Enscribe Programmer's Guide

Blocks............................................................................................................................125
Disk Extent Size...............................................................................................................125
File Creation Examples.....................................................................................................125
Accessing Entry-Sequenced Files.............................................................................................131
Sequential Access............................................................................................................131
Random Access...............................................................................................................131
Access Examples.............................................................................................................132
9 Relative Files..........................................................................................134
Enscribe Relative Files............................................................................................................134
Applicable System Procedures................................................................................................135
Types of Access....................................................................................................................135
Creating Relative Files...........................................................................................................136
Logical Records...............................................................................................................136
Blocks............................................................................................................................137
Disk Extent Size...............................................................................................................137
File Creation Examples.....................................................................................................137
Accessing Relative File..........................................................................................................144
The File Pointers...............................................................................................................144
Effects of File-System Procedures on Pointers.........................................................................144
Sequential Access............................................................................................................145
Random Access...............................................................................................................146
Inserting Records.............................................................................................................146
Deleting Records..............................................................................................................147
File Access Examples........................................................................................................147
10 File and Record Locking.........................................................................150
Enscribe File and Record Locks...............................................................................................150
Locking Modes.....................................................................................................................150
File Locking..........................................................................................................................151
Record Locking.....................................................................................................................151
Generic Locking...................................................................................................................152
Interaction Between File Locks and Record Locks.......................................................................154
Lock Limits...........................................................................................................................154
Deadlock.............................................................................................................................154
File Locking and Record Locking With Unstructured Files............................................................155
TMF Locking Considerations...................................................................................................155
Errors in Opening Audited Files.........................................................................................157
Reading Deleted Records..................................................................................................158
Batch Updates.................................................................................................................158
11 Errors and Error Recovery.......................................................................159
Error Message Categories.....................................................................................................159
Communication Path Errors....................................................................................................159
Data Errors..........................................................................................................................159
Device Operation Error..........................................................................................................159
Extent-Allocation Errors..........................................................................................................159
Errors and Partitioned Files.....................................................................................................160
Failure of the Primary Application Process................................................................................160
12 File Loading.........................................................................................161
File Utility Program (FUP) Commands......................................................................................161
Loading a Key-Sequenced File................................................................................................161
Defining a New Alternate Key................................................................................................161
Creating an Alternate-Key File................................................................................................162
Reloading a Key-Sequenced File Partition.................................................................................162
Creating a Partitioned Alternate-Key File..................................................................................162
6 Contents