pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

VXA Tape Storage technology

Streaming is the technique used to transfer data in linear and helical scan tape drives, which operate by reading an entire track thousands of bytes long in a single pass of a Read head at a fixed tape speed. In order for such drives to operate at peak efficiency, the host must be able to keep the drive’s buffer full. A slow host or a busy SCSI bus can cause the tape drive to cease streaming, forcing the drive to reverse, or backhitch, before resuming the write operation. This not only impairs overall tape-drive performance, but also places additional stress on the media.

Ecrix Corp’s VXA technology solves this problem by using variable speed operation, essentially matching the speed of the tape to that of the host, thereby optimising tape drive performance and minimising undue stress on the media. Announced in late 1999, VXA is the first new tape technology in years to take an entirely different approach to data recording. Instead of the long blocks of streaming data used by most tape formats, VXA breaks long strings of data into small data units, then adds a wrapper of verification data, building small data packets – in what the company refers to as Discrete Packet Format (DPF) – before recording it on the media.

VXA

DPF allows the packets that comprise a data string to arrive at different times in the data buffer and still be efficiently reassembled into their original string order. Each data packet includes 64 bytes of user data, a synchronisation marker, unique address information, Cyclical Redundancy Check (CRC) code and Error Correction Code (ECC). Each track consists of 387 individual data packets recorded and read through a special buffer array. Two overlapping sets of tracks are written by the two pairs of heads on the drum. The first head in each pair writes the data. The second head performs a Read-After-Write to check the data integrity.

VXA employs four-level error correction which is applied in two phases. First, each packet includes a Reed-Solomon ECC which can correct small errors typically caused by noise or phase shifts. Second, when the packets are collected in the buffer segment, they form an array which employs a three-dimensional Reed-Solomon ECC (X-axis ECC, Y-axis ECC and Diagonal ECC).

The combination of DPF, variable tape speed operation and an overscanning technique which allows data to be read from any physical location on the tape, without having to follow tracks from beginning to end, result in a technology which is fast, reliable and highly immune to media errors. Initial drives operated at 6MBps, provided a maximum compressed storage capacity of 66MB and were shown to be capable of reading tapes that had been frozen and immersed in boiling water.

  • QIC Mammoth
  • Travan Tape Storage
  • DAT Tape Storage
  • 8mm Tape Storage
  • AIT – Advanced Intelligent Tape – family of tape storage
  • DLT Tape Storage
  • Super DLT Tape Storage
  • ADR Tape Technology
  • Tape Storage Linear Tape Open
  • VXA Tape Storage technology
  • Robotic Tape Storage Applications
  • Tape Storage Mammoth

Filed Under: Tape Storage

Latest Articles

Alibaba And Its Tough Competitors

For most people in the world that have known Amazon and eBay, the company name Alibaba is not a very familiar name. But in China which has more than 1.3 billion population almost 40% of the people are now indulging in e-commerce and majority of these are trading in with Alibaba. Alibaba is one … [Read More...]

Connecting a Creative Audigy Soundcard to Peripherals

The Sound Blaster Audigy card can be connected to a variety of peripherals. Disabling and Uninstalling Soundcards How To Install a New Sound Card In Your PC Soundcard Optical Connections How To Connect Speaker Systems to Your Sound Card Connecting a Creative Audigy Soundcard to … [Read More...]

Mastering the Art of Using Blocks as a Ruby Programmer

Blocks are an important element of the Ruby programming language. You need to learn more about them to be a proficient Ruby programmer. Let’s delve into some more details on them. THE BLOCKS IN RUBY DEVELOPMENT In Ruby, handling blocks of code is very interesting. The methods you write can … [Read More...]

Everything You Need to Know About Sourcing Circuit Boards From U.S. Suppliers

In This Article This article includes: Why Source PCBs From the United States?How to Get a Quote From a U.S.-Based PCB ManufacturerThe Top U.S. … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Bridges

Bridges became commercially available in the early 1980s. At the time of their introduction their function was to connect … [Read More...]

Monitor Technologies: Slotted Mask

Capitalising on the advantages of both the shadow mask and aperture grill approaches, NEC has developed a hybrid mask type which uses a slot-mask … [Read More...]

Browser Hijacker– Sweet Page

Classified as adware, Sweet Page is also popularly known as the browser hijacker. This adware is bundled with free programs that can be availed by the … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors