四川大学:《操作系统 Operating System》课程教学资源(PPT课件讲稿)Chapter 7 Memory Management

Chapter 7 Memory Management Goals of memory management subdividing memory to accommodate multiple processes(为支持多道程序将内存进行划分) Memory needs to be allocated to ensure a reasonable supply of ready processes to consume available processor time(内存管理应确保有适当数目的就 绪进程使用处理器时间)
2 Chapter 7 Memory Management • Goals of memory management • subdividing memory to accommodate multiple processes(为支持多道程序将内存进行划分) • Memory needs to be allocated to ensure a reasonable supply of ready processes to consume available processor time(内存管理应确保有适当数目的就 绪进程使用处理器时间)

Chapter 7 Memory Management The external view of the Memory Manager Application Program VirtualAlloc( exec o) shmalloc( tulloCk( VirtualFree( getrlimit( ZeroMemory( UNIX Windows Hardware
Chapter 7 Memory Management • The External View of the Memory Manager 3

Chapter 7 Memory Management 7.1 Memory management Requirements 7.2 Memory Partitioning ·7.3 Paging 7.4 Segmentation 7.5 Summary
4 Chapter 7 Memory Management • 7.1 Memory Management Requirements • 7.2 Memory Partitioning • 7.3 Paging • 7.4 Segmentation • 7.5 Summary

7.1 Memory Management Requirements 7. 1. 1 Five requirements 7.1.2 Preparing program for Execution
5 7.1 Memory Management Requirements • 7.1.1 Five requirements • 7.1.2 Preparing Program for Execution

7.1.1 Five requirements(1/6) ·1.Re| ocation We need to relocate the process to a different area of memory Programmer does not know where the program will be placed in memory when it is executed While the program is executing, it may be swapped(交换) to disk and returned to main memory at a different location(relocated) Memory references(访问) found in the code must be translated to actual physical memory address(物理内存地址)
7.1.1 Five requirements(1/6) • 1. Relocation • We need to relocate the process to a different area of memory. • Programmer does not know where the program will be placed in memory when it is executed. • While the program is executing, it may be swapped(交换) to disk and returned to main memory at a different location (relocated). • Memory references(访问) found in the code must be translated to actual physical memory address(物理内存地址). 6

7.1.1 Five requirements(276) 1. Relocation Relocation could raise some technical concerns Process control information 'rpces Control Bloc Entry point to program Increasing address Reference to data Data Current top of stack Figure 7.1 Addressing Requirements for a Process
7.1.1 Five requirements(2/6) • 1. Relocation • Relocation could raise some technical concerns related to addressing 7

7.1.1 Five requirements(376) ·2. Protection Processes should not be able to reference memory locations in another process without permission Normally, processes cannot access any portion of the os, neither program nor data Impossible to check absolute addresses at compile time, must be checked at rum time Memory protection requirement must be satisfied by the processor(hardware)rather than the operating system Operating system cannot anticipate all of the memory references a program will make
7.1.1 Five requirements(3/6) • 2. Protection • Processes should not be able to reference memory locations in another process without permission Normally, processes cannot access any portion of the OS, neither program nor data. • Impossible to check absolute addresses at compile time, must be checked at rum time. • Memory protection requirement must be satisfied by the processor (hardware) rather than the operating system • Operating system cannot anticipate all of the memory references a program will make 8

7.1.1 Five requirements(4/6) 3. Sharing Allow several processes to access the same portion of memory Share same copy of the program Share data structure to cooperate on some task The memory management system must allow controlled access to shared areas of memory without compromising essential protection
7.1.1 Five requirements(4/6) • 3. Sharing • Allow several processes to access the same portion of memory • Share same copy of the program • Share data structure to cooperate on some task • The memory management system must allow controlled access to shared areas of memory without compromising essential protection. 9

7.1.1 Five requirements(5/6) 4. Logical Organization(逻辑组织) Programs are written in modules Modules can be written and compiled independently Different degrees of protection given to modules (read-only, execute-only) Share modules among processes
7.1.1 Five requirements(5/6) • 4. Logical Organization(逻辑组织) • Programs are written in modules • Modules can be written and compiled independently • Different degrees of protection given to modules (read-only, execute-only) • Share modules among processes 10

7.1.1 Five requirements(6/6) 5. Physica| Organization(物理组织) Memory is organized into at least two levels, referred to as main memory and secondary memory Memory available for a program plus its data may be insufficient(内存对程序和其数据来说可能不足) Overlaying(覆盖) allows various modules to be assigned the same region of memory Programmer does not know how much space will be available and where his / her program will be loaded in memory
11 7.1.1 Five requirements(6/6) • 5. Physical Organization(物理组织) • Memory is organized into at least two levels, referred to as main memory and secondary memory • Memory available for a program plus its data may be insufficient(内存对程序和其数据来说可能不足) • Overlaying(覆盖) allows various modules to be assigned the same region of memory • Programmer does not know how much space will be available and where his/her program will be loaded in memory
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 香港浸会大学:并行输入输出(PPT讲稿)Parallel I/O.ppt
- 香港浸会大学:Kickstart Tutorial/Seminar on using the 64-nodes P4-Xeon Cluster in Science Faculty.ppt
- Essential Cluster OS Commands.ppt
- 《图像处理与计算机视觉 Image Processing and Computer Vision》课程教学资源(PPT课件讲稿)Chapter 07 Mean-shift and Cam-shift.pptx
- 香港中文大学:Image processing and computer vision(PPT课件讲稿)Edge detection and image filtering.pptx
- 《图像处理与计算机视觉 Image Processing and Computer Vision》课程教学资源(PPT课件讲稿)Chapter 05 Hough transform.pptx
- GD-Aggregate:A WAN Virtual Topology Building Tool for Hard Real-Time and Embedded Applications.ppt
- Introduction to Internet and TCPIP(PPT讲稿)IP转发 IP FORWARDING.pptx
- 《图像处理与计算机视觉 Image Processing and Computer Vision》课程教学资源(PPT课件讲稿)Chapter 10 Pose estimation by the iterative method.pptx
- 《操作系统》课程教学资源(PPT课件讲稿)Chapter 8 Virtual Memory.ppt
- 《操作系统》课程教学资源(PPT课件讲稿)Chapter 6 Concurrency Deadlock and Starvation.ppt
- 《操作系统》课程教学资源(PPT课件讲稿)Chapter 1 and 2 Computer System and Operating System Overview.ppt
- 印第安纳大学:《Informatics》课程PPT教学课件(信息学)08 网络爬虫 Web Crawling.ppt
- 《Java编程导论》课程教学资源(PPT课件讲稿)Chapter 8 Strings and Text I/O.ppt
- 《计算机网络与通讯》课程教学资源(PPT课件讲稿,英文版)Chapter 3 Transport Layer.ppt
- C++ Review.ppt
- 《计算机网络与通讯》课程教学资源(PPT课件讲稿,英文版)Chapter 07 Network Security.ppt
- Incorporating Structured World Knowledge into Unstructured Documents via——Heterogeneous Information Networks.pptx
- FairCloud:Sharing the Network in Cloud Computing.pptx
- 香港科技大学:《计算机网络 Computer Networks》课程教学资源(PPT课件)Chapter 1 Introduction of computer networking.ppsx
- 四川大学:《数据库技术》课程教学资源(PPT课件讲稿)第4章 数据库查询.ppt
- 《计算机系统结构》课程教学资源(PPT课件讲稿)第五章 存储层次.ppt
- 软件配置管理和项目管理工具(PPT讲稿)Software Configuration Management and Project Management Tool.ppt
- 《数据库基础》课程PPT教学课件(SQL Server)第4章 T-SQL与可编程对象.ppt
- 《嵌入式系统开发》课程PPT教学课件(讲稿)第一章 嵌入式系统概述.ppt
- 《编译原理 Compiler Construction》课程教学资源(PPT讲稿)语义分析 Semantic Analysis(Attributes and Attribute Grammars、Algorithms for Attribute Computation).ppt
- 四川大学:《Linux操作系统》课程教学资源(PPT课件讲稿)第6章 Linux系统调用.ppt
- 《数据库技术》课程教学资源(PPT课件讲稿)第3章 SQL语言基础及数据定义功能(主讲:曾晓东).ppt
- 四川大学:.NET and .NET Core:Languages, Cloud, Mobile and AI(PPT课件讲稿)NET for Data Science and AI.pptx
- 四川大学:《Matlab程序设计》课程教学资源(教学大纲)Programming in Matlab.pdf
- 电子科技大学:《计算系统与网络安全 Computer System and Network Security》课程教学资源(PPT课件讲稿)第4章 网络基础(网络概述、协议).ppt
- 电子科技大学:《计算系统与网络安全 Computer System and Network Security》课程教学资源(PPT课件讲稿)第7章 协议安全技术(安全协议实例).ppt
- 电子科技大学:《计算系统与网络安全 Computer System and Network Security》课程教学资源(PPT课件讲稿)第5章 网络隔离技术.ppt
- 电子科技大学:《计算系统与网络安全 Computer System and Network Security》课程教学资源(PPT课件讲稿)第2章 信息安全数学基础(计算复杂性).ppt
- 《计算机系统结构》课程教学资源(PPT课件讲稿)第五章 存储系统.ppt
- 《操作系统》课程教学资源(PPT课件讲稿)Chapter 03 Process Description And Control.ppt
- 电子科技大学:《面向对象程序设计语言C++》课程教学资源(PPT课件讲稿)第九章 多态性(主讲:丘志杰).ppt
- 《计算机体系结构》课程教学资源(PPT课件讲稿)第七章 多处理机系统.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)Chapter 05 并发性——互斥和同步(Concurrency - Mutual Exclusion and Synchronization).ppt
- 《计算机系统结构》课程教学资源(PPT课件讲稿)第八章 多计算机系统.ppt