In this technique, every processor has a snoopy cache controller that constantly monitors the transactions on the bus by other processors. Thus, every processor-keeps track of the other processor's memory writes. Two common methods based on snooping are followed: write update protocol write invalidate protocol.