wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Anam Maruf
Aug 13, 2024
0 Likes
0 Discussions
93 Reads

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.

It is a technique that is implemented using both hardware and software. It maps memory addresses used by a program, called virtual addresses, into physical addresses in computer memory. 

  • All memory references within a process are logical addresses that are dynamically translated into physical address at run time. This means that a process can be swapped in and out of the main memory such that it occupies different places in the main memory at different times during the course of execution.
  • There are two main types of virtual memory:

    • Paging
    • Segmentation
    • Paging divides memory into small fixed-size blocks called pages. When the computer runs out of RAM, pages that aren’t currently in use are moved to the hard drive, into an area called a swap file. The swap file acts as an extension of RAM. When a page is needed again, it is swapped back into RAM, a process known as page swapping. This ensures that the operating system (OS) and applications have enough memory to run

    •  

      Segmentation divides virtual memory into segments of different sizes. Segments that aren’t currently needed can be moved to the hard drive. The system uses a segment table to keep track of each segment’s status, including whether it’s in memory, if it’s been modified, and its physical address. Segments are mapped into a process’s address space only when needed.


Comments ()


Sign in

Read Next

Marvel Cinematic Universe

Blog banner

memory cache

Blog banner

Microsoft Word

Blog banner

Real time scheduling

Blog banner

Uniprocessor Scheduling

Blog banner

Memory Management

Blog banner

Traditional Unix System

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

Direct memory access (DMA)

Blog banner

Memory Management

Blog banner

Lucidchart

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Race Conditions

Blog banner

What is Influencer Marketing and its Trends

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

Objectives and functions of Operating System...

Blog banner

Platonic Solids

Blog banner

Diwali

Blog banner

Health and fitness

Blog banner

Process State

Blog banner

Threads

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Memory heirachy (Operating system)

Blog banner

Cache memory

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

semaphores

Blog banner

Starvation and Deadlock.

Blog banner

Scheduling in Operating Systems

Blog banner

Spyware

Blog banner

Different types of scam Fraud

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

Security issues

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Blog on health and fitness

Blog banner

Deadlocks in Operating Systems

Blog banner