wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Neha Mendapara
Jul 04, 2024
0 Likes
0 Discussions
135 Reads

Virtual memory in operating system is defined as technique of management of memory where main memory can be stored in secondary memory as if it is a part of it. So let us understand why is it called virtual memory? A memory management which provides an idealized representation of the storage resources available on a machine, creating the illusion for users of having a very large main memory. It is the space of HDD or SSD that acts as a part of system's RAM(Random Access Memory). Virtual Memory or Virtual Storage is enacted using "demand paging". A page is only loaded into memory when it is specifically referenced. Now let's grasp some knowledge about how virtual storage is operated. The operating system splits memory with a set number of addresses into pagefiles or swap files. The optimistic advantage of virtual memory are as follows:-

 1.Large Memory:-Virtual memory gives more storage area as compared to physically present in the system by utilizing disk space as an extension of physical RAM.

 2.Memory paging:- It divides memory into fixed-size blocks called pages so that day is allocated in an organized way

 3.Demand Paging: An optimization technique used with virtual memory where pages are loaded into RAM only when they are needed, rather than loading the entire program into memory at once. There are many advantages of it but as a coin has two sides there are some flaws also of it. Some of the disadvantages of Virtual Memory are as follows:-

  1. Complexity:-Virtual memory are complex to implement and maintain.They require sophisticated algorithms for page replacement, memory allocation, and address translation, which can be challenging to optimize and debug.
  2. Fragmentation in virtual memory systems can disrupt efficient memory allocation by either dividing free memory into non-contiguous small blocks (external fragmentation) or allocating more memory than is needed (internal fragmentation). These issues complicate memory management and can impair system performance. 
  3.  Security Risks:-Virtual memory poses security risks due to the potential exposure of sensitive data left in memory pages that are swapped out to disk without proper erasure. Effective management and encryption of swapped-out pages are essential measures to address these vulnerabilities.Virtual memory is crucial for modern operating systems as it allows efficient and flexible use of memory resources, enhancing overall system performance and usability.                         

Neha mendapara

53003230074

Div A


Comments ()


Sign in

Read Next

Maharashtrian culture: Tradition, Art, Food

Blog banner

Virus

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Expert System In AI

Blog banner

Virtual Machine's

Blog banner

Operating system

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

To travel is to live

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

VIRTUAL MACHINES

Blog banner

Metasploit

Blog banner

Security Issues

Blog banner

ODOO

Blog banner

Deadlock

Blog banner

Interrupts

Blog banner

Emailing the merger document

Blog banner

Virtual memory

Blog banner

OPERATING SYSTEM

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Starvation

Blog banner

Swiggi

Blog banner

What is Minting & Mining

Blog banner

Tracking Emails & Email Crimes

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

Predicting Student Performance with Data Science

Blog banner

Visualization in Data Science

Blog banner

Cyber Security Control

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

Supervised and Unsupervised Learning

Blog banner

Indian Culture and Tradition

Blog banner

Music helps reduce stress

Blog banner

What is Spyware? and examples of them.

Blog banner

Travel: Everything Everywhere!

Blog banner

Real-time Scheduling - 53003230061

Blog banner

10 Interesting facts you should know!!!

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Race Conditions

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Deadlock and Starvation

Blog banner