wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Paginng In OS

profile
ANUJ YADAV
Sep 08, 2024
0 Likes
0 Discussions
81 Reads

                         Paging in Operating Systems

Paging is a memory management scheme used by operating systems to eliminate the problem of fitting varying-sized processes into fixed-sized memory spaces. It allows a process's physical memory to be non-contiguous, effectively avoiding fragmentation and ensuring efficient use of memory.

 

How Paging Works :

Logical and Physical Memory Separation :

Paging separates the logical address space (the addresses used by programs) from the physical address space (the actual addresses in RAM). This means a program’s memory can be scattered across different locations in physical memory, while still appearing contiguous to the program itself.

 

Pages and Frames

 

Pages: The process’s logical memory is divided into fixed-sized blocks called pages.

Frames: The physical memory is also divided into blocks of the same size as the pages, called frames.

The OS loads pages from the logical address space into available frames in the physical address space.

Page Table

The operating system maintains a page table for each process. This table maps the logical pages to their corresponding frames in physical memory. When a program references a memory address, the CPU uses the page table to translate the logical address into a physical address.

 

Address Translation

Every memory access by a program involves two components: the page number and the page offset.

 

The page number identifies the specific page in the page table.

The page offset is the exact location within the page.

The operating system uses this information to find the corresponding physical address in the frame.



Comments ()


Sign in

Read Next

FIREWALL

Blog banner

Service transistion under difficult conditions

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

Threads

Blog banner

computer security

Blog banner

Evolution of operating systems

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Memory Management

Blog banner

Dancing Classes In Mumbai

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

Artificial Intelligence (AI)

Blog banner

Visualization in Data Science

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Big O Notation

Blog banner

TEAMWORK

Blog banner

Mumbai

Blog banner

VPN

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

How secured are you online ?

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

Design Considerations for Disk Cache Management

Blog banner

Deadlock and starvation

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

What is semaphore in operating system?

Blog banner

Mendeley (management software)

Blog banner

Traditional UNIX Scheduling

Blog banner

memory managment

Blog banner

OPERATING SYSTEM

Blog banner

Wiretapping

Blog banner

"Audit" In Data Science

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Corporate Discipline.

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

virtual machine

Blog banner

breakup? don't worry and learn how to get back your life!

Blog banner

Message Passing in OS

Blog banner

File and File System Structure

Blog banner

Memory Management

Blog banner

Game via listing method

Blog banner