wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory in os

profile
Disha Parekh
Aug 14, 2024
0 Likes
0 Discussions
129 Reads

Virtual memory is a crucial concept in operating systems that allows for the efficient management of a computer's memory resources. It enables systems to execute larger applications or multiple applications simultaneously, even when the physical memory is limited.


Virtual memory operates primarily through two techniques: paging and segmentation.

- Paging divides the virtual memory into fixed-size pages and maps them onto physical frames in RAM. When a program needs data that isn’t currently in RAM, the OS retrieves it from disk storage (swap space) and loads it into RAM.

- Segmentation involves dividing the virtual address space into segments based on logical divisions, such as functions or objects, which can vary in size

-Benefits:

- Increased Effective Memory Size: Virtual memory allows systems to run larger applications than could fit into RAM.

- Isolation and Protection: Each process operates in its own virtual address space, preventing them from interfering with each other’s memory.

- Efficient Use of RAM: By keeping only active pages in physical memory and swapping inactive ones out, the system can maintain responsiveness even under heavy load.

-While virtual memory offers significant advantages, it can also introduce performance overhead:

- Page Faults: When a program accesses a page not currently in RAM, a page fault occurs, leading to delays as the system retrieves data from disk.

- Thrashing: If the system spends more time swapping pages in and out than executing processes, performance degrades significantly.

systems running database management systems (DBMS) benefit from virtual memory when handling large datasets that exceed physical memory limits.

Additionally, operating systems like Windows, Linux, and macOS implement sophisticated algorithms for page replacement (e.g., Least Recently Used - LRU), which significantly impact how well these systems perform under various conditions


53003230100

Disha parekh


Comments ()


Sign in

Read Next

Information Technology In E- Commerce

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Telegram and it's features

Blog banner

Deadlock

Blog banner

semaphores in os

Blog banner

Fitness regime by Deepesh

Blog banner

Disk scheduling

Blog banner

Processes: Process Description and Control.

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Electronic data interchange

Blog banner

Spotify

Blog banner

virtual machine

Blog banner

DISK SCHEDULING

Blog banner

Big O Notation

Blog banner

Evolution of Operating Sytems

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

BUFFER OVERFLOW_142

Blog banner

security requirements for safe e-payment

Blog banner

Data Warehouse Bus Matrix

Blog banner

memory cache

Blog banner

Malware Defense

Blog banner

Mesh Topology

Blog banner

Google classroom

Blog banner

Android Flashlight Application

Blog banner

How return on investment is defined in IT services

Blog banner

Boxing

Blog banner

5 Stages of Digital Marketing

Blog banner

Developments in Modern Operating Systems

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

Data Science in Mental Health Prediction

Blog banner

Scheduling

Blog banner

John Titor: The Time Traveler

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

How to kiss

Blog banner

What is Spyware?

Blog banner

Indian Food

Blog banner

Loneliness

Blog banner

Memory management

Blog banner

CREATE A DAILY SERIES

Blog banner

Shoulders

Blog banner

Virtual memory

Blog banner