Memory hierarchy, Basic Computer Science

Memory hierarchy:

There is another type of high speed memory, known as Cache memory, which is used to increase the speed of processing by making current programs and data available to the CPU at a rapid rate. Cache memory is a relatively small, high speed memory that stores the most recent used instructions or data. It acts as a high-speed buffer between main memory and the CPU.The cache memory is placed in between CPU and main memory. Access time is the time it takes a device or program to locate information and make it available to the computer for further processing. Cache memory access time is about 0.5 to 2.5 ns which is much less than that of the main memory. The access time of main memory is about 50-70 ns. Because of its very high cost, the capacity of the cache memory deployed is 2 to 3 percent of that of the main memory. The access time of mass storage devices such as hard disks are measured in milliseconds (ms).   

1611_memory hierarchy.png

Posted Date: 10/22/2012 4:08:08 AM | Location : United States







Related Discussions:- Memory hierarchy, Assignment Help, Ask Question on Memory hierarchy, Get Answer, Expert's Help, Memory hierarchy Discussions

Write discussion on Memory hierarchy
Your posts are moderated
Related Questions
Design a program that will read a file of sales records and produce a sales report. Each record in the file contains a customer’s ID, name, a sales amount, and a validated GST code

Stable wireless networks and mobile devices online tutoring In Bluetooth it is a basically a proprietary open super wireless technology standard for exchanging data over the sh

As there are many variations in architecture between the different kinds of CPU, we shall begin my looking at an easy model of the structure. The basic model consists of five part

QUESTION (i) Define each of the following terms: a) Interlibrary lending b) Manuscript c) Papyrus d) Community profile e) Mauritiana (ii) Explain with example

THE THIRD GENERATION (1966-1975) The introduction of IBM-360 series of computers in 1965 marked the beginning of this generation. The transistors were replaced by solid

Question 1 Explain the various tools used for open source software development Question 2 Discuss the OSS licensing strategies Question 3 Explain the software developmen

what is the role of microprocessors in IT? how they are used in medical field? how they are used in our real lifes? how they are used in latest technology?

mention the aims of education in present scenario

Choice of Medium: All the transmission channels discussed in the foregoing paragraphs can be used as point to point connections or as broadcast systems. Transmitting informati

Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event "message