wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

MEMORY MANAGEMENT FILE

profile
F—17 Niraj shav
Jul 05, 2024
0 Likes
0 Discussions
33 Reads

o virtual memory technique. Virtaul memroy creates an illusion of larger memory space than physically available by utilizing secondary storage (hard drive) for extending RAM. It does it by swapping temporarily less used parts of programs to virtual memory freeing up the space of RAM for current use. This allows the system to multitask more effectively by exceeding the physical memory RAM capacity.

Protection: The OS enforces a strict hierarchy of memory access permissions. The kernel, the core of the operating system, enjoys the highest privilege level and has unrestricted access to all memory regions. User processes, on the other hand, operate with limited privileges. They can only access memory locations explicitly allocated to them and are prohibited from modifying critical system areas. 

Techniques of Memory Management : 
Contiguous Memory Allocation : In contiguous memory allocation elements are allocated in continous order i.e. a single contiguous block of memory. This means all memroy is assigned to a process are in a continous range. In Programming array is a good example of this in array elements are stored in contiguous (conitnous) format. As it is contiguous it is easy to implement and calculating address is simple as compared to non contiguous. As all memory is contiguous accessing memory is fast. But as it is contiguous it is hard to allocate memory i.e. it is hard to find free conotiguous memory space. And it is also not flexible as if there is somthing stored next to that contiguous memory it will be hard to extend it.

Non Contiguous Memory Allocation : In non contiguous memory allocation every element is stored in different locations (memory is not next to it like in contiguous memory allocation) blocks can be placed anywhere in physical memory. As memory is non contiguous memory is efficiently utilized and is also flexible as elements are stored in different locations. Memory isolation is easier to implement as every memroy is at different locations so it will be hard to access the memory that increases the security. But there are some limitations too like it increases the complexity and also calculation of address is difficult as compared to contiguous memory allocation.


Comments ()


Sign in

Read Next

memory management

Blog banner

Rapido

Blog banner

Mutual exclusion

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

10 Interesting facts you should know!!!

Blog banner

Mail merge

Blog banner

OPERATING SYSTEM

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Memory Management - operating system

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Starvation

Blog banner

GIS

Blog banner

Note Taker App

Blog banner

Security and E-mail

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

Embaded operating system

Blog banner

operating system

Blog banner

Data Analytics in Data Science

Blog banner

Threads and concurrency

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

Interesting fact about kangaroo.

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

Social media

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Instagram

Blog banner

Photorec - media recovery tool

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

Bots and Cyber Security

Blog banner

Precision-Recall in Data Science

Blog banner

Optimization of operating system design

Blog banner

Women empowerment

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

BUFFER OVERFLOW_142

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

Memory Management in Operating System

Blog banner

Modern operating system

Blog banner

IP ADDRESS

Blog banner

Understanding - Proof of Work!

Blog banner

Fault tolerance

Blog banner

Malicious softwares

Blog banner