You are on page 1of 6

Q NO.

1 (a)
8086 Interrupt Execution
In response to an interrupt 8086 goes through
following series of actions:
Push flag register onto stack ( SP -=2)
Disable INTR by clearing interrupt flag (IF)
Reset Trap flag (TF)
Push contents of CS register onto stack
(SP-=2)
Push contents of IP register onto stack
(SP-=2)
Get address of ISR from Interrupt vector table
(Update IP & CS Register)
Execution of IRET instruction at the end of ISR
resumes execution of main program and
following registers are retrieved from stack
Contents of IP register are retrieved from
stack (SP+=2)
Contents of CS register are retrieved from
stack (SP+=2)
Contents of Flag register are retrieved from
stack (SP+=2)
Stack push and pop must be equal inside ISR

Q NO.1 (b)
Interrupt vector table
Interrupt vector table in 8086 is 1 K Bytes, which
can hold addresses for 256 ISRs
Each entry in Vector table is of size 4 Bytes ( 2
Bytes for CS , 2 Bytes for IP, CS:IP )
In each table entry IP values is stored first and
CS value is stored next
8086 Interrupt Types
8086 Interrupt Vector Table has total of 256
entries. Each entry is called an interrupt type
Dedicated interrupt types are
Type 0 : Divide by Zero
Type 1 : Single Step
Type 2 : Non maskable (NMI)
Type 3 : Breakpoint
Type 4 : Overflow
Type 5-31 : Reserved by Intel
Type 32-255 : User defined interrupts
For user defined hardware interrupts, interrupt type is
communicated to 8086 by in interrupt controller (PIC)

Q.No (2)

Numerical hy. Muje nai aata ye kar k muje b mail karo.. :-p

Q.NO 3
Bus arbitration
Bus arbitration is the process of giving the
control of the shared bus to different controllers
based upon a priority policy. When current bus
master leaves control of the bus, bus is granted
to another requesting processor/controller.
TYPES
1. Daisy Chain Method
Daisy chain method is a serial method for bus
arbitration. Arbiter sees only one request
When a controller wants access to the bus , it
asserts Bus request (BR) signal. In response
arbiter asserts bus grant signal. (BG) signal first
reaches U0 , than U1 , U2 and so on. Controller
that requires bus asserts Busy signal.
When current bus master leaves control of the
bus, it de-asserts Busy signal, leaving the bus
Daisy chain method is a fixed priority method

In daisy chain method controller close to bus


arbiter has the highest priority while the
controller away from arbiter has least.
2. Bus Polling Method
Bus polling method is also a serial method of
bus arbitration where bus grant line is replaced
with polling lines. Bus requests (BR) are made
via a common bus request line
Bus arbiter generates a sequence of addresses
(count) on the poll-count lines. Each device
compares the count to the address assigned to
that device.
On a match, device i asserts the BUSY signal
and connects to the bus if it it has asked for a
bus request. Also polling count stops
When controller i leaves the bus, polling count
increments and controller i+1 can access the bus
next if it has requested.

Q.No (4)
CSMA/CA
Carrier sense multiple access with collision avoidance (CSMA/CA)
in computer networking, is a network multiple access method in

which carrier sensing is used, but nodes attempt to avoid


collisions by transmitting only when the channel is sensed to be
"idle".[1][2] When they do transmit, nodes transmit their packet
data in its entirety.
It is particularly important for wireless networks, where the
collision detection of the alternative CSMA/CD is unreliable due to
the hidden node problem.
CSMA/CA is a protocol that operates in the Data Link Layer (Layer
2) of the OSI model.

ESS
Abbreviated as ESS, Extended Service Set is a component of
theIEEE 802.11 WLAN architecture that extends the range of
mobility to a single Basic Service Set (BSS). An Extended Service
Set (ESS) is a set of two or more BSSs that form a single
sub network.

Hidden node problem


In wireless networking, the hidden node problem or hidden
terminal problem occurs when a node is visible from awireless
access point (AP), but not from other nodes communicating with
that AP. This leads to difficulties in media access control.

RTS/CTS

RTS/CTS (Request to Send / Clear to Send) is the optional


mechanism used by the 802.11 wireless networking protocol to
reduce frame collisions introduced by the hidden node problem.
Originally the protocol fixed the exposed node problemas well, but
modern RTS/CTS includes ACKs and does not solve the exposed
node problem.
802.11 Frame Format

You might also like