Computer Science and Engineering Parallel and Distributed Processing CSE 8380 April 5, 2005 Session 22.

Slides:



Advertisements
Similar presentations
L.N. Bhuyan Adapted from Patterson’s slides
Advertisements

CSCI 8150 Advanced Computer Architecture
Copyright Josep Torrellas 2003,20081 Cache Coherence Instructor: Josep Torrellas CS533 Term: Spring 2008.
MESI cache coherence protocol
1 Lecture 6: Directory Protocols Topics: directory-based cache coherence implementations (wrap-up of SGI Origin and Sequent NUMA case study)
1 Lecture 4: Directory Protocols Topics: directory-based cache coherence implementations.
Cache Optimization Summary
CSE 490/590, Spring 2011 CSE 490/590 Computer Architecture Directory-Based Caches II Steve Ko Computer Sciences and Engineering University at Buffalo.
Cache Coherence. CSE 4711 Cache Coherence Recall the memory wall –In multiprocessors the wall might even be higher! –Contention on shared-bus –Time to.
CIS629 Coherence 1 Cache Coherence: Snooping Protocol, Directory Protocol Some of these slides courtesty of David Patterson and David Culler.
CS252/Patterson Lec /23/01 CS213 Parallel Processing Architecture Lecture 7: Multiprocessor Cache Coherency Problem.
1 Lecture 2: Snooping and Directory Protocols Topics: Snooping wrap-up and directory implementations.
1 Lecture 5: Directory Protocols Topics: directory-based cache coherence implementations.
ECE669 L18: Scalable Parallel Caches April 6, 2004 ECE 669 Parallel Computer Architecture Lecture 18 Scalable Parallel Caches.
NUMA coherence CSE 471 Aut 011 Cache Coherence in NUMA Machines Snooping is not possible on media other than bus/ring Broadcast / multicast is not that.
1 Lecture 3: Directory-Based Coherence Basic operations, memory-based and cache-based directories.
CPE 731 Advanced Computer Architecture Snooping Cache Multiprocessors Dr. Gheith Abandah Adapted from the slides of Prof. David Patterson, University of.
CS252/Patterson Lec /28/01 CS 213 Lecture 10: Multiprocessor 3: Directory Organization.
Snoopy Coherence Protocols Small-scale multiprocessors.
1 Shared-memory Architectures Adapted from a lecture by Ian Watson, University of Machester.
Multiprocessor Cache Coherency
Spring 2003CSE P5481 Cache Coherency Cache coherent processors reading processor must get the most current value most current value is the last write Cache.
1 Cache coherence CEG 4131 Computer Architecture III Slides developed by Dr. Hesham El-Rewini Copyright Hesham El-Rewini.
Shared Address Space Computing: Hardware Issues Alistair Rendell See Chapter 2 of Lin and Synder, Chapter 2 of Grama, Gupta, Karypis and Kumar, and also.
Cache Control and Cache Coherence Protocols How to Manage State of Cache How to Keep Processors Reading the Correct Information.
A Low-Overhead Coherence Solution for Multiprocessors with Private Cache Memories Also known as “Snoopy cache” Paper by: Mark S. Papamarcos and Janak H.
Lecture 13: Multiprocessors Kai Bu
Ch4. Multiprocessors & Thread-Level Parallelism 2. SMP (Symmetric shared-memory Multiprocessors) ECE468/562 Advanced Computer Architecture Prof. Honggang.
Computer Science and Engineering Copyright by Hesham El-Rewini Advanced Computer Architecture CSE 8383 March 20, 2008 Session 9.
Computer Science and Engineering Copyright by Hesham El-Rewini Advanced Computer Architecture CSE 8383 February Session 13.
Understanding and Implementing Cache Coherency Policies CSE 8380: Parallel and Distributed Processing Dr. Hesham El-Rewini Presented by, Fazela Vohra CSE.
“An Evaluation of Directory Schemes for Cache Coherence” Presented by Scott Weber.
Computer Science and Engineering Parallel and Distributed Processing CSE 8380 April 7, 2005 Session 23.
Performance of Snooping Protocols Kay Jr-Hui Jeng.
CMSC 611: Advanced Computer Architecture Shared Memory Most slides adapted from David Patterson. Some from Mohomed Younis.
Computer Science and Engineering Copyright by Hesham El-Rewini Advanced Computer Architecture CSE 8383 February Session 7.
COMP8330/7330/7336 Advanced Parallel and Distributed Computing Tree-Based Networks Cache Coherence Dr. Xiao Qin Auburn University
The University of Adelaide, School of Computer Science
1 Lecture 8: Snooping and Directory Protocols Topics: 4/5-state snooping protocols, split-transaction implementation details, directory implementations.
Lecture 8: Snooping and Directory Protocols
תרגול מס' 5: MESI Protocol
Computer Engineering 2nd Semester
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
Lecture 18: Coherence and Synchronization
12.4 Memory Organization in Multiprocessor Systems
Multiprocessor Cache Coherency
CMSC 611: Advanced Computer Architecture
Example Cache Coherence Problem
Directory-based Protocol
The University of Adelaide, School of Computer Science
Cache Coherence (controllers snoop on bus transactions)
Cache Coherence Protocols 15th April, 2006
Multiprocessors - Flynn’s taxonomy (1966)
Lecture 8: Directory-Based Cache Coherence
Lecture 7: Directory-Based Cache Coherence
Lecture 9: Directory-Based Examples
Slides developed by Dr. Hesham El-Rewini Copyright Hesham El-Rewini
Lecture 8: Directory-Based Examples
The University of Adelaide, School of Computer Science
Lecture 17 Multiprocessors and Thread-Level Parallelism
Cache coherence CEG 4131 Computer Architecture III
Coherent caches Adapted from a lecture by Ian Watson, University of Machester.
Lecture 17 Multiprocessors and Thread-Level Parallelism
Lecture 19: Coherence and Synchronization
CSL718 : Multiprocessors 13th April, 2006 Introduction
The University of Adelaide, School of Computer Science
CSE 486/586 Distributed Systems Cache Coherence
Lecture 17 Multiprocessors and Thread-Level Parallelism
Multiprocessors and Multi-computers
Presentation transcript:

Computer Science and Engineering Parallel and Distributed Processing CSE 8380 April 5, 2005 Session 22

Computer Science and Engineering Contents A5  Project Update Write Update and Partial Write Through Write Update Write Back Directory Based Protocols Group Work

Computer Science and Engineering Write update and partial write through In this protocol an update to one cache is written to memory at the same time it is broadcast to other caches sharing the updated block. These caches snoop on the bus and perform updates to their local copies. There is also a special bus line, which is asserted to indicate that at least one other cache is sharing the block.

Computer Science and Engineering Write update and partial write through (cont.) StateDescription Valid Exclusive [VAL-X] This is the only cache copy and is consistent with global memory Shared [SHARE] There are multiple caches copies shared. All copies are consistent with memory Dirty [DIRTY] This copy is not shared by other caches and has been updated. It is not consistent with global memory. (Copy ownership)

Computer Science and Engineering Write update and partial write through (cont.) EventAction Read HitUse the local copy from the cache. State does not change Read Miss: If no other cache copy exists, then supply a copy from global memory. Set the state of this copy to Valid Exclusive. If a cache copy exists, make a copy from the cache. Set the state to Shared in both caches. If the cache copy was in a Dirty state, the value must also be written to memory.

Computer Science and Engineering Write update and partial write through (cont.) Write HitPerform the write locally and set the state to Dirty. If the state is Shared, then broadcast data to memory and to all caches and set the state to Shared. If other caches no longer share the block, the state changes from Shared to Valid Exclusion. Write MissThe block copy comes from either another cache or from global memory. If the block comes from another cache, perform the update and update all other caches that share the block and global memory. Set the state to Shared. If the copy comes from memory, perform the write and set the state to Dirty. Block Replacement If a copy is in a Dirty state, it has to be written back to main memory if the block is being replaced. If the copy is in Valid Exclusive or Shared states, no write back is needed when a block is replaced.

Computer Science and Engineering Write Update Write Back This protocol is similar to the pervious one except that instead of writing through to the memory whenever a shared block is updated, memory updates are done only when the block is being replaced.

Computer Science and Engineering Write Update Write Back (cont.) StateDescription Valid Exclusive [VAL-X] This is the only cache copy and is consistent with global memory Shared Clean [SH-CLN] There are multiple caches copies shared. Shared Dirty [SH-DRT] There are multiple shared caches copies. This is the last one being updated. (Ownership) Dirty [DIRTY] This copy is not shared by other caches and has been updated. It is not consistent with global memory. (Ownership)

Computer Science and Engineering Write Update Write Back (cont.) EventAction Read HitUse the local copy from the cache. State does not change Read Miss: If no other cache copy exists, then supply a copy from global memory. Set the state of this copy to Valid Exclusive. If a cache copy exists, make a copy from the cache. Set the state to Shared Clean. If the supplying cache copy was in a Valid Exclusion or Shared Clean, its new state becomes Shared Clean. If the supplying cache copy was in a Dirty or Shared Dirty state, its new state becomes Shared Dirty.

Computer Science and Engineering Write Update Write Back (cont.) Write HitIf the sate was Valid Exclusive or Dirty, Perform the write locally and set the state to Dirty. If the state is Shared Clean or Shared Dirty, perform update and change state to Shared Dirty. Broadcast the updated block to all other caches. These caches snoop the bus and update their copies and set their state to Shared Clean. Write MissThe block copy comes from either another cache or from global memory. If the block comes from another cache, perform the update, set the state to Shared Dirty, and broadcast the updated block to all other caches. Other caches snoop the bus, update their copies, and change their state to Shared Clean. If the copy comes from memory, perform the write and set the state to Dirty. Block Replacement If a copy is in a Dirty or Shared Dirty state, it has to be written back to main memory if the block is being replaced. If the copy is in Valid Exclusive, no write back is needed when a block is replaced.

Computer Science and Engineering Directory Based Protocols Due to the nature of some interconnection networks and the size of the shared memory system, updating or invalidating caches using snoopy protocols might become unpractical. Examples??

Computer Science and Engineering Directory Based Protocols (cont.) Cache coherence protocols that somehow store information on where copies of blocks reside are called directory schemes.

Computer Science and Engineering What is a directory? A directory is a data structure that maintains information on the processors that share a memory block and on its state. The information maintained in the directory could be either centralized or distributed.

Computer Science and Engineering Centralized vs. Distributed A Central directory maintains information about all blocks in a central data structure. Bottleneck, large search time! The same information can be handled in a distributed fashion by allowing each memory module to maintain a separate directory.

Computer Science and Engineering Protocol Categorization Full Map DirectoriesFull Map Directories Limited DirectoriesLimited Directories Chained DirectoriesChained Directories

Computer Science and Engineering Full Map Directory Each directory entry contains N pointers, where N is the number of processors.Each directory entry contains N pointers, where N is the number of processors. There could be N cached copies of a particular block shared by all processors.There could be N cached copies of a particular block shared by all processors. For every memory block, an N bit vector is maintained, where N equals the number of processors in the shared memory system. Each bit in the vector corresponds to one processor.For every memory block, an N bit vector is maintained, where N equals the number of processors in the shared memory system. Each bit in the vector corresponds to one processor.

Computer Science and Engineering Full Map Directory Cache C0 Interconnection Network X: Directory Cache C1 Cache C2 Cache C3 Data X: Data 1010 Memory

Computer Science and Engineering Limited Directory Fixed number of pointers per directory entry regardless of the number of processors. Fixed number of pointers per directory entry regardless of the number of processors. Restricting the number of simultaneously cached copies of any block should solve the directory size problem that might exist in full-map directories.. Restricting the number of simultaneously cached copies of any block should solve the directory size problem that might exist in full-map directories..

Computer Science and Engineering Limited Directory Interconnection Network X: Directory Data X: Data C0C2Data Cache C0 Cache C1 Cache C2 Cache C3 Memory