SlideShare a Scribd company logo
1 of 20
Memory unit is an essential
component in digital computers since it is needed for
storing programs and data. Two or three levels of
memory such as
 Main memory
 Secondary memory and
 Cache memory
                 are provided in a digital computer.
  The main memory is a fast memory.
Main memory stores the programs along with
data, which are to be executed. It also stores
necessary programs of system software. The cache
memory is placed in between the CPU and the main
memory. Secondary memory is permanent storage
used to store programs and data that are used
infrequently.
To identify the behavior of various memories
certain characteristics are considered. These are as
follows-
 Memory types : On the basis of their location inside
the computer, memory can be placed in four groups :
   CPU Registers: these high speed registers in the
    CPU work as memory for temporary storage of
    instruction and data. The data can be read from or
    written into a register within a single clock cycle.
    Main Memory or Primary Memory: Main
    memory size is large and fast accessing external
    memory stores programs and data. This memory is
    slower compared to CPU registers because of main
    memory has large storage capacity is typically 1 and
    2¹⁰ megabyte.
   Secondary Memory: This memory has larger
    in capacity but slower than main memory.
    Secondary memory stores system programs, large
    data files and like the data are not continually
    required by the CPU. It also acts as an overflow
    memory when the capacity of the main memory is
    exceeded. Information in secondary storage is
    accessed indirectly via input output processor that
    transfer information between main and secondary
    memory.
    Cache Memory: Most computers have another level
    of IC memory called cache memory. It is placed
    between CPU registers and main memory. A cache
    memory capacity is less than that of main memory
    but it is faster than that of main memory because
    some or all of it can reside on the same IC as the
    CPU. Cache memories are essential components of
    high performance computers.
    Location: The memory which is inside the
    processor called the internal memory. The memory
    which is external to the processor is known as
    external memory.
   Access Method: Each memory is a collection of
    various memory location. Accessing the memory
    means finding and reaching desired location and than
    reading information from memory location. The
    information from locations can be accessed as
    follows:
1. Random access
 2. Sequential access
 3. Direct access.
 Random Access: It is the access mode where each
  memory location has a unique address. Using these
  unique addresses each memory location can be
  addressed independently in any order in equal
  amount of time. Generally, main memories are
  random access memories.
    Sequential Access: If storage locations can be
    accessed only in a certain predetermined sequence,
    the access method is known as serial or sequential
    access.
    Direct Access: In this access information is stored on
    tracks and each track has a separate read/write head.
    This features makes it a semi random mode which is
    generally used in magnetic disks.
    Volatile Memories: The memories that looses their
    contents when the power is turned off called volatile
    memories.
    Non-volatile Memories: The memories that do not
    loose their contents when the power is removed
    called Non-volatile memories.
In general the memory is classified in two types
  based on their mode of access of a memory
  system.
 1. Random access memory
 2. Sequential access memory
 Random Access Memory: The world of
  data reading or writing from or to the memory
  requires same time. We can access the data
  randomly.
    Example: hard disk.
    Sequential Access Memory: The information stored
    in some medium is not immediately accessible but is
    available as certain intervals of time. The access time
    is variable.
      Example: magnetic tape.
   Static RAM: It consist of internal latches that
    store the binary information. The stored information
    remains valid as long as power is applied to the unit.
    Dynamic RAM: It stores the binary information
    in the form of electric charges on capacitors. The
    capacitors are provided inside the chip by MOS
    transistors. The stored charge on the capacitor tends
    to discharge with time and the capacitors must be
    periodically recharged by refreshing the dynamic
    memory.
   Read only memory: It is non-volatile
 memory, which retains the data even when power is
 removed from this memory. Programs and data that
 can not be altered are stored in ROM. The required
 paths in a ROM may be programmed in four different
 ways:
1. Mask Programming: It is done by the company
 during the fabrication process of the unit. The
 procedure for fabricating a ROM requires that the
 customer fills out the truth table he wishes the ROM
 to satisfy.
2. Programmable Read only memory(PROM):
PROM contain all the fuses intact giving all 1’s in the
bits of the stored words. A blown fuse defines binary
 0 state and an intact fuse give a binary 1 state. This
  allows the user to program the PROM by using a
   special instruments called PROM programmer.
3. Erasable PROM(EPROM): In a PROM once fixed
 pattern is permanent and can not be altered. The
 EPROM can be restructured to the initial state even
 through it has been programmed previously. When
 EPROM is placed under a special ultra-violet light
 for a given period of time all the data are erased.
 After erase, the EPROM returns to it initial state and
 can be programmed to a new set of values.
4. Electrically Erasable PROM(EEPROM): It is
 similar to EPROM except that the previously
 programmed connections can be erased with an
 electrical signal instead of ultra violet light. The
 advantage is that device can be erased without
 removing it from it’s socket.
THANKING YOU…

More Related Content

What's hot

RAM (Random Access Memory)
RAM (Random Access Memory)RAM (Random Access Memory)
RAM (Random Access Memory)divyanshbatham
 
Memory Organization
Memory OrganizationMemory Organization
Memory OrganizationStella526835
 
Memory organisation
Memory organisationMemory organisation
Memory organisationankush_kumar
 
Cache memory ppt
Cache memory ppt  Cache memory ppt
Cache memory ppt Arpita Naik
 
Computer registers
Computer registersComputer registers
Computer registersDeepikaT13
 
Memory mapped I/O and Isolated I/O
Memory mapped I/O and Isolated I/OMemory mapped I/O and Isolated I/O
Memory mapped I/O and Isolated I/OBharat Kharbanda
 
Memory organization
Memory organizationMemory organization
Memory organizationDhaval Bagal
 
Virtual memory
Virtual memoryVirtual memory
Virtual memoryAnuj Modi
 
Register Transfer Language,Bus and Memory Transfer
Register Transfer Language,Bus and Memory TransferRegister Transfer Language,Bus and Memory Transfer
Register Transfer Language,Bus and Memory Transferlavanya marichamy
 
Ram and-rom-chips
Ram and-rom-chipsRam and-rom-chips
Ram and-rom-chipsAnuj Modi
 
Cache memory and virtual memory
Cache memory and virtual memoryCache memory and virtual memory
Cache memory and virtual memoryPrakharBansal29
 
Direct Memory Access & Interrrupts
Direct Memory Access & InterrruptsDirect Memory Access & Interrrupts
Direct Memory Access & InterrruptsSharmilaChidaravalli
 

What's hot (20)

Memory Hierarchy
Memory HierarchyMemory Hierarchy
Memory Hierarchy
 
RAM (Random Access Memory)
RAM (Random Access Memory)RAM (Random Access Memory)
RAM (Random Access Memory)
 
Memory Organization
Memory OrganizationMemory Organization
Memory Organization
 
Interrupts
InterruptsInterrupts
Interrupts
 
Memory organisation
Memory organisationMemory organisation
Memory organisation
 
Cache memory ppt
Cache memory ppt  Cache memory ppt
Cache memory ppt
 
Computer registers
Computer registersComputer registers
Computer registers
 
Memory mapped I/O and Isolated I/O
Memory mapped I/O and Isolated I/OMemory mapped I/O and Isolated I/O
Memory mapped I/O and Isolated I/O
 
Memory organization
Memory organizationMemory organization
Memory organization
 
Cache memory
Cache memoryCache memory
Cache memory
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
Register Transfer Language,Bus and Memory Transfer
Register Transfer Language,Bus and Memory TransferRegister Transfer Language,Bus and Memory Transfer
Register Transfer Language,Bus and Memory Transfer
 
Memory management
Memory managementMemory management
Memory management
 
Ram and-rom-chips
Ram and-rom-chipsRam and-rom-chips
Ram and-rom-chips
 
memory hierarchy
memory hierarchymemory hierarchy
memory hierarchy
 
Cache memory and virtual memory
Cache memory and virtual memoryCache memory and virtual memory
Cache memory and virtual memory
 
Direct Memory Access & Interrrupts
Direct Memory Access & InterrruptsDirect Memory Access & Interrrupts
Direct Memory Access & Interrrupts
 
Control unit
Control unitControl unit
Control unit
 
Internal memory
Internal memoryInternal memory
Internal memory
 
Cache memory
Cache memoryCache memory
Cache memory
 

Viewers also liked

Computer organization memory hierarchy
Computer organization memory hierarchyComputer organization memory hierarchy
Computer organization memory hierarchyAJAL A J
 
AI- memory organisation systems
AI-  memory organisation systemsAI-  memory organisation systems
AI- memory organisation systemsratikaagarwal
 
Computer memory
Computer memoryComputer memory
Computer memorynikunjandy
 
8 memory management strategies
8 memory management strategies8 memory management strategies
8 memory management strategiesDr. Loganathan R
 
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER Rajat More
 
COMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSCOMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSAngel Mary George
 
8085 microprocessor architecture ppt
8085 microprocessor architecture ppt8085 microprocessor architecture ppt
8085 microprocessor architecture pptParvesh Gautam
 
Operating Systems: Memory Management
Operating Systems: Memory ManagementOperating Systems: Memory Management
Operating Systems: Memory ManagementDamian T. Gordon
 
An Organizational Memory and Knowledge System (OMKS): Building Modern Decisio...
An Organizational Memory and Knowledge System (OMKS): Building Modern Decisio...An Organizational Memory and Knowledge System (OMKS): Building Modern Decisio...
An Organizational Memory and Knowledge System (OMKS): Building Modern Decisio...Waqas Tariq
 

Viewers also liked (20)

Memory organization
Memory organizationMemory organization
Memory organization
 
Memory Organization
Memory OrganizationMemory Organization
Memory Organization
 
Memory hierarchy
Memory hierarchyMemory hierarchy
Memory hierarchy
 
Computer organization memory hierarchy
Computer organization memory hierarchyComputer organization memory hierarchy
Computer organization memory hierarchy
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Presentation on memory
Presentation on memoryPresentation on memory
Presentation on memory
 
AI- memory organisation systems
AI-  memory organisation systemsAI-  memory organisation systems
AI- memory organisation systems
 
Cache memory
Cache memoryCache memory
Cache memory
 
Memory Hierarchy
Memory HierarchyMemory Hierarchy
Memory Hierarchy
 
04 Cache Memory
04  Cache  Memory04  Cache  Memory
04 Cache Memory
 
Computer memory
Computer memoryComputer memory
Computer memory
 
8 memory management strategies
8 memory management strategies8 memory management strategies
8 memory management strategies
 
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
 
COMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSCOMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONS
 
Cache memory presentation
Cache memory presentationCache memory presentation
Cache memory presentation
 
8085 microprocessor architecture ppt
8085 microprocessor architecture ppt8085 microprocessor architecture ppt
8085 microprocessor architecture ppt
 
Operating Systems: Memory Management
Operating Systems: Memory ManagementOperating Systems: Memory Management
Operating Systems: Memory Management
 
An Organizational Memory and Knowledge System (OMKS): Building Modern Decisio...
An Organizational Memory and Knowledge System (OMKS): Building Modern Decisio...An Organizational Memory and Knowledge System (OMKS): Building Modern Decisio...
An Organizational Memory and Knowledge System (OMKS): Building Modern Decisio...
 
Lec5
Lec5Lec5
Lec5
 

Similar to Memory organisation ppt final presentation

AI and EXPERT SYSTEM of expert system .pptx
AI and EXPERT SYSTEM of expert system .pptxAI and EXPERT SYSTEM of expert system .pptx
AI and EXPERT SYSTEM of expert system .pptxsanjutoppo93
 
Memory Organization of a Computer System
Memory Organization of a Computer SystemMemory Organization of a Computer System
Memory Organization of a Computer SystemTaminul Islam
 
2. the memory systems (module2)
2. the memory systems (module2)2. the memory systems (module2)
2. the memory systems (module2)Ajit Saraf
 
digital logic circuits, digital component memory unit
 digital logic circuits, digital component memory unit digital logic circuits, digital component memory unit
digital logic circuits, digital component memory unitRai University
 
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unitBca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unitRai University
 
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unitB.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unitRai University
 
Memory and storage
Memory and storageMemory and storage
Memory and storageTapan Khilar
 
All about Computer memory in one ppt
All about Computer memory in one pptAll about Computer memory in one ppt
All about Computer memory in one pptANKURTOMAR29
 
Memory Unit For engineering
Memory Unit For engineeringMemory Unit For engineering
Memory Unit For engineeringAnimesh Mangla
 

Similar to Memory organisation ppt final presentation (20)

AI and EXPERT SYSTEM of expert system .pptx
AI and EXPERT SYSTEM of expert system .pptxAI and EXPERT SYSTEM of expert system .pptx
AI and EXPERT SYSTEM of expert system .pptx
 
Computer memory
Computer memoryComputer memory
Computer memory
 
M E M O R Y
M E M O R YM E M O R Y
M E M O R Y
 
Memory
MemoryMemory
Memory
 
Memory managment
Memory managmentMemory managment
Memory managment
 
Memory devices
Memory devicesMemory devices
Memory devices
 
CA UNIT V..pptx
CA UNIT V..pptxCA UNIT V..pptx
CA UNIT V..pptx
 
Rahman
RahmanRahman
Rahman
 
Memory Organization of a Computer System
Memory Organization of a Computer SystemMemory Organization of a Computer System
Memory Organization of a Computer System
 
2. the memory systems (module2)
2. the memory systems (module2)2. the memory systems (module2)
2. the memory systems (module2)
 
Memory Presentation
Memory PresentationMemory Presentation
Memory Presentation
 
digital logic circuits, digital component memory unit
 digital logic circuits, digital component memory unit digital logic circuits, digital component memory unit
digital logic circuits, digital component memory unit
 
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unitBca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
 
Segment 3.pptx
Segment 3.pptxSegment 3.pptx
Segment 3.pptx
 
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unitB.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
 
Memory and storage
Memory and storageMemory and storage
Memory and storage
 
Memory Devices.pptx
Memory Devices.pptxMemory Devices.pptx
Memory Devices.pptx
 
All about Computer memory in one ppt
All about Computer memory in one pptAll about Computer memory in one ppt
All about Computer memory in one ppt
 
Memory Unit For engineering
Memory Unit For engineeringMemory Unit For engineering
Memory Unit For engineering
 
Memory (2)
Memory (2)Memory (2)
Memory (2)
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Memory organisation ppt final presentation

  • 1.
  • 2. Memory unit is an essential component in digital computers since it is needed for storing programs and data. Two or three levels of memory such as  Main memory  Secondary memory and  Cache memory are provided in a digital computer. The main memory is a fast memory.
  • 3. Main memory stores the programs along with data, which are to be executed. It also stores necessary programs of system software. The cache memory is placed in between the CPU and the main memory. Secondary memory is permanent storage used to store programs and data that are used infrequently.
  • 4. To identify the behavior of various memories certain characteristics are considered. These are as follows- Memory types : On the basis of their location inside the computer, memory can be placed in four groups :
  • 5.
  • 6. CPU Registers: these high speed registers in the CPU work as memory for temporary storage of instruction and data. The data can be read from or written into a register within a single clock cycle.  Main Memory or Primary Memory: Main memory size is large and fast accessing external memory stores programs and data. This memory is slower compared to CPU registers because of main memory has large storage capacity is typically 1 and 2¹⁰ megabyte.
  • 7. Secondary Memory: This memory has larger in capacity but slower than main memory. Secondary memory stores system programs, large data files and like the data are not continually required by the CPU. It also acts as an overflow memory when the capacity of the main memory is exceeded. Information in secondary storage is accessed indirectly via input output processor that transfer information between main and secondary memory.
  • 8. Cache Memory: Most computers have another level of IC memory called cache memory. It is placed between CPU registers and main memory. A cache memory capacity is less than that of main memory but it is faster than that of main memory because some or all of it can reside on the same IC as the CPU. Cache memories are essential components of high performance computers.
  • 9. Location: The memory which is inside the processor called the internal memory. The memory which is external to the processor is known as external memory.  Access Method: Each memory is a collection of various memory location. Accessing the memory means finding and reaching desired location and than reading information from memory location. The information from locations can be accessed as follows:
  • 10. 1. Random access 2. Sequential access 3. Direct access.  Random Access: It is the access mode where each memory location has a unique address. Using these unique addresses each memory location can be addressed independently in any order in equal amount of time. Generally, main memories are random access memories.
  • 11. Sequential Access: If storage locations can be accessed only in a certain predetermined sequence, the access method is known as serial or sequential access.  Direct Access: In this access information is stored on tracks and each track has a separate read/write head. This features makes it a semi random mode which is generally used in magnetic disks.
  • 12. Volatile Memories: The memories that looses their contents when the power is turned off called volatile memories.  Non-volatile Memories: The memories that do not loose their contents when the power is removed called Non-volatile memories.
  • 13. In general the memory is classified in two types based on their mode of access of a memory system. 1. Random access memory 2. Sequential access memory  Random Access Memory: The world of data reading or writing from or to the memory requires same time. We can access the data randomly. Example: hard disk.
  • 14. Sequential Access Memory: The information stored in some medium is not immediately accessible but is available as certain intervals of time. The access time is variable. Example: magnetic tape.
  • 15. Static RAM: It consist of internal latches that store the binary information. The stored information remains valid as long as power is applied to the unit.  Dynamic RAM: It stores the binary information in the form of electric charges on capacitors. The capacitors are provided inside the chip by MOS transistors. The stored charge on the capacitor tends to discharge with time and the capacitors must be periodically recharged by refreshing the dynamic memory.
  • 16. Read only memory: It is non-volatile memory, which retains the data even when power is removed from this memory. Programs and data that can not be altered are stored in ROM. The required paths in a ROM may be programmed in four different ways: 1. Mask Programming: It is done by the company during the fabrication process of the unit. The procedure for fabricating a ROM requires that the customer fills out the truth table he wishes the ROM to satisfy.
  • 17. 2. Programmable Read only memory(PROM): PROM contain all the fuses intact giving all 1’s in the bits of the stored words. A blown fuse defines binary 0 state and an intact fuse give a binary 1 state. This allows the user to program the PROM by using a special instruments called PROM programmer.
  • 18. 3. Erasable PROM(EPROM): In a PROM once fixed pattern is permanent and can not be altered. The EPROM can be restructured to the initial state even through it has been programmed previously. When EPROM is placed under a special ultra-violet light for a given period of time all the data are erased. After erase, the EPROM returns to it initial state and can be programmed to a new set of values.
  • 19. 4. Electrically Erasable PROM(EEPROM): It is similar to EPROM except that the previously programmed connections can be erased with an electrical signal instead of ultra violet light. The advantage is that device can be erased without removing it from it’s socket.