wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management - operating system

profile
vivek pandey
Aug 13, 2024
0 Likes
0 Discussions
66 Reads

Memory management : in an operating system (OS) refers to the process of handling computer memory, including RAM and cache, to optimize system performance and resource utilization. It involves tracking every byte in a computer's memory, whether it is in use or free, and managing the allocation and deallocation of memory blocks to processes and applications. Memory management ensures that each process has enough memory to execute while also ensuring that the system doesn’t run out of memory, which can lead to crashes or performance issues. Key techniques include paging, segmentation, and virtual memory, which allow the system to simulate more memory than is physically available by using disk space. Efficient memory management is crucial for the smooth operation of a multitasking environment, as it ensures that all running processes have the necessary resources without interfering with each other.

 

 Paging is a memory management scheme that eliminates the need for contiguous allocation of physical memory. The OS divides memory into fixed-sized blocks called pages. The logical address space is divided into pages, while the physical memory is divided into frames. When a program is executed, its pages are loaded into available frames. Paging helps in efficient memory utilization and eliminates fragmentation issues. The page table is a crucial data structure that maintains the mapping between logical addresses and physical memory.


   Segmentation is a memory management technique where the memory is divided into segments of different sizes, each representing a logical unit such as a function, array, or object. Unlike paging, which divides memory into fixed-sized blocks, segmentation divides memory based on the program’s logical structure. Each segment is assigned a segment number and offset. The main advantage of segmentation is that it allows for easier implementation of modular programs and better protection, as each segment can be independently protected.


   Virtual memory is a technique that allows the execution of processes that may not be completely loaded into physical memory. By using disk space as an extension of RAM, virtual memory enables larger programs to run on systems with limited physical memory. It works by swapping pages of data between RAM and disk storage as needed. This technique provides the illusion of a large, contiguous memory space to processes, allowing them to run efficiently even with limited physical memory. Virtual memory is crucial for multitasking systems where multiple processes need to run simultaneously.


   Fragmentation refers to the inefficient use of memory, leading to wasted space. It occurs in two forms: internal and external fragmentation. Internal fragmentation happens when allocated memory blocks have unused space within them, while external fragmentation occurs when free memory is scattered in small blocks across the system. Fragmentation can lead to a shortage of usable memory, even if enough total memory is available. Techniques like paging and defragmentation help minimize the impact of fragmentation.

 

 


Comments ()


Sign in

Read Next

Beyond the Track: Why the Best Hotel in Arcadia, Florida, Completes Your IMSA Sebring Getaway

Blog banner

Spyware

Blog banner

Riddhi Miyani 53003220140

Blog banner

Modern operating system

Blog banner

Pandas Matrix Applications

Blog banner

Game via listing method

Blog banner

Scala - a programming tool

Blog banner

Deadlock

Blog banner

Smartsheet

Blog banner

Data Lake

Blog banner

Number Guessing game --lisp

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

Spotify

Blog banner

Real time scheduling

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

Principles of Concurrency

Blog banner

 " Healing of Yoga "

Blog banner

Developments in Modern Operating Systems

Blog banner

What is process

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Os assignment

Blog banner

Policies for Service Transition

Blog banner

The Right way of cooking

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

What is Email? Uses of Emails

Blog banner

LinkedIn

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

Memory management

Blog banner

Modern Operating System - Khush bagaria

Blog banner

Service Operations in ITSM

Blog banner

10 Unknown facts about India's Independence

Blog banner

Uniprocessor Scheduling

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Importance of education

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Predictive Analysis - Ek Overview

Blog banner

Social Media Marketing Trends 2022

Blog banner

memory cache

Blog banner