![]() |
Copyright © Cloud Software Group, Inc. All Rights Reserved |
An Adabas file has a specific structure that must be mapped to one or more ADA tables. The primary key is made up from a field representing the record's Internal Sequence Number (ISN), which is a unique Adabas identifier and, optionally, a second key representing the occurrence number for a periodic group (PE) or a multiple-value field (MU). A third key is required when mapping a multiple-value field within a periodic group.01 AB,PE (Periodic Group)This structure must be mapped to four TIBCO Object Service Broker tables, each representing a different set of fields:
1.
2.
3. The multiple-value field AE within a periodic group:
4.
The ISN and count (CNT) fields are maintained by TIBCO Object Service Broker and do not exist in the Adabas data as defined fields. They are used in this example to identify the current Adabas record (ISN) and the relative occurrence number of a repeating group and or a multiple value field, so that the data can be represented as a relational view. The field names specified in the example are the default values assigned by the Table Definer but these can be altered. These fields can be specified in search arguments to retrieve a specific Adabas occurrence.
Displays the table name specified when you invoked the Table Definer. Type a new name to save the definition of the current table under a new name. For more information on how to copy TIBCO Object Service Broker objects, refer to TIBCO Object Service Broker Shareable Tools.Valid entries: A character string of up to 16 characters beginning with a letter (A - Z) or a special character ($ or #), and continuing with more letters, special characters, digits (0 - 9), or underscore characters (_). A table name starting with an @ symbol denotes a table supplied by TIBCO Object Service Broker. Displays the user unit associated with the table. The unit marks a table as belonging to a particular application or to a logical unit, for example, utilities, accounting, or network control. The default unit for your user ID is specified in your TIBCO Object Service Broker user profile.Valid entries: A character string of a maximum of 8 characters. These are typically provided by your system administrator, for example, ACC. Identifies a group of instances of the server with common characteristics, and must match the SERVERID startup parameter specified in the server JCL. Type the ID for the server or group of servers to use when accessing the table you are defining. Refer to Supplying the Startup Parameters for more information. Specifies the number of rows passed to the Execution Environment in any one interaction with the server. If set to 0, a full 31 KB buffer is used. If set to the number of rows that satisfy the request, the buffer is less than 31 KB.Setting a large value for this field means that a 31 KB buffer is set when required. Refer to Taking Advantage of Adabas Features for examples of how to use this field. Specifies whether the Internal Sequence Number (ISN) of the Adabas file is assigned by Adabas or the user application. Valid entries: SYSTEM or USER. Specifies that when the table is bound, a generated Global Format ID is to be used when accessing the table. Determines how many occurrences are in a periodic group or multiple-value field. The field is used to turn on the count function. If a definition contains fields from more than one periodic group, choose the value for this field carefully. Determines the type of repeating construct to be mapped for tables that map a multiple field or a periodic group. When set to N, the access to the Adabas file can be optimized. This field has two meanings depending on whether a periodic group (PE) or multiple field (MU) is being mapped.For a multiple value field, the field must be set to N if the MU field being mapped is not part of a PE group. If it is an MU within a PE group the field must be set to Y. Sets the number of occurrences of a PE group or MU field that are retrieved from Adabas for every Adabas call (occurrences per read). By selecting a value based on the number of occurrences within your own data structures, you can optimize the Adabas access that is performed.Set this field to the average number of occurrences expected to be read for each row or ISN.The location parameter segment of the screen is where you define a location parameter for the ADA table. A location parameter is required only if you want to access Adabas data through a peer server associated with a different Data Object Broker (remote node). If you do not require a location parameter, position your cursor in this segment, and then press PF4 and use the D line command to delete the parameter. If you always access the Adabas table remotely, the node from which you request the access can have either a minimal or a full definition.The name of the remote node where the full definition is located must be supplied through the use of the Default field. Data parameters are defined on the full definition, not a minimal definition.A minimal definition with a location parameter means you always access data at a remote node. The table type specified in a minimal definition need not match the table type of the full definition on the remote node.A full table definition with a location parameter indicates you can access data at either the local node or a remote node.The table type specified in a full definition must match the data on the local node. For example, a full definition of type TDS used to access TDS data on the local node can also be used to access an ADA table with the same name on a remote node.Use the event rule segment of the Table Definition screen to provide additional controls over the access to a table, and then define event rules based on these accesses.Event rules are always called when the table is accessed in the access type specified. All the rules that apply to a specific access are executed in the order in which they are entered in the event rule segment. They cannot access tables on a remote node.
Verify the value of an occurrence when the table is being modified, such as checking the validity of a field value. Cause additional processing to take place when a table is accessed. For example, a trigger rule can be used to create an audit trail or update other tables.The event rule information is entered in the scrollable event rule segment. To define event rules, position your cursor in this segment and press PF4 to bring up a definition screen. Complete the following fields:
Type in a line number, starting at 1 for the first line, with one event rule per line. The line numbers must be numbered consecutively. V – Validation Rule. No database updates are allowed during the validation process. The rule must be a function that returns Y (yes), the validation was successful, N (no), the validation was not successful, or a message explaining why it was not successful.T – Trigger Rule. A trigger rule cannot be a function or change the contents of the triggering row, and cannot use the TRANSFERCALL statement. Nested triggers are permitted. The type of access (or manipulation) to be performed on the data, causing the event to be executed. Valid entries:W - Any write (insert, replace, delete)I - Only insertR - Only replaceD - Only deleteG - Any retrieval
• TIBCO Object Service Broker Managing Data for more information on location parameters, event rules and minimal table definitions.
• TIBCO Object Service Broker Programming in Rules for more information on the TRANSFERCALL statement.
![]() |
Copyright © Cloud Software Group, Inc. All Rights Reserved |