Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Concurrent queue access control method and system based on task eavesdropping

An access control and queue technology, applied in the access control field of concurrent queues, can solve problems such as performance reduction and high overhead, and achieve the effect of good performance and good scalability

Inactive Publication Date: 2014-11-19
凯习(北京)信息科技有限公司
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem that the overhead of the parallel random access mechanism is too large when scheduling double-ended queues, resulting in performance degradation, the present invention proposes a concurrent queue access control method based on task stealing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Concurrent queue access control method and system based on task eavesdropping
  • Concurrent queue access control method and system based on task eavesdropping
  • Concurrent queue access control method and system based on task eavesdropping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] By applying the access control method of the concurrent queue access control strategy PDACS in the parallel platform Cilk of shared memory multiprocessors, and making a comparative experiment with the original Cilk parallel platform, the experimental test set adopts the standard test set of MIT Cilk, and the experimental environment platform is a An Inspur server with an intel xeon phi 7110P series processor has a total of 61 processor cores. After enabling CPU hyperthreading, it has a total of 244 logical processor cores, which can support concurrent execution of 244 physical threads. Server operation The system is RedHat Linux 6.3.

[0064]Use the MIT Cilk test program to test the execution time of the test program on the Cilk parallel platform and the PDACS parallel platform under 244 threads respectively. The compiler used when compiling the test program is For C++ Composer XE 2013 SP1, the compile-time optimization level option is -O2. The test results show that t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a concurrent queue access control method and system based on task eavesdropping. The concurrent queue access control system based on task eavesdropping comprises a safe access module (1), a concurrent access degree monitoring module (2), a task scheduling module (3) and a prediction module (4). By means of the method, operations of double-end queues are separated from access control, a queue concurrent access degree monitoring mechanism is built, in the task eavesdropping process, the queues are dynamically selected in a self-adaptation mode for operation according to the queue concurrent access degree, accordingly concurrent access of the double-end queues is evenly distributed to the double-end queues, and thread safety of execution operations of the double-end queues is guaranteed in a blocking mode in terms of access of each double-end queue. The method supports different task eavesdropping strategies, and as for applications using task eavesdropping and operating on a concurrent random access machine, a higher throughput rate and the acceleration effect are achieved.

Description

technical field [0001] The present invention relates to an operation method of a task scheduler in a multi-core and many-core processor, more particularly, refers to an access control method based on a task-stealing concurrent queue, and the access control runs on the task scheduler middle. Background technique [0002] A task scheduler is usually the best way to improve performance with threads. The task scheduler is suitable for high-performance algorithms composed of multiple non-blocking tasks. If the task blocks only occasionally, it will still work fine. However, if frequent blocking is required in the thread, then using the task scheduler will incur a performance penalty, because the processor cannot do any work while the task is blocked. [0003] Under the existing multi-core processors, task stealing (work stealing) has been proved to be an effective way to schedule parallel programs, and it is a commonly used technology to achieve load balancing (load balancing)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/46
Inventor 刘轶刘驰宋平
Owner 凯习(北京)信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products