wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual Memory

profile
Rishi Sheth
Jul 11, 2023
1 Like
0 Discussions
77 Reads

A virtual memory is a fundamental concept in operating systems that facilitates the efficient management of memory resources. Utilizing a combination of RAM and disk storage, it creates the illusion that there is more memory available than is actually available.

Each process in a virtual memory system has its own virtual address space, which is divided into pages. Page memory is a smaller unit of memory that can be loaded into RAM or swapped out to disk as needed. Virtual memory systems translate virtual addresses into physical addresses when a process references a memory location, allowing the process to access data corresponding to the virtual address.

When a program or process is running, it uses virtual memory addresses to access data and instructions. The operating system intercepts these addresses and checks the page table to determine if the corresponding page is in physical memory or on disk. If the page is in memory, the operating system translates the virtual address to the corresponding physical address and allows the process to access the data. This process is transparent to the running program.If a required page is not present in physical memory, it results in a page fault. The operating system then selects a page to evict from memory (if all page frames are occupied) and brings in the required page from disk. This swapping of pages between disk and memory is known as paging.

It has several advantages, including the ability to increase memory capacity for processes, the ability to protect processes from one another, and the ability to allocate memory more efficiently. In spite of limited physical memory, it is able to support larger programs and multiple processes concurrently.

In addition, virtual memory facilitates memory management techniques such as demand paging, which loads pages into memory only when they are accessed, and memory sharing between processes. Furthermore, it provides mechanisms for handling memory exceptions, such as page faults, when a required page is not present in RAM.

Overall, virtual memory plays a significant role in modern operating systems by providing an abstraction layer that simplifies memory management and enhances the efficiency and flexibility of the system.


Comments ()


Sign in

Read Next

History of ITIL

Blog banner

A BLOG ON MYSQL

Blog banner

Sweet Mango Murabba

Blog banner

Telegram and it's features

Blog banner

Embedded Operating System

Blog banner

Texting is actually better than talking in person

Blog banner

Objectives and Functions of Operating System

Blog banner

SESSION HIJACKING

Blog banner

Race Conditions

Blog banner

Deadlock and Starvation

Blog banner

Virtual Memory

Blog banner

Short note on Microsoft office

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Hey Aryan here

Blog banner

Types of email

Blog banner

What is Data, Information and Knowledge?

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

USES OF WHATSAPP

Blog banner

Why we should do reading

Blog banner

MORDERN UNIX SYSTEM

Blog banner

Fault Tolerance

Blog banner

Caching windows

Blog banner

Explain Multiprocessors

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

I/O Buffering

Blog banner

WomenEmpowerment

Blog banner

Paid Email

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Operating system evolution

Blog banner

INTERNET

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

PODIO

Blog banner

Modern operating systems (OS)

Blog banner

Hubspot

Blog banner

Social Engineering

Blog banner

Broken Authentication Attacks

Blog banner

Apple

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner