wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Design Considerations for Disk Cache Management

profile
Monil Parikh
Sep 09, 2024
0 Likes
0 Discussions
73 Reads
  1. Data Delivery: It explains two methods for delivering data from the disk cache to the requesting process: memory-to-memory transfer or using shared memory with pointers, the latter being more efficient and allowing shared access.
  2. Replacement Strategy: When a new sector is brought into the disk cache, an existing block must be replaced. Common strategies include Least Recently Used (LRU), where the least recently accessed block is replaced, and Least Frequently Used (LFU), which replaces the block with the fewest references. However, LFU can be less effective due to the influence of locality on reference counts.
  3. Frequency-Based Replacement: An advanced technique divides the cache into sections (new, middle, and old) to mitigate LFU's issues, allowing blocks time to build up reference counts before being eligible for replacement. This approach is shown to be more effective than simple LRU or LFU.
  4. Replacement Timing: Replacement can occur on-demand or be preplanned. Preplanned replacement may involve releasing multiple slots at once, especially when sectors that have been updated need to be written back to disk before replacement.








Comments ()


Sign in

Read Next

The Role of cryptography in cyber security

Blog banner

How to write a cover letter

Blog banner

Memory

Blog banner

Virtual memory

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Threading

Blog banner

The Future of Web Development in 2026: Trends Every Business Must Know

Blog banner

How Men and Women Process Pain Differently

Blog banner

Education: Key to your Prosperity

Blog banner

Operating Systems Overview

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Social Engineering

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Ubiquitous Computing

Blog banner

Virtual Memory

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Deadlock in operating system

Blog banner

How to tie a Tie

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

Open Source Project By Google

Blog banner

What is service level Agreement?

Blog banner

Types of Hackers

Blog banner

Linux Memory Management

Blog banner

PROCESS STATE:

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

NodeJs

Blog banner

The War With Cold On Earth

Blog banner

Deadlock in operating system

Blog banner

Direct Memory Access

Blog banner

What is Spyware?

Blog banner

Footprinting

Blog banner

Importance Of Education.

Blog banner

My Favorite Sportsperson

Blog banner

How to use open SSL for web server - browser communication

Blog banner

To travel is to live

Blog banner

Starvation

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

This too shall pass

Blog banner