Secondary storage - computer architecture, Computer Engineering

Assignment Help:

Secondary storage:

Secondary storage (or external memory) differs from primary storage in that aspect it is not accessible by the CPU directly. The computer typically uses its input/output channels to access secondary storage and transfers the needed data by using intermediate area in primary storage. Secondary storage does not drop the data when the device is powered down-it is non-volatile memory. Per unit, it is normally also an order of magnitude less costly than primary storage. Thus, modern computer systems normally have an order of magnitude more secondary storage than primary storage and data is hold for a longer time there.

 In modern computers, hard disk drives are generally used as secondary storage. Time taken to access a particular given byte of information stored on a hard disk is normally a few thousandths of particular second or just milliseconds. But, the time taken to access a given byte of information stored in RAM is measured in billionths of a second, or nanoseconds. It illustrates very important access-time difference which distinguishes solid-state memory from rotating magnetic storage devices: hard disks are typically regarding a million times slower than memory. Rotating optical storage devices, like DVD and CD drives, have even longer access times. Having disk drives, once the disk read/write head reaches the appropriate placement and the data of interest rotates under it then subsequent data on the track are very fast to access. Consequently, in order to hide the initial seek time and rotational latency that data are transferred to and from disks in big contiguous blocks.

When data exist in disk, block access to hide latency offers wish in designing efficient external memory algorithms. Sequential or Block access on disks is orders of magnitude faster than random access, and various sophisticated paradigms have been developed to design efficient algorithms based on the block and sequential access. Another way to reduce the I/O bottleneck is to utilize multiple disks in parallel in order to increase the bandwidth amongst primary and secondary memory.

Some other instance of secondary storage technologies are: flash memory (for instance USB flash drives or keys), punched cards, magnetic tape, paper tape, ,  standalone RAM disks, and Iomega Zip drives ,floppy disks.

 


Related Discussions:- Secondary storage - computer architecture

What is interpreter, Q. What is interpreter? An interpreter translates ...

Q. What is interpreter? An interpreter translates each high-level-language statement into its equivalent set of machine-language instructions, which are then executed right awa

What are the entities that swapped out of the main memory, What are the ent...

What are the entities that are swapped out of the main memory while swapping the process out of the main memory? All memory space occupied by the process, process's u-area, and

What is nv-ram, Nonvolatile Read Write Memory, also kown as Flash memory. I...

Nonvolatile Read Write Memory, also kown as Flash memory. It is also called as shadow RAM.

Digital electronics, Draw a circuit of an NMOS inverter and explain its ope...

Draw a circuit of an NMOS inverter and explain its operation

Determine the ad hoc testing, Determine the Ad hoc testing - It is a ty...

Determine the Ad hoc testing - It is a type of testing which is performed without the use of planning or/and documentation. - These tests are run only one time unless a defe

State about the object models, State about the Object models Object mo...

State about the Object models Object models are used for explaining the objects in the system and their connection with each other in the system. The dynamic model explains in

client will now send ten integers , Change this program so that every clie...

Change this program so that every client will now send ten integers and receives their sum from the server. In Java, for loops can be easily executed as follows: for (int i = 0 ; i

Explain recursive descent parsing, Explain Recursive Descent Parsing It...

Explain Recursive Descent Parsing It is a top down parsing with no backtracking. This parsing method uses a set of recursive processes to perform parsing. Most important advant

Could tcp allow ip to checksum the data, Could TCP allow IP to checksum the...

Could TCP allow IP to checksum the data? TCP cannot permit IP to checksum data yet IP has its own checksum for its header. IP layer is fundamentally responsible for routing of

Minimis logic function using K-map, Minimise the logic function F (A, B, C,...

Minimise the logic function F (A, B, C, D) = Π M (1, 2, 3, 8, 9, 10, 11,14) ⋅ d (7, 15) Use Karnaugh map.   Ans. Given function F=∏M(1,2,3,8,9,10,11,14).d(7, 15) F'=B'D+B'C+AC+AB'

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd