wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual Memory

profile
Dhanish undefined
Aug 15, 2024
0 Likes
0 Discussions
151 Reads


Virtual memory is a fundamental concept in operating systems (OS) that allows a computer to compensate for shortages of physical memory by temporarily transferring data from random access memory (RAM) to disk storage. This process creates an "illusion" for users that there is more memory available than what is physically present on the system.

Key Concepts of Virtual Memory:

  • Paging:
  • The OS divides both the physical memory (RAM) and virtual memory into fixed-size blocks called "pages."
  • When a program accesses a piece of data, the OS checks if the page containing the data is in RAM. If not, it fetches the page from disk (in an area known as the swap space) and loads it into RAM.
  • Page Table:
  • The OS maintains a page table that maps virtual addresses to physical addresses. This allows the system to keep track of where each page is stored in RAM or on disk.
  • Page Fault:
  • When a program tries to access data on a page that is not currently in RAM, a page fault occurs. The OS then retrieves the required page from disk into RAM, which may involve swapping out another page to make room.
  • Swapping:
  • Swapping is the process of moving pages between RAM and disk. When RAM is full, the OS selects certain pages (usually the least recently used) to be swapped out to disk. This frees up space in RAM for other pages that are needed immediately.
  • Advantages of Virtual Memory:
  • Efficient Memory Use: It allows multiple programs to run simultaneously without running out of physical memory.
  • Isolation: Each process gets its own virtual address space, providing protection and isolation from other processes.
  • Flexibility: Programs can be larger than the physical memory available, as the OS can swap parts of the program in and out of RAM as needed.
  • Disadvantages:
  • Performance Overhead: The process of swapping pages in and out of RAM can cause delays, especially if the system is frequently accessing data not in RAM (a condition known as thrashing).
  • Complexity: Implementing and managing virtual memory adds complexity to the OS.

How Virtual Memory Works:

  • Address Translation:
  • When a program uses a virtual address to access data, the OS translates this virtual address into a physical address using the page table.
  • Memory Allocation:
  • The OS allocates memory to processes using virtual memory. It ensures that processes do not interfere with each other's memory, providing a secure and stable environment.
  • Demand Paging:
  • The OS loads pages into memory only when they are needed, which is known as demand paging. This conserves RAM and improves efficiency.

Practical Example:

  • Imagine you have 8 GB of RAM but are running applications that require 16 GB. Virtual memory allows the OS to use disk space to store parts of these applications, making it seem like you have more RAM than you actually do. When the OS needs to access data from the applications that are not currently in RAM, it will swap them from the disk into RAM, and vice versa.

Virtual memory is essential in modern computing, enabling systems to run large and complex applications efficiently, even with limited physical memory.


Dhanish Soni

53003230069


Comments ()


Sign in

Read Next

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner

Types Of Interrupt

Blog banner

Vulnerability Assessment

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Open relationships

Blog banner

Virtual machine and virtualizing

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

AI and cyber Security

Blog banner

Process in OS

Blog banner

Online Games

Blog banner

Principal of concurrency

Blog banner

Music

Blog banner

Threat management

Blog banner

Security and E-mail

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

The Features of Blockchain

Blog banner

What is E-commerce

Blog banner

10 Rare Historic Pictures that are Ever Captured

Blog banner

Puri Jagannath temple

Blog banner

File Sharing

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Importance of Network Security Risk

Blog banner

Deadlock

Blog banner

I/O Buffering

Blog banner

Operating system

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

What is thread and multithreading ?

Blog banner

Deadlock

Blog banner

What is Segmentation?

Blog banner

Memory managment

Blog banner

Computer security techniques

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

Which is a good bike to buy?

Blog banner

Asana

Blog banner

PERT Overview

Blog banner

Starvation and Deadlock.

Blog banner

MENDELEY

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

File management

Blog banner

EMAIL INVESTIGATION

Blog banner

Getting started with Android Studio

Blog banner