Paged virtual memory - computer architecture, Computer Engineering

Paged virtual memory:

Mostly all implementations of virtual memory divide the virtual address space of an application program into pages; a page is a block that contains contiguous virtual memory addresses. Pages are generally at least 4K bytes in size, and systems with big virtual address ranges or big amounts of real memory (for example: RAM) generally use larger page sizes.

Page tables

Mostly all the implementations use page tables to translate the virtual addresses of application program into physical addresses (also referred to as "real addresses") used by the hardware to process instructions. Each entry in the page table have a mapping for a virtual page to either the real memory address at which the page is stored, or an pointer that the page is presently held in a disk file. (Although most of the system does, some systems cannot support use of a disk file for virtual memory.)

Systems can have 1 page table for the overall system or a distinct page table for each application. If there is only 1, different applications which are running at the one time share a single virtual address space, for example they use different parts of a single range of VA. Systems which are use multiple page tables provide multiple virtual address spaces - concurrent applications think they are utilizing the same range of VA, but their separate page tables redirect to different real addresses.

 

 

Posted Date: 10/13/2012 5:35:10 AM | Location : United States







Related Discussions:- Paged virtual memory - computer architecture, Assignment Help, Ask Question on Paged virtual memory - computer architecture, Get Answer, Expert's Help, Paged virtual memory - computer architecture Discussions

Write discussion on Paged virtual memory - computer architecture
Your posts are moderated
Related Questions
Describe the role of Software developers Software developers have wide experience of tackling such issues. Students who develop software project spending days and nights strug

What are the two methods to resolve collision during hashing. The two methods to resolve collision during hashing are: a) Open addressing and b) Chaining.

Whole idea of ISDN is to digitize the telephone network to permit transmission of video, audio and text over existing telephone lines. The purpose of ISDN is to provide fully integ

Write a script that will first initialize a string variable that will kept x and y coordinates of a point in the form 'x 3.1 y 6.4'.  Then, use string manipulating functions to ext

Advantages of Object oriented analysis design The OO approach inherently makes every object a standalone component which can be reused within specific stat problem domains we

Why does DMA have priority over the CPU when both request a memory transfer? The data transfer monitored by DMA controller which is called as DMA channel. The CPU is included o

Value Value is the relative amount of light and darkness in an image or a particular colour within an image. Value is also known as Tone and refers to the way the artist has re

Equivalence between VHDL and C? There is concept of understanding in C there is structure.Based upon requirement structure provide facility to store collection of various data

. NET is Compile Time OR RunTime Environment?   .Net's framework has CLS,CTS and CLR.CTS checks declaration of types at the time when u write code and CLS explains some rules a

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4