wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct memory access (DMA)

profile
Dev Sheta
Aug 13, 2024
0 Likes
0 Discussions
126 Reads

DMA permits data transfer directly between I/O device and main memory,

without involvement by the CPU.

• The transfer of data is first initiated by the CPU.

• During the data transfer, the CPU performs other tasks. When the data

transfer is completed, the CPU receives an interrupt request from the DMA

controller.

• The operating system can use only DMA if the hardware has a DMA

controller.

• Consider a data transferred from disk drive to main memory with DMA as

shown in fig. 

Steps-

1. CPU initiates data transfer by programming DMA controller’s registers.

Control- transfer data from disk to main memory

Count- n Number of bytes to transfer

Address- Starting address location in main memory

2. DMA controller then requests disk controller to add data byte to be

transferred from the disk to its buffer.

3. The disk controller then sends the 1 data byte from buffer to the specified

memory location in main memory.

4. When the write is complete, the disk controller sends an acknowledgement

signal to the DMA controller. DMA controller then increments the address

value by 1 (next empty location to write the data) and decrements the byte

count value by one (1 byte is sent out of n bytes). Then steps 2,3,4 are

repeated till the count reaches 0.

5. When count=0, the DMA controller interrupts the CPU to let it know that

the transfer is now complete.


Comments ()


Sign in

Read Next

Flipkart

Blog banner

Deadlock

Blog banner

A Deep Dive

Blog banner

FIREWALL

Blog banner

Child labour

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

City of Mumbai (Bombay):

Blog banner

NodeJs

Blog banner

Memory management and virtual memory

Blog banner

Data Mining

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

Advantage of freedom

Blog banner

evolution of operating system - Disha Parekh

Blog banner

Mariana Trench: The deepest depths

Blog banner

Man VS Nature

Blog banner

Linux Memory Management

Blog banner

File and File System Structure

Blog banner

Data Lake

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

SQL Injection Techniques

Blog banner

How to feel Happy everyday day

Blog banner

What Your Music Taste Reveals About Your Personality

Blog banner

Smartsheet

Blog banner

Types Of scheduling

Blog banner

Process Description

Blog banner

Outlook.com

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

Blockchain Security Technique

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

Vulnerability Assessment

Blog banner

Big Data

Blog banner

Modern operating systems (OS)

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

Types of Viruses

Blog banner

Raid

Blog banner

Security in Operating Systems

Blog banner