Unlock instant, AI-driven research and patent intelligence for your innovation.

Data access control method and node controller

A data access control and node controller technology, applied in the computer field, can solve problems affecting CPU access efficiency and low processing efficiency, and achieve the effect of saving processing and improving access efficiency

Active Publication Date: 2017-06-09
DATANG MOBILE COMM EQUIP CO LTD
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The directory consistency protocol is very effective for a large number of shared data accesses within symmetric multi-core processors, but for heterogeneous multi-core processors, the processing efficiency is low
[0004] When heterogeneous multi-core processors are generally applied, each core is relatively independent, and there is less data interacted or shared between the cores. If all data must be processed through the above-mentioned tedious directory consistency process, it will bring a lot of unnecessary processing and Delay affects CPU access efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access control method and node controller
  • Data access control method and node controller
  • Data access control method and node controller

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] The embodiment of the present invention proposes a data access control method, figure 1 A flowchart showing a data access control method provided by an embodiment of the present invention, see figure 1 , the method includes the following steps:

[0058] Step 101: When receiving an access request for accessing certain data sent by the first node, the first node controller obtains the data attribute of the data to be accessed according to the access request.

[0059] In this step, the data attributes include shared data and private data. Wherein, the shared data means that besides the node where the data is located, there are other nodes that can read and / or update the data. Private data means that only the node where the data resides can read and / or update the data.

[0060] Step 102: The first node controller determines the processing mode of the access request according to the data attribute of the data to be accessed.

[0061] In this step, according to the data a...

Embodiment 2

[0068] In the embodiment of the present invention, a specific implementation manner of obtaining the data attribute of the data to be accessed in the above step 101 is given.

[0069] In this embodiment, the above step A1, obtaining the data attributes of the data to be accessed according to the access request includes:

[0070] According to the virtual address of the data to be accessed carried in the access request, the first node controller obtains the data attribute corresponding to the data to be accessed from the preset memory page table; wherein, the preset memory page table pre-stores There is a one-to-one correspondence between virtual addresses and data attributes; the access request carries the virtual address of the data to be accessed.

[0071] Among them, modern processors generally support memory protection mode, that is, each load and store instruction will be translated by the memory page table TLB (Translation Lookaside Buffer), which is responsible for conve...

Embodiment 3

[0074] In the embodiment of the present invention, a specific implementation process of the above step A1 is given.

[0075] In this embodiment, the above step A1: when the data attribute of the data to be accessed is private data, the first node controller sends an access request to the processor storage controller where the first node is located to request storage The controller assists in the access process of this data, including:

[0076] a11: When the data attribute of the data to be accessed is private data, if the first node controller determines that the access type of the first node to the data to be accessed is a read operation, and the data to be accessed does not exist in the cache of the first node , then send an access request for reading the data to be accessed to the storage controller of the processor where the first node is located; and receive the access data sent by the storage controller, the access data is the storage controller according to the access ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data access control method and a node controller. The data access control method includes that a firs node controller acquires data attributes of to-be-accessed data when receiving an access request accessing specific data sent by first nodes; the first node controller determines an access request handling mode according to the data attributes of the to-be-accessed data; when the to-be-accessed data refer to private data, the first node controller sends an access request accessing such data to a storage controller of a processor where the first nodes are positioned so as to request that the storage controller assists to complete a data access process; when the to-be-accessed data refer to shared data, the first node controller sends an access request accessing such data to a major node of the first nodes so as to request that the major node of the first nodes assists in completion of the data access process. The data access control method has the advantages that as for a heterogeneous multi-core processor, unnecessary processing processes are omitted effectively and data access efficiency is improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a data access control method and a node controller. Background technique [0002] The basic idea of ​​the directory consistency protocol is to maintain a directory entry for each memory row, which is used to record the number of the core (Core) that owns the copy of the memory row and the corresponding status and control information. According to the mapping and distribution of addresses, each memory row Each has a corresponding host (Home Core) node location. When a core in the processor needs to cooperate and communicate with other cores of the processor to complete the access to the Cache data, the request is first sent to the host node, and the HomeCore node decides this "multicast" according to the status content in the directory. "The cores that need to be notified, and then send the corresponding request to these relevant cores. [0003] The directory consistency proto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F15/167
CPCG06F15/167
Inventor 韩毅宏
Owner DATANG MOBILE COMM EQUIP CO LTD