wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct Memory Access

profile
Jay Bhanushali
Jul 04, 2024
0 Likes
0 Discussions
133 Reads

In the field of input/output (I/O) operations in computing systems, there are several methods to control the interface between the processor and peripheral devices. These methods—programmed I/O, interrupt-driven I/O, and direct memory access (DMA)—each have their own benefits and disadvantages.
Programmed I/O is the most basic method. In instances where the I/O module encounters an I/O instruction, the processor ends it through direct communication with it. The module performs the requested task and updated its status register but does not interrupt the processor. Instead, the processor must actively poll the module to check if the operation has finished. This polling can lead to significant performance degradation since the processor essentially waits idly during this period.

In the situation where the transfer of data of large volumes is involved, DMA is by far the best option.
DMA, the processor is allowed to pass off the transfer of data tasks to a specific DMA module.
Let’s dig into it a bit more if you don’t mind: The processor begins the transfer by giving the parameters such as the operation type (read-write), the device address, the memory location, and the data size to the DMA module. Once set up, the bus is taken over by the DMA module and memory is directly interfaced with the I/O devices without the processor involvement at each data word. This way significantly saves the processor's time and data is transferred much faster.

However, DMA may have some disadvantages. When the DMA module and the processor compete for bus access, there are situations when the processor may have to pause for a while to get the bus. This is a kind of intertemporal pause, and it takes place only on rare occasions due to DMA, which, by the way, remains much better as compared to programmed and interrupt-driven I/O methods in data handling.
As is clear from the above paragraph, among the three mentioned data transfer methods, the direct memory access (DMA) technique comes with the least workload to the CPU and hence is the most effective. By making memory to I/O transfers request in a very fast time, the DMA sends out information that the computer principle memory has been doing the same. This process makes the CPU to focus on other tasks than data transfer hence achieving high overall system efficiency.


Comments ()


Sign in

Read Next

Multiprocessor and scheduling

Blog banner

Memory Management

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Starvation

Blog banner

Threads

Blog banner

An Overivew Of Cache Memory

Blog banner

Drawing tips for a beginner

Blog banner

Environmental Management using GIS

Blog banner

Deadlock and Starvation

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

Threads

Blog banner

VIDEO INTERVIEWS : A NEW ECOSYSTEM TO GET DREAM JOBS

Blog banner

Deadlock

Blog banner

E-commerce

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

BITCOIN WALLET

Blog banner

Spyware

Blog banner

Booting Process In Operating System

Blog banner

Zero-Day Attack

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

Health and fitness

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

Virtual memory in os

Blog banner

Memory Management

Blog banner

Understanding Regression Analysis

Blog banner

RAID

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

Benefits of yoga and meditation

Blog banner

Assessing Incident Detection Response Process

Blog banner

Operation system

Blog banner

Advantage of freedom

Blog banner

Memory heirchy

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

Deadlocks in operating system

Blog banner

VIRTUAL MACHINES

Blog banner

I/O Management and Disk Scheduling

Blog banner

Search Marketing In 2026: From Keywords To Credibility And User Intent

Blog banner

THE DESIRE OF MANY

Blog banner

Data Lake

Blog banner