Network storage products with options for external processing

ABSTRACT

A storage product having: a network interface operable on a computer network; a bus connector adapted to be connected to a computer bus; a storage device having a storage capacity accessible through network storage services provided over the network interface; and a processing device configured to at least generate storage access messages from incoming packets received by the network interface from the computer network. The storage product is operable in a standalone mode when no local host system is connected to the bus connector to control the storage product and operable in a slave mode when a local host system is connected to the bus connector to process a portion of the storage access messages.

TECHNICAL FIELD

At least some embodiments disclosed herein relate to memory systems ingeneral, and more particularly, but not limited to memory systemsconfigured to service data access requests received over computernetworks.

BACKGROUND

A memory sub-system can include one or more memory devices that storedata. The memory devices can be, for example, non-volatile memorydevices and volatile memory devices. In general, a host system canutilize a memory sub-system to store data at the memory devices and toretrieve data from the memory devices.

BRIEF DESCRIPTION OF THE DRAWINGS

The embodiments are illustrated by way of example and not limitation inthe figures of the accompanying drawings in which like referencesindicate similar elements.

FIG. 1 illustrates an example computing system having a memorysub-system in accordance with some embodiments of the presentdisclosure.

FIG. 2 shows different paths for processing control messages and datamessages in a memory sub-system according to one embodiment.

FIG. 3 shows a configuration of control messages and data messages forprocessing in a memory sub-system according to one embodiment.

FIG. 4 shows a network-ready storage product configured to have anexternal processor selectively processing messages for the storageproduct according to one embodiment.

FIG. 5 illustrates a technique to configure a storage product to routemessages for processing on different paths according to one embodiment.

FIG. 6 shows a storage application mapping messages received from acomputer network into messages to be executed in a storage product toimplement network storage services according to one embodiment.

FIG. 7 illustrates a storage application programmed to implement amessage using multiple messages to a storage product according to oneembodiment.

FIG. 8 shows a storage application programmed to generate responses fortransmission by a storage product according to one embodiment.

FIG. 9 shows a storage product capable of operating standalone accordingto one embodiment.

FIG. 10 shows a storage product operable to switch between processingselected messages internally or externally according to one embodiment.

FIG. 11 shows a storage product having a storage device, a network port,and a bus connector to an external processor according to oneembodiment.

FIG. 12 shows a storage product configured on a printed circuit boardaccording to one embodiment.

FIG. 13 shows a method to process network messages to implement networkstorage services via a storage product and a storage application runninginside or outside of the storage product according to one embodiment.

DETAILED DESCRIPTION

At least some aspects of the present disclosure are directed to a memorysub-system configured with different processing paths for controlmessages and data messages. Examples of storage devices and memorymodules are described below in conjunction with FIG. 1 . In general, ahost system can utilize a memory sub-system that includes one or morecomponents, such as memory devices that store data. The host system canprovide data to be stored at the memory sub-system and can request datato be retrieved from the memory sub-system.

A conventional network-attached storage device is typically configuredas a computing device having a central processing unit (CPU), arandom-access memory, a network interface, and one or more memorydevices to provide a storage capacity accessible over a computernetwork. The CPU is typically configured to run an operating systemand/or a storage application to provide storage services in response tocommunications received in the network interface. Communicationsreceived in the network interface from a remote host system can includecontrol messages and data messages. The messages are generated by theremote host system to manage and/or access the storage capacity of thenetwork-attached storage device. The instructions executed in the CPUcan be programmed to process the control messages and the data messagesas input from the remote host system. In response to the messages, theCPU is configured via the instructions to authenticate users, manageaccess privileges and security settings, authorize access, manage thestorage capacity, store data into the memory devices, retrieve data fromthe memory devices, etc.

For example, the control messages and the data messages received via thenetwork interface of the conventional network-attached storage deviceare buffered in the random-access memory. The CPU is configured to fetchthe messages, process the messages, and send corresponding messages to alocal storage device, such as a solid-state drive. The solid-state drivecan receive messages, execute the commands in the messages to storedata, retrieve data from the memory devices, send retrieved data to theCPU, etc. The CPU can send the retrieved data to the network interfacefor transmission through a computer network to the remote host system.

Thus, in the conventional network-attached storage device, messagesreceived in the network interface, including control messages and datamessages, flow from the network interface through the CPU towards thestorage capacity. Access responses, such as data retrieved in responseto the read requests/commands, flow through the CPU for transmission bythe network interface into the computer network.

However, it is inefficient to flow data messages through the CPU; andthe CPU can be a bottleneck in processing power and communicationbandwidth in scaling up storage capacity.

At least some aspects of the present disclosure address the above andother deficiencies by using different processing paths for controlmessages and data messages.

For example, a computing device providing network storage services canbe configured with a storage device (e.g., a solid-state drive (SSD), aflash memory device, a ball grid array (BGA) SSD), a processing device(e.g., a microprocessor, a CPU), and a network interface connected to aremote host system as a storage client. The storage client (e.g., thenetwork interface receiving messages from the remote host system) canwrite data into the storage device and retrieve data from the storagedevice. The storage client is configured to provide data messages to thestorage device without going through the processing device. Controlmessages, such as administrative commands and management commands, arerouted through the processing device. Instructions executed in theprocessing device are configured/programmed to process the controlmessages to exercise access control, to exercise security control, andto perform administrative operations.

For example, to reduce the burden on the CPU and improve efficiency, thecomputing device can be configured with different processing paths forcertain control messages and other messages.

For example, the control messages on a separate processing path caninclude administrative and management commands used to create anamespace in the storage capacity, to map the namespace to a client, toauthenticate users, to set security attributes (e.g., read onlypermitted vs. both read and write permitted), to provide authorizationto which operation is allowed, to manage configuration changes, etc.Such control messages (e.g., for administrative and managementfunctions) can be configured to flow through the processing device; andthe processing device is configured via programmed instructions and/orother data to process the control message. Instructions executed in theprocessing device can be programmed to perform access control,administrative operations, management operations, etc., withoutoperating on the data to be stored into and/or the data being retrievedfrom the storage device. Other messages, such as data messagescontaining write commands and data to be written into the storage deviceaccording to the write commands, read commands, data retrieved inresponse to the read commands, etc., can be configured to becommunicated between the storage device and the storage client withoutgoing through the processing device.

As a result, the power consumption of the computing device can bereduced; the requirement on the communication bandwidth through theprocessing device (e.g., a microprocessor, a CPU) can be reduced; andthe requirement on the computing power on the processing device can bereduced.

In contrast, a traditional network-attached storage device is configuredto flow data messages through a CPU. In typical usages, administrativeand management commands are only a small portion of messages, the datamessages can be the majority of the messages going through in thenetwork interface. Thus, the processing of the data messages by the CPUin the traditional network-attached storage device can place a very highweight on the CPU (e.g., lot of commands to process) and therandom-access memory (e.g., lot of data buffering).

When data messages are communicated from a storage client to a storagedevice without going through the processing device (e.g., amicroprocessor, a CPU) of the computing device, according to the presentdisclosure, the processing device is tasked to process a very smallportion of messages (e.g., administrative and management commands, whichare less than 0.1% of total commands). Other messages (e.g., more than99.99% of total commands), including both command parts and data parts,can be routed to the storage device without going through the processingdevice. As a result, a less powerful processing device can be used tocontrol and manage the storage; and the storage capacity can be easilyscaled up by the processing device controlling multiple units, eachcontaining a network interface and one or more local storage devices, asfurther discussed below.

FIG. 1 illustrates an example computing system 100 that includes amemory sub-system 110 in accordance with some embodiments of the presentdisclosure. The memory sub-system 110 can include computer-readablestorage media, such as one or more volatile memory devices (e.g., memorydevice 140), one or more non-volatile memory devices (e.g., memorydevice 130), or a combination of such.

In FIG. 1 , the memory sub-system 110 is configured as a product ofmanufacture, usable as a component installed in a computing device. Thememory sub-system 110 has a network interface 113 controlled by a memorysub-system controller 115 to communicate with a remote host system 121over a computer network 114.

For example, the remote host system 121 can be configured with aprocessing device 128 (e.g., a microprocessor, a CPU), a memorycontroller 126, a network interface 111, and other components (e.g.,random-access memory, sensors, and/or user interfaces). Instructionsexecuted in the processing device 128 can be programmed to use thenetwork interface 111 to access the storage capacity of the memorysub-system 110 using a storage protocol, such as internet small computersystems interface (iSCSI), fibre channel (FC), fibre channel overethernet (FCoE), network file system (NFS), and server message block(SMB), or another protocol.

The memory sub-system 110 further includes a host interface 112 for acomputer memory bus or a computer peripheral bus 125 connectable to alocal host system 120 having a memory controller 116 and a processingdevice 118.

For example, instructions executed in the local host system 120 can beprogrammed to control, through the bus 125, the memory sub-system 110according to serial advanced technology attachment (SATA), peripheralcomponent interconnect express (PCIe), universal serial bus (USB), fibrechannel (FC), serial attached SCSI (SAS), double data rate (DDR), smallcomputer system interface (SCSI), open NAND flash interface, low powerdouble data rate (LPDDR), non-volatile memory (NVM) express (NVMe),compute express link (CXL), or another technique.

Thus, a combination of the local host system 120 and the memorysub-system 110 can be used as a network-attached data storage deviceproviding storage services to the remote host system 121 through thenetwork interface 113 using a storage capacity of the memory devices130, . . . , 140.

For example, the processing device 118 can be a microprocessorconfigured as a CPU of a computing device functioning a network-attacheddata storage device. The local host system 120 can be connected to oneor more of the memory sub-systems (e.g., 110) via a peripheral bus 125.To scale up the storage capacity of the network-attached data storagedevice, more memory sub-systems (e.g., 110) can be connected to thelocal host system 120, with their respective network interfaces (e.g.,113) being connected to the computer network 114 and/or other computernetworks.

Although FIG. 1 illustrates an example of one remote host system 121connected to the network interface 113, multiple remote host systems(e.g., 121) can be configured on the computer network 114 to access thestorage services of the network-attached storage device. Access to thestorage services can be controlled via user credentials, hostattributes, network addresses, and/or security settings, etc.

To reduce the burden on the local host system 120, at least a portion ofcontrol messages, among the messages received via the network interface113 from the computer network 114 (e.g., from the remote host system121), can be separated in the memory sub-system 110 from other types ofmessages, such as data messages. The memory sub-system 110 is configuredto provide the control messages through the host interface 112 to thelocal host system 120 for processing without providing other messages,such as data messages, to the host interface 112, as discussed furtherbelow.

For example, network packets received in the network interface 113 canbe processed by the memory sub-system controller 115 to recover orgenerate control messages and data messages. The memory sub-systemcontroller 115 can include local memory 119 (e.g., random-access memory)and a processing device 117 configured to at least process the networkpackets from the network interface 113. The memory sub-system controller115 can buffer the control messages in the local memory 119 forprocessing by the local host system 120; and the local host system 120can place processing results in the local memory 119 for execution. Theexecution of the control messages processed by the local host system 120can generate meta data 123 that control the storage operations performedfor data messages. The controller 115 can be configured to execute thecommands of the data messages based on the meta 123 to store data intothe memory devices 130, . . . , 140, to retrieve data from the memorydevices 130, . . . , 140, and to transmit the retrieved data to theremote host system 121 using the network interface 113.

In some implementations, a memory device 130 can be a solid-state drive(e.g., a BGA SSD). Thus, the memory sub-system controller 115 canprocess and/or forward commands as processed by the local host system120 and other commands to operate the memory device 130.

In some implementations, a portion of the memory sub-system controller115 and at least a portion of the memory devices 130, . . . , 140 areconfigured as a conventional storage device (e.g., SSD); and a remainingportion of the memory sub-system controller 115 can forward commands tothe storage device for execution. Thus, a conventional storage device(e.g., SSD) can be used as a component or a local storage device inimplementation of the memory sub-system 110.

In some implementations, multiple portions of the memory sub-systemcontroller 115 and the memory devices 130, . . . , 140 can be configuredas multiple conventional storage devices (e.g., SSDs). In otherimplementations, the processing device 117 is shared by the memorydevices 130, . . . , 140 without being configured according to aconventional storage device (e.g., SSD). Thus, the configuration of thememory sub-system controller 115 and memory devices 130, . . . , 140 arenot limited to a particular connectivity and/or topology.

Bypassing the local host system 120 in the processing of the datamessages greatly reduces the workloads of the local host system 120.Thus, the local host system 120 can be used to control multiple memorysub-systems (e.g., 110) in expanding storage capacity.

Since the memory sub-system 110, as a product, is configured tospecifically service the storage access requests received via thenetwork interface 113, the processing and communication bandwidth withinthe memory sub-system 110 can be designed and tailored according to thecommunication bandwidth of the network interface 113. Products similarto the memory sub-system 110 can be used as building blocks of a networkstorage facility controlled by the local host system 120. The capacityof the network storage facility can be easily scaled up via connectingmore units to the computer network 114. Since the workload of the localhost system 120 and communications to the local host system 120 are verylow for controlling each memory sub-system 110, many memory sub-systems(e.g., 110) can be connected to the local host system 120 to scale upthe capacity of the network storage facility without being limited bythe communication bandwidth and/or processing power of an availablelocal host system 120.

FIG. 2 shows different paths for processing control messages and datamessages in a memory sub-system according to one embodiment.

For example, the processing paths of FIG. 2 can be implemented using amemory sub-system 110 of FIG. 1 and/or the computing system 100 of FIG.1 .

In FIG. 2 , a remote host system 121 is connected (e.g., over a computernetwork 114 as in FIG. 1 ) to the network interface 113 of the memorysub-system 110. The remote host system 121 can store host data 131 intothe storage capacity 143 of the memory sub-system 110, and retrieve thehost data 131 back from the memory sub-system 110, using a storageprotocol, such as internet small computer systems interface (iSCSI),fibre channel (FC), fibre channel over ethernet (FCoE), network filesystem (NFS), and server message block (SMB), or another protocol.

Using the storage protocol, the remote host system 121 can send controlmessages 133 to the memory sub-system 110 to manage and/or administratethe storage capacity. For example, the host system can sign into thememory sub-system to start a session and/or a read/write operation. Thecontrol message 133 can include a command to generate a namespace in thestorage capacity 143, to create, delete, open, or close a file in thenamespace, to set security attributes (e.g., which files are readableand/or writable by which users), etc.

The control messages 133 received via the network interface 113 areforwarded to the host interface 112 connected to the local host system120 for processing. Processed control messages 137 are provided to thecontroller 115 of the memory sub-system 110. Execution ofcommands/requests in the processed control messages 137 can generatemeta data 123 that controls the data storage operations of the memorysub-system 110.

Some of the control messages 133 can be used to generate access controlconfiguration data 141, such as identifications of user accounts, accessprivileges, user credentials, etc.

Optionally, the local host system 120 connected to the memory sub-system110 can provide a user interface. An administrator can use the userinterface to generate control messages 137 to perform administrativeand/or management operations, such as creating accounts, record orchange access credentials, generate namespaces, etc. At least a portionof the access control configuration data 141 can be generated via theuser interface.

The access control configuration data 141 can be stored in part in thememory sub-system 110, or in another storage device connected to thelocal host system 120.

Subsequently, when the remote host system 121 sends a control message133 for authentication or access, the local host system 120 can receivethe control message 133 and use the access control configuration data141 to determine whether to permit the access. If the request ispermitted, the local host system 120 can send a control message 137 tothe controller 115 of the memory sub-system to set up access. Forexample, in response to the control message 137, the controller 115 canset up a channel to the storage capacity. For example, the channel caninclude one or more queues in the local memory 119 for the read/writeoperations permitted by the control message 137. In someimplementations, the channel can further include a portion of the metadata 123 generated to facilitate the read/write operations (e.g., foraddress translation).

To write host data 131 into the memory sub-system 110, the remote hostsystem 121 can transmit a data message 135 containing a write commandand data to be stored. In response to the data message 135, thecontroller 115 can write the received data into the storage capacityusing the channel set up for the operation of the remote host system121. Thus, the data message 135 is not routed to the local host system120. Bypassing the local host system 120 in routing the data message 135prevents the local host system 120 from accessing the host data 131 inthe data message 135. Thus, the security for the host data 131 isimproved.

To access the host data 131 stored in the memory sub-system 110, theremote host system 121 can send a data message 135 containing a readcommand. In response to the read command in the data message 135, thecontroller 115 can use the channel set up for the operation of theremote host system 121 to retrieve the host data 131 and generate aresponse in the form of a data message 135. The data message 135 istransmitted back to the remote host system 121 using the networkinterface 113 without going through the host interface 112. Thus, thelocal host system 120 does not have access to the host data 131retrieved from the storage capacity 143, which also improves securityfor the host data 131.

Thus, by separating control messages 133 for routing into the local hostsystem 120, only a very tiny portion of messages communicated betweenthe remote host system 121 and the network interface 113 is routedthrough the local host system 120. Thus, the requirements on processingpower and communication bandwidth on the local host system 120 aredrastically reduced, while allowing the local host system 120 toexercise control over security, administrative, and managementoperations of the memory sub-system 110. The reduction makes it easy toscale up the storage capacity controlled by the local host system 120.For example, multiple memory sub-systems (e.g., 110) can be connectedover a computer bus or a peripheral bus 125 to the local host system120, while the memory sub-systems (e.g., 110) are separately connectedto one or more computer networks (e.g., 114) via their respectivenetwork interfaces (e.g., 113).

In some implementations, the network interface 113 includes a logiccircuit, a controller, and/or a processor configured to recover,identify, determine, or generate the control messages 133 and the datamessages 135 from data packets received from a computer network 114.

In some other implementations, the processing power of the controller115 is used to convert network packets received in the network interface113 into the control messages 133 and the data messages 135. Thecontroller 115 can include a processor configured with instructions togenerate the control messages 133 and the data messages 135.

FIG. 3 shows a configuration of control messages and data messages forprocessing in a memory sub-system according to one embodiment.

For example, the separation of control messages 133 and data messages135 for routing in different processing paths in FIG. 2 can beimplemented according to the configuration of FIG. 3 .

Network storage access messages 151 communicated between a remote hostsystem 121 and the network interface 113 of a memory sub-system 110 canbe partitioned into control messages 133 and data messages 135 asillustrated in FIG. 3 .

The control messages 133 can include a message containing accesscredential 161 to start a session or an operation.

The control messages 133 can include a message containing a command tocreate a namespace 163 in the storage capacity 143.

The control messages 133 can include a message containing a command tomap a namespace 165 in the storage capacity 143.

The control messages 133 can include a message containing a command toset a security attribute 167 in the storage capacity 143 (e.g., a readpermission for a user, a write permission for a user).

The control messages 133 can include a message containing a command toadjust a storage configuration 169 (e.g., move a file).

The control messages 133 can include other commands that can change metadata 123 in the memory sub-system 110 to control and organize host data131. However, the control messages 133 do not include host data 131 tobe written into the memory sub-system 110 and/or host data 131 beingread from the memory sub-system 110.

The data messages 135 can include a read message 153 having a readcommand 171 (and an address of data to be read), a response message 155having data 173 retrieved from the storage capacity 143, a write message157 having a write command 175 and provided data 177 to be written intothe storage capacity 143, a message having a trim or deallocationcommand, etc.

The control messages 133 are routed through the host interface 112 ofthe memory sub-system 110, but the data messages 135 are not routedthrough the host interface 112 of the memory sub-system 110. In someimplementations, network storage access messages 151 received for thenetwork interface 113 in one storage protocol is converted to controlmessages 133 and data messages 135 in another protocol for a localstorage device (e.g., a solid-state drive, a memory device 130).

In one aspect, a method is provided to process network messages toaccess storage of a memory sub-system according to one embodiment.

For example, the method can be performed by a storage manager configuredin a memory sub-system 110 and/or a local host system 120 of FIG. 1 tohave different processing paths illustrated in FIG. 2 using aconfiguration of FIG. 3 . For example, a storage manager in the memorysub-system 110 can be implemented to perform operations discussed inconnection with the memory sub-system 110; and the storage manager canbe implemented via a logic circuit and/or a processing device 117 of thememory sub-system controller 115, and/or instructions programmed to beexecuted by the processing device 117. For example, a storage manager inthe local host system 120 can be implemented to perform operationsdiscussed in connection with the local host system 120; and the storagemanager can be implemented via a logic circuit and/or a processingdevice 118 of the host system 120, and/or instructions programmed to beexecuted by the processing device 118.

In the method, a network interface 113 of a memory sub-system 110receives, over a computer network 114, packets from a remote host system121.

For example, the memory sub-system 110 can have a storage device, suchas a memory device 130, a solid-state drive having one or more memorydevices 130, . . . , 140 to provide a storage capacity 143 accessible tothe remote host system 121 over a computer network 114. The memorysub-system 110 can have a host interface 112 operable on a peripheralbus 125 connected to a local host system 120 to process a portion ofnetwork storage access messages 151 generated from the packets. Thememory sub-system 110 can have a storage manager (e.g., implemented viaa controller 115 coupled to the host interface 112, the networkinterface 113, and the solid-state drive).

In the method, the memory sub-system 110 determines (e.g., using astorage manager), from the packets, first control messages 133 and firstdata messages 135 that include first host data 131 provided by theremote host system 121.

For example, the remote host system 121 can access the storage functionsof the memory sub-system 110 using a storage protocol, such as internetsmall computer systems interface, fibre channel, fibre channel overethernet, network file system, or server message block, or anotherprotocol. The first control messages 133 and first data messages 135 canbe determined from the messages transmitted by the remote host system121 using the storage protocol. In some implementations, the firstcontrol messages 133 and first data messages 135 are recovered from thepackets received at the network interface 113. In some implementations,the messages transmitted from the remote host system 121 are translatedto a protocol for accessing the solid-state drive.

In the method, the memory sub-system 110 sends (e.g., using the storagemanager), through a host interface 112 of the memory sub-system 110, thefirst control messages 133 to a local host system 120.

For example, the host interface 112 can be configured according to acomputer peripheral bus 125 according to serial advanced technologyattachment, peripheral component interconnect express, universal serialbus, fibre channel, serial attached small computer system interface,double data rate, small computer system interface, open NAND flashinterface, low power double data rate, non-volatile memory express, orcompute express link, or another computer bus technique.

In the method, the local host system 120 processes (e.g., via a storagemanager), the first control messages 133 to generate second controlmessages 137.

In the method, the memory sub-system 110 receives (e.g., via its storagemanager), via the host interface 112 from the local host system 120, thesecond control messages 137 responsive to the first control messages133.

In the method, the memory sub-system 110 processes (e.g., via itsstorage manager), the second control messages 137 and the first datamessages 135, without sending the first data message 135 and/or thefirst host data 131 to the local host system 120, to write the firsthost data 131 into a memory device 130 of the memory sub-system 110.

For example, the first data messages 135 can include a write command175; and the first host data 131 (e.g., provided data 177) can bewritten into a memory device (e.g., 130) of the memory sub-systemaccording to the write command without the write command 175 and/or itsdata 177 going through the host interface 112.

For example, the first data message 135 can include a read command 171.In response, the memory sub-system 110 can read second host data (e.g.,data 173) from the solid-state drive and/or a memory device (e.g., 130)according to the read command 171 specified in the first data messages135. The memory sub-system 110 generates second data messages (e.g.,response message 155) containing the second host data (e.g., data 173).The memory sub-system 110 transmits, via the network interface 113, thesecond data messages (e.g., response message 155) to the remote hostsystem 121 without the second host data (e.g., retrieved data 173)and/or the second data messages (e.g., response message 155) goingthrough the host interface 112.

For example, the memory sub-system 110 can be configured to process thesecond control messages 137 to generate meta data 123 according to whichthe first host data 131 is written into the solid-state drive (e.g., thememory device 130) and the second host data (e.g., data 173) isretrieved from the solid-state drive (e.g., the memory device 130).

For example, the first control messages include a command (e.g., createa namespace 163, map a namespace 165) to create, map, or delete anamespace; and the meta data 123 is associated with the namespace.

For example, the memory sub-system 110 can be configured to process thesecond control messages 137 to set up a channel to write the first hostdata 131 or read the second host data (e.g., data 173).

For example, the memory sub-system 110 can have random-access memory(e.g., memory 119); and the channel can include one or more queuesconfigured, according to the second control messages, for writing datainto, and/or retrieving data from, the solid-state drive.

For example, the channel can be configured with data used by thecontroller 115 of the memory sub-system 110 to perform addresstranslation to write the first host data 131 into the solid-state drive.

For example, the first control messages 133 include a credential 161 toaccess a storage capacity 143 of the solid-state drive. The local hostsystem 120 can validate the credential 161 based on access controlconfiguration data 141.

For example, the first control messages 133 include a command to set asecurity attribute 167, and/or a command to adjust a storageconfiguration 169 in the solid-state drive.

The local host system 120 is configured to process the first controlmessage 133 to exercise security control and perform administrativeoperations.

In at least some embodiments, the local host system 120 is configured toprocess a selected subset of messages received in the network interface113 of the memory sub-system 110. The subset to be selected forprocessing can be specified by the local host system 120. The memorysub-system 110 can select the subset according to the selection criteriaspecified by the local host system 120 and provide the selected subsetto the local host system 120 without providing the remaining messages tothe local host system 120.

For example, the network interface 113 of the memory sub-system 110 caninclude, or be connected to, an internal processor (e.g., controller 115and/or processing device 117). The internal processor is configured toconvert data packets received in the network interface 113 intomessages. The internal processor is further configured to convertresponse messages 155 into data packets for transmission by the networkinterface 113 to a remote host system 121.

The messages received from the remote host system 121 can be classifiedinto categories or types. FIG. 3 illustrates a configuration ofclassifying messages into control messages 133 and data messages 135.Alternatively, the messages 151 can be classified as one group ofmessages for processing by the local host system 120, and another groupof messages for processing by the memory sub-system 110 without beingcommunicated to the local host system 120.

A configuration file can be written by the local host system 120 intothe memory sub-system 110 to indicate the criteria for selectingmessages for the local host system 120.

For example, the configuration file can specify that messages containingread commands 171 and write commands 175 are in a group of messages forprocessing by the memory sub-system 110 itself and other messages areselected for processing by the local host system 120.

For example, the configuration file can be stored into the memorysub-system 110 to request the memory sub-system 110 to forward messagesrelated to access control to the local host system 120 for processing.

For example, a configuration file can be stored into the memorysub-system 110 to request the memory sub-system 110 to forward datamessages of reading or writing data in a particular namespace forprocessing by the local host system 120.

In general, the selection of messages for processing by the local hostsystem 120 can use various message attributes and/or parameters inconstructing selection criteria. For example, the selection criteria canbe formulated based on command type, command category, storagedestination, data source, data size, user account, access type, time anddate, etc. Thus, the selection of messages for processing by the localhost system is not necessarily limited by a predetermined classification(e.g., control messages 133 for processing by the local host system anddata messages 135 for processing by the memory sub-system 110 itself).

The internal processor of the memory sub-system 110 can be implementedas a controller 115 and/or a processing device 117 configured viainstructions and/or logic circuits. The internal processor identifiesand separates messages 151 received from a computer network 114according to the configuration file. The internal processor identifies asubset of the messages 151 according to the configuration file andtransmitted the subset to the local host system 120. The local hostsystem 120 can process the messages in the subset and transmit responsesto the memory sub-system 110 for further processing. The internalprocessor identifies and processes the remaining messages within thememory sub-system 110 without transmitting them to the local host system120.

For example, the memory sub-system 110 can include a random-accessmemory and a local storage device, such as a solid-state drive, a harddrive, etc. The internal processor can buffer the messages, selected forprocessing by the local host system 120, in the random-access memory forretrieval by the local host system 120. Other messages can betransmitted from the internal processor to the local storage devicewithout being buffered in the random-access memory and/or without beingtransmitted to the local host system 120.

Optionally, the local host system 120 can also use the configurationfile to specify the criteria for selecting a portion of the responsemessages 155 for processing by the local host system 120. For example,the internal processor selects a portion of the response messages 155according to the configuration file and buffer the selected responsemessages 155 in the random-access memory for retrieval by the local hostsystem 120. After the processing of the selected response messages 155,the local host system 120 can provide messages to the memory sub-system110 for transmission by the network interface 113. The remainingresponse messages 155 can be selected according to the configurationfile and transmitted by the memory sub-system 110 without going throughthe local host system 120.

The local host system 120 can process the selected messages to applysecurity measures, control access, transform data, perform dynamicadministrative operations, etc.

The memory sub-system 110 can be configured as a storage product withoutoptions for hardware reconfiguration, modification, and/orcustomization. The storage product is manufactured as a computer storagecomponent usable through designed connections to an external processorand to the network interface.

For example, the storage product can be configured with a bus connector,a network port, and the memory sub-system 110. The memory sub-system 110is inaccessible without going through the bus connector and the networkport. The bus connector is connected to the controller 115 of the memorysub-system 110; and the network port is connected to the networkinterface 113.

The storage product can be configured in the form of an expansion cardhaving the bus connector insertable into an expansion slot on a motherboard for a connection to a computer bus 125 and thus the local hostsystem 120. Alternatively, the bus connector can be a port; and acomputer cable adapted for the computer bus 125 can be inserted into theport for connecting to the local host system 120.

Optionally, the storage product can be configured to have a form factorsimilar to a hard drive, a solid-state drive, an external drive, anetwork drive, etc. The storage product has a casing or housing thatencloses its components and protects them from tampering.

After the network port of the storage product is connected to a computernetwork 114 and the bus connector to a computer bus 125, the internalprocessor of the storage product can block network storage servicesuntil the local host system 120 specifies the configuration file.Subsequently, the network interface 113 of the storage product cancommunicate with one or more remote host systems (e.g., 121) to providenetwork storage services. Messages received from the remote host systemsare separated on different processing paths according to theconfiguration file. A subset of the messages is provided to the localhost system 120 for processing using a storage application and/or anoperating system. By processing the subset of the messages, the localhost system 120 can control and/or administer the activities within thestorage product, extend the functionality of the storage product, andcustomize the services offered by the storage product without a need tomodify the hardware of the storage product and/or the firmware of thestorage product. The remaining messages, not selected for processing bythe local host system 120, are processed by the memory sub-system 110itself.

In some implementations, the configuration file can includeidentifications of messages to be blocked, or discarded. When thenetwork interface 113 receives a message classified for blocking, theinternal processor can delete or discard the message without furtherprocessing the message by itself or forwarding it to the local hostsystem 120. For example, the storage product can be shipped with adefault configuration file that blocks all of the messages 155 todisable network storage services. A local host system 120 can change theconfiguration file to enable and/or customize network storage services.

A portion of the memory sub-system 110 can be configured as a localstorage device. Messages not selected for processing by the local hostsystem 120 can be forwarded to the local storage device for processing.The local storage device can have local memory 119 to buffer receivedcommands, schedule commands for execution, and perform other storageoperations, such as address translation, wear leveling, garbagecollection, error detection and correction, etc.

In some implementations, when connected to the storage product, thelocal host system 120 functions as a central processing unit of thestorage product. Optionally, the storage product can be configured to beinoperable standalone without the external central processing unit.

Optionally, the local host system 120 can be configured with a userinterface to receive inputs from an administrator to configure theconfiguration file for selecting messages. The user interface can befurther used to receive inputs to specify access control configurationdata 141, and/or to receive request to perform administrativeoperations, such as creating a namespace, creating a user account,assigning user access rights, etc. In response to the inputs received inthe user interface, the local host system 120 can generate controlmessages 137 for execution by the memory sub-system 110 in the storageproduct.

The storage product can be configured with sufficient resources toperform predefined operations, such as network operations and storageoperations, without assistance from the external processor. For example,when allowed, operations requested via the data messages 135 received inthe network interface 113 can be performed by the storage productwithout assistance from an external processor (e.g., processing device128 of the local host system 120) connected to the storage product. Forexample, the storage product itself has sufficient resources to convertbetween network packets and network storage access messages 151, performoperations to store or retrieve data, and perform other storageoperations, such as address translation, wear leveling, garbagecollection, error detection and correction, etc.

The external processor can execute instructions programmed to performaccess control, administer network storage services, manage storageconfiguration, data processing, and/or other operations. Commands foradministrative operations can be received in a local user interfacewithout going through a network interface (e.g., 113). Alternatively, orin combination, a remote host system (e.g., 121) can send commands tothe network interface (e.g., 113) to request the administrativeoperations. Thus, the external processor can exercise control over datamanipulation operations within the storage product.

The storage product can be designed to optimize performance and costbased on the communication bandwidth of the network interface 113. Thenetwork communication bandwidth substantially defines the workloads ofthe components with the storage product. Thus, the storage product canbe manufactured and provided as a computer component usable as a storagebuilding block. A storage system can be built using one or more suchstorage products connected to a same external processor. The storagecapacity of the storage system can be easily scaled up by using morestorage products connected to the storage system with their networkinterfaces being separately connected to one or more computer networks.Since the workload of the external processor is light in typicalapplications, the processing power and communication bandwidth of theexternal processor are not likely to be a bottleneck in practicalapplications.

In contrast, a conventional network attached storage device does nothave an interface for an external processor. Such a conventional storagedevice is entirely responsible for the processing of the messages anddata received at its network interface. Access control and security areimplemented via its firmware. Maintaining security of such firmware canbe a challenge. There is no mechanism in a conventional network attachedstorage device to apply control and administration operations withoutrequesting through the network interface of the storage device.

When a storage product has an interface for an external processor,control and administrative operations can be performed via the externalprocessor without going through the network interface of the storageproduct for improved security. Instead of relying solely upon thefirmware of the storage product to handle security and administrativeoperations through the network interface, a storage system implementedusing the storage product can use software running the externalprocessor of the storage product to apply security control and performadministrative operations. Further, security measures can be implementedin both the firmware of the storage product and the software running inthe external processor; and such an arrangement can improve security byincreasing the difficulties for gaining unauthorized access.

Further, the storage product can be configured to bypass the externalprocessor in processing the data messages 135 that contains host data131 (e.g., as in FIG. 2 ). Thus, the host data 131 is protected againstsecurity breaches in the local host system 120. Since the externalprocessor does not have access to the host data 131, unauthorized accessto the host data 131 cannot be made via the external processor.

When the storage product (e.g., memory sub-system 110) is connected toan external processor via the host interface 112 of the storage productto form a computing device, the external processor can function as acentral processing unit of the computing device. However, the storageproduct can be configured to provide limited access to the centralprocessing unit.

For example, the central processing unit can be provided with access tocontrol messages 133 specifically identified by the network interface113 for processing to generate control messages 137 for execution in astorage device within the storage product. However, the centralprocessing unit can be prevented from accessing the network interface113 directly. For example, the central processing unit can be preventedfrom using the network interface 113 to transmit messages and/or receivemessages other than processing the control messages 133 identified bythe network interface 113. Thus, the difficulty for unauthorized accessto hack, through the network interface, the system running in thecentral processing unit is increased; and the risk of the system runningin the central processing unit being hacked via a computer network 114and/or the Internet is eliminated, minimized, or reduced.

Similarly, the controller 115 can limit the access of the externalprocessor to the storage capacity 143. The central processing unit cansend control messages 137 without obtaining responses. Responses to readcommands are routed to the network interface directly without goingthrough the central processing unit. Further, the storage product can beconfigured to filter the control messages 137 from the externalprocessor to remove commands other than the commands for security andadministration.

For example, after booting up the system running in the centralprocessing unit, the controller 115 can reject or drop messages of thesame type as the data messages 135 when the messages are from thecentral processing unit. Thus, the central processing unit can beprevented from reading the host data 131, and/or writing over or erasingthe host data 131.

In some implementations, the storage functions, access control, andadministrative operations of the storage product are managed by anexternal processor connected to the host interface 112 without involvingthe network interface 113. An administrator can dynamically monitor theactivities, update and/or enhance the software executed in the externalprocessor.

For example, a storage application running in the external processor canbe programmed to provide a user interface. An authorized administratorcan use the user interface to specify access control configuration data141, such as who has access to what content, which portion of storagecapacity (e.g., namespace), what set of resources and capabilities getsexposed, etc. The access commands received at the network interface 113(e.g., in control messages 133) can be checked against the accesscontrol configuration data 141 and/or mapped to appropriate locations inthe storage capacity 143. The external processor can set up mapping foraccess commands/requests received at the network interface 113 (e.g.,for read or write operations) from locations as identified by the remotehost system 121 into corresponding commands in accessing appropriatelocations in the storage capacity 143.

For example, the operation system and/or the storage application runningin the external processor can be configured to be only on the controlpath for security and administration but not on the data path. The datato be written into or retrieved from the storage capacity 143 does notgo through the host interface 112 to the external processor. Instead,the computing resources built in the storage product are used to processthe data being stored or retrieved. Thus, the communication bandwidth tothe external processor, and the computational workload applied to theexternal processor are small, relative to the data flow into or outputfrom the storage product. As a result, the external processor can beused to control multiple storage data processing units in scaling up thecapability in handling large data flows.

FIG. 4 shows a network-ready storage product 102 configured to have anexternal processor selectively processing messages for the storageproduct according to one embodiment.

For example, the network-ready storage product 102 can be implementedusing a memory sub-system 110 of FIG. 1 and/or FIG. 2 configured to havedifferent processing paths for control messages 133 and data messages135.

In FIG. 4 , the storage product 102 includes a memory sub-system 110(e.g., as in FIG. 1 ), a bus connector 104 and a network port 106.

The memory sub-system 110 has a message selection configuration 201 thatcan be specified by an external processor (e.g., local host system 120,processing device 118). The message selection configuration 201identifies the selection criteria of messages to be processed by theexternal processor, and the selection criteria of messages to beprocessed by the memory sub-system 110 itself. Optionally, the messageselection configuration 201 can further include the selection criteriaof messages to be blocked, discarded, or ignored.

The message selection configuration 201 can be stored in a memory or aregister file of the memory sub-system 110 to control how the memorysub-system 110 dispatches different messages on different processingpaths. Optionally, the local host system 120 can dynamically adjust theconfiguration file for the selection of messages for processing ondifferent paths.

For example, to configure messages on different processing pathsaccording to the configuration of FIG. 3 , the message selectionconfiguration 201 can be configured to identify the messages 161 to 169as control messages 133 for processing by the local host system 120.Further, the message selection configuration 201 can be configured toread messages 153, response messages 155, write messages 157, etc., asdata messages 135 for processing by the data storage product 102 itselfwithout being forwarded to the local host system 120.

For example, the message selection configuration 201 can specify thetypes of messages to be processed by the storage product 102 itself andrequests the remaining messages to be forwarded to the local host system120 for processing.

For example, the message selection configuration 201 can be configuredto specify the types of messages to be processed by the local hostsystem 120 and request the storage product 102 to process the remainingmessages without forwarding the messages to the local host system 120.

For example, the message selection configuration 201 can be configuredto specify certain types of messages to be processed by the storageproduct 102 itself, specify certain types of messages to be transmittedto the local host system 120 for processing, and request the storageproduct 102 to block, discard, or ignore remaining messages.

The classifications of messages, or selection criteria, can be based ontypes of messages, commands specified in the messages, parametersspecified for the commands, such as address, user account, access type,etc.

The controller 115 of the memory sub-system 110 can be configured todetermine the routing destinations of messages 151 based on the messageselection configuration 201.

The storage product 102 can be manufactured with a processor forgeneral-purpose processing. The processing logic and computing resourcesin the storage product are designed according to core storage operationsfor network storage services. Customization of the services can beimplemented via the use of a message selection configuration 201 toselect messages for processing by the local host system 120 external tothe storage product 102.

The storage product 102 can be shipped from a manufacturer as astandalone computer component for production or assembling of networkstorage devices, servers, computers, etc.

A network cable can be inserted into the network port 106 of the storageproduct 102 for a network connection between a remote host system 121and the network interface 113 of the storage product 102. In someimplementations, the network interface 113 includes a wirelesstransceiver for a wireless computer network (e.g., a wireless local areanetwork or WiFi network); and the network port 106 includes a connectorfor an antenna for the transceiver.

The bus connector 104 of the storage product 102 can be connected to acomputer bus 125. When the storage product 102 is connected via thecomputer bus 125 to a local host system 120, the combination of thelocal host system 120 and the storage product 102 can be a computingdevice configured to provide network storage services, such as theservices of a typical network attached storage device.

The storage product 102 can be manufactured to include an optionalcasing or housing that encloses the memory sub-system 110, in a waysimilar to a solid-state drive, a hard disk drive, an external drive, anetwork drive, etc. (e.g., as in FIG. 11 ). In some implementations, thestorage product 102 is configured on a printed circuit board (PCB); anda portion of the printed circuit board (PCB) is configured as the busconnector 104 insertable into an expansion slot (e.g., a PCIe slot on amother board) (e.g., as in FIG. 12 ). Alternatively, the bus connector104 can be configured as a port such that a computer cable (e.g.,according to PCIe, USB) can be inserted for a connection to the computerbus 125.

The bus connector 104 and the network port 106 provide access to thelogic circuits within the storage product 102.

In some implementations, power to operate the memory sub-system 110 isprovided via the bus connector 104 or the network port 106. In otherimplementations, the storage product 102 has a separate power connectorto receive power for the operations of the memory sub-system 110.

The storage product 102 offers no other interfaces for accessing itscomponents, and/or for modifying and/or augmenting the hardware of thestorage product 102. Thus, the usage of the storage product 102 inconstructing the hardware of computing devices, servers, network storagedevices, etc. can be greatly simplified.

In addition to being connected to the bus connector 104 and the localhost system 120, the computer bus 125 can be further connected toperipheral devices, such as a monitor, a keyboard, a mouse, a speaker, aprinter, a storage device storing access control configuration data 141and/or instructions of an operating system 213 and/or a storageapplication 215 to be executed in the central processing device, etc.

Some of the peripheral devices can be used to implement a user interface211 to receive commands to manage the storage capacity 143 of the memorysub-system 110 (e.g., storage quota, storage partition) and/or to manageaccess control configuration data 141 (e.g., user accounts, accessrights, credential).

For example, the user interface 211 can be used to generate the contentof the message selection configuration 201; and the storage application215 and/or the operating system 213 can be used to write the messageselection configuration 201 into a predetermined location within thememory sub-system 110 to control its operations in dispatching messages151 onto different paths. Alternatively, or in combination, the messageselection configuration 201 can be stored into the memory sub-system 110by an authorized user of a remote host system 121 over the networkinterface 113.

In some implementation, the access control configuration data 141 aregenerated and/or configured via the user interface for the networkstorage services of the storage product 102. Such an arrangement removesthe need to configure, adjust, and/or administer the access controlconfiguration data 141 through the network interface 113 over a computernetwork 114. Thus, the security of the access control configuration data141 can be improved. To further improve security, the message selectionconfiguration 201 can be configured to reject, block, ignore or discarda portion of the control messages 133 that are received from thecomputer network 114 and configured to set up or change access controlconfiguration data 141.

Similarly, administrative operations can be performed via the userinterface to relieve remote host systems (e.g., 121) from beingprogrammed to perform such operations via a network connection.

Optionally, when a portion of control and/or administrative requests isimplemented to receive via the bus connector 104, messages received inthe network port 106 for such operations can be selected for blocking,rejecting, discarding, etc.

The storage capability controlled by the local host system 120 can beexpanded by connecting, to the computer bus 125, one or more otherstorage products similar to the storage product 102.

In some implementations, the local host system 120 can send, through thecomputer bus 125, commands to control the operations of at least some ofthe components configured within the storage product 102. For example,the local host system 120 can send commands to start or stop theoperation of the network interface 113, manage the networkattributes/configuration of the network interface 113, etc. For example,the local host system 120 can send commands to the memory sub-systemcontroller 115 to start or stop its operations. For example, the localhost system 120 can send commands to write data into the local memory119 and read data from the local memory 119.

In some implementations, at least a portion of the controller 115 andthe memory devices 130, . . . , 140 are configured as one or more localstorage devices (e.g., solid-state drives) as in FIG. 11 and FIG. 12 ;and the local host system 120 can send to the storage device commandsfor storage operations, such as create or delete namespaces, read dataat specified addresses, write data at specified addresses, erase data atspecified addresses, etc.

Optionally, the local host system 120 has limited access to thecomponents in the memory sub-system 110. For example, the access can belimited to the receiving of the messages 133 identified by the networkinterface 113 according to the message selection configuration 201 forprocessing by an external processor of the storage product 102 andsending the control messages 137 responsive to the selected messages 133or responsive to user inputs specified in the user interface providedvia the instructions executed in the local host system 120.

FIG. 5 illustrates a technique to configure a storage product to routemessages for processing on different paths according to one embodiment.

For example, the messages received in the network interface 113 of thememory sub-system 110 in FIG. 1 , FIG. 2 , and/or FIG. 4 can beseparated for processing by a local host system and a storage devicerespectively.

In FIG. 5 , incoming packets 202 received in the network interface 113are used to construct storage access messages 151. The messages 151 canhave different types, attributes, and/or parameters. The messages 151can include messages 205, 207, and 206. A demultiplexer 203 iscontrolled by a message selection configuration 201 to separate themessages 205, 207, and 206 for different processing paths.

The message selection configuration 201 can specify host selectioncriteria 217 and local selection criteria 219 to select messages for thelocal host system 120 and for a local storage device 105 respectively.

A message 205 that satisfies the host selection criteria 217 isdispatched by the demultiplexer 203 to the local host system 120. Inresponse to the message 205, the local host system 120 can generate oneor more messages 209 for further processing by the local storage device105. Such a message 205 is not provided to the local storage device 105without going through the local host system 120.

For example, a storage application 215 running in the local host system120 can be configured to process the input messages 205 and generate theoutput messages 209 for the local storage device 105.

A message 207 that satisfies the local selection criteria 219 isdispatched by the demultiplexer 203 to the local storage device 105without going through the local host system 120.

A message 206 does not satisfy the host selection criteria 217 and doesnot satisfy the local selection criteria 219. The multiplexer 203selects and discard 210 such a message 206.

In some implementations, the local host system 120 can also receive userinputs 204 from a user interface 211 to generate output messages 209 forthe local storage device 105.

FIG. 5 illustrates the selection of messages 151 coming from the networkinterface 113 for processing by the local host system 120 or the localstorage device 105. Similarly, a portion of the responsive messages 155generated by the local storage device 105 can also be optionallyidentified in the message selection configuration 201 for processing bythe local host system 120. The local host system 120 processes theselected receive messages 155 to generate resulting messages andprovides the resulting message to the storage product 102 fortransmission via the network interface 113, as illustrated in FIG. 8 .

In at least some embodiments, the network storage services provided viathe storage product 102 are implemented and defined at least in part bythe software running in the local host system 120 external to thestorage product 102.

For example, the storage application 215 running in the local hostsystem 120 can be programmed to generate new control messages 137 basedon control messages 133 received in the network interface 113 of thestorage product 102. The functionality of the storage product 102, fromthe point of view of the remote host system 121, can be changed and/orimplemented via the programming of the storage application 215.

For example, the remote host system 121 can send a message 133 that isnot executable in the storage product 102. When the message 133corresponds to a function not predefined/designed for the storageproduct 102, the storage product 102 can generate messages 137 toimplement the function. The message 133 can be selected according to themessage selection configuration 201 for processing by the local hostsystem 120. The storage application 215 running on the local host system120 can be programmed to process the message 133 to implement such afunction that is not native to the storage product 102. For example, thestorage application 215 can be programmed to dynamically change or remapa control message 133 received in the network interface 113 into acombination of messages 137 that are executable, natively supported inthe storage product 102. Receiving and executing the combination ofmessages 137 in the storage product 102 implement the functioncorresponding to the message 133. Thus, the functionality of the networkstorage services provided via the storage product 102 can be defined atleast in part by data and/or logic external to the storage product 102.

As an example, the storage application 215 can be configured to generatecontrol messages 137 to store multiple copies of data for a dataset toimprove reliability of the dataset. The dataset can be selected viatime, an account, a user, a namespace, an application, and/or other dataselection criteria. The replication can be dynamically turned on or off,or performed for a dynamically selected dataset without the need toupdate the firmware and/or hardware of the storage product 102.

For example, the storage application 215 can be configured to provide acentralized user interface to receive commands to perform administrativeoperations, configure and/or customize the functions offered via thestorage product 102, etc.

FIG. 6 shows a storage application mapping messages received from acomputer network into messages to be executed in a storage product toimplement network storage services according to one embodiment.

For example, the storage application 215 of FIG. 6 can be implemented ina local host system 120 connected to a storage product 102 having amemory sub-system 110 according to FIG. 1 , FIG. 2 , and/or FIG. 4 .

In FIG. 6 , a memory sub-system 110 and/or a storage product 102containing the memory sub-system 110 can be designed to support astorage product command set 223. Commands or requests according to thestorage product command set 223 can be processed within the memorysub-system 110 without assistance from outside of the memory sub-system110.

The storage application 215 can be programmed to support storage servicecommand set 221, which can optionally contain at least a portion of thestorage product command set 223. At least a portion of the storageservice command set 221 can be outside of the storage product commandset 223.

A message 205 forwarded from the memory sub-system 110 for processing bythe local host system 120 can be processed by the storage application215. In addition to determine whether the operation identified by themessage 205 is permitted in view of access control configuration data141, the storage application 215 can determine an implementation of theoperation using the storage product command set 223.

For example, when a command or request in the message 205 is supportedin the storage product command set 223, the storage application 215 cansimply forward the received message 205 as the message 209 transmittedto the memory sub-system 110 for processing, after a determination thatthe command or request is permitted according to the access controlconfiguration data 141.

In some implementations, the storage application 215 can alter one ormore parameters provided in the message 205 to generate the outputmessage 209 for the memory sub-system 110 to process.

When a command or request in the message 205 is not in the storageproduct command set 223, the storage application 215 can be programmedto map the received message 205 to one or more output messages 209 thatare in the storage product command set 223 to implement the functionrequested by the message 205. Thus, at least some of the network storageservices offered to the remote host system 121 can be defined andimplemented by the storage application 215.

In some instances, a command or request in the incoming messages 205 canbe in the storage product command set 223 but selected for add-onservices and/or features. In response to such an incoming message 205,the storage application 215 can generate addition messages 209 toimplement the add-on services and/or features, in addition to forwardingthe incoming message 205 to the storage product 102.

In some implementations, the storage application 215 can program a setor sequence of messages to implement the function requested by anincoming message, as illustrated in FIG. 7 .

FIG. 7 illustrates a storage application programmed to implement amessage using multiple messages to a storage product according to oneembodiment.

For example, one of the messages 205 received in the storage application215 in FIG. 6 can be processed in a way illustrated in FIG. 7 .

In FIG. 7 , a message 237 received in the storage application 215 can beone of the control messages 133 (or messages 205) selected forprocessing by the local host system 120 according to the messageselection configuration 201 of FIG. 4 and/or FIG. 5 . The storageproduct 102 is incapable of processing the received message 237 toimplement its associated function without assistance from outside of thestorage product 102.

To implement the function associated with the received message 237, thestorage application 215 can generate a set, or a sequence, of messages231, 233, . . . , 235. For example, the messages 231, 233, . . . , 235can be a portion of the control messages 137 (or messages 209) providedby the local host system 120 to the memory sub-system 110 and/or thelocal storage device 105 to implement the request identified by thereceived message 237.

The commands or requests in the messages 231, 233, . . . , 235 areconfigured in the storage product command set 223. Thus, the storageproduct 102, the memory sub-system 110, and/or the local storage device105 can process the messages 231, 233, . . . , 235 without furtherassistance from outside of the storage product 102.

The messages 231, 233, . . . , 235 are configured to use the resourcesand/or functions of the storage product 102 to implement the request ofthe incoming message 237. For example, the messages 231, 233, . . . ,235 can use one or more command in the storage product command set 223to retrieve a relevant portion of the meta data 123 stored in thestorage product 102, process the retrieved data, and write data into thestorage product to record results, to configure the storage product 102in processing subsequent read/write requests, etc. Thus, the storageapplication 215 can control how data is processed for storage andretrieval in implementing new services not native to the storage product102.

The message selection configuration 201 can be configured to selectresponse messages 155 generated by the local storage device 105 andrequest the storage product 102 to provide the selected messages to thelocal host system 120 for processing. For example, the responses to themessages 231, 233, . . . , 235 can be selected for processing by thestorage application 215 to generate a response to the incoming message237 according to a storage service command set 221, as in FIG. 8 .

FIG. 8 shows a storage application programmed to generate responses fortransmission by a storage product according to one embodiment.

For example, the storage application 215 in FIG. 8 can be used toprocess the responses to the messages 231, 233, . . . , 235 generated inFIG. 7 to implement an incoming message 237 selected in a wayillustrated in FIG. 5 .

In FIG. 8 , a local storage device 105 in a storage product 102 isconfigured to process messages 209 received from a local host system 120and messages 207 that bypasses the local host system 120. After executesthe commands and/or requests in the messages 207 and 209, the localstorage device 105 can generate response messages 225.

A demultiplexer 203 in the storage product 102 can separate the responsemessages 225 based on the host selection criteria 217 and the localselection criteria 219 specified in the message selection configuration201.

For example, messages 227 can be selected according to the hostselection criteria 217 for a processing path that involves the localhost system 120. The storage application 215 in the local host system120 can provide response messages 228 for transmission by a networkinterface 113 of the storage product 102.

For example, messages 226 can be selected according to the localselection criteria 219 for bypassing the local host system 120.

The network interface 113 generates outgoing packets 229 fortransmitting messages 226 and 228 into a computer network 114.

Other messages 206 not selected via the host selection criteria and notselected via the local selection criteria 219 can be discarded 210.

For example, in response to the messages 231, 233, . . . , 235 receivedto implement the incoming message 237 in FIG. 7 , the local storagedevice 105 can generate responses 241, 243, . . . , 245 respectively.The storage application 215 can combine the responses 241, 243, . . . ,245 to generate a response 247 for the incoming messages 237.

In some implementations, a copy of data relevant to the operations andservices of the storage product 102 is stored in the storage product102. Thus, another local host system 120 having the storage application215 can be dynamically connected to the storage product 102 to replace alocal host system 120 currently connected to the storage product 102 inprocessing messages selected according to the message selectionconfiguration 201. Alternatively, another memory sub-system connected tothe computer bus 125 can be used to store the data.

In at least some embodiments, the storage product 102 is configured witha bus connector 104 to allow optional external control by a local hostsystem 120 connected to the bus connector 104 in providing networkstorage services. However, the storage product 102 has sufficientresources to provide the network storage services without assistancefrom the local host system 120 such that the use of the local hostsystem 120 is optional. For example, the storage product 102 is capableof providing the network storage services standalone without beingconnected to the local host system 120.

When the bus connector 104 is not connected to an external computer bus(e.g., 125) for control by an external processor (e.g., local hostsystem 120), the control path for message processing going through thebus connector 104 can be automatically bypassed. An internal processor(e.g., controller 115) connected to the network interface 113 can bepromoted to process the messages 205 and 227 selected via the hostselection criteria 217 specified in the message selection configuration201.

For example, in absence of an external processor functioning as acentral processing unit, an internal processor of the storage product102 (e.g., controller 115) can function as a central processing unit inthe storage product 102 operating in a standalone mode. The busconnector 104 is be optionally used or not used, disabled or enabled, incommunication with an external processor (e.g., local host system 120,processing device 118, or a microprocessor).

However, when the bus connector 104 is connected via a computer bus 125to an external processor, the storage product 102 can operate in a slavemode. When operating in the slave mode, the storage product 102 canselect messages 205 and 227 according to the host selection criteria217, route the selected messages 205 and 227 to the external processor,and receive messages 209 and 228 from the external processor for furtherprocessing, as in FIG. 5 and FIG. 8 .

For example, in absence of the external, local host system 120, thecontroller 115 in the storage product 102 can function as an internalhost system to perform at least a portion of the function of theexternal, local host system 120.

FIG. 9 shows a storage product capable of operating standalone accordingto one embodiment.

For example, the storage product 102 of FIG. 4 can be implemented in away illustrated in FIG. 9 .

In FIG. 9 , the memory sub-system 110 of the storage product 102 has aninterconnect 103 that connects various components, such as a hostinterface 112 connected to a bus connector 104, a network interface 113connected to a network port 106, a random-access memory 101, aprocessing device 107, and a storage device 105.

The random-access memory 101 can be accessible to an external processor(e.g., local host system 120) via the bus connector 104. For example,when a local host system 120 is connected to the bus connector 104 via acomputer bus 125, messages 205 to be processed by the local host system120 and/or messages 209 to be transmitted by the local host system 120to the storage device 105 can be buffered in the random-access memory101. The random-access memory 101 can be implemented using dynamicrandom-access memory (DRAM), synchronous dynamic random-access memory(SDRAM), static random-access memory (SRAM), three-dimensionalcross-point (“3D cross-point”) memory, etc.

The local storage device 105 is configured to store data relevant forthe operations of the storage product 102 in providing network storageservices. For example, the local storage device 105 can use its storagecapacity 143 to store a message selection configuration 201, accesscontrol configuration data 141, host data 131 of one or more remote hostsystems (e.g., 121), and meta data 123 about the host data 131.

A portion of the storage capacity 143 can be used to store host data131; and the portion of the storage capacity 143 is accessible to one ormore remote host systems (e.g., 121) over a computer network 114.

For example, the local storage device 105 can have integrated circuitmemory devices 130, . . . , 140 to provide the storage capacity 143. Forexample, the storage device 105 can be configured as a solid-state driveusable on a computer peripheral bus through its host interface 109. Insome implementations, the storage device 105 is a solid-state drive(SSD) or a BGA SSD. In other embodiments, a hard disk drive can be usedas the storage device 105.

The storage device 105 can have a host interface 109 configured tocommunicate on a bus (e.g., interconnect 103) to receive commands andsend responses.

For example, the interconnect 103 can have a bus of a same type as thecomputer bus 125 that connects the bus connector 104 of the storageproduct 102 and the local host system 120. Alternatively, a hostinterface 112 of the memory sub-system 110 can be used to bridge thecomputer bus 125 and the interconnect 103.

In some implementations, the host interfaces 112 and 109 can support asame communications protocol. In some implementations, the interconnect103 can be part of, or an extension of, the computer bus 125 connectingthe local host system 120 to the random-access memory 101 of the storageproduct 102.

The storage device 105 can have a controller 115 having a local memory119 and a processing device 117, similar to the memory sub-systemcontroller 115 in FIG. 1 . The controller 115 can buffer, in the localmemory 119, commands and data received via the host interface 109. Theprocessing device 117 can be configured via instructions and/or logiccircuits to execute write commands to store data into the memory devices130, . . . , 140, to execute read commands to retrieve host data 131,etc.

The processing device 107 of the memory sub-system 110 can communicatewith the network interface 113 over the interconnect 103 to convertincoming packets 202 from a computer network 114 into storage accessmessages 151 and convert response messages 226 and 228 into outgoingpackets 229 transmitted into the computer network 114. In someimplementations, the processing device 107 and the network interface 113have an exclusive connection configured between them, as in FIG. 11 . Inother implementations, the processing device 107 and the networkinterface 113 have separate connections to a communication component(e.g., a bus, a bus switch) that is shared with other components, suchas the random-access memory 101 and/or the storage device 105.

The local storage device 105 can further store a storage application 215that implements at least a portion of the storage application 215running in the local host system 120. With the storage application 215and the access control configuration data 141 stored in the localstorage device 105, the storage product 102 can operate in a standalonemode without being connected to an external processor (e.g., local hostsystem 120). For example, the processing device 107 can run the storageapplication 215 to process the control messages 133 to generate controlmessages 137 that would be generated by the local host system 120 whenthe storage product 102 is connected to the local host system 120 foroperating in the slave mode. The storage product 102 as connected to thecomputer network 114 can be sufficient to provide network storageservices without an external processor (e.g., local host system 120).

Optionally, the storage application 215 running in the local host system120 can provide addition functions and features not implemented in thestorage application 215 running in the processing device 107 of thestorage product 102. Thus, when operating in the standalone mode, thestorage product 102 can provide less functions and/or implement lessfeatures than in the slave mode.

For example, the storage service command set 221 can include a basesubset of commands and an extended subset of commands. When operating inthe standalone mode, the storage product 102 can process commands in thebase subset and optionally rejects commands in the extended subset. Withthe assistance from the storage application 215 running in the localhost system 120, the storage product 102 in the slave mode can providenetwork storage services with full support of the storage servicecommand set 221.

In some implementations, the storage application 215 running in thelocal host system 120 and the storage application 215 running in theprocessing device 107 of the storage product 102 can support the samestorage service command set 221. Thus, a local host system 120 canoptionally offload at least some of the tasks for processing themessages 205 to the storage product 102.

FIG. 10 shows a storage product operable to switch between processingselected messages internally or externally according to one embodiment.

For example, the storage product 102 in FIG. 10 can be implemented usingthe storage product 102 capable of operating standalone as in FIG. 9 .

In FIG. 10 , when the bus connector 104 of the storage product 102 isconnected to a local host system 120 (e.g., as in FIG. 4 ), the localhost system 120 can load the access control configuration data 141 fromthe local storage device 105 of the storage device 105 to processcontrol messages 133 in a slave mode.

When the storage product 102 is in the slave mode, a user oradministrator can use a user interface 211 in the local host system 120to configure, adjust and/or update the access control configuration data141 and/or the message selection configuration 201, as in FIG. 4 . Atleast a copy of the updated access control configuration data 141 and/orthe message selection configuration 201 can be stored in the localstorage device 105 of the storage product 102 to support the standalonemode of the storage product 102. Optionally, the local host system 120can further store a copy of the access control configuration data 141outside of the storage product 102.

In the slave mode, the processing device 107 can identify messages 205according to a message selection configuration 201 and provide themessages 205 for processing by the local host system 120, as in FIG. 5 .After the local host system 120 generates messages 209, the localstorage device 105 can process the messages 209, as in FIG. 5 .Similarly, the response messages 227 can be selected according to thehost selection criteria 217 for processing by the local host system 120;and the response messages 228 can be received from the local host system120 for transmission using the network interface 113, as in FIG. 8 .

The usage of the storage product 102 can be changed 251 betweenconnecting the storage product 102 to the local host system 120 andconnecting the storage product 102 to no external processor (e.g., localhost system 120).

When the bus connector 104 is connected to no external processor (e.g.,local host system 120), or instructed by the local host system 120 tooperate in a low power mode, the storage product 102 can operate in astandalone mode.

In the standalone mode, the processing device 107 runs the storageapplication 215. The processing device 107 can forward the messages 207,identified by the local selection criteria 219, to the local storagedevice 105, bypassing the storage application 215. The storageapplication 215 running in the processing device 107 processes themessages 205, identified by the host selection criteria 217, to generatethe messages 209. The processing device 107 provides the generatedmessages 209 to the local storage device 105. Similarly, the responsemessages 227 can be selected according to the host selection criteria217 for processing by the storage application 215 running in theprocessing device 107 to generate the response messages 228; and theresponse messages 225 selected according to the local selection criteria219 can bypass the storage application 215.

In one implementation, the storage product 102 operating in thestandalone mode can reject requests from a remote host system 121 tochange the access control configuration data 141 and/or the messageselection configuration 201.

In other implementations, with an access credential (e.g., 161)associated with an appropriate permission, a remote host system 121 canrequest changes, updates, adjustments to the access controlconfiguration data 141 and/or the message selection configuration 201.The storage application 215 can process the changes and store theupdated access control configuration data 141 and/or the messageselection configuration 201 in the local storage device 105. When thestorage product 102 changes 251 back to the slave mode, the local hostsystem 120 can retrieve the updated access control configuration data141 and/or the message selection configuration 201 from the localstorage device 105 for processing selected messages 205 and/or forupdates, changes, and/or adjustments.

When in the standalone mode, the storage product 102 can place its hostinterface 112 in a low power mode (e.g., a sleep mode, a hibernationmode, or a power-off mode) to disable communications over the busconnector 104. The processing device 107 can run a storage application215 in the standalone mode to process messages 205 and 227 selected viathe host selection criteria 217 in the message selection configuration201. Thus, the processing device 107 running the storage application 215can perform at least the function of the local host system 120 inprocessing the selected incoming messages 205 and the selected responsemessages 227 which, when the local host system 120 is in communicationwith the storage product 102, are provided to the local host system 120for processing.

In one example scenario, a local host system 120 can be connected to thebus connector 104 initially to configure and control the storage product102, including setting up the access control configuration data 141and/or the message selection configuration 201. Subsequently, the localhost system 120 can transfer the responsibility of processing theselected messages 205 and 227 to the processing device 107 running thestorage application 215 to reduce the workload on the local host system120. With the processing device 107 running the storage application 215,the storage product 102 can operate in the standalone mode withoutassistance from the local host system 120.

When needed, the local host system 120 can be further connected to thestorage product 102 to stop or pause the storage application 215 runningin the storage product 102. The storage product 102 can change 251 backto the slave mode in which the messages 205 and 227 selected accordingto the host selection criteria 217 are provided via the bus connector104 to the local host system 120 for processing; and the local hostsystem 120 can generate further control messages 137 based on userinputs to the user interface 211.

In some implementations, the bus connector 104 is physically connectedto or disconnected from a computer bus 125 to change 251 the storageproduct 102 between the slave mode and the standalone mode. Theoperating mode of the storage product 102 can be determined based on theconnection status of the bus connector 104 during a power up process ofthe storage product 102.

Optionally, the host interface 112 can be configured to support hotconnection/disconnection (e.g., a plug and play protocol). Thus, whenthe connection state of the bus connector 104 changes 251, the operationmode of the storage product 102 can change accordingly.

In some implementations, the local host system 120 can instruct the hostinterface 112 of the storage product 102 to operate in a low power mode(e.g., a sleep or hibernation mode), or to operate in a normal mode.When the local host system 120 instructs the host interface 112 to enterthe low power mode, the storage product 102 can enter the standalonemode in response. When the local host system 120 instructs the hostinterface 112 to exit the low power mode and thus enter the normal mode,the storage product 102 can enter the slave mode in response.

Optionally, the local host system 120 can use the message selectionconfiguration 201 to switch the storage product 102 between the slavemode and the standalone mode. For example, when the local host system120 changes the host selection criteria 217 to select no messages forprocessing by the local host system 120, the storage product 102 canenter the standalone mode to automatically process control messages 133using the storage application 215; and the local host system 120 canchange the host selection criteria 217 to select a portion of thecontrol messages 133 for processing by the local host system 120 tooperate the storage product 102 in the slave mode; and the remainingportion of the control messages 133 can be automatically processed bythe storage application 215 running in the storage product 102. Thus,both the local host system 120 and the storage product 102 can runstorage application 215 concurrently to process different portions ofthe control messages 133.

FIG. 11 shows a storage product having a storage device, a network port,and a bus connector to an external processor according to oneembodiment.

For example, the storage product 102 of FIG. 4 and/or FIG. 9 can beimplemented in a way illustrated in FIG. 11 with a message dispatchingtechnique illustrated in FIG. 5 and FIG. 8 . The storage product 102 ofFIG. 11 can be optionally connected to a local host system 120 toprocess messages using a storage application 215 as in FIG. 6 , FIG. 7 ,and/or FIG. 8 . The storage product 102 can optionally operate in astandalone mode as in FIG. 9 and FIG. 10 without assistance from anexternal processor.

In FIG. 11 , the storage product 102 has an interconnect 103 connectinga bus connector 104, a network interface 113, a processing device 107connected to a random-access memory 101, and a local storage device 105.For example, the interconnect 103 can be one or more computer buses.

An external processor (e.g., local host system 120) can access a portionof the functions or circuits in the storage product 102 via the busconnector 104. The external processor can be programmed via instructionsof the storage application 215 to control operations in the memorysub-system 110 by specifying a message selection configuration 201 forreceiving messages 205 for processing, and by generating messages 209for execution in the local storage device 105 and messages 228 fortransmission by the network interface 113.

The storage application 215 running in the local host system 120 canwrite the message selection configuration 201 into the local storagedevice 105 to control message separation onto different processing pathsas in FIG. 5 and FIG. 8 .

Optionally, the storage product 102 can be manufactured and shipped viaa default message selection configuration 201 that separates controlmessages 133 from data messages 135 in a way as illustrated in FIG. 3 .Thus, the storage product 102 can be used in a computer network 114 toprovide storage services in a standalone mode without having to be firstconnected to a local host system 120 for adjustments, customization,etc.

When in the slave mode, the storage product 102 can accept the localhost system 120 writing a new message selection configuration 201 at apredetermined location in the random-access memory 101. The processingdevice 107 of the memory sub-system 110 is configured to retrieve themessage selection configuration 201 from the random-access memory 101and store it into the local storage device 105. The processing device107 is configured to identify messages 205 to be processed by thestorage application 215 based on the criteria specified in the messageselection configuration 201.

In some implementations, the message selection configuration 201 iscommunicated from the local host system 120 to the storage product 102during a power up process of the local storage device 105. Theprocessing device 107 can retrieve the message selection configuration201 from the random-access memory 101 and then control message flows inthe memory sub-system 110 according to the retrieved message selectionconfiguration 201.

In some implementations, a predetermined portion of the random-accessmemory 101 is configured to store the message selection configuration201 to control the processing device 107. The processing device 107 canload the message selection configuration 201 from the storage device 105into the random-access memory 101 to control message flows. Optionally,the local host system 120 can dynamically change the message selectionconfiguration 201 to control message flows without power-cycling thestorage product 102.

In some implementations, a register file or a non-volatile memory of thememory sub-system 110 is configured to store the message selectionconfiguration 201 that controls the message flows.

The storage product 102 can be enclosed in a housing or casing 170 toprotect the components of the memory sub-system 110. Access to functionsof the components within the storage product can be limited to the useof the bus connector 104 and the network port 106. Since the resourcesof the memory sub-system 110 are designed to be sufficient to handlerequests received according to the communication bandwidth of thenetwork interface 113, the storage product 102 does not offer optionsfor a user to customize its hardware (e.g., adding components, removingcomponents, altering connections, etc.).

In some implementations, the network interface 113 includes a wirelesstransceiver for a wireless network connection; and the network port 106includes a connector for an antenna.

In FIG. 11 , the network interface 113 includes, or is controlled by, aprocessing device 107 (e.g., a logic circuit, a controller, or aprocessor). The processing device 107 is configured to process incomingpackets 202 received from the computer network 114 and to generateoutgoing packets 229 for transmitting messages (e.g., response message226 and 228) into the computer network 114.

The processing device 107 of the network interface 113 is furtherconfigured to identify and separate messages for the local host system120 and the storage device 105 according to the message selectionconfiguration 201 and a mode indicator 253.

The mode indicator 253 stored in the random-access memory 101 indicateswhether the storage product 102 is operating in a standalone mode or aslave mode.

A portion of storage access messages 151 received in the networkinterface 113 from the computer network 114 is identified as messages205 according to the message selection configuration 201. When the modeindicator 253 identifies a slave mode, the processing device 107provides the messages 205 to the storage application 215 running in thelocal host system 120. When the mode indicator 253 identifies astandalone mode, the processing device 107 provides the messages 205 tothe storage application 215 running in the storage product 102.

For example, control messages 133 are identified and selected asmessages 205 for processing by the storage application 215 either in thelocal host system 120 or in the storage product 102, depending on themode indicator 253.

For example, the processing device 107 connected to the networkinterface 113 can buffer the messages 205 selected for processing by astorage application 215. When the mode indicator 253 identifies a slavemode, the processing device 107 allows the local host system 120 toretrieve the messages 205; and when the mode indicator 253 identifies astandalone mode, the storage application 215 running in the processingdevice 107 can retrieve the messages 205 for processing.

The storage application 215 (e.g., running in the local host system 120or the processing device 107) can be configured to determine whether toaccept or reject the requests in the retrieved messages 205, whether totransform the retrieved messages 205, and/or whether to generate newmessages 209 for processing by the storage device 105 and/or the storageproduct 102.

The processing device 107 can forward the remaining messages receivedvia the network interface 113 from the computer network 114 (e.g., datamessages 135) to the storage device 105 without the messages goingthrough a storage application (e.g., running in the local host system120 or in the storage product 102).

In some implementations, the processing device 107 further selects aportion of the incoming storage access messages 151 according to thelocal selection criteria 219 and provides the selected messages 207 tothe local storage device 105; and the remaining messages are discarded,rejected, or ignored as in FIG. 5 .

Optionally, the storage product 102 can be configured to limit theaccess of the local host system 120 to processing the messages bufferedin the random-access memory 101 by the processing device 107 of thenetwork interface 113 and sending the processed or generated messages(e.g., control messages 137) to the storage device 105.

FIG. 12 shows a storage product configured on a printed circuit boardaccording to one embodiment.

For example, the storage product 102 of FIG. 4 and/or FIG. 9 can beimplemented in a way illustrated in FIG. 12 with a message dispatchingtechnique illustrated in FIG. 5 and FIG. 8 . The storage product 102 ofFIG. 12 can be optionally connected to a local host system 120 toprocess messages using a storage application 215 as in FIG. 6 , FIG. 7 ,and/or FIG. 8 . The storage product 102 can optionally operate in astandalone mode as in FIG. 9 and FIG. 10 without assistance from anexternal processor.

Similar to FIG. 11 , the storage product 102 in FIG. 12 has aninterconnect 103 connecting a bus connector 104, a processing device107, a network interface 113, a random-access memory 101, and a storagedevice 105. The memory sub-system 110 can have a mode indicator 253 tocontrol message routine in a way as in FIG. 11 .

In FIG. 12 , the storage product 102 can be configured in the form of anexpansion card built on a printed circuit board 108. A portion of theprinted circuit board 108 can be configured as the bus connector 104.The bus connector 104 can be inserted into an expansion slot on acomputer bus 125 for connection to a local host system 120.

In FIG. 12 , the memory sub-system 110 has a host interface 112 tobridge the computer bus 125 and the interconnect 103. In someimplementations, the interconnect 103 is part of, or an extension of,the computer bus 125, as in FIG. 11 .

In FIG. 12 , the memory sub-system 110 has a processing device 107 thatis separate from the network interface 113. The processing device 107and the network interface 113 can communicate with each other over theinterconnect 103 to process packets to generate messages (e.g., controlmessages 133 and data messages 135) and to transmit messages (e.g.,response messages 155).

In FIG. 12 , the processing device 107 (e.g., a processor or controller)can be programmed to perform operations independent of the local hostsystem 120. The processing device 107 is configured to identify messages205 according to the message selection configuration 201 and place themessages 205 in the random-access memory 101 for processing by a storageapplication 215 running in the local host system 120 when in a slavemode, or by a storage application 215 running in the processing device107 when in a standalone mode.

After the storage application 215 places its output messages 209 in therandom-access memory 101, the processing device 107 is furtherconfigured to forward the messages 209 to the storage device 105. Thus,the control and access by the local host system 120 can be limited tothe random-access memory 101 and the message selection configuration201.

In some implementations, the processing device 107 and the networkinterface 113 have a direct communication connection not accessible toother components of the storage product 102 as in FIG. 11 . In suchimplementations, the processing device 107 can be considered part of thenetwork interface 113.

Optionally, the printed circuit board 108 also has a casing or housing170 configured to substantially enclose the components of the memorysub-system 110 to prevent tampering.

FIG. 11 and FIG. 12 illustrate examples of one storage device 105 beingconnected to the interconnect 103 of the memory sub-system 110.Optionally, multiple storage devices 105 are configured in the memorysub-system 110 to operate in parallel to match the bandwidth of thenetwork interface 113.

FIG. 13 shows a method to process network messages to implement networkstorage services via a storage product and a storage application runninginside or outside of the storage product according to one embodiment.

For example, the method of FIG. 13 can be performed by a storage manager(e.g., storage application 215) configured in a memory sub-system 110 ofa storage product 102 and/or a local host system 120 of FIG. 4 , FIG. 11and/or FIG. 12 to have different processing paths illustrated in FIG. 2using techniques of FIG. 5 and FIG. 8 . For example, a storage managerin the memory sub-system 110 can be implemented to perform operationsdiscussed in connection with the memory sub-system 110; and the storagemanager can be implemented via a logic circuit and/or a processingdevice 117 of the memory sub-system controller 115, and/or instructionsprogrammed to be executed by the processing device 117. For example, astorage manager (e.g., storage application 215) in the local host system120 can be implemented to perform operations discussed in connectionwith the local host system 120; and the storage manager can beimplemented via a logic circuit and/or a processing device 118 of thehost system 120, and/or instructions programmed to be executed by theprocessing device 118.

At block 261, a processing device 107 of a storage product 102 generatesstorage access messages 151 from incoming packets 202, received by anetwork interface 113 of the storage product 102 from a computer network114.

For example, a local storage device 105 of the storage product 102 has astorage capacity 143 that is at least partially accessible throughnetwork storage services provided over the network interface 113 of thestorage product 102. A remote host system 121 can use a storage accessprotocol to generate the packets 202 for accessing the storage capacity143 (e.g., to store and/or to retrieve host data 131).

At block 263, the processing device 107 identifies, among the storageaccess messages 151, first messages 205 and second messages 207.

The storage product 102 has a bus connector 104 that can be used tooptionally connect the storage product 102 to a local host system 120 ona computer bus 125. The storage product 102 is operable in a standalonemode when no local host system is connected to the bus connector 104 tocontrol the storage product 102 and operable in the slave mode when alocal host system 120 is connected to the bus connector 104 to process aportion of the storage access messages 151.

For example, the storage product 102 can store a message selectionconfiguration 201 to identify host selection criteria 217 and localselection criteria 219; and the processing device 107 can select thefirst messages 205 from the storage access messages 151 according to thehost selection criteria 217 and select the second messages 207 from thestorage access messages 151 according to the local selection criteria219.

At block 265, the storage product 102 determines whether to operate in astandalone mode or in a slave mode.

For example, the current operating mode of the storage product 102 canbe based on whether the bus connector 104 is connected to a computer bus125 and/or a local host system 120 during the power-up process of thestorage product 102, or based on whether the bus connector 104 is in alow power mode, or based on an instruction or the lack of an instructionfrom the local host system 120.

At block 267, when in the slave mode, the processing device 107 of thestorage product 102 provides the first messages 205 to the local hostsystem 120 through the bus connector 104 to generate third messages 209for a storage device 105 of the storage product 102.

At block 269, when in the standalone mode, the processing device 107 ofthe storage product 102 processes the first messages to generate thethird messages 209 without assistance from an external processor (e.g.,local host system 120).

The storage product 102 is operable either in the slave mode or in thestandalone mode. In some implementations, the storage product 102 canswitch between the slave mode and the standalone mode without restartingand/or power-cycling the storage product 102.

In some implementations, the storage product 102 has a host interface112 connected to the bus connector 104. When the bus connector 104 isnot connected to any local host system (e.g., 120), the host interface112 can be in a low power mode. In some instances, the local host system120 can instruct the host interface 112 to enter the low power mode. Thestorage product 102 can be configured to enter the standalone mode inresponse to the bus connector 104 being in the low power mode.

For example, the storage device 105 can store instructions of a storageapplication 215 executable by the processing device 107; and when in thestandalone mode, the processing device 107 can execute the instructionsof the storage application 215 to generate the third messages 209 fromthe first messages 205 and access control configuration data 141 storedin the storage device 105.

For example, when in the slave mode, the storage application 215 runningin the local host system 120 can generate the third messages 209 fromthe first messages 205 and the access control configuration data 141.The instructions for the storage application 215 running in the localhost system 120 can be stored in the storage device 105 of the storageproduct 102 for the local host system 120. Thus, the local host system120 does not require other resources to run the storage application 215.Alternatively, the instructions for the storage application 215 runningin the local host system 120 can be stored in a storage device separatefrom the storage product 102.

For example, in a time period in which the storage product 102 is in theslave mode, the processing device 107 can select messages 205 fromstorage access messages 151 received in the time period for processingby the storage application 215 running outside the storage product 102(e.g., running in the local host system 120). In a subsequent timeperiod in which the storage product 102 changes 251 to the standalonemode, the processing device 107 can select messages 205 from the storageaccess message 151 received in the subsequent time period for processingby the storage application 215 running within the storage product 102(e.g., running in the processing device 107). Thus, the operations inblock 267 and block 269 can be performed for similar messages 205 duringdifferent time periods but not necessarily referring to the exact samemessages 205 in a same time period.

For example, the storage device 105 can store access controlconfiguration data 141; and in view of the access control configurationdata 141, the third messages 209 can be generated (e.g., by the storageapplication 215 in the local host system 120 when the storage product102 is in the slave mode, or by the storage application 215 in thestorage product 102 when in the standalone mode). For example, theprocessing of the first messages 205 can include determination ofwhether the access requested by the first messages 205 are permittedaccording to the access control configuration data 141.

At block 271, the storage product 102 provides the second messages 207and the third messages 209 to the storage device 105.

The third messages 209 can be generated in the storage product 102internally in the standalone mode without assistance from an externalprocessor (e.g., the local host system 120). Alternatively, the thirdmessages 209 can be generated externally by the local host system 120during the slave mode of the storage product 102.

At block 273, the storage device 105 of the storage product 102 executescommands in the second messages 207 and the third messages 209 toimplement network storage services used to access a storage capacity 143of the storage device 105 over the network interface 113.

For example, the storage product 102 can have a random-access memory 101coupled to the processing device 107. When the storage product 102 is inthe slave mode, the local host system 120 can generate a new messageselection configuration 201 in response to user inputs received in auser interface 211 and write it into the random-access memory 101 and/orthe storage device 105 to control selection of the first messages 205for processing via a storage application 215 and selection of the secondmessages 207 for bypassing the storage application 215.

Similarly, the local host system 120 can change, update, and/orconfigure the access control configuration data 141 by writing data intothe random-access memory 101 when the storage product 102 is in theslave mode.

In general, a memory sub-system 110 can be a storage device, a memorymodule, or a hybrid of a storage device and memory module. Examples of astorage device include a solid-state drive (SSD), a flash drive, auniversal serial bus (USB) flash drive, an embedded multi-mediacontroller (eMMC) drive, a universal flash storage (UFS) drive, a securedigital (SD) card, and a hard disk drive (HDD). Examples of memorymodules include a dual in-line memory module (DIMM), a small outlineDIMM (SO-DIMM), and various types of non-volatile dual in-line memorymodule (NVDIMM).

The computing system 100 can be a computing device such as a desktopcomputer, a laptop computer, a network server, a mobile device, aportion of a vehicle (e.g., airplane, drone, train, automobile, or otherconveyance), an internet of things (IoT) enabled device, an embeddedcomputer (e.g., one included in a vehicle, industrial equipment, or anetworked commercial device), or such a computing device that includesmemory and a processing device.

The computing system 100 can include a host system 120 that is coupledto one or more memory sub-systems 110. FIG. 1 illustrates one example ofa host system 120 coupled to one memory sub-system 110. As used herein,“coupled to” or “coupled with” generally refers to a connection betweencomponents, which can be an indirect communicative connection or directcommunicative connection (e.g., without intervening components), whetherwired or wireless, including connections such as electrical, optical,magnetic, etc.

For example, the host system 120 can include a processor chipset (e.g.,processing device 118) and a software stack executed by the processorchipset. The processor chipset can include one or more cores, one ormore caches, a memory controller (e.g., controller 116) (e.g., NVDIMMcontroller), and a storage protocol controller (e.g., PCIe controller,SATA controller). The host system 120 uses the memory sub-system 110,for example, to write data to the memory sub-system 110 and read datafrom the memory sub-system 110.

The host system 120 can be coupled to the memory sub-system 110 via aphysical host interface. Examples of a physical host interface include,but are not limited to, a serial advanced technology attachment (SATA)interface, a peripheral component interconnect express (PCIe) interface,a universal serial bus (USB) interface, a fibre channel, a serialattached SCSI (SAS) interface, a double data rate (DDR) memory businterface, a small computer system interface (SCSI), a dual in-linememory module (DIMM) interface (e.g., DIMM socket interface thatsupports double data rate (DDR)), an open NAND flash interface (ONFI), adouble data rate (DDR) interface, a low power double data rate (LPDDR)interface, a compute express link (CXL) interface, or any otherinterface. The physical host interface can be used to transmit databetween the host system 120 and the memory sub-system 110. The hostsystem 120 can further utilize an NVM express (NVMe) interface to accesscomponents (e.g., memory devices 130) when the memory sub-system 110 iscoupled with the host system 120 by the PCIe interface. The physicalhost interface can provide an interface for passing control, address,data, and other signals between the memory sub-system 110 and the hostsystem 120. FIG. 1 illustrates a memory sub-system 110 as an example. Ingeneral, the host system 120 can access multiple memory sub-systems viaa same communication connection, multiple separate communicationconnections, and/or a combination of communication connections.

The processing device 118 of the host system 120 can be, for example, amicroprocessor, a central processing unit (CPU), a processing core of aprocessor, an execution unit, etc. In some instances, the controller 116can be referred to as a memory controller, a memory management unit,and/or an initiator. In one example, the controller 116 controls thecommunications over a bus coupled between the host system 120 and thememory sub-system 110. In general, the controller 116 can send commandsor requests to the memory sub-system 110 for desired access to memorydevices 130, 140. The controller 116 can further include interfacecircuitry to communicate with the memory sub-system 110. The interfacecircuitry can convert responses received from the memory sub-system 110into information for the host system 120.

The controller 116 of the host system 120 can communicate with thecontroller 115 of the memory sub-system 110 to perform operations suchas reading data, writing data, or erasing data at the memory devices130, 140 and other such operations. In some instances, the controller116 is integrated within the same package of the processing device 118.In other instances, the controller 116 is separate from the package ofthe processing device 118. The controller 116 and/or the processingdevice 118 can include hardware such as one or more integrated circuits(ICs) and/or discrete components, a buffer memory, a cache memory, or acombination thereof. The controller 116 and/or the processing device 118can be a microcontroller, special-purpose logic circuitry (e.g., a fieldprogrammable gate array (FPGA), an application specific integratedcircuit (ASIC), etc.), or another suitable processor.

The memory devices 130, 140 can include any combination of the differenttypes of non-volatile memory components and/or volatile memorycomponents. The volatile memory devices (e.g., memory device 140) canbe, but are not limited to, random-access memory (RAM), such as dynamicrandom-access memory (DRAM) and synchronous dynamic random-access memory(SDRAM).

Some examples of non-volatile memory components include a negative-and(or, NOT AND) (NAND) type flash memory and write-in-place memory, suchas three-dimensional cross-point (“3D cross-point”) memory. Across-point array of non-volatile memory can perform bit storage basedon a change of bulk resistance, in conjunction with a stackablecross-gridded data access array. Additionally, in contrast to manyflash-based memories, cross-point non-volatile memory can perform awrite in-place operation, where a non-volatile memory cell can beprogrammed without the non-volatile memory cell being previously erased.NAND type flash memory includes, for example, two-dimensional NAND (2DNAND) and three-dimensional NAND (3D NAND).

Each of the memory devices 130 can include one or more arrays of memorycells. One type of memory cell, for example, single level cells (SLC)can store one bit per cell. Other types of memory cells, such asmulti-level cells (MLCs), triple level cells (TLCs), quad-level cells(QLCs), and penta-level cells (PLCs) can store multiple bits per cell.In some embodiments, each of the memory devices 130 can include one ormore arrays of memory cells such as SLCs, MLCs, TLCs, QLCs, PLCs, or anycombination of such. In some embodiments, a particular memory device caninclude an SLC portion, an MLC portion, a TLC portion, a QLC portion,and/or a PLC portion of memory cells. The memory cells of the memorydevices 130 can be grouped as pages that can refer to a logical unit ofthe memory device used to store data. With some types of memory (e.g.,NAND), pages can be grouped to form blocks.

Although non-volatile memory devices such as 3D cross-point type andNAND type memory (e.g., 2D NAND, 3D NAND) are described, the memorydevice 130 can be based on any other type of non-volatile memory, suchas read-only memory (ROM), phase change memory (PCM), self-selectingmemory, other chalcogenide based memories, ferroelectric transistorrandom-access memory (FeTRAM), ferroelectric random-access memory(FeRAM), magneto random-access memory (MRAM), spin transfer torque(STT)-MRAM, conductive bridging RAM (CBRAM), resistive random-accessmemory (RRAM), oxide based RRAM (OxRAM), negative-or (NOR) flash memory,and electrically erasable programmable read-only memory (EEPROM).

A memory sub-system controller 115 (or controller 115 for simplicity)can communicate with the memory devices 130 to perform operations suchas reading data, writing data, or erasing data at the memory devices 130and other such operations (e.g., in response to commands scheduled on acommand bus by controller 116). The controller 115 can include hardwaresuch as one or more integrated circuits (ICs) and/or discretecomponents, a buffer memory, or a combination thereof. The hardware caninclude digital circuitry with dedicated (i.e., hard-coded) logic toperform the operations described herein. The controller 115 can be amicrocontroller, special-purpose logic circuitry (e.g., a fieldprogrammable gate array (FPGA), an application specific integratedcircuit (ASIC), etc.), or another suitable processor.

The controller 115 can include a processing device 117 (processor)configured to execute instructions stored in a local memory 119. In theillustrated example, the local memory 119 of the controller 115 includesan embedded memory configured to store instructions for performingvarious processes, operations, logic flows, and routines that controloperation of the memory sub-system 110, including handlingcommunications between the memory sub-system 110 and the host system120.

In some embodiments, the local memory 119 can include memory registersstoring memory pointers, fetched data, etc. The local memory 119 canalso include read-only memory (ROM) for storing micro-code. While theexample memory sub-system 110 in FIG. 1 has been illustrated asincluding the controller 115, in another embodiment of the presentdisclosure, a memory sub-system 110 does not include a controller 115,and can instead rely upon external control (e.g., provided by anexternal host, or by a processor or controller separate from the memorysub-system).

In general, the controller 115 can receive commands or operations fromthe host system 120 and can convert the commands or operations intoinstructions or appropriate commands to achieve the desired access tothe memory devices 130. The controller 115 can be responsible for otheroperations such as wear leveling operations, garbage collectionoperations, error detection and error-correcting code (ECC) operations,encryption operations, caching operations, and address translationsbetween a logical address (e.g., logical block address (LBA), namespace)and a physical address (e.g., physical block address) that areassociated with the memory devices 130. The controller 115 can furtherinclude host interface circuitry to communicate with the host system 120via the physical host interface. The host interface circuitry canconvert the commands received from the host system into commandinstructions to access the memory devices 130 as well as convertresponses associated with the memory devices 130 into information forthe host system 120.

The memory sub-system 110 can also include additional circuitry orcomponents that are not illustrated. In some embodiments, the memorysub-system 110 can include a cache or buffer (e.g., DRAM) and addresscircuitry (e.g., a row decoder and a column decoder) that can receive anaddress from the controller 115 and decode the address to access thememory devices 130.

In some embodiments, the memory devices 130 include local mediacontrollers 150 that operate in conjunction with the memory sub-systemcontroller 115 to execute operations on one or more memory cells of thememory devices 130. An external controller (e.g., memory sub-systemcontroller 115) can externally manage the memory device 130 (e.g.,perform media management operations on the memory device 130). In someembodiments, a memory device 130 is a managed memory device, which is araw memory device combined with a local controller (e.g., local mediacontroller 150) for media management within the same memory devicepackage. An example of a managed memory device is a managed NAND (MNAND)device.

The controller 115 and/or a memory device 130 can include a storagemanager configured to implement the functions discussed above. In someembodiments, the controller 115 in the memory sub-system 110 includes atleast a portion of the storage manager. In other embodiments, or incombination, the controller 116 and/or the processing device 118 in thehost system 120 includes at least a portion of the storage manager. Forexample, the controller 115, the controller 116, and/or the processingdevice 118 can include logic circuitry implementing the storage manager.For example, the controller 115, or the processing device 118(processor) of the host system 120, can be configured to executeinstructions stored in memory for performing the operations of thestorage manager described herein. In some embodiments, the storagemanager is implemented in an integrated circuit chip disposed in thememory sub-system 110. In other embodiments, the storage manager can bepart of firmware of the memory sub-system 110, an operating system ofthe host system 120, a device driver, or an application, or anycombination thereof.

In one embodiment, an example machine of a computer system within whicha set of instructions, for causing the machine to perform any one ormore of the methodologies discussed herein, can be executed. In someembodiments, the computer system can correspond to a host system (e.g.,the host system 120 of FIG. 1 ) that includes, is coupled to, orutilizes a memory sub-system (e.g., the memory sub-system 110 of FIG. 1) or can be used to perform the operations of a storage manager (e.g.,to execute instructions to perform operations corresponding tooperations described with reference to FIG. 1 -FIG. 13 ). In alternativeembodiments, the machine can be connected (e.g., networked) to othermachines in a LAN, an intranet, an extranet, and/or the Internet. Themachine can operate in the capacity of a server or a client machine inclient-server network environment, as a peer machine in a peer-to-peer(or distributed) network environment, or as a server or a client machinein a cloud computing infrastructure or environment.

The machine can be a personal computer (PC), a tablet PC, a set-top box(STB), a personal digital assistant (PDA), a cellular telephone, a webappliance, a server, a network router, a switch or bridge, anetwork-attached storage facility, or any machine capable of executing aset of instructions (sequential or otherwise) that specify actions to betaken by that machine. Further, while a single machine is illustrated,the term “machine” shall also be taken to include any collection ofmachines that individually or jointly execute a set (or multiple sets)of instructions to perform any one or more of the methodologiesdiscussed herein.

The example computer system includes a processing device, a main memory(e.g., read-only memory (ROM), flash memory, dynamic random-accessmemory (DRAM) such as synchronous DRAM (SDRAM) or Rambus DRAM (RDRAM),static random-access memory (SRAM), etc.), and a data storage system,which communicate with each other via a bus (which can include multiplebuses).

Processing device represents one or more general-purpose processingdevices such as a microprocessor, a central processing unit, or thelike. More particularly, the processing device can be a complexinstruction set computing (CISC) microprocessor, reduced instruction setcomputing (RISC) microprocessor, very long instruction word (VLIW)microprocessor, or a processor implementing other instruction sets, orprocessors implementing a combination of instruction sets. Processingdevice can also be one or more special-purpose processing devices suchas an application specific integrated circuit (ASIC), a fieldprogrammable gate array (FPGA), a digital signal processor (DSP),network processor, or the like. The processing device is configured toexecute instructions for performing the operations and steps discussedherein. The computer system can further include a network interfacedevice to communicate over the network.

The data storage system can include a machine-readable medium (alsoknown as a computer-readable medium) on which is stored one or more setsof instructions or software embodying any one or more of themethodologies or functions described herein. The instructions can alsoreside, completely or at least partially, within the main memory and/orwithin the processing device during execution thereof by the computersystem, the main memory and the processing device also constitutingmachine-readable storage media. The machine-readable medium, datastorage system, and/or main memory can correspond to the memorysub-system 110 of FIG. 1 .

In one embodiment, the instructions include instructions to implementfunctionality corresponding to a storage manager (e.g., the operationsdescribed with reference to FIG. 1 to FIG. 13 ). While themachine-readable medium is shown in an example embodiment to be a singlemedium, the term “machine-readable storage medium” should be taken toinclude a single medium or multiple media that store the one or moresets of instructions. The term “machine-readable storage medium” shallalso be taken to include any medium that is capable of storing orencoding a set of instructions for execution by the machine and thatcause the machine to perform any one or more of the methodologies of thepresent disclosure. The term “machine-readable storage medium” shallaccordingly be taken to include, but not be limited to, solid-statememories, optical media, and magnetic media.

Some portions of the preceding detailed descriptions have been presentedin terms of algorithms and symbolic representations of operations ondata bits within a computer memory. These algorithmic descriptions andrepresentations are the ways used by those skilled in the dataprocessing arts to convey the substance of their work most effectivelyto others skilled in the art. An algorithm is here, and generally,conceived to be a self-consistent sequence of operations leading to adesired result. The operations are those requiring physicalmanipulations of physical quantities. Usually, though not necessarily,these quantities take the form of electrical or magnetic signals capableof being stored, combined, compared, and otherwise manipulated. It hasproven convenient at times, principally for reasons of common usage, torefer to these signals as bits, values, elements, symbols, characters,terms, numbers, or the like.

It should be borne in mind, however, that all of these and similar termsare to be associated with the appropriate physical quantities and aremerely convenient labels applied to these quantities. The presentdisclosure can refer to the action and processes of a computer system,or similar electronic computing device, that manipulates and transformsdata represented as physical (electronic) quantities within the computersystem's registers and memories into other data similarly represented asphysical quantities within the computer system memories or registers orother such information storage systems.

The present disclosure also relates to an apparatus for performing theoperations herein. This apparatus can be specially constructed for theintended purposes, or it can include a general-purpose computerselectively activated or reconfigured by a computer program stored inthe computer. Such a computer program can be stored in a computerreadable storage medium, such as, but not limited to, any type of diskincluding floppy disks, optical disks, CD-ROMs, and magnetic-opticaldisks, read-only memories (ROMs), random-access memories (RAMs), EPROMs,EEPROMs, magnetic or optical cards, or any type of media suitable forstoring electronic instructions, each coupled to a computer system bus.

The algorithms and displays presented herein are not inherently relatedto any particular computer or other apparatus. Various general-purposesystems can be used with programs in accordance with the teachingsherein, or it can prove convenient to construct a more specializedapparatus to perform the method. The structure for a variety of thesesystems will appear as set forth in the description below. In addition,the present disclosure is not described with reference to any particularprogramming language. It will be appreciated that a variety ofprogramming languages can be used to implement the teachings of thedisclosure as described herein.

The present disclosure can be provided as a computer program product, orsoftware, that can include a machine-readable medium having storedthereon instructions, which can be used to program a computer system (orother electronic devices) to perform a process according to the presentdisclosure. A machine-readable medium includes any mechanism for storinginformation in a form readable by a machine (e.g., a computer). In someembodiments, a machine-readable (e.g., computer-readable) mediumincludes a machine (e.g., a computer) readable storage medium such as aread only memory (“ROM”), random-access memory (“RAM”), magnetic diskstorage media, optical storage media, flash memory components, etc.

In this description, various functions and operations are described asbeing performed by or caused by computer instructions to simplifydescription. However, those skilled in the art will recognize what ismeant by such expressions is that the functions result from execution ofthe computer instructions by one or more controllers or processors, suchas a microprocessor. Alternatively, or in combination, the functions andoperations can be implemented using special-purpose circuitry, with orwithout software instructions, such as using application-specificintegrated circuit (ASIC) or field-programmable gate array (FPGA).Embodiments can be implemented using hardwired circuitry withoutsoftware instructions, or in combination with software instructions.Thus, the techniques are limited neither to any specific combination ofhardware circuitry and software, nor to any particular source for theinstructions executed by the data processing system.

In the foregoing specification, embodiments of the disclosure have beendescribed with reference to specific example embodiments thereof. Itwill be evident that various modifications can be made thereto withoutdeparting from the broader spirit and scope of embodiments of thedisclosure as set forth in the following claims. The specification anddrawings are, accordingly, to be regarded in an illustrative senserather than a restrictive sense.

What is claimed is:
 1. A storage product, comprising: a networkinterface operable on a computer network; a bus connector adapted to beconnected to a computer bus; a storage device having a storage capacityaccessible through network storage services provided over the networkinterface; and a processing device configured to at least generatestorage access messages from incoming packets received by the networkinterface from the computer network; wherein the storage product isoperable in a standalone mode when no local host system is connected tothe bus connector to control the storage product and operable in a slavemode when a local host system is connected to the bus connector toprocess a portion of the storage access messages.
 2. The storage productof claim 1, wherein the processing device is further configured to:identify, among the storage access messages, first messages; identify,among the storage access messages, second messages; provide the secondmessages to the storage device; provide, when in the slave mode, thefirst messages to the local host system through the bus connector,wherein the local host system is configured to generate third messagesresponsive to the first messages and provide the third messages to thestorage device; and process, when in the standalone mode, the firstmessages to generate the third messages and provide the third messagesto the storage device; wherein the storage device is configured toexecute commands in the second messages and the third messages toimplement the network storage services.
 3. The storage product of claim2, wherein the storage device is configured to store access controlconfiguration data; and the third messages are generated in view of theaccess control configuration data.
 4. The storage product of claim 3,wherein the storage device is further configured to store instructionsof a storage application executable by the processing device; and whenin the standalone mode, the processing device is configured to executethe instructions of the storage application to generate the thirdmessages from the first messages and the access control configurationdata.
 5. The storage product of claim 4, wherein when in the slave mode,the storage application running in the local host system is configuredto generate the third messages from the first messages and the accesscontrol configuration data.
 6. The storage product of claim 3, whereinthe storage product is configured to store a message selectionconfiguration identifying host selection criteria and local selectioncriteria; and the processing device is configured to select the firstmessages from the storage access messages according to the hostselection criteria and select the second messages from the storageaccess messages according to the local selection criteria.
 7. Thestorage product of claim 6, further comprising: a random-access memorycoupled to the processing device; wherein when in the slave mode, themessage selection configuration is adjustable by the local host systemvia writing data into the random-access memory.
 8. The storage productof claim 3, further comprising: a host interface connected to the busconnector; wherein the storage product is configured to enter thestandalone mode in response to the bus connector in a low power mode. 9.The storage product of claim 3, further comprising: a random-accessmemory coupled to the processing device; wherein when in the slave mode,the access control configuration data is adjustable by the local hostsystem via writing data into the random-access memory.
 10. A method,comprising: generating, by a processing device of a storage product,storage access messages from incoming packets received by a networkinterface of the storage product from a computer network; identifying,by the processing device and among the storage access messages, firstmessages and second messages; determining, by the storage product,whether to operate in a standalone mode or in a slave mode, wherein thestorage product is operable in the standalone mode when no local hostsystem is connected via a computer bus to a bus connector of the storageproduct to control the storage product and operable in the slave modewhen a local host system is connected to the bus connector to process aportion of the storage access messages; providing, by the processingdevice when in the slave mode, the first messages to the local hostsystem through the bus connector to generate third messages for astorage device of the storage product; processing, by the processingdevice when in the standalone mode, the first messages to generate thethird messages; providing the second messages and the third messages tothe storage device; and executing, by the storage device, commands inthe second messages and the third messages to implement network storageservices to access a storage capacity of the storage device over thenetwork interface.
 11. The method of claim 10, further comprising:storing, in the storage device, access control configuration data;wherein the third messages are generated in view of the access controlconfiguration data.
 12. The method of claim 11, further comprising:storing, in the storage device, instructions of a storage applicationexecutable by the processing device; executing, by the processing devicewhen in the standalone mode, the instructions of the storage applicationto generate the third messages from the first messages and the accesscontrol configuration data; wherein when in the slave mode, the storageapplication running in the local host system is configured to generatethe third messages from the first messages and the access controlconfiguration data.
 13. The method of claim 11, further comprising:storing, in the storage device, a message selection configurationidentifying host selection criteria and local selection criteria;wherein the first messages are identified via selection from the storageaccess messages according to the host selection criteria; and whereinthe second messages are identified via selection from the storage accessmessages according to the local selection criteria.
 14. The method ofclaim 13, further comprising: adjusting, by the local host system, themessage selection configuration based on user inputs received in a userinterface on the local host system; and adjusting, by the local hostsystem, the access control configuration based on user inputs receivedin the user interface.
 15. The method of claim 11, further comprising:instructing, by the local host system, a host interface of the storageproduct connected to the bus connector to enter a low power mode; andentering, by the storage product, the standalone mode in response to thebus connector in the low power mode.
 16. A computing device, comprising:a computer bus; a local host system connected to the computer bus; andat least one storage product, the storage product comprising: a busconnector connected to the computer bus; a network interface operable ona computer network to receive incoming packets; a processing devicecoupled to the network interface to generate storage access messagesfrom the incoming packets; and a local storage device having a storagecapacity accessible via the storage access messages; wherein the storageproduct is operable in a standalone mode and a slave mode; wherein whenin the slave mode, the storage product is configured to provide aportion of the storage access messages to the local host system, and thelocal host system is configured to generate and provide messages for thelocal storage device; wherein when in the standalone mode, the storageproduct is configured to process the portion of the storage accessmessages within the storage product without providing any portion of thestorage access messages to the local host system.
 17. The computingdevice of claim 16, wherein the storage device is configured to storeaccess control configuration data; and the portion of the storage accessmessages is processed in view of the access control configuration datato control access to the storage capacity.
 18. The computing device ofclaim 17, wherein when in the slave mode, the local host system isoperable to set up or adjust the access control configuration data inthe storage product according to user inputs.
 19. The computing deviceof claim 16, wherein the storage device is further configured to store amessage selection configuration specifying criteria to select theportion of the storage access messages.
 20. The computing device ofclaim 19, wherein when in the slave mode, the local host system isoperable to set up or adjust the message selection configuration in thestorage product according to user inputs.