|Graded Discussion Board Announcement||Dated: Feb 11, 14|
Graded Discussion Board for the course “System Programming (CS609)” will be open on Thursday 20th Feb, 2014 and it will be closed on Friday 21th Feb, 2014.
"The methods of DMA mode transfer are limited to protected mode programs." Support or contradict this statement with solid reason.
Read the instructions carefully before sending your comments:
Aray yaar pora Google chaaan mara pata nai ye topic google py b nai ha.
kisi site py is ka hint nai mila......aur yaha jo hona tha disscuss wo ho chuka ab apna apna labo te submit karo....
Allah Allah khair sallah...
g g abdul rauf bahi yematerial jo ap ne dia maine b dekha but iska connection dma transfer mode se kaisy howa ye bata dain?? plz
bilkul sahi kaha ap ne RANA USMAN pta nae kaha se sir ye topic utha k dia hai
• Block Transfer
• Single Transfer
• Demand Transfer
Protected mod konsa ha :O lectures me to DMA k ye modes diye hoe hn
Protected Mode Memory Addressing Has features designed to enhance multitasking and system stability, memory protection and support for virtual memory.
DMA has three transfer modes:
1. Burst or Block Transfer Mode: the DMA controller transfers one block of data at one time. It is useful for loading a program or a data file but it keeps the CPU inactive for a relatively long period of time.
2. Cycle Stealing Mode: the DMA controller accesses the system bus by BR (Bus Request) and BG (Bus Grant) signals. The DMA controller sends BR, transfers 1 byte of data then it sends BG. The control of the system bus is continuously obtained and released. The CPU is idle for less time than in the Burst Mode but the data transfer takes more time.
3. Transparent Mode: it takes the most of the time because the DMA controller transfers data only when the CPU does not use the system bus. It is called transparent because the CPU continuously works on other tasks so the DMA does not interrupt it.
In computing, protected mode, also called protected virtual address mode, is an operational mode of x86-compatible central processing units (CPU). It allows system software to use features such as virtual memory, paging and safe multi-tasking designed to increase an operating system's control over application software.
When a processor that supports x86 protected mode is powered on, it begins executing instructions in real mode, in order to maintain backwards compatibility with earlier x86 processors. Protected mode may only be entered after the system software sets up several descriptor tables and enables the Protection Enable (PE) bit in the control register 0 (CR0).
very very tough gdb