Difference between revisions of "Ingest (0.5)"
Jump to navigation
Jump to search
Line 12: | Line 12: | ||
|- style="background-color:#cccccc;" | |- style="background-color:#cccccc;" | ||
!style="width:20%"|'''Workflow diagram step''' | !style="width:20%"|'''Workflow diagram step''' | ||
− | !style="width: | + | !style="width:55%"|'''Description''' |
− | !style="width: | + | !style="width:25%"|'''UML diagram references''' |
|- | |- | ||
|- | |- | ||
Line 47: | Line 47: | ||
|- style="background-color:#cccccc;" | |- style="background-color:#cccccc;" | ||
!style="width:20%"|'''Workflow diagram step''' | !style="width:20%"|'''Workflow diagram step''' | ||
− | !style="width: | + | !style="width:55%"|'''Description''' |
− | !style="width: | + | !style="width:25%"|'''UML diagram references''' |
|- | |- | ||
|Archivist moves SIP from shared folder into quarantine | |Archivist moves SIP from shared folder into quarantine | ||
Line 70: | Line 70: | ||
*Infected files will appear in /home/demo/possiblevirii/. If this occurs, do not take any further steps in the ingest process. Inform the Producer that infected files have been found. It is recommended at this point to delete all SIP copies and request that the Producer take steps to review the causes of the problem and eventually resubmit a malware-free SIP. | *Infected files will appear in /home/demo/possiblevirii/. If this occurs, do not take any further steps in the ingest process. Inform the Producer that infected files have been found. It is recommended at this point to delete all SIP copies and request that the Producer take steps to review the causes of the problem and eventually resubmit a malware-free SIP. | ||
| | | | ||
− | + | 2.4 Audit SIP for compliance | |
− | + | 2.5 Assess SIP defiencies | |
− | + | 2.6 Notify Producer of SIP rejection | |
− | + | 2.8 Destroy SIP copies | |
|- | |- | ||
|Virus-checker report is sent to accessions folder | |Virus-checker report is sent to accessions folder | ||
Line 91: | Line 91: | ||
|- style="background-color:#cccccc;" | |- style="background-color:#cccccc;" | ||
!style="width:20%"|'''Workflow diagram step''' | !style="width:20%"|'''Workflow diagram step''' | ||
− | !style="width: | + | !style="width:55%"|'''Description''' |
− | !style="width: | + | !style="width:25%"|'''UML diagram references''' |
|- | |- | ||
Line 100: | Line 100: | ||
*FITS incorporates format identification and validation tools such as DROID. JHOVE and the New Zealand Metadata Extractor, comparing the results of each tool and extracting a set of identification, validation and technical metadata. For more information on the FITS tool, see [http://code.google.com/p/fits/ http://code.google.com/p/fits/] | *FITS incorporates format identification and validation tools such as DROID. JHOVE and the New Zealand Metadata Extractor, comparing the results of each tool and extracting a set of identification, validation and technical metadata. For more information on the FITS tool, see [http://code.google.com/p/fits/ http://code.google.com/p/fits/] | ||
| | | | ||
− | + | 3.3 Identify formats | |
− | + | 3.4 Validate formats | |
− | + | 3.5 Extract metadata | |
|- | |- | ||
|Identification/validation reports are sent to accessions folder | |Identification/validation reports are sent to accessions folder | ||
Line 109: | Line 109: | ||
*Note that each report contains an MD5 checksum for the file. | *Note that each report contains an MD5 checksum for the file. | ||
| | | | ||
− | + | 3.3 Identify formats | |
− | + | 3.4 Validate formats | |
− | + | 3.5 Extract metadata | |
|- | |- | ||
|Accession log is sent to accessions folder | |Accession log is sent to accessions folder | ||
Line 130: | Line 130: | ||
|- style="background-color:#cccccc;" | |- style="background-color:#cccccc;" | ||
!style="width:20%"|'''Workflow diagram step''' | !style="width:20%"|'''Workflow diagram step''' | ||
− | !style="width: | + | !style="width:55%"|'''Description''' |
− | !style="width: | + | !style="width:25%"|'''UML diagram references''' |
|- | |- | ||
|SIP is moved to AIP preparation folder | |SIP is moved to AIP preparation folder | ||
Line 195: | Line 195: | ||
|- style="background-color:#cccccc;" | |- style="background-color:#cccccc;" | ||
!style="width:20%"|'''Workflow diagram step''' | !style="width:20%"|'''Workflow diagram step''' | ||
− | !style="width: | + | !style="width:55%"|'''Description''' |
− | !style="width: | + | !style="width:25%"|'''UML diagram references''' |
|- | |- | ||
|Archivist moves AIP to archival storage folder | |Archivist moves AIP to archival storage folder |
Revision as of 18:20, 19 November 2009
Main Page > Documentation > Release 0.5 Documentation > Ingest (0.5)
AD1 Receive SIP
File:Archivematica AD1 ReceiveSIP v1.pdf
Workflow diagram step | Description | UML diagram references |
---|---|---|
Producer places SIP in shared folder on host machine |
|
1.3 assign network storage for SIP (UC-1.1) |
SIP appears in shared folder in Archivematica |
|
1.4 Receive SIP from Producer (UC-1.1) |
Archivist copies SIP from shared folder to SIP backup folder |
|
AD2 Audit SIP
File:Archivematica AD2 AuditSIP v5.pdf
Workflow diagram step | Description | UML diagram references |
---|---|---|
Archivist moves SIP from shared folder into quarantine |
|
2.1 Quarantine SIP |
SIP is quarantined for 2 minutes |
|
2.1 Quarantine SIP |
SIP is scanned for malware |
|
2.2 Check SIP for malware |
Infected files are sent to possiblevirii folder |
|
2.4 Audit SIP for compliance 2.5 Assess SIP defiencies 2.6 Notify Producer of SIP rejection 2.8 Destroy SIP copies |
Virus-checker report is sent to accessions folder |
|
2.4 Audit SIP for compliance |
AD3 Accept SIP for Ingest
File:Archivematica AD3 AcceptSIPforIngest v4.pdf
Workflow diagram step | Description | UML diagram references |
---|---|---|
SIP contents are identified and validated using FITS |
|
3.3 Identify formats 3.4 Validate formats 3.5 Extract metadata |
Identification/validation reports are sent to accessions folder |
|
3.3 Identify formats 3.4 Validate formats 3.5 Extract metadata |
Accession log is sent to accessions folder |
|
AD4 Generate AIP
File:Archivematica AD4 GenerateAIP v2.pdf
Workflow diagram step | Description | UML diagram references |
---|---|---|
SIP is moved to AIP preparation folder |
|
4.2 Add content information to AIP |
Archivist normalizes files |
|
4.3 Transform content information |
Normalized files are saved to AIP preparation folder |
|
4.3 Transform content information |
Normalization log is saved to accessions folder |
|
4.3 Transform content information |
Archivist moves PDI in accessions folder to SIP in AIP preparation folder |
|
4.5 Add PDI to AIP |
Archivist moves SIP to AIP generation folder |
|
|
SIP content and PDI are zipped into AIP |
|
|
AIP is moved to AIP receipt folder |
|
AD5 Transfer AIP to Archival Storage
File:Archivematica AD5 TransferAIPtoArchivalStorage v2.pdf
Workflow diagram step | Description | UML diagram references |
---|---|---|
Archivist moves AIP to archival storage folder |
|
5.2 Transfer AIP to archival storage |
Archivist deletes SIP from SIP backup folder |
|
5.7 Destroy SIP and AIP copies |