wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Maxson Yee
Jul 04, 2024
0 Likes
0 Discussions
111 Reads

Virtual memory is a memory management technique used by operating systems to provide an application with more logical memory than what is physically available in the system. It gives headway for logical memory and allows for efficient and safe use of memory, enabling multitasking and the execution of large programs. It also prevents you from hitting bottlenecks with the main memory(RAM) of your system. Because processes vary
in size, if the processor switches among a number of processes it is difficult to pack them compactly into main memory. Here’s a detailed explanation of virtual memory:

Virtual Address Space: Each process is given its own virtual address space, which is a contiguous range of addresses. This space is divided into chunks called pages. Whereas physical address space refers to the actual RAM installed in the system.

Pages: The virtual address space is divided into fixed-size blocks called pages. The physical memory is divided into blocks of the same size as pages, called page frames. A program references a word by means of a virtual address consisting of a page number and an offset within the page.

Each page of a process may be located anywhere in main memory. The paging system provides for a dynamic mapping between the virtual address used in the program and a real address, or a physical address, in the main memory. Each process has a page table that maps virtual addresses to physical addresses. This table keeps track of which virtual page is stored in the hard drive.

All the pages of a process are maintained on the hard drive. When a process is executing, some of its pages are in main memory. If reference is made to a page that is not in main memory, the memory management hardware detects this and arranges for the missing page to be loaded. An example of this would be that when you are in a game, the game will obviously not load in every single asset or map in the game, it will only load the maps you are playing on and the assets which are either in your immediate vicinity or assets that are visible on screen.

A designated area on a storage device (like a hard drive or SSD) is used to extend physical memory via virtual memory. Pages that are not actively used can be moved to swap space to free up RAM. Typically virtual memory should only be 3 times the size of the main memory at its maximum.

Virtual memory is an important component of modern operating systems, enabling more flexible and efficient use of memory resources, and allowing for more complex and larger applications to run smoothly on limited physical memory.


Comments ()


Sign in

Read Next

Computer Security

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Types of Threads

Blog banner

Internet of Things

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Mumbai local ......

Blog banner

Web Site

Blog banner

Operating system

Blog banner

Ola

Blog banner

Social engineering in cyber security

Blog banner

Deadlock

Blog banner

Getting started with Android Studio

Blog banner

What does the Australian summer have in store for your oral health?

Blog banner

What is Spyware?

Blog banner

Evolution of Operating Sytems

Blog banner

Threads in OS

Blog banner

Health and fitness

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

CyberSecurity Color Wheel

Blog banner

Virtual Machine

Blog banner

Deadlock

Blog banner

Big Data Architecture

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Interrupts in OS

Blog banner

My Favorite Country

Blog banner

Starvation and Deadlock.

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

Optimization of operating system design

Blog banner

Harsh Rathod

Blog banner

INTERRUPTS

Blog banner

Embaded operating system

Blog banner

Compromising Mobile Platforms

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

Article on different management system

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Security and E-mail

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

What is E-commerce

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner