wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cache memory

profile
Bhargav Patel
Jul 03, 2024
0 Likes
0 Discussions
65 Reads

Cache memory is basically a kind of random access memory (RAM) which is inbuilt in processor. The cache memory is used to built a bridge of speed gap between the fast CPU and slow RAM therefore it improves overall performance of the computer.

There are 2 parts of cache memory:

1) Inbuilt cache processor 

Level 1: Level 1 cache memory is the smallest in size but the fast among all four. It is located inside the processor. It is separated into instructions cache (L1i) and data cache (L1d). Every core has its own dedicate L1 cache

Level 2: level 2 cache memory is a little bigger size than level 1. It is also slow as compare to Level 1. It is dedicate to one single core or shared between multiple core.

Level 3: level 3 cache memory has bigger size than level 2 but is faster than level 2. It is dedicated to multiple core only.

2) Advanced Cache Configurations

Level 4: level 4 is not inbuilt but it must be close to processor to perform its best. It is used when high performance task. Not all computers have level 4 cache memory.

Advantages of cache memory:

1) High Speed access: Cache memory is faster than RAM because it's frequently access data and instructions rather than being idle.

2)improvement in Performance: Cache memory improves performance by minimising the average time of access data. 

3)High Speed: nowadays processor is so fast that RAM could not provide data at right time. To overcome this problem cache memory sync the ram and processor 

Disadvantage of cache memory: 

1) Cost: The cost to make cache memory is more expensive than RAM due to technology and materials used to achieve such high speed and low latency

2) Complexity: design of cache memory is very complex. All levels require different design. 

3)Security: cache memory can be attacked with the help of certain types of side channel attacks. This provides the hacker to use and manipulate our sensitive data. 

 

 

 


Comments ()


Sign in

Read Next

Booting Process In Operating System

Blog banner

IP ADDRESS

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

Virtualization

Blog banner

Deadlock in Operating System

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

Importance of Network Security Risk

Blog banner

MORDERN UNIX SYSTEM

Blog banner

You Get Everyone, But No One Gets You: The Lonely Side of High Emotional Intelligence

Blog banner

Rain

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Google App Engine

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

Top 10 Logos and their meanings

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Career v/s Job : Choose your passion

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Virtualisation

Blog banner

Cache memory

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

URL vs Domain

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

Cyber Security in Data Breaching

Blog banner

Beauty of indian railway

Blog banner

To travel is to live

Blog banner

MODERN OPERATING SYSTEM

Blog banner

PODIO

Blog banner

Deadlock

Blog banner

Sage

Blog banner

What is semaphore in operating system?

Blog banner

Broken Authentication Attacks

Blog banner

IT Service as as Value Creation

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

NETSUITE

Blog banner

TAILS OS

Blog banner

Memory management

Blog banner

Security Issues

Blog banner

Socket Programming in Java

Blog banner

Corporate Discipline.

Blog banner

Data Science in Mental Health Prediction

Blog banner

How social media affect

Blog banner