wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory heirchy

profile
Jwala the Beast
Jul 05, 2024
0 Likes
0 Discussions
83 Reads

Memory Hierarchy is one of the most required things in Computer Memory as it helps in optimizing the memory available in the computer. There are multiple levels present in the memory, each one having a different size, different cost, etc. Some types of memory like cache, and main memory are faster as compared to other types of memory but they are having a little less size and are also costly whereas some memory has a little higher storage value, but they are a little slower. Accessing of data is not similar in all types of memory, some have faster access whereas some have slower access.

 

Types of Memory Hierarchy 

This Memory Hierarchy Design is divided into 2 main types:

 

External Memory or Secondary Memory: Comprising of Magnetic Disk, Optical Disk, and Magnetic Tape i.e. peripheral storage devices which are accessible by the processor via an I/O Module.

Internal Memory or Primary Memory: Comprising of Main Memory, Cache Memory & CPU registers. This is directly accessible by the processor.

Memory Hierarchy Design

 

Memory Hierarchy Design

1. Registers

Registers are small, high-speed memory units located in the CPU. They are used to store the most frequently used data and instructions. Registers have the fastest access time and the smallest storage capacity, typically ranging from 16 to 64 bits.

 

2. Cache Memory

Cache memory is a small, fast memory unit located close to the CPU. It stores frequently used data and instructions that have been recently accessed from the main memory. Cache memory is designed to minimize the time it takes to access data by providing the CPU with quick access to frequently used data.

 

3. Main Memory

Main memory, also known as RAM (Random Access Memory), is the primary memory of a computer system. It has a larger storage capacity than cache memory, but it is slower. Main memory is used to store data and instructions that are currently in use by the CPU.

 

Types of Main Memory

Static RAM: Static RAM stores the binary information in flip flops and information remains valid until power is supplied. It has a faster access time and is used in implementing cache memory.

Dynamic RAM: It stores the binary information as a charge on the capacitor. It requires refreshing circuitry to maintain the charge on the capacitors after a few milliseconds. It contains more memory cells per unit area as compared to SRAM.

4. Secondary Storage

Secondary storage, such as hard disk drives (HDD) and solid-state drives (SSD), is a non-volatile memory unit that has a larger storage capacity than main memory. It is used to store data and instructions that are not currently in use by the CPU. Secondary storage has the slowest access time and is typically the least expensive type of memory in the memory hierarchy.

 

5. Magnetic Disk

Magnetic Disks are simply circular plates that are fabricated with either a metal or a plastic or a magnetized material. The Magnetic disks work at a high speed inside the computer and these are frequently used.

 

6. Magnetic Tape

Magnetic Tape is simply a magnetic recording device that is covered with a plastic film. It is generally used for the backup of data. In the case of a magnetic tape, the access time for a computer is a little slower and therefore, it requires some amount of time for accessing the strip.


Comments ()


Sign in

Read Next

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

Dancing Classes In Mumbai

Blog banner

Regression Analysis

Blog banner

Principal of concurrency

Blog banner

Operating Systems

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

Memory Management

Blog banner

How to make Pancakes

Blog banner

Man is free by the birth .

Blog banner

RAID

Blog banner

Threads

Blog banner

Bit Coins

Blog banner

Cache Memory(142)

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

Malware Defense

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

MySQL

Blog banner

Short note on expert system

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

Critical success factors

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

Message Passing in OS

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

AI and cyber Security

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Multiprocessor scheduling

Blog banner

Jira Software

Blog banner

Scheduling

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

operating system

Blog banner

Operating System

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Virtual memory

Blog banner

Virtual Memory

Blog banner

ODOO

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Basic Security For SOAP Services

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner