Skip to main content
Log in

Limited multiple-writer: An approach to dealing with false sharing in software DSMs

  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

False sharing is one of the most important factors impacting the performance of DSM (distributed shared memory) systems. The single-writer approach is simple, but it cannot avoid the ping-pong effect of the data page thrashing, while the multiple-writer approach is effective for false sharing but with high cost. This paper proposes a new approach, called limited multiple-writer (LMW) to handling multiple writers in software DSM. It distinguishes two kinds of multiple-writer as lock-based form and barrier-based form, and handles them with different policies. It discards theTwin andDiff in traditional multiple-writer approach, and simplifies the implementation of multiple-writer in software DSM systems. The implementation of LMW in a CVM (Coherent Virtual Machine) software DSM system, which is based on a network of workstations, is introduced. Evaluation results show that for some applications such as SOR (Successive Over-Relaxation), LU (Lower triangular and Upper triangular), FFT (Fast Fourier Transformation), and IS (Integer Sorting), LMW provides a significant reduction in execution time (11%, 16%, 33% and 46%) compared with the traditional multiple-writer approach on the platform.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Amza C, Cox A L, Dwarkadas Set al. Software DSM protocols that adapt between single writer and multiple writer. InProceedings of HPCA’97, 1997, pp.261–271.

  2. Keleher P J. The relative importance of concurrent writers and weak consistency models. InProceedings of the 16th ICDCS, 1996, Hong Kong.

  3. Carter J B, Bennett J K, Zwaenepoel W. Techniques for reducing consistency-related information in distributed shared memory systems.ACM Transactions on Comput. Systems, 1995, 13(3): 205–243.

    Article  Google Scholar 

  4. Keleher P J, Cox A L, Zwaenepoel W. Lazy Release consistency for software distributed shared memory. InProceedings of the 19th Annual International Symposium on Computer Architecture, 1992, Queensland Australia, pp.13–21.

  5. Keleher P J, Cox A L, Dwarkadas Set al. TreadMarks: Distributed shared memory on standard workstations and operating systems. InProceedings of the USENIX Winter 1994 Conference, 1994, San Francisco, California.

  6. Keleher P J. The coherent virtual machine. Technical Report Maryland TR93-215, Department of Computer Science University of Maryland, Sept. 1995.

    Google Scholar 

  7. Carter J B, Bennett J K, Zwaenepoel W. Implementation and performance of Munin. InProceedings of the 13th ACM SOSP, October 1991, Pacific Grove, California, pp. 152–164.

  8. Gharachorloo Ket al. Memory consistency and event ordering in scalable shared-memory multiprocessors. InProceedings of the 17th Annual ISCA, 1990, Seattle, Washington, pp. 15–26.

  9. Singh J P, Weber W D, Gupta A. SPLASH: Stanford parallel applications for shared-memory.Computer Architecture News, March 1992, 20(1): 5–44.

    Article  Google Scholar 

  10. Woo S C, Ohara M, Torrie Eet al. The SPLASH-2 programs: Characterization and methodological considerations. InProceedings of the 22nd ISCA, June 1995, Santa Margherita Ligure, Italy, pp.24–36.

  11. Amza C, Cox A L, Rajamani Ket al. Tradeoffs between false sharing and aggregation in software distributed shared memory. InProceedings of PPOPP’97, 1997, Las Vegas, Nevada, pp.90–99.

  12. Monnerat L R, Bianchini R. Efficiently adapting to sharing patterns in software DSMs. InProceedings of HPCA’98, Las Vegas, Nevada.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xie Xianghui.

Additional information

This work is supported in part by the National Natural Science Foundation of China under grant No.69896250 and in part by the National Climbing Program of China.

XIE Xianghui received his Ph.D. degree in computer science from the Institute of Computing Technology, the Chinese Academy of Sciences in 1999. He is currently the sub-chief engineer of the National Research Center of Parallel Computer Engineering and Technology. His research interests include high performance computer architecture, distributed parallel processing, network and computational environment.

HAN Chengde received his M.S. degree from the Institute of Computing Technology, the Chinese Academy of Sciences. He is a professor and a doctoral supervisor of the Institute of Computing Technology, the Chinese Academy of Sciences. His research interests include high performance computer architecture, multimedia, network, and VLSI design.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Xie, X., Han, C. Limited multiple-writer: An approach to dealing with false sharing in software DSMs. J. Comput. Sci. & Technol. 15, 453–460 (2000). https://doi.org/10.1007/BF02950409

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02950409

Keywords

Navigation