Questions and Answers

What is Thrashing?

Thrashing is the operation of dumping memory when the system is used at its maximum capacity, to transfer data between the physical and virtual memory. For example, if the user runs multiple tasks at the same time, the operations of exchanging data between the hard disk and the virtual memory might be demanding for the computer, and in this case, when the computer “cleans” the virtual memory from unneeded data, the process is called trashing. This phenomenon appears only if the virtual memory is overworked; ad the instability of the system is common in those cases.

Trashing might lead to a slow computer. Trashing is also a harmful operation for the hard drive, as it is used at its maximum capacity. If trashing occurs often, it will eventually lead to a hard drive crash.

There are several methods that can be used to avoid trashing:

1 – Increasing the RAM capacity of the computer.
2 – Running a smaller number of programs at the same time.
3 – Increasing the number of power of BUS connections that are responsible for the data exchange process.
4 – Reinstalling the operating system, or installing a performing one. However, if the new OS is too demanding for the computer, the process of trashing might be more severe, and it could bring more problems to the system.

What is the Serialization?

Serialization is the modifying process of a structure of modeling data, made with the purpose of integrating the respective concept into other databases. It is important to find the right format, so the new structure would be fully integrated in the database. The simplest and easiest way of understanding serialization is to take the example of memory buffering, or network connections. A piece of a program is inserted into the memory buffer, with the purpose of integrating the respective structure into another structure later.

This secondary structure could be another program, another computer, or another network node. Serialization is used to create an identical clone with the initial program, and to adapt it to fit into the new structure. However, for complex objects, it is impossible to create the perfect clone, therefore there are secondary methods used to create the clone that fits the secondary system. You will find this process under the name deflating, but it is basically the same process: the procedure of extracting data from a string of binary codes, as a method to describe objects, with the purpose of placing the respective objects into a new compatible structure. It is a method of distributing objects, which is commonly used to improve programs and software, and to create updated versions of the respective codes.