Explain the different page replacement policies, Computer Engineering

Assignment Help:

Explain the different page replacement policies.

Various page replacement algorithms are briefly explained below:

1. First-in, first-out

FIFO page replacement algorithm is a low-overhead algorithm. Now there the operating system maintains track of all the pages in memory in a queue, along with the most current arrival at the back, and the initial arrival in front. While a page requires to be replaced, the page at the front of the queue as the oldest page is selected.

Advantage: FIFO is intuitive and cheap.

Disadvantage:

1. Not good performs in practical application.

2. Suffers from Belady's anomaly.

2. Not recently used

NRU page replacement algorithm works at the following principle: while a page is referenced, a referenced bit is set for which page, marking this as referenced. The same, when a page is modified or written to, a modified bit is set. At an exact fixed time interval, the clock interrupt triggers and clears the referenced bit of each the pages, therefore only pages referenced inside the current clock interval are marked along with a referenced bit. When a page requires to be replaced, the operating system divides the pages in four classes:

  • Class 0: not referenced, not modified
  • Class 1: not referenced, modified
  • Class 2: referenced, not modified
  • Class 3: referenced, modified.

The Not recently used algorithm picks a random page from the lowest category for removal.

3. Optimal page replacement algorithm

The optimal page replacement algorithm (also termed as OPT) is an algorithm which works as follows:

When a page requires being swapped-in, the operating system swaps-out the page, whose subsequent use will occur farthest in the future. For illustration, a page which is not going to be used for the next 6 seconds will be swapped-out over a page which is going to be used inside the next 0.4 seconds.

Disadvantage: This algorithm can't be implemented in the common purpose operating system since this is impossible to calculate reliably how long this will be before a page is going to be used.


Related Discussions:- Explain the different page replacement policies

Sorting algorithms, Two way merge sort for 84,83,78,90,23,123,98,159,8,200

Two way merge sort for 84,83,78,90,23,123,98,159,8,200

Explain loop-invariant code motion, Explain briefly Loop-invariant code ...

Explain briefly Loop-invariant code motion of the commonly used code optimization techniques. Loop-invariant code motion If a quantity is calculated inside a loop duri

What is rambus dram, Q. What is Rambus DRAM? RDRAM which was developed ...

Q. What is Rambus DRAM? RDRAM which was developed by Rambus has been adopted by Intel for its Pentium and Itanium processors. It has become main competitor to SDRAM. RDRAM chip

Explain about cluster computing, The idea of clustering is defined as use o...

The idea of clustering is defined as use of multiple computers naturally multiple storage devices, PCs or UNIX workstations and their interconnections to make what emerges to users

What is component diagrams in uml, A component diagram is mainly useful wit...

A component diagram is mainly useful with teams of larger size. UML components are great to perform architectural landscape for an exact system. The component diagram permits to mo

Unix , how to write algorithum for unix progam

how to write algorithum for unix progam

What is a rendezvous point?, You insert rendezvous points into Vuser script...

You insert rendezvous points into Vuser scripts to imitate heavy user load on the server. Rendezvous points instruct Vusers to wait during test implementation for multiple Vusers t

State the encryption and decryption process with example, State the Encrypt...

State the Encryption and decryption process with example Encryption and decryption process in the Figure where Ram wants to send a confidential message to his friend Shyam. Ram

Linux, Explain about unix file system architecture

Explain about unix file system architecture

What are the different database integrities, What are the different databas...

What are the different database integrities? Semantic Integrity. Relational Integrity. Primary Key Integrity. Value Set Integrity. Foreign Key integrity and

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd