A data breach is an incident that involves the unauthorized or illegal viewing, access or retrieval of data by an individual, application or service. It is a type of security breach specifically designed to steal and/or publish data to an unsecured or illegal location. A data breach is also known as a data spill or data leak.
Direct memory access (DMA) is a method that allows an input/output (I/O) device to send or receive data directly to or from the main memory, bypassing the CPU to speed up memory operations. The process is managed by a chip known as a DMA controller (DMAC).
In older computers, four DMA channels were numbered 0, 1, 2 and 3. When the 16-bit industry standard architecture (ISA) expansion bus was introduced, channels 5, 6 and 7 were added. ISA was a computer bus standard for IBM compatible computers, allowing a device to initiate transactions (bus mastering) at a quicker speed. ISA has since been replaced by accelerated graphics port (AGP) and peripheral component interconnect (PCI) expansion cards, which are a lot faster.
Each channel requires two lines in order to function. One line is for is for the DMA controller, which asks for clearance from the CPU. The other line is for the CPU to recognize that the DMA controller is able to send data over the lines without disruption from the CPU.
A computer's system resource tools are used for communication between hardware and software. The four types of system resources are:
DMA channels are used to communicate data between the peripheral device and the system memory. All four system resources rely on certain lines on a bus. Some lines on the bus are used for IRQs, some for addresses (the I/O addresses and the memory address) and some for DMA channels.
A DMA channel enables a device to transfer data without exposing the CPU to a work overload. Without the DMA channels, the CPU copies every piece of data using a peripheral bus from the I/O device. Using a peripheral bus occupies the CPU during the read/write process and does not allow other work to be performed until the operation is completed.
With DMA, the CPU can process other tasks while data transfer is being performed. The transfer of data is first initiated by the CPU. During the transfer of data between the DMA channel and I/O device, the CPU performs other tasks. When the data transfer is complete, the CPU receives an interrupt request from the DMA controller.
A device applying DMA technology uses only a single channel. To avoid a conflict, sometimes the BIOS must assign a different channel to a device. A conflict can happen when more than one device tries to use the same channel.
DMA channels are slower than later data transfer methods, and therefore are not as common. One later interface is the Ultra DMA, which has a data transfer rate up to 33 MB per second. Each DMA transfers approximately 2 MB data per second.
Read More »
Join 138,000+ IT pros on our weekly newsletter
Home | Advertising Info | Write for Us | About | Contact Us
2010 - 2014
Partner Sites :