Input output techniques - computer architecture, Computer Engineering

Input Output Techniques:

o   Interrupt driven

o   Direct Memory Access (DMA)

o   Programmed

Programmed I/O

  •   CPU has control over I/O directly
  •   Read/write commands
  •   Sensing status
  •   Transferring data
  •   Wastes CPU time
  •   CPU waits for I/O module to finish operation
  •   I/O module performs operation
  •   I/O module sets status bits
  •   CPU requests I/O operation
  •   CPU checks status bits periodically
  •   I/O module doesn't inform CPU directly
  •   I/O module does not interrupt CPU
  •   Under programmed I/O data transfer is similar memory access (CPU viewpoint)
  •   Each device given unique identifier
  •   CPU may wait or come back later
  •   CPU commands have identifier (address)

I/O Mapping

  •   Large selection of the memory access commands available
  •   Memory mapped I/O

o   memory and Devices share an address space

o   I/O looks like memory read/write

o   No special commands for I/O

  •   Restricted set
  •   Isolated I/O

o   Separate address spaces

o   Need I/O or memory select lines

o   Special commands for I/O

 

Posted Date: 10/13/2012 7:08:26 AM | Location : United States







Related Discussions:- Input output techniques - computer architecture, Assignment Help, Ask Question on Input output techniques - computer architecture, Get Answer, Expert's Help, Input output techniques - computer architecture Discussions

Write discussion on Input output techniques - computer architecture
Your posts are moderated
Related Questions
Describe what happens when recursion functions are declared inline? Ans) Inline functions property says whenever it will call; it will copy the whole definition of that functi

What are bags and sequences? A bag is a collection of elements with duplicates permitted.  A sequence is an ordered collection of elements with duplicates permitted.

How does an authentication system be different from a firewall into functioning? Authentication verses firewall User Authentication and Authorization A significan

mod12 counter connection diagram

what are the steps to implement bus topology?

Problem: (a) IEEE802.11 supports two types of network architecture, describe these architectures with the support of diagrams detailing the network components. (b) The MAC

Q. Show MPI functions? MPI comprises hundreds of functions which are a small subset of which is enough for most practical purposes. We will discuss some of them here. Int M

How many ways can an argument be passed to a subroutine in programming? Ans)  An argument can be passed in two way in a programming language. They are Pass by Value and Passi

Before 1994 there were dissimilar methodologies like Rumbaugh, Booch, Jacobson, and Meyer etc who followed their own notations to mould the systems. The developers were in a di

Give example of Real time (transaction) processing Using this illustration of booking seats on a flight, below sequence of events would occur: -  Customer/travel agent conta