Using NS3000/iX Network Services (36920-90008)

Chapter 5 85
Network File Transfer
Using DSCOPY
Lockwords. If the sourcefile has a lockword, and the target file is
implied, then the targetfile will get the same lockword as the sourcefile.
If a targetfile already exists, and you want to give it a new lockword,
you must specify the targetfile and its lockword.
Message Files. MPE/iX message files must be transferred in
Transparent Format. They will not be copied if Interchange Format is
used; thus they can be copied to HP 3000 systems only.
KSAM Files. KSAM file pairs (data files and corresponding key files)
can be transferred together as pairs using Transparent Format. Files
must be transferred one at a time if Interchange Format is used. (Note:
Because Interchange Format causes file characteristics to be lost,
KSAM files might be unusable if copied using Interchange Mode.)
Using Transparent Format, KSAM file pairs can be specified as source
or target files in two ways, as follows:
Specify only the name of the data file. In this case, NFT will create
both data and target key files; the key file copy will be the same
name as the data file copy with the letter “K” appended to it.
Specify both data and key files, using the following syntax:
datafilename,keyfilename
The names of the data and key files must be enclosed in quotes.
If either of the target file names specified in a KSAM file transfer
already exists, DSCOPY will report an error. To avoid this, you can use
the REP option so that the existing file is replaced by the contents of the
source file. However, specifying REP will cause to purge the existing
KSAM file on the target node before the new file replaces it. If a KSAM
file (either data or key file) were open when a system failure occurred,
attempts to copy the file with DSCOPY will normally be unsuccessful.
However, if the same file or files is copied in a generic transfer (using
wildcard characters), no error message will appear, but the target file
will be unusable. Refer to the KSAM/3000 Reference Manual for
recovery procedures that can be used to make the KSAM files (both
source and target) usable.
Requesting Transfers from Files. DSCOPY requests can be issued
from command files as well as being issued directly from the keyboard.
A command file is an unnumbered text file that contains one or more
file transfer requests. Each request in the file must consist of source
and target file specifications as well as any desired options. Do not
include the word “DSCOPY” in the file.
To issue a DSCOPY request from within a file, you must first issue a file
equation equating the formal designator DSCOPYI to the file containing
the request.