wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct Memory Access

profile
Jay Bhanushali
Jul 04, 2024
0 Likes
0 Discussions
133 Reads

In the field of input/output (I/O) operations in computing systems, there are several methods to control the interface between the processor and peripheral devices. These methods—programmed I/O, interrupt-driven I/O, and direct memory access (DMA)—each have their own benefits and disadvantages.
Programmed I/O is the most basic method. In instances where the I/O module encounters an I/O instruction, the processor ends it through direct communication with it. The module performs the requested task and updated its status register but does not interrupt the processor. Instead, the processor must actively poll the module to check if the operation has finished. This polling can lead to significant performance degradation since the processor essentially waits idly during this period.

In the situation where the transfer of data of large volumes is involved, DMA is by far the best option.
DMA, the processor is allowed to pass off the transfer of data tasks to a specific DMA module.
Let’s dig into it a bit more if you don’t mind: The processor begins the transfer by giving the parameters such as the operation type (read-write), the device address, the memory location, and the data size to the DMA module. Once set up, the bus is taken over by the DMA module and memory is directly interfaced with the I/O devices without the processor involvement at each data word. This way significantly saves the processor's time and data is transferred much faster.

However, DMA may have some disadvantages. When the DMA module and the processor compete for bus access, there are situations when the processor may have to pause for a while to get the bus. This is a kind of intertemporal pause, and it takes place only on rare occasions due to DMA, which, by the way, remains much better as compared to programmed and interrupt-driven I/O methods in data handling.
As is clear from the above paragraph, among the three mentioned data transfer methods, the direct memory access (DMA) technique comes with the least workload to the CPU and hence is the most effective. By making memory to I/O transfers request in a very fast time, the DMA sends out information that the computer principle memory has been doing the same. This process makes the CPU to focus on other tasks than data transfer hence achieving high overall system efficiency.


Comments ()


Sign in

Read Next

Data Security and Data Privacy in Data Science

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

differentiate thinking humanly and rationally

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Jira service Management

Blog banner

Virtual memory in os

Blog banner

What is thread and alse multithreading

Blog banner

RAID

Blog banner

Be you

Blog banner

National Payments Corporation of India-Rupay - Gayatri Nayak

Blog banner

Concurrency and memory

Blog banner

I/O Buffering

Blog banner

Spotify

Blog banner

Starvation

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

Evolution of Operating Sytems

Blog banner

Buffers in Operating Systems

Blog banner

Service stratergy principles

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Self Confidence

Blog banner

Time Series Analysis

Blog banner

Direct Memory Access

Blog banner

Strengthening Active Directory Security

Blog banner

Operating system

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

Install Ubuntu Easily

Blog banner

Linux

Blog banner

Solitary Play Activities for Preschoolers: Types and Benefits

Blog banner

Modern operating system

Blog banner

THREADS (assignment 1)

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

Virtual memory

Blog banner

Operating Systems Overview

Blog banner

Memory Management

Blog banner

Virtual memory

Blog banner

security controls

Blog banner

INTERNET

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner