Selective Message Processing by External Processors for Network Data Storage Devices

ABSTRACT

A storage product manufactured as a computer component to facilitate network storage services. The storage product has a bus connector, a network interface, and a local storage device. A message selection configuration can be written into the storage product to control separation of incoming messages received in the network interface into first messages and third messages. The first messages are sent through the bus connector for processing by a local host system to generate second messages. The second messages and the third messages are sent to the local storage device. The local storage device processes the second messages and the third messages to implement the network storage services.

RELATED APPLICATIONS

The present application is a continuation application of U.S. patentapplication Ser. No. 17/866,353 filed Jul. 15, 2022, the entiredisclosures of which application are hereby incorporated herein byreference.

TECHNICAL FIELD

At least some embodiments disclosed herein relate to memory systems ingeneral, and more particularly, but not limited to memory systemsconfigured to service data access requests received over computernetworks.

BACKGROUND

A memory sub-system can include one or more memory devices that storedata. The memory devices can be, for example, non-volatile memorydevices and volatile memory devices. In general, a host system canutilize a memory sub-system to store data at the memory devices and toretrieve data from the memory devices.

BRIEF DESCRIPTION OF THE DRAWINGS

The embodiments are illustrated by way of example and not limitation inthe figures of the accompanying drawings in which like referencesindicate similar elements.

FIG. 1 illustrates an example computing system having a memorysub-system in accordance with some embodiments of the presentdisclosure.

FIG. 2 shows different paths for processing control messages and datamessages in a memory sub-system according to one embodiment.

FIG. 3 shows a configuration of control messages and data messages forprocessing in a memory sub-system according to one embodiment.

FIG. 4 shows a network-ready storage product configured to have anexternal processor selectively processing messages for the storageproduct according to one embodiment.

FIG. 5 illustrates a technique to configure a storage product to routemessages for processing on different paths according to one embodiment.

FIG. 6 shows a storage product having a storage device, a network port,and a bus connector to an external processor according to oneembodiment.

FIG. 7 shows a storage product configured on a printed circuit boardaccording to one embodiment.

FIG. 8 shows a method to process network messages to access storage of astorage product controlled by an external processor according to oneembodiment.

DETAILED DESCRIPTION

At least some aspects of the present disclosure are directed to a memorysub-system configured with different processing paths for controlmessages and data messages. Examples of storage devices and memorymodules are described below in conjunction with FIG. 1 . In general, ahost system can utilize a memory sub-system that includes one or morecomponents, such as memory devices that store data. The host system canprovide data to be stored at the memory sub-system and can request datato be retrieved from the memory sub-system.

A conventional network-attached storage device is typically configuredas a computing device having a central processing unit (CPU), arandom-access memory, a network interface, and one or more memorydevices to provide a storage capacity accessible over a computernetwork. The CPU is typically configured to run an operating systemand/or a storage application to provide storage services in response tocommunications received in the network interface. Communicationsreceived in the network interface from a remote host system can includecontrol messages and data messages. The messages are generated by theremote host system to manage and/or access the storage capacity of thenetwork-attached storage device. The instructions executed in the CPUcan be programmed to process the control messages and the data messagesas input from the remote host system. In response to the messages, theCPU is configured via the instructions to authenticate users, manageaccess privileges and security settings, authorize access, manage thestorage capacity, store data into the memory devices, retrieve data fromthe memory devices, etc.

For example, the control messages and the data messages received via thenetwork interface of the conventional network-attached storage deviceare buffered in the random-access memory. The CPU is configured to fetchthe messages, process the messages, and send corresponding messages to alocal storage device, such as a solid-state drive. The solid-state drivecan receive messages, execute the commands in the messages to storedata, retrieve data from the memory devices, send retrieved data to theCPU, etc. The CPU can send the retrieved data to the network interfacefor transmission through a computer network to the remote host system.

Thus, in the conventional network-attached storage device, messagesreceived in the network interface, including control messages and datamessages, flow from the network interface through the CPU towards thestorage capacity. Access responses, such as data retrieved in responseto the read requests/commands, flow through the CPU for transmission bythe network interface into the computer network.

However, it is inefficient to flow data messages through the CPU; andthe CPU can be a bottleneck in processing power and communicationbandwidth in scaling up storage capacity.

At least some aspects of the present disclosure address the above andother deficiencies by using different processing paths for controlmessages and data messages.

For example, a computing device providing network storage services canbe configured with a storage device (e.g., a solid-state drive (SSD), aflash memory device, a ball grid array (BGA) SSD), a processing device(e.g., a microprocessor, a CPU), and a network interface connected to aremote host system as a storage client. The storage client (e.g., thenetwork interface receiving messages from the remote host system) canwrite data into the storage device and retrieve data from the storagedevice. The storage client is configured to provide data messages to thestorage device without going through the processing device. Controlmessages, such as administrative commands and management commands, arerouted through the processing device. Instructions executed in theprocessing device are configured/programmed to process the controlmessages to exercise access control, to exercise security control, andto perform administrative operations.

For example, to reduce the burden on the CPU and improve efficiency, thecomputing device can be configured with different processing paths forcertain control messages and other messages.

For example, the control messages on a separate processing path caninclude administrative and management commands used to create anamespace in the storage capacity, to map the namespace to a client, toauthenticate users, to set security attributes (e.g., read onlypermitted vs. both read and write permitted), to provide authorizationto which operation is allowed, to manage configuration changes, etc.Such control messages (e.g., for administrative and managementfunctions) can be configured to flow through the processing device; andthe processing device is configured via programmed instructions and/orother data to process the control message. Instructions executed in theprocessing device can be programmed to perform access control,administrative operations, management operations, etc., withoutoperating on the data to be stored into and/or the data being retrievedfrom the storage device. Other messages, such as data messagescontaining write commands and data to be written into the storage deviceaccording to the write commands, read commands, data retrieved inresponse to the read commands, etc., can be configured to becommunicated between the storage device and the storage client withoutgoing through the processing device.

As a result, the power consumption of the computing device can bereduced; the requirement on the communication bandwidth through theprocessing device (e.g., a microprocessor, a CPU) can be reduced; andthe requirement on the computing power on the processing device can bereduced.

In contrast, a traditional network-attached storage device is configuredto flow data messages through a CPU. In typical usages, administrativeand management commands are only a small portion of messages, the datamessages can be the majority of the messages going through in thenetwork interface. Thus, the processing of the data messages by the CPUin the traditional network-attached storage device can place a very highweight on the CPU (e.g., lot of commands to process) and therandom-access memory (e.g., lot of data buffering).

When data messages are communicated from a storage client to a storagedevice without going through the processing device (e.g., amicroprocessor, a CPU) of the computing device, according to the presentdisclosure, the processing device is tasked to process a very smallportion of messages (e.g., administrative and management commands, whichare less than 0.1% of total commands). Other messages (e.g., more than99.99% of total commands), including both command parts and data parts,can be routed to the storage device without going through the processingdevice. As a result, a less powerful processing device can be used tocontrol and manage the storage; and the storage capacity can be easilyscaled up by the processing device controlling multiple units, eachcontaining a network interface and one or more local storage devices, asfurther discussed below.

FIG. 1 illustrates an example computing system 100 that includes amemory sub-system 110 in accordance with some embodiments of the presentdisclosure. The memory sub-system 110 can include computer-readablestorage media, such as one or more volatile memory devices (e.g., memorydevice 140), one or more non-volatile memory devices (e.g., memorydevice 130), or a combination of such.

In FIG. 1 , the memory sub-system 110 is configured as a product ofmanufacture, usable as a component installed in a computing device. Thememory sub-system 110 has a network interface 113 controlled by a memorysub-system controller 115 to communicate with a remote host system 121over a computer network 114.

For example, the remote host system 121 can be configured with aprocessing device 128 (e.g., a microprocessor, a CPU), a memorycontroller 126, a network interface 111, and other components (e.g.,random-access memory, sensors, and/or user interfaces). Instructionsexecuted in the processing device 128 can be programmed to use thenetwork interface 111 to access the storage capacity of the memorysub-system 110 using a storage protocol, such as internet small computersystems interface (iSCSI), fibre channel (FC), fibre channel overethernet (FCoE), network file system (NFS), and server message block(SMB), or another protocol.

The memory sub-system 110 further includes a host interface 112 for acomputer memory bus or a computer peripheral bus 125 connectable to alocal host system 120 having a memory controller 116 and a processingdevice 118.

For example, instructions executed in the local host system 120 can beprogrammed to control, through the bus 125, the memory sub-system 110according to serial advanced technology attachment (SATA), peripheralcomponent interconnect express (PCIe), universal serial bus (USB), fibrechannel (FC), serial attached SCSI (SAS), double data rate (DDR), smallcomputer system interface (SCSI), open NAND flash interface, low powerdouble data rate (LPDDR), non-volatile memory (NVM) express (NVMe),compute express link (CXL), or another technique.

Thus, a combination of the local host system 120 and the memorysub-system 110 can be used as a network-attached data storage deviceproviding storage services to the remote host system 121 through thenetwork interface 113 using a storage capacity of the memory devices130, . . . , 140.

For example, the processing device 118 can be a microprocessorconfigured as a CPU of a computing device functioning a network-attacheddata storage device. The local host system 120 can be connected to oneor more of the memory sub-systems (e.g., 110) via a peripheral bus 125.To scale up the storage capacity of the network-attached data storagedevice, more memory sub-systems (e.g., 110) can be connected to thelocal host system 120, with their respective network interfaces (e.g.,113) being connected to the computer network 114 and/or other computernetworks.

Although FIG. 1 illustrates an example of one remote host system 121connected to the network interface 113, multiple remote host systems(e.g., 121) can be configured on the computer network 114 to access thestorage services of the network-attached storage device. Access to thestorage services can be controlled via user credentials, hostattributes, network addresses, and/or security settings, etc.

To reduce the burden on the local host system 120, at least a portion ofcontrol messages, among the messages received via the network interface113 from the computer network 114 (e.g., from the remote host system121), can be separated in the memory sub-system 110 from other types ofmessages, such as data messages. The memory sub-system 110 is configuredto provide the control messages through the host interface 112 to thelocal host system 120 for processing without providing other messages,such as data messages, to the host interface 112, as discussed furtherbelow.

For example, network packets received in the network interface 113 canbe processed by the memory sub-system controller 115 to recover orgenerate control messages and data messages. The memory sub-systemcontroller 115 can include local memory 119 (e.g., random-access memory)and a processing device 117 configured to at least process the networkpackets from the network interface 113. The memory sub-system controller115 can buffer the control messages in the local memory 119 forprocessing by the local host system 120; and the local host system 120can place processing results in the local memory 119 for execution. Theexecution of the control messages processed by the local host system 120can generate meta data 123 that control the storage operations performedfor data messages. The controller 115 can be configured to execute thecommands of the data messages based on the meta 123 to store data intothe memory devices 130, . . . , 140, to retrieve data from the memorydevices 130, . . . , 140, and to transmit the retrieved data to theremote host system 121 using the network interface 113.

In some implementations, a memory device 130 can be a solid-state drive(e.g., a BGA SSD). Thus, the memory sub-system controller 115 canprocess and/or forward commands as processed by the local host system120 and other commands to operate the memory device 130.

In some implementations, a portion of the memory sub-system controller115 and at least a portion of the memory devices 130, . . . , 140 areconfigured as a conventional storage device (e.g., SSD); and a remainingportion of the memory sub-system controller 115 can forward commands tothe storage device for execution. Thus, a conventional storage device(e.g., SSD) can be used as a component or a local storage device inimplementation of the memory sub-system 110.

In some implementations, multiple portions of the memory sub-systemcontroller 115 and the memory devices 130, . . . , 140 can be configuredas multiple conventional storage devices (e.g., SSDs). In otherimplementations, the processing device 117 is shared by the memorydevices 130, . . . , 140 without being configured according to aconventional storage device (e.g., SSD). Thus, the configuration of thememory sub-system controller 115 and memory devices 130, . . . , 140 arenot limited to a particular connectivity and/or topology.

Bypassing the local host system 120 in the processing of the datamessages greatly reduces the workloads of the local host system 120.Thus, the local host system 120 can be used to control multiple memorysub-systems (e.g., 110) in expanding storage capacity.

Since the memory sub-system 110, as a product, is configured tospecifically service the storage access requests received via thenetwork interface 113, the processing and communication bandwidth withinthe memory sub-system 110 can be designed and tailored according to thecommunication bandwidth of the network interface 113. Products similarto the memory sub-system 110 can be used as building blocks of a networkstorage facility controlled by the local host system 120. The capacityof the network storage facility can be easily scaled up via connectingmore units to the computer network 114. Since the workload of the localhost system 120 and communications to the local host system 120 are verylow for controlling each memory sub-system 110, many memory sub-systems(e.g., 110) can be connected to the local host system 120 to scale upthe capacity of the network storage facility without being limited bythe communication bandwidth and/or processing power of an availablelocal host system 120.

FIG. 2 shows different paths for processing control messages and datamessages in a memory sub-system according to one embodiment.

For example, the processing paths of FIG. 2 can be implemented using amemory sub-system 110 of FIG. 1 and/or the computing system 100 of FIG.1 .

In FIG. 2 , a remote host system 121 is connected (e.g., over a computernetwork 114 as in FIG. 1 ) to the network interface 113 of the memorysub-system 110. The remote host system 121 can store host data 131 intothe storage capacity 143 of the memory sub-system 110, and retrieve thehost data 131 back from the memory sub-system 110, using a storageprotocol, such as internet small computer systems interface (iSCSI),fibre channel (FC), fibre channel over ethernet (FCoE), network filesystem (NFS), and server message block (SMB), or another protocol.

Using the storage protocol, the remote host system 121 can send controlmessages 133 to the memory sub-system 110 to manage and/or administratethe storage capacity. For example, the host system can sign into thememory sub-system to start a session and/or a read/write operation. Thecontrol message 133 can include a command to generate a namespace in thestorage capacity 143, to create, delete, open, or close a file in thenamespace, to set security attributes (e.g., which files are readableand/or writable by which users), etc.

The control messages 133 received via the network interface 113 areforwarded to the host interface 112 connected to the local host system120 for processing. Processed control messages 137 are provided to thecontroller 115 of the memory sub-system 110. Execution ofcommands/requests in the processed control messages 137 can generatemeta data 123 that controls the data storage operations of the memorysub-system 110.

Some of the control messages 133 can be used to generate access controlconfiguration data 141, such as identifications of user accounts, accessprivileges, user credentials, etc.

Optionally, the local host system 120 connected to the memory sub-system110 can provide a user interface. An administrator can use the userinterface to generate control messages 137 to perform administrativeand/or management operations, such as creating accounts, record orchange access credentials, generate namespaces, etc. At least a portionof the access control configuration data 141 can be generated via theuser interface.

The access control configuration data 141 can be stored in part in thememory sub-system 110, or in another storage device connected to thelocal host system 120.

Subsequently, when the remote host system 121 sends a control message133 for authentication or access, the local host system 120 can receivethe control message 133 and use the access control configuration data141 to determine whether to permit the access. If the request ispermitted, the local host system 120 can send a control message 137 tothe controller 115 of the memory sub-system to set up access. Forexample, in response to the control message 137, the controller 115 canset up a channel to the storage capacity. For example, the channel caninclude one or more queues in the local memory 119 for the read/writeoperations permitted by the control message 137. In someimplementations, the channel can further include a portion of the metadata 123 generated to facilitate the read/write operations (e.g., foraddress translation). To write host data 131 into the memory sub-system110, the remote host system 121 can transmit a data message 135containing a write command and data to be stored. In response to thedata message 135, the controller 115 can write the received data intothe storage capacity using the channel set up for the operation of theremote host system 121. Thus, the data message 135 is not routed to thelocal host system 120. Bypassing the local host system 120 in routingthe data message 135 prevents the local host system 120 from accessingthe host data 131 in the data message 135. Thus, the security for thehost data 131 is improved.

To access the host data 131 stored in the memory sub-system 110, theremote host system 121 can send a data message 135 containing a readcommand. In response to the read command in the data message 135, thecontroller 115 can use the channel set up for the operation of theremote host system 121 to retrieve the host data 131 and generate aresponse in the form of a data message 135. The data message 135 istransmitted back to the remote host system 121 using the networkinterface 113 without going through the host interface 112. Thus, thelocal host system 120 does not have access to the host data 131retrieved from the storage capacity 143, which also improves securityfor the host data 131.

Thus, by separating control messages 133 for routing into the local hostsystem 120, only a very tiny portion of messages communicated betweenthe remote host system 121 and the network interface 113 is routedthrough the local host system 120. Thus, the requirements on processingpower and communication bandwidth on the local host system 120 aredrastically reduced, while allowing the local host system 120 toexercise control over security, administrative, and managementoperations of the memory sub-system 110. The reduction makes it easy toscale up the storage capacity controlled by the local host system 120.For example, multiple memory sub-systems (e.g., 110) can be connectedover a computer bus or a peripheral bus 125 to the local host system120, while the memory sub-systems (e.g., 110) are separately connectedto one or more computer networks (e.g., 114) via their respectivenetwork interfaces (e.g., 113).

In some implementations, the network interface 113 includes a logiccircuit, a controller, and/or a processor configured to recover,identify, determine, or generate the control messages 133 and the datamessages 135 from data packets received from a computer network 114.

In some other implementations, the processing power of the controller115 is used to convert network packets received in the network interface113 into the control messages 133 and the data messages 135. Thecontroller 115 can include a processor configured with instructions togenerate the control messages 137 and the data messages 135.

FIG. 3 shows a configuration of control messages and data messages forprocessing in a memory sub-system according to one embodiment.

For example, the separation of control messages 133 and data messages135 for routing in different processing paths in FIG. 2 can beimplemented according to the configuration of FIG. 3 .

Network storage access messages 151 communicated between a remote hostsystem 121 and the network interface 113 of a memory sub-system 110 canbe partitioned into control messages 133 and data messages 135 asillustrated in FIG. 3 .

The control messages 133 can include a message containing accesscredential 161 to start a session or an operation.

The control messages 133 can include a message containing a command tocreate a namespace 163 in the storage capacity 143.

The control messages 133 can include a message containing a command tomap a namespace 165 in the storage capacity 143.

The control messages 133 can include a message containing a command toseta security attribute 167 in the storage capacity 143 (e.g., a readpermission for a user, a write permission for a user).

The control messages 133 can include a message containing a command toadjust a storage configuration 169 (e.g., move a file).

The control messages 133 can include other commands that can change metadata 123 in the memory sub-system 110 to control and organize host data131. However, the control messages 133 do not include host data 131 tobe written into the memory sub-system 110 and/or host data 131 beingread from the memory sub-system 110.

The data messages 135 can include a read message 153 having a readcommand 171 (and an address of data to be read), a response message 155having data 173 retrieved from the storage capacity 143, a write message157 having a write command 175 and provided data 177 to be written intothe storage capacity 143, a message having a trim or deallocationcommand, etc.

The control messages 133 are routed through the host interface 112 ofthe memory sub-system 110, but the data messages 135 are not routedthrough the host interface 112 of the memory sub-system 110. In someimplementations, network storage access messages 151 received for thenetwork interface 113 in one storage protocol is converted to controlmessages 133 and data messages 135 in another protocol for a localstorage device (e.g., a solid-state drive, a memory device 130).

In one aspect, a method is provided to process network messages toaccess storage of a memory sub-system according to one embodiment.

For example, the method can be performed by a storage manager configuredin a memory sub-system 110 and/or a local host system 120 of FIG. 1 tohave different processing paths illustrated in FIG. 2 using aconfiguration of FIG. 3 . For example, a storage manager in the memorysub-system 110 can be implemented to perform operations discussed inconnection with the memory sub-system 110; and the storage manager canbe implemented via a logic circuit and/or a processing device 117 of thememory sub-system controller 115, and/or instructions programmed to beexecuted by the processing device 117. For example, a storage manager inthe local host system 120 can be implemented to perform operationsdiscussed in connection with the local host system 120; and the storagemanager can be implemented via a logic circuit and/or a processingdevice 118 of the host system 120, and/or instructions programmed to beexecuted by the processing device 118.

In the method, a network interface 113 of a memory sub-system 110receives, over a computer network 114, packets from a remote host system121.

For example, the memory sub-system 110 can have a storage device, suchas a memory device 130, a solid-state drive having one or more memorydevices 130, . . . , 140 to provide a storage capacity 143 accessible tothe remote host system 121 over a computer network 114. The memorysub-system 110 can have a host interface 112 operable on a peripheralbus 125 connected to a local host system 120 to process a portion ofnetwork storage access messages 151 generated from the packets. Thememory sub-system 110 can have a storage manager (e.g., implemented viaa controller 115 coupled to the host interface 112, the networkinterface 113, and the solid-state drive).

In the method, the memory sub-system 110 determines (e.g., using astorage manager), from the packets, first control messages 133 and firstdata messages 135 that include first host data 131 provided by theremote host system 121.

For example, the remote host system 121 can access the storage functionsof the memory sub-system 110 using a storage protocol, such as internetsmall computer systems interface, fibre channel, fibre channel overethernet, network file system, or server message block, or anotherprotocol. The first control messages 133 and first data messages 135 canbe determined from the messages transmitted by the remote host system121 using the storage protocol. In some implementations, the firstcontrol messages 133 and first data messages 135 are recovered from thepackets received at the network interface 113. In some implementations,the messages transmitted from the remote host system 121 are translatedto a protocol for accessing the solid-state drive.

In the method, the memory sub-system 110 sends (e.g., using the storagemanager), through a host interface 112 of the memory sub-system 110, thefirst control messages 133 to a local host system 120.

For example, the host interface 112 can be configured according to acomputer peripheral bus 125 according to serial advanced technologyattachment, peripheral component interconnect express, universal serialbus, fibre channel, serial attached small computer system interface,double data rate, small computer system interface, open NAND flashinterface, low power double data rate, non-volatile memory express, orcompute express link, or another computer bus technique.

In the method, the local host system 120 processes (e.g., via a storagemanager), the first control messages 133 to generate second controlmessages 137.

In the method, the memory sub-system 110 receives (e.g., via its storagemanager), via the host interface 112 from the local host system 120, thesecond control messages 137 responsive to the first control messages133.

In the method, the memory sub-system 110 processes (e.g., via itsstorage manager), the second control messages 137 and the first datamessages 135, without sending the first data message 135 and/or thefirst host data 131 to the local host system 120, to write the firsthost data 131 into a memory device 130 of the memory sub-system 110.

For example, the first data messages 135 can include a write command175; and the first host data 131 (e.g., provided data 177) can bewritten into a memory device (e.g., 130) of the memory sub-systemaccording to the write command without the write command 175 and/or itsdata 177 going through the host interface 112.

For example, the first data message 135 can include a read command 171.In response, the memory sub-system 110 can read second host data (e.g.,data 173) from the solid-state drive and/or a memory device (e.g., 130)according to the read command 171 specified in the first data messages135. The memory sub-system 110 generates second data messages (e.g.,response message 155) containing the second host data (e.g., data 173).The memory sub-system 110 transmits, via the network interface 113, thesecond data messages (e.g., response message 155) to the remote hostsystem 121 without the second host data (e.g., retrieved data 173)and/or the second data messages (e.g., response message 155) goingthrough the host interface 112.

For example, the memory sub-system 110 can be configured to process thesecond control messages 137 to generate meta data 123 according to whichthe first host data 131 is written into the solid-state drive (e.g., thememory device 130) and the second host data (e.g., data 173) isretrieved from the solid-state drive (e.g., the memory device 130).

For example, the first control messages include a command (e.g., createa namespace 163, map a namespace 165) to create, map, or delete anamespace; and the meta data 123 is associated with the namespace.

For example, the memory sub-system 110 can be configured to process thesecond control messages 137 to set up a channel to write the first hostdata 131 or read the second host data (e.g., data 173).

For example, the memory sub-system 110 can have random-access memory(e.g., memory 119); and the channel can include one or more queuesconfigured, according to the second control messages, for writing datainto, and/or retrieving data from, the solid-state drive.

For example, the channel can be configured with data used by thecontroller 115 of the memory sub-system 110 to perform addresstranslation to write the first host data 131 into the solid-state drive.

For example, the first control messages 133 include a credential 161 toaccess a storage capacity 143 of the solid-state drive. The local hostsystem 120 can validate the credential 161 based on access controlconfiguration data 141.

For example, the first control messages 133 include a command to set asecurity attribute 167, and/or a command to adjust a storageconfiguration 169 in the solid-state drive.

The local host system 120 is configured to process the first controlmessage 133 to exercise security control and perform administrativeoperations.

In at least some embodiments, the local host system 120 is configured toprocess a selected subset of messages received in the network interface113 of the memory sub-system 110. The subset to be selected forprocessing can be specified by the local host system 120. The memorysub-system 110 can select the subset according to the selection criteriaspecified by the local host system 120 and provide the selected subsetto the local host system 120 without providing the remaining messages tothe local host system 120.

For example, the network interface 113 of the memory sub-system 110 caninclude, or be connected to, an internal processor (e.g., controller 115and/or processing device 117). The internal processor is configured toconvert data packets received in the network interface 113 intomessages. The internal processor is further configured to convertresponse messages 155 into data packets for transmission by the networkinterface 113 to a remote host system 121.

The messages received from the remote host system 121 can be classifiedinto categories or types. FIG. 3 illustrates a configuration ofclassifying messages into control messages 133 and data messages 135.Alternatively, the messages 151 can be classified as one group ofmessages for processing by the local host system 120, and another groupof messages for processing by the memory sub-system 110 without beingcommunicated to the local host system 120.

A configuration file can be written by the local host system 120 intothe memory sub-system 110 to indicate the criteria for selectingmessages for the local host system 120.

For example, the configuration file can specify that messages containingread commands 171 and write commands 175 are in a group of messages forprocessing by the memory sub-system 110 itself and other messages areselected for processing by the local host system 120.

For example, the configuration file can be stored into the memorysub-system 110 to request the memory sub-system 110 to forward messagesrelated to access control to the local host system 120 for processing.

For example, a configuration file can be stored into the memorysub-system 110 to request the memory sub-system 110 to forward datamessages of reading or writing data in a particular namespace forprocessing by the local host system 120.

In general, the selection of messages for processing by the local hostsystem 120 can use various message attributes and/or parameters inconstructing selection criteria. For example, the selection criteria canbe formulated based on command type, command category, storagedestination, data source, data size, user account, access type, time anddate, etc. Thus, the selection of messages for processing by the localhost system is not necessarily limited by a predetermined classification(e.g., control messages 133 for processing by the local host system anddata messages 135 for processing by the memory sub-system 110 itself).

The internal processor of the memory sub-system 110 can be implementedas a controller 115 and/or a processing device 117 configured viainstructions and/or logic circuits. The internal processor identifiesand separates messages 151 received from a computer network 114according to the configuration file. The internal processor identifies asubset of the messages 151 according to the configuration file andtransmitted the subset to the local host system 120. The local hostsystem 120 can process the messages in the subset and transmit responsesto the memory sub-system 110 for further processing. The internalprocessor identifies and processes the remaining messages within thememory sub-system 110 without transmitting them to the local host system120.

For example, the memory sub-system 110 can include a random-accessmemory and a local storage device, such as a solid-state drive, a harddrive, etc. The internal processor can buffer the messages, selected forprocessing by the local host system 120, in the random-access memory forretrieval by the local host system 120. Other messages can betransmitted from the internal processor to the local storage devicewithout being buffered in the random-access memory and/or without beingtransmitted to the local host system 120.

Optionally, the local host system 120 can also use the configurationfile to specify the criteria for selecting a portion of the responsemessages 155 for processing by the local host system 120. For example,the internal processor selects a portion of the response messages 155according to the configuration file and buffer the selected responsemessages 155 in the random-access memory for retrieval by the local hostsystem 120. After the processing of the selected response messages 155,the local host system 120 can provide messages to the memory sub-system110 for transmission by the network interface 113. The remainingresponse messages 155 can be selected according to the configurationfile and transmitted by the memory sub-system 110 without going throughthe local host system 120.

The local host system 120 can process the selected messages to applysecurity measures, control access, transform data, perform dynamicadministrative operations, etc.

The memory sub-system 110 can be configured as a storage product withoutoptions for hardware reconfiguration, modification, and/orcustomization. The storage product is manufactured as a computer storagecomponent usable through designed connections to an external processorand to the network interface.

For example, the storage product can be configured with a bus connector,a network port, and the memory sub-system 110. The memory sub-system 110is inaccessible without going through the bus connector and the networkport. The bus connector is connected to the controller 115 of the memorysub-system 110; and the network port is connected to the networkinterface 113.

The storage product can be configured in the form of an expansion cardhaving the bus connector insertable into an expansion slot on a motherboard for a connection to a computer bus 125 and thus the local hostsystem 120. Alternatively, the bus connector can be a port; and acomputer cable adapted for the computer bus 125 can be inserted into theport for connecting to the local host system 120.

Optionally, the storage product can be configured to have a form factorsimilar to a hard drive, a solid-state drive, an external drive, anetwork drive, etc. The storage product has a casing or housing thatencloses its components and protects them from tampering.

After the network port of the storage product is connected to a computernetwork 114 and the bus connector to a computer bus 125, the internalprocessor of the storage product can block network storage servicesuntil the local host system 120 specifies the configuration file.Subsequently, the network interface 113 of the storage product cancommunicate with one or more remote host systems (e.g., 121) to providenetwork storage services. Messages received from the remote host systemsare separated on different processing paths according to theconfiguration file. A subset of the messages is provided to the localhost system 120 for processing using a storage application and/or anoperating system. By processing the subset of the messages, the localhost system 120 can control and/or administer the activities within thestorage product, extend the functionality of the storage product, andcustomize the services offered by the storage product without a need tomodify the hardware of the storage product and/or the firmware of thestorage product. The remaining messages, not selected for processing bythe local host system 120, are processed by the memory sub-system 110itself.

In some implementations, the configuration file can includeidentifications of messages to be blocked, or discarded. When thenetwork interface 113 receives a message classified for blocking, theinternal processor can delete or discard the message without furtherprocessing the message by itself or forwarding it to the local hostsystem 120. For example, the storage product can be shipped with adefault configuration file that blocks all of the messages 155 todisable network storage services. A local host system 120 can change theconfiguration file to enable and/or customize network storage services.

A portion of the memory sub-system 110 can be configured as a localstorage device. Messages not selected for processing by the local hostsystem 120 can be forwarded to the local storage device for processing.The local storage device can have local memory 119 to buffer receivedcommands, schedule commands for execution, and perform other storageoperations, such as address translation, wear leveling, garbagecollection, error detection and correction, etc.

In some implementations, when connected to the storage product, thelocal host system 120 functions as a central processing unit of thestorage product. Optionally, the storage product can be configured to beinoperable standalone without the external central processing unit.

Optionally, the local host system 120 can be configured with a userinterface to receive inputs from an administrator to configure theconfiguration file for selecting messages. The user interface can befurther used to receive inputs to specify access control configurationdata 141, and/or to receive request to perform administrativeoperations, such as creating a namespace, creating a user account,assigning user access rights, etc. In response to the inputs received inthe user interface, the local host system 120 can generate controlmessages 137 for execution by the memory sub-system 110 in the storageproduct.

The storage product can be configured with sufficient resources toperform predefined operations, such as network operations and storageoperations, without assistance from the external processor. For example,when allowed, operations requested via the data messages 135 received inthe network interface 113 can be performed by the storage productwithout assistance from an external processor (e.g., processing device128 of the local host system 120) connected to the storage product. Forexample, the storage product itself has sufficient resources to convertbetween network packets and network storage access messages 151, performoperations to store or retrieve data, and perform other storageoperations, such as address translation, wear leveling, garbagecollection, error detection and correction, etc.

The external processor can execute instructions programmed to performaccess control, administer network storage services, manage storageconfiguration, data processing, and/or other operations. Commands foradministrative operations can be received in a local user interfacewithout going through a network interface (e.g., 113). Alternatively, orin combination, a remote host system (e.g., 121) can send commands tothe network interface (e.g., 113) to request the administrativeoperations. Thus, the external processor can exercise control over datamanipulation operations within the storage product.

The storage product can be designed to optimize performance and costbased on the communication bandwidth of the network interface 113. Thenetwork communication bandwidth substantially defines the workloads ofthe components with the storage product. Thus, the storage product canbe manufactured and provided as a computer component usable as a storagebuilding block. A storage system can be built using one or more suchstorage products connected to a same external processor. The storagecapacity of the storage system can be easily scaled up by using morestorage products connected to the storage system with their networkinterfaces being separately connected to one or more computer networks.Since the workload of the external processor is light in typicalapplications, the processing power and communication bandwidth of theexternal processor are not likely to be a bottleneck in practicalapplications.

In contrast, a conventional network attached storage device does nothave an interface for an external processor. Such a conventional storagedevice is entirely responsible for the processing of the messages anddata received at its network interface. Access control and security areimplemented via its firmware. Maintaining security of such firmware canbe a challenge. There is no mechanism in a conventional network attachedstorage device to apply control and administration operations withoutrequesting through the network interface of the storage device.

When a storage product has an interface for an external processor,control and administrative operations can be performed via the externalprocessor without going through the network interface of the storageproduct for improved security. Instead of relying solely upon thefirmware of the storage product to handle security and administrativeoperations through the network interface, a storage system implementedusing the storage product can use software running the externalprocessor of the storage product to apply security control and performadministrative operations. Further, security measures can be implementedin both the firmware of the storage product and the software running inthe external processor; and such an arrangement can improve security byincreasing the difficulties for gaining unauthorized access.

Further, the storage product can be configured to bypass the externalprocessor in processing the data messages 135 that contains host data131 (e.g., as in FIG. 2 ). Thus, the host data 131 is protected againstsecurity breaches in the local host system 120. Since the externalprocessor does not have access to the host data 131, unauthorized accessto the host data 131 cannot be made via the external processor.

When the storage product (e.g., memory sub-system 110) is connected toan external processor via the host interface 112 of the storage productto form a computing device, the external processor can function as acentral processing unit of the computing device. However, the storageproduct can be configured to provide limited access to the centralprocessing unit.

For example, the central processing unit can be provided with access tocontrol messages 133 specifically identified by the network interface113 for processing to generate control messages 137 for execution in astorage device within the storage product. However, the centralprocessing unit can be prevented from accessing the network interface113 directly. For example, the central processing unit can be preventedfrom using the network interface 113 to transmit messages and/or receivemessages other than processing the control messages 133 identified bythe network interface 113. Thus, the difficulty for unauthorized accessto hack, through the network interface, the system running in thecentral processing unit is increased; and the risk of the system runningin the central processing unit being hacked via a computer network 114and/or the Internet is eliminated, minimized, or reduced.

Similarly, the controller 115 can limit the access of the externalprocessor to the storage capacity 143. The central processing unit cansend control messages 137 without obtaining responses. Responses to readcommands are routed to the network interface directly without goingthrough the central processing unit. Further, the storage product can beconfigured to filter the control messages 137 from the externalprocessor to remove commands other than the commands for security andadministration.

For example, after booting up the system running in the centralprocessing unit, the controller 115 can reject or drop messages of thesame type as the data messages 135 when the messages are from thecentral processing unit. Thus, the central processing unit can beprevented from reading the host data 131, and/or writing over or erasingthe host data 131.

In some implementations, the storage functions, access control, andadministrative operations of the storage product are managed by anexternal processor connected to the host interface 112 without involvingthe network interface 113. An administrator can dynamically monitor theactivities, update and/or enhance the software executed in the externalprocessor.

For example, a storage application running in the external processor canbe programmed to provide a user interface. An authorized administratorcan use the user interface to specify access control configuration data141, such as who has access to what content, which portion of storagecapacity (e.g., namespace), what set of resources and capabilities getsexposed, etc. The access commands received at the network interface 113(e.g., in control messages 133) can be checked against the accesscontrol configuration data 141 and/or mapped to appropriate locations inthe storage capacity 143. The external processor can set up mapping foraccess commands/requests received at the network interface 113 (e.g.,for read or write operations) from locations as identified by the remotehost system 121 into corresponding commands in accessing appropriatelocations in the storage capacity 143.

For example, the operation system and/or the storage application runningin the external processor can be configured to be only on the controlpath for security and administration but not on the data path. The datato be written into or retrieved from the storage capacity 143 does notgo through the host interface 112 to the external processor. Instead,the computing resources built in the storage product are used to processthe data being stored or retrieved. Thus, the communication bandwidth tothe external processor, and the computational workload applied to theexternal processor are small, relative to the data flow into or outputfrom the storage product. As a result, the external processor can beused to control multiple storage data processing units in scaling up thecapability in handling large data flows.

FIG. 4 shows a network-ready storage product 102 configured to have anexternal processor selectively processing messages for the storageproduct according to one embodiment.

For example, the network-ready storage product 102 can be implementedusing a memory sub-system 110 of FIG. 1 and/or FIG. 2 configured to havedifferent processing paths for control messages 133 and data messages135.

In FIG. 4 , the storage product 102 includes a memory sub-system 110(e.g., as in FIG. 1 ), a bus connector 104 and a network port 106.

The memory sub-system 110 has a message selection configuration 201 thatcan be specified by an external processor (e.g., local host system 120,processing device 118). The message selection configuration 201identifies the selection criteria of messages to be processed by theexternal processor, and the selection criteria of messages to beprocessed by the memory sub-system 110 itself. Optionally, the messageselection configuration 201 can further include the selection criteriaof messages to be blocked, discarded, or ignored.

The message selection configuration 201 can be stored in a memory or aregister file of the memory sub-system 110 to control how the memorysub-system 110 dispatches different messages on different processingpaths. Optionally, the local host system 120 can dynamically adjust theconfiguration file for the selection of messages for processing ondifferent paths.

For example, to configure messages on different processing pathsaccording to the configuration of FIG. 3 , the message selectionconfiguration 201 can be configured to identify the messages 161 to 169as control messages 133 for processing by the local host system 120.Further, the message selection configuration 201 can be configured toread messages 153, response messages 155, write messages 157, etc., asdata messages 135 for processing by the data storage product 102 itselfwithout being forwarded to the local host system 120.

For example, the message selection configuration 201 can specify thetypes of messages to be processed by the storage product 102 itself andrequests the remaining messages to be forwarded to the local host system120 for processing.

For example, the message selection configuration 201 can be configuredto specify the types of messages to be processed by the local hostsystem 120 and request the storage product 102 to process the remainingmessages without forwarding the messages to the local host system 120.

For example, the message selection configuration 201 can be configuredto specify certain types of messages to be processed by the storageproduct 102 itself, specify certain types of messages to be transmittedto the local host system 120 for processing, and request the storageproduct 102 to block, discard, or ignore remaining messages.

The classifications of messages, or selection criteria, can be based ontypes of messages, commands specified in the messages, parametersspecified for the commands, such as address, user account, access type,etc.

The controller 115 of the memory sub-system 110 can be configured todetermine the routing destinations of messages 151 based on the messageselection configuration 201.

The storage product 102 can be manufactured without a central processingunit for general-purpose processing. The processing logic and computingresources in the storage product are designed according to core storageoperations for network storage services. Customization of the servicescan be implemented via the use of a message selection configuration 201to select messages for processing by the local host system 120 externalto the storage product 102.

The storage product 102 can be shipped from a manufacturer as astandalone computer component for production or assembling of networkstorage devices, servers, computers, etc.

A network cable can be inserted into the network port 106 of the storageproduct 102 for a network connection between a remote host system 121and the network interface 113 of the storage product 102. In someimplementations, the network interface 113 includes a wirelesstransceiver for a wireless computer network (e.g., a wireless local areanetwork or WiFi network); and the network port 106 includes a connectorfor an antenna for the transceiver.

The bus connector 104 of the storage product 102 can be connected to acomputer bus 125. When the storage product 102 is connected via thecomputer bus 125 to a local host system 120, the combination of thelocal host system 120 and the storage product 102 can be a computingdevice configured to provide network storage services, such as theservices of a typical network attached storage device.

The storage product 102 can be manufactured to include an optionalcasing or housing that encloses the memory sub-system 110, in a waysimilar to a solid-state drive, a hard disk drive, an external drive, anetwork drive, etc. (e.g., as in FIG. 6 ). In some implementations, thestorage product 102 is configured on a printed circuit board (PCB); anda portion of the printed circuit board (PCB) is configured as the busconnector 104 insertable into an expansion slot (e.g., a PCIe slot on amother board) (e.g., as in FIG. 7 ). Alternatively, the bus connector104 can be configured as a port such that a computer cable (e.g.,according to PCIe, USB) can be inserted for a connection to the computerbus 125.

The bus connector 104 and the network port 106 provide access to thelogic circuits within the storage product 102.

In some implementations, power to operate the memory sub-system 110 isprovided via the bus connector 104 or the network port 106. In otherimplementations, the storage product 102 has a separate power connectorto receive power for the operations of the memory sub-system 110.

The storage product 102 offers no other interfaces for accessing itscomponents, and/or for modifying and/or augmenting the hardware of thestorage product 102. Thus, the usage of the storage product 102 inconstructing the hardware of computing devices, servers, network storagedevices, etc. can be greatly simplified.

In addition to being connected to the bus connector 104 and the localhost system 120, the computer bus 125 can be further connected toperipheral devices, such as a monitor, a keyboard, a mouse, a speaker, aprinter, a storage device storing access control configuration data 141and/or instructions of an operating system 213 and/or a storageapplication 215 to be executed in the central processing device, etc.

Some of the peripheral devices can be used to implement a user interface211 to receive commands to manage the storage capacity 143 of the memorysub-system 110 (e.g., storage quota, storage partition) and/or to manageaccess control configuration data 141 (e.g., user accounts, accessrights, credential).

For example, the user interface 211 can be used to generate the contentof the message selection configuration 201; and the storage application215 and/or the operating system 213 can be used to write the messageselection configuration 201 into a predetermined location within thememory sub-system 110 to control its operations in dispatching messages151 onto different paths. Alternatively, or in combination, the messageselection configuration 201 can be stored into the memory sub-system 110by an authorized user of a remote host system 121 over the networkinterface 113.

In some implementation, the access control configuration data 141 aregenerated and/or configured via the user interface for the networkstorage services of the storage product 102. Such an arrangement removesthe need to configure, adjust, and/or administer the access controlconfiguration data 141 through the network interface 113 over a computernetwork 114. Thus, the security of the access control configuration data141 can be improved. To further improve security, the message selectionconfiguration 201 can be configured to reject, block, ignore or discarda portion of the control messages 133 that are received from thecomputer network 114 and configured to set up or change access controlconfiguration data 141.

Similarly, administrative operations can be performed via the userinterface to relieve remote host systems (e.g., 121) from beingprogrammed to perform such operations via a network connection.

Optionally, when a portion of control and/or administrative requests isimplemented to receive via the bus connector 104, messages received inthe network port 106 for such operations can be selected for blocking,rejecting, discarding, etc.

The storage capability controlled by the local host system 120 can beexpanded by connecting, to the computer bus 125, one or more otherstorage products similar to the storage product 102.

In some implementations, the local host system 120 can send, through thecomputer bus 125, commands to control the operations of at least some ofthe components configured within the storage product 102. For example,the local host system 120 can send commands to start or stop theoperation of the network interface 113, manage the networkattributes/configuration of the network interface 113, etc. For example,the local host system 120 can send commands to the memory sub-systemcontroller 115 to start or stop its operations. For example, the localhost system 120 can send commands to write data into the local memory119 and read data from the local memory 119. In some implementations, atleast a portion of the controller 115 and the memory devices 130, . . ., 140 are configured as one or more local storage devices (e.g.,solid-state drives) as in FIG. 6 and FIG. 7 ; and the local host system120 can send to the storage device commands for storage operations, suchas create or delete namespaces, read data at specified addresses, writedata at specified addresses, erase data at specified addresses, etc.

Optionally, the local host system 120 has limited access to thecomponents in the memory sub-system 110. For example, the access can belimited to the receiving of the messages 133 identified by the networkinterface 113 according to the message selection configuration 201 forprocessing by an external processor of the storage product 102 andsending the control messages 137 responsive to the selected messages 133or responsive to user inputs specified in the user interface providedvia the instructions executed in the local host system 120.

FIG. 5 illustrates a technique to configure a storage product to routemessages for processing on different paths according to one embodiment.

For example, the messages received in the network interface 113 of thememory sub-system 110 in FIG. 1 , FIG. 2 , and/or FIG. 4 can beseparated for processing by a local host system and a storage devicerespectively.

In FIG. 5 , incoming packets 202 received in the network interface 113are used to construct storage access messages 151. The messages 151 canhave different types, attributes, and/or parameters. The messages 151can include messages 205, 207, and 206. A demultiplexer 203 iscontrolled by a message selection configuration 201 to separate themessages 205, 207, and 206 for different processing paths.

The message selection configuration 201 can specify host selectioncriteria 217 and local selection criteria 219 to select messages for thelocal host system 120 and for a local storage device 105 respectively.

A message 205 that satisfies the host selection criteria 217 isdispatched by the demultiplexer 203 to the local host system 120. Inresponse to the message 205, the local host system 120 can generate oneor more messages 209 for further processing by the local storage device105. Such a message 205 is not provided to the local storage device 105without going through the local host system 120.

For example, a storage application 215 running in the local host system120 can be configured to process the input messages 205 and generate theoutput messages 209 for the local storage device 105.

A message 207 that satisfies the local selection criteria 219 isdispatched by the demultiplexer 203 to the local storage device 105without going through the local host system 120.

A message 206 does not satisfy the host selection criteria 217 and doesnot satisfy the local selection criteria 219. The multiplexer 203selects and discard 210 such a message 206.

In some implementations, the local host system 120 can also receive userinputs 204 from a user interface 211 to generate output messages 209 forthe local storage device 105.

FIG. 5 illustrates the selection of messages 151 coming from the networkinterface 113 for processing by the local host system 120 or the localstorage device 105. Similarly, a portion of the responsive messages 155generated by the local storage device 105 can also be optionallyidentified in the message selection configuration 201 for processing bythe local host system 120. The local host system 120 processes theselected receive messages 155 to generate resulting messages andprovides the resulting message to the storage product 102 fortransmission via the network interface 113.

FIG. 6 shows a storage product having a storage device, a network port,and a bus connector to an external processor according to oneembodiment.

For example, the storage product 102 of FIG. 4 can be implemented in away illustrated in FIG. 6 with a message dispatching techniqueillustrated in FIG. 5 .

In FIG. 6 , the storage product 102 has an interconnect 103 connecting abus connector 104, a network interface 113, a processing device 107connected to a random-access memory 101, and a local storage device 105.For example, the interconnect 103 can be one or more computer buses.

An external processor (e.g., local host system 120) can access a portionof the functions or circuits in the storage product 102 via the busconnector 104. The external processor can be programmed via instructionsto control operations in the memory sub-system 110 by specifying amessage selection configuration 201 for receiving messages 205 forprocessing, and by generating messages 209 for execution in the localstorage device 105.

The random-access memory 101 can be accessible to the local host system120 over a computer bus 125. For example, messages 205 to be processedby the local host system 120 and/or messages 209 to be transmitted tothe storage device 105 can be buffered in the random-access memory 101.The random-access memory 101 can be implemented using dynamicrandom-access memory (DRAM), synchronous dynamic random-access memory(SDRAM), static random-access memory (SRAM), three-dimensionalcross-point (“3D cross-point”) memory, etc.

The storage application 215 running in the local host system 120 canwrite the message selection configuration 201 into a predeterminedlocation in the random-access memory 101. The processing device 107 ofthe memory sub-system 110 is configured to retrieve the messageselection configuration 201 from the random-access memory 101. Theprocessing device 107 is configured to identify messages 205 to beprocessed by the storage application 215 based on the criteria specifiedin the message selection configuration 201.

In some implementations, the message selection configuration 201 iscommunicated from the local host system 120 to the storage product 102during a power up process of the local storage device 105. Theprocessing device 107 can retrieve the message selection configuration201 from the random-access memory 101 and then control message flows inthe memory sub-system 110 according to the retrieved message selectionconfiguration 201.

In some implementations, a predetermined portion of the random-accessmemory 101 is configured to store the message selection configuration201 to control the processing device 107. The local host system 120 candynamically change the message selection configuration 201 to controlmessage flows.

In some implementations, a register file or a non-volatile memory of thememory sub-system 110 is configured to store the message selectionconfiguration 201 that controls the message flows.

The local storage device 105 can provide the storage capacity 143 of thestorage product 102 accessible over a computer network 114. For example,the local storage device 105 can have integrated circuit memory devices130, . . . , 140 to provide the storage capacity 143. For example, thestorage device 105 can be configured as a solid-state drive usable on acomputer peripheral bus through its host interface 109. In someimplementations, the storage device 105 is a solid-state drive (SSD) ora BGA SSD. In other embodiments, a hard disk drive can be used as thestorage device 105.

The storage product 102 can be enclosed in a housing or casing 170 toprotect the components of the memory sub-system 110. Access to functionsof the components within the storage product can be limited to the useof the bus connector 104 and the network port 106. Since the resourcesof the memory sub-system 110 are designed to be sufficient to handlerequests received according to the communication bandwidth of thenetwork interface 113, the storage product 102 does not offer optionsfor a user to customize its hardware (e.g., adding components, removingcomponents, altering connections, etc.).

In some implementations, the network interface 113 includes a wirelesstransceiver for a wireless network connection; and the network port 106includes a connector for an antenna.

In FIG. 6 , the network interface 113 includes, or is controlled by, aprocessing device 107 (e.g., a logic circuit, a controller, or aprocessor). The processing device 107 is configured to process packetsreceived from the computer network 114 and to generate packets fortransmitting messages (e.g., response message 155) into the computernetwork 114.

The processing device 107 of the network interface 113 is furtherconfigured to identify and separate messages for the local host system120 and the storage device 105 according to the message selectionconfiguration 201. A portion of messages received in the networkinterface 113 from the computer network 114 is identified and providedto the local host system 120 for processing. For example, controlmessages 133 are identified and selected for processing by the localhost system 120 in view of access control configuration data 141. Forexample, the processing device 107 connected to the network interface113 can buffer the messages 205 selected for processing by the localhost system 120 in the random-access memory 101 (e.g., in one or morequeues); and the local host system 120 can be configured (e.g., via anoperating system 213 and/or a storage application 215) to retrieve themessages 205 to determine whether to accept or reject the requests inthe retrieved messages 205, whether to transform the retrieved messages205, and/or whether to generate new messages 209 for processing by thestorage device 105 and/or the storage product 102.

The processing device 107 can forward the remaining messages receivedvia the network interface 113 from the computer network 114 (e.g., datamessages 135) to the storage device 105 without the messages goingthrough the local host system 120. In some implementations, theprocessing device 107 further selects a portion of the incoming storageaccess messages 151 and provides the selected messages 207 to the localstorage device 105; and the remaining messages are discarded, rejected,or ignored as in FIG. 5 .

Optionally, the storage product 102 can be configured to limit theaccess of the local host system 120 to processing the messages bufferedin the random-access memory 101 by the processing device 107 of thenetwork interface 113 and sending the processed or generated messages(e.g., control messages 137) to the storage device 105.

The storage device 105 can have a host interface 109 configured tocommunicate on a bus (e.g., interconnect 103) to receive commands andsend responses.

For example, the interconnect 103 can have a bus of a same type as thecomputer bus 125 that connects the bus connector 104 of the storageproduct 102 and the local host system 120. Alternatively, a hostinterface 112 of the memory sub-system 110 can be used to bridge thecomputer bus 125 and the interconnect 103.

In some implementations, the host interfaces 112 and 109 can support asame communications protocol. In some implementations, the interconnect103 is part of, or an extension of, the computer bus 125 connecting thelocal host system 120 to the random-access memory 101 of the storageproduct 102.

The storage device 105 can have a controller 115 having a local memory119 and a processing device 117, similar to the memory sub-systemcontroller 115 in FIG. 1 . The controller 115 can buffer, in the localmemory 119, commands and data received via the host interface 109. Theprocessing device 117 can be configured via instructions and/or logiccircuits to execute write commands to store data into the memory devices130, . . . , 140, to execute read commands to retrieve host data 131,etc.

FIG. 7 shows a storage product configured on a printed circuit boardaccording to one embodiment.

For example, the storage product 102 of FIG. 4 can be implemented in away illustrated in FIG. 7 with a message dispatching techniqueillustrated in FIG. 5 .

Similar to FIG. 6 , the storage product 102 in FIG. 7 has aninterconnect 103 connecting a bus connector 104, a processing device107, a network interface 113, a random-access memory 101, and a storagedevice 105.

In FIG. 7 , the storage product 102 can be configured in the form of anexpansion card built on a printed circuit board 108. A portion of theprinted circuit board 108 can be configured as the bus connector 104.The bus connector 104 can be inserted into an expansion slot on acomputer bus 125 for connection to a local host system 120.

In FIG. 7 , the memory sub-system 110 has a host interface 112 to bridgethe computer bus 125 and the interconnect 103. In some implementations,the interconnect 103 is part of, or an extension of, the computer bus125, as in FIG. 6 .

In FIG. 7 , the memory sub-system 110 has a processing device 107 thatis separate from the network interface 113. The processing device 107and the network interface 113 can communicate with each other over theinterconnect 103 to process packets to generate messages (e.g., controlmessages 133 and data messages 135) and to transmit messages (e.g.,response messages 155).

In FIG. 7 , the processing device 107 (e.g., a processor or controller)can be programmed to perform operations independent of the local hostsystem 120. The processing device 107 is configured to identify messages205 according to the message selection configuration 201 and place themessages 205 in the random-access memory 101 for processing by the localhost system 120. After the local host system 120 places its outputmessages 209 in the random-access memory 101, the processing device 107is further configured to forward the messages 209 to the storage device105. Thus, the control and access by the local host system 120 can belimited to the random-access memory 101 and the message selectionconfiguration 201.

In some implementations, the processing device 107 and the networkinterface 113 have a direct communication connection not accessible toother components of the storage product 102 as in FIG. 6 . In suchimplementations, the processing device 107 can be considered part of thenetwork interface 113.

Optionally, the printed circuit board 108 also has a casing or housing170 configured to substantially enclose the components of the memorysub-system 110 to prevent tampering.

FIG. 6 and FIG. 7 illustrate examples of one storage device 105 beingconnected to the interconnect 103 of the memory sub-system 110.Optionally, multiple storage devices 105 are configured in the memorysub-system 110 to operate in parallel to match the bandwidth of thenetwork interface 113.

FIG. 8 shows a method to process network messages to access storage of astorage product controlled by an external processor according to oneembodiment.

For example, the method of FIG. 8 can be performed by a storage managerconfigured in a memory sub-system 110 of a storage product 102 and/or alocal host system 120 of FIG. 4 , FIG. 6 and/or FIG. 7 to have differentprocessing paths illustrated in FIG. 2 using a technique of FIG. 5 . Forexample, a storage manager in the memory sub-system 110 can beimplemented to perform operations discussed in connection with thememory sub-system 110; and the storage manager can be implemented via alogic circuit and/or a processing device 117 of the memory sub-systemcontroller 115, and/or instructions programmed to be executed by theprocessing device 117. For example, a storage manager in the local hostsystem 120 can be implemented to perform operations discussed inconnection with the local host system 120; and the storage manager canbe implemented via a logic circuit and/or a processing device 118 of thehost system 120, and/or instructions programmed to be executed by theprocessing device 118.

At block 221, a memory sub-system 110 of a storage product 102 receives,via a bus connector 104 of the storage product 102, a message selectionconfiguration 201 containing first criteria (e.g., host selectioncriteria 217).

For example, the storage product 102 has a bus connector 104, a networkport 106 connected to a network interface 113, a processing device 107as part of the network interface 113 or a separate device, arandom-access memory 101, and a local storage device 105.

For example, the storage product 102 can be manufactured andprovided/distributed by a manufacturer as a computer component. Thestorage product 102 can be in the form of an expansion card having a busconnector 104 insertable into an expansion slot of a mother board for aconnection to a microprocessor. Alternatively, the storage product 102can be in the form similar to a solid-state drive, a hard disk drive, anexternal drive, a network drive, etc., with a port configured in the busconnector 104 adapted for a computer cable of a computer bus 125.

For example, the storage product 102 can have a housing configured toenclose the random-access memory 101, the network interface 113, and thestorage device 105.

For example, the storage product 102 can have a register file configuredto store the message selection configuration 201. The register file canbe configured in a non-volatile memory of the storage product 102.Alternatively, the random-access memory 101 of the memory sub-system canbe used to receive the message selection configuration 201.

For example, the receiving of the message selection configuration 201can be configured to be performed during a power up operation of thestorage product 102. For example, the local host system 120 can writethe message selection configuration 201 into the random-access memory101 during the power up operation to configure and/or customize theoperations of the demultiplexer 203.

In some implementations, the local host system 120 includes a userinterface 211 configured to receive user inputs to specify messageselection criteria (e.g., host selection criteria 217, local selectioncriteria 219) in the message selection configuration 201.

At block 223, a network interface 113 of the storage product 102receives incoming packets 202 from a computer network 114.

At block 225, a processing device 107 of the storage product 102generates incoming storage access messages 151 according to the packets202 from the network interface 113.

At block 227, the processing device 107 identifies, according to thefirst criteria (e.g., host selection criteria 217), first messages 205among the incoming storage access messages 151.

At block 229, the processing device 107 provides, over the bus connector104, the first messages 205 to a local host system 120 connected to thebus connector 104. The local host system 120 has a processor (e.g., aprocessing device 118, a microprocessor, a central processing unit). Theprocessor is external to the storage product 102, connected to the busconnector 104 via a computer bus 125, and configured to process thefirst messages 205 and generate second messages 209.

For example, the providing of the first messages 205 to the local hostsystem 120 can be performed by buffering the first messages 205 in arandom-access memory 101 of the storage product 102. The externalprocessor can be configured to retrieve, through the bus connector 104,the first messages 205 to generate the second messages 209.

At block 231, the storage product 102 receives, through the busconnector 104, the second messages 209 generated by the externalprocessor.

For example, the receiving of the second messages 209 from the externalprocessor can be implemented via the external processor writing thesecond messages 209 into the random-access memory 101.

At block 233, the processing device 107 of the storage product 102identifies, according to the message selection configuration 201, thirdmessages 207 among the incoming storage access messages 151.

For example, the message selection configuration 201 can further containsecond criteria (e.g., local selection criteria 219); and theidentifying of the third messages 207 is according to the secondcriteria. The processing device 107 can further identify, among theincoming messages, fourth messages 206 that do not meet the firstcriteria and do not meet the second criteria; and the processing device107 can reject, block, ignore, or discard the fourth messages 206.

In other implementations, messages not selected according to the firstcriteria are selected as the third messages 207.

In some implementations, further criteria are explicitly specified forthe selection of messages 206 for blocking.

At block 235, the storage product 102 processes the second messages 209and the third messages 207 without assistance from the externalprocessor to provide network storage services over the computer network114 to one or more remote host systems 121.

For example, the network storage services can be based on a storageprotocol according to internet small computer systems interface, fibrechannel, fibre channel over ethernet, network file system, servermessage block, or another technique.

For example, the storage product 102 can provide the second messages 209and the third messages 207 to a local storage device 105 of the storageproduct 102 for processing. The local storage device 105 can beconfigured to buffer its received messages, schedule the bufferedmessages for execution, and execute commands in scheduled messageswithout further help from outside of the storage device 105.

The local storage device 105 can generate response messages 155. Afterreceiving from the local storage device 105 the response messages 155generated in response to the second messages 209 and the third messages207, the processing device 107 can be optionally configured via themessage selection configuration 201 to separate the response messages207 into fifth messages and seventh messages. The fifth messages,identified by the processing device 107, can be provided through the busconnector 104 for processing by the local host system 120 for processingto generate sixth messages. The sixth messages generated by the localhost system 120 and the seventh messages not selected for processing bythe local host system 120 can be provided to the processing device 107for transmission using the network interface 113 into the computernetwork 114 without further assistance from the local host system 120.

Alternatively, all of the response messages 155 can be sent from thelocal storage device 105 to the processing device 107 for transmissionusing the network interface 113 without being examined for selection andfor possible processing by the local host system 120.

In general, a memory sub-system 110 can be a storage device, a memorymodule, or a hybrid of a storage device and memory module. Examples of astorage device include a solid-state drive (SSD), a flash drive, auniversal serial bus (USB) flash drive, an embedded multi-mediacontroller (eMMC) drive, a universal flash storage (UFS) drive, a securedigital (SD) card, and a hard disk drive (HDD). Examples of memorymodules include a dual in-line memory module (DIMM), a small outlineDIMM (SO-DIMM), and various types of non-volatile dual in-line memorymodule (NVDIMM).

The computing system 100 can be a computing device such as a desktopcomputer, a laptop computer, a network server, a mobile device, aportion of a vehicle (e.g., airplane, drone, train, automobile, or otherconveyance), an internet of things (loT) enabled device, an embeddedcomputer (e.g., one included in a vehicle, industrial equipment, or anetworked commercial device), or such a computing device that includesmemory and a processing device.

The computing system 100 can include a host system 120 that is coupledto one or more memory sub-systems 110. FIG. 1 illustrates one example ofa host system 120 coupled to one memory sub-system 110. As used herein,“coupled to” or “coupled with” generally refers to a connection betweencomponents, which can be an indirect communicative connection or directcommunicative connection (e.g., without intervening components), whetherwired or wireless, including connections such as electrical, optical,magnetic, etc.

For example, the host system 120 can include a processor chipset (e.g.,processing device 118) and a software stack executed by the processorchipset. The processor chipset can include one or more cores, one ormore caches, a memory controller (e.g., controller 116) (e.g., NVDIMMcontroller), and a storage protocol controller (e.g., PCIe controller,SATA controller). The host system 120 uses the memory sub-system 110,for example, to write data to the memory sub-system 110 and read datafrom the memory sub-system 110.

The host system 120 can be coupled to the memory sub-system 110 via aphysical host interface. Examples of a physical host interface include,but are not limited to, a serial advanced technology attachment (SATA)interface, a peripheral component interconnect express (PCIe) interface,a universal serial bus (USB) interface, a fibre channel, a serialattached SCSI (SAS) interface, a double data rate (DDR) memory businterface, a small computer system interface (SCSI), a dual in-linememory module (DIMM) interface (e.g., DIMM socket interface thatsupports double data rate (DDR)), an open NAND flash interface (ONFI), adouble data rate (DDR) interface, a low power double data rate (LPDDR)interface, a compute express link (CXL) interface, or any otherinterface. The physical host interface can be used to transmit databetween the host system 120 and the memory sub-system 110. The hostsystem 120 can further utilize an NVM express (NVMe) interface to accesscomponents (e.g., memory devices 130) when the memory sub-system 110 iscoupled with the host system 120 by the PCIe interface. The physicalhost interface can provide an interface for passing control, address,data, and other signals between the memory sub-system 110 and the hostsystem 120. FIG. 1 illustrates a memory sub-system 110 as an example. Ingeneral, the host system 120 can access multiple memory sub-systems viaa same communication connection, multiple separate communicationconnections, and/or a combination of communication connections.

The processing device 118 of the host system 120 can be, for example, amicroprocessor, a central processing unit (CPU), a processing core of aprocessor, an execution unit, etc. In some instances, the controller 116can be referred to as a memory controller, a memory management unit,and/or an initiator. In one example, the controller 116 controls thecommunications over a bus coupled between the host system 120 and thememory sub-system 110. In general, the controller 116 can send commandsor requests to the memory sub-system 110 for desired access to memorydevices 130, 140. The controller 116 can further include interfacecircuitry to communicate with the memory sub-system 110. The interfacecircuitry can convert responses received from the memory sub-system 110into information for the host system 120.

The controller 116 of the host system 120 can communicate with thecontroller 115 of the memory sub-system 110 to perform operations suchas reading data, writing data, or erasing data at the memory devices130, 140 and other such operations. In some instances, the controller116 is integrated within the same package of the processing device 118.In other instances, the controller 116 is separate from the package ofthe processing device 118. The controller 116 and/or the processingdevice 118 can include hardware such as one or more integrated circuits(ICs) and/or discrete components, a buffer memory, a cache memory, or acombination thereof. The controller 116 and/or the processing device 118can be a microcontroller, special-purpose logic circuitry (e.g., a fieldprogrammable gate array (FPGA), an application specific integratedcircuit (ASIC), etc.), or another suitable processor.

The memory devices 130, 140 can include any combination of the differenttypes of non-volatile memory components and/or volatile memorycomponents. The volatile memory devices (e.g., memory device 140) canbe, but are not limited to, random-access memory (RAM), such as dynamicrandom-access memory (DRAM) and synchronous dynamic random-access memory(SDRAM).

Some examples of non-volatile memory components include a negative-and(or, NOT AND) (NAND) type flash memory and write-in-place memory, suchas three-dimensional cross-point (“3D cross-point”) memory. Across-point array of non-volatile memory can perform bit storage basedon a change of bulk resistance, in conjunction with a stackablecross-gridded data access array. Additionally, in contrast to manyflash-based memories, cross-point non-volatile memory can perform awrite in-place operation, where a non-volatile memory cell can beprogrammed without the non-volatile memory cell being previously erased.NAND type flash memory includes, for example, two-dimensional NAND (2DNAND) and three-dimensional NAND (3D NAND).

Each of the memory devices 130 can include one or more arrays of memorycells. One type of memory cell, for example, single level cells (SLC)can store one bit per cell. Other types of memory cells, such asmulti-level cells (MLCs), triple level cells (TLCs), quad-level cells(QLCs), and penta-level cells (PLCs) can store multiple bits per cell.In some embodiments, each of the memory devices 130 can include one ormore arrays of memory cells such as SLCs, MLCs, TLCs, QLCs, PLCs, or anycombination of such. In some embodiments, a particular memory device caninclude an SLC portion, an MLC portion, a TLC portion, a QLC portion,and/or a PLC portion of memory cells. The memory cells of the memorydevices 130 can be grouped as pages that can refer to a logical unit ofthe memory device used to store data. With some types of memory (e.g.,NAND), pages can be grouped to form blocks.

Although non-volatile memory devices such as 3D cross-point type andNAND type memory (e.g., 2D NAND, 3D NAND) are described, the memorydevice 130 can be based on any other type of non-volatile memory, suchas read-only memory (ROM), phase change memory (PCM), self-selectingmemory, other chalcogenide based memories, ferroelectric transistorrandom-access memory (FeTRAM), ferroelectric random-access memory(FeRAM), magneto random-access memory (MRAM), spin transfer torque(STT)-MRAM, conductive bridging RAM (CBRAM), resistive random-accessmemory (RRAM), oxide based RRAM (OxRAM), negative-or (NOR) flash memory,and electrically erasable programmable read-only memory (EEPROM).

A memory sub-system controller 115 (or controller 115 for simplicity)can communicate with the memory devices 130 to perform operations suchas reading data, writing data, or erasing data at the memory devices 130and other such operations (e.g., in response to commands scheduled on acommand bus by controller 116). The controller 115 can include hardwaresuch as one or more integrated circuits (ICs) and/or discretecomponents, a buffer memory, or a combination thereof. The hardware caninclude digital circuitry with dedicated (i.e., hard-coded) logic toperform the operations described herein. The controller 115 can be amicrocontroller, special-purpose logic circuitry (e.g., a fieldprogrammable gate array (FPGA), an application specific integratedcircuit (ASIC), etc.), or another suitable processor.

The controller 115 can include a processing device 117 (processor)configured to execute instructions stored in a local memory 119. In theillustrated example, the local memory 119 of the controller 115 includesan embedded memory configured to store instructions for performingvarious processes, operations, logic flows, and routines that controloperation of the memory sub-system 110, including handlingcommunications between the memory sub-system 110 and the host system120.

In some embodiments, the local memory 119 can include memory registersstoring memory pointers, fetched data, etc. The local memory 119 canalso include read-only memory (ROM) for storing micro-code. While theexample memory sub-system 110 in FIG. 1 has been illustrated asincluding the controller 115, in another embodiment of the presentdisclosure, a memory sub-system 110 does not include a controller 115,and can instead rely upon external control (e.g., provided by anexternal host, or by a processor or controller separate from the memorysub-system).

In general, the controller 115 can receive commands or operations fromthe host system 120 and can convert the commands or operations intoinstructions or appropriate commands to achieve the desired access tothe memory devices 130. The controller 115 can be responsible for otheroperations such as wear leveling operations, garbage collectionoperations, error detection and error-correcting code (ECC) operations,encryption operations, caching operations, and address translationsbetween a logical address (e.g., logical block address (LBA), namespace)and a physical address (e.g., physical block address) that areassociated with the memory devices 130. The controller 115 can furtherinclude host interface circuitry to communicate with the host system 120via the physical host interface. The host interface circuitry canconvert the commands received from the host system into commandinstructions to access the memory devices 130 as well as convertresponses associated with the memory devices 130 into information forthe host system 120.

The memory sub-system 110 can also include additional circuitry orcomponents that are not illustrated. In some embodiments, the memorysub-system 110 can include a cache or buffer (e.g., DRAM) and addresscircuitry (e.g., a row decoder and a column decoder) that can receive anaddress from the controller 115 and decode the address to access thememory devices 130.

In some embodiments, the memory devices 130 include local mediacontrollers 150 that operate in conjunction with the memory sub-systemcontroller 115 to execute operations on one or more memory cells of thememory devices 130. An external controller (e.g., memory sub-systemcontroller 115) can externally manage the memory device 130 (e.g.,perform media management operations on the memory device 130). In someembodiments, a memory device 130 is a managed memory device, which is araw memory device combined with a local controller (e.g., local mediacontroller 150) for media management within the same memory devicepackage. An example of a managed memory device is a managed NAND (MNAND)device.

The controller 115 and/or a memory device 130 can include a storagemanager configured to implement the functions discussed above. In someembodiments, the controller 115 in the memory sub-system 110 includes atleast a portion of the storage manager. In other embodiments, or incombination, the controller 116 and/or the processing device 118 in thehost system 120 includes at least a portion of the storage manager. Forexample, the controller 115, the controller 116, and/or the processingdevice 118 can include logic circuitry implementing the storage manager.For example, the controller 115, or the processing device 118(processor) of the host system 120, can be configured to executeinstructions stored in memory for performing the operations of thestorage manager described herein. In some embodiments, the storagemanager is implemented in an integrated circuit chip disposed in thememory sub-system 110. In other embodiments, the storage manager can bepart of firmware of the memory sub-system 110, an operating system ofthe host system 120, a device driver, or an application, or anycombination thereof.

In one embodiment, an example machine of a computer system within whicha set of instructions, for causing the machine to perform any one ormore of the methodologies discussed herein, can be executed. In someembodiments, the computer system can correspond to a host system (e.g.,the host system 120 of FIG. 1 ) that includes, is coupled to, orutilizes a memory sub-system (e.g., the memory sub-system 110 of FIG. 1) or can be used to perform the operations of a storage manager (e.g.,to execute instructions to perform operations corresponding tooperations described with reference to FIG. 1 -FIG. 8 ). In alternativeembodiments, the machine can be connected (e.g., networked) to othermachines in a LAN, an intranet, an extranet, and/or the Internet. Themachine can operate in the capacity of a server or a client machine inclient-server network environment, as a peer machine in a peer-to-peer(or distributed) network environment, or as a server or a client machinein a cloud computing infrastructure or environment.

The machine can be a personal computer (PC), a tablet PC, a set-top box(STB), a personal digital assistant (PDA), a cellular telephone, a webappliance, a server, a network router, a switch or bridge, anetwork-attached storage facility, or any machine capable of executing aset of instructions (sequential or otherwise) that specify actions to betaken by that machine. Further, while a single machine is illustrated,the term “machine” shall also be taken to include any collection ofmachines that individually or jointly execute a set (or multiple sets)of instructions to perform any one or more of the methodologiesdiscussed herein.

The example computer system includes a processing device, a main memory(e.g., read-only memory (ROM), flash memory, dynamic random-accessmemory (DRAM) such as synchronous DRAM (SDRAM) or Rambus DRAM (RDRAM),static random-access memory (SRAM), etc.), and a data storage system,which communicate with each other via a bus (which can include multiplebuses).

Processing device represents one or more general-purpose processingdevices such as a microprocessor, a central processing unit, or thelike. More particularly, the processing device can be a complexinstruction set computing (CISC) microprocessor, reduced instruction setcomputing (RISC) microprocessor, very long instruction word (VLIW)microprocessor, or a processor implementing other instruction sets, orprocessors implementing a combination of instruction sets. Processingdevice can also be one or more special-purpose processing devices suchas an application specific integrated circuit (ASIC), a fieldprogrammable gate array (FPGA), a digital signal processor (DSP),network processor, or the like. The processing device is configured toexecute instructions for performing the operations and steps discussedherein. The computer system can further include a network interfacedevice to communicate over the network.

The data storage system can include a machine-readable medium (alsoknown as a computer-readable medium) on which is stored one or more setsof instructions or software embodying any one or more of themethodologies or functions described herein. The instructions can alsoreside, completely or at least partially, within the main memory and/orwithin the processing device during execution thereof by the computersystem, the main memory and the processing device also constitutingmachine-readable storage media. The machine-readable medium, datastorage system, and/or main memory can correspond to the memorysub-system 110 of FIG. 1 .

In one embodiment, the instructions include instructions to implementfunctionality corresponding to a storage manager (e.g., the operationsdescribed with reference to FIG. 1 to FIG. 8 ). While themachine-readable medium is shown in an example embodiment to be a singlemedium, the term “machine-readable storage medium” should be taken toinclude a single medium or multiple media that store the one or moresets of instructions. The term “machine-readable storage medium” shallalso be taken to include any medium that is capable of storing orencoding a set of instructions for execution by the machine and thatcause the machine to perform any one or more of the methodologies of thepresent disclosure. The term “machine-readable storage medium” shallaccordingly be taken to include, but not be limited to, solid-statememories, optical media, and magnetic media.

Some portions of the preceding detailed descriptions have been presentedin terms of algorithms and symbolic representations of operations ondata bits within a computer memory. These algorithmic descriptions andrepresentations are the ways used by those skilled in the dataprocessing arts to convey the substance of their work most effectivelyto others skilled in the art. An algorithm is here, and generally,conceived to be a self-consistent sequence of operations leading to adesired result. The operations are those requiring physicalmanipulations of physical quantities. Usually, though not necessarily,these quantities take the form of electrical or magnetic signals capableof being stored, combined, compared, and otherwise manipulated. It hasproven convenient at times, principally for reasons of common usage, torefer to these signals as bits, values, elements, symbols, characters,terms, numbers, or the like.

It should be borne in mind, however, that all of these and similar termsare to be associated with the appropriate physical quantities and aremerely convenient labels applied to these quantities. The presentdisclosure can refer to the action and processes of a computer system,or similar electronic computing device, that manipulates and transformsdata represented as physical (electronic) quantities within the computersystem's registers and memories into other data similarly represented asphysical quantities within the computer system memories or registers orother such information storage systems.

The present disclosure also relates to an apparatus for performing theoperations herein. This apparatus can be specially constructed for theintended purposes, or it can include a general-purpose computerselectively activated or reconfigured by a computer program stored inthe computer. Such a computer program can be stored in a computerreadable storage medium, such as, but not limited to, any type of diskincluding floppy disks, optical disks, CD-ROMs, and magnetic-opticaldisks, read-only memories (ROMs), random-access memories (RAMs), EPROMs,EEPROMs, magnetic or optical cards, or any type of media suitable forstoring electronic instructions, each coupled to a computer system bus.

The algorithms and displays presented herein are not inherently relatedto any particular computer or other apparatus. Various general-purposesystems can be used with programs in accordance with the teachingsherein, or it can prove convenient to construct a more specializedapparatus to perform the method. The structure for a variety of thesesystems will appear as set forth in the description below. In addition,the present disclosure is not described with reference to any particularprogramming language. It will be appreciated that a variety ofprogramming languages can be used to implement the teachings of thedisclosure as described herein.

The present disclosure can be provided as a computer program product, orsoftware, that can include a machine-readable medium having storedthereon instructions, which can be used to program a computer system (orother electronic devices) to perform a process according to the presentdisclosure. A machine-readable medium includes any mechanism for storinginformation in a form readable by a machine (e.g., a computer). In someembodiments, a machine-readable (e.g., computer-readable) mediumincludes a machine (e.g., a computer) readable storage medium such as aread only memory (“ROM”), random-access memory (“RAM”), magnetic diskstorage media, optical storage media, flash memory components, etc.

In this description, various functions and operations are described asbeing performed by or caused by computer instructions to simplifydescription. However, those skilled in the art will recognize what ismeant by such expressions is that the functions result from execution ofthe computer instructions by one or more controllers or processors, suchas a microprocessor. Alternatively, or in combination, the functions andoperations can be implemented using special-purpose circuitry, with orwithout software instructions, such as using application-specificintegrated circuit (ASIC) or field-programmable gate array (FPGA).Embodiments can be implemented using hardwired circuitry withoutsoftware instructions, or in combination with software instructions.Thus, the techniques are limited neither to any specific combination ofhardware circuitry and software, nor to any particular source for theinstructions executed by the data processing system.

In the foregoing specification, embodiments of the disclosure have beendescribed with reference to specific example embodiments thereof. Itwill be evident that various modifications can be made thereto withoutdeparting from the broader spirit and scope of embodiments of thedisclosure as set forth in the following claims. The specification anddrawings are, accordingly, to be regarded in an illustrative senserather than a restrictive sense.

What is claimed is:
 1. A device, comprising: a first interface; a memoryconfigured to be accessible via the first interface; a second interfaceconnectable to a processor that is external to the device; a logiccircuit configured to separate incoming messages received in the firstinterface into first messages and second messages, communicate thesecond messages via the second interface for processing by the processorto generate third messages, and process the first messages and the thirdmessages.
 2. The device of claim 1, wherein the first interface is anetwork interface.
 3. The device of claim 2, wherein the secondinterface is a host interface operatable on a bus connected to theprocessor.
 4. The device of claim 3, wherein the device is configured toreceive via the host interface a message selection configurationidentifying first criteria, and identify the second messages based onthe first criteria.
 5. The device of claim 4, wherein the device isconfigured to receive the third messages via the host interface from theprocessor.
 6. The device of claim 5, wherein the device is configured toprocess the first messages and the third messages without assistancefrom the processor in provision of network storage services responsiveto the incoming messages received in the first interface.
 7. The deviceof claim 6, wherein the message selection configuration further isconfigured to identify second criteria; and the device is configured toidentify the first messages based on the second criteria.
 8. The deviceof claim 7, wherein the device is further configured to identify, amongthe incoming messages received in the first interface, fourth messagesthat do not meet the first criteria and do not meet the second criteria,and reject or block the fourth messages.
 9. The device of claim 8,wherein the network storage services are based on a storage protocolaccording to: internet small computer systems interface; fibre channel;fibre channel over ethernet; network file system; or server messageblock.
 10. A method, comprising: receiving, via a first interface of adevice, incoming messages to access a memory of the device; separating,by the device, the incoming messages received via the first interfaceinto first messages and second messages; communicating, via a secondinterface of the device, the second messages to a processor that isexternal to the device to generate third messages; and processing, bythe device, the first messages and the third messages responsive to theincoming messages to access the memory of the device.
 11. The method ofclaim 10, wherein the incoming messages are configured to access thememory of the device using a storage protocol.
 12. The method of claim11, wherein the storage protocol is according to: internet smallcomputer systems interface; fibre channel; fibre channel over ethernet;network file system; or server message block.
 13. The method of claim11, wherein the first interface is a network interface; and the secondinterface is a host interface operatable on a bus connected to theprocessor.
 14. The method of claim 13, further comprising: receiving,via the host interface, a message selection configuration identifyingfirst criteria; and identifying the second messages based on the firstcriteria.
 15. The method of claim 14, further comprising: receiving, viathe host interface from the processor, the third messages.
 16. Themethod of claim 15, wherein the message selection configuration isfurther configured to identify second criteria; and the method furthercomprises: identifying, based on the second criteria, the first messagesamong the incoming messages.
 17. The method of claim 16, furthercomprising: identifying, among the incoming messages received via thefirst interface, fourth messages that do not meet the first criteria anddo not meet the second criteria; and rejecting or blocking the fourthmessages.
 18. A non-transitory computer storage medium storinginstructions which, when executed in a device, cause the device toperform a method, comprising: receiving, via a first interface of thedevice, incoming messages to access a memory of the device; separating,by the device, the incoming messages received via the first interfaceinto first messages and second messages; communicating, via a secondinterface of the device, the second messages to a processor that isexternal to the device to generate third messages; and processing, bythe device, the first messages and the third messages responsive to theincoming messages to access the memory of the device.
 19. Thenon-transitory computer storage medium of claim 18, wherein the methodfurther comprises: receiving, via the second interface, a messageselection configuration identifying first criteria; and identifying thesecond messages based on the first criteria.
 20. The non-transitorycomputer storage medium of claim 19, wherein the message selectionconfiguration is further configured to identify second criteria; and themethod further comprises: identifying, based on the second criteria, thefirst messages among the incoming messages; identifying, among theincoming messages received via the first interface, fourth messages thatdo not meet the first criteria and do not meet the second criteria; andrejecting or blocking the fourth messages.