wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Design Considerations for Disk Cache Management

profile
Monil Parikh
Sep 09, 2024
0 Likes
0 Discussions
73 Reads
  1. Data Delivery: It explains two methods for delivering data from the disk cache to the requesting process: memory-to-memory transfer or using shared memory with pointers, the latter being more efficient and allowing shared access.
  2. Replacement Strategy: When a new sector is brought into the disk cache, an existing block must be replaced. Common strategies include Least Recently Used (LRU), where the least recently accessed block is replaced, and Least Frequently Used (LFU), which replaces the block with the fewest references. However, LFU can be less effective due to the influence of locality on reference counts.
  3. Frequency-Based Replacement: An advanced technique divides the cache into sections (new, middle, and old) to mitigate LFU's issues, allowing blocks time to build up reference counts before being eligible for replacement. This approach is shown to be more effective than simple LRU or LFU.
  4. Replacement Timing: Replacement can occur on-demand or be preplanned. Preplanned replacement may involve releasing multiple slots at once, especially when sectors that have been updated need to be written back to disk before replacement.








Comments ()


Sign in

Read Next

Uniprocessor scheduling

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

Artificial Intelligence and I

Blog banner

Why You Should Not Use Free VPNs

Blog banner

HUBSPOT

Blog banner

STARVATION

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Sage business cloud accounting

Blog banner

Is Your Password Complex Enough?

Blog banner

PPT methodology

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Google

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

What is Packet Filtering?

Blog banner

Online Games

Blog banner

SPEM

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

How Does SSO Works

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Modern operating system

Blog banner

TRELLO

Blog banner

Multiprocessor

Blog banner

City of Mumbai (Bombay):

Blog banner

OS Evolution Achievements

Blog banner

Short note on expert system

Blog banner

Deadlock and starvation in operating system

Blog banner

Telegram and it's features

Blog banner

AOL Mail

Blog banner

RAID

Blog banner

Synchronization

Blog banner

E-Governance

Blog banner

Virtual Machine's

Blog banner

SQL Injection

Blog banner

Concurrency and Deadlocks

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

All you need to know about “Off-page SEO”

Blog banner

bulk email software

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

Importance of Network Security Risk

Blog banner

Top 10 Logos and their meanings

Blog banner