wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

MEMORY MANAGEMENT REQUIREMENT

profile
Krishna Johari
Aug 14, 2024
0 Likes
0 Discussions
230 Reads

MEMORY MANAGEMENT REQUIREMENT


(I) Memory management is a critical function of an operating system (OS) that handles the allocation and deallocation of memory resources to various processes and ensures optimal use of the computer's memory. 

(II) Memory management keeps track of the status of each memory location, whether it is allocated or free. 

(III) It allocates the memory dynamically to the programs at their request and frees it for reuse when it is no longer needed. 

(IV) Memory management is meant to satisfy some requirements that we should keep in mind.

(V) Here are the key requirements for memory management in an operating system:


Relocation: 

  • In a multiprogramming system, memory is shared among multiple processes, making it difficult to predict which programs will be in main memory at the time of execution. 
  • Swapping active processes allows the operating system to have a larger pool of ready-to-execute processes.
  • However, swapping may cause a program to move to a different memory area. 
  • The operating system needs to know the location of process control information, execution stack, and code entry.
  • After loading the program, it must translate logical addresses into physical addresses.


Protection :

  • Multiple programs can cause interference, making it crucial to protect processes against unwanted interference.
  • A trade-off exists between relocation and protection requirements, as satisfaction of relocation increases protection difficulty. 
  • Predicting program location in main memory is impossible, so absolute address checks are not possible. 
  • Memory protection must be satisfied by the processor, as the operating system cannot control processes.


Sharing :

  • A protection mechanism must allow multiple processes to access the same main memory portion, allowing controlled access without compromising protection.
  • Memory management aims to support relocation-supported sharing capabilities, allowing each process to access the same copy of the program.



Logical organization :

  • Main memory is organized as linear or one-dimensional address space, with programs organized into modules. 
  • These modules can be unmodifiable or modified. 
  • The operating system and hardware must support a basic module for protection and sharing. 
  • Advantages include independent writing and compilation, different protection levels, and module-level sharing, allowing user-specified sharing.


Physical organization :

  • Computer memory consists of main and secondary memory, with main memory being faster and more costly. Secondary memory is used for long-term data storage, while main memory holds current programs. The main concern is information flow, which can be challenging for programmers due to overlaying and multiprogramming environments, where they cannot predict memory space availability.

Comments ()


Sign in

Read Next

Big Data

Blog banner

Explain DBMS in Brief

Blog banner

Virtual machine.

Blog banner

I/O Buffering

Blog banner

History of ITIL

Blog banner

Types of OS

Blog banner

Multicore CPUs

Blog banner

Pooja Silver

Blog banner

Spotify

Blog banner

IOT Hacking Techniques

Blog banner

Mail merge

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Digital Marketing Ethics Transparency Trust And Brand Reputation digital

Blog banner

Not anti-social, but pro-solitude

Blog banner

Zomato (Income Sources)

Blog banner

E-commerce

Blog banner

Environmental Management using GIS

Blog banner

Precision-Recall in Data Science

Blog banner

Evolution of operating systems

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Tracking Emails & Email Crimes

Blog banner

What is Influencer Marketing and its Trends

Blog banner

E-learning in today's world

Blog banner

Network Forensics Tools and Techniques

Blog banner

Data Structures

Blog banner

Operating Systems

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

Memory management and virtual memory

Blog banner

1.1 basic elements

Blog banner

I Personally

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Importance of modern technology era

Blog banner

Computer security techniques

Blog banner

What if COVID does not exist!

Blog banner

The seven-step improvement process

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

My favourite food

Blog banner

Mendeley (management software)

Blog banner

IO Buffers

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

ADIDAS

Blog banner