The document discusses the different operating modes of the 80386 microprocessor including real address mode, protected address mode, and virtual address mode. It describes the global descriptor table, local descriptor table, and interrupt descriptor table which define memory segments and interrupts. The 80386 supports virtual addressing, memory management, and protection through descriptor tables, paging enabled by control registers, and segmentation of the virtual address space.
There are situations, called hazards, that prevent the next instruction in the instruction stream from executing during its designated cycle
There are three classes of hazards
Structural hazard
Data hazard
Branch hazard
There are situations, called hazards, that prevent the next instruction in the instruction stream from executing during its designated cycle
There are three classes of hazards
Structural hazard
Data hazard
Branch hazard
found this one in one of my abandoned folders. AC(students from JUCSE need no introduction but for others you should never want to know him :-O) assigned this task to me and 3 of my fellow classmates to create a presentation on this uninteresting and weird topic. We pulled it off however :P
CISC & RISC Architecture with contents
History Of CISC & RISC
Need Of CISC
CISC
CISC Characteristics
CISC Architecture
The Search for RISC
RISC Characteristics
Bus Architecture
Pipeline Architecture
Compiler Structure
Commercial Application
Reference
found this one in one of my abandoned folders. AC(students from JUCSE need no introduction but for others you should never want to know him :-O) assigned this task to me and 3 of my fellow classmates to create a presentation on this uninteresting and weird topic. We pulled it off however :P
CISC & RISC Architecture with contents
History Of CISC & RISC
Need Of CISC
CISC
CISC Characteristics
CISC Architecture
The Search for RISC
RISC Characteristics
Bus Architecture
Pipeline Architecture
Compiler Structure
Commercial Application
Reference
ARM server, The Cy7 Introduction by Aaron Joue, Ambedded TechnologyAaron Joue
The world first ARM Server for cloud storage. It is compatible with Hadoop, GlusterFS, Ceph. Each node consume less than 2.5 Watts. Very high density with 1824TB in a rack.
Microprocessor architecture,
Organisation & operation of microcomputer systems.
Hardware and software interaction.
Programme and data storage.
Parallel interfacing and programmable ICs.
Serial interfacing, standards and protocols.
Analogue interfacing. Interrupts and DMA.
Microcontrollers and small embedded systems.
The CPU, memory and the operating system.
Embedded system classes in mumbai
best Embedded system classes in mumbai with job assistance.
our features are:
expert guidance by it industry professionals
lowest fees of 5000
practical exposure to handle projects
well equiped lab
after course resume writing guidance
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Francesca Gottschalk - How can education support child empowerment.pptx
Protection mode
1. 1Submitted by-
Deepak – 101116
Sunil – 101117
Submitted to-
Prof. Rahul Mehta
Prof. Harekrishna Parmar
2. 2
Three modes of software operation in 80386:
Real-address mode,
Protected-address mode and
Virtual-address mode
80386 microprocessor comes up in Real Mode
whenever it is RESET.
PE bit of CR0 is used to switch 80386 into Protected
Mode.
In this mode 80386 provides an advanced software
architecture supporting memory management, virtual
addressing, paging, protection and multi-tasking.
Disadvantages:
More difficult to program
Much harder to debug, no source-level debugging
3. GDTR : global descriptor table
LDTR : local descriptor table
IDTR : interrupt descriptor table
TR : task register
EIP : 32 bits in length
EFLAGS
CR0, CR1, CR2, CR3
DR0-DR7(Debug registers)
TR6-TR7(Test registers)
3
EIP
CS
DS
SS
ES
FS
GS
AX
BX
CX
DX
SP
BP
SI
DI
EFLAGS
GDTR
IDTR
LDTR
CR0
CR1
CR2
CR3
TR
Limit
LimitBase
Base
0151647
MSW
DR0
DR1
DR2
DR3
DR4
DR5
DR6
DR7
TR6
TR7
31 16 15 0
4. Global Descriptor Table
GDT provides a mechanism for defining the
characteristics of the 80386’s global memory address
space. Global memory is a general system resource that
is shared by many or all software tasks.
Contains system segment descriptors
4
BASE LIMIT
047 16 15
0
8191
1
Global
Descriptor
Table
(GDT)
Global Descriptor Table Register(GDTR) MAX: 64k bytes
8K entries
5. These descriptors identify the characteristics of the
segments of global memory.
One descriptor exists for each segment of memory in
virtual address space.
8 bytes long and contains three kinds of information
Limit
Base
Access Rights
5
6. Interrupt Descriptor Table (IDT)
Contains interrupt descriptors, not segment descriptors
IDT can also be up to 64KB; But 80386 only supports
up to 256 interrupts and exceptions(2KB)
6
BASE LIMIT
047 16 15
0
255
1
Interrupt
Descriptor
Table
(IDT)
Interrupt Descriptor Table Register(IDTR)
MAX: 2k bytes
256 entries
7. Local Descriptor Table(LDT)
Each task can have
access to own private
descriptor table(LDT) in
addition to GDT.
Contains descriptors that
provide access to code
and data in segments of
memory that are
reserved for the current
task.
7
GDT
LDT0
LDTn
LIMIT
BASE
LIMIT
BASE
selector
0
015
15
31
31
LDTR
LDTR
cache
program invisible
LDT0
LDTn
GDTR
15 0
8. 0112331 10
CR0
CR3
CR2
CR1RESERVED
RESERVED
Page Fault Linear Address
Page Directory Base Register
P
G
M
P
T
S
P
E
MSW (machine status word) : CR0
the lower 5 bits of CR0 are system-control flags
PE: protected-mode enable bit
At reset, PE is cleared.(real mode)
Set PE to 1 to enter protected mode
Once in protected mode, 80386 cannot be switched
back to real mode under SW control
8
PE: protection enable
MP: math present
EM: emulate
ET: extension type
(coprocessor)
TS: task switched
RESERVED
E
M
E
T
9. Paging mechanism
MSB of CR0, CR2, CR3
Task Register
Task switching mechanism
TSS descriptor
TSS : task state segment; information needed to
initiate the task, such as initial values for the user-
accessible registers
9
Physical Memory
GDT
TSS
TSS descriptorTR
BASE LIMIT
0151647
015
Cache
10. Example: The value of selector load to CS: 1007H, GDT
base 00100000H, LDT base 00120000H
(CS) = 0001 0000 0000 0111 : RPL = 3, TI =1, Index =
0001 0000 0000 0
Offset=0001 0000 0000 0 *8=512 *8=4096d=1000h
Address of the segment descriptor
Descriptor address = 00120000H + 1000H =
00121000H
10
RPLINDEX
SEGMENT SELECTOR REGISTER
1-0
2
15-3
Requested
Privilege
Level (RPL)
Indicates selector privilege
level desired
Table
Indicator
(TI)
TI=0 use global descriptor table (GDT)
TI=1 use local descriptor table (LDT)
Index select descriptor entry in table
T
I
Bits Name Function
11. VM : virtual 8086 Mode - system flag
set only in Protected Mode by IRET instruction and by
task switches
unaffected by POPF
RF : resume flag - system flag
in conjunction with the debug register breakpoints
NT: nested task flag - system flag
indicates that the execution of this task is nested
within another task
IOPL : input/output privilege flag - system flag
indicates the numerically maximum CPL(current)
value permitted to execute I/O instructions 11
0 0 0 0 0 0 0 0 0 0 0 0 0 0 V R 0 N IO O D I T S Z 0 A 0 P 1 C
M F T PL F F F F F F F F F
071531
12. Virtual Address and Virtual Address Space
virtual address : selector(16-bit): offset(32-bit)
-214(16,384 = 16K) unique segments of memory, each of
which has a maximum size of 4G bytes
Total virtual address space = 246 , 64 TB
T1 for global or local descriptor table to define Virtual
Address space 12
47 32 31 0
T
I
selector offset
47 32 31 0
RPLINDEX
13. Segment Partitioning of the Virtual Address Space
13
Local segment 8191
Local segment 1
Local segment 0
Global segment 8191
Global segment 1
Global segment 0
Local address space
32 Terabytes
Global address space
32 Terabytes
Virtual Address Space
64 Terabytes
14. Application Program : a collection of tasks
task: a group of program routines that together
perform a specific function
A task can activate both global and local segments of
memory
14
Task 1
Local Address
Space
Global
Address
Space
Task 3
Local Address
Space
Task 2
Local Address
Space
Task 1 Virtual Address Space
Task 2 Virtual Address SpaceTask 3 Virtual Address Space