wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct Memory Access

profile
Satyam Chaurasiya
Jul 05, 2024
1 Like
0 Discussions
213 Reads

1.What is a DMA Controller?

=> Direct Memory Access uses hardware for accessing the memory, that hardware is called a DMA Controller. It has the work of transferring the data between Input Output devices and main memory with very less interaction with the processor. The direct Memory Access Controller is a control unit, which has the work of transferring data.

 

2.Types of Direct Memory Access (DMA). 

=> There are four popular types of DMA.

Single-Ended DMA

Dual-Ended DMA

Arbitrated-Ended DMA

Interleaved DMA

•Single-Ended DMA: Single-Ended DMA Controllers operate by reading and writing from a single memory address. They are the simplest DMA.

•Dual-Ended DMA: Dual-Ended DMA controllers can read and write from two memory addresses. Dual-ended DMA is more advanced than single-ended DMA.

•Arbitrated-Ended DMA: Arbitrated-Ended DMA works by reading and writing to several memory addresses. It is more advanced than Dual-Ended DMA.

•Interleaved DMA: Interleaved DMA are those DMA that read from one memory address and write from another memory address.

 

3.Modes of Data Transfer in DMA. 

=> There are 3 modes of data transfer in DMA that are described below.

••Burst Mode: In Burst Mode, buses are handed over to the CPU by the DMA if the whole data is completely transferred, not before that.

••Cycle Stealing Mode: In Cycle Stealing Mode, buses are handed over to the CPU by the DMA after the transfer of each byte. Continuous request for bus control is generated by this Data Transfer Mode. It works more easily for higher-priority tasks.

••Transparent Mode: Transparent Mode in DMA does not require any bus in the transfer of the data as it works when the CPU is executing the transaction.

 

4.Advantages and disadvantages of DMA Controller. 

=>

a. Advantages of DMA Controller

i.Data Memory Access speeds up memory operations and data transfer.

ii. CPU is not involved while transferring data.

iii. DMA requires very few clock cycles while transferring data.

iv. DMA distributes workload very appropriately.

v. DMA helps the CPU in decreasing its load.

 

b. Disadvantages of DMA Controller

i.Direct Memory Access is a costly operation because of additional operations.

ii. DMA suffers from Cache-Coherence Problems.

iii. DMA Controller increases the overall cost of the system.

iv. DMA Controller increases the complexity of the software.


Comments ()


Sign in

Read Next

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

"Life as a Part-time Student"

Blog banner

Raid

Blog banner

PHONE TECHNOLOGY

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Deadlock

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

What is M-commerce and how it's work

Blog banner

Disk cache

Blog banner

Security issues

Blog banner

undefined

Blog banner

Process Creation

Blog banner

Concurrency and Deadlocks

Blog banner

Modern Operating Systems

Blog banner

Instagram

Blog banner

Pipedrive

Blog banner

Importance of Network Security Risk

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

John Titor: The Time Traveler

Blog banner

Trends that began during the pandemic

Blog banner

Security Issues

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

SMARTSHEET

Blog banner

Memory Management

Blog banner

I/O Management and Disk Scheduling

Blog banner

Virtual Memory

Blog banner

Deadlock and Starvation

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

What is E-commerce

Blog banner

Domain Name System

Blog banner

Bharat Maps

Blog banner

child Labour

Blog banner

Booting Process In Operating System

Blog banner

Deadlock in operating system

Blog banner

ahh wait a min

Blog banner

Rain

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Modern operating system

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner