+

US20230393761A1 - Read Look Ahead Based On Key Analysis In Key Value Data Storage Devices - Google Patents

Read Look Ahead Based On Key Analysis In Key Value Data Storage Devices Download PDF

Info

Publication number
US20230393761A1
US20230393761A1 US17/829,481 US202217829481A US2023393761A1 US 20230393761 A1 US20230393761 A1 US 20230393761A1 US 202217829481 A US202217829481 A US 202217829481A US 2023393761 A1 US2023393761 A1 US 2023393761A1
Authority
US
United States
Prior art keywords
key
pair data
read
metadata
controller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US17/829,481
Other versions
US11853562B1 (en
Inventor
Alexander Bazarsky
David Avraham
Ran ZAMIR
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SanDisk Technologies LLC
Original Assignee
Western Digital Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US17/829,481 priority Critical patent/US11853562B1/en
Application filed by Western Digital Technologies Inc filed Critical Western Digital Technologies Inc
Assigned to WESTERN DIGITAL TECHNOLOGIES, INC. reassignment WESTERN DIGITAL TECHNOLOGIES, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ZAMIR, Ran, BAZARSKY, ALEXANDER, AVRAHAM, David
Assigned to JPMORGAN CHASE BANK, N.A. reassignment JPMORGAN CHASE BANK, N.A. PATENT COLLATERAL AGREEMENT - DDTL LOAN AGREEMENT Assignors: WESTERN DIGITAL TECHNOLOGIES, INC.
Assigned to JPMORGAN CHASE BANK, N.A. reassignment JPMORGAN CHASE BANK, N.A. PATENT COLLATERAL AGREEMENT - A&R LOAN AGREEMENT Assignors: WESTERN DIGITAL TECHNOLOGIES, INC.
Publication of US20230393761A1 publication Critical patent/US20230393761A1/en
Publication of US11853562B1 publication Critical patent/US11853562B1/en
Application granted granted Critical
Assigned to SanDisk Technologies, Inc. reassignment SanDisk Technologies, Inc. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: WESTERN DIGITAL TECHNOLOGIES, INC.
Assigned to SanDisk Technologies, Inc. reassignment SanDisk Technologies, Inc. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: SanDisk Technologies, Inc.
Assigned to JPMORGAN CHASE BANK, N.A., AS THE AGENT reassignment JPMORGAN CHASE BANK, N.A., AS THE AGENT PATENT COLLATERAL AGREEMENT Assignors: SanDisk Technologies, Inc.
Assigned to JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT reassignment JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT SECURITY AGREEMENT Assignors: SanDisk Technologies, Inc.
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/061Improving I/O performance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0622Securing storage systems in relation to access
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0653Monitoring storage devices or systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0655Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0655Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices
    • G06F3/0659Command handling arrangements, e.g. command buffers, queues, command scheduling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device
    • G06F3/0679Non-volatile semiconductor memory device, e.g. flash memory, one time programmable memory [OTP]

Definitions

  • Embodiments of the present disclosure generally relate to data storage devices, such as solid state drives (SSDs), and, more specifically, read look ahead (RLA) in key value (KV) data storage devices.
  • SSDs solid state drives
  • RLA read look ahead
  • KV key value
  • a KV database works by storing a quantity of user data that is associated with a key that is addressable as a complete entity.
  • Examples of user data that can be stored in a KV database may include photos, records, and files. From a host device point-of-view, the photo, the record, or the file may be retrieved using a single key/address, rather than using multiple addresses that include data of the photo, the record, or the file.
  • the data is stored as unstructured data and may be addressed using a key of variable length.
  • Storage space of a memory device may be allocated for KV pair data in increments of bytes, where a length value of the KV pair data is associated with the necessary storage space to store the KV pair data.
  • KV pair data allows access to data on a data storage device using a key rather than a block address.
  • Read look ahead (RLA) is a mechanism to read data from a memory device of the data storage device before a host device requests the data. In other words, the data storage device may predict which data the host device may request to read.
  • the RLA mechanism may rely on hints, explicit directions from the host device, which may be a dataset management (DSM) hint, or learning mechanisms that predicts a next logical block address (LBA) based on previous host read requests.
  • DSM dataset management
  • LBA next logical block address
  • the present disclosure generally relates to data storage devices, such as solid state drives (SSDs), and, more specifically, read look ahead (RLA) in key value (KV) data storage devices.
  • a data storage device includes a memory device and a controller coupled to the memory device.
  • the controller is configured to program key value (KV) pair data to the memory device, where the KV pair data includes a key and a value, analyze the key, and generate metadata based on the analyzing.
  • the controller is further configured to generate a metadata index for a plurality of KV pair data, where the metadata index value corresponds to a similarity or a difference between a first key and a second key, and cluster generated metadata based on the metadata index.
  • the controller is further configured to receive a read command for the KV pair data, analyze the generated metadata of the KV pair data, generate a predicted next key, and use read look ahead (RLA) to read a predicted next KV pair data based on the predicted next key.
  • a data storage device includes a memory device and a controller coupled to the memory device.
  • the controller is configured to program key value (KV) pair data to the memory device, where the KV pair data includes a key and a value, analyze the key, and generate metadata based on the analyzing.
  • KV key value
  • a data storage device in another embodiment, includes a memory device and a controller coupled to the memory device.
  • the controller is configured to receive a read command for key value (KV) pair data stored in the memory device, where the KV pair data includes a key and a value, retrieve metadata corresponding to the KV pair data, and determine a next KV pair data to be read using a cluster relation table based on the retrieved metadata.
  • KV key value
  • a data storage device in another embodiment, includes memory means and a controller coupled to the memory means.
  • the controller is configured to generate metadata for key value (KV) pair data, assign a metadata index comparing a similarity of a first metadata of a first KV pair data to one or more of another metadata, where each of the one or more of the another metadata is associated with a different KV pair data than the first KV pair data, receive a read command to read the KV pair data, and retrieve a predicted next KV pair data based on the metadata index.
  • KV key value
  • FIG. 1 is a schematic block diagram illustrating a storage system in which a data storage device may function as a storage device for a host device, according to certain embodiments.
  • FIG. 2 A is an exemplary illustration of a KV pair data, according to certain embodiments.
  • FIG. 2 B is a table illustrating a command set for a KV database, according to certain embodiments.
  • FIG. 3 A is a flow diagram illustrating a method of receiving KV pair data from a host device, according to certain embodiments.
  • FIG. 3 B is a flow diagram illustrating a method of response to KV pair data being read by a host device, according to certain embodiments.
  • FIG. 4 A is a flow diagram illustrating a method of clustering metadata, according to certain embodiments.
  • FIG. 4 B is a flow diagram illustrating a method of updating a cluster relationship table, according to certain embodiments.
  • the present disclosure generally relates to data storage devices, such as solid state drives (SSDs), and, more specifically, read look ahead (RLA) in key value (KV) data storage devices.
  • a data storage device includes a memory device and a controller coupled to the memory device.
  • the controller is configured to program key value (KV) pair data to the memory device, where the KV pair data includes a key and a value, analyze the key, and generate metadata based on the analyzing.
  • the controller is further configured to generate a metadata index for a plurality of KV pair data, where the metadata index value corresponds to a similarity or a difference between a first key and a second key, and cluster generated metadata based on the metadata index.
  • the controller is further configured to receive a read command for the KV pair data, analyze the generated metadata of the KV pair data, generate a predicted next key, and use read look ahead (RLA) to read a predicted next KV pair data based on the predicted next key.
  • FIG. 1 is a schematic block diagram illustrating a storage system 100 in which a host device 104 is in communication with a data storage device 106 , according to certain embodiments.
  • the host device 104 may utilize a non-volatile memory (NVM) 110 included in data storage device 106 to store and retrieve data.
  • the host device 104 comprises a host DRAM 138 .
  • the storage system 100 may include a plurality of storage devices, such as the data storage device 106 , which may operate as a storage array.
  • the storage system 100 may include a plurality of data storage devices 106 configured as a redundant array of inexpensive/independent disks (RAID) that collectively function as a mass storage device for the host device 104 .
  • RAID redundant array of inexpensive/independent disks
  • the host device 104 may store and/or retrieve data to and/or from one or more storage devices, such as the data storage device 106 . As illustrated in FIG. 1 , the host device 104 may communicate with the data storage device 106 via an interface 114 .
  • the host device 104 may comprise any of a wide range of devices, including computer servers, network-attached storage (NAS) units, desktop computers, notebook (i.e., laptop) computers, tablet computers, set-top boxes, telephone handsets such as so-called “smart” phones, so-called “smart” pads, televisions, cameras, display devices, digital media players, video gaming consoles, video streaming device, or other devices capable of sending or receiving data from a data storage device.
  • NAS network-attached storage
  • the data storage device 106 includes a controller 108 , NVM 110 , a power supply 111 , volatile memory 112 , the interface 114 , and a write buffer 116 .
  • the data storage device 106 may include additional components not shown in FIG. 1 for the sake of clarity.
  • the data storage device 106 may include a printed circuit board (PCB) to which components of the data storage device 106 are mechanically attached and which includes electrically conductive traces that electrically interconnect components of the data storage device 106 or the like.
  • PCB printed circuit board
  • the physical dimensions and connector configurations of the data storage device 106 may conform to one or more standard form factors.
  • Some example standard form factors include, but are not limited to, 3.5′′ data storage device (e.g., an HDD or SSD), 2.5′′ data storage device, 1.8′′ data storage device, peripheral component interconnect (PCI), PCI-extended (PCI-X), PCI Express (PCIe) (e.g., PCIe x1, x4, x8, x16, PCIe Mini Card, MiniPCI, etc.).
  • the data storage device 106 may be directly coupled (e.g., directly soldered or plugged into a connector) to a motherboard of the host device 104 .
  • Interface 114 may include one or both of a data bus for exchanging data with the host device 104 and a control bus for exchanging commands with the host device 104 .
  • Interface 114 may operate in accordance with any suitable protocol.
  • the interface 114 may operate in accordance with one or more of the following protocols: advanced technology attachment (ATA) (e.g., serial-ATA (SATA) and parallel-ATA (PATA)), Fibre Channel Protocol (FCP), small computer system interface (SCSI), serially attached SCSI (SAS), PCI, and PCIe, non-volatile memory express (NVMe), OpenCAPI, GenZ, Cache Coherent Interface Accelerator (CCIX), Open Channel SSD (OCSSD), or the like.
  • ATA advanced technology attachment
  • SATA serial-ATA
  • PATA parallel-ATA
  • FCP Fibre Channel Protocol
  • SCSI small computer system interface
  • SAS serially attached SCSI
  • PCI PCI
  • NVMe non-volatile memory express
  • OpenCAPI OpenCAPI
  • Interface 114 (e.g., the data bus, the control bus, or both) is electrically connected to the controller 108 , providing an electrical connection between the host device 104 and the controller 108 , allowing data to be exchanged between the host device 104 and the controller 108 .
  • the electrical connection of interface 114 may also permit the data storage device 106 to receive power from the host device 104 .
  • the power supply 111 may receive power from the host device 104 via interface 114 .
  • the NVM 110 may include a plurality of memory devices or memory units. NVM 110 may be configured to store and/or retrieve data. For instance, a memory unit of NVM 110 may receive data and a message from controller 108 that instructs the memory unit to store the data. Similarly, the memory unit may receive a message from controller 108 that instructs the memory unit to retrieve data. In some examples, each of the memory units may be referred to as a die. In some examples, the NVM 110 may include a plurality of dies (i.e., a plurality of memory units).
  • each memory unit may be configured to store relatively large amounts of data (e.g., 128 MB, 256 MB, 512 MB, 1 GB, 2 GB, 4 GB, 8 GB, 16 GB, 32 GB, 64 GB, 128 GB, 256 GB, 512 GB, 1 TB, etc.).
  • relatively large amounts of data e.g., 128 MB, 256 MB, 512 MB, 1 GB, 2 GB, 4 GB, 8 GB, 16 GB, 32 GB, 64 GB, 128 GB, 256 GB, 512 GB, 1 TB, etc.
  • each memory unit may include any type of non-volatile memory devices, such as flash memory devices, phase-change memory (PCM) devices, resistive random-access memory (ReRAM) devices, magneto-resistive random-access memory (MRAM) devices, ferroelectric random-access memory (F-RAM), holographic memory devices, and any other type of non-volatile memory devices.
  • non-volatile memory devices such as flash memory devices, phase-change memory (PCM) devices, resistive random-access memory (ReRAM) devices, magneto-resistive random-access memory (MRAM) devices, ferroelectric random-access memory (F-RAM), holographic memory devices, and any other type of non-volatile memory devices.
  • the NVM 110 may comprise a plurality of flash memory devices or memory units.
  • NVM Flash memory devices may include NAND or NOR-based flash memory devices and may store data based on a charge contained in a floating gate of a transistor for each flash memory cell.
  • the flash memory device may be divided into a plurality of dies, where each die of the plurality of dies includes a plurality of physical or logical blocks, which may be further divided into a plurality of pages.
  • Each block of the plurality of blocks within a particular memory device may include a plurality of NVM cells. Rows of NVM cells may be electrically connected using a word line to define a page of a plurality of pages.
  • Respective cells in each of the plurality of pages may be electrically connected to respective bit lines.
  • NVM flash memory devices may be 2D or 3D devices and may be single level cell (SLC), multi-level cell (MLC), triple level cell (TLC), or quad level cell (QLC).
  • the controller 108 may write data to and read data from NVM flash memory devices at the page level and erase data from NVM flash memory devices at the block level.
  • the power supply 111 may provide power to one or more components of the data storage device 106 .
  • the power supply 111 may provide power to one or more components using power provided by an external device, such as the host device 104 .
  • the power supply 111 may provide power to the one or more components using power received from the host device 104 via interface 114 .
  • the power supply 111 may include one or more power storage components configured to provide power to the one or more components when operating in a shutdown mode, such as where power ceases to be received from the external device. In this way, the power supply 111 may function as an onboard backup power source.
  • the one or more power storage components include, but are not limited to, capacitors, super-capacitors, batteries, and the like.
  • the amount of power that may be stored by the one or more power storage components may be a function of the cost and/or the size (e.g., area/volume) of the one or more power storage components. In other words, as the amount of power stored by the one or more power storage components increases, the cost and/or the size of the one or more power storage components also increases.
  • the volatile memory 112 may be used by controller 108 to store information.
  • Volatile memory 112 may include one or more volatile memory devices.
  • controller 108 may use volatile memory 112 as a cache. For instance, controller 108 may store cached information in volatile memory 112 until the cached information is written to the NVM 110 .
  • volatile memory 112 may consume power received from the power supply 111 .
  • Examples of volatile memory 112 include, but are not limited to, random-access memory (RAM), dynamic random access memory (DRAM), static RAM (SRAM), and synchronous dynamic RAM (SDRAM (e.g., DDR1, DDR2, DDR3, DDR3L, LPDDR3, DDR4, LPDDR4, and the like)).
  • RAM random-access memory
  • DRAM dynamic random access memory
  • SRAM static RAM
  • SDRAM synchronous dynamic RAM
  • Controller 108 may manage one or more operations of the data storage device 106 . For instance, controller 108 may manage the reading of data from and/or the writing of data to the NVM 110 . In some embodiments, when the data storage device 106 receives a write command from the host device 104 , the controller 108 may initiate a data storage command to store data to the NVM 110 and monitor the progress of the data storage command. Controller 108 may determine at least one operational characteristic of the storage system 100 and store at least one operational characteristic in the NVM 110 .
  • the controller 108 when the data storage device 106 receives a write command from the host device 104 , the controller 108 temporarily stores the data associated with the write command in an internal memory of the controller 108 , such as SRAM memory, prior to sending the data to the NVM 110 .
  • the controller 108 may generate metadata for the KV pair data based on the key of the KV pair data.
  • the metadata may be based on the logical meaning of the corresponding key.
  • the controller 108 may also classify the metadata of the key of the KV pair data as a type selected from a group that includes at least words, American Standard Code for Information Interchange (ASCII) Characters, mathematical expressions (or equations), a histogram of elements of the key, and the like. It is to be understood that other classifications may be applicable to the described embodiments. It is to be further understood that combinations of the previously mentioned classifications as well as the other classifications that may be applicable to the described embodiments are also contemplated.
  • ASCII American Standard Code for Information Interchange
  • the controller 108 may be further configured to sort and/or organize the keys based on the classification of the metadata. For example, keys having the classification of “words” may be separated in grouping from keys having the classification of “ASCII characters”. Furthermore, the sorting and/or organizing may include ordering the keys according to a meaningful metric. For example, the meaningful metric may include order in words, ascending order in numbers, and the like. The order of the keys may be represented as a linked list in the volatile memory 112 . The linked list may link a first key to a second key, where the first key and the second key are characterized in a same group.
  • the linking may be completed such that when the first key is requested, the controller 108 may read and store the second key and corresponding value in the volatile memory 112 or an internal cache of the controller 108 , such as SRAM, prior to receiving a read request for the second key is received. In other words, the controller 108 may fetch the second key and corresponding value pre-emptively. Thus, the controller 108 may utilize read look ahead (RLA) to read the second key and corresponding value prior to receiving a read request for the second key.
  • RLA read look ahead
  • the controller 108 may generate, maintain, and update a cluster relationship table, which may be stored in the volatile memory 112 or an internal cache of the controller 108 , such as SRAM.
  • the cluster relationship table may referred to as a table herein for simplification purposes.
  • the metadata index for each KV pair data may be a value between 0 and 1, where a metadata index closer to 1 indicates that the compared KV pair data are more likely to be read next due to a similarity or association of the metadata of the compared KV pair data, and where a metadata index closer to 0 indicates that the compared KV pair data are less likely to be read next due to a dissimilarity or association of the metadata of the compared KV pair data.
  • a metadata index greater than or equal to about 0.5 indicates that the compared KV pair data have a higher probability of being read
  • metadata indexes closer to 1 indicates that the compared KV pair data have a higher probability of being read than the compared KV pair data having metadata indexes closer to 0.5
  • a metadata index less than about 0.5 indicates that the compared KV pair data are less likely of being read
  • metadata indexes closer to 0 indicates that the metadata of the compared KV pair data are less likely to be read than the compared KV pair data having metadata indexes closer to 0.5.
  • the corresponding metadata index relating the first KV pair data to the second KV pair data may be increased.
  • the corresponding metadata index relating the first KV pair data to the second KV pair data may be decreased.
  • KV Pair Data KV Pair Data #1 #2 . . . #n KV Pair Data x 0.5 . . . 0.5 #1 KV Pair Data 0.3 x . . . 0.1 #2 . . . . . . . . . KV Pair Data 0.6 0.2 . . . x #n
  • Table 1 may not be diagonally symmetrical.
  • the probability, represented by the metadata indexes in Table 1, that a second KV pair data is read after a first KV pair data may depend on which KV pair data is read first. For example, referring to Table 1, if a first KV pair data #1 is read first, then the second KV pair data #2 has a corresponding metadata index of 0.5. However, if a second KV pair data #2 is read first, then the first KV pair data #1 has a metadata index of 0.3. It is to be understood that other relationship schemes and tracking methods may be utilized and applicable to the embodiments described herein.
  • the controller 108 may utilize the table to retrieve the next KV pair data to be read using RLA.
  • the next KV pair data to be read may have the highest metadata index compared to other metadata indexes of other KV pair data with respect to the first KV pair data.
  • the metadata index relative to other relation values may determine which KV pair data is retrieved using RLA.
  • the controller 108 may retrieve the address of the next read (e.g., next KV pair data to be read) using the metadata indexing of the table.
  • the metadata indexes of Table 1 may be updated after each read request for KV pair data has been received and/or processed, after a threshold period of time has elapsed, when the data storage device 106 begins a background operations, combinations thereof, and the like.
  • a metadata index of a first KV pair data and a second KV pair data where the first KV pair data is read first and the second KV pair data is read second, may be increased when the second KV pair data is read within (i.e., equal to or less than) a threshold time of reading the first KV pair data and decreased when the second KV pair data is not read within a threshold time of reading the first KV pair data.
  • FIG. 2 A is an exemplary illustration of a KV pair data 200 , according to certain embodiments.
  • KV pair data 200 includes a key 202 and a value 204 , where the data, which may be host data, of the value 204 is addressed by the key 202 .
  • the key 202 may have a size of about 1 byte to about 64 bytes and the value 204 may have a size of about 0 bytes to about 2 32 -1 bytes.
  • the value 204 is an empty value. It is to be understood that the previously mentioned values are not intended to be limiting, but to provide an example of an embodiment.
  • FIG. 2 B is a table 250 illustrating a command set for a KV database, according to certain embodiments.
  • a KV system may include a command set that includes, in a non-limiting list, a delete command, a list command, a retrieve command, an exist command, and a store command.
  • the delete command may cause the controller 108 to delete the key 202 and value 204 associated with the key 202 .
  • the list command may cause the controller 108 to list keys that exist in a KV namespace starting at a specified key.
  • the exist command may cause the controller 108 to return a status indicating whether a KV pair data 200 exists for a specified key to the command generator, such as the host device 104 .
  • the store command may cause the controller 108 to store a KV pair data to a KV namespace.
  • the retrieve command may cause the controller 108 to retrieve the value 204 associated with a specified key from a KV namespace.
  • the length to be retrieved of the KV pair data 200 is specified in the retrieve command and the location to transfer the KV pair data 200 is specified by either a scatter gather list (SGL) pointer or a physical region page (PRP) pointer in the retrieve command.
  • SGL scatter gather list
  • PRP physical region page
  • FIG. 3 A is a flow diagram illustrating a method 300 of receiving KV pair data from a host device, such as the host device 104 of FIG. 1 , according to certain embodiments.
  • Method 300 may be implemented by a controller, such as the controller 108 of FIG. 1 , to generate metadata to be used in a cluster relationship table relating a first KV pair data to a second KV pair data based on a probability that the second KV pair data will be read subsequent to the first KV pair data.
  • a controller such as the controller 108 of FIG. 1
  • KV pair data is received from the host device 104 .
  • a key of the received KV pair data is analyzed according to a metric, such as the meaningful metric described in FIG. 1 , and metadata is generated for the received KV pair data.
  • the controller 108 may utilize the generated metadata to generate a linked list, update a generated linked list, generate a cluster relationship table, and/or update a cluster relationship table.
  • FIG. 3 B is a flow diagram illustrating a method 350 of response to KV pair data being read by a host device, according to certain embodiments.
  • Method 350 may be implemented by a controller, such as the controller 108 of FIG. 1 , to derive a next KV pair data to be read based on metadata stored in a cluster relationship table.
  • a controller such as the controller 108 of FIG. 1
  • aspects of the storage system 100 of FIG. 1 may be referenced herein.
  • a first KV pair data is read by the host device 104 .
  • metadata of the key associated with the first KV pair data is analyzed and the next key (and corresponding KV pair data) to be retrieved using RLA is derived.
  • the metadata may include a pointer linking the metadata to metadata of the next key based on a probability that the next key will be read next.
  • the analyzing and retrieving may be completed in a hardware component of the controller 108 .
  • the controller 108 utilizes RLA to retrieve the next KV pair data associated with the next key derived and stores the next KV pair data in cache, which may be SRAM of the controller 108 or the volatile memory 112 .
  • the retrieving of the next KV pair data using RLA may be completed prior to receiving a read request for the next KV pair data.
  • the retrieving of the next KV pair data is a speculative retrieval, such that if the next read request is for the next KV pair data, time is saved.
  • FIG. 4 A is a flow diagram illustrating a method 400 of clustering metadata, according to certain embodiments.
  • Method 400 may be implemented by a controller, such as the controller 108 of FIG. 1 , to cluster metadata in a cluster relationship table relating a first KV pair data to a second KV pair data based on a probability that the second KV pair data will be read subsequent to the first KV pair data.
  • a controller such as the controller 108 of FIG. 1
  • FIG. 4 A is a flow diagram illustrating a method 400 of clustering metadata, according to certain embodiments.
  • Method 400 may be implemented by a controller, such as the controller 108 of FIG. 1 , to cluster metadata in a cluster relationship table relating a first KV pair data to a second KV pair data based on a probability that the second KV pair data will be read subsequent to the first KV pair data.
  • aspects of the storage system 100 of FIG. 1 may be referenced herein.
  • KV pair data is received from the host device 104 .
  • a key of the received KV pair data is analyzed according to a metric, such as the meaningful metric described in FIG. 1 , and metadata is generated for the received KV pair data.
  • the controller 108 may utilize the generated metadata to generate a linked list, update a generated linked list, generate a cluster relationship table, and/or update a cluster relationship table.
  • the controller 108 determines if the data storage device 106 is completing background operations or if a time since last update has reached or exceeded a threshold.
  • the controller 108 updates the linked list or the cluster relationship table based on updated metadata of each KV pair data received between the updating at block 408 . However, if the data storage device 106 is not completing background operations or the time since last update has not reached or exceeded the threshold at block 406 , then method 400 returns to block 402 . It is to be understood that other mechanisms of updating the cluster relationship table is contemplated and may be applicable to the described embodiments.
  • FIG. 4 B is a flow diagram illustrating a method 450 of updating a cluster relationship table, according to certain embodiments.
  • Method 450 may be implemented by a controller, such as the controller 108 of FIG. 1 , to update a cluster relationship table relating a first KV pair data to a second KV pair data based on a probability that the second KV pair data will be read subsequent to the first KV pair data.
  • a controller such as the controller 108 of FIG. 1
  • FIG. 4 B is a flow diagram illustrating a method 450 of updating a cluster relationship table, according to certain embodiments.
  • Method 450 may be implemented by a controller, such as the controller 108 of FIG. 1 , to update a cluster relationship table relating a first KV pair data to a second KV pair data based on a probability that the second KV pair data will be read subsequent to the first KV pair data.
  • aspects of the storage system 100 of FIG. 1 may be referenced herein.
  • a first KV pair data is read by the host device 104 .
  • metadata of the key associated with the first KV pair data is analyzed and the next key (and corresponding KV pair data) to be retrieved using RLA is derived.
  • the metadata may include a pointer linking the metadata to metadata of the next key based on a probability that the next key will be read next.
  • the analyzing and retrieving may be completed in a hardware component of the controller 108 .
  • the controller 108 determines if the data storage device 106 is completing background operations or if a time since last update has reached or exceeded a threshold.
  • method 450 returns to block 452 .
  • the controller 108 updates the cluster relationship table based on an order of reads of KV pair data between the updating at block 458 . It is to be understood that other mechanisms of updating the cluster relationship table is contemplated and may be applicable to the described embodiments.
  • read look ahead may be utilized by the controller and quality of service of random value read workloads of KV data storage devices may be improved.
  • a data storage device includes a memory device and a controller coupled to the memory device.
  • the controller is configured to program key value (KV) pair data to the memory device, where the KV pair data includes a key and a value, analyze the key, and generate metadata based on the analyzing.
  • KV key value
  • the analyzing occurs when the controller is performing background operations.
  • the controller is further configured to classify the key as a type selected from a group consisting of words, American Standard Code for Information Interchange (ASCII) characters, and mathematical expressions.
  • the controller is further configured to aggregate and order one or more keys in a linked list.
  • a linked list links a first key to a second key. The aggregating and the ordering is based on the classifying.
  • the linked list is stored in random access memory (RAM).
  • the generated metadata comprises at least one of a length of the key, a histogram of elements of the key, and a time since the key was read.
  • the controller is further configured to generate a metadata index based on the analyzing.
  • the metadata index indicates a similarity between the key and another key.
  • a high similarity indicates a higher chance for the key and the another key to be read subsequently and a lower similarity indicates a lower chance for the key and the another key to be read subsequently.
  • the controller is further configured to cluster two or more generated metadata based on the indicated similarity. The clustering occurs during background operations and after a threshold period of time has elapsed.
  • the controller is further configured to receive a read command for the KV pair data, analyze the generated metadata of the KV pair data, and generate a predicted next key.
  • the predicted next key corresponds to the another key having the high similarity to the key.
  • the controller is further configured to use read look ahead (RLA) to read a predicted next KV pair data based on the predicted next key.
  • RLA read look ahead
  • a data storage device in another embodiment, includes a memory device and a controller coupled to the memory device.
  • the controller is configured to receive a read command for key value (KV) pair data stored in the memory device, where the KV pair data includes a key and a value, retrieve metadata corresponding to the KV pair data, and determine a next KV pair data to be read using a cluster relation table based on the retrieved metadata.
  • KV key value
  • the controller is further configured to perform read look ahead (RLA) using the determining.
  • the cluster relation table stores a similarity matrix comparing first metadata of a first key of a first KV pair data to second metadata of a second key of a second KV pair data. Each entry of the similarity matrix stores a metadata index. A metadata index greater than a predetermined threshold indicates that a corresponding KV pair data has a high probability of being read next and a lower metadata index lower than the predetermined threshold indicates that the corresponding KV pair data has a low probability to be read next.
  • the next KV pair data to be read corresponds to an entry corresponding to the KV pair data having a highest metadata index.
  • the controller is further configured to update the cluster relation table after each KV pair data read.
  • a data storage device in another embodiment, includes memory means and a controller coupled to the memory means.
  • the controller is configured to generate metadata for key value (KV) pair data, assign a metadata index comparing a similarity of a first metadata of a first KV pair data to one or more of another metadata, where each of the one or more of the another metadata is associated with a different KV pair data than the first KV pair data, receive a read command to read the KV pair data, and retrieve a predicted next KV pair data based on the metadata index.
  • KV key value
  • the retrieving includes using read look ahead (RLA).
  • RLA read look ahead

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A data storage device includes a memory device and a controller coupled to the memory device. The controller is configured to program key value (KV) pair data to the memory device, where the KV pair data includes a key and a value, analyze the key, and generate metadata based on the analyzing. The controller is further configured to generate a metadata index for a plurality of KV pair data, where the metadata index value corresponds to a similarity or a difference between a first key and a second key, and cluster generated metadata based on the metadata index. The controller is further configured to receive a read command for the KV pair data, analyze the generated metadata of the KV pair data, generate a predicted next key, and use read look ahead (RLA) to read a predicted next KV pair data based on the predicted next key.

Description

    BACKGROUND OF THE DISCLOSURE Field of the Disclosure
  • Embodiments of the present disclosure generally relate to data storage devices, such as solid state drives (SSDs), and, more specifically, read look ahead (RLA) in key value (KV) data storage devices.
  • Description of the Related Art
  • A KV database works by storing a quantity of user data that is associated with a key that is addressable as a complete entity. Examples of user data that can be stored in a KV database may include photos, records, and files. From a host device point-of-view, the photo, the record, or the file may be retrieved using a single key/address, rather than using multiple addresses that include data of the photo, the record, or the file. The data is stored as unstructured data and may be addressed using a key of variable length. Storage space of a memory device may be allocated for KV pair data in increments of bytes, where a length value of the KV pair data is associated with the necessary storage space to store the KV pair data.
  • Using a KV database in a data storage device may increase the performance of the data storage device. For example, the number of data transfers/second may be improved because the KV pair data to physical storage location translation layer in the host device may be removed. Furthermore, the number of commands over the bus may be reduced since an entire KV pair data may utilize a single transfer. KV pair data allows access to data on a data storage device using a key rather than a block address. Read look ahead (RLA) is a mechanism to read data from a memory device of the data storage device before a host device requests the data. In other words, the data storage device may predict which data the host device may request to read. In non-KV data storage devices, the RLA mechanism may rely on hints, explicit directions from the host device, which may be a dataset management (DSM) hint, or learning mechanisms that predicts a next logical block address (LBA) based on previous host read requests.
  • Therefore, there is a need in the art for an improved read look ahead mechanism for KV data storage devices based on key analysis.
  • SUMMARY OF THE DISCLOSURE
  • The present disclosure generally relates to data storage devices, such as solid state drives (SSDs), and, more specifically, read look ahead (RLA) in key value (KV) data storage devices. A data storage device includes a memory device and a controller coupled to the memory device. The controller is configured to program key value (KV) pair data to the memory device, where the KV pair data includes a key and a value, analyze the key, and generate metadata based on the analyzing. The controller is further configured to generate a metadata index for a plurality of KV pair data, where the metadata index value corresponds to a similarity or a difference between a first key and a second key, and cluster generated metadata based on the metadata index. The controller is further configured to receive a read command for the KV pair data, analyze the generated metadata of the KV pair data, generate a predicted next key, and use read look ahead (RLA) to read a predicted next KV pair data based on the predicted next key.
  • In one embodiment, a data storage device includes a memory device and a controller coupled to the memory device. The controller is configured to program key value (KV) pair data to the memory device, where the KV pair data includes a key and a value, analyze the key, and generate metadata based on the analyzing.
  • In another embodiment, a data storage device includes a memory device and a controller coupled to the memory device. The controller is configured to receive a read command for key value (KV) pair data stored in the memory device, where the KV pair data includes a key and a value, retrieve metadata corresponding to the KV pair data, and determine a next KV pair data to be read using a cluster relation table based on the retrieved metadata.
  • In another embodiment, a data storage device includes memory means and a controller coupled to the memory means. The controller is configured to generate metadata for key value (KV) pair data, assign a metadata index comparing a similarity of a first metadata of a first KV pair data to one or more of another metadata, where each of the one or more of the another metadata is associated with a different KV pair data than the first KV pair data, receive a read command to read the KV pair data, and retrieve a predicted next KV pair data based on the metadata index.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • So that the manner in which the above recited features of the present disclosure can be understood in detail, a more particular description of the disclosure, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only typical embodiments of this disclosure and are therefore not to be considered limiting of its scope, for the disclosure may admit to other equally effective embodiments.
  • FIG. 1 is a schematic block diagram illustrating a storage system in which a data storage device may function as a storage device for a host device, according to certain embodiments.
  • FIG. 2A is an exemplary illustration of a KV pair data, according to certain embodiments.
  • FIG. 2B is a table illustrating a command set for a KV database, according to certain embodiments.
  • FIG. 3A is a flow diagram illustrating a method of receiving KV pair data from a host device, according to certain embodiments.
  • FIG. 3B is a flow diagram illustrating a method of response to KV pair data being read by a host device, according to certain embodiments.
  • FIG. 4A is a flow diagram illustrating a method of clustering metadata, according to certain embodiments.
  • FIG. 4B is a flow diagram illustrating a method of updating a cluster relationship table, according to certain embodiments.
  • To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to the figures. It is contemplated that elements disclosed in one embodiment may be beneficially utilized on other embodiments without specific recitation.
  • DETAILED DESCRIPTION
  • In the following, reference is made to embodiments of the disclosure. However, it should be understood that the disclosure is not limited to specifically described embodiments. Instead, any combination of the following features and elements, whether related to different embodiments or not, is contemplated to implement and practice the disclosure. Furthermore, although embodiments of the disclosure may achieve advantages over other possible solutions and/or over the prior art, whether or not a particular advantage is achieved by a given embodiment is not limiting of the disclosure. Thus, the following aspects, features, embodiments, and advantages are merely illustrative and are not considered elements or limitations of the appended claims except where explicitly recited in a claim(s). Likewise, reference to “the disclosure” shall not be construed as a generalization of any inventive subject matter disclosed herein and shall not be considered to be an element or limitation of the appended claims except where explicitly recited in a claim(s).
  • The present disclosure generally relates to data storage devices, such as solid state drives (SSDs), and, more specifically, read look ahead (RLA) in key value (KV) data storage devices. A data storage device includes a memory device and a controller coupled to the memory device. The controller is configured to program key value (KV) pair data to the memory device, where the KV pair data includes a key and a value, analyze the key, and generate metadata based on the analyzing. The controller is further configured to generate a metadata index for a plurality of KV pair data, where the metadata index value corresponds to a similarity or a difference between a first key and a second key, and cluster generated metadata based on the metadata index. The controller is further configured to receive a read command for the KV pair data, analyze the generated metadata of the KV pair data, generate a predicted next key, and use read look ahead (RLA) to read a predicted next KV pair data based on the predicted next key.
  • FIG. 1 is a schematic block diagram illustrating a storage system 100 in which a host device 104 is in communication with a data storage device 106, according to certain embodiments. For instance, the host device 104 may utilize a non-volatile memory (NVM) 110 included in data storage device 106 to store and retrieve data. The host device 104 comprises a host DRAM 138. In some examples, the storage system 100 may include a plurality of storage devices, such as the data storage device 106, which may operate as a storage array. For instance, the storage system 100 may include a plurality of data storage devices 106 configured as a redundant array of inexpensive/independent disks (RAID) that collectively function as a mass storage device for the host device 104.
  • The host device 104 may store and/or retrieve data to and/or from one or more storage devices, such as the data storage device 106. As illustrated in FIG. 1 , the host device 104 may communicate with the data storage device 106 via an interface 114. The host device 104 may comprise any of a wide range of devices, including computer servers, network-attached storage (NAS) units, desktop computers, notebook (i.e., laptop) computers, tablet computers, set-top boxes, telephone handsets such as so-called “smart” phones, so-called “smart” pads, televisions, cameras, display devices, digital media players, video gaming consoles, video streaming device, or other devices capable of sending or receiving data from a data storage device.
  • The data storage device 106 includes a controller 108, NVM 110, a power supply 111, volatile memory 112, the interface 114, and a write buffer 116. In some examples, the data storage device 106 may include additional components not shown in FIG. 1 for the sake of clarity. For example, the data storage device 106 may include a printed circuit board (PCB) to which components of the data storage device 106 are mechanically attached and which includes electrically conductive traces that electrically interconnect components of the data storage device 106 or the like. In some examples, the physical dimensions and connector configurations of the data storage device 106 may conform to one or more standard form factors. Some example standard form factors include, but are not limited to, 3.5″ data storage device (e.g., an HDD or SSD), 2.5″ data storage device, 1.8″ data storage device, peripheral component interconnect (PCI), PCI-extended (PCI-X), PCI Express (PCIe) (e.g., PCIe x1, x4, x8, x16, PCIe Mini Card, MiniPCI, etc.). In some examples, the data storage device 106 may be directly coupled (e.g., directly soldered or plugged into a connector) to a motherboard of the host device 104.
  • Interface 114 may include one or both of a data bus for exchanging data with the host device 104 and a control bus for exchanging commands with the host device 104. Interface 114 may operate in accordance with any suitable protocol. For example, the interface 114 may operate in accordance with one or more of the following protocols: advanced technology attachment (ATA) (e.g., serial-ATA (SATA) and parallel-ATA (PATA)), Fibre Channel Protocol (FCP), small computer system interface (SCSI), serially attached SCSI (SAS), PCI, and PCIe, non-volatile memory express (NVMe), OpenCAPI, GenZ, Cache Coherent Interface Accelerator (CCIX), Open Channel SSD (OCSSD), or the like. Interface 114 (e.g., the data bus, the control bus, or both) is electrically connected to the controller 108, providing an electrical connection between the host device 104 and the controller 108, allowing data to be exchanged between the host device 104 and the controller 108. In some examples, the electrical connection of interface 114 may also permit the data storage device 106 to receive power from the host device 104. For example, as illustrated in FIG. 1 , the power supply 111 may receive power from the host device 104 via interface 114.
  • The NVM 110 may include a plurality of memory devices or memory units. NVM 110 may be configured to store and/or retrieve data. For instance, a memory unit of NVM 110 may receive data and a message from controller 108 that instructs the memory unit to store the data. Similarly, the memory unit may receive a message from controller 108 that instructs the memory unit to retrieve data. In some examples, each of the memory units may be referred to as a die. In some examples, the NVM 110 may include a plurality of dies (i.e., a plurality of memory units). In some examples, each memory unit may be configured to store relatively large amounts of data (e.g., 128 MB, 256 MB, 512 MB, 1 GB, 2 GB, 4 GB, 8 GB, 16 GB, 32 GB, 64 GB, 128 GB, 256 GB, 512 GB, 1 TB, etc.).
  • In some examples, each memory unit may include any type of non-volatile memory devices, such as flash memory devices, phase-change memory (PCM) devices, resistive random-access memory (ReRAM) devices, magneto-resistive random-access memory (MRAM) devices, ferroelectric random-access memory (F-RAM), holographic memory devices, and any other type of non-volatile memory devices.
  • The NVM 110 may comprise a plurality of flash memory devices or memory units. NVM Flash memory devices may include NAND or NOR-based flash memory devices and may store data based on a charge contained in a floating gate of a transistor for each flash memory cell. In NVM flash memory devices, the flash memory device may be divided into a plurality of dies, where each die of the plurality of dies includes a plurality of physical or logical blocks, which may be further divided into a plurality of pages. Each block of the plurality of blocks within a particular memory device may include a plurality of NVM cells. Rows of NVM cells may be electrically connected using a word line to define a page of a plurality of pages. Respective cells in each of the plurality of pages may be electrically connected to respective bit lines. Furthermore, NVM flash memory devices may be 2D or 3D devices and may be single level cell (SLC), multi-level cell (MLC), triple level cell (TLC), or quad level cell (QLC). The controller 108 may write data to and read data from NVM flash memory devices at the page level and erase data from NVM flash memory devices at the block level.
  • The power supply 111 may provide power to one or more components of the data storage device 106. When operating in a standard mode, the power supply 111 may provide power to one or more components using power provided by an external device, such as the host device 104. For instance, the power supply 111 may provide power to the one or more components using power received from the host device 104 via interface 114. In some examples, the power supply 111 may include one or more power storage components configured to provide power to the one or more components when operating in a shutdown mode, such as where power ceases to be received from the external device. In this way, the power supply 111 may function as an onboard backup power source. Some examples of the one or more power storage components include, but are not limited to, capacitors, super-capacitors, batteries, and the like. In some examples, the amount of power that may be stored by the one or more power storage components may be a function of the cost and/or the size (e.g., area/volume) of the one or more power storage components. In other words, as the amount of power stored by the one or more power storage components increases, the cost and/or the size of the one or more power storage components also increases.
  • The volatile memory 112 may be used by controller 108 to store information. Volatile memory 112 may include one or more volatile memory devices. In some examples, controller 108 may use volatile memory 112 as a cache. For instance, controller 108 may store cached information in volatile memory 112 until the cached information is written to the NVM 110. As illustrated in FIG. 1 , volatile memory 112 may consume power received from the power supply 111. Examples of volatile memory 112 include, but are not limited to, random-access memory (RAM), dynamic random access memory (DRAM), static RAM (SRAM), and synchronous dynamic RAM (SDRAM (e.g., DDR1, DDR2, DDR3, DDR3L, LPDDR3, DDR4, LPDDR4, and the like)).
  • Controller 108 may manage one or more operations of the data storage device 106. For instance, controller 108 may manage the reading of data from and/or the writing of data to the NVM 110. In some embodiments, when the data storage device 106 receives a write command from the host device 104, the controller 108 may initiate a data storage command to store data to the NVM 110 and monitor the progress of the data storage command. Controller 108 may determine at least one operational characteristic of the storage system 100 and store at least one operational characteristic in the NVM 110. In some embodiments, when the data storage device 106 receives a write command from the host device 104, the controller 108 temporarily stores the data associated with the write command in an internal memory of the controller 108, such as SRAM memory, prior to sending the data to the NVM 110.
  • The controller 108 may generate metadata for the KV pair data based on the key of the KV pair data. The metadata may be based on the logical meaning of the corresponding key. Furthermore, because the controller 108 may generate metadata for the KV pair data based on the key of the KV pair data, the controller 108 may also classify the metadata of the key of the KV pair data as a type selected from a group that includes at least words, American Standard Code for Information Interchange (ASCII) Characters, mathematical expressions (or equations), a histogram of elements of the key, and the like. It is to be understood that other classifications may be applicable to the described embodiments. It is to be further understood that combinations of the previously mentioned classifications as well as the other classifications that may be applicable to the described embodiments are also contemplated.
  • The controller 108 may be further configured to sort and/or organize the keys based on the classification of the metadata. For example, keys having the classification of “words” may be separated in grouping from keys having the classification of “ASCII characters”. Furthermore, the sorting and/or organizing may include ordering the keys according to a meaningful metric. For example, the meaningful metric may include order in words, ascending order in numbers, and the like. The order of the keys may be represented as a linked list in the volatile memory 112. The linked list may link a first key to a second key, where the first key and the second key are characterized in a same group. The linking may be completed such that when the first key is requested, the controller 108 may read and store the second key and corresponding value in the volatile memory 112 or an internal cache of the controller 108, such as SRAM, prior to receiving a read request for the second key is received. In other words, the controller 108 may fetch the second key and corresponding value pre-emptively. Thus, the controller 108 may utilize read look ahead (RLA) to read the second key and corresponding value prior to receiving a read request for the second key.
  • The controller 108 may generate, maintain, and update a cluster relationship table, which may be stored in the volatile memory 112 or an internal cache of the controller 108, such as SRAM. The cluster relationship table may referred to as a table herein for simplification purposes. The metadata index for each KV pair data may be a value between 0 and 1, where a metadata index closer to 1 indicates that the compared KV pair data are more likely to be read next due to a similarity or association of the metadata of the compared KV pair data, and where a metadata index closer to 0 indicates that the compared KV pair data are less likely to be read next due to a dissimilarity or association of the metadata of the compared KV pair data.
  • In other words, a metadata index greater than or equal to about 0.5 indicates that the compared KV pair data have a higher probability of being read, where metadata indexes closer to 1 indicates that the compared KV pair data have a higher probability of being read than the compared KV pair data having metadata indexes closer to 0.5, and a metadata index less than about 0.5 indicates that the compared KV pair data are less likely of being read, where metadata indexes closer to 0 indicates that the metadata of the compared KV pair data are less likely to be read than the compared KV pair data having metadata indexes closer to 0.5. Thus, when a second KV pair data is read consecutively to a first KV pair data, the corresponding metadata index relating the first KV pair data to the second KV pair data may be increased. Conversely, when a second KV pair data is not read consecutively to a first KV pair data, the corresponding metadata index relating the first KV pair data to the second KV pair data may be decreased.
  • An example of the metadata indexes for a plurality of KV pair data is shown in Table 1 below.
  • TABLE 1
    KV Pair Data KV Pair Data KV Pair Data
    #1 #2 . . . #n
    KV Pair Data x 0.5 . . . 0.5
    #1
    KV Pair Data 0.3 x . . . 0.1
    #2
    . . . . . . . . . . . . . . .
    KV Pair Data 0.6 0.2 . . . x
    #n
  • It is noted that Table 1 may not be diagonally symmetrical. In other words, the probability, represented by the metadata indexes in Table 1, that a second KV pair data is read after a first KV pair data may depend on which KV pair data is read first. For example, referring to Table 1, if a first KV pair data #1 is read first, then the second KV pair data #2 has a corresponding metadata index of 0.5. However, if a second KV pair data #2 is read first, then the first KV pair data #1 has a metadata index of 0.3. It is to be understood that other relationship schemes and tracking methods may be utilized and applicable to the embodiments described herein.
  • When reading a first KV pair data, the controller 108 may utilize the table to retrieve the next KV pair data to be read using RLA. The next KV pair data to be read may have the highest metadata index compared to other metadata indexes of other KV pair data with respect to the first KV pair data. In other words, the metadata index relative to other relation values may determine which KV pair data is retrieved using RLA. In other words, the controller 108 may retrieve the address of the next read (e.g., next KV pair data to be read) using the metadata indexing of the table. Furthermore, the metadata indexes of Table 1 may be updated after each read request for KV pair data has been received and/or processed, after a threshold period of time has elapsed, when the data storage device 106 begins a background operations, combinations thereof, and the like. For example, a metadata index of a first KV pair data and a second KV pair data, where the first KV pair data is read first and the second KV pair data is read second, may be increased when the second KV pair data is read within (i.e., equal to or less than) a threshold time of reading the first KV pair data and decreased when the second KV pair data is not read within a threshold time of reading the first KV pair data.
  • FIG. 2A is an exemplary illustration of a KV pair data 200, according to certain embodiments. KV pair data 200 includes a key 202 and a value 204, where the data, which may be host data, of the value 204 is addressed by the key 202. The key 202 may have a size of about 1 byte to about 64 bytes and the value 204 may have a size of about 0 bytes to about 232-1 bytes. For example, when the value 204 has a size of about 0 bytes, the value 204 is an empty value. It is to be understood that the previously mentioned values are not intended to be limiting, but to provide an example of an embodiment.
  • FIG. 2B is a table 250 illustrating a command set for a KV database, according to certain embodiments. For exemplary purposes, aspects of the storage system 100 of FIG. 1 may be referenced herein. A KV system may include a command set that includes, in a non-limiting list, a delete command, a list command, a retrieve command, an exist command, and a store command. The delete command may cause the controller 108 to delete the key 202 and value 204 associated with the key 202. The list command may cause the controller 108 to list keys that exist in a KV namespace starting at a specified key. The exist command may cause the controller 108 to return a status indicating whether a KV pair data 200 exists for a specified key to the command generator, such as the host device 104. The store command may cause the controller 108 to store a KV pair data to a KV namespace.
  • The retrieve command may cause the controller 108 to retrieve the value 204 associated with a specified key from a KV namespace. The length to be retrieved of the KV pair data 200 is specified in the retrieve command and the location to transfer the KV pair data 200 is specified by either a scatter gather list (SGL) pointer or a physical region page (PRP) pointer in the retrieve command. If the specified length in the retrieve command is less than the length of the KV pair data 200 that is being retrieved, then the controller 108 returns the requested amount and the length of the KV pair data 200 to the completion queue. However, if the specified length in the retrieve command is greater than the length of the KV pair data 200 that is being retrieved, then the controller 108 returns the data from the NVM 110 and the length of the KV pair data 200 is returned to the completion queue.
  • FIG. 3A is a flow diagram illustrating a method 300 of receiving KV pair data from a host device, such as the host device 104 of FIG. 1 , according to certain embodiments. Method 300 may be implemented by a controller, such as the controller 108 of FIG. 1 , to generate metadata to be used in a cluster relationship table relating a first KV pair data to a second KV pair data based on a probability that the second KV pair data will be read subsequent to the first KV pair data. For exemplary purposes, aspects of the storage system 100 of FIG. 1 may be referenced herein. At block 302, KV pair data is received from the host device 104. At block 304, a key of the received KV pair data is analyzed according to a metric, such as the meaningful metric described in FIG. 1 , and metadata is generated for the received KV pair data. The controller 108 may utilize the generated metadata to generate a linked list, update a generated linked list, generate a cluster relationship table, and/or update a cluster relationship table.
  • FIG. 3B is a flow diagram illustrating a method 350 of response to KV pair data being read by a host device, according to certain embodiments. Method 350 may be implemented by a controller, such as the controller 108 of FIG. 1 , to derive a next KV pair data to be read based on metadata stored in a cluster relationship table. For exemplary purposes, aspects of the storage system 100 of FIG. 1 may be referenced herein.
  • At block 352, a first KV pair data is read by the host device 104. At block 354, metadata of the key associated with the first KV pair data is analyzed and the next key (and corresponding KV pair data) to be retrieved using RLA is derived. For example, the metadata may include a pointer linking the metadata to metadata of the next key based on a probability that the next key will be read next. The analyzing and retrieving may be completed in a hardware component of the controller 108. At block 356, the controller 108 utilizes RLA to retrieve the next KV pair data associated with the next key derived and stores the next KV pair data in cache, which may be SRAM of the controller 108 or the volatile memory 112. The retrieving of the next KV pair data using RLA may be completed prior to receiving a read request for the next KV pair data. In other words, the retrieving of the next KV pair data is a speculative retrieval, such that if the next read request is for the next KV pair data, time is saved.
  • FIG. 4A is a flow diagram illustrating a method 400 of clustering metadata, according to certain embodiments. Method 400 may be implemented by a controller, such as the controller 108 of FIG. 1 , to cluster metadata in a cluster relationship table relating a first KV pair data to a second KV pair data based on a probability that the second KV pair data will be read subsequent to the first KV pair data. For exemplary purposes, aspects of the storage system 100 of FIG. 1 may be referenced herein.
  • At block 402, KV pair data is received from the host device 104. At block 404, a key of the received KV pair data is analyzed according to a metric, such as the meaningful metric described in FIG. 1 , and metadata is generated for the received KV pair data. The controller 108 may utilize the generated metadata to generate a linked list, update a generated linked list, generate a cluster relationship table, and/or update a cluster relationship table. At block 406, the controller 108 determines if the data storage device 106 is completing background operations or if a time since last update has reached or exceeded a threshold. If the data storage device 106 is completing background operations or the time since last update has reached or exceeded the threshold at block 406, then the controller 108 updates the linked list or the cluster relationship table based on updated metadata of each KV pair data received between the updating at block 408. However, if the data storage device 106 is not completing background operations or the time since last update has not reached or exceeded the threshold at block 406, then method 400 returns to block 402. It is to be understood that other mechanisms of updating the cluster relationship table is contemplated and may be applicable to the described embodiments.
  • FIG. 4B is a flow diagram illustrating a method 450 of updating a cluster relationship table, according to certain embodiments. Method 450 may be implemented by a controller, such as the controller 108 of FIG. 1 , to update a cluster relationship table relating a first KV pair data to a second KV pair data based on a probability that the second KV pair data will be read subsequent to the first KV pair data. For exemplary purposes, aspects of the storage system 100 of FIG. 1 may be referenced herein.
  • At block 452, a first KV pair data is read by the host device 104. At block 454, metadata of the key associated with the first KV pair data is analyzed and the next key (and corresponding KV pair data) to be retrieved using RLA is derived. For example, the metadata may include a pointer linking the metadata to metadata of the next key based on a probability that the next key will be read next. The analyzing and retrieving may be completed in a hardware component of the controller 108. At block 456, the controller 108 determines if the data storage device 106 is completing background operations or if a time since last update has reached or exceeded a threshold. If the data storage device 106 is not completing background operations or the time since last update has not reached or exceeded the threshold at block 456, then method 450 returns to block 452. However, if the data storage device 106 is completing background operations or the time since last update has reached or exceeded the threshold at block 406, then the controller 108 updates the cluster relationship table based on an order of reads of KV pair data between the updating at block 458. It is to be understood that other mechanisms of updating the cluster relationship table is contemplated and may be applicable to the described embodiments.
  • By grouping similar KV pair data together based on the keys of the KV pair data and determining a probability that a certain KV pair data will be retrieved subsequent to retrieving a corresponding KV pair data, read look ahead may be utilized by the controller and quality of service of random value read workloads of KV data storage devices may be improved.
  • In one embodiment, a data storage device includes a memory device and a controller coupled to the memory device. The controller is configured to program key value (KV) pair data to the memory device, where the KV pair data includes a key and a value, analyze the key, and generate metadata based on the analyzing.
  • The analyzing occurs when the controller is performing background operations. The controller is further configured to classify the key as a type selected from a group consisting of words, American Standard Code for Information Interchange (ASCII) characters, and mathematical expressions. The controller is further configured to aggregate and order one or more keys in a linked list. A linked list links a first key to a second key. The aggregating and the ordering is based on the classifying. The linked list is stored in random access memory (RAM). The generated metadata comprises at least one of a length of the key, a histogram of elements of the key, and a time since the key was read. The controller is further configured to generate a metadata index based on the analyzing. The metadata index indicates a similarity between the key and another key. A high similarity indicates a higher chance for the key and the another key to be read subsequently and a lower similarity indicates a lower chance for the key and the another key to be read subsequently. The controller is further configured to cluster two or more generated metadata based on the indicated similarity. The clustering occurs during background operations and after a threshold period of time has elapsed. The controller is further configured to receive a read command for the KV pair data, analyze the generated metadata of the KV pair data, and generate a predicted next key. The predicted next key corresponds to the another key having the high similarity to the key. The controller is further configured to use read look ahead (RLA) to read a predicted next KV pair data based on the predicted next key.
  • In another embodiment, a data storage device includes a memory device and a controller coupled to the memory device. The controller is configured to receive a read command for key value (KV) pair data stored in the memory device, where the KV pair data includes a key and a value, retrieve metadata corresponding to the KV pair data, and determine a next KV pair data to be read using a cluster relation table based on the retrieved metadata.
  • The controller is further configured to perform read look ahead (RLA) using the determining. The cluster relation table stores a similarity matrix comparing first metadata of a first key of a first KV pair data to second metadata of a second key of a second KV pair data. Each entry of the similarity matrix stores a metadata index. A metadata index greater than a predetermined threshold indicates that a corresponding KV pair data has a high probability of being read next and a lower metadata index lower than the predetermined threshold indicates that the corresponding KV pair data has a low probability to be read next. The next KV pair data to be read corresponds to an entry corresponding to the KV pair data having a highest metadata index. The controller is further configured to update the cluster relation table after each KV pair data read.
  • In another embodiment, a data storage device includes memory means and a controller coupled to the memory means. The controller is configured to generate metadata for key value (KV) pair data, assign a metadata index comparing a similarity of a first metadata of a first KV pair data to one or more of another metadata, where each of the one or more of the another metadata is associated with a different KV pair data than the first KV pair data, receive a read command to read the KV pair data, and retrieve a predicted next KV pair data based on the metadata index.
  • The retrieving includes using read look ahead (RLA). The retrieved predicted next KV pair data is stored in the memory means.
  • While the foregoing is directed to embodiments of the present disclosure, other and further embodiments of the disclosure may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.

Claims (20)

1. (canceled)
2. The data storage device of claim 4, wherein the analyzing occurs when the controller is performing background operations.
3. (canceled)
4. A data storage device, comprising:
a memory device; and
a controller coupled to the memory device, wherein the controller is configured to:
program key value (KV) pair data to the memory device, wherein the KV pair data includes a key and a value;
analyze the key; and
generate metadata based on the analyzing, wherein the controller is further configured to classify the key as a type selected from a group consisting of words, American Standard Code for Information Interchange (ASCII) characters, and mathematical expressions, wherein the controller is further configured to aggregate and order one or more keys in a linked list, wherein a linked list links a first key to a second key, and wherein the aggregating and the ordering is based on the classifying.
5. The data storage device of claim 4, wherein the linked list is stored in random access memory (RAM).
6. The data storage device of claim 4, wherein the generated metadata comprises at least one of a length of the key, a histogram of elements of the key, and a time since the key was read.
7. The data storage device of claim 4, wherein the controller is further configured to generate a metadata index based on the analyzing.
8. The data storage device of claim 7, wherein the metadata index indicates a similarity between the key and another key, and wherein a similarity greater than or equal to 0.5 indicates a higher chance for the key and the another key to be read subsequently as compared to not being read subsequently and a similarity less than 0.5 indicates a lower chance for the key and the another key to be read subsequently as compared to being read subsequently.
9. The data storage device of claim 8, wherein the controller is further configured to cluster two or more generated metadata based on the indicated similarity.
10. The data storage device of claim 9, wherein the clustering occurs during background operations and after a threshold period of time has elapsed.
11. The data storage device of claim 8, wherein the controller is further configured to:
receive a read command for the KV pair data;
analyze the generated metadata of the KV pair data; and
generate a predicted next key, wherein the predicted next key corresponds to the another key.
12. The data storage device of claim 11, wherein the controller is further configured to use read look ahead (RLA) to read a predicted next KV pair data based on the predicted next key.
13. A data storage device, comprising:
a memory device; and
a controller coupled to the memory device, wherein the controller is configured to:
receive a read command for key value (KV) pair data stored in the memory device, wherein the KV pair data includes a key and a value;
classify the key as a type selected from a group consisting of words, American Standard Code for Information Interchange (ASCII) characters, and mathematical expressions;
aggregate and order one or more keys in a linked list, wherein a linked list links a first key to a second key, and wherein the aggregating and the ordering is based on the classifying;
retrieve metadata corresponding to the KV pair data; and
determine a next KV pair data to be read using a cluster relation table based on the retrieved metadata.
14. The data storage device of claim 13, wherein the controller is further configured to perform read look ahead (RLA) using the determining.
15. The data storage device of claim 13, wherein the cluster relation table stores a similarity matrix comparing first metadata of a first key of a first KV pair data to second metadata of a second key of a second KV pair data.
16. The data storage device of claim 15, wherein each entry of the similarity matrix stores a metadata index, and wherein a metadata index greater than a predetermined threshold indicates that a corresponding KV pair data has a higher probability of being read next as compared to not being read next and a lower metadata index lower than the predetermined threshold indicates that the corresponding KV pair data has a lower probability to be read next as compared to being read next.
17. The data storage device of claim 16, wherein the next KV pair data to be read corresponds to an entry corresponding to the KV pair data having a highest metadata index.
18. The data storage device of claim 13, wherein the controller is further configured to update the cluster relation table after each KV pair data read.
19. A data storage device, comprising:
memory means; and
a controller coupled to the memory means, wherein the controller is configured to:
generate metadata for key value (KV) pair data;
assign a metadata index comparing a similarity of a first metadata of a first KV pair data to one or more of another metadata, wherein each of the one or more of the another metadata is associated with a different KV pair data than the first KV pair data;
classify a key as a type selected from a group consisting of words, American Standard Code for Information Interchange (ASCII) characters, and mathematical expressions;
aggregate and order one or more keys in a linked list, wherein a linked list links a first key to a second key, and wherein the aggregating and the ordering is based on the classifying;
receive a read command to read the KV pair data; and
retrieve a predicted next KV pair data based on the metadata index.
20. The data storage device of claim 19, wherein the retrieving comprises using read look ahead (RLA), and wherein the retrieved predicted next KV pair data is stored in the memory means.
US17/829,481 2022-06-01 2022-06-01 Read look ahead based on key analysis in key value data storage devices Active US11853562B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/829,481 US11853562B1 (en) 2022-06-01 2022-06-01 Read look ahead based on key analysis in key value data storage devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US17/829,481 US11853562B1 (en) 2022-06-01 2022-06-01 Read look ahead based on key analysis in key value data storage devices

Publications (2)

Publication Number Publication Date
US20230393761A1 true US20230393761A1 (en) 2023-12-07
US11853562B1 US11853562B1 (en) 2023-12-26

Family

ID=88976512

Family Applications (1)

Application Number Title Priority Date Filing Date
US17/829,481 Active US11853562B1 (en) 2022-06-01 2022-06-01 Read look ahead based on key analysis in key value data storage devices

Country Status (1)

Country Link
US (1) US11853562B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20240078032A1 (en) * 2022-09-06 2024-03-07 Western Digital Technologies, Inc. Metadata Management In Key Value Data Storage Device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130198198A1 (en) * 2012-01-31 2013-08-01 Fujitsu Limited Generating method, generating system, and recording medium
US20190163616A1 (en) * 2017-11-30 2019-05-30 Vmware, Inc. Automated-application-release-management subsystem that provides efficient code-change check-in
US20210117384A1 (en) * 2019-10-16 2021-04-22 Microsoft Technology Licensing, Llc Prefetching based on historical use and real-time signals

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130198198A1 (en) * 2012-01-31 2013-08-01 Fujitsu Limited Generating method, generating system, and recording medium
US20190163616A1 (en) * 2017-11-30 2019-05-30 Vmware, Inc. Automated-application-release-management subsystem that provides efficient code-change check-in
US20210117384A1 (en) * 2019-10-16 2021-04-22 Microsoft Technology Licensing, Llc Prefetching based on historical use and real-time signals

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20240078032A1 (en) * 2022-09-06 2024-03-07 Western Digital Technologies, Inc. Metadata Management In Key Value Data Storage Device
US12182439B2 (en) * 2022-09-06 2024-12-31 SanDisk Technologies, Inc. Metadata management in key value data storage device

Also Published As

Publication number Publication date
US11853562B1 (en) 2023-12-26

Similar Documents

Publication Publication Date Title
US11640253B2 (en) Method to use flat relink table in HMB
WO2023129205A1 (en) Variable length ecc code according to value length in nvme key value pair devices
KR102589609B1 (en) Snapshot management in partitioned storage
US11061598B2 (en) Optimized handling of multiple copies in storage management
US11853562B1 (en) Read look ahead based on key analysis in key value data storage devices
US11853563B1 (en) Key value data storage device with tiers
US11853607B2 (en) Optimizing flash memory utilization for NVMe KV pair storage
US11966630B2 (en) Key-to-physical table optimization for key value data storage devices
US11947830B2 (en) Key value data placement according to expected reads
US12182439B2 (en) Metadata management in key value data storage device
US12001719B2 (en) Storage media based search function for key value data storage devices
US11853564B1 (en) Key value data storage device with improved utilization for short key value pairs
US20250117152A1 (en) Key-group based data management in kv ssd
US11645009B2 (en) Data storage with improved read parallelism
US11894046B2 (en) Alignment optimization of key value pair data storage
US11989431B2 (en) Write updates sorting during BKOPS idle
US11853160B2 (en) Variable length ECC code according to data entropy in NVMe key value pair devices
US12277345B2 (en) Scatter gather list adaptive bucketing
US20250036814A1 (en) Enhanced end to end protection in key value storage devices
US11630592B2 (en) Data storage device database management architecture
US20240289268A1 (en) Efficient consolidation for two layer ftl
US20250077421A1 (en) Optimization of an Active Range of mSets Stored in a Compressed Address Table
US20240143512A1 (en) Write buffer linking for easy cache reads

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: WESTERN DIGITAL TECHNOLOGIES, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BAZARSKY, ALEXANDER;AVRAHAM, DAVID;ZAMIR, RAN;SIGNING DATES FROM 20220519 TO 20220522;REEL/FRAME:060079/0928

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., ILLINOIS

Free format text: PATENT COLLATERAL AGREEMENT - DDTL LOAN AGREEMENT;ASSIGNOR:WESTERN DIGITAL TECHNOLOGIES, INC.;REEL/FRAME:067045/0156

Effective date: 20230818

Owner name: JPMORGAN CHASE BANK, N.A., ILLINOIS

Free format text: PATENT COLLATERAL AGREEMENT - A&R LOAN AGREEMENT;ASSIGNOR:WESTERN DIGITAL TECHNOLOGIES, INC.;REEL/FRAME:064715/0001

Effective date: 20230818

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: SANDISK TECHNOLOGIES, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WESTERN DIGITAL TECHNOLOGIES, INC.;REEL/FRAME:067567/0682

Effective date: 20240503

AS Assignment

Owner name: SANDISK TECHNOLOGIES, INC., CALIFORNIA

Free format text: CHANGE OF NAME;ASSIGNOR:SANDISK TECHNOLOGIES, INC.;REEL/FRAME:067982/0032

Effective date: 20240621

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., AS THE AGENT, ILLINOIS

Free format text: PATENT COLLATERAL AGREEMENT;ASSIGNOR:SANDISK TECHNOLOGIES, INC.;REEL/FRAME:068762/0494

Effective date: 20240820

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, ILLINOIS

Free format text: SECURITY AGREEMENT;ASSIGNOR:SANDISK TECHNOLOGIES, INC.;REEL/FRAME:071050/0001

Effective date: 20250424

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载