Block format and disk layout on cd-rom, Computer Engineering

Assignment Help:

Q. Block Format and Disk Layout on CD-ROM?

A typical block format is displayed in Figure (a). It comprises the subsequent fields:

  • Sync: Sync field identifies beginning of a block. It comprises a byte of all 0s, 10 bytes of all 1s and bytes of all 0s.
  • Header: The header comprises block address and mode byte. Mode 0 specifies a blank data field and mode 1 specifies use of an error-correcting code and 2048 bytes of data as well as mode 2 specifies 2336 bytes of user data with no error correcting code.
  • Data: User data.
  • Auxiliary: Extra user data in mode 2. In mode 1 this is a 288-byte error correcting code.

2220_Block Format and Disk Layout on CD-ROM.png

Figure: Block Format and Disk Layout on CD-ROM

However what is Min (Minute), Sec (Second) and Sector fields in Header field?  The sectors of CD-ROM aren't arranged like sectors in hard disks (Please see Figure (b)). Rather they are all equal length segments. If we rotate CD drive at constant speed the linear velocity of disk surface movement will be higher at the outer side than that of centre portions. To offset this liner speed gap either we store less data on outer sectors or we decrease speed of rotation while reading outer tracks. CD follows later approach which is instead of moving CD drive at constant velocity. It's rotated at variable velocity. Speed or rotation of disk decreases as we move away from centre such that sector's can be read in constant time. This method of reading is known as Constant Liner Velocity (CLV).


Related Discussions:- Block format and disk layout on cd-rom

What is a macro, What is a macro ? How it is defined ? Preprocessor' is...

What is a macro ? How it is defined ? Preprocessor' is a translation phase that is applied to  source code before the compiler  proper  gets  its  hands on  it.  Generally,  th

Future of hyper threading, Current Pentium 4 based MPUs use Hyper-threading...

Current Pentium 4 based MPUs use Hyper-threading, but the next-generation cores, Woodcrest and Merom, Conroe will not. While some have alleged that this is because Hyper-threading

How physical addressing is performed in wan, How physical addressing is per...

How physical addressing is performed in WAN?  WAN networks operate as similar to a LAN. All WAN technology describes the specific frame format a computer uses while sending an

How are comparisons done in 8086 assembly language, Q. How are comparisons ...

Q. How are comparisons done in 8086 assembly language? There is a compare instruction CMP. Though this instruction just sets the flags on comparing two operands (both 16 bits

Which instruction is use in each process before proceeding, Before proceedi...

Before proceeding with its execution, each process must acquire all the resources it needs is called ? Ans. Hold and Wait is requires in each process should acquire all the res

Matlab, Use the colon operation to create a vector x of numbers -10 through...

Use the colon operation to create a vector x of numbers -10 through 10 in steps of 1. Use matrix operations to create a vector y where each element is 5 more than 2 times the corre

Depth in cutoff search, Depth in Cutoff search: The depth is chosen in...

Depth in Cutoff search: The depth is chosen in advance to certify in which the agent does not capture much more long to choose a move: however, if it has longer, well then we

Explain about com add-ins, COM add-ins are software program's which are inc...

COM add-ins are software program's which are included into an application and they add already built in features to an existing application. They have general architecture across m

Modular programming, Modular programming denotes to the practice of writing...

Modular programming denotes to the practice of writing a program as a sequence of independently assembled source files. Every source file is a modular program intended to be assemb

Define windows authentication, Windows Authentication This provider uti...

Windows Authentication This provider utilizes the authentication capabilities of IIS. After IIS completes its authentication, ASP.NET uses the authenticated identity's token to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd