SlideShare a Scribd company logo
The Microprocessor and Its Architecture A Course in Microprocessor Electrical Engineering Department University of Indonesia
Protected Mode  Memory Addressing Protected mode memory addressing  (80286 and above)  allows access to data and programs located above the first 1MB of memory as well as within the first 1MB of memory The segment register contains a  selector  instead of segment addresses a selector selects a descriptor from descriptor table The  descriptor  describes the memory segment’s location, length, and access rights ( Fig.2.6 )
Protected Mode Memory  Addressing (cont’d) The selector selects one of 8,192 descriptors from one of two tables of descriptors  There are two descriptor tables: one contains global descriptors and other contains local descriptors The  global descriptors  contain  segment definitions that apply to all programs, while the local des-criptors are usually unique to an applications Each descriptor table contains 8,192 descriptors (i.e. a total 16,384 descriptors are available to an application at any time) --> eq. 16,834 memory segment
Protected Mode Memory  Addressing (cont’d) The base address portion of the descriptor indicates the starting location of the memory segment The segment limit contains the last offset address found in a segment The G bit ( Granularity ; for 80386 through Pen-tium Pro) specifies a segment limit of from 1B to 1MB in length if G = 0, and any multiple of 4KB if G = 1 The AV bit is used by some operating systems to indicate that the segment is available (AV=1) or not available (AV=0)
Protected Mode Memory  Addressing (cont’d) The D bits indicates whether the instructions to access register and memory data is 16-bit instructions (D=0) or 32-bit instructions (D=1) The access rights bytes ( Fig.2.7 ) controls access to the protected mode memory segment Descriptors are chosen from table by the segment register Fig . 2.8  shows how the segment register functions in the protected mode system Fig.2.9  shows how the segment register, containing a selector, chooses a descriptor from the global descriptor table
Program Invisible Registers The program invisible are not directly addressed by software (i.e. invisible) Figures  2.10  Illustrates the program-invisible registers These registers control the microprocessor when operated in the protected mode The program-invisible portion of these registers is often called cache memory; do not confuse with the normal level 1 or level 2 caches found in the microprocessor
Program Invisible Registers The GDTR (global descriptor table register) and IDTR (interrupt descriptor table register) contain the base address of the descriptor table and its limit (i.e. 16-bits) the location of the local descriptor table is selected from the global descriptor table One of the global descriptor is set up to address the local descriptor table
Memory Paging The  memory paging mechanism  located within the 80386 and above allows any physical memory location to be assign to any linear address The  linear address  is defined as the address generated by a program, and with the memory paging unit, the linear address is invisibly translated into any  physical address This allows an application written to function at a specific address to be relocated through the paging mechanism
Memory Paging (cont’d) It also allows memory to be placed into areas where no memory exists The paging unit is controlled by the contents of the microprocessor’s control registers (CR0 - CR3 or CR4, Figure  2.11 ) The linear address is broken into three sections that are used to access the page directory entry, page table entry, and page offset address (Figure. 2.12 )
Memory Paging (cont’d) See Figure. 2.13 The page directory contains 1,024 doubleword addresses that locate up to 1,024 page tables The page directory and each page table are 4K bytes in length See Figure. 2.14  as well
 
 
 
 
 
 
 
 

More Related Content

What's hot (20)

PPTX
Memory System
janani thirupathi
 
PPT
80386
anita bodke
 
PPT
Chapter2.1 2-mikroprocessor
teknik komputer ui
 
PDF
Introduction to 80386
Shehrevar Davierwala
 
PPTX
PRESENTATION ON REAL ADDRESSING MODE AND VIRTUAL ADDRESSING MODE
Arijit Chakraborty
 
PPTX
Introduction to 80386
Abinaya B
 
PPT
Memory mgmt 80386
Akshay Nagpurkar
 
PPT
Microprocessor 80386
yash sawarkar
 
PPT
Address translation-mechanism-of-80386 by aniket bhute
Aniket Bhute
 
PPTX
Memory Segmentation of 8086
Nikhil Kumar
 
PPT
80386 microprocessor
Jerin Sebastian
 
PPT
Memory+management
Kushagra Gaur
 
PPT
Pin Description Of Intel 80386 DX Microprocessor
Raunaq Sahni
 
PPTX
Addressing mode of 80286 microprocessor
pal bhumit
 
PPT
The 80386 80486
Ancy Varghese
 
PPTX
Applications of computer organization
Sudha Manjunath
 
PDF
Addressing modes of 80386
PDFSHARE
 
PPTX
Microprocessor 80286
Smile Hossain
 
PPTX
register
Taimoor Ashraf
 
PPT
Microprocessors - 80386DX
PriyaDYP
 
Memory System
janani thirupathi
 
Chapter2.1 2-mikroprocessor
teknik komputer ui
 
Introduction to 80386
Shehrevar Davierwala
 
PRESENTATION ON REAL ADDRESSING MODE AND VIRTUAL ADDRESSING MODE
Arijit Chakraborty
 
Introduction to 80386
Abinaya B
 
Memory mgmt 80386
Akshay Nagpurkar
 
Microprocessor 80386
yash sawarkar
 
Address translation-mechanism-of-80386 by aniket bhute
Aniket Bhute
 
Memory Segmentation of 8086
Nikhil Kumar
 
80386 microprocessor
Jerin Sebastian
 
Memory+management
Kushagra Gaur
 
Pin Description Of Intel 80386 DX Microprocessor
Raunaq Sahni
 
Addressing mode of 80286 microprocessor
pal bhumit
 
The 80386 80486
Ancy Varghese
 
Applications of computer organization
Sudha Manjunath
 
Addressing modes of 80386
PDFSHARE
 
Microprocessor 80286
Smile Hossain
 
register
Taimoor Ashraf
 
Microprocessors - 80386DX
PriyaDYP
 

Similar to Chapter2.3 4-mikroprocessor (20)

PPTX
UNIT-3.pptx digital electronics system 34
POOJABHOITE5
 
PPTX
32- bit Microprocessor-Indtel 80386.pptx
Yuvraj994432
 
PDF
PAI Unit 2 Segmentation in 80386 microprocessor
KanchanPatil34
 
PPT
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
NaganarasaiahGoud
 
PPT
Architecture of 80386(www.munnuz.co.cc)
muneer.k
 
PPT
80286 education project compiter application .ppt
deepparmar73
 
PDF
80386_AKRay.pdf study computer programme
deepparmar73
 
PDF
80386 Basic Programming Model and Application
GilbeysJhonLadion2
 
PPTX
jdsbfvkjsdbfvbasibgvyisbvilawbvslaksbvlawbvrab
f20230225
 
PPTX
Pentium (80586) Microprocessor By Er. Swapnil Kaware
Prof. Swapnil V. Kaware
 
PPTX
Advanced Microprocessors By Er. Swapnil Kaware
Prof. Swapnil V. Kaware
 
PPTX
Advanced Microprocessors By Er. Swapnil Kaware
Prof. Swapnil V. Kaware
 
PPT
Architecture_of_80386_Micropro-An Introduction
rajasekarandpm
 
PPTX
Microprocessor Unit -1 SE computer-II.pptx
akshathsingh2003
 
PDF
Microprocessor Unit-1( Introduction to 80386 Microprocessors)Second Year ppt
Shikha712235
 
PPTX
80386.pptx
DrRaskarSandeepCompu
 
PPTX
80386 & 80486
RakeshKumarSharma46
 
PPT
Architecture_of_80386_Microprocessor - Inroduction
rajasekarandpm
 
PPTX
It322 intro 2
J Cza Àkera
 
UNIT-3.pptx digital electronics system 34
POOJABHOITE5
 
32- bit Microprocessor-Indtel 80386.pptx
Yuvraj994432
 
PAI Unit 2 Segmentation in 80386 microprocessor
KanchanPatil34
 
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
NaganarasaiahGoud
 
Architecture of 80386(www.munnuz.co.cc)
muneer.k
 
80286 education project compiter application .ppt
deepparmar73
 
80386_AKRay.pdf study computer programme
deepparmar73
 
80386 Basic Programming Model and Application
GilbeysJhonLadion2
 
jdsbfvkjsdbfvbasibgvyisbvilawbvslaksbvlawbvrab
f20230225
 
Pentium (80586) Microprocessor By Er. Swapnil Kaware
Prof. Swapnil V. Kaware
 
Advanced Microprocessors By Er. Swapnil Kaware
Prof. Swapnil V. Kaware
 
Advanced Microprocessors By Er. Swapnil Kaware
Prof. Swapnil V. Kaware
 
Architecture_of_80386_Micropro-An Introduction
rajasekarandpm
 
Microprocessor Unit -1 SE computer-II.pptx
akshathsingh2003
 
Microprocessor Unit-1( Introduction to 80386 Microprocessors)Second Year ppt
Shikha712235
 
80386 & 80486
RakeshKumarSharma46
 
Architecture_of_80386_Microprocessor - Inroduction
rajasekarandpm
 
It322 intro 2
J Cza Àkera
 
Ad

More from teknik komputer ui (20)

PDF
Modul 1
teknik komputer ui
 
PDF
Modul 5
teknik komputer ui
 
PDF
Modul 4
teknik komputer ui
 
PDF
Modul 3
teknik komputer ui
 
PDF
Modul 1
teknik komputer ui
 
PDF
Modul 2
teknik komputer ui
 
PDF
The cisco networking academy net riders indonesia 2010 competition
teknik komputer ui
 
DOC
Rencana Proyek Divisi Komputer.doc
teknik komputer ui
 
DOC
Salinan Research Paper
teknik komputer ui
 
PDF
Chapter_1_Case_Study
teknik komputer ui
 
PDF
Iins practice questions
teknik komputer ui
 
PDF
S1 intr ftui
teknik komputer ui
 
PPT
Exploration network chapter7
teknik komputer ui
 
PPT
Exploration network chapter6
teknik komputer ui
 
PPT
Exploration network chapter5
teknik komputer ui
 
PPT
Exploration network chapter4
teknik komputer ui
 
PPT
Exploration network chapter3
teknik komputer ui
 
PPT
Exploration network chapter2
teknik komputer ui
 
PPT
Exploration network chapter1
teknik komputer ui
 
PPT
Exploration network chapter11
teknik komputer ui
 
The cisco networking academy net riders indonesia 2010 competition
teknik komputer ui
 
Rencana Proyek Divisi Komputer.doc
teknik komputer ui
 
Salinan Research Paper
teknik komputer ui
 
Chapter_1_Case_Study
teknik komputer ui
 
Iins practice questions
teknik komputer ui
 
S1 intr ftui
teknik komputer ui
 
Exploration network chapter7
teknik komputer ui
 
Exploration network chapter6
teknik komputer ui
 
Exploration network chapter5
teknik komputer ui
 
Exploration network chapter4
teknik komputer ui
 
Exploration network chapter3
teknik komputer ui
 
Exploration network chapter2
teknik komputer ui
 
Exploration network chapter1
teknik komputer ui
 
Exploration network chapter11
teknik komputer ui
 
Ad

Chapter2.3 4-mikroprocessor

  • 1. The Microprocessor and Its Architecture A Course in Microprocessor Electrical Engineering Department University of Indonesia
  • 2. Protected Mode Memory Addressing Protected mode memory addressing (80286 and above) allows access to data and programs located above the first 1MB of memory as well as within the first 1MB of memory The segment register contains a selector instead of segment addresses a selector selects a descriptor from descriptor table The descriptor describes the memory segment’s location, length, and access rights ( Fig.2.6 )
  • 3. Protected Mode Memory Addressing (cont’d) The selector selects one of 8,192 descriptors from one of two tables of descriptors There are two descriptor tables: one contains global descriptors and other contains local descriptors The global descriptors contain segment definitions that apply to all programs, while the local des-criptors are usually unique to an applications Each descriptor table contains 8,192 descriptors (i.e. a total 16,384 descriptors are available to an application at any time) --> eq. 16,834 memory segment
  • 4. Protected Mode Memory Addressing (cont’d) The base address portion of the descriptor indicates the starting location of the memory segment The segment limit contains the last offset address found in a segment The G bit ( Granularity ; for 80386 through Pen-tium Pro) specifies a segment limit of from 1B to 1MB in length if G = 0, and any multiple of 4KB if G = 1 The AV bit is used by some operating systems to indicate that the segment is available (AV=1) or not available (AV=0)
  • 5. Protected Mode Memory Addressing (cont’d) The D bits indicates whether the instructions to access register and memory data is 16-bit instructions (D=0) or 32-bit instructions (D=1) The access rights bytes ( Fig.2.7 ) controls access to the protected mode memory segment Descriptors are chosen from table by the segment register Fig . 2.8 shows how the segment register functions in the protected mode system Fig.2.9 shows how the segment register, containing a selector, chooses a descriptor from the global descriptor table
  • 6. Program Invisible Registers The program invisible are not directly addressed by software (i.e. invisible) Figures 2.10 Illustrates the program-invisible registers These registers control the microprocessor when operated in the protected mode The program-invisible portion of these registers is often called cache memory; do not confuse with the normal level 1 or level 2 caches found in the microprocessor
  • 7. Program Invisible Registers The GDTR (global descriptor table register) and IDTR (interrupt descriptor table register) contain the base address of the descriptor table and its limit (i.e. 16-bits) the location of the local descriptor table is selected from the global descriptor table One of the global descriptor is set up to address the local descriptor table
  • 8. Memory Paging The memory paging mechanism located within the 80386 and above allows any physical memory location to be assign to any linear address The linear address is defined as the address generated by a program, and with the memory paging unit, the linear address is invisibly translated into any physical address This allows an application written to function at a specific address to be relocated through the paging mechanism
  • 9. Memory Paging (cont’d) It also allows memory to be placed into areas where no memory exists The paging unit is controlled by the contents of the microprocessor’s control registers (CR0 - CR3 or CR4, Figure 2.11 ) The linear address is broken into three sections that are used to access the page directory entry, page table entry, and page offset address (Figure. 2.12 )
  • 10. Memory Paging (cont’d) See Figure. 2.13 The page directory contains 1,024 doubleword addresses that locate up to 1,024 page tables The page directory and each page table are 4K bytes in length See Figure. 2.14 as well
  • 11.  
  • 12.  
  • 13.  
  • 14.  
  • 15.  
  • 16.  
  • 17.  
  • 18.