What is typical storage hierarchy, Computer Engineering

Assignment Help:

Q. What is typical storage hierarchy?

A typical storage hierarchy is displayed in Figure above. Though Figure shows only block diagram however it includes storage hierarchy:   

Register

Cache memory

Main memory

Secondary Storage and 

Mass Storage. 

As we move up hierarchy we encounter storage elements which have faster access time and higher cost per bit stored as well as slower access time as a result of moving down hierarchy. So cache memory normally has the fastest access time and the smallest storage capacity as well as the highest cost per bit stored. Primary memory (main memory) falls next in storage hierarchy list. On-line, direct-access secondary storage devices like magnetic hard disks make up level of hierarchy just below main memory. Off-line, direct-access and sequential access secondary storage devices like magnetic tape, ZIP disk, Floppy disk and WORM disk etc. fall next in storage hierarchy. Mass storage devices generally referred to as archival storage are at the bottom of storage hierarchy. They are cost-effective for storage of very large quantities of data when fast access time is not essential.

Please note two significant points here: 

  • Size of memory increases as we move down hierarchy.
  • Quantum of data which is transferred between two consecutive memory layers at a time also increases as we go from a higher to lower side. For illustration from main memory to Cache transfer one or a few memory words are accessed at a time while in a hard disk to main memory transfer, a block of about 1 Megabyte is transferred in a single access.

 


Related Discussions:- What is typical storage hierarchy

Copy machine problem, We are trying to figure out how many copy machines we...

We are trying to figure out how many copy machines we should install in the basement of Stranahan Hall.  Copy machines should be available 24/7.  Students may walk up at any time o

Crafting an isa - computer architecture, Crafting an ISA: We will l...

Crafting an ISA: We will look at some decisions facing an instruction set architect, and In the design of the MIPS instruction set how those decisions were made. MIPS

Objectives of parallel computing, Objectives of Parallel Computing Aft...

Objectives of Parallel Computing After reading this topic, you would be able to: Tell historical details of parallel computing; Explain the fundamental ideas of dis

Gralands robots, You have been contacted by Jean-Luc Picard commanding offi...

You have been contacted by Jean-Luc Picard commanding officer of Star Trek: The Next Generation. The Commander needs your support to develop a software routine to simulate the Robo

History, #what is the history of computer science

#what is the history of computer science

Show SNMPs representation in ASN.1 syntax, An SNMP integer whose value is 2...

An SNMP integer whose value is 200 has to be transmitted. Show its representation in ASN.1 syntax. An ASN.1 transfer syntax describes how values of ASN.1 types are unambiguousl

#, advantages of dda line algoritm

advantages of dda line algoritm

Discussion., Functionality first and then Security?

Functionality first and then Security?

What are the disadvantages of public key cryptography, What are the disadva...

What are the disadvantages of Public Key Cryptography? Disadvantages of Public Key Cryptography are as given below: a) It is used to encrypt a secret key that is used to e

Objectives-classification of parallel computers , Objectives After goi...

Objectives After going through this unit, you should be able to: Describe the diffrent criteria on which classification of parallel computers are based; Examine the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd