Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Shanghai Jiaotong University》 2013-01
Add to Favorite Get Latest Update

An Adaptive Token Protocol Optimized for Migratory Sharing

FU Gui-tao1,2,ZHAO Tian-lei1,TANG Chuan1,XING Zuo-cheng1(1.College of Computer,National University of Defense Technology,Changsha 410073,China; 2.Beijing Satellite Navigation Center,Beijing 100094,China)  
According to the migratory pattern means that the accessing processor initiates two separate requests to obtain first read and then write permission in invalidation-based protocol,this paper proposed adaptive protocol which uses the token number and the writer or reader of data to recognize the migratory pattern.While the data is in migratory pattern,the requestor's state changes to MG state which can avoid the write request in migratory access.It effectively eliminates invalidation in migratory pattern.The adaptive protocol gets the ownership when reading the sharing data,and thus avoids some write misses.The results show that the adaptive protocol reduces the miss latency by an average of 5%,and the network traffic by an average of 9%.
【Fund】: 国家自然科学基金项目(61170083 60873016 61103011);; 教育部博士点基金项目(20114307110001 20094307120007);; 国家“核高基”重大专项(2011ZX01028-001-001 2009ZX01028-002-002)资助
【CateGory Index】: TP302
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved