Technology Driven IT Training Longstanding IT Technologists Computer Education Techniques
Distance-learning - VSAM: Structure and Strategies

Home

distance-learning center

Distance-learning Distance-learning_Building

Professional Distance-learning

IT Training Services


MFVSM02

VSAM: Structure and Strategies
DURATION: 5 days

FEE: $2,475

PRIVATE GROUP FEE: $
Based upon a class size of six students.

Scheduling can be adjusted to employee work hours and incorporate client assignments.

SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.

AUDIENCE:

  • Programmer
  • System Designer
  • System Programmer
  • IT Professional
 
   

DATES:

CONTENT AND OBJECTIVES:
    1. VSAM: Introduction and Overview
      • Review the clusters in different VSAM datasets.
    2. Access Method Services
      • Demonstrate sequence errors and replace the content of the dataset; this is the REUSE command.
    3. VSAM Datasets
      • Identify the relationships between the base and indexes.
    4. Application Programming
      • Code a COBOL, Assembler, or PL/1 program that accesses and updates a KSDS without the AIX and another program that uses the AIX.
      • DEFINE and BLDINDEX commands.
    5. Alternate Indexes and Paths
      • Define an AIX for the KSDS from the previous exercise.
    6. VSAM Components and Evolution
      • Examine the details of a KSDS with AIX LISTCAT.
      • Locate import and information such as statistics, attributes, index levels, CI sizes and track sizes.
      • Calculate ratios to determine if the dataset is operating efficiently.
      • Change the attribute of a VSAM dataset.
      • Export a KSDS, delete the KSDS and import the exported dataset.
    7. KSDS Structure
      • Identify the components and relationships in a KSDS with an AIX.
    8. The Cluster on the Disk
      • Identify the components and relationships in an ESDS and RRDS.
    9. Tuning AMS: DEFINE CLUSTER
      • Run a load operation with the SPEED command and another with the RECOVERY command.
      • Identify the difference in performance.
    10. Alternative Indexes and Paths
      • Dump an AIX with IDCAMS and review the control information and pointers.
    11. Programming for Performance
      • Given an existing VSAM dataset, determine whether the file is performing efficiently.
      • Identify the cause of the problem and resolve the problem.
      • There will be more than one problem which needs to be resolved.
    12. Strings and Buffer Pools
      • Calculate string count for an application design.
    13. Monitoring for Performance
      • Determine whether the structure of a VSAM dataset is intact and operating properly.

 
 
    Virtual Classroom   Blended Learning    
Synchronous
Instruction
Asynchronous
Instruction

 

Effective February 27, 2012, the course dates listed on the CETi schedules only will be available based upon approved and authorized user ID.

Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. CETi makes no representation regarding ownership in any of the software products that we train on.

CETi courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the CETi course and that the employer has a licensed version of the software.

Certain courses only should be taught by the source software company training company and open source purveyor.