wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Anam Maruf
Aug 13, 2024
0 Likes
0 Discussions
93 Reads

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.

It is a technique that is implemented using both hardware and software. It maps memory addresses used by a program, called virtual addresses, into physical addresses in computer memory. 

  • All memory references within a process are logical addresses that are dynamically translated into physical address at run time. This means that a process can be swapped in and out of the main memory such that it occupies different places in the main memory at different times during the course of execution.
  • There are two main types of virtual memory:

    • Paging
    • Segmentation
    • Paging divides memory into small fixed-size blocks called pages. When the computer runs out of RAM, pages that aren’t currently in use are moved to the hard drive, into an area called a swap file. The swap file acts as an extension of RAM. When a page is needed again, it is swapped back into RAM, a process known as page swapping. This ensures that the operating system (OS) and applications have enough memory to run

    •  

      Segmentation divides virtual memory into segments of different sizes. Segments that aren’t currently needed can be moved to the hard drive. The system uses a segment table to keep track of each segment’s status, including whether it’s in memory, if it’s been modified, and its physical address. Segments are mapped into a process’s address space only when needed.


Comments ()


Sign in

Read Next

Domain Name System

Blog banner

Memory Management

Blog banner

PPT methodology

Blog banner

My Favorite Country

Blog banner

MYNTRA

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Creating Digitally Signed Document

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

Memory management

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

Operating System

Blog banner

RAID

Blog banner

Deadlock and Starvation

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

10 Interesting facts you should know!!!

Blog banner

Different memory allocation strategies

Blog banner

The Rise of Polo Tourism in the USA: How Travellers Are Blending Luxury Stays with Elite Sports

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

THE DESIRE OF MANY

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

URL vs Domain

Blog banner

Penetration Testing

Blog banner

Characteristics of Etherum

Blog banner

Search Marketing In 2026: From Keywords To Credibility And User Intent

Blog banner

Strengthening Active Directory Security

Blog banner

E-mail security

Blog banner

VIRUS

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Is Your Password Complex Enough?

Blog banner

WORKFRONT SOFTWARE

Blog banner

OLA

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

(Input/Output) in os

Blog banner

To-Do List In LISP

Blog banner

Importance Of Education.

Blog banner

operating system

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

How to use GIT & GITHUB

Blog banner

Beauty of indian railway

Blog banner