wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

MEMORY MANAGEMENT FILE

profile
F—17 Niraj shav
Jul 05, 2024
0 Likes
0 Discussions
33 Reads

o virtual memory technique. Virtaul memroy creates an illusion of larger memory space than physically available by utilizing secondary storage (hard drive) for extending RAM. It does it by swapping temporarily less used parts of programs to virtual memory freeing up the space of RAM for current use. This allows the system to multitask more effectively by exceeding the physical memory RAM capacity.

Protection: The OS enforces a strict hierarchy of memory access permissions. The kernel, the core of the operating system, enjoys the highest privilege level and has unrestricted access to all memory regions. User processes, on the other hand, operate with limited privileges. They can only access memory locations explicitly allocated to them and are prohibited from modifying critical system areas. 

Techniques of Memory Management : 
Contiguous Memory Allocation : In contiguous memory allocation elements are allocated in continous order i.e. a single contiguous block of memory. This means all memroy is assigned to a process are in a continous range. In Programming array is a good example of this in array elements are stored in contiguous (conitnous) format. As it is contiguous it is easy to implement and calculating address is simple as compared to non contiguous. As all memory is contiguous accessing memory is fast. But as it is contiguous it is hard to allocate memory i.e. it is hard to find free conotiguous memory space. And it is also not flexible as if there is somthing stored next to that contiguous memory it will be hard to extend it.

Non Contiguous Memory Allocation : In non contiguous memory allocation every element is stored in different locations (memory is not next to it like in contiguous memory allocation) blocks can be placed anywhere in physical memory. As memory is non contiguous memory is efficiently utilized and is also flexible as elements are stored in different locations. Memory isolation is easier to implement as every memroy is at different locations so it will be hard to access the memory that increases the security. But there are some limitations too like it increases the complexity and also calculation of address is difficult as compared to contiguous memory allocation.


Comments ()


Sign in

Read Next

File management In Operating System

Blog banner

1.1 basic elements

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

Travel: Everything Everywhere!

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Starting Android Activity Using Intent

Blog banner

Place to visit in pune

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

What is OS and its overview

Blog banner

The application udemy

Blog banner

NodeJs

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

Chicken Dum Biryani

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Threads

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

How to tie a Tie

Blog banner

Note Taker App

Blog banner

File Organization and Access

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Khau Galli – Vile Parle

Blog banner

Security issues

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

E-security systems | CCTV

Blog banner

Install Ubuntu in Vmware

Blog banner

Memory Management

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

MOVEMBER

Blog banner

Satellite Based Positioning

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

'Positivity in life'

Blog banner

Footprinting

Blog banner

What is Minting & Mining

Blog banner

IoT Architecture Based Security

Blog banner

Career v/s Job : Choose your passion

Blog banner

File management

Blog banner

Design Considerations for Disk Cache Management

Blog banner

Dancing Classes In Mumbai

Blog banner

Article on Fresh Book

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner