Draw and illustrate the block diagram of DMA controller, Computer Engineering

Assignment Help:

Draw and illustrate the block diagram of DMA controller. Also discuss the various modes in which DMAC works.

Direct memory access (DMA) is a process in that an external device takes over the control of system bus from CPU.DMA is for high-speed data transfer to/from mass storage peripherals, for example magnetic tape, hard disk drive, CD-ROM and sometimes video controllers. E.g. a hard disk may boasts a transfer rate of 5 M bytes per second, which implies 1 byte transmission every 200 ns. To make such data transfer via CPU is both unnecessary andundesirable.

Basic idea of DMA is to transfer blocks of data directly between peripherals andmemory. The data do not go through the microprocessor but data bus is occupied. 'Normal' transfer of one data byte takes up to 29 clock cycles. DMA transfer requires only 5 clock cycles.

 

2039_micro.png

Modes of operation include demand mode, block mode, single mode and cascade mode. Demand mode transfers data until an external EOP is input or until DREQ input becomes inactive. Single mode releases HOLD after each byte of data transferred. Block mode automatically transfers number of bytes indicated by count register for the channel. Cascade mode is used when more than one 8237 is present in a system.


Related Discussions:- Draw and illustrate the block diagram of DMA controller

Effect of tree supply on death rate, The effect of tree supply on death ra...

The effect of tree supply on death rate depends upon a ratio comparing the number of trees that are actually available per person per year to the desired number of trees per pers

Variables and quantifiers - first-order logic, Variables and Quantifiers: ...

Variables and Quantifiers: Now we have to diagnose now that if we wanted to say that there is a meal at the Red Lion which costs only 3 pounds, is well sayed. Rather thenif we

C LANGUAGE, 4) A positive integer is entered through the keyboard;write a ...

4) A positive integer is entered through the keyboard;write a function to find the binary equivalent of this number using recursion.

Moral and ethical implications, • Moral and Ethical Implications o Will ...

• Moral and Ethical Implications o Will this be safe to have on the road    Will the computers on board be able to handle extreme circumstances • Hazardous conditions o Ex

String, super string checker

super string checker

Challenges in changing information technology, Q: Challenges and Prospects ...

Q: Challenges and Prospects in Changing Information Technology? There is no doubt that information technology has made significant progress during the past two decades. Modern

Convergence mean with respect to e-commerce, What does the term convergence...

What does the term convergence mean with respect to E-commerce? Convergence with respect to e-commerce   The ability to leverage and integrate the several data sources and

State the various security tools, State the various Security Tools Sec...

State the various Security Tools Securing an Intranet is not a simple task. Just as articles in a house are protected by use of various types of security systems such as lock

#title.sequential circuit, design modulo 12 up synchronous counter using t ...

design modulo 12 up synchronous counter using t flip flop

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd