Show how pages will be allocated using first-in-first-out, Computer Engineering

Assignment Help:

Consider the following page reference and reference time strings for a program: Page reference string: 5,4,3,2,1,4,3,5,4,3,2,1,5,.....

Show how pages will be allocated using the FIFO page replacement policy. Also calculate the total number of page faults when allocated page blocks are 3 and 4 respectively.

Page reference string is: 5,4,3,2,1,4,3,5,4,3,2,1,5,.....

For assigned page blocks 3, we contain following FIFO allocation. Page reference marked  along with  '+'  cause  page  fault  and  result  in  page  replacement that is performed through replacing the earliest loaded page existing into memory:

 

 

3

3

3

4

4

4

4

4

2

2

2

 

4

4

4

1

1

1

5

5

5

5

5

5

5

5

5

2

2

2

3

3

3

3

3

1

1

 

 

5+

 

4+

 

3+

 

2+

 

1+

 

4+

 

3+

 

5+

 

4

 

3

 

2+

 

1+

 

5

 

Page Reference

For assigned page blocks 4, we contain following FIFO allocation. Page reference marked along with '+' cause page fault and result into page replacement.

 

 

 

2

2

2

2

2

2

3

3

3

3

 

 

3

3

3

3

3

3

4

4

4

4

5

 

4

4

4

4

4

4

5

5

5

5

1

1

5

5

5

5

1

1

1

1

1

1

2

2

2

 

 

5+

 

4+

 

3+

 

2+

 

1+

 

4

 

3

 

5+

 

4+

 

3+

 

2+

 

1+

 

5+

 

Total no. of page faults =10 while allocated page blocks=3

Total no. of page fault =11, while allocated page blocks=4


Related Discussions:- Show how pages will be allocated using first-in-first-out

What is the use of boot block, What is the use of boot block? For a com...

What is the use of boot block? For a computer to start running when powered up or rebooted it needs to have an initial program to run. This bootstrap program tends to be simple

Explain about the public key cryptography, Explain about the Public Key Cry...

Explain about the Public Key Cryptography. Public Key Cryptography: It is a cryptographic system which uses two keys as a public key identified to everyone and a private

Give the solutions for critical section problem, Give the solutions for cri...

Give the solutions for critical section problem? A solution to the critical section problem must specify the subsequent requirements. (a) Mutual exclusion (b) Progress (c)

Multiple stack, how to implement the multiple stack

how to implement the multiple stack

Explain frequency division multiplexing, Explain FDM and show how CCITT sta...

Explain FDM and show how CCITT standards help in building the base band? Frequency Division Multiplexing: This is the process of combining some information channels through s

Write a bash-c shell script, Write a BASH/C shell script which takes a name...

Write a BASH/C shell script which takes a name of a directory as a command line argument, and prints unique login name of the users having files in that directory. Your code should

What is sap luw or update transaction, What is SAP LUW or Update Transactio...

What is SAP LUW or Update Transaction? Update transaction (or "SAP LUW") This is a set of updates terminated by an ABAP/4 commit.  A SAP LUW may last much longer than a data

De morgans laws, De Morgan's Laws : With continuing the relationship b...

De Morgan's Laws : With continuing the relationship between ^ and ? , we can also needs De Morgan's Law to rearrange sentences involving negation in conjunction with these con

Show system call for cloning, Show System call for cloning.  Standard f...

Show System call for cloning.  Standard form of Clone function is as follows: Int clone (Int (*FN) (), void *child stack, Int flag, intargs,); Parameter FN is Pointer fro

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd