News
3/28/2011
03:11 PM
George Crump
George Crump
Commentary
50%
50%

Collecting The SSD Garbage

Solid state storage (SSS) is the performance alternative to mechanical hard disk drives (HDD). Flash memory, thanks to its reduced cost compared to DRAM, has become the primary way the (SSS) is delivered. Suppliers of flash systems, especially in the enterprise, have to overcome two flash deficiencies that, as we discussed in our last entry, will cause unpredictable performance and reduce reliability.

Solid state storage (SSS) is the performance alternative to mechanical hard disk drives (HDD). Flash memory, thanks to its reduced cost compared to DRAM, has become the primary way the (SSS) is delivered. Suppliers of flash systems, especially in the enterprise, have to overcome two flash deficiencies that, as we discussed in our last entry, will cause unpredictable performance and reduce reliability. In this entry we'll focus on how vendors are providing predictable performance.As we discussed in our last entry when a Flash memory cell needs to be written to it needs to be erased first. This erase is done essentially by a "write" that reprograms the cell, then the cell can be written to. When flash storage is first used it does not contain any data so there are no erase steps involved. As a result performance out of the box is excellent for almost any flash device. Over time of course you use the drive reading, writing and deleting data as you go. As the device begins to run out of unused flash cell blocks to write new data to it begins to look for old cells that have been marked for deletion. Eventually, there are only cells with either active or old data, there are no totally unused cells. The drive can only stay fresh for so long From that point forward every time new data needs to be written to disk an old cell must be cleared out. As a result write performance will drop off dramatically.

To get around this problem most flash based storage systems have a process called garbage collection which pre-clears old memory areas so that on a write the only thing that the flash controller has to do is write the new data chunk. This process runs in the background on the storage device, driven by the flash's controllers. This should fix long term performance problems in most systems, since once the garbage collection process runs you should see predictable performance from your SSS. The problem is that under heavy write conditions that garbage collection process may not be able to keep ahead of the inbound writes.

When write activity is high, that also means there is a lot of data being marked for deletion and it means the garbage collection process has to work hard to find those cells eligible for pre-erase. Using flash SSS as a cache area is a good example of when this might happen. In a cache the data is constantly being turned over as different data sets are promoted into cache while others are demoted (which means erased from cache but they are not cleared via a garbage collection process). Regardless of the use case, when the garbage collection process can not keep up with the write activity, performance will suffer. The challenge facing the data center is that they can't predict with any accuracy when that might occur. Predictability of performance is as important in most data centers as high performance.

To solve this problem vendors have used a variety of techniques. First, many have under-allocated the amount of flash that the storage system can access. For example in a 200GB solid state device there might be 225GB of real memory but the storage system only sees 200GB. This makes sure that the garbage collection process and the flash controller always has extra free space to work with. Another step is to make sure that the individual flash controllers are powerful enough to drive the garbage collection process fast enough to stay ahead of write. Finally many flash vendors are using multiple flash controllers, each focused on a particular region of the flash storage system. In other words the process is being run on a smaller area by multiple controllers.

In the enterprise predictable performance is critical. Flash vendors get that and several systems are now showing flash performance, that even under the heaviest of write loads, will maintain nearly the same levels of performance throughout the peak. This becomes an important area to test and one that we will discuss in our webinar on Understanding SSD Specmenship.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.