wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

MEMORY MANAGEMENT FILE

profile
F—17 Niraj shav
Jul 05, 2024
0 Likes
0 Discussions
33 Reads

o virtual memory technique. Virtaul memroy creates an illusion of larger memory space than physically available by utilizing secondary storage (hard drive) for extending RAM. It does it by swapping temporarily less used parts of programs to virtual memory freeing up the space of RAM for current use. This allows the system to multitask more effectively by exceeding the physical memory RAM capacity.

Protection: The OS enforces a strict hierarchy of memory access permissions. The kernel, the core of the operating system, enjoys the highest privilege level and has unrestricted access to all memory regions. User processes, on the other hand, operate with limited privileges. They can only access memory locations explicitly allocated to them and are prohibited from modifying critical system areas. 

Techniques of Memory Management : 
Contiguous Memory Allocation : In contiguous memory allocation elements are allocated in continous order i.e. a single contiguous block of memory. This means all memroy is assigned to a process are in a continous range. In Programming array is a good example of this in array elements are stored in contiguous (conitnous) format. As it is contiguous it is easy to implement and calculating address is simple as compared to non contiguous. As all memory is contiguous accessing memory is fast. But as it is contiguous it is hard to allocate memory i.e. it is hard to find free conotiguous memory space. And it is also not flexible as if there is somthing stored next to that contiguous memory it will be hard to extend it.

Non Contiguous Memory Allocation : In non contiguous memory allocation every element is stored in different locations (memory is not next to it like in contiguous memory allocation) blocks can be placed anywhere in physical memory. As memory is non contiguous memory is efficiently utilized and is also flexible as elements are stored in different locations. Memory isolation is easier to implement as every memroy is at different locations so it will be hard to access the memory that increases the security. But there are some limitations too like it increases the complexity and also calculation of address is difficult as compared to contiguous memory allocation.


Comments ()


Sign in

Read Next

File Organization and Access

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

Benefits of Yoga

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

Evolution of operating system

Blog banner

Trello ( management software)

Blog banner

Interrupts

Blog banner

I/O Buffering

Blog banner

Difference Between Classification And Clustering

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Starvation

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Interrupts in operating system.

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

Information of meesho company

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Microsoft Word

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Telegram and it's features

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Scheduling in Operating Systems

Blog banner

Deadlock

Blog banner

Kernel in Operating System

Blog banner

The War With Cold On Earth

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

Swiggi

Blog banner

How Cyber Forensics use in AI

Blog banner

Wiretapping

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

The Role of cryptography in cyber security

Blog banner

Facebook marketing

Blog banner

operating system

Blog banner

Microsoft Windows Overview

Blog banner

Security issues

Blog banner

How to use open SSL for web server - browser communication

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Deadlock

Blog banner

S-Tool : Steganography

Blog banner

Mumbai local ......

Blog banner