Explain belady''s anomaly, Computer Network Security

Belady's Anomaly

Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page faults happens. Sometimes, the reverse occur, i.e., the run time increases even when more frames are distributed to the process. That is Belady's Anomaly. This is right for some page instance references patterns.

 

 

 

 

 

Posted Date: 8/20/2012 3:24:02 AM | Location : United States







Related Discussions:- Explain belady''s anomaly, Assignment Help, Ask Question on Explain belady''s anomaly, Get Answer, Expert's Help, Explain belady''s anomaly Discussions

Write discussion on Explain belady''s anomaly
Your posts are moderated
Related Questions
Computer networks is a complex subject due to the given reasons: MANY DIFFERENT TECHNOLOGIES EXIST: The first reason for the complexity of networks is that there are s

QUESTION Testing of a Business Continuity Plan (BCP) does not need to be costly or to interrupt the daily operations of the business. The result of the test should also be look

Q. What is Triple Key Management Scheme? The triple key management mechanism provides optimum security by enabling the use of two pre-deployed keys for each of the WS nodes, an

What do you understand by the DNS? Explain the usage of the resource rec or ds. Domain Name System is described below: The Domain Name Service (DNS) is the hierarchi

Stateless Packet Filtering Stateless or static packet filtering is the most straightforward kind of packet filtering that allows or disallows data transfer based on the addres

Problem 1: a) One of the limitations of file processing systems is data inconsistency. Briefly explain with the help of an example what do you understand by this phrase. b)

PARSING IPv6 HEADERS Base header is fixed in size i.e. 40 octets. NEXT HEADER field in the base header describe kind of header and it seems at end of fixed-size base header. S

Question: (a) Explain how the Diffie-Hellman key establishment protocol works. (b) Prove that the Diffie-Hellman key establishment protocol is vulnerable to a `man in the mi

Normal 0 false false false EN-US X-NONE X-NONE