Secondary storage - computer architecture, Computer Engineering

Assignment Help:

Secondary storage:

Secondary storage (or external memory) differs from primary storage in that aspect it is not accessible by the CPU directly. The computer typically uses its input/output channels to access secondary storage and transfers the needed data by using intermediate area in primary storage. Secondary storage does not drop the data when the device is powered down-it is non-volatile memory. Per unit, it is normally also an order of magnitude less costly than primary storage. Thus, modern computer systems normally have an order of magnitude more secondary storage than primary storage and data is hold for a longer time there.

 In modern computers, hard disk drives are generally used as secondary storage. Time taken to access a particular given byte of information stored on a hard disk is normally a few thousandths of particular second or just milliseconds. But, the time taken to access a given byte of information stored in RAM is measured in billionths of a second, or nanoseconds. It illustrates very important access-time difference which distinguishes solid-state memory from rotating magnetic storage devices: hard disks are typically regarding a million times slower than memory. Rotating optical storage devices, like DVD and CD drives, have even longer access times. Having disk drives, once the disk read/write head reaches the appropriate placement and the data of interest rotates under it then subsequent data on the track are very fast to access. Consequently, in order to hide the initial seek time and rotational latency that data are transferred to and from disks in big contiguous blocks.

When data exist in disk, block access to hide latency offers wish in designing efficient external memory algorithms. Sequential or Block access on disks is orders of magnitude faster than random access, and various sophisticated paradigms have been developed to design efficient algorithms based on the block and sequential access. Another way to reduce the I/O bottleneck is to utilize multiple disks in parallel in order to increase the bandwidth amongst primary and secondary memory.

Some other instance of secondary storage technologies are: flash memory (for instance USB flash drives or keys), punched cards, magnetic tape, paper tape, ,  standalone RAM disks, and Iomega Zip drives ,floppy disks.

 


Related Discussions:- Secondary storage - computer architecture

Define a technique of temporarily removing inactive program, is a technique...

is a technique of temporarily removing inactive programs from the memory of computer system? Swapping is a technique of temporarily eliminating inactive programs from the memor

Registers used in IA-64 architecture, Q. Registers used in IA-64 architectu...

Q. Registers used in IA-64 architecture ? Registers: The IA-64 architecture comprises a very generous set of registers. It has an 82-bit floating point as well as 64-bit inte

What are the logic micro-operations, Q. What are the Logic Micro-operations...

Q. What are the Logic Micro-operations? Logic operations are fundamentally binary operations that are performed on string of bits stored in the registers. For a logic micro-ope

Why is TCP called end-to-end protocol, Why is TCP called end-to-end protoco...

Why is TCP called end-to-end protocol? TCP is termed as an end-to-end protocol as this provides a connection directly by an application in one computer to an application on a r

How do we prevent selected parameters of a module, How  do  I  prevent  sel...

How  do  I  prevent  selected  parameters  of  a  module  from  being  overridden  during instantiation? If a specific parameter within a module must be prevented from being ov

Definition of a micro controllers, Before we take a detailed look about the...

Before we take a detailed look about the Motorola 68HC11 series of micro controllers it is useful to define what is meant by a micro controller. As the name suggests a micro contro

Use of parallel construct with private clause, Q. Use of parallel construct...

Q. Use of parallel construct with private clause? In this example we would see use of parallel construct with private and firstprivate clauses. At end of program i and j remain

What is uml architecture, Takes care structural and behavioural aspect of a...

Takes care structural and behavioural aspect of a software system. Contains software usage, functionality, performance, economic, reuse, and technology constraints.

What is wap, What is WAP? WAP is stands for Wireless Application Proto...

What is WAP? WAP is stands for Wireless Application Protocol. It is a global, open standard which gives mobile users access to Internet services by handled devices. Wireless A

Encryption techniques to ensute secured transaction on net, Two popular enc...

Two popular encryption techniques to ensute secured transactions on the net? 1. Translation table 2. Word/byte rotation and XOR bit masking.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd