wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

operating system

profile
Palak Santoki
Jul 05, 2024
0 Likes
0 Discussions
39 Reads

Memory is the important part of the computer that is used to store the data. Its management is critical to the computer system because the amount of main memory available in a computer system is very limited. to increase performance, several processes are executed simultaneously. For this, we must keep several processes in the main memory, so it is even more important to manage them effectively.Memory manager is used to keep track of the status of memory locations, whether it is free or allocated.The memory manager is responsible for protecting the memory allocated to each process from being corrupted by another process. Memory managers should enable sharing of memory space between processes.memory manager permits computers with a smaall amount of main memory to execute programs larger than the size or amount of available memory.it does thiss by moving information back and forth between primary memory and secondary memory by using the concpt of swapping.memory managers should enable sharing of memoey spacebetween processss.thus two programs can reside at same memory location although at different times.
there are two types of memory management techniques:
Contiguous memory management and Non-Contiguous memory management.
In a Contiguous memory management scheme, each program occupies a single contiguous block of storage locations, i.e., a set of memory locations with addresses.
In a Non-Contiguous memory management scheme, the program is divided into different blocks and loaded at different portions of the memory that need not necessarily be adjacent to one another. This scheme can be classified depending upon the size of blocks and whether the blocks reside in the main memory or not.

memory mannagment is requried for following reasons:

1.allocate and reallocate memory before and after program execution.

2.To keep track of used memory space by processes.

3.To properly utilie main memory.

4.To maintain data integrity while executing process.


Comments ()


Sign in

Read Next

Starvation

Blog banner

Odoo

Blog banner

Optimization of operating system design

Blog banner

Memory management

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

The War With Cold On Earth

Blog banner

note taker app

Blog banner

What is Spyware? and examples of them.

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

Basic Security For SOAP Services

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Ransomware

Blog banner

Save Environment

Blog banner

INTERRUPTS

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

Malware Defense

Blog banner

Zero-Day Attack

Blog banner

KAHAWA TEA

Blog banner

Processing Crime and Incident Scenes

Blog banner

Define Instagram.

Blog banner

8 Reasons Why You Must Try Digital Marketing

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Consumer to consumer Business model

Blog banner

Webmail

Blog banner

Boxing

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Security issues

Blog banner

38_Exploring The Honeynet Project

Blog banner

Sage business cloud accounting

Blog banner

Cyber Laws In India and Around the World

Blog banner

virtual memory

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

Buffering

Blog banner

Types of Threads

Blog banner

Fitness

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

Virtual Memory

Blog banner

Windows Operating System

Blog banner

Dangers of Using Public WiFis

Blog banner