wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management Techniques

profile
Vedant Rana
Jul 04, 2024
0 Likes
0 Discussions
81 Reads

Memory Management Techniques: -

Process Isolation: 
Each running program gets its own section of memory. The OS must prevent independent processes from interfering with each other’s memory, both data and instructions.This prevents processes from interfering with each other.

Virtual Memory: 
Think of virtual memory as an imaginary extension of your computer’s actual RAM. When RAM is full, the OS moves some data to the hard drive. This allows bigger programs to run as if they have more memory than they really do.

Swapping: 
If there’s too much demand on memory, the OS can move entire processes from RAM to the hard drive to free up space. It’s like temporarily moving out of your apartment to let someone else use it for a bit.
There are two types of Memory Allocation Techniques:-
   A) Contiguous Allocation: 
   Memory is allocated in a single, continuous block. Simple and fast, but can waste space or memory as processes end and start.

   B)Non-Contiguous Allocation: 
   Memory is allocated in separate blocks scattered around, using various techniques like segmentation. More efficient use of space but more complex to manage.

Cache Management:
Uses small, fast memory caches to store frequently accessed data, speeding up the overall performance of the system. Imagine it as having a few frequently used Application pinned on your PC Tab bar instead of searching for them.

Protection and access control: 
Sharing of memory, at any level of the memory hierarchy, creates the potential for one program to address the memory space of another. This is desirable when sharing is needed by particular applications. At other times, it threatens the integrity of programs and even of the OS itself. The OS must allow portions of memory to be accessible in various ways by various users.

Summary: In essence, memory management in an operating system is about organizing and optimizing the use of memory to ensure that programs run efficiently and reliably. It involves allocating memory to processes, moving data between RAM and storage as needed, and protecting memory spaces to maintain system stability and security.


Comments ()


Sign in

Read Next

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

12 Principles of Animation

Blog banner

Virtualisation

Blog banner

FILE SHARING

Blog banner

Hubspot

Blog banner

EdTech (Education Technology)

Blog banner

Real time scheduling

Blog banner

Types Of Interrupt

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

Types of Big Data

Blog banner

Getting into anime My anime suggestions

Blog banner

MORDERN UNIX SYSTEM

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

File Allocation Methods

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

How Do I Get Rid of My People-Pleasing Behaviour?

Blog banner

Friendship

Blog banner

Information Technology In E- Commerce

Blog banner

Domain Name System

Blog banner

?Why Social and Emotional Skills Matter More Than ABCs in Early Years?

Blog banner

Process states

Blog banner

CSI and Organizational Change

Blog banner

Proton mail

Blog banner

Why is ITSM important in IT organization?

Blog banner

LISP - Library Management System

Blog banner

internet email and it's applications

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

Apple

Blog banner

Kafka - A Framework

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

The Rise of Polo Tourism in the USA: How Travellers Are Blending Luxury Stays with Elite Sports

Blog banner

Lifestyle of a photographer

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Raid

Blog banner

Cyber Laws In India and Around the World

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Virtual Memory

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner