fifo refers to the first-in-first-out page replacement algorithm. The page that is first transferred into the memory for each replacement is the page that has the longest waiting time in the memory. Advantages: It is relatively simple to implement and does not require hardware support, so there is no need to increase the cost of the system.

The operating environment of this tutorial: Windows 10 system, Dell G3 computer.
fifo (first in, first out page replacement algorithm)
Basic idea: Prioritize the page that enters the memory earliest, That is, the page that has resided in memory the longest.
This algorithm is simple to implement. You only need to link the pages transferred into the memory into a queue according to the order, and set a pointer to always point to the earliest page. However, this algorithm is not suitable for the actual running rules of the process, because some pages are frequently accessed during the process.
Implementation process:
Assume that the system allocates three physical blocks to a process, and consider the following page number reference string: 7, 0, 1, 2, 0, 3, 0,4,2,3, 0, 3, 2, 1, 2, 0, 1, 7, 0, 1. The FIFO algorithm is used for page replacement. When the process accesses page 2, page 7, which enters the memory earliest, is swapped out. Then when page 3 is accessed, the page 2, 0, 1 that first enters the memory is swapped out. As can be seen from the figure below, 12 page replacements are performed when using the FIFO algorithm.
| Visit page | 7 | 0 | 1 | 2 | 0 | 3 | 0 | 4 | 2 | 3 | 0 | 3 | 2 | 1 | 2 | 0 | 1 | 7 | 0 | 1 |
| Physical Block 1 | 7 | 7 | 7 | 2 | 2 | 2 | 4 | 4 | 4 | 0 | 0 | 7 | 7 | |||||||
| 0 | 0 | 3 | 3 | 2 | 2 | 2 |
##1 |
1 |
1 |
0 | 0 | |||||||||
| ##1 | 11 | 00 | 0 | 3 | 3 | 3 | 2
2 |
1 | Missing Page No | |||||||||||
| √ | √ | √ | √ |
√ |
√ | √ | √ | √ |
##√ |
√ |
√ |
√ | √## Disadvantages: The FIFO algorithm will also produce an increase in the number of allocated physical blocks. The abnormal phenomenon in which the number of page faults increases instead of decreasing was discovered by Belady in 1969, so it is called the Belady anomaly, as shown in the figure below. Only the FIFO algorithm may experience Belady anomalies, while the LRU and OPT algorithms will never experience Belady anomalies. | For more related knowledge, please visit the |
The above is the detailed content of What page replacement algorithm is fifo?. For more information, please follow other related articles on the PHP Chinese website!
Why does my lnk file have an arrow overlay?Aug 26, 2025 am 05:04 AMThe guaronoona.lkfvisua.lkfvisuawingiShortiArtcut, noriotical ;notalfile; earthlpspreVUSIFUSECYSIGNLETHATELYTH eshortcutwonal'tdeleteal, Andhathef Resonance.1.TarroWabooth-LeftCorneroftToom
What to do when your Mac has a self-assigned IP address?Aug 26, 2025 am 05:00 AMIfyourMachasaself-assignedIPandnointernet,trythesesteps:1.RenewDHCPLeaseinNetworksettings.2.RestartrouterandMac.3.Removeandre-addWi-Fiservice.4.SetDNSto8.8.8.8and8.8.4.4.5.ResetnetworksettingsviaTerminalusingsudormcommand.
Why do I hear a beeping sound during my callAug 26, 2025 am 04:40 AMCallwaitingalertscausebeepingwhensomeoneelsecallsduringanongoingcall;disablecallwaitinginphonesettingsifunwanted.2.Conferencecallsmayproducebeepswhenparticipantsjoinorleaveortoindicateactivestatus;thisisnormalforVoIPorgroupsystems.3.Lowbatteryonyourp
What are USB flash drives used for?Aug 26, 2025 am 04:06 AMUSBflashdrivesaresmall,portablestoragedevicesthatconnecttocomputersandotherdevicesviaaUSBport.They’rewidelyusedforavarietyofeverydaytasksbecausethey’reconvenient,reliable,andcomeinlargestoragecapacitiesatlowcost.He
Can a virus change my 192.168.1.1 router settings?Aug 26, 2025 am 03:36 AMAviruscanchangeroutersettingsat192.168.1.1onlyifitaccessestheadmininterfaceusingknownorweakcredentials.2.Onceinside,malwarecanhijackDNS,disablefirewalls,changepasswords,orinstallbackdoors,asseenwiththreatslikeVPNFilter.3.Remoteadministrationincreases
What is the Lenovo Novo buttonAug 26, 2025 am 02:57 AMIftheNovobuttonisn’tworking,ensurethedeviceispoweredoffandtrypressingthepinholebuttonwithapaperclip.Checkforproperbatterycharge,thenaccessthebootmenuorsystemrecoveryoptionsfromthebluescreen.
How to Add Text to a Non-Editable PDF?Aug 26, 2025 am 02:55 AMToaddtexttoanon-editablePDF,useaPDFeditorwithtextoverlaytools:1.OpenthePDFinsoftwarelikeAdobeAcrobatProDC.2.Usethe“EditPDF”toolandselect“AddText”(Aaicon).3.Clickanywhereonthepageandtypeyourtext.4.Adjustfont,size,andcolorusingthetoolbar.5.Savetheedite
Can't connect to WiFi after changing 192.168.1.1 settingsAug 26, 2025 am 02:51 AMYoulikelychangedtherouter’sIPorWi-Fisettingsincorrectly,causingaconnectionmismatch.Restarttherouteranddevice,thencheckthedefaultgatewayviaipconfigornetworksettingstofindthecurrentIP.2.IfWi-Fiwasmisconfigured,resettherouterbyholdingtheresetbuttonfor10

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

WebStorm Mac version
Useful JavaScript development tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

Dreamweaver Mac version
Visual web development tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment






