wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct Memory Access

profile
Krishna Johari
Jul 05, 2024
0 Likes
0 Discussions
113 Reads

      Direct Memory Access (DMA)

Introduction:

Direct memory access (DMA) is a feature of computer systems that allows some hardware devices (either internal or external) to communicate directly with another computer system’s RAM memory and transfer data from it without processing it using the CPU.This is beneficial for improving the efficiency and speed of data transfers in a system.

In the earlier times, when data needs to be transferred between the memory and a device (like a hard drive or sound card), the CPU has to be involved in each step of the process. This means the CPU reads the data from the device and writes it to memory, or vice versa. This can be slow and inefficient because the CPU gets tied up with these data transfers.

 

DMA Controller :

Thus, the DMA controller, a special hardware component, takes over the task of transferring data. The CPU sets up the DMA controller by specifying the source, destination, and the amount of data to transfer. Once configured, the DMA controller handles the data transfer directly, freeing the CPU to perform other tasks.

 

Working :

In this, The CPU initializes the DMA controller by setting up the source address (where the data is coming from), the destination address (where the data is going), and the length of data to be transferred.

Once initialized, the DMA controller starts the transfer. It takes the data directly from the source and writes it to the destination without CPU intervention.

When the transfer is complete, the DMA controller typically sends an interrupt to the CPU to inform it that the data transfer is done. The CPU can then proceed with processing the data if needed. 

 

Types of transfers that a DMA may control are :

1. Memory to memory transfers (internal to external).

2. Transfers from I/O devices to memory.

3. Transfers from memory to I/O devices.

4. Transfers from/to communications ports and memory.

5. Transfers from/to serial ports and memory.

 

Some advantages of Direct Memory Access (DMA) :

1. Speed: The data transfers are faster than the CPU-managed data transfers because it doesn’t require CPU involvement in each byte.

2. Efficiency: Its reduces the CPU overhead, by allowing it to focus on other tasks.

3. Parallelism: Multiple DMA channels works simultaneously which improves the system performance in terms of throughput.

4. Minimal delay: System can become more responsive by DMA transfers because it allows CPU to focus on other tasks.

 

Disadvantages of Direct Memory Access (DMA) :

1. Compatibility issues: DMA configurations may not always be compatible across different hardware systems.

2. Complexity: The complexity increase as we are writing the DMA command block into the memory which contain all the sources and destinations of data transfer that are not contiguous.

3. Limited control: As DMA takes control over the memory bus for data transfers which is not always acceptable because in some situations CPU has to wait for the DMA controller to complete the task.

4. Resource conflicts: In some of DMA capable devices there can be memory conflict when multiple devices attempts to use DMA simultaneously.


Comments ()


Sign in

Read Next

TRELLO

Blog banner

Paralysis/Paralysis Stroke

Blog banner

File management

Blog banner

Functions of operating system

Blog banner

Design Considerations for Disk Cache Management

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

Modern Operating Systems.

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Sessions In OS.

Blog banner

Self defence

Blog banner

Cyber Security Control

Blog banner

File management in os

Blog banner

IP ADDRESS

Blog banner

Virtual memory

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

OPERATING SYSTEM

Blog banner

Deadlock and Starvation

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Define Instagram.

Blog banner

Multithreading in Operating System

Blog banner

Dal Bafla Recipe

Blog banner

Deadlock

Blog banner

Service Operations in ITSM

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

Memory Partitioning

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

Concurrency management in operating systems

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

Penetration Testing

Blog banner

Dancing Classes In Mumbai

Blog banner

Concurrency and memory

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Ransomware

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

Principal of concurrency

Blog banner

GIS Bharat Maps

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

Deadlock and starvation

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner