This document provides an overview of main memory and memory management techniques. It discusses how memory is organized, including the use of base and limit registers to define separate memory spaces for processes. It describes logical and physical address spaces and how memory management units map between them. The document outlines paging and segmentation techniques for non-contiguous memory allocation to reduce fragmentation. It provides examples of how paging works and the role of the translation lookaside buffer in caching page table entries to improve performance.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
79 views51 pages
Chapter 8 Main Memory: Bernard Chen Spring 2007
This document provides an overview of main memory and memory management techniques. It discusses how memory is organized, including the use of base and limit registers to define separate memory spaces for processes. It describes logical and physical address spaces and how memory management units map between them. The document outlines paging and segmentation techniques for non-contiguous memory allocation to reduce fragmentation. It provides examples of how paging works and the role of the translation lookaside buffer in caching page table entries to improve performance.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 51
Chapter 8 Main Memory
Bernard Chen Spring 2007 Objectives
To provide a detailed description of various
ways of organizing memory hardware To discuss various memory-management techniques, including paging and segmentation To provide a detailed description of the Intel Pentium, which supports both pure segmentation and segmentation with paging Background
Program must be brought (from disk) into memory
and placed within a process for it to be run Main memory and registers are only storage CPU can access directly Register access in one CPU clock (or less) Main memory can take many cycles Cache sits between main memory and CPU registers Protection of memory required to ensure correct operation Memory shared by Processes We first need to make sure that each process has a separate memory space
The BASE register holds the smallest
legal physical memory address; the LIMIL register specifies the size of the range Base and Limit Registers Base and Limit Registers The base and limit registers can be loaded only the operating system , which uses a special privileged instruction. And these instructions can only be executed in kernel mode, which can only achieved by OS Binding of Instructions and Data to Memory Binding: A compiler will typically bind the symbolic address To relocatable address (such as “14 bytes from the beginning of the module”)
Address binding of instructions and data
to memory addresses can happen at three different stages Binding of Instructions and Data to Memory
Compile time: If memory location known a priori,
absolute code can be generated; must recompile code if starting location changes
Load time: Must generate relocatable code if
memory location is not known at compile time
Execution time: Binding delayed until run time if the
process can be moved during its execution from one memory segment to another. Logical vs. Physical Address Space
The concept of a logical address space that is
bound to a separate physical address space is central to proper memory management Logical address–generated by the CPU; also referred to as virtual address Physical address– addres seen by the memory unit Logical vs. Physical Address Space
Logical and physical addresses are the same
in compile-time and load-time address- binding schemes; logical (virtual) and physical addresses differ in execution-time address- binding scheme
Logical address also refer to a virtual
address Memory- Management Unit (MMU) The run time mapping from virtual to physical address is done by a hardware device called the memory-management unit, as well as MMU
In MMU scheme, the value in the relocation register
is added to every address generated by a user process at the time it is sent to memory
The user program deals with logical addresses; it
never sees the real physical addresses Memory- Management Unit (MMU) Dynamic Loading If the entire program and all data must be in physical memory for the process to execute, the size of the process is limited to the size of physical memory
To obtain better memory-space utilization, we
can use dynamic loading
Routine is not loaded until it is called
Swapping A process can swapped temporarily out of memory to a Backing store and then brought back into memory for continued execution. For example, RR CPU-scheduler, Priority scheduler Swapping Swapping Swapping requires a backing store. It must be large enough to store all memory images for all users, and it must have a direct access to memory
Whenever the CPU scheduler decides to execute a
process, it calls the dispatcher The dispatcher will check whether the next process is in the memory If not, the dispatcher will swap out a process currently in memory and swaps in the desired process Swapping We assume that the user process is 10MB, and the standard hard disk with a transfer rate of 40MB per second, it would take:
10000kb/40000kb per sec = ¼ second = 250
milliseconds
Assume we expect 8 millisecond of delay, each swap
will take 258 millisecond. And we need two swaps therefore it takes 516 milliseconds If we do a RR CPU-scheduler, the time quantum should be more than half second Contiguous Allocation
Main memory usually into two partitions:
Resident operating system, usually held
in low memory with interrupt vector
User processes then held in high
memory Memory Mapping and Protection
Relocation registers used to protect user processes
from each other, and from changing operating-system code and data
Base register contains value of smallest physical
address Limit register contains range of logical addresses – each logical address must be less than the limit register MMU maps logical address dynamically Memory Mapping and Protection Memory Allocation The simplest method for memory allocation is to divide memory into several fix-sized partitions
Initially, all memory is available for user
processes and is considered one large block of available memory, a hole. Memory Allocation Dynamic storage allocation problem When a process arrives and needs memory, the system searches the set for a hole that is large enough for it. If it is too large, the space divided into two parts. One part is allocate for the process and another part is freed to the set of holes When the process terminate, the space is placed back in the set of holes If the space is not big enough, the process wait or next available process comes in Dynamic Storage- Allocation Problem How to satisfy a request of size n from a list of free holes First-fit: Allocate the first hole that is big enough Best-fit: Allocate the smallest hole that is big enough; must search entire list, unless ordered by size (Produces the smallest leftover hole) Worst-fit: Allocate the largest hole; must also search entire list (Produces the largest leftover hole) Fragmentation All strategies for memory allocation suffer from external fragmentation external fragmentation: as process are loaded and removed from memory, the free memory space is broken into little pieces External fragmentation exists when there is enough total memory space to satisfy the request, but available spaces are not contiguous Fragmentation Statistical analysis of first fit even with some optimization, given N allocated blocks, another 0.5N blocks will be lost to fragmentation. That is one-third of memory may be unusable! This property is known as the 50-percent rule Fragmentation If the hole is the size of 20,000 bytes, suppose that next process requests 19,000 bytes. 1,000 bytes are lose
This is called internal fragmentation-
memory that is internal to a partition but is nor being used Fragmentation Possible solution to external-fragmentation problem is to permit the logical address space of the process to be noncontiguous Thus, allowing a process to be allocated physical memory wherever the space is available Two complementary techniques achieves this solution: paging(8.4) segmentation (8.6) combined (8.7) 8.4 paging Paging is a memory-management scheme that permits the physical address space of a process to be non-contiguous.
The basic method for implementation involves
breaking physical memory into fixed-sized blocks called FRAMES and break logical memory into blocks of the same size called PAGES Paging Every address generated by the CPU is divided into two parts: Page number (p) and Page offset (d)
The page number is used as an index
into a Page Table Paging Paging Paging The page size is defined by the hardware The size of a page is typically a power of 2, varying between 512 bytes and 16MB per page Reason: If the size of logical address is 2^m and page size is 2^n, then the high-order m-n bits of a logical address designate the page number Paging Paging Example Paging When we use a paging scheme, we have no external fragmentation: ANY free frame can be allocated to a process that needs it. However, we may have internal fragmentation For example: if a page size is 2048 bytes, a process of 72766 bytes would need 35 pages plus 1086 bytes Paging If the process requires n pages, at least n frames are required
The first page of the process is loaded
into the first frame listed on free-frame list, and the frame number is put into page table Paging Hardware Support on Paging To implement paging, the simplest method is to implement the page table as a set of registers However, the size of register is limited and the size of page table is usually large Therefore, the page table is kept in main memory Hardware Support on Paging If we want to access location I, we must first index into page table, this requires one memory access With this scheme, TWO memory access are needed to access a byte The standard solution is to use a special, small, fast cache, called Translation look- aside buffer (TLB) or associative memory TLB TLB If the page number is not in the TLB (TLB miss) a memory reference to the page table must be made. In addition, we add the page number and frame number into TLB If the TLB already full, the OS have to must select one for replacement Some TLBs allow entries to be wire down, meaning that they cannot be removed from the TLB, for example kernel codes TLB The percentage of times that a particular page number is found in the TLN is called hit ratio If it takes 20 nanosecond to search the TLB and 100 nanosecond to access memory
If our hit ratio is 80%, the effective memory access
time equal: 0.8*(100+20) + 0.2 *(100+100)=140 If our hit ratio is 98%, the effective memory access time equal: 0.98*(100+20) + 0.02 *(100+100)=122 (detail in CH9) Memory Protection
Memory protection implemented by associating
protection bit with each frame
Valid-invalid bit attached to each entry in the page
table: “valid” indicates that the associated page is in the process’ logical address space, and is thus a legal page “invalid” indicates that the page is not in the process ’logical address space Memory Protection Suppose a system with a 14bit address space (0 to 16383), we have a program that should use only address 0 to 10468. Given a page size of 2KB, we may have the following figure: Memory Protection Memory Protection Any attempt to generate an address in page 6 or 7 will be invalid
Notice that this scheme allows the
program to access 10468 to 12287, this problem is result of the 2KB page size and reflects the internal fragmentation of paging Shared Pages An advantage of paging is the possible of sharing common code, especially time-sharing environment For example a server with 40 user using text editor (with 150k reentrant code and 50k data space) In next figure, we see three page editor with 50k each. Each process has its own data page Shared Pages Shared Pages In this case, we need only 150k + 40* 50k = 2150 KB