wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory management

profile
Jash Makwana
Aug 14, 2024
0 Likes
0 Discussions
75 Reads


1. Memory Hierarchy

  • Registers: Small, fast storage locations within the CPU.
  • Cache Memory: A small-sized type of volatile computer memory that provides high-speed data access to the processor.
  • Main Memory (RAM): The primary storage that holds data and programs currently in use.
  • Secondary Storage: Non-volatile storage (e.g., hard drives, SSDs) used for long-term data storage.

2. Memory Allocation

  • Static vs. Dynamic Allocation: Static allocation assigns memory at compile-time, while dynamic allocation assigns it at run-time.
  • Contiguous vs. Non-Contiguous Allocation: Contiguous allocation assigns a single block of memory to a process, while non-contiguous allocation allows a process to be allocated memory in multiple blocks.

3. Memory Partitioning

  • Fixed Partitioning: Memory is divided into fixed-size partitions. Each process occupies an entire partition.
  • Dynamic Partitioning: Memory is divided into partitions dynamically according to the size of the process.

4. Paging

  • Concept: Memory is divided into fixed-size blocks called pages. The process is divided into pages, and pages are mapped to physical memory frames.
  • Page Table: Maintains the mapping between virtual addresses and physical addresses.

5. Segmentation

  • Concept: Memory is divided into segments based on the logical divisions of a program (e.g., code, data, stack).
  • Segment Table: Maps the segment's starting address and size.

6. Virtual Memory

  • Concept: Extends the available memory by using disk space as an extension of RAM.
  • Demand Paging: Loads pages into memory only when they are needed, reducing memory usage.
  • Page Replacement Algorithms: Determines which pages to swap out when memory is full (e.g., FIFO, LRU, Optimal).

7. Memory Management Techniques

  • Swapping: Moves processes between main memory and disk to free up memory for other processes.
  • Compaction: Reduces fragmentation by relocating processes to merge free memory spaces.
  • Garbage Collection: Automatically reclaims memory that is no longer in use by the program.

8. Fragmentation

  • Internal Fragmentation: Wasted memory within allocated regions due to fixed partition sizes.
  • External Fragmentation: Wasted memory outside allocated regions due to scattered free space.

9. Protection and Security

  • Memory Protection: Ensures that one process does not interfere with another's memory space.
  • Access Control: Defines which processes can access specific memory segments.

10. Examples of Memory Management in Different OS

  • Windows: Uses a combination of paging and segmentation with a focus on virtual memory.
  • Linux: Uses paging and implements virtual memory through a hierarchical page table structure.
  • macOS: Implements advanced memory management with techniques like copy-on-write and shared memory.

Understanding these topics provides a solid foundation in how operating systems manage memory to ensure efficient and secure execution of processes.


Comments ()


Sign in

Read Next

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

About myself

Blog banner

Importance of business process documentation

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

How to Manage Employees and Tasks in One System (Without Excel)

Blog banner

Malicious softwares

Blog banner

Malware

Blog banner

Service Catalogue Management

Blog banner

Why is ITSM important in IT organization?

Blog banner

E-Governance

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

How to lose belly fat

Blog banner

computer security

Blog banner

Types of Malware in Cyber Security

Blog banner

Broken Authentication Attacks

Blog banner

E-Cash (Electronic Cash)

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

Financial Fraud Detection

Blog banner

What is Virtual Memory

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

Linux Threads:

Blog banner

Women empowerment

Blog banner

Operating system

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Starvation

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Puri Jagannath temple

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Memory input output management

Blog banner

Network Forensics Tools and Techniques

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Best password managers: Reviews of the top products

Blog banner

Can ChatGPT Answer All My Questions About Life?

Blog banner

Article on Zoho Corporation

Blog banner

OPERATING SYSTEM

Blog banner