wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Paging

profile
Jay Bhanushali
Aug 14, 2024
0 Likes
0 Discussions
99 Reads

As far as memory management is concerned, both unequal fixed-size partitions and variable-size partitions reflect inefficiencies. Unequal fixed-size partitions are the cause of internal fragmentation, which is when the memory space given to a process is not entirely used and as a result, there is some unused space within the partition. Variable-size partitions can, however, give rise to the problem of external fragmentation such that the free memory is distributed in small, non-contiguous blocks which makes it difficult to allocate the available spaces that are larger and contiguous.

In order to come up with a solution to these problems, the “paging” notion is introduced. In paging, the main memory is split into equal fixed-size pieces that are called frames, and the processes are also split into the same size pages. This technique is a good way to fix the fragmentation problem. So, it is like this:


  1. Page and Frame Allocation: Each page of a process can be allocated to an arbitrary free frame in memory. For example, if the process has several pages and the memory space has free frames, the OS can place these pages into any free frames, irrespective of the physical location of the pages. Hence, the requirement of needing contiguous free memory blocks is avoided.
  2. Internal fragmentation: The main waste in paging is internal fragmentation, which is confined to the last page of a process if it is not completely full. Take for instance if’s last page consists of the allocated space only partially. In that case, the remainder is wasted). Within a page that is not being used, one might find a small area that is still closed and thus not being used. However, given that the pages are fixed in size, such a loss is restricted to the last page only and is usually very small in comparison with the losses resulting from variable-size partitions.
  3. Address Translation and Page Table: The operating system is in charge of the page table for each process, which translates logical addresses into physical addresses. The physical memory frame that contains each page of the process is explicitly stated in this table. The logical address is split up into a page number and an offset which tells the position of the traveled page. The page number is the one that is used to look up the corresponding frame through the page table, and then the offset is the one that is used to find the exact location within that frame.
  4. Handling Memory Allocation: Imagine a situation when a process is to be loaded, but the available contiguous memory is insufficient, paging is the solution. The OS can now place pages in all the frames that are available, and it is not necessary to have contiguous memory allocation. For instance, if a new process requires the production of more pages than there are contiguous free frames, the OS can load these pages into non-contiguous ones that are randomly distributed in memory. This flexibility is a significant advantage over partitioning schemes that require contiguous memory allocation.


In summary, paging solves the memory fragmentation problems by splitting the whole memory into fixed-size units and allowing free allocation of these units. The OS page tables, which map the logical addresses to physical addresses, are used to manage the memory efficiently and avoid the problems of internal and external fragmentation.




Comments ()


Sign in

Read Next

Threat management

Blog banner

Article on Team Work

Blog banner

Processes : Process description and control

Blog banner

What is Influencer Marketing and its Trends

Blog banner

Compromising Mobile Platforms

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Instagram

Blog banner

Data Mapping

Blog banner

Uniprocessor scheduling

Blog banner

Deadlock and Starvation

Blog banner

Who decides your overthinking, anyway?

Blog banner

Risk management in IT

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

Disk Management

Blog banner

SESSION HIJACKING

Blog banner

Lucidchart

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

File system implementation

Blog banner

File Organization and Access

Blog banner

Deadlock in operating system

Blog banner

Tracking Emails & Email Crimes

Blog banner

Mobile Security

Blog banner

Education?

Blog banner

To travel is to live

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Article on team management software

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Kids Grieve Too

Blog banner

Landslide Hazard

Blog banner

Disk cache

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

Deadlock and Starvation

Blog banner

Linux Memory Management

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

Service design process in ITSM

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner