SlideShare a Scribd company logo
MODES OF TRANSFERS
IN
COMPUTER
OVERVIEW
Introduction
Different modes of data transfer
o Programmed I/O
o Interrupt initiated I/O
o Direct memory access (DMA)
 Binary information received from external device usually stored in memory
 Information transferred from the central computer into an external device
flows from the memory
 Data transfer between the central computer and input and output devices
may be handled in a variety of modes
Introduction to data transfers
DIFFERENT MODES OF DATATRANSFER
 Programmed I/O
 Interrupt initiated I/O
 Direct memory access (DMA)
PROGRAMMED I/O
 Results of I/O instructions written in the computer program
 Data transfer initiated by an instruction in the program
 CPU register Peripheral Device
 CPU Memory
 The peripheral has to be constantly monitored.
 Once a data transfer is initiated, the CPU is required to monitor the
interface to see when a transfer can again be made.
Data Transfer
Data Transfer
APPLICATIONS OF PROGRAMMED
I/O METHOD
 In small low speed computers
 In systems that are dedicated to monitor a device continuously
 In the data register
 To check the status of the flag bit and branch
INTERRUPT INITIATED I/O
 Can be avoided by using an interrupt facility and special commands
to inform the interface to issue an interrupt request signal when the
data are available from the device
 CPU can proceed to execute another program.
 Interfaces monitor the device- when interface determines device is
ready for data transfer, it generates an interrupt request to computer
DIRECT MEMORYACCESS (DMA)
 Data transfer by interface into and out of the memory unit via memory bus
 CPU initiates transfer of supplying the interface with the starting address and
the number of words needed to be transferred and then proceed to execute
other tasks
 When request is granted by memory controller, DMA transfers the data directly
into memory.
 CPU delays its memory access operation to allow the direct memory I/O
transfer
DIRECT MEMORYACCESS (DMA)
 Idle CPU
 No control of the memory buses
 The buses can be disabled by using two special control signals-
o Bus request (BR)
o Bus Grant (BG)
CONCLUSION
Data transfers to-and-fro the memory take various digital
forms executed via instruction sets . . .
THANK
YOU 

More Related Content

What's hot

Direct memory access (dma)
Direct memory access (dma)Direct memory access (dma)
Direct memory access (dma)
Zubair Khalid
 
Memory Organization
Memory OrganizationMemory Organization
Memory Organization
Kamal Acharya
 
Addressing sequencing
Addressing sequencingAddressing sequencing
Addressing sequencing
rajshreemuthiah
 
instruction cycle ppt
instruction cycle pptinstruction cycle ppt
instruction cycle pptsheetal singh
 
Introduction to Bus | Address, Data, Control Bus
Introduction to Bus | Address, Data, Control BusIntroduction to Bus | Address, Data, Control Bus
Introduction to Bus | Address, Data, Control Bus
Hem Pokhrel
 
Asynchronous data transfer
Asynchronous data transferAsynchronous data transfer
Asynchronous data transfer
priya Nithya
 
Memory mapped I/O and Isolated I/O
Memory mapped I/O and Isolated I/OMemory mapped I/O and Isolated I/O
Memory mapped I/O and Isolated I/O
Bharat Kharbanda
 
General register organization (computer organization)
General register organization  (computer organization)General register organization  (computer organization)
General register organization (computer organization)
rishi ram khanal
 
Interrupt
InterruptInterrupt
Interrupt
Siddique Ibrahim
 
Instruction format
Instruction formatInstruction format
Instruction format
Sanjeev Patel
 
Direct Memory Access ppt
Direct Memory Access pptDirect Memory Access ppt
Interrupts
InterruptsInterrupts
Interrupts
Urwa Shanza
 
Direct memory access
Direct memory accessDirect memory access
Direct memory access
Roshan kumar sahu
 
INTERCONNECTION STRUCTURE
INTERCONNECTION STRUCTUREINTERCONNECTION STRUCTURE
INTERCONNECTION STRUCTURE
VENNILAV6
 
Computer architecture pipelining
Computer architecture pipeliningComputer architecture pipelining
Computer architecture pipelining
Mazin Alwaaly
 
Memory Hierarchy
Memory HierarchyMemory Hierarchy
Memory Hierarchy
chauhankapil
 
Microprogrammed Control Unit
Microprogrammed Control UnitMicroprogrammed Control Unit
Microprogrammed Control Unit
PreethiSureshkumar1
 
IO Techniques in Computer Organization
IO Techniques in Computer OrganizationIO Techniques in Computer Organization
IO Techniques in Computer Organization
Om Prakash
 

What's hot (20)

Direct memory access (dma)
Direct memory access (dma)Direct memory access (dma)
Direct memory access (dma)
 
Memory Organization
Memory OrganizationMemory Organization
Memory Organization
 
Addressing sequencing
Addressing sequencingAddressing sequencing
Addressing sequencing
 
instruction cycle ppt
instruction cycle pptinstruction cycle ppt
instruction cycle ppt
 
Introduction to Bus | Address, Data, Control Bus
Introduction to Bus | Address, Data, Control BusIntroduction to Bus | Address, Data, Control Bus
Introduction to Bus | Address, Data, Control Bus
 
Asynchronous data transfer
Asynchronous data transferAsynchronous data transfer
Asynchronous data transfer
 
Memory mapped I/O and Isolated I/O
Memory mapped I/O and Isolated I/OMemory mapped I/O and Isolated I/O
Memory mapped I/O and Isolated I/O
 
General register organization (computer organization)
General register organization  (computer organization)General register organization  (computer organization)
General register organization (computer organization)
 
Interrupt
InterruptInterrupt
Interrupt
 
Instruction format
Instruction formatInstruction format
Instruction format
 
Direct Memory Access ppt
Direct Memory Access pptDirect Memory Access ppt
Direct Memory Access ppt
 
Interrupts
InterruptsInterrupts
Interrupts
 
Direct memory access
Direct memory accessDirect memory access
Direct memory access
 
Dma
DmaDma
Dma
 
INTERCONNECTION STRUCTURE
INTERCONNECTION STRUCTUREINTERCONNECTION STRUCTURE
INTERCONNECTION STRUCTURE
 
Computer architecture pipelining
Computer architecture pipeliningComputer architecture pipelining
Computer architecture pipelining
 
Memory Hierarchy
Memory HierarchyMemory Hierarchy
Memory Hierarchy
 
Microprogrammed Control Unit
Microprogrammed Control UnitMicroprogrammed Control Unit
Microprogrammed Control Unit
 
IO Techniques in Computer Organization
IO Techniques in Computer OrganizationIO Techniques in Computer Organization
IO Techniques in Computer Organization
 
DMA and DMA controller
DMA and DMA controllerDMA and DMA controller
DMA and DMA controller
 

Similar to Modes of transfer

Modes of data transfer.computer architecture.
Modes of data transfer.computer architecture. Modes of data transfer.computer architecture.
Modes of data transfer.computer architecture.
pratikkadam78
 
ch -6 IO.pptx
ch -6 IO.pptxch -6 IO.pptx
ch -6 IO.pptx
GadisaKanchora1
 
Transfer Modes | Computer Science
Transfer Modes | Computer ScienceTransfer Modes | Computer Science
Transfer Modes | Computer Science
Transweb Global Inc
 
discuss the drawbacks of programmed and interrupt driven io and des.pdf
discuss the drawbacks of programmed and interrupt driven io and des.pdfdiscuss the drawbacks of programmed and interrupt driven io and des.pdf
discuss the drawbacks of programmed and interrupt driven io and des.pdf
info998421
 
I/O Management
I/O ManagementI/O Management
I/O Management
Keyur Vadodariya
 
Aryan_camemoryhierchyandmanagements.pptx
Aryan_camemoryhierchyandmanagements.pptxAryan_camemoryhierchyandmanagements.pptx
Aryan_camemoryhierchyandmanagements.pptx
freevector13
 
inputoutput_organization__Morrismano.ppt
inputoutput_organization__Morrismano.pptinputoutput_organization__Morrismano.ppt
inputoutput_organization__Morrismano.ppt
SeliMohapatra1
 
Chapter 4
Chapter 4Chapter 4
Data transfer system
Data transfer systemData transfer system
Data transfer system
Sajan Sahu
 
inputoutputorganization-140722085906-phpapp01.pptx
inputoutputorganization-140722085906-phpapp01.pptxinputoutputorganization-140722085906-phpapp01.pptx
inputoutputorganization-140722085906-phpapp01.pptx
AshokRachapalli1
 
Chapter 5 IO Unit.pptx we are electrical
Chapter 5 IO Unit.pptx we are electricalChapter 5 IO Unit.pptx we are electrical
Chapter 5 IO Unit.pptx we are electrical
bayisabayecha51
 
MODES OF TRANSFER.pptx
MODES OF TRANSFER.pptxMODES OF TRANSFER.pptx
MODES OF TRANSFER.pptx
22X047SHRISANJAYM
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
AnisZahirahAzman
 
Input output in computer Orgranization and architecture
Input output in computer Orgranization and architectureInput output in computer Orgranization and architecture
Input output in computer Orgranization and architecture
vikram patel
 
RIO DE JENERIO.pptxUIYYGUGUYUYGYGUYGUYGUYUYGUYGUYGUYGYUYG87H3IH8IU34THTGYGUYG...
RIO DE JENERIO.pptxUIYYGUGUYUYGYGUYGUYGUYUYGUYGUYGUYGYUYG87H3IH8IU34THTGYGUYG...RIO DE JENERIO.pptxUIYYGUGUYUYGYGUYGUYGUYUYGUYGUYGUYGYUYG87H3IH8IU34THTGYGUYG...
RIO DE JENERIO.pptxUIYYGUGUYUYGYGUYGUYGUYUYGUYGUYGUYGYUYG87H3IH8IU34THTGYGUYG...
Kashinathvpillai
 
fathima.pptxjhvjhvjhvjhvhvjhchvhvjvjhvjhj
fathima.pptxjhvjhvjhvjhvhvjhchvhvjvjhvjhjfathima.pptxjhvjhvjhvjhvhvjhchvhvjvjhvjhj
fathima.pptxjhvjhvjhvjhvhvjhchvhvjvjhvjhj
Kashinathvpillai
 
coadma-150401131446-conversion-gate01.pptx
coadma-150401131446-conversion-gate01.pptxcoadma-150401131446-conversion-gate01.pptx
coadma-150401131446-conversion-gate01.pptx
Kashinathvpillai
 

Similar to Modes of transfer (20)

Modes of data transfer.computer architecture.
Modes of data transfer.computer architecture. Modes of data transfer.computer architecture.
Modes of data transfer.computer architecture.
 
ch -6 IO.pptx
ch -6 IO.pptxch -6 IO.pptx
ch -6 IO.pptx
 
Transfer Modes | Computer Science
Transfer Modes | Computer ScienceTransfer Modes | Computer Science
Transfer Modes | Computer Science
 
Unit3 input
Unit3 inputUnit3 input
Unit3 input
 
discuss the drawbacks of programmed and interrupt driven io and des.pdf
discuss the drawbacks of programmed and interrupt driven io and des.pdfdiscuss the drawbacks of programmed and interrupt driven io and des.pdf
discuss the drawbacks of programmed and interrupt driven io and des.pdf
 
I/O Management
I/O ManagementI/O Management
I/O Management
 
DMA presentation [By- Digvijay]
DMA presentation [By- Digvijay]DMA presentation [By- Digvijay]
DMA presentation [By- Digvijay]
 
Aryan_camemoryhierchyandmanagements.pptx
Aryan_camemoryhierchyandmanagements.pptxAryan_camemoryhierchyandmanagements.pptx
Aryan_camemoryhierchyandmanagements.pptx
 
inputoutput_organization__Morrismano.ppt
inputoutput_organization__Morrismano.pptinputoutput_organization__Morrismano.ppt
inputoutput_organization__Morrismano.ppt
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Data transfer system
Data transfer systemData transfer system
Data transfer system
 
ppppptttt.pdf
ppppptttt.pdfppppptttt.pdf
ppppptttt.pdf
 
inputoutputorganization-140722085906-phpapp01.pptx
inputoutputorganization-140722085906-phpapp01.pptxinputoutputorganization-140722085906-phpapp01.pptx
inputoutputorganization-140722085906-phpapp01.pptx
 
Chapter 5 IO Unit.pptx we are electrical
Chapter 5 IO Unit.pptx we are electricalChapter 5 IO Unit.pptx we are electrical
Chapter 5 IO Unit.pptx we are electrical
 
MODES OF TRANSFER.pptx
MODES OF TRANSFER.pptxMODES OF TRANSFER.pptx
MODES OF TRANSFER.pptx
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
 
Input output in computer Orgranization and architecture
Input output in computer Orgranization and architectureInput output in computer Orgranization and architecture
Input output in computer Orgranization and architecture
 
RIO DE JENERIO.pptxUIYYGUGUYUYGYGUYGUYGUYUYGUYGUYGUYGYUYG87H3IH8IU34THTGYGUYG...
RIO DE JENERIO.pptxUIYYGUGUYUYGYGUYGUYGUYUYGUYGUYGUYGYUYG87H3IH8IU34THTGYGUYG...RIO DE JENERIO.pptxUIYYGUGUYUYGYGUYGUYGUYUYGUYGUYGUYGYUYG87H3IH8IU34THTGYGUYG...
RIO DE JENERIO.pptxUIYYGUGUYUYGYGUYGUYGUYUYGUYGUYGUYGYUYG87H3IH8IU34THTGYGUYG...
 
fathima.pptxjhvjhvjhvjhvhvjhchvhvjvjhvjhj
fathima.pptxjhvjhvjhvjhvhvjhchvhvjvjhvjhjfathima.pptxjhvjhvjhvjhvhvjhchvhvjvjhvjhj
fathima.pptxjhvjhvjhvjhvhvjhchvhvjvjhvjhj
 
coadma-150401131446-conversion-gate01.pptx
coadma-150401131446-conversion-gate01.pptxcoadma-150401131446-conversion-gate01.pptx
coadma-150401131446-conversion-gate01.pptx
 

More from Andhra University

System development life cycle models
System development life cycle modelsSystem development life cycle models
System development life cycle models
Andhra University
 
Software testing
Software testingSoftware testing
Software testing
Andhra University
 
Software requirement specification
Software requirement specificationSoftware requirement specification
Software requirement specification
Andhra University
 
Software management
Software managementSoftware management
Software management
Andhra University
 
Packages and interfaces
Packages and interfacesPackages and interfaces
Packages and interfaces
Andhra University
 
Flip flops and registers
Flip flops and registersFlip flops and registers
Flip flops and registers
Andhra University
 
Error managing and exception handling in java
Error managing and exception handling in javaError managing and exception handling in java
Error managing and exception handling in java
Andhra University
 
Computer instruction set
Computer instruction setComputer instruction set
Computer instruction set
Andhra University
 

More from Andhra University (9)

System development life cycle models
System development life cycle modelsSystem development life cycle models
System development life cycle models
 
Software testing
Software testingSoftware testing
Software testing
 
Software requirement specification
Software requirement specificationSoftware requirement specification
Software requirement specification
 
Software management
Software managementSoftware management
Software management
 
Packages and interfaces
Packages and interfacesPackages and interfaces
Packages and interfaces
 
Flip flops and registers
Flip flops and registersFlip flops and registers
Flip flops and registers
 
Error managing and exception handling in java
Error managing and exception handling in javaError managing and exception handling in java
Error managing and exception handling in java
 
Computer instruction set
Computer instruction setComputer instruction set
Computer instruction set
 
Applet programming
Applet programming Applet programming
Applet programming
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 

Modes of transfer

  • 2. OVERVIEW Introduction Different modes of data transfer o Programmed I/O o Interrupt initiated I/O o Direct memory access (DMA)
  • 3.  Binary information received from external device usually stored in memory  Information transferred from the central computer into an external device flows from the memory  Data transfer between the central computer and input and output devices may be handled in a variety of modes Introduction to data transfers
  • 4. DIFFERENT MODES OF DATATRANSFER  Programmed I/O  Interrupt initiated I/O  Direct memory access (DMA)
  • 5. PROGRAMMED I/O  Results of I/O instructions written in the computer program  Data transfer initiated by an instruction in the program  CPU register Peripheral Device  CPU Memory  The peripheral has to be constantly monitored.  Once a data transfer is initiated, the CPU is required to monitor the interface to see when a transfer can again be made. Data Transfer Data Transfer
  • 6. APPLICATIONS OF PROGRAMMED I/O METHOD  In small low speed computers  In systems that are dedicated to monitor a device continuously  In the data register  To check the status of the flag bit and branch
  • 7. INTERRUPT INITIATED I/O  Can be avoided by using an interrupt facility and special commands to inform the interface to issue an interrupt request signal when the data are available from the device  CPU can proceed to execute another program.  Interfaces monitor the device- when interface determines device is ready for data transfer, it generates an interrupt request to computer
  • 8. DIRECT MEMORYACCESS (DMA)  Data transfer by interface into and out of the memory unit via memory bus  CPU initiates transfer of supplying the interface with the starting address and the number of words needed to be transferred and then proceed to execute other tasks  When request is granted by memory controller, DMA transfers the data directly into memory.  CPU delays its memory access operation to allow the direct memory I/O transfer
  • 9. DIRECT MEMORYACCESS (DMA)  Idle CPU  No control of the memory buses  The buses can be disabled by using two special control signals- o Bus request (BR) o Bus Grant (BG)
  • 10. CONCLUSION Data transfers to-and-fro the memory take various digital forms executed via instruction sets . . .