wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Hierarchy

profile
Heer Bhatt
Jul 04, 2024
0 Likes
0 Discussions
102 Reads

In Computer System, Memory hierarchy is a way to organize different type of memory (eg cache,RAM,hard drive) to reduce the time it takes to access data. It is one of the most required thing in computer memory, as it will help in optimizing memory available in computer. There aee multiple levels in memory hierarchy, understanding the memory hierarchy in computer architecture involves memory, USB, hard disk and tape drives.Each having different size,access time,speed etc. Memory like cache and main memory are the faster as compared to other type of memory. CPU cost varies with regusters being the cheapest and tape drives being the most expensive. Access time increases as you move from registers to cache, main memory, USB,hard disk and tape drives. As access time increases speed decreases and cost rises. Each level serves a different purpose in storing and accessing data. Size and access time are crucial factors in memory hierarchy.The frequency of access varies across memory level, with registers being the most frequently accessed due to their direct connection with CPU.

1. Registers

Registers are small, high-speed memory units located in the CPU. They are used to store the most frequently used data and instructions.

2. Cache Memory

Cache memory is a small, fast memory unit located close to the CPU. It stores frequently used data and instructions that have been recently accessed from the main memory.

3. Main Memory

Main memory, also known as RAM (Random Access Memory), is the primary memory of a computer system. It has a larger storage capacity than cache memory, but it is slower.

4. Secondary Storage

Secondary storage, such as hard disk drives (HDD) and solid-state drives (SSD), is a non-volatile memory unit that has a larger storage capacity than main memory. It is used to store data and instructions that are not currently in use by the CPU.

5. Magnetic Disk

Magnetic Disks are simply circular plates that are fabricated with either a metal or a plastic or a magnetized material.

6. Magnetic Tape

Magnetic Tape is simply a magnetic recording device that is covered with a plastic film. It is generally used for the backup of data.


Comments ()


Sign in

Read Next

1.1 basic elements

Blog banner

BIRYANI ! The history you never knew about

Blog banner

Cyber Forensics on IOT Devices

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Constrains in service design

Blog banner

Esri India launches Policy Maps.

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

What is Internet

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

Evolution of operating system

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

Flipkart

Blog banner

Deadlock

Blog banner

Race Condition

Blog banner

File Allocation Methods

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Virtual Machine

Blog banner

Fault Tolerance

Blog banner

Explain DBMS in Brief

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Assignment 2

Blog banner

Deadlock in Operating systems

Blog banner

Deadlock

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

Memory Partitioning

Blog banner

Swiggi

Blog banner

IT RISK

Blog banner

Service Design Principles

Blog banner

Decision Tree: A Diagram Model

Blog banner

Malware Defense

Blog banner

IT service level agreement

Blog banner

File system

Blog banner

"Games and the future"

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

Expert System In AI

Blog banner

Deadlock and starvation

Blog banner

File management

Blog banner

Importance Of Time

Blog banner

Worms, viruses and Bots

Blog banner

File management -disha parekh

Blog banner