SlideShare a Scribd company logo
Course Title – Computer Architecture And Organization
Course Code – CSE 322
Presentation Topic- Virtual Memory
Submitted By-
1) Sanjana Moon – ID : 163-15-8443
◦ 2) Maisha Mumtaz – ID : 163-15- 8438
◦ 3) Iffat Firozy - ID: 163-15-8432
◦ 4) Sharmin Akter – ID: 163-15-8436
◦ 5) Umme Fatema Tuj – ID: 163-15-8395
◦ Submitted To –
Mr. Gazi Zhirul Islam (Assistant Professor)
Dept of CSE
Khandakar Sanjana Akter
ID : 163-15-8443
What is Virtual Memory ?
Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as
though it were part of main memory.
The purpose of virtual memory is to enlarge the ”Address Space”
With virtual memory –
A system can load larger programs or multiple programs running at the same time, allowing each one
to operate as if it has infinite memory and without having to purchase more RAM.
Virtual Memory can be implemented via-
◦ Demand Paging
◦ Demand segmentation
Virtual Memory Diagram
Secondary Memory
How Does it Works?
Why we use it?
Multitasking
When a computer user opens multiple programs at once, the data for these programs must be
stored in memory for quick access. The more programs are open, the more memory is needed.
When the computer's physical memory is full, the excess data is stored in virtual memory.
Large Programs
virtual memory allows programmers to create larger and more complex applications. When
these programs are running, they occupy physical memory as well as virtual memory.
Maisha Mumtaz Monsur
ID:163-15-8438
What is mapping process?
The transformation of data from main memory to cache memory is
called mapping.
Usually every process has its own mapping table.
There are three different types of mapping used for the purpose of cache
memory are as follow:
1. Direct mapping,
2. Associative mapping,
3.and Set-Associative mapping.
Demand Paging
* Bring a page into memory only when it is needed
.Less I/O needed
.Less memory needed
.Faster response
.More users
* Page is needed ⇒ reference to it
.invalid reference ⇒ abort
.not-in-memory ⇒ bring to memory
Transfer of a Paged Memory to Contiguous Disk Space
Iffat Firozy
ID- 163-15-8432
Process
A process is an instance of a program running in a computer. It is
close in meaning to task , a term used in some operating systems.
In other words, process is the state of a running program.
Address Translation
Example
Sharmin Akter
ID: 163-15-8436
Paging
Paging is a method of writing data and reading it from,
secondary storage for use in primary storage, also known as
main memory. Paging plays a role in memory management
for a computer's OS (operating system).
Page Tables
A page table is the data structure used by a virtual memory system in
a computer operating system to store the mapping between virtual
addresses and physical addresses.
The entire page table may take up too much main memory.
Page tables are also stored in virtual memory.
When a process is running, part of its page table is in main memory.
Page Size
Smaller page size, less amount of internal fragmentation.
Smaller page size, more pages required per process.
More pages per process means larger page tables.
Larger page tables means large portion of page tables in virtual
memory.
Page Faults
A page fault is a type of exception raised by computer hardware
when a running program accesses a memory page that is not
currently mapped by memory management unit (MMU) into the
virtual address space of a process or we can say, A miss in the page
table is called a page fault.
When the “valid” bit is not set to 1, then the page must be brought in
from disk, possibly replacing another page in memory.
Umme Fatema Tuj Asha
ID: 163-15-8395
Virtual Memory Sharing
Virtual memory makes it easy for processes to share memory as
all memory accesses are decoded using page tables. For processes
to share the same virtual memory, the same physical pages are
referenced by many processes.
The page tables for each process contain the Page Table Entries that
have the same physical PFN.
Figure: Sharing Physical Memory Between Processes.
Figure shows two processes that each have physical piece2 in
their virtual memory map.
Advantages and Disadvantages of
Virtual Memory
Advantages
1. Protection
2. Sharing
VM supports
◦ Swapping
Disadvantages
Memory requirements (mapping tables)
Longer memory access times (mapping table lookup)

More Related Content

What's hot

Demand paging
Demand pagingDemand paging
Demand paging
Trinity Dwarka
 
Virtual Memory
Virtual MemoryVirtual Memory
Virtual Memory
Archith777
 
Operating system paging and segmentation
Operating system paging and segmentationOperating system paging and segmentation
Operating system paging and segmentation
hamza haseeb
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
Kumar Pritam
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
tamizh arthanari
 
basics of virtual memory
basics of virtual memorybasics of virtual memory
basics of virtual memory
Adarsh Patel
 
Memory management ppt
Memory management pptMemory management ppt
Memory management ppt
ManishaJha43
 
Virtual memory
Virtual memoryVirtual memory
Virtual memoryAnuj Modi
 
Memory hierarchy
Memory hierarchyMemory hierarchy
Memory hierarchy
Anurag Verma
 
contiguous memory allocation.pptx
contiguous memory allocation.pptxcontiguous memory allocation.pptx
contiguous memory allocation.pptx
Rajapriya82
 
Computer architecture pipelining
Computer architecture pipeliningComputer architecture pipelining
Computer architecture pipelining
Mazin Alwaaly
 
Memory organization (Computer architecture)
Memory organization (Computer architecture)Memory organization (Computer architecture)
Memory organization (Computer architecture)
Sandesh Jonchhe
 
Cache memory
Cache memoryCache memory
Cache memoryAnuj Modi
 
Memory Management
Memory ManagementMemory Management
Memory Management
DEDE IRYAWAN
 
Cache memory
Cache memoryCache memory
Cache memory
Ansari Maviya
 
Parallel processing
Parallel processingParallel processing
Parallel processing
Syed Zaid Irshad
 

What's hot (20)

Demand paging
Demand pagingDemand paging
Demand paging
 
Virtual Memory
Virtual MemoryVirtual Memory
Virtual Memory
 
Operating system paging and segmentation
Operating system paging and segmentationOperating system paging and segmentation
Operating system paging and segmentation
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
basics of virtual memory
basics of virtual memorybasics of virtual memory
basics of virtual memory
 
Virtual memory
Virtual memory Virtual memory
Virtual memory
 
Memory management ppt
Memory management pptMemory management ppt
Memory management ppt
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
VIRTUAL MEMORY
VIRTUAL MEMORYVIRTUAL MEMORY
VIRTUAL MEMORY
 
Memory hierarchy
Memory hierarchyMemory hierarchy
Memory hierarchy
 
contiguous memory allocation.pptx
contiguous memory allocation.pptxcontiguous memory allocation.pptx
contiguous memory allocation.pptx
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
Computer architecture pipelining
Computer architecture pipeliningComputer architecture pipelining
Computer architecture pipelining
 
Memory organization (Computer architecture)
Memory organization (Computer architecture)Memory organization (Computer architecture)
Memory organization (Computer architecture)
 
Cache memory
Cache memoryCache memory
Cache memory
 
Memory Management
Memory ManagementMemory Management
Memory Management
 
Cache memory
Cache memoryCache memory
Cache memory
 
Parallel processing
Parallel processingParallel processing
Parallel processing
 

Similar to Virtual Memory

virtual memory.ppt
virtual memory.pptvirtual memory.ppt
virtual memory.ppt
suryansh85
 
Os unit 2
Os unit 2Os unit 2
Os unit 2
Arnav Chowdhury
 
Virtual Memory
Virtual MemoryVirtual Memory
Virtual Memory
vampugani
 
NOV11 virtual memory.ppt
NOV11 virtual memory.pptNOV11 virtual memory.ppt
NOV11 virtual memory.ppt
PratikBose10
 
Abhaycavirtual memory and the pagehit.pptx
Abhaycavirtual memory and the pagehit.pptxAbhaycavirtual memory and the pagehit.pptx
Abhaycavirtual memory and the pagehit.pptx
wemoji5816
 
NOV11 virtual memory.ppt
NOV11 virtual memory.pptNOV11 virtual memory.ppt
NOV11 virtual memory.ppt
AshokRachapalli1
 
Chapter 09 - Virtual Memory.ppt
Chapter 09 - Virtual Memory.pptChapter 09 - Virtual Memory.ppt
Chapter 09 - Virtual Memory.ppt
MonirJihad1
 
Paging +Algorithem+Segmentation+memory management
Paging +Algorithem+Segmentation+memory managementPaging +Algorithem+Segmentation+memory management
Paging +Algorithem+Segmentation+memory management
kazim Hussain
 
Power Point Presentation on Virtual Memory.ppt
Power Point Presentation on Virtual Memory.pptPower Point Presentation on Virtual Memory.ppt
Power Point Presentation on Virtual Memory.ppt
RahulRaj395610
 
Memory management
Memory managementMemory management
Memory management
Vishal Singh
 
OS Presentation 2023.pptx
OS Presentation 2023.pptxOS Presentation 2023.pptx
OS Presentation 2023.pptx
ShayanAli68
 
VirutualMemory.docx
VirutualMemory.docxVirutualMemory.docx
VirutualMemory.docx
rangarajansoft69
 
virtual memory
virtual memoryvirtual memory
virtual memory
Abeer Naskar
 
virtual memory
virtual memoryvirtual memory
virtual memory
sangrampatil81
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
Muhammad Asad Chattha
 
unit5_os (1).pptx
unit5_os (1).pptxunit5_os (1).pptx
unit5_os (1).pptx
PriyankaJadhav218236
 
Os
OsOs
Memory management ppt coa
Memory management ppt coaMemory management ppt coa
Memory management ppt coa
Bharti Khemani
 
Demand paging
Demand pagingDemand paging
Demand paging
SwaroopSorte
 

Similar to Virtual Memory (20)

virtual memory.ppt
virtual memory.pptvirtual memory.ppt
virtual memory.ppt
 
Os unit 2
Os unit 2Os unit 2
Os unit 2
 
Virtual Memory
Virtual MemoryVirtual Memory
Virtual Memory
 
NOV11 virtual memory.ppt
NOV11 virtual memory.pptNOV11 virtual memory.ppt
NOV11 virtual memory.ppt
 
Abhaycavirtual memory and the pagehit.pptx
Abhaycavirtual memory and the pagehit.pptxAbhaycavirtual memory and the pagehit.pptx
Abhaycavirtual memory and the pagehit.pptx
 
NOV11 virtual memory.ppt
NOV11 virtual memory.pptNOV11 virtual memory.ppt
NOV11 virtual memory.ppt
 
Chapter 09 - Virtual Memory.ppt
Chapter 09 - Virtual Memory.pptChapter 09 - Virtual Memory.ppt
Chapter 09 - Virtual Memory.ppt
 
Paging +Algorithem+Segmentation+memory management
Paging +Algorithem+Segmentation+memory managementPaging +Algorithem+Segmentation+memory management
Paging +Algorithem+Segmentation+memory management
 
Power Point Presentation on Virtual Memory.ppt
Power Point Presentation on Virtual Memory.pptPower Point Presentation on Virtual Memory.ppt
Power Point Presentation on Virtual Memory.ppt
 
Memory management
Memory managementMemory management
Memory management
 
OS Presentation 2023.pptx
OS Presentation 2023.pptxOS Presentation 2023.pptx
OS Presentation 2023.pptx
 
VirutualMemory.docx
VirutualMemory.docxVirutualMemory.docx
VirutualMemory.docx
 
virtual memory
virtual memoryvirtual memory
virtual memory
 
virtual memory
virtual memoryvirtual memory
virtual memory
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
unit5_os (1).pptx
unit5_os (1).pptxunit5_os (1).pptx
unit5_os (1).pptx
 
Memory virtualization
Memory virtualizationMemory virtualization
Memory virtualization
 
Os
OsOs
Os
 
Memory management ppt coa
Memory management ppt coaMemory management ppt coa
Memory management ppt coa
 
Demand paging
Demand pagingDemand paging
Demand paging
 

More from sanjana mun

Tech aware website design
Tech aware website designTech aware website design
Tech aware website design
sanjana mun
 
Adaptation & Personalization of web application
Adaptation & Personalization of web applicationAdaptation & Personalization of web application
Adaptation & Personalization of web application
sanjana mun
 
Impact of TV and video games on childrens
Impact of TV and video games on childrensImpact of TV and video games on childrens
Impact of TV and video games on childrens
sanjana mun
 
Fragmentaton
Fragmentaton Fragmentaton
Fragmentaton
sanjana mun
 
Tools for system analysis
Tools for system analysisTools for system analysis
Tools for system analysis
sanjana mun
 
Network topologies
Network topologiesNetwork topologies
Network topologies
sanjana mun
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
sanjana mun
 
Electrical circuit verification of K irchhoff’s Current Law(KCL) & Current di...
Electrical circuit verification of K irchhoff’s Current Law(KCL) & Current di...Electrical circuit verification of K irchhoff’s Current Law(KCL) & Current di...
Electrical circuit verification of K irchhoff’s Current Law(KCL) & Current di...
sanjana mun
 
Exceptions
ExceptionsExceptions
Exceptions
sanjana mun
 
square matrix
square matrixsquare matrix
square matrix
sanjana mun
 
Basic C Structure and related terms with example
Basic C Structure and related terms with exampleBasic C Structure and related terms with example
Basic C Structure and related terms with example
sanjana mun
 
Application's of Numerical Math in CSE
Application's of Numerical Math in CSEApplication's of Numerical Math in CSE
Application's of Numerical Math in CSE
sanjana mun
 
Road accident and student's protest at Bangladesh
Road accident and student's protest  at Bangladesh Road accident and student's protest  at Bangladesh
Road accident and student's protest at Bangladesh
sanjana mun
 

More from sanjana mun (13)

Tech aware website design
Tech aware website designTech aware website design
Tech aware website design
 
Adaptation & Personalization of web application
Adaptation & Personalization of web applicationAdaptation & Personalization of web application
Adaptation & Personalization of web application
 
Impact of TV and video games on childrens
Impact of TV and video games on childrensImpact of TV and video games on childrens
Impact of TV and video games on childrens
 
Fragmentaton
Fragmentaton Fragmentaton
Fragmentaton
 
Tools for system analysis
Tools for system analysisTools for system analysis
Tools for system analysis
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Electrical circuit verification of K irchhoff’s Current Law(KCL) & Current di...
Electrical circuit verification of K irchhoff’s Current Law(KCL) & Current di...Electrical circuit verification of K irchhoff’s Current Law(KCL) & Current di...
Electrical circuit verification of K irchhoff’s Current Law(KCL) & Current di...
 
Exceptions
ExceptionsExceptions
Exceptions
 
square matrix
square matrixsquare matrix
square matrix
 
Basic C Structure and related terms with example
Basic C Structure and related terms with exampleBasic C Structure and related terms with example
Basic C Structure and related terms with example
 
Application's of Numerical Math in CSE
Application's of Numerical Math in CSEApplication's of Numerical Math in CSE
Application's of Numerical Math in CSE
 
Road accident and student's protest at Bangladesh
Road accident and student's protest  at Bangladesh Road accident and student's protest  at Bangladesh
Road accident and student's protest at Bangladesh
 

Recently uploaded

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 

Recently uploaded (20)

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 

Virtual Memory

  • 1. Course Title – Computer Architecture And Organization Course Code – CSE 322 Presentation Topic- Virtual Memory Submitted By- 1) Sanjana Moon – ID : 163-15-8443 ◦ 2) Maisha Mumtaz – ID : 163-15- 8438 ◦ 3) Iffat Firozy - ID: 163-15-8432 ◦ 4) Sharmin Akter – ID: 163-15-8436 ◦ 5) Umme Fatema Tuj – ID: 163-15-8395 ◦ Submitted To – Mr. Gazi Zhirul Islam (Assistant Professor) Dept of CSE
  • 3. What is Virtual Memory ? Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of main memory. The purpose of virtual memory is to enlarge the ”Address Space” With virtual memory – A system can load larger programs or multiple programs running at the same time, allowing each one to operate as if it has infinite memory and without having to purchase more RAM. Virtual Memory can be implemented via- ◦ Demand Paging ◦ Demand segmentation
  • 5. How Does it Works?
  • 6. Why we use it? Multitasking When a computer user opens multiple programs at once, the data for these programs must be stored in memory for quick access. The more programs are open, the more memory is needed. When the computer's physical memory is full, the excess data is stored in virtual memory. Large Programs virtual memory allows programmers to create larger and more complex applications. When these programs are running, they occupy physical memory as well as virtual memory.
  • 8. What is mapping process? The transformation of data from main memory to cache memory is called mapping.
  • 9. Usually every process has its own mapping table.
  • 10. There are three different types of mapping used for the purpose of cache memory are as follow: 1. Direct mapping, 2. Associative mapping, 3.and Set-Associative mapping.
  • 11. Demand Paging * Bring a page into memory only when it is needed .Less I/O needed .Less memory needed .Faster response .More users * Page is needed ⇒ reference to it .invalid reference ⇒ abort .not-in-memory ⇒ bring to memory
  • 12. Transfer of a Paged Memory to Contiguous Disk Space
  • 14. Process A process is an instance of a program running in a computer. It is close in meaning to task , a term used in some operating systems. In other words, process is the state of a running program.
  • 18. Paging Paging is a method of writing data and reading it from, secondary storage for use in primary storage, also known as main memory. Paging plays a role in memory management for a computer's OS (operating system).
  • 19. Page Tables A page table is the data structure used by a virtual memory system in a computer operating system to store the mapping between virtual addresses and physical addresses. The entire page table may take up too much main memory. Page tables are also stored in virtual memory. When a process is running, part of its page table is in main memory.
  • 20. Page Size Smaller page size, less amount of internal fragmentation. Smaller page size, more pages required per process. More pages per process means larger page tables. Larger page tables means large portion of page tables in virtual memory.
  • 21. Page Faults A page fault is a type of exception raised by computer hardware when a running program accesses a memory page that is not currently mapped by memory management unit (MMU) into the virtual address space of a process or we can say, A miss in the page table is called a page fault. When the “valid” bit is not set to 1, then the page must be brought in from disk, possibly replacing another page in memory.
  • 22. Umme Fatema Tuj Asha ID: 163-15-8395
  • 23. Virtual Memory Sharing Virtual memory makes it easy for processes to share memory as all memory accesses are decoded using page tables. For processes to share the same virtual memory, the same physical pages are referenced by many processes. The page tables for each process contain the Page Table Entries that have the same physical PFN.
  • 24. Figure: Sharing Physical Memory Between Processes. Figure shows two processes that each have physical piece2 in their virtual memory map.
  • 25. Advantages and Disadvantages of Virtual Memory Advantages 1. Protection 2. Sharing VM supports ◦ Swapping Disadvantages Memory requirements (mapping tables) Longer memory access times (mapping table lookup)