Home Page Transfer Copy 1 Copy 2 Copy 3 AU , Diffs AU
نویسندگان
چکیده
As the workstation market moves form single processor to small-scale shared memory multiprocessors, it is very attractive to construct larger-scale multiprocessors by connecting symmetric multiprocessors (SMPs) with eecient commodity network interfaces such as Myrinet. Using a shared virtual memory (SVM) layer for this purpose preserves the shared memory programming abstraction across nodes. We explore the feasibility and performance implications of one such approach by comparing the performance of two SVM protocols on systems with uniprocessor and SMP nodes. AURC (Automatic Update Release Consistency) is a protocol developed for the SHRIMP multicomputer that takes advantage of the available Automatic Update hardware support. HLRC (Home-Based Lazy Release Consistency) is an all-software version of AURC. These protocols were demonstrated to achieve good performance and to outperform earlier all-software systems on conngurations with uniprocessor nodes. In this paper we use an architectural simulator and ten applications to investigate the potential of using SMP nodes. Through detailed simulations we nd that using SMPs improves performance for most of the applications, because of more sharing, eeective prefetching and lower synchronization costs. The protocols, however, exhibit diierent behavior for some applications. HLRC is in general more robust and predictable, whereas AURC exhibits more problems with contention due to the increased traac. 1 Introduction Recently, small-scale shared-memory SMPs have become increasingly widespread. Inexpensive SMPs based on Intel PC processors are on the market, and SMPs from other vendors are increasingly popular. Given this development, it is natural to examine whether the SVM mechanisms developed for uniprocessor nodes extend well to using an SMP as the base node, and how these mechanisms can be improved for this task. In this environment, the bus coherence protocol operates at cache line level within an SMP, and the higher-overhead SVM mechanism provides communication and coherence at page granularity across SMPs. Another view of
منابع مشابه
Role of p53, Mitochondrial DNA Deletions, and Paternal Age in Autism: A Case-Control Study.
BACKGROUND The tumor suppressor p53 responds to a variety of environmental stressors by regulating cell cycle arrest, apoptosis, senescence, DNA repair, bioenergetics and mitochondrial DNA (mtDNA) copy number maintenance. Developmental abnormalities have been reported in p53-deficient mice, and altered p53 and p53-associated pathways in autism (AU). Furthermore, via the Pten-p53 crosstalk, Pten...
متن کاملAssessment of mitochondrial DNA copy number in peripheral blood leukocyte of opiate abusers and healthy individuals
Background: Based on the studies, variation in the mitochondrial DNA (mtDNA) copy number in peripheral blood leukocytes is associated with increased susceptibility to diseases including cancer. Opiate abusers are at high risk for diseases. In this study, we measured the mtDNA copy number in peripheral blood leukocytes in a group of opiate abusers compared with those in healthy individuals. Met...
متن کاملCopy Emulation in Checksummed, Multiple-Packet Communication
Data copying can be a bottleneck in end-to-end communication over high-speed networks. Emulated copy is an alternative I/O data passing scheme that preserves the API and integrity guarantees of copying but avoids the latter using VM manipulations – transient output copy-on-write (TCOW), input alignment, and page swapping. We characterize and evaluate the support necessary in network adapters fo...
متن کاملA Versioning Approach to VM Live Migration
In the context of virtual machines live migration, two strategies called “pre-copy” and “post-copy” have already been presented; but each of these strategies works well only in some circumstances. In this paper, we have a brief presentation of QAVNS and then introduce a new approach which is based on the concept of "informational object", assigning QAVNS-scheme-revision number, and observing th...
متن کاملPerformance evaluation of block-based copy- move image forgery detection algorithms
Copy-move forgery is a particular type of distortion where a part or portions of one image is/are copied to other parts of the same image. This type of manipulation is done to hide a particular part of the image or to copy one or more objects into the same image. There are several methods for detecting copy-move forgery, including block-based and key point-based methods. In this paper, a method...
متن کامل