Hiding message delivery latency using Direct-to-Cache-Transfer techniques in message passing environments |
| |
Authors: | Farshad Khunjush Nikitas J. Dimopoulos |
| |
Affiliation: | 1. National Laboratory for Parallel and Distributed Processing, National University of Defense Technology, Changsha, China;2. College of Computer, National University of Defense Technology, Changsha, China;1. Department of Computer Science and Engineering, School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran;2. Department of Statistics and Actuarial Science, David R. Cheriton School of Computer Science, Waterloo University, Waterloo, Canada;1. Liaoning Engineering Laboratory of Data Analytics and Optimization for Smart Industry, State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang 110819, China;2. Liaoning Key Laboratory of Manufacturing System and Logistics, Institute of Industrial and Systems Engineering, Northeastern University, Shenyang 110819, China;3. School of Business and Economics, Loughborough University, Leicestershire LE11 3TU, UK;1. School of Computer Science and Engineering, University of Electronic Science and Technology of China, China;2. School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore;3. Department of Computer Science, City University of Hong Kong, Hong Kong, China |
| |
Abstract: | Communication overhead is the key obstacle to reaching hardware performance limits. The majority is associated with software overhead, a significant portion of which is attributed to message copying. To reduce this copying overhead, we have devised techniques that do not require to copy a received message in order for it to be bound to its final destination. Rather, a late-binding mechanism, which involves address translation and a dedicated cache, facilitates fast access to received messages by the consuming process/thread.We have introduced two policies namely Direct to Cache Transfer (DTCT) and lazy DTCT that determine whether a message after it is bound needs to be transferred into the data cache. We have studied the proposed methods in simulation and have shown their effectiveness in reducing access times to message payloads by the consuming process. |
| |
Keywords: | |
本文献已被 ScienceDirect 等数据库收录! |
|