wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Darshan Tank
Aug 12, 2024
0 Likes
0 Discussions
65 Reads

Virtual memory 

In computing, virtual memory, or virtual storage, is a memory managament technique that provides an idealized abstraction of the storage resources that are actually available on a given machin which, creates the illusion to users of a very large (main) memory.

The computer's oprating system, using a combination of hardware and software, maps momery addresses used by a program, called virtual addresses, into physical addresses in computer memory. main storage, as seen by a process or task, appears as a contiguous address space or collection of contiguous segments. The operating system manages virtual address spaces and the assignment of real memory to virtual memory.

The primary benefits of virtual memory include freeing applications from having to manage a shared memory space, ability to share memory used by libraries between processes, increased security due to memory isolation, and being able to conceptually use more memory than might be physically available, using the technique of paging or segmentation.

Properties

Virtual memory makes application programming easier by hiding fragmentation of physical memory, by delegating to the kernel the burden of managing the memory hierarchy. (eliminating the need for the program to handle overlays explicitly); and, when each process is run in its own dedicated address space, by obviating the need to relocate program code or to access memory with relative addressing.

 memory virtualization can be considered a generalization of the concept of virtual memory.

Advantages of Virtual Memory

1.The degree of Multiprogramming will be increased.

2. User can run large application with less real RAM.

3. There is no need to buy more memory RAMs.

Disadvantages of Virtual Memory

  1. The system becomes slower since swapping takes time.
  2. It takes more time in switching between applications.
  3. The user will have the lesser hard disk space for its use.

Comments ()


Sign in

Read Next

Operating Systems

Blog banner

Cache memory

Blog banner

Social Engineering Attacks

Blog banner

RAID - LEVELS OF RAID

Blog banner

Raid

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Operating System Objectives and Functions

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Cyber Security Standards

Blog banner

What are NFT s?

Blog banner

RAID_142

Blog banner

URL vs Domain

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

MYNTRA

Blog banner

"Life as a Part-time Student"

Blog banner

Yahoo! mail

Blog banner

How return on investment is defined in IT services

Blog banner

SQL Injection

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

Artical on FreshBooks

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Pipedrive

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

GIS Topography

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Health and fitness

Blog banner

Amazon

Blog banner

FIREWALL

Blog banner

Multiple processor scheduling

Blog banner

Zero-Day Attack

Blog banner

Process states

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

Sessions In OS.

Blog banner

Semaphores

Blog banner

Preparing Students for Higher Education: How International Schools Shape Future Success

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

USPS mail

Blog banner

E-security systems | CCTV

Blog banner