CHAPTER 1 INTRODUCTION
The development of the University of California Automated
Vital Statistics System (AVSS) began
in 1980 using the most appropriate computing technology available
at that time. A conscious decision was made then to build upon
a MUMPS platform that would insure portability in the face of
rapid technological change. After a decade of development, this
strategy has paid dividends since the same version of AVSS
is operational over a wide range of computer hardware, ranging
from large VAX minicomputers to a variety of IBM-PC compatibles.
Operating multi-user/multi-tasking software in a variety of hardware
environments has placed additional burdens on the AVSS
system maintenance functions. Yet AVSS has been designed
to give users a high degree control over their hardware/software
resources.
This manual is to be used by the individual responsible for the
daily operation of a facility utilizing AVSS. This person
is commonly referred to as the AVSS "System Manager."
It is assumed that the System Manager is familiar with the AVSS
User's Manual and has basic knowledge of the computer equipment
that supports AVSS. The terminology introduced in the User's
Manual is used here and the reader is encouraged to review
the User's Manual since this manual will assume a certain
level of knowledge and has less detail in describing AVSS
procedures.
Many of the capabilities needed to perform system maintenance
activities are contained in the SYSTEM MAINTENANCE option. A major
goal of AVSS Version 4 was to introduce uniformity in the
SYSTEM MAINTENANCE suboptions over the entire range of hardware
that AVSS presently operates. Previous minicomputer versions
of AVSS required that some of these functions be performed
outside of AVSS, thus making it more difficult for novice
system managers to perform their tasks. This inconvenience was
eliminated in Version 4.004 where the standard SYSTEM MAINTENANCE
suboptions were grouped in a functionally related order for all
sites as follows:
Managing Terminals And Other Computer Resources
SYSTEM STATUS
BROADCAST MESSAGE
JOB KILL
UNFREEZE ANOTHER TERMINAL (XON)
SHUTDOWN AVSS
MIRROR ANOTHER TERMINAL
INITIALIZE MODEM
HOW MUCH DISK SPACE REMAINS
Assuring Data Reliability
OPERATING SYSTEM INTEGRITY CHECKER
AVSS DATA BASE INTEGRITY CHECKER
ERROR ENTRY LISTING
Reporting AVSS Systems Data
LIST OVERRIDE PROCESSING
COMMUNICATIONS LOG PROCESSING
DAYTIME COMMUNICATIONS STARTUP
USER REPORT BY ACTIVITY INDEX
Managing AVSS Records
BACKUP RECORD DATA
SET LAST FULL BACKUP DATE
DIFFERENTIAL BACKUP
INCREMENTAL BACKUP
VERIFY RECORD DATA
KILL RECORD DATA
RESTORE RECORD DATA
SELECTIVE RECORD RESTORE
Managing Security
DEVICE TABLE
CLASSIFICATION FILE
ID FILE
SECURITY REPORT
Special Suboptions
PERIPHERAL FILE
EXPAND DATABASE
The use and capabilities of these suboptions are discussed
in Chapter 2. All except two of these suboptions apply to all
sites; the two exceptions are UNFREEZE ANOTHER TERMINAL (XON),
which is presently unavailable for AVSS-PC, and EXPAND
DATABASE, which is not applicable at minicomputer sites.
CHAPTER 2 OVERVIEW OF STANDARD SUBOPTIONS
The SYSTEM MAINTENANCE suboptions will be discussed
by functional group. The order of discussion follows the screen
display in AVSS and is not necessarily in order of importance
in terms of system maintenance activities. Examples are taken
from an AVSS-PC implementation and will differ somewhat
from minicomputer versions.
2.1 MANAGING TERMINALS AND OTHER COMPUTER RESOURCES
These suboptions allow the system manager to monitor the multi-user
and multi-tasking aspects of the AVSS hardware/software
system.
2.1.1 System Status
The SYSTEM STATUS suboption allows you to determine the number
and status of the active jobs on your system:
SYSTEM MAINTENANCE OPTION > [SY][ENTER]STEM
STATUS
MSM - System Job Status
12:13 PM 26-JUL-91
Max Partitions: 6 Current in Use: 4
JOB UCI/VOL ROUTINE P-SIZE STATUS #-COMMANDS DEVICES
NUM NAME NAME CURR/MAX TOTAL/INCR OWNED
--- ------- -------- -------- ------- ---------- -------
1 * * * M S M * * *
2 MGR,AVS %SS 2.9/20.0 RUNNING 7370/937 1pc
3 MGR,AVS FSPCTIM 1.1/20.0 CLOCK 898/873
5 MGR,AVS FSF 3.0/20.0 TERMI-4 1266/0 4pc
p - Principal Device
c - Current Device
Total Buffers In System: 162, Modified#=0
Flush threshold=(4,8), Flush interval=2, flush count=1
SYSTEM MAINTENANCE OPTION >
The most important columns headings are highlighted in
bold letters, i.e., JOB NUM, ROUTINE NAME, and DEVICES OWNED.
On AVSS-PC implementations, Job Number 1 is always the
MSM MUMPS operating system and owns no devices. The PC console
is always Device 1. In this example, Job Number 2 is associated
with the ROUTINE NAME %SS, indicating that Device 1 (the console)
is running the system status job that created this output. Since
AVSS has multi-user capability, there can be other jobs
operating simultaneously, such as the "time job" or
routine FSPCTIM, which should always be active on AVSS-PC
implementations and usually does not own a device. The term "device"
refers to a computer communications port, which can be attached
to a terminal or printer. You should have a table of the communications
devices on your computer summarizing their baud rates and other
communications parameters. In the example above, we see that Device
4 is running the routine FSF, which is part of the AVSS
program since all AVSS routines begin with the two letters
"FS," standing for "Forms System."
In summary, when you perform a SYSTEM STATUS, you should note
the values for JOB NUM, ROUTINE NAME, and DEVICES OWNED since
you may need this information for other SYSTEM MAINTENANCE suboptions.
For most activities you do not need to know the meaning of the
remaining information produced by SYSTEM STATUS.
2.1.2 Broadcast Message
The BROADCAST MESSAGE suboption can be used to interactively
send messages to users with active jobs, such as Job Number 5
above on Device 4. For example, if you wanted the user corresponding
to Job Number 5 to logoff for system maintenance reasons, you
might perform the following procedure:
SYSTEM MAINTENANCE OPTION > [BR][ENTER]OADCAST
MESSAGE
MSM - Terminal Broadcaster Utility
Enter Message: [?][ENTER]
Enter the text of the message that you wish to broadcast.
It may
be up to 255 characters and should not include control characters.
Enter <RETURN> or '^' or '^Q' to exit this utility.
Enter Message: [PLEASE SIGN OFF ASAP TO ALLOW SYSTEM MAINTENANCE,
THANKS!][ENTER]
Enter target terminal(s): [?] ENTER]
Enter 'ALL' to broadcast to all active terminal devices, or
the number of a single active terminal device. The number must
be
within one of the following ranges: 1,3-19,64-199 inclusive.
You may enter a list of these numbers separted by commas, or
a range of these numbers with the low and high element separated
by a hyphen.
You may enter any combination of lists and ranges.
Enter '^D' to get a list of all active jobs and their principal
devices.
Enter <RETURN> or '^' to return to the previous question,
or
'^Q' to exit this utility.
Enter target terminal(s): [4][ENTER]
Your message was broadcast to terminal 4.
Enter Message:[ENTER]
SYSTEM MAINTENANCE OPTION >
Note that many of the AVSS commands such as [?],
[^], [^D] [^L], and [^Q] are in force
within many SYSTEM MAINTENANCE procedures, even though the operations
are implementation-specific and are frequently taking place within
MUMPS operating system utilities.
2.1.3 Job Kill
Occasionally it will be necessary to terminate a job. For
example, due to electrical disturbances a device may become "locked,"
or a user may abandon a terminal, or you may need to stop the
FSPCTIM job in order to expand the MUMPS database on AVSS-PC
(see Section 2.6.2). You should first run the SYSTEM STATUS
suboption, then use the following procedure:
SYSTEM MAINTENANCE OPTION > [J][ENTER]
OB KILL
MSM - Job Termination/Device Release
Job number to be HALTed? [3] [ENTER]
Job #3 being HALTed.
Job #3 has terminated
Job number to be HALTed? [ENTER]
SYSTEM MAINTENANCE OPTION >
2.1.4 Unfreeze Another Terminal (XON)
If a terminal becomes "frozen" due to spurious electronic
noise that produces an "XOFF" or [CTRL-S] and
if the user is unable to "unfreeze" the terminal using
an "XON" or [CTRL-Q] (please refer to Section
2.6 of the AVSS User's Manual), then with certain minicomputer
implementations, it is possible for the System Manager to free
up the communication line using the following example procedure:
SYSTEM MAINTENANCE OPTION > [UN][ENTER]
FREEZE ANOTHER TERMINAL (XON)
Simulate an XON condition for a terminal that has issued an XOFF.
Terminal => [?][ENTER]
[Terminal number 1 or 4 or 64-95.]
Terminal => [65][ENTER] [No XOFF was pending.]
Terminal => [78][ENTER]
OK. In a few seconds the terminal should be all right.
SYSTEM MAINTENANCE OPTION >
Note that this suboption is not yet operational on AVSS-PC.
2.1.5 Shutdown AVSS
It is very common to shutdown the AVSS-MUMPS system
so as to perform backups and other system maintenance functions.
However, before you attempt a shutdown, you should inform all
users in advance and make sure that there are no active jobs,
except for the FSPCTIM routine. NOTE: You should always perform
a shutdown before turning off the power on your computer or re-booting.
As suggested above, you can broadcast a message to any users who
have not yet terminated their interactive session. The procedure
is then as follows:
SYSTEM MAINTENANCE OPTION > [SH][ENTER]UTDOWN
AVSS
MSM - System Shutdown
1 other user still on system.
Do you want to force a shutdown? <N> [Y][ENTER]
System Going Down Immediately
On AVSS-PC systems, the FSPCTIM job is always active
and shows as one other user on the system, so it is permissible
to force a shutdown. If there is more than one other user on the
system, you should run a SYSTEM STATUS and attempt to determine
the nature of the remaining job and, if possible, terminate it
before attempting to shutdown.
2.1.6 Mirror Another Terminal
As a System Manager, you have the capability in most AVSS
implementations to monitor the ongoing activities of users. This
is especially helpful for training new users in remote locations
and troubleshooting real or perceived problems that may be difficult
for users to explain to you by telephone. You will need to know
the number of the device that you wish to monitor, and the user
should be logged onto AVSS before you begin. You may wish
to run SYSTEM STATUS before beginning. The procedure is then as
follows:
SYSTEM MAINTENANCE OPTION > [M][ENTER]IRROR
ANOTHER TERMINAL
MSM - Terminal Monitor Utility
Device Number: [?][ENTER]
Enter the device number of the device to be monitored. The
device
number must be a terminal type device (i.e., 1, 3-19, 64-199),
or
Enter <RETURN>, '^', or '^Q' to exit utility.
Device Number: [4][ENTER]
Ready to start monitoring device 4? <Y>:[ENTER]
Monitoring begun for device 4.
Enter CTRL/C to terminate monitoring.
At this point everything that appears on Device 4 will
also appear on your video screen. It is important to remember
to use [CTRL-C] when you have completed monitoring.
2.1.7 Initialize Modem
If a modem line becomes inoperative, you should turn the modem
power off and re-initialize the modem by determining the correct
Device Number and running the following procedure:
SYSTEM MAINTENANCE OPTION > [INI][ENTER]TIALIZE
MODEM
INITIALIZE MODEM ON LINE NUMBER > [4][ENTER]
Note: There will be about a 1 minute
delay at this point.
SYSTEM MAINTENANCE OPTION
>
2.1.8 How Much Disk Space Remains
An important function of the System Manager is to monitor
the usage of disk storage space. As time progresses more and more
data consumes more and more disk space and it is possible to entirely
fill your computer's disk. When this occurs, all data entry must
necessarily come to a halt. To avoid this problem it is necessary
to regularly monitor disk usage. If a disk is in danger of becoming
full, you must immediately plan to archive and delete existing
records, or expand disk capacity. At least weekly you should obtain
a report on the remaining disk space by the following procedure:
SYSTEM MAINTENANCE OPTION > [H][ENTER]OW
MUCH DISK SPACE REMAINS
MSM - Disk Space/Free Space Utility
Volume Group: AVS Index: 0
Vol Maps Tot Blks Free Spc %-Free Host File Name
--- ---- -------- -------- ------ --------------
0 12 6048 148 2.45 c:\avss\avss4106.msm
SYSTEM MAINTENANCE OPTION >
In this example, the disk has only 148 MSM blocks (Blks),
or 148,000 characters remaining. When the space remaining falls
below 100 blocks, AVSS will automatically issue a warning
upon sign-on, and when it drops below 50 blocks, data entry will
no longer be permitted. It is advisible to begin immediate plans
for providing more usable space as soon as the free space falls
below 500 blocks or 0.5 megabytes. If you manage an AVSS-PC
facility, please refer to Section 2.6.2 for instructions on how
to expand a database.
2.2 ASSURING DATA RELIABILITY
Another important function of the System Manager is to maintain
the integrity of the AVSS-MUMPS database. Database structures
are inherently quite complex involving sophisticated indexes into
individual records to allow for rapid storage, retrieval, and
updating. When a record is stored in AVSS, a number of
consistent pieces of information must be written to disk. If,
for example, a power failure occurs during the process of writing
these components, and only some of them are successfully stored,
then there will result a database inconsistency or error. NOTE:
This is but one reason why you should never power down your computer
equipment without performing a shutdown as described in Section
2.1.5. The suboptions is this section were designed to help
you maintain an error-free database.
2.2.1 Operating System Integrity Checker
Although with proper system maintenance database errors are
quite infrequent, we recommend that you perform the OPERATING
SYSTEM INTEGRITY CHECKER on a regular basis. Ideally this would
be daily, but no less frequent than once a week. It is an easy
procedure that you can perform as you are leaving the office at
the end of each day, and check the results the following morning.
It is as follows:
SYSTEM MAINTENANCE OPTION> [O][ENTER]PERATING
SYSTEM INTEGRITY CHECKER
MSM - Database Integrity Utility
Enter UCI to validate <ALL>:[ENTER]
Enable ZTRACE <N> [ENTER]
Enter output device <1>: [3][ENTER]
Validating Routines from [MGR,AVS]
Validating Globals from [MGR,AVS]
% %E %HELP FS FSD FSF FSF2
FSI FSL FSLOG FSO FSQ FSR FSSYS
FSTEMP FSU FSUL FSX HELP LOG SYS
T UTILITY Z90018 Z90028 Z90033
Done
Note that we overrode the default device of <1> (console)
and wrote the results to Device 3, which is the system printer
on most AVSS-PC implementations. This will direct the output
of the integrity check to hard copy so that you will have a permanent
record of the results. Thus, you may move on to other activities
after you have responded with [3] [ENTER] above. A successful
integrity check will report "NO ERRORS FOUND" while
a problem in the database will produce a list of errors that should
be reported to the AVSS Project for technical support.
The time required to complete the database integrity check will
vary from a few minutes to a few hours, depending on the size
of the database and the speed of the computer system. NOTE:
You should always run the OPERATING SYSTEM INTEGRITY CHECKER before
performing any kind of backup.
2.2.2 AVSS Data Base Integrity Checker
In addition to the OPERATING SYSTEM INTEGRITY CHECKER, there
is the AVSS DATA BASE INTEGRITY CHECKER. This is an additional
validity check that examines the internal consistency of the data
stored within the AVSS program structure. There is less
likelihood of an error here assuming no error was found in the
operating system, and since the AVSS DATA BASE INTEGRITY CHECKER
takes much longer to run, you need no run it as frequently. Once
a week is often enough or even monthly. However, if you have any
reason to suspect that there is a problem with the AVSS
data structure, you should run it immediately; and you should
run the AVSS DATA BASE INTEGRITY CHECKER before backing up and
deleting AVSS records (see Sections 2.4.1 and 2.4.6).
The procedure is as follows:
SYSTEM MAINTENANCE OPTION > [A][ENTER]VSS
DATA BASE INTEGRITY CHECKER
FOR WHICH SITE <*> [ENTER]
(E) ERRORS ONLY, (A) ALL ERRORS AND WARNINGS,
OR (N) NO REPORTING <E> [ENTER]
RUN IN BACKGROUND <N> [Y][ENTER]
SOC. SAVE OUTPUT CODE <IC072991> [ENTER]
DESCRIPTION <INTEGRITY CHECK FOR 07/29/91> [ENTER]
DELAY UNTIL <NOW> [1800][ENTER]
Because it usually takes a considerable length of time
to complete, it is advisible to run this procedure in the background.
As shown above, AVSS will automatically assign a Save Output
Code (beginning with IC followed by the MMDDYY date) and a textual
description. It is advisible to accept the defaults here as well.
Finally, since this procedure is a heavy consumer of computer
resources, you may wish to delay the startup until after normal
working hours; you should specify the startup time in military
syntax as shown above with the example of 1800 Hours or 6:00 PM.
When you begin work the following day, you can review the results
using the OUTPUT SAVED REPORT suboption under the REPORT GENERATOR
as follows:
REPORT GENERATOR OPTION > [O][ENTER]UTPUT
SAVED REPORT
ID. ID CODE# <4> [ENTER] MANAGER,SYSTEM
OUT. OUTPUT REPORT CODE > [I][ENTER]C072991 = INTEGRITY
CHECK FOR 07/29/91
IC072991 =INTEGRITY CHECK FOR 07/29/91
IC072991 =[ENTER]
OUTPUT DEVICE <T>[ENTER]
AVSS DATA BASE INTEGRITY OUTPUT:
INTEGRITY CHECK FOR 07/29/91
FOR SITE: * BY: MANAGER,SYSTEM FROM DEVICE: 1
STARTED ON: 7/29/91 AT 6:00 PM
FINISHED ON: 7/29/91 AT 7:37 PM
ELAPSED TIME: 1 HOUR 36 MINUTES 50 SECONDS
STEP 1: CHECK EACH DATA FILE FOR ITS CORRESPONDING INDEXES
STEP 1: CHECKING SITE 34 FOR INDEXING INFORMATION.
7/29/91 1059.31 FORM:LCA FILE#:18934018813 => INDEX NODE UNDEFINED:
%FI (REGISTRATION FILE DATE) SETTING...
7/29/91 1059.32 FORM:LCA FILE#:18934018813 => INDEX NODE UNDEFINED:
%UP (LAST UPDATE) SETTING...
INDEX: DT (DATE OF BIRTH)
7/29/91 1059.32 FORM:LCA FILE#:18934018813 => ERROR: UNDEFINED
VARIABLE: I4A FOR INDEX: NM (CHILD'S NAME)
STEP 2: CHECK EACH INDEX ENTRY FOR COMPATIBILITY WITH DATA FILE
STEP 2: CHECKING INDEX:%FI SITE:34
STEP 2: CHECKING INDEX:%UP SITE:34
STEP 2: CHECKING INDEX:DR SITE:34
STEP 2: CHECKING INDEX:DT SITE:34
STEP 2: CHECKING INDEX:FN SITE:34
STEP 2: CHECKING INDEX:MN SITE:34
STEP 2: CHECKING INDEX:NM SITE:34
DATA BASE STATISTICS AND REPORT SUMMARY:
SITE: 34 FORM: LCA HAS 2990 ENTRIES IN DATA BASE.
FOR SITE: * BY: MANAGER,SYSTEM FROM DEVICE: 1
STARTED ON: 7/29/91 AT 6:00 PM
FINISHED ON: 7/29/91 AT 7:37 PM
ELAPSED TIME: 1 HOUR 36 MINUTES 50 SECONDS
REPORT GENERATOR OPTION >
In the example above AVSS found two missing indexes
for one record and, using data available within the records, reconstructed
these indexes. Thus, by running the AVSS DATA BASE INTEGRITY
CHECKER not only are inconsistencies detected, but whenever possible,
they are corrected. However, there are some problems that AVSS
is unable to correct; these are referred to as "errors."
In the example above, record 18934018813 is missing the date of
birth and the missing index cannot be constructed without this
information. It is advisible to contact a member of the AVSS
Project for technical assistance whenever an error is uncovered.
Usually the error can be corrected quickly, but it is important
that it be corrected using the most appropriate means.
2.2.3 Error Entry Listing
The two integrity checkers described above are designed to
search systematically for database inconsistencies which usually
arise from electrical disturbances or hardware malfunctions. These
are the most common malfunctions for an AVSS implementation.
Another less frequent type of problem is the result of a software
error in AVSS or MUMPS. Although both or these products
are at a state of maturity and have undergone a decade of development
and operational usage, there is always the possibility of an error.
This generally occurs when an unusual set of circumstances occur
that was not foreseen by the AVSS Project design team,
and are most likely to be observed soon after a new release of
AVSS. When a software error occurs, AVSS begins
a recovery mechanism and asks you to help document the circumstances
that triggered the error: see Section 4.3 of the AVSS User's
Manual for a description of the procedure. The information
generated as a result of the error may be viewed using the ERROR
ENTRY LISTING suboption. If any errors are listed, please contact
a member of the AVSS Project.
SYSTEM MAINTENANCE OPTION > [E][ENTER]
RROR ENTRY LISTING
OUTPUT DEVICE <T> [ENTER]
<UNDEF>*XECUTE*^FSF:::4:0: ERROR OCCURRED ON 1/23/91
AT 04:44 PM
FORM: CONFIDENTIAL MORBIDITY REPORT OPTION: REGISTER CONFIDENTIAL
MORBIDITY
REPORT
USER: NELSON,MARY CLASSIFICATION: COUNTY SYSTEM MANAGER
CURRENT VARIABLE AT TIME OF ERROR WAS: REPORTER
COMMENT:
1> I WAS ATTEMPTING TO SKIP THE REPORTER NAME.
2.3 REPORTING AVSS SYSTEM DATA
A significant aspect of AVSS is its capability of automatically
creating systematic logs of user and communications activities.
The System Manager should examine the contents of these logs on
a regular basis. Performing these functions every week is recommended.
2.3.1 List Override Processing
AVSS maintains extensive lists of choices for many
data items; examples include: all the states in the U.S. and countries
in the world, all zip codes in California and its surrounding
states, and the attending physicians in a particular hospital.
Users are encouraged to make use of these lists by entering the
first few characters of the name, letting AVSS perform
a match, and then completing the necessary information. Occassionally,
however, there will not be a match and the user will override
the list and enter non-list information. There are two principal
reasons for such an override: an AVSS list needs to be
updated, or the user needs additional training in use of the list
processing feature. In both cases it is important that the System
Manager be aware of the override. In the former case, such as
the appearance of a new zip code, there is a need to update AVSS
and this information needs to be communicated to the AVSS Project
staff. In the latter case, a minor amount of user followup training
is usually necessary.
SYSTEM MAINTENANCE OPTION > [L][ENTER]IST
OVERRIDE PROCESSING
PRINT OR SCRATCH VERIFICATION TABLE <P> [ENTER]
ENTER FORM CODE <*> [ENTER]
ENTER FIELD NAME <*> [ENTER]
OUTPUT DEVICE <T> [ENTER]
FORM: HCA - HOSPITAL BIRTH RECORD
FIELD: 7 - FATHER'S STATE OF BIRTH
SITE: 033
INDEX: 202539 BY: SMITH,MARTHA,CLERK ON 1/27/91
VALUE: FIJI ISLA
In this example the user entered the text "FIJI ISLA"
rather that simply "FIJI" as contained in the AVSS
list for Item 7. The user could not complete "ISLAND"
since there is room for only nine characters on the paper form.
In this case the System Manager should contact the user for some
followup training in AVSS list processing.
A second example of output from the LIST OVERRIDE PROCESSING suboption
is:
FORM: HCA - HOSPITAL BIRTH RECORD
FIELD: 13D - NAME, TITLE AND MAILING ADDRESS OF ATTENDANT
SITE: 033
INDEX: 223330 BY: TORREZ,FARINA,CLERK ON 6/23/91
VALUE: AGNES B. HOWARD, MD 5TH AVE. AND ESPLANADE CHICO
INDEX: 224657 BY: MARTIN,MARIE,CLERK ON 7/26/91
VALUE: AGNES HOWARD, M.D. W. 5TH AVENUE AND ESPLANADE
In this example two birth clerks have entered the entire
birth attendant's name and address and did not take advantage
of the AVSS list for Item 13D. Although this too may be
the result of incomplete training, the fact that two clerks have
overrode the list processing for the same birth attendant indicates
that it is a new birth attendant whose name and address is not
on the list for Item 13D. The System Manager should therefore
check the list for this item. If the attendant is not on the list,
then the two records that contained new attendant's name (file
numbers 223330 and 224657) should be displayed using the DISPLAY
RECORD suboption under the HOSPITAL BIRTH RECORD option (see Section
3.3.2 of the AVSS User's Manual). From these displays one
can obtain the new attendant's name, degree, address, and license
number. Using this information, it is an easy task to add the
new birth attendant data to the Item 13D list by means of the
MODIFY USER LISTS suboption (see Section 3.3.18 of the AVSS
User's Manual).
After you have reviewed and resolved all the entries in LIST OVERRIDE
PROCESSING, then you should delete them. This not only frees up
disk storage space, but also reserves this list for problems that
need to be resolved, and since you must delete entries individually,
you will wish to keep the number to a minimum.
SYSTEM MAINTENANCE OPTION > [L][ENTER]IST
OVERRIDE PROCESSING
PRINT OR SCRATCH VERIFICATION TABLE <P> [S][ENTER]
ENTER FORM CODE <*>[ENTER]
ENTER FIELD NAME <*>[ENTER]
FORM: HCA - HOSPITAL BIRTH RECORD
FIELD: 7 - FATHER'S STATE OF BIRTH
SITE: 033
INDEX: 202539 BY: SMITH,MARTHA ON 1/27/91
VALUE: FIJI ISL SCRATCH <N> [Y][ENTER] SCRATCHED
2.3.2 Communications Log Processing
In many implementations, AVSS automatically executes communications
tasks during the evening hours with other AVSS sites. Typically
a local registration district computer will telephone and connect
to a hospital computer, then transfer electronic hospital birth
records. The process is more involved than ordinary electronic
"bulletin boards" since not only is the connection with
another computer made automatically and information transferred
using error-correction techniques, but the receiving computer's
database is updated to reflect indexed information contained in
the sending computer's database. An even more complex process
involves the reallocation of electronic birth certificates from
the district of birth occurrence to the district of mother's residence.
Although these communications occur automatically and require
no human effort, it is the responsibility of the System Manager
to monitor them to identify any difficulties. The most common
problems are related to the inability of your computer to successfuly
connect and sign-on to its target computer. This can occur if
the target computer is powered off, or powered on but not running
AVSS, or if its modem is not in an auto-answer state. Here
is an example of a successful hospital data transfer:
SYSTEM MAINTENANCE OPTION > [CO][ENTER]MMUNICATIONS
LOG PROCESSING
WOULD YOU LIKE TO VIEW OR DELETE MESSAGES > [V][ENTER]
DISPLAY ALL LOGGED MESSAGES > [Y][ENTER]
CHOOSE OUTPUT DEVICE FOR DISPLAY
OUTPUT DEVICE <T>[ENTER]
RECEPTIONS HAVE OCCURRED ON LINE: 5
1 THURSDAY 4/18/91 AT 11:53.58 PM DIALING: Memorial Center (222),
NUMBER: 599-3900
2 THURSDAY 4/18/91 AT 11:54.23 PM PHONE CONNECTION MADE TO SITE
NAME: Memorial Center
l (222) PHONE NUMBER:599-3900
3 THURSDAY 4/18/91 AT 11:54.31 PM SUCCESSFUL LOGON TO: Memorial
Center (222) JOB:2
4 THURSDAY 4/18/91 AT 11:54.35 PM START RECEIVED
5 THURSDAY 4/18/91 AT 11:55.35 PM QUIT RECEIVED. FILED:2 AVG.
TIME:30.0
SYSTEM MAINTENANCE OPTION >
An example of a successful receipt of reallocated electronic
certificates is as follows:
SYSTEM MAINTENANCE OPTION > [CO][ENTER]MMUNICATIONS
LOG PROCESSING
CHOOSE OUTPUT DEVICE FOR SUMMARY REPORT
OUTPUT DEVICE <T>[ENTER]
REALLOCATIONS HAVE OCCURRED ON LINE: 4
THERE ARE 398 LOG ENTRIES FROM TUESDAY 5/14/91 AT 08:13.29 AM
TO TUESDAY 5/14/91 AT 10:16.58 AM
WOULD YOU LIKE TO VIEW OR DELETE MESSAGES > [V][ENTER]
DISPLAY ALL LOGGED MESSAGES > [N][ENTER]
REALLOCATIONS
LINE 4 398 ENTRIES.
DISPLAY RANGE > [392--398][ENTER]
CHOOSE OUTPUT DEVICE FOR DISPLAY
OUTPUT DEVICE <T> [ENTER]
REALLOCATIONS ON LINE 4:
392 TUESDAY 5/14/91 AT 10:15.40 AM FILED:34,LCA,19134021087 ORIGIN
SITE=34
393 TUESDAY 5/14/91 AT 10:15.58 AM FILED:34,LCA,19134021140 ORIGIN
SITE=34
394 TUESDAY 5/14/91 AT 10:16.19 AM FILED:48,LCA,19148001462 ORIGIN
SITE=48
395 TUESDAY 5/14/91 AT 10:16.39 AM FILED:61,LCA,19161000975 ORIGIN
SITE=61
396 TUESDAY 5/14/91 AT 10:16.58 AM FILED:34,LCA,19034019615 ORIGIN
SITE=34
397 TUESDAY 5/14/91 AT 10:16.58 AM QUIT RECEIVED. FILED:371 AVG.
TIME:18.9
398 TUESDAY 5/14/91 AT 10:16.58 AM REALLOCATION PROCESS TERMINATED.
DISPLAY RANGE > [^Q][ENTER]
Here are two examples of unsuccessful communications:
1 FRIDAY 6/28/91 AT 12:03.01 AM DIALING:
Memorial Center (222), NUMBER: 599-3900
2 FRIDAY 6/28/91 AT 12:09.42 AM PHONE CONNECTION RETRY EXCEEDED.
3 SATURDAY 6/29/91 AT 12:20.05 AM DIALING: Memorial Center (222),
NUMBER: 599-3900
4 SATURDAY 6/29/91 AT 12:20.59 AM UNABLE TO LOGON TO: Memorial
Center (222), HANGING UP...
In the Friday example, there was no answer by the Memorial
Center modem, suggesting that either the modem power was off,
or the modem was not in an auto-answer mode, or that it needed
to be reset. You should contact Memorial staff and instruct them
to check all modem connections, turn off the modem power and power
it back on, then run the INITIALIZE MODEM suboption as described
in Section 2.1.7.
In the Saturday example, a successful connection was made to the
Memorial Center modem, but there was no response by the computer,
thus indicating that the computer was powered off, or if the power
was on that it was not running AVSS at 12:20 AM. You should
therefore contact the Memorial staff and instruct them to be sure
that AVSS is left running during during the appropriate
evening/early morning hours.
Clearly the communications log can become large and consume much
disk space. You should therefore examine it frequently (ideally
on a daily basis, but at least weekly), resolve any difficulties,
then delete it. If you wish, you could output it to a printer
by responding with a [P] or [3] (or other appropriate
device number) in response to the OUTPUT DEVICE > prompt.
Once in the COMMUNICATIONS LOG suboption, the following procedure
should be used:
WOULD YOU LIKE TO VIEW OR DELETE MESSAGES
> [D][ENTER]
DELETE ALL LOGGED MESSAGES > [?][ENTER]
ENTER 'Y' TO DELETE ALL MESSAGES LOGGED,
OR 'N' TO DELETE A PARTICULAR SET OF MESSAGES.
DELETE ALL LOGGED MESSAGES > [Y][ENTER]
FINAL CONFIRMATION. DELETE ALL MESSAGES <N> [Y][ENTER]
DELETED.
SYSTEM MAINTENANCE OPTION >
2.3.3 Daytime Communications Startup
If you have experienced difficulty in establishing a connection
with an AVSS hospital computer, have followed the troubleshooting
procedures described in the previous section, and wish to test
the communications process without delay, then you can use the
DAYTIME COMMUNICATIONS STARTUP suboption in lieu of waiting for
AVSS to automatically attempt the process. To run this
option you must know the Device Number that is programmed to initiate
automated communications. You can determine this by examining
the output from the COMMUNICATIONS LOG PROCESSING suboption (frequently
this will be Device 4). Then use the following procedure.
SYSTEM MAINTENANCE OPTION > [D][ENTER]AYTIME
COMMUNICATIONS STARTUP
SOURCE FOR COMMUNICATION PARAMETERS
LINE NUMBER > [4][ENTER]
SITE NUMBER > [?][ENTER]
SELECT FROM ONE OF THE FOLLOWING SITES:
SITE: 1 = Memorial Center (222)
SITE: 2 = Community Hospital (270)
SITE: 3 = Central Health Clinic (300)
SITE: 4 = St. Ignacio (368)
SITE NUMBER > [1][ENTER] TRANSFER STARTED: Memorial
Center (222)
EXIT
Your screen will be cleared, AVSS will automatically
logoff this session, and then begin dialing the target site. You
can logon again, and monitor the process using the SYSTEM STATUS
suboption described in Section 2.1.1. If you observe the Routine
Name associated with Device 4 to be FSRECR4 then there is good
evidence that successful communications are progressing. You may
also examine the output from the COMMUNICATIONS LOG PROCESSING
for evidence of a successful connection.
2.3.4 User Report By Activity Index
There is a USER REPORT BY ACTIVITY INDEX suboption under each
of the form-specific options supported at a particular site; for
example, the birth certificate (LCA), the hospital birth record
(HCA), and the confidential morbidity report (CMR). Examples of
this report for the HCA form were given in Section 3.3.14 of the
AVSS User's Manual. There may be instances however, where
it is desirable to run a user report for more than one form. To
do this you must run the USER REPORT BY ACTIVITY INDEX suboption
under the SYSTEM MAINTENANCE option as follows:
SYSTEM MAINTENANCE OPTION > [US][ENTER]ER
REPORT BY ACTIVITY INDEX
INITIALIZING..
SELECT THE FORMS AND SITES TO BE REPORTED ON:
FORM. SELECTION > [^L][ENTER]
CMR= CONFIDENTIAL MORBIDITY REPORT
HCA= HOSPITAL BIRTH RECORD
LCA= BIRTH CERTIFICATE
FORM. SELECTION > [*][ENTER]
FORM. SELECTION >[ENTER]
XIND. SITE CODES > [34][ENTER]
XIND. SITE CODES >[ENTER]
THE FOLLOWING SITES / FORMS WILL BE REPORTED ON:
34 CMR
34 HCA
34 LCA
BEGINNING DATE <1/1/91> [7 1 91][ENTER] (7/1/91)
ENDING DATE <TODAY> [7 7 91][ENTER] (7/7/91)
SUMMARY REPORT ONLY <Y> [ENTER]
OUTPUT DEVICE <T> [ENTER]
SEARCHING DATABASE **************
Please refer to the AVSS User's Manual for examples
of the output format.
2.4 MANAGING AVSS RECORDS
Equal in importance to the assuring database integrity is
the System Manager's responsibility in maintaining backups of
AVSS data. There are two basic types of backups that you
need to be concerned with: a full (or complete) system backup
as opposed to a backup of only AVSS records. The former
backs up your entire AVSS implementation including the
MUMPS operating system and associated programs as well as all
AVSS programs and data. In some cases a full system backup
will also contain all PC-DOS files. These backups are necessarily
dependent on specific system resources such as the type of backup
tape drive, size of floppy diskette, or specialized backup software.
In short, they are varied, cannot be standardized, and are not
easily described in an general-purpose manual. This section concerns
procedures to backup and otherwise manage selected AVSS
records. These procedures are designed to be complementary to
complete system backups and to allow a second level of backup
redundancy.
2.4.1 Backup Record Data
The BACKUP RECORD DATA suboption allows you to select a target
group of AVSS records to be backed up to tape or diskette.
This is most frequently used to archive data so that it can be
purged from disk to free up space and restored at a later date
if necessary. It also provides for redundant backup. For example,
as shown below, you could backup the birth certificates (LCA forms)
for a particular month:
SYSTEM MAINTENANCE OPTION > [BA][ENTER]CKUP
RECORD DATA
INITIALIZING..
FORMS. SELECTION > [LCA][ENTER] = BIRTH CERTIFICATE
(Entering an asterisk "*" here will select
all forms resident on the system.)
FORMS. SELECTION > [ENTER]
XINDS. SITE CODES > [34][ENTER]
(Entering an asterisk "*" here will select
all site codes resident on the system.)
XINDS. SITE CODES > [ENTER]
THE FOLLOWING SITES / FORMS WILL BE OUTPUT :
34 LCA,
INDEX TO SEARCH > [DT][ENTER] (DT) DATE OF BIRTH
ENTER BEGIN VALUE FOR DATE OF BIRTH <1/1/90 >[9 1 89][ENTER]
(9/1/89)
ENTER ENDING VALUE FOR DATE OF BIRTH < T > [9 30 89][ENTER]
(9/30/89)
RUN ARCHIVE IN THE BACKGROUND <Y> [ENTER]
SOC. SAVE OUTPUT CODE <ARCHIV01> [ENTER]
WHEN FINISHED, YOUR OUTPUT CAN BE VIEWED BY USING 'OUTPUT
SAVED REPORT
UNDER THE REPORT GENERATOR OPTION.
PREPARE PC-DOS FILE AND HIT RETURN > [ENTER]
PLEASE BE SURE TO RUN 'VERIFY RECORD DATA' OPTION TO ENSURE
A RELIABLE
BACKUP PRIOR TO DELETING THIS DATA.
ENTER OUTPUT FILE NAME <BU073091.C09> [A:SEPT89.LCA]
[ENTER]
(You could accept the default name, but here the
A: was used to indicate that the file would be written
to floppy disk, and a more meaningful file name was specified.)
Note that AVSS automatically generates a report that
logs the backup activity and assigns a default name of ARCHIV01,
ARCHIV02, etc. (of course you may override the default name if
you wish). You may check on the progress of the backup job by
running a SYSTEM STATUS suboption as described in Section 2.1.1
and looking for the Routine Name FSARCHV2 using Device 51. When
the job is no longer active then you may use the REPORT GENERATOR
to examine the backup log as follows:
REPORT GENERATOR OPTION > [O][ENTER]UTPUT
SAVED REPORT
ID. ID CODE# <4> [ENTER] MANAGER, SYSTEM
OUT. OUTPUT REPORT CODE > [A][ENTER]RCHIV01 = GENERAL
BACKUP LOG [9/30/90 12:09 PM]
ARCHIV01 =GENERAL BACKUP LOG [9/30/90 12:09 PM]
ARCHIV01 = [ENTER]
OUTPUT DEVICE <T> [ENTER]
GENERAL BACKUP LOG [9/30/90 12:09 PM]
*** 9/30/90 12:09 PM ***, XIND=34, FORM=LCA
USER: MANAGER,SYSTEM
GENERAL ARCHIVE DATA FOR: 34(LCA) , VOL=1
PC FILE NAME: A:SEPT89.LCA
SEARCH METHOD: DATE OF BIRTH
BEGINNING RANGE > 9/1/89
ENDING RANGE > 9/30/89
*** 9/30/90 12:10 PM ***, XIND=34, FORM=LCA
(N=674, TOTAL=674)
*** 9/30/90 12:27 PM ***
END ARCHIVE (SPACE=1210639, TOTAL=674, VOL=1)
We see that it took 17 minutes to backup 674 LCA records
or about 2 seconds per record. This time can vary considerably,
however, depending on the inherent speed of your AVSS computer.
We also find that the 674 records required 1,210,639 byte of diskette
storage (about 1,800 bytes per record), and thus just fit on a
single 5 1/4 inch high density diskette, which can store 1,213,952
bytes. Note that AVSS does not have the capability of spreading
a backup across multiple diskettes, so that to be safe, you should
specify a date range that corresponds to fewer than 600 LCA records
for 5 1/4 inch high density diskettes or fewer than 700 LCA records
for 3 1/2 inch high density diskettes. For example if your site
had 1,200 births per year, you could run the BACKUP RECORD DATA
suboption in two six-month increments onto two 5 1/4 inch high
density floppies. However, if there were 1,500 annual births,
you would run three four-month intervals.
2.4.2 Set Last Full Backup Date
As discussed above, the ability of AVSS to backup individual
records is complementary with a full system backup using other
general purpose backup software. To insure this complementarity,
AVSS needs to know the date of the last full system backup.
Thus, you should run the following procedure after each full system
backup:
SYSTEM MAINTENANCE OPTION > [SET][ENTER]
LAST FULL BACKUP DATE
LAST FULL BACKUP DATE > 9/1/90
ENTER THE DATE OF THE LAST FULL BACK-UP <9/1/90> [9 7 90][ENTER]
9/7/90
SYSTEM MAINTENANCE OPTION >
2.4.3 Differential Backup
One successful backup strategy is to intermix full system
backups with AVSS record-specific backups. For example,
you could perform a full system backup weekly and an AVSS
backup daily. The DIFFERENTIAL BACKUP suboption will backup all
AVSS records that have been added from the date of last
full backup (as set by the procedure described above) until today.
Note this applies to the date the records were entered, not
to the date of the event. By combining the full backup and
the differential backup, you can restore the entire database.
Running a differential backup daily is least disruptive, since
as opposed to a full backup, you do not have to shutdown AVSS,
and it can run as a background job, having little impact on users.
The procedure is as follows:
SYSTEM MAINTENANCE OPTION > [DIF][ENTER]FERENTIAL
BACKUP
INITIALIZING..
DATE RANGE FOR THIS DIFFERENTIAL BACKUP: 9/7/90 TO 9/10/90
RUN ARCHIVE IN THE BACKGROUND <Y> [ENTER]
SOC. SAVE OUTPUT CODE <ARCHIV01> [ENTER]
WHEN FINISHED, YOUR OUTPUT CAN BE VIEWED BY USING 'OUTPUT
SAVED REPORT'
UNDER THE REPORT GENERATOR OPTION.
PREPARE PC-DOS FILE AND HIT RETURN > [ENTER]
PLEASE BE SURE TO RUN 'VERIFY RECORD DATA' OPTION TO ENSURE
A RELIABLE
BACKUP PRIOR TO DELETING THIS DATA.
ENTER OUTPUT FILE NAME <BU091090.D57> [A:MONDAY1.DIF][ENTER]
(Note: You should always write the name of the file
on the diskette or tape.)
Again, you may retreive the log of activity using the REPORT
GENERATOR:
REPORT GENERATOR OPTION > [O][ENTER]UTPUT
SAVED REPORT
OUT. OUTPUT REPORT CODE > [A][ENTER]RCHIV01 = DIFFERENTIAL
BACKUP LOG [9/10/90 03:47 PM]
ARCHIV01 =DIFFERENTIAL BACKUP LOG [9/10/90 03:47 PM]
ARCHIV01 =[ENTER]
OUTPUT DEVICE <T>[ENTER]
DIFFERENTIAL BACKUP LOG [9/10/90 03:47 PM]
*** 9/10/90 03:47 PM ***, XIND=34, FORM=LCA
USER: MANAGER,SYSTEM
DIFFERENTIAL ARCHIVE DATA FOR: 34(LCA) , VOL=1
PC FILE NAME: A:MONDAY1.DIF
SEARCH METHOD: LAST UPDATE
BEGINNING RANGE > 9/7/90
ENDING RANGE > 9/10/90
*** 9/10/90 03:48 PM ***, XIND=34, FORM=LCA
(N=39, TOTAL=39)
*** 9/10/90 03:48 PM ***
END ARCHIVE (SPACE=70548, TOTAL=39, VOL=1)
2.4.4 Incremental Backup
The INCREMENTAL BACKUP suboption is very similar in function
to the DIFFERENTIAL BACKUP suboption, differing only in the date
range of records that is selected. Differential backups always
cover records that were entered during the time period from the
date of last full backup to today's date, and thus will span a
longer period as time progresses until the date of last full backup
is reset. The time range for incremental backups is based on the
date of the last incremental backup and covers that date
until today. If you perform incremental backups daily, they will
cover one day of data entry activity. Thus incremental backups
tend to remain about the same size, while differential backups
will grow larger until another full system backup is performed.
However, incremental backups require more careful management since
in order to restore a system due to an equipment malfunction,
it is necessary to combine the full system backup with many incremental
backups, and if any one is missing then an incomplete restoration
results. For this reason it is recommended that you perform differential
backups using a different diskette for each day of the week and
possibly have several different weeks of different diskettes.
An example of an incremental backup is:
SYSTEM MAINTENANCE OPTION > [INC][ENTER]REMENTAL
BACKUP
INITIALIZING..
DATE RANGE FOR THIS INCREMENTAL BACKUP: 9/10/90 TO 9/11/90
RUN ARCHIVE IN THE BACKGROUND <Y> [ENTER]
SOC. SAVE OUTPUT CODE <ARCHIV03> [ENTER]
WHEN FINISHED, YOUR OUTPUT CAN BE VIEWED BY USING 'OUTPUT
SAVED REPORT'
UNDER THE REPORT GENERATOR OPTION.
PREPARE PC-DOS FILE AND HIT RETURN >[ENTER]
PLEASE BE SURE TO RUN 'VERIFY RECORD DATA' OPTION TO ENSURE
A RELIABLE
BACKUP PRIOR TO DELETING THIS DATA.
ENTER OUTPUT FILE NAME <BU120389.H11> [A:IN091190.BAK][ENTER]
Use the same procedure described above to view the
results of the backup activity with the OUTPUT SAVED REPORT suboption
under the REPORT GENERATOR.
2.4.5 Verify Record Data
To insure that the data that was written to backup magnetic
media (either tape or diskette) agree exactly with what is contained
on permanent disk storage, you should run the VERIFY RECORD DATA
suboption. This is especially important before you purge records
from the system. To run this procedure, mount the tape or insert
the diskette to be verified while noting the name of the file,
then perform the following:
SYSTEM MAINTENANCE OPTION > [VER][ENTER]IFY
RECORD DATA
PREPARE PC-DOS FILE WRITE DISABLED AND ONLINE.
HIT RETURN WHEN READY OR '^Q' OR 'Q' TO QUIT >[ENTER]
ENTER INPUT FILE NAME > [A:SEPT90.LCA][ENTER]
REWINDING ...
ARCHIVE HEADER: GENERAL ARCHIVE DATA FOR: 34(LCA) ,VOL=1
CREATED ON: 9/30/90
CONTINUE (C) OR QUIT (Q) > [C][ENTER]
RUN VERIFY ARCHIVE IN THE BACKGROUND <N> [Y][ENTER]
SOC. SAVE OUTPUT CODE <VERIFY1> [ENTER]
You may examine the results of the verify process using
the REPORT GENERATOR:
REPORT GENERATOR OPTION> [O][ENTER]UTPUT
SAVED REPORT
ID. ID CODE# <4> [ENTER] MANAGER,SYSTEM
OUT. OUTPUT REPORT CODE > [V][ENTER]ERIFY01 = AVSS TAPE
ARCHIVE VERIFY
VERIFY01 =AVSS TAPE ARCHIVE VERIFY (9/30/90 10:27 AM)
VERIFY01 =[ENTER]
OUTPUT DEVICE <T>[ENTER]
AVSS TAPE ARCHIVE VERIFY (9/30/90 2:27 PM)
USER: MANAGER,SYSTEM
*** 9/30/90 2:27 PM ***, XIND=34, FORM=SM
BEGINNING VERIFICATION.
HEADER:GENERAL ARCHIVE DATA FOR: 34(LCA) ,VOL=1
CREATED:9/30/90 JOB:5 DEVICE:51
*** 9/30/90 2:27 PM ***, XIND=34, FORM=LCA
SUCCESSFUL VERIFICATION - NO ERRORS. JOB:5 DEVICE:51
NUMBER OF RECORDS VERIFIED: 674
2.4.6 Kill Record Data
Sooner or later your disk storage space will be exhausted
and it will be necessary to delete some records. However, before
doing this, you should run the AVSS DATA BASE INTEGRITY CHECKER
(Section 2.2.2), then backup and verify the target records according
to the procedures described in Sections 2.4.1 and 2.4.5. For AVSS-PC
implementations it is also a good idea to make DOS copies of the
backup diskettes and store them in a different physical location
to have redundant backups. For minicomputers this redundancy must
be provided by running a second tape using BACKUP RECORD DATA,
and then verifying it. After you are certain that you have a valid
backup and preferably a redundant copy as well, then you may proceed
with the KILL RECORD DATA as follows:
SYSTEM MAINTENANCE OPTION > [K][ENTER]ILL
RECORD DATA
PASSWORD > [SPECIAL PASSWORD][ENTER]
(lease contact the AVSS Project if you do not know
the special password.
INITIALIZING..
FORMS. SELECTION > [LCA][ENTER] = BIRTH CERTIFICATE
FORMS. SELECTION >[ENTER]
XINDS. SITE CODES > [34][ENTER]
XINDS. SITE CODES >[ENTER]
*** WARNING ***
THIS ROUTINE PERMANENTLY REMOVES RECORDS FROM THE DATABASE.
ARE YOU SURE <N> [Y] [ENTER]
DELETE RECORDS FROM DATE <1/1/89> [9 1 89] [ENTER]
TO DATE <T> [9 30 89][ENTER]
RUN THIS PROGRAM IN THE BACKGROUND <N> [Y][ENTER]
FINAL CONFIRMATION.
DELETE RECORDS FROM 9/1/89 TO 9/30/89
FOR THE FOLLOWING SITES/FORMS:
34 LCA,
OK <N> [Y][ENTER]
2.4.7 Restore Record Data
If you should need to reload the records that you have backed
up and deleted, then you can use the RESTORE RECORD DATA suboption
as follows:
SYSTEM MAINTENANCE OPTION > [RES][ENTER]TORE
RECORD DATA
LOAD BACKUP MEDIA. HIT RETURN WHEN READY, Q TO QUIT >[ENTER]
ENTER INPUT FILE NAME > [A:SEPT89.LCA][ENTER]
REWINDING...
GENERAL ARCHIVE DATA FOR: 34(LCA)
OK TO RESTORE <N> [Y][ENTER]
R)EPLACE OR S)KIP DUPLICATE RECORDS <S>[ENTER]
RUN RESTORE IN BACKGROUND <Y> [ENTER]
SOC. SAVE OUTPUT CODE <RESTOR01>[ENTER]
The results of the restore activity are stored in a
report that is automatically given the name RESTORE01, RESTORE01,
etc. As usual, you can review the results using the REPORT GENERATOR:
REPORT GENERATOR OPTION > [O][ENTER]UTPUT
SAVED REPORT
ID. ID CODE# <4> MANAGER,SYSTEM
OUT. OUTPUT REPORT CODE > [R][ENTER]ESTOR01 = ARCHIVE
RESTORE LOG (12/4/90 12:14 PM)
RESTOR01 =ARCHIVE RESTORE LOG (12/4/90 12:14 PM)
RESTOR01 =[ENTER]
OUTPUT DEVICE <T>[ENTER]
ARCHIVE RESTORE LOG (12/4/90 01:26 PM)
*** 12/4/90 01:26 PM ***, XIND=34
USER: MANAGER,SYSTEM
*** 12/4/90 12:26 PM ***, XIND=34, RESTORED=0
*** 12/4/90 12:43 PM ***, XIND=34, FORM=LCA, INDX=18934145600
RESTORE COMPLETE: RECORDS SKIPPED:0, RECORDS RESTORED:674
2.4.8 Selective Record Restore
There may be unusual circumstances where you may wish to select
individual records to be restored using the following procedure:
SYSTEM MAINTENANCE OPTION > [SEL][ENTER]ECTIVE
RECORD RESTORE
ENTER FILE NUMBERS TO BE RESTORED
> [18934013272][ENTER]
> [18934013286][ENTER]
> [18934013316][ENTER]
>[ENTER]
LOAD BACKUP MEDIA. HIT RETURN WHEN READY, Q TO QUIT >[ENTER]
ENTER INPUT FILE NAME > [A:SEPT89.LCA][ENTER]
GENERAL ARCHIVE DATA FOR: 34(LCA)
OK TO RESTORE <N> [Y][ENTER]
R)EPLACE OR S)KIP DUPLICATE RECORDS <S> [ENTER]
RUN RESTORE IN BACKGROUND <Y>[ENTER]
SOC. SAVE OUTPUT CODE <RESTOR02>[ENTER]
Againl, you should check the restore log using the
REPORT GENERATOR:
OUT. OUTPUT REPORT CODE > [R][ENTER]ESTOR02
= ARCHIVE RESTORE LOG (12/4/90 01:26 PM)
RESTOR02 =ARCHIVE RESTORE LOG (12/4/90 01:26 PM)
RESTOR02=[ENTER]
OUTPUT DEVICE <T>[ENTER]
ARCHIVE RESTORE LOG (12/4/90 01:26 PM)
*** 12/4/90 01:26 PM ***, XIND=34
USER: MANAGER,SYSTEM
*** 12/4/90 01:26 PM ***, XIND=34, RESTORED=0
*** 12/4/90 01:26 PM ***, XIND=34, FORM=LCA, INDX=18934018695
RESTORE COMPLETE: RECORDS SKIPPED:0, RECORDS RESTORED:3
2.5 MANAGING SECURITY
Another important aspect of system management is protecting
against unauthorized use. This is especially pertinent since much
of the data stored in AVSS is confidential and protected
by state law. Access to AVSS options and data is limited
by user identification and by communication device number. Only
those individuals with authorized passwords are permitted to logon
to the system, and their passwords tell the system not only who
they are by name and facility, but also the degree to which they
have access to AVSS options and suboptions. Similarly,
communication devices can be restricted in terms of access to
certain options and suboptions. For example, as System Manager,
you are authorized to access all AVSS functions, but you
may attempt to perform an activity by means of a modem line that
does not allow entry into the SYSTEM MAINTENANCE option. Alternatively,
a birth clerk might use a terminal connected directly to the AVSS
computer, which allows access to all options and suboptions, but
their password limits access to only the BIRTH CERTIFICATE option.
It is the responsibility of the System Manager to control access
by means of both password and device security.
2.5.1 Device Table
As discussed earlier, a "device" is a communications
port on your computer that can be used to support a terminal or
printer, either by direct cable or by means of telephone modems.
Although terminals and printers conform to the American Standard
Code for Information Interchange (ASCII) character codes, there
remains a considerable variation in the protocols that control
enhanced features. The DEVICE TABLE suboption allows you to customize
device ports to the specific characteristics of the terminals
or printer on your system. It also allows you to control access
to AVSS functions by device number. Using the DEVICE TABLE
is somewhat more complex than other suboptions and will therefore
be described in several phases. First, an overview:
SYSTEM MAINTENANCE OPTION > [DE][ENTER]VICE
TABLE
LINE NUMBER > [^L][ENTER]
1 : CONSOLE
4 : MODEM 894-4326
5 : WORKSTATION IN NH 2207
51 : PC-DOS FILE
LINE NUMBER > [4][ENTER] OLD LINE BEING EDITED.
LOCATION <MODEM 894-4326> [ENTER]
TERMINAL TYPE > [?][ENTER]
ENTER THE TERMINAL TYPE OR ^L FOR A LIST OF SUPPORTED TERMINALS.
TERMINAL TYPE >[ENTER]
LINE LENGTH <80>[ENTER]
PAGE SIZE <24>[ENTER]
SOFT OR HARDCOPY <S> [?][ENTER]
ENTER 'S' IF THIS TERMINAL IS A CRT, 'H' IF IT PRINTS ON PAPER
SOFT OR HARDCOPY <S>[ENTER]
PRINTER TYPE <> [?][ENTER]
ENTER THE PRINTER TYPE OR ^L FOR A LIST OF SUPPORTED PRINTERS.
PRINTER TYPE <>[ENTER]
MODEM =HAYES
Note: If the device is connected to a modem this should
almost always be "HAYES".
MODEM =[ENTER]
UPDATE DEVICE RESTRICTIONS? <N>[ENTER]
SETTING DEVICE TABLE ENTRY ...
LINE NUMBER >[ENTER]
SYSTEM MAINTENANCE OPTION >
In this overview, we have examined the settings for Device
4, but have not made any changes. Note that there was not a terminal
type or printer type specified, resulting in Device 4 as a generic
communications port that is unable to take advantage of any special
terminal or printer features such as reverse video or enhanced
printing. In most cases, however, you will want to tailor a device
to a specific brand/model of terminal and printer. Assume it is
a Wyse Model 60 terminal and an IBM Proprinter Model II that you
wish to use exclusively on Device 4. The proper procedure would
then be:
SYSTEM MAINTENANCE OPTION > [DE][ENTER]VICE
TABLE
LINE NUMBER > [4][ENTER] OLD LINE BEING EDITED.
LOCATION <MODEM 894-4326>[ENTER]
TERMINAL TYPE > [^L][ENTER]
C-4520
C-ADDS
C-ADM22
ETC.
C-TI820
C-VT100
C-VT132
C-VT220
ETC.
C-WY50
C-WY60
C-WY75
ETC.
TERMINAL TYPE > [C-WY60][ENTER]
PRINTER TYPE <> [^L][ENTER]
P-DESKJET
P-FX80
P-HPLJ2
P-HPLJ3
ETC.
P-PROPRNT
P-PROPRNT2
ETC.
PRINTER TYPE <> [P-PROPRNT2][ENTER]
MODEM =HAYES
MODEM =[ENTER]
UPDATE DEVICE RESTRICTIONS? <N>[ENTER]
SETTING DEVICE TABLE ENTRY ...
LINE NUMBER >[ENTER]
SYSTEM MAINTENANCE OPTION >
Just as you can customize a device to match certain models
of terminals and printers, you can also tailor it to the needs
of specific users. Assume, for example, that Device 4 will be
used only by a hospital to produce birth certificate forms. You
would wish to restrict the use of that port by the following procedure
using a [0] to indicate no access, an [*] to indicate
access to all suboptions, and a [1] to allow access to
some suboptions:
SYSTEM MAINTENANCE OPTION > [DE][ENTER]VICE
TABLE
LINE NUMBER > [4][ENTER] OLD LINE BEING EDITED.
LOCATION <MODEM 894-4326>[ENTER]
TERMINAL TYPE <C-WY60>[ENTER]
PRINTER TYPE <P-PROPRNT2>[ENTER]
MODEM =HAYES
MODEM =[ENTER]
UPDATE DEVICE RESTRICTIONS? <N> [Y][ENTER]
ENTER RESTRICTIONS FOR EACH OF THE FOLLOWING:
OLD BIRTH CERTIFICATE <0>[ENTER]
CONFIDENTIAL MORBIDITY REPORT <*>[0][ENTER]
CENSUS TRACTING UTILITIES <0>[ENTER]
DEATH CERTIFICATE <0>[ENTER]
DELIVERY RECORD <*>[0][ENTER]
FETAL DEATH CERTIFICATE <0>[ENTER]
OLD HOSPITAL BIRTH RECORD <0>[ENTER]
HOSPITAL BIRTH RECORD <0> [*][ENTER]
BIRTH CERTIFICATE <1>[0][ENTER]
MAILBOX <*> [ENTER]
OLD CONFIDENTIAL MORBIDITY REPORT <0>[ENTER]
YOUR PASSWORD <*> [ENTER]
REPORT GENERATOR <*> [1][ENTER]
QUERY DATABASE <0> [1][ENTER]
REPORT EDITOR <0>[ENTER]
GENERATE REPORT <0> [1][ENTER]
OUTPUT SAVED REPORT <0> [1][ENTER]
LIST SAVED REPORTS <0> [1][ENTER]
SYSTEM MAINTENANCE <0> [1][ENTER]
SYSTEM STATUS <0> [ENTER]
BROADCAST MESSAGE <0>[ENTER]
LIST OVERRIDE PROCESSING <0>[ENTER]
Use [0] for the remainder of the SYSTEM
MAINTENANCE suboptions until:
CLASSIFICATION FILE <0>
[ENTER]
ID FILE <0> [1][ENTER]
SECURITY REPORT <0>[ENTER]
PERIPHERAL FILE <0>[ENTER]
EXPAND AVSS DATABASE <0>[ENTER]
SETTING DEVICE TABLE ENTRY ...
LINE NUMBER >[ENTER]
SYSTEM MAINTENANCE OPTION >
In this example, we allowed Device 4 to access all suboptions
under the HOSPITAL BIRTH RECORD, MAILBOX, and YOUR PASSWORD. For
the REPORT GENERATOR we allowed access to all suboptions except
REPORT EDITOR, and for SYSTEM MAINTENANCE, we restricted access
to only the ID FILE suboption.
2.5.2 Classification File
The CLASSIFICATION FILE limits access to AVSS options
and suboptions for certain user classifications in the same manner
the the DEVICE TABLE limits access for specific devices. In addition
to the System Manager classification, which allows access to all
AVSS options and suboptions, there are nine standard classifications
that come automatically with every implementation. These classifications
should suffice in most instances, but there may be special circumstances
the require you to create a custom classification. The procedure
is as follows:
SYSTEM MAINTENANCE OPTION > [CL][ENTER]ASSIFICATION
FILE
CLASSIFICATION NUMBER > [?][ENTER]
ENTER THE CLASSIFICATION NUMBER TO BE ADDED OR EDITED,
OR '^L' FOR A CURRENT LIST OF CLASSES.
THIS SHOULD BE A THREE DIGIT NUMBER GREATER THAN 99.
CLASSIFICATION NUMBER > [^L][ENTER]
1 : SYSTEM MANAGER
100 : SITE SYSTEM MANAGER
200 : COUNTY SYSTEM MANAGER
300 : HOSPITAL SYSTEM MANAGER
400 : REMOTE HOSPITAL MANAGER
500 : COUNTY DATA ENTRY
600 : HOSPITAL DATA ENTRY
700 : REMOTE HOSPITAL DATA ENTRY
800 : ANALYST
900 : RESERVED FOR FUTURE USE
CLASSIFICATION NUMBER > [601][ENTER] NEW CLASSIFICATION
BEING ADDED
CLASSIFICATION NAME > [SPECIAL HOSPITAL USER][ENTER]
TIME OUT VALUE > [?][ENTER]
ENTER THE TIME OUT VALUE FOR ALL READS IN SECONDS.
TIME OUT VALUE > [300][ENTER]
The time out value, which is usually set to 300
seconds (5 minutes) , is the time AVSS will stay active at your
current prompting level. If there are several time out lapses,
AVSS will gradually "back out" and terminate the interactive
session.
ENTER RESTRICTIONS FOR EACH OF
THE FOLLOWING:
OLD BIRTH CERTIFICATE <0>
CONFIDENTIAL MORBIDITY REPORT <0>[ENTER]
CENSUS TRACTING UTILITIES <0>[ENTER]
(You may tailor the AVSS options and suboptions
to this new classification using [0], [1], or
[*] as described in Section 2.5.1 above.)
SYSTEM MAINTENANCE <0> [ENTER]
ENTERED INTO CLASSIFICATION FILE.
CLASSIFICATION NUMBER >[ENTER]
SYSTEM MAINTENANCE OPTION >
2.5.3 ID File
The System Manager controls user access to AVSS by
means of the ID FILE suboption. Individuals may be admitted, deactivated,
reactivated, or have identifying characteristics edited. It can
be used to list those persons having access using the following
procedure:
SYSTEM MAINTENANCE OPTION > [ID][ENTER]
FILE
ID FILE FUNCTION > [?][ENTER]
ENTER 'A' TO ADMIT A PERSON,
'E' TO EDIT A PERSON,
'D' TO DEACTIVATE A PERSON,
'R' TO REACTIVATE A PERSON,
'L' TO LIST ID FILE ENTRIES.
ID FILE FUNCTION > [L][ENTER]IST
ID# A/D LAST,FIRST,TITLE ACKNOWLEDGE CLASSIFICATION SITE
-----------------------------------------------------------------------
2 A CHAVEZ,PATRICIA,AA PATRICIA HOSPITAL DATA ENTRY CNTY-0|HOSP-0
3 A MARTIN,JOAN A,RN JOAN HOSP SYSTEM MANAGER CNTY-0|HOSP-0
5 A SMITH,ROBERT, BOB COUNTY DATA ENTRY CNTY-0|HOSP-*
1 D GOTTFRED,RONALD, RON COUNTY SYS MANAGER CNTY-0|HOSP-*
4 A MANAGER,SYSTEM CHIEF SYSTEM MANAGER
ID FILE FUNCTION > [ENTER]
SYSTEM MAINTENANCE OPTION >
The ID# is an arbitrary number assigned to each person
admitted to a particular AVSS implementation. Once admitted,
an individual cannot be removed since an audit trail must be preserved
of past user activity for future reports. However, if a person
changes employment status and is longer to be permitted access
to AVSS, they should be deactivated. The A/D column reports
on each user's active/deactive status. The name column is self-explanatory,
and the ACKNOWLEDGEMENT column lists the name or phrase that the
user desires AVSS to use for acknowledgement upon sign-on,
etc. Classification was discussed above, and the SITE column indicates
the site(s) within the AVSS database that the user is allowed
to access. An asterisk (*) indicates all sites at that level.
In the example above, both Patricia Chavez and Joan Martin can
access only Hospital 0 in County 0, whereas both Robert Smith
and Ronald Gottfred can access all hospitals but only within County
0. Users classified as SYSTEM MANAGER can by definition access
all sites.
As System Manager, you can edit user attributes in using the ID
FILE suboption. For example, suppose that Robert Smith has forgotten
his password. Since all passwords in AVSS are encrypted
and users are to protect the knowledge of their passwords from
all other persons, the only recourse is to assign a temporary
password to Mr. Smith so that he can sign-on again and run the
CHANGE PASSWORD suboption under the YOUR PASSWORD option. Assume,
also that Mr. Smith requests that you change his acknowledgement
name from "BOB" to "ROBERT" and you are authorized
to give him access to data from all counties stored on your AVSS
computer. To do this, you would apply the ID FILE suboption
as follows:
SYSTEM MAINTENANCE OPTION > [ID][ENTER]
FILE
ID FILE FUNCTION > [E][ENTER]DIT
NAME (LAST,FIRST) > [S,R][ENTER]
ID# A/D LAST,FIRST,TITLE ACKNOWLEDGE CLASSIFICATION SITE
-----------------------------------------------------------------------
5 A SMITH,ROBERT, BOB COUNTY DATA ENTRY CNTY-0|HOSP-*
IS THIS THE PERSON? <Y>[ENTER]
NAME (LAST,FIRST MIDDLE,TITLE) <SMITH,ROBERT>[ENTER]
CLASSIFICATION <500>[ENTER]
LOG-IN PASSWORD <722540> [NEWPASSWORD][ENTER]
ACKNOWLEDGEMENT NAME <BOB> [ROBERT][ENTER]
ALL COUNTYS <N> [Y][ENTER]
ALL HOSPITALS <N> [Y][ENTER]
DISPLAY HELP > [?][ENTER]
ENTER 1 TO ENABLE AUTOMATIC HELP DISPLAY FOR THIS USER.
DISPLAY HELP >[ENTER]
DISPLAY LISTS > [?][ENTER]
ENTER 1 TO ENABLE AUTOMATIC LIST DISPLAY FOR THIS USER.
DISPLAY LISTS >[ENTER]
LAST,FIRST MIDDLE,TITLE > SMITH,ROBERT,
CLASSIFICATION > 500
PASSWORD > NEWPASSWORD
ACKNOWLEDGEMENT NAME > ROBERT
INDEX > CNTY-*|HOSP-*|
DISPLAY HELP >
DISPLAY LISTS >
OK? (Y/N) > [Y][ENTER]
SETTING UP ID FILE ENTRY ...
ID FILE FUNCTION >
You may also add a new user to AVSS using the ID
FILE as follows:
ID FILE FUNCTION > [A][ENTER]DMIT
NAME (LAST,FIRST MIDDLE,TITLE) > [TYPICAL,USER A,MS][ENTER]
SEARCHING USER FILE USING 'TYP,US'
PERSON NOT FOUND
NAME (LAST,FIRST MIDDLE,TITLE) <TYPICAL,USER A,MS>[ENTER]
CLASSIFICATION > [500][ENTER]
LOG-IN PASSWORD > [TEMPORARYPASS][ENTER]
ACKNOWLEDGEMENT NAME > [USER][ENTER]
ALL COUNTYS <N>[ENTER]
CNTY. COUNTY > [0][ENTER] = TEST COUNTY
ALL HOSPITALS <N> [Y][ENTER]
DISPLAY HELP >[ENTER]
DISPLAY LISTS >[ENTER]
AVSS will continue in the same manner as above for
the Edit ID FILE function.
Next, assume you need to reactivate a user that has been re-hired
following the restoration of funding for a staff position. You
would execute the following procedure:
ID FILE FUNCTION > [R][ENTER]EACTIVATE
NAME (LAST,FIRST) > [G,R][ENTER]
ID# A/D LAST,FIRST,TITLE ACKNOWLEDGE CLASSIFICATION SITE
-----------------------------------------------------------------------
1 D GOTTFRED,RONALD RON COUNTY SYS MANAGER CNTY-0|HOSP-*
IS THIS THE PERSON? <Y>[ENTER]
***NOTE*** GOTTFRED,RONALD IS CURRENTLY DEACTIVATED.
GOTTFRED,RONALD OK TO REACTIVATE <N> [Y][ENTER] REACTIVATED.
ID FILE FUNCTION >
A similar procedure would be used whenever you need to
deactivate a user upon termination of employment or other reason
for discontinuing AVSS activities:
ID FILE FUNCTION > [D][ENTER]EACTIVATE
NAME (LAST,FIRST) > [G,R][ENTER]
ID# A/D LAST,FIRST,TITLE ACKNOWLEDGE CLASSIFICATION SITE
-----------------------------------------------------------------------
1 A GOTTFRED,RONALD RON COUNTY SYS MANAGER CNTY-0|HOSP-*
IS THIS THE PERSON? <Y>[ENTER]
GOTTFRED,RONALD OK TO DEACTIVATE <N> [Y][ENTER]
DEACTIVATED.
ID FILE FUNCTION >
2.5.4 Security Report
When signing on to AVSS, users are given three attempts
to successfully enter their passwords. If they fail three consecutive
times, then AVSS pauses and files a security report. As
System Manager you should review the contents of the SECURITY
REPORT suboption at least weekly for evidence of attempts
at unauthorized access:
SYSTEM MAINTENANCE OPTION > [SEC][ENTER]URITY
REPORT
PASSWORD >[SPECIAL PASSWORD][ENTER]
Please contact the AVSS Project if you do not know
the special password.
DELETE ENTRIES OLDER THAN 30 DAYS
<N>[ENTER]
OUTPUT DEVICE <T>[ENTER]
SECURITY REPORT OF FAILED PASSWORD ATTEMPTS
LINE DATE TIME ATTEMPTS
--------------------------------------------------
4 12/2/90 08:05.44 AM AVSS,USER,HACKER DELETE <N>[ENTER]
4 12/5/90 06:26.29 PM NEWPASSWORD,TEST,SYSTEM DELETE <N>[ENTER]
SYSTEM MAINTENANCE OPTION >
2.6 SPECIAL SUBOPTIONS
Special suboptions may appear on some AVSS implementations.
Two are described here.
2.6.1 Peripheral File
This suboption is used to identify the parameters of special
features of terminals and printers for use in the DEVICE TABLE
suboption. The values of these parameters are set by the equipment
manufacturer and are programmed into AVSS by means of the
PERIPHERAL FILE suboption. Since these values remained fixed,
there is very rarely, if ever, a need for this suboption to be
accessed by System Managers.
2.6.2 Expand Database
This section applies only to AVSS-PC sites. For these
implementations all AVSS-MUMPS routines and data reside
in a single DOS file usually stored in the \AVSS directory and
usually named AVSSCXX.MSM, where XX is the standard county code
(01=Alameda, 02=Alpine, 03=Amador, ..., 58=Yuba). This file is
initialized upon installation to store several months or up to
one year of data. It is purposely left of modest size since the
larger it is, the longer it takes to perform a full system backup
(and more backup media is required as well). As your database
grows, the capacity to store information in this file will be
reduced, and you should regularly monitor its reserve capacity
using the HOW MUCH DISK SPACE REMAINS suboption described in Section
2.1.8. When the space remaining falls below 500 blocks, you should
either backup, verify, and delete records as described in Sections
2.4.1, 2.4.5, and 2.4.6, or you should expand the DOS file database.
If you elect to do the latter, you should first run the OPERATING
SYSTEM INTEGRITY CHECKER described in Section 2.2.1, and (if there
are no errors) perform a full system backup, have all users sign-off
and power off all modems and terminals attached to the AVSS
computer, kill the time job (FSPCTIM) using the procedure described
in Section 2.1.3, then follow the following procedure:
SYSTEM MAINTENANCE OPTION > [E][ENTER]XPAND
AVSS DATABASE
PASSWORD >[SPECIAL PASSWORD][ENTER]
Please contact the AVSS Project if you do not know
the special password.
WARNING!!! USE THIS OPTION CAREFULLY!!!
BE SURE TO KILL THE TIME JOB (FSPCTIM) BEFORE PROCEEDING.
OK TO PROCEED? <N> [Y][ENTER]
Select volume number to be expanded: [0][ENTER]
How many 1K blocks do you wish to expand by: [100][ENTER]
Database will be expanded by 100 1K blocks
OK to proceed <N>? [Y][ENTER]
Current space in volume group:
Volume Group: AVS Index: 0
Vol Maps Tot Blks Free Spc %-Free Host File Name
--- ---- -------- -------- ------ --------------
0 32 16048 314 1.96 c:\avss\avssc00.msm
Expanding Database:
16147
Database expansion completed
Expanded space in volume group:
Volume Group: AVS Index: 0
Vol Maps Tot Blks Free Spc %-Free Host File Name
--- ---- -------- -------- ------ --------------
0 32 16148 414 2.56 c:\avss\avssc00.msm
SYSTEM MAINTENANCE OPTION >
Updated September 17, 1996 by RL Williams
Return To AVSS Home Page