wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Design Considerations for Disk Cache Management

profile
Monil Parikh
Sep 09, 2024
0 Likes
0 Discussions
73 Reads
  1. Data Delivery: It explains two methods for delivering data from the disk cache to the requesting process: memory-to-memory transfer or using shared memory with pointers, the latter being more efficient and allowing shared access.
  2. Replacement Strategy: When a new sector is brought into the disk cache, an existing block must be replaced. Common strategies include Least Recently Used (LRU), where the least recently accessed block is replaced, and Least Frequently Used (LFU), which replaces the block with the fewest references. However, LFU can be less effective due to the influence of locality on reference counts.
  3. Frequency-Based Replacement: An advanced technique divides the cache into sections (new, middle, and old) to mitigate LFU's issues, allowing blocks time to build up reference counts before being eligible for replacement. This approach is shown to be more effective than simple LRU or LFU.
  4. Replacement Timing: Replacement can occur on-demand or be preplanned. Preplanned replacement may involve releasing multiple slots at once, especially when sectors that have been updated need to be written back to disk before replacement.








Comments ()


Sign in

Read Next

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Cloud Computing

Blog banner

10 Rare Historic Pictures that are Ever Captured

Blog banner

Os(Computer security threats)

Blog banner

10 Survival Tips that might save your life

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

What is OS and its overview

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

EID UL FITR

Blog banner

Data Science in Mental Health Prediction

Blog banner

What is Spyware?

Blog banner

Multicore CPUs

Blog banner

Python as a tool for data analysis

Blog banner

Clarizen

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

File management In Operating System

Blog banner

Memory management

Blog banner

Google App Engine

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

Memory Management

Blog banner

Virtual Machine

Blog banner

Deadlock

Blog banner

Memory Management

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

Iphone or Android which is the best smartphone?

Blog banner

Risk mitigation and management

Blog banner

Traditional UNIX Scheduling

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

Process Creation

Blog banner

Memory Management

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Fashion design

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

security requirements for safe e-payment

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Hacking Mobile Platforms

Blog banner