Deleted Added
full compact
1.t (1639) 1.t (18715)
1.\" Copyright (c) 1986 The Regents of the University of California.
2.\" All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)1.t 5.1 (Berkeley) 4/16/91
1.\" Copyright (c) 1986 The Regents of the University of California.
2.\" All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)1.t 5.1 (Berkeley) 4/16/91
33.\" $Id$
33.\"
34.NH
35Motivations for a New Virtual Memory System
36.PP
37The virtual memory system distributed with Berkeley UNIX has served
38its design goals admirably well over the ten years of its existence.
39However the relentless advance of technology has begun to render it
40obsolete.

--- 110 unchanged lines hidden (view full) ---

151to the amount of swap space as is done in the current design.
152Consequently, the new design will allow the maximum virtual memory
153to be the sum of physical memory plus swap space.
154For machines with no swap space, the maximum virtual memory will
155be governed by the amount of physical memory.
156.PP
157Another effect of the current technology is that the latency and overhead
158associated with accessing the file system is considerably higher
34.\"
35.NH
36Motivations for a New Virtual Memory System
37.PP
38The virtual memory system distributed with Berkeley UNIX has served
39its design goals admirably well over the ten years of its existence.
40However the relentless advance of technology has begun to render it
41obsolete.

--- 110 unchanged lines hidden (view full) ---

152to the amount of swap space as is done in the current design.
153Consequently, the new design will allow the maximum virtual memory
154to be the sum of physical memory plus swap space.
155For machines with no swap space, the maximum virtual memory will
156be governed by the amount of physical memory.
157.PP
158Another effect of the current technology is that the latency and overhead
159associated with accessing the file system is considerably higher
159since the access must be be over the network
160since the access must be over the network
160rather than to a locally-attached disk.
161One use of the surplus memory would be to
162maintain a cache of recently used files;
163repeated uses of these files would require at most a verification from
164the file server that the data was up to date.
165Under the current design, file caching is done by the buffer pool,
166while the free memory is maintained in a separate pool.
167The new design should have only a single memory pool so that any

--- 210 unchanged lines hidden ---
161rather than to a locally-attached disk.
162One use of the surplus memory would be to
163maintain a cache of recently used files;
164repeated uses of these files would require at most a verification from
165the file server that the data was up to date.
166Under the current design, file caching is done by the buffer pool,
167while the free memory is maintained in a separate pool.
168The new design should have only a single memory pool so that any

--- 210 unchanged lines hidden ---