wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Segmentation and paging concept

profile
Maitry Gala
Aug 13, 2024
0 Likes
0 Discussions
108 Reads

Segmentation and Paging in Operating Systems

Segmentation and paging are two fundamental techniques employed by operating systems to manage memory efficiently. While they share the common goal of optimizing memory utilization, they differ significantly in their approaches.

1.Segmentation

• Divides memory into variable-sized segments.

• Segments correspond to logical units: code, data, stack, heap, etc.

• Provides flexibility: Allows efficient allocation of memory based on program structure.

• Protection: Enables access control at the segment level.

• Sharing: Facilitates sharing of code and data segments among processes.

Example: A program might have separate segments for instructions, global variables, and local variables.

2.Paging

• Divides physical memory into fixed-sized blocks called pages.

• Divides processes into fixed-sized pages as well.

• Simplifies memory management: Treats memory as a uniform structure.

• Overcomes external fragmentation: Efficiently utilizes available memory.

• Enables virtual memory: Allows processes to use more memory than physically available.

Example: A process’s address space is divided into pages, which are mapped to physical frames in memory.

Maitry Gala-53003230041

Div A 

 

 

 

 


Comments ()


Sign in

Read Next

Chicken Dum Biryani

Blog banner

Evolution of Operating System

Blog banner

Virtual memory

Blog banner

Hello World

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Life of an army person

Blog banner

Data Exfiltration

Blog banner

Modern Operating Systems

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

EMAIL INVESTIGATION

Blog banner

Multiprocessor and scheduling

Blog banner

Service Strategy In ITSM

Blog banner

File management

Blog banner

(Input/Output) in os

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

Raid

Blog banner

OS- Assignnment 1

Blog banner

LTE Technology

Blog banner

Operating Systems

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Gamer life

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Malicious softwares

Blog banner

Disk scheduling

Blog banner

Data Security must be your Priority!

Blog banner

Cache Memory(142)

Blog banner

Tableau

Blog banner

Study of Sniffing Tools

Blog banner

Never give up

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Deadlock and Starvation

Blog banner

Gis in agriculture and farming

Blog banner

Danger assessment in GIS

Blog banner

GraphX:- A graph processing tool

Blog banner

EdTech (Education Technology)

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Linux Threads:

Blog banner

HR Automation : Need of the hour

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

The art of being alone

Blog banner

Mail merge

Blog banner