wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Caching windows

profile
Dev Sheta
Sep 10, 2024
0 Likes
0 Discussions
96 Reads

• The Windows cache improves the performance of file systems by keeping

recently and frequently used regions of files in memory

• The cached regions of files are called views because they represent regions of

kernel virtual addresses that are mapped onto file-system files.

• Thus, the actual management of the physical memory in the cache is provided

by the memory manager.

• The role of the cache manager is to manage the use of kernel virtual addresses

for views, arrange with the memory manager to pin pages in physical memory,

and provide interfaces for the file systems

• The Windows cache-manager facilities are shared among all the file systems.

• Because the cache is virtually addressed according to individual files, the cache

manager is easily able to perform read-ahead on a per-file basis.


Comments ()


Sign in

Read Next

MY FIRST BLOG?

Blog banner

The Sunny Side of Instagram

Blog banner

Socket Programming in Java

Blog banner

Network Forensics Tools and Techniques

Blog banner

Google classroom

Blog banner

IT RISK

Blog banner

Women empowerment

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

Blog on Smartsheet.

Blog banner

Dal Bafla Recipe

Blog banner

Service Strategy principles

Blog banner

Mumbai

Blog banner

Career v/s Job : Choose your passion

Blog banner

Ethical Hacking

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

I/O Management and Disk Scheduling

Blog banner

Modern Operating System

Blog banner

Marvel Cinematic Universe

Blog banner

Data Visualization

Blog banner

Operating system evolution

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Blockchain Transactions

Blog banner

Deadlock

Blog banner

Deadlock

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Starting Android Activity Using Intent

Blog banner

Types of Threads

Blog banner

Cyber Forensics

Blog banner

Pink sauce pasta

Blog banner

MAILFENCE

Blog banner

Multithreading in Operating System

Blog banner

Memory heirchy

Blog banner

DISK SCHEDULING

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Photorec - media recovery tool

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

Blockchain Security Technique

Blog banner

Biometric Authentication Vulnerabilities

Blog banner