Improving Multiprocessor Performance with Coarse-Grain Coherence Tracking

Total Page:16

File Type:pdf, Size:1020Kb

Improving Multiprocessor Performance with Coarse-Grain Coherence Tracking Improving Multiprocessor Performance with Coarse-Grain Coherence Tracking Jason F. Cantin, Mikko H. Lipasti, and James E. Smith Department of Electrical and Computer Engineering University of Wisconsin, Madison {jcantin, mikko, jes}@ece.wisc.edu Abstract caused by broadcasts, high performance multiprocessor To maintain coherence in conventional shared-memory systems decouple the coherence mechanism from the data multiprocessor systems, processors first check other proc- transfer mechanism, allowing data to be moved directly essors’ caches before obtaining data from memory. This from a memory controller to a processor either over a coherence checking adds latency to memory requests and separate data network [1, 2, 3], or separate virtual chan- leads to large amounts of interconnect traffic in broadcast- nels [4]. This approach to dividing data transfer from based systems. Our results for a set of commercial, scien- coherence enforcement has significant performance poten- tific and multiprogrammed workloads show that on tial because the broadcast bottleneck can be sidestepped. average 67% (and up to 94%) of broadcasts are unneces- Many memory requests simply do not need to be broadcast sary. to the entire system, either because the data is not currently Coarse-Grain Coherence Tracking is a new technique shared, the request is an instruction fetch, the request that supplements a conventional coherence mechanism writes modified data back to memory, or the request is for and optimizes the performance of coherence enforcement. non-cacheable I/O data. The Coarse-Grain Coherence mechanism monitors the coherence status of large regions of memory, and uses that 1.1. Coarse-Grain Coherence Tracking information to avoid unnecessary broadcasts. Coarse- Grain Coherence Tracking is shown to eliminate 55-97% In this paper, we leverage the decoupling of the coherence of the unnecessary broadcasts, and improve performance and data transfer mechanisms by developing Coarse-Grain by 8.8% on average (and up to 21.7%). Coherence Tracking, a new technique that allows a proc- essor to increase substantially the number of requests that can be sent directly to memory without a broadcast and without violating coherence. Coarse-Grain Coherence 1. Introduction Tracking can be implemented in an otherwise conventional multiprocessor system. A conventional cache coherence protocol (e.g., write-invalidate MOESI [5]) is employed to Cache-coherent multiprocessor systems have wide-ranging maintain coherence over the processors’ caches. However, applications from commercial transaction processing and unlike a conventional system each processor maintains a database services to large-scale scientific computing. They second structure for monitoring coherence at a granularity have become a critical component of internet-based ser- larger than a single cache line (Figure 1). This structure is vices in general. As system architectures have incorporated called the region coherence array (RCA), and maintains larger numbers of faster processors, the memory system coarse-grain coherence state over large, aligned memory has become critical to overall system performance and regions, where a region encompasses a power-of-two scalability. Improving both coherence and data bandwidth, number of conventional cache lines. and using them more efficiently, have become key design issues. On snoop requests, each processor’s RCA is snooped along with the cache line state, and the coarse-grain state is To maintain coherence and exploit fast cache-to-cache piggybacked onto the conventional snoop response. The transfers, multiprocessors commonly broadcast memory requesting processor stores this information in it’s RCA to requests to all the other processors in the system [1, 2, 3]. avoid broadcasting subsequent requests for lines in the While broadcasting is a quick and simple way to find region. As long as no other processors are caching data in cached data copies, locate the appropriate memory control- that region, requests for data in the region can go directly lers, and order memory requests, it consumes considerable to memory and do not require a broadcast. interconnect bandwidth and, as a byproduct, increases latency for non-shared data. To reduce the bottleneck Request / Response Network Cache Block (DCB) operations that invalidate, flush, or zero-out cached copies in the system. Most of these are Data Network Data Cache Block Zero (DCBZ) operations used by the AIX operating system to initialize physical pages. Region L2 Tag Data Data Coherence (Line L2 Cache Data Switch 94% 93% Array State) Network 100% Interface 89% 90% Data Data 76% 80% 67% Requests 60% 54% Requests 60% DRAM 32% Core Memory 40% Controller Requests 15% Processor Chip 20% 0% Figure 1. Processor node modified to implement e 9 H B W an ate Coarse-Grain Coherence. A Region Coherence e rac r b9 C- C- C- yt P P P Mean Oc Barnes we T T T c Array is added, and the network interface may Ra C meti need modification to send requests directly to the SPE h ECint2000SPECjbb2000 P Arit memory controller. S DCB I-Fetch Read Write Write-back As an example, consider a shared-memory multiprocessor with two-levels of cache in each processor. One of the Figure 2. Unnecessary broadcasts in a four- processors, processor A, performs a load operation. The processor system. From 15% to 94% of requests load misses in the L1 cache, and a read request is sent to could have been handled without a broadcast. the L2 cache. The L2 cache coherence state and the region coherence state are read in parallel to determine the status If a significant number of the unnecessary broadcasts can of the line. There is a miss in the L2 cache, and the region be eliminated in practice, there will be large reductions in state is invalid, so the request is broadcast. Each other traffic over the broadcast interconnect mechanism. This processor’s cache is snooped, and the external status of the will reduce overall bandwidth requirements, queuing de- region is sent back to processor A with the conventional lays, and cache tag lookups. Memory latency can be snoop response. Because no processors were caching data reduced because many data requests will be sent directly to from the region, an entry for the region is allocated in memory, without first going to an arbitration point and processor A’s RCA with an exclusive state for the region. broadcasting to all coherence agents. Some requests that Until another processor makes a request for a cache line in do not require a data transfer, such as requests to upgrade a that region, processor A can access any memory location shared copy to a modifiable state and DCB operations, can in the region without a broadcast. be completed immediately without an external request. As we will show, Coarse-Grain Coherence Tracking 1.2. Performance Potential does, in fact, eliminate many of the unnecessary broadcasts and provides the benefits just described. In effect, it en- Figure 2 illustrates the potential of Coarse-Grain Coher- ables a broadcast-based system to achieve much of the ence Tracking. The graph shows the percentage of benefit of a directory-based system (low latency access to unnecessary broadcast requests for a set of workloads on a non-shared data, lower interconnect traffic, and improved simulated four-processor PowerPC system. Refer to Sec- scalability) without the disadvantage of three-hop cache- tion 4 for the system parameters and a description of the to-cache transfers. It exploits spatial locality, but maintains workloads used. On average, 67% of the requests could a conventional line size to avoid increasing false-sharing, have been handled without a broadcast if the processor had fragmentation, and transfer costs. oracle knowledge of the coherence state of other caches in the system. The largest contribution is from ordinary reads 1.3. Paper Overview and writes (including prefetches) for data that is not shared at the time of the request. The next most significant con- This paper presents a protocol to implement Coarse-Grain tributor is write-backs, which generally do not need to be Coherence Tracking and provides simulation results for a seen by other processors. These are followed by instruc- broadcast-based multiprocessor system running commer- tion fetches, for which the data is usually clean-shared. cial, scientific, and multiprogrammed workloads. The The smallest contributor, although still significant, is Data paper is organized as follows. Related work is surveyed in the next section. Section 3 discusses the implementation of and are limited to virtual-page-sized regions of mem- Coarse-Grain Coherence Tracking, along with a proposed ory [14]. coherence protocol. Section 4 describes evaluation meth- Moshovos et al. proposed Jetty, a snoop-filtering odology, which is followed by simulation results in mechanism for reducing cache tag lookups [15]. This Section 5. Section 6 concludes the paper and presents technique is aimed at saving power by predicting whether opportunities for future work. an external snoop request is likely to hit in the local cache, avoiding unnecessary power-consuming cache tag look- 2. Related Work ups. Like our work, Jetty can reduce the overhead of maintaining coherence; however Jetty does not avoid send- Sectored caches provide management of cache data at ing requests and does not reduce request latency. granularities larger than a single line. Sectored caches Moshovos has concurrently proposed a technique called reduce tag overhead by allowing a number of contiguous RegionScout that is based on Jetty, and avoids sending lines to share the same tag [6, 7] (see also the references snoop requests as well as avoiding tag lookups for incom- in [8]). However, the partitioning of a cache into sectors ing snoops [16]. RegionScout uses less precise can increase the miss rate significantly for some applica- information, and hence can be implemented with less tions because of increased internal fragmentation [7, 8, 9]. storage overhead and complexity than our technique, but at There have been proposals to fix this problem, including the cost of effectiveness.
Recommended publications
  • Shared Memory Multiprocessors
    Shared Memory Multiprocessors Logical design and software interactions 1 Shared Memory Multiprocessors Symmetric Multiprocessors (SMPs) • Symmetric access to all of main memory from any processor Dominate the server market • Building blocks for larger systems; arriving to desktop Attractive as throughput servers and for parallel programs • Fine-grain resource sharing • Uniform access via loads/stores • Automatic data movement and coherent replication in caches • Useful for operating system too Normal uniprocessor mechanisms to access data (reads and writes) • Key is extension of memory hierarchy to support multiple processors 2 Supporting Programming Models Message passing Programming models Compilation Multiprogramming or library Communication abstraction User/system boundary Shared address space Operating systems support Hardware/software boundary Communication hardware Physical communication medium • Address translation and protection in hardware (hardware SAS) • Message passing using shared memory buffers – can be very high performance since no OS involvement necessary • Focus here on supporting coherent shared address space 3 Natural Extensions of Memory System P1 Pn Switch P1 Pn (Interleaved) First-level $ $ $ Bus (Interleaved) Main memory Mem I/O devices (a) Shared cache (b) Bus-based shared memory P1 Pn P1 Pn $ $ $ $ Mem Mem Interconnection network Interconnection network Mem Mem (c) Dancehall (d) Distributed-memory 4 Caches and Cache Coherence Caches play key role in all cases • Reduce average data access time • Reduce bandwidth
    [Show full text]
  • Introduction to Multi-Threading and Vectorization Matti Kortelainen Larsoft Workshop 2019 25 June 2019 Outline
    Introduction to multi-threading and vectorization Matti Kortelainen LArSoft Workshop 2019 25 June 2019 Outline Broad introductory overview: • Why multithread? • What is a thread? • Some threading models – std::thread – OpenMP (fork-join) – Intel Threading Building Blocks (TBB) (tasks) • Race condition, critical region, mutual exclusion, deadlock • Vectorization (SIMD) 2 6/25/19 Matti Kortelainen | Introduction to multi-threading and vectorization Motivations for multithreading Image courtesy of K. Rupp 3 6/25/19 Matti Kortelainen | Introduction to multi-threading and vectorization Motivations for multithreading • One process on a node: speedups from parallelizing parts of the programs – Any problem can get speedup if the threads can cooperate on • same core (sharing L1 cache) • L2 cache (may be shared among small number of cores) • Fully loaded node: save memory and other resources – Threads can share objects -> N threads can use significantly less memory than N processes • If smallest chunk of data is so big that only one fits in memory at a time, is there any other option? 4 6/25/19 Matti Kortelainen | Introduction to multi-threading and vectorization What is a (software) thread? (in POSIX/Linux) • “Smallest sequence of programmed instructions that can be managed independently by a scheduler” [Wikipedia] • A thread has its own – Program counter – Registers – Stack – Thread-local memory (better to avoid in general) • Threads of a process share everything else, e.g. – Program code, constants – Heap memory – Network connections – File handles
    [Show full text]
  • Detecting False Sharing Efficiently and Effectively
    W&M ScholarWorks Arts & Sciences Articles Arts and Sciences 2016 Cheetah: Detecting False Sharing Efficiently andff E ectively Tongping Liu Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA; Xu Liu Coll William & Mary, Dept Comp Sci, Williamsburg, VA 23185 USA Follow this and additional works at: https://scholarworks.wm.edu/aspubs Recommended Citation Liu, T., & Liu, X. (2016, March). Cheetah: Detecting false sharing efficiently and effectively. In 2016 IEEE/ ACM International Symposium on Code Generation and Optimization (CGO) (pp. 1-11). IEEE. This Article is brought to you for free and open access by the Arts and Sciences at W&M ScholarWorks. It has been accepted for inclusion in Arts & Sciences Articles by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. Cheetah: Detecting False Sharing Efficiently and Effectively Tongping Liu ∗ Xu Liu ∗ Department of Computer Science Department of Computer Science University of Texas at San Antonio College of William and Mary San Antonio, TX 78249 USA Williamsburg, VA 23185 USA [email protected] [email protected] Abstract 1. Introduction False sharing is a notorious performance problem that may Multicore processors are ubiquitous in the computing spec- occur in multithreaded programs when they are running on trum: from smart phones, personal desktops, to high-end ubiquitous multicore hardware. It can dramatically degrade servers. Multithreading is the de-facto programming model the performance by up to an order of magnitude, significantly to exploit the massive parallelism of modern multicore archi- hurting the scalability. Identifying false sharing in complex tectures.
    [Show full text]
  • Decompose and Conquer: Addressing Evasive Errors in Systems on Chip
    Decompose and Conquer: Addressing Evasive Errors in Systems on Chip by Doowon Lee A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Computer Science and Engineering) in the University of Michigan 2018 Doctoral Committee: Professor Valeria M. Bertacco, Chair Assistant Professor Reetuparna Das Professor Scott Mahlke Associate Professor Zhengya Zhang Doowon Lee [email protected] ORCID iD: 0000-0003-0046-7746 c Doowon Lee 2018 For my wife, Ghaeun ii ACKNOWLEDGMENTS I would like to express my deepest gratitude to my advisor, Professor Valeria Bertacco. She has affected me in many aspects. She is the most enthusiastic person I have ever met; she always inspires me to achieve more than I could imagine. She has offered an extraordinary research mentorship throughout my Ph.D. journey. She has been consistently available whenever I need her thoughtful advice and keen insight. Also, she has been very patient about my research endeavors, allowing me to navigate different research topics. Her guidance on writing and presentation has been helpful for me to become an outstanding professional after graduation. I also thank my dissertation committee members, Professors Scott Mahlke, Reetuparna Das, and Zhengya Zhang. Their comments on my research projects have been invaluable for me to improve this dissertation. In particular, in-depth discussions with them stimulate me to think out of the box, which in turn strengthens the impacts of the research proposed in the dissertation. Our research group members have helped enjoy a long journey to the degree at the University of Michigan. First of all, I am grateful to Professor Todd Austin for his advice on my research projects.
    [Show full text]
  • A Design Methodology for Soft-Core Platforms on FPGA with SMP Linux
    Muttillo et al. EURASIP Journal on Embedded Systems (2016) 2016:15 EURASIP Journal on DOI 10.1186/s13639-016-0051-9 Embedded Systems RESEARCH Open Access A design methodology for soft-core platforms on FPGA with SMP Linux, OpenMP support, and distributed hardware profiling system Vittoriano Muttillo1*, Giacomo Valente1, Fabio Federici1, Luigi Pomante1, Marco Faccio1,CarloTieri2 and Serenella Ferri2 Abstract In recent years, the use of multiprocessor systems has become increasingly common. Even in the embedded domain, the development of platforms based on multiprocessor systems or the porting of legacy single-core applications are frequent needs. However, such designs are often complicated, as embedded systems are characterized by numerous non-functional requirements and a tight hardware/software integration. This work proposes a methodology for the development and validation of an embedded multiprocessor system. Specifically, the proposed method assumes the use of a portable, open source API to support the parallelization and the possibility of prototyping the system on a field-programmable gate array. On this basis, the proposed flow allows an early exploration of the hardware configuration space, a preliminary estimate of performance, and the rapid development of a system able to satisfy the design specifications. An accurate assessment of the actual performance of the system is then enforced by the use of an hardware-based profiling subsystem. The proposed design flow is described, and a version specifically designed for LEON3 processor
    [Show full text]
  • The POWER4 Processor Introduction and Tuning Guide
    Front cover The POWER4 Processor Introduction and Tuning Guide Comprehensive explanation of POWER4 performance Includes code examples and performance measurements How to get the most from the compiler Steve Behling Ron Bell Peter Farrell Holger Holthoff Frank O’Connell Will Weir ibm.com/redbooks International Technical Support Organization The POWER4 Processor Introduction and Tuning Guide November 2001 SG24-7041-00 Take Note! Before using this information and the product it supports, be sure to read the general information in “Special notices” on page 175. First Edition (November 2001) This edition applies to AIX 5L for POWER Version 5.1 (program number 5765-E61), XL Fortran Version 7.1.1 (5765-C10 and 5765-C11) and subsequent releases running on an IBM ^ pSeries POWER4-based server. Unless otherwise noted, all performance values mentioned in this document were measured on a 1.1 GHz machine, then normalized to 1.3 GHz. Note: This book is based on a pre-GA version of a product and may not apply when the product becomes generally available. We recommend that you consult the product documentation or follow-on versions of this redbook for more current information. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. JN9B Building 003 Internal Zip 2834 11400 Burnet Road Austin, Texas 78758-3493 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 2001. All rights reserved. Note to U.S Government Users – Documentation related to restricted rights – Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp.
    [Show full text]
  • Multi-Threading for Multi-Core Architectures
    Intel Core Duo AMD Athlon 64 X2 Multithreading and Parallel Microprocessors Stephen Jenks Electrical Engineering and Computer Science [email protected] Mostly Worked on Clusters UCI EECS Scalable Parallel and Distributed Systems Lab 2 Also Build Really Big Displays HIPerWall: 200 Million Pixels 50 Displays 30 Power Mac G5s UCI EECS Scalable Parallel and Distributed Systems Lab 3 Outline 9 Parallelism in Microprocessors 9 Multicore Processor Parallelism 9 Parallel Programming for Shared Memory 9 OpenMP 9 POSIX Threads 9 Java Threads 9 Parallel Microprocessor Bottlenecks 9 Parallel Execution Models to Address Bottlenecks 9 Memory interface 9 Cache-to-cache (coherence) interface 9 Current and Future CMP Technology UCI EECS Scalable Parallel and Distributed Systems Lab 4 Parallelism in Microprocessors Fetch 9 Pipelining is most Buffer prevalent Decode 9Developed in 1960s 9Used in everything Buffer 9Even microcontrollers Register Access 9Decreases cycle time Buffer Buffer 9Allows up to 1 instruction per cycle (IPC) 9No programming changes ALU 9Some Pentium 4s have more than 30 stages! Buffer Write Back UCI EECS Scalable Parallel and Distributed Systems Lab 5 More Microprocessor Parallelism 9 Superscalar allows Instruction Level Parallelism (ILP) ALU 9Replace ALU with multiple functional units 9Dispatch several Becomes instructions at once 9 Out of Order Execution Load/ 9Execute based on data FP INT INT availability Store 9Requires reorder buffer 9 More than 1 IPC 9 No program changes UCI EECS Scalable Parallel and Distributed Systems Lab 6 Thread-Level
    [Show full text]
  • Intel Hyper-Threading Technology
    Intel® Hyper-Threading Technology Technical User’s Guide January 2003 22 Contents Overview of Intel® Hyper-Threading Technology 4 Dealing with Multithreading Code Pitfalls 22 The Evolution of System Key Practices of Thread Synchronization 23 and Processor Architectures 4 Key Practices of System-bus Optimization 23 Single Processor Systems 5 Key Practices of Memory Optimization 23 Multithreading 6 Key Practices of Front-end Optimization 24 Multiprocessing 8 Key Practices: Execution-resource Optimization 24 Multiprocessor Systems 9 Optimization Techniques 24 Multitasking versus Multithreading 11 Eliminate or Reduce the Impact of Spin-wait Loops 24 Hyper-Threading Technology 11 Avoiding 64K Aliasing in the First Level Data Cache 26 Balance the Impact of Background Task Priorities Keys to Hyper-Threading on Physical Processors 28 Technology Performance 15 Avoid Serializing Events and Instructions 28 Understand and Have Clear Optimize Cache Sharing 29 Performance Expectations 15 Overcoming False Sharing in Data Cache 29 Understand Hyper-Threading Synchronization Overhead Greater Than Parallel Region 30 Technology Processor Resources 15 Take Advantage of Write Combining Buffers 30 Maximize Parallel Activity 16 Correct Load Imbalance 31 Best Practices for Optimizing Multitasking Performance 18 Hyper-Threading Technology Application Development Resources 32 Identifying Hyper-Threading Intel® C++ Compiler 32 Technology Performance General Compiler Recommendations 32 Bottlenecks in an Application 19 Logical vs. Physical Processors 19 VTuneTM Performance
    [Show full text]
  • PREDATOR: Predictive False Sharing Detection
    PREDATOR: Predictive False Sharing Detection Tongping Liu Chen Tian Ziang Hu Emery D. Berger School of Computer Science Huawei US R&D Center School of Computer Science University of Massachusetts Amherst [email protected], University of Massachusetts Amherst [email protected] [email protected] [email protected] Abstract General Terms Performance, Measurement False sharing is a notorious problem for multithreaded ap- Keywords False Sharing, Multi-threaded plications that can drastically degrade both performance and scalability. Existing approaches can precisely identify the 1. Introduction sources of false sharing, but only report false sharing actu- While writing correct multithreaded programs is often chal- ally observed during execution; they do not generalize across lenging, making them scale can present even greater obsta- executions. Because false sharing is extremely sensitive to cles. Any contention can impair scalability or even cause ap- object layout, these detectors can easily miss false sharing plications to run slower as the number of threads increases. problems that can arise due to slight differences in mem- False sharing is a particularly insidious form of con- ory allocation order or object placement decisions by the tention. It occurs when two threads update logically-distinct compiler. In addition, they cannot predict the impact of false objects that happen to reside on the same cache line. The sharing on hardware with different cache line sizes. resulting coherence traffic can degrade performance by an This paper presents PREDATOR, a predictive software- order of magnitude [4]. Unlike sources of contention like based false sharing detector. PREDATOR generalizes from locks, false sharing is often invisible in the source code, a single execution to precisely predict false sharing that is making it difficult to find.
    [Show full text]
  • Embedded Multicore: an Introduction
    Embedded Multicore: An Introduction EMBMCRM Rev. 0 07/2009 How to Reach Us: Home Page: www.freescale.com Web Support: http://www.freescale.com/support Information in this document is provided solely to enable system and software USA/Europe or Locations Not Listed: implementers to use Freescale Semiconductor products. There are no express or Freescale Semiconductor, Inc. implied copyright licenses granted hereunder to design or fabricate any integrated Technical Information Center, EL516 circuits or integrated circuits based on the information in this document. 2100 East Elliot Road Tempe, Arizona 85284 Freescale Semiconductor reserves the right to make changes without further notice to +1-800-521-6274 or any products herein. Freescale Semiconductor makes no warranty, representation or +1-480-768-2130 www.freescale.com/support guarantee regarding the suitability of its products for any particular purpose, nor does Freescale Semiconductor assume any liability arising out of the application or use of Europe, Middle East, and Africa: Freescale Halbleiter Deutschland GmbH any product or circuit, and specifically disclaims any and all liability, including without Technical Information Center limitation consequential or incidental damages. “Typical” parameters which may be Schatzbogen 7 provided in Freescale Semiconductor data sheets and/or specifications can and do 81829 Muenchen, Germany vary in different applications and actual performance may vary over time. All operating +44 1296 380 456 (English) +46 8 52200080 (English) parameters, including “Typicals” must be validated for each customer application by +49 89 92103 559 (German) customer’s technical experts. Freescale Semiconductor does not convey any license +33 1 69 35 48 48 (French) under its patent rights nor the rights of others.
    [Show full text]
  • AMC: Advanced Multi-Accelerator Controller
    AMC: Advanced Multi-accelerator Controller 1;2,Tassadaq Hussain, 3,Amna Haider, 3Shakaib A. Gursal, and 1Eduard Ayguade´ 1 Barcelona Supercomputing Center , 2BSC-Microsoft Research Centre , 3Unal Center of Engineering Research & Development Barcelona, Spain ftassadaq.hussain, eduard.ayguadeg @bsc.es ffirst [email protected] Abstract The rapid advancement, use of diverse architectural features and introduction of High Level Synthesis (HLS) tools in FPGA technology have enhanced the ca- pacity of data-level parallelism on a chip. A generic FPGA based HLS multi- accelerator system requires a microprocessor (master core) that manages memory and schedules accelerators. In a real environment, such HLS multi-accelerator sys- tems do not give a perfect performance due to memory bandwidth issues. Thus, a system demands a memory manager and a scheduler that improves performance by managing and scheduling the multi-accelerator’s memory access patterns effi- ciently. In this article, we propose the integration of an intelligent memory system and efficient scheduler in the HLS-based multi-accelerator environment called Advanced Multi-accelerator Controller (AMC). The AMC system is evaluated with memory intensive accelerators, High Performance Computing (HPC) appli- cations and implemented and tested on a Xilinx Virtex-5 ML505 evaluation FPGA board. The performance of the system is compared against the microprocessor- based systems that have been integrated with the operating system. Results show that the AMC based HLS multi-accelerator system achieves 10.4x and 7x of speedup compared to the MicroBlaze and Intel Core based HLS multi-accelerator systems. 1. Introduction In the last few years the density of FPGAs [1, 2] and performance per watt [3] have improved, which allows the High Performance Computing (HPC) industry to increase and provide more functionalities on a single chip.
    [Show full text]
  • Coherent Shared Memories for Fpgas by David Woods a Thesis
    Coherent Shared Memories for FPGAs by David Woods A thesis submitted in conformity with the requirements for the degree of Master of Applied Sciences Graduate Department of Electrical and Computer Engineering University of Toronto Copyright °c 2009 by David Woods Abstract Coherent Shared Memories for FPGAs David Woods Master of Applied Sciences Graduate Department of Electrical and Computer Engineering University of Toronto 2009 To build a shared-memory programming model for FPGAs, a fast and highly parallel method of accessing the shared-memory is required. This thesis presents a ¯rst look at how to implement a coherent caching system in an FPGA. The coherent caching system consists of multiple distributed caches that implement the write-once coherence protocol, allowing e±cient access to system memory while simplifying the user programming model. Several test applications are used to verify functionality, and assess performance of the current system. Results show that with a processor-based system, some applications could bene¯t from improvements to the coherence system, but for many applications, the current system is su±cient. However, the current coherent caching system is not suf- ¯cient for most hardware core based systems, because the faster memory accesses quickly saturate shared system resources. As well, the performance of distributed-memory sys- tems currently surpasses that of the coherent caching system. Performance results are promising, and given the potential for improvements, future work on this system is war- ranted. ii Dedication I dedicate this to my parents for their support throughout my education. And most of all, I'd like to dedicate this to Laura for her help, understanding, and patience throughout my Masters Degree.
    [Show full text]