SlideShare a Scribd company logo
1 of 38
80386 Microprocessor



         Presented By,
     Er. Swapnil Kaware,
       B.E.(Electronics),
   svkaware@yahoo.co.in
                            1
Salient Features Of 80386 Microprocessor
(1). 80386 Microprocessor Introduced in 1985 by Intel Corporation.
(2). Address bus is of 32-bit & Data bus is of 32-bit.
(3). 80386 Microprocessor can address up to 232 i.e. 4G bytes of memory.
(4). Operating frequency of 20-33 MHz .
(5). Contains total 132 Pins.
(6). Intel’s first practical microprocessor to contain a 32-bit data bus and 32-bit memory
    address
(7). 80386 had higher clocking speeds and included a memory management unit.
(8). Improved efficiency, reduced software overload.
(9). Instruction set, memory management upward-compatible with 8086, 8088, and 80286
    Microprocessor.
(10). Can operates in real, protected & virtual Mode.
(11). Introduced paging, virtual memory concept.
(12). Based on CMOS Technology.
(13). Contains near about 2,75,000 Transistors.
(14). Can operate at 11.4 MIPS.
(15). 11 Addressing modes.
                                                                                       2
Versions of 80386 Microprocessor

   (A) 80386 SX             (B) 80386 DX

(1). A.B. is of 32 Bit.   (1). A.B. is of 24 Bit.
(2). D.B. is of 32 Bit.   (2). D.B. is of 16 Bit.
(3). Total 132 Pins.      (3). Total 100 Pins.
(4). Can address upto      (4). Can address upto
     4GB of memory.         16MB of memory.

                                                    3
Register Organization Of 80386




                                 4
Register Organization Of 80386
(1). The 80386 has eight 32 - bit general purpose registers which may be used as
    either 8 bit or 16 bit registers.

(2). A 32 - bit register known as an extended register, is represented by the register
    name with prefix E.

(3). Example : A 32 bit register corresponding to AX is EAX, similarly BX is EBX etc.

(4). The 16 bit registers BP, SP, SI and DI in 8086 are now available with their
    extended size of 32 bit and are names as EBP,ESP,ESI and EDI.

(5). AX represents the lower 16 bit of the 32 bit register EAX.

(6). BP, SP, SI, DI represents the lower 16 bit of their 32 bit counterparts, and can be
    used as independent 16 bit registers.

(7). The CS and SS are the code and the stack segment registers respectively, while
    DS, ES, FS, GS are 4 data segment registers.
                                                                                        5
Flag Register of 80386 Microprocessor
• The Flag register of 80386 is a 32 bit register. Out of the 32 bits, Intel has
  reserved bits D18 to D31, D5 and D3, while D1 is always set at 1.
• Two extra new flags are added to the 80286 flag to derive the flag register of
  80386. They are VM and RF flags.




                                                                              6
Flag Register of 80386 Microprocessor

(1). IOPL (Input Output Privilege Level) flags:- For protected mode operations
    indicates the privilege level, 0 to 3, at which your code must be running in
    order to execute any I/O-related instructions.

(2). VM Virtual 8086 mode flag:- When it is set, the x86 processor is basically
    converted into a high-speed 8086 processor.


(3). RF:- Resume Flag This flag is used with the debug register break points. It is
    checked at the starting of every instruction cycle.
• The RF is automatically reset after successful execution of every instruction.


(4). NT :- (Nested Task) The processor uses the nested task flag to control chaining
    of interrupted and called tasks.
                                                                                   7
VM - Virtual Mode Flag
• If this flag is set, the 80386 enters the virtual
  8086 mode within the protection mode.

• This is to be set only when the 80386 is in
  protected mode.


• This bit can be set using IRET instruction or any
  task switch operation only in the protected
  mode.                                               8
RF- Resume Flag


• It is checked at the starting of every instruction cycle and if it
  is set, any debug fault is ignored during the instruction cycle.

• The RF is automatically reset after successful execution of
  every instruction, except for IRET and POPF instructions.

• JMP, CALL and INT instructions are used to set the RF to the
  value specified by the memory data available at the stack.


                                                                   9
• Segment Descriptor Registers:
 This registers are not available for programmers, rather they are
  internally used to store the descriptor information, like attributes,
  limit and base addresses of segments.

 The six segment registers (i.e. CS,SS,DS,ES,FS,GS) have
  corresponding six 73 bit descriptor registers. Each of them contains
  32 bit base address, 32 bit base limit and 9 bit attributes.

 These are automatically loaded when the corresponding segments
  are loaded with selectors.


• Control Registers:
 The 80386 has three 32 bit control registers CR0, CR2 and CR3
  Load and store instructions are available to access these registers.

                                                                      10
• System Address Registers:
• The 80386 supports four types of descriptor table, viz.

  (1) Global Descriptor Table (GDT),
  (2) Interrupt Descriptor Table (IDT),
  (3) Local Descriptor Table (LDT),
  (4) Task State Segment Descriptor (TSS).

• They holds the addresses of corresponding segments.


                                                        11
Debug and Test Registers
  32                            0
  Linear Breakpoint Address 0       DR0
  Linear Breakpoint Address 1       DR1
  Linear Breakpoint Address 2
                                    DR2
  Linear Breakpoint Address 3       DR3
  Intel Reserved                    DR4
  Intel Reserved                    DR5
  Breakpoint Status                 DR6
  Breakpoint Control                DR7


  32                            0
  Test Control                      TR6
  Test Status                       TR7
                                          12
• Debug and Test Registers:
• Intel has provide a set of 8 debug registers for hardware debugging.



• Out of these eight registers DR0 to DR7, two registers DR4 and DR5 are
  Intel reserved.



• The initial four registers DR0 to DR3 store four program controllable
  breakpoint addresses, while DR6 and DR7 respectively hold breakpoint
  status and breakpoint control information.



• Two more test register are provided by 80386 for page cacheing namely
  test control and test status register.                              13
Addressing Modes
• 80386 supports total 11 addressing modes.
• Scaled Indexed Mode: Contents of the an index register are multiplied by a
  scale factor (the valid scale factors are 1,2,4 & 8) that may be added further to
  get the operand offset.
  e.g. MOV EBX, LIST [ESI*2]

• Based Scaled Indexed Mode: Contents of the an index register are multiplied by
  a scale factor and then added to base register to obtain the offset.
  e.g. MOV EBX, LIST [EDX*4] [ECX]

• Based Scaled Indexed Mode with Displacement: The Contents of the an index
  register are multiplied by a scaling factor and the result is added to a base
  register and a displacement to get the offset of an operand.
  e.g. MOV EAX, LIST [ESI*2] [EBX+0800]
                                                                               14
Data Types Of 80386
(1). Bit.
(2). Bit field-A group of at most 32 bits i.e., 4 bytes.
(3). Bit string- A string of continuous bits of maximum 4Gbytes length.
(4). Signed Byte- Signed byte data. Sign of the operand depends upon its most
    significant bit. If it is 0, then the number is positive. else it is negative. Range
    is from -128 to 127.
(5). Unsigned Byte-Unsigned byte data.Range from 0 to 255.
(6). Integer word- Signed 16-bit data. Range from -32,768 to 32,767.
(7). Long Integer-32-bit signed data that is represented in 2's complement form.
    Range is from -2.147*109 to 2.1479.
(8). Unsigned Integer Word- Unsigned 16-bit data.Range from 0 to 65,535.
(9). Unsigned Long Integer-Unsigned 32 bit data. Range from 0 to 4,294,967,295.


                                                                                    15
(10). Signed quad word- A signed 64-bit or four word data.

(11). Unsigned Quad Word-An unsigned 64-bit data.

(12). Offset-A 16 or 32- bit displacement that references a memory location using
any of the addressing modes.

(13). Pointer-16-bit selector and 16 or 32 bit offset.

(14). Character-An ASCII equivalent to any of the alphanumeric or control
characters .

(15). Strings-These are the sequences of bytes, words or double words . A string
may contain up to maximum 4 GB.

(16). BCD- Decimal digits from 0-9 represented by unpacked bytes.

(17). Packed BCD- This represents two packed BCD digits using a byte from 00 to
99.

                                                                              16
Real Addressing Mode
(1). After reset, the 80386 starts from memory location FFFFFFF0H under the real address
     mode.


(2). In the real mode, 80386 works as a faster 8086 with 32-bit registers and data types.


(3). In real mode, the default operand size is 16 bit but 32- bit operands and addressing
     modes may be used.


(4). The segment size in real mode is 64K.


(5). The real mode initializes the 80386 and prepares it for protected mode.


(6). The segments in 80386 real mode may be overlapped or non-overlapped.


(7). The segment in 80386 real mode can be read, write or executed, i.e. no protection is
     available.
                                                                                       17
18
Protected Mode of 80386
(1). All the capabilities of 80386 are available for utilization in its protected mode of
     operation.


(2). The 80386 in protected mode support all the software written for 80286 and 8086 to
     be executed under the control of memory management and protection abilities of
     80386.


(3). The protected mode allows the use of additional instruction, addressing modes and
     capabilities of 80386.


(4). The effective address (offset) is added with segment base address to calculate linear
     address.

(5). This linear address is further used as physical address, if the paging unit is disabled,
     otherwise the paging unit converts the linear address into physical address.

(6). The paging unit operates under the control of segmentation unit. The paging unit if
     enabled converts linear addresses into physical address, in protected mode.
                                                                                            19
Segmentation
DESCRIPTOR TABLES:

These descriptor tables and registers are manipulated by the operating
system to ensure the correct operation of the processor, and hence the
correct execution of the program. Three types of the 80386 descriptor
tables are listed as follows:

(1). GLOBAL DESCRIPTOR TABLE ( GDT )

(2). LOCAL DESCRIPTOR TABLE ( LDT )

(3). INTERRUPT DESCRIPTOR TABLE ( IDT )
                                                                   20
• GDT
(1). Maintains list of Most Segments
(2). It’s a general Purpose table of descriptors.
(4). 48-bit register.


• IDT
(1). Maintains list of Interrupt service routines.
(2). 48-bit register.

• LDT
(1) Optional.
(2) Extends range of GDT.
(3) Is allocated to each task when multitasking is enabled.
(4). 16-bit register.
                                                              21
Segment Descriptor Format
(1). A ( Accessed) : Processor automatically sets this bit whenever a memory
   reference is made using the defined segment           .
(2). DPL : Indicates the level of privilege associated with the memory space that
    descriptor defines. DPL0 is highest while DPL3 is lowest.
(3). S ( System ) : If clear indicates that this is system segment descriptor. If set non-
    system.




                                                                                             22
(4). P ( Present): If clear, the address range that this descriptor defines is considered to be
     temporarily not present in physical memory space.

(5). U ( User): Undefined and ignored by 80386,but user can use it.

(6). X : Reserved

(7). D ( Default):When clear operands in this is segment is assumed to be 16 bits and when set
     assumed to be 32 bits.

(8). G ( Granularity): When this bit is cleared ,the 20 bit limit field is assumed to be measured in
     units of 1 byte. If set the limit is in units of 4 KB.

(9) Type (3): Type of segment you are defining.
 (a). 000: Data , read only ( ROM space)
 (b). 001: Data ,R/W
 (c). 010: Stack read only
 (d). 011: Stack R/W
 (e). 100: Code, execute only
 (f). 101: Code execute/ read
 (g). 110: Code execute only , conforming
 (h). 111:Code execute / read, conforming                                                         23
Paging
(1). Paging is one of the memory management techniques used for
   virtual memory multitasking operating system.

(2). The segmentation scheme may divide the physical memory into
   a variable size segments but the paging divides the memory into
   a fixed size pages.

(3). The segments are supposed to be the logical segments of the
   program, but the pages do not have any logical relation with the
   program.

(4). The pages are just fixed size portions of the program module or
   data.                                                          24
(5). The advantage of paging scheme is that the complete segment of a task need
    not be in the physical memory at any time.

(6). Only a few pages of the segments, which are required currently for the
    execution need to be available in the physical memory.

(7). Thus the memory requirement of the task is substantially reduced,
    relinquishing the available memory for other tasks.

(8). Whenever the other pages of task are required for execution, they may be
    fetched from the secondary storage.

(9). The previous page which are executed, need not be available in the memory,
    and hence the space occupied by them may be relinquished for other tasks.

(10). Thus paging mechanism provides an effective technique to manage the
   physical memory for multitasking systems.

                                                                              25
26
Paging Unit:
(1). The paging unit of 80386 uses a two level table mechanism to convert a linear address
     provided by segmentation unit into physical addresses.

(2). The paging unit converts the complete map of a task into pages, each of size 4K.

(3). The task is further handled in terms of its page, rather than segments.

(4). The paging unit handles every task in terms of three components namely page directory,
     page tables and page itself.


     Page Directory:
(1). This is at the most 4Kbytes in size. Each directory entry is of 4 bytes, thus a total
    of 1024 entries are allowed in a directory.

(2). The upper 10 bits of the linear address are used as an index to the corresponding
    page directory entry. The page directory entries point to page tables.



                                                                                             27
Page Tables:
(1). Each page table is of 4Kbytes in size and many contain a maximum of 1024
    entries.

(2). The page table entries contain the starting address of the page and the
    statistical information about the page.

(3). The upper 20 bit page frame address is combined with the lower 12 bit of the
    linear address.

(4). The accessed bit A is set by 80386 before any access to the page. If A=1, the
    page is accessed, else unaccessed.

(5). The D bit ( Dirty bit) is set before a write operation to the page is carried out.

(6). The OS reserved bits are defined by the operating system software.

(7). The User / Supervisor (U/S) bit and read/write bit are used to provide
    protection.

                                                                                   28
Virtual 8086 Mode
(1). Thus, the virtual 8086 mode of operation of 80386, offers an advantage of executing 8086
     programs while in protected mode.
(2). The address forming mechanism in virtual 8086 mode is exactly identical with that of 8086 real
     mode.
(3). In virtual mode, 8086 can address 1Mbytes of physical memory that may be anywhere in the
     4Gbytes address space of the protected mode of 80386.
(4). Like 80386 real mode, the addresses in virtual 8086 mode lie within 1Mbytes of memory.
(5). In virtual mode, the paging mechanism and protection capabilities are available at the service of
     the programmers.
(6). The 80386 supports multiprogramming, hence more than one programmer may be use the CPU at
     a time.
(7). Paging unit may not be necessarily enable in virtual mode, but may be needed to run the 8086
     programs which require more than 1Mbyts of memory for memory management function.
(8). In virtual mode, the paging unit allows only 256 pages, each of 4Kbytes size.
(9). Each of the pages may be located anywhere in the maximum 4Gbytes physical memory.
(10). The virtual mode allows the multiprogramming of 8086 applications.

                                                                                                 29
80486 Microprocessor
(1). Introduced in 1989.
(2). Can execute around 40 million instructions per second.
(3). On chip floating point unit for faster execution of complex instructions.
(4). Having operating frequency of 16MHz to 50MHz.
(5). Total 168 pins.
(6). Paging & Virtual memory concept.
(7). Multiprocessor support.
(8). Data bus is of 32 bits.
(9). Address bus is of 32 bits.
(10). High speed data transfer.
(11). More than 1.2 million transistors.
(12). Can address up to 4 billion bytes of memory.
(13). Can operate in real & protected mode.
(14). Contains 80387 arithmetic co processor.
(15). Uses Pipelining i.e. can execute up to 1 instruction per clock cycle.
                                                                                 30
Flag Register of 80486 Microprocessor
                                                                                                              FLAGS




    31              18 17        16        15       14    13      12        11    10        9        8        7        6       5        4       3    2       1    0
E
F    RESERVED FOR
L          INTEL     AC     VM        RF        0    NT        IOPL    OF        DF    IF       TF       SF       ZF       0       AF       0       PF   1       CF
A
G



CF: Carry Flag
AF: Auxiliary carry
                                                                                            OF : Over Flow
ZF: Zero Flag
                                                                                            IOPL : I/O Privilege Level
SF : Sign Flag
                                                                                            NT : Nested Task Flag
TF : Trap Flag                                                                              RF : Resume Flag
IE : Interrupt Enable                                                                       VM : Virtual Mode
AC : Alignment Check
DF : Direct Flag
                                                                                                                                                                      31
Flag Register of 80486

(1). The register set of 80486 is similar to that of 80386.

(2). Only a flag called alignment flag is added at the
  position D18.

(3). If the AC flag is set to ’1’, whenever there is an access
  to a misaligned address i.e. a fault (exception) is
  generated.

                                                              32
80586 (Pentium) Microprocessor
(1). Pentium (80586) Microprocessor was introduced in 1993.
(2). Data bus is of 64-bit & address bus is of 32 bits.
(3). Superscalar performance: can execute 2 instructions per clock cycle.
(4). Introductory versions operated with a clocking frequency of 60 MHz & 66 MHz.
(5). Can address up to 4G bytes of memory.
(6). Contains total 237 pins.
(7). Memory access time near about 18 ns.
(8). Contains near about 3.1 millions of transistors.
(9). High-level system functions such as power management and security.
(10). Allows 4MByte memory pages instead of the 4KByte pages.
(11). The numeric coprocessor operates at about five times faster than the 80486 numeric
    coprocessor.
(12). A dual-integer processor often allows two instructions per clock.
(13). Super pipelined architecture.
(14). Having speed of 110 MIPs.
                                                                                     33
Register Organization Of Pentium
            (80586) Processor
•   Four 32-bit registers can be used as
•   Four 32-bit register (EAX, EBX, ECX, EDX)
•   Four 16-bit register (AX, BX, CX, DX)
•   Eight 8-bit register (AH, AL, BH, BL, CH, CL, DH, DL)
•   Some registers have special use ECX for count in loop instructions,




                                                                          34
Register Organization Of Pentium
            Processor




                                   35
Flag Register of Pentium Processor




                                 36
Flag Register of Pentium Processor

(1). ID:- The identification flag is used lb test for the CPUID
   instruction. If a program can set and clear the ID flag, the
   processor supports the CPUID instruction.

(2). VIP:- Virtual interrupt pending indicates that a virtual interrupt
   is pending.

(3). VIF :- Virtual interrupt is the image of the virtual interrupt flag
   IF used with VIP.


                                                                      37
END OF
SESSION
    svkaware@yahoo.co.in   38

More Related Content

What's hot

Modes of 80386
Modes of 80386Modes of 80386
Modes of 80386aviban
 
Instruction set of 8086
Instruction set of 8086Instruction set of 8086
Instruction set of 80869840596838
 
80386 processor
80386 processor80386 processor
80386 processorRasmi M
 
8086-instruction-set-ppt
 8086-instruction-set-ppt 8086-instruction-set-ppt
8086-instruction-set-pptjemimajerome
 
Introduction to 80386
Introduction to 80386Introduction to 80386
Introduction to 80386Abinaya B
 
Pin Description Diagram of Intel 80386 DX Microprocessor
Pin Description Diagram of Intel 80386 DX MicroprocessorPin Description Diagram of Intel 80386 DX Microprocessor
Pin Description Diagram of Intel 80386 DX MicroprocessorRaunaq Sahni
 
Interrupts on 8086 microprocessor by vijay kumar.k
Interrupts on 8086 microprocessor by vijay kumar.kInterrupts on 8086 microprocessor by vijay kumar.k
Interrupts on 8086 microprocessor by vijay kumar.kVijay Kumar
 
80286 microprocessor
80286 microprocessor80286 microprocessor
80286 microprocessorAvin Mathew
 
8086 pin diagram description
8086 pin diagram description8086 pin diagram description
8086 pin diagram descriptionAkhil Singal
 
Combined paging and segmentation
Combined paging and segmentationCombined paging and segmentation
Combined paging and segmentationTech_MX
 
Virtual memory
Virtual memoryVirtual memory
Virtual memoryAnuj Modi
 

What's hot (20)

The 80386 80486
The 80386 80486The 80386 80486
The 80386 80486
 
Intel+80286
Intel+80286Intel+80286
Intel+80286
 
Modes of 80386
Modes of 80386Modes of 80386
Modes of 80386
 
Uart
UartUart
Uart
 
Register Organization of 80386
Register Organization of 80386Register Organization of 80386
Register Organization of 80386
 
Instruction set of 8086
Instruction set of 8086Instruction set of 8086
Instruction set of 8086
 
Memory Organization
Memory OrganizationMemory Organization
Memory Organization
 
80386 processor
80386 processor80386 processor
80386 processor
 
ARM CORTEX M3 PPT
ARM CORTEX M3 PPTARM CORTEX M3 PPT
ARM CORTEX M3 PPT
 
8086
80868086
8086
 
8086-instruction-set-ppt
 8086-instruction-set-ppt 8086-instruction-set-ppt
8086-instruction-set-ppt
 
8086
80868086
8086
 
80386
8038680386
80386
 
Introduction to 80386
Introduction to 80386Introduction to 80386
Introduction to 80386
 
Pin Description Diagram of Intel 80386 DX Microprocessor
Pin Description Diagram of Intel 80386 DX MicroprocessorPin Description Diagram of Intel 80386 DX Microprocessor
Pin Description Diagram of Intel 80386 DX Microprocessor
 
Interrupts on 8086 microprocessor by vijay kumar.k
Interrupts on 8086 microprocessor by vijay kumar.kInterrupts on 8086 microprocessor by vijay kumar.k
Interrupts on 8086 microprocessor by vijay kumar.k
 
80286 microprocessor
80286 microprocessor80286 microprocessor
80286 microprocessor
 
8086 pin diagram description
8086 pin diagram description8086 pin diagram description
8086 pin diagram description
 
Combined paging and segmentation
Combined paging and segmentationCombined paging and segmentation
Combined paging and segmentation
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 

Viewers also liked

INTEL 80386 MICROPROCESSOR
INTEL  80386  MICROPROCESSORINTEL  80386  MICROPROCESSOR
INTEL 80386 MICROPROCESSORAnnies Minu
 
Salient featurs of 80386
Salient featurs of 80386Salient featurs of 80386
Salient featurs of 80386aviban
 
Addressing modes of 80386
Addressing modes of 80386Addressing modes of 80386
Addressing modes of 80386PDFSHARE
 
Register of 80386
Register of 80386Register of 80386
Register of 80386aviban
 
Architecture of 80286 microprocessor
Architecture of 80286 microprocessorArchitecture of 80286 microprocessor
Architecture of 80286 microprocessorSyed Ahmed Zaki
 
Intel I3,I5,I7 Processor
Intel I3,I5,I7 ProcessorIntel I3,I5,I7 Processor
Intel I3,I5,I7 Processorsagar solanky
 
80486 microprocessor
80486 microprocessor80486 microprocessor
80486 microprocessorMihika Shah
 
8259 Programmable Interrupt Controller by vijay
8259 Programmable Interrupt Controller by vijay8259 Programmable Interrupt Controller by vijay
8259 Programmable Interrupt Controller by vijayVijay Kumar
 
Difference between i3 and i5 and i7 and core 2 duo pdf
Difference between i3 and i5 and i7 and core 2 duo pdfDifference between i3 and i5 and i7 and core 2 duo pdf
Difference between i3 and i5 and i7 and core 2 duo pdfnavendu shekhar
 
Core 2 Duo Processor
Core 2 Duo ProcessorCore 2 Duo Processor
Core 2 Duo ProcessorKashif Latif
 

Viewers also liked (20)

INTEL 80386 MICROPROCESSOR
INTEL  80386  MICROPROCESSORINTEL  80386  MICROPROCESSOR
INTEL 80386 MICROPROCESSOR
 
Pentium
PentiumPentium
Pentium
 
Salient featurs of 80386
Salient featurs of 80386Salient featurs of 80386
Salient featurs of 80386
 
Addressing modes of 80386
Addressing modes of 80386Addressing modes of 80386
Addressing modes of 80386
 
Pentium processor
Pentium processorPentium processor
Pentium processor
 
Architecture of pentium family
Architecture of pentium familyArchitecture of pentium family
Architecture of pentium family
 
Pentium iii
Pentium iiiPentium iii
Pentium iii
 
Register of 80386
Register of 80386Register of 80386
Register of 80386
 
Architecture of 80286 microprocessor
Architecture of 80286 microprocessorArchitecture of 80286 microprocessor
Architecture of 80286 microprocessor
 
Intel I3,I5,I7 Processor
Intel I3,I5,I7 ProcessorIntel I3,I5,I7 Processor
Intel I3,I5,I7 Processor
 
Pentium
PentiumPentium
Pentium
 
Pentinum 2
Pentinum 2Pentinum 2
Pentinum 2
 
Pentium 4
Pentium 4Pentium 4
Pentium 4
 
Pentium II
Pentium IIPentium II
Pentium II
 
Privilege levels 80386
Privilege levels 80386Privilege levels 80386
Privilege levels 80386
 
Processors
ProcessorsProcessors
Processors
 
80486 microprocessor
80486 microprocessor80486 microprocessor
80486 microprocessor
 
8259 Programmable Interrupt Controller by vijay
8259 Programmable Interrupt Controller by vijay8259 Programmable Interrupt Controller by vijay
8259 Programmable Interrupt Controller by vijay
 
Difference between i3 and i5 and i7 and core 2 duo pdf
Difference between i3 and i5 and i7 and core 2 duo pdfDifference between i3 and i5 and i7 and core 2 duo pdf
Difference between i3 and i5 and i7 and core 2 duo pdf
 
Core 2 Duo Processor
Core 2 Duo ProcessorCore 2 Duo Processor
Core 2 Duo Processor
 

Similar to Pentium (80586) Microprocessor By Er. Swapnil Kaware

Architecture of 80386(www.munnuz.co.cc)
Architecture of 80386(www.munnuz.co.cc)Architecture of 80386(www.munnuz.co.cc)
Architecture of 80386(www.munnuz.co.cc)muneer.k
 
The microprocessor and it's architecture
The microprocessor and it's architectureThe microprocessor and it's architecture
The microprocessor and it's architecturesamaa ali
 
Unit-I_new Introduction to 80386 RMK.ppt
Unit-I_new Introduction to 80386 RMK.pptUnit-I_new Introduction to 80386 RMK.ppt
Unit-I_new Introduction to 80386 RMK.pptprajwalshete9359
 
Intel 8086 microprocessor
Intel 8086 microprocessorIntel 8086 microprocessor
Intel 8086 microprocessorRavi Yasas
 
Introduction to 80386 microprocessor
Introduction to 80386 microprocessorIntroduction to 80386 microprocessor
Introduction to 80386 microprocessorShehrevar Davierwala
 
32- bit Microprocessor-Indtel 80386.pptx
32- bit Microprocessor-Indtel 80386.pptx32- bit Microprocessor-Indtel 80386.pptx
32- bit Microprocessor-Indtel 80386.pptxYuvraj994432
 
Advanced Microprocessors
Advanced MicroprocessorsAdvanced Microprocessors
Advanced MicroprocessorsBuddiesSairamit
 
8086 class notes-Y.N.M
8086 class notes-Y.N.M8086 class notes-Y.N.M
8086 class notes-Y.N.MDr.YNM
 
Intel microprocessor history lec12_x86arch.ppt
Intel microprocessor history lec12_x86arch.pptIntel microprocessor history lec12_x86arch.ppt
Intel microprocessor history lec12_x86arch.pptjeronimored
 
x86 architecture
x86 architecturex86 architecture
x86 architecturei i
 
Evolution of microprocessors and 80486 Microprocessor.
Evolution of microprocessors and 80486 Microprocessor.Evolution of microprocessors and 80486 Microprocessor.
Evolution of microprocessors and 80486 Microprocessor.Ritwik MG
 
Presentation on 8086 microprocessor
Presentation on 8086 microprocessorPresentation on 8086 microprocessor
Presentation on 8086 microprocessorDiponkor Bala
 
microprocessor_part_3_compressed_1588259301.pdf
microprocessor_part_3_compressed_1588259301.pdfmicroprocessor_part_3_compressed_1588259301.pdf
microprocessor_part_3_compressed_1588259301.pdfssuserd21262
 

Similar to Pentium (80586) Microprocessor By Er. Swapnil Kaware (20)

Architecture of 80386(www.munnuz.co.cc)
Architecture of 80386(www.munnuz.co.cc)Architecture of 80386(www.munnuz.co.cc)
Architecture of 80386(www.munnuz.co.cc)
 
80386.pptx
80386.pptx80386.pptx
80386.pptx
 
The microprocessor and it's architecture
The microprocessor and it's architectureThe microprocessor and it's architecture
The microprocessor and it's architecture
 
Introduction to 80386
Introduction to 80386Introduction to 80386
Introduction to 80386
 
Unit-I_new Introduction to 80386 RMK.ppt
Unit-I_new Introduction to 80386 RMK.pptUnit-I_new Introduction to 80386 RMK.ppt
Unit-I_new Introduction to 80386 RMK.ppt
 
Intel 8086 microprocessor
Intel 8086 microprocessorIntel 8086 microprocessor
Intel 8086 microprocessor
 
110 ec0644
110 ec0644110 ec0644
110 ec0644
 
U I - 4. 80386 Real mode.pptx
U I - 4. 80386 Real mode.pptxU I - 4. 80386 Real mode.pptx
U I - 4. 80386 Real mode.pptx
 
Introduction to 80386 microprocessor
Introduction to 80386 microprocessorIntroduction to 80386 microprocessor
Introduction to 80386 microprocessor
 
32- bit Microprocessor-Indtel 80386.pptx
32- bit Microprocessor-Indtel 80386.pptx32- bit Microprocessor-Indtel 80386.pptx
32- bit Microprocessor-Indtel 80386.pptx
 
Advanced Microprocessors
Advanced MicroprocessorsAdvanced Microprocessors
Advanced Microprocessors
 
[ASM] Lab2
[ASM] Lab2[ASM] Lab2
[ASM] Lab2
 
Internal microprocessor architecture
Internal microprocessor architectureInternal microprocessor architecture
Internal microprocessor architecture
 
8086 class notes-Y.N.M
8086 class notes-Y.N.M8086 class notes-Y.N.M
8086 class notes-Y.N.M
 
Intel microprocessor history lec12_x86arch.ppt
Intel microprocessor history lec12_x86arch.pptIntel microprocessor history lec12_x86arch.ppt
Intel microprocessor history lec12_x86arch.ppt
 
x86 architecture
x86 architecturex86 architecture
x86 architecture
 
Evolution of microprocessors and 80486 Microprocessor.
Evolution of microprocessors and 80486 Microprocessor.Evolution of microprocessors and 80486 Microprocessor.
Evolution of microprocessors and 80486 Microprocessor.
 
Microprocessor lecture 2
Microprocessor lecture   2Microprocessor lecture   2
Microprocessor lecture 2
 
Presentation on 8086 microprocessor
Presentation on 8086 microprocessorPresentation on 8086 microprocessor
Presentation on 8086 microprocessor
 
microprocessor_part_3_compressed_1588259301.pdf
microprocessor_part_3_compressed_1588259301.pdfmicroprocessor_part_3_compressed_1588259301.pdf
microprocessor_part_3_compressed_1588259301.pdf
 

More from Prof. Swapnil V. Kaware

Corona Virus Awareness by, Er. Swapnil V. Kaware
Corona Virus Awareness by, Er. Swapnil V. KawareCorona Virus Awareness by, Er. Swapnil V. Kaware
Corona Virus Awareness by, Er. Swapnil V. KawareProf. Swapnil V. Kaware
 
Basic Electronics By, Er. Swapnil V. Kawrare
Basic Electronics By, Er. Swapnil V. KawrareBasic Electronics By, Er. Swapnil V. Kawrare
Basic Electronics By, Er. Swapnil V. KawrareProf. Swapnil V. Kaware
 
Addressing modes of 8085 by Er. Swapnil V. Kaware
Addressing modes of 8085 by Er. Swapnil V. KawareAddressing modes of 8085 by Er. Swapnil V. Kaware
Addressing modes of 8085 by Er. Swapnil V. KawareProf. Swapnil V. Kaware
 
Best Interview Tips By, Er. Swapnil V. Kaware
Best Interview Tips By, Er. Swapnil V. KawareBest Interview Tips By, Er. Swapnil V. Kaware
Best Interview Tips By, Er. Swapnil V. KawareProf. Swapnil V. Kaware
 
LED Lighting for Energy Efficiency By, Er. Swapnil V. Kaware
LED Lighting for Energy Efficiency By, Er. Swapnil V. KawareLED Lighting for Energy Efficiency By, Er. Swapnil V. Kaware
LED Lighting for Energy Efficiency By, Er. Swapnil V. KawareProf. Swapnil V. Kaware
 
Microprocessor & Interfacing (Part-2) By Er. Swapnil V. Kaware
Microprocessor & Interfacing (Part-2) By Er. Swapnil V. KawareMicroprocessor & Interfacing (Part-2) By Er. Swapnil V. Kaware
Microprocessor & Interfacing (Part-2) By Er. Swapnil V. KawareProf. Swapnil V. Kaware
 
Microprocessor & Interfacing (Part-1) By Er. Swapnil V. Kaware
Microprocessor & Interfacing (Part-1) By Er. Swapnil V. KawareMicroprocessor & Interfacing (Part-1) By Er. Swapnil V. Kaware
Microprocessor & Interfacing (Part-1) By Er. Swapnil V. KawareProf. Swapnil V. Kaware
 
Microprocessor Lab Manual by Er. Swapnil V. Kaware
Microprocessor Lab Manual by Er. Swapnil V. KawareMicroprocessor Lab Manual by Er. Swapnil V. Kaware
Microprocessor Lab Manual by Er. Swapnil V. KawareProf. Swapnil V. Kaware
 
Electronics Lab Manual by Er. Swapnil V. Kaware
Electronics Lab Manual by Er. Swapnil V. KawareElectronics Lab Manual by Er. Swapnil V. Kaware
Electronics Lab Manual by Er. Swapnil V. KawareProf. Swapnil V. Kaware
 
Transistors & Oscillators by Er. Swapnil Kaware
Transistors & Oscillators by Er. Swapnil KawareTransistors & Oscillators by Er. Swapnil Kaware
Transistors & Oscillators by Er. Swapnil KawareProf. Swapnil V. Kaware
 
Basic Electronics (Rectifiers) by Er. Swapnil Kaware
Basic Electronics (Rectifiers) by Er. Swapnil KawareBasic Electronics (Rectifiers) by Er. Swapnil Kaware
Basic Electronics (Rectifiers) by Er. Swapnil KawareProf. Swapnil V. Kaware
 
Digital Electronics Basics by Er. Swapnil Kaware
Digital Electronics Basics by Er. Swapnil KawareDigital Electronics Basics by Er. Swapnil Kaware
Digital Electronics Basics by Er. Swapnil KawareProf. Swapnil V. Kaware
 
Digital computer Basics by, Er. Swapnil Kaware
Digital computer Basics by, Er. Swapnil KawareDigital computer Basics by, Er. Swapnil Kaware
Digital computer Basics by, Er. Swapnil KawareProf. Swapnil V. Kaware
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareProf. Swapnil V. Kaware
 
Digital signal processing By Er. Swapnil Kaware
Digital signal processing By Er. Swapnil KawareDigital signal processing By Er. Swapnil Kaware
Digital signal processing By Er. Swapnil KawareProf. Swapnil V. Kaware
 

More from Prof. Swapnil V. Kaware (20)

Corona Virus Awareness by, Er. Swapnil V. Kaware
Corona Virus Awareness by, Er. Swapnil V. KawareCorona Virus Awareness by, Er. Swapnil V. Kaware
Corona Virus Awareness by, Er. Swapnil V. Kaware
 
Basic Electronics By, Er. Swapnil V. Kawrare
Basic Electronics By, Er. Swapnil V. KawrareBasic Electronics By, Er. Swapnil V. Kawrare
Basic Electronics By, Er. Swapnil V. Kawrare
 
Addressing modes of 8085 by Er. Swapnil V. Kaware
Addressing modes of 8085 by Er. Swapnil V. KawareAddressing modes of 8085 by Er. Swapnil V. Kaware
Addressing modes of 8085 by Er. Swapnil V. Kaware
 
Best GD tips by, Er. Swapnil V. Kaware
Best GD tips by, Er. Swapnil V. KawareBest GD tips by, Er. Swapnil V. Kaware
Best GD tips by, Er. Swapnil V. Kaware
 
Best Interview Tips By, Er. Swapnil V. Kaware
Best Interview Tips By, Er. Swapnil V. KawareBest Interview Tips By, Er. Swapnil V. Kaware
Best Interview Tips By, Er. Swapnil V. Kaware
 
Chandrayaan 2 By, Er. Swapnil V. Kaware
Chandrayaan 2 By, Er. Swapnil V. KawareChandrayaan 2 By, Er. Swapnil V. Kaware
Chandrayaan 2 By, Er. Swapnil V. Kaware
 
LED Lighting for Energy Efficiency By, Er. Swapnil V. Kaware
LED Lighting for Energy Efficiency By, Er. Swapnil V. KawareLED Lighting for Energy Efficiency By, Er. Swapnil V. Kaware
LED Lighting for Energy Efficiency By, Er. Swapnil V. Kaware
 
Microprocessor & Interfacing (Part-2) By Er. Swapnil V. Kaware
Microprocessor & Interfacing (Part-2) By Er. Swapnil V. KawareMicroprocessor & Interfacing (Part-2) By Er. Swapnil V. Kaware
Microprocessor & Interfacing (Part-2) By Er. Swapnil V. Kaware
 
Microprocessor & Interfacing (Part-1) By Er. Swapnil V. Kaware
Microprocessor & Interfacing (Part-1) By Er. Swapnil V. KawareMicroprocessor & Interfacing (Part-1) By Er. Swapnil V. Kaware
Microprocessor & Interfacing (Part-1) By Er. Swapnil V. Kaware
 
Combinational Logic Circuits
Combinational Logic CircuitsCombinational Logic Circuits
Combinational Logic Circuits
 
Microprocessor Lab Manual by Er. Swapnil V. Kaware
Microprocessor Lab Manual by Er. Swapnil V. KawareMicroprocessor Lab Manual by Er. Swapnil V. Kaware
Microprocessor Lab Manual by Er. Swapnil V. Kaware
 
LED basics by Er. Swapnil V. Kaware
LED basics by Er. Swapnil V. KawareLED basics by Er. Swapnil V. Kaware
LED basics by Er. Swapnil V. Kaware
 
Electronics Lab Manual by Er. Swapnil V. Kaware
Electronics Lab Manual by Er. Swapnil V. KawareElectronics Lab Manual by Er. Swapnil V. Kaware
Electronics Lab Manual by Er. Swapnil V. Kaware
 
Transistors & Oscillators by Er. Swapnil Kaware
Transistors & Oscillators by Er. Swapnil KawareTransistors & Oscillators by Er. Swapnil Kaware
Transistors & Oscillators by Er. Swapnil Kaware
 
Basic Electronics (Rectifiers) by Er. Swapnil Kaware
Basic Electronics (Rectifiers) by Er. Swapnil KawareBasic Electronics (Rectifiers) by Er. Swapnil Kaware
Basic Electronics (Rectifiers) by Er. Swapnil Kaware
 
Basic Electronics by Er. Swapnil Kaware
Basic Electronics by Er. Swapnil KawareBasic Electronics by Er. Swapnil Kaware
Basic Electronics by Er. Swapnil Kaware
 
Digital Electronics Basics by Er. Swapnil Kaware
Digital Electronics Basics by Er. Swapnil KawareDigital Electronics Basics by Er. Swapnil Kaware
Digital Electronics Basics by Er. Swapnil Kaware
 
Digital computer Basics by, Er. Swapnil Kaware
Digital computer Basics by, Er. Swapnil KawareDigital computer Basics by, Er. Swapnil Kaware
Digital computer Basics by, Er. Swapnil Kaware
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
 
Digital signal processing By Er. Swapnil Kaware
Digital signal processing By Er. Swapnil KawareDigital signal processing By Er. Swapnil Kaware
Digital signal processing By Er. Swapnil Kaware
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 

Pentium (80586) Microprocessor By Er. Swapnil Kaware

  • 1. 80386 Microprocessor Presented By, Er. Swapnil Kaware, B.E.(Electronics), svkaware@yahoo.co.in 1
  • 2. Salient Features Of 80386 Microprocessor (1). 80386 Microprocessor Introduced in 1985 by Intel Corporation. (2). Address bus is of 32-bit & Data bus is of 32-bit. (3). 80386 Microprocessor can address up to 232 i.e. 4G bytes of memory. (4). Operating frequency of 20-33 MHz . (5). Contains total 132 Pins. (6). Intel’s first practical microprocessor to contain a 32-bit data bus and 32-bit memory address (7). 80386 had higher clocking speeds and included a memory management unit. (8). Improved efficiency, reduced software overload. (9). Instruction set, memory management upward-compatible with 8086, 8088, and 80286 Microprocessor. (10). Can operates in real, protected & virtual Mode. (11). Introduced paging, virtual memory concept. (12). Based on CMOS Technology. (13). Contains near about 2,75,000 Transistors. (14). Can operate at 11.4 MIPS. (15). 11 Addressing modes. 2
  • 3. Versions of 80386 Microprocessor (A) 80386 SX (B) 80386 DX (1). A.B. is of 32 Bit. (1). A.B. is of 24 Bit. (2). D.B. is of 32 Bit. (2). D.B. is of 16 Bit. (3). Total 132 Pins. (3). Total 100 Pins. (4). Can address upto (4). Can address upto 4GB of memory. 16MB of memory. 3
  • 5. Register Organization Of 80386 (1). The 80386 has eight 32 - bit general purpose registers which may be used as either 8 bit or 16 bit registers. (2). A 32 - bit register known as an extended register, is represented by the register name with prefix E. (3). Example : A 32 bit register corresponding to AX is EAX, similarly BX is EBX etc. (4). The 16 bit registers BP, SP, SI and DI in 8086 are now available with their extended size of 32 bit and are names as EBP,ESP,ESI and EDI. (5). AX represents the lower 16 bit of the 32 bit register EAX. (6). BP, SP, SI, DI represents the lower 16 bit of their 32 bit counterparts, and can be used as independent 16 bit registers. (7). The CS and SS are the code and the stack segment registers respectively, while DS, ES, FS, GS are 4 data segment registers. 5
  • 6. Flag Register of 80386 Microprocessor • The Flag register of 80386 is a 32 bit register. Out of the 32 bits, Intel has reserved bits D18 to D31, D5 and D3, while D1 is always set at 1. • Two extra new flags are added to the 80286 flag to derive the flag register of 80386. They are VM and RF flags. 6
  • 7. Flag Register of 80386 Microprocessor (1). IOPL (Input Output Privilege Level) flags:- For protected mode operations indicates the privilege level, 0 to 3, at which your code must be running in order to execute any I/O-related instructions. (2). VM Virtual 8086 mode flag:- When it is set, the x86 processor is basically converted into a high-speed 8086 processor. (3). RF:- Resume Flag This flag is used with the debug register break points. It is checked at the starting of every instruction cycle. • The RF is automatically reset after successful execution of every instruction. (4). NT :- (Nested Task) The processor uses the nested task flag to control chaining of interrupted and called tasks. 7
  • 8. VM - Virtual Mode Flag • If this flag is set, the 80386 enters the virtual 8086 mode within the protection mode. • This is to be set only when the 80386 is in protected mode. • This bit can be set using IRET instruction or any task switch operation only in the protected mode. 8
  • 9. RF- Resume Flag • It is checked at the starting of every instruction cycle and if it is set, any debug fault is ignored during the instruction cycle. • The RF is automatically reset after successful execution of every instruction, except for IRET and POPF instructions. • JMP, CALL and INT instructions are used to set the RF to the value specified by the memory data available at the stack. 9
  • 10. • Segment Descriptor Registers:  This registers are not available for programmers, rather they are internally used to store the descriptor information, like attributes, limit and base addresses of segments.  The six segment registers (i.e. CS,SS,DS,ES,FS,GS) have corresponding six 73 bit descriptor registers. Each of them contains 32 bit base address, 32 bit base limit and 9 bit attributes.  These are automatically loaded when the corresponding segments are loaded with selectors. • Control Registers:  The 80386 has three 32 bit control registers CR0, CR2 and CR3 Load and store instructions are available to access these registers. 10
  • 11. • System Address Registers: • The 80386 supports four types of descriptor table, viz. (1) Global Descriptor Table (GDT), (2) Interrupt Descriptor Table (IDT), (3) Local Descriptor Table (LDT), (4) Task State Segment Descriptor (TSS). • They holds the addresses of corresponding segments. 11
  • 12. Debug and Test Registers 32 0 Linear Breakpoint Address 0 DR0 Linear Breakpoint Address 1 DR1 Linear Breakpoint Address 2 DR2 Linear Breakpoint Address 3 DR3 Intel Reserved DR4 Intel Reserved DR5 Breakpoint Status DR6 Breakpoint Control DR7 32 0 Test Control TR6 Test Status TR7 12
  • 13. • Debug and Test Registers: • Intel has provide a set of 8 debug registers for hardware debugging. • Out of these eight registers DR0 to DR7, two registers DR4 and DR5 are Intel reserved. • The initial four registers DR0 to DR3 store four program controllable breakpoint addresses, while DR6 and DR7 respectively hold breakpoint status and breakpoint control information. • Two more test register are provided by 80386 for page cacheing namely test control and test status register. 13
  • 14. Addressing Modes • 80386 supports total 11 addressing modes. • Scaled Indexed Mode: Contents of the an index register are multiplied by a scale factor (the valid scale factors are 1,2,4 & 8) that may be added further to get the operand offset. e.g. MOV EBX, LIST [ESI*2] • Based Scaled Indexed Mode: Contents of the an index register are multiplied by a scale factor and then added to base register to obtain the offset. e.g. MOV EBX, LIST [EDX*4] [ECX] • Based Scaled Indexed Mode with Displacement: The Contents of the an index register are multiplied by a scaling factor and the result is added to a base register and a displacement to get the offset of an operand. e.g. MOV EAX, LIST [ESI*2] [EBX+0800] 14
  • 15. Data Types Of 80386 (1). Bit. (2). Bit field-A group of at most 32 bits i.e., 4 bytes. (3). Bit string- A string of continuous bits of maximum 4Gbytes length. (4). Signed Byte- Signed byte data. Sign of the operand depends upon its most significant bit. If it is 0, then the number is positive. else it is negative. Range is from -128 to 127. (5). Unsigned Byte-Unsigned byte data.Range from 0 to 255. (6). Integer word- Signed 16-bit data. Range from -32,768 to 32,767. (7). Long Integer-32-bit signed data that is represented in 2's complement form. Range is from -2.147*109 to 2.1479. (8). Unsigned Integer Word- Unsigned 16-bit data.Range from 0 to 65,535. (9). Unsigned Long Integer-Unsigned 32 bit data. Range from 0 to 4,294,967,295. 15
  • 16. (10). Signed quad word- A signed 64-bit or four word data. (11). Unsigned Quad Word-An unsigned 64-bit data. (12). Offset-A 16 or 32- bit displacement that references a memory location using any of the addressing modes. (13). Pointer-16-bit selector and 16 or 32 bit offset. (14). Character-An ASCII equivalent to any of the alphanumeric or control characters . (15). Strings-These are the sequences of bytes, words or double words . A string may contain up to maximum 4 GB. (16). BCD- Decimal digits from 0-9 represented by unpacked bytes. (17). Packed BCD- This represents two packed BCD digits using a byte from 00 to 99. 16
  • 17. Real Addressing Mode (1). After reset, the 80386 starts from memory location FFFFFFF0H under the real address mode. (2). In the real mode, 80386 works as a faster 8086 with 32-bit registers and data types. (3). In real mode, the default operand size is 16 bit but 32- bit operands and addressing modes may be used. (4). The segment size in real mode is 64K. (5). The real mode initializes the 80386 and prepares it for protected mode. (6). The segments in 80386 real mode may be overlapped or non-overlapped. (7). The segment in 80386 real mode can be read, write or executed, i.e. no protection is available. 17
  • 18. 18
  • 19. Protected Mode of 80386 (1). All the capabilities of 80386 are available for utilization in its protected mode of operation. (2). The 80386 in protected mode support all the software written for 80286 and 8086 to be executed under the control of memory management and protection abilities of 80386. (3). The protected mode allows the use of additional instruction, addressing modes and capabilities of 80386. (4). The effective address (offset) is added with segment base address to calculate linear address. (5). This linear address is further used as physical address, if the paging unit is disabled, otherwise the paging unit converts the linear address into physical address. (6). The paging unit operates under the control of segmentation unit. The paging unit if enabled converts linear addresses into physical address, in protected mode. 19
  • 20. Segmentation DESCRIPTOR TABLES: These descriptor tables and registers are manipulated by the operating system to ensure the correct operation of the processor, and hence the correct execution of the program. Three types of the 80386 descriptor tables are listed as follows: (1). GLOBAL DESCRIPTOR TABLE ( GDT ) (2). LOCAL DESCRIPTOR TABLE ( LDT ) (3). INTERRUPT DESCRIPTOR TABLE ( IDT ) 20
  • 21. • GDT (1). Maintains list of Most Segments (2). It’s a general Purpose table of descriptors. (4). 48-bit register. • IDT (1). Maintains list of Interrupt service routines. (2). 48-bit register. • LDT (1) Optional. (2) Extends range of GDT. (3) Is allocated to each task when multitasking is enabled. (4). 16-bit register. 21
  • 22. Segment Descriptor Format (1). A ( Accessed) : Processor automatically sets this bit whenever a memory reference is made using the defined segment . (2). DPL : Indicates the level of privilege associated with the memory space that descriptor defines. DPL0 is highest while DPL3 is lowest. (3). S ( System ) : If clear indicates that this is system segment descriptor. If set non- system. 22
  • 23. (4). P ( Present): If clear, the address range that this descriptor defines is considered to be temporarily not present in physical memory space. (5). U ( User): Undefined and ignored by 80386,but user can use it. (6). X : Reserved (7). D ( Default):When clear operands in this is segment is assumed to be 16 bits and when set assumed to be 32 bits. (8). G ( Granularity): When this bit is cleared ,the 20 bit limit field is assumed to be measured in units of 1 byte. If set the limit is in units of 4 KB. (9) Type (3): Type of segment you are defining. (a). 000: Data , read only ( ROM space) (b). 001: Data ,R/W (c). 010: Stack read only (d). 011: Stack R/W (e). 100: Code, execute only (f). 101: Code execute/ read (g). 110: Code execute only , conforming (h). 111:Code execute / read, conforming 23
  • 24. Paging (1). Paging is one of the memory management techniques used for virtual memory multitasking operating system. (2). The segmentation scheme may divide the physical memory into a variable size segments but the paging divides the memory into a fixed size pages. (3). The segments are supposed to be the logical segments of the program, but the pages do not have any logical relation with the program. (4). The pages are just fixed size portions of the program module or data. 24
  • 25. (5). The advantage of paging scheme is that the complete segment of a task need not be in the physical memory at any time. (6). Only a few pages of the segments, which are required currently for the execution need to be available in the physical memory. (7). Thus the memory requirement of the task is substantially reduced, relinquishing the available memory for other tasks. (8). Whenever the other pages of task are required for execution, they may be fetched from the secondary storage. (9). The previous page which are executed, need not be available in the memory, and hence the space occupied by them may be relinquished for other tasks. (10). Thus paging mechanism provides an effective technique to manage the physical memory for multitasking systems. 25
  • 26. 26
  • 27. Paging Unit: (1). The paging unit of 80386 uses a two level table mechanism to convert a linear address provided by segmentation unit into physical addresses. (2). The paging unit converts the complete map of a task into pages, each of size 4K. (3). The task is further handled in terms of its page, rather than segments. (4). The paging unit handles every task in terms of three components namely page directory, page tables and page itself. Page Directory: (1). This is at the most 4Kbytes in size. Each directory entry is of 4 bytes, thus a total of 1024 entries are allowed in a directory. (2). The upper 10 bits of the linear address are used as an index to the corresponding page directory entry. The page directory entries point to page tables. 27
  • 28. Page Tables: (1). Each page table is of 4Kbytes in size and many contain a maximum of 1024 entries. (2). The page table entries contain the starting address of the page and the statistical information about the page. (3). The upper 20 bit page frame address is combined with the lower 12 bit of the linear address. (4). The accessed bit A is set by 80386 before any access to the page. If A=1, the page is accessed, else unaccessed. (5). The D bit ( Dirty bit) is set before a write operation to the page is carried out. (6). The OS reserved bits are defined by the operating system software. (7). The User / Supervisor (U/S) bit and read/write bit are used to provide protection. 28
  • 29. Virtual 8086 Mode (1). Thus, the virtual 8086 mode of operation of 80386, offers an advantage of executing 8086 programs while in protected mode. (2). The address forming mechanism in virtual 8086 mode is exactly identical with that of 8086 real mode. (3). In virtual mode, 8086 can address 1Mbytes of physical memory that may be anywhere in the 4Gbytes address space of the protected mode of 80386. (4). Like 80386 real mode, the addresses in virtual 8086 mode lie within 1Mbytes of memory. (5). In virtual mode, the paging mechanism and protection capabilities are available at the service of the programmers. (6). The 80386 supports multiprogramming, hence more than one programmer may be use the CPU at a time. (7). Paging unit may not be necessarily enable in virtual mode, but may be needed to run the 8086 programs which require more than 1Mbyts of memory for memory management function. (8). In virtual mode, the paging unit allows only 256 pages, each of 4Kbytes size. (9). Each of the pages may be located anywhere in the maximum 4Gbytes physical memory. (10). The virtual mode allows the multiprogramming of 8086 applications. 29
  • 30. 80486 Microprocessor (1). Introduced in 1989. (2). Can execute around 40 million instructions per second. (3). On chip floating point unit for faster execution of complex instructions. (4). Having operating frequency of 16MHz to 50MHz. (5). Total 168 pins. (6). Paging & Virtual memory concept. (7). Multiprocessor support. (8). Data bus is of 32 bits. (9). Address bus is of 32 bits. (10). High speed data transfer. (11). More than 1.2 million transistors. (12). Can address up to 4 billion bytes of memory. (13). Can operate in real & protected mode. (14). Contains 80387 arithmetic co processor. (15). Uses Pipelining i.e. can execute up to 1 instruction per clock cycle. 30
  • 31. Flag Register of 80486 Microprocessor FLAGS 31 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 E F RESERVED FOR L INTEL AC VM RF 0 NT IOPL OF DF IF TF SF ZF 0 AF 0 PF 1 CF A G CF: Carry Flag AF: Auxiliary carry OF : Over Flow ZF: Zero Flag IOPL : I/O Privilege Level SF : Sign Flag NT : Nested Task Flag TF : Trap Flag RF : Resume Flag IE : Interrupt Enable VM : Virtual Mode AC : Alignment Check DF : Direct Flag 31
  • 32. Flag Register of 80486 (1). The register set of 80486 is similar to that of 80386. (2). Only a flag called alignment flag is added at the position D18. (3). If the AC flag is set to ’1’, whenever there is an access to a misaligned address i.e. a fault (exception) is generated. 32
  • 33. 80586 (Pentium) Microprocessor (1). Pentium (80586) Microprocessor was introduced in 1993. (2). Data bus is of 64-bit & address bus is of 32 bits. (3). Superscalar performance: can execute 2 instructions per clock cycle. (4). Introductory versions operated with a clocking frequency of 60 MHz & 66 MHz. (5). Can address up to 4G bytes of memory. (6). Contains total 237 pins. (7). Memory access time near about 18 ns. (8). Contains near about 3.1 millions of transistors. (9). High-level system functions such as power management and security. (10). Allows 4MByte memory pages instead of the 4KByte pages. (11). The numeric coprocessor operates at about five times faster than the 80486 numeric coprocessor. (12). A dual-integer processor often allows two instructions per clock. (13). Super pipelined architecture. (14). Having speed of 110 MIPs. 33
  • 34. Register Organization Of Pentium (80586) Processor • Four 32-bit registers can be used as • Four 32-bit register (EAX, EBX, ECX, EDX) • Four 16-bit register (AX, BX, CX, DX) • Eight 8-bit register (AH, AL, BH, BL, CH, CL, DH, DL) • Some registers have special use ECX for count in loop instructions, 34
  • 35. Register Organization Of Pentium Processor 35
  • 36. Flag Register of Pentium Processor 36
  • 37. Flag Register of Pentium Processor (1). ID:- The identification flag is used lb test for the CPUID instruction. If a program can set and clear the ID flag, the processor supports the CPUID instruction. (2). VIP:- Virtual interrupt pending indicates that a virtual interrupt is pending. (3). VIF :- Virtual interrupt is the image of the virtual interrupt flag IF used with VIP. 37
  • 38. END OF SESSION svkaware@yahoo.co.in 38