Previous Topic: OverviewNext Topic: Keyed Direct Processing


Keyed Access

CA IDMS VSAM Transparency supports keyed access for key-sequenced data sets, relative-record data sets, and alternate index paths. VSAM uses prime keys, alternate keys, or relative-record numbers to locate records; CA IDMS VSAM Transparency translates the VSAM keys into sort keys for system-owned indexed sets.

Keyed Access Processing Methods

Keyed access can be used with:

Direct, sequential, skip-sequential and backward processing are discussed below.