SlideShare a Scribd company logo
Distributed Shared Memory
Basic Concepts Of DSM:
 A DSM system provides a logical abstraction
of shared memory which is built using a set
of interconnected nodes having physically
distributed memories.
Types of DSMs
 Hardware level DSM
 Software level DSM
 Hybrid level DSM
Advantages of DSM
 Simple abstraction
 Improved portability of distributed
application programs
 Provides better performance in some
applications
 Large memory space at no extra cost
 Better than message passing systems
Hardware architectures
 On chip memory
 Bus based multiprocessor
 Ring based multiprocessor
 Switched multiprocessor
On chip memory
In this CPU portion of the chip has a address and data lines that directly
connect to the memory portion.
Such chips are used in cars appliances and even toys
Bus based multiprocessor
All CPUs connected to one bus (backplane)
Memory and peripherals are accessed via shared bus. System looks the
same from any processor.
Ring DSM architecture
 Shred memory :
 Private areas
 Shared areas
(Ring) Memnet: Node memory
Switched multiprocessor:
 Multiple clusters interconnected by a bus offer better
scalability
 Example : Dash system
NUMA Multiprocessor
 Non-uniform memory access (NUMA) is a
computer memory design used multiprocessing,
where the memory access time depends on the
memory location relative to the processor.
 Under NUMA, a processor can access its own
local memory faster than non-local memory.
 The benefits of NUMA are limited to particular
workloads, notably on servers where the data is
often associated strongly with certain tasks or
users.
UMA Multiprocessor
 Uniform memory access (UMA) is a shared memory
architecture used in parallel computers. All theprocessors
in the UMA model share the physical memoryuniformly.
 In a UMA architecture, access time to a memory location
is independent of which processor makes the request or
which memory chip contains the transferred data.
 Uniform memory access computer architectures are often
contrasted with non-uniform memory access (NUMA)
architectures.
 In the UMA architecture, each processor may use a
private cache. Peripherals are also shared in some
fashion.
 The UMA model is suitable for general purpose and time
sharing applications by multiple users. It can be used to
speed up the execution of a single large program in time-
critical applications.
Distributed Shared Memory
DSM design issues
 Granularity of sharing
 Structure of data
 Consistency models
 Coherence protocols
Granularity
 False sharing
 Thrashing
Thrashing:
 False sharing
 Techniques to reduce
thrashing:
 Application controlled lock
 Pin the block to a node for
specific time
 Customize algorithm to
shared data usage pattern
DSM structure
 Organization of data items in the shared
memory
Consistency models
 Refers to how recent the shared memory updates
are visible to all the other processes running on
different machines
Strict consistency
 Strongest form of consistency.
 All write operations are visible to all processes.
Sequential consistency
 All processors in the system observe the same
ordering of reads and writes which are issued in
sequence by the individual processors
Causal consistency
 Weakening of sequential consistency for
better concurrency
 Causally related operation is the one which
has influenced the other operation
PRAM consistency
 Pipelined Random Access Memory consistency
 Write operations performed by different processes may
be seen by different processes in different orders
 All write operations of a single process are pipelined
 Simple, easy to implement and has good performance.
Processor consistency
 Adheres to the PRAM consistency
 Constraint on memory coherence
 Order in which the memory operations
are seen by two processors need not be
identical, but the order of writes issued
by each processor must be preserved
Weak consistency
 Use a special variable called the
synchronization variable.
 Very difficult to show and keep track of the changes at
time to time.
Properties of the weak
consistency model:
 Access to synchronization variables is
sequentially consistent.
 Only when all previous writes are
completed everywhere, access to
synchronizations variable is allowed.
 Until all previous accesses to
synchronization variables are performed,
no read write data access operations will
be allowed.
Entry consistency
• Use acquire and release at the start and
end of each critical section, respectively.
• Each ordinary shared variable is
associated with some synchronization
variable such as a lock or barrier.
• Entry consistency (EC) is similar to LRC
but more relaxed; shared data is explicitly
associated with synchronization primitives
and is made consistent when such an
operation is performed
Scope consistency
 A scope is a limited view of memory with
respect to which memory references are
performed
Coherence protocols
 Specifies how the rules set by the
memory consistency model are to be
implemented
Coherence algorithms
 Maintain consistency among replicas
Thank you <./.>

More Related Content

PDF
Resource management
PPTX
INTER PROCESS COMMUNICATION (IPC).pptx
PPT
Types of Load distributing algorithm in Distributed System
PPTX
Models of Distributed System
PDF
CS9222 ADVANCED OPERATING SYSTEMS
PPTX
Distributed concurrency control
PPT
distributed shared memory
PPTX
Database , 8 Query Optimization
Resource management
INTER PROCESS COMMUNICATION (IPC).pptx
Types of Load distributing algorithm in Distributed System
Models of Distributed System
CS9222 ADVANCED OPERATING SYSTEMS
Distributed concurrency control
distributed shared memory
Database , 8 Query Optimization

What's hot (20)

PPT
System models in distributed system
ODP
Distributed shared memory shyam soni
PDF
Processes and Processors in Distributed Systems
PPTX
Inter Process Communication
PPTX
Query processing in Distributed Database System
PPTX
Distributed shred memory architecture
PPTX
Transactions and Concurrency Control
PDF
Memory management
PDF
8. mutual exclusion in Distributed Operating Systems
PDF
Major and Minor Elements of Object Model
PPT
Distributed System-Multicast & Indirect communication
PPTX
Distributed transaction
PPTX
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
PDF
CS9222 ADVANCED OPERATING SYSTEMS
DOCX
Group Communication in distributed Systems.docx
PPTX
Matching techniques
PDF
“Understanding Distributed Deadlocks: Causes, Detection
PDF
CS6601 DISTRIBUTED SYSTEMS
PPT
File models and file accessing models
PPTX
Optimistic concurrency control in Distributed Systems
System models in distributed system
Distributed shared memory shyam soni
Processes and Processors in Distributed Systems
Inter Process Communication
Query processing in Distributed Database System
Distributed shred memory architecture
Transactions and Concurrency Control
Memory management
8. mutual exclusion in Distributed Operating Systems
Major and Minor Elements of Object Model
Distributed System-Multicast & Indirect communication
Distributed transaction
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
CS9222 ADVANCED OPERATING SYSTEMS
Group Communication in distributed Systems.docx
Matching techniques
“Understanding Distributed Deadlocks: Causes, Detection
CS6601 DISTRIBUTED SYSTEMS
File models and file accessing models
Optimistic concurrency control in Distributed Systems
Ad

Similar to Distributed Shared Memory (20)

PPTX
6.distributed shared memory
PDF
Distributed Shared Memory-jhgfdsserty.pdf
DOCX
Distributed system unit II according to syllabus of RGPV, Bhopal
PPTX
Distributed Shared Memory Systems
PPTX
Distributed Shared Memory Systems
PPTX
PPTX
Distributed shared memory ch 5
PPT
Chap 4
PPTX
Distributed Shared Memory notes in distributed systems.pptx
PPT
Executing Multiple Thread on Modern Processor
PPTX
Multiprocessors and Thread-Level Parallelism.pptx
PPT
Sequential consistency model
PPTX
Dos unit3
PPT
Dsm (Distributed computing)
PDF
Week5
PDF
KA 5 - Lecture 1 - Parallel Processing.pdf
PPTX
Introduction to Thread Level Parallelism
PPTX
PPTX
DOCX
MC0085 – Advanced Operating Systems - Master of Computer Science - MCA - SMU DE
6.distributed shared memory
Distributed Shared Memory-jhgfdsserty.pdf
Distributed system unit II according to syllabus of RGPV, Bhopal
Distributed Shared Memory Systems
Distributed Shared Memory Systems
Distributed shared memory ch 5
Chap 4
Distributed Shared Memory notes in distributed systems.pptx
Executing Multiple Thread on Modern Processor
Multiprocessors and Thread-Level Parallelism.pptx
Sequential consistency model
Dos unit3
Dsm (Distributed computing)
Week5
KA 5 - Lecture 1 - Parallel Processing.pdf
Introduction to Thread Level Parallelism
MC0085 – Advanced Operating Systems - Master of Computer Science - MCA - SMU DE
Ad

Recently uploaded (20)

PDF
Digital Logic Computer Design lecture notes
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Welding lecture in detail for understanding
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Well-logging-methods_new................
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Foundation to blockchain - A guide to Blockchain Tech
Digital Logic Computer Design lecture notes
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Welding lecture in detail for understanding
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Structs to JSON How Go Powers REST APIs.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Lecture Notes Electrical Wiring System Components
Model Code of Practice - Construction Work - 21102022 .pdf
UNIT 4 Total Quality Management .pptx
Arduino robotics embedded978-1-4302-3184-4.pdf
Internet of Things (IOT) - A guide to understanding
Well-logging-methods_new................
CYBER-CRIMES AND SECURITY A guide to understanding
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Foundation to blockchain - A guide to Blockchain Tech

Distributed Shared Memory

  • 2. Basic Concepts Of DSM:  A DSM system provides a logical abstraction of shared memory which is built using a set of interconnected nodes having physically distributed memories.
  • 3. Types of DSMs  Hardware level DSM  Software level DSM  Hybrid level DSM
  • 4. Advantages of DSM  Simple abstraction  Improved portability of distributed application programs  Provides better performance in some applications  Large memory space at no extra cost  Better than message passing systems
  • 5. Hardware architectures  On chip memory  Bus based multiprocessor  Ring based multiprocessor  Switched multiprocessor
  • 6. On chip memory In this CPU portion of the chip has a address and data lines that directly connect to the memory portion. Such chips are used in cars appliances and even toys
  • 7. Bus based multiprocessor All CPUs connected to one bus (backplane) Memory and peripherals are accessed via shared bus. System looks the same from any processor.
  • 8. Ring DSM architecture  Shred memory :  Private areas  Shared areas
  • 10. Switched multiprocessor:  Multiple clusters interconnected by a bus offer better scalability  Example : Dash system
  • 11. NUMA Multiprocessor  Non-uniform memory access (NUMA) is a computer memory design used multiprocessing, where the memory access time depends on the memory location relative to the processor.  Under NUMA, a processor can access its own local memory faster than non-local memory.  The benefits of NUMA are limited to particular workloads, notably on servers where the data is often associated strongly with certain tasks or users.
  • 12. UMA Multiprocessor  Uniform memory access (UMA) is a shared memory architecture used in parallel computers. All theprocessors in the UMA model share the physical memoryuniformly.  In a UMA architecture, access time to a memory location is independent of which processor makes the request or which memory chip contains the transferred data.  Uniform memory access computer architectures are often contrasted with non-uniform memory access (NUMA) architectures.  In the UMA architecture, each processor may use a private cache. Peripherals are also shared in some fashion.  The UMA model is suitable for general purpose and time sharing applications by multiple users. It can be used to speed up the execution of a single large program in time- critical applications.
  • 14. DSM design issues  Granularity of sharing  Structure of data  Consistency models  Coherence protocols
  • 16. Thrashing:  False sharing  Techniques to reduce thrashing:  Application controlled lock  Pin the block to a node for specific time  Customize algorithm to shared data usage pattern
  • 17. DSM structure  Organization of data items in the shared memory
  • 18. Consistency models  Refers to how recent the shared memory updates are visible to all the other processes running on different machines
  • 19. Strict consistency  Strongest form of consistency.  All write operations are visible to all processes.
  • 20. Sequential consistency  All processors in the system observe the same ordering of reads and writes which are issued in sequence by the individual processors
  • 21. Causal consistency  Weakening of sequential consistency for better concurrency  Causally related operation is the one which has influenced the other operation
  • 22. PRAM consistency  Pipelined Random Access Memory consistency  Write operations performed by different processes may be seen by different processes in different orders  All write operations of a single process are pipelined  Simple, easy to implement and has good performance.
  • 23. Processor consistency  Adheres to the PRAM consistency  Constraint on memory coherence  Order in which the memory operations are seen by two processors need not be identical, but the order of writes issued by each processor must be preserved
  • 24. Weak consistency  Use a special variable called the synchronization variable.  Very difficult to show and keep track of the changes at time to time.
  • 25. Properties of the weak consistency model:  Access to synchronization variables is sequentially consistent.  Only when all previous writes are completed everywhere, access to synchronizations variable is allowed.  Until all previous accesses to synchronization variables are performed, no read write data access operations will be allowed.
  • 26. Entry consistency • Use acquire and release at the start and end of each critical section, respectively. • Each ordinary shared variable is associated with some synchronization variable such as a lock or barrier. • Entry consistency (EC) is similar to LRC but more relaxed; shared data is explicitly associated with synchronization primitives and is made consistent when such an operation is performed
  • 27. Scope consistency  A scope is a limited view of memory with respect to which memory references are performed
  • 28. Coherence protocols  Specifies how the rules set by the memory consistency model are to be implemented
  • 29. Coherence algorithms  Maintain consistency among replicas