wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory management

profile
Neeti undefined
Aug 15, 2024
0 Likes
0 Discussions
70 Reads


-memory is collection of data in a specific format. The instructions are stored and processed in memory. When the memory is subdivided among different processes it is called memory management. Memory management is important for effective utilization of memory since memory is the most important thing in operating system. Basic terms used in memory management:

1. Frame- fixed length block in main memory

2. Page- fixed length block in secondary memory

3. Segment- variable length block in secondary memory

 

Memory management requirements include:

1.   Reallocation: In multiprogramming system, the main is shared by multiple processes so a programmer cannot predict which programs will be stored in memory while program runs.

Processes are swapped in and out of main memory to maximize processor utilization. When program is swapped out of disk it may be placed in different memory back in requiring relocation.

2.   Protection: To protect processes from unwanted interference it is essential to make sure other programs don’t access the memory without proper authorization.

 

3.   Sharing: Any mechanism must have the flexibility to allow several processes to share same memory space. The memory management should allow shared memory with controlled access and with protection.

 

4.   Logical organization: To handle programs the operating system and computer hardware must support fundamental module that enables sharing and protection. This has following advantages:

·     Modules can be written and compiled independently.

·     Different modules can be assigned varying levels of protection.

·     Various mechanism exists to facilitate sharing of modules among different processes.

5.   Physical organization: The computer’s memory structure consists of main memory and secondary memory. Main memory is faster but volatile while secondary memory is used for long term storage. The main concern is the flow of information between these memory levels. The complexity of managing the information flow between main and secondary memory along with challenges of overlaying and uncertain space availability makes it difficult for programmers to fully understand and optimize memory usage.


Comments ()


Sign in

Read Next

Introduction to Solidity Programming for Blockchain Development

Blog banner

Game via listing method

Blog banner

Record Blocking

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

The most common internet security threats

Blog banner

Technical SEO : Total Guide

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

File management

Blog banner

Business Intelligence v/s Big Data

Blog banner

Virtualisation

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

Raid

Blog banner

Different Types of Data

Blog banner

Computer security techniques

Blog banner

Processes: Process Description and Control.

Blog banner

VIRUS

Blog banner

The Importance of Financial Literacy for College Students

Blog banner

UniProcessor Scheduling

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Uniprocessor Scheduling

Blog banner

Use case of K-means clustering

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

John Titor: The Time Traveler

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Memory management

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

RAID

Blog banner

Starvation

Blog banner

Deadlock and Starvation

Blog banner

Health is Wealth

Blog banner

Operating Systems Overview

Blog banner

10 Problems you face if you are an Otaku

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

Scala - a programming tool

Blog banner

Modern Operating Systems

Blog banner

Buffering

Blog banner

What is Data, Information and Knowledge?

Blog banner