AnandTech Storage Bench 2011—Light Workload

Our new light workload actually has more write operations than read operations. The split is as follows: 372,630 reads and 459,709 writes. The relatively close read/write ratio does better mimic a typical light workload (although even lighter workloads would be far more read centric).

The I/O breakdown is similar to the heavy workload at small IOs, however you'll notice that there are far fewer large IO transfers:

AnandTech Storage Bench 2011—Light Workload IO Breakdown
IO Size % of Total
4KB 27%
16KB 8%
32KB 6%
64KB 5%

Light Workload 2011—Average Data Rate

While the 840 didn't shine in our Heavy suite, it definitely takes the crown in our Light suite. The 840 Pro is still faster, obviously, but the 840 is the second fastest SSD we have tested. As the 840 is aimed towards consumers, the Light workload test should be a better indication of overall performance than our Heavy suite.

Light Workload 2011—Average Read Speed

What's rather odd is that the average write speed is over 100MB/s higher than any synthetic write benchmark we ran.

Light Workload 2011—Average Write Speed

Light Workload 2011—Disk Busy Time

Light Workload 2011—Disk Busy Time (Reads)

Light Workload 2011—Disk Busy Time (Writes)

AnandTech Storage Bench 2011 Performance Over Time & TRIM
Comments Locked

86 Comments

View All Comments

  • roedtogsvart - Monday, October 8, 2012 - link

    Might have to finally replace my Intel 320 with this. Very nice review Kristian
  • Old_Fogie_Late_Bloomer - Monday, October 8, 2012 - link

    Both the Intel 320 and the Samsung 840 Pro support encryption...does the non-Pro 840 offer it or not? I'm swinging back towards getting an 840 Pro for my laptop because of the lack of encryption in consumer 830 drives.

    On a side note, I was disappointed to discover recently that my current desktop motherboard doesn't support hard drive passwords, which is a shame given the fact that my system disk (an Intel 320) does...oh well.
  • ekon - Monday, October 8, 2012 - link

    The ATA password-based encryption these drives use is beset with issues, flaky motherboard support being just one.

    http://communities.intel.com/thread/20537

    On top of which, it's very poorly documented, and notice how reviews give it nothing more than a passing mention without testing the feature. A TrueCrypt/DiskCryptor alternative it is not :-/
  • Samus - Tuesday, October 9, 2012 - link

    I've had my 320 for two years, no problems with encryption, ever.

    And I second roedtogsvart that I may FINALLY replace my aging SSD with one of these. I've been thinking Intel 520 for awhile but still don't trust Sandforce, even with Intel at the helm.

    Samsung and Crucial are keeping the controllers simple, which is why they have the most reliable drives outside of Intel's original X25-M/320 SSD's.
  • Old_Fogie_Late_Bloomer - Tuesday, October 9, 2012 - link

    When you say "these drives", do you mean the Intel 320, the Samsung 840 Pro, or both? My T430 supports hard drive passwords for the expressly-stated purpose of allowing for encrypted SSDs, which is why I'm looking at the 840 Pro in particular.

    It seems like the only downsides would be having to enter the password to use the computer, and having to use a motherboard that supports HD passwords to access the drive (so I couldn't just plug it into my current desktop if something were to happen to my laptop and it were off for repair or whatever).
  • ruberbacchus - Saturday, October 20, 2012 - link

    On one hand, it seems to me that the potential gains performance-wise with hardware-based rather than software-based encryption are enormous; particularly so on older computers with slower processors. On the other hand, an encryption solution that is not properly documented as well as thoroughly verified and verifiable does simply not exist as a solution; confidence in the implementation is essential to the deployment of encryption. Unfortunately, it seems impossible to obtain clear references to how encryption works in this new class of SSD's. I read somewhere that it should conform to the OPAL standard, which mandates hardware-embedded keys. I am not sure this is such a great idea, for two reasons:
    - the keys will potentially be known to the manufacturer;
    - the keys will be open to physical attacks on the chip controller.
    With TrueCrypt e.g., the user himself generates the encryption keys, the master key used for encrypting the data as well as the header key used to wrap the master key. The latter is tied to the user's password. With hardware-based encryption, passwords may be used for authentication, but the keys will not necessarily be derived from the password. Unchangeable encryption keys weakens the security. In order for the system to be trustworthy, the user should be able to generate and re-generate at will their own encryption keys. At the moment it is not clear this is the case.
  • GreenReaper - Wednesday, August 8, 2018 - link

    It's true. Although not necessarily the fault of the drives, either. My leased server was taken offline by the installation of SSDs which the hardware (or rather, its firmware) couldn't handle. I dumped the firmware logs and traced it to commands relating to ATA security. Don't know if it had been set by the previous users of the SSDs or whatever, but it managed to freeze up the entire controller.
  • A5 - Monday, October 8, 2012 - link

    I guess I'm old fashioned and don't throw away my laptop every 6 months, but a 3.5 year lifetime seems really really short.
  • crimson117 - Monday, October 8, 2012 - link

    Agreed; maybe for a video card, but I expect longer than 3.5 years out of my hard drives.
  • repoman27 - Monday, October 8, 2012 - link

    Really? I rarely expect a consumer grade HDD to last much longer than that these days. In fact, I've seen an alarming trend of drives failing just past the 2 year mark, and still within the 3 year warranty period. (RMA'd one last week even.)

Log in

Don't have an account? Sign up now