Memory Management Pos355

Submitted by: Submitted by

Views: 87

Words: 722

Pages: 3

Category: Science and Technology

Date Submitted: 04/21/2014 06:06 PM

Report This Essay

Memory Management

Memory within the users’ computer is divided into parts that include the operating system and the task currently being done. While the operating part of the memory is sub divided into the resident monitor and the kernel, the multiple tasks being processes is also divided. In order to divide memory for this task, the operating system will assign the memory for the user (Stallings, 2012). The operating system task, when dividing memory is called memory management. In this paper, the requirements of an operating system in order to have memory management and a more in depth information about memory management will be discussed (Stallings, 2012).

The main task of memory management is to process and organize memory for the processor. It is given the task to assign portions of the memory called blocks to multiple programs in order for them to run and the organization is meant to improve system performance (Princeton, 2012). The task is difficult because each memory block must be assigned properly or system performance will slow down. In order to have memory management sets of requirements are given and according to Stallings (2012), “Relocation, Protection, Sharing, Logical organization and Physical organization.”

One of the requirements for memory management is relocation. Blocks of memory are located in different location when they are stored; this happens because when you use a program and it is put back in the memory, it will not always be put back in the same location (Rouse, 2012). Another set of memory blocks might be there where it used to be. Memory management is now assigned to the task of relocating the memory blocks to other parts. Memory management is also in charge of memorizing the location of this memory in order to find it once again (Stallings, 2012).

Another requirement is Protection; what is it? To prevent one set of code or another program to interfere with another set of code, protection is done. This is when two processes...