wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Darshan Tank
Aug 12, 2024
0 Likes
0 Discussions
65 Reads

Virtual memory 

In computing, virtual memory, or virtual storage, is a memory managament technique that provides an idealized abstraction of the storage resources that are actually available on a given machin which, creates the illusion to users of a very large (main) memory.

The computer's oprating system, using a combination of hardware and software, maps momery addresses used by a program, called virtual addresses, into physical addresses in computer memory. main storage, as seen by a process or task, appears as a contiguous address space or collection of contiguous segments. The operating system manages virtual address spaces and the assignment of real memory to virtual memory.

The primary benefits of virtual memory include freeing applications from having to manage a shared memory space, ability to share memory used by libraries between processes, increased security due to memory isolation, and being able to conceptually use more memory than might be physically available, using the technique of paging or segmentation.

Properties

Virtual memory makes application programming easier by hiding fragmentation of physical memory, by delegating to the kernel the burden of managing the memory hierarchy. (eliminating the need for the program to handle overlays explicitly); and, when each process is run in its own dedicated address space, by obviating the need to relocate program code or to access memory with relative addressing.

 memory virtualization can be considered a generalization of the concept of virtual memory.

Advantages of Virtual Memory

1.The degree of Multiprogramming will be increased.

2. User can run large application with less real RAM.

3. There is no need to buy more memory RAMs.

Disadvantages of Virtual Memory

  1. The system becomes slower since swapping takes time.
  2. It takes more time in switching between applications.
  3. The user will have the lesser hard disk space for its use.

Comments ()


Sign in

Read Next

The Right way of cooking

Blog banner

Importance of modern technology era

Blog banner

Deadlock in Operating System

Blog banner

The application udemy

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

MUTUAL EXCLUSION

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

USES OF WHATSAPP

Blog banner

Cyber Security Control

Blog banner

Virtual Memory

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

Service Design Model

Blog banner

Multiprocessor

Blog banner

Pink sauce pasta

Blog banner

How to write a cover letter

Blog banner

Be you

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Deadlock in operating system

Blog banner

Deadlocks

Blog banner

GraphQL

Blog banner

Virtual memory in windows

Blog banner

Indian Culture and Tradition

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Data Visualization

Blog banner

Starvation

Blog banner

Virtual memory in Operating System

Blog banner

DBMS and various career options related to it.

Blog banner

IT service level agreement

Blog banner

FREE VERSION OF G-MAIL

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

ADIDAS

Blog banner

Fault Tolerance

Blog banner

Question

Blog banner

Risk management in IT

Blog banner

Different types of scam Fraud

Blog banner

Theads

Blog banner

Why Data Security Is Important

Blog banner

WomenEmpowerment

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

FRIENDSHIP

Blog banner