120/MAPLD 2004 Maintaining Data Integrity in EEPROM’s Ed Patnaude Maxwell Technologies San Diego, Ca.

Slides:



Advertisements
Similar presentations
Giuseppe De Robertis - INFN Sez. di Bari 1 SEU – SET test structures.
Advertisements

CS 346 – April 4 Mass storage –Disk formatting –Managing swap space –RAID Commitment –Please finish chapter 12.
Chapter 16: Recovery System
Hamming Code.
Computer Engineering II
CSCI 4717/5717 Computer Architecture
+ CS 325: CS Hardware and Software Organization and Architecture Internal Memory.
Fault-Tolerant Systems Design Part 1.
Ch 2.7 Error Detection & Correction CS-147 Tu Hoang.
0 秘 Type of NAND FLASH Discuss the Differences between Flash NAND Technologies: SLC :Single Level Chip MLC: Multi Level Chip TLC: Tri Level Chip Discuss:
9/20/6Lecture 3 - Instruction Set - Al1 The Hardware Interface.
Tool removed during cycle Fault #2 Conditions for setting Tool cocked prox switch goes open during cycle AND force on load cell drops below limit in fault.
1 CSIS 7102 Spring 2004 Lecture 8: Recovery (overview) Dr. King-Ip Lin.
CSE 461: Error Detection and Correction. Next Topic  Error detection and correction  Focus: How do we detect and correct messages that are garbled during.
System integrity The term system integrity has the following meanings: That condition of a system where in its specified operational and technical parameters.
Maintaining Data Integrity in Programmable Logic in Atmospheric Environments through Error Detection Joel Seely Technical Marketing Manager Military &
Petry1 MAPLD 2005/ MAPLD International Conference Washington, D.C. The Impact of Silicon Etch Dislocations on EEPROM Cell Reliability Presented.
Data Link Layer – Part 1 V.T.Raja Oregon State University.
Data Transmission Most digital messages are longer than just a few bits. It is neither practical nor economic to transfer all bits of a long message simultaneously.
1 Storage (cont’d) Disk scheduling Reducing seek time (cont’d) Reducing rotational latency RAIDs.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Lesson 12 – NETWORK SERVERS Distinguish between servers and workstations. Choose servers for Windows NT and Netware. Maintain and troubleshoot servers.
Yinglei Wang, Wing-kei Yu, Sarah Q. Xu, Edwin Kan, and G. Edward Suh Cornell University Tuan Tran.
Unit 1 Protocols Learning Objectives: Understand the need to detect and correct errors in data transmission.
Data Transmission Most digital messages are longer than just a few bits. It is neither practical nor economical to transfer all bits of a long message.
Design of SCS Architecture, Control and Fault Handling.
Stuart Hansen University of Wisconsin - Parkside.
E.R.P.S University of Palestine. Risks in an ERP environment : The use of ERP systems clearly introduces additional risks into the system environment.
Khaled A. Al-Utaibi Memory Devices Khaled A. Al-Utaibi
Redundant Array of Independent Disks
Chapter 3 Memory Management: Virtual Memory
12004 MAPLD: 141Buchner Single Event Effects Testing of the Atmel IEEE1355 Protocol Chip Stephen Buchner 1, Mark Walter 2, Moses McCall 3 and Christian.
CSI-09 COMMUNICATION TECHNOLOGY FAULT TOLERANCE AUTHOR: V.V. SUBRAHMANYAM.
Practical Digital Design Considerations Part 1 Last Mod: January 2008 ©Paul R. Godin.
The Basic Input/Output System Unit objectives: Access the BIOS setup utility, change hardware configuration values, and research BIOS updates Explain the.
Presenter : Ching-Hua Huang 2013/9/16 Visibility Enhancement for Silicon Debug Cited count : 62 Yu-Chin Hsu; Furshing Tsai; Wells Jong; Ying-Tsai Chang.
Presented by Anthony B. Sanders NASA/GSFC at 2005 MAPLD Conference, Washington, DC #196 1 ALTERA STRATIX TM EP1S25 FIELD-PROGRAMMABLE GATE ARRAY (FPGA)
2010 IEEE ICECS - Athens, Greece, December1 Using Flash memories as SIMO channels for extending the lifetime of Solid-State Drives Maria Varsamou.
Chapter 1: Digital Computers and Information Illustration at beginning of each Chapter Base 10 Binary Base 2 Octal Base 8 Hex bas
Chapter 3 Internal Memory. Objectives  To describe the types of memory used for the main memory  To discuss about errors and error corrections in the.
Fault-Tolerant Systems Design Part 1.
Synthesis Of Fault Tolerant Circuits For FSMs & RAMs Rajiv Garg Pradish Mathews Darren Zacher.
+ CS 325: CS Hardware and Software Organization and Architecture Memory Organization.
AS Computing Data Transmission and Networks. Transmission error Detecting errors in data transmission is very important for data integrity. There are.
S4525A Peripherals & Enhanced FLASH 1 © 1999 Microchip Technology Incorporated. All Rights Reserved. S4525A Peripherals & Enhanced FLASH 1 Peripherals.
RL78 Code & Dataflash.
Memory Cell Operation.
Fault-Tolerant Systems Design Part 1.
PLC ARCHITECTURE - CPU by Dr. Amin Danial Asham.
CE Operating Systems Lecture 2 Low level hardware support for operating systems.
CE Operating Systems Lecture 2 Low level hardware support for operating systems.
Error-Detecting and Error-Correcting Codes
Digital Circuits Introduction Memory information storage a collection of cells store binary information RAM – Random-Access Memory read operation.
Digital Design Lecture 13
Data Link Layer 1. 2 Single-bit error 3 Multiple-bit error 4.
Computer Architecture Chapter (5): Internal Memory
Election Assistance Commission 1 TGDC Meeting High Level VVSG Requirements: What do they look like? February, 09, United States.
Chapter 5 - Internal Memory 5.1 Semiconductor Main Memory 5.2 Error Correction 5.3 Advanced DRAM Organization.
Memory and Programmable Logic
Simple Parity Check The simplest form of error detection is the parity check used with ASCII codes, originally on asynchronous modem links Each 7 bit ASCII.
Recap DRAM Read Cycle DRAM Write Cycle FAST Page Access Mode
Refer to Chapter 5 in the reference book
Chapter 2 – Computer hardware
Fault Tolerance In Operating System
Maintaining Data Integrity in Programmable Logic in Atmospheric Environments through Error Detection Joel Seely Technical Marketing Manager Military &
Flash EEPROM Emulation Concepts
Sequential circuits and Digital System Reliability
BIC 10503: COMPUTER ARCHITECTURE
Data Transmission Most digital messages are longer than just a few bits. It is neither practical nor economical to transfer all bits of a long message.
Error Detection and Correction
Presentation transcript:

120/MAPLD 2004 Maintaining Data Integrity in EEPROM’s Ed Patnaude Maxwell Technologies San Diego, Ca

Patnaude 2 120/MAPLD 2004 Contents EEPROM Technology Sources of Data Corruption Maintaining Data Integrity Summary

Patnaude 3 120/MAPLD 2004 EEPROM Technology Most EEPROM’s utilize some variation of the “Floating Gate Technology” A positively charged gate is read as a logic 0.

Patnaude 4 120/MAPLD 2004 Sources of Data Corruption Software Errors Insufficient Hardware Protection Programming Issues

Patnaude 5 120/MAPLD 2004 Sources of Data Corruption Software Errors Inadvertent Writes Improper Timing / Buss Contention Programming Across Page Boundaries

Patnaude 6 120/MAPLD 2004 Sources of Data Corruption Insufficient Hardware Protection Uncontrolled Power On/Off Uncontrolled Inputs Excessive Power Supply Noise Data Buss Contention No Hardware Write Protection Implemented

Patnaude 7 120/MAPLD 2004 Sources of Data Corruption Programming Issues Setting Write Protect, or Reset, active during a write cycle will halt programming resulting in corrupt data. Insufficient supply voltage, during a program cycle, can result in incorrect data being stored. Exceeding the manufactures write cycle endurance specification can cause permanent damage to the memory cells leaving them un-programmable.

Patnaude 8 120/MAPLD 2004 Maintaining Data Integrity Hardware Protection Software Protection Proper Power Cycling Error Detection and Correction (EDAC) Power Supply Supervisory Circuitry Contingency Plan

Patnaude 9 120/MAPLD 2004 Maintaining Data Integrity Hardware Protection Most EEPROM’s have a RESET or Write Protect input, when set active, all erase/writes operations are blocked.

Patnaude /MAPLD 2004 Maintaining Data Integrity Software Data Protection (SDP) SDP locks the memory preventing unintentional erase/writes from occurring. Normally implemented using the JEDEC Standard Algorithm SDP will only protect the memory contents when the supply voltage is within the normal operating range.

Patnaude /MAPLD 2004 Maintaining Data Integrity Proper Power Cycling Allow Vcc to reach proper operating level before initiating any Reads or Writes to the EEPROM. Enable the EEPROM Hardware Write Protection, or Reset, prior to power down. Do not remove power while a write cycle is in process.

Patnaude /MAPLD 2004 Maintaining Data Integrity Error Detection and Protection Parity Bits Checksum Cyclic Redundancy Code Error Correction Codes Hamming Code Reed-Solomon

Patnaude /MAPLD 2004 Maintaining Data Integrity Power Supervisory Circuitry Monitor Supply Voltages and provide a RESET signal when the voltage drops below a pre-described level

Patnaude /MAPLD 2004 Maintaining Data Integrity Have a Contingency Plan Always verify data after a program cycle to assure an error has not occurred and re-program if necessary. Data retention time can be increased by periodically rewriting the data to the EEPROM. Have the ability to relocate bad data bytes. Use Redundancy if at all possible.

Patnaude /MAPLD 2004 Summary A robust hardware and software design, along with a contingency plan should corruption occur, can greatly minimize the risk of system failure due to data corruption in a EEPROM.