wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Anam Maruf
Aug 13, 2024
0 Likes
0 Discussions
93 Reads

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.

It is a technique that is implemented using both hardware and software. It maps memory addresses used by a program, called virtual addresses, into physical addresses in computer memory. 

  • All memory references within a process are logical addresses that are dynamically translated into physical address at run time. This means that a process can be swapped in and out of the main memory such that it occupies different places in the main memory at different times during the course of execution.
  • There are two main types of virtual memory:

    • Paging
    • Segmentation
    • Paging divides memory into small fixed-size blocks called pages. When the computer runs out of RAM, pages that aren’t currently in use are moved to the hard drive, into an area called a swap file. The swap file acts as an extension of RAM. When a page is needed again, it is swapped back into RAM, a process known as page swapping. This ensures that the operating system (OS) and applications have enough memory to run

    •  

      Segmentation divides virtual memory into segments of different sizes. Segments that aren’t currently needed can be moved to the hard drive. The system uses a segment table to keep track of each segment’s status, including whether it’s in memory, if it’s been modified, and its physical address. Segments are mapped into a process’s address space only when needed.


Comments ()


Sign in

Read Next

Deadlock in Operating System

Blog banner

Child labour

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

Memory Management

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

Threat management

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Uber

Blog banner

What is Spyware?

Blog banner

Apple

Blog banner

Smitten Kitchen Keepers

Blog banner

Deadlock in operating system

Blog banner

10 Reasons why Monica and Chandler are the best couple ever.!!!

Blog banner

Modern operating system

Blog banner

VIDEO INTERVIEWS : A NEW ECOSYSTEM TO GET DREAM JOBS

Blog banner

FASHION

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Business Intelligence v/s Big Data

Blog banner

Student Grade Calculator in LISP

Blog banner

Hey Aryan here

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

Data Science & AI

Blog banner

CRISP-DM Methodology

Blog banner

ProofHub

Blog banner

File management

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

Regression Analysis

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

The evolution of OS

Blog banner

Clustering Techniques

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

Processing Crime and Incident Scenes

Blog banner

Use case of K-means clustering

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

Jira Software

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

A Short History of GIS

Blog banner

Odoo

Blog banner