Top-Rated Free Essay
Preview

Memory Management Requirements

Good Essays
392 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Memory Management Requirements
Memory Management Requirements
POS 355

Memory Management Requirements
The following paper will discuss the memory requirements in a computer system. Proper amount of memory must be available to minimize the amount of processor idle time while input output devices are preparing to respond.
According to Stallings (2012) the requirements of memory management must satisfy the relocation, protection sharing, logical organization, and physical organization.
In order to accommodate multiple processor events, addresses in the main memory are swapped out and relocated to different address in the main memory. This type of event is called relocating. According to Stallings (2012), the operating system requires knowledge of “the location of process control information and of the execution stack, as well as the entry point to begin execution of the program for this process (Relocation, p. 307).
Memory protection requirements are to be satisfied by the hardware rather than the operating system. The software is unable to anticipate all of the references made by the programs. Read and write restrictions are made to control this area.
Sharing occurs when many different process need to access same areas of the main memory at the same time. Memory management allows this to be done without compromising the integrity of any of the data.
Logical organization of the main memory is done in a linear fashion making it less confusing when programs must access it. Since programs are usually created in modules, they must be organized for execution in order for the system to benefit from their creation. If organized properly, the programs can be executed simultaneously and everybody can be happy.
Main memory and secondary memory are the areas involved in the physical organization of this area. The processor must be located in one specific area in order to access the registers of the system as opposed to the data discs. This set up will ensure the smooth flow of data in the system.
In conclusion, all components of a system are set up in a way to ensure the smooth efficient flow of data, limiting the amount of idle time as well as to ensure the minimal of corrupt data. Memory management requirements are put in place to ensure that all system requirements are met and idle time is eliminated.

References
Stallings, W. (2012). Operating systems: Internals and design principles (7th ed.). Boston, MA: Prentice Hall.

References: Stallings, W. (2012). Operating systems: Internals and design principles (7th ed.). Boston, MA: Prentice Hall.

You May Also Find These Documents Helpful

  • Good Essays

    Some OS routines directly support application programs as they run and thus must be resident. Other transient routines are stored on disk and read into memory only when needed. Fixed-length partitions can also be used to allocate the set amount of memory that a particular program needs to run. Under dynamic memory management, the transient area is treated as a pool of unstructured free space. When the system decides to load a particular program, a region of memory just sufficient to hold the program is allocated from the pool. Using segmentation, programs are divided into independently addressed segments and stored in noncontiguous memory. Paging breaks a program into fixed-length pages.…

    • 7085 Words
    • 29 Pages
    Good Essays
  • Satisfactory Essays

    SD1230 Lab 1

    • 239 Words
    • 2 Pages

    1. Why is virtual memory addresses used for applications? – So it can have its own address space on the memory.…

    • 239 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    POS355 Week 1 Individual

    • 574 Words
    • 2 Pages

    While in the hardware, memory management includes elements that store data such as random access memory chips, and memory caches. In the operating system, memory management involves the distribution of precise memory blocks to programs as the user requests adjustments. While at the application and program level, memory management ensures the availability of sufficient memory for the objects and data structures at all times for each program that is running.…

    • 574 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Week 5 Pos 355

    • 2010 Words
    • 9 Pages

    Memory management is an important part of an operating. The UNIX/Linux OS use numerous intricate algorithms for memory management which will permit the system to…

    • 2010 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Memory management is an important characteristic of an operating system. Main memory is divided into two parts one for resident programs, and the other for the program currently in use. The user part must be subdivided to accommodate multiple processes (Stallings, 2012). When a few processes are in the memory then much of the time all of the processes will have to wait for input /output and the processor will be idle. According to Stallings (2012),. The requirements that memory management is supposed to satisfy are Relocation, Protection, Sharing, Logical organization, and Physical…

    • 573 Words
    • 3 Pages
    Good Essays
  • Better Essays

    It is argued however that the multi-store memory model oversimplifies the roles of the STM and LTM. Atkinson and Shiffren also failed to acknowledge the interaction between stores something which Baddeley and Hitch (1974) dealt with…

    • 2049 Words
    • 9 Pages
    Better Essays
  • Better Essays

    IT 600 Module One Lecture

    • 1256 Words
    • 5 Pages

    that every process gets the memory it needs, and that no application can access memory in…

    • 1256 Words
    • 5 Pages
    Better Essays
  • Good Essays

    For any operating system to function properly, one of the vital tasks it must be able to do is manage memory. When a program runs on a computer, it first must be loaded into memory before it can execute. There are five different requirements memory management must satisfy in order to execute the program so it runs without errors or corruption. These requirements are relocation, protection, sharing, logical organization, and physical organization.…

    • 730 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Multi Store Model

    • 841 Words
    • 4 Pages

    Various memory models were created to try to provide a visual picture of how exactly our memory works. They show the individual parts of the memory, which then go on to create the whole system. They also attempt to tell us what each of the parts do, alone, and how they work together. Multi-store…

    • 841 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Assignment 1,Section I

    • 326 Words
    • 2 Pages

    Several methods have been devised that increase the effectiveness of memory management. Virtual memory systems separate the memory addresses used by a process from actual physical addresses, allowing separation of processes and increasing the effectively available amount of RAM using paging or swapping to secondary storage. The quality of the virtual memory manager can have an extensive effect on overall system performanc…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mac Os X

    • 5230 Words
    • 21 Pages

    The Mac OS X Panther operation system has met with both technical and commercial success. Since the debut of Mac OS X in 2001, its features have continued to improve. The initial system Mac OS X 10.1 was originally shipped in September 2001 and was referred to as Puma; Jaguar, version 10.2, was shipped in August 2002, and Panther, the current version, was shipped in October 2003. The focus of this paper is on the key technologies that have made Mac OS X Panther a technical success such as CPU scheduling, symmetric multiprocessing, memory protection, and virtual memory; we begin with an overview of the MAC OS X operating system.…

    • 5230 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Linker Loader

    • 12327 Words
    • 50 Pages

    directly put into their assigned memory locations. After completion of assembly process, assign starting address of the program to the location counter. The typical example…

    • 12327 Words
    • 50 Pages
    Good Essays
  • Satisfactory Essays

    After running the above program, what is the content of memory location $2100 and $2101? Completely explain your answer!…

    • 694 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Consistency Model

    • 6736 Words
    • 27 Pages

    discusses the issues that arise due to weakening memory consistency. We are especially interested in the…

    • 6736 Words
    • 27 Pages
    Powerful Essays
  • Good Essays

    Protection consists to protect the process against interference, and malicious intentions from other process intentionally or by accident. Also, other processes should not have access to reference memory locations in any process without permission. A user process does not have access to any segment of the operating system. Luckily, the mechanisms that support relocation also hold up the protection requirement. Sharing consists of any security system needs to allow multiples processes to have access to the same segment of the main memory. The memory management system needs to allow restricted access to shared segments of the memory without compromising necessary security.…

    • 683 Words
    • 2 Pages
    Good Essays