We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byCristal Ackerman
Modified over 2 years ago
© 2011 IBM Corporation1 Tape Logical Block Protection (aka Tape Checksum ) Kevin D. Butt SCSI Architect, Data Protection & Retention, IBM T10/SSC Working Group Secretary MS 6TYA, 9000 S. Rita Rd., Tucson, AZ 85744 Tel: 520-799-5280 Fax: 520-799-2723 (T/L:321) Email address: firstname.lastname@example.org
© 2011 IBM Corporation2 Traditional methods used to try to get data protection Drive adds protection information to each logical block –vendor-specific format –Add CRC –Add ECC & other data validation/reconstruction methods –after received at drive during process of storing on media (next slide shows an animated example) Drive reads after write and validates CRC Some applications add unique protection information as part of the data –Allows verification that nothing changed, but only when data is read –Does not provide detection on write –Does not allow for checking at various points during the transfer –No method for the drive to validate the blocks without transferring them to the application. –Sometimes saves to a database of meta-data
© 2011 IBM Corporation3 Application Data Media CRC Engine Application Data Buffer Traditional Protection of Tape Data Application Data Buffer Logical Block Application Back End Device Driver HBA Tape Drive Write SCSI (Fibre Channel/SAS/pSCSI/etc.) Formatter Logical BlockCRCLogical BlockCRC Application Data Buffer Logical Block Read Formatter Media Logical BlockCRCLogical BlockCRC This is an animated slide Application Data Application Front End Application Transport (Ethernet/FICON/ESCON/etc.) Logical Block CRC added in drive CRC removed in drive
© 2011 IBM Corporation4 Tape Logical Block Protection Added to standards (SSC-4) in January 2010 Write path is independent from Read path –Can read w/o CRC and can write with CRC –Can write w/o CRC and can read with CRC –Can write w/o CRC and can read w/o CRC –Can write with CRC and can read with CRC CRC is generated/checked at each end –Tape drive –Application CRC may be checked at any point along the path –HBA –Any system/software that is in the middle
© 2011 IBM Corporation5 Tape Logical Block Protection (cont) On WRITE (example in top half of following animated slide) –CRC is appended to each logical block at the source –CRC is checked at any point desired in the transfer –If corruption occurs, the exact location of problem is known –The logical block with CRC is validated before being committed to media –Data is known on to be on tape in uncorrupted form prior to releasing the source data –CRC is stored with each logical block On READ (example in bottom half of following animated slide) –logical block with the CRC is read and validated –CRC transferred with each logical block –CRC is check at any point desired in the transfer –The CRC is validated and stripped at the destination
© 2011 IBM Corporation6 Application Data Application Data Buffer Media Application Data Buffer Logical block CRC Protected logical block Logical block CRC Protected logical block CRC Engine Tape Logical Block Protection using SSC-4 method Application Back End Device Driver HBA Tape Drive Write SCSI (Fibre Channel/SAS/pSCSI/etc.) Formatter This is an animated slide Application Front End Application Transport (Ethernet/FICON/ESCON/etc.) CRC checked in drive CRC generated & added in application CRC may be checked in HBA CRC may be checked in application back-end CRC Application Data Application Data Buffer Media Application Data Buffer Logical block CRC Protected logical block Logical block CRC Protected logical block CRC Engine Formatter CRC checked in drive Read CRC CRC validated & removed in application CRC may be checked in HBA CRC may be checked in application back-end CRC
© 2011 IBM Corporation7 Logical Block Protection – VERIFY features Uses the VERIFY command defined in SSC-4 Adds new options to: –Check that protection information (i.e., CRC) is the same as currently configured –Used in conjunction with other new options –Check that protection information (i.e., CRC) validates on each logical block from current position for n number of files (i.e., FMKS) –No blocks are transferred over the SCSI interface –Happens at native data rate –Check that protection information (i.e., CRC) validates on each logical block from current position to EOD –No blocks are transferred over the SCSI interface –Happens at native data rate
© 2011 IBM Corporation8 Logical Block Protection – VERIFY to EOD example
End-to-end Data Protection and Tapes (07-373r4)
Characteristics of Communication Systems
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
Data Link Layer and Ethernet COM211 Communications and Networks CDA College Theodoros Christophides
STORAGE ARCHITECTURE/ MASTER): Disk Storage: What Are Your Options? Randy Kerns Senior Partner The Evaluator Group.
Copyright © 2014 EMC Corporation. All Rights Reserved. Linux Host Installation and Integration for Block Upon completion of this module, you should be.
Lectures on File Management
Module 10 Configuring and Managing Storage Technologies.
Storage Testing in DTM Eric St.John Software Design Engineer in Test Storageマイクロソフトディベロップメント株式会社部署名名前.
Specview 32 Release 2.5 Enhancements
SCSI Commands Overview
11 NETWORK CONNECTION HARDWARE Chapter 3. Chapter 3: NETWORK CONNECTION HARDWARE2 NETWORK INTERFACE ADAPTER Provides the link between a computer and.
1 Layer 2: Concepts Honolulu Community College Cisco Academy Training Center Semester 1 Version
Chapter 16 Protocols and Layering. Network Communication Protocol an agreement that specifies the format and meaning of messages computers exchange Network.
Errors!. Where do errors occur? Anywhere data is transferred, processed, stored, etc. Input user error Storage magnetic hard drive errors physical tampering.
Copyright © 2014 EMC Corporation. All Rights Reserved. Windows Host Installation and Integration for Block Upon completion of this module, you should be.
Basic LAN techniques IN common with all other computer based systems networks require both HARDWARE and SOFTWARE to function. Networks are often explained.
Communicating over the Network
Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 6: Accessing.
Hugo HEPiX Fall 2005 Testing High Performance Tape Drives HEPiX FALL 2005 Data Services Section.
COEN 252 Computer Forensics Hard Drive Geometry. Drive Geometry Basic Definitions: Track Sector Floppy.
1 Recap (RAID and Storage Architectures). 2 RAID To increase the availability and the performance (bandwidth) of a storage system, instead of a single.
Amdahl’s Law & I/O Control Method 1. Amdahl’s Law The overall performance of a system is a result of the interaction of all of its components. System.
OPERATING SYSTEM REVIEW. System Software The programs that control and maintain the operation of the computer and its devices The two parts of system.
Copyright © Genetic Computer School 2008 Computer Systems Architecture SA 8- 0 Lesson 8 Secondary Management.
File Management Chapter 12. File Management File management system is considered part of the operating system Input to applications is by means of a file.
How to Use Microsoft PowerPoint What is PowerPoint? Presentation software that allows you to create slides, handouts, notes, and outlines. Slide.
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
Cisco CCNA Cisco Certified Network Associate.
Modifying the SCSI / Fibre Channel Block Size Presented by Keith Bonneau, John Chrzanowski and Craig O’Brien Advised by Robert Kinicki and Mark Claypool.
File Management Chapter 12. File Management A file is a named entity used to save results from a program or provide data to a program. Access control.
Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements.
Licitware a forensic software tool designed to investigate computer crimes.
1 Module 10 Managing Partitions. 2 Overview Partitioning a Disk Using Disk Administrator General Maintenance and Troubleshooting.
Advances in Bit Preservation (since DPHEP’2015) 3/2/2016 DPHEP / WLCG Workshop1 Germán Cancio IT Storage Group CERN DPHEP / WLCG Workshop Lisbon, 3/2/2016.
Chapter 2 Chapter 2: Planning for Server Hardware.
Internetworking Fundamentals (Lecture #4) Andres Rengifo Copyright 2008.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
Data Link Layer B. Konkoth. PDU Protocol Data Unit A unit of data which is specified in a protocol of a given layer Layer 5, 6, 7 – Data Layer.
1 Objectives Discuss the Windows Printer Model and how it is implemented in Windows Server 2008 Install the Print Services components of Windows Server.
Product Overview. What is EDT? Thin-Provisioning for Tape (TPT) software for TSM designed to: – Make resource configuration and allocation quicker – Decrease.
Agenda Overview Configuring the database for basic Backup and Recovery Backing up your database Restore and Recovery Operations Managing your.
15-Oct-2007 External Path Protection Discussion By Curtis E. Stevens.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
1 CSIS 7102 Spring 2004 Lecture 8: Recovery (overview) Dr. King-Ip Lin.
Enhanced Storage Architecture
Working with Disks and Devices
January 13, Csci 2111: Data and File Structures Week1, Lecture 2 Basic File Processing Operations.
Format Scandisk Defragmentation Antivirus Compression Software
© 2017 SlidePlayer.com Inc. All rights reserved.