wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

memory management

profile
Darshan Tank
Jul 03, 2024
0 Likes
0 Discussions
90 Reads

                                              memory management

Memory management is a vital and complex operating system task. It enables running multiple processes simultaneously without any interruptions. In operatinh systems, memory management is the function responsible foe managing the computer's primary memory. Memory management is the process os controlling and coordinating a computre's main memory. It ensures that blocks os memory space are proely managed and allocated so the porating system and other runing processes have the memory they need to carry out their poerations. Knowing how memory management in poerating systeam works is crucial for system stability and imroving system performance.

The memory management function keeps track of the status of each memory location, either allocated or free. It determines how memory is allocated among cometing processes, deciding wnich gets memory, when they receive it, and how much they are allowed. When memory is allocated it determines which memory locations will be assigned. It tracks when memory is freed or unallocated and upates the ststus.

To achieve a degree of multiprogramming and proer utilization of  memory , memory management is important.many memory methods exist, reflecting various approaches, and the effectiveness of each algorithm depends on the situation.

Efficient memory management depends on two factors:

  1.  Memory unit  organization:

Several different memory types make up the memory unit. A computer's memory hierarchy and organization affect data speed and storage size. Faster and smaller caches are closer to the cpu, while larger and slower memory is further away.

      2. memory access:

The cpu regularly accesses data  stored in memory. Efficient memory access infiuences how fast a cpu complettes tasks and becomes available foe new tasks. Memory access involves with addresses and defining access rules across memory levels.

 

Memory management balances tradeoffs between speed,size,and power use in a computer. Primary memeory allows fast access but no permanent storage. on the other hand, secondary memory is slower but offers permanent storage.

 

Comments ()


Sign in

Read Next

Art and Culture of Rajasthan

Blog banner

A small world of Sockets

Blog banner

Virtual Memory

Blog banner

Zero-Day Attack

Blog banner

Types of Malware in Cyber Security

Blog banner

Real-time Scheduling - 53003230061

Blog banner

LTE Technology

Blog banner

Evolution of Operating system

Blog banner

Dos (Denial of service) Attack

Blog banner

Social Media Sentiment Analysis

Blog banner

Sleep Matters: The Science Behind Toddler Naps

Blog banner

Why we fail after giving 100% ?

Blog banner

RACI model in IT services

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

Ola

Blog banner

Cyber Security Control

Blog banner

Fossil Hunting 101 at the Peace River, Arcadia, Florida, USA

Blog banner

HR Automation : Need of the hour

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

Traditional Unix System

Blog banner

Hosting basics

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

OPERATING SYSTEM

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Deadlock

Blog banner

All you need to know about Cassandra

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

MAILFENCE

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner

Article on different management system

Blog banner

Understanding Mobile Device Forensics

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

The Five Steps of Data Science

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Operating System

Blog banner

File management -disha parekh

Blog banner