SlideShare a Scribd company logo
I K B 2 0 8 0 3 - C O M P U T E R O R G A N I Z A T I O N
TOPIC 6:
DIRECT MEMORY
ACCESS
Presented to: Ts Wan Hazimah binti Wan Ismail
MEET THE
Team
NURSOFEA BALQISH
BINTIMD NOR
52224123504
MOHAMAD SYAKIR
BIN SALLEHUDDIN
52224123526
SITIUMAIRAH BINTI
MOHAMMAD SAIFUL
52224123559
MOHAMMAD ROSHAN AMIRUL
BIN MOHAMMAD RAIF
52215123492
BYTE
Lorem ipsum dolor sit amet, consectetur
adipiscing elit.Proin ac odio at duialiquam
tempus sed sed purus.
BUR
Lorem ipsum dolor sit amet, consectetur
adipiscing elit.Proin ac odio at duialiquam
tempus sed sed purus.
2020
Lorem ipsum dolor sit amet, consectetur
adipiscing elit.Proin ac odio at duialiquam
tempus sed sed purus.
CONTENT
Introduction
What is Dma
Type of Dma
Needs of Dma
Dma data transfer
Basic operation of Dma
Dma Data transfer
Data transfer mode
Advantage & Disadvantage
INTRODUCTION OF
DMA
BYTE
Lorem ipsum dolor sit amet, consectetur
adipiscing elit.Proin ac odio at duialiquam
tempus sed sed purus.
BUR
Lorem ipsum dolor sit amet, consectetur
adipiscing elit.Proin ac odio at duialiquam
tempus sed sed purus.
2020
Lorem ipsum dolor sit amet, consectetur
adipiscing elit.Proin ac odio at duialiquam
tempus sed sed purus.
The direct memory access(DMA) I/O
technique provides direct access to the
memory while the microprocessor is
temporarily disabled.
The DMA transfer is used to do high-
speed memory-to memory transfers
Used in disk controllers, cideo/sound
cards et,or between memory
locations
DIRECT MEMORY
ACCESS (DMA) DIRECT MEMORY ACCESS(DMA) IS A
FEATURE OF COMPUTERIZED SYSTEMS
THAT ALLOWS CERTAIN HARDWARE
SUBSYSTEMS TO ACCESS MAIN SYSTEM
MEMORY INDEPENDENTKY OF THE
CENTRALPROCESSING UNIT (CPU).
DIRECT MEMORY ACCESS IS A MEANS OF
HAVING A PERIPHERAL DEVICE CONTROL
A PROCESSOR’S MEMORY BUS DIRECTLY
.
What is DIRECT MEMORY ACCESS (DMA)?
based data transfer techniques
Byte/ cycle stealing mode
Burst/ demand mode
Continuous/ block mode
TYPE OF DMA
1) CYCLE STEAL
Aread or write signal is generated by the DMAC, and
the I/O device either generates by the DMAC
effectively steals cycles from the processor in order to
transfer the byte, so single byte transfer is also known
as cycle stealing
2) BURST TRANSFER
To achieve block transfers, some DMAC’s incorporate
an automatic sequencing of the value presented on
the address bus.Aregister is used as a byte count,
being decremented for each byte transfer, and upon
the byte count reaching zero, the DMAC will release
the bus. When the DMAC operates in burst mode, the
CPU is halted for the duration of the data transfer.
3) CONTINUOUS
It is possible to perform hidden DMA, which is
transparent to the normal operation of the COU. In
the words, the bus is grabbed by the DMAC when the
processor is not using it. The DMAC monitors the
execution of the processor, and when it recognises the
processor executing an instruction whic has sufficient
empty clock cycles to perform a byte transfer.
DMA, ORdirect MemoryAccess, is asub controller
that can access memory in sequential order without
intervention from the processor. DMAis used to
moving around large amounts of datain the
computer without taking time away from the
processor.
The first major uses of DMAincluded drive
controllers and sound card.
NEED
of D M A
D
M
A
DATA TRANSFER
IT IS DATA TRANSFER TECHNIQUE
DIRECTLY BETWEEN MEMORY AND I/O
WITHOUT CPU INTERVENTION.
UNDER THE SUPERVISION OF EXTRA
HARDWARECALLED DMACONTROLLER.
FASTEST TYPE OF DATA TRANSFER
TECHNIQUE AMONG THIS PARALLEL
GROUP
DMA Data Transfer
DMA
T
ransfer
3. microprocessor send HLDA to DMA Controller & DMA takes charge of
system bus.
4.DMA give DMA ACK(back) signal to I/O devices
5.now, DMA controller places memory adress on adress bus and data
bytes from memory transfer to I/O.
6.DMA controller updates memory adress register and word count
register.
7.when internal count =0 then DMA Controllers sets HOLD=0
8.now processor regain the charge od the system bus which continues
the normal operation.
1.The I/O device asserts DRQ signal.
2.DMA controller send HOLD signal to
microprocessor
DMAprovide direct access to memory
For fast operation of DMAwoek as abus master
Direct MemoryAccess is amethod of transferring
data between peripherals and memory without using
the CPU
BASIC
Operation’sof DM A
DMA DATA TRANSFER
Computer Organization Video Presentation
OUR DATA
TRANSFER
MODES
1. Single Transfer Mode
2. BlockTransfer Mode
3. Demand Transfer Mode
4. Cascade Mode
5. Memory to memory transfer
1 2 3 4 5
0
50
100
150
200
tra nsf er
DATA
2. BLOCKTRANSFERMODE
Once the DMAcontroller is granted access to the
system bus by the CPU, it transfers all bytes of the
data in the data block. This mode is called ‘Block
Transfer Mode’.once a Block transfer is started, it
runs untill the transfer count reaches zero.
1.SINGLETRANSFERMODE
In Single Transfer Mode the device is programmed to make
one transfer only. in single mode only one byte is transferred
per request
1 2 3 4 5
0
50
100
150
200
Transfer
DATA
4. CASCADEMODE
Used to cascade additional DMAcontrollersActual
bus signals is executed by cascaded chip.
5. MEMORYTO MEMORY
TRANSFER
To perform the transfer of the block of data from one set
of memory adress to another one, this mode is used, This
means data can be transferred from one memory device to
another memory device
3. DEMAND TRANSFERMODE
Demand mode DMA allows PC hardware to transfer many
bytres of data, via a DMA channel, with only a single
programming of the DMAcontroller.
DMA BLOCK DIAGRAM
ADVANTAGED M A
1. DMA ALLOWS A
PERIPHERAL DEVICE TO
READ FROM/WRITE TO
MEMORY WITHOUT GOING
THROUGH THE CPU
2. DMA ALLOWS FOR FASTER
SINCE THE PROCESSOR CAN BE
WORKING ON SOMETHING ELSE
WHILE THE PERIPHERAL CAN BE
PO[ULATING MEMORY.
DISADVANTAGE D M A
1. DMA TRANSFER REQUIRES A DMA
CONTROLLER TO CARRY OUT THE
OPERATIONS, HENCE COST OF THE
SYSTEM INCREASES.
2.CASHE COHERENCE
PROBLEM
THANK
YOU

More Related Content

PPTX
DMA operation
PPTX
Direct memory access (dma)
PPTX
Direct Memory Access(DMA)
DOCX
DMA Controller Modes Of Operation
PPTX
Dma data transfer
PPTX
Direct memory access
PPTX
A case study on Data Memory Access. - DMA - DMA Controller -Working Mechanism...
PPT
1 STM32's DMA.ppt
DMA operation
Direct memory access (dma)
Direct Memory Access(DMA)
DMA Controller Modes Of Operation
Dma data transfer
Direct memory access
A case study on Data Memory Access. - DMA - DMA Controller -Working Mechanism...
1 STM32's DMA.ppt

Similar to Computer Organization Video Presentation (20)

PPTX
Direct Memory Access (DMA).pptx
PPTX
Direct access memory
PPTX
Direct memory access controller slide.pptx
PPTX
DMA airctecture.pptx
PPTX
Direct access memory
PPTX
DMA Controller Presentation
PPTX
This pot is about computer architecture.
PPTX
Dma and dma controller 8237
PPTX
Direct memory access
PPT
Modes Of Transfer in Input/Output Organization
PPTX
Direct Memory Access
PPTX
DMA information of microprocessor.Shows how it performs
PPS
Data transfer system
PPTX
Modes of data transfer
PDF
Direct Memory Access
PDF
CSN221_Lec_36 Computer Architecture and Microprocessor
PPTX
PPTX
Direct memory access
Direct Memory Access (DMA).pptx
Direct access memory
Direct memory access controller slide.pptx
DMA airctecture.pptx
Direct access memory
DMA Controller Presentation
This pot is about computer architecture.
Dma and dma controller 8237
Direct memory access
Modes Of Transfer in Input/Output Organization
Direct Memory Access
DMA information of microprocessor.Shows how it performs
Data transfer system
Modes of data transfer
Direct Memory Access
CSN221_Lec_36 Computer Architecture and Microprocessor
Direct memory access
Ad

Recently uploaded (20)

PDF
Classroom Observation Tools for Teachers
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
RMMM.pdf make it easy to upload and study
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
Cell Types and Its function , kingdom of life
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Trump Administration's workforce development strategy
PPTX
Cell Structure & Organelles in detailed.
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Classroom Observation Tools for Teachers
Microbial disease of the cardiovascular and lymphatic systems
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
A systematic review of self-coping strategies used by university students to ...
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Weekly quiz Compilation Jan -July 25.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Pharma ospi slides which help in ospi learning
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
RMMM.pdf make it easy to upload and study
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Cell Types and Its function , kingdom of life
VCE English Exam - Section C Student Revision Booklet
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
GDM (1) (1).pptx small presentation for students
Trump Administration's workforce development strategy
Cell Structure & Organelles in detailed.
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
FourierSeries-QuestionsWithAnswers(Part-A).pdf
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Ad

Computer Organization Video Presentation

  • 1. I K B 2 0 8 0 3 - C O M P U T E R O R G A N I Z A T I O N TOPIC 6: DIRECT MEMORY ACCESS Presented to: Ts Wan Hazimah binti Wan Ismail
  • 2. MEET THE Team NURSOFEA BALQISH BINTIMD NOR 52224123504 MOHAMAD SYAKIR BIN SALLEHUDDIN 52224123526 SITIUMAIRAH BINTI MOHAMMAD SAIFUL 52224123559 MOHAMMAD ROSHAN AMIRUL BIN MOHAMMAD RAIF 52215123492
  • 3. BYTE Lorem ipsum dolor sit amet, consectetur adipiscing elit.Proin ac odio at duialiquam tempus sed sed purus. BUR Lorem ipsum dolor sit amet, consectetur adipiscing elit.Proin ac odio at duialiquam tempus sed sed purus. 2020 Lorem ipsum dolor sit amet, consectetur adipiscing elit.Proin ac odio at duialiquam tempus sed sed purus. CONTENT Introduction What is Dma Type of Dma Needs of Dma Dma data transfer Basic operation of Dma Dma Data transfer Data transfer mode Advantage & Disadvantage
  • 4. INTRODUCTION OF DMA BYTE Lorem ipsum dolor sit amet, consectetur adipiscing elit.Proin ac odio at duialiquam tempus sed sed purus. BUR Lorem ipsum dolor sit amet, consectetur adipiscing elit.Proin ac odio at duialiquam tempus sed sed purus. 2020 Lorem ipsum dolor sit amet, consectetur adipiscing elit.Proin ac odio at duialiquam tempus sed sed purus. The direct memory access(DMA) I/O technique provides direct access to the memory while the microprocessor is temporarily disabled. The DMA transfer is used to do high- speed memory-to memory transfers Used in disk controllers, cideo/sound cards et,or between memory locations
  • 5. DIRECT MEMORY ACCESS (DMA) DIRECT MEMORY ACCESS(DMA) IS A FEATURE OF COMPUTERIZED SYSTEMS THAT ALLOWS CERTAIN HARDWARE SUBSYSTEMS TO ACCESS MAIN SYSTEM MEMORY INDEPENDENTKY OF THE CENTRALPROCESSING UNIT (CPU). DIRECT MEMORY ACCESS IS A MEANS OF HAVING A PERIPHERAL DEVICE CONTROL A PROCESSOR’S MEMORY BUS DIRECTLY . What is DIRECT MEMORY ACCESS (DMA)?
  • 6. based data transfer techniques Byte/ cycle stealing mode Burst/ demand mode Continuous/ block mode TYPE OF DMA
  • 7. 1) CYCLE STEAL Aread or write signal is generated by the DMAC, and the I/O device either generates by the DMAC effectively steals cycles from the processor in order to transfer the byte, so single byte transfer is also known as cycle stealing
  • 8. 2) BURST TRANSFER To achieve block transfers, some DMAC’s incorporate an automatic sequencing of the value presented on the address bus.Aregister is used as a byte count, being decremented for each byte transfer, and upon the byte count reaching zero, the DMAC will release the bus. When the DMAC operates in burst mode, the CPU is halted for the duration of the data transfer.
  • 9. 3) CONTINUOUS It is possible to perform hidden DMA, which is transparent to the normal operation of the COU. In the words, the bus is grabbed by the DMAC when the processor is not using it. The DMAC monitors the execution of the processor, and when it recognises the processor executing an instruction whic has sufficient empty clock cycles to perform a byte transfer.
  • 10. DMA, ORdirect MemoryAccess, is asub controller that can access memory in sequential order without intervention from the processor. DMAis used to moving around large amounts of datain the computer without taking time away from the processor. The first major uses of DMAincluded drive controllers and sound card. NEED of D M A
  • 11. D M A DATA TRANSFER IT IS DATA TRANSFER TECHNIQUE DIRECTLY BETWEEN MEMORY AND I/O WITHOUT CPU INTERVENTION. UNDER THE SUPERVISION OF EXTRA HARDWARECALLED DMACONTROLLER. FASTEST TYPE OF DATA TRANSFER TECHNIQUE AMONG THIS PARALLEL GROUP DMA Data Transfer
  • 12. DMA T ransfer 3. microprocessor send HLDA to DMA Controller & DMA takes charge of system bus. 4.DMA give DMA ACK(back) signal to I/O devices 5.now, DMA controller places memory adress on adress bus and data bytes from memory transfer to I/O. 6.DMA controller updates memory adress register and word count register. 7.when internal count =0 then DMA Controllers sets HOLD=0 8.now processor regain the charge od the system bus which continues the normal operation. 1.The I/O device asserts DRQ signal. 2.DMA controller send HOLD signal to microprocessor
  • 13. DMAprovide direct access to memory For fast operation of DMAwoek as abus master Direct MemoryAccess is amethod of transferring data between peripherals and memory without using the CPU BASIC Operation’sof DM A
  • 16. OUR DATA TRANSFER MODES 1. Single Transfer Mode 2. BlockTransfer Mode 3. Demand Transfer Mode 4. Cascade Mode 5. Memory to memory transfer
  • 17. 1 2 3 4 5 0 50 100 150 200 tra nsf er DATA 2. BLOCKTRANSFERMODE Once the DMAcontroller is granted access to the system bus by the CPU, it transfers all bytes of the data in the data block. This mode is called ‘Block Transfer Mode’.once a Block transfer is started, it runs untill the transfer count reaches zero. 1.SINGLETRANSFERMODE In Single Transfer Mode the device is programmed to make one transfer only. in single mode only one byte is transferred per request
  • 18. 1 2 3 4 5 0 50 100 150 200 Transfer DATA 4. CASCADEMODE Used to cascade additional DMAcontrollersActual bus signals is executed by cascaded chip. 5. MEMORYTO MEMORY TRANSFER To perform the transfer of the block of data from one set of memory adress to another one, this mode is used, This means data can be transferred from one memory device to another memory device 3. DEMAND TRANSFERMODE Demand mode DMA allows PC hardware to transfer many bytres of data, via a DMA channel, with only a single programming of the DMAcontroller.
  • 20. ADVANTAGED M A 1. DMA ALLOWS A PERIPHERAL DEVICE TO READ FROM/WRITE TO MEMORY WITHOUT GOING THROUGH THE CPU 2. DMA ALLOWS FOR FASTER SINCE THE PROCESSOR CAN BE WORKING ON SOMETHING ELSE WHILE THE PERIPHERAL CAN BE PO[ULATING MEMORY.
  • 21. DISADVANTAGE D M A 1. DMA TRANSFER REQUIRES A DMA CONTROLLER TO CARRY OUT THE OPERATIONS, HENCE COST OF THE SYSTEM INCREASES. 2.CASHE COHERENCE PROBLEM