wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cache memory

profile
Bhargav Patel
Jul 03, 2024
0 Likes
0 Discussions
65 Reads

Cache memory is basically a kind of random access memory (RAM) which is inbuilt in processor. The cache memory is used to built a bridge of speed gap between the fast CPU and slow RAM therefore it improves overall performance of the computer.

There are 2 parts of cache memory:

1) Inbuilt cache processor 

Level 1: Level 1 cache memory is the smallest in size but the fast among all four. It is located inside the processor. It is separated into instructions cache (L1i) and data cache (L1d). Every core has its own dedicate L1 cache

Level 2: level 2 cache memory is a little bigger size than level 1. It is also slow as compare to Level 1. It is dedicate to one single core or shared between multiple core.

Level 3: level 3 cache memory has bigger size than level 2 but is faster than level 2. It is dedicated to multiple core only.

2) Advanced Cache Configurations

Level 4: level 4 is not inbuilt but it must be close to processor to perform its best. It is used when high performance task. Not all computers have level 4 cache memory.

Advantages of cache memory:

1) High Speed access: Cache memory is faster than RAM because it's frequently access data and instructions rather than being idle.

2)improvement in Performance: Cache memory improves performance by minimising the average time of access data. 

3)High Speed: nowadays processor is so fast that RAM could not provide data at right time. To overcome this problem cache memory sync the ram and processor 

Disadvantage of cache memory: 

1) Cost: The cost to make cache memory is more expensive than RAM due to technology and materials used to achieve such high speed and low latency

2) Complexity: design of cache memory is very complex. All levels require different design. 

3)Security: cache memory can be attacked with the help of certain types of side channel attacks. This provides the hacker to use and manipulate our sensitive data. 

 

 

 


Comments ()


Sign in

Read Next

Respondo Launches Revolutionary Video Discussion App

Blog banner

Socket Programming in Java

Blog banner

Brain wash of social media

Blog banner

What Your Music Taste Reveals About Your Personality

Blog banner

Security Breaches in Stock market trading

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Service Strategy In ITSM

Blog banner

Starvation

Blog banner

Clustering Techniques

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

What is a Malware ?

Blog banner

Solitary Play Activities for Preschoolers: Types and Benefits

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

Threads

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

Dal Bafla Recipe

Blog banner

Challenges and risks in service operations

Blog banner

bulk email software

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

A book review

Blog banner

Raid

Blog banner

STARVATION

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Virtualisation

Blog banner

10 Interesting Facts about Death Note

Blog banner

Disk cache

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Not anti-social, but pro-solitude

Blog banner

Ubiquitous Computing

Blog banner

Deadlock

Blog banner

I/O Buffering

Blog banner

SNAPCHAT

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

Khau Galli – Vile Parle

Blog banner

Modern operating system

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Busted : Common Web Security Myths

Blog banner

Operating system

Blog banner