Computer Organization and Architechuture basicsLucky Sithole
This document provides an overview of basic computer organization and design. It discusses the differences between architecture and organization, the main functional units of a computer including the arithmetic logic unit and control unit. It also describes the instruction set, processor registers including the program counter and memory address register. The document outlines the basic operational concepts such as instruction format and memory access. It discusses performance factors like pipelining and superscalar operation. Finally, it compares CISC and RISC organizations and the role of compilers in improving performance.
This document discusses the basic organization and design of computers. It covers topics such as architecture versus organization, functional units like the arithmetic logic unit and control unit, instruction formats, processor registers, stored program concepts, basic operational concepts like loading and storing data, memory access, and factors that impact performance such as pipelining and instruction set design. The document provides an overview of fundamental computer hardware components and operations.
This document provides information about a computer systems course, including the lecturer, textbook, and recommended reading. It then summarizes the key topics that will be covered in the course, including computer structure, central processing unit components like registers and instruction cycles, memory hierarchy with caches, input/output techniques like programmed I/O and interrupt-driven I/O, and other concepts.
The document discusses the processor, memory, and cache memory components of a computer system. It describes the central processing unit (CPU) as having two main components - the control unit which interprets and executes instructions, and the arithmetic logic unit which performs arithmetic and logic operations. It also discusses different types of processors, memory organization and storage, and cache memory which acts as a buffer between the CPU and main memory.
The document discusses the central processing unit (CPU) and its components. The CPU contains an arithmetic logic unit and a control unit which work together to execute stored program instructions. It retrieves instructions and data from memory, decodes and executes the instructions by performing arithmetic and logical operations, and stores the results back in memory. Modern CPUs use techniques like reduced instruction sets, pipelining, and parallel processing to increase their speed and processing power.
The document discusses computer organization and architecture. It defines architecture as the instruction set, registers, and addressing modes visible to programmers, while organization refers to internal design details like caching and pipelining. It describes the basic functional units of a computer including I/O, memory, arithmetic logic, and control units. It explains the fetch-execute cycle and how instructions are stored and executed from memory. Pipelining and superscalar techniques are discussed to improve processor performance.
The document describes the major components of a computer system, including the processor, main memory, secondary storage, and input/output devices. It explains how these components interact and their functions. For example, the processor executes instructions, main memory stores active programs and data, and secondary storage provides long-term storage like on a hard disk. Input devices take user input and output devices display information to the user.
This chapter discusses the basic components and operation of microprocessors. It describes how a microprocessor is composed of a central processing unit (CPU), memory, and input/output devices. The chapter explains that microprocessors operate based on stored programs and are available in both single-chip and multi-chip architectures. It also provides details on different types of memory devices, such as ROM, RAM, EEPROM, and flash memory.
1) Embedded systems are computing systems that perform dedicated functions. They contain a processor, memory, and input/output components on a single chip or board.
2) There are two main implementations of embedded systems - system on chip (SOC) and system board (SB). SOC is cheaper and uses less power, while SB is more costly but allows for higher performance.
3) Microcontrollers are a type of SOC that contain a CPU, memory, and input/output control on a single chip. They are dedicated to specific tasks and commonly interface with sensors, switches, LEDs and other components.
The document discusses computer architecture and memory. It describes the core components of a CPU like the ALU, control unit, and registers. It explains different memory types like RAM, ROM, and cache and how they work. It also discusses memory mapping and addressing, describing how applications are logically connected to memory segments via a memory manager rather than having direct physical access.
This document discusses computer organization and architecture. It defines key concepts like the central processing unit (CPU), bus, cache memory, registers, memory, and interrupts. The CPU fetches and executes instructions, and processes data with functions like fetching instructions, interpreting instructions, fetching and processing data, and writing results. The document also compares characteristics of CISC and RISC architectures.
Computer architecture unit 1 ppt for IT studentsASHASITTeaching
This PPT contains the topics regarding eight great ideas in Computer architeture, components of computer system, addressing modes, performance of a computer etc.,
1. Memory testing is an important part of embedded system development to ensure proper functionality.
2. Basic memory tests include data bus testing, address bus testing, and device testing.
3. Data bus testing uses techniques like walking 1's to write all possible data values and verify each bit. Address bus testing uses power-of-two addresses to isolate each address bit. Device testing writes data to addresses and checks for overwrites to test for overlapping addresses.
The document provides an overview of computer system components and their functions. It describes the CPU, RAM, motherboard, power supply, hard drive, and disk drives. It then discusses basic computer elements like the processor, memory, I/O modules, and system bus. Interrupts are handled through interrupt handlers that suspend normal program execution to service I/O requests. Memory is organized in a hierarchy from fastest and smallest registers to slower but larger secondary storage.
The ARM processor architecture uses either reduced instruction set computing (RISC) or complex instruction set computing (CISC). RISC aims to improve performance by reducing the number of clock cycles per instruction through simpler instructions that execute in one cycle. CISC relies more on hardware for complex instructions. Memory in ARM systems is hierarchical, with cache memory closest to the processor core and secondary storage like hard drives further away. Peripherals allow input/output and are memory mapped through registers. Initialization code configures hardware and runs diagnostics before booting the operating system.
The document discusses the basic structure of computers including functional units like the CPU, memory, and I/O. It describes how instructions and data are stored in memory and executed by the CPU. The CPU contains arithmetic logic units and registers to process instructions step-by-step under the control of a control unit. System software like operating systems and compilers help manage computer resources and translate programs for execution. Performance depends on hardware design, instruction sets, and software optimization.
This document provides an overview of computer organization and architecture. It discusses how a general purpose computer bridges the gap between desired behaviors and underlying electronic devices. The Von Neumann architecture is described as a model for computer design consisting of memory, ALU, control unit, and I/O. The key components of a computer - memory subsystem, ALU, control unit, and I/O subsystem - are then explained in more detail. Finally, the document outlines how instructions are fetched, decoded and executed in a Von Neumann architecture computer to implement programs stored in memory.
chapter 1 -Basic Structure of Computers.pptxjanani603976
The document describes the basic functional units and operations of a computer system. It discusses how computers handle instructions and data through components like the processor, memory unit, arithmetic logic unit, and control unit. Instructions are stored in memory and direct the flow of information within the computer. The core operations of a computer involve accepting programs and data as input, processing the information in the processor according to instructions, and outputting the results.
Unit 2 processor&memory-organisationPavithra S
This document discusses processor and memory organization for embedded systems. It describes the structural units of a processor like the MAR, MDR, buses, BIU, IR, ID, CU, ALU, PC, and caches. It covers memory devices like ROM, RAM, SRAM, DRAM, and flash memory. It provides case studies on selecting a processor based on features like clock speed, performance needs, and power efficiency. The document aims to help with selecting appropriate processors and memory for different types of embedded systems.
This document provides an overview of computer system hardware. It discusses the central processing unit (CPU), which consists of an arithmetic logic unit (ALU) and control unit (CU). The CPU executes instructions stored in memory and includes registers for temporary storage. The document describes the components of the ALU and control signals used by the CU. It also discusses the memory hierarchy including cache, primary memory like RAM and ROM, and secondary storage. The document outlines how these components are interconnected via buses and how instructions are executed in each step of the instruction cycle.
This document provides an overview of various computer devices and components. It discusses the central processing unit (CPU) which includes the arithmetic logic unit (ALU) and control unit (CU). It also describes different types of computer memory including primary memory like random access memory (RAM) and read-only memory (ROM), as well as secondary storage devices. Finally, it lists several common input/output and network devices.
Deepfake Phishing: A New Frontier in Cyber ThreatsRaviKumar256934
n today’s hyper-connected digital world, cybercriminals continue to develop increasingly sophisticated methods of deception. Among these, deepfake phishing represents a chilling evolution—a combination of artificial intelligence and social engineering used to exploit trust and compromise security.
Deepfake technology, once a novelty used in entertainment, has quickly found its way into the toolkit of cybercriminals. It allows for the creation of hyper-realistic synthetic media, including images, audio, and videos. When paired with phishing strategies, deepfakes can become powerful weapons of fraud, impersonation, and manipulation.
This document explores the phenomenon of deepfake phishing, detailing how it works, why it’s dangerous, and how individuals and organizations can defend themselves against this emerging threat.
Presently, the mesh embedment in masonry is becoming a trendy research topic. In this paper, the mesh embedded masonry prism was cast and tested. The experimental data were used for the analytical modelling. Compressive strength (CS) test was conducted for forty five masonry prism specimens with and without poultry netting mesh (PNM) embedment in the bed joints. The small mesh embedment in the masonry prism provides the better strength improvement as well as the endurance. The size of masonry prism was 225×105×176 mm. Uniformity was maintained in all prisms as per the guidelines given in ASTM C1314. Compressive strength experimental results are compared with a new proposed regression equation. The equation needs nine input parameters and two adjustment coefficients. The masonry mortar strength and mesh embedment are considered as input parameter. The experimental results were predicted by proposed Artificial Neural Network model. The validated results were gives better and more accuracy compared to the statistical and MLRPM models.
Ad
More Related Content
Similar to 1 microcontroller 8051 detailed explanation (20)
1) Embedded systems are computing systems that perform dedicated functions. They contain a processor, memory, and input/output components on a single chip or board.
2) There are two main implementations of embedded systems - system on chip (SOC) and system board (SB). SOC is cheaper and uses less power, while SB is more costly but allows for higher performance.
3) Microcontrollers are a type of SOC that contain a CPU, memory, and input/output control on a single chip. They are dedicated to specific tasks and commonly interface with sensors, switches, LEDs and other components.
The document discusses computer architecture and memory. It describes the core components of a CPU like the ALU, control unit, and registers. It explains different memory types like RAM, ROM, and cache and how they work. It also discusses memory mapping and addressing, describing how applications are logically connected to memory segments via a memory manager rather than having direct physical access.
This document discusses computer organization and architecture. It defines key concepts like the central processing unit (CPU), bus, cache memory, registers, memory, and interrupts. The CPU fetches and executes instructions, and processes data with functions like fetching instructions, interpreting instructions, fetching and processing data, and writing results. The document also compares characteristics of CISC and RISC architectures.
Computer architecture unit 1 ppt for IT studentsASHASITTeaching
This PPT contains the topics regarding eight great ideas in Computer architeture, components of computer system, addressing modes, performance of a computer etc.,
1. Memory testing is an important part of embedded system development to ensure proper functionality.
2. Basic memory tests include data bus testing, address bus testing, and device testing.
3. Data bus testing uses techniques like walking 1's to write all possible data values and verify each bit. Address bus testing uses power-of-two addresses to isolate each address bit. Device testing writes data to addresses and checks for overwrites to test for overlapping addresses.
The document provides an overview of computer system components and their functions. It describes the CPU, RAM, motherboard, power supply, hard drive, and disk drives. It then discusses basic computer elements like the processor, memory, I/O modules, and system bus. Interrupts are handled through interrupt handlers that suspend normal program execution to service I/O requests. Memory is organized in a hierarchy from fastest and smallest registers to slower but larger secondary storage.
The ARM processor architecture uses either reduced instruction set computing (RISC) or complex instruction set computing (CISC). RISC aims to improve performance by reducing the number of clock cycles per instruction through simpler instructions that execute in one cycle. CISC relies more on hardware for complex instructions. Memory in ARM systems is hierarchical, with cache memory closest to the processor core and secondary storage like hard drives further away. Peripherals allow input/output and are memory mapped through registers. Initialization code configures hardware and runs diagnostics before booting the operating system.
The document discusses the basic structure of computers including functional units like the CPU, memory, and I/O. It describes how instructions and data are stored in memory and executed by the CPU. The CPU contains arithmetic logic units and registers to process instructions step-by-step under the control of a control unit. System software like operating systems and compilers help manage computer resources and translate programs for execution. Performance depends on hardware design, instruction sets, and software optimization.
This document provides an overview of computer organization and architecture. It discusses how a general purpose computer bridges the gap between desired behaviors and underlying electronic devices. The Von Neumann architecture is described as a model for computer design consisting of memory, ALU, control unit, and I/O. The key components of a computer - memory subsystem, ALU, control unit, and I/O subsystem - are then explained in more detail. Finally, the document outlines how instructions are fetched, decoded and executed in a Von Neumann architecture computer to implement programs stored in memory.
chapter 1 -Basic Structure of Computers.pptxjanani603976
The document describes the basic functional units and operations of a computer system. It discusses how computers handle instructions and data through components like the processor, memory unit, arithmetic logic unit, and control unit. Instructions are stored in memory and direct the flow of information within the computer. The core operations of a computer involve accepting programs and data as input, processing the information in the processor according to instructions, and outputting the results.
Unit 2 processor&memory-organisationPavithra S
This document discusses processor and memory organization for embedded systems. It describes the structural units of a processor like the MAR, MDR, buses, BIU, IR, ID, CU, ALU, PC, and caches. It covers memory devices like ROM, RAM, SRAM, DRAM, and flash memory. It provides case studies on selecting a processor based on features like clock speed, performance needs, and power efficiency. The document aims to help with selecting appropriate processors and memory for different types of embedded systems.
This document provides an overview of computer system hardware. It discusses the central processing unit (CPU), which consists of an arithmetic logic unit (ALU) and control unit (CU). The CPU executes instructions stored in memory and includes registers for temporary storage. The document describes the components of the ALU and control signals used by the CU. It also discusses the memory hierarchy including cache, primary memory like RAM and ROM, and secondary storage. The document outlines how these components are interconnected via buses and how instructions are executed in each step of the instruction cycle.
This document provides an overview of various computer devices and components. It discusses the central processing unit (CPU) which includes the arithmetic logic unit (ALU) and control unit (CU). It also describes different types of computer memory including primary memory like random access memory (RAM) and read-only memory (ROM), as well as secondary storage devices. Finally, it lists several common input/output and network devices.
Deepfake Phishing: A New Frontier in Cyber ThreatsRaviKumar256934
n today’s hyper-connected digital world, cybercriminals continue to develop increasingly sophisticated methods of deception. Among these, deepfake phishing represents a chilling evolution—a combination of artificial intelligence and social engineering used to exploit trust and compromise security.
Deepfake technology, once a novelty used in entertainment, has quickly found its way into the toolkit of cybercriminals. It allows for the creation of hyper-realistic synthetic media, including images, audio, and videos. When paired with phishing strategies, deepfakes can become powerful weapons of fraud, impersonation, and manipulation.
This document explores the phenomenon of deepfake phishing, detailing how it works, why it’s dangerous, and how individuals and organizations can defend themselves against this emerging threat.
Presently, the mesh embedment in masonry is becoming a trendy research topic. In this paper, the mesh embedded masonry prism was cast and tested. The experimental data were used for the analytical modelling. Compressive strength (CS) test was conducted for forty five masonry prism specimens with and without poultry netting mesh (PNM) embedment in the bed joints. The small mesh embedment in the masonry prism provides the better strength improvement as well as the endurance. The size of masonry prism was 225×105×176 mm. Uniformity was maintained in all prisms as per the guidelines given in ASTM C1314. Compressive strength experimental results are compared with a new proposed regression equation. The equation needs nine input parameters and two adjustment coefficients. The masonry mortar strength and mesh embedment are considered as input parameter. The experimental results were predicted by proposed Artificial Neural Network model. The validated results were gives better and more accuracy compared to the statistical and MLRPM models.
Construction Materials (Paints) in Civil EngineeringLavish Kashyap
This file will provide you information about various types of Paints in Civil Engineering field under Construction Materials.
It will be very useful for all Civil Engineering students who wants to search about various Construction Materials used in Civil Engineering field.
Paint is a vital construction material used for protecting surfaces and enhancing the aesthetic appeal of buildings and structures. It consists of several components, including pigments (for color), binders (to hold the pigment together), solvents or thinners (to adjust viscosity), and additives (to improve properties like durability and drying time).
Paint is one of the material used in Civil Engineering field. It is especially used in final stages of construction project.
Paint plays a dual role in construction: it protects building materials and contributes to the overall appearance and ambiance of a space.
Newly poured concrete opposing hot and windy conditions is considerably susceptible to plastic shrinkage cracking. Crack-free concrete structures are essential in ensuring high level of durability and functionality as cracks allow harmful instances or water to penetrate in the concrete resulting in structural damages, e.g. reinforcement corrosion or pressure application on the crack sides due to water freezing effect. Among other factors influencing plastic shrinkage, an important one is the concrete surface humidity evaporation rate. The evaporation rate is currently calculated in practice by using a quite complex Nomograph, a process rather tedious, time consuming and prone to inaccuracies. In response to such limitations, three analytical models for estimating the evaporation rate are developed and evaluated in this paper on the basis of the ACI 305R-10 Nomograph for “Hot Weather Concreting”. In this direction, several methods and techniques are employed including curve fitting via Genetic Algorithm optimization and Artificial Neural Networks techniques. The models are developed and tested upon datasets from two different countries and compared to the results of a previous similar study. The outcomes of this study indicate that such models can effectively re-develop the Nomograph output and estimate the concrete evaporation rate with high accuracy compared to typical curve-fitting statistical models or models from the literature. Among the proposed methods, the optimization via Genetic Algorithms, individually applied at each estimation process step, provides the best fitting result.
Test your knowledge of the Python programming language with this quiz! Covering topics such as:
- Syntax and basics
- Data structures (lists, tuples, dictionaries, etc.)
- Control structures (if-else, loops, etc.)
- Functions and modules
- Object-Oriented Programming (OOP) concepts
Challenge yourself and see how well you can score!
In this paper, the cost and weight of the reinforcement concrete cantilever retaining wall are optimized using Gases Brownian Motion Optimization Algorithm (GBMOA) which is based on the gas molecules motion. To investigate the optimization capability of the GBMOA, two objective functions of cost and weight are considered and verification is made using two available solutions for retaining wall design. Furthermore, the effect of wall geometries of retaining walls on their cost and weight is investigated using four different T-shape walls. Besides, sensitivity analyses for effects of backfill slope, stem height, surcharge, and backfill unit weight are carried out and of soil. Moreover, Rankine and Coulomb methods for lateral earth pressure calculation are used and results are compared. The GBMOA predictions are compared with those available in the literature. It has been shown that the use of GBMOA results in reducing significantly the cost and weight of retaining walls. In addition, the Coulomb lateral earth pressure can reduce the cost and weight of retaining walls.
David Boutry - Specializes In AWS, Microservices And PythonDavid Boutry
With over eight years of experience, David Boutry specializes in AWS, microservices, and Python. As a Senior Software Engineer in New York, he spearheaded initiatives that reduced data processing times by 40%. His prior work in Seattle focused on optimizing e-commerce platforms, leading to a 25% sales increase. David is committed to mentoring junior developers and supporting nonprofit organizations through coding workshops and software development.
4. Memory mapping
1Kb=1024bits
No of lines =
1024/8=128 lines
1Kbit Memory
1Kbits = m X n
= 128 X 8
data lines
D0
D1
D2
D3
D4
D5
D6
D7
1Kbit Memory
W0
W127
}n data lines
W0 is first line address and
W127 is last line address
But do the microprocessor
has 128 address lines?
NO. 8085 Microprocessor
has 16 address lines A0-A15
in which A0 – A6 can be
used to select 128 address
lines because 27
=128
A0
A1
A2
A3
A4
A5
A6
A7
5. What is the use of and ?
are chip select signal to select the chip. When =1 and =0, this chip will get selected and the data
can be either read from or write into it by sending the proper signal to this SRAM chip.
How to generate Chip Select Signal?
If Microprocessor has address lines AD0 - AD15. AD0 – AD6 are used to select the address of
memory locations of SRAM chip and AD7 – AD15 are used to generate the Chip Select signal.
6. What is the use of RD and WR signal?
Since it is SRAM, the data can be read from and write into it by using
memory read and memory write signal of microprocessor.
9. Power on RESET
• Highest Priority
Interrupt
• It should be high
for 2 clock cycles
• After reset, 8051
starts at 0x0000H
RESET
10. Program Counter
• A register in a computer processor that contains the address (location) of
the instruction being executed at the current time.
• As each instruction gets fetched, the program counter increases its stored
value by 1.
• After each instruction is fetched, the program counter points to the next
instruction in the sequence.
• When the computer restarts or is reset, the program counter normally
reverts to 0.
11. Stack and Stack Pointer
• The stack is a LIFO (last in, first out) data structure implemented in
the RAM area.
• Used to store addresses and data when the microprocessor branches to a
subroutine.
• Then the return address used to get pushed on this stack.
• Also to swap values of two registers and register pairs we use the stack as
well.
• Two operations are performed on a stack .
• PUSH : The SP register gets decreased by 2 and new data item used to insert
on to the top of the stack.
POP : the data item will have to be deleted
from the top of the stack and the SP register
will get increased by the value of 2.
The contents of SP specify the top most
useful location in the stack.
12. Subroutine
• When the same function is required more than once
in a program, it is frequently written as a subroutine,
that is, a subprogram that can be used any number of
times by the main program.
• Subroutines are a powerful programming construct
that allow a program to break down a complex task
into smaller, more manageable pieces.
• A subroutine is a block of code that can be called from
anywhere in the program, and then returns control
back to the calling code when it is done.
14. Harvard Architecture
1. Separate Storage for Instruction and data.
2. Separate buses are used to fetch
instructions and data.
3. the CPU can fetch instruction and
read/write data simultaneously.
4. It is basically developed to overcome the
bottleneck of Von Neumann’s Architecture.
1. Instructions, and data both are
stored in the same memory.
2. Same buses are used to fetch
instructions and data.
3. The CPU cannot fetch instruction
and data simultaneously.
Von Neumann Architecture
Main Memory System
Central Processing Unit
Operational
Registers
Program
Counter
Arithmetic
and Logic
Unit
Control Unit
Input/Output System
Data
Instruction
Data Address
Instruction
Address
15. RISC : Reduced Instruction Set Architecture
1. Simpler instruction, hence
simple instruction
decoding.
2. Instruction comes
undersize of one word.
3. Instruction takes a single
clock cycle to get executed.
4. More general-purpose
registers.
5. Simple Addressing Modes.
6. Fewer Data types.
CISC : Complex Instruction Set Architecture
1. Complex instruction, hence
complex instruction decoding.
2. Instructions are larger than
one-word size.
3. Instruction may take more
than a single clock cycle to get
executed.
4. Less number of general-
purpose registers as
operations get performed in
memory itself.
5. Complex Addressing Modes.
6. More Data types.
16. RISC : Reduced Instruction Set
Architecture
Advantages
• Simpler instructions: RISC
processors use a smaller set of
simple instructions, which makes
them easier to decode and
execute quickly. This results in
faster processing times.
• Faster execution: Because RISC
processors have a simpler
instruction set, they can execute
instructions faster than CISC
processors.
• Lower power consumption: RISC
processors consume less power
than CISC processors, making
them ideal for portable devices.
CISC : Complex Instruction Set
Architecture
Advantages
• Reduced code size: CISC processors
use complex instructions that can
perform multiple operations,
reducing the amount of code
needed to perform a task.
• More memory efficient: Because
CISC instructions are more
complex, they require fewer
instructions to perform complex
tasks, which can result in more
memory-efficient code.
• Widely used: CISC processors have
been in use for a longer time than
RISC processors, so they have a
larger user base and more available
software.
17. RISC : Reduced Instruction Set
Architecture
Disadvantages
• More instructions
required: RISC processors
require more instructions to
perform complex tasks than
CISC processors.
• Increased memory usage: RISC
processors require more
memory to store the additional
instructions needed to
perform complex tasks.
• Higher cost: Developing and
manufacturing RISC processors
can be more expensive than
CISC processors.
CISC : Complex Instruction Set
Architecture
Disadvantages
• Slower execution: CISC
processors take longer to execute
instructions because they have
more complex instructions and
need more time to decode them.
• More complex design: CISC
processors have more complex
instruction sets, which makes
them more difficult to design and
manufacture.
• Higher power consumption: CISC
processors consume more power
than RISC processors because of
their more complex instruction
sets.
18. Primary Memory
• The primary memory of a
computer is the main memory
that is utilized to store data
temporarily.
• Primary memory is temporary.
• Primary memory is faster than
secondary memory because it
is directly accessible to the
CPU.
• Primary memory is directly
accessible by Processor/CPU.
• Nature of Parts of Primary
memory varies, RAM- volatile
in nature. ROM- Non-volatile.
Secondary memory
• Secondary memory defines to
additional storage devices that
are utilized to store data
permanently.
• Secondary memory is
permanent.
• Secondary memory is non-
volatile, which means it retains
data even when the power is
off.
• Secondary memory is not
directly accessible by the CPU.
• It’s always Non-volatile in
nature.
19. Primary Memory
• Primary memory devices
are more expensive than
secondary storage devices
• The memory devices used
for primary memory are
semiconductor memories.
• It can hold data/information
currently being used by the
processing unit.
• The capacity of primary
memory is usually within
the range of 16 to 32 GB.
Secondary memory
• Secondary memory devices are
less expensive when compared
to primary memory devices.
• The secondary memory
devices are magnetic and
optical memories.
• It can hold data/information
that are not currently being
used by the processing unit.
• It stores a considerable
amount of data and
information. The capacity of
secondary memory ranges
from 200 GB to some terabytes
20. Primary Memory
• Primary memory is also
known as Main memory or
Internal memory.
• It can be accessed by a data
bus.
• Examples: RAM, ROM,
Cache memory, PROM,
EPROM, Registers, etc.
Secondary memory
• Secondary memory is also
known as External memory
or Auxiliary memory.
• It can be accessed using I/O
channels.
• Examples: Hard Disk,
Floppy Disk, Magnetic Tapes
, etc
21. Cache Memory
• The most important use of cache memory is
that it is used to reduce the average time to
access data from the main memory.
• The concept of cache works because there
exists locality of reference (the same items or
nearby items are more likely to be accessed
next) in processes.
22. Characteristics of Cache Memory
• Extremely fast memory type that acts as a buffer
between RAM and the CPU.
• Holds frequently requested data and instructions,
ensuring that they are immediately available to
the CPU when needed.
• Costlier than main memory or disk memory but
more economical than CPU registers.
• Used to speed up processing and synchronize
with the high-speed CPU.
23. Cache Performance
• If the processor finds that the memory location
is in the cache, a Cache Hit has occurred and
data is read from the cache.
• If the processor does not find the memory
location in the cache, a cache miss has
occurred. For a cache miss, the cache allocates
a new entry and copies in data from the main
memory, then the request is fulfilled from the
contents of the cache.
24. Virtual memory with Memory Management
• Virtual memory is a memory management
technique used by operating systems to give
the appearance of a large, continuous block of
memory to applications, even if the physical
memory (RAM) is limited. It allows larger
applications to run on systems with less RAM.
25. Virtual memory with Memory Management
• The main objective of virtual memory is to support
multiprogramming, The main advantage that virtual
memory provides is, a running process does not need to
be entirely in memory.
• Programs can be larger than the available physical
memory. Virtual Memory provides an abstraction of main
memory, eliminating concerns about storage limitations.
• A memory hierarchy, consisting of a computer system’s
memory and a disk, enables a process to operate with only
some portions of its address space in RAM to allow more
processes to be in memory.
26. Types of virtual memory
• Paging
– Paging divides memory into small fixed-size blocks called pages. When
the computer runs out of RAM, pages that aren’t currently in use are
moved to the hard drive, into an area called a swap file. The swap file
acts as an extension of RAM. When a page is needed again, it is swapped
back into RAM, a process known as page swapping. This ensures that the
operating system (OS) and applications have enough memory to
• Segmentation
– Segmentation divides virtual memory into segments of different sizes.
Segments that aren’t currently needed can be moved to the hard drive.
The system uses a segment table to keep track of each segment’s status,
including whether it’s in memory, if it’s been modified, and its physical
address. Segments are mapped into a process’s address space only when
needed.run.
27. Feature Virtual Memory Physical Memory (RAM)
Definition
An abstraction that extends the
available memory by using disk
storage
The actual hardware (RAM) that stores
data and instructions currently being
used by the CPU
Location On the hard drive or SSD On the computer’s motherboard
Speed Slower (due to disk I/O operations) Faster (accessed directly by the CPU)
Capacity Larger, limited by disk space
Smaller, limited by the amount of RAM
installed
Cost
Lower (cost of additional disk
storage)
Higher (cost of RAM modules)
Data Access Indirect (via paging and swapping) Direct (CPU can access data directly)
Volatility Non-volatile (data persists on disk) Volatile (data is lost when power is off)