skip to main content
10.1145/2811411.2811512acmconferencesArticle/Chapter ViewAbstractPublication PagesracsConference Proceedingsconference-collections
research-article

Bypassing method for STT-RAM based inclusive last-level cache

Published: 09 October 2015 Publication History

Abstract

Non-volatile memories (NVMs), such as STT-RAM and PCM, have recently become very competitive designs for last-level caches (LLCs). To avoid cache pollution caused by unnecessary write operations, many cache-bypassing methods have been introduced. Among them, SBAC (a statistics-based cache bypassing method for asymmetric-access caches) is the most recent approach for NVMs and shows the lowest cache access latency. However, SBAC only works on non-inclusive caches, so it is not practical with state-of-the-art processors that employ inclusive LLCs. To overcome this limitation, we propose a novel cache scheme, called inclusive bypass tag cache (IBTC) for NVMs. The proposed IBTC with consideration for the characteristics of NVMs is integrated into LLC to maintain coherence of data in the inclusive LLC with a bypass method and the algorithm is introduced to handle the tag information for bypassed blocks with a minimal storage overhead. Experiments show that IBTC cuts down overall energy consumption by 17.4%, and increases the cache hit rate by 5.1%.

References

[1]
Cortex-a15 processor. http://www.arm.com/products/processors/cortexa/cortex-a15.php. accessed 1-May-2015.
[2]
The intel 64 and ia-32 architectures software developer's manual. http://www.intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-system-programming-manual-325384.pdf. accessed 1-May-2015.
[3]
Spec cpu2006 benchmarks. http://www.specbench.org. accessed 25-Apr-2014.
[4]
R. Balasubramonian, N. P. Jouppi, and N. Muralimanohar. Multi-core cache hierarchies. Synthesis Lectures on Computer Architecture, 6(3):1--153, 2011.
[5]
H. Dybdahl and P. Stenström. Enhancing last-level cache performance by block bypassing and early miss determination. pages 52--66, 2006.
[6]
J. Gaur, M. Chaudhuri, and S. Subramoney. Bypass and insertion algorithms for exclusive last-level caches. ACM SIGARCH Computer Architecture News, 39(3):81--92, 2011.
[7]
S. Gupta, H. Gao, and H. Zhou. Adaptive cache bypassing for inclusive last level caches. In Parallel & Distributed Processing (IPDPS), 2013 IEEE 27th International Symposium on, pages 1243--1253. IEEE, 2013.
[8]
M. Hosomi, H. Yamagishi, T. Yamamoto, K. Bessho, Y. Higo, K. Yamane, H. Yamada, M. Shoji, H. Hachino, C. Fukumoto, et al. A novel nonvolatile memory with spin torque transfer magnetization switching: Spin-ram. In Electron Devices Meeting, 2005. IEDM Technical Digest. IEEE International, pages 459--462. IEEE, 2005.
[9]
M. Kharbutli and D. Solihin. Counter-based cache replacement and bypassing algorithms. Computers, IEEE Transactions on, 57(4):433--447, 2008.
[10]
S. Mittal. A survey of architectural techniques for improving cache power efficiency. Sustainable Computing: Informatics and Systems, 4(1):33--43, 2014.
[11]
J. Power, J. Hestness, M. Orr, M. Hill, and D. Wood. gem5-gpu: A heterogeneous cpu-gpu simulator. 2014.
[12]
A. Sharma. Text book of correlations and regression. Discovery Publishing House, 2005.
[13]
A. F. Vincent, W. S. Zhao, J.-O. Klein, S. Galdin-Retailleau, and D. Querlioz. Monte-carlo simulations of magnetic tunnel junctions: from physics to application. In Computational Electronics (IWCE), 2014 International Workshop on, pages 1--2. IEEE, 2014.
[14]
Y. Wu, R. Rakvic, L.-L. Chen, C.-C. Miao, G. Chrysos, and J. Fang. Compiler managed micro-cache bypassing for high performance epic processors. In Microarchitecture, 2002.(MICRO-35). Proceedings. 35th Annual IEEE/ACM International Symposium on, pages 134--145. IEEE, 2002.
[15]
C. Zhang, G. Sun, P. Li, T. Wang, D. Niu, and Y. Chen. Sbac: a statistics based cache bypassing method for asymmetric-access caches. In Proceedings of the 2014 international symposium on Low power electronics and design, pages 345--350. ACM, 2014.

Cited By

View all
  • (2024)PROLONG: Priority based Write Bypassing Technique for Longer Lifetime in STT-RAM based LLCProceedings of the International Symposium on Memory Systems10.1145/3695794.3695803(89-103)Online publication date: 30-Sep-2024
  • (2022)Exploiting Data Compression for Adaptive Block Placement in Hybrid CachesElectronics10.3390/electronics1102024011:2(240)Online publication date: 12-Jan-2022
  • (2018)An Adjacent-Line-Merging Writeback Scheme for STT-RAM-Based Last-Level CachesIEEE Transactions on Multi-Scale Computing Systems10.1109/TMSCS.2018.28279554:4(593-604)Online publication date: 1-Oct-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
RACS '15: Proceedings of the 2015 Conference on research in adaptive and convergent systems
October 2015
540 pages
ISBN:9781450337380
DOI:10.1145/2811411
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 October 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. bypass algorithm
  2. dynamic energy
  3. non-volatile memories
  4. write endurance

Qualifiers

  • Research-article

Funding Sources

  • Ministry of Education

Conference

RACS '15
Sponsor:

Acceptance Rates

RACS '15 Paper Acceptance Rate 75 of 309 submissions, 24%;
Overall Acceptance Rate 393 of 1,581 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)PROLONG: Priority based Write Bypassing Technique for Longer Lifetime in STT-RAM based LLCProceedings of the International Symposium on Memory Systems10.1145/3695794.3695803(89-103)Online publication date: 30-Sep-2024
  • (2022)Exploiting Data Compression for Adaptive Block Placement in Hybrid CachesElectronics10.3390/electronics1102024011:2(240)Online publication date: 12-Jan-2022
  • (2018)An Adjacent-Line-Merging Writeback Scheme for STT-RAM-Based Last-Level CachesIEEE Transactions on Multi-Scale Computing Systems10.1109/TMSCS.2018.28279554:4(593-604)Online publication date: 1-Oct-2018
  • (2018)Read-Tuned STT-RAM and eDRAM Cache Hierarchies for Throughput and Energy OptimizationIEEE Access10.1109/ACCESS.2018.28136686(14576-14590)Online publication date: 2018
  • (2016)A Survey of Cache Bypassing TechniquesJournal of Low Power Electronics and Applications10.3390/jlpea60200056:2(5)Online publication date: 28-Apr-2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media