SlideShare a Scribd company logo
1 of 13
3rd Assessment
on
Modes of Data Transfer.
Presented by
PRATIK KADAM
URN: 2020-M-02101997
Under the Supervision of
Professor
Amit Sundas
COMPUTER ARCHITECTURE. (CSC511)
Outlines
• Introduction
• Programmed I/O
• interrupt initiated I/O
• Direct Memory Access
• Comparison
• References
Introduction :
• Binary information received from an external device is usually stored in memory for later
processing. Information transferred from the central computer into an external device originates
in the memory unit.
• The CPU merely executes the I/O instructions and may accept the data temporarily, but the
ultimate source or destination is the memory unit.
• Data transfer between the central computer and I/O devices may be handled in a variety of
modes.
• Some modes use the CPU as an intermediate path; others transfer the data directly to and from
the memory unit.
Introduction Contd..
• Some modes use the CPU as an intermediate path; others transfer the data directly to and from
the memory unit.
• Data transfer to and from peripherals may be handled in one of three possible modes:
 Programmed I/O
 Interrupt-initiated I/O
 Direct memory access (DMA)
Programmed I/O :
 These operations are a result of I/O instructions written in the computer program. Data transfer is
initiated by an instruction in the program .
 Usually the data transfer data between CPU register and peripheral has to be constantly
monitored. Once a data transfer is initiated , the CPU is required to monitor the interface to see
when a transfer can again be made.
Application of Programmed I/O:
Useful in small low speed computers.
Used in systems that are dedicated to monitor a device continuously.
Used in the data register.
Used to check the status of the flag bit and branch.
Programmed I/O :
Fig 1.1 Programmed I/O
Interrupt Initiated I/O :
 This can be avoided by using an interrupt facility and special commands to inform the interface
to issue an interrupt request signal when the data are available from the device. Meanwhile , The
interfaces keeps monitoring The device.
 When the interface determines that the device is ready for data transfer, it generates an interrupt
request to the computer.
SERVICES ROUTINES OF INTERRUPT INITIATED I/O :
 Service routines of interrupt initiated I/O can be chosen in two ways.
 vectored interrupt.
 Non-vectored interrupt.
Interrupt Initiated I/O :
Fig 2.1 Interrupt Initiated I/O
Direct Memory Access(DMA) :
 The interface transfer data into and out of the memory unit through the memory bus. The CPU
initiates the transfer of supplying the interface with the starting address and the number of words
needed to be transferred and then proceed to execute other tasks . When the request is granted by
the memory controller, the DMA transfer the data directly into memory.
Application of DMA.
 During DMA transfer, the CPU is idle and has no control of the memory buses. The buses can be
disabled by using two special control signals.
 Bus Request (BR)
 Bus Grant(BG)
Direct Memory Access(DMA) :
Fig 3.1
Bus Signals for DMA
Comparison:
Programmed I/O Interrupt Initiated I/O Direct Memory Access
Data transfer is initiated by the means of
instructions stored in the computer
program.
The I/O transfer is initiated by the
interrupt command issued to the CPU.
Direct Memory Access (DMA) means
CPU grants I/O module authority to read
from or write to memory without
involvement.
The CPU stays in the loop to know if the
device is ready for transfer and has to
continuously monitor the peripheral
device.
There is no need for the CPU to stay in
the loop as the interrupt command
interrupts the CPU when the device is
ready for data transfer.
As CPU is not involved in any means this
the fastest input and output mode.
Table 1: comparison
References
URL References
Geeks for Geeks
https://www.geeksforgeeks.org/io-interface-interrupt-dma-mode
Upscfever.com
https://upscfever.com/upsc-fever/en/gatecse/en-gatecse-chp164.html
Modes of Data Transfer Assessment

More Related Content

What's hot (20)

Interrupts
InterruptsInterrupts
Interrupts
 
Instruction cycle
Instruction cycleInstruction cycle
Instruction cycle
 
Memory Organization
Memory OrganizationMemory Organization
Memory Organization
 
Computer architecture input output organization
Computer architecture input output organizationComputer architecture input output organization
Computer architecture input output organization
 
Data transfer and manipulation
Data transfer and manipulationData transfer and manipulation
Data transfer and manipulation
 
Basic Computer Organization and Design
Basic  Computer  Organization  and  DesignBasic  Computer  Organization  and  Design
Basic Computer Organization and Design
 
instruction cycle ppt
instruction cycle pptinstruction cycle ppt
instruction cycle ppt
 
Microprogrammed Control Unit
Microprogrammed Control UnitMicroprogrammed Control Unit
Microprogrammed Control Unit
 
IO Techniques in Computer Organization
IO Techniques in Computer OrganizationIO Techniques in Computer Organization
IO Techniques in Computer Organization
 
Memory Reference Instructions
Memory Reference InstructionsMemory Reference Instructions
Memory Reference Instructions
 
Computer registers
Computer registersComputer registers
Computer registers
 
Register transfer language
Register transfer languageRegister transfer language
Register transfer language
 
Addressing modes
Addressing modesAddressing modes
Addressing modes
 
Input output organization
Input output organizationInput output organization
Input output organization
 
Interrupts
InterruptsInterrupts
Interrupts
 
Computer registers
Computer registersComputer registers
Computer registers
 
Computer architecture control unit
Computer architecture control unitComputer architecture control unit
Computer architecture control unit
 
Interrupts and types of interrupts
Interrupts and types of interruptsInterrupts and types of interrupts
Interrupts and types of interrupts
 
Cpu & its execution of instruction
Cpu & its execution of instructionCpu & its execution of instruction
Cpu & its execution of instruction
 
Direct Memory Access
Direct Memory AccessDirect Memory Access
Direct Memory Access
 

Similar to Modes of Data Transfer Assessment

ghgfjfhgdjfdhgdhgfdgfdhgdhgfdhgzeka.pptx
ghgfjfhgdjfdhgdhgfdgfdhgdhgfdhgzeka.pptxghgfjfhgdjfdhgdhgfdgfdhgdhgfdhgzeka.pptx
ghgfjfhgdjfdhgdhgfdgfdhgdhgfdhgzeka.pptxEliasPetros
 
Computer architecture presentation
Computer architecture presentationComputer architecture presentation
Computer architecture presentationMuhammad Hamza
 
inputoutputorganization-140722085906-phpapp01.pptx
inputoutputorganization-140722085906-phpapp01.pptxinputoutputorganization-140722085906-phpapp01.pptx
inputoutputorganization-140722085906-phpapp01.pptxAshokRachapalli1
 
COMPUTER ORGANIZATION NOTES Unit 3 4
COMPUTER ORGANIZATION NOTES  Unit 3 4COMPUTER ORGANIZATION NOTES  Unit 3 4
COMPUTER ORGANIZATION NOTES Unit 3 4Dr.MAYA NAYAK
 
Ch 7 io_management & disk scheduling
Ch 7 io_management & disk schedulingCh 7 io_management & disk scheduling
Ch 7 io_management & disk schedulingmadhuributani
 
discuss the drawbacks of programmed and interrupt driven io and des.pdf
discuss the drawbacks of programmed and interrupt driven io and des.pdfdiscuss the drawbacks of programmed and interrupt driven io and des.pdf
discuss the drawbacks of programmed and interrupt driven io and des.pdfinfo998421
 
DMA Controller Presentation
DMA Controller PresentationDMA Controller Presentation
DMA Controller PresentationWaddaMalik
 
Input Output - Computer Architecture
Input Output - Computer ArchitectureInput Output - Computer Architecture
Input Output - Computer ArchitectureMaruf Abdullah (Rion)
 
Transfer Modes | Computer Science
Transfer Modes | Computer ScienceTransfer Modes | Computer Science
Transfer Modes | Computer ScienceTransweb Global Inc
 
Computer organization
Computer organizationComputer organization
Computer organizationRvishnupriya2
 
Computer organization
Computer organization Computer organization
Computer organization vishnu973656
 

Similar to Modes of Data Transfer Assessment (20)

ch -6 IO.pptx
ch -6 IO.pptxch -6 IO.pptx
ch -6 IO.pptx
 
MODES OF TRANSFER.pptx
MODES OF TRANSFER.pptxMODES OF TRANSFER.pptx
MODES OF TRANSFER.pptx
 
I/O Management
I/O ManagementI/O Management
I/O Management
 
ghgfjfhgdjfdhgdhgfdgfdhgdhgfdhgzeka.pptx
ghgfjfhgdjfdhgdhgfdgfdhgdhgfdhgzeka.pptxghgfjfhgdjfdhgdhgfdgfdhgdhgfdhgzeka.pptx
ghgfjfhgdjfdhgdhgfdgfdhgdhgfdhgzeka.pptx
 
Computer architecture presentation
Computer architecture presentationComputer architecture presentation
Computer architecture presentation
 
Unit3 input
Unit3 inputUnit3 input
Unit3 input
 
inputoutputorganization-140722085906-phpapp01.pptx
inputoutputorganization-140722085906-phpapp01.pptxinputoutputorganization-140722085906-phpapp01.pptx
inputoutputorganization-140722085906-phpapp01.pptx
 
COMPUTER ORGANIZATION NOTES Unit 3 4
COMPUTER ORGANIZATION NOTES  Unit 3 4COMPUTER ORGANIZATION NOTES  Unit 3 4
COMPUTER ORGANIZATION NOTES Unit 3 4
 
Lecture 9.pptx
Lecture 9.pptxLecture 9.pptx
Lecture 9.pptx
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
IO_ORGANIZATION.pdf
IO_ORGANIZATION.pdfIO_ORGANIZATION.pdf
IO_ORGANIZATION.pdf
 
Ch 7 io_management & disk scheduling
Ch 7 io_management & disk schedulingCh 7 io_management & disk scheduling
Ch 7 io_management & disk scheduling
 
discuss the drawbacks of programmed and interrupt driven io and des.pdf
discuss the drawbacks of programmed and interrupt driven io and des.pdfdiscuss the drawbacks of programmed and interrupt driven io and des.pdf
discuss the drawbacks of programmed and interrupt driven io and des.pdf
 
Input-Output Modules
Input-Output ModulesInput-Output Modules
Input-Output Modules
 
DMA Controller Presentation
DMA Controller PresentationDMA Controller Presentation
DMA Controller Presentation
 
Input Output - Computer Architecture
Input Output - Computer ArchitectureInput Output - Computer Architecture
Input Output - Computer Architecture
 
Transfer Modes | Computer Science
Transfer Modes | Computer ScienceTransfer Modes | Computer Science
Transfer Modes | Computer Science
 
Computer organization
Computer organizationComputer organization
Computer organization
 
Computer organization
Computer organization Computer organization
Computer organization
 
Ca 2 note mano
Ca 2 note manoCa 2 note mano
Ca 2 note mano
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Modes of Data Transfer Assessment

  • 1. 3rd Assessment on Modes of Data Transfer. Presented by PRATIK KADAM URN: 2020-M-02101997 Under the Supervision of Professor Amit Sundas COMPUTER ARCHITECTURE. (CSC511)
  • 2. Outlines • Introduction • Programmed I/O • interrupt initiated I/O • Direct Memory Access • Comparison • References
  • 3. Introduction : • Binary information received from an external device is usually stored in memory for later processing. Information transferred from the central computer into an external device originates in the memory unit. • The CPU merely executes the I/O instructions and may accept the data temporarily, but the ultimate source or destination is the memory unit. • Data transfer between the central computer and I/O devices may be handled in a variety of modes. • Some modes use the CPU as an intermediate path; others transfer the data directly to and from the memory unit.
  • 4. Introduction Contd.. • Some modes use the CPU as an intermediate path; others transfer the data directly to and from the memory unit. • Data transfer to and from peripherals may be handled in one of three possible modes:  Programmed I/O  Interrupt-initiated I/O  Direct memory access (DMA)
  • 5. Programmed I/O :  These operations are a result of I/O instructions written in the computer program. Data transfer is initiated by an instruction in the program .  Usually the data transfer data between CPU register and peripheral has to be constantly monitored. Once a data transfer is initiated , the CPU is required to monitor the interface to see when a transfer can again be made. Application of Programmed I/O: Useful in small low speed computers. Used in systems that are dedicated to monitor a device continuously. Used in the data register. Used to check the status of the flag bit and branch.
  • 6. Programmed I/O : Fig 1.1 Programmed I/O
  • 7. Interrupt Initiated I/O :  This can be avoided by using an interrupt facility and special commands to inform the interface to issue an interrupt request signal when the data are available from the device. Meanwhile , The interfaces keeps monitoring The device.  When the interface determines that the device is ready for data transfer, it generates an interrupt request to the computer. SERVICES ROUTINES OF INTERRUPT INITIATED I/O :  Service routines of interrupt initiated I/O can be chosen in two ways.  vectored interrupt.  Non-vectored interrupt.
  • 8. Interrupt Initiated I/O : Fig 2.1 Interrupt Initiated I/O
  • 9. Direct Memory Access(DMA) :  The interface transfer data into and out of the memory unit through the memory bus. The CPU initiates the transfer of supplying the interface with the starting address and the number of words needed to be transferred and then proceed to execute other tasks . When the request is granted by the memory controller, the DMA transfer the data directly into memory. Application of DMA.  During DMA transfer, the CPU is idle and has no control of the memory buses. The buses can be disabled by using two special control signals.  Bus Request (BR)  Bus Grant(BG)
  • 10. Direct Memory Access(DMA) : Fig 3.1 Bus Signals for DMA
  • 11. Comparison: Programmed I/O Interrupt Initiated I/O Direct Memory Access Data transfer is initiated by the means of instructions stored in the computer program. The I/O transfer is initiated by the interrupt command issued to the CPU. Direct Memory Access (DMA) means CPU grants I/O module authority to read from or write to memory without involvement. The CPU stays in the loop to know if the device is ready for transfer and has to continuously monitor the peripheral device. There is no need for the CPU to stay in the loop as the interrupt command interrupts the CPU when the device is ready for data transfer. As CPU is not involved in any means this the fastest input and output mode. Table 1: comparison
  • 12. References URL References Geeks for Geeks https://www.geeksforgeeks.org/io-interface-interrupt-dma-mode Upscfever.com https://upscfever.com/upsc-fever/en/gatecse/en-gatecse-chp164.html