wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Concurrency and memory

profile
Yakin Shah
Aug 13, 2024
0 Likes
0 Discussions
74 Reads

_Concurrency:_

 

Concurrency refers to the ability of an operating system to execute multiple processes or threads simultaneously, improving system utilization and responsiveness. It involves:

 

1. _Process scheduling:_ Allocating CPU time to processes.

2. _Context switching:_ Switching between processes quickly.

3. _Synchronization:_ Managing access to shared resources.

 

Concurrency techniques:

 

1. _Multitasking:_ Running multiple processes concurrently.

2. _Multithreading:_ Running multiple threads within a process.

3. _Multiprocessing:_ Running multiple processes on multiple CPUs.

 

_Memory:_

 

Memory refers to the storage space where data and program instructions are held while a computer is running. The operating system manages memory, ensuring efficient use and preventing conflicts.

 

Memory Management:

 

1. _Process isolation:_ Each process has its own memory space.

2. _Memory allocation:_ Assigning memory to processes.

3. _Memory deallocation:_ Reclaiming memory from terminated processes.

4. _Paging and segmentation:_ Dividing memory into smaller units for efficient use.

5. _Virtual memory:_ Using disk space as an extension of physical memory.

 

Memory Types:

 

1. _RAM (Random Access Memory):_ Fast, volatile memory for running programs.

2. _ROM (Read-Only Memory):_ Non-volatile memory for storing firmware.

3. _Cache memory:_ Fast, small memory for frequently accessed data.

4. _Virtual memory:_ Combination of physical memory and disk space.

 

Effective memory management and concurrency enable efficient use of system resources, improving overall performance and user experience.


Comments ()


Sign in

Read Next

Modern operating system

Blog banner

Process Description

Blog banner

Direct Memory Access

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

Direct memory access

Blog banner

THE ACTORS LIFE

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

GIS Mapping

Blog banner

Digital Forensics Challenges and Tools

Blog banner

HTML vs HTML5

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

Direct Memory Access

Blog banner

How to insert contacts in zoho crm using php

Blog banner

Blockchain Transactions

Blog banner

ASANA- A Management System.

Blog banner

Career v/s Job : Choose your passion

Blog banner

Logical and physical address

Blog banner

Memory Management Techniques

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

Race Conditions

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Article on IT development trends

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

Google App Engine

Blog banner

Save Environment

Blog banner

Importance Of Time

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

5 Common Faults In Construction Tenders

Blog banner

Is Your Password Complex Enough?

Blog banner

Interrupts in OS

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Cryptanalysis tool

Blog banner

Deadlock

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

Developments in Modern Operating Systems

Blog banner

Risk factors in service transistion

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

USES OF WHATSAPP

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

objectives and functions of operating system

Blog banner

Subnet Masking

Blog banner