wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory management

profile
Akshat Limbachiya
Aug 15, 2024
0 Likes
0 Discussions
78 Reads

Memory Management


Memory management is an OS function that handles the allocation and deallocation of memory resources for processes, ensuring efficient and secure use of the system's memory.


1. Frames: Fixed-sized blocks of physical memory. The OS divides memory into frames for easier management.

  

2. Page: Fixed-sized blocks of logical memory in a program. Pages are mapped to frames in physical memory.


3.segment: Variable-sized blocks of memory representing logical units like functions or data structures. Segments allow more flexible memory allocation.


Memory Management Requirements


- Relocation: Allows processes to be moved in memory, enabling efficient use of available space.

  

- Protection: Ensures that processes do not interfere with each other’s memory, maintaining system stability and security.

  

- Sharing: Enables multiple processes to share memory, such as libraries, while maintaining protection.

  

- Logical Organization: Organizes memory into segments or pages, reflecting the logical structure of programs.

  

- Physical Organization: Manages the mapping of logical memory to physical memory, optimizing performance and resource use.



Comments ()


Sign in

Read Next

ART AND CULTURE OF VRINDAVAN

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

Computer Security

Blog banner

Data Science in Mental Health Prediction

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

Constrains in service design

Blog banner

Indian Culture and Tradition

Blog banner

Uniprocessor Scheduling

Blog banner

An Overivew Of Cache Memory

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

How Much Protein Do You Really Need Every Day?

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

Virtual Machine's

Blog banner

Deadlock and Starvation

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

Difference Between Classification And Clustering

Blog banner

Making Money through Instagram

Blog banner

What is Spyware? and examples of them.

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Artical on FreshBooks

Blog banner

Shoulders

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner

1 Dentist in Maroubra, Sydney and her 10 obsessions

Blog banner

Natural Language Processing(NLP)

Blog banner

VIRTUAL MACHINE

Blog banner

Fossil Hunting 101 at the Peace River, Arcadia, Florida, USA

Blog banner

PERT Overview

Blog banner

I/O Buffering

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

Article on different management system

Blog banner

Cryptanalysis tool

Blog banner

Whatsapp Messenger

Blog banner

My Favorite Country

Blog banner

Cyber Security Control

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

Memory Management

Blog banner

File Allocation Methods

Blog banner

Why Friendship at Work is Important

Blog banner

Metasploit

Blog banner

Fault tolerance

Blog banner

Virtual Machine

Blog banner