0% found this document useful (0 votes)
83 views2 pages

EG: Traffic Signal.: Memory Management Memory Addresses

Virtual memory is a memory management technique that allows processes to access memory addresses that are larger than the actual physical RAM. It maps virtual addresses used by processes to physical addresses in RAM. When a process references a memory address not currently in RAM, the memory manager fetches that page from disk and places it in an empty page frame in RAM. This allows more processes to run than the available RAM size by only keeping necessary parts of processes in memory and storing the rest on disk. Virtual memory can be implemented using paging, where pages of virtual addresses are mapped to page frames of physical addresses.

Uploaded by

psp83
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views2 pages

EG: Traffic Signal.: Memory Management Memory Addresses

Virtual memory is a memory management technique that allows processes to access memory addresses that are larger than the actual physical RAM. It maps virtual addresses used by processes to physical addresses in RAM. When a process references a memory address not currently in RAM, the memory manager fetches that page from disk and places it in an empty page frame in RAM. This allows more processes to run than the available RAM size by only keeping necessary parts of processes in memory and storing the rest on disk. Virtual memory can be implemented using paging, where pages of virtual addresses are mapped to page frames of physical addresses.

Uploaded by

psp83
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Virtual memory is a feature of an operating system that enables a process to use a memory (RAM) address space that is independent

of other
processes running in the same system, and use a space that is larger than the actual amount of RAM present
In a system using virtual memory, the physical memory is divided into equally-sized pages. The memory addressed by a process is also divided
into logical pages of the same size. When a process references a memory address, the memory manager fetches from disk the page that
includes the referenced address, and places it in a vacant physical page in the RAM.
virtual memory is a memory management technique that is implemented using both hardware and software. It maps memory
addresses used by a program, called virtual addresses, into physical addresses in computer memory
A Virtual Memory system has the advantage of allowing more processes to run than the allowed memory size. This
is achieved by only including parts of processes that are necessary to run in memory, and the rest on disk
Virtual Memory can be implemented in one of two ways:- Paging,-Segmentation
Paging: During memory referencing, the consecutive addresses in the virtual address space that are referenced
are called pages. The corresponding range of consecutive addresses in the real, physical memory are called page
frames. Each page and its corresponding page frame must have the same size. The area on a Hard Disk that
stores page frames (or memory images) is usually called thepaging file or the swap file.
Deadlock is a situation in which two or more competing actions are each waiting for the other to finish, and thus
neither ever does.
a deadlock happens when two processes each within its own transaction updates two rows of information but in the
opposite order. For example, process A updates row 1 then row 2 in the exact timeframe process B updates row 2
then row 1. Process A can't finish updating row 2 until process B is finished, but it cannot finish updating row 1
until process A finishes. No matter how much time is allowed to pass, this situation will never resolve itself
EG: Traffic signal.
There are four conditions that are necessary to achieve deadlock:
Mutual Exclusion, Hold and Wait, No preemption, Circular Wait
HOW TO AVOID DEADLOCK-Mutual Exclusion,no premaption.
Port:When referring to a network or to the Internet, a software or network port is a location where information is
sent through. A commonly used and accessed port is port 80, which is the http [Link] can get access to port from
netstat command/block from firewall.
When referring to a physical device, a hardware port is a hole or connection found on the back of a computer.
Hardware ports allow computers to have access to externaldevices such as computer printers.(USB PORT)
A port is associated with an IP address of the host, as well as the type of protocol used for
communication. The purpose of ports is to uniquely identify different applications or processes running on
a single computer.

transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP).
Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to
deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH,
FTP, Telnet.

The DNS translates Internet domain and host names to IP addresses. DNS automatically converts the
names we type in our Web browser address bar to the IP addresses of Web servers hosting those
sites.
DNS implements a distributed database to store this name and address information for all public hosts
on the Internet. DNS assumes IP addresses do not change (are statically assigned rather than
dynamically assigned).


Whether you're accessing a Web site or sending e-mail, your computer uses a DNS server to look up the
domain name you're trying to access. The proper term for this process is DNS name resolution, and you
would say that the DNS server resolves the domain name to the IP address. For example, when you
enter "[Link] in your browser, part of the network connection includes resolving
the domain name "[Link]" into an IP address, like [Link], for HowStuffWorks' Web
servers.
You can always bypass a DNS lookup by entering [Link] directly in your browser (give it a try).
However, you're probably more likely to remember "[Link]" when you want to return later. In
addition, a Web site's IP address can change over time, and some sites associate multiple IP addresses
with a single domain name.

You might also like