1 / 11

End-to-end Data Protection and Tapes (07-373r4)

End-to-end Data Protection and Tapes (07-373r4). Kevin Butt. Customers are looking for solutions using standards based end-to-end data protection End-to-end data protection in the standards Disk based solutions are getting chosen over tape based solutions.

tommy
Download Presentation

End-to-end Data Protection and Tapes (07-373r4)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. End-to-end Data Protection and Tapes (07-373r4) Kevin Butt

  2. Customers are looking for solutions using standards based end-to-end data protection • End-to-end data protection in the standards • Disk based solutions are getting chosen over tape based solutions.

  3. Tape standards (i.e., SSC-3) need to add end-to-end data protection • IBM has an end-to-end data protection solution for tapes • Tape will be seen as having a complete solution for protecting data

  4. Potential for data corruption(same on tape as disk) • Between the application and the HBA • Interfaces to the data delivery subsystem on both ends of the wire • Internal to the device • As block is transferred between intermediate devices (e.g., protocol bridges)

  5. Disk data vs. Tape data User Data LBA CKSM User Data LBA CKSM X User Data LBA User Data LBA CKSM User Data LBA is not known “a priori” – can’t be used effectively User Data LBA CKSM User Data User Data LBA CKSM User Data User Data LBA CKSM User Data User Data LBA CKSM

  6. Existing vendor-specific methods • IBM has a proven solution in its enterprise tape drives. • Used for more than 12 years • Began with 3480 Tape drives • Continued in 3590 and 3592 • 4-byte CRC placed on logical block and transferred with the block • Validated at multiple points along the path

  7. Benefits to IBM and the customer with this solution • Prior to solution • Data Integrity Issues • Difficult to find where the problem occurred • After solution • Quickly find where problems occur • Data Integrity issues disappeared (Integrity was assured) • H/W issues discovered before host believes the data is on the medium

  8. Buffer Buffer Transferred Logical Block Transferred Logical Block Diagram of IBM Solution(logical representation) Controller Buffer . . . zSeries (Mainframe) HBA (FICON) HBA (FICON) Logical Block 4-byte CRC Transferred Logical Block HBA (ESCON) Transferred Logical Block HBA (ESCON) HBA (FC) HBA (pSCSI) 4-byte CRC calculated and placed as last 4-bytes of logical block – LBA size = LBA size + 4 and transferred with block (or validated and stripped if Read) Enterprise Tape Drive Port (FC) Port (pSCSI) Buffer

  9. Buffer Buffer Transferred Logical Block Transferred Logical Block Diagram of IBM Solution(logical representation) Controller Buffer . . . zSeries (Mainframe) Transferred Logical Block HBA (FICON) HBA (FICON) HBA (ESCON) HBA (ESCON) HBA (FC) HBA (pSCSI) 4-byte CRC calculated and placed as last 4-bytes of logical block – LBA size = LBA size + 4 and transferred with block (or validated and stripped if Read) 4-byte CRC validated at multiple points between source and destination (exact points not necessarily shown) Enterprise Tape Drive Port (FC) Port (pSCSI) Format Stuff Buffer Data written to / read from medium Transferred Logical Block Format Stuff

  10. Likelihood of quick adoption • Tape drives today protect data blocks. • ECC • CRC • E2E protection fits into media format schemes in use today • Does not require change in Transport Layer Protocols

  11. Proposal – Implement end-to-end logical block protection on tape • There is a proven method that has been in use for more than twelve years • Leverage this proven solution • Make sure that options are available to meet all vendors needs • For proposal against SSC-3 see (http://www.t10.org/ftp/t10/document.07/07-374r3.pdf)

More Related