z/OS VSAM and Access Method Services

z/OS VSAM and Access Method Services

 

IBM Training for z/OS VSAM and Access Method Services

Skill Level: Intermediate

Modality:  CR - Classroom based Trainng or ILO - Instructor Led Online Class

Duration: 4 Day/s

Starting Price:  $ - 5,261

Overview:

This is an intermediate course for individuals who manage data sets using IDCAMS and VSAM.

This course is designed to teach how to manage VSAM and non-VSAM data sets by coding and using the functions and features of the Access Method Services program, IDCAMS._x000D_ _x000D_ To reinforce the lecture material, machine exercises are provided that enable students to code and test selected IDCAMS commands such as DEFINE, REPRO, ALTER, and LISTCAT._x000D_ _x000D_ Learn to manage Virtual Storage Access Method (VSAM) and non-VSAM data sets. Particularly emphasize coding and using the functions of the IDCAMS program. Lab exercises enable you to code and test selected IDCAMS commands, such as DEFINE, REPRO, ALTER, and LISTCAT.  _x000D_ _x000D_ Hands-On Labs_x000D_ _x000D_ Eight labs are included to address:  _x000D_ _x000D_ _x000D_

  • IDCAMS commands, including ALTER, DEFINE, CLUSTER, EXPORT, IMPORT, EXAMINE, LISTCAT, REPRO, and PRINT  
  • _x000D_
  • tuning VSAM and the VSAM buffers  
  • _x000D_
  • alternate indexes
  • _x000D_


    Request a Quote

    Please enable JavaScript in your browser to complete this form.
    Email
    Multiple Choice
    How did you hear about us?
    Yes, I would like to receive special offers from CRS.
    Yes, I would like to receive special offers from CRS.


    Target Audience:

    This is an intermediate course for individuals who manage data sets using IDCAMS and VSAM..

    .

    Prerequisites: You should complete:_x000D_ _x000D_ _x000D_

  • z/OS Facilities (ES15)
  • _x000D_
  • z/OS Job Control Language and Utilities (ES07) or
  • _x000D_
  • Fundamental System Skills in z/OS (ES10)
  • _x000D_
  • or have equivalent experience
  • _x000D_ .

    Topic: Introduction to VSAM data setsdescribe the structure, organization, and use of VSAM clusters

  • explain the function of Control Intervals (CI) and Control Areas (CA)
  • describe the purpose of CI splits and CA splits and how they are accomplished
  • estimate DASD space requirements for various cluster types
  • ICF catalogsdiscuss the use of the ICF catalog
  • describe the structure, purpose, and basic contents of the master catalog
  • describe how the master catalog is located at initial program load (IPL) time
  • discuss the structure, purpose, and basic contents of user catalogs
  • create the ICF catalogs
  • describe the catalog search
  • discuss and create the two types of alias
  • IDCAMS commands, part 1discuss the IDCAMS program
  • code the JCL to run IDCAMS
  • code the DEFINE CLUSTER command to create specific VSAM data set organizations
  • code the LISTCAT command to format and print entries from the catalog
  • JCL for VSAMexplain creation and deletion of VSAM clusters using JCL and the DFSMS data class facility
  • describe the additional JCL parameters that support VSAM clusters
  • discuss the purpose of data class
  • explain the assignment of data class through JCL and the Automatic Class Selection (ACS) routines
  • IDCAMS commands, part 2describe the function of REPRO, PRINT and DELETE commands
  • use REPRO to load and back up a VSAM cluster
  • use PRINT to print a VSAM cluster in various formats
  • use DELETE to remove the catalog entry for the data set and scratch the data set from the volume
  • describe and code modal commands to provide for conditional execution of Access Method Services (AMS) statements
  • Bufferingexplain how buffer space may impact performance either positively or negatively
  • explain the use of data and index buffers in sequential processing and direct processing
  • evaluate the use of JCL Access Method Parameters (AMP) keywords to manage buffers
  • code the buffer keywords on the Dataset Definition (DD) statement
  • VSAM integrity and securityexplain how integrity and security is maintained
  • discuss the meaning and use of SHAREOPTIONS
  • discuss the need for serialization of updates to a data set
  • describe how ENQ/DEQ macros are used to serialize data set updates in multiregion and multisystem environments
  • explain the impact of buffering and SHAREOPTION modifications
  • explain VSAM record level sharing
  • use the VSAM integrity and security options: RECOVERY, ERASE, VERIFY, and passwords
  • compare VSAM passwords with Resource Access Control Facility (RACF) security
  • Tuningexplain the use of CI and CA FREESPACE
  • discuss the performance impact of cache
  • describe the space allocation process with KEYRANGES and multivolume data sets
  • explain the contents of an Index CI
  • explain how VSAM key compression works
  • IDCAMS ALTERexplain the basic functions of the ALTER command
  • code the ALTER command to modify options for processing existing VSAM objects
  • code the ALTER command to modify options for buffering, FREESPACE, SHAREOPTIONS and passwords
  • Alternate indexesdescribe the reasons for using an alternate index
  • discuss the basic contents of an alternate index
  • use a PATH to process base cluster records directly and in alternate key sequence
  • define and load an alternate index
  • explain the impact of SHAREOPTIONS when opening a base cluster and associated alternate indices
  • explain programming and JCL considerations
  • Advanced functions and extended format data setsexplain VSAM advanced functions, extended format data sets, and their major features
  • explain data stripping
  • explain compression
  • explain multivolume allocation options
  • explain extended addressability
  • explain system managed buffering
  • explain partial space release
  • explain space constraint relief
  • Data set reorganization, backup, and recoverydescribe the need for data set backup
  • explain the advantages and disadvantages of REPRO
  • explain the advantages and disadvantages of EXPORT / IMPORT
  • explain the advantages and disadvantages of DFSMS Data Set Services (DFSMSdss) DUMP / RESTORE
  • explain the advantages and disadvantages of DFSMS Hierarchical Storage Management (DFSMShsm) HBACKDS / HRECOVER
  • discuss backup frequency
  • determine when reorganization is required
  • code the AMS commands for backup, recovery, and reorganization
  • Linear Data Sets (LDS)describe Data-In-Virtual (DIV)
  • explain the structure and use of LDS
  • explain the use of the DIV macro to access LDS
  • discuss candidates for LDS
  • Management and problem analysis aidsexplain the use of the DCOLLECT command to gather management and planning information about the storage subsystem
  • discuss tools used to identify and trace VSAM errors
  • code the AMS EXAMINE command to test the structure of a Key Sequenced Data Set (KSDS)
  • interpret EXAMINE output to determine how to recover from a KSDS structural error
  • invoke the Generalized Trace Facility (GTF) to track VSAM-related events
  • invoke utilities to print GTF trace output
  • Local and global shared resourcesexplain techniques to conserve virtual storage by sharing buffers and control blocks
  • discuss the concept of shared resource pools
  • discuss the advantages and disadvantages of Local Shared Resources (LSR)
  • discuss the advantages and disadvantages of Global Shared Resources (GSR)
  • describe macros that control use and allocation of shared resources
  • discuss how to specify and monitor shared buffer allocation in CICS and Information Management System (IMS)
  • CICS VSAM recoverydescribe the major functions of CICS VSAM recovery
  • explain the concept of transaction processing, backup, and recovery
  • explain how to implement and manage CICS VSAM recovery
  • Application coding considerationsdescribe VSAM processing terminology
  • define various VSAM processing options
  • explain the merge of catalog entries, JCL parameters, and program definitions that determine processing options
  • discuss VSAM programming support, and JCL requirements in Common Business Oriented Language (COBOL), Programming Language One (PL/I), and Assembler languages
  • describe JCL and programming requirements for COBOL, PL/I, and Assembler languages
  • .

    IBM Training

    Objective: _x000D_

  • Understand the structure and use of VSAM data sets or clusters
  • _x000D_
  • Code IDCAMS commands to define and load VSAM clusters
  • _x000D_
  • Code IDCAMS commands to define and load alternate indexes
  • _x000D_
  • Code IDCAMS commands to list, alter, and delete catalog entries
  • _x000D_
  • Code IDCAMS commands to print data sets
  • _x000D_
  • Calculate the Direct Access Storage Device (DASD) space requirements for VSAM clusters
  • _x000D_
  • Code the Job Control Language (JCL) for IDCAMS and programs which process VSAM clusters
  • _x000D_
  • Use IDCAMS and JCL options to improve the performance of a VSAM job
  • _x000D_
  • Reorganize, back up, and recover VSAM and non-VSAM data sets
  • _x000D_
  • Interpret an IDCAMS listing of an Integrated Catalog Facility (ICF) catalog
  • _x000D_
  • Select and use the appropriate documentation to utilize VSAM and IDCAMS
  • _x000D_

    Category: Systems

     

    Product Name:

    IBM z/OS Cloud Broker

     

    Badge and Certification Info:

    Badge Title:

    Badge ID: NONE

     

    Brand: Storage

     

    IBM Training is available now.

    Cyber Retaliator Solutions (CRS) is a Cyber Security Distributor, Authorized IBM Training Center, Red Hat and SUSE Training Partner, and a CompTIA Training Delivery Partner, operating throughout the Globe. Our Head Office is in Centurion South Africa, with IBM Training Centers in Centurion, Midrand, Sandton, Cape Town, California CA, Florida FL, New York NY, Washington DC, Georgia GA, Texas TX.

     

    CRS is the Top Global Training Provider for some of the world's biggest brands.

    Authorized Training delivered to you by the global leader in IBM Training.

     

    Select courses in:

    IBM Cloud

    DataPower

    IBM Automation

    IBM Rational

    Watson

    IBM Tivoli

    IBM Systems

    Cognos

    IBM Storage

    Mainframe

    IBM Security

    System Z

    IBM Industry

    IBM Asset Management

    Websphere

    IBM Data and AI

    Get the Best IBM Training from CRS. As an IBM Training Provider, we've partnered with IBM through Arrow ECS to deliver training that covers the full portfolio of IBM systems and software.

    Authorized IBM Training

    RedHat Training

    SUSE Training

    Agile SAFe Training

    Cyber Awareness Training

    Cyber Security

    Get the Best IBM Training from CRS. As an IBM Training Provider, we've partnered with IBM through Arrow ECS to deliver training that covers the full portfolio of IBM systems and software.

     

    Authorized IBM Training
    RedHat Training
    SUSE Training
    Cyber Awareness Training
    Agile SAFe Training
    Cyber Security

     

     

    CRS offers

    IBM Training

    and

    IBM Certification Training

    across

    The United States of America

    with locations:

    4700 Millenia Blvd., Orlando, Florida 32839

    250 Park Avenue, New York, New York 10177

    4900 California Avenue, Tower B, Bakersfield, California 93309

    1300 I Street NW, Washington, District of Columbia 20005

    235 W Roosevelt Ave, Albany, Georgia 31701

    4400 Buffalo Gap Rd., Abilene, Texas 79606

     

     

    Follow CRS:

     

    Follow on Courses:

    Replaced By: 

    SS83G z/OS VSAM Access Method Services

    z - MVS-1 (1)

    The price on this page are indicative. Please contact CRS via the above form to confirm pricing.

    Call Now +27 12 023 1959