SlideShare una empresa de Scribd logo
1 de 20
Memory unit is an essential
component in digital computers since it is needed for
storing programs and data. Two or three levels of
memory such as
 Main memory
 Secondary memory and
 Cache memory
                 are provided in a digital computer.
  The main memory is a fast memory.
Main memory stores the programs along with
data, which are to be executed. It also stores
necessary programs of system software. The cache
memory is placed in between the CPU and the main
memory. Secondary memory is permanent storage
used to store programs and data that are used
infrequently.
To identify the behavior of various memories
certain characteristics are considered. These are as
follows-
 Memory types : On the basis of their location inside
the computer, memory can be placed in four groups :
   CPU Registers: these high speed registers in the
    CPU work as memory for temporary storage of
    instruction and data. The data can be read from or
    written into a register within a single clock cycle.
    Main Memory or Primary Memory: Main
    memory size is large and fast accessing external
    memory stores programs and data. This memory is
    slower compared to CPU registers because of main
    memory has large storage capacity is typically 1 and
    2¹⁰ megabyte.
   Secondary Memory: This memory has larger
    in capacity but slower than main memory.
    Secondary memory stores system programs, large
    data files and like the data are not continually
    required by the CPU. It also acts as an overflow
    memory when the capacity of the main memory is
    exceeded. Information in secondary storage is
    accessed indirectly via input output processor that
    transfer information between main and secondary
    memory.
    Cache Memory: Most computers have another level
    of IC memory called cache memory. It is placed
    between CPU registers and main memory. A cache
    memory capacity is less than that of main memory
    but it is faster than that of main memory because
    some or all of it can reside on the same IC as the
    CPU. Cache memories are essential components of
    high performance computers.
    Location: The memory which is inside the
    processor called the internal memory. The memory
    which is external to the processor is known as
    external memory.
   Access Method: Each memory is a collection of
    various memory location. Accessing the memory
    means finding and reaching desired location and than
    reading information from memory location. The
    information from locations can be accessed as
    follows:
1. Random access
 2. Sequential access
 3. Direct access.
 Random Access: It is the access mode where each
  memory location has a unique address. Using these
  unique addresses each memory location can be
  addressed independently in any order in equal
  amount of time. Generally, main memories are
  random access memories.
    Sequential Access: If storage locations can be
    accessed only in a certain predetermined sequence,
    the access method is known as serial or sequential
    access.
    Direct Access: In this access information is stored on
    tracks and each track has a separate read/write head.
    This features makes it a semi random mode which is
    generally used in magnetic disks.
    Volatile Memories: The memories that looses their
    contents when the power is turned off called volatile
    memories.
    Non-volatile Memories: The memories that do not
    loose their contents when the power is removed
    called Non-volatile memories.
In general the memory is classified in two types
  based on their mode of access of a memory
  system.
 1. Random access memory
 2. Sequential access memory
 Random Access Memory: The world of
  data reading or writing from or to the memory
  requires same time. We can access the data
  randomly.
    Example: hard disk.
    Sequential Access Memory: The information stored
    in some medium is not immediately accessible but is
    available as certain intervals of time. The access time
    is variable.
      Example: magnetic tape.
   Static RAM: It consist of internal latches that
    store the binary information. The stored information
    remains valid as long as power is applied to the unit.
    Dynamic RAM: It stores the binary information
    in the form of electric charges on capacitors. The
    capacitors are provided inside the chip by MOS
    transistors. The stored charge on the capacitor tends
    to discharge with time and the capacitors must be
    periodically recharged by refreshing the dynamic
    memory.
   Read only memory: It is non-volatile
 memory, which retains the data even when power is
 removed from this memory. Programs and data that
 can not be altered are stored in ROM. The required
 paths in a ROM may be programmed in four different
 ways:
1. Mask Programming: It is done by the company
 during the fabrication process of the unit. The
 procedure for fabricating a ROM requires that the
 customer fills out the truth table he wishes the ROM
 to satisfy.
2. Programmable Read only memory(PROM):
PROM contain all the fuses intact giving all 1’s in the
bits of the stored words. A blown fuse defines binary
 0 state and an intact fuse give a binary 1 state. This
  allows the user to program the PROM by using a
   special instruments called PROM programmer.
3. Erasable PROM(EPROM): In a PROM once fixed
 pattern is permanent and can not be altered. The
 EPROM can be restructured to the initial state even
 through it has been programmed previously. When
 EPROM is placed under a special ultra-violet light
 for a given period of time all the data are erased.
 After erase, the EPROM returns to it initial state and
 can be programmed to a new set of values.
4. Electrically Erasable PROM(EEPROM): It is
 similar to EPROM except that the previously
 programmed connections can be erased with an
 electrical signal instead of ultra violet light. The
 advantage is that device can be erased without
 removing it from it’s socket.
THANKING YOU…

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Magnetic Disk
Magnetic Disk Magnetic Disk
Magnetic Disk
 
Secondary memory
Secondary memorySecondary memory
Secondary memory
 
COMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSCOMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONS
 
Interrupts
InterruptsInterrupts
Interrupts
 
Associative memory 14208
Associative memory 14208Associative memory 14208
Associative memory 14208
 
Random access memory
Random access memoryRandom access memory
Random access memory
 
Memory hierarchy
Memory hierarchyMemory hierarchy
Memory hierarchy
 
Computer architecture cache memory
Computer architecture cache memoryComputer architecture cache memory
Computer architecture cache memory
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
ROM(Read Only Memory )
ROM(Read Only Memory )ROM(Read Only Memory )
ROM(Read Only Memory )
 
Cache Memory
Cache MemoryCache Memory
Cache Memory
 
Cache memory ppt
Cache memory ppt  Cache memory ppt
Cache memory ppt
 
Micro programmed control
Micro programmed  controlMicro programmed  control
Micro programmed control
 
Memory Hierarchy
Memory HierarchyMemory Hierarchy
Memory Hierarchy
 
Microprogrammed Control Unit
Microprogrammed Control UnitMicroprogrammed Control Unit
Microprogrammed Control Unit
 
Cache memory
Cache memoryCache memory
Cache memory
 
Memory hierarchy
Memory hierarchyMemory hierarchy
Memory hierarchy
 
Secondary Storage
Secondary StorageSecondary Storage
Secondary Storage
 
Primary Memory: RAM, ROM and their Types
Primary Memory: RAM, ROM and their TypesPrimary Memory: RAM, ROM and their Types
Primary Memory: RAM, ROM and their Types
 
Computer organization
Computer organizationComputer organization
Computer organization
 

Destacado

Memory organisation
Memory organisationMemory organisation
Memory organisationankush_kumar
 
Computer organization memory hierarchy
Computer organization memory hierarchyComputer organization memory hierarchy
Computer organization memory hierarchyAJAL A J
 
AI- memory organisation systems
AI-  memory organisation systemsAI-  memory organisation systems
AI- memory organisation systemsratikaagarwal
 
Cache memory
Cache memoryCache memory
Cache memoryAnuj Modi
 
Computer memory
Computer memoryComputer memory
Computer memorynikunjandy
 
8 memory management strategies
8 memory management strategies8 memory management strategies
8 memory management strategiesDr. Loganathan R
 
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER Rajat More
 
8085 microprocessor architecture ppt
8085 microprocessor architecture ppt8085 microprocessor architecture ppt
8085 microprocessor architecture pptParvesh Gautam
 
Operating Systems: Memory Management
Operating Systems: Memory ManagementOperating Systems: Memory Management
Operating Systems: Memory ManagementDamian T. Gordon
 
An Organizational Memory and Knowledge System (OMKS): Building Modern Decisio...
An Organizational Memory and Knowledge System (OMKS): Building Modern Decisio...An Organizational Memory and Knowledge System (OMKS): Building Modern Decisio...
An Organizational Memory and Knowledge System (OMKS): Building Modern Decisio...Waqas Tariq
 

Destacado (20)

Memory organization
Memory organizationMemory organization
Memory organization
 
Memory organisation
Memory organisationMemory organisation
Memory organisation
 
Memory Organization
Memory OrganizationMemory Organization
Memory Organization
 
Computer organization memory hierarchy
Computer organization memory hierarchyComputer organization memory hierarchy
Computer organization memory hierarchy
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Presentation on memory
Presentation on memoryPresentation on memory
Presentation on memory
 
AI- memory organisation systems
AI-  memory organisation systemsAI-  memory organisation systems
AI- memory organisation systems
 
Cache memory
Cache memoryCache memory
Cache memory
 
Memory Hierarchy
Memory HierarchyMemory Hierarchy
Memory Hierarchy
 
04 Cache Memory
04  Cache  Memory04  Cache  Memory
04 Cache Memory
 
Cache memory
Cache memoryCache memory
Cache memory
 
Computer memory
Computer memoryComputer memory
Computer memory
 
8 memory management strategies
8 memory management strategies8 memory management strategies
8 memory management strategies
 
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
 
Cache memory presentation
Cache memory presentationCache memory presentation
Cache memory presentation
 
8085 microprocessor architecture ppt
8085 microprocessor architecture ppt8085 microprocessor architecture ppt
8085 microprocessor architecture ppt
 
Operating Systems: Memory Management
Operating Systems: Memory ManagementOperating Systems: Memory Management
Operating Systems: Memory Management
 
An Organizational Memory and Knowledge System (OMKS): Building Modern Decisio...
An Organizational Memory and Knowledge System (OMKS): Building Modern Decisio...An Organizational Memory and Knowledge System (OMKS): Building Modern Decisio...
An Organizational Memory and Knowledge System (OMKS): Building Modern Decisio...
 
Lec5
Lec5Lec5
Lec5
 

Similar a Memory organisation ppt final presentation

Memory Organization
Memory OrganizationMemory Organization
Memory OrganizationStella526835
 
AI and EXPERT SYSTEM of expert system .pptx
AI and EXPERT SYSTEM of expert system .pptxAI and EXPERT SYSTEM of expert system .pptx
AI and EXPERT SYSTEM of expert system .pptxsanjutoppo93
 
Memory Organization of a Computer System
Memory Organization of a Computer SystemMemory Organization of a Computer System
Memory Organization of a Computer SystemTaminul Islam
 
2. the memory systems (module2)
2. the memory systems (module2)2. the memory systems (module2)
2. the memory systems (module2)Ajit Saraf
 
digital logic circuits, digital component memory unit
 digital logic circuits, digital component memory unit digital logic circuits, digital component memory unit
digital logic circuits, digital component memory unitRai University
 
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unitBca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unitRai University
 
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unitB.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unitRai University
 
Memory and storage
Memory and storageMemory and storage
Memory and storageTapan Khilar
 
All about Computer memory in one ppt
All about Computer memory in one pptAll about Computer memory in one ppt
All about Computer memory in one pptANKURTOMAR29
 
Memory Unit For engineering
Memory Unit For engineeringMemory Unit For engineering
Memory Unit For engineeringAnimesh Mangla
 

Similar a Memory organisation ppt final presentation (20)

Memory Organization
Memory OrganizationMemory Organization
Memory Organization
 
AI and EXPERT SYSTEM of expert system .pptx
AI and EXPERT SYSTEM of expert system .pptxAI and EXPERT SYSTEM of expert system .pptx
AI and EXPERT SYSTEM of expert system .pptx
 
Computer memory
Computer memoryComputer memory
Computer memory
 
M E M O R Y
M E M O R YM E M O R Y
M E M O R Y
 
Memory
MemoryMemory
Memory
 
Memory managment
Memory managmentMemory managment
Memory managment
 
Memory devices
Memory devicesMemory devices
Memory devices
 
CA UNIT V..pptx
CA UNIT V..pptxCA UNIT V..pptx
CA UNIT V..pptx
 
Rahman
RahmanRahman
Rahman
 
Memory Organization of a Computer System
Memory Organization of a Computer SystemMemory Organization of a Computer System
Memory Organization of a Computer System
 
2. the memory systems (module2)
2. the memory systems (module2)2. the memory systems (module2)
2. the memory systems (module2)
 
Memory Presentation
Memory PresentationMemory Presentation
Memory Presentation
 
digital logic circuits, digital component memory unit
 digital logic circuits, digital component memory unit digital logic circuits, digital component memory unit
digital logic circuits, digital component memory unit
 
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unitBca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
 
Segment 3.pptx
Segment 3.pptxSegment 3.pptx
Segment 3.pptx
 
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unitB.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
 
Memory and storage
Memory and storageMemory and storage
Memory and storage
 
Memory Devices.pptx
Memory Devices.pptxMemory Devices.pptx
Memory Devices.pptx
 
All about Computer memory in one ppt
All about Computer memory in one pptAll about Computer memory in one ppt
All about Computer memory in one ppt
 
Memory Unit For engineering
Memory Unit For engineeringMemory Unit For engineering
Memory Unit For engineering
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Memory organisation ppt final presentation

  • 1.
  • 2. Memory unit is an essential component in digital computers since it is needed for storing programs and data. Two or three levels of memory such as  Main memory  Secondary memory and  Cache memory are provided in a digital computer. The main memory is a fast memory.
  • 3. Main memory stores the programs along with data, which are to be executed. It also stores necessary programs of system software. The cache memory is placed in between the CPU and the main memory. Secondary memory is permanent storage used to store programs and data that are used infrequently.
  • 4. To identify the behavior of various memories certain characteristics are considered. These are as follows- Memory types : On the basis of their location inside the computer, memory can be placed in four groups :
  • 5.
  • 6. CPU Registers: these high speed registers in the CPU work as memory for temporary storage of instruction and data. The data can be read from or written into a register within a single clock cycle.  Main Memory or Primary Memory: Main memory size is large and fast accessing external memory stores programs and data. This memory is slower compared to CPU registers because of main memory has large storage capacity is typically 1 and 2¹⁰ megabyte.
  • 7. Secondary Memory: This memory has larger in capacity but slower than main memory. Secondary memory stores system programs, large data files and like the data are not continually required by the CPU. It also acts as an overflow memory when the capacity of the main memory is exceeded. Information in secondary storage is accessed indirectly via input output processor that transfer information between main and secondary memory.
  • 8. Cache Memory: Most computers have another level of IC memory called cache memory. It is placed between CPU registers and main memory. A cache memory capacity is less than that of main memory but it is faster than that of main memory because some or all of it can reside on the same IC as the CPU. Cache memories are essential components of high performance computers.
  • 9. Location: The memory which is inside the processor called the internal memory. The memory which is external to the processor is known as external memory.  Access Method: Each memory is a collection of various memory location. Accessing the memory means finding and reaching desired location and than reading information from memory location. The information from locations can be accessed as follows:
  • 10. 1. Random access 2. Sequential access 3. Direct access.  Random Access: It is the access mode where each memory location has a unique address. Using these unique addresses each memory location can be addressed independently in any order in equal amount of time. Generally, main memories are random access memories.
  • 11. Sequential Access: If storage locations can be accessed only in a certain predetermined sequence, the access method is known as serial or sequential access.  Direct Access: In this access information is stored on tracks and each track has a separate read/write head. This features makes it a semi random mode which is generally used in magnetic disks.
  • 12. Volatile Memories: The memories that looses their contents when the power is turned off called volatile memories.  Non-volatile Memories: The memories that do not loose their contents when the power is removed called Non-volatile memories.
  • 13. In general the memory is classified in two types based on their mode of access of a memory system. 1. Random access memory 2. Sequential access memory  Random Access Memory: The world of data reading or writing from or to the memory requires same time. We can access the data randomly. Example: hard disk.
  • 14. Sequential Access Memory: The information stored in some medium is not immediately accessible but is available as certain intervals of time. The access time is variable. Example: magnetic tape.
  • 15. Static RAM: It consist of internal latches that store the binary information. The stored information remains valid as long as power is applied to the unit.  Dynamic RAM: It stores the binary information in the form of electric charges on capacitors. The capacitors are provided inside the chip by MOS transistors. The stored charge on the capacitor tends to discharge with time and the capacitors must be periodically recharged by refreshing the dynamic memory.
  • 16. Read only memory: It is non-volatile memory, which retains the data even when power is removed from this memory. Programs and data that can not be altered are stored in ROM. The required paths in a ROM may be programmed in four different ways: 1. Mask Programming: It is done by the company during the fabrication process of the unit. The procedure for fabricating a ROM requires that the customer fills out the truth table he wishes the ROM to satisfy.
  • 17. 2. Programmable Read only memory(PROM): PROM contain all the fuses intact giving all 1’s in the bits of the stored words. A blown fuse defines binary 0 state and an intact fuse give a binary 1 state. This allows the user to program the PROM by using a special instruments called PROM programmer.
  • 18. 3. Erasable PROM(EPROM): In a PROM once fixed pattern is permanent and can not be altered. The EPROM can be restructured to the initial state even through it has been programmed previously. When EPROM is placed under a special ultra-violet light for a given period of time all the data are erased. After erase, the EPROM returns to it initial state and can be programmed to a new set of values.
  • 19. 4. Electrically Erasable PROM(EEPROM): It is similar to EPROM except that the previously programmed connections can be erased with an electrical signal instead of ultra violet light. The advantage is that device can be erased without removing it from it’s socket.