wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management

profile
Anam Maruf
Jul 04, 2024
0 Likes
2 Discussions
98 Reads

 

Memory management  helps to coordinate n control the computers main memory .

It ensures that  the memory space is properly managed and allocated in operating  system.

Memory managers enables sharing of memory space between processes. Hence  two programs can work  at the same memory location although at different times.

 

There are 3 types of memory management

Hardware memory management.

Operating system memory management.

 

Application memory management

Example :

If you have a computer of 8 gb of ram and want to run several programs then the memory management  helps to ensure that program have enough memory and cab run without interfering  with each other

Advantages:

It is a simple management approach

Disadvantages:

It does not support multiprogramming

 

In memory  management the memory unit supports two basic operations: read and write.

The read operation reads previously stored dat

The write operation stores a new value in memory. Both of these operations require a memory address. In addition, the write operation requires specification of the data to be written.

There are several types of computer memory such as random access memory (RAM), read-only memory (ROM), cache memory, virtual memory,

The main activities  of memory management  are

 

Thrashing

Memory protection

 Page replacement

Swapping

Demand pagging

Virtual memory

Segmentation

Paging

Memory  allocation

Etcc

Memoryy allocation has two typess 

They aree as follows:

Fixed Partitioning: Memory is divided into fixed-size partitions.

 

 Dynamic Partitioning: Memory is allocated to processes based on their needs

Page relapcement has following types:

FIFO (First-In-First-Out): Replaces the oldest page.

 

LRU (Least Recently Used): Replaces the page that has not been used for the longest time.

 

Optimal: Replaces the page that will not be used for the longest time in the future

Basic Functions of Memory Management

Tracking each byte of memory in the system.

 

Allocating and deallocating memory spaces as needed by the system's processes.

 

Managing swap spaces, which store inactive pages of memory.

 

Implementing policies for memory allocation.

Anam Maruf 

Div-A 

53003230032

 


Comments ()


Sign in

Read Next

Google classroom

Blog banner

Tracking Emails & Email Crimes

Blog banner

Why is ITSM important in IT organization?

Blog banner

Deadlock

Blog banner

Virtual Memory

Blog banner

Functions Of Operating Systems

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

OPERATING SYSTEM

Blog banner

Product Discount Calculator

Blog banner

Short note on expert system

Blog banner

Cache memory

Blog banner

Artificial Intelligence (AI)

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

Patola Outfits for the Modern Wardrobe: Reviving Indian Handloom in Style

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner

RAID - LEVELS OF RAID

Blog banner

Importance of Education

Blog banner

Semaphores

Blog banner

ahh wait a min

Blog banner

Service Operations in ITSM

Blog banner

Education: Key to your Prosperity

Blog banner

Earth with no trees

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Hash password! Is it really secured?

Blog banner

indian premier league

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

Animal’s have my heart

Blog banner

Introduction my self

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

"Games and the future"

Blog banner

What is Minting & Mining

Blog banner

(Input/Output) in os

Blog banner

Pipedrive

Blog banner

Note Taker App

Blog banner

MySQL

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

The most common internet security threats

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Blockchain technology: security risk and prevention

Blog banner

File management in os

Blog banner

Digital Marketing

Blog banner