Microsoft’s Concerns about Pioneer Proposal 21-Feb-2008.

Slides:



Advertisements
Similar presentations
Computer-System Structures Er.Harsimran Singh
Advertisements

System Integration and Performance
COEN 252 Computer Forensics Hard Drive Geometry. Drive Geometry Basic Definitions: Track Sector Floppy.
Lecture # 7. Topics Storage Techniques of Bits Storage Techniques of Bits Mass Storage Mass Storage Disk System Performance Disk System Performance File.
Lectures on File Management
Performance of Cache Memory
Module R2 CS450. Next Week R1 is due next Friday ▫Bring manuals in a binder - make sure to have a cover page with group number, module, and date. You.
Composition CMSC 202. Code Reuse Effective software development relies on reusing existing code. Code reuse must be more than just copying code and changing.
The ATA/IDE Interface Can we write a character-mode device driver for the hard disk?
Token Ring/IEEE Risanuri Hidayat.
ZPODD Drive Issues Microsoft Corp. and Intel Corp.
Full-Datapath Secure Deletion Sarah Diesburg 1. Overview Problem  Current secure deletion methods do not work State of the art  Optimistic system-wide.
D99130r0 15/6/2015 A/V Introduction/Goals n Goals l Improved capability to continuously stream data l Additional error reporting for A/V applications l.
“Redundant Array of Inexpensive Disks”. CONTENTS Storage devices. Optical drives. Floppy disk. Hard disk. Components of Hard disks. RAID technology. Levels.
WLTP drive trace normalization
REDUNDANT ARRAY OF INEXPENSIVE DISCS RAID. What is RAID ? RAID is an acronym for Redundant Array of Independent Drives (or Disks), also known as Redundant.
May 12, 2015IEEE Network Management Symposium Page-1 Requirements for Configuration Management of IP-based Networks Luis A. Sanchez Chief Technology Officer,
IEC Substation Configuration Language and Its Impact on the Engineering of Distribution Substation Systems Notes Dr. Alexander Apostolov.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Data Storage Technology
7/15/2015B.RamamurthyPage 1 File System B. Ramamurthy.
Computer Architecture Part III-C: Memory Access and Management.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
15-Oct-2007 External Path Protection Discussion By Curtis E. Stevens.
1 Chapter Overview CD-ROM and DVD Drives Advanced Hard Disk Drives SCSI Drives.
Chapter Seven Process Modeling, Process Improvement, and ERP Implementation.
Lecture 21 Last lecture Today’s lecture Cache Memory Virtual memory
What is Sure BDCs? BDC stands for Batch Data Communication and is also known as Batch Input. It is a technique for mass input of data into SAP by simulating.
PCI Team 3: Adam Meyer, Christopher Koch,
Microprocessor-based systems Curse 7 Memory hierarchies.
End-to-end Data Protection and Tapes (07-373r4)
8.4 paging Paging is a memory-management scheme that permits the physical address space of a process to be non-contiguous. The basic method for implementation.
Full-Datapath Secure Data Deletion Sarah Diesburg 5/4/
Exploring an Open Source Automation Framework Implementation.
SCSI Commands Overview
The Functions of Operating Systems Interrupts. Learning Objectives Explain how interrupts are used to obtain processor time. Explain how processing of.
Chapter 7 File I/O 1. File, Record & Field 2 The file is just a chunk of disk space set aside for data and given a name. The computer has no idea what.
CCSDS Security WG meeting October 2008, hosted by DLR at DIN premises (Berlin) 1 Data Link Security BOF An ESA contribution on Lessons Learned and Issues/Questions.
2004/10/28 1 Basic concept of Dual layer DVD-R. 2004/10/28 2 Concept of DVD-R Recorded signal characteristics is almost same as DVD- ROM media –Reflectivity,
COEN 252 Computer Forensics Hard Drive Geometry. Drive Geometry Basic Definitions: Track Sector Floppy.
File Structures. 2 Chapter - Objectives Disk Storage Devices Files of Records Operations on Files Unordered Files Ordered Files Hashed Files Dynamic and.
DBT544. DB2/400 Advanced Features Level Check Considerations Database Constraints File Overrides Object and Record Locks Trigger Programs.
The concept of RAID in Databases By Junaid Ali Siddiqui.
L/O/G/O Input Output Chapter 4 CS.216 Computer Architecture and Organization.
Submission doc.: IEEE 11-12/0553r4 May 2012 Jarkko Kneckt, NokiaSlide 1 Response Criteria of Probe Request Date: Authors:
80386DX functional Block Diagram PIN Description Register set Flags Physical address space Data types.
IBM TSpaces Lab 2 Customizing tuples and fields. Summary Blocking commands Tuple Expiration Extending Tuples (The SubclassableTuple) Reading/writing user.
February 17, 1999 Matsushita Electric Industrial Co., Ltd. Requirement for “Real-Time AV Data Recording” Table of Contents 1. Activity Report for Real-Time.
Network Models.
IATA Kulveer Singh
Mt Fuji Meeting June 5th/6th, 2007 SecurDisc. Nero action items SecurDisc 1.DUID redundancy 2.Drive and host Revocation 1. Revocation mechanism 1. Authentication.
Memory Management OS Fazal Rehman Shamil. swapping Swapping concept comes in terms of process scheduling. Swapping is basically implemented by Medium.
Copyright © Genetic Computer School 2008 Computer Systems Architecture SA 8- 0 Lesson 8 Secondary Management.
AFS/OSD Project R.Belloni, L.Giammarino, A.Maslennikov, G.Palumbo, H.Reuter, R.Toebbicke.
Sequential Processing to Update a File Please use speaker notes for additional information!
1 Device Controller I/O units typically consist of A mechanical component: the device itself An electronic component: the device controller or adapter.
The World Leader in High Performance Signal Processing Solutions SD/SDIO Introduction Cliff Cai.
Nero Copyright Nero Multi-layer Proposal 2 nd September 2005 David Burg.
Review ATA - IDE Project name : ATA – IDE Training Engineer : Minh Nguyen.
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
Tutorial 5: Working with Excel Tables, PivotTables, and PivotCharts
CACHE MEMORY.
Data and Computer Communications by William Stallings Eighth Edition
Computer Organization
AT91 Memory Interface This training module describes the External Bus Interface (EBI), which generatesthe signals that control the access to the external.
MARIE: An Introduction to a Simple Computer
CCNA 1 Chapter 5 Ethernet Fundamentals
Net 323 D: Networks Protocols
Update : about 8~16% are writes
Presentation transcript:

Microsoft’s Concerns about Pioneer Proposal 21-Feb-2008

Continuation of the Existing Problem “This proposal modifies the current Real Time Streaming model to add a capability that host suggests a streaming throughput to the drive.”

Exact Bit Debate Continues “When Exact bit and HIE bit are set to 1 if logical unit cannot perform the requested parameter, logical unit shall terminate shall generate CHECK CONDITION status, 5/26/00 INVALID FIELD IN PARAMETER LIST, and the Sense Key Specific bytes shall identify the Size or Time parameter that is not valid. When Exact bit is set to 0 and HIE bit is set to 1 logical unit should set its internal configuration to higher than or equal to the specified throughput as near as possible. No errors shall occur.

Host Knowledge of Physical Layout Required “Start LBA specifies the radius position that the specified throughput is set to the position and outer radius. In the case of multi layer disc, the Start LBA shall specify the radius position on the first layer that includes the LBA. The specified throughput is set to the outer radius of the all layers in the selected format layer on the medium.”

May Ignore “End LBA specifies the end address that the specified throughput is set. The End LBA may be set to the end logical block address of the mounted media. Notes: logical unit may ignore this field.”

Requirements on the Host Action “The Write Time shall not be set to 0 (e.g. 1000).”

“Should”s and “May”s “HIE bit of 1 indicates that Reading/Writing throughput is specified for higher than or equal to address rage specified by the Start LBA. When HIE bit is set to 1 Reading/Writing throughput should be set to the same value. RDD bit and MRW bit shall be set to 0. WRC field may be ignored to satisfy the specified throughput on the mounted medium” “The Read/Write throughput should be same. Note: When Read only medium is mounted, logical unit may ignore the Write Size and Write Time fields. When recordable medium is mounted, logical unit may ignore the Read Size and Read Time fields.”

Vendor Specific and More “Should”s “After the retry operation, logical unit should resume the specified throughput. The timing to resume the throughput is vender specific and may be different when different type of medium is mounted. Note: Inappropriate retry operation at medium defect may cause trouble of the pickup head and/or the medium. Therefore logical unit may adjust its performance according to the vender specific criterion. When the highest Writing speed of the drive for the mounted media is slower than the specified throughput and when data writing is occurred, logical unit shall adjust its internal configuration as near as possible to the specified throughput (it should be the highest writing speed).”

Advantages of Toshiba/Nero/Microsoft Proposal Reporting of the new capability support (feature change proposal) Data structures consistent with needed solutions for the 3 other topics of Fuji’s break of our original proposal Distinguish current device throughput from host’s persistent minimum through requirement, including definition of the life time of this persistent (i.e. media mount time, within a power cycle). Read requirements when specified are non-ignorable. This is critical for playback Our proposal is based on Throughput (kb/s) instead of size+time, avoiding confusion and been closer to the measure that really matters to the application performance the multimedia content decoding above. Exact integration into the specification wording, what is changed what is not, also to clarify interaction with existing command specification.

Summary Yesterday chairman and other committee members have stated proposals are basically the same We believe the Toshiba/Nero/MS proposal has been more extensively reviewed by committee – thus will require less work and time to complete We wish to respect Toshiba’s request for a prompt resolution We believe Toshiba/Nero/MS proposal lays the ground work for items #3, #1 and #4 which the committee has already agreed to consider