Subspace snooping: Filtering snoops with operating system support

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 385
  • Download : 281
DC FieldValueLanguage
dc.contributor.authorKim, Daehoon-
dc.contributor.authorAhn, Jeongseob-
dc.contributor.authorKim, Jaehong-
dc.contributor.authorHuh, Jaehyuk-
dc.date.accessioned2011-02-14T07:36:40Z-
dc.date.available2011-02-14T07:36:40Z-
dc.date.created2012-02-06-
dc.date.issued2010-09-11-
dc.identifier.citation19th International Conference on Parallel Architectures and Compilation Techniques, PACT 2010, v., no., pp.111 - 122-
dc.identifier.urihttp://hdl.handle.net/10203/22123-
dc.description.abstractAlthough snoop-based coherence protocols provide fast cache to-cache transfers with a simple and robust coherence mechanism, scaling the protocols has been difficult due to the overheads of broadcast snooping. In this paper, we propose a coherence filtering technique called subspace snooping, which stores the potential sharers of each memory page in the page table entry. By using the sharer information in the page table entry, coherence transactions for a page generate snoop requests only to the subset of nodes in the system (subspace). However, the coherence subspace of a page may evolve, as the phases of applications may change or the operating system may migrate threads to different nodes. To adjust subspaces dynamically, subspace snooping supports a shrinking mechanism, which removes obsolete nodes from subspaces. Subspace snooping can be integrated to any type of coherence protocols and network topologies. As subspace snooping guarantees that a subspace always contains the precise sharers of a page, it does not restrict the designs of coherence protocols and networks. We evaluate subspace snooping with Token Coherence on un-ordered mesh networks. For scientific and server applications on a 16-core system, subspace snooping reduces 44% of snoops on average.-
dc.description.sponsorshipWe would like to thank Doug Burger, who contributed a lot to the inital study for this work. We also thank the annonymous reviwers for their comments. This work is supported by the IT R&D Program of MKE/KEIT. [2010- KI002090, Development of Technology Base for Trustworthy Computing]en
dc.languageENG-
dc.language.isoen_USen
dc.titleSubspace snooping: Filtering snoops with operating system support-
dc.typeConference-
dc.identifier.scopusid2-s2.0-78149250399-
dc.type.rimsCONF-
dc.citation.beginningpage111-
dc.citation.endingpage122-
dc.citation.publicationname19th International Conference on Parallel Architectures and Compilation Techniques, PACT 2010-
dc.identifier.conferencecountryAustria-
dc.identifier.conferencecountryAustria-
dc.contributor.localauthorHuh, Jaehyuk-
dc.contributor.nonIdAuthorKim, Daehoon-
dc.contributor.nonIdAuthorAhn, Jeongseob-
dc.contributor.nonIdAuthorKim, Jaehong-

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0