wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct memory access (DMA)

profile
Dev Sheta
Aug 13, 2024
0 Likes
0 Discussions
126 Reads

DMA permits data transfer directly between I/O device and main memory,

without involvement by the CPU.

• The transfer of data is first initiated by the CPU.

• During the data transfer, the CPU performs other tasks. When the data

transfer is completed, the CPU receives an interrupt request from the DMA

controller.

• The operating system can use only DMA if the hardware has a DMA

controller.

• Consider a data transferred from disk drive to main memory with DMA as

shown in fig. 

Steps-

1. CPU initiates data transfer by programming DMA controller’s registers.

Control- transfer data from disk to main memory

Count- n Number of bytes to transfer

Address- Starting address location in main memory

2. DMA controller then requests disk controller to add data byte to be

transferred from the disk to its buffer.

3. The disk controller then sends the 1 data byte from buffer to the specified

memory location in main memory.

4. When the write is complete, the disk controller sends an acknowledgement

signal to the DMA controller. DMA controller then increments the address

value by 1 (next empty location to write the data) and decrements the byte

count value by one (1 byte is sent out of n bytes). Then steps 2,3,4 are

repeated till the count reaches 0.

5. When count=0, the DMA controller interrupts the CPU to let it know that

the transfer is now complete.


Comments ()


Sign in

Read Next

Multiprocessor scheduling

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

What is thread and alse multithreading

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

Importance Of Education.

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Memory Management

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

Never give up

Blog banner

Data Mining

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

Memory management

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Starvation

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Risk mitigation and management

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Service Operations in ITSM

Blog banner

Street foods

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Explain Kernel in OS

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

Direct Memory Access

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

What is Virtual Memory

Blog banner

Blog name

Blog banner

IT Service Continuity Management

Blog banner

Virtual Memory

Blog banner

Operating system evolution

Blog banner

About myself

Blog banner

Synchronization

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Benefits of Yoga

Blog banner

Reconnaissance

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

semaphores

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner