Sequential Read Performance

The sequential read test requests blocks of 128kB and tests queue depths ranging from 1 to 32, with the queue depth doubled every three minutes for a total test duration of 18 minutes. The primary score we report is an average of the lower queue depths that are most common in client usage scenarios. We also graph how performance scales across queue depths.

Iometer - 128KB Sequential Read

The hard drive's sequential read performance is slightly lower in the dock than when connected internally, but the SSDs is slowed down to below the hard drive's speed.

Sequential Read
Samsung 850 Pro 2TB (SATA) Samsung 850 Pro 2TB (USB)
Seagate Barracuda 3TB (SATA) Seagate Barracuda 3TB (USB)

Both the SSD and hard drive show slightly lower QD1 performance in the dock than the very steady performance at all higher queue depths. This suggests there's a bit of command processing latency in the dock that can be masked by queuing up requests, but it's unclear why the SSDs sequential read performance ends up lower than the hard drive's.

Sequential Write Performance

The sequential write test follows the same timing and queue depth schedule as the sequential read test, and is scored the same.

Iometer - 128KB Sequential Write

Sequential write performance is very similar to sequential read for the hard drive, with slight overhead due to the dock. The SSD manages to beat the hard drive when docked this time, but is still severely restricted by the slower interfaces.

Sequential Write
Samsung 850 Pro 2TB (SATA) Samsung 850 Pro 2TB (USB)
Seagate Barracuda 3TB (SATA) Seagate Barracuda 3TB (USB)

Again QD1 performance is slightly lower for both drives in the dock and the dock is only able to keep pace with the mechanical drive, but there are no other surprises from it on this test.

Mixed Sequential Read/Write Performance

The mixed sequential access test covers the entire span of the drive and uses a queue depth of one. It starts with a pure read test and gradually increases the proprotion of writes, finishing with pure writes. Each subtest lasts for 3 minutes, for a total test duration of 18 minutes.

Iometer - Mixed 128KB Sequential Read/Write

The mixed sequential test is the best showing from the dock. SSDs usually perform much worse on mixed sequential workloads than on pure read or write sequential access, so the dock's performance limits don't look as bad in this light. The hard drive's mixed sequential performance is also much worse than for pure reads or writes, and the dock's overhead is minor.

Mixed Random
Samsung 850 Pro 2TB (SATA) Samsung 850 Pro 2TB (USB)
Seagate Barracuda 3TB (SATA) Seagate Barracuda 3TB (USB)

The dock limits the SSD to mostly-uniform performance across the mixed sequential test that is all well below what the drive can do with an internal 6Gbps SATA connection. For the hard drive, the only significant differences are moderate performance penalties on the pure-read and pure-write portions of the test.

Introduction and Features Random Performance
Comments Locked

38 Comments

View All Comments

  • Murloc - Tuesday, February 16, 2016 - link

    I guess the point of this thing is being easy to use for employees, the time is not really a concern if you have other work to do anyway.
    The USB dock thing looks like something they just slapped there since people may want to check what's on a drive they found before wiping it. So performance is not really key.
  • edzieba - Tuesday, February 16, 2016 - link

    The "erase by overwriting" method is completely redundant for any HDD implementing ATA SECURE ERASE. Not only is SE the fastest method to wipe data (limited only by the drive controller, not the interface) it wiped sectors in the G-list that a normal wipe would miss. This includes DBAN and other redundant multi-overwrite methods. Multiple overwrites have been entirely unnecessary since the invention of the GMR head well over two decades ago.
  • Babar Javied - Tuesday, February 16, 2016 - link

    Expand please?
    I have never even heard of ATA secure erase but it sounds interesting. How does this make overwriting redundant? since the data on the platters does need to be erased
  • joex4444 - Tuesday, February 16, 2016 - link

    It's a little surprising you've never heard of it since it was mentioned in the 3rd paragraph of the article, albeit quickly.
  • Guspaz - Tuesday, February 16, 2016 - link

    This assumes that you trust the drive's secure erase implementation. Following up the secure erase with a single overwrite is probably sufficient.
  • Azethoth - Wednesday, February 17, 2016 - link

    Exactly. Secure erase on SSD just marks all blocks as empty, so factory default but the data is really still there. Absent proof of no physical way to access these blocks and read their data you really do need to overwrite at least once and take the hit to longevity ;-)
  • azrael- - Thursday, February 18, 2016 - link

    Apparently you didn't read the article either (or anywhere else it has been written). Securely erasing an SSD usually consists of the drive throwing away the encryption key it has used for storing your data. The data is still there, but noone can read them.
  • Senti - Friday, February 19, 2016 - link

    The keyword here is "usually". Imagine you are the one responsible for secure deletion of information: would you blindly believe that "drive should do it properly and not leave the old key somewhere" or would you double-check? The answer is obvious.
  • Lerianis - Saturday, February 20, 2016 - link

    Considering that this is being done by tech literate organizations. I think they would have verified the whole "No way to restore the drive!" that they are pushing.
  • leexgx - Saturday, February 20, 2016 - link

    i guess he should of not used the word "usually"
    if the drive uses AES encryption (SED drive) then all the drive has to do is reset the key when Secure erase is done (this is why it can take upto 1-2 hours to wipe none encryption HDD drive) and all data is lost and if that is not enough it also commands the Trim all parts of the flash so all NAND is clean all parts of the SSD will come back with 00000000 (unlike a HDD there is a chance to recover data but if its a self encryption HDD/SSD drive then there is no data recovery once ATA Secure erase has been used)

    if ATA secure erase takes more than 2 minutes on a Self encrypting drive(HDD or SSD), the drive it self is not encrypted as SED drives should just reset the keys and all data has gone puff (full TRIM on all parts of the flash is also performed as well to bring the drive to a complete clean and max performance state)

    on SSDs even none SED drives a secure erase should only take 30 seconds - 2 minutes as all it has to do is command reset the pages and TRIM the whole drive witch is a very fast task

Log in

Don't have an account? Sign up now