SlideShare a Scribd company logo
1 of 30
Basic Concepts Of DSM:
 A DSM system provides a logical abstraction
of shared memory which is built using a set
of interconnected nodes having physically
distributed memories.
Types of DSMs
 Hardware level DSM
 Software level DSM
 Hybrid level DSM
Advantages of DSM
 Simple abstraction
 Improved portability of distributed
application programs
 Provides better performance in some
applications
 Large memory space at no extra cost
 Better than message passing systems
Hardware architectures
 On chip memory
 Bus based multiprocessor
 Ring based multiprocessor
 Switched multiprocessor
On chip memory
In this CPU portion of the chip has a address and data lines that directly
connect to the memory portion.
Such chips are used in cars appliances and even toys
Bus based multiprocessor
All CPUs connected to one bus (backplane)
Memory and peripherals are accessed via shared bus. System looks the
same from any processor.
Ring DSM architecture
 Shred memory :
 Private areas
 Shared areas
(Ring) Memnet: Node memory
Switched multiprocessor:
 Multiple clusters interconnected by a bus offer better
scalability
 Example : Dash system
NUMA Multiprocessor
 Non-uniform memory access (NUMA) is a
computer memory design used multiprocessing,
where the memory access time depends on the
memory location relative to the processor.
 Under NUMA, a processor can access its own
local memory faster than non-local memory.
 The benefits of NUMA are limited to particular
workloads, notably on servers where the data is
often associated strongly with certain tasks or
users.
UMA Multiprocessor
 Uniform memory access (UMA) is a shared memory
architecture used in parallel computers. All theprocessors
in the UMA model share the physical memoryuniformly.
 In a UMA architecture, access time to a memory location
is independent of which processor makes the request or
which memory chip contains the transferred data.
 Uniform memory access computer architectures are often
contrasted with non-uniform memory access (NUMA)
architectures.
 In the UMA architecture, each processor may use a
private cache. Peripherals are also shared in some
fashion.
 The UMA model is suitable for general purpose and time
sharing applications by multiple users. It can be used to
speed up the execution of a single large program in time-
critical applications.
DSM design issues
 Granularity of sharing
 Structure of data
 Consistency models
 Coherence protocols
Granularity
 False sharing
 Thrashing
Thrashing:
 False sharing
 Techniques to reduce
thrashing:
 Application controlled lock
 Pin the block to a node for
specific time
 Customize algorithm to
shared data usage pattern
DSM structure
 Organization of data items in the shared
memory
Consistency models
 Refers to how recent the shared memory updates
are visible to all the other processes running on
different machines
Strict consistency
 Strongest form of consistency.
 All write operations are visible to all processes.
Sequential consistency
 All processors in the system observe the same
ordering of reads and writes which are issued in
sequence by the individual processors
Causal consistency
 Weakening of sequential consistency for
better concurrency
 Causally related operation is the one which
has influenced the other operation
PRAM consistency
 Pipelined Random Access Memory consistency
 Write operations performed by different processes may
be seen by different processes in different orders
 All write operations of a single process are pipelined
 Simple, easy to implement and has good performance.
Processor consistency
 Adheres to the PRAM consistency
 Constraint on memory coherence
 Order in which the memory operations
are seen by two processors need not be
identical, but the order of writes issued
by each processor must be preserved
Weak consistency
 Use a special variable called the
synchronization variable.
 Very difficult to show and keep track of the changes at
time to time.
Properties of the weak
consistency model:
 Access to synchronization variables is
sequentially consistent.
 Only when all previous writes are
completed everywhere, access to
synchronizations variable is allowed.
 Until all previous accesses to
synchronization variables are performed,
no read write data access operations will
be allowed.
Entry consistency
• Use acquire and release at the start and
end of each critical section, respectively.
• Each ordinary shared variable is
associated with some synchronization
variable such as a lock or barrier.
• Entry consistency (EC) is similar to LRC
but more relaxed; shared data is explicitly
associated with synchronization primitives
and is made consistent when such an
operation is performed
Scope consistency
 A scope is a limited view of memory with
respect to which memory references are
performed
Coherence protocols
 Specifies how the rules set by the
memory consistency model are to be
implemented
Coherence algorithms
 Maintain consistency among replicas
Thank you <./.>

More Related Content

What's hot

distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memoryAshish Kumar
 
Distributed Shared Memory Systems
Distributed Shared Memory SystemsDistributed Shared Memory Systems
Distributed Shared Memory SystemsAnkit Gupta
 
Multiprocessor Architecture (Advanced computer architecture)
Multiprocessor Architecture  (Advanced computer architecture)Multiprocessor Architecture  (Advanced computer architecture)
Multiprocessor Architecture (Advanced computer architecture)vani261
 
Shared-Memory Multiprocessors
Shared-Memory MultiprocessorsShared-Memory Multiprocessors
Shared-Memory MultiprocessorsSalvatore La Bua
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed SystemsDilum Bandara
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed SystemSunita Sahu
 
Load balancing in Distributed Systems
Load balancing in Distributed SystemsLoad balancing in Distributed Systems
Load balancing in Distributed SystemsRicha Singh
 
Distributed Shared Memory Systems
Distributed Shared Memory SystemsDistributed Shared Memory Systems
Distributed Shared Memory SystemsArush Nagpal
 
Introduction to Parallel Computing
Introduction to Parallel ComputingIntroduction to Parallel Computing
Introduction to Parallel ComputingAkhila Prabhakaran
 
Distributed File System
Distributed File SystemDistributed File System
Distributed File SystemNtu
 
Distributed Operating Systems
Distributed Operating SystemsDistributed Operating Systems
Distributed Operating SystemsUmmiya Mohammedi
 
Parallel computing
Parallel computingParallel computing
Parallel computingVinay Gupta
 
Foult Tolerence In Distributed System
Foult Tolerence In Distributed SystemFoult Tolerence In Distributed System
Foult Tolerence In Distributed SystemRajan Kumar
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems SHATHAN
 
File replication
File replicationFile replication
File replicationKlawal13
 
Distributed process and scheduling
Distributed process and scheduling Distributed process and scheduling
Distributed process and scheduling SHATHAN
 

What's hot (20)

Replication in Distributed Systems
Replication in Distributed SystemsReplication in Distributed Systems
Replication in Distributed Systems
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
 
Distributed Shared Memory Systems
Distributed Shared Memory SystemsDistributed Shared Memory Systems
Distributed Shared Memory Systems
 
Multiprocessor Architecture (Advanced computer architecture)
Multiprocessor Architecture  (Advanced computer architecture)Multiprocessor Architecture  (Advanced computer architecture)
Multiprocessor Architecture (Advanced computer architecture)
 
Distributed system
Distributed systemDistributed system
Distributed system
 
Parallel computing persentation
Parallel computing persentationParallel computing persentation
Parallel computing persentation
 
Shared-Memory Multiprocessors
Shared-Memory MultiprocessorsShared-Memory Multiprocessors
Shared-Memory Multiprocessors
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
 
Load balancing in Distributed Systems
Load balancing in Distributed SystemsLoad balancing in Distributed Systems
Load balancing in Distributed Systems
 
chapter 2 architecture
chapter 2 architecturechapter 2 architecture
chapter 2 architecture
 
Distributed Shared Memory Systems
Distributed Shared Memory SystemsDistributed Shared Memory Systems
Distributed Shared Memory Systems
 
Introduction to Parallel Computing
Introduction to Parallel ComputingIntroduction to Parallel Computing
Introduction to Parallel Computing
 
Distributed File System
Distributed File SystemDistributed File System
Distributed File System
 
Distributed Operating Systems
Distributed Operating SystemsDistributed Operating Systems
Distributed Operating Systems
 
Parallel computing
Parallel computingParallel computing
Parallel computing
 
Foult Tolerence In Distributed System
Foult Tolerence In Distributed SystemFoult Tolerence In Distributed System
Foult Tolerence In Distributed System
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems
 
File replication
File replicationFile replication
File replication
 
Distributed process and scheduling
Distributed process and scheduling Distributed process and scheduling
Distributed process and scheduling
 

Similar to Distributed Shared Memory

Similar to Distributed Shared Memory (20)

Chap 4
Chap 4Chap 4
Chap 4
 
Lecture 6
Lecture  6Lecture  6
Lecture 6
 
Lecture 6
Lecture  6Lecture  6
Lecture 6
 
Lecture 6
Lecture  6Lecture  6
Lecture 6
 
Pram model
Pram modelPram model
Pram model
 
Symmetric multiprocessing and Microkernel
Symmetric multiprocessing and MicrokernelSymmetric multiprocessing and Microkernel
Symmetric multiprocessing and Microkernel
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Parallel processing Concepts
Parallel processing ConceptsParallel processing Concepts
Parallel processing Concepts
 
Parallel Processing (Part 2)
Parallel Processing (Part 2)Parallel Processing (Part 2)
Parallel Processing (Part 2)
 
message passing vs shared memory
message passing vs shared memorymessage passing vs shared memory
message passing vs shared memory
 
Shared memory Parallelism (NOTES)
Shared memory Parallelism (NOTES)Shared memory Parallelism (NOTES)
Shared memory Parallelism (NOTES)
 
22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
Non-Uniform Memory Access ( NUMA)
Non-Uniform Memory Access ( NUMA)Non-Uniform Memory Access ( NUMA)
Non-Uniform Memory Access ( NUMA)
 
Multiprocessor Scheduling
Multiprocessor SchedulingMultiprocessor Scheduling
Multiprocessor Scheduling
 
Overview of Distributed Systems
Overview of Distributed SystemsOverview of Distributed Systems
Overview of Distributed Systems
 
Intro_ppt.pptx
Intro_ppt.pptxIntro_ppt.pptx
Intro_ppt.pptx
 
Parallel Processing Presentation2
Parallel Processing Presentation2Parallel Processing Presentation2
Parallel Processing Presentation2
 
New microsoft office word document
New microsoft office word documentNew microsoft office word document
New microsoft office word document
 
Distributed Shared Memory-jhgfdsserty.pdf
Distributed Shared Memory-jhgfdsserty.pdfDistributed Shared Memory-jhgfdsserty.pdf
Distributed Shared Memory-jhgfdsserty.pdf
 
Underlying principles of parallel and distributed computing
Underlying principles of parallel and distributed computingUnderlying principles of parallel and distributed computing
Underlying principles of parallel and distributed computing
 

Recently uploaded

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 

Recently uploaded (20)

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 

Distributed Shared Memory

  • 1.
  • 2. Basic Concepts Of DSM:  A DSM system provides a logical abstraction of shared memory which is built using a set of interconnected nodes having physically distributed memories.
  • 3. Types of DSMs  Hardware level DSM  Software level DSM  Hybrid level DSM
  • 4. Advantages of DSM  Simple abstraction  Improved portability of distributed application programs  Provides better performance in some applications  Large memory space at no extra cost  Better than message passing systems
  • 5. Hardware architectures  On chip memory  Bus based multiprocessor  Ring based multiprocessor  Switched multiprocessor
  • 6. On chip memory In this CPU portion of the chip has a address and data lines that directly connect to the memory portion. Such chips are used in cars appliances and even toys
  • 7. Bus based multiprocessor All CPUs connected to one bus (backplane) Memory and peripherals are accessed via shared bus. System looks the same from any processor.
  • 8. Ring DSM architecture  Shred memory :  Private areas  Shared areas
  • 10. Switched multiprocessor:  Multiple clusters interconnected by a bus offer better scalability  Example : Dash system
  • 11. NUMA Multiprocessor  Non-uniform memory access (NUMA) is a computer memory design used multiprocessing, where the memory access time depends on the memory location relative to the processor.  Under NUMA, a processor can access its own local memory faster than non-local memory.  The benefits of NUMA are limited to particular workloads, notably on servers where the data is often associated strongly with certain tasks or users.
  • 12. UMA Multiprocessor  Uniform memory access (UMA) is a shared memory architecture used in parallel computers. All theprocessors in the UMA model share the physical memoryuniformly.  In a UMA architecture, access time to a memory location is independent of which processor makes the request or which memory chip contains the transferred data.  Uniform memory access computer architectures are often contrasted with non-uniform memory access (NUMA) architectures.  In the UMA architecture, each processor may use a private cache. Peripherals are also shared in some fashion.  The UMA model is suitable for general purpose and time sharing applications by multiple users. It can be used to speed up the execution of a single large program in time- critical applications.
  • 13.
  • 14. DSM design issues  Granularity of sharing  Structure of data  Consistency models  Coherence protocols
  • 16. Thrashing:  False sharing  Techniques to reduce thrashing:  Application controlled lock  Pin the block to a node for specific time  Customize algorithm to shared data usage pattern
  • 17. DSM structure  Organization of data items in the shared memory
  • 18. Consistency models  Refers to how recent the shared memory updates are visible to all the other processes running on different machines
  • 19. Strict consistency  Strongest form of consistency.  All write operations are visible to all processes.
  • 20. Sequential consistency  All processors in the system observe the same ordering of reads and writes which are issued in sequence by the individual processors
  • 21. Causal consistency  Weakening of sequential consistency for better concurrency  Causally related operation is the one which has influenced the other operation
  • 22. PRAM consistency  Pipelined Random Access Memory consistency  Write operations performed by different processes may be seen by different processes in different orders  All write operations of a single process are pipelined  Simple, easy to implement and has good performance.
  • 23. Processor consistency  Adheres to the PRAM consistency  Constraint on memory coherence  Order in which the memory operations are seen by two processors need not be identical, but the order of writes issued by each processor must be preserved
  • 24. Weak consistency  Use a special variable called the synchronization variable.  Very difficult to show and keep track of the changes at time to time.
  • 25. Properties of the weak consistency model:  Access to synchronization variables is sequentially consistent.  Only when all previous writes are completed everywhere, access to synchronizations variable is allowed.  Until all previous accesses to synchronization variables are performed, no read write data access operations will be allowed.
  • 26. Entry consistency • Use acquire and release at the start and end of each critical section, respectively. • Each ordinary shared variable is associated with some synchronization variable such as a lock or barrier. • Entry consistency (EC) is similar to LRC but more relaxed; shared data is explicitly associated with synchronization primitives and is made consistent when such an operation is performed
  • 27. Scope consistency  A scope is a limited view of memory with respect to which memory references are performed
  • 28. Coherence protocols  Specifies how the rules set by the memory consistency model are to be implemented
  • 29. Coherence algorithms  Maintain consistency among replicas