wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct memory access (DMA)

profile
Dev Sheta
Aug 13, 2024
0 Likes
0 Discussions
126 Reads

DMA permits data transfer directly between I/O device and main memory,

without involvement by the CPU.

• The transfer of data is first initiated by the CPU.

• During the data transfer, the CPU performs other tasks. When the data

transfer is completed, the CPU receives an interrupt request from the DMA

controller.

• The operating system can use only DMA if the hardware has a DMA

controller.

• Consider a data transferred from disk drive to main memory with DMA as

shown in fig. 

Steps-

1. CPU initiates data transfer by programming DMA controller’s registers.

Control- transfer data from disk to main memory

Count- n Number of bytes to transfer

Address- Starting address location in main memory

2. DMA controller then requests disk controller to add data byte to be

transferred from the disk to its buffer.

3. The disk controller then sends the 1 data byte from buffer to the specified

memory location in main memory.

4. When the write is complete, the disk controller sends an acknowledgement

signal to the DMA controller. DMA controller then increments the address

value by 1 (next empty location to write the data) and decrements the byte

count value by one (1 byte is sent out of n bytes). Then steps 2,3,4 are

repeated till the count reaches 0.

5. When count=0, the DMA controller interrupts the CPU to let it know that

the transfer is now complete.


Comments ()


Sign in

Read Next

BENIFITS OF YOGA

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Multicore and multithreading 171

Blog banner

SQL Injection

Blog banner

HACKING MOBILE PLATFORM

Blog banner

Cloud Security: Trends and Innovations

Blog banner

PODIO

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Computer Security

Blog banner

Every body is beautiful

Blog banner

10 Types of Friends in every friend group

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

child Labour

Blog banner

Indian Food

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

Direct Memory Access

Blog banner

Disk Management

Blog banner

Install Ubuntu in Vmware

Blog banner

SMARTSHEET

Blog banner

Advantage of freedom

Blog banner

File Management In OS

Blog banner

I/O Management and Disk Scheduling

Blog banner

Modern Operating Systems.

Blog banner

Predictive Analysis - Ek Overview

Blog banner

From Model Mistakes to Metrics

Blog banner

Importance Of Yoga.

Blog banner

All you need to know about Cassandra

Blog banner

Is It Too Late to Straighten My Teeth as an Adult?

Blog banner

Concurrency and Deadlocks

Blog banner

Health is Wealth

Blog banner

Spyware

Blog banner

Artificial Intelligence and I

Blog banner

Benefits of yoga and meditation

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

10 Reasons to date your best friend

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

DATA WRANGLING

Blog banner

Paginng In OS

Blog banner

E-security systems | CCTV

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner