본문내용
computer provides its users with a virtual memory space of 2(32exp) bytes. The computer has 2(18exp) bytes of physical memory. The virtual memory is implemented by paging, and the page size is 4,096 bytes. A user process generates the virtual address 11123456. Explain how the system establishes the corresponding physical location. Distinguish between software and hardware operations.
Answer : The virtual address in binary form is
0001 0001 0001 0010 0011 0100 0101 0110
Since the page size is 2(12exp), the page table size is 2(20exp). Therefore the loworder 12 bits "0100 0101 0110" are used as the displacement into the page, while the remaining 20bits "0001 0001 0001 0010 0011" are used as the displacement in the page table.
9.6 Is it possible for a process to have two working sets, one representing data and another representing code? Explain.
Yes, in fact many processors provide two TLBs for this very reason. As an example, the code being accessed by a process may retain the same working set for a long period of time. However, the data the code accesses may change, thus reflecting a change in the working set for data accesses.
9.7 Suppose that your replacement policy (in a paged system) is to examine each page regularly and to discard that page if it had not been used since the last examination. What would you gain and what would you lose by using this policy rather than LRU or second-chance replacement?
Answer Such an algorithm could be implemented with the use of a reference bit. After every examination, the bit is set to zero; set back to one if the page is referenced. The algorithm would them select an arbitrary page for replacement from the set of unused pages since the last examination. The advantage of this algorithm is its simplicity-nothing other than a reference bit need be maintained. The disadvantage of this algorithm is that it ignores locality by using only a short time frame for determining whether to evict a page or not. For example, a page may be part of the working set of a process, but may be evicted because it was not referenced since the last examination (that is, not all pages in the working set may be referenced between examinations.)
Answer : The virtual address in binary form is
0001 0001 0001 0010 0011 0100 0101 0110
Since the page size is 2(12exp), the page table size is 2(20exp). Therefore the loworder 12 bits "0100 0101 0110" are used as the displacement into the page, while the remaining 20bits "0001 0001 0001 0010 0011" are used as the displacement in the page table.
9.6 Is it possible for a process to have two working sets, one representing data and another representing code? Explain.
Yes, in fact many processors provide two TLBs for this very reason. As an example, the code being accessed by a process may retain the same working set for a long period of time. However, the data the code accesses may change, thus reflecting a change in the working set for data accesses.
9.7 Suppose that your replacement policy (in a paged system) is to examine each page regularly and to discard that page if it had not been used since the last examination. What would you gain and what would you lose by using this policy rather than LRU or second-chance replacement?
Answer Such an algorithm could be implemented with the use of a reference bit. After every examination, the bit is set to zero; set back to one if the page is referenced. The algorithm would them select an arbitrary page for replacement from the set of unused pages since the last examination. The advantage of this algorithm is its simplicity-nothing other than a reference bit need be maintained. The disadvantage of this algorithm is that it ignores locality by using only a short time frame for determining whether to evict a page or not. For example, a page may be part of the working set of a process, but may be evicted because it was not referenced since the last examination (that is, not all pages in the working set may be referenced between examinations.)
키워드
추천자료
운영체제의 개념과 그 이해
조선 개국 초기의 왕권 강화와 국정운영체제와 유교정치
운영체제란?
[운영체제] 운영체제론 용어정리
운영체제 용어정리
[디지털네트워크][네트워크]네트워크의 구조, 네트워크화의 효과 및 영향, 네트워크 운영체제...
[기술기반][ECC기술][ERP기술][XML기술][무선랜기술][SecureOS기술]ECC기술기반제품, ERP(전...
SCSI(스카시)와 BUS, SCSI(스카시)의 개념, SCSI(스카시)의 등장 배경, SCSI(스카시)의 장점,...
[일본항공, 일본항공산업, 항공산업, 민영화, 노사관계]일본항공(일본항공산업)의 변천과정, ...
지방정부의 BSC(Balanced Score Card) 운영체제 및 BSC의 실무적 체계와 운영상의 이슈
컴퓨터의이해1공통) 스마트폰 & QR코드에 대하여 서술 - 스마트폰의 정의와 대표적인 스...
[컴퓨터의 이해 공통] 1.스마트폰 현재 기준 ①대표적인 스마트폰 3개 이상 선정 이유와 각 운...
마이크로소프트 (MS : Microsoft) - 마이크로소프트 기업분석, 마이크로-소프트 창업, MS 운...
[컴퓨터의이해] 1) 본인이 사용 중이거나 또는 최신 스마트폰을 1 개 선정하고 스마트폰의 운...
소개글