Registers and Memory Devices

Masters
Essay
Technology
Pages 5 (1255 words)
Download 0
Read-Only-Memory (ROM) and Random-Access-Memory (RAM) are a form of computer data storage. ROM, also called a firmware, is an 'integrated circuit programmed with specific data when it is manufactured' (Tyson, 2000). ROM chips are employed not only in computers but also in other electronic items…

Introduction

These differences are summarized in Table 1.
FPM DRAM: Fast Page Mode Dynamic Random Access Memory was the original form of DRAM. It waits through the entire process of locating a bit of data by column and row and then reading the bit before it starts on the next bit.
EDO DRAM: Extended Data-out Dynamic Random Access Memory does not wait for all of the processing of the first bit before continuing to the next one. As soon as the address of the first bit is located, EDO DRAM begins looking for the next bit. It is about five percent faster than FPM.
SDRAM: Synchronous Dynamic Random Access Memory takes advantage of the burst mode concept to greatly improve performance. It does this by staying on the row containing the requested bit and moving rapidly through the columns, reading each bit as it goes. The idea is that most of the time the data needed by the CPU will be in sequence. SDRAM is about five percent faster than EDO RAM and is the most common form in desktops today.
RDRAM: Rambus Dynamic Random Access Memory is a radical departure from the previous DRAM architecture. Designed by Rambus, RDRAM uses a Rambus in-line memory module (RIMM), which is similar in size and pin configuration to a standard DIMM. What makes RDRAM so different is its use of a special high-speed data bus called the Rambus channel. RDRAM memory chips work in parallel to achieve a data rate of 800 MHz, or 1,600 MBps. ...
Download paper
Not exactly what you need?

Related papers

ARM Processors
These chips or this technology, in particular, is used by multiple manufacturers to develop specialized microprocessors. "The ARM chip has become one of the most used CPU designs in the world, found in everything from hard drives, to mobile phones, to routers, to calculators, to children's toys. Today it accounts for over 75% of all 32-bit embedded CPU's" ("ARM Processing", np). Prominent…
Cell Phones Radiation
Speaking about how cell phones work, Layton et al (2005) said: "On a "complexity per cubic inch" scale, cell phones are some of the most intricate devices people use on a daily basis. Modern digital cell phones can process millions of calculations per second in order to compress and decompress the voice stream." When dealing with all the features and uses of a cell phone, Layton et al (2005)…
General computing coursework
Y is called an inverter because the output is always the inverse of the input.…
Networking Assignment
What this means for attackers is that once they penetrate a single machine on a network they can then observe all traffic passing through the network. This allows intruders to quickly collect passwords and account names for many users. And all too often a password good one place is good another. In order to save from this vulnerability, you have to save a copy of Kernel offline because the advance…
Operating Systems and Utilities
The SX had a 16-bit external data bus, and that made it possible to build cheap PC's.…
Registers and Memory Devices
These differences are summarized in Table 1.…
Windows XP Operating System
It has 3 main features such as polymorphism, encapsulation, and abstraction. Windows 2000 features include 32-bit addressing, virtual memory support, system security and enhanced system integrity, platform independence, and built-in modular networking. The Windows 2000 underlying design principles has the essential structure as with later Windows releases (Windows XP Professional/Home/64 bit),…