wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

MEMORY HIERARCHY

profile
Khushi Sanghavi
Jul 03, 2024
0 Likes
0 Discussions
169 Reads

MEMORY HIERARCHY

During the design of computer memory you should consider the speed of the memory , capacity of the memory and the cost of the memory . Greater capacity generally means slower access speed and lower cost per bit.Faster access time usually means higher cost per bit and lower capacity.There is a tradeoff between them to balance the trade off computer uses memory hierarchy . There are three types of memories cache memory , primary (main ) memory and secondary storage memory . Primary memory stores currently needed program instructions and data only. Secondary memory stores data and program which are not actively needed . Cache memory is extremely high speed compared to other and is  present in processor . Cache memory is used to store data which has to executed . A processor may access the program and data from the main memory and cache memory . The computer system should move data and programs from secondary memory to primary memory before the processor can  refer them and only the current instruction to be executed is stored in cache memory . The result is stored in primary memory and it will send executed data to secondary storage .

In the memory hierarchy while going from down to up the storage access time decreases the speed increases, cost per bit  increases and storage capacity decreases . Secondary storage memory has large storage capacity, primary memory has small capacity and cache memory has least storage capacity. 

Secondary storage contains complete folder which will be transferred to primary memory ,only the currently executed file will be transferred to cache memory and the executed data will be moved to the register and cpu will execute the operation . Again the process will continue like this .

memory design is about balancing capacity, access speed, and cost through a hierarchy of memory types, ensuring that the system performs efficiently without excessive cost.

~khushi sanghavi

ASSIGNMENT 1 (53003230009)


Comments ()


Sign in

Read Next

Privacy in Social Media and Online Services

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

memory cache

Blog banner

GIS

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

Trends that began during the pandemic

Blog banner

Have You Explored India Yet?

Blog banner

CyberSecurity Color Wheel

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

Raid

Blog banner

Water Resources are about to exhaust...

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Threads

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

How to lose belly fat

Blog banner

BrainGate Technology

Blog banner

Types of Malware in Cyber Security

Blog banner

1.1 basic elements

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Technical SEO : Total Guide

Blog banner

What is E-commerce

Blog banner

Article on different management system

Blog banner

The Memory Hierarchy

Blog banner

Modern Operating System

Blog banner

Security Issues and Countermeasures

Blog banner

Google App Engine

Blog banner

VIRTUAL MACHINES

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

What is Segmentation?

Blog banner

Different Types of Data

Blog banner

Operating System

Blog banner

Webmail

Blog banner

To-Do List In LISP

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

FIREWALL

Blog banner

memory management

Blog banner

Cyber Security in Data Breaching

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

What is Spyware? and examples of them.

Blog banner

KASHMIR TRIPS

Blog banner