wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Tanisha Joshi
Aug 13, 2024
0 Likes
0 Discussions
97 Reads

Virtual memory

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.

 

A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.

 

The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations. 

 

Working of Virtual Memory

It is a technique that is implemented using both hardware and software. It maps memory addresses used by a program, called virtual addresses, into physical addresses in computer memory. 

 

All memory references within a process are logical addresses that are dynamically translated into

physical addresses

at run time. This means that a process can be swapped in and out of the main memory such that it occupies different places in the main memory at different times during the course of execution.

A process may be broken into a number of pieces and these pieces need not be continuously located in the main memory during execution. The combination of dynamic run-time address translation and the use of a page or segment table permits this.

If these characteristics are present then, it is not necessary that all the pages or segments are present in the main memory during execution. This means that the required pages need to be loaded into memory whenever required. Virtual memory is implemented using Demand Paging or Demand Segmentations .


Comments ()


Sign in

Read Next

Capacity management in ITSM

Blog banner

A Deep Dive

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

PHISHING

Blog banner

Service design process in ITSM

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

Electronic data interchange

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Topic: Sessions in Operating system

Blog banner

What is Segmentation?

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

bulk email software

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Starvation

Blog banner

Virtual Memory

Blog banner

Virtual Machine

Blog banner

Process and Threading

Blog banner

WomenEmpowerment

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Street foods

Blog banner

What is Spyware? and examples of them.

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Deadlocks in operating system

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

Importance of Morning Routines for Students During the Festive Season

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Kernel in Operating System

Blog banner

Study of Sniffing Tools

Blog banner

OS Assignment-3

Blog banner

SQL Injection

Blog banner

Data Mapping

Blog banner

Virtual memory

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner