wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

The Memory Hierarchy

profile
Kirtana Vaghasiya
Jul 12, 2023
0 Likes
0 Discussions
44 Reads

Memory hierarchy is the hierarchy of memory and storage devices found in a computer system.It ranges from the slowest but high capacity auxiliary memory to the fastest but low capacity cache memory.

Let us discuss each level of memory hierarchy in detail:

Level-0 − Registers

The registers are present inside the CPU. As they are present inside the CPU, they have least access time. Registers are most expensive and smallest in size generally in kilobytes. They are implemented by using Flip-Flops.

Level-1 − Cache

Cache memory is used to store the segments of a program that are frequently accessed by the processor. It is expensive and smaller in size generally in Megabytes and is implemented by using static RAM.

Level-2 − Primary or Main Memory

It directly communicates with the CPU and with auxiliary memory devices through an I/O processor. Main memory is less expensive than cache memory and larger in size generally in Gigabytes. This memory is implemented by using dynamic RAM.

Level-3 − Secondary storage

Secondary storage devices like Magnetic Disk are present at level 3. They are used as backup storage. They are cheaper than main memory and larger in size generally in a few TB.

Level-4 − Tertiary storage

Tertiary storage devices like magnetic tape are present at level 4. They are used to store removable files and are the cheapest and largest in size (1-20 TB).


Comments ()


Sign in

Read Next

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Network Footprinting in Cybersecurity

Blog banner

VIRTUAL MACHINE

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Operating system

Blog banner

Game Theory in Blockchain

Blog banner

The New Rules of UI/UX Design Every Website Must Follow in 2026

Blog banner

GraphX:- A graph processing tool

Blog banner

Virtual memory

Blog banner

Principles of Concurrency

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

OS Assignment 3

Blog banner

Starvation and Deadlock.

Blog banner

Social engineering in cyber security

Blog banner

Way to make your meal healthier.

Blog banner

Cache memory

Blog banner

Vikrant’s first blog

Blog banner

Operating system

Blog banner

Disk cache

Blog banner

Shoulders

Blog banner

Types of Hackers.

Blog banner

Process, process creation and process termination

Blog banner

Metasploit

Blog banner

File System

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Atlantis - The Lost Island.........

Blog banner

Water Resources are about to exhaust...

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Deadlock in Operating systems

Blog banner

Cross site scripting Attack

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

Message Passing in OS

Blog banner

Critical success factors

Blog banner

PROCESS STATE:

Blog banner

Multiprocessor scheduling

Blog banner

Service Design Model

Blog banner

Benefits of yoga and meditation

Blog banner

Types of Threads

Blog banner

objectives and functions of operating system

Blog banner