Input output techniques - computer architecture, Computer Engineering

Input Output Techniques:

o   Interrupt driven

o   Direct Memory Access (DMA)

o   Programmed

Programmed I/O

  •   CPU has control over I/O directly
  •   Read/write commands
  •   Sensing status
  •   Transferring data
  •   Wastes CPU time
  •   CPU waits for I/O module to finish operation
  •   I/O module performs operation
  •   I/O module sets status bits
  •   CPU requests I/O operation
  •   CPU checks status bits periodically
  •   I/O module doesn't inform CPU directly
  •   I/O module does not interrupt CPU
  •   Under programmed I/O data transfer is similar memory access (CPU viewpoint)
  •   Each device given unique identifier
  •   CPU may wait or come back later
  •   CPU commands have identifier (address)

I/O Mapping

  •   Large selection of the memory access commands available
  •   Memory mapped I/O

o   memory and Devices share an address space

o   I/O looks like memory read/write

o   No special commands for I/O

  •   Restricted set
  •   Isolated I/O

o   Separate address spaces

o   Need I/O or memory select lines

o   Special commands for I/O

 

Posted Date: 10/13/2012 7:08:26 AM | Location : United States







Related Discussions:- Input output techniques - computer architecture, Assignment Help, Ask Question on Input output techniques - computer architecture, Get Answer, Expert's Help, Input output techniques - computer architecture Discussions

Write discussion on Input output techniques - computer architecture
Your posts are moderated
Related Questions
Explain the significance of init() and destroy( ) methods of an applet? Also explain two ways of invoking an applet. The init( ) method is utilized for fundamental initializati

With relevant logic diagram and truth table explain the working of a two input EX-OR gate. Ans. 2-Input EX-OR Gate: An EX-OR or Exclusive gate recognizes words that have an od

What is Fork Clk gets its value after 1 time unit, reset after 10 time units, enable after 5 time units, data after 3 time units. All the statements are executed in parallel.

What is the most common biometrics? The most common biometrics is the given below: Face geometry (Photo): In this the computer takes the picture of your face and matches t

What are program invisible registers? Global and local descriptor tables are found in memory system. In order to specify and access the address of these tables, program invisi

With the help of clocked JK flip flops and waveforms, explain the working of a three bit binary ripple counter. Write truth table for clock transitions. Ans. Three-Bit Binary Rip

i want program code for the above question in c language

MS Access provides a vast range of functions some of them are ? It is used by small business, departments of large corporations, and by amateurs to make applications on their d

Q. Why we use Debugger? Debugger is a program which allows the user to test as well as debug the object file.  Theuser can use this program to perform subsequent functions.

How do subroutines help in program writing? Some of the significant characteristics of Subroutine that help in program writing are: A subroutine is named, each have a