wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Darshan Tank
Aug 12, 2024
0 Likes
0 Discussions
65 Reads

Virtual memory 

In computing, virtual memory, or virtual storage, is a memory managament technique that provides an idealized abstraction of the storage resources that are actually available on a given machin which, creates the illusion to users of a very large (main) memory.

The computer's oprating system, using a combination of hardware and software, maps momery addresses used by a program, called virtual addresses, into physical addresses in computer memory. main storage, as seen by a process or task, appears as a contiguous address space or collection of contiguous segments. The operating system manages virtual address spaces and the assignment of real memory to virtual memory.

The primary benefits of virtual memory include freeing applications from having to manage a shared memory space, ability to share memory used by libraries between processes, increased security due to memory isolation, and being able to conceptually use more memory than might be physically available, using the technique of paging or segmentation.

Properties

Virtual memory makes application programming easier by hiding fragmentation of physical memory, by delegating to the kernel the burden of managing the memory hierarchy. (eliminating the need for the program to handle overlays explicitly); and, when each process is run in its own dedicated address space, by obviating the need to relocate program code or to access memory with relative addressing.

 memory virtualization can be considered a generalization of the concept of virtual memory.

Advantages of Virtual Memory

1.The degree of Multiprogramming will be increased.

2. User can run large application with less real RAM.

3. There is no need to buy more memory RAMs.

Disadvantages of Virtual Memory

  1. The system becomes slower since swapping takes time.
  2. It takes more time in switching between applications.
  3. The user will have the lesser hard disk space for its use.

Comments ()


Sign in

Read Next

A small world of Sockets

Blog banner

Save Girl Child

Blog banner

OS- Assignnment 1

Blog banner

URL vs Domain

Blog banner

Best password managers: Reviews of the top products

Blog banner

Process Description

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Modern Operating Systems.

Blog banner

Monday. com App

Blog banner

Trello ( management software)

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

Modern Operating System

Blog banner

How to kiss

Blog banner

Cloud Security: Trends and Innovations

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

Security in Operating Systems

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

Operating Systems

Blog banner

Instagram

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

Subnet Masking

Blog banner

virtual machine

Blog banner

File system

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Making Money through Instagram

Blog banner

Game Theory in Blockchain

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Harsh Rathod

Blog banner

Social Media Marketing Trends 2022

Blog banner

Elegant fashion style

Blog banner

To travel is to live

Blog banner

Risk management in IT

Blog banner

Embaded operating system

Blog banner

Models of Information Security.

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Concurrency and memory

Blog banner

DIGITAL ECONOMY

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

Service Transition Process in ITSM

Blog banner