Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Example Scenarios z/OS MVS Programming: Sysplex Services Guide SA23-1400-00 |
|
The following scenarios illustrate how a reclaim vector algorithm works. Each scenario describes a user action, the cache structure environment at the time the user takes the action, the system response to the user action, and effects on the vector reclaims after the user action. The user uses three storage classes, 1, 2, and 3. Before the user performs the first action, the user defines a reclaim algorithm for storage class 1 as follows:
The request specifies that the system activate a reclaim vector to override the system default for data items in storage class 1. The reclaim vector indicates that the system can reclaim resources to satisfy the request from storage class 1 two times, cannot reclaim resources from storage class 2, and can reclaim resources from storage class 3 one time. The system can repeat this process two times before the reclaim vector for storage class 1 is deactivated, at which time the system begins to use the default reclaim algorithm. |
Copyright IBM Corporation 1990, 2014
|