SlideShare uma empresa Scribd logo
1 de 29
Group :4
• Roll Number :001
• Roll Number :033
• Roll Number :035
• Roll Number :041
• Roll Number:045
University Of Gujrat
PROTECTED MODE MEMORY
ADDRESSING
PROTECTED MODE MEMORY ADDRESSING
• Protected mode memory addressing allows access to data
and programs located above the first 1M byte of memory.
• Addressing this extended section of the memory system
requires a change to the segment plus an offset addressing
scheme used with real mode memory addressing.
PROTECTED MODE MEMORY ADDRESSING
• In protected addressing mode segments can be of variable
size(below or above 64 KB).
• Some system control instructions are only valid in the
protected mode.
• The offset part of the memory address is still the same as in
real addressing mode. However, when in the protected mode,
the processor can work either with 16-bit offsets or with 32-
bit offsets.
PROTECTED MODE MEMORY ADDRESSING
• A 32-bit offset allows segments of up to 4G bytes. Notice that
in real-mode the only available instruction mode is the 16-bit
mode.
• One difference between real and protected addressing mode is
that the segment address, as discussed with real mode memory
addressing, is no longer present in the protected mode.
PROTECTED MODE MEMORY ADDRESSING
• In place of the segment address, the segment register contains a
selector
• The selector selects a descriptor from a descriptor table.
• The descriptor describes the memory segment's location,
length, and access rights. This is similar to selecting one card
from a deck of cards in one's pocket.
PROTECTED MODE MEMORY ADDRESSING
• The selector, located in the segment register, selects one of
8192 descriptors from one of two tables of descriptors
(stored in memory): the global and local descriptor tables.
The descriptor describes the location, length and access
rights of the memory segment.
• Each descriptor is 8 bytes long.
PROTECTED MODE MEMORY ADDRESSING
• The 8192 descriptor table requires 8 * 8192 = 64K bytes of
memory.
INTRO TO PROTECTED MODE
MEMORY ADDRESSING
 Data and programs located within & above the first 1M byte of memory
• Protected mode is where Windows operates.
• The segment register contains a selector that selects a descriptor from a
descriptor table.
• The descriptor describes the memory segment’s location, length, and
access rights.
Selectors and Descriptors
• The selector is located in the segment register
• Describes the location, length, and access rights of the segment of
memory.
• it selects one of 8192 descriptors from one
of two tables of descriptors.
• Indirectly, the register still selects a memory segment, but not directly
as in real mode.
Descriptors table•
• Two types of Descriptor table selected by the segment register.
• Global descriptors contain segment definitions that apply to all programs.
• a global descriptor might be called a system descriptor
• Local descriptors are usually unique to an application.
• Local descriptor an application descriptor .
• global and local descriptor tables are a
maximum of 64K bytes in length
The format of a descriptor for the 80286 .
Explanation
• each descriptor is 8 bytes in length.
• The base address of the descriptor indicates the starting location of the
memory segment.
• The G, or granularity bit allows a segment length of 4K to 4G bytes in
steps of 4K bytes.
• 32-bit offset address allows segment lengths of 4G bytes
• 16-bit offset address allows segment lengths of 64K bytes.
The access rights byte for the 80286 descriptor
The access rights byte controls access to the
protected mode segment
• describes segment function in the system and allows complete
control over the segment
• if the segment is a data segment, the direction of growth is
specified
• If the segment grows beyond its limit,the
• operating system is interrupted, indicating
a general protection fault.
The contents of a segment register during protected mode
operation of the 80286 microprocessors.
 Descriptors are chosen from the descriptor table by the
segment register.
• register contains a 13-bit selector field, a table selector bit, and
requested privilege level field.
• The TI bit selects either the global or the local descriptor table.
• Requested Privilege Level (RPL) requests the access privilege
level of a memory segment.
Example
Explanation
 the segment register, containing a selector.
 chooses a descriptor from the global descriptor table.
 The entry in the global descriptor table selects a segment in the
memory system
 Descriptor zero is called the null descriptor, must contain all zeros,
and may not be used for accessing memory.
Memory Addressing
Memory Paging
Memory Paging
 In the paging memory-management scheme, the operating system
retrieves data from secondary storage in same-size blocks
called pages.
 The Memory management unit consists of
 Segmentation unit and
 Paging unit.
 Segmentation unit allows segments of size 4Gbytes at max.
 The Paging unit organizes the physical memory in terms of pages
of 4kbytes size each.
 Mechanism available in the 80386 and up.
Allows a linear address ( program generated ) of a program to be
located in any portion of physical memory.
Paging unit works under the control of the segmentation unit, i.e.
each segment is further divided into pages.
 The linear address is invisibly translated to any physical address
Through paging to the hard disk drive and paging to the memory
through the memory paging unit, any Windows application can be
executed
GenerateProgram Linear Address Through Paging
Physical
Address
 The name EMM386 was used for the expanded memory managers of
both Microsoft's and MS-DOS which created expanded memory
using extended memory on Intel 80386 CPUs.
 Expanded memory is a system that provided additional memory
to DOS programs beyond the limit of conventional memory .
 The paging system operates in both real and protected mode.
The paging unit is controlled by the microprocessors control registers:
Paging Registers
 It is enabled by setting the PG bit to 1 (left most bit in CR0 ).
(If set to 0, linear addresses are physical addresses).
 CR3 contains the page directory "physical" base address.
 Each page directory entry contain 1024 directory entries of 4 byte each.
 Each page directory entry addresses a page table that contains up to 1024
entries.
Count….
The virtual address is broken into three pieces
 Directory : Each page directory addresses a 4MB section of main
mem.
 Page Table : Each page table entry addresses a 4KB section of main
mem.
 Offset : Specifies the byte in the page.
Memory Addressing

Mais conteúdo relacionado

Mais procurados

Evolution of microprocessors and 80486 Microprocessor.
Evolution of microprocessors and 80486 Microprocessor.Evolution of microprocessors and 80486 Microprocessor.
Evolution of microprocessors and 80486 Microprocessor.Ritwik MG
 
Microprocessor 80286
Microprocessor 80286Microprocessor 80286
Microprocessor 80286Smile Hossain
 
80286 microprocessor
80286 microprocessor80286 microprocessor
80286 microprocessorAvin Mathew
 
Presentation on 8086 Microprocessor
Presentation  on   8086 MicroprocessorPresentation  on   8086 Microprocessor
Presentation on 8086 MicroprocessorNahian Ahmed
 
Minimum mode and Maximum mode Configuration in 8086
Minimum mode and Maximum mode Configuration in 8086Minimum mode and Maximum mode Configuration in 8086
Minimum mode and Maximum mode Configuration in 8086Jismy .K.Jose
 
8086 memory segmentation
8086 memory segmentation8086 memory segmentation
8086 memory segmentationSridari Iyer
 
INTEL 80386 MICROPROCESSOR
INTEL  80386  MICROPROCESSORINTEL  80386  MICROPROCESSOR
INTEL 80386 MICROPROCESSORAnnies Minu
 
8259 Operating Modes.pptx
8259 Operating Modes.pptx8259 Operating Modes.pptx
8259 Operating Modes.pptxMeenaAnusha1
 
Instruction sets of 8086
Instruction sets of 8086Instruction sets of 8086
Instruction sets of 8086Mahalakshmiv11
 
INTERRUPTS OF 8086 MICROPROCESSOR
INTERRUPTS OF 8086 MICROPROCESSORINTERRUPTS OF 8086 MICROPROCESSOR
INTERRUPTS OF 8086 MICROPROCESSORGurudev joshi
 
PIC MICROCONTROLLERS -CLASS NOTES
PIC MICROCONTROLLERS -CLASS NOTESPIC MICROCONTROLLERS -CLASS NOTES
PIC MICROCONTROLLERS -CLASS NOTESDr.YNM
 
Pin digram of 8086
Pin digram of 8086Pin digram of 8086
Pin digram of 8086RJ
 
Assembly Language Programming By Ytha Yu, Charles Marut Chap 7 (Logic, Shift,...
Assembly Language Programming By Ytha Yu, Charles Marut Chap 7 (Logic, Shift,...Assembly Language Programming By Ytha Yu, Charles Marut Chap 7 (Logic, Shift,...
Assembly Language Programming By Ytha Yu, Charles Marut Chap 7 (Logic, Shift,...Bilal Amjad
 
8086 MICROPROCESSOR
8086 MICROPROCESSOR8086 MICROPROCESSOR
8086 MICROPROCESSORAkhila Rahul
 

Mais procurados (20)

Evolution of microprocessors and 80486 Microprocessor.
Evolution of microprocessors and 80486 Microprocessor.Evolution of microprocessors and 80486 Microprocessor.
Evolution of microprocessors and 80486 Microprocessor.
 
Microprocessor 80286
Microprocessor 80286Microprocessor 80286
Microprocessor 80286
 
80286 microprocessor
80286 microprocessor80286 microprocessor
80286 microprocessor
 
80486
8048680486
80486
 
Presentation on 8086 Microprocessor
Presentation  on   8086 MicroprocessorPresentation  on   8086 Microprocessor
Presentation on 8086 Microprocessor
 
Minimum mode and Maximum mode Configuration in 8086
Minimum mode and Maximum mode Configuration in 8086Minimum mode and Maximum mode Configuration in 8086
Minimum mode and Maximum mode Configuration in 8086
 
ARM Processors
ARM ProcessorsARM Processors
ARM Processors
 
8086 memory segmentation
8086 memory segmentation8086 memory segmentation
8086 memory segmentation
 
INTEL 80386 MICROPROCESSOR
INTEL  80386  MICROPROCESSORINTEL  80386  MICROPROCESSOR
INTEL 80386 MICROPROCESSOR
 
80386 & 80486
80386 & 8048680386 & 80486
80386 & 80486
 
8259 Operating Modes.pptx
8259 Operating Modes.pptx8259 Operating Modes.pptx
8259 Operating Modes.pptx
 
Instruction sets of 8086
Instruction sets of 8086Instruction sets of 8086
Instruction sets of 8086
 
Programmable Timer 8253/8254
Programmable Timer 8253/8254Programmable Timer 8253/8254
Programmable Timer 8253/8254
 
INTERRUPTS OF 8086 MICROPROCESSOR
INTERRUPTS OF 8086 MICROPROCESSORINTERRUPTS OF 8086 MICROPROCESSOR
INTERRUPTS OF 8086 MICROPROCESSOR
 
PIC MICROCONTROLLERS -CLASS NOTES
PIC MICROCONTROLLERS -CLASS NOTESPIC MICROCONTROLLERS -CLASS NOTES
PIC MICROCONTROLLERS -CLASS NOTES
 
8259
82598259
8259
 
Pin digram of 8086
Pin digram of 8086Pin digram of 8086
Pin digram of 8086
 
Introduction to 80386
Introduction to 80386Introduction to 80386
Introduction to 80386
 
Assembly Language Programming By Ytha Yu, Charles Marut Chap 7 (Logic, Shift,...
Assembly Language Programming By Ytha Yu, Charles Marut Chap 7 (Logic, Shift,...Assembly Language Programming By Ytha Yu, Charles Marut Chap 7 (Logic, Shift,...
Assembly Language Programming By Ytha Yu, Charles Marut Chap 7 (Logic, Shift,...
 
8086 MICROPROCESSOR
8086 MICROPROCESSOR8086 MICROPROCESSOR
8086 MICROPROCESSOR
 

Destaque

Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIAMicroprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIADheeraj Kataria
 
Addressing Modes Of 8086
Addressing Modes Of 8086Addressing Modes Of 8086
Addressing Modes Of 8086Ikhlas Rahman
 
Microprocessor 80386
Microprocessor 80386Microprocessor 80386
Microprocessor 80386yash sawarkar
 
1327 Addressing Modes Of 8086
1327 Addressing Modes Of 80861327 Addressing Modes Of 8086
1327 Addressing Modes Of 8086techbed
 
The Intel 8086 microprocessor
The Intel 8086 microprocessorThe Intel 8086 microprocessor
The Intel 8086 microprocessorGeorge Thomas
 
Addressing mode of 80286 microprocessor
Addressing mode of 80286 microprocessorAddressing mode of 80286 microprocessor
Addressing mode of 80286 microprocessorpal bhumit
 
8086 microprocessor-architecture
8086 microprocessor-architecture8086 microprocessor-architecture
8086 microprocessor-architectureprasadpawaskar
 
معماری ماشین های پیشرفته کم دستور
معماری ماشین های پیشرفته کم دستورمعماری ماشین های پیشرفته کم دستور
معماری ماشین های پیشرفته کم دستورAmir Reza Asadi
 
Timer
TimerTimer
TimerAisu
 
Why the Address Translation Scheme Matters?
Why the Address Translation Scheme Matters?Why the Address Translation Scheme Matters?
Why the Address Translation Scheme Matters?Jiaqing Du
 

Destaque (20)

Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIAMicroprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
 
Protection mode
Protection modeProtection mode
Protection mode
 
Addressing Modes Of 8086
Addressing Modes Of 8086Addressing Modes Of 8086
Addressing Modes Of 8086
 
Microprocessor 80386
Microprocessor 80386Microprocessor 80386
Microprocessor 80386
 
The 80386 80486
The 80386 80486The 80386 80486
The 80386 80486
 
1327 Addressing Modes Of 8086
1327 Addressing Modes Of 80861327 Addressing Modes Of 8086
1327 Addressing Modes Of 8086
 
8086 microprocessor
8086 microprocessor8086 microprocessor
8086 microprocessor
 
3. adressingmodes1
3. adressingmodes13. adressingmodes1
3. adressingmodes1
 
Protection 80386
Protection 80386Protection 80386
Protection 80386
 
The Intel 8086 microprocessor
The Intel 8086 microprocessorThe Intel 8086 microprocessor
The Intel 8086 microprocessor
 
Addressing mode of 80286 microprocessor
Addressing mode of 80286 microprocessorAddressing mode of 80286 microprocessor
Addressing mode of 80286 microprocessor
 
8086 microprocessor-architecture
8086 microprocessor-architecture8086 microprocessor-architecture
8086 microprocessor-architecture
 
معماری ماشین های پیشرفته کم دستور
معماری ماشین های پیشرفته کم دستورمعماری ماشین های پیشرفته کم دستور
معماری ماشین های پیشرفته کم دستور
 
Az Micro
Az MicroAz Micro
Az Micro
 
HotSpot
HotSpotHotSpot
HotSpot
 
Documention
DocumentionDocumention
Documention
 
Timer
TimerTimer
Timer
 
8086 introduction
8086 introduction8086 introduction
8086 introduction
 
8254 PIT
8254 PIT8254 PIT
8254 PIT
 
Why the Address Translation Scheme Matters?
Why the Address Translation Scheme Matters?Why the Address Translation Scheme Matters?
Why the Address Translation Scheme Matters?
 

Semelhante a Protected mode memory addressing 8086

Semelhante a Protected mode memory addressing 8086 (20)

Microprocessor Unit -1 SE computer-II.pptx
Microprocessor  Unit -1 SE computer-II.pptxMicroprocessor  Unit -1 SE computer-II.pptx
Microprocessor Unit -1 SE computer-II.pptx
 
Architecture of 80386(www.munnuz.co.cc)
Architecture of 80386(www.munnuz.co.cc)Architecture of 80386(www.munnuz.co.cc)
Architecture of 80386(www.munnuz.co.cc)
 
Mpippt
MpipptMpippt
Mpippt
 
80386
8038680386
80386
 
80386.pptx
80386.pptx80386.pptx
80386.pptx
 
U I - 4. 80386 Real mode.pptx
U I - 4. 80386 Real mode.pptxU I - 4. 80386 Real mode.pptx
U I - 4. 80386 Real mode.pptx
 
Protected addressing mode and Paging
Protected addressing mode and PagingProtected addressing mode and Paging
Protected addressing mode and Paging
 
Doc32002
Doc32002Doc32002
Doc32002
 
It322 intro 2
It322 intro 2It322 intro 2
It322 intro 2
 
Microprocessor
MicroprocessorMicroprocessor
Microprocessor
 
Introduction to 80386 microprocessor
Introduction to 80386 microprocessorIntroduction to 80386 microprocessor
Introduction to 80386 microprocessor
 
Chapter2.3 4-mikroprocessor
Chapter2.3 4-mikroprocessorChapter2.3 4-mikroprocessor
Chapter2.3 4-mikroprocessor
 
Pentium protected mode.ppt
Pentium protected mode.pptPentium protected mode.ppt
Pentium protected mode.ppt
 
80386 microprocessor
80386 microprocessor80386 microprocessor
80386 microprocessor
 
x86_1.ppt
x86_1.pptx86_1.ppt
x86_1.ppt
 
Electronics product design companies in bangalore
Electronics product design companies in bangaloreElectronics product design companies in bangalore
Electronics product design companies in bangalore
 
MPU Chp2.pptx
MPU Chp2.pptxMPU Chp2.pptx
MPU Chp2.pptx
 
80386 processor
80386 processor80386 processor
80386 processor
 
Doc32000
Doc32000Doc32000
Doc32000
 
Mpmc
MpmcMpmc
Mpmc
 

Mais de University of Gujrat, Pakistan

Constitutional development of pakistan since 1947 to thereayf
Constitutional development of pakistan since 1947 to thereayfConstitutional development of pakistan since 1947 to thereayf
Constitutional development of pakistan since 1947 to thereayfUniversity of Gujrat, Pakistan
 
Multiplication & division instructions microprocessor 8086
Multiplication & division instructions microprocessor 8086Multiplication & division instructions microprocessor 8086
Multiplication & division instructions microprocessor 8086University of Gujrat, Pakistan
 
Passive Thermal management for avionics in high temperature environment
Passive Thermal management for avionics in high temperature environmentPassive Thermal management for avionics in high temperature environment
Passive Thermal management for avionics in high temperature environmentUniversity of Gujrat, Pakistan
 
Future Integrated Systems Concept for Preventing Aircraft Loss-of-Control (L...
Future Integrated Systems Concept for Preventing Aircraft Loss-of-Control (L...Future Integrated Systems Concept for Preventing Aircraft Loss-of-Control (L...
Future Integrated Systems Concept for Preventing Aircraft Loss-of-Control (L...University of Gujrat, Pakistan
 
Hardware implementation of cots avionics system on unmanned
Hardware implementation of cots avionics system on unmannedHardware implementation of cots avionics system on unmanned
Hardware implementation of cots avionics system on unmannedUniversity of Gujrat, Pakistan
 
A wireless sensors network in Aircraft Control Systems
A wireless sensors network in Aircraft Control SystemsA wireless sensors network in Aircraft Control Systems
A wireless sensors network in Aircraft Control SystemsUniversity of Gujrat, Pakistan
 

Mais de University of Gujrat, Pakistan (20)

Natural disasters of pakistan
Natural disasters of pakistanNatural disasters of pakistan
Natural disasters of pakistan
 
Dual combustion cycle
Dual combustion cycleDual combustion cycle
Dual combustion cycle
 
Diesel cycle
Diesel cycleDiesel cycle
Diesel cycle
 
Carnot cycle
Carnot cycleCarnot cycle
Carnot cycle
 
Brayton cycle
Brayton cycleBrayton cycle
Brayton cycle
 
Constitutional development of pakistan since 1947 to thereayf
Constitutional development of pakistan since 1947 to thereayfConstitutional development of pakistan since 1947 to thereayf
Constitutional development of pakistan since 1947 to thereayf
 
Essay writing
Essay writingEssay writing
Essay writing
 
Letter writing (Communication Skills)
Letter writing (Communication Skills)Letter writing (Communication Skills)
Letter writing (Communication Skills)
 
Architecture of high end processors
Architecture of high end processorsArchitecture of high end processors
Architecture of high end processors
 
Architecture of pentium family
Architecture of pentium familyArchitecture of pentium family
Architecture of pentium family
 
Bus interface 8086
Bus interface 8086Bus interface 8086
Bus interface 8086
 
Internal microprocessor architecture
Internal microprocessor architectureInternal microprocessor architecture
Internal microprocessor architecture
 
Multiplication & division instructions microprocessor 8086
Multiplication & division instructions microprocessor 8086Multiplication & division instructions microprocessor 8086
Multiplication & division instructions microprocessor 8086
 
Wireless sensors network in Avionic control system
Wireless sensors network in Avionic control systemWireless sensors network in Avionic control system
Wireless sensors network in Avionic control system
 
An autonomous uav with an optical flow sensor
An autonomous uav with an optical flow sensorAn autonomous uav with an optical flow sensor
An autonomous uav with an optical flow sensor
 
Passive Thermal management for avionics in high temperature environment
Passive Thermal management for avionics in high temperature environmentPassive Thermal management for avionics in high temperature environment
Passive Thermal management for avionics in high temperature environment
 
Future Integrated Systems Concept for Preventing Aircraft Loss-of-Control (L...
Future Integrated Systems Concept for Preventing Aircraft Loss-of-Control (L...Future Integrated Systems Concept for Preventing Aircraft Loss-of-Control (L...
Future Integrated Systems Concept for Preventing Aircraft Loss-of-Control (L...
 
Hardware implementation of cots avionics system on unmanned
Hardware implementation of cots avionics system on unmannedHardware implementation of cots avionics system on unmanned
Hardware implementation of cots avionics system on unmanned
 
A wireless sensors network in Aircraft Control Systems
A wireless sensors network in Aircraft Control SystemsA wireless sensors network in Aircraft Control Systems
A wireless sensors network in Aircraft Control Systems
 
Helicopter Automation Using Low Cost Sensors
Helicopter Automation Using Low Cost SensorsHelicopter Automation Using Low Cost Sensors
Helicopter Automation Using Low Cost Sensors
 

Último

Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESkarthi keyan
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical trainingGladiatorsKasper
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectGayathriM270621
 

Último (20)

Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subject
 

Protected mode memory addressing 8086

  • 1. Group :4 • Roll Number :001 • Roll Number :033 • Roll Number :035 • Roll Number :041 • Roll Number:045 University Of Gujrat
  • 3. PROTECTED MODE MEMORY ADDRESSING • Protected mode memory addressing allows access to data and programs located above the first 1M byte of memory. • Addressing this extended section of the memory system requires a change to the segment plus an offset addressing scheme used with real mode memory addressing.
  • 4. PROTECTED MODE MEMORY ADDRESSING • In protected addressing mode segments can be of variable size(below or above 64 KB). • Some system control instructions are only valid in the protected mode. • The offset part of the memory address is still the same as in real addressing mode. However, when in the protected mode, the processor can work either with 16-bit offsets or with 32- bit offsets.
  • 5. PROTECTED MODE MEMORY ADDRESSING • A 32-bit offset allows segments of up to 4G bytes. Notice that in real-mode the only available instruction mode is the 16-bit mode. • One difference between real and protected addressing mode is that the segment address, as discussed with real mode memory addressing, is no longer present in the protected mode.
  • 6. PROTECTED MODE MEMORY ADDRESSING • In place of the segment address, the segment register contains a selector • The selector selects a descriptor from a descriptor table. • The descriptor describes the memory segment's location, length, and access rights. This is similar to selecting one card from a deck of cards in one's pocket.
  • 7. PROTECTED MODE MEMORY ADDRESSING • The selector, located in the segment register, selects one of 8192 descriptors from one of two tables of descriptors (stored in memory): the global and local descriptor tables. The descriptor describes the location, length and access rights of the memory segment. • Each descriptor is 8 bytes long.
  • 8. PROTECTED MODE MEMORY ADDRESSING • The 8192 descriptor table requires 8 * 8192 = 64K bytes of memory.
  • 9. INTRO TO PROTECTED MODE MEMORY ADDRESSING  Data and programs located within & above the first 1M byte of memory • Protected mode is where Windows operates. • The segment register contains a selector that selects a descriptor from a descriptor table. • The descriptor describes the memory segment’s location, length, and access rights.
  • 10. Selectors and Descriptors • The selector is located in the segment register • Describes the location, length, and access rights of the segment of memory. • it selects one of 8192 descriptors from one of two tables of descriptors. • Indirectly, the register still selects a memory segment, but not directly as in real mode.
  • 11. Descriptors table• • Two types of Descriptor table selected by the segment register. • Global descriptors contain segment definitions that apply to all programs. • a global descriptor might be called a system descriptor • Local descriptors are usually unique to an application. • Local descriptor an application descriptor . • global and local descriptor tables are a maximum of 64K bytes in length
  • 12. The format of a descriptor for the 80286 .
  • 13. Explanation • each descriptor is 8 bytes in length. • The base address of the descriptor indicates the starting location of the memory segment. • The G, or granularity bit allows a segment length of 4K to 4G bytes in steps of 4K bytes. • 32-bit offset address allows segment lengths of 4G bytes • 16-bit offset address allows segment lengths of 64K bytes.
  • 14. The access rights byte for the 80286 descriptor
  • 15. The access rights byte controls access to the protected mode segment • describes segment function in the system and allows complete control over the segment • if the segment is a data segment, the direction of growth is specified • If the segment grows beyond its limit,the • operating system is interrupted, indicating a general protection fault.
  • 16. The contents of a segment register during protected mode operation of the 80286 microprocessors.
  • 17.  Descriptors are chosen from the descriptor table by the segment register. • register contains a 13-bit selector field, a table selector bit, and requested privilege level field. • The TI bit selects either the global or the local descriptor table. • Requested Privilege Level (RPL) requests the access privilege level of a memory segment.
  • 19. Explanation  the segment register, containing a selector.  chooses a descriptor from the global descriptor table.  The entry in the global descriptor table selects a segment in the memory system  Descriptor zero is called the null descriptor, must contain all zeros, and may not be used for accessing memory.
  • 21. Memory Paging  In the paging memory-management scheme, the operating system retrieves data from secondary storage in same-size blocks called pages.  The Memory management unit consists of  Segmentation unit and  Paging unit.  Segmentation unit allows segments of size 4Gbytes at max.  The Paging unit organizes the physical memory in terms of pages of 4kbytes size each.
  • 22.  Mechanism available in the 80386 and up. Allows a linear address ( program generated ) of a program to be located in any portion of physical memory. Paging unit works under the control of the segmentation unit, i.e. each segment is further divided into pages.
  • 23.  The linear address is invisibly translated to any physical address Through paging to the hard disk drive and paging to the memory through the memory paging unit, any Windows application can be executed GenerateProgram Linear Address Through Paging Physical Address
  • 24.  The name EMM386 was used for the expanded memory managers of both Microsoft's and MS-DOS which created expanded memory using extended memory on Intel 80386 CPUs.  Expanded memory is a system that provided additional memory to DOS programs beyond the limit of conventional memory .  The paging system operates in both real and protected mode.
  • 25. The paging unit is controlled by the microprocessors control registers:
  • 26. Paging Registers  It is enabled by setting the PG bit to 1 (left most bit in CR0 ). (If set to 0, linear addresses are physical addresses).  CR3 contains the page directory "physical" base address.  Each page directory entry contain 1024 directory entries of 4 byte each.  Each page directory entry addresses a page table that contains up to 1024 entries.
  • 27.
  • 28. Count…. The virtual address is broken into three pieces  Directory : Each page directory addresses a 4MB section of main mem.  Page Table : Each page table entry addresses a 4KB section of main mem.  Offset : Specifies the byte in the page.