wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

operating system

profile
Palak Santoki
Jul 05, 2024
0 Likes
0 Discussions
39 Reads

Memory is the important part of the computer that is used to store the data. Its management is critical to the computer system because the amount of main memory available in a computer system is very limited. to increase performance, several processes are executed simultaneously. For this, we must keep several processes in the main memory, so it is even more important to manage them effectively.Memory manager is used to keep track of the status of memory locations, whether it is free or allocated.The memory manager is responsible for protecting the memory allocated to each process from being corrupted by another process. Memory managers should enable sharing of memory space between processes.memory manager permits computers with a smaall amount of main memory to execute programs larger than the size or amount of available memory.it does thiss by moving information back and forth between primary memory and secondary memory by using the concpt of swapping.memory managers should enable sharing of memoey spacebetween processss.thus two programs can reside at same memory location although at different times.
there are two types of memory management techniques:
Contiguous memory management and Non-Contiguous memory management.
In a Contiguous memory management scheme, each program occupies a single contiguous block of storage locations, i.e., a set of memory locations with addresses.
In a Non-Contiguous memory management scheme, the program is divided into different blocks and loaded at different portions of the memory that need not necessarily be adjacent to one another. This scheme can be classified depending upon the size of blocks and whether the blocks reside in the main memory or not.

memory mannagment is requried for following reasons:

1.allocate and reallocate memory before and after program execution.

2.To keep track of used memory space by processes.

3.To properly utilie main memory.

4.To maintain data integrity while executing process.


Comments ()


Sign in

Read Next

1.1 basic elements

Blog banner

Wrike

Blog banner

Digital Marketing

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Hello World

Blog banner

Deadlock

Blog banner

Hacking Mobile Platforms

Blog banner

Facebook marketing

Blog banner

The Future of Web Development in 2026: Trends Every Business Must Know

Blog banner

My Favorite Country

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

Direct Memory Access

Blog banner

DBMS and various career options related to it.

Blog banner

PROCESS STATE:

Blog banner

Education?

Blog banner

OPERATING SYSTEM

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

OS Assignment 3

Blog banner

Apache Kafka

Blog banner

Note on Process, Process creation and Process termination

Blog banner

Deadlock and Starvation

Blog banner

Importance Of Education.

Blog banner

?Why Social and Emotional Skills Matter More Than ABCs in Early Years?

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Race Condition

Blog banner

Smitten Kitchen Keepers

Blog banner

Service Design Model

Blog banner

Virtual memory in Operating System

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

How to Manage Employees and Tasks in One System (Without Excel)

Blog banner

Different types of scam frauds

Blog banner

Deadlock Prevention

Blog banner

A Deep Dive

Blog banner

Starvation

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

Uniprocessor and Types

Blog banner

Python as a tool for data analysis

Blog banner

GIS Mapping

Blog banner

Privacy in Social Media and Online Services

Blog banner