wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory management

profile
Neeti undefined
Aug 15, 2024
0 Likes
0 Discussions
70 Reads


-memory is collection of data in a specific format. The instructions are stored and processed in memory. When the memory is subdivided among different processes it is called memory management. Memory management is important for effective utilization of memory since memory is the most important thing in operating system. Basic terms used in memory management:

1. Frame- fixed length block in main memory

2. Page- fixed length block in secondary memory

3. Segment- variable length block in secondary memory

 

Memory management requirements include:

1.   Reallocation: In multiprogramming system, the main is shared by multiple processes so a programmer cannot predict which programs will be stored in memory while program runs.

Processes are swapped in and out of main memory to maximize processor utilization. When program is swapped out of disk it may be placed in different memory back in requiring relocation.

2.   Protection: To protect processes from unwanted interference it is essential to make sure other programs don’t access the memory without proper authorization.

 

3.   Sharing: Any mechanism must have the flexibility to allow several processes to share same memory space. The memory management should allow shared memory with controlled access and with protection.

 

4.   Logical organization: To handle programs the operating system and computer hardware must support fundamental module that enables sharing and protection. This has following advantages:

·     Modules can be written and compiled independently.

·     Different modules can be assigned varying levels of protection.

·     Various mechanism exists to facilitate sharing of modules among different processes.

5.   Physical organization: The computer’s memory structure consists of main memory and secondary memory. Main memory is faster but volatile while secondary memory is used for long term storage. The main concern is the flow of information between these memory levels. The complexity of managing the information flow between main and secondary memory along with challenges of overlaying and uncertain space availability makes it difficult for programmers to fully understand and optimize memory usage.


Comments ()


Sign in

Read Next

Man In The Middle Attack

Blog banner

Fitness regime by Deepesh

Blog banner

Concept and definition of m-commerce

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

SAVE TREES

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Constrained Management in IT

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

10 Interesting Facts about Death Note

Blog banner

Blockchain uses and use cases

Blog banner

Im Photographer

Blog banner

Why Are So Many Adults Getting Diagnosed with ADHD?

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

Service Operation

Blog banner

Policies for Service Transition

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

Stop Racism

Blog banner

Embedded Operating System

Blog banner

Processing Crime and Incident Scenes

Blog banner

Real time scheduling

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

EdTech (Education Technology)

Blog banner

Who decides your overthinking, anyway?

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Ubiquitous Computing

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

Health and fitness

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

MUTUAL EXCLUSION

Blog banner

Different types of scam Fraud

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

c

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

R Programming

Blog banner

Scheduling in Operating Systems

Blog banner

Virtual Machine

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Clustering Techniques

Blog banner

Cloud Computing

Blog banner

Pink sauce pasta

Blog banner

Threads

Blog banner