pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

What is L2 (Level 2) cache memory?

Most PCs are offered with a Level 2 cache to bridge the processor/memory performance gap. Level 2 cache – also referred to as secondary cache) uses the same control logic as Level 1 cache and is also implemented in SRAM.

Level 2 cache typically comes in two sizes, 256KB or 512KB, and can be found, or soldered onto the motherboard, in a Card Edge Low Profile (CELP) socket or, more recently, on a COAST (“cache on a stick”) module. The latter resembles a SIMM but is a little shorter and plugs into a COAST socket, which is normally located close to the processor and resembles a PCI expansion slot. The Pentium Pro deviated from this arrangement, siting the Level 2 cache on the processor chip itself.

The aim of the Level 2 cache is to supply stored information to the processor without any delay (wait-state). For this purpose, the bus interface of the processor has a special transfer protocol called burst mode. A burst cycle consists of four data transfers where only the address of the first 64 are output on the address bus. The most common Level 2 cache is synchronous pipeline burst.

To have a synchronous cache a chipset, such as Triton, is required to support it. It can provide a 3-5% increase in PC performance because it is timed to a clock cycle. This is achieved by use of specialised SRAM technology which has been developed to allow zero wait-state access for consecutive burst read cycles. Pipelined Burst Static RAM (PB SRAM) has an access time in the range 4.5 to 8 nanoseconds (ns) and allows a transfer timing of 3-1-1-1 for bus speeds up to 133MHz. These numbers refer to the number of clock cycles for each access of a burst mode memory read. For example, 3-1-1-1 refers to three clock cycles for the first word and one cycle for each subsequent word.

For bus speeds up to 66MHz Synchronous Burst Static RAM (Sync SRAM) offers even faster performance, being capable of 2-1-1-1 burst cycles. However, with bus speeds above 66MHz its performance drops to 3-2-2-2, significantly slower than PB SRAM.

There is also asynchronous cache, which is cheaper and slower because it isn’t timed to a clock cycle. With asynchronous SRAM, available in speeds between 12 and 20ns, all burst read cycles have a timing of 3-2-2-2 on a 50 to 66MHz CPU bus, which means that there are two wait-states for the lead-off cycle and one wait-state for the following three transfers of the burst cycle.

  • What is Level 1 (L1) Cache Memory?
  • What is L2 (Level 2) cache memory?
  • RAM or Main Memory – PC / computer memory (DIMM, DRAM, SDRAM)
  • DRAM – Dynamic Random Access Memory
  • FPM DRAM
  • EDO (Extended Data Out) and BEDO (Burst Extended Data Out) DRAM
  • SDRAM
  • PC133 SDRAM
  • DDR SDRAM explained
  • DDR2 DRAM
  • Dual Channel DDR Memory
  • 1T SRAM
  • Direct DRAM
  • SIMMs
  • DIMM Memory
  • RIMMs Memory
  • Memory Presence Detection
  • Parity Memory
  • ECC Memory
  • Memory Upgrades
  • The Evolution of Memory
  • Flash Memory
  • Magnetic RAM

Filed Under: Computer Memory Tagged With: L2 cache, Level 2 cache

Latest Articles

Configuring BIOS for a Second Hard Drive – including SMART

Once the second hard drive is physically installed, you then need to let the computer\'s operating system and software know that it exists. Insert the MS-DOS startup disk in your floppy disk drive and power on your PC. After the POST (Power On Self Test) process has started enter the system\'s … [Read More...]

Internet Speed Test

How To Test Your Internet Speed

These days lots of people have high-speed Internet, thanks to the great Internet Installation they get from their provider. And, they hear the blazing fast speeds they are being offered by different Internet Service Providers (ISPs). But, is it really as fast as they claim? So, you may want to … [Read More...]

Barcelona, AMD’s native Quad Core CPU

Late 2007 saw the release of AMD's new native Quad-Core Opteron processors. Designed initially for servers and workstations and codenamed 'Barcelona', the early versions ran at clock frequencies of up to 2Ghz, with faster varieties to follow. In common with contemporary releases from … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Redditors Talk About the Impact of AI on Freelance Writers

AI technology has had a huge impact on our lives. A 2023 survey by Pew Research found that 56% of people use AI at least once a day or once a week. … [Read More...]

11 Most Popular Books on Perl Programming

Perl is not the most popular programming language. It has only one million users, compared to 12 million that use Python. However, it has a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

CD-ROM Orange Book

The Orange Book defines CD-Recordable discs with multisession capability. Part I defines CD-MO (Magneto Optical) … [Read More...]

6 Healing Healthcare Tech Trends Improving Patient Care in 2021

With cyber taking the name of the game in the pandemic era, healthcare professionals rely more heavily on informational and telehealth technology to … [Read More...]

The Double-Edged Sword of Machine Learning in Cybersecurity

Today's most damaging threats, from phishing to ransomware, will use machine learning to analyze vast amounts of information about their victims and … [Read More...]

[footer_backtotop]

Copyright © 2025 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors