wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Neha Mendapara
Jul 04, 2024
0 Likes
0 Discussions
135 Reads

Virtual memory in operating system is defined as technique of management of memory where main memory can be stored in secondary memory as if it is a part of it. So let us understand why is it called virtual memory? A memory management which provides an idealized representation of the storage resources available on a machine, creating the illusion for users of having a very large main memory. It is the space of HDD or SSD that acts as a part of system's RAM(Random Access Memory). Virtual Memory or Virtual Storage is enacted using "demand paging". A page is only loaded into memory when it is specifically referenced. Now let's grasp some knowledge about how virtual storage is operated. The operating system splits memory with a set number of addresses into pagefiles or swap files. The optimistic advantage of virtual memory are as follows:-

 1.Large Memory:-Virtual memory gives more storage area as compared to physically present in the system by utilizing disk space as an extension of physical RAM.

 2.Memory paging:- It divides memory into fixed-size blocks called pages so that day is allocated in an organized way

 3.Demand Paging: An optimization technique used with virtual memory where pages are loaded into RAM only when they are needed, rather than loading the entire program into memory at once. There are many advantages of it but as a coin has two sides there are some flaws also of it. Some of the disadvantages of Virtual Memory are as follows:-

  1. Complexity:-Virtual memory are complex to implement and maintain.They require sophisticated algorithms for page replacement, memory allocation, and address translation, which can be challenging to optimize and debug.
  2. Fragmentation in virtual memory systems can disrupt efficient memory allocation by either dividing free memory into non-contiguous small blocks (external fragmentation) or allocating more memory than is needed (internal fragmentation). These issues complicate memory management and can impair system performance. 
  3.  Security Risks:-Virtual memory poses security risks due to the potential exposure of sensitive data left in memory pages that are swapped out to disk without proper erasure. Effective management and encryption of swapped-out pages are essential measures to address these vulnerabilities.Virtual memory is crucial for modern operating systems as it allows efficient and flexible use of memory resources, enhancing overall system performance and usability.                         

Neha mendapara

53003230074

Div A


Comments ()


Sign in

Read Next

MODERN OPERATING SYSTEM

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

What is Network Security?

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

'Positivity in life'

Blog banner

Evolution of Operating System

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

E-mail security

Blog banner

Never give up

Blog banner

Direct Memory Access

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

Mariana Trench: The deepest depths

Blog banner

Multiprocessor and Multicore Organization

Blog banner

The Five Steps of Data Science

Blog banner

Mumbai Metro 3

Blog banner

Worms, viruses and Bots

Blog banner

Memory Management in Operating System

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Evolution of Operating System

Blog banner

I/O Buffering

Blog banner

Threads

Blog banner

Life lesson

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Elements and Principles of Photography

Blog banner

Memory Management

Blog banner

Blockchain in IoT Applications

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

Visualization in Data Science

Blog banner

Making Money through Instagram

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Article on Fresh Book

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

DNS Cache

Blog banner

Proton mail

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

Linux 94

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Session Hijacking Techniques

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner