wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management in Operating System

profile
Neel Sanghrajka
Jul 05, 2024
0 Likes
0 Discussions
80 Reads

What is Memory Management in Operating System?

The operating system exercises control over the capabilities of random access memory (primary memory) through this mechanism. This approach is utilized to enhance memory utilization, elevate system performance, and facilitate concurrent operations.
Memory management facilitates the seamless movement of processes between primary and secondary memory. Moreover, it actively tracks the levels of available, allocated, and utilized memory.


Why use Memory Management in Operating system?

  • Every memory location’s status, including whether it is allocated or free, is monitored by memory management.
  • Computer systems can run programs that demand more main memory than is currently available on the system by using memory management. Data movement between primary and secondary memory is used to achieve this.
  • Memory management in OS takes care of the system’s main memory by offering abstractions that make the programs that are executing on the system assume they have been given a lot of memory.
  • Memory management’s responsibility is to prevent other processes from tampering with the memory that is allotted to all of the processes. If you don’t do this, the computer can behave strangely or improperly.

 

What is Paging?

A computer system may access and use memory that is larger than the memory that is built into the computer hardware. Virtual memory is the term used to describe this additional memory. The computer system employs virtual memory, which is a component of secondary memory, as its main memory. In order to implement virtual memory, paging is crucial.

Every process’s code makes use of a collection of logical addresses known as the process address space. Blocking the process address space is a memory management method called paging. The units are called "pages," and each block has the same size. A page’s size is a power of 2, and its value falls between 512 and 8192 bytes. The quantity of pages in a process is used to determine its size.

A similar division of the main memory is done into blocks of fixed size. These blocks are known as “frames” and the size of a frame is the same as that of a page to achieve optimum usage of the primary memory and for avoiding external fragmentation.

Advantages of Paging:

  • Paging reduces external fragmentation.
  • Implementing paging is simple.
  • Paging improves memory performance.
  • Swapping becomes quite easy because the dimensions of the frames and pages are the same.
  • Paging is helpful for quick data access.


What is Fragmentation?

The available free space in primary memory is divided into smaller chunks when processes are relocated to and from the main memory. This occurs when a process’s memory requirements are greater than the size of the available memory, preventing memory from being allocated to the process. Such memory chunks are never used. This problem is known as Fragmentation.

Fragmentation is of the following two types:

1. External Fragmentation:
Although there is enough free main space to accommodate all processes, it cannot be used since it is not continuous. By combining or rearranging data in memory’s free memory blocks to create a single, bigger free memory block, external fragmentation can be reduced.
2. Internal Fragmentation:
When a process is given a memory block that is bigger than what the process actually needs, internal fragmentation occurs. A portion of memory is left unused in this case since no other process will use it. By giving a process access to the lowest free memory chunk that may be allocated, internal fragmentation can be reduced.


Operating System Memory Management Techniques

Following are the three major memory management techniques used in operating systems:
1. Segmentation
A technique for breaking up the main memory into many chunks called segmentation. Every block is referred to as a segment and has a certain length. Every segment has a base address that serves as its beginning point. The quantity of free memory that is present in a segment depends on its length.


The distance between a data item’s real position and the segment base address can be used to pinpoint where any data items stored in a segment are located. An offset or displacement value is used to describe this distance. Simply said, when data has to be retrieved from a segment, the actual address of the data is determined by adding the segment’s base address and offset value.
The offset value and the base address of a segment are both specified in a program instruction itself.

2. Swapping
An operating system uses the method of swapping to manage the computer system’s memory effectively. The two jobs of switching are swapping in and swapping out. Data blocks or pages are moved from the secondary memory to the primary memory by "swapping in." Blocks or pages of data are transferred from the main memory to the read-only memory (R.O.M.) during swapping. Swapping is helpful when running a large application or carrying out an operation on a huge file.


Conclusion
In the realm of operating systems, memory management plays a pivotal role in ensuring efficient and effective utilization of a computer system’s memory resources. It encompasses techniques and strategies that enable the seamless movement of processes between primary and secondary memory, all while optimizing memory allocation, system performance, and concurrency. The concept of virtual memory extends the usable memory beyond physical limitations, enhancing the system’s capabilities. However, challenges such as fragmentation can arise, necessitating careful management strategies

 


Comments ()


Sign in

Read Next

Deadlock in operating system

Blog banner

computer security

Blog banner

Threat management

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

Caching windows

Blog banner

GIS in Disaster Management

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Information Technology In E- Commerce

Blog banner

Memory managment

Blog banner

Modern operating system

Blog banner

Evolution of Operating system

Blog banner

Music is life

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

Proton mail

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

What is Internet

Blog banner

Study of Sniffing Tools

Blog banner

Search Marketing In 2026: From Keywords To Credibility And User Intent

Blog banner

Veg Mix Pickle

Blog banner

Khau Galli – Vile Parle

Blog banner

E-mail security

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Smartsheet

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Banaras

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Benefits of yoga and meditation

Blog banner

I/O Management and Disk Scheduling

Blog banner

Spotify

Blog banner

You'll get to know about Pankaj Negi

Blog banner

Importance of Education

Blog banner

VPN

Blog banner

Topic: Sessions in Operating system

Blog banner

Traveling

Blog banner

Corporate Discipline.

Blog banner

security controls

Blog banner

Memory management

Blog banner

Mumbai

Blog banner

Multiprocessor and scheduling

Blog banner

Satellite Based Positioning

Blog banner