Memory pools-input and output pool-pci pool, Computer Networking

Assignment Help:

Memory Pools

IOS manages available free memory thorugh  memory pool series, which are essentially heaps in the generic sense; each pool is a set of memory blocks that can be allocated and deallocated as  per need. Memory pools are managed by the kernel.

There are three memory pools such as Processor, I/O and  PCI

Processor Pool

Hardware: DRAM

Function: It is one of the part of subregion of DRAM. It is common of IOS system and for storing routing tables

I/O pool:

            Hardware: DRAM

            Function: It manages form iomem memory region of DRAM

PCI pool:

            Hardware: DRAM

            Function:It manages form pcimem memory region of DRAM

Memory region manager, memory pool manager are important components of Kernel.

Kernal handles the DRAM by the execution of iomem commands for shared the memory to processor,PCI and I/O.


Related Discussions:- Memory pools-input and output pool-pci pool

10base-t, 10BASE-T:  This is another standard of wiring function. It i...

10BASE-T:  This is another standard of wiring function. It is usually known 10Base-T, TP Ethernet or Twisted Pair. It removes AUI cable with twisted pair cable and thick coax

What is network server, What is Network Server? Network Server is a com...

What is Network Server? Network Server is a computer in Network that is designated to give one or more network service. For instance file server, database server etc.

Threats to information can include, Threats to information can include ...

Threats to information can include Deletion of a file or files. Corruption, caused either by hardware problems or by a bug in the software. Theft of company data

Request to a server, If a client gives a 4096-byte request to a server loca...

If a client gives a 4096-byte request to a server located 50 km away on a 1 Gbps fiber optic, then what is the efficiency of the line during this time? Suppose that the server give

Show vpns security and the internet model, Q. Show VPNs Security and the In...

Q. Show VPNs Security and the Internet Model? - VPN's Security and the Internet Model - Application layer - provide for each application protocol (other layers may be left v

How many cycles are lost for instruction accessing memory, 1.  A computer s...

1.  A computer system has a two-level memory cache hierarchy. The L1 cache has a zero hit penalty, a miss penalty of 5 ns and a hit rate of 95 percent. The L2 cache has a miss pena

What is network virtual terminal, What is NVT (Network Virtual Terminal) ...

What is NVT (Network Virtual Terminal) It is a set of rules explaining a very simple virtual terminal interaction. The NVT is used in the begin of a Telnet session.

Verify network connectivity- ccna, Verify Network Connectivity Step 1: ...

Verify Network Connectivity Step 1: Use the ping command to determine network connectivity. You can determine network connectivity using the ping command.  Note: If pings

Give examples of the application layer, Pretty much any end-user program is...

Pretty much any end-user program is an best example of the Application Layer.

Computer Information Systems, I am taking a computer information systems cl...

I am taking a computer information systems class for which I have an online test I need done. It will not let me attach all the material that is on the test but someone well versed

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd