SlideShare a Scribd company logo
1 of 10
TOPIC :Direct Access Memory
Government College Women University Faisalabad
DMA Definition
• DMA stands for Direct memory access and is a
method of transferring data from the computers
RAM to another part of the computer
without processing it using the CPU.
• Direct memory access (DMA) is a feature of
computer systems that allows certain hardware
subsystems to access main system memory.
• DMA normally occur between an I/O device and
memory.
12/11/2017 2
Functions of DMA
• DMA read transfers data from the memory to
the I/O device
• A DMA write transfers data from an I/O
device to memory
• Memory & I/O are controlled simultaneously.
• DMA can save processing time and it is a more
efficient way to move data from the
computer's memory to other devices.
12/11/2017 3
WORKING OF DMA
• In order to transfer data ,each type of port on a
computer has a set of DMA channels that can be
assigned to each connected device.
• For example, a PCI controller and a hard drive
controller each have their own set of DMA channels.
• PCI stands for Peripheral Component Interconnect
and is an industry standard bus for attaching
peripheral devices to a computer
12/11/2017 4
12/11/2017 5
The HOLD pin is an input used to request a DMA action.
The HLDA pin is an output that acknowledges the DMA action •
1. DMA controller send HOLD signal to microprocessor
2. microprocessor Send HLDA to DMA Controller& DMA
Takes charge of system bus.
3. DMA give DMA ACK(back) signal to I/O devices
4.now, DMA controller places memory address on address
bus and data bytes from memory transfer to I/O .
5.DMA Controller updates memory address register and
word count register.
6. when internal count = 0 then DMA Controller sets
HOLD=0
7. now processor regain the charge od the system bus
which continues the normal operation.
• The DMA Controller has several options available for
the transfer of data
1. Cycle steal.
2. Burst transfer Hidden.
Cycle Stealing
In this method, system allows DMA
controller to use system bus to transfer one word, after
which it should return back control of bus to CPU.
This method reduces maximum I/O transfer rates.
It also reduces interference of DMA controller in CPU
memory access
7
Burst transfer
• The DMA controller keeps control of the bus until all
the data buffered by the requesting device has been
transferred to memory (or when the output device
buffer is full, if writing to a peripheral).
8
ADVANTAGES OF DMA
• DMA enables more efficient use of interrupts.
• High transfer rates.
• Increases data throughput
• Potentially reduces hardware costs by eliminating the
need for peripheral-specific FIFO buffers.
• DMA are designed for low power consumption.
• DMA supports faster CPUs than those devices
without DMA support.
• DMA-capable device can communicate directly with
memory.
9
DISADVANTAGES OF DMA
• DMA hardware is complicated.
• Memory conflict between CPU and DMA.
• DMA transfer require a DMA controller to
carry out operation hence cost of system
increase.
12/11/2017 10

More Related Content

What's hot (20)

Computer architecture virtual memory
Computer architecture virtual memoryComputer architecture virtual memory
Computer architecture virtual memory
 
Direct memory access
Direct memory accessDirect memory access
Direct memory access
 
Direct Memory Access
Direct Memory AccessDirect Memory Access
Direct Memory Access
 
CPU Register Organization.ppt
CPU Register Organization.pptCPU Register Organization.ppt
CPU Register Organization.ppt
 
Interrupts
InterruptsInterrupts
Interrupts
 
Direct Memory Access(DMA)
Direct Memory Access(DMA)Direct Memory Access(DMA)
Direct Memory Access(DMA)
 
Direct memory access
Direct memory accessDirect memory access
Direct memory access
 
Input output interface
Input output interfaceInput output interface
Input output interface
 
Interrupts
InterruptsInterrupts
Interrupts
 
Computer architecture input output organization
Computer architecture input output organizationComputer architecture input output organization
Computer architecture input output organization
 
Memory Management
Memory ManagementMemory Management
Memory Management
 
DMA and DMA controller
DMA and DMA controllerDMA and DMA controller
DMA and DMA controller
 
DMA
DMADMA
DMA
 
Dma transfer
Dma transferDma transfer
Dma transfer
 
Direct memory access
Direct memory accessDirect memory access
Direct memory access
 
Input output accessing
Input output accessingInput output accessing
Input output accessing
 
Direct Memory Access ppt
Direct Memory Access pptDirect Memory Access ppt
Direct Memory Access ppt
 
Demand paging
Demand pagingDemand paging
Demand paging
 
ADDRESSING MODE
ADDRESSING MODEADDRESSING MODE
ADDRESSING MODE
 
Interface
InterfaceInterface
Interface
 

Similar to Direct access memory

Direct memory access (dma)
Direct memory access (dma)Direct memory access (dma)
Direct memory access (dma)Zubair Khalid
 
Direct Memory Access (DMA).pptx
Direct Memory Access (DMA).pptxDirect Memory Access (DMA).pptx
Direct Memory Access (DMA).pptxAbidShahriar3
 
DMA_document__1696148675.pdf
DMA_document__1696148675.pdfDMA_document__1696148675.pdf
DMA_document__1696148675.pdfmadhav590273
 
8257 DMA Controller
8257 DMA Controller8257 DMA Controller
8257 DMA ControllerShivamSood22
 
DMA airctecture.pptx
DMA airctecture.pptxDMA airctecture.pptx
DMA airctecture.pptxsuryansh85
 
DMA Controller Presentation
DMA Controller PresentationDMA Controller Presentation
DMA Controller PresentationWaddaMalik
 
discuss the drawbacks of programmed and interrupt driven io and des.pdf
discuss the drawbacks of programmed and interrupt driven io and des.pdfdiscuss the drawbacks of programmed and interrupt driven io and des.pdf
discuss the drawbacks of programmed and interrupt driven io and des.pdfinfo998421
 
I/o management and disk scheduling .pptx
I/o management and disk scheduling .pptxI/o management and disk scheduling .pptx
I/o management and disk scheduling .pptxwebip34973
 
Direct Memory Access (DMA)-Working and Implementation
Direct Memory Access (DMA)-Working and ImplementationDirect Memory Access (DMA)-Working and Implementation
Direct Memory Access (DMA)-Working and ImplementationShubham Kumar
 

Similar to Direct access memory (20)

Direct access memory
Direct access memoryDirect access memory
Direct access memory
 
ppppptttt.pdf
ppppptttt.pdfppppptttt.pdf
ppppptttt.pdf
 
Direct memory access (dma)
Direct memory access (dma)Direct memory access (dma)
Direct memory access (dma)
 
Direct Memory Access (DMA).pptx
Direct Memory Access (DMA).pptxDirect Memory Access (DMA).pptx
Direct Memory Access (DMA).pptx
 
DMA
DMADMA
DMA
 
Lecture 9.pptx
Lecture 9.pptxLecture 9.pptx
Lecture 9.pptx
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
DMA operation
DMA operationDMA operation
DMA operation
 
DMA_document__1696148675.pdf
DMA_document__1696148675.pdfDMA_document__1696148675.pdf
DMA_document__1696148675.pdf
 
8257 DMA Controller
8257 DMA Controller8257 DMA Controller
8257 DMA Controller
 
DMA airctecture.pptx
DMA airctecture.pptxDMA airctecture.pptx
DMA airctecture.pptx
 
DMA Controller Presentation
DMA Controller PresentationDMA Controller Presentation
DMA Controller Presentation
 
Dma
DmaDma
Dma
 
discuss the drawbacks of programmed and interrupt driven io and des.pdf
discuss the drawbacks of programmed and interrupt driven io and des.pdfdiscuss the drawbacks of programmed and interrupt driven io and des.pdf
discuss the drawbacks of programmed and interrupt driven io and des.pdf
 
I/o management and disk scheduling .pptx
I/o management and disk scheduling .pptxI/o management and disk scheduling .pptx
I/o management and disk scheduling .pptx
 
H n q & a
H n q & aH n q & a
H n q & a
 
DMA presentation [By- Digvijay]
DMA presentation [By- Digvijay]DMA presentation [By- Digvijay]
DMA presentation [By- Digvijay]
 
Direct Memory Access (DMA)-Working and Implementation
Direct Memory Access (DMA)-Working and ImplementationDirect Memory Access (DMA)-Working and Implementation
Direct Memory Access (DMA)-Working and Implementation
 
Coa presentation3
Coa presentation3Coa presentation3
Coa presentation3
 
Cpi unit 01
Cpi unit 01Cpi unit 01
Cpi unit 01
 

More from maliksiddique1

More from maliksiddique1 (12)

Web application
Web applicationWeb application
Web application
 
Interface specification
Interface specificationInterface specification
Interface specification
 
Operating system
Operating systemOperating system
Operating system
 
what is computer
what is computerwhat is computer
what is computer
 
Debagging
DebaggingDebagging
Debagging
 
Tcp protocols
Tcp protocolsTcp protocols
Tcp protocols
 
what is Font in multimedia
 what is Font in multimedia what is Font in multimedia
what is Font in multimedia
 
Multimadia
MultimadiaMultimadia
Multimadia
 
Alpha beta pruning
Alpha beta pruningAlpha beta pruning
Alpha beta pruning
 
Long Term Debt Instrument
Long Term Debt InstrumentLong Term Debt Instrument
Long Term Debt Instrument
 
software requirement specification
software requirement specificationsoftware requirement specification
software requirement specification
 
what is bond
what is bondwhat is bond
what is bond
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Direct access memory

  • 1. TOPIC :Direct Access Memory Government College Women University Faisalabad
  • 2. DMA Definition • DMA stands for Direct memory access and is a method of transferring data from the computers RAM to another part of the computer without processing it using the CPU. • Direct memory access (DMA) is a feature of computer systems that allows certain hardware subsystems to access main system memory. • DMA normally occur between an I/O device and memory. 12/11/2017 2
  • 3. Functions of DMA • DMA read transfers data from the memory to the I/O device • A DMA write transfers data from an I/O device to memory • Memory & I/O are controlled simultaneously. • DMA can save processing time and it is a more efficient way to move data from the computer's memory to other devices. 12/11/2017 3
  • 4. WORKING OF DMA • In order to transfer data ,each type of port on a computer has a set of DMA channels that can be assigned to each connected device. • For example, a PCI controller and a hard drive controller each have their own set of DMA channels. • PCI stands for Peripheral Component Interconnect and is an industry standard bus for attaching peripheral devices to a computer 12/11/2017 4
  • 5. 12/11/2017 5 The HOLD pin is an input used to request a DMA action. The HLDA pin is an output that acknowledges the DMA action •
  • 6. 1. DMA controller send HOLD signal to microprocessor 2. microprocessor Send HLDA to DMA Controller& DMA Takes charge of system bus. 3. DMA give DMA ACK(back) signal to I/O devices 4.now, DMA controller places memory address on address bus and data bytes from memory transfer to I/O . 5.DMA Controller updates memory address register and word count register. 6. when internal count = 0 then DMA Controller sets HOLD=0 7. now processor regain the charge od the system bus which continues the normal operation.
  • 7. • The DMA Controller has several options available for the transfer of data 1. Cycle steal. 2. Burst transfer Hidden. Cycle Stealing In this method, system allows DMA controller to use system bus to transfer one word, after which it should return back control of bus to CPU. This method reduces maximum I/O transfer rates. It also reduces interference of DMA controller in CPU memory access 7
  • 8. Burst transfer • The DMA controller keeps control of the bus until all the data buffered by the requesting device has been transferred to memory (or when the output device buffer is full, if writing to a peripheral). 8
  • 9. ADVANTAGES OF DMA • DMA enables more efficient use of interrupts. • High transfer rates. • Increases data throughput • Potentially reduces hardware costs by eliminating the need for peripheral-specific FIFO buffers. • DMA are designed for low power consumption. • DMA supports faster CPUs than those devices without DMA support. • DMA-capable device can communicate directly with memory. 9
  • 10. DISADVANTAGES OF DMA • DMA hardware is complicated. • Memory conflict between CPU and DMA. • DMA transfer require a DMA controller to carry out operation hence cost of system increase. 12/11/2017 10