wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Darshan Tank
Aug 12, 2024
0 Likes
0 Discussions
64 Reads

Virtual memory 

In computing, virtual memory, or virtual storage, is a memory managament technique that provides an idealized abstraction of the storage resources that are actually available on a given machin which, creates the illusion to users of a very large (main) memory.

The computer's oprating system, using a combination of hardware and software, maps momery addresses used by a program, called virtual addresses, into physical addresses in computer memory. main storage, as seen by a process or task, appears as a contiguous address space or collection of contiguous segments. The operating system manages virtual address spaces and the assignment of real memory to virtual memory.

The primary benefits of virtual memory include freeing applications from having to manage a shared memory space, ability to share memory used by libraries between processes, increased security due to memory isolation, and being able to conceptually use more memory than might be physically available, using the technique of paging or segmentation.

Properties

Virtual memory makes application programming easier by hiding fragmentation of physical memory, by delegating to the kernel the burden of managing the memory hierarchy. (eliminating the need for the program to handle overlays explicitly); and, when each process is run in its own dedicated address space, by obviating the need to relocate program code or to access memory with relative addressing.

 memory virtualization can be considered a generalization of the concept of virtual memory.

Advantages of Virtual Memory

1.The degree of Multiprogramming will be increased.

2. User can run large application with less real RAM.

3. There is no need to buy more memory RAMs.

Disadvantages of Virtual Memory

  1. The system becomes slower since swapping takes time.
  2. It takes more time in switching between applications.
  3. The user will have the lesser hard disk space for its use.

Comments ()


Sign in

Read Next

Memory heirchy

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Functions of Operating System

Blog banner

Virtual Memory

Blog banner

Memory Management in an Operating System

Blog banner

Functions of operating system

Blog banner

Virtual Machine's

Blog banner

Women Empowerment

Blog banner

Direct Memory Access

Blog banner

Microsoft Windows Overview

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

virtual memory

Blog banner

Blockchain technology: security risk and prevention

Blog banner

What is Email? Uses of Emails

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Dal Bafla Recipe

Blog banner

SPEM

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

Boxing

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Culture Of Ladakh

Blog banner

Use case of K-means clustering

Blog banner

Ethical Hacking

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Starvation

Blog banner

Spyware

Blog banner

Scheduling

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

Pooja Silver

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Photography

Blog banner

Deadlock and Starvation

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

URL vs Domain

Blog banner

Balance

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Beauty of indian railway

Blog banner

My favourite food

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

DISK SCHEDULING

Blog banner