Skip to main content

Abstract

The memory management system described in chapter 8 provides an adequate set of facilities for implementing a reasonable time-sharing system. Each user process has its own virtual store which is protected from interference by other processes by the use of the base-limit register. Additionally, this mechanism protects the operating system from illegal accesses by the user programs. Many early computers relied solely on this technique for implementing a suitable multi-access system, but there are still a number of major problems outstanding for the system designer, most notably: (a) fragmentation, (b) locality of programs and (c) sharing of data structures or code, such as compilers and editors. Each of these will now be considered.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

9.8 References

  • DEC (1979), PDP11 Processor Handbook. Digital Equipment Corporation, Maynard. Massachusetts, U.S.A.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Copyright information

© 1983 Colin J. Theaker and Graham R. Brookes

About this chapter

Cite this chapter

Theaker, C.J., Brookes, G.R. (1983). Memory Management — Segmentation. In: A Practical Course on Operating Systems. Macmillan Computer Science Series. Palgrave, London. https://doi.org/10.1007/978-1-349-17138-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-349-17138-5_9

  • Publisher Name: Palgrave, London

  • Print ISBN: 978-0-333-34678-5

  • Online ISBN: 978-1-349-17138-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics