Professional Documents
Culture Documents
Submitted By
Chandrashekhara K
June 2007
1|Page Confidential
Technology Practices Group
Table of Contents
1. Introduction
1.1 About File-AID……………………………………………………… 3
2|Page Confidential
Technology Practices Group
1. INTRODUCTION
File-Aid’s powerful editor expands your editing capabilities to include the following
features:
• A character mode for browsing and editing DASD datasets with any
record format and record length up to 32kb.
• A formatted mode that allows you to browse or edit one record at a time,
field-by-field, using your COBOL or PL/1 record layout field names to
describe each field.
• A vertical formatted mode that allows you to browse or edit records on
field-by-field basis using record layout as column headers.
• A compare function that compares two datasets field by field using the
specified record layouts and reports the differences between the files.
• A reformat function for selectively reformatting records using old and
new record layouts to guide the process.
3|Page Confidential
Technology Practices Group
2. Basic Functions
Accessing the file-AID
Selecting option F on START Primary Option Menu displays the File-AID Primary
Option Menu .This screen lists all of the functions available in File-AID/MVS. Selecting
the number or letter of a function on the File-AID/MVS Primary Option Menu displays
the screen for that function.
4|Page Confidential
Technology Practices Group
2.1 PARAMETERS
The Parameters function allows you to display and modify the settings of a variety of
parameter at any time during a File-AID session. These parameters are used throughout
File-AID.
5|Page Confidential
Technology Practices Group
The above Parameter Selection Menu provides access to the File-AID parameter default
settings that you can modify.
File-AID has divided the parameters into groups as listed on the Parameter Selection
Menu. Select the option group by entering its number in the OPTION field:
0 ISPF
View/change settings of ISPF parameter options and File-AID’s PF keys.
1 SYSTEM
View/change Browse and Edit function defaults, specify work file allocations, set
VSAM intermediate name, and enable the jump function.
2 SELECTION
View/change settings of selection criteria options, processing direction, and
Unformatted selection defaults.
3 PRINT
View/change settings of print parameter defaults.
4 PROCESSING
View/change record processing options and partitioned dataset processing defaults.
5 AUDIT
View/change audit file allocation parameters.
6 HFS
Set Hierarchical File System (HFS) Home Directory.
7 CATALOG
Search for datasets in a user catalog that cannot be located from the master catalog.
6|Page Confidential
Technology Practices Group
2.2 BROWSE
The option 1 in Primary Option Menu will take you to browse mode.
7|Page Confidential
Technology Practices Group
The character browse mode provides full-screen viewing of data and enables you to
Invoke either formatted browse or vertical formatted browse modes. The entire dataset or
a selected subset may be displayed by using selection criteria. The HEX command lets
you toggle the display to show hexadecimal values for each character.
The formatted browse mode provides viewing capability for data using a record layout or
XREF to identify each data field in a record. This mode presents data one record at a time
and formats each record field by field with the field names describing each field.
The vertical formatted browse mode also provides full-screen viewing of data using a
record layout. This mode presents multiple records at a time. The display is in a vertical
format that uses the record layout to organize each record field under its record layout
field name
Unformatted browse mode displays data one record at a time without using a record
layout.
For the F and VFMT option you need to provide the the Record layout in record layout
information.
The PBP.PRODCOMB.COPYLIB is the PDS and OSEG32OF is the member name.
Record layout usage is S for single. And X for XREF or we can use N for none.
If you want to go for selection with T option the the screen will looks like
9|Page Confidential
Technology Practices Group
10 | P a g e Confidential
Technology Practices Group
Here you can specify the starting record key. From where the file needs to be displayed.
Also you can skip some records by using ‘Initial records to skip’ option. Here you can
give some records which you want to skip.
There is other option like you can select only particular number of records and you can
skip some number of records by giving the numbers.
11 | P a g e Confidential
Technology Practices Group
Now you can give command FMT will give you formatted display
12 | P a g e Confidential
Technology Practices Group
In this format also you can locate a filed by giving its name as in FMT command.(‘L
fieldname’)
13 | P a g e Confidential
Technology Practices Group
You can you scroll left, right, up, down to see other records. F8 will take you down, F7
will take you up, F10 will take you Left and F11 will take you right.
14 | P a g e Confidential
Technology Practices Group
Apart from this you can select the criteria as Q in the browse window.
15 | P a g e Confidential
Technology Practices Group
Now you can give the conditions to select. You can search for particular values in the file
in a particular field.
Ex. You can display the records which have I23751 value starting from the position 3 and
of next 6 characters.
16 | P a g e Confidential
Technology Practices Group
Here are the records which have I23751 value starting from the position 3 and of next 6
characters. Now you can give all scrolling methods which are used in the above T
options.
2.3 EDIT.
From the main menu the option 2 will take you to the edit mode.
17 | P a g e Confidential
Technology Practices Group
The File-AID Edit - Data Specification screen above, allows you to select
the mode to begin your edit session, and specify information about the edit, record
layout, XREF, and selection criteria datasets.
The Navigation methods are same as which used for the browse mode.
If you edited some records and if you do not want to save the data then you can give
CANCEL command which will prevent the saving of file.
18 | P a g e Confidential
Technology Practices Group
You can update data which shown in green in the file bellow.
You can give option 3 in the main MENU to list the utilities available.
19 | P a g e Confidential
Technology Practices Group
The Library utility enables applications and systems programmers to manage libraries
online.
The option 1 Will help Display and modify directory entries; display load
Module CSECT maps; browse, delete, rename PDS members
20 | P a g e Confidential
Technology Practices Group
OPTION
Enter one of the following option codes in the OPTION field on the Library Utility
screen and a library name.
A
Map CSECTs in address order. Displays a map of load module control sections
(CSECTs) in address order.
N
Map CSECTs in name order. Displays a map of load module CSECTs in name
order.
I
Display directory entry of member. Displays the directory entry and link-edit
attributes of a specified member.
B
Browse member. Used to browse a specified member. This option can be used to
browse a member instead of going to the Browse function.
D
Delete member. Used to delete a specified member.
R
Rename member. Used to rename a specified member.
BLANK
Display member list. Displays a list of the specified library members. Use the
Library option codes (A, N, S, B, D, R) as line commands on this Member List
screen to execute the Library utility options.
21 | P a g e Confidential
Technology Practices Group
You need to give the PDS name. And Disposition will be SHR or OLD.
You can process the utilities in online or batch mode.
The address-sequence and name-sequence mapping options (A and N) show all linked
components of a load module along with compiler name, compile dates, and applied zaps.
The displayed information is identical except for the sequence of the listing. Option A
displays CSECTs in sequence by address. This format indicates any segment overlays
that are present in the module.
Here if you want to display member list in a PDS you just press ENTER.
22 | P a g e Confidential
Technology Practices Group
Now you can see the directory entry for these members.
I–Directory entry.
D-Delete a member.
23 | P a g e Confidential
Technology Practices Group
24 | P a g e Confidential
Technology Practices Group
25 | P a g e Confidential
Technology Practices Group
26 | P a g e Confidential
Technology Practices Group
You can rename the member by using R command option and giving the new name.
27 | P a g e Confidential
Technology Practices Group
Pressing <Enter> renames the member. Use the END command (PF3) to cancel the
process. When the member is renamed, File-AID displays the Library Utility screen with
the following message in the upper-right corner: MEMBER RENAMED.
Here multiple members can be renamed. Enter an R next to the member name, and
specify the new name in the Rename column.
28 | P a g e Confidential
Technology Practices Group
Press <ENTER>
29 | P a g e Confidential
Technology Practices Group
If you know the member name then you can directly specify in the main LIBRARY
menu.
And you can perform the operations like Browse, DELETE, and Rename etc.
30 | P a g e Confidential
Technology Practices Group
DATASET FUNCTIONS.
The option 2 in the UTILITIES is for dataset operations.
The function for Display dataset information; allocate non-VSAM datasets and GDGs;
catalog, uncatalog, delete, or rename datasets are available here.
31 | P a g e Confidential
Technology Practices Group
Depending on the specification of the GDG required you can give the count and other
info.
32 | P a g e Confidential
Technology Practices Group
Press <Enter> to allocate the GDG base dataset, or use the END command to cancel the
allocation. When allocation is complete, File-AID displays the message: GDG BASE
ALLOCATED in the upper-right corner of the Dataset Utility screen. If an error occurs
(such as duplicate dataset name), File-AID displays the appropriate error message. Use
the HELP command (PF1) to obtain information on the error.
COPY FUNCTION.
33 | P a g e Confidential
Technology Practices Group
You can copy from one file to another in batch mode or in online mode depending on
your choice of Execution Information. (O –online, B – Batch)
The B option will allow you to submit the job to copy.
You can select the records by using the Selection Criteria T , Q ,N options as in the
browse mode.
34 | P a g e Confidential
Technology Practices Group
If the file does not exist you can give the option NEW as disposition.
It will allow to creating a file.
The online mode will allow the copy in online and you can view the process that how
many are selected or how many are read etc.
35 | P a g e Confidential
Technology Practices Group
And the options JCL will allow to to edit the JCL and SUMBIT will allow submitting the
job. And END will allow you to cancel the operation.
36 | P a g e Confidential
Technology Practices Group
This option will helpful because there is no need to wait till the copy completes and it
will take allow to do some other task parallel.
The option 4 is for CATALOG information’s like Display generic catalog entries or
VSAM datasets on a
Volume in list forms and does dataset list processing
VSAM
37 | P a g e Confidential
Technology Practices Group
From this you can do Allocate, display, delete, modify, or rename VSAM clusters,
Alternate indexes, or paths; manage IAM files.
Here also you have the options to Online or Batch mode.
2.5 VIEW
38 | P a g e Confidential
Technology Practices Group
We can see the type of data type, Starting position of the record field, and length of that
field.
3. TUTORIAL
Tutorials are available for each function and option in File-AID to provide detailed
information on the function and explain error conditions. Access tutorials by using the
HELP primary command (PF1) from any File-AID screen, or by selecting option T on
the File-AID Primary Option Menu.
40 | P a g e Confidential
Technology Practices Group
41 | P a g e Confidential