190 likes | 351 Views
Snooping Protocols. Jason Moore. Agenda. Review of Snooping Protocols Type of system considered Screen shots of the application. What are snooping protocols?. The idea of issuing coherency commands based on bus activity Types of snooping protocols Write-invalidate and write-back
E N D
Snooping Protocols Jason Moore
Agenda • Review of Snooping Protocols • Type of system considered • Screen shots of the application
What are snooping protocols? • The idea of issuing coherency commands based on bus activity • Types of snooping protocols • Write-invalidate and write-back • Write-invalidate and write-through • write-update and write-back • write-update and partial write-through • Write-once
Write-Invalidate and Write-Back • 3 states • Read Only • Main Memory is the primary owner but cache has a copy to read • Read-Write • Cache is the only owner. Must invalidate main memory and all other caches that have a copy • Invalid
Write-invalidate and Write-Through • Main Memory is always consistent with most recent value • 2 states • Valid • Invalid
Write-Update and Write-Back • 4 states • Valid-Exclusive • Main Memory has the only copy • Shared Clean • Shared Dirty • Multiple-copies but only one valid block • Dirty • Has been changed and is not shared
Write-Update and Partial Write-Through • Written to memory at the same time it is broadcast to other caches • 3 states • Valid-Exclusive • Shared • Dirty
Write-Once (Goodman 1983) • Write Invalidate and Write-Back except the first time a block is written to main memory is updated to remain consistent • 3 states • Valid • Invalid • Reserved • Dirty
Write-Invalidate and Write-Back: State Diagram Read by other write RO RW read write Write by other Write by other INV
2 x 5 Commands 7 1 reads x 2 reads x 2 updates x 5 2 reads x 2 updates x 5 1 updates x 5 2 reads x Input File
Why no demo? • Silly Java mistake • Keeps values from being displayed correctly in the table • Found the problem this morning • Could not fix it in time for class
Future Work • Before Thursday • Fix bug • Add the remaining protocols • After Thursday (?) • Add cache replacement policies • Add experimental protocols
References • Hesham El-Rewini and Mostafa Abd-El-Barr, Advanced Computer Architecture and Parallel Processing,A John Wiley & Sons, Inc, 2005