A Comparison of Client and Enterprise SSD Data Path Protection

Similar documents
NAND Flash Media Management Through RAIN

Chapter 9: Peripheral Devices: Magnetic Disks

High-Performance SSD-Based RAID Storage. Madhukar Gunjan Chakhaiyar Product Test Architect

Important Differences Between Consumer and Enterprise Flash Architectures

Enterprise-class versus Desktopclass

Solid State Drive (SSD) FAQ

Best Practices for SSD. Performance Measurement. Accuracy, Consistency, Repeatability. Main Goals of Enterprise. Performance Measurement

Difference between Enterprise SATA HDDs and Desktop HDDs. Difference between Enterprise Class HDD & Desktop HDD

End to End Data Path Protection

Enterprise-class versus Desktop-class Hard Drives

Choosing the Right NAND Flash Memory Technology

Intel RAID Controllers

File System & Device Drive. Overview of Mass Storage Structure. Moving head Disk Mechanism. HDD Pictures 11/13/2014. CS341: Operating System

Disk Storage & Dependability

Technologies Supporting Evolution of SSDs

SOLID STATE DRIVES AND PARALLEL STORAGE

COS 318: Operating Systems. Storage Devices. Kai Li Computer Science Department Princeton University. (

What Types of ECC Should Be Used on Flash Memory?

Trends in NAND Flash Memory Error Correction

Solid State Drive Architecture

NAND Flash Architecture and Specification Trends

Silent data corruption in SATA arrays: A solution

A New Chapter for System Designs Using NAND Flash Memory

SSDs and RAID: What s the right strategy. Paul Goodwin VP Product Development Avant Technology

Sistemas Operativos: Input/Output Disks

Nasir Memon Polytechnic Institute of NYU

HP Smart Array Controllers and basic RAID performance factors

DEPLOYING HYBRID STORAGE POOLS With Sun Flash Technology and the Solaris ZFS File System. Roger Bitar, Sun Microsystems. Sun BluePrints Online

Storing Data: Disks and Files

Chapter Introduction. Storage and Other I/O Topics. p. 570( 頁 585) Fig I/O devices can be characterized by. I/O bus connections

Taking Linux File and Storage Systems into the Future. Ric Wheeler Director Kernel File and Storage Team Red Hat, Incorporated

Outline. CS 245: Database System Principles. Notes 02: Hardware. Hardware DBMS Data Storage

How To Write On A Flash Memory Flash Memory (Mlc) On A Solid State Drive (Samsung)

Redefining Flash Storage Solution

Understanding endurance and performance characteristics of HP solid state drives

FAST 11. Yongseok Oh University of Seoul. Mobile Embedded System Laboratory

Data Storage - II: Efficient Usage & Errors

Disks and RAID. Profs. Bracy and Van Renesse. based on slides by Prof. Sirer

Partition Alignment Dramatically Increases System Performance

Automated Data-Aware Tiering

Enterprise SSD Interface Comparisons

BrightStor ARCserve Backup for Windows

Solid State Drive Technology

Flash In The Enterprise

DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION

Cloud Storage. Parallels. Performance Benchmark Results. White Paper.

General Parallel File System (GPFS) Native RAID For 100,000-Disk Petascale Systems

ioscale: The Holy Grail for Hyperscale

TECHNOLOGY BRIEF. Compaq RAID on a Chip Technology EXECUTIVE SUMMARY CONTENTS

Data recovery from a drive with physical defects within the firmware Service Area, unrecoverable using

Fault Tolerance & Reliability CDA Chapter 3 RAID & Sample Commercial FT Systems

Storage Technologies for Video Surveillance

Price/performance Modern Memory Hierarchy

RealStor 2.0 Provisioning and Mapping Volumes

An Introduction to RAID. Giovanni Stracquadanio

Accelerating Server Storage Performance on Lenovo ThinkServer

Enhancing IBM Netfinity Server Reliability

OPTIMIZING VIRTUAL TAPE PERFORMANCE: IMPROVING EFFICIENCY WITH DISK STORAGE SYSTEMS

Cloud-integrated Enterprise Storage. Cloud-integrated Storage What & Why. Marc Farley

Phoenix SecureCore TM Setup Utility

WHITE PAPER. Drobo TM Hybrid Storage TM

WHITEPAPER It s Time to Move Your Critical Data to SSDs

Motivation: Smartphone Market

Keep Your Data Secure: Fighting Back With Flash

COMPUTER HARDWARE. Input- Output and Communication Memory Systems

EX Port SATA3 RAID/HyperDuo PCIe(x2) Card

Solid State Technology What s New?

Serial ATA technology

NSS Volume Data Recovery

4K Sector Disk Drives: Transitioning to the Future with Advanced Format Technologies

Ensuring Robust Data Integrity

Low-Power Error Correction for Mobile Storage

Cloud-integrated Storage What & Why

Chapter 10: Mass-Storage Systems

The Evolving NAND Flash Business Model for SSD. Steffen Hellmold VP BD, SandForce

WHITE PAPER FUJITSU PRIMERGY SERVER BASICS OF DISK I/O PERFORMANCE

DDR4 Memory Technology on HP Z Workstations

COS 318: Operating Systems. Storage Devices. Kai Li and Andy Bavier Computer Science Department Princeton University

Chapter 7 Types of Storage. Discovering Computers Your Interactive Guide to the Digital World

1 / 25. CS 137: File Systems. Persistent Solid-State Storage

Computer Systems Structure Main Memory Organization

IBM Software Information Management Creating an Integrated, Optimized, and Secure Enterprise Data Platform:

Chapter 12: Mass-Storage Systems

RAID HARDWARE. On board SATA RAID controller. RAID drive caddy (hot swappable) SATA RAID controller card. Anne Watson 1

Best Practices for Optimizing SQL Server Database Performance with the LSI WarpDrive Acceleration Card

NAND Flash Architecture and Specification Trends

Embedded Operating Systems in a Point of Sale Environment. White Paper

Memory Systems. Static Random Access Memory (SRAM) Cell

NAND Flash FAQ. Eureka Technology. apn5_87. NAND Flash FAQ

In-Block Level Redundancy Management for Flash Storage System

OCZ s NVMe SSDs provide Lower Latency and Faster, more Consistent Performance

RAID-DP: NetApp Implementation of Double- Parity RAID for Data Protection

SSDs tend to be more rugged than hard drives with respect to shock and vibration because SSDs have no moving parts.

1000-Channel IP System Architecture for DSS

Accelerating Enterprise Applications and Reducing TCO with SanDisk ZetaScale Software

How System Settings Impact PCIe SSD Performance

System Architecture. CS143: Disks and Files. Magnetic disk vs SSD. Structure of a Platter CPU. Disk Controller...

Transcription:

A Comparison of Client and Enterprise SSD Data Path Protection Doug Rollins, Senior Strategic Applications Engineer Micron Technology, Inc. Technical Marketing Brief Data Path Protection Overview This document describes the general concept of data path protection in SSDs and details the key features of data path protection that are designed into Micron s RealSSD products. It will describe how data moves from the SATA PHY, through the data path, into the, and back, and how each transition is protected. It also explains the differences between Micron s client and enterprise data path protection methods. The Data Path Data that is written is referred to as data; and the logical block address [LBA] for that data the location associated with it is called metadata, which literally means data about data. The term data path refers to the logical course or path that user data and metadata follow as they move throughout the SSD. The path encompasses the complete, end-to-end course taken by data as it is either written to or read from the underlying media. Some of the protection is hardware-based and some is software-based; each type is designed and deployed where it is most effective. Host data WRITE commands are shown in blue. Host READ commands take the reverse path and are shown in green. 1. Data moves from SATA transport into the host. 2. After exiting the, it migrates to the buffer manager. 3. Next, the buffer manager sends the data to a second. 4. Upon exiting the second, the data enters the. 5. After exiting the, the data moves to the controller. 6. Finally, the data exits the controller and is written to the media. All Micron SSDs share some common data path protection features: DRAM logical-to-physical (L2P) table parity check Host LBA embedding and read page LBA check DRAM SATA Transport 1 Host 2 Buffer Manager 3 6 5 4 1 Storage Controller 2 3 6 5 4 Figure 1: Typical data path for a SATA SSD 1

DRAM L2P Table The media in an SSD is written in pages, whereas computer systems typically write data to mass storage devices like SSDs in sectors. A page is the smallest unit of storage that can be addressed. Although it varyies by design, a page is typically 4KB to 8KB in size. A simplified diagram of an SSD is shown below. Drive Interface Because the page and the host sectors are different sizes, an SSD has to build and maintain a data structure that enables it to translate between the host writing data to or reading data from a sector, and the physical page on which that data is actually placed. It creates virtual sectors on the SSD, organizing the media exactly like the physical sectors on a rotating disk drive, albeit much faster. This table structure is typically maintained in the SSD s DRAM; for speed, the structure is updated frequently. It stores all the logical-to-physical pointer data, enabling the host to interact with the -based SSD the same way it would with a conventional rotating disk drive. One track (red) Page - smallest unit of storage that can be written to. Now 4K, moving to 8K, determined by design. Block - smallest unit of storage that can be erased. Typically 128 to 256 pages, determined by design. One sector Figure 2: Simplified SSD diagram Figure 2 shows the SSD PCB in blue and the pages in gold. The blocks, which are logical groupings of pages, are the vertical columns of the pages. The actual number of pages and blocks vary, based on the SSD and design. The SSD interface, shown in black in the figure, could be SAS, SATA, PCI Express, or some other interface. Rotating Disk Platter(s) Figure 3: Rotating disk sectors vs. SSD sectors Operating systems address mass storage devices in sectors. With hard drives, rotating disks store data on magnetic platters, each logically laid out in a series of concentric rings called tracks. Tracks are further divided into smaller logical storage elements called sectors, typically 512 bytes each. SSDs emulate this logical addressing method. 2

L2P Table The LBA data is stored in the L2P table for retrieval when the host requests that the data be read. When the READ command is issued, the SSD looks to the L2P table to determine which page(s) contain the data. When the data is read from the, the embedded LBA is also read and compared against the value in the L2P table to ensure they match. Figure 4: L2P table This process for storing the LBA when data is written, and then reading it back and comparing it to the data stored in the L2P table, ensures that the SSD returns the correct data when requested. This data structure is referred to as the L2P table. Because the L2P table is stored in DRAM, the potential exists for data corruption within the table itself. The consequence of such corruption can be severe, with data loss being paramount. Because of this potential, the L2P tables in all of Micron s RealSSD products are protected by parity. This parity check protection method provides an extremely robust structure. When the host writes data to the SSD, two key elements combine: the actual data to be written and the LBA from which it came. For example, if the host data was a building, the LBA would be that building s street address. All data written to the SSD has an LBA associated with it. Micron embeds the host LBA, along with the user data it references, logically, joining them before writing anything to the, as shown on the right. User data to be written to the SSD User DATA LBA Location from which the data came User DATA LBA Logically combined and stored to Figure 5: Writing data to the SSD 3

Client-Specific Data Path Protection In addition to the L2P parity protection and the host LBA embedding and read page check, Micron client SSDs employ parity generation and check functions as well as cyclic redundancy checksum () and BCH encoding and checking to protect user data as shown below. As the data passes from the SATA transport to the host, parity is generated. As the data exits the host, parity is checked. Next, and BCH error correction codes are generated and stored with the data. Finally, a is generated just before the data enters the, and then it s checked when exiting. When data is read from the, the process occurs in reverse order: is generated as the data moves from the controller to the and is checked on exit; the and BCH codes generated on write are read and verified; and finally parity is generated before the data enters the host and is checked upon exit. This sequence of parity and generation and checks ensures that any potential data corruption inside the SSD is detected (bits reversed or flipped), so the host can take corrective action. DRAM ECC stored with sector data and metadata SATA Transport H H Host H H Buffer Manager Storage Controller and BCH Decode and BCH Encode Figure 6: Client-specific data path protection 4

Enterprise-Specific Data Path Protection Our enterprise SATA drives build on the foundation of proven data path protection for client drives, but go one step further, adding protection in the form of memory path error correction as shown below. All the data path protection mechanisms described for Micron s client-focused SSDs are also used in our enterprise drives. However, an additional memory protection ECC () is added. is designed to protect the host data by adding ECC coverage to the data as it enters the SSD. A 12-byte is generated on the host data in the SATA PHY and is independent of any ECC provided by the devices themselves. This additional follows the host data through the SSD. As the and user data enter the host, parity is generated. As the data exits the host, that parity is checked. In the buffer manager, further protection is generated on the associated metadata. By adding protection to the metadata, both host data and meta data are protected. As the host data, its metadata, and the generated for both types of data exit the adjacent to the buffer manager, both are checked. Next, and BCH codes are generated (as with client drives). Finally, parity is generated before the data enters the, and that parity is checked upon exit. On READ commands, the process is carried out in reverse order. As the data is read from, parity is generated as the data enters the and that parity is checked upon exit. The is then checked and the BCH decoded. protection is generated (on both user data and metadata) before the data passes through the adjacent to the buffer manager. The on the metadata is checked in the buffer manager. Prior to entering the host, parity is generated. Upon exit of the host, that parity is checked. Next, the is checked, and finally the data is returned via the PHY. DRAM ECC stored with sector data and metadata SATA Transport H H Host up generated Metadata H H Buffer Manager Storage Controller and BCH Decode and BCH Encode Figure 7: Enterprise-specific data path protection 5

Client and Enterprise SSDs: Key Data Path Protection Differences Additional protection enables our enterprise SSDs to correct single-bit errors within the data path and report double bit errors such that the host can take appropriate action. SSD Type Single-Bit Error Detection? Single-Bit Error Correction? Double-Bit Error Detection? Client Yes No No Enterprise Yes Yes Yes Table 1: Single-bit error detection/correction Conclusion Both client and enterprise SSDs must protect data inside the drive from the connection to the host system, through the circuits of the SSD, to the memory. While the memory employs its own ECC protection, Micron uses additional state-of-the art data protection methods, such as parity protection on internal buffers and checksum generation and checking. Our client SSDs employ these techniques to offer robust, optimized data integrity ideally matched to the rigorous demands of the client SSD market. Building on that solid client data protection design, our enterprise SSDs offer additional data correction capabilities by protecting both the host data and its metadata. This enhanced level of protection is required for true enterprise-class SSDs. By enabling single-bit correction in the data path, our enterprise SSDs can handle the most demanding server and storage workloads seen every day in world-class data centers. micron.com Products are warranted only to meet Micron s production data sheet specifications. Products and specifications are subject to change without notice. 2011 Micron Technology, Inc. Micron and the Micron logo are trademarks of Micron Technology, Inc. All other trademarks are the property of their respective owners. All rights reserved. 11/11 EN.L P:11622 6