wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Anam Maruf
Aug 13, 2024
0 Likes
0 Discussions
93 Reads

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.

It is a technique that is implemented using both hardware and software. It maps memory addresses used by a program, called virtual addresses, into physical addresses in computer memory. 

  • All memory references within a process are logical addresses that are dynamically translated into physical address at run time. This means that a process can be swapped in and out of the main memory such that it occupies different places in the main memory at different times during the course of execution.
  • There are two main types of virtual memory:

    • Paging
    • Segmentation
    • Paging divides memory into small fixed-size blocks called pages. When the computer runs out of RAM, pages that aren’t currently in use are moved to the hard drive, into an area called a swap file. The swap file acts as an extension of RAM. When a page is needed again, it is swapped back into RAM, a process known as page swapping. This ensures that the operating system (OS) and applications have enough memory to run

    •  

      Segmentation divides virtual memory into segments of different sizes. Segments that aren’t currently needed can be moved to the hard drive. The system uses a segment table to keep track of each segment’s status, including whether it’s in memory, if it’s been modified, and its physical address. Segments are mapped into a process’s address space only when needed.


Comments ()


Sign in

Read Next

Oracle Corporation

Blog banner

Tableau

Blog banner

Metasploit

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

Modern operating system

Blog banner

Real Time Scheduling

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

To travel is to live

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Design Considerations for Disk Cache Management

Blog banner

Answer

Blog banner

IT RISK

Blog banner

Clustering Techniques

Blog banner

A Short History of GIS

Blog banner

Virtual Machine

Blog banner

CONCURRENCY

Blog banner

PPT methodology

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Operating system

Blog banner

Password Generator - Lisp

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Kernel in Operating System

Blog banner

Data Warehousing

Blog banner

Photorec - media recovery tool

Blog banner

Expert System In AI

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

Direct Memory Access

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

How to Run your First android App

Blog banner

M commerce

Blog banner

Memory Management

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

Direct Memory Access

Blog banner

Processes : Process description and control

Blog banner

Threading

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Development Of Modern Operating System

Blog banner

ahh wait a min

Blog banner

Uniprocessor Scheduling

Blog banner

Why Friendship at Work is Important

Blog banner