wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual Memory

profile
Jainam mehta
Aug 13, 2024
0 Likes
0 Discussions
74 Reads

                        VIRTUAL MEMORY

 

Introduction: Virtual memory is a crucial concept in modern operating systems, allowing them to manage and utilize physical memory (RAM) more efficiently. It enables a computer to compensate for physical memory shortages, by temporarily transferring data from random access memory (RAM) to disk storage.

Key concepts :

Paging: Divides virtual memory into small blocks called pages, which are mapped to physical memory as needed.

Page Table: A data structure that maps virtual addresses to physical addresses.

Page Fault: Occurs when a program accesses a page not currently in RAM, prompting the OS to load it from disk.

Swapping: Moves inactive pages from RAM to disk to free up memory for other processes.

Thrashing: When excessive swapping degrades system performance.

Benefits of Virtual Memory:

Isolation and Security: Virtual memory provides each process with its own isolated memory space, preventing one process from accessing or corrupting another's memory.

Efficient Memory Utilization: Virtual memory allows the OS to use physical memory more efficiently, allocating memory to processes as needed and swapping out inactive pages.

Support for Large Applications: Programs can use more memory than what is physically available, as the OS can load and unload parts of the program as needed.


Comments ()


Sign in

Read Next

Save Girl Child

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Fashion design

Blog banner

Importance Of Education.

Blog banner

Fitness regime by Deepesh

Blog banner

Question

Blog banner

Major achievement

Blog banner

Cache memory

Blog banner

IoT Evolution

Blog banner

DATA WRANGLING

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Modern Operating Systems

Blog banner

Threads

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Uniprocessor scheduling

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

Multicore and multithreading 171

Blog banner

Strengthening Active Directory Security

Blog banner

Processes : Process description and control

Blog banner

Cloud Computing

Blog banner

Virtual Machine

Blog banner

Fault Tolerance

Blog banner

Uniprocessor and Types

Blog banner

Cache Memory

Blog banner

Mendeley (management software)

Blog banner

Online Education

Blog banner

OS Assignment 3

Blog banner

HubSpot

Blog banner

Scheduling

Blog banner

american greatines

Blog banner

Kafka - A Framework

Blog banner

Deadlock Prevention

Blog banner

Note on Process, Process creation and Process termination

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Why Data Security Is Important

Blog banner

Network Footprinting in Cybersecurity

Blog banner

MACHINE LEARNING

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

Theads

Blog banner