This application relates to a concurrently filed and co-pending U.S. patent application Ser. No. 14/050,264, entitled “Detecting and Managing Bad Columns” by Amir Nassie, owned by the assignee of this application and incorporated by reference herein in its entirety.
Nonvolatile flash memory devices store information in the form of charge in a flash memory cell. A flash memory cell has a CMOS transistor with an additional floating metal gate between the substrate and the transistors gate. The charge is stored in the floating gate and is injected to the floating gate during an operation known as programming. The charge may be removed during an operation known as an erase operation.
As the charge in the floating gate may vary contiguously, it is possible to store more than just one bit per flash transistor by using several charge levels to symbolize different sequences of bits.
The voltage level distributions of
The 3 bpc cell includes a most significant bit (MSB), a central significant bit (CSB) and a least significant bit (LSB). A physical page of flash memory module may store three logical pages. This physical page is programmed one logical page after the other. The programming includes various types of programming such as MSB programming (in which some of the cells are programmed to a single lobe and some are left in the erase state. At the end of this programming process only two lobes exists, the erase and the MSB lobes), a CSB programming (in which the erase lobe and the MSB lobe are each split into two lobes by further programming pulses, depending on the original state of each cell and the corresponding CSB bit. At the end of this step there are four lobes.) and a LSB programming (in which each of the four lobes is further split to create 8 lobes, overall). The logical pages are read by applying various types of read operations such as MSB read (in which a MSB threshold 114 is used), CSB read (in which two CSB thresholds 112 and 116 are used) and LSB read (in which four LSB thresholds 111, 113, 115 and 117 are used).
A NAND Flash array (or block) is constructed from NAND Flash memory cells. The NAND Flash memory cells are grouped into columns (or strings).
In order to measure the charge in a certain cell within a string, all other cells are switched on by applying a high voltage on their gates (given by Vbias) and a comparison voltage, Vth, is applied to the gate of the selected cell. If the cell is charged and Vth is not high enough, the gate will not allow current to flow and the sense-amplifier will output a “O”. On the other hand, if the cell is not charge or Vth is high enough, current will flow and the sense-amplifier will output a “1”. Different schemes may exist where the cell being sampled is biased with a constant voltage (say Vee) but in the sense-amplifier a comparison against a reference string is performed which reference value may be determined by some external voltage, Vth.
The above sampling technique holds when a bit may be obtained only through a single threshold comparison. When more than a single threshold comparison is required, the above procedure may be performed for each threshold and the results may then be combined. Alternatively, several sense-amplifiers may be used simultaneously, each one compares against a different threshold, and the results are then combined to yield the required bit value.
All cells in a wordline (physical page) are programmed simultaneously and read simultaneously. In case of MLC or TLC, the programming of a wordline is divided into two or three stages, referred to as MSB, CSB and LSB page programming stages.
Due to manufacturing defects, some of the columns may not operate properly. In that case, NAND manufacturers, allocate spare strings which are used to replace the defective strings. The replacement is done during the manufacturing process, where the bad columns are detected and internal circuitry is used to remap the spare strings to replace. Typically, the replacement is not very efficient as entire bytes or words (16 bits) are replaced even if a single column was bad. That is, the columns are divided into chunks of 8 or 16 columns and the replacement is done on an entire chunk.
Alternatively, some manufacturers do not replace the bad columns and leave the task to the memory controller that controls the NAND Flash. That is, more strings are allocated on a NAND array to allow some spare strings for replacement. However, the replacements are not done at the NAND array level but rather, bad columns are handled by the controller instead.
A method, a system, and a non-transitory computer readable medium are provided for detecting and managing bad columns of a NAND flash memory array.
According to an embodiment of the invention a method may be provided for detecting bad columns of a NAND flash memory array, the method may include sending input data to a NAND flash memory unit that may include the NAND flash memory array and instructing the NAND flash memory unit to write input data to the NAND flash memory array to provide programmed data; reading from the NAND flash memory array the programmed data to provide read data; comparing the input data and the read data to provide column error statistics at a column resolution; and
defining, by a flash memory controller, bad columns of the NAND flash memory array in response to the column error statistics.
The column error statistics may be indicative of a number of errors per column, and the defining of the bad columns may include defining a column of the NAND flash memory array as a bad column if a number of errors associated with the column may exceed an error threshold.
The column error statistics may be indicative of a number of errors per column and wherein the method may include may include assigning a reliability score per each column in response to a number of errors associated with the column.
The method may include defining an encoding scheme for data units to be written to the NAND flash memory array while constraining a value of bits to be written to the bad columns to be of an erase value.
The method may include receiving, by the flash memory controller, an input data unit to be written to the NAND flash memory array; generating, by the flash memory controller, an updated data unit by adding dummy bits to the input data unit at locations that are expected to be written to bad columns of the NAND flash memory array; and sending the updated data unit to the NAND flash memory unit and instructing the NAND flash memory unit to write the updated data unit to the NAND flash memory array.
A value of a dummy bit to be written, instead a data bit; to a flash memory cell of a bad column equals a value of the data bit.
The method may include defining a mapping of bits of codewords to flash memory cells of the NAND flash memory unit in response to locations of the bad columns.
The defining of the mapping reduces an effect of an uneven distribution of bad columns within NAND flash memory unit portions allocated for storing the codewords.
The mapping of bits of a codeword of the codewords may be further responsive to a relationship between (a) a size of a NAND flash memory unit portion allocated for storing the codeword, and (b) a sum of (i) a size of the codeword and (ii) a number of flash memory cells that belong to a bad column within the NAND flash memory unit portion allocated for storing the codeword.
The method may include swapping bits that belong to different codewords in response to an amount of bad columns and to a location of bad columns in NAND flash memory units portions initially allocated for storing the different codewords.
The method may include determining an encoding parameter in response to the column error statistics.
The encoding parameter may be a bit error rate of a code to be used for providing codewords.
The encoding parameter may be a number of redundancy bits to be allocated per codeword.
The number of redundancy bits may be determined to optimize a value of a function of (a) bad column distribution between different dies of the NAND flash memory unit and (b) a bit error rate function.
The determining may be responsive to column error statistics of different dies of NAND flash memory unit that are activated at a certain point in time.
The encoding parameter may be a bit error rate of a code to be used for providing codewords.
The flash memory array may be spread over multiple dies of the flash memory unit.
According to an embodiment of the invention there may be provided a non-transitory computer readable medium that may store instructions to be executed by a computer and cause the computer to perform stages may include: instructing a NAND flash memory unit that may include a NAND flash memory array to write input data to the NAND flash memory array to provide programmed data; reading from the NAND flash memory array the programmed data to provide read data; comparing the input data and the read data to provide column error statistics at a column resolution; and defining, by a control circuit, bad columns of the NAND flash memory array in response to the column error statistics.
A system, may include a flash memory controller that may include a control circuit and an interface; wherein the interface may be arranged to a instruct a NAND flash memory unit that may include a NAND flash memory array to write input data to the NAND flash memory array to provide programmed data; wherein the interface may be arranged to read from the NAND flash memory array the programmed data to provide read data; wherein the control circuit may be arranged to compare the input data and the read data to provide column error statistics at a column resolution; and define bad columns of the NAND flash memory array in response to the column error statistics.
The subject matter regarded as the invention is particularly pointed out and distinctly claimed in the concluding portion of the specification. The invention, however, both as to organization and method of operation, together with objects, features, and advantages thereof, may best be understood by reference to the following detailed description when read with the accompanying drawings in which:
It will be appreciated that for simplicity and clarity of illustration, elements shown in the figures have not necessarily been drawn to scale. For example, the dimensions of some of the elements may be exaggerated relative to other elements for clarity. Further, where considered appropriate, reference numerals may be repeated among the figures to indicate corresponding or analogous elements.
In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, and components have not been described in detail so as not to obscure the present invention.
The subject matter regarded as the invention is particularly pointed out and distinctly claimed in the concluding portion of the specification. The invention, however, both as to organization and method of operation, together with objects, features, and advantages thereof, may best be understood by reference to the following detailed description when read with the accompanying drawings.
Because the illustrated embodiments of the present invention may for the most part, be implemented using electronic components and circuits known to those skilled in the art, details will not be explained in any greater extent than that considered necessary as illustrated above, for the understanding and appreciation of the underlying concepts of the present invention and in order not to obfuscate or distract from the teachings of the present invention.
Any reference in the specification to a method should be applied mutatis mutandis to a system capable of executing the method and should be applied mutatis mutandis to a non-transitory computer readable medium that stores instructions that once executed by a computer result in the execution of the method.
Any reference in the specification to a system should be applied mutatis mutandis to a method that may be executed by the system and should be applied mutatis mutandis to a non-transitory computer readable medium that stores instructions that may be executed by the system.
Any reference in the specification to a non-transitory computer readable medium should be applied mutatis mutandis to a system capable of executing the instructions stored in the non-transitory computer readable medium and should be applied mutatis mutandis to method that may be executed by a computer that reads the instructions stored in the non-transitory computer readable medium.
There are provided systems, methods and computer readable media for managing bad columns at a column resolution (on a column to column basis).
The term “controller” refers to a flash memory controller.
The term data unit refers to multiple data bits of any size. The data unit can included encoded data bit, decoded data bits or any type of data bits. A data unit can include a byte, a word, a page and the like. In some of the examples (for example—
The following description describes: (a) a scheme for detecting bad columns and how this information may be used during the decoding process; (b) two bad column replacement schemes; (c) a hardware design to implement one of the bad column replacement scheme; (d) spreading the bad columns across several codewords to reduce a possible uneven distribution of bad columns in portions of a NAND flash memory array allocated for storing the codewords; (e) and how code parameters may be designed modified to handle bad columns and consider the probability of their occurrence.
Bad Columns Detection
Some NAND flash units that do not replace the bad columns internally, allow the controller to read back the chunk location (byte/word) of each bad column.
However, this has two drawbacks. First, there is no distinction between one column and another within the chunk and thus all columns are discarded (bad or good). Secondly, there is no distinction in the severity of how bad is the column. It may be that some columns are declared bad but that is because they are more prone to errors. Such columns may still be used for carrying data but may be given lesser reliability.
Therefore, there is provided an alternative method for detecting bad columns. An erase block is programmed with random data and the its content is read back. The programmed data is then compared to the data read back and a page sized vector (i.e. number of values is equivalent to the number of columns in a page) is used to count the number of errors that were detected per each column.
As an example consider a TLC device where each block has 64 rows and 192 pages. To create this vectors we nullify it at first and for each page being read, we compare it to the original data and add 1's to the vector at the locations corresponding to the error location.
We can then detect bad columns rather easily. We set a threshold (e.g. 20, in the previous example) such that if the vectors contain a value higher than that, the column is declared bad. For TLC devices, we can also do that for each page type separately by creating 3 such sum vectors and repeating the procedure above per page, using a different vector, depending on the page type.
Note that we can also obtain more refined information than just if the column was bad or not. The value of the vector may be used as a reliability indicator for a decoder. For example, returning to the example above: a block with 192 pages. The reliability indicator may be defined as the ratio LLR=Log(value/(192−value)). This can then be used in conjunction with an LDPC code or any other coding scheme which decoder can make use of such log likelihood ratios.
Such information can also be used in conjunction with coding schemes which decoder allows decoding inputs with erasures. That is a decoding scheme which obtains per each bit 3 values: 0, 1 and Erasure. All columns which LLR above was between two given values can be assigned the Erasure value and the others 0 or 1, depending on the read value. BCH codes can also be decoded using erasure information. Other codes are LDPC, turbo-codes and more.
The method is for detecting bad columns of a NAND flash memory array.
Method 400 may start by stage 410 of sending input data to a NAND flash memory unit that may include the NAND flash memory array and instructing the NAND flash memory unit to write input data to the NAND flash memory array to provide programmed data.
Stage 410 may be followed by stage 420 of reading from the NAND flash memory array the programmed data to provide read data.
Stage 420 may be followed by stage 430 of comparing the input data and the read data to provide column errors statistics at a column resolution. The column error statistics provide information on the number of errors per column. An error is detected as a mismatch between a value of an input data bit and a corresponding read data bit. The mismatch is associated with a column that includes the flash memory cell that stored the programmed data bit that corresponds to the bad data bit and the input data bit.
Stage 430 may be followed by stage 440 of defining, by a flash memory controller, bad columns of the NAND flash memory array in response to the column error statistics.
The column error statistics may be indicative of a number of errors per column. Stage 440 may include defining a column of the NAND flash memory array as a bad column if a number of errors associated with the column exceed an error threshold.
The column errors statistics is indicative of a number of errors per column and stage 440 may include assigning a reliability score per each column in response to a number of errors associated with the column. This reliability score can be used when determining what to program to flash memory cells of a bad column, when determining data reconstruction schemes and the like.
Stage 440 may be followed by stage 450 of responding to the definition of bad columns.
The responding may include applying any of the schemes disclosed in this application including, for example, determining encoding parameters, bit skipping, bit replacement, bad column spreading schemes or any bad column replacement schemes.
Stage 450 may include at least one out of stages 452, 454, 456 and 458.
Stage 452 may include defining an encoding scheme for data units to be written to the NAND flash memory array while constraining a value of bits to be written to the bad columns to be of an erase value.
Stage 454 may include bit skipping—receiving, by the flash memory controller, an input data unit to be written to the NAND flash memory array; generating, by the flash memory controller, an updated data unit by adding dummy bits to the input data unit at locations that are expected to be written to bad columns of the NAND flash memory array; and sending the updated data unit to the NAND flash memory unit and instructing the NAND flash memory unit to write the updated data unit to the NAND flash memory array. The value of a dummy bit to be written, instead a data bit; to a flash memory cell of a bad column equals a value of the data bit.
Stage 456 may include a bad column spreading scheme—defining a mapping of bits of codewords to flash memory cells of the NAND flash memory unit in response to locations of the bad columns.
The defining of the mapping reduces an effect of an uneven distribution of bad columns within NAND flash memory unit portions allocated for storing the codewords.
The mapping of bits of a codeword, is further responsive to a relationship between (a) a size (S1) of a NAND flash memory unit portion allocated for storing the codeword, and (b) a sum of (i) a size (S2) of the codeword and (ii) a number (N1) of flash memory cells that belong to a bad column within the NAND flash memory unit portion allocated for storing the codeword.
If S1>S2+N1 there may not be a need to perform spreading and the entire codeword can be written only to flash memory cells of good columns. Nevertheless—S1−(S2+N1) flash memory cells may be programmed with stuffing bits.
If S1>S2+N1 then some bits may be lost.
Stage 456 may include swapping bits that belong to different codewords in response to an amount of bad columns and to a location of bad columns in NAND flash memory units portions initially allocated for storing the different codewords.
Stage 458 may include determining an encoding parameter in response to the column error statistics.
The encoding parameter may be a bit error rate of a code to be used for providing codewords. These codewords may be represented by one or more input data units.
The encoding parameter may be a number of redundancy bits to be allocated per codeword.
The number of redundancy bits may be determined to optimize a value of a function of (a) bad column distribution between different dies of the NAND flash memory unit and (b) a bit error rate function.
The determining may be responsive to column error statistics of different dies of NAND flash memory unit that are activated at a certain point in time.
Bad Columns Replacement Schemes
Another method of handling bad columns is not using them. This is generally supported by column replacement operation within the NAND Flash devices. However, as mentioned this replacement operation is rather coarse and works on entire chunks instead of a single string.
According to an embodiment of the invention it may be desirable to perform the replacement in a controller at the bit level. In general, before programming data into the NAND, codewords may be aggregated inside the NAND Flash controller until sufficient data is available to program a full NAND page. The NAND page data is the transferred to the NAND device through a NAND interface (NI) in the controller (see
Note that the NI works by transferring the data byte by byte or word by word. The NAND device is unaware of the fact that there are bad columns or of the content of the data. Any of the replacement operations are performed by the NI without modifying the standard operation of the NAND device.
Bit Skipping
While sending the aggregated codewords to the NAND Flash, the NI unit is loaded with the list of all bad columns in the NAND Flash die. Each time a bit is going to be written to a bad column, a dummy bit is inserted in place of the original data and the original bit stream from that point on is shifted by one bit. Thus, the original data is not written to bad columns. Similarly, when reading data from the NAND, each time a bad column is encountered, the corresponding bit is overrun with the next bit being read. All the following bits are shifted to replace the columns being overrun.
Note that throughout we assume that the amount of data in the concatenated codewords is less than in the physical page, to make room for bad columns. However, there may be two cases that need to be taken into account:
Case one—the amount of bits in the concatenated codewords+the number of bad columns is still smaller than the physical page size. In that case, during the programming operation, additional dummy bits are inserted (e.g. zeros) at the end of the stream to complete it to a physical page size.
Case two—the amount of bits in the concatenated codewords+the number of bad columns is still greater than the physical page size. In that case, during programming the data bits which over-run the page are truncated. During the read operation missing data, bits are padded with zeros, causing some errors in those bits.
Whether case one or case two are relevant depend on the size of the codeword redundancy and the number of bad columns. The codeword redundancy can be chosen by the designer of the NAND Flash controller. However, the number of bad columns in a NAND device is random and changes between one device and another. The manufacturer guaranties that the maximum number of bad columns will not exceed a certain maximum but this is typically much larger than the actual number of bad columns. Therefore, the size of the redundancy may be chosen as a function of the distribution of bad columns.
Another note on the choice of the dummy bits: the dummy bit may be chosen to have the value of the original bit intended to be written to the bad column. If a bad column is not completely bad, the read information from that bit can be used to obtain additional information and increase reliability.
Bit Replacement
Bit skipping may be difficult to implement in hardware as the streaming data becomes unaligned with the standard units of bytes/words/double words. This alignment is important as it eases the job of parallelizing in streamlining the operation of the unit.
Therefore, in the following we present a hardware implementation of a unit that does not perform bit skipping but rather bit replacement. In this scheme, data bits that fall on bad columns are copied into a spare register, which then appended to the data stream and programmed last to the NAND page. During read, the last bytes, which contain the spare register, are read first.
Under some cases, the read operation may first be attempted without reading the spare register. In that case, the information that was read from the bad columns can be used. Only upon decoding failure we may choose to read the spare register bits. The cases that may be of interest are those where data is being read from random location which will cause the NI unit to take longer time to read, if it needs to perform replacement.
Hardware Implementation
The NAND flash memory unit 390 includes an internal controller 380 and NAND flash memory array 370. It may include multiple arrays, one or more flash memory dies, one or more planes, and the like. The internal controller 380 may program data to the NAND flash memory array 370, may read data from the NAND flash memory array 370 and may erase the NAND flash memory array 370—under the control of instructions sent from the flash memory controller 333 (via NU 350).
The determination circuit 360 may receive or generate column error statistics may determine how to respond to column error statistics, may determine an encoding scheme and the like. Encoder/decoder 312 may encode and/or decode data, append redundancy bits and the like.
Bad columns detection information is gathered and saved in BCM—Bad Column Memory (say implemented in Random Access Memory) 340(2) that is accessible by the NI unit and holds the data required for bits replacement. Each line of this memory holds:
The number of BCM lines should equal to the maximal number of bad columns that is guaranteed by the manufacturer.
As bad column is a bit line defect, same bits should be replaced in all pages that use the same sense amplifier (typically a Flash Plane). Hence, a single BCM database may be sufficient to replace all bad columns in this Flash Plane. If the Flash device consists of multiple planes, multiple BCMs are required.
This flow continues until all aggregated codewords were driven in from the page buffer 340(1). At this time page address comparator 107 output pin is asserted causing spare register 106 to shift out a Word each clock cycle. Meanwhile, the select to data MUX 108 select signal is also set causing data from spare register 106 to flow in the NAND Flash memory unit 390 direction on the data bus. During shift data out of spare register 106, zeros may be shifted in (for end zeros padding). The flow ends when the number of Words sent to the Flash device equals the page size.
Note that bad columns may be present in the spare area (end of the Flash page). As this area is relatively small compared to the page size, not replacing those bits will probably not add many error to the programmed page, and when reading, those errors can be fixed by error correction circuitry. However, those bits can be replaced during program operation as long as the Flash page size is no smaller than the sum of aggregated codewords and the maximum bad columns.
NAND Flash interface protocol allows reading from any desired Word offset of the page register 410 in the NAND Flash memory unit 390 that holds the latched array data.
When the controller signals to start reading, a finite state machine (FSM 120) is responsible to first read the spare area of the page register and later the aggregated codewords.
Spare area read FSM 120 controls the Flash page offset setting by using address setting circuitry 130. At first FSM 120 sets the page register 410 read pointer to offset 411. FSM 120 also activates page address counter 102 (via interface 121) to count Words starting at the spare page area, thus page address comparator 107 result is asserted (counter greater than aggregated codewords). Assertion of this signal causes on one hand incoming data Words on data bus 401 to be shifted into spare register 106, and on the other hand enable circuitry 110 to block data from being driven to page buffer 340(1). When page address counter 102 reaches page end it signals FSM 120 “spare read done” via interface 122.
Aggregated codewords read FSM 120 than sets Flash device page register offset to 411 (typically 0) and activates page address counter 102 again (via interface 123) to start counting from the value set in page register 410 to offset 412. At this stage BCM address counter 103 is set to 0, thus pointing the first BCM line. Page data starts streaming in and page address counter 102 counts each incoming Word. Once page counter 102 reaches the BCM output 211(0) (selected wordptr), “bad column accessed logic” output wire 104 is asserted.
Then:
Since page address counter was activated to count from page start, the data out circuitry 110 does not block the data out bus 111 that drives Word by Word to the page buffer 340(1).
In the next clock cycle the incoming the page address counter output 102 is again compared vs. the next BCM line Word pointer that is now present on the BCM output 211(0). Total amount of aggregated codewords is read from Flash memory unit 390 and by searching the BCM entries all bad columns are replaced.
Bad column located in the spare area can be replaced, more on that is described later.
Sometimes the system needs to read only a portion of a Flash page. As the Flash page holds ECC codewords this random read is aligned to a codeword start (say second codeword out of four codewords in a page). In such a case, the relevant BCM pointers may start from another BCM line than line 0 (as some lines may hold pointers to bad columns in the first codeword).
Two methods are suggested to handle such cases:
The bit location of first replacing bit of the codeword in the spare area (I) First relevant BCM line for the read codeword (II).
Read flow is as follows.
FSM 120 sets the page Word offset 411, using page address setting circuitry 130, to the Word that holds the first replacing bit (I). FSM 120 than reads the spare area from this offset to the end of the page (or until all replacing bits for the relevant codewords are read). Note that it may be required to shift out some bits from spare register 106 since the first read Word from spare area may hold some bits of a codeword that is not being read.
Now FSM 120 loads BCM address counter 103 with the first relevant BCM line (II) via interface 124. FSM 120 also sets the page offset in the Flash to Word 413 address setting circuitry via control bus 402. From this point on, reading is done as in the data read phase of a whole page.
Method 500 may start by stage 510 of receiving or generating bad columns information indicative of bad columns of a NAND flash memory array of a NAND flash memory array.
The bad columns information has a column resolution—each column of the NAND flash memory array can be tagged as good or bad (or associated a reliability level that may have more than two possible values) based upon errors detected in flash memory cells that belong to these columns. This is a finer resolution than chuck based (multiple column) resolution.
The bad column information can be generated, for example, by method 400.
Stage 510 may be followed by stage 520 of receiving an input data unit to be written to the NAND flash memory array.
The input data unit may include bad column mapped data bits that are mapped to flash memory cells that belong to bad columns of the NAND flash memory array. The input data unit may be, for example, a word of a page and the method may be repeated for each word of that page. The bad column mapped data bits may be referred in the following text (for example in relation to
Stage 520 may be followed by stage 530 of detecting the bad column mapped data bits. Stage 530 may include storing the bad column mapped data bits in bad column mapped memory unit of the flash memory controller. This bad column mapped memory unit can be a shift register, can be volatile or non-volatile. It may be referred to (for example—in pages 8-10) as a “spare bits register”.
Stage 530 may include detecting the bad column mapped data bits in response to a first data structure that maps flash memory cells of bad columns to locations of bad column mapped data bits within the input data unit.
Stage 530 may be followed by stage 540 of sending the input data unit to the NAND flash memory unit and instructing the NAND flash memory unit to write the input data unit to a first portion of the NAND flash memory array to provide a programmed data unit.
Stage 540 may be followed by stage 550 of sending the bad column mapped data bits to the NAND flash memory unit. It is noted that the bad column mapped data can be stored on the NAND flash memory unit or in any other memory unit of any type. Furthermore, it may be stored once in the NAND flash memory unit in a particular location and not every time new data is written. It is then read only once, when the system starts up, and a memory controller reads the bad column mapped data from the NAND flash memory unit.
Stage 550 may be followed by stage 560 of instructing the NAND flash memory unit to write the bad column mapped data bits to a second portion of the NAND flash memory array to provide programmed bad column mapped data bits. It is noted that the first and second portions can be programmed concurrently and can belong to a same page.
This second portion can be referred to as a spare area. The second portion can include bad columns or may be free of bad columns. If it includes bad columns than any of the schemes illustrated in this application (such as bit skipping) can be applied.
The first and second portions of the NAND flash memory array belong to a same physical page of the NAND flash memory array.
Stage 560 may be followed by either one of stages 570 and 572.
Stage 570 includes reading the programmed bad column mapped data bits to provide read bad column mapped data bits.
Stage 572 may include reading from the first portion of the NAND flash memory unit the programmed input data unit to provide a read data unit.
Stage 572 may be followed by stage 574 of applying an error correction process on the read data unit to provide error correction results and determining whether to read the programmed bad column mapped data bits in response to the error correction results. If, for example, the error correction process corrected all the errors then there is no need in reading the programmed bad column mapped data bits.
If it is determined to read the programmed input data unit then stage 574 is followed by stage 570—else it is followed by stage 580 of generating an output data unit in response to the read data unit and read bad column mapped data bits.
Stage 580 may include replacing bits of the read data unit that were mapped to flash memory units of bad columns by read bad column mapped data bits.
Stage 580 may include error correcting the read data unit using information obtained from the read bad column mapped data bits.
Bad Columns Spreading Schemes
Next we consider a different type of handling of bad columns. Bad-columns may be arbitrarily distributed in a device. Therefore, the bad columns may be unevenly distributed between the codewords.
To even out the probability of decoding success, According to an embodiment of the invention it may be desirable to spreading the effect of the bad columns across the CWs. In
In general, to even out bad columns across codewords the scheme of
Finally, the spreading scheme above does not include column replacement in the case where the total data in the codewords is smaller than the data in the page. The two schemes may be combined to create a joint replacement spreading scheme such that if the number of columns+the total number of bits in the concatenated codewords is larger than a page, the bad columns are evenly spread across the codewords.
Code Definition to Account for Bad Columns
In general, the number of bad columns in a NAND device is random and changes between one device and another. The manufacturer guaranties that the maximum number of bad columns will not exceed a certain maximum but this is typically much larger than the actual number of bad columns. Therefore, the size of the redundancy may be chosen as a function of the distribution of bad columns.
We can define a BER function of the code which is a function that defines the BER the code can handle given a certain amount of bad columns that were not replaced and given the available redundancy.
Example: Fber(Nred,Nbad_columns)=A*Nred−B*Nbad_columns.
Other examples of BER functions are also possible.
In addition, we also define a function that relates between the distribution of bad columns and the redundancy of a code word.
Example:
Other examples of distributions are also possible.
Therefore, given the above distribution and BER functions we can optimize the choice of redundancy to maximize a score function. Examples:
Adaptive Code Definition Upon Device Initialization
Another alternative is to define the code redundancy upon controller initialization. A controller is always coupled with a set of devices. Once the devices are chosen, the bad columns are fixed. Therefore, the redundancy may be adapted to that bad columns configuration such as to replace all bad columns and thus maximize the handled BER for that die configuration.
Note that the redundancy may be configured only to a predefined set of values. In that case the redundancy is chosen for a given die configuration to maximize Fber(Nred,Nbad_columns+Nred−C).
Concatenated Dies
In some systems data is written on several NAND flash dies and codewords may be programmed across two dies (first part of a codeword on one die and the last part of the codeword on another die) or even more than two dies. In this case, we can think of several dies as one supper die and add up all the bad columns together and apply all the algorithms above (bit skipping, replacement, etc.) to the supper die instead of a single die. Furthermore, we can apply the redundancy selection methods above to the supper die rather than a single die. This allows improving some of the results since now the number of bad columns is effectively averaged over several dies.
The invention may also be implemented in a computer program for running on a computer system, at least including code portions for performing steps of a method according to the invention when run on a programmable apparatus, such as a computer system or enabling a programmable apparatus to perform functions of a device or system according to the invention. The computer program may cause the storage system to allocate disk drives to disk drive groups.
A computer program is a list of instructions such as a particular application program and/or an operating system. The computer program may for instance include one or more of: a subroutine, a function, a procedure, an object method, an object implementation, an executable application, an applet, a servlet, a source code, an object code, a shared library/dynamic load library and/or other sequence of instructions designed for execution on a computer system.
The computer program may be stored internally on a non-transitory computer readable medium. All or some of the computer program may be provided on computer readable media permanently, removably or remotely coupled to an information processing system. The computer readable media may include, for example and without limitation, any number of the following: magnetic storage media including disk and tape storage media; optical storage media such as compact disk media (e.g., CD-ROM, CD-R, etc.) and digital video disk storage media; nonvolatile memory storage media including semiconductor-based memory units such as FLASH memory, EEPROM, EPROM, ROM; ferromagnetic digital memories; MRAM; volatile storage media including registers, buffers or caches, main memory, RAM, etc.
A computer process typically includes an executing (running) program or portion of a program, current program values and state information, and the resources used by the operating system to manage the execution of the process. An operating system (OS) is the software that manages the sharing of the resources of a computer and provides programmers with an interface used to access those resources. An operating system processes system data and user input, and responds by allocating and managing tasks and internal system resources as a service to users and programs of the system.
The computer system may for instance include at least one processing unit, associated memory and a number of input/output (I/O) devices. When executing the computer program, the computer system processes information according to the computer program and produces resultant output information via I/O devices.
In the foregoing specification, the invention has been described with reference to specific examples of embodiments of the invention. It will, however, be evident that various modifications and changes may be made therein without departing from the broader spirit and scope of the invention as set forth in the appended claims.
Moreover, the terms “front,” “back,” “top,” “bottom,” “over,” “under” and the like in the description and in the claims, if any, are used for descriptive purposes and not necessarily for describing permanent relative positions. It is understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in other orientations than those illustrated or otherwise described herein.
The connections as discussed herein may be any type of connection suitable to transfer signals from or to the respective nodes, units or devices, for example via intermediate devices. Accordingly, unless implied or stated otherwise, the connections may for example be direct connections or indirect connections. The connections may be illustrated or described in reference to being a single connection, a plurality of connections, unidirectional connections, or bidirectional connections. However, different embodiments may vary the implementation of the connections. For example, separate unidirectional connections may be used rather than bidirectional connections and vice versa. Also, plurality of connections may be replaced with a single connection that transfers multiple signals serially or in a time multiplexed manner. Likewise, single connections carrying multiple signals may be separated out into various different connections carrying subsets of these signals. Therefore, many options exist for transferring signals.
Although specific conductivity types or polarity of potentials have been described in the examples, it will be appreciated that conductivity types and polarities of potentials may be reversed.
Each signal described herein may be designed as positive or negative logic. In the case of a negative logic signal, the signal is active low where the logically true state corresponds to a logic level zero. In the case of a positive logic signal, the signal is active high where the logically true state corresponds to a logic level one. Note that any of the signals described herein may be designed as either negative or positive logic signals. Therefore, in alternate embodiments, those signals described as positive logic signals may be implemented as negative logic signals, and those signals described as negative logic signals may be implemented as positive logic signals.
Furthermore, the terms “assert” or “set” and “negate” (or “deassert” or “clear”) are used herein when referring to the rendering of a signal, status bit, or similar apparatus into its logically true or logically false state, respectively. If the logically true state is a logic level one, the logically false state is a logic level zero. And if the logically true state is a logic level zero, the logically false state is a logic level one.
Those skilled in the art will recognize that the boundaries between logic blocks are merely illustrative and that alternative embodiments may merge logic blocks or circuit elements or impose an alternate decomposition of functionality upon various logic blocks or circuit elements. Thus, it is to be understood that the architectures depicted herein are merely exemplary, and that in fact many other architectures may be implemented which achieve the same functionality.
Any arrangement of components to achieve the same functionality is effectively “associated” such that the desired functionality is achieved. Hence, any two components herein combined to achieve a particular functionality may be seen as “associated with” each other such that the desired functionality is achieved, irrespective of architectures or intermedial components. Likewise, any two components so associated can also be viewed as being “operably connected,” or “operably coupled,” to each other to achieve the desired functionality.
Furthermore, those skilled in the art will recognize that boundaries between the above described operations merely illustrative. The multiple operations may be combined into a single operation, a single operation may be distributed in additional operations and operations may be executed at least partially overlapping in time. Moreover, alternative embodiments may include multiple instances of a particular operation, and the order of operations may be altered in various other embodiments.
Also for example, in one embodiment, the illustrated examples may be implemented as circuitry located on a single integrated circuit or within a same device. Alternatively, the examples may be implemented as any number of separate integrated circuits or separate devices interconnected with each other in a suitable manner.
Also for example, the examples, or portions thereof, may implemented as soft or code representations of physical circuitry or of logical representations convertible into physical circuitry, such as in a hardware description language of any appropriate type.
Also, the invention is not limited to physical devices or units implemented in non-programmable hardware but can also be applied in programmable devices or units able to perform the desired device functions by operating in accordance with suitable program code, such as mainframes, minicomputers, servers, workstations, personal computers, notepads, personal digital assistants, electronic games, automotive and other embedded systems, cell phones and various other wireless devices, commonly denoted in this application as ‘computer systems’.
However, other modifications, variations and alternatives are also possible. The specifications and drawings are, accordingly, to be regarded in an illustrative rather than in a restrictive sense.
In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word ‘comprising’ does not exclude the presence of other elements or steps then those listed in a claim. Furthermore, the terms “a” or “an,” as used herein, are defined as one or more than one. Also, the use of introductory phrases such as “at least one” and “one or more” in the claims should not be construed to imply that the introduction of another claim element by the indefinite articles “a” or “an” limits any particular claim containing such introduced claim element to inventions containing only one such element, even when the same claim includes the introductory phrases “one or more” or “at least one” and indefinite articles such as “a” or “an.” The same holds true for the use of definite articles. Unless stated otherwise, terms such as “first” and “second” are used to arbitrarily distinguish between the elements such terms describe. Thus, these terms are not necessarily intended to indicate temporal or other prioritization of such elements The mere fact that certain measures are recited in mutually different claims does not indicate that a combination of these measures cannot be used to advantage.
While certain features of the invention have been illustrated and described herein, many modifications, substitutions, changes, and equivalents will now occur to those of ordinary skill in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the invention.
Number | Name | Date | Kind |
---|---|---|---|
4430701 | Christian et al. | Feb 1984 | A |
4463375 | Macovski | Jul 1984 | A |
4584686 | Fritze | Apr 1986 | A |
4589084 | Fling et al. | May 1986 | A |
4777589 | Boettner et al. | Oct 1988 | A |
4866716 | Weng | Sep 1989 | A |
5003597 | Merkle | Mar 1991 | A |
5077737 | Leger et al. | Dec 1991 | A |
5297153 | Baggen et al. | Mar 1994 | A |
5305276 | Uenoyama | Apr 1994 | A |
5592641 | Doyle et al. | Jan 1997 | A |
5623620 | Alexis et al. | Apr 1997 | A |
5640529 | Hasbun | Jun 1997 | A |
5657332 | Auclair et al. | Aug 1997 | A |
5663901 | Harari et al. | Sep 1997 | A |
5724538 | Morris | Mar 1998 | A |
5729490 | Calligaro et al. | Mar 1998 | A |
5740395 | Wells | Apr 1998 | A |
5745418 | Hu et al. | Apr 1998 | A |
5778430 | Ish | Jul 1998 | A |
5793774 | Usui et al. | Aug 1998 | A |
5920578 | Zook et al. | Jul 1999 | A |
5926409 | Engh et al. | Jul 1999 | A |
5933368 | Hu et al. | Aug 1999 | A |
5956268 | Lee | Sep 1999 | A |
5956473 | Hu et al. | Sep 1999 | A |
5968198 | Balachandran | Oct 1999 | A |
5982659 | Irrinki et al. | Nov 1999 | A |
6011741 | Harari et al. | Jan 2000 | A |
6016275 | Han | Jan 2000 | A |
6038634 | Ji et al. | Mar 2000 | A |
6081878 | Estakhri | Jun 2000 | A |
6094465 | Stein et al. | Jul 2000 | A |
6119245 | Hiratsuka | Sep 2000 | A |
6182261 | Haller et al. | Jan 2001 | B1 |
6192497 | Yang et al. | Feb 2001 | B1 |
6195287 | Hirano | Feb 2001 | B1 |
6199188 | Shen et al. | Mar 2001 | B1 |
6209114 | Wolf et al. | Mar 2001 | B1 |
6259627 | Wong | Jul 2001 | B1 |
6272052 | Miyauchi | Aug 2001 | B1 |
6278633 | Wong et al. | Aug 2001 | B1 |
6279133 | Vafai et al. | Aug 2001 | B1 |
6301151 | Engh et al. | Oct 2001 | B1 |
6370061 | Yachareni et al. | Apr 2002 | B1 |
6374383 | Weng | Apr 2002 | B1 |
6504891 | Chevallier | Jan 2003 | B1 |
6532169 | Mann et al. | Mar 2003 | B1 |
6532556 | Wong et al. | Mar 2003 | B1 |
6553533 | Demura et al. | Apr 2003 | B2 |
6560747 | Weng | May 2003 | B1 |
6637002 | Weng et al. | Oct 2003 | B1 |
6639865 | Kwon | Oct 2003 | B2 |
6674665 | Mann et al. | Jan 2004 | B1 |
6675281 | Oh | Jan 2004 | B1 |
6704902 | Shinbashi et al. | Mar 2004 | B1 |
6751766 | Guterman et al. | Jun 2004 | B2 |
6772274 | Estakhri | Aug 2004 | B1 |
6781910 | Smith | Aug 2004 | B2 |
6792569 | Cox et al. | Sep 2004 | B2 |
6873543 | Smith et al. | Mar 2005 | B2 |
6891768 | Smith et al. | May 2005 | B2 |
6914809 | Hilton et al. | Jul 2005 | B2 |
6915477 | Gollamudi et al. | Jul 2005 | B2 |
6952365 | Gonzalez et al. | Oct 2005 | B2 |
6961890 | Smith | Nov 2005 | B2 |
6968421 | Conley | Nov 2005 | B2 |
6990012 | Smith et al. | Jan 2006 | B2 |
6996004 | Fastow et al. | Feb 2006 | B1 |
6999854 | Roth | Feb 2006 | B2 |
7010739 | Feng et al. | Mar 2006 | B1 |
7012835 | Gonzalez et al. | Mar 2006 | B2 |
7038950 | Hamilton et al. | May 2006 | B1 |
7068539 | Guterman et al. | Jun 2006 | B2 |
7079436 | Perner et al. | Jul 2006 | B2 |
7149950 | Spencer et al. | Dec 2006 | B2 |
7177977 | Chen et al. | Feb 2007 | B2 |
7188228 | Chang et al. | Mar 2007 | B1 |
7191379 | Adelmann et al. | Mar 2007 | B2 |
7196946 | Chen et al. | Mar 2007 | B2 |
7203874 | Roohparvar | Apr 2007 | B2 |
7212426 | Park | May 2007 | B2 |
7290203 | Emma et al. | Oct 2007 | B2 |
7292365 | Knox | Nov 2007 | B2 |
7301928 | Nakabayashi et al. | Nov 2007 | B2 |
7315916 | Bennett | Jan 2008 | B2 |
7388781 | Litsyn | Jun 2008 | B2 |
7395404 | Gorobets | Jul 2008 | B2 |
7441067 | Gorobets et al. | Oct 2008 | B2 |
7443729 | Li | Oct 2008 | B2 |
7450425 | Aritome | Nov 2008 | B2 |
7454670 | Kim et al. | Nov 2008 | B2 |
7466575 | Shalvi et al. | Dec 2008 | B2 |
7533328 | Alrod et al. | May 2009 | B2 |
7558109 | Brandman et al. | Jul 2009 | B2 |
7593263 | Sokolov et al. | Sep 2009 | B2 |
7610433 | Randell et al. | Oct 2009 | B2 |
7613043 | Cornwell | Nov 2009 | B2 |
7619922 | Li | Nov 2009 | B2 |
7697326 | Sommer et al. | Apr 2010 | B2 |
7706182 | Shalvi et al. | Apr 2010 | B2 |
7716538 | Gonzalez | May 2010 | B2 |
7804718 | Kim | Sep 2010 | B2 |
7805663 | Brandman et al. | Sep 2010 | B2 |
7805664 | Yang et al. | Sep 2010 | B1 |
7844877 | Litsyn et al. | Nov 2010 | B2 |
7911848 | Eun | Mar 2011 | B2 |
7961797 | Yang et al. | Jun 2011 | B1 |
7975192 | Sommer | Jul 2011 | B2 |
8020073 | Emma et al. | Sep 2011 | B2 |
8108590 | Chow et al. | Jan 2012 | B2 |
8122328 | Liu et al. | Feb 2012 | B2 |
8159881 | Yang | Apr 2012 | B2 |
8190961 | Yang | May 2012 | B1 |
8250324 | Haas | Aug 2012 | B2 |
8300823 | Bojinov | Oct 2012 | B2 |
8305812 | Levy | Nov 2012 | B2 |
8327246 | Weingarten | Dec 2012 | B2 |
8407560 | Ordentlich | Mar 2013 | B2 |
8417893 | Khmelnitsky | Apr 2013 | B2 |
8526238 | Moschiano et al. | Sep 2013 | B2 |
8711625 | Li et al. | Apr 2014 | B2 |
20010034815 | Dugan et al. | Oct 2001 | A1 |
20020063774 | Hillis et al. | May 2002 | A1 |
20020085419 | Kwon | Jul 2002 | A1 |
20020154769 | Petersen et al. | Oct 2002 | A1 |
20020156988 | Toyama | Oct 2002 | A1 |
20020174156 | Birru | Nov 2002 | A1 |
20030014582 | Nakanishi | Jan 2003 | A1 |
20030053142 | Wengender | Mar 2003 | A1 |
20030065876 | Lasser | Apr 2003 | A1 |
20030101404 | Zhao et al. | May 2003 | A1 |
20030105620 | Bowen | Jun 2003 | A1 |
20030177300 | Lee | Sep 2003 | A1 |
20030192007 | Miller et al. | Oct 2003 | A1 |
20030221144 | Shimada et al. | Nov 2003 | A1 |
20040015771 | Lasser et al. | Jan 2004 | A1 |
20040030971 | Tanaka | Feb 2004 | A1 |
20040059768 | Denk | Mar 2004 | A1 |
20040062135 | Itakura | Apr 2004 | A1 |
20040080985 | Chang et al. | Apr 2004 | A1 |
20040153722 | Lee | Aug 2004 | A1 |
20040153817 | Norman | Aug 2004 | A1 |
20040181735 | Xin | Sep 2004 | A1 |
20040203591 | Lee | Oct 2004 | A1 |
20040210706 | In et al. | Oct 2004 | A1 |
20050013165 | Ban | Jan 2005 | A1 |
20050018482 | Cemea et al. | Jan 2005 | A1 |
20050083735 | Chen et al. | Apr 2005 | A1 |
20050117401 | Chen et al. | Jun 2005 | A1 |
20050120265 | Pline et al. | Jun 2005 | A1 |
20050128811 | Kato et al. | Jun 2005 | A1 |
20050138533 | Le-Bars et al. | Jun 2005 | A1 |
20050144213 | Simkins et al. | Jun 2005 | A1 |
20050144368 | Chung et al. | Jun 2005 | A1 |
20050169057 | Shibata | Aug 2005 | A1 |
20050172179 | Brandenberger et al. | Aug 2005 | A1 |
20050213393 | Lasser | Sep 2005 | A1 |
20050243626 | Ronen | Nov 2005 | A1 |
20060059406 | Micheloni et al. | Mar 2006 | A1 |
20060059409 | Lee | Mar 2006 | A1 |
20060064537 | Oshima | Mar 2006 | A1 |
20060101193 | Murin | May 2006 | A1 |
20060171202 | Kawamoto et al. | Aug 2006 | A1 |
20060195651 | Estakhri | Aug 2006 | A1 |
20060203587 | Li et al. | Sep 2006 | A1 |
20060221692 | Chen | Oct 2006 | A1 |
20060248434 | Radke et al. | Nov 2006 | A1 |
20060256631 | Nobunaga et al. | Nov 2006 | A1 |
20060268608 | Noguchi et al. | Nov 2006 | A1 |
20060282411 | Fagin et al. | Dec 2006 | A1 |
20060284244 | Forbes | Dec 2006 | A1 |
20060294312 | Walmsley | Dec 2006 | A1 |
20070025157 | Wan et al. | Feb 2007 | A1 |
20070063180 | Asano et al. | Mar 2007 | A1 |
20070081388 | Joo | Apr 2007 | A1 |
20070098069 | Gordon | May 2007 | A1 |
20070103992 | Sakui et al. | May 2007 | A1 |
20070104004 | So et al. | May 2007 | A1 |
20070109858 | Conley et al. | May 2007 | A1 |
20070124652 | Litsyn et al. | May 2007 | A1 |
20070140006 | Chen | Jun 2007 | A1 |
20070143561 | Gorobets | Jun 2007 | A1 |
20070150694 | Chang et al. | Jun 2007 | A1 |
20070168625 | Cornwell et al. | Jul 2007 | A1 |
20070171714 | Wu et al. | Jul 2007 | A1 |
20070171730 | Ramamoorthy et al. | Jul 2007 | A1 |
20070180346 | Murin | Aug 2007 | A1 |
20070223277 | Tanaka et al. | Sep 2007 | A1 |
20070226582 | Tang et al. | Sep 2007 | A1 |
20070226592 | Radke | Sep 2007 | A1 |
20070228449 | Takano et al. | Oct 2007 | A1 |
20070253249 | Kang et al. | Nov 2007 | A1 |
20070253250 | Shibata | Nov 2007 | A1 |
20070255982 | Adsitt | Nov 2007 | A1 |
20070263439 | Cornwell et al. | Nov 2007 | A1 |
20070266291 | Toda et al. | Nov 2007 | A1 |
20070271494 | Gorobets | Nov 2007 | A1 |
20070297226 | Mokhlesi | Dec 2007 | A1 |
20080010581 | Alrod et al. | Jan 2008 | A1 |
20080028014 | Hilt et al. | Jan 2008 | A1 |
20080049497 | Mo | Feb 2008 | A1 |
20080055989 | Lee | Mar 2008 | A1 |
20080082897 | Brandman et al. | Apr 2008 | A1 |
20080092026 | Brandman et al. | Apr 2008 | A1 |
20080104309 | Cheon et al. | May 2008 | A1 |
20080112238 | Kim | May 2008 | A1 |
20080116509 | Harari et al. | May 2008 | A1 |
20080126686 | Sokolov et al. | May 2008 | A1 |
20080127104 | Li et al. | May 2008 | A1 |
20080128790 | Jung | Jun 2008 | A1 |
20080130341 | Shalvi et al. | Jun 2008 | A1 |
20080137413 | Kong et al. | Jun 2008 | A1 |
20080137414 | Park et al. | Jun 2008 | A1 |
20080141043 | Flynn et al. | Jun 2008 | A1 |
20080148115 | Sokolov | Jun 2008 | A1 |
20080158958 | Shavi et al. | Jul 2008 | A1 |
20080159059 | Moyer | Jul 2008 | A1 |
20080162079 | Astigarraga et al. | Jul 2008 | A1 |
20080168216 | Lee | Jul 2008 | A1 |
20080168320 | Cassuto et al. | Jul 2008 | A1 |
20080181001 | Shalvi | Jul 2008 | A1 |
20080198650 | Shalvi et al. | Aug 2008 | A1 |
20080198652 | Shalvi et al. | Aug 2008 | A1 |
20080201620 | Gollub | Aug 2008 | A1 |
20080209114 | Chow et al. | Aug 2008 | A1 |
20080219050 | Shalvi et al. | Sep 2008 | A1 |
20080225599 | Chae | Sep 2008 | A1 |
20080244340 | Doi | Oct 2008 | A1 |
20080250195 | Chow et al. | Oct 2008 | A1 |
20080263262 | Sokolov et al. | Oct 2008 | A1 |
20080282106 | Shalvi et al. | Nov 2008 | A1 |
20080285351 | Shlick et al. | Nov 2008 | A1 |
20080301532 | Uchikawa et al. | Dec 2008 | A1 |
20090024905 | Shalvi et al. | Jan 2009 | A1 |
20090027961 | Park | Jan 2009 | A1 |
20090043951 | Shalvi et al. | Feb 2009 | A1 |
20090046507 | Aritome | Feb 2009 | A1 |
20090072303 | Prall et al. | Mar 2009 | A9 |
20090091979 | Shalvi | Apr 2009 | A1 |
20090103358 | Sommer et al. | Apr 2009 | A1 |
20090106485 | Anholt | Apr 2009 | A1 |
20090113275 | Chen et al. | Apr 2009 | A1 |
20090125671 | Flynn | May 2009 | A1 |
20090132755 | Radke | May 2009 | A1 |
20090144598 | Yoon | Jun 2009 | A1 |
20090144600 | Perlmutter et al. | Jun 2009 | A1 |
20090150599 | Bennett | Jun 2009 | A1 |
20090150748 | Egner et al. | Jun 2009 | A1 |
20090157964 | Kasorla et al. | Jun 2009 | A1 |
20090158126 | Perlmutter et al. | Jun 2009 | A1 |
20090168524 | Golov et al. | Jul 2009 | A1 |
20090187803 | Anholt et al. | Jul 2009 | A1 |
20090199074 | Sommer | Aug 2009 | A1 |
20090213653 | Perlmutter et al. | Aug 2009 | A1 |
20090213654 | Perlmutter et al. | Aug 2009 | A1 |
20090228761 | Perlmutter et al. | Sep 2009 | A1 |
20090240872 | Perlmutter et al. | Sep 2009 | A1 |
20090282185 | Van Cauwenbergh | Nov 2009 | A1 |
20090282186 | Mokhlesi et al. | Nov 2009 | A1 |
20090287930 | Nagaraja | Nov 2009 | A1 |
20090300269 | Radke et al. | Dec 2009 | A1 |
20090323942 | Sharon | Dec 2009 | A1 |
20100005270 | Jiang | Jan 2010 | A1 |
20100025811 | Bronner et al. | Feb 2010 | A1 |
20100030944 | Hinz | Feb 2010 | A1 |
20100058146 | Weingarten et al. | Mar 2010 | A1 |
20100064096 | Weingarten et al. | Mar 2010 | A1 |
20100088557 | Weingarten et al. | Apr 2010 | A1 |
20100091535 | Sommer et al. | Apr 2010 | A1 |
20100095186 | Weingarten | Apr 2010 | A1 |
20100110787 | Shalvi et al. | May 2010 | A1 |
20100115376 | Shalvi et al. | May 2010 | A1 |
20100122113 | Weingarten et al. | May 2010 | A1 |
20100124088 | Shalvi et al. | May 2010 | A1 |
20100131580 | Kanter et al. | May 2010 | A1 |
20100131806 | Weingarten et al. | May 2010 | A1 |
20100131809 | Katz | May 2010 | A1 |
20100131826 | Shalvi et al. | May 2010 | A1 |
20100131827 | Sokolov et al. | May 2010 | A1 |
20100131831 | Weingarten et al. | May 2010 | A1 |
20100146191 | Katz | Jun 2010 | A1 |
20100146192 | Weingarten et al. | Jun 2010 | A1 |
20100149881 | Lee et al. | Jun 2010 | A1 |
20100172179 | Gorobets et al. | Jul 2010 | A1 |
20100174853 | Lee | Jul 2010 | A1 |
20100180073 | Weingarten et al. | Jul 2010 | A1 |
20100199149 | Weingarten et al. | Aug 2010 | A1 |
20100211724 | Weingarten | Aug 2010 | A1 |
20100211833 | Weingarten | Aug 2010 | A1 |
20100211856 | Weingarten | Aug 2010 | A1 |
20100241793 | Sugimoto | Sep 2010 | A1 |
20100246265 | Moschiano et al. | Sep 2010 | A1 |
20100251066 | Radke | Sep 2010 | A1 |
20100253555 | Weingarten et al. | Oct 2010 | A1 |
20100257309 | Barsky et al. | Oct 2010 | A1 |
20100269008 | Leggette | Oct 2010 | A1 |
20100293321 | Weingarten | Nov 2010 | A1 |
20100318724 | Yeh | Dec 2010 | A1 |
20110040924 | Selinger | Feb 2011 | A1 |
20110041005 | Selinger | Feb 2011 | A1 |
20110041039 | Harari et al. | Feb 2011 | A1 |
20110051521 | Levy et al. | Mar 2011 | A1 |
20110055461 | Steiner et al. | Mar 2011 | A1 |
20110093650 | Kwon et al. | Apr 2011 | A1 |
20110096612 | Steiner et al. | Apr 2011 | A1 |
20110099460 | Dusija et al. | Apr 2011 | A1 |
20110119562 | Steiner et al. | May 2011 | A1 |
20110153919 | Sabbag | Jun 2011 | A1 |
20110161775 | Weingarten | Jun 2011 | A1 |
20110194353 | Hwang et al. | Aug 2011 | A1 |
20110209028 | Post | Aug 2011 | A1 |
20110214029 | Steiner et al. | Sep 2011 | A1 |
20110214039 | Steiner et al. | Sep 2011 | A1 |
20110246792 | Weingarten | Oct 2011 | A1 |
20110246852 | Sabbag | Oct 2011 | A1 |
20110252187 | Segal et al. | Oct 2011 | A1 |
20110252188 | Weingarten | Oct 2011 | A1 |
20110271043 | Segal et al. | Nov 2011 | A1 |
20110302428 | Weingarten | Dec 2011 | A1 |
20120001778 | Steiner et al. | Jan 2012 | A1 |
20120005554 | Steiner et al. | Jan 2012 | A1 |
20120005558 | Steiner et al. | Jan 2012 | A1 |
20120005560 | Steiner et al. | Jan 2012 | A1 |
20120008401 | Katz et al. | Jan 2012 | A1 |
20120008414 | Katz et al. | Jan 2012 | A1 |
20120017136 | Ordentlich et al. | Jan 2012 | A1 |
20120051144 | Weingarten et al. | Mar 2012 | A1 |
20120063227 | Weingarten et al. | Mar 2012 | A1 |
20120066441 | Weingarten | Mar 2012 | A1 |
20120110250 | Sabbag et al. | May 2012 | A1 |
20120124273 | Goss et al. | May 2012 | A1 |
20120246391 | Meir | Sep 2012 | A1 |
20120294094 | Ling et al. | Nov 2012 | A1 |
20120294100 | Ling et al. | Nov 2012 | A1 |
20130314992 | Takagiwa | Nov 2013 | A1 |
20130329494 | Shirakawa | Dec 2013 | A1 |
20140250348 | Harari et al. | Sep 2014 | A1 |
Entry |
---|
Lakshmi et al., Detection of High Accuracy Bist-Based Fault Diagnosis for Embedded Read-Only Memories, Sep. 2012, International Journal of Engineering Research & Technology (IJERT), vol. 1, Issue 7, pp. 1-7. |
Search Report of PCT Patent Application WO 2009/118720 A3, Mar 4, 2010. |
Search Report of PCT Patent Application WO 2009/095902 A3, Mar 4, 2010. |
Search Report of PCT Patent Application WO 2009/078006 A3, Mar 4, 2010. |
Search Report of PCT Patent Application WO 2009/074979 A3, Mar 4, 2010. |
Search Report of PCT Patent Application WO 2009/074978 A3, Mar 4, 2010. |
Search Report of PCT Patent Application WO 2009/072105 A3, Mar 4, 2010. |
Search Report of PCT Patent Application WO 2009/072104 A3, Mar 4, 2010. |
Search Report of PCT Patent Application WO 2009/072103 A3, Mar 4, 2010. |
Search Report of PCT Patent Application WO 2009/072102 A3, Mar 4, 2010. |
Search Report of PCT Patent Application WO 2009/072101 A3, Mar 4, 2010. |
Search Report of PCT Patent Application WO 2009/072100 A3, Mar 4, 2010. |
Search Report of PCT Patent Application WO 2009/053963 A3, Mar 4, 2010. |
Search Report of PCT Patent Application WO 2009/053962 A3, Mar 4, 2010. |
Search Report of PCT Patent Application WO 2009/053961 A3, Mar 4, 2010. |
Search Report of PCT Patent Application WO 2009/037697 A3, Mar 4, 2010. |
Yani Chen, Kcshab K. Parhi, “Small Area Parallel Chien Search Architectures for Long BCH Codes”, IEEE Transactions on Very Large Scale Integration(VLSI) Systems, vol. 12, No. 5, May 2004. |
Yuejian Wu, “Low Power Decoding of BCH Codes”, Nortel Networks, Ottawa, Ont., Canada, in Circuits and systems, 2004. ISCAS '04. Proceeding of the 2004 International Symposium on Circuits and Systems, published May 23-26, 2004, vol. 2, pp. II-369-II-372 vol. 2. |
Michael Purser, “Introduction to Error Correcting Codes”, Artech House Inc., 1995. |
Ron M. Roth, “Introduction to Coding Theory”, Cambridge University Press, 2006. |
Akash Kumar, Sergei Sawitzki, “High-Throughput and Low Power Architectures for Reed Solomon Decoder”, (a.kumar at tue.nl, Eindhoven University of Technology and sergei.sawitzki at philips.com), Oct. 2005. |
Todd K.Moon, “Error Correction Coding Mathematical Methods and Algorithms”, A John Wiley & Sons, Inc., 2005. |
Richard E. Blahut, “Algebraic Codes for Data Transmission”, Cambridge University Press, 2003. |
David Esseni, Bruno Ricco, “Trading-Off Programming Speed and Current Absorption in Flash Memories with the Ramped-Gate Programming Technique”, Ieee Transactions on Electron Devices, vol. 47, No. 4, Apr. 2000. |
Giovanni Campardo, Rino Micheloni, David Novosel, “VLSI-Design of Non-Volatile Memories”, Springer Berlin Heidelberg New York, 2005. |
John G. Proakis, “Digital Communications”, 3rd ed., New York: McGraw-Hill, 1995. |
J.M. Portal, H. Aziza, D. Nee, “EEPROM Memory: Threshold Voltage Built in Self Diagnosis”, ITC International Test Conference, Paper 2.1, Feb. 2005. |
J.M. Portal, H. Aziza, D. Nee, “EEPROM Diagnosis Based on Threshold Voltage Embedded Measurement”, Journal of Electronic Testing: Theory and Applications 21, 33-42, 2005. |
G. Tao, A. Scarpa, J. J Dijkstra, W. Stidl, F. Kuper, “Data retention prediction for modern floating gate non-volatile memories”, Microelectronics Reliability 40 (2000), 1561-1566. |
T. Hirncno, N. Matsukawa, H. Hazama, K. Sakui, M. Oshikiri, K. Masuda, K. Kanda, Y. Itoh, J. Miyamoto, “A New Technique for Measuring Threshold Voltage Distribution in Flash EEPROM Devices”, Proc. IEEE 1995 Int. Conference on Microelectronics Test Structures, vol. 8, Mar. 1995. |
Boaz Eitan, Guy Cohen, Assaf Shappir, Eli Lusky, Amichai Givant, Meir Janai, Ilan Bloom, Yan Polansky, Oleg Dadashev, Avi Lavan, Ran Sahar, Eduardo Maayan, “4-bit per Cell NROM Reliability”, Appears on the website of Saifun.com , 2005. |
Paulo Cappelletti, Clara Golla, Piero Olivo, Enrico Zanoni, “Flash Memories”, Kluwer Academic Publishers, 1999. |
JEDEC Standard, “Stress-Test-Driven Qualification of Integrated Circuits”, JEDEC Solid State Technology Association. JEDEC Standard No. 47F pp. 1-26, Dec. 2007. |
Dempster, et al., “Maximum Likelihood from Incomplete Data via the EM Algorithm”, Journal of the Royal Statistical Society. Series B (Methodological), vol. 39, No. 1 (1997), pp. 1-38. |
Mielke, et al., “Flash EEPROM Threshold Instabilities due to Charge Trapping During Program/Erase Cycling”, IEEE Transactions on Device and Materials Reliability, vol. 4, No. 3, Sep. 2004, pp. 335-344. |
Daneshbeh, “Bit Serial Systolic Architectures for Multiplicative Inversion and Division over GF (2)”, A thesis presented to the University of Waterloo, Ontario, Canada, 2005, pp. 1-118. |
Chen, Formulas for the solutions of Quadratic Equations over GF (2), IEEE Trans. Inform. Theory, vol. IT-28, No. 5, Sep. 1982, pp. 792-794. |
Berlekamp et al., “On the Solution of Algebraic Equations over Finite Fields”, Inform. Cont. 10, Oct. 1967, pp. 553-564. |