Differentiate between protected and real modes of an intel, Computer Engineering

Differentiate between protected and real modes of an Intel microprocessor

Operation of Real mode interrupt: When microprocessor completes executing the current instruction, it determines whether an interrupt is active by checking (1) instruction execution, (2) single -step (3) NMI (4) co-processor segment overrun (5) INTR and (6) INT instruction in the order presented. If one ormore of these interrupt conditions are present, following sequence of events takes place:

1.  The contents of flag register are pushed onto the stack

2.  Both the trap (TF) and interrupt (IF) flags are cleared. This disables INTR pin and trap or single-step feature.

3.  Contents of the code segment register (CS) are pushed onto the stack.

4.  Contents of the instruction pointer (IP) are pushed onto the stack.

5.  The interrupt vector contents are fetched and then placed into both CS and IP so that next instruction executes at the interrupt service procedure addressed by the vector.

 

Posted Date: 8/20/2013 2:52:51 AM | Location : United States







Related Discussions:- Differentiate between protected and real modes of an intel, Assignment Help, Ask Question on Differentiate between protected and real modes of an intel, Get Answer, Expert's Help, Differentiate between protected and real modes of an intel Discussions

Write discussion on Differentiate between protected and real modes of an intel
Your posts are moderated
Related Questions
Q. Describe about Second Generation Computers? Silicon brought advent of second generation computers. A two state device termed as a transistor was created from silicon. Transi

A palindrome is a string that reads the same from both the ends. Given a string S convert it to a palindrome by doing character replacement. Your task is to convert S to palindrome

Q. Simplify Using K-Map 1. M2 + M3 + M5 + M7 + M12 + M13 + M8 + M9 2. M0 + M2 + M4 + M5 + M8 + M10 + M12 3. F(W,X,Y,Z) = ∑ (0,1,2,4,5,6,8,9,12,13,14)


Determine the advantages of sixth generation computers One of the major dramatic changes in sixth generation will be the explosive growth of wide area networking. Network bandw


Q. Show the instruction execution by using the micro-operations? A simple instruction can require: Instruction fetch: fetching instructions from the memory. Instruc

Write a main function that opens an ifstream on the input file, "person.dat".  If the stream cannot be  opened, output an error message and exit.       The file format is as foll

What are the two ways in which the system using cache can proceed for a write operation? Write by protocol technique Write-back or Copy-back protocol method

design a dfa which accept all the string over a and b ending with ab or ba