Virtual Memory
A virtual memory is a technique that allows the execution of process that may not be completely in memory. One major advantage of this scheme is that programs can be larger thanRead More…
A virtual memory is a technique that allows the execution of process that may not be completely in memory. One major advantage of this scheme is that programs can be larger thanRead More…
In my previous post, I had discussed about how Paging scheme can be helpful to minimize the amount of fragmentation. In this post I will continue my discussion with segmentation scheme asRead More…
In my previous post I had discussed about “Fragmentation” and how it can be solve. In this and later post, I will discuss some of the memory allocation techniques that can beRead More…
Fragmentation is the primary problem faced while allocating memory. In this article we will focus on Fragmentation and steps to minimize it. Fragmentation can be of two types: Internal Fragmentation External Fragmentation ExternalRead More…
In our previous article we had explained about memory protection and in this post we will discuss about memory allocation techniques used by the operating system. This article deals with contiguous memoryRead More…
Memory protection is required to ensure that different processes do not mix with each other’s code or data. Every memory address used by a process should be first checked to see whetherRead More…
A process that need to be executed must be present into the memory. When there is not enough physical memory available for any process or page to be allocated then the operatingRead More…
In our previous post we had discussed about different address binding schemes. In this post we will discuss about logical and physical address and address spaces and how operating system deal withRead More…
In previous post, we had discussed about Interrupt Mechanism performed by operating system. In this post we will look at different address binding schemes used by operating system to generate and manageRead More…
The CPU hardware has a wire called Interrupt request line that CPU checks after executing every instruction. When the CPU detects that a device controller has pass a signal on interrupt requestRead More…