Timing Properties of Removable Flash Media

نویسندگان

  • Daniel Parthey
  • Robert Baumgartl
چکیده

Flash memories could be a basis for mass storage with real-time guarantees if a suitable model for access timing could be established. To characterize the operation timing of removable flash media such as Compact Flash (CF) and MultiMedia Card (MMC), we propose a set of benchmarks. The results of our study indicate that a simple timing model for current media cannot be established. The timing of individual read and write operations depends on the address and block size of accessed data as well as the written bit pattern. Many timing anomalies were observed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Real - Time Group Diploma Thesis Analyzing Real - Time Behavior of Flash Memories

Flash memories are used as the main storage in many portable consumer electronic devices because they are more robust than hard drives. This document gives an overview of existing consumer flash memory technologies which are mostly removable flash memory cards. It discusses to which degree consumer flash devices are suitable for real-time systems and provides a detailed timing analysis of some ...

متن کامل

Proceedings of the Junior Researcher Workshop on Real - Time Computing 2007 JRWRTC ’ 07

Real-time scheduling in a virtual machine environment ………………………………………..11 C. Augier, VirtualLogix WCET computation on software components by partial static analysis ………………………15 Improvement of zigbee routing protocol including energy and delay constraints …………….19 Negative results on idle intervals and periodicity for multiprocessor scheduling under EDF …………………………………………………………………………………………………………23...

متن کامل

Analysis of AutoPlay Feature via the USB Flash Drives

USB flash worms represent a persistent threat to the growing Internet in an increasingly networked world. However, their evolution has been somewhat limited and they still rely on the same basic paradigms, which contain fundamental laws. This paper analyzes the Autoplay vulnerability commonly exploited by flash worms to infect removable drives and further applies this analysis to the OpenWith w...

متن کامل

Magic Quadrant for Mobile Data Protection

Gartner defines mobile data protection (MDP) products and services as software security methods that enforce confidentiality policies by encrypting data, and then defending access to that encrypted data on the primary and secondary storage systems of end-user workstations. These storage systems include the primary boot drive of a workstation and removable devices used for portability. Storage t...

متن کامل

An Authentication Middleware for Prevention of Information Theft

Information theft or data leakage is a growing concern for companies as well as individual users. Intruders can easily copy huge amount of confidential data using hand-held devices such as USB flash drives, iPods, digital cameras or any other external storage devices. Data theft can simply occur through both insiders and outsiders of a corporation. It is becoming the biggest challenge for corpo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007