CS 704 Advanced Computer Architecture

Slides:



Advertisements
Similar presentations
L.N. Bhuyan Adapted from Patterson’s slides
Advertisements

CMSC 611: Advanced Computer Architecture
1 Lecture 6: Directory Protocols Topics: directory-based cache coherence implementations (wrap-up of SGI Origin and Sequent NUMA case study)
Multi-core systems System Architecture COMP25212 Daniel Goodman Advanced Processor Technologies Group.
Cache Optimization Summary
CIS629 Coherence 1 Cache Coherence: Snooping Protocol, Directory Protocol Some of these slides courtesty of David Patterson and David Culler.
CS252/Patterson Lec /23/01 CS213 Parallel Processing Architecture Lecture 7: Multiprocessor Cache Coherency Problem.
1 Lecture 3: Snooping Protocols Topics: snooping-based cache coherence implementations.
CS252/Patterson Lec /28/01 CS 213 Lecture 9: Multiprocessor: Directory Protocol.
1 Lecture 5: Directory Protocols Topics: directory-based cache coherence implementations.
CPE 731 Advanced Computer Architecture Snooping Cache Multiprocessors Dr. Gheith Abandah Adapted from the slides of Prof. David Patterson, University of.
CS252/Patterson Lec /28/01 CS 213 Lecture 10: Multiprocessor 3: Directory Organization.
Snooping Cache and Shared-Memory Multiprocessors
1 Shared-memory Architectures Adapted from a lecture by Ian Watson, University of Machester.
Multiprocessor Cache Coherency
Spring 2003CSE P5481 Cache Coherency Cache coherent processors reading processor must get the most current value most current value is the last write Cache.
1 Cache coherence CEG 4131 Computer Architecture III Slides developed by Dr. Hesham El-Rewini Copyright Hesham El-Rewini.
Shared Address Space Computing: Hardware Issues Alistair Rendell See Chapter 2 of Lin and Synder, Chapter 2 of Grama, Gupta, Karypis and Kumar, and also.
EECS 252 Graduate Computer Architecture Lec 13 – Snooping Cache and Directory Based Multiprocessors David Patterson Electrical Engineering and Computer.
Ch4. Multiprocessors & Thread-Level Parallelism 2. SMP (Symmetric shared-memory Multiprocessors) ECE468/562 Advanced Computer Architecture Prof. Honggang.
Computer Science and Engineering Copyright by Hesham El-Rewini Advanced Computer Architecture CSE 8383 March 20, 2008 Session 9.
CMSC 611: Advanced Computer Architecture Shared Memory Most slides adapted from David Patterson. Some from Mohomed Younis.
The University of Adelaide, School of Computer Science
Multi Processing prepared and instructed by Shmuel Wimer Eng. Faculty, Bar-Ilan University June 2016Multi Processing1.
1 Lecture 8: Snooping and Directory Protocols Topics: 4/5-state snooping protocols, split-transaction implementation details, directory implementations.
CS 704 Advanced Computer Architecture
Lecture 8: Snooping and Directory Protocols
CS 704 Advanced Computer Architecture
COMP 740: Computer Architecture and Implementation
CS 704 Advanced Computer Architecture
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
Lecture 18: Coherence and Synchronization
Cache Coherence for Shared Memory Multiprocessors
12.4 Memory Organization in Multiprocessor Systems
Multiprocessor Cache Coherency
The University of Adelaide, School of Computer Science
CMSC 611: Advanced Computer Architecture
Krste Asanovic Electrical Engineering and Computer Sciences
Example Cache Coherence Problem
Flynn’s Taxonomy Flynn classified by data and control streams in 1966
The University of Adelaide, School of Computer Science
Cache Coherence (controllers snoop on bus transactions)
Lecture 2: Snooping-Based Coherence
CPE 631 Session 21: Multiprocessors (Part 2)
CMSC 611: Advanced Computer Architecture
Multiprocessors - Flynn’s taxonomy (1966)
Multiprocessors CS258 S99.
11 – Snooping Cache and Directory Based Multiprocessors
Chapter 5 Exploiting Memory Hierarchy : Cache Memory in CMP
Lecture 25: Multiprocessors
Lecture 9: Directory-Based Examples
Professor David A. Patterson Computer Science 252 Spring 1998
Slides developed by Dr. Hesham El-Rewini Copyright Hesham El-Rewini
Lecture 8: Directory-Based Examples
Lecture 25: Multiprocessors
The University of Adelaide, School of Computer Science
Lecture 17 Multiprocessors and Thread-Level Parallelism
Cache coherence CEG 4131 Computer Architecture III
Lecture 24: Virtual Memory, Multiprocessors
Lecture 23: Virtual Memory, Multiprocessors
Lecture 24: Multiprocessors
Coherent caches Adapted from a lecture by Ian Watson, University of Machester.
Lecture 17 Multiprocessors and Thread-Level Parallelism
CPE 631 Lecture 20: Multiprocessors
Lecture 19: Coherence and Synchronization
Lecture 18: Coherence and Synchronization
The University of Adelaide, School of Computer Science
Lecture 10: Directory-Based Examples II
Lecture 17 Multiprocessors and Thread-Level Parallelism
Presentation transcript:

CS 704 Advanced Computer Architecture Lecture 36 Multiprocessors (Cache Coherence Problem … Cont’d ) Prof. Dr. M. Ashraf Chughtai Welcome to the 36h Lecture for the series of lectures on Advanced Computer Architecture

Today’s Topics Recap: Example of Invalidation Scheme Coherence in Distributed Memory Architecture Performance of Cache Coherence Schemes Summary MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Recap: Cache Coherence Problem Last time we discussed the sharing of caches for multi-processing in the symmetric shared-memory architecture, wherein each processor has the same relationship to the single memory Here, we distinguished between the private data and shared data, i.e., the data used by a single processor and the data replicated in the caches of the multiple processors for their simultaneous use Models: 1st is easy, still useful: workstations within a building (entertainment) MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Recap: Cache Coherence Problem Then we discussed cache coherence problem in symmetric shared memory which results due to inconsistency or conflict in caching of shared data, being read by the multiple processors simultaneously We studied the cache coherence problem with the help of a typical shared memory architecture where each of the processor contained write-back cache Models: 1st is easy, still useful: workstations within a building (entertainment) MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Recap: Cache Coherency Problem In write-back caches, values written back to memory depend on which cache flushes or writes back the value and when? We noticed that the cache coherency problem exists even on uniprocessors due interaction between caches and I/O devices However, in multiprocessors the problem is performance-critical where the order among multiple processes is crucial, i.e., MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Recap: Order among multiple processes For single shared memory, with no caches, a serial or total order is imposed on operations to the location; and for single shared memory, with caches, the serial order be consistent, i.e., all processors must see writes to the location in the same order Considering this we can say that in a coherent system: MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Recap: Order among multiple processes – the operations issued by any particular process occur in the order issued by that process, and – the value returned by a read is the value written by the last write to that location in the serial order Then we talked about write propagation and write serialization as the two features of the coherent system MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Recap: Multiprocessor cache Coherence We also noticed that to implement cache coherence the multiprocessors extend both the bus transaction and state transition The cache controller snoops on bus events (write transactions) and invalidate / update cache Then we discussed the cache coherence protocols, which use different techniques to track the sharing status and maintain coherence for multiprocessor MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Recap: Coherency Solutions The two fundamental classes of Coherence protocols are: Snooping Protocols All cache controllers monitor or snoop (spy) on the bus to determine whether or not they have a copy of the block that is requested on the bus Directory-Based Protocols The sharing status of a block of physical memory is kept in one location, called directory MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Recap: Basic Snooping Protocols The snooping protocols are implemented using two techniques: write invalidate and write broadcast The Write Invalidate method ensures that processor has exclusive access to the data item before it write that item and all other cached copies are invalidated or canceled on write The write broadcast approach, on the other hand, updates all the cached copies of a data item when that item is written MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Recap: Write Invalidate versus Broadcast We noticed that Invalidate requires one transaction for multiple writes to the same word; and it uses spatial locality, i.e., one transaction for write to different words in the same block; and Broadcast has lower latency between write and read Then we discussed the finite state machine controller implementing the snooping protocols MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Recap: An Example Snooping Protocol This controller responds to the request from the processor and from the bus based on: the type of the request Its hit or miss status in the cache; and State of the cache block specified in the request Furthermore, each block of memory is in one of the three states: Shared, Exclusive or Invalid (Not in any caches) and each cache block tracks these three states MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example: Working of Finite State Machine Controller Today we will continue our discussion on the finite state machine controller for the implementation of snooping protocol; and will try to understand its working with the help of example Here, we assume that two processors P1 and P2 each having its own cache, share the main memory connected on bus MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example: Working of Finite State Machine Controller The status of the processors, bus transaction and the memory is depicted in a table for each step of the state machine Here, the state of the machine for each processor and cache address and value cached, the bus action and shared-memory status is shown for each step of operation Initially the cache state is invalid (i.e., the block of memory is not in the cache); and … MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example: Working of Finite State Machine Controller memory blocks A1 and A2 map to the same cache block where the address A1 is not equal to A2 At Step 1 – P1 writes 10 to A1 write miss on bus occurs and the state transition from invalid to exclusive takes place MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example: Working of Finite State Machine Controller MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example: Working of Finite State Machine Controller At Step 2 – P1 reads A1 CPU read HITs occurs, hence the FSM Stays in exclusive state MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example: Working of Finite State Machine Controller At Step 3: P2 reads A1 As P2 is initially in invalid state, therefore, read miss on the bus occurs; the controller state changes from invalid to Shared MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example: Working of Finite State Machine Controller MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example: Working of Finite State Machine Controller P1 being in Exclusive state, remote read write-back is asserted and the state changes from exclusive to Shared; and the value (10) is read 1 from the shared- memory at address A1, into P1 and P2 caches at A1; and both P1 and P2 controllers are in shared state MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example: Working of Finite State Machine Controller At Step 4: P2 write 20 to A2 P1 find a remote write, so the state of the controller changes from shared to Invalid P2 find a CPU write, so places write miss on the bus and changes the state from shared to exclusive and writes value 20 to A1 The memory address to A1 with value A1 MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example: Working of Finite State Machine Controller MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example: Working of Finite State Machine Controller At Step 5: P2 write 40 to A2 P2 being in Exclusive state, CPU write Miss occurs, and initiates write-back to P2 at A2 P2 remains in Exclusive state, with address A2 and value 40 MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example: Working of Finite State Machine Controller MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Implementation Complications With this example, we have observed that the finite state machine implementation of the snooping protocols works well However, the following implementation complications have been observed Write Races Interventions and invalidations MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Implementation Complications Write Races occur when one processor wants to update the cache but another processor may get bus first and then write the same cache block! We know that bus transaction is a two step process: Arbitrate for bus Place miss on bus and complete operation If miss occurs to block while waiting for bus, handle miss, i.e., invalidate, and then restart. MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Implementation Complications Furthermore, to overcome the write races, split transaction bus, so that it can have multiple outstanding transactions for a block Multiple misses can interleave, allowing two caches to grab block in the Exclusive state Must track and prevent multiple misses for one block MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Snooping Cache Conflict In snooping cache method, the CPU assess the cache and the bus transaction checks the cache tags Processors continuously snoop on address bus and if the address matches tag, it either invalidate or update Since every bus transaction checks cache tags; therefore there could be interference with CPU MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Snooping Cache Contention There are two ways to reduce the interference; the methods are: 1: duplicate set of tags for L1 caches CPU uses a different set of tags The CPU gets stalled during cache access when snoop has detected a copy in the cache and tags need to be updated MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Snooping Cache Contention 2: Multi-level caches with inclusion: i.e., L2 cache already duplicate, provided L2 obeys inclusion with L1 cache; here Content of primary cache (L1) is in secondary cache (L2) Most CPU activity directed to L1 Snoop activity directed to L2 MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Snooping Cache Contention If snoop gets a hit then it arbitrates L1 to update and possibly get data; this will stall CPU Can be combined with “duplicate tags” approach to further reduce contention MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Snooping Cache Variations MESI Protocol: This protocol contains four (4) states Modified Exclusive Shared Invalid Exclusive now means exclusively cached but clean upon loading MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Snooping Cache Variations Bus serializes writes, getting bus ensures no one else can perform memory operation On a miss in a write back cache, may have the desired copy and its dirty, so must reply Add extra state bit to cache to determine shared or not Add 4th state Modify that Modifies for exclusive writes MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Four State Machine Bus serializes writes, getting bus ensures no one else can perform memory operation On a miss in a write back cache, may have the desired copy and its dirty, so must reply Add extra state bit to cache to determine shared or not Add 4th state Modify that Modifies for exclusive writes MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Snooping Cache Variations: Berkeley Protocol The main idea is to allow cache to cache transfers on the shared bus It adds the notion of “owner” the cache that has the block in a Dirty state is the owner of that block: The last one who writes, is the owner The owner responsible to transfer data if read occurs and to update main memory; If a block is not owned by any cache, memory is the owner MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Summary Snooping Cache Variations: Summary Basic Protocol Exclusive Shared Invalid Berkeley Protocol Owned Exclusive Owned Shared Shared Invalid Owner can update via bus invalidate operation Owner must write back when replaced in cache MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Summary Snooping Cache Variations: Summary MESI Protocol Modfied (private,°Memory) eXclusive (private,=Memory) Shared (shared,=Memory) Invalid Illinois Protocol Private Dirty Private Clean Shared Invalid If read sourced from memory, then Private Clean if read sourced from other cache, then Shared Can write in cache if held private clean or dirty MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Snoop Cache Extensions Remote Read Place Data on Bus? Write or Miss due to address conflict Write back block Remote Write or Miss due to Invalid Shared (read/only) Modified (read/write) CPU Read hit CPU Read Place read miss on bus CPU Write Place Write Miss on bus CPU Write Place Write Miss on Bus? CPU read hit CPU write hit Exclusive (read/only) Miss on Bus? Remote Read Write back block A B C MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Snoop Cache Extensions A: Berkeley Protocol Fourth State: Ownership Shared-> Modified, need invalidate only (upgrade request), don’t read memory B: MESI Protocol Clean exclusive state (no miss for private data on write) C: Illinois Protocol Cache supplies data when shared state (no memory access) MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Larger Microprocessors Use separate Memory per Processor Local or Remote access via memory controller 1 Cache Coherency solution is using non-cached pages Alternative is to use: directory containing information for every block in memory that tracks state of every block in every cache, which caches have a copies of block, dirty vs. clean, etc MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Larger Microprocessors The use of information per memory block vs. per cache block has some plus and minus points PLUS: In memory => simpler protocol as compared to centralized/one location MINUS: In memory => directory is function of memory size) as compared to simple protocol where director is function of cache size MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Directory Based Protocol Distributed Shared Memory MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Directory Based Protocol The director base protocol is similar to Snoopy Protocol: The Three states of the protocol are: Shared:  1 processors have data, memory up- to-date Uncached (no processor has it; not valid in any cache) Exclusive:  1 processor (owner) has data; memory out-of-date MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Directory Based Protocol In addition to cache state, must track which processors have data when in the shared state (usually bit vector, 1 if processor has copy) Keep it simple(r): Writes to non-exclusive data => write miss Processor blocks until access completes Assume messages received and acted upon in order sent MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Directory Protocol … Cont’d No bus and don’t want to broadcast: interconnect no longer single arbitration point all messages have explicit responses Typically 3 processors involved Local node where a request originates Home node where the memory location of an address resides Remote node has a copy of a cache block, whether exclusive or shared MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Directory Protocol … Cont’d Example messages are as follows: Here P is used for processor number, A for address Message type Source Destination Msg Content Read miss Local cache Home directory P, A Processor P reads data at address A; make P a read sharer and arrange to send data back Write miss Local cache Home directory P, A Processor P writes data at address A; make P the exclusive owner and arrange to send data back MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Directory Protocol Messages Message type Source Destination Msg Content Invalidate Home directory Remote caches A Invalidate a shared copy at address A. Fetch Home directory Remote cache A Fetch the block at address A and send it to its home directory Fetch/Invalidate Home directory Remote cache A Fetch the block at address A and send it to its home directory; invalidate the block in the cache MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Directory Protocol Messages Message type Source Destination Msg Content Data value reply Home directory Local cache Data Return a data value from the home memory (read miss response) Data write-back Remote cache Home directory A, Data Write-back a data value for address A (invalidate response) MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

State Transition Diagram for an Individual Cache Block in a Directory Based System States identical to snoopy case; transactions very similar. Transactions are caused by read misses, write misses, invalidates, data fetch requests Generates read miss & write miss messages to home directory. MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

State Transition Diagram for an Individual Cache Block in a Directory Based System Write misses that were broadcast on the bus for snooping results in explicit invalidate & data fetch requests. Note: on a write, a cache block is bigger, so need to read the full cache block MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

CPU -Cache State Machine CPU Read hit Invalidate or Miss due to address conflict: State machine for CPU requests for each memory block Invalid state if in memory Shared (read/only) Invalid CPU Read Send Read Miss message CPU Write: Send Write Miss msg to h.d. CPU Write: Send Write Miss message to home directory Fetch/Invalidate or Miss due to address conflict: send Data Write Back message to home directory Invalid: read => shared write => dirty shared looks the same Fetch: send Data Write Back message to home directory Exclusive (read/write) CPU read hit CPU write hit MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

State Transition Diagram for the Directory Here, the same states & structure is shown as the transition diagram for an individual cache Two actions performed are: 1: update of directory state and 2: send messages to satisfy requests The controller tracks all copies of memory block; and also indicates an action that updates the sharing set, called Sharers, as well as sending a message MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Directory State Machine Read miss: Sharers += {P}; send Data Value Reply State machine for Directory requests for each memory block Un-cached state if in memory Read miss: Sharers = {P} send Data Value Reply Shared (read only) Uncached Write Miss: Sharers = {P}; send Data Value Reply msg Write Miss: send Invalidate to Sharers; then Sharers = {P}; send Data Value Reply msg Data Write Back: Sharers = {} (Write back block) Invalid: read => shared write => dirty shared looks the same Read miss: Sharers += {P}; send Fetch; send Data Value Reply msg to remote cache (Write back block) Write Miss: Sharers = {P}; send Fetch/Invalidate; send Data Value Reply msg to remote cache Exclusive (read/write) MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example Directory Protocol Message sent to directory causes two actions: Update the directory More messages to satisfy request Block is in Uncached state: the copy in memory is the current value; only possible requests for that block are: Read miss Write miss: MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example Directory Protocol Read miss: requesting processor sent data from memory & requestor made only sharing node; state of block made Shared Write miss: requesting processor is sent the value & becomes the Sharing node. The block is made Exclusive to indicate that the only valid copy is cached. Sharers indicates the identity of the owner. MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example Directory Protocol Block is Shared state => the memory value is up- to-date; the read miss and write miss activities are: Read miss: requesting processor is sent back the data from memory & requesting processor is added to the sharing set. Write miss: requesting processor is sent the value. All processors in the set Sharers are sent invalidate messages, & Sharers is set to identity of requesting processor. The state of the block is made Exclusive. MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example Directory Protocol Block is Exclusive: current value of the block is held in the cache of the processor identified by the set Sharers (the owner) three possible directory requests: - Read Miss - Data Write back - Write Miss MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example Directory Protocol Read miss: owner processor sent data fetch message, causing state of block in owner’s cache to transition to Shared; and causes owner to send data to directory, where it is written to memory & sent back to requesting processor Identity of requesting processor is added to set Sharers, which still contains the identity of the processor that was the owner (since it still has a readable copy). State is shared. MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example Directory Protocol Data write-back: owner processor is replacing the block and hence must write it back, making memory copy up-to-date the block is now Uncached, and the Sharer set is empty. MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Example Directory Protocol Write miss: block has a new owner. A message is sent to old owner causing the cache to send the value of the block to the directory from which it is sent to the requesting processor, which becomes the new owner. Sharers is set to identity of new owner, and state of block is made Exclusive. MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Summary Caches contain all information on state of cached memory blocks Snooping and Directory Protocols are similar; However, bus makes snooping easier because of broadcast Directory has extra data structure to keep track of state of all cache blocks MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)

Thanks and Allah Hafiz MAC/VU-Advanced Computer Architecture Lec. 36 Multiprocessor (3)