wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct Memory Access

profile
Yug Dave
Jul 12, 2023
0 Likes
0 Discussions
13 Reads

Direct Memory Access (DMA) is a capability provided by some computer bus architectures that enables data to be sent directly from an attached device, such as a disk drive, to the main memory on the computer's motherboard. The microprocessor, or central processing unit (CPU) is freed from involvement with the data transfer, speeding up overall computer operation. DMA enables devices such as disk drives, external memory, graphics cards, network cards and sound cards to share and receive data from the main memory in a computer. It does this while still allowing the CPU to perform other tasks.Without a process such as DMA, the computer's CPU becomes preoccupied with data requests from an attached device and is unable to perform other operations during that time. With DMA, a CPU initiates a data transfer with an attached device and can still perform other operations while the data transfer is in progress. DMA enables a computer to transfer data to and from devices with less CPU overhead.An alternative to DMA is Ultra DMA, which provides a burst data transfer rate up to 33 megabytes per second (MBps). Hard drives that have Ultra DMA/33 also support programmed input/output (PIO) modes 1, 3 and 4, and multiword DMA mode 2 at 16.6 MBps.

 

 


Comments ()


Sign in

Read Next

Electronic data interchange

Blog banner

Short note on Microsoft office

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

Solitary Play Activities for Preschoolers: Types and Benefits

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Service Catalogue Management

Blog banner

Service transistion under difficult conditions

Blog banner

File management

Blog banner

1.1 basic elements

Blog banner

Save Girl Child

Blog banner

Blockchain Security Technique

Blog banner

UniProcessor Scheduling

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

Note Taker App

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

AI and cyber Security

Blog banner

My Favorite Sportsperson

Blog banner

Concept and definition of m-commerce

Blog banner

Memory Management in Operating System

Blog banner

Mumbai

Blog banner

Types of OS

Blog banner

RAID

Blog banner

RAID

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

Explain Multiprocessors

Blog banner

Cache memory

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

Policies for Service Transition

Blog banner

Security in Operating Systems

Blog banner

Google classroom

Blog banner

Race condition

Blog banner

Deadlock

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

Pipedrive

Blog banner

Network Security Risks

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

Deadlock

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner