What the different paging techniques, Operating System

Assignment Help:

The different paging techniques are

1. Multilevel paging or hierarchical paging method: In definite cases the page table may consist up to 1 million entries. This would be as well large to accommodate in the main memory. One simple solution with this problem is to divide the page table into smaller pieces.

2. Hashed page table method: A general method for handling address spaces larger than 32 bits is to use a hashed page table with the hash value being the virtual page number. Every entry in the hash table contains a linked list of elements that hash to the same location.

3. Inverted page table method: An inverted page table has one entry for every real page of memory. Every entry consists of the virtual address of the page stored in threat real memory location, along with information about the process that owns that page.

4. Shared pages method: Shared page tables are typically implemented as multiple virtual addresses that are mapped to one physical address.

5. Demand paging method: This is alike to a paging system with swapping. Processes inhabit on the secondary memory. When we would like to execute a process, we swap it in to the memory.

 


Related Discussions:- What the different paging techniques

Explain file control list and user control list, Q. Researchers have recom...

Q. Researchers have recommended that instead of having an access list associated with each file (specifying which users can access the file and how) we should have a user control

Explain the spawnvp function used in the netware, Explain the Spawnvp Funct...

Explain the Spawnvp Function used in the netware Spawnvp(flags, execNmae, argv)   This function executes  similarly to spawnlp( ) except that parameters are passed as a v

Palm os provides no signifies of concurrent processing, Q. Palm OS provides...

Q. Palm OS provides no signifies of concurrent processing. Discuss three major complications that concurrent processing adds to an operating system. Answer: a. A meth

Factors involved in choosing the host operating system, 1. How is reliabili...

1. How is reliability enhanced with the microkernel approach to system design?  2. In a virtual machine design where guest operating systems are independent virtual machines sup

Concepts of an address - data and control bus, Let us consider the operatio...

Let us consider the operation of the EPROM device in more detail. Consider the pining details below again   Before we examine the interface means of the EPROM, it is worth

Linux os, Introduction of linux

Introduction of linux

How can the deadlock be prevented?, How can the deadlock be prevented? ...

How can the deadlock be prevented? To evade deadlocks first we will have to obtain the information about how resources are to be requested. And as well we should make sure that

Explain acyclic graph directories and its implementation, Acyclic Graph Dir...

Acyclic Graph Directories In this kind of directory structure the shared directories or files can exist in the file system in two or more places at once. A tree structure excl

Operation management, #question After working for 30 years, Ramjee Somjee D...

#question After working for 30 years, Ramjee Somjee Dutt opted for VRS and started a courier company and did very well in the first four years. He was now looking for expansion of

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd