snooping protocol


(n.) Also referred to as a bus-snooping protocol, a protocol for maintaining cache coherency in symmetric multiprocessing environments. In a snooping system, all caches on the bus monitor (or snoop) the bus to determine if they have a copy of the block of data that is requested on the bus. Every cache has a copy of the sharing status of every block of physical memory it has. Multiple copies of a document in a multiprocessing environment typically can be read without any coherence problems; however, a processor must have exclusive access to the bus in order to write.
Snooping Protocol Types

There are two main types of snooping protocol:
Write-invalidate

The processor that is writing data causes copies in the caches of all other processors in the system to be rendered invalid before it changes its local copy. The local machine does this by sending an invalidation signal over the bus, which causes all of the other caches to check for a copy of the invalidated file. Once the cache copies have been invalidated, the data on the local machine can be updated until another processor requests it.

Write-update

The processor that is writing the data broadcasts the new data over the bus (without issuing the invalidation signal). All caches that contain copies of the data are then updated. This scheme differs from write-invalidate in that it does not create only one local copy for writes.

Read Also:

  • snowshoe spamming

    A slang term used to describe a method of delivering spam — or unsolicited email. Snowshoe spamming refers to the technique of spreading spam across multiple IPs to evade spam filters.

  • Social CRM (Customer Relationship Management)

    Social CRM (customer relationship management) is a phrase used to describe the addition of a social element in traditional CRM processes. Social CRM builds upon CRM by leveraging a social element that enables a business to connect customer conversations and relationships from social networking sites in to the CRM process. Social CRM may also be […]

  • social engineering

    (sō ´sh&l en´´j&-nēr´ing) (n.) In the realm of computers, the act of obtaining or attempting to obtain otherwise secure data by conning an individual into revealing secure information. Social engineering is successful because its victims innately want to trust other people and are naturally helpful. The victims of social engineering are tricked into releasing information […]

  • Social Media

    A term used to describe a variety of Web-based platforms, applications and technologies that enable people to socially interact with one another online. Some examples of social media sites and applications include Facebook, YouTube, Del.icio.us, Twitter, Digg, blogs and other sites that have content based on user participation and user-generated content (UGC). See “Social Media […]

  • Social Media Optimization (SMO)

    Abbreviated as SMO, social media optimization is the process of increasing the awareness of a product, brand or event by using a number of social media outlets and communities to generate viral publicity. Social media optimization includes using RSS feeds, social news and bookmarking sites, as well as social media sites and video and blogging […]


Disclaimer: snooping protocol definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.