Browse Definitions :
Definition

content-addressed memory (CAM)

Contributor(s): Matthew Haughn

Content-addressable memory (CAM) is computer memory that operates like a hardware search engine for search-intensive applications.

CAM is capable of searching its entire contents in a single clock cycle. It does that by pairing the SRAM-based memory with additional logic comparison circuitry that that is active on every clock cycle.

The way CAM functions is almost the opposite of random access memory (RAM). To retrieve data residing on RAM, the OS provides the memory address where the data is stored. Data stored on CAM, on the other hand, can be accessed by searching for the content itself, and the memory retrieves the addresses where that content can be found. Because of its parallel nature, CAM is much faster than RAM for searching.

Ternary CAM (TCAM) adds a third state to RAM, beyond binary, for a wildcard functionality that provides for variable characters in searches and adds additional complexity to the circuits.

Because of their low capacities, high power usage and consequent heat dissipation requirements, CAM and TCAM remain isolated to specialized applications such as Internet routers and switches, where they increase the speed of route look-up, packet classification, packet forwarding and access control list-based commands.

This was last updated in September 2014

Continue Reading About content-addressed memory (CAM)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close