Demand paging, Operating System


Demand paging gives that pages could only be brought into memory if the running process acts them. This is usually referred to as lazy evaluation as only those pages operated by the process are swapped from secondary storage to main memory. Contrast this to accurate swapping, where all memory for a process is changed from secondary storage to main memory in the mean while the process startup.

Usually, to gain this process a page table implementation is needed. The page table maps logical storage to physical storage. The page table uses a bitwise operator to check if a page is invalid or valid. A valid page is one that currently has in main memory. An invalid page is one that currently has in secondary storage. When a process tries to accept a page, the following steps are usually followed:

  • Try to access page.
  • If page is valid then continue processing instruction as normal.
  • If page is invalid then a page-fault trap happens.
  • Check if the memory reference is a valid reference to a location on secondary memory. If not, the process is ended.



1735_Demand Paging.png

Posted Date: 7/30/2012 1:14:57 AM | Location : United States

Related Discussions:- Demand paging, Assignment Help, Ask Question on Demand paging, Get Answer, Expert's Help, Demand paging Discussions

Write discussion on Demand paging
Your posts are moderated
Related Questions
Q. Consider the subsequent page reference string: 1, 2, 3, 4, 2, 1, 5, 6, 2, 1, 2, 3, 7, 6, 3, 2, 1, 2, 3, 6. How many page faults would take place for the following replace

Describe the internal layout of the file system in windows 2000. The basic entity in NTFS is a volume and a volume is created by the Windows 2000 disk administrator utility and

Question 1: (a) Describe what is meant by Client-server Computing? (b) Distinguish between a server process and a client process. (c) What are the basic characteristics o

Can you give me assistance on my operating system assignment?

Remote IT Support Engineer Windows Systems Administrator Project Description: Need Windows base IT Support Engineer / Systems Network Administrator - perfectly MCSE qualified

Question: (a) Red Hat Linux is distributed under the Open Source agreement. Explain what you understand by Open Source distribution system. (b) Write a short note on the L

Question: a) There are main goals of data security. List them and elaborate on how they provide protection. b) Describe threats associated with data security. c) Describe

Q. What protection problems may occur if a shared stack is used for parameter passing? Answer: The contents of the stack could be conciliation by other process(es) sharing th

Q. How does the distinction among kernel mode and user mode function as a rudimentary form of protection (security) system? Answer: The distinction among kernel mode and user m

BENEFITS OF THREADS OVER PROCESS If implemented correctly after those threads have some advantages of (multi) processes, they take: 1. Less time to create a new thread tha