wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cache memory

profile
Bhargav Patel
Jul 03, 2024
0 Likes
0 Discussions
65 Reads

Cache memory is basically a kind of random access memory (RAM) which is inbuilt in processor. The cache memory is used to built a bridge of speed gap between the fast CPU and slow RAM therefore it improves overall performance of the computer.

There are 2 parts of cache memory:

1) Inbuilt cache processor 

Level 1: Level 1 cache memory is the smallest in size but the fast among all four. It is located inside the processor. It is separated into instructions cache (L1i) and data cache (L1d). Every core has its own dedicate L1 cache

Level 2: level 2 cache memory is a little bigger size than level 1. It is also slow as compare to Level 1. It is dedicate to one single core or shared between multiple core.

Level 3: level 3 cache memory has bigger size than level 2 but is faster than level 2. It is dedicated to multiple core only.

2) Advanced Cache Configurations

Level 4: level 4 is not inbuilt but it must be close to processor to perform its best. It is used when high performance task. Not all computers have level 4 cache memory.

Advantages of cache memory:

1) High Speed access: Cache memory is faster than RAM because it's frequently access data and instructions rather than being idle.

2)improvement in Performance: Cache memory improves performance by minimising the average time of access data. 

3)High Speed: nowadays processor is so fast that RAM could not provide data at right time. To overcome this problem cache memory sync the ram and processor 

Disadvantage of cache memory: 

1) Cost: The cost to make cache memory is more expensive than RAM due to technology and materials used to achieve such high speed and low latency

2) Complexity: design of cache memory is very complex. All levels require different design. 

3)Security: cache memory can be attacked with the help of certain types of side channel attacks. This provides the hacker to use and manipulate our sensitive data. 

 

 

 


Comments ()


Sign in

Read Next

PROCESS STATE:

Blog banner

Best password managers: Reviews of the top products

Blog banner

Deadlock

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

Service Design Model

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Zomato (Income Sources)

Blog banner

Functions of operating system

Blog banner

Microsoft Windows Overview

Blog banner

Electronic data interchange

Blog banner

MPL and how its effects?

Blog banner

Cloud Computing

Blog banner

Outlook.com

Blog banner

Google App Engine

Blog banner

Odoo

Blog banner

Number Guessing game --lisp

Blog banner

Artificial Intelligence and I

Blog banner

An Overivew Of Cache Memory

Blog banner

An Overview of Virtual Machines

Blog banner

Memory Management in Operating System

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

Mobile Survey

Blog banner

Big Data Architecture

Blog banner

Service stratergy principles

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

Process Description

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

Earth with no trees

Blog banner

SESSION HIJACKING

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

Smartsheet

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

JIRA SOFTWARE

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Virtual memory

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Multicore and multithreading 171

Blog banner

Cyber Security in Data Breaching

Blog banner

Explain Kernel in OS

Blog banner

Secure Hypertext transfer protocol

Blog banner