TY - GEN
T1 - Flexible snooping
T2 - 33rd International Symposium on Computer Architecture, ISCA 2006
AU - Strauss, Karin
AU - Shen, Xiaowei
AU - Torrellas, Josep
PY - 2006
Y1 - 2006
N2 - A simple and low-cost approach to supporting snoopy cache coherence is to logically embed a unidirectional ring in the network of a multiprocessor, and use it to transfer snoop messages. Other messages can use any link in the network. While this scheme works for any network topology, a naive implementation may result in long response times or in many snoop messages and snoop operations. To address this problem, this paper proposes Flexible Snooping algorithms, a family of adaptive forwarding and filtering snooping algorithms. In these algorithms, a node receiving a snoop request may either forward it to another node and then perform the snoop, or snoop and then forward it, or simply forward it without snooping. The resulting design space offers trade-offs in number of snoop operations and messages, response time, and energy consumption. Our analysis using SPLASH-2, SPECjbb, and SPECweb workloads finds several snooping algorithms that are more cost-effective than current ones. Specifically, our choice for a high-performance snooping algorithm is faster than the currently fastest algorithm while consuming 9-17% less energy; our choice for an energy-efficient algorithm is only 3-6% slower than the previous one while consuming 36-42% less energy.
AB - A simple and low-cost approach to supporting snoopy cache coherence is to logically embed a unidirectional ring in the network of a multiprocessor, and use it to transfer snoop messages. Other messages can use any link in the network. While this scheme works for any network topology, a naive implementation may result in long response times or in many snoop messages and snoop operations. To address this problem, this paper proposes Flexible Snooping algorithms, a family of adaptive forwarding and filtering snooping algorithms. In these algorithms, a node receiving a snoop request may either forward it to another node and then perform the snoop, or snoop and then forward it, or simply forward it without snooping. The resulting design space offers trade-offs in number of snoop operations and messages, response time, and energy consumption. Our analysis using SPLASH-2, SPECjbb, and SPECweb workloads finds several snooping algorithms that are more cost-effective than current ones. Specifically, our choice for a high-performance snooping algorithm is faster than the currently fastest algorithm while consuming 9-17% less energy; our choice for an energy-efficient algorithm is only 3-6% slower than the previous one while consuming 36-42% less energy.
UR - http://www.scopus.com/inward/record.url?scp=33845886092&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33845886092&partnerID=8YFLogxK
U2 - 10.1109/ISCA.2006.21
DO - 10.1109/ISCA.2006.21
M3 - Conference contribution
AN - SCOPUS:33845886092
SN - 076952608X
SN - 9780769526089
T3 - Proceedings - International Symposium on Computer Architecture
SP - 327
EP - 338
BT - Proceedings - 33rd International Symposium on Computer Architecture,ISCA 2006
Y2 - 17 June 2006 through 21 June 2006
ER -