A Primer on Memory Consistency and Cache CoherenceSnooping Coherence Protocols
A Primer on Memory Consistency and Cache Coherence: Snooping Coherence Protocols
Nagarajan, Vijay; Sorin, Daniel J.; Hill, Mark D.; Wood, David A.
2020-01-01 00:00:00
[In this chapter, we present snooping coherence protocols. Snooping protocols were the first widely deployed class of protocols and they continue to be used in a variety of systems. Snooping protocols offer many attractive features, including low-latency coherence transactions and a conceptually simpler design than the alternative, directory protocols (Chapter 8).]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/a-primer-on-memory-consistency-and-cache-coherence-snooping-coherence-MxQ0WdLsOu
A Primer on Memory Consistency and Cache CoherenceSnooping Coherence Protocols
[In this chapter, we present snooping coherence protocols. Snooping protocols were the first widely deployed class of protocols and they continue to be used in a variety of systems. Snooping protocols offer many attractive features, including low-latency coherence transactions and a conceptually simpler design than the alternative, directory protocols (Chapter 8).]
Published: Jan 1, 2020
Recommended Articles
Loading...
There are no references for this article.
Share the Full Text of this Article with up to 5 Colleagues for FREE
Sign up for your 14-Day Free Trial Now!
Read and print from thousands of top scholarly journals.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.