wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Segmentation and paging concept

profile
Maitry Gala
Aug 13, 2024
0 Likes
0 Discussions
108 Reads

Segmentation and Paging in Operating Systems

Segmentation and paging are two fundamental techniques employed by operating systems to manage memory efficiently. While they share the common goal of optimizing memory utilization, they differ significantly in their approaches.

1.Segmentation

• Divides memory into variable-sized segments.

• Segments correspond to logical units: code, data, stack, heap, etc.

• Provides flexibility: Allows efficient allocation of memory based on program structure.

• Protection: Enables access control at the segment level.

• Sharing: Facilitates sharing of code and data segments among processes.

Example: A program might have separate segments for instructions, global variables, and local variables.

2.Paging

• Divides physical memory into fixed-sized blocks called pages.

• Divides processes into fixed-sized pages as well.

• Simplifies memory management: Treats memory as a uniform structure.

• Overcomes external fragmentation: Efficiently utilizes available memory.

• Enables virtual memory: Allows processes to use more memory than physically available.

Example: A process’s address space is divided into pages, which are mapped to physical frames in memory.

Maitry Gala-53003230041

Div A 

 

 

 

 


Comments ()


Sign in

Read Next

Uniprocessor Scheduling

Blog banner

STARVATION

Blog banner

Disk scheduling

Blog banner

INTRANET

Blog banner

Semaphores

Blog banner

Deadlock

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

Evolution of Operating Sytems

Blog banner

internet email and it's applications

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Process in OS

Blog banner

Dr. Venkadavarahan

Blog banner

Android Flashlight Application

Blog banner

Synchronization

Blog banner

Os Virtual Memory

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

Google

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Deadlock and Starvation

Blog banner

OS ASSIGNMENT

Blog banner

DNS Cache

Blog banner

Network Forensics Tools and Techniques

Blog banner

Memory Management - operating system

Blog banner

geographic information system (GIS)

Blog banner

A book review

Blog banner

Beatbox

Blog banner

Virtual machine and virtualizing

Blog banner

Full Disk Encryption

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

ODOO

Blog banner

Supervised and unsupervised learning

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

File System

Blog banner

Types of Big Data

Blog banner

EID UL FITR

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

Direct memory access (DMA)

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

URL vs Domain

Blog banner