1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Firdavs [7]
3 years ago
11

Discuss the DMA process​

Computers and Technology
2 answers:
shusha [124]3 years ago
4 0

Answer:

Direct memory access (DMA) is a process that allows an input/output (I/O) device to send or receive data directly to or from the main memory, bypassing the CPU to speed up memory operations and this process is managed by a chip known as a DMA controller (DMAC).

Explanation:

A defined portion of memory is used to send data directly from a peripheral to the motherboard without involving the microprocessor, so that the process does not interfere with overall computer operation.

In older computers, four DMA channels were numbered 0, 1, 2 and 3. When the 16-bit industry standard architecture (ISA) expansion bus was introduced, channels 5, 6 and 7 were added.

ISA was a computer bus standard for IBM-compatible computers, allowing a device to initiate transactions (bus mastering) at a quicker speed. The ISA DMA controller has 8 DMA channels, each one of which associated with a 16-bit address and count registers.

ISA has since been replaced by accelerated graphics port (AGP) and peripheral component interconnect (PCI) expansion cards, which are much faster. Each DMA transfers approximately 2 MB of data per second.

A computer's system resource tools are used for communication between hardware and software. The four types of system resources are:

  •    I/O addresses
  •    Memory addresses.
  •    Interrupt request numbers (IRQ).
  •    Direct memory access (DMA) channels.

DMA channels are used to communicate data between the peripheral device and the system memory. All four system resources rely on certain lines on a bus. Some lines on the bus are used for IRQs, some for addresses (the I/O addresses and the memory address) and some for DMA channels.

A DMA channel enables a device to transfer data without exposing the CPU to a work overload. Without the DMA channels, the CPU copies every piece of data using a peripheral bus from the I/O device. Using a peripheral bus occupies the CPU during the read/write process and does not allow other work to be performed until the operation is completed.

With DMA, the CPU can process other tasks while data transfer is being performed. The transfer of data is first initiated by the CPU. The data block can be transferred to and from memory by the DMAC in three ways.

In burst mode, the system bus is released only after the data transfer is completed. In cycle stealing mode, during the transfer of data between the DMA channel and I/O device, the system bus is relinquished for a few clock cycles so that the CPU can perform other tasks. When the data transfer is complete, the CPU receives an interrupt request from the DMA controller. In transparent mode, the DMAC can take charge of the system bus only when it is not required by the processor.

However, using a DMA controller might cause cache coherency problems. The data stored in RAM accessed by the DMA controller may not be updated with the correct cache data if the CPU is using external memory.

Solutions include flushing cache lines before starting outgoing DMA transfers, or performing a cache invalidation on incoming DMA transfers when external writes are signaled to the cache controller.

Alecsey [184]3 years ago
4 0

Answer:

See explanation

Explanation:

DMA \to Direct Memory Access.

The peripherals of a computer system are always in need to communicate with the main memory; it is the duty of the DMA to allow these peripherals to transfer data to and from the memory.

The first step is that the processor starts the DMA controller, then the peripheral is prepared to send or receive the data; lastly, the DMA sends signal when the peripheral is ready to carry out its operation.

You might be interested in
Which of the following is an example of an incremented sequence?
Anna007 [38]

Answer:

A

Explanation:

When a sequence number is genrated, the sequence is incremented independent of the transaction committing or rolling back.

3 0
2 years ago
When you're working on an image, it's a good idea to make a ____________ of the image, so that you'll have the original image in
pogonyaev

The answer is <u>duplicate</u> because that will make another copy. So if you mess up the image, you'll still have the original.

6 0
3 years ago
Read 2 more answers
My computer is being weird, Everytime I begin to type something on here it keeps adding a letter to the beginning of my sentence
jek_recluse [69]

Answer:

Maybe you have shift lock on since it's highlighting and Ctrl C + Ctrl V your entire text? let me know if im wrong.

3 0
2 years ago
A company has developed a business-critical system for its core automation process with a software vendor. Which of the followin
pychu [463]

Answer:

d. Software Configuration Management

Explanation:

A company has developed a business-critical system for its core automation process with a software vendor. Therefore, the Software Configuration Management can provide access to the source code if the licensor declares bankruptcy.

7 0
3 years ago
You are able to change the formatting of a table after it is inserted into a placeholder. True or false
aliina [53]
True, because you can always remove the placeholder afterwards.
3 0
3 years ago
Read 2 more answers
Other questions:
  • A network host with an IP address of 192.168.10.200 wants to send a message to a destination computer with an assigned IP addres
    6·1 answer
  • Nvm, Its B.
    10·1 answer
  • You are testing a web application for sql injection vulnerabilities. you send various sql statements which return results on the
    5·1 answer
  • Copy the following code and run it. You should break it into the following 3 functions
    6·1 answer
  • You are given a 5-letter word (for example, abcde). Write a C-Program which outputs all possible unique 5 letter permutations of
    13·1 answer
  • Help me plzzzz ASAP T-T and it's Cyber Security but my last day of school is tomorrow and I'll graduate in June 24 so plzzzzz I
    12·1 answer
  • 6
    9·1 answer
  • Which insert image option allows a user to compile, modify, and add captions to images?
    5·2 answers
  • Which element of the MakeCode Arcade interface represents an individual
    12·1 answer
  • "necessarily is the mother of computer " justify this statement with respect to the evolution of computer.​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!