In 80386 Microprocessor , the physical memory is organized as a sequence bytes.
The model of memory organization seen by applications programmers is determined by systems-software designers.
PIC A special purpose integrated circuit that function as an overall manager in an interrupt driven system.
It accepts request from the peripheral equipment,determines which of the incoming request is of the highest priority, ascertains whether the incoming request has a higher priority value than the level currently being serviced, and issues an interrupt to the CPU based on this determination.
In 80386 Microprocessor , the physical memory is organized as a sequence bytes.
The model of memory organization seen by applications programmers is determined by systems-software designers.
PIC A special purpose integrated circuit that function as an overall manager in an interrupt driven system.
It accepts request from the peripheral equipment,determines which of the incoming request is of the highest priority, ascertains whether the incoming request has a higher priority value than the level currently being serviced, and issues an interrupt to the CPU based on this determination.
Introduction of memory Segmentation
Segmentation is the process in which the main memory of the computer is logically divided into different segments and each segment has its own base address.
Memory segmentation is the methods where whole memory is divided into the smaller parts called segments of various sizes.
A segment is just an area in memory.
The process of dividing memory this way is called segmentation.
Introduction of memory Segmentation
Segmentation is the process in which the main memory of the computer is logically divided into different segments and each segment has its own base address.
Memory segmentation is the methods where whole memory is divided into the smaller parts called segments of various sizes.
A segment is just an area in memory.
The process of dividing memory this way is called segmentation.
Assembly language is the most basic programming language available for any processor. Programs written in assembly languages are compiled by an assembler. Every assembler has its own assembly language, which is designed for one specific computer architecture.
Lex is officially known as a "Lexical Analyser".
Yacc (for "yet another compiler compiler." ) is the standard parser generator for the Unix operating system.
Design of FPGA based 8-bit RISC Controller IP core using VHDLAneesh Raveendran
This paper describes the design, development and
implementation of an 8-bit RISC controller IP core. The
controller has been designed using Very high speed integrated circuit Hardware Description Language (VHDL). The design constraints are speed, power and area. This controller is efficient for specific applications and suitable for small applications. This non-pipelined controller has four units: - Fetch, Decode, Execute and a stage control unit. It has an in built program and data memory. Also it has four ports for communicating with other I/O devices. A hierarchical approach has been used so that basic units can be modeled using behavioral programming. The basic
units are combined using structural programming. The design
has been implemented using ALTERA STRATIX II FPGA
Memory organization is a classification of memory or a class presentation of memory in which the memory is categorized or sub divided according to their work.
Register Organization of 8086, Architecture, Signal Description of 8086, Physical Memory
Organization, General Bus Operation, I/O Addressing Capability, Special Processor Activities,
Minimum Mode 8086 System and Timings, Maximum Mode 8086 System and Timings.
Addressing Modes of 8086.
LCD (Liquid Crystal Display) is a type of flat panel display which uses liquid crystals in its primary form of operation. It is very helpful in providing user interface as well as for debugging purpose.
Analog to Digital Converter (ADC) is a device that converts an analog quantity (continuous voltage) to discrete digital values.
The PIC microcontroller can be used in various electronic devices like alarm systems, electronic gadgets and computer control systems.
The process of reducing a given DFA to its minimal form is called as minimization of DFA. DFA minimization is also called as Optimization of DFA and uses partitioning algorithm.
NLP is a tool for computers to analyse, comprehend, and derive meaning from natural language in an intelligent and useful way. Natural language processing helps computers communicate with humans in their own language and scales other language-related tasks.
Smart computing, next-generation computing, is a combination of hardware, software, and network to provide real-time awareness of real-time systems. The real world gets smart by connecting it to a computer, and computer get smart by connecting to the real world.
As a student, you should be developing work ethic and etiquette skill sets to prepare you for the work environment. Developing professional habits and manners is more important now than ever before.
Writing skills include all the knowledge and abilities related to expressing yourself through the written word. Here you can find activities to practise your writing skills.
Professional communication in written form requires skill and expertise. And whether you're starting a new job, introducing yourself at a networking event or pitching for new work, here are some things to consider ...
Servlets work on the server-side. Servlets are capable of handling complex requests obtained from the web-server. There are many (competing) server-side technologies available: Java-based (servlet, JSP, JSF, Struts, Spring, Hibernate), ASP, PHP, CGI Script, and many others.
Jenkin is an open source automation server which can be used to automate all sorts of tasks related to building, testing, and delivering or deploying software.
Data science, Know as data-driven science, is also an interdisciplinary field of scientific methods, processes, algorithms, and systems to extract knowledge or insights from data in various forms, either structured or unstructured, similar to data mining.
All these acronyms are often loosely used in the field of technology. It is important to understand that all these acronyms are part of Artificial Intelligence (AI) umbrella.
Sentiment Analysis has become a hot-trend topic of scientific and market research; it is a natural language processing technique used to determine whether data is positive, negative or neutral.
The theory of computation is a branch of computer science and mathematics combined. It deals with how efficiently problems can be solved on a model of computation, using an algorithm.
The popular object-oriented languages are Java, C#, PHP, Python, C++, etc. The main aim of object-oriented programming is to implement real-world entities.
High speed computing was implemented in supercomputer for scientific research. HPC clusters provide the most efficient, flexible, cost effective computing environments for HPC simulations.
Power BI is a business analytics service by Microsoft. BI
Microsoft Power BI is a suite of business intelligence (BI), reporting, and data visualization products and services for individuals and teams. You can access your data from anywhere with the Power BI app.
More from International Institute of Information Technology (I²IT) (20)
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
2. REGISTER ORGANIZATION OF 80386DX:
• 80386DX register set includes following categories:
• General Purpose Registers
• Segment Registers
• Instruction Pointer and Flags
• Control Registers
• System Address Registers
• Debug Registers
• Test Registers
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
3. • [A]General Purpose Registers:
• 80386DX has an eight 32-bit general purpose registers named as EAX, EBX,
ECX, EDX, ESI, EDI, EBP and ESP.
• It is used to hold instruction operand.
• Operand may be a data or address.
• The lower 16 bits of the 32-bit registers can be accessed separately. This is
done by using the 16-bit names of the registers AX, BX, CX, DX, SI, DI, BP and
SP.
• When accessed as a 16-bit operand, the upper 16 bits of the register are
neither used nor changed.
• Finally 8-bit operations can individually access the lowest byte (i.e. bits 0 to 7)
and the higher byte (i.e. bits 8 to 15) of general purpose registers AX, BX, CX
and DX.
• The lowest bytes are named AL, BL, CL and DL (each of 8-bit) respectively.
• The higher bytes are named AH, BH, CH and DH (each of 8-bit) respectively.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
4. Fig: 80386 general registers and instruction pointer
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
5. • B) Instruction Pointer:
• The instruction pointer is a 32-bit register named EIP.
• EIP holds the offset of the next instruction to be executed.
• The offset is always relative to the base of the code segment (CS).
• The lower 16 bits (bits 0 to 15) of EIP contain the 16-bit instruction pointer
named IP, which is used for 16-bit addressing.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
6. • B) Flags Register
• 80386DX has a 32-bit Flags Register named EFLAGS.
• The defined bit fields within EFLAGS are shown in Figure below,
• It is used to control certain operations of 80386DX and to indicate the
status of the 80386 DX.
• It contains information about :
• the result of the recent arithmetic or logical operation
• the state of the processor
• the state of the current task
• The lower 16 bits (bit 0 to 15) of EFLAGS contain the 16-bit flag register
named FLAGS, which is most useful when executing 8086 and 80286 code.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
7. Fig: Flag Register
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
8. • VM (Virtual 8086 Mode, bit 17)
• The VM bit provides virtual 8086 mode within protected mode.
• If it is set in protected mode, the 80386DX will switch to virtual
8086 operation.
• The VM bit can be set only in protected mode.
• RF (Resume Flag, bit 16)
• The RF flag is used with the debug register breakpoints.
• A breakpoint is a special marker that tells the debugger to stop
execution of the program at the breakpoint when running in debug
mode.
• It is checked at the starting of every instruction cycle. By setting RF
to 1, a potential breakpoint on the next instruction will be ignored.
• The RF is automatically reset after successful execution of every
instruction.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
9. NT (Nested Task, bit 14)
• This flag applies to Protected Mode.
• NT is set to indicate that the execution of this task is nested within another
task.
• If set, it indicates that the current nested task's Task State Segment (TSS)
has a valid back link to the previous task's TSS.
IOPL (Input/output Privilege Level, bits 12-13)
• These two-bit fields are used in protected mode to generate four levels of
security from 0 to 3 at which your code must be running in order to execute
any I/O related instructions.
• IOPL indicates the maximum current privilege level value(CPL) permitted to
execute I/O instructions without generating exceptions.
• The IOPL field in the EFLAGS register defines the right to use I/O-related
instructions.
• CPL<=IOPL
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
10. Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
11. OF (Overflow Flag, bit 11)
• OF is set if the operation resulted in a signed overflow.
DF (Direction Flag, bit 10)
• DF defines whether ESI and/or EDI registers post-increment or post-
decrement during string instructions.
• Post-increments occurs if DF is reset.
• Post-decrement occurs if DF is set.
IF (INTR Enable Flag, bit 9)
• If IF is set, it allows recognition of external interrupts signaled on the
INTR pin.
• If IF is reset, external interrupts signaled on the INTR are not
recognized.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
12. • TF (Trap Enable Flag, bit 8)
• These flags are useful when debugging programs.
• By setting TF to 1, the processor is forced to operate in single step
mode in which an internal exception 1 is generated after every
instruction.
• SF (Sign Flag, bit 7)
• SF is set if the high-order bit of the result is set, it is reset
otherwise.
• ZF (Zero Flag, bit 6)
• ZF is set if all bits of the result are 0. Otherwise it is reset.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
13. • AF (Auxiliary Carry Flag, bit 4)
• The Auxiliary Flag is used to simplify the addition and
subtraction of packed BCD quantities.
• AF is set if operation resulted in a carry out of bit 3.
• Otherwise AF is reset.
•
• PF (Parity Flags, bit 2)
• PF is set if the low-order eight bits of the operation contains an
even number of 1's (even parity). PF is reset if the low-order
eight bits have odd parity.
•
• CF (Carry Flag, bit 0)
• CF is set if the operation resulted in a carry out of (addition), or
a borrow into (subtraction) the high-order bit. Otherwise CF is
reset.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
14. • C) Segment Registers
• There are six 16-bit segment registers named as CS, DS, ES, SS, FS, GS.
• In real mode they contain the base address of a segment:
• CS – base address of the code segment
• SS – base address of the stack segment
• DS – base address of the data segment
• ES, FS, GS – base address of other data segments
• Six 16 bit segment registers hold segment selector values identifying the
currently addressable memory segments.
• In protected mode, each segment may range in size from one byte up to 4
GB.
• In real address mode, the maximum segment size is fixed at 64 KB.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
15. Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
16. D) Control Registers
• The 80386 DX has three control registers of 32 bits, CR0, CR2 and
CR3, to hold machine state of a global nature (not specific to an
individual task).
• These registers hold machine state that affects all tasks in the
system. To access the Control Registers, load and store instructions
are defined.
• CR0: Machine Control Register (includes 80286 Machine Status
Word)
• CR0, shown in Figure, contains 6 defined bits for control and status
purposes.
• The low-order 16 bits of CR0 are also known as the Machine Status
Word, MSW, for compatibility with 80286 Protected Mode.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
17. Fig: CR0 (Control Register 0)
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
18. • CR0 bits are described below:
• PG (Paging Enable, bit 31)
• The PG bit is set to enable the paging unit. It is reset to disable the on-
chip paging unit.
• R (reserved, bit 4)
• This bit is reserved by Intel. When loading CR0 care should be taken to
not alter the value of this bit.
• TS (Task Switched, bit 3)
• TS bit is set automatically every time by processor whenever a task
switch operation is performed. It will never clear this bit on its own.
Programmer can clear this bit using CLTS instruction.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
19. • EM (Emulate Coprocessor, bit 2)
• This bit is set to cause all coprocessor opcodes to generate a coprocessor
not available fault (exception 7). It is reset to allow coprocessor opcodes to
be executed on an actual intel387DX coprocessor.
• MP (Monitor Coprocessor, bit 1)
• When this bit is set, 80386 assumes that real floating point hardware is
present in the system. If it is reset it assumes that no such hardware is
present .
• PE (Protection Enable, bit 0)
• The PE bit is set to enable the Protected Mode. If PE is reset, the processor
operates in Real Mode. PE can be set using LMSW instruction but it can not
be reset using LMSW.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
20. • CR1: reserved: CR1 is reserved for use in future by Intel.
• CR2: Page Fault Linear Address
• CR2, shown in Figure below, holds the 32-bit linear address that caused
the last page fault detected.
• CR3: Page Directory Base Address
• CR3, shown in Figure, contains the physical base address of the page
directory table. A task switch through a TSS changes a value in CR3.
Fig: CR2 and CR3
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
21. E) System Address Registers
• System Address Registers are special registers which are defined to
reference the tables or segments supported by the 80286CPU and 80386DX
protection model.
• These tables or segments are:
• GDT (Global Descriptor Table)
• IDT (Interrupt Descriptor Table)
• LDT (Local Descriptor Table)
• TSS (Task State Segment)
• The addresses of these tables and segments are stored in special registers
called System Address Registers.
• These four registers are named as GDTR, IDTR, LDTR and TR, respectively.
• GDTR and IDTR registers hold the 32-bit linear base address and 16-bit limit
of the GDT and IDT, respectively.
• LDTR and TR registers hold the 16-bit selector for the LDT descriptor and
the TSS descriptor, respectively.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
22. Fig: System address and system segment registers
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
23. F) Test Registers
• There are TR0-TR7 eight test registers. But only 2 registers are
defined TR6 & TR7.
• These registers are used to check TLB of the paging unit.
• The two TLB testing operations are write entries into TLB & perform
TLB lookup.
• TR6 is the command test register.
• TR7 is the data register which contains the data of the Translation
Look aside buffer test.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
24. Fig: TR6 and TR7
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
25. • TR6:
• C bit- This is the command bit. C=0 write to TLB is performed. C=1
TLB lookup is performed.
• Linear address: On a TLB write a TLB entry is allocated to this linear
address. On a TLB lookup if one and only one TLB entry matches, the
rest of the fields of TR6 & TR7 are set from the matching TLB entry.
• The next 7 bits are used as tag attributes for the TLB cache.
• V bit: Valid for this TLB entry
• D,D#: Dirty and Not Dirty (page identified by cache entry has been
modified.)
• U,U#: User and not user (page is accessible from PL3 code)
• W,W#: Writable and not writable. (write permission)
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
26. X X# Effect during TLB
lookup
Value of bit X after TLB write
0 0 Miss all Bit X becomes undefined
0 1 Match if X=0 Bit X becomes 0
1 0 Match if X=1 Bit X becomes 1
1 1 Match all Bit X becomes undefined
TR7:
Physical address: This is the data field of the TLB. On a write to the
TLB, the TLB entry allocated to the linear address in TR6 is set to this
value.
On a TLB lookup, the data field from the TLB is read out to here.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
27. • PL:
• On a TLB write if PL=1 causes the REP field of TR7 to select which of four
associative blocks of the TLB is to be written. PL=0 allows the internal
pointer in the paging unit to select which TLB block is written.
• On a TLB lookup if PL=1 means lookup was hit
– PL=0 means TLB lookup miss.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
28. Fig: Debug Registers
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
29. G) Debug Registers :
• The six programmer accessible debug registers provide on-chip
support for debugging.
• Debug Registers DR0 to DR3 are used to specify the four linear
breakpoints.
• The Debug Status Register DR6 displays the current state of the
breakpoints.
• DR4 and DR5 are reserved by Intel.
• DR7 is the Debug Control Register.
• DR0-DR3:
• The first four debug registers hold up to 4 linear address breakpoints.
• The addresses in these registers are compared to the processor’s
address generation logic on every instruction & if match is found an
exception 1 is generated.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
30. • DR6(Debug status register)
• 80386 sets the appropriate bits in this register to indicate the circumstances
that caused the last debug fault. These bits are never cleared by processor.
• B0 (Breakpoint 0 hit):
• The processor sets this bit when it references the linear address contained in
DR0.
• BD (Break for debug register access):
• This bit is set when the exception1 handler is invoked by an illegal reference
to one of the debug registers when the register set is locked.
• BS(Break for single step):
• This bit is set if the processor has taken the exception1 because tracing is
enabled (TF is set).
• BT (Break for task switch):
• Whenever the 80386 initiates a task switch to a task that has its trace bit set in its
task image, processor initiates an exception1 if this bit is set.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
31. DR7:Debug control register.
It controls the operation of four linear address breakpoints by a set of 4
fields each.
L0 (Local enable): When this bit is set, the breakpoint address in DR0 is
monitored as long as 80386 is running the current task.
G0 (Global enable): As long as this bit is set, 80386 monitors the linear
address in DR0 at all times regardless of the task.
RW0(read/write access): These bits qualify the type of access that must
occur at the address in DR0 before the breakpoint will be taken.
LEN0 (Breakpoint length): It specifies the length of breakpoint.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
32. RW LEN
00 Code fetch 00 1 byte
01 Data write 01 2 bytes word aligned
10 Reserved 10 Reserved
11 Data read/write 11 4 bytes, dword
aligned.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
33. LE (Local exact):
Due to the pipelined architecture , 80386 may not set status bit in DR6 at
the instant breakpoint occurs. If LE bit is set 80386 sets corresponding
status bit at the instant at which breakpoint occurs when the 80386 is
running current task. On task switch this bit is reset.
GE (Global exact): It is same as LE but its scope is global.
GD (global debug access): When this bit is set, the 80386 denies the
further access to any of the debug registers either for reading or
writing.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
34. References
All contents are referred from following references
1. Intel386 DX microprocessor manual
2. James Turley, "Advanced 80386 Programming Techniques", McGraw
Hill Education.
Hope Foundation’s International Institute of Information Technology, I²IT, P-14 Rajiv Gandhi Infotech Park, Hinjawadi, Pune - 411 057
Tel - +91 20 22933441 / 2 / 3 | Website - www.isquareit.edu.in ; Email - info@isquareit.edu.in
35. THANK YOU
For further information please contact
Prof. Bhavana Kanawade
Department of Information Technology
Hope Foundation’s International Institute of Information Technology, I²IT
Hinjawadi, Pune – 411 057
Phone - +91 20 22933441
www.isquareit.edu.in | bhavanak@isquareit.edu.in
35