0% found this document useful (0 votes)
27 views

Unit 5memory Management

The document discusses memory management techniques including swapping, contiguous allocation, paging, and segmentation. It describes how instructions and data are bound to memory at compile time, load time, or execution time and explains logical versus physical address spaces.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

Unit 5memory Management

The document discusses memory management techniques including swapping, contiguous allocation, paging, and segmentation. It describes how instructions and data are bound to memory at compile time, load time, or execution time and explains logical versus physical address spaces.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 61

Unit – 5

Memory Management
Memory Management

 Background

 Swapping

 Contiguous Allocation

 Paging

 Segmentation

 Segmentation with Paging


Background
 Program must be brought into memory and
placed within a process for it to be run
 Input queue – collection of processes on the
disk that are waiting to be brought into memory
to run the program
 User programs go through several steps before
being run
Binding of Instructions and Data to
Memory

Address binding of instructions and data to memory addresses can


happen at three different stages

 Compile time

 Load time

 Execution time
Binding of Instructions and Data to
Memory

Compile time:
If you know at compile time where the process will reside in memory,

then absolute code can be generated.

For example, if you know that a user process will reside starting at

location R, then the generated compiler code will start at that location
and extend up from there.

If, at some later time, the starting location changes, then it will be

necessary to recompile this code.


Binding of Instructions and Data to
Memory

Load time:
If it is not known at compile time where the process will reside

in memory, then the compiler must generate relocatable code.

In this case, final binding is delayed until load time.

If the starting address changes, we need only reload the user

code to incorporate this changed value.


Binding of Instructions and Data to
Memory

Execution time:
If the process can be moved during its execution from

one memory segment to another, then binding must be


delayed until runtime.

Special hardware must be available for this scheme to

work
Multistep Processing of a User Program
Logical vs. Physical Address Space

 The concept of a logical address space that is bound

to a separate physical address space is central to


proper memory management

 Logical address – generated by the CPU; also


referred to as virtual address

 Physical address – address seen by the memory unit

 Logical and physical addresses are the same in


compile-time and load-time address-binding schemes;
logical (virtual) and physical addresses differ in
execution-time address-binding scheme
Memory-Management Unit (MMU)

 Hardware device that maps virtual to physical

address

 In MMU scheme, the value in the relocation

register is added to every address generated by a


user process at the time it is sent to memory

 The user program deals with logical addresses; it

never sees the real physical addresses


Dynamic relocation using a relocation
register
Dynamic Loading

 Routine is not loaded until it is called

 Better memory-space utilization; unused routine

is never loaded

 Useful when large amounts of code are needed

to handle infrequently occurring cases

 No special support from the operating system is

required implemented through program design


Swapping
 A process can be swapped temporarily out of memory to a
backing store, and then brought back into memory for
continued execution

 Backing store – fast disk large enough to accommodate


copies of all memory images for all users; must provide
direct access to these memory images

 Roll out, roll in – swapping variant used for priority-based


scheduling algorithms; lower-priority process is swapped
out so higher-priority process can be loaded and executed

 Major part of swap time is transfer time; total transfer


time is directly proportional to the amount of memory
swapped

 Modified versions of swapping are found on many systems


(i.e., UNIX, Linux, and Windows)
Schematic View of Swapping
A base and a limit register define a logical address
space
HW address protection with base and limit registers
Contiguous Allocation (Cont.)
 Multiple-partition allocation
 Hole – block of available memory; holes of various
size are scattered throughout memory
 When a process arrives, it is allocated memory
from a hole large enough to accommodate it
 Operating system maintains information about:
a) allocated partitions b) free partitions (hole)

OS OS OS OS
process process process process
5 5 5 5
process process
9 9
process process
8 10

process process process process


2 2 2 2
Dynamic Storage-Allocation
Problem

How to satisfy a request of size n from a list of free holes

 First-fit: Allocate the first hole that is big enough

 Best-fit: Allocate the smallest hole that is big

enough; must search entire list, unless ordered by


size. Produces the smallest leftover hole.

 Worst-fit: Allocate the largest hole; must also search

entire list. Produces the largest leftover hole.

First-fit and best-fit better than worst-fit in


terms of speed and storage utilization
Fragmentation
 External Fragmentation – total memory space

exists to satisfy a request, but it is not contiguous

 Internal Fragmentation – allocated memory may

be slightly larger than requested memory; this


size difference is memory internal to a partition,
but not being used

 Reduce external fragmentation by compaction

 Shuffle memory contents to place all free


memory together in one large block
External Fragmentation
Internal Fragmentation
Paging
 Logical address space of a process can be noncontiguous;

process is allocated physical memory whenever the latter is


available

 Divide physical memory into fixed-sized blocks called frames

(size is power of 2, between 512 bytes and 8192 bytes)

 Divide logical memory into blocks of same size called pages.

 Keep track of all free frames

 To run a program of size n pages, need to find n free frames

and load program

 Set up a page table to translate logical to physical addresses

 Internal fragmentation
Address Translation Scheme
 Address generated by CPU is divided into:

 Page number (p) – used as an index into a


page table which contains base address of
each page in physical memory

 Page offset (d) – combined with base address


to define the physical memory address that is
sent to the memory unit
Address Translation Architecture
Paging Example
Paging Example
Consider a system with byte-addressable memory, 32 bit logical addresses, 4 kilobyte page
size and page table entries of 4 bytes each. The size of the page table in the system in
megabytes is _____.
1. 2MB
2. 4MB
3. 8GB
4. 16MB
Consider a machine with 64 MB physical memory and a 32 bit virtual address
space. If the page size is 4 KB, what is the approximate size of the page table?
1. 16 MB
2. 8 MB
3. 2 MB
4. 24 MB
Free Frames

Before allocation After allocation


Implementation of Page Table
 Page table is kept in main memory
 Page-table base register (PTBR) points to
the page table
 Page-table length register indicates size of
the page table
 In this scheme every data/instruction
access requires two memory accesses.
One for the page table and one for the
data/instruction.
 The two memory access problem can be
solved by the use of a special fast-lookup
hardware cache called associative memory
or translation look-aside buffers (TLBs)
Paging Hardware With TLB
Consider a paging hardware with a TLB. Assume that the entire page table and all the
pages are in the physical memory. It takes 10 milliseconds to search the TLB and 80
milliseconds to access the physical memory. If the TLB hit ratio is 0.6, the effective
memory access time (in milliseconds) is _________. GATE 2014
1.TLB hit ratio = 0.6
2.Therefore, TLB miss ratio = 0.4
3.Time taken to access TLB (t) = 10 ms
4.Time taken to access main memory (m) = 80 ms
Effective Access Time (EAT) = 0.6 ( 10 + 80 ) + 0.4 ( 10 + 80 + 80 ) = 90 X 0.6 +
0.4 X 170 = 122
Memory Protection

 Memory protection implemented by


associating protection bit with each frame

 Valid-invalid bit attached to each entry in the


page table:
 “valid” indicates that the associated page
is in the process’ logical address space,
and is thus a legal page
 “invalid” indicates that the page is not in
the process’ logical address space
Valid (v) or Invalid (i) Bit In A Page
Table
Page Table Structure

 Hierarchical Paging

 Hashed Page Tables

 Inverted Page Tables


Hierarchical Page Tables

 Break up the logical address space into


multiple page tables

 A simple technique is a two-level page table


Two-Level Paging Example
 A logical address (on 32-bit machine with 4K page size) is divided
into:
 a page number consisting of 20 bits
 a page offset consisting of 12 bits
 Since the page table is paged, the page number is further divided
into:
 a 10-bit page number
 a 10-bit page offset
 Thus, a logical address is as follows:

page number page offset


pi p2 d
1 1 1
0 0 2

 where pi is an index into the outer page table, and p2 is the


displacement within the page of the outer page table
Two-Level Page-Table Scheme
Address-Translation Scheme

 Address-translation scheme for a two-level 32-bit


paging architecture
Hashed Page Tables
 Common in address spaces > 32 bits

 The virtual page number is hashed into a


page table. This page table contains a chain
of elements hashing to the same location.

 Virtual page numbers are compared in this


chain searching for a match. If a match is
found, the corresponding physical frame is
extracted.
 Each element consists of three fields:

(1) the virtual page number,


(2) the value of the mapped page frame, and
(3) a pointer to the next element in the linked list.
Hashed Page Table
Inverted Page Table
 One entry for each real page of memory
 Entry consists of the virtual address of the
page stored in that real memory location, with
information about the process that owns that
page
 Decreases memory needed to store each page
table, but increases time needed to search the
table when a page reference occurs
 Use hash table to limit the search to one — or
at most a few — page-table entries
Inverted Page Table Architecture
Shared Pages
 Shared code
 One copy of read-only (reentrant) code shared
among processes (i.e., text editors, compilers,
window systems).
 Shared code must appear in same location in the
logical address space of all processes

 Private code and data


 Each process keeps a separate copy of the code
and data
 The pages for the private code and data can
appear anywhere in the logical address space
Shared Pages Example
Segmentation
 Memory-management scheme that supports user view
of memory
 A program is a collection of segments. A segment is a
logical unit such as:
main program,
procedure,
function,
method,
object,
local variables, global variables,
common block,
stack,
symbol table, arrays
User’s View of a Program
Logical View of Segmentation

4
1

3 2
4

user space physical memory space


Segmentation Architecture

 Logical address consists of a two tuple:

<segment-number, offset>,
 Segment table – maps two-dimensional physical
addresses; each table entry has:
 base – contains the starting physical address where
the segments reside in memory
 limit – specifies the length of the segment
 Segment-table base register (STBR) points to the
segment table’s location in memory
 Segment-table length register (STLR) indicates number
of segments used by a program;
segment number s is legal if s < STLR
Segmentation Architecture (Cont.)

 Protection. With each entry in segment table associate:

 validation bit = 0  illegal segment

 read/write/execute privileges

 Protection bits associated with segments; code sharing

occurs at segment level

 Since segments vary in length, memory allocation is a

dynamic storage-allocation problem

 A segmentation example is shown in the following

diagram
Address Translation Architecture
Example of Segmentation
Sharing of Segments
Segmentation with Paging –
MULTICS

 The MULTICS system solved problems of external

fragmentation and lengthy search times by paging the


segments

 Solution differs from pure segmentation in that the

segment-table entry contains not the base address of


the segment, but rather the base address of a page
table for this segment
MULTICS Address Translation
Scheme
Segmentation with Paging – Intel
386

 As shown in the following diagram, the Intel 386 uses

segmentation with paging for memory management


with a two-level paging scheme
Intel 30386 Address Translation
Linux on Intel 80x86

 Uses minimal segmentation to keep memory


management implementation more portable
 Uses 6 segments:
 Kernel code
 Kernel data
 User code (shared by all user processes, using
logical addresses)
 User data (likewise shared)
 Task-state (per-process hardware context)
 LDT
 Uses 2 protection levels:
 Kernel mode
 User mode

You might also like