SlideShare a Scribd company logo
1 of 10
Memory Hierarchy
SlideMake.com
Introduction to Memory Hierarchy
Memory hierarchy refers to the
organization of different types of memory in
a computer system.
It helps in achieving a balance between
cost, capacity, and performance.
The hierarchy consists of multiple levels,
each with varying characteristics and
speeds.
Level 1 Cache
The Level 1 (L1) cache is the fastest and
closest to the CPU.
It is typically divided into separate
instruction and data caches.
L1 cache stores frequently accessed data
and instructions to reduce latency.
Level 2 Cache
The Level 2 (L2) cache is larger but slower
than the L1 cache.
It acts as a backup to the L1 cache and
stores additional data.
L2 cache improves performance by
reducing the frequency of accessing main
memory.
Main Memory
Main memory, also known as Random-
Access Memory (RAM), is larger but slower
than the cache.
It stores data and instructions that are
actively used by the CPU.
Main memory provides fast access to data,
but its capacity is limited compared to
secondary storage.
Virtual Memory
Virtual memory uses a combination of main
memory and secondary storage (such as a
hard disk) to increase the effective memory
capacity.
It allows programs to address more
memory than is physically available.
Virtual memory enables efficient
multitasking and supports large
applications.
Secondary Storage
Secondary storage devices, like hard disks
and solid-state drives (SSDs), offer large
storage capacity.
They are slower than main memory but
provide non-volatile storage.
Secondary storage is used for long-term
data storage and program files.
Register Files
Register files are the fastest form of
memory and are located within the CPU.
They store data and instructions that are
immediately needed by the CPU.
Register files have limited capacity and are
accessed directly by the CPU's arithmetic
and logic units.
Memory Hierarchy Summary
Memory hierarchy is essential for
optimizing computer system performance.
It consists of cache levels, main memory,
virtual memory, secondary storage, and
register files.
Each level of the hierarchy provides a
trade-off between speed, capacity, and
cost.
References
Computer Organization and Design: The
Hardware/Software Interface by David A.
Patterson and John L. Hennessy.
Computer Architecture: A Quantitative
Approach by John L. Hennessy and David
A. Patterson.
Memory Hierarchy and Caching

More Related Content

Similar to Memory Hierarchy.yyyyyyyyyyyyyyyyyyypptx

2. the memory systems (module2)
2. the memory systems (module2)2. the memory systems (module2)
2. the memory systems (module2)
Ajit Saraf
 

Similar to Memory Hierarchy.yyyyyyyyyyyyyyyyyyypptx (20)

Cache Memory.ppt
Cache Memory.pptCache Memory.ppt
Cache Memory.ppt
 
2. the memory systems (module2)
2. the memory systems (module2)2. the memory systems (module2)
2. the memory systems (module2)
 
Memory Hierarchy.pptx
Memory Hierarchy.pptxMemory Hierarchy.pptx
Memory Hierarchy.pptx
 
Memory hierarchy
Memory hierarchyMemory hierarchy
Memory hierarchy
 
Computer memory and types of memory.pptx
Computer memory and types of memory.pptxComputer memory and types of memory.pptx
Computer memory and types of memory.pptx
 
Ram and types of ram.Cache
Ram and types of ram.CacheRam and types of ram.Cache
Ram and types of ram.Cache
 
Secondary Memory
Secondary MemorySecondary Memory
Secondary Memory
 
Linux Internals - Interview essentials 3.0
Linux Internals - Interview essentials 3.0Linux Internals - Interview essentials 3.0
Linux Internals - Interview essentials 3.0
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Memory Organization of a Computer System
Memory Organization of a Computer SystemMemory Organization of a Computer System
Memory Organization of a Computer System
 
ملٹی لیول کے شے۔
ملٹی لیول کے شے۔ملٹی لیول کے شے۔
ملٹی لیول کے شے۔
 
Memory organization
Memory organizationMemory organization
Memory organization
 
Memory Hierarchy
Memory HierarchyMemory Hierarchy
Memory Hierarchy
 
notes2 memory_cpu
notes2 memory_cpunotes2 memory_cpu
notes2 memory_cpu
 
input output and secondary storage devices.pptx
input output and secondary storage devices.pptxinput output and secondary storage devices.pptx
input output and secondary storage devices.pptx
 
Ppt cache vs virtual memory without animation
Ppt cache vs virtual memory without animationPpt cache vs virtual memory without animation
Ppt cache vs virtual memory without animation
 
I/O System and Case study
I/O System and Case studyI/O System and Case study
I/O System and Case study
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Chap3 primary memory
Chap3 primary memoryChap3 primary memory
Chap3 primary memory
 
Cache memory
Cache memoryCache memory
Cache memory
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Memory Hierarchy.yyyyyyyyyyyyyyyyyyypptx

  • 2. Introduction to Memory Hierarchy Memory hierarchy refers to the organization of different types of memory in a computer system. It helps in achieving a balance between cost, capacity, and performance. The hierarchy consists of multiple levels, each with varying characteristics and speeds.
  • 3. Level 1 Cache The Level 1 (L1) cache is the fastest and closest to the CPU. It is typically divided into separate instruction and data caches. L1 cache stores frequently accessed data and instructions to reduce latency.
  • 4. Level 2 Cache The Level 2 (L2) cache is larger but slower than the L1 cache. It acts as a backup to the L1 cache and stores additional data. L2 cache improves performance by reducing the frequency of accessing main memory.
  • 5. Main Memory Main memory, also known as Random- Access Memory (RAM), is larger but slower than the cache. It stores data and instructions that are actively used by the CPU. Main memory provides fast access to data, but its capacity is limited compared to secondary storage.
  • 6. Virtual Memory Virtual memory uses a combination of main memory and secondary storage (such as a hard disk) to increase the effective memory capacity. It allows programs to address more memory than is physically available. Virtual memory enables efficient multitasking and supports large applications.
  • 7. Secondary Storage Secondary storage devices, like hard disks and solid-state drives (SSDs), offer large storage capacity. They are slower than main memory but provide non-volatile storage. Secondary storage is used for long-term data storage and program files.
  • 8. Register Files Register files are the fastest form of memory and are located within the CPU. They store data and instructions that are immediately needed by the CPU. Register files have limited capacity and are accessed directly by the CPU's arithmetic and logic units.
  • 9. Memory Hierarchy Summary Memory hierarchy is essential for optimizing computer system performance. It consists of cache levels, main memory, virtual memory, secondary storage, and register files. Each level of the hierarchy provides a trade-off between speed, capacity, and cost.
  • 10. References Computer Organization and Design: The Hardware/Software Interface by David A. Patterson and John L. Hennessy. Computer Architecture: A Quantitative Approach by John L. Hennessy and David A. Patterson. Memory Hierarchy and Caching

Editor's Notes

  1. Image source: https://www.codingninjas.com/codestudio/library/memory-hierarchy-design-and-its-characteristics
  2. Image source: https://www.utmel.com/blog/categories/memory%20chip/beginner's-guide-to-cache-memory
  3. Image source: https://alexisnewsbailey.blogspot.com/2022/04/describe-three-levels-of-cache-used-by.html
  4. Image source: https://techdhoom.in/index.php/2018/06/05/types-of-random-access-memory-ram/
  5. Image source: https://iboysoft.com/wiki/virtual-memory.html
  6. Image source: https://www.slideserve.com/kiet/secondary-storage-devices
  7. Image source: https://www.javatpoint.com/register-memory
  8. Image source: https://www.youtube.com/watch?v=1JB86jsvvRE