Professional Documents
Culture Documents
Key Features
Real Addressing Mode - It is just like as in 8086. Address is 20 bit with 16 bit segment and 16 bit offset. When 80286 is
hardware reset, it automatically enters real address mode.
2.
Protected Virtual Addressing Mode (PVAM) - In this we have 1 GByte of virtual memory and 16 Mbyte of physical memory.
The address is 24 bit. To enter PVAM mode, Processor Status Word (PSW) is loaded by the instruction LPSW.
PE-ProtectionEnable
MP - Monitor Processor Extension
EM - Emulate Processor Extension
TS - Task Switch
Hardware reset is the only way to come out of protected mode.
80286 Memory Management Scheme
Memory is organized into logical segments. Segment size can be anywhere between 1 Byte to 16 KByte. All 24 address pins are
active and 16 MByte of physical memory is available.
Descriptor
It is 8-byte quantity. Each segment has a descriptor. There are two main types of descriptor
Segment Descriptor
Format of a Descriptor
7
6-5
4
Present (P)
1 - Yes
0 No
0 to 3
Segment Descriptor
1 - Segment
0 Control
For segment descriptor, i.e. for S = 1, bits 3-0 have the following meaning -
E
Expansion/ Confirming
0 - Data
1 - Code
If code, Confirming: 1 means 'Yes', 0 means 'No'
If data, Expand down: 1 - Yes, 0 - No (normal case)
R/W
Accessed (A)
A = 0, Not accessed
A = 1, Accessed
Descriptors are contained in a descriptor table. There are two categories of descriptor table - global and local. A system has only
one global descriptor table or GDT. A local descriptor table or LDT is set up in the system for each task or closely related group of
tasks. Each task can have its own descriptor table and memory area defined by the descriptors in it.
Accessing Segments
The 80286 microprocessor keeps the base address and limits for the descriptor tables currently in use in internal registers. These
registers are load descriptor table register (LDTR) and global descriptor table register (GDTR). Descriptor in memory is addressed
by adding segment selector to these registers. The descriptors contain the base address of segments, which when added with the
offset in the virtual address points to the required memory location.
Accessing a Segment of Higher Privilege Level
Tasks operate at the lowest privilege level. Usually, segments at a lower privilege level are not allowed to access segments at a
higher privilege level directly. However, a lower level segment can access a higher level segment indirectly by a Gate Descriptor.
The details of a gate descriptor are given herewith.
Name
Value
Description
Type
Call gate
Task gate
Interrupt gate
Trap gate
DPL
0-3
Word Count
0-31
16-bit Selector
Selector to target task state segment (task gate)
Destination Offset
16-bit Offset
Long jump or call instructions that contain a selector which points to the Task State segment descriptor
2.
IRET
3.
4.
Descriptor
Instruction fetching, instruction decoding, instruction execution and memory management are all carried out in parallel.
Fig. 33.2 Instruction sets of Intel microprocessors (8086/8088 to 80386) are upward compatible
Segment registers:
Advantage of segmentation of memory: Segments corresponds to code and data structures in the program. Hence segmentation is
useful.
Limitation of segmentation of memory : If we need only a part of memory, even then we have to swap the whole segment content.
This will increase the time for execution.
Paged mode: In this mode, instead of segments, 4 kbytes of fixed page length are used.
Limitation : Pages do not correspond to the logical structure of the program.
Advantage : Pages can be quickly swapped.
Conversion of linear address into physical address:
Page directory
Page directory entry
P= 1 Yes
P = 0 No
A = accessed
A = 1 page is accessed
= 0 page is unaccessed
D = dirty bit
Dirty bit is set before any write operation to the page.
Dirty bit is undefined for page directory entries.
R/W
None
Read/Write
None
Read/Write
Read only
Read/Write
Read-write
Read/Write
Pentium Architecture
The Pentium family of processors originated from the 80486 microprocessor. The term ''Pentium processor'' refers to a family of
microprocessors that share a common architecture and instruction set. The first Pentium processors were introduced in 1993. It runs
at a clock frequency of either 60 or 66 MHz and has 3.1 million transistors. Some of the features of Pentium architecture are
Complex Instruction Set Computer (CISC) architecture with Reduced Instruction Set Computer (RISC) performance.
64-Bit Bus
Pentium processor uses Superscalar architecture and hence can issue multiple instructions per cycle.
Pentium processor executes instructions in five stages. This staging, or pipelining, allows the processor to overlap multiple
The Pentium processor fetches the branch target instruction before it executes the branch instruction.
The Pentium processor has two separate 8-kilobyte (KB) caches on chip, one for instructions and one for data. It allows the
Pentium processor to fetch data and instructions from the cache simultaneously.
When data is modified, only the data in the cache is changed. Memory data is changed only when the Pentium processor
replaces the modified data in the cache with a different set of data
The Pentium processor has been optimized to run critical instructions in fewer clock cycles than the 80486 processor.
Protected Mode - In this mode all instructions and architectural features are available, providing the highest performance
and capability. This is the recommended mode that all new applications and operating systems should target.
2.
Real-Address Mode - This mode provides the programming environment of the Intel 8086 processor, with a few
extensions. Reset initialization places the processor in real mode where, with a single instruction, it can switch to protected
mode
The Pentium's basic integer pipeline is five stages long, with the stages broken down as follows:
1.
Pre-fetch/Fetch : Instructions are fetched from the instruction cache and aligned in pre-fetch buffers for decoding.
2.
Decode1 : Instructions are decoded into the Pentium's internal instruction format. Branch prediction also takes place at this
stage.
3.
Decode2 : Same as above, and microcode ROM kicks in here, if necessary. Also, address computations take place at this
stage.
4.
5.
Write-back : The results of the computation are written back to the register file.
Fig 35.3
Architecture of 8086
Unlike microcontrollers, microprocessors do not have inbuilt memory. Mostly Princeton architecture is used for microprocessors
where data and program memory are combined in a single memory interface. Since a microprocessor does not have any inbuilt
peripheral, the circuit is purely digital and the clock speed can be anywhere from a few MHZ to a few hundred MHZ or even GHZ.
This increased clock speed facilitates intensive computation that a microprocessor is supposed to do.
We will discuss the basic architecture of Intel 8086 before discussing more advanced microprocessor architectures.
Internal architecture of Intel 8086:
Intel 8086 is a 16 bit integer processor. It has 16-bit data bus and 20-bit address bus. The lower 16-bit address lines and 16-bit data
lines are multiplexed (AD0-AD15). Since 20-bit address lines are available, 8086 can access up to 2 20 or 1 Giga byte of physical
memory.
The basic architecture of 8086 is shown below.
8086's BIU produces the 20-bit physical memory address by combining a 16-bit segment address with a 16-bit offset address. There
are four 16-bit segment registers, viz., the code segment (CS), the stack segment (SS), the extra segment (ES), and the data
segment (DS). These segment registers hold the corresponding 16-bit segment addresses. A segment address is the upper 16-bits
of the starting address of that segment. The lower 4-bits of the starting address of a segment is always zero. The offset address is
held by another 16-bit register. The physical 20-bit address is calculated by shifting the segment address 4-bit left and then adding
that to the offset address.
For Example: