SlideShare a Scribd company logo
Distributed Shared Memory
Basic Concepts Of DSM:
 A DSM system provides a logical abstraction
of shared memory which is built using a set
of interconnected nodes having physically
distributed memories.
Types of DSMs
 Hardware level DSM
 Software level DSM
 Hybrid level DSM
Advantages of DSM
 Simple abstraction
 Improved portability of distributed
application programs
 Provides better performance in some
applications
 Large memory space at no extra cost
 Better than message passing systems
Hardware architectures
 On chip memory
 Bus based multiprocessor
 Ring based multiprocessor
 Switched multiprocessor
On chip memory
In this CPU portion of the chip has a address and data lines that directly
connect to the memory portion.
Such chips are used in cars appliances and even toys
Bus based multiprocessor
All CPUs connected to one bus (backplane)
Memory and peripherals are accessed via shared bus. System looks the
same from any processor.
Ring DSM architecture
 Shred memory :
 Private areas
 Shared areas
(Ring) Memnet: Node memory
Switched multiprocessor:
 Multiple clusters interconnected by a bus offer better
scalability
 Example : Dash system
NUMA Multiprocessor
 Non-uniform memory access (NUMA) is a
computer memory design used multiprocessing,
where the memory access time depends on the
memory location relative to the processor.
 Under NUMA, a processor can access its own
local memory faster than non-local memory.
 The benefits of NUMA are limited to particular
workloads, notably on servers where the data is
often associated strongly with certain tasks or
users.
UMA Multiprocessor
 Uniform memory access (UMA) is a shared memory
architecture used in parallel computers. All theprocessors
in the UMA model share the physical memoryuniformly.
 In a UMA architecture, access time to a memory location
is independent of which processor makes the request or
which memory chip contains the transferred data.
 Uniform memory access computer architectures are often
contrasted with non-uniform memory access (NUMA)
architectures.
 In the UMA architecture, each processor may use a
private cache. Peripherals are also shared in some
fashion.
 The UMA model is suitable for general purpose and time
sharing applications by multiple users. It can be used to
speed up the execution of a single large program in time-
critical applications.
Distributed Shared Memory
DSM design issues
 Granularity of sharing
 Structure of data
 Consistency models
 Coherence protocols
Granularity
 False sharing
 Thrashing
Thrashing:
 False sharing
 Techniques to reduce
thrashing:
 Application controlled lock
 Pin the block to a node for
specific time
 Customize algorithm to
shared data usage pattern
DSM structure
 Organization of data items in the shared
memory
Consistency models
 Refers to how recent the shared memory updates
are visible to all the other processes running on
different machines
Strict consistency
 Strongest form of consistency.
 All write operations are visible to all processes.
Sequential consistency
 All processors in the system observe the same
ordering of reads and writes which are issued in
sequence by the individual processors
Causal consistency
 Weakening of sequential consistency for
better concurrency
 Causally related operation is the one which
has influenced the other operation
PRAM consistency
 Pipelined Random Access Memory consistency
 Write operations performed by different processes may
be seen by different processes in different orders
 All write operations of a single process are pipelined
 Simple, easy to implement and has good performance.
Processor consistency
 Adheres to the PRAM consistency
 Constraint on memory coherence
 Order in which the memory operations
are seen by two processors need not be
identical, but the order of writes issued
by each processor must be preserved
Weak consistency
 Use a special variable called the
synchronization variable.
 Very difficult to show and keep track of the changes at
time to time.
Properties of the weak
consistency model:
 Access to synchronization variables is
sequentially consistent.
 Only when all previous writes are
completed everywhere, access to
synchronizations variable is allowed.
 Until all previous accesses to
synchronization variables are performed,
no read write data access operations will
be allowed.
Entry consistency
• Use acquire and release at the start and
end of each critical section, respectively.
• Each ordinary shared variable is
associated with some synchronization
variable such as a lock or barrier.
• Entry consistency (EC) is similar to LRC
but more relaxed; shared data is explicitly
associated with synchronization primitives
and is made consistent when such an
operation is performed
Scope consistency
 A scope is a limited view of memory with
respect to which memory references are
performed
Coherence protocols
 Specifies how the rules set by the
memory consistency model are to be
implemented
Coherence algorithms
 Maintain consistency among replicas
Thank you <./.>
Ad

More Related Content

What's hot (20)

Distributed shred memory architecture
Distributed shred memory architectureDistributed shred memory architecture
Distributed shred memory architecture
Maulik Togadiya
 
Data Mining: Association Rules Basics
Data Mining: Association Rules BasicsData Mining: Association Rules Basics
Data Mining: Association Rules Basics
Benazir Income Support Program (BISP)
 
Distributed System ppt
Distributed System pptDistributed System ppt
Distributed System ppt
OECLIB Odisha Electronics Control Library
 
Distributed Mutual Exclusion and Distributed Deadlock Detection
Distributed Mutual Exclusion and Distributed Deadlock DetectionDistributed Mutual Exclusion and Distributed Deadlock Detection
Distributed Mutual Exclusion and Distributed Deadlock Detection
SHIKHA GAUTAM
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems
Dr Sandeep Kumar Poonia
 
Distributed file system
Distributed file systemDistributed file system
Distributed file system
Anamika Singh
 
Transactions and Concurrency Control
Transactions and Concurrency ControlTransactions and Concurrency Control
Transactions and Concurrency Control
Dilum Bandara
 
6.distributed shared memory
6.distributed shared memory6.distributed shared memory
6.distributed shared memory
Gd Goenka University
 
Parallel Database
Parallel DatabaseParallel Database
Parallel Database
VESIT/University of Mumbai
 
Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.
Meghaj Mallick
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
Sunita Sahu
 
Database fragmentation
Database fragmentationDatabase fragmentation
Database fragmentation
Punjab College Of Technical Education
 
Deadlock
DeadlockDeadlock
Deadlock
Rajandeep Gill
 
Process synchronization
Process synchronizationProcess synchronization
Process synchronization
Syed Hassan Ali
 
Parallel processing
Parallel processingParallel processing
Parallel processing
Praveen Kumar
 
Parallel computing persentation
Parallel computing persentationParallel computing persentation
Parallel computing persentation
VIKAS SINGH BHADOURIA
 
The CAP Theorem
The CAP Theorem The CAP Theorem
The CAP Theorem
Aleksandar Bradic
 
DeadLock in Operating-Systems
DeadLock in Operating-SystemsDeadLock in Operating-Systems
DeadLock in Operating-Systems
Venkata Sreeram
 
Distributed DBMS - Unit 5 - Semantic Data Control
Distributed DBMS - Unit 5 - Semantic Data ControlDistributed DBMS - Unit 5 - Semantic Data Control
Distributed DBMS - Unit 5 - Semantic Data Control
Gyanmanjari Institute Of Technology
 
Query processing in Distributed Database System
Query processing in Distributed Database SystemQuery processing in Distributed Database System
Query processing in Distributed Database System
Meghaj Mallick
 
Distributed shred memory architecture
Distributed shred memory architectureDistributed shred memory architecture
Distributed shred memory architecture
Maulik Togadiya
 
Distributed Mutual Exclusion and Distributed Deadlock Detection
Distributed Mutual Exclusion and Distributed Deadlock DetectionDistributed Mutual Exclusion and Distributed Deadlock Detection
Distributed Mutual Exclusion and Distributed Deadlock Detection
SHIKHA GAUTAM
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems
Dr Sandeep Kumar Poonia
 
Distributed file system
Distributed file systemDistributed file system
Distributed file system
Anamika Singh
 
Transactions and Concurrency Control
Transactions and Concurrency ControlTransactions and Concurrency Control
Transactions and Concurrency Control
Dilum Bandara
 
Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.
Meghaj Mallick
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
Sunita Sahu
 
DeadLock in Operating-Systems
DeadLock in Operating-SystemsDeadLock in Operating-Systems
DeadLock in Operating-Systems
Venkata Sreeram
 
Query processing in Distributed Database System
Query processing in Distributed Database SystemQuery processing in Distributed Database System
Query processing in Distributed Database System
Meghaj Mallick
 

Similar to Distributed Shared Memory (20)

Lecture 6
Lecture  6Lecture  6
Lecture 6
Mr SMAK
 
Lecture 6
Lecture  6Lecture  6
Lecture 6
Mr SMAK
 
Lecture 6
Lecture  6Lecture  6
Lecture 6
Mr SMAK
 
Pram model
Pram modelPram model
Pram model
MANASYJAYASURYA
 
Symmetric multiprocessing and Microkernel
Symmetric multiprocessing and MicrokernelSymmetric multiprocessing and Microkernel
Symmetric multiprocessing and Microkernel
Manoraj Pannerselum
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
Er. Nawaraj Bhandari
 
Parallel processing Concepts
Parallel processing ConceptsParallel processing Concepts
Parallel processing Concepts
Army Public School and College -Faisal
 
Introduction to symmetric multiprocessor
Introduction to symmetric multiprocessorIntroduction to symmetric multiprocessor
Introduction to symmetric multiprocessor
myjuni04
 
Distributed Shared Memory Systems
Distributed Shared Memory SystemsDistributed Shared Memory Systems
Distributed Shared Memory Systems
Arush Nagpal
 
Parallel Processing (Part 2)
Parallel Processing (Part 2)Parallel Processing (Part 2)
Parallel Processing (Part 2)
Ajeng Savitri
 
message passing vs shared memory
message passing vs shared memorymessage passing vs shared memory
message passing vs shared memory
Hamza Zahid
 
Shared memory Parallelism (NOTES)
Shared memory Parallelism (NOTES)Shared memory Parallelism (NOTES)
Shared memory Parallelism (NOTES)
Subhajit Sahu
 
22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
Kathirvel Ayyaswamy
 
Non-Uniform Memory Access ( NUMA)
Non-Uniform Memory Access ( NUMA)Non-Uniform Memory Access ( NUMA)
Non-Uniform Memory Access ( NUMA)
Nakul Manchanda
 
Parallel computing
Parallel computingParallel computing
Parallel computing
Vinay Gupta
 
Distributed shared memory ch 5
Distributed shared memory ch 5Distributed shared memory ch 5
Distributed shared memory ch 5
Alagappa Government Arts College, Karaikudi
 
Multiprocessor Scheduling
Multiprocessor SchedulingMultiprocessor Scheduling
Multiprocessor Scheduling
Khadija Saleem
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
Ashish Kumar
 
Distributed Shared Memory Systems
Distributed Shared Memory SystemsDistributed Shared Memory Systems
Distributed Shared Memory Systems
Ankit Gupta
 
Overview of Distributed Systems
Overview of Distributed SystemsOverview of Distributed Systems
Overview of Distributed Systems
vampugani
 
Lecture 6
Lecture  6Lecture  6
Lecture 6
Mr SMAK
 
Lecture 6
Lecture  6Lecture  6
Lecture 6
Mr SMAK
 
Lecture 6
Lecture  6Lecture  6
Lecture 6
Mr SMAK
 
Symmetric multiprocessing and Microkernel
Symmetric multiprocessing and MicrokernelSymmetric multiprocessing and Microkernel
Symmetric multiprocessing and Microkernel
Manoraj Pannerselum
 
Introduction to symmetric multiprocessor
Introduction to symmetric multiprocessorIntroduction to symmetric multiprocessor
Introduction to symmetric multiprocessor
myjuni04
 
Distributed Shared Memory Systems
Distributed Shared Memory SystemsDistributed Shared Memory Systems
Distributed Shared Memory Systems
Arush Nagpal
 
Parallel Processing (Part 2)
Parallel Processing (Part 2)Parallel Processing (Part 2)
Parallel Processing (Part 2)
Ajeng Savitri
 
message passing vs shared memory
message passing vs shared memorymessage passing vs shared memory
message passing vs shared memory
Hamza Zahid
 
Shared memory Parallelism (NOTES)
Shared memory Parallelism (NOTES)Shared memory Parallelism (NOTES)
Shared memory Parallelism (NOTES)
Subhajit Sahu
 
Non-Uniform Memory Access ( NUMA)
Non-Uniform Memory Access ( NUMA)Non-Uniform Memory Access ( NUMA)
Non-Uniform Memory Access ( NUMA)
Nakul Manchanda
 
Parallel computing
Parallel computingParallel computing
Parallel computing
Vinay Gupta
 
Multiprocessor Scheduling
Multiprocessor SchedulingMultiprocessor Scheduling
Multiprocessor Scheduling
Khadija Saleem
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
Ashish Kumar
 
Distributed Shared Memory Systems
Distributed Shared Memory SystemsDistributed Shared Memory Systems
Distributed Shared Memory Systems
Ankit Gupta
 
Overview of Distributed Systems
Overview of Distributed SystemsOverview of Distributed Systems
Overview of Distributed Systems
vampugani
 
Ad

Recently uploaded (20)

Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)
samueljackson3773
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
π0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalizationπ0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalization
NABLAS株式会社
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdfMAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
ssuser562df4
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)
samueljackson3773
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
π0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalizationπ0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalization
NABLAS株式会社
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdfMAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
ssuser562df4
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
Ad

Distributed Shared Memory

  • 2. Basic Concepts Of DSM:  A DSM system provides a logical abstraction of shared memory which is built using a set of interconnected nodes having physically distributed memories.
  • 3. Types of DSMs  Hardware level DSM  Software level DSM  Hybrid level DSM
  • 4. Advantages of DSM  Simple abstraction  Improved portability of distributed application programs  Provides better performance in some applications  Large memory space at no extra cost  Better than message passing systems
  • 5. Hardware architectures  On chip memory  Bus based multiprocessor  Ring based multiprocessor  Switched multiprocessor
  • 6. On chip memory In this CPU portion of the chip has a address and data lines that directly connect to the memory portion. Such chips are used in cars appliances and even toys
  • 7. Bus based multiprocessor All CPUs connected to one bus (backplane) Memory and peripherals are accessed via shared bus. System looks the same from any processor.
  • 8. Ring DSM architecture  Shred memory :  Private areas  Shared areas
  • 10. Switched multiprocessor:  Multiple clusters interconnected by a bus offer better scalability  Example : Dash system
  • 11. NUMA Multiprocessor  Non-uniform memory access (NUMA) is a computer memory design used multiprocessing, where the memory access time depends on the memory location relative to the processor.  Under NUMA, a processor can access its own local memory faster than non-local memory.  The benefits of NUMA are limited to particular workloads, notably on servers where the data is often associated strongly with certain tasks or users.
  • 12. UMA Multiprocessor  Uniform memory access (UMA) is a shared memory architecture used in parallel computers. All theprocessors in the UMA model share the physical memoryuniformly.  In a UMA architecture, access time to a memory location is independent of which processor makes the request or which memory chip contains the transferred data.  Uniform memory access computer architectures are often contrasted with non-uniform memory access (NUMA) architectures.  In the UMA architecture, each processor may use a private cache. Peripherals are also shared in some fashion.  The UMA model is suitable for general purpose and time sharing applications by multiple users. It can be used to speed up the execution of a single large program in time- critical applications.
  • 14. DSM design issues  Granularity of sharing  Structure of data  Consistency models  Coherence protocols
  • 16. Thrashing:  False sharing  Techniques to reduce thrashing:  Application controlled lock  Pin the block to a node for specific time  Customize algorithm to shared data usage pattern
  • 17. DSM structure  Organization of data items in the shared memory
  • 18. Consistency models  Refers to how recent the shared memory updates are visible to all the other processes running on different machines
  • 19. Strict consistency  Strongest form of consistency.  All write operations are visible to all processes.
  • 20. Sequential consistency  All processors in the system observe the same ordering of reads and writes which are issued in sequence by the individual processors
  • 21. Causal consistency  Weakening of sequential consistency for better concurrency  Causally related operation is the one which has influenced the other operation
  • 22. PRAM consistency  Pipelined Random Access Memory consistency  Write operations performed by different processes may be seen by different processes in different orders  All write operations of a single process are pipelined  Simple, easy to implement and has good performance.
  • 23. Processor consistency  Adheres to the PRAM consistency  Constraint on memory coherence  Order in which the memory operations are seen by two processors need not be identical, but the order of writes issued by each processor must be preserved
  • 24. Weak consistency  Use a special variable called the synchronization variable.  Very difficult to show and keep track of the changes at time to time.
  • 25. Properties of the weak consistency model:  Access to synchronization variables is sequentially consistent.  Only when all previous writes are completed everywhere, access to synchronizations variable is allowed.  Until all previous accesses to synchronization variables are performed, no read write data access operations will be allowed.
  • 26. Entry consistency • Use acquire and release at the start and end of each critical section, respectively. • Each ordinary shared variable is associated with some synchronization variable such as a lock or barrier. • Entry consistency (EC) is similar to LRC but more relaxed; shared data is explicitly associated with synchronization primitives and is made consistent when such an operation is performed
  • 27. Scope consistency  A scope is a limited view of memory with respect to which memory references are performed
  • 28. Coherence protocols  Specifies how the rules set by the memory consistency model are to be implemented
  • 29. Coherence algorithms  Maintain consistency among replicas