Feeds

Disk platter sizes vary with drive speeds

Faster speeds equal small platters

High performance access to file storage

Comment When is a 2.5-inch form factor drive not a 2.5-inch form factor drive?

A small form factor (SFF) drive comes in an industry standard 2.5-inch form factor case size. Inside that there can be one or two platters and which can be smaller or larger. Yes, they will be smaller platters than ones found in 3.5-inch form factor cases, but the largest of them can nearly equal a small platter found inside a high-speed 3.5-inch form factor disk drive.

The thing is that rotating a platter at high speeds is a hard thing to do because the higher the speed the stronger, and generally larger, the platter central mounting has to be, and the physically smaller the platter has to be so that the outer areas don't wobble and cause a data mis-read or worse, as in head crash worse.

What this speed:size relationship means is that a Seagate Momentus 7200.9 SFF laptop drive spins at 7900rpm and has a larger platter size than a Savvio SFF drive spinning at 15,000rpm.

This means that areal density comments about drives have to be made with reference both to the external case dimensions - 3.5 or 2.5-inch - and to the internal platter size. Generally such areal density statements don't refer to the platter size at all. A SFF Momentus 7900 might have 250MB/platter while the SFF Savvio 15K.2 has 148MB, but that doesn't mean the Savvio has lesser areal density. It has a smaller physical platter area and that's why its capacity is so much less.

In the enterprise storage area, a 3.5-inch Barracuda ES.2, spinning at 7,200rpm, can hold a maximum of 1TB on its two platters whilst a Cheetah 15K.8, spinning at 15,000rpm, can hold only 450GB on its two smaller platters. But then it is a much faster drive.

There are no generally known industry standards for platter size dimensions. We can't assume that Hitachi GST, WD, Toshiba and Seagate SFF 7900rpm drives all have the same platter dimensions, for example. Ditto at the 3.5-inch level. We can be reasonably certain, though, that at the largest capacity sizes in any form factor and low-to mid-speed rotation the largest possible platters are put inside the cases.

So remember, when talking areal density your mileage may well vary and you have to be making apple-for-apples comparisons, which you won't know unless you're aware of the platter sizes involved. ®

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.