wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Darshan Tank
Aug 12, 2024
0 Likes
0 Discussions
64 Reads

Virtual memory 

In computing, virtual memory, or virtual storage, is a memory managament technique that provides an idealized abstraction of the storage resources that are actually available on a given machin which, creates the illusion to users of a very large (main) memory.

The computer's oprating system, using a combination of hardware and software, maps momery addresses used by a program, called virtual addresses, into physical addresses in computer memory. main storage, as seen by a process or task, appears as a contiguous address space or collection of contiguous segments. The operating system manages virtual address spaces and the assignment of real memory to virtual memory.

The primary benefits of virtual memory include freeing applications from having to manage a shared memory space, ability to share memory used by libraries between processes, increased security due to memory isolation, and being able to conceptually use more memory than might be physically available, using the technique of paging or segmentation.

Properties

Virtual memory makes application programming easier by hiding fragmentation of physical memory, by delegating to the kernel the burden of managing the memory hierarchy. (eliminating the need for the program to handle overlays explicitly); and, when each process is run in its own dedicated address space, by obviating the need to relocate program code or to access memory with relative addressing.

 memory virtualization can be considered a generalization of the concept of virtual memory.

Advantages of Virtual Memory

1.The degree of Multiprogramming will be increased.

2. User can run large application with less real RAM.

3. There is no need to buy more memory RAMs.

Disadvantages of Virtual Memory

  1. The system becomes slower since swapping takes time.
  2. It takes more time in switching between applications.
  3. The user will have the lesser hard disk space for its use.

Comments ()


Sign in

Read Next

PROCESS CONTROL BLOCK IN OS

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

E-commerce

Blog banner

Outlook mail

Blog banner

Internet of Things

Blog banner

How to feel Happy everyday day

Blog banner

Fashion design

Blog banner

City of Mumbai (Bombay):

Blog banner

How to Conquer Depression ?

Blog banner

Traditional UNIX Scheduling

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

Modern operating systems (OS)

Blog banner

GIS

Blog banner

Article on Zoho Corporation

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

Steganography and Steganalysis

Blog banner

Risk mitigation and management

Blog banner

Types of Hackers.

Blog banner

Virtualisation

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Stop Racism

Blog banner

LISP - Library Management System

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Memory Management

Blog banner

Assignment-3

Blog banner

Pandas Matrix Applications

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

Blockchain Transactions

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Different types of scam Fraud

Blog banner

undefined

Blog banner

Routers

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

SQL Injection practice on DVWA

Blog banner

NodeJs

Blog banner

Deadlock

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

A True Friendship

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

MODERN OPERATING SYSTEM

Blog banner