wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Khushi Upadhayay
Aug 15, 2024
0 Likes
0 Discussions
84 Reads

VIRTUAL MEMORY

What is virtual memory?

Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory. Virtual memory is a common technique used in a computer’s operating system (OS).

Virtual memory uses both hardware and software to enable a computer to compensate for physical memory shortages, temporarily transferring data from random access memory (RAM) to disk storage. Mapping chunks of memory to disk files enables a computer to treat secondary memory as though it were main memory.

Virtual memory is important for improving system performance, multitasking and using large programs. However, users should not overly rely on virtual memory, since it is considerably slower than RAM. If the OS has to swap data between virtual memory and RAM too often, the computer will begin to slow down – this is called thrashing.

Virtual memory was developed at a time when physical memory – also referenced as RAM – was expensive. Computers have a finite amount of RAM, so memory will eventually run out when multiple programs run at the same time. A system using virtual memory uses a section of the hard drive to emulate RAM. With virtual memory, a system can load larger or multiple programs running at the same time, enabling each one to operate as if it has more space, without having to purchase more RAM.

How virtual memory works

Virtual memory uses both hardware and software to operate. When an application is in use, data from that program is stored in a physical address using RAM. A memory management unit (MMU) maps the address to RAM and automatically translates addresses. The MMU can, for example, map a logical address space to a corresponding physical address.

If, at any point, the RAM space is needed for something more urgent, data can be swapped out of RAM and into virtual memory. The computer’s memory manager is in charge of keeping track of the shifts between physical and virtual memory. If that data is needed again, the computer’s MMU will use a context switch to resume execution.

While copying virtual memory into physical memory, the OS divides memory with a fixed number of addresses into either pagefiles or swap files. Each page is stored on a disk, and when the page is needed, the OS copies it from the disk to main memory and translates the virtual addresses into real address.

What are the limitations of using virtual memory?

Although the use of virtual memory has its benefits, it also comes with some tradeoffs worth considering, such as:

Applications run slower if they are running from virtual memory.

Data must be mapped between virtual and physical memory, which requires extra hardware support for address translations, slowing down a computer further.

The size of virtual storage is limited by the amount of secondary storage, as well as the addressing scheme with the computer system.

Thrashing can occur if there is not enough RAM, which will make the computer perform slower.

It may take time to switch between applications using virtual memory.

It lessens the amount of available hard drive space.

What are the benefits of using virtual memory?

The advantages to using virtual memory include:

It can handle twice as many addresses as main memory.

It enables more applications to be used at once.

It frees applications from managing shared memory and saves users from having to add memory modules when RAM space runs out.

It has increased speed when only a segment of a program is needed for execution.

It has increased security because of memory isolation.

It enables multiple larger applications to run simultaneously.

Allocating memory is relatively inexpensive.

It does not need external fragmentation.

CPU use is effective for managing logical partition workloads.

Data can be moved automatically.

Pages in the original process can be shared during a fork system call operation that creates a copy of itself.

Process in a blocking state. For the execution to proceed the OS must bring the required page into the memory.

The OS will search for the required page in the logical address space.

The required page will be brought from logical address space to physical address space. The page replacement algorithms are used for the decision-making of replacing the page in physical address space.

The page table will be updated accordingly.

The signal will be sent to the CPU to continue the program execution and it will place

the process back into the ready state.


Comments ()


Sign in

Read Next

Sleep Matters: The Science Behind Toddler Naps

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Clarizen

Blog banner

semaphores in os

Blog banner

Security Issues

Blog banner

PPT methodology

Blog banner

Benefits and drawback of web security.

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Service Operations in ITSM

Blog banner

semaphores

Blog banner

GIS in Disaster Management

Blog banner

Virtual memory

Blog banner

Education: Key to your Prosperity

Blog banner

Uniprocessor scheduling

Blog banner

File sharing

Blog banner

Virtual memory

Blog banner

PROCESS STATE:

Blog banner

E-commerce

Blog banner

My Favorite Country

Blog banner

Domain Name System

Blog banner

Data Mining

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

Segmentation and paging concept

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Memory input output management

Blog banner

Evolution of Operating system

Blog banner

Types of E-Commerce

Blog banner

Firewall in Computer Network

Blog banner

Open Source Project By Google

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

Stop Racism

Blog banner

Memory Partitioning

Blog banner

Number Guessing game --lisp

Blog banner

Deadlock and Starvation

Blog banner

Interrupts in OS

Blog banner

Financial Fraud Detection

Blog banner

RAID

Blog banner

Direct Memory Access

Blog banner

Design Considerations for Disk Cache Management

Blog banner

EID UL FITR

Blog banner

Scheduling in Operating Systems

Blog banner