wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management Techniques

profile
Vedant Rana
Jul 04, 2024
0 Likes
0 Discussions
82 Reads

Memory Management Techniques: -

Process Isolation: 
Each running program gets its own section of memory. The OS must prevent independent processes from interfering with each other’s memory, both data and instructions.This prevents processes from interfering with each other.

Virtual Memory: 
Think of virtual memory as an imaginary extension of your computer’s actual RAM. When RAM is full, the OS moves some data to the hard drive. This allows bigger programs to run as if they have more memory than they really do.

Swapping: 
If there’s too much demand on memory, the OS can move entire processes from RAM to the hard drive to free up space. It’s like temporarily moving out of your apartment to let someone else use it for a bit.
There are two types of Memory Allocation Techniques:-
   A) Contiguous Allocation: 
   Memory is allocated in a single, continuous block. Simple and fast, but can waste space or memory as processes end and start.

   B)Non-Contiguous Allocation: 
   Memory is allocated in separate blocks scattered around, using various techniques like segmentation. More efficient use of space but more complex to manage.

Cache Management:
Uses small, fast memory caches to store frequently accessed data, speeding up the overall performance of the system. Imagine it as having a few frequently used Application pinned on your PC Tab bar instead of searching for them.

Protection and access control: 
Sharing of memory, at any level of the memory hierarchy, creates the potential for one program to address the memory space of another. This is desirable when sharing is needed by particular applications. At other times, it threatens the integrity of programs and even of the OS itself. The OS must allow portions of memory to be accessible in various ways by various users.

Summary: In essence, memory management in an operating system is about organizing and optimizing the use of memory to ensure that programs run efficiently and reliably. It involves allocating memory to processes, moving data between RAM and storage as needed, and protecting memory spaces to maintain system stability and security.


Comments ()


Sign in

Read Next

To-Do List In LISP

Blog banner

Deadlock

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner

Fashion marketing in india

Blog banner

Starting Android Activity Using Intent

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

Modern Operating System

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Social Media Marketing Trends 2022

Blog banner

Deadlock

Blog banner

Puri Jagannath temple

Blog banner

All you need to know about Website Traffic

Blog banner

John Titor: The Time Traveler

Blog banner

Life of an army person

Blog banner

Hubspot

Blog banner

All you need to know about “On-page SEO”

Blog banner

Business Intelligence v/s Big Data

Blog banner

Penetration Testing

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Dal Bafla Recipe

Blog banner

Uniprocessor scheduling

Blog banner

Service design process in ITSM

Blog banner

GraphX:- A graph processing tool

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Mumbai

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

Memory management

Blog banner

Man VS Nature

Blog banner

Virtual Memory

Blog banner

Elegant fashion style

Blog banner

Blog on health and fitness

Blog banner

Memory Management

Blog banner

Different memory allocation strategies

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

Process Creation

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

SECURITY TOOLS

Blog banner

Digital Marketing Ethics Transparency Trust And Brand Reputation digital

Blog banner

A buffer overflow

Blog banner