Professional Documents
Culture Documents
Internal External
Processors Year Architecture Bus Size Transistors Principle Features
86 1978 16 16 29K 16-bit architecture, basic
segment protection
88 1979 8 8 29K Same as 86, but with 8-bit
processor bus. (IBM PC)
286 1982 16 16 130K Expands segmentation
protection, adds single-
instruction task switching
(used in IBM PC/AT)
Intel 386TM 1985 32 32 375K Adds paging, 32-bit
extensions, on-chip address
translation, and greater
speed to 286 functions
Intel 386TM 1988 32 16 375K Same as Intel 386
SX processor, but with a 16-bit
data bus
The IntelTM 86 Family of Processors
Internal External
Processors Year Architecture Bus Size Transistors Principle Features
Intel 486TM 1989 32 32 1,200K Adds on-chip cache, floating-
DX point unit, and greater speed
to Intel386TM
Intel486TM 1991 32 32 No math, Lower cost
SX
Intel486TM 1992 32 32 1.2 Meg Double internal speed
DX-2
PentiumTM 1993 32 64 3.1 Meg Superscaler, Code & Data
P5 - 60,66 Cache, 64 bit data bus
PentiumTM 3.3v, Power Mgt,
1994 32 64 3.3 Meg
P54C Multiprocessor support
PentiumTM On Chip L1 & L2,
1995 32 64 CPU
Pro Dynamic Execution
5.5 Meg
GTL logic
FEATURES OF 80486
• The address driver is connected with the internal 32 bit address o/p of the cache and the
system bus. The data bus transceivers are interconnected between the internal 32-bit data
bus and the system bus. The write data buffer is queue of four 80 bit registers and is able to
hold the 80 bit data which will be the written to the memory.
• To control the bus access and operations, the following bus control and the request
sequencers ADS#, W/R# ,D/C#, M/IO#, PCD, PWT, RDY@, LOCK#,
PLOCK#,BOFF#,A20M#,BREQ,HOLD,HLDA,RESET,INTR,NMI,FERR#,and IGNNE#
are used.
EXECUTION UNIT (EU) AND CONTROL UNIT (CU)
• The parity generation and control unit generates the parity and carries out the checking
during the processor operation. The boundary scan control unit of the processor performs
boundary scan tests operation to ensure the correct operation of all components of the
circuit on the mother board.
• The prefetcher unit fetches the codes from the memory and arranges them in a 32 byte
code queue. The function of the instruction decoder is to receive the code from the code
queue and then decodes the instruction code sequentially. The output of the decoder is fed
to the control unit to derive the control signals, which are used for execution of the
decoded instructions. Before execution, the protection units check all the protection norms.
If there is any violation, an appropriate execution is generated.
EXECUTION UNIT (EU) AND CONTROL UNIT (CU)
• The control ROM stores a micro program to generate control signal for execution of instructions. The
register bank and ALU are used for their usual operation just like they perform in 80286.
• The barrier shifter is used to perform the shift and rotate algorithms.
• The segmentation unit, description registers, paging unit, translation look aside buffer and limit and
attribute PLA are worked together for the virtual memory management. These units also provide
protection to the op-codes or operand in the physical memory.
• FLOATING-POINT UNIT(FPU)
• The floating point unit and register bank of FPU communicate with tha bus interface unit (BIU) under
the control of memory management unit (MMU), through a 64-bit internal data bus. Generally the
FPU is used for mathematical data processing at very high speed of compare to the ALU.
PIPELINE STAGES
80586- FEATURES
• 32-bit addressing • Wider internal data paths: 128- and 256-bit wide
• To achieve this CPU must have more than one execution channels .there
• B)Superscalar architecture
FEATURES
• In VLIW processor ,the compiler reorders the sequential stream of code that is coming
from memory into a fixed size instruction group and issues them in parallel for execution
• In super scalar the hardware decides which instructions are to be issued concurrently at
run time
• CPU issues two instructions in parallel to the two independent integer pipelines known as
U and V pipelines
• the pipelined floating-point unit, and the 64-bit external data bus
• Even-parity checking is implemented for the data bus and the internal RAM arrays
(caches and TLBs).
PENTIUM ARCHITECTURE
BLOCK DIAGRAM
CODE AND DATA CACHE
• There are separate code and data caches, and the cache line size is 32 bits just like the
80486 processor.
• Each cache is connected with its own translation look-aside buffer (TLB).
• Therefore, the paging unit of a memory management unit (MMU) can rapidly convert
linear code or data addresses into physical addresses.
• Due to two separate caches, the pre-fetches cannot conflict with data access cycles.
• BRANCH PREDICTION:
• Branch prediction consists of control unit (CU) and a Branch Trace
Buffer (BTB). The function of control unit and branch trace buffer is as follows:
• Branch Trace Buffer: The BTB is used to store the target address and statistical
information about the branch operation.
• Hence, the branch prediction is able to predict branches and cause the Pentium to use the
most likely target address for instruction fetching. Pipeline freeze up caused by pipeline
flushes and the subsequent fetching operations are reduced and the program execution is
accelerated.
Control Unit
• The control unit controls the five-stage integer pipelines U and V, and the eight-stage floating-
point pipeline.
• In the Pentium processor, the integer pipelines are used for all instructions which are not involved in
any floating-point operations. Therefore, the Pentium can transmit two integer instructions in the
same clock cycle and the performance of the processor is improved. This method is called
superscalar architecture.
• The first four stages of floating- point pipeline overlap with the Pipeline and the parallel operation of
the integer and the floating-point pipeline is possible only under some specified conditions.
• If the operating clock frequency of Pentium is as same as 80486, the Pentium floating-point unit is
able to execute floating-point instructions 3 to 5 times faster than 80486.This is possible as a
hardware mulitiplier,divider and quicker algorithms are incorporates in the microcode floating-point
unit.
Control Unit
• The support unit controls the pipelines with the microcode. Actually, this unit uses both
pipelines together. Therefore, complex microcode instructions run very fast on a Pentium
than on a 80486.
SUPER SCALAR
• A superscalar CPU architecture implements a form of
parallelism called instruction level parallelism within a
single processor. It therefore allows faster CPU throughput
than would otherwise be possible at a given clock rate.
• The U-pipeline is able to handle the full instruction set of the Pentium.
• The V-pipeline has limited handling capability .The V-pipeline is able to handle only simple
instructions without any microcode support. The V-pipeline is used to execute ‘simple integer
instruction’ such as load/store type instructions and the FPU instruction FXCH,
• Actually , Pentium processor use a set of pairing rules to select a simple instruction which can go
through the V-pipeline . When instructions are paired, initially the instruction is issued to
the U-pipeline and then the next sequential instruction is issued to the V-pipeline.
Instruction Issue Algorithm
• There are two integer pipelines and a floating-point unit in the Pentium processor.
• PREFETCH (PF)
• DECODE-1 (D1)
• DECODE-2 (D2)
• EXECUTE (E)
• The integer pipeline stages are as follows: • Decodes the control word
1.Prefetch(PF) :
– Instructions are prefetched from the on-chip instruction cache
2.Instruction Decode(D1):
– Two parallel decoders attempt to decode and issue the next two sequential
instructions
• It decodes the instruction to generate a control word,
8. Error Reporting(ER)
• If an error is detected, an error reporting stage is entered where the error is
reported and FPU status word is updated
FLOATING POINT UNIT
Floating point Unit
1. Both instructions in the pair must be “simple” as defined below Simple instructions are entirely hardwired; they do not
require any microcode control and, in general, execute in one clock
3. Instruction prefixes are treated as separate 1-byte instructions. Sequencing hardware is used to allow them to function
as simple instructions.
Integer Instruction Pairing Rules
• For example the instructions a=b+c; d=e+f; can be run in parallel because none of the result
depend on other calculations.
• If the ins a=b+c; b=e+f; might not be runnable in parallel,depending on the order in which
the ins complete while they move through the units.
• When the no of parallel issued ins increases, the cost of dependency checking increases
extremely rapidly.
• This is exacerbated by the need to check dependencies at run time and at the cpu`s clock
rate.
• This is leads to extra cost for additional logic gates required to implement the
checks.
Integer Instruction Pairing Rules
Instruction Issue for
Floating Point Unit
• The rules of how floating-point (FP) instructions get issued on the Pentium processor are :
2.When a pair of FP instructions is issued to the FPU, only the FXCH instruction can be the
second instruction of the pair.
The first instruction of the pair must be one of a set F where F = [ FLD,FADD, FSUB,
FMUL, FDIV, FCOM, FUCOM, FTST, FABS, FCHS].
3.FP instructions other than FXCH and instructions belonging to set F, always get issued
singly to the FPU.
4.FP instructions that are not directly followed by an FXCH instruction are issued singly to the
FPU.
BUS CYCLE DEFINTION GROUP
• Bus control group:
• ADS#: The ADS# (address data strobe) output pin indicates that the address bus contains a
• RDY#: The RDY# (ready) input pin acts as a ready signal and this signal is used for the
• BRDY#: The BRDY# (burst ready) input indicate the burst mode of memory read or memory
write operation. During the burst mode, the speed of memory access may be doubled compared to
• HOLD: The HOLD pin act as a local bus hold input. This pin may be activated by another bus
master like DMA controller. This pin is functionally similar to tha BREQ pin.
• HLDA: The HLDA output signal is used to acknowledge the receipt of a valid a HOLD request.
• BOFF#: When the BOFF# (back off) input pin is at logical level1,80486 CPU places its buffer at
hold state. The active high back-off input signal forces the current bus master of 80486 CPU release
the bus in the next clock cycle.
• KEN#: The KEN# (cache enable) input pin is used to decide whether the current cycle is cacheable
or not.
• FLUSH#: The FLUSH# is a cache flush input signal. When this pin is activated, it clears the cache
contents and validity bits.
BUS CYCLES
BUS OPERATAION
• Ti – the ideal state indicated that no bus cycles are being run.
• T1- ( Address Time)The first clk of a bus cycle whn no other cycles are outstanding.
• - the addr and bus cycle are driven during T1 and ADS# enabled.
• - T1- indicates tht this is the only bus cycle in progress or no bus cycle pipelining is occur.
• - if read bus cycle is being run, the data is latched from data bus whn BRDY# enabled at
the end of T2.
• -During T2 state no other cycles are currently running.
BUS OPERATAION
• T12 – ( Address time for 2nd cycle, & data time for 1ST cyale already in progress)-
• - T12 – indicated pipeline state, in which the address phase of anewly pipelined cycle and data
time for the 1ST cycle already I progress occur simultaneously.
• - the processor is still in the T2 state for the current cycle and has entered T1 state for the next
pipelined cycle.
• T2P- ( data time for 1st cycle & data time for 2nd cycle pipelined)
• - it indicates two cycles that are outstanding on the bus and both are in the T state.
• - During T2P, BRDY# enabled for 1st cycle initiated by the processor.
• - When 1st outstanding cycle is completes, the state transitions to T2, indicating only one
outstanding cycle.
BUS OPERATAION
• TD- (Wait state or dead clock state)- indicates there is one outstanding bus cycles, that
its address, status & ADS# have already been driven some time in past, and the data and BRDY#
pins are not enabled due to the data bus requires one dead clock to turn around b/w the two
consecutive reads and writes or vice versa.
• - the processor enters TD if in the previous clk there were two outstanding cycles, the
last BRDY# was returned and Dead clk is needed.
BUS OPERATION
BUS OPERATIONS
BUS OPERATIONS
BUS OPERATIONS
Branch prediction
• Branch prediction is another new feature of the Pentium.
• Performance gain through pipelining can be reduced by the presence of program transfer
instructions (such as JMP,CALL,RET and conditional jumps).
• They change the sequence causing all the instructions that entered the pipeline after program
transfer instruction invalid.
• This causes bubbles in pipeline, where no work is done as the pipeline stages are reloaded.
• The ability to predict branches and avoid the branch penalty combined with the instruction pairing
can result in a substantial reduction in the clock count for a given program.
Branch Prediction Logic
• To avoid this problem, the Pentium uses a scheme called Dynamic Branch Prediction.
• In this scheme, a prediction is made concerning the branch instruction currently in pipeline.
• If the prediction turns out to be true, the pipeline will not be flushed and no clock cycles will be
lost.
• If the prediction turns out to be false, the pipeline is flushed and started over with the correct
instruction. It results in a 3 cycle penalty if the branch is executed in the u-pipeline and 4 cycle
penalty in v-pipeline.
• It is implemented using a 4-way set associative cache with 256 entries. This is referred to as the
Branch Target Buffer(BTB).
Branch Prediction Logic
• BTB is a look-aside cache that sits off to the side of D1 stages of two pipelines and monitors for branch
instructions.
• The first time that a branch instruction enters either pipeline, the BTB uses its source memory address
to perform a lookup in the cache.
• Since the instruction has not been seen before, this results in a BTB miss.
• It then predicts that the branch will not be taken and program flow is not altered.
• Even unconditional jumps will be predicted as not taken the first time that they are seen by BTB.
Branch Prediction Logic
• When the instruction reaches the execution stage, the branch will be either taken or not taken.
• If taken, the next instruction to be executed should be the one fetched from branch target address.
• If not taken, the next instruction is the next sequential memory address.
• When the branch is taken for the first time, the execution unit provides feedback to the branch
prediction logic.
• A directory entry is made containing the source memory address and history bits set as strongly
taken
Branch Prediction Logic
History Resultin Predicti If branch If branch
Bits g on Made is taken is not
Descript taken
ion
11 Strongly Branch Remains Downgrade
Taken Taken Strongly s to
Taken Weakly
Taken
10 Weakly Branch Upgrades Downgrade
Taken Taken to Strongly s to
Taken Weakly Not
Taken
01 Weakly Branch Upgrades Downgrade
Not Not to Weakly s to
Taken Taken Taken Strongly
Not Taken
00 Strongly Branch Upgrades Remains
Not Not to Weakly Strongly
Taken Taken Not Taken Not Taken
Branch Prediction
• Branch Prediction
• Branch Target Buffer
• The processor accesses the BTB with the address of the instruction in the D1 stage
example)
inner_loop :
mov byte ptr flag[edx], al PF D1 D2 EX WB
add edx, ecx PF D1 D2 EX WB
cmp edx, FALSE PF D1 D2 EX WB
jle inner_loop PF
• 486 : 6 clocks
Pentium : 2 clocks with branch prediction
www.advancedmsinc.com
PAGING:
• The page directory can reside at any 4K boundary since the low order 12 bits of
• Each page directory entry addresses a page table that contains up to 1024
entries.
PAGING:
PAGING:
PAGING:
PAGING
D: Dirty . This bit is set if a write has been performed to the page pointed to by the PTE. Dirty bits
are used to determine if the page should be written back to hard disk when the page is swapped out
(to make room for a new page coming in)
A: Accessed. This bit is set if a read or write was performed to the page selected by the PDE and
PTE. This nit is used by the operating system to help choose a victim page to swap out when all pages
are in use and ane w page must be loaded into RAM. A page that has been accessed is less likely to
be swapped out than a page that has been not accessed.
PCD: Catch Disable. This bit determines whether the current memory access is cached.
PWT: Write through. This bit enables write through operations between the cache and memory.
U: User. This bit is used when the performing protection checks on the current memory address.
PAGING
W: Writeable. This bit determines whether the page may be written to and is also used in protection
checks.
P: PRESENT. This bit indicates whether the page is actually stored in memory. In a demand-paging
system, when a new page is needed , one of two conditions may be true:
If a page frame is available , the new page is copied into memory at the appropriate address ,the
TLB’s are updated ,and the P-bit is set to indicate that the page is in memory.
If no free pages exist, a victim page must be chosen to make room for the new page. The P-bit of the
victim’s PTE is cleared , to show that the page has been swapped out. The page may be copied back
to hard disk(as required by the dirty bit)befors the new page is read in.
REGISTER SETS IN PENTIUM
REGISTER SETS IN PENTIUM GENERAL PURPOSE REGISTERS
data. AH AL
EAX ACCUMULATOR
The 8086 microprocessor has byte and word sized registers, EBX BASE
BH BL
15 0
Besides the above 32-bit registers, the 80386 also provides 2 new CS
16-bit segment registers such as FS and GS. SS
Therefore, all segment registers of 80386 are CS,DS,ES,SS,FS, and DS
GS. ES
CODE SEGMENT(CS) FS
DATA SEGMENT (DS)
GS
EXTRA SEGMENT (ES)
STACK SEGMENT (SS)
The 80386 processor has four 32-bit control register CONTROL REGISTERS
: CR0-CR3. 31 16 15 0
CR4
These registers are used to hold global machine
CR3
status. The load and store instructions are used to
mode operation.
debugging. DR6
DR5
Among the eight debugging registers, two registers DR5 and DR4 are
DR4
reserved by Intel. DR3
The first four registers DR3 to DR0 are used to store four program DR2
The local descriptor table (LDT) contains descriptors that can be LDTR LDTSS SELECTOR LDT BASE ADDR LDT LIMIT
private to a task. All tasks may have their private LDTs. IDRT IDT BASE ADDR IDT LIMIT
• The GDT may contain all descriptor types except interrupt and trap descriptors.
• The LDT contains segment, task gate, and call gate descriptors.
• A segment cannot be accessed by a task if its segment descriptor does not exist in either
GDT or LDT at the time of access
FLAG REGISTER
• The flag register of the 80386 is a 32-bit register. EFLAG REGISTER
15 0
• Among these 32-bits,D31 to D18,D15,D5 and D3 are 31 16
EFLAG FLAG
reserved by the Intel and D1 is always 1.
• The lower 15 bits of the flag register of 80586 are same as 80286.
The real addressing operating mode provides the programming environment of the 8086 processor
incorporating the ability to switch to the protected mode or system management mode.
The System Management Mode (SMM) of the Pentium processor provides an operating system with a
transparent mechanism for implementing power management.
When an external system interrupt pin (SMI#) IS ACTIVATED, A System Management Interrupt (SMI)
is generates and the processor has to be entered in the system management mode.
In this mode, the processor switches to a separate address space while saving the context of the
currently running program or task.
Then the system management mode’s specific code can be executed transparently. Upon returning from SMM,
the processor can be back to the real- address mode state, or protected mode state or virtual 8086 mode
state from the system management mode by using RESET or RSM signal.
OPERATING MODES IN PENTIUM
Virtual-8086 Mode:
When the processor operates in protect mode, it can support a quasi-operating mode known as virtual-8086
mode.
The mode allows the processor to execute 8086 software in a protected as well as multitasking environment.
Initially, The Pentium processor enters the real-address mode through a power up or a reset operation.
The switching between real address mode and protected mode requires the initialization before the mode is
changed. When PE=1, the processor operating mode is changes from real address mode to protected mode.
When VM=1, the processor, operating mode changes from protected mode to virtual 8086 mode.
PROTECTED MODE
The protected mode operation of the Pentium processor protects different task in multitasking operating
system from invalid accesses.
• During protected mode operation of the Pentium processor, memory management is done in two
different ways, namely, segmentation and paging.
• Segmentation: Segmentation issued to the isolate individual code, data and stack modules so that
multiple programs can run on the same processor without interfering with other program.
• Paging: Paging is one of the memory management techniques which allows the processor to
address a range of virtual memory that is greater than the physical memory that can be addressed using the
processor’s address bus alone. This is done by swapping pages in and out of the main memory and on and off
the disk.
PROTECTED MODE
• In protected mode, segmentation cannot be disabled but the use of paging is optional.
• Actually segmentation divides the processor‘s addressable memory space into small protected address
space called segments.
• Usually, segments are used to hold the code, data and stack for a program or it can also hold system data.
• Whenever more then one program is executed on the processor, each program must be assigned its own set of
segments.
• Then the processor enforces the boundaries between these segments so that one program does not
interface with the execution of other program.
MEMORY MANAGEMENT OF PENTIUM PROCESSOR
MULTITASKING
Most significant features of protected mode is its ability to support execution of multiple
programs is known ass tasks.
it can able to switch from task to task at very high speed gives the impression tht many task are
all running at the same time. Time SLICE
information are saved and thn new info is loaded for next task. ESP2 14
SS2 18
CR3 (PDBR) 1C
• The special memory structure is known as Task State Segment EIP 20
EFLAGS
(TSS). 24
EAX 28
ECX 2C
• TSS contains 32 bit reg, 16 bit segment selector and EDX 30
EBX 34
additionally storage for stack pointer.
ESP 38
EBP 3C
• When task is created the task LDT`s selector(addr 60H), PDBR ESI 40
EDI 44
(ADDR 1CH), T-bit, I/O map base address are filled or enabled. ES 48
CS 4C
• During task switch these items are read but not changed. SS 50
DS 54
• Register portion (20H to 5CH) is modified during task switch FS 58
GS 5C
being overwritten current content of each reg. TASK LDT SELECTOR 60
I/O MAP BASE ADDR T 64
TSS DESCRIPTORS
31 24 23 20 19 16 15 14 13 12 10 9 87 0
Base Base
limit (16-
address G 0 AVL P DPL 10 B 1 addr(16-
19)
(24 -31) 23)
Base address (0 - 15) Segment Limit (0 - 15)
• The task reg is used as an index pointer into the GDT to locate a TSS descriptor.
visible to
program invisible to programmer
mer
• New task register is loaded with new TSS descriptor with LTR ( Load Task Reg) instruction.
• LTR need 16 bit reg, a new task reg is loaded to execute via LTR
• The visible portion of task may be read with STR (Store Task Register)
TASK GATES
• TSS descriptor contains two DPL bits tht specify the privilege level of the segment, a task switch may
result in privilege violation if the new task has a lower priority than the currently executing
task.
• It may be necessary for an interrupt or exception to cause a task switch to a segment containing a
handler code.
• TSS description points to the handler code Reserved P DPL 101 Reserved 4
Each will require task gate in its LDT to access the TSS descriptor of the divide error handler.
TASK SWITCHING
• It can categories as follows
• The current task JMPs or CALLs a TSS descriptor.
• When task switching takes place the following steps are taken
• The new TSS descriptor or task gates might have proper privilege to allow a task switch
• The DPL(descriptor privilege level), CPL( Current privilege level), RPL(Requested pivilege level) values are compared before
any further processing takes place.
• The new TSS descriptor must have its present bit set and have a valid limit field.
• The state of current task is saved (copying all processor reg in to TSS for current task)
• The task reg is loaded with new TSS descriptor selector is set,
• The state of the new task is loaded from its TSS and current Execution is resumed.
LOGICAL TO PHYSICAL ADDRESS MAPPING IN MULTIPLE
TASK
EXCEPTIONS AND INTERRUPTS
• Real mode uses a 1KB interrupt vector table(IVT) starts with addr 0000H.
• An 8–bit vector number is shifted 2 bits to the left to form an index into the IVT.
• The protected mode relies on an interrupt descriptor table(IDT) to support and exception.
• The IDT consist of 8–byte gate descriptor for task, trap or interrupt gates.
• The size of IDT is controlled by a 16-bit limit value stored in interrupt table descriptor register(IDTR).
• The 48-bit reg contains the 32-bit base address & 16-bit size limit.
• The 8-bit vector number for currently recognized interrupt is shifted 3 bits to the left and use
as an index into the IDT.
The 32-bit addr pts to the first instruction in the handler`s INTERRUPT GATE
code segment. 31 16 15 14 13 12 5 4 0
The segment selector executed from GDT or LDT for OFFSET (16-31) P DPL 1110000 Reserved
1-Access occurred in user mode 10 invalid TSS Yes invalid TSS during task switch
Example: The effect of
executing the MOV BX, CX
instruction at the point just
before the BX register
changes. Note that only the
rightmost 16 bits of register
EBX change.
IMMEDIATE ADDRESSING MODES
• Term immediate implies that data immediately follow the hexadecimal opcode in the
memory.
EXAMPLE: The operation of
the MOV EAX,3456H
instruction. This instruction
copies the immediate data
(13456H) into EAX.
REGISTER DIRECT ADDRESSING MODES
• Direct addressing with a MOV instruction transfers data between a memory location, located
within the data segment, and the AL (8-bit), AX (16-bit), or EAX (32-bit) register.
• usually a 3-byte long instruction
• MOV AL,DATA loads AL from the data segment memory location DATA (1234H).
• DATA is a symbolic memory location, while 1234H is the actual hexadecimal location
EXAMPLE: The
operation of the MOV
AL,[1234H]
instruction when
DS=1000H .
DIRECT ADDRESSING MODES
operand
REGISTER INDIRECT ADDRESSING MODES
• Allows data to be addressed at any memory
location through an offset address held in any
of the following registers: BP, BX, DI, and SI.
• The effective address is sum of the content of the two registers and a
constants.
Memory
+
operand
Registers
BASE INDEXED ADDRESSING MODES
• The effective address is the sum of the
contents of two registers. For example
MOV EAX,[ESP][ESI].
JMP (ANY
ADDRESS
CONDITIONAL INS)
INSTRUCTION SET IN PENTIUM
Meanings of the operand specifications:
reg - register mode operand, 32-bit register
reg8 - register mode operand, 8-bit register
r/m - general addressing mode, 32-bit
r/m8 - general addressing mode, 8-bit
immed - 32-bit immediate is in the instruction
immed8 - 8-bit immediate is in the instruction
m - symbol (label) in the instruction is the effective address
INSTRUCTION SET IN PENTIUM
• INTEGER INSTRUCTION Data Transfer Instructions
• MOV Move