SlideShare a Scribd company logo
1 of 29
Flash Memory Summit 2016 | Santa Clara, CA 1c
Stella Achtenberg, Eran Sharon, Idan Alrod
Employing ECCs via Overprovisioning to Improve Flash
Reliability:
A New, Cost Efficient Approach
Advanced Memory Solutions,
3-8-2016
1
Flash Memory Summit 2016 | Santa Clara, CA
Flash Memory Summit 2016 | Santa Clara, CA 2
NAND Memory
Enterprise SSD
Client SSD
Mobile
Flash Memory Summit 2016 | Santa Clara, CA 3
Handling Random Errors
DSP techniquesAdvanced
ECC
Second Level
Error Correction
Errors
1e-11e-21
Raw NAND
Many ErrorsFew Errors
Flash Memory Summit 2016 | Santa Clara, CA 4
NAND Memory
Flash Memory Summit 2016 | Santa Clara, CA 5
RAID Example
Flash Memory Summit 2016 | Santa Clara, CA 6
Handling Physical Defects
Overprovisioning
RAID
Reliability Performance
Flash Memory Summit 2016 | Santa Clara, CA 7
Storage Reliability Requirements
 A metric for occurrence of data errors per bits read:
𝑈𝐵𝐸𝑅 =
𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑑𝑎𝑡𝑎 𝑒𝑟𝑟𝑜𝑟𝑠
𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑏𝑖𝑡𝑠 𝑟𝑒𝑎𝑑
 Extremely Low UBER requirements < 𝟏𝟎−18
 DPPM = Defective Parts per Million
Enterprise SSD
Client SSD
Flash Memory Summit 2016 | Santa Clara, CA 8
Problem statement
3-Dimensional stacking
and process scaling
increase RBER variability
< 𝟏𝟎−18
Less reliability
< 𝟏𝟎−18
Low High
Flash Memory Summit 2016 | Santa Clara, CA 9
Overprovisioning potential
RAID
Overprovisioning
ECC
Overprovisioning
Random Errors Physical Defects
Joint RAID & ECC
• Lower
UBER/DPPM
• Higher
Endurance
Flash Memory Summit 2016 | Santa Clara, CA 10
Case study: 32 Die XOR RAID
Data Page 0 (ECC 0)
Data Page 1 (ECC 1)
Data Page 30 (ECC 30)
.
.
.
Parity Page 31
Flash Memory Summit 2016 | Santa Clara, CA 11
Current solution
 Decode using soft information
 In case of failure, decode the entire
RAID stripe
– Single error  Recovery
– More than single error  UECC
1st failure
+
…
𝐸0
𝐸31
XOR
2nd
failure
UECC (Data loss)
𝐿𝐷𝑃𝐶𝑖
Flash Memory Summit 2016 | Santa Clara, CA 12
New methodology
 Optimal information exchange
between RAID & LDPC
– Extrinsic “soft” LDPC output 
into the RAID
– Updated “soft” RAID output 
back to the LDPC
– Iterate until convergence or
timeout
𝑃𝑖
-
𝑄𝑖𝑛𝑖
𝑇𝑖
𝑄𝑜𝑢𝑡𝑖
𝐸𝑖
+ 𝐿𝐷𝑃𝐶𝑖
+ …
𝐸0
𝐸31
SXOR
𝑇𝑖 = 𝜑−1
𝑗𝑖 𝜑 𝐸𝑗 ,
𝜑 𝑥 = {sign 𝑥 , − log tanh
𝑥
2
}
𝑄𝑜𝑢𝑡𝑖
Flash Memory Summit 2016 | Santa Clara, CA 13
Previous Work
“Error Correction Using Multiple Data Sources” –
US patent application by Sharon et al (2014, SanDisk)
“Soft Decision Decoding of RAID Stripe for Higher Endurance of Flash
Memory Based Solid State Drives” –
Ravi Motwani and Chong Ong (2015, Intel)
Flash Memory Summit 2016 | Santa Clara, CA 14
 XOR RAID
 LDPC codewords
 XOR page is a codeword
 Effectively a long code with
joint ECC and RAID
overprovisioning
Data Page 0 (ECC 0)
Data Page 1 (ECC 1)
Data Page 30 (ECC 30)
.
.
.
Parity Page 31
v1
v2
v3
v4
v5
v6
c1
c2
c3
c4
𝑮 𝟑𝟎
v1
v2
v3
v4
v5
v6
c1
c2
c3
c4
𝑮 𝟎
c1
c2
c3
c4
c5
c6
v1
v2
v3
v4
v5
v6
c1
c2
c3
c4
𝑮 𝟏
v1
v2
v3
v4
v5
v6
c1
c2
c3
c4
𝑮 𝟑𝟏
.
.
.
Graph Representation
Flash Memory Summit 2016 | Santa Clara, CA 15
Recovery flow
v1
v2
v3
v4
v5
v6
c1
c2
c3
c4
v1
v2
v3
v4
v5
v6
c1
c2
c3
variables checks
c4
𝑮 𝟑𝟎
𝑮 𝟎
𝑮 𝟑𝟏
c1
c2
c3
c4
c5
c6
𝑮 𝟏
v1
v2
v3
v4
v5
v6
c1
c2
c3
c4
v1
v2
v3
v4
v5
v6
c1
c2
c3
c4
𝑮 𝟑𝟏
𝑮 𝟎
𝑬 𝟎
𝑬 𝟑𝟎
𝑬 𝟑𝟏𝑻 𝟏
𝑮 𝟏
𝑬 𝟎
𝑬 𝟏 𝑬 𝟑𝟏
𝑻 𝟑𝟎
𝑮 𝟑𝟎
𝑷 𝟎
𝑷 𝟏
𝑷 𝟑𝟎
𝑷 𝟑𝟏
𝑇30 = 𝜑−1
𝑗30 𝜑 𝐸𝑗 ,𝑇1 = 𝜑−1
𝑗1 𝜑 𝐸𝑗 ,
.
.
.
𝑮 𝟏
𝑮 𝟑𝟎
Flash Memory Summit 2016 | Santa Clara, CA 16
Pros and Cons
Pros:
 Enhanced correction capability
Cons:
 High cost and complexity
– RAM (Storing 𝐸0, … , 𝐸31)
– Soft XOR instead of XOR
– Latency
𝑃𝑖
-
𝑄𝑖𝑛𝑖
𝑇𝑖
𝑄𝑜𝑢𝑡𝑖
𝐸𝑖
+ 𝐿𝐷𝑃𝐶𝑖
+ …
𝐸0
𝐸31
SXOR
𝑇𝑖 = 𝜑−1
𝑗𝑖 𝜑 𝐸𝑗 ,
𝜑 𝑥 = {sign 𝑥 , − log tanh
𝑥
2
}
𝑄𝑜𝑢𝑡𝑖
Flash Memory Summit 2016 | Santa Clara, CA 17
Simple joint RAID & ECC
 Simple variant using standard
hardware:
– XOR page as “Virtual” Soft Bit
page
– Dedicated LLR table emulates
LLR summation
Standard
LDPC
Standard
XOR
LLR
Table
Virtual Soft Bit
SBs
NAND
CorrectedHardBit
Flash Memory Summit 2016 | Santa Clara, CA 18
UBER improvement
X 1.5 correction
capability
X 2 correction capability
Low High
Flash Memory Summit 2016 | Santa Clara, CA 19
Existing versus New
1st failure
+
…
𝐸0
𝐸31
XOR
2nd failure
Data loss
𝐿𝐷𝑃𝐶𝑖 Standard
LDPC
Standard
XOR
LLR
Table
Virtual Soft Bit
SBs
NAND
CorrectedHardBit
 Independent LDPC &
RAID
 Single failure recovery
 Joint LDPC & RAID
 Standard HW
 Correcting up to 32 failures
 Substantially reduces UBER
Flash Memory Summit 2016 | Santa Clara, CA 20
Joint Hard Decoder and RAID
Flash Memory Summit 2016 | Santa Clara, CA 21
BCH (Bose, Chaudhuri, Hocquenghem)
 Simple hardware
 Constant latency
 Can not use soft information
 Lower correction capability
RBERECCFailureProbability
100%
BCH
LDPC using soft
information
> X 3 correction capabilities
Flash Memory Summit 2016 | Santa Clara, CA 22
 Soft-Bit read (+/-∆ around the read thresholds):
 Soft-Bit divides the cells population into two categories:
– Population of reliable cells, exhibiting low BER
– Population of unreliable cells, exhibiting high BER
Generating Soft Information
less reliable less reliable less reliable
Flash Memory Summit 2016 | Santa Clara, CA 23
Codeword recovered from XOR
BERXOR = ½ ∙(1-(1-2∙RBER)k) ≈
k ∙ RBER
BCH Fails decoding
Joint Hard Decoding and RAID
Codeword read from Flash
RBER
BCH Fails decoding
Flash Memory Summit 2016 | Santa Clara, CA 24
Codeword recovered from XOR
BERXOR = ½ ∙(1-(1-2∙RBER)k) ≈
k ∙ RBER
BCH Fails decoding
Joint Hard Decoding and RAID
Codeword read from Flash
RBER
BCH Fails decoding
Codeword read from Flash
RBER = α∙phigh + (1-α)∙plow
High RBER (phigh) Low RBER (plow)
Read SB indicating unreliable cells
Flash Memory Summit 2016 | Santa Clara, CA 25
Joint Hard Decoding and RAID
Combined codeword
RBERcombined = α∙ RBERXOR + (1-α)∙plow < RBER
Low RBER original CW Moderate RBER XOR CW
k ∙ BER
BCH Success
Flash Memory Summit 2016 | Santa Clara, CA 26
UBER improvement
X 1.5 correction capability
Flash Memory Summit 2016 | Santa Clara, CA 27
Summary
 Storage systems require very high reliability
 3-Dimensional stacking and process scaling increase RBER
variability, compromising reliability
 Joint RAID & ECC enhance reliability without adding cost:
– Soft Decoder – Low complexity joint RAID & LDPC
– Hard Decoder – Joint RAID & BCH
Flash Memory Summit 2016 | Santa Clara, CA 28
Summary
Raw Bit Error Rate
ECCFailureProbability
BCH LDPC
X 1.5
New: Joint
BCH&RAID
New: Joint
LDPC&RAID
X 1.5
Flash Memory Summit 2016 | Santa Clara, CA 29
Thank you!
Questions?
Contact: stella.achtenberg@sandisk.com
© 2016 Western Digital Corporation or its affiliates. All rights reserved. SanDisk, SanDisk logo, iNAND and Lightning are trademarks of Western Digital Corporation or its affiliates, registered
in the U.S. and other countries.
Other brand names mentioned herein are for identification purposes only and may be the trademark(s) of their respective holder(s).

More Related Content

What's hot

Five Lessons in Distributed Databases
Five Lessons  in Distributed DatabasesFive Lessons  in Distributed Databases
Five Lessons in Distributed Databasesjbellis
 
Empowering the AWS DynamoDB™ application developer with Alternator
Empowering the AWS DynamoDB™ application developer with AlternatorEmpowering the AWS DynamoDB™ application developer with Alternator
Empowering the AWS DynamoDB™ application developer with AlternatorScyllaDB
 
Powering a Graph Data System with Scylla + JanusGraph
Powering a Graph Data System with Scylla + JanusGraphPowering a Graph Data System with Scylla + JanusGraph
Powering a Graph Data System with Scylla + JanusGraphScyllaDB
 
23 October 2013 - AWS 201 - A Walk through the AWS Cloud: Introduction to Ama...
23 October 2013 - AWS 201 - A Walk through the AWS Cloud: Introduction to Ama...23 October 2013 - AWS 201 - A Walk through the AWS Cloud: Introduction to Ama...
23 October 2013 - AWS 201 - A Walk through the AWS Cloud: Introduction to Ama...Amazon Web Services
 
Cassandra and Spark
Cassandra and SparkCassandra and Spark
Cassandra and Sparknickmbailey
 
Managing Cassandra at Scale by Al Tobey
Managing Cassandra at Scale by Al TobeyManaging Cassandra at Scale by Al Tobey
Managing Cassandra at Scale by Al TobeyDataStax Academy
 
Addressing the High Cost of Apache Cassandra
Addressing the High Cost of Apache CassandraAddressing the High Cost of Apache Cassandra
Addressing the High Cost of Apache CassandraScyllaDB
 
Lessons Learned on Java Tuning for Our Cassandra Clusters (Carlos Monroy, Kne...
Lessons Learned on Java Tuning for Our Cassandra Clusters (Carlos Monroy, Kne...Lessons Learned on Java Tuning for Our Cassandra Clusters (Carlos Monroy, Kne...
Lessons Learned on Java Tuning for Our Cassandra Clusters (Carlos Monroy, Kne...DataStax
 
Deletes Without Tombstones or TTLs (Eric Stevens, ProtectWise) | Cassandra Su...
Deletes Without Tombstones or TTLs (Eric Stevens, ProtectWise) | Cassandra Su...Deletes Without Tombstones or TTLs (Eric Stevens, ProtectWise) | Cassandra Su...
Deletes Without Tombstones or TTLs (Eric Stevens, ProtectWise) | Cassandra Su...DataStax
 
NoSQL and NewSQL: Tradeoffs between Scalable Performance & Consistency
NoSQL and NewSQL: Tradeoffs between Scalable Performance & ConsistencyNoSQL and NewSQL: Tradeoffs between Scalable Performance & Consistency
NoSQL and NewSQL: Tradeoffs between Scalable Performance & ConsistencyScyllaDB
 
More Algorithms and Tools for Genomic Analysis on Apache Spark with Ryan Will...
More Algorithms and Tools for Genomic Analysis on Apache Spark with Ryan Will...More Algorithms and Tools for Genomic Analysis on Apache Spark with Ryan Will...
More Algorithms and Tools for Genomic Analysis on Apache Spark with Ryan Will...Databricks
 
Scylla Summit 2018: Keynote - 4 Years of Scylla
Scylla Summit 2018: Keynote - 4 Years of ScyllaScylla Summit 2018: Keynote - 4 Years of Scylla
Scylla Summit 2018: Keynote - 4 Years of ScyllaScyllaDB
 
Webinar: Using Control Theory to Keep Compactions Under Control
Webinar: Using Control Theory to Keep Compactions Under ControlWebinar: Using Control Theory to Keep Compactions Under Control
Webinar: Using Control Theory to Keep Compactions Under ControlScyllaDB
 
Tales from Taming the Long Tail
Tales from Taming the Long TailTales from Taming the Long Tail
Tales from Taming the Long TailHBaseCon
 
RocksDB storage engine for MySQL and MongoDB
RocksDB storage engine for MySQL and MongoDBRocksDB storage engine for MySQL and MongoDB
RocksDB storage engine for MySQL and MongoDBIgor Canadi
 
How to build leakproof stream processing pipelines with Apache Kafka and Apac...
How to build leakproof stream processing pipelines with Apache Kafka and Apac...How to build leakproof stream processing pipelines with Apache Kafka and Apac...
How to build leakproof stream processing pipelines with Apache Kafka and Apac...Cloudera, Inc.
 
NewSQL - The Future of Databases?
NewSQL - The Future of Databases?NewSQL - The Future of Databases?
NewSQL - The Future of Databases?Elvis Saravia
 
Scylla Summit 2018: Scalable Stream Processing with KSQL, Kafka and ScyllaDB
Scylla Summit 2018: Scalable Stream Processing with KSQL, Kafka and ScyllaDBScylla Summit 2018: Scalable Stream Processing with KSQL, Kafka and ScyllaDB
Scylla Summit 2018: Scalable Stream Processing with KSQL, Kafka and ScyllaDBScyllaDB
 
NewSQL: The Best of Both "OldSQL" and "NoSQL"
NewSQL: The Best of Both "OldSQL" and "NoSQL"NewSQL: The Best of Both "OldSQL" and "NoSQL"
NewSQL: The Best of Both "OldSQL" and "NoSQL"Sushant Choudhary
 

What's hot (20)

Five Lessons in Distributed Databases
Five Lessons  in Distributed DatabasesFive Lessons  in Distributed Databases
Five Lessons in Distributed Databases
 
Empowering the AWS DynamoDB™ application developer with Alternator
Empowering the AWS DynamoDB™ application developer with AlternatorEmpowering the AWS DynamoDB™ application developer with Alternator
Empowering the AWS DynamoDB™ application developer with Alternator
 
Powering a Graph Data System with Scylla + JanusGraph
Powering a Graph Data System with Scylla + JanusGraphPowering a Graph Data System with Scylla + JanusGraph
Powering a Graph Data System with Scylla + JanusGraph
 
23 October 2013 - AWS 201 - A Walk through the AWS Cloud: Introduction to Ama...
23 October 2013 - AWS 201 - A Walk through the AWS Cloud: Introduction to Ama...23 October 2013 - AWS 201 - A Walk through the AWS Cloud: Introduction to Ama...
23 October 2013 - AWS 201 - A Walk through the AWS Cloud: Introduction to Ama...
 
Cassandra and Spark
Cassandra and SparkCassandra and Spark
Cassandra and Spark
 
Managing Cassandra at Scale by Al Tobey
Managing Cassandra at Scale by Al TobeyManaging Cassandra at Scale by Al Tobey
Managing Cassandra at Scale by Al Tobey
 
Write behind logging
Write behind loggingWrite behind logging
Write behind logging
 
Addressing the High Cost of Apache Cassandra
Addressing the High Cost of Apache CassandraAddressing the High Cost of Apache Cassandra
Addressing the High Cost of Apache Cassandra
 
Lessons Learned on Java Tuning for Our Cassandra Clusters (Carlos Monroy, Kne...
Lessons Learned on Java Tuning for Our Cassandra Clusters (Carlos Monroy, Kne...Lessons Learned on Java Tuning for Our Cassandra Clusters (Carlos Monroy, Kne...
Lessons Learned on Java Tuning for Our Cassandra Clusters (Carlos Monroy, Kne...
 
Deletes Without Tombstones or TTLs (Eric Stevens, ProtectWise) | Cassandra Su...
Deletes Without Tombstones or TTLs (Eric Stevens, ProtectWise) | Cassandra Su...Deletes Without Tombstones or TTLs (Eric Stevens, ProtectWise) | Cassandra Su...
Deletes Without Tombstones or TTLs (Eric Stevens, ProtectWise) | Cassandra Su...
 
NoSQL and NewSQL: Tradeoffs between Scalable Performance & Consistency
NoSQL and NewSQL: Tradeoffs between Scalable Performance & ConsistencyNoSQL and NewSQL: Tradeoffs between Scalable Performance & Consistency
NoSQL and NewSQL: Tradeoffs between Scalable Performance & Consistency
 
More Algorithms and Tools for Genomic Analysis on Apache Spark with Ryan Will...
More Algorithms and Tools for Genomic Analysis on Apache Spark with Ryan Will...More Algorithms and Tools for Genomic Analysis on Apache Spark with Ryan Will...
More Algorithms and Tools for Genomic Analysis on Apache Spark with Ryan Will...
 
Scylla Summit 2018: Keynote - 4 Years of Scylla
Scylla Summit 2018: Keynote - 4 Years of ScyllaScylla Summit 2018: Keynote - 4 Years of Scylla
Scylla Summit 2018: Keynote - 4 Years of Scylla
 
Webinar: Using Control Theory to Keep Compactions Under Control
Webinar: Using Control Theory to Keep Compactions Under ControlWebinar: Using Control Theory to Keep Compactions Under Control
Webinar: Using Control Theory to Keep Compactions Under Control
 
Tales from Taming the Long Tail
Tales from Taming the Long TailTales from Taming the Long Tail
Tales from Taming the Long Tail
 
RocksDB storage engine for MySQL and MongoDB
RocksDB storage engine for MySQL and MongoDBRocksDB storage engine for MySQL and MongoDB
RocksDB storage engine for MySQL and MongoDB
 
How to build leakproof stream processing pipelines with Apache Kafka and Apac...
How to build leakproof stream processing pipelines with Apache Kafka and Apac...How to build leakproof stream processing pipelines with Apache Kafka and Apac...
How to build leakproof stream processing pipelines with Apache Kafka and Apac...
 
NewSQL - The Future of Databases?
NewSQL - The Future of Databases?NewSQL - The Future of Databases?
NewSQL - The Future of Databases?
 
Scylla Summit 2018: Scalable Stream Processing with KSQL, Kafka and ScyllaDB
Scylla Summit 2018: Scalable Stream Processing with KSQL, Kafka and ScyllaDBScylla Summit 2018: Scalable Stream Processing with KSQL, Kafka and ScyllaDB
Scylla Summit 2018: Scalable Stream Processing with KSQL, Kafka and ScyllaDB
 
NewSQL: The Best of Both "OldSQL" and "NoSQL"
NewSQL: The Best of Both "OldSQL" and "NoSQL"NewSQL: The Best of Both "OldSQL" and "NoSQL"
NewSQL: The Best of Both "OldSQL" and "NoSQL"
 

Viewers also liked

Business growth model
Business growth modelBusiness growth model
Business growth modelVicki George
 
Open Source Software, How the Flash Industry Can Use It Effectively
Open Source Software, How the Flash Industry Can Use It EffectivelyOpen Source Software, How the Flash Industry Can Use It Effectively
Open Source Software, How the Flash Industry Can Use It EffectivelyJonathan Long
 
הערך העסקי של טכנולוגיות ווב 2.0
הערך העסקי של טכנולוגיות ווב 2.0הערך העסקי של טכנולוגיות ווב 2.0
הערך העסקי של טכנולוגיות ווב 2.0reballattoun
 
The breathing house of herzu
The breathing house of herzuThe breathing house of herzu
The breathing house of herzuherzulife
 
RSS כיצד להשתמש ב
RSS כיצד להשתמש ב RSS כיצד להשתמש ב
RSS כיצד להשתמש ב reballattoun
 
RSS כיצד להשתמש ב
RSS כיצד להשתמש ב RSS כיצד להשתמש ב
RSS כיצד להשתמש ב reballattoun
 
Rethinking Storage Infrastructures by Utilizing the Value of Flash
Rethinking Storage Infrastructures by Utilizing the Value of FlashRethinking Storage Infrastructures by Utilizing the Value of Flash
Rethinking Storage Infrastructures by Utilizing the Value of FlashJonathan Long
 
Optimizing SSD Architecture for Client Workloads
Optimizing SSD Architecture for Client WorkloadsOptimizing SSD Architecture for Client Workloads
Optimizing SSD Architecture for Client WorkloadsJonathan Long
 
Is the World Ready for Big Data Flash?
Is the World Ready for Big Data Flash?Is the World Ready for Big Data Flash?
Is the World Ready for Big Data Flash?Jonathan Long
 
Mục lục (autosaved)
Mục lục (autosaved)Mục lục (autosaved)
Mục lục (autosaved)haipham155
 
2010和築雅聚
2010和築雅聚2010和築雅聚
2010和築雅聚herzulife
 
RSS כיצד להשתמש ב
RSS כיצד להשתמש ב RSS כיצד להשתמש ב
RSS כיצד להשתמש ב reballattoun
 
הערך העסקי של טכנולוגיות ווב 2.0
הערך העסקי של טכנולוגיות ווב 2.0הערך העסקי של טכנולוגיות ווב 2.0
הערך העסקי של טכנולוגיות ווב 2.0reballattoun
 
RSS כיצד להשתמש ב
 RSS כיצד להשתמש ב RSS כיצד להשתמש ב
RSS כיצד להשתמש בreballattoun
 
רסס וספריות
רסס וספריותרסס וספריות
רסס וספריותreballattoun
 
Biện pháp nâng cao chất lượng dịch vụ mạng gsm
Biện pháp nâng cao chất lượng dịch vụ mạng gsmBiện pháp nâng cao chất lượng dịch vụ mạng gsm
Biện pháp nâng cao chất lượng dịch vụ mạng gsmhaipham155
 
Ceph - High Performance Without High Costs
Ceph - High Performance Without High CostsCeph - High Performance Without High Costs
Ceph - High Performance Without High CostsJonathan Long
 
Danh mục bảng biểu
Danh mục bảng biểuDanh mục bảng biểu
Danh mục bảng biểuhaipham155
 

Viewers also liked (19)

Business growth model
Business growth modelBusiness growth model
Business growth model
 
Open Source Software, How the Flash Industry Can Use It Effectively
Open Source Software, How the Flash Industry Can Use It EffectivelyOpen Source Software, How the Flash Industry Can Use It Effectively
Open Source Software, How the Flash Industry Can Use It Effectively
 
הערך העסקי של טכנולוגיות ווב 2.0
הערך העסקי של טכנולוגיות ווב 2.0הערך העסקי של טכנולוגיות ווב 2.0
הערך העסקי של טכנולוגיות ווב 2.0
 
The breathing house of herzu
The breathing house of herzuThe breathing house of herzu
The breathing house of herzu
 
RSS כיצד להשתמש ב
RSS כיצד להשתמש ב RSS כיצד להשתמש ב
RSS כיצד להשתמש ב
 
RSS כיצד להשתמש ב
RSS כיצד להשתמש ב RSS כיצד להשתמש ב
RSS כיצד להשתמש ב
 
Rethinking Storage Infrastructures by Utilizing the Value of Flash
Rethinking Storage Infrastructures by Utilizing the Value of FlashRethinking Storage Infrastructures by Utilizing the Value of Flash
Rethinking Storage Infrastructures by Utilizing the Value of Flash
 
Optimizing SSD Architecture for Client Workloads
Optimizing SSD Architecture for Client WorkloadsOptimizing SSD Architecture for Client Workloads
Optimizing SSD Architecture for Client Workloads
 
Is the World Ready for Big Data Flash?
Is the World Ready for Big Data Flash?Is the World Ready for Big Data Flash?
Is the World Ready for Big Data Flash?
 
Mục lục (autosaved)
Mục lục (autosaved)Mục lục (autosaved)
Mục lục (autosaved)
 
2010和築雅聚
2010和築雅聚2010和築雅聚
2010和築雅聚
 
RSS כיצד להשתמש ב
RSS כיצד להשתמש ב RSS כיצד להשתמש ב
RSS כיצד להשתמש ב
 
הערך העסקי של טכנולוגיות ווב 2.0
הערך העסקי של טכנולוגיות ווב 2.0הערך העסקי של טכנולוגיות ווב 2.0
הערך העסקי של טכנולוגיות ווב 2.0
 
RSS כיצד להשתמש ב
 RSS כיצד להשתמש ב RSS כיצד להשתמש ב
RSS כיצד להשתמש ב
 
רסס וספריות
רסס וספריותרסס וספריות
רסס וספריות
 
Biện pháp nâng cao chất lượng dịch vụ mạng gsm
Biện pháp nâng cao chất lượng dịch vụ mạng gsmBiện pháp nâng cao chất lượng dịch vụ mạng gsm
Biện pháp nâng cao chất lượng dịch vụ mạng gsm
 
Ceph - High Performance Without High Costs
Ceph - High Performance Without High CostsCeph - High Performance Without High Costs
Ceph - High Performance Without High Costs
 
1
1 1
1
 
Danh mục bảng biểu
Danh mục bảng biểuDanh mục bảng biểu
Danh mục bảng biểu
 

Similar to Employing ECCs via Overprovisioning to Improve Flash Reliability:

SDC20 ScaleFlux.pptx
SDC20 ScaleFlux.pptxSDC20 ScaleFlux.pptx
SDC20 ScaleFlux.pptxssuserabc741
 
Life Beyond Flash - ReRAM for embedded and memory-centric architectures in Io...
Life Beyond Flash - ReRAM for embedded and memory-centric architectures in Io...Life Beyond Flash - ReRAM for embedded and memory-centric architectures in Io...
Life Beyond Flash - ReRAM for embedded and memory-centric architectures in Io...Crossbarinc
 
Storage and performance, Whiptail
Storage and performance, Whiptail Storage and performance, Whiptail
Storage and performance, Whiptail Internet World
 
Smart SSD Controller with Flexibility
Smart SSD Controller with FlexibilitySmart SSD Controller with Flexibility
Smart SSD Controller with Flexibility76coolio
 
FlashSQL 소개 & TechTalk
FlashSQL 소개 & TechTalkFlashSQL 소개 & TechTalk
FlashSQL 소개 & TechTalkI Goo Lee
 
Flash for the Real World – Separate Hype from Reality
Flash for the Real World – Separate Hype from RealityFlash for the Real World – Separate Hype from Reality
Flash for the Real World – Separate Hype from RealityHitachi Vantara
 
Getting Under the Hood of Kafka Streams: Optimizing Storage Engines to Tune U...
Getting Under the Hood of Kafka Streams: Optimizing Storage Engines to Tune U...Getting Under the Hood of Kafka Streams: Optimizing Storage Engines to Tune U...
Getting Under the Hood of Kafka Streams: Optimizing Storage Engines to Tune U...HostedbyConfluent
 
To Serverless and Beyond
To Serverless and BeyondTo Serverless and Beyond
To Serverless and BeyondScyllaDB
 
Running Apache Spark on a High-Performance Cluster Using RDMA and NVMe Flash ...
Running Apache Spark on a High-Performance Cluster Using RDMA and NVMe Flash ...Running Apache Spark on a High-Performance Cluster Using RDMA and NVMe Flash ...
Running Apache Spark on a High-Performance Cluster Using RDMA and NVMe Flash ...Databricks
 
Storage Spaces Direct - the new Microsoft SDS star - Carsten Rachfahl
Storage Spaces Direct - the new Microsoft SDS star - Carsten RachfahlStorage Spaces Direct - the new Microsoft SDS star - Carsten Rachfahl
Storage Spaces Direct - the new Microsoft SDS star - Carsten RachfahlITCamp
 
Ferri Embedded Storage
Ferri Embedded Storage Ferri Embedded Storage
Ferri Embedded Storage Silicon Motion
 
Lec11 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part3
Lec11 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part3Lec11 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part3
Lec11 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part3Hsien-Hsin Sean Lee, Ph.D.
 
Big Lab Problems Solved with Spectrum Scale: Innovations for the Coral Program
Big Lab Problems Solved with Spectrum Scale: Innovations for the Coral ProgramBig Lab Problems Solved with Spectrum Scale: Innovations for the Coral Program
Big Lab Problems Solved with Spectrum Scale: Innovations for the Coral Programinside-BigData.com
 
Need For Speed- Using Flash Storage to optimise performance and reduce costs-...
Need For Speed- Using Flash Storage to optimise performance and reduce costs-...Need For Speed- Using Flash Storage to optimise performance and reduce costs-...
Need For Speed- Using Flash Storage to optimise performance and reduce costs-...NetAppUK
 
Need for Speed: Using Flash Storage to Optimise Performance and Reduce Costs
Need for Speed: Using Flash Storage to Optimise Performance and Reduce CostsNeed for Speed: Using Flash Storage to Optimise Performance and Reduce Costs
Need for Speed: Using Flash Storage to Optimise Performance and Reduce CostsNetApp
 
2009-01-28 DOI NBC Red Hat on System z Performance Considerations
2009-01-28 DOI NBC Red Hat on System z Performance Considerations2009-01-28 DOI NBC Red Hat on System z Performance Considerations
2009-01-28 DOI NBC Red Hat on System z Performance ConsiderationsShawn Wells
 
5 Things You Need to Know About Enterprise Fl
 5 Things You Need to Know About Enterprise Fl 5 Things You Need to Know About Enterprise Fl
5 Things You Need to Know About Enterprise FlWestern Digital
 
Big Data Meets NVM: Accelerating Big Data Processing with Non-Volatile Memory...
Big Data Meets NVM: Accelerating Big Data Processing with Non-Volatile Memory...Big Data Meets NVM: Accelerating Big Data Processing with Non-Volatile Memory...
Big Data Meets NVM: Accelerating Big Data Processing with Non-Volatile Memory...DataWorks Summit
 
Oracle RAC - New Generation
Oracle RAC - New GenerationOracle RAC - New Generation
Oracle RAC - New GenerationAnil Nair
 

Similar to Employing ECCs via Overprovisioning to Improve Flash Reliability: (20)

SDC20 ScaleFlux.pptx
SDC20 ScaleFlux.pptxSDC20 ScaleFlux.pptx
SDC20 ScaleFlux.pptx
 
Life Beyond Flash - ReRAM for embedded and memory-centric architectures in Io...
Life Beyond Flash - ReRAM for embedded and memory-centric architectures in Io...Life Beyond Flash - ReRAM for embedded and memory-centric architectures in Io...
Life Beyond Flash - ReRAM for embedded and memory-centric architectures in Io...
 
Storage and performance, Whiptail
Storage and performance, Whiptail Storage and performance, Whiptail
Storage and performance, Whiptail
 
FlashMemorySummit_2015_NVMFS
FlashMemorySummit_2015_NVMFSFlashMemorySummit_2015_NVMFS
FlashMemorySummit_2015_NVMFS
 
Smart SSD Controller with Flexibility
Smart SSD Controller with FlexibilitySmart SSD Controller with Flexibility
Smart SSD Controller with Flexibility
 
FlashSQL 소개 & TechTalk
FlashSQL 소개 & TechTalkFlashSQL 소개 & TechTalk
FlashSQL 소개 & TechTalk
 
Flash for the Real World – Separate Hype from Reality
Flash for the Real World – Separate Hype from RealityFlash for the Real World – Separate Hype from Reality
Flash for the Real World – Separate Hype from Reality
 
Getting Under the Hood of Kafka Streams: Optimizing Storage Engines to Tune U...
Getting Under the Hood of Kafka Streams: Optimizing Storage Engines to Tune U...Getting Under the Hood of Kafka Streams: Optimizing Storage Engines to Tune U...
Getting Under the Hood of Kafka Streams: Optimizing Storage Engines to Tune U...
 
To Serverless and Beyond
To Serverless and BeyondTo Serverless and Beyond
To Serverless and Beyond
 
Running Apache Spark on a High-Performance Cluster Using RDMA and NVMe Flash ...
Running Apache Spark on a High-Performance Cluster Using RDMA and NVMe Flash ...Running Apache Spark on a High-Performance Cluster Using RDMA and NVMe Flash ...
Running Apache Spark on a High-Performance Cluster Using RDMA and NVMe Flash ...
 
Storage Spaces Direct - the new Microsoft SDS star - Carsten Rachfahl
Storage Spaces Direct - the new Microsoft SDS star - Carsten RachfahlStorage Spaces Direct - the new Microsoft SDS star - Carsten Rachfahl
Storage Spaces Direct - the new Microsoft SDS star - Carsten Rachfahl
 
Ferri Embedded Storage
Ferri Embedded Storage Ferri Embedded Storage
Ferri Embedded Storage
 
Lec11 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part3
Lec11 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part3Lec11 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part3
Lec11 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part3
 
Big Lab Problems Solved with Spectrum Scale: Innovations for the Coral Program
Big Lab Problems Solved with Spectrum Scale: Innovations for the Coral ProgramBig Lab Problems Solved with Spectrum Scale: Innovations for the Coral Program
Big Lab Problems Solved with Spectrum Scale: Innovations for the Coral Program
 
Need For Speed- Using Flash Storage to optimise performance and reduce costs-...
Need For Speed- Using Flash Storage to optimise performance and reduce costs-...Need For Speed- Using Flash Storage to optimise performance and reduce costs-...
Need For Speed- Using Flash Storage to optimise performance and reduce costs-...
 
Need for Speed: Using Flash Storage to Optimise Performance and Reduce Costs
Need for Speed: Using Flash Storage to Optimise Performance and Reduce CostsNeed for Speed: Using Flash Storage to Optimise Performance and Reduce Costs
Need for Speed: Using Flash Storage to Optimise Performance and Reduce Costs
 
2009-01-28 DOI NBC Red Hat on System z Performance Considerations
2009-01-28 DOI NBC Red Hat on System z Performance Considerations2009-01-28 DOI NBC Red Hat on System z Performance Considerations
2009-01-28 DOI NBC Red Hat on System z Performance Considerations
 
5 Things You Need to Know About Enterprise Fl
 5 Things You Need to Know About Enterprise Fl 5 Things You Need to Know About Enterprise Fl
5 Things You Need to Know About Enterprise Fl
 
Big Data Meets NVM: Accelerating Big Data Processing with Non-Volatile Memory...
Big Data Meets NVM: Accelerating Big Data Processing with Non-Volatile Memory...Big Data Meets NVM: Accelerating Big Data Processing with Non-Volatile Memory...
Big Data Meets NVM: Accelerating Big Data Processing with Non-Volatile Memory...
 
Oracle RAC - New Generation
Oracle RAC - New GenerationOracle RAC - New Generation
Oracle RAC - New Generation
 

Recently uploaded

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Employing ECCs via Overprovisioning to Improve Flash Reliability:

  • 1. Flash Memory Summit 2016 | Santa Clara, CA 1c Stella Achtenberg, Eran Sharon, Idan Alrod Employing ECCs via Overprovisioning to Improve Flash Reliability: A New, Cost Efficient Approach Advanced Memory Solutions, 3-8-2016 1 Flash Memory Summit 2016 | Santa Clara, CA
  • 2. Flash Memory Summit 2016 | Santa Clara, CA 2 NAND Memory Enterprise SSD Client SSD Mobile
  • 3. Flash Memory Summit 2016 | Santa Clara, CA 3 Handling Random Errors DSP techniquesAdvanced ECC Second Level Error Correction Errors 1e-11e-21 Raw NAND Many ErrorsFew Errors
  • 4. Flash Memory Summit 2016 | Santa Clara, CA 4 NAND Memory
  • 5. Flash Memory Summit 2016 | Santa Clara, CA 5 RAID Example
  • 6. Flash Memory Summit 2016 | Santa Clara, CA 6 Handling Physical Defects Overprovisioning RAID Reliability Performance
  • 7. Flash Memory Summit 2016 | Santa Clara, CA 7 Storage Reliability Requirements  A metric for occurrence of data errors per bits read: 𝑈𝐵𝐸𝑅 = 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑑𝑎𝑡𝑎 𝑒𝑟𝑟𝑜𝑟𝑠 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑏𝑖𝑡𝑠 𝑟𝑒𝑎𝑑  Extremely Low UBER requirements < 𝟏𝟎−18  DPPM = Defective Parts per Million Enterprise SSD Client SSD
  • 8. Flash Memory Summit 2016 | Santa Clara, CA 8 Problem statement 3-Dimensional stacking and process scaling increase RBER variability < 𝟏𝟎−18 Less reliability < 𝟏𝟎−18 Low High
  • 9. Flash Memory Summit 2016 | Santa Clara, CA 9 Overprovisioning potential RAID Overprovisioning ECC Overprovisioning Random Errors Physical Defects Joint RAID & ECC • Lower UBER/DPPM • Higher Endurance
  • 10. Flash Memory Summit 2016 | Santa Clara, CA 10 Case study: 32 Die XOR RAID Data Page 0 (ECC 0) Data Page 1 (ECC 1) Data Page 30 (ECC 30) . . . Parity Page 31
  • 11. Flash Memory Summit 2016 | Santa Clara, CA 11 Current solution  Decode using soft information  In case of failure, decode the entire RAID stripe – Single error  Recovery – More than single error  UECC 1st failure + … 𝐸0 𝐸31 XOR 2nd failure UECC (Data loss) 𝐿𝐷𝑃𝐶𝑖
  • 12. Flash Memory Summit 2016 | Santa Clara, CA 12 New methodology  Optimal information exchange between RAID & LDPC – Extrinsic “soft” LDPC output  into the RAID – Updated “soft” RAID output  back to the LDPC – Iterate until convergence or timeout 𝑃𝑖 - 𝑄𝑖𝑛𝑖 𝑇𝑖 𝑄𝑜𝑢𝑡𝑖 𝐸𝑖 + 𝐿𝐷𝑃𝐶𝑖 + … 𝐸0 𝐸31 SXOR 𝑇𝑖 = 𝜑−1 𝑗𝑖 𝜑 𝐸𝑗 , 𝜑 𝑥 = {sign 𝑥 , − log tanh 𝑥 2 } 𝑄𝑜𝑢𝑡𝑖
  • 13. Flash Memory Summit 2016 | Santa Clara, CA 13 Previous Work “Error Correction Using Multiple Data Sources” – US patent application by Sharon et al (2014, SanDisk) “Soft Decision Decoding of RAID Stripe for Higher Endurance of Flash Memory Based Solid State Drives” – Ravi Motwani and Chong Ong (2015, Intel)
  • 14. Flash Memory Summit 2016 | Santa Clara, CA 14  XOR RAID  LDPC codewords  XOR page is a codeword  Effectively a long code with joint ECC and RAID overprovisioning Data Page 0 (ECC 0) Data Page 1 (ECC 1) Data Page 30 (ECC 30) . . . Parity Page 31 v1 v2 v3 v4 v5 v6 c1 c2 c3 c4 𝑮 𝟑𝟎 v1 v2 v3 v4 v5 v6 c1 c2 c3 c4 𝑮 𝟎 c1 c2 c3 c4 c5 c6 v1 v2 v3 v4 v5 v6 c1 c2 c3 c4 𝑮 𝟏 v1 v2 v3 v4 v5 v6 c1 c2 c3 c4 𝑮 𝟑𝟏 . . . Graph Representation
  • 15. Flash Memory Summit 2016 | Santa Clara, CA 15 Recovery flow v1 v2 v3 v4 v5 v6 c1 c2 c3 c4 v1 v2 v3 v4 v5 v6 c1 c2 c3 variables checks c4 𝑮 𝟑𝟎 𝑮 𝟎 𝑮 𝟑𝟏 c1 c2 c3 c4 c5 c6 𝑮 𝟏 v1 v2 v3 v4 v5 v6 c1 c2 c3 c4 v1 v2 v3 v4 v5 v6 c1 c2 c3 c4 𝑮 𝟑𝟏 𝑮 𝟎 𝑬 𝟎 𝑬 𝟑𝟎 𝑬 𝟑𝟏𝑻 𝟏 𝑮 𝟏 𝑬 𝟎 𝑬 𝟏 𝑬 𝟑𝟏 𝑻 𝟑𝟎 𝑮 𝟑𝟎 𝑷 𝟎 𝑷 𝟏 𝑷 𝟑𝟎 𝑷 𝟑𝟏 𝑇30 = 𝜑−1 𝑗30 𝜑 𝐸𝑗 ,𝑇1 = 𝜑−1 𝑗1 𝜑 𝐸𝑗 , . . . 𝑮 𝟏 𝑮 𝟑𝟎
  • 16. Flash Memory Summit 2016 | Santa Clara, CA 16 Pros and Cons Pros:  Enhanced correction capability Cons:  High cost and complexity – RAM (Storing 𝐸0, … , 𝐸31) – Soft XOR instead of XOR – Latency 𝑃𝑖 - 𝑄𝑖𝑛𝑖 𝑇𝑖 𝑄𝑜𝑢𝑡𝑖 𝐸𝑖 + 𝐿𝐷𝑃𝐶𝑖 + … 𝐸0 𝐸31 SXOR 𝑇𝑖 = 𝜑−1 𝑗𝑖 𝜑 𝐸𝑗 , 𝜑 𝑥 = {sign 𝑥 , − log tanh 𝑥 2 } 𝑄𝑜𝑢𝑡𝑖
  • 17. Flash Memory Summit 2016 | Santa Clara, CA 17 Simple joint RAID & ECC  Simple variant using standard hardware: – XOR page as “Virtual” Soft Bit page – Dedicated LLR table emulates LLR summation Standard LDPC Standard XOR LLR Table Virtual Soft Bit SBs NAND CorrectedHardBit
  • 18. Flash Memory Summit 2016 | Santa Clara, CA 18 UBER improvement X 1.5 correction capability X 2 correction capability Low High
  • 19. Flash Memory Summit 2016 | Santa Clara, CA 19 Existing versus New 1st failure + … 𝐸0 𝐸31 XOR 2nd failure Data loss 𝐿𝐷𝑃𝐶𝑖 Standard LDPC Standard XOR LLR Table Virtual Soft Bit SBs NAND CorrectedHardBit  Independent LDPC & RAID  Single failure recovery  Joint LDPC & RAID  Standard HW  Correcting up to 32 failures  Substantially reduces UBER
  • 20. Flash Memory Summit 2016 | Santa Clara, CA 20 Joint Hard Decoder and RAID
  • 21. Flash Memory Summit 2016 | Santa Clara, CA 21 BCH (Bose, Chaudhuri, Hocquenghem)  Simple hardware  Constant latency  Can not use soft information  Lower correction capability RBERECCFailureProbability 100% BCH LDPC using soft information > X 3 correction capabilities
  • 22. Flash Memory Summit 2016 | Santa Clara, CA 22  Soft-Bit read (+/-∆ around the read thresholds):  Soft-Bit divides the cells population into two categories: – Population of reliable cells, exhibiting low BER – Population of unreliable cells, exhibiting high BER Generating Soft Information less reliable less reliable less reliable
  • 23. Flash Memory Summit 2016 | Santa Clara, CA 23 Codeword recovered from XOR BERXOR = ½ ∙(1-(1-2∙RBER)k) ≈ k ∙ RBER BCH Fails decoding Joint Hard Decoding and RAID Codeword read from Flash RBER BCH Fails decoding
  • 24. Flash Memory Summit 2016 | Santa Clara, CA 24 Codeword recovered from XOR BERXOR = ½ ∙(1-(1-2∙RBER)k) ≈ k ∙ RBER BCH Fails decoding Joint Hard Decoding and RAID Codeword read from Flash RBER BCH Fails decoding Codeword read from Flash RBER = α∙phigh + (1-α)∙plow High RBER (phigh) Low RBER (plow) Read SB indicating unreliable cells
  • 25. Flash Memory Summit 2016 | Santa Clara, CA 25 Joint Hard Decoding and RAID Combined codeword RBERcombined = α∙ RBERXOR + (1-α)∙plow < RBER Low RBER original CW Moderate RBER XOR CW k ∙ BER BCH Success
  • 26. Flash Memory Summit 2016 | Santa Clara, CA 26 UBER improvement X 1.5 correction capability
  • 27. Flash Memory Summit 2016 | Santa Clara, CA 27 Summary  Storage systems require very high reliability  3-Dimensional stacking and process scaling increase RBER variability, compromising reliability  Joint RAID & ECC enhance reliability without adding cost: – Soft Decoder – Low complexity joint RAID & LDPC – Hard Decoder – Joint RAID & BCH
  • 28. Flash Memory Summit 2016 | Santa Clara, CA 28 Summary Raw Bit Error Rate ECCFailureProbability BCH LDPC X 1.5 New: Joint BCH&RAID New: Joint LDPC&RAID X 1.5
  • 29. Flash Memory Summit 2016 | Santa Clara, CA 29 Thank you! Questions? Contact: stella.achtenberg@sandisk.com © 2016 Western Digital Corporation or its affiliates. All rights reserved. SanDisk, SanDisk logo, iNAND and Lightning are trademarks of Western Digital Corporation or its affiliates, registered in the U.S. and other countries. Other brand names mentioned herein are for identification purposes only and may be the trademark(s) of their respective holder(s).

Editor's Notes

  1. What if we could achieve 50% more flash reliability for the same cost? As high-end product requirements increase from generation to generation, and NAND cell distribution has higher variance due to process shrinking and 3-Dimentional stacking, reliability increase becomes a real need. High end products are designed to handle both random errors and colossal physical defects by employing two independent protection levels – the ECC and the RAID with dedicated overprovisioning for each. My focus today is how to get more with less. How to combine two existing protection levels and leverage this special combination by cost effective algorithms. One approach is based on performing iterative soft information exchange between the RAID and a soft decoding ECC such as LDPC. A second approach, enables utilization of soft information and the RAID overprovisioning for hard decoding ECC such as BCH. Both soft and hard joint decoding schemes provide 50% higher resilience to random errors, with the same overprovisioning.
  2. Substantial portion of the NVM storage market is the NAND storage. Lets use this 3-D building as an analogy to our Flash memory. The building is a die, each floor is a WL and each window a cell. NAND storage supplies solution to many product lines such as: Mobile, Client CSS, High End CSS and Enterprise. All product line have to be resilient to random errors. For example, three windows broke in our building. In order to repair the windows, the building has to be protected with Error Correcting code (ECC) which needs overprovisioning to correct errors.
  3. Raw NAND exhibits Raw Bit Error Rate, the RBER. It is caused by the cell voltage distribution which changes along to life time of the device with cycling and time. DSP techniques are reduce RBER, enabling the cost effective Error Correction Coding (ECC). Less RBER less Overprovisioning. Advanced ECC techniques ensure low error rate. In high end system a second protection level is employed to recover ECC failures, and further reducing error rate.
  4. For client and Enterprise SSD product lines, ECC alone might not provide sufficiently high reliability. These systems also have to handle physical detects such as WL failure (Click) or even an entire die failure (Click). To handle such failures an extra overprovisioning has to be put aside to recover. This type of overprovisioning is called-RAID - long known in the hard disk industry.
  5. One example of Raid could be to take several physical pages, and combine them into an external overprovisioning as a function of those physical pages Once we get a complete fail in one of these pages we use the other good pages and the extra overprovisioning in order to recover the data stored on the failing page
  6. RAID in our context stands for Redundant Array of Independent Dies. RAID presents tradeoffs between performance, overprovisioning and reliability. For example RAID 0 scheme employs parallel write and read to all the dies providing with high performance wo handle any defects. RAID 1 consists of data mirroring. Any read request can be serviced by any drive in the set, improving performance (latency). The array continues to operate as long as at least one drive is functioning. 50% overprovisioning is need making this scheme not cost effective. RAID 5 consists of block-level striping with distributed parity. RAID 6 consists of block-level striping with double distributed parity.
  7. Just to recall the flow: Voltage cell distribution causes RBER, which causes UBER. For such distributions most of the time the RBER is low and high performance and reliability is achieved. But in order to maintain extremely low UBER, the rare high RBER cases have to be handled as well. For this example distribution in order to maintain UBER bellow 10^-18, ECC needs to be able to correct up to this RBER. 3-Dimentional stacking and process scaling increase RBER variability, compromising reliability. For the new distribution a higher RBER values needs to be handled. One approach is to over-engineer and add additional overprovisioning to the ECC (which would increase the die cost). But can we do better than that? Can we utilize the existing overprovisioning without adding cost to the system?
  8. This amassing photograph of the grand canyon cliffs stand for the two independent protection levels – ECC and the RAID with dedicated overprovisioning for each. Significantly higher ECC correction capability by combining the two protection levels and leveraging the RAID overprovisioning by performing joint RAID and ECC information exchange. Once the entire overprovisioning is used by the ECC lower UBER and DPPM are achieved on one hand and higher endurance on the other hand (increasing endurance includes extending the specs for more cycling, data retention, read disturb and cross temperature.
  9. The best way to understand these concepts is to examine a case study. In this example we have 31 information dies and one overprovisioning dies which is the XOR of all the other dies One a page level - each page protected by ECC LDPC, having 10% overprovisioning Single XOR page for every 31 data pages having, 3% overprovisioning
  10. The bottom line is that this scheme can correct only one error in a stripe
  11. The bottom line is that this scheme can correct only one error in a stripe
  12. Error Correction Using Multiple Data Sources discloses error correction capability of a data storage device improved by combining multiple inputs of data having different reliabilities in order to generate a combined input to a decoder of the data storage device. For example, the data storage device may replace unreliable bits of a first logical page with bits of a second logical page to generate the combined input. If the multiple inputs are combined prior to attempting to decode any of the multiple inputs, reliability of the inputs is taken into account prior to initiating a decoding operation. The techniques illustrated herein may therefore enable use of reliability information in connection with a "hard" decoder, such as a hard Bose-Chaudhuri-Hocquenghem (BCH) decoder, that does not use soft bit information. Alternatively or in addition, techniques of the present disclosure may be used to increase error correction capability of a soft decoder.
  13. The XOR RAID is based on two 32 page stripes, one across even planes and one across odd planes. This means that for every 31 data pages, one extra XOR parity page is stored. Each data page is protected by its own LDPC codeword C with ~X% redundancy, represented by a bipartite graph 𝐺. So we have the bits in red, and the parity checks in blue. The graph defines the parity check constraints that each bit has to satisfy. Each ECC is decoded iteratively by exchanging reliability information between the bits and their parity check constraints The RAID introduces an extra XOR codeword 𝐶 31 (represented by 𝐺 31 ), incurring additional ~3% redundancy: 𝐶 31 = 𝐶 0 +…+ 𝐶 30 Enhanced correction capability can be achieved by iteratively decoding the unified graph 𝐺 0 ,…, 𝐺 31 with ~X+3% redundancy. The unified graph has Enhanced correction capability It also has longer code length, which provides better code qualities.
  14. The suboptimal approach sacrifices the extrinsic information exchange to save complexity and RAM. Use the “hard” RAID XOR page as a “virtual” SB page that is fed into the LDPC with special LLR tables Pros: Low cost and complexity No additional RAM Hard XOR Low latency Cons: Compromising correction capability
  15. So far we have talked about information exchange between RAID and LDPC. This exchange is based on soft reliability information as LDPC is a soft decoder. But what about systems employing hard ECC decoder? Our next challenge is finding a way to exchange information between RAID and hard ECC decoder despite hard decoders cannot directly use soft reliability information.
  16. An example of hard decoder is a BCH code. BCH decoders are very fast and have simple HW implementations. However BCH cannot utilize soft information hence have low correction capability, 3 times lower than LDPC with the same overprovisioning. This is also an obstacle if we what to exchange information between RAID and ECC.
  17. Lets recall what soft information is: Assume that we have 4 states with 4 cell voltage distributions. Read thresholds distinguish between the different states. Cells with voltage far from the read threshold are reliable cells and have very low BER. Cells near the read threshold are unreliable cells exhibiting high BER. By sensing in +-delta around the read threshold, cells are divided into two distinct populations – the reliable cells and unreliable cells. The Soft-Bit page identifies error prone cells.