wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory management

profile
Akshat Limbachiya
Aug 15, 2024
0 Likes
0 Discussions
78 Reads

Memory Management


Memory management is an OS function that handles the allocation and deallocation of memory resources for processes, ensuring efficient and secure use of the system's memory.


1. Frames: Fixed-sized blocks of physical memory. The OS divides memory into frames for easier management.

  

2. Page: Fixed-sized blocks of logical memory in a program. Pages are mapped to frames in physical memory.


3.segment: Variable-sized blocks of memory representing logical units like functions or data structures. Segments allow more flexible memory allocation.


Memory Management Requirements


- Relocation: Allows processes to be moved in memory, enabling efficient use of available space.

  

- Protection: Ensures that processes do not interfere with each other’s memory, maintaining system stability and security.

  

- Sharing: Enables multiple processes to share memory, such as libraries, while maintaining protection.

  

- Logical Organization: Organizes memory into segments or pages, reflecting the logical structure of programs.

  

- Physical Organization: Manages the mapping of logical memory to physical memory, optimizing performance and resource use.



Comments ()


Sign in

Read Next

Online Games

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

DURGA POOJA

Blog banner

NETSUITE

Blog banner

Not anti-social, but pro-solitude

Blog banner

A Heartfelt Act of Kindness

Blog banner

File management

Blog banner

Virtual Machine

Blog banner

Decoding Confusion Matrix

Blog banner

IO Buffers

Blog banner

Steganography

Blog banner

Direct Memory Access

Blog banner

Evolution of Operating System

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

How Men and Women Process Pain Differently

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Veg Mix Pickle

Blog banner

Memory managment

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

Telegram and it's features

Blog banner

Who decides your overthinking, anyway?

Blog banner

GIS Topography

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

VIRTUAL MEMORY

Blog banner

RAID_142

Blog banner

MySQL

Blog banner

Sweet Mango Murabba

Blog banner

My favourite food

Blog banner

10 Interesting Facts about Death Note

Blog banner

File Organization and Access

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

INTRODUCTION

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Modern operating system

Blog banner

38_Exploring The Honeynet Project

Blog banner

Apple

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

1.1 basic elements

Blog banner

BLOCKCHAIN MACHANISM

Blog banner