Abstract
The memory management system described in chapter 8 provides an adequate set of facilities for implementing a reasonable time-sharing system. Each user process has its own virtual store which is protected from interference by other processes by the use of the base-limit register. Additionally, this mechanism protects the operating system from illegal accesses by the user programs. Many early computers relied solely on this technique for implementing a suitable multi-access system, but there are still a number of major problems outstanding for the system designer, most notably: (a) fragmentation, (b) locality of programs and (c) sharing of data structures or code, such as compilers and editors. Each of these will now be considered.
Preview
Unable to display preview. Download preview PDF.
9.8 References
DEC (1979), PDP11 Processor Handbook. Digital Equipment Corporation, Maynard. Massachusetts, U.S.A.
Author information
Authors and Affiliations
Copyright information
© 1983 Colin J. Theaker and Graham R. Brookes
About this chapter
Cite this chapter
Theaker, C.J., Brookes, G.R. (1983). Memory Management — Segmentation. In: A Practical Course on Operating Systems. Macmillan Computer Science Series. Palgrave, London. https://doi.org/10.1007/978-1-349-17138-5_9
Download citation
DOI: https://doi.org/10.1007/978-1-349-17138-5_9
Publisher Name: Palgrave, London
Print ISBN: 978-0-333-34678-5
Online ISBN: 978-1-349-17138-5
eBook Packages: Computer ScienceComputer Science (R0)