13.07.2015 Views

IM3004s User Guide v2.2.pdf - ICS-IQ.com

IM3004s User Guide v2.2.pdf - ICS-IQ.com

IM3004s User Guide v2.2.pdf - ICS-IQ.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4 - Operationoriginal request for data. The transfer rate will not be affected when using the drive’sCRC-16 mechanism for checking data integrity.Hash TargetsThe Hash Targets function provides a method of generating Hash values for theSource drive’s data and for the data written to the Target drives, in the sameoperation. The data is read back and hashed from the target drive(s) after eachtransferred block. Since data is read back during the operation the average transferrate will decrease and the total time of <strong>com</strong>pletion will increase when this function isenabled.Hashing MethodsThe Hashing Methods menu selection provides the user with list of different HashAlgorithms to generate a Hash value for the Source drive’s data. Hashing is aprocess that calculates a "unique signature" value for the contents of an entire drive.• CRC32Selecting CRC32 will result in the operation generating the CRC3232-bit hash value for the data read from the source drive(s). Selecting the HashTargets function will result in the operation generating the CRC32 Hash values forthe data read from the Source drive and the data written to the Target drive.• MD5Selecting MD5 will result in the operation generating the MD5 128-bit hash valuefor the data read from the source drives. Selecting the Hash Targets function willresult in the operation generating the MD5 Hash values for the data read from theSource drive and the data written to the Target drive.• SHA-1Selecting SHA-1 will result in the operation generating the SHA-1 160-bit hashvalue for the data read from the source drives. Selecting the Hash Targetsfunction will result in the operation generating the SHA-1 Hash values for the dataread from the Source drive and the data written to the Target drive.• SHA-2 (224,384,256,512)Selecting SHA-2 (224,384,256,512) will result in the operation generating the SHA-2 (224,384,256,512)-bit hash value for the data read from the source drives.Selecting the Hash Targets function will result in the operation generating theHash values for the data read from the Source drive and the data written to theTarget drive.36

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!