03.08.2013 Views

Copyright by William Lloyd Bircher 2010 - The Laboratory for ...

Copyright by William Lloyd Bircher 2010 - The Laboratory for ...

Copyright by William Lloyd Bircher 2010 - The Laboratory for ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

power measurement hardware <strong>for</strong> multiple subsystems, measurement need only be<br />

implemented on a single system during the design stage. <strong>The</strong> model is created based on<br />

measurement from a small number of systems which allows power measurement<br />

hardware to be eliminated from the final product.<br />

While the trickle-down approach simplifies power modeling of complete systems it<br />

requires a modest knowledge of subsystem level interaction. <strong>The</strong> effectiveness of the<br />

model at capturing system-level power is determined <strong>by</strong> the selection of comprehensive<br />

per<strong>for</strong>mance events. Some events such as top-level cache or memory accesses are<br />

intuitive. A miss in the first level cache will necessarily generate traffic in higher level<br />

caches and or the memory subsystem. Other events such as those found in I/O devices<br />

are not as obvious. Consider the system diagram in Figure 5.1.<br />

This represents the quad-socket server <strong>for</strong> which the trickle-down modeling approach is<br />

applied. <strong>The</strong> arrows flowing outward from the processor represent events that originate<br />

in the processor and trickle-down to other subsystems (L3 Miss, TLB Miss, MemBus<br />

Access and Uncacheable Access). Arrows flowing inward such as DMA (Direct<br />

Memory Access) or bus master access and I/O interrupts may not be directly generated<br />

<strong>by</strong> the processor, but are nevertheless visible. Since DMA access is typically per<strong>for</strong>med<br />

to addresses marked as cacheable <strong>by</strong> the processor, they can be observed in the standard<br />

cache access metrics. To distinguish DMA accesses <strong>by</strong> a particular device, events should<br />

be qualified <strong>by</strong> address range. Each device typically uses a private range of addresses in<br />

65

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!