Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
DATA OVERWRITING IN PROBE-BASED DATA STORAGE DEVICES
Document Type and Number:
WIPO Patent Application WO/2004/003909
Kind Code:
A1
Abstract:
Methods and apparatus are provided for overwriting data in a probe-based data storage device (1) wherein data is represented by the presence and absence of pits formed in a storage surface (4) by a probe of the device. Input data is first coded such that successive bits of a given value x in the coded input data (bo, bl, b2, ..., ) are separated by at least d bits of the complementary value X, where d is a predetermined number >, 2. Overwrite data bits (vo, vl, v2, ..., ) are then generated by encoding the coded input data bits (bo, b1, b2, ..., ) . In this encoding process, assuming a pit represents a bit of value p in the data storage device (1), then the following conditions are satisfied. Firstly, any bit of value x in the coded input data (bo, bl, b2, ..., ) is encoded as an overwrite data bit of value p. Second, any bounded run of L 2d bits of value x in the coded input data (bo, bl, b2, ..., ) is encoded as a run of L overwrite data bits of value p. Third, any bounded run of L > 2d bits of value x in the coded input data (bo, bl, b2, ...,) is encoded as a run of L overwrite data bits consisting of n bits of value p and (L - n) bits of value p where n = CEILL(L - 2d)/d] and the n bits are positioned in the run such that: there is a bit of value p within d bits of the end of the run; there is a bit of value p within 2d + 1 bits of the beginning of the run; and, for n > 1, each of the n bits is within d bits of another of the n bits. The overwrite data bits (vo, vl, v2, ..., ) can then be used to overwrite old data on the storage surface (4), using a bit spacing such that writing an overwrite data bit of value p can erase an existing bit of value p within d bits of that overwrite data bit. The result of the overwrite operation is to record either the coded input data (bo, bl, b2, ..., ), or its complement (bo, bl, b2, ...,,, depending on the values of x and p. This result is independent of the bit values of the old data which is overwritten. 25

Inventors:
ANTONAKOPOULOS THEODORE (GR)
ELEFTHERIOU EVANGELOS S (CH)
POZIDIS HARIS (CH)
Application Number:
PCT/IB2003/002542
Publication Date:
January 08, 2004
Filing Date:
June 13, 2003
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
IBM (US)
ANTONAKOPOULOS THEODORE (GR)
ELEFTHERIOU EVANGELOS S (CH)
POZIDIS HARIS (CH)
International Classes:
G11B9/14; G11B20/10; G11B20/14; G11B20/12; G11B27/30; H03M5/14; (IPC1-7): G11B20/12; G11B27/30
Foreign References:
EP0718831A21996-06-26
EP1056077A22000-11-29
EP0991060A22000-04-05
EP0718831A21996-06-26
EP0991060A22000-04-05
EP1056077A22000-11-29
Other References:
VETTIGER, CROSS, DESPONT, DRECHSLER, ETC.: "Millipede-Nanotechnology Entering Data Storage", IEEE TRANSACTION OF NANOTECHNOLOGY, vol. 1, no. 1, March 2002 (2002-03-01), pages 39 - 55, XP002255614, Retrieved from the Internet [retrieved on 20030924]
Attorney, Agent or Firm:
Toleti, Martin (Saeumerstrasse 4 / Postfach, Rueschlikon, CH)
Download PDF:
Claims:
CLAIMS
1. A method for overwriting data in a probebased data storage device (1) wherein data is represented by the presence and absence of pits formed in a storage surface (4) by a probe of the device, the method comprising: coding input data such that successive bits of a value x in the coded input data (bo, b 1, b2,...,) are separated by at least d bits of value x, where d is a predetermined number 2 ; generating overwrite data bits (vo, v 1, v2,...,) by encoding the coded input data bits (bo, bl, b2,...,) such that, if a pit represents a bit of value p in the data storage device (1), then (a) any bit of value x in the coded input data (bo, bl, b2,...,) is encoded as an overwrite data bit of value p, (b) any bounded run of L < 2d bits of valuex in the coded input data (bo, bl, b2,...,) is encoded as a run of L overwrite data bits of value p, and (c) any bounded run of L > 2d bits of value x in the coded input data (bo, bl, b2,...,) is encoded as a run of L overwrite data bits consisting of n bits of value p and (Ln) bits of value p where n = CEIL [(L2d)/d] and the n bits are positioned in the run such that (cl) there is a bit of value p within d bits of the end of the run, (c2) there is a bit of value p within 2d + 1 bits of the beginning of the run, and (c3) for n > 1, each of the n bits is within d bits of another of the n bits; and overwriting data on the storage surface (4) with the overwrite data bits (vo, vl, v2,...,) at a bit spacing such that writing an overwrite data bit of value p can erase an existing bit of value p within d bits of that overwrite data bit.
2. A method as claimed in claim 1 including, for a run of L bits of valuex at the start of the coded input data (bo, b 1, b2,...,) for an overwrite operation: if L < d, encoding the run as a run of L overwrite data bits of value p ; and if L > d, encoding the run as a run of L overwrite data bits consisting of m bits of value p and (Lm) bits of value p where m = CEIL [(Ld)/d] and the m bits are positioned in the run such that (1) there is a bit of value p within d bits of the end of the run, (2) there is a bit of value p within d + 1 bits of the beginning of the run, and (3) for m > 1, each of the m bits is within d bits of another of the m bits.
3. A method as claimed in claim 1 or claim 2 including, for a run of L bits of value x at the end of the coded input data (bo, bl, b2,...,) for an overwrite operation: if L < d, encoding the run as a run of L overwrite data bits of value p ; if d < L < 2d, encoding the run as a run of (L + 1) overwrite data bits consisting of L bits of value p terminated by one bit of value p; and if L > 2d, encoding the run as a run of (L + 1) overwrite data bits consisting of a run of L overwrite data bits according to condition (c) of claim 1 terminated by one bit of value p.
4. A method as claimed in any preceding claim wherein p = 1.
5. A method as claimed in any preceding claim wherein x = 1.
6. A method as claimed in any preceding claim wherein d = 2.
7. A method as claimed in any preceding claim wherein the input data is coded such that successive bits of a value x in the coded input data (bo, bl, b2,...,) are separated by at least d and at most k bits of value x, where k is a predetermined number > d.
8. A method as claimed in claim 7 wherein d = 2 and k = 10.
9. A method for storage and recovery of data in a probebased data storage device (1) wherein data is represented by the presence and absence of pits formed in a storage surface (4) by a probe of the device, the method comprising storing data on the storage surface (4) by a method as claimed in any preceding claim, and decoding data read from the storage surface (4) by: if said value x equals said value p in the data storage device (1), performing the inverse of the coding applied to the input data to generate said coded input data (bo, bi, b2,...,) ; and if said value x equals said value p in the data storage device, taking the complement of the data read from the storage surface and then performing the inverse of the coding applied to the input data to generate said coded input data (bo, bl, b2,...,) ; thereby to recover said input data.
10. Coding apparatus for coding data for storage in a probebased data storage device (1) wherein data is represented by the presence and absence of pits formed in a storage surface (4) by a probe of the device, the apparatus comprising: a coder (6) for coding input data to be stored in the device such that successive bits of a value x in the coded input data (bo, bl, b2,...,) are separated by at least d bits of value x, where d is a predetermined number > 2; an overwrite pattern generator (7) for generating overwrite data bits (vo, V, v2,...,) by encoding the coded input data bits (bo, bl, b2,...,) such that (a) any bit of value x in the coded input data (bo, bl, b2,...,) is encoded as an overwrite data bit of value x, (b) any bounded run of L S 2d bits of value x in the coded input data (bo, bl, b2,...,) is encoded as a run of L overwrite data bits of value x, and (c) any bounded run of L > 2d bits of value x in the coded input data (bo, bl, b2,...,) is encoded as a run of L overwrite data bits consisting of n bits of value x and (Ln) bits of value x where n = CEIL [(L2d)/d] and the n bits are positioned in the run such that (cl) there is a bit of value x within d bits of the end of the run, (c2) there is a bit of value x within 2d + 1 bits of the beginning of the run, and (c3) for n > 1, each of the n bits is within d bits of another of the n bits.
11. Coding apparatus for coding data for storage in a probebased data storage device (1) wherein data is represented by the presence and absence of pits formed in a storage surface (4) by a probe of the device, the apparatus comprising: a coder (6) for coding input data to be stored in the device (1) such that successive bits of a value x in the coded input data (bo, bl, b2,...,) are separated by at least d bits of value x, where d is a predetermined number > 2; an overwrite pattern generator (7) for generating overwrite data bits (vo, vl, v2,...,) by encoding the coded input data bits (bo, bl, b2,...,) such that (a) any bit of value x in the coded input data (bo, bl, b2,...,) is encoded as an overwrite data bit of value x, (b) any bounded run of L < 2d bits of value x in the coded input data (bo, bl, b2,...,) is encoded as a run of L overwrite data bits of value x, and (c) any bounded run of L > 2d bits of value x in the coded input data (bo, bl, b2,...,) is encoded as a run of L overwrite data bits consisting of n bits of value x and (Ln) bits of value x where n = CEIL [ (L2d)/d] and the n bits are positioned in the run such that (cl) there is a bit of value x within d bits of the endof the run, (c2) there is a bit of valuex within 2d + 1 bits of the beginning of the run, and (c3) for n > 1, each of the n bits is within d bits of another of the n bits.
12. Apparatus (5) for coding and decoding data in a probebased data storage device (1) wherein data is represented by the presence and absence of pits formed in a storage surface (4) by a probe of the device, the apparatus (5) comprising: coding apparatus as claimed in claim 10 or claim 11; and a decoder (8) for decoding data read from the storage surface (4), the decoder (8) being arranged to implement the inverse of the code implemented by said coder (6).
13. Probebased data storage apparatus (1) comprising: a storage surface (4); a probe mechanism (2) for storing data on the storage surface (4) by forming pits therein such that data is represented by the presence and absence of pits at bit locations on the surface (4); a coder (6) for coding input data to be stored in the device such that successive bits of a value x in the coded input data (bo, bl, b2,...,) are separated by at least d bits of value x, where d is a predetermined number > 2; an overwrite pattern generator (7) for generating overwrite data bits (vo, vl, v2,...,) by encoding the coded input data bits (bo, bl, b2,...,) such that, if a pit represents a bit of value p then (a) any bit of value x in the coded input data (bo, bl, b2,...,) is encoded as an overwrite data bit of value p, (b) any bounded run of L < 2d bits of valuex in the coded input data (bo, bi, b2,...,) is encoded as a run of L overwrite data bits of value p, and (c) any bounded run of L > 2d bits of valuex in the coded input data (bo, bl, b2,...,) is encoded as a run of L overwrite data bits consisting of n bits of value p and (Ln) bits of value p where n = CEIL [(L2d)/d] and the n bits are positioned in the run such that (cl) there is a bit of value p within d bits of the end of the run, (c2) there is a bit of value p within 2d + 1 bits of the beginning of the run, and (c3) for n > 1, each of the n bits is within d bits of another of the n bits; wherein the probe mechanism (2) is arranged, in use, to overwrite data on the storage surface (4) with the overwrite data bits (vo, vl, v2,...,) at a bit spacing such that writing an overwrite data bit of value p can erase an existing bit of value p within d bits of that overwrite data bit.
14. Apparatus as claimed in claim 13 wherein the overwrite pattern generator (7) is arranged for encoding a run of L bits of value x at the start of the coded input data (bo, bl, b2,...,) for an overwrite operation by: if L < d, encoding the run as a run of L overwrite data bits of value p ; and if L > d, encoding the run as a run of L overwrite data bits consisting of m bits of value p and (Lm) bits of value p where m = CEIL [(Ld)/d] and the m bits are positioned in the run such that (1) there is a bit of value p within d bits of the end of the run, (2) there is a bit of value p within d + 1 bits of the beginning of the run, and (3) for m > 1, each of the m bits is within d bits of another of the m bits.
15. Apparatus as claimed in claim 13 or claim 14 wherein the overwrite pattern generator (7) is arranged for encoding a run of L bits of value x at the end of the coded input data (bo, bl, b2,...,) for an overwrite operation by: if L < d, encoding the run as a run of L overwrite data bits of value p ; if d < L < 2d, encoding the run as a run of (L + 1) overwrite data bits consisting of L bits of value p terminated by one bit of value p; and if L > 2d, encoding the run as a run of (L + 1) overwrite data bits consisting of a run of L overwrite data bits according to condition (c) of claim 13 terminated by one bit of value P.
16. Apparatus as claimed in any one of claims 13 to 15 including a decoder (8) for decoding data read from the storage surface (4), the decoder (8) being arranged to recover the input data by: if said value x equals said value p, performing the inverse of the coding applied to the input data to generate said coded input data (bo, bl, b2,...,) ; and if said value x equals said value p, taking the complement of the data read from the storage surface (4) and then performing the inverse of the coding applied to the input data to generate said coded input data (bo, bl, b2,...,).
17. Apparatus as claimed in any one of claims 13 to 16 wherein p = 1.
18. Apparatus as claimed in any one of claims 13 to 17 wherein the probe mechanism (2) comprises a plurality of individuallyaddressable probes for writing data on the storage surface (4).
19. Apparatus as claimed in any one of claims 10 to 18 wherein x = 1.
20. Apparatus as claimed in any one of claims 10 to 19 wherein d = 2.
21. Apparatus as claimed in any one of claims 10 to 20 wherein the coder (6) is arranged to code the input data such that successive bits of a value x in the coded input data (bo, bl, b2,...,) are separated by at least d and at most k bits of value x, where k is a predetermined number > d.
22. Apparatus as claimed in claim 21 wherein d = 2 and k = 10.
Description:
DATA OVERWRITING IN PROBE-BASED DATA STORAGE DEVICES This invention relates generally to probe-based data storage devices, and more particularly to overwriting of data in such devices. Embodiments of the invention provide methods and apparatus enabling data to be stored in such devices without first erasing previously-written data.

Probe-based data storage has long been recognized as a possible basis for ultrahigh density data storage. In probe-based data storage devices, stored data is represented on a storage surface by the presence and absence of indentations, or"pits", which are formed in the surface by a probe of the device. For example, in AFM (Atomic Force Microscope)-based storage devices, the probe is a nanometer-sharp tip mounted on the end of a microfabricated cantilever. This tip can be moved over the surface of a storage medium in the form of a polymer substrate. A mechanism is provided for heating the tip, and thus the polymer surface at the point of contact with the tip, allowing the tip to penetrate the surface to create a pit.

Such a pit typically represents a bit of value"1", a bit of value"0"being represented by the absence of a pit at a bit position on the storage surface. In a read-scan mode, the thermomechanical probe mechanism can be used to read-back data by detecting the deflection of the cantilever as the tip is moved over the pattern of bit indentations. AFM-based data storage is described in detail in IBM Journal of Research & Development, Volume 44, No. 3, May 2000, pp323-340,"The'Millipede'-More Than One Thousand Tips for Future AFM Data Storage", Vettiger et al. , and the references cited therein. As described in this document, while basic read/write operations can be implemented using a single cantilever probe, in practice an integrated array of individually-addressable cantilevers is employed in order to increase data rates.

A basic write operation in these probe-based storage devices thus involves creation of a pit in the storage surface by a micromechanical probe mechanism. As the pit is created, material is displaced by the probe and deposited in the area around the indentation. In the AFM-based device discussed above for example, melted polymer is deposited in the area around a pit creating"donut walls", or"rings", which have a higher topological profile than the polymer background. If a pit is formed sufficiently near to an existing pit, the displaced material can partly fill the existing pit, effectively changing a"1"to a"0"and thus erasing the "1". The physical mechanism exploited for probe-based data storage thus imposes a limit on

the smallest distance between pits created during a data write operation. This minimum distance Tmin is the smallest distance between adjacent pits created during a write operation for which writing the second pit will not erase the first pit due to displacement of material.

For basic data write operations this limit Tmin translates into a minimum allowable distance between stored data bits When overwriting of old data with new data is contemplated in probe-based storage devices, certain difficulties arise as a consequence of the mechanism employed for data storage. For example, since a zero corresponds to"no pit"at a bit position, writing a zero at a <BR> <BR> bit position corresponds to no action. Hence, "writing"a zero over a previously-written"1"at a bit position will leave the"1"in tact, rendering the newly-written data incorrect. Because of such problems, prior to our copending European Patent Application No. 02010648.0 filed 13 May 2002, probe-based data storage relied on the writing of data on"clean"storage surfaces, i. e. surfaces on which data has not previously been written or from which old data has been erased. For example, in the case of the Millipede device discussed earlier, old data can be erased by heating the storage surface to cause melting and"reflow"of the polymer. However, erasing of old data is clearly a power and time intensive process. In our European patent application referenced above, a system is disclosed which allows direct overwriting of old data with new data in probe-based data storage devices. This system effectively involves a two-stage coding process. In the first stage, input data is coded to prevent occurrence of two consecutive bits of a given value"x"in the coded input data. If x = 1 for example, then the coding ensures that successive"l's"in the coded input data are separated by at least"d" zeros, where d is a predetermined number > 1. The effect of this coding is to ensure that successive pits to be left in the storage surface after a write operation are always separated by at least one"no-pit". This coding therefore allows the stored bit density to be increased over the uncoded case where the minimum bit spacing is constrained to Tmin as explained above. In the second coding stage, an algorithm is employed to generate an overwrite bit sequence from the coded input bit sequence. In simple terms, the algorithms employed here are based on the premise that writing a pit can erase an existing, neighboring pit on either side of the new pit due to displacement of material as discussed above. When the resulting overwrite bit sequence is written on the storage surface, the effect is to record either the original coded input bit sequence, or the complement of this bit sequence, depending on particular operating

parameters. This result is independent of the bit values of the old data which is overwritten, and hence erasing of old data is not required.

The power expenditure in any data write operation in probe-based storage devices is directly related to the number of pits formed in the storage surface. From the principles underlying the overwrite system outlined above, it follows that writing an overwrite sequence generated from a given coded input bit sequence necessarily involves writing more pits than would writing the coded input bit sequence directly (though the latter operation would not of course allow overwriting of old data). The overwrite operation thus requires more power for given input data than a conventional write operation on a clean storage surface. Power consumption, always an important consideration, is thus a more prominent factor where direct-overwrite capability is provided. The present invention enables direct overwriting to be achieved with reduced power consumption compared to methods disclosed in our European patent application referenced above.

According to one aspect of the present invention there is provided a method for overwriting data in a probe-based data storage device wherein data is represented by the presence and absence of pits formed in a storage surface by a probe of the device. The method comprises : coding input data such that successive bits of a value x in the coded input data are separated by at least d bits of value x, where d is a predetermined number > 2; generating overwrite data bits by encoding the coded input data bits such that, if a pit represents a bit of value p in the data storage device, then (a) any bit of value x in the coded input data is encoded as an overwrite data bit of value p, (b) any bounded run of L < 2d bits of value x in the coded input data is encoded as a run of L overwrite data bits of value p, and (c) any bounded run of L > 2d bits of value x in the coded input data is encoded as a run of L overwrite data bits consisting of n bits of value p and (L-n) bits of value p where n = CEIL [ (L-2d)/d] and the n bits are positioned in the run such that (cl) there is a bit of value p within d bits of the end of the run, (c2) there is a bit of value p within 2d + 1 bits of the beginning of the run, and (c3) for n > 1, each of the n bits is within d bits of another of the n bits; and

overwriting data on the storage surface with the overwrite data bits at a bit spacing such that writing an overwrite data bit of value p can erase an existing bit of value p within d bits of that overwrite data bit.

Thus, in overwrite methods embodying the invention, the input data to be stored in the device is first coded to ensure that, in the coded input data, successive bits of a particular value x (which may be 0 or 1 in different embodiments) are separated by at least d bits of the complementary value x (where the symbol here and throughout signifies bit inversion).

The predetermined number d in this coding process is > 2. An overwrite bit sequence is then generated from the coded input bit sequence by an encoding process which satisfies the three conditions (a), (b) and (c). Condition (a) requires that any bit of value x in the coded input data is encoded as an overwrite data bit of value p, where p is the bit value which is represented by a pit in the data storage device. That is, p is the bit value which is written as a pit in the data storage device, the bit value p thus corresponding to"no-pit", where p can of course be 0 or 1 in different embodiments. Condition (b) specifies the encoding for bounded runs of length L < 2d bits, all of value x, in the coded input data, where a"bounded run"as used herein is a run of bits of a given value which is bounded on both sides by a bit of the complementary value. For instance, a bounded run of L zeros is immediately preceded by a "1"and immediately followed by a"1". According to condition (b), any bounded run consisting of L bits of value x in the coded input data, where L < 2d, is encoded as a run of L overwrite data bits of value p. Condition (c) specifies the encoding for bounded runs of length L > 2d bits, all of value x, in the coded input data. Each such L-bit run is encoded as a run of L overwrite data bits which consists of n bits of value p and (L-n) bits of value p, where n = CEIL [(L-2d)/d]. (The known function CEIL (y) represents the smallest integer that is greater than or equal to y). The n bits of value p are positioned in the L-bit run here such that all of the three sub-conditions (cl), (c2) and (c3) specified above are satisfied. The overwrite bit sequence generated according to this encoding process can then be written on the storage surface over existing, previously-written data. The bit spacing for this overwrite operation is set such that writing an overwrite bit of value p (i. e. writing a pit on the storage surface) can erase an existing bit of value p within d bits of that overwrite bit. This bit-spacing condition will be explained in more detail below.

The result of writing the overwrite bit sequence on the storage surface depends on the relationship between the values p and x. If p = x, then the bit sequence recorded on the

storage surface will be the original coded input data. In the alternative case where p = x, the recorded bit sequence will be the complement (i. e. the bit-inversion) of the coded input data.

This will be demonstrated below, and in both cases it will be seen that the result is independent of the bit values of the old data which is overwritten. The need to erase old data is therefore avoided. Moreover, direct overwriting is accomplished with substantially reduced power as compared with methods disclosed in our earlier patent application referenced above.

Indeed, particular methods embodying the invention provide for optimal overwrite operations wherein direct overwriting is achieved with minimum power consumption. These power advantages will be explained in more detail below.

The present invention is predicated on the realization that for d > 2, when advantage is taken of the higher surface bit densities permitted by this d-constraint, direct overwriting can be achieved by writing fewer pits in the storage surface than are required by the methods in our earlier patent application referenced above. In particular, a d > 2 constraint permits a bit spacing for writing of the overwrite sequence such that writing a pit can erase an existing pit within d bit positions. Methods embodying the invention generate overwrite bit sequences which exploit this effect, enabling direct overwriting to be achieved by writing fewer pits in the storage surface.

For coded input data sequences which begin and end with a bit of value x, conditions (a) to (c) above are sufficient for encoding the entire coded input data sequence. In such cases, the resulting overwrite data sequence will be optimal in the sense that the overwrite sequence contains the minimum possible number of bits of value p required for the overwrite operation. Since bits of value p are written as pits on the storage surface, this translates to a minimum number of pits and hence minimum power consumption for the overwrite operation. In general, of course, a coded bit sequence might start and/or end with a run of bits of value x. These runs could be encoded in various ways in the overwrite sequence, with relatively minor impact on overall power consumption since the remainder of the bit sequence will be optimally encoded as just described. However, in preferred embodiments such start and/or end runs can be optimally encoded in the following manner. Considering first a run of L bits of value x-at the start of the coded input data for an overwrite operation, this can be optimally encoded by: if L < d, encoding the run as a run of L overwrite data bits of value p ; and

if L > d, encoding the run as a run of L overwrite data bits consisting of m bits of value p and (L-m) bits of value p where m = CEIL [ (L-d)/d] and the m bits are positioned in the run such that- (1) there is a bit of value p within d bits of the end of the run, (2) there is a bit of value p within d + 1 bits of the beginning of the run, and (3) for m > 1, each of the m bits is within d bits of another of the m bits.

For a run of L bits of value x at the end of the coded input data for an overwrite operation, this can be optimally encoded by: if L < d, encoding the run as a run of L overwrite data bits of value p ; if d < L < 2d, encoding the run as a run of (L + 1) overwrite data bits consisting of L bits of value p terminated by one bit of value p; and if L > 2d, encoding the run as a run of (L + 1) overwrite data bits consisting of a run of L overwrite data bits as defined in condition (c) above terminated by one bit of value p.

Thus, runs of L > d bits of value x-at the end of the coded input data are encoded as runs of (L + 1) overwrite bits, resulting in an extra bit at the end of the overwrite sequence. This extra bit is required to give the correct recorded bit pattern but can be ignored on subsequent data read-out as explained below. By applying these additional encoding conditions for runs of bits of value x at the start and end of the coded input data for a write operation, the entire overwrite bit sequence will be optimal in that it will contain the minimum possible number of bits of value p, and hence will require minimum power expenditure in the overwrite operation.

While in general any coding scheme imposing a d > 2 constraint can be employed for the initial coding of the input data, preferred embodiments of the invention utilize codes based on principles of RLL (Run-Length Limited) (d, k) constraint codes. Conventionally in such codes, the (d, k) constraint signifies that successive 1's in the coded bit sequence are separated by at least"d"zeros and at most"k"zeros, where k > d. As explained above however, in different embodiments of the invention the initial input data coding may prohibit two consecutive"1's" (x = 1) or two consecutive"0's" (x = 0) in the coded input data. Thus, while"d"and"k"conventionally represent numbers of zeros, in some embodiments of the invention these constraints may apply to the numbers of"1's"allowed between zeros.

A second aspect of the present invention provides coding apparatus for coding data for storage in a probe-based data storage device wherein data is represented by the presence and absence of pits formed in a storage surface by a probe of the device. The apparatus comprises: a coder for coding input data to be stored in the device such that successive bits of a value x in the coded input data are separated by at least d bits of value x, where d is a predetermined number > 2; an overwrite pattern generator for generating overwrite data bits by encoding the coded input data bits such that (a) any bit of value x in the coded input data is encoded as an overwrite data bit of value x, (b) any bounded run of L < 2d bits of value x in the coded input data is encoded as a run of L overwrite data bits of value x, and (c) any bounded run of L > 2d bits of value x in the coded input data is encoded as a run of L overwrite data bits consisting of n bits of value x and (L-n) bits of value x where n = CEIL [(L-2d)/d] and the n bits are positioned in the run such that (cl) there is a bit of value x within d bits of the end of the run, (c2) there is a bit of value x within 2d + 1 bits of the beginning of the run, and (c3) for n > 1, each of the n bits is within d bits of another of the n bits.

Similarly, a third aspect of the invention provides coding apparatus for coding data for storage in a probe-based data storage device wherein data is represented by the presence and absence of pits formed in a storage surface by a probe of the device, the apparatus comprising : a coder for coding input data to be stored in the device such that successive bits of a value x in the coded input data are separated by at least d bits of value x, where d is a predetermined number > 2; an overwrite pattern generator for generating overwrite data bits by encoding the coded input data bits such that (a) any bit of value x in the coded input data is encoded as an overwrite data bit of value x, (b) any bounded run of L < 2d bits of value x in the coded input data is encoded as a run of L overwrite data bits of value x, and (c) any bounded run of L > 2d bits of value x in the coded input data is encoded as a run of L overwrite data bits consisting of n bits of value-x and (L-n) bits of value x where n = CEIL [(L-2d)/d] and the n bits are positioned in the run such that

(cl) there is a bit of value x within d bits of the end of the run, (c2) there is a bit of value x within 2d + 1 bits of the beginning of the run, and (c3) for n > 1, each of the n bits is within d bits of another of the n bits.

Coding apparatus embodying the second and third aspects of the invention thus generate overwrite data sequences which can be supplied to a probe mechanism of a data storage device for use in overwriting previously-written data. For a given input data sequence, coding apparatus embodying the second aspect of the invention generates an overwrite sequence which is the complement of that produced by apparatus embodying the third aspect of the invention. Coding apparatus embodying the second aspect of the invention is particularly suitable for use with probe-based storage devices in which a bit of value x is written as a pit (p = x). Coding apparatus embodying the third aspect of the invention is particularly suitable for use with probe-based storage devices in which a bit of value x is written as a pit (p = x-). In each case, the overwrite bit sequence generated by the apparatus can then be supplied directly to the probe mechanism as the data to be written on the storage surface. However, both types of coding apparatus could be used with the opposite type of probe-based storage device (i. e. where a pit represents a bit of the complementary value to that just specified) simply by inverting (i. e. taking the complement of) the overwrite sequence in the storage device to obtain the final write sequence to be written on the storage surface.

The invention also provides methods for storage and recovery of data in a probe-based data storage device wherein data is stored on the storage surface by a method as hereinbefore described, and wherein data read from the storage surface is decoded by one of two methods depending on the relationship between the values p and x in a particular case. If p = x then the original input data is recovered by performing the inverse of the coding which was initially applied to the input data to generate the coded input data. However, if p = x then the original input data is recovered by taking the complement of the data read from the storage surface and then performing the inverse of the initial input data coding. The invention similarly provides apparatus for coding and decoding data in a probe-based data storage device, the apparatus comprising coding apparatus as hereinbefore described and a decoder for decoding data read from the storage surface, wherein the decoder is arranged to implement the inverse of the code implemented by the coder of the coding apparatus. Again, depending on the relationship between p and x in a particular device, it may be necessary, prior to

implementing the inverse code, to take the complement of the data read from the storage surface. This step could therefore be performed by the decoder itself in some embodiments.

The invention also extends to probe-based data storage devices employing methods and apparatus as hereinbefore described. In particular, a further aspect of the invention provides probe-based data storage apparatus comprising: a storage surface; a probe mechanism for storing data on the storage surface by forming pits therein such that data is represented by the presence and absence of pits at bit locations on the surface; a coder for coding input data to be stored in the device such that successive bits of a value x in the coded input data are separated by at least d bits of value x, where d is a predetermined number > 2; an overwrite pattern generator for generating overwrite data bits by encoding the coded input data bits such that, if a pit represents a bit of value p then (a) any bit of value x in the coded input data is encoded as an overwrite data bit of value p, (b) any bounded run of L < 2d bits of value x in the coded input data is encoded as a run of L overwrite data bits of value p, and (c) any bounded run of L > 2d bits of value x in the coded input data is encoded as a run of L overwrite data bits consisting of n bits of value p and (L-n) bits of value p where n = CEIL [(L-2d)/d] and the n bits are positioned in the run such that (cl) there is a bit of value p within d bits of the end of the run, (c2) there is a bit of value p within 2d + 1 bits of the beginning of the run, and (c3) for n > 1, each of the n bits is within d bits of another of the n bits; wherein the probe mechanism is arranged, in use, to overwrite data on the storage surface with the overwrite data bits at a bit spacing such that writing an overwrite data bit of value p can erase an existing bit of value p within d bits of that overwrite data bit.

In general it is to be understood that, where features are described herein with reference to a method embodying the invention, corresponding features may be provided in apparatus embodying the invention, and vice versa.

Embodiments of the invention will now be described, by way of example, with reference to the accompanying drawings in which: Figure 1 is a schematic block diagram of a probe-based data storage device embodying the invention;

Figure 2 illustrates the principle of the increased surface bit-density available when a d = 2 code is utilized in the Figure 1 embodiment; Figures 3,4 and 5 are tables illustrating encoding schemes which can be implemented in the overwrite pattern generator of Figure 1 where d = 2; Figure 6 illustrates an overwrite operation in the Figure 1 device using an encoding scheme embodying the invention; Figure 7 is a table comparing an encoding scheme embodying the invention with two encoding schemes disclosed in our earlier European patent application referenced above; Figure 8 tables run-length probabilities for two encoding methods from our earlier application; Figures 9 and 10 are tables comparing an embodiment of the invention with the two encoding methods from our earlier application; Figure 11 is a table illustrating encoding schemes which can be implemented in the overwrite pattern generator of Figure 1 where d = 3; Figure 12 is a table illustrating encoding schemes for use in an alternative embodiment where the bit value x = 0; and Figure 13 illustrates an overwrite operation for the alternative embodiment of Figure 12.

Figure 1 shows a probe-based storage device 1 embodying the invention. The device 1 includes a probe-storage mechanism which, in this embodiment, comprises a Millipede probe-storage array 2, with associated array driver & detector circuitry 3, of the type described in the document referenced above. Under control of driver/detector circuitry 3, the probe array 2 can thus be used to write and read data on the surface of a polymer storage medium 4. The device 1 also includes coding/decoding apparatus which is indicated generally at 5. The coding portion of coding/decoding apparatus 5 consists of a (d, k) coder 6 and an overwrite pattern generator 7 connected as shown between the data input and the array driver/detector circuitry 3. The decoding portion of coding/decoding apparatus 5 consists of a (d, k) decoder 8 connected between the driver/detector circuitry 3 and the data output.

In operation of the device, input data to be stored is supplied to (d, k) coder 6 which implements a (d, k) code with d > 2 to generate coded input data bits bo, bl, b2,..., etc. The (d, k) coder can be implemented in known manner, the (d, k) code applied ensuring that successive bits of a particular value x in the coded input data are separated by at least d and at

most k bits of value x, where k > d. The (d, k) coded input data bo, bl, b2,..., is supplied to overwrite pattern generator 7 which implements an encoding scheme described further below to generate an overwrite bit sequence vo, vl, v2,..., etc. This overwrite data vo, vl, V2,..., is output to array driver circuitry 3 which drives probe array 2 to write the overwrite data on the storage surface 4 with a bit spacing as discussed below.

In the present embodiment, it is assumed that pit formed in the storage surface 4 represents a bit of value"1" (i. e. p = 1). Thus, a"1"in the overwrite data supplied to circuitry 3 is written as a pit on storage surface, a"0"in the overwrite data corresponding to"no-pit".

In addition, it is assumed that x = 1 in the (d, k) coding process, so that the (d, k) constraints apply to numbers of zeros and successive l's in the coded input data bo, bl, b2,..., are separated by at least d and at most k zeros. While, in general, any code which imposes a d > 2 constraint will allow operation of overwrite methods embodying the invention, particular examples of (d, k) codes which may be employed here are the two rate 8/16 (2,10) codes detailed in our earlier European patent application referenced above, the content of which application is incorporated herein by reference. The following description of operation of the present embodiment will thus focus on the example of a (2,10) code.

In operation of the embodiment, the effect of the d = 2 constraint is that successive pits to be left in the storage surface after a write operation will be separated by at least two "no-pits". This allows the surface bit density to be increased compared to that for uncoded data as illustrated schematically in Figure 2. This figure shows two successive pits formed in storage surface 4 at the minimum possible spacing Trffln (i. e. the minimum distance at which writing the second pit will not erase the first pit due to displacement of material). For uncoded data, where adjacent"1's"can occur in the bit sequence, Tmin thus represents the minimum possible bit spacing for writing data on the storage surface. With a d = 2 constraint however, successive"I's"will always be separated by at least two"0's", so the minimum bit spacing is reduced to Tin/3 as illustrated. At this bit spacing, it follows that writing an overwrite bit of value 1 will erase a previously-written"1"within 2 bit positions of the newly-written overwrite bit due to displacement of material. It is this effect which is exploited in the overwrite system to be described. Thus, the bit-spacing utilized for write operations in the present embodiment is such that writing a"1"will erase a previously-written"1"within 2 bit positions of the newly-written"1". Note that this bit spacing need not be the minimum possible bit spacing for d = 2. While the minimum bit spacing is ideally employed in order to

achieve maximum data storage density, it actually suffices that the distance D marked in Figure 2 is less than Trin. More generally, for any value of d > 2 in overwrite systems embodying the invention, the bit spacing employed in the overwrite operation is such that writing an overwrite data bit of value p can erase an existing bit of value p within d bits of the newly-written overwrite bit. For maximum data storage density, it will generally be desirable to use the minimum possible bit spacing of Tnzin/(d+l) The encoding schemes which can be implemented in the overwrite pattern generator 7 for the (2,10) code will now be described with reference to Figures 3 to 5. In Figure 3, the left-hand column of the table shows the nine basic run patterns which can appear in the coded input data bi,... when a (2,10) code is employed in coder 6. Each of these patterns consists of a run of L zeros, where 2 < L < 10, terminated by a"1". The right-hand column of the table shows the overwrite patterns vi,... which can be used by overwrite pattern generator 7 for encoding each of these b ; patterns. For the bi-patterns numbered 1 to 3 and odd-numbered patterns thereafter, the overwrite patterns are unique. For the remaining b ; patterns, there is a choice of vu-patterns which can be used in overwrite pattern generator 7. According to the encoding rules implemented in the overwrite pattern generator, a bit of value x in the coded input data bi,... is always encoded as an overwrite bit of value p, where in this embodiment x=p=l. Thus the"l's"at the end of the bi-patterns in the table are encoded as"1's"at the end of the corresponding Vrpattems, as demarcated by the broken lines in the columns. The remaining part of each bi-pattern is a run of L zeros, and these runs are encoded such that one of two conditions is satisfied depending on the value of L. If L < 2d, i. e. if L < 4 in this case, then the run of L zeros in the bi-pattern is encoded as a run of L zeros in the pattern. In this example therefore, the first three overwrite patterns in the table are identical to the corresponding b ; patterns. For the remaining bi-patterns L > 2d, and the runs of L zeros are encoded according to a different rule. Each of these runs is encoded as a run of L overwrite bits consisting of n"1's"and (L-n) zeros, where the number n is given by n = CEIL [(L-2d)/d]. Thus: for 2d < L < 3d, n=l ; for 3d < L < 4d, n=2; and so on. Moreover, the position of the n"1's"in the run of overwrite bits is important. Consideration of the runs shown in the table shows that, in all cases: there is a"1"within d bits of the end of the run; there is a"1"within 2d + 1 bits of the beginning of the run ; and if n > 1, each of the n"l's"is within d bits of another of the n"1's".

The vi-patterns of Figure 3 apply where the corresponding patterns are preceded by a"1"in the coded input data sequence, so that the runs of L zeros in the patterns are bounded runs. This will usually be the case since the preceding bi-pattern in the coded input data sequence will terminate in a"1". However, the coded input data may start with a run of zeros which is not preceded by a"1", and/or may end with a run of zeros which is not terminated by a"1". The encoding conditions for such start and end patterns will be explained below, but it is useful first to consider the basic patterns of Figure 3 since the operating principle of the overwrite system can be seen from these patterns. The bits of a vu-pattern output by overwrite pattern generator 7 will be written sequentially on storage surface 4, starting with the left-hand bit in the Figure 3 representation, and old data may be overwritten in this process. Recall that the bit spacing for the write operation is such that writing a"1" will erase a previously-written"1"within d bits, here 2 bits, of the newly-written"1". Thus, the first two bits of a vi-pattern in Figure 3 can always be zero since any"1"in the old data at these bit positions will have been erased by writing the terminal 1 of the preceding pattern.

It can also be seen that the"1's"are positioned in the patterns such that, as writing of a vi-pattern continues, any"1's"in the old data being overwritten will be erased by one of the "1's"in the Vrpattem. Moreover, where there is more than one"1"in the v ; pattern, all but the terminal"1"will be erased by writing a subsequent"1"in the v ; pattern. The resulting bit pattern recorded on the storage surface will thus be the appropriate pattern.

The possible patterns at the start of a coded input data sequence for a write operation are shown in Figure 4 together with the corresponding patterns which can be used in overwrite pattern generator 7. For the patterns 1 and 2 and even-numbered patterns thereafter, the overwrite patterns are unique, whereas, for the remaining bi-patterns, there is a choice of patterns which can be used in overwrite pattern generator 7. Each of the patterns consists of a run of L zeros, where 1 < L < 10, terminated by a"1". According to the general rule that"l's"in the coded input data are always encoded as"1's"in the overwrite data, the"l's"at the end of the patterns in the figure are encoded as"l's"at the end of the corresponding vi-patterns, as demarcated by the broken lines in the columns. The remaining part of each bi-pattern is a run of L zeros, and these runs are not bounded runs since there is no preceding bi-pattern which terminates in a"1". These L-bit runs are encoded in the patterns such that one of two conditions is satisfied depending on the value of L. For L < d, i. e. L < 2 here, the run is encoded as a run of L zeros in the vi-pattern. However, each

run for which L > d is encoding as a run of L overwrite data bits consisting of m"1's"and (L - m) zeros, where m = CEIL [(L-d)/d]. Thus for d < L < 2d, m=l ; for 2d < L < 3d, m=2; and so on. In addition, consideration of these L-bit runs in the vi-patterns shows that, in each case, the m bits are positioned so that: there is a"1"within d bits of the end of the run; there is a "1"within d + 1 bits of the beginning of the run; and, for m > 1, each of the m bits is within d bits of another of the m bits. Comparing the resulting vi-patterns for patterns 3 to 10 here with those for the same patterns in Figure 3 shows that the vi-patterns in Figure 4 contain an extra"1"within d+1 bits of the beginning of the pattern. This is to deal with the fact that a "1"in old data overwritten by the first two bits of the vu-pattern will not have been erased by a preceding pattern, since the current pattern is the beginning of the overwrite data sequence.

Insofar as the coded input data sequence for a write operation may end with a bi-pattern other than those of Figure 3, the possible end-patterns are shown in Figure 5 together with the corresponding vu-patters which can be used in overwrite pattern generator 7. Each of these patterns consists of a run of L zeros, where 1 < L < 10, and once again these runs are not bounded runs since there is no terminal"1"in this case. The conditions for encoding these runs in the vu-patters again depends on the value of L. If L < d, i. e. L < 2 here, the run is encoded in the vi-pattern as a run of L zeros. However, runs 3 to 10 in Figure 5 (for which L > d) are encoded identically to patterns 2 to 9 respectively of Figure 3. As a consequence, vi-patterns 3 to 10 in Figure 5 contain an extra bit compared to their corresponding bi-patterns. This extra bit is the"1"at the end of the pattern and is required to ensure that the resulting recorded bit pattern, excluding the extra bit itself, is the correct b ; pattern.

The tables of Figure 3 to 5 give all the possible vu-patters which can be utilized in overwrite pattern generator 7 for the (2,10) code and which contain the minimal possible number of"1's"necessary to achieve direct overwriting. Where the pattern for a given bi-pattern is not unique, any one of the equivalent vu-patters can be used, so that a different pattern might be used for the same bi-pattern at different times. For simplicity of implementation, however, the overwrite pattern generator will generally be configured to encode a given bi-pattern as a given pattern. In a preferred embodiment, therefore, the overwrite pattern generator 7 encodes each bi-pattern in Figures 3 to 5 as the corresponding vu-pattern which is listed first in the tables where there is a choice. These vu-patters contain a

simple repeating"01"sequence as shown in the figures. As the coded input data is received in operation, the overwrite pattern generator 7 operates as a kind of look-ahead encoder in that it finds the position of each successive"1"in the input bit stream. Each"1"marks the end of the current bi-pattern, this being encoded as the appropriate vi-pattern which is then output to the array driver 3. If there is no"1"at the end of the coded input data for a write operation, the overwrite pattern generator uses the appropriate vi-pattern from Figure 5 as the last v ; pattern. In some embodiments, the overwrite pattern generator may be implemented in software, and suitable software will be apparent to those skilled in the art from the description herein. In other embodiments, the overwrite pattern generator may be implemented in hardware or a combination of hardware and software, e. g. by hardwired logic gates or as a lookup table for example.

Figure 6 demonstrates the overwrite operation by way of a worked example for the case where the vi-patterns used in overwrite pattern generator 7 are the first-listed patterns in Figures 3 to 5. The bit sequence at the top of this figure represents an old data pattern which is to be overwritten. The second bit sequence represents a new data pattern to be recorded, i. e. the coded input data bo, bl, b2,..., output by (d, k) coder 6. The third bit sequence is the overwrite pattern vo, vl, v2,..., generated by overwrite pattern generator 7 from the coded input data. In this simplistic example, the data to be recorded consists of only 18 bits, though in practice a line of data for a write operation will typically be much longer. Each of the nineteen bit patterns beneath the overwrite sequence in the figure shows the bit pattern as recorded on the storage surface after writing successive bits of the overwrite sequence. Thus, the first of these shows the recorded pattern after vo is written, the second shows the recorded pattern after v 1 is written, and so on. In each pattern, the newly-written bit is shown in bold.

Since writing a"1"can erase a previously-written"1"within 2 bits of the write position, each write operation can potentially affect the values of five consecutive bits (decreasing to three consecutive bits towards the beginning and end of the write sequence) within the area bounded by broken lines in the figure. As the write operation progresses, the old data is gradually transformed into the new bi sequence. Once the extra bit vis at the end of the overwrite sequence has been written, it can be seen that the recorded 18-bit sequence prior to this extra bit is the required bi sequence. Note from this example that it can never be necessary to erase two"1's"both to the left or both to the right of the write position, since two consecutive"1's"are prohibited by the (d, k) code. Also, when a"1"is written at the

position of an existing"1", then the two existing bits on each side of this position are necessarily zeros, so that no bits need to be erased in this situation.

With regard to the extra bit required in some cases, in practice guard bands will typically be provided around writable sectors on the storage medium to ensure there is space at the beginning and end of a row and avoid interference between data in different sectors.

When data is read-back from the storage medium, extra bits in guard bands are ignored, and the bi sequence is simply supplied by detector circuitry 3 to the (d, k) decoder 8. This decoder implements the inverse of the (d, k) code performed by coder 6, whereby the original input data is recovered as output data.

It will be seen that the above system allows old data to be directly overwritten, avoiding the need to erase data before a write operation. Moreover, this is achieved with substantially less power expenditure than with methods disclosed in our earlier European patent application referenced above. That application describes two basic overwrite methods, referred to in the application as"method 1"and"method 2". The overwrite patterns generated by those methods for the basic bi-patterns of Figure 3 are listed in the table of Figure 7. The last column of this table lists the overwrite patterns for the simple embodiment of the present invention discussed above. Comparison of these patterns shows that the new technique provides overwrite patterns containing far fewer"1's"than those of the earlier methods.

Indeed, the new overwrite patterns contain the minimum possible number of"1's"required to achieve direct overwriting. This translates to optimal power consumption in the overwrite operation. The significance of the power saving here is demonstrated by the following analysis.

Let Pu bue the power required for a single write operation (i. e. writing a single"1"in the above example), and pi be the probability of a run-length of i consecutive zeros both preceded and followed by a"1" (i. e. a bounded run of i zeros). Taking the (2,10) code discussed above as an example, then, from Figure 7, the average power dissipation for each the three methods is given by: 10 Pmethodl =Pw I i-pi (1) i=2 10 Pmet) 7od2 = Pw S l) p i i=2

P=Pw (p2+. p3-4+2p5+2p6+3p7+3ps+4p9+4pio) (3) The power required for any particular overwrite method should be measured against the corresponding power for a basic write operation on a clean storage surface. The power required for such a basic write operation is: 10 Pwrite = Pw ß l. pi = Pw (4) i=2 10 since, pi = 1 i=2 The reduction in power dissipation through using one method over another can be quantified by the"power dissipation reduction factor"fA, B, where: <BR> <BR> fA, PmethadA (Cl<BR> methods The power advantages of one method over another depend on the run-length probabilities of the specific code used. The run-length probabilities have been estimated for the two rate 8/16 (2, 10) codes disclosed in our earlier application (referred to as"Code 1"and "Code 2") and shown in the table of Figure 8. Based on these probabilities, the power dissipation of the various methods for both codes is indicated in the table of Figure 9. The power dissipation reduction factors for the three overwrite methods, with Method 1 as a reference, are shown in the table of Figure 10. It can be seen from these tables that, when using Code 2 for example, Method 2 requires 73.2% of the power required by Method 1, whereas the new method requires only 37.2% of this power. Compared to a simple write operation on a clean substrate, the new method requires only about 39% more power, whereas Method 2 requires about 173% more power. The new overwrite system thus offers a dramatic saving in power consumption over the earlier overwrite methods.

While operation of the overwrite system has been illustrated above for a (2,10) code, by applying the general encoding rules for generating overwrite patterns the system can be employed with any d > 2 code. By way of example, Figure 11 shows the overwrite patterns for basic bi-pattems (equivalent to those of Figure 3) with a d=3 code. These can of course be continued for any value of k. Indeed, while the k-constraint is desirable for timing recovery purposes, a k constraint is not in theory necessary for operation of the overwrite technique. In addition, while the value x=p=l in the above example, the system can be applied with either value of x and either value of p using the generalized rules set out earlier. By way of example, Figure 12 shows the equivalent table to Figure 3 for an alternative embodiment in which x =

0 and p = 1. In embodiments where x = p, whether this value is"0"or"1", the result of an overwrite operation is to record the coded input data bo, bl, b2,..., on the storage surface as in the example above. However, where x = p as in Figure 12, then the overwrite operation will record the complement of the coded input data, i. e. bo, bl, b2,...,. This is demonstrated in Figure 13 which shows the equivalent example to Figure 6 but in which it is assumed that x = 0 and p = 1. Thus, in embodiments where x = p, an inverter is provided between drive circuitry 3 and decoder 8 in Figure 1, whereby data read from the storage surface is decoded by taking the complement of this data and then performing the inverse (d, k) coding.

While the storage device 1 employs a Millipede probe storage array in the particular embodiment described, different probe mechanisms may be employed in other probe-based storage devices embodying the invention. Moreover, embodiments of the invention could use write-pattern selection as described in our earlier application, whereby a controller selects either the overwrite data or the coded input data as the write pattern depending on whether the write pattern is to overwrite old data or is to be written on a clean area of the storage surface.

However, since embodiments of the invention have reduced overwrite power requirements comparable to those for basic write operations on clean surfaces, write-pattern selection is less relevant here, and the simple system described above will generally be preferred. Many other changes and modifications can of course be made to the specific embodiments described above without departing from the scope of the invention.