wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory management

profile
Akshat Limbachiya
Aug 15, 2024
0 Likes
0 Discussions
78 Reads

Memory Management


Memory management is an OS function that handles the allocation and deallocation of memory resources for processes, ensuring efficient and secure use of the system's memory.


1. Frames: Fixed-sized blocks of physical memory. The OS divides memory into frames for easier management.

  

2. Page: Fixed-sized blocks of logical memory in a program. Pages are mapped to frames in physical memory.


3.segment: Variable-sized blocks of memory representing logical units like functions or data structures. Segments allow more flexible memory allocation.


Memory Management Requirements


- Relocation: Allows processes to be moved in memory, enabling efficient use of available space.

  

- Protection: Ensures that processes do not interfere with each other’s memory, maintaining system stability and security.

  

- Sharing: Enables multiple processes to share memory, such as libraries, while maintaining protection.

  

- Logical Organization: Organizes memory into segments or pages, reflecting the logical structure of programs.

  

- Physical Organization: Manages the mapping of logical memory to physical memory, optimizing performance and resource use.



Comments ()


Sign in

Read Next

Service Operation

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

Satellite Based Positioning

Blog banner

Buffering

Blog banner

What is OS Fingerprinting?

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

Operating Systems

Blog banner

VIRTUAL MEMORY

Blog banner

INTERNET SECURITY

Blog banner

MACHINE LEARNING

Blog banner

Policies for Service Transition

Blog banner

How Cyber Forensics use in AI

Blog banner

Women empowerment

Blog banner

Digital Marketing

Blog banner

Virtual Memory

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

FASHION

Blog banner

Consumer to consumer Business model

Blog banner

Swiggi

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Diwali

Blog banner

Virtual memory

Blog banner

Scheduling in Operating Systems

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

R Programming

Blog banner

What are Tenders its various types

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

PPT methodology

Blog banner

Balance

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Paginng In OS

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

Beauty of indian railway

Blog banner

Android Flashlight Application

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

Virtual Machine

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

Article on team management software

Blog banner

GIS REMOTE SENSING

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner