pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

VXA Tape Storage technology

Streaming is the technique used to transfer data in linear and helical scan tape drives, which operate by reading an entire track thousands of bytes long in a single pass of a Read head at a fixed tape speed. In order for such drives to operate at peak efficiency, the host must be able to keep the drive’s buffer full. A slow host or a busy SCSI bus can cause the tape drive to cease streaming, forcing the drive to reverse, or backhitch, before resuming the write operation. This not only impairs overall tape-drive performance, but also places additional stress on the media.

Ecrix Corp’s VXA technology solves this problem by using variable speed operation, essentially matching the speed of the tape to that of the host, thereby optimising tape drive performance and minimising undue stress on the media. Announced in late 1999, VXA is the first new tape technology in years to take an entirely different approach to data recording. Instead of the long blocks of streaming data used by most tape formats, VXA breaks long strings of data into small data units, then adds a wrapper of verification data, building small data packets – in what the company refers to as Discrete Packet Format (DPF) – before recording it on the media.

VXA

DPF allows the packets that comprise a data string to arrive at different times in the data buffer and still be efficiently reassembled into their original string order. Each data packet includes 64 bytes of user data, a synchronisation marker, unique address information, Cyclical Redundancy Check (CRC) code and Error Correction Code (ECC). Each track consists of 387 individual data packets recorded and read through a special buffer array. Two overlapping sets of tracks are written by the two pairs of heads on the drum. The first head in each pair writes the data. The second head performs a Read-After-Write to check the data integrity.

VXA employs four-level error correction which is applied in two phases. First, each packet includes a Reed-Solomon ECC which can correct small errors typically caused by noise or phase shifts. Second, when the packets are collected in the buffer segment, they form an array which employs a three-dimensional Reed-Solomon ECC (X-axis ECC, Y-axis ECC and Diagonal ECC).

The combination of DPF, variable tape speed operation and an overscanning technique which allows data to be read from any physical location on the tape, without having to follow tracks from beginning to end, result in a technology which is fast, reliable and highly immune to media errors. Initial drives operated at 6MBps, provided a maximum compressed storage capacity of 66MB and were shown to be capable of reading tapes that had been frozen and immersed in boiling water.

  • QIC Mammoth
  • Travan Tape Storage
  • DAT Tape Storage
  • 8mm Tape Storage
  • AIT – Advanced Intelligent Tape – family of tape storage
  • DLT Tape Storage
  • Super DLT Tape Storage
  • ADR Tape Technology
  • Tape Storage Linear Tape Open
  • VXA Tape Storage technology
  • Robotic Tape Storage Applications
  • Tape Storage Mammoth

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Google+ (Opens in new window)

Related

Filed Under: Tape Storage

Latest Articles

Color Laser Printers

Color Laser Printers

Laser printers are usually monochrome devices, but as with most mono technologies, laser printing can be adapted to colour. It does this by using cyan, magenta and yellow in combination to produce the different printable colours. Four … [Read More...]

Handheld Applications

Handheld Applications

In the early days PDAs came with some variation on the set of familiar PIM applications, perhaps with a couple of games thrown in. The traditional PIM functionality has matured and grown in sophistication of the years, and continues to be present today. In addition to some form of … [Read More...]

AMD Thunderbird

In mid-2000 AMD introduced an enhanced version of the Athlon processor, codenamed Thunderbird. Fabricated using AMD's 0.18-micron process technology, the new core replaced the K75 chip's 512KB of off-die Level 2 cache by 256KB of cache … [Read More...]


Eliminating Common WordPress Vulnerabilities to DDoS Attacks

Distributed Denial of Service (DDoS) attacks are serious threats that every website manager must be prepared for. Unfortunately, some of the most … [Read More...]

Securing Your Privacy Against Deep Packet Inspections

Network administrators, cybersecurity analysts and watchdogs use a variety of different tools to monitor Internet traffic. Deep packet inspection is … [Read More...]

Identifying and Protecting Against the Most Dangerous Keyloggers

Keyloggers are among the most frightening tools in the hands of a skilled hacker. They are malicious devices or malware applications that enable … [Read More...]

Excel Shortcuts for More Complicated Commands

We previously wrote an article on the benefits of using keyboard shortcuts in Excel. The shortcuts we focused on were used for simple formatting … [Read More...]

CleanTalk as Your Weapon against Spam

CleanTalk as Your Weapon against Spam

Are you tired of spam? You aren't alone. It has become a massive epidemic over the past few years. Around 14.5 billion spam messages are sent every … [Read More...]

VPN in 2019: Shortcut to Prevent Data Theft and Monitoring

VPN in 2019: Shortcut to Prevent Data Theft and Monitoring

Not all people are in the know about the beneficial functions of Virtual Private Networks. Some users install them to unblock torrenting sites, for … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

PALCD Flat Panels

A peculiar hybrid of PDP and LCD is the plasma addressed liquid crystal display (PALCD). Sony is currently working, in … [Read More...]

How to Remove Avira AntiVir Enhanced Protection Mode

Easiest Removal Option: Remote Repair: Paying an expert to remove this threat is always the easiest option. It's also the most expensive. … [Read More...]

The Browser Hijacker: CustomSearchPlus.com Virus

  The CustomSearchPlus.com is regarded as an unwanted browser extension, it is compatible with the popular internet browsers, namely, Internet … [Read More...]

Return to top of page

Copyright © 2019 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors