wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct memory access (DMA)

profile
Dev Sheta
Aug 13, 2024
0 Likes
0 Discussions
126 Reads

DMA permits data transfer directly between I/O device and main memory,

without involvement by the CPU.

• The transfer of data is first initiated by the CPU.

• During the data transfer, the CPU performs other tasks. When the data

transfer is completed, the CPU receives an interrupt request from the DMA

controller.

• The operating system can use only DMA if the hardware has a DMA

controller.

• Consider a data transferred from disk drive to main memory with DMA as

shown in fig. 

Steps-

1. CPU initiates data transfer by programming DMA controller’s registers.

Control- transfer data from disk to main memory

Count- n Number of bytes to transfer

Address- Starting address location in main memory

2. DMA controller then requests disk controller to add data byte to be

transferred from the disk to its buffer.

3. The disk controller then sends the 1 data byte from buffer to the specified

memory location in main memory.

4. When the write is complete, the disk controller sends an acknowledgement

signal to the DMA controller. DMA controller then increments the address

value by 1 (next empty location to write the data) and decrements the byte

count value by one (1 byte is sent out of n bytes). Then steps 2,3,4 are

repeated till the count reaches 0.

5. When count=0, the DMA controller interrupts the CPU to let it know that

the transfer is now complete.


Comments ()


Sign in

Read Next

Microsoft Windows Overview

Blog banner

Deadlock and starvation

Blog banner

Health and fitness

Blog banner

Hypothesis Testing in Data Science

Blog banner

Introduction my self

Blog banner

Teamwork

Blog banner

Privacy LAWs in IT

Blog banner

Paginng In OS

Blog banner

Operating system

Blog banner

Modern operating system

Blog banner

Boxing

Blog banner

Animal’s have my heart

Blog banner

GIS in Disaster Management

Blog banner

Developments in Modern Operating Systems

Blog banner

Service Design Model

Blog banner

Tools to support CSI activities

Blog banner

(Input/Output) in os

Blog banner

VIRTUAL MACHINES

Blog banner

Service transition principles

Blog banner

What is Internet

Blog banner

MENDELEY

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

ADIDAS

Blog banner

Synchronization

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Scheduling

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

Routers

Blog banner

Virtual machine

Blog banner

Malware Defense

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

Race Conditions

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

Article on Fresh Book

Blog banner

Memory management

Blog banner

Data Mining

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner