Share
Explore BrainMass

Memory Management

Memory management is critical in a computer system. A good memory management system must be able to dynamically allocate memory to programs as they require it as well as free that memory up once they have finished using it. Without a good memory management system, a computer will be terribly slow, or not usable at all.

Stick of RAM

Due to this importance, a lot of thought has gone into developing an efficient system of memory management. Virtual memory was a large step forward in this direction. The basic idea behind this is to separate the memory addresses a process uses from physical ones in order to squeeze out more RAM. An algorithm for memory management that decouples the way memory is organised and and the physical memory itself make it possible to separate processes out and use paging or swapping to secondary storage for efficiency gains. With it, every time a process requests access to stored data, virtual memory must translate that virtual address into a physical one, allowing finer, more granular control over the memory system to eliminate unnecessary actions. This idea also applies to memory allocation requests from processes where the machine must locate a block of free memory big enough to fill the request. The place this block comes from is called the heap, and at any given time the heap may be split into many, many subsections that are being allocated, used and freed very rapidly so a fine level of control is essential. A good virtual memory manager can hugely improve overall system performance. Cache algorithms can further improve this.

Management of Information security

Part 1: Think about a business you are familiar with, one that uses networks and computers to support business functions. Create a list of ten important, specific items such as computers, disks, equipment, and information such as sales data, client data, and network configuration. Identify the threats these important items are

Java text formatting program

Write a simple text formatting program in Java, that will read words from an input file and write them to an output file, removing extra whitespace and filling each line with as many words as will fit up to a maximum column width (similar to a column of text in a newspaper). The maximum column width, input text file name, and ou

Architecture Application

This Application challenges you to evaluate connectivity issues between database management systems (DBMS) and procedural programming languages. Ever since relational databases (RDBMS) became popular in the early 1980s, programmers have encountered a major disconnect between their code and the RDBMS. Although a query to the

Introduction to Operating System Interfaces

Investigate the net for information about some of the new features offered by Vista over previous operating systems or operating systems on other computing environments. What makes Vista a better (or worse) choice for home or office computing?

Method for connecting the two buildings together for Akami

Please see attached files for complete problem descriptions. Assignment 1: 1. Determine the best network media for the network in the new facility keeping in mind the growth aspect of the assignment. Support your decision by contrasting what you think is the best solution for the job, and the worst. 2. Give the method for c

A system implements a paged virtual address space for each process using a one-level page table. The maximum size of virtual address space is 16MB. The page size is 1024 bytes and the maximum physical memory size of the machine is 2MB. The page table for the running process is also provided. Answer the given page table questions.

A system implements a paged virtual address space for each process using a one-level page table. The maximum size of virtual address space is 16MB. The page table for the running process includes the following valid entries (the --> notation indicates that a virtual page maps to the given page frame, that is, it is located in th

Review of New Technologies Paper

"An emerging technology not in use at the company such as a wireless network or PDAs." I need to address the following: o What the technology is o How the technology works o Benefits the technology will provide o Any potential negative aspects of the technology

Need help with Link, Slides and More Explanatory for figures

Could you able to help with this attached document. 1.) I need link for table of content, list of figures, list of tables. Few sections there is no link. Recently i updated the document. Could you please link it. Leave the first page with out page number. From second page to Until section 1, i need Page number in Romai

Question about Java program to memorize a sequence of colors

The files must be called <YourNameProg7.java>. Ensure you include ALL files required to make your program compile and run. I would like to see your .java files only. Proper coding conventions required the first letter of the class start with a capital letter and the first letter of each additional word start with a capital le

Write a program that tests the user's ability to memorize a sequence of colors

I am stumped with this java driver program. I have been able to obtain parts of the first sample session. Please see my progress below. import javax.swing.*; import java.awt.*; import java.awt.event.*; public class MemoryProg extends JFrame { private static final int WIDTH = 350; private static final int HEIGHT

Cache Misses: Compulsory, Capacity and Conflict

Cache misses are classified into one of three categories - compulsory, capacity, or conflict. For each condition listed below, say whether the cache misses in each category will increase, decrease, or stay the same, and explain why (assume that in each case, the overall total cache size remains constant). a. The associat

WLAN & Backbone Network

Pat's Engineering Works is a small company that specializes in complex engineering consulting projects. The projects typically involve one or two engineers who do data intensive analyses for companies. Because so much data is needed, the projects are stored on the company's high capacity server but moved to the engineers' work

Which bits would be used for tag, index, and offset in address reference? What is the expected access time for the following cache configuration? Additional Primary or Secondary cache could be added at same cost - which would be the better addition?

1. Answer the following questions related to reference addresses: a. Given a 64-byte cache block, a 4 KB direct-mapped cache (assume byte-addressable), and a 32 bit address reference, which bits would be used for tag, index, and offset? b. Given a 64-byte cache block, a 32 KB direct-mapped cache (assume byte-addressable) a

Network Troubleshooting

You are a network support technician for a college with 4000 users scattered over five locations. A group of users from the downtown location has called your help desk, complaining that they cannot send or receive messages from the Internet, although they can receive messages on the college's internal mail system. List the ste

Operation system mechanisms

What hardware mechanisms are essential to the operation of the modern operating system? Briefly describe the purpose of each mechanism. 2. Describe the main benefits of SPOOLing systems. 3. Describe the boot process

Networking: Protocols and Access Methods

1. As the network administrator for a growing firm, you want to design your network to run efficiently now and in the future. You plan to implement a server based Windows Server 2003 network. Although you currently support only 20 users on one floor of one building, management is rumoured to be planning an acquisition that would

Dual Roles of Operating Systems: Are they in Conflict?

It is said that there is a dual definition of what an operating system must do. The first one is to present a "virtual machine" to the user which isolates him/her from the bare-bones hardware and is user friendly and effective. The other one is that it has to manage in the most efficient way the (always) limited resources of the