Question: 3 . Directory protocols are more scalable than snooping protocols because they send explicit request and invalidate messages to those nodes that have copies of
Directory protocols are more scalable than snooping protocols because they send explicit request and invalidate messages to those nodes that have copies of a block, while snooping protocols broadcast all requests and invalidates to all nodes. Consider the eightprocessor system illustrated in Figure and assume that all caches not shown have invalid blocks. For each of the sequences below, identify which nodes chipprocessor
receive each request and invalidate.
a P: write
b P: write
c P: write
d P: write Figure Multichip, multicore multiprocessor with DSMa P: write In this case, P sends a write request to Chip and Chip Chip receives the request and invalidates its block, while Chip receives the request and invalidates its block.
b P: write In this case, P sends a write request to Chip and Chip Chip receives the request and invalidates its block, while Chip receives the request and invalidates its block.
c P: write In this case, P sends a write request to Chip and Chip Chip receives the request and invalidates its block, while Chip receives the request and invalidates its block.
d P: write In this case, P sends a write request to Chip and Chip Chip receives the request and invalidates its block, while Chip receives the request and invalidates its block.
Exercise asked you to add the Owned state to the simple MSI snooping protocol. Repeat the question, but with the simple directory protocol above.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
