SlideShare a Scribd company logo
1
Memory Management
Chapter 4
4.1 Basic memory management
4.2 Swapping
4.3 Virtual memory
4.4 Page replacement algorithms
4.5 Modeling page replacement algorithms
4.6 Design issues for paging systems
4.7 Implementation issues
4.8 Segmentation
2
Memory Management
• Ideally programmers want memory that is
– large
– fast
– non volatile
• Memory hierarchy
– small amount of fast, expensive memory – cache
– some medium-speed, medium price main memory
– gigabytes of slow, cheap disk storage
• Memory manager handles the memory hierarchy
3
Basic Memory Management
Monoprogramming without Swapping or Paging
Three simple ways of organizing memory
- an operating system with one user process
4
Multiprogramming with Fixed Partitions
• Fixed memory partitions
– separate input queues for each partition
– single input queue
5
Modeling Multiprogramming
CPU utilization as a function of number of processes in memory
Degree of multiprogramming
6
Analysis of Multiprogramming System
Performance
• Arrival and work requirements of 4 jobs
• CPU utilization for 1 – 4 jobs with 80% I/O wait
• Sequence of events as jobs arrive and finish
– note numbers show amout of CPU time jobs get in each interval
7
Relocation and Protection
• Cannot be sure where program will be loaded in memory
– address locations of variables, code routines cannot be absolute
– must keep a program out of other processes’ partitions
• Use base and limit values
– address locations added to base value to map to physical addr
– address locations larger than limit value is an error
8
Swapping (1)
Memory allocation changes as
– processes come into memory
– leave memory
Shaded regions are unused memory
9
Swapping (2)
• Allocating space for growing data segment
• Allocating space for growing stack & data segment
10
Memory Management with Bit Maps
• Part of memory with 5 processes, 3 holes
– tick marks show allocation units
– shaded regions are free
• Corresponding bit map
• Same information as a list
11
Memory Management with Linked Lists
Four neighbor combinations for the terminating process X
12
Virtual Memory
Paging (1)
The position and function of the MMU
13
Paging (2)
The relation between
virtual addresses
and physical
memory addres-
ses given by
page table
14
Page Tables (1)
Internal operation of MMU with 16 4 KB pages
15
Page Tables (2)
• 32 bit address with 2 page table fields
• Two-level page tables
Second-level page tables
Top-level
page table
16
Page Tables (3)
Typical page table entry
17
TLBs – Translation Lookaside Buffers
A TLB to speed up paging
18
Inverted Page Tables
Comparison of a traditional page table with an inverted page table
19
Page Replacement Algorithms
• Page fault forces choice
– which page must be removed
– make room for incoming page
• Modified page must first be saved
– unmodified just overwritten
• Better not to choose an often used page
– will probably need to be brought back in soon
20
Optimal Page Replacement Algorithm
• Replace page needed at the farthest point in future
– Optimal but unrealizable
• Estimate by …
– logging page use on previous runs of process
– although this is impractical
21
Not Recently Used Page Replacement Algorithm
• Each page has Reference bit, Modified bit
– bits are set when page is referenced, modified
• Pages are classified
1. not referenced, not modified
2. not referenced, modified
3. referenced, not modified
4. referenced, modified
• NRU removes page at random
– from lowest numbered non empty class
22
FIFO Page Replacement Algorithm
• Maintain a linked list of all pages
– in order they came into memory
• Page at beginning of list replaced
• Disadvantage
– page in memory the longest may be often used
23
Second Chance Page Replacement Algorithm
• Operation of a second chance
– pages sorted in FIFO order
– Page list if fault occurs at time 20, A has R bit set
(numbers above pages are loading times)
24
The Clock Page Replacement Algorithm
25
Least Recently Used (LRU)
• Assume pages used recently will used again soon
– throw out page that has been unused for longest time
• Must keep a linked list of pages
– most recently used at front, least at rear
– update this list every memory reference !!
• Alternatively keep counter in each page table entry
– choose page with lowest value counter
– periodically zero the counter
26
Simulating LRU in Software (1)
LRU using a matrix – pages referenced in order
0,1,2,3,2,1,0,3,2,3
27
Simulating LRU in Software (2)
• The aging algorithm simulates LRU in software
• Note 6 pages for 5 clock ticks, (a) – (e)
28
The Working Set Page Replacement Algorithm (1)
• The working set is the set of pages used by the k
most recent memory references
• w(k,t) is the size of the working set at time, t
29
The Working Set Page Replacement Algorithm (2)
The working set algorithm
30
The WSClock Page Replacement Algorithm
Operation of the WSClock algorithm
31
Review of Page Replacement Algorithms
32
Modeling Page Replacement Algorithms
Belady's Anomaly
• FIFO with 3 page frames
• FIFO with 4 page frames
• P's show which page references show page faults
33
Stack Algorithms
State of memory array, M, after each item in
reference string is processed
7 4 6 5
34
The Distance String
Probability density functions for two
hypothetical distance strings
35
The Distance String
• Computation of page fault rate from distance string
– the C vector
– the F vector
36
Design Issues for Paging Systems
Local versus Global Allocation Policies (1)
• Original configuration
• Local page replacement
• Global page replacement
37
Local versus Global Allocation Policies (2)
Page fault rate as a function of the number of
page frames assigned
38
Load Control
• Despite good designs, system may still thrash
• When PFF algorithm indicates
– some processes need more memory
– but no processes need less
• Solution :
Reduce number of processes competing for memory
– swap one or more to disk, divide up pages they held
– reconsider degree of multiprogramming
39
Page Size (1)
Small page size
• Advantages
– less internal fragmentation
– better fit for various data structures, code sections
– less unused program in memory
• Disadvantages
– programs need many pages, larger page tables
40
Page Size (2)
• Overhead due to page table and internal
fragmentation
• Where
– s = average process size in bytes
– p = page size in bytes
– e = page entry
2
s e p
overhead
p
⋅
= +
page table space
internal
fragmentation
Optimized when
2p se=
41
Separate Instruction and Data Spaces
• One address space
• Separate I and D spaces
42
Shared Pages
Two processes sharing same program sharing its page table
43
Cleaning Policy
• Need for a background process, paging daemon
– periodically inspects state of memory
• When too few frames are free
– selects pages to evict using a replacement algorithm
• It can use same circular list (clock)
– as regular page replacement algorithmbut with diff ptr
44
Implementation Issues
Operating System Involvement with Paging
Four times when OS involved with paging
1. Process creation
− determine program size
− create page table
1. Process execution
− MMU reset for new process
− TLB flushed
1. Page fault time
− determine virtual address causing fault
− swap target page out, needed page in
1. Process termination time
− release page table, pages
45
Page Fault Handling (1)
1. Hardware traps to kernel
2. General registers saved
3. OS determines which virtual page needed
4. OS checks validity of address, seeks page frame
5. If selected frame is dirty, write it to disk
46
Page Fault Handling (2)

OS brings schedules new page in from disk

Page tables updated

Faulting instruction backed up to when it began

Faulting process scheduled

Registers restored

Program continues
47
Instruction Backup
An instruction causing a page fault
48
Locking Pages in Memory
• Virtual memory and I/O occasionally interact
• Proc issues call for read from device into buffer
– while waiting for I/O, another processes starts up
– has a page fault
– buffer for the first proc may be chosen to be paged out
• Need to specify some pages locked
– exempted from being target pages
49
Backing Store
(a) Paging to static swap area
(b) Backing up pages dynamically
50
Separation of Policy and Mechanism
Page fault handling with an external pager
51
Segmentation (1)
• One-dimensional address space with growing tables
• One table may bump into another
52
Segmentation (2)
Allows each table to grow or shrink, independently
53
Segmentation (3)
Comparison of paging and segmentation
54
Implementation of Pure Segmentation
(a)-(d) Development of checkerboarding
(e) Removal of the checkerboarding by compaction
55
Segmentation with Paging: MULTICS (1)
• Descriptor segment points to page tables
• Segment descriptor – numbers are field lengths
56
Segmentation with Paging: MULTICS (2)
A 34-bit MULTICS virtual address
57
Segmentation with Paging: MULTICS (3)
Conversion of a 2-part MULTICS address into a main memory address
58
Segmentation with Paging: MULTICS (4)
• Simplified version of the MULTICS TLB
• Existence of 2 page sizes makes actual TLB more complicated
59
Segmentation with Paging: Pentium (1)
A Pentium selector
60
Segmentation with Paging: Pentium (2)
• Pentium code segment descriptor
• Data segments differ slightly
61
Segmentation with Paging: Pentium (3)
Conversion of a (selector, offset) pair to a linear address
62
Segmentation with Paging: Pentium (4)
Mapping of a linear address onto a physical address
63
Segmentation with Paging: Pentium (5)
Protection on the Pentium
Level
Ad

Recommended

Memory management
Memory management
CHANDERPRABHU JAIN COLLEGE OF HIGHER STUDIES & SCHOOL OF LAW
 
17. Recovery System in DBMS
17. Recovery System in DBMS
koolkampus
 
Computer architecture control unit
Computer architecture control unit
Mazin Alwaaly
 
Disk scheduling
Disk scheduling
J.T.A.JONES
 
File Allocation Methods.ppt
File Allocation Methods.ppt
BharathiLakshmiAAssi
 
Kernel I/O subsystem
Kernel I/O subsystem
AtiKa Bhatti
 
Chapter 10 - File System Interface
Chapter 10 - File System Interface
Wayne Jones Jnr
 
Disk structure
Disk structure
Shareb Ismaeel
 
Contiguous Memory Allocation.ppt
Contiguous Memory Allocation.ppt
infomerlin
 
System calls
System calls
Bernard Senam
 
contiguous memory allocation.pptx
contiguous memory allocation.pptx
Rajapriya82
 
Conditional branches
Conditional branches
Dilip Mathuria
 
Interrupts
Interrupts
guest2e9811e
 
Paging and segmentation
Paging and segmentation
Piyush Rochwani
 
Memory Management in OS
Memory Management in OS
vampugani
 
Unix Memory Management - Operating Systems
Unix Memory Management - Operating Systems
Drishti Bhalla
 
Operating system memory management
Operating system memory management
rprajat007
 
Chapter 11 - File System Implementation
Chapter 11 - File System Implementation
Wayne Jones Jnr
 
System call
System call
Sumant Diwakar
 
Ch02 early system memory management
Ch02 early system memory management
Jacob Cadeliña
 
External memory - Computer Architecture
External memory - Computer Architecture
Bretz Harllynne Moltio
 
Memory mapping
Memory mapping
SnehalataAgasti
 
12 processor structure and function
12 processor structure and function
Sher Shah Merkhel
 
File system structure
File system structure
sangrampatil81
 
Memory Organization
Memory Organization
Kamal Acharya
 
Scheduling algorithms
Scheduling algorithms
Chankey Pathak
 
Memory Hierarchy
Memory Hierarchy
chauhankapil
 
Interrupt
Interrupt
Siddique Ibrahim
 
Memory Management | Computer Science
Memory Management | Computer Science
Transweb Global Inc
 
Memory management
Memory management
Rajni Sirohi
 

More Related Content

What's hot (20)

Contiguous Memory Allocation.ppt
Contiguous Memory Allocation.ppt
infomerlin
 
System calls
System calls
Bernard Senam
 
contiguous memory allocation.pptx
contiguous memory allocation.pptx
Rajapriya82
 
Conditional branches
Conditional branches
Dilip Mathuria
 
Interrupts
Interrupts
guest2e9811e
 
Paging and segmentation
Paging and segmentation
Piyush Rochwani
 
Memory Management in OS
Memory Management in OS
vampugani
 
Unix Memory Management - Operating Systems
Unix Memory Management - Operating Systems
Drishti Bhalla
 
Operating system memory management
Operating system memory management
rprajat007
 
Chapter 11 - File System Implementation
Chapter 11 - File System Implementation
Wayne Jones Jnr
 
System call
System call
Sumant Diwakar
 
Ch02 early system memory management
Ch02 early system memory management
Jacob Cadeliña
 
External memory - Computer Architecture
External memory - Computer Architecture
Bretz Harllynne Moltio
 
Memory mapping
Memory mapping
SnehalataAgasti
 
12 processor structure and function
12 processor structure and function
Sher Shah Merkhel
 
File system structure
File system structure
sangrampatil81
 
Memory Organization
Memory Organization
Kamal Acharya
 
Scheduling algorithms
Scheduling algorithms
Chankey Pathak
 
Memory Hierarchy
Memory Hierarchy
chauhankapil
 
Interrupt
Interrupt
Siddique Ibrahim
 
Contiguous Memory Allocation.ppt
Contiguous Memory Allocation.ppt
infomerlin
 
contiguous memory allocation.pptx
contiguous memory allocation.pptx
Rajapriya82
 
Memory Management in OS
Memory Management in OS
vampugani
 
Unix Memory Management - Operating Systems
Unix Memory Management - Operating Systems
Drishti Bhalla
 
Operating system memory management
Operating system memory management
rprajat007
 
Chapter 11 - File System Implementation
Chapter 11 - File System Implementation
Wayne Jones Jnr
 
Ch02 early system memory management
Ch02 early system memory management
Jacob Cadeliña
 
External memory - Computer Architecture
External memory - Computer Architecture
Bretz Harllynne Moltio
 
12 processor structure and function
12 processor structure and function
Sher Shah Merkhel
 

Viewers also liked (20)

Memory Management | Computer Science
Memory Management | Computer Science
Transweb Global Inc
 
Memory management
Memory management
Rajni Sirohi
 
Memory management
Memory management
Vishal Singh
 
Storage management
Storage management
Atul Sharma
 
Design and development of autotransformer motor starter for induced draft fan...
Design and development of autotransformer motor starter for induced draft fan...
Alexander Decker
 
Virtual memory
Virtual memory
Ishwar Dhumal
 
Pentium
Pentium
Akshay Nagpurkar
 
Vm
Vm
Aparna Bhadran
 
Virtual memory
Virtual memory
aaina_katyal
 
computer memory ,., .
computer memory ,., .
santokh00700
 
8259 Programmable Interrupt Controller by vijay
8259 Programmable Interrupt Controller by vijay
Vijay Kumar
 
COMPUTER MEMORY
COMPUTER MEMORY
Elisha Kharel
 
Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...
Project Student
 
Computer Memory
Computer Memory
sumeshkumarsheoran
 
VIRTUAL MEMORY
VIRTUAL MEMORY
Kamran Ashraf
 
three phase induction machine starter
three phase induction machine starter
Aditya More
 
Chapter 9 - Virtual Memory
Chapter 9 - Virtual Memory
Wayne Jones Jnr
 
Operating Systems: Virtual Memory
Operating Systems: Virtual Memory
Damian T. Gordon
 
Motor starter
Motor starter
BHAGWAN PRASAD
 
Virtual memory
Virtual memory
Anuj Modi
 
Memory Management | Computer Science
Memory Management | Computer Science
Transweb Global Inc
 
Storage management
Storage management
Atul Sharma
 
Design and development of autotransformer motor starter for induced draft fan...
Design and development of autotransformer motor starter for induced draft fan...
Alexander Decker
 
computer memory ,., .
computer memory ,., .
santokh00700
 
8259 Programmable Interrupt Controller by vijay
8259 Programmable Interrupt Controller by vijay
Vijay Kumar
 
Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...
Project Student
 
three phase induction machine starter
three phase induction machine starter
Aditya More
 
Chapter 9 - Virtual Memory
Chapter 9 - Virtual Memory
Wayne Jones Jnr
 
Operating Systems: Virtual Memory
Operating Systems: Virtual Memory
Damian T. Gordon
 
Virtual memory
Virtual memory
Anuj Modi
 
Ad

Similar to Computer memory management (20)

chap.4.memory.manag.ppt
chap.4.memory.manag.ppt
amadayshwan
 
4 (1)
4 (1)
Mothi R
 
Chapter 04
Chapter 04
Google
 
Memory Management
Memory Management
Ramasubbu .P
 
Memory Management-Muhammad Ahmad.ppt
Memory Management-Muhammad Ahmad.ppt
AliyanAbbas1
 
Memory management
Memory management
Rasi123
 
Virtual Memory Management
Virtual Memory Management
Rahul Jamwal
 
Os unit 2
Os unit 2
Arnav Chowdhury
 
ikh311-06
ikh311-06
Anung Ariwibowo
 
Virtual memory Chapter 9 simple and easy
Virtual memory Chapter 9 simple and easy
1415lv54
 
08 virtual memory
08 virtual memory
Kamal Singh
 
memory allocation techniques in operating systems
memory allocation techniques in operating systems
Vivekananda Gn
 
CH09.pdf
CH09.pdf
ImranKhan880955
 
Distributed Operating System_3
Distributed Operating System_3
Dr Sandeep Kumar Poonia
 
Virtual Memory.pdf
Virtual Memory.pdf
SujanTimalsina5
 
OS_Ch10
OS_Ch10
Supriya Shrivastava
 
Ch10 OS
Ch10 OS
C.U
 
OSCh10
OSCh10
Joe Christensen
 
Demand paging
Demand paging
Trinity Dwarka
 
Paging +Algorithem+Segmentation+memory management
Paging +Algorithem+Segmentation+memory management
kazim Hussain
 
chap.4.memory.manag.ppt
chap.4.memory.manag.ppt
amadayshwan
 
Chapter 04
Chapter 04
Google
 
Memory Management-Muhammad Ahmad.ppt
Memory Management-Muhammad Ahmad.ppt
AliyanAbbas1
 
Memory management
Memory management
Rasi123
 
Virtual Memory Management
Virtual Memory Management
Rahul Jamwal
 
Virtual memory Chapter 9 simple and easy
Virtual memory Chapter 9 simple and easy
1415lv54
 
08 virtual memory
08 virtual memory
Kamal Singh
 
memory allocation techniques in operating systems
memory allocation techniques in operating systems
Vivekananda Gn
 
Ch10 OS
Ch10 OS
C.U
 
Paging +Algorithem+Segmentation+memory management
Paging +Algorithem+Segmentation+memory management
kazim Hussain
 
Ad

More from Kumar (20)

Graphics devices
Graphics devices
Kumar
 
Fill area algorithms
Fill area algorithms
Kumar
 
region-filling
region-filling
Kumar
 
Bresenham derivation
Bresenham derivation
Kumar
 
Bresenham circles and polygons derication
Bresenham circles and polygons derication
Kumar
 
Introductionto xslt
Introductionto xslt
Kumar
 
Extracting data from xml
Extracting data from xml
Kumar
 
Xml basics
Xml basics
Kumar
 
XML Schema
XML Schema
Kumar
 
Publishing xml
Publishing xml
Kumar
 
DTD
DTD
Kumar
 
Applying xml
Applying xml
Kumar
 
Introduction to XML
Introduction to XML
Kumar
 
How to deploy a j2ee application
How to deploy a j2ee application
Kumar
 
JNDI, JMS, JPA, XML
JNDI, JMS, JPA, XML
Kumar
 
EJB Fundmentals
EJB Fundmentals
Kumar
 
JSP and struts programming
JSP and struts programming
Kumar
 
java servlet and servlet programming
java servlet and servlet programming
Kumar
 
Introduction to JDBC and JDBC Drivers
Introduction to JDBC and JDBC Drivers
Kumar
 
Introduction to J2EE
Introduction to J2EE
Kumar
 
Graphics devices
Graphics devices
Kumar
 
Fill area algorithms
Fill area algorithms
Kumar
 
region-filling
region-filling
Kumar
 
Bresenham derivation
Bresenham derivation
Kumar
 
Bresenham circles and polygons derication
Bresenham circles and polygons derication
Kumar
 
Introductionto xslt
Introductionto xslt
Kumar
 
Extracting data from xml
Extracting data from xml
Kumar
 
Xml basics
Xml basics
Kumar
 
XML Schema
XML Schema
Kumar
 
Publishing xml
Publishing xml
Kumar
 
Applying xml
Applying xml
Kumar
 
Introduction to XML
Introduction to XML
Kumar
 
How to deploy a j2ee application
How to deploy a j2ee application
Kumar
 
JNDI, JMS, JPA, XML
JNDI, JMS, JPA, XML
Kumar
 
EJB Fundmentals
EJB Fundmentals
Kumar
 
JSP and struts programming
JSP and struts programming
Kumar
 
java servlet and servlet programming
java servlet and servlet programming
Kumar
 
Introduction to JDBC and JDBC Drivers
Introduction to JDBC and JDBC Drivers
Kumar
 
Introduction to J2EE
Introduction to J2EE
Kumar
 

Recently uploaded (20)

AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
 
10 Key Challenges for AI within the EU Data Protection Framework.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
Edge AI and Vision Alliance
 
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
 
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
 
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
 
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Josef Weingand
 
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
 
10 Key Challenges for AI within the EU Data Protection Framework.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
Edge AI and Vision Alliance
 
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
 
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
 
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
 
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Josef Weingand
 

Computer memory management

  • 1. 1 Memory Management Chapter 4 4.1 Basic memory management 4.2 Swapping 4.3 Virtual memory 4.4 Page replacement algorithms 4.5 Modeling page replacement algorithms 4.6 Design issues for paging systems 4.7 Implementation issues 4.8 Segmentation
  • 2. 2 Memory Management • Ideally programmers want memory that is – large – fast – non volatile • Memory hierarchy – small amount of fast, expensive memory – cache – some medium-speed, medium price main memory – gigabytes of slow, cheap disk storage • Memory manager handles the memory hierarchy
  • 3. 3 Basic Memory Management Monoprogramming without Swapping or Paging Three simple ways of organizing memory - an operating system with one user process
  • 4. 4 Multiprogramming with Fixed Partitions • Fixed memory partitions – separate input queues for each partition – single input queue
  • 5. 5 Modeling Multiprogramming CPU utilization as a function of number of processes in memory Degree of multiprogramming
  • 6. 6 Analysis of Multiprogramming System Performance • Arrival and work requirements of 4 jobs • CPU utilization for 1 – 4 jobs with 80% I/O wait • Sequence of events as jobs arrive and finish – note numbers show amout of CPU time jobs get in each interval
  • 7. 7 Relocation and Protection • Cannot be sure where program will be loaded in memory – address locations of variables, code routines cannot be absolute – must keep a program out of other processes’ partitions • Use base and limit values – address locations added to base value to map to physical addr – address locations larger than limit value is an error
  • 8. 8 Swapping (1) Memory allocation changes as – processes come into memory – leave memory Shaded regions are unused memory
  • 9. 9 Swapping (2) • Allocating space for growing data segment • Allocating space for growing stack & data segment
  • 10. 10 Memory Management with Bit Maps • Part of memory with 5 processes, 3 holes – tick marks show allocation units – shaded regions are free • Corresponding bit map • Same information as a list
  • 11. 11 Memory Management with Linked Lists Four neighbor combinations for the terminating process X
  • 12. 12 Virtual Memory Paging (1) The position and function of the MMU
  • 13. 13 Paging (2) The relation between virtual addresses and physical memory addres- ses given by page table
  • 14. 14 Page Tables (1) Internal operation of MMU with 16 4 KB pages
  • 15. 15 Page Tables (2) • 32 bit address with 2 page table fields • Two-level page tables Second-level page tables Top-level page table
  • 16. 16 Page Tables (3) Typical page table entry
  • 17. 17 TLBs – Translation Lookaside Buffers A TLB to speed up paging
  • 18. 18 Inverted Page Tables Comparison of a traditional page table with an inverted page table
  • 19. 19 Page Replacement Algorithms • Page fault forces choice – which page must be removed – make room for incoming page • Modified page must first be saved – unmodified just overwritten • Better not to choose an often used page – will probably need to be brought back in soon
  • 20. 20 Optimal Page Replacement Algorithm • Replace page needed at the farthest point in future – Optimal but unrealizable • Estimate by … – logging page use on previous runs of process – although this is impractical
  • 21. 21 Not Recently Used Page Replacement Algorithm • Each page has Reference bit, Modified bit – bits are set when page is referenced, modified • Pages are classified 1. not referenced, not modified 2. not referenced, modified 3. referenced, not modified 4. referenced, modified • NRU removes page at random – from lowest numbered non empty class
  • 22. 22 FIFO Page Replacement Algorithm • Maintain a linked list of all pages – in order they came into memory • Page at beginning of list replaced • Disadvantage – page in memory the longest may be often used
  • 23. 23 Second Chance Page Replacement Algorithm • Operation of a second chance – pages sorted in FIFO order – Page list if fault occurs at time 20, A has R bit set (numbers above pages are loading times)
  • 24. 24 The Clock Page Replacement Algorithm
  • 25. 25 Least Recently Used (LRU) • Assume pages used recently will used again soon – throw out page that has been unused for longest time • Must keep a linked list of pages – most recently used at front, least at rear – update this list every memory reference !! • Alternatively keep counter in each page table entry – choose page with lowest value counter – periodically zero the counter
  • 26. 26 Simulating LRU in Software (1) LRU using a matrix – pages referenced in order 0,1,2,3,2,1,0,3,2,3
  • 27. 27 Simulating LRU in Software (2) • The aging algorithm simulates LRU in software • Note 6 pages for 5 clock ticks, (a) – (e)
  • 28. 28 The Working Set Page Replacement Algorithm (1) • The working set is the set of pages used by the k most recent memory references • w(k,t) is the size of the working set at time, t
  • 29. 29 The Working Set Page Replacement Algorithm (2) The working set algorithm
  • 30. 30 The WSClock Page Replacement Algorithm Operation of the WSClock algorithm
  • 31. 31 Review of Page Replacement Algorithms
  • 32. 32 Modeling Page Replacement Algorithms Belady's Anomaly • FIFO with 3 page frames • FIFO with 4 page frames • P's show which page references show page faults
  • 33. 33 Stack Algorithms State of memory array, M, after each item in reference string is processed 7 4 6 5
  • 34. 34 The Distance String Probability density functions for two hypothetical distance strings
  • 35. 35 The Distance String • Computation of page fault rate from distance string – the C vector – the F vector
  • 36. 36 Design Issues for Paging Systems Local versus Global Allocation Policies (1) • Original configuration • Local page replacement • Global page replacement
  • 37. 37 Local versus Global Allocation Policies (2) Page fault rate as a function of the number of page frames assigned
  • 38. 38 Load Control • Despite good designs, system may still thrash • When PFF algorithm indicates – some processes need more memory – but no processes need less • Solution : Reduce number of processes competing for memory – swap one or more to disk, divide up pages they held – reconsider degree of multiprogramming
  • 39. 39 Page Size (1) Small page size • Advantages – less internal fragmentation – better fit for various data structures, code sections – less unused program in memory • Disadvantages – programs need many pages, larger page tables
  • 40. 40 Page Size (2) • Overhead due to page table and internal fragmentation • Where – s = average process size in bytes – p = page size in bytes – e = page entry 2 s e p overhead p ⋅ = + page table space internal fragmentation Optimized when 2p se=
  • 41. 41 Separate Instruction and Data Spaces • One address space • Separate I and D spaces
  • 42. 42 Shared Pages Two processes sharing same program sharing its page table
  • 43. 43 Cleaning Policy • Need for a background process, paging daemon – periodically inspects state of memory • When too few frames are free – selects pages to evict using a replacement algorithm • It can use same circular list (clock) – as regular page replacement algorithmbut with diff ptr
  • 44. 44 Implementation Issues Operating System Involvement with Paging Four times when OS involved with paging 1. Process creation − determine program size − create page table 1. Process execution − MMU reset for new process − TLB flushed 1. Page fault time − determine virtual address causing fault − swap target page out, needed page in 1. Process termination time − release page table, pages
  • 45. 45 Page Fault Handling (1) 1. Hardware traps to kernel 2. General registers saved 3. OS determines which virtual page needed 4. OS checks validity of address, seeks page frame 5. If selected frame is dirty, write it to disk
  • 46. 46 Page Fault Handling (2)  OS brings schedules new page in from disk  Page tables updated  Faulting instruction backed up to when it began  Faulting process scheduled  Registers restored  Program continues
  • 47. 47 Instruction Backup An instruction causing a page fault
  • 48. 48 Locking Pages in Memory • Virtual memory and I/O occasionally interact • Proc issues call for read from device into buffer – while waiting for I/O, another processes starts up – has a page fault – buffer for the first proc may be chosen to be paged out • Need to specify some pages locked – exempted from being target pages
  • 49. 49 Backing Store (a) Paging to static swap area (b) Backing up pages dynamically
  • 50. 50 Separation of Policy and Mechanism Page fault handling with an external pager
  • 51. 51 Segmentation (1) • One-dimensional address space with growing tables • One table may bump into another
  • 52. 52 Segmentation (2) Allows each table to grow or shrink, independently
  • 53. 53 Segmentation (3) Comparison of paging and segmentation
  • 54. 54 Implementation of Pure Segmentation (a)-(d) Development of checkerboarding (e) Removal of the checkerboarding by compaction
  • 55. 55 Segmentation with Paging: MULTICS (1) • Descriptor segment points to page tables • Segment descriptor – numbers are field lengths
  • 56. 56 Segmentation with Paging: MULTICS (2) A 34-bit MULTICS virtual address
  • 57. 57 Segmentation with Paging: MULTICS (3) Conversion of a 2-part MULTICS address into a main memory address
  • 58. 58 Segmentation with Paging: MULTICS (4) • Simplified version of the MULTICS TLB • Existence of 2 page sizes makes actual TLB more complicated
  • 59. 59 Segmentation with Paging: Pentium (1) A Pentium selector
  • 60. 60 Segmentation with Paging: Pentium (2) • Pentium code segment descriptor • Data segments differ slightly
  • 61. 61 Segmentation with Paging: Pentium (3) Conversion of a (selector, offset) pair to a linear address
  • 62. 62 Segmentation with Paging: Pentium (4) Mapping of a linear address onto a physical address
  • 63. 63 Segmentation with Paging: Pentium (5) Protection on the Pentium Level