla (MAFFEI)
 
Consumo de CPU, Distorções e Redução de custo de SW por Maria Isabel Soutello...
Consumo de CPU, Distorções e Redução de custo de SW por Maria Isabel Soutello...Consumo de CPU, Distorções e Redução de custo de SW por Maria Isabel Soutello...
Consumo de CPU, Distorções e Redução de custo de SW por Maria Isabel Soutello...
 
Qualidade no desenvolvimento de Sistemas por Anderson Augustinho (Celepar)
Qualidade no desenvolvimento de Sistemas por Anderson Augustinho (Celepar)Qualidade no desenvolvimento de Sistemas por Anderson Augustinho (Celepar)
Qualidade no desenvolvimento de Sistemas por Anderson Augustinho (Celepar)
 
Assets Tokenization: Novas Linhas de negócio por Lívio Sousa (IBM)
Assets Tokenization: Novas Linhas de negócio por Lívio Sousa (IBM)Assets Tokenization: Novas Linhas de negócio por Lívio Sousa (IBM)
Assets Tokenization: Novas Linhas de negócio por Lívio Sousa (IBM)
 
Intelligent Edge e Intelligent Cloud por Vivian Heinrichs (Softline)
Intelligent Edge e Intelligent Cloud por Vivian Heinrichs (Softline)Intelligent Edge e Intelligent Cloud por Vivian Heinrichs (Softline)
Intelligent Edge e Intelligent Cloud por Vivian Heinrichs (Softline)
 
Evolução da eficiência operacional no mainframe por Emerson Castelano (Eccox)
Evolução da eficiência operacional no mainframe por Emerson Castelano (Eccox)Evolução da eficiência operacional no mainframe por Emerson Castelano (Eccox)
Evolução da eficiência operacional no mainframe por Emerson Castelano (Eccox)
 
Gestão de Capacidade, desempenho e custos no ambiente mainframe zOS: Um caso ...
Gestão de Capacidade, desempenho e custos no ambiente mainframe zOS: Um caso ...Gestão de Capacidade, desempenho e custos no ambiente mainframe zOS: Um caso ...
Gestão de Capacidade, desempenho e custos no ambiente mainframe zOS: Um caso ...
 
Eletricidade e Eletrônica 1.01 por Luiz Carlos Orsoni (MAFFEI)
Eletricidade e Eletrônica 1.01 por Luiz Carlos Orsoni (MAFFEI)Eletricidade e Eletrônica 1.01 por Luiz Carlos Orsoni (MAFFEI)
Eletricidade e Eletrônica 1.01 por Luiz Carlos Orsoni (MAFFEI)
 
Pervasive Encryption por Eugênio Fernandes (IBM)
Pervasive Encryption por Eugênio Fernandes (IBM)Pervasive Encryption por Eugênio Fernandes (IBM)
Pervasive Encryption por Eugênio Fernandes (IBM)
 
Minimizar RNI ambiente CICS por Milton Ferraraccio (Eccox Technology)
Minimizar RNI ambiente CICS por Milton Ferraraccio (Eccox Technology)Minimizar RNI ambiente CICS por Milton Ferraraccio (Eccox Technology)
Minimizar RNI ambiente CICS por Milton Ferraraccio (Eccox Technology)
 
Scaling Multi-Cloud with Infrastructure as a Code por André Rocha Agostinho (...
Scaling Multi-Cloud with Infrastructure as a Code por André Rocha Agostinho (...Scaling Multi-Cloud with Infrastructure as a Code por André Rocha Agostinho (...
Scaling Multi-Cloud with Infrastructure as a Code por André Rocha Agostinho (...
 
Como obter o melhor do Z por Gustavo Fernandes Araujo (Itau Unibanco)
Como obter o melhor do Z por Gustavo Fernandes Araujo (Itau Unibanco)Como obter o melhor do Z por Gustavo Fernandes Araujo (Itau Unibanco)
Como obter o melhor do Z por Gustavo Fernandes Araujo (Itau Unibanco)
 
Lei geral de proteção de dados por Kleber Silva e Ricardo Navarro (Pise4)
Lei geral de proteção de dados por Kleber Silva  e Ricardo Navarro (Pise4)Lei geral de proteção de dados por Kleber Silva  e Ricardo Navarro (Pise4)
Lei geral de proteção de dados por Kleber Silva e Ricardo Navarro (Pise4)
 

Recently uploaded

Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 

Recently uploaded (20)

Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 

VSAM for ever, Alvaro Salla, CMG Brasil 2011

  • 1. VSAM NEW (NOT SO) FEATURES – FROM DFSMS 1.3 TO 1.12 Journal of Computer Resource Management Prepared by the CMG Publications Committee Journal of Computer Resource Management, a publication of CMG August, 2011 – Alvaro Guimaraes Salla This article describes briefly the new features of Virtual Sequential Access Method (VSAM) a component of DFSMS. It encompasses the most important VSAM enhancements from DFSMS 1.3 to DFSMS 1.12. The sequencing of the items is from the most important to the least one, in the author´s opinion. In the early 1970s, Virtual Sequential Access Method (VSAM) was introduced by IBM as a collection of three ENHANCEMENTS DESCRIPTION data set organizations — sequential, indexed, and direct-access, together with the access method Follows the description of the VSAM enhancements. software and utilities to be used on the mainframe IBM operating systems. General functions The word virtual means only that VSAM was introduced at approximately the same time as the Empty CA reclaim. Orphan data control areas are initial IBM virtual storage operating systems OS/VS1 control areas with lots of free space (or totally free) and OS/VS2. Since then VSAM has been continually located below the HURBA mark. They orphans are improved and enhanced. created through the following scenario: if at load time an specific data CA was loaded with records . belonging to a specific key range and later on the majority of these records are deleted (and the same VSAM, AN ACCESS METHOD OF z/OS key value is not re-utilized), as the example of a timestamp key, the CA is under populated, and this free space is never reclaimed for records with keys VSAM is a z/OS access method, that is, a set of out of such specific and original key range. This set of programs written by IBM to help application code to keys (like the timestamp ones) are called creeping access data through I/O operations. keys, the ones that continues to grow in its numeric The access method runs under the application task value. Traditionally, VSAM was not designed to that invokes it using a branch instruction (no PSW process well creeping keys. The solution is to add change status, such as, problem mode, PSW Key)). these empty CAs to a free CA list (that originally contains the ones above HURBA) when VSAM VSAM Functionality realizes the last original record is deleted. This function applies only to KSDS clusters and to ICF The major access method functions are: catalogs. It is important to know that for an existing Blocking by clustering logical records in one VSAM data set, by just enabling CA reclaim, does not physical block reclaim the previous internal CAs totally free. Only the Buffering by managing the buffer pool ones that will be totally freed in the future, will be efficiently reclaimed. This function will even decrease the need An access method understands the way of defrags. logical records are organized on the 3390 VSAM Partial Release on multiple volumes data set. tracks. Then, it is in charge of writing virtual Partial release was only available for sequential data sets. Later was made available only for VSAM, but channel programs for accessing such records. for single volume data sets. Invoking the I/O driver through an SVC Ignore DEFINE parameters IMBED, REPLICATE, (usually SVC 00 – also named EXCP) KEYRANGE, ORDERED options. Synchronize through the Wait function, the Health Check to detect and identify catalogs with running task with the end of the I/O operation IMBED and REPLICATE. (if needed). DFSMS Data Set Separation, to allocate data sets in Execute I/O error recovery. distinct physical DASD controllers.
  • 2. Media Manager the unique VSAM I/O driver, existing data sets. Through data sharing implemented by exception for Improved Control Interval Processing the use of coupling facility structures VSAM RLS offers a (ICIP) high level of continuous availability. Follows a list of RLS enhancements: Extending the capacity of VSAM clusters Use of RLS coupling facility cache structure for storing data sets with CI size bigger than 4KB. All the following enhancements extends the capacity of Use of RLS coupling facility cache structure for all data VSAM clusters. or some accordingly with DB manager option Extended addressability for VSAM KSDS. It increases RLS system-managed duplexing rebuild process for RBA from 4-byte to 8-byte allowing VSAM cache structures. components cross the 4-GB limit capacity. For the RLS Coupling Facility structure system-managed majority of the applications this is done with total duplexing. compatibility. Extended addressability when Data buffer pools may be allocated above the bar announced was not available for KSDS VSAM RLS DIAG command to find latch contentions organization. Enhanced RLS recovery. SMF performance data of VSAM RLS usage of 64-bit RLS support of extended addressability of VSAM data buffers KSDS. As stated at title, Extended Addressability is Speeding up the SMSVSAM address address space now available for KSDS organization running with with TERMINATESERVER command RLS buffering. Health Checks for VSAM RLS: indicating latch Extended addressability for all VSAM data sets contention and a single point of failure (SPOF) in the More than 255 extents for SMS-managed VSAM data SHCDS sets. The increase of the maximum number of Support for VSAM striping in RLS mode extents is a must to avoid frequent defrags. Follows a list of such limits: System Managed Buffering (SMB) enhancements o Sequential: 16 per volume. o Extended-format sequential:123. o PDS: 16, SMB is a function available to all VSAM data sets types o PDSE: 123. opened for NSR buffering processing. SMB enables o Non-system-managed VSAM up to 255 VSAM to determine the optimum number of index and per component. If System-managed limit data buffers, as well as the type of buffer management: removed if DC has extent constraint removal. LSR (LRU, lots of index buffers, lots of data buffers o Non-system-managed VSAM can have up containing up to 20% of all data records, no look-ahead) to 255 extents per stripe. If System- or NSR (discard the ones already processed, just one managed VSAM the limit removed if DC index buffer, look-ahead). SMB boost the performance has extent constraint removal specified. mainly of random NSR accesses. The late o An HFS can have 123 extents on each enhancements are: volume Extended Address Volume (EAV) for VSAM data sets SMB initially for VSAM KSDS clusters. allowing the allocation of such data sets at cylinders SMB retry capability for Direct Option (DO) access bias. beyond 64K addressing at EAV volumes. SMB support for AIX® files. Maximum Volume Count, allows volumes be added Limit the SMB buffer size for Direct Option (DO) at data dynamically to a VSAM data set without manual Class SMS construct. It avoids to have up to 20% of intervention and taking down the application. all data in data buffers. Real addresses greater than 2 GB available for all Enhancement in SMB for DO: buffers for index VSAM data sets. Allowing pages above the bar allocated based on SMBVSP value or data set size. being located at frames above 2-GB. Data Stripping enhancements VSAM Data Sharing (RLS) Usually, in a multi-extent, multi-volume VSAM data set VSAM RLS is another mode of managing buffer pools, processed in sequential access, processing does not allow for which allows any number of applications within your any type of parallelism for I/O operations among the volumes. Parallel Sysplex to share your existing VSAM clusters. This means that when an I/O operation is executed for an It provides full data integrity (read and write). The extent in a volume, no other I/O activity from the same task or serialization is done at record level. same data set is scheduled to the other volumes. In a situation VSAM RLS does not introduce new types of VSAM where I/O is the major bottleneck, and there are available clusters; rather, it is just a new way of accessing resources in the channel subsystem and controllers, it is
  • 3. a waste of these resources. Data striping addresses this sequential access performance problem by adding two modifications to the traditional data organization: The records are not placed in key ranges along the volumes; instead they are organized in stripes. Parallel I/O operations are scheduled to sequential stripes (CIs) in different volumes The enhancements for data striping are: Data striping for VSAM LDS through a small program enhancement (SPE) Data striping and multi-layering for all VSAM data set VSAM data striping support for data sets with REUSE attribute Problem Determination enhancements Here we have the features that will decrease the mean time to repair by making the problem determination more efficient:. Enhancements in VSAM problem determination: VDUMP option in F CATALOG command Trap for data component and Trace enhancements Dynamic trace for record management