• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Memory Managment Operating Systems

Extracts from this document...

Introduction

Ricki Lambert Operating systems Assignment 2 Memory Management Introduction Memory management is a control of the operating system. Memory management is the most vital part of keeping computers resources in order. Without this kind of management the computer would experience severe problems when multiple threads are to be run, and when processes are completed and memory is to be regained. The management system is therefore capable of allocating and de-allocating memory when needed by the system. When a system has too little memory it will become unstable and therefore almost unusable. The memory managing sector of the operating system will also allocate an orderly fashion for the executable files to be dealt with, this then allows for the memory management system to determine what is in the memory for optimum performance and C.P.U utilization. It must be constantly active searching through its system and deciding what parts are being used by whom and what threads and applications need to be moved in and out of the system. When the memory becomes to full there must be an application or process to free some of it. A list can be seen below of the main purposes of the memory management sector. 1. Relocation of memory 2. Allocation of memory 3. Protection of memory 4. Sharing of memory 5. ...read more.

Middle

This diagram bellow shows how a process is taken from the CPU and sent to the memory. * The relocation register will hold the value at the base address which is owned by the process * The relocation registers contents are added to each memory address before it is sent to the memory. * A process can never see the physical address - it will just manipulate the logical address It is clear to see that the register has a limit, and if the process exceeds the register limit it will result in an address fault. If the total is less than the limit it will proceed to the base and is added to the logical address. This is how new logical addresses are designed. Fixed and Dynamic Partitioning It is also possible for memory to be partitioned when it is within its stored elements. This is for efficient storage and avoids clustering of the memory system. The memory can be partitioned in two differing ways. Firstly is fixed partitioning. Fixed memory partitioning ensures that memory blocks are split up into fixed sizes. When a process is sent for execution a space is created and a new process can enter. ...read more.

Conclusion

This is done by assigning it a bit, 1 bit is for writing, 1 bit is for reading and another for execution. It can therefore be said that this process is similar to that of the linking process described earlier. The only difference is that the dynamic linking always had to reside somewhere within the R.A.M, this process however can allocate virtual memory. This is done by what is known as the paging table. This then gives the logical memory two identities, the first being a page number and the second would be an offset within that page. Then when a process is to be run the memory management must look up the page number and offset and extracts the pair of them. From this is can translate the two and turn it in to the physical memory location. This then allows the process to be run. Segmentation Segmentation is where memory resides in the logical address space in groups. There are many benefits to this, but the most important is the protection. Memory can be protected in its groups rather that each individual address space. This improves efficiency of the system and makes memory allocation far easier. From here the need for external fragmentation is not needed although there is an additional need for context switching. It can also be said that there is a clear separation between the user and the system. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a teacher thought of this essay

3 star(s)

***
A good effort at a quite technical topic but some parts are not clear

Marked by teacher Ivor Borkin 01/04/2012

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Business & IT Department BTEC. Organisational System Security - Describe the various types of ...

    3 star(s)

    could implement to protect physical systems - p3: CCTV - This would work as both a visual deterrent to prevent thieves and vandals breaking into a building and causing damage or stealing systems and would also enable the company to keep an eye on potentially rouge employees that may steal data or embed viruses into systems.

  2. Marked by a teacher

    LAN & Topologies & Data Flow

    3 star(s)

    is destroyed, this means there is a free token which can be used. Data is transmitted via frames such as the addresses that are attached to the frame header and trailers. As soon as the frame has reached the specified computer the data is copied over.

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    It is an offence for Other Parties to obtain this personal data without authorisation. * Individuals have a right of access to the information held about them, subject to certain exceptions (for example, information held for the prevention or detection of crime).

  2. Computer systems assignment 1

    * FDD- Floppy Disk Drive reads floppy disks. Those are little diskettes which hold up to 1.44 MB. The FDDs are not installe in new computer systems as they are replaced with more spacious USB disks.

  1. Activity Based Costing system

    The costs of the two different products have been distorted because of the absorption costing system. It overstates the cost of a lamington, at the same time it understates the cost of a Danish pastry. Question 3 Explain how activity based costing could overcome the deficiencies inherent in the existing costing system.

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    Data is burnt(written to once) onto these devices and cannot be changed. They are sometimes called WORM devices(Write Once Read Many times) 3. Volatile memory and non-volatile memory. Another way to split memory types is to divide them between volatile and non-volatile memory. RAM is volatile.

  1. Future needs of Computer

    * Historical Reconstruction; * Information gathering; * The continuation of the current uses, updated and adapted with the changes in technology. There are also areas where the computer is needed to be used for more populist applications, they are: * In schools to introduce students to the discipline; * In

  2. Explain why the Bloody Code was developed and ended!

    Another reason I think the Bloody Code was developed is because landowners had emerged from the 1600's more successful, they based their power on the amount of property they owned, the landowners also felt that one of the laws main priorities was to protect their property.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work