Raven
POS 355
July 10, 2013
Matt Bestrand
Memory Management Requirements
With memory management there are certain requirements that it is intended to satisfy. Those requirements are relocation, protection, sharing, logical organization, and physical organization. As an essential part of memory management these areas will be discussed below.
Relocation
The importance of relocation according to Stallings (2012), is to maximize utilization of the processor by swapping active process in and out of memory. By doing this it provides many processes that are ready to use. By making the process accessible it means that it will not always be placed in the same area of memory. The operating system provides an address a process can be pulled from the last location it was placed.
Protection
Interference from other processes can cause irritation and should be protected against. Thus Stallings (2012) states that programs need permission to read or write. This is checked at run time by the processor to ensure that the program refers only to the memory for that process. It is protected by the processor and not the software, because it would be too time consuming for the Operating System to check and make sure every program has access to all the information it is trying to refer to.
Sharing
Several processes should have access to the same portion of protected main memory. By sharing data it prevents processes from having their own set of the same main memory. This sharing frees up memory space for other data.
Logical Organization
Segmentation is recommended by Stallings (2012) for logical organization. It gives three advantages. The first is sharing on a module level, which allows the user to specify sharing desired. The second advantage is that it allows for different degrees of protection that can be assigned to modules. Lastly, it allows a module to be written and compiled independently.
Physical Organization
Stallings (2012) recommends that the physical organization be the operating systems responsibility. This will prevent two problems from occurring. Overlaying which is when a programmer wastes their time by putting programs and data in the same region of memory. The second concern is when there is a multi-programming environment and the programmer does not know where the space will be or how much memory space is available.
Conclusion
Relocation, protection, sharing, local organization, and physical organization are essential to keep processes running smooth, which helps in not ticking off the user. Relocation because it allows a large pool of process to be used, protection keeps away unwanted interferences, sharing data to keep processes from having their own sets of the same data which take up memory, logical organization to keep things streamlined, and physical organization performed by an operating system to avoid wasted time and memory space. The memory management requirements, when made-the-most-of, will make users very happy.
References
Stallings, W. (2012). Operating Systems: Internals and Design Principles (7th ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/TOC.aspx?
assetid=d84fecab-fb01-41d1-b44d-9f6606d84c8b&assetmetaid=504ab140-8df8-4d00-8b87-727eed781592.
References: Stallings, W. (2012). Operating Systems: Internals and Design Principles (7th ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/TOC.aspx? assetid=d84fecab-fb01-41d1-b44d-9f6606d84c8b&assetmetaid=504ab140-8df8-4d00-8b87-727eed781592.
You May Also Find These Documents Helpful
-
1. Why is virtual memory addresses used for applications? – So it can have its own address space on the memory.…
- 239 Words
- 2 Pages
Satisfactory Essays -
1. What UID and PID have the highest amount of physical memory that a process has used and is not swapped out? Show all processes and full output.…
- 537 Words
- 3 Pages
Satisfactory Essays -
Stallings, W. ((2015)). Operating Systems: Internal and Design Principles, 8e. Retrieved from The University of Phoenix eBook Collection Database.…
- 472 Words
- 2 Pages
Satisfactory Essays -
There are several items that are pertinent to memory management such as, basic hardware, the binding of symbolic memory addresses to definite physical addresses and the difference between logical and physical addresses. The most important task that memory management executes is the distribution and collection of memory…
- 574 Words
- 2 Pages
Satisfactory Essays -
Memory management is an important part of an operating. The UNIX/Linux OS use numerous intricate algorithms for memory management which will permit the system to…
- 2010 Words
- 9 Pages
Better Essays -
Memory management is an important characteristic of an operating system. Main memory is divided into two parts one for resident programs, and the other for the program currently in use. The user part must be subdivided to accommodate multiple processes (Stallings, 2012). When a few processes are in the memory then much of the time all of the processes will have to wait for input /output and the processor will be idle. According to Stallings (2012),. The requirements that memory management is supposed to satisfy are Relocation, Protection, Sharing, Logical organization, and Physical…
- 573 Words
- 3 Pages
Good Essays -
The multi-store model of memory is an theoretical explanation of how memory processes work. It was the first extensively accepted model of how memory works, it is however not the definitive explanation of memory. The model was proposed by Atkinson and Shiffrin in 1968.…
- 541 Words
- 3 Pages
Good Essays -
Silberschatz, A., Galvin, P. B., & Gagne, G. (2009). Operating system concepts: Update (8th ed.). Hoboken, NJ: Wiley & Sons.…
- 669 Words
- 3 Pages
Good Essays -
Another reason a person or person(s) would want to access a computer systems RAM without…
- 820 Words
- 2 Pages
Good Essays -
5. (Page 34)Where are programs and data temporarily stored when there is not enough RAM to hold all the information it is processing? Swap file…
- 856 Words
- 4 Pages
Satisfactory Essays -
For any operating system to function properly, one of the vital tasks it must be able to do is manage memory. When a program runs on a computer, it first must be loaded into memory before it can execute. There are five different requirements memory management must satisfy in order to execute the program so it runs without errors or corruption. These requirements are relocation, protection, sharing, logical organization, and physical organization.…
- 730 Words
- 3 Pages
Good Essays -
Exp#2 fork system call Aim To create a new child process using fork system call. Algorithm 1. Declare a variable x to be shared by both child and parent. 2. Create a child process using fork system call.…
- 258 Words
- 2 Pages
Satisfactory Essays -
Several IPC mechanisms are available for POSIX systems, including shared memory and message passing. Here, we explore the POSIX API for shared memory. A process must first create a shared-memory segment using the shmget() system call (shmget() is derived from SHared Memory GET). The following example illustrates the use of shmget(): segment id = shmget(IPC PRIVATE, size, S IRUSR | S IWUSR); This first parameter specifies the key (or identifier) of the shared-memory segment. If this is set to IPC PRIVATE, a newshared-memory segment is created. The second parameter specifies the size (in bytes) of the shared-memory segment. Finally, the third parameter identifies the mode, which indicates how the shared-memory segment is to be used—that is, for reading, writing, or both. By setting the mode to S IRUSR | S IWUSR, we are indicating that the owner may read or write to the shared-memory segment. A successful call to shmget() returns an integer identifier for the shared-memory segment. Other processes that want to use this region of shared memory must specify this identifier. Processes that wish to access a shared-memory segment must attach it to their address space using the shmat() (SHared Memory ATtach) system call. The call to shmat() expects three parameters as well. The first is the integer identifier of the shared-memory segment being attached, and the second is a pointer location in memory indicating where the shared memory will be…
- 2267 Words
- 10 Pages
Better Essays -
consumer-producer problem that fills all the buffers. We can do so by having an integer count that keeps track of the number of full buffers. Initially, count is set to 0. It is incremented by the producer after it produces a new buffer and is decremented by the consumer after it consumes a buffer.…
- 778 Words
- 4 Pages
Satisfactory Essays -
Usually, the text segment is sharable so that only a single copy needs to be in memory for frequently executed programs, such as text editors, the C compiler, the shells, and so on. Also, the text segment is often read-only, to prevent a program from accidentally modifying its instructions.…
- 3957 Words
- 16 Pages
Powerful Essays