Preview

Memory Management

Good Essays
Open Document
Open Document
490 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Memory Management
Memory Management Requirements
POS 355

The memory management process in operating systems proceeds under the requirements that include relocation, protection, sharing, logical organization, and physical organization. Each of these requirements is necessary in order for the operating system to correctly carry out the task of subdivision within the part of the memory where the program is being executed. Due to the complexity of memory location, multiprogramming system need to swap constantly between the main memory and the disk in order to prevent processor utilization waste. Because of this, relocation is necessary for when the program is swapped back into the main memory. It would be rather difficult and unneeded for the program to be placed in the same address as it was located before. A stack will form that will provide references for the instruction part of the program to be executed in order. When the relocation happens, the processor and the operating system are responsible for providing the current location of the program. This is used for the program code when physical addresses are needed. In order to prevent unintended interferences, the processor is responsible for protecting one process’s memory space from being accessed by another. During the run phase, the memory references of a process is to be verified that it only refers to the space allocated. Usually, the operating space allocated can never be accessed via user processes. Only in special circumstances can one process even access the allocated space of another process. Because of the mentioned circumstances, memory space needs to be held as flexible in case more than one process needs to access or execute the same program. Without the sharing feature of relocation, each process would need it own space of the same program which is an inefficient setup. While able to keep the standards to protect, the memory management system can allow access to



References: Stallings, W. (2011). Operating systems: Internals and design principles. Boston: Pearson.

You May Also Find These Documents Helpful

  • Good Essays

    Some OS routines directly support application programs as they run and thus must be resident. Other transient routines are stored on disk and read into memory only when needed. Fixed-length partitions can also be used to allocate the set amount of memory that a particular program needs to run. Under dynamic memory management, the transient area is treated as a pool of unstructured free space. When the system decides to load a particular program, a region of memory just sufficient to hold the program is allocated from the pool. Using segmentation, programs are divided into independently addressed segments and stored in noncontiguous memory. Paging breaks a program into fixed-length pages.…

    • 7085 Words
    • 29 Pages
    Good Essays
  • Satisfactory Essays

    SD1230 Lab 1

    • 239 Words
    • 2 Pages

    1. Why is virtual memory addresses used for applications? – So it can have its own address space on the memory.…

    • 239 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    To explain this, we should already know that in real life scenarios, stack increases to lower memory addresses, whenever program calls some function, the address of function call instruction is saved in stack as a return for the function. When the function executes, it allocates local variables, including buffers to stack and they are given a lower address than the return address. So, in this scenario the return address is a certain level above the base address for buffers and if the buffer is overflowing, then it is most likely that an attacker can change return address as well. If the return address is changed to some random value, then it will cause segmentation fault, but if the return address is changed to a certain address where some executable code is present, then that may complete attackers intended tasks with the application.…

    • 335 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The place in the central processing unit where data and programs are temporarily stored during processing is called the…

    • 663 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    POS355 Week 1 Individual

    • 574 Words
    • 2 Pages

    There are several items that are pertinent to memory management such as, basic hardware, the binding of symbolic memory addresses to definite physical addresses and the difference between logical and physical addresses. The most important task that memory management executes is the distribution and collection of memory…

    • 574 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Random-access-memory (RAM) is a very important specification of the computer. By ensuring you have enough RAM, the faster your system processes, you can store more data, and allow more programs to run at the same time. As the OS allows the different task to complete for the processor, the RAM is used as temp storage, when the processor no longer needs them the OS clears it. Virtual memory is the hard drive space borrowed to use if there isn’t enough…

    • 580 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Guide to Unix Chapter 2

    • 999 Words
    • 4 Pages

    9. In UNIX and Linux systems, what source of extra memory space is used when…

    • 999 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Week 5 Pos 355

    • 2010 Words
    • 9 Pages

    Memory management is an important part of an operating. The UNIX/Linux OS use numerous intricate algorithms for memory management which will permit the system to…

    • 2010 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Sharing allows several processes to access the same portion of main memory (Stallings, 2012). When there are a number of processes executing the same program it is beneficial to allow each process to access the same copy of the program rather than have its own separate copy (Stallings, 2012,). The memory management system must therefore…

    • 573 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Faith Integration

    • 613 Words
    • 3 Pages

    The processor could keep track of what locations are associated with each process and limit access to locations that are outside of a program's extent. By using base and limits registers and by performing a check for every memory access, information regarding the extent of a program's memory could be maintained…

    • 613 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Intro the Programming

    • 386 Words
    • 5 Pages

    The _______ is the memory address that is saved by the system when a method is called and is the location to which…

    • 386 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Java

    • 5076 Words
    • 21 Pages

    Explanation: D) The program is first loaded from secondary memory into main memory before it is executed so that the processor is not slowed down by reading each instruction. This idea of executing programs stored in memory is called the Stored Program Computer and was pioneered by John Von Neumann in the 1940s.…

    • 5076 Words
    • 21 Pages
    Good Essays
  • Good Essays

    For any operating system to function properly, one of the vital tasks it must be able to do is manage memory. When a program runs on a computer, it first must be loaded into memory before it can execute. There are five different requirements memory management must satisfy in order to execute the program so it runs without errors or corruption. These requirements are relocation, protection, sharing, logical organization, and physical organization.…

    • 730 Words
    • 3 Pages
    Good Essays
  • Good Essays

    devices and controls their processes. Windows and UNIX are examples of operating systems. Application software refers to programs that make the computer…

    • 904 Words
    • 4 Pages
    Good Essays