wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Paginng In OS

profile
ANUJ YADAV
Sep 08, 2024
0 Likes
0 Discussions
81 Reads

                         Paging in Operating Systems

Paging is a memory management scheme used by operating systems to eliminate the problem of fitting varying-sized processes into fixed-sized memory spaces. It allows a process's physical memory to be non-contiguous, effectively avoiding fragmentation and ensuring efficient use of memory.

 

How Paging Works :

Logical and Physical Memory Separation :

Paging separates the logical address space (the addresses used by programs) from the physical address space (the actual addresses in RAM). This means a program’s memory can be scattered across different locations in physical memory, while still appearing contiguous to the program itself.

 

Pages and Frames

 

Pages: The process’s logical memory is divided into fixed-sized blocks called pages.

Frames: The physical memory is also divided into blocks of the same size as the pages, called frames.

The OS loads pages from the logical address space into available frames in the physical address space.

Page Table

The operating system maintains a page table for each process. This table maps the logical pages to their corresponding frames in physical memory. When a program references a memory address, the CPU uses the page table to translate the logical address into a physical address.

 

Address Translation

Every memory access by a program involves two components: the page number and the page offset.

 

The page number identifies the specific page in the page table.

The page offset is the exact location within the page.

The operating system uses this information to find the corresponding physical address in the frame.



Comments ()


Sign in

Read Next

Every body is beautiful

Blog banner

Malware

Blog banner

File management

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

Process states

Blog banner

Decision Tree: A Diagram Model

Blog banner

Evolution of operating systems

Blog banner

Wiretapping

Blog banner

Virtual memory

Blog banner

Khau Galli – Vile Parle

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Ubiquitous Computing

Blog banner

Odoo

Blog banner

Uniprocessor scheduling

Blog banner

Instagram

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

Business-to-Business

Blog banner

Paralysis/Paralysis Stroke

Blog banner

Apache Kafka

Blog banner

Virtual memory

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

Save Girl Child

Blog banner

Routers

Blog banner

The Golden Temple , Amritsar

Blog banner

Record Blocking

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

Busted : Common Web Security Myths

Blog banner

SESSION HIJACKING

Blog banner

Memory Management

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

bulk email software

Blog banner

Bharat Maps

Blog banner

The most common internet security threats

Blog banner

A Short History of GIS

Blog banner

File Management system

Blog banner

Life of a 2020-2021 student

Blog banner

Introduction to GIS

Blog banner

Importance of Education

Blog banner

Multiprocessor and scheduling

Blog banner

"Can Lisp do Machine Learning?"

Blog banner