wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Anam Maruf
Aug 13, 2024
0 Likes
0 Discussions
93 Reads

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.

It is a technique that is implemented using both hardware and software. It maps memory addresses used by a program, called virtual addresses, into physical addresses in computer memory. 

  • All memory references within a process are logical addresses that are dynamically translated into physical address at run time. This means that a process can be swapped in and out of the main memory such that it occupies different places in the main memory at different times during the course of execution.
  • There are two main types of virtual memory:

    • Paging
    • Segmentation
    • Paging divides memory into small fixed-size blocks called pages. When the computer runs out of RAM, pages that aren’t currently in use are moved to the hard drive, into an area called a swap file. The swap file acts as an extension of RAM. When a page is needed again, it is swapped back into RAM, a process known as page swapping. This ensures that the operating system (OS) and applications have enough memory to run

    •  

      Segmentation divides virtual memory into segments of different sizes. Segments that aren’t currently needed can be moved to the hard drive. The system uses a segment table to keep track of each segment’s status, including whether it’s in memory, if it’s been modified, and its physical address. Segments are mapped into a process’s address space only when needed.


Comments ()


Sign in

Read Next

CONCURRENCY

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

History of ITIL

Blog banner

Memory input output management

Blog banner

Access management

Blog banner

Microsoft Windows Overview

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

Cache Memory

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Service transistion under difficult conditions

Blog banner

How to Conquer Depression ?

Blog banner

SPAM

Blog banner

Google classroom

Blog banner

Uniprocessor scheduling

Blog banner

Embaded operating system

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Cloud Security: Trends and Innovations

Blog banner

File Allocation Methods

Blog banner

Know your Processors!

Blog banner

Excel records

Blog banner

What is Packet Filtering?

Blog banner

Consumer to consumer business mode

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

Why Users Leave Your Website in 5 Seconds (And How UI/UX Fixes It)

Blog banner

EMAIL INVESTIGATION

Blog banner

Coping with Diagnosis Shock

Blog banner

Semaphores

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Virtual memory

Blog banner

Friendship

Blog banner

Evolution of Operating system.

Blog banner

Deadlock and Starvation

Blog banner

NIKE

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

Os assignment

Blog banner

Memory Management

Blog banner

The Role of Summer Camps in Early Childhood Development

Blog banner