wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Design Considerations for Disk Cache Management

profile
Monil Parikh
Sep 09, 2024
0 Likes
0 Discussions
73 Reads
  1. Data Delivery: It explains two methods for delivering data from the disk cache to the requesting process: memory-to-memory transfer or using shared memory with pointers, the latter being more efficient and allowing shared access.
  2. Replacement Strategy: When a new sector is brought into the disk cache, an existing block must be replaced. Common strategies include Least Recently Used (LRU), where the least recently accessed block is replaced, and Least Frequently Used (LFU), which replaces the block with the fewest references. However, LFU can be less effective due to the influence of locality on reference counts.
  3. Frequency-Based Replacement: An advanced technique divides the cache into sections (new, middle, and old) to mitigate LFU's issues, allowing blocks time to build up reference counts before being eligible for replacement. This approach is shown to be more effective than simple LRU or LFU.
  4. Replacement Timing: Replacement can occur on-demand or be preplanned. Preplanned replacement may involve releasing multiple slots at once, especially when sectors that have been updated need to be written back to disk before replacement.








Comments ()


Sign in

Read Next

Data Science in Mental Health Prediction

Blog banner

Virtual Machine

Blog banner

operating system

Blog banner

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

virtual machine

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Eating Well With Meal Maharaj on Busy Workdays Without Cooking

Blog banner

Os Virtual Memory

Blog banner

Modern operating systems (OS)

Blog banner

Linux 94

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

Service Operations in ITSM

Blog banner

Time Series Analysis

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Cache Memory(142)

Blog banner

Domain Name System

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

RAID

Blog banner

Concept and definition of m-commerce

Blog banner

Whatsapp Messenger

Blog banner

Telegram and it's features

Blog banner

Scheduling in Operating Systems

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

AI and cyber Security

Blog banner

Deadlock

Blog banner

Memory Management

Blog banner

Memory heirchy

Blog banner

Lucidchart

Blog banner

Multicore and multithreading 171

Blog banner

Big Data

Blog banner

Blockchain

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

OLA

Blog banner

Service Strategy principles

Blog banner

Paginng In OS

Blog banner

Multiprocessor

Blog banner

Fault Tolerance

Blog banner

Memory Management

Blog banner

Disk scheduling

Blog banner