wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct Memory Access

profile
Yug Dave
Jul 12, 2023
0 Likes
0 Discussions
13 Reads

Direct Memory Access (DMA) is a capability provided by some computer bus architectures that enables data to be sent directly from an attached device, such as a disk drive, to the main memory on the computer's motherboard. The microprocessor, or central processing unit (CPU) is freed from involvement with the data transfer, speeding up overall computer operation. DMA enables devices such as disk drives, external memory, graphics cards, network cards and sound cards to share and receive data from the main memory in a computer. It does this while still allowing the CPU to perform other tasks.Without a process such as DMA, the computer's CPU becomes preoccupied with data requests from an attached device and is unable to perform other operations during that time. With DMA, a CPU initiates a data transfer with an attached device and can still perform other operations while the data transfer is in progress. DMA enables a computer to transfer data to and from devices with less CPU overhead.An alternative to DMA is Ultra DMA, which provides a burst data transfer rate up to 33 megabytes per second (MBps). Hard drives that have Ultra DMA/33 also support programmed input/output (PIO) modes 1, 3 and 4, and multiword DMA mode 2 at 16.6 MBps.

 

 


Comments ()


Sign in

Read Next

Why Friendship at Work is Important

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

I/O Management and Disk Scheduling

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Real time scheduling

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

History of ITIL

Blog banner

Deadlocks

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Virtual Machine

Blog banner

An Overview of Virtual Machines

Blog banner

Buffer overflow

Blog banner

Whatsapp Messenger

Blog banner

Outlook mail

Blog banner

MEMORY HIERARCHY

Blog banner

What is a geographic information system (GIS)?

Blog banner

Blockchain

Blog banner

Types of E-Commerce

Blog banner

Operating system

Blog banner

Socket Programming in Java

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Cyber Security Control

Blog banner

Virtual Memory

Blog banner

A Weekend at Oak Tree Hotel: The Best Hotel Experience in Arcadia, Florida

Blog banner

The Peephole

Blog banner

Why we fail after giving 100% ?

Blog banner

K-means use cases

Blog banner

Mutual exclusion

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

Threads

Blog banner

PPT methodology

Blog banner

Proof-of-Stake (PoS)

Blog banner

Uniprocessor Scheduling

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Be you

Blog banner

Process State

Blog banner

VPN

Blog banner

WomenEmpowerment

Blog banner

BITCOIN WALLET

Blog banner