POS 355
Memory Management Requirements
The following paper will discuss the memory requirements in a computer system. Proper amount of memory must be available to minimize the amount of processor idle time while input output devices are preparing to respond.
According to Stallings (2012) the requirements of memory management must satisfy the relocation, protection sharing, logical organization, and physical organization.
In order to accommodate multiple processor events, addresses in the main memory are swapped out and relocated to different address in the main memory. This type of event is called relocating. According to Stallings (2012), the operating system requires knowledge of “the location of process control information and of the execution stack, as well as the entry point to begin execution of the program for this process (Relocation, p. 307).
Memory protection requirements are to be satisfied by the hardware rather than the operating system. The software is unable to anticipate all of the references made by the programs. Read and write restrictions are made to control this area.
Sharing occurs when many different process need to access same areas of the main memory at the same time. Memory management allows this to be done without compromising the integrity of any of the data.
Logical organization of the main memory is done in a linear fashion making it less confusing when programs must access it. Since programs are usually created in modules, they must be organized for execution in order for the system to benefit from their creation. If organized properly, the programs can be executed simultaneously and everybody can be happy.
Main memory and secondary memory are the areas involved in the physical organization of this area. The processor must be located in one specific area in order to access the registers of the system as opposed to the data discs. This set up will ensure the smooth flow of data in the system.
In conclusion, all components of a system are set up in a way to ensure the smooth efficient flow of data, limiting the amount of idle time as well as to ensure the minimal of corrupt data. Memory management requirements are put in place to ensure that all system requirements are met and idle time is eliminated.
References
Stallings, W. (2012). Operating systems: Internals and design principles (7th ed.). Boston, MA: Prentice Hall.
References: Stallings, W. (2012). Operating systems: Internals and design principles (7th ed.). Boston, MA: Prentice Hall.
You May Also Find These Documents Helpful
-
Some OS routines directly support application programs as they run and thus must be resident. Other transient routines are stored on disk and read into memory only when needed. Fixed-length partitions can also be used to allocate the set amount of memory that a particular program needs to run. Under dynamic memory management, the transient area is treated as a pool of unstructured free space. When the system decides to load a particular program, a region of memory just sufficient to hold the program is allocated from the pool. Using segmentation, programs are divided into independently addressed segments and stored in noncontiguous memory. Paging breaks a program into fixed-length pages.…
- 7085 Words
- 29 Pages
Good Essays -
1. Why is virtual memory addresses used for applications? – So it can have its own address space on the memory.…
- 239 Words
- 2 Pages
Satisfactory Essays -
While in the hardware, memory management includes elements that store data such as random access memory chips, and memory caches. In the operating system, memory management involves the distribution of precise memory blocks to programs as the user requests adjustments. While at the application and program level, memory management ensures the availability of sufficient memory for the objects and data structures at all times for each program that is running.…
- 574 Words
- 2 Pages
Satisfactory Essays -
Memory management is an important part of an operating. The UNIX/Linux OS use numerous intricate algorithms for memory management which will permit the system to…
- 2010 Words
- 9 Pages
Better Essays -
Memory management is an important characteristic of an operating system. Main memory is divided into two parts one for resident programs, and the other for the program currently in use. The user part must be subdivided to accommodate multiple processes (Stallings, 2012). When a few processes are in the memory then much of the time all of the processes will have to wait for input /output and the processor will be idle. According to Stallings (2012),. The requirements that memory management is supposed to satisfy are Relocation, Protection, Sharing, Logical organization, and Physical…
- 573 Words
- 3 Pages
Good Essays -
It is argued however that the multi-store memory model oversimplifies the roles of the STM and LTM. Atkinson and Shiffren also failed to acknowledge the interaction between stores something which Baddeley and Hitch (1974) dealt with…
- 2049 Words
- 9 Pages
Better Essays -
that every process gets the memory it needs, and that no application can access memory in…
- 1256 Words
- 5 Pages
Better Essays -
For any operating system to function properly, one of the vital tasks it must be able to do is manage memory. When a program runs on a computer, it first must be loaded into memory before it can execute. There are five different requirements memory management must satisfy in order to execute the program so it runs without errors or corruption. These requirements are relocation, protection, sharing, logical organization, and physical organization.…
- 730 Words
- 3 Pages
Good Essays -
Various memory models were created to try to provide a visual picture of how exactly our memory works. They show the individual parts of the memory, which then go on to create the whole system. They also attempt to tell us what each of the parts do, alone, and how they work together. Multi-store…
- 841 Words
- 4 Pages
Good Essays -
Several methods have been devised that increase the effectiveness of memory management. Virtual memory systems separate the memory addresses used by a process from actual physical addresses, allowing separation of processes and increasing the effectively available amount of RAM using paging or swapping to secondary storage. The quality of the virtual memory manager can have an extensive effect on overall system performanc…
- 326 Words
- 2 Pages
Satisfactory Essays -
The Mac OS X Panther operation system has met with both technical and commercial success. Since the debut of Mac OS X in 2001, its features have continued to improve. The initial system Mac OS X 10.1 was originally shipped in September 2001 and was referred to as Puma; Jaguar, version 10.2, was shipped in August 2002, and Panther, the current version, was shipped in October 2003. The focus of this paper is on the key technologies that have made Mac OS X Panther a technical success such as CPU scheduling, symmetric multiprocessing, memory protection, and virtual memory; we begin with an overview of the MAC OS X operating system.…
- 5230 Words
- 21 Pages
Powerful Essays -
directly put into their assigned memory locations. After completion of assembly process, assign starting address of the program to the location counter. The typical example…
- 12327 Words
- 50 Pages
Good Essays -
After running the above program, what is the content of memory location $2100 and $2101? Completely explain your answer!…
- 694 Words
- 3 Pages
Satisfactory Essays -
discusses the issues that arise due to weakening memory consistency. We are especially interested in the…
- 6736 Words
- 27 Pages
Powerful Essays -
Protection consists to protect the process against interference, and malicious intentions from other process intentionally or by accident. Also, other processes should not have access to reference memory locations in any process without permission. A user process does not have access to any segment of the operating system. Luckily, the mechanisms that support relocation also hold up the protection requirement. Sharing consists of any security system needs to allow multiples processes to have access to the same segment of the main memory. The memory management system needs to allow restricted access to shared segments of the memory without compromising necessary security.…
- 683 Words
- 2 Pages
Good Essays