wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory in os

profile
Disha Parekh
Aug 14, 2024
0 Likes
0 Discussions
129 Reads

Virtual memory is a crucial concept in operating systems that allows for the efficient management of a computer's memory resources. It enables systems to execute larger applications or multiple applications simultaneously, even when the physical memory is limited.


Virtual memory operates primarily through two techniques: paging and segmentation.

- Paging divides the virtual memory into fixed-size pages and maps them onto physical frames in RAM. When a program needs data that isn’t currently in RAM, the OS retrieves it from disk storage (swap space) and loads it into RAM.

- Segmentation involves dividing the virtual address space into segments based on logical divisions, such as functions or objects, which can vary in size

-Benefits:

- Increased Effective Memory Size: Virtual memory allows systems to run larger applications than could fit into RAM.

- Isolation and Protection: Each process operates in its own virtual address space, preventing them from interfering with each other’s memory.

- Efficient Use of RAM: By keeping only active pages in physical memory and swapping inactive ones out, the system can maintain responsiveness even under heavy load.

-While virtual memory offers significant advantages, it can also introduce performance overhead:

- Page Faults: When a program accesses a page not currently in RAM, a page fault occurs, leading to delays as the system retrieves data from disk.

- Thrashing: If the system spends more time swapping pages in and out than executing processes, performance degrades significantly.

systems running database management systems (DBMS) benefit from virtual memory when handling large datasets that exceed physical memory limits.

Additionally, operating systems like Windows, Linux, and macOS implement sophisticated algorithms for page replacement (e.g., Least Recently Used - LRU), which significantly impact how well these systems perform under various conditions


53003230100

Disha parekh


Comments ()


Sign in

Read Next

Linux Virtual Machine Process Scheduling

Blog banner

Child labour

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Drawing tips for a beginner

Blog banner

Uber

Blog banner

What is Email? Uses of Emails

Blog banner

My Favorite Sportsperson

Blog banner

Student Grade Calculator in LISP

Blog banner

Data Warehouse Bus Matrix

Blog banner

FRIENDSHIP

Blog banner

Full Disk Encryption

Blog banner

MY FIRST BLOG?

Blog banner

Device driver

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Computer security techniques

Blog banner

Service stratergy principles

Blog banner

Importance of Website

Blog banner

Khau Galli – Vile Parle

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Decision Tree: A Diagram Model

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Deadlock in Operating systems

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

Street foods

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Deadlock and Starvation

Blog banner

Ola

Blog banner

Amazon

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

Hey Aryan here

Blog banner

A book review

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Deadlock and starvation in operating system

Blog banner

Semaphores

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

Virtual memory

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

Security Issues and Countermeasures

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner