search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
EMBEDDED Memory Refresh


NVM is used in most embedded systems, but with different memory types available, which is best to use and why? Michael Barrett, managing director of Nexus Industrial Memory,


provides a brief refresher course and touches on removable NVM devices


ROM and PROM are ideal for applications for which there is no need for data to change in the field. EPROM tends to be used for system development and prototyping purposes, before switching to ROM or PROM for volume production. EEPROM and Flash are ideal for applications


Industrial removable NVM devices are far more rugged than commercial solutions. They can be dropped, trodden on and immersed in liquids without fear of damaging the silicon inside


any factors will govern your choice of non-volatile memory (NVM) technology. These include storage capacity, the speed with which data needs to be written/read/erased, security, power consumption, voltage range and, of course, cost.


M


There are five main forms of NVM: 1. Read only memory (ROM). A common type of this is ‘mask ROM’, which is programmed at the point of manufacture; after which erasure is not possible. In this respect, ROM is one time programmable (OTP). It is secure in terms of the data being unalterable, but the end application needs to be high volume to justify the ROM production cost. 2. Programmable read only memory (PROM) is also OTP. Data is written electrically, after which erasure is not possible. It is ideal for medium to high volume applications, and ‘blank’ PROMs can of course be purchased in high volumes to take advantage of the economy of scale.


3. Erasable programmable read only memory (EPROM). Data is written electrically after which the device cannot be written to again unless the entire chip (the package of which has a window) is erased using UV light.


4. EEPROM (sometime E2PROM). Data is written, read or erased electrically at the byte level.


5. Flash. Technically, this is a form of EEPROM. It is just architecturally different. For NOR Flash read/writes are at the byte level. For NAND Flash, read/writes are at the page level. Erasure (for NOR and NAND) is performed at the block level.


38 MAY 2021 | ELECTRONICS TODAY


Figure 2: Write-once, read-many (WORM) technology, available in SD and microSD form factor, stands to add great value to embedded systems that capture data for which there should be little doubt over its authenticity. Once written, files cannot be deleted, over-written or altered


where the data will change frequently. The architectural differences though create a trade-off between speed and longevity. Flash’s block-level erasure is quicker than EEPROM’s byte approach, but it can accommodate fewer re-write cycles (up to circa 10K for Flash versus up to 1M for EEPROM). Another differentiator is that Flash offers greater storage capacity than EEPROM. This makes Flash ideal for applications that require high speed access to a high volume of data that won’t necessarily be changing that often (i.e. semi-static). EEPROM is better suited to embedded systems requiring higher frequency read/writes of lower volumes of data and which may need to provide several years of service in the field. Communication with an NVM is via either serial or parallel comms protocol. Serial is favoured in most embedded systems because of the lower power consumption (circa one tenth, in the case of EEPROM, for example). Also, there are fewer I/O pins/pads and, because of that, a smaller device outline.


Removable NVM devices Many systems require the use of removable memory devices for applications that


include system configuration and data monitoring.


Commercial USB thumb drives are used in many applications and PCB-mounted receptacles are not expensive. The port can also be used for interfacing via a USB lead, an advantage but also a security concern. However, commercial devices nor their receptacles are really cut out for harsh environments.


Industrial alternatives


Industrial alternatives are available that are essentially USB silicon inside a rugged enclosure, so system software can be developed as if for standard USB. However, the enclosure is virtually crush proof, can withstand heat extremes and immersion in fluids. Also, the mechanical interconnect is different from USB, which adds a layer of security as devices cannot be interrogated without a corresponding receptacle. If security is a concern - which it will be if the devices are to be used for user authentication and/or the transfer of small volumes of sensitive data (e.g. system confirmation settings) - devices are available on the market that incorporate Microchip’s CryptoAuthentication silicon. It is extremely secure. Features of the silicon include unique serial number and non- interchangeable 72-bit serial number (set by Microchip), a 512-bit (OTP) zone, a SHA-256 hash algorithm for data encryption. The data is secure and device cloning is virtually impossible.


Another NVM technology worth mentioning is write-once read-many (WORM). It prevents sensitive files from being altered, deleted or overwritten. The physical form factor is typically SD or microSD card (see figure 2) because the technology first proved popular for use with commercial products (laptops, cameras etc.), used by people requiring a permanent record of data. For example, security forces and legal professionals are using WORM cards as an alternative to burning CDRs and DVDRs, which are becoming obsolete.


With capacities of 256GB available, WORM is set to become a popular NVM technology within high security embedded systems.


Nexus Industrial Memory www.nexusindustrialmemory.com


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74