Google
 

Trailing-Edge - PDP-10 Archives - BB-4148D-BM - dbms-v5a/documentation/dbms5.doc
There are 2 other files named dbms5.doc in the archive. Click here to see a list.


DBMS.DOC -- Changes from V3 to V5
June 1977






























Copyright (C) 1976,1977
Digital Equipment Corporation, Maynard, Mass.


This software is furnished under a license for use only  on  a  single
computer system and may be copied only with the inclusion of the above
copyright notice.  This software, or any other copies thereof, may not
be provided or otherwise made available to any other person except for
use on such system and to one  who  agrees  to  these  license  terms.
Title  to  and  ownership of the software shall at all times remain in
DEC.

The information in this software is subject to change  without  notice
and  should  not  be  construed  as  a commitment by Digital Equipment
Corporation.

DEC assumes no responsibility  for  the  use  or  reliability  of  its
software on equipment which is not supplied by DEC.
DBMS5.DOC                                                       Page 2


DBMS.DOC -- Changes from V3 to V5
June 1977



1.0  SUMMARY

DBMS-V5(240) replaces DBMS-V3 and DBMS-V4.

DBMS-V5 can co-exist with, and has been tested with, version 6.02 (and
6.03)  of  TOPS-10,  version  1B  (and  2)  of  TOPS-20, version 11 of
COBOL/LIBOL, and version 5 of FOROTS.  

Because both V3 and V4  users  will  be  reading  this  document,  the
changes  from V3 towards V5 have been partitioned into section 2.1 and
section 2.2 (V4 changes) and into section 2.3 (V5 changes) as much  as
is  feasible.   V5  is  a  compatible upgrade of V4;  however existing
DBMS-V3 applications must reload their data  bases  in  order  to  use
DBMS-V5.   This  conversion  procedure,  and  the  other  installation
instructions, are discussed in section 4.0.

The primary enhancements to DBMS-V5 are the following:

     1.  Support of sorted sets via indexed sequential access

     2.  Greatly improved performance in SCHEMA and DBCS

     3.  The OWNER IS SYSTEM clause

     4.  DBINFO as a replacement for DBSDMP and DBUTIL

     5.  Use of ENQ/DEQ to control access to areas

     6.  Much more comprehensive DMCL

     7.  The OCCURS phrase and additional data types

   V5 ONLY:

     8.  Simultaneous update of data bases

     9.  Various journaling enhancements

These and the other enhancements are discussed in  section  2.   Where
relevant,  incompatibilities  are  presented  in  order  of decreasing
importance.  However the incompatibilities presented  in  section  5.0
are   all   "benign"  in  the  sense  that  they  are  transparent  to
applications that  use  the  supported  functionality  of  DBMS-V5  as
defined in the documentation.  They are presented only in the interest
of thoroughness.
DBMS5.DOC                                                       Page 3


2.0  EXTERNAL CHANGES

SUMMARY - FUNCTIONAL DEFINITION of DBMS-V4

The primary enhancements to DBMS-10/20 are the following:

     1.  Support of sorted sets via indexed sequential access

     2.  Greatly improved performance in SCHEMA and DBCS

     3.  The OWNER IS SYSTEM clause

     4.  DBINFO as a replacement for DBSDMP and DBUTIL

     5.  Use of ENQ/DEQ to control access to areas

     6.  Much more comprehensive DMCL

     7.  The OCCURS phrase and additional data types

These and the other enhancements are discussed in section 2.1.


2.1  Functional Enhancements and Differences


2.1.1  The DMCL

The general form of  the  DMCL  is:   at  most  one  RECORDS-PER-PAGE,
JOURNAL,  IMAGES,  INTERCEPT,  and  NOTE  statement,  in  any order...
followed by one or more ASSIGN statements.

Incidental  change:    RPP   is   now   a   legal   abbreviation   for
RECORDS-PER-PAGE.


2.1.1.1 File Specification

TOPS-10

A file spec which appears in the DMCL must comform  to  the  following
rules.  Blanks, commas, and semi-colons are ignored as elsewhere.  The
allowed components may appear in any order and are  a  device-name,  a
file-name, and a project-programmer number.  The form of a device-name
is an alphanumeric followed by colon (:);  the form of a file-name  is
simply  an  alphanumeric;   and  the  form of a PPN is [<octal number>
<octal number>].  The default device is DSK:.  The default PPN is  the
current  path.   The  file-name component has no default value , being
always required.

For example, DSK:FILE[1,1].
DBMS5.DOC                                                       Page 4


TOPS-20

All components except the  file-name  are  optional.   The  components
which  are present must conform to the following order and formatting:
"device:  <directory> filename Aaccount Pprotection".  The entire spec
must  not  exceed  100  characters.   The default device is DSK:.  The
default directory is the connected directory.

For example, <allmydbs>file.


2.1.1.2 JOURNAL Statement -  When present,  this  statement  specifies
the  file  spec  that  this schema's journal file will have.  If it is
absent, SCHEMA simulates a JOURNAL statement in which  the  device  is
JRN and the file name is the schema-name.  The syntax of the statement
is:
                       JOURNAL [IS] file-spec.


2.1.1.3 IMAGES Statement -  This statement  serves  to  delineate  the
granularity  of  journaling  that  will  occur in an application.  The
syntax of this statement is:
                 IMAGES [NOT] [IN ORDER] BY COMMAND.

The default is for images to be ordered by command.  When  images  are
ordered  by  command,  the  buffers  of  each  open area are in effect
checkpointed after execution of each DML  updating-verb.   This  means
that  "more"  writing is done to the data base and to the journal--but
conversely that the data base can be backed up in increments of single
updating-verbs...in DBMEND and at run-time.

When one requests images to not be ordered by  command,  checkpointing
occurs  only after each user-specified transaction (ie.  during a call
to JETRAN).  Thus "less" writing is done to the data base and  to  the
journal--but  conversely  the  data  base  can  be  backed  up only in
increments of user transactions...in  DBMEND  and  as  importantly  at
run-time.   The  mechanism  of  per-transaction  database  backup, the
JBTRAN call, is presented in subsection 2.1.6.4.

(The CODASYL DBMS specification states that, when an exception  occurs
during execution of a DML updating-verb, the DBCS must return the data
base to the state it was in at the beginning  of  the  verb.   However
this  is  somewhat  expensive as implied above.  Consequently, what we
are doing is allowing the programmer to decide.   By  specifying  that
images  are not ordered by command, the programmer will be saying, "It
benefits me to decrease  the  cost  of  journaling  even  though  that
reduces  the  control  with  which  I can backup my data base and even
though  that  reduces  exception  transparency  with  respect  to  the
validity of a data base".)

There are certain applications which have to backup completely if  the
application aborts for any reason.  Such an application should specify
that images are not ordered by command since, even  if  there  are  no
user  transactions  or  command-ordering,  DBMEND  always allows total
backup via:  "START<CRLF>...  END<CRLF>...  MERGE BEFORE".
DBMS5.DOC                                                       Page 5


2.1.1.4 INTERCEPT/NOTE Statement -  These related statements  allow  a
user to tell DBCS the classes of exceptions for which it should type a
message and exit, or just type  a  message,  respectively.   In  other
words  the  facility constitutes a debugging tool, exception trace, or
means  of  reducing  the  number  of   ERROR-STATUS   checks   in   an
application--depending  on  how  it  is  used.   The  syntax  of these
statements is:

INTERCEPT!NOTE (SYSTEM BIND CALL UPDATE)!ALL [EXCEPTIONS].

That is, either ALL or one or more of the  others  may  be  specified.
When  a  designated  exception  occurs,  the message printed is of the
form:

[STATUS/AREA/RECORD/SET=status/area-name/others if known]

If interception was specified, an EXIT 1 is  then  done...which  means
the    user   can   still   type   CONTINUE   if   he   wishes.    The
exception-partitioning implied here is described in 2.1.5.2.


2.1.1.5 ASSIGN Statement -  The syntax of the this statement is now:

     ASSIGN [SYSTEM AREA] area-name TO file-spec
      [RECORDS-PER-PAGE [IS] integer]
      [BACKUP (BEFORE AFTER) [IMAGES]]
      [BUFFER [COUNT IS] integer]
      [CALC [AT MOST] integer RECORDS-PER-PAGE]
       FIRST PAGE [IS] integer
       LAST PAGE [IS]  integer
       PAGE SIZE [IS] integer WORDS
      [RANGE [OF] name [IS PAGE] integer [TO PAGE] integer]
      [more RANGE phrases].

Except for the RANGE clause, each clause  can  appear  at  most  once.
Ordering  is as presented except that the RPP, BACKUP, BUFFER and CALC
optional clauses are interchangable.

The SYSTEM AREA phrase serves to support the OWNER  IS  SYSTEM  clause
added  to  the SET statement, see 2.1.2.3.  Its effect is to cause the
system record (if there is need for one) to be  stored  in  this  area
(along with any other record types allowed in this area).  If there is
a non-null system record and no area contains this phrase,  the  first
area assigned will become the system area.
DBMS5.DOC                                                       Page 6


The RECORDS-PER-PAGE clause is used to specify the maximum  number  of
records  that  can  be  on  a  page  of  this  area.   (It overrides a
RECORDS-PER-PAGE statement if one is  present).   If  this  clause  is
absent,  a  RECORDS-PER-PAGE statement must have appeared earlier--and
the  value  specified  there  will  be  used.   In  other   words,   a
RECORDS-PER-PAGE statement is necessary unless each area specified has
its own RECORDS-PER-PAGE  clause.   Whether  a  global  or  local  RPP
applies  to this ASSIGN statement, it must specify at least 2 and less
than 512 records per page.

The BUFFER clause is used to specify how many page-buffers  this  area
will have.  A buffer count of 2 is the minimum allowed.  If the clause
is absent, 3 buffers will be created.

The CALC clause allows  one  to  trade  off  the  amount  of  per-area
overhead  associated  with  calc  records  with  the  average  time to
access/store a calc record.  In earlier  versions,  there  was  always
precisely  one  calc-chain  per page (one list==one word of overhead).
Thus if one expected 500 calc records in an area that had  100  pages,
the average calc-chain would unavoidably have 5 records in it.  But in
V4 one could specify  CALC  5  RPP  and  thereby  reduce  the  average
calc-chain  length to 1.  Conversely if there are no calc record types
in a particular area, one can now say CALC 0 RPP.

Each RANGE clause controls where in this area a particular record type
can  be STOREd.  If a record type can be WITHIN this area, it may have
a RANGE clause for this area.  If a record type that can be STOREd  in
this  area  has  no  RANGE clause for this area, each page of the area
will constitute its range.  This clause has two purposes.  Its obvious
purpose  is  to enable the administrator to cluster records based upon
record type.  Its other purpose is to make calc records insensitive to
a  change in the number of pages in an area.  Previously the number of
pages in  an  area  (that  contained  calc  records)  could  never  be
increased since that would "throw the calc algorithm off".


2.1.2  The Schema DDL


2.1.2.1 AREA PRIVACY Clause -  Because V4 supports a wider set of area
usage-modes, this clause has been expanded.  There is no change in the
syntax for specifying that an area's locks are all the same,  but  the
separate-locks syntax is now:

PRIVACY [LOCK FOR] [EXCLUSIVE!PROTECTED] RETRIEVAL!UPDATE [IS] lock

A description of the six usage-modes is in subsection 2.1.6.1.


2.1.2.2 The Data-name Entry -  This statement has  been  expanded  and
made    more   host-language   independent.    The   nature   of   the
incompatibility so induced is described in 2.2, notes 1  and  2.   The
new syntax is:
DBMS5.DOC                                                       Page 7


02 data-name picture!size!type [OCCURS integer [TIMES]].
  picture-->PICTURE [IS] same-as-v3 [usage]
  size-->   SIZE [IS] integer [WORDS!usage]
  type-->   TYPE [IS] numeric!DBKEY
   usage--> USAGE [IS] DISPLAY[-6]!DISPLAY-7!DISPLAY-9
   numeric->FLOAT [DECIMAL!BINARY] [REAL!COMPLEX] [integer]
     -->[FIXED] [DEC!BIN] [REAL!COMPLEX] [integer [integer]]

The OCCURS clause is of course used to define an  array  and  describe
its  length.   (This  does not affect GET and MODIFY;  each will still
process entire 02-data-names:  if 02 A OCCURS 3 appeared in a  schema,
GET  A  would  get  the whole array and GET A(2) would be flagged as a
syntax error).

The PICTURE clause is used to describe elementary  string  data;   the
SIZE  clause is used to describe data structures;  and the TYPE clause
is used to describe numeric data (and DBKEYS).  Thus the USAGE  phrase
can  no  longer be used to described numeric data.  The USAGE phrase's
sole purpose now is to  state  what  type  of  string  data  is  being
allocated:  respectively SIXBIT, ASCII, or EBCDIC.  Note also that the
programmer now has complete control of the unit of storage  allocation
in  the  SIZE  clause:  whole words as well as any of the three string
representations.  The string host-language  mappings  are,  where  !x!
=smallest integer>=x:

     KEYWORDS    LENGTH          FORTRAN         COBOL
     -----------------------------------------------------
     DISPLAY-6    N              INTEGER(!N/5!)  AS IN DDL
     DISPLAY-7    N              INTEGER(!N/5!)  AS IN DDL
     DISPLAY-9    N              INTEGER(!N/4!)  AS IN DDL

The NUMERIC phrase in the TYPE clause  allows  six  types  of  numeric
encoding;   the  defaults for each pair are respectively FIXED, BINARY
and REAL.  The first optional integer at the end of the NUMERIC phrase
is the data-name's precision (in binary or decimal digits according to
the 2nd keyword pair).  The second  integer,  if  applicable,  is  its
scale  factor.   A  scale factor indicates that the internal form of a
fixed-point number is some number of powers-of-10 different  than  the
external  form.   The default is of course 0 (ie.  no difference);  -1
means external is 10 times as large;  1  means  external  is  1/10  as
large.

If no supported  host-language  intrinsically  supports  a  particular
combination  of  NUMERIC  keywords  and the chosen precision, a syntax
error will be signalled during translation of the  TYPE  clause.   The
default  precisions  for  FIXED  BIN,  FLOAT  BIN,  and  FIXED DEC are
respectively  35,27,  and  10.   The  legal   combinations   and   the
host-language mappings are as follows:
DBMS5.DOC                                                       Page 8


     KEYWORDS           PRECISION   FORTRAN         COBOL
     -----------------------------------------------------------
     FIXED BIN REAL       < 36      INTEGER         COMP S9(X2)
     FIXED BIN REAL       36-71     INTEGER(2)      COMP S9(X3)
     FLOAT BIN REAL       < 28      REAL            COMP-1
     FLOAT BIN REAL       28-62     REAL*8          COMP S9(18)
     FLOAT BIN COMPLEX    < 28      COMPLEX         COMP S9(18)
     FIXED DEC REAL       < 19      INTEGER(X1)     COMP-3 S9(prec)

Note  that  where  only  one  host-language   supports   the   keyword
combination  intrinsically,  the  other  declares it as "best it can".
For example, for FIXED DEC REAL, FORDML  simply  allocates  4  decimal
digits/word   (ie.   X1=prec/4),  in  terms  of  a  "reasonable"  data
type--INTEGER.

The values X2 and X3 are computed according to the following  mapping.
However  it  is  suggested  that  one  use  either  FIXED  BIN (35=the
default)-- or FIXED BIN 71 for double  precision--unless  there  is  a
specific  need  to cause numeric truncation at run-time.  Consistently
using full-word precision leads  to  COBOL  generating  better  object
code.

     BINARY PRECISION <= P maps to DECIMAL PRECISION X2/3
     ----------------------------------------------------
         4                               1
         7                               2
         10                              3
         14                              4
         17                              5
         20                              6
         24                              7
         27                              8
         30                              9
         35                              10
     (switch to double precision)
         38                              11
         41                              12
         44                              13
         48                              14
         51                              15
         54                              16
         58                              17
         >58                             18


2.1.2.3 The SET Entry -  There are several small changes  to  the  SET
entry.

The owner of a set can  now  be  the  system.   In  other  words,  the
programmer need no longer create a dummy record type when he wishes to
have a singular set.  This affects  the  OWNER  clause,  and  its  new
syntax is:

                    OWNER [IS] record-name!SYSTEM
DBMS5.DOC                                                       Page 9


The few special rules governing singular sets are:

The system area must be placed in all sub-schemas, but it need be open
only  if  the  system record will be referenced (see 2.1.1.5 on how to
allocate area space to the system record).

No member clause in the set entry of a singular set  may  have  a  SET
SELECTION  phrase.   The  reason  for  this is intuitively reasonable:
since the DBCS knows the set is singular, it can always correctly (and
quickly) locate the "proper" set occurrence.

FIND OWNER will be allowed relative to singular sets so  that  a  FIND
NEXT loop for a singular set can be coded as it would be for any other
set.  However the meaning of a succeeding GET, MODIFY, INSERT, REMOVE,
OR DELETE is of course ill-defined and will return exception xx20.

The SET entry may optionally be separated from its MEMBER entries by a
period.   Multiple  MEMBER entries can also be optionally separated by
periods.

When ORDER SORTED or ORDER SORTED  WITHIN  is  specified  as  a  set's
ORDER, the record-name of each member record is each's major sort key.
In order to speed processing and decrease  the  amount  of  data  base
space  required,  DBMS-10/20 uses the record's type ID rather than the
record-name itself.  Type ID's are assigned in increasing sequence  as
each  RECORD  entry  is processed.  This has two effects.  One is that
the member record types will not  be  sorted  in  alphabetic  sequence
unless they appear in alphabetic sequence;  and two, that the user now
has  complete  control  and  can  specifically  cause   non-alphabetic
sequences.

Signed RANGE KEYs will be supported in V4.  Also all keys to the right
of the first RANGE will be treated as RANGE KEYs.  Absence or presence
of the keyword RANGE, after its first appearance, will be  transparent
to  the SCHEMA processor.  Finally, the existing syntactic description
is somewhat vague, the actual syntax is:

     key-phrase [key-phrase ...] [duplicates-phrase]
     WHERE...
     key-phrase --> key-type [KEY IS] data-name-1, [dn-2,...]
     key-type --> ASC!DESC!ASC RANGE!DESC RANGE
     duplicates-phrase -->
             DUPLICATES [ARE] [FIRST!LAST!NOT] [ALLOWED]

When sort/calc keys  consist  of  more  than  one  data  item,  it  is
allowable  to not ALIAS all of the items.  Presumably this would be of
use when one wished to alias the minor key(s) and not the  major  key.
In any event, these examples portray each of the possible cases:

     1.  ALIAS FOR DN1 IS ALIAS1

     2.  ALIAS FOR DN1 IS ALIAS1 ALIAS FOR DN2 IS ALIAS2

     3.  ALIAS FOR DN1 IS DN1 ALIAS FOR DN2 IS ALIAS2
DBMS5.DOC                                                      Page 10


2.1.2.4 Guaranteeing Source Program Consistency -  Earlier versions of
SCHEMA  were  somewhat lax in detecting if the subtler requirements of
the DDL were being satisfied.  Version 4 attempts to guarantee that no
invalid  program  will  translate  error-free.   (There is of course a
CATCH-22 incompatibility in this since  some  existing  .DDL  programs
will  display  errors  when translated with V4).  The more interesting
checks are as follows:

     1.  Table 4-1 on p.  4-17 in the Administrator's Manual  will  be
         enforced.

     2.  When SET SELECTION is thru LOCATION MODE OF OWNER, any key so
         referenced  must  have been declared such that DUPLICATES ARE
         NOT ALLOWED for the key.

     3.  If an ALIAS OR USING argument  is  not  valid,  an  error  is
         reported.

     4.  For each RECORD entry in which there is a  LOCATION  MODE  IS
         VIA clause, there must be a corresponding SET.

     5.  For each RANGE clause, the corresponding WITHIN  clause  must
         appear.

     6.  If a record is declared in the same set more  than  once,  an
         error is reported.

     7.  If a RECORD entry contains a LOCATION MODE VIA clause and  is
         a member of a sorted set in which (one of) the sort key(s) is
         the record's dbkey, an error is reported.   This  is  because
         such  a  situation  is a deadlock:  VIA says store the record
         physically near its logical neighbors, while sorted-on-dbkeys
         says  logically  place the record on the basis of where it is
         physically.


2.1.3  The Sub-schema DDL

Conceptually there has been only one change  to  the  sub-schema  DDL;
any  text  (eg.   03  data-name...)  that  the  programmer  wishes  to
associate with an 02-data-name will be so associated in the sub-schema
DDL.   The  reasons  for  making  this change are twofold:  to isolate
COBOL  dependencies  in  sub-schemas  intended  for   use   by   COBOL
applications   and   to   allow  a  programmer  to  associate  FORTRAN
information with an 02-data-name.


2.1.3.1 General Text-specifying Rules -  Text is specified on  a  line
basis;  the presence or absence of a terminating period is irrelevant.
The line(s) following a sub-schema DATA entry will be treated as  text
unless  its first word is COPY, 02, 01, or SET.  If one wishes to have
a line of text that starts with one of these symbols, the line must be
prefixed  by  a plus (+).  (Note that the means of explicitly entering
null text is a line consisting of +<CRLF>.)
DBMS5.DOC                                                      Page 11


Since it is likely that a  data-name  will  have  the  same  usage  in
different  sub-schemas,  there  must be a way to associate a data-name
with the same text in more than one  sub-schema.   The  mechanism  for
doing  this  explicitly  is  described  in  2.1.3.3,  but  the default
mechanism is as follows.  Let data-name-1 be associated with text-a in
the  (i)th  sub-schema  in the program, and let the next sub-schema in
which data-name-1 is declared be the (j)th.  Then text-a will again be
associated  with  data-name-1  unless  text-b is actually present with
data-name-1(j)--in which case  text-b  will  become  the  default  for
data-name-1 in later sub-schemas.


2.1.3.2 The COPY OTHERS Statement -  This statement is used  to  place
the  "remaining"  DATA entries of a RECORD entry in a sub-schema.  For
example, if REC1's DATA entries were A1, A2, A3, A4 and A5, saying:

     01 REC1.

would be equivalent to:

     01 REC1.
     02 A2.
     02 A4.
     COPY OTHERS.

However the usual usage of COPY OTHERS would  be  something  analogous
to:

     01 REC1.
     02 A2.
     THIS IS ARBITRARY TEXT
     02 A4.
     SO IS THIS
     COPY OTHERS.


2.1.3.3 The COPY TEXT Statement -  To  associate  data-name-1(j)  with
the text associated with data-name-1 in an earlier sub-schema, one may
type the following, rather than the actual text:

                     COPY sub-schema-name [TEXT].

Example:

     RECORD NAME IS R1
             :
             :
     02 D1 SIZE 4 WORDS.
     02 D2 TYPE FLOAT BIN.
     02 D3 PIC X(5) OCCURS 4.
             :
             :
     SUBSCHEMA NAME IS SS1.
             :
             :
DBMS5.DOC                                                      Page 12


     01 R1.
     02 D1.
     03 DD1 PIC X(12).
     03 DD2 PIC S9(18) USAGE COMP.
     COPY OTHERS.
             :
             :
     SUBSCHEMA NAME IS SS2.
             :
             :
     01 R1.
             :
             :
     SUBSCHEMA NAME IS SS3.
     01 R1.
     02 D1.
     EQUIVALENCE (D1(1),D6BIT), (D1(3),DPINT)
     02 D2.
             :
             :
     SUBSCHEMA NAME IS SS4.
     01 R1.
     02 D1.
     COPY SS1.
     COPY OTHERS.

Sub-schemas SS1,  SS2,  and  SS4  lead  to  exactly  the  same  record
description  being  placed  in the COBOL host program.  Sub-schema SS3
places  INTEGER  D1(4)  AND  REAL  D2,  as  well  as  the  EQUIVALENCE
statement, in the FORTRAN host program.


2.1.4  The SCHEMA Program Interface

The V4 command line processor utilizes SCAN  and  WILD.   The  general
form of the command line is as follows:

                  [file-spec=] file-spec [switches]

If all or part of the output file spec is absent,  the  missing  parts
are derived from the input file spec.  The default extension for input
files is .DDL.  Any extension in the output file spec is ignored.  The
extension of the output file is always forced to .SCH.

In V4 there is just one class  of  switch,  the  /CREATE  switch.   It
controls whether the .DBS files are (re)created or left as they are:

     1.  If no switch is present, a .DBS file is created  only  if  it
         does not exist already.

     2.  If /CREATE is present, the .DBS files are always created.

     3.  If /NOCREATE is present, the .DBS files are never created.
DBMS5.DOC                                                      Page 13


There has been  a  slight  change  of  philosophy  in  how  areas  are
addressed.   Areas  generally  have  the  property that they stay put:
once they contain live data their name and  directory  seldom  change.
Consequently  when  SCHEMA initializes an area, the area is associated
to its directory of creation permanently.  In other words,  if  during
the  running of SCHEMA AREA1 is ASSIGNed to FILE1, it is also ASSIGNed
to the directory which constituted the current directory path.

As noted earlier, the error detecting capability of  SCHEMA  has  been
expanded.   Additionally  the  error messages are now in standard form
(ie.  preceded by ?DDLxxx or %DDLxxx).  Lastly  an  error  message  is
accompanied  by  the  first  (and  last)  line of the offending source
statement, if applicable.

Important:  the distinction between warnings (%)  and  errors  (?)  is
functional as well as descriptive.  If the error count is greater than
0, the .SCH file (and .DBS files) will not  be  (re)created.   If  the
warning  count  is greater than 0 and the error count is 0, processing
will not be curtailed.


2.1.5  Exception Handling


2.1.5.1 The ERROR  Special  Registers -   Each  time  a  DML  verb  is
executed, ERROR-STATUS and ERROR-COUNT are set to well-defined values.
If no exception occurred, ERROR-STATUS equals the null-string (ie.  it
is  a 0-word) and ERROR-COUNT equals 0.  The other three ERROR special
registers have the same value as before the verb was executed.

If an exception did occur, ERROR-STATUS equals " xxyy" and ERROR-COUNT
equals  1, where "xx" is a statement code (see 2.1.5.2) and "yy" is an
exception code (see 2.1.5.4).

ERROR-AREA will always equal the last area actually referenced.

Except for OPEN and CLOSE, ERROR-RECORD will be  blanks  only  if  the
exception occurred while DBCS was still processing the verb's argument
list.  Otherwise it will be the object record's type unless  the  verb
"traverses"  the  data base.  A qualified DELETE recursively traverses
the data base, FIND NEXT with a  non-null  record-name  traverses  the
data  base,  and  FIND OWNER traverses the data base.  In these cases,
ERROR-RECORD will be the record type of the last record operated upon.

ERROR-SET will be blanks unless at least one set  operation  has  been
started  at  the  time  of  the  exception.   Each  of  the  following
constitutes a set  operation:   FIND  NEXT/PRIOR/OWNER  OF  SET,  each
auto-insert  during a STORE, each actual insert during an INSERT, each
remove in a  REMOVE  and  each  auto-remove  in  a  DELETE,  and  each
resorting of a set occurrence during a MODIFY.
DBMS5.DOC                                                      Page 14


2.1.5.2  Classes  of  Exceptions -   There  are  several  classes   of
exceptions  explicitly  defined.   ALL  is  of  course  all  the valid
statement-code/exception-code  combinations,   SYSTEM   is   all   the
exceptions  with  a  code  greater  than  or  equal to 55.  The SYSTEM
exceptions are discussed  in  some  detail  in  the  next  subsection,
Failsofting.    The  other  defined  classes  are  partitions  of  the
statement-codes, which are:

     STATEMENT               CODE
     ----------------------------
     HOST                     00
     CLOSE                    01
     DELETE                   02
     FIND                     03
     UNUSED                   04
     GET                      05
     UNUSED                   06
     INSERT                   07
     MODIFY                   08
     OPEN                     09
     UNUSED                   10
     REMOVE                   11
     STORE                    12
     RESERVED                 13
     RESERVED                 14
     BIND                     15
     CALL                     16

The HOST statement-code is associated with the IF predicates  and  the
MOVE  STATUS  command.  The BIND statement-code is associated with the
SBIND,  BIND,  EBIND,  and  SETUSE  entry  points.   Also  note   that
exceptions  31 thru 36 can only be generated during binding.  The CALL
statement-code is associated with all of the DBCS  entry  points  that
are  explicitly  called  (ie.   the journaling entry points Jxxxxx and
SETDB and UNSET).  The  UPDATE  class  of  exceptions  refers  to  any
exception  that  happens  during  execution of DELETE, INSERT, MODIFY,
REMOVE or STORE.


2.1.5.3 Failsofting -  V4 of DBCS attempts to guarantee two things  as
regards the execution of a run-unit.

First it operates on the assumption that a  critical  application  may
want  to  maintain  complete  control and never be returned to monitor
level against its will.  DBCS  serves  this  goal  by  associating  an
exception code with all the exceptional conditions that it detects--it
never does an EXIT that  the  user  did  not  request  (the  INTERCEPT
facility  is  a  means  of  requesting  EXITs).   This  rule is broken
precisely once:  to place a value in ERROR-STATUS, DBCS must have been
associated  with  a sub-schema--consequently if the first call to DBCS
is at other than SBIND, it types the ?DBSSNI message and exits.

Secondly it attempts to guarantee that no one  accesses  a  data  base
while it or DBCS is in an undefined state.
DBMS5.DOC                                                      Page 15


One aspect of this control is the area-status-record (ASR),  which  is
created the first time an area is OPENed (and always has a dbkey equal
to first-page/1).  When an area is OPENed for update, DBCS  decrements
by  1  FH.STAT  in  the ASR to indicate that the area is in a state of
flux.  FH.STAT is not incremented by 1 until the programmer closes the
area.   If  the run-unit aborts for any reason, DBMEND must be used to
revalidate the area (and reset FH.STAT to 0) before it can  be  OPENed
for normal usage again.

The other major aspect of control is DBCS's status word (one for  each
sub-schema   INVOKEd).    The   two   user-relevant   flags   are  the
system-in-undefined-state (SUS) flag and cannot-backup-updates  (CBUU)
flag.   CBUU  is  turned  on  in  the following circumstances:  during
exceptions 61 and 63, during OPEN if the journal device is MTA, during
the  OPENing  of  an  area  for  update  when  BEFORE  IMAGES  are not
requested, and in conjunction with the SUS flag if an exception occurs
during  binding  or  while  an exception is being processed (this also
causes typing of the ?DBSXWX message).  The SUS flag  gets  turned  on
for  only one other reason, when an exception occurs after an updating
verb has altered one or more data base pages.

The effect of the SUS flag is as follows.  If one tries to enter  DBCS
while  the  SUS  flag  is  set  (at  other than JBTRAN or a sub-schema
changing entry point), DBCS will return immediately with  ERROR-STATUS
set to " xx62".  However, if CBUU is not set, there is one of two ways
in which the SUS flag may get turned off.

If images are ordered by command, DBCS will automatically restore  the
data  base to the state it was in before the verb was entered and turn
the SUS bit off.  But if for some exceptional reason  the  restoration
cannot  be  completed,  the  ?DBSUCR message is typed and CBUU is also
turned on.

If images are not ordered by command  the  program  will  be  able  to
explicitly  restore the data base to its proper state even though DBCS
will have returned with the SUS bit still set.  It can do this via the
JBTRAN  entry  point.  Calling JBTRAN after an updating-exception will
restore the data base to the beginning of  the  in-doubt  transaction,
turn the SUS bit off, and (IMPORTANT!) leave all currency indicators 0
(to  eliminate  the  possibility  of  reference  to  now  non-existent
records).   If, for some exceptional reason JBTRAN fails, ERROR-STATUS
will be set to " 1663" and CBUU turned on.

In summary, there is no way for the programmer to turn  off  the  CBUU
flag.   In  and  of  itself  this is no problem since the CBUU flag is
transparent to the application unless the SUS flag is also turned  on.
In  this latter state however, the run-unit can essentially do nothing
with the sub-schema...  and in effect DBCS no longer trusts itself.
DBMS5.DOC                                                      Page 16


2.1.5.4 The Exception Codes

EXCEPTION       DESCRIPTION
---------------------------------------------------------------
    00          A WARNING:  the compile-time and run-time versions  of
                the  .SCH  file differ.  However if a "real" exception
                occurs during binding DBCS always returns the code  of
                that  exception...   but to indicate that exception 00
                has occurred as well, DBCS types the %DBSCED  message.
                However,  as a general rule, the "real" exception will
                not persist after the program-unit is recompiled  with
                the up-to-date .SCH file.

    01          Area not open

    02          Dbkey inconsistent with area-name.  Can also  indicate
                that  a  referenced  page number is in an area that is
                not in the sub-schema.

    03          Record affected by concurrent application--V5 only

    04          Data-name invalid or inconsistent (ie.  during GET  or
                MODIFY with data-name list)

    05          Violation of DUPLICATES NOT ALLOWED phrase

    06          Current of (set/record/area) not known

    07          End of set or area

    08          Referenced name not in sub-schema.  This can occur for
                many  reasons:   (1)  In traversing a set, if a record
                type not in the sub-schema is encountered.  (2) During
                STORE  OR  DELETE,  if  set  type  owned by the object
                record type is not in the sub-schema.  (3) During  set
                occurrence  selection  if  the  VIA  set is not in the
                sub-schema.   (4)  During  calc   processing   or   in
                searching  a sorted set, if not all subkeys are in the
                sub-schema.  (5) During MODIFY, if the sort key  of  a
                set not in the sub-schema is modified.

                The solution to this problem is of course to place the
                offending name in the sub-schema.

    09          An update usage mode required (eg.  attempt to STORE a
                record while the area is OPEN for RETRIEVAL)

    10          Privacy breach attempted

    11          Data space exhausted (ie.  no more  room  to  STORE  a
                record).   Note  that  this  can  occur  while DBCS is
                trying  to  store  an  internal   record   type:    in
                particular, the index blocks in a sorted set.

    12          Unused
DBMS5.DOC                                                      Page 17


    13          No current record of the run-unit

    14          Object record is mandatory  automatic  member  of  the
                set.

    15          Attempt to REMOVE a record which is either a MANDATORY
                member or not a member type at all.

    16          Record is already member of set.

    17          Need a record which is current of "-----", but it  has
                been  deleted  (eg.   can occur during FIND CURRENT OF
                "-----";  or during GET, if the record was deleted  by
                a concurrent run-unit).

    18          Unused

    19          Data conversion unsuccessful--unused for now

    20          Current record of run-unit not of right record type

    21          Unused

    22          Record not currently member of set, analogous to xx17.

    23          Illegal area-name was passed in an AREA-ID.

    24          Temporary and permanent areas referenced in  same  DML
                verb.

    25          No set occurence satisfies argument values (eg.   calc
                value in UWA matched no owner record)

    26          No record satisfied RSE, catch-all exception for  FIND
                verb.

    27          Unused

    28          Area already open

    29          Unused

    30          Unqualified DELETE attempted on non-empty set

                NON-CODASYL EXCEPTION CODES

    31          Unable to open the .sch file

    32          Insufficient  space  allocated   (eg.    SIZE   clause
                specified  less  space that what the compiler actually
                needed)

    33          None of the areas a record type can be WITHIN  are  in
                the sub-schema.
DBMS5.DOC                                                      Page 18


    34          A set is in the sub-schema, but its owner record  type
                is not.

    35          Dynamic use-vector full

    36          Attempt to INVOKE too many sub-schemas (currently more
                than 8), attempt to UNSET an empty sub-schema stack or
                SETDB a full stack.

    37          Argument  to   SETDB   is   not   an   already-INVOKEd
                sub-schema.

    38          Duplicate operation on resource:  you  have  attempted
                to  open  the  journal  twice;   you  have  opened  it
                EXCLUSIVE and are now opening an area with  USAGE-MODE
                UPDATE;  you are calling JSTRAN while a transaction is
                already active;  or you have multiple INVOKEs and have
                attempted to open the same area twice.

    39          DBS file not found

    40          Requested access conflicts with existing  access.   In
                other  words,  the resource is not available:  (1) you
                attempt to open an area in a  USAGE-MODE  incompatible
                with  another  run-unit's  control  (eg.  you try EXCL
                RETRIEVAL and he already has it open with PROT UPDATE)
                (2)  you  attempt to open the journal and a USAGE-MODE
                conflict results.  (3) you attempt to delete a  record
                retained by another run-unit.  (4) you attempt to open
                an area (or the journal) and the file-system signals a
                file protection error.

    41          No channel available...attempt to open too many areas

    42          Area  in   undefined   state   (eg.    after   crash).
                Internally  this means that FH.STAT in the ASR is less
                than 0.  DBMEND should be used to FORCEOPEN  the  area
                and return it to a valid state.

    43          Area in creation state.  This can happen to the system
                area  only.   It will happen if the run-unit aborts at
                just the right time during the very first  OPENing  of
                the  system  area.   DBCS  recognizes  this  state  by
                leaving FH.STAT equal to 1 until initialization of the
                system area is completed.

                If this exception is returned, the  programmer  should
                either  rerun  SCHEMA  or,  more simply, just create a
                0-length file with one of the text editors.

    44          Attempt  to  call  a  journal-processing  entry  point
                before  the journaling system has been initialized (by
                the first OPEN that requires journaling).
DBMS5.DOC                                                      Page 19


    45          Attempt to backup the  data  base  with  JBTRAN  while
                DBCS's  CBUU  bit  is set (see 2.1.5.3) or when a file
                (ie.  journal or area) is shared for update in command
                mode or for JBTRAN(gtr 0) when it is shared for update
                in transaction mode.

    46          Magtape  service  is  unavailable--DAEMDB  returned  a
                failure code.

    47          Reserved

    48          Reserved

    49          Reserved

    50          Unused

    51          Unused

    52          Unused

    53          Unused

    54          Unused

                SYSTEM EXCEPTIONS

    55          Pseudo-exception:   DBCS   types   message   that   no
                sub-schema has been initialized yet

    56          Inconsistent data in .DBS file.  DBMEND should be used
                to  restore  the  data  base to a valid state.  If the
                problem can be reproduced, it probably  indicates  the
                presence of a DBCS software error.

    57          DBCS software error probably

    58          Illegal argument was passed by user (or setup by  host
                interface).

    59          No more core-memory available

    60          I/O error attempting to access a .DBS file -- is  DBCS
                bug,  is  spurious,  or is disk quota exceeded or file
                protection failure.

    61          Unable to append to journal either in normal operation
                or  in  trying  to  open  a journal for appending (ie.
                journal in an aborted-state but not designated as done
                with).   This  exception  turns on CBUU as well as SUS
                (see 2.1.5.3).

    62          Attempt to enter DBCS at  other  than  JBTRAN,  SBIND,
                SETDB, or UNSET while the SUS bit is on (see 2.1.5.3).
DBMS5.DOC                                                      Page 20


    63          Unable to complete restoration of the proper data base
                state--either   in   JBTRAN  or  when  initializing  a
                run-unit at the start of an  interleaving-unit.   This
                exception turns on CBUU as well as SUS (see 2.1.5.3).

    64          Internal use only

    65          Monitor space for ENQ entries exhausted or  ENQ  quota
                exceeded

    66          ENQ/DEQ/ENQC  failure:   user  does   not   have   ENQ
                capabilities set or some DBCS problem

    67          Unable to initialize magtape service--as opposed to it
                being  unavailable  (eg.  SYS INFO not running, DAEMDB
                not running, or some DBCS problem)

    68-99       Reserved


2.1.6  The Data Manipulation Language


2.1.6.1 The OPEN Statement -  The only part of the OPEN statement that
has changed is the USAGE-MODE clause.  The syntax is now:

        USAGE-MODE [IS] [PROTECTED!EXCLUSIVE] RETRIEVAL!UPDATE

Although the syntactic change is small, three  USAGE-MODEs  will  have
been  added  (the  last in V5), and the meaning of each USAGE-MODE has
been brought into alignment with the CODASYL spec.

EXCLUSIVE RETRIEVAL means that no one else will be able to access  the
area  while  you  have it OPEN and that you will not be able to STORE,
DELETE, MODIFY, INSERT or REMOVE.  Conversely if anyone has  the  area
OPEN for any reason, you will be denied access.

EXCLUSIVE UPDATE means that no one else will be  able  to  access  the
area  while  you have it OPEN and that you will be able to execute any
verb.  Conversely if anyone has the area OPEN for any reason, you will
be denied access.

PROTECTED RETRIEVAL means that no one else will be able to update  the
area  while you have it OPEN and that you will not be able to call the
updating verbs listed above.  Conversely if anyone has the  area  OPEN
for EXCLUSIVE access or PROTECTED UPDATE or UPDATE, you will be denied
access.

PROTECTED UPDATE means that no one else will be  able  to  update  the
area  while  you have it OPEN and that you will be able to execute any
verb.  Conversely if anyone has the area OPEN for EXCLUSIVE access  or
PROTECTED UPDATE or UPDATE, you will be denied access.
DBMS5.DOC                                                      Page 21


RETRIEVAL means that anyone else will be  able  to  access/update  the
area  while  you have it OPEN and that you will not be able to execute
the updating verbs listed above.  Conversely if anyone  has  the  area
OPEN for EXCLUSIVE access, you will be denied access.

UPDATE means that anyone else will be able to access/update  the  data
base  while  you have it OPEN and that you will be able to execute any
verb.  Conversely if  anyone  has  the  area  OPEN  for  EXCLUSIVE  or
PROTECTED access, you will be denied access.

Some general comments:

All update USAGE-MODEs actually modify the .DBS file when a buffer  is
written  to  disk.  A temporary area is the only circumstance in which
there is an after-image directory, in which case a file by the name of
ASSIGNed-name.TMP   is  created.   See  section  2.4  note  7,  for  a
description of the organization of an area .TMP file.

The idea that different USAGE-MODEs  were  synonymous  with  different
accessing  algorithms was a corruption of the USAGE-MODE concept.  The
concept of USAGE-MODE has just two components:  the  level  of  shared
access  to  be  allowed  and whether modification of the area is to be
allowed.


2.1.6.2 The MOVE Statement -  The syntax of  this  statement  has  not
been  changed.   The  change  is  that  it  will now alter the special
registers AREA-NAME and RECORD-NAME to describe the currency indicator
being MOVEd.  Also see subsection 2.2, note 3.


2.1.6.3 DELETing or REMOVing Current of "-----" -  The meaning of FIND
NEXT of SET when current of set has been REMOVEd or DELETEd is apriori
somewhat  ambiguous.   Consequently,  to  allow  this  and  the  other
currency-based  operations  in this situation, some convention must be
established.  The convention employed by DBMS-10/20 V4 is as follows.

The record which  was  NEXT  of  the  eliminated  record  becomes  the
canonical  NEXT  of  SET.   What  this  means  is that, no matter what
happens to the set (short of establishing a new current of set),  this
record is NEXT of SET and the record which is PRIOR to it at any point
in time is PRIOR of SET.

DELETing current of area has no effect on the operation of  FIND  NEXT
of  AREA.  This is the case because DBKEY+1 and DBKEY-1 are inherently
NEXT and PRIOR of the dbkey being deassigned--whereas  the  identities
of  NEXT  and  PRIOR  of  a  set  depend on values in the record being
eliminated.
DBMS5.DOC                                                      Page 22


2.1.6.4 The JBTRAN Routine -  The topic of the JBTRAN routine has been
broached  in  subsections  2.1.1.3 and 2.1.5.3 as well.  To reiterate,
the primary reason to call JBTRAN is to turn off the SUS flag  (turned
on  by  an updating-exception) by backing up the data base to the most
recent transaction-header.   To  use  JBTRAN  for  this  purpose,  the
calling sequence is:

        COBOL:     ENTER MACRO JBTRAN USING 0.
        FORTRAN:   CALL JBTRAN(0)

There  is  potentially  a  second  reason  to  call  JBTRAN.   If   an
application,  for  its  own  reason,  wants  to  wipe  out one or more
transactions, it can do this (even though SUS is off)  by  giving  the
number  of transactions it wishes to backup as the argument to JBTRAN.
(Thus CALL JBTRAN(1) can be used in place of CALL JBTRAN(0),  but  the
reverse  is not true because CALL JBTRAN(0) will do nothing if the SUS
bit was already off.)

It is unnecessary  to  do  a  JETRAN  after  cleaning  up  an  aborted
transaction  with  JBTRAN  because  JBTRAN  simulates  a JETRAN of the
following form:  JETRAN ("JBTRAN", number backed up).


2.1.6.5 The STATS Routine -  There  have  been  some  changes  to  the
information  that  is  output  when  STATS  is called.  Most of the V4
output is self-explanatory, but a couple of things do require comment.

Some of the simpler routines in DBCS have a CPU duration which  is  at
the  border-line of resolution of the RUNTIM UUO.  This means that the
statistics for these entry points may be erratic.  Also  the  cost  of
generating  detailed  timings  is rather large.  Consequently detailed
timing statistics will not be generated unless the  user  specifically
requests  them.   He  does  this by setting the global symbol "STATS."
non-0.  The simplest way to accomplish this is:

     .R LINK
     *user-prog,/DEFINE:STATS.:1,etc/G

The STATS information is output  on  a  sub-schema  basis.   In  other
words,   if  one  has  invoked  two  sub-schemas,  one  will  get  two
subsections of output.  Also each figure for  sub-schema  run-time  is
the  result  of  subtracting  the  value  of  RUNTIM  at the time each
sub-schema was SBINDed from its current value.

"Same-page  data  base  accesses"   is   a   measure   of   intra-page
localization.   It  is incremented by 1 each time the page accessed is
the same page as was accessed the preceding time.

Lastly, reads of a temporary area's directory page are included in the
count of pages actually read from disk.
DBMS5.DOC                                                      Page 23


2.1.6.6 Passing Strings to DBCS -   There  are  several  entry  points
which  take  string arguments (eg.  JSTRAN, JRTEXT).  Particularly for
the benefit of FORTRAN users, the  convention  for  how  to  interpret
string  arguments  has  been expanded.  In particular, V3 allowed just
two ways for COBOL (eg.  ENTER MACRO JSTRAN USING  "MYTRAN",TCOUNT  or
ENTER  MACRO JSTRAN USING TRAN-NAME,TCOUNT where TRAN-NAME appeared in
the DATA DIVISION with PIC X(30)) and only one way  for  FORTRAN  (eg.
CALL  JSTRAN('MYTRAN',I)).   In V4, these plus several other ways will
be possible (see example below).

     DATA TYPE(ARG word,bits 9-12) INTERPRETATION
     ------------------------------------------------
     unspecified (ie. 0)           string pointer
     FORTRAN LOGICAL               data-varying
     INTEGER/COMP                  5 characters
     undefined
     REAL/COMP-1                   5 characters
     undefined
     undefined
     undefined
     REAL*8                        10 characters
     DOUBLE COMP                   string pointer
     undefined
     undefined
     COMPLEX                       string pointer
     COBOL string                  string pointer
     undefined
     FORTRAN literal               ASCIZ

A string pointer is a two-word quantity:  its first  word  is  a  byte
pointer,  and  the  right  half  of  the  second word is the number of
characters in the string.  A data-varying string is an  actual  string
in  which  the  length is stored in the word preceding the string.  An
ASCIZ string is a string that is terminated by a 0 byte.

For example, let a data-varying string be used as follows:

     LOGICAL DUMARR(7)
     EQUIVALENCE (DUMARR(1),DVLEN),(DUMARR(2),TRNAME)
     DATA DVLEN/30/
     TYPE 101
 101 FORMAT(' ENTER TRANSACTION NAME')
     ACCEPT 102,TRNAME
 102 FORMAT(6A5)
             :
             :
     CALL JSTRAN(TRNAME,I)
DBMS5.DOC                                                      Page 24


2.1.7  The Host-language Interface


2.1.7.1   Compile-time/run-time   .SCH   File   Compatibility -    The
possibility of compile-time/run-time .SCH file incompatibility will be
made explicit.  This will be  done  by  incrementing  an  edit  number
within   the  .SCH  file  each  time  SCHEMA  is  run  and  by  having
FORDML/COBOL place the value that they see in  the  argument  list  of
SBIND.  Then at run-time, SBIND will compare the edit-number passed to
it and the actual edit number of the .SCH file.  If these two  numbers
differ,   ERROR-STATUS   will  be  set  to  " 1500"  (usually...   see
subsection 2.1.5.4, exception 00 for details).

(Note that INTERCEPT/NOTE can be used to  detect  this  condition,  if
that is desired).


2.1.7.2 Record/data Formats in the Host-language -  The order  of  the
data-names  in  the UWA will always be the same as it is in the schema
DDL.  In other words, the calc keys will not be moved to the front  of
a   record.    Also  AREA-IDs,  DIRECT  keys,  and  ALIASes  will  not
incorrectly be made part of the record with which they are associated.
Also see subsection 2.2, notes 4 and 5.


2.1.7.3 DBCS symbols that are user-referencable -  This set  of  names
is  important  for two reasons.  It identifies the routines for use in
explicit calls, and it identifies which names  the  programmer  cannot
use for naming his own routines.

A starred (*) name identifies a synonym for the immediately  preceding
entry  point  name.   KEY  X identifies the negative number associated
with a keyword, as described in section 2.4, note 2.  A data base word
(ie.  area, set, record, data) refers to the name ID (see section 2.4,
note 1) for the particular data-base-name or  the  string  that  would
represent that name (ie.  "REC1" for REC1).

     CLOSED       (KEY ALL)
     CLOSED       (KEY AREA, area-list)
     DELETR       (0!KEY SELECT!KEY ALL!KEY ONLY)
     FIND1        (record!0, USING-value)
     FIND2        (set!0, currency, KEY currency-keyword)
     FIND3        (KEY relative, record!0, area!set, KEY AREA!KEY SET)
     FINDO        (integer, record!0, area!set, KEY AREA!KEY SET)
     FIND4        (set)
     FIND5        (KEY DUPLICATES!0, record)
     GETS         (record [,data-list]) !  (0)
     *GET
     INSERT       (record!0, set-list)
     *INSRT
     MODIF        (same-as-GET)
     *MODIFY
     MOVEC        (currency, KEY currency-keyword, result)
     OPEND        (KEY   RETR!KEY   UPDATE,   0!KEY   PROT!KEY   EXCL,
                  privacy-key, KEY ALL!area-list)
DBMS5.DOC                                                      Page 25


     REMOVE       (same-as-INSERT)
     *REMOV
     STORE        (record)
     *STORED
     SBIND        (schema,edit, subschema,ss-mask, SYSCOM-address)
     BIND         (record,data-address-list)
     EBIND        (0,DBMS-NULL)

Additionally, the FINDs and STORE can have appended a  SUPPRESS  list:
KEY ALL!KEY AREA!KEY RECORD!KEY SET!set,...

The other undotted names are:

     SETDB      UNSET       SAVESS     JMNAME
     JMAFT      JMBEF       JMBOTH     JMNONE
     JBTRAN     JSTRAN      JETRAN     JRSYNC
     EMPTY      *SETCON     MEMBER     *RECMEM
     OWNER      *RECOWN     TENANT     *RECMO
     STATS


2.1.7.4 Validating data aggregates -  When the SIZE clause is used  in
a data-name entry, the programmer has to tell SCHEMA how much space to
reserve in the host-language's UWA.  There  are  no  serious  pitfalls
associated  with  providing extra space, but to protect the programmer
from losing data, DBCS will  signal  exception  32  when  insufficient
space is provided.

(However there is  no  intrinsic  way  to  determine  the  size  of  a
data-name at run-time (without passing a prohibitive additional amount
of information during binding).  The best DBCS can do is calculate how
far  apart  two  consecutive  data-names  are.   Unfortunately, when a
referenced name (eg.  DIRECT key) is shared between two  record  types
or  a FORTRAN application does not have pseudonyms for all data-names,
data is not necessarily sequential.  In other  words,  the  validation
check DBCS makes is negated under these two circumstances.)


2.1.7.5 Loading DBMS applications -  DBMS applications are  loaded  in
the  same fashion as any other COBOL or FORTRAN program.  This is true
whether or not one is using a private  library  or  a  system  default
library.  For example, .LOAD COBPRG and .LOAD FORPRG, MYFLIB /SEARCH.


2.1.8 The DBINFO utility

This program can be used to  dump  data  from  a  data  base,  make  a
cross-reference  of  the  names in a sub-schema, and calculate certain
statistical information about the state of a data base.

It is similar to DBMEND in that its command interface is verb oriented
and  has  the same lexical rules (eg.  names containing dashes must be
enclosed  with  quote  marks).   Also  it  shares  some  of  the  same
"background"  commands since, in both contexts, the user has to select
a schema and open and close areas.
DBMS5.DOC                                                      Page 26


2.1.8.1  APPEND/SUPERSEDE  commands -   This  command  specifies   the
destination  file  spec  for  any INFO to be displayed.  Its syntax is
simply:

                      APPEND!SUPERSEDE file-spec

If APPEND is specified, any existing information in the file will  not
be   overwritten.   If  SUPERSEDE  is  specified,  the  file  will  be
overwritten.


2.1.8.2 CLOSE command -  This command is used to  CLOSE  one  or  more
areas that the programmer has OPENed.  its syntax is:

                 CLOSE ALL ! area-name[,area-name...]

2.1.8.3 DISPLAY command -  This is the primary action  command.   Each
time  the  user  gives  a  DISPLAY  command he causes the current INFO
output file to be appended to.  The syntax for this command is:

     DISPLAY CREF ! MAP ! free ! data ! usage
       usage-->USAGE [:set-name]
       data -->DATA [:set-name]
       free -->FREE [:integer]

If USAGE  is  not  followed  by  a  set-name,  the  number  of  record
occurrences  for each record type is printed for each object-page (see
2.1.8.6).  If a  set-name  argument  is  present,  each  owner  record
occurrence  which  is  on  an object page is described:  the number of
member records on the same page as the owner and  the  number  in  the
entire set occurrence are displayed.

If DATA is not followed by a set-name, each record  occurrence  on  an
object  page  and in the sub-schema is dumped (ie.  each of its fields
is displayed).  Empty pages do not print any information.  If DATA  is
followed  by  a  set-name,  the  NEXT  pointers  of  each  object  set
occurrenceusage) are followed, and the  records  are  dumped  in  that
order.   A  set  occurrence  is  an object of the command if its owner
record is on an object page (see 2.1.8.6).

FREE not followed by an "integer" is equivalent to FREE followed by 0.
DISPLAY  FREE  will  consider  any  page which has less than "integer"
words free to be full.  For each page which is neither full nor empty:
the   page   number,   the  count  of  free  words,  and  some  number
(1/10-free-words) asterisks (*) will be printed.   Additionally  empty
(or  full)  page-sequences  (at  least  3  consecutive  pages) will be
displayed as "(empty pages) low - high".

The CREF option causes DBINFO to generate an alphabetical  listing  of
the  symbols in the sub-schema:  what each is, plus how and where each
is used.
DBMS5.DOC                                                      Page 27


The MAP option causes DBINFO to generate a pictorial representation of
each  record type in the sub-schema.  It shows which words contain set
(and calc) linkages and exactly what user data is in each word.   Each
byte  of  user  data  is  represented by an asterisk.  In other words,
there can be at most 6, 5, and 4 asterisks per word in a SIXBIT, ASCII
and EBCDIC record.  Conversely, full-word bytes (ie.  in computational
numeric  items)  are  represented  by  one  left-justified   asterisk.
Lastly,   the   index  associated  with  each  data-name  in  the  map
corresponds to the index printed to the left of its value in the  data
dump.


2.1.8.4 OPEN command -  This command OPENs  each  specified  area  for
PROTECTED RETRIEVAL.  Its syntax is:

           OPEN ALL![area-name[,area-name]] [:privacy-key]

In other words, it OPENs all areas in the relevant sub-schema or  just
those   explicitly   specified.    Each   area  named  (explicitly  or
implicitly) in the command must have the same privacy-lock value.  The
privacy-key  phrase  is  required  only  if  the areas have a non-null
privacy lock.


2.1.8.5 PAGES command -  This command enables the user to control  the
pages to which a DISPLAY comand will apply.  Its syntax is:

     PAGES [range-list]
       range-list -->range-tuple [,range-list]
       range-tuple-->integer ! integer-integer ! area-name

If no range-list is specified, the range-list is defaulted to the list
of  OPEN areas.  And specifying an area as a range-tuple is equivalent
to specifying area-first-page - area-last-page.  Lastly, specifying  a
single  integer,  say  (n),  is  the same as specifying n-n.  In other
words, PAGES' argument is a list of zero or  more  (maximum  16)  page
ranges.   For  example,  PAGES 4,7,13-25 would localize future DISPLAY
commands to pages 4, 7, and 13 thru 25.


2.1.8.6 SCHEMA command -  This command identifies the schema  file  to
DBINFO.  Its syntax is simply:

                          SCHEMA schema-name


2.1.8.7 SS command -  This command identifies the sub-schema that will
be the context for DBINFO's evaluation of future DISPLAY commands.  It
is an action command;  the  sub-schema  specified  will  be  bound  by
DBINFO  each  time  the command is given.  (Note:  use of this command
does cause the run ID in the .SCH file to be incremented by 1).
DBMS5.DOC                                                      Page 28


Understanding this concept is crucial to effective use of DBINFO.   By
judicious  sub-schema  specification,  one  can precisely control what
record types are DISPLAYed, what data-names  within  the  records  are
DISPLAYed,  and what areas constitute ALL.  The syntax of this command
is:

                         SS [sub-schema-name]

If  the  sub-schema-name  is  absent,  the  "improper"  sub-schema  is
identified;   that  is,  the  sub-schema which would correspond to the
entire (current) schema.  However,  repeating  this  form  of  the  SS
command  within  one  running  of DBINFO will merely reset the current
sub-schema to the original "improper" sub-schema.


2.2  Functional Incompatibilities

The  list  of  functional  incompatibilities  between  V3  and  V4  of
DBMS-10/20 is as follows:

     1.  Only 02-data-names can appear  in  a  data-name  entry  in  a
         schema, see 2.1.2.2 and 2.1.3.

     2.  A data-name entry in a schema may not contain a USAGE  COMP-x
         phrase, see 2.1.2.2.

     3.  Successful FINDs and STOREs will no longer set up the special
         registers  AREA-NAME  and  RECORD-NAME;   only  the MOVE verb
         will--see subsection 2.1.6.2.

     4.  Calc keys will appear in a host-language program just as they
         do  in  a  RECORD/DATA  entry  in  a  schema,  see subsection
         2.1.7.2.   (This  incompatibility  is  transparent   to   all
         applications  except  those COBOL applications that do a MOVE
         record-name TO temp-name.)

     5.  AREA-IDs, DIRECT keys, and ALIASes are declared as  01  names
         in COBOL, see subsection 2.1.7.2.  This is not truly a change
         but a fix for a bug.  Unfortunately it affects usage  of  the
         ACCESS  statement  in  COBOL.   If  you  had  been  passing a
         record-name to an  ACCESSing  subprogram,  and  expected  its
         DIRECT key or AREA-ID or anALIAS to be implicitly passed, the
         call will have to be altered to make  explicit  reference  to
         the ancillary variable.

     6.  The accessing algorithm for PROTECTED UPDATE will  no  longer
         involve  what  is  called  an  .RCV  file;   areas  OPEN  for
         PROTECTED UPDATE will be  updated  in  place.   Also  if  one
         program has an area OPEN for PROTECTED UPDATE and another has
         it OPEN for RETRIEVAL,  the  retriever  (and/or  updater)  is
         responsible  for  not  getting  messed  up by the changes the
         updater makes.  If this is a problem,  the  retriever  should
         OPEN  for  PROTECTED RETRIEVAL.  For a thorough discussion of
         USAGE-MODEs see subsection 2.1.6.1.
DBMS5.DOC                                                      Page 29


     7.  Sub-schema-names must be unique  across  any  run-unit  which
         INVOKEs  more than one sub-schema.  This was already required
         for FORTRAN usage and is being generalized for  the  sake  of
         simplicity and DBCS efficiency.

     8.  If the owner of a set is to be  SELECTed  thru  the  LOCATION
         MODE  OF  OWNER  phrase and its LOCATION MODE is VIA, the SET
         entry of the VIA set must precede the SET entry in which  the
         record  in  question  is  the owner.  (This sounds much worse
         than it is.  If one places SET entries that  are  nearer  the
         root  of  a  data  base structure before SET entries that are
         farther from the root, one will never have a problem.)

     9.  The name (and device and directory) of the .SCH file will  be
         derived  from  the (possibly implicit) output file spec given
         on the command line to SCHEMA.   Earlier  versions  used  the
         schema-name  in  the  SCHEMA statement for this purpose--this
         name is now ignored.

    10.  The PRINTA entry point no longer  exists  within  DBCS.   Its
         functionality  is  subsumed  by DBINFO.  (See 2.1.7.3 for the
         complete list of V4 entry points).

    11.  A BINDing  failure  now  returns  an  exception  rather  than
         EXITing, see 2.1.1.4 and 2.1.5.4.

    12.  Exception 34 may happen to an existing applications  program,
         see  2.1.5.4.   (The  solution is to remove the set-name from
         the  sub-schema  or  add  the  owner   record-type   to   the
         sub-schema.)

    13.  The  exception  numbers  above  30   bear   no   relationship
         whatsoever  to  what  they  were  in  earlier  versions,  see
         2.1.5.4.

    14.  Privacy locks/keys will be truncated to 5  characters  rather
         than 6 characters.

    15.  The exact mechanism  for  handling  REMOVEd/DELETEd  currency
         indicators  in  earlier  versions is unclear.  See subsection
         2.1.6.3 for a description of how V4 handles this situation.

    16.  In cases where a schema-defined name is always  syntactically
         paired  with  a  keyword  designating the type of name it is,
         DBCS will ignore the keyword.  For example, if one said  MOVE
         STATUS  FOR  REC1 RECORD TO X, DBCS would determine that REC1
         was a record-name from the its symbol block.  In other words,
         keywords in this context serve purely as visual documenation.

    17.  The V4 mechanism for explicitly specifying the  buffer  count
         of an area is described in subsection 2.1.1.5.

    18.  On a SCHEMA command line, "A." does not == "a.ddl", only  "a"
         or "a.ddl" does.
DBMS5.DOC                                                      Page 30


    19.  Two statements may not be on the same line in a DDL program.


2.3  Functional Definition of DBMS-V5


2.3.1  V3 --> V5 conversion utility

This utility is a program named V3TOV5--and by definition it  will  be
useful  only  to existing DBMS-V3 users.  This program is used on-line
by giving a sequence of commands which identifies (by its schema)  the
data base to be converted and requests initiation(continuation) of the
actual conversion.


2.3.1.1 Conversion Steps and V3TOV5 Usage -  A  successful  conversion
will  always  conform to the following sequence of user actions.  Also
it is suggested (although not required) that you keep around your  old
DDL  file  and give your V5 DDL program an extension of .ddn until you
have completed your conversion.

     1.  Read section 4.1.  This section contains instructions on  how
         to  change  V3  source  files  into valid V4/5 files.  (It is
         unlikely any file other than the .DDL file will  have  to  be
         changed).

     2.  Run SCHEMA (V5) and specify the /CONVERT switch:

              R SCHEMA SCHEMA-NAME.DDN/CONVERT

         This will cause SCHEMA to generate all  the  files  it  would
         normally  generate,  but  such  that  the  3rd letter of each
         file's extension will be  "N".   In  other  words,  it  would
         create  a  .SCN  file and some number of .DBN files.  This is
         done to facilitate concurrent existence of the  old  and  new
         copies of the data base.

     3.  The actual conversion protocol is as follows:

         R V3TOV5            ;START UP THE PROGRAM
         SCHEMA schema-name  ;IDENTIFY THE DATA BASE
                             ;BEING CONVERTED
         TRACE integer       ;IF ABSENT, TRACE 10 IS SIMULATED.
                             ;ALLOWS CONTINUATION OF CONVERSION
                             ;AFTER A CRASH BY TYPING 
                             ;[COMPLETED PAGE n]
                             ;EVERY integer PAGES.
                             ;ALSO [COMPLETED AREA name]
                             ;MESSAGES ARE TYPED.
         PAUSE               ;OPTIONAL, IF PRESENT IT CAUSES
                             ;V3TOV5 TO EXIT EACH TIME IT FINISHES
                             ;PROCESSING AN AREA, THEREBY ALLOWING
                             ;THE USER TO DO SOMETHING (EG.
                             ;CHANGE DISKS) BEFORE RESUMING--BY
                             ;TYPING CONTINUE.
DBMS5.DOC                                                      Page 31


         EXPUNGE             ;REQUEST TO EXPUNGE DELETED RECORDS
                             ;(NECESSARY IF THERE ARE ANY
                             ; PARTIALLY DELETED RECORDS IN THE
                             ; DATA BASE--SEE 2.3.1.2.2)
         START               ;START (OR CONTINUE) EXPUNGE
         V3TOV5              ;REQUEST TO MAP V3 DATA
                             ;INTO THE .DBN FILES
         START               ;START (OR CONTINUE) THE MAPPING
         REKEY               ;REQUEST TO FORMAT THE NEW DATA BASE'S
                             ;USER-KEY (IE. SORT/CALC) CHAINS
         START               ;START (OR CONTINUE) THE REKEYING

     4.  Delete all the old files (ie.  the .DBS files  and  the  .SCH
         file).

     5.  Rename *.DBN to *.DBS and schema-name.SCN to schema-name.SCH


2.3.1.2 Understanding the Conversion Process

2.3.1.2.1 Purpose  of  Multiple  Conversion  Steps -   The  conversion
process  is  divided  into  phases  (EXPUNGE,  V3TOV5,  REKEY) for two
reasons.  The first reason is that  the  data  base  will  be  out  of
commission  less  completely--even though the total time of conversion
is probably increased slightly.  This is because  the  possibility  of
interleaving  normal  usage  is much higher than otherwise.  The rules
for interleaving normal usage are as follows:

     1.  During the 1st (ie.   EXPUNGE)  phase,  no  normal  usage  is
         possible.

     2.  After the 1st phase, and until the 2nd (ie.  V3TOV5) phase is
         started, any accessing other than DELETEs is permitted.

         (Note:  until the 2nd phase is started  the  .DBN  files  are
         0-length).

     3.  During the 2nd phase, and thru  the  completion  of  the  3rd
         phase  (REKEY),  retrieval  usage-mode  is allowed on the old
         data base.

         (Note:  the earliest the old data  base  can  be  deleted  is
         after completion of the 2nd phase).

The second reason for multiple phases is that it achieves isolation of
functional processes:

     1.  The 1st phase may  be  omitted  by  some  installations  (see
         2.3.1.2.2).

     2.  Only the 2nd phase simultaneously references both the old and
         new data bases.

     3.  Only the  3rd  phase  requires  journaling  in  order  to  be
         continuable after a crash (see section 2.3.1.3).
DBMS5.DOC                                                      Page 32


2.3.1.2.2 Why/when the EXPUNGE phase is necessary -   DBMS-V3  and  V5
handle  record  deletion  differently.   In DBMS-V5, the DELETion of a
record completely eliminates it from the  data  base.   On  the  other
hand,  the DBMS-V3 deletion algorithm will not return the entire space
of a DELETEd record to the free space manager  until  the  record  has
been  referenced  thru  each set in which it participates.  Until this
has occurred, the remaining part of the record is kept "invisible"  by
the  mechanism  of  having  its  "deleted"  flag turned on in its line
header.  Consequently before the old data base can be  mapped  to  the
new format, any deleted records must be eliminated from the data base.
Conversely the 1st phase may be omitted by an installation if it knows
that  no  records in its data base have the "delete" flag on.  This is
not a life-and-death decision, however, because  the  2nd  phase  will
detect  such  records and inform the user that he must execute the 1st
phase before starting the 2nd phase.


2.3.1.2.3 User-data Dbkeys -  Any field containing  a  dbkey  must  be
described as TYPE DBKEY in the schema because the format of a dbkey in
DBMS-V5 is different than in V3.  If the user does not describe such a
field  as  TYPE  DBKEY,  V3TOV5  will have no way of knowing that each
occurrence of the datum needs reformatting.


2.3.1.2.4 Adding OWNER IS SYSTEM -  If you wish to  add  new  set  and
record  types  to  your  DDL  program, you should wait until after the
conversion process has been completed.  Additionally, you should  read
section 2.4 in the Data Base Administrator's Manual to understand just
what sort of changes are feasible.

In the particular case that you wish to create a  system  record  (ie.
one  or  more new member entries specifies OWNER IS SYSTEM) , you will
have to define a new area and designate it as your system area.   This
is  necessary  because DBCS expects to allocate the system record when
an area is accessed for  the  first  time--and  there  is  no  way  to
simulate  that  pattern of access during the conversion of an existing
area.


2.3.1.2.5  Hustling -   V3TOV5  allows  you  to  operate  outside  the
prescribed  protocol  if  you  feel  it  necessary.   But  these  more
error-prone activities  are  isolated  here  to  protect  the  average
"converter".

     1.  Any number of new pointers can be added to a record type.  In
         particular,  you  might add prior pointers to certain sets to
         improve updating efficiency.  (IMPORTANT REMINDER:  the order
         and number of 02-data-names must not be changed however).

     2.  The REENTER monitor command can be used (in conjunction  with
         /PAUSE)  to control the flow of conversion more closely.  For
         example, one can do all three steps  for  a  single  area  by
         specifying  to  /START with that area for each step and doing
         REENTER/next-step after each pause.
DBMS5.DOC                                                      Page 33


2.3.1.3 Exceptional Conditions -  There are certain "bad" things  that
can  happen  during the conversion process.  The following subsections
enumerate the known possibilities and describe what the user should do
in each eventuality.


2.3.1.3.1  Recovering  from  a  System  Crash -   The  mechanism   for
recovering  from  an abortion of either the EXPUNGE or V3TOV5 phase is
the same.  The mechanism for recovering from the REKEY phase is as for
the  other  phases  plus an additional preliminary step.  The critical
parameter during a restart is the last TRACE message printed.  It will
contain   the  last  page  that  is  known  to  have  been  processed.
Conversely the argument to the TRACE command controls how often  these
messages  are  printed.   (Presumably,  in  a very large data base one
might increase the interval from the default of  one  message  per  10
pages processed.) The recovery scenario is as follows:

     1.  If aborted during REKEYing,

         R DBMEND            ;THE DATA BASE RECOVERY UTILITY
         CONVERT             ;INDICATE THE USE OF .??N FILES
         JOURNAL V3TOV5      ;OPEN THE JOURNAL
         FORCE ALL           ;OPEN ALL AREAS, ;GIVE  PRIVACY  KEYS  IF
                             ANY
         START               ;GIVE THE MERGE'S "LEFT" BOUNDARY 
         END                 ;...AND THE "RIGHT" BOUNDARY
         MERGE BEFORE        ;PERFORM THE ACTUAL MERGE
         CLOSE ALL           ;CLEANUP THE OPEN AREAS TO BE DONE
         UNLOAD              ;DESIGNATE THAT V3TOV5.JRN ;IS DONE WITH

     2.  Then for all phases,

         R V3TOV5
         SCHEMA schema-name         ;IDENTIFY THE SCHEMA
         EXPUNGE or V3TOV5 or REKEY ;WHICHEVER ABORTED
         START last-trace-value     ;TO RESUME AT RIGHT PAGE
                                    ;ie.  restart at 1st page after
                                    ;last trace value


2.3.1.3.2  Area  or  its  Page  Size  Too  Small -   Except  for   one
circumstance,  the  number  of  pages in a V3 area will suffice in V5.
The exceptional circumstance can manifest itself during conversion  if
a  V3  area is nearly full and the area contains occurrences of sorted
set types.  The circumstance is that the  amount  of  space  available
will  be inadeqaute for storing each sorted-set index structure during
REKEYing.  To correct the problem, either increase the  last  page  of
the  area  or  increase  the  area's  page  size.  (The comments about
detection and restarting at the end of the next paragraph  also  apply
here.)
DBMS5.DOC                                                      Page 34


Except for one circumstance, the information on a page in  a  V3  data
base  can  be  mapped  into  the  same or fewer words in DBMS-V5.  The
exception is a sorted set in which PRIOR pointers are  not  explicitly
specified.   DBMS-V5 always puts a PRIOR pointer into each record in a
sorted set.  Consequently, if an old page is very full  and  has  some
such  records, the conversion process would overflow the page.  If you
are sure this will happen  to  one  or  more  of  your  areas,  simply
increase  that area's page size to the next 128-word-multiple.  If you
do not anticipate this eventuality and it occurs, V3TOV5  will  simply
abort  with  an appropriate message.  At this point, you should modify
the appropriate page size(s) of your  DDL  program  (give  SCHEMA  the
command  line  "schema-name/CREATE/CONVERT")  and  restart  the V3TOV5
phase from its beginning.


2.3.1.3.3 Improperly Converted .DDL File -  Although it  is  unlikely,
it  is  possible  that  you will improperly convert your old .DDL file
into the new format.  (It is unlikely because the changes  are  either
mechanical,  such  as  USAGE COMP to TYPE FIXED BIN, or involve moving
lines into the sub-schema.) The more likely danger is  that  you  will
try to slip an extra change into your schema--in which case you are on
your own.  In any event, any flaw in the converted schema should  show
up  in  a widespead fashion.  Consequently, after you have renamed the
.??N files to their standard  extensions,  you  should  use  the  DUMP
and/or  USAGE  commands  of  DBINFO  to  validate  that  the  data, as
represented in the new format, is valid.


2.3.1.3.4  Abnormal  Abort  during  Conversion -   This  situation  is
defined  by  a  true  abort (eg.  ill mem ref), or the V3TOV5 messages
?VTVSAF or ?VTVDAF.  Basically, it can  be  caused  by  one  of  three
things.

     1.  An improperly converted schema.  Before retrying, check  over
         your changes.

     2.  A spurious monitor error.

     3.  If the problem persists each time you  restart,  it  must  be
         assumed  you  have discovered a bug and the problem should be
         reported.

Phase specific restart rules:

     1.  If aborted during 1st phase, it  cannot  be  schema  problem.
         Get a fresh copy of your data base and restart the phase from
         the beginning.

     2.  If aborted during the 2nd phase:  check the schema,  recreate
         the  .DBN  files  with SCHEMA, and restart the phase from its
         beginning.

     3.  If aborted during the 3rd phase:   delete  V3TOV5.JRN,  check
         the  schema,  then  restart with the 2nd phase--see preceding
         rule.
DBMS5.DOC                                                      Page 35


2.3.1.3.5 Other V3TOV5 error messages

     ?VTVDUK   V3TOV5 found a sort or calc key in a record that equals
               the  key  in another record, but the schema states that
               duplicates are not allowed.

     ?VTVICS   it is not meaningful to repeat a phase or follow it  by
               an earlier phase (eg.  V3TOV5 followed by EXPUNGE).

     ?VTVNAS   you gave a START without preceding it with a conversion
               action.

     ?VTVNMF   in processing your old schema, V3TOV5  found  an  area,
               set,  record,  or  data  name  that  is not in your new
               schema...correct the discrepancy.

     ?VTVOOS   V3TOV5 detects this condition so as  to  guarantee  its
               integrity;  just type R V3TOV5 to do more work.

     %VTVUFA   if the file associated with an  area  is  null  or  not
               found,  V3TOV5  will  automatically  skip that area and
               continue with the next one.  If the  file  should  have
               been found, report the problem or correct your scheam.

     ?VTVUAJ   you have a V3TOV5.JRN file  that  is  in  an  undefined
               state.   You  should  either delete it or run DBMEND as
               described in 2.3.1.3.1.


2.3.1.4 Resource requirements -  The resource requirements  of  V3TOV5
are  approximately as follows.  It statically requires 15K of core and
will expand its core as necesary for  area  buffers  and  the  in-core
sub-schemas.   The  average expansion will be on the order of 5K.  The
disk space required is phase dependent and is the  entire  data  base:
plus  nothing during the EXPUNGE phase, plus a second copy of the data
base during the V3TOV5 phase, plus a 1-transaction journal during  the
REKEY  phase.   However  by  appropriate  use of the PAUSE switch (see
2.3.1.1), you can cause "data base" to be replaced by "area".


2.3.2  Simultaneous Update

DBMS-V5 will allow a user to update (or retrieve) data  while  another
updates   data   in   the   same   area/file.    It  will  handle  the
valid-copy-of-data  problem  inherent  in  this  facility   thru   the
mechanism of the ENQ/DEQ monitor calls.

(Note:  the facility relies on the fact that  users  of  a  particular
data base all access the same schema).

Four DBMS components control whether and how  simultaneous  update  is
involved in a run-unit's operation.
DBMS5.DOC                                                      Page 36


     1.  It is the OPEN statement which controls whether a run-unit is
         within  the  domain of the simultaneous update facility.  The
         simultaneous  update  facility  really  consists   of   three
         separate  OPEN  USAGE-MODEs:   UPDATE,  PROTECTED UPDATE, and
         RETRIEVAL.  PROTECTED UPDATE is included because a  PROTECTED
         UPDATER  must  block  out  RETRIEVERS  (and vice versa).  The
         three non-simultaneous usage-modes are  PROTECTED  RETRIEVAL,
         EXCLUSIVE  RETRIEVAL,  and  EXCLUSIVE UPDATE.  The meaning of
         each  USAGE-MODE  is  presented  in  section  3   sub-section
         2.1.6.1.

     2.  The OPEN JOURNAL statement communicates to DBCS if a  journal
         will be shared by more than one run-unit -- see 2.3.2.3.1.

     3.  The IMAGES  statement  of  the  DMCL  controls  the  form  of
         interleaving-unit  employed  by a data base's applications --
         see 2.3.2.1 and 2.1.1.3.

     4.  The interval between a call to JSTRAN and a  call  to  JETRAN
         defines one transaction -- see 2.3.2.1.2.

The following two tables are intended to provide an  overview  of  the
trade-offs involved in using the simultaneous update facility.

THE NON-SIMULTANEOUS USAGE-MODES  ARE  UNQUESTIONABLY  MORE  EFFICIENT
THAN THE SIMULTANEOUS USAGE-MODES.

USAGE-MODE              WHEN TO USE
-------------------------------------------------------------
RETRIEVAL               you   intend    other    run-units    to    be
                        simultaneously open for (PROTECTED) UPDATE.

UPDATE                  use only if you really intend for there to  be
                        simultaneous updaters.

PROTECTED RETRIEVAL     use if you expect concurrent retrievers but no
                        concurrent updaters.

PROTECTED UPDATE        use only if you really intend for there to  be
                        simultaneous retrievers.

EXCLUSIVE RETRIEVAL     use only if you need to be selfish.

EXCLUSIVE UPDATE        use rather than (PROTECTED) UPDATE unless  you
                        really  intend  for  there  to be simultaneous
                        updaters or retrievers.
DBMS5.DOC                                                      Page 37


LEVEL OF SIMULTANEITY       FEATURES        HOW TO ACHIEVE
-------------------------------------------------------------
none                        inexpensive     EXCL RETR!UPDATE
simultaneous retrievers     inexpensive     PROT RETR
pseudo-simul updaters       see F1          see H1
command-interleaving        see F2          see H2
transaction-interleaving
  with default transactions see F3          see H3
transaction-interleaving    see F4          see H4

(F1)  Inexpensive but complicates the design/control problem  for  the
      implementor.

(F2)  Minimizes blocking time.

(F3)  Minimizes    blocking    time    while    still     accomodating
      non-interruptable DML command sequences.

(F4)  Minimizes CPU usage and handles  non-interruptable  DML  command
      sequences.   (Note  that  F4 and F3 exist on a continuum, rather
      than being distinct modes).

                            ***************

H2-H4 apply to all the simultaneous update USAGE-MODES.

(H1)  You have run-units that simultaneously open  disjoint  areas  in
      EXCLUSIVE UPDATE.

(H2)  You optionally define transactions and specify that  images  are
      ordered by command -- see 2.3.2.1.1.
      (However if this  run-unit  did  not  involve  the  simultaneous
      update  facility, specifying images not ordered by command would
      be an efficiency consideration -- see section 2.1.1.3).

(H3)  You specify that images are not ordered by  command  and  divide
      into  transactions  just those command sequences that require no
      intervention -- see 2.3.2.1.2.

(H4)  You specify that images are not ordered by  command  and  divide
      all  the  operations  of your run-units into transactions -- see
      2.3.2.1.2.


2.3.2.1 How Simultaneous? -  One makes simultaneous update  "work"  by
recognizing  which microscopic actions of simultaneous updaters cannot
be truly simultaneous.  In other words, one defines the ways in  which
the  operations  of  two run-units can be interleaved (underline it!).
Thus the amount of simultaneity supported is controlled by  the  scope
of  the  resource(s) interleaved upon and/or by the (average) duration
for which a given resource is controlled (ie.  the interleaving-unit).
DBMS5.DOC                                                      Page 38


Let it be stated without proof that the following (increasing)  scopes
of  resource  are  at  least plausible:  a data base page, a data base
area, or the data base;  and that the following  (increasing-duration)
interleaving-units are plausible:  DML verb/command, user transaction,
or  run-unit.   However  as  you  decrease  the  scope   of   resource
controlled,  the  potential  for  two run-units needing resources in a
sequence that will cause deadly embrace is increased.  In  particular,
a  DML  verb  can  manipulate  pages in an arbitrary sequence, thereby
making the data base page an unacceptable scope of resource because of
the  stigma  of  deadly  embrace.  The data base area is an acceptable
scope of resource, but the existing functionality of ENQ/DEQ presently
makes  its  use  unfeasible.   (A  proposal  to  correct  this will be
generated in a separate memo.) Thus, in  DBMS-V5  the  only  scope  of
resource  supported  will  be  control  of  the  data  base itself, in
conjunction with either a DML command as the  interleaving-unit  or  a
user-specified  transaction  as the interleaving-unit (or the run-unit
as   the   interleaving-unit,   ie.    the   three    non-simultaneous
usage-modes).

To control which interleaving-unit applies to a particular schema, one
must  use  the IMAGES statement of the DMCL (see section 3 sub-section
2.1.1.3).  In particular, specifying that images are  not  ordered  by
command  will  result  in  transactional interleaving;  and specifying
that images are  ordered  by  command  will  result  in  command-level
interleaving.


2.3.2.1.1  Command-interleaving  case -   In  practice,  command-level
interleaving  translates  to:   when DBCS initiates a command, it will
automatically ENQ upon the data base resource (not at all for binding,
STATS, etc.;  shared for FIND, GET, and IF;  and exclusive otherwise);
and  when  it  completes  the  command,  it  will  automatically  DEQ.
Consequently,  even  though  command-level interleaving guarantees the
physical integrity of the data base, it has one limitation;  it  gives
one  no  way  to handle the case where a run-unit requires that no one
intervene while it executes several DML verbs  that  affect  a  single
desired  change  (e.g.   a  passenger wants to change his airplane set
occurrence without being left with no seat at all).


2.3.2.1.2 Transaction-interleaving case -  There  are  benefits  to  a
large  interleaving-unit,  particularly  in  an  application  in which
simultaneous run-units have a lot of dormant  time  anyway.   One,  an
appropriate  large unit will enforce the logical integrity of the data
base by preventing intervention for a user-determined period of  time.
Two, decreasing the frequency with which a second run-unit manipulates
"your" data base and journal, will decrease the  amount  of  defensive
processing  DBCS  will  have  to  do  (ie.  in a CPU usage sense, your
run-unit will  operate  more  efficiently).   What  should  the  large
interleaving-unit be?  clearly the transaction (ie.  use of JSTRAN and
JETRAN).  First, user-specified transactions  are  by  definition  the
mechanism  by  which a run-unit defines logical operations on the data
base.  Secondly, run-unit interleaving puts a special  burden  on  the
journal  processor, so coordinating journaling and interleaving in the
same units has to be a good idea.
DBMS5.DOC                                                      Page 39


In practice, transaction-interleaving means that:  when DBCS initiates
a  transaction,  it  will  automatically ENQ exclusively upon the data
base resource;   and  when  it  completes  the  transaction,  it  will
automatically DEQ.  However commands not executed in the context of an
active  transaction  (eg.   before  the  first  JSTRAN)  are   handled
specially.   Each  such command will constitute a default transaction,
and the rules of 2.3.2.1.1 will  apply  to  it.   Also  if  it  is  an
updating  command,  it  will  be given a command header and trailer as
when images are ordered by command.  There are two reasons for default
transactions.    One,   run-units  that  only  retrieve  (particularly
existing  ones)  will  not  have  to   be   troubled   with   explicit
transactions.   Two,  run-units  that  would like the minimum blocking
time   of   command-interleaving   and   wish   to   contain   a   few
non-intervenable  command sequences, can do this with selective use of
explicit transactions.

There   are   two   exception   conditions   directly    related    to
transaction-interleaving.   Exception 38 will occur if you call JSTRAN
while a transaction is already active.  A LIBOL/FOROTS error  will  be
signalled  if  you attempt to do a non-DBMS RETAIN while in the middle
of a transaction.


2.3.2.2 Protection of the current record of the run-unit -  It  is  an
underlying  premise  of  DBMS that all operations on the data base are
done  thru  one  window:   the  current  record   of   the   run-unit.
Consequently,  it  is  necessary that DBCS ensure that a run-unit will
not have its operation confused/aborted because someone  else  deleted
that  record.  The implicit philosophy is that the burden of conflicts
should be on those who perform anti-social activities, ie.  DELETE.

This protection does exist and is completely automatic,  but  it  does
affect the user's environment as follows.

     1.  The FINDing run-unit will retain the found record  shared  if
         it  is  in  an  area  open  for UPDATE or PROTECTED UPDATE or
         RETRIEVAL.  Otherwise it will not retain the found record  at
         all.   It will of course DEQ the old current of run-unit when
         a new one is found.

     2.  When the area in which the current  record  of  the  run-unit
         resides is closed, current of run-unit is dequeued.

     3.  If one does a DELETE  which  eventually  tries  to  delete  a
         record  which  is retained by another run-unit, the DELETE is
         terminated with exception 40 (ie.  resource not available).
DBMS5.DOC                                                      Page 40


2.3.2.3 New Journal-related Functionality


2.3.2.3.1 Shared Journals -  If two run-units are  updating  the  same
area simultaneously, they obviously are also updating the journal file
simultaneously.  When a journal is shared like  this,  several  things
must  be  periodically  done to it to ensure its continuing integrity.
And the cost  of  that  work  makes  it  imperative  that  a  run-unit
communicate   to   DBCS   when   its   journal  need  not  be  shared.
Consequently, before OPENing any areas, the  run-unit  should  execute
the following statement:

             OPEN JOURNAL USAGE-MODE [EXCLUSIVE] UPDATE.

The EXCLUSIVE keyword should be absent if and  only  if  the  run-unit
will be backing up one or more areas OPENed with USAGE-MODE UPDATE.

Although  its  use  is  suggested,  it  must  be  legal  to  omit   an
open-journal  statement  so  that  existing  DBMS programs will not be
impacted.  So the following rules apply when a open-journal  statement
has  not  been  executed  by  the  time  the  first  updating  open is
attempted.  If the area is being opened  for  exclusive  or  protected
update, an OPEN JOURNAL USAGE-MODE EXCLUSIVE UPDATE will be simulated.
Conversely an OPEN JOURNAL USAGE-MODE UPDATE will be simulated if  the
area is being opened with USAGE-MODE UPDATE.

A secondary benefit of the OPEN JOURNAL statement is that  it  can  be
used  to  force open the journal even when only temporary areas are to
be opened.  Previously this situation was a problem because  usage  of
JSTRAN,  JRTEXT,  etc.   could not be checked out conveniently when it
applied.


2.3.2.3.2 Journal lifetime -  When a run-unit opens  a  journal,  DBCS
must  decide  whether  it should append to the journal, start anew and
overwrite the journal, or abort because the journal is in an undefined
state.

DBCS will overwrite the journal only if it is in a done-with state.  A
journal is done-with if the images in it have already been merged (see
2.3.2.3.3), or you have indicated that all run-units have successfully
completed.   You  indicate this via use of the CLOSE JOURNAL statement
(as opposed to CLOSE RUN-UNIT).  If you  are  the  last/only  run-unit
active  when  you  do  a  CLOSE JOURNAL, DBCS will alter the journal's
label page to indicate that the journal is done-with.  Otherwise CLOSE
JOURNAL  will  be  equivalent  to  CLOSE  RUN-UNIT.   Also  both CLOSE
RUN-UNIT and CLOSE JOURNAL will be  equivalent  to  CLOSE  ALL  if  no
journal is open when either is called.
DBMS5.DOC                                                      Page 41


If a journal is not in a done-with state, DBCS will append  to  it  if
the journal's label page correctly represents the current state of the
journal.  Otherwise it will abort  with  exception  61.   A  journal's
label  page  is  made to correctly reflect the state of the journal by
CLOSE  RUN-UNIT,  CLOSE   JOURNAL,   and   at   the   end   of   every
interleaving-unit  in a run-unit in which the journal is shared.  Thus
exception 61 will occur only when you have previously aborted  one  or
more  updating run-units and not merged the images they generated back
into the data base -- see 2.3.2.3.3.  (Note:   DBCS  never  supersedes
the  journal (for efficiency reasons).  So if the journal somehow gets
clobbered -- ie.  DBCS generates exception 61 or  63  when  it  should
not--simply delete the journal.)


2.3.2.3.3 Changes to DBMEND and the journal file -  The  most  obvious
change  is  that  the  journal  must  contain run-unit IDs so that the
changes of a particular run-unit can be isolated when  you  are  using
DBMEND;   and  conversely  DBMEND  must  have  semantics  for denoting
run-unit IDs:

     1.  The form of a boundary indicator goes from "[name:] index" to
         "[name:] index [(run-unit ID)]".

     2.  If a run-unit ID is absent from a boundary indicator,  DBMEND
         ignores  the  run-unit  IDs  in the journal when attempting a
         boundary match.

     3.  The run-unit ID  in  a  completely  unshared  journal  is  0.
         However, the "journal characteristics" message generated when
         a run-unit opens a journal will indicate  in  any  event  the
         run-unit's ID.  The form of the message is:

                  [JOURNAL CHARACTERISTICS ARE:]
                  RUN-UNIT ID    id-value
                  schema-name RUN  schema-run-of-last-overwriter
                  date/time-journal-last-overwritten

     4.  An  abstract  will  show   which   run-unit   generated   any
         transactions, text, and commands displayed if you specify the
         RUNUNITID option to the DISPLAY command.

(Note:  the addition of the run-unit ID plus expansion of the  journal
label  means  that  V4  journal  files  will  not  be  processable  by
DBMEND-V5;  however  there  is  nothing  to  prevent  one  from  using
DBMEND-V4 to merge V4 journal files).

(Note:  because  a  journal  can  now  contain  updates  of  different
run-units,  it  may  no  longer  be  sorted  by command index and each
transaction index.  Thus DBMEND will no longer be able to determine if
current journal position is "past" the first-processed boundary except
by encountering beginning/end of  journal  before  it  encounters  the
boundary).
DBMS5.DOC                                                      Page 42


Two other changes to  DBMEND  relate  to  placing  the  journal  in  a
done-with  state.   Specifying  the  /UNLOAD switch for a disk journal
will place it in a done-with state.  Specifying the  /COMPLETE  switch
(see  2.3.2.3.4  as well) for a magtape journal will place the journal
(temp file) in a done-with state.

To achieve the DBMS-V3 effect of  a  /COMPLETE  switch  (ie.   journal
truncation), specify COMPLETE jpage.  This will cause a POSITION jpage
followed by placement of an EOF marker after that page.


2.3.2.3.4 Magtape journaling -  (The program DAEMDB  is  described  in
2.3.2.3.5).

Magtape journaling works  as  follows.   DBCS  will  initiate  magtape
journaling  if  any  of  the  conditions  in  the  next  paragraph are
satisfied.  It initiates magtape  journaling  by  (1)  using  IPCF  to
communicate  to DAEMDB the MTA unit which is to be the journal and (2)
opening a file called DSK:  journal-name.JRNrest-of-spec.   This  file
is  an  ordinary  journal  file other than for the fact that DAEMDB is
aware of its existence--and from  DBCS's  point  of  view  it  is  the
journal.

If any of these conditions are satisfied, magtape journaling  will  be
initiated.

     1.  DEVCHR of the device in the journal file  spec  (see  section
         2.1.1.2) has magtape characteristics.

     2.  If the device in the journal file spec is not  associated  to
         an  actual  disk  device and the text of the device is "MTA",
         magtape journaling will be initiated on the magtape unit  the
         operator chooses.

    However if the magtape service is unavailable, you are  given  the
    opportunity  to  select  disk  instead.   Unless  you  have  a USE
    condition for 0946, DBCS exits after typing:

         %DBSODJ ONLY DISK JOURNAL FEASIBLE (DAEMDB CODE xxx)

    You should then (give up or) ASSIGN/DEFINE the journal name  to  a
    disk  device  and  then  type  CONTINUE.  If a DBCS-caused exit is
    incompatible with your application, you should have created a  USE
    condition for 0946 and have made the USE procedure:

     CALL JMDISK     ...merely makes journal device "DSK"
     OPEN the journal as before
     IF error-status not = 0 then abort presumably to get a disk
     journal.

(Note:  if a DBCS software error is not an issue, also associate  this
USE procedure with exception 0967).
DBMS5.DOC                                                      Page 43


The DAEMDB-interaction codes are:

     0         success, the message will not occur
     1         DAEMDB unavailable (SHUTDOWN already given)
     2         magtape could not be opened
     3         unable to open journal temp file
     4         improper device type after ASSIGN/DEFINE
     5         DBCS software error during initialization
     6         JMDISK already done once
     7         DAEMDB already managing 8 journals

Also the generality of journal device selection is somewhat restricted
under  TOPS-10.   If your journal device on the DECSYSTEM-10 were JRN:
for instance, you would be pretty much restricted  to  having  a  disk
journal.   You  would have to be able to gain control of MTAn in order
to ASSIGN MTAn JRN;  whereas on the DECSYSTEM-20  DEFINE  JRN:   MTAn:
would  allow  you to specify MTAn without your job having control over
it.

The run-unit and DAEMDB interact in essentially the same  way  as  two
concurrent  updating run-units;  each maintains knowledge of the state
of the journal (temp file) by reading and updating the journal's label
page  as  necessary.   And  as  when  a run-unit opens an area (or the
journal) with  USAGE-MODE  UPDATE,  the  run-unit  will  automatically
follow  the  applicable  rules of 2.3.2.1 and retain the data base for
the duration of each interleaving-unit.  Conversely  DAEMDB  does  its
work  by periodically copying the information in the journal temp file
to magtape and then retaining the data base ONLY LONG ENOUGH  TO  MAKE
THE  JOURNAL  LABEL  PAGE  INDICATE THAT DBCS CAN START WRITING TO THE
BEGINNING OF THE JOURNAL FILE AGAIN.

Because  DAEMDB/run-unit  interaction  is  interleaved,  the  cost  of
magtape  journaling  is  nearly  the  cost of operating with a journal
opened with USAGE-MODE UPDATE.  Thus the cost  of  magtape  journaling
for  a  single  updater  is  somewhat  greater  than  the cost of disk
journaling  for  a  single  updater.   However  the  cost  of  magtape
journaling   and   disk  journaling  is  approximately  the  same  for
simultaneous updaters.

Just as with a shared journal, it  is  the  user's  responsibility  to
guarantee  that  the  protection of the journal temp file is such that
each accessing run-unit can update it.  Note also that  the  name  and
location  of  the journal temp file is established simply by replacing
the device field of the user specified journal spec  with  DSK.   Thus
the JOURNAL statement of the DMCL gives the user complete control over
the name and characteristics of the journal temp file.
DBMS5.DOC                                                      Page 44


There are some beneficial side-effects to the fact  that  the  journal
temp  file is an ordinary disk journal and that DAEMDB is a background
task.  First, when DAEMDB reaches end-of-reel on a magtape,  there  is
no  pause  in user processing--the run-unit's journal temp file simply
grows a little bigger than usual before it is copied  to  magtape  and
truncated  again.   Second,  if DAEMDB aborts for some bizarre reason,
your run-unit will not be  impacted--it  will  simply  become  a  disk
journaler  in effect.  Third, the magtape part of the journal need not
be involved at all in your use of  DBMEND  if  the  images  which  are
relevant are all still in the journal temp file--in this case, you may
simply specify the journal temp file spec (see /UNLOAD  in  2.3.2.3.3)
to  the  /JOURNAL  switch  rather than the magtape spec and proceed as
usual.  (IMPORTANT NOTE:  keep in mind that journal page  two  of  the
journal  temp  file,  its first data page, is actually at an arbitrary
point in the permanent journal.  In other words, to get an abstract of
the journal temp file, you must "/posit 2" so that DBMEND will know it
must follow "middle of the journal"  protocol  when  initializing  the
abstract).   Fourth,  magtape  management  messages  are  not  seen by
application programs.  Only the job controlling DAEMDB  sees  new-reel
messages or magtape errors reported.

When you do wish to have DBMEND operate  on  a  magtape  journal,  the
following  rules  should be observed.  One, give the /JOURNAL the same
file spec that was given by the aborted run-unit(s) so that DBMEND can
automatically  locate  the  journal  temp  file  as well.  Two, do not
forget to give a /REELS command  if  this  is  a  multi-reel  journal.
Three, if not all the data in the journal temp file has been copied to
magtape (eg.  the system crashed  while  your  run-unit  was  active),
specify  the  /COMPLETE  switch  to cause DBMEND to merge any unmerged
journal temp data with the magtape  journal.   (Note  that  this  will
place  the journal temp file into the done-with state).  Four, proceed
as with a disk journal.

You must be aware of the nature of  the  /COMPLETE  algorithm  to  the
following extent.  DBMEND backspaces three journal pages and simulates
a /POSITION "page the 1st journal-temp-file-page  will  be".   If  the
magtape is in a random position, this operation may fail.  However you
can guarantee success of this positioning by simply  doing  a  /REWIND
before the /COMPLETE.


2.3.2.3.5 The background MTA journal processor -  DAEMDB is  simply  a
utility to copy data from one or more journal temp files to a matching
set of MTA journals.  It runs as a background task  concurrently  with
application  run-units  and  can  be  run  under OPSER/PTYCON or as an
ordinary time-sharing job.
DBMS5.DOC                                                      Page 45


Application jobs have to can communicate with it via IPCF when opening
or closing the journal--and can because the IPCF name "[SYSTEM]DAEMDB"
is reserved to it.  During an OPEN, the  application  waits  until  it
receives  a  message  back  from DAEMDB before continueing.  Note that
this waiting period includes the time for the operator  to  mount  the
tape  unless  another apllication has already started or a /CREATE was
done at the DAEMDB terminal.  Similarly on a  CLOSE,  the  application
waits  when  it  does  a  "real"  CLOSE  JOURNAL.  Also during a CLOSE
JOURNAL, DAEMDB unloads the magtape and eliminates  the  journal  from
its  table of journal.  CLOSEs when someone else still has the journal
open merely cause some trivial accounting to occur.  Finally, a  CLOSE
RUN-UNIT,  when  you  are  the only run-unit, copies all the currently
remaining data from the journal temp file but leaves the magtape  open
and the journal in DAEMDB's table of journals.

To initialize DAEMDB as an ordinary timesharing job,  just  login  and
type  R  DAEMDB.   To  run  DAEMDB  under OPSER, give this sequence of
commands to OPSER:

     :SLOG 1/2
     :DEF DB=
     DB-R DAEMDB

To run DAEMDB under PTYCON, give this sequence of commands (the  $  is
an altmode):

     DEFINE $DB
     DB-LOG OPERATOR ANY a-number
     DB-DAEMDB


DAEMDB relies heavily upon the schema name associated with each of the
journals  it is managing.  The reliance is realized in terms of volume
ids.  A volume id tells the  operator/DAEMDB  user  which  magtape  to
mount,  and it will conventionally be of the form "aaaabb" so that the
operator can use pre-labeled tapes.  the "a"s are the first letters of
the  schema  name  and  "bb" is the current reel number.  Thus if your
installation supports multiple schemas their initial letter  sequences
must be different.  As well as identifying tapes for the operator, the
volume id tells DAEMDB (in ABORT, CREATE, MOUNT, RETRY) which  of  the
"many" journals it is managing to make "current".  Thus volume ids are
optional only if DAEMDB can identify the journal from  an  immediately
preceding prompt it typed.

The operation of DAEMDB is controlled by the following switches.   Any
unique  abbreviation  is acceptable except for ABORT, EXIT and STOP --
these must be spelled out.  When DAEMDB is  started,  it  presumes  it
just  did  a  polling and goes to sleep for the default polling period
(=100 seconds).  However, whether DAEMDB is active,  sleeping,  or  in
TTY wait, any switch will be processed when it is presented to DAEMDB.
The switches are as follows.
DBMS5.DOC                                                      Page 46


SWITCH                   FUNCTION
-----------------------------------------------------------
ABORT [dev:][volid]      DAEMDB has requested an  operator  action  in
                         response  to  EOT or a magtape error, and the
                         operator has decided that processing  of  the
                         magtape  portion  of  this  journal should be
                         stopped.  The device is for clarity only.

CREATE dev:  volid       Pre-associate  a  magtape  to  its  journal's
                         schema.    No   application  requesting  this
                         journal  will  experience  a  real-time  wait
                         while  the  operator  mounts  his  tape.   Of
                         incidental note:  DAEMDB  will  not  actually
                         know  the  schema  name  until an application
                         starts   up...it   will    only    know    it
                         approximately via the volume id.

CURRENT                  Type out the current setting for  each  mode.
                         This is basically a debugging switch.

EXIT                     Exit to the monitor after clearing all active
                         queue requests.  Do not allow a CONTINUE.

GO                       Continue after a STOP

HELP                     Print this table

MOUNT [dev:][volid]      The operator has mounted  a  new  magtape  on
                         dev:   (or  the  device in the prompt if dev:
                         is absent).  Note that MOUNT  and  ABORT  are
                         "antonyms".

POLL seconds             Define and initiate  a  new  polling  period.
                         DAEMDB  will  sleep for n-seconds or until it
                         has something to  do.   The  default  polling
                         period  is  100  seconds.  (It is the journal
                         temp  files  which  are  being   polled   for
                         uncopied data).

RESET                    Simulate    starting     DAEMDB--with     one
                         difference--the  existing  table  of journals
                         remains intact.  It is difficult  to  predict
                         whether this switch is useful, but the intent
                         is to give the operator a  means  of  getting
                         DAEMDB back to a defined state without losing
                         its table of journals.

RETRY [dev:][volid]      Tells DAEMDB to ignore the error it  reported
                         and  repeat  the  operation that failed.  The
                         device would be specified for  clarity  only.
                         This    command    prevents    DAEMDB    from
                         unnecessarily aborting after a  spurious  I/O
                         error  such  as  something  going temporarily
                         off-line.
DBMS5.DOC                                                      Page 47


[NO]SHUTDOWN             Tell DAEMDB to not accept  any  new  journals
                         and  to  do  an  EXIT  when all of the active
                         magtape journals  have  been  closed  by  the
                         users.   Prefixing  NO  takes DAEMDB out of a
                         SHUTDOWN  state,  ie.   it  will  accept  new
                         journals.

STOP                     Return to DAEMDB command  level  immediately.
                         The operator would presumably use this switch
                         to give him time to fix  a  magtape  or  some
                         such problem.

THRESHOLD pages          Tells DAEMDB to bother to copy and truncate a
                         journal  temp  file  only  if  it is at least
                         n-pages long.  The default  threshold  is  50
                         journal pages.

WHAT                     Type the state  of  each  journal  DAEMDB  is
                         managing.

DAEMDB does an "action prompt" when a magtape is initially opened  and
each  time the current reel of a journal must be replaced.  The prompt
is:  [ACTION REQUIRED FOR VOLUME volid ON mta].  Also, the prompt  may
have  been  preceded  by a magtape or journal temp file error message.
In any event, you should respond with either the /MOUNT or  /ABORT  or
/RETRY  switch  as appropriate.  Note that the prompt always refers to
the current reel (via the volid), so that to mount a  new  volume  you
should explicitly give the volume id when you do the /MOUNT.  Finally,
in order to protect  against  partially  copied  sequences  that  span
reels,  DAEMDB  types  a message when the first copy-sequence has been
completed on a new reel.   In  other  words,  when  a  reel  is  being
replaced, its replacement should not be considered part of the journal
until DAEMDB responds with [VOLUME volid NOW INITIALIZED].


2.3.2.4 Guarding Against Non-cooperation  of  Run-units -   There  are
forms of non-cooperation that are not detectable except from long-term
side-efects.  As noted, DBCS can guarantee the physical  integrity  of
the  data  base,  but  only  you  can  ensure  world-view consistency.
However the following forms of non-cooperation are either detected  by
DBCS or declaratively inhibited.

(Declarative Restraints)

     1.  There is one journal per schema unless a run-unit  explicitly
         circumvents this by calling JMNAME.

     2.  The  IMAGES  statement  provides  inherent  co-ordination  of
         journaling and run-unit interleaving.

(Procedural Constraints)

     3.  If you attempt to open an area  with  USAGE-MODE  UPDATE  and
         already  have OPENed your journal exclusively, exception code
         0938 will be returned.
DBMS5.DOC                                                      Page 48


     4.  If you have a shared journal, the only way in which  you  can
         use  JBTRAN  is  as follows:  in transaction mode and with an
         argument of 0.  Otherwise, exception code 1645 is returned.

There is one  "special"  form  of  non-cooperation.   If  an  updating
run-unit  aborts  abnormally,  other  run-units  are  "in  danger"  of
accessing a data base which is  potentially  in  an  undefined  state.
However it is only an illusion for a very simple reason.  So long as a
RESET is not done by the aborted job, all the locks it had in place to
prevent trespass are still in place.  Thus, if the site does not panic
by allowing a RESET to be executed by the aborted job,  it  will  have
all  the  time  in  the  world  to  evaluate  the  situation and react
accordingly (eg.  terminate all the run-units and restart entirely, do
a  RESET because the aborting run-unit did not injure the integrity of
the data base).


2.3.3  Miscellaneous Changes


2.3.3.1 Unrounded Logical Page  Size -   Before  V5,  each  page  size
specified  in the DMCL was rounded up to the next monitor-defined unit
of disk storage (ie.   128-word  multiples  on  the  10  and  512-word
multiples  on  the  20).  However this is not strictly necessary...the
physical page size must be such a multiple, but there is no reason why
the  logical  page  size  cannot  be  as  was  specified  in the DMCL.
Additionally there are two reasons to support this  distinction:   (1)
it  enables a site to account for data expansion by filling an area in
layers (ie.  by gradually increasing page  size)  (2)  as  implied  in
section  2.3.1.3.2, it would make a general purpose conversion utility
somewhat easier to use.

This feature does not impact  existing  data  bases;   the  effect  of
unrounded  logical page sizes is felt at precisely one time only, when
a new record is stored.


2.3.3.2 Specifying a Limit to Journal Size -  The JOURNAL statement of
the DMCL has been extended to provide you a means of preventing a disk
journal from growing to an arbitrary size.  By appending,

                   SIZE [IS] integer [TRANSACTIONS]

to the end of a JOURNAL statement, you will cause DBCS  to  reposition
its  journal  file pointer to the beginning of the journal after every
(integer)th transaction.  Thus, a site could use this feature  if  its
situation  is  such  that it knows it will never need to backup a data
base more than (integer) transactions.  This  clause  applies  to  any
run-unit that has a disk journal which is either unshared or for which
images are not ordered by command.

(Note:  a secondary benefit of  this  feature  is  that  disk  journal
efficiency is improved because it is cheaper to rewrite a journal page
than to extend a journal.)
DBMS5.DOC                                                      Page 49


2.3.3.3 /CONVERT switch for SCHEMA and DBMEND -  The  /CONVERT  switch
has  been  added  to  support  V3TOV5  and to lay the groundwork for a
general purpose data base redefinition utility.

/CONVERT tells SCHEMA to generate .DBN files and a  .SCN  file  rather
than .DBS files and a .SCH file.

Conversely /CONVERT sets DBMEND to process .??N files  and  /NOCONVERT
returns DBMEND to its normal mode.  When you need to use a [NO]CONVERT
switch, it should precede the JOURNAL or (SCHEMA) switch and all OPENs
so that all relevant files will be processed in the correct/same mode.


2.3.3.4 UNANTICIPATED as  an  INTERCEPT  option -   If  one  specifies
INTERCEPT  (or  NOTE)  UNANTICIPATED  EXCEPTIONS, all exceptions other
than 307 and 326 will be intercepted (or noted).  The purpose of  this
option is to suppress interception only for those exceptions which are
(normally) used to control program flow.


2.3.3.5 The /UNFLAGGED switch  for  FORDML -   This  switch  allows  a
FORDML user to (optionally) omit the "* DBMS" line for single-line DML
statements, provided no other line in the program has "period" as  its
last non-blank non-remark character.  The purpose of this switch is to
allow for smaller, more readable  FORDML  programs  at  the  price  of
conforming to one additional lexical rule.


2.3.3.6 The USE statement -  It has been made easier  to  associate  a
variety  of exceptions with a USE procedure.  Generic exception codes:
one can specify xx00 to associate the procedure to any  exception  for
statement  "xx".   Generic  statement  codes:  one can specify 00yy to
associate the procedure to the exception regardless of  the  executing
statement.    Grab  bag  procedure:   USE  ERROR-STATUS.   will  cause
application of its procedure to each exception which is not covered by
an  earlier USE statement in the program (conversely any USE statement
after this statement would be a no-op).


2.3.4  Summary of Environmental Changes

The following  keywords  have  been  added  to  the  DML:   JMDISK  (a
user-callable  entry)  and  JOURNAL.  The following keywords have been
added to SCHEMA:  TRANSACTIONS.  The /CONVERT switch has been added to
SCHEMA  and  DBMEND.   Exceptions  46, 65, 66, and 67 have been added.
Exceptions 38 have been given a different definition.  Exceptions  31,
40,  45, 61 and 63 have been given more general meanings.  See section
2 subsection 2.1.5 for the updated exceptions table.
DBMS5.DOC                                                      Page 50


3.0  KNOWN BUGS AND DEFICIENCIES

     1.  A DBMS  applications  program  cannot  be  restarted  by  the
         ctrl-C/START  sequence;   one can only RUN (GET/START) a DBMS
         program.

     2.  If the CLOSE statement signals an exception, the state of the
         system will not be backed up to what it was before the CLOSE.

     3.  Explicit SFD's are not supported in file specs.

     4.  No .DBS file (ie.  DBMS-10 area) may have a page  range  such
         that  it  could  grow to larger than 256,000 disk blocks (one
         block=128 words).

     5.  The word DBMS is a reserved word in the COBOL  compiler,  but
         this  fact is not properly documented nor properly flagged as
         an error.

     6.  User symbols in an INVOKE or ACCESS statement constitute user
         variables   as  far  as  the  COBOL  compiler  is  concerned.
         Therefore they may not be declared anywhere else in the  DATA
         DIVISION.

     7.  If exception  03  (data-names  from  wrong  record)  occurred
         during  a  GET,  the  UWA  may not be left the same as it was
         before the verb was executed.

     8.  An area cannot be simultaneously  OPEN  twice  (ie.   by  two
         sub-schemas of the same schema) in a run-unit.

     9.  Floating point numbers cannot be dumped by DBINFO on a KA10.

    10.  COBOL  and  FORTRAN   program-units   both   containing   DML
         statements  cannot be mixed in the same load-unit because the
         form of the special  registers  is  different  in  COBOL  and
         FORTRAN.

    11.  The "name" special registers (eg.   ERROR-RECORD)  cannot  be
         simply  compared  to  COBOL  literals  because the former are
         ASCIZ strings (to facilitate displaying them).  To accomplish
         the  comparison,  do  an  EXAMINE LOW-VALUES TO SPACES to the
         string.
DBMS5.DOC                                                      Page 51


4.0  INSTALLATION INSTRUCTIONS

To install DBMS-10, follow the instructions below:

     1.  To place DBMS-10 on SYS:, follow this procedure:

         a.  Mount the DBMS-10 distribution  tape  (marked  QH101)  on
             MTA0:, and type the following commands:

             R BACKUP
             TAPE MTA0:
             REW
             INTERCHANGE
             DENSITY installation-dependent
             RESTORE SYS:*.*=DSKB:[10,6]*.EXE
             REW
             RESTORE SYS:*.*=DSKB:[10,6]*.HLP
             REW
             ^C

     2.  To prepare to (re)load DBMS-10 (or parts thereof):

         a.  Mount the DBMS-10 distribution  tape  (marked  QH101)  on
             MTA0:, and type the following commands:

             R BACKUP
             TAPE MTA0:
             REW
             INTERCHANGE
             DENSITY installation-dependent
             restore *.*=dskb:[10,6]*.*
             rew
             ^c

The components of the DBMS package, are as follows:

     SCHEMA
     FORDML
     COBOL interface
     DBCS
     DBMEND
     DBINFO
     DAEMDB


4.1  Converting Existing Applications

There is an inherent overlap between this section  and  section  2.3.1
since V3TOV5 is really a utility to facilitate installation of DBMS-V5
by version 3 sites--rather than a software product.  Accordingly  this
section  attempts  to  explain where V3TOV5 fits into the installation
procedure, while section 2.3.1 explains in detail the  steps  involved
in using it.
DBMS5.DOC                                                      Page 52


Steps to convert your V3 data base:

     1.  Section 2.2 should be read carefully, and application  source
         files  should  be  changed  to  reflect the incompatibilities
         described there.

         The primary change is to the schema DDL data-name entry,  and
         involves  changing  USAGE COMP...  to TYPE...  and moving all
         text (ie.  03 names) into the appropriate sub-schemas.

         The only DML change  that  is  likely  to  cause  any  source
         alterations  at  all  is  that successful FINDs and STOREs no
         longer set up AREA-NAME and RECORD-NAME...the MOVE  statement
         must be used instead.

     2.  Read section 2.3.1 on how to use V3TOV5.
         However if you intend to reload  rather  than  convert,  just
         delete  your  DBS  files  and  SCH  file  and  translate your
         converted DDL program with  SCHEMA  V5  before  running  your
         reloading program.

     3.  The host-language interface has changed.   Existing  programs
         must  be  (re-preprocessed  and)  recompiled  with  the COBOL
         and/or FORTRAN systems built from this tape.


4.2  Configuring the System Software

     1.  DBMSn0 is shorthand for DBMS10/DBMS20.

         TOPS-10 sets should read it as DBMS10
         TOPS-20 sets should read it as DBMS20

     2.  If COBOL support is desired:

         a.  Read  COBOL.MEM  in  the  1st  save  set  of  the   COBOL
             distribution tape (marked QH504).  It will explain how to
             place LIBOL.REL AND LIBSHR.REL onto disk.

         b.  Make sure  that  your  non-DBMS  copy  of  LIBOL.REL  and
             LIBSHR.REL  are  in  the  directory from which DBMSn0.CTL
             will be submitted.

     3.  If FORTRAN support is desired:

         a.  Read FORTRA.MEM in  the  1st  save  set  of  the  FORTRAN
             distribution tape (marked QH500).  It will explain how to
             place FORLIB.REL onto disk.

         b.  Make sure that your non-DBMS copy of FORLIB.REL is in the
             directory from which DBMS10/20.CTL will be submitted.
DBMS5.DOC                                                      Page 53


     4.  Read DBMSn0.CTL.

         a.  In particular, there are DEFINEs  (TOPS-20)  and  ASSIGNs
             (TOPS-10)  at  the  beginning of the CTL file.  Alter the
             logical assignments therein as necessary for your site.

         b.  To load just the OTSs, do this submit:

                  SUB DBMSn0/RES/TIM:15:.

             To load all the  non-OTS  components  as  well,  do  this
             submit instead:

                  SUB DBMSn0/RES/TIM:30:/TAG:DBALL.

         c.  If execution  of  DBMSN0.CTL  should  abort,  you  should
             reperform steps 2b and/or 3b before repeating step 4b.

     5.  Copy the built host systems to SYS:

             LIBOL.REL to SYS:LIBOL.REL
             Cdbots.exe to SYS:LIBO11.EXE
                  and/or
             FORLIB.REL to SYS:FORLIB.REL
             FDBOTS.EXE to SYS:FOROTS.EXE

     6.  Copy *.HLP and *.EXE from the 2nd save set of the  DBMS  tape
         to the appropriate system device.

     7.  If support of MTA journaling is desired and you wish  to  run
         DAEMDB  under  OPSER/PTYCON,  insert  at least these commands
         into your system-restart auto file (see 2.3.2.3.5 for how  to
         setup non-defalt values for DAEMDB's controlling parameters):

         For TOPS-10:

              :SLOG 1/2
              :DEF DB=
              DB-R DAEMDB

         For TOPS-20 (the $ is an altmode):

              DEFINE $DB
              DB-LOG OPERATOR ANY 77777
              DB-DAEMDB

         If you wish to run DAEMDB as an  ordinary  time-sharing  job,
         simply  login  a  job and type R DAEMDB each time your system
         starts up.

         IMPORTANT:  for the time being at least, one must  pre-assign
         magtapes to the DAEMDB job on TOPS-10.  To do this, simply do
         1 or more MOUNT commands before typing R DAEMDB.
DBMS5.DOC                                                      Page 54


     8.  DBMS-V5 utilizes  the  ENQ/DEQ  facility.   Consequently  you
         should  ensure  that  your  system  is  configured  such that
         sufficient monitor free  space  is  available  to  your  DBMS
         users,  and  that  each DBMS user has global-ENQ capabilities
         and an adequate ENQ quota.  For  TOPS-10  use  REACT  to  set
         quotas  and  capabilities  (ENQ  capability  is  bit  11 (ie.
         100,,0) of the capabilities word).  For TOPS-20, use ^Ecreate
         to  set  ENQ  capability.   Also,  see ENQ/DEQ in the monitor
         installation guide.  As regards quantifying your needs,  they
         are  approximately:   2 locks for each open area plus 2 locks
         per run-unit.

     9.  If magtape journaling  is  desired,  the  comments  regarding
         ENQ/DEQ  apply  to IPCF as well.  As regards quantifying your
         needs, they are approximately 1 send and 1 receive  for  each
         application run-unit;  and (n) sends and receives for DAEMDB,
         where (n) is the number of simultaneous magtape journalers.



5.0  INTERNAL CHANGES

The list of internal differences is not truly ordered,  but  there  is
some  attempt to group the DML changes and to group the file-affecting
changes.  Except where noted, these notes are differences  between  V3
and V4 (or V5).  Differences between V4 and V5 are noted individually.

     1.  In earlier versions each reference to a record,  area,  data,
         or  set  name  in  a  DML  statement  would cause a character
         string, representing the name, to be  passed  to  DBCS.   For
         example,  GET  REC1 would have translated to CALL GET('REC1')
         in FORTRAN and ENTER MACRO GET USING  "REC1"  in  COBOL.   In
         version 4, the reference to REC1 will be replaced by an index
         into a table (assigned during schema processing), rather than
         a character string.

         However if the user wishes to explicitly call  a  DBCS  entry
         point,  he may still pass a string--which will be dynamically
         converted to its  table  index.   In  other  words,  although
         FORDML(or  COBOL)  will  generate CALL GET(integer), the user
         can still code CALL GET('REC1') in  his  programs.   However,
         this  string  processing ability applies only to record, set,
         and area names--and not to data-names because data-names  are
         simply not maintained internally at run-time.
DBMS5.DOC                                                      Page 55


     2.  Similarly, keywords such as NEXT  were  passed  as  character
         strings.   These  are  now  passed  as  negative  numbers (to
         distinguish them from the table indexes) and are as follows:

                KEYWORD         CODE
                ----------------------
                ONLY             -10
                SELECTIVE        -11
                FIRST            -12
                LAST             -13
                PRIOR            -14
                NEXT             -15
                DUPLICATES       -16
                ALL              -17
                AREA             -18
                RECORD           -19
                SET              -20
                UPDATE           -21
                RETRIEVAL        -22
                RUNUNIT          -23
                PROTECTED        -24
                EXCLUSIVE        -25
                RESERVED         -26
                RESERVED         -27
                JOURNAL          -28     (V5 only)

         When a keyword is expected, a 0 argument indicates a  default
         (or  absent)  keyword.   And the argument indicates an absent
         user-name when a name is expected.

     3.  An indexed sequential access  method  will  be  used  to  add
         members  to  and to search sorted set occurrences.  This will
         greatly speed up STOREs, INSERTs,  and  MODIFYs  that  access
         sorted  sets.   The index structure will be a B-tree in which
         each index block is big enough to contain  16  sort-key/dbkey
         pairs,  unless 16 keys would require more than 120 words.  In
         this circumstance, the index block size will  be  n*pair-size
         where  (n) is such that the product is as near as possible to
         120 and still less than 120.

     4.  The DELETE verb will always completely delete any record that
         it  processes.   In  other  words, the record will be removed
         from each set it is in and  all  space  associated  with  the
         record will be returned to the free pool.
DBMS5.DOC                                                      Page 56


     5.  FIND integer of SET/AREA will no longer generate  a  call  to
         FIND3.   Instead  it  will  generate  a call to the new entry
         point, FINDO.

     6.  The FUNCT.  OTS interface facility, created to  support  LINK
         overlays,  will  be used by DBCS for its own OTS interfacing.
         FUNCT.  is documented in an appendix of the LINK manual.

     7.  The format of an after-image directory file (.RCV files  were
         an  example  of this type of file) has been changed slightly.
         The first (n) pages of an area .TMP file are  the  directory,
         and  there are PAGESIZE*2 entries per directory-page (ie.  18
         bits per entry).  Thus n=!PAGERANGE/PAGESIZE*2!.  The entries
         are  arranged  such  that  the  left-half  of  the first word
         contains the first page pointed to  by  this  directory-page,
         the  left-half  of the 2nd word contains the 2nd page, and so
         on...   thus  the  right-half  of  the  first  word  of   the
         directory-page points to the (PAGESIZE + 1)th page.

         Also, the mechanism by which .DBS files are extended in V4 is
         such  that  unreferenced pages will not be placed in the area
         .TMP file.  Thus temporary areas are now ideal for  debugging
         when  calc  records (which arbitrarily extend .DBS files) are
         involved.

     8.  The symbol blocks in a .SCH file  and  those  created  during
         BINDing  are  somewhat  different  than  they were in earlier
         versions.  (A complete description of  each  type  of  symbol
         block  will  appear in the version 4 manuals--and does appear
         in  the  UNV  source  file  DBSDCL.MAC,  which  is   on   the
         distribution tape.)

     9.  The format of a page in a  .DBS  file  has  been  changed  to
         improve  record  accessing  efficiency  (and  generalized  to
         support multiple calc-chains per page).   The  format  is  as
         follows (where PAGESIZE is p):

            word 0:       page-number
            word 1:       i ! j
            n words:      calc-chain pointers
            word n+2:     data word
                               :
                               :
            word j-1:     last data word
            (word j  thru  word p-i-1 are not in use)
            word p-i:     see DBSDCL!offset of record i
                               :
                               :
            word p-1:     see DBSDCL!offset of record 1
DBMS5.DOC                                                      Page 57


         The value (i) is the highest record number ever used on  this
         page.   The  value  (j) is the offset of the first word which
         does not contain data.  The value (n) is 0 or more and is the
         integer  given in the CALC RPP clause in the ASSIGN statement
         for this area.  Word p-1 back thru  word  p-i  are  the  line
         headers  of  line-1  thru  line-i.  For details, see PH.* and
         LH.* in DBSDCL.MAC.

    10.  The 128-word prefix sector has been supplanted  by  the  area
         status record, see subsection 2.1.5.3.

    11.  The ENQUEUE/DEQUEUE facility, rather than reader  counts,  is
         used  in  version  4 to control concurrent access to an area.
         Note that this means that retrieval-only areas no longer have
         to be protected <022>.

    12.  All system processed strings will  be  represented  in  ASCII
         (rather  than  SIXBIT),  ie.  the relevant special registers,
         AREA-IDs, and privacy locks.

    13.  [V5 only] Journal page headers have been expanded from 4 to 6
         words  and logical blocks have been expanded to 3 words, both
         to accomodate simultaneous  update.   The  make-up  of  these
         headers is detailed in DBSDCL.MAC.

         Because this is such a complicated upgrade, no bug fixes will
         be described.  We wish this upgrade to consolidate DBMS.



6.0  SUGGESTIONS

None.



[End of DBMS5.DOC]