wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct Memory Access

profile
Yug Dave
Jul 12, 2023
0 Likes
0 Discussions
13 Reads

Direct Memory Access (DMA) is a capability provided by some computer bus architectures that enables data to be sent directly from an attached device, such as a disk drive, to the main memory on the computer's motherboard. The microprocessor, or central processing unit (CPU) is freed from involvement with the data transfer, speeding up overall computer operation. DMA enables devices such as disk drives, external memory, graphics cards, network cards and sound cards to share and receive data from the main memory in a computer. It does this while still allowing the CPU to perform other tasks.Without a process such as DMA, the computer's CPU becomes preoccupied with data requests from an attached device and is unable to perform other operations during that time. With DMA, a CPU initiates a data transfer with an attached device and can still perform other operations while the data transfer is in progress. DMA enables a computer to transfer data to and from devices with less CPU overhead.An alternative to DMA is Ultra DMA, which provides a burst data transfer rate up to 33 megabytes per second (MBps). Hard drives that have Ultra DMA/33 also support programmed input/output (PIO) modes 1, 3 and 4, and multiword DMA mode 2 at 16.6 MBps.

 

 


Comments ()


Sign in

Read Next

Random Forests

Blog banner

Mariana Trench: The deepest depths

Blog banner

security requirements for safe e-payment

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Social Media Sentiment Analysis

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Harsh Rathod

Blog banner

Firewall

Blog banner

What is thread and multithreading ?

Blog banner

SQL Injection

Blog banner

Cyber Security in Quantum and Space Communication

Blog banner

Deadlock and starvation

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

"THINGS TO REMEMBER WHEN YOU'RE AT YOUR LOWEST"

Blog banner

Scala - a programming tool

Blog banner

You'll get to know about Pankaj Negi

Blog banner

Proton mail

Blog banner

Operating Systems

Blog banner

I/O Management and Disk Scheduling

Blog banner

Operating System

Blog banner

Why You Should Not Use Free VPNs

Blog banner

TRIGGERS IN DATABASE

Blog banner

Compromising Mobile Platforms

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

Information Technology In E- Commerce

Blog banner

GIS REMOTE SENSING

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

All you need to know about “Off-page SEO”

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

INSTAGRAM

Blog banner

social media issue

Blog banner

Drawing tips for a beginner

Blog banner

Types Of Interrupt

Blog banner

STARVATION

Blog banner

Facebook marketing

Blog banner

Smartsheet

Blog banner

Multicore and multithreading 171

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

PROCESS STATE:

Blog banner

differentiate thinking humanly and rationally

Blog banner