wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Abhijit Rajpurohit
Jul 11, 2023
0 Likes
0 Discussions
95 Reads

Virtual memory is a way of representing your memory that's abstracted from the physical memory on your machine. It makes use of both your RAM and your storage space, whether that's on a traditional hard drive or an SSD. In Linux, this is done at the kernel and hardware levels².

Linux supports virtual memory, that is, using a disk as an extension of RAM so that the effective size of usable memory grows correspondingly. The kernel will write the contents of a currently unused block of memory to the hard disk so that the memory can be used for another purpose¹.

Virtual memory takes advantage of the fact that not all of the memory that's being used in theory is being used all of the time. Programs in memory are broken down into pages and the parts that the kernel deems as unnecessary are "swapped out," or moved to the hard drive. When they're needed, they can be "swapped in," or brought back into RAM².

The space used for virtual memory on a drive is known as "backing store," or "swap space." In the Windows world, it's usually implemented as a file, known as a "swap file." It's also possible to do this in Linux, but it's much more common to use a dedicated disk partition².

The upshot of virtual memory is that it's possible to run large programs by using more memory than the physical RAM in your machine. Virtual memory also allows developers to create applications without having to know how a computer's memory is organized².

The main downside historically with virtual memory has been that hard drives have been slower than RAM. If a machine doesn't have enough RAM, the system can keep swapping pages in and out endlessly, a process known as "thrashing." This is less of an issue on modern PCs with more RAM and faster SSDs displacing mechanical hard drives, but it's still something to be aware of


Comments ()


Sign in

Read Next

Introduction to Data Science: Life Cycle & Applications

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

Landslide Hazard

Blog banner

Virtual Machine

Blog banner

Electronic Funds Transfer

Blog banner

Ransomware

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

IOT- Internet Of Things

Blog banner

Os Virtual Memory

Blog banner

File management

Blog banner

GIS

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

Advantage of freedom

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

Outlook.com

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

MySQL

Blog banner

Swiggi

Blog banner

Memory management

Blog banner

Theads

Blog banner

CyberSecurity Color Wheel

Blog banner

Penetration Testing

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

Data Visualization in Decision-Making

Blog banner

What is Spyware?

Blog banner

What is Virtual Memory

Blog banner

DATA WRANGLING

Blog banner

AI and Cyber Security

Blog banner

Security Issues and Countermeasures

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

Scala - a programming tool

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

Uniprocessor and Types

Blog banner

Number Guessing game --lisp

Blog banner

Types of Threads

Blog banner

Quality check in IT services

Blog banner

Data Science & AI

Blog banner

Web Site

Blog banner

MUTUAL EXCLUSION

Blog banner

MODERN OPERATING SYSTEMS

Blog banner