wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory hierarchy

profile
Kush Patel
Jul 05, 2024
0 Likes
0 Discussions
82 Reads

Main memory, alternatively RAM (Random Access Memory), is a cache that is following. Though slower, it is significantly larger than both cache and registers. It acts as an expanded storage space for the current data and active processes. Ram has a quick reading and writing speed than the secondary memory because it is volatile meaning it loses stored information when power goes off.

Secondary storage implies disks (e.g., hard disk drives (HDDs) or solid-state drives (SSDs)) such as HDDs and SSDs. These devices are non-volatile; they retain data even after power has been switched off while costing less per bit of information saved compared to RAM in terms of capacity. They are however much slower which makes them not very useful for direct data retrieval by the CPU during active tasks. Secondary storage is best suited to long-term storage for operating systems, applications, and large files.

The principle of memory hierarchy constitutes the central element of computer architecture and is grounded on the length of processing, size, and costs. There are strategies of using this hierarchy in a most effective way, such as data caching, memory management, and the application of algorithms that help the computer to go to the necessary memory layers faster that include the CPU cache and then main memory. With the help of additional memory chips, so-called cache that holds frequently accessed data, it will become possible for the computer to offload secondary data from vast yet inexpensive storage unit to a slower one and so can it ensure both high speeding retrieval of data and high data-handling functionality.

Ensuring a well-organized memory hierarchy is a fundamental key to system architects, developers, and engineers who are striving to make the computational operations more efficient and overall system performance more effective.

Div:A

Kush Patel 

53003230107


Comments ()


Sign in

Read Next

Importance Of Time

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Types of Malware in Cyber Security

Blog banner

Excel records

Blog banner

Define Instagram.

Blog banner

Emerging threats in cyber Forensics

Blog banner

Use case of K-means clustering

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Hosting basics

Blog banner

SESSION HIJACKING

Blog banner

Not anti-social, but pro-solitude

Blog banner

Deadlock

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

The functions of operating system

Blog banner

Principal of concurrency

Blog banner

c

Blog banner

MY FIRST BLOG?

Blog banner

GIS Mapping

Blog banner

Process and Threading

Blog banner

MEMORY HIERARCHY

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

File Management

Blog banner

Modern Operating Systems

Blog banner

GOOGLE

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

Security Issues and Countermeasures

Blog banner

Famous Indian dishes that where misunderstood to be Indian

Blog banner

Internet of Things

Blog banner

What is a Dumpster Diving Attack?

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

Cache Memory

Blog banner

Fitness

Blog banner

Docker Framework

Blog banner

IoT Architecture Based Security

Blog banner

File management -disha parekh

Blog banner

Why we fail after giving 100% ?

Blog banner

Linux 94

Blog banner

10 Interesting Facts about Death Note

Blog banner

Starvation

Blog banner