wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

MEMORY HIERARCHY

profile
Khushi Sanghavi
Jul 03, 2024
0 Likes
0 Discussions
169 Reads

MEMORY HIERARCHY

During the design of computer memory you should consider the speed of the memory , capacity of the memory and the cost of the memory . Greater capacity generally means slower access speed and lower cost per bit.Faster access time usually means higher cost per bit and lower capacity.There is a tradeoff between them to balance the trade off computer uses memory hierarchy . There are three types of memories cache memory , primary (main ) memory and secondary storage memory . Primary memory stores currently needed program instructions and data only. Secondary memory stores data and program which are not actively needed . Cache memory is extremely high speed compared to other and is  present in processor . Cache memory is used to store data which has to executed . A processor may access the program and data from the main memory and cache memory . The computer system should move data and programs from secondary memory to primary memory before the processor can  refer them and only the current instruction to be executed is stored in cache memory . The result is stored in primary memory and it will send executed data to secondary storage .

In the memory hierarchy while going from down to up the storage access time decreases the speed increases, cost per bit  increases and storage capacity decreases . Secondary storage memory has large storage capacity, primary memory has small capacity and cache memory has least storage capacity. 

Secondary storage contains complete folder which will be transferred to primary memory ,only the currently executed file will be transferred to cache memory and the executed data will be moved to the register and cpu will execute the operation . Again the process will continue like this .

memory design is about balancing capacity, access speed, and cost through a hierarchy of memory types, ensuring that the system performs efficiently without excessive cost.

~khushi sanghavi

ASSIGNMENT 1 (53003230009)


Comments ()


Sign in

Read Next

Introduction to Data Science: Life Cycle & Applications

Blog banner

Network Security Risks

Blog banner

Self defence

Blog banner

Mumbai famous street food

Blog banner

Rapido

Blog banner

Operation system

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

Kafka - A Framework

Blog banner

Deadlock in Operating System

Blog banner

Use case of K-means clustering

Blog banner

Fashion marketing in india

Blog banner

Virtual Machine's

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

SPEM

Blog banner

Strengthening Active Directory Security

Blog banner

INTERNET

Blog banner

Virtual memory

Blog banner

Stop Racism

Blog banner

Memory Management

Blog banner

Benefits and drawback of web security.

Blog banner

Interesting fact about kangaroo.

Blog banner

Uniprocessor scheduling

Blog banner

Key to success in Sports

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

File management

Blog banner

VIRTUAL MACHINE

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

LiquidPlanner

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Paralysis/Paralysis Stroke

Blog banner

THE ACTORS LIFE

Blog banner

Atlantis - The Lost Island.........

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Subnet Masking

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Developments in Modern Operating Systems

Blog banner

OLA

Blog banner

VIRTUAL MACHINES

Blog banner

File system

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner