wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct Memory Access

profile
Yug Dave
Jul 12, 2023
0 Likes
0 Discussions
13 Reads

Direct Memory Access (DMA) is a capability provided by some computer bus architectures that enables data to be sent directly from an attached device, such as a disk drive, to the main memory on the computer's motherboard. The microprocessor, or central processing unit (CPU) is freed from involvement with the data transfer, speeding up overall computer operation. DMA enables devices such as disk drives, external memory, graphics cards, network cards and sound cards to share and receive data from the main memory in a computer. It does this while still allowing the CPU to perform other tasks.Without a process such as DMA, the computer's CPU becomes preoccupied with data requests from an attached device and is unable to perform other operations during that time. With DMA, a CPU initiates a data transfer with an attached device and can still perform other operations while the data transfer is in progress. DMA enables a computer to transfer data to and from devices with less CPU overhead.An alternative to DMA is Ultra DMA, which provides a burst data transfer rate up to 33 megabytes per second (MBps). Hard drives that have Ultra DMA/33 also support programmed input/output (PIO) modes 1, 3 and 4, and multiword DMA mode 2 at 16.6 MBps.

 

 


Comments ()


Sign in

Read Next

E-learning

Blog banner

MACHINE LEARNING

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

Social Engineering

Blog banner

Smartsheet

Blog banner

Man In The Middle Attack

Blog banner

Explain Kernel in OS

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

GIS info about Bermuda Triangle

Blog banner

The New Rules of UI/UX Design Every Website Must Follow in 2026

Blog banner

Types of Viruses

Blog banner

What is Amazon?

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

Big Data Architecture

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Threat management

Blog banner

Precision-Recall in Data Science

Blog banner

Deadlock and Starvation

Blog banner

Operating system

Blog banner

City of Mumbai (Bombay):

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Proton mail

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Article on different management system

Blog banner

Deadlock

Blog banner

FRIENDSHIP

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

Emerging threats in cyber Forensics

Blog banner

Process, process creation and process termination

Blog banner

Os(Computer security threats)

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

Data Warehousing

Blog banner

Dal Bafla Recipe

Blog banner

Memory Management

Blog banner

Modern Operating Systems.

Blog banner

What is process

Blog banner

E-Cash (Electronic Cash)

Blog banner

Processes: Process Description and Control.

Blog banner

Service Strategy In ITSM

Blog banner