wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Neha Mendapara
Jul 04, 2024
0 Likes
0 Discussions
135 Reads

Virtual memory in operating system is defined as technique of management of memory where main memory can be stored in secondary memory as if it is a part of it. So let us understand why is it called virtual memory? A memory management which provides an idealized representation of the storage resources available on a machine, creating the illusion for users of having a very large main memory. It is the space of HDD or SSD that acts as a part of system's RAM(Random Access Memory). Virtual Memory or Virtual Storage is enacted using "demand paging". A page is only loaded into memory when it is specifically referenced. Now let's grasp some knowledge about how virtual storage is operated. The operating system splits memory with a set number of addresses into pagefiles or swap files. The optimistic advantage of virtual memory are as follows:-

 1.Large Memory:-Virtual memory gives more storage area as compared to physically present in the system by utilizing disk space as an extension of physical RAM.

 2.Memory paging:- It divides memory into fixed-size blocks called pages so that day is allocated in an organized way

 3.Demand Paging: An optimization technique used with virtual memory where pages are loaded into RAM only when they are needed, rather than loading the entire program into memory at once. There are many advantages of it but as a coin has two sides there are some flaws also of it. Some of the disadvantages of Virtual Memory are as follows:-

  1. Complexity:-Virtual memory are complex to implement and maintain.They require sophisticated algorithms for page replacement, memory allocation, and address translation, which can be challenging to optimize and debug.
  2. Fragmentation in virtual memory systems can disrupt efficient memory allocation by either dividing free memory into non-contiguous small blocks (external fragmentation) or allocating more memory than is needed (internal fragmentation). These issues complicate memory management and can impair system performance. 
  3.  Security Risks:-Virtual memory poses security risks due to the potential exposure of sensitive data left in memory pages that are swapped out to disk without proper erasure. Effective management and encryption of swapped-out pages are essential measures to address these vulnerabilities.Virtual memory is crucial for modern operating systems as it allows efficient and flexible use of memory resources, enhancing overall system performance and usability.                         

Neha mendapara

53003230074

Div A


Comments ()


Sign in

Read Next

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

Install Ubuntu Easily

Blog banner

Void

Blog banner

Article on Team Work

Blog banner

Operating System

Blog banner

Why we should do reading

Blog banner

Khau Galli – Vile Parle

Blog banner

RAID_142

Blog banner

Software

Blog banner

Operation system

Blog banner

Jira service Management

Blog banner

INTRANET

Blog banner

Decision Tree: A Diagram Model

Blog banner

What is OS Fingerprinting?

Blog banner

I/O Buffering

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Memory Management

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner

Network Forensics Tools and Techniques

Blog banner

Os assignment

Blog banner

semaphores

Blog banner

MEMORY HIERARCHY

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

Uniprocessor and Types

Blog banner

Study of Backdoor and Trojan tools

Blog banner

8 Reasons Why You Must Try Digital Marketing

Blog banner

Operating system

Blog banner

Security Breaches in Stock market trading

Blog banner

Memory managment

Blog banner

Im Photographer

Blog banner

Travel: Everything Everywhere!

Blog banner

File management

Blog banner

Virtual Machine

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Best password managers: Reviews of the top products

Blog banner

GIS Mapping

Blog banner

Direct Memory Access

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

What is OS and its overview

Blog banner