wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory management

profile
Neeti undefined
Aug 15, 2024
0 Likes
0 Discussions
70 Reads


-memory is collection of data in a specific format. The instructions are stored and processed in memory. When the memory is subdivided among different processes it is called memory management. Memory management is important for effective utilization of memory since memory is the most important thing in operating system. Basic terms used in memory management:

1. Frame- fixed length block in main memory

2. Page- fixed length block in secondary memory

3. Segment- variable length block in secondary memory

 

Memory management requirements include:

1.   Reallocation: In multiprogramming system, the main is shared by multiple processes so a programmer cannot predict which programs will be stored in memory while program runs.

Processes are swapped in and out of main memory to maximize processor utilization. When program is swapped out of disk it may be placed in different memory back in requiring relocation.

2.   Protection: To protect processes from unwanted interference it is essential to make sure other programs don’t access the memory without proper authorization.

 

3.   Sharing: Any mechanism must have the flexibility to allow several processes to share same memory space. The memory management should allow shared memory with controlled access and with protection.

 

4.   Logical organization: To handle programs the operating system and computer hardware must support fundamental module that enables sharing and protection. This has following advantages:

·     Modules can be written and compiled independently.

·     Different modules can be assigned varying levels of protection.

·     Various mechanism exists to facilitate sharing of modules among different processes.

5.   Physical organization: The computer’s memory structure consists of main memory and secondary memory. Main memory is faster but volatile while secondary memory is used for long term storage. The main concern is the flow of information between these memory levels. The complexity of managing the information flow between main and secondary memory along with challenges of overlaying and uncertain space availability makes it difficult for programmers to fully understand and optimize memory usage.


Comments ()


Sign in

Read Next

GIS Topography

Blog banner

Importance Of Yoga.

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

MailChimp

Blog banner

Routers

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Paralysis/Paralysis Stroke

Blog banner

Pink sauce pasta

Blog banner

Different memory allocation strategies

Blog banner

This is my first blog.

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Retiring ISS

Blog banner

From Model Mistakes to Metrics

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Mutual exclusion

Blog banner

Firewall in Computer Network

Blog banner

Linux 94

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Starvation

Blog banner

Music helps reduce stress

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Best password managers: Reviews of the top products

Blog banner

Security Breaches in Stock market trading

Blog banner

Women Empowerment

Blog banner

Busted : Common Web Security Myths

Blog banner

Process, process creation and process termination

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Banaras

Blog banner

SQL Injection

Blog banner

Deadlock and Starvation

Blog banner

Virtual memory

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Os assignment

Blog banner