wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Neha Mendapara
Jul 04, 2024
0 Likes
0 Discussions
135 Reads

Virtual memory in operating system is defined as technique of management of memory where main memory can be stored in secondary memory as if it is a part of it. So let us understand why is it called virtual memory? A memory management which provides an idealized representation of the storage resources available on a machine, creating the illusion for users of having a very large main memory. It is the space of HDD or SSD that acts as a part of system's RAM(Random Access Memory). Virtual Memory or Virtual Storage is enacted using "demand paging". A page is only loaded into memory when it is specifically referenced. Now let's grasp some knowledge about how virtual storage is operated. The operating system splits memory with a set number of addresses into pagefiles or swap files. The optimistic advantage of virtual memory are as follows:-

 1.Large Memory:-Virtual memory gives more storage area as compared to physically present in the system by utilizing disk space as an extension of physical RAM.

 2.Memory paging:- It divides memory into fixed-size blocks called pages so that day is allocated in an organized way

 3.Demand Paging: An optimization technique used with virtual memory where pages are loaded into RAM only when they are needed, rather than loading the entire program into memory at once. There are many advantages of it but as a coin has two sides there are some flaws also of it. Some of the disadvantages of Virtual Memory are as follows:-

  1. Complexity:-Virtual memory are complex to implement and maintain.They require sophisticated algorithms for page replacement, memory allocation, and address translation, which can be challenging to optimize and debug.
  2. Fragmentation in virtual memory systems can disrupt efficient memory allocation by either dividing free memory into non-contiguous small blocks (external fragmentation) or allocating more memory than is needed (internal fragmentation). These issues complicate memory management and can impair system performance. 
  3.  Security Risks:-Virtual memory poses security risks due to the potential exposure of sensitive data left in memory pages that are swapped out to disk without proper erasure. Effective management and encryption of swapped-out pages are essential measures to address these vulnerabilities.Virtual memory is crucial for modern operating systems as it allows efficient and flexible use of memory resources, enhancing overall system performance and usability.                         

Neha mendapara

53003230074

Div A


Comments ()


Sign in

Read Next

Software

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Deadlock

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

Indian Food

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

Predictive Analysis - Ek Overview

Blog banner

Deadlock Prevention

Blog banner

The Memory Hierarchy

Blog banner

semaphores

Blog banner

Friendship

Blog banner

Big Data Architecture

Blog banner

Internet of Things and cyber security

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

OS Assignment 1

Blog banner

Street foods

Blog banner

Man In The Middle Attack

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Mesh Topology

Blog banner

Man VS Nature

Blog banner

All you need to know about “On-page SEO”

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

Virtual Memory

Blog banner

Article on IT development trends

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

ONLINE NEWSROOMS

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

Mumbaicha Dabbawalla

Blog banner

How to Prepare Your Child for Their First Day of School?

Blog banner

Types of Malware in Cyber Security

Blog banner

Health and fitness

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Threads

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

The application udemy

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Cyber Forensics on IOT Devices

Blog banner