SlideShare a Scribd company logo
MICROPROCESSORS
PROTECTED MODE MEMORY
ADDRESSING
PRESENTED TO: PRESENTED BY:
MRS. SHWETA DHEERAJ KATARIA
PROTECTED MODE
MEMORY ADDRESSING
 Allows access to data and programs located within & above
the first 1M byte of memory.
 Protected mode is where Windows operates.
 Offset address can be 32-bit number.
 Allows microprocessor to access data within 4G bytes in
length.
SELECTORS AND DESCRIPTORS
 In place of a segment address, the segment register contains a
selector that selects a descriptor from a descriptor table.
 The descriptor is located in the segment register & describes the
location, length, and access rights of the segment of memory.
 it selects one of 8192 descriptors from one of two tables of descriptors
 In protected mode, this segment number can address any memory
location in the system
for the code segment.
 Indirectly, the register still selects a memory segment, but not
directly as in real mode.
 Global descriptors contain segment definitions that apply to
all programs.
 a global descriptor might be called a system descriptor
 Local descriptors are usually unique to an application.
 local descriptor is known as application descriptor
 Format of a descriptor for the 80286 through the Core2.
 each descriptor is 8 bytes in length
 global and local descriptor tables are a
maximum of 64K bytes in length
DESCRIPTOR TYPES
The 80286 through Core2 64-bit descriptors
 The base address of the descriptor indicates the starting
location of the memory segment.
 the paragraph boundary limitation is removed in protected mode
 segments may begin at any address
 The G, or granularity bit allows a segment length of 4K to 4G
bytes in steps of 4K bytes.
 32-bit offset address allows segment lengths of 4G bytes
 16-bit offset address allows segment lengths of 64K bytes.
 Operating systems operate in a 16- or 32-bit environment.
 DOS uses a 16-bit environment.
 Most Windows applications use a 32-bit environment called
WIN32.
 MSDOS/PCDOS & Windows 3.1 operating systems require
16-bit instruction mode.
 Instruction mode is accessible only in a protected mode
system such as Windows Vista.
OPERATING SYSTEM
 The access rights byte controls access to the protected mode
segment.
 describes segment function in the system and allows complete
control over the segment
 if the segment is a data segment, the direction of growth is specified
 If the segment grows beyond its limit, the operating system
is interrupted, indicating
a general protection fault.
 You can specify whether a data segment
can be written or is write-protected.
ACCESS RIGHTS BYTE
The access rights byte for the 80286 through Core2
descriptor
 Descriptors are chosen from the descriptor table by the
segment register.
 register contains a 13-bit selector field, a table selector bit, and
requested privilege level field
 The TI bit selects either the global or the local descriptor
table.
 Requested Privilege Level (RPL) requests the access privilege
level of a memory segment.
 If privilege levels are violated, system normally indicates an
application or privilege level violation
DESCRIPTOR TABLE
The contents of a segment register during protected mode operation
of the 80286 through Core2 microprocessors
 Segment register, containing a selector, chooses a
descriptor from the global descriptor table.
 The entry in the global descriptor table selects a segment in
the memory system.
 Descriptor zero is called the null descriptor, must contain all
zeros, and may not be used for accessing memory.
Using the DS register to select a description from the global
descriptor table. In this example, the DS register accesses memory
locations 00100000H–001000FFH as a data segment
PROGRAM-INVISIBLE REGISTERS
 Global and local descriptor tables are found
in the memory system.
 To access & specify the table addresses, 80286–Core2
contain program-invisible registers.
 not directly addressed by software
 Each segment register contains a program-invisible portion
used in the protected mode.
 often called cache memory because cache is
any memory that stores information
The program-invisible register within the
80286–Core2 microprocessors
 When a new segment number is placed in a segment
register, the microprocessor accesses a descriptor table and
loads the descriptor into the program-invisible portion of
the segment register.
 held there and used to access the memory segment until the
segment number is changed
 This allows the microprocessor to repeatedly access a
memory segment without referring to the descriptor table.
 hence the term cache
 The GDTR (global descriptor table register) and IDTR
(interrupt descriptor table register) contain the base address
of the descriptor table and its limit.
 when protected mode operation desired, address of the global
descriptor table and its limit are loaded into the GDTR
 The location of the local descriptor table is selected from
the global descriptor table.
 one of the global descriptors is set up to
address the local descriptor table
DESCRIPTOR TABLE REGISTERS
 To access the local descriptor table, the LDTR (local
descriptor table register) is loaded with a selector.
 selector accesses global descriptor table, & loads local descriptor
table address, limit, & access rights into the cache portion of the
LDTR
 The TR (task register) holds a selector, which accesses a
descriptor that defines a task.
 a task is most often a procedure or application
 Allows multitasking systems to switch tasks
to another in a simple and orderly fashion.
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIA

More Related Content

What's hot

8086 class notes-Y.N.M
8086 class notes-Y.N.M8086 class notes-Y.N.M
8086 class notes-Y.N.M
Dr.YNM
 
80386 Architecture
80386 Architecture80386 Architecture
80386 Architecture
Rohit Choudhury
 
Comparison of pentium processor with 80386 and 80486
Comparison of pentium processor with  80386 and 80486Comparison of pentium processor with  80386 and 80486
Comparison of pentium processor with 80386 and 80486Tech_MX
 
8259 Programmable Interrupt Controller
8259 Programmable Interrupt Controller8259 Programmable Interrupt Controller
8259 Programmable Interrupt Controller
abhikalmegh
 
Unit 2 mpmc
Unit 2 mpmcUnit 2 mpmc
Unit 2 mpmc
tamilnesaner
 
80386 & 80486
80386 & 8048680386 & 80486
80386 & 80486
RakeshKumarSharma46
 
80386 processor
80386 processor80386 processor
80386 processor
Rasmi M
 
Architecture of 80286 microprocessor
Architecture of 80286 microprocessorArchitecture of 80286 microprocessor
Architecture of 80286 microprocessor
Syed Ahmed Zaki
 
Question paper with solution the 8051 microcontroller based embedded systems...
Question paper with solution  the 8051 microcontroller based embedded systems...Question paper with solution  the 8051 microcontroller based embedded systems...
Question paper with solution the 8051 microcontroller based embedded systems...
manishpatel_79
 
Introduction to 80386 microprocessor
Introduction to 80386 microprocessorIntroduction to 80386 microprocessor
Introduction to 80386 microprocessor
Shehrevar Davierwala
 
Memory Addressing
Memory AddressingMemory Addressing
Memory Addressing
chauhankapil
 
Architecture of 8086 microprocessor
Architecture of  8086 microprocessorArchitecture of  8086 microprocessor
Architecture of 8086 microprocessor
Anirban Saha Anik
 
80486 and pentium
80486 and pentium80486 and pentium
80486 and pentium
Vikshit Ganjoo
 
Addressing modes of 8086
Addressing modes of 8086Addressing modes of 8086
Addressing modes of 8086
saurav kumar
 
Intel x86 Architecture
Intel x86 ArchitectureIntel x86 Architecture
Intel x86 ArchitectureChangWoo Min
 
Presentation on 8086 Microprocessor
Presentation  on   8086 MicroprocessorPresentation  on   8086 Microprocessor
Presentation on 8086 Microprocessor
Nahian Ahmed
 
8086 micro processor
8086 micro processor8086 micro processor
8086 micro processor
Poojith Chowdhary
 
Processor Organization and Architecture
Processor Organization and ArchitectureProcessor Organization and Architecture
Processor Organization and Architecture
Vinit Raut
 

What's hot (20)

8086 class notes-Y.N.M
8086 class notes-Y.N.M8086 class notes-Y.N.M
8086 class notes-Y.N.M
 
80386 Architecture
80386 Architecture80386 Architecture
80386 Architecture
 
Comparison of pentium processor with 80386 and 80486
Comparison of pentium processor with  80386 and 80486Comparison of pentium processor with  80386 and 80486
Comparison of pentium processor with 80386 and 80486
 
8259 Programmable Interrupt Controller
8259 Programmable Interrupt Controller8259 Programmable Interrupt Controller
8259 Programmable Interrupt Controller
 
Unit 2 mpmc
Unit 2 mpmcUnit 2 mpmc
Unit 2 mpmc
 
80386 & 80486
80386 & 8048680386 & 80486
80386 & 80486
 
Introduction to 80386
Introduction to 80386Introduction to 80386
Introduction to 80386
 
The 80386 80486
The 80386 80486The 80386 80486
The 80386 80486
 
80386 processor
80386 processor80386 processor
80386 processor
 
Architecture of 80286 microprocessor
Architecture of 80286 microprocessorArchitecture of 80286 microprocessor
Architecture of 80286 microprocessor
 
Question paper with solution the 8051 microcontroller based embedded systems...
Question paper with solution  the 8051 microcontroller based embedded systems...Question paper with solution  the 8051 microcontroller based embedded systems...
Question paper with solution the 8051 microcontroller based embedded systems...
 
Introduction to 80386 microprocessor
Introduction to 80386 microprocessorIntroduction to 80386 microprocessor
Introduction to 80386 microprocessor
 
Memory Addressing
Memory AddressingMemory Addressing
Memory Addressing
 
Architecture of 8086 microprocessor
Architecture of  8086 microprocessorArchitecture of  8086 microprocessor
Architecture of 8086 microprocessor
 
80486 and pentium
80486 and pentium80486 and pentium
80486 and pentium
 
Addressing modes of 8086
Addressing modes of 8086Addressing modes of 8086
Addressing modes of 8086
 
Intel x86 Architecture
Intel x86 ArchitectureIntel x86 Architecture
Intel x86 Architecture
 
Presentation on 8086 Microprocessor
Presentation  on   8086 MicroprocessorPresentation  on   8086 Microprocessor
Presentation on 8086 Microprocessor
 
8086 micro processor
8086 micro processor8086 micro processor
8086 micro processor
 
Processor Organization and Architecture
Processor Organization and ArchitectureProcessor Organization and Architecture
Processor Organization and Architecture
 

Viewers also liked

Protected mode memory addressing 8086
Protected mode memory addressing 8086Protected mode memory addressing 8086
Protected mode memory addressing 8086
University of Gujrat, Pakistan
 
Protection mode
Protection modeProtection mode
Protection mode
Deepak Kumar
 
Protection 80386
Protection 80386Protection 80386
Protection 80386
Akshay Nagpurkar
 
Salient featurs of 80386
Salient featurs of 80386Salient featurs of 80386
Salient featurs of 80386aviban
 
Memory mgmt 80386
Memory mgmt 80386Memory mgmt 80386
Memory mgmt 80386
Akshay Nagpurkar
 
sistem mikroprosessor 2
sistem mikroprosessor 2sistem mikroprosessor 2
sistem mikroprosessor 2
yasir_cesc
 
Why the Address Translation Scheme Matters?
Why the Address Translation Scheme Matters?Why the Address Translation Scheme Matters?
Why the Address Translation Scheme Matters?Jiaqing Du
 
Privilege levels 80386
Privilege levels 80386Privilege levels 80386
Privilege levels 80386
Akshay Nagpurkar
 
Address translation-mechanism-of-80386 by aniket bhute
Address translation-mechanism-of-80386 by aniket bhuteAddress translation-mechanism-of-80386 by aniket bhute
Address translation-mechanism-of-80386 by aniket bhute
Aniket Bhute
 
80286 microprocessor
80286 microprocessor80286 microprocessor
80286 microprocessor
Avin Mathew
 
Intel+80286
Intel+80286Intel+80286
Intel+80286
Dhanwantari Sali
 
Operating Systems - memory management
Operating Systems - memory managementOperating Systems - memory management
Operating Systems - memory management
Mukesh Chinta
 
Arrays and addressing modes
Arrays and addressing modesArrays and addressing modes
Arrays and addressing modes
Bilal Amjad
 
Memory segmentation-of-8086
Memory segmentation-of-8086Memory segmentation-of-8086
Memory segmentation-of-8086
mudulin
 
Introduction To Translation Technologies
Introduction To Translation TechnologiesIntroduction To Translation Technologies
Introduction To Translation Technologies
xenotext
 
Assembly Language Lecture 4
Assembly Language Lecture 4Assembly Language Lecture 4
Assembly Language Lecture 4
Motaz Saad
 
Memory Management
Memory ManagementMemory Management
Memory Management
Visakh V
 

Viewers also liked (20)

Protected mode memory addressing 8086
Protected mode memory addressing 8086Protected mode memory addressing 8086
Protected mode memory addressing 8086
 
Protection mode
Protection modeProtection mode
Protection mode
 
Protection 80386
Protection 80386Protection 80386
Protection 80386
 
Salient featurs of 80386
Salient featurs of 80386Salient featurs of 80386
Salient featurs of 80386
 
Memory mgmt 80386
Memory mgmt 80386Memory mgmt 80386
Memory mgmt 80386
 
sistem mikroprosessor 2
sistem mikroprosessor 2sistem mikroprosessor 2
sistem mikroprosessor 2
 
Why the Address Translation Scheme Matters?
Why the Address Translation Scheme Matters?Why the Address Translation Scheme Matters?
Why the Address Translation Scheme Matters?
 
DAT Education
DAT EducationDAT Education
DAT Education
 
Intel80286
Intel80286Intel80286
Intel80286
 
Privilege levels 80386
Privilege levels 80386Privilege levels 80386
Privilege levels 80386
 
Address translation-mechanism-of-80386 by aniket bhute
Address translation-mechanism-of-80386 by aniket bhuteAddress translation-mechanism-of-80386 by aniket bhute
Address translation-mechanism-of-80386 by aniket bhute
 
80286 microprocessor
80286 microprocessor80286 microprocessor
80286 microprocessor
 
Intel+80286
Intel+80286Intel+80286
Intel+80286
 
Operating Systems - memory management
Operating Systems - memory managementOperating Systems - memory management
Operating Systems - memory management
 
Arrays and addressing modes
Arrays and addressing modesArrays and addressing modes
Arrays and addressing modes
 
Memory segmentation-of-8086
Memory segmentation-of-8086Memory segmentation-of-8086
Memory segmentation-of-8086
 
Introduction To Translation Technologies
Introduction To Translation TechnologiesIntroduction To Translation Technologies
Introduction To Translation Technologies
 
Assembly Language Lecture 4
Assembly Language Lecture 4Assembly Language Lecture 4
Assembly Language Lecture 4
 
Memory Management
Memory ManagementMemory Management
Memory Management
 
Design of Filters PPT
Design of Filters PPTDesign of Filters PPT
Design of Filters PPT
 

Similar to Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIA

32- bit Microprocessor-Indtel 80386.pptx
32- bit Microprocessor-Indtel 80386.pptx32- bit Microprocessor-Indtel 80386.pptx
32- bit Microprocessor-Indtel 80386.pptx
Yuvraj994432
 
Pentium protected mode.ppt
Pentium protected mode.pptPentium protected mode.ppt
Pentium protected mode.ppt
PramodBorole2
 
Architecture of 80386(www.munnuz.co.cc)
Architecture of 80386(www.munnuz.co.cc)Architecture of 80386(www.munnuz.co.cc)
Architecture of 80386(www.munnuz.co.cc)
muneer.k
 
Microprocessor Unit -1 SE computer-II.pptx
Microprocessor  Unit -1 SE computer-II.pptxMicroprocessor  Unit -1 SE computer-II.pptx
Microprocessor Unit -1 SE computer-II.pptx
akshathsingh2003
 
Architecture_of_80386_Micropro-An Introduction
Architecture_of_80386_Micropro-An IntroductionArchitecture_of_80386_Micropro-An Introduction
Architecture_of_80386_Micropro-An Introduction
rajasekarandpm
 
Doc32002
Doc32002Doc32002
Unit-4 protection ppt of database m.pptx
Unit-4 protection ppt of database m.pptxUnit-4 protection ppt of database m.pptx
Unit-4 protection ppt of database m.pptx
yashdongare22
 
Internal microprocessor architecture
Internal microprocessor architectureInternal microprocessor architecture
Internal microprocessor architecture
University of Gujrat, Pakistan
 
Protected addressing mode and Paging
Protected addressing mode and PagingProtected addressing mode and Paging
Protected addressing mode and Paging
marada0033
 
Doc32000
Doc32000Doc32000
Advanced microprocessor
Advanced microprocessorAdvanced microprocessor
Advanced microprocessor
Shehrevar Davierwala
 
Segments
SegmentsSegments
Segmentsaviban
 
Intel 80286
Intel 80286Intel 80286
Intel 80286
Anju Kanjirathingal
 
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.pptADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
NaganarasaiahGoud
 
x86_1.ppt
x86_1.pptx86_1.ppt
x86_1.ppt
jeronimored
 
Various type of register
Various type of registerVarious type of register
Various type of register
Muhammad Taqi Hassan Bukhari
 
Features of tms_320_2nd_generation_dsp
Features of tms_320_2nd_generation_dspFeatures of tms_320_2nd_generation_dsp
Features of tms_320_2nd_generation_dsp
Smriti Tikoo
 
Advanced Microprocessors By Er. Swapnil Kaware
Advanced Microprocessors By Er. Swapnil KawareAdvanced Microprocessors By Er. Swapnil Kaware
Advanced Microprocessors By Er. Swapnil KawareProf. Swapnil V. Kaware
 
Advanced Microprocessors By Er. Swapnil Kaware
Advanced Microprocessors By Er. Swapnil Kaware Advanced Microprocessors By Er. Swapnil Kaware
Advanced Microprocessors By Er. Swapnil Kaware Prof. Swapnil V. Kaware
 

Similar to Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIA (20)

Chapter2.3 4-mikroprocessor
Chapter2.3 4-mikroprocessorChapter2.3 4-mikroprocessor
Chapter2.3 4-mikroprocessor
 
32- bit Microprocessor-Indtel 80386.pptx
32- bit Microprocessor-Indtel 80386.pptx32- bit Microprocessor-Indtel 80386.pptx
32- bit Microprocessor-Indtel 80386.pptx
 
Pentium protected mode.ppt
Pentium protected mode.pptPentium protected mode.ppt
Pentium protected mode.ppt
 
Architecture of 80386(www.munnuz.co.cc)
Architecture of 80386(www.munnuz.co.cc)Architecture of 80386(www.munnuz.co.cc)
Architecture of 80386(www.munnuz.co.cc)
 
Microprocessor Unit -1 SE computer-II.pptx
Microprocessor  Unit -1 SE computer-II.pptxMicroprocessor  Unit -1 SE computer-II.pptx
Microprocessor Unit -1 SE computer-II.pptx
 
Architecture_of_80386_Micropro-An Introduction
Architecture_of_80386_Micropro-An IntroductionArchitecture_of_80386_Micropro-An Introduction
Architecture_of_80386_Micropro-An Introduction
 
Doc32002
Doc32002Doc32002
Doc32002
 
Unit-4 protection ppt of database m.pptx
Unit-4 protection ppt of database m.pptxUnit-4 protection ppt of database m.pptx
Unit-4 protection ppt of database m.pptx
 
Internal microprocessor architecture
Internal microprocessor architectureInternal microprocessor architecture
Internal microprocessor architecture
 
Protected addressing mode and Paging
Protected addressing mode and PagingProtected addressing mode and Paging
Protected addressing mode and Paging
 
Doc32000
Doc32000Doc32000
Doc32000
 
Advanced microprocessor
Advanced microprocessorAdvanced microprocessor
Advanced microprocessor
 
Segments
SegmentsSegments
Segments
 
Intel 80286
Intel 80286Intel 80286
Intel 80286
 
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.pptADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
 
x86_1.ppt
x86_1.pptx86_1.ppt
x86_1.ppt
 
Various type of register
Various type of registerVarious type of register
Various type of register
 
Features of tms_320_2nd_generation_dsp
Features of tms_320_2nd_generation_dspFeatures of tms_320_2nd_generation_dsp
Features of tms_320_2nd_generation_dsp
 
Advanced Microprocessors By Er. Swapnil Kaware
Advanced Microprocessors By Er. Swapnil KawareAdvanced Microprocessors By Er. Swapnil Kaware
Advanced Microprocessors By Er. Swapnil Kaware
 
Advanced Microprocessors By Er. Swapnil Kaware
Advanced Microprocessors By Er. Swapnil Kaware Advanced Microprocessors By Er. Swapnil Kaware
Advanced Microprocessors By Er. Swapnil Kaware
 

More from Dheeraj Kataria

Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Dheeraj Kataria
 
C++ functions presentation by DHEERAJ KATARIA
C++ functions presentation by DHEERAJ KATARIAC++ functions presentation by DHEERAJ KATARIA
C++ functions presentation by DHEERAJ KATARIA
Dheeraj Kataria
 
E facilities of Municipal Corporation of Delhi By DHEERAJ KATARIA
E facilities of Municipal Corporation of Delhi By DHEERAJ KATARIAE facilities of Municipal Corporation of Delhi By DHEERAJ KATARIA
E facilities of Municipal Corporation of Delhi By DHEERAJ KATARIA
Dheeraj Kataria
 
Matrix presentation By DHEERAJ KATARIA
Matrix presentation By DHEERAJ KATARIAMatrix presentation By DHEERAJ KATARIA
Matrix presentation By DHEERAJ KATARIA
Dheeraj Kataria
 
Types Of Recursion in C++, Data Stuctures by DHEERAJ KATARIA
Types Of Recursion in C++, Data Stuctures by DHEERAJ KATARIATypes Of Recursion in C++, Data Stuctures by DHEERAJ KATARIA
Types Of Recursion in C++, Data Stuctures by DHEERAJ KATARIADheeraj Kataria
 
Heritage and tourism in india by DHEERAJ KATARIA
Heritage and  tourism in india by DHEERAJ KATARIAHeritage and  tourism in india by DHEERAJ KATARIA
Heritage and tourism in india by DHEERAJ KATARIA
Dheeraj Kataria
 

More from Dheeraj Kataria (6)

Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
C++ functions presentation by DHEERAJ KATARIA
C++ functions presentation by DHEERAJ KATARIAC++ functions presentation by DHEERAJ KATARIA
C++ functions presentation by DHEERAJ KATARIA
 
E facilities of Municipal Corporation of Delhi By DHEERAJ KATARIA
E facilities of Municipal Corporation of Delhi By DHEERAJ KATARIAE facilities of Municipal Corporation of Delhi By DHEERAJ KATARIA
E facilities of Municipal Corporation of Delhi By DHEERAJ KATARIA
 
Matrix presentation By DHEERAJ KATARIA
Matrix presentation By DHEERAJ KATARIAMatrix presentation By DHEERAJ KATARIA
Matrix presentation By DHEERAJ KATARIA
 
Types Of Recursion in C++, Data Stuctures by DHEERAJ KATARIA
Types Of Recursion in C++, Data Stuctures by DHEERAJ KATARIATypes Of Recursion in C++, Data Stuctures by DHEERAJ KATARIA
Types Of Recursion in C++, Data Stuctures by DHEERAJ KATARIA
 
Heritage and tourism in india by DHEERAJ KATARIA
Heritage and  tourism in india by DHEERAJ KATARIAHeritage and  tourism in india by DHEERAJ KATARIA
Heritage and tourism in india by DHEERAJ KATARIA
 

Recently uploaded

Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
An Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering TechniquesAn Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering Techniques
ambekarshweta25
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 

Recently uploaded (20)

Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
An Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering TechniquesAn Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering Techniques
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 

Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIA

  • 1. MICROPROCESSORS PROTECTED MODE MEMORY ADDRESSING PRESENTED TO: PRESENTED BY: MRS. SHWETA DHEERAJ KATARIA
  • 2. PROTECTED MODE MEMORY ADDRESSING  Allows access to data and programs located within & above the first 1M byte of memory.  Protected mode is where Windows operates.  Offset address can be 32-bit number.  Allows microprocessor to access data within 4G bytes in length.
  • 3. SELECTORS AND DESCRIPTORS  In place of a segment address, the segment register contains a selector that selects a descriptor from a descriptor table.  The descriptor is located in the segment register & describes the location, length, and access rights of the segment of memory.  it selects one of 8192 descriptors from one of two tables of descriptors  In protected mode, this segment number can address any memory location in the system for the code segment.  Indirectly, the register still selects a memory segment, but not directly as in real mode.
  • 4.  Global descriptors contain segment definitions that apply to all programs.  a global descriptor might be called a system descriptor  Local descriptors are usually unique to an application.  local descriptor is known as application descriptor  Format of a descriptor for the 80286 through the Core2.  each descriptor is 8 bytes in length  global and local descriptor tables are a maximum of 64K bytes in length DESCRIPTOR TYPES
  • 5. The 80286 through Core2 64-bit descriptors
  • 6.  The base address of the descriptor indicates the starting location of the memory segment.  the paragraph boundary limitation is removed in protected mode  segments may begin at any address  The G, or granularity bit allows a segment length of 4K to 4G bytes in steps of 4K bytes.  32-bit offset address allows segment lengths of 4G bytes  16-bit offset address allows segment lengths of 64K bytes.
  • 7.  Operating systems operate in a 16- or 32-bit environment.  DOS uses a 16-bit environment.  Most Windows applications use a 32-bit environment called WIN32.  MSDOS/PCDOS & Windows 3.1 operating systems require 16-bit instruction mode.  Instruction mode is accessible only in a protected mode system such as Windows Vista. OPERATING SYSTEM
  • 8.  The access rights byte controls access to the protected mode segment.  describes segment function in the system and allows complete control over the segment  if the segment is a data segment, the direction of growth is specified  If the segment grows beyond its limit, the operating system is interrupted, indicating a general protection fault.  You can specify whether a data segment can be written or is write-protected. ACCESS RIGHTS BYTE
  • 9. The access rights byte for the 80286 through Core2 descriptor
  • 10.  Descriptors are chosen from the descriptor table by the segment register.  register contains a 13-bit selector field, a table selector bit, and requested privilege level field  The TI bit selects either the global or the local descriptor table.  Requested Privilege Level (RPL) requests the access privilege level of a memory segment.  If privilege levels are violated, system normally indicates an application or privilege level violation DESCRIPTOR TABLE
  • 11. The contents of a segment register during protected mode operation of the 80286 through Core2 microprocessors
  • 12.  Segment register, containing a selector, chooses a descriptor from the global descriptor table.  The entry in the global descriptor table selects a segment in the memory system.  Descriptor zero is called the null descriptor, must contain all zeros, and may not be used for accessing memory.
  • 13. Using the DS register to select a description from the global descriptor table. In this example, the DS register accesses memory locations 00100000H–001000FFH as a data segment
  • 14. PROGRAM-INVISIBLE REGISTERS  Global and local descriptor tables are found in the memory system.  To access & specify the table addresses, 80286–Core2 contain program-invisible registers.  not directly addressed by software  Each segment register contains a program-invisible portion used in the protected mode.  often called cache memory because cache is any memory that stores information
  • 15. The program-invisible register within the 80286–Core2 microprocessors
  • 16.  When a new segment number is placed in a segment register, the microprocessor accesses a descriptor table and loads the descriptor into the program-invisible portion of the segment register.  held there and used to access the memory segment until the segment number is changed  This allows the microprocessor to repeatedly access a memory segment without referring to the descriptor table.  hence the term cache
  • 17.  The GDTR (global descriptor table register) and IDTR (interrupt descriptor table register) contain the base address of the descriptor table and its limit.  when protected mode operation desired, address of the global descriptor table and its limit are loaded into the GDTR  The location of the local descriptor table is selected from the global descriptor table.  one of the global descriptors is set up to address the local descriptor table DESCRIPTOR TABLE REGISTERS
  • 18.  To access the local descriptor table, the LDTR (local descriptor table register) is loaded with a selector.  selector accesses global descriptor table, & loads local descriptor table address, limit, & access rights into the cache portion of the LDTR  The TR (task register) holds a selector, which accesses a descriptor that defines a task.  a task is most often a procedure or application  Allows multitasking systems to switch tasks to another in a simple and orderly fashion.