pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

DDR2 DRAM

The transition from DDR to DDR2 memory was more evolutionary than revolutionary, the DDR2 architecture being essentially the same as that of its predecessor, with a number of enhancements designed to provide greater bandwidth and other features that help reduce power consumption:

  • Higher memory transfer rates: DDR2 supports higher-speed transfer rates than DDR, which is officially found in 266 megatransfers per second (MTps), 333 MTps, and 400 MTps versions. Current DDR2 industry specifications call for 400 MTps, 533 MTps, 667 MTps and 800 MTps.
  • 4n prefetch: DDR2 devices use a 4n prefetch architecture instead of the 2n prefetch used for DDR. Using DDR2, the internal DRAM core is designed to read or write data at four times the width of the device’s external interface. In comparison, using DDR the internal DRAM core is designed to read or write data at twice the width of the device’s external interface. As a result, the internal DRAM core’s 4n prefetch architecture enables DDR2 to attain higher memory transfer rates than DDR.
  • Reduced voltage: DDR2 devices use a supply voltage of 1.8 volts versus 2.5 volts for DDR – almost a 30 percent decrease in supply voltage. This voltage scaling enhancement has the potential to reduce overall power requirements for the memory subsystem.

DDR2 memories work with higher latencies than DDR memories, meaning that they delay more clock cycles to deliver a requested item of data. For this reason, the performance advantage of DDR2 over DDR was not fully seen in practice until the emergence of DDR2-533 versions, in mid-2004.

DDR2

DDR2 is not backward compatible with DDR. Although DDR2 modules are the same length as DDR modules, differences exist in connectors, signalling, and supply voltages. For example, on DDR memories the resistive termination necessary for making the memory work is located on the motherboard, while on DDR2 memories this circuit is located inside the memory chip itself. Also, DDR modules have 184 contacts, while DDR2 modules have 240. Thus it is not possible to install DDR2 memories in DDR sockets or vice-versa.

The following table shows the bus frequency, data transfer rate, and bandwidth associated with each type of DDR2 module:

DDR2 type Module 

speed grade

Data 

transfer rate

Bandwidth 

(per channel)

DDR2 at 400MHz PC2-3200 200 MHz 400 MTps 3.2 GBps
DDR2 at 533 MHz PC2-4300 266 MHz 533 MTps 4.3 GBps
DDR2 at 667 MHz PC2-5300 333 MHz 667 MTps 5.3 GBps
DDR2 at 800 MHz PC2-6400 400 MHz 800 MTps 6.4 GBps

As processor power increased relentlessly – both by means of increased clock rates and wider FSBs – chipset manufacturers were quick to embrace the benefits of a dual-channel memory architecture as a solution to the growing bandwidth imbalance.

  • What is Level 1 (L1) Cache Memory?
  • What is L2 (Level 2) cache memory?
  • RAM or Main Memory – PC / computer memory (DIMM, DRAM, SDRAM)
  • DRAM – Dynamic Random Access Memory
  • FPM DRAM
  • EDO (Extended Data Out) and BEDO (Burst Extended Data Out) DRAM
  • SDRAM
  • PC133 SDRAM
  • DDR SDRAM explained
  • DDR2 DRAM
  • Dual Channel DDR Memory
  • 1T SRAM
  • Direct DRAM
  • SIMMs
  • DIMM Memory
  • RIMMs Memory
  • Memory Presence Detection
  • Parity Memory
  • ECC Memory
  • Memory Upgrades
  • The Evolution of Memory
  • Flash Memory
  • Magnetic RAM

Filed Under: Computer Memory

Latest Articles

CD-RW Burning Software

The computer’s operating system, whether it is Windows XP, Windows Me, Windows 98, Windows 95, Windows 2000 or Windows XP supplies a generic CD-ROM device driver that will allow your CD-ReWriter to function as a standard CD-ROM drive. You don’t need to install anything else. However, in order … [Read More...]

Client-Server Architecture

Client-server networking architectures became popular in the late 1980s and early 1990s as many applications were migrated from centralised minicomputers and mainframes to networks of personal computers. The design of applications for a distributed … [Read More...]

Hacked Sony Getting Sued, Pulled Off The Interview

Last November, Sony Pictures Entertainment’s servers were deliberately hacked by still unidentified group who call themselves the “Guardians of Peace”. Although investigation led that some North Koreans most probably did it, investigators are still blind about the real identities of the culprits. … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Protect Business From Cyber Attacks

A company is only as safe as its computer network and, though it's hard to admit, many businesses are frightfully unprotected when it comes to … [Read More...]

Installing the Software for the ADVC-55 DV Converter – including NERO

Now it's time to install the Canopus Let's CONVERT application. Please note: Since the creation of this tutorial the Canopus Let's CONVERT software … [Read More...]

Remove Qone8.com Browser Hijacker

Qone8.com looks like a harmless search engine that will help you find useful information like Yahoo, Google or Bing. The search engine is owned Taiwan … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors