wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory management

profile
Deepti Ghori
Jul 05, 2024
0 Likes
0 Discussions
13 Reads

Memory is the most important part of a computer for storing data. It is important to address this in a computer system because the amount of main memory in a computer system is very limited. There are so many things competing for it every time. Additionally, multiple processes are performed simultaneously to maximize efficiency. This requires a lot of main memory, so it’s even more important to maintain it.

The role of memory control

Following are the important functions of memory management in a computer system.

1. The memory manager is used to track the status of memory locations, whether they are freed or shared. The allocation of abstraction handles initial memory so that the software assumes that it is allocated large amounts of memory.

2. The memory manager enables computers with limited main memory to execute programs larger than the size or amount of available memory. It does this by moving information back and forth between primary and secondary memory through the concept of exchange.

3. The memory manager is responsible for protecting the memory allocated to each task from corruption by other tasks. If care is not taken, the system may exhibit unpredictable behavior.

4. Memory managers should provide sharing of memory space between processes. Thus, two activities can reside in the same memory location even at different times.

Memory management methods:

Memory control methods can be divided into the following main categories.

1. Contiguous Memory Management System

2. Non-contiguous memory management systems

1. Contiguous Memory Management System:

In Contiguous memory management scheme each program contains a connected block of storage locations ie. memory locations with consecutive addresses

2. Non-contiguous Memory Management system:

In a Non-Contiguous memory management system, the program is divided into blocks and placed in sections of memory that do not need to be adjacent to each other This system can divide this system based on the size of the blocks, whether blocks resides in main memory or not .

 

Div-A 

Deepti Ghori

53003230075


Comments ()


Sign in

Read Next

Device driver

Blog banner

Cyber Forensics on IOT Devices

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

How to make Pancakes

Blog banner

Threat management

Blog banner

Steganography

Blog banner

Best password managers: Reviews of the top products

Blog banner

How social media affect

Blog banner

Health and fitness

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

Buffers in Operating Systems

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

What are Virtual Machines

Blog banner

AOL Mail

Blog banner

Deadlock and Starvation

Blog banner

Elements and Principles of Photography

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

Busted : Common Web Security Myths

Blog banner

Deadlock and starvation in operating system

Blog banner

Password Generator - Lisp

Blog banner

TEAMWORK

Blog banner

Hash password! Is it really secured?

Blog banner

Modern Operating System

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Man is free by the birth .

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

Importance of Website

Blog banner

Virtual memory

Blog banner

STARVATION

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Disk Management

Blog banner

GIS Bharat Maps

Blog banner

MODERN OPERATING SYSTEM

Blog banner

What is Segmentation?

Blog banner

Regression Analysis

Blog banner

Blockchain uses and use cases

Blog banner

Operating system

Blog banner

GIS in Disaster Management

Blog banner

Deming’s Process

Blog banner

Senseless Teeths

Blog banner