• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wu Junmin, Yang Chao, Chen Guoliang, Zhang Miaohui, and Men Ke. Design and Implementation of a Memory Model Simulator[J]. Journal of Computer Research and Development, 2005, 42(3).
Citation: Wu Junmin, Yang Chao, Chen Guoliang, Zhang Miaohui, and Men Ke. Design and Implementation of a Memory Model Simulator[J]. Journal of Computer Research and Development, 2005, 42(3).

Design and Implementation of a Memory Model Simulator

More Information
  • Published Date: March 14, 2005
  • Cache coherence and memory consistency are two important problem to a shared memory parallel computer. Many coherence protocol and consistency model have been proposed for different systems. Simulation is a quantitative approach to compare different consistency model and coherence protocol. This paper gives a scheme and implementation of a shared memory model simulator—MMS. First the framework of the simulator is described. MMS includes an execution engine and a virtual shared memory system. The engine can execute parallel threads and simulate the behavior of shared memory system. Several memory consistency models are realized, such as sequential consistency model, weak consistency model, release consistency model and lazy release consistency model. Then different memory consistency models, including SC, WC, RC and LRC, are compared between different parallel computer architecture models, including SMP and DSM. The behavior of different memory consistency models is also simulated in solving different type computing problem, including computing intensive problem, communication intensive problem and memory intensive problem. To achieve high performance several cache coherence protocols are proposed. Finally it is concluded that for different computer architectures, proper memory consistency model and proper cache coherence protocol should be employed.
  • Related Articles

    [1]Zhao Shengnan, Jiang Han, Wei Xiaochao, Ke Junming, Zhao Minghao. An Efficient Single Server-Aided k-out-of-n Oblivious Transfer Protocol[J]. Journal of Computer Research and Development, 2017, 54(10): 2215-2223. DOI: 10.7544/issn1000-1239.2017.20170463
    [2]Zhang Hongbin, Ji Donghong, Yin Lan, Ren Yafeng, Niu Zhengyu. Caption Generation from Product Image Based on Tag Refinement and Syntactic Tree[J]. Journal of Computer Research and Development, 2016, 53(11): 2542-2555. DOI: 10.7544/issn1000-1239.2016.20150906
    [3]Chen Tieming, Yang Yimin, Chen Bo. Maldetect: An Android Malware Detection System Based on Abstraction of Dalvik Instructions[J]. Journal of Computer Research and Development, 2016, 53(10): 2299-2306. DOI: 10.7544/issn1000-1239.2016.20160348
    [4]Liu Duo, Dai Yiqi. Construction of Transformation Matrix with a Given Period Modulo N[J]. Journal of Computer Research and Development, 2012, 49(5): 925-931.
    [5]Hu Kai, Wang Zhe, Jiang Shu, and Yin Baolin. A Performance Model of k-Ary n-Cube Under Communication Locality[J]. Journal of Computer Research and Development, 2011, 48(11): 2083-2093.
    [6]Sun Decai, Sun Xingming, Zhang Wei, and Liu Yuling. A Filter Algorithm for Approximate String Matching Based on Match-Region Features[J]. Journal of Computer Research and Development, 2010, 47(4): 663-670.
    [7]Chen Huahong, Luo Xiaonan, Ling Ruotian, Ma Jianping. A Mesh Simplification Algorithm Based on n-Edges-Mesh Collapse[J]. Journal of Computer Research and Development, 2008, 45(6).
    [8]Zhang Yuejie, Xu Zhiting, and Xue Xiangyang. Fusion of Multiple Features for Chinese Named Entity Recognition Based on Maximum Entropy Model[J]. Journal of Computer Research and Development, 2008, 45(6).
    [9]Xia Luning and Jing Jiwu. An Administrative Model for Role-Based Access Control Using Hierarchical Namespace[J]. Journal of Computer Research and Development, 2007, 44(12): 2020-2027.
    [10]Tang Huanling, Sun Jiantao, Lu Yuchang. A Weight Adjustment Technique with Feature Weight Function Named TEF-WA in Text Categorization[J]. Journal of Computer Research and Development, 2005, 42(1): 47-53.

Catalog

    Article views (537) PDF downloads (538) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return