wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct memory access (DMA)

profile
Dev Sheta
Aug 13, 2024
0 Likes
0 Discussions
126 Reads

DMA permits data transfer directly between I/O device and main memory,

without involvement by the CPU.

• The transfer of data is first initiated by the CPU.

• During the data transfer, the CPU performs other tasks. When the data

transfer is completed, the CPU receives an interrupt request from the DMA

controller.

• The operating system can use only DMA if the hardware has a DMA

controller.

• Consider a data transferred from disk drive to main memory with DMA as

shown in fig. 

Steps-

1. CPU initiates data transfer by programming DMA controller’s registers.

Control- transfer data from disk to main memory

Count- n Number of bytes to transfer

Address- Starting address location in main memory

2. DMA controller then requests disk controller to add data byte to be

transferred from the disk to its buffer.

3. The disk controller then sends the 1 data byte from buffer to the specified

memory location in main memory.

4. When the write is complete, the disk controller sends an acknowledgement

signal to the DMA controller. DMA controller then increments the address

value by 1 (next empty location to write the data) and decrements the byte

count value by one (1 byte is sent out of n bytes). Then steps 2,3,4 are

repeated till the count reaches 0.

5. When count=0, the DMA controller interrupts the CPU to let it know that

the transfer is now complete.


Comments ()


Sign in

Read Next

A Short History of GIS

Blog banner

Types of Big Data

Blog banner

Mumbai famous street food

Blog banner

Understanding - Proof of Work!

Blog banner

NIKE

Blog banner

What is OS Fingerprinting?

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

What is Data, Information and Knowledge?

Blog banner

Mumbai

Blog banner

Docker Framework

Blog banner

Electronic data interchange

Blog banner

Depression

Blog banner

Pooja Silver

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

Strengthening Active Directory Security

Blog banner

Malware

Blog banner

Modern operating system

Blog banner

MOBILE DEVICE FORENSIC

Blog banner

Child labour

Blog banner

TAILS OS

Blog banner

Evolution of Operating System

Blog banner

The seven-step improvement process

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

38_Exploring The Honeynet Project

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

clock

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

Mumbai local ......

Blog banner

Kernel in Operating System

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Time Series Analysis

Blog banner

Blog on health and fitness

Blog banner

Deadlock

Blog banner

M commerce

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Models of Information Security.

Blog banner

Short note on expert system

Blog banner

Race Conditions

Blog banner

Hacking of web server and application

Blog banner

Deadlocks in Operating System

Blog banner