ccNUMA Overview
ccNUMA overview
Table of contents
Introduction...............................................................................................................................................3
Executive summary.....................................................................................................................................3
Problem statement......................................................................................................................................3
Introduction to ccNUMA.............................................................................................................................3
Physical memory characteristics ...............................................................................................................3
Cache coherency...................................................................................................................................4
Interleaved memory................................................................................................................................4
Local memory ........................................................................................................................................4
HP high-end SMP servers and the cellular architecture....................................................................................4
Past implementations ..............................................................................................................................5
Locality domains ....................................................................................................................................5
Comparison of existing HP 9000 high-end SMP servers to the new HP Integrity SMP servers...........................6
Competitive situation..................................................................................................................................7
SGI IRIX ................................................................................................................................................7
SGI Altix 64-bit Linux systems ..................................................................................................................7
Tru64 ...................................................................................................................................................7
Linux.....................................................................................................................................................8
IBM NUMA-Q .......................................................................................................................................8
IBM pSeries...........................................................................................................................................8
Sun ......................................................................................................................................................8
Impact on applications ...............................................................................................................................9
Memory topology ......................................................................................................................................9
Process management..................................................................................................................................9
Launch policies ......................................................................................................................................9
Default launch policies..........................................................................................................................11
Discovering the execution domain topology ............................................................................................12
Utilizing the execution domain...............................................................................................................12
Discovering a process’s locality bindings ................................................................................................12
Inheritance of launch policies ................................................................................................................13
1