SlideShare a Scribd company logo
1 of 15
A GLANCE ON MEMORY
MANAGEMENT SECTION
OPERATING SYSTEM
akmalcikmat
Paging
A technique used by virtual memory OS to help
ensure that the data we need is available as quickly
as possible. The operating system copies a certain
number of pages from storage device to main
memory. When a program needs a page that is not in
main memory, the operating system copies the
required page into the memory and copies another
page back to the disk.
akmalcikmat
Cont.
One says that the operating system pages the data.
Each time a page is needed that is not currently in
memory, a page fault occurs. An invalid page
fault occurs when the address of the page being
requested is invalid. In this case, the application is
usually aborted
akmalcikmat
Segmentation
Segmentation is a technique to break memory into
logical pieces where each piece represents a group of
related information. For example ,data segments or
code segment for each process, data segment for
operating system and so on. Segmentation can be
implemented using or without using paging.
Unlike paging, segment are having varying sizes and
thus eliminates internal fragmentation. External
fragmentation still exists but to lesser extent.
akmalcikmat
akmalcikmat
Fragmentation
Refers to the condition of a disk in which files are
divided into pieces scattered around the disk.
Fragmentation occurs naturally when one use a disk
frequently, creating, deleting, and modifying files. At
some point, the operating system needs to store parts
of a file in non-contiguous clusters. This is entirely
invisible to users, but it can slow down the speed at
which data is accessed because the disk drive must
search through different parts of the disk to put
together a single file.
akmalcikmat
Cont.
Fragmentation can also refer to RAM that has
small, unused holes scattered throughout it. This
is called external fragmentation.
With modern OS that use a paging scheme, a
more common type of RAM fragmentation
is internal fragmentation.
This occurs when memory is allocated in frames
and the frame size is larger than the amount of
memory requested
akmalcikmat
akmalcikmat
Virtual Memory
An imaginary memory area supported by some
OSs (for example, Windows but not DOS) in
conjunction with the hardware. One can think of
virtual memory as an alternate set of memory
addresses. Programs use these virtual
addresses rather than real addresses to store
instructions and data. When the program is
actually executed, the virtual addresses are
converted into real memory addresses.
akmalcikmat
akmalcikmat
akmalcikmat
Page Table
A page table is the data structure used by a
virtual memory system in a computer OS to store
the mapping between virtual
addresses and physical addresses.
Virtual addresses are used by the accessing
process, while physical addresses are used by
the hardware or more specifically to the RAM.
Each mapping is also known as a page table
entry (PTE)
akmalcikmat
akmalcikmat
Swapping
Swapping is a mechanism in which a process can
be swapped temporarily out of main memory to a
backing store, and then brought back into
memory for continued execution.
Backing store is a usually a hard disk drive or
any other secondary storage which fast in access
and large enough to accommodate copies of all
memory images for all users. It must be capable
of providing direct access to these memory
images
akmalcikmat
Cont.
akmalcikmat

More Related Content

What's hot (20)

Memory management
Memory managementMemory management
Memory management
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
 
Main memory of computer .ppt
Main memory of computer .pptMain memory of computer .ppt
Main memory of computer .ppt
 
Memory management
Memory managementMemory management
Memory management
 
OS - Process Concepts
OS - Process ConceptsOS - Process Concepts
OS - Process Concepts
 
Memory Organization
Memory OrganizationMemory Organization
Memory Organization
 
Operating system paging and segmentation
Operating system paging and segmentationOperating system paging and segmentation
Operating system paging and segmentation
 
Operating system memory management
Operating system memory managementOperating system memory management
Operating system memory management
 
Operating Systems Basics
Operating Systems BasicsOperating Systems Basics
Operating Systems Basics
 
Boot process
Boot processBoot process
Boot process
 
Demand paging
Demand pagingDemand paging
Demand paging
 
Paging and segmentation
Paging and segmentationPaging and segmentation
Paging and segmentation
 
Os unit 3
Os unit 3Os unit 3
Os unit 3
 
Process management in os
Process management in osProcess management in os
Process management in os
 
operating system structure
operating system structureoperating system structure
operating system structure
 
Memory management
Memory managementMemory management
Memory management
 
Process of operating system
Process of operating systemProcess of operating system
Process of operating system
 
Disk formatting
Disk formattingDisk formatting
Disk formatting
 
File Management in Operating System
File Management in Operating SystemFile Management in Operating System
File Management in Operating System
 
computer system structure
computer system structurecomputer system structure
computer system structure
 

Viewers also liked

Viewers also liked (7)

8 memory management strategies
8 memory management strategies8 memory management strategies
8 memory management strategies
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
Virtual Memory and Paging
Virtual Memory and PagingVirtual Memory and Paging
Virtual Memory and Paging
 
Virtual memory ppt
Virtual memory pptVirtual memory ppt
Virtual memory ppt
 
Os Swapping, Paging, Segmentation and Virtual Memory
Os Swapping, Paging, Segmentation and Virtual MemoryOs Swapping, Paging, Segmentation and Virtual Memory
Os Swapping, Paging, Segmentation and Virtual Memory
 
Memory management
Memory managementMemory management
Memory management
 

Similar to Operating System-Memory Management

Virtual Memory
Virtual MemoryVirtual Memory
Virtual MemoryArchith777
 
Paging +Algorithem+Segmentation+memory management
Paging +Algorithem+Segmentation+memory managementPaging +Algorithem+Segmentation+memory management
Paging +Algorithem+Segmentation+memory managementkazim Hussain
 
Chapter 09 - Virtual Memory.ppt
Chapter 09 - Virtual Memory.pptChapter 09 - Virtual Memory.ppt
Chapter 09 - Virtual Memory.pptMonirJihad1
 
NOV11 virtual memory.ppt
NOV11 virtual memory.pptNOV11 virtual memory.ppt
NOV11 virtual memory.pptPratikBose10
 
virtual memory.ppt
virtual memory.pptvirtual memory.ppt
virtual memory.pptsuryansh85
 
Virtual Memory vs Cache Memory
Virtual Memory vs Cache MemoryVirtual Memory vs Cache Memory
Virtual Memory vs Cache MemoryAshik Iqbal
 
windows memory management.pptx
windows memory management.pptxwindows memory management.pptx
windows memory management.pptxGevitaChinnaiah
 
Computer architecture virtual memory
Computer architecture virtual memoryComputer architecture virtual memory
Computer architecture virtual memoryMazin Alwaaly
 
Power Point Presentation on Virtual Memory.ppt
Power Point Presentation on Virtual Memory.pptPower Point Presentation on Virtual Memory.ppt
Power Point Presentation on Virtual Memory.pptRahulRaj395610
 
Memory management ppt coa
Memory management ppt coaMemory management ppt coa
Memory management ppt coaBharti Khemani
 
Virtualmemoryfinal 161019175858
Virtualmemoryfinal 161019175858Virtualmemoryfinal 161019175858
Virtualmemoryfinal 161019175858marangburu42
 

Similar to Operating System-Memory Management (20)

Memory virtualization
Memory virtualizationMemory virtualization
Memory virtualization
 
virtual memory
virtual memoryvirtual memory
virtual memory
 
Virtual Memory
Virtual MemoryVirtual Memory
Virtual Memory
 
Paging +Algorithem+Segmentation+memory management
Paging +Algorithem+Segmentation+memory managementPaging +Algorithem+Segmentation+memory management
Paging +Algorithem+Segmentation+memory management
 
unit5_os (1).pptx
unit5_os (1).pptxunit5_os (1).pptx
unit5_os (1).pptx
 
Chapter 09 - Virtual Memory.ppt
Chapter 09 - Virtual Memory.pptChapter 09 - Virtual Memory.ppt
Chapter 09 - Virtual Memory.ppt
 
NOV11 virtual memory.ppt
NOV11 virtual memory.pptNOV11 virtual memory.ppt
NOV11 virtual memory.ppt
 
NOV11 virtual memory.ppt
NOV11 virtual memory.pptNOV11 virtual memory.ppt
NOV11 virtual memory.ppt
 
virtual memory - Computer operating system
virtual memory - Computer operating systemvirtual memory - Computer operating system
virtual memory - Computer operating system
 
virtual memory.ppt
virtual memory.pptvirtual memory.ppt
virtual memory.ppt
 
Os unit 2
Os unit 2Os unit 2
Os unit 2
 
Virtual Memory vs Cache Memory
Virtual Memory vs Cache MemoryVirtual Memory vs Cache Memory
Virtual Memory vs Cache Memory
 
Virtual Memory
Virtual MemoryVirtual Memory
Virtual Memory
 
windows memory management.pptx
windows memory management.pptxwindows memory management.pptx
windows memory management.pptx
 
Computer architecture virtual memory
Computer architecture virtual memoryComputer architecture virtual memory
Computer architecture virtual memory
 
Power Point Presentation on Virtual Memory.ppt
Power Point Presentation on Virtual Memory.pptPower Point Presentation on Virtual Memory.ppt
Power Point Presentation on Virtual Memory.ppt
 
Memory Hierarchy
Memory HierarchyMemory Hierarchy
Memory Hierarchy
 
Memory management
Memory managementMemory management
Memory management
 
Memory management ppt coa
Memory management ppt coaMemory management ppt coa
Memory management ppt coa
 
Virtualmemoryfinal 161019175858
Virtualmemoryfinal 161019175858Virtualmemoryfinal 161019175858
Virtualmemoryfinal 161019175858
 

More from Akmal Cikmat

Reflective Case Study - OBSERVATION ON THE 2019 NOVEL CORONAVIRUS PANDEMIC (C...
Reflective Case Study - OBSERVATION ON THE 2019 NOVEL CORONAVIRUS PANDEMIC (C...Reflective Case Study - OBSERVATION ON THE 2019 NOVEL CORONAVIRUS PANDEMIC (C...
Reflective Case Study - OBSERVATION ON THE 2019 NOVEL CORONAVIRUS PANDEMIC (C...Akmal Cikmat
 
Air Asia- Geographic Organizational Structure
Air Asia- Geographic Organizational StructureAir Asia- Geographic Organizational Structure
Air Asia- Geographic Organizational StructureAkmal Cikmat
 
Book Report : The Prisoner Of Zenda
Book Report : The Prisoner Of ZendaBook Report : The Prisoner Of Zenda
Book Report : The Prisoner Of ZendaAkmal Cikmat
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and routerAkmal Cikmat
 
Mitch Albom's For One More Day Book Report
Mitch Albom's For One More Day Book ReportMitch Albom's For One More Day Book Report
Mitch Albom's For One More Day Book ReportAkmal Cikmat
 
Pendidikan Dalam Islam pt ii
Pendidikan Dalam Islam pt iiPendidikan Dalam Islam pt ii
Pendidikan Dalam Islam pt iiAkmal Cikmat
 
Pendidikan Dalam Islam
Pendidikan Dalam IslamPendidikan Dalam Islam
Pendidikan Dalam IslamAkmal Cikmat
 
AS Level Physics' Radioactivity Presentation
AS Level Physics' Radioactivity PresentationAS Level Physics' Radioactivity Presentation
AS Level Physics' Radioactivity PresentationAkmal Cikmat
 
Sumber ilmu & penerima ilmu
Sumber ilmu & penerima ilmuSumber ilmu & penerima ilmu
Sumber ilmu & penerima ilmuAkmal Cikmat
 
Malaysian Studies -destinasi pelancongan di Malaysia
Malaysian Studies -destinasi pelancongan di MalaysiaMalaysian Studies -destinasi pelancongan di Malaysia
Malaysian Studies -destinasi pelancongan di MalaysiaAkmal Cikmat
 

More from Akmal Cikmat (10)

Reflective Case Study - OBSERVATION ON THE 2019 NOVEL CORONAVIRUS PANDEMIC (C...
Reflective Case Study - OBSERVATION ON THE 2019 NOVEL CORONAVIRUS PANDEMIC (C...Reflective Case Study - OBSERVATION ON THE 2019 NOVEL CORONAVIRUS PANDEMIC (C...
Reflective Case Study - OBSERVATION ON THE 2019 NOVEL CORONAVIRUS PANDEMIC (C...
 
Air Asia- Geographic Organizational Structure
Air Asia- Geographic Organizational StructureAir Asia- Geographic Organizational Structure
Air Asia- Geographic Organizational Structure
 
Book Report : The Prisoner Of Zenda
Book Report : The Prisoner Of ZendaBook Report : The Prisoner Of Zenda
Book Report : The Prisoner Of Zenda
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
Mitch Albom's For One More Day Book Report
Mitch Albom's For One More Day Book ReportMitch Albom's For One More Day Book Report
Mitch Albom's For One More Day Book Report
 
Pendidikan Dalam Islam pt ii
Pendidikan Dalam Islam pt iiPendidikan Dalam Islam pt ii
Pendidikan Dalam Islam pt ii
 
Pendidikan Dalam Islam
Pendidikan Dalam IslamPendidikan Dalam Islam
Pendidikan Dalam Islam
 
AS Level Physics' Radioactivity Presentation
AS Level Physics' Radioactivity PresentationAS Level Physics' Radioactivity Presentation
AS Level Physics' Radioactivity Presentation
 
Sumber ilmu & penerima ilmu
Sumber ilmu & penerima ilmuSumber ilmu & penerima ilmu
Sumber ilmu & penerima ilmu
 
Malaysian Studies -destinasi pelancongan di Malaysia
Malaysian Studies -destinasi pelancongan di MalaysiaMalaysian Studies -destinasi pelancongan di Malaysia
Malaysian Studies -destinasi pelancongan di Malaysia
 

Recently uploaded

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Operating System-Memory Management

  • 1. A GLANCE ON MEMORY MANAGEMENT SECTION OPERATING SYSTEM akmalcikmat
  • 2. Paging A technique used by virtual memory OS to help ensure that the data we need is available as quickly as possible. The operating system copies a certain number of pages from storage device to main memory. When a program needs a page that is not in main memory, the operating system copies the required page into the memory and copies another page back to the disk. akmalcikmat
  • 3. Cont. One says that the operating system pages the data. Each time a page is needed that is not currently in memory, a page fault occurs. An invalid page fault occurs when the address of the page being requested is invalid. In this case, the application is usually aborted akmalcikmat
  • 4. Segmentation Segmentation is a technique to break memory into logical pieces where each piece represents a group of related information. For example ,data segments or code segment for each process, data segment for operating system and so on. Segmentation can be implemented using or without using paging. Unlike paging, segment are having varying sizes and thus eliminates internal fragmentation. External fragmentation still exists but to lesser extent. akmalcikmat
  • 6. Fragmentation Refers to the condition of a disk in which files are divided into pieces scattered around the disk. Fragmentation occurs naturally when one use a disk frequently, creating, deleting, and modifying files. At some point, the operating system needs to store parts of a file in non-contiguous clusters. This is entirely invisible to users, but it can slow down the speed at which data is accessed because the disk drive must search through different parts of the disk to put together a single file. akmalcikmat
  • 7. Cont. Fragmentation can also refer to RAM that has small, unused holes scattered throughout it. This is called external fragmentation. With modern OS that use a paging scheme, a more common type of RAM fragmentation is internal fragmentation. This occurs when memory is allocated in frames and the frame size is larger than the amount of memory requested akmalcikmat
  • 9. Virtual Memory An imaginary memory area supported by some OSs (for example, Windows but not DOS) in conjunction with the hardware. One can think of virtual memory as an alternate set of memory addresses. Programs use these virtual addresses rather than real addresses to store instructions and data. When the program is actually executed, the virtual addresses are converted into real memory addresses. akmalcikmat
  • 12. Page Table A page table is the data structure used by a virtual memory system in a computer OS to store the mapping between virtual addresses and physical addresses. Virtual addresses are used by the accessing process, while physical addresses are used by the hardware or more specifically to the RAM. Each mapping is also known as a page table entry (PTE) akmalcikmat
  • 14. Swapping Swapping is a mechanism in which a process can be swapped temporarily out of main memory to a backing store, and then brought back into memory for continued execution. Backing store is a usually a hard disk drive or any other secondary storage which fast in access and large enough to accommodate copies of all memory images for all users. It must be capable of providing direct access to these memory images akmalcikmat