Your Browser is not longer supported

Please use Google Chrome, Mozilla Firefox or Microsoft Edge to view the page correctly
Loading...

{{viewport.spaceProperty.prod}}

Summary

The preceding sections dealt with the concept of volumes in BS2000. The following table provides an overview of the characteristics of the various types of volumes..


Volume characteristics


Public volumes (pubsets)

Private volumes

Disk

Net-Storage 1)

Disk

Tape

Number of jobs which may use the volume concurrently

Any number

Any number

Any number(exception: exclusive reservation)

No more than 1

File protection

Full file protection by DMS

Full file protection by DMS in BS20002)

Full file protection by DMS

Full file protection by DMS

Permissible processing method

DMS access methods; I/O macros for system files (RDATA etc.)

DMS access methods; I/O macros for system files (RDATA etc.)

DMS access methods; I/O macros for system files (RDATA etc.)

tape access methods of DMS: SAM, UPAM and BTAM

Labels



Standard labels

Standard and nonstandard labels

Volume serial number (VSN)

6 alphanumeric characters; see "Public volumes (pubsets)"

Standard name derived from the pubset (6 characters, alphanumeric); userdefined name like private disk

6 characters, alphanumeric; does not begin with "PUB" and does not contain a period

6 characters, alphanumeric; does not begin with "PUB" and does not contain a period

Volume request

Pubsets do not need to be requested by the user

Net-Storage volume does not need to be requested

Disks must be requested by the user

Tapes must be requested by the user

Dynamic storage space management

Yes

Yes

Yes

No

Volume reservation

Not possible

Not possible

Mandatory, otherwise the job may be aborted if the volume is not available


Table 4: Volume characteristics
1)Net-Storage expands the storage space on public volumes, but is itself not counted as a public volume
2)The BS2000 protection attributes cannot be implemented on open systems which have access to Net-Storage files. By default, node files are assigned to the relevant user by means of user and group numbers (UID, GID), and read and write authorization is only entered for this user. However, the UNIX rights can be modified from the UNIX side (for details, see section "General conditions")