What do you mean by daisy chain, Computer Engineering

Assignment Help:

Q. What do you mean by Daisy chain?

This scheme provides a hardware poll. With this scheme, an interrupt acknowledge line is chain by different interrupt devices. All I/O interfaces share a common interrupt request line. When processor senses an interrupt it sends out an interrupt acknowledgement. This signal passes via all I/O devices till it gets to requesting device. First device that has made interrupt request so senses signal and responds by putting in a word that is generally an address of interrupt servicing program or a unique identifier on data lines. This word is also called as interrupt vector. This address or identifier in turn is used for selecting an appropriate interrupt-servicing program. Daisy chaining has an in-built priority scheme that is determined by sequence of devices on interrupt acknowledge line.


Related Discussions:- What do you mean by daisy chain

Explain opening files for reading only in c, Opening Files for Reading Only...

Opening Files for Reading Only     : A data file is a file that you can open and read its contents visually - for example, C source files, .dat files, HTML etc - anything that look

Explain the concepts and definitions of e-commerce, The Internet has emerge...

The Internet has emerged as a major worldwide distribution channel for goods, managerial, services, and professional jobs. It has impacted market economics and industry structure,

Why do you create parameters, Parameters are like script variables. They ar...

Parameters are like script variables. They are used to vary input to the server and to imitate real users. Dissimilar sets of data are sent to the server every time the script is r

Spirit duplicating of information, Spirit Duplicating Equipment Requir...

Spirit Duplicating Equipment Required Spirit Duplicator (also known as hectograph) Thermal copier (optional) Materials Masters Hectographic carbon COPY pa

Forward checking - artificial intelligence, Forward checking: Whether ...

Forward checking: Whether to add some sophistication to the search method there constraint solvers use a technique called as forward checking. So here the general idea is to w

Fact Finding, What and why use fact finding.

What and why use fact finding.

What are the limitations of mobile devices, What are the limitations of mob...

What are the limitations of mobile devices? For mobile devices we require both PC-integrated applications and specialized mobile services quite than repurposed website content.

Show the example of internet address, Q. Show the example of internet addre...

Q. Show the example of internet address? The following can be a typical person understandable address on Internet: VVS @ expertsmind.us VVS is an username which in gene

Truth tables - artificial intelligence, Truth Tables - artificial intellige...

Truth Tables - artificial intelligence: In propositional logic, where we are limited to expressing sentences where propositions are true or false - we can check whether a speci

How does computer know whether arriving frame has ARP msg, How does a compu...

How does a computer know whether an arriving frame contains an ARP message? Explain. The type field into the frame header gives that the frame contains an ARP message. A sender

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd