wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cache memory

profile
Bhargav Patel
Jul 03, 2024
0 Likes
0 Discussions
65 Reads

Cache memory is basically a kind of random access memory (RAM) which is inbuilt in processor. The cache memory is used to built a bridge of speed gap between the fast CPU and slow RAM therefore it improves overall performance of the computer.

There are 2 parts of cache memory:

1) Inbuilt cache processor 

Level 1: Level 1 cache memory is the smallest in size but the fast among all four. It is located inside the processor. It is separated into instructions cache (L1i) and data cache (L1d). Every core has its own dedicate L1 cache

Level 2: level 2 cache memory is a little bigger size than level 1. It is also slow as compare to Level 1. It is dedicate to one single core or shared between multiple core.

Level 3: level 3 cache memory has bigger size than level 2 but is faster than level 2. It is dedicated to multiple core only.

2) Advanced Cache Configurations

Level 4: level 4 is not inbuilt but it must be close to processor to perform its best. It is used when high performance task. Not all computers have level 4 cache memory.

Advantages of cache memory:

1) High Speed access: Cache memory is faster than RAM because it's frequently access data and instructions rather than being idle.

2)improvement in Performance: Cache memory improves performance by minimising the average time of access data. 

3)High Speed: nowadays processor is so fast that RAM could not provide data at right time. To overcome this problem cache memory sync the ram and processor 

Disadvantage of cache memory: 

1) Cost: The cost to make cache memory is more expensive than RAM due to technology and materials used to achieve such high speed and low latency

2) Complexity: design of cache memory is very complex. All levels require different design. 

3)Security: cache memory can be attacked with the help of certain types of side channel attacks. This provides the hacker to use and manipulate our sensitive data. 

 

 

 


Comments ()


Sign in

Read Next

Modern Operating Systems

Blog banner

Advantage of freedom

Blog banner

IOT- Internet Of Things

Blog banner

Ethical Hacking

Blog banner

Evolution of Operating system

Blog banner

EFT

Blog banner

PHISHING

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Memory Management Techniques

Blog banner

Decision Tree: A Diagram Model

Blog banner

TEAMWORK

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

My Favorite Sportsperson

Blog banner

SQL Injection practice on DVWA

Blog banner

Processing Crime and Incident Scenes

Blog banner

Routers

Blog banner

GIS

Blog banner

Uniprocessor and Types

Blog banner

On-Page SEO

Blog banner

Cyber Forensic in the Banking sector

Blog banner

NodeJs

Blog banner

Kernel in Operating System

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Importance Of Education.

Blog banner

Secure Hypertext transfer protocol

Blog banner

Data Analytics in Data Science

Blog banner

Design Considerations for Disk Cache Management

Blog banner

ASANA- A Management System.

Blog banner

Process states

Blog banner

Cache Memory

Blog banner

Electronic Funds Transfer

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

THREADS (assignment 1)

Blog banner

What is Segmentation?

Blog banner

Semaphores

Blog banner

SMARTSHEET

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

Dekkers Algorithm

Blog banner

Uber

Blog banner

What is service level Agreement?

Blog banner

Memory management

Blog banner