Explain belady''s anomaly, Computer Network Security

Belady's Anomaly

Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page faults happens. Sometimes, the reverse occur, i.e., the run time increases even when more frames are distributed to the process. That is Belady's Anomaly. This is right for some page instance references patterns.

 

 

 

 

 

Posted Date: 8/20/2012 3:24:02 AM | Location : United States







Related Discussions:- Explain belady''s anomaly, Assignment Help, Ask Question on Explain belady''s anomaly, Get Answer, Expert's Help, Explain belady''s anomaly Discussions

Write discussion on Explain belady''s anomaly
Your posts are moderated
Related Questions
What is the function of key secrecy and algorithm secrecy in security?  Algorithm Secrecy is explained as follows: ‘Algorithm secrecy’ is a method of keeping an algorithm

Question : (a) What is an IDS and what is the basic problem it faces which can be solved by Artificial Intelligence. (b) Identify and describe briefly an Artificial Intell

#Under what circumstances would the use of a SecSDLC be more appropriate than an SDLC?

Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct

W h a t do you understand by the terms security, network security and information security? How network security and information security are connected? Security can be def

QUESTION: a) Below is a capture of an Ethernet II frame which has an IPv4 packet and a segment. Provide the source MAC address in hexadecimal; the source IP address, the length

(a) Using Fermat's theorem, find 3 201 mod 11. (b) Explain how the Diffie-Hellman key agreement protocol works and what its purpose and main properties are. Consider a Dif

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.   In general to

Screened Subnet Architecture This setup provides an extra security layer to screened host architecture by creating a perimeter subnet which further isolates internal network f

Normal 0 false false false EN-US X-NONE X-NONE