wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

MEMORY HIERARCHY

profile
Khushi Sanghavi
Jul 03, 2024
0 Likes
0 Discussions
168 Reads

MEMORY HIERARCHY

During the design of computer memory you should consider the speed of the memory , capacity of the memory and the cost of the memory . Greater capacity generally means slower access speed and lower cost per bit.Faster access time usually means higher cost per bit and lower capacity.There is a tradeoff between them to balance the trade off computer uses memory hierarchy . There are three types of memories cache memory , primary (main ) memory and secondary storage memory . Primary memory stores currently needed program instructions and data only. Secondary memory stores data and program which are not actively needed . Cache memory is extremely high speed compared to other and is  present in processor . Cache memory is used to store data which has to executed . A processor may access the program and data from the main memory and cache memory . The computer system should move data and programs from secondary memory to primary memory before the processor can  refer them and only the current instruction to be executed is stored in cache memory . The result is stored in primary memory and it will send executed data to secondary storage .

In the memory hierarchy while going from down to up the storage access time decreases the speed increases, cost per bit  increases and storage capacity decreases . Secondary storage memory has large storage capacity, primary memory has small capacity and cache memory has least storage capacity. 

Secondary storage contains complete folder which will be transferred to primary memory ,only the currently executed file will be transferred to cache memory and the executed data will be moved to the register and cpu will execute the operation . Again the process will continue like this .

memory design is about balancing capacity, access speed, and cost through a hierarchy of memory types, ensuring that the system performs efficiently without excessive cost.

~khushi sanghavi

ASSIGNMENT 1 (53003230009)


Comments ()


Sign in

Read Next

Hacking Mobile Platforms

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Introduction to Virtual Memory - 080

Blog banner

Disk scheduling

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

Stop Racism

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Getting into anime My anime suggestions

Blog banner

What is Segmentation?

Blog banner

Modern Operating System

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Review on Recovering Deleted Files

Blog banner

Types of Threads

Blog banner

Importance of Education

Blog banner

EdTech (Education Technology)

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

What is Spyware? and examples of them.

Blog banner

THE ACTORS LIFE

Blog banner

John Titor: The Time Traveler

Blog banner

Recipe of Paneer Butter Masala

Blog banner

Who decides your overthinking, anyway?

Blog banner

Risk factors in service transistion

Blog banner

Deadlock

Blog banner

DBMS and various career options related to it.

Blog banner

Ambiguous

Blog banner

100 Awesome Keyboard Shortcuts that you didn't knew

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

Self managing devices

Blog banner

R Programming

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

VIRTUAL MACHINE

Blog banner

Service transition principles

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

Data Warehouse Bus Matrix

Blog banner

Mobile Security

Blog banner

Bots and Cyber Security

Blog banner

Uniprocessor Scheduling

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner