西湖醋鱼是什么菜系| 痔疮出血用什么药| 乐高是什么| 很棒是什么意思| 斥巨资是什么意思| 寻麻疹涂什么药膏| 1973年是什么年| 包馄饨用猪肉什么部位| 五险一金什么时候开始交| eos是什么意思| 磨牙是什么原因怎么治疗| 面包糠是什么做的| 口述是什么意思| 最近老是犯困想睡觉是什么原因| 镇长什么级别| 指甲有条纹是什么原因| 甲亢什么意思| 生物学是什么| 舌头变黑是什么原因| 卵黄囊偏大是什么原因| 失调是什么意思| 舌头肿大是什么原因引起的| 红细胞压积是什么意思| 什么的水| 秋葵不适宜什么人吃| jk什么意思| 强高是什么意思| 什么叫前庭功能| bra是什么| 硫酸亚铁适合浇什么花| gfr是什么意思| 头发掉得厉害是什么原因| 汗斑是什么| 瓦是什么的单位| 门庭是什么意思| 上眼皮有痣代表什么| 什么是gsp| 僧侣是什么意思| 燕窝是什么东西做的| 感冒了能吃什么水果| 什么的绿叶| 皮肤变白是什么原因| 长沙有什么区| 烈日灼心什么意思| 坐飞机什么东西不能带| 女人做什么好| 小便是红色的是什么原因男性| 海兔是什么动物| 独占鳌头是什么意思| 去拉萨需要准备什么| 为什么不建议打卧蚕呢| 一票制什么意思| 阴囊湿疹用什么药| 新生儿黄疸是什么原因引起的| 皮炎是什么| 红糖的原料是什么| 杜甫号什么| 双氧水又叫什么名字| 额头出油多是什么原因| 飞水是什么意思| 羊肉不能和什么一起吃| 师长是什么级别| 什么是胶体| 兔子和什么属相相冲| 元肉是什么| 吃布洛芬有什么副作用| 泡腾片是干什么用的| 鼻头发黑是什么原因| 血氨低是什么原因| 何首乌长什么样子图片| 血燥是什么意思| 拉稀屎是什么原因| 孕妇喝咖啡有什么危害| 天妇罗是什么意思| 八字带什么的长寿| 小肠火吃什么药效果快| benny是什么意思| 琛字五行属什么| 清热去火吃什么药| 断子绝孙是什么意思| 足外翻挂什么科| 75年属什么生肖| 排卵试纸什么时候测最准确| 什么是潮喷| 凤尾鱼为什么突然就死| 为什么得甲亢| 中性粒细胞偏低是什么原因| 脑白质脱髓鞘是什么意思| 为什么不建议做肠镜| 市委讲师团是什么级别| 小壁虎进家有什么预兆| 桑黄是什么树上长出来的| opt是什么| 什么叫补充公积金| 双引号是什么意思| 男人得了hpv有什么症状| 一什么机枪| 乙肝看什么指标| 梦见狗是什么意思| graff是什么牌子| 插入阴道是什么感觉| 卤米松软膏主治什么| 肺部微结节是什么意思| 月子中心是做什么的| 尿检隐血十一什么意思| 人体缺钾是什么原因引起的| 水奶和奶粉什么区别| 上火喉咙痛吃什么药| 一个草字头一个见念什么| 下眼睑红肿是什么原因| 小猫什么时候驱虫| 脚底脱皮是什么原因| 时迁的绰号是什么| 试金石什么意思| 末梢血是什么意思| 什么人不适合喝骆驼奶| 香肠炒什么菜好吃| 六月二十九日是什么星座| 嗓子咽口水疼吃什么药| 为什么来月经会头疼| aa是什么意思| 足金是什么意思| 土人参长什么样| 洗假牙用什么洗最好| 法图麦在回族什么意思| 摩羯男和什么星座最配| orange是什么颜色| 一剪梅是什么意思| beast什么意思| 山药不能和什么一起吃| 京畿是什么意思| 核素是什么| 533是什么意思| 孕激素高是什么原因| 接地气是什么意思| 方案是什么意思| 孩子打喷嚏流鼻涕吃什么药| 木瓜有什么功效| 反复发烧吃什么药| eau是什么意思| 吃什么可以让胸部变大| 什么叫精索静脉曲张啊| 皮肤镜能检查出什么| 什么是禽流感| 2.1是什么星座| 爷爷的兄弟叫什么| 黄鼠狼进屋是什么兆头| 蚊子不咬什么体质的人| 置之死地而后生是什么意思| 樊胜美是什么电视剧| 嘴苦是什么原因引起的| 带状疱疹用什么药好| 肾虚吃什么| 585是什么金| 沉冤得雪是什么意思| 青蛙爱吃什么| 思念到极致是什么感觉| 产后42天复查都检查什么| 咳嗽有血是什么原因| 下发是什么意思| 鼓上蚤是什么意思| 蜂蜜和柠檬一起喝有什么作用| 这个季节适合种什么菜| 天麻与什么煲汤最好| 外来猫进家有什么预兆| 肝最怕什么| 什么逼人| 吃什么油最健康排行榜| 土字生肖有钱收是什么生肖| 什么情况下会猝死| 黄河里有什么鱼| 高血压是什么原因引起的| 生肖牛和什么生肖最配| 妹妹的女儿叫什么| 为什么奢侈品都是pvc| 惊讶表情是什么意思| bi是什么| fierce是什么意思| 脊椎痛什么原因| 一什么睡莲| 岍是什么意思| 地龙是什么| 处级上面是什么级别| 美国报警电话为什么是911| 头七烧什么| qa和qc有什么区别| 脑梗挂什么科| 皲裂是什么意思| 什么时候喝牛奶效果最佳| 为什么会心梗| 脑挫伤是什么意思| 缺钾是什么原因造成的| 多吃醋有什么好处和坏处| 孕妇吸二手烟对胎儿有什么影响| 上相是什么意思| 美妙绝伦是什么意思| hpv感染是什么| ACG是什么牌子| 下午一点半是什么时辰| 妄想什么意思| 九月十三是什么星座| 白芨有什么作用和功效| 吃什么可以增强记忆力| 育红班是什么意思| 生殖细胞瘤是什么病| 五官立体是什么意思| 按摩椅什么品牌最好| 荷花像什么| 高血压变成低血压是什么原因| 艺名是什么意思| 吃头孢为什么不能喝酒| 老年人喝什么奶粉好| 梅长苏是什么电视剧| 为什么一睡觉就做梦| 女生喝红牛有什么影响| 砂锅是什么材料做的| 白萝卜煮水喝有什么功效和作用| 所不欲勿施于人是什么意思| 为什么女的会流水怎么回事| 体检生化项目查什么| 酉时是什么时候| 更年期吃什么药好| 三点水一个条读什么| 米加白念什么| 生肖本命带红花是什么生肖| 婚检是什么| 赟怎么读 什么意思| 录取线差是什么意思| 黄体囊肿是什么意思| 锌是补什么的| 为什么会有甲状腺结节| 宫后是牛身上什么部位| 温文尔雅是什么意思| 艺高人胆大什么意思| 双签是什么意思| 台风是什么意思| 京东pop是什么意思| 与虎谋皮是什么意思| 肠胃感冒吃什么药最好| 烀是什么意思| 脾虚湿盛吃什么药| 血糖挂什么科| 寄生虫感染吃什么药| 做糖耐前一天需要注意什么| 拔罐痒是什么原因| 栎字五行属什么| 梦见吃水饺是什么预兆| 晚上左眼皮跳预示什么| 成龙姓什么| 11月20号是什么星座| 头汗多是什么原因引起的| 锋字五行属什么| 银红色是什么颜色| 讳疾忌医什么意思| 甲状腺球蛋白低说明什么| 熬药用什么锅熬最好| 行大运是什么意思| 糖尿病喝什么茶| 38岁属什么的生肖| 为什么长斑| 士多啤梨是什么水果| 念旧的人是什么样的人| 头皮屑挂什么科| 嘴里发咸是什么原因| 百度Jump to content

济宁市运管处开展农村道路客运市场专项整治活动

From Wikipedia, the free encyclopedia
(Redirected from Caching (computing))
百度 人口老龄化导致劳动力参与率下降及劳动力年龄结构老化,给企业生产用工及地方经济发展带来了冲击。

Diagram of a CPU memory cache operation

In computing, a cache (/k??/ ? KASH)[1] is a hardware or software component that stores data so that future requests for that data can be served faster; the data stored in a cache might be the result of an earlier computation or a copy of data stored elsewhere. A cache hit occurs when the requested data can be found in a cache, while a cache miss occurs when it cannot. Cache hits are served by reading data from the cache, which is faster than recomputing a result or reading from a slower data store; thus, the more requests that can be served from the cache, the faster the system performs.[2]

To be cost-effective, caches must be relatively small. Nevertheless, caches are effective in many areas of computing because typical computer applications access data with a high degree of locality of reference. Such access patterns exhibit temporal locality, where data is requested that has been recently requested, and spatial locality, where data is requested that is stored near data that has already been requested.

Motivation

[edit]

In memory design, there is an inherent trade-off between capacity and speed because larger capacity implies larger size and thus greater physical distances for signals to travel causing propagation delays. There is also a tradeoff between high-performance technologies such as SRAM and cheaper, easily mass-produced commodities such as DRAM, flash, or hard disks.

The buffering provided by a cache benefits one or both of latency and throughput (bandwidth).

A larger resource incurs a significant latency for access – e.g. it can take hundreds of clock cycles for a modern 4 GHz processor to reach DRAM. This is mitigated by reading large chunks into the cache, in the hope that subsequent reads will be from nearby locations and can be read from the cache. Prediction or explicit prefetching can be used to guess where future reads will come from and make requests ahead of time; if done optimally, the latency is bypassed altogether.

The use of a cache also allows for higher throughput from the underlying resource, by assembling multiple fine-grain transfers into larger, more efficient requests. In the case of DRAM circuits, the additional throughput may be gained by using a wider data bus.

Operation

[edit]

Hardware implements cache as a block of memory for temporary storage of data likely to be used again. Central processing units (CPUs), solid-state drives (SSDs) and hard disk drives (HDDs) frequently include hardware-based cache, while web browsers and web servers commonly rely on software caching.

A cache is made up of a pool of entries. Each entry has associated data, which is a copy of the same data in some backing store. Each entry also has a tag, which specifies the identity of the data in the backing store of which the entry is a copy.

When the cache client (a CPU, web browser, operating system) needs to access data presumed to exist in the backing store, it first checks the cache. If an entry can be found with a tag matching that of the desired data, the data in the entry is used instead. This situation is known as a cache hit. For example, a web browser program might check its local cache on disk to see if it has a local copy of the contents of a web page at a particular URL. In this example, the URL is the tag, and the content of the web page is the data. The percentage of accesses that result in cache hits is known as the hit rate or hit ratio of the cache.

The alternative situation, when the cache is checked and found not to contain any entry with the desired tag, is known as a cache miss. This requires a more expensive access of data from the backing store. Once the requested data is retrieved, it is typically copied into the cache, ready for the next access.

During a cache miss, some other previously existing cache entry is typically removed in order to make room for the newly retrieved data. The heuristic used to select the entry to replace is known as the replacement policy. One popular replacement policy, least recently used (LRU), replaces the oldest entry, the entry that was accessed less recently than any other entry. More sophisticated caching algorithms also take into account the frequency of use of entries.

Write policies

[edit]
A write-through cache without write allocation
A write-back cache with write allocation

Cache writes must eventually be propagated to the backing store. The timing for this is governed by the write policy. The two primary write policies are:[3]

  • Write-through: Writes are performed synchronously to both the cache and the backing store.
  • Write-back: Initially, writing is done only to the cache. The write to the backing store is postponed until the modified content is about to be replaced by another cache block.

A write-back cache is more complex to implement since it needs to track which of its locations have been written over and mark them as dirty for later writing to the backing store. The data in these locations are written back to the backing store only when they are evicted from the cache, a process referred to as a lazy write. For this reason, a read miss in a write-back cache may require two memory accesses to the backing store: one to write back the dirty data, and one to retrieve the requested data. Other policies may also trigger data write-back. The client may make many changes to data in the cache, and then explicitly notify the cache to write back the data.

Write operations do not return data. Consequently, a decision needs to be made for write misses: whether or not to load the data into the cache. This is determined by these write-miss policies:

  • Write allocate (also called fetch on write): Data at the missed-write location is loaded to cache, followed by a write-hit operation. In this approach, write misses are similar to read misses.
  • No-write allocate (also called write-no-allocate or write around): Data at the missed-write location is not loaded to cache, and is written directly to the backing store. In this approach, data is loaded into the cache on read misses only.

While both write policies can Implement either write-miss policy, they are typically paired as follows:[4][5]

  • A write-back cache typically employs write allocate, anticipating that subsequent writes or reads to the same location will benefit from having the data already in the cache.
  • A write-through cache uses no-write allocate. Here, subsequent writes have no advantage, since they still need to be written directly to the backing store.

Entities other than the cache may change the data in the backing store, in which case the copy in the cache may become out-of-date or stale. Alternatively, when the client updates the data in the cache, copies of that data in other caches will become stale. Communication protocols between the cache managers that keep the data consistent are associated with cache coherence.

Prefetch

[edit]

On a cache read miss, caches with a demand paging policy read the minimum amount from the backing store. A typical demand-paging virtual memory implementation reads one page of virtual memory (often 4 KB) from disk into the disk cache in RAM. A typical CPU reads a single L2 cache line of 128 bytes from DRAM into the L2 cache, and a single L1 cache line of 64 bytes from the L2 cache into the L1 cache.

Caches with a prefetch input queue or more general anticipatory paging policy go further—they not only read the data requested, but guess that the next chunk or two of data will soon be required, and so prefetch that data into the cache ahead of time. Anticipatory paging is especially helpful when the backing store has a long latency to read the first chunk and much shorter times to sequentially read the next few chunks, such as disk storage and DRAM.

A few operating systems go further with a loader that always pre-loads the entire executable into RAM. A few caches go even further, not only pre-loading an entire file, but also starting to load other related files that may soon be requested, such as the page cache associated with a prefetcher or the web cache associated with link prefetching.

Examples of hardware caches

[edit]

CPU cache

[edit]

Small memories on or close to the CPU can operate faster than the much larger main memory.[6] Most CPUs since the 1980s have used one or more caches, sometimes in cascaded levels; modern high-end embedded, desktop and server microprocessors may have as many as six types of cache (between levels and functions).[7] Some examples of caches with a specific function are the D-cache, I-cache and the translation lookaside buffer for the memory management unit (MMU).

GPU cache

[edit]

Earlier graphics processing units (GPUs) often had limited read-only texture caches and used swizzling to improve 2D locality of reference. Cache misses would drastically affect performance, e.g. if mipmapping was not used. Caching was important to leverage 32-bit (and wider) transfers for texture data that was often as little as 4 bits per pixel.

As GPUs advanced, supporting general-purpose computing on graphics processing units and compute kernels, they have developed progressively larger and increasingly general caches, including instruction caches for shaders, exhibiting functionality commonly found in CPU caches. These caches have grown to handle synchronization primitives between threads and atomic operations, and interface with a CPU-style MMU.

DSPs

[edit]

Digital signal processors have similarly generalized over the years. Earlier designs used scratchpad memory fed by direct memory access, but modern DSPs such as Qualcomm Hexagon often include a very similar set of caches to a CPU (e.g. Modified Harvard architecture with shared L2, split L1 I-cache and D-cache).[8]

Translation lookaside buffer

[edit]

A memory management unit (MMU) that fetches page table entries from main memory has a specialized cache, used for recording the results of virtual address to physical address translations. This specialized cache is called a translation lookaside buffer (TLB).[9]

In-network cache

[edit]

Information-centric networking

[edit]

Information-centric networking (ICN) is an approach to evolve the Internet infrastructure away from a host-centric paradigm, based on perpetual connectivity and the end-to-end principle, to a network architecture in which the focal point is identified information. Due to the inherent caching capability of the nodes in an ICN, it can be viewed as a loosely connected network of caches, which has unique requirements for caching policies. However, ubiquitous content caching introduces the challenge to content protection against unauthorized access, which requires extra care and solutions.[10]

Unlike proxy servers, in ICN the cache is a network-level solution. Therefore, it has rapidly changing cache states and higher request arrival rates; moreover, smaller cache sizes impose different requirements on the content eviction policies. In particular, eviction policies for ICN should be fast and lightweight. Various cache replication and eviction schemes for different ICN architectures and applications have been proposed.[citation needed]

Policies

[edit]
Time aware least recently used
[edit]

The time aware least recently used (TLRU) is a variant of LRU designed for the situation where the stored contents in cache have a valid lifetime. The algorithm is suitable in network cache applications, such as ICN, content delivery networks (CDNs) and distributed networks in general. TLRU introduces a new term: time to use (TTU). TTU is a time stamp on content which stipulates the usability time for the content based on the locality of the content and information from the content publisher. Owing to this locality-based time stamp, TTU provides more control to the local administrator to regulate in-network storage.

In the TLRU algorithm, when a piece of content arrives, a cache node calculates the local TTU value based on the TTU value assigned by the content publisher. The local TTU value is calculated by using a locally-defined function. Once the local TTU value is calculated the replacement of content is performed on a subset of the total content stored in cache node. The TLRU ensures that less popular and short-lived content should be replaced with incoming content.[11]

Least frequent recently used
[edit]

The least frequent recently used (LFRU) cache replacement scheme combines the benefits of LFU and LRU schemes. LFRU is suitable for network cache applications, such as ICN, CDNs and distributed networks in general. In LFRU, the cache is divided into two partitions called privileged and unprivileged partitions. The privileged partition can be seen as a protected partition. If content is highly popular, it is pushed into the privileged partition. Replacement of the privileged partition is done by first evicting content from the unprivileged partition, then pushing content from the privileged partition to the unprivileged partition, and finally inserting new content into the privileged partition. In the above procedure, the LRU is used for the privileged partition and an approximated LFU (ALFU) scheme is used for the unprivileged partition. The basic idea is to cache the locally popular content with the ALFU scheme and push the popular content to the privileged partition.[12]

Weather forecast

[edit]

In 2011, the use of smartphones with weather forecasting options was overly taxing AccuWeather servers; two requests from the same area would generate separate requests. An optimization by edge-servers to truncate the GPS coordinates to fewer decimal places meant that the cached results from a nearby query would be used. The number of to-the-server lookups per day dropped by half.[13]

Software caches

[edit]

Disk cache

[edit]

While CPU caches are generally managed entirely by hardware, a variety of software manages other caches. The page cache in main memory is managed by the operating system kernel.

While the disk buffer, which is an integrated part of the hard disk drive or solid state drive, is sometimes misleadingly referred to as disk cache, its main functions are write sequencing and read prefetching. High-end disk controllers often have their own on-board cache for the hard disk drive's data blocks.

Finally, a fast local hard disk drive can also cache information held on even slower data storage devices, such as remote servers (web cache) or local tape drives or optical jukeboxes; such a scheme is the main concept of hierarchical storage management. Also, fast flash-based solid-state drives (SSDs) can be used as caches for slower rotational-media hard disk drives, working together as hybrid drives.

Web cache

[edit]

Web browsers and web proxy servers, either locally or at the Internet service provider (ISP), employ web caches to store previous responses from web servers, such as web pages and images. Web caches reduce the amount of information that needs to be transmitted across the network, as information previously stored in the cache can often be re-used. This reduces bandwidth and processing requirements of the web server, and helps to improve responsiveness for users of the web.[14]

Another form of cache is P2P caching, where the files most sought for by peer-to-peer applications are stored in an ISP cache to accelerate P2P transfers. Similarly, decentralised equivalents exist, which allow communities to perform the same task for P2P traffic, for example, Corelli.[15]

Memoization

[edit]

A cache can store data that is computed on demand rather than retrieved from a backing store. Memoization is an optimization technique that stores the results of resource-consuming function calls within a lookup table, allowing subsequent calls to reuse the stored results and avoid repeated computation. It is related to the dynamic programming algorithm design methodology, which can also be thought of as a means of caching.

Content delivery network

[edit]

A content delivery network (CDN) is a network of distributed servers that deliver pages and other web content to a user, based on the geographic locations of the user, the origin of the web page and the content delivery server.

CDNs were introduced in the late 1990s as a way to speed up the delivery of static content, such as HTML pages, images and videos. By replicating content on multiple servers around the world and delivering it to users based on their location, CDNs can significantly improve the speed and availability of a website or application. When a user requests a piece of content, the CDN will check to see if it has a copy of the content in its cache. If it does, the CDN will deliver the content to the user from the cache.[16]

Cloud storage gateway

[edit]

A cloud storage gateway is a hybrid cloud storage device that connects a local network to one or more cloud storage services, typically object storage services such as Amazon S3. It provides a cache for frequently accessed data, providing high speed local access to frequently accessed data in the cloud storage service. Cloud storage gateways also provide additional benefits such as accessing cloud object storage through traditional file serving protocols as well as continued access to cached data during connectivity outages.[17]

Other caches

[edit]

The BIND DNS daemon caches a mapping of domain names to IP addresses, as does a DNS resolver library.

Write-through operation is common when operating over unreliable networks, because of the enormous complexity of the coherency protocol required between multiple write-back caches when communication is unreliable. For instance, web page caches and client-side caches for distributed file systems (like those in NFS or SMB) are typically read-only or write-through specifically to keep the network protocol simple and reliable.

Web search engines also frequently make web pages they have indexed available from their cache. This can prove useful when web pages from a web server are temporarily or permanently inaccessible.

Database caching can substantially improve the throughput of database applications, for example in the processing of indexes, data dictionaries, and frequently used subsets of data.

A distributed cache[18] uses networked hosts to provide scalability, reliability and performance to the application.[19] The hosts can be co-located or spread over different geographical regions.

Buffer vs. cache

[edit]

The semantics of a "buffer" and a "cache" are not totally different; even so, there are fundamental differences in intent between the process of caching and the process of buffering.

Fundamentally, caching realizes a performance increase for transfers of data that is being repeatedly transferred. While a caching system may realize a performance increase upon the initial (typically write) transfer of a data item, this performance increase is due to buffering occurring within the caching system.

With read caches, a data item must have been fetched from its residing location at least once in order for subsequent reads of the data item to realize a performance increase by virtue of being able to be fetched from the cache's (faster) intermediate storage rather than the data's residing location. With write caches, a performance increase of writing a data item may be realized upon the first write of the data item by virtue of the data item immediately being stored in the cache's intermediate storage, deferring the transfer of the data item to its residing storage at a later stage or else occurring as a background process. Contrary to strict buffering, a caching process must adhere to a (potentially distributed) cache coherency protocol in order to maintain consistency between the cache's intermediate storage and the location where the data resides. Buffering, on the other hand,

  • reduces the number of transfers for otherwise novel data amongst communicating processes, which amortizes overhead involved for several small transfers over fewer, larger transfers,
  • provides an intermediary for communicating processes which are incapable of direct transfers amongst each other, or
  • ensures a minimum data size or representation required by at least one of the communicating processes involved in a transfer.

With typical caching implementations, a data item that is read or written for the first time is effectively being buffered; and in the case of a write, mostly realizing a performance increase for the application from where the write originated. Additionally, the portion of a caching protocol where individual writes are deferred to a batch of writes is a form of buffering. The portion of a caching protocol where individual reads are deferred to a batch of reads is also a form of buffering, although this form may negatively impact the performance of at least the initial reads (even though it may positively impact the performance of the sum of the individual reads). In practice, caching almost always involves some form of buffering, while strict buffering does not involve caching.

A buffer is a temporary memory location that is traditionally used because CPU instructions cannot directly address data stored in peripheral devices. Thus, addressable memory is used as an intermediate stage. Additionally, such a buffer may be feasible when a large block of data is assembled or disassembled (as required by a storage device), or when data may be delivered in a different order than that in which it is produced. Also, a whole buffer of data is usually transferred sequentially (for example to hard disk), so buffering itself sometimes increases transfer performance or reduces the variation or jitter of the transfer's latency as opposed to caching where the intent is to reduce the latency. These benefits are present even if the buffered data are written to the buffer once and read from the buffer once.

A cache also increases transfer performance. A part of the increase similarly comes from the possibility that multiple small transfers will combine into one large block. But the main performance-gain occurs because there is a good chance that the same data will be read from cache multiple times, or that written data will soon be read. A cache's sole purpose is to reduce accesses to the underlying slower storage. Cache is also usually an abstraction layer that is designed to be invisible from the perspective of neighboring layers.

See also

[edit]

References

[edit]
  1. ^ "Cache". Oxford Dictionaries. Archived from the original on 18 August 2012. Retrieved 2 August 2016.
  2. ^ Zhong, Liang; Zheng, Xueqian; Liu, Yong; Wang, Mengting; Cao, Yang (February 2020). "Cache hit ratio maximization in device-to-device communications overlaying cellular networks". China Communications. 17 (2): 232–238. doi:10.23919/jcc.2020.02.018. ISSN 1673-5447. S2CID 212649328.
  3. ^ Bottomley, James (1 January 2004). "Understanding Caching". Linux Journal. Retrieved 1 October 2019.
  4. ^ Hennessy, John L.; Patterson, David A. (2011). Computer Architecture: A Quantitative Approach. Elsevier. p. B–12. ISBN 978-0-12-383872-8.
  5. ^ Patterson, David A.; Hennessy, John L. (1990). Computer Architecture A Quantitative Approach. Morgan Kaufmann Publishers. p. 413. ISBN 1-55860-069-8.
  6. ^ Su, Chao; Zeng, Qingkai (10 June 2021). Nicopolitidis, Petros (ed.). "Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures". Security and Communication Networks. 2021: 1–15. doi:10.1155/2021/5559552. ISSN 1939-0122.
  7. ^ "Intel Broadwell Core i7 5775C '128MB L4 Cache' Gaming Behemoth and Skylake Core i7 6700K Flagship Processors Finally Available In Retail". 25 September 2015. Mentions L4 cache. Combined with separate I-Cache and TLB, this brings the total 'number of caches (levels+functions) to 6.
  8. ^ "qualcom Hexagon DSP SDK overview".
  9. ^ Frank Uyeda (2009). "Lecture 7: Memory Management" (PDF). CSE 120: Principles of Operating Systems. UC San Diego. Retrieved 4 December 2013.
  10. ^ Bilal, Muhammad; et al. (2019). "Secure Distribution of Protected Content in Information-Centric Networking". IEEE Systems Journal. 14 (2): 1–12. arXiv:1907.11717. Bibcode:2020ISysJ..14.1921B. doi:10.1109/JSYST.2019.2931813. S2CID 198967720.
  11. ^ Bilal, Muhammad; Kang, Shin-Gak (2014). Time Aware Least Recent Used (TLRU) cache management policy in ICN. 16th International Conference on Advanced Communication Technology. pp. 528–532. arXiv:1801.00390. Bibcode:2018arXiv180100390B. doi:10.1109/ICACT.2014.6779016. ISBN 978-89-968650-3-2. S2CID 830503.
  12. ^ Bilal, Muhammad; et al. (2017). "A Cache Management Scheme for Efficient Content Eviction and Replication in Cache Networks". IEEE Access. 5: 1692–1701. arXiv:1702.04078. Bibcode:2017arXiv170204078B. doi:10.1109/ACCESS.2017.2669344. S2CID 14517299.
  13. ^ Murphy, Chris (30 May 2011). "5 Lines Of Code In The Cloud". InformationWeek. p. 28. 300 million to 500 million fewer requests a day handled by AccuWeather servers
  14. ^ Multiple (wiki). "Web application caching". Docforge. Archived from the original on 12 December 2019. Retrieved 24 July 2013.
  15. ^ Tyson, Gareth; Mauthe, Andreas; Kaune, Sebastian; Mu, Mu; Plagemann, Thomas. Corelli: A Dynamic Replication Service for Supporting Latency-Dependent Content in Community Networks (PDF). MMCN'09. Archived from the original (PDF) on 18 June 2015.
  16. ^ "Globally Distributed Content Delivery, by J. Dilley, B. Maggs, J. Parikh, H. Prokop, R. Sitaraman and B. Weihl, IEEE Internet Computing, Volume 6, Issue 5, November 2002" (PDF). Archived (PDF) from the original on 9 August 2017. Retrieved 25 October 2019.
  17. ^ "Definition: cloud storage gateway". SearchStorage. July 2014.
  18. ^ Paul, S.; Fei, Z. (1 February 2001). "Distributed caching with centralized control". Computer Communications. 24 (2): 256–268. CiteSeerX 10.1.1.38.1094. doi:10.1016/S0140-3664(00)00322-4.
  19. ^ Khan, Iqbal (July 2009). "Distributed Caching on the Path To Scalability". MSDN. 24 (7).

Further reading

[edit]
什么叫双向情感障碍 胃气上逆有什么好的办法治疗 女人出轨有什么表现 泌乳是什么意思 尿毒症有些什么症状
紫癜是一种什么病严重吗 周围神经病是什么意思 中度贫血吃什么补血最快 非特异性t波异常是什么意思 虞是什么意思
女人湿气太重喝什么茶 女人左眼角有痣代表什么 牛鬼蛇神是什么意思 gaba是什么 高半胱氨酸是什么意思
羊肚菌为什么那么贵 休学是什么意思 淫羊藿治什么病 怡字五行属什么的 为什么会起荨麻疹
gm眼镜是什么牌子hcv7jop5ns3r.cn 遮羞布是什么意思hcv8jop2ns4r.cn 早搏是什么原因引起的hcv8jop9ns4r.cn 什么是阴虚什么是阳虚hcv9jop1ns5r.cn 1931年属什么生肖bjcbxg.com
脾胃不好挂什么科hcv8jop7ns6r.cn 尼泊尔属于什么国家hcv8jop2ns3r.cn 电解质饮料有什么作用hcv8jop3ns6r.cn 老是饿是什么原因hcv7jop5ns5r.cn 科目三考什么内容hcv8jop4ns2r.cn
九斗一簸箕有什么说法hcv8jop1ns3r.cn 尿急是什么原因hcv9jop1ns0r.cn 芡实适合什么人吃bysq.com 老心慌是什么原因hcv8jop0ns8r.cn 悬壶济世是什么意思cl108k.com
八八年属什么生肖luyiluode.com 合盘是什么意思hcv8jop2ns0r.cn 不速之客的速是什么意思hcv9jop2ns8r.cn 子宫腺肌症有什么症状hcv8jop4ns6r.cn 最高人民法院院长什么级别jasonfriends.com
百度