1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PSYCHO15rus [73]
4 years ago
7

8.14 Consider a system in which bus cycles takes 500 ns. Transfer of bus control in either direction, from processor to I/O devi

ce or vice versa, takes 250 ns. One of the I/O devices has a data transfer rate of 50 KB/s and employs DMA. Data are transferred 1 byte at a time. a. Suppose we employ DMA in a burst mode. That is, the DMA interface gains bus mastership prior to the start of a block transfer and maintains control of the bus until the whole block is transferred. For how long would the device tie up the bus when transferring a block of 128 bytes? b. Repeat the calculation for cycle-​stealing mode.
Computers and Technology
1 answer:
alexira [117]4 years ago
4 0

Answer:

A) 2.56 ms

B) 128 μs

Explanation:

Time for Bus cycles = 500 ns

Transfer of bus control = 250 ns

I/0 device data transfer rate = 50 KB/s

Data are transferred at : 1 byte at a time

A) Determine how long the device tie up the bus when transferring a block of 128 bytes

Block size to be transferred = 128 bytes

Bandwidth = 50 KB/s

data transfer = (Block size ) / ( Bandwidth)

                     = ( 128 * 8 ) / ( 50 * 10^3 * 8 )

                     = ( 1024 ) / ( 50 * 10^3 * 8 )

                     = 2.56 ms

To determine the actual transfer time  we have to add up the transfer time for the bus control in both directions :

2.56 ms + 500 ns = 2.56 ms. this is because 500 ns is not a significant value

B) cycle stealing mode

In this mode each byte is transferred at a time and The total transfer time needed for the bus control in both directions will be double the total time i.e 2 * 500 ns = 1000 ns. because additional control time of  250 ns is required at both ends

since 1 byte is transferred at a time , 1 byte will be transferred in 1 μs

128 bytes = 128 *  1 μs = 128 μs

You might be interested in
How data transform into information?​
laila [671]
Information is when you take the data you have and analyze it or manipulate it by combining it with other data, trending it over time, assessing or analyzing the outliers that need to be dealt with, and, most important, applying your own experience and knowledge to transform that data into something you can use to make
4 0
3 years ago
Given the following classes and their objects:
Andrej [43]

Answer:

The answer is "Option b"

Explanation:

In the given code three-class C1, C2, and C3 are declared, in which C2  and C3 extend the class C1. In the next line, C2 and C3 object are created, that is c2 and c3. and in the last line c2 class object holds two-class C2, C1, and one object c3 value, this code will give runtime error because it can't cast object from sibling class, and wrong choices can be defined as follows:

  • In option a, It is not correct because it can't cast c3 object into c2 object.
  • In option c, It is not correct because it performs multiple casting in nested forms.
  • In option d, It is wrong because the statement is not correct.
3 0
4 years ago
What is a boolean operator?
VLD [36.1K]
2. Search parameters set to identify specific information during internet searches
7 0
3 years ago
12. When computer professionals take on jobs, they may not enter into relationships with which of the
weeeeeb [17]

Answer:

12 is c. 13 is a .14 is c 15 I don't know sorry

6 0
3 years ago
Which of the following is an advantage to using
stiks02 [169]

Answer:

There are 2 correct answers,

- It is easily read by most software and hardware because it requires little processing.

- It can be used by programmers for source code files.

7 0
3 years ago
Other questions:
  • The intersection of a row and a column is commonly called what?
    15·1 answer
  • You have created a number of different documents using several applications including word, excel, and powerpoint. these files a
    10·1 answer
  • Consider the following method: public static void arrayMystery(int[] array) { for (int i = 0; i < array.length - 1; i++) { if
    10·1 answer
  • What is the first step to creating a PivotTable?
    9·2 answers
  • Which of the following are examples of how a company might use consumer data it had collected? a To decide what types of product
    10·1 answer
  • Define a class named ComparableSquare that extends Square (defined above) and implements Comparable. Implement the compareTo met
    7·1 answer
  • What was the first message ever sent in morse code?
    13·1 answer
  • Sorry but, what are brainliest for?
    7·2 answers
  • 1. What are the main uses for Protein in the body?
    13·2 answers
  • Which of the following makes Super Mario Run unique?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!