Draw and illustrate the block diagram of DMA controller, Computer Engineering

Draw and illustrate the block diagram of DMA controller. Also discuss the various modes in which DMAC works.

Direct memory access (DMA) is a process in that an external device takes over the control of system bus from CPU.DMA is for high-speed data transfer to/from mass storage peripherals, for example magnetic tape, hard disk drive, CD-ROM and sometimes video controllers. E.g. a hard disk may boasts a transfer rate of 5 M bytes per second, which implies 1 byte transmission every 200 ns. To make such data transfer via CPU is both unnecessary andundesirable.

Basic idea of DMA is to transfer blocks of data directly between peripherals andmemory. The data do not go through the microprocessor but data bus is occupied. 'Normal' transfer of one data byte takes up to 29 clock cycles. DMA transfer requires only 5 clock cycles.

 

2039_micro.png

Modes of operation include demand mode, block mode, single mode and cascade mode. Demand mode transfers data until an external EOP is input or until DREQ input becomes inactive. Single mode releases HOLD after each byte of data transferred. Block mode automatically transfers number of bytes indicated by count register for the channel. Cascade mode is used when more than one 8237 is present in a system.

Posted Date: 8/20/2013 2:55:39 AM | Location : United States







Related Discussions:- Draw and illustrate the block diagram of DMA controller, Assignment Help, Ask Question on Draw and illustrate the block diagram of DMA controller, Get Answer, Expert's Help, Draw and illustrate the block diagram of DMA controller Discussions

Write discussion on Draw and illustrate the block diagram of DMA controller
Your posts are moderated
Related Questions
Briefly explain the floating point representation with an example? The floating point representation has 3 fields 1.sign bit 2.siginificant bits 3.exponent For  exa

What is a multiple line field? A multiple line field is a special part of field which allows the user to enter multiple lines of data into it.

Five popular hashing functions are as follows:- Division Method Midsquare Method Folding Method Multiplicative method Digit Analysis

AI Applications Search is a crucial component of an AI system, and the search functions are performed over large quantities of difficult structured data using unstructured inpu

how does a ohms law c++ programming works

Explain the Features of Major scheduling algorithms. The Features of Major scheduling algorithms is given below: FCFS - i.e. First come first served scheduli

Construct a shift register from S-R flip-flops. Explain its working. Ans: S-R Flip-Flop Shift Register: Shift registers can be built through using SR flip-flops. Fig.(a)

Define the Process of dynamic modelling: Analyse applicability of actions Recognize object states Create dynamic model diagram Express every state in terms o

What is a table pool? A table pool (or pool) is used to join several logical tables in the ABAP/4 Dictionary.  The definition of a pool having of at least two key fields and a

Op code mnemonics: Instructions  (statements)  in  assembly  language  are  usually  very  simple,  unlike  those that in  high-level languages. Usually, an opcode is a symbol