Secondary storage - computer architecture, Computer Engineering

Assignment Help:

Secondary storage:

Secondary storage (or external memory) differs from primary storage in that aspect it is not accessible by the CPU directly. The computer typically uses its input/output channels to access secondary storage and transfers the needed data by using intermediate area in primary storage. Secondary storage does not drop the data when the device is powered down-it is non-volatile memory. Per unit, it is normally also an order of magnitude less costly than primary storage. Thus, modern computer systems normally have an order of magnitude more secondary storage than primary storage and data is hold for a longer time there.

 In modern computers, hard disk drives are generally used as secondary storage. Time taken to access a particular given byte of information stored on a hard disk is normally a few thousandths of particular second or just milliseconds. But, the time taken to access a given byte of information stored in RAM is measured in billionths of a second, or nanoseconds. It illustrates very important access-time difference which distinguishes solid-state memory from rotating magnetic storage devices: hard disks are typically regarding a million times slower than memory. Rotating optical storage devices, like DVD and CD drives, have even longer access times. Having disk drives, once the disk read/write head reaches the appropriate placement and the data of interest rotates under it then subsequent data on the track are very fast to access. Consequently, in order to hide the initial seek time and rotational latency that data are transferred to and from disks in big contiguous blocks.

When data exist in disk, block access to hide latency offers wish in designing efficient external memory algorithms. Sequential or Block access on disks is orders of magnitude faster than random access, and various sophisticated paradigms have been developed to design efficient algorithms based on the block and sequential access. Another way to reduce the I/O bottleneck is to utilize multiple disks in parallel in order to increase the bandwidth amongst primary and secondary memory.

Some other instance of secondary storage technologies are: flash memory (for instance USB flash drives or keys), punched cards, magnetic tape, paper tape, ,  standalone RAM disks, and Iomega Zip drives ,floppy disks.

 


Related Discussions:- Secondary storage - computer architecture

What is nv-ram, Nonvolatile Read Write Memory, also kown as Flash memory. I...

Nonvolatile Read Write Memory, also kown as Flash memory. It is also called as shadow RAM.

Define various system, Define various system? Single job system: Only...

Define various system? Single job system: Only one program may be run at a time, and therefore only one person might be work on a machine at one time.  Multi job system:

Explain branch instruction with control signals, Explain BRANCH instruction...

Explain BRANCH instruction with Control Signals. and explain SHIFT instruction with Control Signals.  Explain Register Transfer Language. What do you mean by Addressing Techn

Are there any special rules about inlining, Are there any special rules abo...

Are there any special rules about inlining? Yes, there are some rules about inlining - a.) Any source files which used inline function should contain function's definition.

Rapid appllication development, Explain clearly the four stages in the Rapi...

Explain clearly the four stages in the Rapid Application Development

Illustrates about metal fix, Illustrates about Metal Fix. A Metal Fix i...

Illustrates about Metal Fix. A Metal Fix implies that only the upper metal interconnects layers are influenced. Connections may be made or broken, but new cells may not be adde

What is use case and use case diagram, What is use case and use case diagra...

What is use case and use case diagram? A use case is a coherent piece of functionality that a system can give by interacting with actors. Use case includes one or more actors a

What are the two ways in which the system using cache, What are the two way...

What are the two ways in which the system using cache can proceed for a write operation? Write by protocol technique Write-back or Copy-back protocol method

Shell script, shell script for addnames that has to be called as class list...

shell script for addnames that has to be called as class list in the name of the class list file and username is a particular student''s username

Explain characteristics in java for e-commerce applications, Explain the ch...

Explain the characteristics and utilities available into java that makes it appropriate for developing e-commerce applications. Following are the characteristics and utilities

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd