wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Darshan Tank
Aug 12, 2024
0 Likes
0 Discussions
64 Reads

Virtual memory 

In computing, virtual memory, or virtual storage, is a memory managament technique that provides an idealized abstraction of the storage resources that are actually available on a given machin which, creates the illusion to users of a very large (main) memory.

The computer's oprating system, using a combination of hardware and software, maps momery addresses used by a program, called virtual addresses, into physical addresses in computer memory. main storage, as seen by a process or task, appears as a contiguous address space or collection of contiguous segments. The operating system manages virtual address spaces and the assignment of real memory to virtual memory.

The primary benefits of virtual memory include freeing applications from having to manage a shared memory space, ability to share memory used by libraries between processes, increased security due to memory isolation, and being able to conceptually use more memory than might be physically available, using the technique of paging or segmentation.

Properties

Virtual memory makes application programming easier by hiding fragmentation of physical memory, by delegating to the kernel the burden of managing the memory hierarchy. (eliminating the need for the program to handle overlays explicitly); and, when each process is run in its own dedicated address space, by obviating the need to relocate program code or to access memory with relative addressing.

 memory virtualization can be considered a generalization of the concept of virtual memory.

Advantages of Virtual Memory

1.The degree of Multiprogramming will be increased.

2. User can run large application with less real RAM.

3. There is no need to buy more memory RAMs.

Disadvantages of Virtual Memory

  1. The system becomes slower since swapping takes time.
  2. It takes more time in switching between applications.
  3. The user will have the lesser hard disk space for its use.

Comments ()


Sign in

Read Next

Music helps reduce stress

Blog banner

Predicting Student Performance with Data Science

Blog banner

How to Run your First android App

Blog banner

Importance of modern technology era

Blog banner

Linux Threads:

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Deadlock in operating system

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Direct Memory Access

Blog banner

Google App Engine

Blog banner

Malware

Blog banner

Pooja Silver

Blog banner

Mendeley (management software)

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

Security requirements for Safe E-Payments

Blog banner

operating system

Blog banner

Understanding Mobile Device Forensics

Blog banner

City of Mumbai (Bombay):

Blog banner

Privacy in Social Media and Online Services

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner

Assignment-3

Blog banner

Types of Hackers.

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Zomato (Income Sources)

Blog banner

Disk scheduling

Blog banner

Uniprocessor scheduling

Blog banner

Dekkers Algorithm

Blog banner

JIRA SOFTWARE

Blog banner

Data Exfiltration

Blog banner

Pandas Matrix Applications

Blog banner

File Systems in OS.

Blog banner

Routers

Blog banner

Types of Threads

Blog banner

DNS Cache

Blog banner

Cherish the Craft — Essential Tips to Maintain Your Patola Collection

Blog banner

Deadlock and Starvation

Blog banner

To travel is to live

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

Concept and definition of m-commerce

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner