wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Direct memory access (DMA)

profile
Dev Sheta
Aug 13, 2024
0 Likes
0 Discussions
126 Reads

DMA permits data transfer directly between I/O device and main memory,

without involvement by the CPU.

• The transfer of data is first initiated by the CPU.

• During the data transfer, the CPU performs other tasks. When the data

transfer is completed, the CPU receives an interrupt request from the DMA

controller.

• The operating system can use only DMA if the hardware has a DMA

controller.

• Consider a data transferred from disk drive to main memory with DMA as

shown in fig. 

Steps-

1. CPU initiates data transfer by programming DMA controller’s registers.

Control- transfer data from disk to main memory

Count- n Number of bytes to transfer

Address- Starting address location in main memory

2. DMA controller then requests disk controller to add data byte to be

transferred from the disk to its buffer.

3. The disk controller then sends the 1 data byte from buffer to the specified

memory location in main memory.

4. When the write is complete, the disk controller sends an acknowledgement

signal to the DMA controller. DMA controller then increments the address

value by 1 (next empty location to write the data) and decrements the byte

count value by one (1 byte is sent out of n bytes). Then steps 2,3,4 are

repeated till the count reaches 0.

5. When count=0, the DMA controller interrupts the CPU to let it know that

the transfer is now complete.


Comments ()


Sign in

Read Next

Deadlocks

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

IOT Hacking Techniques

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Guidelines for a low sodium diet.

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner

Virtual Memory

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

SQL Injection

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Cyber Forensic in the Banking sector

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Virtual Machine

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Article on Zoho Corporation

Blog banner

Time Series Analysis

Blog banner

Cache Memory

Blog banner

File management In Operating System

Blog banner

Dos (Denial of service) Attack

Blog banner

What is Virtual Memory

Blog banner

Operating system

Blog banner

Photorec - media recovery tool

Blog banner

Why Oak Tree Hotel Is Arcadia’s Hidden Gem?

Blog banner

How To Secure Operating Systems ?

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Virtual memory

Blog banner

Different types of scam Fraud

Blog banner

How to tie a Tie

Blog banner

Financial Fraud Detection

Blog banner

IoT Architecture Based Security

Blog banner

What are Tenders its various types

Blog banner

KASHMIR TRIPS

Blog banner

The Laws of Karma

Blog banner

internet email and it's applications

Blog banner

CSI and Organizational Change

Blog banner

differentiate thinking humanly and rationally

Blog banner

Apache Kafka

Blog banner

Intrusion Detection System

Blog banner

10 Reasons to date your best friend

Blog banner