HP Vectra XU 6/XXX HP Vectra XU - Guide to Optimizing Performance, Not Orderab - Page 62

The MESI Protocol, Bus Snooping

Page 62 highlights

2 Technical Reference The Intel Pentium Pro Processor If another device in your PC requests this data from memory, the Pentium Pro processor must be able to intercept the request so that it can supply the correct version of the data. To meet this requirement, the Pentium Pro processor uses two cache coherency mechanisms: the MESI (Modified, Exclusive, Shared, Invalid) protocol; and bus snooping. The MESI Protocol The MESI protocol defines the status of data in the cache using four states: Ì Modified - the data is valid, but different to that in memory (the data in memory is invalid) Ì Exclusive - the data is valid and contained in one processor cache only Ì Shared - the data is valid and copies are stored in the caches of different processors Ì Invalid - the data is not valid. Data is stored in cache memories as cache lines of 32-bytes. Associated with each cache line are two status bits which define the MESI state of the cache line. Bus Snooping The Pentium Pro processor monitors accesses to memory by other PC devices (including a second processor, if installed) through bus snooping. This involves intercepting the memory addresses issued by other devices and comparing them with the contents of its cache memories. If bus snooping produces a cache hit, the action taken by the processor will depend on the MESI status of the cache line that produced the hit: for modified cache lines the processor will intervene to update the copy held in main memory; for shared or exclusive cache lines, the processor will need to modify the MESI state of the cache line. 56 English

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75

2
Technical Reference
The Intel Pentium Pro Processor
56
English
If another device in your PC requests this data from memory, the
Pentium Pro processor must be able to intercept the request so that it
can supply the correct version of the data. To meet this requirement,
the Pentium Pro processor uses two cache coherency mechanisms: the
MESI (Modified, Exclusive, Shared, Invalid) protocol; and bus
snooping.
The MESI Protocol
The MESI protocol defines the status of data in the cache using four
states:
Modified
the data is valid, but different to that in memory (the
data in memory is invalid)
Exclusive
the data is valid and contained in one processor cache
only
Shared
the data is valid and copies are stored in the caches of
different processors
Invalid
the data is not valid.
Data is stored in cache memories as cache lines of 32-bytes. Associated
with each cache line are two status bits which define the MESI state of
the cache line.
Bus Snooping
The Pentium Pro processor monitors accesses to memory by other PC
devices (including a second processor, if installed) through bus
snooping. This involves intercepting the memory addresses issued by
other devices and comparing them with the contents of its cache
memories.
If bus snooping produces a cache hit, the action taken by the processor
will depend on the MESI status of the cache line that produced the hit:
for modified cache lines the processor will intervene to update the
copy held in main memory; for shared or exclusive cache lines, the
processor will need to modify the MESI state of the cache line.