SlideShare a Scribd company logo
Data transfer
Schemes
By,
Kaavya.b
Holy Cross College,Trichy 2
DMA
• CPU does not participate.
• Data are directly transferred from an
I/O to the memory.
• It is controlled by the I/O device or a
DMA controller.
• This scheme is employed when large
amount of data are to be transferred.
Merits and Uses
• It is a faster scheme.
• It is used to transfer data from
mass storage devices such as hard
disks,optical disks and also for
high speed printers.
Burst Mode
• The I/O device withdraws the
DMA request only after all the
data bytes have been transferred.
• A block of data is transferred.
• It is used in magnetic disks drive.
Cycle Stealing Technique
• A long block of data is transferred
by a sequence of DMA cycles.
• After transferring one byte or
several bytes the I/O device
withdraws DMA request.
• This method reduces interference
in CPU’s activities.
• Interference can be eliminated with an
interfacing ciruitry which can steal bus
cycle for DMA data transfer only when
the CPU is not using the system bus.
• I/O devices must have
1. registers to store memory
addresses & byte count.
2. electronic ciruitry to produce
control signals.
Programmed DTS
• This is controlled by the CPU.
• Data are transferred from an I/O device
to the memory through the CPU.
• The programs are executed by the CPU
when an I/O device is ready to transfer
data.
• This scheme is employed when small
amount of data are to be transferred.
Synchronous Data transfer
• Synchronous means “at the same
time”.
• The device which sends data and the
device which receives data are
synchronised with the same clock.
• CPU and the I/O devices must match
in speed.
• The status of the I/O device whether
it is ready or not is not examined
before data are transferred.
• But this technique is used only with
compatible memory devices.
• The I/O devices compatible with
microprocessors in speed are not
available.
Asynchronous Data Transfer
• Asynchronous means “at irregular intervals”.
• DT is not based on perdetermined timing
pattern.
• It is used when the speed of an I/O device
does not match the speed of the
microprocessor.
• The status of the I/O device is checked by the
microprocessor before the data are
transferred.
HANDSHAKING MODE:
• The microprocessor initiates the I/O
device to get ready .
• Then continously checks the status of the
I/O device till the I/O device becomes
ready to transfer data.
• When I/O device becomes ready, the
microprocessor sends instructions to
transfer data.
HANDSHAKING SIGNALS:
• The microprocessor issues an
initiating signal to the I/O device
to get ready.
• When I/O device becomes ready it
sends signals to the processor to
indicate that it is ready.
DEMERITS
•It is used for slow I/O
devices.
•The precious time of the
microprocessor is wasted
in waiting.
• The microprocessor sends a S/C to the A/D
converter.
• When the conversion is over the A/D
converter makes E/C high.
• The microprocessor goes on checking E/C till it
becomes high.
• When E/C becomes high, the microprocessor
issues instructions for data transfer.
• Eg: Keyboard interfaced to a microprocessor
through a port.
Interrupt Driven DT
• The microprocessor initiates an I/O
device to get ready and then it executes
its main program instead of remaining in
a program loop to check the status of the
I/O device.
• When the I/O device becomes ready to
transfer data, it sends a high signal to the
microprocessor through a special input
line called an interrupt line.
• On receiving an interrupt the microprocessor
completes the current instruction at hand and
then attends the I/O device.
• It saves the contents of the program counter
on the stack first and then takes up a
subroutine called ISS(interrupt service
subroutine)
• After completing the data transfer the
microprocessor returns to the main program
where it was interrupted.
Merits and Demerits
•Used for slow I/O devices.
•Efficient technique
•Precious time of the
microprocessor is not wasted
in waiting while an I/O device
is getting ready.
• The microprocessor sends S/C to the A/D
converter.
• After converting analog to digital signal
A/D converter makes an E/C high.
• The E/C signal is connected to an
interrupt line of the microprocessor.
• When interrupt line goes high,
microprocessor will transfer data from
the A/D converter.
Multiple Interrupts
One Device connected to each level ofinterrupt:
• When a device interrupts microprocessor, it
immediately knows which device has
interrupted.
• The processor automatically transfers its
program to a specific memory location that
has been assigned to the interrupt line.
• It executes ISS for the device which has
interrupted.
• Such an interrupt scheme is known as
vectored interrupt.

More Related Content

What's hot

Modulo n counter
Modulo n counterModulo n counter
Modulo n counter
Manoj Guha
 
8086 micro processor
8086 micro processor8086 micro processor
8086 micro processor
Poojith Chowdhary
 
Architecture of 8085 microprocessor
Architecture of 8085 microprocessorArchitecture of 8085 microprocessor
Architecture of 8085 microprocessor
AMAN SRIVASTAVA
 
8051 MICROCONTROLLER ARCHITECTURE.pptx
 8051 MICROCONTROLLER ARCHITECTURE.pptx 8051 MICROCONTROLLER ARCHITECTURE.pptx
8051 MICROCONTROLLER ARCHITECTURE.pptx
MemonaMemon1
 
8086 pin details
8086 pin details8086 pin details
8086 pin details
AJAL A J
 
8051 microcontroller and it’s interface
8051 microcontroller and it’s interface8051 microcontroller and it’s interface
8051 microcontroller and it’s interface
Abhishek Choksi
 
Pic microcontroller architecture
Pic microcontroller architecturePic microcontroller architecture
Pic microcontroller architecture
DominicHendry
 
8051 Microcontroller PPT's By Er. Swapnil Kaware
8051 Microcontroller PPT's By Er. Swapnil Kaware8051 Microcontroller PPT's By Er. Swapnil Kaware
8051 Microcontroller PPT's By Er. Swapnil KawareProf. Swapnil V. Kaware
 
Overview of Shift register and applications
Overview of Shift register and applicationsOverview of Shift register and applications
Overview of Shift register and applications
Karthik Kumar
 
Shift Registers
Shift RegistersShift Registers
Shift Registers
Abhilash Nair
 
8257 DMA Controller
8257 DMA Controller8257 DMA Controller
8257 DMA Controller
ShivamSood22
 
8051 architecture
8051 architecture8051 architecture
8051 architecture
sb108ec
 
Addressing modes of 8051
Addressing modes of 8051Addressing modes of 8051
Addressing modes of 8051
SARITHA REDDY
 
8086 microprocessor-architecture
8086 microprocessor-architecture8086 microprocessor-architecture
8086 microprocessor-architecture
prasadpawaskar
 
Addressing modes of 8086
Addressing modes of 8086Addressing modes of 8086
Addressing modes of 8086
Dr. AISHWARYA N
 
Dma transfer
Dma transferDma transfer
Dma transfergmnithya
 
I/O port programming in 8051
I/O port programming in 8051I/O port programming in 8051
I/O port programming in 8051
ssuser3a47cb
 
8237 dma controller
8237 dma controller8237 dma controller
8237 dma controllerTech_MX
 
ADC Interfacing with pic Microcontrollert
ADC Interfacing with pic MicrocontrollertADC Interfacing with pic Microcontrollert
ADC Interfacing with pic Microcontrollert
leapshare007
 
Presentation on 8086 Microprocessor
Presentation  on   8086 MicroprocessorPresentation  on   8086 Microprocessor
Presentation on 8086 Microprocessor
Nahian Ahmed
 

What's hot (20)

Modulo n counter
Modulo n counterModulo n counter
Modulo n counter
 
8086 micro processor
8086 micro processor8086 micro processor
8086 micro processor
 
Architecture of 8085 microprocessor
Architecture of 8085 microprocessorArchitecture of 8085 microprocessor
Architecture of 8085 microprocessor
 
8051 MICROCONTROLLER ARCHITECTURE.pptx
 8051 MICROCONTROLLER ARCHITECTURE.pptx 8051 MICROCONTROLLER ARCHITECTURE.pptx
8051 MICROCONTROLLER ARCHITECTURE.pptx
 
8086 pin details
8086 pin details8086 pin details
8086 pin details
 
8051 microcontroller and it’s interface
8051 microcontroller and it’s interface8051 microcontroller and it’s interface
8051 microcontroller and it’s interface
 
Pic microcontroller architecture
Pic microcontroller architecturePic microcontroller architecture
Pic microcontroller architecture
 
8051 Microcontroller PPT's By Er. Swapnil Kaware
8051 Microcontroller PPT's By Er. Swapnil Kaware8051 Microcontroller PPT's By Er. Swapnil Kaware
8051 Microcontroller PPT's By Er. Swapnil Kaware
 
Overview of Shift register and applications
Overview of Shift register and applicationsOverview of Shift register and applications
Overview of Shift register and applications
 
Shift Registers
Shift RegistersShift Registers
Shift Registers
 
8257 DMA Controller
8257 DMA Controller8257 DMA Controller
8257 DMA Controller
 
8051 architecture
8051 architecture8051 architecture
8051 architecture
 
Addressing modes of 8051
Addressing modes of 8051Addressing modes of 8051
Addressing modes of 8051
 
8086 microprocessor-architecture
8086 microprocessor-architecture8086 microprocessor-architecture
8086 microprocessor-architecture
 
Addressing modes of 8086
Addressing modes of 8086Addressing modes of 8086
Addressing modes of 8086
 
Dma transfer
Dma transferDma transfer
Dma transfer
 
I/O port programming in 8051
I/O port programming in 8051I/O port programming in 8051
I/O port programming in 8051
 
8237 dma controller
8237 dma controller8237 dma controller
8237 dma controller
 
ADC Interfacing with pic Microcontrollert
ADC Interfacing with pic MicrocontrollertADC Interfacing with pic Microcontrollert
ADC Interfacing with pic Microcontrollert
 
Presentation on 8086 Microprocessor
Presentation  on   8086 MicroprocessorPresentation  on   8086 Microprocessor
Presentation on 8086 Microprocessor
 

Similar to Data transfer scheme

A transfer from I/O device to memory requires the execution of several instru...
A transfer from I/O device to memory requires the execution of several instru...A transfer from I/O device to memory requires the execution of several instru...
A transfer from I/O device to memory requires the execution of several instru...
rsaravanakumar13
 
Input Output Operations
Input Output OperationsInput Output Operations
Input Output Operationskdisthere
 
Lecture 9.pptx
Lecture 9.pptxLecture 9.pptx
Lecture 9.pptx
JavedIqbal549896
 
Unit-4 (IO Interface).pptx
Unit-4 (IO Interface).pptxUnit-4 (IO Interface).pptx
Unit-4 (IO Interface).pptx
Medicaps University
 
computer system structure
computer system structurecomputer system structure
computer system structure
HAMZA AHMED
 
I/O Organization
I/O OrganizationI/O Organization
I/O Organization
Dhaval Bagal
 
Input output organization (1).pptx
Input output organization (1).pptxInput output organization (1).pptx
Input output organization (1).pptx
RamanRay105
 
Modes of transfer - Computer Organization & Architecture - Nithiyapriya Pasav...
Modes of transfer - Computer Organization & Architecture - Nithiyapriya Pasav...Modes of transfer - Computer Organization & Architecture - Nithiyapriya Pasav...
Modes of transfer - Computer Organization & Architecture - Nithiyapriya Pasav...
priya Nithya
 
ghgfjfhgdjfdhgdhgfdgfdhgdhgfdhgzeka.pptx
ghgfjfhgdjfdhgdhgfdgfdhgdhgfdhgzeka.pptxghgfjfhgdjfdhgdhgfdgfdhgdhgfdhgzeka.pptx
ghgfjfhgdjfdhgdhgfdgfdhgdhgfdhgzeka.pptx
EliasPetros
 
Input - output organzation
Input - output organzationInput - output organzation
Input - output organzation
daxesh chauhan
 
Ca 2 note mano
Ca 2 note manoCa 2 note mano
Ca 2 note mano
Manoharan Ragavan
 
Io techniques & its types
Io techniques & its typesIo techniques & its types
Io techniques & its typesNehal Naik
 
Data transfer techniques 8085
Data transfer techniques 8085Data transfer techniques 8085
Data transfer techniques 8085
ShivamSood22
 
I/O systems chapter 12 OS
I/O systems chapter 12 OS I/O systems chapter 12 OS
I/O systems chapter 12 OS
ssuser45ae56
 
I/o management and disk scheduling .pptx
I/o management and disk scheduling .pptxI/o management and disk scheduling .pptx
I/o management and disk scheduling .pptx
webip34973
 
L3-L4 Data Transfer - 8085.pptx
L3-L4 Data Transfer - 8085.pptxL3-L4 Data Transfer - 8085.pptx
L3-L4 Data Transfer - 8085.pptx
Motaleb Hossen Manik
 
Unit v: Device Management
Unit v: Device ManagementUnit v: Device Management
Unit v: Device Management
Arnav Chowdhury
 
Data transfer scheme
Data transfer schemeData transfer scheme
Data transfer scheme
rockymani
 
comporgppt.pptx
comporgppt.pptxcomporgppt.pptx
comporgppt.pptx
FaisalAijaz1
 

Similar to Data transfer scheme (20)

A transfer from I/O device to memory requires the execution of several instru...
A transfer from I/O device to memory requires the execution of several instru...A transfer from I/O device to memory requires the execution of several instru...
A transfer from I/O device to memory requires the execution of several instru...
 
Input Output Operations
Input Output OperationsInput Output Operations
Input Output Operations
 
Lecture 9.pptx
Lecture 9.pptxLecture 9.pptx
Lecture 9.pptx
 
Unit-4 (IO Interface).pptx
Unit-4 (IO Interface).pptxUnit-4 (IO Interface).pptx
Unit-4 (IO Interface).pptx
 
computer system structure
computer system structurecomputer system structure
computer system structure
 
I/O Organization
I/O OrganizationI/O Organization
I/O Organization
 
Input output organization (1).pptx
Input output organization (1).pptxInput output organization (1).pptx
Input output organization (1).pptx
 
Modes of transfer - Computer Organization & Architecture - Nithiyapriya Pasav...
Modes of transfer - Computer Organization & Architecture - Nithiyapriya Pasav...Modes of transfer - Computer Organization & Architecture - Nithiyapriya Pasav...
Modes of transfer - Computer Organization & Architecture - Nithiyapriya Pasav...
 
ghgfjfhgdjfdhgdhgfdgfdhgdhgfdhgzeka.pptx
ghgfjfhgdjfdhgdhgfdgfdhgdhgfdhgzeka.pptxghgfjfhgdjfdhgdhgfdgfdhgdhgfdhgzeka.pptx
ghgfjfhgdjfdhgdhgfdgfdhgdhgfdhgzeka.pptx
 
Input - output organzation
Input - output organzationInput - output organzation
Input - output organzation
 
Cao u1
Cao u1Cao u1
Cao u1
 
Ca 2 note mano
Ca 2 note manoCa 2 note mano
Ca 2 note mano
 
Io techniques & its types
Io techniques & its typesIo techniques & its types
Io techniques & its types
 
Data transfer techniques 8085
Data transfer techniques 8085Data transfer techniques 8085
Data transfer techniques 8085
 
I/O systems chapter 12 OS
I/O systems chapter 12 OS I/O systems chapter 12 OS
I/O systems chapter 12 OS
 
I/o management and disk scheduling .pptx
I/o management and disk scheduling .pptxI/o management and disk scheduling .pptx
I/o management and disk scheduling .pptx
 
L3-L4 Data Transfer - 8085.pptx
L3-L4 Data Transfer - 8085.pptxL3-L4 Data Transfer - 8085.pptx
L3-L4 Data Transfer - 8085.pptx
 
Unit v: Device Management
Unit v: Device ManagementUnit v: Device Management
Unit v: Device Management
 
Data transfer scheme
Data transfer schemeData transfer scheme
Data transfer scheme
 
comporgppt.pptx
comporgppt.pptxcomporgppt.pptx
comporgppt.pptx
 

More from kaavyabalachandran

Perovskite Solar cells
Perovskite Solar cells Perovskite Solar cells
Perovskite Solar cells
kaavyabalachandran
 
Dye sensitized solar cells
Dye sensitized solar cellsDye sensitized solar cells
Dye sensitized solar cells
kaavyabalachandran
 
Q switching for giant pulses in laser
Q switching for giant pulses in laserQ switching for giant pulses in laser
Q switching for giant pulses in laser
kaavyabalachandran
 
General adaptation syndrome (syle model)
General adaptation syndrome (syle model)General adaptation syndrome (syle model)
General adaptation syndrome (syle model)
kaavyabalachandran
 
Applications of raman spectroscopy
Applications of raman spectroscopyApplications of raman spectroscopy
Applications of raman spectroscopy
kaavyabalachandran
 
Research proposal
Research proposalResearch proposal
Research proposal
kaavyabalachandran
 
Static & dynamic characteristics of instruments
Static & dynamic characteristics of instrumentsStatic & dynamic characteristics of instruments
Static & dynamic characteristics of instruments
kaavyabalachandran
 
Cleanliness
CleanlinessCleanliness
Cleanliness
kaavyabalachandran
 
Raman effect
Raman effectRaman effect
Raman effect
kaavyabalachandran
 
Digital to analog conversion
Digital to analog                    conversionDigital to analog                    conversion
Digital to analog conversion
kaavyabalachandran
 
Generation of fm
Generation of fmGeneration of fm
Generation of fm
kaavyabalachandran
 
Dr.a.p.j.abdul kalam
Dr.a.p.j.abdul kalamDr.a.p.j.abdul kalam
Dr.a.p.j.abdul kalam
kaavyabalachandran
 
Bio medical applications of nanomaterials
Bio medical applications of nanomaterialsBio medical applications of nanomaterials
Bio medical applications of nanomaterials
kaavyabalachandran
 

More from kaavyabalachandran (13)

Perovskite Solar cells
Perovskite Solar cells Perovskite Solar cells
Perovskite Solar cells
 
Dye sensitized solar cells
Dye sensitized solar cellsDye sensitized solar cells
Dye sensitized solar cells
 
Q switching for giant pulses in laser
Q switching for giant pulses in laserQ switching for giant pulses in laser
Q switching for giant pulses in laser
 
General adaptation syndrome (syle model)
General adaptation syndrome (syle model)General adaptation syndrome (syle model)
General adaptation syndrome (syle model)
 
Applications of raman spectroscopy
Applications of raman spectroscopyApplications of raman spectroscopy
Applications of raman spectroscopy
 
Research proposal
Research proposalResearch proposal
Research proposal
 
Static & dynamic characteristics of instruments
Static & dynamic characteristics of instrumentsStatic & dynamic characteristics of instruments
Static & dynamic characteristics of instruments
 
Cleanliness
CleanlinessCleanliness
Cleanliness
 
Raman effect
Raman effectRaman effect
Raman effect
 
Digital to analog conversion
Digital to analog                    conversionDigital to analog                    conversion
Digital to analog conversion
 
Generation of fm
Generation of fmGeneration of fm
Generation of fm
 
Dr.a.p.j.abdul kalam
Dr.a.p.j.abdul kalamDr.a.p.j.abdul kalam
Dr.a.p.j.abdul kalam
 
Bio medical applications of nanomaterials
Bio medical applications of nanomaterialsBio medical applications of nanomaterials
Bio medical applications of nanomaterials
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 

Data transfer scheme

  • 2.
  • 3. DMA • CPU does not participate. • Data are directly transferred from an I/O to the memory. • It is controlled by the I/O device or a DMA controller. • This scheme is employed when large amount of data are to be transferred.
  • 4.
  • 5. Merits and Uses • It is a faster scheme. • It is used to transfer data from mass storage devices such as hard disks,optical disks and also for high speed printers.
  • 6. Burst Mode • The I/O device withdraws the DMA request only after all the data bytes have been transferred. • A block of data is transferred. • It is used in magnetic disks drive.
  • 7. Cycle Stealing Technique • A long block of data is transferred by a sequence of DMA cycles. • After transferring one byte or several bytes the I/O device withdraws DMA request. • This method reduces interference in CPU’s activities.
  • 8. • Interference can be eliminated with an interfacing ciruitry which can steal bus cycle for DMA data transfer only when the CPU is not using the system bus. • I/O devices must have 1. registers to store memory addresses & byte count. 2. electronic ciruitry to produce control signals.
  • 9. Programmed DTS • This is controlled by the CPU. • Data are transferred from an I/O device to the memory through the CPU. • The programs are executed by the CPU when an I/O device is ready to transfer data. • This scheme is employed when small amount of data are to be transferred.
  • 10. Synchronous Data transfer • Synchronous means “at the same time”. • The device which sends data and the device which receives data are synchronised with the same clock. • CPU and the I/O devices must match in speed.
  • 11.
  • 12. • The status of the I/O device whether it is ready or not is not examined before data are transferred. • But this technique is used only with compatible memory devices. • The I/O devices compatible with microprocessors in speed are not available.
  • 13. Asynchronous Data Transfer • Asynchronous means “at irregular intervals”. • DT is not based on perdetermined timing pattern. • It is used when the speed of an I/O device does not match the speed of the microprocessor. • The status of the I/O device is checked by the microprocessor before the data are transferred.
  • 14. HANDSHAKING MODE: • The microprocessor initiates the I/O device to get ready . • Then continously checks the status of the I/O device till the I/O device becomes ready to transfer data. • When I/O device becomes ready, the microprocessor sends instructions to transfer data.
  • 15. HANDSHAKING SIGNALS: • The microprocessor issues an initiating signal to the I/O device to get ready. • When I/O device becomes ready it sends signals to the processor to indicate that it is ready.
  • 16.
  • 17. DEMERITS •It is used for slow I/O devices. •The precious time of the microprocessor is wasted in waiting.
  • 18.
  • 19. • The microprocessor sends a S/C to the A/D converter. • When the conversion is over the A/D converter makes E/C high. • The microprocessor goes on checking E/C till it becomes high. • When E/C becomes high, the microprocessor issues instructions for data transfer. • Eg: Keyboard interfaced to a microprocessor through a port.
  • 20. Interrupt Driven DT • The microprocessor initiates an I/O device to get ready and then it executes its main program instead of remaining in a program loop to check the status of the I/O device. • When the I/O device becomes ready to transfer data, it sends a high signal to the microprocessor through a special input line called an interrupt line.
  • 21. • On receiving an interrupt the microprocessor completes the current instruction at hand and then attends the I/O device. • It saves the contents of the program counter on the stack first and then takes up a subroutine called ISS(interrupt service subroutine) • After completing the data transfer the microprocessor returns to the main program where it was interrupted.
  • 22. Merits and Demerits •Used for slow I/O devices. •Efficient technique •Precious time of the microprocessor is not wasted in waiting while an I/O device is getting ready.
  • 23.
  • 24. • The microprocessor sends S/C to the A/D converter. • After converting analog to digital signal A/D converter makes an E/C high. • The E/C signal is connected to an interrupt line of the microprocessor. • When interrupt line goes high, microprocessor will transfer data from the A/D converter.
  • 26. One Device connected to each level ofinterrupt: • When a device interrupts microprocessor, it immediately knows which device has interrupted. • The processor automatically transfers its program to a specific memory location that has been assigned to the interrupt line. • It executes ISS for the device which has interrupted. • Such an interrupt scheme is known as vectored interrupt.