Access Method - Reasons For Introducing Access Methods

Reasons For Introducing Access Methods

Without access methods, a programmer must write a special program for an I/O channel, a processor dedicated to control peripheral storage device access and data transfer to and from main memory. These channel programs are composed of special instructions, called channel command words (CCWs). Programming those is a complex task requiring detailed knowledge of the hardware characteristics. Channel programs are initiated by a STARTIO macro issued by the operating system. This is usually front ended by the Execute Channel Program (EXCP) macro for application programmer convenience. This macro issues an SVC (supervisor call instruction) that directs the operating system to issue the STARTIO on the application's behalf.

Access methods provide:

  • Ease of programming - programmer would no longer deal with a specific device procedures, including error detection and recovery tactics in each and every program. A program designed to process a sequence of 80-character records would work no matter where the data are stored.
  • Ease of hardware replacement - programmer would no longer alter a program when data should be migrated to newer model of storage device, provided it supports the same access methods.
  • Ease shared data set access - an access method is a trusted program, that allows multiple programs to access the same file, while ensuring the basic data integrity and system security.

Read more about this topic:  Access Method

Famous quotes containing the words reasons for, reasons, introducing, access and/or methods:

    Write to the point: say immediately what you want to say most, even if it doesn’t “come first.” There are three reasons for doing this. First, you will then have said it, even if nothing else gets said. Second, your readers will then have read it, even if they read no more. Third, having said it, you are likely to have to say something more, because you will have to explain and justify what you chose to say.
    Bill Stott (b. 1940)

    I call it our collective inheritance of isolation. We inherit isolation in the bones of our lives. It is passed on to us as sure as the shape of our noses and the length of our legs. When we are young, we are taught to keep to ourselves for reasons we may not yet understand. As we grow up we become the “men who never cry” and the “women who never complain.” We become another generation of people expected not to bother others with our problems.
    Paula C. Lowe (20th century)

    The man who thrusts his manners upon me does as if he were to insist on introducing me to his cabinet of curiosities, when I wished to see himself.
    Henry David Thoreau (1817–1862)

    The nature of women’s oppression is unique: women are oppressed as women, regardless of class or race; some women have access to significant wealth, but that wealth does not signify power; women are to be found everywhere, but own or control no appreciable territory; women live with those who oppress them, sleep with them, have their children—we are tangled, hopelessly it seems, in the gut of the machinery and way of life which is ruinous to us.
    Andrea Dworkin (b. 1946)

    How can you tell if you discipline effectively? Ask yourself if your disciplinary methods generally produce lasting results in a manner you find acceptable. Whether your philosophy is democratic or autocratic, whatever techniques you use—reasoning, a “star” chart, time-outs, or spanking—if it doesn’t work, it’s not effective.
    Stanley Turecki (20th century)