Current Search: Cache memory (x)
View All Items
- Title
- Design and implementation of a test bed for proxy caching algorithms.
- Creator
- Sareen, Ashi., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With the growth of the Internet and increasing, network traffic, latency has become a major issue. On the entrepreneur side bandwidth is a bottleneck. Web Caching helps to resolve both these issues. In recent years, many proxy caching algorithms and benchmarks to test them have been implemented. In this thesis, some of the existing proxy caching algorithms and related benchmarks have been examined. It has been observed that most of the benchmarks do not provide the developer/entrepreneur a...
Show moreWith the growth of the Internet and increasing, network traffic, latency has become a major issue. On the entrepreneur side bandwidth is a bottleneck. Web Caching helps to resolve both these issues. In recent years, many proxy caching algorithms and benchmarks to test them have been implemented. In this thesis, some of the existing proxy caching algorithms and related benchmarks have been examined. It has been observed that most of the benchmarks do not provide the developer/entrepreneur a customized environment to debug or deploy a proxy caching algorithm. Hence, this thesis implements a platform independent, easily extensible Test Bed that can be tailored to satisfy the needs of both the developers and the entrepreneurs. The thesis also implements two standard caching algorithms. To illustrate the application of the Test Bed, these algorithms are run on the Test Bed and results obtained are analyzed. Some of the results are then compared to existing behavioral patterns.
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/12857
- Subject Headings
- Cache memory, Web servers
- Format
- Document (PDF)
- Title
- A memory-efficient directory-based cache coherence scheme for large-scale multiprocessors.
- Creator
- Heragu, Sampath C., Florida Atlantic University, Mahgoub, Imad
- Abstract/Description
-
Caches are used in shared memory multiprocessors to reduce the effective memory latency, and network and memory bandwidth requirements. But the data spreading across the caches leads to the cache coherence problem. In this thesis, a new directory based cache coherence scheme, called the cache-vector protocol, is proposed and evaluated. The said scheme entails a low memory overhead but delivers a performance that is very close to that of the scheme proposed by Censier and Feautrier (3), which...
Show moreCaches are used in shared memory multiprocessors to reduce the effective memory latency, and network and memory bandwidth requirements. But the data spreading across the caches leads to the cache coherence problem. In this thesis, a new directory based cache coherence scheme, called the cache-vector protocol, is proposed and evaluated. The said scheme entails a low memory overhead but delivers a performance that is very close to that of the scheme proposed by Censier and Feautrier (3), which offers the best performance of all the directory based schemes. The performance of the cache-vector protocol is evaluated using trace-driven simulation. A figure of merit which takes into account the average memory latency, network traffic and the hardware overhead is introduced and used as the basis of comparison between the two schemes. The simulation results indicate that the cache-vector protocol is a viable solution to the cache coherence problem in large scale multiprocessors.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/15163
- Subject Headings
- Cache memory, Multiprocessors, Memory hierarchy (Computer science)
- Format
- Document (PDF)
- Title
- Correctness analysis of cache conherence protocols using Petri nets.
- Creator
- Hassan, Ahmed Kamal., Florida Atlantic University, Mahgoub, Imad
- Abstract/Description
-
The use of cache memories in multiprocessor systems increases the overall systems performance. Caches reduce the amount of network traffic and provide a solution to the memory contention problem. However, caches introduce memory consistency problems. The existence of multiple cache copies of a memory block will result in an inconsistent view of memory if one processor changes a value in its associated cache. Cache coherence protocols are algorithms designed in software or hardware to maintain...
Show moreThe use of cache memories in multiprocessor systems increases the overall systems performance. Caches reduce the amount of network traffic and provide a solution to the memory contention problem. However, caches introduce memory consistency problems. The existence of multiple cache copies of a memory block will result in an inconsistent view of memory if one processor changes a value in its associated cache. Cache coherence protocols are algorithms designed in software or hardware to maintain memory consistency. With the increased complexity of some of the more recent protocols, testing for the correctness of these protocols becomes an issue that requires more elaborate work. In this thesis, correctness analysis of a selected group of representative cache coherence protocols was performed using Petri nets as a modeling and analysis tool. First, the Petri net graphs for these protocols were designed. These graphs were built by following the logical and coherence actions performed by the protocols in response to the different processors' requests that threatens memory consistency. Correctness analysis was then performed on these graphs.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/15366
- Subject Headings
- Cache memory, Multiprocessors, Computer network protocols, Petri nets
- Format
- Document (PDF)
- Title
- An efficient and scalable core allocation strategy for multicore systems.
- Creator
- Rani, Manira S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Multiple threads can run concurrently on multiple cores in a multicore system and improve performance/power ratio. However, effective core allocation in multicore and manycore systems is very challenging. In this thesis, we propose an effective and scalable core allocation strategy for multicore systems to achieve optimal core utilization by reducing both internal and external fragmentations. Our proposed strategy helps evenly spreading the servicing cores on the chip to facilitate better...
Show moreMultiple threads can run concurrently on multiple cores in a multicore system and improve performance/power ratio. However, effective core allocation in multicore and manycore systems is very challenging. In this thesis, we propose an effective and scalable core allocation strategy for multicore systems to achieve optimal core utilization by reducing both internal and external fragmentations. Our proposed strategy helps evenly spreading the servicing cores on the chip to facilitate better heat dissipation. We introduce a multi-stage power management scheme to reduce the total power consumption by managing the power states of the cores. We simulate three multicore systems, with 16, 32, and 64 cores, respectively, using synthetic workload. Experimental results show that our proposed strategy performs better than Square-shaped, Rectangle-shaped, L-Shaped, and Hybrid (contiguous and non-contiguous) schemes in multicore systems in terms of fragmentation and completion time. Among these strategies, our strategy provides a better heat dissipation mechanism.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3172698
- Subject Headings
- Modularity (Engineering), Multicasting (Computer networks), Convergence (Telecommunication), Computer architecture, Memory management (Computer science), Cache memory
- Format
- Document (PDF)
- Title
- Intelligent cache management techniques.
- Creator
- Jaouhar, Charif., Florida Atlantic University, Mahgoub, Imad
- Abstract/Description
-
This thesis introduced two allocation schemes for cache memory in multiprogramming environments. The proposed schemes, called static and dynamic cache partitioning, are slight variations of the schemes proposed by Thiebaut and Stone. We developed a trace driven simulation program to study and compare the performance of the proposed schemes to that of the cache sharing and cache flushing schemes. Furthermore, we proposed a new replacement technique that uses some heuristic to detect loop...
Show moreThis thesis introduced two allocation schemes for cache memory in multiprogramming environments. The proposed schemes, called static and dynamic cache partitioning, are slight variations of the schemes proposed by Thiebaut and Stone. We developed a trace driven simulation program to study and compare the performance of the proposed schemes to that of the cache sharing and cache flushing schemes. Furthermore, we proposed a new replacement technique that uses some heuristic to detect loop structures in the reference patterns. Initially, the proposed technique uses the Least Recently Used (LRU) strategy. Once a loop has been detected, all the instructions, which will harm performance if they were to be stored in the cache, will be dynamically excluded from being cached. The LRU strategy will resume as soon as the end of the loop has been detected. We have also developed a simulation program to compare the performance of this scheme to that of other related ones, so as to demonstrate its effectiveness. The results show our scheme outperforms the others, especially when the system references are loop dominated.
Show less - Date Issued
- 1993
- PURL
- http://purl.flvc.org/fcla/dt/14973
- Subject Headings
- Cache memory, Memory hierarchy (Computer science), Integrated circuits--Very large scale integration
- Format
- Document (PDF)
- Title
- Delta service extensions to a mobile file system cache.
- Creator
- Blake, Wil., Florida Atlantic University, Mahgoub, Imad
- Abstract/Description
-
In this thesis, a delta service extends a mobile file system cache in order to minimize the amount of data transferred over wireless communications links. Network bandwidth stands as one of the resource limitations impacting the design of mobile computer applications. At the mobile file system service level, caching and compression provide resource conservation in distributed applications. This thesis proposes a delta service to enhance caching services characteristic of mobile computer file...
Show moreIn this thesis, a delta service extends a mobile file system cache in order to minimize the amount of data transferred over wireless communications links. Network bandwidth stands as one of the resource limitations impacting the design of mobile computer applications. At the mobile file system service level, caching and compression provide resource conservation in distributed applications. This thesis proposes a delta service to enhance caching services characteristic of mobile computer file systems. Well established a mechanisms for sequence comparison and software configuration management, file deltas have applicability to mobile computer and distributed file system caching environments. Study of the delta service uses trace-driven simulation methodology incorporating traces obtained in a real world distributed environment. A mobile computer client cache model will corroborate existing studies regarding suitable cache size for disconnected client operation. A delta service model will extend the mobile computer client cache model of various cache sizes in order to gauge the bandwidth savings on the link obtained by the delta service.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/15233
- Subject Headings
- File organization (Computer science), Computer terminals--Remote terminals, Cache memory, Mobile computing
- Format
- Document (PDF)
- Title
- Improving Privacy With Intelligent Cooperative Caching In Vehicular Ad Hoc Networks.
- Creator
- Glass, Stephen C., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With the issuance of the Notice of Proposed Rule Making (NPRM) for Vehicle to Vehicle (V2V) communications by the United States National Highway Tra c Safety Administration (NHTSA), the goal of the widespread deployment of vehicular networking has taken a signi cant step towards becoming a reality. In order for consumers to accept the technology, it is expected that reasonable mechanisms will be in place to protect their privacy. Cooperative Caching has been proposed as an approach that can...
Show moreWith the issuance of the Notice of Proposed Rule Making (NPRM) for Vehicle to Vehicle (V2V) communications by the United States National Highway Tra c Safety Administration (NHTSA), the goal of the widespread deployment of vehicular networking has taken a signi cant step towards becoming a reality. In order for consumers to accept the technology, it is expected that reasonable mechanisms will be in place to protect their privacy. Cooperative Caching has been proposed as an approach that can be used to improve privacy by distributing data items throughout the mobile network as they are requested. With this approach, vehicles rst attempt to retrieve data items from the mobile network, alleviating the need to send all requests to a centralized location that may be vulnerable to an attack. However, with this approach, a requesting vehicle may expose itself to many unknown vehicles as part of the cache discovery process. In this work we present a Public Key Infrastructure (PKI) based Cooperative Caching system that utilizes a genetic algorithm to selectively choose members of the mobile network to query for data items with a focus on improving overall privacy. The privacy improvement is achieved by avoiding those members that present a greater risk of exposing information related to the request and choosing members that have a greater potential of having the needed data item. An Agent Based Model is utilized to baseline the privacy concerns when using a broadcast based approach to cache discovery. In addition, an epidemiology inspired mathematical model is presented to illustrate the impact of reducing the number of vehicles queried during cache discovery. Periodic reports from neighboring vehicles are used by the genetic algorithm to identify which neighbors should be queried during cache discovery. In order for the system to be realistic, vehicles must trust the information in these reports. A PKI based approach used to evaluate the trustworthiness of each vehicle in the system is also detailed. We have conducted an in-depth performance study of our system that demonstrates a signi cant reduction in the overall risk of exposure when compared to broadcasting the request to all neighbors.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004975, http://purl.flvc.org/fau/fd/FA00004965
- Subject Headings
- Dissertations, Academic -- Florida Atlantic University, Public key infrastructure (Computer security), Privacy., Cache memory., Public key infrastructure (Computer security).
- Format
- Document (PDF)