skip to main content
10.1145/76738.76871acmconferencesArticle/Chapter ViewAbstractPublication PageswscConference Proceedingsconference-collections
Article
Free Access

Techniques for the trace-driven simulation of cache performance

Published:01 October 1989Publication History

ABSTRACT

In contemporary computers, cache memories are interposed between processors and primary memories in order to decrease access time and bus traffic. Because the design of the cache is critical and the factors affecting its performance are complex, trace-driven simulation is widely used and studied. This paper surveys three interesting techniques for the trace-driven simulation of cache designs: stack analysis methodologies that make it possible to obtain performance measures for a wide variety of cache designs from a single run of the simulator, compression algorithms specifically tailored to memory reference traces, and an approach to parallel trace-driven simulation of multiprocessor caches that dramatically reduces the simulation's synchronization and thus its running time.

References

  1. Eggers, SJ. (1989). Simulation Analysis of Data Sharing in Shared Memory Multiprocessors. Technical Report 89/50, Computer Science Division, University of California, Berkeley. (Ph.D. Thesis).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Goodman, J. R. (1987). Cache Memory Optimization to Reduce Processor/Memory Traffic Journal of VLSI and Computer Systems 2,1, pp. 61--86.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Hill, M. D. (1987). Aspects of Cache Memory and Instruction Buffer Performance. Technical Report 87/381, Computer Science Division, University of California, Berkeley. (Ph.D. Thesis).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Hill, M. D., and Smith, A. J. (1989). Evaluating Associativity in CPU Caches. IEEE Transactions on Computers, to appear.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Katz, R., Eggers, S., Wood, D. A., Perkins, C., and Sheldon, R. G. (1985). Implementing a Cache Consistency Protocol. Proc. 12th Annual International Symposium on Computer Architecture, pp. 276--283.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Lin, Y.-B., Baer, J.-L., and Lazowska, E. D. (1989). Tailoring a Parallel Trace-Driven Simulation Technique to Specific Multiprocessor Cache Coherence Protocols. Proc. 1989 SCS Multiconference on Distributed Simulation.]]Google ScholarGoogle Scholar
  7. Mattson, R. L., Gecsei, J., Slutz, D. R., and Traiger, I. L. (1970). Evaluation Techniques for Storage Hierarchies. IBM Systems Journal 9,2, pp. 78--117.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. McCreight, E. (1984). The Dragon Computer System: An Early Overview. Technical Report, Xerox Palo Alto Research Center.]]Google ScholarGoogle Scholar
  9. Papamarcos, M., and Patel, J. (1984). A Low-Overhead Coherence Solution for Multiprocessors With Private Cache Memories. Proc. 11th Annual International Symposium on Computer Architecture, pp. 348--354.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Puzak, T. R. (1985). Analysis of Cache Replacement Algorithms. Ph. D. Thesis, University of Massachusetts.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Samples, A. D. (1989). Mache: No-Loss Trace Compaction. Proc, ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems, pp. 89--97.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Smith, A. J. (1979). Two Methods for the Efficient Analysis of Memory Address Trace Data. IEEE Transactions on Software Engineering SE-3,1, pp. 94--101.]]Google ScholarGoogle Scholar
  13. Sweazey, P., and Smith, A. J. (1986). A Class of Compatible Cache Consistency Protocols and Their Support by the IEEE. Proc. 13th International Symposium on Computer Architecture, pp. 414--423.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Thacker, C. P., and Stewart, L. C. (1987). Firefly: A Multiprocessor Workstation. Proc. 2nd International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 164--172.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Thompson, J. G. (1987). Efficient Analysis of Caching Systems. Technical Report 87/374, Computer Science Division, University of California, Berkeley.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Traiger, I. L., and Slutz, d. R. (1971). One-Pass Techniques for the Evaluation of Memory Hierarchies. Technical Report RJ892, IBM.]]Google ScholarGoogle Scholar
  17. Ziv, J., and Lempel, A. (1977). A Universal Algorithm for Sequential Data Compression. IEEE Transactions on Information Theory 243, 3, pp. 337--343.]]Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Techniques for the trace-driven simulation of cache performance

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WSC '89: Proceedings of the 21st conference on Winter simulation
          October 1989
          1139 pages
          ISBN:0911801588
          DOI:10.1145/76738

          Copyright © 1989 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 October 1989

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate3,413of5,075submissions,67%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader