Copyright by William Lloyd Bircher 2010 - The Laboratory for ...
Copyright by William Lloyd Bircher 2010 - The Laboratory for ...
Copyright by William Lloyd Bircher 2010 - The Laboratory for ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
power measurement hardware <strong>for</strong> multiple subsystems, measurement need only be<br />
implemented on a single system during the design stage. <strong>The</strong> model is created based on<br />
measurement from a small number of systems which allows power measurement<br />
hardware to be eliminated from the final product.<br />
While the trickle-down approach simplifies power modeling of complete systems it<br />
requires a modest knowledge of subsystem level interaction. <strong>The</strong> effectiveness of the<br />
model at capturing system-level power is determined <strong>by</strong> the selection of comprehensive<br />
per<strong>for</strong>mance events. Some events such as top-level cache or memory accesses are<br />
intuitive. A miss in the first level cache will necessarily generate traffic in higher level<br />
caches and or the memory subsystem. Other events such as those found in I/O devices<br />
are not as obvious. Consider the system diagram in Figure 5.1.<br />
This represents the quad-socket server <strong>for</strong> which the trickle-down modeling approach is<br />
applied. <strong>The</strong> arrows flowing outward from the processor represent events that originate<br />
in the processor and trickle-down to other subsystems (L3 Miss, TLB Miss, MemBus<br />
Access and Uncacheable Access). Arrows flowing inward such as DMA (Direct<br />
Memory Access) or bus master access and I/O interrupts may not be directly generated<br />
<strong>by</strong> the processor, but are nevertheless visible. Since DMA access is typically per<strong>for</strong>med<br />
to addresses marked as cacheable <strong>by</strong> the processor, they can be observed in the standard<br />
cache access metrics. To distinguish DMA accesses <strong>by</strong> a particular device, events should<br />
be qualified <strong>by</strong> address range. Each device typically uses a private range of addresses in<br />
65