wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

MEMORY MANAGEMENT REQUIREMENT

profile
Krishna Johari
Aug 14, 2024
0 Likes
0 Discussions
230 Reads

MEMORY MANAGEMENT REQUIREMENT


(I) Memory management is a critical function of an operating system (OS) that handles the allocation and deallocation of memory resources to various processes and ensures optimal use of the computer's memory. 

(II) Memory management keeps track of the status of each memory location, whether it is allocated or free. 

(III) It allocates the memory dynamically to the programs at their request and frees it for reuse when it is no longer needed. 

(IV) Memory management is meant to satisfy some requirements that we should keep in mind.

(V) Here are the key requirements for memory management in an operating system:


Relocation: 

  • In a multiprogramming system, memory is shared among multiple processes, making it difficult to predict which programs will be in main memory at the time of execution. 
  • Swapping active processes allows the operating system to have a larger pool of ready-to-execute processes.
  • However, swapping may cause a program to move to a different memory area. 
  • The operating system needs to know the location of process control information, execution stack, and code entry.
  • After loading the program, it must translate logical addresses into physical addresses.


Protection :

  • Multiple programs can cause interference, making it crucial to protect processes against unwanted interference.
  • A trade-off exists between relocation and protection requirements, as satisfaction of relocation increases protection difficulty. 
  • Predicting program location in main memory is impossible, so absolute address checks are not possible. 
  • Memory protection must be satisfied by the processor, as the operating system cannot control processes.


Sharing :

  • A protection mechanism must allow multiple processes to access the same main memory portion, allowing controlled access without compromising protection.
  • Memory management aims to support relocation-supported sharing capabilities, allowing each process to access the same copy of the program.



Logical organization :

  • Main memory is organized as linear or one-dimensional address space, with programs organized into modules. 
  • These modules can be unmodifiable or modified. 
  • The operating system and hardware must support a basic module for protection and sharing. 
  • Advantages include independent writing and compilation, different protection levels, and module-level sharing, allowing user-specified sharing.


Physical organization :

  • Computer memory consists of main and secondary memory, with main memory being faster and more costly. Secondary memory is used for long-term data storage, while main memory holds current programs. The main concern is information flow, which can be challenging for programmers due to overlaying and multiprogramming environments, where they cannot predict memory space availability.

Comments ()


Sign in

Read Next

Ola

Blog banner

RAID

Blog banner

semaphores in os

Blog banner

Memory Management

Blog banner

Modern Operating System

Blog banner

Paralysis/Paralysis Stroke

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

E-commerce

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

Delhi city

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

OS Assignment 3

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

Question

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

A Heartfelt Act of Kindness

Blog banner

OS Assignment-3

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

What are NFT s?

Blog banner

Man VS Nature

Blog banner

What is thread and multithreading ?

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

Disk scheduling

Blog banner

World end

Blog banner

Bit Coins

Blog banner

OLA

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Buffer Overflow

Blog banner

Benefits of yoga and meditation

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

Mental Health

Blog banner

MailChimp

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

Pipedrive

Blog banner

Google App Engine

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

Fashion design

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Modern operating system

Blog banner

Microsoft powerpoint presentation

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner