wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual Memory

profile
Jainam mehta
Aug 13, 2024
0 Likes
0 Discussions
74 Reads

                        VIRTUAL MEMORY

 

Introduction: Virtual memory is a crucial concept in modern operating systems, allowing them to manage and utilize physical memory (RAM) more efficiently. It enables a computer to compensate for physical memory shortages, by temporarily transferring data from random access memory (RAM) to disk storage.

Key concepts :

Paging: Divides virtual memory into small blocks called pages, which are mapped to physical memory as needed.

Page Table: A data structure that maps virtual addresses to physical addresses.

Page Fault: Occurs when a program accesses a page not currently in RAM, prompting the OS to load it from disk.

Swapping: Moves inactive pages from RAM to disk to free up memory for other processes.

Thrashing: When excessive swapping degrades system performance.

Benefits of Virtual Memory:

Isolation and Security: Virtual memory provides each process with its own isolated memory space, preventing one process from accessing or corrupting another's memory.

Efficient Memory Utilization: Virtual memory allows the OS to use physical memory more efficiently, allocating memory to processes as needed and swapping out inactive pages.

Support for Large Applications: Programs can use more memory than what is physically available, as the OS can load and unload parts of the program as needed.


Comments ()


Sign in

Read Next

File management

Blog banner

City of Mumbai (Bombay):

Blog banner

Deadlock and Starvation

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Basic Security For SOAP Services

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

Cache memory

Blog banner

Bit Coins

Blog banner

1.1 basic elements

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Business Intelligence v/s Big Data

Blog banner

An Overview of Virtual Machines

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Memory Management

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

MAILFENCE

Blog banner

HUBSPOT

Blog banner

SECURITY TOOLS

Blog banner

Man is free by the birth .

Blog banner

THE ACTORS LIFE

Blog banner

Zomato (Income Sources)

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

Outlook mail

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

The Laws of Karma

Blog banner

Digital Forensics Challenges and Tools

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Note on Process, Process creation and Process termination

Blog banner

Risk mitigation and management

Blog banner

Khau Galli – Vile Parle

Blog banner

CONCURRENCY

Blog banner

Types of Malware in Cyber Security

Blog banner

Why Friendship at Work is Important

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

Trends that began during the pandemic

Blog banner

What is M-commerce and how it's work

Blog banner

Virtual Machine

Blog banner

Direct memory access

Blog banner

Operating Systems Overview

Blog banner

Process and Threading

Blog banner