End-to-end Data Protection and Tapes (07-373r4)

Slides:



Advertisements
Similar presentations
Obtain 24/7 Powerful Asset and Connectivity Management Software for Enterprise Data Centers.
Advertisements

© 2011 IBM Corporation1 Tape Logical Block Protection (aka Tape Checksum ) Kevin D. Butt SCSI Architect, Data Protection & Retention, IBM T10/SSC Working.
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
OSI Model OSI MODEL.
CS3505 The Internet and Info Hiway transport layer protocols : TCP/UDP.
Lecture 2 Protocol Layers CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger.
1 Fall 2005 Internetworking: Concepts, Architecture and TCP/IP Layering Qutaibah Malluhi CSE Department Qatar University.
EE 122: Layering and the Internet Architecture Kevin Lai September 4, 2002.
Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 6: Accessing large amount.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Storage Networking Technologies and Virtualization Section 2 DAS and Introduction to SCSI1.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
Module – 7 network-attached storage (NAS)
Gursharan Singh Tatla Transport Layer 16-May
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
I/O Tanenbaum, ch. 5 p. 329 – 427 Silberschatz, ch. 13 p
CSC 412 – Networking Scott Heggen. Agenda Today The Network Layer (Chapter 5) Discussion on A2: The Data Link Layer Thursday Q2: The Networking Layer.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Module 10. Internet Protocol (IP) is the routed protocol of the Internet. IP addressing enables packets to be routed from source to destination using.
Signature Verbs Extension Richard L. Graham. Data Integrity Field (DIF) Used to provide data block integrity check capabilities (CRC) for block storage.
FRAME RELAY by Erdem YILMAZ. What is Frame Relay? high-performance WAN protocol operates at the physical and data link layers Originally designed for.
Protocol Layering Chapter 10. Looked at: Architectural foundations of internetworking Architectural foundations of internetworking Forwarding of datagrams.
Week one - networks and Layered Communication Introduction to Networks Layered Communication OSI Model The Physical Layer The Data Link Layer.
Cisco 1 - Networking Basics Perrine. J Page 19/17/2015 Chapter 9 What transport layer protocol does TFTP use? 1.TCP 2.IP 3.UDP 4.CFTP.
Protocols and the TCP/IP Suite
Chapter 5 Section 2 : Storage Networking Technologies and Virtualization.
Lect1..ppt - 01/06/05 CDA 6505 Network Architecture and Client/Server Computing Lecture 2 Protocols and the TCP/IP Suite by Zornitza Genova Prodanoff.
I. Basic Network Concepts. I.1 Networks Network Node Address Packet Protocol.
Computer Networks. Introduction Computer Network2 A History Lesson of Networking 1969 – ARPANET, first packet switched network consist of UCLA, Stanford,
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
25-Oct-15Network Layer Connecting Devices Networks do not normally operate in isolation.They are connected to one another using connecting devices. The.
Microsoft’s Concerns about Pioneer Proposal 21-Feb-2008.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 1.
Enhanced Storage Architecture
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
1 Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
1 Chapters 2 & 3 Computer Networking Review – The TCP/IP Protocol Architecture.
Click to add text Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 6: Accessing.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
© 2006 EMC Corporation. All rights reserved. The Host Environment Module 2.1.
Protocol Layering Chapter 11.
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
Internet Protocol Storage Area Networks (IP SAN)
HardSSH Cryptographic Hardware Key Team May07-20: Steven Schulteis (Cpr E) Joseph Sloan (EE, Cpr E, Com S) Michael Ekstrand (Cpr E) Taylor Schreck (Cpr.
App End-to-End Security Requirements Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, Meeting Date:
COMPUTER NETWORK AND DESIGN CSCI 3385K. Host-to-Host Communications Model Older model Proprietary Application and combinations software controlled by.
© 2007 EMC Corporation. All rights reserved. Internet Protocol Storage Area Networks (IP SAN) Module 3.4.
K. Salah1 Security Protocols in the Internet IPSec.
Week #8 OBJECTIVES Chapter #5. CHAPTER 5 Making Networks Work Two Networking Models –OSI OPEN SYSTEMS INTERCONNECTION PROPOSED BY ISO –INTERNATIONAL STANDARDS.
Solving Today’s Data Protection Challenges with NSB 1.
1 Layer 3: Routing & Addressing Honolulu Community College Cisco Academy Training Center Semester 1 Version
Tgt: Framework Target Drivers FUJITA Tomonori NTT Cyber Solutions Laboratories Mike Christie Red Hat, Inc Ottawa Linux.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
Simple Parity Check The simplest form of error detection is the parity check used with ASCII codes, originally on asynchronous modem links Each 7 bit ASCII.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Computer Networks.
Scaling the Network: The Internet Protocol
Local Area Networks: Topologies
Direct Attached Storage and Introduction to SCSI
Lec 5 Layers Computer Networks Al-Mustansiryah University
Direct Attached Storage and Introduction to SCSI
I. Basic Network Concepts
Integrated Sector Format IBM Almaden Research Center
Scaling the Network: The Internet Protocol
Team Skill 6 - Building The Right System Part 1: Applying Use Cases
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Presentation transcript:

End-to-end Data Protection and Tapes (07-373r4) Kevin Butt

Customers are looking for solutions using standards based end-to-end data protection End-to-end data protection in the standards Disk based solutions are getting chosen over tape based solutions.

Tape standards (i.e., SSC-3) need to add end-to-end data protection IBM has an end-to-end data protection solution for tapes Tape will be seen as having a complete solution for protecting data

Potential for data corruption (same on tape as disk) Between the application and the HBA Interfaces to the data delivery subsystem on both ends of the wire Internal to the device As block is transferred between intermediate devices (e.g., protocol bridges)

X Disk data vs. Tape data User Data LBA CKSM User Data LBA CKSM LBA is not known “a priori” – can’t be used effectively User Data LBA CKSM User Data User Data LBA CKSM User Data User Data LBA CKSM User Data

Existing vendor-specific methods IBM has a proven solution in its enterprise tape drives. Used for more than 12 years Began with 3480 Tape drives Continued in 3590 and 3592 4-byte CRC placed on logical block and transferred with the block Validated at multiple points along the path

Benefits to IBM and the customer with this solution Prior to solution Data Integrity Issues Difficult to find where the problem occurred After solution Quickly find where problems occur Data Integrity issues disappeared (Integrity was assured) H/W issues discovered before host believes the data is on the medium

Diagram of IBM Solution (logical representation) Controller Buffer . zSeries (Mainframe) HBA (FICON) HBA (FICON) Logical Block Transferred Logical Block 4-byte CRC HBA (ESCON) HBA (ESCON) Transferred Logical Block HBA (FC) HBA (pSCSI) 4-byte CRC calculated and placed as last 4-bytes of logical block – LBA size = LBA size + 4 and transferred with block (or validated and stripped if Read) Enterprise Tape Drive Port (FC) Port (pSCSI) Buffer Buffer Transferred Logical Block Buffer Transferred Logical Block

Diagram of IBM Solution (logical representation) Controller Buffer . zSeries (Mainframe) Transferred Logical Block HBA (FICON) HBA (FICON) HBA (ESCON) HBA (ESCON) HBA (FC) HBA (pSCSI) 4-byte CRC calculated and placed as last 4-bytes of logical block – LBA size = LBA size + 4 and transferred with block (or validated and stripped if Read) 4-byte CRC validated at multiple points between source and destination (exact points not necessarily shown) Enterprise Tape Drive Port (FC) Port (pSCSI) Format Stuff Data written to / read from medium Buffer Buffer Transferred Logical Block Buffer Transferred Logical Block Transferred Logical Block Format Stuff

Likelihood of quick adoption Tape drives today protect data blocks. ECC CRC E2E protection fits into media format schemes in use today Does not require change in Transport Layer Protocols

Proposal – Implement end-to-end logical block protection on tape There is a proven method that has been in use for more than twelve years Leverage this proven solution Make sure that options are available to meet all vendors needs For proposal against SSC-3 see (http://www.t10.org/ftp/t10/document.07/07-374r3.pdf)