Generate a random reference string of length

Assignment Help Operating System
Reference no: EM131449085

Belady'sanamoly says you can (slide 17, Lecture 8) the number of page faults is not always inversely proportional to the number of frames.

In this assignment you will experiment on this.

Your tasks are:

1. Generate a random reference string of length 30, (each number of the string is between 0 to 8).

2. You initialize the frame size as 1.

3. Run FIFO page replacement algorithm.

4. Count the page fault.

5. Increase frame size to 2 and repeat steps 3 and 4.

6. You will repeat step 5 until the frame size is 10.

7. Draw a graph and show the relationship between number of frames vs number of page fault ?(similar to the graph of slide 17, lecture 8)

8. Report this graph along with its explanation in a word/pdf file.

So finally you will be submitting your code and the report.

Verified Expert

This program code is written in JAVA programming language to compute the number of page faults using FIFO algorithm. The Client/ Driver program generates a reference string of length 30 where at each index of the string is a random value between 0 and 8. Further, an object of FIFO class is created and invokes the method, to compute the number page faults using FIFO algorithm, on it. This method is invoked for the frame size ranging from 1 to 10.

Reference no: EM131449085

Questions Cloud

Determining the international law : This last week's reading from our book solidified a concept that I was entertaining since Week 1; much of International Law is established through.
Design a dynamic programming algorithm : Design a dynamic programming algorithm to find the value of the optimal plan. Implement your algorithm using any programming language you prefer.
Define ethical criticism : Do you agree with the thought expressed in this chapter that a frm confronted with strong ethical criticism should abandon the product.
Define each protocol and describe two data transmission : Define each protocol and describe at least two data transmission technologies associated with the protocol. Include bandwidth limitations of each technology.
Generate a random reference string of length : Generate a random reference string of length - Run FIFO page replacement algorithm. ?Draw a graph and show the relationship between number of frames vs number of page fault
Explain the maxwell distribution : (The Maxwell distribution). Denote by = (1, 2, 3)T the velocity vector of a gas particle.
Determine the profit-maximizing price : If the firms produce good X at a marginal cost of $7 per unit and the market elasticity of demand is -2, determine the profit-maximizing price.
Identify and briefly describe two inherent risks : Identify and briefly describe TWO inherent risks, and TWO control risks of D-MERTON and explain how TYSL Accountants have responded to each risk
Fixed costs of production : The marginal cost of production is constant and is equal to $2. There are no fixed costs of production.

Reviews

Write a Review

Operating System Questions & Answers

  Asymmetric encryption algorithm

Discuss and explain how the asymmetric encryption algorithm can be used to achieve the following targets:

  Three-process 4 resource system

Give an example of a three-process 4 resource system that is in an unsafe state. Explain why it is in an unsafe state. How many more resources would need to be added to make it a safe state?

  Change the permissions on a file

Write a command which will change the permissions on a file named boreworms.txt so that the owner of the file has read and execute permission, the group owner has read permission, and no one else has any access to the file.

  Automatic diagnostic system

Sommerville recommended that objects manipulated through users should be drawn from their own domain rather that an computer domain.

  Determine potential causes of the problem

A user calls to report that she is not able to log on to email. You respond with a couple of quick questions. Because you think that no one else is using the network right now,

  Mobile ip is emerging

Mobile IP is emerging as the next industry standard for the way in which wireless devices move from one network to another.

  Discuss at least two different types of operating systems

Write an essay using Microsoft Word identifying and discussing at least two different types of operating systems. Include the advantages, disadvantages, and security concerns of each type of operating system.

  Creating hipo charts and decision tables

Now that you have a program design and a selected programming language for your assignment, you can start looking at the logical flow of the processes within your program and the data that is input,

  Six of the best practices should be general practices

The management team for MWS has asked for a simple but thorough checklist describing best practices for securing the operating systems used in the company. Six of the best practices should be general practices

  Question 1a enumerate the objectives of a procurement

question 1a enumerate the objectives of a procurement development modelb describe one procurement development model you

  What are the four types of business ownership describe each

what are the four types of business ownership? describe each of them. your response should be at least 200 words in

  Write a recursive descent parser

Perform the pairwise disjointness test for each rule to show that this grammar allows top-down parsing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd