wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct Memory Access

profile
Satyam Chaurasiya
Jul 05, 2024
1 Like
0 Discussions
214 Reads

1.What is a DMA Controller?

=> Direct Memory Access uses hardware for accessing the memory, that hardware is called a DMA Controller. It has the work of transferring the data between Input Output devices and main memory with very less interaction with the processor. The direct Memory Access Controller is a control unit, which has the work of transferring data.

 

2.Types of Direct Memory Access (DMA). 

=> There are four popular types of DMA.

Single-Ended DMA

Dual-Ended DMA

Arbitrated-Ended DMA

Interleaved DMA

•Single-Ended DMA: Single-Ended DMA Controllers operate by reading and writing from a single memory address. They are the simplest DMA.

•Dual-Ended DMA: Dual-Ended DMA controllers can read and write from two memory addresses. Dual-ended DMA is more advanced than single-ended DMA.

•Arbitrated-Ended DMA: Arbitrated-Ended DMA works by reading and writing to several memory addresses. It is more advanced than Dual-Ended DMA.

•Interleaved DMA: Interleaved DMA are those DMA that read from one memory address and write from another memory address.

 

3.Modes of Data Transfer in DMA. 

=> There are 3 modes of data transfer in DMA that are described below.

••Burst Mode: In Burst Mode, buses are handed over to the CPU by the DMA if the whole data is completely transferred, not before that.

••Cycle Stealing Mode: In Cycle Stealing Mode, buses are handed over to the CPU by the DMA after the transfer of each byte. Continuous request for bus control is generated by this Data Transfer Mode. It works more easily for higher-priority tasks.

••Transparent Mode: Transparent Mode in DMA does not require any bus in the transfer of the data as it works when the CPU is executing the transaction.

 

4.Advantages and disadvantages of DMA Controller. 

=>

a. Advantages of DMA Controller

i.Data Memory Access speeds up memory operations and data transfer.

ii. CPU is not involved while transferring data.

iii. DMA requires very few clock cycles while transferring data.

iv. DMA distributes workload very appropriately.

v. DMA helps the CPU in decreasing its load.

 

b. Disadvantages of DMA Controller

i.Direct Memory Access is a costly operation because of additional operations.

ii. DMA suffers from Cache-Coherence Problems.

iii. DMA Controller increases the overall cost of the system.

iv. DMA Controller increases the complexity of the software.


Comments ()


Sign in

Read Next

Modern Operating Systems.

Blog banner

Linux VServer Architecture

Blog banner

Subnet Masking

Blog banner

Yahoo! mail

Blog banner

15 Interesting Facts about India

Blog banner

Memory management

Blog banner

Data Warehouse Bus Matrix

Blog banner

IoT Architecture Based Security

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Cross site scripting Attack

Blog banner

Traditional UNIX Scheduling

Blog banner

Virtual Memory

Blog banner

Service transistion under difficult conditions

Blog banner

12 Principles of Animation

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

DIGITAL TECHNOLOGY

Blog banner

All you need to know about Website Traffic

Blog banner

Honeypot in cyber security

Blog banner

How to tie a Tie

Blog banner

Major achievement

Blog banner

Modern operating systems (OS)

Blog banner

MODERN OPERATING SYSTEM

Blog banner

E-Cash (Electronic Cash)

Blog banner

Modern Operating System

Blog banner

Direct Memory Access

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

The application udemy

Blog banner

The Difference Between Plaque and Tartar Explained Simply

Blog banner

"Audit" In Data Science

Blog banner

Security issues

Blog banner

BrainGate Technology

Blog banner

THE ACTORS LIFE

Blog banner

Memory Management in Operating System

Blog banner

Depression

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

MOBILE DEVICE FORENSIC

Blog banner

Satellite Based Positioning

Blog banner

What is Email? Uses of Emails

Blog banner

Study of Backdoor and Trojan tools

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Penetration Testing

Blog banner