Write a short report on page replacement algorithms

Assignment Help Operating System
Reference no: EM1342209

Select one of two possible short reports

For your second (and final) assignment in this class, I would like to ask you to design an experiment on one of two subjects, and to submit a written report, describing your experiment and your conclusions. The two subjects are as follows (again, you should choose one of these subjects, and make it the subject of your report). Each subject is presented below in the form of a speculative question. Your goal in this assignment is to think about the question posed, and describe how you would answer it. You may actually conduct your proposed experiment (which would typically involve you writing and running some test code), in which case your report may be very brief and to the point (as long as you include your code, results, and both are clearly documented). On the other hand, you may instead present an argument and offer a more speculative answer (e.g., in the form of "if [X] conditions are true, then I would expect behavior/results [Y], and my reasoning for this is [Z]." If you opt for this more narrative and anecdotal approach, your report must describe in more detail how you would go about testing your hypothesis (verifying that the statements you are making are true), and so the report would be lengthier.

A good report should not need to be longer than two to four pages. Once again, I would like to take this opportunity to remind everyone that all work must be your own, and any external sources you use to support your conclusion, or to build upon your code, must be cited as such in your report. Please submit your answers as PDFs or Text files. 

Subject 1. Page Replacement Algorithms and Block Caching

Page replacement algorithms select which page (a fixed size region of memory storing bits) to remove from RAM (and probably replace with another that has been requested, and either does not exist or is stored on disk). Meanwhile block caches hold blocks (fixed size portions of storage, storing bits) that have been brought into RAM from disk, and in managing such block caches a big decision is which block to replace when a new one is requested. In this manner, page replacement and block cache management are very similar endeavors. However, in block caching we typically have a lot more time to make our decisions (and so LRU is feasible, unlike the case for virtual memory page replacement, where it is too expensive to implement). The question I would like you to answer is this: Should you use LRU for a block cache that receives its requests from another LRU cache? If yes, why? If no, why not and what else should you use?

 

The arrangement looks as follows:

BLOCK REQUESTS ->  [ CACHE 1 ] -> CACHE1 MISSES -> [CACHE 2] -> CACHE2 MISSES

 

The original requests are presented to "cache 1." If a block is not found in "cache 1" then we have a cache miss, and the request is forwarded to "cache2." If the item is not found in "cache2" then it is another cache miss and is retrieved from the remote device. When a cache miss occurs, an item is selected from that cache and replaced by the requested item. As far as "cache 2" is concerned, the list of blocks requested is the list of all the cache misses from "cache 1." You should assume that there is no communication between cache 1 and cache 2. The question you are addressing is whether it is useful to use LRU in cache 2. Make whatever assumptions you feel are reasonable regarding the caching algorithm used in cache 1. 

Subject 2. Storing Blocks and Remembering Where You Stored Them

The second subject is related to file systems and allocation policies. A big part of designing a file system is the allocation policy, and the addressing scheme you construct for finding blocks that form a file. For the final exam, you are expected to understand the workings of contiguous, linked, allocation-table, and index-node allocation schemes. If you elect to write about this subject, I would ask that you address the following question (regarding where to place a new block's worth of data in a storage system composed of block-sized locations): Is it better to assign a written data block to a location based on a uniform random distribution, or a random distribution with a heavy skew? In this hypothetical, you are faced with a data storage device that is the size of the planet, and you are being given data to store for later retrieval. You are not told the performance goal (so that is an assumption or range of assumptions you will need to make), but are told that the application that will be requesting data blocks will do its best to make your allocation policy seem bad. In other words, the only thing you know about the future reader of your stored data blocks is that it's an adversary to your allocation policy. And so it has been suggested that you place data randomly, thereby making it difficult for this future adversary to select a pattern of reads that results in poor performance. So once again the question is: should the random selection of location be performed using a uniform distribution, or a skewed distribution? The answer may seem obvious, or impossible to determine, but either way please remember the following as you write your report: the performance goals of the system have not been specified.

As you write your answer to either question, you are free to experiment and speculate regarding both the scope of the problem and I am looking more for your process of reasoning towards any suggested answer(s), than the specific answer you reach. Your goal is not to pick the right answer, but to demonstrate in a short report that you have thought about the question.

Verified Expert

Reference no: EM1342209

Questions Cloud

To what extent do you agree with free market economies : IFP Economics Module 1 coursework,  Report Title: To what extent do you agree with free market economies being more effective than a mixed economy?
Is nurd''s economy in equilibrium : If the full-employment level of Y is $250, what fiscal policy might the government follow? d. Suppose Y = $200, C = $160, S = $40, and I = $40. Is Nurd's economy in equilibrium
Case study assignment : Case study questions: What would Exacta's true exposure be from its new U.S. operations, and how would it change from the company's current exposure?
Determine the crossover point for the two options : Determine the crossover point for the two options.  Please give the formula for calculating crossover points, at least one step of calculation, and the correct answer for full credit.
Write a short report on page replacement algorithms : Select one of two possible short reports,  Subject 1. Page Replacement Algorithms and Block Caching,  Subject 2. Storing Blocks and Remembering Where You Stored Them
How business course made you better business leader : Be specific and provide examples and find what helped you the most to develop into the business leader that you are.
Monitor the productivity : Would you recommend that the office manager invest more time monitoring the productivity or her clerical staff explain
Describe the characteristics of the worst leader : Explain the characteristics of the worst leader you have known and describe negatives above, but what positive things did you learn from this worst leader
Bp oil spill - the challenges ahead : Explain what is your interpretation of what happened in the BP oil spill and how does this impact their leadership in the various organizations involved

Reviews

Write a Review

Operating System Questions & Answers

  Define critical path and cpm

Define Critical Path and CPM. Define Networks & Network scheduling

  What is life cycle costing

What is Life Cycle Costing. Describe briefly the methodology for Life Cycle Costing. What are the criteria to consider when a procurement officer is faced with the decision of procuring a used equipment instead of a new one.

  Virtual machines

Virtual machines supported by a host operating system

  Vliw processor

VLIW processor - assembler

  Explain deadlock-avoidance system

What is the difference between a safe state and an unsafe state in a deadlock-avoidance system?

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Explain the client-server architecture

What are the three different categories of command, support your answer by giving three examples. Give three good reasons, with valid explanation, to justify why partitioning hard disk provides a variety of advantages. Explain the client/server..

  Describe three solutions to critical section problem

Describe three solutions to critical section problem Explain the different methods used to handle deadlocks Distinguish between "No preemption" and "circular wait" in deadlocks prevention

  What is the main advantage of multiprogramming

What is the main advantage of multiprogramming How does the distinction between the monitor mode and user mode function as a rudimentary form of protection (security) system What is the difference between a trap and an interrupt? What is the u..

  Deadlock avoidance

i. Deadlock avoidance ii. Deadlock prevention and  iii. Deadlock detection

  Analyse the different methods for collecting data

Analyse the different methods for collecting data Explain by taking examples 3 types of Sampling techniques.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd