wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cache memory

profile
Bhargav Patel
Jul 03, 2024
0 Likes
0 Discussions
65 Reads

Cache memory is basically a kind of random access memory (RAM) which is inbuilt in processor. The cache memory is used to built a bridge of speed gap between the fast CPU and slow RAM therefore it improves overall performance of the computer.

There are 2 parts of cache memory:

1) Inbuilt cache processor 

Level 1: Level 1 cache memory is the smallest in size but the fast among all four. It is located inside the processor. It is separated into instructions cache (L1i) and data cache (L1d). Every core has its own dedicate L1 cache

Level 2: level 2 cache memory is a little bigger size than level 1. It is also slow as compare to Level 1. It is dedicate to one single core or shared between multiple core.

Level 3: level 3 cache memory has bigger size than level 2 but is faster than level 2. It is dedicated to multiple core only.

2) Advanced Cache Configurations

Level 4: level 4 is not inbuilt but it must be close to processor to perform its best. It is used when high performance task. Not all computers have level 4 cache memory.

Advantages of cache memory:

1) High Speed access: Cache memory is faster than RAM because it's frequently access data and instructions rather than being idle.

2)improvement in Performance: Cache memory improves performance by minimising the average time of access data. 

3)High Speed: nowadays processor is so fast that RAM could not provide data at right time. To overcome this problem cache memory sync the ram and processor 

Disadvantage of cache memory: 

1) Cost: The cost to make cache memory is more expensive than RAM due to technology and materials used to achieve such high speed and low latency

2) Complexity: design of cache memory is very complex. All levels require different design. 

3)Security: cache memory can be attacked with the help of certain types of side channel attacks. This provides the hacker to use and manipulate our sensitive data. 

 

 

 


Comments ()


Sign in

Read Next

Deadlock

Blog banner

Disk Management

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

A buffer overflow

Blog banner

INTRANET

Blog banner

Deadlock and Starvation

Blog banner

VPN

Blog banner

HubSpot

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Mobile Survey

Blog banner

Electronic Funds Transfer

Blog banner

Emailing the merger document

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

How to grow followers on Instagram business account?

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Bots and Cyber Security

Blog banner

Health and fitness

Blog banner

Deadlock in Operating systems

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

Landslide Hazard

Blog banner

Virtual machine

Blog banner

Supervised and unsupervised learning

Blog banner

S-Tool : Steganography

Blog banner

How to tie a Tie

Blog banner

Types Of scheduling

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Deadlock and Starvation

Blog banner

MAILFENCE

Blog banner

Understanding Business Layer in Data Science

Blog banner

Embaded operating system

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Depression

Blog banner

Memory management

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Cross site scripting Attack

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Direct memory access

Blog banner

GIS

Blog banner

Service Catalogue Management

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner