wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory management

profile
Neeti undefined
Aug 15, 2024
0 Likes
0 Discussions
69 Reads


-memory is collection of data in a specific format. The instructions are stored and processed in memory. When the memory is subdivided among different processes it is called memory management. Memory management is important for effective utilization of memory since memory is the most important thing in operating system. Basic terms used in memory management:

1. Frame- fixed length block in main memory

2. Page- fixed length block in secondary memory

3. Segment- variable length block in secondary memory

 

Memory management requirements include:

1.   Reallocation: In multiprogramming system, the main is shared by multiple processes so a programmer cannot predict which programs will be stored in memory while program runs.

Processes are swapped in and out of main memory to maximize processor utilization. When program is swapped out of disk it may be placed in different memory back in requiring relocation.

2.   Protection: To protect processes from unwanted interference it is essential to make sure other programs don’t access the memory without proper authorization.

 

3.   Sharing: Any mechanism must have the flexibility to allow several processes to share same memory space. The memory management should allow shared memory with controlled access and with protection.

 

4.   Logical organization: To handle programs the operating system and computer hardware must support fundamental module that enables sharing and protection. This has following advantages:

·     Modules can be written and compiled independently.

·     Different modules can be assigned varying levels of protection.

·     Various mechanism exists to facilitate sharing of modules among different processes.

5.   Physical organization: The computer’s memory structure consists of main memory and secondary memory. Main memory is faster but volatile while secondary memory is used for long term storage. The main concern is the flow of information between these memory levels. The complexity of managing the information flow between main and secondary memory along with challenges of overlaying and uncertain space availability makes it difficult for programmers to fully understand and optimize memory usage.


Comments ()


Sign in

Read Next

RAID

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Modern Operating Systems.

Blog banner

Getting into Anime

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Big Data Architecture

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Sleep Matters: The Science Behind Toddler Naps

Blog banner

Penetration Testing

Blog banner

Embedded Operating System

Blog banner

Getting into anime My anime suggestions

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

File Management system

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Texting is actually better than talking in person

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

Traditional Unix System

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

Memory Management in an Operating System

Blog banner

Famous Indian dishes that where misunderstood to be Indian

Blog banner

The Right way of cooking

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

My Favorite Sportsperson

Blog banner

To travel is to live

Blog banner

NETWORK SECURITY RISKS

Blog banner

Modern operating system

Blog banner

Article on different management system

Blog banner

Windows Operating System

Blog banner

What is Minting & Mining

Blog banner

The Right way of cooking

Blog banner

I Personally

Blog banner

Multicore and Multithreading

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

Yahoo! mail

Blog banner

Data Mapping

Blog banner

Wiretapping

Blog banner

Major achievement

Blog banner

Memory input output management

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

What are Tenders its various types

Blog banner

objectives and function of operating system

Blog banner