DATA OVERWRITING IN PROBE-BASED DATA STORAGE DEVICES
    1.
    发明授权
    DATA OVERWRITING IN PROBE-BASED DATA STORAGE DEVICES 有权
    基于的探头数据存储设备写数据

    公开(公告)号:EP1516336B1

    公开(公告)日:2010-09-01

    申请号:EP03732870.5

    申请日:2003-06-13

    IPC分类号: G11B20/12 G11B27/30

    摘要: Methods and apparatus are provided for overwriting data in a probe-based data storage device (1) wherein data is represented by the presence and absence of pits formed in a storage surface (4) by a probe of the device. Input data is first coded such that successive bits of a given value x in the coded input data (bo, bl, b2, ..., ) are separated by at least d bits of the complementary value X, where d is a predetermined number >, 2. Overwrite data bits (vo, vl, v2, ..., ) are then generated by encoding the coded input data bits (bo, b1, b2, ..., ) . In this encoding process, assuming a pit represents a bit of value p in the data storage device (1), then the following conditions are satisfied. Firstly, any bit of value x in the coded input data (bo, bl, b2, ..., ) is encoded as an overwrite data bit of value p. Second, any bounded run of L 2d bits of value x in the coded input data (bo, bl, b2, ..., ) is encoded as a run of L overwrite data bits of value p. Third, any bounded run of L > 2d bits of value x in the coded input data (bo, bl, b2, ...,) is encoded as a run of L overwrite data bits consisting of n bits of value p and (L - n) bits of value p where n = CEILL(L - 2d)/d] and the n bits are positioned in the run such that: there is a bit of value p within d bits of the end of the run; there is a bit of value p within 2d + 1 bits of the beginning of the run; and, for n > 1, each of the n bits is within d bits of another of the n bits. The overwrite data bits (vo, vl, v2, ..., ) can then be used to overwrite old data on the storage surface (4), using a bit spacing such that writing an overwrite data bit of value p can erase an existing bit of value p within d bits of that overwrite data bit. The result of the overwrite operation is to record either the coded input data (bo, bl, b2, ..., ), or its complement (bo, bl, b2, ...,,, depending on the values of x and p. This result is independent of the bit values of the old data which is overwritten. 25

    DATA STORAGE SYSTEMS
    2.
    发明公开
    DATA STORAGE SYSTEMS 有权
    数据存储系统

    公开(公告)号:EP1629479A1

    公开(公告)日:2006-03-01

    申请号:EP04731424.0

    申请日:2004-05-06

    IPC分类号: G11B20/10 G11B20/18

    CPC分类号: G11B20/1833

    摘要: Described is a method and apparatus for decoding data in a data storage system. In operation, a detector generates an output bit stream in dependence on a data block received from a storage subsystem of the data storage system. A post processor connected to the detector generates a first error corrected bit stream in dependence on the output bit stream and the data block. An error correction decoder connected to the post processor generates a second error corrected bit stream in dependence on the first error corrected bit stream and also generates a checksum in dependence of the second error corrected bit stream. A feedback path supplies from the error correction decoder to the post processor pinning data indicative of locations of correct bits in the second error corrected bit stream in the event that the checksum is indicative of errors in the second error corrected bit stream and the second error corrected bit stream comprises at least one correct interleave. The post processor regenerates the first error corrected bit stream in dependence on the pinning data received from the error correction decoder.

    METHOD AND SYSTEM FOR OPTIMIZING ADSL CONNECTIONS IN A DSL ACCESS MULTIPLEXOR
    5.
    发明授权
    METHOD AND SYSTEM FOR OPTIMIZING ADSL CONNECTIONS IN A DSL ACCESS MULTIPLEXOR 有权
    方法及系统一个DSLAM OPTIMIZE ADSL连接

    公开(公告)号:EP1491067B1

    公开(公告)日:2005-09-14

    申请号:EP03720383.3

    申请日:2003-03-10

    IPC分类号: H04Q11/00 H04M11/06

    摘要: A method and systems for optimizing Asymmetric Digital Subscriber Line (ADSL) connections in DSL Access Multiplexor (DSLAM) that marries benefits of G.dmt and G.lite standards, using a flexible method implemented on a programmable Digital Signal Processor (DSP) and a Network Processor (NP) is disclosed. It provides a means to support full G.dmt rates for any of the attached users as long as less than half the users are actively moving data through the DSLAM, but by only using half the digital signal processing hardware and half the power consumption for the line drivers. The invention allows doubling the number of,ADSL ports available over a conventional scheme given about 20% more power is under 50% with only half the respective connections, all those G.dmt rates possible on their exceeds 50%, gradually active G.lite rates based on either based on a tiered tariff structure, until ultimately, when the utilization reaches 100%, all subscribers will be forced back to a maximum rate afforded by G.lite. Only as utilization drops back off, will active subscribers be brought back up to G.dmt's maximum transmission rates. Once the utilization drops below 50% again, then all active subscribers will be able to utilize G.dmt's maximum transmission rates. budget. When the utilization subscribers active on their users experience the maximum wire. However, when utilization subscribers start to experience a fixed policy or one that is based on a tiered tariff structure, until ultimately, when the utilization reaches 100%, all subscribers will be forced back to a maximum rate afforded by G.lite. Only as utilization drops back off, will active subscribers be brought back up to G.dmt's maximum transmission rates. Once the utilization drops below 50% again, then all active subscribers will be able to utilize G.dmt's maximum transmission rates.

    METHOD AND SYSTEMS FOR OPTIMIZING ADSL CONNECTIONS IN DSL ACCESS MULTIPLEXOR
    6.
    发明公开
    METHOD AND SYSTEMS FOR OPTIMIZING ADSL CONNECTIONS IN DSL ACCESS MULTIPLEXOR 有权
    方法及系统一个DSLAM OPTIMIZE ADSL连接

    公开(公告)号:EP1491067A1

    公开(公告)日:2004-12-29

    申请号:EP03720383.3

    申请日:2003-03-10

    IPC分类号: H04Q11/00 H04M11/06

    摘要: A method and systems for optimizing Asymmetric Digital Subscriber Line (ADSL) connections in DSL Access Multiplexor (DSLAM) that marries benefits of G.dmt and G.lite standards, using a flexible method implemented on a programmable Digital Signal Processor (DSP) and a Network Processor (NP) is disclosed. It provides a means to support full G.dmt rates for any of the attached users as long as less than half the users are actively moving data through the DSLAM, but by only using half the digital signal processing hardware and half the power consumption for the line drivers. The invention allows doubling the number of,ADSL ports available over a conventional scheme given about 20% more power is under 50% with only half the respective connections, all those G.dmt rates possible on their exceeds 50%, gradually active G.lite rates based on either based on a tiered tariff structure, until ultimately, when the utilization reaches 100%, all subscribers will be forced back to a maximum rate afforded by G.lite. Only as utilization drops back off, will active subscribers be brought back up to G.dmt's maximum transmission rates. Once the utilization drops below 50% again, then all active subscribers will be able to utilize G.dmt's maximum transmission rates. budget. When the utilization subscribers active on their users experience the maximum wire. However, when utilization subscribers start to experience a fixed policy or one that is based on a tiered tariff structure, until ultimately, when the utilization reaches 100%, all subscribers will be forced back to a maximum rate afforded by G.lite. Only as utilization drops back off, will active subscribers be brought back up to G.dmt's maximum transmission rates. Once the utilization drops below 50% again, then all active subscribers will be able to utilize G.dmt's maximum transmission rates.

    DATA STORAGE SYSTEMS
    8.
    发明授权
    DATA STORAGE SYSTEMS 有权
    数据存储系统

    公开(公告)号:EP1629479B1

    公开(公告)日:2009-01-14

    申请号:EP04731424.0

    申请日:2004-05-06

    IPC分类号: G11B20/10 G11B20/18

    CPC分类号: G11B20/1833

    摘要: Described is a method and apparatus for decoding data in a data storage system. In operation, a detector generates an output bit stream in dependence on a data block received from a storage subsystem of the data storage system. A post processor connected to the detector generates a first error corrected bit stream in dependence on the output bit stream and the data block. An error correction decoder connected to the post processor generates a second error corrected bit stream in dependence on the first error corrected bit stream and also generates a checksum in dependence of the second error corrected bit stream. A feedback path supplies from the error correction decoder to the post processor pinning data indicative of locations of correct bits in the second error corrected bit stream in the event that the checksum is indicative of errors in the second error corrected bit stream and the second error corrected bit stream comprises at least one correct interleave. The post processor regenerates the first error corrected bit stream in dependence on the pinning data received from the error correction decoder.

    DATA OVERWRITING IN PROBE-BASED DATA STORAGE DEVICES
    9.
    发明公开
    DATA OVERWRITING IN PROBE-BASED DATA STORAGE DEVICES 有权
    基于的探头数据存储设备写数据

    公开(公告)号:EP1516336A1

    公开(公告)日:2005-03-23

    申请号:EP03732870.5

    申请日:2003-06-13

    IPC分类号: G11B20/12 G11B27/30

    摘要: Methods and apparatus are provided for overwriting data in a probe-based data storage device (1) wherein data is represented by the presence and absence of pits formed in a storage surface (4) by a probe of the device. Input data is first coded such that successive bits of a given value x in the coded input data (bo, bl, b2, ..., ) are separated by at least d bits of the complementary value X, where d is a predetermined number >, 2. Overwrite data bits (vo, vl, v2, ..., ) are then generated by encoding the coded input data bits (bo, b1, b2, ..., ) . In this encoding process, assuming a pit represents a bit of value p in the data storage device (1), then the following conditions are satisfied. Firstly, any bit of value x in the coded input data (bo, bl, b2, ..., ) is encoded as an overwrite data bit of value p. Second, any bounded run of L 2d bits of value x in the coded input data (bo, bl, b2, ..., ) is encoded as a run of L overwrite data bits of value p. Third, any bounded run of L > 2d bits of value x in the coded input data (bo, bl, b2, ...,) is encoded as a run of L overwrite data bits consisting of n bits of value p and (L - n) bits of value p where n = CEILL(L - 2d)/d] and the n bits are positioned in the run such that: there is a bit of value p within d bits of the end of the run; there is a bit of value p within 2d + 1 bits of the beginning of the run; and, for n > 1, each of the n bits is within d bits of another of the n bits. The overwrite data bits (vo, vl, v2, ..., ) can then be used to overwrite old data on the storage surface (4), using a bit spacing such that writing an overwrite data bit of value p can erase an existing bit of value p within d bits of that overwrite data bit. The result of the overwrite operation is to record either the coded input data (bo, bl, b2, ..., ), or its complement (bo, bl, b2, ...,,, depending on the values of x and p. This result is independent of the bit values of the old data which is overwritten. 25