wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management

profile
dhruvi acharya
Jul 04, 2024
0 Likes
0 Discussions
105 Reads

Memory management is an essential operating system (OS) service responsible for the efficient and secure allocation, utilization, and protection of primary memory (RAM) during program execution. It directly impacts system stability, program performance, and the ability to run multiple programs concurrently.It involves managing both primary memory (RAM) and secondary memory (SSD and hard disk).

 

Importance of Memory Management :

 

Allocating Memory : Allocating memory is important because when you install or run a program managing memory is very important. Operating System (OS) maintains track of free memory and allocates them when required. this memory allocation can be contigous (continous blocks) or non contigous (not in continous blocks seprated in memroy) both have their own advantages and disadvantages.

 

Multitasking and Virtual Memory : To enable effiicient multitasking, operating system introduces to virtual memory technique. Virtaul memroy creates an illusion of larger memory space than physically available by utilizing secondary storage (hard drive) for extending RAM. It does it by swapping temporarily less used parts of programs to virtual memory freeing up the space of RAM for current use. This allows the system to multitask more effectively by exceeding the physical memory RAM capacity.

 

Protection: The OS enforces a strict hierarchy of memory access permissions. The kernel, the core of the operating system, enjoys the highest privilege level and has unrestricted access to all memory regions. User processes, on the other hand, operate with limited privileges. They can only access memory locations explicitly allocated to them and are prohibited from modifying critical system areas. 

 

Techniques of Memory Management : 

Contiguous Memory Allocation : In contiguous memory allocation elements are allocated in continous order i.e. a single contiguous block of memory. This means all memroy is assigned to a process are in a continous range. In Programming array is a good example of this in array elements are stored in contiguous (conitnous) format. As it is contiguous it is easy to implement and calculating address is simple as compared to non contiguous. As all memory is contiguous accessing memory is fast. But as it is contiguous it is hard to allocate memory i.e. it is hard to find free conotiguous memory space. And it is also not flexible as if there is somthing stored next to that contiguous memory it will be hard to extend it.

 

Non Contiguous Memory Allocation : In non contiguous memory allocation every element is stored in different locations (memory is not next to it like in contiguous memory allocation) blocks can be placed anywhere in physical memory. As memory is non contiguous memory is efficiently utilized and is also flexible as elements are stored in different locations. Memory isolation is easier to implement as every memroy is at different locations so it will be hard to access the memory that increases the security. But there are some limitations too like it increases the complexity and also calculation of address is difficult as compared to contiguous memory allocation.


Comments ()


Sign in

Read Next

Apache Spark :- Powerful Data Processing Tool

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Europe Through My Lens

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Short note on expert system

Blog banner

Ethical Hacking

Blog banner

Types of Threads

Blog banner

Rain bow

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

Segmentation and paging concept

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Number Guessing game --lisp

Blog banner

15 Interesting Facts about India

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

Uniprocessor Scheduling

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

PPT methodology

Blog banner

Education: Key to your Prosperity

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Malware Defense

Blog banner

Mumbai Metro 3

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

Self defence

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Fitness

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Vikrant’s first blog

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Windows Operating System

Blog banner

Operating Systems

Blog banner

GraphX:- A graph processing tool

Blog banner

Outlook.com

Blog banner

10 Survival Tips that might save your life

Blog banner

Paralysis/Paralysis Stroke

Blog banner

MAILFENCE

Blog banner

Importance of modern technology era

Blog banner