wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

MEMORY MANAGEMENT REQUIREMENT

profile
Krishna Johari
Aug 14, 2024
0 Likes
0 Discussions
230 Reads

MEMORY MANAGEMENT REQUIREMENT


(I) Memory management is a critical function of an operating system (OS) that handles the allocation and deallocation of memory resources to various processes and ensures optimal use of the computer's memory. 

(II) Memory management keeps track of the status of each memory location, whether it is allocated or free. 

(III) It allocates the memory dynamically to the programs at their request and frees it for reuse when it is no longer needed. 

(IV) Memory management is meant to satisfy some requirements that we should keep in mind.

(V) Here are the key requirements for memory management in an operating system:


Relocation: 

  • In a multiprogramming system, memory is shared among multiple processes, making it difficult to predict which programs will be in main memory at the time of execution. 
  • Swapping active processes allows the operating system to have a larger pool of ready-to-execute processes.
  • However, swapping may cause a program to move to a different memory area. 
  • The operating system needs to know the location of process control information, execution stack, and code entry.
  • After loading the program, it must translate logical addresses into physical addresses.


Protection :

  • Multiple programs can cause interference, making it crucial to protect processes against unwanted interference.
  • A trade-off exists between relocation and protection requirements, as satisfaction of relocation increases protection difficulty. 
  • Predicting program location in main memory is impossible, so absolute address checks are not possible. 
  • Memory protection must be satisfied by the processor, as the operating system cannot control processes.


Sharing :

  • A protection mechanism must allow multiple processes to access the same main memory portion, allowing controlled access without compromising protection.
  • Memory management aims to support relocation-supported sharing capabilities, allowing each process to access the same copy of the program.



Logical organization :

  • Main memory is organized as linear or one-dimensional address space, with programs organized into modules. 
  • These modules can be unmodifiable or modified. 
  • The operating system and hardware must support a basic module for protection and sharing. 
  • Advantages include independent writing and compilation, different protection levels, and module-level sharing, allowing user-specified sharing.


Physical organization :

  • Computer memory consists of main and secondary memory, with main memory being faster and more costly. Secondary memory is used for long-term data storage, while main memory holds current programs. The main concern is information flow, which can be challenging for programmers due to overlaying and multiprogramming environments, where they cannot predict memory space availability.

Comments ()


Sign in

Read Next

Sage

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Ransomware

Blog banner

What is semaphore in operating system?

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

I/O Buffering

Blog banner

Operating Systems Overview

Blog banner

Health and fitness in technology

Blog banner

MY FIRST BLOG?

Blog banner

Riddhi Miyani 53003220140

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

Process states

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

RAID

Blog banner

Business Intelligence v/s Big Data

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Delhi city

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

The Right way of cooking

Blog banner

Cache memory

Blog banner

Boxing

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

Regression Analysis

Blog banner

LIMITED EDITION

Blog banner

Virtual Machine

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

File management

Blog banner

Bharat Maps

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

What is Vishing?

Blog banner

Child labour

Blog banner

Making Money through Instagram

Blog banner

Blog on Smartsheet.

Blog banner

Deadlock

Blog banner

Data Analytics in Data Science

Blog banner

Getting into anime My anime suggestions

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

What is Network Security?

Blog banner