wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual Memory

profile
Harsh Jain
Jul 11, 2023
0 Likes
0 Discussions
40 Reads

Virtual memory is a technique used by computer systems to effectively manage the limited amount of physical memory (RAM) available. It allows the computer to access more memory than actually exists by using a combination of RAM and the hard disk.

In simple terms, virtual memory acts as a temporary storage space for data and instructions that are currently not in use. When an application is running, it requires a certain amount of memory to store its data and instructions. However, if the computer's physical memory is full, the operating system can transfer some of the less frequently used data and instructions from the RAM to the hard disk.

This process is known as paging, where the operating system divides the virtual memory into small fixed-sized blocks called pages. Each page is stored either in the RAM or on the hard disk. When a program needs to access a certain page, the operating system checks if it is present in the RAM. If it is, then it is directly accessed. If not, the operating system chooses a page from RAM to be moved to the hard disk, making space for the required page to be brought in from the hard disk.

The Virtual Memory Manager is responsible for managing this process. It keeps track of which pages are in the RAM and which are on the hard disk. It also decides which pages need to be moved in and out of the RAM based on the program's requirements and the availability of space.

One advantage of virtual memory is that it allows multiple programs to run simultaneously, even if the physical memory is insufficient. Each program is allocated a certain amount of virtual memory, making it appear as if it has dedicated memory space.

However, virtual memory does have its limitations. Since the hard disk is slower than RAM, accessing data from the hard disk takes more time, resulting in slower performance. This is known as "thrashing" and can occur if there are too many programs running simultaneously, causing frequent page swapping between the RAM and the hard disk.

In conclusion, virtual memory is a useful technique that allows computer systems to efficiently manage memory resources. It enables more programs to run simultaneously and provides the illusion of having more memory than is physically available. By intelligently swapping pages between the RAM and the hard disk, virtual memory ensures that the most frequently used data and instructions remain in the RAM, resulting in efficient program execution.


Comments ()


Sign in

Read Next

Wedding photographer

Blog banner

Service transition principles

Blog banner

UniProcessor Scheduling

Blog banner

Memory input output management

Blog banner

Study of Sniffing Tools

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

Deadlock

Blog banner

Risk management in IT

Blog banner

Uber

Blog banner

Starvation

Blog banner

OPERATING SYSTEM

Blog banner

Indian Culture and Tradition

Blog banner

Mumbai Metro 3

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Why Friendship at Work is Important

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

Pooja Silver

Blog banner

INTERRUPTS

Blog banner

How to use open SSL for web server - browser communication

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

Threads in OS

Blog banner

The Khan mehtab transforming the modular switches

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

 " Healing of Yoga "

Blog banner

Different Types of Data

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Deadlock and Starvation

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

A BLOG ON MYSQL

Blog banner

Mobile Survey

Blog banner

Uniprocessor and Types

Blog banner

Threat management

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

Memory management

Blog banner

Supervised and Unsupervised Learning

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

OS assignment 3

Blog banner

Child labour

Blog banner

Metasploit

Blog banner