TAF_Ver_1_Ref_Man_60459500C_Mar85 TAF Ver 1 Ref Man 60459500C Mar85
User Manual: Pdf TAF_Ver_1_Ref_Man_60459500C_Mar85
Open the PDF directly: View PDF .
Page Count: 226
Download | |
Open PDF In Browser | View PDF |
60459500 CONTRPL DATA TAF VERSION 1 REFERENCE MANUAL J0&K CDC® OPERATING SYSTEM: NOS 2 REVISION RECORD b / ^ w REVISION (04-26-82) B (01-27-83) (03-29-85) DESCRIPTION Manual released. This manual reflects NOS 2.0 at PSR level 562. New TAF feature documented in this manual is TAF automatic recovery. Features documented in the TAF/CRM Reference Manual that are reflected in this manual are: TAF/CRM automatic recovery, TAF/CRM batch concurrency, TAF/CRM batch recovery, and TAF/CRM MIP and AK support. Manual updated to PSR level 580. New RMKDEF statements were added to the xxJ file for multiple index file recovery and clarifications were made of LIBTASK and recovery descriptions. Addition of the Login/Logout appendix, and revision of the Terminal Definition appendix and the Line Transmission Key appendix. This edition obsoletes all previous editions. Manual updated to NOS 2.4.1 at PSR level 630. This revision reflects the addition of the user statement to the TAF configuration file and of the send message task (STASK). Appendix G, Terminal Definition Commands, and appendix J, Accessing a Host, have been revised. The IBM 3270 terminal has been added to the set of supported terminals. Several technical and editorial changes have been made. Publication No. 60459500 REVISION LETTERS 1, O. Q, S. X AND Z ARE NOT USED. Address comments concerning this manual to: © 1982, 1983, 1985 by Control Data Corporation All rights reserved Printed in che United States of America Control Data Corporation Publications and Graphics Division 4201 North Lexington Avenue S t . P a u l , M i n n e s o t a 5 5 11 2 or use Comment Sheet in che back of this manual. LIST OF EFFECTIVE PAGES New features, as well as changes, deletions, and additions to information in this manual, are indicated by bars in the margins or by a dot near the page number if the entire page is affected. A bar by the page number indicates pagination rather than content has changed. PAGE Front Cover Inside Front Cover Title Page 2 3/4 5 6 7 8 9 10 1-1 1-2 1-3 1-4 1-5 2-1 2-2 2-3 2-4 2-5 2-6 2-7 2-8 2-9 2-10 2-11 2-12 2-13 2-14 2-15 2-16 2-17 2-18 2-19 2-20 2-21 2-22 2-23 2-24 2-25 2-26 2-27 2-28 2-29 2-30 2-30.1/2-30.2 2-31 2-32 2-33 2-34 2-35 2-36 2-37 2-38 2-39 2-40 2-41 60459500 C REV PAGE 2-42 3-1 4-1 4-2 4-3 4-4 4-4.1/4-4.2 4-5 4-6 4-7 4-8 4-9 5-1 5-2 5-3 5-4 6-1 6-2 6-3 6-4 6-5 7-1 7-2 7-3 7-4 7-5 8-1 8-2 8-3 8-4 8-5 8-6 9-1 9-2 10-1 10-2 10-3 10-4 10-5 10-6 10-7 10-8 11-1 11-2 12-1 12-2 12-3 12-4 12-5 A-l A-2 B-l B-2 B-3 B-4 B-5 B-6 B-7 B-8 REV PAGE B-9 B-10 B-ll B-12 B-l 3 B-14 B-l 5 B-16 B-l 7 B-18 B-l 9 B-20 B-21 B-22 B-23 B-24 B-25 B-26 B-2 7 C-l C-2 C-3 C-4 C-5 C-6 C-7 C-8 C-9 C-10 C-ll C-l 2 D-l E-l E-2 F-l F-2 F-3 F-4 F-5 G-l G-2 G-3 G-4 G-5 G-6 G-7 G-8 G-9 G-10 G-ll G-l 2 G-13 G-14 G-15 G-l 6 G-l 7 H-l H-2 1-1 REV PAGE REV PAGE REV J-l J-2 J-3 J-4 J-5 J-6 J-7 J-8 J-9 J-10 J-ll J-12 J-l 3 J-14 J-l 5 J-16 J-l 7 J-18 J-l 9 J-20 Index-1 Index-2 Index-3 Index-4 Comment Sheet Back Cover ...-;. '1 3/4 /^^% PREFACE J^* T h e C O N T R O L D ATA ® Tr a n s a c t i o n F a c i l i t y ( TA F ) , Ve r s i o n 1 . 3 , i s a n e t w o r k h o s t p r o d u c t . I t i s a network application that requires the facilities of the Network Access Method (NAM) and the 255x Series Communications Control Program (CCP). TAF runs as a subsystem of the Network Operating System (NOS), Version 2, and may be used with COMPASS, FORTRAN, or COBOL. This manual documents the executive portion of TAF. The three data managers available for use with TAF are each documented in their respective reference manuals. These are: • CDC® CYBER Database Control System, Version 2 (CDCS) • CDC TAF/CRM Data Manager Version 1 (CRM) • CDC TOTAL Data Manager Version 2 the transaction executive imply the controlling p o r t i o n o f T A F, t h e p o r t i o n d e s c r i b e d i n t h i s manual. References to FORTRAN imply either FORTRAN Extended Version 4 or FORTRAN Version 5; TS mode is n o t a l l o w e d ( t h a t i s , t h e S E Q , T S , a n d O P T- O parameters are not allowed on the FTN command). References to COBOL imply Version 5. Where brackets, [ ], are used in task request format descriptions, they indicate optional parameters. The term alphanumeric refers to any combination of the letters A through Z and the numbers zero through nine; special characters are not included. Conventions for word formats are as follows: • Crosshatching indicates a field is not used by or is not applicable to TAF. Refer to the list of related publications for full titles and publication numbers of the respective manuals. • Reserved fields may contain information useful to TAF internal processing. The user should not expect them to contain any partic ular values. AUDIENCE • Fields labeled with mnemonics indicate that a specific parameter must be inserted (gener ally described after the word format). This manual is for the data administrator and a p p l i c a t i o n s p r o g r a m m e r. T h e d a t a a d m i n i s t r a t o r (DA) is a person or a group of people responsible for installing and maintaining the transaction subsystem. This person or group sets up the data base and describes the relationships among the various elements. The DA is concerned with the internal design of the system and can modify many of the system components to suit site requirements. An applications programmer is a person who writes tasks in FORTRAN, COBOL, or COMPASS to be used by the end user (terminal operator). Using these tasks, the terminal operator can access and update the data base with little or no knowledge of TAF. New users of TAF should consult the TAF I User's Guide as a fi r s t s o u r c e o f i n f o r m a t i o n . I t i s a n i n t r o d u c t o r y text for inexperienced users. The user must be familiar with basic NOS operations such as running a compilation job. The NOS 2 Reference Set, Volume 2, acquaints the new user with the fundamentals of NOS. The NOS 2 Reference Set, Volume 3, is for the high-level language applications programmer who is already familiar with NOS. The NOS 2 Reference Set, Volume 4, is for the COMPASS applications programmer. TERMINOLOGY AND CONVENTIONS References in this manual to the transaction subsystem imply every aspect of TAF. References to 60459500 C • Fields with numeric identifiers indicate the actual value that is used or returned for a particular request. Models 815, 825, 835, 845, and 855 of the CYBER 170 Computer Systems share many of the functional and architectural attributes of the CYBER 180 computer systems (models 810, 830, 835, 840, 845, 850, 855, and 860). The term CYBER 180-class machines de scribes these similar models collectively. Extended memory for model 176 is large central memory extended (LCME). Extended memory for models 865, 875 and CYBER 180-class machines is unified extended memory (UEM). Extended memory for models 865 and 875 may also include either extended core storage (ECS) or extended semiconductor memory (ESM). Extended memory for all other NOS computer systems is either ECS or ESM. ECS and ESM are the only forms of extended memory that can be shared in a linked shared device multimainframe complex and can be accessed by a distributed data path (DDP). In this manual, extended memory refers to all forms of extended memory unless otherwise noted. Programming information for the various forms of extended memory can be found in the COMPASS 3 Reference Manual and in the appropriate computer system hardware reference manual. Publication Control Data Publication Number RELATED PUBLICATIONS The following manuals contain additional information for the user. Publication Control Data Publication Number NOS Version 2 Reference Set, Volume 2, Guide to Systeo Usage 60459670 NOS Version 2 Reference Set, Vo l u m e 3 , S y s t e m C o m m a n d s 6 0 4 5 9 6 8 0 COBOL Version 5 Reference Manual 60497100 Common Memory Manager Version 1 Reference Manual COMPASS Version 3 Reference Manual CYBER Database Control System Version 2 Data Administration Reference Manual NOS Version 2 Reference Set, Vo l u m e 4 , P r o g r a m I n t e r f a c e 6 0 4 5 9 6 9 0 60499200 60492600 TA F Ve r s i o n 1 U s e r ' s G u i d e 6 0 4 5 9 5 2 0 60485200 TAF/CRM Data Manager Ve r s i o n 1 R e f e r e n c e M a n u a l 6 0 4 5 9 5 1 0 60485300 CYBER Loader Version 1 Reference Manual 60429800 FORTRAN Extended Version 4 Reference Manual 60497800 FORTRAN Version 5 Reference Manual 60481300 Network Products Network Access Method Version I Network Defini tion Language Reference Manual 60480000 Network Products Network Access Method Version 1/ Communications Control Program Version 3 Host Applicaton Programming Reference Manual 60499500 NOS Version 2 Network Terminal User's Instant 60459380 NOS Version 2 Installation Handbook 60459320 NOS Version 2 Manual Abstracts 60485500 NOS Version 2 Operations Handbook 60459310 CYBER Record Manager Advanced Access Methods Version 2 Reference Manual 60499300 60495700 Network Products Network Access Methods Version 1/ Communications Control Program Version 3 Terminal Interfaces Reference Manual 60480600 NOS Version 2 Reference Set, Volume 1, Introduction to Interactive Usage 60459840 NOS Version 2 Analysis Handbook 60459300 CYBER Database Control System Version 2 Application Program ming Reference Manual CYBER Record Manager Basic Access Methods Version 1.5 Reference Manual NOS Version 2 Administration Handbook 60459660 TOTAL - CDC Version 2 Reference Manual 76070300 The NOS 2 Manual Abstracts is a pocket-sized manual containing brief descriptions of the contents and intended audience of all NOS and NOS product manuals. The abstracts can be useful in determining the manuals of greatest interest to a particular user. Control Data also publishes a Software Publications Release History, publication number 60481000, of all software manuals and revisions packets it has issued. This history lists the revision level of a particular manual that corresponds to the level of software installed at the site. These manuals are available through Control Data sales offices or Control Data Literature Distribution Services (308 North Dale, St. Paul, Minnesota 55103). SUBMITTING COMMENTS The last page of this manual is a comment sheet. Please use it to give your opinion on the manual's usablility, to suggest specific improvements, and to report any errors. If the comment sheet has already been used, you can mail you comments to: Control Data Corporation Publications and Graphics Division ARH219 4201 Lexington Avenue North St. Paul, MN 55112 A d d i t i o n a l l y, ' i f y o u h a v e a c c e s s t o S O LV E R , a n online facility for reporting problems, you can use it to submit comments about the manual. Declare your problem type as DOC and use NS2 as the product i d e n t i fi e r . DISCLAIMER This product is intended for use only as described in this document. Control Data cannot be responsible for the proper functioning of undescribed features or parameters. 60459500 C /^^K J^V CONTENTS 1. r INTRODUCTION l-l RERUN Request RPUT and RGET Requests RSECURE Request SECURE Request TSTAT Request System Task Recovery Requests CALLTRN Request SRERUN Request TINVOKE Request WSTAT Request 2-32 2-33 2-34 2-35 2-37 2-38 2-38 2-40 2-40 2-41 O n - L i n e Tr a n s a c t i o n P r o c e s s i n g A d v a n t a g e s l - l On-Line Transaction Processing Problems l-l Batch Interface 1-3 Network Interface 1-3 Ta s k s 1-4 Transaction Processing 1-4 TA F Requests 1-4 Entering the Transaction Subsystem 1-4 Implementing an Application 1-5 Subcontrol Points 1-5 Multimainframe 1-5 Extended Memory 1-5 3. ACCESS AND USE OF CDCS BY TASKS 3-1 2. 4. SYSTEM FILES 4-1 xxJ File CRM Data Manager xxJ File TOTAL Data Manager xxJ File CDCS or No Data Manager xxJ File Creating an xxJ File Journal Files System Journal File Data Base Journal Files Journal File Entry Header JOURNL Request TAF Configuration File DMS Statement DISPLAY Statement NETWORK Statement RECOVER Statement K. Statement User Statement Communication Recovery File 4-1 4-1 4-4 4-4 TASK/TRANSACTION EXECUTIVE INTERFACE Communication Block Requests Data Manager Requests Journal File Requests Memory Dump Requests System Requests Memory Requests (COMPASS Only) Message Requests Task Scheduling Requests CALLRTN Request CALLTSK Request NEWTRAN Request (COMPASS Only) TRANCHK Request Input/Output Requests WAITINP Request LOADCB Request SETCHT Request BLDABH Request GETABH Request TERMDEF Request SEND Request RELSCB Request TSIM Request TARO Request I10 Request BWAITINP Request (COMPASS Only) TPSTAT Request (COMPASS Only) BEGIN Request Task Control Requests CEASE Request ITL Request LOGT Request (COMPASS Only) KPOINT Request WAIT Request Task Utility Requests LOGIN Request EXTRACT Request INSERT Request Application Recovery Requests 60459500 C 2-1 2-1 2-3 2-3 2-3 2-3 2-3 2-3 2-4 2-4 2-4 2-6 2-7 2-8 2-8 2-9 2-10 2-11 2-12 2-14 2-16 2-17 2-23 2-23 2-26 2-27 2-28 2-28 2-28 2-28 2-28 2-29 2-29 2-30 2-30 2-30.1 2-31 2-31 2-32 2-32 4-4.1 4-5 4-5 4-5 4-5 4-5 4-7 4-7 4-7 4-8 4-8 4-8 4-8 4-8 5. BATCH/TRANSACTION SUBSYSTEM INTERACTION 5-1 BTRAN Request SUBMT Request 5-1 5-3 6. MEMORY DUMPS 6-1 Task Dump DSDUMP Request CMDUMP Request K.DSDUMP Command KTSDMP Utility Task Dump Formats TAF Dump K.DUMP Command K.DUMPLIM Command 6-1 6-1 6-3 6-4 6-4 6-4 6-4 6-5 6-5 7. APPLICATIONS INTERFACE FOR AUTOMATIC RECOVERY Purpose Concepts Named-Transactions and Run Units Data Base Recovery Transaction Recovery Coding Coding Structures for Data Base Recovery Only Transactions Using CRM TAF Transactions Using CDCS Coding Structures for Transaction Recovery Transactions Using CRM TAF Transactions Using CDCS Terminal Recovery Considerations CALLTSK without CEASE and RECOVERY Multiple Data Manager Use TOTAL Data Manager Use 8. DATA ADMINISTRATOR AND OPERATOR INTERFACE FOR RECOVERY 7-1 7-1 7-1 7-1 7-1 7-1 7-2 7-2 7-2 7-2 7-3 7-3 7-3 7-4 7-5 7-5 7-5 8-1 Recovery Overview Hardware Configuration Considerations Installation TAF K Display Initial K Display K.INT Command K.ERO Command K.REC Command Restart K Display TCF/CRF Recovery Considerations TAF Configuration File Communication Recovery File Error Override File Reformatting Multiple Communication Recovery Files Multimainframe Recovery Recovery Processing Flow TAF and System Failure NAM Failure Terminal Failure CDCS Failure Task Failure TAF Termination TAF Automatic Recovery Report 8-1 8-2 8-2 9. NETWORK FILES 9-1 Terminal Network Description File Network File Origination 9-1 9-1 8-2 8-2 8-2 8-3 8-3 8-3 8-3 8-3 8-3 8-3 8-3 8-4 8-4 8-4 8-4 8-5 8-5 8-5 8-5 8-5 8-6 10. TA S K LIBRARY 10-1 L I B TA S K Utility Ta s k Residency and Type L I B TA S K Command Input Directives Named-Transaction Input Directive Ta s k Input Directive Scheduling Priority Creating a New Ta s k Library U p d a t i n g a n E x i s t i n g Ta s k L i b r a r y D e l e t i n g a Ta s k f r o m a Ta s k L i b r a r y I g n o r i n g a Ta s k i n t h e R e p l a c e m e n t F i l e 10-1 10-1 10-2 10-5 10-5 10-5 10-7 10-7 10-7 10-7 10-8 11. REQUIRED SYSTEM TASKS AND TRANSACTIONS U-l BTRAN Recovery Ta s k ( B TA S K ) D a t a B a s e R e c o v e r y Ta s k ( C TA S K ) Initial Ta s k ( I TA S K ) K Display Ta s k (KDIS) Logout Ta s k (LOGT) Message Abort (MSABT) Inactive Ta s k ( O F F TA S K ) CDCS Rerun Ta s k ( R C TA S K ) R u n U n i t R e c o v e r y Ta s k ( R TA S K ) Send Message Task (STASK) System Message Task (SYSMSG) Execute Named Task (XTASK) XTRAN Transaction 11 11 11 11 11 11 11 - 2 11 - 2 11 - 2 11-2 11-2 11-2 11-2 12. ITASK SYSTEM TASK 12-1 Macros TIMCNT Macro TRAN Macro STRAN Macro ITASK Description TAF-Originated Transactions Conditions Requiring TAF-Originated Transactions Time Activation K.IDLE Console Operator Command Terminal Login Terminal Break Conditions Terminal Connection Broken Network Normal Shutdown Network Failure Network Immediate Shutdown Terminal Inactive Logical Error Block Not Delivered Terminal Characteristic Change Terminal Input Too Large Terminal Type Ahead User Status 12-1 12-1 12-1 12-1 12-2 12-3 12-3 12-3 12-3 12-4 12-4 12-4 12-4 12-4 12-4 12-4 12-4 12-5 12-5 12-5 12-5 12-5 APPENDIXES A. CHARACTER SETS A-l D. SAMPLE COMMAND LIST STRUCTURES B. DIAGNOSTIC MESSAGES B-l COMPASS Task Command List Structure FORTRAN Task Command List Structure COBOL Task Command List Structure C. GLOSSARY C-l E. FILES USED BY TAF • 8 D-l D-l D-l D-l E-l 60459500 C /rfS^ly Jffev JP^ F. INSTALLATION OVERVIEW F-l G. TERMINAL DEFINITION COMMANDS G-l Introduction Terminal Definition Command Format Restrictions Terminal Definition Commands (AB) - Abort Output Block Character (AR) - Automatic Character Recognition (BF) - Blocking Factor (BR) - Break Key as User Break 1 (BS) - Backspace Character (Bl) - Interruption or User Break 1 Character (B2) - Termination or User Break 2 Character (CH) - Display Terminal Characteristics (CI) - Carriage Return Idle Count (CN) - Cancel Character (CP) - Cursor Positioning after Input (CT) - Network Control Character (DL) - Delimiters for Single-Message Transparent Input Mode (EB) - End-of-Block Character (EL) - End-of-Line Character (EP) - Echoplex Mode (FA) - Full-ASCII Input Mode (HC) - Host Connection (HD) - Display of Host Nodes (HN) - Host Node Selection (HS) - Host Selection (IC) - Flow Control for Input Devices (IN) - Input Device and Transmission Mode (LI) - Line Feed Idle Count (LK) - Lockout of Unsolicited Messages (MS) - Message to Network Operator (OC) - Flow Control for Output Devices (OP) - Output Device Selection (PA) - Parity Processing (PG) - Page Waiting (PL) - Page Length (PW) - Page Width (SE) - Special Editing Mode (TC) - Terminal Class Command (TM) - Terminating a Terminal-Host Connection (XL) - Multimessage Transparent Mode G-l G-l G-2 G-2 G-3 G-3 G-3 G-3 G-4 G-4 G-4 G-4 G-4 G-5 G-5 G-5 G-5 G-6 G-7 G-7 G-7 G-8 G-8 G-9 G-9 G-9 G-9 G-10 G-10 G-10 G-ll G-ll G-ll G-l 2 G-12 G-12 G-12 G-12 G-13 G-13 H. DELIMITING AND TRANSMITTING TERMINAL INPUT H-l Physical End-of-Line (Line Feed) H-l Logical End-of-Line (Carriage Return) H-l Message Transmission H-l I. DETECTION OF POTENTIALLY BLOCKED TASKS I-I J. ACCESSING Brief Description A HOST J-l of Access J-l Step 1 - Gathering Information J-i S t e p 2 - S e t t i n g U p Yo u r Te r m i n a l J - l Step 3 - Connecting Your Terminal to the Network J-l Step 4 - Identifying Your Terminal to the Network J-3 Step 5 Selecting a Host J-3 Step 6 - Connecting to the Selected Host J-3 Step 7 - Identifying Yourself and Your Te r m i n a l to the Host J-4 Step 8 - Selecting a Network Application J-4 Detailed Description of Access J-4 Step 1 - Gathering Information J-4 S t e p 2 - S e t t i n g U p Yo u r Te r m i n a l J - 7 Step 3 - Connecting Your Terminal to the Network J-8 Step 4 - Identifying Your Terminal to the Network J-8 Procedure for Asynchronous Terminals J-8 P r o c e d u r e f o r H A S P Te r m i n a l s J - 9 P r o c e d u r e f o r M o d e 4 Te r m i n a l s J - 1 0 Procedure for Bisynchronous Terminals J-10 Step 5 Selecting a Host J-10 Selecting a Host J-10 S e l e c t i n g a S p e c i fi c H o s t P a t h J - i I Controlling the Display of Host Paths J—11 Step 6 - Connecting to the Selected Host J-13 Step 7 - Identifying Yourself and Your Te r m i n a l to the Host J-13 Automatic Login J-14 Login Dialog J-14 Step 8 - Selecting a Network Application J-15 Automatic Connection J-15 Manual Connection J-15 Abbreviated Login and Application Connection J-16 Switching to a Different Application J-16 Direct Switches J-16 Indirect Switches J-17 Dialog for Direct and Indirect Switches J-17 R e s t a r t i n g L o g i n I d e n t i fi c a t i o n J - 1 7 Direct Restarts J-17 Indirect Restarts J-17 Secure Login Restarts J-17 Disconnecting from a Host J-18 Disconnecting with Application Commands J-18 Disconnecting with Host Commands J-18 Disconnecting with a Network Software Command J-18 Reconnecting to a Host or Connecting to a Different Host J-18 Disconnecting from One Host and Connecting to a Different Host J-18 Interruptions J-19 Communicating with the Network Operator J-19 Receiving Messages J-19 Sending Messages J-19 Preventing Messages J-19 Suspensions of Communication J-19 Communication Failures J-19 Application Failures J-20 Disconnection from an Application and/or Host J-20 Disconnection from the Network J-20 INDEX 0^ 60459500 C FIGURES 1-1 TAF Control Point for CDCS Data Manager 1-2 TAF Control Point for TAF/CRM Data Manager 1-3 TAF Control Point for TOTAL Data Manager 2-1 Communication Block Format 2-2 CALLRTN 2-3 CALLRTN (Chain) 2-4 CALLRTN (Multiple Chains) 2-5 CALLTSK with CEASE Request 2-6 CALLTSK without CEASE Request 2-7 NEWTRAN Parameter Table 2-8 TRANCHK Parameter Table 2-9 LOADCB Parameter Table 2-10 SETCHT Parameter Table 2-11 GETABH Parameter Table 2-12 TERMDEF Parameter Table 2-13 SEND Parameter Table 2-14 TSIM Parameter Table 2-15 TARO Parameter Table 2-16 IIO Parameter Table 2-17 ITL Parameter Table 4 - 1 J o u r n a l F i l e ( B u ff e r e d a n d Nonbuffered Structure) 4-2 Journal File Entry Header 4-3 JOURNL Parameter Table 5-1 BTRAN Header Word 5-2 BTRAN Request 5-3 SUBMT Parameter Table 1-2 1-2 1-3 2-2 2-5 2-5 2-5 2-6 2-7 2-7 2-8 2-11 2-13 2-15 2-17 2-23 2-25 2-27 2-27 2-30 4-2 4-6 4-6 5-2 5-2 5-3 5-4 6-1 6-2 6-3 7-1 8-1 9-1 10-1 12-1 12-2 12-3 12-4 D-l D-2 D-3 J-l J-2 J-3 J-4 J-5 J-6 J-7 J-8 J-9 SUBMT Request 5-4 DSDUMP Parameter Ta b l e 6-3 CMDUMP Parameter Ta b l e 6-4 KTSDMP Format 6-5 Recoverable TAF Transaction Using CDCS 7-4 Format of Part Three of the TAF Automatic Recovery Report 8-6 Communication Between a Terminal Status Ta b l e a n d a C o m m u n i c a t i o n B l o c k 9 - 2 Ta s k Library Report 10-4 F o r m a t o f a T T O T Ta b l e E n t r y 1 2 - 1 F o r m a t o f a T R A N T Ta b l e E n t r y 1 2 - 2 F o r m a t o f a T R A N S Ta b l e E n t r y 1 2 - 2 Communication Block for TAFOriginated Transactions 12-3 C O M PA S S C o m m a n d L i s t S t r u c t u r e D - l FORTRAN Command List Structure D-l COBOL Command List Structure D-l Separate Acoustic Coupler J-2 D a t a S e t B u i l t i n t o t h e Te r m i n a l J - 2 Data Sets with Switches and Buttons J-2 Terminal with Built-in Acoustic Coupler J-3 Interactive Display Console J-5 Interactive Printer Console J-5 Remote Batch Te r m i n a l J-6 Host Availability Display J-ll Sample Login from an Asynchronous Te r m i n a l J-13 TABLES 2-1 BLDABH Request Parameters 2-13 2-2 Application Block Header 2-15 2-3 COBOL SEND Request Parameters 2-18 2-4 FORTRAN SEND Request Parameters 2-20 2-5 COMPASS SEND Request Parameters 2-21 2-6 COMPASS SEND Parameter Interrelationships 2-24 2 - 7 T S AT K e y w o r d D e s c r i p t i o n s 2 - 3 9 2 - 8 W S TAT K e y w o r d D e s c r i p t i o n s 2 - 4 2 5-1 BTRAN Status Va l u e s 5-2 • 10 A-l E-l F-l G-l G-2 H-l 7-Bit ASCII Code Standard Print 63/64-Character Set Files Used by TAF Installation Overview Default Terminal Definitions Parameter Ranges for Terminal Definition Commands Default Message Delimiter and Transmission Keys A-l E-l F-2 G-l 5 /*S3l8v G-16 H-2 60459500 C /iS|!X INTRODUCTION /fp^>, TAF is a network product that controls transaction processing. Transaction processing consists of taking an existing collection of information, called a data base, and correcting old data or adding new data to create an up-to-date data base. Such a correction or addition is called a transaction. In a transaction processing system, the data base must be efficiently structured and easily accessible to the user. A data manager provides these features. Control Data offers the following data managers for use with TAF. • The CYBER Database Control System (CDCS). • T h e C Y B E R R e c o r d M a n a g e r ( C R M ) . ( TA F supports only those features documented In the TAF/CRM Data Manager 1 Reference Manual.) • The TOTAL Data Manager. A l l d a t a m a n a g e r s c a n o p e r a t e c o n c u r r e n t l y. However, a single transaction can use only: • CDCS and one other data manager, T h e m o s t i m p o r t a n t f e a t u r e o f TA F i s i t s e f fi c i e n t s y s t e m r e s o u r c e u t i l i z a t i o n . TA F ' s t r a n s a c t i o n processing differs from other modes of operation in that a task only contains application code. Terminal communications are handled by one terminal communications interface. Data base communications are handled by one copy of a data base manager. When tasks need to be loaded, they are simply copied from a task library to a subcontrol point; none of the normal overhead of loading is incurred. The TAF control point contains application tasks as subcontrol points. When a task completes, one of the following occurs: • It may be immediately reused by other waiting transactions (no reloading is necessary). • Another task may be loaded in its place. • Other active tasks may be moved up in memory and the remaining memory returned to the system for use by non-TAF applications. TAF will expand its memory to a maximum value as needed. or J8*V • CDCS alone, or • One other data manager alone. T h e m a i n f u n c t i o n o f TA F i s o n - l i n e t r a n s a c t i o n processing; that is, direct 'operator interface with the data base through a terminal. ON-LINE TRANSACTION PROCESSING ADVANTAGES Some advantages associated with on-line transaction processing are: • The operator submitting the data through TAF can make immediate data corrections. • The operator can verify that operations have c o m p l e t e d s u c c e s s f u l l y. TA F a l l o w s t h e operator to view additions or corrections to the data base to verify their accuracy. • T h e d a t a b a s e i s u p d a t e d i n s e c o n d s . TA F p r o v i d e s i m m e d i a t e u p d a t i n g c a p a b i l i t y, which allows other transactions to make use of the updated data base. 60459500 A W h e n t h e r e i s n o t r a n s a c t i o n a c t i v i t y, TA F s i z e i s reduced to a small amount of memory. When input is sensed, TAF rolls back in to service the request. Figures 1-1, 1-2, and 1-3 summarize the TAF control point and its operation. ON-LINE TRANSACTION PROCESSING PROBLEMS Some problems associated with on-line transaction p r o c e s s i n g a n d t h e m e t h o d s t h a t TA F u s e s t o alleviate them include the following. • It is difficult to schedule and control m u l t i p l e j o b s . TA F s o l v e s t h e p r o b l e m o f multiple job control scheduling by using subcontrol points. Like the operating system that controls and schedules jobs to control points (where they are processed), TA F c o n t r o l s a n d s c h e d u l e s t r a n s a c t i o n processing programs to portions of its control point called subcontrol points. Subcontrol points are protected from each other by CYBER hardware memory protection. • T h e t e r m i n a l i n t e r f a c e i s c o m p l i c a t e d . TA F minimizes terminal programming by using simple input/output (I/O) commands that are processed by the standard network terminal interface. 1-1 D ATA DESCRIPTION COMMANDS D ATA BASE D ATA DEFINITION TAF ^ COMMUNICA TION EXECUTIVE ^ D ATA BASE MANAGER D ATA DESCRIP TION TASKS LIBTASK TASK LIBRARY BATCH PROGRAM Figure 1-1. TAF Control Point for CDCS Data Manager TAF TRANSACTIONS COMMUNICA TION EXECUTIVE EXECUTIVE INTERACTIVE OR BATCH PROGRAM INTERACTIVE OR BATCH PROGRAM TASK LIBRARY DATA MANAGER DATA BASE c COMMANDS Figure 1-2. TAF Control Point for TAF/CRM Data Manager 1-2 60459500 B yrfSS^S. D ATA DESCRIPTION J^s TRANSACTIONS COMMUNICA TION EXECUTIVE EXECUTIVE TASK LIBRARY OATA BASE x DATA MANAGER r COMMANOS BATCH PROGRAM Figure 1-3. TAF Control Point for TOTAL Data Manager BATCH INTERFACE A b a t c h i n t e r f a c e w i t h TA F i s a l s o a v a i l a b l e . T h e batch interface can generate large reports without tying up a terminal until the listing has been printed. The report can be printed at a high-speed central site printer. Batch mode can also be used for testing and debugging. The batch interface is described in section 5. NETWORK INTERFACE The network terminal interface uses NAM and 255x communications processors. This interface is used by all other network products (for example, Remote Batch Facility and Interactive Facility). If validated, terminal users may select these applications as well as TAF. The network provides the following features for transaction processing. • Managing network protocol. • Buffering and queuing data for regulating data fl o w. • Supporting a wide variety of terminals through standardization of data formats as well as providing the ability to handle transparent data. • Sharing network among communication-oriented services. 60459500 A ^ ^ v The network makes use of the interactive virtual terminal (IVT) concept. This concept abstracts certain functions of a variety of real terminals. The applications programmer need not be concerned with character sets and communications protocols. • An IVT has an input/output device that sends or receives certain amounts of data termed logical lines* These logical lines are transformed into physical lines of characters of the appropriate character set for the real terminal. • Logical lines that exceed the physical capacity of the real terminal are automatically folded into two or more physical lines. • The spacing of logical lines of output can be further controlled by the use of format effectors. • Output to a device may be optionally paged, so that data that would overwrite any output being displayed is not sent until the terminal user has acknowledged the preceding output. Both the application and the terminal user c a n r e d e fi n e t e r m i n a l c h a r a c t e r i s t i c s o f t h e actual terminal, which may differ from those a s s u m e d , a n d s u p p l y o r r e d e fi n e t h e operational controls provided. 1-3 When an application requires features not provided by the IVT but known to exist on the connected real terminal, the application may do one of the following. • Embed appropriate control characters in the output text. • Tr a n s f e r d a t a i n t r a n s p a r e n t m o d e , i n w h i c h case all transforms are inhibited, and the application has direct access to and responsibility for all real terminal features including the character set. TASKS The applications programmer implements a transaction system by writing tasks. A task is a program with a TA F i n t e r f a c e t h a t p e r f o r m s a s p e c i fi c f u n c t i o n . A single task or several tasks perform a sequence of e v e n t s c a l l e d a t r a n s a c t i o n . Ta s k s c a n r e a d a n d update information on the user's data base. They can send messages to terminals and receive input. Ta s k s c a n a l s o s c h e d u l e o t h e r t a s k s t o a s s i s t i n completing transactions. Tasks that run under TAF can be written in COBOL, FORTRAN, or COMPASS. A task differs from a normal batch or interactive program in that it contains calls to TAF commands and data manager commands and must have a common block (referred to as the c o m m u n i c a t i o n b l o c k ) d e fi n e d . T h e c o m m u n i c a t i o n block is needed to receive terminal input and pass data between tasks. (The communication block is described in section 2.) Binary copies of each task are stored in the task library. The LIBTASK utility is used to place these b i n a r y c o p i e s o n t h e t a s k l i b r a r y. S e c t i o n 1 0 describes the task library and LIBTASK. Tasks written in COBOL must be compiled with the TAF parameter on the COBOL command. Tasks written in FORTRAN must be compiled with the Z parameter on the FORTRAN command (FORTRAN 4) or with DB=0 on the FTN5 command (FORTRAN 5). TRANSACTION PROCESSING After following the login procedures outlined in appendix J, the user indicates the transaction to be performed by entering a code that is assigned by the system designers. Such a code could specify that a user is entering a loan payment; another code would be used to close out a loan, and so on. TAF receives this Initial input and places it in a communication block. This communication block is the means by which the data is passed from a terminal to a task or from task to task. When a transaction is completed, the communication block is released and can be used by other tra n sa cti o n s. 1-4 After the communication block has been constructed, TA F s c h e d u l e s a n i n i t i a l t a s k ( I TA S K ) t o i n t e r p r e t the code the user entered. Using this code, ITASK requests TAF to schedule the appropriate task(s) to process the transaction. The task scheduled may also call other tasks to assist in completing the transaction. TAF REQUESTS Communication between terminals and tasks is accomplished by using TAF requests. Output can be sent to a transaction terminal from the task by using the SEND request. When this request is processed, control passes to TAF. TAF extracts the message from the task and passes it to the network. The message is then transmitted to the transaction terminal, and control passes back to the task for additional processing. When a task requires additional input from the t e r m i n a l , t h e WA I T I N P r e q u e s t i s u s e d . T h e t a s k performs a SEND request to send output to the terminal, prompting the terminal operator for the needed input. The WAITINP request is then processed. Since the terminal operator takes seconds to respond to the request, the task is rolled out of central memory and the subcontrol point and communication block are released. These resources can then be used to process other transactions while the terminal operator is responding. When TAF receives the requested input, it places it into a new communication block, and the task is rolled into an available subcontrol point. The new communication block is passed to the task, and the task continues processing. These and other requests are further described in sections 2 and 5. ENTERING THE TRANSACTION SUBSYSTEM T h e s u b s y s t e m y o u w i l l b e a c c e s s i n g i s t h e TA F subsystem. There are various procedures for accessing this transaction subsystem. These methods are discussed in detail in appendix J. Using a p p e n d i x J , a c o o r d i n a t o r o f TA F a c t i v i t i e s a t a particular site who knows the types of users and applications at the site can determine the most desirable access procedures. B e c a u s e o f t h e fl e x i b i l i t y o f t h e n e t w o r k a n d t h e transaction subsystem, the procedure to access the transaction subsystem can vary substantially from site to site. Therefore, the coordinator of transaction subsystem operations at each site should p r o v i d e e a c h u s e r, o r t e r m i n a l l o c a t i o n , w i t h a detailed login procedure for that site. The site should also provide information concerning terminal characteristics. A variety of terminal classes Is supported for use on the network with 60459500 C TAF. Each of these terminal classes has character istics, which the analyst can change by modifying the network files and which you can change by entering terminal definition commands. A discussion of the terminal characteristics, the defaults for each terminal class, and the procedure for changing these characteristics at a terminal is included in appendix G. IMPLEMENTING AN APPLICATION The following steps specify the procedure for implementing an application. 1. Review this manual. 2. Design the application including: • Selection of the data manager (CDCS and/or CRM, or TOTAL) to allow the c o r r e c t c h o i c e o f fi l e t y p e s , fi l e s t r u c t u r e , a n d fi l e i n t e r a c t i o n . • Selection of recovery and backup techniques, including journalizing o f fi l e s . Refer to the CYBER Database Control System 2 Reference Manuals, the TAF/CRM Data Manager 1 Reference Manual, or the TOTAL - CDC 2 Reference Manual for more information (publi cation numbers are listed in the preface). 3. Describe and Install the data base using the data manager. Refer to the appropriate data manager reference manual for this procedure. 4 . Te s t l o a d t h e d a t a b a s e u s i n g t h e d a t a manager commands (usually done in batch mode). 5. Using the application design, write the application tasks to process transaction input. 6 . O p t i o n a l l y m o d i f y I T A S K t o r e fl e c t t h e actual application. Tasks MSABT, LOGT, and S Y S M S G m a y a l s o r e q u i r e m o d i fi c a t i o n . (Refer to section 11.) 7 . B u i l d a t a s k l i b r a r y. ( R e f e r t o s e c t i o n 1 0 . ) Ta s k s r e s i d e a t s u b c o n t r o l p o i n t s w i t h i n t h e fi e l d length of the transaction executive. Each task runs | with its own exchange package, reference address ( r e l a t i v e t o t h e t r a n s a c t i o n e x e c u t i v e ) , a n d fi e l d l e n g t h ( a s u b s e t o f t h e fi e l d l e n g t h o f t h e t r a n s action executive). A task, therefore, can reside in any contiguous segment within the transaction execu t i v e fi e l d l e n g t h . M e m o r y i s a l l o c a t e d i n 1 0 0 g word blocks located on even lOOg word boundaries (for example, 32100g to 32200s). A subcontrol point consists of one 120g word block of memory f o r s y s t e m u s e , f o l l o w e d b y s u f fi c i e n t b l o c k s t o contain an entire task. The subcontrol point feature allows the transaction executive to control each task. Some of the advant ages associated with the subcontrol points are: • Isolating one subcontrol point from other subcontrol points and the transaction executive. This means that no application program can destroy the transaction executive or circumvent system security. • Blocking RA+1 requests from a subcontrol point. No requests are allowed directly from a subcontrol point to NOS. Any such requests are intercepted by the system monitors, which return control to the transaction executive. Thus, the only RA+l requests a task can legally issue are those processed by the transaction executive. This includes requests to the data managers. The transaction subsystem allows a maximum of 31 subcontrol points. An installation parameter sets the number of subcontrol points that the transaction executive initializes. When the transaction executive is loaded, the operator can select a number of subcontrol points other fhan this default value. The number of subcontrol points must not be less than 2 nor greater than 31. Once the transaction subsystem is initialized, no change in the number of subcontrol points is allowed. The optimum number of subcontrol points is selected by the site. Each subcontrol point requires eight words of table s p a c e . N o s p a c e , o t h e r t h a n a t a b l e e n t r y, i s allocated for a subcontrol point unless it is a c t i v e . E a c h a c t i v e s u b c o n t r o l p o i n t h a s 11 l g words reserved, beginning at RA, similar to those used for batch control points. 8 . B u i l d a n x x J fi l e . ( R e f e r t o s e c t i o n 4 . ) 9 . B u i l d a n e t w o r k fi l e , a n d u s e N D L t o c o n fi g u r e t e r m i n a l s a n d e s t a b l i s h l o g i n sequences and terminal characteristics. 1 0 . B u i l d t h e T A F c o n fi g u r a t i o n fi l e ( T C F ) . (Refer to section 4.) MULTIMAINFRAME Under a multimalnframe configuration, the transaction subsystem can be run on either or both mainframes. H o w e v e r, a d a t a b a s e a n d J 0 U R 0 fi l e ( s e c t i o n 4 ) cannot be shared by the transaction subsystems. Each subsystem must have a unique data base. 11. Test th e s y s t e m . EXTENDED MEMORY SUBCONTROL POINTS The following discussion is intended for analysts and may be omitted by the applications programmer. TA P d o e s n o t a l l o w t h e u s e o f y o u r a c c e s s t o extended memory. However, the TAF procedure file c a n d e c l a r e d a t a fi l e s a n d l i b r a r i e s a s e x t e n d e d memory-resident. J#*^ 60459500 C 1-5 /^^%\ 0^*- TASK/TRANSACTION EXECUTIVE INTERFACE A task is isolated from the data manager and the remainder of the system by the transaction executive. The isolation guarantees that errors in a task do not propagate beyond the task. The following types of requests constitute the interface between the task and the transaction executive. • Data manager requests • Journal file requests the communication block (refer to the description of m i n fi g u r e 2 - 1 ) . I f t h e c o m m u n i c a t i o n b l o c k i s passed between tasks in a transaction and overflow data is present, other tasks in the transaction can access this data with a LOADCB request. If COBOL is used, the communication block must be described in the COMMON-STORAGE SECTION. Shown here is an example of such a description: • Memory dump requests • System r e q u e s t s • Task scheduling requests • Input/output requestst • Ta s k c o n t r o l r e q u e s t s • Ta s k u t i l i t y r e q u e s t s • Application recovery requests • System recovery requests 0^^ I n t e r n a l l y, a t a s k p e r f o r m s a r e q u e s t b y l o a d i n g address RA+1 of its subcontrol point. This activity is not visible to the applications programmer who uses the macros or calls given In this section. The transaction executive uses the request parameters to determine what processing is required by the task. The address field and any fields in a parameter list that reference an address contained within the task are verified to ensure that the address referenced is within the task field length. Tasks communicate with each other and accumulate input by using the communication block. The communication block is discussed next, followed by the types of requests. COMMUNICATION BLOCK Communication between a chain of tasks is provided by the communication block. The initial input or the input from a terminal as a result of the WAITINP request (refer to Input/Output Requests later in this section) is also stored in the communication block. The communication block can be used to pass parame ters or data from task to task. The format of the c o m m u n i c a t i o n b l o c k i s s h o w n i n fi g u r e 2 - 1 . T h e length of terminal input is not restricted by the length of the communication block. The LOADCB re quest is available to read extra input that overflows DATA DIVISION. COMMON-STORAGE SECTION. 01 COMMUNICATION-BLOCK. 03 CB-HEADER-AREA-WORD-ZERO. 05 CB-OATA-BASE-NAME 05 CB-USER-TST-AREA 05 CB-TRANS SEQ-NUMBER 03 CB-HEADER-AREA-WORD-ONE. 05 CBHJSERNAME 05 CB-INPUT-STATUS-BYTE 05 CB-MESSAGE-WORD-COUNT 03 CB-MESSAGE-AREA 03 USER-AREA 03 CB-TRAILER-AREA. 05 FILLER 05 CB-PACKED-0ATE. 07 CB-YEAR 07 CB-M0NTH 07 CB-DAY 05 CB-PACKED-TIME. 07 CB-H0UR 07 CB-MINUTE 07 CB-SEC0ND WORKING-STORAGE SECTION. PIC X(2). COMP-4 PIC 9C6). COMP-4 PIC 9(6). PIC X(7). COMP-4 PIC 9. COMP-4 PIC 99. PIC X(570). PIC X<90). PIC X(4). COMP-4 PIC 9. COMP-4 PIC 9. COMP-4 PIC 9. COMP-4 PIC 9. COMP-4 PIC 9. COMP-4 PIC 9. This will be referred to in the manual as the standard COBOL communication block because of the correspondence between it and the fields shown and d e s c r i b e d i n fi g u r e 2 - 1 . H o w e v e r , a p p l i c a t i o n s programmers may find it convenient to use a more abbreviated communication block when possible. C O M P - 4 i s s p e c i fi e d f o r d a t a a r e a s i n t e n d e d f o r numerical information. Refer to the COBOL 5 Refer ence Manual for information on the relationship b e t w e e n t h e n u m b e r o f d i g i t s s p e c i fi e d i n t h e picture clause for COMP-4 data and the number of bits reserved. TThe standard CMR-supported, compiler-generated I/O calls from FORTRAN and COBOL are not allowed. SORT verb is not supported. J ^ 60459500 B The COBOL 2-1 59 1118 WORD 0 47 35 data bate 29 23 user area WORD 1 20 17 15 13 11 5 id | transaction sequence number i usemame message word count WORD 2 message area WORD 67 WORD 68 215g data base user area vr day hr min Data base that the originating terminal is validated to use. Image of originating terminal user area from the terminal status table (refer to section 8 ) . C o n t a i n s t h e r e c o v e r y fl a g . ( R e f e r t o t h e TA R O a n d T S I M r e q u e s t s f o r m o r e information.) transaction Assigned by the transaction executive to each newly initiated transaction. This number is sequence number generated by incrementing a counter by one and identifies the transaction, or task chain, throughout its life in the subsystem. i d T h e fi r s t o c t a l d i g i t o f t h e t r a n s a c t i o n s e q u e n c e n u m b e r . I t i s t h e i d e n t i fi e r f o r t h e n e t w o r k fi l e u n d e r w h i c h t h e u s e r r u n n i n g t h i s t r a n s a c t i o n is defined. The value is zero to seven. . username One- to seven-character user name, left-justified with binary zero fill from the terminal status table. st Bit 17 of word 1 is set to one if this communication block was created by a TAF-originated transaction. Word 2, and possibly 3, of the communication block contains additional in formation (operating system or network-defined conditions that may be processed by TAForiginated tasks). Refer to section 11 for information concerning required system tasks. Pt Bit 16 of word 1 is set to one if this communication contains data on which a parity error occurred during terminal input. bt Bit 15 of word 1 is set to one if this communication block was created by a batch transaction (BTRAN request). c Bit 14 of word 1 is set to one if CDCS aborts. i Bit 13 of word 1 is set to one if TAF is idling down. mt Bit 12 of word 1 is set to one if additional input to be loaded by means of the LOADCB request exists. message word count Length of the input message is words in the communication block proper. •message area A message from a terminal (as a result of initial terminal input, WAITINP, or BWAITINP re quests) begins at word 2 and is terminated by 12 bits of zero in positions 11-0 of the last word of the message. All remaining message area words contain binary zero. The max imum length of a terminal message is 57 words. This area may also contain data from a BTRAN request. The maximum length of a BTRAN message is 62 words. In all cases, the length of the message is in the message word count field. The information contained in this area is available to you, and its contents is passed to any communication block gen erated by the processing of a CALLTSK or CALLRTN request. To retain the terminal input, you may only write in words message word count+2 through 67. If there is no need to retain the terminal input, the entire area can be used. yr, mo, day, hr, min, sec Date and time in packed binary format from the operating system PDATE macro. TThe main purpose of these fields is to the EXTRACT routine allows examination used to access these fields more easily; and above. ITASK is described in section notify the system task ITASK of certain conditions. Under COBOL, of these fields. Also, a COBOL data type, computational-4, can be computational-4 data types are allowed only on COBOL Version 5.2 12, and EXTRACT is described later in this section. Figure 2-1. Communication Block Format 2-2 60459500 B If FORTRAN is used, the communication block must be in the first block of labeled common. If more data is input than can be contained in the communication block, the LOADCB request may be used to obtain the input. COBOL Statements ACCEPT x FROM DATE. ACCEPT x FROM TIME. ACCEPT item FROM TTY. DISPLAY item UPON TTY. REQUESTS The following paragraphs describe the various types of requests a task can make. They describe task scheduling, input/output, task control, and task utility requests and show the formats for making these requests from tasks written in FORTRAN, COBOL, and COMPASS. These requests are described in detail in Volume 4 of the NOS 2 Reference Set, FORTRAN Extended 4 Reference Manual, FORTRAN 5 Reference Manual, and the COBOL 5 Reference Manual. (Refer to the preface for publication numbers.) MEMORY REQUESTS (COMPASS ONLY) DATA MANAGER REQUESTS A task can make data manager requests to one of the data managers, (CDCS, CRM, or TOTAL) supported by the transaction subsystem. (Refer to the preface for a list of the publications that document these data managers and the requests used.) JOURNAL FILE REQUESTS A task can supplement automatic journal ing by w r i t i n g d a t a o n a j o u r n a l fi l e . J o u r n a l fi l e s a n d the journal requests are discussed in section 4. MEMORY DUMP REQUESTS These requests are discussed in section 6. Tasks can interrogate the status of and change their central memory (CM) field length (FL) via the RA+1 requests MEM and RFL. The format of these calls is d o cu me n te d fo r th e MEMORY ma cro i n the NOS 2 Reference Set, Volume 4. The use of these requests in TAF is restricted as follows: Memory requests should be issued with the recall (r parameter); otherwise, control may be returned before the request is processed. There is an upper limit beyond which a task is not allowed to increase its CM space; this limit is referred to as the maximum task field length (MFL). The MFL for each task is equal to the task FL plus the value specified by the E F L I B TA S K d i r e c t i v e f o r t h e t a s k ( r e f e r t o section 10). If a task attempts to exceed this value, it may be aborted (refer to docu mentation of the MEMORY macro NA parameter in the NOS 2 Reference Set, Volume 4). SYSTEM REQUESTS System requests from transaction tasks are limited to the following. COMPASS Macros ABORT DATE x Field length cannot be decreased to less than the last word address of the default commun ication block transfer address rounded up to the nearest 100s« A non-CM-resident task making a memory request may be rolled out of CM if the request cannot b e s a t i s fi e d i n i t i a l l y . ENDRUN JDATE x MEMORY (as described below) MESSAGE x (to console B display, line one only) PDATE x RTTME x TIME x FORTRAN Functions and Subroutine Calls DATE(x) or CALL DATE(x) JDATE(x) or CALL JDATE(x) TTME(x) or CALL TIME(x) 60459500 B Since a task making a memory request may be rolled out, it may be desirable to free locked data manager resources prior to the request. Tasks will also be allowed to use the common memory manager (CMM) with the following restrictions: The processing performed by CMM for the task must not result in CMM using the fast dynamic loader or the task will be aborted. • The preceding restrictions on use of MEM and RFL requests apply. Common memory manager requests are documented in detail in the Common Memory Manager 1 Reference Manual. 2-3 MESSAGE REQUESTS COMPASS tasks can issue messages to the operator or the JOURO file by using the RA+1 request MSG. The function code determines the disposition of the message. Function code zero causes the message to b e w r i t t e n t o o n l y t h e J O U R O fi l e . F u n c t i o n c o d e one causes the message to be placed in line one of the B display. • NEWTRAN I n i t i a t e s u p t o fi v e n e w t a s k s ( C O M PA S S only). • TRANCHK C h e c k s t o s e e i f a s p e c i fi c t a s k i s a c t i v e (COMPASS only). FORTRAN termination messages are also written to the JOURO file. COBOL and FORTRAN tasks can issue messages to TAF's dayfile by using the TMSG request. The tasks that i ssu e th i s re q u e s t m u s t r e s i d e i n t h e s y s t e m t a s k l i b r a r y. TA S K L X 6 The TMSG request issues a message to TAF's dayfile. 1 NOTE | If a list has either no tasks or more than five tasks, TAF aborts the task and issues the following error message on the screen. TASK REQUEST ARGUMENT ERROR The format is: COBOL ENTER TMSG USING message[.length]. CALLRTN Request y*^^\ message A 01-level data item containing the dayfile message. length A computational-l data item specifying the length of the message in characters. The maximum length is 80 characters. FORTRAN CALL TMSG(message,length) message The name of the array that contains the dayfile message. length An integer specifying the length of the message in characters. The maximum length is 80 characters. TASK SCHEDULING REQUESTS A task, including ITASK (refer to section 11), can call in order a list of other tasks. This process is referred to as task scheduling. The following four requests can be used to schedule tasks. • CALLRTN Calls up to five tasks. Upon completion of the called chain of tasks, returns control to the calling task. • CALLTSK Calls up to five tasks. The task making the call either ceases or continues to run, allowing the new task chain to proceed independently. 2-4 The CALLRTN request is used to request that the transaction executive schedule a task or series of tasks, with control returning to the calling task upon completion of the called tasks. A CALLRTN request cannot be made while data manager requests are outstanding. The current communication block is passed to the called tasks and returned to the caller when the caller is reinitiated. Upon return, the caller begins execution immediately after the CALLRTN request. Only the information in the communication block may have changed. Return from the called tasks to the caller takes place automatically after the last called task ceases. A task waiting for return may be temporarily rolled from memory. The format is: COBOL ENTER CALLRTN USING task! task2«..taskn. task^ Parameter whose value Is a oneto s e v e n - c h a r a c te r a l p h a numeric task name. The tasks are scheduled by CALLRTN in the o r d e r s p e c i fi e d . F r o m o n e t o five tasks can be specified. FORTRAN C A L L C A L L RT N ( t a s k l , t a s k 2 t a s k n ) taski Parameter whose value is a oneto s e v e n - c h a r a c te r a l p h a numeric t a s k n a m e , l e f t - j u s t i fi e d w i t h e i t h e r b l a n k o r b i n a r y z e r o fi l l t o a w o r d b o u n d a r y. T h e t a s k s are scheduled by CALLRTN in the o r d e r s p e c i fi e d . F r o m o n e t o five tasks can be specified. 60459500 C communication block back to the calling task and allow it to continue execution at the instruction immediately following the CALLRTN command. COMPASS CALLRTN address address Address of a list of from one to five task names. Each task name m u s t b e l e f t - j u s t i fi e d w i t h b i n a r y z e r o fi l l t o a w o r d b o u n d a r y. The list is terminated by a word of binary z e r o s . Ta s k s a r e s c h e d u l e d b y CALLRTN in the order they appear on the list. 1' 1 1 1 1 1 1 1 TASK A 1 * 1 — #■ C.B. CALLRTN NEXT INST. ("note"! CB. 1 I f t a s k i , s p e c i fi e d o n a C A L L R T N request, makes a CALLRTN request, taskj + 1 through task,,, speci fied on the original CALLRTN request, a r e n o t s c h e d u l e d . ( R e f e r t o fi g u r e 2-4.) I TASK 8 ■— v. , a> C8. TASK CS. TASK O c / ^ v The following diagrams illustrate CALLRTN processing. JS»\ I n fi g u r e 2 - 2 , T A S K A , a t s u b c o n t r o l p o i n t X , executes a CALLRTN to TASK B. TAF will first load a c o p y o f TA S K B t o a n a v a i l a b l e s u b c o n t r o l p o i n t ( u n l e s s a s e r i a l l y r e u s a b l e c o p y o f TA S K B i s already at a subcontrol point or CM-resident). TAF w i l l t h e n c o p y t h e c o n t e n t s o f TA S K A ' s communication block (CB) to TASK B's communication block area. TASK B begins execution. When TASK B h a s c o m p l e t e d e x e c u t i o n , TA F w i l l c o p y t h e communication block, which was probably modified by TASK B, back to TASK A and allow TASK A to continue execution at the instruction immediately following the CALLRTN command. 1 1 ! Figure 2-4 illustrates the processing referred to in the preceding note. The majority of the data inputs are handled by the TASK B-C-D chain. When an excep t i o n i s f o u n d i n TA S K C , e x c e p t i o n p r o c e s s i n g i s invoked in the TASK E-F chain. Each new CALLRTN command cancels the previous one (TASK D is not executed), but TAF will always bring control back to the instruction immediately following the original CALLRTN command (TASK A). The communication block is passed from task to task as shown in figures 2-2 and 2-3. TAF CB. MAIN PROCESSING PATH 4 1 1 1 Figure 2-3. CALLRTN (Chain) / 1/ •» CS. TASK A > ALTERNATE PROCESSING PATH CS. TASK a CALLRTN NEXT INST. SUBCONTRO POINT X J SUMONTROL POINT Y -1 TASK | B . TASK A I _*_ TASK E CALLRTN NEXT INST. CALLRTN NEXT INST. i L_J task] ^r TASK F Figure 2-2. CALLRTN TASK I D I The CALLRTN command allows a chain (list) of up to five tasks to be called. Figure 2-3 shows TASK A calling a chain of three tasks. As each task in the chain is completed, TAF will automatically pass the communication block to the next task in the chain and allow that task to execute. When the last task i n t h e c h a i n h a s c o m p l e t e d , TA F w i l l p a s s t h e /|P"v 60459500 B Figure 2-4. CALLRTN (Multiple Chains) 2-5 CALLTSK Request The CALLTSK request is used to request that the transaction executive schedule a task or series of tasks (task chain). Included in this request is a parameter option that enables task branching or a CEASE function to be performed after the call is honored. If the task is not to cease on this call, a branching of the chain initiates a new chain that is Independent of the original chain. The new chain is assigned a new sequence number for unique i d e n t i fi c a t i o n w i t h i n t h e t r a n s a c t i o n s u b s y s t e m (figure 2-1). The number of branches allowed by a transaction is controlled by an assembly constant MAXBW. If a CALLTSK request without a CEASE request is issued from a recoverable transaction, recovery may be affected. Refer to CALLTSK without CEASE and Recovery in section 7. code Integer whose value is nonzero if the calling task is to con tinue after the request, initiat ing an independent task chain. If the value of this parameter is zero, the calling task ceases after this request. If not s p e c i fi e d , t h e d e f a u l t i s z e r o . task* Parameter whose value is a oneto s e v e n - c h a r a c te r a l p h anumeric t a s k n a m e , l e f t - j u s t i fi e d w i t h e i t h e r b l a n k o r b i n a r y z e r o fi l l t o a w o r d b o u n d a r y. F r o m z e r o t o f o u r t a s k s c a n b e s p e c i fi e d . These tasks are scheduled after t h e o n e s p e c i fi e d i n t h e t a s k parameter. COMPASS The format is: C A L LT S K a d d r e s s , c e a s e COBOL address Address of a list of from one to five task names. Each task name o u s t b e l e f t - j u s t i fi e d w i t h b i n a ry zero fill to a word boundary. The list is terminated by a word of binary zeros. CALLTSK sched ules the tasks in the order they appear on the list. ENTER CALLTSK USING task code task1#. .tas^. task Parameter whose value is a oneCo seven-character alphanumeric task name. This task is the next task to call in the present task chain (same sequence number) if code is set to zero; o t h e r w i s e , i t i s t h e fi r s t t a s k of a branch chain (the called t a s k g e t s a d i ff e r e n t s e q u e n c e number and proceeds independently of the calling task). code Computational-l item whose value is nonzero if the calling task is to continue after the request, initiating an independent task chain. If the value of this parameter is zero, the calling task ceases after this request. This parameter must be specified. task^ parameter whose value is a oneto seven-character alphanumeric task name. From zero to four t a s k s c a n b e s p e c i fi e d . T h e s e tasks are scheduled after the o n e s p e c i fi e d i n t h e t a s k parameter. c e a s e I f s p e c i fi e d , t h e c a l l i n g t a s k ceases after this request. If n o t s p e c i fi e d , t h e c a l l i n g t a s k continues after the request. In this case the CALLTSK initiates an independent task chain. The following figures illustrate CALLTSK processing. Figure 2-5 shows TASK A making a CALLTSK with a CEASE request to TASK B. TAF will load a copy of TASK B to an available subcontrol point (this step is not nec essary if a serially reusable copy of TASK B is al ready at a subcontrol point or is CM-resident). The communication block will be copied from TASK A to TASK B. TASK A's subcontrol point is released for use by other transactions, and TASK B is allowed to begin execution. CS. TASK A FORTRAN xsH TA F X CALLTSK Nx CALL CALLTSK(task,code,taskj,..., task^ task Parameter whose value is a oneto seven-character alphanumeric t a s k n a m e , l e f t - j u s t i fi e d w i t h e i t h e r b l a n k o r b i n a r y z e r o fi l l t o a w o r d b o u n d a r y. T h i s t a s k is the next task to call in the present task chain (same sequence number) if code is set to zero; otherwise, it is the fi r s t t a s k o f a b r a n c h c h a i n (the called task gets a d i ff e r e n t s e q u e n c e n u m b e r a n d proceeds independently of the calling task). 2-6 CS. -l,«»*" 1' CB. ^ ***** TASK B Figure 2-5. CALLTSK with CEASE Request 60459500 B / $ ^ N The CALLTSK without a CEASE request allows a new a s y n c h r o n o u s c h a i n t o b e s t a r t e d . I n fi g u r e 2 - 6 , TASK A uses this command to call TASK B. TAF will copy the contents of TASK A's communication block to a new communication block. A copy of TASK B will be loaded to an available subcontrol point (unless a s e r i a l l y r e u s a b l e c o p y o f TA S K B i s a l r e a d y a t a subcontrol point or is CM-resident). The new communication block will be copied to TASK B. TASK A is allowed to continue execution and TASK B is allowed to begin execution. TAF CS. NEW CB. r— CB. CALLTSK NEXT INST. TASK A TASK B I NEWTRAN Request (COMPASS Only) The NEWTRAN request initiates a new transaction chain with a unique sequence number and with the data base, user area, and user name set to zero in the communication block. The NEWTRAN request is designed for system use, primarily by ITASK, and is provided only for COMPASS. The format is: COMPASS NEWTRAN address address Address of a parameter table in the form shown in figure 2-7. Figure 2-6. CALLTSK without CEASE Request 23 59 V/MMfr^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ , 0 sequence task| J*5^ **t *# 9 task 0 seqtjence The transaction executive returns a new 24-bit binary transaction sequence number i n t h i s fi e l d . tasl O n e - t o s e v e n - c h a r a c t e r t a s k n a m e , l e f t - j u s t i fi e d w i t h b i n a r y z e r o fi l l . F r o m one to five tasks can be specified; the list is terminated by a word of binary zeros. NEWTRAN schedules the task In the order they appear on the list. Figure 2-7. NEWTRAN Parameter Table 60459500 B 2-7 TRANCHK Request BLDABH The TRANCHK request determines the status of a transaction. This request is provided only for COMPASS. Builds the application block header to use different character types, terminal format effectors, and auto input. /■S fSsV • GETABH The format is: COMPASS Returns the last application block header to the task. TRANCHK address address Address of a parameter table in the form shown in figure 2-8. • TERMDEF D e fi n e s t h e o p e r a t i o n a l c o n t r o l s o r f o r m a t of the terminal. INPUT/OUTPUT REQUESTS • SEND The following requests are associated with input/output. Sends data to terminal. Equivalent to a write request. • WA I T I N P Places terminal input data in the communication block. Equivalent to a read request. • RELSCB Releases memory used for extra communication blocks. , 0 The time delay elapsed before input was received from the terminal. time NOTE CM-resident tasks and tasks not asso c i a te d w i t h a t e r m i n a l ( b a t c h o r i g i n ) are not permitted to make a WAITINP request (task aborts). At least one message (SEND) must be sent to the terminal before making a WAITINP request, and at least one SEND request from the original task chain must follow a message received follow ing a WAITINP request. Computational-l item that con tains the time limit, in decimal seconds, to wait for input. If not specified, the default is 480 seconds. The maximum value is 2048 seconds. FORTRAN CALL WAITINP(status,time) status Integer variable that the system sets to indicate the status of the WAITINP request. Upon com pletion of the request, status has one of the following values. No data manager requests may be active when a task makes a WAITINP request. All tasks that make WAITINP requests must be entered in the task library with the scheduling queue limit set to one. (Refer to section 10.) 0 The request processed normally; terminal input appears in the normal Input portion (begins in the third word) of the communication block. WAITINP does not cause any data mana ger cease requests to be Issued. Therefore, any resources locked or reserved by a transaction prior to a WA I T I N P c o n t i n u e t o b e L o c k e d o r reserved during and after the WAITINP. < 0 Another task is waiting for input from the origi nating terminal. The WAITINP request must be reissued if input is desired. 60459500 C 2-9 > 0 The time delay elapsed before input was received from the terminal. time Integer time limit, in decimal seconds, to wait for input. If n o t s p e c i fi e d , t h e d e f a u l t i s 480 seconds. The maximum value is 2048 seconds. COMPASS The overflow data can be requested as many times during a transaction as desired. Each time, the overflow data is transmitted as specified previously. ^^\ The format is: COBOL ENTER LOADCB USING buffer status r. buffer A 01-level item identifying the user-defined buffer area. status Computational-l item that the system sets to indicate the LOADCB equest status. The s i g n i fi c a n c e o f t h e v a l u e s e t has been described earlier in the LOADCB request description. WAITINP time time Ti m e l i m i t , i n d e c i m a l s e c o n d s , to wait for input. If not s p e c i fi e d , t h e d e f a u l t i s 4 8 0 seconds. The maximum value is 2048 seconds. Computational-l item. If a non zero value is entered for this parameter, any message data that overflows the LOADCB buffer spec i fi e d w i t h t h e b u f f e r p a r a m e t e r is released (same as RELSCB). Status of the WAITINP macro is determined by the following: • Word 2 of the communication block contains 1 if the time delay elapsed before input was received from the terminal. FORTRAN • The X6 register contains a negative value if another task is waiting for input from the o r i g i n a t i n g t e r m i n a l . T h e WA I T I N P r e q u e s t must be reissued if input is desired. (Word 2 of the communication block should be checked before X6 is checked.) • The X6 register is set to zero if the request processed normally; terminal input appears in the normal input portion (begins in the third word) of the communication block. (Word 2 of the communication block should be checked before X6 is checked.) LOADCB Request If the transaction input data exceeds the message area of the communication block, bit 12 of word 1 of t h e c o m m u n i c a t i o n b l o c k ( t h e i fi e l d ) i s s e t . T h e LOADCB reque s t l o a d s t h e r e m a i n d e r o f t h e i n p u t m e s s a g e i n t o a u s e r - d e fi n e d b u ff e r. T h i s b u ff e r i s a single contiguous block of storage for all additional communication blocks. No headers or trailers appear In this area. The maximum input size is determined by an installa tion parameter. The data that remains after the communication block m e s s a g e a r e a fi l l s ( r e f e r r e d t o h e r e a s o v e r fl o w d a t a ) i s t r a n s f e r r e d t o t h e u s e r - d e fi n e d b u f f e r. I f the LOADCB request is made with no data overflow (i field not set) or if a RELSCB request was made prior to the LOADCB request, no data is transferred and the s t a t u s w o r d i s s e t t o z e r o . I f t h e o v e r fl o w d a t a consists of more words than will fit in the buffer, t h e b u ff e r i s fi l l e d , a n d t h e s t a t u s w o r d i s s e t t o a value greater than the number of words in the b u f f e r. I f t h e o v e r fl o w d a t a c a n b e c o n t a i n e d i n t h e b u ff e r, t h e o v e r fl o w d a t a i s t r a n s f e r r e d t o t h e buffer, and the number of words transferred is set in the status word. 2-10 CALL L0ADCB(buffer,length,status,r) buffer An array identifying the userdefined buffer area. length Integer length of the array spec i fi e d w i t h t h e b u f f e r p a r a m e t e r in words. s t a t u s Va r i a b l e t h a t t h e s y s t e m s e t s t o Indicate the LOADCB request s t a t u s . T h e s i g n i fi c a n c e o f t h e value set has been described earlier in the LOADCB request description. This value is also returned as the value of the function, if LOADCB is called as a FORTRAN function. r Integer variable. If a nonzero value is entered for this param eter, any message data that over flows the LOADCB buffer specified with the buffer parameter is released (same as RELSCB). As stated in the description of the status parameter, the LOADCB request can be referenced as a FORTRAN function. The format of the function is LOADCB(buffer,length,status ,r); the parameters are the same as those already described. The value of the function is the value of the status parameter. COMPASS LOADCB address address Address of a parameter table in the format shown in figure 2-9. The LOADCB macro status is returned in the X6 regis ter. The significance of the value returned has been described earlier in the LOADCB request description. 60459500 B /S^. The format is: SETCHT Request COBOL The SETCHT request allows a task to change the appli cation character type (ACT) of terminal messages placed in the communication block. ENTER SETCHT USING username status act. username A 01-level item containing a one- to seven-character user n a m e , l e f t - j u s t i fi e d w i t h b l a n k fill. The user name may also be s p e c i fi e d w i t h a c o m p u t a t i o n a l - l i t e m w i t h b i n a r y z e r o fi l l . I f the item contains only binary zeros, the character type applies to the originating terminal. This user name must be a name appearing in an NCTFi fi l e . A u s e r n a m e c o n s i s t i n g o f the character P with binary zero fi l l c a n n o t b e s p e c i fi e d . status Computational-l item whose value i s s e t b y TA F t o i n d i c a t e u s e r name status. This value is zero if the user is not logged in and o n e i f t h e r e q u e s t i s processed n o r m a l l y. T h e t a s k i s a b o r t e d if the user name is not defined or if the data base for the s p e c i fi e d u s e r d o e s n o t m a t c h the data base of the originating u s e r. act A 01-level item containing one of the following words, l e f t - j u s t i fi e d . rNOTTI This is an optional request; the de fault character type is 6-bit display code characters. The following character types are available. • 7-bit ASCII, seven and one-half characters per word. • 7-bit ASCII characters, right-justified in 12-bit bytes, five characters per word. • 6-bit display code characters, 10 characters per word. This request causes TAF to send a change input char acter type supervisory message to NAM. For more information about supervisory messages, refer to the NAM/CCP Reference Manual. NOTE This request does not change the data currently held in communication blocks for the task. For example, a LOADCB request gets data in the former character type, while the next WAITINP request gets data in the new character type. ASCII7 7-bit ASCII. Seven and one-half char acters per word. ASCIIS 7-bit ASCII, rightj u s t i fi e d i n 1 2 - b i t bytes, five charac ters per word. If 7-bit ASCII characters are used to originate transactions, ITASK transac tion tables must be set up in terms of ASCII and not display code. 59 r WatM 47 DISPLAY 6-bit display code. 29 length 'v 2-15 TERMDEF Request A l e f t - j u s t i fi e d 0 1 - l e v e l i t e m w i t h b i n a r y z e r o o r b l a n k fi l l , containing the characteristic (for example, PW»60, PL»35, or CN-2B). A maximum of 17 nonblank, nonbinary zero characters is allowed. The characteristics are described in the NAM/CCP Reference Manual and appendix G of this manual. If the NAM/CCP Reference Manual specifies x or h, a 6-bit display code alphanu meric representation is required (where x is a 7-bit ASCII charac ter and h is a hexadecimal character). fi e l d i The TERMDEF request can be used by a task to define or modify terminal characteristics, where those of the connected real terminal differ from the assump tions made for the network's IVT model. This request can also be used to tailor the operational controls of the terminal. I note"! This is an optional request. Terminal input and output can be done without it. Each terminal that logs into the network is associated with a default set of terminal characteristics. (Re fer to appendix G.) FORTRAN C A L L T E R M D E F ( u s e r n a m e , s t a t u s , fi e l d } , A complete list of terminal characteristics is pro vided in the NAM/CCP Reference Manual and appendix G of this manual. Characteristics that may be modified include: • Te r m i n a l p h y s i c a l p a g e w i d t h . • Number of physical lines on a terminal page. • Specification of a character used to cancel an input logical line in progress. • Specification of a character to be used as a b r e a k c h a r a c t e r. U s e r b r e a k s a r e s e n t t o the application task for processing. • Set transparent input mode. This setting exists for only one logical input line. The format is: COBOL ENTER TERMDEF USING username status field} fi e l d 2 . . . fi e l d n . fi e l d 2 , . . . , fi e l d n ) username Parameter whose value is a oneto seven-character user name, l e f t - j u s t i fi e d w i t h b i n a r y z e r o o r b l a n k fi l l . I f t h e u s e r n a m e i s z e r o , t h e t e r m i n a l d e fi n i t i o n s p e c i fi e d a p p l i e s t o t h e o r i g i n a ti n g te rmi n a l . Th i s u ser name must be a name appearing in an N C T F i fi l e . s t a t u s Va r i a b l e i n w h i c h TA F p l a c e s a n u n n o r m a l i z e d fl o a t i n g - p o i n t n u m ber to indicate user name status. status contents is zero if the user is not logged in and greater than zero if the request is proc e s s e d n o r m a l l y. T h e t a s k i s aborted if the user name is not d e fi n e d o r i f t h e d a t a b a s e f o r the user does not match the data base of the originating user. fi e l d i username A 01-level item containing a one- to seven-character user n a m e , l e f t - j u s t i fi e d w i t h b l a n k fill. The user name may also be s p e c i fi e d w i t h a c o m p u t a t i o n a l - l i t e m w i t h b i n a r y z e r o fi l l . I f the item contains only binary z e r o , t h e t e r m i n a l d e fi n i t i o n s p e c i fi e d a p p l i e s t o t h e originating terminal. This user name must be a name appearing in a n N C T F i fi l e . A u s e r n a m e consisting of the character P w i t h b i n a r y z e r o fi l l c a n n o t b e s p e c i fi e d . s t a t u s C o m p u t a t i o n a l - l i t e m t h a t TA F sets to indicate user name status, status contents is zero if the user is not logged in and is one if the request is processed normally. The task is aborted if the user name is not d e fi n e d o r i f t h e u s e r ' s d a t a base does not match the data base of the originating user. 2-16 A l e f t - j u s t i fi e d v a r i a b l e w i t h b i n a r y z e r o o r b l a n k fi l l , c o n taining the characteristic (for example, PW-60, PL=35, or CN=2B). A maximum of 17 nonblank, nonbinary zero characters is allowed. The characteristics are described in the NAM/CCP Reference Manual and appendix G of this manual. If the NAM/CCP Reference Manual specifies x or h, a 6-bit display code alpha numeric representation is required (where x is a 7-bit ASCII character and h is a hexadecimal character). Example: The following request designates the page width to be 60 characters, the page length to be 40 lines, and the plus character (ASCII representa tion is 2B) to be the cancel character for user USER5; it then assigns the status to variable STATUS. CALL TERMDEFC5HUSER5,STATUS,5LPW=60, 5LPL=40,5LCN=2B> 60459500 B y£-»!S\ f^ There is both a limit on the total output that one task can send (MAXTO), t and a limit on the output one task can send before it is rolled out, pending the transfer of the output to the terminal or terminals (MLIM).t Also, the maximum output length for one SEND request is determined by the MAXWSt I n s t a l l a t i o n p a r a m e t e r. Example: T h e f o l l o w i n g s t a t e m e n t s r e d e fi n e t h e transparent input mode text delimiter to be a slant (ASCII representation is 2F) and the character count delimiter to be 4096. DATA MSG/10HDL=X2F,C40,2L96/ A task can specify the status parameter in COBOL and FORTRAN or the r parameter in COMPASS so that the task will wait until the network acknowledges that t h e m e s s a g e h a s b e e n d e l i v e r e d t o t h e u s e r. I f recall is selected, any error detected on the output message causes the task performing the SEND request to be restarted. Therefore, tasks performing SEND requests with recall should check status and compensate for errors. Use of recall can simplify recovery since the task issuing the SEND request is i n f o r m e d o f t h e p r o b l e m a t t h e fi r s t a d d r e s s a f t e r the SEND. When recall is selected, the task is rolled out if the message length exceeds the MLIM i n s t a l l a t i o n p a r a m e t e r. A n y d a t a m a n a g e r resources held by the task, such as locked records, remain assigned for the duration of the rollout. If reserving these resources for this period of time will impact the performance of the application, t a s k s s h o u l d r e l e a s e a l l fi l e a n d r e c o r d l o c k s before executing the SEND request. CALL TERMDEF(5HUSER5,STATUS,MSG> END COMPASS TERMDEF address address Address of a parameter table in the format shown in figure 2-12. SEND Request The SEND request sends a message to a user; that is, it performs a write operation. If the task does not specify the user to which the message should be sent, it is directed to the terminal that originated the transaction. At least one SEND request to the originating terminal must occur from the primary task chain for each message received. The task can also specify that the task be ended when the message is sent. 59 I f r e c a l l i s n o t s e l e c t e d , I TA S K i s i n f o r med of the problem, rather than the task that issued the request. ITASK is informed because the issuing task may have already terminated when the message delivering problem is detected. 17 43 //^ username yyyyyyyyyyy y / f fl f fl $ y WWk W, 11 Wa ec status string z string + n O n e - t o s e v e n - c h a r a c t e r u s e r n a m e , l e f t - j u s t i fi e d w i t h b i n a r y z e r o fi l l . I f t h e u s e r n a m e i s b i n a r y z e r o , t h e t e r m i n a l d e fi n i t i o n s p e c i fi e d a p p l i e s t o t h e o r i g i n a t i n g u s e r. The number of 7-bit ASCII characters (at seven and one-half characters per word) is available in string + 2. Adding two is necessary because string begins in bit 43. If no characters are specified in the string, cc should equal two. status An address of a word in which TAF returns the user name status in unnormalized fl o a t i n g - p o i n t f o r m a t . T h e s t a t u s c o n t e n t s i s z e r o i f t h e u s e r i s n o t l o g g e d i n and greater than zero if the request is processed normally. The task is aborted if the user name is not defined or if the data base for the user does not match the data of the originating user. string A s t r i n g o f 7 - b i t A S C I I c h a r a c t e r s , i n h e x a d e c i m a l n o t a t i o n , l e f t - j u s t i fi e d i n the field, defining the terminal characteristic. (Refer to the NAM/CCP Reference Manual for a list of these characteristics.) As an example, to change the cancel key to a +, the string CN«*f is written as 434E3D2B. string + n is the last word needed for the string. Figure 2-12. TERMDEF Parameter Table ^ ^ K tRefer to the NOS 2 Installation Handbook (refer to the preface for the publication number) 60459500 B 2-17 The format of the message on the terminal depends on t h e t e r m i n a l c l a s s a n d t h e f o r m a t e ff e c t o r s i n t h e message. For example, on synchronous terminals the cursor for entering the next message to the host ( u p l i n e ) i s a l w a y s t h e fi r s t c h a r a c t e r o f t h e l i n e . On asynchronous terminals the cursor follows the last character of output; this assumes no format effectors are in the message. The NAM/CCP Reference Manual contains complete information on terminal protocols. The format is: FORTRAN CALL SEND(messageaddress,length,username, c e a s e - fl a g . o u t p u t - fl a g , b l o c k , s t a t u s ) The parameters are described in table 2-4. COMPASS SEND address address COBOL ENTER "SEND" USING messageaddress username cease-flag output-flag block status length. The parameters are described in table 2-3. NOTE Under COBOL, SEND must be enclosed in quotation marks, because SEND is a reserved word for that compiler. Address of a parameter table in the format s h o w n i n fi g u r e 2-13. This fi g u r e a n d t h e parameters in t a b l e 2 - 5 s h o u l d be used with t a b l e 2 - 6 . T h i s table shows interrela tionships between SEND parameters. Setting parameters shown in the top portion of table 2-6 results in the corresponding events shown in the bottom portion. The entire four-word block must be present, even if the last three words are not used. Table 2-3. COBOL SEND Request Parameters (Sheet 1 of 2) Parameter Data Type Value messageaddress 01-level display item Data item containing the message to be sent. For 7-bit ASCII character types, the message must have an end-ofline byte of the single character US for all logical lines. (Refer to the NAM/CCP Reference Manual for NAM data formats.) The TAF SEND interface supplies end-ofline bytes for 6-bit display code character types only. username 01-level display item, or computational-l Data item containing a one- to seven-character user name. If this parameter is omitted or specified as C0MP-1 VALUE ZERO, the message is sent to the originat ing terminal. This user name must be a name appearing in the NCTFi file and must be validated for the same data base as the sending task.t A user name consisting of the character P with binary zero fill cannot be specified. The user name can be binary zero or blankfi l l e d . cease-flag Computational-l Task end flag. Description 0, omitted The task continues after the message is sent. 1 The task ends after the message is sent. /^B5X tTasks associate d with application identifier SY can SEND to any valid TAF user. 2-18 60459500 B Table 2-3. COBOL SEND Request Parameters (Sheet 2 of 2) Parameter Data Type o u t p u t - fl a g Computational-l Application block type. Currently serves no function. Retained for compatibility with previous releases. block Computational-l Application block number (ABN) data name. status length J ^ 60459500 C Value Nonzero TAF uses the value contained in the data name as the ABN. 0 TAF assigns the ABN and returns this as the value in this data name. Omitted TAF assigns the ABN, and the value is not returned. Recall flag; this parameter applies only if the ceaseflag is set to zero. Computational-l Computational-l Description 0, omitted The task begins processing after the block is transmit ted to the network. Nonzero The task begins processing after the block has been de livered to the user and acknowledgment is received. Each nonzero value indicates the status of the block. The network function, subfunction, and description are given here. For all values other than 1, the block was not delivered to the user and the task must recover. I Block delivered (FC/ACK). 2 Block not delivered (INTR/USR/RC-1). 3 User break 1 (INTR/USR/RC-1). 4 User break 2 (INTR/USR/RC-1). 10 Terminal not logged in (CON/END). 11 Correspondent unavailable or failed, line disconnect (C0N/CB/RC-1). Length of the message in characters. This length should Include end-of-line bytes for 7-bit ASCII char acter types. For 6-bit display code output, the COBOL compiler-generated length is used if the length param eter is omitted. 2-19 Table 2-4. FORTRAN SEND Request Parameters (Sheet 1 of 2) Parameter Data Type Value Description messageaddress Hollerith or leftj u s t i fi e d , z e r o fi l l Array name containing the message to be sent. For 7-bit ASCII character types, the message must have an end-of-line byte of the single character US for all logical lines. (Refer to the NAM/CCP Reference Manual for NAM data formats.) The TAF SEND interface supplies end-of-line bytes for 6-bit display code character types only. length Integer Length of the message in characters. This length should include the end-of-line bytes for 7-bit ASCII character types. username L e f t - j u s t i fi e d , z e r o o r b l a n k fi l l integer One- to seven-character user name. This must be a name appearing in the NCTFi file, which is validated for the same data base as the task issuing the send.t I f t h i s p a r a m e t e r i s o m i t t e d o r s p e c i fi e d a s b i n a r y zero, the message is sent to the originating terminal. cease-flag Integer Task end flag. 0, omitted The task continues after the message is sent. 1 The task ends after the message is sent. o u t p u t - fl a g Integer Application block type. Currently serves no function. Retained for compatibility with previous releases. block Integer Application block number. Nonzero TAF uses the value of this variable as the ABN. 0 TAF assigns the ABN and returns the value in this var i a b l e . F o r t h i s p a r a m e t e r, y o u s h o u l d e n t e r a n i n t e g e r v a r i a b l e a s s i g n e d t h e v a l u e z e r o i n s t e a d of entering zero, as follows: INTEGER ABN ABN=0 CALL SEND(messageaddress,length,username/ c e a s e - fl a g , o u t p u t - fl a g , A B N , s t a t u s ) Omitted status Unnormalized fl o a t i n g p o i n t TAF assigns the ABN, and the value is not returned. R e c a l l fl a g ( a p p l i e s o n l y i f c e a s e - fl a g i s s e t t o zero. 0, omitted The task begins processing after the block is trans mitted to the network. Nonzero The task begins processing after the block has been delivered to the terminal and acknowledgment is received. Each nonzero value indicates the status of the block. The network function, subfunction, and description are given here. For all values other than 1, the block was not delivered to the terminal and the task must recover. Block delivered (FC/ACK). Block not delivered (FC/NAK/RC-l). User break 1 (INTR/USR/RC-1). User break 2 (INTR/USR/RC-1). tTask associated with application identifier SY can SND to any valid TAF user. 2-20 60459500 C 0^ Table 2-4. FORTRAN SEND Request Parameters (Sheet 2 of 2) Parameter Data Type Value Description 10 Terminal not logged in (CON/END). 11 Correspondent unavailable or failed, line disconnect (C0N/CB/RC-1). Table 2-5. COMPASS SEND Request Parameters (Sheet I of 2) Parameter Bits t 59 c Description Te r m i n a l fl a g . 0 Message is sent to originating terminal. 1 Message is sent to specified user. 58 Task cease flag. 0 The task cease is not performed. 1 The task cease is performed following the SEND request. o 57 No function. Retained for compatibility with previous releases. b 56 Return block flag. r a J^v Value 60459500 C 0 If a is set to one, the task assigns the block number via the abn fi e l d . I f a i s s e t t o z e r o , TA F a s s i g n s t h e b l o c k n u m b e r, a n d t h e number is not returned in the block field. 1 TAF assigns the block number and returns this number in the block fi e l d . 55 R e c a l l fl a g . 0 TAF does not wait for the block to be delivered to the terminal. 1 TAF waits for the block to be delivered to the terminal. 54 Application block header flag. 0 TAF generates the application block header but does it in its own area without making use of or changing word 3 of the parameter table shown in figure 2-8. (Refer to the description of the BLDABH request for the default values TAF uses.) Because a BLDABH request is not available to COMPASS tasks, the header TAF supplies when a=0 always h a s d e f a u l t v a l u e s , e x c e p t f o r a t i c i n fl u e n c e d b y n u m w o r d s . S p e c i fi c a l l y, i f a i s s e t t o z e r o , t h e t a s k c a n o n l y o u t p u t i n 6 - b i t display code, cannot use format effectors, cannot use auto-input mode, and cannot preset the application block number. I The task supplies the application block header. (The task supplies the ABH in the third word SEND parameter table shown in figure 2-8, with parameters shown in table 2-6.) 2-21 Table 2-5. COMPASS SEND Request Parameters (Sheet 2 of 2) Parameter Bits Value messageaddress 47-30 Address of message. For 6-bit display code character type, the message must contain an end-of-line byte from 12 to 66 bits of zero. For 7-bit ASCII characters, the message must have an end-ofline byte of the single character US for all logical lines in the output block. (Refer to the NAM/CCP Host Application Programmers Reference Manual.) numwords 17-0 Number of words in the message. If the a field is set to one, this field is not used. The tic field must be used to specify the mes sage length. The numwords field must contain the unit separator. username 59-18 User name from one to seven characters with binary zero fill. If t h e t fi e l d i s s e t t o o n e , t h i s p a r a m e t e r m u s t b e s p e c i fi e d . I f t h e t fi e l d i s s e t t o z e r o , t h i s fi e l d i s i g n o r e d . block 17-0 A p p l i c a t i o n b l o c k n u m b e r . I f t h e b fi e l d i s s e t t o o n e , TA F returns the application block number in this field. abtt 59-54 A p p l i c a t i o n b l o c k t y p e . T h i s p a r a m e t e r i s i g n o r e d b y TA F. I t i s retained for compatibility with previous systems. Description 1 Indicates that this is not the last data block of the message. 2 Indicates that this is the last or only data block of the message. abn t 41-24 A p p l i c a t i o n b l o c k n u m b e r . I f t h e b fi e l d i s s e t t o o n e , TA F a s s i g n s a n d s t o r e s a v a l u e i n t h e b l o c k fi e l d . I f t h e b fi e l d i s set to zero, this value is stored in block. actt 23-20 Application character type. - nfet xptt aimt 2 7-bit ASCII characters, seven and one-half per word. 3 7 - b i t A S C I I c h a r a c t e r s , r i g h t - j u s t i fi e d i n 1 2 - b i t b y t e s , fi v e p e r word. 4 6-bit display code characters, 10 per word. 15 Format effectors. 0 Format effectors appear in the SEND message. Refer to the NAM/CCP Host Application Programmers Reference Manual for information concerning format effectors. 1 No format effectors appear in the SEND message. 14 Transparent bit. 0 Nontransparent data. IVT transforms are used. 1 If the act field is set to two or three, IVT transforms are inhib i t e d . I f t h e a c t fi e l d i s s e t t o f o u r, t h i s b i t i s i g n o r e d . 12 Auto-input mode. 0 No auto-input mode. I Auto-input mode enabled. tlct 11-0 Te x t l e n g t h i n u n i t s s p e c i fi e d b y t h e a c t fi e l d . I f a n o u t p u t block contains multiple logical lines, all logical lines must contain end-of-llne bytes, which must be included in the character count. status 59-0 S t a t u s o f t h e u s e r n a m e . T h i s fi e l d i s u s e d o n l y i f t h e r fi e l d is set to one. The value of this field Is a supervisory message returned by the network. (Refer to the NAM/CCP Host Application Programmers Reference Manual for a description of the supervisory messages.) tThese parameters apply onl.y if the a field is set to one. 2-22 60459500 C 595857565554 47 41 29 23 20 17 15 13 11 messageaddress numwords block abt abn act Vs tic status Figure 2-13. SEND Parameter Tablet RELSCB Request T h e R E L S C B r e q u e s t r e l e a s e s a l l o v e r fl o w communication blocks tt to the system. After an RELSCB request is processed, subsequent LOADCB requests return a status word of zero. The format is: COBOL the user does not meet the specified criterion. For example, an application could use this to obtain a list of the users that are allowed to use a particu lar data base by selecting the data base field to be searched for a certain name. If the task data base is not the same as the one being interrogated, then the list equals zero. The format is: ENTER RELSCB. COBOL There are no parameters. ENTER TSIM USING code mask criterion rlength list length. FORTRAN CALL RELSCB There are no parameters. COMPASS RELSCB There are no parameters. code Computational-l item whose value I n d i c a t e s w h i c h fi e l d i s t o b e searched: Va l u e 0 D a t a b a s e n a m e fi e l d . 1 U s e r a r g u m e n t fi e l d . 2 TSIM Request r The TSIM request provides limited interrogation of the terminal status table. This table, in central memory, is derived from the network file (refer to section 9). The TSIM request can search four fields in the table. • Data base name field • User argument field • Communication line field • User name field The two-word TST entry of the users that meet a d e fi n e d c r i t e r i o n ( c r i t e r i o n ) i s r e t u r n e d t o t h e u s e r. T h e fi e l d s p e c i fi e d b y c o d e i s e x a m i n e d i n each terminal table entry by taking the logical product of the field and mask to isolate a portion o f t h e fi e l d . T h e l o g i c a l d i f f e r e n c e o f t h i s product and criterion value is then obtained. If this result is zero, the terminal entry is placed in list. No action occurs if it is not zero; that Is, 0^*- Field Communication fi e l d . line 3 U s e r n a m e fi e l d . mask Parameter whose value is taken as a binary mask. It is used in compil ing the list of user names. criterion Criterion value for the search. rlength Computational-l item whose value TAF sets to indicate the number of en tries found. l i s t I t e m i n w h i c h TA F l i s t s f o u n d e n tries. If zero or absent, no list is returned but rlength is given as the number of found entries. length Computational-l item whose value indicates the number of words that list can hold. If zero or absent, no list is returned but rlength is given as the number of found entries. Only the lowest order 12 bits of this value are used. tThe parameters are described in table 2-5. ttDescribed under LOADCB Request. 60459500 C 2-23 co u •H cu b. •ses O J>£ C « -H c >. 43 CO 44 X co bl o cu *3 00 B 43 44 C —I C/J W CU i-i 2-24 cu u o 43 U-l U-l O C ( 0 4 ) U44 ( J 44 U • H 4 3 CO C O u O 0) •W H co cu ca x ca H to H■ < - u. x< 0) ca 4-1 >, < U 3 43 >. 00 (- •• 43 cu eo-a CO it « c « -rt V 6 E »- U >N CU 43 44 cj -a CO CU •- c CO -H X B U bl cu 44 , •o cu w ■ ca (h CU cu "8 5 C/l 4= 44 44 XI bi 44 CU C 44 O. u -a 8 ^ 3 43 3 4) C •Ch - We E E cu cu C O O. a > 1 ENTER CEASE USING a. Abnormal CEASE with memory dump.t -1 > a > -(217-1) Reserved for CDC. Computational-l item whose value indicates the type of CEASE selected: A n y o t h e r v a l u e s p r o d u c e u n d e fi n e d results and should not be used. Type of CEASE 0 Normal CEASE. 1 Abnormal CEASE with out memory dump. ITL Request -1 Normal CEASE and ter minal remains locked. 217-1 > a > 1 Abnormal CEASE with memory dump.t -1 > a > -(217-1) Reserved for CDC. A n y o t h e r v a l u e s p r o d u c e u n d e fi n e d results and should not be used. FORTRAN The ITL request allows a task to set the time limit for the task to a new value. The time limit is expressed in exchange jump time units (that is, the number of times a task executed its full time slice without interruption). In addition, each call to this function decreases the CPU priority of the task b y 1 u n t i l t h e l o w e r l i m i t o f p r i o r i t y i s reached to ensure good service to other tasks. The time limit default value is a product of two installation parameters. The released value is 1.12 CPU seconds. If this is exceeded, the task aborts and the message TIME LIMIT EXCEEDED is issued to the terminal. The format is: CALL CEASE(a) COBOL a Integer whose value indicates the type of CEASE selected: a Type of CEASE 0 Normal CEASE. I Abnormal CEASE with out memory dump. ENTER ITL USING ntm. ntm Computational-l item whose value specifies the new time limit. FORTRAN -1 Normal CEASE and ter minal remains locked. 217-i > a > 1 Abnormal CEASE with memory dump.t -1 > a > -(217-1) Reserved for CDC. CALL ITL(nto) ntm COMPASS ITL address A n y o t h e r v a l u e s p r o d u c e u n d e fi n e d results and should not be used. /pi£v Integer whose value specifies the new time limit. address Address of a parameter table in the format shown in figure 2-17. COMPASS LOGT Request (COMPASS Only) CEASE Integer whose value indicates the type of CEASE selected: Type of CEASE 0 Normal CEASE. 1 Abnormal CEASE with out memory dump. -1 Normal CEASE and ter minal remains locked. The LOGT request logs out a terminal from TAF and returns it to nontransaction mode. The terminal can then access other interactive applications. A system task is provided using this request. (Refer to System Tasks in section 11.) The format is: COMPASS LOGT There are no parameters. tDumps are identified by the transaction subsystem user name or by the appropriate DSDUMP parameter (refer to section 6). 60459500 C 2-29 59 11 W^ ntm WMMflftfo ntm New time limit. Figure 2-17. ITL Parameter Table KPOINT Request The KPOINT request allows a task to initiate execution of any K display command. Section 6 d e s c r i b e s t h r e e K d i s p l a y c o m m a n d s : K . D U M P, K.DUMPLIM, and K.DSDUMP. zeros after either a period or a right parenthesis. COMPASS K display commands are normally issued from the system console to communicate with and to request specific actions of TAF. K display commands should be Issued with care and then only when the results of the command are well-defined. When a task issues a K display command, the prefix K. is omitted. For example, the entry from the con sole is K.DUMP., but the same command Issued from a task is DUMP. All K display commands, except K.DUMP, require that the calling task be on the system task library. Any task can issue the K.DUMP command. The format is: COBOL ENTER KPOINT USING address. address 01-level name of the character string (K display command). The length of the character string cannot exceed 80 characters. The string must begin on a word boundary and must be terminated by a period or a right parenthesis; the exception is the K.MESSAGE command, which must be terminated by 6 bits of zeros after either a period or a right parenthesis. FORTRAN CALL KP0INT(address) address Address of the character string (K display command). The length of the character string cannot exceed 80 characters. The string must begin on a word boundary and must be terminated by a period or a right parenthesis; the exception is the K.MESSAGE command, which must be terminated by 6 bits of 2-30 KPOINT address address Address of the character string (K display command). The length of the character string cannot exceed 80 characters. The string must be gin on a word boundary and must be terminated by a period or a right parenthesis; the exception is the K.MESSAGE command, which must be terminated by 6 bits of zeros after either a period or a right paren thesis. /^H§s. WAIT Request The WAIT request allows tasks to make TAF suspend processing for a specified number of seconds (0 to 3600). The transaction must have no outstanding data manager requests at the time a WAIT request is issued. The format is: COBOL ENTER WAIT USING time. time A computational-2 data item indi cating the number of seconds for which processing is to be suspend e d . I f u n s p e c i fi e d o r o u t o f range, the task is aborted. Only t h e I n t e g e r p o r t i o n i s s i g n i fi c a n t . FORTRAN CALL WAIT(time) time A real number or variable indicat ing the number of seconds for which processing is to be suspended. If u n s p e c i fi e d o r o u t o f r a n g e , t h e task is aborted. Only the integer p o r t i o n i s s i g n i fi c a n t . 60459500 C /*«&. C O M PA S S WAIT address TA S K The UTILITY following REQUESTS task utility requests provide capabili ties for the FORTRAN and COBOL user, some of which a d d r e s s T h e a d d r e s s o f a w o r d s p e c i f y i n g t h e a r e d i f fi c u l t t o d o b e c a u s e t h e y a r e a t t h e b i t number of seconds (N) for which level, processing is to be suspended. The word has the form 48/0,12/N. If • LOGIN u n s p e c i fi e d o r o u t o f r a n g e , t h e task is aborted. Determine if a s p e c i fi e d user is logged in. • EXTRACT Extract a bit string from a word. • INSERT Insert a bit string into a word. j0^\ 60459500 C 2-30.1/2-30.2 | /P9**- LOGiN Request EXTRACT Request The LOGIN request allows a task to determine if a specified user is logged in before it issues a SEND request to that user. TAF aborts a task that issues a SEND request without recall to a user who is not logged in. The EXTRACT request allows a task to extract a bit string from a word and move it to another word, r i g h t - j u s t i fi e d . F o r i n s t a n c e , t h e E X T R A C T r e q u e s t ca n b e u se d to ch e ck fie l d s i n th e te r m i nal status table or the communication block. | NOTJ"| In the following request formats, if n is not within the specified range, if bbp plus 1 minus n is less than 0, or if there are any other errors in the p a r a m e t e r s , TA F a b o r t s t h e t a s k a n d i s s u e s t h e following message. It is possible for the receiving user to log out after the task issues a LOGIN request and before the task issues a SEND request. Therefore, it is recommended that the task issue the SEND request soon after issuing the LOGIN request. TASK REQUEST ARGUMENT ERROR. The format is: COBOL ENTER EXTRACT USING loci loc2 bbp n. The format is: loci D a t a n a m e o f t h e s o u r c e fi e l d . Any data type is allowed, loci must begin on a word boundary. loc2 Data name of the computational-l d e s t i n a t i o n fi e l d . T h e b i t s t r i n g i s r i g h t - j u s t i fi e d i n t h i s fi e l d . bbp B e g i n n i n g b i t p o s i t i o n o f fi e l d loci; this is the leftmost bit o f t h e fi e l d . B i t s a r e n u m b e r e d 59 through 0. COBOL 0$^ ENTER LOGIN USING username status. username A one- to seven-character alpha numeric user name, left-justi fi e d . A b i n a r y z e r o s p e c i fi e s the user associated with the transaction that is running. status Address of the location to contain the returned status. The format of the returned status is computational-l. Values for status are: Number of bits to extract; the range of values for n is 1 to 59, inclusive. The format of n must be computational-l. 0 User not logged in. FORTRAN 1 User logged in. CALL EXTRACT(locl,loc2,bbp,n) FORTRAN l o c i N a m e o f t h e i n t e g e r s o u r c e fi e l d . CALL LOGTN(username,status) loc2 Name of the integer destination fi e l d . T h e b i t s t r i n g i s r i g h t j u s t i fi e d i n t h i s fi e l d . username A one- to seven-character alpha numeric user name, left-justi fi e d . P o s s i b l e f o r m s a r e n H f and nLf (refer to the FORTRAN Extended 4 Reference Manual). A b i n a r y z e r o s p e c i fi e s t h e u s e r associated with the transaction that is running. status Address of the location to contain the returned status. The format of the returned s t a t u s i s i n t e g e r. Va l u e s f o r status are: 0 User not logged in. 1 User logged in. bbp n B e g i n n i n g b i t p o s i t i o n o f fi e l d loci; this is the leftmost bit o f t h e fi e l d . B i t s a r e n u m b e r e d 59 through 0. Number of bits to extract; the range of values for n is 1 to 59, inclusive. n must be integer type. The COBOL STRING and UNSTRING statements also provide capabilities for manipulating characteraligned data. The EXTRACT request should be used only when the use of these COBOL statements is impossible or inconvenient. j ^ y 60459500 A 2-31 INSERT Request APPLICATION RECOVERY REQUESTS T h e I N S E RT r e q u e s t a l l o w s a t a s k t o i n s e r t a b i t string into a word. For instance, the INSERT r e q u e s t c a n b e u s e d t o s e t fi e l d s i n t h e t e r m i n a l status table. The following task requests are for use in recoverable transactions. All are for use by applications tasks although some are also used by system tasks. RERUN In the following formats, if n is not within specified range, if bbp plus 1 minus n is less 0, or if there are any other errors in p a r a m e t e r s , TA F a b o r t s t h e t a s k a n d i s s u e s following message. the than the the TASK REQUEST ARGUMENT ERROR. Restarts a run terminal input. unit using the initial RGET Retrieves data from recovery file (CRF). the communication RPUT The format is: COBOL Places data on the communication recovery fi l e . ENTER INSERT USING loci loc2 bbp n. RSECURE loci Data name of the computational-l s o u r c e fi e l d . T h e b i t s t r i n g m u s t b e r i g h t - j u s t i fi e d i n t h i s fi e l d . Retrieves a message previously saved on the c o m m u n i c a t i o n r e c o v e r y fi l e b y a S E C U R E request. l o c 2 D a t a n a m e o f t h e d e s t i n a t i o n fi e l d . Any data type is allowed. loc2 must begin on a word boundary. SECURE b b p B e g i n n i n g b i t p o s i t i o n o f fi e l d loc2; this is the leftmost bit of t h e fi e l d . B i t s a r e n u m b e r e d 5 9 through 0. n Number of bits to insert; the range of values for n is 1 to 59, inclusive. The format of n must be computational-l. FORTRAN CALL INSERT(locl,loc2,bbp,n) l o c i N a m e o f t h e i n t e g e r s o u r c e fi e l d . The bit string must be r i g h t - j u s t i fi e d i n t h i s fi e l d . loc2 bbp Name of fi e l d . the integer destination B e g i n n i n g b i t p o s i t i o n o f fi e l d loc2; this is the leftmost bit of t h e fi e l d . B i t s a r e n u m b e r e d 5 9 through 0. Number of bits to insert; the range of values for n is 1 to 59, inclusive, n must be integer type. The COBOL STRING and UNSTRING statements also provide capabilities for manipulating characteraligned data. The INSERT request should be used only when the use of these COBOL statements is impossible or inconvenient. 2-32 Signals the completion of a transaction's work and saves a message on the recovery file to be sent to the terminal when the run unit ceases. TSTAT Returns the status of one or more specified objects. Refer to section 7 for an overview of the recovery process from the applications programmer's perspective. Refer to the applicable data manager r e f e r e n c e m a n u a l ( C D C S , TA F / C R M , o r TO TA L ) f o r requests associated with data base recovery. RERUN Request The RERUN request causes the initial terminal input for a rerunnable run unit to be resubmitted to the transaction system. The input comes from the communication recovery file. The actions that occur as a result of RERUN are: 1. The recovery status is set to zero so that the recovery task will not be scheduled. 2 . T h e r e s t a r t s t a t u s ( T S TAT w i t h k e y w o r d RESTART) is set to one. 3. A termination is processed for the run unit and ITASK is called to rerun the run unit. Tr a n s a c t i o n s u s i n g t h i s r e q u e s t m u s t t a k e c a r e t o avoid entering an infinite loop if the RERUN results from an error condition. 60459500 A /<^s area of the communication r e c o v e r y fi l e , a n d s o o n . T h i s parameter is input for both RPUT and RGET. The maximum value of index is the value of the number parameter in the RECOVER statement in the TCF. The format is: COBOL ENTER RERUN USING status, status A computational-l data item w h o s e v a l u e i s s e t b y TA F t o indicate the status of the request. The values are: status 0 No errors. 29 Recovery is not in stalled. 0 No errors. 19 The index is outside of t h e u s e r r e c o v e r y fi l e message area (RPUT only). 33 Run unit is not rerunnable. FORTRAN 20 No message (RGET only). CALL RERUN (status) status 21 The message does not fi t i n t h e r e c o v e r y file message area (RPUT only). An integer variable in which TA F w i l l r e t u r n a s t a t u s . T h e values are: 0 No errors. 22 The message does not fit in the user message area (RGET only). 29 Recovery is not in stalled. 23 Incorrect application character type (act). 33 Run unit is not rerunnable. 28 The RGET act is not equal to the RPUT act. 2 9 TA F a u t o m a t i c r e c o v e r y is not installed. RPUT and RGET Requests The RPUT request allows a task to put applicationdependent data on the communication recovery file. The RGET request allows the task to retrieve the data placed on the recovery file by an RPUT. The length of the data in each request and the number of s l o t s f o r d a t a o n t h e r e c o v e r y fi l e i s s p e c i fi e d a t TAF initialization on the RECOVER statement in the TCF (refer to section 4). TAF maintains the data on a user name basis. TAF does not modify the user d a t a u n l e s s t h e c o m m u n i c a t i o n r e c o v e r y fi l e i s initialized. These requests may be used by any task when TAF automatic recovery is installed. messagelength A computational-l data item indicating the length of the message in the message units specified by the act parameter. This parameter is required when using message units other than 6-bit display code. This is an i n p u t p a r a m e t e r f o r R P U T. F o r RGET, the user sets the messagelength of the area to receive the message. Upon completion of RGET, TAF places the length of the message in messagelength. act A computational-l data item indicating the application character type. The type is t h e s a m e a s f o r N A M. This is an input parameter. The values are: The format is: COBOL ENTER "RPUT" USING message,index[.status .messagelength, act]. ENTER "RGET" USING message,index,status .messagelength(,act]. message An 01-level data item that contains the message. This is an input parameter for RPUT and an output parameter for RGET. index A computational-l data item indicating the index for the recovery record. Index 1 p o i n t s t o t h e fi r s t r e c o r d i n user area of the communication r e c o v e r y fi l e ; i n d e x 2 p o i n t s to the second record in user 60459500 B A computational-l data item w h o s e v a l u e i s s e t b y TA F t o indicate the status of the request. The values are: 2 7-bit ASCII characters, seven and one-half per word. 3 7-bit ASCII characters, r i g h t - j u s t i fi e d i n 1 2 b i t b y t e s , fi v e p e r word. 4 6-bit display code char acters, 10 per word. This is the default value. 2-33 act FORTRAN An CALL RPUT(message,index,status.message-length t.act]) CALL RGET(message,index,status ,message-length [,act]) message index status An integer variable whose value i s s e t b y TA F t o i n d i c a t e t h e status of the request. The values are: 0 No errors. 19 The index is outside of the user recovery area. 20 No message (RGET only). 21 The message does not fi t i n t h e r e c o v e r y file message area (RPUT only). 22 The message does not fit in the user message area (RGET only). 3 7-bit ASCII characters, r i g h t - j u s t i fi e d i n 1 2 b i t b y t e s , fi v e p e r word. 4 6-bit display code characters, 10 per word. This is the default value. RSECURE Request The RSECURE request allows a recovery task to obtain a m e s s a g e p r e v i o u s l y s a v e d o n t h e c o m m u nication recovery file by a SECURE request. After obtaining the message, the task would normally send the message to the appropriate terminal. Any task may use this request if automatic recovery has been installed with TAF. The format is: COBOL ENTER "RSECURE" USING message,status , message-length ,ac t,format-effec tor, transparent-mode. message An 01-level data item that contains the message. This is an output parameter. status A computational-l data item w h o s e v a l u e i s s e t b y TA F t o indicate the status of the request. The values are: 0 No errors. 23 Incorrect application character type (act). 20 No message. 28 The RGET act is not equal to the RPUT act. 22 The message does not fit in the user message area. 2 9 TA F a u t o m a t i c r e c o v e r y is not installed. 29 message- An integer variable indicating length the length of message in the message units specified by the act parameter. This is an input parameter for RPUT. For RGET, the user sets the messagelength of the area to receive the message. Upon completion of the request, TAF returns the message-length as recorded on the communication recovery file. 2-34 2 7-bit ASCII characters, seven and one-half per word. The name of an array that contains the message. This is an input parameter for RPUT and output parameter for RGET. An integer variable indicating the index for recovery record. I n d e x 1 p o i n t s t o t h e fi r s t record in user area of the c o m m u n i c a t i o n r e c o v e r y fi l e ; index 2 points to the second record in user area of the c o m m u n i c a t i o n r e c o v e r y fi l e , and so on. This parameter is input for both RPUT and RGET. The maximum value of index is the value of the number parameter in the RECOVER statement in the TCF. integer variable indicating the application character type. The type is the same as for NAM. This is an input parameter. The values are: Recovery stalled. is not in- message- A computational-l data Item length indicating the length of message in the message units s p e c i fi e d by the act p a r a m e t e r. B e f o r e i s s u i n g t h e request, the user sets the message-length area in the task. Upon completion of the r e q u e s t , TA F r e t u r n s t h e message-length as recorded on the communication recovery file. 60459500 B A computational-l data item indicating the application character type. The type is the same as for NAM. Before issuing the request, the user sets the act. Upon completion of the request, TAF returns the act as recorded on the recovery fi l e . T h e v a l u e s a r e : 2 7-bit ASCII characters, seven and one-half per word. messagelength An integer variable indicating the length of the message in m e s s a g e u n i t s s p e c i fied by the a c t p a r a m e t e r. B e f o r e i s s u i n g the request, the user sets the message-length area in the task. Upon completion of the r e q u e s t , TA F r e t u r n s t h e message length as recorded on the communication recovery file. act An integer variable indicating the application character type. The type is the same as NAM. Before issuing the request, the user sets the act. Upon completion of the request, TAF returns the act as r e c o r d e d o n t h e r e c o v e r y fi l e . The values are: 3 7-bit ASCII characters, r i g h t - j u s t i fi e d i n 1 2 b i t b y t e s , fi v e p e r word. 4 formateffector 6-bit display code characters, 10 per word. This is the default value. 2 7-bit ASCII characters, seven and one-half per word. A computational-l data item indicating format effector usage. The values are: 3 7-bit ASCII characters, r i g h t - j u s t i fi e d i n 1 2 b i t b y t e s , fi v e p e r word. 0 Format effectors appear in the message. 4 1 No format effectors appear in the message. transpar ent-mode A computational-l data item indicating transparent mode usage. Default is nontranspar ent mode. The values are: formateffec tor An integer variable indicating format effector usage. The values are: 0 Format effectors appear in the message. 0 Nontransparent data. Interactive virtual terminal transforms are used. 1 Transparent data. IVT transforms are inhib ited. 6-bit display code characters, 10 per word. This is the default value. 1 No format effectors appear in the message. transpar ent-mode An integer variable indicating transparent mode usage. The values are: FORTRAN 0 Nontransparent data. Interactive virtual terminal transforms are used. CALL RSECURE(message,status,message-length, act, format-effector,transparent-mode) message The name of an array that contains the message. This is an output parameter. status An integer variable whose value I s s e t b y TA F t o i n d i c a t e t h e status of the request. The values are: 1 Transparent data. IVT transforms are inhib ited. SECURE Request 0 No errors. 20 No message. 22 The message does not fit in the user message area. 29 Recovery is not in stalled. 60459500 A The SECURE request tells the transaction executive th a t th e w o r k o f th e r u n u n i t i s c o m p l e te. All that remains is to commit the data base and end the run unit. The SECURE request includes a terminal confirmation message. This message will be sent at the run unit end time (normal CEASE). If the commit request fails, the task may RERUN the run unit or issue a CEASE request with abnormal termination. In either case, the SECURE message will not be sent. 2-35 TAF records the message associated with SECURE on permanent storage so that the message can be delivered in spite of system or terminal failures. If no failures occur, the message will be sent from the task's SECURE message area. This means that the SECURE, data base commit, and CEASE must occur in the same task. TAF assumes that the message has been acknowledged by the terminal operator when the operator enters the next transaction input. The SECURE message may appear twice if recovery is done after a failure, but it is guaranteed to appear at l e a s t o n c e . TA F a l s o s a v e s t h e N A M a p p l i c a t i o n block header with the message so that it will be sent with the correct character type and mode. Only the last SECURE message is saved per run unit. Any task may use this request if recovery has been installed with TAF; however, if the run unit is not recoverable, the SECURE message will not be issued to the terminal upon recovery (only at initial CEASE time). messagelength A computational-l data item indicating the length of the message in the message units s p e c i fi e d by the act p a r a m e t e r. T h i s i s a n i n p u t p a r a m e t e r. I t i s r e q u i r e d w h e n the act parameter does not s p e c i f y d i s p l a y. act A computational-1 data item indicating the application character type. The type is the same as for NAM. This is an input parameter. The values are: 2 7-bit ASCII characters, seven and one-half per word. 7-bit ASCII characters, r i g h t - j u s t i fi e d i n 1 2 b i t b y t e s , fi v e p e r word. For a BTRAN run unit the message is recorded on the communication recovery file but no message is sent to the terminal/username. The RECOVER statement maximumsize parameter specifies the message size that can be recorded on the communication recovery fi l e . 6-bit display code characters, 10 per word. This is the default value. The format of the message on the terminal depends on t h e t e r m i n a l c l a s s a n d t h e f o r m a t e ff e c t o r s i n t h e message. Refer to the SEND request description earlier in this section for more information. formateffec tor The format is: COBOL ENTER "SECURE" USING message,statusf,messagelength,act ,format-effector .transparent-mode] . 0 Format effectors appear in the message. message A 01-level data item that contains the message. This is an input parameter. status A computational-l data item w h o s e v a l u e i s s e t b y TA F t o indicate the status of the request. The values are: 0 No errors. 21 The message is too l a r g e t o fi t i n T A F ' s communication recovery fi l e . R e f e r t o t h e RECOVER statement maxi mumsize parameter. 1 No format effectors appear in the message. transpar- A computational-l data item ent-mode indicating transparent mode usage. This is an optional parameter. It is necessary only if transparent mode is used. The default is nontransparent mode. The values are: 0 Nontransparent data. Interactive virtual terminal transforms are used. 23 Incorrect application character type. 24 A computational-l data item indicating format effector usage* This is an optional parameter. It is necessary only if format effectors are used. The default is no format e ff e c t o r s . T h e v a l u e s a r e : Incorrect formateffector value. 1 Transparent data. IVT transforms are inhib ited. 25 Incorrect transparentmode value. 26 The message exceeds the maximum length for SEND. 27 The message exceeds the maximum length for a run unit. 2 9 TA F a u t o m a t i c r e c o v e r y is not installed. 2-36 FORTRAN CALL SECURE (message,status,message-length [ ,act,format-effector.transparent-mode]) message The name of an array that contains the message. This is an input parameter. 60459500 A status An integer variable whose value i s s e t b y TA F t o i n d i c a t e t h e status of the request. The values are: 0 No errors. transpar- An integer variable indicating ent-mode transparent mode usage. This i s a n o p t i o n a l p a r a m e t e r. I t is necessary only if transparent mode is used. The default is nontransparent mode. The values are: 21 The message is too large to fit in the communica t i o n r e c o v e r y fi l e . Refer to the RECOVER statement maximumsize parameter. 0 Nontransparent data. Interactive virtual terminal transforms are used. 1 Transparent data. IVT transforms are inhib ited. 23 Incorrect application character type. 2 4 I n c o r r e c t f o r m a t e ff e c t or value. TSTAT Request 25 Incorrect transparentmode value. 26 The message exceeds the maximum length for SEND. 27 The message exceeds the maximum length for a run unit. 2 9 TA F a u t o m a t i c r e c o v e r y is not installed. J8*V messagelength An integer variable indicating the length of the message in the message units specified by t h e a c t p a r a m e t e r. T h i s i s a n input parameter. act An integer variable indicating the application character type. The type is the same as for NAM. This is an input parameter. The values are: 2 7-bit ASCII characters, seven and one-half per word. 3 7-bit ASCII characters, r i g h t - j u s t i fi e d 1 2 - b i t bytes, five per word. 6-bit display characters, 10 word. This is default value. code per the format- An integer variable indicating effector format effector usage. This is a n o p t i o n a l p a r a m e t e r. I t i s necessary only if format effec tors are used. The default is no format effectors. The values are: 0 Format effectors appear in the message. 1 No format effectors appear in the message. 60459500 A T h e T S TAT r e q u e s t r e t u r n s i n f o r m a t i o n a b o u t t h e current user or run unit. It is used by both system tasks and applications (user) tasks. The format is: COBOL ENTER "TSTAT** USING status .keyword j, value j,..., keywordn,valuen. status A computational-l data item w h o s e v a l u e i s s e t b y TA F t o indicate the status of the request. The values are: 0 No errors. 12 The keyword speci fi e d r e q u i r e s T A F automatic recov e r y. TA F a u t o m a t i c recovery is not installed. 13 End of NEXT proc essing. 1 4 U S E R i s n o t d e fi n e d i n t h e n e t w o r k fi l e . 400+i keyword^ is invalid. keyword ^ An 01-level item that contains a one- to seven-character keyword for which a value is desired. The keyword must be l e f t - j u s t i fi e d a n d b l a n k fi l l e d . R e f e r t o t a b l e 2 - 7 f o r k e y w o r d d e fi n i t i o n s . v a l u e ^ A d a t a i t e m t o w h i c h TA F r e t u r n s the value for the corresponding keyword. The keyword^ and v a l u e ^ fi e l d s m u s t a p p e a r i n pairs. For USER, NEXT, OLDID, and NEWID usage is display. For all other TSTAT keywords, usage is computational-l. 2-37 TSTAT System Task Keywords FORTRAN C A L L T S TAT ( s t a t u s . k e y w o r d j , v a l u e j k e y w o r d a , valuen) status An integer variable whose value i s s e t b y TA F t o i n d i c a t e t h e status of the request. The values are: 0 No errors. 12 The keyword speci fi e d r e q u i r e s T A F automatic recov e r y. TA F a u t o m a t i c recovery is not Installed. 13 End of NEXT proc essing . 1 4 U S E R i s n o t d e fi n e d in the network file. 400+i keywordi is invalid. keyword.£ A variable that contains a oneto seven-character left-just i fi e d k e y w o r d f o r w h i c h a value is desired. The keyword m u s t b e b l a n k - fi l l e d . R e f e r t o table 2-7 for keyword d e fi n i t i o n s . v a l u e ^ A v a r i a b l e fi e l d t o w h i c h T A F returns the value of the de sired keyword. The keyword^ and valuer must appear in pairs. For USER, NEXT, OLDID, and NEWID valuer is character d a t a . F o r a l l o t h e r T S TAT keywords, valuer is an i n t e g e r. Some TSTAT keywords (both as COBOL and FORTRAN parameters) are meant for user tasks and others are meant for system tasks, such as BTASK, CTASK, and RTASK. TSTAT User Task Keywords • Keywords RESTART, OLDID, and NEWID are meant for use by application tasks that use multiple data manager begin-commit sequences to determine If the run unit is in a restarted state and, if so, where to begin processing* • Keywords STEP, TRAN, OLDIN, NEWID, CRM, and C D C S a r e u s e d b y RTA S K d u r i n g t e r m i n a l login/relogin to determine if a run unit requires rerun. The SEQ (sequence number) returned is the transaction sequence number t h a t w a s fi r s t a s s i g n e d t o t h e r u n u n i t . RTASK can be either a system task or a user task. 2-38 Keywords NEXT, STEP, TRAN, OLDID, NEWID are u s e d b y B TA S K t o r e a d s e q u e n t i a l l y t h e c o m m u n i c a t i o n r e c o v e r y fi l e t o fi n d b a t c h (BTRAN) run units that require rerunning. BTASK uses the SRERUN request with username to rerun BTRAN run units. SYSTEM TASK RECOVERY REQUESTS Applications programmers can skip this subsection since all the requests documented here are available only to system tasks (that is, tasks residing on the system task library). Recovery requests that are for use by both system tasks and application tasks are documented under Application Recovery Requests ear lier in this section. Refer to section 8 for an overview of the recovery process from the data admin istrator's perspective. Refer to the applicable data manager reference manual (CDCS, TAF/CRM, or TOTAL) for requests associated with data base recovery. The following task requests are used by system tasks for transaction recovery. ■ CALLTRN Initiates a run unit* • SRERUN Resubmits initial terminal input for a rerunnable run unit. • TINVOKE R e t u r n s o r s p e c i fi e s a s y s t e m i d e n t i fi e r f o r begin-commit sequences in this job. • W S TAT Records information needed for recovery processing. CALLTRN Request The CALLTRN request causes the initiation of a run unit. It is available only to the system task ITASK. The actions that occur as a result of CALLTRN are: 1 . I TA S K c e a s e s . I f a n e r r o r c o n d i t i o n i s d e tected, an error message is issued to the terminal via MSABT. 2. The initial terminal input is logged on the CRF if the transaction is recoverable. The transaction will not be scheduled for execu tion until this circular input-output (CIO) operation is complete. 3. If the transaction initiated is recoverable, the commitment history of the previous recov erable run unit for this user is released. 60459500 B Table 2-7. TSTAT Keyword Descriptions Keyword Value Description USER Return status for the user/terminal specified in value. If USER or NEXT i s n o t s p e c i fi e d , t h e n t h e r e q u e s t r e f e r s t o t h e o r i g i n a t i n g t e r m i n a l / user. Only one of USER/NEXT can be specified in a single TSTAT request. Reserved for tasks on system task library. NEXT Return the next user from the communication recovery file(s). NEXT is available only to system tasks. When NEXT is specified, all other key words will refer to the next user. Only one of USER/NEXT can be specified in a single TSTAT request. SEQ Return the transaction sequence number for specified user. STEP Run unit or job step. Nonrecoverable run unit or job input. CDCS down. This applies only to a recoverable run unit. Normal transaction CEASE or job end. Present only for BTRAN or TAF/CRM batch concurrency jobs. jgPN Task or job abort. Run unit is no longer rerunnable. This occurs when an I/O error is detected and the data cannot be recovered for the user. Recoverable run unit or job input. CRM begin-commit ids are logged. NAM down. This applies only to a recoverable run unit. TRAN Run unit type. Terminal user. BTRAN user jobs. TAF/CRM user job. CRM CRM usage. CRM may not be used by the transaction. CRM may be used by the transaction. CDCS CDCS usage. CDCS may not be used by the transaction. CDCS may be used by the transaction. RESTART Run unit is not in restarted state. Run unit is in restarted state. This state occurs when a RERUN request was issued. OLDID Return the old (previous) CRM begin-commit id from the communication r e c o v e r y fi l e . NEWID Return the new (current) CRM begin-commit id from the communication r e c o v e r y fi l e . 0^*. 60459500 B 2-39 The format is: 31 username is not in the n e t w o r k fi l e . COBOL 33 Run unit rerunnable. ENTER CALLTRN USING tname. tname 01-level data item containing a one- to seven-character trans action name. FORTRAN is not username A variable containing a one- to seven-character user name, leftj u s t i fi e d a n d b l a n k - fi l l e d . I f this parameter is omitted, the rerun applies to the originating u s e r. CALL CALLTRN(tname) tname An integer containing a one- to seven-character transaction n a m e , l e f t - j u s t i fi e d w i t h b l a n k fi l l . SRERUN Request The SRERUN request causes the initial terminal input for a rerunnable run unit to be resubmitted to the tr a n s a c ti o n s u b s y s t e m . T h e i n p u t i s r e t r i e v e d f r o m t h e c o m m u n i c a t i o n r e c o v e r y fi l e . T h e a c t i o n s t h a t occur as result of SRERUN are: TINVOKE Request The TINVOKE request returns a system identifier to be used for all begin-commit sequences in the job or t a s k . F o r TA F, t h i s s y s t e m i d e n t i fi e r i s t h e t r a n s action sequence number. Optionally, for the recovery case, the job or task may supply an old system iden t i fi e r . T h i s e s t a b l i s h e s t h e t a s k o r j o b a s a continuation of a previous task or job. The format is: COBOL • The recovery status is set to zero so that the recovery task will not be scheduled. • T h e r e s t a r t s t a t u s ( T S TAT w i t h k e y w o r d RESTART) is set to one. • The SRERUN is done without requesting run unit termination. ENTER TINVOKE USING status,new-system-id, old-system-id. status A computational-l item in which TA F w i l l r e t u r n a s t a t u s * T h e values are: 0 Request successful. The format is: 32 old-system-id unknown. COBOL ENTER SRERUN USING status[.username]. status A computational-l data item in w h i c h TA F w i l l r e t u r n a status. The values are: 0 No errors. 29 Recovery not installed. new-system-id A computational-l item in which TAF will return a system identi fi e r t o b e u s e d f o r a l l b e g i n commit sequences in the job or task. old-system-id A computational-l item in which the task or job supplies the o l d s y s t e m i d e n t i fi e r t h a t establishes the task or job as a continuation of the old one. 31 username not in network fi l e . FORTRAN 33 Run unit not rerunnable. CAIi TINVOKE(status.new-system-id,old-system-id) username 01-level data item containing a one- to seven-character user name. If this parameter Is omitted, the rerun applies to the user name under which the current task is running. FORTRAN status An integer variable in which TA F w i l l r e t u r n a s t a t u s . T h e values are: 0 Request successful. 32 old-system-id unknown. CALL SRERUN(status[,username]) s t a t u s A n i n t e g e r i n w h i c h TA F w i l l return a status. The values are: 0 No errors. 29 Recovery is not in stalled. 2-40 /tf^&sjV n e w - s y s t e m - i d A n i n t e g e r i n w h i c h TA F w i l l r e t u r n a s y s t e m i d e n t i fi e r t o be used for all begin-commit sequences in the task or job. old-system-id An integer in which the task or job supplies the old system i d e n t i fi e r t h a t e s t a b l i s h e s t h e program as a continuation of a previous one. 60459500 A /_C^v FORTRAN WSTAT Request The WSTAT request records information needed for recovery processing on the communication recovery file or TAF system tables. WSTAT is used by system task CTASK. CALL WSTAT(status.keywordi,valuei,. valuen) status The format is: COBOL 29 status A computational-l item whose value is set by TAF to indicate the status of the request. The values are: 0 29 No K e y w o r d s p e c i fi e d r e q u i r e s TA F a u t o matic recovery. TAF automatic recovery is not installed. 3 1 U S E R i s n o t d e fi n e d in the network file. 400+i keyword^ is invalid. keyword^ An 01-level item containing a one- to seven-character keyword for which a value is speci fied. The keyword must be leftj u s t i fi e d a n d b l a n k - fi l l e d . R e fer to table 2-8 for keyword d e fi n i t i o n s . value^ A computational-l item that con tains the value for the desired keyword. The keyword^ and v a l u e j fi e l d s m u s t a p p e a r i n pairs. No errors. K e y w o r d s p e c i fi e d r e q u i r e s TA F a u t o matic recovery. TAF automatic recovery is not installed. 30 End of NEXT process ing. errors. 30 End of NEXT process ing. 60459500 B An integer whose value is set b y TA F t o g i v e t h e s t a t u s o f the request. The values are: 0 ENTER "WSTAT" USING status .keyword!.valuet,..., keywordn,valuen. ,keywordn, 3 1 U S E R i s n o t d e fi n e d i n t h e n e t w o r k fi l e . 400+i keyword^ is invalid. keyword^ A variable containing a one- to seven-character keyword for w h i c h a v a l u e i s s p e c i fi e d . The keyword must be leftj u s t i fi e d a n d b l a n k - fi l l e d . Refer to table 2-8 for keyword d e fi n i t i o n s . value£ Integer that contains the value of the preceding keyword. The keyword j and value j_ must appear in pairs. The WSTAT keywords (both for COBOL and FORTRAN param eters) are given in table 2-8. All keywords neces sary for recovery processing for a user name must be specified in the WSTAT request. For instance, CTASK makes a TSTAT request specifying NEXT, SEQ, STEP, TRAN, CRM, and CDCS followed by a WSTAT with SEQ, TRAN, CRM, CDCS, OLDID, NEWID, USER, and STEP. Any k e y w o r d n o t s p e c i fi e d r e t a i n s t h e v a l u e a s s o c i a t e d with it on the previous WSTAT request. 2-41 Ta b l e 2 - 8 . W S TAT K e y w o r d D e s c r i p t i o n s Keyword Description Va l u e USER Set status for user name specified in value. If USER is not specified, then the request refers to the originating user name. SEQ The transaction sequence number specified in value is written for a given user name. STEP Transaction or job step. 0 Nonrecoverable run unit or job input. 1 CDCS down. Applies only to recoverable run units. 2 Normal transaction cease or job end. Present only for BTRAN or TAF/CRM batch concurrency. 3 Task or job abort. 4 Run unit no longer rerunnable. This occurs when an I/O error is detected and the data cannot be recovered for the user. 5 Recoverable run unit or job input. 6 CRM begin-commit ids are logged. 7 NAM down. Applies only to a recoverable run unit. 8 Allow terminal or job input to TAF. 9 Terminate TAF because of a recovery error. Transaction type. TRAN 1 Terminal user. 2 BTRAN user job. 3 TAF/CRM user job. CRM usage. CRM 0 CRM may not be used by transaction. 1 CRM may be used by transaction. CDCS usage. CDCS 2-42 y^$w$?V 0 CDCS may not be used by transaction. 1 CDCS may be used by transaction. OLDID Set old (previous) CRM begin-commit id on the communcation recovery file. NEWID Set new (current) CRM begin-commit id on the communication recovery file. 60459500 B J^v ACCESS AND USE OF CDCS BY TASKS The CYBER Database Control System can be used alone or with one other data manager (CRM or TOTAL) in the same transaction. If a task is to use CDCS, the CDCS reference manuals listed in the preface should be consulted for information on how to set up the data base (schema, subschema, master directory, and files). This data base is associated with CDCS and t h e fi l e s w i l l b e a t t h e c o n t r o l p o i n t o f C D C S during execution. Tasks can use the CDCS verbs for data base access provided that they are compiled with the appropriate subschema relating them to a CDCS data base. In the following, xx represents the two-character d a t a b a s e i d e n t i fi e r. A TAF application (known by the xx identifier in the TCF) is linked to a CDCS data base by means of the subschemas used in the tasks associated with the a p p l i c a t i o n ( t h e s e a r e t h e t a s k s o n x x TA S K L ) . A l l tasks in a transaction must use the same subschema or a fatal task error (detected by CDCS) will occur. Refer to sections 7 and 8 for information regarding recoverable transactions and CDCS/transaction aborts. T h e f o l l o w i n g TA F fi l e s a r e a s s o c i a t e d w i t h a n application using CDCS: TCF xxJ xxTASKL xxJORl XXJ0R2 xxJ0R3 Required. Required unless all tasks are on system task library. Optional. A transaction will be considered to be connected to CDCS if it has successfully issued a request to CDCS a n d th e te r m i n a t e r e q u e s t t o C D C S h a s n o t b e e n completed. (A CDCS terminate request from other than the last task in a chain will be ignored.) If the last task in the chain does not issue a CDCS terminate request, one will be issued automatically when the last task completes. The possibility of a deadlock involving CDCS and another data manager (TOTAL or CRM) exists. For instance, if task X locks some resources under one data manager and then tries to lock other resources under another data manager that task Y initially locked, then the two tasks may be deadlocked if task Y tries to lock any of the resources locked by task X. It is the responsibility of the installation, applications programmers, and the data administrator to prevent these situations from occurring. Such deadlocks can be prevented by locking resources in a s p e c i fi e d o r d e r o n l y, f o r e x a m p l e , l o c k i n d a t a m a n a g e r A r e s o u r c e s fi r s t , t h e n d a t a m a n a g e r B resources, and so forth. A task will abort if it attempts to use CDCS when CDCS is not present in the system or if CDCS aborts while a transaction is connected to it. If a task aborts while it is connected to CDCS, TAF will issue an abnormal termination notice to CDCS for the task (unless the abort originated with CDCS). RESTRICT clauses cause tasks to automatically r e q u e s t a d d i t i o n a l c e n t r a l m e m o r y. A l l o f t h e advice and requirements relevant to a task requesting that its FL be increased apply when RESTRICT clause processing is used (refer to Memory Requests, section 2). JlP^V 60459500 A 3-1 SYSTEM FILES This section is intended for the data administrator and can be omitted by the applications programmer. CRM DATA MANAGER xxJ FILE T h i s s e c t i o n d i s c u s s e s f o u r t o p i c s : t h e x x J fi l e , j o u r n a l fi l e s , t h e TA F c o n fi g u r a t i o n fi l e , a n d t h e communication recovery file. If data base recovery is to be used, the user speci fied on the USER statement must be able to read the xxJ file. This can be done by granting read permis sion to that user or by making the file public. An xxJ file is associated with each data base and has the following functions. The structure of the xxJ file (when using the CRM Data Manager) is shown as follows. • Defines the user's user name, password, and optional user index. • Defines optional journal files. <#ffiv • Defines optional device residence for the t a s k l i b r a r y a n d s o m e fi l e s s p e c i fi c t o t h e individual data managers (refer to the xxJ fi l e d e s c r i p t i o n s t h a t f o l l o w ) . Up to three journal files can be specified optionally to supplement the system journalizing. A task can write to one of the journal files by using the JOURNL request. T C F, t h e TA F c o n fi g u r a t i o n fi l e , d e fi n e s t h e d a t a bases associated with a data manager, defines the network files and communication recovery files to be used, and may contain K display commands. ■A procedure file (TAFxxxx) is used to initialize TAF. Commands may be added to it for recovery or to estab lish the operating environment. For example, com m a n d s th a t a t t a c h j o u r n a l fi l e s ( x x J O R n ) a n d d a t a b a s e fi l e s c a n b e i n c l u d e d I n t h i s fi l e . R e f e r t o the NOS 2 Installation Handbook for more information (refer to the preface for the publication number). xxJ USER(username,password, familyname)t BRF,number x x J O R l , d e v l c e t y p e , fi l e t y p e . xxJ0R2.devicetype, filetype., xxJ0R3 ,devicetype,filetype. xxTASKL,PN~packname, R-device. Optional, CRM(xxpfnl,type.mode,users, locks,mrl,pkl.hash,rec,fwi, packname,device) IXN(xxpfxn,naky,packname, device) AKY(akn,ako,akl) AKY(akn,ako,akl) RMKDEF(xxpfn1,rkw,rkp.kl,0, kf ,ks,kg,kc,nl,ie,ch) RMKDEF(xxpfnl,rkw,rkp,kl.O, kf,ks,kg.kc.nl,le,ch) One CRM statement f o r e a c h fi l e . xxJ FILE 0^** Required. An indirect access permanent file, xxJ, where xx is the data base name, is required for each data base. If additional journal files are needed, they are de fi n e d i n t h e x x J fi l e . T h e x x J fi l e I s s a v e d u n d e r the transaction subsystem user name. The file is in job command format and varies depending on the data manager used. NOTE The transaction subsystem user name should be under the control of a data a d m i n i s t r a t o r. T h e a p p l i c a t i o n s p r o grammer should not have access to this name. CRM(xxpfnn,type,mode,users, locks,mrl,pkl.hash,rec, fwi, packname.device) IXN(xxpfxn,naky.packname, device) AKY(akn,ako,akl) AKY(akn,ako,akl) RMKDEF(xxpfnn,rkw,rkp,kl, O.kf,ks,kg,kc.nl,le.ch) RMKDEF(xxpfnn,rkw,rkp,kl, O.kf,ks,kg,kc,nl,ie,ch) tThis is the username, password, and familyname where all data base files and index files described In the following CRM and IXN statements are located. 60459500 C 4-1 The IXN and AKY statements are necessary only for multiple indexed files. The IXN statement describes the index file; the AKY statement describes an alter nate key. There is one AKY statement per alternate key. The RMKDEF statement is necessary if the file has multiple indexes and is recoverable. The RMKDEF s t a t e m e n t i n t h e x x J fi l e m u s t b e i d e n t i c a l t o t h e RMKDEF statement used in the initial MIPGEN creation of the data base file. There must be one RMKDEF s t a t e m e n t f o r e a c h a l t e r n a t e k e y i n t h e x x J fi l e . More information on RMKDEF can be found in the CRM AAM 2 Reference Manual. The mode parameter controls access t o t h e fi l e t o e n s u r e t h a t e i t h e r TAF or a batch job can write on or m o d i f y t h e fi l e a t a g i v e n t i m e . H o w e v e r, TA F a n d a b a t c h j o b c a n r e a d t h e fi l e s i m u l t a n e o u s l y. R e f e r to the ATTACH command in the NOS 2 Reference Set, Volume 3, for access modes granted for different combin ations of multiple access. NOTE The parameters for the xxJ file are: xx Data base name. I password Batch password. number Number of before image recovery files for this data base. devicetype Device type: If the TAF procedure file file that is described on a ment, the mode specified procedure file overrides the ameter in the xxJ file. Number of transactions allowed to o p e n fi l e x x p f n ^ c o n c u r r e n t l y . When TAF terminates, the TAF dayfile contains a message that gives the number of OPEN requests not granted because the value of the users par ameter was exceeded. Each user uses 38 words plus the pkl parameter size (In words). MS Mass storage. MT Seven-track tape. NT Nine-track tape. fi l e t y p e File type (refer to figure 4-1)i B Buffered write. locks R Pack name of the auxiliary device on which the user's task library or data b a s e fi l e s r e s i d e . T h i s p a r a m e t e r is optional on the CRM statement. device Type of device on which the user's t a s k l i b r a r y o r d a t a b a s e fi l e s reside. For example, DI (for an 844) or DI3 (for a multiunit 844 consisting of three devices). This parameter is optional on the CRM statement. xxpfn^ type Number of records the transaction c a n l o c k f o r fi l e x x p f n * ; . W h e n T A F t e r m i n a t e s , t h e T A F d a y fi l e contains a message that gives the number of locks not granted because the value of the locks parameter was exceeded. Each lock uses two words plus the pkl parameter size (in words). Nonbuffered write. packname Tw o - t o s e v e n - c h a r a c t e r fi l e n a m e . xx is the data base name. pfn^ is t h e r e m a i n i n g z e r o t o fi v e c h a r a c ters in the data base file name. BUFFERED NONBUFFERED 3-WORD HEADER 3-WORD HEADER DATA DATA ./S^jjk EOR CRM file type: A K A c t u a l k e y. attaches a CRM state in the TAF mode par 3-WORD HEADER 3-WORD HEADER DA Direct access. IS Indexed sequential. mode D ATA D ATA Attach mode of file xxpfn^; EOR M M o d i f y, a p p e n d , o r r e a d . R Read. RM Read, with another user concurrently attaching the file in mode M. W W r i t e , m o d i f y, a p p e n d , o r read. 4-2 • ••• •• • Figure 4-1. Journal File (Buffered and Nonbuffered Structure) 60459500 C >f5il!\ /P8^ naky Number of alternate keys in the index fi l e . akn A l t e r n a t e k e y n u m b e r. A l t e r n a t e k e y description statements for one data base file must be ordered in a con tinuous sequence by alternate key number. For a detected key, this is the only parameter present in the statement. ako Alternate key offset. The position i n t h e r e c o r d o f t h e fi r s t c h a r a c t e r o f t h e a l t e r n a t e k e y. T h i s c o r r e s p o n d s t o t h e k e y o ff s e t p a r a m e t e r used on data manager requests access i n g t h e r e c o r d b y t h i s k e y. T h e fi r s t p o s i t i o n i n t h e r e c o r d i s c h a r acter position number one (not zero). atcl Length of characters. R T h i s fi l e i s r e c o v e r a b l e . rkw N T h i s fi l e i s n o t r e c o v e r a b l e . When rec is not specified, N is assumed. Relative word in the record in which the alternate key begins, counting from 0; required. rkp Relative beginning character position within the relative key word (rkw), counting from 0; required. kl Number of characters in the key, 1 to 255; required. mrl Number specifying the maximum record l e n g t h ( i n c h a r a c t e r s ) f o r fi l e xxpfn^. pkl Number specifying t h e l e n g t h i n characters of the primary key for fi l e x x p f n ^ . t hash One- to seven-character indirect access file that contains the binary code of the hashing routine for file x x p f n j . . T h i s i n d i r e c t a c c e s s fi l e must be stored under the username parameter on the USER statement. The entry point for the hashing rou tine must be this file name (hash). If this parameter is omitted, CRM uses the hashing routine supplied with CRM. This parameter applies only for CRM direct access files. F i l e r e c o v e r a b i l i t y. NOTE A d d i n g r e c o v e r a b l e fi l e s t o t h e d a t a base that has a record or key length l a r g e r t h a n a n y p r e v i o u s l y s p e c i fi e d r e c o v e r a b l e fi l e c a u s e s r e c o v e r y fi l e v a l i d a t i o n e r r o r s d u r i n g TA F i n i t i a l i z a t i o n . B e f o r e i m a g e r e c o v e r y fi l e s need to be recreated and after image recovery files need to be dumped to tape (via DMREC) and recreated. To e n s u r e f u l l d a t a b a s e r e c o v e r a b i l i t y, recoverable files should only be added to the data base following a normal termination of TAF. fwi Forced write indicator. When the f o r c e d w r i t e i n d i c a t o r i s O F F, t h e m o d i fi e d d a t a fi l e b u f f e r s a r e w r i t ten to disk when space is needed. When the forced write indicator is O N , a l l d a t a fi l e b u f f e r s t h a t a r e modified in core are written to disk i m m e d i a t e l y. I f f w i i s n o t s p e c i fi e d , t h e f o r c e d w r i t e i n d i c a t o r i s set to OFF. alternate key in Required to mark position for the r e s e r v e d fi e l d . kf Key format; required. 0 or S Symbolic. 1 o r I I n t e g e r. 2 or U Unco Hated symbolic. 3 or P Purge alternate key defi nition from the index. ks Substructure for each primary key list in the index; optional. U Unique (default). I Indexed sequential; recom m e n d e d f o r e f fi c i e n c y i n processing. F F i r s t - i n , fi r s t - o u t . Y Sets forced write ON for this fi l e . kg N Sets forced write OFF for t h i s fi l e . Length in characters of the repeating group in which the key resides. kc Number of occurrences of the repeat i n g g r o u p ; z e r o f o r T- t y p e r e c o r d s , and a number for a repeating group embedded within the record. x x p f x n P e r m a n e n t fi l e n a m e o f t h e i n d e x fi l e ; m u s t b e g i n w i t h t h e t w o - l e t t e r a p p l i c a t i o n i d e n t i fi e r x x . tThe user can specify octal numbers and decimal numbers by using a postradix of B or D, respectively. Decimal is the default. /#*N 60459500 C 4-3 nl Null suppression; a null value is all spaces (symbolic key) or all zeros (integer key): 0 Null values (default). are indexed n User index (obtained analyst). MS Mass storage. MT Seven-track tape. Include/exclude sparse control char acter: I Include alternate key value if the record contains a sparse control character. E Exclude alternate key value if the record contains a sparse control character. ch Characters that qualify as sparse control characters; up to 36 letters a n d d i g i t s c a n b e s p e c i fi e d a s a character string. site devicetype Device type: N Null values are not indexed. ie from NT Nine-track tape, fi l e t y p e F i l e t y p e ( r e f e r t o fi g u r e 4 - 1 ) : B Buffered write. R Nonbuffered write. packname Pack name of the auxiliary device on which the user's task library (xxTASKL) or data sets will reside. d e v i c e Ty p e o f d e v i c e o n w h i c h t h e u s e r ' s fi l e w i l l r e s i d e [ f o r e x a m p l e , D I (for 844) or DI3 (for a multiunit 844 consisting of three devices)]. Four-character data set names. TOTAL DATA MANAGER xxJ FILE T h e f o l l o w i n g s h o w s t h e s t r u c t u r e o f t h e x x J fi l e when using the TOTAL Data Manager. xxJ CDCS OR NO DATA MANAGER xxJ FILE USER(username,password,familyname)t If an application uses CDCS and one of the other data managers (CRM or TOTAL)-, then the xxJ file should be structured as specified for the other data manager. UI»n. x x J O R l . d e v i c e t y p e , fi l e t y p e . x x J 0 R 2 . d e v i c e t y p e , fi l e t y p e . x x J 0 R 3 . d e v i c e t y p e , fi l e t y p e . xxTASKL,PN-packname,R-device. NL. LG,PN=packnarae,R-device. aaaa,PNapackname,R-device Optional. Either the NL statement or the LG statement must be selected. PN and R parameters are optional. NL c a u s e s TO TA L t o not log recovery data. LG causes TOTAL to log re covery data. PN and R parame ters are optional. zzzz,PNapackname,R-device The parameters for the xxJ file are: xx Data base name. If an application accesses only the CDCS Data Manager or no data manager, the structure of the xxJ file is as follows: xxJ USER(username,password,familyname)t x x J O R l , d e v i c e t y p e , fi l e t y p e . x x J 0 R 2 , d e v i c e t y p e , fi l e t y p e . O p t i o n a l . x x J 0 R 3 . d e v i c e t y p e , fi l e t y p e . xxTASKL,PN-packname,R-device The parameters are: Parameter Description xx Application (data base) name. password Batch password, devicetype Device type: MS Mass storage. MT Seven-track tape. password Batch password. NT Nine-track tape. tTAF locates the data base using the familyname parameter in the procedure file that initializes TAF and the username and password parameters in the xxJ file. The username, password, and familyname parameters are used for validation. /<5SR^\ 4-4 60459500 C filetype File type (refer to figure 4-1): CREATING AN xxJ FILE B B u f f e r e d w r i t e . To e n t e r a n x x J fi l e , t h e d a t a a d m i n i s t r a t o r c a n r u n a batch job to create and save the file under the R Nonbuffered write. transaction subsystem user name. This can also be done at a terminal through IAF. (Refer to the NOS 2 packname Pack name of the auxiliary device on Reference Set, Volume 1, for IAF operating which the user's task library instructions.) resides. device Type of device on which the user's task library resides. /0&< 60459500 C 4-4.1/4-4.2 | / ^ ! j \ 0^\ 0^\ JOURNAL FILES jnum JOURO (the system journal fi l e t o w h i c h t h e t r a n s a c tion executive normally makes journal entries). The two types of journal files are system and data b a s e fi l e s . SYSTEM JOURNAL FILE The system journal file (a direct access file named JOURO that may be defined under the transaction sub system user name or may be set up by the TAFxxxx p r o c e d u r e fi l e a t i n i t i a l i z a t i o n ) i s n o t a s s o c i a t e d with any particular data base. All transaction data (input from terminals), errors, and transaction com p l e t i o n n o t i fi c a t i o n i s a u t o m a t i c a l l y r e c o r d e d o n JOURO. The terminal status table is also journalized periodically. Data sent to terminals by tasks is not recorded on JOURO. JOURO will be created at initial ization if not already present under the transaction facility user name. Journal File D a t a b a s e j o u r n a l fi l e xxJORl. D a t a b a s e j o u r n a l fi l e xxJ0R2. Data base xxJ0R3. journal fi l e message Name- of the 01-level data item con taining the message to be journal ized. FORTRAN DATA BASE JOURNAL FILES The transaction subsystem allows up to three users p e c i fi e d d i r e c t a c c e s s j o u r n a l fi l e s f o r e a c h d a t a base. The allowable names are xxJORl, xxJ0R2, and xxJ0R3, where xx is the data base name. At initial i z a t i o n , TA F c h e c k s t h e x x J fi l e s a s s o c i a t e d w i t h all active applications to determine which xxJORn fi l e s a r e n e e d e d . I t w i l l t h e n a t t a c h a n y s p e c i fi e d x x J O R n fi l e s n o t a l r e a d y a t t h e c o n t r o l p o i n t a n d a t t e m p t t o d e fi n e a n y w h i c h i t c a n n o t fi n d . T h e transaction subsystem user name must have write p e r m i s s i o n o n t h e s e fi l e s . W h e n a t a s k m a k e s a journal request (refer to JOURNL request in this sec tion) , the data base for which the originating termi nal is validated is used to determine the journal fi l e o n w h i c h t o w r i t e . I f t h e t a s k i s a s s o c i a t e d with a terminal validated for all data bases, the data base specified on the last data base request is used to determine the proper journal file. JOURNAL FILE ENTRY HEADER Each journal file entry (refer to JOURNL request) has a header In the format shown in figure 4-2. CALL JOURNL(jnum.message,length) jnum Integer whose value indicates the n u m b e r o f t h e j o u r n a l fi l e t o w h i c h the entries are to be made. Journal File JOURO (the system journal file to which the transaction executive normally makes j ournal en tr ie s). Data base xxJORl. journal fi l e Data base xxJ0R2. journal fi l e Data base xxJ0R3. journal fi l e message Name of the array containing the mes sage to be journalized. l e n g t h I n t e g e r w h o s e v a l u e s p e c i fi e s t h e length of the message in characters. COMPASS JOURNL REQUEST The JOURNL request allows file entries to be made to supplement automatic journalizing. JOURNL address address Address of a parameter table in the form shown in figure 4-3. The format is: COBOL ENTER JOURNL USING jnum message. jnum Computational-l item whose value in dicates the number of the journal fi l e t o w h i c h t h e e n t r i e s a r e t o b e made. The value of this parameter m u s t b e r i g h t - j u s t i fi e d a n d z e r o fi l l e d . jf*K 60459500 A If a journal file is defined on magnetic tape and an end-of-reel is detected, the transaction executive unloads the tape and checks for another tape on which to write. If the operator has not preassigned a unit, the journal file is placed on mass storage. If the operator enters the K.ASSIGN command, the trans action executive copies the mass storage journal file to the tape and places all subsequent entries on the t a p e . I f t h e m a s s s t o r a g e fi l e d o e s n o t fi t o n t h e tape, the message * UNABLE TO USE TAPE* is issued. 4-5 59 35 sequence 11 17 29 reserved origin length y^SSN task name hr username min see reserved sequence Transaction sequence indicator. origin Origin indicator (octal): 0 Task origin (JOURNL request). 1 Tr a n s a c t i o n s u b s y s t e m o r i g i n ( i n p u t ) . 2 Data manager origin. 3 Tr a n s a c t i o n s u b s y s t e m r e c o v e r y / s t a t i s t i c a l d a t a . 4 E n d - o f - t r a n s a c t i o n i n d i c a t o r. 5 Incomplete block of terminal input data. 6 Te r m i n a l i n p u t f o r a n i n t e r a c t i v e t a s k . 7 I l l e g a l i n t e r c o n t r o l p o i n t t r a n s f e r. 10 On-line LIBTASK update (TT option). 11 CDCS detected error (words following header contain error message). 12 MSG request with zero function code. Normal FORTRAN messages are logged with this function code. length Length of entry (equals header plus data block). task name Name of task if task origin requested. hr,min, sec Packed time (hour, minute, second). username User name associated with transaction, if task origin. Figure 4-2. Journal File Entry Header 59 53 '//// m> jnum 35 jnum 17 numwords 0 message J o u r n a l fi l e n u m b e r, r i g h t - j u s t i fi e d w i t h b i n a r y z e r o fi l l : 0 J O U R O ( r i g h t - j u s t i fi e d w i t h b i n a r y z e r o fi l l : m a k e s j o u r n a l e n t r i e s ) . 1 to 3 Data base journal file (xxJORl, xxJOR2, or xxJ0R3). numwords Length of message in words. message Address of message to be journalized. Figure 4-3. JOURNL Parameter Table 4-6 60459500 B /*tWsv OFF Data bases specified on the same statement are not made available for TAF processing. TAF CONFIGURATION FILE The TAF configuration file is a required indirect access permanent file saved under the transaction facility user name. This file is used during TAF i n i t i a l i z a t i o n a n d r e c o v e r y. I f i t i s n o t l o c a l when the TAFREC command is reached, TAFREC will attempt to get it from TAF's user index. The TCF has the following format: USER,UN,PW,FM. DMS ,datamanager,switen,xxj, XX 2 , . . . , 2CKfi. NETWORK,ID-i,FM-faraily, UN-username. At least one of each required. RECOVER,ID-i,MS»maximumsize, NM-number. Required or not allowed (refer to statement de scription. TABCON.n Required for batch concur rency. Refer to the TAF/CRM Data Manager Reference Manual. DISPLAY,status. K. command Rvalue i , Optional. DMS STATEMENT DMS statements on the TCF are used to specify the data managers to be loaded by TAF and the applica tions (data bases) to be associated with each data manager. The format is: DMS.datamanager.switch.xxj,xx2,...,xxn. data manager r switch xxyyyy which is the data base name (the DBMODt file name) specified in the DATA-BASE-NAMEt statement of the DBDLt statements, xx is the unique TAF data base name and yyyy is any combination of four alphanumeric characters. A separate DMS statement for CDCS (OTHER) is not necessary if CDCS is to be used in conjunction with another data manager. The TCF file must contain at least one DMS statement and each DMS statement with status set to ON must have at least one data base identifier or TAF will abort. The maximum number of data bases that may be associ ated with one data manager is specified by the in stallation parameter MAXDB. This value is 25 unless it is altered by the user's site. K. commandnsvalue(i jgp*v x x i D a t a b a s e i d e n t i fi e r . M u s t n o t be duplicated on the same or any other active DMS statement. For the CRM Data Manager, it is the two-letter data base name. For the TOTAL Data Manager, this parameter has the format: Name of the data manager. Must be CRM, TOTAL, or OTHER. The same data manager can be speci fied on any number of DMS state ments. Use the datamanager value OTHER for specifying an application that is either not associated with a data manager or is associated only with the CDCS Data Manager. Data manager status. ON or OFF. The maximum length of each DMS statement is 160 6-bit display code characters. DISPLAY STATEMENT The DISPLAY statement on the TCF controls whether or not the TAF K display will appear at the consoLe dur ing initialization and recovery. However, an error in a K display command causes TAFREC to issue an error message and bring up the K display for correc tions regardless of the DISPLAY statement. The format is: DISPLAY,status. status Mus t be O N T h e s p e c i fi e d d a t a manager (TOTAL or CRM) will be loaded. The data bases specified on the same statement are to be made avail able for TAF process ing. These data bases are referred to as active. 4m<- A variable having one of the following values. ON K display will appear at the console during initialization and recovery to enable the operator to make changes at those times. OFF K display will not appear at the console during Initialization and recovery. tRefer to the TOTAL - CDC 2 Reference Manual for a detailed description. 60459500 C 4-7 NETWORK STATEMENT The NETWORK statements on the TCF declare the n e t w o r k fi l e s ( N C T F i ) TA F u s e s t o d e t e r m i n e t h e users allowed to access TAF. There must be at least one and a maximum of eight NETWORK statements. The format is: NETWORK,ID-i,FM-familyname,UN=username. TAF will use. The name of the corresponding CRF is ZZCRFi. The CRF resides under the same family and user name as the corresponding network file. K. STATEMENT integer specifying a unique n e t w o r k fi l e i d e n t i fi e r . T h e range is zero to seven. This i d e n t i fi e r is used in constructing the name of the network file (NCTFi). Any K display commands that can be issued under the i n i t i a l K d i s p l a y c a n a p p e a r i n t h e T C F. Va l u e s s p e c i fi e d i n t h e T C F b e c o m e t h e d e f a u l t values in place of the installation defaults (refer to the K display utilities in the NOS 2 Analysis Handbook for the installation default values). If the operator changes any of these values during initialization, those changes remain in effect if TAF is restarted in recovery mode. familyname The family name under which the n e t w o r k fi l e e x i s t s . I f t h e familyname parameter is not s p e c i fi e d , t h e d e f a u l t f a m i l y name is used. If K display commands are used in the TCF, they must appear consecutively. i An The user name under which the n e t w o r k fi l e e x i s t s . I f t h e username parameter is not specified, the TAF user name is used. RECOVER STATEMENT The RECOVER statement on the TCF declares the set of fi l e s TA F i s t o u s e w h e n i n r e c o v e r y m o d e . T h i s d i r e c t i v e i s r e q u i r e d i f TA F i s a s s e m b l e d w i t h recovery, but it is not allowed if TAF is assembled without recovery. The format is: USER STATEMENT The USER statement on the TCF specifies the user n a m e u n d e r w h i c h TA F i s t o r u n . T h i s u s e r n a m e should be defined through MODVAL to have the same user index as defined by the installation parameter TRUI. Only one USER statement is allowed in the TCF. The format is as follows: USER,UN,PW,FM. or ACCOUNT,UN,PW.FM. Parameter Description U N T h e u s e r n a m e u n d e r w h i c h TA F i s t o run. PW The batch password for the user name. RECOVER,ID-i,MS-maximumsize,NM-number. 1 An integer specifying a unique r e c o v e r y fi l e i d . T h e r a n g e i s zero to seven. This id is the id used in constructing the name of the communication r e c o v e r y fi l e ( Z Z C R F i ) . O n l y o n e i d m a y b e s p e c i fi e d p e r RECOVER statement. The id must m a t c h a n i d s p e c i fi e d i n a NETWORK statement. maximumslze An integer specifying the maxi mum size of the message, in words, that TAF will record on the communication recovery file. The default Is 57. Maximum is installation parameter MAXWS. This is the maximum message size for the RPUT and SECURE requests. number An integer specifying the maxi mum number of user messages that can be recorded on the communi c a t i o n r e c o v e r y fi l e v i a t h e RPUT request. The default Is zero, the maximum is 10. Each RECOVER statement specifies a recovery id. This id determines the communication recovery file that 4-8 F M T h e f a m i l y u n d e r w h i c h TA F i s t o r u n . The USER statement should be the first statement in the TCF. COMMUNICATION RECOVERY FILE A communication recovery file is a file TAF uses to maintain recovery information about recoverable transactions. New CRFs are created and existing CRFs are reinitialized at initialization time by using the K.INT command (refer to section 8). There c a n b e u p t o e i g h t o f t h e s e fi l e s ( n a m e d C R F O , CRF1,...,CRF7). Each one corresponds to a network file having the same Identifier (NCTFO, NCTFI,....NCTF7). For every u s e r d e s c r i p t i o n s t a t e m e n t i n a n e t w o r k fi l e , t h e r e I s a u s e r e n t r y i n t h e c o r r e s p o n d i n g C R F. T h e s e entries are added and deleted as follows: • New user entries are added to a CRF by adding a user description statement to the corresponding network file. • User entries are removed from a CRF by removing the user description statement from the corresponding network file. 60459500 C /^^^Sv TRANSACTION FACILITY (TAF) K DISPLAYS The following commands control operation of the TAF Subsystem. Initiate the TAF Subsystem by using the TAFffff command before issuing these commands. INITIATING TAF K DISPLAY When the transaction executive is brought to a control point, the message REQUEST *K* DISPLAY appears at the control point if a DISPLAY,ON command is specified i n t h e TA F c o n fi g u r a t i o n fi l e . R e s p o n d w i t h t h e e n t r y : K , TA F. Any of the following initialization commands can then be entered. If no values are to be changed, enter the command: K.END. Values are decimal unless otherwise indicated. Command 8-68 Description K.BFL=n. Changes the starting and minimum field length allocated by TAF to CRM (200008 < n < 100000s). Default is 700008. K.CMB=n. Changes the maximum number of communication blocks allowed to the TAF Subsystem (7 < n <^ 40). Default is 40. K.ECS=n. Sets the extended memory field length to be used by the transaction executive; n is octal thousands of words. Default is 0. K.EFL=n. Changes the maximum additional central memory field length made available to CRM for buffers and capsules (0 < n < 100000s). Default is 0. K.END. Ends input of the transaction executive initialization parameters. Initialization is completed when the TAF K display appears. 60459300 D Command K.ER0=CRF,op. Description Specifies whether to override certain I/O and logic errors when processing the communication recovery files (CRF). op Description NO Aborts if I/O or logic errors are encountered while p r o c e s s i n g t h e c o m m u n i c a t i o n r e c o v e r y fi l e s . T h i s i s the default setting. YES I/O or logic errors encountered on a run unit header record result in the loss of that run unit with no i n d i c a t i o n t o t h e t e r m i n a l u s e r. T h e l o s s i s n o t e d o n the recovery report. I/O or logic errors encountered within a run unit result in a status field is set in the run to inform the terminal user of on a message record loss of that run unit. A unit header, allowing TAF the run unit loss. I/O or logic errors encountered on the CRF header record result in an unconditional abort of the TAF Subsystem. K.GO. Ends input of the transaction executive initialization parameters. Initialization is complete when the TAF K display appears. K . I N T = t y p , fi l e i d , Specifies which communication recovery files (CRF) are to be i n i t i a l i z e d . T h i s i s t h e o n l y w a y t o i n i t i a l i z e a C R F. F i l e s specified on a RECOVER command in the TAF configuration file and s p e c i fi e d i n t h i s c o m m a n d a r e i n i t i a l i z e d . F i l e s s p e c i fi e d o n a RECOVER command but not specified in this command are used for r e c o v e r y. This command also specifies whether CYBER record manager (CRM) data base recovery files are initialized or recovered. For CRM recovery files, this command is valid regardless of TAF assembly parameters. HE 60459300 D Description CRF C o m m u n i c a t i o n r e c o v e r y fi l e s . T h i s p a r a m e t e r i s v a l i d only if the installation parameter IPTAR equals 1. CRM CYBER Record Manager after-image and before-image r e c o v e r y fi l e s . 8-69 Command DescriDtion fi l e i d Description n A d i g i t f r o m 1 t o 7 t h a t d e fi n e s a C R F t o b e initialized. The digit corresponds to the ID parameter on the RECOVER command in the TAF configuration file. This parameter is not valid for CRM recovery files. A L L I f t y p i s C R F, a l l c o m m u n i c a t i o n r e c o v e r y fi l e s d e fi n e d by RECOVER commands in the TAF configuration file are i n i t i a l i z e d . I f t y p i s C R M , a l l C R M r e c o v e r y fi l e s a r e initialized. NOTE This parameter must be used with caution when typ is CRM since the CRM update history c u r r e n t l y o n t h e a f t e r - i m a g e r e c o v e r y fi l e s is lost. NONE If typ is CRF, communication recovery files are i n i t i a l i z e d ; a l l c o m m u n i c a t i o n r e c o v e r y fi l e s s p e c i fi e d in RECOVER commands in the TAF configuration file are recovered. If typ is CRM, all CRM data bases are recovered based on information in the existing recovery fi l e s . N o C R M r e c o v e r y fi l e s a r e i n i t i a l i z e d . T h i s fileid is the default for both typ=CRF and typ=CRM. K.MFL=n. Sets the maximum field length to be used by the transaction executive (40000 < n <_ 376600). Default is 376600. K.REC=a. Specifies whether to set the recovery bit in the user area of each terminal status table entry (YES or NO). If YES, the user recovery bit is set. If NO, the value of the user recovery bit is not changed from what it was before the command was issued. Default is NO. K.SCP=n. Changes the number of subcontrol points (2 <^ n < 31). Default is 31 K.STOP. A b o r t s t h e TA F S u b s y s t e m i n i t i a l i z a t i o n u n c o n d i t i o n a l l y. K.TFL=n. Changes the value used as the upper bound for TARGET. This is the amount of memory CRM uses for data and index blocks (100008 £3$!%>t transaction data length Length of the transaction in words; Includes the header word and the trans action data. transaction data Transaction name (or transaction name and input data) to be processed by TAF. Figure 5-1. BTRAN Header Word BTRANEX. USER,XYZ1234,XYZ1. CHARGE,* C0B0L5. LIBLOAD(TRANLIB,BTRAN) LGO. - -EOR- IDENTIFICATION DIVISION. PROGRAM-ID. BTRANEX. ENVIRONMENT DIVISION. CONFIGURATION SECTION. SOURCE-COMPUTER. CYBER. OBJECT-COMPUTER. CYBER. DATA DIVISION. WORKING-STORAGE SECTION. 01 BATCH-TRANSACTION. 02 RESERVED-AREA PIC X<7) 02 DATA-LENGTH VALUE 2 C O K P - 4 PIC 9999 02 TRANSACTION-DATA VALUE I S " L P 3 , 5 0 " PIC X(6) 01 BTRAN-STATUS VALUE IS 0 COMP-1 PIC 9999 PROCEDURE DIVISION. START-RUN. ENTER BTRAN USING BATCH-TRANSACTION, BTRAN-STATUS. DISPLAY "STATUS*" BTRAN-STATUS. STOP RUN. Figure 5-2. BTRAN Request Table 5-1. BTRAN Status Values Value I Transaction submission is complete. 3 The transaction executive is not present. 5 The transaction executive Is busy (should not occur; inform site analyst). 7 5-2 Des c r ipt ion The submit block is too long; the maxi mum length is 62 words. 11 The transaction subsystem is not de fined as a system control point (should not occur; inform site analyst). 13 Access to TAF is denied because TAF i3 idling down. Value Description 15 The user name associated with the batch job issuing the BTRAN request is not v a l i d a t e d i n n e t w o r k fi l e ( j o b i s aborted). 17 The user name associated with the batch job issuing the BTRAN request is cur rently in use within TAF. 19 A conflict in access types was detec ted, the previous transaction run u n d e r t h e s p e c i fi e d u s e r n a m e w a s recoverable and not associated with a BTRAN-initiated transaction. 21 The transaction data is not within the field length oE the batch job. 60459500 C SUBMT REQUEST COMPASS The SUBMT request allows a task to route a job to the local batch input queue. The address parameter in the call points to the area in the task field length that contains the job to be routed in control word format. This format is described in conjunction with the READCW macro in the NOS 2 Reference Set, Volume 4 (refer to the preface for the publication number). Using this format, the job may consist of multiple records. SUBMT address a d d r e s s A d d r e s s o f t h e fi r s t w o r d o f t h e job data to be routed in control w o r d f o r m a t a s s h o w n i n fi g u r e 5-3. The first word at address must be a control word in t h e f o r m a t s h o w n p r e v i o u s l y. T h e l e n g t h fi e l d m u s t specify the number of 12-bit bytes occupied by the data in the PRU (maximum of 320 bytes, equivalent to 640 characters). The level number in the trailing control word specifies whether the PRU is an end-ofr e c o r d o r e n d - o f - fi l e . I f a l o g i c a l r e c o r d e x t e n d s over more than one PRU, the level number for the first PRU of the record must be nonzero and other than 173. The format is: COBOL ENTER SUBMT USING address. address Name of the 01-level item containing the job data to be routed. This data is in the format shown in figure 5-3. A leading and a trailing control word must be present for each PRU of data. FORTRAN CALL SUBMT(address) Typically, the data would consist of commands which | would comprise one record. Additional data to be processed by the batch job could also be present and typically constitute subsequent records. address Name of an array containing the job data to be routed. This data is in the format shown in fi g u r e 5 - 3 . 59 »7 0 42 1 23 0 Itngth data word data word 4 p 4 number of y central , memory word* data word lave) length Length in 12-bit (two-character) bytes of job data following this control word (must be five times the number of the central memory words). level Logical record level number: 0 or omitted This PRU is an end-of-record. 17g This PRU is an e n d - o f - fi l e . Figure 5-3. SUBMT Parameter Table 60459500 C 5-3 Figure 5-4 shows a task using the SUBMT request. In the example shown in figure 5-4, the first word of JOB (00390 to 00410) sets bit 42 in the header word and gives the length (75) in 12-bit bytes of the card deck images to follow* This is five times the number of 10-character (60-bit) words in the job being submitted, in this case, statements 00420 to 00590. Each job command must be from 1 to 80 characters long. All commands to be submitted must be padded to a multiple of 10 characters and the last 2 characters must be binary zero (character ":" in the 63/64-character set). Thus, if a statement ends in character position 9,10; 19,20; and so on, a zero word must be appended. Statements 00460 to 00530 give examples of this. 00100 00110 00120 00130 00140 WORKING -STORAGE SECTION. 01 JOB 0 3 FILLER 0 3 FILLER 0 3 JOB-LENGTH * 00420 00430 00440 00450 00460 00470 00480 00490 00500 00510 00520 00530 00540 00550 00560 00570 00580 00590 03 03 03 00600 00610 00620 00630 00640 00650 00660 • Include the command SETJOB,DC=DF in the submitted job. This directs that implicit output is to be queued at the end of the job. The example in figure 5-4 uses the first method by including a ROUTE command at line 00580. ( r e f e r t o !s e c t i o n 2 ) VALUE I S 1 VALUE I S 0 VALUE I S 7 5 COMP-4 COMP-4 COMP-4 PIC 9 ( 5 ) . PIC 9 ( 5 ) . PIC 9 ( 6 ) . THE FOLLOWING IS THE JOB TO BE SUBMITTED 03 * * Include ROUTE commands to place the desired files in the appropriate queues. IDENTIFICATION DIVISION. PROGRAM-ID. SUBTEX1. ENVIRONMENT DIVISION. DATA DIVISION. COMMON-STORAGE SECTION. Standard COBOL Communication Block 00370 00380 00390 00400 00410 At job termination, the implicit output files of the SUBMT job are not queued by the system. This is because TAF routes the submitted job using the disposition code DCaN0. To obtain output from the job, do either of the following: JOB-CARD. 05 JOB-ID 05 FILLER JOB-USER. 05 USER-CARD 05 FILLER JOB-CHARGE. 05 CHG-CARD 05 FILLER JOB-DATA. 05 COMMENT 05 FILLER 05 CTR-STATUS-1 05 FILLER 05 CTR-STATUS-2 05 FILLER 05 CTR-STATUS-3 05 FILLER VALUE I S " J O B . " VALUE IS A L L " : " PIC X ( 4 ) . PIC X ( 6 ) . VALUE I S "USER,DWG2603,ABC123." VALUE IS A L L " : " PIC X ( 2 0 ) . PIC X ( 1 0 ) . VALUE I S "CHARGE,5927,693X451." VALUE IS A L L " : " PIC X ( 2 0 ) . PIC X ( 1 0 ) . VALUE VALUE VALUE VALUE VALUE VALUE VALUE VALUE IS IS IS IS IS IS IS IS "* SUBMIT BATCH J08." ALL ":" "REWIND,INPUT." ALL ":" "C0PYSBF." ALL ":" "R0UTE,0UTPUT." ALL ":" PIC PIC PIC PIC PIC PIC PIC PIC X(19). X ( 11 ) . X(13). X(7). X(8). X(2). X<13). X(7). SUBMITTED JOB ENDS HERE 0 3 INPUT-LEVEL 0 3 FILLER PROCEDURE DIVISION. START-UP. ENTER SUBMT USING JOB. DISPLAY "JOB SUBMITTED." STOP RUN. VALUE I S 1 5 VALUE IS A L L " : " COMP-4 2/L 15" PIC 99. PIC X ( 8 ) . Figure 5-4. SUBMT Request 5-4 60459500 A /J5W^k MEMORY DUMPS A task can perform two types of memory dumps. The first type is a task dump, which is a dump of the task field length, exchange package, and associated data buffers. A task dump aids the applications programmer in debugging a task. The second type Is a TAF dump, a dump of all or part of the TAF field length. A TAF d u m p c o n t a i n s p e r t i n e n t i n f o r m a t i o n that is not contained in a task dump. This section describes the methods used to obtain both types of memory dumps. All task dumps, whether due to an aborted task, an abnormal CEASE request, or a CMDUMP request, are h a n d l e d i n t h e s a m e m a n n e r. A j o b fi l e i s c r e a t e d containing the information to be dumped in binary format, as well as a command record. The transaction executive issues a ROUTE request releasing the job fi l e t o t h e i n p u t q u e u e f o r b a t c h p r o c e s s i n g . A program called KTSDMP is used, either to generate l i s t a b l e o u t p u t f r o m t h e b i n a r y fi l e , o r t o t r a n s f e r it to a direct access permanent file. TASK DUMP When dumping to an output queue, a ROUTE command is included in the command record to direct the output produced by KTSDMP to the proper queue. The central memory dump (CMDUMP) request dumps central memory according to the parameters specified in the direct subsequent dumps (DSDUMP) request. Parameters specified on the DSDUMP request are used under three circumstances. • When a fatal task error occurs. • When a default value is requested in a CMDUMP request. • When a parameter is in error in a CMDUMP request. The purpose of DSDUMP and CMDUMP is to aid applications programmers in debugging their tasks. These dump requests allow users to dump any portion o f t h e i r p r o g r a m s . T h e u s e r s p e c i fi e s t h e fi r s t word address (fwa) and the last word address (lwa) of the area to be dumped. The exchange package may also be dumped by setting the proper parameter(s) to a nonzero value. r The DSDUMP request sets up default values for subsequent CMDUMP requests made by this task and all linked tasks in this transaction (those called by CALLTSK without CEASE). DSDUMP does not cause a dump; it only sets parameter values that can be defaulted as a result of a CMDUMP request. A USER command is always included, thus enabling KTSDMP to attach the appropriate file if the dump is d e s t i n e d f o r a u s e r ' s fi l e . I n t h i s c a s e , K T S D M P appends the binary information to the end of the p e r m a n e n t fi l e . T h i s m e t h o d o f h a n d l i n g d u m p s relieves the transaction executive of time-consuming processing that is better performed by a utility. DSDUMP REQUEST The DSDUMP request allows the applications programmer to change any of the default values of the CMDUMP request. The DSDUMP does not cause a dump in itself, except when the system detects an error (that is, aborts). Any default values on the D S D U M P a r e s a t i s fi e d f r o m t h e g e n e r a l d e f a u l t values* All six parameters are required. If an error occurs on any DSDUMP parameter, the task is aborted. The format is: COBOL ENTER DSDUMP USING fwa lwa ep db oq qd. A hierarchy of parameter values allows users to default any parameters they want on DSDUMP or CMDUMP calls. At system assembly time, default values are assembled for each parameter. These default values can be changed via a K display command. In addition, if users want to change any default parameter values for their tasks, they may do so by using DSDUMP requests. This hierarchy of default values works in the following manner. The CMDUMP request causes a dump a c c o r d i n g t o t h e p a r a m e t e r s i t s p e c i fi e s . I f a default option is requested, the system determines if a DSDUMP request has been made for this transaction. If a DSDUMP request has been made and if the corresponding parameter value has been supplied, this value is used. If DSDUMP requests have not been specified, a new default value, the system default value for this parameter, is used. 60459500 C fwa C o m p u t a t i o n a l - 1 i t e m t h a t s p e c i fi e s beginning address of task memory to be dumped; legal values are 0 0 Dump exchange package. < 0 Use default value. db oq ep I n t e g e r t h a t s p e c i fi e s t h e e x c h a n g e package option. Performs no function. Retained for compatibility with previous releases. 0 Do not dump exchange package. > 0 Dump exchange package. C o m p u t a t i o n a l - l i t e m t h a t s p e c i fi e s output queue option. < 0 Use default value (refer to following note). 0 Dump to local batch output queue. 1 Dump to remote batch output queue* < 0 Use default value. db Performs no function. Retained for compatibility with previous releases. oq Output queue option. < 0 Use default value (refer to following note). 2 D u m p t o u s e r p e r m a n e n t fi l e defined under data base user number. qd 0 Dump to local batch output queue. 1 Dump to remote batch queue. Queue destination option; value depends on oq selection. oq 0 2 D u m p t o u s e r p e r m a n e n t fi l e defined under data base user number. qd P r i n t e r i d , s p e c i fi e d a s a c o m p u t a t i o n a l - l n u m b e r. I f negative, use default value (refer to following note). qd Queue destination option; depends on oq selection. User number ' A valid name s p e c i fi e d i n display-coded, Direct l e f t - j u s t i fi e d access ▶characters with either permanent file name blank or binary zero . fi l l . oq value qd 0 Integer specifying printer id. If negative, use default value (refer to following note). 1 | NOTE | If either oq or qd is negative, the default value will be used for both, regardless of the option selected for the other. User name v A valid name 1 specified in 1 display-coded, 1 l e f t - j u s t i fi e d Direct [characters with access 1 either blank or permanent 1 binary zero file name >' fi l l . | NOTE | FORTRAN CALL DSDUMP(fwa,lwa,ep,db ,oq,qd) f w a O c t a l i n t e g e r t h a t s p e c i fi e s t h e b e ginning address of task memory to be dumped; legal values are zero v A transaction is declared to be recoverable when it i s a d d e d t o t h e a p p l i c a t i o n t a s k l i b r a r y. T h e d a t a managers (CRM and CDCS) provide methods of declaring d a t a fi l e s r e c o v e r a b l e . U p o n i n i t i a t i o n o f a r e c o v erable transaction, ITASK schedules the transaction via a CALLTRN request. Then the original input (that is, the transaction name and all unsolicited data) is logged to the communication recovery file before the transaction begins execution. The transaction must indicate to the data manager that it wishes to open a begin-commit sequence by making a data base BEGIN request. When the transaction requests to update a data file, the following occurs. • The record as read from the data file (the rec ord In this state is called the before image) is logged to a before image recovery file, also known as the before image log file. • The record is processed by the transaction. • The updated record (called the after image) is logged to an after image recovery file when the program makes a write, rewrite, or delete re quest. The updated record is also written to the data file at this time. After an update or a series of updates, the transac tion Indicates to the data manager that it wishes to close the begin-commit sequence by making a data base COMMIT request. If the transaction does not intend to open another begin-commit sequence, it indicates to TAF that its work is done by issuing a SECURE re quest just prior to the COMMIT request. TAF logs a message associated with the SECURE request to the CRF and sends this message to the terminal when the final transaction CEASE request is processed. If a failure occurs prior to the BEGIN request, the data base is unaffected and the transaction is re started upon recovery using the original data logged on the CRF. If a failure occurs between the BEGIN and COMMIT requests, the data manager rolls back the data base by applying the before images from the before image recovery file (BRF) to the affected data files. The data base is then in the same state as it was at the beginning of the begin-commit sequence. The trans action is restarted upon recovery using the data on the CRF. 60459500 A If a failure occurs after the COMMIT request, the data base is not rolled back, all updates become per manent when the COMMIT is processed. Whether the transaction is restarted depends upon the data mana ger being used. CDCS transactions are restarted if a f a i l u r e o c c u r s a n y t i m e p r i o r t o t h e fi n a l t r a n s a c tion CEASE request. CRM transactions are rerun un less both a COMMIT and SECURE request have been suc cessfully issued. The applications tasks must be de signed to handle cases where restart can occur after a COMMIT has been successfully executed. Refer to section 7 for some suggested transaction structures. A B R F fi l e i s u s e d r e p e a t e d l y b y t h e a p p l i c a t i o n . Only the before images for the current begin-commit sequence need to be saved so each new begin-commit sequence can overwrite the previous one. A n a f t e r i m a g e r e c o v e r y fi l e ( A R F ) i s c o n t i n u o u s . N e w a fte r i m a g e s a r e w r i tte n s e q u e n ti a l ly until the fi l e i s f u l l . A t t h a t t i m e , l o g g i n g i s s w i t c h e d t o a second ARF while the after images from the first ARF are dumped to tape. The ARF files are not used for automatic recovery. They provide a backup in case a CRF, BRF, or data file becomes damaged. If this happens, the data ad ministrator can use batch recovery to reload the data file(s) from the dump tape and apply, after images from an ARF dump, thus restoring the data base to a correct state as of any desired point in time. The function performed by each of the recovery compo nents are as follows. • Tr a n s a c t i o n r e c o v e r y - Logs the initial input to the CRF. - Logs and sends the SECURE message. - Restarts recoverable transactions after a failure. • Data base recovery - Automatic component . Rolls back updates in uncommitted begin-commit sequences. . Logs before images to the BRF. • Logs after images to the ARF. . Switches after image logging when an ARF is full and submits a batch job to dump the full ARF to tape. - Batch component . Dumps full ARFs to tape. . Dumps data files to tape upon request. 8-1 • Restores data base files from data file and ARF tapes. TAF K DISPLAY • Maintains a directory of dumped files. INITIAL K DISPLAY The nomenclature used here is specific to the TAF/CRM Data Manager. CDCS automatic recovery uses similar c o n c e p t s b u t d i f f e r e n t t e r m i n o l o g y. T h e d e t a i l s associated with data base recovery are documented in the respective data manager reference manuals. The remainder of this section covers the details of transaction recovery. HARDWARE CONFIGURATION CONSIDERATIONS Recovery cannot succeed if failures affect more than one component of the recovery system. For example, if a single hardware failure destroys both the recov e r y fi l e s a n d t h e d a t a b a s e , t h e r e i s n o r e c o v e r y other than to restore the data base from a backup c o p y ( fi l e d u m p ) . F o r t h i s r e a s o n , t h e d a t a b a s e fi l e s , t h e c o m m u n i c a t i o n r e c o v e r y fi l e s , t h e b e f o r e image recovery files, and the after image recovery fi l e s s h o u l d b e a s s i g n e d t o p h y s i c a l l y s e p a r a t e d e v i c e s . A l s o , t h e b a c k u p d i r e c t o r y fi l e f o r b a t c h recovery should not reside on the same device as the ARFs. Three K display commands are available to perform recovery-related functions: K.INT, K.ERO, and K.REC. K.INT Command The K.INT command specifies which recovery file(s) are to be initialized. This is the only means of initalizing a CRF. Files listed on a RECOVER state ment in the TCF and on this command will be initial ized. Files listed on a RECOVER statement but not on this command will be used for recovery. The INT com mand also specifies whether CRM data base recovery files (ARFs and BRFs) are to be initialized or recov ered. When used for CRM recovery files, this command is valid regardless of TAF installation options. The format is: K . I N T- t y p e , fi l e i d type File type. The options are: CRF Command relates to the communication recovery fi l e . T h i s o p t i o n v a l i d only if installation parameter IPTAR » 1. CRM Command relates r e c o v e r y fi l e s . The dump tape storage area should be physically separate from the area housing the disk drives. Automatic recovery also depends on the integrity of single input/output operations. An on-line motorgenerator is essential to ensure that disk operations underway at the time of a power failure have time to complete correctly. fi l e i d to CRM F i l e i d e n t i fi e r. T h e o p t i o n s a r e : digits 0-7 .Each digit in the string s p e c i fi e s a C R F t o b e initialized. The digit corresponds to the id parameter on the RECOVER s t a t e m e n t i n t h e T C F. This option is not valid if type is CRM. ALL Transaction recovery is enabled or disabled by the i n s t a l l a t i o n p a r a m e t e r I P TA R . I f I P TA R i s s e t t o one, transaction recovery is enabled; if IPTAR is set to zero, transaction recovery is disabled. If typ e i s C R F, all CRFs listed In TCF RECOVER statements are to be initialized. If type is CRM, all CRM after image r e c o v e r y fi l e s a r e t o b e initialized. If recovery is disabled, these requests will not be honored in recovery mode: NOTE Performance improvements through the use of multiple CRFs and BRFs (TAF/CRM only) will be realized only if each additional file resides on a separate device. INSTALLATION A procedure file for TAF initialization and recovery is presented in the NOS 2 Installation Handbook. CALLTRN RERUN RGET RPUT RSECURE SECURE TINVOKE TSTAT WSTAT For logging of input on CRF. Except for keywords USER and NEXT. Except for keywords STEP (=8 or =9) and USER. A number of other installation parameters have an effect on recovery. Refer to the NOS 2 Installation Handbook for details. 8-2 This option must be used with caution as the CRM data base update history currently residing on the recovery fi l e s w i l l b e l o s t . NONE If type is CRF, no CRF is to be initialized (all CRFs listed in TCF RECOVER sta te me n ts a re to be re covered) . If type is CRM, no CRM recovery files will be initialized. NONE is the default for both values of type. 60459500 C X^&SK K.ERO Command The K.ERO command specifies whether to override certain I/O or logical errors encountered during p r o c e s s i n g o f t h e c o m m u n i c a t i o n r e c o v e r y fi l e ( s ) . The format is: K. ERO»CRF ,o ption option Error override option. NO or YES. Must be NO Abort if I/O or logical er rors are encountered when processing the communication r e c o v e r y fi l e ( s ) . T h i s i s the default. If DISPLAY,ON is selected in the TCF, the K display is issued. This display is identical to the initial K display except that if any values were changed at initialization, the changed values are retained on t h e r e s t a r t e d K d i s p l a y. T h i s d o e s n o t a p p l y t o K.INT and K.ERO commands. Changed values for these commands are not retained after TAFREC completes. (This prevents inadvertent initialization of r e c o v e r y fi l e s i n a r e c o v e r y s i t u a t i o n ) . TCF/CRF RECOVERY CONSIDERATIONS TAF CONFIGURATION FILE The TCF contains several recovery-related items. YES I/O or logical errors en countered on a run unit header record will result in the loss of that run unit with no indication to the t e r m i n a l u s e r. T h e l o s s will be noted on the recov ery report. I/O or logical errors en countered on a message rec ord within a run unit will result in a loss of that run unit. However, a status in dicator would be set in the run unit header that would enable the terminal user to be informed. I/O or logical errors en countered on the CRF header record will result in uncon ditional abort of TAF. K.REC Command The K.REC command sets the user recovery bit in the terminal status table. The format is: • The RECOVER statement indicates the CRF i d e n t i fi e r ( z e r o t o s e v e n ) a n d t h e s i z e a n d number of messages that can be written to the CRF. • Default K display values can be changed by placing K display commands in the TCF. • The DISPLAY statement provides the option of having the K display brought up at initialization and recovery to allow the operator to override any of the default values. Details on these statements are given with the TCF description in section 4. The use of multiple CRFs is indicated by multiple R E C O V E R s t a t e m e n t s i n t h e T C F. E a c h R E C O V E R statement corresponds to a separate CRF. For each RECOVER statement there must be a corresponding NETWORK statement. Refer to Use of Multiple Communication Recovery Files in this section and Communication Recovery File in section 4. COMMUNICATION RECOVERY FILE K.REC-nnn nnn Recovery option. Must be YES or NO. YES Set the user recovery bit in the terminal status table. NO Do not change the present setting of the user recovery bit. J 8 ^ Error Override Certain errors on the CRF file(s) can be overridden by using the K.ERO K display command (refer to Initial K Display in this section). Input/output errors on the CRF encountered during the running of t r a n s a c t i o n s c a u s e TA F t o a b o r t a n d TA F R E C t o attempt recovery of all readable data from the CRF. RESTART K DISPLAY File Reformatting The K display that TAF formats at initialization will be displayed only if a DISPLAY statement with the ON parameter selected appears in the TCF. Refer to sec tion 4 for details on the DISPLAY statement. If the K display is brought up, the operator makes any desired changes and types K.GO or K.END to resume processing. K.STOP will abort TAFREC. TAF recovery processing reformats the CRF under the following circumstances. On a level 3 deadstart, or if TAF aborts, the TAF p r o c e d u r e fi l e a u t o m a t i c a l l y r e s t a r t s TA F b y t r a n s ferring control to TAFREC. TAFREC recovers the low CM pointers and variables that were defined at TAF i n i t i a l i z a t i o n v i a t h e i n i t i a l K d i s p l a y. 60459500 C • If the number of user messages per recovery unit is increased in the number parameter on the RECOVER statement. • If the size of user messages per recovery unit is increased in the maximumsize parameter on the RECOVER statement. • If a new user is added to or deleted from the corresponding network file. 8-3 The RECOVER statement cannot be used to reduce the number or size of the user messages. The only way to reduce either of these is to reinitialize the CRF using the K.INT command. To reformat ZZCRFi, TAF creates a permanent file named ZZCRFAi and writes the reformatted CRF to it. When the reformat is complete, the old CRF (ZZCRFi) i s p u r g e d a n d t h e n e w C R F ( Z Z C R FA i ) h a s i t s permanent file name changed to ZZCRFi. • S e t s t h e K d i s p l a y v a l u e s t o t h o s e i n e ff e c t prior to failure. • Identifies the users that were active at the time of failure. Active users will have the recovery flag (word 1, bits 0 and 53) set in the terminal status table (TST). • Reformats the CRF if necessary (refer to File Reformatting under Communication Recovery File in this sec tion). Multiple Communication Recovery Files • Prepares the TAF automatic recovery report. Up to eight CRFs may be active simultaneously. Each CRF must have a unique identifier. Once a CRF has been initialized with a given id, it must be brought up with the same id. If this is not done, recovery will fail. Advantages of using multiple CRFs are: • Initializes the transaction sequence number count. • The input/output associated with the CRFs is spread out across several disks. This improves performance. • Mul timainf rame recovery becomes possible. Refer to Mul timainf rame Recovery in this sec tion. MULTIMAINFRAME RECOVERY The guidelines in this subsection pertain to sites running TAF on several mainframes. These guidelines are applicable if the ability to recover transaction processing for a downed mainframe on an alternate mainframe is desired. • Make certain that the network (NCTFi) and C R F ( C R F i ) fi l e i d e n t i fi e r s ( i ) o n e a c h mainframe are unique among all mainframes. • Allocate unique data base names to all applications across all mainframes. • Allocate recovery-related files to shared mass storage. • Define unique terminal user names across all mainframes. • When a mainframe goes down, IDLE TAF on the mainframe that is to run the downed applications, t • R e s t a r t TA F w i t h a T C F f i l e t h a t c o n t a i n s RECOVER statements for the recovery ids of both mainframes* • When TAF TAF with the on up the downed mainframe is repaired, IDLE the recovery mainframe. Then bring independently on the two mainframes original TCFs. RECOVERY PROCESSING FLOW TAF AND SYSTEM FAILURE Following a TAF or operating system failure, the TAF i n i t i a l i z a t i o n p r o c e d u r e b r i n g s TA F u p i n r e c o v e r y mode. During recovery mode initialization, TAFREC and TAF perform the following functions: • S c h e d u l e s C TA S K t o m o v e b e g i n - c o m m i t i d s from BRF to CRF. BTASK is scheduled to determine which users active at the time of failure were running recoverable BTRAN-initiated transactions. BTASK calls CTASK to recover these transactions. Recovery for transactions being run from interactive terminals is postponed until the terminal logs in. When a terminal logs in, TAF checks the recovery fl a g ( w o r d 1 , b i t 5 3 ) i n t h e t e r m i n a l s t a t u s t a b l e . I f t h e r e c o v e r y fl a g i s s e t , R TA S K i s s c h e d u l e d instead of ITASK. RTASK performs these functions: • I f t h e r u n u n i t i s n o t r e c o v e r a b l e , R TA S K sends READY to the terminal and ceases. • If a recoverable transaction is no longer rerunnable, RTASK sends a message telling the terminal operator 1. that recovery has occurred, 2. that the recoverable transaction will not be rerun automatically, and 3. to enter the next input. This situation occurs when an input/output error occurred on the communication recovery fi l e . T e r m i n a l o p e r a t o r s s h o u l d b e instructed to inform the data administrator if this occurs since batch recovery will be necessary to restore the data base. • If the transaction SECURE request and a TA F / C R M C O M M I T r e q u e s t h a v e b e e n s u c c e s s f u l l y e x e c u t e d , R TA S K s e n d s t h e terminal confirmation message, and ceases. The terminal confirmation message was stored on the CRF as a result of the transaction SECURE request. • I f n o n e o f t h e p r e c e d i n g i s t r u e , R TA S K calls CTASK. CTASK requests a new transaction sequence number and returns the begin-commit history to TAF/CRM. CTASK then makes a RERUN request. The RERUN request turns off the recovery status, retrieves terminal input from the CRF, and schedules ITASK using the new sequence number and original terminal input. ITASK processes the input as if it had come from the terminal. tlf CDCS has been running on both mainframes and interfacing with TAF, CDCS must be dropped on the functional mainframe or recovery of CDCS data bases will not be possible. 8-4 60459500 C / * I D Tr a n s a c t i o n t e r m i n a l t y p e . DB=aa Two-character name of the data base t o b e a c c e s s e d b y ' t h e u s e r. O n l y one data base can be associated with a user name. UA=n Contents of the user argument area in the communication block. n ranges from 0 through 16777215. Default is zero. User area contents can be ex amined and changed by tasks. The appropriate initial value is site dependent. Bit 0 is the default task recovery bit. 60459500 C A s i m p l e s e t o f t e r m i n a l n e t w o r k fi l e d i r e c t i v e s follows: //DIAL. /AJ0HNSN,TT=*ID,DB=8C, UA=16117711B. /BJOHNSN,TT=*ID,DB=BC, UA=00007700B. /XYZ1,TT=*ID,DB=8C. NETWORK FILE ORIGINATION When an error-free network description is ready, an a n a l y s t s h o u l d c r e a t e a s y s t e m fi l e c a l l e d N C T F i ( w h e r e i i s t h e n e t w o r k fi l e i d e n t i fi e r ) f r o m t h e t e r m i n a l n e t w o r k d e s c r i p t i o n fi l e . A t y p i c a l w a y t o o r i g i n a t e a n N C T F i fi l e f o l l o w s . First, the user establishes a set of network description statements as a local file. NCTF. USER,username,password,familynaae. ' CHARGE,chargenuraber,projectnumber. or (*) COPYBR,INPUT,NET. SAVE,NET . end-of-record Network description statements e n d - o f - fi l e Then the user enters the following at the system console. X.DIS. USER,username,password,familyname. CHARGE,chargenumber,projectnumber. GET,NET. SUI,377777. DEFINE,NCTFi/CT=PU. COPY,NET,NCTFi,V. RETURN,NCTFi,NET. This creates a direct access public file called NCTFi under the system user index 377777. NCTFi is used to generate terminal status table entries. Figure 9-1 illustrates a terminal status table entry. Each line gives the user name and its associated data base, read and update securities, and user area value. When a run unit originates from a terminal, the transaction executive uses the appropriate entry in the terminal status table to construct words 0 and 1 of the communication block. After the network file is originated, it must be up dated to reflect changes, and the transaction execu tive must be reinitialized to recognize the new in formation. 9-1 TERMINAL STATUS TABLE ENTRY 59 communication line field A 55 53 42 ACN 24 38 reserved 17 database user argument field / / / database WordO 11 NT IF sequence number *g' Wordl message count Word 2 Word 68■ t COMMUNICATION BLOCK (refer to section 2 for more information) Word 1 id Function A User active. L Terminal logged in. D Terminal down. C Connection requested from network or terminal off. R Recovery required. N Recoverable transaction run. ACN Application connection number. ^r^t^v Word 2 id Function M Multiple block input being sent. I Input wanted. F Last message block sent. P Connection to be postponed. C CDCS abort. NT Number of transactions received from terminal. /*S§\ Figure 9-1. Communication Between a Terminal Status Table and a Communication Block 9-2 60459500 C TASK LIBRARY A task library contains all of the named-transactions and tasks that may be requested by a user group with in the transaction subsystem. The task library is created by the LIBTASK utility. A t a s k l i b r a r y fi l e i s a d i r e c t a c c e s s p e r m a n e n t file with no password that must be created with a DEFINE command before a library creation run occurs. However, it does not have to be attached by the user unless the DA option is specified (refer to L I B TA S K c o m m a n d ) . T h e t r a n s a c t i o n s u b s y s t e m simultaneously supports one system task library and, optionally, one task library for each data base. The system task library, called TASKLIB by default, may be renamed at the site's option. It is defined under the transaction subsystem user name and given write permission to that user name. The name TASKLIB may also be changed using the K display command K.TLF. (Refer to the NOS 2 Operator/Analyst Handbook.) A user task library must be named xxTASKL where xx is the name of the data base with which the library i s a s s o c i a t e d . I t m u s t b e d e fi n e d u n d e r t h e d a t a base user name, and explicit write permission must be granted to the transaction subsystem user name to access the file. D u r i n g i n i t i a l i z a t i o n , TA F a t t e m p t s t o a t t a c h a library for each initialized data base. The xxJ file is accessed to determine the user name needed to attach the library. When a scheduling request is received, the transaction subsystem searches for the n a m e d - t r a n s a c t i o n o r t a s k fi r s t i n t h e a s s o c i a t e d d a t a b a s e l i b r a r y, i f o n e e x i s t s , a n d t h e n i n t h e s y s t e m l i b r a r y. T r a n s a c t i o n ' a n d t a s k n a m e s , therefore, need be unique only within a given task l i b r a r y. T h e o n l y e x c e p t i o n t o t h i s p r o c e d u r e i s the initial task, ITASK, which is always loaded from the system library. LIBTASK UTILITY The LIBTASK utility creates a new library, adds new named-transactions and tasks to an existing library, deletes named-transactions and tasks from an e x i s t i n g l i b r a r y, r e p l a c e s t a s k s i n a n e x i s t i n g l i b r a r y, a n d c o m p a c t s a n e x i s t i n g l i b r a r y b y removing inactive records. Named-transactions and tasks may be added or deleted while the transaction subsystem is running, because tasks are added as a n e w fi l e a t t h e e n d o f t h e l i b r a r y. T h e l i b r a r y i s a m u l t i fi l e fi l e . T h e t r a n s a c t i o n e x e c u t i v e attempts to read a new library directory if the LIBTASK command contains the TT option. Thus, on line update of any task library is allowed. 60459500 C 10 I f t h e l i b r a r y i s m o d i fi e d w h i l e t h e t r a n s a c t i o n subsystem is running and the user wants the new directory used, the user number and password of the L I B TA S K u s e r a r e p a s s e d t o t h e t r a n s a c t i o n subsystem for validation. This is done by intercontrol point communication, which is also used to check if the transaction subsystem is running if the CR or PR option is selected. Therefore, the first USER command in the job must have permission to do intercontrol point communication. (Refer to the NOS 2 System Maintenance Reference Manual for t h e u s e o f M O D VA L t o a l t e r p e r m i s s i o n s . ) T h e LIBTASK run Issues an error message and does not update the library if the validation fails. The task binaries to be added or replaced are in ABS or OVL format produced by the CYBER Loader. TASK RESIDENCY AND TYPE An important option of LIBTASK enables the user to specify the residency and type of tasks on the task l i b r a r y. A t a s k c a n r e s i d e o n c e n t r a l m e m o r y, e x t e n d e d m e m o r y, o r m a s s s t o r a g e . T h i s c a n b e s p e c i fi e d w i t h t h e C a n d E o p t i o n s o n L I B TA S K directives. A task can be of either reusable or nonreusable type. A reusable task must be written so that it is reinitializing. A reinitializing task (program) does not modify program areas that the program considers constant; if it does, it resets ( r e i n i t i a l i z e s ) t h e s e a r e a s u p o n r e e n t r y. M u l t i p l e requests for a reusable task can be queued together; this is partly under the control of the person who sets up the task library and partly under the control of the transaction executive. The queuing of multiple requests occurs in an internal list, the requested task list (RTL). Each entry in this list represents a scheduling request for a copy of a task. There may be multiple entries in the RTL list f o r a g i v e n t a s k . T h e L I B TA S K q u e u e l i m i t i n p u t directive can be used to specify the maximum number of transactions that can be queued against one e n t r y. W h e n t h e t r a n s a c t i o n e x e c u t i v e s c h e d u l e s a copy of a task from the RTL list, it picks an RTL entry and forces all of the multiple requests queued for that RTL entry to use the same copy of the task. It is generally possible to have multiple copies of a given task in execution at the same time (note that this does not apply to CM-resident tasks). Additional application control of task scheduling is p r o v i d e d b y t h e Q L I B TA S K o p t i o n i n t h e i n p u t directives. A nonreusable task is not a reinitializing task; a new copy of the task must be loaded from the task library for each transaction. 10-1 The task type can be specified with the D option on L I B TA S K d i r e c t i v e s . T h e q u e u e l i m i t c a n b e specified with the QL option. I f a t a s k i s s p e c i fi e d a s c e n t r a l m e m o r y - r e s i d e n t and reusable, it is loaded to a subcontrol point when TAF is initialized and, unless the task aborts, remains at that subcontrol point to service transactions as long as TAF is running. If the task aborts, another copy of it will be loaded. It is a single copy task. No additional copies of this task are loaded to process requests after queue limit has been reached. LIBTASK COMMAND T h e L I B TA S K c o m m a n d h a s t w o f o r m a t s . T h e fi r s t f o r m a t a l l o w s s p e c i fi c a t i o n o f t h e fi l e c o n t a i n i n g input directive statements; this format is: LIBTASK(Pl,P2,...,Pn> T h e s e c o n d f o r m a t s p e c i fi e s t h a t i n p u t d i r e c t i v e statements are included in this LIBTASK command. This format is: L I B TA S K t P i . p j , . . . , Z , . . . , P n ) ; d x ; d 2 ; . . . ; d n . Parameter Description F i l e i s s p e c i fi e d b y you. 1-0 No directive exists. fi l e O m i t t e d D e f a u l t fi l e i s I N P U T. S p e c i fi e s t h e fi l e c o n t a i n i n g t a s k binaries to be added to the library. These may be tasks already existing in the library or they may be new o n e s . T h e fi l e i s r e w o u n d b e f o r e processing. Options are: B File is LGO. B-lfn F i l e i s s p e c i fi e d b y you. B-0 N o b i n a r y fi l e e x i s t s . Omitted Default file is LGOB. Specifies the file on which output is written. Options are: L ; Unique delimiter that does not occur in any d^ input directives. This delimiter does not have to be a semicolon. /Sa^V I=lfn File L-lfn is O U T P U T. File is you. s p e c i fi e d by L«0 No output is written. dj Input directive statement (refer to Input Directives in this sec tion). The input directives on a LIBTASK command remain in effect for a task in an existing task library until t h e t a s k i s s p e c i fi e d i n a s u b s e q u e n t L I B TA S K command; that is, the most recent input directives (including default input directives) for a task take p r e c e d e n c e o v e r e a r l i e r i n p u t d i r e c t i v e s . H o w e v e r, this is not true for a task that is not in a task l i b r a r y ; i n t h i s c a s e , t h e fi r s t i n p u t d i r e c t i v e s (including default input directives) take precedence. For example, you specify the following command: LIBTASK(p1,p2,P3,...,pn);*T1 DL. This command logically deletes task Tl. If you specify task Tl in a subsequent LIBTASK command and do not specify DL, the task is activated (by default). The LIBTASK com and cannot exceed 80 characters. The parameters (pf) for either format can be in any order and are: Parame ter Description I S p e c i fi e s t h e fi l e c o n t a i n i n g i n p u t d i r e c t i v e s . T h e fi l e i s n o t r e w o u n d before processing. All directives that do not refer to a task name present on the B file or P file are ignored. Options are: I 10-2 File is COMPILE. Omitted Default file is OUTPUT. Specifies the name of a direct access p e r m a n e n t fi l e t o b e u s e d a s t h e l i b r a r y fi l e . T h e fi l e i s r e q u i r e d . Options are: P File is TASKLIB. P-lfn F i l e i s s p e c i fi e d b y you. P-0 N o o l d l i b r a r y fi l e exists. Omitted Default TASKLIB. fi l e is J^'^Wt^\ Specifies a newly defined direct ac cess permanent file to be written as t h e n e w l i b r a r y fi l e . U s e o f t h i s option eliminates the complete copy o f t h e P fi l e t o a s c r a t c h fi l e o n t h e P R o p t i o n , t h u s s i g n i fi c a n t l y reducing the purge time for long l i b r a r i e s . T h e P fi l e i s n o t p u r g e d . Options are: N File is TA S K L I B . N»lfn File is specified by you. O m i t t e d D e f a u l t fi l e i s t h e fi l e s p e c i fi e d b y P. 60459500 B /^S\ J ^ Parameter L O Parameter Des c r ipt ion Produces a report of tasks and their attributes, named-transactions with attributes, and names of member tasks. It is not necessary to specify the TT option when using LO if I»0 and B=0. Figure 10-1 shows the format of the report. The options are: LO Same as PR LO»A. LO=A Report all tasks and transae tions. Report only actions. omitted TN No report produced. trans i s S p e c i fi e s t h e n a m e o f a t a s k o r transaction. This parameter is valid only when the LO parameter is also specified. If LO-T, TN names a task; if LO=X, TN names a transaction. The options are: TN*tname The task or trans action (tname) is the only one re ported on. omitted DA CR Removes inactive task binaries and old directories from the task l i b r a r y. L I B TA S K p r o c e s s e s t h e B fi l e a n d t h e i n p u t d i r e c t i v e s n o r m a l l y a n d , i f N i s n o t s p e c i fi e d , copies the entire library to a s c r a t c h fi l e . T h e c u r r e n t b i n a r y for each task in the library is then t r a n s f e r r e d f r o m t h e s c r a t c h fi l e t o t h e l i b r a r y fi l e , a n d t h e d i r e c t o r y is updated and written at the end. Therefore, only one copy of each task and one directory remain in the l i b r a r y . I f N i s s p e c i fi e d , n o s c r a t c h fi l e i s w r i t t e n , a n d P i s n o t p u r g e d . T h e n e w l i b r a r y fi l e contains only the latest copy of each active task and one directory. LO«T Report only tasks. LO=X Description All tasks or all transactions are re ported on. Disables all attaches and returns of t h e l i b r a r y fi l e s i n t h e L I B T A S K program. With this option selected, t h e N fi l e a n d t h e fi l e s p e c i fi e d b y P must be attached prior to the L I B TA S K c a l l . I f a l i b r a r y i s attached in the proper mode from another user name, the DA option m u s t b e s e l e c t e d s o t h a t L I B TA S K does not try to attach the appropriate libraries under the user name from which the update is being run. Creates a new task library. LIBTASK reads one task at a time from the B fi l e , c h e c k s f o r a n i n p u t d i r e c t i v e for the task, constructs a directory e n t r y, a n d i n s e r t s t h e e n t r y i n alphabetical order in the library d i r e c t o r y. T h e d i r e c t o r y i s w r i t t e n a t t h e e n d o f t h e l i b r a r y. T h i s option applies only if LIBTASK was able to attach the task library (specified by the N option) in write mode. This option applies only if LIBTASK was able to attach the task library (specified by the N option) in write mode. TT Instructs the transaction executive t o u p d a t e t h e TA F - r e s i d e n t c o p y o f t h e t a s k l i b r a r y d i r e c t o r y while TAF i s r u n n i n g . I f n o t s p e c i fi e d , T A F will not become aware of the update until the next time it is initialized. The installation parameters TLDMN and TREMN are used to specify the amount of space to be reserved for adding tasks and transactions for each of t h e TA F - r e s i d e n t t a s k l i b r a r y d i r e c tories. The default allows 10 addi tions for each. Although further additions can be made to your task l i b r a r y, t h e y w i l l n o t b e r e c o g n i z e d b y TA F u n t i l TA F i s r e i n i t i a l i z e d . There is no limit to the number of times existing tasks can be replaced. The user name from which LIBTASK is being run must be the same as the user number in the xxJ file associ ated with the library being modified, and TAF must be able to attach the library in write mode in order for the update of TAF's copy of the TLD to take place. You must be validated fo r i n te rco n tro l p o i n t co mmunication (the CSTP bit in user's access word must be set) to use the TT option. Each time you use the TT parameter with the LIBTASK command, a file is added to your task library. S p e c i fi e s t h a t i n p u t d i r e c t i v e s a r e on the LIBTASK command. This option overrides the I option. /$PV 60459500 B 10-3 Part 1. Task listing. Generated if LO-A or LO-T. TASK NAME PRIORITY BEG MAX FIELD LENGTH EXTRA QL FL ATTR DCEORQ taski taskg bp mp bp mp ql ql fl fl e fl e fl attrib attrib taskn bp mp ql fl e fl attrib t a s k i Ta s k n a m e . b p B e g i n n i n g p r i o r i t y. m p M a x i m u m p r i o r i t y. ql Queue limit. fl F i e l d l e n g t h r e q u i r e d b y t h e t a s k . e fl E x t r a fi e l d l e n g t h t h e t a s k m a y r e q u e s t . a t t r i b Ta s k a t t r i b u t e l i s t . T h e a t t r i b u t e i s i n e f f e c t i f t h e l e t t e r a p p e a r s . D Destructive code. C Central memory-resident. E Extended memory-resident. Refer to Task Input Directives, later in this section, for infor mation about these attributes. 0 Task is OFF. R Solicited communication block. Q Queueing enforced. Part 2. Transaction listing. Generated if LO-A or LO-X. TRANSACTION UNIT 1ST TASKS 2ND 3RD 4TH 5TH D.M. CD tnamei tnamej taski taski task2 taskg task3 task3 task/; task/; tasks tasks datamanager datamanager re re tname3 taski task2 task3 task/; tasks datamanager re RECOVER /^8^S\ tnamei Transaction name. taski Task names. If any task does not exist in this library, its name is enclosed in parentheses. datamanager The data managers used by the named-transaction. May be either or both: C Transaction uses CRM. D Transaction uses CDCS. Use of the indicated data manager is allowed if the letter appears. Recovery indicator. For recoverable transactions, RC appears in this position. Figure 10-1. Task Library Report 10-4 60459500 A Adding or deleting tasks within a named-transaction or altering other attributes is accomplished by respecifying the directive in full. INPUT DIRECTIVES NAMED-TRANSACTION INPUT DIRECTIVE The named-transaction input directive is used to create and delete named-transactions. The format is: / tname, Tl=« task 1, T2- task2, T3- task3, T4- task4, T5-task5,RC,DM»datamanager,DL. tname Transaction name. Must be one to seven alphanumeric characters. taski Name of the task(s) in the namedtransaction, tname. The tasks will be executed in the order listed. If a task issues a CALLTSK with CEASE, the remaining tasks in the original transaction will not be executed. RC J0^*\ Recovery indicator. When this p a r a m e t e r i s s p e c i fi e d , t h i s transaction is recoverable. If n o t s p e c i fi e d , t h i s t r a n s a c t i o n is not recoverable. datamanager The data manager(s) that may be used by this named-transaction. If a recoverable transaction attempts to use CDCS or CRM and its usage was not declared via this parameter, the run unit will be aborted. This parameter is valid only if the RC parameter is also specified. The options are: C The transaction uses CRM. D The transaction uses CDCS. DL Causes the deletion of transac tion tname from the task library. If specified, this parameter must be the only parameter in addition to the tname parameter on the d irec tive. Additional tasks can be made part of the execution of a named-trans action if they are initiated via a CALLRTN or CALLTSK with CEASE. A CALLTSK with CEASE, however, will prevent any remaining tasks in the original transaction from being executed. A task may be part of more than one namedtransaction. Declaring the named-transaction recoverable is n e c e s s a r y b u t n o t s u f fi c i e n t t o e n s u r e c o r r e c t recovery from failures. The transaction must also be constructed to support recovery as specified in section 7 of this manual. Ta s k s s p e c i fi e d i n t h i s d i r e c t i v e d o n o t h a v e t o e x i s t i n t h e d a t a b a s e t a s k l i b r a r y. T h i s a l l o w s system tasks to be included in the named-transaction d e fi n i t i o n . N a m e d - t r a n s a c t i o n s w i t h t a s k s t h a t d o not exist in the data base task library are enclosed by parentheses in the report generated by using the LIBTASK LO parameter. 60459500 A TASK INPUT DIRECTIVE To a l t e r t a s k c h a r a c t e r i s t i c s , d i r e c t i v e s t a t e m e n t s m a y b e e n t e r e d i n t h e d i r e c t i v e fi l e . O n l y o n e statement should appear for each task. These characteristics are kept in the directory for use by the transaction executive when the task is to be executed. The directive statement format is: *name Pi,P2 Pn« name is the task name and p^ is any of the following input directives in any order. Directive Description BP-nn Beginning scheduling priority of task. BP Beginning priority defaults to 25g. BP omitted Beginning priority defaults to 20g. C S p e c i fi e s a m e m o r y - r e s i d e n t t a s k . The default is a disk-resident task. D S p e c i fi e s a d e s t r u c t i v e c o d e ( n o n reusable) task that is removed from the subcontrol point when the task is completed. The default is a reusable task. This option is recommended when debugging a task. DL S p e c i fi e s t h a t a t a s k ( n a m e ) i s logically deleted. All logically deleted tasks are physically deleted from the task library when the L I B TA S K c o m m a n d c o n t a i n s t h e P R option. S p e c i fi e s a n e x t e n d e d m e m o r y resident library copy of the task. The default is mass storage-resident. I f t a s k s a r e s p e c i fi e d a s e x t e n d e d memory-resident, the transaction e x e c u t i v e l o a d s a s m a n y a s w i l l fi t into its available extended memory during initialization and leaves the remaining tasks on the mass storage fi l e . I f n o e x t e n d e d m e m o r y i s available, all tasks are loaded from mass storage. If a LIBTASK command specifying the TT option is issued while the trans action executive is running, no tasks are replaced or added to e x t e n d e d m e m o r y, a n d o n e o f t h e following situations occurs. • O l d c o p y o f t a s k i n extended memory and new copy in e x t e n d e d m e m o r y. T h e n e w copy is ignored, and the old copy remains on the library in extended memory. 10-5 Directive Des c r ipt ion Directive • Old copy not in extended memory and new copy in e x t e n d e d m e m o r y. T h e n e w copy is used but is read from mass storage. An active task is a copy of a task which is both: • At a subcontrol point or rolled out. • Old copy in extended memory and new copy not in extended m e m o r y. T h e n e w c o p y i s loaded from mass storage. • E F - e fl S p e c i fi e s t h e m a x i m u m a m o u n t b y which a task will be allowed to i n c r e a s e i t s i n i t i a l fi e l d l e n g t h , efl is assumed to be octal unless it contains an 8 or 9 or is followed by a trailing D. The default value is zero. EF will be increased to the next multiple of lOOg if it is not already such a multiple. The maximum fi e l d l e n g t h a l l o w e d f o r t h e t a s k i s ( i n i t i a l t a s k F L ) + e fl . T h e v a l u e of efl can range from 0 to 300000g. I G S p e c i fi e s t h a t a t a s k ( n a m e ) I n t h e fi l e s p e c i fi e d w i t h t h e B o p t i o n i s ignored. MP»nn Maximum scheduling priority of task (for future use in aging tasks). MP Maximum priority defaults to 50g. MP omitted Maximum priority defaults to 40g. 0 Sets task to OFF; requests for the t a s k a r e r o u t e d t o t h e O F F TA S K routine (refer to OFFTASK in section 11). The default is ON. Q S p e c i fi e s t h a t q u e u i n g i s t o b e forced, described as follows. This option alters the normal scheduling priority of the task (refer to Scheduling Priority) as follows: 1. When there are no active copies o f t h e t a s k , t h e fi r s t c o p y o f the task is scheduled as usual (refer to Scheduling Priority). 2. While there are from one to six active copies of the task in TAF, another copy of the task is not scheduled until the number of transactions queued against its RTL entries equals or exceeds the queue limit s p e c i fi e d b y t h e Q L d i r e c t i v e . W h e n a n RT L e n t r y i s u s e d t o schedule a task, it is released and made available for requesting the scheduling of other tasks. 3. When the number of active copies of the task equals seven, additional copies of the task will not be scheduled. This applies even if the queue limit is 1. Description In the process of handling a transaction or has transactions queued against it (the copy). If a LIBTASK function specifying the TT parameter is issued while the transaction executive is running and an attempt is made to change the Q attribute of a task on a library in u s e b y TA F, t h e n t h e Q a t t r i b u t e change will not affect TAF schedul ing until the executive is reinitialized. This parameter is not applicable to CM-resident tasks. Q L - n S p e c i fi e s t h e n u m b e r o f r e q u e s t s , u p t o a m a x i m u m o f fi v e , t h a t c a n b e queued for an RTL entry for a task. If a task uses a large amount of m e m o r y a n d e x e c u t e s r a p i d l y, p e r formance is not degraded if requests are queued. In this case, multiple copies of the task require too much m e m o r y. I f a t a s k d o e s a l a r g e a m o u n t o f I / O , t h e n p e r f o r m ance is degraded if requests are queued. In this case, multiple copies of the task enhance performance. Q L Q u e u e e n t r y l i m i t d e f a u l t s t o fi v e . QL omitted Queue entry limit defaults to three. R S p e c i fi e s t h a t t h e F L a s s i g n e d t o a CM-resident task is to be reduced to the Initial load value each time the transaction is run. The default is no reduce. Non-CM-resident tasks are always started with their initial load value. SC Sets the task communication block load status to solicited. This means you must request the communication block and supply a valid address (using the BEGIN request) after the task is initi ated. The default is unsolicited. All directives for one task must appear on the same line. The following situation will result in only Pj being recognized as an input directive for TASKI. *TASK1 pj. *TASK1 p2. Improper way to specify input directives. *TASK1 pn, /<3SS|y 10-6 60459500 B SCHEDULING PRIORITY UPDATING AN EXISTING TASK LIBRARY When the tasks are queued, the scheduler will attempt t o l o a d t h e t a s k w i t h t h e h i g h e s t c u r r e n t p r i o r i t y. If there are several tasks with the highest priority, t h e t a s k w i t h t h e l o w e s t fi e l d l e n g t h r e q u i r e m e n t will be selected for loading. When a task enters the queue, the beginning priority (BP) is used as the t a s k ' s c u r r e n t p r i o r i t y. T h e c u r r e n t p r i o r i t y i s then aged (incremented by one) every second up to the maximum priority (MP). Tasks in the queue having i d e n t i c a l c u r r e n t p r i o r i t i e s a n d fi e l d l e n g t h r e quirements normally will be scheduled in the order they entered the queue. The following examples show how you can update (add new tasks and delete and replace existing tasks) an existing task library without supplying any binaries. An explanation is provided after each LIBTASK command. With these directives, classes of tasks can be created. For e x a m p l e , i f t w o c l a s s e s w e r e c r e a t e d (X and Y) their priorities could be: XBP = 25g YBP = 308 XMP = 408 YMP = *58 In this case, no tasks in X could be scheduled until all tasks in Y having a current priority greater than 40s had been scheduled. CREATING A NEW TASK LIBRARY The following examples show how you can create a new task library. An explanation is provided after each LIBTASK command. LIBTASK(P»0,N-lfn !,CR,B-lfn2,1) L I B T A S K c o p i e s fi l e l f n 2 t o fi l e l f n j a c c o r d i n g to input directives in the COMPILE file and adds a new sorted task library directory at the end of file lfnj. LIBTASK(P-lfn2,N-lfh1,Z);*name PliP2»»*»»Pn« L I B TA S K c o p i e s fi l e l f n 2 t o fi l e l f n j a n d a d d s a new sorted task library directory at the end of file l f n i a c c o r d i n g t o i n p u t d i r e c t i v e s o n t h e L I B TA S K command. 00$^**, LIBTASK( P-lfn2,N-lfnj,PR,Z);*name PlfP2»*'*»Pn« LIBTASK copies all active (not logically deleted or r e p l a c e d ) t a s k b i n a r i e s f r o m fi l e l f n 2 t o fi l e lfn} and adds a new sorted task library directory a t t h e e n d o f fi l e l f n j a c c o r d i n g t o i n p u t directives on the LIBTASK command. LIBTASK(P=lfn2,N=lfn1,B-lfn3,I) L I B T A S K c o p i e s fi l e l f n 2 t o fi l e l f n j , c o p i e s fi l e l f n 3 t o fi l e l f n j a c c o r d i n g t o i n p u t d i r e c t i v e s i n t h e C O M P I L E fi l e , a n d a d d s a n e w s o r t e d t a s k l i b r a r y d i r e c t o r y a t t h e e n d o f fi l e lfnj. L I B TA S K ( P - l f n 1 , Z ) ; * n a m e P i , p 2 P n • LIBTASK adds a new sorted task library directory at t h e e n d o f fi l e l f n ! a c c o r d i n g t o i n p u t d i r e c t i v e s on the LIBTASK command. LIBTASK(P=lfn1,PR,Z);*name Pi,p2»•••»Pn« L I B TA S K c o p i e s a l l a c t i v e ( n o t l o g i c a l l y deleted or r e p l a c e d ) t a s k s f r o m fi l e l f n j o n t o a s c r a t c h fi l e , c o p i e s t h e s c r a t c h fi l e b a c k o n t o fi l e l f n j , and adds a new sorted task library directory to the e n d o f fi l e l f n ! a c c o r d i n g t o t h e i n p u t d i r e c t i v e on the LIBTASK command. This command is not valid when TAF is up and has attached file lfn!. LIBTASK(P«lfni,B-lfn2,Z);*name Pl»P2»'»»»Pn» L I B TA S K c o p i e s fi l e l f n 2 t o t h e e n d o f fi l e l f n t a c c o r d i n g t o i n p u t d i r e c t i v e s o n t h e L I B TA S K statement. LIBTASK adds a new sorted task library d i r e c t o r y t o t h e e n d o f fi l e l f n ! . L IBTASK(P« l fn !,B» l fn 2 ,PR ,I-l fn 3 ) L I B TA S K c o p i e s a l l a c t i v e ( n o t l o g i c a l l y deleted or r e p l a c e d ) t a s k s f r o m fi l e l f n ! o n t o a s c r a t c h fi l e , c o p i e s t h e s c r a t c h fi l e b a c k o n t o fi l e l f n ! , c o p i e s fi l e l f n 2 t o t h e e n d o f fi l e l f n j a c c o r d i n g t o i n p u t d i r e c t i v e s o n fi l e l f n 3 , a n d adds a new sorted task library directory to the end o f fi l e l f n ! . T n i s c o m m a n d i s n o t v a l i d w h e n TA F is up and has attached file lfn!. DELETING A TASK FROM A TASK LIBRARY With the DL input directive on the LIBTASK command, you can logically . delete a task from the task l i b r a r y i f TA F i s u p a n d h a s a t t a c h e d t h e t a s k library as follows: LIBTASK(P-lfn!,TT,Z);*name DL. I n t h i s e x a m p l e , L I B TA S K l o g i c a l l y d e l e t e s a t a s k (name) from file lfn!. Tne *T °Ption is required when TAF is up. The DL input directive is the only input directive allowed for the named task. With the PR option on the LIBTASK command, you can delete inactive tasks from the task library when TAF is not up and when TAF is up but has not attached t h e t a s k l i b r a r y. LIBTASK(P=lfn2,N=lfni,B=lfn3,PR,I) LIBTASK copies all active (not logically deleted or r e p l a c e d ) t a s k b i n a r i e s f r o m fi l e l f n 2 t o fi l e l f n j , c o p i e s fi l e l f n 3 t o fi l e l f n j a c c o r d i n g to input directives in the COMPILE file, and adds a new sorted task library directory at the end of file lfn^ 60459500 A LIBTASK(P=lfn!,PR,Z);*name DL. In this example, LIBTASK physically deletes a task ( n a m e ) f r o m fi l e I f n ^ TA F m u s t n o t h a v e t h e fi l e attached when this command is executed. 10-7 IGNORING A TASK IN THE REPLACEMENT FILE In this example, LIBTASK skips a binary task (name) ^ o n fi l e l f n 2 w h e n c o p y i n g fi l e l f n 2 t o fi l e I With the IG input directive on the LIBTASK command, lfn!. The IG input directive is the only input the user can tell LIBTASK to ignore a task binary in directive allowed for the named task. the replacement fi l e s p e c i fi e d with the B option as -*=^s follows: ) LIBTASK(P-lfn1,B=lfn2,Z);*name IG. 10"8 60459500 A 0^**- REQUIRED SYSTEM TASKS AND TRANSACTIONS 11 The applications programmer should be aware of the functions of these tasks but may omit the detailed information contained in this and section 12. ITASK recognizes the transaction code EX., which is used to call the system transaction XTRAN. This special transaction code is reserved for XTRAN. Several system tasks are required with every application: BTRAN recovery task (BTASK), data base r e c o v e r y t a s k ( C TA S K ) , i n i t i a l t a s k ( I TA S K ) , K display director (KDIS), logout transaction terminal (LOGT), message abort (MSABT), inactive task (OFFTASK), CDCS rerun task (RCTASK), run unit recovery task (RTASK), system message (SYSMSG), and execute named tasks (XTASK). Each must reside on the system task library of every transaction system. Limited versions of these system tasks are supplied by Control Data; however, modifications to t h e s e t a s k s a r e o f t e n n e c e s s a r y f o r s p e c i fi c applications. One additional system task, CRMTASK, is required if the TAF/CRM Data Manager is used. Refer to the TAF/CRM Data Manager 1 Reference Manual for information on CRMTASK. ("NOTE"! Directions for installing these tasks are contained in the TAF Installation section of the NOS 2 Instal lation Handbook. Because TTASK schedules tasks, care must be taken to avoid entering an infinite loop when a task calls TTASK. TTASK is described in more detail in section 12. K DISPLAY TASK (KDIS) KDIS is a system task scheduled by the transaction executive when the K.SWITCH command is entered by t h e c o n s o l e o p e r a t o r. K D I S r e q u e s t s t h e K d i s p l a y and displays a complete list of K display commands. The K display commands are discussed in the NOS 2 I Analysis Handbook. | LOGOUT TASK (LOGT) BTRAN RECOVERY TASK (BTASK) BTASK recovers rerunnable BTRAN run units. BTASK must be installed on the TAF system library. This task logs a terminal out of TAF. However, the task does not log the terminal off the computer system. The task sends a message, END OF TRANSACTION SESSION; performs a LOGT request; and performs a CEASE request. The terminal is then a v a i l a b l e f o r l o g i n t o TA F o r o t h e r n e t w o r k applications. DATA BASE RECOVERY TASK (CTASK) CTASK helps TAF/CRM recover the data base during TAF initialization, terminal failure, and NETWORK failure. CTASK must be installed on the TAF system l i b r a r y. INITIAL TASK (ITASK) T h e p r i m a r y f u n c t i o n s o f I TA S K a r e a n a l y z i n g t e r m i n a l i n p u t a n d TA F - o r i g i n a t e d t r a n s a c t i o n s . I f t h e TA F - o r i g i n a t e d t r a n s a c t i o n fi e l d i s s e t i n t h e communication block (figure 2-1), TTASK uses a table to initiate the processing routine associated with that type of transaction. Otherwise, TTASK examines t h r e e c h a r a c t e r s , s t a r t i n g w i t h t h e fi r s t c h a r a c t e r o f t h e i n p u t m e s s a g e . T h e fi r s t o f t h e s e t h r e e characters is the transaction code; the other two comprise the sub transaction code entered from a terminal. 00*. 60459500 C MESSAGE ABORT (MSABT) Message abort (MSABT) is a system task that sends error messages to the originating terminal when a transaction is terminated due to a system-detected e r r o r. M S A B T c h e c k s f o r e r r o r c o d e s t h a t w e r e placed in the communication block by the transaction executive or the initial task. When an error code is detected, MSABT sends the appropriate error message and initiates an abnormal CEASE function. MSABT is scheduled in the same manner as other tasks. If the TOTAL Data Manager is used, MSABT must be modified to perform a FREEX command. This ensures that TOTAL records are released if a task aborts. Error messages issued by MSABT are described in appendix B. 11-1 INACTIVE TASK (OFFTASK) SEND MESSAGE TASK (STASK) This task is provided to give you control over an internal condition that might be the result of o p e r a t i o n a l e r r o r. O F F TA S K i s s c h e d u l e d b y t h e transaction executive when a request has been received for an inactive task. The task may be i n a c t i v e o r o ff d u e t o t h e u s e o f t h e K . O F F TA S K command or use of a LIBTASK directive when the task was placed in the library. OFFTASK sends an error message to the originating terminal and ceases abnormally. It is expected that you will expand the t a s k t o h a n d l e a n y s p e c i fi c c o n d i t i o n s t h a t m a y exist when a transaction is interrupted by an inactive task. This task sends a message to the terminal and then terminates. STASK is called from ITASK only when ITASK is to terminate after sending a message to the terminal. CDCS RERUN TASK (RCTASK) When CDCS becomes available after a failure, RCTASK i s a c t i v a t e d . R C TA S K d e t e r m i n e s w h i c h t e r m i n a l s were effected by the CDCS failure and reruns their transactions (if rerunnable). RUN UNIT RECOVERY TASK (RTASK) The recovery task RTASK is a Control Data-supplied recovery task that will handle most transaction application needs; however, some sites may wish to modify RTASK to handle special requirements. The following discussion will aid understanding of RTASK in case a modification is required. RTASK must be available to all applications. This implies that it m u s t b e p r e s e n t o n t h e TA F s y s t e m t a s k l i b r a r y (TASKLIB) or en all of the data base task libraries. It may be on the TASKLIB and any number of selected data base task libraries. In this case, only those a p p l i c a t i o n s w i t h o u t t h e i r o w n c o p y o f RTA S K w i l l use the version on TASKLIB. After terminal disconnects, or NAM, TAF, and system failures, the terminal must go through the login p r o c e d u r e s w i t h TA F. T h e f o l l o w i n g s t e p s o u t l i n e the decision process followed by RTASK. When a true condition is encountered, the remaining steps are skipped. 1. If the run unit Is not recoverable because RC was not specified on the LIBTASK directive for the named-transaction, RTASK sends the message READY to the terminal. 2. If the run unit is not rerunnable because of an I/O error encountered by TAFREC, RTASK tells the terminal operator recovery has occurred and to enter the next command. 3. If the run unit Is secure and the data base i s c o m m i t t e d , R TA S K s e n d s t h e t e r m i n a l confirmation (SECURE) message. 4 . R TA S K t e l l s t h e t e r m i n a l o p e r a t o r t h a t recovery has occurred, that the transaction is being rerun, and reruns the transaction. 11-2 /£5S|v SYSTEM MESSAGE TASK (SYSMSG) This task sends K.MESSAGE-entered messages and K display diagnostic messages to terminals. It calls the subroutine in COMKCBT passing the user argument bits. The word returned is sent after the message is sent. EXECUTE NAMED TASK (XTASK) The execute named task (XTASK) is a special task scheduler used to execute most named tasks. It will not execute tasks by the names ITASK, KDIS, MSABT, OFFTASK, SYSMSG, and XTASK. These are the names of r e q u i r e d s y s t e m t a s k s . X TA S K c a n b e u s e d t o schedule LOGT as a means of logging a terminal out of transaction mode. XTASK is initiated via system t r a n s a c t i o n X T R A N , d e s c r i b e d f o l l o w i n g t h e X TA S K description. EX.task EX. Special three-character transaction code which causes ITASK to schedule XTRAN via a CALLTRN request. XTRAN specifies XTASK as its only task. task One- to seven-character alphanumeric t a s k n a m e , l e f t - j u s t i fi e d ( n o s p a c e between EX. and task) with a nonalphanumeric character terminator. A site may want to delete the TRANS table entry of STRAN (X.), XTASK in the TRANT table of ITASK, or t h e s y s t e m t a s k X TA S K a l t o g e t h e r f o r s e c u r i t y r e a s o n s . X TA S K w a s p r o v i d e d a s a m e a n s o f scheduling tasks, and as an example of how a site might use such a task. However, it may provide too much flexibility, and therefore should be used with discretion. sf^^X XTRAN TRANSACTION Transaction XTRAN must be defined when the system task library is created. XTRAN will be scheduled when the three-character code EX. is entered from a terminal. This transaction allows scheduling any task in the local or system task library as described under XTASK. The characteristics of XTRAN are: • Task name is XTASK. • No data managers. • Not recoverable. 60459500 C 12 ITASK SYSTEM TASK r This section describes some of the features, options, and requirements of ITASK. Word 2 and following MACROS ITASK contains three tables. These tables are set up for the following codes. T TO T, n u m b e r o f e n t r i e s i n t h e table. Ta b l e e n t r i e s . The format of a TTOT entry is shown in figure 12-1. • Time a task is to be run TRAN MACRO • Tr a n s a c t i o n c o d e The TRAN macro sets up entries for the table of transaction codes (TRANT). TRANT contains the address of the table of subtransaction codes for t h a t p a r t i c u l a r t r a n s a c t i o n c o d e . I TA S K a s s u m e s that the TRANT table is set up in 6-bit display code o r d e r. I t u s e s t h e 6 - b i t d i s p l a y c o d e v a l u e o f t h e transaction code you enter to locate the proper entry in TRANT. • Sub transaction code /0^*- Word 1 A macro is used to set up each type of ITASK table. These three COMPASS macros, TIMCNT, TRAN, and STRAN, are discussed here. The format is: TIMCNT MACRO The TIMCNT macro makes an entry in the table of time-originating tasks (TTOT). TTOT contains the time a transaction or task is to be initiated and an address. One TTOT contains all of the entries, regardless of the application that is to use them. This feature allows tasks to be run at predetermined times w i t h o u t s p e c i fi c t a s k r e q u e s t s o r t e r m i n a l I n p u t t o initiate the run. The format is: TIMCNT hr,min,sec,address hr Minute. sec Second. addr ess STRAN MACRO The STRAN macro makes entries in the table of subtransaction codes (TRANS). TRANS contains the subtransaction code and the corresponding transaction name. s c Tw o - c h a r a c t e r s u b t r a n s a c t i o n c o d e . tname Name of the transaction to be called. The format of an entry in TRANS is shown in figure 12-3. The TTOT table format is: 41 address The format of an entry in TRANT is shown in figure 12-2. STRAN sc,tname address Routine address. 59 code One-character transaction code. The format is: Hour. min TRAN code 17 'wmmmmmm S 11 hr min 0 sec Address is the tag of a user-written subroutine that is called by ITASK to set up and call the desired transaction or task. ITASK then clears the table entry so the request is not repeated. hrmiitisec 0^^ Time the transaction or task Is to be initiated in hours, minutes, s nd secoii d s . Figure 12-1. Format of a TTOT Table Entry 60459500 A 12-1 59 53 17 length 0 address length Length of subtransaction code table (in format allowing unpack function retrieve it). address Address of section in subtransaction table containing associated entries. to Figure 12-2. Format of a TRANT Table Entry 59 47 41 sc tname sc Subtransaction code. tname Tr a n s a c t i o n n a m e , l e f t - j u s t i fi e d , z e r o - fi l l e d . Figure 12-3. Format of a TRANS Table Entry Each group of entries relating to the same trans action is placed immediately following the TRANT entry for that code, although the subtransaction table is assembled elsewhere. This is an example of the TRANT and TRANS tables. TRANT BSS TRAN STRAN 02,TRNAME STRAN 03,TRANN A is the transaction code, 02 and 03 are the subtransaction codes, and TRNAME and TRANN are the respective transactions to be requested. A site may want to delete the TRANS table entry of STRAN (X.), XTASK In ITASK for security reasons. XTASK is described in more detail in section 11. ITASK DESCRIPTION E n t r i e s i n a l l I TA S K t a b l e s , a s w e l l a s t h e u s e r subroutines for TIMCNT entries in TTOT, should be inserted in the designated places within the program before assembly. TRANT and TRANS entries must be in alphabetical or numerical order according to 6-bit display codes. • If no transaction was associated with the t r a n s a c t i o n c o d e , t h e n I TA S K i n t e r prets the s t r i n g o f c h a r a c t e r s s t a r t i n g w i t h t h e fi r s t character input and terminating with the fi r s t n o n a l p h a n u m e r i c c h a r a c t e r a s a transaction name. If this string is null or more than seven characters long, an error m e s s a g e i s i s s u e d ; o t h e r w i s e , I TA S K w i l l attempt to schedule the named-transaction. If the named-transaction does not exist in the task library corresponding to the terminal application or in the system task l i b r a r y, a n e r r o r m e s s a g e i s i s s u e d v i a MSABT. I n i t i a l t e r m i n a l i n p u t w h i l e TA F i s i d l i n g d o w n ( f o l l o w i n g a n I D L E , TA F o r K . I D L E c o m m a n d ) i s processed as follows: • I f t h e i n p u t i s E X . L O G T, t h e l o g o u t i s processed normally. • I f t h e i n p u t i s a n y t h i n g e l s e , I TA S K i s s u e s the message TAF IDLING DOWN to the terminal and ceases without trying to schedule the requested transaction. TTOT entries must be accompanied by user-written subroutines to set up and call the task, as follows: I n i t i a l t e r m i n a l i n p u t , w h i l e TA F i s r u n n i n g n o r m a l l y, r e s u l t s i n e x e c u t i o n o f a t r a n s a c t i o n a s follows: • The system time is retrieved from the appropriate word in the communication block. TTOT is then searched for any entries that were to be run by that time. • If the first three characters of input are recognized by ITASK as a transaction code that is associated with a transaction, then ITASK attempts to schedule the transaction. Tr a n s a c t i o n c o d e s c a n b e a s s o c i a t e d w i t h transaction units through the STRAN macro, previously described. • I f s u c h a n e n t r y i s f o u n d , I TA S K j u m p s t o the user's subroutine to set up and call the task. This subroutine must set up the communication block required by the task that is to be run. It must perform a C A L LT S K w i t h o u t t h e c e a s e o p t i o n s e t t o ensure that control is returned to ITASK. 12-2 60459500 A CONDITIONS REQUIRING TAF-ORIGINATED TRANSACTIONS TAF-ORIGINATED TRANSACTIONS /0^** TAF recognizes certain conditions not normally noted or processed by user applications. Some of these conditions are: T h e c o n d i t i o n s t h a t r e q u i r e TA F - o r i g i n a t e d transactions and possible methods of processing are described here. Limited versions of routines needed to process these transactions are available in TTASK. To change the existing routines, ITASK must b e m o d i fi e d t o i n c l u d e t h e n e c e s s a r y c o d e o r c a l l the necessary tasks. It may be advisable to include short procedures as subroutines in ITASK, but long or frequently updated transactions should be maintained as separate programs apart from ITASK and m e r e l y c a l l e d f r o m t h e I TA S K s u b r o u t i n e . T h e recovery situations described in this subsection apply to sites not using TAF automatic recovery. • Exceeding a length of time as specified by an assembly option (TACTL). • K.IDLE command telling subsystem to idle down. the transaction • Tr a n s a c t i o n e x e c u t i v e r e c o v e r y. • Te r m i n a l l o g i n . • Network and terminal failures. W h e n a n y o f t h e s e c o n d i t i o n s o c c u r s , a TA F originated transaction may be processed. Code in common deck COMKSTC identifies the condition. ITASK e x a m i n e s t h e c o m m u n i c a t i o n b l o c k ( fi g u r e 1 2 - 4 ) t o determine the condition and jumps to a subroutine which sets up and calls the proper task or sequence o f t a s k s t o r e s p o n d p r o p e r l y t o t h e i d e n t i fi e d condition. Although the Control Data-supplied ITASK contains code to process each of the conditions, s i t e s m a y w a n t t o m o d i f y I TA S K a n d p r o v i d e transactions to suit their individual needs. Time Activation This might be processed by ITASK as follows: 1 . I TA S K r e t r i e v e s t h e s y s t e m t i m e f r o m t h e appropriate word in the communication block. 2 . T TA S K t h e n s e a r c h e s t h e T T O T f o r a n y transactions that are to be run at that time. To p r o v i d e T A F - o r i g i n a t e d t a s k s t h a t p r o p e r l y respond to the NAM conditions, the analyst should refer to the NAM/CCP 1 Reference Manual. 3 . I f s u c h a n e n t r y I s f o u n d , I TA S K j u m p s t o the user-supplied subroutine that must set up and call the next task for that transaction. This subroutine must set up the communication block required by the task that is to be run. A number of co mmo n d e cks a i d i n p ro ce ssi n g th e TAF-originated transactions as follows: • COMKSTC gives the values for the condition field of the communication block. • COMKNWF describes the fields for the NAM message word of the communication block. K.IDLE Console Operator Command • COMSNCD gives values to fields In the NAM message word. S a m e a s I D L E , TA F c o m m a n d . R e f e r t o I TA S K Description earlier in this section. 47 59 1118 WORDO ^ ^ v database 35 29 23 id user area WORD1 user name WORD 2 reserved WORD 3 20 17 15 13 11 5 0 sequence number i nft condition NAM message message from terminal, terminated by 12 bits of zero in last word of message; meaningless data follows » WORD 58 WORD 59 available to user t i WORD 67 WORD 68 2158 0 yr mo day hr min sec Figure 12-4. Communication Block for TAF-Originated Transactions 60459500 A 12-3 Terminal Login Terminal Connection Broken The application may want to prompt the terminal user, set application character type, or go through recovery procedures if the user has the recovery fi e l d s e t i n t h e u s e r a r e a o f t h e t e r m i n a l s t a t u s table. Upon terminal login, the NAM message word of the communication block (figure 12-4) contains the following information: A connection may be broken because a line has been disconnected. If a SEND with recall was active, the task issuing the SEND rather than ITASK is notified o f t h e e r r o r. I t m a y b e d e s i r a b l e f o r t h e a p p l i c a t i o n t o p r o c e s s t h e s e i n c o m p l e t e t r a n s a c t i o ns. TAF s e t s t h e r e c o v e r y fi e l d i n t h e t e r m i n a l s t a t u s ta b l e user area. The application can save terminal output on a data manager file and send it when the user logs in again. The outstanding block limit speci fi e d i n t h e l o c a l c o n fi g u r a t i o n fi l e d e t e r m i n e s h o w many messages must be saved. (Refer to the Network Products NAM 1 Network Definition Language Reference Manual.) S i g n i fi c a n c e Block size of terminal. 24 S i g n i fi e s a h a r d w i r e d t e r m i n a l i f set. 2 3 - 1 6 Te r m i n a l c l a s s . 15-8 Page width of terminal. 7-0 Page length of terminal. Terminal Break Conditions If some tasks perform SENDs without the recall flag set, breaks can occur because of the following. Network Normal Shutdown TAF monitors task activity on communication blocks generated by terminal input. When all tasks have been completed and no tasks are performing WAITINP r e q u e s t s , TA F s e n d s e n d c o n n e c t i o n s u p e r v i s o r y messages to NAM for each logged-in user and performs a NETOFF to end processing with the network. To initiate this condition, it may be desirable for ITASK to notify users of the pending shutdown and begin rejecting new transactions. • User break k e y s . • Output device not ready. Network Failure • Incorrectly formatted data. TAF sets the recovery field in the user area of the terminal status table for all logged-in users. All t a s k s p e r f o r m i n g WA I T I N P r e q u e s t s a r e s c h e d u l e d . The application, through ITASK, may want to begin data base recovery. For a user to resume processing after a terminal break, the following must occur. 1 . Te r m i n a l c o m m u n i c a t i o n w i t h N A M m u s t b e reestablished. When the break occurs, NAM places the supervisory message associated with the break in the NAM message word of t h e c o m m u n i c a t i o n b l o c k . To r e s t a r t terminal communications, TAF must send a reset supervisory message to NAM. The individual application need not provide this function. Upon the user task SEND request, TA F i s s u e s t h e r e s e t s u p e r v i s o r y m e s s a g e prior to honoring the SEND. 2. The user must resume interaction with the application. The user application must p r o v i d e t h i s b r e a k r e c o v e r y. T h e f o l l o w i n g description suggests one method. ITASK and any recovery tasks can communicate through the terminal status table user area. For instance, when ITASK initiates a t r a n s a c t i o n , i t c o u l d s e t a s e r i e s o f fi e l d s in the TST to indicate important events in the transaction. The recovery task could examine the fields to determine what events had occurred. Nonrecovery tasks could watch a recovery field in the TST and CEASE to allow the recovery task to proceed ir a q u i e t e n v i r o n m e n t . ( TA F s e t s t h e r e c o v e r y field in the TST before calling ITASK.) 12-4 Network Immediate Shutdown TAF performs a NETOFF and sets the recovery field in the user area of the terminal status table. The application may want to begin recovery by processing only transactions from batch input. Terminal Inactive NAM issues a terminal inactive supervisory message when it detects that 10 minutes have elapsed without message traffic over a connection. TAF passes the transaction sequence number of any running, task using that user name to ITASK. The application may want to log out the user after a period of time to reduce line connect costs. Logical Error One of the application's tasks may have set up an application block header or message block i n c o r r e c t l y. I f t h e t a s k p e r f o r m e d a S E N D r e q u e s t w i t h r e c a l l s e t , t h e t a s k , r a t h e r t h a n I TA S K , i s n o t i fi e d o f t h e e r r o r. 60459500 A />^«i\ J^*v Block Not Delivered TERMINAL TYPE AHEAD This occurs because of a system error. If the task performed a SEND request with recall set, the task, r a t h e r t h a n I TA S K , i s n o t i fi e d o f t h e e r r o r. B e f o r e scheduling ITASK, TAF sets the recovery field in the user area of the TST. It may be desirable for the application to recover by sending the lost block. The application block number of the block that was lost is returned in the NAM message word of the c o m m u n i c a t i o n b l o c k . Ta s k s m a y s p e c i f y a b l o c k number on the SEND or obtain the block number used b y TA F. R e s e n d i n g t h e l o s t b l o c k m a y c a u s e t h e block to be delivered out of sequence, if further blocks had been sent following the lost block. The network allows terminal operator type-ahead. In other words, the terminal operator can enter several transactions without waiting for the response from t h e fi r s t . T h e n e t w o r k i g n o r e s a l l t y p e - a h e a d w h e n the terminal operator enters a user break 1 or user break 2. Terminal Characteristic Change A NAM terminal characteristic supervisory message is s e n t t o I TA S K w h e n t h e t e r m i n a l o p e r a t o r h a s r e d e fi n e d t h e t e r m i n a l c l a s s , p a g e w i d t h , o r p a g e length. jfl^lfes^ Terminal Input Too Large The terminal operator sent a message longer than the m a x i m u m i n p u t m e s s a g e s i z e . TA F w i l l n o t h a v e journalized the input. USER STATUS The network allows a terminal user to make a status request by typing: ct (alpha)® c t T h e n e t w o r k c o n t r o l c h a r a c t e r. (alpha) Any alphabetic character. TA F w i l l r i g h t j u s t i f y t h e c h a r a c t e r I n w o r d 3 o f the communication block and Initiate ITASK. At this point a user-written routine In ITASK must take over t o p e r f o r m w h a t e v e r a c t i o n i s d e s i r e d . T h e I TA S K reason code will Indicate a user status message. J^* 60459500 C 12-5 0^, 0^^ CHARACTER SETS Ta b l e A - l l i s t s t h e c h a r a c t e r c o d e s f o r t h e A S C I I 63/64-character sets. Users should check with a site analyst to see which character set is being used. Table A-l. 7-Bit ASCII Code Standard Print 63/64-Character Set (Sheet 1 of 2) 7-Bit ASCII Code ASCII Character Octal Hexadecimal 072 101 102 103 104 105 106 107 110 U l 112 113 114 115 116 117 120 121 122 123 124 125 126 127 130 131 132 060 061 062 063 064 065 066 067 070 071 053 055 052 057 050 051 044 075 3A 41 42 43 44 45 46 47 48 49 4A 4B 4C 4D 4E 4F 50 51 52 53 54 55 56 57 58 59 5A 30 31 32 33 34 35 36 37 38 39 2B 2D 2A 2F 28 29 24 3D t In the 63/64-character set, a null character. Also, use fi l e s m a y c a u s e p r o b l e m s . is used in print and format 6-Bit Display Code (Octal) 001 01 02 03 04 05 06 07 10 11 12 13 14 15 16 17 20 21 22 23 24 25 26 27 30 31 32 33 34 35 36 37 40 41 42 43 44 45 46 47 50 51 52 53 54 this 6-bit display code represents of the colon in program and data This is particularly true when it statements. 0mK 60459500 A A-l Table A-l. 7-Bit ASCII Code Standard Print 63/64-Character Set (Sheet 2 of 2) 7-Bit ASCII Code ASCII Character (space) > i l ] X ii ! & 1 < > @ \ * Octal 040 054 056 043 133 135 045 042 137 tt 041 046 047 077 074 076 100 134 136 073 Hexadecimal 20 2C 2E 23 5B 5D 25 22 5F 21 26 27 3F 3C 3E 40 5C 5E 3B 6-Bit Display Code (Octal) 55 56 57 60 61 62 63t 64 65 66 67 70 71 72 73 74 75 76 77 /<^V tin the 63/64-character set, this 6-bit display code repre sents a colon (:), 7-bit ASCII code 072, 7-bit hexadecimal code 3A. ttOn TTY models having no underline, the back arrow (—) takes its place. /<^^\ A-2 60459500 A DIAGNOSTIC MESSAGES B This appendix contains an alphabetical listing of Lowercase letters are used within a message to m e s s a g e s w h i c h m a y b e i m p o r t a n t t o t h e T A F i d e n t i f y v a r i a b l e fi e l d s . A l l m e s s a g e s b e g i n n i n g p r o g r a m m e r . E a c h m e s s a g e i s f o l l o w e d b y a n w i t h l o w e r c a s e ( v a r i a b l e ) fi e l d s a r e l i s t e d e x p l a n a t i o n o f t h e m e s s a g e a n d / o r t h e c i r c u m s t a n c e s a l p h a b e t i c a l l y a c c o r d i n g t o t h e fi r s t n o n v a r i a b l e causing it to be issued, the recommended action, and field after the messages that begin with nonvariable t h e r o u t i n e w h i c h i s s u e d t h e m e s s a g e . fi e l d s . jpx /$^K 60459500 A B_l MESSAGE ACTION SIGNIFICANCE ROUTINE cmd ACCEPTED.. The network has accepted your terminal d e fi n i t i o n c o m m a n d c m d . None. CCP AFTER IMAGE ACCUMULATOR TABLE OVERFLOW. W h e n u p d a t i n g a fi l e , t h e a f t e r i m a g e a c c u m u l a t i o n t a b l e w a s fi l l e d . The size of the AAIT table in OMPEC must be increased. Inform the d a t a a d m i n i s t r a t o r. DMREC (AAI) AFTER IMAGE RECOVERY FILE IS FULL. T h e a c t i v e a f t e r i m a g e r e c o v e r y fi l e u s e d b y TA F i s f u l l . This file must be dumped by DMREC. TAF db AFTER IMAGE RECOVERY FILES UNAVAILABLE. TA F / C R M d a t a m a n a g e r t r i e d t o b r i n g u p a n a f t e r i m a g e r e c o v e r y fi l e f o r d a t a b a s e d b but failed. Possible reasons for the Correct problem with ARFs. AAMI .ysfesx failure: - ATTACH error - ARF header name is incorrect - ARF header status error - CIO error on ARF - Change in ARF block length - ARF full If the data base was down previously, it will remain down. If not down, it will now be idling down. AIP DEBUG OPTION TURNED OFF. Self-explanatory. None. TAF AIP DEBUG OPTION TURNED ON. Informative message. All network messages will be placed on trace file ZZZZZDN. None. TAF AIP TOO LARGE FOR LOADING. A fatal error occurred causing TAF to abort. Inform site analyst. TWFA must be increased in deck COMKTAF. TAF filename ALLOCATED. Informative message. None. DMREC APPLICATION ERROR - NO TERMINAL OUTPUT. A task error. A transaction has run without either an error message or a SEND being sent to the originating terminal. Correct task or inform data base administrator. MSABT APPLICATION FAILED - applnam An application has stopped without making a request to NAM to terminate. Restart application and/or contact central software support, analyst. NVF APPLICATION NETTED OFF - applnam Application applnam has requested termination of network access. None. NVF APPLICATION NETTED ON - applnam An application has successfully requested and attained network access. None. NVF ARF BLOCK SIZE IS LARGER THAN BUFFER. The maximum block length field in the header record for an ARF is larger than the maximum block length (installation parameter) allocated by TAF/CRM data manager. The file must be dumped using DMREC and preallocated. ARF DUMP TAPE HEADER ERROR. No header found on ARF tape. Use alternate tape if available. DMREC ARF ENTRY TABLE OVERFLOW Too many recoverable file names exist on this ARF. Increase the size of the TLOG table with installation parameter TLOGL. AAMI ARF FILE HEADER ERROR. No header was found on the ARF file. Down the data base, dump the data base, purge the old ARF, and create a new one. DMREC ARF HEADER ERROR. No ARF header on what is supposed to be an ARF. Check ARF for validity, inform data a d m i n i s t r a t o r. OMREC ARF HEADER STATUS (3) POSSIBLE ERROR. ARF header status shows a possible error condition. Inform data a d m i n i s t r a t o r. DMREC ARF ORDINAL MUST BE 01 OR 02. ARFs can have only 01 or 02 as an ordinal. Correct directive name (ARF/BRF). DMREC ARITHMETIC OR OTHER SOFTWARE ERROR IN TASK. A task error. Hardware or the system detected a software error in the task. Correct task or inform data base administrator. MSA8T ATTACH ERROR ON - filename. The transaction executive cannot attach the file filename under present conditions. This usually implies that the file does not exist or modify permission has not been given to the TAF user name. Correct error and reinitialize executive, or inform the data a d m i n i s t r a t o r. TAF • B-2 60459500 C # ROUTINE ATTACH ERROR ON PF xxxxxxx. When attempting to attach a permanent file xxxxxxx, an error was encountered. Check for valid directive file name and presence of a direct access permanent file by that name. DMREC ATTACH MODE MUST BE W, M, R, OR RM. The mode parameter on the CYBER Record Manager (CRM) statement must be one of the specified values. Correct the mode parameter on the CRM statement or inform the data administrator. TAF n.nnn AVERAGE ACTIVE SUBCONTROL POINTS. n.nnn is the average number of simul taneously active subcontrol points when TAF is not rolled out. An active subcontrol point is one which is in recall, is waiting to use the CPU, or is currently assigned the CPU. The sampling rate is once per second. None. TAF n.nnn AVERAGE OUTSTANDING CDCS REQUESTS. n.nnn is the average number of out standing (uncompleted) systemThentrol t requests per second, r se The sampling rate is once per second. None. TAF BACKUP DIRECTORY - xxxxxxx HAS BEEN RECONSTRUCTED. No directory file for the specified data base. A new directory was generated from the information on the xxJ file. Inform data a d m i n i s t r a t o r. DMREC BATCH CONCURRENCY DISABLED. TAF was brought up without BATCH concurrency enabled. CTBCON=Q). Ask data administrator to bring up TAF with BATCH concurrency ENABLED. BAAML BATCH RECOVERY ACTIVE ON DATA BASE Self-explanatory Wait for the completion of batch recovery, then reinitialize the transaction subsystem. TAF1 BEGIN CRM TASK RECOVERY. TAF/CRM has received a recovery indication from TAF. None. AAMI BFL - xxxxxxxB, MINIMUM REQUIRED = zzzzzzzB. Information on the actual value of the beginning field length and the minimum value TAF/CRN requires for the Common Memory Manager Buffer. None. AAMI BINARY RECORD WAS LESS THAN 64D WORDS LONG. The task binary file contains records in the wrong format. Ensure that a LOAD was performed after compilation of the tasks. LIBTASK BINARY RECORD WAS NEITHER ABSOLUTE NOR OVERLAY FORMAT. The task binary file contains records in the wrong format. Ensure that a LOAD was performed after compilation of the tasks. LIBTASK BLOCK BUFFER OVERFLOW. When attempting a record load operation, the data block buffer was found to be too small. Increase the length of the working buffer WBUF. Inform the data a d m i n i s t r a t o r. DMREC BLOCK BUFFER TOO SMALL. Tape block on ARF was too large for buffer. Increase size of buffer and try again. DMREC BLOCK LOAD ERROR. Block load of a file failed because no header was found on dump tape. Or, the targeted f1le or the tape does not match request file name. Load from previous dump tape. DMREC BLOCKAGE AMONG CM RESIDENT TASKS. The sum of initial field lengths for the CM resident tasks exceeds the minimum size of total task area. C o r r e c t e r r o r. BOTH AFTER IMAGE FILES ACTIVE. Both after image recovery files for a data base are active. The after image files must be dumped by DMREC, if not already dumped. Dump the after image r e c o v e r y fi l e s . TAF BRF PARAMETER TOO LARGE OR INVALID. The parameter on the BRF statement is nonnumeric, the value is greater than the installation parameter BMAX, or too many parameters were specified. Correct BRF statement or reassemble TAF and related decks with a larger value for BMAX (if possible). TAF BTASK - TAF AUTOMATIC RECOVERY NOT INSTALLED. A keyword specified in a TSTAT request requires TAF automatic recovery to be installed. Inform the data a d m i n i s t r a t o r. 8TASK BTASK - TASK LOGICAL ERROR. An unexpected error status was returned. Inform the data a d m i n i s t r a t o r. BTASK ^ JP*s ACTION SIGNIFICANCE MESSAGE 60459500 C 8-3 • MESSAGE SIGNIFICANCE ACTION ROUTINE BTASK - xxxxxxx TRANSACTION NOT RUNNABLE NOW. This occurs when an I/O error is detected and the data base cannot be recovered for the user xxxxxxx. Inform the data a d m i n i s t r a t o r. BTASK BTASK - USER NOT DEFINED IN NETWORK FILE. The user is not defined in the NETWORK file on a TSTAT request. Inform the data a d m i n i s t r a t o r. BTASK C. B. NOT AVAILABLE TO SCHEDULE CTASK. Communication block not available to schedule CTASK. Increase the number of communication blocks at initialization time using the K.MC8- command. TAF CALLRTN NESTED CALL LIMIT EXCEEDED. A task error. An attempt was made to nest CALLRTN requests more than 16 levels. Correct task or inform data base administrator. MSABT CANNOT DEFINE REFORMATTED FILE - filename. A reformat of the TAF COMMUNICATIONS recovery file was necessary, but when attempting to DEFINE the reformatted file (ZZCRFAi), an error occurred. Purge the existing file indicated by filename. TAFREC CDCS ABORTED PLEASE WAIT. A TAF transaction was using CDCS while CDCS aborted. The transaction will be rerun after CDCS comes back up. Operator can log off by typing in EX.LOGT, or wait for CDCS. ITASK CDCS CONNECTION ESTABLISHED. Informative message. The connection between TAF and CDCS has been established. None. TAF CDCS INVOKE FAILURE. CDCS files are not available. Inform site analyst or d a t a a d m i n i s t r a t o r. T h e transaction should be rerun after the problem i s fi x e d . MSABT CDCS NOT AVAILABLE. Your TAF transaction attempted to use CDCS when it was not present in the system, CDCS aborted while your transaction was waiting for completion of a CDCS request (SSC), or CDCS aborted while your transaction was rolled out. Inform data a d m i n i s t r a t o r. MSA8T CDCS REQUESTED ABORT. TAF aborted the TAF transaction as a result of a request by CDCS. The detailed error message returned by CDCS is available in the JOURO file and will be sent to the terminal. Inform data a d m i n i s t r a t o r. MSABT CHANGED TLD DETECTED - filename, username. An unrecognizable library directory format was encountered during a library directory update attempt. Inform site analyst. TAF CIO ERROR ON RECOVERY FILE A CIO error was encountered while trying to position the ARF or BRF correctly. Reinitialize the transaction subsystem or inform the site analyst. TAF1 *CMM* ERROR. A *CMM* error occurred. Memory cannot be granted to load *OPEN* routine. Inform data base a d m i n i s t r a t o r. AAMI CMMBFL IS NOT LARGE ENOUGH. The size of the beginning field length (8FL> for the Common Memory Manager Buffer is not large enough to contain CMMTFL and CKMCAP and the user's FIT-S and FSTT-S. Data base administrator can either 1) Increase the size of CMMBFL, or 2) decrease the size of CMMTFL, or 3) decrease the size of CMMCAP. TAF CONFLICTING LIBTASK OPTIONS - p1,p2. The user specified an incorrect combination of LIBTASK command options. Possible incorrect combinations of p1 and p2 are: The user must choose either p1 or p2. For the P=0,-N combination, the user must specify N if no old task library (P=0) exists. LIBTASK - CR,PR - CR,TT - PR,TT - T T, N Another possible incorrect combination gives P=0,-N for p1,p2. This means that the user specified P=0 but did not specify N. /*^5§k U s e r s p e c i fi e d T T o p t i o n w h e n t a s k l i b r a r y w a s n o t a t t a c h e d b y TA F. CONTROL CARD ARGUMENT ERRORS. Errors exist in the parameters on the LIBTASK command. Correct and rerun. LIBTASK CRF HEADER ERROR - filename. I/O errors or logical errors were encountered in the header record of the n a m e d C R F. T h e fi l e i s u n u s a b l e , fi l e n a m e F i l e n a m e I n i t i a l i z e t h e fi l e using the K.INT initial K display command. TAFREC • B-4 / ? i ^ \ 60459500 C ACTION SIGNIFICANCE MESSAGE ROUTINE CRF RECOVERY/INITIAUZATION ABORTED. Informative message. T h e a c t i o n d e p e n d s o n TA F R E C the message preceding this one in the dayfile. CRF RECOVERY/INITIALIZATION COMPLETE. Informative message. None. CRF RECOVERY UNIT ERROR - filename. I/O errors or logical errors were encountered in a run unit of the named CRF. A t t e m p t t o r e c o v e r a n y TA F R E C g o o d i n f o r m a t i o n u s i n g TA F the K.ERO=YES initial K display command, or i n i t i a l i z e t h e fi l e using the K.INT initial K display command. CRM(...parameter-list...) This is a copy of a CRM statement that is in error. A subsequent message follows. Inform the a d m i n i s t r a t o r. CRM DATA MANAGER NOT LOADED. An AAM request for CRM was issued by a task and the CRM Data Manager was not loaded into TAF at initialization time. Check the DMS statements MSABT in the TCF which specify which data managers are to be loaded by TAF. For CRM users, you need a DMS statement such as: DMS,CRM,ON,xx,xx,...,xx TA F R E C data TA F where xx = any data base i d e n t i fi e r . CRM DATA MANAGER SUCCESSFULLY LOAOED. Self-explanatory. None. TAF CRM ERROR nnnB IGNORED ON OPEN OF filenara. A non-fatal CRM error, nnnB, was returned to the TAF/CRM data manager while issuing CRM requests associated with opening a recoverable CRM file, filenam, for the fi r s t t i m e . T h i s e r r o r i s i g n o r e d . Informative. AAMI CRM ERROR ENCOUNTERED. A CRM error occurred while processing the directory. The CRM error is either an incorrect key or end of file when this is the only output message. Inform data a d m i n i s t r a t o r. DMREC CRM ERROR xxx IN UPDATE PROCESSOR. A CRM error has occurred during the application of the after image to a data fi l e . Note which error has occurred and locate references to the error in the CRN/AAM Reference Manual for appropriate action. DMREC TAF CRM ERROR IN ZZdbOIR (GET). A CRM error was encountered when trying to retrieve a VSN record from the directory on a fi l e l o a d . Inform data a d m i n i s t r a t o r. DMREC CRM TASK RECOVERY IMPOSSIBLE. Recovery is not possible when the recovery file structure is found to be inconsistent with TAF/CRM tables and parameters specified on xxJ files. The last reported BRF must be corrected or reallocated. AAMI CRMTASK - DATA BASE DOWNED BY OPERATOR. DMREC notified TAF that the data base was recovered. But AAMI was not able to access it because it had been downed by the o p e r a t o r. Only an operator may up the data base that he/she downed. It cannot be upped a u t o m a t i c a l l y. CRMTASK CRMTASK - DATA BASE/FILE BEING IDLED. AAMI will not process any requests on an i d l e d a t a b a s e / fi l e . After the cause of the data base/file being idle has been fixed, the operator must bring it up. CRMTASK CRMTASK - DATA BASE/FILE CANNOT BE UPPED. AAMI was not able to bring up the data base or fi le. Oata administrator must investigate the cause of AAMI inability to bring file/data base up. CRMTASK CRMTASK - DATA BASE/FILE NAME UNKNOWN. DMREC request had an incorrect data base or file name. Call the data administrator to investigate the cause. CRMTASK CRMTASK - INCORRECT REQUEST. CRMTASK was not called correctly by DMREC. There may be a transaction in the system attempting to use functions reserved for DMREC. CRMTASK CRMTASK - INCORRECT REQUEST FORMAT. AAMI rejected this request. An analyst should investigate the reason for this rejection. CRMTASK ^ ^ N 60459500 C B-5 • MESSAGE SIGNIFICANCE ACTION ROUTINE CRMTASK - INCORRECT TT SEQUENCE NUMBER. AAMI does not recognize the TT sequence number returned by DMREC. Call the analyst to investigate the discrepancy between DMREC and TAF. CRMTASK - NOT ALL DATA BASE FILES UPPED. DMREC recovered the data base but AAMI was unable to attach/open all of data base fi l e s . Data administrator should investigate why only some of the data base files came up. CRMTASK TIMEOUT. A terminal job timed out while waiting for the next command. A valid command must be CRMTASK entered within the default time of 480 seconds. CRT - CIO ERROR. A CIO error was generated when creating a l o g fi l e . Purge the log file and try again (check file name). DMREC CSM - INCORRECT COMMUNICATION FUNCTION. An incorrect or unrecognizable request was received by the transaction executive from t h e C P U m o n i t o r. Inform site analyst. TAF CTASK - DATA BASE OR FILE DOWN. T h e d a t a b a s e , TA F / C R M , o r fi l e i s d o w n o n an RSTDBI request. Inform the data a d m i n i s t r a t o r. CTASK CTASK - DATA BASE OR FILE IDLE. T h e d a t a b a s e , TA F / C R M , o r fi l e i s i d l e o n an RSTDBI request. Inform the data a d m i n i s t r a t o r. CTASK CTASK - FILE IS NOT INSTALLED. T h e d a t a b a s e o r fi l e i s n o t a v a i l a b l e i n t h e x x J fi l e o n a C R M S TAT r e q u e s t . Inform the data a d m i n i s t r a t o r. CTASK CTASK - INCORRECT RECOVERY CASE. The recovery case selected for processing was incorrect. Inform the data a d m i n i s t r a t o r. CTASK CTASK - NO CRM RECOVERY FILES FOR DATA BASE. T h e r e i s n o r e c o v e r y fi l e a s s i g n e d t o t h e data base on an RSTDBI request. Inform the data a d m i n i s t r a t o r. CTASK CTASK SYSTEM IDENTIFIER UNKNOWN. T h e o l d s y s t e m i d e n t i fi e r i s u n k n o w n w h e n issuing a TINVOKE request. Inform the data a d m i n i s t r a t o r. CTASK CTASK - TABLE AREA NOT LARGE ENOUGH. Ta k e t a b l e a r e a s u p p l i e d b y C TA S K f o r a CMRSTAT request is not large enough. Inform the data a d m i n i s t r a t o r. CTASK CTASK - TASK LOGICAL ERROR. An unexpected error status was returned. Inform the data a d m i n i s t r a t o r. CTASK CTASK - TRANSACTION NOT RERUNABLE. T h e TA F t r a n s a c t i o n w a s n o t r e r u n n a b l e a n d a RERUN was attempted. Inform the data a d m i n i s t r a t o r. CTASK CTASK - TRMREC ERROR. One of the following occurred: Inform the data a d m i n i s t r a t o r. CTASK - There was no outstanding DBEGIN request. - An error was encountered on a data base or recovery file. - The data base or TAF/CRM is down. CRMTASK C R M TA S K CTASK - USER NOT DEFINED IN NETWORK FILE. The user specified on a TSTAT, WSTAT, or RERUN request is not defined in the NETWORK fi l e . Inform the data a d m i n i s t r a t o r. CTASK CYCLE NUMBER IS OUTSIDE LIMITS. The specified cycle number is outside the limits set by the installation parameter (CYUCM). Check the maximum cycle number and rerun. DMREC (CYC) DATA BASE/FILE ALREADY DOWN OR IDLE. CRMTASK issued a DBDOWN request to AAMI, but the data base or file name was already down or idle. Inform data base a d m i n i s t r a t o r. CRMTASK DATA BASE/FILE CANNOT BE UPPED. CRMTASK issued a DBUP request but AAMI was not able to bring up the data base or file name. Inform data base a d m i n i s t r a t o r. CRMTASK OATA BASE/FILE NAME UNKNOWN. CRMTASK - issued a CRMSTAT, DBUP, or DBDOWN request but the data base or file name was not found. Inform data base a d m i n i s t r a t o r. CRMTASK DATA BASE NAME IN CRM FILE NAME DOES NOT MATCH xxJ. The two-character data base name from the file name on the CRM statement does not m a t c h t h e x x J h e a d e r. Correct the CRM statement and try again. DMREC DATA BASE NAME OR FILE NAME MISSING. N o fi l e n a m e o r d a t a b a s e n a m e o n d i r e c t i v e . Include file name or data base name on directive. DMREC DATA BASE NAME OR FILE NAME(S) BOTH SPECIFIED. Self-explanatory. Eliminate file name or data base name from the directive. DMREC • 8-6 60459500 C ACTION SIGNIFICANCE MESSAGE ROUTINE DATA BASE NOT IN EOT Self-explanatory. Reinitialize the transaction executive, or inform the site analyst. TAF1 DATA BLOCK BUFFER OVERFLOW. ARF tape block size is too large for buffer allocated for it. Inform the data administrator and lengthen buffer WBUF. DMREC DATA MANAGER USAGE NOT SELECTED. A recoverable TAF transaction tried to use either the CDCS or CRM Data Managers and the usage of the data manager was not selected on the LIBTASK input which declared the named-transaction to TAF. Respecify the characteristics of the named-transaction via the LIBTASK directive, or design the transaction not to use CDCS or CRM Data Managers. MSABT DB - NAME MUST NOT START WITH THE LETTER Z. A data base name was found which starts with the letter Z. These are reserved names. Change the data base name to one not beginning with Z. If the name appears on an NCTF entry, contact the user and request a new i d e n t i fi e r. I f t h e n a m e appears on the TCF, make the change on the applicable DMS statement or inform the data a d m i n i s t r a t o r. TAFREC An error in defining PRU size or In trying to define the log file was encountered on a create directive. Correct PRU length on create directive. DMREC *DEL* The system has deleted the last line of input. This occurred when the terminal operator entered the cancel character (CN) followed by the end of line/end of block t e r m i n a t o r. None. CCP DELIMITER WAS NOT RECOGNIZED. An incorrect delimiter or an unrecognizable delimiter was encountered on a directive. Check directive format and rerun. DMREC DIRECTIVE CONTAINS AN INCORRECT DATE/TIME. A directive contains an unrecognizable date/time. Correct the directive and rerun. DMREC DIRECTIVE FORMAT ERROR. Error in one or more directive parameter formats. Correct directive and rerun. DMREC DIRECTIVE KEYWORD NOT VALID. The wrong delimiter on the directive parameter was used, or the directive keyword is not valid. Correct directive and rerun. DMREC (SPR) DIRECTIVE NOT PRECEDED BY EDIT DIRECTIVE. This directive must be preceded by an edit directive. Include an edit directive. DMREC DIRECTORY HEADER FROM THE COPY. Informative message. None. OMREC OIRECTORY IS FULL-NO MORE ADDITIONS ALLOWED. The maximum length of the task library directory has been reached. LIBTASK must be reassembled to allow for a l a r g e r d i r e c t o r y. LIBTASK DIRECTORY UNUSABLE. Attempt to reconstruct the directory failed. Check the output for the detailed error message. OMREC DISPLAY DUMP NOT ALLOWED TO TERMINAL. A 6-bit display code dump to a terminal is not allowed. Specify the 0 option on the KTSDMP command if a dump to a terminal is desired. KTSDMP DMREC COMPLETE. Informative message. The output f1le may contain other informative messages and should be reviewed. None. DMREC DMREC FAILED - xxxxxxx zz. The DMREC job submitted by TAF failed, xxxxxxx is the directive being processed, and zz is the data base name. Notify the data base administrator and correct as directed. DMREC DMREC TAPE LABEL ERROR. No tape header was found on ARF to be used for an update function. Check for correct ARF tape. Use alternate ARF tape if available. DMREC (UPD) DOWNED BRF TABLE OVERFLOW. Table of downed BRFs has overflowed. Inform data a d m i n i s t r a t o r. DMREC (BRT) /^^ DEFINE ERROR ON FILE. J^"v 60459500 C 8-7 • MESSAGE DSP ERROR ec RETURNED ON J08 ROUTE. SIGNIFICANCE ACTION ROUTINE DSP has informed the transaction subsystem that an error was detected in routing a job for task dump processing, ec is the DSP error code. Inform site analyst. DSP ERROR ec RETURNED ON TASK SUBMIT, DSP has informed the transaction subsystem that an error other than a job or user statement error was detected, ec is the DSP error code. Inform site analyst, TAF DUMP TAPE SPECIFIES NON-STANDARD COMPRESSION. When trying to reload a record formatted dump tape, the compression mode was nonstandard. Try loading from a previous dump tape and inform the data a d m i n i s t r a t o r. DMREC DUMP WILL START OVER DMREC attempted to execute the DUMP directive but encountered errors. None. DMREC cmd DUPLICATE CHARACTER The value you specified in the terminal definition command cmd conflicts with another terminal definition. Try another value. CCP DUPLICATE DATA BASE IN TCF - xx. Active data base identifier, xx, in the TCF is not unique. Fix TCF so that xx appears only once among active (ON) DMS statements. TAF DUPLICATE DUMP ENTRY ON ADD. When trying to add a file dump entry to the directory with an add directive, a duplicate entry was found. List the directory for visual check and try again. DMREC DUPLICATE ENTRY ON ADD. When trying to modify the directory a duplicate of the entry was found. List the directory and check for the needed e n t r y. DMREC DUPLICATE PARAMETER. A duplicate VSN or duplicate file name was detected on a single directive. Correct directive and rerun. DMREC DUPLICATE VSN ENTRY ON ADD. When trying to add a VSN entry to the directory with an add directive, a duplicate entry was found. List the directory for visual check and try again. DMREC DXB CONVERSION ERROR ON TRANSACTION SEQUENCE NUMBER. An error occurred while converting the number in the table entry to binary. Inform data a d m i n i s t r a t o r. DMREC ECS READ ERROR. S e l f - e x p l a n a t o r y. Inform customer engineer. TAF ECS TASK tasknsme NOW MS RESIDENT. Task taskname could not be loaded into extended memory because of insufficient storage. It Is loaded Into mass storage. If task must be resident in extended memory, more extended memory space must be allocated for the TAF user name. Refer to the NOS 2 Installation Handbook. TAF ECS WRITE PARITY ERROR ENCOUNTERED. Self-explanatory. Inform customer engineer. TAF EDITING COMPLETE. Informative message. None. OMREC END OF FILE REACHED. Informative message. None. DMREC END OF VSN TABLE. DMREC has reached the end of the VSN table on a LOAD or RECOVER process. Check the dayfile for possible tape errors which may cause this condition. DMREC /-rSi§\ ENTER NEXT TRANSACTION. Option C was selected to allow the entry of the next transaction. The previous recoverable information is lost. Enter next transaction. RTASK ERROR IN ACCOUNT/USER CARD ARGUMENT. The charge or user statement in the xxJ fi l e i s i n e r r o r. Correct the charge/user statement and try again. DMREC ERROR IN ADD/DELETE VSN. The number of added or deleted entries does not match the number of active files. Check edit directives and list the directory for a visual check. DMREC ERROR IN 8RF PARAMETER IN xxJ FILE. The parameter on the BRF statement is non-numeric, or the value exceeds the installation parameter BMAX. Correct value parameter. DMREC ERROR IN BUILDING OIRECTORY ENTRIES. An error was encountered when DMREC attempted to add or update a directory record. Inform data a d m i n i s t r a t o r, c o r r e c t as directed and rerun. DMREC (B8E) ERROR IN BUILDING RECOVERY TABLES. An error was encountered while attempting to retrieve a record from the directory fi l e . Try an update from an e a r l i e r fi l e a n d i n f o r m the data administrator. DMREC (BRT) • 8-8 TAF S^§\ 60459500 C ^eSSRv MESSAGE SIGNIFICANCE ACTION ROUTINE DMREC GRM ERROR IN BUILDING *RMKDEF* FILE. DMREC is trying to build a file of RMKDEF statements to be used in a subsequent MIPGEN run. An error has occurred in building the RMKDEF file. Make sure that RMKDEF statements are correctly formatted in the XXJ file; then rerun the program. ERROR IN CRM CARD ARGUMENTS. The CRM statement in the xxJ file is in e r r o r. Correct the CRM statement and try again. DMREC ERROR IN CRM -PUT- (RECORD LOAD). An error was encountered while attempting to execute a CRM put onto the data file. Try to load from previous dump tape. OMREC ERROR IN EDIT PROCESSING. Editing processor has encountered an error in trying to execute the directive. Check the edit directive parameters and inform data administrator. DMREC ERROR IN IXN CARD ARGUMENTS. The IXN statement in the xxJ file is in e r r o r. Correct the IXN statement and try again. DMREC ERROR IN LIST PROCESSING. Errors in generating list as described on directive. C h e c k l i s t d i r e c ti v e fo r accuracy and retry. DMREC ERROR IN LOADING AAMI. The loader encountered errors while loading the TAF CRM AAM interface (AAMI). The site analyst should consult the CYBER Loader Reference Manual (listed in the preface). TAF ERROR IN LOADING HASH CODE filename. The loader encountered errors while loading the hashing routine code that is on file filename. The site analyst should consult the CYBER Loader Reference Manual (listed in the preface). ERROR IN LOADING NAM. The library file NETIO does not contain the entry points required for TAF. The site analyst should consult the CYBER Loader Reference Manual (listed in the preface). TAF ERROR IN LOADING TOTAL. The loader encountered errors while loading Total and the data base descriptor modules (DBMODs). The site analyst should consult the CYBER Loader Reference Manual (listed in the preface). TAF ERROR IN READING TASKLIB-filename. Error occurred during transaction executive initialization or extended memory-resident task loading. File specified as task library was incorrectly formatted; therefore, it could not be read or loaded into extended memory correctly. Inform site analyst. TAF ERROR IN RECORD DUMP. During a record dump, DMREC 1s unable to recognize the first record on the dump file as an FSTT. Check structure of file to be dumped for IS, DA or AK type and try again. DMREC ERROR IN RETRIEVING VSN. No VSN has been found in the directory that s a t i s fi e s t h e d i r e c t i v e . Check directive parameters. If correct, inform data a d m i n i s t r a t o r. DMREC ERROR IN SUBMITTED FILE. An incorrect parameter has been detected on a SUBMT call from a task. Correct task or inform data base administrator. MSABT ERROR ON xxJ FILE ARGUMENTS. The xxJ file contains statements in error, which causes the transaction subsystem to abort. Examine xxJ file. Inform TAF data a d m i n i s t r a t o r. TAF ERROR STATUS nnnB ON BACKUP DIRECTORY. CRM error has occurred on directory file. Inform site analyst. OMREC (FER) ERROR(S) ENCOUNTERED IN OMREC PROCESSING. Fatal errors were encountered during processing. Check the output file for the detailed error message. OMREC FATAL CIO ERROR STATUS. A TAF CIO operation returned a fatal error status which aborted TAF. Inform site analyst. TAF FIELD LENGTH EXCEEOED FOR CMM. TAF does not have enough field length to allocate the space potentially required by CMM. Increase TAF i n i t i a l i z a t i o n fi e l d length. TAF FIELD LENGTH EXCEEDED FOR LOCKS. TAF does not have enough initialization field length for allocating lock tables. Decrease the locks parameter on the CRM statement, increase the TA F i n i t i a l i z a t i o n fi e l d length, or inform site analyst. 60459500 C B-9 • MESSAGE FIELD LENGTH EXCEEDED FOR RECORD. SIGNIFICANCE ACTION ROUTINE TAF does not have enough field length to allocate the space for the record buffer. D e c r e a s e t h e r e c o r d s i z e TA F specified in the xxJ file or increase the TAF i n i t i a l i z a t i o n fi e l d length. FIELD LENGTH EXCEEDED FOR USERS. TAF does not have enough initialization fi e l d l e n g t h f o r a l l o c a t i n g fi l e c o n t r o l tables. Decrease the users parameter on the CRM statement, increase the TA F i n i t i a l i z a t i o n fi e l d length, or inform site analyst. FILE ATTACH/DEFINE ERROR An error was detected in attaching or defining an ARF or BRF. C h e c k t h e A R F s a n d t h e TA F 1 BRFs for attach mode and processing mode and correct if necessary. xxfilen - FILE, ERROR ON LOCK FUNCTION. An error occurred while attempting to lock the specified file. Possible causes are: - No free file lock table entry (TKOK). - Another task has file locked. - Another task has record locked. Rerun the job at another AAMI time. If problem persists, Increase the number of lock table entries. xxfilen - FILE, ERROR ON OPEN FUNCTION. An error occurred while attempting to open the specified file. Possible causes are: - No free file control table entry (TFCB). - *CRM* error on OPEN function. - Incorrect key length. - Incorrect record length. Correct error. If not possible, contact site analyst. FILE xxJ NOT FOUND. Transaction subsystem aborts. Data base in TCF file has no xxJ file, or a PFM error occurred. Inform TA F data administrator or site analyst. FILE NAME CONFLICT. The input file name specified on the KTSDMP command is the same as the output f1le name s p e c i fi e d . Correct error and rerun. KTSDMP FILE NAME MISMATCH ON TAPE HEADER RECORD. File name on ARF tape and attached ARF don't match. C h e c k fi l e n a m e o n A R F D M R E C tape being used. FILE NAME MUST BE 2-7 CHARACTERS. The xxpfni parameter on the CRM statement must be two to seven characters, the first two (xx) being the data base name. Correct the xxpfni parameter on the CRM statement or inform data administrator. FILE NOT ATTACHED - filename. Either the P or the N parameter file was not attached when the DA option was used; filename 1s the permanent file name. E n s u r e t h a t t h e fi l e i s L I B T A S K defined or attached prior to entering the LIBTASK statement. FILE hash NOT FOUND. The Indirect file named hash containing the binary code of the hashing routine was not found under the username parameter on the USER statement in the xxJ file or a PFM error occurred. E n s u r e t h a t fi l e h a s h i s T A F saved under the username parameter or inform data a d m i n i s t r a t o r. C o n s u l t the CYBER Loader Reference Manual (listed in the preface). FILE ORGANIZATION IS NOT IS, DA OR AK. The file organization parameter on the CRM statement was not specified as either IS, DA, or AK. Correct the CRM statement and try again. DMREC FILE TCF EMPTY. An empty TCF exists under the TAF user name. Place the necessary information on TCF. TAF FILE TCF NOT FOUND. The TCF was not found under the user name of the Transaction Facility. Create a TCF f1le under the TAF user name. FILE TYPE MUST BE AK, DA, OR IS. The type parameter on the CRM statement must be AK (actual key), IS (indexed sequential) or DA (direct access). Correct the type parameter on the CRM statement or inform the data administrator. TAF FILE TYPE NOT ARF OR BRF. On a create function a file name was used that does not conform to the ARF/BRF naming conventions. Check file name on create directive. OMREC FL TOO LARGE- nnnnnnB,taskname,tasklibrary. The initial load field length, nnnnnnB, for task taskname on task library taskiibrary exceeds the minimum size of the transient task area (potential space available to contain transient tasks). Thus a situation could arise in which it would not be possible to load the task. Correct error. • 8-10 /^k TA F AAMI TA F /^sSSs TA F 60459500 /*-%m>%\ C ) MESSAGE ACTION ROUTINE TAF FORMAT ERROR IN THE NETWORK DESCRIPTION FILE. During transaction executive initialization, one or more errors were found to exist in the network description fi l e . Inform site analyst. FSTT READ ERROR. No FSTT found on a record load dump tape. Load from previous tape. DMREC FWA .GE. LWA+1. There is a logical error in the structure of the input file which implies that the first word address is greater than or equal to the last word address plus one. Inform data base administra KTSDMP GET ERROR ON PF xxxxxxx. No indirect access permanent file, for use as an own code file, has been found. Check for the presence of the file and try again. DMREC HOST AVAILABLE CONTROL CHARACTERShar display ENTER INPUT TO CONNECT TO HOST Your selected host is available. display The host availability display (HAD), which appears if you have enabled it using the HD terminal definition command. char The network control character for your terminal. Enter any input to initiate your connection to the host. CCP HOST BUSY CONTROL CHARACTER=char display The host rejected your attempt to connect. display The host availability display (HAD), which only appears if you have enabled it using the HD terminal definition command. char The network control character for your terminal. Check the status of the hosts in your c o n fi g u r a t i o n . CCP ENTER char HD TO SEE HOST STATUS j0^z\ HOST CONNECTED disp l a y READY FOR INPUT CONTROL CHARACTER- char You are connected to the host. display The host availability display (HAD), which appears if you have enabled it using the HD terminal definition command. char The network control character for your terminal. Proceed with your login to the host. CCP HOST CONNECTED disp l a y CONTROL CHARACTERShar The network operator has disabled your terminal. No further input is possible, display The host availability display (HAD), which appears if you have enabled it using the HD terminal definition command, char The network control character for your terminal. None. CCP You are connected to the host. display The host availability display (HAD), which appears if you have enabled it using the HD terminal definition command. char The network control character for your terminal. Proceed with your login to the host. CCP You have been disconnected from the host. display The host availability display (HAD), which appears if you have enabled it using the HD terminal definition command. char The network control character for your terminal. None. CCP HOST DISCONNECTED CONTROL CHARACTERS har di s p l a y TERMINAL DISABLED 8Y NOP The network operator has disabled your terminal. No further input is possible, display The host availability display (HAD), which appears if you have enabled it using the HD terminal definition command, char The network control character for your terminal. None. CCP HOST NOT AVAILABLE. NAM is not communicating with the 255x communications processors. Either NAM was not initialized or has since failed. Initialize NAM if it was not initialized previously; inform site analyst if NAM was active but a malfunction occurred. TAF TERMINAL DISABLED BY NOP HOST CONNECTED display READY FOR INPUT CONTROL CHARACTERS char /gp«V HOST DISCONNECTED CONTROL CHARACTERShar display ENTER INPUT TO CONNECT TO HOST 0^* c SIGNIFICANCE 60459500 C B-11 • MESSAGE SIGNIFICANCE ACTION ROUTINE Yo u h a v e a t t e m p t e d a c o n n e c t i o n t o a h o s t that is not up. display The host availability display (HAD), which appears if you have enabled it using the HD terminal d e fi n i t i o n c o m m a n d , char The network control character for your terminal. Check the status of the hosts in your c o n fi g u r a t i o n . CCP IGNORE TABLE OVERFLOW, Ignore table, TTIG, is too small. Inform site analyst to enlarge TTIG table. OMREC xx ILLEGAL COMMAND The characters xx must be a terminal d e fi n i t i o n m n e m o n i c o r i n t e r a c t i v e s t a t u s command. Ensure the accuracy of your entry and retry. CCP ILLEGAL DATA BASE IN xxJ FILE. O n e o f t h e s t a t e m e n t s i n t h e x x J fi l e s p e c i fi e s a n i n c o r r e c t x x p a r a m e t e r a n d causes the transaction subsystem to abort. Examine xxJ files. Inform the TAF data a d m i n i s t r a t o r. TAF ILLEGAL FL REDUCTION. Ta s k r e q u e s t t o r e d u c e F L w o u l d c a u s e t h e last word address of the communication block to be outside the task FL. Inform data a d m i n i s t r a t o r. MSABT ILLEGAL JOURNAL FILE REQUEST. Either a task requested that an entry be m a d e o n a n u n d e fi n e d TA F j o u r n a l fi l e , o r the task attempted to make an entry longer t h a n 2 4 9 9 C M w o r d s o n a TA F j o u r n a l fi l e . Inform data base administra MSABT ILLEGAL KEY BEGINNING CHARACTER. The ke y o ff s e t p a r a m e t e r o n a n A K Y s t a t e m e n t i n t h e x x J fi l e , i s m i s s i n g o r incorrect. Correct AKY command. TAF (AKY) ILLEGAL KEY ORDINAL. The key ordinal parameter on the AKY statement is missing or incorrect. Correct AKY statement. TAF (AKY) ILLEGAL LIBTASK ATTEMPT - filename, username. The transaction executive validates all dynamic attempts to change the task library by comparing the user name of the requester against the list of data base user names. If it does not match, or if the library fi l e 1 s n o t a t t a c h e d b y TA F, t h e t r a n s a c t i o n e x e c u t i v e i s s u e s t h i s d a y fi l e message, where username is the user name of the incorrect attempt. Correct and reinitialize transaction executive. TAF ILLEGAL NUM8ER FOR LOCKS. The locks parameter on the CYBER Record M a n a g e r ( C R M ) s t a t e m e n t 1 s I n e r r o r. O n e of the following format conditions exists. - A n o n n u m e r i c c h a r a c t e r. - A character after a postradix of B or D. - An 8 or 9 with a postradix of B. Correct the locks parameter on the CRM statement or inform the analyst. TAF ILLEGAL NUMBER FOR USERS. The user's parameter on the CRM statement i s i n e r r o r. O n e o f t h e f o l l o w i n g f o r m a t conditions exists. - A n o n n u m e r i c c h a r a c t e r. - A character after a postradix of B or D. - An 8 or 9 with a postradix of B. Correct the user's parameter on the CRM statement or inform the data administrator. TAF ILLEGAL NUMBER OF ALTERNATE KEYS. The number of alternate keys on the IXN statement is missing or incorrect. Correct IXN statement. TAF (IXN) ILLEGAL PARAMETER IN RA+1 CALL. A t a s k e r r o r . T h e p a r a m e t e r s s p e c i fi e d i n a request from a task are either i n s u f fi c i e n t o r i n c o r r e c t . Correct task or inform data base administrator. MSABT ILLEGAL TASK NAME REQUESTED FOR SCHEDULING, The task requested was not found in the t a s k l i b r a r y d i r e c t o r y. Correct task or inform data base administrator. MSABT cmd ILLEGAL TERMINAL CLASS T h e v a l u e y o u s p e c i fi e d i n t h e t e r m i n a l d e fi n i t i o n c o m m a n d c m d i s n o t v a l i d f o r your terminal. Choose an appropriate value (refer to appendix J). CCP ILLEGAL TERMINAL INPUT REQUEST. A t a s k e r r o r. A W A I T I N P r e q u e s t w a s i s s u e d by a memory resident task or by a task that did not originate from a terminal. Correct task or inform data base administrator. MSABT cmd ILLEGAL VALUE Yo u s p e c i fi e d a n i n v a l i d v a l u e i n t h e t e r m i n a l d e fi n i t i o n c o m m a n d c m d . Choose a valid value (refer to appendix J). CCP INACTIVE TASK REQUESTED. An attempt was made to schedule a task which has been turned off with a K.OFFTASK command or a LIBTASK directive. Correct condition or inform site analyst. OFFTASK INCOMPLETE PARAMETER. A parameter on a DMREC directive was not c o m p l e t e d c o r r e c t l y. Correct the parameter on the faulty directive. DMREC HOST UNAVAILABLE CONTROL CHARACTERShar display ENTER char HD TO SEE HOST STATUS • B-12 60459500 C MESSAGE ACTION SIGNIFICANCE ROUTINE One of the following errors occurred: 1. A command was entered other than what was on the menu. 2 . A t e r m i n a l C R M S TAT r e q u e s t d i d r o t request its own data base. Ensure that the command is correct. If problem persists, inform the site analyst. CRMTASK INCORRECT COMMON MEMORY MANAGER REQUEST. Memory request with reserved bits in the parameter block set incorrectly. Do not set reserved bits. MSABT INCORRECT FAMILY NAME IN EOT. Self-explanatory. Reinitialize the transaction executive or inform the site analyst. TAF1 INCORRECT FWA FOR LOAD. The FWA of the load was not equal to 1118. Task binaries must be in absolute format. Ensure that the correct load procedure is performed. LIBTASK INCORRECT POSITION IN THE DIRECTORY. The directory structure is inconsistent or positioning is incorrect. Inform data a d m i n i s t r a t o r. DMREC (GPL) INCORRECT SU8-TRANSACTI0N CODE - INITIAL TASK. There is an unrecognizable subtransaction code in the terminal input. Correct terminal input or inform data base a d m i n i s t r a t o r. MSABT INCORRECT TOTAL INTERLOCK REQUEST. One of the following. Inform data base a d m i n i s t r a t o r. MSABT Correct task or inform data base administrator. MSABT INCORRECT COMMANO. 3. A terminal origin job tried to request the menu. 4. Unpack errors on the terminal message. - A task that is not on the system task library issued a CHKON request. - A task issued a CHKON request with a CHKON request already in effect. - A task issued a CHKOFF request without fi r s t i s s u i n g a C H K O N r e q u e s t . - A task that issued a CHKOFF request had a sequence number different from a task that issued a CHKON request. INCORRECT WORD COUNT ON TERMINAL OUTPUT. One or more of the following task errors occurred on a SEND request. - The word count was less than or equal to zero. - There was an attempt to use SEND MAXWS or more CM words of information in one SEND; MAXWS is an installation option. - There was an attempt to use SEND MAXTO or more CM words of information by one task through a series of SEND requests. MAXTO is an Installation option. INITIAL TASK NOT IN TASK LI8RARY DIRECTORY. The task library file does not contain the i n i t i a l t a s k ( I TA S K ) . Inform site analyst. TAF INITIALIZATION OPTIONS. This message precedes messages indicating the values of the initial K display options e i t h e r d u r i n g i n i t i a l i z a t i o n o r r e c o v e r y. None. TAF INPUT DISCARDED The network has discarded the last input from your terminal. May be caused by entering a user break or interactive status command while awaiting a response to a previous user break or interactive status command. Reenter your last input. CCP INPUT DISCAROED The system has discarded user input. Reenter input. TAF1 INSUFFICIENT FIELD LENGTH FOR THIS COMMAND. CRMTASK issued a CRMSTAT request but AAMI was not able to complete it because the table area supplied by the user was not large enough. Inform data base a d m i n i s t r a t o r. CRMTASK INSUFFICIENT FL FOR DATA MANAGER. The transaction executive requires more fi e l d l e n g t h a t i n i t i a l i z a t i o n t i m e t h a n i s avallable. Correct error and reinitialize executive. TAF INTERMEDIATE IGNORE TABLE OVERFLOW. Intermediate ignore table FTAB is too small. Too many potentially recoverable files have been encountered when reading ARF's. Inform site analyst to enlarge table FTAB. OMREC (BRT) INVALID DATA BASE NAME ON DMS STATEMENT. A data base name associated with TAF, CRM, or OTHER exceeds two characters. Correct the DMS statement on TCF file. TAF INVALID DATA MANAGER PARAMETER An error has been detected in the parameter list on a data manager request. Correct the data manager request statement. MSABT /#^ 60459500 C B-13 • MESSAGE INVALID TASK NAME. ACTION SIGNIFICANCE The error message was issued for one of the following reasons: - Initialization of a task by the name of ROUTINE Correct the task name. XTASK BTASK, CTASK, ITASK, KDIS, MSABT, OFFTASK, RCTASK, RTASK, SYSMSG, or XTASK w a s a t t e m p t e d u s i n g X TA S K . T h e s e a r e names of required system tasks and will n o t b e i n i t i a t e d b y X TA S K . - A z e r o l e n g t h t a s k n a m e w a s s p e c i fi e d . - A task name of more than seven c h a r a c t e r s w a s s p e c i fi e d . INVAHO TCF ENTRY. T h e p r e v i o u s d a y fi l e m e s a g e i s t h e statement in TCF which is incorrect. Correct that statement i n T C F. TAFREC INVALID TRANSACTION DIRECTORY HEADER fi l e n a m e . The transaction directory (TRD) header word is not TRD. I n f o r m TA F s i t e a n a l y s t . TAF filenam IS INCONSISTENT. T h e i n c o n s i s t e n t fi l e b i t i s s e t f o r r e c o v e r a b l e fi l e , fi l e n a m . T h i s i n d i c a t e s a f a i l u r e ( e i t h e r o f TA F o r t h e s y t e m ) occurred while CRM was trying to update more than one block. All of the blocks may not have been updated and this would cause t h e fi l e t o b e fl a g g e d a s i n c o n s i s t e n t . It is necessary to recover the affected fi l e . A A M I w i l l s u b m i t an OMREC job to do this. AAMI xxJ FILE ERROR - CRM DM NOT LOADED. A data manager related statement is s p e c i fi e d i n t h e x x J fi l e b u t t h a t d a t a manage r 1 s n o t l o a d e d o n t o TA F. Inform site analyst to change the xxJ or TCF fi l e . TAF xxJ FILE ERROR - TAF DM NOT LOADED. A data manager related statement is s p e c i fi e d i n t h e x x J fi l e b u t t h a t d a t a manager 1s not loaded on to TAF. Inform site analyst to change the xxJ or TCF fi l e . TAF xxJ FILE ERROR - TOTAL DM NOT LOADED. A data manager related statement is s p e c i fi e d i n t h e x x J fi l e b u t t h a t d a t a manager 1s not loaded on to TAF. Inform site analyst to change the xxJ or TCF fi l e . TAF xx J FILE NOT FOUND. When using the TAF's user name and p a s s w o r d , a n x x J fi l e f o r t h i s d a t a b a s e was not found. E n s u r e x x J fi l e e x i s t s for this data base and try again. DMREC JOURNAL TYPE DOES NOT MATCH xxJ FILE. T A F j o u r n a l fi l e e n t r i e s i n t h e x x J fi l e d o n o t m a t c h t h e fi l e s t h e m s e l v e s . T h i s causes the transaction subsystem to abort. I n f o r m TA F d a t a a d m i n i s t r a t o r. E x a m i n e x x J fi l e f o r t h e T A F j o u r n a l fi l e e n t r i e s . TAF K.BFL=n. K.CMB=nn. K.£CS=nrmK. K.ERO-a. K.ERO=CRF,xxx. K.INT=1. K . I N T = C R F, x x x x x x x . K. INT =CRM, xxxx. K.MDM=n. K.MFL=nnnnnnB. K.REC=a. K.SCP=nn. K.TLF=a. Va l u e s o f t h e i n i t i a l K d i s p l a y o p t i o n s a t e i t h e r i n i t i a l i z a t i o n o r r e c o v e r y. None. TAF K. COMMAND NOT VALID. A K . c o m m a n d i n t h e T C F fi l e i s i m p r o p e r l y formatted. Correct the statement in the TCF or inform the TA F a n a l y s t . TAF K-DISPLAY COMMAND UNSUCCESSFUL, DROP IGNORED—-command. A K.DROP or K.DDROP could not be processed because the task was in recall, the interactive executive denied a request, or a command was issued during the initial l o a d o f t h e t a s k . T h e c o m m a n d fi e l d i s t h e attempted command or request; blanks indicate no command was issued. Reenter the K.DROP or K.DDROP command. When the recall operation, time-sharing request, or initial load operation i s c o m p l e t e d , TA F accepts the command and aborts the task. SYSMSG K-DISPLAY COMMAND UNSUCCESSFUL, FORMAT ERROR—command. There is an error in the syntax of the command or in one of the parameters. The c o m m a n d fi e l d i s t h e a t t e m p t e d c o m m a n d o r blanks if the command is longer than seven characters or contains an incorrect c h a r a c t e r. Correct the command and retry the operation. SYSMSG K-DISPLAY COMMAND UNSUCCESSFUL, ILLEGAL COMMAND— comm and. The command is not a valid K display command or was misspelled. The command fi e l d i s t h e a t t e m p t e d c o m m a n d . Correct the command and retry the operation. SYSMSG K DISPLAY COMMAND UNSUCCESSFUL, SYSTEM BUSY—command. The system is busy and cannot respond to t h e r e q u e s t . T h e c o m m a n d fi e l d i s t h e attempted command. Retry the operation. SYSMSG • B-14 60459500 C MESSAGE ji^s ACTION SIGNIFICANCE ROUTINE K.MAXFL,nnnnnnB. The run-time K display command K.MAXFL was None, entered with the indicated value. TAF K.MAXFL REJECTED. A value was entered which caused potential blocked tasks to be detected. Reenter K.MAXFL with a larger value. TAF KEYWORO IS ILLEGAL FOR THIS FUNCTION. A keyword was used that is not valid for the selected directive. Check format of directive and valid key words for that directive. OMREC n.nnn KILO CDCS REQUEST REJECTS FOR BUSY. To t a l n u m b e r o f S S C r e j e c t s f o r b u s y w h e n less than seven outstanding CDCS SSC requests existed at the time of the current request. None. TAF n.nnn KILO CDCS REQUEST REJECTS FOR MAXR. To t a l n u m b e r o f S S C a t t e m p t s w h e n t h e r e were seven (MAXR) outstanding CDCS SSC requests. None. n.nnn KILO CDCS REQUESTS FROM TASKS, Total number of CDCS SSC requests issued by tasks. The number does not include t e r m i n a t e r e q u e s t s w h i c h a r e b l o c k e d b y TA F. None. TAF n.nrm KILO ITASK RELOADS. Upon transaction facility termination, this m e s s a g e i n d i c a t e s h o w m a n y r e l o a d s o f I TA S K o c c u r r e d . B e c a u s e I TA S K i s a c e n t r a l memory resident task, if it makes a fatal e r r o r, i t m u s t b e r e l o a d e d . Inform site analyst. TAF n.nnn KILO LOCK REJECTS-filename. TA F C R M c o u l d n o t l o c k r e c o r d s i n fi l e n a m e for a task because the locks parameter on t h e C R M s t a t e m e n t f o r t h a t fi l e w a s n o t large enough. The site analyst should consider increasing the locks parameter on the CRM statement if lock failures occur f r e q u e n t l y. TAF n.nnn KILO LOCKS-filename. TA F C R N p r o c e s s e d n n n n l o c k s f o r fi l e fi l e n a m e . None. TAF n.nnn KILO NO COMMUNICATION BLOCKS. Upon transaction facility termination, this message indicates the number of times a communication block was needed and was not available. Inform site analyst. The site analyst might want to consider using the K.CMB command during TA F I n i t i a l i z a t i o n . TAF n.nm KILO NO FL FOR TASK LOAD. Upon transaction facility termination, this m e s s a g e i n d i c a t e s t h e n u m b e r o f t i m e s TA F was unable to obtain enough memory to load tasks. Inform site analyst. The site analyst might want to consider using the K.MFL command during TA F i n i t i a l i z a t i o n . TAF n.nnn KILO NO SUBCONTROL POINTS. Upon transaction facility termination, this message indicates the number of times a subcontrol point area was needed and was not available. Inform site analyst. The site analyst might want to consider using the K.SCP command during TA F i n i t i a l i z a t i o n . TAF n.nnn KILO OPEN REJECTS-filename. TA F C R M c o u l d n o t o p e n fi l e fi l e n a m e f o r a task because the user's parameter on the CRN statement is not large enough. The site anlayst should consider increasing the users parameter on the CRM statement if open failures occur f r e q u e n t l y. TAF n.nnn KILO OPENS-filename. TA F C R N p r o c e s s e d n n n n o p e n s f o r fi l e f1lename. None. TAF n.nnn KILO STORAGE MOVES OF TASKS. Upon transaction facility termination, this message indicates the number of subcontrol points that were moved. This is done to m a k e m o r e e f f e c t i v e u s e o f t h e fi e l d l e n g t h O f TA F. None. TAF n.nnn KILO TAF FL INCREASES. Upon transaction facility termination, this m e s s a g e i n d i c a t e s t h e n u m b e r o f t i m e s TA F i n c r e a s e d i t s fi e l d l e n g t h w h i l e t r y i n g t o satisfy an internal request for a block of m e m o r y. T h i s i n t e r n a l r e q u e s t i s o f t e n issued to obtain memory in which to load a task. None. TAF n.nnn KILO TASK RECALLS. Upon transaction facility termination, this None, message indicates the number of times tasks were put in recall. This is an internal statistic over which the applications programmer has little control. TAF j d P ^ 60459500 C B-15 • MESSAGE SIGNIFICANCE ACTION ROUTINE n.nnn KILO TASK RECALLS FOR OUTPUT. Upon transaction facility termination, this message indicates the number of times tasks were put in recall because the network block limit (NBL parameter on a TERMINAL statement) for the terminal in use was reached. Refer to the Network Access Method Network Definition Language Reference Manual (listed in the preface). TAF n.nnn KILO TASK RELOADS. Upon transaction facility termination, this message indicates how many reloads of tasks occurred. TAF reloads tasks that have fatal errors if one of the following is true. - The task is central memory resident. - There are queued transactions waiting to use the task. Inform site analyst. TAF n.nnn KILO TASK ROLLOUT COMPLETES. Upon transaction facility termination, this message indicates the number of times TAF rolled out tasks. This statistic excludes the number of times the rollout operation did not complete. None. TAF n.nnn KILO TASK ROLLOUT STARTS. Upon transaction facility termination, this message indicates the number of times TAF initiated a rollout operation. Rollout includes writing a task to disk and releasing the task subcontrol point space. In some cases, the task is allowed to stay central memory resident for a while before it is rolled out. None. TAF n.nnn KILO TRANSACTION ABORTS. Upon transaction termination, this message indicates how many transaction tasks have aborted. Data administrator may have to correct data base to account for transactions. TAF n.nnn KILO TRANSACTIONS PROCESSED. Upon TAF termination, this message indicates the number of TAF transactions processed. None. TAF KL PARAMETER OR CRM CARD NOT SPECIFIED PROPERLY. The KL parameter or the CRN statement was specified improperly or specified as zero length. Correct the CRM statement and try again. DMREC KTSDMP COMPLETE. Dump completed normally. None. KTSDMP LBL - CIO ERROR. A CIO error was encountered because no trailer record was found on a block load. Load from previous dump tape. DMREC LIBRARY DIRECTORY EMPTY - filename. The task library file Indicated does not contain a directory. Inform site analyst. TAF LIBRARY DIRECTORY ERROR - filename. The task library file indicated contains a nonrecognizable directory. Inform site analyst. TAF LIBRARY DIRECTORY TOO LONG - filename. The directory record on the task library file Indicated exceeded the maximum length allowed by the transaction executive (398 entries). Inform site analyst. TAF LIBRARY FILE TIME OUT. The library file was busy for the length of time specified by an assembly constant, so LIBTASK was unable to attach it. Another user apparently has the file attached and will not allow modification. Retry at a later time. LIBTASK LIBTASK ERROR CONDITION UNKNOWN. The error condition for the error processing routine ERR within LIBTASK was unknown. Inform data base administra LIBTASK LIBTASK PFM ERROR DETECTED. A permanent file error other than FILE BUSY was received when the library file attach was attempted. Correct and rerun. LIBTASK LIST COMPLETE. Informative message. None. DMREC LOAD ERROR IN HASHING ROUTINE. When attempting to load the hashing routine on a record load operation, a load error or no entry point in the hashing routine was found. Check for valid hashing routine, inform analyst. OMREC LOADING ECS taskname. Informative message. The transaction subsystem is loading task taskname. None. TAF LOG ENTRY TABLE OVERFLOW. Too many recoverable data base file names exist on ARF. Increase size of table (TLOG). OMREC (8LT) • B-16 60459500 /^^\ C 1 SIGNIFICANCE MESSAGE ACTION ROUTINE MAXIMUM TERMINALS EXCEEDED. More than IPTST transaction terminals have been defined in the Network File(s). Reduce number of t e r m i n a l d e fi n i t i o n statements or increase IPTST and reassemble TAFREC. TAFREC MEMORY OVERFLOW DURING INITIALIZATION. TAF aborted because its field length for i n i t i a l i z a t i o n w a s i n s u f fi c i e n t . Inform site analyst. IFL- in deck TAF should be increased. Increasing the central memory field length parameter on the RFL command in the TAF initialization procedure fi l e ( f f f f ) d o e s n o t correct this problem. TAF MEMORY REQUEST FOR ECS NOT ALLOWED. Incorrect request of extended memory by task. Contact data a d m i n i s t r a t o r. MSABT MEMORY REQUEST WITH D.M. REQUEST OUTSTANDING. A task error. MEM or RFL request attempted with data manager requests outstanding. Correct task or inform data base administrator. MSABT NFL TOO LARGE nnnnnnB,taskname,task library. The MFL (initial field length plus expandable field length) of the non-CN resident task (taskname) on task library (tasklibrary) exceeds the minimum size of the transient task area (potential space available to contain transient tasks). Thus a situation could arise in which it would not be possible to complete processing of this task. Reduce the task FL or EF, or increase the TAF FL. TAF Potentially blocked tasks were detected at one of the following times: C o r r e c t e r r o r. TAF 0^^ MINIMUM TAF MFL NEEDED = nnnnnnB. - TAF initialization - Attempted task library update - Attempt to change TAF maximum FL via K.MAXFL command The above operation did not complete normally. The maximum FL of TAF must be at least nnnnnnB. If nnnnnnB exceeds the largest field length possible for TAF (377700B), then other corrective action is needed. J ^ v MISSING AKY CARD. Number of AKY statements does not match number of alternate keys on IXN statement. Nod ify the IXN statement or adjust the number of AKY statements so the two match. TAF (XXJ) MISSING HEADER WORD ON xxJ FILE. The first statement on the xxJ file is in error, causing the transaction subsystem to abort. Examine xxJ files for header xxJ. Inform the TAF data administrator. TAF MISSING HEAOER WORD ON XXJ FILE. No header word on xxJ was found. Correct xxJ file and rerun. DMREC MORE THAN FIVE TASKS IN TASK CHAIN. A task error. Only five tasks can be requested for scheduling in one CALLRTN, CALLTSK, or NEWTRAN request; more than five were requested. Correct task or inform data base administrator. MSABT MORE THAN ONE ARF SPECIFIED. More than one ARF was specified on the DUMP directive. Correct the directive and rerun. DMREC MORE THAN ONE ENTRY POINT ON A *54* TABLE. Multiple entry points are not allowed in tasks. Rewrite the task with only one entry point. LIBTASK MORE THAN ONE USER STATEMENT IN TCF. S e l f - e x p l a n a t o r y. Delete the extra USER statement. TAFREC MRL PARAMETER ON CRM CARD NOT SPECIFIED PROPERLY. The MRL parameter on the CRM statement was specified improperly or specified as zero length. Correct the CRN statement and try again. DMREC NS REDUCTION INVALID - filename. The maximum message size, specified via the MS parameter on the RECOVER directive, was less than the actual message record size on the named CRF. Correct the RECOVER directive or select initialization of the named CRF via the K.INT initial K display command if reducing the message size is actually required. (Note that K.INT will destroy the current recovery information). TAFREC yf$$ft\ /0^~ 60459500 C B-17 • ACTION SIGNIFICANCE MESSAGE ROUTINE MSABT CALL ERROR. MSABT was called with an incorrect error code. Inform data base a d m i n i s t r a t o r. MSABT NAKY PARAMETER ON THE IXN CARD NOT SPECIFIED PROPERLY. The NAKY parameter is not specified properly or of 2ero length. Correct the IXN statement and try again. DMREC NAM ERROR - ILLOGICAL ABT. The application block type (ABT) sent to TAF by NAM is unrecognizable. Contact Central Software Support. TAF NAM ERROR - INCORRECT ABH. The application block header (ABH) sent to TAF by NAM is unrecognizable. Contact Central Software Support. TAF NAM FUNCTION NOT FOUND. TAF received a supervisory message from NAM which had an unrecognizable primary or secondary function code. Contact Central Software Support. NAM LOGICAL ERROR. NAM sent TAF a message out of order or an unrecognizable message. Contact Central Software Support. TAF NAM NOT AVAILABLE. Informative message indicating that TAF is currently at a control point but NAM is not. TAF transactions can be initiated from batch only, or TAF-CRM data bases may be accessed from batch or interactive jobs. Bring NAM to a control point, if desired. TAF NAM PHYSICAL ERROR EC=ec. NAM has detected a physical error indicated by error code ec. Refer to the NAM Reference Manual for the meaning of this error code. TAF NAM REJECT. During login processing, NAM rejected the terminal. Inform site analyst. TAF NEED AT LEAST xx SUBCONTROL POINTS. There are more CN resident tasks defined than subcontrol points. If non-CM resident tasks exist, there must be at least one more subcontrol point than there are CN resident tasks. Reinitialize the transaction executive and assign more subcontrol points, or reduce the number of CM resident tasks. TAF NETOFF COMPLETE. Informative message indicating that TAF is no longer communicating with NAN. NAN initiated shutdown procedures prior to loss of communications. When NAN is available, the central site console operator command K.NAMON can be used to resume communications between TAF and NAM. TAF NETON COMPLETE. Informative message indicating that TAF is communicating with NAN. None. TAF NETWORK FILE NOT FOUND - filename. The network description file, NCTFI, could not be found. Check that correct parameters were specified on the NETWORK directive corresponding to filename. TAF TAFREC NETWORK SHUT DOWN DETECTED. Self-explanatory. None. TAF NM REDUCTION INVALID - filename. The maximum number of user messages, specified by the NM parameter on the RECOVER directive, was less than the actual number of user messages on the named CRF. Correct the RECOVER directive or select initialization of the named CRF via the K.INT initial K display command if reducing the number of user messages is actually required. (Note that K.INT will destroy the current recovery information). TAFREC NO ACCOUNT/USER CARD IN xxJ FILE. The USER statement in the xxJ file is not present, causing the transaction subsystem to abort. Add USER statement in x x J fi l e . I n f o r m t h e TAF data administrator. TAF NO ACCOUNT/USER CARD ON XXJ FILE. No user statement exists on the xxJ file. Correct the xxJ file and rerun. DMREC (CXJ) NO ALTERNATE KEY SPECIFIED ON IXN CARD. Self-explanatory. Correct the IXN statement and try again. DMREC NO ARF DUMP ENTRIES - DUMP IGNORED. When trying to build directory entries for an ARF dump function, no ARF file was found. Include ARF file name on dump. DMREC NO ARF DUMP ENTRIES IN DIRECTORY. A search of the directory for the targeted VSNs of ARF tapes was unsuccessful. Check time and data or VSN used to delineate update. DMREC • 8-18 60459500 /s^v C 1 NESSAGE 0r*« SIGNIFICANCE ACTION ROUTINE NO 8RF CARD FOR CRN DATA BASE. There is no BRF statement in the xxJ file before the first CRM statement for the data base. A BRF statement is required. If no recovery is desired, the n u m b e r o f s p e c i fi e d fi l e s o n t h e B R F s h o u l d be zero. TAF NO BRF CARD FOUND IN xxJ FILE. There is no BRF statement in the xxJ file for the data base. A BFF card is required and must be added to the x x J fi l e . DMREC NO CRM CARD FOUND IN xxJ FILE. S e l f - e x p l a n a t o r y. Correct the CRN statement and try again. DMREC NO DATA BASE ID FOR DATA MANAGER. A t l e a s t o n e d a t a b a s e i d e n t i fi e r m u s t b e s p e c i fi e d o n e a c h a c t i v e ( O N ) D M S s t a t e m e n t . A d d d a t a b a s e i d e n t i fi e r to DNS statement(s) or s p e c i f y s t a t u s a s O F F. TAF NO DATA BASE NAME IN xxJ FOR TOTAL. S e l f - e x p l a n a t o r y. Add data base name to x x J fi l e . NO DIRECTIVES. No directives were supplyed to DMREC. Supply the correct directives and rerun. DNREC NO DUMP RECORD WITH SPECIFIED VSN. DMREC could not locate a dump record with t h e s p e c i fi e d V S N . Check directory with list directive for proper VSN. DMREC NO FILE NAME SPECIFIEO ON CRM CARD. A C R M s t a t e m e n t i n t h e x x J fi l e d i d n o t c o n t a i n a fi l e n a m e . C o r r e c t t h e x x J fi l e a n d try again. DNREC NO FILE NAME SPECIFIED ON IXN CARD. T h e x x J fi l e h a s a n I X N s t a t e m e n t t h a t d o e s n o t c o n t a i n a fi l e n a m e . Correct IXN statement on x x J fi l e a n d r e r u n . DMREC (RXJ) NO FILES TO DUMP. N o fi l e s h a v e b e e n s p e c i fi e d o n a d u m p directive. I n c l u d e fi l e n a m e o n directive. DMREC NO HOSE CONNECTED. YOU HAVE ENTERED A (ct)TM COMMAND WHEN THERE IS NO HOST CONNECTION. Enter (ct)HD to display host status and then enter (ct)HN=nn or =mm to connect to the selected host. RTN? NO HOST AVAILABLE CONTROL CHARACTERShar display No hosts are available. display The host availability display (HAD), which appears if you have enabled it using the HD terminal d e fi n i t i o n c o m m a n d . char The network control character for your terminal. Check the status of the hosts in your c o n fi g u r a t i o n . CCP NO HOST CONNECTED CONTROL CHARACTERS har di s p l a y Yo u h a v e a t t e m p t e d t o d i s c o n n e c t y o u r terminal from a host when you have no connection to a host. display The host availability display (HAD), which only appears if you have enabled it using the HD terminal d e fi n i t i o n c o m m a n d . Enter a HD terminal d e fi n t i o n c o m m a n d t o determine the status of hosts in the system, or enter any input to initiate your connection to the host. CCP NO HOST SELECTED CONTROL CHARACTERshar display ENTER char HN=NOD6 NUMBER or HS=NAME TO SELECT HOST Yo u h a v e n o t s e l e c t e d a h o s t a n d a h o s t i s available. display The host availability display (HAD), which appears if you have enabled it using the HD terminal d e fi n i t i o n c o m m a n d , char The network control character for your terminal. Select a host. CCP NO KEY LENGTH SPECIFIED ON CRM CARD. The KL parameter on the CRM statement was n o t s p e c i fi e d . Correct the CRM statement and try again. DNREC NO MAXIMUM RECORD LENGTH SPECIFIED ON THE CRM CARD. The MRL parameter on the CRM statement was n o t s p e c i fi e d . Correct the CRN statement and try again. DNREC NO RECORD FOUND FOR GIVEN VSN - DATE/TIME. T h e fi l e s p e c i fi e d o r i m p l i e d o n t h e l o a d c a n n o t b e f o u n d o n t h e d i r e c t o r y. Check load directive for c o r r e c t fi l e l o a d i n g parameters. DMREC NO SPACE FOR ARF/BRF BUFFER. No space was available for an ARF or BRF buffer. Increase field length of ONREC. DMREC ENTER char HD TO SEE HOST STATUS ENTER INPUT TO CONNECT TO HOST /^^ 60459500 C B-19 • ACTION SIGNIFICANCE MESSAGE ROUTINE NO TERMINALS IN NETWORK FILE - filename. A valid network file was found but no transaction terminals were defined in Ensure the network file is correctly named. The network file is NCTFi (i=id speci fied on network directive in TCF). TAFREC NO TRANSACTION NAME IS DEFINED IN TASK LIBRARY. No named transaction appears in any task l i b r a r y. I f a p p r o p r i a t e , d e fi n e named transactions. TAF NOT ALL DATA BASE FILES UPPED. CRMTASK issued a DBUP request but AAMI was unable to attach/open all of the data base fi l e s . Inform data base a d m i n i s t r a t o r. CRMTASK NOT AVAILA8LE. K display message indicating that the entry is not available for this version. None. TAF filename NOT FOUND. The user specified the P option on the KTSDMP command; one of the two files was not in the user's permanent file catalog or a PFM error occurred. S p e c i f y a d i f f e r e n t fi l e name or inform a site analyst. KTSDMP xxxxxxx NOT FOUND IN DIRECTORY, Specified file 1s not found in the d i r e c t o r y. Check the file name and t h e l i s t d i r e c t o r y. DMREC xxxxxxx NOT IN DIRECTORY. Error - The task or named TAF transaction unit, xxxxxxx, was specified in the TN parameter but was not found on the task library or transaction unit directory. Ensure the correct task or transaction name was specified with the TN parameter. Check task or transaction listing for presence of s p e c i fi e d u n i t . TAF S^^\ xxxxxx NOT INITIALIZED BY TOTAL. STATUS IS yyyy. An error was encountered on the TOTAL data base. Regenerate TOTAL data base. Refer to TOTAL Reference Manual for status. TAF NOTE FAILURE, THEN TYPE IN CFO, JSN. GO. An error occurred that requires operator n o t i fi c a t i o n . The operator should log the failure, or notify the data base administrator and/or correct as directed, if the error was not recovered by DMREC. DMREC NULL DESCRIPTION FILE. Self-explanatory. Create a description file (NCTF1 where 1 is the machine identifier specified on the network statement in the TCF). OFF TASK taskname-LIBRARY libraryname. Task taskname in task library libraryname could not be loaded from extended memory or recovered and loaded from mass storage. Task was turned off. TAF transactions using tasks will abort. Inform site analyst. Library must be recreated. ONLY *8L0CK* or *RECORD* CAN FOLLOW FILE NAME. S e l f - e x p l a n a t o r y. Correct error and rerun. DMREC OPEN ERROR ON COPY OF THE DIRECTORY. An open error was generated when trying to access the directory file. Inform data a d m i n i s t r a t o r. DMREC OPERATOR OVERRIDE. Operator has overridden TAF. None. TAF OPERATOR TERMINATION. Operator typed in K.STOP in K display command. None. TAFREC PACKED OATE/TIME CONVERSION ERROR. An error was generated when converting the directive date/time to a packed date/time. Check the date and time used on directive and rerun. DMREC PARAMETER FORMAT ERROR. The input directive contains an incorrect file name - too many characters or nonalphanumeric characters. Correct directive and rerun. DMREC PARITY ERROR IN TAPE WITH VSN=vsn. Tape with vsn has been mounted and has a p a r i t y e r r o r. Clean the tape or replace it. OMREC nnnn PER CENT CPU USAGE. Summary message indicating CPU usage by the transaction subsystem. None. TAF PERCENT PARAMETER NOT SPECIFIED PROPERLY. The percent parameter was not of the correct format or was specified greater than 100. Correct directive and rerun. OMREC PF xxxxxxx - NOT ON xxJ FILE. The xxJ file does not have the specified CRM data file defined. Make necessary xxJ file entry (CRN statement). DMREC (RXJ) • B-20 TAF 60459500 X*^5\ ,^v 60459500 C G-3 function as the interruption sequence whether entered during input or output. (B2) - TERMINATION OR USER BREAK 2 CHARACTER The B2 command specifies the character that, when entered as the only character in a logical line (ter mination character followed by the message transmis sion key), causes program termination. (BS) • BACKSPACE CHARACTER T h e B S c o m m a n d s p e c i fi e s t h e c h a r a c t e r u s e d t o delete the previous input character. Format: ct B2-ub2 Format: Parameter ct BS«bs Parameter ct Represents the network control character for your terminal as defined by the CT terminal def inition command. Description ct Represents the network control character for your terminal as defined by the CT terminal def inition command. b s S p e c i fi e s t h e n e w b a c k s p a c e c h a r a c t e r. T h i s c h a r a c t e r m u s t d i f fer from the characters currently defined for AB, Bl, B2, CN, CT, EB, and EL. It is possible to backspace only to the beginning of the current physical line; additional backspaces are disregarded. When a page width of 0 is selected, the network assumes a page width of 100 characters for backspacing. If the page width is in the range 20 through 56, backspacing Into previous physical lines is sometimes permitted. This command only applies to asynchronous terminals o n l y. Description u b 2 S p e c i fi e s t h e n e w u s e r b r e a k 2 c h a r a c t e r. T h i s c h a r a c t e r m u s t differ from the characters cur r e n t l y d e fi n e d f o r A B , B S , B l , CN, CT, EB, and EL. The termination sequence is discussed in section 17. This command does not apply to bisynchronous 2780 and 3780 terminals. (CH) • DISPLAY TERMINAL CHARACTERISTICS The CH command displays some of the terminal's cur rent characteristics. Format: ct CH (Bl) - INTERRUPTION OR USER BREAK 1 CHARACTER Parameter The Bl command specifies the character that, when entered as the only character in a logical line (Interruption character followed by the message transmission key), causes program interruption. Format: Des c r ipt ion ct Represents the network control character for your terminal as defined by the CT terminal def inition command. ubl Specifies the new user break 1 c h a r a c t e r. T h i s c h a r a c t e r m u s t differ from the characters cur r e n t l y d e fi n e d f o r A B , B S , B 2 , CN, CT, EB, and BL. The interruption sequence is discussed in section 17. The BR command determines whether the BREAK key can also function as the Bl character. This command does not apply to bisynchronous 2780 and 3780 terminals. • G-4 ct Represents the network control character for your terminal as defined by the CT terminal def inition command. The CH command produces a display in the following format: ct Bl-ubl Parameter Description TC-tc,BS-bs,CN»cn,AB=ab,Bl-ubl,B2"ub2,EL«"el,EB=eb where the variable portions appear as ASCII charac ters If printable, mnemonics (for example, STX) If nonprlntable, or N/A if the attribute is not appli cable. (Cl) • CARRIAGE RETURN IDLE COUNT The CI command specifies the number of idle charac ters to be inserted into the output stream after a carriage return. Format: ct CI»ci 60459500 C Parameter Description ct Represents the network control character for your terminal as d e fi n e d b y t h e C T t e r m i n a l definition command. ct Represents the network control character for your terminal as defined by the CT terminal def inition command. c i S p e c i fi e s t h e n e w c a r r i a g e r e t u r n idle count. This value can be from 0 to 99 or the string CA. A value of CA restores the carriage return idle count to the default value. option Indicates whether to send a res ponse to the terminal or not. A value of Y indicates yes and N indicates no. When the network produces a carriage return, the network outputs the specified number of idle charac ters before outputting the next line. This allows time for the carriage return function and ensures that characters are not lost because of printing attempts during the carriage return operation. This command only applies to asynchronous terminals. jjKSBN. Parameter Des c r ipt ion This command applies only to asynchronous terminals (except 2741s). If CP-Y and IN-KB are selected, the system responds to the line feed key by sending a carriage return and responds to an EL or EB charac ter by sending the cursor positioning response s p e c i fi e d b y t h e E L o r E B c o m m a n d . I f I N = B K i s s e l e c t e d o r y o u a r e a t a n X . 2 5 PA D t e r m i n a l , t h e system responds only to the EB character by sending the cursor positioning response selected by the EB command. (CN) • CANCEL CHARACTER (CT) • NETWORK CONTROL CHARACTER The CN command specifies the character used to cancel the logical line currently being input. The CT command specifies a network control character for the terminal. When you enter this character as t h e fi r s t c h a r a c t e r o f a l o g i c a l l i n e , i t s i g n a l s t h a t w h a t f o l l o w s i s a t e r m i n a l d e fi n i t i o n c o m m a n d or a special command that the network forwards to your application with a preemptive status. Format: ct CN»CQ Parameter Description ct Represents the network control character for your terminal as defined by the CT terminal def inition command. e n S p e c i fi e s t h e n e w c a n c e l c h a r acter. This character must differ from the characters c u r r e n t l y d e fi n e d f o r B S , B l , B2, CT, EB, and EL. When you enter the cancel character as the last character in a line, the entire logical line in progress is cancelled. The system responds to a cancel line character by printing *DEL* on the next line and positioning the carriage to the beginning of a new line. The BR command determines whether the BREAK key can also function as the CN character. This command does not apply to bisynchronous 2780, 3270, and 3780 terminals. (CP) - CURSOR POSITIONING AFTER INPUT The CP command determines whether or not the system sends the terminal a response to the line feed key, the EL character, and the EB character. Format: Format: ct CT-char Parameter Description ct Represents the current network control character for your ter minal. char S p e c i fi e s t h e n e w n e t w o r k c o n t r o l c h a r a c t e r. T h i s c h a r a c t e r must differ from the characters c u r r e n t l y d e fi n e d f o r A B , B S , Bl, B2, CN, EB, and EL. If you enter the CT command in a line with multiple t e r m i n a l d e fi n i t i o n s , t h e n e w v a l u e c h a r d o e s n o t take effect until the complete line is processed. (DL) - DELIMITERS FOR SINGLE-MESSAGE TRANSPARENT INPUT MODE T h e D L c o m m a n d s p e c i fi e s t h e d e l i m i t e r s t h a t terminate single-message transparent Input mode. When you initiate transparent input mode (IN»X, IN-XK, or IN»XP), the network reads your input and sends it to the system without translation until it e n c o u n t e r s a d e l i m i t e r. I f y o u r t e r m i n a l ' s p a r i t y is set to even, odd, or zero (PA=E, 0, or Z), the parity bit is stripped (set to zero) before the characters are sent to the host, although no ct CP»option 60459500 C G-5 translation occurs. If your terminal's parity is set to none or ignore (PA=N or I), the parity bit is not stripped. See the NAM/CCP Terminal Interfaces Reference Manual for more information on transparent i n p u t a n d p a r i t y. T h e fi r s t d e l i m i t e r e n c o u n t e r e d terminates transparent input mode. the SEND or ETX key as their only transparent mode t e r m i n a t o r. F o r X . 2 5 d e v i c e s , t h e PA D f o r w a r d i n g signal always acts as a transparent mode terminator in addition to any other options selected. Format: (EB) • END-OF-BLOCK CHARACTER ct DL»Xxx,Ccount,TO Parameter ct Xxx Des c r ipt ion Represents the network control character for your terminal as d e fi n e d b y t h e C T t e r m i n a l definition command. Specifies the 2-digit hexadecimal code (xx) of the character you want as a delimiter. The network does not send the character as part of the input data. When you specify a hexadecimal code above 7F, you must have previously set your ter- minal's parity to none ( PA - N ) o r i g n o r e ( PA - I ) ; o t h e r wise the network cannot detect the code when it occurs in a transparent mode message. If the terminal's parity is set to none, the 8-bit hexadecimal code input from the terminal is matched against the 8-bit hexadecimal c o d e s p e c i fi e d a s t h e d e l i m i t e r (xx). If the terminal's parity is set to ignore, the bottom 7 bits of the terminal input are matched against the bottom 7 bits o f t h e s p e c i fi e d d e l i m i t e r ( x x ) . The EB command defines the end-of-block character and defines the cursor-positioning response to that c h a r a c t e r. T h e E B c h a r a c t e r a c t s a s t h e m e s s a g e transmission key for terminals operating in block mode (refer to the IN command). Format: ct EB-eb,cpr Parameter Description ct Represents the network control character for your terminal as d e fi n e d b y t h e C T t e r m i n a l definition command. eb S p e c i fi e s t h e n e w e n d - o f - b l o c k c h a r a c t e r. Yo u c a n s p e c i f y t h e following values for eb: eb Description char Selects the new EB character. This character must dif fer from the charac ters currently de fined for AB, BS, Bl, B2, CN, and CT. Ccount Specifies a decimal value (count) from 1 to 40951 that functions as a character count delimiter. EB Selects the default end-of-block charac ter or character se quence . TO S p e c i fi e s t h a t a t i m e o u t o f b e tween 200 and 400 milliseconds will be a transparent mode de l i m i t e r. EL Selects the current logical end-of-line c h a r a c t e r. You can select any of the three types of delimiters: character delimiter (specify Xxx), character count delimiter (specify Ccount), and timeout delimiter (specify TO). The parameter values for DL are order-independent a n d o p t i o n a l . H o w e v e r, y o u m u s t s p e c i f y a t l e a s t one of the parameter values. You can omit trailing commas if you do not specify all three types of delimiters. Entering this command with any number of new delimiters cancels all transparent mode input delimiters already in effect, including those specified with the XL command. The DL command applies 4 t e r m i n a l s . Te r m i n a l the RETURN key as terminator and mode 4 only to asynchronous and mode c l a s s 4 i s c o n fi g u r e d w i t h the only transparent mode terminals are configured with cpr S p e c i fi e s t h e c u r s o r - p o s i t i o n i n g r e s p o n s e t o t h e E B c h a r a c t e r. Yo u c a n s p e c i f y t h e f o l l o w i n g values for cpr: cpr D e s c r i p t io n CR Send a carriage re turn to the terminal. LF Send a line feed to the terminal. CL Send a carriage re turn and a line feed to the terminal. NO Send no response. The two EB parameters (EB=eb and cpr) are optional and order-independent. If you omit one, the system retains its previous value. tThese values are valid within the network. However, unless changed during installation, the maximum logical input line length in IAF (160 characters) limits you. • G-6 60459500 C This command is valid only for asynchronous minals, except for paper tape devices and 2741 minals. The end-of-block character for mode 4 minals is ETX and is not changeable. The X.25 forwarding signal is the default for X.25 PSN minals and always acts as an end-of-block. If specify the char form of the eb parameter, it is effective if It occurs as the last character packet sequence. ter ter ter PAD ter you only in a The CP command enables or disables the cursorpositioning response specified by the cpr parameter. (EL) • END-OF-LINE CHARACTER T h e E L c o m m a n d d e fi n e s t h e l o g i c a l e n d - o f - l i n e character (car r i a g e r e t u r n ) a n d d e fi n e s t h e c u r s o r p o s i t i o n i n g r e s p o n s e t o t h a t c h a r a c t e r. I t a l s o d e fi n e s t h e m e s s a g e t r a n s m i s s i o n k e y f o r a s y n c h ronous terminals not operating in block mode (refer to the IN command). Format: Parameter el /#**> Des c r ipt ion CL Send a carriage re turn and a line feed to the terminal. NO Send no response. The two EL parameters (el and cpr) are optional and order-Independent. If you omit one, the system retains its previous value. This command does not apply to 2741, HASP, 3270, and bisynchronous 2780 and 3780 terminals; the cpr parameter does not apply to mode 4 or X.25 PSN terminals; and the char specification does not apply to mode 4 terminals. The CP command enables or disables the cursorpositioning response specified by the cpr parameter. (EP) • ECHOPLEX MODE The EP command enables or disables the echoing of input characters back to the terminal. ct EP-option Parameter Represents the network control character for your terminal as d e fi n e d b y t h e C T t e r m i n a l definition command. Specifies the new logical end-ofl i n e c h a r a c t e r. Yo u c a n s p e c i f y the following values for el: el Description char Selects the new EL character. This character must dif fer from the charac ters currently de fi n e d f o r A B , B S , Bl, B2, CN, and CT. Description ct Represents the network control character for your terminal as d e fi n e d b y t h e C T t e r m i n a l definition command. option S p e c i fi e s w h e t h e r t o e n a b l e ( Y ) or disable (N) input echoing. Some terminals can perform their own character echoing, such as terminals with a HALF/FULL duplex switch. If the switch is in the HALF position, set the EP value to N, and the terminal echoes the input. If the switch is in the FULL position, set the EP value to Y and the network echoes the input. EB Selects the current end-of-block char acter or character sequence. You can use the EP command and full-duplex mode as a security measure. If you are in full-duplex mode and EP is Y during login, the system echoes all of your input except your password. This is not true, however, if you enter your user name and password on the same line. EL Selects the default logical end-of-line c h a r a c t e r. This command only applies to asynchronous terminals (except 2741s) but is not valid for X.25 PSN terminals. c p r S p e c i fi e s t h e c u r s o r - p o s i t i o n i n g r e s p o n s e t o t h e E L c h a r a c t e r. Yo u c a n s p e c i f y t h e f o l l o w i n g values for cpr: cpr CR LF 60459500 C Description Format: ct EL«el, cpr ct cpr Des cr i p t i o n Send a carriage re turn to the terminal. Send a line feed t o the terminal. (FA) • FULL ASCII INPUT MODE The FA command enables or disables the full-ASCII input mode. Format: ct FAdoption G-7 Parameter Description ct Represents the network control character for your terminal as defined by the CT terminal def inition command. o p t i o n S p e c i fi e s w h e t h e r t o e n a b l e ( Y ) or disable (N) the full-ASCII input mode. In full-ASCII input, all 128 ASCII characters, i n c l u d i n g N U L , D E L , S T X , L F, a n d a l l B L K a n d message-forwarding signals (which are normally discarded), are sent to the host. Exceptions to this are the following characters: • NULs, DELs and LFs when encountered as the fi r s t c h a r a c t e r o f a n i n p u t l i n e o r a s t h e character following a message-forwarding signal The host selected is used until either you change it or until your terminal is disconnected from the host. (HD) • DISPLAY OF HOST NODES The HD command controls when the system displays the host availability display (HAD), which shows all paths you can select to connect your terminal to a host. If your computer system is a multihost system, your site may choose to show the HAD whenever you disconnect from a host unless you i n h i b i t t h e d i s p l a y. Format: ct HD-option Parameter • CRs that follow LFs when inputting from paper tape Description ct Represents Che network control character for your terminal as defined by the CT terminal def inition command. option Represents Y or N. Y enables and N disables the automatic displaying of the HAD. • DC3s that follow the EL character when in putting from paper tape • DCls and DC3s when output control (OC-Y) is selected In full-ASCII mode, the network does not recognize the terminal functions associated with the mnenomics Bl, B2, CN, AB, and BS. The network does recognize t e r m i n a l d e fi n i t i o n c o m m a n d s a n d o t h e r c o m m a n d s beginning with the CT character. If SE is in effect when you select FA or if FA is in effect when you select SE, FA takes precedence and S E w i l l n o t b e e ff e c t i v e u n t i l FA i s t u r n e d o ff . I f full-ASCII mode Is enabled when you select trans parent input mode, the network, suspends the fullASCII mode until the transparent input mode terminates. This command only applies to asynchronous and mode 4 terminals. If you specify HD-Y, you get a display of the HAD immediately and at any time you disconnect from the host (for example, after you enter the TM command or after you log out of an application without s w i t c h i n g t o a n o t h e r a p p l i c a t i o n ) . Yo u a l s o g e t a header and trailer line along with the HAD (refer to the TM command). The HAD has the following format: message CONTROL CHARACTER»ct NPU NODE-npu TERMINAL NAME-terminal HOST NODE host} host 2 host. STATUS nodei node 2 SELECTED/ CONNECTED condltloni condition2 noder conditionn statusr statusi status2 (HC) • HOST CONNECTION The HC command sets or changes the host connected to your terminal. The host availability display (HAD) shows the available hosts (refer to the HD command for more information on the HAD). This command disconnects you from your current host and establishes a new host connection. This command is equivalent to HS or HN followed by TM. The variable items In the display have the following descriptions. Description Format: A message describing the status of your current host connection. ct HC«hostname Parameter • G-8 ct Network control character cur rently defined for your terminal. npu The node number of the Network Processing Unit (NPU) your ter minal is connected to. terminal The name of your terminal. host*; Represents the I- to 7-character n a m e o f a h o s t . T h e fi e l d m a y be blank. Des c r ipt ion ct Represents the network control character for your terminal as defined by the CT terminal def inition command. hostname s p e c i fi e s t h e n a m e o f t h e h o s t to which you want your terminal connected. The valid entries appear in the HAD. 60459500 C /'SjS^v Item <(#Sv Description node^ Represents a node number (1-31). co nd ition ^ Indicates that you have selected node^ (S), that you are con nected to the host using node^ (C), or that node^ has been automatically selected and the connection to the host is in progress (SA). status£ Represents AVAILABLE. AVAILABLE or NOT Your terminal uses the path to host with the least t r a f fi c . T h e p a t h s e l e c t e d i s u s e d u n t i l e i t h e r y o u change it or until your terminal Is disconnected from the host. (IC) - FLOW CONTROL FOR INPUT DEVICES T h e I C c o m m a n d s p e c i fi e s w h e t h e r t h e t e r m i n a l recognizes DC3s as a stop signal and DC Is as a resume signal for terminal input. Format: ct IC-option Parameter (HN) - HOST NOOE SELECTION r The HN command 3ets or changes the host or the path (node) to a host through which your terminal is connected. This command does not disconnect you from your current host connection. You must log out or disconnect with the Secure Login command or TM terminal definition command before you can connect to the new selection. Format: ct Represents the network control character for your terminal as defined by the CT terminal def inition command. option S p e c i fi e s w h e t h e r t o e n a b l e ( Y ) or disable (N) input control. Input control applies to asynchronous terminals, including paper tape devices (except 2741 and X.25 PSN terminals). ct HN-node Parameter Description Description ct Represents the network control character for your terminal as d e fi n e d b y t h e C T t e r m i n a l definition command. n o d e S p e c i fi e s a n o d e n u m b e r . T h e default is the node the network processing unit is presently using to access its supervisor (CS). The host availability display (HAD) lists all nodes your terminal can use. Refer to the HD command for a description of the HAD. (IN) - INPUT DEVICE AND TRANSMISSION MODE The IN command identifies the input device and the transmission mode of the device. As the input device, you can specify one of the following: • A keyboard. • A p a p e r t a p e r e a d e r. As the input transmission mode, you can specify either: • Normalized line mode (one message or logical line per terminal transmission block). (HS) - HOST SELECTION • Normalized block mode (one or more logical lines or messages collected Into a block before it is transmitted). The HS command selects a host which is connected to your terminal. The host availability display (HAD) shows the available hosts (refer to the HD command). • Transparent mode (input Is not edited or translated by the network). Format: Format: ct IN-in ct HS»ho3tname Parameter Description Parameter Description Represents the network control character for your terminal as defined by the CT terminal def inition command. ct Represents the network control character for your terminal as d e fi n e d b y t h e C T t e r m i n a l definition command. hostname Specifies the name of the host to which you want your terminal con nected. The valid entries appear in the HAD. in S p e c i fi e s t h e I n p u t d e v i c e a n d t r a n s m i s s i o n m o d e . Yo u c a n specify the following values for In: ct 60459500 C G-9 in Description Parameter BK Selects block mode as from a form ter minal and normalized input mode. KB Selects a keyboard in character or line mode and normalized input mode. PT Selects paper tape and normalized input mode. X Selects the current input device and transparent input mode. XK Selects the keyboard and transparent in put mode. XP Selects paper tape and transparent input mode. v a l u e S p e c i fi e s t h e n e w l i n e f e e d i d l e count. This value can be from 0 to 99 or the string CA. A value of CA restores the line feed idle count to the default value. The line feed idle count is similar to the carriage return idle count (CI), except that the idle char acters are output after a line feed instead of after the carriage return. This command only applies to asynchronous terminals. (LK) - LOCKOUT OF UNSOLICITED MESSAGES The LK command determines whether unsolicited mes sages from the network operator appear at your ter minal. Format: ct LK-option Parameter When the IN value is XK, XP, or X, terminal input is sent to the host in transparent mode blocks. Trans parent mode continues until the system encounters a previously defined transparent mode terminator. When the IN value is XK and transparent mode minates, the IN value automatically reverts to When the IN value is XP and transparent mode minates, the IN value automatically reverts to When the IN value is X and transparent mode minates, the IN value automatically reverts to value that was previously in effect. The IN command is not applicable to HASP, 3270 or bisynchronous 2780 and 3780 terminals. 2741 ter minals can only select IN-KB, IN-X, and IN-XK. Mode 4 terminals, which are always in block mode, and X.25 PSN terminals cannot select PT or XP mode. Description ct Represents the network control character for your terminal as d e fi n e d b y t h e C T t e r m i n a l definition command. ter KB. ter P T. ter the When the IN value is PT or XP, the network sends the X-ON code to start the paper tape reader automat ically after the end of a message is output to the terminal and the message empties the terminal's output queue. Description o p t i o n S p e c i fi e s w h e t h e r t o l o c k o u t unsolicited messages. A value of Y locks out the messages and a value of N allows the messages to appear. This command is not valid for bisynchronous 2780 and 3780 terminals. (MS) - MESSAGE TO NETWORK OPERATOR The MS command sends a message to the network o p e r a t o r. Jf-tmgK Format: ct MS«message (LI) . LINE FEED IDLE COUNT Parameter T h e L I c o m m a n d s p e c i fi e s t h e n u m b e r o f i d l e characters to be inserted into the output stream following a line feed. Format: ct LI»value Parameter ct • G-10 Des c r ipt ion Represents the network control character for your terminal as d e fi n e d b y t h e C T t e r m i n a l definition command. Description ct Represents the network control character for your terminal as defined by the CT terminal def inition command. m e s s a g e S p e c i fi e s y o u r m e s s a g e t o t h e o p e r a t o r. Yo u c a n u s e a n y string of 50 characters or less. If you are having problems with the network (such as d i f fi c u l t y c o n n e c t i n g t o I A F ) , y o u c a n c o m m u n i c a t e these problems to the network operator using the MS command• 60459500 C (OC) - FLOW CONTROL FOR OUTPUT DEVICES (PA) - PARITY PROCESSING The OC command specifies whether the terminal gen erates DC3s as a stop signal to the network and DCls as a resume signal for terminal output. The PA command specifies the parity processing to be performed by the network. Format: Format: ct PA-pa ct OC«option Parameter Parameter Des c r ipt ion ct Represents the network control character for your terminal as defined by the CT terminal def inition command. option Specifies whether to enable (Y) or disable (N) output control. If the network receives a DC3 while output control is enabled, it suspends output until it receives a DC1 or until you send another block of input. Description ct Represents the network control character for your terminal as defined by the CT terminal def inition command. pa Specifies the type of parity pro c e s s i n g . Yo u c a n s p e c i f y t h e following values for pa: pa E Description Set Output control applies to asynchronous terminals, including paper tape devices (except 2741s). (OP) • OUTPUT DEVICE SELECTION The OP command specifies the type of output device. Format: ct OP«op Parameter Des c r ipt ion ct Represents the network control character for your terminal as d e fi n e d b y t h e C T t e r m i n a l definition command. op S p e c i fi e s t h e o u t p u t d e v i c e . Yo u c a n s p e c i f y t h e f o l l o w i n g values for op: op Description D I S p e c i fi e s a d i s p l a y device. P R S p e c i fi e s a p r i n t e r . PT S p e c i fi e s a tape punch. paper You can punch a tape in any mode, but the network does not provide the proper X-OFF characters unless OP has a value of PT. If you select OP-PR, the network does line folding and page bounding for asynchronous and X.25 PSN terminals. If OP=>DI, the network assumes the ter minal performs these functions Itself. This command only applies to asynchronous terminals (except 2741s). OP-PT does not apply to X.25 PSN terminals. J^V 60459500 C parity bit for even parity during output, and check for even parity and set parity bit to zero on input. N In transparent mode, do not set or check the parity bit be cause it is part of the input or output data. In normalized mode, set the parity bit to zero on input and output. 0 Set parity bit for odd parity during output, and check for odd parity and set parity bit to zero on input. Z Set parity bit to zero on output and check parity bit against zero on input. 1 In transparent mode, do not set or check the parity bit be cause It is part of the input or output data. Ignore the parity bit when checking for trans parent input mode delimiters. In nor malized mode, set the parity bit to zero on input and output. This command only applies to asynchronous terminals (except 2741s). For X.25 PSN terminals, the parity bit is set to 0 and not checked for input. G-ll (PG) • PAGE WAITING Parameter The PG command enables or disables page waiting at the terminal during output. If you enable page waiting, the terminal stops at the end of each output page for your acknowledgement (a null input line) before output continues. ct Represents the network control character for your terminal as defined by the CT terminal def inition command. p w S p e c i fi e s t h e p a g e w i d t h . Y o u can specify a value of 0 or any value from 20 to 255. PW-0 s e l e c t s a n i n fi n i t e l y l o n g l i n e . Format: ct PG-option Parameter ct Des c r ipt ion Represents the network control character for your terminal as defined by the CT terminal def inition command. option Specifies whether to enable (Y) or disable (N) page waiting. When you enter a null input line to get the next page of output, the null input line has no other meaning. (SE) - SPECIAL EDITING MODE The SE command enables or disables the editing variant of normalized input mode. ct SE»option Parameter (PL) - PAGE LENGTH The PL command establishes the maximum number of physical lines that can be printed as one page. If OP has a value of PR, the network automatically positions the carriage to the top of the form after PL lines have been output. Format: ct PL-pl Des c r ipt ion ct Represents the network control character for your terminal as defined by the CT terminal def inition command. Pi S p e c i fi e s t h e p a g e l e n g t h . Yo u can specify 0 or any value from 8 to 255. PL-0 selects an In fi n i t e l y l o n g p a g e . The PL value must be nonzero if you want to enable page waiting, since page waiting only occurs after the number of lines defined by pl-1 are output. special Format: Page waiting does not apply to bisynchronous 2780 or 3780 terminals or to HASP terminals. Parameter Description Description ct Represents the network control character for your terminal as defined by the CT terminal def inition command. option Enables (Y) or disables (N) special editing operations. When special editing is in effect, any backspace character entered is stored for transmission to the h o s t . S i m i l a r l y, a l i n e f e e d e n t r y p r o d u c e s a normal line feed operation at the terminal and the network stores the line feed character code for transmission to the host. A backspace followed by a line feed causes the system to output a bell and an exclamation point on an ASCII terminal or an in verted caret (v) on an APL terminal below the last character entered. This command is only valid for asynchronous ter minals but not for X.25 PSN terminals. (TC) - TERMINAL CUSS COMMAND The TC command specifies a terminal class for your terminal. The terminal class associates your t e r m i n a l w i t h a p r e d e fi n e d s e t o f t e r m i n a l c h a r a c t e r i s t i c s . To e f f e c t i v e l y u s e a t e r m i n a l class, choose a terminal class whose default t e r m i n a l d e fi n i t i o n c o r r e s p o n d s t o t h e characteristics of your terminal. Format: (PW) - PAGE WIDTH The PW command establishes the maximum number of characters that the terminal prints on one output line. If OP has the value PR, the system automat ically starts a new line after pw characters have been output. Format: ct PW»pw • G-12 ct TC-tc Parameter Description ct Represents the network control character for your terminal as defined by the CT terminal def inition command. tc S p e c i fi e s t h e t e r m i n a l c l a s s . The value tc can be from 1 to 17. 60459500 C Parameter The following list associates terminal class values with terminal types: tc J 0 ^ Ly I M33, M35, M37, M38 teletypes 2 CDC 713-10, 722, 751-1, 752, 756 3 CDC 721 4 IBM 2741 5 M40 teletypes 6 Hazeltine 2000 7 Terminals conforming to the ANSI X3.64 standard (DEC VT100) 8 Tektronix 4010, 4014 9 HASP protocol, postprint format control 10 200 User Terminal 11 CDC 714-30 12 CDC 711-10 13 CDC 714-10/20 14 HASP protocol, preprint format control 15 CDC 734, 731-12, 732-12 16 IBM 2780 17 IBM 3780 18 IBM 3270 A terminal that is not shown as belonging to a ter minal class may still be operational. The terminal can be assigned to a terminal class having similar characteristics and the terminal's definition can be modified as necessary to correctly define the opera tional characteristics of the terminal. If your terminal is on an auto-recognition line and Its terminal class is other than 1, 4, 10, or 13, you can use the TC command to change its terminal class to ensure proper operation. If you include a TC command in a sequence of ter minal definition commands, enter the TC command fi r s t a s I t r e s e t s a l l o t h e r t e r m i n a l c h a r a c t e r istics. (TM) - TERMINATING A TERMINAL-HOST CONNECTION The TM command severs the connection between your terminal and a host. Format: ct TM J®>^ 60459500 C ct Terminal Type Description Represents the network control character for your terminal as defined by the CT command. You can use the TM command if your application does not respond to your input. The system responds to the TM command in the following manner: host status had prompt CONTROL CHARACTER=ct The variable items have the following descriptions: Item host status D e s c r i p t i on Indicates the status of the host y o u h a v e j u s t s p e c i fi e d o r t o which you are/were connected. You can get any one of the fol lowing messages: HOST AVAILABLE HOST BUSY HOST CONNECTED HOST DISCONNECTED HOST UNAVAILABLE NO HOST AVAILABLE NO HOST CONNECTED NO HOST SELECTED ct Represents the network control character for your terminal as defined by the CT command. had Represents the host availability display (HAD). The HAD appears only if you have enabled its automatic display (refer to the HD command). prompt Represents an action the system wants you to take or a status message. You can get any one of the following prompts: ENTER Ct HD TO SEE HOST STATUS ENTER Ct HN=NN TO SELECT HOST ENTER INPUT TO CONNECT TO HOST INPUT DISCARDED READY FOR INPUT TERMINAL DISABLED BY NOP (XL) - MULTIMESSAGE TRANSPARENT MODE The network provides a transparent mode that allows you to remain in transparent input mode even after message blocks have been forwarded to the applica tion. The XL command specifies the multimessageforwarding signal and the terminator for transparent Input mode. If your terminal's parity Is set to even, odd, or zero (PA-E, 0 or Z), the parity bit Is stripped (set to zero) before the characters are sent to the host, although no translation occurs. If your terminal's parity Is set to none or ignore ( PA « N o r I ) , t h e p a r i t y b i t I s n o t s t r i p p e d . S e e the NAM/CCP Terminal Interfaces Reference manual for more Information on transparent Input and parity. G-13 Format: Parameter ct XL-Xxx,Ccount,TO,Yyy Parameter Description ct Represents the network control character for your terminal as defined by the CT terminal def inition command. Xxx Selects the character with the two-digit hexadecimal represen tation xx as the messageforwarding signal. If you do not s p e c i f y a v a l u e y y, t h e o c c u r rence of two successive charac ters defined by xx acts as a ter minator for transparent input mode. When you specify a hexa decimal code above 7F, you must have previously set your ter minal's parity to none (PA-N) or ignore (PA-I); otherwise the net work cannot detect the code when it occurs in a transparent mode message. Ccount Selects a decimal value from 1 to 40951 as a character count that functions as a messageforwarding signal. TO Selects timeout as a transparent input mode terminator. Yyy Selects the character with the two-digit hexadecimal represen Description tation yy as a terminator for transparent input mode when it follows xx. When you specify a hexadecimal code above 7F, you must have previously set your terminal's parity to none (PA-N) o r i g n o r e ( PA - I ) ; o t h e r w i s e t h e network cannot detect the code w h e n i t o c c u r s i n a t r a n sparent mode message. Y y y, I f s p e c i fi e d , m u s t f o l l o w t h e X x x p a r a m e t e r ; otherwise, it is ignored. The parameters are o t h e r w i s e o r d e r - i n d e p e n d e n t . Yo u m u s t s p e c i f y a t least one of Xxx or TO to select a transparent mode t e r m i n a t o r. W h e n i t i m m e d i a t e l y f o l l o w s t h e c h a r a c t e r d e fi n e d b y X x x o n i n p u t , t h e c h a r a c t e r d e fi n e d b y y y t e r m i n a t e s t r a n s p a r e n t i n p u t m o d e . T h e c h a r a c t e r s d e fi n e d b y X x x a n d Y y y c a n b e identical or you can omit Yyy. In either case, two s u c c e s s i v e i n p u t c h a r a c t e r s d e fi n e d b y X x x a r e required to terminate transparent mode. The message-forwarding signals and mode terminators are not sent to the host. /^'SaSSs. This command cancels all transparent mode termina tors and delimiters defined by the DL command or a previous XL command. You can select multimessage transparent input mode by using the XL command in conjunction with the IN command and selecting IN-X, IN-XK, or IN-XP. This command does not apply to HASP and bisynchro nous terminals. tThese values are valid with the network. However, unless changed during Installation, the maximum logical input line length in IAF (160 characters) limits you. • G-14 /SE8V 60459500 C y/^S^V Table G-l. Default Terminal Definitions Te r a t n e l T y p e s Naaeooic TC Detcriptloa TIT Ml) CDC 713-10. 722,731-1. 712,796 Te r m i n a l c l o u CDC ! IM 721 2741 TTt IhAZ M40-2 2000 X3.64 occ Te k j 4000 ASP 1 CDC x.:7T HPOST i 200 any VT100 J i COC 714-10, 714-20 HASP PRE CDC 734 IBM ! i n 2710 1780 UN 3270 10 11 12 1) 14 13 16 17 IS CAB na na na na na na na na na na na I (I) oa I I 1 1 na na na I na na na na na na na !(6) (0) CAB CDC 711-10 j UT ]1 CAB CDC 714-10 Al Abort output block CAB CAM CAN CAB W Slocking (actor 1 I 1 I I 1 as teckapace character IS SS IS none as IS IS (I) t l Oa.r break 1 ou ou ou OU su DU DU (I) na na OCA OCA OCA 0C4 DC* oc* (l> na ae )<7) na na am na na na am na na na 12 a Our brack 1 Carriage renin tdlee a Cancel character DL u na Iraak aa ua.r break 1 (and cancel character) C I a a OC* a /^PN tsc ISC isc CR KL Cl at Cl 204) na 204) 2041 204) Bo Bo aa Bo No tor tOT na COT CL CL na CL Ct BL LP na (SC ISC Character dallalcer Ct at Character count dellalter :o*j 2043 Timeout dellaiter Bo COT na na (1) na na na na na na na na na na (I) na na na na ne na na na ne na (I) X X X X X X X X X X Cl (1) na (41 (4) (4) (4) ne (*) ne oa 204) (1) na no na na ne na na na na Z! No No (1) na na na ne ne na na COT COT COT (2) aa (4) (4) (4) (4) Oat (4) na na na CL CL CL Bo na Bo No No Bo ft* No na na na at at Ct Cl (1) na (3) (S> ()> (3) TU ()) na ne na i f LP LP LT Bo na No No No Bo rt* No na na na no na na na tu na na ne na aa na na na am na na KB Slsgle-axaeaga treaenercot Input aoda na tad-of-block Cod-of-logical line Character Cl Conor poaltlonlng L» LP IB Input device I t Line (oed tdlee U lockout NOP aeeaatea oc Output device (lew control Output device PA rarity processing PS feae waiting n. fare length fW hfe width na Kl Kg Kl Kl Kl aa na na na na na na na CK no CK B K ax M C aa B K (I) KM na na aa na aa na na na (1) No No No Bo No No na na ft Bo na na f t 01 01 rt DI 01 01 DI aa 72 24 30 SO (0 1)2 No Bo No No (I) na na na ae ()) na as na ne (1) aa na » • oa na na «M na na na . na oa na na na aa 24 27 24 33 (I) 0 1) 16 16 16 0 1) 0 0 24 to 74 CO 74 (I) SO ao SO SO to eo 80 60 120 ao na na na na na na na na na ne na No na No No No No n. No na na na Special adltlRf aoda rtolttaeesaie transparent Input eode (l* na Input device (1cm control or na na Cchoplcx aoda foil ASCII Input aoda IL X CAB aa Conor paaltloalnt tu tc sc CAN ESC CAB Cureor poaltlonlng a CAB CAB Character a. CAB CAB Network control character IS No No No No (0) Teralnale belong to urelul claaece 1 th (1) (I) (1) (4) (5) (6) (7) ough ) of i through t. S u a a . ( o c t h e t c r a l M t I f I t w e r e n o t e c n n e c t e d v i a i p a c k e t - s w t t h i n g networtk. Cad-ot-packet laouence (H bit It reeet to t . r o ) . The portly bit 1. Ignored oa Input and to generated fo r output aa o r t h * beele t.ral nal type. CTX (moulting (roa eh. SEND key). CSC A (reeuttlng (roa th. CAJUIUCI tfTUXN k e y ) . Prograa attention k«r 1 1. a valid eaar b aak 1. Prograa attention key 2 le a «at!4 tiaar b cak 2. 0^*-. 60459500 C G-15 Table G-2. Parameter Ranges for Terminal Definition Commands (Sheet I of 2) Terolnal Typea KaeBonli tty Deacrlptlon N33 CDC 713-10, 722,751-1, 752,756 CDC 721 laM 2741 TTT K40-2 HAZ 2000 X3.64 OEC VT100 Te k 4000 X.25 any HASP POST CDC 200 OT CDC 714-30 CDC 711-10 CDC HASP 714-10, PRE 714-20 CDC 734 IBM 2780 IBM 3780 IBM 3270 TC Te r m i n a l c l a i a 10 11 12 13 14 IS 16 17 18 AB Abort output block (1) (1) (I) (1) (1) (I) (0 (1) na na na na na na aa na na oa na BF Blocking factor 0-2 0-2 0-2 0-2 0-2 0-2 0-2 0-2 (2) na 0-2 C-2 0-2 0-2 na 0-2 na na 0-2 BS Backepaco character (1) (1) (I) (1) (0,(7) (l> (I) (1) (2) ne na na na na aa na na na na Bl User break 1 (1) (1) (I) (1) (1) (1) (1) (t> (2) (l> (1) (I) (1) (I) (1) (1) na na (D B2 Ueer break 2 (1) (l) (1) (1) (1) (2) (1) (1) (1> (1) (1) (1) (I) na na (1) BR Brtak aa uaar break I Y. N (and cancel character) ( Y, N ) Y, N ( Y. N ) Y. N ( Y. N ) na na Y, N (Y,N) Y,N (Y.N) Y. N (Y.N) Y. N (Y.N) (2) oa na na na na na na na na na na Cl Carriage re cum ldlea 0-99, ca 0-99, CA 0-99, CA 0-99, CA 0-99, CA 0-99, CA 0-99. ca 0-99, CA (2) na na na na na na na na na na CN Cancel character (i> (1) (l> (1) (1) (1) (1) (l> (2) (1) (I) (1) (1) (1) (1) (1) na na (1) CP Curaor poaltlonlng Y. N Y. N Y. N na Y.N Y.N Y,N Y.N (2) na na na na na na na na na na CT Network control character (1) (1) (1) (1) (1) u> (1) (2) (1) (1) (l> (I) (1) (t) (1) (I) (I) (1) DL Slngla-aeiMge tranapareat Input lode Character dellatter 0-FF 0-FF 0-FF 6D 0-FF 0-FF 0-FF 0-FF (2> na 03 03 03 03 na 03 na na na Character count dellalter 1-4095 1-4095 na na 1-4093 1-4093 1-4093 1-4093 (2> na na oa na na na na na na oa Tlstcout dellalter TO TO TO na TO TO TO TO (2) na na na na na na na ne na na Character (1). El, EB O ) . EL, EB (l> EL, EB na (1). El, EB (I). EL, EB (l>. EL. EB (1), ei. EB (2) na EB CB EB EB na EB na na na Curaor poatclonlng (3> (3) (3) na (3) (3) (3) (3) (2) na No No H> No na No na na na (t). EL, EB na (1). El, (I). EL, EB (1). EL, EB EB, EL EB, El EB. El EB, EL na CB, EL na na na » (l>. El, EB na Cl. EB (2) EL, SB <3) <3) (3) (3) (3) (3) (3) No na No So No No na No na na na EB EL (0) End-of-block End-of-logleal line Character Curaor poaltlonlng *^™^v Table G-2. Parameter Ranges for Terminal Definition Commands (Sheet 2 of 2) Teralnal Typea Kne■o n l c EP FA Deacrlptlon Cchoplax aoda Full ASCII Input aode TTY H33 C K 713-10, 722,751-1. 752,756 Y. N Y,N Y. N IBM 2741 TTT H40-2 HAZ 2000 X3.&4 DEC VT100 Tek 4000 X.25 any HASP POST CDC Y, N na Y. N Y. N Y. N Y. N na na na Y. N Y.N Y.N Y. N Y. N Y. N (2) na na na 200 UT CDC 714-30 aa CDC 711-10 na HASP PRE CDC 734 IBM 2780 IBM IBM 3780 3270 na na na na na na Y. N na na na na na na na na na na CDC 714-10. 714-20 Y.N Y. N Y.N Y. N na na na na na na IC Input device (low control Y, N Y. H Y. N na Y. N Y. N Y. N Y.N IN Input device (4) (4) (4) KB,XX. ( 4 ) X (4) (4) (4) Line feed ldlea 0-99, CA 0-99. CA 0-99, CA 0-99, CA 0-99. CA 0-99, CA 0-99 a 0-99, CA (2) na na na na na oa na na na na LI ! LK lockout aeaeagea Y. N Y. N Y. N Y. N Y.N Y.N Y. N Y. N (2) Y.N Y. N Y. H T. N Y. N Y. N Y. N na na Y. N j na na na na na na na na na ' "i OC Output device flow control Y.N Y. N Y. N na Y.N Y.N Y. N Y. N na na na OP (5) (3) (5) PR, DI (5) (5) (S) (5) PR, DI na na na na na na na na na Output device n. j Parity processing Z.O, E.N Z.O. E.N Z.O E.N na Z.O. E.N Z.O, E.N Z.O. E.N Z.O. E.H (6) na na na na na na na na na na PA PC Y. N Y. N Y. N Y. N Y. N Y. N Y.N Y.N (2) na Y.N Y. N Y.N Y. N na Y. N na na Page waiting Y. N 0,8255 0.8255 0,8255 0,8255 0,8255 0.8255 PL Page length 0,8255 0.8255 0,8255 0,8255 0,8255 0.8255 0,8255 0,8255 (2) PW Page width 235 0.20255 0.20255 0,20255 0.20255 0,20255 0,20255 0,20255 0,20- (2) 255 0,20- 0,20255 255 0,20255 0,20255 0,20255 0 , 2 0 - 0 , 2 0 - 0 , 2 0 - 0 , 2 0 - 0,20255 255 255 255 SE Special editing aode Y. N T. N Y. N Y.N Y.N Y.N Y.N Y. N aa na na na na na na na na na na TC Te r a l n a l c l a a a I n p u t 1,2.3. 5-8 1.2.3, 5-8 1.2.3, 5-8 1.2.3, 5-8 1.2.3. 1.2.3, 1.2.3. 1.2.3, 5-8 5-8 5-8 5-8 10,15 11-13 11-13 11-13 14 10,15 16 17 18 XL Kultlaeaeage tranaparent Input aode 0-FF 0-FF O-FF 0-FF 0-FF 03 03 03 03 oa 03 na na na na na na Character dellalter C h a r a c t e r t e r a l n a t o r 0-FF Ti m e o u t d e l l a l t e r 0$^. Y. N CDC 721 Character count dellalter TO I-409S 0-FF TO 1-4095 0-FF TO 2D 2D na 1-409! na 0-FF TO 1-4095 0-FF TO O-FF 0-FF TO O-FF O-FF TO (2) (2) na 1-4093 1-4095 1-4095 ( 2 ) na na oa na oa aa na oa aa na na na na na na na na na na na na oa na oa na aa oa oa ( 0 ) Te r a l n a l a b e l o n g t o u r a l n a l c l a o e e e I t hrough 3 or 5 through 8 (1) Any character (roa the ASCII 128-eharacter eat except any lowereaae or upperca ae alphabetic c h a r a c t e r, a n y d i g i t 0 through 9, MILL. SOU, STX OIL, or apace. (2) Saae aa (or the teralnel If It were not connccted by a packet-awitching networ k . (3) CR, IF, CL, NO. (4) KB. PT. BK, X, XK. XP. (3) PI, DI, PT. la generated for output. (6) Seae aa for the terminal If It were not connccted by a packet-awitching networ k . P a r i t y l a Ignored on Input and (7) ASCII BS character code (8 bcxadeclaal) cannot be uaed. 0^ 60459500 C G-17 DELIMITING AND TRANSMITTING TERMINAL INPUT /0^ You can transmit input to an application in normal ized mode (also called character mode) or transparent mode (also called binary mode). In transparent input mode, the network does not convert any of your input but sends it directly to your application. Charac ters like LF and BS, which the network normally strips from the input stream, become part of the data sent to your application. Appendix G describes how you delimit and transmit input in transparent mode (refer to the DL and XL commands). The default input mode for all supported terminal classes is normalized m o d e , h o w e v e r. T h e r e m a i n d e r o f t h i s a p p e n d i x describes how to delimit and transmit terminal input in normalized mode under the default conditions of the various terminal classes. (Appendix G also describes how you can change these defaults.) PHYSICAL END-OF-LINE (LINE FEED) In terminal classes 1 through 8, you can terminate a p h y s i c a l l i n e o f i n p u t w i t h a l i n e f e e d k e y. T h e network also terminates a physical line of output whenever the page width of a terminal is reached (refer to the PW conn and in appendix G). The network may respond to the line, feed key by advancing the cursor or carriage to the beginning of the next line (refer to the CP command in appendix G). This key is transparent to TAF. When the terminal is not in block mode, it performs the same function as the carriage return but does not initiate the t r a n s a c t i o n . R a t h e r, i t c a u s e s t h e m e s s a g e t o b e stored in the communication block chain until the message transmission key is pressed. LOGICAL END-OF-LINE (CARRIAGE RETURN) Yo u t e r m i n a t e a l o g i c a l l i n e o f i n p u t w i t h a c a r r i a g e r e t u r n k e y. A l o g i c a l l i n e c a n c o n s i s t o f one or more physical lines but not vice versa. The network may respond to the carriage return by advancing the cursor or carriage to the next line (refer to the EL command in appendix G). MESSAGE TRANSMISSION Yo u t r a n s m i t y o u r i n p u t t o t h e n e t w o r k w i t h t h e message transmission key. For non-blocks ode devices, the message transmission key is the carriage return k e y. H e n c e , f o r t h e s e t e r m i n a l c l a s s e s , l o g i c a l l i n e s a r e t r a n s m i t t e d s e p a r a t e l y. W h e n t h e delimiter for the logical end-of-line and transmission key are different (as with block mode devices, including PSN and mode 4 terminals), the terminal stores logical lines until you press the t r a n s m i s s i o n k e y. I t t h e n s e n d s t h e s i n g l e transmission consisting of multiple logical lines to the network. The network sends each logical line separately to your application. Ta b l e H - l s h o w s t h e k e y s u s e d b y t h e v a r i o u s terminal classes to perform the three functions just described. 0^\ /^SV 60459500 B H-l Table H-l. Default Message Delimiter and Transmission Keys Function Terminal Class 1 Physical End-ofLine (Line Feed) LINE FEED Logical End-of-Line (Carriage Return) Message Transmission Key RETURN RETURN 2 J RETURN RETURNt 4 ATTN RETURN RETURN 5 NEW LINE RETURN RETURN 6 LF CR CR 7 LINE FEED CARRIAGE RETURN CARRIAGE RETURN 8 LF RETURN RETURN 9 Varies tt Va r i e s t t Va r i e s t t 10 None RETURN SEND 11 None RETURN SEND 12 None NEW LINE ETX 13 None NEW LINE ETX 14 Va r i e s t t Va r i e s t t Va r i e s t t 15 None NEW LINE SEND 16 None E M EOT 17 None EM EOT 18 None Varies ENTER tlf in block mode, refer to terminal documentation for terminal key equivalences. Those listed are for character and line modes, tt Terminals operating under HASP protocol use different keys for this purpose. H-2 60459500 C DETECTION OF POTENTIALLY BLOCKED TASKS TAF prevents situations from occuring in which the execution of a task is blocked because it is impossible under the circumstances to obtain the needed central memory space for the task, whether for an initial load or a memory increase. Several t e r m s w i l l b e d e fi n e d t o a i d i n t h e d e s c r i p t i o n o f how potentially blocked tasks are detected: • Minimum size of the total task area /pPNv The total task area is the CM in which TAF will schedule tasks. It includes the space occupied by CM-resident tasks. The area e x t e n d s f r o m t h e fi r s t w o r d a d d r e s s i n t o which tasks can be loaded to the maximum fi e l d l e n g t h o f TA F. T h e s i z e o f t h i s a r e a fluctuates if the TAF/CRM Data Manager is used. The minimum size of this area occurs when the TAF/CRM buffer takes on its maximum size. • Minimum size of the transient task area 0^\ The transient task area is that portion of the total task area not occupied by CM-resident tasks. The minimum size of this area is defined to be the minimum size of the total task area minus the sum of the MFLs of all CM-resident tasks. One or more tasks will be considered to be potentially blocked under the following circumstances. • If the initial field lengths of the CM-resident tasks are so large that they all couldn not be loaded together. • If the sum of the MFLs for the CM-resident tasks exceeds the minimum size of the total task area. • If the MFL of a non-CM-resident task exceeds the minimum size of the transient task area. Following are the situations when potentially blocked tasks are detected and the actions that are taken. • A t TA F i n i t i a l i z a t i o n . P o t e n t i a l l y b l o c k e d tasks result in TAF being aborted. • W h e n TA F i s i n f o r m e d , v i a t h e L I B TA S K T T option, of the update of a task library a t t a c h e d b y TA F a n d t h e l i b r a r y c o n t a i n s potentially blocked tasks, the update will be rejected. • When an attempt is made to reduce the MFL of TAF via the K.MAXFL command to a value that results in potentially blocked tasks, the command will be rejected. The preceding checking assumes that the maximum fi e l d l e n g t h o f TA F i s s e t ( b y d e f a u l t , v i a K . M F L , or via K.MAXFL commands) to a value that can be attained. j^HPn, 60459500 A I-1 J ^ v ACCESSING A HOST This appendix describes the steps used to access a host and to use CDC network software. The login procedure can be divided into eight steps. Gathering information. Setting up your terminal. Connecting your terminal to the network. Identifying your terminal to the network. Selecting a host. /ifls^K Connecting to the selected host. Asynchronous terminals Asynchronous terminals using X.25 protocol CDC mode 4 synchronous terminals Houston Automatic Spooling Program (HASP) terminals Bisynchronous terminals like IBM 2780/3780 Bisynchronous terminals like IBM 3270 • Must you supply a family name, user name, password, and application name during login? If so, get the required information. • Does your terminal use the ASCII character set and code? Identifying yourself and your terminal to the host. • Selecting a network application. T h e fi r s t p a r t o f t h i s a p p e n d i x g i v e s a b r i e f description of the eight steps. The second part of th e a p p e n d i x g i v e s a m o r e d e t a i l e d d e s c r i p t i o n o f the same eight steps followed by additional general i n f o r m a t i o n . Yo u m a y fi n d t h e b r i e f d e s c r i p t i o n o f t h e s t e p s s u f fi c i e n t t o a c c o m p l i s h l o g i n a t y o u r site. If not, consult the detailed description. In addition to more detail, it provides shortcuts, the various options that are available at any given step, and failure conditions. STEP 2 - SETTING UP YOUR TERMINAL • Turn power switch on. • Load and initialize any software or controlware needed by your terminal. • Set the terminal's duplex or echoplex switch to the correct position (typically HALF if your keyboard entries appear unduplicated on your console's screen or printer). • Set the terminal's parity switch to its proper position. BRIEF DESCRIPTION OF ACCESS • Set the line speed switch to its proper setting. STEP 1 • GATHERING INFORMATION • Set the transmission mode to either the character or line mode position. Find the answers to the following questions. • Is your terminal hardwired to the system? • Which key is the data transmission key for your terminal? • If you have a dialup terminal, what telephone number must you dial? • Into which of the following categories does your terminal fall? 60459500 C • Set the online/offline switch to the online position. STEP 3 • CONNECTING YOUR TERMINAL TO THE NETWORK Skip this step if your terminal is hardwired. Otherwise, determine which of the configurations in figures J-l, J-2, J-3, and J-4 most closely matches your terminal and follow the instructions in the fi g u r e . J-l /C="*iS!v 1. Turn on coupler. 2. Pick up receiver. 3. Dial phone number. 4. Wait for high-pitched tone. 5. Fit receiver into coupler. Be sure you put the cord end of the receiver into the correct cup, as indicated on the coupler. l\w\ & l o ^ ^ = " \ 1 (. Figure J-l. Separate Acoustic Coupler 1. Pick up receiver. 2. Push button, such as ORIG but ton on Teletype model 33 or 35. 3. Dial phone number. 4. Wait for high-pitched tone. __J S3 o o o o o o □ o 5. Push button, such as ORIG but ton on Teletype model 33 or 35. 6 . R e p l a c e r e c e i v e r. Figure J-2. Data Set Built Into the Terminal 1. Pick up receiver. 2. Set switch to TALK or pu3h TALK button. 3. Dial phone number. 4. Wait for high-pitched tone. 5. Set switch to DATA or push DATA button. 6. Replace receiver. Figure J-3. Data Sets with Switches and Buttons • J-2 60459500 C /£^v 1. Pick up receiver. 2. Dial phone number. 3. Wait for high-pitched tone. 4 . F i t r e c e i v e r i n t o c o u p l e r. B e sure you put the cord end of the receiver into the correct cup, as indicated on the c o u p l e r. 000 000000000 oaaaoac. OOQOO ooc Figure J-4. Terminal with Built-in Acoustic Coupler STEP 4 - IDENTIFYING YOUR TERMINAL TO THE NETWORK If the network does not prompt you within a few seconds after you are connected to it (there might be a light on the terminal that indicates when your terminal is connected), perform the appropriate following steps. • For asynchronous terminals not using X.25 protocol: a. Press the key that transmits a carriage return. The network responds with two line feeds when it recognizes your line speed. b. Type a closing parenthesis (not required if the terminal uses the ASCII character set and code) and press the carriage return key. When the network recognizes your character code set, it responds with a line feed. • For asynchronous terminals using X.25 protocol: Get the Information from your site. • For 3270 bisynchronous terminals: N o i d e n t i fi c a t i o n i s n e c e s s a r y. STEP 5 - SELECTING A HOST If you have a choice of hosts or host paths (multihost), the network displays a list of the hosts and host paths that are available and prompts you to make a selection. Otherwise, you can enter: ct HD to get a list of hosts, ct is your terminal's net work control character (refer to the NOS Reference Set, Volume 3, System Commands). Make your selection with one of the following commands * ct HN=node or ct HS=hostnarae node is the number of a host path; and hostname is the name of a host. • For mode 4 synchronous terminals: Press the data transmission key. • For HASP and 2780/3780 bisynchronous terminals: Send a /*C0NFIG card image. 0^ 60459500 C STEP 6 • CONNECTING TO THE SELECTED HOST If your terminal was not automatically connected to a host, the network prompts you to connect. Enter a carriage return to make the connection. J-3 STEP 7 ■ IDENTIFYING YOURSELF AND YOUR TERMINAL TO THE HOST Once your terminal is connected to the host, the host displays a banner similar to: WELCOME TO THE NOS SOFTWARE SYSTEM. COPYRIGHT CONTROL DATA 1978, 198X. date time terminal name site identification NOS 2 PSR Level number Following this banner, you may be prompted for a family name, then a user name, then a password, and fi n a l l y a n a p p l i c a t i o n n a m e ( i f t h e r e i s n o default). For each prompt, enter the appropriate Information followed by a carriage return. STEP 8 • SELECTING A NETWORK APPLICATION If your login is successful, your terminal is placed under the control of the requested or default application, which then prompts you for a command. DETAILED DESCRIPTION OF ACCESS The following description covers in more detail the eight steps briefly described earlier. Although each of the steps is always performed when a terminal accesses the system, you might find that your net work's administrators can make many of these steps unnecessary by having the software perform the steps for you. STEP 1 - GATHERING INFORMATION If you know the answers to the following questions, or can get the answers from people at your site, the text following each question will tell you which steps and corresponding subsections of this appendix you can skip. If you cannot answer the questions, read all of the subsections; each procedure description contains hints for answering the questions. 1. Is the terminal hardwired, or is it a dialup terminal? A hardwired terminal is connected directly to the network through a device called a modulator/demodulator (modem). A modem can be either a separate box, or built into the terminal. A dial-up terminal temporarily connects to the network through a telephone line and either an acoustic coupler or a telephone data set (a coupler or data set does the same things as a modem). If you do not need to dial a telephone number to use the network, then your terminal is hardwired. (A nearby telephone does not ne cessarily mean the terminal is dial-up.) 2 . I s y o u r n e t w o r k c o n fi g u r e d f o r a u t o m a t i c recognition? • J-4 Yo u r s i t e c a n a s k t h e n e t w o r k s o f t w a r e t o determine certain things about your terminal when the terminal joins the network. This process is called automatic recognition. [Terminals using X.25 packet-switching net works (PSN) cannot use automatic recogni tion.] I f y o u r n e t w o r k i s c o n fi g u r e d f o r a u t o m a t i c recognition, you must perform an extra step each time you connect your terminal to the network. If your terminal is not so con figured, you may skip questions 3 and 4. 3. What protocol does your terminal use? Y o u r t e r m i n a l m u s t fi t I n t o o n e o f t h e following categories. • Asynchronous terminals that work like teletypewriters or IBM 2741 ter minals. • Asynchronous using an X.25 PSN through a packet assembly/disassembly ( PA D ) s e r v i c e ; t h e s e t e r m i n als work like teletypewriters. • CDC mode 4 synchronous; mode 4A ter minals work like the CDC 200 User Te r m i n a l , w h i l e m o d e 4 C t e r m i n a l s work like CDC 711 or 714 terminals. • HASP terminals. • Bisynchronous terminals that work like IBM 2780, 3270 or 3780 ter minals . If your terminal operating manual does not tell you what protocol your terminal uses, question 4 and the terminal classes shown in the NOS Reference Set, Volume 3, System Com mands might help you answer this question. If your network is not configured for auto matic recognition, skip question 4. / ^^S\ The network software cannot use information from a /♦SIGNON card image. When such a card image is received in a signon block, the signon block con tents are discarded. Instead, the network software uses a /*CONFIG state m e n t f o r t h e a u t o m a t i c r e c o g n i t i o n p r o c e d u r e . Yo u can send the /*CONFIG statement in the signon block when your terminal permits you to provide the con tents of that block. If the signon block does not contain the /*CONFtG statement and the terminal must use automatic recognition, a prompt requesting that statement is sent to the terminal console. When a prompt for the statement appears, enter the statement through a card reader. Parameter ti Description Te r m i n a l type: POST HASP postprint (de fault); this is ter minal class 9. PRE HASP preprint; this is terminal class 14. C 0 = c o C o n fi g u r a t i o n o r d i n a l , a d e c i m a l integer from 1 to 255; the de f a u l t i s 1 . U s e t h e c o n fi g u r a tion ordinal to select one of s e v e r a l t e r m i n a l d e fi n i t i o n s d e fined for the line that describes a s p e c i fi c c o m b i n a t i o n o f a d d i tional characteristics. Site ad ministration personnel can tell you the correct number to use* CR=x I d e n t i fi e s available card readers. The default is 1. LP=x I d e n t i fi e s available line printers. The default is 1. CP=y I d e n t i fi e s available card punches; y cannot equal z. The default is 1. P L = z I d e n t i fi e s a v a i l a b l e p l o t t e r s ; y cannot equal z. No default exists for z; you cannot omit PL-z if you have a plotter. x, y, or z is a list of numbers specified by either: 1/2/ . . . /7 ALL (all numbers from 1 through 7) The numbers you use for x, y, and z must match the HASP stream numbers used for the corresponding de vices within the workstation. Site administration personnel should have this Information if you do not know what numbers to use. For example: /*C0NFIG,PRE,C0=2,CR=2,LP=2/3,CP=4/PL=5 i d e n t i fi e s y o u r t e r m i n a l a s t h e s e c o n d p r e p r i n t i n g w o r k s t a t i o n d e fi n e d f o r t h e c o m m u n i c a t i o n l i n e , having: • A card reader and line printer on stream 2. • Another printer on stream 3. • A card punch on stream 4. • A plotter on stream 5. The format of the /*CONFIG statement is: /*C0NFIG,t i,CO=co,CR=x,LP=x,CP=y,PL=z Blanks are not allowed within the statement; a blank ends parameter processing. The parameters, which you can specify in any order, are: 60459500 C If no prompt for a /*C0NFIG statement appears, you are ready for the next step. The software sends you a message that helps you decide which step comes next. Turn to the subsection appropriate for the next step you must perform. J-9 Procedure for Mode 4 Terminals /*C0NFIG,3780,C0=4,CR,LP,CP=2 Mode 4 terminals belong to terminal classes 10 through 13 and 15. For automatic recognition, press the end-of-block key within 1 minute of physical con nection. You are ready for the next step. The software sends you a message that helps you decide which step comes n e x t . Tu r n t o t h e s u b s e c t i o n a p p r o p r i a t e f o r t h e next step you must perform. Procedure for Bisynchronous Terminals Bisynchronous terminals belong to terminal classes 16, 17, and 18. Enter a /*C0NFIG statement to specify the type of terminal and the devices avail able at it. The format of the /*C0NFIG statement is: /*C0NFIG,ti,C0=co,CR,LP*CP=y Blanks are not allowed within the statement; a blank ends parameter processing. The parameters, which you can specify in any order, are as follows: Parameter ti Des c r ipt ion Terminal type: 2780 IBM 2780 (default); this is terminal class 16. 3780 IBM 3780; this is terminal class 17. 3270 IBM 3270; this is terminal class 18. C0=co C R Indicates an available card reader; assumed if not specified. LP Indicates an available line printer; assumed if not spe c i fi e d . CP=y For example: • J-10 T h e c o n fi g u r a t i o n o r d i n a l , a decimal integer from 1 through 255; the default is 1. Use the c o n fi g u a t i o n o r d i n a l t o s e l e c t o n e o f s e v e r a l t e r m i n a l d e fi n i t i o n s d e fi n e d f o r t h e l i n e t h a t describes a specific combination of additional characteristics. Site personnel can tell you the correct number to use. Indicates an available card punch; assumed not to exist if not specified. The »y portion is not allowed for 2780; for 3270 or 3780, the y portion is required and can be either 2 or 3 to cor respond to the device selection character DC2 or DC3. identifes your terminal as a 3780 terminal having: • A card reader and line printer* • A card punch, which is selected by the char acter code DC2. If no prompt for a /*CONFIG statement appears, you are ready for the next step. The software expecting the next step sends you a message which helps you decide which procedure comes n e x t . Tu r n t o t h e s u b s e c t i o n a p p r o p r i a t e f o r t h e next step you must perform. STEP 5 • SELECTING A HOST You might need to select the host, which runs the software you want to use. This is not necessary if your Installation personnel select a host path for your terminal when the network is configured. Yo u c a n s e l e c t o r c h a n g e a s i t e - d e fi n e d h o st path after you connect your terminal to the network. The host path selected is used until either you change it or until your terminal is disconnected from the network. More than one host path can be available to each host from a terminal. If one host path fails, you can select an alternate route to the host. Selecting a Host You can select a host or override a site-defined host selection with the following terminal definition com mand. ct HS=hostname ct represents the network control character for your terminal. For most asynchronous terminals this is ESC or X, Each host may be configured with a unique name. This name (1 through 7 characters) is indicated by hostname. For example: %HS=ARHN0S w o u l d s e l e c t t h e p a t h w i t h t h e l e a s t t r a f fi c t o t h e host called ARHNOS (Z represents your terminal's network control character). If you specify the name, your terminal uses the host p a t h w i t h t h e l e a s t t r a f fi c . If you do not know the name you need, the host availability display (HAD) can show you what names are available. That display is described later in this appendix. Once you have selected your host, you are ready for the next step. 60459500 C The software sends you a message that helps you d e c i d e w h i c h s t e p c o m e s n e x t . Tu r n t o t h e s u b section appropriate for the next step you must perform. Selecting a Specific Host Path U s e t h e f o l l o w i n g t e r m i n a l d e fi n i t i o n c o m m a n d t o select your own host path or to override the sitedefined host path. ct HN=nn ct represents the network control character for your terminal. For most asynchronous terminals this is ESC or X. E a c h a c c e s s h a s a u n i q u e n u m b e r, c a l l e d a n o d e n u m b e r. T h e h o s t n o d e n u m b e r ( 1 t h r o u g h 3 1 ) i s indicated by nn. Controlling the Display of Host Paths T h e h o s t a v a i l a b i l i t y d i s p l a y ( H A D ) ( fi g u r e J - 8 ) lists all host paths your terminal can currently use to gain access to the host and all hosts in the net work. You can turn display of the HAD on and off or request the display with the following terminal def inition command. For example: ct HD=option ct represents the network control character for your terminal. For most asynchronous terminals this is ESC or Z. %HN=2 would select access 2 (Z represents your terminal's network control character). iggjSRay If you omit the node number, your terminal uses the host path the network is using to communicate with its supervising host. If you do not know the node number you need, the host availability display (HAD) can show you what numbers are available. That display is described in the following subsection. Each node number may have a name for Its host, provided by your site to help you identify the corresponding host system on the HAD. Once you have selected the host path, you are ready for the next step. If the display mode Is N (no), you receive only two lines at your terminal (the host status message and the prompt message) instead of the full display when you disconnect your terminal from a host. If you enter HD=Y or HD, the full display is issued immediately when you disconnect your terminal from t h e h o s t . Yo u t h e n h a v e a c h o i c e o f h o s t s a n d / o r host paths to which you can request connection. If you have a multihost system, typically the HAD a p p e a r s w h e n y o u fi r s t a c c e s s t h e n e t w o r k . T h i s appearance is controlled by site installation. Display host status message NPU NODEs xx TERMINAL NAME= yyyyyy HOST NODE CONTROL CHARACTER = ct SELECTED/ CONNECTED STATUS host-) hosts node-) nodes condition-) conditions status-) statusj hostn noden conditionn statusn prompt message Figure J-8. Host Availability Display (Sheet 1 of 2) /f&i 60459500 C J-l I Field host status message Description Status of a given host, which can be one of the following: Message Meaning You Also See: HOST CONNECTED You are connected to the host. prompt message d or e NO HOST SELECTED Host is available; you have not selected a host. prompt message b NO HOST AVAILABLE No hosts are avail able. prompt message a HOST UNAVAILABLE You have selected a host that is not up. prompt message a HOST BUSY Connection rejected by host. prompt message a HOST DISCONNECTED Connection to host terminated. prompt message c or e HOST AVAILABLE You have selected host that is up. prompt message c NO HOST CONNECTED You are not connected to a host. prompt message c ct Network control character currently defined for your terminal. xx The number of the host node you are connected to. yyyyyy The terminal number of your terminal. host.; The 1- to 7-character name of a host; if the network only has one host, this can be blank. node, The host node number used in selecting a path through the network; 1 < node*; < 31. condition^ S ■ selected, not connected C - connected, not selected SC ■ selected and connected SA ■ selected, attempting connection status; Either AVAILABLE or NOT AVAILABLE; a host is only available when it is connected to the network. prompt message Action to take In response to a host status message, which can be one of the following: prompt message a: ENTER Ct HD TO SEE HOST STATUS prompt message b: ENTER ct HN=nn TO SELECT HOST prompt message c: ENTER INPUT TO CONNECT TO HOST prompt message d: READY FOR INPUT prompt message e: TERMINAL DISABLED BY NOP prompt message f: INPUT DISCARDED Figure J-8. Host Availability Display (Sheet 2 of 2) • J-12 60459500 C yUSfflJ^ STEP 6 • CONNECTING TO THE SELECTED HOST Yo u r s i t e p e r s o n n e l m i g h t h a v e c o n fi g u r e d y o u r terminal so th a t i t i s a u t o m a t i c a l l y c o n n e c t e d w i t h a host. If so, the network continues to attempt c o n n e c t i o n i n d e fi n i t e l y e i t h e r u n t i l t h e c o n n e c t i o n is completed or until you stop it by entering ct T M . Yo u c a n t e l l t h e n e t w o r k i s a t t e m p t i n g t o connect you when the HAD shows a SA status for any host. If your terminal is automatically connected to a host, you may skip this subsection. If not, you will have to ask for the connection to be made. You can ask to be connected to the selected host by entering a carriage return. If the carriage return is not preceded by an empty line, the information is d i s c a r d e d ( u n l e s s i t I s a v a l i d t e r m i n a l d e fi n i t i o n command). I f y o u r c o n n e c t i o n i s r e j e c t e d , y o u a r e n o t i fi e d . If you select another host path you must make another entry to complete a connection. The network software physically disconnects dial-up devices if you do not attempt connection to a host within 2 minutes of completing the previous step. Once you are connected to a host, you are ready for the next step. STEP 7 • IDENTIFYING YOURSELF AND YOUR TERMINAL TO THE HOST T h e s t e p t h a t i d e n t i fi e s y o u a n d y o u r t e r m i n a l t o t h e h o s t s y s t e m i s c a l l e d l o g i n . Yo u r t e r m i n a l i s i d e n t i fi e d t o t h e h o s t s y s t e m b y a s s i g n i n g i t a family name, a user name, and a password. The host can prompt you for each of these things. Yo u r s i t e c a n s e t u p y o u r t e r m i n a l c o n n e c t i o n s o that part or all of your login is done automati c a l l y. I f s o , y o u m i g h t n o t s e e t h e c o r r e s p o n d i n g prompt and you need not enter the information. Your site might also require use of a secure login initiation sequence, prior to login, to ensure that y o u s e n d y o u r u s e r i d e n t i fi c a t i o n t o t h e c o r r e c t host software. If required, the sequence contains a site-selected security character and the sequence will be recognized by the system at any time. De pending on your terminal type, the secure login initiation sequence is entered in one of the follow ing ways. • At an asynchronous terminal (not 2741), press the interactive interrupt key (BREAK or ATTN) and type the character at a 2741 terminal, press the NL key twice. Then enter the ATTN key, the character, and press the NL key. • At an X.25 terminal, press the interactive interrupt key, type the character, and press the message transmission key. • At a mode 4 terminal, clear the screen, press SEND, clear the screen again, type the char acter, and press the end-of-block key. • At a HASP terminal, type the character and press the end-of-line key. • At a 2780 or 3780, enter /* and the character from the console or a card reader. • At a 3270, clear the screen, press the pro gram attention 1 key, type the security char acter, and press the ENTER key. This action momentarily disconnects you from the host. You might need to reconnect your terminal to the host (if connection is not automatic). Now you are guaranteed that you are sending your login entries to the correct host software. R e f e r t o fi g u r e J - 9 f o r a s a m p l e l o g i n f r o m a n asynchronous terminal. In the example, the terminal has not been configured by site personnel for auto matic login. Everything you would typically enter is shown in lowercase. WELCOME TO THE NOS SOFTWARE SYSTEM. COPYRIGHT CONTROL DATA 1978, 198X. j^p^H.. 85/03/01. 09/51.06. T05A50 CDC NETWORK OPERATING SYSTEM FAMILY: USER NAME: jrc3069 PASSWORD: jane /T05A50 - APPLICATION: iaf NOS 2 Figure J-9. Sample Login from an Asynchronous Terminal /#^- 60459500 C J-13 Automatic Login The family name or user name assigned to your ter minal for an automatic login can be: • A mandatory value. • A default value. • A primary value. If a mandatory value is assigned, you do not receive a prompt and cannot use any other value. If a default value is assigned, you are prompted and you can either: enter an empty line as a response to the system prompt if you want either the default f a m i l y o r u s e r n a m e t o a p p l y, o r r e s p o n d t o t h e prompt with another value. The default family name value assigned to your t e r m i n a l f o r a u t o m a t i c l o g i n c a n b e d i ff e r e n t f r o m the default value used by the host for a family name. You can override the login default even when you do not know the system default; this procedure is described in the following subsection. If a primary value is assigned, you do not receive a p r o m p t t h e fi r s t t i m e l o g i n o c c u r s w h i l e y o u a r e connected to the host. Subsequent logins (refer to Restarting Login Identification) do prompt you. You can override a primary value for user name by entering a different value during an abbreviated login. Abbreviated login is described in a later subsection. The next line is either of the following prompts. FAMILY: This indicates that no mandatory or primary family name has been assigned to your ter minal. Enter the 1- to 7-character name of the storage device that contains your per manent files and press the carriage return. If you want to use the default login family name, just press the carriage return after t h e FA M I LY p r o m p t a p p e a r s . Yo u c a n a l s o enter a value of 0 to override a preassigned login default family name and use the system default family name. If you have no preas signed default family name, carriage return selects the system default family name. USER NAME: Thi3 indicates that no mandatory or primary user name has been assigned to your terminal. Enter the user name you were given. The user name, which can contain any combination of d i g i t s , l e t t e r s , a n d a s t e r i s k s , i d e n t i fi e s you as the terminal operator. The next prompt appears only after a USER NAME prompt has appeared. This final prompt is either: PASSWORD: PASSWORD: XXXXXXX Login Dialog Login begins when the system displays the following lines. WELCOME TO THE NOS SOFTWARE SYSTEM. COPYRIGHT CONTROL DATA 1978, 198X. Then a line appears with the date, time, and terminal name; for example: 83/12/28. 15.23.58. TERM201 N e x t i s a l i n e y o u r s i t e s u p p l i e s t h a t i d e n t i fi e s the host system used; something similar to: CDC NETWORK OPERATING SYSTEM NOS 2 J-14 The system attempts to preserve your password's s e c r e c y. I f y o u h a v e s e t y o u r t e r m i n a l a t f u l l duplex (refer to the NOS Reference Set, Volume 3, System Commands), your password will not be displayed when you enter it. You will not see what you type in. At some terminals, the network overprints several characters on a line and asks you to type your password on that line, as shown by the second PASSWORD prompt. After creating this row of overstruck characters, the cursor moves back to the fi r s t c h a r a c t e r. Enter the password currently associated with your user name. If you must enter the user name, you also must enter the password. No default exists for a password. 60459500 C You must respond to each prompt within 2 minutes. If you take too long to respond, this message is displayed at your terminal. TIMEOUT. Your terminal is then disconnected from the host. If you enter an unacceptable family name, user name, or password, you receive either the following message: IMPROPER LOGIN, TRY AGAIN. FAMILY: if no mandatory family name is assigned to your terminal, or: IMPROPER LOGIN, TRY AGAIN. USER NAME: if a mandatory family name is assigned. Reenter all needed login information, beginning with the requested parameter, regardless of when the error occurred. Yo u m u s t s p e l l e a c h l o g i n e n t r y c o r r e c t l y. I f y o u make a mistake, such as typing the letter 0 for the numeral 0 or the number 1 for the letter 1, your l o g i n w i l l n o t b e s u c c e s s f u l . Tr y a g a i n w h e n t h e prompting sequence restarts. You are allowed four consecutive chances to complete the login procedure. If you make four unsuccessful attempts to complete login, this message appears at your terminal: USER RETRY LIMIT. y^PfeS Yo u r t e r m i n a l i s t h e n d i s c o n n e c t e d f r o m t h e h o s t . If this happens, check the spelling of all of the e n t r i e s . I f y o u s p e l l e d e v e r y t h i n g c o r r e c t l y, contact a site administrator. When the family name, user name, and password are accepted by the host, you must next connect your terminal to an application, if there is no default network application. STEP 8 • SELECTING A NETWORK APPLICATION Yo u r s i t e m a y b e s e t u p s o t h a t y o u r t e r m i n a l i s connected to t h e I A F a p p l i c a t i o n a u t o m a ti c a l l y. O r your site may connect your terminal automatically to another application, depending on the installation. If so, you might not see the corresponding prompt. If not, you must complete this step yourself. You are allowed several chances to make a correct e n try. H o w e ve r, i f y o u f a i l t o c o n n e c t s u c c e s s f u l l y after four consecutive attempts, your terminal is automatically disconnected from the host. If this happens, check the spelling of the name you used. If the spelling was correct, contact a site a d m i n i s t r a t o r. a u t o m a t i c a l l y. Yo u r h o s t s i t e c a n c o n fi g u r e y o u r connection for either possibility by preassigning an automatic connection application name. A preassigned automatic application connection can be either mandatory or primary for the connection or i t c a n b e m a n d a t o r y f o r t h e u s e r. I f e i t h e r y o u o r your connection has a preassigned mandatory appli cation, you are not prompted, you are automatically connected to that application, and you cannot use any other application. If a mandatory application program is not running in the host, you are logged out and disconnected from that host. If a primary value is assigned, you are not prompted for the initial connection request after identifying your terminal to the host, and connection to that p r o g r a m o c c u r s a u t o m a t i c a l l y. I f t h a t c o n n e c t i o n i s not successful or if you disconnect from that appli cation program, you have a choice of actions; you can select another application or disconnect from the host. To override a primary automatic application connec t i o n o n t h e fi r s t a t t e m p t t o s e l e c t a n a p p l i c a t i o n , name a different application in an abbreviated login e n t r y ( d e s c r i b e d l a t e r i n t h i s a p p e n d i x ) f ollowing a login prompt. When a primary value is assigned, you are prompted on subsequent attempts to select an application, such as when you are switching applications. When you are prompted to enter an application name and you want to be connected to your primary applica tion, enter an empty line as a response. Manual Connection This procedure begins when you see the following prompting message. terminalname - APPLICATION: The terminalname variable on this line is the same terminal name as the one on the first line of your login sequence. If your terminal is automatically logged into a network application, you do not receive this prompt. When you receive the APPLICATION prompt, enter the letters and digits that identify the network appli cation you want to access; for example, IAF for the I n t e r a c t i v e F a c i l i t y. Yo u c a n a c c e s s C D C - w r i t t e n applications from the following list that are in stalled at your site: • Remote Batch Facility (enter RBF). • Interactive Facility (enter IAF). • Tr a n s a c t i o n F a c i l i t y ( e n t e r TA F ) . • Te r m i n a l Ve r i f i c a t i o n F a c i l i t y ( e n t e r T V F ) . • Message Control System (enter MCS). • P L AT O ( e n t e r P N I , w h i c h s t a n d s f o r t h e PLATO-NAM Interface). Automatic Connection Your host may permit you access only to one network application, or an application can be connected 60459500 C Other applications, written at your site, might be available. J-15 You must respond to the prompt within 2 minutes. If you take too long to respond, this message is displayed at your terminal. TIMEOUT. Your terminal is then disconnected from the host. You must spell your entry correctly. If you make a mistake, such as typing the letter 0 for the numeral 0 or the letter 1 for the number 1, you receive the following error message: ILLEGAL APPLICATION, TRY AGAIN, terminalname - APPLICATION: The terminal name is indicated by terminalname. You can also receive this message if your user name is not permitted access to the application you named. If you did not spell the name correctly, try again. If you did spell the name correctly, disconnect your terminal and contact a site administrator. If you make four unsuccessful attempts to enter an application name, this message appears at your ter minal. APPLICATION RETRY LIMIT. Your terminal is then disconnected from the host. This step is complete when the application you re quest connects to your terminal. The application you asked to use might print an identification line next. To u s e t h e s i t e - d e fi n e d l o g i n d e f a u l t f a m i l y n a m e , enter: ,RLS4525,PASS123,IAF y^s^s. To o v e r r i d e y o u r s i t e - d e fi n e d l o g i n d e f a u l t f a m i l y name with the host's default family name, enter: 0,RLS4525,PASS123,IAF To use a login default family name and user name defined by the site for your terminal, enter: ///IAF To also use a default application name defined by the site for your terminal, enter: You can supply combined entries in response to the FAMILY, USER NAME, and PASSWORD prompts. Although you do not need to complete the remaining sequence on the same line, you must enter the information in the correct order: family name, user name, password, and application (if there is no default). For example: FAMILY: systema USER NAME: rls4525,pass123 terminalname - APPLICATION: iaf If you supply a user/password combination that is o v e r r i d d e n b y a m a n d a t o r y s p e c i fi c a t i o n , t h i s mes sage is displayed. Whether the program sends such a message or not, you can use commands recognized by that application. If you need to disconnect your terminal from the appli cation, the application probably has a command for that purpose. If the program has no such command, the subsection called Disconnecting from a Host des cribes a command you can use. If you offer an application name that is overridden by a preassigned mandatory application, the follow ing message is displayed. ABBREVIATED LOGIN AND APPLICATION CONNECTION SWITCHING TO A DIFFERENT APPLICATION You can shorten the standard login and application connection procedures by entering all of the re quired information at once. For example, in res ponse to the FAMILY prompt, you can enter the fol lowing information on the same line. Unless you have a mandatory network application assigned for your terminal, you can transfer your terminal's connection from the current application to another application. There are two ways to do this, depending on the commands used by the current application. FAMILY: familynanie,username,password,application Separate all entries with a comma. The entries are order-dependent. Use a comma to indicate any default or unused entries. You do not receive any of the remaining login selec tion prompts if you use this abbreviated login pro cedure, unless you omit a required entry or supply an entry that is not recognized. Your password entry is not protected by the system when you use an abbrevi ated login procedure. Here are some examples. To log In and connect to the Interactive Facility application IAF with a family name of SYSTEMA, a user name of RLS4525, and a password of PASS123, enter: SYSTEMA,RLS4525,PASS123,IAF • J-16 VOLUNTEERED USER/PASSWORD IGNORED. VOLUNTEERED APPLICATION IGNORED. Direct Switches You can switch in one step by entering a switch com mand recognized by the current application. The fol lowing switch commands are recognized by CDC-written network applications: Command Application RBF IAF MCS IAF BYE,application LOGIN,application For example, if your terminal is connected to RBF, you can gain access to IAF by entering the IAF command. 60459500 C y^v Do not enter any more input until the application acknowledges it has processed your switch command. Otherwise, you may lose the input. There are three ways to restart login, depending on the commands recognized by the current application and installation options. Indirect Switches Direct Restarts If your current application does not have a command for a direct switch, you must disconnect your ter minal from the current application with a command recognized by that application. Then you must request another application connection from the host. The following disconnection commands are recognized by CDC-written network applications: Yo u c a n r e s t a r t h o s t i d e n t i fi c a t i o n b y e n t e r i n g a login command recognized by the current application. The following login commands are recognized by CDCwritten network applications: Program RBF IAF M C S TAF TVF Command END BYE, END EX.LOGT END For example, you can switch your terminal connection from RBF to an application other than IAF by entering the END command. You then receive a prompt for a new application name. Do not enter any more input until the application acknowledges it has processed your disconnection command. Otherwise, you might lose the input. Dialog for Direct and Indirect Switches After disconnecting the application, the system in dicates that a connection switch is in progress by issuing this message. application - CONNECT TIME hh.mm.ss. The application that was just disconnected is In dicated by application and the time that passed while the terminal was connected to the program is indicated by hh.mm.ss. If you used a switch command, you receive an iden tifying message from your new application. If you used a disconnection command, you receive another prompt for an application name. terminalname - APPLICATION: unless the terminal is permitted access to only one application. If so, you are disconnected from the host. If you enter the name of another application in res ponse to the APPLICATION prompt, you are connected to that application. Application Command RBF IAF MCS LOGIN HELLO LOGIN For example, if your terminal is connected to IAF, you can restart login by entering the HELLO command. Do not enter any more input until the application acknowledges it has processed your command. Other wise, you may lose the input. Indirect Restarts If your current application does not have a command for a direct switch, you must disconnect your ter minal from the current program with a command rec ognized by that application. Then you must request restart of login from the host. The disconnection commands recognized by CDC-written network applica tion are described earlier in this section under Switching to a Different Application. For example, you can restart your terminal login from RBF by entering the END command. You then receive a prompt for a new application name. Do not enter any more input until the application acknowledges it has processed your disconnection command. Otherwise, you might lose the input. Secure Login Restarts If your site has selected the secure login initiation option and defined a security character, the sequence may be entered at any time to immediately disconnect from the current application and initiate the user login procedure. After entering the disconnection command, you receive another prompt for an application name: terminalname - APPLICATION: unless the terminal is permitted access to only one application program. If so, you are disconnected from the host and can restart login by reconnecting. RESTARTING LOGIN IDENTIFICATION There are many reasons why you might want to restart l o g i n i d e n t i fi c a t i o n a n d t h e s u b s e q u e n t a p p l i c a t i o n connection. Perhaps you have several user names available to you, each with permission to use dif ferent host resources. Or perhaps someone else left the terminal connected to an application you do not need, and you do not want to use their user name. 60459500 C If you receive the APPLICATION prompt, you use one of the following commands to ask the host system to restart login: HELLO LOGIN J-17 DISCONNECTING FROM A HOST You might want to disconnect your terminal from a host for several reasons, for example: • Yo u w a n t t o d i s c o n n e c t f r o m t h e n e t w o r k properly, w i t h o u t l e a v i n g b e h i n d a n i n d i c a tion that something went wrong; disconnecting from a host is the first step in disconnect ing from a CDC network. • You are allowed access to more than one host system, and you want to transfer your ter minal's connection from the current host to another host. There are four ways to do this, depending on the commands used by the current application. Disconnecting with Application Commands You can disconnect in one step by entering a host disconnection command recognized by the current application. The following host disconnection commands are recognized by CDC-written network applications: Program Command RBF IAF MCS LOGOUT or LOGOFF BYE or LOGOUT or GOODBYE BYE or LOGOUT For example, if your terminal is connected to IAF, you can disconnect from the host by entering the BYE command. The following host disconnection commands are valid responses to the APPLICATION prompt on CDC host systems: 8YE /T*®&?&\ LOGOUT For example, you can disconnect your terminal from RBF by entering the END command. You then receive a prompt for a new application name and enter BYE. Disconnecting with a Network Software Command You normally end a connection with a host by using a command to disconnect you from an application and/or a command to log out of the host. Events might make i t i m p o s s i b l e f o r y o u t o d o e i t h e r. W h e n t h i s happens, you can end your terminal's connection to t h e h o s t b y e n t e r i n g t h i s t e r m i n a l d e fi n i t i o n command. Ct TM c t r e p r e s e n t s t h e n e t w o r k c o n t r o l c h a r a c t e r. F o r most asynchronous terminals this is ESC. The network responds to your TM command with a new host availablity display. You can use the TM com mand if an application does not respond to your entries. Reconnecting to a Host or Connecting to a Different Host For a single host system, after your terminal is dis connected from the host, this message is printed. Disconnecting with Host Commands If your current application does not have a command f o r d i r e c t d i s c o n n e c t i o n , y o u m u s t fi r s t d i s c o n n e c t your terminal from the current program with a com mand recognized by that application. Then you must request host disconnection from the host. Applica tion disconnection commands are described earlier in this section under Switching to a Different Applica tion. After disconnecting the application, the system in dicates that a connection switch is in progress by issuing this message: HOST DISCONNECTED. CONTROL CHARACTER = Ct c t i s t h e n e t w o r k c o n t r o l c h a r a c t e r, is followed by the prompting message. This message ENTER INPUT TO CONNECT TO HOST You can then attempt another connection to the same host by sending any input you want. If you have a multihost system, typically the HAD will be dis played between these two messages. To reach a dif ferent host, you must complete the procedures for Selecting a Host and Connecting to the Selected Host described earlier in this appendix. / ^ v application - CONNECT TIME hh.mm.ss. The application that was just disconnected is indi cated by application and the time that passed while the terminal was connected to the program is indicated by hh.mm.ss. Disconnecting from One Host and Connecting to a Different Host You then receive another prompt for an application program name: You can disconnect from one host establish a connec tion with another host using the single command terminalname - APPLICATION: unless the terminal is permitted access to only one application. If so, you are disconnected from the host anyway. • J-18 ct HC = hn ct is the network control character, and hn is the name of the desired host. 60459500 C ^*^v INTERRUPTIONS Preventing Messages Events can sometimes interrupt your input or output. These interruptions fall into two categories. Sometimes it is important that output to your terminal does not include unplanned messages from t h e n e t w o r k o p e r a t o r. Yo u c a n p r e v e n t d e l i v e r y o f messages from the network operator by locking them out with the following terminal definition command. • Interruptions for communication with the network operator. • Temporary suspensions in communication. ct LK=option For c t r e p r e s e n t s t h e n e t w o r k c o n t r o l c h a r a c t e r, most asynchronous terminals this is ESC. Communicating with the Network Operator The term network operator includes any operator who has access to the network, including the host oper a t o r. A n y n e t w o r k o p e r a t o r c a n s e n d a n d r e c e i v e messages that involve you. After you enter this command with the option Y, any message to your terminal from the network operator is discarded by the network software. Messages are discarded until you again allow delivery by using the command with the option N. S i t e a d m i n i s t r a t o r s c a n c o n fi g u r e y o u r t e r m i n a l s o that messages are discarded as soon as the terminal is connected to the network. A network application can also change the LK option in use. Receiving Messages The network operator can send short messages to a terminal. The message appears at your terminal in this format. FROM NOP Suspensions of Communication message text These messages can appear at any time a new line of output is possible at your terminal. For example, the network operator might want to Inform all con nected terminals that communication is going to be suspended intentionally with this message. FROM NOP SHUTDOWN IN 5 MIN Although storage may be low, sometimes the network cannot prevent you from entering data. Therefore, the network discards each message from your terminal and sends this message to your terminal. Sending Messages You can respond to such messages by entering the following terminal definition command. ct MS=message c t r e p r e s e n t s t h e n e t w o r k c o n t r o l c h a r a c t e r, most asynchronous terminals this is ESC. /ptfev For The message text must not exceed 50 graphic charac ters. Because the network operator can be located at a terminal that does not support many special characters, you should avoid characters not in the ASCII 63-character subset described in appendix A of the NOS Reference Set, Volume 2, Guide to System Usage. You can also begin dialog with the network operator. For example, if you need to use a remote batch printer that has been logically disabled, the entry: %MS=PLEASE ENABLE LP=M4C555 causes the message PLEASE ENABLE LP-M4C555 to appear at the network operator's terminal, prefixed by the terminal name of your terminal. The Z character represents the network control character for your terminal. 60459500 C Sometimes, message traffic in the network is so heavy that all storage is temporarily used up. Also, a host may be too busy to accept data. During these times, the network software takes steps that tempor arily stop input until enough output has occurred to free additional storage. WAIT . . When the following message appears, you can reenter any information that was previously discarded. REPEAT . . If your terminal transmits more than one message at a time, you must determine which information you n e e d t o r e e n t e r. T h e a p p l i c a t i o n m i g h t h a v e commands that can help you determine which messages it received. Communication Failures Events can occur that: • Cause your application to fail. • Disconnect your terminal from an application. • Disconnect your terminal from the host. • Disconnect your terminal from the network. J-19 Application Failures Disconnection from the Network If an application fails after your terminal is connected, this message is displayed. The network informs you that it has lost communication with the host software by displaying the host status message: APPLICATION FAILED. application CONNECT TIME hh.mm.ss. terminalname - APPLICATION: HOST DISCONNECTED. CONTROL CHARACTER = Ct followed by the prompting message: The length of time your terminal was connected to t h e a p p l i c a t i o n i s s p e c i fi e d b y h h . m m . s s ; application is the name of the application; and terminalname represents the terminal name the n e t w o r k u s e s t o i d e n t i f y t h e t e r m i n a l . Yo u e i t h e r can select another application or log out. ENTER INPUT TO CONNECT TO HOST If you have a multihost system, the HAD will be displayed between these two messages. If you are at a dial-up terminal and you do not attempt to connect to the same or a different host within 2 minutes, your terminal is disconnected from the network. Disconnection from an Application and/or a Host An application is Informed of two events that you might want to take action on. • L o n g p e r i o d s o f d e v i c e i n a c t i v i t y. • Pending network shutdown. The network software informs an application if more than 10 minutes have elapsed without any communication between a device at your terminal and the application. An application can: • Ignore this time interval. • Ask you for continued dialog. • Disconnect from your terminal or from the device with or without telling you. The effect of device inactivity depends on the application with which the device is currently connected. When shutdown of the network is pending, the network operator can enter a command that informs all applications of the pending event. Your application might take action s t h a t e i t h e r r e s u l t i n c o n n e c t i o n termination or application failure. It also might send you a message to warn you of the event. If you receive a message from an application indicating that shutdown is pending, you should take steps immediately to save all data or files you are currently using. Then end connection with both the application and the host as soon as possible. If communication between the network and the host software resumes, you must connect to the host and log in again but you do not need to access the net work again (perform dial-up and auto-recognition pro cedures). These host communication failures occur either when the host has been shut down or when hard ware fails in the communication path between the net work and the host. All network software conditions (that is, parameters that may be set with terminal definition commands) are retained across host disconnection except for transparent, full ASCII, and special edit input modes. Refer to the NOS Reference Set, Volume 3, System Commands for a discussion of these commands. Failures in the communication path between the net work hardware and your terminal are treated by the network software as if your terminal had failed. These failures can occur because of hardware prob lems, or maybe because you entered an input charac ter during output. If you hold the interactive out put interrupt key down for too long, a communication failure can occur. This key is identified in the NOS Reference Set, Volume 3, System Commands. There are several tests for communication failures. If your terminal has a CTS, ON-LINE, or CARRIER in d i c a t o r, t h e l i g h t g o e s o u t w h e n a f a i l u r e o c c u r s . At other terminals, if a failure has occurred, re questing the host availability display produces no response from the network. Batch input and ouput devices associated with the failed console stop running, and batch device con nections are ended. The network software does not distinguish between dial-up and hardwired terminals when processing terminal failures. Terminal failures require you to complete new access and login procedures to resume communication with the network. Terminal failures always cause disconnec tion when the terminal is on a dial-up line. • J-20 60459500 C yS^awSX INDEX j f fl S S B S i ^ Accessing a host J-l 1-4 Accessing transaction subsystem A C T 2 - 11 A f t e r i m a g e r e c o v e r y fi l e 8 - 1 AKY statement 4-1 Alternate keys 4-2 Application block header Building 2-12 Examining 2-14 Modifying 2-12 A p p l i c a t i o n c h a r a c t e r t y p e 2 - 11 ARF 8-i Attach mode 4-2 Audience 5 Auto-Input mode 1-3; 2-12 Automatic recovery Description 7-1; 8-1 Report 8-4,6 Requests Application 2-32 System 2-38 B a c k u p d i r e c t o r y fi l e 8 - 2 Batch Interface 1-3; 5-1 Subsystem interaction 5-1 Batch output 5-4 Batch recovery 8-1 Before image recovery file 8-1 B e g i n - c o m m i t i d e n t i fi e r 7 - 1 , 3 Begin-commit sequence 7-1; 8-1 BEGIN request Data base 7-•1,3; 8-1 TA F 2 - 2 8 BLDABH request 2 -12 B l o c k e d t a s k s I -1 • BRF 8-1 BTASK system task 8-4 BTRAN request 5-■I; 7-1 Build ABH 2-12 BWAITINP request 2-28 Call tasks 2-4 CALLRTN 2-4 CALLTRN request 2-38; 8-1 CALLTSK 7-4,5 CALLTSK request 2-6 CDCS 1-2; 3-1; 4-4; 7-1,3 CEASE request 2-28 Chain 2-4 Change ACT 2-11 6-1 Change CMDUMP request values Change I/O Limit 2-28 Change task field length 2-3; 10-6 Character sets A * - l' Character type 2-11 CLOSE requests 7-2 6-3 CMDUMP request COMMIT requests 7-1,3; 8-1 60459500 C Commit updates 7-3 Communication block D e fi n e d 2 - 1 Diagram 2-2 Dump 6-4 L o a d o v e r fl o w d a t a 2 - 1 0 Release overflow data 2-23 TA F - o r i g i n a t e d t r a n s a c t i o n s 1 2 - 3 , 4 Communication recovery file Description 4-1,8; 7-1; 8-1 Error override 8-3 Multiple 3-4 Reformat 8-3 User messages Read 2-33 Write 2-33 Concurrent users 4-2 Confirmation message 2-35; 7-1 Create task library 10-7 C r e a t e x x J fi l e 4 - 4 CRF 4-1,8 C R M fi l e t y p e 4 - 2 CYBER Database Control System 1-1,2; 3-1; 4-4 CYBER Record Manager Data Manager 1-1,2; 4-1,2 Data base Describe 9-1 J o u r n a l fi l e s 4 - 5 Maximum number of 4-7 Recovery 7-1; 8-1 Data manager Concurrency l-l; 3-1 Requests 2-3 x x J fi l e s 4 - 1 , 4 Deadlocks 3-1 D e fi n e t e r m i n a l c h a r a c t e r i s t i c s 2-16 Delete tasks from task library 10-7 Describe users and data bases 9-1 Determine if user is logged In 2-31 Determine subsystem for task 2-28 Diagnostics B-l DIAL directive 9-1 Oisable transaction recovery 8-2 DISPLAY statement 4-7 DMS statement 4-7 DSDUMP request 6-1 Dump Communication block 6-4 Exchange package 6-4 TA F fi e l d l e n g t h 6 - 4 Ta s k fi e l d l e n g t h 6 - 3 , 4 ECS 5 End task 2-28 Entering transaction subsystem 1-4 E n t r y h e a d e r, j o u r n a l fi l e 4 - 5 ERO command 8-3 Error messages B-l E s t a b l i s h s y s t e m i d e n t i fi e r 2 - 4 0 Index-1 Examine ABH 2-14 Execute named task 11-2 Executing transaction 7-1 E x t e n d fi e l d l e n g t h 2 - 3 ; 1 0 - 6 Extended core storage 1-5 Extended memory 5; 1-5 Extract bit string f r o m w o r d 2 - 3 1 EXTRACT request 2-31 K display commands 2-30; 4-8; 6-1,4; 8-2,3 K.DSDUMP command 6-4 K.DUMP command 6-5 K.DUMPLIM command 6-5 K.ERO command 8-3 K.INT command 8-2 K.REC command 8-3 K. statement 4-8 KDIS U-l KPOINT request 2-30 KTSDMP utility/request 6-4 File CRM type 4-2 D e fi n i t i o n s E - l Descriptions E-l Index 4-2 Files Journal 4-5 JOURO 4-5 NCTFI 4-8 Network 4-8; 9-1 Procedure 4-1 Recoverable 8-1 Recovery 4-8; 8-1 Reserved E-2 System 4-1 TCF 4-1,7; E-l xxJ 4-1,2,4 xxJORn 4-4 xxTASKL 10-1 Forced write indicator 4-3 F o r m a t e ff e c t o r s 2 - 1 2 , 1 5 Free requests 7-1 FSE C-6 GETABH request 2-14 Global task dump limit GTDL 6-5 6-5 H a r d w a r e c o n fi g u r a t i o n 8 - 2 Ignore task in replacement file 10-8 11 0 r e q u e s t 2 - 2 8 Implement application 1-5 I n d e x fi l e 4 - 2 Initate a run unit 2-38 Initial task 1-3; U-l; 12-1 I n i t i a l i z e r e c o v e r y fi l e s 8 - 2 Initiate new transaction chain 2-6 Input/output Limit 2-28 Requests 2-8 I n p u t o v e r fl o w 2 - 1 0 , 2 3 Insert bit string into word 2-31 INSERT request 2-32 I n s t a l l i n g TA F F - l INT command 8-2 Interactive virtual terminal 1-3; 2-16 Interrogate TST 2-23 ITASK 1-4; 11-1; 12-1 ITL request 2-29 IVT 1-3; 2-16 IXN statement 4-2 J o u r n a l fi l e s 4 - 5 JOURNL request 4-5 JOURO file 4-5 • Index-2 Libraries 10-1 LIBTASK command 10-2 LIBTASK input directives 10-5 LIBTASK utility/command 10-1 Line feed and transmission keys H-l List tasks on library 10-3 2-10 Load overflow blocks LOADCB request 2-10 L o c k c o n fl i c t 7 - 2 LOGIN request 2-31 1-4 Login terminal to TAF Logout task ll-l Logout terminal from TAF 2-29; 11-1 LOGT request 2-29 LOGT system task 11-1 Macros 12-1 Manipulate user area of TST 2-26 Memory Changing from tasks 2-3; 10-5 Dump requests 6-1 Dumps 6-1 Requests 2-3 Message abort 11-1 Modify ABH 2-12 Modify terminal characteristics 2-16 Move data from terminal to task 2-28 MSABT ll-l Multlmainframe 1-5 Multimainframe recovery 8-4 M u l t i p l e i n d e x e d fi l e s 4 - 2 Multiple RECOVER statements 8-3 NAM 1-3; 12-3 Named-transaction 7-1; 10-5 N C T F i fi l e 4 - 8 NDL 1-5 Network Access Method 1-3; 12-3 D e fi n i t i o n l a n g u a g e 1 - 5 File origination 9-1 Files 4-8; 9-1 Interface 1-3 NETWORK statement 4-8; 8-3 NEWTRAN request 2-7 OFFTASK 11-2 On-line transaction processing OPEN requests 7-2 Output from SUBMT jobs 5-4 Override 1/0 errors 8-3 l-l 60459500 C Parameter SEND request 2-18 Pa ra me te r ta b l e 2 - 2 5 P r o c e d u r e fi l e 4 - 1 , 4 Put recovery data on CRF jgpss, 2-33,41 RA+1 calls 1-5; 2-1 RC parameter 7-1 RCTASK system task 11-2 Read data from terminal 2-8 Read recovery data 2-33 Read SECURE message 2-34 R e c o r d d a t a o n j o u r n a l fi l e 4 - 5 R e c o r d l o c k c o n fl i c t 7 - 2 Record locks 4-2 RECOVER statement 4-8; 8-2,3 Recoverable files 8-1 Recovery CDCS 7-1 CDCS failure 8-5 C R F fi l e 8 - 3 Data base 7-1; 8-1 Disable 8-2 F i l e i d e n t i fi e r 4 - 8 Flag 8-4 General 7-1; 8-1 H a r d w a r e c o n fi g u r a t i o n 8 - 2 I n i t i a l i z e fi l e s 8 - 2 K display commands 4-8; 8-2 Multimainframe 8-4 Multiple data manager tasks 7-5 NAM failure 8-5 Override I/O errors 8-3 Overview 7-1; 8-1 P r o c e s s i n g fl o w 8 - 4 Requests Application 2-33 System 2-38 System failure 8-4 TAF/CRM Data Manager 7-1 TA F f a i l u r e 8 - 4 Ta s k f a i l u r e 8 - 5 T C F fi l e 8 - 3 Te r m i n a l 7 - 4 ; 8 - 5 Tr a n s a c t i o n 7 - 1 ; 8 - 1 Recovery indicator 10-5 Application 2-32 System 2-38 Release overflow blocks 2-23 RELSCB request 2-23 Requests Data manager 2-3 Input/output 2-8 J o u r n a l fi l e 2 - 3 ; 4 - 5 Memory 2-3 Memory dump 6-1 Message 2-4 Recovery Application 2-32 System 2-38 System 2-3 Task Control 2-28 Scheduling 2-4 Utility 2-30 Rerun request 2-32 R e s e r v e d fi l e s E - 2 RESTRICT clause processing 3-1 Resubmit terminal input 2-32,40 Retrieve recovery data 2-33 RGET request 2-33 RPUT request 2-33 60459500 C RSECURE request 2-34 RTASK system task 8-4; 11-2 Complete 2-35 Initate 2-38 Running transaction 7-1 Sample deck structures D-l Schedule tasks 2-4; 10-7 Scheduling priority 10-7 SECURE message Acknowledge 2-36 BTRAN 2-36 Description 7-3; 8-1 Retrieve 2-34 Write 2-35 SECURE request 2-35; 7-1,3; 8-1 Send message task 11-2 Send message to user 2-17 SEND request 2-17 Set GTDL 6-5 S e t s y s t e m i d e n t i fi e r 2 - 4 0 Set time limit for task 2-29 Set transaction sequence number 2-40 Set user recovery bit 8-3 SETCHT request 2-11 Specify communication block location 2-28 SRERUN request 2-40 Start transaction using batch job 5-1 Start update sequence 7-3 STASK 11-2 Status of current transaction 2-37 Status of current user 2-37 Status of transaction 2-8 STRAN macro 12-1 Subcontrol points 1-5 Submit batch job from task 5-3 Submitting comments 5 SUBMT request 5-3 Subtransaction codes 12-1 Supervisory messages 2-11 Suspend processing 2-30 SYSMSG 11-2 System Files 4-1 J o u r n a l fi l e s 4 - 5 Requests 2-3 Ta s k l i b r a r y 1 0 - 1 Ta s k s l l - l TABCON statement 4-7 Tables Te r m i n a l s t a t u s ( T S T ) 9 - 2 TAF Automatic recovery report 8-4,6 C o n fi g u r a t i o n fi l e 4 - 7 ; E - l Control point 1-1,2 Installation F-l Originated transactions 12-3 P r o c e d u r e fi l e 4 - 1 , 4 Te r m i n a t i o n 8 - 5 TAF/CRM Data Manager 7-1 TAFREC 8-4 TARO request 2-26 Task Chain 2-4 Control requests 2-28 D e fi n e d 1 - 4 ; 2 - 1 Dump 6-1 Field length changes 2-3; 10-6 Library Index-3 Create 10-7 D e fi n e d 1 0 - 1 Delete task from 10-7 Ignore task in replacement file List tasks 10-3 Update 10-7 Pause 2-30 Queue limit 10-6 Queuing 10-1,6,7 Residency 10-1 Scheduling priority 10-7 Scheduling requests 2-4 Ty p e 1 0 - 1 Utility requests 2-30 Ta s k l i b r a r y r e p o r t 1 0 - 3 , 4 TASKLIB 10-1 Tasks Blocked I-I Call 2-4 End 2-29 Schedule 2-4; 10-7 Ti m e - o r i g i n a t i n g 1 2 - 1 T C F fi l e 4 - 1 , 7 ; E - l TERMDEF request 2-16 Terminal Characteristics D e fi n e 2 - 1 6 ; G - l General 12-4,5 Modify 2-16; G-l Definition co m m a n d s G - l Failure 7-4; 8-5 N e t w o r k d e s c r i p t i o n fi l e 9 - 1 Recovery 7-4 Status request 12-5 Status table Figure of 9-2 Interrogate 2-23 Manipulate user area 2-26 Recovery bit 8-3 Terminology and conventions 5 TIMCNT macro 12-1 Ti m e - o r i g i n a t i n g t a s k s 1 2 - 1 TINVOKE request 2-40 TMSG request 2-4 TOTAL Data Manager 1-1,3; 4-4; 7-5 TOTAL task area 1-1 TPSTAT request 2-28 TRAN macro 12-1 TRANCHK request 2-8 TRANS 12-1 • Index-4 10-8 Transaction Codes 12-1 Coding 7-2 D e fi n e d 1 - 1 Named 7-1 Processing 1-4 Recovery 7-1; 8-1 Rerun 2-32 Subsystem Entering 1-4 Interaction 5-1 TA F - o r i g i n a t e d 1 2 - 3 Tr a n s a c t i o n - I d 7 - 3 Transaction sequence number Tr a n s i e n t t a s k a r e a 1 - 1 Transparent mode 2-12 TRANT 12-1 2-23 TSIM request TST 9-2 TSTAT request 2-37 TTOT 12-1 12-5 Type ahead 2-2,40 Updating task library 10-7 User recovery bit 8-3 USER statement 4-8 User status 12-5 Wa i t f o r t e r m i n a l i n p u t 2 - 9 WAIT request 2-30 WAITINP request 2-9 Write data to CRF 2-33,41 WSTAT request 2-41 XTASK 11-2 XTRAN system transaction 11-2 x x J fi l e s CDCS Data Manager 4-4 Creating 4-4 CRM Data Manager 4-2 No data manager 4-4 TO TA L 4 - 4 x x J O R n fi l e 4 - 4 x x TA S K L fi l e 1 0 - I 60459500 C COMMENT SHEET /0^^l MANUAL TITLE: CDC TAF Version 1 Reference Manual P U B L I C AT I O N NO.: 60459500 NAME_ REVISION: C - COMPANY: STREET ADDRESS: CITY: .STATE: ZIP CODE: This form is not intended to bo used as an order blank. Control Data Corporation welcomes your evaluation of this manual. Please indicate any errors, suggested additions or deletions, or general comments below {please include page number references). D Please Reply D No Reply Necessary /gs\, o /p**^ NO POSTAGE STAMP NECESSARY IF MAILED IN U.S.A. FOLD FOLD NO POSTAGE NECESSARY IF MAILED IN THE UNITED STATES BUSINESS REPLY MAIL FIRST CUSS PERMIT NO. 8241 MINNEAPOLIS, MINN. POSTAGE WILL BE PAID BY CONTROL DATA CORPORATION _i < Publications and Graphics Division ARH219 4201 North Lexington Avenue Saint Paul, Minnesota 55112 FOLD FOLD
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.3 Linearized : No Page Count : 226 Creator : ScanSnap Manager Producer : Mac OS X 10.5.8 Quartz PDFContext Create Date : 2009:10:20 07:09:04Z Modify Date : 2009:10:20 07:09:04ZEXIF Metadata provided by EXIF.tools