wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Logical and physical address

profile
Priti Pandav
Aug 13, 2024
0 Likes
0 Discussions
123 Reads

Logical And Physical Addresses

An address generated by the CPU is commonly refereed as Logical Address, whereas the

address seen by the memory unit that is one loaded into the memory address register of the

memory is commonly refereed as the Physical Address. The compile time and load time

address binding generates the identical logical and physical addresses. However, the

execution time addresses binding scheme results in differing logical and physical addresses.

The set of all logical addresses generated by a program is known as Logical Address Space,

where as the set of all physical addresses corresponding to these logical addresses is

The user program never sees the real physical address space, it always deals

with the Logical addresses. As we have two different type of addresses Logical address

in the range (0 to max) and Physical addresses in the range(R to R+max) where R is

the value of relocation register. The user generates only logical addresses and thinks that

the process runs in location to 0 to max. As it is clear from the above text that user program

supplies only logical addresses, these logical addresses must be mapped to physical address

before they are used.

Base and Limit Registers

A pair of base and limit registers define the logical address space

Physical Address Space. Now, the run time mapping from virtual address to physical

address is done by a hardware device known as Memory Management Unit. Here in the

case of mapping the base register is known as relocation register. The value in the relocation

register is added to the address generated by a user process at the time it is sent to memory

.Let's understand this situation with the help of example: If the base register contains the

value 1000,then an attempt by the user to address location 0 is dynamically relocated to

location 1000,an access to location 346 is mapped to location 1346.

Memory-Management Unit (MMU)

Hardware device that maps virtual to physical address

 In MMU scheme, the value in the relocation register is added to every address generated by a user

process at the time it is sent to memory

 The user program deals with logical addresses; it never sees the real physical addresses


Comments ()


Sign in

Read Next

Beauty of indian railway

Blog banner

The Role of cryptography in cyber security

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Difference Between Classification And Clustering

Blog banner

american greatines

Blog banner

Security issues

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

Why is ITSM important in IT organization?

Blog banner

What if COVID does not exist!

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

Assessing Incident Detection Response Process

Blog banner

Security issues

Blog banner

Business Intelligence v/s Big Data

Blog banner

APACHE KAFKA

Blog banner

Design in figma

Modern Operating system

Blog banner

Hosting basics

Blog banner

Broken Authentication Attacks

Blog banner

Zero-Day Attack

Blog banner

An Overivew Of Cache Memory

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

ZOHO

Blog banner

The functions of operating system

Blog banner

Man In The Middle Attack

Blog banner

Evolution of Operating Sytems

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

Fault Tolerance in an Operating System

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Transgender

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

Kernel in Operating System

Blog banner

Risk factors in service transistion

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Functions Of Operating Systems

Blog banner

Types of Malware in Cyber Security

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Mumbai famous street food

Blog banner

Key to success in Sports

Blog banner

Blockchain technology: security risk and prevention

Blog banner