SlideShare a Scribd company logo
Term Paper On Intel 80486 Microprocessor            R




                 DARPAN DEKIVADIYA                                         JEMIS JIVANI
                        09BCE008                                               09BCE017
      Department of Computer Science & Engineering           Department of Computer Science & Engineering
                 Institute of Technology                                Institute of Technology
                    Nirma University                                       Nirma University
                   Ahmedabad 382 481                                      Ahmedabad 382 481
                      Gujarat, India.                                        Gujarat, India.
            Email: 09BCE008@nirmauni.ac.in                         Email: 09BCE017@nirmauni.ac.in



            I.   I NTRODUCTION
1) The 32-bit 80486 is the next evolutionary step up from
   the 80386.

2) One of the most obvious feature included in 80486
   is a built in math co processor. This coprocessor is
   essentially the same as the 80386 but being integrated
   on the chip allows it to execute math instruction about
   three times as fast as a 80386/387 combination.

3) 80486 is an 8kbyte code and cache

4) To make room for the additional signal, the 80486 is
   packed in 168 pin, pin grid array package instead of
   132 pin PGA used for the 80386.

5) The 32-bit CPU 80486 from Intel is the first processor
   with an inbuilt floating point unit.
Fig. 1.   Intel 80486 Architecture
II.   A RCHITECTURE                                14) FLUSH: The cache flush input forces the microprocessor
                                                                    to erase the contents of its 8K byte internal cache.
 1) A 31- A2: Address outputs A31-A2 provide the memory
    and I/O with the address during normal operation. Dur-      15) EADS: The external address strobe input is used with
    ing a cache line invalidation A31-A4 are used to drive          AHOLD to signal that an external address is used to
    the microprocessor.//                                           perform a cache invalidation cycle.
 2) A20M3: The address bit 20 mask causes the 80486 to
    wrap its address around from location 000FFFFFH to          16) FERR: The floating point error output indicates that
    00000000H as in 8086. This provides a memory system             the floating point coprocessor has detected an error
    that functions like the 1M byte real memory system in           condition. It is used to maintain compatibility with
    the 8086 processors.                                            DOS software.

 3) ADS: The address data strobe becomes logic zero to          17) 8 BS: The bus size 8, input causes the 80486 to structure
    indicate that the address bus contains a valid memory           itself with an 8-bit data bus to access byte-wide memory
    address.                                                        and I/O components.

 4) AHOLD: The address hold input causes the                    18) 16 BS: The bus size 16, input causes the 80486
    microprocessor to place its address bus connections at          to structure itself with a 16-bit data bus to access
    their high-impedance state, with the remainder of the           word-wide memory and I/O components.
    buses staying active. It is often used by another bus
    master to gain access for a cache invalidation cycle.       19) PCHK: The parity check output indicates that a parity
                                                                    error was detected during a read operation on the DP3
 5) BREQ: This bus request output indicates that the 486            - DP0 pin.
    has generated an internal bus request.
                                                                20) PLOCK: The pseudo-lock output indicates that current
 6) 3 0 BE-BE: Byte enable outputs select a bank of                 operation requires more than one bus cycle to perform.
    the memory system when information is transferred               This signal becomes a logic 0 for arithmetic coprocessor
    between the microprocessor and its memory and I/O.              operations that access 64 or 80 bit memory data.
    The BE3 signal enables D31 - D24, BE2 enables
    D23-D16, BE1 enables D15 - D8 and BE0 enables               21) PWT: The page write through output indicates the state
    D7-D0.                                                          of the PWT attribute bit in the page table entry or the
                                                                    page directory entry.
 7) BOFF: The Back-off input causes the microprocessor
    to place its buses at their high impedance state during     22) RDY: The ready input indicates that a non-burst bus
    the next cycle. The microprocessor remains in the bus           cycle is complete. The RDY signal must be returned
    hold state until the BOFF pin is placed at logic 1 level.       or the microprocessor places wait states into its timing
                                                                    until RDY is asserted.
 8) NMI: The non-mask able interrupt input requests a type
    2 interrupt.

 9) BRDY: The burst ready input is used to signal the
    microprocessor that a burst cycle is complete.

10) KEN: The cache enable input causes the current bus to
    be stored in the internal.

11) LOCK: The lock output becomes a logic 0 for any
    instruction that is prefixed with the lock prefix.

12) W / R: current bus cycle is either a read or a write.

13) IGNNE: The ignore numeric error input causes the
    coprocessor to ignore floating point error and to
    continue processing data. The signal does not affect the
    state of the FERR pin.
Fig. 2.   pin diagram of 80486
Flag Registers
1) The extended flag register EFLAG is illustrated in the
   figure. The only new flag bit is the AC alignment check,
   used to Indicate that the microprocessor has accessed a
   word at an odd address or a double word boundary.

2) Efficient software and execution require that data be
   stored at Word or double word boundaries.

3) Other common flags between 80486-80386 like
   carry flag(CF),parity flag(PF),auxiliary flag(AF),zero
   flag(ZF), Sign flag(SF),trap flag(TF),interrupt flag(IF),
   direction flag(DF),overflow flag(OF) are set or reset
   according to 80486 instruction set and same as 80386.

4) In the common flags six are control flag and three flags
   are conditional flags.

5) The 80486 has four control flag register which is same
   as in 80386 microprocessor. Five extra bits are added
   to the 80486 is :Alignment mask (AM), numeric error
   (NE), write protect (WP),cache disable (CD), not-write
   through (NW).

6) AM flag is set to 1 when data alignment is check
   alignment mask in or set to 0 when alignment mask
   out. A double word of the data that is not stored at an
   address that is a multiple of four is said to be unaligned.
   If an unaligned double word storage location accessed,
   two memory bus cycles must be performed. The extra
   bus cycle introduce because the data is unaligned
   reduce overall system performance so, alignment check
   flag are used to identify alignment.

7) CD and NW flags are used to enable and control the
   operation of on the on chip cache memory. To enable
   the cache memory for the operation, CD must be
   cleared to 0.the NW flag enables write through and
   cache validation cycles to take place when it is set to 0.    Fig. 3.   flag register of 80486
General Purpose Reg.




      Fig. 4.   general purpose register of 80486
Features                                                         Memory System
•   Addressing modes                                             1) The memory system for the 486 is identical to 386
                                                                    microprocessor. The 486 contains 4G bytes of memory
    1. Scaled indexed mode                                          beginning at location 00000000H and ending at
    -Content of an index register are multiply by scale factor      FFFFFFFFH.
    that may be added further to get the operand offset.
    2. Based scaled indexed mode                                 2) The major change to the memory system is internal
    -Content of an index register are multiply by scale             to 486 in the form of 8K byte cache memory, which
    factor that may be then added to base register to get the       speeds the execution of instructions and the acquisition
    operand offset.                                                 of data.
    3.Based scaled indexed mode with displacement
    -Content of an index register are multiply by scale          3) Another addition is the parity checker/ generator built
    factor and the result is added to a base register and a         into the 80486 microprocessor.
    displacement to get operand offeset.
                                                                 Parity Checker / Generator:
•   Interrupts                                                   •   Parity is often used to determine if data are correctly
                                                                     read from a memory location. INTEL has incorporated
    -80486 can handle 256(00 to FFh) hardware interrupts             an internal parity generator / decoder.
    on its INTR pin. The structure of the interrupt vector
    table(IVT) is same as the 8086 and it is handled by          •   Parity is generated by the 80486 during each write cycle.
    interrupt descriptor table which contain 256 possible            Parity is generated as even parity and a parity bit is
    interrupt vectors. Out of 256, 32 are used by Intel and          provided for each byte of memory. The parity check bits
    remaining are free for user.                                     appear on pins DP0-DP3, which are also parity inputs
                                                                     as well as parity outputs.
•   Data types
                                                                 •   These are typically stored in memory during each write
    1.Signed/unsigned data type                                      cycle and read from memory during each read cycle.
    -8-bit, 16-bit 32-bit signed/unsigned integer are
    supported.                                                   •   On a read, the microprocessor checks parity and generates
    2.Floating point data type                                       a parity check error, if it occurs on the PCHK pin. A
    -Single precision, double precision extended precision           parity error causes no change in processing unless the
    real data are supported                                          user applies the PCHK signal to an interrupt input.
    3.BCD data type                                              •   Interrupts are often used to signal a parity error in
    -It supports 8-bit packed and unpacked data                      DS-based computer systems. This is same as 80386,
    4.String data type                                               except the parity bit storage.
    -String of bit, bytes, words and double words are
    supported by CPU, each may contain up to 4GHz.               •   If parity is not used, Intel recommends that the DP0 -
    5.ASCII data type                                                DP3 pins be pulled up to +5v.
    -It is used for representation of characters.
    6.Pointer data type
                                                                 Cache Memory
    -48-bit pointers containing 32-bit offset at the LSB and
    16-bit selector at MSB are supported by CPU.                 •   The cache memory system stores data used by a program
                                                                     and also the instructions of the program. The cache is
                                                                     organized as a 4 way set associative cache with each
                                                                     location containing 16 bytes or 4 double words of data.

                                                                 •   Control register CR0 is used to control the cache with two
                                                                     new control bits not present in the 80386 microprocessor.
Summary                                                       Reference
1) Thus in sort 80486 is updated version of 80386.            •   The architecture of 80386-80486 microprocessor By Wal-
                                                                  ter A. Treble and Avtar Singh.
2) It has 8Byte code and cache.                               •   www.microprocessor-assembly.com / 80486
                                                              •   www.ebooks.com/80486-processor
3) It is the processor with inbuilt floating point unit
4) It has tightly coupled pipelining which allows 80486 to
   complete an instruction like a simple ALU.

5) It has more no of flag registers then 8086 like AC,
   I/Opl, NT, RF VM.

6) It has the same memory system as 80386 have. Which
   contains the memory addresses from 00000000H to
   FFFFFFFFH.

7) It also has in built parity checker and parity generator
   circuit which is used to check that a data read from
   memory is correct or not.

More Related Content

What's hot

80486 and pentium
80486 and pentium80486 and pentium
80486 and pentium
Vikshit Ganjoo
 
8086
80868086
Microprocessor 80386
Microprocessor 80386Microprocessor 80386
Microprocessor 80386yash sawarkar
 
Presentation on 8086 Microprocessor
Presentation  on   8086 MicroprocessorPresentation  on   8086 Microprocessor
Presentation on 8086 Microprocessor
Nahian Ahmed
 
Microprocessor 8086
Microprocessor 8086Microprocessor 8086
Microprocessor 8086
Gopikrishna Madanan
 
80386 & 80486
80386 & 8048680386 & 80486
80386 & 80486
RakeshKumarSharma46
 
INTEL 80386 MICROPROCESSOR
INTEL  80386  MICROPROCESSORINTEL  80386  MICROPROCESSOR
INTEL 80386 MICROPROCESSOR
Annies Minu
 
80386 Architecture
80386 Architecture80386 Architecture
80386 Architecture
Rohit Choudhury
 
Memory Segmentation of 8086
Memory Segmentation of 8086Memory Segmentation of 8086
Memory Segmentation of 8086
Nikhil Kumar
 
Introduction to 80386 microprocessor
Introduction to 80386 microprocessorIntroduction to 80386 microprocessor
Introduction to 80386 microprocessor
Shehrevar Davierwala
 
8086 micro processor
8086 micro processor8086 micro processor
8086 micro processor
Poojith Chowdhary
 
8086 architecture
8086 architecture8086 architecture
8086 architecture
JAMEELAPARVEENK
 
Introduction to 80386
Introduction to 80386Introduction to 80386
Introduction to 80386
Abinaya B
 
8086 architecture and pin description
8086 architecture and pin description 8086 architecture and pin description
8086 architecture and pin description
Aswini Dharmaraj
 
8251 USART
8251 USART8251 USART
8251 USART
coolsdhanesh
 
80286 microprocessor
80286 microprocessor80286 microprocessor
80286 microprocessor
Avin Mathew
 
Architecture of 8051 microcontroller))
Architecture of 8051 microcontroller))Architecture of 8051 microcontroller))
Architecture of 8051 microcontroller))Ganesh Ram
 
80386 processor
80386 processor80386 processor
80386 processor
Rasmi M
 
Register of 80386
Register of 80386Register of 80386
Register of 80386aviban
 

What's hot (20)

80486 and pentium
80486 and pentium80486 and pentium
80486 and pentium
 
8086
80868086
8086
 
Microprocessor 80386
Microprocessor 80386Microprocessor 80386
Microprocessor 80386
 
Presentation on 8086 Microprocessor
Presentation  on   8086 MicroprocessorPresentation  on   8086 Microprocessor
Presentation on 8086 Microprocessor
 
Microprocessor 8086
Microprocessor 8086Microprocessor 8086
Microprocessor 8086
 
80386 & 80486
80386 & 8048680386 & 80486
80386 & 80486
 
INTEL 80386 MICROPROCESSOR
INTEL  80386  MICROPROCESSORINTEL  80386  MICROPROCESSOR
INTEL 80386 MICROPROCESSOR
 
80386 Architecture
80386 Architecture80386 Architecture
80386 Architecture
 
Memory Segmentation of 8086
Memory Segmentation of 8086Memory Segmentation of 8086
Memory Segmentation of 8086
 
The 80386 80486
The 80386 80486The 80386 80486
The 80386 80486
 
Introduction to 80386 microprocessor
Introduction to 80386 microprocessorIntroduction to 80386 microprocessor
Introduction to 80386 microprocessor
 
8086 micro processor
8086 micro processor8086 micro processor
8086 micro processor
 
8086 architecture
8086 architecture8086 architecture
8086 architecture
 
Introduction to 80386
Introduction to 80386Introduction to 80386
Introduction to 80386
 
8086 architecture and pin description
8086 architecture and pin description 8086 architecture and pin description
8086 architecture and pin description
 
8251 USART
8251 USART8251 USART
8251 USART
 
80286 microprocessor
80286 microprocessor80286 microprocessor
80286 microprocessor
 
Architecture of 8051 microcontroller))
Architecture of 8051 microcontroller))Architecture of 8051 microcontroller))
Architecture of 8051 microcontroller))
 
80386 processor
80386 processor80386 processor
80386 processor
 
Register of 80386
Register of 80386Register of 80386
Register of 80386
 

Viewers also liked

Architecture of 80286 microprocessor
Architecture of 80286 microprocessorArchitecture of 80286 microprocessor
Architecture of 80286 microprocessor
Syed Ahmed Zaki
 
Pentium processor
Pentium processorPentium processor
Pentium processor
Pranjali Deshmukh
 
Salient featurs of 80386
Salient featurs of 80386Salient featurs of 80386
Salient featurs of 80386aviban
 
Addressing modes of 80386
Addressing modes of 80386Addressing modes of 80386
Addressing modes of 80386
PDFSHARE
 
Intel+80286
Intel+80286Intel+80286
Intel+80286
Dhanwantari Sali
 
Pentium (80586) Microprocessor By Er. Swapnil Kaware
Pentium (80586) Microprocessor By Er. Swapnil KawarePentium (80586) Microprocessor By Er. Swapnil Kaware
Pentium (80586) Microprocessor By Er. Swapnil KawareProf. Swapnil V. Kaware
 
Architecture of pentium family
Architecture of pentium familyArchitecture of pentium family
Architecture of pentium family
University of Gujrat, Pakistan
 
Pin Description Of Intel 80386 DX Microprocessor
Pin Description Of Intel 80386 DX MicroprocessorPin Description Of Intel 80386 DX Microprocessor
Pin Description Of Intel 80386 DX Microprocessor
Raunaq Sahni
 
Microprocessors - 80386DX
Microprocessors - 80386DXMicroprocessors - 80386DX
Microprocessors - 80386DX
PriyaDYP
 
Modes of 80386
Modes of 80386Modes of 80386
Modes of 80386aviban
 
History of microprocessors copy
History of microprocessors   copyHistory of microprocessors   copy
History of microprocessors copy
yvonne katsande
 
Pentium microprocessor
Pentium microprocessorPentium microprocessor
Pentium microprocessor
tanzidshawon
 
Signal descriptors of 8086
Signal descriptors of 8086Signal descriptors of 8086
Signal descriptors of 8086aviban
 
Microprocessors evolution introduction to microprocessor
Microprocessors  evolution introduction to microprocessorMicroprocessors  evolution introduction to microprocessor
Microprocessors evolution introduction to microprocessor
Vijay Kumar
 
Bidirectional data flow
Bidirectional data flowBidirectional data flow
Bidirectional data flow
Sai Malleswar
 
Intel® 80386 microprocessor registers
Intel® 80386 microprocessor registersIntel® 80386 microprocessor registers
Intel® 80386 microprocessor registers
Neel Shah
 
Pentium processor
Pentium processorPentium processor
Pentium processor
salmanjilani
 

Viewers also liked (19)

Architecture of 80286 microprocessor
Architecture of 80286 microprocessorArchitecture of 80286 microprocessor
Architecture of 80286 microprocessor
 
Pentium processor
Pentium processorPentium processor
Pentium processor
 
Salient featurs of 80386
Salient featurs of 80386Salient featurs of 80386
Salient featurs of 80386
 
Addressing modes of 80386
Addressing modes of 80386Addressing modes of 80386
Addressing modes of 80386
 
Intel+80286
Intel+80286Intel+80286
Intel+80286
 
Pentium (80586) Microprocessor By Er. Swapnil Kaware
Pentium (80586) Microprocessor By Er. Swapnil KawarePentium (80586) Microprocessor By Er. Swapnil Kaware
Pentium (80586) Microprocessor By Er. Swapnil Kaware
 
Architecture of pentium family
Architecture of pentium familyArchitecture of pentium family
Architecture of pentium family
 
Pin Description Of Intel 80386 DX Microprocessor
Pin Description Of Intel 80386 DX MicroprocessorPin Description Of Intel 80386 DX Microprocessor
Pin Description Of Intel 80386 DX Microprocessor
 
Intel80286
Intel80286Intel80286
Intel80286
 
Microprocessors - 80386DX
Microprocessors - 80386DXMicroprocessors - 80386DX
Microprocessors - 80386DX
 
Modes of 80386
Modes of 80386Modes of 80386
Modes of 80386
 
History of microprocessors copy
History of microprocessors   copyHistory of microprocessors   copy
History of microprocessors copy
 
Pentium microprocessor
Pentium microprocessorPentium microprocessor
Pentium microprocessor
 
Signal descriptors of 8086
Signal descriptors of 8086Signal descriptors of 8086
Signal descriptors of 8086
 
Microprocessors evolution introduction to microprocessor
Microprocessors  evolution introduction to microprocessorMicroprocessors  evolution introduction to microprocessor
Microprocessors evolution introduction to microprocessor
 
Bidirectional data flow
Bidirectional data flowBidirectional data flow
Bidirectional data flow
 
Number system conversion
Number system conversionNumber system conversion
Number system conversion
 
Intel® 80386 microprocessor registers
Intel® 80386 microprocessor registersIntel® 80386 microprocessor registers
Intel® 80386 microprocessor registers
 
Pentium processor
Pentium processorPentium processor
Pentium processor
 

Similar to Intel 80486 Microprocessor

Microprocessor & Assembly language by team blackhole
Microprocessor & Assembly language by team blackholeMicroprocessor & Assembly language by team blackhole
Microprocessor & Assembly language by team blackhole
Md Abdus Sobur Sikdar
 
8086
80868086
32- bit Microprocessor-Indtel 80386.pptx
32- bit Microprocessor-Indtel 80386.pptx32- bit Microprocessor-Indtel 80386.pptx
32- bit Microprocessor-Indtel 80386.pptx
Yuvraj994432
 
EC 8691 Microprocessor and Microcontroller.pptx
EC 8691 Microprocessor and Microcontroller.pptxEC 8691 Microprocessor and Microcontroller.pptx
EC 8691 Microprocessor and Microcontroller.pptx
GobinathAECEJRF1101
 
Module 4 advanced microprocessors
Module 4 advanced microprocessorsModule 4 advanced microprocessors
Module 4 advanced microprocessors
Deepak John
 
Cs14 406 80386-mod1
Cs14 406 80386-mod1Cs14 406 80386-mod1
Cs14 406 80386-mod1
Akhila Rahul
 
8086_architecture MMC PPT.ppt
8086_architecture MMC PPT.ppt8086_architecture MMC PPT.ppt
8086_architecture MMC PPT.ppt
JamesAlpha3
 
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.pptADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
NaganarasaiahGoud
 
Module 1 8086
Module 1 8086Module 1 8086
Module 1 8086
Deepak John
 
U I - 4. 80386 Real mode.pptx
U I - 4. 80386 Real mode.pptxU I - 4. 80386 Real mode.pptx
U I - 4. 80386 Real mode.pptx
SangeetaShekhawatTri
 
Mpi chapter 2
Mpi chapter 2Mpi chapter 2
Mpi chapter 2
birhanugirmay
 
The 8086 Micro Processor Architecture By Dr. RidhaJemal
The 8086 Micro Processor Architecture By Dr. RidhaJemalThe 8086 Micro Processor Architecture By Dr. RidhaJemal
The 8086 Micro Processor Architecture By Dr. RidhaJemal
Anas Sa
 
80386 microprocessor
80386 microprocessor80386 microprocessor
80386 microprocessor
Jerin Sebastian
 
Microprocessor 80286
Microprocessor 80286Microprocessor 80286
Microprocessor 80286
Smile Hossain
 
Ec 1303 microprocessor_its_applications
Ec 1303 microprocessor_its_applicationsEc 1303 microprocessor_its_applications
Ec 1303 microprocessor_its_applicationsMerin Jesuraj
 
Assembly_Language _Programming_UNIT.pptx
Assembly_Language _Programming_UNIT.pptxAssembly_Language _Programming_UNIT.pptx
Assembly_Language _Programming_UNIT.pptx
VickyThakur61
 
Students corner131
Students corner131Students corner131
Students corner131
Satti286
 
Processoer 80486
Processoer 80486Processoer 80486

Similar to Intel 80486 Microprocessor (20)

Microprocessor & Assembly language by team blackhole
Microprocessor & Assembly language by team blackholeMicroprocessor & Assembly language by team blackhole
Microprocessor & Assembly language by team blackhole
 
8086
80868086
8086
 
80486 micr
80486 micr80486 micr
80486 micr
 
Introduction to 80386
Introduction to 80386Introduction to 80386
Introduction to 80386
 
32- bit Microprocessor-Indtel 80386.pptx
32- bit Microprocessor-Indtel 80386.pptx32- bit Microprocessor-Indtel 80386.pptx
32- bit Microprocessor-Indtel 80386.pptx
 
EC 8691 Microprocessor and Microcontroller.pptx
EC 8691 Microprocessor and Microcontroller.pptxEC 8691 Microprocessor and Microcontroller.pptx
EC 8691 Microprocessor and Microcontroller.pptx
 
Module 4 advanced microprocessors
Module 4 advanced microprocessorsModule 4 advanced microprocessors
Module 4 advanced microprocessors
 
Cs14 406 80386-mod1
Cs14 406 80386-mod1Cs14 406 80386-mod1
Cs14 406 80386-mod1
 
8086_architecture MMC PPT.ppt
8086_architecture MMC PPT.ppt8086_architecture MMC PPT.ppt
8086_architecture MMC PPT.ppt
 
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.pptADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
 
Module 1 8086
Module 1 8086Module 1 8086
Module 1 8086
 
U I - 4. 80386 Real mode.pptx
U I - 4. 80386 Real mode.pptxU I - 4. 80386 Real mode.pptx
U I - 4. 80386 Real mode.pptx
 
Mpi chapter 2
Mpi chapter 2Mpi chapter 2
Mpi chapter 2
 
The 8086 Micro Processor Architecture By Dr. RidhaJemal
The 8086 Micro Processor Architecture By Dr. RidhaJemalThe 8086 Micro Processor Architecture By Dr. RidhaJemal
The 8086 Micro Processor Architecture By Dr. RidhaJemal
 
80386 microprocessor
80386 microprocessor80386 microprocessor
80386 microprocessor
 
Microprocessor 80286
Microprocessor 80286Microprocessor 80286
Microprocessor 80286
 
Ec 1303 microprocessor_its_applications
Ec 1303 microprocessor_its_applicationsEc 1303 microprocessor_its_applications
Ec 1303 microprocessor_its_applications
 
Assembly_Language _Programming_UNIT.pptx
Assembly_Language _Programming_UNIT.pptxAssembly_Language _Programming_UNIT.pptx
Assembly_Language _Programming_UNIT.pptx
 
Students corner131
Students corner131Students corner131
Students corner131
 
Processoer 80486
Processoer 80486Processoer 80486
Processoer 80486
 

More from Darpan Dekivadiya

Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency IdentificationDarpan Dekivadiya
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksDarpan Dekivadiya
 

More from Darpan Dekivadiya (7)

Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor Networks
 
Apache hadoop
Apache hadoopApache hadoop
Apache hadoop
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Intel 80486 Microprocessor

  • 1. Term Paper On Intel 80486 Microprocessor R DARPAN DEKIVADIYA JEMIS JIVANI 09BCE008 09BCE017 Department of Computer Science & Engineering Department of Computer Science & Engineering Institute of Technology Institute of Technology Nirma University Nirma University Ahmedabad 382 481 Ahmedabad 382 481 Gujarat, India. Gujarat, India. Email: 09BCE008@nirmauni.ac.in Email: 09BCE017@nirmauni.ac.in I. I NTRODUCTION 1) The 32-bit 80486 is the next evolutionary step up from the 80386. 2) One of the most obvious feature included in 80486 is a built in math co processor. This coprocessor is essentially the same as the 80386 but being integrated on the chip allows it to execute math instruction about three times as fast as a 80386/387 combination. 3) 80486 is an 8kbyte code and cache 4) To make room for the additional signal, the 80486 is packed in 168 pin, pin grid array package instead of 132 pin PGA used for the 80386. 5) The 32-bit CPU 80486 from Intel is the first processor with an inbuilt floating point unit.
  • 2. Fig. 1. Intel 80486 Architecture
  • 3. II. A RCHITECTURE 14) FLUSH: The cache flush input forces the microprocessor to erase the contents of its 8K byte internal cache. 1) A 31- A2: Address outputs A31-A2 provide the memory and I/O with the address during normal operation. Dur- 15) EADS: The external address strobe input is used with ing a cache line invalidation A31-A4 are used to drive AHOLD to signal that an external address is used to the microprocessor.// perform a cache invalidation cycle. 2) A20M3: The address bit 20 mask causes the 80486 to wrap its address around from location 000FFFFFH to 16) FERR: The floating point error output indicates that 00000000H as in 8086. This provides a memory system the floating point coprocessor has detected an error that functions like the 1M byte real memory system in condition. It is used to maintain compatibility with the 8086 processors. DOS software. 3) ADS: The address data strobe becomes logic zero to 17) 8 BS: The bus size 8, input causes the 80486 to structure indicate that the address bus contains a valid memory itself with an 8-bit data bus to access byte-wide memory address. and I/O components. 4) AHOLD: The address hold input causes the 18) 16 BS: The bus size 16, input causes the 80486 microprocessor to place its address bus connections at to structure itself with a 16-bit data bus to access their high-impedance state, with the remainder of the word-wide memory and I/O components. buses staying active. It is often used by another bus master to gain access for a cache invalidation cycle. 19) PCHK: The parity check output indicates that a parity error was detected during a read operation on the DP3 5) BREQ: This bus request output indicates that the 486 - DP0 pin. has generated an internal bus request. 20) PLOCK: The pseudo-lock output indicates that current 6) 3 0 BE-BE: Byte enable outputs select a bank of operation requires more than one bus cycle to perform. the memory system when information is transferred This signal becomes a logic 0 for arithmetic coprocessor between the microprocessor and its memory and I/O. operations that access 64 or 80 bit memory data. The BE3 signal enables D31 - D24, BE2 enables D23-D16, BE1 enables D15 - D8 and BE0 enables 21) PWT: The page write through output indicates the state D7-D0. of the PWT attribute bit in the page table entry or the page directory entry. 7) BOFF: The Back-off input causes the microprocessor to place its buses at their high impedance state during 22) RDY: The ready input indicates that a non-burst bus the next cycle. The microprocessor remains in the bus cycle is complete. The RDY signal must be returned hold state until the BOFF pin is placed at logic 1 level. or the microprocessor places wait states into its timing until RDY is asserted. 8) NMI: The non-mask able interrupt input requests a type 2 interrupt. 9) BRDY: The burst ready input is used to signal the microprocessor that a burst cycle is complete. 10) KEN: The cache enable input causes the current bus to be stored in the internal. 11) LOCK: The lock output becomes a logic 0 for any instruction that is prefixed with the lock prefix. 12) W / R: current bus cycle is either a read or a write. 13) IGNNE: The ignore numeric error input causes the coprocessor to ignore floating point error and to continue processing data. The signal does not affect the state of the FERR pin.
  • 4. Fig. 2. pin diagram of 80486
  • 5. Flag Registers 1) The extended flag register EFLAG is illustrated in the figure. The only new flag bit is the AC alignment check, used to Indicate that the microprocessor has accessed a word at an odd address or a double word boundary. 2) Efficient software and execution require that data be stored at Word or double word boundaries. 3) Other common flags between 80486-80386 like carry flag(CF),parity flag(PF),auxiliary flag(AF),zero flag(ZF), Sign flag(SF),trap flag(TF),interrupt flag(IF), direction flag(DF),overflow flag(OF) are set or reset according to 80486 instruction set and same as 80386. 4) In the common flags six are control flag and three flags are conditional flags. 5) The 80486 has four control flag register which is same as in 80386 microprocessor. Five extra bits are added to the 80486 is :Alignment mask (AM), numeric error (NE), write protect (WP),cache disable (CD), not-write through (NW). 6) AM flag is set to 1 when data alignment is check alignment mask in or set to 0 when alignment mask out. A double word of the data that is not stored at an address that is a multiple of four is said to be unaligned. If an unaligned double word storage location accessed, two memory bus cycles must be performed. The extra bus cycle introduce because the data is unaligned reduce overall system performance so, alignment check flag are used to identify alignment. 7) CD and NW flags are used to enable and control the operation of on the on chip cache memory. To enable the cache memory for the operation, CD must be cleared to 0.the NW flag enables write through and cache validation cycles to take place when it is set to 0. Fig. 3. flag register of 80486
  • 6. General Purpose Reg. Fig. 4. general purpose register of 80486
  • 7. Features Memory System • Addressing modes 1) The memory system for the 486 is identical to 386 microprocessor. The 486 contains 4G bytes of memory 1. Scaled indexed mode beginning at location 00000000H and ending at -Content of an index register are multiply by scale factor FFFFFFFFH. that may be added further to get the operand offset. 2. Based scaled indexed mode 2) The major change to the memory system is internal -Content of an index register are multiply by scale to 486 in the form of 8K byte cache memory, which factor that may be then added to base register to get the speeds the execution of instructions and the acquisition operand offset. of data. 3.Based scaled indexed mode with displacement -Content of an index register are multiply by scale 3) Another addition is the parity checker/ generator built factor and the result is added to a base register and a into the 80486 microprocessor. displacement to get operand offeset. Parity Checker / Generator: • Interrupts • Parity is often used to determine if data are correctly read from a memory location. INTEL has incorporated -80486 can handle 256(00 to FFh) hardware interrupts an internal parity generator / decoder. on its INTR pin. The structure of the interrupt vector table(IVT) is same as the 8086 and it is handled by • Parity is generated by the 80486 during each write cycle. interrupt descriptor table which contain 256 possible Parity is generated as even parity and a parity bit is interrupt vectors. Out of 256, 32 are used by Intel and provided for each byte of memory. The parity check bits remaining are free for user. appear on pins DP0-DP3, which are also parity inputs as well as parity outputs. • Data types • These are typically stored in memory during each write 1.Signed/unsigned data type cycle and read from memory during each read cycle. -8-bit, 16-bit 32-bit signed/unsigned integer are supported. • On a read, the microprocessor checks parity and generates 2.Floating point data type a parity check error, if it occurs on the PCHK pin. A -Single precision, double precision extended precision parity error causes no change in processing unless the real data are supported user applies the PCHK signal to an interrupt input. 3.BCD data type • Interrupts are often used to signal a parity error in -It supports 8-bit packed and unpacked data DS-based computer systems. This is same as 80386, 4.String data type except the parity bit storage. -String of bit, bytes, words and double words are supported by CPU, each may contain up to 4GHz. • If parity is not used, Intel recommends that the DP0 - 5.ASCII data type DP3 pins be pulled up to +5v. -It is used for representation of characters. 6.Pointer data type Cache Memory -48-bit pointers containing 32-bit offset at the LSB and 16-bit selector at MSB are supported by CPU. • The cache memory system stores data used by a program and also the instructions of the program. The cache is organized as a 4 way set associative cache with each location containing 16 bytes or 4 double words of data. • Control register CR0 is used to control the cache with two new control bits not present in the 80386 microprocessor.
  • 8. Summary Reference 1) Thus in sort 80486 is updated version of 80386. • The architecture of 80386-80486 microprocessor By Wal- ter A. Treble and Avtar Singh. 2) It has 8Byte code and cache. • www.microprocessor-assembly.com / 80486 • www.ebooks.com/80486-processor 3) It is the processor with inbuilt floating point unit 4) It has tightly coupled pipelining which allows 80486 to complete an instruction like a simple ALU. 5) It has more no of flag registers then 8086 like AC, I/Opl, NT, RF VM. 6) It has the same memory system as 80386 have. Which contains the memory addresses from 00000000H to FFFFFFFFH. 7) It also has in built parity checker and parity generator circuit which is used to check that a data read from memory is correct or not.