Bounding the Effects of Resource Access Protocols on Cache Behavior
نویسندگان
چکیده
The assumption of task independence has long been consubstantial with the formulation of many schedulability analysis techniques. That assumption is evidently advantageous for the mathematical formulation of the analysis equations, but ill fit to capture the actual behavior of the system. Resource sharing is one of the system design dimensions that break the assumption of task independence. By shaking the very foundations of the real-time analysis theory, the advent of multicore systems has caused resurgence of interest in resource sharing and synchronization protocols, and also dawned the fact that the assumption of task independence may be forever broken. Research in cache-aware schedulability analysis instead has paid very little attention to the impact that synchronization protocols may have on cache behavior. A blocked task may in fact incur time penalties similar in kind to those caused by preemption, in that some useful code or data already loaded in the cache may be evicted while the task is blocked. In this paper we characterize the sources of cache-related blocking delay (CRBD). We then provide a bound on the CRBD for three synchronization protocols of interest. The comparison between these bounds provides striking evidence that an informed choice of the synchronization protocol helps contain the perturbing effects of blocking on the cache state.
منابع مشابه
Analytically Bounding Data Cache Behavior for Real - Time Systems
RAMAPRASAD, HARINI Analytically Bounding Data Cache Behavior for Real-Time Systems. (Under the direction of Associate Professor Frank Mueller). This dissertation presents data cache analysis techniques that make it feasible to predict data cache behavior and to bound the worst-case execution time for a large class of real-time programs. Data Caches are an increasingly important architectural fe...
متن کاملExploiting Data Locality in Adaptive Architectures
The speed of processors increases much faster than the memory access time. This makes memory accesses expensive. To meet this problem, cache hierarchies are introduced to serve the processor with data. However, the effectiveness of caches depends on the amount of locality in the application’s memory access pattern. The behavior of various programs differs greatly in terms of cache miss characte...
متن کاملModels for Performance Prediction of Cache Coherence Protocols
Key words: Cache coherence, distributed shared memory, memory access behavior, analytical performance prediction , performance evaluation, dynamic hybrid protocols. In a modern shared memory multiprocessor, it is possible to support more than one protocol for maintaining cache coherence. Possible candidates might be based on the Write-Back/Invalidate, Write-Through/Invalidate, and Write-Update ...
متن کاملNeighborhood Cache for Mobile Ad-hoc Networks
Distributed cache data placement in ad-hoc networks enables higher performance and better quality of service for mobile users. Prior work in the area has focused much of its effort for minimizing the cost of data access within an adhoc network by using different strategies for data placement, replication, and data access. Formation of such networks in common work places requires support for und...
متن کاملEffects of Small Transfers and Traffic Patterns on Performance and Cache Efficacy of Ad Hoc Routing
Short-lived small transfers such as resource discovery and queries are likely to constitute a significant portion of the traffic in future ad hoc networks. In earlier work on ad hoc routing, randomly assigned long-lived connections have been studied. In this study we show that small transfers stress the route setup phase (vs. maintenance/repair phase) and exhibit significant different behavior ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010