wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Concurrency and memory

profile
Yakin Shah
Aug 13, 2024
0 Likes
0 Discussions
74 Reads

_Concurrency:_

 

Concurrency refers to the ability of an operating system to execute multiple processes or threads simultaneously, improving system utilization and responsiveness. It involves:

 

1. _Process scheduling:_ Allocating CPU time to processes.

2. _Context switching:_ Switching between processes quickly.

3. _Synchronization:_ Managing access to shared resources.

 

Concurrency techniques:

 

1. _Multitasking:_ Running multiple processes concurrently.

2. _Multithreading:_ Running multiple threads within a process.

3. _Multiprocessing:_ Running multiple processes on multiple CPUs.

 

_Memory:_

 

Memory refers to the storage space where data and program instructions are held while a computer is running. The operating system manages memory, ensuring efficient use and preventing conflicts.

 

Memory Management:

 

1. _Process isolation:_ Each process has its own memory space.

2. _Memory allocation:_ Assigning memory to processes.

3. _Memory deallocation:_ Reclaiming memory from terminated processes.

4. _Paging and segmentation:_ Dividing memory into smaller units for efficient use.

5. _Virtual memory:_ Using disk space as an extension of physical memory.

 

Memory Types:

 

1. _RAM (Random Access Memory):_ Fast, volatile memory for running programs.

2. _ROM (Read-Only Memory):_ Non-volatile memory for storing firmware.

3. _Cache memory:_ Fast, small memory for frequently accessed data.

4. _Virtual memory:_ Combination of physical memory and disk space.

 

Effective memory management and concurrency enable efficient use of system resources, improving overall performance and user experience.


Comments ()


Sign in

Read Next

Blog on Smartsheet.

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

Crypto tax evasion

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

Internet of Things and cyber security

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

INTERNET

Blog banner

Traditional UNIX Scheduling

Blog banner

Secure Hypertext transfer protocol

Blog banner

VIRTUAL MACHINES

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Linux Memory Management

Blog banner

Principles of Concurrency

Blog banner

Virtual Machine

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Importance Of Blockchain

Blog banner

HR Automation : Need of the hour

Blog banner

I/O Management and Disk Scheduling

Blog banner

PODIO

Blog banner

Solitary Play Activities for Preschoolers: Types and Benefits

Blog banner

Satellite Based Positioning

Blog banner

The seven-step improvement process

Blog banner

1.1 basic elements

Blog banner

Scheduling

Blog banner

BIRYANI ! The history you never knew about

Blog banner

Importance of self defence for girls

Blog banner

Telegram and it's features

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

SAVE TREES

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

Dekkers Algorithm

Blog banner

Modern Operating system

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Social Media.

Blog banner

How To Secure Operating Systems ?

Blog banner

Sagar Parikrama

Blog banner

Deadlock in Operating System

Blog banner

SQL Injection Techniques

Blog banner

Session Hijacking Techniques

Blog banner

internet email and it's applications

Blog banner

Threads and concurrency

Blog banner