wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Paginng In OS

profile
ANUJ YADAV
Sep 08, 2024
0 Likes
0 Discussions
81 Reads

                         Paging in Operating Systems

Paging is a memory management scheme used by operating systems to eliminate the problem of fitting varying-sized processes into fixed-sized memory spaces. It allows a process's physical memory to be non-contiguous, effectively avoiding fragmentation and ensuring efficient use of memory.

 

How Paging Works :

Logical and Physical Memory Separation :

Paging separates the logical address space (the addresses used by programs) from the physical address space (the actual addresses in RAM). This means a program’s memory can be scattered across different locations in physical memory, while still appearing contiguous to the program itself.

 

Pages and Frames

 

Pages: The process’s logical memory is divided into fixed-sized blocks called pages.

Frames: The physical memory is also divided into blocks of the same size as the pages, called frames.

The OS loads pages from the logical address space into available frames in the physical address space.

Page Table

The operating system maintains a page table for each process. This table maps the logical pages to their corresponding frames in physical memory. When a program references a memory address, the CPU uses the page table to translate the logical address into a physical address.

 

Address Translation

Every memory access by a program involves two components: the page number and the page offset.

 

The page number identifies the specific page in the page table.

The page offset is the exact location within the page.

The operating system uses this information to find the corresponding physical address in the frame.



Comments ()


Sign in

Read Next

File Management

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

My First Dream Bike

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

Data Visualization in Decision-Making

Blog banner

12 Principles of Animation

Blog banner

Royal enfield

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

operating system

Blog banner

Modern operating system

Blog banner

SECURITY TOOLS

Blog banner

What are NFT s?

Blog banner

VIRTUAL MEMORY

Blog banner

(Input/Output) in os

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Scheduling

Blog banner

Threat management

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

What is Spyware? and examples of them.

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

WINDOWS I/ O

Blog banner

Virtual memory in Operating System

Blog banner

INTERNET

Blog banner

Evolution of Operating system

Blog banner

Mumbai

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Types of email

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Modern OS

Blog banner

Deadlock

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

Cloud Computing

Blog banner

Question

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

Operating Systems

Blog banner

What Your Music Taste Reveals About Your Personality

Blog banner

(Input/Output) in os

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Time Series Analysis

Blog banner

Types of Hackers.

Blog banner