wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management Techniques

profile
Vedant Rana
Jul 04, 2024
0 Likes
0 Discussions
81 Reads

Memory Management Techniques: -

Process Isolation: 
Each running program gets its own section of memory. The OS must prevent independent processes from interfering with each other’s memory, both data and instructions.This prevents processes from interfering with each other.

Virtual Memory: 
Think of virtual memory as an imaginary extension of your computer’s actual RAM. When RAM is full, the OS moves some data to the hard drive. This allows bigger programs to run as if they have more memory than they really do.

Swapping: 
If there’s too much demand on memory, the OS can move entire processes from RAM to the hard drive to free up space. It’s like temporarily moving out of your apartment to let someone else use it for a bit.
There are two types of Memory Allocation Techniques:-
   A) Contiguous Allocation: 
   Memory is allocated in a single, continuous block. Simple and fast, but can waste space or memory as processes end and start.

   B)Non-Contiguous Allocation: 
   Memory is allocated in separate blocks scattered around, using various techniques like segmentation. More efficient use of space but more complex to manage.

Cache Management:
Uses small, fast memory caches to store frequently accessed data, speeding up the overall performance of the system. Imagine it as having a few frequently used Application pinned on your PC Tab bar instead of searching for them.

Protection and access control: 
Sharing of memory, at any level of the memory hierarchy, creates the potential for one program to address the memory space of another. This is desirable when sharing is needed by particular applications. At other times, it threatens the integrity of programs and even of the OS itself. The OS must allow portions of memory to be accessible in various ways by various users.

Summary: In essence, memory management in an operating system is about organizing and optimizing the use of memory to ensure that programs run efficiently and reliably. It involves allocating memory to processes, moving data between RAM and storage as needed, and protecting memory spaces to maintain system stability and security.


Comments ()


Sign in

Read Next

Service Operations in ITSM

Blog banner

What is Minting & Mining

Blog banner

SPAM

Blog banner

Why is online marketing is important in current scenario

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

virtual memory

Blog banner

Disk scheduling

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

VPN

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

Retiring ISS

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Travel: Everything Everywhere!

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

Place to visit in pune

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Busted : Common Web Security Myths

Blog banner

Sagar Parikrama

Blog banner

"Audit" In Data Science

Blog banner

Operating Systems

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Lucidchart

Blog banner

How To Secure Operating Systems ?

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Deadlock

Blog banner

MOBILE DEVICE FORENSIC

Blog banner

What are Tenders its various types

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

MYNTRA

Blog banner

Data Security must be your Priority!

Blog banner

Number Guessing game --lisp

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

Music

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Expert System In AI

Blog banner

CONCURRENCY

Blog banner

Virtual machine and virtualizing

Blog banner

Data Exfiltration

Blog banner