Marian Bennett
POS/355
October 15, 2012
Jeff Rugg
Memory Management Requirements
There are two different types of programming systems; uniprogramming and multiprogramming. In uniprogramming there is just an operating system and the program that is currently being utilized. In multiprogramming, it is just as the term says, working to accommodate multiple programs. When are there is more than one program being executed at a time, there needs to be proper protocol and system checks. There are five requirements that memory management needs to satisfy: relocation, protection, and sharing, logical and physical organization.
Relocation of a program is needed if the processor needs more resources. Knowing that the main memory is shared by many different programs and processes, there will be times that some might need to be swapped out. For example, if the processor needs to swap out a program to be more efficient, the chances are that it will not be put back into the exact location therefore it would be relocated to a different area of the memory. The requirement of relocation is important because if the memory does not allow for this then the processor would not be utilized efficiently and would make your system slow and unreliable.
Protection is another requirement that is needed for memory management. “Each process should be protected against unwanted interference by other processes, whether accidental or intentional” (Stallings, 308). When the program is executed it will be checked by the processor at run time to make sure that it only has the proper memory reference of that particular program.
Another requirement for memory management is sharing. Sharing happens when a lot of processes are running the same program. Instead of each process having its own copy of the program, the processes share one copy that is protected.
Logical organization is the fourth requirement. Programs would be written in modules, which are not the same as computer systems, which are linear. There are advantages to programs being written in modules, and as noted by Stallings (p.309) the following are the benefits:
1. Modules can be written and compiled independently, with all references from one module to another resolved by the system at run time.
2. With modest additional overhead, different degrees of protection (read only, execute only) can be given to different modules.
3. It is possible to introduce mechanisms by which modules can be shared among processes. The advantage of providing sharing on a module level is that this corresponds to the user’s way of viewing the problem, and hence it is easy for the user to specify the sharing that is desired.
The last requirement is physical organization. This requirement is important for the two levels of memory, main and secondary memory. Information will travel back and forth from each memory location. The secondary memory tends to be larger and can hold more programs and data, while the main memory is smaller and can only hold processes that are currently being used. This system responsibility is a crucial requirement and cannot be left up to the programmer because the amount of memory needed would not be known.
All of these requirements are important to the overall management of the memory. Each one is related to the next and all of the requirements must be met in order to have a processor that is utilizing space and speed effectively while maintaining the integrity of the program.
References
Stallings, W. (1998). Operating Systems Internals and Design Principles (7th ed.). Upper Saddle Rivery, NJ: Pearson Education.
.
References: Stallings, W. (1998). Operating Systems Internals and Design Principles (7th ed.). Upper Saddle Rivery, NJ: Pearson Education. .
You May Also Find These Documents Helpful
-
1. Why is virtual memory addresses used for applications? – So it can have its own address space on the memory.…
- 239 Words
- 2 Pages
Satisfactory Essays -
RAM is the random access memory and it is volatile. It holds program instructions and data. The CPU can find…
- 204 Words
- 1 Page
Satisfactory Essays -
memory changes on how it is set. It either can be added or reduced from the computer.…
- 281 Words
- 2 Pages
Satisfactory Essays -
The different processes running in the back ground, (i.e. Windows Explorer, Power Manager) all take an allotted amount of RAM to perform at optimum levels. Freer RAM means that the essential processes that are running have more priority of the space and the CPU. When you begin to run your RAM to its limits, the essential processes and even the non-essential processes begin to lag due to the overtaxing of the CPU and RAM.…
- 356 Words
- 1 Page
Satisfactory Essays -
Page files are used when the CPU runs out of physical memory. The disadvantage of this is that ________…
- 1635 Words
- 16 Pages
Good Essays -
A computer can only run a program when it is in memory named RAM (Random Access Memory).…
- 1186 Words
- 6 Pages
Powerful Essays -
There are several items that are pertinent to memory management such as, basic hardware, the binding of symbolic memory addresses to definite physical addresses and the difference between logical and physical addresses. The most important task that memory management executes is the distribution and collection of memory…
- 574 Words
- 2 Pages
Satisfactory Essays -
There are two types of memory which we need and use on our computers one of them is RAM and the other one is cache.…
- 944 Words
- 4 Pages
Good Essays -
Random-access-memory (RAM) is a very important specification of the computer. By ensuring you have enough RAM, the faster your system processes, you can store more data, and allow more programs to run at the same time. As the OS allows the different task to complete for the processor, the RAM is used as temp storage, when the processor no longer needs them the OS clears it. Virtual memory is the hard drive space borrowed to use if there isn’t enough…
- 580 Words
- 3 Pages
Good Essays -
* Memory: RAM (random access memory), the higher the RAM the more programs you can access and open at once.…
- 1310 Words
- 6 Pages
Good Essays -
Protection is the next requirement to be satisfied. Protection deals with security against unwanted interference by other processes. Programs from other process should not be able to access memory locations in a process for reading or writing Purposes without permission. The processor must be able to abort such instructions at the point of execution.…
- 573 Words
- 3 Pages
Good Essays -
1. Where does Linux temporarily stores programs and data when it does not have enough RAM to hold all the information it is processing?…
- 1070 Words
- 4 Pages
Satisfactory Essays -
The purpose of this paper is to explore available research on the overpopulation of the Snow Goose on the North American continent. The snow goose has been rising in population since the middle of the century and has been escalating so much it is destroying their natural habitat. Wildlife managers have just recently begun to implement strategies to combat this problem. Mainly through the use of hunters the managers are trying to curb the population growth.…
- 1892 Words
- 8 Pages
Powerful Essays -
• Unary operator sizeof is used to determine the size in bytes of any data…
- 1308 Words
- 6 Pages
Good Essays -
Understand some of the general trends in OS development Be able to describe the bootstrapping process Understand how system calls work…
- 1262 Words
- 6 Pages
Good Essays