wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Concurrency and memory

profile
Yakin Shah
Aug 13, 2024
0 Likes
0 Discussions
74 Reads

_Concurrency:_

 

Concurrency refers to the ability of an operating system to execute multiple processes or threads simultaneously, improving system utilization and responsiveness. It involves:

 

1. _Process scheduling:_ Allocating CPU time to processes.

2. _Context switching:_ Switching between processes quickly.

3. _Synchronization:_ Managing access to shared resources.

 

Concurrency techniques:

 

1. _Multitasking:_ Running multiple processes concurrently.

2. _Multithreading:_ Running multiple threads within a process.

3. _Multiprocessing:_ Running multiple processes on multiple CPUs.

 

_Memory:_

 

Memory refers to the storage space where data and program instructions are held while a computer is running. The operating system manages memory, ensuring efficient use and preventing conflicts.

 

Memory Management:

 

1. _Process isolation:_ Each process has its own memory space.

2. _Memory allocation:_ Assigning memory to processes.

3. _Memory deallocation:_ Reclaiming memory from terminated processes.

4. _Paging and segmentation:_ Dividing memory into smaller units for efficient use.

5. _Virtual memory:_ Using disk space as an extension of physical memory.

 

Memory Types:

 

1. _RAM (Random Access Memory):_ Fast, volatile memory for running programs.

2. _ROM (Read-Only Memory):_ Non-volatile memory for storing firmware.

3. _Cache memory:_ Fast, small memory for frequently accessed data.

4. _Virtual memory:_ Combination of physical memory and disk space.

 

Effective memory management and concurrency enable efficient use of system resources, improving overall performance and user experience.


Comments ()


Sign in

Read Next

The seven-step improvement process

Blog banner

Article on Fresh Book

Blog banner

Computer Security

Blog banner

Direct Memory Access

Blog banner

K-means use cases

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

Disk Scheduling

Blog banner

Esri India launches Policy Maps.

Blog banner

The War With Cold On Earth

Blog banner

c

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

Virtual memory

Blog banner

File Management In OS

Blog banner

BharatPe

Blog banner

Social Engineering Attacks

Blog banner

DIGITAL ECONOMY

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

You'll get to know about Pankaj Negi

Blog banner

Why Friendship at Work is Important

Blog banner

Population

Blog banner

geographic information system (GIS)

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Memory management

Blog banner

Kernel in Operating System

Blog banner

(Input/Output) in os

Blog banner

Artificial Intelligence (AI)

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Modern Operating Systems.

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

Data Visualization- Importance and tools (Tableau,Power BI, Matplotlib)

Blog banner

Metasploit

Blog banner

Linker

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Emotional Suppression: The Hidden Costs Of Unfelt Feelings

Blog banner

Getting started with Android Studio

Blog banner

Uniprocessor Scheduling

Blog banner