Preview

9789400751453 C1

Powerful Essays
Open Document
Open Document
7481 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
9789400751453 C1
Chapter 2

SSD Architecture and PCI Express Interface
K. Eshghi and R. Micheloni

Abstract Flash-memory-based solid-state disks (SSDs) provide faster random access and data transfer rates than electromechanical drives and today can often serve as rotating-disk replacements, but the host interface to SSDs remains a performance bottleneck. PCI Express (PCIe)-based SSDs together with an emerging standard called NVMe (Non-Volatile Memory express) promises to solve the interface bottleneck.
This chapter walks the reader through the SSD block diagram, from the NAND memory to the Flash controller (including wear leveling, bad block management, and garbage collection). PCIe basics and different PCIe SSD architectures are reviewed. Finally, an overview on the standardization effort around PCI Express is presented.

2.1 Introduction
Creativity is just connecting things. When you ask creative people how they did something, they feel a little guilty because they didn’t really do it, they just saw something. It seemed obvious to them after a while.
– Steve Jobs

Solid-state drives promise to greatly enhance enterprise storage performance. While electromechanical disk drives have continuously ramped in capacity, the rotatingstorage technology doesn’t provide the access-time or transfer-rate performance required in demanding enterprise applications, including on-line transaction processing, data mining, and cloud computing. Client applications are also in need of

K. Eshghi ( ) • R. Micheloni
Enterprise Computing Division, Integrated Device Technology, Inc.,
San Jose, CA, USA e-mail: kamyar.eshghi@alum.mit.edu; rino.micheloni@ieee.org
R. Micheloni et al., Inside Solid State Drives (SSDs), Springer Series in Advanced Microelectronics 37, DOI 10.1007/978-94-007-5146-0 2,
© Springer ScienceCBusiness Media Dordrecht 2013

19

20

K. Eshghi and R. Micheloni

an alternative to electromechanical disk drives that can deliver faster response times, use less power, and fit in smaller



References: Berlin, 2005) www.onfi.org the USENIX Winter Technical Conference, 1995, pp. 155–164 J compactflash systems. IEEE Trans. Consum. Electron. 48(2), 366–375 (May 2002) 2 SSD Architecture and PCI Express Interface memories. IEEE J. Solid-State Circuits 32(May), 662–669 (May 1997) 11 memory. IEEE J Solid-State Circuits. 35(11), 1655–1667 (Nov 2000) 12 (Springer, Dordrecht, 2008) 14 16. R. Budruk, D. Anderson, T. Shanley, Mindshare, PCI Express System Architecture (AddisonWesley, Boston, 2003) 17 AN-724, www.idt.com (Sept 2009) 19

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In order to be in compliance a basic compliance plan has been created to ensure YieldMore and customer data in the reconfiguration will be met. Software and hardware used will be checked to PCI DSS database to ensure compliance. The network plan will be required to meet these minimum requirements before compliance assessment test will be made.…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Project part 6

    • 406 Words
    • 2 Pages

    PCI DSS stands for Payment Card Industry Data Security Standard. PCI DSS originally began as five different programs: Visa, MasterCard, American Express, Discover and JCB data security programs. Each company creates an additional level of protection for card issuers by ensuring that merchants meet minimum levels of security when they store, process and transmit cardholder data. PCI DSS specifies 12 requirements for compliance, organized into six logically related groups called control objectives. Each version of PCI DSS has divided these 12 requirements into a number of sub-requirements differently, but the 12 high level requirements have not changed since the inception standard. The control objectives are Build and maintain a secure network, protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test networks and maintain an information security policy. The requirements for compliance are, install and maintain a firewall configuration to protect card holder data, do not use vendor-supplied defaults for system passwords and other security parameters, protect stored cardholder data, encrypt transmission of cardholder data across open public networks, use and regularly update anti-virus software on all systems commonly affected by malware, develop and maintain secure systems and applications, restrict access to cardholder data by business need-to-know, assign a unique ID to each person with computer access, restrict…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    References: Racherla, S., Bajaj, V., Knebel, E., Korn, G., Kutepova, A., Newell, G., et al. (2010). IBM Information Infrastructure Solutions Handbook. IBM Redbooks, 2010, from www.books.google.com…

    • 574 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Assignment 2 PCI DSS

    • 537 Words
    • 2 Pages

    YieldMore Company’s a small agricultural company, which produces and sells fertilizer products, recently decided to accept credit card payments from customers. The company headquarters has three servers located in a small Indiana town—Active Directory server, a Linux application server, and an Oracle database server. Outside its headquarters, there are two large production facilities—one in Nebraska and other in Oklahoma. The application server at the headquarters, hosts YieldMore’s primary software application, which is a proprietary program managing inventory, sales, supply-chain, and customer information. The application server is the server that PCI DSS compliance will be the center point. The database server manages all data stored locally with direct attached storage and does not need PCI DSS standards as long as it is stored locally.…

    • 537 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Apa Devry

    • 2771 Words
    • 12 Pages

    References: Barr, J. (2001). Optical disk storage technology. Retrieved August 7, 2001, from the Faulkner database: http://www.faulkner.com/products.faccts/00005785.htm…

    • 2771 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    20110616163506944

    • 1634 Words
    • 8 Pages

    Communicators in high-context cultures (such as those in China, Japan, and Arab countries) tend to be logical, analytical, and action oriented.…

    • 1634 Words
    • 8 Pages
    Good Essays
  • Good Essays

    PCI DSS Compliance

    • 333 Words
    • 2 Pages

    To be in compliance with the PCI DSS Compliance Yield more must do the following Build and maintain a secure network, Protect cardholder data, Maintain a vulnerability management program, Implement strong access control measures, Regularly monitor and test networks, Maintain an information security policy. To remained in compliance of the PCI DSS Compliance I am recommends the following for the control objective of Build and maintain a secure network- I am recommends that we Install and maintain a firewall configuration to protect cardholder data and Do not use vendor-supplied defaults for system passwords and other security parameters.…

    • 333 Words
    • 2 Pages
    Good Essays
  • Good Essays

    HIPAA Compliance Analysis

    • 835 Words
    • 4 Pages

    The PCI standards aim to increase the accountability of vendors, and also protect payment card holder data (PCI, n.d.). Any merchant accepting card payment is required to be compliant with PCI standards to safeguard customer data, and prevent unauthorized access to these sensitive data. PCI Security Standards Council responsible for maintaining PCI standards has the power to block any merchants who fail to comply with the regulations. Also, since the council has all the major payment card players, they have a clear idea of the problems faced in the industry thereby helping them be proactive in resolving the…

    • 835 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Summer Reading Question

    • 868 Words
    • 1 Page

    People respond very differently to guilt. Take Vera for example. She was overcome with the…

    • 868 Words
    • 1 Page
    Better Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    Qcode.co.uk,. (2014). PCI DSS Requirement 8: Part 3 – User & Password Policy « Qcode…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    on their partners but because of the guilt that they feel, they will feel sorry for themselves.…

    • 964 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The Human Condition

    • 1150 Words
    • 5 Pages

    Some people do think what their actions will do to others or those who have hurt…

    • 1150 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Pci Quick Guide

    • 7658 Words
    • 31 Pages

    This Quick Reference Guide to the PCI Data Security Standard is provided by the PCI Security…

    • 7658 Words
    • 31 Pages
    Powerful Essays
  • Powerful Essays

    Computer Hardware Assignment

    • 3003 Words
    • 13 Pages

    References: Carl Hamacher , Zvonko Vranesic, Safwat Zaky, 2009, Computer Organization. http://clk.about.com/?zi=3/1bc&sdn=sound+card&cdn=term1&tm=2&f=10&tt=22&b t=0&bts=0&zu=http%3A//pcsupport.about.com/od/componentprofiles/p/p_sound.ht m http://pcsupport.about.com/od/componentprofiles/p/p_video.htm http://clk.about.com/?zi=3/1bc&sdn=optical+drive&cdn=term1&tm=3&f=10&tt=22& bt=0&bts=0&zu=http%3A//pcsupport.about.com/od/componentprofiles/p/p_odd.ht m http://pcsupport.about.com/od/componentprofiles/p/p_ps.htm http://en.wikipedia.org/wiki/Mouse_(computing) http://en.wikipedia.org/wiki/Motherboard http://www.webopedia.com/TERM/H/hardware.html http://xard.ru/…

    • 3003 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Capital raising

    • 520 Words
    • 3 Pages

    the increase of density for hard disk drive technology but also for Magnetic Random Access…

    • 520 Words
    • 3 Pages
    Good Essays

Related Topics