CS 258 Parallel Computer Architecture Lecture 16 Snoopy Protocols I

Slides:



Advertisements
Similar presentations
Chapter 5 Part I: Shared Memory Multiprocessors
Advertisements

Extra Cache Coherence Examples In the following examples there are a couple questions. You can answer these for practice by ing Colin at
ECE669 L9: Workload Evaluation February 26, 2004 ECE 669 Parallel Computer Architecture Lecture 9 Workload Evaluation.
CS252 Graduate Computer Architecture Lecture 25 Memory Consistency Models and Snoopy Bus Protocols Prof John D. Kubiatowicz
Computer Architecture II 1 Computer architecture II Lecture 8.
CIS629 Coherence 1 Cache Coherence: Snooping Protocol, Directory Protocol Some of these slides courtesty of David Patterson and David Culler.
CS 258 Parallel Computer Architecture Lecture 13 Shared Memory Multiprocessors March 10, 2008 Prof John D. Kubiatowicz
CS252/Patterson Lec /23/01 CS213 Parallel Processing Architecture Lecture 7: Multiprocessor Cache Coherency Problem.
1 Lecture 3: Snooping Protocols Topics: snooping-based cache coherence implementations.
Computer architecture II
Cache Coherence: Part 1 Todd C. Mowry CS 740 November 4, 1999 Topics The Cache Coherence Problem Snoopy Protocols.
Bus-Based Multiprocessor
CPE 731 Advanced Computer Architecture Snooping Cache Multiprocessors Dr. Gheith Abandah Adapted from the slides of Prof. David Patterson, University of.
CS 258 Parallel Computer Architecture Lecture 12 Shared Memory Multiprocessors II March 1, 2002 Prof John D. Kubiatowicz
1 Shared-memory Architectures Adapted from a lecture by Ian Watson, University of Machester.
©RG:E0243:L2- Parallel Architecture 1 E0-243: Computer Architecture L2 – Parallel Architecture.
Shared Address Space Computing: Hardware Issues Alistair Rendell See Chapter 2 of Lin and Synder, Chapter 2 of Grama, Gupta, Karypis and Kumar, and also.
Presented By:- Prerna Puri M.Tech(C.S.E.) Cache Coherence Protocols MSI & MESI.
Cache Coherence CSE 661 – Parallel and Vector Architectures
Evaluating the Performance of Four Snooping Cache Coherency Protocols Susan J. Eggers, Randy H. Katz.
CS252 Graduate Computer Architecture Lecture 18 April 4 th, 2011 Memory Consistency Models and Snoopy Bus Protocols Prof John D. Kubiatowicz
Rassul Ayani 1 Performance of parallel and distributed systems  What is the purpose of measurement?  To evaluate a system (or an architecture)  To compare.
December 1, 2006©2006 Craig Zilles1 Threads and Cache Coherence in Hardware  Previously, we introduced multi-cores. —Today we’ll look at issues related.
Cache Coherence Protocols A. Jantsch / Z. Lu / I. Sander.
1 Memory and Cache Coherence. 2 Shared Memory Multiprocessors Symmetric Multiprocessors (SMPs) Symmetric access to all of main memory from any processor.
Lecture 9 ECE/CSC Spring E. F. Gehringer, based on slides by Yan Solihin1 Lecture 9 Outline  MESI protocol  Dragon update-based protocol.
Cache Coherence for Small-Scale Machines Todd C
1 Lecture 3: Coherence Protocols Topics: consistency models, coherence protocol examples.
Cache Coherence CS433 Spring 2001 Laxmikant Kale.
CMSC 611: Advanced Computer Architecture Shared Memory Most slides adapted from David Patterson. Some from Mohomed Younis.
CSC/ECE 506: Architecture of Parallel Computers Bus-Based Coherent Multiprocessors 1 Lecture 12 (Chapter 8) Lecture 12 (Chapter 8)
Outline Introduction (Sec. 5.1)
COSC6385 Advanced Computer Architecture
COMP 740: Computer Architecture and Implementation
Cache Coherence in Shared Memory Multiprocessors
Shared Memory Multiprocessors
Cache Coherence: Part 1 Todd C. Mowry CS 740 October 25, 2000
CS 704 Advanced Computer Architecture
A Study on Snoop-Based Cache Coherence Protocols
Cache Coherence for Shared Memory Multiprocessors
Multiprocessor Cache Coherency
Workload-Driven Architecture Evaluation Todd C
Lecture 9 Outline MESI protocol Dragon update-based protocol
CMSC 611: Advanced Computer Architecture
Krste Asanovic Electrical Engineering and Computer Sciences
Example Cache Coherence Problem
Flynn’s Taxonomy Flynn classified by data and control streams in 1966
Prof John D. Kubiatowicz
Protocol Design Space of Snooping Cache Coherent Multiprocessors
Cache Coherence (controllers snoop on bus transactions)
Lecture 2: Snooping-Based Coherence
Chip-Multiprocessor.
Cache Coherence in Bus-Based Shared Memory Multiprocessors
Cache Coherence Protocols 15th April, 2006
Kai Bu 13 Multiprocessors So today, we’ll finish the last part of our lecture sessions, multiprocessors.
CMSC 611: Advanced Computer Architecture
Multiprocessors - Flynn’s taxonomy (1966)
Lecture 4: Update Protocol
Bus-Based Coherent Multiprocessors
Shared Memory Multiprocessors
Chapter 5 Exploiting Memory Hierarchy : Cache Memory in CMP
Lecture 24: Virtual Memory, Multiprocessors
Lecture 23: Virtual Memory, Multiprocessors
Lecture 24: Multiprocessors
Lecture 3: Coherence Protocols
Lecture 8 Outline Memory consistency
Coherent caches Adapted from a lecture by Ian Watson, University of Machester.
Prof John D. Kubiatowicz
Prof John D. Kubiatowicz
CSE 486/586 Distributed Systems Cache Coherence
Presentation transcript:

CS 258 Parallel Computer Architecture Lecture 16 Snoopy Protocols I March 15, 2002 Prof John D. Kubiatowicz http://www.cs.berkeley.edu/~kubitron/cs258 CS258 S99

Recall Ordering: Scheurich and Dubois P : R R R W R P : R R R R 1 P : R R R R R 2 Exclusion Zone “Instantaneous” Completion point Sufficient Conditions every process issues mem operations in program order after a write operation is issued, the issuing process waits for the write to complete before issuing next memory operation after a read is issued, the issuing process waits for the read to complete and for the write whose value is being returned to complete (gloabaly) befor issuing its next operation

Write-back Caches 2 processor operations 3 states 2 bus transactions: PrRd, PrWr 3 states invalid, valid (clean), modified (dirty) ownership: who supplies block 2 bus transactions: read (BusRd), write-back (BusWB) only cache-block transfers => treat Valid as “shared” and Modified as “exclusive” => introduce one new bus transaction read-exclusive: read for purpose of modifying (read-to-own) PrRd/— PrW r/BusRd BusRd/— r/— V M I Replace/BusWB PrRd/BusRd Replace/-

MSI Invalidate Protocol Read obtains block in “shared” even if only cache copy Obtain exclusive ownership before writing BusRdx causes others to invalidate (demote) If M in another cache, will flush BusRdx even if hit in S promote to M (upgrade) What about replacement? S->I, M->I as before

Example: Write-Back Protocol I/O devices Memory u :5 P0 P1 P4 PrRd U PrRd U PrRd U BusRd U PrWr U 7 BusRdx U U S 5 U S 7 U S 5 U M 7 BusRd U BusRd Flush

Correctness When is write miss performed? How does writer “observe” write? How is it “made visible” to others? How do they “observe” the write? When is write hit made visible?

Write Serialization for Coherence Writes that appear on the bus (BusRdX) are ordered by bus performed in writer’s cache before other transactions, so ordered same w.r.t. all processors (incl. writer) Read misses also ordered wrt these Write that don’t appear on the bus: P issues BusRdX B. further mem operations on B until next transaction are from P read and write hits these are in program order for read or write from another processor separated by intervening bus transaction Reads hits?

Sequential Consistency Bus imposes total order on bus xactions for all locations Between xactions, procs perform reads/writes (locally) in program order So any execution defines a natural partial order Mj subsequent to Mi if (I) follows in program order on same processor, (ii) Mj generates bus xaction that follows the memory operation for Mi In segment between two bus transactions, any interleaving of local program orders leads to consistent total order w/i segment writes observed by proc P serialized as: Writes from other processors by the previous bus xaction P issued Writes from P by program order

Sufficient conditions issued in program order after write issues, the issuing process waits for the write to complete before issuing next memory operation after read is issues, the issuing process waits for the read to complete and for the write whose value is being returned to complete (gloabaly) befor issuing its next operation Write completion can detect when write appears on bus Write atomicity: if a read returns the value of a write, that write has already become visible to all others already

Lower-level Protocol Choices BusRd observed in M state: what transitition to make? M ----> I M ----> S Depends on expectations of access patterns How does memory know whether or not to supply data on BusRd? Problem: Read/Write is 2 bus xactions, even if no sharing BusRd (I->S) followed by BusRdX or BusUpgr (S->M) What happens on sequential programs?

MESI (4-state) Invalidation Protocol Add exclusive state distinguish exclusive (writable) and owned (written) Main memory is up to date, so cache not necessarily owner can be written locally States invalid exclusive or exclusive-clean (only this cache has copy, but not modified) shared (two or more caches may have copies) modified (dirty) I -> E on PrRd if no cache has copy => How can you tell?

Hardware Support for MESI I/O devices Memory u :5 P0 P1 P4 shared signal - wired-OR All cache controllers snoop on BusRd Assert ‘shared’ if present (S? E? M?) Issuer chooses between S and E how does it know when all have voted?

MESI State Transition Diagram BusRd(S) means shared line asserted on BusRd transaction Flush’: if cache-to- cache xfers only one cache flushes data MOESI protocol: Owned state: exclusive but memory not valid PrW r/— BusRd/Flush PrRd/ BusRdX/Flush r/BusRdX PrRd/— BusRd/Flush’ ¢ E M I S PrRd BusRd(S) BusRdX/Flush’ BusRd/ Flush BusRd (S )

Lower-level Protocol Choices Who supplies data on miss when not in M state: memory or cache? Original, lllinois MESI: cache, since assumed faster than memory Not true in modern systems Intervening in another cache more expensive than getting from memory Cache-to-cache sharing adds complexity How does memory know it should supply data (must wait for caches) Selection algorithm if multiple caches have valid data Valuable for cache-coherent machines with distributed memory May be cheaper to obtain from nearby cache than distant memory, Especially when constructed out of SMP nodes (Stanford DASH)

Update Protocols If data is to be communicated between processors, invalidate protocols seem inefficient consider shared flag p0 waits for it to be zero, then does work and sets it one p1 waits for it to be one, then does work and sets it zero how many transactions?

Dragon Write-back Update Protocol 4 states Exclusive-clean or exclusive (E): I and memory have it Shared clean (Sc): I, others, and maybe memory, but I’m not owner Shared modified (Sm): I and others but not memory, and I’m the owner Sm and Sc can coexist in different caches, with only one Sm Modified or dirty (D): I and, noone else No invalid state If in cache, cannot be invalid If not present in cache, view as being in not-present or invalid state New processor events: PrRdMiss, PrWrMiss Introduced to specify actions when block not present in cache New bus transaction: BusUpd Broadcasts single word written on bus; updates other relevant caches

Dragon State Transition Diagram Sc Sm M PrW r/— PrRd/— PrRdMiss/BusRd(S) rMiss/(BusRd(S); BusUpd) rMiss/BusRd(S) r/BusUpd(S) BusRd/— BusRd/Flush BusUpd/Update

Lower-level Protocol Choices Can shared-modified state be eliminated? If update memory as well on BusUpd transactions (DEC Firefly) Dragon protocol doesn’t (assumes DRAM memory slow to update) Should replacement of an Sc block be broadcast? Would allow last copy to go to E state and not generate updates Replacement bus transaction is not in critical path, later update may be Can local copy be updated on write hit before controller gets bus? Can mess up serialization Coherence, consistency considerations much like write-through case

Assessing Protocol Tradeoffs Tradeoffs affected by technology characteristics and design complexity Part art and part science Art: experience, intuition and aesthetics of designers Science: Workload-driven evaluation for cost-performance want a balanced system: no expensive resource heavily underutilized Break?

Workload-Driven Evaluation Evaluating real machines Evaluating an architectural idea or trade-offs => need good metrics of performance => need to pick good workloads => need to pay attention to scaling many factors involved Today: narrow architectural comparison Set in wider context

Evaluation in Uniprocessors Decisions made only after quantitative evaluation For existing systems: comparison and procurement evaluation For future systems: careful extrapolation from known quantities Wide base of programs leads to standard benchmarks Measured on wide range of machines and successive generations Measurements and technology assessment lead to proposed features Then simulation Simulator developed that can run with and without a feature Benchmarks run through the simulator to obtain results Together with cost and complexity, decisions made

More Difficult for Multiprocessors What is a representative workload? Software model has not stabilized Many architectural and application degrees of freedom Huge design space: no. of processors, other architectural, application Impact of these parameters and their interactions can be huge High cost of communication What are the appropriate metrics? Simulation is expensive Realistic configurations and sensitivity analysis difficult Larger design space, but more difficult to cover Understanding of parallel programs as workloads is critical Particularly interaction of application and architectural parameters

A Lot Depends on Sizes Application parameters and no. of procs affect inherent properties Load balance, communication, extra work, temporal and spatial locality Interactions with organization parameters of extended memory hierarchy affect artifactual communication and performance Effects often dramatic, sometimes small: application-dependent ocean Barnes-hut Understanding size interactions and scaling relationships is key

Scaling: Why Worry? Fixed problem size is limited Too small a problem: May be appropriate for small machine Parallelism overheads begin to dominate benefits for larger machines Load imbalance Communication to computation ratio May even achieve slowdowns Doesn’t reflect real usage, and inappropriate for large machines Can exaggerate benefits of architectural improvements, especially when measured as percentage improvement in performance Too large a problem Difficult to measure improvement (next)

Too Large a Problem Suppose problem realistically large for big machine May not “fit” in small machine Can’t run Thrashing to disk Working set doesn’t fit in cache Fits at some p, leading to superlinear speedup Real effect, but doesn’t help evaluate effectiveness Finally, users want to scale problems as machines grow Can help avoid these problems

Demonstrating Scaling Problems Small Ocean and big equation solver problems on SGI Origin2000

Communication and Replication View parallel machine as extended memory hierarchy Local cache, local memory, remote memory Classify “misses” in “cache” at any level as for uniprocessors compulsory or cold misses (no size effect) capacity misses (yes) conflict or collision misses (yes) communication or coherence misses (no) Communication induced by finite capacity is most fundamental artifact Like cache size and miss rate or memory traffic in uniprocessors

Working Set Perspective At a given level of the hierarchy (to the next further one) fic Data traf First working set Capacity-generated traf fic (including conflicts) Second working set Other capacity-independent communication Inher ent communication Cold-start (compulsory) traf fic Replication capacity (cache size) Hierarchy of working sets At first level cache (fully assoc, one-word block), inherent to algorithm working set curve for program Traffic from any type of miss can be local or nonlocal (communication)

Summary Shared-memory machine Memory Coherence: Memory Consistency: All communication is implicit, through loads and stores Parallelism introduces a bunch of overheads over uniprocessor Memory Coherence: Writes to a given location eventually propagated Writes to a given location seen in same order by everyone Memory Consistency: Constraints on ordering between processors and locations Sequential Consistency: For every parallel execution, there exists a serial interleaving