Journal of Shanghai Jiaotong University ›› 2013, Vol. 47 ›› Issue (01): 49-54.

• Automation Technique, Computer Technology • Previous Articles     Next Articles

An Adaptive Token Protocol Optimized for Migratory Sharing

 FU  Gui-Tao-1, 2 , ZHAO  Tian-Lei-1, TANG  Chuan-1, XING  Zuo-Cheng-1   

  1. (1. College of Computer, National University of Defense Technology, Changsha 410073, China;2. Beijing Satellite Navigation Center, Beijing 100094, China)
  • Received:2012-05-20 Online:2013-01-30 Published:2013-01-30

Abstract: According to the migratory pattern means that the accessing processor initiates two separate requests to obtain first read and then write permission in invalidation-based protocol, this paper proposed adaptive protocol which uses the token number and the writer or reader of data to recognize the migratory pattern. While the data is in migratory pattern, the requestor’s state changes to MG state which can avoid the write request in migratory access. It effectively eliminates invalidation in migratory pattern. The adaptive protocol gets the ownership when reading the sharing data, and thus avoids some write misses. The results show that the adaptive protocol reduces the miss latency by an average of 5%, and the network traffic by an average of 9%.  

Key words: access pattern, migratory, invalidation, adaptive protocol

CLC Number: