© 2011 IBM Corporation1 Tape Logical Block Protection (aka Tape Checksum ) Kevin D. Butt SCSI Architect, Data Protection & Retention, IBM T10/SSC Working.

Slides:



Advertisements
Similar presentations
COEN 252 Computer Forensics Hard Drive Geometry. Drive Geometry Basic Definitions: Track Sector Floppy.
Advertisements

Product Overview. What is EDT? Thin-Provisioning for Tape (TPT) software for TSM designed to: – Make resource configuration and allocation quicker – Decrease.
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Lectures on File Management
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
Copyright © 2014 EMC Corporation. All Rights Reserved. Linux Host Installation and Integration for Block Upon completion of this module, you should be.
1 Module 10 Managing Partitions. 2  Overview Partitioning a Disk Using Disk Administrator General Maintenance and Troubleshooting.
1 CSIS 7102 Spring 2004 Lecture 8: Recovery (overview) Dr. King-Ip Lin.
Orion Telecom Networks Inc Slide 1 16 E1 + Gigabit Ethernet (Wire-Speed) Optical Multiplexer Updated: Jan, 2011Orion Telecom Networks Inc
January 13, Csci 2111: Data and File Structures Week1, Lecture 2 Basic File Processing Operations.
File Management Chapter 12. File Management A file is a named entity used to save results from a program or provide data to a program. Access control.
1 Recap (RAID and Storage Architectures). 2 RAID To increase the availability and the performance (bandwidth) of a storage system, instead of a single.
Internetworking Fundamentals (Lecture #4) Andres Rengifo Copyright 2008.
Modifying the SCSI / Fibre Channel Block Size Presented by Keith Bonneau, John Chrzanowski and Craig O’Brien Advised by Robert Kinicki and Mark Claypool.
Communicating over the Network
OSI Model.
Lab 03 Windows Operating Systems (Cont.). PYP002 Preparatory Computer ScienceWindows Operating System2 Objectives Develop a good understanding of 1. The.
Hugo HEPiX Fall 2005 Testing High Performance Tape Drives HEPiX FALL 2005 Data Services Section.
How to Use Microsoft PowerPoint What is PowerPoint? Presentation software that allows you to create slides, handouts, notes, and outlines. Slide.
Format Scandisk Defragmentation Antivirus Compression Software
15-Oct-2007 External Path Protection Discussion By Curtis E. Stevens.
Agenda  Overview  Configuring the database for basic Backup and Recovery  Backing up your database  Restore and Recovery Operations  Managing your.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Module 10 Configuring and Managing Storage Technologies.
Chapter 2 Chapter 2: Planning for Server Hardware.
File Management Chapter 12. File Management File management system is considered part of the operating system Input to applications is by means of a file.
Storage Testing in DTM Eric St.John Software Design Engineer in Test Storageマイクロソフトディベロップメント株式会社部署名名前.
Licitware a forensic software tool designed to investigate computer crimes.
Characteristics of Communication Systems
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Basic LAN techniques IN common with all other computer based systems networks require both HARDWARE and SOFTWARE to function. Networks are often explained.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
1 Layer 2: Concepts Honolulu Community College Cisco Academy Training Center Semester 1 Version
Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements.
End-to-end Data Protection and Tapes (07-373r4)
Specview 32 Release 2.5 Enhancements
6 th Annual Focus Users’ Conference 6 th Annual Focus Users’ Conference Communication Tools Presented by: Lauren Velazquez Presented by: Lauren Velazquez.
Duty Log and Chat Setup SSG Frese, Jerome S. Sensor Manager Cell 12 MDD.
SCSI Commands Overview
11 NETWORK CONNECTION HARDWARE Chapter 3. Chapter 3: NETWORK CONNECTION HARDWARE2 NETWORK INTERFACE ADAPTER  Provides the link between a computer and.
Copyright © 2014 EMC Corporation. All Rights Reserved. Windows Host Installation and Integration for Block Upon completion of this module, you should be.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
3 Data. Software And Data Data Data element – a single, meaningful unit of data. Name Social Security Number Data structure – a set of related data elements.
SCSI RAID 101 Thomas Weeks SCSI Hardware Basics Most RAID uses SCSI for its hardware drive/interface "fabric". You must make sure that your.
Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 6: Accessing.
Errors!. Where do errors occur? Anywhere data is transferred, processed, stored, etc. Input user error Storage magnetic hard drive errors physical tampering.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
Data Link Layer and Ethernet COM211 Communications and Networks CDA College Theodoros Christophides
Chapter 16 Protocols and Layering. Network Communication Protocol an agreement that specifies the format and meaning of messages computers exchange Network.
STORAGE ARCHITECTURE/ MASTER): Disk Storage: What Are Your Options? Randy Kerns Senior Partner The Evaluator Group.
Copyright © Genetic Computer School 2008 Computer Systems Architecture SA 8- 0 Lesson 8 Secondary Management.
Advances in Bit Preservation (since DPHEP’2015) 3/2/2016 DPHEP / WLCG Workshop1 Germán Cancio IT Storage Group CERN DPHEP / WLCG Workshop Lisbon, 3/2/2016.
Amdahl’s Law & I/O Control Method 1. Amdahl’s Law The overall performance of a system is a result of the interaction of all of its components. System.
OPERATING SYSTEM REVIEW. System Software The programs that control and maintain the operation of the computer and its devices The two parts of system.
C Copyright © 2006, Oracle. All rights reserved. Oracle Secure Backup Additional Installation Topics.
© 2009 IBM Corporation IBM Configurator for e-business (e-config) Training Module 3 – Entry Server (Power 720) with STG Software Products Bill Luken –
Operating System Review
Tape Drive Testing.
Local Area Networks: Topologies
Direct Attached Storage and Introduction to SCSI
What is Fibre Channel? What is Fibre Channel? Introduction
Networking Standards and the OSI Model
Lec 5 Layers Computer Networks Al-Mustansiryah University
Windows Operating Systems (Cont.)
Direct Attached Storage and Introduction to SCSI
Operating System Review
Business Data Communications
Operating System Review
Chapter 2: Planning for Server Hardware
ประกาศกระทรวงอุตสาหกรรม ฉบับที่ 5292 (พ.ศ. 2562)
Presentation transcript:

© 2011 IBM Corporation1 Tape Logical Block Protection (aka Tape Checksum ) Kevin D. Butt SCSI Architect, Data Protection & Retention, IBM T10/SSC Working Group Secretary MS 6TYA, 9000 S. Rita Rd., Tucson, AZ Tel: Fax: (T/L:321) address:

© 2011 IBM Corporation2 Traditional methods used to try to get data protection  Drive adds protection information to each logical block –vendor-specific format –Add CRC –Add ECC & other data validation/reconstruction methods –after received at drive during process of storing on media (next slide shows an animated example)  Drive reads after write and validates CRC  Some applications add unique protection information as part of the data –Allows verification that nothing changed, but only when data is read –Does not provide detection on write –Does not allow for checking at various points during the transfer –No method for the drive to validate the blocks without transferring them to the application. –Sometimes saves to a database of meta-data

© 2011 IBM Corporation3 Application Data Media CRC Engine Application Data Buffer Traditional Protection of Tape Data Application Data Buffer Logical Block Application Back End Device Driver HBA Tape Drive Write SCSI (Fibre Channel/SAS/pSCSI/etc.) Formatter Logical BlockCRCLogical BlockCRC Application Data Buffer Logical Block Read Formatter Media Logical BlockCRCLogical BlockCRC This is an animated slide Application Data Application Front End Application Transport (Ethernet/FICON/ESCON/etc.) Logical Block CRC added in drive CRC removed in drive

© 2011 IBM Corporation4 Tape Logical Block Protection  Added to standards (SSC-4) in January 2010  Write path is independent from Read path –Can read w/o CRC and can write with CRC –Can write w/o CRC and can read with CRC –Can write w/o CRC and can read w/o CRC –Can write with CRC and can read with CRC  CRC is generated/checked at each end –Tape drive –Application  CRC may be checked at any point along the path –HBA –Any system/software that is in the middle

© 2011 IBM Corporation5 Tape Logical Block Protection (cont)  On WRITE (example in top half of following animated slide) –CRC is appended to each logical block at the source –CRC is checked at any point desired in the transfer –If corruption occurs, the exact location of problem is known –The logical block with CRC is validated before being committed to media –Data is known on to be on tape in uncorrupted form prior to releasing the source data –CRC is stored with each logical block  On READ (example in bottom half of following animated slide) –logical block with the CRC is read and validated –CRC transferred with each logical block –CRC is check at any point desired in the transfer –The CRC is validated and stripped at the destination

© 2011 IBM Corporation6 Application Data Application Data Buffer Media Application Data Buffer Logical block CRC Protected logical block Logical block CRC Protected logical block CRC Engine Tape Logical Block Protection using SSC-4 method Application Back End Device Driver HBA Tape Drive Write SCSI (Fibre Channel/SAS/pSCSI/etc.) Formatter This is an animated slide Application Front End Application Transport (Ethernet/FICON/ESCON/etc.) CRC checked in drive CRC generated & added in application CRC may be checked in HBA CRC may be checked in application back-end CRC Application Data Application Data Buffer Media Application Data Buffer Logical block CRC Protected logical block Logical block CRC Protected logical block CRC Engine Formatter CRC checked in drive Read CRC CRC validated & removed in application CRC may be checked in HBA CRC may be checked in application back-end CRC

© 2011 IBM Corporation7 Logical Block Protection – VERIFY features  Uses the VERIFY command defined in SSC-4  Adds new options to: –Check that protection information (i.e., CRC) is the same as currently configured –Used in conjunction with other new options –Check that protection information (i.e., CRC) validates on each logical block from current position for n number of files (i.e., FMKS) –No blocks are transferred over the SCSI interface –Happens at native data rate –Check that protection information (i.e., CRC) validates on each logical block from current position to EOD –No blocks are transferred over the SCSI interface –Happens at native data rate

© 2011 IBM Corporation8 Logical Block Protection – VERIFY to EOD example