SlideShare a Scribd company logo
Computer memory
From Wikipedia, the free encyclopedia
It has been suggested that Computer data storage be merged into this article or
section. (Discuss) Proposed since May 2012.
Computer memory types
Semiconductor memory
Volatile
 RAM
 DRAM (e.g., DDR SDRAM)
 SRAM
 In development
 T-RAM
 Z-RAM
 TTRAM
 Historical
 Williams-Kilburn tube (1946-47)
 Delay line memory (1947)
 Selectron tube (1953)
Non-volatile
 ROM
 Mask ROM
 PROM
 EPROM
 EEPROM
 NVRAM
 Flash memory
 Early stage NVRAM
 nvSRAM
 FeRAM
 MRAM
 PRAM
 In development
 CBRAM
 SONOS
 RRAM
 Racetrack memory
 NRAM
 Millipede memory
 Historical
 Drum memory (1932)
 Magnetic-core memory (1949)
 Plated wire memory (1957)
 Thin-film memory (1962)
 Twistor memory (~1968)
 Bubble memory (~1970)
 V
 T
 E
This article includes a list of references, related reading or external links, but its sources
remain unclear because it lacks inline citations. Please improve this article by introducing
more precise citations. (June 2011)
In computing, memory refers to the physical devices used to store programs (sequences of
instructions) or data (e.g. program state information) on a temporary or permanent basis for use in
a computer or other digital electronic device. The term primary memory is used for the information in
physical systems which are fast (i.e. RAM), as a distinction from secondary memory, which are
physical devices for program and data storage which are slow to access but offer higher memory
capacity. Primary memory stored on secondary memory is called "virtual memory".
The term "storage" is often (but not always) used in separate computers of traditional secondary
memory such as tape, magnetic disks and optical discs (CD-ROM and DVD-ROM). The term
"memory" is often (but not always) associated with addressablesemiconductor memory, i.e. integrated
circuits consisting of silicon-based transistors, used for example as primary memory but also other
purposes in computers and other digital electronic devices.
There are two main types of semiconductor memory: volatile and non-volatile. Examples of non-
volatile memory are flash memory(sometimes used as secondary, sometimes primary computer
memory) and ROM/PROM/EPROM/EEPROM memory (used for firmwaresuch as boot programs).
Examples of volatile memory are primary memory (typically dynamic RAM, DRAM), and fast CPU
cachememory (typically static RAM, SRAM, which is fast but energy-consuming and offer lower
memory capacity per area unit than DRAM) .
The semiconductor memory is organized into memory cells or bistable flip-flops, each storing one
binary bit (0 or 1). The memory cells are grouped into words of fix word length, for example 1, 2, 4, 8,
16, 32, 64 or 128 bit. Each word can be accessed by a binary address of N bit, making it possible to
store 2 raised by N words in the memory. This implies that processor registers normally are not
considered as memory, since they only store one word and do not include an addressing mechanism.
Contents
[hide]
 1 History
 2 Volatile memory
 3 Non-volatile memory
 4 Management of memory
o 4.1 Memory management bugs
o 4.2 Early computer systems
o 4.3 Virtual memory
o 4.4 Protected memory
 5 See also
 6 References
 7 External links
[edit]History
Detail of the back of a section of ENIAC, showing vacuum tubes
In the early 1940s, memory technology mostly permitted a capacity of a few bytes. The first electronic
programmable digital computer, the ENIAC, using thousands of octal-base radiovacuum tubes, could
perform simple calculations involving 20 numbers of ten decimal digits which were held in the vacuum
tube accumulators.
The next significant advance in computer memory was with acoustic delay line memorydeveloped
by J. Presper Eckert in the early 1940s. Through the construction of a glass tube filled
with mercury and plugged at each end with a quartz crystal, delay lines could store bits of information
within the quartz and transfer it through sound waves propagating through mercury. Delay line
memory would be limited to a capacity of up to a few hundred thousand bits to remain efficient.
Two alternatives to the delay line, the Williams tube and Selectron tube, were developed in 1946, both
using electron beams in glass tubes as means of storage. Using cathode ray tubes, Fred Williams
would invent the Williams tube, which would be the first random access computer memory. The
Williams tube would prove to be advantageous to the Selectron tube because of its greater capacity
(the Selectron was limited to 256 bits, while the Williams tube could store thousands) and being less
expensive. The Williams tube would nevertheless prove to be frustratingly sensitive to environmental
disturbances.
Efforts began in the late 1940s to find non-volatile memory. Jay Forrester, Jan A. Rajchman and An
Wang would be credited with the development of magnetic core memory, which would allow for recall
of memory after power loss. Magnetic core memory would become the dominant form of memory until
the development of transistor based memory in the late 1960s.
The term "memory" when used to reference computers will always be referring to Random Access
Memory or RAM.
[edit]Volatile memory
Volatile memory is computer memory that requires power to maintain the stored information. Most
modern semiconductor volatile memory is either Static RAM (see SRAM) or dynamic RAM
(see DRAM). SRAM retains its contents as long as the power is connected and is easy to interface to
but uses six transistors per bit. Dynamic RAM is more complicated to interface to and control and
needs regular refresh cycles to prevent its contents being lost. However, DRAM uses only one
transistor and a capacitor per bit, allowing it to reach much higher densities and, with more bits on a
memory chip, be much cheaper per bit. SRAM is not worthwhile for desktop system memory, where
DRAM dominates, but is used for their cache memories. SRAM is commonplace in small embedded
systems, which might only need tens of kilobytes or less. Forthcoming volatile memory technologies
that hope to replace or compete with SRAM and DRAM include Z-RAM, TTRAM, A-RAM and ETA
RAM.
[edit]Non-volatile memory
Non-volatile memory is computer memory that can retain the stored information even when not
powered. Examples of non-volatile memory include read-only memory (seeROM), flash memory, most
types of magnetic computer storage devices (e.g. hard disks, floppy discs and magnetic tape), optical
discs, and early computer storage methods such as paper tape and punched cards. Forthcoming non-
volatile memory technologies include FeRAM, CBRAM, PRAM, SONOS, RRAM, Racetrack
memory, NRAM andMillipede.
[edit]Management of memory
It has been suggested that this article or section be merged into Memory management.
(Discuss) Proposed since February 2011.
Main article: Memory management
Proper management of memory is vital for a computer system to operate properly. Modern operating
systems have complex systems to properly manage memory. Failure to do so can lead to bugs, slow
performance, and at worst case, takeover by viruses and malicious software.
Nearly everything a computer programmer does requires him or her to consider how to manage
memory. Even storing a number in memory requires the programmer to specify how the memory
should store it.
[edit]Memory management bugs
Improper management of memory is a common cause of bugs.
 In arithmetic overflow, a calculation results in a number larger than
the allocated memory permits. For example, an 8-bit integer allows
the numbers −128 to +127. If its value is 127 and it is instructed to
add one, the computer can not store the number 128 in that space.
Such a case will result in undesired operation, such as changing
the number's value to −127 instead of +128.
 A memory leak occurs when a program requests memory from the
operating system and never returns the memory when it's done with
it. A program with this bug will gradually require more and more
memory until the program fails as it runs out.
 A segmentation fault results when a program tries to access
memory that it has no permission to access. Generally a program
doing so will be terminated by the operating system.
 Buffer overflow means that a program writes data to the end of its
allocated space and then continues to write data to memory that
belongs to other programs. This may result in erratic program
behavior, including memory access errors, incorrect results, a
crash, or a breach of system security. They are thus the basis of
many software vulnerabilities and can be maliciously exploited.
[edit]Early computer systems
In early computer systems, programs typically specified the location to write memory and what data to
put there. This location was a physical location on the actual memory hardware. The slow processing
of such computers did not allow for the complex memory management systems used today. Also, as
most such systems were single-task, sophisticated systems were not required as much.
This approach has its pitfalls. If the location specified is incorrect, this will cause the computer to write
the data to some other part of the program. The results of an error like this are unpredictable. In some
cases, the incorrect data might overwrite memory used by the operating system. Computer crackers
can take advantage of this to create viruses and malware.
[edit]Virtual memory
Main article: virtual memory
Virtual memory is a system where all physical memory is controlled by the operating system. When a
program needs memory, it requests it from the operating system. The operating system then decides
what physical location to place the memory in.
This offers several advantages. Computer programmers no longer need to worry about where the
memory is physically stored or whether the user's computer will have enough memory. It also allows
multiple types of memory to be used. For example, some memory can be stored in physical RAM
chips while other memory is stored on a hard drive. This drastically increases the amount of memory
available to programs. The operating system will place actively used memory in physical RAM, which
is much faster than hard disks. When the amount of RAM is not sufficient to run all the current
programs, it can result in a situation where the computer spends more time moving memory from
RAM to disk and back than it does accomplishing tasks; this is known as thrashing.
Virtual memory systems usually include protected memory, but this is not always the case.
[edit]Protected memory
Main article: memory protection
Protected memory is a system where each program is given an area of memory to use and is not
permitted to go outside that range. Use of protected memory greatly enhances both the reliability and
security of a computer system.
Without protected memory, it is possible that a bug in one program will alter the memory used by
another program. This will cause that other program to run off of corrupted memory with unpredictable
results. If the operating system's memory is corrupted, the entire computer system may crash and
need to be rebooted. At times programs intentionally alter the memory used by other programs. This
is done by viruses and malware to take over computers.
Protected memory assigns programs their own areas of memory. If the operating system detects that
a program has tried to alter memory that does not belong to it, the program is terminated. This way,
only the offending program crashes, and other programs are not affected by the error.
Protected memory systems almost always include virtual memory as well.
[edit]See also
 Virtual memory
 Semiconductor memory
 Memory Geometry
[edit]References
 Miller, Stephen W. (1977), Memory and Storage Technology,
Montvale.: AFIPS Press
 Memory and Storage Technology, Alexandria, Virginia.: Time Life
Books, 1988
[edit]External links
 http://computer.howstuffworks.com/computer-memory.htm
 http://www.kingston.com/tools/umg/pdf/umg.pdf
View page ratings
Rate this page
What's this?
Trustworthy
Objective
Complete
Well-written
I am highly knowledgeable about this topic (optional)
Submit ratings
Categories:
 Computer memory
 Computer storage
 Create account
 Log in
 Article
 Talk
 Read
 Edit
 View history
 Main page
 Contents
 Featured content
 Current events
 Random article
 Donate to Wikipedia
Interaction
 Help
 About Wikipedia
 Community portal
 Recent changes
 Contact Wikipedia
Toolbox
Print/export
Languages
 বাাংলা
 ‫وردی‬ ‫ک‬
 हिन्दी
 Latina
 Română
 සිංහල
 中文
 This page was last modified on 13 July 2012 at 04:41.
 Text is available under the Creative Commons Attribution-ShareAlike License;
additional terms may apply. See Terms of use for details.
Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-
profit organization.
 Contact us
 Privacy policy
 About Wikipedia
 Disclaimers
 Mobile view



More Related Content

What's hot

Semiconductor memory
Semiconductor memorySemiconductor memory
Semiconductor memory
ddmasterdon
 
Memory devices
Memory devicesMemory devices
Memory devices
arpit sharma
 
RAM/ROM and its TYPES
RAM/ROM and its TYPESRAM/ROM and its TYPES
RAM/ROM and its TYPES
Jagruti Ghadigaonkar
 
Types of Computer Memories
Types of Computer MemoriesTypes of Computer Memories
Types of Computer Memories
Bilal Ahmad
 
Random Access Memory ppt
Random Access Memory pptRandom Access Memory ppt
Computer memory
Computer memoryComputer memory
Computer memory
Joy Sarker
 
11091310354
1109131035411091310354
11091310354
samrat saurabh
 
COMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSCOMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONS
Angel Mary George
 
Internal memory
Internal memoryInternal memory
Internal memory
Siddique Ibrahim
 
12 it2003
12 it200312 it2003
12 it2003
mahemaddy
 
Computer memory
Computer memoryComputer memory
Computer memory
Jayapal Jp
 
Memory Hierarchy (RAM and ROM)
Memory Hierarchy (RAM and ROM)Memory Hierarchy (RAM and ROM)
Memory Hierarchy (RAM and ROM)
sumanth ch
 
Memory hierarchy
Memory hierarchyMemory hierarchy
Memory hierarchy
Abu-ul-Haris
 
COMPUTER MEMORY
COMPUTER MEMORYCOMPUTER MEMORY
COMPUTER MEMORY
Rajat More
 
Computer memory presentation
Computer memory presentationComputer memory presentation
Computer memory presentation
Ritu Jhalani
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
Umair Iftikhar Natt
 
Semiconductor memory
Semiconductor memorySemiconductor memory
Semiconductor memory
Then Murugeshwari
 
Memory Hierarchy
Memory HierarchyMemory Hierarchy
Memory Hierarchy
Trinity Dwarka
 
Semiconductor memories and auxiliary memories
Semiconductor memories and auxiliary memoriesSemiconductor memories and auxiliary memories
Semiconductor memories and auxiliary memories
Asif Iqbal
 
Chap3 primary memory
Chap3 primary memoryChap3 primary memory
Chap3 primary memory
raksharao
 

What's hot (20)

Semiconductor memory
Semiconductor memorySemiconductor memory
Semiconductor memory
 
Memory devices
Memory devicesMemory devices
Memory devices
 
RAM/ROM and its TYPES
RAM/ROM and its TYPESRAM/ROM and its TYPES
RAM/ROM and its TYPES
 
Types of Computer Memories
Types of Computer MemoriesTypes of Computer Memories
Types of Computer Memories
 
Random Access Memory ppt
Random Access Memory pptRandom Access Memory ppt
Random Access Memory ppt
 
Computer memory
Computer memoryComputer memory
Computer memory
 
11091310354
1109131035411091310354
11091310354
 
COMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSCOMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONS
 
Internal memory
Internal memoryInternal memory
Internal memory
 
12 it2003
12 it200312 it2003
12 it2003
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Memory Hierarchy (RAM and ROM)
Memory Hierarchy (RAM and ROM)Memory Hierarchy (RAM and ROM)
Memory Hierarchy (RAM and ROM)
 
Memory hierarchy
Memory hierarchyMemory hierarchy
Memory hierarchy
 
COMPUTER MEMORY
COMPUTER MEMORYCOMPUTER MEMORY
COMPUTER MEMORY
 
Computer memory presentation
Computer memory presentationComputer memory presentation
Computer memory presentation
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Semiconductor memory
Semiconductor memorySemiconductor memory
Semiconductor memory
 
Memory Hierarchy
Memory HierarchyMemory Hierarchy
Memory Hierarchy
 
Semiconductor memories and auxiliary memories
Semiconductor memories and auxiliary memoriesSemiconductor memories and auxiliary memories
Semiconductor memories and auxiliary memories
 
Chap3 primary memory
Chap3 primary memoryChap3 primary memory
Chap3 primary memory
 

Viewers also liked

Millepede- MEMS based memory device from IBM
Millepede- MEMS based memory device from IBMMillepede- MEMS based memory device from IBM
Millepede- MEMS based memory device from IBM
Harsha
 
Csc1401 lecture06 - internal memory
Csc1401   lecture06 - internal memoryCsc1401   lecture06 - internal memory
Csc1401 lecture06 - internal memory
IIUM
 
Semiconductor memories
Semiconductor memoriesSemiconductor memories
Semiconductor memories
SambitShreeman
 
Ram memory
Ram memoryRam memory
Ram memory
alberto_rubio96
 
Static and Dynamic Read/Write memories
Static and Dynamic Read/Write memoriesStatic and Dynamic Read/Write memories
Static and Dynamic Read/Write memories
Abhilash Nair
 
Memory organisation
Memory organisationMemory organisation
Memory organisation
ankush_kumar
 
Presentation on memory
Presentation on memoryPresentation on memory
Presentation on memory
Jamil Ahmed AKASH
 
Lec11 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part3
Lec11 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part3Lec11 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part3
Lec11 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part3
Hsien-Hsin Sean Lee, Ph.D.
 
Computer memory
Computer memoryComputer memory
Computer memory
Xấu Điên
 

Viewers also liked (9)

Millepede- MEMS based memory device from IBM
Millepede- MEMS based memory device from IBMMillepede- MEMS based memory device from IBM
Millepede- MEMS based memory device from IBM
 
Csc1401 lecture06 - internal memory
Csc1401   lecture06 - internal memoryCsc1401   lecture06 - internal memory
Csc1401 lecture06 - internal memory
 
Semiconductor memories
Semiconductor memoriesSemiconductor memories
Semiconductor memories
 
Ram memory
Ram memoryRam memory
Ram memory
 
Static and Dynamic Read/Write memories
Static and Dynamic Read/Write memoriesStatic and Dynamic Read/Write memories
Static and Dynamic Read/Write memories
 
Memory organisation
Memory organisationMemory organisation
Memory organisation
 
Presentation on memory
Presentation on memoryPresentation on memory
Presentation on memory
 
Lec11 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part3
Lec11 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part3Lec11 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part3
Lec11 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part3
 
Computer memory
Computer memoryComputer memory
Computer memory
 

Similar to Computer memory

301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog
Srinivas Naidu
 
Memory and storage devices
Memory and storage devicesMemory and storage devices
Memory and storage devices
ChuuHye
 
Memory managment
Memory managmentMemory managment
Memory managment
Shahbaz Khan
 
Memory
MemoryMemory
Virtual Memory vs Cache Memory
Virtual Memory vs Cache MemoryVirtual Memory vs Cache Memory
Virtual Memory vs Cache Memory
Ashik Iqbal
 
Memory System
Memory SystemMemory System
Memory System
ImranulHasan6
 
RAM :A primary Memory
RAM :A primary MemoryRAM :A primary Memory
RAM :A primary Memory
Dev Dorse
 
Presentation2 (1).pp text book for students
Presentation2 (1).pp text book for studentsPresentation2 (1).pp text book for students
Presentation2 (1).pp text book for students
addokenneth58
 
06 - Memory.ppt
06 - Memory.ppt06 - Memory.ppt
06 - Memory.ppt
AliyuAhmed9
 
Topic 10- Random Access Memory (RAM).pptx
Topic 10- Random Access Memory (RAM).pptxTopic 10- Random Access Memory (RAM).pptx
Topic 10- Random Access Memory (RAM).pptx
MartMantilla1
 
RAM And ROM
RAM And ROMRAM And ROM
RAM And ROM
Gihan Chanaka
 
Internal memory
Internal memoryInternal memory
Internal memory
Riya Choudhary
 
Memory & storage devices
Memory & storage devicesMemory & storage devices
Memory & storage devices
Hamza Mughal
 
Memory - RAM and its types
Memory - RAM and its typesMemory - RAM and its types
Memory - RAM and its types
Abhay Matthew
 
Ram and types of ram.Cache
Ram and types of ram.CacheRam and types of ram.Cache
Ram and types of ram.Cache
hamza mukhtiar
 
Understanding And Managing Memory
Understanding And Managing MemoryUnderstanding And Managing Memory
Understanding And Managing Memory
isma ishak
 
Main Memory RAM and ROM
Main Memory RAM and ROMMain Memory RAM and ROM
Main Memory RAM and ROM
Archana Gopinath
 
computer Unit 5
computer Unit 5computer Unit 5
computer Unit 5
Aqeel Rehman
 
unit4 and unit5.pptx
unit4 and unit5.pptxunit4 and unit5.pptx
unit4 and unit5.pptx
bobbyk11
 
notes2 memory_cpu
notes2 memory_cpunotes2 memory_cpu
notes2 memory_cpu
Vishesh Shrivastava
 

Similar to Computer memory (20)

301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog
 
Memory and storage devices
Memory and storage devicesMemory and storage devices
Memory and storage devices
 
Memory managment
Memory managmentMemory managment
Memory managment
 
Memory
MemoryMemory
Memory
 
Virtual Memory vs Cache Memory
Virtual Memory vs Cache MemoryVirtual Memory vs Cache Memory
Virtual Memory vs Cache Memory
 
Memory System
Memory SystemMemory System
Memory System
 
RAM :A primary Memory
RAM :A primary MemoryRAM :A primary Memory
RAM :A primary Memory
 
Presentation2 (1).pp text book for students
Presentation2 (1).pp text book for studentsPresentation2 (1).pp text book for students
Presentation2 (1).pp text book for students
 
06 - Memory.ppt
06 - Memory.ppt06 - Memory.ppt
06 - Memory.ppt
 
Topic 10- Random Access Memory (RAM).pptx
Topic 10- Random Access Memory (RAM).pptxTopic 10- Random Access Memory (RAM).pptx
Topic 10- Random Access Memory (RAM).pptx
 
RAM And ROM
RAM And ROMRAM And ROM
RAM And ROM
 
Internal memory
Internal memoryInternal memory
Internal memory
 
Memory & storage devices
Memory & storage devicesMemory & storage devices
Memory & storage devices
 
Memory - RAM and its types
Memory - RAM and its typesMemory - RAM and its types
Memory - RAM and its types
 
Ram and types of ram.Cache
Ram and types of ram.CacheRam and types of ram.Cache
Ram and types of ram.Cache
 
Understanding And Managing Memory
Understanding And Managing MemoryUnderstanding And Managing Memory
Understanding And Managing Memory
 
Main Memory RAM and ROM
Main Memory RAM and ROMMain Memory RAM and ROM
Main Memory RAM and ROM
 
computer Unit 5
computer Unit 5computer Unit 5
computer Unit 5
 
unit4 and unit5.pptx
unit4 and unit5.pptxunit4 and unit5.pptx
unit4 and unit5.pptx
 
notes2 memory_cpu
notes2 memory_cpunotes2 memory_cpu
notes2 memory_cpu
 

More from Ambuj Rai

Cryptography
CryptographyCryptography
Cryptography
Ambuj Rai
 
Sample network engineer resume
Sample network engineer resumeSample network engineer resume
Sample network engineer resume
Ambuj Rai
 
System administrator resume format
System administrator resume formatSystem administrator resume format
System administrator resume format
Ambuj Rai
 
Beautiful resume format in word(1)
Beautiful resume format in word(1)Beautiful resume format in word(1)
Beautiful resume format in word(1)
Ambuj Rai
 
Ram
RamRam
Account1
Account1Account1
Account1
Ambuj Rai
 
Nseindia
NseindiaNseindia
Nseindia
Ambuj Rai
 
Computer presentation
Computer presentationComputer presentation
Computer presentation
Ambuj Rai
 
A rai
A  raiA  rai
A rai
Ambuj Rai
 
Hero moto corps.aaa
Hero moto corps.aaaHero moto corps.aaa
Hero moto corps.aaa
Ambuj Rai
 

More from Ambuj Rai (10)

Cryptography
CryptographyCryptography
Cryptography
 
Sample network engineer resume
Sample network engineer resumeSample network engineer resume
Sample network engineer resume
 
System administrator resume format
System administrator resume formatSystem administrator resume format
System administrator resume format
 
Beautiful resume format in word(1)
Beautiful resume format in word(1)Beautiful resume format in word(1)
Beautiful resume format in word(1)
 
Ram
RamRam
Ram
 
Account1
Account1Account1
Account1
 
Nseindia
NseindiaNseindia
Nseindia
 
Computer presentation
Computer presentationComputer presentation
Computer presentation
 
A rai
A  raiA  rai
A rai
 
Hero moto corps.aaa
Hero moto corps.aaaHero moto corps.aaa
Hero moto corps.aaa
 

Recently uploaded

RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 

Recently uploaded (20)

RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 

Computer memory

  • 1. Computer memory From Wikipedia, the free encyclopedia It has been suggested that Computer data storage be merged into this article or section. (Discuss) Proposed since May 2012. Computer memory types Semiconductor memory Volatile  RAM  DRAM (e.g., DDR SDRAM)  SRAM  In development  T-RAM  Z-RAM  TTRAM  Historical  Williams-Kilburn tube (1946-47)  Delay line memory (1947)  Selectron tube (1953) Non-volatile  ROM  Mask ROM  PROM  EPROM  EEPROM  NVRAM  Flash memory  Early stage NVRAM  nvSRAM  FeRAM  MRAM  PRAM
  • 2.  In development  CBRAM  SONOS  RRAM  Racetrack memory  NRAM  Millipede memory  Historical  Drum memory (1932)  Magnetic-core memory (1949)  Plated wire memory (1957)  Thin-film memory (1962)  Twistor memory (~1968)  Bubble memory (~1970)  V  T  E This article includes a list of references, related reading or external links, but its sources remain unclear because it lacks inline citations. Please improve this article by introducing more precise citations. (June 2011) In computing, memory refers to the physical devices used to store programs (sequences of instructions) or data (e.g. program state information) on a temporary or permanent basis for use in a computer or other digital electronic device. The term primary memory is used for the information in physical systems which are fast (i.e. RAM), as a distinction from secondary memory, which are physical devices for program and data storage which are slow to access but offer higher memory capacity. Primary memory stored on secondary memory is called "virtual memory". The term "storage" is often (but not always) used in separate computers of traditional secondary memory such as tape, magnetic disks and optical discs (CD-ROM and DVD-ROM). The term "memory" is often (but not always) associated with addressablesemiconductor memory, i.e. integrated circuits consisting of silicon-based transistors, used for example as primary memory but also other purposes in computers and other digital electronic devices. There are two main types of semiconductor memory: volatile and non-volatile. Examples of non- volatile memory are flash memory(sometimes used as secondary, sometimes primary computer memory) and ROM/PROM/EPROM/EEPROM memory (used for firmwaresuch as boot programs).
  • 3. Examples of volatile memory are primary memory (typically dynamic RAM, DRAM), and fast CPU cachememory (typically static RAM, SRAM, which is fast but energy-consuming and offer lower memory capacity per area unit than DRAM) . The semiconductor memory is organized into memory cells or bistable flip-flops, each storing one binary bit (0 or 1). The memory cells are grouped into words of fix word length, for example 1, 2, 4, 8, 16, 32, 64 or 128 bit. Each word can be accessed by a binary address of N bit, making it possible to store 2 raised by N words in the memory. This implies that processor registers normally are not considered as memory, since they only store one word and do not include an addressing mechanism. Contents [hide]  1 History  2 Volatile memory  3 Non-volatile memory  4 Management of memory o 4.1 Memory management bugs o 4.2 Early computer systems o 4.3 Virtual memory o 4.4 Protected memory  5 See also  6 References  7 External links [edit]History Detail of the back of a section of ENIAC, showing vacuum tubes In the early 1940s, memory technology mostly permitted a capacity of a few bytes. The first electronic programmable digital computer, the ENIAC, using thousands of octal-base radiovacuum tubes, could
  • 4. perform simple calculations involving 20 numbers of ten decimal digits which were held in the vacuum tube accumulators. The next significant advance in computer memory was with acoustic delay line memorydeveloped by J. Presper Eckert in the early 1940s. Through the construction of a glass tube filled with mercury and plugged at each end with a quartz crystal, delay lines could store bits of information within the quartz and transfer it through sound waves propagating through mercury. Delay line memory would be limited to a capacity of up to a few hundred thousand bits to remain efficient. Two alternatives to the delay line, the Williams tube and Selectron tube, were developed in 1946, both using electron beams in glass tubes as means of storage. Using cathode ray tubes, Fred Williams would invent the Williams tube, which would be the first random access computer memory. The Williams tube would prove to be advantageous to the Selectron tube because of its greater capacity (the Selectron was limited to 256 bits, while the Williams tube could store thousands) and being less expensive. The Williams tube would nevertheless prove to be frustratingly sensitive to environmental disturbances. Efforts began in the late 1940s to find non-volatile memory. Jay Forrester, Jan A. Rajchman and An Wang would be credited with the development of magnetic core memory, which would allow for recall of memory after power loss. Magnetic core memory would become the dominant form of memory until the development of transistor based memory in the late 1960s. The term "memory" when used to reference computers will always be referring to Random Access Memory or RAM. [edit]Volatile memory Volatile memory is computer memory that requires power to maintain the stored information. Most modern semiconductor volatile memory is either Static RAM (see SRAM) or dynamic RAM (see DRAM). SRAM retains its contents as long as the power is connected and is easy to interface to but uses six transistors per bit. Dynamic RAM is more complicated to interface to and control and needs regular refresh cycles to prevent its contents being lost. However, DRAM uses only one transistor and a capacitor per bit, allowing it to reach much higher densities and, with more bits on a memory chip, be much cheaper per bit. SRAM is not worthwhile for desktop system memory, where DRAM dominates, but is used for their cache memories. SRAM is commonplace in small embedded systems, which might only need tens of kilobytes or less. Forthcoming volatile memory technologies that hope to replace or compete with SRAM and DRAM include Z-RAM, TTRAM, A-RAM and ETA RAM. [edit]Non-volatile memory Non-volatile memory is computer memory that can retain the stored information even when not powered. Examples of non-volatile memory include read-only memory (seeROM), flash memory, most
  • 5. types of magnetic computer storage devices (e.g. hard disks, floppy discs and magnetic tape), optical discs, and early computer storage methods such as paper tape and punched cards. Forthcoming non- volatile memory technologies include FeRAM, CBRAM, PRAM, SONOS, RRAM, Racetrack memory, NRAM andMillipede. [edit]Management of memory It has been suggested that this article or section be merged into Memory management. (Discuss) Proposed since February 2011. Main article: Memory management Proper management of memory is vital for a computer system to operate properly. Modern operating systems have complex systems to properly manage memory. Failure to do so can lead to bugs, slow performance, and at worst case, takeover by viruses and malicious software. Nearly everything a computer programmer does requires him or her to consider how to manage memory. Even storing a number in memory requires the programmer to specify how the memory should store it. [edit]Memory management bugs Improper management of memory is a common cause of bugs.  In arithmetic overflow, a calculation results in a number larger than the allocated memory permits. For example, an 8-bit integer allows the numbers −128 to +127. If its value is 127 and it is instructed to add one, the computer can not store the number 128 in that space. Such a case will result in undesired operation, such as changing the number's value to −127 instead of +128.  A memory leak occurs when a program requests memory from the operating system and never returns the memory when it's done with it. A program with this bug will gradually require more and more memory until the program fails as it runs out.  A segmentation fault results when a program tries to access memory that it has no permission to access. Generally a program doing so will be terminated by the operating system.  Buffer overflow means that a program writes data to the end of its allocated space and then continues to write data to memory that belongs to other programs. This may result in erratic program behavior, including memory access errors, incorrect results, a
  • 6. crash, or a breach of system security. They are thus the basis of many software vulnerabilities and can be maliciously exploited. [edit]Early computer systems In early computer systems, programs typically specified the location to write memory and what data to put there. This location was a physical location on the actual memory hardware. The slow processing of such computers did not allow for the complex memory management systems used today. Also, as most such systems were single-task, sophisticated systems were not required as much. This approach has its pitfalls. If the location specified is incorrect, this will cause the computer to write the data to some other part of the program. The results of an error like this are unpredictable. In some cases, the incorrect data might overwrite memory used by the operating system. Computer crackers can take advantage of this to create viruses and malware. [edit]Virtual memory Main article: virtual memory Virtual memory is a system where all physical memory is controlled by the operating system. When a program needs memory, it requests it from the operating system. The operating system then decides what physical location to place the memory in. This offers several advantages. Computer programmers no longer need to worry about where the memory is physically stored or whether the user's computer will have enough memory. It also allows multiple types of memory to be used. For example, some memory can be stored in physical RAM chips while other memory is stored on a hard drive. This drastically increases the amount of memory available to programs. The operating system will place actively used memory in physical RAM, which is much faster than hard disks. When the amount of RAM is not sufficient to run all the current programs, it can result in a situation where the computer spends more time moving memory from RAM to disk and back than it does accomplishing tasks; this is known as thrashing. Virtual memory systems usually include protected memory, but this is not always the case. [edit]Protected memory Main article: memory protection Protected memory is a system where each program is given an area of memory to use and is not permitted to go outside that range. Use of protected memory greatly enhances both the reliability and security of a computer system. Without protected memory, it is possible that a bug in one program will alter the memory used by another program. This will cause that other program to run off of corrupted memory with unpredictable results. If the operating system's memory is corrupted, the entire computer system may crash and need to be rebooted. At times programs intentionally alter the memory used by other programs. This is done by viruses and malware to take over computers.
  • 7. Protected memory assigns programs their own areas of memory. If the operating system detects that a program has tried to alter memory that does not belong to it, the program is terminated. This way, only the offending program crashes, and other programs are not affected by the error. Protected memory systems almost always include virtual memory as well. [edit]See also  Virtual memory  Semiconductor memory  Memory Geometry [edit]References  Miller, Stephen W. (1977), Memory and Storage Technology, Montvale.: AFIPS Press  Memory and Storage Technology, Alexandria, Virginia.: Time Life Books, 1988 [edit]External links  http://computer.howstuffworks.com/computer-memory.htm  http://www.kingston.com/tools/umg/pdf/umg.pdf View page ratings Rate this page What's this? Trustworthy Objective Complete Well-written I am highly knowledgeable about this topic (optional) Submit ratings Categories:  Computer memory  Computer storage  Create account  Log in  Article  Talk
  • 8.  Read  Edit  View history  Main page  Contents  Featured content  Current events  Random article  Donate to Wikipedia Interaction  Help  About Wikipedia  Community portal  Recent changes  Contact Wikipedia Toolbox Print/export Languages  বাাংলা  ‫وردی‬ ‫ک‬  हिन्दी  Latina  Română  සිංහල  中文  This page was last modified on 13 July 2012 at 04:41.  Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. See Terms of use for details. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non- profit organization.  Contact us  Privacy policy  About Wikipedia  Disclaimers  Mobile view  