wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct Memory Access

profile
Jay Bhanushali
Jul 04, 2024
0 Likes
0 Discussions
133 Reads

In the field of input/output (I/O) operations in computing systems, there are several methods to control the interface between the processor and peripheral devices. These methods—programmed I/O, interrupt-driven I/O, and direct memory access (DMA)—each have their own benefits and disadvantages.
Programmed I/O is the most basic method. In instances where the I/O module encounters an I/O instruction, the processor ends it through direct communication with it. The module performs the requested task and updated its status register but does not interrupt the processor. Instead, the processor must actively poll the module to check if the operation has finished. This polling can lead to significant performance degradation since the processor essentially waits idly during this period.

In the situation where the transfer of data of large volumes is involved, DMA is by far the best option.
DMA, the processor is allowed to pass off the transfer of data tasks to a specific DMA module.
Let’s dig into it a bit more if you don’t mind: The processor begins the transfer by giving the parameters such as the operation type (read-write), the device address, the memory location, and the data size to the DMA module. Once set up, the bus is taken over by the DMA module and memory is directly interfaced with the I/O devices without the processor involvement at each data word. This way significantly saves the processor's time and data is transferred much faster.

However, DMA may have some disadvantages. When the DMA module and the processor compete for bus access, there are situations when the processor may have to pause for a while to get the bus. This is a kind of intertemporal pause, and it takes place only on rare occasions due to DMA, which, by the way, remains much better as compared to programmed and interrupt-driven I/O methods in data handling.
As is clear from the above paragraph, among the three mentioned data transfer methods, the direct memory access (DMA) technique comes with the least workload to the CPU and hence is the most effective. By making memory to I/O transfers request in a very fast time, the DMA sends out information that the computer principle memory has been doing the same. This process makes the CPU to focus on other tasks than data transfer hence achieving high overall system efficiency.


Comments ()


Sign in

Read Next

Memory Management

Blog banner

The seven-step improvement process

Blog banner

Banaras

Blog banner

Remote Work in 2026

Blog banner

Virtual memory in windows

Blog banner

gis substation

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

MYNTRA

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

Evolution of operating systems

Blog banner

GIS Topography

Blog banner

Vulnerability Assessment

Blog banner

Uniprocessor scheduling

Blog banner

File sharing

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

PERT Overview

Blog banner

ahh wait a min

Blog banner

Spyware

Blog banner

In the world of Technology...

Blog banner

Deming’s Process

Blog banner

Real time scheduling

Blog banner

Introduction to GIS

Blog banner

Short note on expert system

Blog banner

Memory heirachy (Operating system)

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Cross site scripting Attack

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

Python as a tool for data analysis

Blog banner

Direct memory access (DMA)

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Objectives and Functions of Operating System

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Modern Operating system

Blog banner

Concurrency and Deadlocks

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

INTRODUCTION TO C#

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

Heart Fulness Meditation

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Cyber Security in Data Breaching

Blog banner