Skip to main content
Synthesis Lectures on Computer Architecture

Snooping Coherence Protocols

Publication ,  Chapter
Sorin, DJ; Hill, MD; Wood, DA
January 1, 2009

In this chapter, we present snooping coherence protocols. Snooping protocols were the first widely-deployed class of protocols and they continue to be used in a variety of systems. Snooping protocols offer many attractive features, including low-latency coherence transactions and a conceptually simpler design than the alternative, directory protocols (Chapter 8).

Duke Scholars

DOI

Publication Date

January 1, 2009

Start / End Page

99 / 138
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Sorin, D. J., Hill, M. D., & Wood, D. A. (2009). Snooping Coherence Protocols. In Synthesis Lectures on Computer Architecture (pp. 99–138). https://doi.org/10.1007/978-3-031-01733-9_7
Sorin, D. J., M. D. Hill, and D. A. Wood. “Snooping Coherence Protocols.” In Synthesis Lectures on Computer Architecture, 99–138, 2009. https://doi.org/10.1007/978-3-031-01733-9_7.
Sorin DJ, Hill MD, Wood DA. Snooping Coherence Protocols. In: Synthesis Lectures on Computer Architecture. 2009. p. 99–138.
Sorin, D. J., et al. “Snooping Coherence Protocols.” Synthesis Lectures on Computer Architecture, 2009, pp. 99–138. Scopus, doi:10.1007/978-3-031-01733-9_7.
Sorin DJ, Hill MD, Wood DA. Snooping Coherence Protocols. Synthesis Lectures on Computer Architecture. 2009. p. 99–138.

DOI

Publication Date

January 1, 2009

Start / End Page

99 / 138