Explain belady''s anomaly, Computer Network Security

Belady's Anomaly

Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page faults happens. Sometimes, the reverse occur, i.e., the run time increases even when more frames are distributed to the process. That is Belady's Anomaly. This is right for some page instance references patterns.

 

 

 

 

 

Posted Date: 8/20/2012 3:24:02 AM | Location : United States







Related Discussions:- Explain belady''s anomaly, Assignment Help, Ask Question on Explain belady''s anomaly, Get Answer, Expert's Help, Explain belady''s anomaly Discussions

Write discussion on Explain belady''s anomaly
Your posts are moderated
Related Questions
ACCESS CONTROL DEVICES Successful access control system includes number of components, which depends on system’s requirements for authentication and authorization. Powerful auth

Problem (a) Give two reasons for companies to implement security measures. (b) What is the regulatory expectation regarding i. healthcare information, ii. financial

Explain the architecture of ISDN.....?

IP DATAGRAM SIZE:  Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 6

INTRODUCTION TO PLANNING FOR SECURITY The creation of an information security program begins with creation and review of organization’s information security policies, standards,

Question: (a) Prove that every positive integer n can be factorized into a product of prime powers. (b) State the Fermat-Euler theorem as needed in the RSA system. (c) Us

RISK ASSESSMENT Risk assessment is a step in a risk management technique. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete

UDP INTERACTION  UDP follows four kinds of interaction 1-to-1: One application can interact with one application. 1-to-many: One application can interact with many

PARSING IPv6 HEADERS Base header is fixed in size i.e. 40 octets. NEXT HEADER field in the base header describe kind of header and it seems at end of fixed-size base header. S

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below