HP OpenVMS Systemsask the wizard |
The Question is:
What is a rooted directory, how do you create one, and when should you use
one.
ie... "sys$common"
The Answer is :
Concealed rooted logical names are used to mask potential (or actual)
differences in the initial component part(s) of the full file
specification.
An example of a traditional physical file name specification and an
equivilent replacement (where DKA100: is assumed to be the local OpenVMS
system disk) using a logical name follows:
DKA100:[SYS0.SYSCOMMON.SYSEXE]
SYS$SYSDEVICE:[SYS0.SYSCOMMON.SYSEXE]
When correctly created, a concealed rooted logical name is largely
indistinguishable from a physical device name when parsing the file.
Unlike a more common logical name that solely references a physical
device, a concealed rooted logical name also references (and conceals)
a root; a directory path.
An example of a concealed rooted logical name follows:
DKA100:[SYS0.SYSCOMMON.SYSEXE]
SYS$COMMON:[SYSEXE]
In this case, SYS$COMMON translates to DKA100:[SYS0.SYSCOMMON.] -- the
trailing period in the directory is significant, and required syntax.
The SYS$COMMON logical name and any other concealed rooted logical name
is marked with /TRANSLATION=CONCEALED. The default logical name
translation scheme will translate back to the physical device name,
to the limit of translations (LNM$C_MAXDEPTH), or until it encounters
a logical name marked as concealed.
As an example of when a concealed rooted logical name might be of
interest, consider a case where multiple group of OpenVMS users have
a scratch disk and wish to share scratch space, but they do not wish
to see the scratch space of other groups. Through the use of a
concealed rooted logical name, each of these groups can all share
the same physical disk, but each will have the appeance of an entirely
private disk:
$ DEFINE/TRANSLATION=CONCEALED/TABLE=LNM$SYSTEM/EXECUTIVE -
USER_SCRATCH DISK$SCRATCH:[GROUP_1.]
As another example, consider a site that is upgrading from the usual
herd of smaller disk drives into a fewer larger disks or into a RAID
configuration. Various applications were designed so that they each
assumed the use of a whole disk, or potentially various versions of
the application are now in use in parallel, and problems with the
directory names used are encountered -- top-level directory names are
no longer unique, and the applications are now colliding. With the
use of concealed rooted logical names, each application can be moved to
a subdirectory lower down in the directory structure, but the application
can still operate unaware; as if it were still working with top-level
directories.
There are various other uses.
|