INTEL x86 AND ARM DATA TYPES
⦁ Are instructions set architecture
⦁ Change code into instructions a processor can understand and execute.
⦁ Determines which operating systems and apps to run.
INTEL x86 AND ARM DATA TYPES
⦁ Are instructions set architecture
⦁ Change code into instructions a processor can understand and execute.
⦁ Determines which operating systems and apps to run.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
2. Salient Features Of 80386 Microprocessor
(1). 80386 Microprocessor Introduced in 1985 by Intel Corporation.
(2). Address bus is of 32-bit & Data bus is of 32-bit.
(3). 80386 Microprocessor can address up to 232 i.e. 4G bytes of memory.
(4). Operating frequency of 20-33 MHz .
(5). Contains total 132 Pins.
(6). Intel’s first practical microprocessor to contain a 32-bit data bus and 32-bit memory
address
(7). 80386 had higher clocking speeds and included a memory management unit.
(8). Improved efficiency, reduced software overload.
(9). Instruction set, memory management upward-compatible with 8086, 8088, and 80286
Microprocessor.
(10). Can operates in real, protected & virtual Mode.
(11). Introduced paging, virtual memory concept.
(12). Based on CMOS Technology.
(13). Contains near about 2,75,000 Transistors.
(14). Can operate at 11.4 MIPS.
(15). 11 Addressing modes.
2
3. Versions of 80386 Microprocessor
(A) 80386 SX (B) 80386 DX
(1). A.B. is of 32 Bit. (1). A.B. is of 24 Bit.
(2). D.B. is of 32 Bit. (2). D.B. is of 16 Bit.
(3). Total 132 Pins. (3). Total 100 Pins.
(4). Can address upto (4). Can address upto
4GB of memory. 16MB of memory.
3
5. Register Organization Of 80386
(1). The 80386 has eight 32 - bit general purpose registers which may be used as
either 8 bit or 16 bit registers.
(2). A 32 - bit register known as an extended register, is represented by the register
name with prefix E.
(3). Example : A 32 bit register corresponding to AX is EAX, similarly BX is EBX etc.
(4). The 16 bit registers BP, SP, SI and DI in 8086 are now available with their
extended size of 32 bit and are names as EBP,ESP,ESI and EDI.
(5). AX represents the lower 16 bit of the 32 bit register EAX.
(6). BP, SP, SI, DI represents the lower 16 bit of their 32 bit counterparts, and can be
used as independent 16 bit registers.
(7). The CS and SS are the code and the stack segment registers respectively, while
DS, ES, FS, GS are 4 data segment registers.
5
6. Flag Register of 80386 Microprocessor
• The Flag register of 80386 is a 32 bit register. Out of the 32 bits, Intel has
reserved bits D18 to D31, D5 and D3, while D1 is always set at 1.
• Two extra new flags are added to the 80286 flag to derive the flag register of
80386. They are VM and RF flags.
6
7. Flag Register of 80386 Microprocessor
(1). IOPL (Input Output Privilege Level) flags:- For protected mode operations
indicates the privilege level, 0 to 3, at which your code must be running in
order to execute any I/O-related instructions.
(2). VM Virtual 8086 mode flag:- When it is set, the x86 processor is basically
converted into a high-speed 8086 processor.
(3). RF:- Resume Flag This flag is used with the debug register break points. It is
checked at the starting of every instruction cycle.
• The RF is automatically reset after successful execution of every instruction.
(4). NT :- (Nested Task) The processor uses the nested task flag to control chaining
of interrupted and called tasks.
7
8. VM - Virtual Mode Flag
• If this flag is set, the 80386 enters the virtual
8086 mode within the protection mode.
• This is to be set only when the 80386 is in
protected mode.
• This bit can be set using IRET instruction or any
task switch operation only in the protected
mode. 8
9. RF- Resume Flag
• It is checked at the starting of every instruction cycle and if it
is set, any debug fault is ignored during the instruction cycle.
• The RF is automatically reset after successful execution of
every instruction, except for IRET and POPF instructions.
• JMP, CALL and INT instructions are used to set the RF to the
value specified by the memory data available at the stack.
9
10. • Segment Descriptor Registers:
This registers are not available for programmers, rather they are
internally used to store the descriptor information, like attributes,
limit and base addresses of segments.
The six segment registers (i.e. CS,SS,DS,ES,FS,GS) have
corresponding six 73 bit descriptor registers. Each of them contains
32 bit base address, 32 bit base limit and 9 bit attributes.
These are automatically loaded when the corresponding segments
are loaded with selectors.
• Control Registers:
The 80386 has three 32 bit control registers CR0, CR2 and CR3
Load and store instructions are available to access these registers.
10
11. • System Address Registers:
• The 80386 supports four types of descriptor table, viz.
(1) Global Descriptor Table (GDT),
(2) Interrupt Descriptor Table (IDT),
(3) Local Descriptor Table (LDT),
(4) Task State Segment Descriptor (TSS).
• They holds the addresses of corresponding segments.
11
12. Debug and Test Registers
32 0
Linear Breakpoint Address 0 DR0
Linear Breakpoint Address 1 DR1
Linear Breakpoint Address 2
DR2
Linear Breakpoint Address 3 DR3
Intel Reserved DR4
Intel Reserved DR5
Breakpoint Status DR6
Breakpoint Control DR7
32 0
Test Control TR6
Test Status TR7
12
13. • Debug and Test Registers:
• Intel has provide a set of 8 debug registers for hardware debugging.
• Out of these eight registers DR0 to DR7, two registers DR4 and DR5 are
Intel reserved.
• The initial four registers DR0 to DR3 store four program controllable
breakpoint addresses, while DR6 and DR7 respectively hold breakpoint
status and breakpoint control information.
• Two more test register are provided by 80386 for page cacheing namely
test control and test status register. 13
14. Addressing Modes
• 80386 supports total 11 addressing modes.
• Scaled Indexed Mode: Contents of the an index register are multiplied by a
scale factor (the valid scale factors are 1,2,4 & 8) that may be added further to
get the operand offset.
e.g. MOV EBX, LIST [ESI*2]
• Based Scaled Indexed Mode: Contents of the an index register are multiplied by
a scale factor and then added to base register to obtain the offset.
e.g. MOV EBX, LIST [EDX*4] [ECX]
• Based Scaled Indexed Mode with Displacement: The Contents of the an index
register are multiplied by a scaling factor and the result is added to a base
register and a displacement to get the offset of an operand.
e.g. MOV EAX, LIST [ESI*2] [EBX+0800]
14
15. Data Types Of 80386
(1). Bit.
(2). Bit field-A group of at most 32 bits i.e., 4 bytes.
(3). Bit string- A string of continuous bits of maximum 4Gbytes length.
(4). Signed Byte- Signed byte data. Sign of the operand depends upon its most
significant bit. If it is 0, then the number is positive. else it is negative. Range
is from -128 to 127.
(5). Unsigned Byte-Unsigned byte data.Range from 0 to 255.
(6). Integer word- Signed 16-bit data. Range from -32,768 to 32,767.
(7). Long Integer-32-bit signed data that is represented in 2's complement form.
Range is from -2.147*109 to 2.1479.
(8). Unsigned Integer Word- Unsigned 16-bit data.Range from 0 to 65,535.
(9). Unsigned Long Integer-Unsigned 32 bit data. Range from 0 to 4,294,967,295.
15
16. (10). Signed quad word- A signed 64-bit or four word data.
(11). Unsigned Quad Word-An unsigned 64-bit data.
(12). Offset-A 16 or 32- bit displacement that references a memory location using
any of the addressing modes.
(13). Pointer-16-bit selector and 16 or 32 bit offset.
(14). Character-An ASCII equivalent to any of the alphanumeric or control
characters .
(15). Strings-These are the sequences of bytes, words or double words . A string
may contain up to maximum 4 GB.
(16). BCD- Decimal digits from 0-9 represented by unpacked bytes.
(17). Packed BCD- This represents two packed BCD digits using a byte from 00 to
99.
16
17. Real Addressing Mode
(1). After reset, the 80386 starts from memory location FFFFFFF0H under the real address
mode.
(2). In the real mode, 80386 works as a faster 8086 with 32-bit registers and data types.
(3). In real mode, the default operand size is 16 bit but 32- bit operands and addressing
modes may be used.
(4). The segment size in real mode is 64K.
(5). The real mode initializes the 80386 and prepares it for protected mode.
(6). The segments in 80386 real mode may be overlapped or non-overlapped.
(7). The segment in 80386 real mode can be read, write or executed, i.e. no protection is
available.
17
19. Protected Mode of 80386
(1). All the capabilities of 80386 are available for utilization in its protected mode of
operation.
(2). The 80386 in protected mode support all the software written for 80286 and 8086 to
be executed under the control of memory management and protection abilities of
80386.
(3). The protected mode allows the use of additional instruction, addressing modes and
capabilities of 80386.
(4). The effective address (offset) is added with segment base address to calculate linear
address.
(5). This linear address is further used as physical address, if the paging unit is disabled,
otherwise the paging unit converts the linear address into physical address.
(6). The paging unit operates under the control of segmentation unit. The paging unit if
enabled converts linear addresses into physical address, in protected mode.
19
20. Segmentation
DESCRIPTOR TABLES:
These descriptor tables and registers are manipulated by the operating
system to ensure the correct operation of the processor, and hence the
correct execution of the program. Three types of the 80386 descriptor
tables are listed as follows:
(1). GLOBAL DESCRIPTOR TABLE ( GDT )
(2). LOCAL DESCRIPTOR TABLE ( LDT )
(3). INTERRUPT DESCRIPTOR TABLE ( IDT )
20
21. • GDT
(1). Maintains list of Most Segments
(2). It’s a general Purpose table of descriptors.
(4). 48-bit register.
• IDT
(1). Maintains list of Interrupt service routines.
(2). 48-bit register.
• LDT
(1) Optional.
(2) Extends range of GDT.
(3) Is allocated to each task when multitasking is enabled.
(4). 16-bit register.
21
22. Segment Descriptor Format
(1). A ( Accessed) : Processor automatically sets this bit whenever a memory
reference is made using the defined segment .
(2). DPL : Indicates the level of privilege associated with the memory space that
descriptor defines. DPL0 is highest while DPL3 is lowest.
(3). S ( System ) : If clear indicates that this is system segment descriptor. If set non-
system.
22
23. (4). P ( Present): If clear, the address range that this descriptor defines is considered to be
temporarily not present in physical memory space.
(5). U ( User): Undefined and ignored by 80386,but user can use it.
(6). X : Reserved
(7). D ( Default):When clear operands in this is segment is assumed to be 16 bits and when set
assumed to be 32 bits.
(8). G ( Granularity): When this bit is cleared ,the 20 bit limit field is assumed to be measured in
units of 1 byte. If set the limit is in units of 4 KB.
(9) Type (3): Type of segment you are defining.
(a). 000: Data , read only ( ROM space)
(b). 001: Data ,R/W
(c). 010: Stack read only
(d). 011: Stack R/W
(e). 100: Code, execute only
(f). 101: Code execute/ read
(g). 110: Code execute only , conforming
(h). 111:Code execute / read, conforming 23
24. Paging
(1). Paging is one of the memory management techniques used for
virtual memory multitasking operating system.
(2). The segmentation scheme may divide the physical memory into
a variable size segments but the paging divides the memory into
a fixed size pages.
(3). The segments are supposed to be the logical segments of the
program, but the pages do not have any logical relation with the
program.
(4). The pages are just fixed size portions of the program module or
data. 24
25. (5). The advantage of paging scheme is that the complete segment of a task need
not be in the physical memory at any time.
(6). Only a few pages of the segments, which are required currently for the
execution need to be available in the physical memory.
(7). Thus the memory requirement of the task is substantially reduced,
relinquishing the available memory for other tasks.
(8). Whenever the other pages of task are required for execution, they may be
fetched from the secondary storage.
(9). The previous page which are executed, need not be available in the memory,
and hence the space occupied by them may be relinquished for other tasks.
(10). Thus paging mechanism provides an effective technique to manage the
physical memory for multitasking systems.
25
27. Paging Unit:
(1). The paging unit of 80386 uses a two level table mechanism to convert a linear address
provided by segmentation unit into physical addresses.
(2). The paging unit converts the complete map of a task into pages, each of size 4K.
(3). The task is further handled in terms of its page, rather than segments.
(4). The paging unit handles every task in terms of three components namely page directory,
page tables and page itself.
Page Directory:
(1). This is at the most 4Kbytes in size. Each directory entry is of 4 bytes, thus a total
of 1024 entries are allowed in a directory.
(2). The upper 10 bits of the linear address are used as an index to the corresponding
page directory entry. The page directory entries point to page tables.
27
28. Page Tables:
(1). Each page table is of 4Kbytes in size and many contain a maximum of 1024
entries.
(2). The page table entries contain the starting address of the page and the
statistical information about the page.
(3). The upper 20 bit page frame address is combined with the lower 12 bit of the
linear address.
(4). The accessed bit A is set by 80386 before any access to the page. If A=1, the
page is accessed, else unaccessed.
(5). The D bit ( Dirty bit) is set before a write operation to the page is carried out.
(6). The OS reserved bits are defined by the operating system software.
(7). The User / Supervisor (U/S) bit and read/write bit are used to provide
protection.
28
29. Virtual 8086 Mode
(1). Thus, the virtual 8086 mode of operation of 80386, offers an advantage of executing 8086
programs while in protected mode.
(2). The address forming mechanism in virtual 8086 mode is exactly identical with that of 8086 real
mode.
(3). In virtual mode, 8086 can address 1Mbytes of physical memory that may be anywhere in the
4Gbytes address space of the protected mode of 80386.
(4). Like 80386 real mode, the addresses in virtual 8086 mode lie within 1Mbytes of memory.
(5). In virtual mode, the paging mechanism and protection capabilities are available at the service of
the programmers.
(6). The 80386 supports multiprogramming, hence more than one programmer may be use the CPU at
a time.
(7). Paging unit may not be necessarily enable in virtual mode, but may be needed to run the 8086
programs which require more than 1Mbyts of memory for memory management function.
(8). In virtual mode, the paging unit allows only 256 pages, each of 4Kbytes size.
(9). Each of the pages may be located anywhere in the maximum 4Gbytes physical memory.
(10). The virtual mode allows the multiprogramming of 8086 applications.
29
30. 80486 Microprocessor
(1). Introduced in 1989.
(2). Can execute around 40 million instructions per second.
(3). On chip floating point unit for faster execution of complex instructions.
(4). Having operating frequency of 16MHz to 50MHz.
(5). Total 168 pins.
(6). Paging & Virtual memory concept.
(7). Multiprocessor support.
(8). Data bus is of 32 bits.
(9). Address bus is of 32 bits.
(10). High speed data transfer.
(11). More than 1.2 million transistors.
(12). Can address up to 4 billion bytes of memory.
(13). Can operate in real & protected mode.
(14). Contains 80387 arithmetic co processor.
(15). Uses Pipelining i.e. can execute up to 1 instruction per clock cycle.
30
31. Flag Register of 80486 Microprocessor
FLAGS
31 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
E
F RESERVED FOR
L INTEL AC VM RF 0 NT IOPL OF DF IF TF SF ZF 0 AF 0 PF 1 CF
A
G
CF: Carry Flag
AF: Auxiliary carry
OF : Over Flow
ZF: Zero Flag
IOPL : I/O Privilege Level
SF : Sign Flag
NT : Nested Task Flag
TF : Trap Flag RF : Resume Flag
IE : Interrupt Enable VM : Virtual Mode
AC : Alignment Check
DF : Direct Flag
31
32. Flag Register of 80486
(1). The register set of 80486 is similar to that of 80386.
(2). Only a flag called alignment flag is added at the
position D18.
(3). If the AC flag is set to ’1’, whenever there is an access
to a misaligned address i.e. a fault (exception) is
generated.
32
33. 80586 (Pentium) Microprocessor
(1). Pentium (80586) Microprocessor was introduced in 1993.
(2). Data bus is of 64-bit & address bus is of 32 bits.
(3). Superscalar performance: can execute 2 instructions per clock cycle.
(4). Introductory versions operated with a clocking frequency of 60 MHz & 66 MHz.
(5). Can address up to 4G bytes of memory.
(6). Contains total 237 pins.
(7). Memory access time near about 18 ns.
(8). Contains near about 3.1 millions of transistors.
(9). High-level system functions such as power management and security.
(10). Allows 4MByte memory pages instead of the 4KByte pages.
(11). The numeric coprocessor operates at about five times faster than the 80486 numeric
coprocessor.
(12). A dual-integer processor often allows two instructions per clock.
(13). Super pipelined architecture.
(14). Having speed of 110 MIPs.
33
34. Register Organization Of Pentium
(80586) Processor
• Four 32-bit registers can be used as
• Four 32-bit register (EAX, EBX, ECX, EDX)
• Four 16-bit register (AX, BX, CX, DX)
• Eight 8-bit register (AH, AL, BH, BL, CH, CL, DH, DL)
• Some registers have special use ECX for count in loop instructions,
34
37. Flag Register of Pentium Processor
(1). ID:- The identification flag is used lb test for the CPUID
instruction. If a program can set and clear the ID flag, the
processor supports the CPUID instruction.
(2). VIP:- Virtual interrupt pending indicates that a virtual interrupt
is pending.
(3). VIF :- Virtual interrupt is the image of the virtual interrupt flag
IF used with VIP.
37