scispace - formally typeset
Search or ask a question
Topic

Data Corruption

About: Data Corruption is a research topic. Over the lifetime, 435 publications have been published within this topic receiving 6784 citations.


Papers
More filters
Patent
20 Jun 2011
TL;DR: In this paper, a source application reads a body of data in data block sized units and calculates a checksum value for each data block before sending the data block, the calculated checksum values and the identifier.
Abstract: A source application reads a body of data in data block sized units and calculates a checksum value for each data block before sending the data block, the calculated checksum value and the identifier. Upon receipt, a destination application independently calculates a checksum value for each received data block and compares the two checksums. Non-matching checksums indicate a network-induced error in the data block. Identifiers for the erroneous data blocks are transmitted to the source application after all of the data blocks have been initially transmitted. The source application thereafter resends only those data blocks identified. The destination application repeats the process of comparing checksums and transmitting identifiers to the source application until all of the data blocks of the body of data have been correctly received, and then uses the data blocks to recreate the body of data.

4 citations

Patent
HaiHong Wang1
19 Feb 2009
TL;DR: The reliable protocol as discussed by the authors is a protocol capable of detecting most but not all data corruption introduced by the communication channel and undetected by the reliable protocol at the destination data replication device.
Abstract: Data replication includes generating replication data that is part of a replicated file system to be sent over a communication channel to a destination replication device; adding additional verification information to at least a portion of the replication data to prevent data corruption; and sending the replication data and the additional verification information over the communication channel to the destination replication device. The replication data with additional verification information is sent over the communication channel using a reliable protocol that allows the replication data to be verified by the reliable protocol at the destination replication device. The reliable protocol is a protocol capable of detecting most but not all data corruption introduced by the communication channel. The additional verification information includes information for verifying that replication data sent using the reliable protocol does not include data corruption that was introduced by the communication channel and undetected by the reliable protocol.

4 citations

Journal ArticleDOI
TL;DR: The proposed approach stores a modified duplicate of the narrow value such that errors on the original value and the duplicate can be distinguished and therefore corrected and the scheme is significantly faster than a parity check and can improve substantially the number of soft errors that are corrected compared to existing techniques.
Abstract: Soft errors are transient errors that can alter the logic value of a register bit causing data corruption. They can be caused by radiation particles such as neutrons or alpha particles. Narrow values are commonly found in the data consumed or produced by processors. Several techniques have recently been proposed to exploit the unused bits in narrow values to protect them against soft errors. These techniques replicate the narrow value over the unused register bits such that errors can be detected when the value is duplicated and corrected when the value is tripled. In this letter, a technique that can correct errors when the narrow value is only duplicated is presented. The proposed approach stores a modified duplicate of the narrow value such that errors on the original value and the duplicate can be distinguished and therefore corrected. The scheme has been implemented at the circuit level to evaluate its speed and also at the architectural level to assess the benefits in correcting soft errors. The results show that the scheme is significantly faster than a parity check and can improve substantially the number of soft errors that are corrected compared to existing techniques.

4 citations

Patent
29 Oct 2004
TL;DR: In this paper, the authors present a technique to detect data corruption of critical data structures and to repair the corrupted data structures by using the corresponding stored data in the data vault without interrupting the operation of the managing module.
Abstract: An embodiment of the invention is a technique to detect data corruption of critical data structures and to repair the corrupted critical data structures. Information data of critical data structures used by a managing module are captured upon initialization of the managing module. The captured information data are considered valid, and stored in a data vault. Critical data structures used by the managing module are monitored for validity during operation of the managing module. A corruption of a critical data structure corresponding to a stored data of the stored captured information data is detected during operation of the managing module. The corrupted data structure is restored to an operational state by using the corresponding stored data in the data vault without interrupting the operation of the managing module.

4 citations

Patent
Atul Mukker1
03 Dec 2008
TL;DR: In this paper, a system and method for preventing data corruption after power failure is described, which may include receiving at least one of a read command or a write command, storing information on an array of disk drives, and storing persistent information on a journaling drive.
Abstract: A system and method for preventing data corruption after power failure is described. The system may include a host server, a disk array, a journaling disk, and/or a RAID controller. A method for preventing data corruption after power failure may include receiving at least one of a read command or a write command, storing information on an array of disk drives at least partially based on receiving the at least one of a read command or a write command, and storing persistent information on a journaling drive.

4 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
82% related
Software
130.5K papers, 2M citations
81% related
Wireless sensor network
142K papers, 2.4M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Cluster analysis
146.5K papers, 2.9M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
202121
202025
201927
201827
201727