What the different paging techniques, Operating System

Assignment Help:

The different paging techniques are

1. Multilevel paging or hierarchical paging method: In definite cases the page table may consist up to 1 million entries. This would be as well large to accommodate in the main memory. One simple solution with this problem is to divide the page table into smaller pieces.

2. Hashed page table method: A general method for handling address spaces larger than 32 bits is to use a hashed page table with the hash value being the virtual page number. Every entry in the hash table contains a linked list of elements that hash to the same location.

3. Inverted page table method: An inverted page table has one entry for every real page of memory. Every entry consists of the virtual address of the page stored in threat real memory location, along with information about the process that owns that page.

4. Shared pages method: Shared page tables are typically implemented as multiple virtual addresses that are mapped to one physical address.

5. Demand paging method: This is alike to a paging system with swapping. Processes inhabit on the secondary memory. When we would like to execute a process, we swap it in to the memory.

 


Related Discussions:- What the different paging techniques

Is anti virus a system utility, Problem: a) Explain physically what occ...

Problem: a) Explain physically what occurs when a disk is fragmented. What is the purpose of "defragmenting" a disk? b) What is the idea behind backing up data on a secondar

How many page faults take place in lru replacement, Q. Consider the subseq...

Q. Consider the subsequent page reference string: 1, 2, 3, 4, 2, 1, 5, 6, 2, 1, 2, 3, 7, 6, 3, 2, 1, 2, 3, 6. How many page faults would take place for the following replace

Buffer, What is bounded buffer

What is bounded buffer

List disadvantages of using a single directory, List disadvantages of using...

List disadvantages of using a single directory. Users have no privacy. Users must be careful in choosing file names, to avoid names used by others. Users may destroy each othe

Algorithm for reconstructing a logical ring, Q. Present an algorithm for re...

Q. Present an algorithm for reconstructing a logical ring after a process in the ring fails? Answer: Typically distributed systems utilize a coordinator process that performs

Quick, why we say " OS is a resource allocator" and “OS is a control progr...

why we say " OS is a resource allocator" and “OS is a control program"?

What are the various scheduling criteria for cpu scheduling, What are the v...

What are the various scheduling criteria for CPU scheduling? The various scheduling criteria are CPU utilization

What are conditions under which a deadlock situation arise, What are condit...

What are conditions under which a deadlock situation may arise? A deadlock situation can arise if the following four conditions hold simultaneously in a system: a. Mutual ex

Briefly discuss on real-time scheduling, Briefly discuss on real-time sched...

Briefly discuss on real-time scheduling? It is divided into two types.  Hard real-time systems are needed to complete a critical task within a guaranteed amount of time. T

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd