Explain the different page replacement policies, Computer Engineering

Assignment Help:

Explain the different page replacement policies.

Various page replacement algorithms are briefly explained below:

1. First-in, first-out

FIFO page replacement algorithm is a low-overhead algorithm. Now there the operating system maintains track of all the pages in memory in a queue, along with the most current arrival at the back, and the initial arrival in front. While a page requires to be replaced, the page at the front of the queue as the oldest page is selected.

Advantage: FIFO is intuitive and cheap.

Disadvantage:

1. Not good performs in practical application.

2. Suffers from Belady's anomaly.

2. Not recently used

NRU page replacement algorithm works at the following principle: while a page is referenced, a referenced bit is set for which page, marking this as referenced. The same, when a page is modified or written to, a modified bit is set. At an exact fixed time interval, the clock interrupt triggers and clears the referenced bit of each the pages, therefore only pages referenced inside the current clock interval are marked along with a referenced bit. When a page requires to be replaced, the operating system divides the pages in four classes:

  • Class 0: not referenced, not modified
  • Class 1: not referenced, modified
  • Class 2: referenced, not modified
  • Class 3: referenced, modified.

The Not recently used algorithm picks a random page from the lowest category for removal.

3. Optimal page replacement algorithm

The optimal page replacement algorithm (also termed as OPT) is an algorithm which works as follows:

When a page requires being swapped-in, the operating system swaps-out the page, whose subsequent use will occur farthest in the future. For illustration, a page which is not going to be used for the next 6 seconds will be swapped-out over a page which is going to be used inside the next 0.4 seconds.

Disadvantage: This algorithm can't be implemented in the common purpose operating system since this is impossible to calculate reliably how long this will be before a page is going to be used.


Related Discussions:- Explain the different page replacement policies

Storage devices, Logic manufactures have produced 'large scale' logic (LSI)...

Logic manufactures have produced 'large scale' logic (LSI) blocks to achieve complex functions; a typical set of logic functions is that of data storage. There are two main types o

Perform multiplication with showing content of accumulator, Perform multipl...

Perform multiplication with showing the contents of accumulator, B register and Y register during each step. (Accumulator, B, Y are 4-bit registers) B=06 Y=02

Explain proces of defining the document page title, Q. Explain proces of de...

Q. Explain proces of defining the Document Page Title? Though the document has a file name, notice it's still labelled Untitled Document; that is because it needs an HTML docum

Explain about cseg segment, CSEG SEGMENT  ASSUME CS:CSEG, DS:CSEG, SS:CS...

CSEG SEGMENT  ASSUME CS:CSEG, DS:CSEG, SS:CSEG  ORG 100h START:MOV AX, CSEG; Initialise data segment  MOV DS, AX; register using AX  MOV AL, NUM1; Take the first num

What interprets can a browser contain besides html and http, What interpret...

What interprets can a browser contain besides HTML and HTTP? Besides an HTTP client and an HTML interpreter, a browser can have elements whihc enable the browser to perform any

Explain magnetic read and write mechanisms, Q. Explain Magnetic Read and Wr...

Q. Explain Magnetic Read and Write Mechanisms? Data are recorded on and then retrieved from disk via a conducting coil called the head. In numerous systems there are two heads,

What are the super computers, SUPER COMPUTER The upper end of state of ...

SUPER COMPUTER The upper end of state of art mainframe machine is the supercomputer. These  are  the  fastest  machines  in  terms  of  processing  speed  and  use multiprocess

What are the two ways in which the system using cache, What are the two way...

What are the two ways in which the system using cache can proceed for a write operation? Write by protocol technique Write-back or Copy-back protocol method

What is a heap, What is a heap? A complete binary tree, every of whose ...

What is a heap? A complete binary tree, every of whose elements contains a value that is  greater than or equal to the value of every of its children is known a Heap

Gustafsons law, Amdahl's law is suitable for applications where response ti...

Amdahl's law is suitable for applications where response time is critical. On the other hand, there are a lot of applications which need that accuracy of the resultant output shoul

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd