Explain beladys anomaly, Operating System

Explain Belady's Anomaly?

Also called FIFO anomaly. Usually, on enhancing the number of frames allocated to a process virtual memory, the process implementation is faster, because fewer page faults happens. Sometimes, the reverse happens, i.e., the execution time enhances even when more frames are allocated to the process. This is Belady's Anomaly. This is true for certain page reference patterns.

 

Posted Date: 7/5/2013 2:14:37 AM | Location : United States







Related Discussions:- Explain beladys anomaly, Assignment Help, Ask Question on Explain beladys anomaly, Get Answer, Expert's Help, Explain beladys anomaly Discussions

Write discussion on Explain beladys anomaly
Your posts are moderated
Related Questions
List the Coffman's conditions that lead to a deadlock. Mutual Exclusion : Only one process might be use a critical resource at a time. Hold & Wait: A process may be alloc

List the four steps that are essential to run a program on a completely dedicated machine. a. Reserve machine time. b. Manually load program into memory. c. Load starting

Deadlocks can be detected while the program is running, by running cycle detection algorithms on the graph that de?nes the current use of resources. De?ne this graph as follows:

Problem 1: (a) What are the likely benefits which an organisation may derive from the planning process? (b) Explain the main reasons why an organisation may fail to plan.

Explain the Request or Response interface The Request/Response interface is ideal for a message based client-server interaction. By modeling components to interact via a reque

Define properties of Distributed operating system Distributed:- This system distributes computation among several physical processors. The processors do not share memory or a

how copy on write on pages when many process works at a same time?

Why interrupt can be used? The majority of the different parts of the PC need to send information to and from the processor and they expect to be able to get the processor's at

Q. A Burroughs B7000/B6000 MCP file is able to be tagged as sensitive data. When such a file is removed its storage area is overwritten by some random bits. For what reason would

How can the index blocks be implemented in the indexed allocation scheme? The index block can be implemented as follows a. Multilevel scheme b. Linked scheme c. Combin