Abstract
This document describes a model for how data integrity can be protected between an Application client and a storage device. If all nodes in an implementation follow this model then there will be end-to-end data protection for several classes of data integrity errors.