wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory management

profile
Akshat Limbachiya
Aug 15, 2024
0 Likes
0 Discussions
78 Reads

Memory Management


Memory management is an OS function that handles the allocation and deallocation of memory resources for processes, ensuring efficient and secure use of the system's memory.


1. Frames: Fixed-sized blocks of physical memory. The OS divides memory into frames for easier management.

  

2. Page: Fixed-sized blocks of logical memory in a program. Pages are mapped to frames in physical memory.


3.segment: Variable-sized blocks of memory representing logical units like functions or data structures. Segments allow more flexible memory allocation.


Memory Management Requirements


- Relocation: Allows processes to be moved in memory, enabling efficient use of available space.

  

- Protection: Ensures that processes do not interfere with each other’s memory, maintaining system stability and security.

  

- Sharing: Enables multiple processes to share memory, such as libraries, while maintaining protection.

  

- Logical Organization: Organizes memory into segments or pages, reflecting the logical structure of programs.

  

- Physical Organization: Manages the mapping of logical memory to physical memory, optimizing performance and resource use.



Comments ()


Sign in

Read Next

Microsoft Windows Overview

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

Music

Blog banner

Benefits and drawback of web security.

Blog banner

Blockchain uses and use cases

Blog banner

I/O buffer and its techniques

Blog banner

Docker Framework

Blog banner

Deadlock

Blog banner

Why we should do reading

Blog banner

Street foods

Blog banner

Difference Between Classification And Clustering

Blog banner

How to insert contacts in zoho crm using php

Blog banner

File system implementation

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

Metasploit

Blog banner

Different memory allocation strategies

Blog banner

Secure Hypertext transfer protocol

Blog banner

EdTech (Education Technology)

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Characteristics of Etherum

Blog banner

Domain Name System

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Objectives and functions of Operating System...

Blog banner

Social media

Blog banner

Risk factors in service transistion

Blog banner

Loneliness

Blog banner

Busted : Common Web Security Myths

Blog banner

Understanding - Proof of Work!

Blog banner

Chicken Dum Biryani

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Android Flashlight Application

Blog banner

Types of Big Data

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

Memory Management

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

APACHE KAFKA

Blog banner

Zero-Day Attack

Blog banner

Operating system

Blog banner