Sei sulla pagina 1di 37

Chapter 1

OVERVIEW

UFS 1. 0 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW

UFS is a JEDEC specification, known as JC-64.1


Objectives:
UFS addresses embedded and removable devices
Mass-storage devices
Peripheral I/O (GPS, modem)
Execute in Place (XiP) devices
Flexible protocol to enable future devices and extensions
Target raw speed of 300 MBps per data lane, with future scalability
M-PHY HS-GEAR1 is mandatory
Rate A: 1.2480 Gbps, Rate B: 1.4576 Gbps
M-PHY HS-GEAR2 is mandatory
Rate A: 2.4960 Gbps, Rate B: 2.9152 Gbps
M-PHY HS-GEAR3 is optional
Rate A: 4.9920 Gbps, Rate B: 5.8304 Gbps
Simple, low overhead link layer with minimal buffer requirements
Low pin count, low latency, low power
Version 2.0 is defining a point-to-point interface

UFS 1. 1 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Speed
500 Mbps 800 Mbps 1.5 Gbps 2.5 Gbps 3.0 Gbps 5.0 Gbps 6.0 Gbps 8.0 Gbps 10 Gbps 16 Gbps

PCIe Gen1 Gen2 Gen3 Gen4

SATA SATA I SATA II SATA III

USB USB 2.0 USB 3.0 USB 3.1

SD SD 2.0 SD 3.0 SD4.0=


(4-bit, 104 (4-bit, 208 UHS-II
MHz, SDR) MHz, SDR104)

eMMC eMMC 4.3 eMMC 4.4 eMMC 5.0


(8-bit, 50 (8-bit, 100 (8-bit, 200
MHz, SDR) MHz, DDR) MHz, DDR)

UFS PWM-Gears and HS-G1 HS-G2 HS-G2 HS-G3 HS-G3


HS-G1 Rate A Rate B Rate A Rate B Rate A Rate B

SDR = Single Data Rate, DDR = Dual Data Rate


SDR104 means 104 MBps

2.9152 Gbps * 4/5 * 1/8 = 291.52 MBps (1 Lane)


M-PHY is based on 8-bit/10-bit encoders / decoders

UFS 1. 2 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Speed
8-bit / 10-bit coding scheme is used in the frequency band 1-GHz:6-GHz
It has been invented by an engineer from IBM but is now free of patent

1 GHz 6 GHz 8 GHz 10 GHz

freq

64b/66b (10G Ethernet )


NRZI
8b/10b 128b/130b (PCIe gen3)
Bit stuffing
128b/132b (USB 3.1)

In the range 1-6 GHz, only 1000BASE-T Ethernet and HDMI use a different coding
scheme
HDMI is based on 8b/10b Transition Minimized Differential Signalling (TMDS)
Ethernet is based on 4D-PAM5

UFS 1. 3 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Speed
Host Device

8 10 10 8
8-bit/ 8-bit/
Transmission
10-bit Serializer Deserializer 10-bit
Line
Encoder Encoder

8 10 10 8
8-bit/ 8-bit/
Transmission
10-bit Deserializer Serializer 10-bit
Line
Encoder Encoder

Two separate unidirectional differential pairs are implemented in M-PHY


The coding adds 1/5th of overhead

UFS supports 1 or 2 Lanes

UFS 1. 4 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
NAND vs eMCC / UFS

NAND flash

NAND flash NAND controller


ECC
Bad Block Management
Wear Leveling
NAND Flash Driver
I/Os

RE#
WE#
RB#
CE#
WP#
ALE
CLE

RESET_n
Rx+/ Tx+/
Rx- Tx-
Host
Processor
ECC
Bad Block Management
Wear Leveling Host
NAND Flash Driver Processor
UFS Host driver

Wear leveling attempts to arrange data so that erasures and re-writes are distributed
evenly across the medium

UFS 1. 5 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Protocol layers
OS and applications

Device Manager Task Manager (SCSI) UFS Command Set Layer (UCS)
(UFS)
Bus / Link management
Data packets
Query req
Power management
Device cfg / management

Query UFS Transport Protocol layer (UTP)


req
Reset req SCSI over UFS
(Unipro
reset or UFS extensions SCSI encapsulation
Device
reset)
Boot and enumeration UFS SCSI extensions

HCI
UFS Link Layer (MIPI Unipro Version 1.6)

Unipro UFS PHY Layer (MIPI M-PHY Version 3.00) UIC


Device (UFS
Management Interconnect
Entity Layer)
PLL, Clock Data Recovery 8b10b encode / decode

1-Lane

UFS 1. 6 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Protocol layers
UFS is designed to be Protocol-agnostic
But for version 2.0, UFS relies on T10 SCSI Architecture Model (SAM) standard
Command protocol is based on:

SCSI Primary Commands (SPC) Commands for all devices Command structure
SCSI Block Commands (SBC) Command set extensions to facilitate consists of a Command
operation of SCSI Block devices Descriptor Block (CDB)

UFS supports an option to define UFS Native Commands

Application layers:
UCS, Device Manager and Task Manager
The Task Manager handles SCSI Commands meant for queue control
Abort Commands
The Device Manager provides device level UFS-specific control like Query
request and lower level Link-layer control
Low power management
The Device Manager is in charge of enumeration which is done through
descriptors

UFS 1. 7 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Protocol layers
The Device Manager interacts with lower layers using two access points:

Device Manager

Handling of Device
Handling of Host level level operations and
operations configurations

Assertion Query
of RESET_n request

Unipro
Device Management
UTP
Entity
(UIC)

UniPro is responsible for management of the Link, including the PHY


Device management is the responsibility of upper layers

UFS 1. 8 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Protocol layers
If Host side UTP receives a request from Application layer or Device Manager, it
generates an UFS Protocol Information Unit (UPIU) for that request and transports
this UPIU to the peer UTP device side

Host Device

UFS UFS
Device Device
Mgmt Mgmt

SCSI SCSI
SBC, SPC SBC, SPC

SCSI SCSI
Task Task
manager manager

UTP UTP

Tx UPIU Rx UPIU Rx UPIU Tx UPIU

UIC UIC

UFS 1. 9 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Protocol layers
SCSI SBC and SPC commands are the baseline for UFS
UFS will not modify the SBC and SPC Compliant commands
The goal is to maximize re-use and leverage of the software codebase
available on platforms that are already supporting SCSI

UFS Simplified SCSI Command Set


SBC SPC SCSI operational Value-added optional
(from Table 10 T10) Commands Commands
FormatUnit Inquiry ModeSelect Read(16)
Read(6) ReportLuns ModeSense Write(16)
Read(10) TestUnitReady PreFetch PreFetch(16)
Write(6) SecurityProtocolIn StartStopUnit SynchronizeCache(16)
Write(10) SecurityProtocolOut SynchronizeCache(10) ReadCapacity(16)
ReadCapacity(10) ReadBuffer (optional) Verify(10) These Commands are
RequestSense WriteBuffer(optional) applicable to 512B block
SendDiagnostic Device with capacity
larger than 2 TB in each
LU

UFS 1. 10 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Protocol layers
The SCSI Architecture Model (SAM-5) is a Client-Server model

Host Arguments UFS Host Procedure Call (Arguments) Device


Application (Client) (Server)

Host UFS Host Device


Application (Client) (Server)

Server processes the procedure call

Host UFS Host Return value and status Device


Application (Client) (Server)

Host acts as a Requester, Device acts as a Responder

UFS 1. 11 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Protocol layers
Target of a Procedure Call is a Logical Unit (LU) contained within a UFS device
A UFS device will contain one or more Logical Units
A Logical Unit is an independent processing entity within the device
Each Logical Unit has an address within the Target device called a Logical Unit
Number (LUN)

Communication between the Initiator and Target is divided into a series of


messages which are formatted into UFS Protocol Information Units (UPIUs)

Each LU contains a Task Queue


I_T_L_Q nexus:
I Initiator
UFS v2 is a point-to-point interface
T Target
L LUN
Q Task Tag
ONLY ONE TASK CAN BE PROCESSED AT A TIME WITHIN A LU (UFS 1.1)
LOGICAL UNIT CONTAINS A TASK QUEUE THAT WILL SUPPORT THE
PROCESSING OF ONE OR MORE TASKS (UFS 2.0)

UFS 1. 12 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Protocol layers, SCSI Command model
DDR

ServiceResponse= ExecuteCommand( Data-in I_T_L_Q Nexus


buffer CDB
Task Attribute
IN parameters, OUT parameters) Data-In buffer size
UFS UFS
IN parameters I_T_L_Q Nexus CPU Interconnect
Host Device
Data-In buffer
Command Descriptor Sense Data
Block (CDB) Sense Data Length
Status
Task Attribute Status Qualifier

Data-In buffer size


DDR
I_T_L_Q Nexus
Data-Out buffer Data-Out CDB
Task Attribute
Data-Out buffer size buffer
Data-Out buffer
Data-Out buffer size
OUT parameters Data-In buffer UFS UFS
CPU Interconnect
Sense Data Host Device
Sense Data
Sense Data Length Sense Data Length
Status
Status Status Qualifier

Status Qualifier

Parameter fields in the UTP Command, Response, Ready-To-Transfer, Data-Out,


Data-In UPIU headers contain the requisite information for the input and output
arguments

UFS 1. 13 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Protocol layers, SCSI Task Management functions

ServiceResponse= ExecuteCommand( IN parameters, OUT parameters)


IN parameters I_T_L_Q Nexus
OUT parameters Additional response information

Parameter fields in the UTP Task Management Request and TaskManagement


Response UPIU headers contain the requisite information for the input and output
arguments
SCSI Commands

TaskManagement and regular SCSI Commands


have an I_T_L or I_T_L_Q nexus

Device Mgmt Command buffer


(ex START_STOP_UNIT[PowerConditions]

W-LU LU0 LU1 LU7


Implementation example Device Command Command Command
Management queue queue queue

UFS 1. 14 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Protocol layers

Host Device

Device Task Task Device


UCS UCS
Manager Manager Manager Manager
Software

Hardware UPIU
UTP UTP

UNIPRO UNIPRO
UIC UIC
M-PHY M-PHY

UFS Protocol Information Unit (UPIU) is exchanged between UTP layers

UFS 1. 15 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Host and device

Host controller Device


(Ultra Mobile PC, Digital Still
Camera, Portable Music Player,…)

CPU CPU DMA

UFS UFS SRAM


DMA Interconnect Host Device Interconnect
(cache)
IP IP

DDR NAND Flash


controller controller

Implementation
SDRAM NAND Flash
example

UFS provides total simple solutions without needs of understanding Flash


technology
The device is in charge of managing ECC

UFS 1. 16 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
System model
Host Device
Device
Appli level Descriptors
cations Management

Control Configuration
SCSI UFS Host
controller Logical Unit LU-1
protocol Storage
Ref_Clk Command queue

Reset

UNIPRO

UNIPRO
UFSHCI

M-PHY

M-PHY
UFS host DOUT/DOUT_c
UFS
registers
software
driver DIN/DIN_c Logical Unit LU-N
Storage
Command queue

Functional features
Similar functional features as eMMC
Write protection options, including permanent and power-on write protection
Boot operation mode, support for boot partitions and support for Replay Protected Memory Block (RPMB)
Device enumeration and discovery
Supports multiple partitions (LUNs) with partition management
Secure operations, Purge, Erase and Trim to enhance data security
Trim command allows an OS to inform the UFS device which blocks of data are no longer considered in use and
can be wiped internally

UFS 1. 17 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
System model
MMC/eMMC UFS

Broadcast such as CMD0 No Broadcast, only Unicast are supported, any


CMD #i
(GO_IDLE_STATE) Command implies a Response

CMD RESP CMD #i CMD #i+1 CMD #i+2


CMD #i RESP #i
#i+1 #i+1 LUN #A LUN #A LUN #A
RESP #i RESP #i+1
LUN #A LUN #A
Command #i+1 cannot be transmitted
Command #i+1 can be transmitted prior to the

Same LU
prior to the response to Command #i
response to Command #i (Pipelining)
CMD #i CMD #i+1 CMD #i+2
LUN #A LUN #A LUN #A
RESP #i+1 RESP #i
LUN #A LUN #A
Response #i+1 can be transmitted prior to the
response to Command #i (Command reordering)
CMD #i CMD #i+1 CMD #i+2
LUN #A LUN #B LUN #C
RESP #i RESP #i+1
Different LUs LUN #A LUN #B
Command #i+1 can be transmitted prior to the
response to Command #i (Pipelining)
CMD #i CMD #i+1 CMD #i+2
LUN #A LUN #B LUN #C
RESP #i+1 RESP #i
LUN #B LUN #A
Response #i+1 can be transmitted prior to the
response to Command #i (Command reordering)

UFS 1. 18 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
System model
MMC/eMMC UFS

CMD #i WRITE
CMD #i RESP #i DATA DATA
LUN #A

RESP #i
DATA DATA LUN #A
Command, Data and Response are transferred
Command and Response are transferred
over the same Lane
over CMD line while Data is
transferred over DATA[7:0] Lines CMD #i CMD #i+1 WRITE
DATA DATA
WRITE LUN #A LUN #A

RESP #i+1 RESP #i


LUN #A LUN #A

One given LU may process several Commands at a time

CMD #i CMD #j WRITE


DATA DATA
WRITE LUN #A LUN #B

RESP #i RESP #j
LUN #A LUN #B

Several LUs can process Commands concurrently

WriteRq RESP #i
CMD #i RESP #i Ready DATA DATA
LUN #A LUN #A

DATA[0]=LOW On write, the Device uses Ready UPIUs to inform


DATA DATA
the Host of input buffer state
Flow control is very basic, based on Driver is not involved on the Host
the state of DATA[0] or polling the Level 2 UniPro flow control is performed in both
Ready Status by sending CMD13 directions

UFS 1. 19 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
System model
UFS 1.1 Line 1210
Only one Task can be processed at a time within a Logical Unit

This sentence is removed in UFS 2.0


So a LU may handle several tasks
No confusion since all UPIUs related to a particular task will use the TaskTag
present in the Command
The Device has therefore the capability of extracting the Commands from the Task
queue in the order which leads to the best performance in terms of NAND flash
memory accesses

UFS 1. 20 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
System model

SD/MMC/USB 2.0
Host Device Host Device
Half duplex

Control Data
SATA
Host Device Host Device
Full duplex
Data Control

Data Data
UFS, USB 3.0
Host Device Host Device
Full duplex
Data Data

Control Data
UHS II Host Device Host Device
Full duplex
Data Control

Data Data
UHS II Host Device Host Device
Half duplex

UFS 1. 21 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
eMMC inheritance - Replay Protected Memory Block (RPMB)
This function provides means for the system to store data to the specific memory
area in an authenticated and replay protected manner
RPMB operation is a separate self-contained security command protocol that has its
own command opcodes (message types) and well-defined data structure

Only one Boot Logical Unit is active at power-up


Boot Partition
Secure storage of Authentication Key
An Authentication Key is written to the RPMB at
Boot Partition Host system manufacturing time and is used as shared
secret to authenticate subsequent RPMB transactions
between the Host and Device

RPMB partition Transaction Authentication


Transactions (messages) are authenticated by the
Message Authentication Code (MAC) which is a hash
value generated by the Authentication Key, a random
number provided by the Host and the message itself
User data partitions using HMAC SHA-256

UFS 1. 22 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
eMMC inheritance - Write Protect feature

Permanent write protect Once the permanent write protect is set, the protected memory
becomes read only
Power-on write protect (volatile Once the power-on write protect is set, it is persistent until the
write protect) next power cycle or hardware reset
Host needs to reset the power-on write protect to memory regions
that it wants to apply this type of write protection each time after power
cycle or hardware reset

For boot partitions, Write Protect is applied to an entire boot partition

For User Area Partition and General Partitions, Write Protect is applied to memory
regions defined by multiples of Write Protect Group Size
For UFS, Write Protect is defined per Logical Unit

Each partition can be configured with two types of Attribute


Enhanced attribute (faster read/write access, better data integrity)
Default attribute (normal mass storage memory)

User may create enhanced area in the user area

UFS 1. 23 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
eMMC inheritance - Write Protect feature, example
Write Protect settings
(Assumption: write protect
group size = 4 MB)

Boot partitions Permanent


XLOAD
1,2

Eboot Power-On WP (4 MB)

Partition 1 Power-On WP (4 MB)


IPL (Initial Program Loader)
(Enhanced)
Logo Power-On WP (4 MB)

MBR (Master Boot Record) Power-On WP (4 MB)


Partition 2
ULDR (Update Loader) Power-On WP (4 MB)
(Enhanced)
NK (Kernel Partition) Power-On WP (8 MB)

Partition 3 Power-On WP (256 MB)


OS (image FS)
(Enhanced)

User area Unprotected


EXTFAT
(High density)

UFS 1. 24 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
eMMC inheritance - Secure Trim / Secure Erase
Secure When a Secure Erase command is sent, data in the specified memory addresses must be
erase purged from the physical memory array
Logical memory erase is not acceptable (erase operation in cache)
Secure erase command includes
Start address of erase groups
End address of erase groups
Secure For cases where smaller amounts of data might be spread through multiple erase groups, a
trim force garbage collect command is added
This allows the same function as Secure Erase to be performed on write Blocks (Sectors) instead
of erase Groups
1. Host indicates the start and end addresses of sectors to be erased
2. Host initiates the erase operation
User data area

Erase group

Erase group

Sectors to be erased

UFS 1. 25 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Host interface

Host controller Device

CPU ROM CPU DMA

UFS UFS SRAM


DMA Interconnect Host Device Interconnect
(cache)
IP IP

NAND Flash
SDRAM controller
controller

SCSI Command
NAND Flash Implementation
SDRAM RxBuffer
example
TxBuffer

The means by which the UFS controller transfers data into and out of Host memory
is via hardware and or firmware mechanism defined in a separate document entitled
UFS Host Controller Interface

UFS 1. 26 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
UTP layer
The device controls the pacing and state transitions needed to satisfy the data
transfers and status completion of a request
UTP Layer flow control
No need for the Host to poll the device for Ready status

1
Command (Data Out) SRAM
Host Device RxBuffer

2
Ready To Transfer SRAM
Host Device RxBuffer

3
Data (out) SRAM
Host Device RxBuffer

4 Status SRAM
Host Device RxBuffer

UFS 1. 27 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
UTP layer
When the Host requests data from device, it must allocate buffer in SDRAM so as to
accept all requested data prior to generating the request

1
SDRAM Command (Data In)
RxBuffer
Host Device

2
SDRAM Data (In)
Host Device
RxBuffer

3 SDRAM Status
RxBuffer
Host Device

UFS 1. 28 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Interface features
Host Device

VCCQ (1.2 V) Logic


Controller
VCCQ2 (1.8 V) I/O

NAND
VCC (1.8 / 3.0 V)
flash

Signaling as defined by M-PHY


400 mVp / 240 mVp (not terminated)
200 mVp / 120 mVp (terminated)

BER = 10-10 (1 error every 1010 transferred bits = 3.43 second at 2.9152 Gbps)

Two signaling schemes


Low power mode with PWM
High-speed burst mode

UFS 1. 29 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Interface features
UFS interface can support 1 or 2 Lanes
An equal number of downstream and upstream Lanes must be provided

Traffic sent over UniPro can be classified as Traffic Class 0 or 1 with TC1 as higher
priority class
TC1 (Low Latency) is not supported by UFS 2.0

The Host interface based on DMA and interrupt is not defined in UFS specification
but in the Host Controller specification

UFS 1. 30 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Encapsulation
SCSI Read Command
(10B)
10 B

UPIU
Read Command
UFS Header
Block (16B)
32 B (16B)

1 B
UniPro
Transport UPIU
L4s DestCPortID_ Fct Eom Read Command
Header
33 B =1 Enc =0 =1 Block (16B)
(16B)

1 B
UniPro
Network UPIU
DestDeviceID L4s DestCPortID_ Fct Eom Read Command
L3s=1 Header
34 B _Enc =1 Enc =0 =1 Block (16B)
(16B)

2 B 2 B

UniPro UPIU
DestDeviceID L4s DestCPortID_ Fct Eom Read Command CRC
Link ESC_DL SOF TC 0 L3s=1 Header ESC_DL EOF Seq#
_Enc =1 Enc =0 =1 Block (16B) 16
40 B (16B)
+
20 b 1 0 0 0 0 0 1 0

16* 17 bits

First Last

UniPro 17 bits
Physical 0/1 1B 1B
Adapter
40 B + 20 b 8 bits
K/D
M-PHY 8b10b encoder
40*10 = 400 bits 10 bits

UFS 1. 31 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Encapsulation
Data
(16 Blocks of
SCSI 4 KB)
10 B

UPIU UPIU Payload


Payload
UFS Header
(64K-1)+padding
Header 1 B + 3
32 B (16B) (16B) padding

UniPro
Transport 272 B
1 B
16B+64K+16B+4=241*272+20

L4s DestCPortID_ Fct Eom


=1 Enc =0 =0/1

UFS 1. 32 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Layer 2 initiated traffic

UniPro 2 B 2 B 2 B 2 B 2 B
Link
AFC Cr Rr
ESC_DL AFC TC Seq# Credit CRC-16 NAC ESC_DL NAC CRC-16
Acknowledge and eq eq
Not Ack
Flow Control

1 0 0 1 0

First Last

UniPro 17 bits
Physical 0/1 1B 1B
Adapter
8 bits
K/D
M-PHY 8b10b encoder
10 bits

AFC and NAC can be inserted in the payload of a UniPro Layer 3 SDU

UFS 1. 33 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
OVERVIEW
Layer 1.5 initiated traffic

2 B 2 B 2 B 2 B 2 B 2 B

PACP
ESC_PA PACP_BEGIN Function ID Parameter 0 … Parameter N-1 CRC-16
UniPro
Physical
Adapter
1 0 0 0 0 0

First Last

17 bits

0/1 1B 1B

8 bits
K/D
M-PHY 8b10b encoder
10 bits

PACP = Physical Adapter Control Protocol


13 different types
From 0 to 253 Parameters

UFS 1. 34 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
QUIZ

UFS 1. 35 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6
QUIZ

1. What is the main benefit of implementing several Logical Units ?

2. What does the Nexus represent ?

3. Does UFS support overlapped Commands having the same Nexus ?


An overlapped command occurs when a task manager or a task router detects the use
of a duplicate I_T_L_Q nexus in a command before that I_T_L_Q nexus completes its
command lifetime

UFS 1. 36 Overview

Reproduction is strictly forbidden without the express written permission of an authorized representative of AC6

Potrebbero piacerti anche