wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct Memory Access

profile
Satyam Chaurasiya
Jul 05, 2024
1 Like
0 Discussions
213 Reads

1.What is a DMA Controller?

=> Direct Memory Access uses hardware for accessing the memory, that hardware is called a DMA Controller. It has the work of transferring the data between Input Output devices and main memory with very less interaction with the processor. The direct Memory Access Controller is a control unit, which has the work of transferring data.

 

2.Types of Direct Memory Access (DMA). 

=> There are four popular types of DMA.

Single-Ended DMA

Dual-Ended DMA

Arbitrated-Ended DMA

Interleaved DMA

•Single-Ended DMA: Single-Ended DMA Controllers operate by reading and writing from a single memory address. They are the simplest DMA.

•Dual-Ended DMA: Dual-Ended DMA controllers can read and write from two memory addresses. Dual-ended DMA is more advanced than single-ended DMA.

•Arbitrated-Ended DMA: Arbitrated-Ended DMA works by reading and writing to several memory addresses. It is more advanced than Dual-Ended DMA.

•Interleaved DMA: Interleaved DMA are those DMA that read from one memory address and write from another memory address.

 

3.Modes of Data Transfer in DMA. 

=> There are 3 modes of data transfer in DMA that are described below.

••Burst Mode: In Burst Mode, buses are handed over to the CPU by the DMA if the whole data is completely transferred, not before that.

••Cycle Stealing Mode: In Cycle Stealing Mode, buses are handed over to the CPU by the DMA after the transfer of each byte. Continuous request for bus control is generated by this Data Transfer Mode. It works more easily for higher-priority tasks.

••Transparent Mode: Transparent Mode in DMA does not require any bus in the transfer of the data as it works when the CPU is executing the transaction.

 

4.Advantages and disadvantages of DMA Controller. 

=>

a. Advantages of DMA Controller

i.Data Memory Access speeds up memory operations and data transfer.

ii. CPU is not involved while transferring data.

iii. DMA requires very few clock cycles while transferring data.

iv. DMA distributes workload very appropriately.

v. DMA helps the CPU in decreasing its load.

 

b. Disadvantages of DMA Controller

i.Direct Memory Access is a costly operation because of additional operations.

ii. DMA suffers from Cache-Coherence Problems.

iii. DMA Controller increases the overall cost of the system.

iv. DMA Controller increases the complexity of the software.


Comments ()


Sign in

Read Next

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

BUFFER OVERFLOW_142

Blog banner

INTERNET

Blog banner

Jio .....A Revolution ?? ??

Blog banner

Void

Blog banner

TRELLO

Blog banner

IP Address

Blog banner

FILE SHARING

Blog banner

Data carving - using hex editor

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

Modern operating systems (OS)

Blog banner

Man is free by the birth .

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

Loneliness

Blog banner

Security requirements for Safe E-Payments

Blog banner

Mumbai

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

RAID

Blog banner

Visualization in Data Science

Blog banner

About my college life

Blog banner

Health and fitness in technology

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

All you need to know about “On-page SEO”

Blog banner

Short note on expert system

Blog banner

Malware Defense

Blog banner

Be you

Blog banner

Online Education

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

Question

Blog banner

A True Friendship

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

MailChimp

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Developments in Modern Operating Systems

Blog banner

GIS REMOTE SENSING

Blog banner

Deadlock in Operating System

Blog banner

Virtual Memory

Blog banner

Modern operating system

Blog banner

Fault tolerance

Blog banner

How to kiss

Blog banner

Chicken Dum Biryani

Blog banner