Top-Rated Free Essay
Preview

Memory Management

Good Essays
513 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Memory Management
Memory Management Requirements
Raven
POS 355
July 10, 2013
Matt Bestrand

Memory Management Requirements
With memory management there are certain requirements that it is intended to satisfy. Those requirements are relocation, protection, sharing, logical organization, and physical organization. As an essential part of memory management these areas will be discussed below.
Relocation
The importance of relocation according to Stallings (2012), is to maximize utilization of the processor by swapping active process in and out of memory. By doing this it provides many processes that are ready to use. By making the process accessible it means that it will not always be placed in the same area of memory. The operating system provides an address a process can be pulled from the last location it was placed.
Protection
Interference from other processes can cause irritation and should be protected against. Thus Stallings (2012) states that programs need permission to read or write. This is checked at run time by the processor to ensure that the program refers only to the memory for that process. It is protected by the processor and not the software, because it would be too time consuming for the Operating System to check and make sure every program has access to all the information it is trying to refer to.
Sharing
Several processes should have access to the same portion of protected main memory. By sharing data it prevents processes from having their own set of the same main memory. This sharing frees up memory space for other data.

Logical Organization
Segmentation is recommended by Stallings (2012) for logical organization. It gives three advantages. The first is sharing on a module level, which allows the user to specify sharing desired. The second advantage is that it allows for different degrees of protection that can be assigned to modules. Lastly, it allows a module to be written and compiled independently.
Physical Organization
Stallings (2012) recommends that the physical organization be the operating systems responsibility. This will prevent two problems from occurring. Overlaying which is when a programmer wastes their time by putting programs and data in the same region of memory. The second concern is when there is a multi-programming environment and the programmer does not know where the space will be or how much memory space is available.
Conclusion
Relocation, protection, sharing, local organization, and physical organization are essential to keep processes running smooth, which helps in not ticking off the user. Relocation because it allows a large pool of process to be used, protection keeps away unwanted interferences, sharing data to keep processes from having their own sets of the same data which take up memory, logical organization to keep things streamlined, and physical organization performed by an operating system to avoid wasted time and memory space. The memory management requirements, when made-the-most-of, will make users very happy.

References
Stallings, W. (2012). Operating Systems: Internals and Design Principles (7th ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/TOC.aspx?
assetid=d84fecab-fb01-41d1-b44d-9f6606d84c8b&assetmetaid=504ab140-8df8-4d00-8b87-727eed781592.

References: Stallings, W. (2012). Operating Systems: Internals and Design Principles (7th ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/TOC.aspx? assetid=d84fecab-fb01-41d1-b44d-9f6606d84c8b&assetmetaid=504ab140-8df8-4d00-8b87-727eed781592.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    SD1230 Lab 1

    • 239 Words
    • 2 Pages

    1. Why is virtual memory addresses used for applications? – So it can have its own address space on the memory.…

    • 239 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. What UID and PID have the highest amount of physical memory that a process has used and is not swapped out? Show all processes and full output.…

    • 537 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Stallings, W. ((2015)). Operating Systems: Internal and Design Principles, 8e. Retrieved from The University of Phoenix eBook Collection Database.…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    POS355 Week 1 Individual

    • 574 Words
    • 2 Pages

    There are several items that are pertinent to memory management such as, basic hardware, the binding of symbolic memory addresses to definite physical addresses and the difference between logical and physical addresses. The most important task that memory management executes is the distribution and collection of memory…

    • 574 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    stallings, W. (2012). operating systems internal and design principles (7th ed.). Upper Saddle River, NJ: prentice hall.…

    • 608 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The multi-store model of memory is an theoretical explanation of how memory processes work. It was the first extensively accepted model of how memory works, it is however not the definitive explanation of memory. The model was proposed by Atkinson and Shiffrin in 1968.…

    • 541 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Silberschatz, A., Galvin, P. B., & Gagne, G. (2009). Operating system concepts: Update (8th ed.). Hoboken, NJ: Wiley & Sons.…

    • 669 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It250 Exam Review

    • 856 Words
    • 4 Pages

    5. (Page 34)Where are programs and data temporarily stored when there is not enough RAM to hold all the information it is processing? Swap file…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    Another reason a person or person(s) would want to access a computer systems RAM without…

    • 820 Words
    • 2 Pages
    Good Essays
  • Better Essays

    IT 600 Module One Lecture

    • 1256 Words
    • 5 Pages

    that every process gets the memory it needs, and that no application can access memory in…

    • 1256 Words
    • 5 Pages
    Better Essays
  • Good Essays

    For any operating system to function properly, one of the vital tasks it must be able to do is manage memory. When a program runs on a computer, it first must be loaded into memory before it can execute. There are five different requirements memory management must satisfy in order to execute the program so it runs without errors or corruption. These requirements are relocation, protection, sharing, logical organization, and physical organization.…

    • 730 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Fork System Call

    • 258 Words
    • 2 Pages

    Exp#2 fork system call Aim To create a new child process using fork system call. Algorithm 1. Declare a variable x to be shared by both child and parent. 2. Create a child process using fork system call.…

    • 258 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Ipc System

    • 2267 Words
    • 10 Pages

    Several IPC mechanisms are available for POSIX systems, including shared memory and message passing. Here, we explore the POSIX API for shared memory. A process must first create a shared-memory segment using the shmget() system call (shmget() is derived from SHared Memory GET). The following example illustrates the use of shmget(): segment id = shmget(IPC PRIVATE, size, S IRUSR | S IWUSR); This first parameter specifies the key (or identifier) of the shared-memory segment. If this is set to IPC PRIVATE, a newshared-memory segment is created. The second parameter specifies the size (in bytes) of the shared-memory segment. Finally, the third parameter identifies the mode, which indicates how the shared-memory segment is to be used—that is, for reading, writing, or both. By setting the mode to S IRUSR | S IWUSR, we are indicating that the owner may read or write to the shared-memory segment. A successful call to shmget() returns an integer identifier for the shared-memory segment. Other processes that want to use this region of shared memory must specify this identifier. Processes that wish to access a shared-memory segment must attach it to their address space using the shmat() (SHared Memory ATtach) system call. The call to shmat() expects three parameters as well. The first is the integer identifier of the shared-memory segment being attached, and the second is a pointer location in memory indicating where the shared memory will be…

    • 2267 Words
    • 10 Pages
    Better Essays
  • Satisfactory Essays

    Process Synchronization

    • 778 Words
    • 4 Pages

    consumer-producer problem that fills all the buffers. We can do so by having an integer count that keeps track of the number of full buffers. Initially, count is set to 0. It is incremented by the producer after it produces a new buffer and is decremented by the consumer after it consumes a buffer.…

    • 778 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    memory layout

    • 3957 Words
    • 16 Pages

    Usually, the text segment is sharable so that only a single copy needs to be in memory for frequently executed programs, such as text editors, the C compiler, the shells, and so on. Also, the text segment is often read-only, to prevent a program from accidentally modifying its instructions.…

    • 3957 Words
    • 16 Pages
    Powerful Essays