Partial allocate paging mechanism using a controller and a buffer

ABSTRACT

A memory system is provided. The system includes a controller that regulates read and write access to one or more FLASH memory devices that are employed for random access memory applications. A buffer component operates in conjunction with the controller to regulate read and write access to the one or more FLASH devices. Wear leveling components along with read and write processing components are provided to facilitate efficient operations of the FLASH memory devices.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a Continuation of, and claims priority to, U.S. Pat.No. 8,352,671 issued on Jan. 8, 2013, the entire contents of which ishereby incorporated herein by reference.

TECHNICAL FIELD

The subject innovation relates generally to memory systems and inparticular to systems and methods that employ FLASH memory technology inlieu of conventional DRAM memory subsystems.

BACKGROUND

A wide variety of memory devices can be used to maintain and store dataand instructions for various computers and similar systems. Inparticular, flash memory is a type of electronic memory media that canbe rewritten and that can retain content without consumption of power.Unlike dynamic random access memory (DRAM) devices and static randommemory (SRAM) devices in which a single byte can be erased, flash memorydevices are typically erased in fixed multi-bit blocks or sectors. Flashmemory technology can include NOR flash memory and/or NAND flash memory,for example. Flash memory devices typically are less expensive anddenser as compared to many other memory devices, meaning that flashmemory devices can store more data per unit area.

Flash memory has become popular, at least in part, because it combinesthe advantages of the high density and low cost of EPROM with theelectrical erasability of EEPROM. Flash memory is nonvolatile; it can berewritten and can hold its content without power. It can be used in manyportable electronic products, such as cell phones, portable computers,voice recorders, thumbnail drives and the like, as well as in manylarger electronic systems, such as cars, planes, industrial controlsystems, etc. The fact that flash memory can be rewritten, as well asits retention of data without a power source, small size, and lightweight, have all combined to make flash memory devices useful andpopular means for transporting and maintaining data.

Typically, when data is stored in a physical location (e.g., physicalblock address (PBA)) in a memory device, a system block address (LBA)can be associated with the data to facilitate retrieval of the data fromthe memory by a host. An address translation table can be used to storethe translations of LBAs to the PBAs. When the host requests data fromor desires to write data to a particular LBA, the address translationtable can be accessed to determine the PBA that is associated with theLBA. The LBA associated with the data can remain the same even if thePBA where the data is stored changes. For example, a block of memorycontaining the PBA can have antiquated data in other memory locations inthe block. The block of memory can be erased to reclaim the block, andvalid data stored in the block, including the data in the PBA, can bemoved to new physical locations in the memory. While the PBA of the datais changed, the LBA can remain the same. The address translation tablecan be updated to associate the new PBA with the LBA.

Conventionally, when a host processor desires to access a memorylocation the host processor can send a command to the memory thatspecifies the LBA the host processor wants to access. The LBA can bemapped to a PBA where the PBA will be used to actually address the DRAMor FLASH memory.

In conventional computing systems, DRAM technology has typically beenemployed to operate the dynamic memory of the computer in order for anapplication to operate at high speeds. Slower speed memories such ashard drives and FLASH technology have been utilized for non-volatilelong term storage requirements. As previously noted, FLASH provideslower power consumption with higher density capability per package sizethan DRAM. It would be desirable if some of the advantages of FLASHtechnology could be exploited to support many of the applications thatare currently running with DRAM technology. Unfortunately, therecurrently are bandwidth issues with FLASH that would not allow for adirect substitution with existing DRAM applications.

SUMMARY

The following presents a simplified summary of the innovation in orderto provide a basic understanding of some aspects described herein. Thissummary is not an extensive overview of the disclosed subject matter. Itis intended to neither identify key or critical elements of thedisclosed subject matter nor delineate the scope of the subjectinnovation. Its sole purpose is to present some concepts of thedisclosed subject matter in a simplified form as a prelude to the moredetailed description that is presented later.

Systems and methods are provided that enable FLASH memory technologiesto be utilized for existing DRAM applications in computer memorysubsystems. Various components and processes are provided to facilitatetiming and other component differences between existing DRAMapplications and FLASH capabilities. In one aspect, an expansion slot isemployed to provide additional FLASH capability for a computer, wherethe slot is controlled by an application specific integrated circuit(ASIC) that controls timing to the FLASH. A buffer area of DRAM ismaintained to process high speed write requirements and allow slowermemory updates to the FLASH during background operations that occur overtime.

In order to prevent any one sector of FLASH from becoming worn overtime, wear leveling mechanisms are provided that re-map one sector ofFLASH to another. In one aspect, a DRAM buffer provides a temporarystorage area for files to be moved from one memory location to another.In other aspects, operating system enhancements can allow free listmechanisms to be utilized for management of memory wear. In yet anotheraspect, DRAM buffers are sized appropriately for given applications andto account for nuances of FLASH timing requirements. This includessizing the DRAM buffer greater than expected needs for an existingapplication. If the change rate of application memory is slower than thetime to update FLASH, then enable moving contents of the buffer atsuitable times. If an application employs bursting behavior where datais not written to memory very often but a high rates of speed, thebuffer can be employed to capture the burst and then move the data toFLASH over time. In yet another aspect, read bandwidth issues after anapplication memory write are considered. Write data for an applicationof the page from FLASH may be partially allocated to DRAM while notcompletely copying the associated data for the application from FLASH.The partially allocated data is then read from DRAM and written to FLASHwhen the respective DRAM page is moved to flash.

The following description and the annexed drawings set forth in detailcertain illustrative aspects of the disclosed subject matter. Theseaspects are indicative, however, of but a few of the various ways inwhich the principles of the innovation may be employed and the disclosedsubject matter is intended to include all such aspects and theirequivalents. Other advantages and distinctive features of the disclosedsubject matter will become apparent from the following detaileddescription of the innovation when considered in conjunction with thedrawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a block diagram of a FLASH memory architectureemployed for random access memory applications.

FIG. 2 depicts a block diagram of a wear leveling system for FLASHmemory.

FIG. 3 is a block diagram depicting DRAM sizing and FLASH writeconsiderations.

FIG. 4 illustrates a block diagram of a system that partially allocatescontents from FLASH to mitigate system bus activity.

FIGS. 5 and 6 depicts example FLASH subsystems that employ DRAM buffersto facilitate FLASH interface requirements.

FIG. 7 illustrates a block diagram of an example DRAM buffer managementsystem.

FIGS. 8 and 9 depict example addressing formats.

FIG. 10 illustrates an example DRAM write handling process.

FIG. 11 depicts an example process for evicting data from DRAM to FLASH.

FIG. 12 illustrates an example flash management block diagram.

FIG. 13 illustrates an example flash sector table entry format.

FIG. 14 illustrates an example read path flow diagram.

FIG. 15 illustrates an example of an electronic device that can beassociated with a memory.

DETAILED DESCRIPTION

Systems and/or methods are presented that facilitate usage of FLASHmemory technologies in place of conventional DRAM subsystems. In oneaspect, a memory system is provided. The system includes a controllerthat regulates read and write access to one or more FLASH memory devicesthat are employed for random access memory applications. A buffercomponent operates in conjunction with the controller to regulate readand write access to the one or more FLASH devices. Wear levelingcomponents along with read and write processing components are providedto facilitate efficient operations of the FLASH memory devices.

Referring initially to FIG. 1, a system 100 illustrates a FLASH memoryarchitecture that is employed to support random access computer memoryapplications. The system 100 includes a processor 110 having a memorymanagement unit (MMU) 120 that controls data flows into and out of theprocessor. An application specific integrated circuit (ASIC) 130occupies an expansion slot and communicates to a FLASH component 140 anda DRAM buffer 150. As shown, one or more other slots 160 and 170 can beprovided. In general, the processor 110 supports traditional DRAM dataflows and timing, where in order to employ the FLASH component 140, theASIC 130 provides controlled access to the FLASH component. Controlincludes read and write timing to the FLASH component 140 along withconsideration of wear leveling to any particular sector of the FLASH.The DRAM buffer 150 allows temporary high speed access while backgroundoperations or other processes may be employed to transfer contents ofthe buffer to FLASH. The buffer can also be used for a temporary copyarea to allow one area of FLASH to be re-mapped to another location ofFLASH to mitigate wear in a given memory location.

In general, the processor 110 can communicate with each of the expansionslots 130, 160, and 170, where each slot can communicate with two ormore channels. The ASIC 130 employs one channel (or more) to communicatewith the FLASH component 140 and another channel (or more) tocommunicate with the DRAM buffer 150. As data from an application iswritten into the temporary DRAM buffer 150, it can be moved to the FLASH140 during background operations or in accordance with other proceduresdescribed in more detail below. In an alternative aspect, an operatingsystem (not shown) can be modified to recognize the FLASH component140/DRAM Buffer 150 and thus employ the MMU 120 to update the FLASH fromthe DRAM buffer. The ASIC 130 basically controls or provides acontrolled access in accordance with timing of the FLASH component 140.As can be appreciated, the expansion slots can be employed in variousaspects. This include providing additional ASIC/memory expansion,providing additional FLASH capability of adding additional buffermemory. Memory can be configured as a dual inline memory module (DIMM)for the ASIC, FLASH, and/or DRAM buffer respectively. Thus, theexpansion slots can be used to provide more ASIC capabilities, moreFLASH capabilities, and/or more DRAM buffer capability. It is to beappreciated that dual in line memory module configurations are but oneof many possible configurations and that substantially any type ofpackaging arrangement for FLASH and/or DRAM are possible.

The system 100 can include one or more memory components that can becomprised of a non-volatile memory (e.g., flash memory) and/or volatilememory (e.g., random access memory (RAM)). The memory components canreceive information, including data, commands, and/or other information,which can be processed (e.g., store data, execute commands, etc.). Thememory components can include a memory array that can receive and storedata. The memory array can include a plurality of memory cells whereineach memory cell can store one or more bits of data. Data stored in amemory cell(s) in the memory array can be read and such data can beprovided as an output, or can be erased from the memory cell(s) inaccordance with the timing and wear considerations of the FLASHcomponent 140.

Conventionally, when data is desired from a memory (e.g., flash memory),a host processor 130 can issue a command to the memory, where the memorycommand can include information regarding the particular memory deviceand a particular block, where the data can be stored on a page withinthe block. The memory can load a page from that block into a buffer(e.g., page buffer), where typically there can be multiple loads inorder to load the page. In one aspect, the memory array can be comprisedof a predetermined number of blocks, where a block can be the minimumportion of the memory component (e.g., flash memory) that can be erasedand programmed during an erase operation.

Turning to FIG. 2, a system 200 illustrates wear leveling concepts forFLASH memory devices. In this aspect, consideration is given to theconcept that FLASH devices can wear out over time if the same memoryaddresses are always employed. Conventionally, FLASH memories weremanaged similar to a disk where a file system for memory management isused. The operating system communicates with the file system whichinforms about deleting or adding of files to the memory. The file systemis aware of unmapped or free sectors within FLASH memory. When wearleveling is applied, a frequently written sector is de-mapped andreplaced by an infrequently written sector. From the free sector pool.For a completely full memory, this process can be entirely inefficientin that swapping of sectors can take up to two program writes andcorresponding erase procedures.

The system 200 illustrates different operations to perform wear levelingin a FLASH based random access system. As shown, a memory manager 210communicates with a FLASH memory 220. An additional DRAM buffer 230 isprovided that is not visible to the main memory/operating systemarchitecture. The DRAM buffer 230 is employed as a temporary storagearea to allow re-mapping of lightly used FLASH addresses with moreheavily used areas of FLASH. Thus, the DRAM buffer is only visibly tothe memory manager 210 and employed as a data exchange area for areas ofFLASH memory that are heavily used. The spare capacity provided by theDRAM buffer 230 provides sector swap capabilities to facilitate wearleveling across the FLASH 220. In an alternative aspect, operatingsystem software can be modified to provide a free list component 240.The operating system can inform an ASIC or other controller of areas ofrandom access memory that are considered free and not currently in useby one or more applications. Such free list areas can be employed inlieu of the DRAM buffer 230 for wear leveling. As can be appreciated, acombination of DRAM buffer 230 and the free list component 240 couldalso be employed to perform wear leveling. It is noted that variouscounters can be maintained to track what sectors have been used and todetermine when to perform wear leveling in the system e.g., thresholdcounter levels to determine when to swap highly used sectors withlightly used ones.

Referring now to FIG. 3, a system 300 illustrates write timing access.As shown, write data 310 is controlled by a memory manager 320. Thewrite data can be captured by a DRAM buffer 330 and subsequently movedto a FLASH memory 340 over time such as background operations of aprocess or thread. By moving the write data 310 over time, the slowerwrite times for the FLASH can be accommodated. In general, the DRAMbuffer 330 can be sized differently depending on applicationconsiderations. In one aspect, at 350, the DRAM 330 is sized such thatit can temporarily hold data for any working set of a given application.In another aspect at 360, if the change rate of the write working set tothe DRAM buffer 330 is slower than the update rates to the FLASH 340,then even though the application can demand a much higher bandwidth thanthe flash can offer, such application can still execute efficiently onthe system.

In yet another aspect, bursting behavior is considered at 370. Here,data to be written may not change all that often but when data iswritten, it is written at a high rate over a short period of time. Inthis case, the DRAM 330 can be employed to capture the high data rateand use background operations to spread that rate out over time. Inother cases, operating system behavior can be modified to mitigatebursts such that data that is updated infrequently can be written over alonger period of time. Generally, data is written to the FLASH in chunksof sectors. Thus, typically at least one sector is cached in the DRAMbefore subsequently updating the FLASH.

Referring now to FIG. 4, read and write bandwidth consideration issuesare discussed for FLASH memory updates. As discussed above, write data410 to a FLASH 420 is typically controlled by an ASIC performing amemory manager function 430 that controls timing to the FLASH. In orderto mitigate system bandwidth from slowing down (e.g., copying from FLASHto buffer and vice versa), it is also desirable to mitigate how oftencontents of the FLASH 420 are copied into a temporary DRAM storage area440. In conventional architectures, it is typical to copy all thecontents for an application into working memory such as paging in from adisk. In this case, a partial allocation function 450 is written where asmall section of the FLASH 420 is copied into the DRAM 440 and updatedwith the corresponding write data 410 from the application. If theapplication needs to read data, the small sector that has been updatedcan be read from the DRAM 440 and the rest of the application data thatwas not copied can be read from FLASH.

Over time or after the page is no longer used, the updated writecontents of the DRAM can be transferred into the FLASH 420 as previouslydescribed above. The partial allocate function 450 operates overincoming write requests that are written to DRAM pages. Othernon-modified data is not brought into the DRAM from the FLASH 420 thusconserving the number of read and write cycles on the system bus. Themodified page can stay in DRAM 440 as long as needed. Before proceeding,it is noted that FIGS. 5-16 are provided as but one example of animplementation for the concepts described above. It is to be appreciatedthat other examples are possible.

FIG. 5 illustrates a dual channel memory architecture 500. As shown, anASIC 510 communicates with a buffer memory of dynamic data ram (DDR)dual inline memory (DIMM) modules at 520 and over a first channel ofaddress and command at 530. A second channel 540 communicates with FLASHmemory in a DIMM configuration. The DIMM 520 is used as a temporarybuffer for the FLASH and to facilitate such functions as wear leveling.Similarly, FIG. 6 shows DRAM data 610 which is mainly received as writedata 620 from a central processor and transferred to FLASH at 630 andsubsequently read from FLASH at 640.

In general, the DRAM serves as the write data staging area for incomingsystem writes. Thus, it holds frequently written pages/sector in DRAM aslong as possible if there is enough room in DRAM. The buffer stores thesame number of page entries as the number of pages in DRAM. This caninclude using associativity to minimize conflict misses. Such mechanismscan be bypassed via configuration register set up for applications thathave low write demand and have larger write working sets.

Referring to FIG. 7, an example DRAM management system 700 isillustrated. The system 700 includes a DRAM buffer page table 710 thatupdates one or more DRAM DIMM's 720 and writes to an in-sector writepage gathering component 730. Other components include write access logfor monitoring DRAM wear and access and an evict sector control 750. Asector data merge control 760 facilitates moving data to and from thebuffer and the FLASH, respectively.

Some other aspects to consider include setting limits on the amount ofDRAM e.g., 4 GB maximum. Other aspects include processing In-comingWrites from the processor are of the size 64 B but other sizes can beemployed. One sector (in this context is 128 kB*8 devices) equals to 1MB. Sector based write activity log based on frequency and time ofWrites in the past. This log can be used by replacement algorithm chosento decide which sector to be evicted to flash. The DRAM is typicallymanaged by the DRAM buffer page table 710 organized as 256 k pagetranslation entries with 16 kB page size. A 1 MB sector can have 64“DRAM buffer pages” for example. When a sector is chosen for eviction,the possible pages within the sector can be evicted from the DRAM andthe corresponding “DRAM buffer page table” entry cleared. Page data canbe moved from DRAM to Flash in a background operation except when a pageor sector is still frequently written or DRAM is exhausted. A Watermarkmechanism combined with a system bus with data back throttling can beprovided to facilitate no write operation is dropped.

FIGS. 8 and 9 illustrate example address and page table formats. Withrespect to FIG. 8, an example physical address 800 can include a pageframe number, a physical page address, and a page offset, wherediffering numbers of bits are available for the respective addressfields depending on the desired memory size. With respect to FIG. 9, aDRAM buffer page table entry is shown at 900. This can include a pagenumber along with corresponding page frame numbers which provideportions of a physical address. This can also include one or more datavalid bits.

Turning to FIG. 10, an example DRAM write handling process isillustrated. A DRAM buffer table look up is performed at 1010 andreceives data from incoming writes 1024. After a page table hit occurs,record sector based write activity at and translate and write to DRAM at1034. Record cache line modification state in DRAM at 1040 before endingthe process. If a table lookup miss occurs at 1010, determine if thereis a free entry in an index at 1044. If so, then a new DRAM buffer pageis created at 1050 from a list of free DRAM buffer pages at 1054. Ifthere is no free index at 1044, the process selects one entry in theindex to replace at 1060. and updates the DRAM buffer with a new pageentry at 1064. This also spawns a process for victim page handling at1070 which is described in more detail below.

FIG. 11 depicts an example process 1100 for evicting data from DRAM toFLASH. In general, a victim page handling mechanism (or component) canbe provided where the mechanism starts when a conflict miss took placein the DRAM buffer table. One data set is generally selected to bereplaced. Use a buffer in DRAM for the incoming write data whileevicting the sector chosen. Copy from the to the designated DRAMlocation when the eviction is complete, where there may be a need tothrottle or slow down back the writes if the designated buffer area isclose to depletion. At 1110, an LRU-2 or other algorithm is employed toselect a sector to evict from DRAM. The component 1110 receives datafrom a sector based write activity log 114 and/or from a free page list1120. A read from DRAM cache line modification states relating to thesector is performed at 1124. A read from FLASH occurs at 1130 and awrite of clean cache lines to DRAM occurs at 1134. A decision occurs at1140 to determine if the cache lines have been covered for a sector. Ifnot, the process proceeds back to 1124. If the cache lines have beencovered at 1140, the process performs an evict sector to FLASH at 1144.The evict sector 1144 receives data at 1150 about the identity of theFLASH sector to evict.

FIG. 12 illustrates an example flash management system 1200. The systemincludes a FLASH sector table 1210, victim page handling component 1220,and a wear leveling component 1230 that are collectively employed tomanage one or more DIMM FLASH modules 1240. The ASIC Flash sector table1210 supports a total of 256 GB of flash memory but other memory sizescan be employed. It is of 256 k sector translation entries. Each entrytypically represents a 1 MB sector. The wear leveling component 1230 isused to identify the flash sector to move DRAM data into. Wear levelingcan be provided as hardware or software of a combination of both. FIG.13 illustrates an example flash sector table entry format 1300. Theformat can include a flash sector number, data valid bits, and one ormore wear bits.

Turning to FIG. 14, an example read path flow process 1400 isillustrated. A DRAM buffer lookup is performed at 1410 in view ofincoming read requests 1420. If a page hit occurs, read from DRAM cacheline modification log at 1424, read from DRAM at 1430 return data toprocessor at 1434. If a miss occurs at 1410, perform flash table lookupat 1440. If a hit occurs in the FLASH table, return data to theprocessor at 1444, otherwise read FLASH contents from the non-writtenarea of FLASH at 1450.

Referring to FIG. 15, a block diagram illustrates an exemplary,non-limiting electronic device 1500 that can comprise and/or incorporatethe systems or components previously described. The electronic device1500 can include, but is not limited to, a computer, a laptop computer,network equipment (e.g., routers, access points), a media player and/orrecorder (e.g., audio player and/or recorder, video player and/orrecorder), a television, a smart card, a phone, a cellular phone, asmart phone, an electronic organizer, a PDA, a portable email reader, adigital camera, an electronic game (e.g., video game), an electronicdevice associated with digital rights management, a Personal ComputerMemory Card International Association (PCMCIA) card, a trusted platformmodule (TPM), a Hardware Security Module (HSM), set-top boxes, a digitalvideo recorder, a gaming console, a navigation system or device (e.g.,global position satellite (GPS) system), a secure memory device withcomputational capabilities, a device with a tamper-resistant chip(s), anelectronic device associated with an industrial control system, anembedded computer in a machine (e.g., an airplane, a copier, a motorvehicle, a microwave oven), and the like.

Components of the electronic device 1500 can include, but are notlimited to, a processor component 1502 (e.g., which can be and/or caninclude the same or similar functionality as processor component 302, asdepicted in FIG. 3 and described herein), a system memory 1504, whichcan contain a nonvolatile memory 1506, and a system bus 1508 that cancouple various system components including the system memory 1504 to theprocessor component 1502. The system bus 1508 can be any of severaltypes of bus structures including a memory bus or memory controller, aperipheral bus, or a local bus using any of a variety of busarchitectures.

Electronic device 1500 can typically include a variety of computerreadable media. Computer readable media can be any available media thatcan be accessed by the electronic device 1500. By way of example, andnot limitation, computer readable media can comprise computer storagemedia and communication media. Computer storage media includes volatileand non-volatile, removable and non-removable media implemented in anymethod or technology for storage of information such as computerreadable instructions, data structures, program modules or other data.Computer storage media includes, but is not limited to, RAM, ROM,EEPROM, nonvolatile memory 1506 (e.g., flash memory), or other memorytechnology, CD-ROM, digital versatile disks (DVD) or other optical diskstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, or any other medium which can be used tostore the desired information and which can be accessed by electronicdevice 1500. Communication media typically embodies computer readableinstructions, data structures, program modules or other data in amodulated data signal such as a carrier wave or other transportmechanism and includes any information delivery media.

The system memory 1504 can include computer storage media in the form ofvolatile (e.g., SRAM) and/or nonvolatile memory 1506 (e.g., flashmemory). For example, nonvolatile memory 1506 can be the same orsimilar, or can contain the same or similar functionality, as memorycomponent 1502. A basic input/output system (BIOS), containing the basicroutines that can facilitate transferring information between elementswithin electronic device 1500, such as during start-up, can be stored inthe system memory 1504. The system memory 1504 typically also cancontain data and/or program modules that can be accessible to and/orpresently be operated on by the processor component 1502. By way ofexample, and not limitation, the system memory 1504 can also include anoperating system(s), application programs, other program modules, andprogram data.

The nonvolatile memory 1506 can be removable or non-removable. Forexample, the nonvolatile memory 1506 can be in the form of a removablememory card or a USB flash drive. In accordance with one aspect, thenonvolatile memory 1506 can include flash memory (e.g., single-bit flashmemory, multi-bit flash memory), ROM, PROM, EPROM, EEPROM, or NVRAM(e.g., FeRAM), or a combination thereof, for example. Further, a flashmemory can comprise NOR flash memory and/or NAND flash memory. Inaccordance with another aspect, the nonvolatile memory 1506 can compriseone or more memory components.

A user can enter commands and information into the electronic device1100 through input devices (not shown) such as a keypad, microphone,tablet, or touch screen although other input devices can also beutilized. These and other input devices can be connected to theprocessor component 1502 through input interface component 1510 that canbe connected to the system bus 1508. Other interface and bus structures,such as a parallel port, game port or a universal serial bus (USB) canalso be utilized. A graphics subsystem (not shown) can also be connectedto the system bus 1508. A display device (not shown) can be alsoconnected to the system bus 1508 via an interface, such as outputinterface component 1512, which can in turn communicate with videomemory. In addition to a display, the electronic device 1500 can alsoinclude other peripheral output devices such as speakers (not shown),which can be connected through output interface component 1512.

It is to be understood and appreciated that the computer-implementedprograms and software can be implemented within a standard computerarchitecture. While some aspects of the disclosure have been describedabove in the general context of computer-executable instructions thatcan be run on one or more computers, those skilled in the art willrecognize that the technology also can be implemented in combinationwith other program modules and/or as a combination of hardware andsoftware.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the inventive methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices (e.g., PDA, phone),microprocessor-based or programmable consumer electronics, and the like,each of which can be operatively coupled to one or more associateddevices.

The illustrated aspects of the disclosure may also be practiced indistributed computing environments where certain tasks are performed byremote processing devices that are linked through a communicationsnetwork. In a distributed computing environment, program modules can belocated in both local and remote memory storage devices.

It is also to be understood and appreciated that cryptographic protocolscan be employed to facilitate security of data associated with a memory(e.g., memory component 102) in accordance with the disclosed subjectmatter. For example, a cryptographic component (e.g., cryptographicengine) can be employed and can facilitate encrypting and/or decryptingdata to facilitate securing data being written to, stored in, and/orread from the memory. The cryptographic component can provide symmetriccryptographic tools and accelerators (e.g., Twofish, Blowfish, AES,TDES, IDEA, CASTS, RC4, etc.) to facilitate data security. Thecryptographic component can also provide asymmetric cryptographicaccelerators and tools (e.g., RSA, Digital Signature Standard (DSS), andthe like) to facilitate securing data. Additionally, the cryptographiccomponent can provide accelerators and tools (e.g., Secure HashAlgorithm (SHA) and its variants such as, for example, SHA-0, SHA-1,SHA-224, SHA-256, SHA-384, and SHA-512) to facilitate data security.

It is to be appreciated and understood that authentication protocols canbe employed to facilitate security of data associated with the memory(e.g., memory component 102) in accordance with the disclosed subjectmatter. For example, an authentication component can solicitauthentication data from an entity, and, upon the authentication data sosolicited, can be employed, individually and/or in conjunction withinformation acquired and ascertained as a result of biometric modalitiesemployed, to facilitate control access to the memory. The authenticationdata can be in the form of a password (e.g., a sequence of humanlycognizable characters), a pass phrase (e.g., a sequence of alphanumericcharacters that can be similar to a typical password but isconventionally of greater length and contains non-humanly cognizablecharacters in addition to humanly cognizable characters), a pass code(e.g., Personal Identification Number (PIN)), and the like, for example.Additionally and/or alternatively, public key infrastructure (PKI) datacan also be employed by the authentication component. PKI arrangementscan provide for trusted third parties to vet, and affirm, entityidentity through the use of public keys that typically can becertificates issued by the trusted third parties. Such arrangements canenable entities to be authenticated to each other, and to useinformation in certificates (e.g., public keys) and private keys,session keys, Traffic Encryption Keys (TEKs),cryptographic-system-specific keys, and/or other keys, to encrypt anddecrypt messages communicated between entities.

The authentication component can implement one or moremachine-implemented techniques to identify an entity by its uniquephysical and behavioral characteristics and attributes. Biometricmodalities that can be employed can include, for example, facerecognition wherein measurements of key points on an entity's face canprovide a unique pattern that can be associated with the entity, irisrecognition that measures from the outer edge towards the pupil thepatterns associated with the colored part of the eye—the iris—to detectunique features associated with an entity's iris, and finger printidentification that scans the corrugated ridges of skin that arenon-continuous and form a pattern that can provide distinguishingfeatures to identify an entity.

As utilized herein, terms “component,” “system,” “interface,” and thelike, are intended to refer to a computer-related entity, eitherhardware, software (e.g., in execution), and/or firmware. For example, acomponent can be a process running on a processor, a processor, anobject, an executable, a program, and/or a computer. By way ofillustration, both an application running on a server and the server canbe a component. One or more components can reside within a process and acomponent can be localized on one computer and/or distributed betweentwo or more computers.

Furthermore, the disclosed subject matter may be implemented as amethod, apparatus, or article of manufacture using standard programmingand/or engineering techniques to produce software, firmware, hardware,or any combination thereof to control a computer to implement thedisclosed subject matter. The term “article of manufacture” as usedherein is intended to encompass a computer program accessible from anycomputer-readable device, carrier, or media. For example, computerreadable media can include but are not limited to magnetic storagedevices (e.g., hard disk, floppy disk, magnetic strips . . . ), opticaldisks (e.g., compact disk (CD), digital versatile disk (DVD) . . . ),smart cards, and flash memory devices (e.g., card, stick, key drive . .. ). Additionally it should be appreciated that a carrier wave can beemployed to carry computer-readable electronic data such as those usedin transmitting and receiving electronic mail or in accessing a networksuch as the Internet or a local area network (LAN). Of course, thoseskilled in the art will recognize many modifications may be made to thisconfiguration without departing from the scope or spirit of thedisclosed subject matter.

Some portions of the detailed description have been presented in termsof algorithms and/or symbolic representations of operations on data bitswithin a computer memory. These algorithmic descriptions and/orrepresentations are the means employed by those cognizant in the art tomost effectively convey the substance of their work to others equallyskilled. An algorithm is here, generally, conceived to be aself-consistent sequence of acts leading to a desired result. The actsare those requiring physical manipulations of physical quantities.Typically, though not necessarily, these quantities take the form ofelectrical and/or magnetic signals capable of being stored, transferred,combined, compared, and/or otherwise manipulated.

It has proven convenient at times, principally for reasons of commonusage, to refer to these signals as bits, values, elements, symbols,characters, terms, numbers, or the like. It should be borne in mind,however, that all of these and similar terms are to be associated withthe appropriate physical quantities and are merely convenient labelsapplied to these quantities. Unless specifically stated otherwise asapparent from the foregoing discussion, it is appreciated thatthroughout the disclosed subject matter, discussions utilizing termssuch as processing, computing, calculating, determining, and/ordisplaying, and the like, refer to the action and processes of computersystems, and/or similar consumer and/or industrial electronic devicesand/or machines, that manipulate and/or transform data represented asphysical (electrical and/or electronic) quantities within the computer'sand/or machine's registers and memories into other data similarlyrepresented as physical quantities within the machine and/or computersystem memories or registers or other such information storage,transmission and/or display devices.

What has been described above includes examples of aspects of thedisclosed subject matter. It is, of course, not possible to describeevery conceivable combination of components or methodologies forpurposes of describing the disclosed subject matter, but one of ordinaryskill in the art may recognize that many further combinations andpermutations of the disclosed subject matter are possible. Accordingly,the disclosed subject matter is intended to embrace all suchalterations, modifications and variations that fall within the spiritand scope of the appended claims. Furthermore, to the extent that theterms “includes,” “has,” or “having,” or variations thereof, are used ineither the detailed description or the claims, such terms are intendedto be inclusive in a manner similar to the term “comprising” as“comprising” is interpreted when employed as a transitional word in aclaim.

What is claimed is:
 1. A system, comprising: a controller componentconfigured to regulate read and write access to a flash memory componentand a buffer memory component, wherein the controller component isconfigured to control a transfer of a set of data associated with anapplication between the flash memory component and the buffer memorycomponent in connection with a write operation related to theapplication based on a defined bursting behavior criterion or a definedbandwidth criterion and wherein the buffer memory component is onlyvisible to the controller component; and a partial allocate componentconfigured to partially allocate the set of data stored in the flashmemory component into a working set of the set of data associated withthe application that is subject to the write operation and to facilitatestorage of write data in the flash memory component, wherein the workingset is copied from the flash memory component to the buffer memorycomponent to facilitate an update of the working set in the buffermemory component to updated data based on the write data and the buffermemory component is sized as a function of a change rate of the workingset being less than a change rate of an update rate to the flash memorycomponent.
 2. The system of claim 1, wherein the buffer memory componentis configured to cache the updated data in the buffer memory componentfor a defined period of time before the updated data is transferred tothe flash memory component to facilitate mitigation of a data burstingbehavior associated with the application.
 3. The system of claim 1,wherein the buffer memory component is configured to receive the writedata at a first data communication rate, cache the write data or theupdated data in the buffer memory component, and transfer the updateddata from the buffer memory component to the flash memory component at asecond data communication rate associated with the flash memorycomponent, wherein the first data rate is higher than the second datarate.
 4. The system of claim 1, wherein the controller componentfacilitates the update of the working set in the buffer memory componentwith the write data relating to the application to generate the updateddata.
 5. The system of claim 1, wherein, during a read operation to readthe updated data, the controller component facilitates a read of theupdated data from the buffer memory component.
 6. The system of claim 1,wherein the controller component is configured as an applicationspecific integrated circuit that occupies an expansion memory slot of acomputer, the controller component is configured to operate a datatransfer component to transfer data from the buffer memory component tothe flash memory component.
 7. The system of claim 1, comprising a pagetable configured to facilitate transferring data between the buffermemory component and the flash memory component.
 8. The system of claim1, wherein the set of data is updated to a set of modified data based onthe working set being updated to the updated data based on the writedata, and wherein the controller component is further configured toenable the application to facilitate a transfer of the write data to thebuffer memory component and to facilitate a read of the set of modifieddata via a read of the updated data from the buffer memory.
 9. Thesystem of claim 8, further comprising an eviction control componentconfigured to determine whether a page of data is to be evicted from thebuffer memory component and transferred to the flash memory component.10. The system of claim 1, further comprising a sector data mergecontrol component configured to facilitate a background data transfer ofthe updated data from the buffer memory component to the flash memorycomponent.
 11. A method, comprising: partially allocating a set of dataassociated with an application stored in a flash memory into a workingset of the set of data associated with the application that is to beupdated by a write operation with write data; facilitating storage ofthe write data in the flash memory, wherein the working set is copiedfrom the flash memory to a buffer memory to facilitate an update of theworking set in the buffer memory to updated data based on the writedata; regulating a read access and a write access to the flash memoryand the buffer memory; and controlling transfer of the set of dataassociated with the application between the flash memory in connectionwith the write operation related to the application as a function of adefined bursting behavior criterion or a bandwidth criterion, wherein asize of the buffer memory is based on a determination that a rate ofchange of the working set is less than a rate of change of an updaterate to the flash memory.
 12. The method of claim 11, comprising:receiving the write data by the buffer component at a first datacommunication rate associated with the application; updating the workingset with the write data to produce the updated data; and transferringthe updated data to the flash memory at a second data communication rateassociated with the flash memory, wherein the first data communicationrate is higher than the second data communication rate.
 13. The methodof claim 11, comprising: reading the updated data associated with theapplication from the buffer component in connection with a readassociated with the application.
 14. The method of claim 11, furthercomprising: determining whether a page of data is to be transferred fromthe buffer component and to the flash memory based on a set of pageinformation.
 15. A system, comprising: a controller component configuredto regulate a read access and a write access to a flash memorycomponent-that stores a set of data associated with an application and avolatile memory component and control a transfer of the set of databetween the flash memory component and the volatile memory component inconnection with a memory manager function related to the applicationbased on a defined bursting behavior criterion or a defined bandwidthcriterion; and a partial allocate component configured to partiallyallocate the set of data into a working set that is to be updated withwrite data and is associated with the application, copy the working setfrom the flash memory component and store the working set in a volatilebuffer component to facilitate an update of the working set with thewrite data associated with the application to produce updated data,wherein the volatile buffer component is only visible to the controllercomponent, and the volatile buffer component is sized as a function of achange of an update rate to the flash memory component being greaterthan a change rate of the working set.
 16. The system of claim 15,wherein the controller component facilitates a read of the updated datafrom the volatile buffer component concurrently with a read associatedwith the application.
 17. The system of claim 15, wherein the volatilebuffer component caches the write data, the working set, or updated datain the volatile buffer component before the updated data is transferredto the flash memory component to facilitate management of writing thewrite data to the flash memory component in data bursts at a first datawrite communication rate associated with the application that is higherthan a second data write communication rate associated with the flashmemory component.
 18. The system of claim 15, wherein the controllercomponent facilitates the update of the, working set or the transfer ofupdates to data from the volatile buffer component to the flash memorycomponent based on the defined bursting behavior criterion or thedefined bandwidth criterion relating to the application or the flashmemory component.
 19. The system of claim 15, wherein the partialallocate component facilitates a reduction in a number of read and writecycles on a system bus in connection with the set of data by retainingdata in the flash memory component and not transferring the data to thevolatile buffer component in connection with the write operation. 20.The system of claim 15, further comprises a data transfer component thattransfers the updated data from the volatile buffer component to theflash memory component in response to determining that the updated datais not being used.