wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Darshan Tank
Aug 12, 2024
0 Likes
0 Discussions
65 Reads

Virtual memory 

In computing, virtual memory, or virtual storage, is a memory managament technique that provides an idealized abstraction of the storage resources that are actually available on a given machin which, creates the illusion to users of a very large (main) memory.

The computer's oprating system, using a combination of hardware and software, maps momery addresses used by a program, called virtual addresses, into physical addresses in computer memory. main storage, as seen by a process or task, appears as a contiguous address space or collection of contiguous segments. The operating system manages virtual address spaces and the assignment of real memory to virtual memory.

The primary benefits of virtual memory include freeing applications from having to manage a shared memory space, ability to share memory used by libraries between processes, increased security due to memory isolation, and being able to conceptually use more memory than might be physically available, using the technique of paging or segmentation.

Properties

Virtual memory makes application programming easier by hiding fragmentation of physical memory, by delegating to the kernel the burden of managing the memory hierarchy. (eliminating the need for the program to handle overlays explicitly); and, when each process is run in its own dedicated address space, by obviating the need to relocate program code or to access memory with relative addressing.

 memory virtualization can be considered a generalization of the concept of virtual memory.

Advantages of Virtual Memory

1.The degree of Multiprogramming will be increased.

2. User can run large application with less real RAM.

3. There is no need to buy more memory RAMs.

Disadvantages of Virtual Memory

  1. The system becomes slower since swapping takes time.
  2. It takes more time in switching between applications.
  3. The user will have the lesser hard disk space for its use.

Comments ()


Sign in

Read Next

Apache Spark :- Powerful Data Processing Tool

Blog banner

Capacity management in ITSM

Blog banner

security requirements for safe e-payment

Blog banner

OS ASSIGNMENT

Blog banner

Elegant fashion style

Blog banner

Retiring ISS

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

The Role of cryptography in cyber security

Blog banner

ProofHub

Blog banner

Paginng In OS

Blog banner

Computer Security

Blog banner

Life of an army person

Blog banner

Benefits and drawback of web security.

Blog banner

Security issues

Blog banner

All you need to know about “On-page SEO”

Blog banner

Types of Malware in Cyber Security

Blog banner

Blog on health and fitness

Blog banner

Mariana Trench: The deepest depths

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

memory managment

Blog banner

KASHMIR TRIPS

Blog banner

Mobile Security

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Domain Name System

Blog banner

Deadlock

Blog banner

Getting into Anime

Blog banner

Child labour

Blog banner

AI and cyber Security

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

semaphores in os

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Improving the Accuracy of GPS and GNSS

Blog banner

The Five Steps of Data Science

Blog banner

Direct Memory Access

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

Password Generator - Lisp

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Traveling

Blog banner

I/O buffer and its techniques

Blog banner

The functions of operating system

Blog banner

The IT Service Lifecycle

Blog banner

Subnet Masking

Blog banner