Skip to main content

L1 Cache Memory


The Level 1 cache is the fastest cache memory on the CPU which is used for temporary storage of instructions and data organized in blocks of 32 bytes. L1 cache is also known as Primary cache which is the fastest form of storage, because it is built in to the chip with a zero wait-state (delay) interface to the processor’s execution unit.
L1 cache is limited in size. It is used to store data (critical files that need to be executed immediately) as it is the first cache to be accessed and processed when the processor itself performs a computer instruction.
The Intel’s P55 MMX processor, launched in 1997, was in size of its Level 1 cache to 32KB. The AMD K6 and Cyrix M2 chips launched later in that year, provided Level 1 caches of 64KB. 64KB remained the standard L1 cache size.
In recent microprocessors, the L1 cache is divided equally into two cache : one cache to keep program data and another cache to keep instructions for the microprocessor. On other hand, some older microprocessors used undivided L1 cache which stored both program data and microprocessor instructions.
Level 1 cache is being implemented by Static RAM (SRAM). SRAM uses two transistors per bit that hold data without external assistance, till the power is supplied to the circuit. The second transistor controls the output of the first transistor. The two transistor forms a circuit known as a flip-flop because it has two stable states which it can flip between. This is contrasted to dynamic RAM (DRAM), which must be refreshed regularly per second in order to hold its data contents.

Comments

Popular posts from this blog

Nagware

Nagware is a software utility that adds users into upgrading or buying a premium version of software by sending constant pop-up messages or notifications.   It is a marketing tactic used by software developers in order to remind users to take advantage of special offers and purchase software. Nagware is also known as begware , annoyware , nagscreen and guiltware . It is built into commercial software that periodically prompts the user to register the product. Nagware is commonly used with  shareware  programs which have been downloaded for trial use. It keeps the message up for a certain time period, forcing the user to continue using the program. 

Atanasoff - Berry Computer ( ABC )

The Atanasoff – Berry Computer (ABC)   was the first electronic computer, designed and built by Lowa State College Mathematics and Physics professor John Vincent Atanasoff and his assistant, Clifford E. Berry ( a graduate student) . They worked in the basement of the physics building at Lowa State College on the computer from 1939 until 1942 when it was abandoned due to World War II . Unfortunately, after being abandoned , it was neglected and eventually disassembled for parts. In 1994, a team from Lowa state University began to rebuild the computer, finishing it in 1997. The system weighed more than seven hundred pounds (320 kg). It contained approximately 1-mile (1.6 km) of wire, 280 dual-triode vacuum tubes, 31  thyratrons , and was about the size of a desk.  The idea behind the ABC were later used in the construction of the ENIAC, the world’s first general purpose computer. Purpose / Working ABC was designed only to solve systems of  linear equations  and was succ

Virus

Virus  A virus is a computer code or program, which is capable of affecting your computer data badly by corrupting or destroying them. Computer virus has the tendency to make its duplicate copies at a swift pace, and also spread it across every folder and damage the data of your computer system. A computer virus is a malicious software program or "malware" which, when infecting your system, replicates itself by modifying other computer programs and inserting its own code. Types Of Virus :- File Infector Virus Multipartite Virus Resident Virus Boot Virus Macro Viruss Overwrite Virus Web Scripting Virus Impact of Virus :- Disrupts the normal functionality of respective computer system. Disrupts system network use. Modifies configuration setting of the system. Destructs data. Disrupts computer network resources. Destructs of confidential data. Infected computer programs may include data files, or even the "boot" sector of the hard dr