wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct Memory Access

profile
Yug Dave
Jul 12, 2023
0 Likes
0 Discussions
13 Reads

Direct Memory Access (DMA) is a capability provided by some computer bus architectures that enables data to be sent directly from an attached device, such as a disk drive, to the main memory on the computer's motherboard. The microprocessor, or central processing unit (CPU) is freed from involvement with the data transfer, speeding up overall computer operation. DMA enables devices such as disk drives, external memory, graphics cards, network cards and sound cards to share and receive data from the main memory in a computer. It does this while still allowing the CPU to perform other tasks.Without a process such as DMA, the computer's CPU becomes preoccupied with data requests from an attached device and is unable to perform other operations during that time. With DMA, a CPU initiates a data transfer with an attached device and can still perform other operations while the data transfer is in progress. DMA enables a computer to transfer data to and from devices with less CPU overhead.An alternative to DMA is Ultra DMA, which provides a burst data transfer rate up to 33 megabytes per second (MBps). Hard drives that have Ultra DMA/33 also support programmed input/output (PIO) modes 1, 3 and 4, and multiword DMA mode 2 at 16.6 MBps.

 

 


Comments ()


Sign in

Read Next

Session Vulnerabilities

Blog banner

Modern operating system

Blog banner

Virtual Memory

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

FIREWALL

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

OPERATING SYSTEM

Blog banner

I/O buffer and its techniques

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Know your Processors!

Blog banner

RAID

Blog banner

Junk food vs healthy food

Blog banner

Social media

Blog banner

Deadlocks in operating system

Blog banner

Information Technology In E- Commerce

Blog banner

What is M-commerce and how it's work

Blog banner

What is service level Agreement?

Blog banner

Risk factors in service transistion

Blog banner

Starvation

Blog banner

Gamer life

Blog banner

Threads in OS

Blog banner

SQL Injection Techniques

Blog banner

WORKFRONT SOFTWARE

Blog banner

OPERATING SYSTEM

Blog banner

DATA VAULT

Blog banner

LIMITED EDITION

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

operating system

Blog banner

Secure Hypertext transfer protocol

Blog banner

The Role of cryptography in cyber security

Blog banner

Evolution of Operating System

Blog banner

Cyber Security in Data Breaching

Blog banner

15 Interesting Facts about India

Blog banner

GIS in Disaster Management

Blog banner

Precision-Recall in Data Science

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Network Forensics

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Firewall in Computer Network

Blog banner