Technology Driven IT Training Longstanding IT Technologists Computer Education Techniques
Distance-learning - IMS: DB DL/1 Programming


distance-learning center

Computer-Device_Tethered-Distance-learning Distance-learning-Building

Professional Distance-learning

IT Training Services


IMS: DB DL/1 Programming
DURATION: 5 days

FEE: $2,475

Based upon a class size of six students.

Scheduling can be adjusted to employee work hours and incorporate client assignments.

There is a surcharge associated with training two or fewer students.


  • Programmer
  • System Analyst
  • System Designer
  • Database Administrator
  • System Programmer


    1. Components of IMS DL/1
      • IMS component functionality.
    2. IMS DL/1 Structure
      • The architecture of an IMS database.
      • Segments/records, parent/child segments, and twins and siblings.
      • Segment limits and sensitivity, processing options, key sequence field, search field, DBDGEN, and PSBGEN.
    3. Program Structure and Interface to IMS
      • Calls to IMS and how they need to be coded.
      • Code a basic program which invokes IMS through DL/1.
    4. Database Retrieval Calls
      • Process the data in an IMS database using the GET call in DL/1.
      • Code WORKING-STORAGE, Linkage Section, and Entry Statement calls for retrieving input messages; these exercises utilize an existing database.
      • Perform GU, GHU, GN, and GNP operations.
    5. Database Update Calls
      • Update the data in an IMS database using the GET call in DL/1.
      • Using the database from the previous exercise, search for a segment, and perform a delete and replacement of values.
      • Insert new records into the database.
    6. Advanced Techniques
      • Code a complex search pattern.
      • Use the boolean operators to perform complex searches.
      • Code Qualified SSAs, Unqualified SSAs, and Boolean SSAs.
    7. Characteristics of a DL/1 Database
      • GSAM, HDAM, HIDAM.
      • How to reorganize a database.
      • Run the reorganize utility for the specified database.
    8. Logical Relationships and Searching
      • Add and use a secondary index.
      • Develop a query routine to a database from which the user can select a primary or secondary index.
    9. System Service Calls
      • The reasons for issuing Checkpoint Calls.
      • Issue a symbolic checkpoint.
      • Implement a PSB: Program Specific Block.
      • Recognize and appreciate the considerations associated with program and call parameters.
    10. Testing
      • Use DL/1 debugging aids for testing programs.
      • Issue a symbolic checkpoint.
      • Given a program with three errors, locate and fix the errors.

    Web-based Training   Blended Learning    


Effective February 27, 2012, the course dates listed on the SYS-ED schedules only will be available based upon approved and authorized user ID.

Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. SYS-ED makes no representation regarding ownership in any of the software products that we train on.

SYS-ED courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the SYS-ED course and that the employer has a licensed version of the software.