1 / 16

Net 321 : Computer Operating System

Net 321 : Computer Operating System. Lecture # 8 : Main Mempry part 1. Chapter 8: Main Memory. Chapter 8: Memory Management. Background Swapping Contiguous Memory Allocation Paging Structure of the Page Table Segmentation Example: The Intel Pentium. Objectives.

Download Presentation

Net 321 : Computer Operating System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Net 321 :Computer Operating System Lecture # 8 : Main Memprypart 1 Networks and Communication Department

  2. Chapter 8: Main Memory

  3. Chapter 8: Memory Management • Background • Swapping • Contiguous Memory Allocation • Paging • Structure of the Page Table • Segmentation • Example: The Intel Pentium

  4. Objectives • To provide a detailed description of various ways of organizing memory hardware • To discuss various memory-management techniques, including paging and segmentation • To provide a detailed description of the Intel Pentium, which supports both pure segmentation and segmentation with paging

  5. Background • Memory is central to the operation of a modern computer system. • The part of the OS that manages the memory hierarchy is called the memory manager. • to keep track of which parts of memory are in use and which parts are not in use, • to allocate memory to processes when they need it and deallocate it when they are done, • to manage swapping between main memory and disk when main memory is too small to hold all the processes. • Memory consists of a large array of words or bytes, each with its own address. • The CPU fetches instructions from memory according to the value of the program counter. These instructions may cause additional loading from and storing to specific memory addresses.

  6. Basic hardware • Main memory and the registers built into the processor itself are the only storage that the CPU can access directly. • Therefore, any instructions in execution, and any data being used by the instructions, must be in one of these direct-access storage devices. • Registers that are built into the CPU are generally accessible within one cycle of the CPU clock. Most CPUs can decode instructions and perform simple operations on register contents at the rate of one or more operations per clock tick. • The same cannot be said of main memory, which is accessed via a transaction on the memory bus. Memory access may take many cycles of the CPU clock to complete. • The remedy is to add fast memory between the CPU and main memory (cache memory).

  7. Basic hardware cont. • Not only we are concerned with the relative speed of accessing physical memory, but we also must ensure correct operation has to protect the OS from access by user processes and, in addition, to protect user processes from one another • This protection must be provided by the hardware. We first need to make sure that each process has a separate memory space. • We can provide this protection by using two registers, usually a base and a limit, as illustrated in Fig. 8.1. • The base register holds the smallest legal physical memory address; • The limit register specifies the size of the range. • For example, if the base register holds 300040 and limit register is 120900, then the program can legally access all addresses from 300040 through 420940 (inclusive). • Protection of memory space is accomplished by having the CPU hardware compare every address generated in user mode with the registers. • Any attempt by a program executing in user mode to access operating-system memory or other users' memory results in a trap to the OS, which treats the attempt as a fatal error (see Fig. 8.2). • This scheme prevents a user program from (accidentally or deliberately) modifying the code or data structures of either the OS or other users.

  8. Base and Limit Registers(figure 8.1) • A pair of baseandlimitregisters define the logical address space

  9. Hardware Address Protection with Base and Limit Registers (figure 8.2)

  10. Address Binding • Inconvenient to have first user process physical address always at 0000 • How can it not be? • Further, addresses represented in different ways at different stages of a program’s life • Source code addresses usually symbolic • Compiled code addresses bind to relocatable addresses • i.e. “14 bytes from beginning of this module” • Linker or loader will bind relocatable addresses to absolute addresses • i.e. 74014 • Each binding maps one address space to another • The process of associating program instructions and data to physical memory addresses is called address binding, or relocation. • A user program will go through several steps -some of which may be optional-before being executed (see Fig. 8.3).

  11. Binding of Instructions and Data to Memory • Address binding of instructions and data to memory addresses can happen at three different stages • Compile time: If memory location known a priori, absolute codecan be generated; must recompile code if starting location changes (static) • Load time: Must generate relocatable code if memory location is not known at compile time (static) • Execution time: Binding delayed until run time if the process can be moved during its execution from one memory segment to another (dynamic) • Need hardware support for address maps (e.g., base and limitregisters) • Static-new locations are determined before execution.  • Dynamic-new locations are determined during execution.

  12. Multistep Processing of a User Program (figure 8.3)

  13. Logical vs. Physical Address Space • The concept of a logical address space that is bound to a separate physical address spaceis central to proper memory management • Logical address– generated by the CPU; also referred to as virtual address • Physical address– address seen by the memory unit • Logical and physical addresses are the same in compile-time and load-time address-binding schemes; logical (virtual) and physical addresses differ in execution-time address-binding scheme • Logical address space is the set of all logical addresses generated by a program • Physical address space is the set of all physical addresses generated by a program

  14. Memory-Management Unit (MMU) • However the execution-time address-binding scheme results in differing logical and physical addresses. In this case, we usually refer to the logical address as a virtual address. • The run-time mapping from virtual to physical addresses is done by a hardware device called the memory-management unit (MMU). • For the time being, we illustrate this mapping with a simple MMU scheme, which is a generalization of the base-register scheme (see Fig. 8.4)). • The base register is now called a relocation register. • The value in the relocation register is added to every address generated by a user process at the time it is sent to memory • For example, if the base is at 14000, then an attempt by the user to address location 0 is dynamically relocated to location 14000; an access to location 346 is mapped to location 14346. • The user program never sees the real physical addresses. The program can create a pointer to location 346, store it in memory, manipulate it, and compare it with other addresses -all as the number 346. • The user program deals with logical addresses. The memory-mapping hardware converts logical addresses into physical addresses.

  15. Dynamic relocation using a relocation register (figure 8.4)

  16. Dynamic Loading • In our discussion so far, the entire program and all data of a process must be in physical memory for the process to execute. • To obtain better memory-space utilization, we can use dynamic loading. • With dynamic loading, a routine is not loaded until it is called. • All routines are kept on disk in a relocatable load format. • The main program is loaded into memory and is executed. When a routine needs to call another routine, the calling routine first checks to see whether the other routine has been loaded. • If not, the relocatable linking loader is called to load the desired routine into memory and to update the program's address tables to reflect this change. • Then control is passed to the newly loaded routine. • The advantage of dynamic loading is that an unused routine is never loaded.

More Related