Explain the different page replacement policies, Computer Engineering

Assignment Help:

Explain the different page replacement policies.

Various page replacement algorithms are briefly explained below:

1. First-in, first-out

FIFO page replacement algorithm is a low-overhead algorithm. Now there the operating system maintains track of all the pages in memory in a queue, along with the most current arrival at the back, and the initial arrival in front. While a page requires to be replaced, the page at the front of the queue as the oldest page is selected.

Advantage: FIFO is intuitive and cheap.

Disadvantage:

1. Not good performs in practical application.

2. Suffers from Belady's anomaly.

2. Not recently used

NRU page replacement algorithm works at the following principle: while a page is referenced, a referenced bit is set for which page, marking this as referenced. The same, when a page is modified or written to, a modified bit is set. At an exact fixed time interval, the clock interrupt triggers and clears the referenced bit of each the pages, therefore only pages referenced inside the current clock interval are marked along with a referenced bit. When a page requires to be replaced, the operating system divides the pages in four classes:

  • Class 0: not referenced, not modified
  • Class 1: not referenced, modified
  • Class 2: referenced, not modified
  • Class 3: referenced, modified.

The Not recently used algorithm picks a random page from the lowest category for removal.

3. Optimal page replacement algorithm

The optimal page replacement algorithm (also termed as OPT) is an algorithm which works as follows:

When a page requires being swapped-in, the operating system swaps-out the page, whose subsequent use will occur farthest in the future. For illustration, a page which is not going to be used for the next 6 seconds will be swapped-out over a page which is going to be used inside the next 0.4 seconds.

Disadvantage: This algorithm can't be implemented in the common purpose operating system since this is impossible to calculate reliably how long this will be before a page is going to be used.


Related Discussions:- Explain the different page replacement policies

Determine the boolean expression using k-map, Reduce the following equation...

Reduce the following equation using k-map Y = BC‾D‾ + A‾BC‾D + ABC‾D + A‾BCD + ABCD Ans. Multiplying the first term with (A+A') Y = A'BC'D' + ABC'D' + A'BC'D + ABC'D + A'BCD +

Explain collaboration on task and event management, What is difference betw...

What is difference between collaboration on task and event management? Web-based task management application let the user handle the multiple pieces and parts of large projects

What is importance of xml into edi and electronic commerce, What is the imp...

What is the importance of XML into EDI and electronic commerce? XML has been explained as lightweight SGML: XML demonstrates great promise for its inherent capability to per

Describe in brief about the internet, Describe in brief about The internet ...

Describe in brief about The internet Web sites need to be set up to maximise information supplied to customers and to ensure they are as self-contained and helpful as possible.

Computational fluid dynamics, Q. Computational Fluid Dynamics? Computat...

Q. Computational Fluid Dynamics? Computational Fluid Dynamics: CFD was a FORTRAN like language developed in the early 70s at "Computational Fluid Dynamics Branch of Ames Resear

The disadvantage of specifying parameter, The disadvantage of specifying pa...

The disadvantage of specifying parameter during instantiation are: -  This has a lower precedence when compared to assigning using defparam.

How online databases work, How Online Databases Work? An online or web-...

How Online Databases Work? An online or web-based database keeps data on a cloud of servers somewhere on the Internet, which is accessible by any authorized user with an Intern

What is a path name, What is a path name?  A pathname is the path from ...

What is a path name?  A pathname is the path from the root by all subdirectories to a specified file. In a two-level directory structure a user name and a file name describe a

Vector-vector instructions-vector processing, Vector-Vector Instructions ...

Vector-Vector Instructions In this type, vector operands are fetched by the vector register and saved in another vector register. These instructions are indicated with the foll

Ellipse follows the perimeter of the window, A) Execute a program where an ...

A) Execute a program where an ellipse follows the perimeter of the window. B)  Execute a program that can draw graphs, possibly following your plan from last week. Have it graph

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd