• Title/Summary/Keyword: 무효화

Search Result 111, Processing Time 0.027 seconds

Branch Misprediction Recovery Mechanism That Exploits Control Independence on Program (프로그램 상의 제어 독립성을 이용한 분기 예상 실패 복구 메커니즘)

  • Yoon, Sung-Lyong;Lee, Won-Mo;Cho, Yeong-Il
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.7
    • /
    • pp.401-410
    • /
    • 2002
  • Control independence has been put forward as a new significant source of instruction-level parallelism for superscalar processors. In branch prediction mechanisms, all instructions after a mispredicted branch have to be squashed and then instructions of a correct path have to be re-fetched and re-executed. This paper presents a new branch misprediction recovery mechanism to reduce the number of instructions squashed on a misprediction. Detection of control independent instructions is accomplished with the help of the static method using a profiling and the dynamic method using a control flow of program sequences. We show that the suggested branch misprediction recovery mechanism improves the performance by 2~7% on a 4-issue processor, by 4~15% on an 8-issue processor and by 8~28% on a 16-issue processor.

Weighted Competitive Update Protocol for DSM Systems (DSM 시스템에서 통신 부하의 가중치를 고려한 경쟁적인 갱신 프로토콜)

  • Im, Seong-Hwa;Baek, Sang-Hyeon;Kim, Jae-Hun;Kim, Seong-Su
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2245-2252
    • /
    • 1999
  • Since DSM provides a user a simple shared memory abstraction, the user does not have to be concerned with data movement between hosts. Each node in DSM systems has processor, memory, and connection to a network. Memory is divided into pages, and a page can have multiple copies in different nodes. To maintain data consistency between nodes, two conventional protocols are used : write-update protocol and invalidate protocol. The performance of these protocols depends on the system parameters and the memory access patterns. for adapting to memory access patterns, competitive update protocol updates those copies of a page that are expected to be used in the near future, while selectively invalidating other copies. We present weighted competitive update protocols that consider different communication bandwidth for each connection a of two nodes. Test result by simulation show that the weighted competitive update protocol improves performance.

  • PDF

Directory Cache Coherence Scheme using the Number-Balanced Binary Tree (수 평형 이진트리를 이용한 디렉토리 캐쉬 일관성 유지 기법)

  • Seo, Dae-Wha
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.3
    • /
    • pp.821-830
    • /
    • 1997
  • The directory-based cache coherence scheme is an attractive approach to solve the caceh coherence problem in a large-scale shared-memory multiprocessor.However, the exsting directory-based schemes have some problens such as the enormous storage overhead for a directory, the long invalidation latency, the heavy network condes-tion, and the low scalability.For resolving these problems, we propose a new directroy- based caceh coherence scheme which is suitable for building scalable, shred-memory multiprocessors.In this scheme, each directory en-try ofr a given memory block is a number-balanced binaty tree(NBBT) stucture.The NBBT has several proper-ties to effciently maintain the directory for the cache consistency such that the shape is unique, the maximum depth is [log$_2$n], and the tree has the minimum number of leaf nodes among the binarry tree with n nodes.Therefore, this scheme can reduce the storage overhead, the network traffic, and the inbalidation latency and can ensutr the high- scalability the large-scale shared-memory multiprocessors.

  • PDF

Efficient Schemes for Cache Consistency Maintenance in a Mobile Database System (이동 데이터베이스 시스템에서 효율적인 캐쉬 일관성 유지 기법)

  • Lim, Sang-Min;Kang, Hyun-Chul
    • The KIPS Transactions:PartD
    • /
    • v.8D no.3
    • /
    • pp.221-232
    • /
    • 2001
  • Due to rapid advance of wireless communication technology, demand on data services in mobile environment is gradually increasing. Caching at a mobile client could reduce bandwidth consumption and query response time, and yet a mobile client must maintain cache consistency. It could be efficient for the server to broadcast a periodic cache invalidation report for cache consistency in a cell. In case that long period of disconnection prevents a mobile client from checking validity of its cache based solely on the invalidation report received, the mobile client could request the server to check cache validity. In doing so, some schemes may be more efficient than others depending on the number of available channels and the mobile clients involved. In this paper, we propose new cache consistency schemes, effects, efficient especially (1) when channel capacity is enough to deal with the mobile clients involved or (2) when that is not the case, and evaluate their performance.

  • PDF

Mobile Transaction Processing in Hybrid Broadcasting Environment (복합 브로드캐스팅 환경에서 이동 트랜잭션 처리)

  • 김성석;양순옥
    • Journal of KIISE:Databases
    • /
    • v.31 no.4
    • /
    • pp.422-431
    • /
    • 2004
  • In recent years, different models in data delivery have been explored in mobile computing systems. Particularly, there were a lot of research efforts in the periodic push model where the server repetitively disseminates information without explicit request. However, average waiting time per data operation highly depends on the length of a broadcast cycle and different access pattern among clients may deteriorate the response time considerably. In this case, clients are preferably willing to send a data request to the server explicitly through backchannel in order to obtain optimal response time. We call the broadcast model supporting backchannel as hybrid broadcast. In this paper, we devise a new transaction processing algorithm(O-PreH) in hybrid broadcast environments. The data objects which the server maintains are divided into Push_Data for periodic broadcasting and Pull_Data for on-demand processing. Clients tune in broadcast channel or demand the data of interests according to the data type. Periodic invalidation reports from the server support maintaining transactional consistency. If one or more conflicts are found, conflict orders are determined not to violate the consistency(pre-reordering) and then the remaining operations have to be executed pessimistically. Through extensive simulations, we demonstrate the improved throughput of the proposed algorithm.

A Branch Misprediction Recovery Mechanism by Control Independence (제어 독립성과 분기예측 실패 복구 메커니즘)

  • Ko, Kwang-Hyun;Cho, Young-Il
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.14 no.1
    • /
    • pp.3-22
    • /
    • 2012
  • Control independence has been put forward as a significant new source of instruction-level parallelism for superscalar processors. In branch prediction mechanisms, all instructions after a mispredicted branch have to be squashed and then instructions of a correct path have to be re-fetched and re-executed. This paper presents a new branch misprediction recovery mechanism to reduce the number of instructions squashed on a misprediction. Detection of control independent instructions is accomplished with the help of the static method using a profiling and the dynamic method using a control flow of program sequences. We show that the suggested branch misprediction recovery mechanism improves the performance by 2~7% on a 4-issue processor, by 4~15% on an 8-issue processor and by 8~28% on a 16-issue processor.

Broadcasting study for Efficient Cache Consistency in Mobile Computing environments. (이동컴퓨팅 환경에서의 효율적인 캐쉬 일관성을 위한 방송기법 연구)

  • 강무경;정병수;김대호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10b
    • /
    • pp.202-204
    • /
    • 2004
  • 최근 이동컴퓨팅(Mobile Computing) 환경에서의 잦은 접속 단절로 인한 클라이언트 캐시 일관성(consistency) 문제를 해결하기 위한 방법과 함께 통신 대역과 에너지의 제약을 고려한 연구가 진행되고 있다. 이러한 캐시 유지 방법의 한 분야로서 방송(Broadcasting)에 대한 연구가 진행 중이다. 그러나 기존의 무효화 보고에 대한 연구는 서버에서의 갱신 정도와 상관없이 전송되기 이전 일정 시간동안의 서버갱신에 대한 정보만을 포함한다. 이러한 전송기법은 다수의 클라이언트가 필요로 하면서 갱신정도가 빈번한 데이터에는 적합한 방송 방법이 아니다. 본 논문은 이 같은 단정을 보안하기 위해 자주 갱신되는 데이터의 빈도 수에 따라 데이터를 방송하고 클라이언트의 요청에 의해서 데이터 방송빈도 수를 변경하여 클라이언트가 특정 데이터의 응답시간을 최소화 할 수 있도록 하는 방안을 제시하였다.

  • PDF

Preemptive Garbage Collection Scheme for the Responsiveness Improvement of NAND Flash Memories (낸드 플래시 메모리의 응답시간 향상을 위한 선점방식 가비지 컬렉션 기법)

  • Jung, Sang-Hyuk;Song, Yong-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.176-178
    • /
    • 2012
  • 낸드 플래시 메모리는 FTL의 페이지 re-mapping 동작으로 인하여 특정 페이지가 무효화되었음에도 불구하고 물리적으로 소거되지 않은 상태로 낸드 플래시 공간을 점유하는 문제가 발생할 수 있다. 플래시 저장장치의 제어기는 플래시 기반 저장장치의 지속적인 쓰기 성능 유지와 저장 용량 확보를 위해 무효 페이지를 물리적으로 제거하고 유효 페이지를 수집하는 가비지 컬렉션 연산을 수행한다. 따라서 다수의 블록을 대상으로 가비지 컬렉션 연산을 수행할 경우, 많은 페이지 복사와 블록 삭제 연산들로 인한 저장장치 지연현상이 발생할 수 있다. 본 논문에서는 낸드 플래시 저장장치에 적용 가능한 효과적인 가비지 컬렉션 메커니즘을 제안한다. 선점방식 가비지 컬렉션 기법은 블록 맵의 데이터 구조를 간단히 수정하여, 단일 블록을 대상으로 가비지 컬렉션을 수행한다. 이 기법의 유효성은 페이지 복사와 블록 삭제 연산을 세부 단위로 분할하여 처리가 가능하므로 가비지 컬렉션이 수행되는 도중에 요청되는 호스트의 요청에 기민하게 응답가능하다는 것이다.

A Hovel Route Reconstruction Scheme using mark-up node and partial Source Routing for Mobile Ad Hoc Networks (Mobile Ad Hoc networks에서 Hark-up 노드와 부분적 Source Routing을 이용한 경로 재설정 기법)

  • 류정필;이정석;한기준
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.475-477
    • /
    • 2002
  • Mobile ad hoc network은 관리나 표준화된 지원 서비스 없이 무선 이동 노드들만으로 구성되는 임시적인 망이다. Mobile ad hoc network에서는 노드들의 이동성으로 인해 각각의 노드들이 경로를 결정하고, 경로가 무효화되었을 때 빠르고 효과적으로 복구하는 것이 중요하다. 본 논문에서는 On-Demand 방식의 대표적인 프로토콜인 AODV에서 경로 설정 과정과 경로 파손이 발생했을 때 경로 재설정 과정을 알아보고, 액티브 경로의 길이가 망의 직경에 가깝게 확장되어 졌을 경우에 경로 설정 과정에서 흡수를 이용해 mark-up 한 노드들과 RREP 전송과정에서 mark-up한 노드에 의한 부분적인 다중 경로를 설정함으로서 보다 효과적이긴 신뢰성 있는 새로운 경로 재설정 기법을 제안한다.

  • PDF

A Study on the Remove Use-After-Free Security Weakness (소프트웨어 개발단계 Use-After-Free 보안약점 제거방안 연구)

  • Park, Yong Koo;Choi, Jin Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.1
    • /
    • pp.43-50
    • /
    • 2017
  • Use-After-Free security problem is rapidly growing in popularity, especially for attacking web browser, operating system kernel, local software. This security weakness is difficult to detect by conventional methods. And if local system or software has this security weakness, it cause internal security problem. In this paper, we study ways to remove this security weakness in software development by summarize the cause of the Use-After-Free security weakness and suggest ways to remove them.