Define implementation of segmentation with an example, Operating System

Assignment Help:

IMPLEMENTATION OF SEGMENTATION WITH AN EXAMPLE

Segmentation is a memory-management scheme that represents the user view of memory. A logical address space is the collection of segments. Every segment has a name and a length. The addresses specify both the offset and the segment name within the segment. The user thus specifies each address by two quantities: an offset and a segment name. For the simplicity of execution, the segments are numbered and are referred to by a segment number, relatively than by a segment name. Therefore, the logical address consists of a two tuple segment-number offset   

Execution is defined to map two-dimensional user-defined addresses into one-dimensional physical addresses. This mapping is distressed by segment table. Every entry in the segment table has a segment limit and a segment base. The segment base holds the starting address where the segment resides in memory, while the segment limit specifies the length of the segment.

A logical address consists of two parts an offset and a segment number, s, into that segment d. The segment number is utilized as an index to the table. The offset d of the logical address should be between 0 and the segment limit. The segment table is basically an array of base-limit register pairs.

 

1357_Implementation of  SEGMENTATION.png


Related Discussions:- Define implementation of segmentation with an example

Processes, draw a state diagram showing the transissions of a process from ...

draw a state diagram showing the transissions of a process from creation to termination

Explain lru approximation page replacement, LRU approximation page replacem...

LRU approximation page replacement In this we are able to use the reference bit associated with the page entry to choose a page to be removed. The various algorithms used for

What are privileged instructions, What are privileged instructions? Som...

What are privileged instructions? Some of the machine instructions that may cause harm to a system are designated as privileged instructions. The hardware permits the privilege

Determine the requiring variables on the scope of a thread, Determine the R...

Determine the Requiring Variables on the Scope of a Thread It is very common in server application programs to require variables on the scope of a thread. To provide such a sco

Virtualization, What factors are involved in choosing the host operating sy...

What factors are involved in choosing the host operating system?

Defining kernel, Problem 1. What is kernel? What are the main component...

Problem 1. What is kernel? What are the main components of a kernel? Defining Kernel Explaining Main components of Kernel 2. What is mutual exclusion? What are i

Dual mode operation, WHAT ARE THE ADVANTAGES AND DISADVANTAGES OF DUAL MODE...

WHAT ARE THE ADVANTAGES AND DISADVANTAGES OF DUAL MODE OPERATION OF OPERATING SYSTEM>?

Prolog application, 1. Problem Domain You will be considering the Wumpus ...

1. Problem Domain You will be considering the Wumpus world introduced in Russell and Norvig (2009) Chapter 7. For this programming assignment you'll use Prolog's ability to do in

Prepare gantt charts and determine the average waiting time, Prepare Gantt ...

Prepare Gantt Charts and Determine the Average Waiting Time 1. Classify the interaction among the processes on the basis if degree to which they are aware of each  other's exi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd