Io devices and i/o subsystem and direct memory access, Computer Engineering

Assignment Help:

Why IO devices cannot be connected directly to the system bus?

Ans: The IO devices can't be directly connected to the system bus because the following reason

A) The data transfer rate of IO devices is slower that of CPU.

B) The IO devices in computer system has different data formats and work lengths that of CPU. So it is essential to use a module between system bus and IO device which is called IO module or IO system

Write the factors considered in designing an I/O subsystem?

 Ans:

1. Data transfer: Amount, rate to or from device.

 2. Data Location: Device selection, address of data within device (track, sector etc)

3. Memory or between an I/O device and CPU.

4. Synchronization: Output only when device is ready, input only when

Described Direct Memory Access

Ans: A modest increase in hardware enables an IO device to transfer a block of information to /from memory without CPU intervention. This task needs the IO device to produce memory addresses and transfer data via the bus by using interface controllers.

 


Related Discussions:- Io devices and i/o subsystem and direct memory access

How can data and instructions are put into the computers, Q. How can data a...

Q. How can data and instructions are put into the computers? The data and instructions to a computer are provided by external environment. It determines that input devices are

Explain structured and modular programming, Structured and Modular programm...

Structured and Modular programming. Structured programming means the collection of principles and practices that are directed toward developing correct programs which are simpl

Data type, Define data type and abstract data type comment upon the signifi...

Define data type and abstract data type comment upon the significant of both

Advantages offered by data mining, Advantages offered by Data Mining: 1...

Advantages offered by Data Mining: 1.  Facilitates discovery of knowledge from big, massive data sets. 2.  Can be used within dissimilar application areas by Fraud detection

What is loadrunner, LoadRunner works by making virtual users who take the p...

LoadRunner works by making virtual users who take the place of real users operating client software, such as sending requests using the HTTP protocol to IIS or Apache web servers.

What is the function of alu, What is the function of ALU? Most of the c...

What is the function of ALU? Most of the computer operations (arithmetic and logic) are performed in ALU. The data needed for the operation is brought by the processor and the

What are bags and sequences, What are bags and sequences? A bag is a co...

What are bags and sequences? A bag is a collection of elements with duplicates permitted.  A sequence is an ordered collection of elements with duplicates permitted.

Explain the ccitt hierarchical structure of switching, Explain the CCITT hi...

Explain the CCITT hierarchical structure of switching using block schematic. Hierarchical network are able of handing heavy traffic where needed, and at similar time use mini

What do you meant by hosts, Q. What do you meant by Hosts? Hosts are in...

Q. What do you meant by Hosts? Hosts are in general, individual machines at a specific location. Resources of a host machine is generally shared and can be utilized by any user

Explain about RISC architecture, Q. Explain about RISC ARCHITECTURE? Le...

Q. Explain about RISC ARCHITECTURE? Let's first list some significant considerations of RISC architecture: 1. RISC functions are kept simple unless there is a very good reas

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd