wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct memory access (DMA)

profile
Dev Sheta
Aug 13, 2024
0 Likes
0 Discussions
126 Reads

DMA permits data transfer directly between I/O device and main memory,

without involvement by the CPU.

• The transfer of data is first initiated by the CPU.

• During the data transfer, the CPU performs other tasks. When the data

transfer is completed, the CPU receives an interrupt request from the DMA

controller.

• The operating system can use only DMA if the hardware has a DMA

controller.

• Consider a data transferred from disk drive to main memory with DMA as

shown in fig. 

Steps-

1. CPU initiates data transfer by programming DMA controller’s registers.

Control- transfer data from disk to main memory

Count- n Number of bytes to transfer

Address- Starting address location in main memory

2. DMA controller then requests disk controller to add data byte to be

transferred from the disk to its buffer.

3. The disk controller then sends the 1 data byte from buffer to the specified

memory location in main memory.

4. When the write is complete, the disk controller sends an acknowledgement

signal to the DMA controller. DMA controller then increments the address

value by 1 (next empty location to write the data) and decrements the byte

count value by one (1 byte is sent out of n bytes). Then steps 2,3,4 are

repeated till the count reaches 0.

5. When count=0, the DMA controller interrupts the CPU to let it know that

the transfer is now complete.


Comments ()


Sign in

Read Next

Service transistion under difficult conditions

Blog banner

Data Mining

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Uniprocessor Scheduling

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Race Conditions

Blog banner

Computer Security

Blog banner

Interrupts in OS

Blog banner

GraphX:- A graph processing tool

Blog banner

BrainGate Technology

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

EMAIL INVESTIGATION

Blog banner

Oracle Corporation

Blog banner

CoWIN

Blog banner

c

Blog banner

Travel: Everything Everywhere!

Blog banner

Decoding Modern Assessment: Why We Look Beyond the Grade Sheet

Blog banner

Starvation

Blog banner

Benefits of yoga and meditation

Blog banner

SQL Injection Techniques

Blog banner

computer security

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

KAHAWA TEA

Blog banner

Linux 94

Blog banner

Decision Tree: A Diagram Model

Blog banner

Understanding Business Layer in Data Science

Blog banner

BITCOIN WALLET

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

How Harshad Valia International School is nurturing India’s Young Minds?

Blog banner

MORDERN UNIX SYSTEM

Blog banner

What is Data, Information and Knowledge?

Blog banner

Device driver

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Threats To Computer System

Blog banner

memory managment

Blog banner

security controls

Blog banner

VIRUS

Blog banner

DISK SCHEDULING

Blog banner

IP ADDRESS

Blog banner