Data Prefetch Mechanisms

Steven P. Vanderwiel, David J. Lilja

Research output: Contribution to journalArticlepeer-review

203 Scopus citations

Abstract

The expanding gap between microprocessor and DRAM performance has necessitated the use of increasingly aggressive techniques designed to reduce or hide the latency of main memory access. Although large cache hierarchies have proven to be effective in reducing this latency for the most frequently used data, it is still not uncommon for many programs to spend more than half their run times stalled on memory requests. Data prefetching has been proposed as a technique for hiding the access latency of data referencing patterns that defeat caching strategies. Rather than waiting for a cache miss to initiate a memory fetch, data prefetching anticipates such misses and issues a fetch to the memory system in advance of the actual memory reference. To be effective, prefetching must be implemented in such a way that prefetches are timely, useful, and introduce little overhead. Secondary effects such as cache pollution and increased memory bandwidth requirements must also be taken into consideration. Despite these obstacles, prefetching has the potential to significantly improve overall program execution time by overlapping computation with memory accesses. Prefetching strategies are diverse, and no single strategy has yet been proposed that provides optimal performance. The following survey examines several alternative approaches, and discusses the design tradeoffs involved when implementing a data prefetch strategy. Categories and Subject Descriptors: B.3.2 [Memory Structures]: Design Styles— Cache memories; B.3 [Hardware]: Memory Structures.

Original languageEnglish (US)
Pages (from-to)174-199
Number of pages26
JournalACM Computing Surveys
Volume32
Issue number2
DOIs
StatePublished - Jun 1 2000
Externally publishedYes

Keywords

  • Design
  • Memory latency
  • Performance
  • prefetching

Fingerprint

Dive into the research topics of 'Data Prefetch Mechanisms'. Together they form a unique fingerprint.

Cite this