wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Design Considerations for Disk Cache Management

profile
Monil Parikh
Sep 09, 2024
0 Likes
0 Discussions
73 Reads
  1. Data Delivery: It explains two methods for delivering data from the disk cache to the requesting process: memory-to-memory transfer or using shared memory with pointers, the latter being more efficient and allowing shared access.
  2. Replacement Strategy: When a new sector is brought into the disk cache, an existing block must be replaced. Common strategies include Least Recently Used (LRU), where the least recently accessed block is replaced, and Least Frequently Used (LFU), which replaces the block with the fewest references. However, LFU can be less effective due to the influence of locality on reference counts.
  3. Frequency-Based Replacement: An advanced technique divides the cache into sections (new, middle, and old) to mitigate LFU's issues, allowing blocks time to build up reference counts before being eligible for replacement. This approach is shown to be more effective than simple LRU or LFU.
  4. Replacement Timing: Replacement can occur on-demand or be preplanned. Preplanned replacement may involve releasing multiple slots at once, especially when sectors that have been updated need to be written back to disk before replacement.








Comments ()


Sign in

Read Next

From Websites To Super Apps For Digital User Experience

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

Booting Process In Operating System

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

LiquidPlanner

Blog banner

Direct Memory Access

Blog banner

Virtual memory

Blog banner

Microsoft powerpoint presentation

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

Big Data Architecture

Blog banner

Benefits of Yoga

Blog banner

Memory input output management

Blog banner

Yoga in INDIA and ABROAD

Blog banner

MORDERN UNIX SYSTEM

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Types of OS

Blog banner

Retiring ISS

Blog banner

Functions of Operating System

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

Outlook mail

Blog banner

MOBILE DEVICE FORENSIC

Blog banner

Cyber Security in Data Breaching

Blog banner

Security issues

Blog banner

MUTUAL EXCLUSION

Blog banner

Principles of Concurrency

Blog banner

Capacity management in ITSM

Blog banner

Understanding Regression Analysis

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Operating system

Blog banner

10 Reasons to date your best friend

Blog banner

SAVE TREES

Blog banner

Heart Fulness Meditation

Blog banner

Install Ubuntu Easily

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

Vulnerability Assessment

Blog banner

Goa Trip With Friends

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Deadlock

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner