THESIS FOR THE DEGREE OF LICENTIATE OF ENGINEERING Schemes to Improve the Efficiency of Hardware Transactional Memory Systems

نویسنده

  • M. M. Waliullah
چکیده

In today’s ubiquitous multiprocessor environment parallel programming becomes an important tool to reap the maximum gain. But the traditional lock-based parallel programming model is not attracting average programmers as the level of expertise needed is very high. A program can be trapped in deadlock and livelock by unconscious locking of shared resources. Furthermore, a lock-based parallel programming model uses blocking synchronization where execution of a critical section is exclusive. A processor that executes in a critical section blocks all other processor to execute inside the critical section. The blocking nature can limit concurrency if two processors follow two different execution paths yet in the critical section; in that case there will be no data race. Recently, many researchers proposed transactional memory that promises to simplify parallel programming as well as to offer non-blocking synchronization. In transactional memory systems, critical sections are executed in transactions where multiple transactions from different threads can be executed speculatively in parallel. Data integrity, hence the program correctness is maintained by isolating the speculative execution and committing atomically at the end. A commit can force other ongoing transactions to be squashed if a data conflict is detected. Depending on the mechanism in which the isolation, atomic commit and conflict detection is performed, transactional memory systems could be broadly categorized as software transactional memory (STM) and hardware transactional memory (HTM). In this thesis, three problems of HTM systems that hurt the execution time are discovered and novel solutions to the problems are proposed. In an HTM system that detects conflicts lazily, transactions from one thread can repeatedly squash a transaction from another thread which can lead to a starvation problem for the latter. A novel solution that uses squash counts for individual transaction is proposed to avoid starvation. At a data conflict, HTM systems squash the speculative executions and re-execute the transactions from the beginning. Re-execution from the beginning may waste a part of execution that is correct and hurt performance. A scheme is proposed that smartly takes intermediate checkpoints so that the correct execution can be saved from a squashing transaction. To isolate the speculative execution, a private buffer is used to store the speculative data. The drastic effect of speculative buffer overflow is discovered and a scheme is proposed that effectively uses the speculative buffer to reduce overflows.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

System Challenges and Opportunities for Transactional Memory a Dissertation Submitted to the Department of Electrical Engineering and the Committee on Graduate Studies of Stanford University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy

Recent trends in architecture have made chip multiprocessors (CMPs) increasingly common. CMPs provide programmers with an unprecedented opportunity for parallel execution. Nevertheless, the key factor limiting their potential is the complexity of parallel application development using primitives such as locks and condition variables. While transactional memory (TM) is a technique that helps wit...

متن کامل

Architectural and compiler support for strongly atomic transactional memory

Transactions are gaining ground as a programmer-friendly means of expressing concurrency, as microarchitecture trends make it clear that parallel systems are in our future. This thesis presents the design and implementation of four e cient and powerful transaction systems: ApeX, an objectoriented software-only system; UTM and LTM, two scalable systems using custom processor extensions; and HyAp...

متن کامل

Mitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion

Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...

متن کامل

A Case for Deconstructing Hardware Transactional Memory Systems

Major hardware and software vendors are curious about transactional memory (TM), but are understandably cautious about committing to hardware changes. Our thesis is that deconstructing transactional memory into separate, interchangeable components facilitates TM adoption in two ways. First, it aids hardware TM refinement, allowing vendors to adopt TM earlier, knowing that they can more easily r...

متن کامل

Embedded-TM: Energy and complexity-effective hardware transactional memory for embedded multicore systems

We investigate how transactional memory can be adapted for embedded systems. We consider energy consumption and complexity to be driving concerns in the design of these systems and therefore adapt simple hardware transactional memory (HTM) schemes in our architectural design. We propose several different cache structures and contention management schemes to support HTM and evaluate them in term...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007