Preview

Memory Management

Satisfactory Essays
Open Document
Open Document
341 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Memory Management
Memory Management
POS/355

Sheenah S Concepcion

July 10, 2013

Scott Beckstrand

Memory management is the process of managing computer memory. The memory management subsystem of the operating system carries out this task. Since the beginning of computing, there has always existed the need for more memory than the existing physical memory in the system. Both Windows and Linux are operating systems. These operating systems perform basic tasks, such as tracking of directories and files on the disk, sending output to the screen for display, recognizing input from the keyboard and controlling peripheral devices such as drives and printers. The following are the differences in memory management between Linux and Windows (Godbole & Kahate, 2011).

Windows

Windows uses a data structure in which it keeps data in a tree form instead of a linked list. The nodes of the tree are known as virtual address descriptors (VAD). The VAD denotes a range of address that has the same protection bounds and commit state information. The VAD marks each node as committed, reserved, or free. Committed nodes are the ones, which are in use that is, code or data has been mapped onto them. Nodes that are unused are marked reserved and are not available for mapping until the removal of reservation (Godbole & Kahate, 2011).

Linux

Linux maintains a linked list of virtual memory area structures. These structures represent continuous memory areas, which have the same protection parameters. One searches this list whenever a page is to be found that consists of a given location. The structure records addresses it is mapping onto protection mode, and it records whether the area is private or public. If the number of entries grows greater than 32 it is converted into a tree.

In conclusion, the two systems have a lot in common and few differences technically speaking. Although, they were developed in a



References: Godbole, A. S., & Kahate, A. (2011). Operating systems. New Delhi: Tata McGraw-Hill

You May Also Find These Documents Helpful

  • Good Essays

    The operating system occupies low memory, starting with memory address 0. Directly afterwards is system control information, then the various resident operating system…

    • 7085 Words
    • 29 Pages
    Good Essays
  • Satisfactory Essays

    SD1230 Lab 1

    • 239 Words
    • 2 Pages

    1. Why is virtual memory addresses used for applications? – So it can have its own address space on the memory.…

    • 239 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Pos355 Project

    • 870 Words
    • 4 Pages

    Presentation for Memory Management (Linux, MAC, Windows) Presentation for Process Management (Linux, MAC, Windows) Presentation for File Management (Linux, MAC, Windows) Presentation for Security Management (Linux, MAC, Windows Team D review WK 4 Assignment. Team D submit Rough Draft of Final Power Point Presentation. Proceed? Finalize Linux, Mac, Windows Presentation Finalize Linux, MAC, Windows Paper Team D…

    • 870 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    2. For direct-mapped cache, a main memory address is viewed as consisting of three fields. List and define the three fields.…

    • 1721 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    POS355 Week 1 Individual

    • 574 Words
    • 2 Pages

    While in the hardware, memory management includes elements that store data such as random access memory chips, and memory caches. In the operating system, memory management involves the distribution of precise memory blocks to programs as the user requests adjustments. While at the application and program level, memory management ensures the availability of sufficient memory for the objects and data structures at all times for each program that is running.…

    • 574 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Protection is the next requirement to be satisfied. Protection deals with security against unwanted interference by other processes. Programs from other process should not be able to access memory locations in a process for reading or writing Purposes without permission. The processor must be able to abort such instructions at the point of execution.…

    • 573 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Comp 220

    • 1463 Words
    • 6 Pages

    Pointers also have the requirement that the pointer type must be of the same data type as the variable, or the data that it points to or holds the address of. The power of pointers also hints at the potential complexity of their use, which is why this lab is focused almost entirely on several different aspects and uses of pointers. The lab also introduces pointer arrays and pointers to pointers.…

    • 1463 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    1. Where does Linux temporarily stores programs and data when it does not have enough RAM to hold all the information it is processing?…

    • 1070 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1&2 Discussion

    • 379 Words
    • 2 Pages

    Access control is typically achieved by reserving a collection of bits within the general “Flag Register” to indicate the current “access control level”. Certain instructions are restricted so that they are only legal if the “access control level” is at least some minimum value; otherwise the instruction generates an “illegal operation” interrupt.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Random-access-memory (RAM) is a very important specification of the computer. By ensuring you have enough RAM, the faster your system processes, you can store more data, and allow more programs to run at the same time. As the OS allows the different task to complete for the processor, the RAM is used as temp storage, when the processor no longer needs them the OS clears it. Virtual memory is the hard drive space borrowed to use if there isn’t enough…

    • 580 Words
    • 3 Pages
    Good Essays
  • Good Essays

    they do hold many differences which will be outline in the paragraphs below to the best of my…

    • 786 Words
    • 4 Pages
    Good Essays
  • Good Essays

    For any operating system to function properly, one of the vital tasks it must be able to do is manage memory. When a program runs on a computer, it first must be loaded into memory before it can execute. There are five different requirements memory management must satisfy in order to execute the program so it runs without errors or corruption. These requirements are relocation, protection, sharing, logical organization, and physical organization.…

    • 730 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Parallel Arrays

    • 427 Words
    • 2 Pages

    Key in saving wasted memory. The nodes of a linked data structure can also be moved individually to different locations without affecting the logical connections between them, unlike arrays. With due care, a process can add or delete nodes to one part of a data structure even while other processes are working on other parts. On the other hand, access to any particular node in a linked data structure requires following a chain of references that stored in it. If the structure has n nodes, and each node contains at most b links, there will be some nodes that cannot be reached in less than log b n steps. For many structures, some nodes may require worst case up to n -1 steps.…

    • 427 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Memory with its parent company in the US is currently experiencing a poor record of meeting…

    • 6643 Words
    • 42 Pages
    Powerful Essays
  • Good Essays

    Linked list

    • 1308 Words
    • 6 Pages

    • Unary operator sizeof is used to determine the size in bytes of any data…

    • 1308 Words
    • 6 Pages
    Good Essays

Related Topics