Secondary storage - computer architecture, Computer Engineering

Assignment Help:

Secondary storage:

Secondary storage (or external memory) differs from primary storage in that aspect it is not accessible by the CPU directly. The computer typically uses its input/output channels to access secondary storage and transfers the needed data by using intermediate area in primary storage. Secondary storage does not drop the data when the device is powered down-it is non-volatile memory. Per unit, it is normally also an order of magnitude less costly than primary storage. Thus, modern computer systems normally have an order of magnitude more secondary storage than primary storage and data is hold for a longer time there.

 In modern computers, hard disk drives are generally used as secondary storage. Time taken to access a particular given byte of information stored on a hard disk is normally a few thousandths of particular second or just milliseconds. But, the time taken to access a given byte of information stored in RAM is measured in billionths of a second, or nanoseconds. It illustrates very important access-time difference which distinguishes solid-state memory from rotating magnetic storage devices: hard disks are typically regarding a million times slower than memory. Rotating optical storage devices, like DVD and CD drives, have even longer access times. Having disk drives, once the disk read/write head reaches the appropriate placement and the data of interest rotates under it then subsequent data on the track are very fast to access. Consequently, in order to hide the initial seek time and rotational latency that data are transferred to and from disks in big contiguous blocks.

When data exist in disk, block access to hide latency offers wish in designing efficient external memory algorithms. Sequential or Block access on disks is orders of magnitude faster than random access, and various sophisticated paradigms have been developed to design efficient algorithms based on the block and sequential access. Another way to reduce the I/O bottleneck is to utilize multiple disks in parallel in order to increase the bandwidth amongst primary and secondary memory.

Some other instance of secondary storage technologies are: flash memory (for instance USB flash drives or keys), punched cards, magnetic tape, paper tape, ,  standalone RAM disks, and Iomega Zip drives ,floppy disks.

 


Related Discussions:- Secondary storage - computer architecture

What is difference between cgi and java, CGI and JAVA are fundamentally dis...

CGI and JAVA are fundamentally dissimilar, and for most applications are NOT interchangable. CGI is a protocol for running programs on a WWW server. Whilst JAVA can also be us

Explain the linux from scratch system, Problem 1 (a) Explain the RAID ...

Problem 1 (a) Explain the RAID system and explain all possible configurations. (b) Summarize design goals, features and specifications of the Linux ext2 file system. (c

Compute the coefficient for classifier, Consider the data with categorical ...

Consider the data with categorical predictor x 1 = { green or red } and numerical predictor x 2 and the class variable y shown in the following table. The weights for a round

Show the simple arithmetic application, Q. Show the Simple Arithmetic Appli...

Q. Show the Simple Arithmetic Application? The question is why can't we simply employ XCHG instruction with 2 memory variables as operand? To answer the question let's look int

Communication of request/response - procedural interaction, Explain the Com...

Explain the Communications of Request/Response Communications requirements for message or procedural- based interaction are very similar. Application interaction (client-server

Two independent mechanisms for controlling interrupt request, What are the ...

What are the two independent mechanisms for controlling interrupt request? At the device end, an interrupt enable bit in a control register verifies whether the device is permi

Find minimal expression for sop, Consider the following expression. Assume ...

Consider the following expression. Assume that complement inputs are available. F(A,B,C,D) = ∑m (0,1,3,5,9,12,14) + ∑d (4,10,15) 1. Find minimal expression for SOP. Draw gate ne

Register-to-register operands in RISC, Q. Register-to-register operands in ...

Q. Register-to-register operands in RISC? Register-to-register operands: In RISC machines operation which access memories are LOAD and STORE. All other operands are kept in reg

Collision free network, Hello Sir/Mam, Actually i am trying to implement th...

Hello Sir/Mam, Actually i am trying to implement the concept of MAC layer protocols in NS2..... But unfortunately i am not able to do that.... and not even able to get the code fo

Target - data phase, Target abort -computer architecture: Usually, a t...

Target abort -computer architecture: Usually, a target holds DEVSEL# asserted through the final data phase. However, if a target desserts DEVSEL# before disconnecting without

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd