UFS Tutorial

Total Page:16

File Type:pdf, Size:1020Kb

UFS Tutorial UFS Tutorial Presented by Scott Jacobson Harish Verma Flash Memory Summit 2013 Santa Clara, CA 1 UFS – Universal Flash Storage Overview . JEDEC UFS Roadmap . What are the drivers? . What is UFS? . Why is UFS important? . What are the details? UFS Jedec Roadmap The Mobile Revolution – A Golden Age for Consumers Cell Phones Used By Smartphones Used By 1 of 1,000 Business People 600 Million People Worldwide 1984 2012 Mobile Mobile Telephone Computer smaller, simpler, cheaper mightier But the Golden Age has Rocked the Ecosystem 1984 http://dealbook.nytimes.com/2011/08/15/google-to-buy-motorola-mobility/ http://money.cnn.com/2012/04/24/technology/apple-earnings/index.htm http://www.splatf.com/2011/12/rim-charts/ What’s Enabled the Mobile Revolution? Many New Mobile Protocols New protocols enable advancement and drive need for advanced verification IP Memory card < 3 years old FM NAND CSI2 Camera > 3 years old DRAM NAND receiver LPDDR Flash CSI3 interface FLASH UFS SD 3.0 SD 4.0 SD GPS 4.5 Touch screen receiver I2C UFS controller LPDDR 2 LPDDR 3 RFFE eMMC Display Multimedia Cellular Applications driver modem DigRF processor processor DSI ® ™ AMBA 4 ACE OCP 2.0 ™ ™ LLI AMBA AXI , AHB OCP 3.0 SSIC WiFi Audio SDIO3 interface SLIMbus SLIMbus Bluetooth Motion GBT sensors cJTAG SPMI USB 3.0 OTG Power USB 2.0 HDMI 1.4 control Full Product Verification Each development stage has unique VIP requirements System Level (HW+SW) SoC Level ARM CPU Subsystem Customer’s Application Specific Components A15 A15 A7 A7 AES 3D DSP L2 cache L2 cache Graphics Application A/V Accelerators … Core IP Level … Cache Coherent Fabric LPDDR3 Controller Fully pipelined SoC Interconnect Fabric AHB Command BIST Low Power Queue UAR OCP GPIO Ethe HDMI T 2-Stage PCIe LPDDR 3Transaction USB3.0 r Display INTC Ordering Gen 2,3 SATA DEN Engine Processing net MIPI PMU I2C 3 2 Arbitration P P MIPI SPI Write Queue PHY PHY PHY WLAN AXI4 LookH-aheadH Low-speed peripheral JTAG Timer Priority optimizationY Y LTE subsystem Engine Read Queue AXI High speed, wired interface peripherals Other peripherals Low speed peripherals ECC DIMM “Our SATA controller has to talk IP Verificationwith my competitor's Challenges chip. They Customer feedbackdeviate from the spec but I still “My 3rd party SLIMbus IP have to make it work. I need to make sure my chip will handle was shipping in silicon, but non-compliance gracefully.” it still had bugs. My application was different - Leading Hard Drive Company than the others. I wish I had done my own “The UFS spec is compliance checking.” IP Component not fully baked, but if we delay development we’ll - Cellular SoC Provider Fully pipelined be late to market. AHB I need early Command BIST Low Power access to OCP Queue memory models “Moving from SATA 3G 2-Stage and rapid to SATA 6G cost me 2 Ordering Transaction incorporation of Engine Processing spec updates.” engineers for 6 months DEN to develop the VIP. Arbitration - Mobile Device Write Queue Protocol expertise is an AXI4 Look-ahead OEM expensive commodity.” Priority optimization Engine Read Queue AXI - Storage Chipset Leader ECC DIMM “I’m developing a USB3 device. We know there “Our IP blocks connect via an OCP fabric. The verification will be a number of team is short handed so the designers need to catch bugs. I need stable VIP some of their own bugs. The assertion-based VIP we use that works. I can’t really helps with that. The designers run a quick formal afford to debug that analysis to verify compliance. That speeds up our overall too.” verification.” - Mobile SoC leader - Leading DSP Company “The protocol interfaces are only half SoC Verification theChallenges problem. My memory interfaces are just as complex. I need to make Customer feedback sure they will work, regardless of the “My chip is big. Simulation is orders of memory vendor my customer uses.” magnitude too slow for functional coverage collection. The best I can do is run toggle tests.” - Major Server Developer - Network SoC Leader “The IP blocks are “My SoC has a multi- ARM CPU Subsystem Customer’s Application Specific Components all tested. I need to core CPU, but so does A15 A15 A7 A7 verify the my competitor’s. We AES interactions between 3D can’t beat their DSP L2 cache L2 cache Graphics Application bocks. There are 8 performance with SW- A/V Accelerators … Core major interfaces that based cache … need to be tested coherency. We need to Cache Coherent Fabric manage coherency in together. If I’m HW. We need VIP that missing VIP for any understands this.” 1 of those, I’m toast.” SoC Interconnect Fabric - Mobile Chipset - Networking Leader supplier UAR GPIO Ethe HDMI T PCIe LPDDR3 USB3.0 r Display INTC Gen 2,3 SATA net “The SoC verification MIPI PMU I2C“We use a mix of 3 2 simulators, partly for P P MIPI SPI environment is built byPHY PHY PHY WLAN H H Low-speed peripheralhistorical reasons an contributions from our JTAG Timer worldwide teams and Y Y LTE subsystem partly to optimize our sometimes from partner expenditures. We need to High speed, wired interface peripherals“Believe me,Other I’d peripheralslove to use VIPLow speed peripheralsbe able to utilize all our companies. As a result, the for all my interfaces, but the cost testbench often employs a simulation resources.” is way too high. Get real! I need mix of verification languages licensing that matches the needs and methodologies. That’s - Communications Chipset of SoC verification.” Company just reality.” - Server SoC Start-up - Global Semi Provider The System Verification Problem Customer feedback “The hardware in my product is state of the art, but the software is what the customer sees. If it “We do it all the analysis we doesn't work flawlessly with the can - system modeling, RTL hardware, we’ll drop market simulation, simulation share – fast.” acceleration, emulation, and prototyping. Each fills a need, but each is incomplete by - Mobile Device Company itself.” - Global Telecomm Co. “The hardest bugs to find are the HW/SW corner cases. We spent “Early HW/SW integration 3 months in the lab to is a must. In the past it get rid of 2 bugs on one was a serial process that baseband processor. cost us 2 quarters in time During that time we lost to market.” the customer.” - Baseband SoC - Applications Processor Provider Leader UFS overview • What is UFS? – Next generation flash storage that provides the low power of eMMC with the high performance of SCSI SSD – JEDEC Standard JEDS220 UFS overview • What is UFS? – Built on MIPI interface standards, M-PHY and UniPro, for interconnect layer – For UFS, UniPro stack treated as a black box to maximum extent UFS overview • What is UFS? – Two form factors – Embedded SSD – SD Card UFS overview • Why Is UFS Important? – Mobile Device demands are driving new requirements UFS overview • Why Is UFS Important? – Mobile Device demands are driving new requirements – Higher computing demands – Dual Core – Multi Core UFS overview • Why Is UFS Important? – Mobile Device demands are driving new requirements – Higher Storage Capacity UFS overview • Why Is UFS Important? – Mobile Device demands are driving new requirements – Higher Storage Capacity UFS overview • Why Is UFS Important? – Mobile Device demands are driving new requirements – Lower Latency and High IOPS UFS overview • Why Is UFS Important? – Mobile Device demands are driving new requirements – Higher Bandwidth & High IOPS UFS overview • What are the details? UFS overview • What are the details? UFS overview • What are the details? – Specified as Application layer on Unipro Protocol Stack – Multiple Layers – UCS layer – Uses SBC and SPC commands – UTP layer based on SCSI Architecture Model (SAM-5). – Command queuing – Multi-thread operations – UIC layer based on MIPI standard protocols – Interface and DME layers using MIPI Unipro protocol – Physical layer based on MIPI M-PHY .
Recommended publications
  • 24 Bringing Order to Chaos: Barrier-Enabled I/O Stack for Flash Storage
    Bringing Order to Chaos: Barrier-Enabled I/O Stack for Flash Storage YOUJIP WON and JOONTAEK OH, Hanyang University, Korea JAEMIN JUNG, Texas A&M University, USA GYEONGYEOL CHOI and SEONGBAE SON, Hanyang University, Korea JOOYOUNG HWANG and SANGYEUN CHO, Samsung Electronics, Korea This work is dedicated to eliminating the overhead required for guaranteeing the storage order in the modern IO stack. The existing block device adopts a prohibitively expensive approach in ensuring the storage order among write requests: interleaving the write requests with Transfer-and-Flush. For exploiting the cache bar- rier command for flash storage, we overhaul the IO scheduler, the dispatch module, and the filesystem sothat these layers are orchestrated to preserve the ordering condition imposed by the application with which the associated data blocks are made durable. The key ingredients of Barrier-Enabled IO stack are Epoch-based IO scheduling, Order-Preserving Dispatch,andDual-Mode Journaling. Barrier-enabled IO stack can control the storage order without Transfer-and-Flush overhead. We implement the barrier-enabled IO stack in server as well as in mobile platforms. SQLite performance increases by 270% and 75%, in server and in smartphone, respectively. In a server storage, BarrierFS brings as much as by 43× andby73× performance gain in MySQL and SQLite, respectively, against EXT4 via relaxing the durability of a transaction. CCS Concepts: • Software and its engineering → File systems management; Additional Key Words and Phrases: Filesystem, storage, block device, linux ACM Reference format: Youjip Won, Joontaek Oh, Jaemin Jung, Gyeongyeol Choi, Seongbae Son, Jooyoung Hwang, and Sangyeun Cho. 2018. Bringing Order to Chaos: Barrier-Enabled I/O Stack for Flash Storage.
    [Show full text]
  • External UFS Solution
    External UFS Solution Apr., 2016 Chronicles of External Storage Current ’95s ’00s ’05s ’10s ’16s CF (’94) CFast (’10) (’10) XQD (’12) SMC (’95) xD (’02) (’08) MMC (’98) MMCplus (‘04) mobile (’08) RS-MMC MMCmobile MMCmicro (’05) (’03) (’04) UHS-I: 104MB/s SD (’99) mobile miniSD microSD (’03) (’04) (UHS-I ’10) (’10) MS Pro-HG Memory Stick (’98) MS Duo (’02) (’07) MS Pro Duo (’08) mobile (’09) M2 (’06) UFS Card(‘16) 2 / 14 Mobile Storage Inteface Bandwidth CommunicationSD UFS Technology 전환 Wi-Fi USB Up to 7Gbps, 802.11ad 5Gbps, USB 3.0 433MB/s, 802.11ac 75MB/s, 802.11n MobileSD Storage UFS 전환Interface UFS [MB/s] Embedded Storage 1200 1000 External Storage 800 UFS UFS Card 600 eMMC eMMC 5.0 5.0 400 eMMC eMMC 4.5 200 4.41 UHS-1 UHS-1 UHS-1 UHS-1 UHS-1 UHS-1 0 2011 2012 2013 2014 2015 2016 3 / 14 Embedded evolves into External External UFS has same technology with Embedded UFS • Based on JEDEC UFS v2.0 Specification • High performance & small size for Mobile • High performance • Mobility • Better power efficiency • Compatibility • Mobile application friendly External UFS Solution (11 x 15 x 1mm) 4 / 14 Advantages of External UFS 6Gbps UFS card is overwhelmed compared to previous card • Up to 480MB/s in S.R and 170MB/s in S.W in the present version • Much better quality than microSD Card Performance Comparison ESD / Current Sequential (MB/s) ESD Test *Measured 480 480 SD Spec *UFS Card 170 170 eUFS (6G-1L) Contact 2/4kV 15kV 80 AIR 4/8/15kV Under Test 40 * UFS Card satisfies the requirement of SD Card at least Read Write SD UHS-I Random (IOPS)
    [Show full text]
  • Micron Technology Annual Report 2020
    Micron Technology Annual Report 2020 Form 10-K (NASDAQ:MU) Published: October 19th, 2020 PDF generated by stocklight.com UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K (Mark One) ☒ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended September 3, 2020 OR ☐ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission file number 1-10658 Micron Technology, Inc. (Exact name of registrant as specified in its charter) Delaware 75-1618004 (State or other jurisdiction of incorporation or organization) (IRS Employer Identification No.) 8000 S. Federal Way, Boise, Idaho 83716-9632 (Address of principal executive offices) (Zip Code) Registrant’s telephone number, including area code (208) 368-4000 Securities registered pursuant to Section 12(b) of the Act: Title of each class Trading Symbol Name of each exchange on which registered Common Stock, par value $0.10 per share MU Nasdaq Global Select Market Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes☒ No ☐ Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or 15(d) of the Act. Yes☐ No ☒ Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.
    [Show full text]
  • Abkürzungs-Liste ABKLEX
    Abkürzungs-Liste ABKLEX (Informatik, Telekommunikation) W. Alex 1. Juli 2021 Karlsruhe Copyright W. Alex, Karlsruhe, 1994 – 2018. Die Liste darf unentgeltlich benutzt und weitergegeben werden. The list may be used or copied free of any charge. Original Point of Distribution: http://www.abklex.de/abklex/ An authorized Czechian version is published on: http://www.sochorek.cz/archiv/slovniky/abklex.htm Author’s Email address: [email protected] 2 Kapitel 1 Abkürzungen Gehen wir von 30 Zeichen aus, aus denen Abkürzungen gebildet werden, und nehmen wir eine größte Länge von 5 Zeichen an, so lassen sich 25.137.930 verschiedene Abkür- zungen bilden (Kombinationen mit Wiederholung und Berücksichtigung der Reihenfol- ge). Es folgt eine Auswahl von rund 16000 Abkürzungen aus den Bereichen Informatik und Telekommunikation. Die Abkürzungen werden hier durchgehend groß geschrieben, Akzente, Bindestriche und dergleichen wurden weggelassen. Einige Abkürzungen sind geschützte Namen; diese sind nicht gekennzeichnet. Die Liste beschreibt nur den Ge- brauch, sie legt nicht eine Definition fest. 100GE 100 GBit/s Ethernet 16CIF 16 times Common Intermediate Format (Picture Format) 16QAM 16-state Quadrature Amplitude Modulation 1GFC 1 Gigabaud Fiber Channel (2, 4, 8, 10, 20GFC) 1GL 1st Generation Language (Maschinencode) 1TBS One True Brace Style (C) 1TR6 (ISDN-Protokoll D-Kanal, national) 247 24/7: 24 hours per day, 7 days per week 2D 2-dimensional 2FA Zwei-Faktor-Authentifizierung 2GL 2nd Generation Language (Assembler) 2L8 Too Late (Slang) 2MS Strukturierte
    [Show full text]
  • Flash Memory
    Semiconductor Catalog Mar. 2016 Flash Memory STORAGE PRODUCTS & SEMICONDUCTOR SEMICONDUCTOR & STORAGE PRODUCTS http://toshiba.semicon-storage.com/ FlashF l ash M emor Memoryy Toshiba, the inventor of Flash Memory, blazed the trail to a world we can all carry data, music and videos with us, wherever we go. Now, Flash Memory is playing a major role in driving the evolution of automobiles and industrial equipment that is essential for realizing an environmentally friendly society. Behind the scenes, Flash Memory supports the world’s continuing transformation to a better tomorrow. Back in 1984, Toshiba developed a new semiconductor memory, Flash Memory, and by doing led the industry, and its competitors, into the next generation. Today the international de facto standard, Flash Memories have realized an immense range of applications that include Memory Cards, Solid-State Drives (SSDs), and even industrial equipment. As the total volume of information continues its exponential growth, demand for storage units using Flash Memories will grow with it. In order to meets these market needs, Toshiba has made major investments in plant and equipment at its Yokkaichi memory fab, and is resolutely committed to develop new products. This brochure highlights Toshiba's Flash Memory and other Memory Solutions. Toshiba's Leading Technology Areas Features of Toshiba's Flash Memory W Process W Fast storage of large files W Multi-Level Cell (MLC) W Fast write and erase rates W Controller W Low per-bit cost W Die stacking W Easily extendable using the NAND Flash Memory interface W Packaging W Extensive product portfolio to meet diverse needs OProducts with the standard HS-MMC interface OOffers products with the high-speed UHS-I and UHS-II SD bus interfaces OAvailable as SD Memory Cards with unique features – 2 – Toshiba's Flash Memory and controller technologies have found a wide range of applications.
    [Show full text]
  • White Paper Introduction to the Universal Flash Storage Assocation
    White Paper Introduction to the Universal Flash Storage Assocation Executive Summary Universal Flash Storage (UFS) is the next generation, high-performance non-volatile storage standard. The UFS standard is defined by JEDEC and incorporates standards from the MIPI® Alliance (M-PHY and UniProSM) for data transport. UFS utilizes the SCSI Architecture Model supporting multiple commands, including command queuing which enables multi-threaded programming. UFS further supports features of eMMC, the JEDEC embedded storage memory format introduced in 2006. The MIPI M-PHY combines high speed SerDes I/O (up to 5.8Gbps per lane) with multiple operating states to achieve very low power consumption. Building on elements of existing standards will hasten the adoption of UFS by simplifying development and deployment at all levels - from ICs to firmware, system software, test and measurement. The Universal Flash Storage Association (UFSA) is chartered to promote UFS and certify compliance and compatibility of UFS products. Copyright © 2013 Universal Flash Storage Association Universal Flash Storage Association Introduction Introduction Mobile platforms use Non-volatile memory for application (typically embedded on the circuit board) and user storage (embedded and/or removable). Storage devices have to supply fast data transfers of large multimedia files such as video, music and photos as well as actively running multiple applications. Application performance depends heavily on multi-threaded memory transfer rates. Universal Flash Storage (UFS) is the next generation, high-performance Non-volatile storage standard. [1] The UFS standard is maintained by JEDEC, relies on the MIPI® Alliance M-PHY and UniProSM for transport and borrows from the SCSI command set.
    [Show full text]
  • (12) Patent Application Publication (10) Pub. No.: US 2014/0025795 A1 Fiennnes (43) Pub
    US 2014.0025795A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2014/0025795 A1 Fiennnes (43) Pub. Date: Jan. 23, 2014 (54) OPTICALLY CONFIGURED MODULARIZED Publication Classification CONTROL SYSTEM TO ENABLE WIRELESS NETWORK CONTROLAND SENSING OF (51) Int. Cl. OTHER DEVICES H04L 12/24 (2006.01) (52) U.S. Cl. (71) Applicant: Electric Imp, Inc., (US) CPC .................................. H04L 41/0806 (2013.01) USPC .......................................................... 709/222 (72) Inventor: Hugo Fiennnes, Palo Alto, CA (US) (57) ABSTRACT System and method of interfacing arbitrary non-network con (73) Assignee: ELECTRIC IMP, INC., Los Altos, CA nected devices to wireless computer networks. The invention (US) provides an optically configurable wireless communications module, in either fixed or removable formats, with wireless (e.g. WiFi) network connectivity. The module also has a pro (21) Appl. No.: 13/734,976 grammable arbitrary device controller, associated Software, and at least the combination of the arbitrary device and the module also provides a unique ID code. A Software token (22) Filed: Jan. 5, 2013 assisted method may be used to associate the unique ID code with appropriate control software and this association stored Related U.S. Application Data in network server memory. The invention also uses an inter net-based service and a local optical programmer to configure (63) Continuation-in-part of application No. 13/481,737, the module's wireless network configuration. Once connec filed on May 25, 2012. tivity is established, the module may upload its unique ID (60) Provisional application No. 61/490,498, filed on May code to the server and receive appropriate arbitrary device 26, 2011, provisional application No.
    [Show full text]
  • High Performance Universal Flash Storage (UFS) Solutions
    High Performance Universal Flash Storage (UFS) Solutions Next-generation Storage Solution Brochure Low power, high performance, and reliable storage Key Benefits of UFS Consumers today expect nearly instant access to feature-rich applications and high-quality multimedia which can sometimes be massive in size. - Low Energy Consumption With this around-the-clock demand for content on mobile devices, - Low Voltage Differential Signaling wearables, IoT devices, and automobiles, a reliable, high speed yet low - Fast Performance with High Speed Serial Interface power, versatile storage solution is needed. - Reliable advanced physical, link, and command protocol layers Universal Flash Storage (UFS) is an advanced, high performance interface - Removal storage UFS Cards with random write speeds designed for computing and mobile systems such as smartphones up to 70 times faster than SD cards and tablets where power consumption needs to be minimal. The latest UFS interface protocols are optimized for efficient throughput, system performance and reliability. When using UFS solutions, power consumption is reduced due to the near- zero idle power level which, when combined with the Mobile Industry Processor Interface (MIPI)1 power-saving specifications, significantly reduces device power consumption. UFS standards also adopt the well- known Small Computer System Interface (SCSI)2 Architecture Model and command protocols that support multiple simultaneous commands and command queuing features to enable highly efficient multi-thread programming. This is a significant difference compared to legacy flash- based memory cards and embedded flash solutions which can only process individual commands, thereby limiting random read/write access performance. The UFS card is the leading technology solution for removable storage that delivers superior sequential and random read/write performance—critical for modern connected devices storing content such as drones, 360-degree devices with multiple 4K/8K recording cameras or sensors, as well as smartphones and tablets.
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 9,026,854 B2 Jeong Et Al
    USOO9026854B2 (12) United States Patent (10) Patent No.: US 9,026,854 B2 Jeong et al. (45) Date of Patent: May 5, 2015 (54) METHOD OF TESTING UNIVERSAL FLASH (56) References Cited STORAGE (UFS) INTERFACE AND MEMORY DEVICE IMPLEMENTING METHOD OF U.S. PATENT DOCUMENTS TESTING UFS INTERFACE 5,640,509 A 6/1997 Balmer et al. 6,671,836 B1* 12/2003 Lai et al. ....................... T14f718 (71) Applicant: Samsung Electronics Co., Ltd., 7,111.208 B2 * 9/2006 Hoang et al. ....... T14f716 Suwon-si, Gyeonggi-do (KR) 2005/0262336 A1* 11/2005 Cherukuri et al. ................ 713/2 2010/0049465 A1* 2/2010 Pineda De Gyvez et al. 702/122 2010/0177811 A1* 7, 2010 Duerdodt et al. ............. 375,224 (72) Inventors: Ha-Neul Jeong, Suwon-si (KR): Woo-Seong Cheong, Suwon-si (KR) (Continued) (73) Assignee: Samsung Electronics Co., Ltd., FOREIGN PATENT DOCUMENTS Suwon-si, Gyeonggi-do (KR) JP 08-2621.16 11, 1996 JP 11-053897 2, 1999 (*) Notice: Subject to any disclaimer, the term of this KR 102OOOOO11182 2, 2000 patent is extended or adjusted under 35 OTHER PUBLICATIONS U.S.C. 154(b) by 207 days. UniPro Controller IP Core, 2009, Arasan Chip Systems, Inc., Version (21) Appl. No.: 13/647,415 1.2a. (Continued) (22) Filed: Oct. 9, 2012 Prior Publication Data Primary Examiner — Scott Baderman (65) Assistant Examiner — Paul Contino US 2013/OO9746O A1 Apr. 18, 2013 (74) Attorney, Agent, or Firm — Volentine & Whitt, PLLC (30) Foreign Application Priority Data (57) ABSTRACT A method is provided for performing a self-test on a memory Oct.
    [Show full text]
  • Fundamentals of Hard Disk Drives
    Digital Storage in Consumer Electronics This page intentionally left blank Digital Storage in Consumer Electronics The Essential Guide Thomas M. Coughlin AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Newnes is an imprint of Elsevier Newnes is an imprint of Elsevier 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA Linacre House, Jordan Hill, Oxford OX2 8DP, UK Copyright © 2008, Elsevier Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, E-mail: [email protected]. You may also complete your request online via the Elsevier homepage (http://elsevier.com), by selecting “Support & Contact” then “Copyright and Permission” and then “Obtaining Permissions.” Recognizing the importance of preserving what has been written, Elsevier prints its books on acid-free paper whenever possible. Library of Congress Cataloging-in-Publication Data Coughlin, Thomas M. Digital storage in consumer electronics : the essential guide / Thomas M. Coughlin. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-7506-8465-1 (pbk. : alk. paper) 1. Computer storage devices. 2. Household electronics. 3. Digital
    [Show full text]
  • SD Card Compatiblity
    Frequently Asked Questions Memory Card CARDS - I need to reformat my memory card, which method should i use? If you have a digital camera it is better to format your card in the camera. If you are using the card in a device other than a camera, we recommend the formatting of the card using a card reader, as described below: If you are using the card in two different devices with different formats (e.g. a Digital Camera and a MP3 player) we would advise you to use two separate cards. If formatting in the Card Reader (WARNING: FORMATTING CAN & WILL DELETE ALL DATA) please see you device or camera manual before proceeding with a format. Be aware, by default Windows will format a memory card of 2GB or higher capacity to FAT32. Formatting in a PC: Windows 2000/XP/Vista/7 Open My Computer Locate the drive letter of your memory card Right-click on this drive Select Format... (This will launch the Format Utility Window) Under the option File System select FAT32 Click on the Start button Press Start / Run Type 'cmd' press the OK button This will launch the MS-DOS window and prompt Type format *: /fs:FAT32 or NTFS (* represents the drive letter that windows recognises the card as) Press return and follow the onscreen prompts Once the routine is complete type EXIT CARDS - Why do digital memory cards sometimes become “unreadable” ? This problem is not related to any particular brand of memory card or device. It can occur when the device had been interrupted when accessing the memory card.
    [Show full text]
  • Hacking Hardware with a $10 SD Card Reader by Amir “Zenofex” Etemadieh, CJ “Cj 000” Heres, Khoa “Maximus64” Hoang
    Hacking Hardware With A $10 SD Card Reader by Amir “Zenofex” Etemadieh, CJ “cj_000” Heres, Khoa “maximus64” Hoang www.exploitee.rs Introduction Hardware hacking is increasingly important as more devices become connected. Systems are moving beyond standard hard drives and CPUs and security professionals find themselves at a loss without purpose built tools. This whitepaper aims to solve the biggest challenge facing a security professional that is looking at a hardware device: acquiring the target. To that aim, this paper contains information on reading and writing eMMC flash devices through the use of an SD Card reader/writer. Techniques for learning how to recognize eMMC flash, identifying the correct eMMC pinout, attaching to eMMC flash within an embedded device, and selecting the correct USB SD card adapter for use in reading/writing to flash will be addressed. Properly equipped, security professionals should gain the ability to read the code from targets and use that in their standard analyses. We urge readers to read this entire paper before attempting to utilize this technique as there is crucial information spread throughout and, as with all hardware, a misstep could break the target hardware. Prior work There have been many different papers and presentations on auditing hardware in the past, and several of them went into the topic of acquiring the code from the target. One such example comes from Micah Elizabeth Scott (@scanlime). On her blog, Micah discussed how she went about reverse engineering an eMMC flash pinout from a Nintendo DSi console. She stated that her intention was to build a passive sniffer to view the CPU’s attempts at reading and writing from flash1.
    [Show full text]