首页 | 本学科首页   官方微博 | 高级检索  
     


Hiding message delivery latency using Direct-to-Cache-Transfer techniques in message passing environments
Authors:Farshad Khunjush  Nikitas J. Dimopoulos
Affiliation:1. National Laboratory for Parallel and Distributed Processing, National University of Defense Technology, Changsha, China;2. College of Computer, National University of Defense Technology, Changsha, China;1. Department of Computer Science and Engineering, School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran;2. Department of Statistics and Actuarial Science, David R. Cheriton School of Computer Science, Waterloo University, Waterloo, Canada;1. Liaoning Engineering Laboratory of Data Analytics and Optimization for Smart Industry, State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang 110819, China;2. Liaoning Key Laboratory of Manufacturing System and Logistics, Institute of Industrial and Systems Engineering, Northeastern University, Shenyang 110819, China;3. School of Business and Economics, Loughborough University, Leicestershire LE11 3TU, UK;1. School of Computer Science and Engineering, University of Electronic Science and Technology of China, China;2. School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore;3. Department of Computer Science, City University of Hong Kong, Hong Kong, China
Abstract:Communication overhead is the key obstacle to reaching hardware performance limits. The majority is associated with software overhead, a significant portion of which is attributed to message copying. To reduce this copying overhead, we have devised techniques that do not require to copy a received message in order for it to be bound to its final destination. Rather, a late-binding mechanism, which involves address translation and a dedicated cache, facilitates fast access to received messages by the consuming process/thread.We have introduced two policies namely Direct to Cache Transfer (DTCT) and lazy DTCT that determine whether a message after it is bound needs to be transferred into the data cache. We have studied the proposed methods in simulation and have shown their effectiveness in reducing access times to message payloads by the consuming process.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号