SlideShare a Scribd company logo
Page 1Page 1
Distributed System
Page 2
TOPICS TO BE COVERED:
• DSM system
• Shared memory
• On chip memory
• Bus based multiprocessor
• Working through cache
• Write through cache
• Write once protocol
• Ring based multiprocessor
• Protocol used
• Similarities and differences bw ring based and bus based
Page 3
What is a DSM system?
• A distributed-memory system (often called a multicomputer) consist
of collection of workstations connected by a LAN share a single
paged,virtual address space
• Each page is present on exactly one maachine
• An attempt to reference a page on different machine causes a
hardware page fault which traps to operating system
• The OS den sends a message to the remote machinewhich finds the
needed page and sends it back to the req. processor
Page 4
What is shared memory?
• Shared memory is the memory that is simultaneously accessed by
more than one CPU OR PROCCESSOR
• There are local caches for each processor
• It is cheaper to cache than main memory
• It is simple to program and hard to scale
Page 5
Various architectures to be discussed:
• On chip memory
• Bus based multiprocessors
• Ring based multiprocessors
Page 6
On Chip Memory
• In this CPU portion of the chip has a address and data lines that
directly connect to the memory portion
• Such chips are used in cars,appliances and even toys
• In hypothetical shared memory multiprocessor we have multiple
CPU’S directly sharing the same memory but it would be complicated
n expensive
Page 7
• On-Chip Memory
CPU Memory CPU1 Memory
CPU4
CPU2
CPU3
Chip package
Address and data lines
Connecting the CPU to the
memory
extension
A single-chip computer
A hypothetical shared-memory
Multiprocessor.
Page 8
What is a bus???
• BUS is a collection of parallel wires,some holding the address the
CPU wants to read or write,some for sending or receiving data and
the rest for controlling the transfers.
• In most systems buses are external and are used to connect
CPU’S,MEMORIES AND I/O CONTROLLERS
Page 9
BusBus
CPU ACPU A CPU BCPU B
memorymemory
Device
I/O
Device
I/O
BUS BASED MULTIPROCESSORS
SMP: Symmetric Multi-Processing
All CPUs connected to one bus (backplane)
Memory and peripherals are accessed via shared bus.
System looks the same from any processor.
Page 10
Bus-based multiprocessors
Dealing with bus overload
- add local memory
CPU does I/O to cache memory
- access main memory on cache miss
BusBus
memorymemory
Device
I/O
Device
I/O
CPU ACPU A
cachecache
CPU BCPU B
cachecache
Page 11
Working with a cache
CPU A reads location 12345 from memory
12345:712345:7
Device
I/O
Device
I/O
CPU ACPU A
12345: 712345: 7
CPU BCPU B
Bus
Page 12
Working with a cache
CPU B reads location 12345 from memory
12345:712345:7
Device
I/O
Device
I/O
CPU ACPU A
12345: 312345: 3
CPU BCPU B
12345: 712345: 7
Gets old value
Memory not coherent!
Bus
Page 13
Write-through cache … continued
CPU B reads location 12345 from memory
- loads into cache
12345:312345:3
Device
I/O
Device
I/O
CPU ACPU A
12345: 312345: 3
CPU BCPU B
12345: 312345: 3
Bus
Page 14
Write-through cache
CPU A modifies location 12345
- write-through
12345:3
Device
I/O
Device
I/O
CPU ACPU A
12345: 3
CPU BCPU B
12345: 312345: 3
Cache on CPU B not updated
Memory not coherent!
12345:012345:0
12345: 012345: 0
Bus
Page 15
Write once protocol
• This protocol manages cache blocks, each of which can be in
one of the following three states:
INVALID: This cache block does not contain valid data.
CLEAN: Memory is up-to-date; the block may be in other caches.
DIRTY: Memory is incorrect; no other cache holds the block.
• The basic idea of the protocol is that a word that is being
read by multiple CPUs is allowed to be present in all their
caches. A word that is being heavily written by only one
machine is kept in its cache and not written back to memory
on every write to reduce bus traffic.
Page 16
Write through protocol
Event Action taken by a cache
in response to its own
CPU’s operation
Action taken by a cache in
response to a remote CPU’s
operation
Read miss Fetch data from memory
and store in cache
no action
Read hit Fetch data from local
cache
no action
Write miss Update data in memory
and store in cache
no action
Write hit Update memory and
cache
invalidate cache entry
Page 17
For example
A B W1C
W1
CLEAN
Memory is correct
(a) Initial state – word W1 containing
value W1 is in memory and is also
cached by B.
CPU
A B W1C
W1 W1
CLEANCLEAN
Memory is correct
(b) A reades word W and gets W1. B doe
not respond to the read, but the memory
does.
Page 18
A B W1C
W2 W1
A B W1C
W3 W1
DIRTY INVALID
DIRTY INVALID
Memory is correct
(c)A write a value W2, B snoops on the bu
sees the write, and invalidates its entry.
A’s copy is marked DIRTY.
Not update memory
Memory is correct
(d) A write W again. This and subsequent
writes by A are done locally, without any
bus traffic.
Page 19
A B W1C
W3 W1
INVALID INVALID DIRTY
W3
(e) C reads or writes W. A sees th
request by snooping on the bus,
provides the value, and invalidates
its own entry. C now has the only
valid copy.
Not update memory
Page 20
Ring-Based Multiprocessors: Memnet
CPU CPU
CPU CPU
CPU CPU
CPU
Private memory
MMU Cache Home
memory
Memory management unit
Location
Interrupt
Home
Exclusive
Valid
0
1
2
3
The block table
Page 21
Protocol
• Read
• When the CPU wants to read a word from shared memory, the memory
address to be read is passed to the Memnet device, which checks the
block table to see if the block is present. If so, the request is satisfied. If
not, the Memnet device waits until it captures the circulating token,
puts a request onto the ring. As the packet passes around the ring, each
Memnet device along the way checks to see if it has the block needed. If
so, it puts the block in the dummy field and modifies the packet header
to inhibit subsequent machines from doing so.
• If the requesting machine has no free space in its cache to hold the
incoming block, to make space, it picks a cached block at random and
sends it home. Blocks whose Home bit are set are never chosen because
they are already home.
Page 22
• Write
• If the block containing the word to be written is present and is the only
copy in the system (i.e., the Exclusive bit is set), the word is just written
locally.
• If the needed block is present but it is not the only copy, an invalidation
packet is first sent around the ring to force all other machines to discard
their copies of the block about to be written. When the invalidation
packet arrives back at the sender, the Exclusive bit is set for that block
and the write proceeds locally.
• If the block is not present, a packet is sent out that combines a read
request and an invalidation request. The first machine that has the block
copies it into the packet and discards its own copy. All subsequent
machines just discard the block from their caches. When the packet
comes back to the sender, it is stored there and written.
Page 23
Similarities bw bus based and ring based
multiprocessors
• In both cases read operations always return the values most recently
written
• In both designs a block may be absent from a cache,present in
multiple caches for reading,or present in a single cache for writing
Page 24
DIFFERENCES BW TWO
MULTIPROCESSORS
BUS BASED MULTIPROCCESORS
• They are tightly coupled with
the CPU’S normally in a single
rack
• It has seprate global memory
RING BASED MULTIPROCCESORS
• Machines here can be much
more loosely coupled n this
loose coupling can affect their
performance
• It has no seprate global memory
Ad

More Related Content

What's hot (20)

Multiprocessor architecture
Multiprocessor architectureMultiprocessor architecture
Multiprocessor architecture
Arpan Baishya
 
Hardware and Software parallelism
Hardware and Software parallelismHardware and Software parallelism
Hardware and Software parallelism
prashantdahake
 
Underlying principles of parallel and distributed computing
Underlying principles of parallel and distributed computingUnderlying principles of parallel and distributed computing
Underlying principles of parallel and distributed computing
GOVERNMENT COLLEGE OF ENGINEERING,TIRUNELVELI
 
6.distributed shared memory
6.distributed shared memory6.distributed shared memory
6.distributed shared memory
Gd Goenka University
 
program flow mechanisms, advanced computer architecture
program flow mechanisms, advanced computer architectureprogram flow mechanisms, advanced computer architecture
program flow mechanisms, advanced computer architecture
Pankaj Kumar Jain
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Divya Tiwari
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
vampugani
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
Sunita Sahu
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems
Dr Sandeep Kumar Poonia
 
SYNCHRONIZATION IN MULTIPROCESSING
SYNCHRONIZATION IN MULTIPROCESSINGSYNCHRONIZATION IN MULTIPROCESSING
SYNCHRONIZATION IN MULTIPROCESSING
Aparna Bhadran
 
Multiprocessor Architecture (Advanced computer architecture)
Multiprocessor Architecture  (Advanced computer architecture)Multiprocessor Architecture  (Advanced computer architecture)
Multiprocessor Architecture (Advanced computer architecture)
vani261
 
Principal Sources of Optimization in compiler design
Principal Sources of Optimization in compiler design Principal Sources of Optimization in compiler design
Principal Sources of Optimization in compiler design
LogsAk
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
Kathirvel Ayyaswamy
 
Sequential consistency model
Sequential consistency modelSequential consistency model
Sequential consistency model
Bharathi Lakshmi Pon
 
Run time storage
Run time storageRun time storage
Run time storage
Rasineni Madhan Mohan Naidu
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems
SHATHAN
 
Replication in Distributed Systems
Replication in Distributed SystemsReplication in Distributed Systems
Replication in Distributed Systems
Kavya Barnadhya Hazarika
 
system interconnect architectures in ACA
system interconnect architectures in ACAsystem interconnect architectures in ACA
system interconnect architectures in ACA
Pankaj Kumar Jain
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
management of distributed transactions
management of distributed transactionsmanagement of distributed transactions
management of distributed transactions
Nilu Desai
 
Multiprocessor architecture
Multiprocessor architectureMultiprocessor architecture
Multiprocessor architecture
Arpan Baishya
 
Hardware and Software parallelism
Hardware and Software parallelismHardware and Software parallelism
Hardware and Software parallelism
prashantdahake
 
program flow mechanisms, advanced computer architecture
program flow mechanisms, advanced computer architectureprogram flow mechanisms, advanced computer architecture
program flow mechanisms, advanced computer architecture
Pankaj Kumar Jain
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Divya Tiwari
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
vampugani
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
Sunita Sahu
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems
Dr Sandeep Kumar Poonia
 
SYNCHRONIZATION IN MULTIPROCESSING
SYNCHRONIZATION IN MULTIPROCESSINGSYNCHRONIZATION IN MULTIPROCESSING
SYNCHRONIZATION IN MULTIPROCESSING
Aparna Bhadran
 
Multiprocessor Architecture (Advanced computer architecture)
Multiprocessor Architecture  (Advanced computer architecture)Multiprocessor Architecture  (Advanced computer architecture)
Multiprocessor Architecture (Advanced computer architecture)
vani261
 
Principal Sources of Optimization in compiler design
Principal Sources of Optimization in compiler design Principal Sources of Optimization in compiler design
Principal Sources of Optimization in compiler design
LogsAk
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
Kathirvel Ayyaswamy
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems
SHATHAN
 
system interconnect architectures in ACA
system interconnect architectures in ACAsystem interconnect architectures in ACA
system interconnect architectures in ACA
Pankaj Kumar Jain
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
management of distributed transactions
management of distributed transactionsmanagement of distributed transactions
management of distributed transactions
Nilu Desai
 

Viewers also liked (20)

Distributed computing
Distributed computingDistributed computing
Distributed computing
Keshab Nath
 
Percona Cluster with Master_Slave for Disaster Recovery
Percona Cluster with Master_Slave for Disaster RecoveryPercona Cluster with Master_Slave for Disaster Recovery
Percona Cluster with Master_Slave for Disaster Recovery
Ram Gautam
 
Master and slave relationship in Robinson Crusoe
Master and slave relationship in Robinson CrusoeMaster and slave relationship in Robinson Crusoe
Master and slave relationship in Robinson Crusoe
Dharaba Gohil
 
Aries en el amor por carlos andres campuzano l
Aries en el amor  por carlos andres campuzano lAries en el amor  por carlos andres campuzano l
Aries en el amor por carlos andres campuzano l
carloscampuzanoloaiza
 
Top 17 Data Recovery System
Top 17 Data Recovery SystemTop 17 Data Recovery System
Top 17 Data Recovery System
Cheap Data Recovery
 
Wk6a
Wk6aWk6a
Wk6a
danielm
 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed Computing
Sayed Chhattan Shah
 
Industrial communication 2016 English
Industrial communication 2016 EnglishIndustrial communication 2016 English
Industrial communication 2016 English
ifm electronic gmbh
 
Aries
AriesAries
Aries
قصي نسور
 
Soft computing01
Soft computing01Soft computing01
Soft computing01
university of sargodha
 
ARIES Recovery Algorithms
ARIES Recovery AlgorithmsARIES Recovery Algorithms
ARIES Recovery Algorithms
Pulasthi Lankeshwara
 
Chapter19
Chapter19Chapter19
Chapter19
gourab87
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system model
Harshad Umredkar
 
Dsm (Distributed computing)
Dsm (Distributed computing)Dsm (Distributed computing)
Dsm (Distributed computing)
Sri Prasanna
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
Alokeparna Choudhury
 
Distributed Computing
Distributed ComputingDistributed Computing
Distributed Computing
Sudarsun Santhiappan
 
Chap 4
Chap 4Chap 4
Chap 4
suks_87
 
Industrial Networking - Profibus
Industrial Networking - ProfibusIndustrial Networking - Profibus
Industrial Networking - Profibus
Yogesh Kumar
 
Distributed System
Distributed System Distributed System
Distributed System
Nitesh Saitwal
 
soft-computing
 soft-computing soft-computing
soft-computing
student
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
Keshab Nath
 
Percona Cluster with Master_Slave for Disaster Recovery
Percona Cluster with Master_Slave for Disaster RecoveryPercona Cluster with Master_Slave for Disaster Recovery
Percona Cluster with Master_Slave for Disaster Recovery
Ram Gautam
 
Master and slave relationship in Robinson Crusoe
Master and slave relationship in Robinson CrusoeMaster and slave relationship in Robinson Crusoe
Master and slave relationship in Robinson Crusoe
Dharaba Gohil
 
Aries en el amor por carlos andres campuzano l
Aries en el amor  por carlos andres campuzano lAries en el amor  por carlos andres campuzano l
Aries en el amor por carlos andres campuzano l
carloscampuzanoloaiza
 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed Computing
Sayed Chhattan Shah
 
Industrial communication 2016 English
Industrial communication 2016 EnglishIndustrial communication 2016 English
Industrial communication 2016 English
ifm electronic gmbh
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system model
Harshad Umredkar
 
Dsm (Distributed computing)
Dsm (Distributed computing)Dsm (Distributed computing)
Dsm (Distributed computing)
Sri Prasanna
 
Industrial Networking - Profibus
Industrial Networking - ProfibusIndustrial Networking - Profibus
Industrial Networking - Profibus
Yogesh Kumar
 
soft-computing
 soft-computing soft-computing
soft-computing
student
 
Ad

Similar to Distributed system (20)

Dos final ppt
Dos final pptDos final ppt
Dos final ppt
sanjana1988
 
Dos final ppt
Dos final pptDos final ppt
Dos final ppt
Sanjana Bakshi
 
Distributed shared memory in distributed systems.ppt
Distributed shared memory in distributed systems.pptDistributed shared memory in distributed systems.ppt
Distributed shared memory in distributed systems.ppt
lasmonkapota201
 
Bus Based Multiprocessors v2
Bus Based Multiprocessors v2Bus Based Multiprocessors v2
Bus Based Multiprocessors v2
Mustafa Yumurtacı
 
Mesi
MesiMesi
Mesi
Siddharth Chandel
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
 
Snooping protocols 3
Snooping protocols 3Snooping protocols 3
Snooping protocols 3
Yasir Khan
 
ADVANCED COMPUTER ARCHITECTURE AND PARALLEL PROCESSING
ADVANCED COMPUTER ARCHITECTUREAND PARALLEL PROCESSINGADVANCED COMPUTER ARCHITECTUREAND PARALLEL PROCESSING
ADVANCED COMPUTER ARCHITECTURE AND PARALLEL PROCESSING
Zena Abo-Altaheen
 
Week5
Week5Week5
Week5
student
 
Dosass2
Dosass2Dosass2
Dosass2
ShivaliKundra
 
chapter-6-multiprocessors-and-thread-level (1).ppt
chapter-6-multiprocessors-and-thread-level (1).pptchapter-6-multiprocessors-and-thread-level (1).ppt
chapter-6-multiprocessors-and-thread-level (1).ppt
harishM874937
 
Multiprocessor
MultiprocessorMultiprocessor
Multiprocessor
narendra kumar
 
BBA CHAPTER COMPUTER HARDWARE 5 .pptx
BBA CHAPTER COMPUTER HARDWARE    5 .pptxBBA CHAPTER COMPUTER HARDWARE    5 .pptx
BBA CHAPTER COMPUTER HARDWARE 5 .pptx
RoshanKC10
 
module4.ppt
module4.pptmodule4.ppt
module4.ppt
Subhasis Dash
 
12429908.ppt
12429908.ppt12429908.ppt
12429908.ppt
ssuser4ca1eb
 
CS304PC:Computer Organization and Architecture Session 29 Memory organization...
CS304PC:Computer Organization and Architecture Session 29 Memory organization...CS304PC:Computer Organization and Architecture Session 29 Memory organization...
CS304PC:Computer Organization and Architecture Session 29 Memory organization...
Guru Nanak Technical Institutions
 
Lecture2
Lecture2Lecture2
Lecture2
tt_aljobory
 
Cache coherence
Cache coherenceCache coherence
Cache coherence
Priyam Pandey
 
Introduction to symmetric multiprocessor
Introduction to symmetric multiprocessorIntroduction to symmetric multiprocessor
Introduction to symmetric multiprocessor
myjuni04
 
COA (Unit_4.pptx)
COA (Unit_4.pptx)COA (Unit_4.pptx)
COA (Unit_4.pptx)
Thapar Institute
 
Distributed shared memory in distributed systems.ppt
Distributed shared memory in distributed systems.pptDistributed shared memory in distributed systems.ppt
Distributed shared memory in distributed systems.ppt
lasmonkapota201
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
 
Snooping protocols 3
Snooping protocols 3Snooping protocols 3
Snooping protocols 3
Yasir Khan
 
ADVANCED COMPUTER ARCHITECTURE AND PARALLEL PROCESSING
ADVANCED COMPUTER ARCHITECTUREAND PARALLEL PROCESSINGADVANCED COMPUTER ARCHITECTUREAND PARALLEL PROCESSING
ADVANCED COMPUTER ARCHITECTURE AND PARALLEL PROCESSING
Zena Abo-Altaheen
 
chapter-6-multiprocessors-and-thread-level (1).ppt
chapter-6-multiprocessors-and-thread-level (1).pptchapter-6-multiprocessors-and-thread-level (1).ppt
chapter-6-multiprocessors-and-thread-level (1).ppt
harishM874937
 
BBA CHAPTER COMPUTER HARDWARE 5 .pptx
BBA CHAPTER COMPUTER HARDWARE    5 .pptxBBA CHAPTER COMPUTER HARDWARE    5 .pptx
BBA CHAPTER COMPUTER HARDWARE 5 .pptx
RoshanKC10
 
CS304PC:Computer Organization and Architecture Session 29 Memory organization...
CS304PC:Computer Organization and Architecture Session 29 Memory organization...CS304PC:Computer Organization and Architecture Session 29 Memory organization...
CS304PC:Computer Organization and Architecture Session 29 Memory organization...
Guru Nanak Technical Institutions
 
Introduction to symmetric multiprocessor
Introduction to symmetric multiprocessorIntroduction to symmetric multiprocessor
Introduction to symmetric multiprocessor
myjuni04
 
Ad

More from Syed Zaid Irshad (20)

Data Structures & Algorithms - Spring 2025.pdf
Data Structures & Algorithms - Spring 2025.pdfData Structures & Algorithms - Spring 2025.pdf
Data Structures & Algorithms - Spring 2025.pdf
Syed Zaid Irshad
 
Operating System.pdf
Operating System.pdfOperating System.pdf
Operating System.pdf
Syed Zaid Irshad
 
DBMS_Lab_Manual_&_Solution
DBMS_Lab_Manual_&_SolutionDBMS_Lab_Manual_&_Solution
DBMS_Lab_Manual_&_Solution
Syed Zaid Irshad
 
Data Structure and Algorithms.pptx
Data Structure and Algorithms.pptxData Structure and Algorithms.pptx
Data Structure and Algorithms.pptx
Syed Zaid Irshad
 
Design and Analysis of Algorithms.pptx
Design and Analysis of Algorithms.pptxDesign and Analysis of Algorithms.pptx
Design and Analysis of Algorithms.pptx
Syed Zaid Irshad
 
Professional Issues in Computing
Professional Issues in ComputingProfessional Issues in Computing
Professional Issues in Computing
Syed Zaid Irshad
 
Reduce course notes class xi
Reduce course notes class xiReduce course notes class xi
Reduce course notes class xi
Syed Zaid Irshad
 
Reduce course notes class xii
Reduce course notes class xiiReduce course notes class xii
Reduce course notes class xii
Syed Zaid Irshad
 
Introduction to Database
Introduction to DatabaseIntroduction to Database
Introduction to Database
Syed Zaid Irshad
 
C Language
C LanguageC Language
C Language
Syed Zaid Irshad
 
Flowchart
FlowchartFlowchart
Flowchart
Syed Zaid Irshad
 
Algorithm Pseudo
Algorithm PseudoAlgorithm Pseudo
Algorithm Pseudo
Syed Zaid Irshad
 
Computer Programming
Computer ProgrammingComputer Programming
Computer Programming
Syed Zaid Irshad
 
ICS 2nd Year Book Introduction
ICS 2nd Year Book IntroductionICS 2nd Year Book Introduction
ICS 2nd Year Book Introduction
Syed Zaid Irshad
 
Security, Copyright and the Law
Security, Copyright and the LawSecurity, Copyright and the Law
Security, Copyright and the Law
Syed Zaid Irshad
 
Computer Architecture
Computer ArchitectureComputer Architecture
Computer Architecture
Syed Zaid Irshad
 
Data Communication
Data CommunicationData Communication
Data Communication
Syed Zaid Irshad
 
Information Networks
Information NetworksInformation Networks
Information Networks
Syed Zaid Irshad
 
Basic Concept of Information Technology
Basic Concept of Information TechnologyBasic Concept of Information Technology
Basic Concept of Information Technology
Syed Zaid Irshad
 
Introduction to ICS 1st Year Book
Introduction to ICS 1st Year BookIntroduction to ICS 1st Year Book
Introduction to ICS 1st Year Book
Syed Zaid Irshad
 
Data Structures & Algorithms - Spring 2025.pdf
Data Structures & Algorithms - Spring 2025.pdfData Structures & Algorithms - Spring 2025.pdf
Data Structures & Algorithms - Spring 2025.pdf
Syed Zaid Irshad
 
DBMS_Lab_Manual_&_Solution
DBMS_Lab_Manual_&_SolutionDBMS_Lab_Manual_&_Solution
DBMS_Lab_Manual_&_Solution
Syed Zaid Irshad
 
Data Structure and Algorithms.pptx
Data Structure and Algorithms.pptxData Structure and Algorithms.pptx
Data Structure and Algorithms.pptx
Syed Zaid Irshad
 
Design and Analysis of Algorithms.pptx
Design and Analysis of Algorithms.pptxDesign and Analysis of Algorithms.pptx
Design and Analysis of Algorithms.pptx
Syed Zaid Irshad
 
Professional Issues in Computing
Professional Issues in ComputingProfessional Issues in Computing
Professional Issues in Computing
Syed Zaid Irshad
 
Reduce course notes class xi
Reduce course notes class xiReduce course notes class xi
Reduce course notes class xi
Syed Zaid Irshad
 
Reduce course notes class xii
Reduce course notes class xiiReduce course notes class xii
Reduce course notes class xii
Syed Zaid Irshad
 
ICS 2nd Year Book Introduction
ICS 2nd Year Book IntroductionICS 2nd Year Book Introduction
ICS 2nd Year Book Introduction
Syed Zaid Irshad
 
Security, Copyright and the Law
Security, Copyright and the LawSecurity, Copyright and the Law
Security, Copyright and the Law
Syed Zaid Irshad
 
Basic Concept of Information Technology
Basic Concept of Information TechnologyBasic Concept of Information Technology
Basic Concept of Information Technology
Syed Zaid Irshad
 
Introduction to ICS 1st Year Book
Introduction to ICS 1st Year BookIntroduction to ICS 1st Year Book
Introduction to ICS 1st Year Book
Syed Zaid Irshad
 

Recently uploaded (20)

ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
The Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLabThe Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLab
Journal of Soft Computing in Civil Engineering
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
Reagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptxReagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptx
AlejandroOdio
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Journal of Soft Computing in Civil Engineering
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Journal of Soft Computing in Civil Engineering
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
Reagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptxReagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptx
AlejandroOdio
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 

Distributed system

  • 2. Page 2 TOPICS TO BE COVERED: • DSM system • Shared memory • On chip memory • Bus based multiprocessor • Working through cache • Write through cache • Write once protocol • Ring based multiprocessor • Protocol used • Similarities and differences bw ring based and bus based
  • 3. Page 3 What is a DSM system? • A distributed-memory system (often called a multicomputer) consist of collection of workstations connected by a LAN share a single paged,virtual address space • Each page is present on exactly one maachine • An attempt to reference a page on different machine causes a hardware page fault which traps to operating system • The OS den sends a message to the remote machinewhich finds the needed page and sends it back to the req. processor
  • 4. Page 4 What is shared memory? • Shared memory is the memory that is simultaneously accessed by more than one CPU OR PROCCESSOR • There are local caches for each processor • It is cheaper to cache than main memory • It is simple to program and hard to scale
  • 5. Page 5 Various architectures to be discussed: • On chip memory • Bus based multiprocessors • Ring based multiprocessors
  • 6. Page 6 On Chip Memory • In this CPU portion of the chip has a address and data lines that directly connect to the memory portion • Such chips are used in cars,appliances and even toys • In hypothetical shared memory multiprocessor we have multiple CPU’S directly sharing the same memory but it would be complicated n expensive
  • 7. Page 7 • On-Chip Memory CPU Memory CPU1 Memory CPU4 CPU2 CPU3 Chip package Address and data lines Connecting the CPU to the memory extension A single-chip computer A hypothetical shared-memory Multiprocessor.
  • 8. Page 8 What is a bus??? • BUS is a collection of parallel wires,some holding the address the CPU wants to read or write,some for sending or receiving data and the rest for controlling the transfers. • In most systems buses are external and are used to connect CPU’S,MEMORIES AND I/O CONTROLLERS
  • 9. Page 9 BusBus CPU ACPU A CPU BCPU B memorymemory Device I/O Device I/O BUS BASED MULTIPROCESSORS SMP: Symmetric Multi-Processing All CPUs connected to one bus (backplane) Memory and peripherals are accessed via shared bus. System looks the same from any processor.
  • 10. Page 10 Bus-based multiprocessors Dealing with bus overload - add local memory CPU does I/O to cache memory - access main memory on cache miss BusBus memorymemory Device I/O Device I/O CPU ACPU A cachecache CPU BCPU B cachecache
  • 11. Page 11 Working with a cache CPU A reads location 12345 from memory 12345:712345:7 Device I/O Device I/O CPU ACPU A 12345: 712345: 7 CPU BCPU B Bus
  • 12. Page 12 Working with a cache CPU B reads location 12345 from memory 12345:712345:7 Device I/O Device I/O CPU ACPU A 12345: 312345: 3 CPU BCPU B 12345: 712345: 7 Gets old value Memory not coherent! Bus
  • 13. Page 13 Write-through cache … continued CPU B reads location 12345 from memory - loads into cache 12345:312345:3 Device I/O Device I/O CPU ACPU A 12345: 312345: 3 CPU BCPU B 12345: 312345: 3 Bus
  • 14. Page 14 Write-through cache CPU A modifies location 12345 - write-through 12345:3 Device I/O Device I/O CPU ACPU A 12345: 3 CPU BCPU B 12345: 312345: 3 Cache on CPU B not updated Memory not coherent! 12345:012345:0 12345: 012345: 0 Bus
  • 15. Page 15 Write once protocol • This protocol manages cache blocks, each of which can be in one of the following three states: INVALID: This cache block does not contain valid data. CLEAN: Memory is up-to-date; the block may be in other caches. DIRTY: Memory is incorrect; no other cache holds the block. • The basic idea of the protocol is that a word that is being read by multiple CPUs is allowed to be present in all their caches. A word that is being heavily written by only one machine is kept in its cache and not written back to memory on every write to reduce bus traffic.
  • 16. Page 16 Write through protocol Event Action taken by a cache in response to its own CPU’s operation Action taken by a cache in response to a remote CPU’s operation Read miss Fetch data from memory and store in cache no action Read hit Fetch data from local cache no action Write miss Update data in memory and store in cache no action Write hit Update memory and cache invalidate cache entry
  • 17. Page 17 For example A B W1C W1 CLEAN Memory is correct (a) Initial state – word W1 containing value W1 is in memory and is also cached by B. CPU A B W1C W1 W1 CLEANCLEAN Memory is correct (b) A reades word W and gets W1. B doe not respond to the read, but the memory does.
  • 18. Page 18 A B W1C W2 W1 A B W1C W3 W1 DIRTY INVALID DIRTY INVALID Memory is correct (c)A write a value W2, B snoops on the bu sees the write, and invalidates its entry. A’s copy is marked DIRTY. Not update memory Memory is correct (d) A write W again. This and subsequent writes by A are done locally, without any bus traffic.
  • 19. Page 19 A B W1C W3 W1 INVALID INVALID DIRTY W3 (e) C reads or writes W. A sees th request by snooping on the bus, provides the value, and invalidates its own entry. C now has the only valid copy. Not update memory
  • 20. Page 20 Ring-Based Multiprocessors: Memnet CPU CPU CPU CPU CPU CPU CPU Private memory MMU Cache Home memory Memory management unit Location Interrupt Home Exclusive Valid 0 1 2 3 The block table
  • 21. Page 21 Protocol • Read • When the CPU wants to read a word from shared memory, the memory address to be read is passed to the Memnet device, which checks the block table to see if the block is present. If so, the request is satisfied. If not, the Memnet device waits until it captures the circulating token, puts a request onto the ring. As the packet passes around the ring, each Memnet device along the way checks to see if it has the block needed. If so, it puts the block in the dummy field and modifies the packet header to inhibit subsequent machines from doing so. • If the requesting machine has no free space in its cache to hold the incoming block, to make space, it picks a cached block at random and sends it home. Blocks whose Home bit are set are never chosen because they are already home.
  • 22. Page 22 • Write • If the block containing the word to be written is present and is the only copy in the system (i.e., the Exclusive bit is set), the word is just written locally. • If the needed block is present but it is not the only copy, an invalidation packet is first sent around the ring to force all other machines to discard their copies of the block about to be written. When the invalidation packet arrives back at the sender, the Exclusive bit is set for that block and the write proceeds locally. • If the block is not present, a packet is sent out that combines a read request and an invalidation request. The first machine that has the block copies it into the packet and discards its own copy. All subsequent machines just discard the block from their caches. When the packet comes back to the sender, it is stored there and written.
  • 23. Page 23 Similarities bw bus based and ring based multiprocessors • In both cases read operations always return the values most recently written • In both designs a block may be absent from a cache,present in multiple caches for reading,or present in a single cache for writing
  • 24. Page 24 DIFFERENCES BW TWO MULTIPROCESSORS BUS BASED MULTIPROCCESORS • They are tightly coupled with the CPU’S normally in a single rack • It has seprate global memory RING BASED MULTIPROCCESORS • Machines here can be much more loosely coupled n this loose coupling can affect their performance • It has no seprate global memory