wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management

profile
Vansh Dedhia
Aug 17, 2024
0 Likes
0 Discussions
102 Reads

What is Memory Management?

In a multiprogramming computer, the Operating System resides in a part of memory, and the rest is used by multiple processes. The task of subdividing the memory among different processes is called Memory Management. Memory management is a method in the operating system to manage operations between main memory and disk during process execution. The main aim of memory management is to achieve efficient utilization of memory. In Simpler words, Memory management is the process of controlling and coordinating a computer's main memory. It ensures that memory space are properly managed and allocated so the operating system (OS), applications and other running processes have the memory they need to carry out their operations. So the functions of each process will happen smoothly.


Why memory management is Required?


1.Allocate and de-allocate memory before and after process execution.

2.To keep track of used memory space by processes.

3.To minimize fragmentation issues.

4.To proper utilization of main memory.

5.To maintain data integrity while executing of process.



The memory management techniques can be classified into following:

Contiguous memory management schemes and Non-Contiguous memory management schemes, this is explained further below,


1.Contiguous Memory Management Schemes:-

Contiguous memory management is a way to allocate memory for programs in a computer.


Let's understand with an example here,

Imagine you have a big library with many books (programs) that need to be stored on shelves (memory). Contiguous memory management assigns each book in a continuous block of shelves, so all the pages (data) of a book are together in one place.


It is discussed below how it will work:

1.Fixed-size partitions: Divide the library (memory) into fixed-size sections (partitions) like small, medium, and large shelves.

2.Program allocation: When a program (book) needs memory, find a partition that fits its size and allocate it.

3.Continuous block: Assign a continuous block of shelves within the partition to the program, so all its data is stored together.


2.Non-Contiguous memory management schemes:-

Non-Contiguous memory management is a way to allocate memory for programs in a computer, where programs don't need to be stored in a single, continuous block of memory. Here's a simplified explanation:


Let's take the same example from above to understand and relate with it, Non-Contiguous memory management allows books to be stored in different sections of the library, as long as there's enough space.


Let's understand how it will works:-

1.Paging: Divide the library (memory) into small, equal-sized sections called pages.

2.Program allocation: When a program (book) needs memory, allocate pages from anywhere in the library.

3.Page table: Keep a page table (index) to track which pages belong to which program.


Comments ()


Sign in

Read Next

Paralysis/Paralysis Stroke

Blog banner

NIKE

Blog banner

Threads

Blog banner

PPT methodology

Blog banner

DATA WRANGLING

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

Understanding - Proof of Work!

Blog banner

Social engineering in cyber security

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

THE ACTORS LIFE

Blog banner

Web Site

Blog banner

indian premier league

Blog banner

LISP - Library Management System

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Random Forests

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

S-Tool : Steganography

Blog banner

Buffering

Blog banner

Junk food vs healthy food

Blog banner

Importance of internet

Blog banner

Interrupts in OS

Blog banner

AI and cyber Security

Blog banner

OS Assignment 3

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

Memory Management

Blog banner

Firewall

Blog banner

Principles of Concurrency

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

Raid

Blog banner

Evolution of the Microprocesor

Blog banner

Spyware

Blog banner

Processes: Process Description and Control.

Blog banner

Why we should do reading

Blog banner

Odoo

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

The most common internet security threats

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Vulnerability Assessment

Blog banner