SlideShare a Scribd company logo
Group :4
• Roll Number :001
• Roll Number :033
• Roll Number :035
• Roll Number :041
• Roll Number:045
University Of Gujrat
PROTECTED MODE MEMORY
ADDRESSING
PROTECTED MODE MEMORY ADDRESSING
• Protected mode memory addressing allows access to data
and programs located above the first 1M byte of memory.
• Addressing this extended section of the memory system
requires a change to the segment plus an offset addressing
scheme used with real mode memory addressing.
PROTECTED MODE MEMORY ADDRESSING
• In protected addressing mode segments can be of variable
size(below or above 64 KB).
• Some system control instructions are only valid in the
protected mode.
• The offset part of the memory address is still the same as in
real addressing mode. However, when in the protected mode,
the processor can work either with 16-bit offsets or with 32-
bit offsets.
PROTECTED MODE MEMORY ADDRESSING
• A 32-bit offset allows segments of up to 4G bytes. Notice that
in real-mode the only available instruction mode is the 16-bit
mode.
• One difference between real and protected addressing mode is
that the segment address, as discussed with real mode memory
addressing, is no longer present in the protected mode.
PROTECTED MODE MEMORY ADDRESSING
• In place of the segment address, the segment register contains a
selector
• The selector selects a descriptor from a descriptor table.
• The descriptor describes the memory segment's location,
length, and access rights. This is similar to selecting one card
from a deck of cards in one's pocket.
PROTECTED MODE MEMORY ADDRESSING
• The selector, located in the segment register, selects one of
8192 descriptors from one of two tables of descriptors
(stored in memory): the global and local descriptor tables.
The descriptor describes the location, length and access
rights of the memory segment.
• Each descriptor is 8 bytes long.
PROTECTED MODE MEMORY ADDRESSING
• The 8192 descriptor table requires 8 * 8192 = 64K bytes of
memory.
INTRO TO PROTECTED MODE
MEMORY ADDRESSING
 Data and programs located within & above the first 1M byte of memory
• Protected mode is where Windows operates.
• The segment register contains a selector that selects a descriptor from a
descriptor table.
• The descriptor describes the memory segment’s location, length, and
access rights.
Selectors and Descriptors
• The selector is located in the segment register
• Describes the location, length, and access rights of the segment of
memory.
• it selects one of 8192 descriptors from one
of two tables of descriptors.
• Indirectly, the register still selects a memory segment, but not directly
as in real mode.
Descriptors table•
• Two types of Descriptor table selected by the segment register.
• Global descriptors contain segment definitions that apply to all programs.
• a global descriptor might be called a system descriptor
• Local descriptors are usually unique to an application.
• Local descriptor an application descriptor .
• global and local descriptor tables are a
maximum of 64K bytes in length
The format of a descriptor for the 80286 .
Explanation
• each descriptor is 8 bytes in length.
• The base address of the descriptor indicates the starting location of the
memory segment.
• The G, or granularity bit allows a segment length of 4K to 4G bytes in
steps of 4K bytes.
• 32-bit offset address allows segment lengths of 4G bytes
• 16-bit offset address allows segment lengths of 64K bytes.
The access rights byte for the 80286 descriptor
The access rights byte controls access to the
protected mode segment
• describes segment function in the system and allows complete
control over the segment
• if the segment is a data segment, the direction of growth is
specified
• If the segment grows beyond its limit,the
• operating system is interrupted, indicating
a general protection fault.
The contents of a segment register during protected mode
operation of the 80286 microprocessors.
 Descriptors are chosen from the descriptor table by the
segment register.
• register contains a 13-bit selector field, a table selector bit, and
requested privilege level field.
• The TI bit selects either the global or the local descriptor table.
• Requested Privilege Level (RPL) requests the access privilege
level of a memory segment.
Example
Explanation
 the segment register, containing a selector.
 chooses a descriptor from the global descriptor table.
 The entry in the global descriptor table selects a segment in the
memory system
 Descriptor zero is called the null descriptor, must contain all zeros,
and may not be used for accessing memory.
Memory Addressing
Memory Paging
Memory Paging
 In the paging memory-management scheme, the operating system
retrieves data from secondary storage in same-size blocks
called pages.
 The Memory management unit consists of
 Segmentation unit and
 Paging unit.
 Segmentation unit allows segments of size 4Gbytes at max.
 The Paging unit organizes the physical memory in terms of pages
of 4kbytes size each.
 Mechanism available in the 80386 and up.
Allows a linear address ( program generated ) of a program to be
located in any portion of physical memory.
Paging unit works under the control of the segmentation unit, i.e.
each segment is further divided into pages.
 The linear address is invisibly translated to any physical address
Through paging to the hard disk drive and paging to the memory
through the memory paging unit, any Windows application can be
executed
GenerateProgram Linear Address Through Paging
Physical
Address
 The name EMM386 was used for the expanded memory managers of
both Microsoft's and MS-DOS which created expanded memory
using extended memory on Intel 80386 CPUs.
 Expanded memory is a system that provided additional memory
to DOS programs beyond the limit of conventional memory .
 The paging system operates in both real and protected mode.
The paging unit is controlled by the microprocessors control registers:
Paging Registers
 It is enabled by setting the PG bit to 1 (left most bit in CR0 ).
(If set to 0, linear addresses are physical addresses).
 CR3 contains the page directory "physical" base address.
 Each page directory entry contain 1024 directory entries of 4 byte each.
 Each page directory entry addresses a page table that contains up to 1024
entries.
Count….
The virtual address is broken into three pieces
 Directory : Each page directory addresses a 4MB section of main
mem.
 Page Table : Each page table entry addresses a 4KB section of main
mem.
 Offset : Specifies the byte in the page.
Memory Addressing

More Related Content

What's hot

Addressing modes
Addressing modesAddressing modes
Addressing modes
rajukarki1599
 
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIAMicroprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
Dheeraj Kataria
 
Addressing modes of 8086
Addressing modes of 8086Addressing modes of 8086
Addressing modes of 8086
saurav kumar
 
8086 assembly language
8086 assembly language8086 assembly language
8086 assembly languageMir Majid
 
80386 microprocessor
80386 microprocessor80386 microprocessor
80386 microprocessor
Jerin Sebastian
 
Usart 8251
Usart 8251Usart 8251
Instruction formats-in-8086
Instruction formats-in-8086Instruction formats-in-8086
Instruction formats-in-8086
MNM Jain Engineering College
 
Comparison of pentium processor with 80386 and 80486
Comparison of pentium processor with  80386 and 80486Comparison of pentium processor with  80386 and 80486
Comparison of pentium processor with 80386 and 80486Tech_MX
 
Architecture of 8086 Microprocessor
Architecture of 8086 Microprocessor  Architecture of 8086 Microprocessor
Architecture of 8086 Microprocessor Mustapha Fatty
 
8251 a usart programmable communication interface(1)
8251 a usart   programmable communication interface(1)8251 a usart   programmable communication interface(1)
8251 a usart programmable communication interface(1)
divyangpit
 
8259 a
8259 a8259 a
8251 USART
8251 USART8251 USART
8251 USART
coolsdhanesh
 
Addressing modes 8085
Addressing modes 8085Addressing modes 8085
Addressing modes 8085
ShivamSood22
 
Addressing modes of 8086 - Binu Joy
Addressing modes of 8086 - Binu JoyAddressing modes of 8086 - Binu Joy
Addressing modes of 8086 - Binu Joy
Binu Joy
 
80386 Architecture
80386 Architecture80386 Architecture
80386 Architecture
Rohit Choudhury
 
8086 class notes-Y.N.M
8086 class notes-Y.N.M8086 class notes-Y.N.M
8086 class notes-Y.N.M
Dr.YNM
 
Memory interfacing of microprocessor 8085
Memory interfacing of microprocessor 8085Memory interfacing of microprocessor 8085
Memory interfacing of microprocessor 8085
Nilesh Bhaskarrao Bahadure
 
Addressing modes of 8086
Addressing modes of 8086Addressing modes of 8086
Addressing modes of 8086
Dr. AISHWARYA N
 

What's hot (20)

Interfacing 8255
Interfacing 8255Interfacing 8255
Interfacing 8255
 
Addressing modes
Addressing modesAddressing modes
Addressing modes
 
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIAMicroprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
 
Addressing modes of 8086
Addressing modes of 8086Addressing modes of 8086
Addressing modes of 8086
 
8086 assembly language
8086 assembly language8086 assembly language
8086 assembly language
 
80386 microprocessor
80386 microprocessor80386 microprocessor
80386 microprocessor
 
Usart 8251
Usart 8251Usart 8251
Usart 8251
 
Instruction formats-in-8086
Instruction formats-in-8086Instruction formats-in-8086
Instruction formats-in-8086
 
Comparison of pentium processor with 80386 and 80486
Comparison of pentium processor with  80386 and 80486Comparison of pentium processor with  80386 and 80486
Comparison of pentium processor with 80386 and 80486
 
Introduction to 80386
Introduction to 80386Introduction to 80386
Introduction to 80386
 
Architecture of 8086 Microprocessor
Architecture of 8086 Microprocessor  Architecture of 8086 Microprocessor
Architecture of 8086 Microprocessor
 
8251 a usart programmable communication interface(1)
8251 a usart   programmable communication interface(1)8251 a usart   programmable communication interface(1)
8251 a usart programmable communication interface(1)
 
8259 a
8259 a8259 a
8259 a
 
8251 USART
8251 USART8251 USART
8251 USART
 
Addressing modes 8085
Addressing modes 8085Addressing modes 8085
Addressing modes 8085
 
Addressing modes of 8086 - Binu Joy
Addressing modes of 8086 - Binu JoyAddressing modes of 8086 - Binu Joy
Addressing modes of 8086 - Binu Joy
 
80386 Architecture
80386 Architecture80386 Architecture
80386 Architecture
 
8086 class notes-Y.N.M
8086 class notes-Y.N.M8086 class notes-Y.N.M
8086 class notes-Y.N.M
 
Memory interfacing of microprocessor 8085
Memory interfacing of microprocessor 8085Memory interfacing of microprocessor 8085
Memory interfacing of microprocessor 8085
 
Addressing modes of 8086
Addressing modes of 8086Addressing modes of 8086
Addressing modes of 8086
 

Viewers also liked

Protection mode
Protection modeProtection mode
Protection mode
Deepak Kumar
 
Addressing Modes Of 8086
Addressing Modes Of 8086Addressing Modes Of 8086
Addressing Modes Of 8086
Ikhlas Rahman
 
1327 Addressing Modes Of 8086
1327 Addressing Modes Of 80861327 Addressing Modes Of 8086
1327 Addressing Modes Of 8086
techbed
 
Protection 80386
Protection 80386Protection 80386
Protection 80386
Akshay Nagpurkar
 
Architecture of 80286 microprocessor
Architecture of 80286 microprocessorArchitecture of 80286 microprocessor
Architecture of 80286 microprocessor
Syed Ahmed Zaki
 
The Intel 8086 microprocessor
The Intel 8086 microprocessorThe Intel 8086 microprocessor
The Intel 8086 microprocessor
George Thomas
 
Addressing mode of 80286 microprocessor
Addressing mode of 80286 microprocessorAddressing mode of 80286 microprocessor
Addressing mode of 80286 microprocessor
pal bhumit
 
8086 microprocessor-architecture
8086 microprocessor-architecture8086 microprocessor-architecture
8086 microprocessor-architecture
prasadpawaskar
 
معماری ماشین های پیشرفته کم دستور
معماری ماشین های پیشرفته کم دستورمعماری ماشین های پیشرفته کم دستور
معماری ماشین های پیشرفته کم دستور
Amir Reza Asadi
 
Timer
TimerTimer
TimerAisu
 
8254 PIT
8254 PIT8254 PIT
8254 PIT
deval patel
 
Why the Address Translation Scheme Matters?
Why the Address Translation Scheme Matters?Why the Address Translation Scheme Matters?
Why the Address Translation Scheme Matters?Jiaqing Du
 

Viewers also liked (20)

Protection mode
Protection modeProtection mode
Protection mode
 
Addressing Modes Of 8086
Addressing Modes Of 8086Addressing Modes Of 8086
Addressing Modes Of 8086
 
The 80386 80486
The 80386 80486The 80386 80486
The 80386 80486
 
1327 Addressing Modes Of 8086
1327 Addressing Modes Of 80861327 Addressing Modes Of 8086
1327 Addressing Modes Of 8086
 
8086 microprocessor
8086 microprocessor8086 microprocessor
8086 microprocessor
 
3. adressingmodes1
3. adressingmodes13. adressingmodes1
3. adressingmodes1
 
Protection 80386
Protection 80386Protection 80386
Protection 80386
 
Architecture of 80286 microprocessor
Architecture of 80286 microprocessorArchitecture of 80286 microprocessor
Architecture of 80286 microprocessor
 
The Intel 8086 microprocessor
The Intel 8086 microprocessorThe Intel 8086 microprocessor
The Intel 8086 microprocessor
 
Addressing mode of 80286 microprocessor
Addressing mode of 80286 microprocessorAddressing mode of 80286 microprocessor
Addressing mode of 80286 microprocessor
 
8086 microprocessor-architecture
8086 microprocessor-architecture8086 microprocessor-architecture
8086 microprocessor-architecture
 
معماری ماشین های پیشرفته کم دستور
معماری ماشین های پیشرفته کم دستورمعماری ماشین های پیشرفته کم دستور
معماری ماشین های پیشرفته کم دستور
 
Az Micro
Az MicroAz Micro
Az Micro
 
HotSpot
HotSpotHotSpot
HotSpot
 
Documention
DocumentionDocumention
Documention
 
Timer
TimerTimer
Timer
 
8086 introduction
8086 introduction8086 introduction
8086 introduction
 
8254 PIT
8254 PIT8254 PIT
8254 PIT
 
Why the Address Translation Scheme Matters?
Why the Address Translation Scheme Matters?Why the Address Translation Scheme Matters?
Why the Address Translation Scheme Matters?
 
DAT Education
DAT EducationDAT Education
DAT Education
 

Similar to Protected mode memory addressing 8086

32- bit Microprocessor-Indtel 80386.pptx
32- bit Microprocessor-Indtel 80386.pptx32- bit Microprocessor-Indtel 80386.pptx
32- bit Microprocessor-Indtel 80386.pptx
Yuvraj994432
 
Microprocessor Unit -1 SE computer-II.pptx
Microprocessor  Unit -1 SE computer-II.pptxMicroprocessor  Unit -1 SE computer-II.pptx
Microprocessor Unit -1 SE computer-II.pptx
akshathsingh2003
 
Architecture_of_80386_Micropro-An Introduction
Architecture_of_80386_Micropro-An IntroductionArchitecture_of_80386_Micropro-An Introduction
Architecture_of_80386_Micropro-An Introduction
rajasekarandpm
 
Architecture of 80386(www.munnuz.co.cc)
Architecture of 80386(www.munnuz.co.cc)Architecture of 80386(www.munnuz.co.cc)
Architecture of 80386(www.munnuz.co.cc)
muneer.k
 
Mpippt
MpipptMpippt
Mpippt
Shruti Patel
 
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.pptADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
NaganarasaiahGoud
 
80386
8038680386
80386.pptx
80386.pptx80386.pptx
Architecture_of_80386_Microprocessor - Inroduction
Architecture_of_80386_Microprocessor - InroductionArchitecture_of_80386_Microprocessor - Inroduction
Architecture_of_80386_Microprocessor - Inroduction
rajasekarandpm
 
U I - 4. 80386 Real mode.pptx
U I - 4. 80386 Real mode.pptxU I - 4. 80386 Real mode.pptx
U I - 4. 80386 Real mode.pptx
SangeetaShekhawatTri
 
Protected addressing mode and Paging
Protected addressing mode and PagingProtected addressing mode and Paging
Protected addressing mode and Paging
marada0033
 
Doc32002
Doc32002Doc32002
Unit-4 protection ppt of database m.pptx
Unit-4 protection ppt of database m.pptxUnit-4 protection ppt of database m.pptx
Unit-4 protection ppt of database m.pptx
yashdongare22
 
It322 intro 2
It322 intro 2It322 intro 2
It322 intro 2
J Cza Àkera
 
80386 & 80486
80386 & 8048680386 & 80486
80386 & 80486
RakeshKumarSharma46
 
Microprocessor
MicroprocessorMicroprocessor
Microprocessor
CharltonInao1
 
Pentium protected mode.ppt
Pentium protected mode.pptPentium protected mode.ppt
Pentium protected mode.ppt
PramodBorole2
 
x86_1.ppt
x86_1.pptx86_1.ppt
x86_1.ppt
jeronimored
 
Electronics product design companies in bangalore
Electronics product design companies in bangaloreElectronics product design companies in bangalore
Electronics product design companies in bangalore
Ashok Kumar.k
 

Similar to Protected mode memory addressing 8086 (20)

32- bit Microprocessor-Indtel 80386.pptx
32- bit Microprocessor-Indtel 80386.pptx32- bit Microprocessor-Indtel 80386.pptx
32- bit Microprocessor-Indtel 80386.pptx
 
Microprocessor Unit -1 SE computer-II.pptx
Microprocessor  Unit -1 SE computer-II.pptxMicroprocessor  Unit -1 SE computer-II.pptx
Microprocessor Unit -1 SE computer-II.pptx
 
Architecture_of_80386_Micropro-An Introduction
Architecture_of_80386_Micropro-An IntroductionArchitecture_of_80386_Micropro-An Introduction
Architecture_of_80386_Micropro-An Introduction
 
Architecture of 80386(www.munnuz.co.cc)
Architecture of 80386(www.munnuz.co.cc)Architecture of 80386(www.munnuz.co.cc)
Architecture of 80386(www.munnuz.co.cc)
 
Mpippt
MpipptMpippt
Mpippt
 
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.pptADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
 
80386
8038680386
80386
 
80386.pptx
80386.pptx80386.pptx
80386.pptx
 
Architecture_of_80386_Microprocessor - Inroduction
Architecture_of_80386_Microprocessor - InroductionArchitecture_of_80386_Microprocessor - Inroduction
Architecture_of_80386_Microprocessor - Inroduction
 
U I - 4. 80386 Real mode.pptx
U I - 4. 80386 Real mode.pptxU I - 4. 80386 Real mode.pptx
U I - 4. 80386 Real mode.pptx
 
Protected addressing mode and Paging
Protected addressing mode and PagingProtected addressing mode and Paging
Protected addressing mode and Paging
 
Doc32002
Doc32002Doc32002
Doc32002
 
Unit-4 protection ppt of database m.pptx
Unit-4 protection ppt of database m.pptxUnit-4 protection ppt of database m.pptx
Unit-4 protection ppt of database m.pptx
 
It322 intro 2
It322 intro 2It322 intro 2
It322 intro 2
 
80386 & 80486
80386 & 8048680386 & 80486
80386 & 80486
 
Microprocessor
MicroprocessorMicroprocessor
Microprocessor
 
Chapter2.3 4-mikroprocessor
Chapter2.3 4-mikroprocessorChapter2.3 4-mikroprocessor
Chapter2.3 4-mikroprocessor
 
Pentium protected mode.ppt
Pentium protected mode.pptPentium protected mode.ppt
Pentium protected mode.ppt
 
x86_1.ppt
x86_1.pptx86_1.ppt
x86_1.ppt
 
Electronics product design companies in bangalore
Electronics product design companies in bangaloreElectronics product design companies in bangalore
Electronics product design companies in bangalore
 

More from University of Gujrat, Pakistan

Natural disasters of pakistan
Natural disasters of pakistanNatural disasters of pakistan
Natural disasters of pakistan
University of Gujrat, Pakistan
 
Diesel cycle
Diesel cycleDiesel cycle
Carnot cycle
Carnot cycleCarnot cycle
Brayton cycle
Brayton cycleBrayton cycle
Constitutional development of pakistan since 1947 to thereayf
Constitutional development of pakistan since 1947 to thereayfConstitutional development of pakistan since 1947 to thereayf
Constitutional development of pakistan since 1947 to thereayf
University of Gujrat, Pakistan
 
Essay writing
Essay writingEssay writing
Letter writing (Communication Skills)
Letter writing (Communication Skills)Letter writing (Communication Skills)
Letter writing (Communication Skills)
University of Gujrat, Pakistan
 
Architecture of high end processors
Architecture of high end processorsArchitecture of high end processors
Architecture of high end processors
University of Gujrat, Pakistan
 
Architecture of pentium family
Architecture of pentium familyArchitecture of pentium family
Architecture of pentium family
University of Gujrat, Pakistan
 
Bus interface 8086
Bus interface 8086Bus interface 8086
Bus interface 8086
University of Gujrat, Pakistan
 
Internal microprocessor architecture
Internal microprocessor architectureInternal microprocessor architecture
Internal microprocessor architecture
University of Gujrat, Pakistan
 
Multiplication & division instructions microprocessor 8086
Multiplication & division instructions microprocessor 8086Multiplication & division instructions microprocessor 8086
Multiplication & division instructions microprocessor 8086
University of Gujrat, Pakistan
 
Wireless sensors network in Avionic control system
Wireless sensors network in Avionic control systemWireless sensors network in Avionic control system
Wireless sensors network in Avionic control system
University of Gujrat, Pakistan
 
An autonomous uav with an optical flow sensor
An autonomous uav with an optical flow sensorAn autonomous uav with an optical flow sensor
An autonomous uav with an optical flow sensor
University of Gujrat, Pakistan
 
Passive Thermal management for avionics in high temperature environment
Passive Thermal management for avionics in high temperature environmentPassive Thermal management for avionics in high temperature environment
Passive Thermal management for avionics in high temperature environment
University of Gujrat, Pakistan
 
Future Integrated Systems Concept for Preventing Aircraft Loss-of-Control (L...
Future Integrated Systems Concept for Preventing Aircraft Loss-of-Control (L...Future Integrated Systems Concept for Preventing Aircraft Loss-of-Control (L...
Future Integrated Systems Concept for Preventing Aircraft Loss-of-Control (L...
University of Gujrat, Pakistan
 
Hardware implementation of cots avionics system on unmanned
Hardware implementation of cots avionics system on unmannedHardware implementation of cots avionics system on unmanned
Hardware implementation of cots avionics system on unmanned
University of Gujrat, Pakistan
 
A wireless sensors network in Aircraft Control Systems
A wireless sensors network in Aircraft Control SystemsA wireless sensors network in Aircraft Control Systems
A wireless sensors network in Aircraft Control Systems
University of Gujrat, Pakistan
 
Helicopter Automation Using Low Cost Sensors
Helicopter Automation Using Low Cost SensorsHelicopter Automation Using Low Cost Sensors
Helicopter Automation Using Low Cost Sensors
University of Gujrat, Pakistan
 

More from University of Gujrat, Pakistan (20)

Natural disasters of pakistan
Natural disasters of pakistanNatural disasters of pakistan
Natural disasters of pakistan
 
Dual combustion cycle
Dual combustion cycleDual combustion cycle
Dual combustion cycle
 
Diesel cycle
Diesel cycleDiesel cycle
Diesel cycle
 
Carnot cycle
Carnot cycleCarnot cycle
Carnot cycle
 
Brayton cycle
Brayton cycleBrayton cycle
Brayton cycle
 
Constitutional development of pakistan since 1947 to thereayf
Constitutional development of pakistan since 1947 to thereayfConstitutional development of pakistan since 1947 to thereayf
Constitutional development of pakistan since 1947 to thereayf
 
Essay writing
Essay writingEssay writing
Essay writing
 
Letter writing (Communication Skills)
Letter writing (Communication Skills)Letter writing (Communication Skills)
Letter writing (Communication Skills)
 
Architecture of high end processors
Architecture of high end processorsArchitecture of high end processors
Architecture of high end processors
 
Architecture of pentium family
Architecture of pentium familyArchitecture of pentium family
Architecture of pentium family
 
Bus interface 8086
Bus interface 8086Bus interface 8086
Bus interface 8086
 
Internal microprocessor architecture
Internal microprocessor architectureInternal microprocessor architecture
Internal microprocessor architecture
 
Multiplication & division instructions microprocessor 8086
Multiplication & division instructions microprocessor 8086Multiplication & division instructions microprocessor 8086
Multiplication & division instructions microprocessor 8086
 
Wireless sensors network in Avionic control system
Wireless sensors network in Avionic control systemWireless sensors network in Avionic control system
Wireless sensors network in Avionic control system
 
An autonomous uav with an optical flow sensor
An autonomous uav with an optical flow sensorAn autonomous uav with an optical flow sensor
An autonomous uav with an optical flow sensor
 
Passive Thermal management for avionics in high temperature environment
Passive Thermal management for avionics in high temperature environmentPassive Thermal management for avionics in high temperature environment
Passive Thermal management for avionics in high temperature environment
 
Future Integrated Systems Concept for Preventing Aircraft Loss-of-Control (L...
Future Integrated Systems Concept for Preventing Aircraft Loss-of-Control (L...Future Integrated Systems Concept for Preventing Aircraft Loss-of-Control (L...
Future Integrated Systems Concept for Preventing Aircraft Loss-of-Control (L...
 
Hardware implementation of cots avionics system on unmanned
Hardware implementation of cots avionics system on unmannedHardware implementation of cots avionics system on unmanned
Hardware implementation of cots avionics system on unmanned
 
A wireless sensors network in Aircraft Control Systems
A wireless sensors network in Aircraft Control SystemsA wireless sensors network in Aircraft Control Systems
A wireless sensors network in Aircraft Control Systems
 
Helicopter Automation Using Low Cost Sensors
Helicopter Automation Using Low Cost SensorsHelicopter Automation Using Low Cost Sensors
Helicopter Automation Using Low Cost Sensors
 

Recently uploaded

CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 

Recently uploaded (20)

CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 

Protected mode memory addressing 8086

  • 1. Group :4 • Roll Number :001 • Roll Number :033 • Roll Number :035 • Roll Number :041 • Roll Number:045 University Of Gujrat
  • 3. PROTECTED MODE MEMORY ADDRESSING • Protected mode memory addressing allows access to data and programs located above the first 1M byte of memory. • Addressing this extended section of the memory system requires a change to the segment plus an offset addressing scheme used with real mode memory addressing.
  • 4. PROTECTED MODE MEMORY ADDRESSING • In protected addressing mode segments can be of variable size(below or above 64 KB). • Some system control instructions are only valid in the protected mode. • The offset part of the memory address is still the same as in real addressing mode. However, when in the protected mode, the processor can work either with 16-bit offsets or with 32- bit offsets.
  • 5. PROTECTED MODE MEMORY ADDRESSING • A 32-bit offset allows segments of up to 4G bytes. Notice that in real-mode the only available instruction mode is the 16-bit mode. • One difference between real and protected addressing mode is that the segment address, as discussed with real mode memory addressing, is no longer present in the protected mode.
  • 6. PROTECTED MODE MEMORY ADDRESSING • In place of the segment address, the segment register contains a selector • The selector selects a descriptor from a descriptor table. • The descriptor describes the memory segment's location, length, and access rights. This is similar to selecting one card from a deck of cards in one's pocket.
  • 7. PROTECTED MODE MEMORY ADDRESSING • The selector, located in the segment register, selects one of 8192 descriptors from one of two tables of descriptors (stored in memory): the global and local descriptor tables. The descriptor describes the location, length and access rights of the memory segment. • Each descriptor is 8 bytes long.
  • 8. PROTECTED MODE MEMORY ADDRESSING • The 8192 descriptor table requires 8 * 8192 = 64K bytes of memory.
  • 9. INTRO TO PROTECTED MODE MEMORY ADDRESSING  Data and programs located within & above the first 1M byte of memory • Protected mode is where Windows operates. • The segment register contains a selector that selects a descriptor from a descriptor table. • The descriptor describes the memory segment’s location, length, and access rights.
  • 10. Selectors and Descriptors • The selector is located in the segment register • Describes the location, length, and access rights of the segment of memory. • it selects one of 8192 descriptors from one of two tables of descriptors. • Indirectly, the register still selects a memory segment, but not directly as in real mode.
  • 11. Descriptors table• • Two types of Descriptor table selected by the segment register. • Global descriptors contain segment definitions that apply to all programs. • a global descriptor might be called a system descriptor • Local descriptors are usually unique to an application. • Local descriptor an application descriptor . • global and local descriptor tables are a maximum of 64K bytes in length
  • 12. The format of a descriptor for the 80286 .
  • 13. Explanation • each descriptor is 8 bytes in length. • The base address of the descriptor indicates the starting location of the memory segment. • The G, or granularity bit allows a segment length of 4K to 4G bytes in steps of 4K bytes. • 32-bit offset address allows segment lengths of 4G bytes • 16-bit offset address allows segment lengths of 64K bytes.
  • 14. The access rights byte for the 80286 descriptor
  • 15. The access rights byte controls access to the protected mode segment • describes segment function in the system and allows complete control over the segment • if the segment is a data segment, the direction of growth is specified • If the segment grows beyond its limit,the • operating system is interrupted, indicating a general protection fault.
  • 16. The contents of a segment register during protected mode operation of the 80286 microprocessors.
  • 17.  Descriptors are chosen from the descriptor table by the segment register. • register contains a 13-bit selector field, a table selector bit, and requested privilege level field. • The TI bit selects either the global or the local descriptor table. • Requested Privilege Level (RPL) requests the access privilege level of a memory segment.
  • 19. Explanation  the segment register, containing a selector.  chooses a descriptor from the global descriptor table.  The entry in the global descriptor table selects a segment in the memory system  Descriptor zero is called the null descriptor, must contain all zeros, and may not be used for accessing memory.
  • 21. Memory Paging  In the paging memory-management scheme, the operating system retrieves data from secondary storage in same-size blocks called pages.  The Memory management unit consists of  Segmentation unit and  Paging unit.  Segmentation unit allows segments of size 4Gbytes at max.  The Paging unit organizes the physical memory in terms of pages of 4kbytes size each.
  • 22.  Mechanism available in the 80386 and up. Allows a linear address ( program generated ) of a program to be located in any portion of physical memory. Paging unit works under the control of the segmentation unit, i.e. each segment is further divided into pages.
  • 23.  The linear address is invisibly translated to any physical address Through paging to the hard disk drive and paging to the memory through the memory paging unit, any Windows application can be executed GenerateProgram Linear Address Through Paging Physical Address
  • 24.  The name EMM386 was used for the expanded memory managers of both Microsoft's and MS-DOS which created expanded memory using extended memory on Intel 80386 CPUs.  Expanded memory is a system that provided additional memory to DOS programs beyond the limit of conventional memory .  The paging system operates in both real and protected mode.
  • 25. The paging unit is controlled by the microprocessors control registers:
  • 26. Paging Registers  It is enabled by setting the PG bit to 1 (left most bit in CR0 ). (If set to 0, linear addresses are physical addresses).  CR3 contains the page directory "physical" base address.  Each page directory entry contain 1024 directory entries of 4 byte each.  Each page directory entry addresses a page table that contains up to 1024 entries.
  • 27.
  • 28. Count…. The virtual address is broken into three pieces  Directory : Each page directory addresses a 4MB section of main mem.  Page Table : Each page table entry addresses a 4KB section of main mem.  Offset : Specifies the byte in the page.