• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
He Ximing, Ma Sheng, Huang Libo, Chen Wei, Wang Zhiying. A Simple and Efficient Cache Coherence Protocol Based on Self-Updating[J]. Journal of Computer Research and Development, 2019, 56(4): 719-729. DOI: 10.7544/issn1000-1239.2019.20170898
Citation: He Ximing, Ma Sheng, Huang Libo, Chen Wei, Wang Zhiying. A Simple and Efficient Cache Coherence Protocol Based on Self-Updating[J]. Journal of Computer Research and Development, 2019, 56(4): 719-729. DOI: 10.7544/issn1000-1239.2019.20170898

A Simple and Efficient Cache Coherence Protocol Based on Self-Updating

More Information
  • Published Date: March 31, 2019
  • As the number of cores in a chip multiprocessor increases, cache coherence protocols have become a performance bottleneck of the share-memory system. The overhead and complexity of current cache coherence protocols seriously restrict the development of the share-memory system. Specifically, directory protocols need high storage overhead to keep track of sharer list and snooping protocols consume significant network bandwidth to broadcast messages. Some coherence protocols, such as MESI (modified exclusive shared or invalid) protocol, are extremely complex and have numerous transient states and data race. This paper implements a simple and efficient cache coherence protocol named VISU (valid/invalid states based on self-updating) for data-race-free programs. VISU is based on a self-updating mechanism and only includes two stable states (valid and invalid). Furthermore, the VISU protocol eliminates the directory and indirection transactions and reduces significant overheads. First, we propose self-updating shared blocks at synchronization points for correction with the data-race-free guarantee of parallel programming. Second, taking advantage of techniques that dynamically classify private data (only accessed by one processor) and shared data, we propose write-back for private data and write-through for shared data. For private data, a simple write-back policy can reduce the unnecessary on-chip network traffic. In L1 cache, a write-through policy for shared data which can keep the newest shared data in LLC, would obviate almost all coherence states. Our approach implements a truly cost-less two-state coherence protocol. The VISU protocol does not require directory or indirect transfer and is easier to verify while at the same time obtains similar even better performance of MESI directory protocol.
  • Related Articles

    [1]Zhu Yi’an, Shi Xianchen, Yao Ye, Li Lian, Ren Pengyuan, Dong Weizhen, Li Jiayu. A WCET Analysis Method for Multi-Core Processors with Multi-Tier Coherence Protocol[J]. Journal of Computer Research and Development, 2023, 60(1): 30-42. DOI: 10.7544/issn1000-1239.202111244
    [2]Chen Zhiqiang, Zhou Hongwei, Feng Quanyou, Deng Rangyu. Design and Implementation of Configurable Cache Coherence Protocol for Multi-Core Processor[J]. Journal of Computer Research and Development, 2021, 58(6): 1166-1175. DOI: 10.7544/issn1000-1239.2021.20210174
    [3]Chen Jicheng, Li Yihan, Zhao Yaqian, Wang Endong, Shi Hongzhi, Tang Shibin. A Shared-Forwarding State Based Multiple-Tier Cache Coherency Protocol[J]. Journal of Computer Research and Development, 2017, 54(4): 764-774. DOI: 10.7544/issn1000-1239.2017.20160141
    [4]Tian Youliang, Peng Chenggen, Ma Jianfeng, Jiang Qi, Zhu Jianming. Game-Theoretic Mechanism for Cryptographic Protocol[J]. Journal of Computer Research and Development, 2014, 51(2): 344-352.
    [5]Ren Yongjun, Wang Jiandong, Xu Dazhuan, Zhuang Yi, Wang Jian. Key Agreement Protocol for Wireless Sensor Networks Using Self-Certified Public Key System[J]. Journal of Computer Research and Development, 2012, 49(2): 304-311.
    [6]Chen Tieming, Samuel H. Huang, Liu Duo, Cai Jiamei. Research on Neural Cryptographic Protocols[J]. Journal of Computer Research and Development, 2009, 46(8): 1316-1324.
    [7]Xiao Junhua, Feng Zijun, Zhang Longbing. The Tradeoff Cache Between Latency and Capacity in Chip Multiprocessors[J]. Journal of Computer Research and Development, 2009, 46(1): 167-175.
    [8]Xu Wenli, Yu Yeyun, Wang Yumin. Secure and Efficient Protocols for Watermark Verification[J]. Journal of Computer Research and Development, 2008, 45(3): 557-562.
    [9]Gong Haigang, Yu Changyuan, Liu Ming, Yi Fasheng, Wang Xiaomin, Chen Lijun. A Self-Adaptive, Energy-Efficient Low Latency MAC Protocol for Wireless Sensor Network[J]. Journal of Computer Research and Development, 2007, 44(11): 1866-1872.
    [10]Dong Jian, Zuo Decheng, Liu Hongwei, Yang Xiaozong, and Ren Xiao. A Protocol of Fault Diagnosis Agreement Based on Invalid Link[J]. Journal of Computer Research and Development, 2007, 44(6): 914-923.
  • Cited by

    Periodical cited type(4)

    1. 方燕飞,刘齐,董恩铭,李雁冰,过锋,王谛,何王全,漆锋滨. 面向E级超算系统的众核片上存储层次研究. 计算机工程. 2023(12): 10-24 .
    2. 吉晓宇,武玉国,张明慧. 一种基于Logisim的LRU高速缓存仿真系统设计与实现. 郑州师范教育. 2022(04): 17-20 .
    3. 陈志强,周宏伟,冯权友,邓让钰. 面向多核处理器的可配置缓存一致性协议设计与实现. 计算机研究与发展. 2021(06): 1166-1175 . 本站查看
    4. 唐艳丽,何超,郑慧娴,蒋益平,孙振. 基于SoC协处理器Cache的动态分配方法. 仪器仪表标准化与计量. 2020(06): 28-29 .

    Other cited types(5)

Catalog

    Article views (1041) PDF downloads (405) Cited by(9)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return