Advertisement

Write Detection in Home-Based Software DSMs⋆

  • Weiwu Hu
  • Weisong Shi
  • Zhimin Tang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1685)

Abstract

Write detection is essential in multiple writer protocols to identify writes to shared pages so that these writes can be correctly propagated. This paper studies different write detection schemes in a home-based software DSM system called JIAJIA. It compares the performance of three write detection schemes: the traditional virtual memory page fault write detection scheme which write-protects both home and cached pages at the beginning of an interval, a cache only write detection scheme which does not detect writes to home pages but invalidates all cached pages at the beginning of an interval, and an API write detection scheme which requires the programmer or pre-complier to explicitly records writes in program. Evaluation with some well-known DSM benchmarks reveals that tradeoffs of different write detection schemes vary with data (home) distribution and memory reference patterns of applications.

Keywords

Home Page Page Fault Synchronization Point Cache Coherence Protocol Cache Page 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. [1]
    D. Bailey, J. Barton, T. Lasinski, and H. Simon, “The NAS Parallel Benchmarks”, Technical Report 103863, NASA, July 1993.Google Scholar
  2. [2]
    W. Hu, W. Shi, and Z. Tang, “JIAJIA:An SVM System Based on A New Cache Coherence Protocol”, in Proceedings of the 7th High Performance Computing and Networking Europe, pp. 463–272, April 1999.Google Scholar
  3. [3]
    L. Iftode, J. Singh and K. Li, “Scope Consistency: A Bridge Between Release Consistency and Entry Consistency”, in Proceedings of the 8th Annual ACM Symposium on Parallel Algorithms and Architectures, June 1996.Google Scholar
  4. [4]
    P. Keleher, S. Dwarkadas, A. Cox, and W. Zwaenepoel, “TreadMarks Distributed Shared Memory on Standard Workstations and Operating Systems”, in Proceedings of the 1994 Winter Usenix Conference, pp. 115–131, January 1994.Google Scholar
  5. [5]
    H. Lu, S. Dwarkadas, A. Cox, and W. Zwaenepoel, “Quantifying the Performance Differences Between PVM and TreadMarks”, Journal of Parallel and Distributed Computing, Vol. 43, No. 2, pp. 65–78, June 1997.Google Scholar
  6. [6]
    S. Woo, M. Ohara, E. Torrie, J. Singh, and A. Gupta, “The SPLASH-2 Programs: Characterization and Methodological Considerations”, in Proceedings of the 22th Annual Symposium on Computer Architecture, pp. 24–36, 1995.Google Scholar
  7. [7]
    M. Zekauskas, W. Sawdon, and B. Bershad, “Software Write Detection for a Distributed Shared Memory”, in Proceedings of the first International Symposium on Operating System Design and Implementation, pp. 87–100, November 1994.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1999

Authors and Affiliations

  • Weiwu Hu
    • 1
  • Weisong Shi
    • 1
  • Zhimin Tang
    • 1
  1. 1.Institute of Computing TechnologyChinese Academy of SciencesBeijingChina

Personalised recommendations