Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Sample Locking Protocol — Definition z/OS MVS Programming: Sysplex Services Guide SA23-1400-00 |
|||||||||
The following illustrates a protocol in which an application uses IXLLOCK with user data to achieve its multi-system data sharing. Application “A” is a multi-system application whose data is maintained in data sets residing on shared DASD. The application is required to access the data on behalf of requests from end users of the application as well as on behalf of utility functions that are periodically scheduled to perform maintenance activities. User requests are for a single record in the data set; utility requests are for a block of records on which maintenance is to be performed. The application is required to maintain the integrity of the shared data while providing efficient access to both types of processes. To accomplish this, the application has designed a locking protocol based on the XES lock services. A detailed description of the protocol follows. Purpose To provide a protocol that allows user requests for a resource to take precedence over utility requests for the same resource. Design All resource requests are to indicate whether they are user-initiated or utility-initiated and are to specify the exact records of the data set to which they require access. User requests will be served on a first-in first-out (FIFO) basis and will take precedence over utility requests. Under certain circumstances, utility functions that are current owners of a resource might need to negotiate the resource ownership. The negotiation is to be accomplished in the notify exit and could result in the utility function maintaining a subset of its resource ownership in order to allow the user request to be granted. Requirements The application must conform to the following:
The following table shows the required information that the application must specify to accomplish various requests for data access.
Rules of the Sample Protocol The protocol defines the following rules for the management of contention.
|
Copyright IBM Corporation 1990, 2014
|