wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cache memory

profile
Bhargav Patel
Jul 03, 2024
0 Likes
0 Discussions
65 Reads

Cache memory is basically a kind of random access memory (RAM) which is inbuilt in processor. The cache memory is used to built a bridge of speed gap between the fast CPU and slow RAM therefore it improves overall performance of the computer.

There are 2 parts of cache memory:

1) Inbuilt cache processor 

Level 1: Level 1 cache memory is the smallest in size but the fast among all four. It is located inside the processor. It is separated into instructions cache (L1i) and data cache (L1d). Every core has its own dedicate L1 cache

Level 2: level 2 cache memory is a little bigger size than level 1. It is also slow as compare to Level 1. It is dedicate to one single core or shared between multiple core.

Level 3: level 3 cache memory has bigger size than level 2 but is faster than level 2. It is dedicated to multiple core only.

2) Advanced Cache Configurations

Level 4: level 4 is not inbuilt but it must be close to processor to perform its best. It is used when high performance task. Not all computers have level 4 cache memory.

Advantages of cache memory:

1) High Speed access: Cache memory is faster than RAM because it's frequently access data and instructions rather than being idle.

2)improvement in Performance: Cache memory improves performance by minimising the average time of access data. 

3)High Speed: nowadays processor is so fast that RAM could not provide data at right time. To overcome this problem cache memory sync the ram and processor 

Disadvantage of cache memory: 

1) Cost: The cost to make cache memory is more expensive than RAM due to technology and materials used to achieve such high speed and low latency

2) Complexity: design of cache memory is very complex. All levels require different design. 

3)Security: cache memory can be attacked with the help of certain types of side channel attacks. This provides the hacker to use and manipulate our sensitive data. 

 

 

 


Comments ()


Sign in

Read Next

Network Footprinting in Cybersecurity

Blog banner

Data Mining

Blog banner

Data Visualization

Blog banner

Getting started with Android Studio

Blog banner

Love is in air.....

Blog banner

Man VS Nature

Blog banner

Virtual Memory

Blog banner

Modern Operating Systems.

Blog banner

5 Interesting facts about Diwali

Blog banner

Why is online marketing is important in current scenario

Blog banner

Defining youtubr

Blog banner

Game via listing method

Blog banner

Question

Blog banner

DATA VAULT

Blog banner

Marvel Cinematic Universe

Blog banner

Secure Hypertext transfer protocol

Blog banner

Starting Android Activity Using Intent

Blog banner

Pipedrive

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

What is thread and alse multithreading

Blog banner

15 Interesting Facts about India

Blog banner

Importance of Website

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

The IT Service Lifecycle

Blog banner

Key to success in Sports

Blog banner

Creating Digitally Signed Document

Blog banner

MUTUAL EXCLUSION

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

Security issues

Blog banner

Short-Form Video Marketing: Why It's Dominating the Internet

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

Smitten Kitchen Keepers

Blog banner

Booting Process In Operating System

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

I/O Buffering

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

An Overview of Virtual Machines

Blog banner

Internet of Things and cyber security

Blog banner

Wiretapping

Blog banner

Uber

Blog banner