wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Neha Mendapara
Jul 04, 2024
0 Likes
0 Discussions
135 Reads

Virtual memory in operating system is defined as technique of management of memory where main memory can be stored in secondary memory as if it is a part of it. So let us understand why is it called virtual memory? A memory management which provides an idealized representation of the storage resources available on a machine, creating the illusion for users of having a very large main memory. It is the space of HDD or SSD that acts as a part of system's RAM(Random Access Memory). Virtual Memory or Virtual Storage is enacted using "demand paging". A page is only loaded into memory when it is specifically referenced. Now let's grasp some knowledge about how virtual storage is operated. The operating system splits memory with a set number of addresses into pagefiles or swap files. The optimistic advantage of virtual memory are as follows:-

 1.Large Memory:-Virtual memory gives more storage area as compared to physically present in the system by utilizing disk space as an extension of physical RAM.

 2.Memory paging:- It divides memory into fixed-size blocks called pages so that day is allocated in an organized way

 3.Demand Paging: An optimization technique used with virtual memory where pages are loaded into RAM only when they are needed, rather than loading the entire program into memory at once. There are many advantages of it but as a coin has two sides there are some flaws also of it. Some of the disadvantages of Virtual Memory are as follows:-

  1. Complexity:-Virtual memory are complex to implement and maintain.They require sophisticated algorithms for page replacement, memory allocation, and address translation, which can be challenging to optimize and debug.
  2. Fragmentation in virtual memory systems can disrupt efficient memory allocation by either dividing free memory into non-contiguous small blocks (external fragmentation) or allocating more memory than is needed (internal fragmentation). These issues complicate memory management and can impair system performance. 
  3.  Security Risks:-Virtual memory poses security risks due to the potential exposure of sensitive data left in memory pages that are swapped out to disk without proper erasure. Effective management and encryption of swapped-out pages are essential measures to address these vulnerabilities.Virtual memory is crucial for modern operating systems as it allows efficient and flexible use of memory resources, enhancing overall system performance and usability.                         

Neha mendapara

53003230074

Div A


Comments ()


Sign in

Read Next

Deadlock and starvation

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Memory Management in Operating System

Blog banner

?How long does wisdom tooth pain last?

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

Penetration Testing

Blog banner

Types of Hackers

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Cache memory

Blog banner

HUBSPOT

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Consumer to consumer Business model

Blog banner

ASANA- A Management System.

Blog banner

I/O Buffering

Blog banner

How to grow followers on Instagram business account?

Blog banner

Music helps reduce stress

Blog banner

Deadlock and Starvation

Blog banner

How to use GIT & GITHUB

Blog banner

Operating system evolution

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

Race Conditions

Blog banner

Synchronization

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

Electronic Funds Transfer

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

How to feel Happy everyday day

Blog banner

INTERNET SECURITY

Blog banner

DATA WRANGLING

Blog banner

Boxing

Blog banner

Measuring IT Risk

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Quality check in IT services

Blog banner

Business Intelligence v/s Big Data

Blog banner

Decision Tree: A Diagram Model

Blog banner

Trello ( management software)

Blog banner

Virus

Blog banner

Subnet Masking

Blog banner

DIGITAL TECHNOLOGY

Blog banner

Interesting fact about kangaroo.

Blog banner

Mariana Trench: The deepest depths

Blog banner