wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Neha Mendapara
Jul 04, 2024
0 Likes
0 Discussions
135 Reads

Virtual memory in operating system is defined as technique of management of memory where main memory can be stored in secondary memory as if it is a part of it. So let us understand why is it called virtual memory? A memory management which provides an idealized representation of the storage resources available on a machine, creating the illusion for users of having a very large main memory. It is the space of HDD or SSD that acts as a part of system's RAM(Random Access Memory). Virtual Memory or Virtual Storage is enacted using "demand paging". A page is only loaded into memory when it is specifically referenced. Now let's grasp some knowledge about how virtual storage is operated. The operating system splits memory with a set number of addresses into pagefiles or swap files. The optimistic advantage of virtual memory are as follows:-

 1.Large Memory:-Virtual memory gives more storage area as compared to physically present in the system by utilizing disk space as an extension of physical RAM.

 2.Memory paging:- It divides memory into fixed-size blocks called pages so that day is allocated in an organized way

 3.Demand Paging: An optimization technique used with virtual memory where pages are loaded into RAM only when they are needed, rather than loading the entire program into memory at once. There are many advantages of it but as a coin has two sides there are some flaws also of it. Some of the disadvantages of Virtual Memory are as follows:-

  1. Complexity:-Virtual memory are complex to implement and maintain.They require sophisticated algorithms for page replacement, memory allocation, and address translation, which can be challenging to optimize and debug.
  2. Fragmentation in virtual memory systems can disrupt efficient memory allocation by either dividing free memory into non-contiguous small blocks (external fragmentation) or allocating more memory than is needed (internal fragmentation). These issues complicate memory management and can impair system performance. 
  3.  Security Risks:-Virtual memory poses security risks due to the potential exposure of sensitive data left in memory pages that are swapped out to disk without proper erasure. Effective management and encryption of swapped-out pages are essential measures to address these vulnerabilities.Virtual memory is crucial for modern operating systems as it allows efficient and flexible use of memory resources, enhancing overall system performance and usability.                         

Neha mendapara

53003230074

Div A


Comments ()


Sign in

Read Next

About myself

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Corporate Discipline.

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

Data Mining

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Data Warehousing

Blog banner

Linux 94

Blog banner

How to setup a professional looking business account on Instagram?

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

RAID

Blog banner

Memory Management

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

The New Rules of UI/UX Design Every Website Must Follow in 2026

Blog banner

Computer Security

Blog banner

GUIDE TO GIS

Blog banner

Data Visualization

Blog banner

SQL Injection Techniques

Blog banner

How to Find the Right Therapist For Me?

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

Virtual memory

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

objectives and functions of operating system

Blog banner

Starvation and Deadlock.

Blog banner

 " Healing of Yoga "

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

Cyber Laws In India and Around the World

Blog banner

Instagram

Blog banner

Footprinting

Blog banner

Microsoft Word

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Memory Management

Blog banner

IO Buffers

Blog banner

Deadlock

Blog banner

Delhi city

Blog banner

note taker app

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Eating Well With Meal Maharaj on Busy Workdays Without Cooking

Blog banner

An Overivew Of Cache Memory

Blog banner

Os Virtual Memory

Blog banner