Explain the different page replacement policies, Computer Engineering

Assignment Help:

Explain the different page replacement policies.

Various page replacement algorithms are briefly explained below:

1. First-in, first-out

FIFO page replacement algorithm is a low-overhead algorithm. Now there the operating system maintains track of all the pages in memory in a queue, along with the most current arrival at the back, and the initial arrival in front. While a page requires to be replaced, the page at the front of the queue as the oldest page is selected.

Advantage: FIFO is intuitive and cheap.

Disadvantage:

1. Not good performs in practical application.

2. Suffers from Belady's anomaly.

2. Not recently used

NRU page replacement algorithm works at the following principle: while a page is referenced, a referenced bit is set for which page, marking this as referenced. The same, when a page is modified or written to, a modified bit is set. At an exact fixed time interval, the clock interrupt triggers and clears the referenced bit of each the pages, therefore only pages referenced inside the current clock interval are marked along with a referenced bit. When a page requires to be replaced, the operating system divides the pages in four classes:

  • Class 0: not referenced, not modified
  • Class 1: not referenced, modified
  • Class 2: referenced, not modified
  • Class 3: referenced, modified.

The Not recently used algorithm picks a random page from the lowest category for removal.

3. Optimal page replacement algorithm

The optimal page replacement algorithm (also termed as OPT) is an algorithm which works as follows:

When a page requires being swapped-in, the operating system swaps-out the page, whose subsequent use will occur farthest in the future. For illustration, a page which is not going to be used for the next 6 seconds will be swapped-out over a page which is going to be used inside the next 0.4 seconds.

Disadvantage: This algorithm can't be implemented in the common purpose operating system since this is impossible to calculate reliably how long this will be before a page is going to be used.


Related Discussions:- Explain the different page replacement policies

Create a web page from which customers can order equipment, Q. Create a Web...

Q. Create a Web page from which customers can order equipment? Suppose your boss wants you to create a Web page from which customers can order computer equipment. You need to c

What are pages, What are pages? All programs and date are composed of f...

What are pages? All programs and date are composed of fixed length units known as pages. Each page consists of blocks of words that occupy contiguous locations in main memory

State the protected mode interrupt, State the Protected mode interrupt ...

State the Protected mode interrupt In protected mode, interrupts have exactly same assignments just like in real mode though the interrupt vector table is different.  Instead

What is command prompt interface, Q. What is Command Prompt Interface? ...

Q. What is Command Prompt Interface? Operating System gives a text based interface called command prompt.  With the help of command prompt commands can be issued to perform fil

Explain about fundamental nature of a computer, Q. Explain about fundamenta...

Q. Explain about fundamental nature of a Computer? The fundamental nature of a Computer is as an information transformer. So a computer should be able to take input and process

What is called checking CRC in cyclic redundancy, In cyclic redundancy chec...

In cyclic redundancy checking CRC is the? Checking CRC, in cyclic redundancy is the remainder. Normal 0 false false false EN-IN X-NONE X-NONE

Describe about the layered computer design, Describe about the Layered comp...

Describe about the Layered computer design Introduction Layered computer design focuses on computer design. It uses top-down, layered approach to design and also to improve

Wrapping database calls into mts transactions, What is the advantage of wra...

What is the advantage of wrapping database calls into MTS transactions? Ans) If database calls are made within the context of a transaction, aborting the transaction will undo a

Shared-memory programming model, Q. Shared-memory programming model? In...

Q. Shared-memory programming model? In shared-memory programming model tasks share a common address space that they read and write asynchronously. Several mechanisms like semap

Computational study of a spring-mass system, Idealized spring-mass systems ...

Idealized spring-mass systems have numerous applications throughout engineering. Fig.1 shows an arrangement of three masses and four springs which, after is released, is pulled dow

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd