At least some embodiments disclosed herein relate to memory systems in general, and more particularly, but not limited to predictive data pre-fetching in data storage devices.
A memory sub-system can include one or more memory components that store data. A memory sub-system can be a data storage system, such as a solid-state drive (SSD), or a hard disk drive (HDD). A memory sub-system can be a memory module, such as a dual in-line memory module (DIMM), a small outline DIMM (SO-DIMM), or a non-volatile dual in-line memory module (NVDIMM). The memory components can be, for example, non-volatile memory components and volatile memory components. Examples of memory components include memory integrated circuits. Some memory integrated circuits are volatile and require power to maintain stored data. Some memory integrated circuits are non-volatile and can retain stored data even when not powered. Examples of non-volatile memory include flash memory, Read-Only Memory (ROM), Programmable Read-Only Memory (PROM), Erasable Programmable Read-Only Memory (EPROM) and Electronically Erasable Programmable Read-Only Memory (EEPROM) memory, etc. Examples of volatile memory include Dynamic Random-Access Memory (DRAM) and Static Random-Access Memory (SRAM). In general, a host system can utilize a memory sub-system to store data at the memory components and to retrieve data from the memory components.
A computer can include a host system and one or more memory sub-systems attached to the host system. The host system can have a central processing unit (CPU) in communication with the one or more memory sub-systems to store and/or retrieve data and instructions. Instructions for a computer can include operating systems, device drivers, and application programs. An operating system manages resources in the computer and provides common services for application programs, such as memory allocation and time sharing of the resources. A device driver operates or controls a particular type of devices in the computer; and the operating system uses the device driver to offer resources and/or services provided by the type of devices. A central processing unit (CPU) of a computer system can run an operating system and device drivers to provide the services and/or resources to application programs. The central processing unit (CPU) can run an application program that uses the services and/or resources. For example, an application program implementing a type of applications of computer systems can instruct the central processing unit (CPU) to store data in the memory components of a memory sub-system and retrieve data from the memory components.
A host system can communicate with a memory sub-system in accordance with a pre-defined communication protocol, such as Non-Volatile Memory Host Controller Interface Specification (NVMHCI), also known as NVM Express (NVMe), which specifies the logical device interface protocol for accessing non-volatile storage devices via a Peripheral Component Interconnect Express (PCI Express or PCIe) bus. In accordance with the communication protocol, the host system can send commands of different types to the memory sub-system; and the memory sub-system can execute the commands and provide responses to the commands. Some commands instruct the memory sub-system to store data items at addresses specified in the commands, or to retrieve data items from addresses specified in the commands, such as read commands and write commands. Some commands manage the infrastructure in the memory sub-system and/or administrative tasks, such as commands to manage namespaces, commands to attach namespaces, commands to create input/output submission or completion queues, commands to delete input/output submission or completion queues, commands for firmware management, etc.
The embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings in which like references indicate similar elements.
At least some aspects of the present disclosure are directed to predictive pre-fetching data for commands that can increase execution latency of other commands executed concurrently in a data storage device. For example, a predictive model is configured in a data storage device to identify such commands that can cause significant delays in the execution of other commands. The data used by the identified commands can be pre-fetched from non-volatile storage media of the data storage device to buffer memory of the storage device. Pre-fetching the data to the buffer memory can reduce, minimize and/or eliminate the delays caused by the identified commands in the execution of other commands. The predictive model can be established by applying machine learning techniques on a training set of commands, using the execution latency data of the commands in the training set.
In general, infrastructure commands can be used to manage, configure, administrate, or report on the status of, the infrastructure in a data storage system. Certain infrastructure command can often cause unexpected increases in latency in the execution of other commands that not related to such commands. Such infrastructure commands can have high latency. When certain resources in the data storage system are used for the execution of the high latency infrastructure commands, the resources become unavailable for the execution of other commands, causing apparently random delays in the execution of other commands that may use the resources.
In at least some embodiments disclosed herein, a predictive model is configured to predict infrastructure commands that are most likely to increase latency of other commands. The prediction is based on some characteristics of commands that are currently queued for processing in the data storage system. The prediction allows the data storage system to pre-fetch data from non-volatile storage media to buffer memory for the predicted infrastructure commands. After the pre-fetching of the data for the predicted commands, the likelihood of the predicted infrastructure commands using resources during their execution to access the non-volatile storage media and make them unavailable for execution of other commands is reduced. Therefore, the impact of the execution of the infrastructure commands on other commands can be reduced, minimized, and/or eliminated.
For example, a supervised machine learning technique can be applied to a group of commands in a training data set. The training data set can have a mixed set of infrastructure commands of different types and other commands of different types. The training set of commands can represent an example of workload for a data storage device/system, or a real workload during a period of service. Some parameters of the commands in the training set can be used as input parameters to the predictive model, such as the types of commands, the regions in the storage system being accessed by the commands, etc. The measured latency in the execution of the commands in the training set can be used to identify infrastructure commands that have high impact on the execution of other commands and infrastructure commands that do not have high impact on the execution of other commands. For example, high impact commands cause more than a threshold amount of increased latency in the execution of other commands; and low impact commands cause no more than the threshold amount of increase in latency of other commands. The supervised machine learning technique can be used to train the predictive model by adjusting the parameters in the predictive model to minimize the differences between the classification/prediction of the infrastructure commands identified by the predictive model and the classification/prediction of infrastructure commands identified from the latency data in the training data set.
For example, the predictive model can be trained to classify a sequence of commands. Each infrastructure commands in the sequence can be classified as either having potential for high impact or not having the potential for the commands in the sequence.
For example, the predictive model can be trained to predict, for a sequence of commands, latency increases caused by an infrastructure command in the sequence in the execution of other commands in the sequence. The predicted increases in execution latency can be compared with a threshold to classify the infrastructure command as either a high impact command, or a low impact command.
For example, the predictive model can be trained to predict, for a sequence of commands, an infrastructure command that will enter the data storage device/system to cause more than a threshold amount of increase in the execution latency of some of the commands in the sequence. The prediction can be made based on the pattern of infrastructure commands and other commands.
For example, the predictive model can be based on statistical correlation using logistic regression and/or an artificial neural network.
For example, different sets of training sets can be used for data storage systems having different structures and different configurations.
A data storage system of a particular design can be initially configured with a predictive model trained according to a typical workload of commands for the design. Subsequently, the predictive model can be further trained and/or updated for the typical workload of the data storage system in a computer system and/or based on a recent real-time workload of the data storage system.
Optionally, the data storage system can be further configured to monitor differences between the real-time predictions made using the predictive model and subsequent measurement of increased latency in command executions to further train the predictive model periodically to adapt its predictive capability in accordance with the real-time workload.
During the usage of the data storage system that has a predictive model, the incoming commands to be executed by the data storage system can be provided as input to the predictive model to identify a table of commands scheduled/suggested for pre-fetching.
For example, the predictive model can be used to process a predetermined number of commands pending in one or more queues for execution (e.g., 1000 commands) or once every predetermined time period (e.g., 10 ms). During the use of the predictive model, the commands pending for execution by the data storage system can be fed into the predictive model to identify a table of high impact commands for pre-fetching. The data storage system is configured to pre-fetch the data that is likely to be used by the high impact commands in the table before the actual execution of the high impact commands, such that impact of the execution of the high impact commands is distributed to a large number of other commands. Further, the pre-fetching can be configured to use spare resources that are not used/required for the execution of the other commands, which are executed before the high impact commands; and such an arrangement can reduce the overall impact of the high impact commands on other commands.
In some instances, the predictive model can predict an infrastructure command before the host system sends the infrastructure command to the data storage system and/or before the infrastructure command is retrieved from a queue for execution. The data storage system can use a flag to indicate whether or not the pre-fetched data for the predicted infrastructure command is valid.
In general, a memory sub-system can also be referred to as a “memory device”. An example of a memory sub-system is a memory module that is connected to a central processing unit (CPU) via a memory bus. Examples of memory modules include a dual in-line memory module (DIMM), a small outline DIMM (SO-DIMM), a non-volatile dual in-line memory module (NVDIMM), etc.
Another example of a memory sub-system is a data storage device/system that is connected to the central processing unit (CPU) via a peripheral interconnect (e.g., an input/output bus, a storage area network). Examples of storage devices include a solid-state drive (SSD), a flash drive, a universal serial bus (USB) flash drive, and a hard disk drive (HDD).
In some embodiments, the memory sub-system is a hybrid memory/storage sub-system that provides both memory functions and storage functions. In general, a host system can utilize a memory sub-system that includes one or more memory components. The host system can provide data to be stored at the memory sub-system and can request data to be retrieved from the memory sub-system.
The memory sub-system (110) can include non-volatile media (109) that includes memory components. In general, memory components can be volatile memory components, non-volatile memory components, or a combination of such. In some embodiments, the memory sub-system (110) is a data storage system. An example of a data storage system is an SSD. In other embodiments, the memory sub-system (110) is a memory module. Examples of a memory module includes a DIMM, NVDIMM, and NVDIMM-P. In some embodiments, the memory sub-system (110) is a hybrid memory/storage sub-system.
In general, the computing environment can include a host system (120) that uses the memory sub-system (110). For example, the host system (120) can write data to the memory sub-system (110) and read data from the memory sub-system (110).
The host system (120) can be part of a computing device, such as a desktop computer, laptop computer, network server, mobile device, or such computing device that includes a memory and a processing device. The host system (120) can include or be coupled to the memory sub-system (110) so that the host system (120) can read data from or write data to the memory sub-system (110). The host system (120) can be coupled to the memory sub-system (110) via a physical host interface. As used herein, “coupled to” generally refers to a connection between components, which can be an indirect communicative connection or direct communicative connection (e.g., without intervening components), whether wired or wireless, including connections such as electrical, optical, magnetic, etc. Examples of a physical host interface include, but are not limited to, a serial advanced technology attachment (SATA) interface, a peripheral component interconnect express (PCIe) interface, universal serial bus (USB) interface, Fibre Channel, Serial Attached SCSI (SAS), a double data rate (DDR) memory bus, etc. The physical host interface can be used to transmit data and/or commands between the host system (120) and the memory sub-system (110). The host system (120) can further utilize an NVM Express (NVMe) interface to access the non-volatile media (109) when the memory sub-system (110) is coupled with the host system (120) by the PCIe interface. The physical host interface can provide an interface for passing control, address, data, and other signals between the memory sub-system (110) and the host system (120).
The host system (120) includes a processing device (118) and a controller (116). The processing device (118) of the host system (120) can be, for example, a microprocessor, a central processing unit (CPU), a processing core of a processor, an execution unit, etc. In some instances, the controller (116) can be referred to as a memory controller, a memory management unit, and/or an initiator. In one example, the controller (116) controls the communications over a bus coupled between the host system (120) and the memory sub-system (110).
In general, the controller (116) can send commands or requests to the memory sub-system (110) for desired access to non-volatile media (109). The controller (116) can further include interface circuitry to communicate with the memory sub-system (110). The interface circuitry can convert responses received from memory sub-system (110) into information for the host system (120).
The controller (116) of the host system (120) can communicate with controller (115) of the memory sub-system (110) to perform operations such as reading data, writing data, or erasing data in the non-volatile media (109) and other such operations. In some instances, the controller (116) is integrated within the same package of the processing device (118). In other instances, the controller (116) is separate from the package of the processing device (118). The controller (116) and/or the processing device (118) can include hardware such as one or more integrated circuits and/or discrete components, a buffer memory, a cache memory, or a combination thereof. The controller (116) and/or the processing device (118) can be a microcontroller, special purpose logic circuitry (e.g., a field programmable gate array (FPGA), an application specific integrated circuit (ASIC), etc.), or another suitable processor.
The non-volatile media (109) can include any combination of the different types of non-volatile memory components. In some instances, volatile memory components can also be used. An example of non-volatile memory components includes a negative-and (NAND) type flash memory. A memory component in the media (109) can include one or more arrays of memory cells such as single level cells (SLCs) or multi-level cells (MLCs) (e.g., triple level cells (TLCs) or quad-level cells (QLCs)). In some embodiments, a particular memory component can include both an SLC portion and an MLC portion of memory cells. Each of the memory cells can store one or more bits of data (e.g., data blocks) used by the host system (120). Although non-volatile memory components such as NAND type flash memory are described, the memory components used in the non-volatile media (109) can be based on any other type of memory. Further, a volatile memory can be used. In some embodiments, the memory components in the media (109) can include, but are not limited to, random access memory (RAM), read-only memory (ROM), dynamic random access memory (DRAM), synchronous dynamic random access memory (SDRAM), phase change memory (PCM), magneto random access memory (MRAM), Spin Transfer Torque (STT)-MRAM, ferroelectric random-access memory (FeTRAM), ferroelectric RAM (FeRAM), conductive bridging RAM (CBRAM), resistive random access memory (RRAM), oxide based RRAM (OxRAM), negative-or (NOR) flash memory, electrically erasable programmable read-only memory (EEPROM), nanowire-based non-volatile memory, memory that incorporates memristor technology, or a cross-point array of non-volatile memory cells, or any combinations thereof. A cross-point array of non-volatile memory can perform bit storage based on a change of bulk resistance, in conjunction with a stackable cross-gridded data access array. Additionally, in contrast to many flash-based memories, cross-point non-volatile memory can perform a write in-place operation, where a non-volatile memory cell can be programmed without the non-volatile memory cell being previously erased. Furthermore, the memory cells of the memory components in the media (109) can be grouped as memory pages or data blocks that can refer to a unit of the memory component used to store data.
The controller (115) of the memory sub-system (110) can communicate with the memory components in the media (109) to perform operations such as reading data, writing data, or erasing data at the memory components and other such operations (e.g., in response to commands scheduled on a command bus by controller (116)). The controller (115) can include hardware such as one or more integrated circuits and/or discrete components, a buffer memory, or a combination thereof. The controller (115) can be a microcontroller, special purpose logic circuitry (e.g., a field programmable gate array (FPGA), an application specific integrated circuit (ASIC), etc.), or another suitable processor. The controller (115) can include a processing device (117) (e.g., processor) configured to execute instructions stored in local memory (119). In the illustrated example, the buffer memory (119) of the controller (115) includes an embedded memory configured to store instructions for performing various processes, operations, logic flows, and routines that control operation of the memory sub-system (110), including handling communications between the memory sub-system (110) and the host system (120). In some embodiments, the controller (115) can include memory registers storing memory pointers, fetched data, etc. The controller (115) can also include read-only memory (ROM) for storing micro-code. While the example memory sub-system (110) in
In general, the controller (115) can receive commands or operations from the host system (120) and can convert the commands or operations into instructions or appropriate commands to achieve the desired access to the memory components in the media (109). The controller (115) can be responsible for other operations such as wear leveling operations, garbage collection operations, error detection and error-correcting code (ECC) operations, encryption operations, caching operations, and address translations between a logical block address and a physical block address that are associated with the memory components in the media (109). The controller (115) can further include host interface circuitry to communicate with the host system (120) via the physical host interface. The host interface circuitry can convert the commands received from the host system into command instructions to access the memory components in the media (109) as well as convert responses associated with the memory components into information for the host system (120).
The memory sub-system (110) can also include additional circuitry or components that are not illustrated. In some embodiments, the memory sub-system (110) can include a cache or buffer (e.g., DRAM) and address circuitry (e.g., a row decoder and a column decoder) that can receive an address from the controller (115) and decode the address to access the memory components of the media (109).
The computing system includes a data pre-fetcher (113) in the memory sub-system (110) that can retrieve data from the non-volatile media (109) to the buffer memory (119) for predicted high impact commands. The predicted high impact commands can cause more than a threshold amount of increase in execution latency of other commands when the data is not pre-fetched to the buffer memory (119) before the execution of the high impact commands.
In some embodiments, the controller (115) in the memory sub-system (110) includes at least a portion of the data pre-fetcher (113). In other embodiments, or in combination, the controller (116) and/or the processing device (118) in the host system (120) includes at least a portion of the data pre-fetcher (113). For example, the controller (115), the controller (116), and/or the processing device (118) can include logic circuitry implementing the data pre-fetcher (113). For example, the controller (115), or the processing device (118) (processor) of the host system (120), can be configured to execute instructions stored in memory for performing the operations of the data pre-fetcher (113) described herein. In some embodiments, the data pre-fetcher (113) is implemented in an integrated circuit chip disposed in the memory sub-system (110). In other embodiments, the data pre-fetcher (113) is part of an operating system of the host system (120), a device driver, or an application.
The memory sub-system (110) can have a queue (123) for commands of one category, and another queue (125) for commands of another category. For example, the queue (123) can be configured for typical input/output commands, such as read commands and write commands. The queue (125) can be configured for infrastructure commands that are not typical input/output commands. Some of the infrastructure commands can be high impact commands that cause more than a threshold amount of latency increase in the execution of certain commands in the queue (123). The memory sub-system (110) can include one or more completion queue (121) for the reporting, to the host system (120), the results of the executions of commands in the command queues (123 and 125). In some implementations, one or more queues can be created in response to commands from the host system (120). Thus, the memory sub-system (110) in general is not limited to a particular number of queues illustrated in
The data pre-fetcher (113) is configured to predict/classify some of the commands of the category in the queue (125) as high impact commands. Before a high impact command is retrieved from the command queue (125) for execution, the data pre-fetcher (113) is configured to load data that may be used by the high impact command from the non-volatile media (109) to the buffer memory (119). The loading of the data in preparation of the execution of the high impact command can be performed to use resources that are not used in the execution of commands from the queue (123) to improve resource utilization and reduce the overall impact of the high impact command. Alternatively, or in combination, the loading of the data in preparation of the execution of the high impact command can be performed to spread its impact among the execution of more commands from the queue (123) such that its impact is not concentrated on one or more commands that are executed concurrently with the execution of the high impact command.
For example, the predictive model (131) of
In
During the execution of the commands in the training set in the memory sub-system (110) (e.g., without using the data pre-fetcher (113)), the execution latency data (139) of the commands in the training set is measured. The execution latency data (139) can be used to identify high impact commands (135) that cause increased latency.
For example, the average execution latency of commands of a specific type can be computed from the execution latency data (139). For each respective command in the training set, the increased latency for the execution of the respective command can be computed from the difference between the actual execution latency of the command and the average execution latency of commands that are of the same type as the command. When the latency increase is above a threshold, the command is considered to have received high impact. In a time window of the execution of the command that has received high impact in latency, other commands being executed in the time window and/or concurrently with the execution of the command can be examined to identify a high impact command that causes the high impact. For example, an infrastructure command executed in the time window can be identified as the source of the high impact; and thus, the infrastructure command can be identified as a high impact command. For example, a command of a particular category and executed in the time window can be identified as the source of the high impact; and thus, the command can be identified as a high impact command. For example, a command of a type with an average execution latency above a threshold and executed in the time window can be identified as the source of the high impact; and thus, the command can be identified as a high impact command.
In
After the training of the predictive model (131) using a technique of supervised machine learning (133), the predictive model (131) can be used in a data pre-fetcher (113) of a memory sub-system (110) of
In
Typically, accessing the non-volatile media (109) for an amount of data takes a longer time period than accessing the buffer memory (119). Further, the system can have less resources for accessing the non-volatile media (109) for concurrently executing multiple commands than for accessing the buffer memory (119). Thus, when the data to be used by a high impact command is pre-fetched into the buffer memory (119), its impact on the concurrent execution of other commands can be reduced.
At block 151, first commands (e.g., 137) are executed in a data storage system.
The first commands can be a sample of commands that are typical in data storage systems having the same or similar structure as the data storage system. Optionally, the first commands can be the real-life workload of the data storage system in a period of time.
At block 153, the data storage system (or a host connected to the data storage system) measures the execution latency of the first commands. For example, the execution latency of a command can be measured as the time duration between the command being retrieved from a queue for execution and the completion of execution of the command in the data storage system. A typical command retrieves data from an address specified in the command, or writes data at an address specified in the command.
At block 155, a computing device is used to identify second commands (e.g., 135) that cause more than a threshold amount increase in execution latency in some of the first commands. The computing device can be a computer that is separate from the data storage system and/or the host system of the data storage system, or the host system of the data storage system, or the controller of the data storage system.
For example, the second commands can be identified by computing the average latency for different command types, identifying impacted commands that have execution latency exceeding the averages of their respective command types by more than a threshold amount, and identifying the second commands that have been executed concurrently with the impacted commands and that have a predetermined characteristic. For example, the predetermined characteristic can be a pre-defined command category (e.g., infrastructure commands), commands of a type having an average latency that is above a threshold, and/or other attributes.
At block 157, the computing device identifies third commands (e.g., 141) using a predictive model (131) based on the first commands.
At block 159, the computing device applies supervised machine learning (133) to the predictive model (131) to reduce differences between the second commands (e.g., 135) and the third commands (141).
For example, the method of
At block 171, a data pre-fetcher (113) of a data storage system (e.g., 110) receives identification of commands that are queued for execution in the data storage system.
At block 173, the data pre-fetcher (113) provides the commands as input to the predictive model (131).
At block 175, the data pre-fetcher (113) identifies, using the predictive model (131) and based on the commands as input, at least one command for pre-fetching.
Prior to the command being retrieved from a queue for execution in the data storage system, the data pre-fetcher (113) retrieves at least a portion of data to be used in execution of the command at block 177 and store the retrieved portion of data in a buffer memory (119) of the data storage system at block 179.
Concurrently, a controller (115) of the data storage system retrieves some of the queued commands at block 181 and executes the retrieved commands at block 183.
Preferably, the retrieving (177) and storing (179) of the portion of data for the pre-fetched command are performed using resources that are not required/used in the concurrently execution (183) of the commands. such an arrangement reduces the overall impact of the command on other commands as a whole. Alternatively, or in combination, the impact of the retrieving (177) and storing (179) of the portion of data for the pre-fetched command is distributed among the execution (183) of many commands such that the impact on each individual command is reduced and small.
Subsequently, the controller (115) of the data storage system retrieves the command from a queue at block 185 and executes the command using at least the portion of data in the buffer memory at block 187.
Since at least the portion of data is in the buffer memory, the execution of the command has less impact on the execution latency of other commands that are executed concurrently with the execution of the command.
Optionally, the data pre-fetcher (113) can include the supervised machine learning (133) functionality illustrated in
In some implementations, a communication channel between the processing device (118) and a memory sub-system includes a computer network, such as a local area network, a wireless local area network, a wireless personal area network, a cellular communications network, a broadband high-speed always-connected wireless communication connection (e.g., a current or future generation of mobile network link); and the processing device (118) and the memory sub-system can be configured to communicate with each other using data storage management and usage commands similar to those in NVMe protocol.
A memory sub-system in general can have non-volatile storage media. Examples of non-volatile storage media include memory cells formed in an integrated circuit and magnetic material coated on rigid disks. Non-volatile storage media can maintain the data/information stored therein without consuming power. Memory cells can be implemented using various memory/storage technologies, such as NAND logic gate, NOR logic gate, phase-change memory (PCM), magnetic memory (MRAM), resistive random-access memory, cross point storage and memory devices (e.g., 3D XPoint memory). A cross point memory device uses transistor-less memory elements, each of which has a memory cell and a selector that are stacked together as a column. Memory element columns are connected via two perpendicular lays of wires, where one lay is above the memory element columns and the other lay below the memory element columns. Each memory element can be individually selected at a cross point of one wire on each of the two layers. Cross point memory devices are fast and non-volatile and can be used as a unified memory pool for processing and storage.
The controller (e.g., 115) of a memory sub-system (e.g., 110) can run firmware to perform operations responsive to the communications from the processing device (118). Firmware in general is a type of computer program that provides control, monitoring and data manipulation of engineered computing devices.
Some embodiments involving the operation of the controller (115) and/or the data pre-fetcher (113) can be implemented using computer instructions executed by the controller (115), such as the firmware of the controller (115). In some instances, hardware circuits can be used to implement at least some of the functions. The firmware can be initially stored in the non-volatile storage media, or another non-volatile device, and loaded into the volatile DRAM and/or the in-processor cache memory for execution by the controller (115).
A non-transitory computer storage medium can be used to store instructions of the firmware of a memory sub-system (e.g., 110). When the instructions are executed by the controller (115) and/or the processing device (117), the instructions cause the controller (115) and/or the processing device (117) to perform a method discussed above.
The machine can be a personal computer (PC), a tablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), a cellular telephone, a web appliance, a server, a network router, a switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. Further, while a single machine is illustrated, the term “machine” shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.
The example computer system (200) includes a processing device (202), a main memory (204) (e.g., read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM) or Rambus DRAM (RDRAM), static random access memory (SRAM), etc.), and a data storage system (218), which communicate with each other via a bus (230) (which can include multiple buses).
Processing device (202) represents one or more general-purpose processing devices such as a microprocessor, a central processing unit, or the like. More particularly, the processing device can be a complex instruction set computing (CISC) microprocessor, reduced instruction set computing (RISC) microprocessor, very long instruction word (VLIW) microprocessor, or a processor implementing other instruction sets, or processors implementing a combination of instruction sets. Processing device (202) can also be one or more special-purpose processing devices such as an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a digital signal processor (DSP), network processor, or the like. The processing device (202) is configured to execute instructions (226) for performing the operations and steps discussed herein. The computer system (200) can further include a network interface device (208) to communicate over the network (220).
The data storage system (218) can include a machine-readable storage medium (224) (also known as a computer-readable medium) on which is stored one or more sets of instructions (226) or software embodying any one or more of the methodologies or functions described herein. The instructions (226) can also reside, completely or at least partially, within the main memory (204) and/or within the processing device (202) during execution thereof by the computer system (200), the main memory (204) and the processing device (202) also constituting machine-readable storage media. The machine-readable storage medium (224), data storage system (218), and/or main memory (204) can correspond to the memory sub-system (110) of
In one embodiment, the instructions (226) include instructions to implement functionality corresponding to a data pre-fetcher (113) (e.g., the data pre-fetcher (113) described with reference to
Some portions of the preceding detailed descriptions have been presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the ways used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of operations leading to a desired result. The operations are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. The present disclosure can refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage systems.
The present disclosure also relates to an apparatus for performing the operations herein. This apparatus can be specially constructed for the intended purposes, or it can include a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program can be stored in a computer readable storage medium, such as, but not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, each coupled to a computer system bus.
The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems can be used with programs in accordance with the teachings herein, or it can prove convenient to construct a more specialized apparatus to perform the method. The structure for a variety of these systems will appear as set forth in the description below. In addition, the present disclosure is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages can be used to implement the teachings of the disclosure as described herein.
The present disclosure can be provided as a computer program product, or software, that can include a machine-readable medium having stored thereon instructions, which can be used to program a computer system (or other electronic devices) to perform a process according to the present disclosure. A machine-readable medium includes any mechanism for storing information in a form readable by a machine (e.g., a computer). In some embodiments, a machine-readable (e.g., computer-readable) medium includes a machine (e.g., a computer) readable storage medium such as a read only memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical storage media, flash memory components, etc.
In this description, various functions and operations are described as being performed by or caused by computer instructions to simplify description. However, those skilled in the art will recognize what is meant by such expressions is that the functions result from execution of the computer instructions by one or more controllers or processors, such as a microprocessor. Alternatively, or in combination, the functions and operations can be implemented using special purpose circuitry, with or without software instructions, such as using Application-Specific Integrated Circuit (ASIC) or Field-Programmable Gate Array (FPGA). Embodiments can be implemented using hardwired circuitry without software instructions, or in combination with software instructions. Thus, the techniques are limited neither to any specific combination of hardware circuitry and software, nor to any particular source for the instructions executed by the data processing system.
In the foregoing specification, embodiments of the disclosure have been described with reference to specific example embodiments thereof. It will be evident that various modifications can be made thereto without departing from the broader spirit and scope of embodiments of the disclosure as set forth in the following claims. The specification and drawings are, accordingly, to be regarded in an illustrative sense rather than a restrictive sense.
The present application is a continuation application of U.S. patent application Ser. No. 16/384,618, filed Apr. 15, 2019 and entitled “Predictive Data Pre-Fetching in a Data Storage Device”, the entire disclosure of which is hereby incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5390334 | Harrison | Feb 1995 | A |
5727150 | Laudon et al. | Mar 1998 | A |
5909540 | Carter et al. | Jun 1999 | A |
5918229 | Davis et al. | Jun 1999 | A |
6026475 | Woodman | Feb 2000 | A |
6230260 | Luick | May 2001 | B1 |
6247097 | Sinharoy | Jun 2001 | B1 |
6279138 | Jadav et al. | Aug 2001 | B1 |
6473845 | Hornung et al. | Oct 2002 | B1 |
7376681 | Todd et al. | May 2008 | B1 |
8082400 | Chang et al. | Dec 2011 | B1 |
8117373 | Berlin | Feb 2012 | B2 |
8131814 | Schlansker et al. | Mar 2012 | B1 |
8135933 | Fisher et al. | Mar 2012 | B2 |
8316187 | Pothireddy | Nov 2012 | B2 |
8352709 | Glasco et al. | Jan 2013 | B1 |
8560761 | Tzeng | Oct 2013 | B2 |
8700724 | McDaniel et al. | Apr 2014 | B2 |
8799554 | Vincent et al. | Aug 2014 | B1 |
8825937 | Atkisson et al. | Sep 2014 | B2 |
8838887 | Burke et al. | Sep 2014 | B1 |
8868842 | Yano et al. | Oct 2014 | B2 |
8930647 | Smith | Jan 2015 | B1 |
8965819 | Tirunagari | Feb 2015 | B2 |
8996834 | Brenner et al. | Mar 2015 | B2 |
9043530 | Sundaram et al. | May 2015 | B1 |
9047017 | Dolan et al. | Jun 2015 | B1 |
9104555 | Liebowitz et al. | Aug 2015 | B2 |
9122503 | Hoff | Sep 2015 | B1 |
9342453 | Nale et al. | May 2016 | B2 |
9535740 | Graham et al. | Jan 2017 | B1 |
9619408 | Nale et al. | Apr 2017 | B2 |
9697130 | Karippara et al. | Jul 2017 | B2 |
9817739 | Pise et al. | Nov 2017 | B1 |
9910618 | Curley et al. | Mar 2018 | B1 |
9996370 | Khafizov et al. | Jun 2018 | B1 |
10019279 | Bacher et al. | Jul 2018 | B2 |
10120797 | Foley et al. | Nov 2018 | B1 |
10223371 | Thirumal | Mar 2019 | B2 |
10241943 | Nale et al. | Mar 2019 | B2 |
10282322 | Nale et al. | May 2019 | B2 |
10282323 | Nale et al. | May 2019 | B2 |
10289566 | Dalmatov et al. | May 2019 | B1 |
10298496 | Nakibly et al. | May 2019 | B1 |
10339056 | Joshi et al. | Jul 2019 | B2 |
10394789 | Animesh et al. | Aug 2019 | B1 |
10430723 | Tzur et al. | Oct 2019 | B1 |
10514855 | Voigt | Dec 2019 | B2 |
10725663 | Awasthi et al. | Jul 2020 | B2 |
10782908 | Mittal et al. | Sep 2020 | B2 |
10852949 | Frolikov et al. | Dec 2020 | B2 |
10877892 | Ray et al. | Dec 2020 | B2 |
10880401 | Maharana et al. | Dec 2020 | B2 |
11099789 | Maharana et al. | Aug 2021 | B2 |
11354056 | Mittal et al. | Jun 2022 | B2 |
11416395 | Ray et al. | Aug 2022 | B2 |
11573901 | Ray et al. | Feb 2023 | B2 |
20020145919 | Lamb et al. | Oct 2002 | A1 |
20020196659 | Hurst et al. | Dec 2002 | A1 |
20030126232 | Mogul et al. | Jul 2003 | A1 |
20040186960 | Poggio | Sep 2004 | A1 |
20060087893 | Nishihara et al. | Apr 2006 | A1 |
20060095676 | Dzierzon et al. | May 2006 | A1 |
20060095679 | Edirisooriya | May 2006 | A1 |
20060206658 | Hendel et al. | Sep 2006 | A1 |
20070033367 | Sakarda et al. | Feb 2007 | A1 |
20070074093 | Lasser | Mar 2007 | A1 |
20070112864 | Ben-natan | May 2007 | A1 |
20080016297 | Bartley et al. | Jan 2008 | A1 |
20080244218 | Dzierzon et al. | Oct 2008 | A1 |
20080276038 | Tanaka et al. | Nov 2008 | A1 |
20090113422 | Kani | Apr 2009 | A1 |
20090150639 | Ohata | Jun 2009 | A1 |
20090199190 | Chen | Aug 2009 | A1 |
20090248957 | Tzeng | Oct 2009 | A1 |
20100005217 | Jeddeloh | Jan 2010 | A1 |
20100011169 | Pothireddy | Jan 2010 | A1 |
20100017650 | Chin et al. | Jan 2010 | A1 |
20100082899 | Nakajima et al. | Apr 2010 | A1 |
20100281230 | Rabii et al. | Nov 2010 | A1 |
20100293412 | Sakaguchi et al. | Nov 2010 | A1 |
20110161554 | Selinger et al. | Jun 2011 | A1 |
20110231857 | Zaroo et al. | Sep 2011 | A1 |
20110238887 | Bazzani | Sep 2011 | A1 |
20110238899 | Yano et al. | Sep 2011 | A1 |
20120047312 | Nathuji et al. | Feb 2012 | A1 |
20120054419 | Chen et al. | Mar 2012 | A1 |
20120084497 | Subramaniam et al. | Apr 2012 | A1 |
20120117304 | Worthington et al. | May 2012 | A1 |
20120124572 | Cunningham et al. | May 2012 | A1 |
20120226850 | Nakanishi | Sep 2012 | A1 |
20120246403 | Mchale et al. | Sep 2012 | A1 |
20120297121 | Gorobets et al. | Nov 2012 | A1 |
20120297122 | Gorobets et al. | Nov 2012 | A1 |
20130024609 | Gorobets et al. | Jan 2013 | A1 |
20130111113 | Harari et al. | May 2013 | A1 |
20130124811 | Hamilton et al. | May 2013 | A1 |
20130145095 | Mckean et al. | Jun 2013 | A1 |
20130151761 | Kim et al. | Jun 2013 | A1 |
20130152086 | Yoo et al. | Jun 2013 | A1 |
20130179632 | Ben-Shemesh | Jul 2013 | A1 |
20130226837 | Lymberopoulos et al. | Aug 2013 | A1 |
20140006740 | Tokusho et al. | Jan 2014 | A1 |
20140032818 | Chang et al. | Jan 2014 | A1 |
20140040550 | Bill et al. | Feb 2014 | A1 |
20140089631 | King | Mar 2014 | A1 |
20140164676 | Borchers et al. | Jun 2014 | A1 |
20140164677 | Borchers et al. | Jun 2014 | A1 |
20140208042 | Chinya et al. | Jul 2014 | A1 |
20150016046 | Shaeffer | Jan 2015 | A1 |
20150026509 | Zhang et al. | Jan 2015 | A1 |
20150032921 | Malkin | Jan 2015 | A1 |
20150067087 | Guerin et al. | Mar 2015 | A1 |
20150082062 | Saraswat et al. | Mar 2015 | A1 |
20150097851 | Anderson et al. | Apr 2015 | A1 |
20150106656 | Bian et al. | Apr 2015 | A1 |
20150134927 | Varanasi | May 2015 | A1 |
20150160858 | Okada et al. | Jun 2015 | A1 |
20150169238 | Lee et al. | Jun 2015 | A1 |
20150199276 | Radhakrishnan et al. | Jul 2015 | A1 |
20150212741 | Lee et al. | Jul 2015 | A1 |
20150227465 | Sundaram et al. | Aug 2015 | A1 |
20150268875 | Jeddeloh | Sep 2015 | A1 |
20150278091 | Wilkerson et al. | Oct 2015 | A1 |
20150356125 | Golander et al. | Dec 2015 | A1 |
20160042005 | Liu et al. | Feb 2016 | A1 |
20160054922 | Awasthi et al. | Feb 2016 | A1 |
20160110291 | Gordon et al. | Apr 2016 | A1 |
20160125048 | Hamada | May 2016 | A1 |
20160152086 | Kawakita | Jun 2016 | A1 |
20160188218 | Gray et al. | Jun 2016 | A1 |
20160188700 | Kleinschnitz, Jr. et al. | Jun 2016 | A1 |
20160210167 | Bolic et al. | Jul 2016 | A1 |
20160210251 | Nale et al. | Jul 2016 | A1 |
20160210465 | Craske et al. | Jul 2016 | A1 |
20160212214 | Rahman et al. | Jul 2016 | A1 |
20160253263 | Takada | Sep 2016 | A1 |
20160294710 | Sreeramoju | Oct 2016 | A1 |
20160306557 | Koseki et al. | Oct 2016 | A1 |
20160328156 | Swarbrick et al. | Nov 2016 | A1 |
20160350236 | Tsirkin et al. | Dec 2016 | A1 |
20160371014 | Roberts | Dec 2016 | A1 |
20170039164 | Ioannou et al. | Feb 2017 | A1 |
20170060754 | Nakra et al. | Mar 2017 | A1 |
20170060769 | Wires et al. | Mar 2017 | A1 |
20170123796 | Kumar et al. | May 2017 | A1 |
20170131902 | Goss et al. | May 2017 | A1 |
20170147427 | Nero | May 2017 | A1 |
20170177486 | Horn | Jun 2017 | A1 |
20170187621 | Shalev et al. | Jun 2017 | A1 |
20170199666 | Sundaram et al. | Jul 2017 | A1 |
20170249266 | Nale et al. | Aug 2017 | A1 |
20170255383 | Chang et al. | Sep 2017 | A1 |
20170262215 | Banerjee et al. | Sep 2017 | A1 |
20170285967 | Pandurangan et al. | Oct 2017 | A1 |
20170285992 | Vogt | Oct 2017 | A1 |
20170302734 | Liang et al. | Oct 2017 | A1 |
20170316321 | Whitney et al. | Nov 2017 | A1 |
20170364422 | Antony et al. | Dec 2017 | A1 |
20170364450 | Struttmann | Dec 2017 | A1 |
20180004441 | Takamura et al. | Jan 2018 | A1 |
20180011790 | Gaur et al. | Jan 2018 | A1 |
20180018379 | Eda et al. | Jan 2018 | A1 |
20180024853 | Warfield et al. | Jan 2018 | A1 |
20180046581 | Banerjee et al. | Feb 2018 | A1 |
20180089087 | Chang et al. | Mar 2018 | A1 |
20180121366 | Tian | May 2018 | A1 |
20180150219 | Chen et al. | May 2018 | A1 |
20180189207 | Nale et al. | Jul 2018 | A1 |
20180260135 | Hayashida et al. | Sep 2018 | A1 |
20180293163 | Bergeron | Oct 2018 | A1 |
20180316569 | Ciltone et al. | Nov 2018 | A1 |
20180332366 | Paduroiu | Nov 2018 | A1 |
20190004841 | Starks | Jan 2019 | A1 |
20190018809 | Nale et al. | Jan 2019 | A1 |
20190034284 | Mohanta et al. | Jan 2019 | A1 |
20190079689 | Cherubini et al. | Mar 2019 | A1 |
20190129834 | Purkayastha | May 2019 | A1 |
20190129847 | Roh | May 2019 | A1 |
20190179760 | Bhargava et al. | Jun 2019 | A1 |
20190196996 | Balakrishnan et al. | Jun 2019 | A1 |
20190243552 | Maharana et al. | Aug 2019 | A1 |
20190243570 | Mittal et al. | Aug 2019 | A1 |
20190243756 | Ray et al. | Aug 2019 | A1 |
20190243771 | Mittal et al. | Aug 2019 | A1 |
20190243787 | Mittal et al. | Aug 2019 | A1 |
20190253520 | Maharana et al. | Aug 2019 | A1 |
20190303283 | Mcglaughlin et al. | Oct 2019 | A1 |
20190310780 | Gholamipour et al. | Oct 2019 | A1 |
20190332556 | Nale et al. | Oct 2019 | A1 |
20190370043 | Olderdissen | Dec 2019 | A1 |
20200019506 | Ray et al. | Jan 2020 | A1 |
20200073827 | Wallach | Mar 2020 | A1 |
20200074094 | Wallach | Mar 2020 | A1 |
20200319813 | Mittal et al. | Oct 2020 | A1 |
20200326851 | Frolikov et al. | Oct 2020 | A1 |
20210034524 | Leidel et al. | Feb 2021 | A1 |
20210117326 | Ray et al. | Apr 2021 | A1 |
20210120099 | Maharana et al. | Apr 2021 | A1 |
20210349638 | Maharana et al. | Nov 2021 | A1 |
20220326868 | Mittal et al. | Oct 2022 | A1 |
20220398194 | Ray et al. | Dec 2022 | A1 |
Number | Date | Country |
---|---|---|
20140041408 | Apr 2014 | KR |
20160116533 | Oct 2016 | KR |
Entry |
---|
Extended European Search Report, EP19746665.9, dated May 3, 2021. |
Extended European Search Report, EP19747107.1, dated Apr. 30, 2021. |
“Solid-State Drive”, Wikipedia, printed on Mar. 14, 2018. |
“Write combining,” Wikipedia encyclopedia entry located at https://en.wikipedia.org/wiki/Write_combining, Feb. 12, 2018. |
A. Romanow, J. Mogul, T. Talpey, S. Bailey, “Remote Direct Memory Access (RDMA) over IP Problem Statement”, RFC 4297, Dec. 2005 (https://www.rfc-editor.org/search/rfc_search_detail.php). |
Cai, “Error Characterization, Mitigation and Recovery”, 2017. |
Demand paging, Wikipedia, printed on Apr. 18, 2018. |
Device driver, Wikipedia, printed on Apr. 19, 2018. |
Garbage collection (computer science), Wikipedia, printed on Sep. 26, 2018. |
Graphics processing unit, Wikipedia, printed on Jul. 26, 2018. |
Hypervisor, Wikipedia, printed on Apr. 19, 2018. |
Infiniband, Wikipedia, printed on Jul. 26, 2018. |
Integrated circuit, Wikipedia, printed on Sep. 24, 2018. |
Interlaken (networking), Wikipedia, printed on Sep. 21, 2018. |
International Search Report and Written Opinion, PCT/US2019/013841, dated Apr. 23, 2019. |
International Search Report and Written Opinion, PCT/US2019/013836, dated Apr. 22, 2019. |
International Search Report and Written Opinion, PCT/US2019/015602, dated May 3, 2019. |
International Search Report and Written Opinion, PCT/US2019/014205, dated May 1, 2019. |
International Search Report and Written Opinion, PCT/US2019/014285, dated May 8, 2019. |
International Search Report, PCT/US2019/040413, dated Oct. 25, 2019. |
International Search Report and Written Opinion, PCT/US2019/014275, dated May 8, 2019. |
International Search Report and Written Opinion, PCT/US2020/021825, dated Jul. 6, 2020. |
Jeff Hawkins et al., “Sequence memory for prediction, inference and behaviour”, In: Philosophical Transactions of the Royal Society B: Biological Sciences, pp. 1203-1209, May 1, 2009. |
Message Passing Interface, Wikipedia, printed on Jul. 26, 2018. |
Microsequencer, Wikipedia, printed on Sep. 21, 2018. |
Oracle, “NFS Over ROMA”, Retrieved on Feb. 18, 2020 from https://web.archive.org/web/20150920225910/https://docs.oracle.com/cd/E23824_01/html/821-1454/rfsrefer-154.html# (Year: 2015). |
Operating system, Wikipedia, printed on Apr. 18, 2018. |
PCI Express, Wikipedia, printed on Sep. 21, 2018. |
Page cache, Wikipedia, printed on Apr. 18, 2018. |
Page replacement algorithm, Wikipedia, printed on Jul. 31, 2018. |
Page table, Wikipedia, printed on Jul. 31, 2018. |
Paging, Wikipedia, printed on Apr. 18, 2018. |
RAM drive, Wikipedia, printed on Apr. 18, 2018. |
SerDes, Wikipedia, printed on Sep. 21, 2018. |
Switched fabric, Wikipedia, printed on Jul. 26, 2018. |
Translation lookaside buffer, Wikipedia, printed on Apr. 18, 2018. |
Vatto, “Analyzing Intel-Micron 3D XPoint: The NextGeneration Non-Volatile Memory”, 2015. |
Virtual memory, Wikipedia, printed on Apr. 18, 2018. |
Mmap, Wikipedia, printed on Apr. 18, 2018. |
Extended European Search Report, EP19833924.4, dated Mar. 18, 2022. |
Palmer, Mark, et al. “Fido: A Cache That Learns to Fetch.” Proceedings of the 17th International Conference on Very Large Data Bases, Sep. 1991. |
Ppeled, Leeor, et al. “A neural network memory prefetcher using semantic locality.” arXiv:1804.00478v2, Jul. 26, 2018. |
Title: Predictive Data Orchestration in Multi-Tier Memory Systems, U.S. Appl. No. 16/054,819, filed Aug. 3, 2018 Inventors: Samir Mittal et al. Status: Patented Case Status Date: Oct. 31, 2019. |
Title: Predictive Data Orchestration in Multi-Tier Memory Systems, U.S. Appl. No. 16/905,834, filed Jun. 18, 2020 Inventors: Samir Mittal et al. Status: Notice of Allowance Mailed—Application Received in Office of Publications dated Oct. 1, 2021. |
Title: Predictive Data Orchestration in Multi-Tier Memory Systems, U.S. Appl. No. 17/729,738, filed Apr. 26, 2022 Inventors: Samir Mittal et al. Status: Application Undergoing Preexam Processing Status Date: Apr. 26, 2022. |
Title: Memory Systems having Controllers Embedded in Packages of Integrated Circuit Memory, U.S. Appl. No. 16/162,905, filed Oct. 17, 2018 Inventors: Samir Mittal et al. Status: Final Rejection dated Apr. 4, 2022. |
Title: Accelerate Data Access in Memory Systems via Data Stream Segregation, U.S. Appl. No. 16/166,624, filed Oct. 22, 2018 Inventors: Samir Mittal et al. Status: Final Rejection dated Mar. 16, 2022. |
Title: Memory Virtualization for Accessing Heterogeneous Memory Components, U.S. Appl. No. 16/054,719, filed Aug. 3, 2018 Inventors: Anirban Ray et al. Status: Notice of Allowance Mailed—Application Received in Office of Publications dated Dec. 24, 2021. |
Title: Remote Direct Memory Access in Multi-Tier Memory Systems, U.S. Appl. No. 16/107,624, filed Aug. 21, 2018 Inventors: Parag Maharana et al. Status: Patented Case Status Date: Feb. 3, 2021. |
Title: Remote Direct Memory Access in Multi-Tier Memory Systems U.S. Appl. No. 17/382,200, filed Jul. 21, 2021 Inventors: Parag Maharana et al. Status: Docketed New Case—Ready for Examination Status Date: Aug. 24, 2021. |
Optimization of Data Access and Communication in Memory Systems, U.S. Appl. No. 16/183,234, filed Nov. 7, 2018 Inventors: Parag Maharana et al. Status: Patented Case Status Date: Jun. 5, 2020. |
Title: Optimization of Data Access and Communication in Memory Systems, U.S. Appl. No. 17/135,774, filed Dec. 28, 2020 Inventors: Parag Maharana et al. Status: Non Final Action dated Mar. 17, 2022. |
Title: Predictive Data Pre-Fetching in a Data Storage Device, U.S. Appl. No. 16/384,618, filed Apr. 15, 2019 Inventors: Alex Frolikov et al. Status: Patented Case Status Date: Nov. 11, 2020. |
Title: Predictive Paging to Accelerate Memory Access, U.S. Appl. No. 16/032,331, filed Jul. 11, 2018 Inventors: Anirban Ray et al. Status: Patented Case Status Date: Apr. 29, 2020. |
Title: Predictive Paging to Accelerate Memory Access, U.S. Appl. No. 17/135,207, filed Dec. 28, 2020 Inventors: Anirban Ray et al. Status: Non Final Action dated Mar. 17, 2022. |
Abhijith, et al. “The Efficient Use of Storage Resources in SAN for Storage Tiering and Caching,” 2015 International Conference on Computational Intelligence and Networks, IEEE, Jan. 11, 2016. |
Extended European Search Report, EP19746836.6, dated May 19, 2021. |
Extended European Search Report, EP19748086.6, dated Jun. 8, 2021. |
Extended European Search Report, EP19746972.9, dated May 19, 2021. |
Jacob, et al. “Optimized utilization of disks in storage area network by storage tiering,” 2017 International Conference on Computing, Communication, and Automation 9ICCCA), IEEE, May 5, 2017. |
Salkhordeh, et al. “Operating system level data tiering using online workload characterization,” Journal of Supercomputing, Kluwer Academic Publishers, Jan. 31, 2015. |
Handy, Jim. “Where does NVRAM Fit?” Objective Analysis, Aug. 15, 2014. |
Kalnoskas, Aimee. “SSD controllers integrate DDR4 DRAM on chip.” Microsemi, Aug. 5, 2016. |
Wilson, Tracy. “How PCI Express Works.” Retrieved from the Internet <https://computer.howstuffworks.com/pci-express.htm>, Mar. 30, 2021. |
Title: Predictive Data Orchestration in Multi-Tier Memory Systems, U.S. Appl. No. 16/905,834, filed Jun. 18, 2020 Inventors: Samir Mittal et al. Status: Docketed New Case—Ready for Examination Status Date: Sep. 25, 2020. |
Title: Memory Systems having Controllers Embedded in Packages of Integrated Circuit Memory, U.S. Appl. No. 16/162,905, filed Oct. 17, 2018 Inventors: Samir Mittal et al. Status: Final Rejection dated Aug. 11, 2021. |
Title: Accelerate Data Access in Memory Systems via Data Stream Segregation, U.S. Appl. No. 16/166,624, filed Oct. 22, 2018 Inventors: Samir Mittal et al. Status: Final Rejection dated Jun. 16, 2021. |
Title: Memory Virtualization for Accessing Herogeneous Memory Components, U.S. Appl. No. 16/054,719, filed Aug. 3, 2018 Inventors: Anirban Ray et al. Status: Final Rejection dated Aug. 19, 2021. |
Title: Remote Direct Memory Access in Multi-Tier Memory Systems, U.S. Appl. No. 17/382,200, filed Jul. 21, 2021 Inventors: Parag Maharana et al. Status: Application Undergoing Preexam Processing Status Date: Jul. 21, 2021. |
Title: Optimization of Data Access and Communication in Memory Systems, U.S. Appl. No. 16/183,234, filed Nov. 7, 2018 Inventors: Parag Maharana et al. Status: Patented Case Status Date: Jun. 5, 2020. |
Title: Optimization of Data Access and Communication in Memory Systems, U.S. Appl. No. 17/135,774, filed Dec. 28, 2020 Inventors: Parag Maharana et al. Status: Docketed New Case—Ready for Examination Status Date: Aug. 21, 2021. |
Title: Predictive Paging to Accelerate Memory Access, U.S. Appl. No. 17/135,207, filed Dec. 28, 2020 Inventors: Anirban Ray et al. Status: Docketed New Case—Ready for Examination Status Date: Aug. 21, 2021. |
Title: Predictive Data Orchestration in Multi-Tier Memory Systems, U.S. Appl. No. 16/054,819, filed Aug. 3, 2018 Confirmation: 8764 Status Date: Sep. 2, 2020 Inventors: Samir Mittal, et al. Status: Patented Case. |
Title: Predictive Data Orchestration in Multi-Tier Memory Systems, U.S. Appl. No. 16/905,834, filed Jun. 18, 2020 Confirmation: 3785 Status Date: May 18, 2022 Inventors: Samir Mittal, et al. Status: Patented Case. |
Title: Predictive Data Orchestration in Multi-Tier Memory Systems, U.S. Appl. No.: 17/729,738, filed Apr. 26, 2022 Confirmation: 2767 Status Date: Sep. 23, 2022 Inventors: Samir Mittal, et al. Status: Non Final Action Mailed. |
Title: Memory Systems having Controllers Embedded in Packages of Integrated Circuit Memory, U.S. Appl. No. 16/162,905, filed Oct. 17, 2018 Confirmation: 1088 Status Date: Oct. 24, 2022 Inventors: Samir Mittal, et al. Status: Response to Non-Final Office Action Entered and Forwarded to Examiner. |
Title: Accelerate Data Access in Memory Systems via Data Stream Segregation, U.S. Appl. No. 16/166,624, filed Oct. 22, 2018 Confirmation: 9096 Status Date: Oct. 17, 2022 Inventors: Samir Mittal, et al. Status: Response to Non-Final Office Action Entered and Forwarded to Examiner. |
Title: Memory Virtualization for Accessing Heterogeneous Memory Components, U.S. Appl. No. 16/054,719, filed Aug. 3, 2018 Confirmation: 2593 Status Date: Jul. 27, 2022 Inventors: Anirban Ray, et al. Status: Patented Case. |
Title: Memory Virtualization for Accessing Heterogeneous Memory Components, U.S. Appl. No. 17/888,398, filed Aug. 15, 2022 Confirmation: 5388 Status Date: Dec. 21, 2022 Inventors: Anirban Ray, et al. Status: Non Final Action Mailed. |
Title: Remote Direct Memory Access in Multi-Tier Memory Systems, U.S. Appl. No. 16/107,624, filed Aug. 21, 2018 Confirmation: 7530 Status Date: Aug. 4, 2021 Inventors: Parag Maharana, et al. Status: Patented Case. |
Title: Remote Direct Memory Access in Multi-Tier Memory Systems, U.S. Appl. No. 17/382,200, filed Jul. 21, 2021 Confirmation: 1066 Status Date: Dec. 8, 2022 Inventors: Parag Maharana, et al. Status: Final Rejection Mailed. |
Title: Optimization of Data Access and Communication in Memory Systems, U.S. Appl. No. 16/183,234, filed Nov. 7, 2018 Confirmation: 2472 Status Date: Dec. 9, 2020 Inventors: Parag Maharana, et al. Status: Patented Case. |
Title: Optimization of Data Access and Communication in Memory Systems, U.S. Appl. No. 17/135,774, filed Dec. 28, 2020 Confirmation: 5838 Status Date: Nov. 14, 2022 Inventors: Parag Maharana, et al. Status: Non Final Action Mailed. |
Title: Predictive Data Pre-Fetching in a Data Storage Device, U.S. Appl. No. 16/384,618, filed Apr. 15, 2019 Confirmation: 3346 Status Date: Nov. 11, 2020 Inventors: Alex Frolikov, et al. Status: Patented Case. |
Title: Predictive Paging to Accelerate Memory Access, U.S. Appl. No. 16/032,331, filed Jul. 11, 2018 Confirmation: 1099 Status Date: Dec. 9, 2020 Inventors: Anirban Ray, et al. Status: Patented Case. |
Title: Predictive Paging to Accelerate Memory Access, U.S. Appl. No. 17/135,207, filed Dec. 28, 2020 Confirmation: 8436 Status Date: Oct. 12, 2022 Inventors: Anirban Ray, et al. Status: Notice of Allowance Mailed—Application Received in Office of Publications. |
Salkhordeh, Reza, et al., “Operating System Level Data Tiering Using Online Workload Characterization.” Journal of Supercomputing, vol. 71 No. 4, Jan. 31, 2015. |
Oracle Solaris Administration, “NFS Over RDMA.” Retrieved from the Internet <https://web.archive.org/web/20150920225910/https://docs.oracle.com/cd/E23824_01/html/821-1454/rfsrefer-154.html#> on Mar. 9, 2023. |
Salkhordeh, Reza, et al., “Operating system level data tiering using online workload characterization.” Springer Science + Business Media, 2015. |
Number | Date | Country | |
---|---|---|---|
20210048947 A1 | Feb 2021 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16384618 | Apr 2019 | US |
Child | 17088360 | US |