wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory hierarchy

profile
Kush Patel
Jul 05, 2024
0 Likes
0 Discussions
82 Reads

Main memory, alternatively RAM (Random Access Memory), is a cache that is following. Though slower, it is significantly larger than both cache and registers. It acts as an expanded storage space for the current data and active processes. Ram has a quick reading and writing speed than the secondary memory because it is volatile meaning it loses stored information when power goes off.

Secondary storage implies disks (e.g., hard disk drives (HDDs) or solid-state drives (SSDs)) such as HDDs and SSDs. These devices are non-volatile; they retain data even after power has been switched off while costing less per bit of information saved compared to RAM in terms of capacity. They are however much slower which makes them not very useful for direct data retrieval by the CPU during active tasks. Secondary storage is best suited to long-term storage for operating systems, applications, and large files.

The principle of memory hierarchy constitutes the central element of computer architecture and is grounded on the length of processing, size, and costs. There are strategies of using this hierarchy in a most effective way, such as data caching, memory management, and the application of algorithms that help the computer to go to the necessary memory layers faster that include the CPU cache and then main memory. With the help of additional memory chips, so-called cache that holds frequently accessed data, it will become possible for the computer to offload secondary data from vast yet inexpensive storage unit to a slower one and so can it ensure both high speeding retrieval of data and high data-handling functionality.

Ensuring a well-organized memory hierarchy is a fundamental key to system architects, developers, and engineers who are striving to make the computational operations more efficient and overall system performance more effective.

Div:A

Kush Patel 

53003230107


Comments ()


Sign in

Read Next

Boxing

Blog banner

Session Hijacking

Blog banner

Eating Well With Meal Maharaj on Busy Workdays Without Cooking

Blog banner

CRISP-DM Methodology

Blog banner

How to Find the Right Therapist For Me?

Blog banner

indian premier league

Blog banner

Memory input output management

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Financial Stress and Mental Health

Blog banner

Multiple processor scheduling

Blog banner

Real Time Scheduling

Blog banner

Deadlocks in Operating System

Blog banner

Virtual Memory

Blog banner

Data Structures

Blog banner

Understanding Business Layer in Data Science

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

E-Governance

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

S-Tool : Steganography

Blog banner

Basic Security For SOAP Services

Blog banner

Social engineering in cyber security

Blog banner

Child labour

Blog banner

Know your Processors!

Blog banner

Evolution of OS

Blog banner

File Management In OS

Blog banner

DURGA POOJA

Blog banner

Electronic data interchange

Blog banner

The Features of Blockchain

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Processes: Process Description and Control.

Blog banner

Disk scheduling

Blog banner

computer security

Blog banner

Importance of self defence for girls

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Concurrency and Deadlocks

Blog banner

Bharat Maps

Blog banner

Puri Jagannath temple

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

Firewall in Computer Network

Blog banner

Mumbai Metro 3

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

Types of Malware in Cyber Security

Blog banner