wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

MEMORY MANAGEMENT FILE

profile
F—17 Niraj shav
Jul 05, 2024
0 Likes
0 Discussions
33 Reads

o virtual memory technique. Virtaul memroy creates an illusion of larger memory space than physically available by utilizing secondary storage (hard drive) for extending RAM. It does it by swapping temporarily less used parts of programs to virtual memory freeing up the space of RAM for current use. This allows the system to multitask more effectively by exceeding the physical memory RAM capacity.

Protection: The OS enforces a strict hierarchy of memory access permissions. The kernel, the core of the operating system, enjoys the highest privilege level and has unrestricted access to all memory regions. User processes, on the other hand, operate with limited privileges. They can only access memory locations explicitly allocated to them and are prohibited from modifying critical system areas. 

Techniques of Memory Management : 
Contiguous Memory Allocation : In contiguous memory allocation elements are allocated in continous order i.e. a single contiguous block of memory. This means all memroy is assigned to a process are in a continous range. In Programming array is a good example of this in array elements are stored in contiguous (conitnous) format. As it is contiguous it is easy to implement and calculating address is simple as compared to non contiguous. As all memory is contiguous accessing memory is fast. But as it is contiguous it is hard to allocate memory i.e. it is hard to find free conotiguous memory space. And it is also not flexible as if there is somthing stored next to that contiguous memory it will be hard to extend it.

Non Contiguous Memory Allocation : In non contiguous memory allocation every element is stored in different locations (memory is not next to it like in contiguous memory allocation) blocks can be placed anywhere in physical memory. As memory is non contiguous memory is efficiently utilized and is also flexible as elements are stored in different locations. Memory isolation is easier to implement as every memroy is at different locations so it will be hard to access the memory that increases the security. But there are some limitations too like it increases the complexity and also calculation of address is difficult as compared to contiguous memory allocation.


Comments ()


Sign in

Read Next

Deadlock and Starvation

Blog banner

Different types of scam Fraud

Blog banner

Cyber Security in Quantum and Space Communication

Blog banner

Memory Management in Operating System

Blog banner

TRIGGERS IN DATABASE

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

Process Description

Blog banner

Blockchain in IoT Applications

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

CSI and Organizational Change

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

Direct memory access (DMA)

Blog banner

Virtual Memory

Blog banner

Landslide Hazard

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

Linux 94

Blog banner

Deadlock and Starvation

Blog banner

Self managing devices

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

Security and E-mail

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

Importance of education

Blog banner

Mumbai local ......

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

HR Automation : Need of the hour

Blog banner

Processing Crime and Incident Scenes

Blog banner

VIRTUAL MACHINES

Blog banner

Disk scheduling

Blog banner

R Programming

Blog banner

Disk Management

Blog banner

Virtualization

Blog banner

How to feel Happy everyday day

Blog banner

Health and fitness

Blog banner

Memory management

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

Modern operating system

Blog banner

Threading

Blog banner

RAID and It's Levels

Blog banner

Financial Fraud Detection

Blog banner

Uniprocessor and Types

Blog banner