Home > Fujitsu > Controller > Fujitsu Series 3 Manual

Fujitsu Series 3 Manual

Here you can view all the pages of manual Fujitsu Series 3 Manual. The Fujitsu manuals for Controller are available online for free. You can easily download all the documents as PDF.

Page 221

    2. Configuration of DMAC  FUJITSU SEMICONDUCTOR LIMITED 
CHAPTER: DMAC  
FUJITSU SEMICONDUCTOR CONFIDENTIAL   6 
 Explanation of Block Diagram  
  DMAC  
DMAC is in 8 -ch configuration. Each channel performs independent transfer. The priority controller 
controls the transfer  operations of these channels, when there is a conflict among them.  
 Connection to the system  
The diagram of the system configuration in the figure has been simplified for explanation purposes. For 
more details, see the...

Page 222

    2. Configuration of DMAC  FUJITSU SEMICONDUCTOR LIMITED 
CHAPTER: DMAC  
FUJITSU SEMICONDUCTOR CONFIDENTIAL   7 
2.2.  I/O Signals of DMAC 
This section describes the I/O signals of DMAC. 
 Transfer Request Signals to be Input to DMAC  
Table 2-1 shows a list of the transfer request signals to be input to DMAC and the interrupt signals from the 
corresponding Peripherals.  
Table 2-1 List of Transfer Request Signals and Interrupt Signals from Corresponding Peripherals  
IDREQ No. Interrupt Signal of...

Page 223

    2. Configuration of DMAC  FUJITSU SEMICONDUCTOR LIMITED 
CHAPTER: DMAC  
FUJITSU SEMICONDUCTOR CONFIDENTIAL   8 
 Interrupt Signals Output from DMAC  
Table 2-2 shows a list of the interrupt signals output from DMAC.  
Table 2-2 List of Interrupt Signals from DMAC  
Name of 
Interrupt Signal 
Interrupt Factor 
Register 
Interrupt Enable 
Register Interrupt Type 
DIRQ0  DMACB0.SS[2:0]  DMACB0.CI ch.0 successful transfer completion interrupt 
DMACB0.EI ch.0 unsuccessful transfer completion interrupt...

Page 224

    3. Functions and Operations of DMAC  FUJITSU SEMICONDUCTOR LIMITED 
CHAPTER: DMAC  
FUJITSU SEMICONDUCTOR CONFIDENTIAL   9 
3. Functions and Operations of DMAC  
This chapter describes the operations of D MAC in each transfer mode. 
 
3.1 Software -Block Transfer  
3.2  Software -Burst Transfer  
3.3  Hard ware-Demand Transfer  
3.4  Hardware- Block Transfer & Burst Transfer  
3.5  Channel Priority Control  
 
CHAPTER  8: DMAC 
MN706-00002-1v0-E 
188 
MB9Axxx/MB9Bxxx  Series  

Page 225

    3. Functions and Operations of DMAC  FUJITSU SEMICONDUCTOR LIMITED 
CHAPTER: DMAC  
FUJITSU SEMICONDUCTOR CONFIDENTIAL   10 
3.1.  Software- Block Transfer  
This section describes Software -Block transfer.  
Figure 3-1 shows an example of the operation of Software -Block transfer. In this example, the following 
settings apply.  
⋅   Transfer mode  : Software request Block transfer (ST=1, IS=000000, MS=00)  
⋅   Transfer sour ce start address   : SA(DMACSA=SA)  
⋅   Transfer source address control...

Page 226

    3. Functions and Operations of DMAC  FUJITSU SEMICONDUCTOR LIMITED 
CHAPTER: DMAC  
FUJITSU SEMICONDUCTOR CONFIDENTIAL   11 
DMAC performs the following operation, when the transfer content is set from CPU and then the start of 
the transfer is instructed.  
⋅   Due to the specification of the transfer data width, each transfer is performed by half -word (16bit) . 
⋅   According to the start addresses of the transfer source and transfer destination, the data width and the 
incremented/fixed...

Page 227

    3. Functions and Operations of DMAC  FUJITSU SEMICONDUCTOR LIMITED 
CHAPTER: DMAC  
FUJITSU SEMICONDUCTOR CONFIDENTIAL   12 
3.2.  Software -Burst Transfer  
This section describes Software- Burst transfer. 
Figure 3-2 shows an example of the operatio n of Software -Burst  transfer. In this example, the following 
settings apply.  
⋅   Transfer mode  : Software request B urst transfer  (ST=1, IS=000000,  MS=01)  
⋅   Transfer source start address   : SA(DMACSA=SA)  
⋅   Transfer source address   :...

Page 228

    3. Functions and Operations of DMAC  FUJITSU SEMICONDUCTOR LIMITED 
CHAPTER: DMAC  
FUJITSU SEMICONDUCTOR CONFIDENTIAL   13 
3.3.  Hardware-Demand Transfer  
This section describes Hardware-Demand transfer. 
Hardware-Demand transfer is used when performing DMA transfer by the transfer request signal from the 
Peripherals  of  USB, MSF  and ADC . 
Hardware- Demand transfer is a method used to receive the transfer request signal from Peripherals on a 
signal level. If the transfer request signal is on...

Page 229

    3. Functions and Operations of DMAC  FUJITSU SEMICONDUCTOR LIMITED 
CHAPTER: DMAC  
FUJITSU SEMICONDUCTOR CONFIDENTIAL   14 
3.4.  Hardware-Block Transfer & Burst Transfer 
This section describes Hardware- Block transfer and Burst transfer. 
Hardware-Block transfer or Hardware -Burst transfer is used when performing DMA transfer by the transfer 
reques t signal from the Peripheral of the base timer or external interrupt.  
Hardware- Block transfer and Hardware- Burst transfer are methods used to...

Page 230

    3. Functions and Operations of DMAC  FUJITSU SEMICONDUCTOR LIMITED 
CHAPTER: DMAC  
FUJITSU SEMICONDUCTOR CONFIDENTIAL   15 
Figure  3-5 shows an example of the oper ation of Hardware-Burst transfer.. In this example, the following 
settings apply. The settings of the addresses of the transfer source and transfer destination as well as the 
transfer data width are omitted.  
⋅   Transfer mode  :  Hardware-Burst transfer   
   (ST=0 , IS= Peripheral at the transfer request source,  MS=01) 
⋅...
Start reading Fujitsu Series 3 Manual
All Fujitsu manuals