1 Lecture 2: Snooping and Directory Protocols Topics: Snooping wrap-up and directory implementations.

Slides:



Advertisements
Similar presentations
Lecture 19: Cache Basics Today’s topics: Out-of-order execution
Advertisements

1 Lecture 6: Directory Protocols Topics: directory-based cache coherence implementations (wrap-up of SGI Origin and Sequent NUMA case study)
Multi-core systems System Architecture COMP25212 Daniel Goodman Advanced Processor Technologies Group.
1 Lecture 4: Directory Protocols Topics: directory-based cache coherence implementations.
Cache Optimization Summary
CS 7810 Lecture 19 Coherence Decoupling: Making Use of Incoherence J.Huh, J. Chang, D. Burger, G. Sohi Proceedings of ASPLOS-XI October 2004.
CIS629 Coherence 1 Cache Coherence: Snooping Protocol, Directory Protocol Some of these slides courtesty of David Patterson and David Culler.
1 Lecture 4: Directory-Based Coherence Details of memory-based (SGI Origin) and cache-based (Sequent NUMA-Q) directory protocols.
CS252/Patterson Lec /23/01 CS213 Parallel Processing Architecture Lecture 7: Multiprocessor Cache Coherency Problem.
EECC756 - Shaaban #1 lec # 13 Spring Scalable Cache Coherent Systems Scalable distributed shared memory machines Assumptions: –Processor-Cache-Memory.
1 Lecture 20: Coherence protocols Topics: snooping and directory-based coherence protocols (Sections )
1 Lecture 1: Introduction Course organization:  4 lectures on cache coherence and consistency  2 lectures on transactional memory  2 lectures on interconnection.
1 Lecture 3: Snooping Protocols Topics: snooping-based cache coherence implementations.
1 Lecture 18: Coherence Protocols Topics: coherence protocols for symmetric and distributed shared-memory multiprocessors (Sections )
1 Lecture 5: Directory Protocols Topics: directory-based cache coherence implementations.
1 Lecture 23: Multiprocessors Today’s topics:  RAID  Multiprocessor taxonomy  Snooping-based cache coherence protocol.
NUMA coherence CSE 471 Aut 011 Cache Coherence in NUMA Machines Snooping is not possible on media other than bus/ring Broadcast / multicast is not that.
EECC756 - Shaaban #1 lec # 12 Spring Scalable Cache Coherent Systems Scalable distributed shared memory machines Assumptions: –Processor-Cache-Memory.
EECC756 - Shaaban #1 lec # 11 Spring Scalable Cache Coherent Systems Scalable distributed shared memory machines Assumptions: –Processor-Cache-Memory.
1 Lecture 3: Directory-Based Coherence Basic operations, memory-based and cache-based directories.
CS252/Patterson Lec /28/01 CS 213 Lecture 10: Multiprocessor 3: Directory Organization.
1 Lecture 20: Protocols and Synchronization Topics: distributed shared-memory multiprocessors, synchronization (Sections )
Cache Coherence for Large-Scale Machines Todd C. Mowry CS 495 Sept. 26 & Oct. 1, 2002 Topics Hierarchies Directory Protocols.
1 Shared-memory Architectures Adapted from a lecture by Ian Watson, University of Machester.
Cache Coherence in Scalable Machines CSE 661 – Parallel and Vector Architectures Prof. Muhamed Mudawar Computer Engineering Department King Fahd University.
1 Cache coherence CEG 4131 Computer Architecture III Slides developed by Dr. Hesham El-Rewini Copyright Hesham El-Rewini.
Lecture 3. Directory-based Cache Coherence Prof. Taeweon Suh Computer Science Education Korea University COM503 Parallel Computer Architecture & Programming.
Cache Control and Cache Coherence Protocols How to Manage State of Cache How to Keep Processors Reading the Correct Information.
Computer Science and Engineering Parallel and Distributed Processing CSE 8380 April 5, 2005 Session 22.
Computer Science and Engineering Copyright by Hesham El-Rewini Advanced Computer Architecture CSE 8383 March 20, 2008 Session 9.
1 Lecture 19: Scalable Protocols & Synch Topics: coherence protocols for distributed shared-memory multiprocessors and synchronization (Sections )
1 Lecture 3: Coherence Protocols Topics: consistency models, coherence protocol examples.
1 Lecture 7: PCM Wrap-Up, Cache coherence Topics: handling PCM errors and writes, cache coherence intro.
1 Lecture 7: Implementing Cache Coherence Topics: implementation details.
1 Lecture 8: Snooping and Directory Protocols Topics: 4/5-state snooping protocols, split-transaction implementation details, directory implementations.
Lecture 8: Snooping and Directory Protocols
Architecture and Design of AlphaServer GS320
Scalable Cache Coherent Systems
Lecture 18: Coherence and Synchronization
Scalable Cache Coherent Systems
CMSC 611: Advanced Computer Architecture
Prof John D. Kubiatowicz
Lecture 9: Directory-Based Examples II
CS5102 High Performance Computer Systems Distributed Shared Memory
Lecture 2: Snooping-Based Coherence
Scalable Cache Coherent Systems
Lecture 5: Snooping Protocol Design Issues
Lecture 8: Directory-Based Cache Coherence
Lecture 7: Directory-Based Cache Coherence
CS 213 Lecture 11: Multiprocessor 3: Directory Organization
Lecture 25: Multiprocessors
Lecture 9: Directory-Based Examples
Scalable Cache Coherent Systems
Slides developed by Dr. Hesham El-Rewini Copyright Hesham El-Rewini
Lecture 8: Directory-Based Examples
Lecture 25: Multiprocessors
Cache Coherence: Part II Scalable Approaches Todd C
Cache coherence CEG 4131 Computer Architecture III
Lecture 24: Virtual Memory, Multiprocessors
Scalable Cache Coherent Systems
Lecture 23: Virtual Memory, Multiprocessors
Lecture 24: Multiprocessors
Scalable Cache Coherent Systems
Coherent caches Adapted from a lecture by Ian Watson, University of Machester.
Lecture 19: Coherence and Synchronization
Lecture 18: Coherence and Synchronization
Scalable Cache Coherent Systems
Lecture 10: Directory-Based Examples II
Scalable Cache Coherent Systems
Scalable Cache Coherent Systems
Presentation transcript:

1 Lecture 2: Snooping and Directory Protocols Topics: Snooping wrap-up and directory implementations

2 Split Transaction Bus So far, we have assumed that a coherence operation (request, snoops, responses, update) happens atomically What would it take to implement the protocol correctly while assuming a split transaction bus? Split transaction bus: a cache puts out a request, releases the bus (so others can use the bus), receives its response much later Assumptions:  only one request per block can be outstanding  separate lines for addr (request) and data (response)

3 Split Transaction Bus Proc 1 Cache Proc 2 Cache Proc 3 Cache Request lines Response lines Buf

4 Design Issues Could be a 3-stage pipeline: request/snoop/response or (much simpler) 2-stage pipeline: request-snoop/response (note that the response is slowest and needs to be hidden) Buffers track the outstanding transactions; buffers are identical in each core; an entry is freed when the response is seen; the next operation uses any free entry; every bus operation carries the buffer entry number as a tag Must check the buffer before broadcasting a new operation; must ensure only one outstanding operation per block What determines the write order – requests or responses?

5 Design Issues II What happens if a processor is arbitrating for the bus and witnesses another bus transaction for the same address? If the processor issues a read miss and there is already a matching read in the request table, can we reduce bus traffic?

6 Non-Atomic State Transitions Other subtle considerations for correctness… Example I: block A in shared state in P1 and P2; both issue a write; the bus controllers are ready to issue an upgrade request and try to acquire the bus; is there a problem? Must realize that the nature of the transaction might have changed between the time of queuing and time of issue Snoops should also look at the queue; or, eliminate upgrades and use a wired-or signal to suppress response

7 Livelock Example II: Livelock can happen if the processor-cache handshake is not designed correctly Before the processor can attempt the write, it must acquire the block in exclusive state If all processors are writing to the same block, one of them acquires the block first – if another exclusive request is seen on the bus, the cache controller must wait for the processor to complete the write before releasing the block -- else, the processor’s write will fail again because the block would be in invalid state

8 Directory-Based Protocol For each block, there is a centralized “directory” that maintains the state of the block in different caches The directory is co-located with the corresponding memory Requests and replies on the interconnect are no longer seen by everyone – the directory serializes writes P C MemCADir P C MemCADir

9 Definitions Home node: the node that stores memory and directory state for the cache block in question Dirty node: the node that has a cache copy in modified state Owner node: the node responsible for supplying data (usually either the home or dirty node) Also, exclusive node, local node, requesting node, etc. P C MemCADir P C MemCADir

10 Directory Organizations Centralized Directory: one fixed location – bottleneck! Flat Directories: directory info is in a fixed place, determined by examining the address – can be further categorized as memory-based or cache-based Hierarchical Directories: the processors are organized as a logical tree structure and each parent keeps track of which of its immediate children has a copy of the block – more searching, can exploit locality

11 Flat Memory-Based Directories Directory is associated with memory and stores info for all cache copies A presence vector stores a bit for every processor, for every memory block – the overhead is a function of memory/block size and #processors Reducing directory overhead:

12 Flat Memory-Based Directories Directory is associated with memory and stores info for all cache copies A presence vector stores a bit for every processor, for every memory block – the overhead is a function of memory/block size and #processors Reducing directory overhead:  Width: pointers (keep track of processor ids of sharers) (need overflow strategy), organize processors into clusters  Height: increase block size, track info only for blocks that are cached (note: cache size << memory size)

13 Flat Cache-Based Directories The directory at the memory home node only stores a pointer to the first cached copy – the caches store pointers to the next and previous sharers (a doubly linked list) Main memory Cache 7Cache 3Cache 26

14 Flat Cache-Based Directories The directory at the memory home node only stores a pointer to the first cached copy – the caches store pointers to the next and previous sharers (a doubly linked list) Potentially lower storage, no bottleneck for network traffic Invalidates are now serialized (takes longer to acquire exclusive access), replacements must update linked list, must handle race conditions while updating list

15 Flat Memory-Based Directories Main memory Cache 1Cache 2Cache 64 … … Block size = 128 B Memory in each node = 1 GB Cache in each node = 1 MB For 64 nodes and 64-bit directory, Directory size = 4 GB For 64 nodes and 12-bit directory, Directory size = 0.75 GB

16 Flat Cache-Based Directories Main memory … Block size = 128 B Memory in each node = 1 GB Cache in each node = 1 MB 6-bit storage in DRAM for each block; DRAM overhead = GB 12-bit storage in SRAM for each block; SRAM overhead = 0.75 MB Cache 7Cache 3Cache 26

17 Flat Memory-Based Directories L2 cache L1 Cache 1L1 Cache 2L1 Cache 64 … … Block size = 64 B L2 cache in each node = 256 KB L1 Cache in each node = 64 KB For 64 nodes and 64-bit directory, Directory size = 2 MB For 64 nodes and 12-bit directory, Directory size = 375 KB

18 Flat Cache-Based Directories Main memory … 6-bit storage in L2 for each block; L2 overhead = 187 KB 12-bit storage in L1 for each block; L1 overhead = 96 KB Cache 7Cache 3Cache 26 Block size = 64 B L2 cache in each node = 256 KB L1 Cache in each node = 64 KB

19 Data Sharing Patterns Two important metrics that guide our design choices: invalidation frequency and invalidation size – turns out that invalidation size is rarely greater than four Read-only data: constantly read, never updated (raytrace) Producer-consumer: flag-based synchronization, updates from neighbors (Ocean) Migratory: reads and writes from a single processor for a period of time (global sum) Irregular: unpredictable accesses (distributed task queue)

20 SGI Origin 2000 Flat memory-based directory protocol Uses a bit vector directory representation Two processors per node – combining multiple processors in a node reduces cost P L2 CA M/D P L2 Interconnect

21 Directory Structure The system supports either a 16-bit or 64-bit directory (fixed cost); for small systems, the directory works as a full bit vector representation Seven states, of which 3 are stable For larger systems, a coarse vector is employed – each bit represents p/64 nodes State is maintained for each node, not each processor – the communication assist broadcasts requests to both processors

22 Title Bullet