0% found this document useful (0 votes)
6 views15 pages

RAM n Memory Decoding

The document provides an overview of RAM (Random Access Memory), detailing its types, history, purpose, and functionality, emphasizing its role as a volatile memory that enables fast data access and multitasking in computing systems. It also discusses memory decoding, which is the process of selecting specific memory locations for data operations, and outlines the control inputs and timing diagrams for read and write operations. Additionally, the document highlights the pros and cons of RAM and its various applications across different devices and systems.

Uploaded by

nousemail805
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views15 pages

RAM n Memory Decoding

The document provides an overview of RAM (Random Access Memory), detailing its types, history, purpose, and functionality, emphasizing its role as a volatile memory that enables fast data access and multitasking in computing systems. It also discusses memory decoding, which is the process of selecting specific memory locations for data operations, and outlines the control inputs and timing diagrams for read and write operations. Additionally, the document highlights the pros and cons of RAM and its various applications across different devices and systems.

Uploaded by

nousemail805
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

RAM(RANDOM

ACCESS MEMORY) &


MEMORY DECODING
BY SAGAR A
Memory
It is electronic components used to store data,
either volatile or non-volatile

 Non-volatile memory stores the data even when there is


no power supply.
Ex-ROM(Read Only Memory)

 Volatile memory it stores data when is continuous


power supply.
Ex-RAM(Random Access Memory)
RAM (RANDOM ACCESS MEMORY)
It is a type of volatile memory used to store
data temporarily while a computer or device is
running. It allows for random access, meaning
any location in memory can be accessed
directly and quickly, regardless of its position

The two main types:-


DRAM (Dynamic RAM) Stores data in tiny
capacitors that need periodic refreshing

SRAM (Static RAM) Uses flip-flops to store data


does not need refreshing
History of Random Access
Memory
 In 1947, the Williams tube marked the invention of first RAM
type was Developed at the University of Manchester in
England.
 The data was saved as electrically charged dots on the face
and was used in cathode ray tubes.
 A magnetic-core memory was the second type of RAM, which
was created in 1947
 RAM was made of small metal rings and each ring connected
with wires. A ring stored one bit of data, and it can be easily
accessible at any time.
Purpose of Random
Access Memory
RAM (Random Access Memory) is required because it
provides fast, temporary storage for data that the CPU
(central processing unit) needs to access quickly while
performing tasks
Temporary Data Storage:
RAM is volatile memory, meaning it stores data temporarily
and loses it when power is turned off.
High-Speed Data Access:
RAM is much faster than permanent storage devices like
hard drives or SSDs.
Enabling Multitasking:
By allowing multiple applications or processes to store and
access data simultaneously, RAM enables multitasking in
system
How does RAM Random Access
Memory
work?
 RAM is constructed of small transistors and capacitors, much like CPUs and
other computer components, which can stored an electric charge that
corresponds to data bits. electrical charge is necessary to regular charge
of it. If not, the data removed from RAM and the capacitors lose their
charge.
 Saving any modified data to the hard disc or SSD is crucial because data
can be lost so rapidly when the battery is gone.
 Additionally, it explains why so many programs include autosave options
or cache unfinished work in the event of an unplanned shutdown.
 The majority of the time, after finishing a file or your computer shuts
down, the information in RAM is gone.
Pros and Cons of Random Access
Memory

PROS CONS

• High Speed • Cost per GB more


• Supports Multitasking • Physical Limitations
• Dynamic Performance • Power Consumption
• Essential for System • No Long-Term Storage
Operation
Applications Of Random Access
Memory
 Personal Computers and Laptops
 Mobile Devices (Smartphones and
Tablets)
 Embedded Systems
 Servers and Data centres
 Gaming and Graphics
 Industrial and Scientific Applications
 Consumer Electronics
Different size and use of RAM
1 MB – 1 GB -- Embedded systems,
basic devices, IoT
2 GB – 4 GB -- Entry-level smartphones,
tablets, and basic computers
8 GB – 16 GB -- General-purpose
computing, gaming, and moderate
productivity
32 GB – 64 GB -- Professional
applications, gaming, and high-
performance tasks
128 GB and above --Servers, data
centers, and specialized computing
Memory Decoding

Memory decoding is the process of


converting a binary address provided
by a processor or controller into a
specific signal that selects a particular
memory location or cell within a
memory array.
This enables the system to read data
from or write data to the desired
memory location.
Control Inputs for Memory
Decoding
 When the enable pin is 0 then the
memory chip will get disabled no
operation is performed.
 Whenever the enable pin is 1 then
the memory will get enabled and
write operation is performed.
 When the Read/Write operation is 1
the memory will perform read
operation. The memory will read data
from the specific word.
Read Operation in Memory

 To perform read operation first address corresponding to the specific word from
which we want to read the data is applied to memory (Read data applied to
memory)
 After getting stable then to enable memory enable signal is applied
 To data from memory the read signal is applied
Timing Diagram of Read operation
 To perform read operation the
address signal is applied.
 Then the enable signal is applied.
 After the read signal is made high
read operation is performed.
 After some delay the valid data
available in memory will be the
output. Then CPU can read the data.
 Once the read operation performed
by CPU enable signal is made low
Write Operation in
memory
 Address signal corresponding
to which want write is applied
to the memory.
 The data which we want
write into the memory is also
applied on the data line.
 Once it is applied memory is
enabled.
 Write signal is applied to the
memory.
Timing Diagram of write
operation
 Valid address line is applied to
memory.
 Data which we want to write
into memory is applied.
 Once the signal is settled then
the memory is enabled.
 After a while write signal is
activated
 When the Data is Latched write
signal gets deactivated.

You might also like