wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

MEMORY MANAGEMENT FILE

profile
F—17 Niraj shav
Jul 05, 2024
0 Likes
0 Discussions
34 Reads

o virtual memory technique. Virtaul memroy creates an illusion of larger memory space than physically available by utilizing secondary storage (hard drive) for extending RAM. It does it by swapping temporarily less used parts of programs to virtual memory freeing up the space of RAM for current use. This allows the system to multitask more effectively by exceeding the physical memory RAM capacity.

Protection: The OS enforces a strict hierarchy of memory access permissions. The kernel, the core of the operating system, enjoys the highest privilege level and has unrestricted access to all memory regions. User processes, on the other hand, operate with limited privileges. They can only access memory locations explicitly allocated to them and are prohibited from modifying critical system areas. 

Techniques of Memory Management : 
Contiguous Memory Allocation : In contiguous memory allocation elements are allocated in continous order i.e. a single contiguous block of memory. This means all memroy is assigned to a process are in a continous range. In Programming array is a good example of this in array elements are stored in contiguous (conitnous) format. As it is contiguous it is easy to implement and calculating address is simple as compared to non contiguous. As all memory is contiguous accessing memory is fast. But as it is contiguous it is hard to allocate memory i.e. it is hard to find free conotiguous memory space. And it is also not flexible as if there is somthing stored next to that contiguous memory it will be hard to extend it.

Non Contiguous Memory Allocation : In non contiguous memory allocation every element is stored in different locations (memory is not next to it like in contiguous memory allocation) blocks can be placed anywhere in physical memory. As memory is non contiguous memory is efficiently utilized and is also flexible as elements are stored in different locations. Memory isolation is easier to implement as every memroy is at different locations so it will be hard to access the memory that increases the security. But there are some limitations too like it increases the complexity and also calculation of address is difficult as compared to contiguous memory allocation.


Comments ()


Sign in

Read Next

Bulk E-mail software

Blog banner

Deadlock

Blog banner

Threat management

Blog banner

Modern Operating System - Khush bagaria

Blog banner

 " Healing of Yoga "

Blog banner

What is Data, Information and Knowledge?

Blog banner

Memory Management

Blog banner

Article on team management software

Blog banner

Multiprocessor

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

TRIGGERS IN DATABASE

Blog banner

Operating Systems

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

VIRTUAL MACHINES

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

Lucidchart

Blog banner

Cyber Security Standards

Blog banner

10 Signs your Computer has Virus

Blog banner

Memory heirachy (Operating system)

Blog banner

Memory input output management

Blog banner

I/O Buffering

Blog banner

Blockchain technology: security risk and prevention

Blog banner

Define Instagram.

Blog banner

Disk Management

Blog banner

Raid and levels of raid.

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Virtual memory

Blog banner

The Peephole

Blog banner

AI and Cyber Security

Blog banner

Deadlock in Operating System

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

DISK SCHEDULING

Blog banner

The Memory Hierarchy

Blog banner

How Schools Can Reduce Exam Stress in Students?

Blog banner

Different types of scam Fraud

Blog banner

Is It Too Late to Straighten My Teeth as an Adult?

Blog banner

PHONE TECHNOLOGY

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Scheduling

Blog banner

Artificial Intelligence and I

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner