wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Anam Maruf
Aug 13, 2024
0 Likes
0 Discussions
93 Reads

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.

It is a technique that is implemented using both hardware and software. It maps memory addresses used by a program, called virtual addresses, into physical addresses in computer memory. 

  • All memory references within a process are logical addresses that are dynamically translated into physical address at run time. This means that a process can be swapped in and out of the main memory such that it occupies different places in the main memory at different times during the course of execution.
  • There are two main types of virtual memory:

    • Paging
    • Segmentation
    • Paging divides memory into small fixed-size blocks called pages. When the computer runs out of RAM, pages that aren’t currently in use are moved to the hard drive, into an area called a swap file. The swap file acts as an extension of RAM. When a page is needed again, it is swapped back into RAM, a process known as page swapping. This ensures that the operating system (OS) and applications have enough memory to run

    •  

      Segmentation divides virtual memory into segments of different sizes. Segments that aren’t currently needed can be moved to the hard drive. The system uses a segment table to keep track of each segment’s status, including whether it’s in memory, if it’s been modified, and its physical address. Segments are mapped into a process’s address space only when needed.


Comments ()


Sign in

Read Next

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

Pink sauce pasta

Blog banner

Memory Management

Blog banner

The evolution of OS

Blog banner

Data Lake

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Deadlock

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

RAID

Blog banner

Subnet Masking

Blog banner

Indian Culture and Tradition

Blog banner

10 Unknown facts about India's Independence

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

Riddhi Miyani 53003220140

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

Scheduling

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

Disk cache

Blog banner

Phishing

Blog banner

File management

Blog banner

Mobile Security

Blog banner

Record Blocking

Blog banner

Starvation

Blog banner

Hacking

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

Deadlock

Blog banner

Email Privacy

Blog banner

Never give up

Blog banner

Technological Advancement

Blog banner

IT RISK

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Importance of Education

Blog banner

Retiring ISS

Blog banner

To travel is to live

Blog banner

Security in Cloud Computing

Blog banner

Explain website hacking issues

Blog banner

Pooja Silver

Blog banner

Having passion in life

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner