SlideShare a Scribd company logo
The Microprocessor and Its Architecture A Course in Microprocessor Electrical Engineering Department University of Indonesia
Protected Mode  Memory Addressing Protected mode memory addressing  (80286 and above)  allows access to data and programs located above the first 1MB of memory as well as within the first 1MB of memory The segment register contains a  selector  instead of segment addresses a selector selects a descriptor from descriptor table The  descriptor  describes the memory segment’s location, length, and access rights ( Fig.2.6 )
Protected Mode Memory  Addressing (cont’d) The selector selects one of 8,192 descriptors from one of two tables of descriptors  There are two descriptor tables: one contains global descriptors and other contains local descriptors The  global descriptors  contain  segment definitions that apply to all programs, while the local des-criptors are usually unique to an applications Each descriptor table contains 8,192 descriptors (i.e. a total 16,384 descriptors are available to an application at any time) --> eq. 16,834 memory segment
Protected Mode Memory  Addressing (cont’d) The base address portion of the descriptor indicates the starting location of the memory segment The segment limit contains the last offset address found in a segment The G bit ( Granularity ; for 80386 through Pen-tium Pro) specifies a segment limit of from 1B to 1MB in length if G = 0, and any multiple of 4KB if G = 1 The AV bit is used by some operating systems to indicate that the segment is available (AV=1) or not available (AV=0)
Protected Mode Memory  Addressing (cont’d) The D bits indicates whether the instructions to access register and memory data is 16-bit instructions (D=0) or 32-bit instructions (D=1) The access rights bytes ( Fig.2.7 ) controls access to the protected mode memory segment Descriptors are chosen from table by the segment register Fig . 2.8  shows how the segment register functions in the protected mode system Fig.2.9  shows how the segment register, containing a selector, chooses a descriptor from the global descriptor table
Program Invisible Registers The program invisible are not directly addressed by software (i.e. invisible) Figures  2.10  Illustrates the program-invisible registers These registers control the microprocessor when operated in the protected mode The program-invisible portion of these registers is often called cache memory; do not confuse with the normal level 1 or level 2 caches found in the microprocessor
Program Invisible Registers The GDTR (global descriptor table register) and IDTR (interrupt descriptor table register) contain the base address of the descriptor table and its limit (i.e. 16-bits) the location of the local descriptor table is selected from the global descriptor table One of the global descriptor is set up to address the local descriptor table
Memory Paging The  memory paging mechanism  located within the 80386 and above allows any physical memory location to be assign to any linear address The  linear address  is defined as the address generated by a program, and with the memory paging unit, the linear address is invisibly translated into any  physical address This allows an application written to function at a specific address to be relocated through the paging mechanism
Memory Paging (cont’d) It also allows memory to be placed into areas where no memory exists The paging unit is controlled by the contents of the microprocessor’s control registers (CR0 - CR3 or CR4, Figure  2.11 ) The linear address is broken into three sections that are used to access the page directory entry, page table entry, and page offset address (Figure. 2.12 )
Memory Paging (cont’d) See Figure. 2.13 The page directory contains 1,024 doubleword addresses that locate up to 1,024 page tables The page directory and each page table are 4K bytes in length See Figure. 2.14  as well
 
 
 
 
 
 
 
 

More Related Content

PPTX
Protected addressing mode and Paging
DOCX
Bindura university of science education
PPTX
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
PPTX
Protected mode memory addressing 8086
PDF
Protection 80386
PPTX
Segmentation in operating systems
PPT
Privilege levels 80386
PPTX
Segments
Protected addressing mode and Paging
Bindura university of science education
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
Protected mode memory addressing 8086
Protection 80386
Segmentation in operating systems
Privilege levels 80386
Segments

What's hot (20)

PPTX
Memory System
PPT
PPT
Chapter2.1 2-mikroprocessor
PDF
Introduction to 80386
PPTX
PRESENTATION ON REAL ADDRESSING MODE AND VIRTUAL ADDRESSING MODE
PPTX
Introduction to 80386
PPT
Memory mgmt 80386
PPT
Microprocessor 80386
PPT
Address translation-mechanism-of-80386 by aniket bhute
PPTX
Memory Segmentation of 8086
PPT
80386 microprocessor
PPT
Memory+management
PPT
Pin Description Of Intel 80386 DX Microprocessor
PPTX
Addressing mode of 80286 microprocessor
PPT
The 80386 80486
PPTX
Applications of computer organization
PDF
Addressing modes of 80386
PPTX
Microprocessor 80286
PPTX
register
PPT
Microprocessors - 80386DX
Memory System
Chapter2.1 2-mikroprocessor
Introduction to 80386
PRESENTATION ON REAL ADDRESSING MODE AND VIRTUAL ADDRESSING MODE
Introduction to 80386
Memory mgmt 80386
Microprocessor 80386
Address translation-mechanism-of-80386 by aniket bhute
Memory Segmentation of 8086
80386 microprocessor
Memory+management
Pin Description Of Intel 80386 DX Microprocessor
Addressing mode of 80286 microprocessor
The 80386 80486
Applications of computer organization
Addressing modes of 80386
Microprocessor 80286
register
Microprocessors - 80386DX
Ad

Similar to Chapter2.3 4-mikroprocessor (20)

PPTX
UNIT-3.pptx digital electronics system 34
PPTX
32- bit Microprocessor-Indtel 80386.pptx
PDF
PAI Unit 2 Segmentation in 80386 microprocessor
PPT
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
PPT
Architecture of 80386(www.munnuz.co.cc)
PPT
80286 education project compiter application .ppt
PDF
80386_AKRay.pdf study computer programme
PDF
80386 Basic Programming Model and Application
PPTX
jdsbfvkjsdbfvbasibgvyisbvilawbvslaksbvlawbvrab
PPTX
Pentium (80586) Microprocessor By Er. Swapnil Kaware
PPTX
Advanced Microprocessors By Er. Swapnil Kaware
PPTX
Advanced Microprocessors By Er. Swapnil Kaware
PPT
Architecture_of_80386_Micropro-An Introduction
PPTX
Microprocessor Unit -1 SE computer-II.pptx
PDF
Microprocessor Unit-1( Introduction to 80386 Microprocessors)Second Year ppt
PPTX
PPTX
80386 & 80486
PPT
Architecture_of_80386_Microprocessor - Inroduction
PPTX
It322 intro 2
UNIT-3.pptx digital electronics system 34
32- bit Microprocessor-Indtel 80386.pptx
PAI Unit 2 Segmentation in 80386 microprocessor
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
Architecture of 80386(www.munnuz.co.cc)
80286 education project compiter application .ppt
80386_AKRay.pdf study computer programme
80386 Basic Programming Model and Application
jdsbfvkjsdbfvbasibgvyisbvilawbvslaksbvlawbvrab
Pentium (80586) Microprocessor By Er. Swapnil Kaware
Advanced Microprocessors By Er. Swapnil Kaware
Advanced Microprocessors By Er. Swapnil Kaware
Architecture_of_80386_Micropro-An Introduction
Microprocessor Unit -1 SE computer-II.pptx
Microprocessor Unit-1( Introduction to 80386 Microprocessors)Second Year ppt
80386 & 80486
Architecture_of_80386_Microprocessor - Inroduction
It322 intro 2
Ad

More from teknik komputer ui (20)

PDF
PDF
PDF
PDF
PDF
PDF
PDF
The cisco networking academy net riders indonesia 2010 competition
DOC
Rencana Proyek Divisi Komputer.doc
DOC
Salinan Research Paper
PDF
Chapter_1_Case_Study
PDF
Iins practice questions
PDF
S1 intr ftui
PPT
Exploration network chapter7
PPT
Exploration network chapter6
PPT
Exploration network chapter5
PPT
Exploration network chapter4
PPT
Exploration network chapter3
PPT
Exploration network chapter2
PPT
Exploration network chapter1
PPT
Exploration network chapter11
The cisco networking academy net riders indonesia 2010 competition
Rencana Proyek Divisi Komputer.doc
Salinan Research Paper
Chapter_1_Case_Study
Iins practice questions
S1 intr ftui
Exploration network chapter7
Exploration network chapter6
Exploration network chapter5
Exploration network chapter4
Exploration network chapter3
Exploration network chapter2
Exploration network chapter1
Exploration network chapter11

Chapter2.3 4-mikroprocessor

  • 1. The Microprocessor and Its Architecture A Course in Microprocessor Electrical Engineering Department University of Indonesia
  • 2. Protected Mode Memory Addressing Protected mode memory addressing (80286 and above) allows access to data and programs located above the first 1MB of memory as well as within the first 1MB of memory The segment register contains a selector instead of segment addresses a selector selects a descriptor from descriptor table The descriptor describes the memory segment’s location, length, and access rights ( Fig.2.6 )
  • 3. Protected Mode Memory Addressing (cont’d) The selector selects one of 8,192 descriptors from one of two tables of descriptors There are two descriptor tables: one contains global descriptors and other contains local descriptors The global descriptors contain segment definitions that apply to all programs, while the local des-criptors are usually unique to an applications Each descriptor table contains 8,192 descriptors (i.e. a total 16,384 descriptors are available to an application at any time) --> eq. 16,834 memory segment
  • 4. Protected Mode Memory Addressing (cont’d) The base address portion of the descriptor indicates the starting location of the memory segment The segment limit contains the last offset address found in a segment The G bit ( Granularity ; for 80386 through Pen-tium Pro) specifies a segment limit of from 1B to 1MB in length if G = 0, and any multiple of 4KB if G = 1 The AV bit is used by some operating systems to indicate that the segment is available (AV=1) or not available (AV=0)
  • 5. Protected Mode Memory Addressing (cont’d) The D bits indicates whether the instructions to access register and memory data is 16-bit instructions (D=0) or 32-bit instructions (D=1) The access rights bytes ( Fig.2.7 ) controls access to the protected mode memory segment Descriptors are chosen from table by the segment register Fig . 2.8 shows how the segment register functions in the protected mode system Fig.2.9 shows how the segment register, containing a selector, chooses a descriptor from the global descriptor table
  • 6. Program Invisible Registers The program invisible are not directly addressed by software (i.e. invisible) Figures 2.10 Illustrates the program-invisible registers These registers control the microprocessor when operated in the protected mode The program-invisible portion of these registers is often called cache memory; do not confuse with the normal level 1 or level 2 caches found in the microprocessor
  • 7. Program Invisible Registers The GDTR (global descriptor table register) and IDTR (interrupt descriptor table register) contain the base address of the descriptor table and its limit (i.e. 16-bits) the location of the local descriptor table is selected from the global descriptor table One of the global descriptor is set up to address the local descriptor table
  • 8. Memory Paging The memory paging mechanism located within the 80386 and above allows any physical memory location to be assign to any linear address The linear address is defined as the address generated by a program, and with the memory paging unit, the linear address is invisibly translated into any physical address This allows an application written to function at a specific address to be relocated through the paging mechanism
  • 9. Memory Paging (cont’d) It also allows memory to be placed into areas where no memory exists The paging unit is controlled by the contents of the microprocessor’s control registers (CR0 - CR3 or CR4, Figure 2.11 ) The linear address is broken into three sections that are used to access the page directory entry, page table entry, and page offset address (Figure. 2.12 )
  • 10. Memory Paging (cont’d) See Figure. 2.13 The page directory contains 1,024 doubleword addresses that locate up to 1,024 page tables The page directory and each page table are 4K bytes in length See Figure. 2.14 as well
  • 11.  
  • 12.  
  • 13.  
  • 14.  
  • 15.  
  • 16.  
  • 17.  
  • 18.