wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cache memory

profile
Bhargav Patel
Jul 03, 2024
0 Likes
0 Discussions
65 Reads

Cache memory is basically a kind of random access memory (RAM) which is inbuilt in processor. The cache memory is used to built a bridge of speed gap between the fast CPU and slow RAM therefore it improves overall performance of the computer.

There are 2 parts of cache memory:

1) Inbuilt cache processor 

Level 1: Level 1 cache memory is the smallest in size but the fast among all four. It is located inside the processor. It is separated into instructions cache (L1i) and data cache (L1d). Every core has its own dedicate L1 cache

Level 2: level 2 cache memory is a little bigger size than level 1. It is also slow as compare to Level 1. It is dedicate to one single core or shared between multiple core.

Level 3: level 3 cache memory has bigger size than level 2 but is faster than level 2. It is dedicated to multiple core only.

2) Advanced Cache Configurations

Level 4: level 4 is not inbuilt but it must be close to processor to perform its best. It is used when high performance task. Not all computers have level 4 cache memory.

Advantages of cache memory:

1) High Speed access: Cache memory is faster than RAM because it's frequently access data and instructions rather than being idle.

2)improvement in Performance: Cache memory improves performance by minimising the average time of access data. 

3)High Speed: nowadays processor is so fast that RAM could not provide data at right time. To overcome this problem cache memory sync the ram and processor 

Disadvantage of cache memory: 

1) Cost: The cost to make cache memory is more expensive than RAM due to technology and materials used to achieve such high speed and low latency

2) Complexity: design of cache memory is very complex. All levels require different design. 

3)Security: cache memory can be attacked with the help of certain types of side channel attacks. This provides the hacker to use and manipulate our sensitive data. 

 

 

 


Comments ()


Sign in

Read Next

Direct Memory Access

Blog banner

Satellite Based Positioning

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Privacy in Social Media and Online Services

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

VIRTUAL MACHINE

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

Importance of modern technology era

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

DATA VAULT

Blog banner

Service Catalogue Management

Blog banner

Challenges and risks in service operations

Blog banner

Gamer life

Blog banner

Functions of Operating System

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Access management

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Music

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

Session Hijacking Techniques

Blog banner

Supervised and Unsupervised Learning

Blog banner

Does School Infrastructure Really Matter For Learning?

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Business Engineering

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

FAMILY WHERE LIFE BEGINS....

Blog banner

Race condition

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Women empowerment

Blog banner

Risk mitigation and management

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

Modern Operating System

Blog banner

Modern operating system

Blog banner

Texting is actually better than talking in person

Blog banner

Blockchain Transactions

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner